Episode 19: Understanding Cloud Attack Vectors

Episode 19 August 02, 2020 00:40:22
Episode 19: Understanding Cloud Attack Vectors
SilverLining IL
Episode 19: Understanding Cloud Attack Vectors

Aug 02 2020 | 00:40:22

/

Hosted By

Moshe Ferber Ariel Munafo

Show Notes

Attendees

Guest: Or Kamara

Guest Title:  Senior team lead 

Company:  Synk

Abstract

Cloud computing can bring interesting and new attack vectors. In this episode, we talk with Or Kamara, Senior team lead at Synk, about the Capital-one hacking and what can be learned from the event in order to better protect our networks. We will analyze the attack step by step and add mitigating controls that can help in preventing the next attack.

Timing:

0:35 Introducing our guest

4:10 introducing the story the capital one hack 

5:45 The phases of the Capital One hack

7:50 The first misconfiguration - servers exposed to the internet unintentionally

11:05 the SSRF vulnerability and understanding meta-data service

19:38 Using API keys for browsing S3 and how to mitigate it

26:00 things that Capital One did right and additional insights

28:00 how should developers and IT 

30:50 shifting from traditional security to new cloud security mindset

36:00 summary and final words

Other Episodes

Episode 32

January 05, 2021 00:31:39
Episode Cover

Episode 32: Understanding Infrastructure as Code and How to Use it Effectively

Attendees Guest: Ohad Maislish  Guest Title: Co-Founder & CEO  Company: env0 Abstract Infrastructure as code is one of the most interesting technologies in the...

Listen

Episode 26

September 16, 2020 00:49:26
Episode Cover

Episode 26: Current Challenges With Cloud

This is a special episode where both of us (Moshe & Ariel – no guests this time) discuss the future of cloud computing and...

Listen

Episode 35

February 24, 2021 00:33:05
Episode Cover

Episode 35: Compliance Automation and Zero Trust Containers

Sponsored By:   ‍‍ Attendees Guest: Malgorzata (Gosia) SteinderGuest title: CTO of Hybrid Cloud Research. IBM researchTopic: Compliance automation and zero trust containers   Abstract Continuous...

Listen