Episode 19: Understanding Cloud Attack Vectors

Episode 19 August 02, 2020 00:40:22
Episode 19: Understanding Cloud Attack Vectors
SilverLining IL
Episode 19: Understanding Cloud Attack Vectors

Aug 02 2020 | 00:40:22

/

Hosted By

Moshe Ferber Ariel Munafo

Show Notes

Attendees

Guest: Or Kamara

Guest Title:  Senior team lead 

Company:  Synk

Abstract

Cloud computing can bring interesting and new attack vectors. In this episode, we talk with Or Kamara, Senior team lead at Synk, about the Capital-one hacking and what can be learned from the event in order to better protect our networks. We will analyze the attack step by step and add mitigating controls that can help in preventing the next attack.

Timing:

0:35 Introducing our guest

4:10 introducing the story the capital one hack 

5:45 The phases of the Capital One hack

7:50 The first misconfiguration - servers exposed to the internet unintentionally

11:05 the SSRF vulnerability and understanding meta-data service

19:38 Using API keys for browsing S3 and how to mitigate it

26:00 things that Capital One did right and additional insights

28:00 how should developers and IT 

30:50 shifting from traditional security to new cloud security mindset

36:00 summary and final words

Other Episodes

Episode 4

July 09, 2019 00:39:27
Episode Cover

Episode 4: Kubernetes On Steroids

Attendees Guest: Demi Ben Ari Guest title: CTO Company: Panorays Abstract K8 is rapidly becoming the leading orchestration tool and infrastructure for many companies...

Listen

Episode 6

August 12, 2019 00:33:45
Episode Cover

Episode 6: The Cloud Octagon Model Framework for Cloud Adoption

Attendees Guest: Olaf Streutker Guest title: CISO Advisor Company: ABN Amro Abstract The Cloud Octagon Model is a new framework for cloud adoption (mostly...

Listen

Episode 31

December 23, 2020 00:32:14
Episode Cover

Episode 31: Understanding Cloud Native Security Basics

Attendees Guest: Benjy Portnoy Guest Title: Sr. Director, Solution Architects Company: Aqua Security Abstract A cloud-native security strategy entails protecting the infrastructure, build, and...

Listen