A common curated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are obviously related to AWS Security. List inspired by the awesome list thing.
- Hands-On AWS Penetration Testing with Kali Linux by PackT
- Mastering AWS Security by PackT
- Security Best Practices on AWS by PackT
- Cloud Security Automation
- AWS Automation Cookbook
- AWS Lambda Security Best Practices - It's published by Puresec and it has a good overview on AWS Lambda Security Best Practices which we should follow
- AWS Security by Manning - Very nice book in Progress, yet to release.
AWS has awesome lists of whitepapers related to AWS Security. We are adding few important one here. You can anytime check more for updated or new security whitepapers here
- AWS Overview - One of the important whitepaper to understand an overview of AWS
- AWS Security Best Practices
- AWS Security Pillar
- Introduction to Security By Design
- AWS Overview of Security Processes
- AWS Well Architected Framework
- NIST Cybersecurity Framework
- AWS Risk And Compliance
- AWS Security Checklist
- AWS HIPAA Compliance Whitepaper
- Overview of AWS Lambda Security
- AWS Security Incident Response
- AWS KMS Best Practices
- Encrypting File Data with Amazon Elastic File System
- Security of AWS CloudHSM backups
- AWS Cloud Adoption Framework
- AWS CAF Security perspective
- AWS Auditing Security Checklist
- Introduction to AWS Security Processes
- AWS CIS Foundation benchmark
- Security overview of AWS Lambda
- The fundamentals of AWS Security - Youtube
- AWS Security by Design - Youtube
- Account Security with IAM - Youtube
- AWS re:Inforce 2019 Security Best Practices - Youtube
- AWS Cloud Security Playlist - Youtube
- A cloud security architecture workshop by RSA - Youtube
- AWS Cloud Security - Oreilly
- AWS Security official blog
- AWS in Plain English
- Why the CIA trusts AWS
- Fundamentals of AWS Security - Presentation from AWS
- AWS Security primer - Nice overview and quick run through AWS Security resources.
- How a whitehat hacker earned $1500 in 15 minutes due to AWS S3 misconfiguration - It was fun going through the blog. You can learn from this article too.
- A deep dive into AWS S3 access control - It will give a very good grip on how S3 buckets can be exploited. Lengthy but worth to go through.
- How Federico hacked a whole EC2 network during a penetration test
- A short blog on hacking AWS - Examples are based on cloudgoat.
- S3 security is flawed by design - This article will show you why you need to be extra careful when using AWS S3.
- 51 Tips for Security AWS(pdf) - McAfee
- The rolw of API gateways in API security
- AWS Fundamentals: Address Security Risks - Coursera
- Cloud Computing Security - Coursera
- AWS: Getting started with Cloud Security - EdX
- AWS Certified Security Specialty - Udemy by Zeal Vora
- AWS Certified Security Specialty - From Acloud.guru
- AWS Advanced Security - Udemy
- AWS for Architects: Advanced Security - Linkedin Learn by Lynn Langit
- Practical Event Driven Security with AWS - Acloud.guru
- Learning Path for AWS Security - Nicely designed the learning path who wants to be an AWS Security Experts from Acloud.guru
- Cloud Hacking course - From NotSoSercure
- Breaking and Pwning Apps and Servers in AWS and Azure - Previously an instructor led training now released as free and open source courseware for Cloud Pentesters
- AWS Security Products - Official - Few Important tools that you should consider are:
- 1.1 AWS IAM: AWS Identity and Access Management (IAM) enables you to manage access to AWS services and resources securely
- 1.2 CloudWatch: CloudWatch is the AWS monitoring tool
- 1.3 CloudTrail: AWS CloudTrail is a service that enables governance, compliance, operational auditing, and risk auditing of your AWS account
- 1.4 AWS Inspector: AWS inspector is a security assessment service that does vulnerability and best-practice scanning for AWS applications
- 1.5 Amazon GuardDuty: GuardDuty is a managed threat detection service that is simple to deploy, and scales with your infrastructure
- 1.6 AWS KMS: AWS KMS is a secure and resilient service that uses hardware security modules that have been validated under FIPS 140-2
- 1.7 AWS Shield: AWS Shield is a managed DDoS protection service. AWS Shield can protect EC2, Load balancers, CloudFront, Global Accelerator, and Route 53 resources
- 1.8 AWS Trusted Advisor: AWS Trusted Advisor is an online tool that provides you real time guidance to help you provision your resources following AWS best practices
- 1.9 AWS Config: AWS Config is a service that enables you to assess, audit, and evaluate the configurations of your AWS resources
- 1.10 Security Hub: AWS Security Hub gives you a comprehensive view of your high-priority security alerts and security posture across your AWS accounts
- 1.11 AWS WAF: AWS WAF is a web application firewall that helps protect your web applications or APIs against common web exploits that may affect availability, compromise security, or consume excessive resources
- 1.12 AWS Macie: Macie is all about protecting data. It is a machine learning service that watches data access trends and finds anomalies to spot data leaks and unauthorized data access.
- Arsenal of AWS Security Tools - Collection of all security category tools and products
- AWS Security Automation - Collection of scripts and resources for DevSecOps and Automated Incident Response Security
- Security Monkey - Monitors AWS, GCP, OpenStack, and GitHub orgs for assets and their changes over time.
- truffleHog - Searches through git repositories for high entropy strings and secrets, digging deep into commit history
- gitleaks - Audit git repos for secrets
- AWS Security Benchmark - Open source demos, concept and guidance related to the AWS CIS Foundation framework.
- S3 Inspector - Tool to check AWS S3 bucket permissions
- ScoutSuite - Multi-Cloud Security Auditing Tool
- Prowler - AWS Security Best Practices Assessment, Auditing, Hardening and Forensics Readiness Tool.
- AWS Vault - A vault for securely storing and accessing AWS credentials in development environments
- AWS PWN - A collection of AWS penetration testing junk
- Pacu - AWS Penetration Testing Toolkits
- Zeus - AWS Auditing and Hardening tool
- Cloud Mapper - Analyze your AWS environments (Python)
- AWS Well Architected Security Labs
- Flaws to learn common mistakes in AWS through challenge
- Flaws2 focuses on AWS security concepts through various challenge levels
- CloudGoat - Vulnerable by Design AWS infrastructure setup tool
- OWASP ServerlessGoat - OWASP ServerlessGoat is a deliberately insecure realistic AWS Lambda serverless application maintained by OWASP for educational purposes.
- AWS S3 CTF Challenges with solutions
- AWS CTF with practical scenario
- AWS Security breaches - 2017
- 200 million voters data leak - A lesson in AWS Security
- Imperva blames data breach on Stolen AWS API keys
- Tesla's Amazon cloud account was hacked and used to mine cryptocurrency
- 10 worst Amazon S3 breaches
- Lion Air the Latest to Get Tripped Up by Misconfigured AWS S3
Please refer the guidelines at contribute.md for details.
Thanks to the following folks who made contributions to this project.
Get your name listed here