<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: NickTheSecurityDude</title>
    <description>The latest articles on Forem by NickTheSecurityDude (@ncksecuritydude).</description>
    <link>https://forem.com/ncksecuritydude</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F604692%2F6e6e8dd9-d9c6-40de-a88a-50e7d8c66ab7.png</url>
      <title>Forem: NickTheSecurityDude</title>
      <link>https://forem.com/ncksecuritydude</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/ncksecuritydude"/>
    <language>en</language>
    <item>
      <title>Kiro Just Went Live: Here’s Why I’m All In on GenAI for Security</title>
      <dc:creator>NickTheSecurityDude</dc:creator>
      <pubDate>Mon, 14 Jul 2025 15:00:00 +0000</pubDate>
      <link>https://forem.com/ncksecuritydude/kiro-just-went-live-heres-why-im-all-in-on-genai-for-security-1n60</link>
      <guid>https://forem.com/ncksecuritydude/kiro-just-went-live-heres-why-im-all-in-on-genai-for-security-1n60</guid>
      <description>&lt;h1&gt;
  
  
  Building Smarter, Faster, and Custom with Kiro: My First Month with the Next-Gen AI Pair Programmer
&lt;/h1&gt;

&lt;p&gt;For the past few weeks, I’ve had the chance to explore &lt;strong&gt;Kiro&lt;/strong&gt;, a next-generation GenAI pair programmer designed for engineers, builders, and security professionals. After using Amazon Q extensively since launch, I didn’t think things could move &lt;em&gt;that&lt;/em&gt; much faster.&lt;/p&gt;

&lt;p&gt;But they did. Kiro feels like the next level.&lt;/p&gt;

&lt;p&gt;Whether I was building custom Red Team tooling or rapidly prototyping pen testing scripts, Kiro handled every task with exceptional speed, near-zero revisions, and a deep contextual memory that made building entire ecosystems feel natural. It didn’t just save time, it &lt;strong&gt;made the impossible, possible&lt;/strong&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  &lt;strong&gt;💡 From Idea to Working Code in a Day&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;What traditionally would’ve taken &lt;strong&gt;5 weeks and cost over $30,000&lt;/strong&gt; to build, I finished in under 8 hours with Kiro.&lt;/p&gt;

&lt;p&gt;That’s not an exaggeration. I had an idea, drafted a session prompt, and by the end of the day, I had working, threaded, multi-region Python code scanning my AWS environment using &lt;code&gt;boto3&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;Kiro didn’t just understand the assignment, it remembered how I structure my tools, reused patterns I liked, and adapted itself on the fly. That’s the power of persistent GenAI memory.&lt;/p&gt;




&lt;h2&gt;
  
  
  📌 &lt;strong&gt;Use Case Spotlight: Project – EC2 Exposure Scanner&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;To show what Kiro can do, I’ll walk you through a small but powerful script I created called the &lt;strong&gt;EC2 Exposure Scanner&lt;/strong&gt;. It does the following:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Enumerates all AWS regions
&lt;/li&gt;
&lt;li&gt;Detects public subnets by analyzing route tables for &lt;code&gt;0.0.0.0/0 → IGW&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;Scans every EC2 instance (even stopped ones)
&lt;/li&gt;
&lt;li&gt;Identifies any instance in a public subnet that has a Security Group allowing inbound access from &lt;code&gt;0.0.0.0/0&lt;/code&gt; on &lt;strong&gt;TCP 80 or 443&lt;/strong&gt;, including port ranges or overly permissive rules
&lt;/li&gt;
&lt;li&gt;Outputs a &lt;strong&gt;JSON and Markdown report&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Generates &lt;strong&gt;remediation snippets&lt;/strong&gt; in both CloudFormation and Terraform
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This script took just a few iterations using Kiro and now I use it routinely during internal assessments.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1kktdqnhsy0iaraievll.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1kktdqnhsy0iaraievll.png" alt=" " width="800" height="563"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  🧠 &lt;strong&gt;What Is Vibe Coding?&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;One of my favorite styles with GenAI is what I call &lt;strong&gt;vibe coding&lt;/strong&gt;, perfect for standalone scripts and one-off utilities.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fb5swchwaj3g189y8jpvs.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fb5swchwaj3g189y8jpvs.png" alt=" " width="324" height="389"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Here’s how I use it:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Start each Kiro session with a &lt;strong&gt;"session prompt"&lt;/strong&gt;, this tells the model how I want code structured, what standards to follow, and what threading or logging styles I prefer.&lt;/li&gt;
&lt;li&gt;Then I provide a descriptive, conversational prompt about the script I want.&lt;/li&gt;
&lt;li&gt;Kiro returns clean, threaded, region-aware AWS code with consistent outputs, summaries, and error handling.
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Project: EC2 Exposure Scanner

