<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Kennedy </title>
    <description>The latest articles on DEV Community by Kennedy  (@run2obtain).</description>
    <link>https://dev.to/run2obtain</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F237547%2F48f74ef1-3849-4148-bc58-fcc8a9535fba.png</url>
      <title>DEV Community: Kennedy </title>
      <link>https://dev.to/run2obtain</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/run2obtain"/>
    <language>en</language>
    <item>
      <title>Mitigant Threat Catalog: 3x Techniques, 12 AWS Services Added, and a Matrix View</title>
      <dc:creator>Kennedy </dc:creator>
      <pubDate>Thu, 19 Mar 2026 17:46:59 +0000</pubDate>
      <link>https://dev.to/run2obtain/mitigant-threat-catalog-3x-techniques-12-aws-services-added-and-a-matrix-view-14e</link>
      <guid>https://dev.to/run2obtain/mitigant-threat-catalog-3x-techniques-12-aws-services-added-and-a-matrix-view-14e</guid>
      <description>&lt;p&gt;About a month ago, we launched the Mitigant Threat Catalog, a free, interactive resource that operationalizes MITRE ATT&amp;amp;CK cloud techniques into executable CLI commands, CloudTrail event mappings, and Cloud Attack Language definitions. The catalog launched with 30 techniques across 20 AWS services.&lt;/p&gt;

&lt;p&gt;We recently made a major update, and we are excited to describe these changes, including how you can contribute or send feedback. We would also discuss some interesting observations we noticed, and where the catalog is headed.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Gap We Are Closing
&lt;/h2&gt;

&lt;p&gt;Most users of the MITRE ATT&amp;amp;CK framework realize that it is deliberately abstract. It is designed as a framework for categorizing adversary behavior and, given its aim of universal applicability, requires end users to provide contextual interpretation. But that is exactly where a gap is introduced: translating high-level content into operational capabilities.&lt;/p&gt;

&lt;p&gt;Consider &lt;a href="https://threats.mitigant.io/techniques/T1078.004" rel="noopener noreferrer"&gt;T1078.004&lt;/a&gt; (Valid Accounts: Cloud Accounts). The framework tells you that adversaries leverage stolen cloud credentials to operate under legitimate identities. What it does not tell you is the exact API call involved:&lt;br&gt;
Or the specific CloudTrail event to catch (CreateAccessKey), or the sequence of events before and after the command.&lt;/p&gt;

&lt;p&gt;The Mitigant Threat Catalog closes that gap by providing the exact commands for implementing techniques and procedures in an interactive format. This allows you to run CLI commands right in the browser. Also, you see the corresponding API calls, CloudTrail event names, and structured Cloud Attack Language definition of multi-step attacks that are typically executed before and after the exact technique.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fajsawwomsqqzadhdsnsb.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fajsawwomsqqzadhdsnsb.png" alt=" " width="800" height="364"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  What's New: 61 Techniques, 12 AWS Services Added, Across 11 ATT&amp;amp;CK Tactics
&lt;/h2&gt;

&lt;p&gt;This update adds 61 techniques and 12 AWS services, bringing the catalog to 91 techniques across 32 AWS services. The techniques span across 11 MITRE ATT&amp;amp;CK tactics, including Lateral Movement and Privilege Escalation, which had zero coverage at launch.&lt;/p&gt;

&lt;p&gt;Here are the 12 newly added AWS services: Amazon Cognito, Amazon CloudFront, Amazon CloudWatch, Amazon DynamoDB, Amazon EventBridge, Amazon Kinesis, Amazon VPC, Amazon WorkSpaces, AWS Config, AWS IAM Identity Center, AWS Secrets Manager, and AWS Security Hub.&lt;/p&gt;

