lingo.lol is one of the many independent Mastodon servers you can use to participate in the fediverse.
A place for linguists, philologists, and other lovers of languages.

Server stats:

70
active users

#aws

8 posts7 participants1 post today

Mit der Rückkehr von Donald #Trump ins Weiße Haus wird die Abhängigkeit von #US-#Cloud-Diensten zu einem wachsenden Problem.
Denn der
#CloudAct zwingt US-amerikanische Firmen Anweisungen von US-Behörden Folge zu leisten, ganz gleich wo deren #Server stehen.

Nicht nur Staaten und Unternehmen, sondern auch Privatpersonen sind betroffen.

Angefangen bei #Datenspeichern über #Online-#Office-Anwendungen bis zu grundlegenden Internetdiensten wie #DNS oder Zertifizierungsstellen.

Es betrifft selbst smarte Geräte wie #WLAN-Steckdosen, wenn deren zentralen Dienste auf einem #Hyperscaler wie #Amazon #AWS oder #Microsoft #Azure liegen.

Doch es gibt Möglichkeiten, den #Datenabfluss zu minimieren und #Alternativen zu nutzen.


Welche das sind, erläutert c’t Redakteur Peter Siering. Die Optionen reichen von #Suchmaschinen über europäische Cloud-Speicher und Open-Source-Projekte bis zu dezentralen, sichereren #Messengern.

youtube.com/watch?v=5i2eLjLKl2

@switchingsoftware

@bfdi !!
@bsi !!

Yes, I know that Amazon/AWS are not popular here. Yes, it is annoying that we have a 5-day RTO expectation. Yes it is annoying that we are only hiring in a handful of cities (NYC, Seattle, DC).

Having said all that, if you'd like to come work with me and my colleagues securing customers who use #AWS, this job is on my team (I'm not a people manager, so I'm not the hiring manager). It's kinda cool #security stuff at global scale. It's at the intersection of building/deploying systems in the cloud, but with policy/governance and security telemetry in mind. If anyone wants me to refer them in I can.

A good candidate will have 2-5 years experience in security, demonstrated ability to write some python, JavaScript, or other modern language to get stuff done. It's not an SDE role, so there won't be a live-coding exercise, but you need to have a track record of at least sysadmin-level scripting/coding. Willing to learn isn't good enough. Experience in AWS is always good. AWS certifications (especially the security certification) are very desirable. This is not risk management/GRC. It's security.

My particular team is really good at DEI. Yes, I'm an old white man, but I'm very much in the minority on both my immediate team (10% white men) and the wider VP-level team. My immediate team is about 50/50 men/women, 2/3 people of colour, with one openly gay person at a very senior level. We're very serious about supporting people and treating people with respect. There are pockets of goodness, even in the belly of the beast.