Objective:
Create a CLI-based Python script that identifies all EC2 instances in public subnets (those with a route to 0.0.0.0/0 via an Internet Gateway) where any attached security group allows inbound access from 0.0.0.0/0 on TCP port 80 and/or 443 — either directly or via port ranges. The tool should output findings in both human-readable and JSON format, and provide a suggested remediation snippet in CloudFormation or Terraform.

Input:
- AWS credentials via default boto3 environment
- Target: Single AWS account
- Scan all available AWS regions
- Use threading (max 3 threads) for region concurrency

Implementation Steps:

1. Region Discovery:
   - Use ec2.describe_regions() to list all enabled regions.

2. Public Subnet Detection:
   - In each region, call:
     - ec2.describe_route_tables() to find route tables with a route to 0.0.0.0/0 and a target of type igw-xxxx
     - ec2.describe_subnets() to match those subnets
     - Build a set of public subnet IDs

3. EC2 Instance Enumeration:
   - Use ec2.describe_instances() (with pagination)
   - For each instance in a public subnet, collect:
     - Instance ID
     - Subnet ID
     - Attached security group IDs

4. Security Group Evaluation:
   - For each SG attached to a public instance, call ec2.describe_security_groups()
   - Check for inbound rules matching:
     - Protocol: tcp or -1 (all protocols)
     - Port: 80 or 443 (or port ranges that include them)
     - CIDR: 0.0.0.0/0
     - Match also if FromPort=0 and ToPort=65535 or FromPort=400 and ToPort=500

5. Finding Reporting:
   - For each violating instance, record:
     {
       "region": "us-east-1",
       "instance_id": "i-abc123",
       "subnet_id": "subnet-xyz",
       "security_group_id": "sg-123456",
       "ports_exposed": [80, 443],
       "matching_rule": {
         "FromPort": 0,
         "ToPort": 65535,
         "CidrIp": "0.0.0.0/0"
       }
     }

6. Remediation Suggestion:
   - Include a generated Terraform and CloudFormation snippet to restrict access (e.g., remove inbound 0.0.0.0/0 or limit to a CIDR block like 10.0.0.0/16)

7. Summary Output:
   - Track and output the following:
     - Total EC2 instances
     - Instances in public subnets
     - Instances with port 80 and/or 443 open to 0.0.0.0/0
   - Provide this information per region and account-wide
   - Example summary:
     {
       "account_summary": {
         "total_instances": 12,
         "instances_in_public_subnets": 6,
         "instances_exposed_to_web": 4
       },
       "region_summaries": {
         "us-east-1": {
           "total_instances": 5,
           "instances_in_public_subnets": 3,
           "instances_exposed_to_web": 2
         },
         "us-west-2": {
           "total_instances": 7,
           "instances_in_public_subnets": 3,
           "instances_exposed_to_web": 2
         }
       }
     }

8. Output:
   - Save results to:
     - data/ec2_public_exposure/summary.json
     - data/ec2_public_exposure/summary.md
     - data/ec2_public_exposure/last_checked.txt
   - Markdown should include:
     - Account-wide totals
     - Regional breakdowns
     - Tabular list of exposed instances

9. Concurrency and Logging:
   - Use concurrent.futures.ThreadPoolExecutor(max_workers=3)
   - Log region-level errors to error.log

Deliverables:
- CLI script: scan_ec2_exposure.py
- Structured outputs: JSON summary, Markdown report
- Per-finding CloudFormation and Terraform remediation snippets