&lt;p&gt;Two of these deserve some mention:&lt;br&gt;
&lt;strong&gt;IAM Identity Center&lt;/strong&gt; controls federated access across every account in an AWS organisation. T1556.007 demonstrates how an attacker with sufficient permissions can modify user attributes to hijack an identity and create backdoor permission sets.&lt;/p&gt;

&lt;p&gt;*&lt;em&gt;Security Hub *&lt;/em&gt; is the detection layer that attackers want to suppress first. T1562.001 covers how adversaries disable it alongside AWS Config to eliminate the centralized view of security posture.&lt;br&gt;
Both include verified CLI commands, CloudTrail events to monitor, and Cloud Attack Language YAML definitions.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Matrix View
&lt;/h2&gt;

&lt;p&gt;The original card-grid interface works well for finding individual techniques. It does not communicate the shape of coverage across the attack lifecycle.&lt;br&gt;
The new matrix view addresses this, modeled after the MITRE ATT&amp;amp;CK Navigator. It renders all 91 techniques in an 11-column tactic grid, color-coded by tactic. Each card shows the technique ID, title, and AWS service, and clicking navigates directly to the full technique page. Both views share the same search and filter state.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fopmy4qxmkhxgazqdg4q5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fopmy4qxmkhxgazqdg4q5.png" alt=" " width="800" height="503"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  What the First Month Revealed
&lt;/h2&gt;

&lt;p&gt;Two practitioner patterns stood out.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;IAM credential abuse&lt;/strong&gt; is the focus for practitioners. The most visited techniques are all T1078 variants: T1078 (Valid Accounts), T1078.004 (Cloud Accounts), and T1078.A001 (IAM Users). Practitioners are not here for just the static description. They already know IAM credential compromise is the most documented initial access vector, hence they want to see the real action: how techniques can be practically executed, the output/feedback from AWS, and corresponding CloudTrail events.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Practitioners skip descriptions&lt;/strong&gt; and go straight to execution. A significant share of readers on T1552.005 (Unsecured Credentials: EC2 Instance Metadata) skip the description entirely and head straight to loading the Attack Builder. They already know what EC2 Instance Metadata is. They want to run the technique and see what it looks like in practice. Funny enough, the specific curl command to the IMDS endpoint generates no CloudTrail event, which is precisely what makes it challenging to detect.&lt;/p&gt;

&lt;p&gt;If you want to see the Attack Builder in action before connecting your own environment, the Mitigant demo provides a pre-configured AWS environment where you can run techniques without any setup.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fngvmeab6yrcn9v9s3g6u.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fngvmeab6yrcn9v9s3g6u.png" alt=" " width="800" height="475"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Feedback Channels
&lt;/h2&gt;

&lt;p&gt;Every catalog page now has a Suggest a Technique or Report an Issue link in the footer. There is also a notification signup for anyone who wants to be kept in the loop as new techniques and services are added.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Comes Next
&lt;/h2&gt;

&lt;p&gt;The vision is to cover as many cloud attack techniques as possible: AWS-specific techniques from the AWS Threat Technique Catalog, the full MITRE ATT&amp;amp;CK Cloud matrix, and eventually Azure and Google Cloud Platform. We want your suggestions to shape that direction.&lt;/p&gt;

&lt;p&gt;Explore the catalog: &lt;a href="https://threats.mitigant.io/" rel="noopener noreferrer"&gt;https://threats.mitigant.io/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;For the full post including analytics, usage patterns, and detailed technique breakdowns, see the complete post on the Mitigant blog: &lt;a href="https://mitigant.io/en/blog/mitigant-threat-catalog-61-techniques-12-aws-services-added" rel="noopener noreferrer"&gt;https://mitigant.io/en/blog/mitigant-threat-catalog-61-techniques-12-aws-services-added&lt;/a&gt;&lt;/p&gt;

