Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-aws-security
Curated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are related to AWS Security
https://github.com/jassics/awesome-aws-security
Last synced: about 7 hours ago
JSON representation
-
AWS Security Bulletin Important Issues
- How a Security Researcher found 1000s of open databases on AWS
- Container Networking Security Issue ([CVE-2020-8558
- Minimum Version of TLS 1.2 Required for FIPS Endpoints by March 31, 2021
- Unencrypted md5 plaintext hash in metadata in AWS S3 Crypto SDK for golang
- CBC padding oracle issue in AWS S3 Crypto SDK for golang - 2020-8911](https://nvd.nist.gov/vuln/detail/CVE-2020-8911)
- In-band key negotiation issue in AWS S3 Crypto SDK for golang - 2020-8912](https://nvd.nist.gov/vuln/detail/CVE-2020-8912)
- CVE-2018-15869 - -owners flag when describing images via AWS CLI, and therefore not properly validating source software per AWS recommended security best practices, may unintentionally load an undesired and potentially malicious Amazon Machine Image (AMI) from the uncurated public community AMI catalog.
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
- How a Security Researcher found 1000s of open databases on AWS
-
Tools of Trade
- truffleHog - Searches through git repositories for high entropy strings and secrets, digging deep into commit history
- gitleaks - Audit git repos for secrets
- AWS Security Benchmark - Open source demos, concept and guidance related to the AWS CIS Foundation framework.
- S3 Inspector - Tool to check AWS S3 bucket permissions
- Prowler - AWS Security Best Practices Assessment, Auditing, Hardening and Forensics Readiness Tool.
- AWS Pentesting/Red Team Methodology - by hacktricks - A Collection for AWS environment penetration testing methodology.
- AWS Pentesting/Red Team Methodology - by hackingthe.cloud - A collection of attacks/tactics/techniques that can use by offensive security professionals during cloud exploitation.
- AWS Security Products - Official - Few Important tools that you should consider are:
- conformance packs on github
- Arsenal of AWS Security Tools - Collection of all security category tools and products
- AWS Security Automation - Collection of scripts and resources for DevSecOps and Automated Incident Response Security
- ScoutSuite - Multi-Cloud Security Auditing Tool
- AWS Vault - A vault for securely storing and accessing AWS credentials in development environments
- AWS PWN - A collection of AWS penetration testing junk
- Pacu - AWS Penetration Testing Toolkits
- Zeus - AWS Auditing and Hardening tool
- Cloud Mapper - Analyze your AWS environments (Python)
- ConsoleMe - A Central Control Plane for AWS Permissions and Access
- AWS Firewall Factory - Deploy, update, and stage your WAFs while managing them centrally via FMS.
- CloudFox - Automating situational awareness for cloud penetration tests
- aws-lint-iam-policies - Tool to find problems in identity-based and resource-based IAM policies
- AWS Pentesting/Red Team Methodology - by hacktricks - A Collection for AWS environment penetration testing methodology.
- S3 Inspector - Tool to check AWS S3 bucket permissions
-
Security Practices and CTFs
- AWS Well Architected Security Labs
- Flaws to learn common mistakes in AWS through challenge
- Flaws2 focuses on AWS security concepts through various challenge levels
- OWASP WrongSecrets - OWASP WrongSecrets is a vulnerable app which shows you how to not store secrets. It covers code, Docker, Kubernetes, and AWS cloud bad practices.
- AWS S3 CTF Challenges with solutions
- AWS CTF with practical scenario
- AWS Workshop official - This is not exactly security part, but would be helpful to understand AWS with this workshop examples.
- AWS Security Workshops
- AWS Cloud Quest: Security Role
- AWS Jam Journey: Security
- TryHackMe: Attacking and Defending AWS
- Free AWS Security Labs
- Black Sky Cloud Labs from HTB
- CloudFoxable - Create your own vulnerable by design AWS penetration testing playground
- CloudGoat By Rhino Security Labs - Vulnerable by Design AWS infrastructure setup tool
- OWASP ServerlessGoat - OWASP ServerlessGoat is a deliberately insecure realistic AWS Lambda serverless application maintained by OWASP for educational purposes.
