nutbear | 2 years ago | on: Launch HN: Slauth (YC S22) – auto-generate secure IAM policies for AWS and GCP
nutbear's comments
nutbear | 2 years ago | on: Launch HN: Slauth (YC S22) – auto-generate secure IAM policies for AWS and GCP
There's a couple different models for IAM ownership. At some places, the application teams own IAM along with the application. Sometimes, it's owned by central teams (such as security).
And agreed, with companies growing and changing, ownership changes as well.
Those factors can all complicated IAM development and policy maintenance as it becomes more difficult to find the right fit for IAM to application. For that, it would require someone who knows exactly what the application needs access to and the IAM actions taken as well as how to configure IAM.
nutbear | 2 years ago | on: Launch HN: Slauth (YC S22) – auto-generate secure IAM policies for AWS and GCP
Datadog recently did a State of Cloud Security and one of their findings in https://www.datadoghq.com/state-of-cloud-security/ is that a substantial portion of cloud workloads are excessively privileged (with more data points there).
nutbear | 2 years ago | on: AWS S3 beginning to apply 2 security best practices all new buckets by default
nutbear | 3 years ago | on: S3 will automatically block public access and disable ACL for new buckets
nutbear | 3 years ago | on: Nike.com allows easy account take over
A decent amount of disclosure programs explicitly call out social engineering as unacceptable conduct and submissions.
However, social engineering is a very valid method for attackers and in many cases, offers the path of least resistance.
While I understand why companies don’t want good faith security research to call and try to trick the human factor, this is still a very real attack vector that needs attention and to be fixed as in what you’ve described.
I'd also be curious for future plans with resource policies as that's another layer of complexity to manage - where the resource policy would manage access to potentially many applications -> 1 resource. Vs 1 application -> many resources which I think is the use case Slauth is solving for initially.
Confused Deputy would be interesting, could be done via Condition Keys such as SourceArn and SourceAccount, but gets complex for cross-account use cases.