Thought I'd see what it means to run my own Mastodon instance.
It's up and responds via browser, but it throws CSS and CSP errors.
No idea what went wrong. I believe I followed all the 20 something steps to get it working.
Founder of ARGOS Cloud Security, private pilot, Strongman, public cloud and cyber focused. Microsoft Azure MVP, occasional sneakerhead.
#cloudsecurity #infosec #cybersecurity #azure #aws #startup #strongman #pilot #aviation #avgeek #sneakerhead
| ARGOS Cloud Security | https://argos-security.io |
| Cloud blog | https://cloud-right.com |
| https://www.linkedin.com/in/obrien-david |
Thought I'd see what it means to run my own Mastodon instance.
It's up and responds via browser, but it throws CSS and CSP errors.
No idea what went wrong. I believe I followed all the 20 something steps to get it working.
@dob That's a big scope.
Some things we do to make our lives easier and doesn't cost $$$.
Enable #guardduty and pipe all the alerts into a slack channel (+email as well).
Enable #cloudtrail log everything to an #S3 bucket in another account. #cloudwatch alerts on auth failures (to slack + email (some go to pagerduty #infosec contact).
We also have some alerts on updates when a cidr is added to a #SecurityGroup.
Don't use #ssh or #bastion/#JumpHosts use #ssm to run automations on the hosts (package install, service restarts etc) also to get a shell on a box (if needed at all). (you can use #TransitiveTags with #RoleAssumption to give granular access).
Using #ssm for console access also logs the entire session (including someone doing sudo su - root etc!) into #S3
Use #MicroSegmentation within our #vpc. Instances behind an #alb will only accept traffic from the #alb #SecurityGroup etc.. #rds, #elasticache willl only accept traffic from instances in the appropriate #SecurityGroup. (Basically we don't use cidr ingress rules, we use security group ids) (this works across accounts in the same region with peering, but not across regions however).
#cloudsecurity what's new this week?
What's hot? What's not?
Just signed up to a Mastodon instance and looking for accounts to follow for cloud security content?
I curated a non-comprehensive list:
@Antitree
@Rmogull
@andrewkrug
@bnugent
@bradgeesaman
@christophetd
@dob
@frichetten
@hackingthecloud
@jcfarris
@jvehent
@marcolancini
@new23d
@patricksanders
@raesene
@rami
@scottpiper
@signalblur
@zoph
(in alphabetical order)
Feel free to suggest more!
Cloud providers need to do more to protect their customers from making security mistakes. I'm very concerned about how easy it is to accidentally misconfigure services, the skills gap that exists between the small pool of cloud security (configuration) experts and everyone else, and the constant churn of new cloud features and functionality which is adding to overall system complexity.
We're very close now. Very soon we'll release a new capability in ARGOS specifically for #Azure consultants (for now).
Super excited. It's something I could've used countless times with past customers.
Soon it'll be available for everybody.
Can't wait.