- ThreatModel for Amazon S3 - Library of all the attack scenarios on Amazon S3 and how to mitigate them, following a risk-based approach
-
AWS Security Breaches
- AWS Security breaches - 2017
- 200 million voters data leak - A lesson in AWS Security
- Imperva blames data breach on Stolen AWS API keys
- Tesla's Amazon cloud account was hacked and used to mine cryptocurrency
- 10 worst Amazon S3 breaches
- Lion Air the Latest to Get Tripped Up by Misconfigured AWS S3
- Capital One Cloud data breach due to S3 misconfiguration
- Utah COVID-19 testing service exposes 50,000 patients’ photo IDs, personal info on the web
- US municipalities suffer data breach due to misconfigured Amazon S3 buckets
- 10 worst Amazon S3 breaches
- US municipalities suffer data breach due to misconfigured Amazon S3 buckets
- Online Fashion App 21 buttons Exposes Financial Records of Top European Influencers
-
AWS Security Podcast/Newsletter
- Cloud Security Podcast - YouTube - Weekly Interviews with Cloud Security Professionals on AWS, Azure, GCP Security for Blue Teams & Red Teams
- Cloud Security Newsletter - Weekly Cloud Security Nuggets in your inbox
-
AWS Whitepapers
- here
- here
- AWS Overview - One of the important whitepaper to understand an overview of AWS
- Introduction to AWS Security Whitepaper
- AWS Well-Architected Security Pillar
- Introduction to Security By Design
- AWS Well Architected Framework
- AWS Risk And Compliance Whitepaper
- AWS Security Checklist
- AWS HIPAA Compliance Whitepaper
- AWS Auditing Security Checklist
- AWS Cloud Adoption Framework
- AWS CIS Foundation benchmark
- AWS Security Incident Response
- Overview of AWS Lambda Security
- AWS KMS Best Practices
- Encrypting File Data with Amazon Elastic File System
- Security of AWS CloudHSM backups
- Security overview of AWS Lambda
- NIST Cybersecurity Framework in the AWS cloud
- NIST 800-144 Security and Privacy in Public Cloud Computing
- Security at the Edge: Core Principles
- AWS KMS Best Practices
- Security Overview of AWS Fargate
-
Books
- Hands-On AWS Penetration Testing with Kali Linux by PackT
- Mastering AWS Security by PackT
- Cloud Security Automation
- Security Best Practices on AWS by PackT
- AWS Automation Cookbook
- AWS Lambda Security Best Practices - pdf - It's published by Puresec and it has a good overview on AWS Lambda Security Best Practices which we should follow
- AWS Security by Manning - Very nice book in Progress, yet to release.
- Securing DevOps - A book which has real-world examples for Cloud Security. Must read book for any Cloud Security Professionals.
- Serverless Security - An Apress book that discusses serverless security on AWS, Azure and Google Cloud.
- AWS Security Cookbook
- Practical Guide to Security in the AWS Cloud by SANS and sponsored by AWS Marketplace - pdf
- Effective IAM for AWS
- CSA Guide to Cloud Computing by Sungress
- Practical Cloud Security by O'reilly
- Hands-On AWS Penetration Testing with Kali Linux by PackT
- Security Best Practices on AWS by PackT
-
Videos
- The fundamentals of AWS Security - Youtube
- AWS Security by Design - Youtube
- Account Security with IAM - Youtube
- AWS Cloud Security Playlist - Youtube
- A cloud security architecture workshop by RSA - Youtube
- AWS Cloud Security - Oreilly
- Introduction to AWS Security Hub - Youtube
- Solution for flaws.cloud AWS Security Challenge - Youtube Playlist
- Hands-On With AWS Security Best Practices
- AWS re:Invent 2020: Security at scale: How Goldman Sachs manages network and access control
- AWS Cloud Security Playlist - Youtube
- Solution for flaws.cloud AWS Security Challenge - Youtube Playlist
- AWS Security Best Practice: Well-Architected way - Youtube
-
Online Tutorials/Blogs/Presentations
- A deep dive into AWS S3 access control - It will give a very good grip on how S3 buckets can be exploited. Lengthy but worth to go through.
- How Federico hacked a whole EC2 network during a penetration test
- A short blog on hacking AWS - Examples are based on cloudgoat.