</description>
      <category>awssecurity</category>
      <category>threatdetection</category>
      <category>redteam</category>
      <category>penetrationtesting</category>
    </item>
    <item>
      <title>Mitigant Threat Catalog: Turning Static Cloud Techniques to Dynamic Executions</title>
      <dc:creator>Kennedy </dc:creator>
      <pubDate>Sun, 15 Feb 2026 16:55:00 +0000</pubDate>
      <link>https://dev.to/aws-builders/mitigant-threat-catalog-turning-static-cloud-techniques-to-dynamic-executions-46nb</link>
      <guid>https://dev.to/aws-builders/mitigant-threat-catalog-turning-static-cloud-techniques-to-dynamic-executions-46nb</guid>
      <description>&lt;p&gt;The MITRE ATT&amp;amp;CK Framework is indispensable for understanding adversary behavior, especially in cloud environments. It provides a structured taxonomy of tactics and techniques that defenders rely on to build and validate their security architectures. As a framework, it is deliberately consistent and abstract; the techniques are intended to be interpreted and operationalized by practitioners in their specific environments.&lt;/p&gt;

&lt;p&gt;Consider a sub-technique like &lt;strong&gt;T1078.004&lt;/strong&gt; (&lt;em&gt;Valid Accounts: Cloud Accounts&lt;/em&gt;); the framework indicates that adversaries may obtain and abuse credentials for cloud accounts to gain initial access, establish persistence, or escalate privileges. The interpretation work, however, is where things get interesting.&lt;/p&gt;

&lt;p&gt;There are several distinct procedures under T1078.004 that an attacker could leverage: creating a new IAM user, attaching a login profile for console access, generating long-lived access keys, or assuming cross-account roles. Each procedure maps to a different API call, a different CloudTrail event, and a different detection opportunity. Translating T1078.004 into the corresponding AWS CLI command:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;aws iam create-login-profile --user-name john-doe --password @3wewSwew
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;requires piecing together information from multiple sources, cross-referencing CloudTrail event names, and reverse-engineering what a real attack chain looks like at the CLI level.&lt;/p&gt;

&lt;p&gt;The &lt;a href="https://docs.aws.amazon.com/prescriptive-guidance/latest/aws-threat-techniques/" rel="noopener noreferrer"&gt;AWS Threat Techniques Catalog&lt;/a&gt; has done excellent work in this space, not only providing AWS-specific context for existing MITRE techniques but also introducing techniques not available in the MITRE ATT&amp;amp;CK and increasing overall understanding of cloud attack behavior. However, there are still gaps practitioners need to address before they become productive. Given that we address this gap at Mitigant and understand exactly how we have navigated these challenges, we thought it was worth closing it by providing a resource that helps defenders be more effective. We aim to complement the existing work by adding the executable layer: actual CLI commands, detection mappings, and structured definitions that can be plugged directly into automated security workflows.&lt;/p&gt;

&lt;h2&gt;
  
  
  Introducing the Mitigant Threat Catalog
&lt;/h2&gt;

