Kumar Ashwin

[email protected]

AWS Security Masterclass

Training
AWS Security Masterclass
x33fcon 2023 2023-05-31 - 2023-05-31 Pomorski Park Naukowo-Technologiczny, Gdynia, Poland
Audience: Security Professionals Duration: 3 days
Co-presenters: Chandrapal Badshah

AWS is the market leader in cloud computing. It has over 200 services under all three cloud computing models: IaaS, PaaS, and SaaS (and everything in between). Each service solves a different problem and has a different attack surface. Even if successfully compromised, each service would have a different blast radius.

Attacking and defending each AWS service will differ and involves understanding the nitty-gritty of each service. However, the principles are a handful. These principles remain almost the same for other cloud providers, despite their services working slightly differently.

Based on your current role or interests, you can train in one vertical - attack or defense. While such journeys cover the security of each service, the most significant disadvantage is that you are often pushed to think the other side won’t or can’t hinder you.

In this 3-day hands-on training, you will attack and defend AWS services, giving you the experience of looking at the same environment from both viewpoints. The training will include guided walkthroughs, real-world scenarios, and coverage of tools that can be used to attack and audit AWS environments. After this training, you will learn different tactics, techniques, and procedures to attack and defend the AWS cloud from Day One.

Attack Topics Covered:

  • Shared Responsibility Model from Attacker Perspective
  • Getting into Hacker’s Mindset
  • Identifying the Attack Surface
  • Attacking CI/CD Pipeline to gain Cloud Access
  • Attacking Load Balancers and WAF
  • Attacking Containers and Kubernetes
  • Escalating Privileges Left, Right and Center
  • Leveraging the initial access of different services - S3, EC2, KMS, SNS, EBS, etc.
  • Leveraging/Analyzing IAM Policies to gain access to different access levels using passrole, assume role, and other techniques
  • Backdoor Techniques using services like S3, EC2, Lambda, etc.
  • Defense Evasion Techniques

Defend Topics Covered:

  • Real World AWS Environments
  • Defenders’ Methodology
  • Shared Responsibility Model
  • Know Thyself! - Visualizing your attack surface
  • AWS Services for Security (Compare and Contrast)
  • Building upon Secure Foundations
  • Order and it shall be followed
  • Realtime Monitoring
  • AWS Account Security
  • Compute Security
  • Data Security
  • Finding Attack Paths with Ease
  • Incident Response Scenarios