The document is an agenda for a Cloud Security Masterclass on building a highly secure Amazon S3 bucket. The agenda includes an overview of why cloud security is different, a deep dive into S3 security, and a Q&A session. It provides context that the Masterclass series gives technical deep dives into critical cloud security subjects through insightful conversations with experts, and is meant to help people reason about security for their use cases.
WSO2CON 2024 - Building a Digital Government in Uganda
Building a Highly Secure Amazon S3 Bucket
1. Cloud Security Masterclass:
Building a Highly-Secure S3 Bucket Part 1
JOSH STELLA
CO-FOUNDER & CTO, FUGUE
UPCOMING CLOUD SECURITY MASTERCLASS SESSIONS
A Conversation with Greg McCord from CalAmp
Tuesday, June 2 - 1PM EST/10AM PST
Locking Down the Security of AWS IAM
Thursday, June 23 - 1PM EST/10AM PST
2. Agenda
1. Why cloud security is different (a brief overview)
2. A deep dive into the security of Amazon S3
3. Q&A
Cloud Security Masterclass:
Building a Highly-Secure S3 Bucket
3. About the Cloud Security Masterclass series
WHAT IT IS
• Technical deep dives into
critical cloud security subjects
• Insightful conversations with
cloud security leaders
• Help for reasoning about the
security of your use cases
• FUN!
WHAT IT ISN’T
• Step-by-step tutorials
• Specific use cases
• Slideshows
• BORING!
Cloud Security Masterclass:
Building a Highly-Secure S3 Bucket
4. “I’m seeing a lot of cloud configuration errors in the real world—
and it’s scaring the hell out of me.”
– David Linthicum, InfoWorld
Cloud Security Masterclass:
Building a Highly-Secure S3 Bucket
CONCERNED
THEY’VE BEEN
HACKED AND
DON’T KNOW IT
84%
CONCERNED
THEY’RE
VULNERABLE TO
A CLOUD BREACH
92%
MISCONFIGURATION
RISK WILL INCREASE
OR STAY THE SAME
THIS YEAR
76%
5. “Skilled or well-funded hacker groups are employing automation to
discover and exploit misconfigured cloud assets within hours of their
deployment.”
– John Breeden II, CSO Online
Cloud Security Masterclass:
Building a Highly-Secure S3 Bucket
PRE-CLOUD EXPLOIT STRATEGY
1. Identify your target
2. Search for vulnerabilities
CLOUD EXPLOIT STRATEGY
1. Identify vulnerabilities
2. Choose your target
7. Cloud Security Masterclass:
Building a Highly-Secure S3 Bucket
UPCOMING
CLOUD SECURITY MASTERCLASS SESSIONS
A Conversation with
Greg McCord from CalAmp
Tuesday, June 2
1PM EST/10AM PST
Locking Down the
Security of AWS IAM
Thursday, June 23
1PM EST/10AM PST