&lt;p&gt;The Mitigant Threat Catalog was designed to close the gaps I mentioned in the last paragraphs. We recently published it as a free, publicly available resource. It is an interactive, open catalog of cloud attack techniques that operationalizes MITRE ATT&amp;amp;CK cloud techniques into actionable, executable formats. Each technique in the catalog is expressed in two forms:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;AWS CLI Commands:&lt;/strong&gt; Actual AWS CLI commands with realistic parameters and simulated output that mirrors what you would see in live AWS environments, along with the corresponding CloudTrail event names your detection rules should trigger on. If you are writing Sigma rules or tuning your SIEM, this information is essential.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cloud Attack Language (CAL) Definitions.&lt;/strong&gt; Each technique also ships with a complete YAML definition that can be loaded directly into the &lt;a href="https://mitigant.io/en/blog/mitigant-attack-builder-custom-cloud-attacks-in-seconds" rel="noopener noreferrer"&gt;Attack Builder&lt;/a&gt; and executed in your browser, or taken and integrated into your own workflows. The Cloud Attack Language is a YAML-based schema for defining multi-step cloud attacks, built on the popular &lt;a href="https://github.com/redcanaryco/atomic-red-team" rel="noopener noreferrer"&gt;Atomic Red Team&lt;/a&gt; format. It adds AWS service-type tagging and explicit step chaining designed for cloud attack scenarios. A comprehensive description of CAL is available &lt;a href="https://mitigant.io/en/blog/introducing-the-mitigant-threat-catalog-from-static-descriptions-to-dynamic-executions" rel="noopener noreferrer"&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Here is what CAL looks like:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight yaml"&gt;&lt;code&gt;&lt;span class="na"&gt;name&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;IAM Credential Persistence&lt;/span&gt;
&lt;span class="na"&gt;attack_technique&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;T1078.004&lt;/span&gt;
&lt;span class="na"&gt;description&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;Creates a login profile for persistence&lt;/span&gt;
&lt;span class="na"&gt;supported_platforms&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
    &lt;span class="pi"&gt;-&lt;/span&gt; &lt;span class="s"&gt;iaas:aws&lt;/span&gt;
&lt;span class="na"&gt;service-type&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;IAM&lt;/span&gt;
&lt;span class="na"&gt;input_arguments&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
    &lt;span class="na"&gt;user_name&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
        &lt;span class="na"&gt;description&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;Option --user-name for type string&lt;/span&gt;
        &lt;span class="na"&gt;default&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;john-doe&lt;/span&gt;
    &lt;span class="na"&gt;password&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
        &lt;span class="na"&gt;description&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;Option --password for type string&lt;/span&gt;
        &lt;span class="na"&gt;default&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="s"&gt;@3wewSwew"&lt;/span&gt;
&lt;span class="na"&gt;attack_step_definitions&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
    &lt;span class="pi"&gt;-&lt;/span&gt; &lt;span class="na"&gt;step&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="m"&gt;1&lt;/span&gt;
      &lt;span class="na"&gt;command&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;aws iam create-user --user-name ${user_name}&lt;/span&gt;
    &lt;span class="pi"&gt;-&lt;/span&gt; &lt;span class="na"&gt;step&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="m"&gt;2&lt;/span&gt;
      &lt;span class="na"&gt;command&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="pi"&gt;&amp;gt;&lt;/span&gt;
        &lt;span class="s"&gt;aws iam create-login-profile&lt;/span&gt;
        &lt;span class="s"&gt;--user-name ${user_name} --password ${password}&lt;/span&gt;
      &lt;span class="na"&gt;cleanup_command&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="pi"&gt;&amp;gt;&lt;/span&gt;
        &lt;span class="s"&gt;aws iam delete-login-profile --user-name ${user_name}&lt;/span&gt;
    &lt;span class="pi"&gt;-&lt;/span&gt; &lt;span class="na"&gt;step&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="m"&gt;3&lt;/span&gt;
      &lt;span class="na"&gt;command&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;aws iam create-access-key --user-name ${user_name}&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;In addition to the AWS CLI commands and CAL definitions, each technique includes detection and mitigation guidance with practical, technique-specific recommendations.&lt;/p&gt;

&lt;p&gt;Mitigant Threat Catalog launches with 30 techniques spanning 12 of 14 ATT&amp;amp;CK tactics and covering 20 AWS services: from IAM credential abuse (T1078) to S3 ransomware via SSE-C encryption (T1486.A001) and AWS Organizations manipulation (T1666).&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2mmzfvy21okulcdktgo4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2mmzfvy21okulcdktgo4.png" alt="Mitigant Threat Catalog" width="800" height="465"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Why Free and Public?
&lt;/h2&gt;

