This workshop will help users with some AWS experience to understand how to exploit AWS IAM (Identity and Access Management) configuration weaknesses in order to obtain elevated privileges. During this hand on workshop, we will cover:
- Overview of AWS security model and how IAM works - How users, roles, groups and policies are used by organisations to give permissions to AWS resources - Common security weaknesses and misconfigurations that could allow privilege escalation - How to identify and exploit these weaknesses - Tools and resources to assist with the process
Jay Kalsi a Principal Security Consultant at one of Asia Pacific's biggest financial organisations, who has focused on penetration testing of Cloud, Containerisation and Big Data deployments.
Friday October 11, 2019 10:30 - 13:30 CEST
05. La TrappeNovotel