Live Hack- Common Paths to Breach from One Compromised AWS Identity

Presented by

Jeff Moncrief, Director Solutions Sonrai; Dave Shackleford, Principal, Voodoo Security

About this talk

The greatest risk to data security in the public cloud is its own complexity and scale. Breach tactics remain, on the whole, mundane: bad actors simply take advantage of the labyrinth of identity structures within the public cloud infrastructure. The sheer number of interlocking entities, permissions, roles, and privileges in a modern enterprise cloud presents many opportunities for unintentional paths to data via compromised identities. The best way to visualize this is to actually see it from a hacker’s perspective - so we’re doing this live in the cloud to show the most common paths to a data breach in AWS. We’re using simple command-line arguments to compromise an identity in a typical s3 bucket and make our way to sensitive data. We’ll go through how bad actors can easily abuse concepts like: •Privilege escalations •Trust relationships •Toxic identity combinations •Improper separation of duties *This webinar was originally broadcast in partnership with SANS.*
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (45)
Subscribers (6915)
Sonrai Security delivers an enterprise identity and data governance platform for AWS, Azure, Google Cloud, and Kubernetes.