&lt;p&gt;Because &lt;a href="https://mitigant.io/en/blog/cloud-attack-emulation-enhancing-cloud-native-security-with-threat-informed-defense" rel="noopener noreferrer"&gt;Threat-Informed Defense&lt;/a&gt; should not be gated. I have consistently shared this kind of knowledge publicly, including MITRE ATT&amp;amp;CK breakdowns, collaborations with &lt;a href="https://www.mitigant.io/en/blog/emulating-and-detecting-scattered-spider-like-attacks" rel="noopener noreferrer"&gt;Sekoia&lt;/a&gt; on Scattered Spider detection, or joint work with &lt;a href="https://www.mitigant.io/en/blog/leveraging-adversary-emulation-for-effective-cloud-forensic-analysis" rel="noopener noreferrer"&gt;Cado Security&lt;/a&gt; on cloud forensics. The goal has always been to equip cloud security practitioners with practical, actionable resources. Mitigant Threat Catalog is a natural extension of that effort.&lt;/p&gt;

&lt;h2&gt;
  
  
  What's Next
&lt;/h2&gt;

&lt;p&gt;This is a living catalog. I will keep adding techniques, expanding AWS service coverage, and keeping pace with new ATT&amp;amp;CK releases as AWS services evolve and new APIs introduce new attack surfaces. The Cloud Attack Language will continue to evolve alongside it. If you have suggestions for techniques to add or spot something that could be improved, I would love to hear from you at &lt;strong&gt;&lt;a href="mailto:contact@mitigant.io"&gt;contact@mitigant.io&lt;/a&gt;&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Explore the catalog: &lt;a href="https://threats.mitigant.io/" rel="noopener noreferrer"&gt;threats.mitigant.io&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;For the full deep dive, including prior MITRE ATT&amp;amp;CK analysis work, partner collaborations, and a comprehensive description of the Cloud Attack Language, see the &lt;a href="https://mitigant.io/en/blog/introducing-the-mitigant-threat-catalog-from-static-descriptions-to-dynamic-executions" rel="noopener noreferrer"&gt;complete post on the Mitigant blog&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cloudsecurity</category>
      <category>mitre</category>
      <category>redteaming</category>
      <category>securityoperations</category>
    </item>
    <item>
      <title>Threat Modeling For Cloud Native Infrastructure</title>
      <dc:creator>Kennedy </dc:creator>
      <pubDate>Sat, 24 Sep 2022 14:34:58 +0000</pubDate>
      <link>https://dev.to/run2obtain/threat-modeling-for-cloud-native-infrastructure-281</link>
      <guid>https://dev.to/run2obtain/threat-modeling-for-cloud-native-infrastructure-281</guid>
      <description>&lt;p&gt;&lt;a href="https://owasp.org/www-community/Threat_Modeling"&gt;OWASP defines&lt;/a&gt; a threat model as a structured representation of all the information that affects the security of an application. It allows a view a view of applications and its environment through security lens. Threat models can be applied to virtually every digital system - serverless applications, cloud infrastructure, mobile and web applications.&lt;/p&gt;

&lt;p&gt;However, threat modeling for cloud-native infrastructure requires a mindset shift ! In traditional security scenarios, heavy emphasis is made on the use of data flow diagrams, attack graphs, attack trees etc.&lt;/p&gt;

&lt;p&gt;Realistically though, some of these approaches might hinder agility and not be easily digestible for DevSecOps teams. Developers and SRE teams use several tools and workflows for their daily work. Some of these tools &amp;amp; workflows would be better appreciated than the traditional threat modeling tools.&lt;/p&gt;

&lt;p&gt;For example, observability tools like &lt;a href="https://aws.amazon.com/xray/"&gt;AWS X-Ray&lt;/a&gt; can be leveraged to understand attacker flows rather than using attack trees. If possible, both kids of visualization can be used. The key thing is empathy, the security pulse of the participants should be felt and used as a yardstick for selecting commensurate approaches.&lt;/p&gt;

