Building a Highly Secure S3
Bucket
Josh Stella, Co-Founder and CTO, Fugue| Nov. 13,
2020
Building a Highly Secure S3 Bucket
Agenda
1. Why Cloud Security is Different (A Brief Overview)
2. A deep Dive into the Security of Amazon S3
3. Q&A
Building a Highly Secure S3 Bucket
Cloud Misconfiguration is the #1 Risk
CONCERNED
THEY’VE BEEN
HACKED AND
DON’T KNOW IT
84%
CONCERNED
THEY’RE
VULNERABLE TO
A CLOUD BREACH
92%
MISCONFIGURATI
ON RISK WILL
INCREASE OR
STAY THE SAME
THIS YEAR
76%
”I’m seeing a lot of cloud configuration errors in the real world-
and it’s scaring the hell out of me” -- David Linthicum, InfoWorld
Building a Highly Secure S3 Bucket
PRE-CLOUD HACKER
STRATEGY
1. Pick Your Target
2. Find Your Vulnerabilities
How Hacker Strategy Changed with
Cloud CLOUD EXPLOIT STRATEGY
1. Find vulnerabilities
2. Pick your target
“Skilled or well-funded hacker groups are employing automation to discover
and exploit misconfigured cloud assets within hours of their deployment”
--John Breeden II, CSO Online
Building a Highly Secure S3 Bucket
DEEP DIVE:
THE SECURITY OF AMAZON S3
Building a Highly Secure S3 Bucket
Q&A
Building a Highly Secure S3 Bucket

Building a Highly Secure S3 Bucket

  • 1.
    Building a HighlySecure S3 Bucket Josh Stella, Co-Founder and CTO, Fugue| Nov. 13, 2020 Building a Highly Secure S3 Bucket
  • 2.
    Agenda 1. Why CloudSecurity is Different (A Brief Overview) 2. A deep Dive into the Security of Amazon S3 3. Q&A Building a Highly Secure S3 Bucket
  • 3.
    Cloud Misconfiguration isthe #1 Risk CONCERNED THEY’VE BEEN HACKED AND DON’T KNOW IT 84% CONCERNED THEY’RE VULNERABLE TO A CLOUD BREACH 92% MISCONFIGURATI ON RISK WILL INCREASE OR STAY THE SAME THIS YEAR 76% ”I’m seeing a lot of cloud configuration errors in the real world- and it’s scaring the hell out of me” -- David Linthicum, InfoWorld Building a Highly Secure S3 Bucket
  • 4.
    PRE-CLOUD HACKER STRATEGY 1. PickYour Target 2. Find Your Vulnerabilities How Hacker Strategy Changed with Cloud CLOUD EXPLOIT STRATEGY 1. Find vulnerabilities 2. Pick your target “Skilled or well-funded hacker groups are employing automation to discover and exploit misconfigured cloud assets within hours of their deployment” --John Breeden II, CSO Online Building a Highly Secure S3 Bucket
  • 5.
    DEEP DIVE: THE SECURITYOF AMAZON S3 Building a Highly Secure S3 Bucket
  • 6.
    Q&A Building a HighlySecure S3 Bucket