14 links
tagged with all of: azure + security
Click any tag below to further narrow down your results
Links
The Cloud Privilege Escalation Awesome Script Suite provides tools for enumerating permissions across major cloud platforms like Azure, GCP, and AWS, helping users identify potential privilege escalation pathways and sensitive information access. It includes specific modules such as AzurePEAS for Azure environments and GCPPEAS for Google Cloud, utilizing advanced techniques for thorough permission analysis without altering any resources. Users can run these tools with various authentication methods and options for enhanced enumeration.
Learn how to automate the generation and management of secrets, such as passwords, using Terraform and Azure Key Vault. The article covers creating a secure password, setting expiry dates, and implementing best practices for handling sensitive data in cloud infrastructure.
Monkey365 is an open-source PowerShell module designed to facilitate security configuration reviews for Microsoft 365, Azure subscriptions, and Microsoft Entra ID. It helps identify security gaps and misconfigurations while providing recommendations based on industry best practices and compliance standards. The tool supports over 160 checks and generates reports aligned with the CIS benchmarks for enhanced security assessment.
Microsoft has announced significant upgrades to its Azure security protocols, including the purging of dormant tenants and the rotation of keys to prevent future breaches, particularly following a nation-state hack. The company claims to have made substantial progress on its Secure Future Initiative, focusing on enhanced authentication and defenses against potential attack vectors.
Microsoft is implementing mandatory multifactor authentication (MFA) for Azure resource management operations starting October 1, 2025, as part of its ongoing efforts to enhance security against cyber threats. Phase 2 enforcement will require users to authenticate with MFA before managing resources, while workload identities will remain unaffected. Customers are encouraged to enable MFA for their users and prepare for the enforcement to ensure seamless access to Azure services.
The article discusses the implications of a leak involving Azure Active Directory client secrets, highlighting the potential security risks and the importance of securing cloud applications. It emphasizes best practices for managing client secrets to prevent unauthorized access and data breaches in cloud environments.
Azure AppHunter is an open-source PowerShell tool designed for security professionals to analyze and identify excessive or risky permissions assigned to Azure Service Principals. It enables users to enumerate dangerous Microsoft Graph permissions, detect privileged role assignments, and uncover potential escalation paths in Azure environments with minimal dependencies. The tool supports integration into automation and red teaming workflows, making it valuable for cloud security assessments.
ATEAM is a Python tool designed for reconnaissance of Azure services, enabling security researchers and Azure administrators to discover resources and tenant ownership information. It supports multi-threaded scanning, DNS validation, and exports results in various formats while utilizing an SQLite database for persistent storage of findings.
KubeForenSys is a Python tool designed to collect data from Kubernetes clusters, particularly Azure Kubernetes Service, and send it to Azure Log Analytics for post-compromise analysis. It gathers various data types such as pod logs, Kubernetes events, command histories, and suspicious pod detections, while also automating the provisioning of necessary Azure resources. Users can customize the data collection parameters and ensure proper access and configurations for effective operation.
BlackCat is a PowerShell module aimed at validating the security of Microsoft Azure environments by identifying potential security risks and ensuring compliance with best practices. It requires PowerShell 7.0 or higher and the Az.Accounts module, and is set to be published on the PowerShell Gallery after completion. Users can also contribute to the project by providing feedback or making code contributions through GitHub.
Explore the integration of Azure Multi-Factor Authentication (MFA) with Duo's Entra ID and its external authentication methods. This webinar provides insights into enhancing security protocols and compliance for organizations using these technologies.
The article discusses best practices for securing Terraform state files stored in Azure Blob Storage, emphasizing the importance of encryption, access control, and proper configuration to protect sensitive infrastructure data. It provides practical guidance on implementing these security measures effectively to mitigate risks associated with cloud infrastructure management.
The article discusses the process of deploying and managing Azure Virtual Machines, focusing on advanced networking and security features. It provides insights on best practices for configuration and management to enhance the performance and security of virtual environments in Azure.
Cloud logging best practices are essential for organizations migrating to cloud environments, helping them meet security, regulatory, and business needs. By understanding the differences between data and control plane logging across major cloud service providers, organizations can develop a customized logging framework that optimizes visibility and compliance. Collaboration with legal and compliance teams is crucial for navigating regulatory requirements and ensuring effective logging strategies.