&lt;p&gt;Another really cool thing, a mix of qualitative and quantitative approaches is feasible. Cloud security solutions like Cloud Security Posture Management  (CSPM) and Cloud Workload Protection Platforms (CWPP) provide unimaginable insights into cloud infrastructure and applications. These tools can be useful for deriving info on cloud resources usage, deployment info (e.g. regions), configuration errors, vulnerabilities, security risk info e.t.c.&lt;/p&gt;

&lt;p&gt;Furthermore, the references from OWASP e.g. the &lt;a href="https://owasp.org/www-community/Threat_Modeling"&gt;Threat Modeling document&lt;/a&gt; remain invaluable resources to strike a balance.&lt;/p&gt;

&lt;p&gt;Neglecting threat modeling exercises in modern cloud environments is indeed a recipe for disaster. The sheer amount of complexity is beyond our mental models hence the need for well-structured, intentional, and pragmatic threat analysis.&lt;/p&gt;

&lt;p&gt;Gladly though, it seems a lot of security teams are still passionate about threat modeling, the overwhelming reception I received from a &lt;a href="https://www.linkedin.com/posts/activity-6974704367178289152-7oky"&gt;related post on LinkedIn&lt;/a&gt; is evident! Wow 🎉&lt;/p&gt;

&lt;p&gt;I recently went through an excellent &lt;a href="https://explore.skillbuilder.aws/learn/course/external/view/elearning/13274/threat-modeling-the-right-way-for-builders-workshop"&gt;AWS threat modeling workshop&lt;/a&gt; I deemed it instructive to share a few lessons I personally grabbed:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--lFT4oF_a--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/45smk13pw4223w05xv4o.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--lFT4oF_a--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/45smk13pw4223w05xv4o.png" alt="Image description" width="800" height="487"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Threat modeling is interdisciplinary &amp;amp; cross-functional! All stakeholders need to be part of the show; they probably have better context and understanding than security teams. The security folks' main job is to coordinate the session and wear different hats (black, grey, white …).🤠&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The target application or infrastructure should be split into smaller parts to enable deeper analysis. A complex AWS Connected Vehicle Solution was used in the workshop, going through the entire application in a go would not be optimal.🍕&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--lP_bQeLs--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/dfrfv6vegb0raxzefwzn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--lP_bQeLs--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/dfrfv6vegb0raxzefwzn.png" alt="Image description" width="800" height="337"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Leverage user stories to understand different use-cases and threat vectors. 🐞🐞&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Clear documentation is not optional. In the workshop a workbook is provided as a guide/template. Use your preferred documentation system e.g. Confluence. Hopefully, its the same system used by the other teams participating 😇&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Take advantage of 😷 Adam Shostack's 4 Question Frame for threat modeling:👇&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;👉 What are we working on? Use data flow diagrams to represent features and data flows between the various elements e.g. AWS databases, S3 , API gateway.&lt;/p&gt;

&lt;p&gt;👉 What can go wrong? - What are the threat vectors to be considered  and possible impacts. - STRIDE is super useful here.&lt;/p&gt;

&lt;p&gt;👉 What are we going to do about it? This is about risk response strategies - avoid, mitigate, transfer or accept.&lt;/p&gt;

&lt;p&gt;👉 Did we do a good enough job? This is really tricky and difficult to measure during the session. Lessons learnt are to be taken and applied to other parts of the infrastructure.&lt;/p&gt;

</description>
      <category>cloudsecurity</category>
      <category>threatmodeling</category>
      <category>aws</category>
      <category>cloudnative</category>
    </item>
    <item>
      <title>What COVID-19 Taught the Cyber Security Industry: Security Chaos Engineering</title>
      <dc:creator>Kennedy </dc:creator>
      <pubDate>Sat, 07 Aug 2021 07:27:03 +0000</pubDate>
      <link>https://dev.to/aws-builders/what-covid-19-taught-the-cyber-security-industry-security-chaos-engineering-5fpo</link>
      <guid>https://dev.to/aws-builders/what-covid-19-taught-the-cyber-security-industry-security-chaos-engineering-5fpo</guid>
      <description>&lt;h2&gt;
  