- S3 security is flawed by design - This article will show you why you need to be extra careful when using AWS S3.
- 51 Tips for Security AWS(pdf) - McAfee
- AWS in Plain English
- Why the CIA trusts AWS
- Fundamentals of AWS Security - Presentation from AWS
- AWS Security primer - Nice overview and quick run through AWS Security resources.
- How a whitehat hacker earned $1500 in 15 minutes due to AWS S3 misconfiguration - It was fun going through the blog. You can learn from this article too.
- The role of API gateways in API security
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Hacking Serverless Runtimes - Blackhat2017
- Detailed blog on ConsoleMe: A Central Control Plane for AWS Permissions and Access by Netflix
- Strengthen the security of sensitive data stored in Amazon S3 by using additional AWS services
- Use IMDSv2 instead: Defense in depth
- Managing permissions with grants in AWS Key Management Service
- AWS IAM Exploitation
- S3 Pentest by Rhino Security Labs
- How an Attacker Could Use Instance Metadata to Breach Your App in AWS
- Orca Security Research Team Discovers AWS CloudFormation Vulnerability
- Orca Security Research Team Discovers AWS Glue Vulnerability
- CVE-2022-25165: Privilege Escalation to SYSTEM in AWS VPN Client
- Downloading and Exploring AWS EBS Snapshots
- Weaponizing AWS ECS Task Definitions to Steal Credentials From Running Containers
- One more on IAM Privilege Escalation
- AWS Penetration Testing: Step by step guide
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Detailed blog on ConsoleMe: A Central Control Plane for AWS Permissions and Access by Netflix
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Detailed blog on ConsoleMe: A Central Control Plane for AWS Permissions and Access by Netflix
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Detailed blog on ConsoleMe: A Central Control Plane for AWS Permissions and Access by Netflix
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Detailed blog on ConsoleMe: A Central Control Plane for AWS Permissions and Access by Netflix
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Detailed blog on ConsoleMe: A Central Control Plane for AWS Permissions and Access by Netflix
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Detailed blog on ConsoleMe: A Central Control Plane for AWS Permissions and Access by Netflix
- Use IMDSv2 instead: Defense in depth
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- How an Attacker Could Use Instance Metadata to Breach Your App in AWS
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Detailed blog on ConsoleMe: A Central Control Plane for AWS Permissions and Access by Netflix
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Detailed blog on ConsoleMe: A Central Control Plane for AWS Permissions and Access by Netflix
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Detailed blog on ConsoleMe: A Central Control Plane for AWS Permissions and Access by Netflix
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Detailed blog on ConsoleMe: A Central Control Plane for AWS Permissions and Access by Netflix
- A very good repo for learning IAM based vulnerabilities
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Detailed blog on ConsoleMe: A Central Control Plane for AWS Permissions and Access by Netflix
- How I Discovered Thousands of Open Databases on AWS
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Detailed blog on ConsoleMe: A Central Control Plane for AWS Permissions and Access by Netflix
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Detailed blog on ConsoleMe: A Central Control Plane for AWS Permissions and Access by Netflix
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Detailed blog on ConsoleMe: A Central Control Plane for AWS Permissions and Access by Netflix
- Getting shell and data access in AWS by chaining vulnerabilities
- Detailed blog on ConsoleMe: A Central Control Plane for AWS Permissions and Access by Netflix
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Detailed blog on ConsoleMe: A Central Control Plane for AWS Permissions and Access by Netflix
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Detailed blog on ConsoleMe: A Central Control Plane for AWS Permissions and Access by Netflix
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Detailed blog on ConsoleMe: A Central Control Plane for AWS Permissions and Access by Netflix
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Detailed blog on ConsoleMe: A Central Control Plane for AWS Permissions and Access by Netflix
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Detailed blog on ConsoleMe: A Central Control Plane for AWS Permissions and Access by Netflix
- Detailed blog on ConsoleMe: A Central Control Plane for AWS Permissions and Access by Netflix
