AWS Cloud Penetration Testing Explained with Example

AWS Cloud Penetration Testing Explained with Example

Cloud Security Podcast - This month we are talking about "Breaking the AWS Cloud" and next up on this series, we spoke to Seth Art (Seth's Linkedin) Cloud Penetration Testing Lead (Principal) at Bishop Fox. AWS cloud project to pentest AWS cloud architecture are not spoken about much - this stops today. We have Seth who works in the Cloud Penetration testing space to talk about open source tools and what Cloud pentesting is all about.

Episode ShowNotes, Links and Transcript on Cloud Security Podcast: www.cloudsecuritypodcast.tv

Host Twitter: Ashish Rajan (@hashishrajan)

Guest Twitter: Seth Art (Seth's Linkedin)

Podcast Twitter - @CloudSecPod @CloudSecureNews

If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:

- Cloud Security News

- Cloud Security Academy

Spotify TimeStamp for Interview Questions

(00:00) Introduction

(04:24) A bit about Seth

(06:10) Web App Pentesting vs Cloud Pentesting

(08:11) Working with scale of multiple AWS accounts

(10:20) What can you expect to find with Cloud Pentesting?

(12:14) Foundational pieces about approaching pentesting in Cloud

(15:19) How to start a Cloud Pentest?

(18:25) The importance of IAM

(23:43) Common services in AWS to look at

(25:58) Mistakes people make for scoping

(29:18) The role of shared responsibility in Cloud Pentesting

(32:38) Boundaries for AWS pentesting

(35:13) Nmap between 2 EC2 instances

(36:37) How do you explain the findings?

(40:26) Skillsets required to transition to Cloud Pentesting

(45:41) Transitioning from Kubernetes to Cloud Pentesting

(48:55) Resources for learning about Cloud Pentesting.

(49:47) The Fun Section

See you at the next episode!

Episoder(345)

The Truth About CNAPP and Kubernetes Security

The Truth About CNAPP and Kubernetes Security

In this episode of the Cloud Security Podcast, host Ashish Rajan speaks to James Berthoty, founder of Latio.Tech and an engineer-driven analyst, for a discussion on cloud security tools. In this episo...

14 Jan 202540min

Cybersecurity Isn’t Crowded: Security Engineering and the 5,000 Vendor Problem

Cybersecurity Isn’t Crowded: Security Engineering and the 5,000 Vendor Problem

In this episode our host Ashish Rajan sat down with Ross Haleliuk, author of Cybersecurity for Builders and creator of the Venture in Security blog, to explore the current state and future of the cybe...

10 Jan 20251h 10min

Centralized VPC Endpoints - Why It Works for AWS Networking

Centralized VPC Endpoints - Why It Works for AWS Networking

In this episode, Meg Ashby, a senior cloud security engineer shares how her team tackled AWS’s centralized VPC interface endpoints, a design often seen as an anti-pattern. She explains how they turned...

17 Des 202448min

What is CADR?

What is CADR?

In this episode, recorded at Kubecon NA in Salt Lake City, we spoke about about Kubernetes security with Shauli Rozen, co-founder and CEO of ARMO Security. From the challenges of runtime protection to...

5 Des 202429min

Building Platforms in Regulated Industries

Building Platforms in Regulated Industries

At HashiConf 2024 in Boston, our host Ashish Rajan had a great chat over some cannolis and a game of Jenga with AJ Oller, AVP of Engineering at The Hartford about how automation, mainframes, and compl...

21 Nov 202436min

Dynamic Permission Boundaries: A New Approach to Cloud Security

Dynamic Permission Boundaries: A New Approach to Cloud Security

In this episode, Ashish spoke with Kushagra Sharma, Staff Cloud Security Engineer, to delve into the complexities of managing Identity Access Management (IAM) at scale. Drawing on his experiences from...

12 Nov 202446min

Building a Resilient Cloud Security Program after Merger and Acquisition

Building a Resilient Cloud Security Program after Merger and Acquisition

In this episode, host Ashish Rajan sits down with Prahathess Rengasamy, a cloud security expert with extensive experience at companies like Credit Karma, Block, and Apple. Together, they explore the c...

9 Nov 202439min

Building Data Perimeter in Cloud in 2024

Building Data Perimeter in Cloud in 2024

In this episode, Ashish gets into the critical topic of data perimeters in AWS with our guest, Tyler Warren, a Lead Cloud Security Engineer at USAA. As cloud environments continue to evolve, the impor...

31 Okt 202456min

Populært innen Teknologi

lydartikler-fra-aftenposten
romkapsel
energi-og-klima
teknisk-sett
tomprat-med-gunnar-tjomlid
elektropodden
nasjonal-sikkerhetsmyndighet-nsm
fornybaren
rss-impressions-2
shifter
teknologi-og-mennesker
rss-polypod
pedagogisk-intelligens
rss-ai-forklart
smart-forklart
rss-ki-praten
i-loopen
rss-digitaliseringspadden
rss-alt-vi-kan
rss-forenklingspodden