  
  Vaccinology
&lt;/h2&gt;

&lt;p&gt;The COVID-19 pandemic has significantly changed our lifestyles, the impact is far-reaching and definitely unforgettable. Our view of what constitutes humanity e.g. business, education, healthcare has been redefined. Ultimately, rapid adaptation has been the ubiquitous option, paving the way for emerging and innovative solutions to gain unparalleled adoption. However, the most prominent of these innovative solutions is the ecosystem surrounding the accelerated development, testing, distribution and administration of COVID-19 vaccines.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fokgk8yww44dhi9vpb1aq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fokgk8yww44dhi9vpb1aq.png" alt="measles_vaccination"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Fig. 1 The Impact of Vaccines on Measles&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Talking about vaccines, the truth is the underlying concepts of vaccinology date back to the 17th century when Buddhist monks drank snake venom to confer immunity from snake bites. However, scientific methods were first applied in the 18th century, by Edward Jenner. Since then, vaccinology has matured dramatically, highly influenced by the need to eradicate diseases. Clearly, vaccines are core fundamentals for human resilience to diseases. For example, newly born babies get a shot of hepatitis B within 12 hours after birth to increase their chances to survive (resilience) or at least lead a normal, healthy life. Through this approach and several similar related methods, several diseases e.g measles (Fig 1) have been eradicated.&lt;/p&gt;

&lt;h2&gt;
  
  
  Chaos Engineering
&lt;/h2&gt;

&lt;p&gt;The most important lesson drawn from vaccines is that &lt;strong&gt;&lt;em&gt;true resilience&lt;/em&gt;&lt;/strong&gt; is achieved by introducing chaos (fake chaos) into a stable system to identify and mitigate the hidden problems (real chaos). This is the theory behind vaccines, by introducing non-malicious substances into biological systems, the natural immune system is boosted and hardened to overcome diseases. This simple idea that has enabled human resilience to diseases over several centuries is the fundamental theory behind &lt;a href="https://principlesofchaos.org/" rel="noopener noreferrer"&gt;chaos engineering&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Netflix pioneered chaos engineering to overcome the digital pandemic that threatened the survival of the streaming business in the &lt;a href="https://about.netflix.com/en/news/completing-the-netflix-cloud-migration" rel="noopener noreferrer"&gt;aftermath of migrating to AWS&lt;/a&gt;. The decision to adopt chaos engineering, despite sounding crazy at that time, helped Netflix survive several AWS outages. This is indeed similar to how humanity has survived epidemics via vaccination. In recent years, chaos engineering has gained traction as enterprises face different kinds of digital pandemics on the path to digital transformation. According to Werner Vogels (CTO@ Amazon), “Failures are a given, and everything will eventually fail”, so literally failures are bound to occur, the question is when and how we prepare to prevent or minimize the resulting impact. Chaos engineering proffers options for addressing these concerns, by proactively experimenting on systems. Consequently, several chaos engineering products and services have emerged, including offerings from cloud service providers e.g. the &lt;a href="https://aws.amazon.com/fis/" rel="noopener noreferrer"&gt;AWS Fault Injection Simulator&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  Security Chaos Engineering
&lt;/h2&gt;

&lt;p&gt;Failures often manifest with security implications by impacting confidentiality, availability and integrity. Such security failures are majorly man-made aka cyber-attacks or can be due to human errors or misconfigurations. Due to the rapid adoption of digital systems, security failures are increasing at a monumental pace. The COVID-19 pandemic is further exacerbating these cybersecurity challenges as enterprises strive to be technology-driven. However, traditional cyber-security mechanisms are struggling to grapple with the emerging security challenges. On the one hand, humans operators are incapable of completely and continuously maintaining clear mental models of modern systems. This is is a prerequisite for designing efficient security systems, furthermore, these modern systems require more innovative security mechanisms due to new operating models that differ from traditional systems. The bulk of the emerging technologies are cloud-native, increasingly complex and dynamic, thus offering little or no opportunity for gate-keeping style security mechanisms. Therefore, innovative cyber security solutions are imperative to overcome these evolving security challenges. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fz3hm1wtpzxzdg9vhwv9h.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fz3hm1wtpzxzdg9vhwv9h.png" alt="cloud-native-attack-surface"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Fig 2. Attackers view cloud-native systems as a single attack objective.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Security chaos engineering is an emerging sub-discipline, pioneered by Aaron Rinehart  to potentially addresses the aforementioned challenges. It leverages fault injection techniques to detect and mitigate security vulnerabilities especially in complex systems e.g. cloud-native infrastructure. The same chaos engineering techniques are employed while focusing on security attributes. The state-of-the-art cloud-native security systems focus on multiple abstraction layers commonly referred to as the 4Cs of cloud-native security: code, containers, cluster and cloud. Most cloud-native security systems are designed to tackle security issues emerging from at least two of these layers. Effectively, these layers are treated as silos, due to the logical barriers and existing complexities, unfortunately, this viewpoint doesn’t capture or represent attackers’ view. Attackers literally see a single system (a unified attack objective) or otherwise plan to laterally move across the multiple abstraction layers regardless of the logical demarcations (Fig 2). Attacks orchestrating these kinds of multi-layered, lateral movements are becoming more commonplace in recent times.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpqsdkx5irfbzhr5pkaew.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpqsdkx5irfbzhr5pkaew.png" alt="cloud-native-security-overview"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Fig 3. Cloud-native security systems need to adopt an attacker-centric lens to have clear visibility across the 4Cs of cloud-native security.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Overcoming these security challenges requires the adoption of viewpoint, essentially, the emerging cloud-native security systems ought to enable unified visibility and operations across cloud-native systems, as illustrated in Fig.3. Security chaos engineering provides opportunities for achieving this objective, by injecting failures across the entire system, the resulting outcome enables clear visibility. The fault injection campaigns produce security insights suitable for detecting vulnerabilities, especially those with casual relationships across abstraction layers. Furthermore, unlike traditional security systems, the derived security insights are approx. 100% actionable, given vulnerabilities are detected prior to cyber attacks. Most cloud-native systems act in the opposite, due to their reactive nature, events occur before action is taken thereby affording attackers windows-of-opportunity (which can be over 200 days of attacker dwell-time). It is noteworthy that, the security insights gained via security chaos engineering campaigns can be added to other security systems to enrich intelligence, thus enhancing visibility and achieving proactiveness(Fig 4). imperative to overcome these evolving security challenges.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1gbaj5f54tgqf00qjtpl.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1gbaj5f54tgqf00qjtpl.png" alt="sce_security_architecture"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Fig 4. Integration of knowledge gained from Security Chaos Engineering into into a security architecture.&lt;/em&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Final thoughts
&lt;/h2&gt;

&lt;p&gt;Just as diseases are effectively tackled with vaccines, security chaos engineering offers opportunities for effectively overcoming cyber-attacks at various abstraction layers. This is one of the fundamental lessons the cybersecurity industry can derive from the COVID-19 pandemic: true resilience comes by constructive security fault injection! Security in the cloud-native era is more about adopting resilient postures than just being secure. By applying the concepts of security chaos engineering to cloud-native systems, there are opportunities for ensuring the security attributes are intact, by verifying that various security controls (predictive, detective, protective &amp;amp; corrective) function as expected. This approach leads to a proactive security methodology and affords security to be ahead of the game.&lt;/p&gt;

</description>
      <category>aws</category>
      <category>cloudsecurity</category>
      <category>cloudnative</category>
      <category>cybersecurity</category>
    </item>
  </channel>
</rss>
