I Thought My Cloud Setup Was Secure - Until It Wasn't | HackerNoon
Briefly

In the realm of cloud security, missteps can have severe consequences. The article recounts a personal experience of skyrocketing AWS bills due to misconfigured S3 buckets and insecure EC2 instances. It stresses the importance of IAM management, highlighting that granting excessive permissions can lead to devastating losses. Furthermore, it notes the risks associated with Infrastructure as Code (IaC), such as unencrypted databases becoming accessible due to simple errors. Moreover, it emphasizes that even advanced security tools are ineffective without proper alert management and tuning. Overall, cloud security hygiene is paramount and needs ongoing attention.
If you are not auditing roles monthly and practicing the principle of least privilege, you are playing cloud roulette. You may not lose this week, but you will.
I once deployed a brand-new stack and forgot to enable encryption on RDS. That database ran unencrypted for 3 hours before we noticed, and it accepted 19 connection attempts from random IPs in that time.
We had GuardDuty, CloudTrail, all the bells and whistles. But no one was looking at the alerts. Why? Because we did not tune them.
Just give devs some admin rights - it is faster. Now I think: Who the hell created this IAM role, and why can it launch anything in any region?
Read at Hackernoon
[
|
]