AWS IAM: Security edition [Part-1]

In the last blog, we talked about AWS IAM challenges usually encountered while setting it up. We also talked about AWS IAM best practices which help us understand why there is a need for multiple options & practices through which we can satisfy our needs. When we talk about AWS IAM, there is an important term called security which plays an important role while setting up AWS IAM. We covered lots of approaches which generally are not related to AWS IAM security. We bring to you this blog that covers many aspects of security related to AWS IAM.

This blog will help you understand multiple options provided by AWS IAM through which we can set up secured infrastructure. Most of the options provided by AWS IAM are also covered as security best practices. Let’s explore some of the options.

Continue reading “AWS IAM: Security edition [Part-1]”

AWS IAM: The challenge

When we talk about security, AWS IAM is one of the most fundamental & critical AWS service which needs suitable observation to design it because any careless & negligible exercise leads to huge complication & misshaping. AWS IAM is one of a kind which is ignored at the starting means not organise properly which leads to enormous complications while managing access to resources. Most of the time, a proper technique of managing AWS IAM access is ignored or doesn’t documented or configured properly due to which team has to change the IAM management format every time when there is a new requirement or modification.

Continue reading “AWS IAM: The challenge”

Postgres – CIS Benchmark

We have seen many security incidents. Any breach in security cause concern among enterprises. To be honest it not only concern them, it also gives birth to their nightmare, distrust and scepticism as organisation. The root cause of this distrust is improper implementation and configuration.

Opstree Security has started a new initiative where we rigorously analyse and implement CIS Benchmark of every tools being used today.

In this CIS series, we will discuss the CIS Benchmarks of PostgreSQL. Continue reading “Postgres – CIS Benchmark”

Out-Of-Band RCE: CTF Walkthrough

So, this is my writeup on how I was able to achieve my first Remote Code Execution. Also after reviewing the code I was able to understand more about malicious code execution via OS functions. Finally, I was able to capture the flag and get the Hall of Fame.

Out of Band(OOB) Command Injection is performed by sending a DNS request to a server, which occurs when input data is interpreted as an operating system command. By this, an attacker can execute arbitrary commands on the system and gain unauthorized access.

Continue reading “Out-Of-Band RCE: CTF Walkthrough”

Linux OS Hardening: CIS Benchmarks

As we’re going through a pandemic majority of business have taken things online with options like work from home and as things get more and moreover the internet our concerns regarding cybersecurity become more and more prominent. We start to dig a little to have standards in place and terms like  Compliance, Hardening, CIS, HIPPA, PCI-DSS are minted out. Today we’ll be discussing why to have CIS benchmarks in place in the least and how we at Opstree have automated this for our clients.

Before moving forward get familiar with basic terms:

CIS Benchmarks are the best security measures that are created by the Centre of Internet Security to improve the security configuration of an organization. Continue reading “Linux OS Hardening: CIS Benchmarks”