Notes:
- No port scanning or live network tests — AWS API only
- All EC2 instances should be evaluated, regardless of instance state
- Match all TCP-based exposure via 0.0.0.0/0 (direct or via range)
- Only use standard libraries: boto3, json, threading, logging
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Vibe coding is fast, expressive, and best suited for Red Teamers and cloud security engineers who need tailored tooling &lt;strong&gt;without building from scratch every time&lt;/strong&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  🛠️ &lt;strong&gt;Spec-Based Coding: Scaling Beyond Single Scripts&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;While vibe coding is perfect for focused tasks, Kiro supports something even more powerful: &lt;strong&gt;spec-based coding&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;In my workflow, spec-based coding starts with:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;requirements.md&lt;/code&gt; — what the project is, why it exists&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;design.md&lt;/code&gt; — the technical plan&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;tasks.md&lt;/code&gt; — a breakdown of all steps, often 10+ subtasks for large-scale tools&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This lets Kiro generate structured code in stages, perfect for dashboards, data pipelines, cloud-native automation, and larger security utilities. The result: &lt;strong&gt;clean, consistent code you can version, maintain, and extend&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftvscpba2893o8uwfzssq.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftvscpba2893o8uwfzssq.jpg" alt=" " width="419" height="362"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  🔥 &lt;strong&gt;"Tools Should Work Like Teammates, Not Just Autocomplete"&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Kiro doesn’t just respond it &lt;em&gt;co-develops&lt;/em&gt;. The way it remembers patterns, offers fixes, and even &lt;strong&gt;generates remediation code (CloudFormation and Terraform)&lt;/strong&gt; makes it ideal for teams who want to move faster without cutting corners.&lt;/p&gt;

&lt;p&gt;It’s especially useful in security, where:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Speed&lt;/strong&gt; means patching before compromise
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Consistency&lt;/strong&gt; means audit readiness
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Customization&lt;/strong&gt; means avoiding detection during Red Team work
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F25nkfjab7nz3gbgv1gq8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F25nkfjab7nz3gbgv1gq8.png" alt=" " width="800" height="472"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  🚀 Getting Started with Kiro
&lt;/h2&gt;

&lt;p&gt;If you’re a cloud engineer, DevSecOps practitioner, or Red Team lead, you’re going to want this in your toolkit.&lt;/p&gt;

&lt;p&gt;Start with something small, vibe coding a one-off scanner or enumeration tool. Then grow into spec-based development. You’ll be amazed at what you can build.&lt;/p&gt;

&lt;p&gt;🔗 &lt;strong&gt;Try Kiro for yourself&lt;/strong&gt;: &lt;a href="https://www.kiro.dev/" rel="noopener noreferrer"&gt;Kiro.dev&lt;/a&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  🧭 Final Thoughts
&lt;/h2&gt;

&lt;p&gt;Kiro redefined how I build.&lt;/p&gt;

&lt;p&gt;It’s no longer about just coding faster, it’s about thinking differently. Automating tasks I used to skip. Building tools I never had time for. Finding exposures others missed.&lt;/p&gt;

&lt;p&gt;This is what happens when GenAI becomes a true teammate, not a tool.&lt;/p&gt;

</description>
      <category>genai</category>
      <category>aws</category>
      <category>security</category>
      <category>community</category>
    </item>
    <item>
      <title>Tesla’s Massive 2023 Data Breach - Could Chaos Security Engineering Have Prevented This?</title>
      <dc:creator>NickTheSecurityDude</dc:creator>
      <pubDate>Tue, 22 Aug 2023 16:30:34 +0000</pubDate>
      <link>https://forem.com/aws-builders/teslas-massive-2023-data-breach-could-chaos-security-engineering-have-prevented-this-3g4j</link>
      <guid>https://forem.com/aws-builders/teslas-massive-2023-data-breach-could-chaos-security-engineering-have-prevented-this-3g4j</guid>
      <description>&lt;p&gt;Tesla is facing a possible multi-billion dollar fine¹ for its latest data breach which exposed customer bank account details¹ as well as employee PII, reportedly including Elon Musk’s SSN².&lt;/p&gt;

&lt;p&gt;Tesla is blaming a “service technician”¹ for the breach, and suing them and one other employee, but does the company itself bear any responsibility?&lt;/p&gt;

&lt;p&gt;Details of the breach are scarce so its hard to say exactly how it occurred and if the company could have done anything to prevent, but let's take a look at the following hypothetical scenario with some similar details and see if Chaos Security Engineering could identify possible security weaknesses before an adversary could exploit them.&lt;/p&gt;

&lt;p&gt;Chaos Security Engineering (CSE) is the creation and execution of “experiments” to test that your security controls are working as desired.  Many times security controls are non-existent, insufficient, or stop working over time, therefore its important to use CSE to regularly, automatically, and sporadically test these.&lt;/p&gt;

&lt;p&gt;Let’s say XYZ Corp has 2 S3 buckets, one with company payroll info and one with customer banking information used to auto-debit their account monthly.  Let’s also assume there is a service technician who has access to AWS but does not have a business need to access either buckets.&lt;/p&gt;

&lt;p&gt;Right off the bat, I see a couple issues here, one, there is no blast radius with respect to HR data as well as customer data, these items should really be in complete separate AWS accounts.  Two, additionally that data should not be in a file in an S3 bucket, even if the bucket is encrypted, this is something which should be in a database, with table and/or column level encryption.  Then even if you had to make a backup of the database and store that in S3, the sensitive data would be encrypted.&lt;/p&gt;

&lt;p&gt;Back to the topic of encryption, there are a number of ways to encrypt data in S3, ideally this should typically be done with a Customer Managed KMS (CMK) key, with IAM permissions disabled in the KMS resource policy.  Common mistakes that companies often make are using the S3 default encryption, an AWS Managed KMS key, or allowing IAM permissions for the CMK.&lt;/p&gt;

&lt;p&gt;With respect to SCE what kind of experiments might help here?&lt;/p&gt;

&lt;p&gt;A frequent blunder I see is assigning the “ReadOnlyAccess” policy to low level accounts, such as service technician.  While the name sounds rather trivial from a security point of view, it actually is quite dangerous and allows full S3 access.  A much better policy would be "ViewOnlyAccess", with a custom policy to add gradual permissions where needed.&lt;/p&gt;

&lt;p&gt;Ergo, one SCE experiment would be to attach that policy to a role and confirm that it gets removed automatically.&lt;/p&gt;

&lt;p&gt;Another experiment would be deactivating any KMS keys which are created that allow IAM permission in the resource policy.&lt;/p&gt;

&lt;p&gt;Finally, a policy that takes action when an S3 bucket is created not using a&lt;br&gt;
CMK key.&lt;/p&gt;

&lt;p&gt;With these controls in place, and regularly verified by SCE tests, users who should not be able to, would not be able to access the data in the first place, preventing the breach from ever occurring.  With such a negligible cost to do SCE there no reason why more companies aren’t doing it, especially considering the ROI value when facing possible million or billion dollar fines.&lt;/p&gt;

&lt;p&gt;To learn more about SCE and see some real experiments in action, join cloud security experts Ankit Mehta and Nick Gilbert CISSP for the Florida AWS Security Users Meetup on 9/13.  &lt;a href="https://www.meetup.com/florida-aws-security-meetup-group/events/295504660/" rel="noopener noreferrer"&gt;Chaos Security Engineering Demo&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;About the author: Nick Gilbert is a Cloud Security Expert, working in the financial field, and part of the AWS Community Builders Program.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;a href="https://amp.theguardian.com/technology/2023/may/26/tesla-data-leak-customers-employees-safety-complaints" rel="noopener noreferrer"&gt;Source 1&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://qz.com/tesla-data-breach-insider-job-former-employees-lawsuit-1850756905" rel="noopener noreferrer"&gt;Source 2&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

</description>
      <category>security</category>
      <category>aws</category>
      <category>cloud</category>
    </item>
    <item>
      <title>Operation "Hot Chow Springs"</title>
      <dc:creator>NickTheSecurityDude</dc:creator>
      <pubDate>Tue, 20 Dec 2022 06:00:00 +0000</pubDate>
      <link>https://forem.com/ncksecuritydude/operation-hot-chow-springs-b8f</link>
      <guid>https://forem.com/ncksecuritydude/operation-hot-chow-springs-b8f</guid>
      <description>&lt;h2&gt;
  
  
  What surprises you most about the community builders program?
&lt;/h2&gt;

