<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Infrastructure Security on Latacora</title><link>https://www.latacora.com/categories/infrastructure-security/</link><description>Recent content in Infrastructure Security on Latacora</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Tue, 27 Jan 2026 15:00:00 -0600</lastBuildDate><atom:link href="https://www.latacora.com/categories/infrastructure-security/index.xml" rel="self" type="application/rss+xml"/><item><title>Latacora Achieves AWS Advanced Tier Services Partner Status</title><link>https://www.latacora.com/blog/2026/01/27/aws-advanced-tier-status/</link><pubDate>Tue, 27 Jan 2026 15:00:00 -0600</pubDate><guid>https://www.latacora.com/blog/2026/01/27/aws-advanced-tier-status/</guid><description>&lt;p&gt;We are thrilled to announce a major milestone for Latacora: we have achieved
the &lt;strong&gt;Amazon Web Services (AWS) Advanced Tier Services Partner status&lt;/strong&gt; within
the AWS Partner Network (APN).&lt;/p&gt;
&lt;p&gt;This designation reflects Latacora’s technical expertise and diligence in
delivering exceptional cloud security and compliance solutions to our clients,
and confirms that we have successfully completed a rigorous validation process
demonstrating a proven track record of customer success delivered by a team of
AWS-certified professionals with specialized technical capabilities.&lt;/p&gt;</description></item><item><title>ECS on EC2: Covering Gaps in IMDS Hardening</title><link>https://www.latacora.com/blog/2025/10/02/ecs-on-ec2-covering-gaps-in-imds-hardening/</link><pubDate>Thu, 02 Oct 2025 11:18:59 -0700</pubDate><guid>https://www.latacora.com/blog/2025/10/02/ecs-on-ec2-covering-gaps-in-imds-hardening/</guid><description>&lt;h2 id="introduction" class="heading-with-anchor"&gt;
&lt;a href="#introduction" class="heading-anchor-link" aria-label="Link to Introduction"&gt;
Introduction
&lt;span class="heading-anchor-icon" aria-hidden="true"&gt;#&lt;/span&gt;
&lt;/a&gt;
&lt;/h2&gt;
&lt;p&gt;AWS ECS is a widely-adopted service across industries. To illustrate the scale
and ubiquity of this service, over 2.4 billion Amazon Elastic Container Service
tasks are launched every week (&lt;a href="https://containersonaws.com" target="_blank" rel="noopener noreferrer"&gt;source&lt;/a&gt;) and over 65% of all
new AWS containers customers use Amazon ECS (&lt;a href="https://www.youtube.com/watch?v=C7HUkG_tu90" target="_blank" rel="noopener noreferrer"&gt;source&lt;/a&gt;).&lt;/p&gt;
&lt;p&gt;There are two primary &lt;a href="https://docs.aws.amazon.com/AmazonECS/latest/developerguide/launch_types.html" target="_blank" rel="noopener noreferrer"&gt;launch types&lt;/a&gt; for ECS: Fargate and
EC2. The choice between them depends on &lt;a href="https://containersonaws.com/blog/2023/ec2-or-aws-fargate/" target="_blank" rel="noopener noreferrer"&gt;factors&lt;/a&gt; like
&lt;a href="https://aws.amazon.com/blogs/containers/theoretical-cost-optimization-by-amazon-ecs-launch-type-fargate-vs-ec2/" target="_blank" rel="noopener noreferrer"&gt;cost&lt;/a&gt;, performance, operational overhead, and the
variability of your workload.&lt;/p&gt;</description></item><item><title>Introducing Replik8s, a Modern Security Tool for Kubernetes</title><link>https://www.latacora.com/blog/2025/09/22/introducing-replik8s/</link><pubDate>Mon, 22 Sep 2025 12:00:00 -0400</pubDate><guid>https://www.latacora.com/blog/2025/09/22/introducing-replik8s/</guid><description>&lt;h2 id="introduction" class="heading-with-anchor"&gt;
&lt;a href="#introduction" class="heading-anchor-link" aria-label="Link to Introduction"&gt;
Introduction
&lt;span class="heading-anchor-icon" aria-hidden="true"&gt;#&lt;/span&gt;
&lt;/a&gt;
&lt;/h2&gt;
&lt;p&gt;Security tools are often designed to highlight specific issues by consuming
APIs and applying predefined logic. Each tool implements its own data
structures, storage formats, and evaluation logic. While effective in narrow
contexts, this approach creates challenges for teams managing a diverse
toolset. Moreover, most tools are optimized to fetch only the data needed for
specific findings, limiting their utility in broader contexts such as incident
response or historical analysis.&lt;/p&gt;</description></item><item><title>Datomic and Content Addressable Techniques: An Ultimate Data Wonderland</title><link>https://www.latacora.com/blog/2024/09/13/datomic-and-content-addressable-techniques/</link><pubDate>Fri, 13 Sep 2024 12:00:00 -0500</pubDate><guid>https://www.latacora.com/blog/2024/09/13/datomic-and-content-addressable-techniques/</guid><description>&lt;p&gt;Latacora collects and analyzes data about services our clients use. You may
have read about &lt;a href="https://www.latacora.com/blog/2023/11/01/our-approach-to-building-security-tooling/" target="_self" rel=""&gt;our approach to building security
