Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

BSides Vancouver 2017, Matt Carolan’s ‘Is The Cloud More Secure?’ →

January 27, 2018 by Marc Handelman in BSides, Conferences, Education, Cloud Security, Information Security
January 27, 2018 /Marc Handelman
BSides, Conferences, Education, Cloud Security, Information Security

AWS Data Centers, Digital Tour →

January 19, 2018 by Marc Handelman in Cloud Security, Physical Security, Physical Architecture

Quick, entertaining and yet commendable 'digital tour' of a Amazon Web Services Data Center illustrating the security, thereof. Displaying the Datacenters security fundamentals, Security Controls inherent in their designs and People involved with securing and auditing the data assets of the company's customers. Recommended for executives and managers, and certainly light on the tech...

January 19, 2018 /Marc Handelman
Cloud Security, Physical Security, Physical Architecture

New S3 Encryption Feature, Is Amazon's Encryption Move Enough? →

November 08, 2017 by Marc Handelman in Cloud Security, Cloud Data Storage, Cybersecurity, Encryption, Data-At-Rest, Data-In-Motion

You be the judge... Essentially, all are targeted at data-and-objects-at-rest, rather than in-motion (except, perhaps the new cross-region replication feature with KMS).

Regardless, all of the annouced new features are welcome (in my currently rather jaded opinion). Now, if we can just overcome human error (not to mention blatant developer and data-owner lack-of-attention-to-detail, read about that here)...

  • Default Encryption – You can now mandate that all objects in a bucket must be stored in encrypted form without having to construct a bucket policy that rejects objects that are not encrypted.
  • Permission Checks – The S3 Console now displays a prominent indicator next to each S3 bucket that is publicly accessible.
  • Cross-Region Replication ACL Overwrite – When you replicate objects across AWS accounts, you can now specify that the object gets a new ACL that gives full access to the destination account.
  • Cross-Region Replication with KMS – You can now replicate objects that are encrypted with keys that are managed by AWS Key Management Service (KMS).
  • Detailed Inventory Report – The S3 Inventory report now includes the encryption status of each object. The report itself can also be encrypted. - via Jeff Barr, writing at the AWS Blog

And, thanks for the H/T go out to Trey Blalock over at rapidly growing Firewall Consultants!

November 08, 2017 /Marc Handelman
Cloud Security, Cloud Data Storage, Cybersecurity, Encryption, Data-At-Rest, Data-In-Motion

DerbyCon 2017, Amit Serper's 'Peekaboo I Own You' →

October 18, 2017 by Marc Handelman in Conferences, Education, Information Security, Cloud Security, IoT Security, DerbyCon
October 18, 2017 /Marc Handelman
Conferences, Education, Information Security, Cloud Security, IoT Security, DerbyCon

Infosec Reactions' 'The Docker Security Model' →

August 05, 2017 by Marc Handelman in Code, Cloud Security, Code Review, Docker Security?, Information Security, Cyber Cyber Cyber Cyber

Via the excoratingly humorous mind of aloria. Enjoy,

August 05, 2017 /Marc Handelman
Code, Cloud Security, Code Review, Docker Security?, Information Security, Cyber Cyber Cyber Cyber

AWS re:Invent 2016 - IAM Best Practices to Live By →

January 18, 2017 by Marc Handelman in All is Information, Cloud Security, Education, Conferences, Information Security
January 18, 2017 /Marc Handelman
All is Information, Cloud Security, Education, Conferences, Information Security

AWS re:Invent 2016 - Scaling Security Operations and Automating Governance →

January 17, 2017 by Marc Handelman in All is Information, Cloud Security, Conferences, Education, Information Security
January 17, 2017 /Marc Handelman
All is Information, Cloud Security, Conferences, Education, Information Security

AWS re:Invent 2016 - Automated Formal Reasoning About AWS Systems →

January 16, 2017 by Marc Handelman in All is Information, Cloud Security, Conferences, Education, Information Security
January 16, 2017 /Marc Handelman
All is Information, Cloud Security, Conferences, Education, Information Security

AWS re:Invent 2016 - Common Considerations for Data Integrity Controls in Healthcare →

January 15, 2017 by Marc Handelman in All is Information, Cloud Security, Conferences, Education, Information Security
January 15, 2017 /Marc Handelman
All is Information, Cloud Security, Conferences, Education, Information Security

AWS re:Invent 2016 - Automating Security Event Response, from Idea to Code to Execution →

January 14, 2017 by Marc Handelman in All is Information, Conferences, Cloud Security, Education, Information Security
January 14, 2017 /Marc Handelman
All is Information, Conferences, Cloud Security, Education, Information Security

AWS re:Invent 2016, re:Source - Mini Con for Security Services State of the Union →

January 13, 2017 by Marc Handelman in All is Information, Cloud Security, Conferences, Education, Information Security
January 13, 2017 /Marc Handelman
All is Information, Cloud Security, Conferences, Education, Information Security

AWS re:Invent 2016 - How to Automate Policy Validation →

January 12, 2017 by Marc Handelman in All is Information, Cloud Security, Conferences, Education, Information Security
January 12, 2017 /Marc Handelman
All is Information, Cloud Security, Conferences, Education, Information Security

AWS re:Invent 2016 - Mitigating DDoS Attacks on AWS, Five Vectors and Four Use Cases →

January 11, 2017 by Marc Handelman in All is Information, Cloud Security, Conferences, Education, Information Security
January 11, 2017 /Marc Handelman
All is Information, Cloud Security, Conferences, Education, Information Security

AWS re:Invent 2016 - Proactive Security Testing in AWS, Early Implementation to Testing →

January 10, 2017 by Marc Handelman in All is Information, Cloud Security, Conferences, Education, Information Security
January 10, 2017 /Marc Handelman
All is Information, Cloud Security, Conferences, Education, Information Security

AWS re:Invent 2016 - Scaling Security Resources for Your First 10 Million Customers →

January 09, 2017 by Marc Handelman in All is Information, Cloud Security, Conferences, Education, Information Security
January 09, 2017 /Marc Handelman
All is Information, Cloud Security, Conferences, Education, Information Security

AWS re:Invent 2016 - Reduce Blast Radius by Using Multiple AWS Accounts Per Region & Service →

January 08, 2017 by Marc Handelman in All is Information, Cloud Security, Conferences, Education, Information Security
January 08, 2017 /Marc Handelman
All is Information, Cloud Security, Conferences, Education, Information Security

AWS re:Invent 2016 - Get the Most from AWS KMS, Architecting Applications for High Security →

January 07, 2017 by Marc Handelman in All is Information, Cloud Security, Conferences, Education, Information Security
January 07, 2017 /Marc Handelman
All is Information, Cloud Security, Conferences, Education, Information Security

AWS re:Invent 2016 - Audit Your AWS Account Against Industry Best Practices, CIS Benchmarks →

January 06, 2017 by Marc Handelman in All is Information, Cloud Security, Conferences, Education, Information Security
January 06, 2017 /Marc Handelman
All is Information, Cloud Security, Conferences, Education, Information Security

AWS re:Invent 2016 - The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security →

January 05, 2017 by Marc Handelman in All is Information, Conferences, Cloud Security, Education, Information Security
January 05, 2017 /Marc Handelman
All is Information, Conferences, Cloud Security, Education, Information Security

AWS re:Invent 2016 - 5 Security Improvements You Can Make by Using CloudWatch and AWS Rules →

January 04, 2017 by Marc Handelman in All is Information, Cloud Security, Conferences, Education, Information Security
January 04, 2017 /Marc Handelman
All is Information, Cloud Security, Conferences, Education, Information Security
  • Newer
  • Older