&lt;p&gt;I like learning about new services, the sessions they put on for us are really amazing and give a sneak peak at innovative technologies which we can apply.  One other surprising thing is the amount of talented new builders from so many countries that were added in 2022.&lt;/p&gt;

&lt;h2&gt;
  
  
  What’s your background and your experience with AWS?
&lt;/h2&gt;

&lt;p&gt;I come from a Linux and programming background which I did for about 20 years before getting started with AWS.  I've been using AWS for over 5 years, and as you've probably guessed from my name, my specialty is on the security side of things.  I enjoy building and hosting workshops and other hands on activities for AWS users to learn best practices and how to avoid common security mistakes.&lt;/p&gt;

&lt;h2&gt;
  
  
  What’s the biggest benefit you see from the program?
&lt;/h2&gt;

&lt;p&gt;Networking with other builders is by far the biggest benefit.  I've collaborated with a number of builders in 2022 and plan on expanding on that even more in 2023.  Meeting so many builders and networking with them in person at re:Invent was a great experience as well.&lt;/p&gt;

&lt;h2&gt;
  
  
  What’s the next swag item that you would like to get?
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0v1ygmnceyyopmm7weji.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0v1ygmnceyyopmm7weji.jpeg" alt=" " width="800" height="600"&gt;&lt;/a&gt; &lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3iwg7nbt3wel9ch4gh2b.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3iwg7nbt3wel9ch4gh2b.jpeg" alt=" " width="800" height="600"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Jason and Karissa always comes up with the best swag.  It will be hard to top the oversized coffee mug and Osprey trail pack that I received this year.  I'm sure they will come up with something even more spectacular next year. :)&lt;/p&gt;

&lt;h2&gt;
  
  
  What are you eating for dinner today? Share the recipe!
&lt;/h2&gt;

&lt;p&gt;Deep Dish Pizza (the photo is not the actual pizza).&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2oxdwgtmaglvhh3eukey.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2oxdwgtmaglvhh3eukey.jpeg" alt=" " width="700" height="525"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Deep Dish Pizza Dough, this dough is easy to work with and gives a thick crust. If you're not on a diet you can replace some of the water with butter.&lt;/p&gt;

&lt;p&gt;3 Cups flour. I'm use KA Sir Lancelot Hi Gluten flour. If you use bread flour you may want to look for one with a high gluten, but any bread flour will give a good result.&lt;br&gt;
1/2 T sea salt&lt;br&gt;
1/2 T sugar&lt;br&gt;
1 packet of Quick rise, rapid rise or instant yeast. The only difference in those is the brand.&lt;br&gt;
2 T EVOO&lt;br&gt;
1 1/4 cups warm water (under 90 degrees)&lt;/p&gt;

&lt;p&gt;Mix the dry items then add the liquids.&lt;/p&gt;

&lt;p&gt;I put this in a mixer with a dough hook and knead it until I have a smooth dough. About five minutes but you really have to use your judgement on the time. &lt;/p&gt;

&lt;p&gt;Pull the dough and quickly knead it by hand in to a round smooth ball. Set your dough in a oiled bowl. &lt;/p&gt;

&lt;p&gt;You can either cover it with a damp cloth or plastic wrap. Either way I spray the top of the dough with non-stick spray. &lt;/p&gt;

&lt;p&gt;Let it rise 1-2 hours or until it doubles.&lt;/p&gt;

&lt;p&gt;Punch the dough and your ready to roll. &lt;/p&gt;

&lt;p&gt;Use about 14 oz of dough for a large deep dish. &lt;/p&gt;

&lt;p&gt;I spray my deep dish pans and put the dough in then let the dough rest for 15 min or so, until the crust starts to rise again.&lt;/p&gt;

&lt;p&gt;Put a layer of cheese, then a layer of sausage, covering the whole pizza, top it off with some pizza sauce and finally some parmesan cheese.&lt;/p&gt;

&lt;p&gt;Bake at 400 degrees for 40 minutes or until the internal temperature reaches 165 degrees.&lt;/p&gt;

&lt;h2&gt;
  
  
  Is there anything else you would like to say about the community builders program in 2022?
&lt;/h2&gt;

&lt;p&gt;Thanks for a great year!!  I'm looking forward to more building in 2023!!!&lt;/p&gt;

