Published in Cloud Security·PinnedAutomating Cybersecurity Metrics (ACM)A series of blog posts on cybersecurity metrics and security automation — GitHub Repo (In Progress): SecurityMetricsAutomation/README.md at main · tradichel/SecurityMetricsAutomation Contribute to tradichel/SecurityMetricsAutomation development by creating an account on GitHub.github.com I’m adding a preliminary post to this series to explain what it’s all about and where you may want to start. I decided to start over with a new account and rebuild everything out for reasons I explained along the way. All the initial posts are…Cybersecurity Metrics16 min readCybersecurity Metrics16 min read
Published in Cloud Security·PinnedCybersecurity Author, Teri RadichelPublications and Presentations by Teri Radichel — Teri Radichel is a professional cybersecurity speaker, trainer, and author. The following are links to some of her past presentations, articles, blog posts, books, and security classes. …Cloud Security4 min readCloud Security4 min read
Published in Cloud Security·1 day agoMember-onlySCP to Allow Closing and Removing AWS Accounts — Part 3ACM.183 Trying out the new AWS billing actions in our SCP — Part of my series on Automating Cybersecurity Metrics. The Code. In my last post, I spent far too long messing around with deprecated AWS IAM billing actions. SCP to Allow Closing and Removing AWS Accounts — Part 2 ACM.183 Using CloudTrail to troubleshoot a Service Control Policy and the mysterious GetAccountPreferences actionmedium.com AWS updated billing options for IAM PoliciesAWS9 min readAWS9 min read
Published in Cloud Security·2 days agoMember-onlySCP to Allow Closing and Removing AWS Accounts — Part 2ACM.183 Using CloudTrail to troubleshoot a Service Control Policy and the mysterious GetAccountPreferences action — Part of my series on Automating Cybersecurity Metrics. The Code. In the last post I was trying to set up a service control policy architecture that prevents unauthorized removal of an account from an AWS organization, while still allowing for approved changes. SCP to Allow Closing and Removing AWS Accounts — Part 1 ACM.182 Only allow closing and removing accounts moved to an organizational unit for suspended accountsmedium.comAWS10 min readAWS10 min read
Published in Cloud Security·2 days agoMember-onlySCP to Allow Closing and Removing AWS Accounts — Part 1ACM.182 Only allow closing and removing accounts moved to an organizational unit for suspended accounts — Part of my series on Automating Cybersecurity Metrics. The Code. In the last post I showed you how I performed some troubleshooting on an SCP that wasn’t performing as expected. Root SCP Fails to Disable Root Actions — Troubleshooting SCPs 181. Also, test your policies, and monitor for inadvertent or malicious changesmedium.comCloud Security10 min readCloud Security10 min read
Published in Cloud Security·3 days agoMember-onlyRoot SCP Fails to Disable Root Actions — Troubleshooting SCPs181. Also, test your policies, and monitor for inadvertent or malicious changes — Part of my series on Automating Cybersecurity Metrics. The Code. In the last post in this series we took a look at a potential structure for an AWS Organization. Now I’m going to work on implementing that. But first we have some cleanup and testing to perform. Defining AWS Accounts and Organizational Units ACM.180 Defining accounts and organizational units based on by trust boundaries and roles to protect critical assetsmedium.comService Control Policies7 min readService Control Policies7 min read
Published in Bugs That Bite·3 days agoMember-onlyResource handler returned message: “The provided policy document does not meet the requirements of the specified policy type.”Error message for AWS CloudFormation with a Service Control Policy is *Not Helpful* (or any IAM-like policy) — I’m trying to deploy a service control policy with CloudFormation. This should be straightforward. I got the policy working without an fn::ImportValue that references a value in another stack. I cannot find any documentation saying this won’t work. This is standard CloudFormation so I presume it is OK.Error Message3 min readError Message3 min read
Published in Bugs That Bite·3 days agoMember-onlyBug in AWS CloudShellI have a particular file that has a portion of the code that looks like this when I open it up: However, that is not actually the format of the file. The file was pulled from GitHub and looks like this:Bug2 min readBug2 min read
Published in Bugs That Bite·3 days agoMember-onlyAWS Organizations SCPs — Redundant and Extraneous PoliciesThe design of AWS Organizations is such that accounts and OUs end up having repetitive and redundant FullAWSAccess policies. It seems like you should be able to remove one of the redundant policies. …Bug4 min readBug4 min read
Published in Bugs That Bite·3 days agoMember-onlyPasting Code in AWS CloudShell from Mac — Not PrettyIf anyone out there working on AWS CloudShell happens to see this, I’d consider this a bug because it makes CloudShell pretty much unusable for copy/paste from a MAC. I’m working in a terminal window on a Mac. I highlight and copy a block of code using ctrl-c Head over…Bug2 min readBug2 min read