100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Summary

Summary Cyber Threats in AWS: A Holistic Approach to Protecting Your Cloud Infrastructure

Rating
-
Sold
-
Pages
12
Uploaded on
17-12-2024
Written in
2024/2025

this document describer information about different cyber attackes on cloud base companies faces day to day life. specific aws tools effected by the cyber attack. appproch to protect cloud infrastructure.

Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Course

Document information

Uploaded on
December 17, 2024
Number of pages
12
Written in
2024/2025
Type
Summary

Subjects

Content preview

Cyber Threats in AWS: A
Holistic Approach to
Protecting Your Cloud
Infrastructure




Presented by Nikki Dwivedi




1

, Service name: (1)AWS EC2
Attacks [Description and Source]:
1. Credentials Stuffing
[SSH port open to the world leading to password brute-forcing]

Managing servers in the cloud, such as AWS EC2 instances, often involves using
Secure Shell Access (SSH) for remote administration. While SSH keys are
recommended for their security benefits, many users still create multiple user
accounts with passwords. Leaving the default SSH port open to the internet
attracts automated attackers who attempt to brute-force login credentials,
exploiting password reuse vulnerabilities (known as credentials stuffing).
Traditional defenses involve network monitoring but can be impractical for cloud
environments.

‘https://kloudle.com/blog/4-most-common-misconfigurations-in-aws-ec2-instance
s/’



2. SSRF(Server-Side Request Forgery)
SSRF occurs when an attacker manipulates a web application to make
unintended requests to internal resources or to external systems that the
application has access to. If an EC2 instance is vulnerable to SSRF, an attacker
could potentially manipulate the instance to make requests to internal AWS
metadata endpoints or other AWS services, leading to unauthorized access or
information disclosure. Proper input validation and access controls are crucial to
mitigate SSRF vulnerabilities.

‘https://kloudle.com/blog/4-most-common-misconfigurations-in-aws-ec2-instance
s/’


3. Running Old, Unpatched Versions
Modern applications are built on complex code bases that, like any system, can


2
R60,66
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
nikkivdwivedi

Get to know the seller

Seller avatar
nikkivdwivedi
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
11 months
Number of followers
0
Documents
1
Last sold
-

0,0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions