security
4 Open Source Tools to Add to Your Security Arsenal
https://www.darkreading.com/application-security/4-open-source-tools-to-add-to-your-security-arsenal/a/d-id/1340487
Added 1 month ago
Purple Knight Active Directory Security Assessment
https://www.purple-knight.com/
Purple Knight, built by Semperis, is the top Active Directory security assessment tool today. Identify threats and get prioritized guidance.
Added 1 month ago
The worst of the two worlds: Excel meets Outlook
https://adepts.of0x.cc/vba-outlook/
Turning Outlook into a keylogger via VBA macros
Added 1 month ago
https://docs.bridgecrew.io/docs/what-is-bridgecrew
https://docs.bridgecrew.io/docs/what-is-bridgecrew
Added 1 month ago
Boundary by HashiCorp
https://www.boundaryproject.io
Explore Boundary product documentation, tutorials, and examples.
Added 1 month ago
https://github.com/supertokens/supertokens-core
https://github.com/supertokens/supertokens-core
Open source alternative to Auth0 / Firebase Auth / AWS Cognito - GitHub - supertokens/supertokens-core: Open source alternative to Auth0 / Firebase Auth / AWS Cognito
Added 1 month ago
How to build a CI/CD pipeline for container vulnerability scanning with Tri
https://aws.amazon.com/blogs/security/how-to-build-ci-cd-pipeline-container-vulnerability-scanning-trivy-and-aws-security-hub/
In this post, I’ll show you how to build a continuous integration and continuous delivery (CI/CD) pipeline using AWS Developer Tools, as well as Aqua Security‘s open source container vulnerability scanner, Trivy. You’ll build two Docker images, one with vulnerabilities and one without, to learn the capabilities of Trivy and how to send all vulnerability […]
Added 1 month ago
https://aws.amazon.com/blogs/security/how-to-verify-aws-kms-asymmetric-key-signatures-locally-with-openssl/?sc_channel=sm&sc_campaign=AWSSecurity_Services&sc_publisher=TWITTER&sc_country=Security&sc_geo=GLOBAL&sc_outcome=adoption&trk=AWSSecurity_Services_TWITTER&linkId=86699220
https://aws.amazon.com/blogs/security/how-to-verify-aws-kms-asymmetric-key-signatures-locally-with-openssl/?sc_channel=sm&sc_campaign=AWSSecurity_Services&sc_publisher=TWITTER&sc_country=Security&sc_geo=GLOBAL&sc_outcome=adoption&trk=AWSSecurity_Services_TWITTER&linkId=86699220
August 31, 2021: AWS KMS is replacing the term customer master key (CMK) with AWS KMS key and KMS key. The concept has not changed. To prevent breaking changes, AWS KMS is keeping some variations of this term. More info. In this post, I demonstrate a sample workflow for generating a digital signature within AWS […]
Added 1 month ago
https://aws.amazon.com/blogs/security/how-to-use-kms-and-iam-to-enable-independent-security-controls-for-encrypted-data-in-s3/?sc_channel=sm&sc_campaign=AWSSecurity_Services&sc_publisher=TWITTER&sc_country=Security&sc_outcome=adoption&trk=AWSSecurity_Services_TWITTER&linkId=82078481
https://aws.amazon.com/blogs/security/how-to-use-kms-and-iam-to-enable-independent-security-controls-for-encrypted-data-in-s3/?sc_channel=sm&sc_campaign=AWSSecurity_Services&sc_publisher=TWITTER&sc_country=Security&sc_outcome=adoption&trk=AWSSecurity_Services_TWITTER&linkId=82078481
August 31, 2021:AWS KMS is replacing the term customer master key (CMK) with AWS KMS key and KMS key. The concept has not changed. To prevent breaking changes, AWS KMS is keeping some variations of this term. More info. Typically, when you protect data in Amazon Simple Storage Service (Amazon S3), you use a combination […]
Added 1 month ago
checkov
https://www.checkov.io/
Prevent cloud misconfigurations and find vulnerabilities during build-time in infrastructure as code, container images and open source packages with Checkov by Bridgecrew.
Authelia is an open-source authentication/authorization server with 2FA/SSO
https://github.com/authelia/authelia
The Single Sign-On Multi-Factor portal for web apps, now OpenID Certified™ - authelia/authelia
Added 1 month ago
Introducing Nebula - the open source global overlay network from Slack
https://slack.engineering/introducing-nebula-the-open-source-global-overlay-network-from-slack-884110a5579
“What is the easiest way to securely connect tens of thousands of computers, hosted at multiple cloud service providers in dozens of locations around the globe?” If you want our answer, it’s Nebula, but I recommend that you read the rest of this short post before clicking that shiny link. At Slack, we asked ourselves this…
Added 1 month ago
https://developer.okta.com/blog/2019/10/21/illustrated-guide-to-oauth-and-oidc
https://developer.okta.com/blog/2019/10/21/illustrated-guide-to-oauth-and-oidc
An illustrated guide to explain OAuth and OpenID Connect!
Added 1 month ago
https://cloud.vmware.com/vmware-essential-pks/resources#documents-papers
https://cloud.vmware.com/vmware-essential-pks/resources#documents-papers
Added 1 month ago
https://duo.com/labs/research/how-to-monitor-github-for-secrets
https://duo.com/labs/research/how-to-monitor-github-for-secrets
Learn about the problem of sensitive info getting published on version control systems and discover multiple ways to monitor GitHub for secrets.
Added 1 month ago
HTTP Security Headers – A Complete Guide
https://nullsweep.com/http-security-headers-a-complete-guide/
A description of each security header, why it is important, and how to configure your website in a secure way.
Added 1 month ago
https://aws.amazon.com/blogs/aws/new-vpc-traffic-mirroring/?sc_channel=sm&sc_campaign=launch_&sc_publisher=TWITTER&sc_country=Global&sc_geo=GLOBAL&sc_outcome=awareness&trk=Launches_06-25-2019_VPCTrafficMonitoring_TWITTER&sc_content=Launches_06-25-2019_VPCTrafficMonitoring&linkId=69508334
https://aws.amazon.com/blogs/aws/new-vpc-traffic-mirroring/?sc_channel=sm&sc_campaign=launch_&sc_publisher=TWITTER&sc_country=Global&sc_geo=GLOBAL&sc_outcome=awareness&trk=Launches_06-25-2019_VPCTrafficMonitoring_TWITTER&sc_content=Launches_06-25-2019_VPCTrafficMonitoring&linkId=69508334
Running a complex network is not an easy job. In addition to simply keeping it up and running, you need to keep an ever-watchful eye out for unusual traffic patterns or content that could signify a network intrusion, a compromised instance, or some other anomaly. VPC Traffic Mirroring Today we are launching VPC Traffic Mirroring. […]
Added 1 month ago
https://aws.amazon.com/about-aws/whats-new/2019/06/aws-security-hub-now-generally-available/?sc_channel=sm&sc_campaign=launch_&sc_publisher=TWITTER&sc_country=Global&sc_geo=GLOBAL&sc_outcome=awareness&trk=Launches_06-25-2019_SecurityHub_TWITTER&sc_content=Launches_06-25-2019_SecurityHub&linkId=69505869
https://aws.amazon.com/about-aws/whats-new/2019/06/aws-security-hub-now-generally-available/?sc_channel=sm&sc_campaign=launch_&sc_publisher=TWITTER&sc_country=Global&sc_geo=GLOBAL&sc_outcome=awareness&trk=Launches_06-25-2019_SecurityHub_TWITTER&sc_content=Launches_06-25-2019_SecurityHub&linkId=69505869
Added 1 month ago
https://aws.amazon.com/blogs/security/introducing-the-aws-security-incident-response-whitepaper/?sc_channel=sm&sc_campaign=AWSSecurity_Blog&sc_publisher=TWITTER&sc_country=Security+%26+Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=security_blog_incident_response_whitepaper_TWITTER&sc_content=security_blog_incident_response_whitepaper&linkId=69462957
https://aws.amazon.com/blogs/security/introducing-the-aws-security-incident-response-whitepaper/?sc_channel=sm&sc_campaign=AWSSecurity_Blog&sc_publisher=TWITTER&sc_country=Security+%26+Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=security_blog_incident_response_whitepaper_TWITTER&sc_content=security_blog_incident_response_whitepaper&linkId=69462957
April 25, 2023: We’ve updated this blog post to include more security learning resources. AWS recently released the AWS Security Incident Response whitepaper, to help you understand the fundamentals of responding to security incidents within your cloud environment. The whitepaper reviews how to prepare your organization for detecting and responding to security incidents, explores the […]
Added 1 month ago
https://aws.amazon.com/blogs/security/create-fine-grained-session-permissions-using-iam-managed-policies/?sc_channel=sm&sc_campaign=AWSSecurity_Blog&sc_publisher=TWITTER&sc_country=Security+%26+Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=security_blog_fine_grained_IAM_TWITTER&sc_content=security_blog_fine_grained_IAM&linkId=67337463
https://aws.amazon.com/blogs/security/create-fine-grained-session-permissions-using-iam-managed-policies/?sc_channel=sm&sc_campaign=AWSSecurity_Blog&sc_publisher=TWITTER&sc_country=Security+%26+Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=security_blog_fine_grained_IAM_TWITTER&sc_content=security_blog_fine_grained_IAM&linkId=67337463
As a security best practice, AWS Identity and Access Management (IAM) recommends that you use temporary security credentials from AWS Security Token Service (STS) when you access your AWS resources. Temporary credentials are short-term credentials generated dynamically and provided to the user upon request. Today, one of the most widely used mechanisms for requesting temporary […]
Added 1 month ago
https://twitter.com/AWSSecurityInfo/status/1111371889333551104?s=19
https://twitter.com/AWSSecurityInfo/status/1111371889333551104?s=19
Added 1 month ago