Useful tools for AWS cloud security

[German]A tip for people who are responsible for the administration of Amazon Cloud Solutions (AWS etc.). In order to detect weaknesses early, you should be aware of the IP addresses and subdomains used.

An orphaned subdomain that refers to a service that no longer exists could be taken over by a third party (this has happened many times before). However, there are tools that can be used to check whether, for example, subdomains refer to services that no longer exist and can thus be taken over. Other tools allow you to list all subdomains or public IP addresses associated with an AWS account.

The tweet above contains links to various tools available on GitHub to support specific tasks in this area. It might help some blog readers

This entry was posted in Cloud, Security and tagged , . Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *