, 3 tweets, 1 min read Read on Twitter
Let’s talk about security measures that didn’t seem to be in place, based on my reading of the CapitalOne case.

1) Lots of PII, SSNs, etc not individually encrypted or tokenized. At-rest encryption of these is necessary, but not sufficient.
2) Use of IAM role creds from *outside* the cloud env was not detected.

3) Access of what appear to be logging S3 buckets, also from outside the cloud env, was not detected.

CloudTrail event monitoring is your friend and should be your #1 priority for AWS security.
4) AWS Macie would have identified massive amounts of PII and other sensitive info in the S3 buckets.

5) AWS GuardDuty would have alerted on some of this too (e.g. S3 access by Tor exit node).

Turn these on, send alerts to your security team *and* team that owns the AWS asset.
Missing some Tweet in this thread?
You can try to force a refresh.

Like this thread? Get email updates or save it to PDF!

Subscribe to Dino A. Dai Zovi
Profile picture

Get real-time email alerts when new unrolls are available from this author!

This content may be removed anytime!

Twitter may remove this content at anytime, convert it as a PDF, save and print for later use!

Try unrolling a thread yourself!

how to unroll video

1) Follow Thread Reader App on Twitter so you can easily mention us!

2) Go to a Twitter thread (series of Tweets by the same owner) and mention us with a keyword "unroll" @threadreaderapp unroll

You can practice here first or read more on our help page!

Follow Us on Twitter!

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just three indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!