</description>
      <category>aws</category>
      <category>communitybuilder</category>
      <category>usergroup</category>
      <category>cbchristmas2022</category>
    </item>
    <item>
      <title>AWS CIS Compliance in 15 minutes with 1 Command</title>
      <dc:creator>NickTheSecurityDude</dc:creator>
      <pubDate>Sun, 05 Sep 2021 00:50:31 +0000</pubDate>
      <link>https://forem.com/aws-builders/aws-cis-compliance-in-15-minutes-with-1-command-3a9l</link>
      <guid>https://forem.com/aws-builders/aws-cis-compliance-in-15-minutes-with-1-command-3a9l</guid>
      <description>&lt;p&gt;Did you know an AWS Account is only 39% CIS compliant by default?&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmhua2w8jtmkx5dtfa6y7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmhua2w8jtmkx5dtfa6y7.png" alt="SecurityHub ScreenShot" width="788" height="785"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;That's why I've created a Python script (which is available free on my GitHub page) which will help you achieve CIS, PCI DSS, and AWS Security Best Practice compliance, all with just one command.&lt;/p&gt;

&lt;p&gt;Behind the scenes it checks about 200 controls and with my script you will meet over 95% of those.  Some items such as enabling hardware MFA are not possible with a script.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2gkkvrup0nw8e45g45ho.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2gkkvrup0nw8e45g45ho.png" alt="SecurityHub MFA ScreenShot" width="800" height="54"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Behind the scenes it launching a nested CloudFormation stack with 10 sub-stacks.  Then it uses Python (via the AWS boto3 SDK library) to do the following:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Enable GuardDuty&lt;/li&gt;
&lt;li&gt;Remove Default Security Group Rules&lt;/li&gt;
&lt;li&gt;Update the Password Policy&lt;/li&gt;
&lt;li&gt;Enable S3 Secure Transport&lt;/li&gt;
&lt;li&gt;Enable PCI Standards&lt;/li&gt;
&lt;li&gt;Enable a VPC for the Control Tower Lambda function&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;You can download the script and find details on how run it here.  &lt;a href="https://github.com/NickTheSecurityDude/AWS-SecurityHub-CIS-Compliance-Automation" rel="noopener noreferrer"&gt;NickTheSecurityDude GitHub&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After you run the script, simply give SecurityHub about 24 hours to update.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fki28p8ejt80yfd2omp8e.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fki28p8ejt80yfd2omp8e.png" alt="SecurityHub After ScreenShot" width="767" height="790"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The script will send both email notices as well Slack notifications in the event a control is detected out of compliance.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsyhh8eym2ysoiwng4tuc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsyhh8eym2ysoiwng4tuc.png" alt="CIS Slack ScreenShot" width="682" height="377"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I will be doing a live demo of the script at the September 2021 Chicago AWS Security Meetup Group.  Join me via Zoom on 9/21 at 7pm to view first hand how the script works and to ask any questions.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fb3gkziph91r60pmvsjvj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fb3gkziph91r60pmvsjvj.png" alt="SecurityHub After ScreenShot 2" width="800" height="394"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>aws</category>
      <category>security</category>
      <category>python</category>
      <category>devops</category>
    </item>
    <item>
      <title>AWS Cloud Security Bootcamp (Pentester Academy) - Review</title>
      <dc:creator>NickTheSecurityDude</dc:creator>
      <pubDate>Wed, 11 Aug 2021 20:46:46 +0000</pubDate>
      <link>https://forem.com/aws-builders/aws-cloud-security-bootcamp-pentester-academy-review-3a52</link>
      <guid>https://forem.com/aws-builders/aws-cloud-security-bootcamp-pentester-academy-review-3a52</guid>
      <description>&lt;p&gt;I recently finished Pentester Academy "Cloud Security: AWS Edition" Bootcamp.  This is a 5-week instructor led course.  Its a fairly new bootcamp they've started, which they appear to offer about once per month.  My class was the 4th time they've offered it.&lt;/p&gt;

&lt;p&gt;It mainly focuses on the 5 most popular AWS services (IAM, API Gateway, Lambda, DynamoDB and S3), teaching you how to discover vulnerabilities and learning how to create security fixes for them.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdparrboyyjfx4cr0xozw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdparrboyyjfx4cr0xozw.png" alt="Alt Text" width="378" height="221"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I've previously taken a number of Pentester Academy's courses and find them challenging as well as practical.&lt;/p&gt;

&lt;p&gt;This bootcamp consists of a 4 hour class, once per week, and homework in the form of Capture the Flag labs, about 10 per week.&lt;/p&gt;

&lt;p&gt;They say its a course for all skill levels, but I would recommend it for intermediate or higher as you should be somewhat familiar with the AWS console, CLI and services.&lt;/p&gt;

&lt;p&gt;Each lab has a PDF guide, so if you get stuck and need a hint, the guide will help you out.  The instructor, which was Jeswin Mathai for my class, walks you through the labs the following week as well.  There is also a video recording available after each weeks session to go back and review, or in case you cannot make a session.&lt;/p&gt;

&lt;p&gt;Myself, an advanced AWS user, I can say I still learned new things in this course and found many of the labs challenging.  And they have a Lab Tech Support Discord channel setup to assist students.  Most of the labs took me 15-20 minutes, the more challenging ones took up to an hour.&lt;/p&gt;

&lt;p&gt;Each week covers a different area of AWS Security:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;IAM&lt;/li&gt;
&lt;li&gt;API Gateway&lt;/li&gt;
&lt;li&gt;Lambda&lt;/li&gt;
&lt;li&gt;Cloud Databases (DynamoDB and RDS)&lt;/li&gt;
&lt;li&gt;and S3&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Starting with IAM they cover a number of privilege escalation paths and some tools you can use to quickly find them.  A few highlights from this session were exploiting a misconfigured trust policy, dangerous policy combinations and three ways to get admin access using PassRole.&lt;/p&gt;

&lt;p&gt;Week 2, on API Gateway, covered some great exploits for API Gateway, 4 out of the 6 labs for this week contained flags, that you could only get by compromising the gateway using methods like Verb Tampering and exploiting a poor authorizer.  And a really interesting one was setting up a VPC Interface endpoint in a different account to exploit API Gateway in the target account.&lt;/p&gt;

&lt;p&gt;On to week 3, which focuses on hacking Lambda.  There are over 10 labs (different methods to hack lambda).  This covered everything from command injection, to deserialization, to exploiting custom runtimes, to not only compromise the app but to also gain access keys.  Another really cool lab this week, was creating Python script to brute force a Lambda app using a dictionary attack. I found this week quite interesting as a number of the attack vectors were new to me.&lt;/p&gt;

&lt;p&gt;Week 4 continued with exploiting Lambda.  In particular this week focuses on 2 stage attacks for Lambda, including how to backdoor a Lambda function to give you persistent access via a reverse shell.&lt;/p&gt;

&lt;p&gt;Week 5 covers Cloud Databases and S3.  One really cool concept was SQL injection on DynamoDB using PartiQL.  Another interesting topic was a method to quickly bypass AWS WAF with an SQL injection.  The course also covers using popular pentesting tools like Burp Suite to exploit applications hosted on AWS.&lt;/p&gt;

&lt;p&gt;After completing the course there is a 48-hour exam, which you can take any time in the next 60 days.  The exam consists of 5 labs with one or two flags each.  The exam labs are more difficult than the course labs.  Two were on IAM, one on S3, one using API Gateway and the last one using Lambda and DynamoDB.  In order to pass the exam you have to solve 4 out of the 5 challenges.&lt;/p&gt;

&lt;p&gt;One thing to note is the labs in this course are different than their regular AWS labs on their Attack Defense platform.&lt;/p&gt;

&lt;p&gt;In summary, as always, Pentester Academy provides great value in their education and I would recommend this course to anyone working in the AWS security field or planning on taking the AWS Certified Security Specialty Exam.  While not an exam preparation class, you will gain hands on experience valuable for the exam.  I would recommend it for intermediate to advanced AWS users, the course is marketed toward all levels and it does include some beginner content, but most beginners will find the concepts and exam very challenging.&lt;/p&gt;

&lt;p&gt;For more details on this bootcamp, visit: &lt;a href="https://bootcamps.pentesteracademy.com/courses" rel="noopener noreferrer"&gt;https://bootcamps.pentesteracademy.com/courses&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