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- How I Discovered Thousands of Open Databases on AWS
- Detailed blog on ConsoleMe: A Central Control Plane for AWS Permissions and Access by Netflix
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Detailed blog on ConsoleMe: A Central Control Plane for AWS Permissions and Access by Netflix
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Detailed blog on ConsoleMe: A Central Control Plane for AWS Permissions and Access by Netflix
- One more on IAM Privilege Escalation
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Detailed blog on ConsoleMe: A Central Control Plane for AWS Permissions and Access by Netflix
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Detailed blog on ConsoleMe: A Central Control Plane for AWS Permissions and Access by Netflix
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Detailed blog on ConsoleMe: A Central Control Plane for AWS Permissions and Access by Netflix
- Getting shell and data access in AWS by chaining vulnerabilities
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Detailed blog on ConsoleMe: A Central Control Plane for AWS Permissions and Access by Netflix
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Detailed blog on ConsoleMe: A Central Control Plane for AWS Permissions and Access by Netflix
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Detailed blog on ConsoleMe: A Central Control Plane for AWS Permissions and Access by Netflix
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Detailed blog on ConsoleMe: A Central Control Plane for AWS Permissions and Access by Netflix
- How I Discovered Thousands of Open Databases on AWS
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Detailed blog on ConsoleMe: A Central Control Plane for AWS Permissions and Access by Netflix
- How I Discovered Thousands of Open Databases on AWS
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Detailed blog on ConsoleMe: A Central Control Plane for AWS Permissions and Access by Netflix
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Detailed blog on ConsoleMe: A Central Control Plane for AWS Permissions and Access by Netflix
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Detailed blog on ConsoleMe: A Central Control Plane for AWS Permissions and Access by Netflix
- How I Discovered Thousands of Open Databases on AWS
- Good Read on AWS IAM Privilege Escalation – Methods and Mitigation
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- 51 Tips for Security AWS(pdf) - McAfee
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- AWS Security Blog
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Detailed blog on ConsoleMe: A Central Control Plane for AWS Permissions and Access by Netflix
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Detailed blog on ConsoleMe: A Central Control Plane for AWS Permissions and Access by Netflix
- Finding SSRF via HTML Injection inside a PDF file on AWS EC2
- Getting shell and data access in AWS by chaining vulnerabilities
- Detailed blog on ConsoleMe: A Central Control Plane for AWS Permissions and Access by Netflix
-
Online Courses (Paid/Free)
- AWS Certified Security Specialty - Udemy by Zeal Vora
- AWS Certified Security Specialty - From Acloud.guru
- AWS Certified Security Specialty - Udemy by Stephan Maarek
- AWS Fundamentals: Address Security Risks - Coursera
- Cloud Computing Security - Coursera
- AWS: Getting started with Cloud Security - EdX
- AWS Certified Security Specialty - From WhizLabs
- AWS Advanced Security - Udemy
- AWS Security Path - AppSecEngineer
- AWS for Architects: Advanced Security - Linkedin Learn by Lynn Langit
- Practical Event Driven Security with AWS - Acloud.guru
- Learning Path for AWS Security - Nicely designed the learning path who wants to be an AWS Security Experts from Acloud.guru
- Cloud Hacking course - From NotSoSercure
- AWS Skill Builder platform security learning plan - AWS SkillBuilder
- Cloud Security: AWS Edition Bootcamp by Pentester Academy - From Pentester Academy
- Breaking and Pwning Apps and Servers in AWS and Azure - Previously an instructor led training now released as free and open source courseware for Cloud Pentesters
-
Table of Contents
Programming Languages
Categories
Sub Categories
Keywords
aws
8
security
6
cloud
3
auditing
2
penetration-testing
2
cloudtrail
2
aws-security
2
iam
2
security-tools
2
cloud-security
2
aws-auditing
1
python
1
temporary-credentials
1
mfa
1
keychain
1
credentials
1
cli
1
aws-vault
1
gcp
1
azure
1
incident-response
1
dfir
1
aws-lambda
1
aws-inventory
1
pentesting
1
opensource
1
free
1
azure-security
1
application-security
1
penetration-testing-tools
1
golang
1
wafv2
1
waf
1
typescript
1
owasp-top-10
1
owasp
1
governance
1
firewall
1
devsecops
1
cdk
1
amazon-web-services
1
aws-iam
1
diagram
1
cytoscape
1
hardening
1
aws-hardening
1
aws-infrastructure
1