tooling&lt;/a&gt;, but the tl;dr
is we make requests to all the (configuration metadata) read-only APIs available
to us and store the results in S3. We leverage the data to understand our clients'
infrastructure and identify security issues and misconfigurations. We retain the
files (&amp;ldquo;snapshots&amp;rdquo;) to support future IR/forensics efforts.&lt;/p&gt;
&lt;p&gt;This approach has served us well, but the limited scope of a snapshot meant
there was always a problem of first needing to figure out which files to look
at. We love &lt;code&gt;aws s3 sync&lt;/code&gt; and &lt;code&gt;grep&lt;/code&gt; as much as anyone but security analysis
requires looking for complex relationships between resources; text search is,
at best, only a Bloom filter. What we really wanted was a performant way to ask
any question across all the data we have for a client that would support
complex queries using logic programming.&lt;/p&gt;</description></item><item><title>Remediating AWS IMDSv1</title><link>https://www.latacora.com/blog/2021/08/11/remediating-aws-imdsv1/</link><pubDate>Wed, 11 Aug 2021 12:16:23 -0400</pubDate><guid>https://www.latacora.com/blog/2021/08/11/remediating-aws-imdsv1/</guid><description>&lt;p&gt;&lt;em&gt;2024-12-17 Updated to include &lt;a href="#declarative-policies" target="_self" rel=""&gt;Declarative Policies&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Compute resources in AWS (for example, EC2 instances, ECS tasks/services, etc.)
get access to AWS credentials, such as temporary instance role credentials, via
the &lt;a href="https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html" target="_blank" rel="noopener noreferrer"&gt;Instance Metadata Service (IMDS)&lt;/a&gt;. The compute resources use these
credentials to access other AWS services such as SQS, DynamoDB and Secrets
Manager.&lt;/p&gt;
&lt;h2 id="introduction-problems-with-imdsv1" class="heading-with-anchor"&gt;
&lt;a href="#introduction-problems-with-imdsv1" class="heading-anchor-link" aria-label="Link to Introduction: Problems with IMDSv1"&gt;
Introduction: Problems with IMDSv1
&lt;span class="heading-anchor-icon" aria-hidden="true"&gt;#&lt;/span&gt;
&lt;/a&gt;
&lt;/h2&gt;
&lt;p&gt;There was originally only one version of IMDS, now called &amp;ldquo;v1,&amp;rdquo; which
unfortunately many people still use. The technical risks and high profile
incidents (the Capital One breach comes to mind) associated with v1, as well as
the existence of &lt;a href="https://aws.amazon.com/blogs/security/defense-in-depth-open-firewalls-reverse-proxies-ssrf-vulnerabilities-ec2-instance-metadata-service/" target="_blank" rel="noopener noreferrer"&gt;v2&lt;/a&gt; are well-documented. When an application hosted on an
EC2 instance is vulnerable to &lt;a href="https://owasp.org/www-community/attacks/Server_Side_Request_Forgery" target="_blank" rel="noopener noreferrer"&gt;SSRF&lt;/a&gt;, &lt;a href="https://owasp.org/www-community/vulnerabilities/XML_External_Entity_%28XXE%29_Processing" target="_blank" rel="noopener noreferrer"&gt;XXE&lt;/a&gt; or &lt;a href="https://owasp.org/www-community/attacks/Code_Injection" target="_blank" rel="noopener noreferrer"&gt;RCE&lt;/a&gt;, attackers
can likely steal the temporary AWS credentials of the &lt;a href="https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/iam-roles-for-amazon-ec2.html" target="_blank" rel="noopener noreferrer"&gt;IAM role&lt;/a&gt;
configured for the instance. This service is a particularly interesting target
for attackers:&lt;/p&gt;</description></item><item><title>Gripes with Google Groups</title><link>https://www.latacora.com/blog/2018/05/29/gripes-with-google-groups/</link><pubDate>Tue, 29 May 2018 17:14:00 -0400</pubDate><guid>https://www.latacora.com/blog/2018/05/29/gripes-with-google-groups/</guid><description>&lt;p&gt;If you&amp;rsquo;re like me, you think of Google Groups as the Usenet client turned
mailing list manager. If you&amp;rsquo;re a GCP (Google Cloud Platform) user or maybe one
of a handful of SAML (Security Assertion Markup Language) users you probably
know Google Groups as an access control mechanism. The bad news is we&amp;rsquo;re both
right.&lt;/p&gt;
&lt;p&gt;This can blow up if permissions on those groups aren&amp;rsquo;t set right. Your groups
were probably originally created by a sleep-deprived founder way before anyone
was worried about access control. It’s been lovingly handcrafted and never
audited ever since. Let’s say their configuration is, uh, “inconsistent”. If an
administrator adds people to the right groups as part of their on-boarding,
it’s not obvious when group membership is secretly self-service. Even if
someone can’t &lt;em&gt;join&lt;/em&gt; a group, they might still be able to read it.&lt;/p&gt;</description></item></channel></rss>