Bringing a Machete to the Amazon: Securing AWS Applications

Bringing a Machete to the Amazon: Securing AWS Applications

OWASP Foundation via YouTube Direct link

Intro

1 of 31

1 of 31

Intro

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Bringing a Machete to the Amazon: Securing AWS Applications

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Welcome
  3. 3 Agenda
  4. 4 Cloud is an Operating System
  5. 5 Infrastructure is my code
  6. 6 Typical AWS application
  7. 7 AppSec perspective
  8. 8 The challenge
  9. 9 What does AWS offer
  10. 10 Problems with AWS
  11. 11 AWS as an operating system
  12. 12 AWS attack surface
  13. 13 Merchant insecurity
  14. 14 Strict change control
  15. 15 API
  16. 16 Vulnerabilities
  17. 17 Metadata
  18. 18 AWS Metadata
  19. 19 Examples
  20. 20 Controlling API Access
  21. 21 Private IP Addresses
  22. 22 Lack of Access Control
  23. 23 Tags
  24. 24 IP Address
  25. 25 Lack of Awareness
  26. 26 Cloud Atlas
  27. 27 Cloud Out
  28. 28 Cloud Trail Data
  29. 29 Advanced Cap Capabilities
  30. 30 Other Tools
  31. 31 Questions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.