amazon.jobs/en/jobs/2925499/se

amazon.jobsSecurity Engineer , Global Services SecurityGlobal Services Security is looking for an Security Engineer to help validate that our services, applications, and websites are designed and implemented to the highest security standards. You will build and automate security assessments into scalable tools to enable and inspect collaboration across AWS including Amazon partners. A Security Engineer at AWS is expected to be strong in multiple domains and provide significant contributions to the teams within AWS Global Services Security and multiple groups throughout Amazon. Security engineers are expected to develop elegant solutions to complex business problems and apply appropriate technologies while following security engineering best practices. You are also expected to mentor more junior engineers and be a security thought leader for the organization.A Security Engineer must foster constructive dialogue and seek resolution when confronted with discordant views. Engineers in this role are expected to participate fully in the planning of the security team's work and constantly seek opportunities for process improvement. They should also have a deep understanding of at least one specialty for which they are a sought out resource (both within AWS and Partner Security, and by groups throughout Amazon), while having an understanding of the application of Information Security in a broad range of technical areas.You will have the combination of troubleshooting, technical, and communication skills, as well as the ability to handle a mix of disparate tasks which may include project and software development work. This role will provide career growth opportunities as you gain new security skills in the course of your duties.Key job responsibilities• Security tool automation and development• Building security frameworks• Security posture reviews• Application security reviews• Secure architecture design• Threat modeling• Projects and research work as needed• Security training and outreach to internal development teams• Security guidance documentation• Security metrics delivery and improvements• Assistance with recruiting activities and administrative workA day in the lifeAs a Security Engineer, you will build or enhance existing automation to improve operational efficiency or generate new insights from existing data. You will identify, evaluate, and prioritize opportunities for automating Partner Security mechanisms across a diverse landscape of business tools, systems, and architectures. You will meet with other teams across the Global Services organization to collaborate on security mechanisms, like partner onboarding and offboarding workflows, to improve consistency and compliance throughout the organization. You will contribute to security training programs, best practices documentation, and security policies tailored for internal teams engaging with subcontracted partners. You will implement scalable processes and tooling solutions to facilitate regular audits of partner security controls and compliance standards. Additionally, you will provide technical expertise and support for ongoing security assessments of Partners and subcontractors within the SMGS business units, ensuring adherence to AWS security standards.About the teamThe Global Services Security team, a part of Amazon Web Services (AWS), leverages the expertise and ingenuity of our builders to establish scalable security solutions for both internal and external customers that drive business outcomes. Our goal of securing the world’s workloads and building a brighter future for humanity requires us to focus on reliable delivery of bar raising security outcomes and investment in security mechanisms and automation on behalf of our customers.Diverse ExperiencesAWS values diverse experiences. Even if you do not meet all of the preferred qualifications and skills listed in the job description, we encourage candidates to apply. If your career is just starting, hasn’t followed a traditional path, or includes alternative experiences, don’t let it stop you from applying. Why AWS?Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud platform. We pioneered cloud computing and never stopped innovating — that’s why customers from the most successful startups to Global 500 companies trust our robust suite of products and services to power their businesses.Inclusive Team CultureHere at AWS, it’s in our nature to learn and be curious. Our employee-led affinity groups foster a culture of inclusion that empower us to be proud of our differences. Ongoing events and learning experiences, including our Conversations on Race and Ethnicity (CORE) and AmazeCon (gender diversity) conferences, inspire us to never stop embracing our uniqueness.Mentorship & Career GrowthWe’re continuously raising our performance bar as we strive to become Earth’s Best Employer. That’s why you’ll find endless knowledge-sharing, mentorship and other career-advancing resources here to help you develop into a better-rounded professional. Work/Life BalanceWe value work-life harmony. Achieving success at work should never come at the expense of sacrifices at home, which is why we strive for flexibility as part of our working culture. When we feel supported in the workplace and at home, there’s nothing we can’t achieve in the cloud.
Replied in thread

Personally, I'm thrilled to get back to work supporting these builders and their critical projects. Our doors are always open if you need #AWS support, or if you have ideas about how we can do more.

Until next time — build on, friends! and be excellent to each other 👋

Some of my colleagues at #AWS have created an open-source serverless #AI assisted #threatmodel solution. You upload architecture diagrams to it, and it uses Claude Sonnet via Amazon Bedrock to analyze it.

I'm not too impressed with the threats it comes up with. But I am very impressed with the amount of typing it saves. Given nothing more than a picture and about 2 minutes of computation, it spits out a very good list of what is depicted in the diagram and the flows between them. To the extent that the diagram is accurate/well-labeled, this solution seems to do a very good job writing out what is depicted.

I deployed this "Threat Designer" app. Then I took the architecture image from this blog post and dropped that picture into it. The image analysis produced some of the list of things you see attached.

This is a specialized, context-aware kind of OCR. I was impressed at boundaries, flows, and assets pulled from a graphic. Could save a lot of typing time. I was not impressed with the threats it identifies. Having said that, it did identify a handful of things I hadn't thought of before, like EventBridge event injection. But the majority of the threats are low value.

