Teri Radichel discusses common security pitfalls in AWS environments, emphasizing the importance of addressing security issues at an architectural level to reduce risks effectively.
She highlights the significance of avoiding faulty logic in security policies that may create gaps for attackers to exploit.
An example provided is the ineffective use of boolifexists in IAM policies, which could bypass MFA enforcement.
The article stresses the need to address security problems comprehensively by considering the overall attack surface.
Various solutions are suggested, such as network restrictions, external IDs, limiting access, encryption, separation of duties, and monitoring for misuse of credentials.
The discussion extends to the risks associated with getting rid of AWS access keys and implementing alternative authentication methods like OIDC and browser-based MFA.
Concerns about vulnerabilities in browser-based MFA methods, phishing attacks, and securing MFA tokens are addressed in the context of overall security.
The importance of understanding the evolving attack surface, considering security solutions in broader architectural contexts, and monitoring systems for threats is highlighted.
SentinelOne emphasizes the significance of evidence-based risk prioritization, proactive and autonomous cloud security measures, and rapid threat detection and response.
Through Singularity Cloud, SentinelOne offers solutions to verify exploitable risks, correlate activities across environments, and respond autonomously to threats.