Software Alternatives & Reviews

Mapping your AWS attack surface

Steampipe Nmap Amazon S3 Amazon Route 53 Amazon CloudFront AWS Certificate Manager Amazon API Gateway
  1. Steampipe: select * from cloud; The extensible SQL interface to your favorite cloud APIs select * from AWS, Azure, GCP, Github, Slack etc.
    Pricing:
    • Open Source
    An Organization must monitor and understand the network perimeter of their cloud estate. Resources comprising the externally facing network components of your cloud attack surface can be broadly grouped into IP addresses, hostnames, and URLs. In this blog post, we will provide step-by-step instructions for mapping the network aspects of the cloud attack surface using Steampipe.

    #Big Data #Databases #Big Data Analytics 39 social mentions

  2. 2
    Nmap Free Security Scanner, Port Scanner, & Network Exploration Tool. Download open source software for Linux, Windows, UNIX, FreeBSD, etc.
    Review the list of IP addresses returned, and if permitted by the terms of service, scan these hostnames for exposed ports and services using nmap or Nessus.

    #Security #Security Monitoring #Monitoring Tools 187 social mentions

  3. Amazon S3 is an object storage where users can store data from their business on a safe, cloud-based platform. Amazon S3 operates in 54 availability zones within 18 graphic regions and 1 local region.
    A number of AWS services, including CloudFront, S3, API Gateway, and AWS Lambda, produce URLs that can be vulnerable. For example, S3 Buckets exist as URLs on the public internet and can be accessed if the bucket is not properly secured. To get a list of all of the URLs for the public buckets in your cloud environment, you can use this query:.

    #Cloud Hosting #Object Storage #Cloud Storage 171 social mentions

  4. Amazon Route 53 is a highly available and scalable DNS web service.
    To determine the DNS Hostnames used as part of your cloud perimeter, Steampipe can query all of the A records and CNAMEs in your Route 53 Hosted Zones. A records point directly to IP addresses under your control. CNAMEs are references that can point to hosts or other cloud-provider-managed resources. In either case, you need to understand what exists in your environment.

    #Domain Name Registrar #Cloud Computing #Domain Names 45 social mentions

  5. Amazon CloudFront is a content delivery web service.
    A number of AWS services, including CloudFront, S3, API Gateway, and AWS Lambda, produce URLs that can be vulnerable. For example, S3 Buckets exist as URLs on the public internet and can be accessed if the bucket is not properly secured. To get a list of all of the URLs for the public buckets in your cloud environment, you can use this query:.

    #CDN #Cloud Computing #Content Distribution 67 social mentions

  6. AWS Certificate Manager from Amazon Web Services (AWS)
    Note: The above query excludes private DNS for VPCs z.private_zone=false and excludes common CNAMEs needed for ACM and email validation.

    #Identity And Access Management #Network & Admin #Two Factor Authentication 23 social mentions

  7. Create, publish, maintain, monitor, and secure APIs at any scale
    A number of AWS services, including CloudFront, S3, API Gateway, and AWS Lambda, produce URLs that can be vulnerable. For example, S3 Buckets exist as URLs on the public internet and can be accessed if the bucket is not properly secured. To get a list of all of the URLs for the public buckets in your cloud environment, you can use this query:.

    #API Tools #APIs #Web Service Automation 95 social mentions

Discuss: Mapping your AWS attack surface

Log in or Post with