I suspect this app is not cheap to run. So caveat deployor.
#cloud #cloudsecurity #appsec #threatmodeling

howdy, #hachyderm!

over the last week or so, we've been preparing to move hachy's #DNS zones from #AWS route 53 to bunny DNS.

since this could be a pretty scary thing -- going from one geo-DNS provider to another -- we want to make sure *before* we move that records are resolving in a reasonable way across the globe.

to help us to do this, we've started a small, lightweight tool that we can deploy to a provider like bunny's magic containers to quickly get DNS resolution info from multiple geographic regions quickly. we then write this data to a backend S3 bucket, at which point we can use a tool like #duckdb to analyze the results and find records we need to tweak to improve performance. all *before* we make the change.

then, after we've flipped the switch and while DNS is propagating -- :blobfoxscared: -- we can watch in real-time as different servers begin flipping over to the new provider.

we named the tool hachyboop and it's available publicly --> github.com/hachyderm/hachyboop

please keep in mind that it's early in the booper's life, and there's a lot we can do, including cleaning up my hacky code. :blobfoxlaughsweat:

attached is an example of a quick run across 17 regions for a few minutes. the data is spread across multiple files but duckdb makes it quite easy for us to query everything like it's one table.

If anybody out there is working on using #LLMs or #AI to analyze #security events in AWS, I wonder if you're considering bullshit attacks via event injection. Let me explain. I'm openly musing about something I don't know much about.

You might be tempted to pipe a lot of EventBridge events into some kind of AI that analyzes them looking for suspicious events. Or you might hook up to CloudWatch log streams and read log entries from, say, your lambda functions looking for suspicious errors and output.

LLMs are going to be terrible at validating message authenticity. If you have a lambda that is doing something totally innocuous, but you make it print() some JSON that looks just like a GuardDuty finding, that JSON will end up in the lambda function's CloudWatch log stream. Then if you're piping CloudWatch Logs into an LLM, I don't think it will be smart enough to say "wait a minute, why is JSON that looks like a GuardDuty finding being emitted by this lambda function on its stdout?"

You and I would say "that's really weird. That JSON shouldn't be here in this log stream. Let's go look at what that lambda function is doing and why it's doing that." (Oh, it's Paco and he's just fucking with me) I think an LLM is far more likey to react "Holy shit! there's a really terrible GuardDuty finding! Light up the pagers! Red Alert!"

Having said this, I'm not doing this myself. I don't have any of my #AWS logging streaming into any kind of #AI. So maybe it's better than I think it is. But LLMs are notoriously bad at ignoring anything in their input stream. They tend to take it all at face value and treat it all as legit.

You might even try this with your #SIEM . Is it smart enough to ignore things that show up in the wrong context? Could you emit the JSON of an AWS security event in, say, a Windows Server Event Log that goes to your SIEM? Would it react as if that was a legit event? If you don't even use AWS, wouldn't it be funny if your SIEM responds to this JSON as if it was a big deal?

I'm just pondering this, and I'll credit the source: I'm evaluating an internal bedrock-based threat modelling tool and it spit out the phrase "EventBridge Event Injection." I thought "oh shit that's a whole class of issues I haven't thought about."

Funny way to evade a lot of #AWS #SAST checkers that try to check your terraform or CDK or CloudFormation. They often look for open security groups (i.e., 0.0.0.0/0). Sadly, most of these tools are looking for THAT string. They don't evaluate it as a CIDR. You might really want a rule that says "anything bigger than /16 is suspicious". But that's not how they work.

So a couple rules like 0.0.0.0/1 and 128.0.0.0/1 will pretty much get you the whole Internet, but probably slip right past most of the "open-to-the-internet" checkers. Likewise they will catch ::/0 but will not catch ::/1 or 1000::/1.

One thing I did notice is that security groups normalize their CIDR ranges. So you could get a string like 8.8.8.8/0 through a static code analyzer (because it's not the string 0.0.0.0/0) but EC2 will normalize that to 0.0.0.0/0 when it stores it. So if you do a dynamic check by asking for the security group's ingress rules, it will report back 0.0.0.0/0 even though you had sent 8.8.8.8/0 originally.

I can't wait to see how AI will handle this.

Replied in thread

@thevril @pluralistic @kino

#SurveillanceState

👉Which #Messenger To Replace the #DataKraken #WhatsApp with? 👈

#FightTechnofeudalism

(7/n)

... 👉our international discussion: 👈

pleroma.iselfhost.com/objects/

In conclusion, as all services using #US servers like signal have been compromised since the #CloudAct went into force,

"Since #Signal's entire traffic runs over the clouds of #Amazon [#AWS,] #Google, #Microsoft & #Cloudflare.

👉All US services...