<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>InfoQ - AWS CloudTrail</title>
    <link>https://www.infoq.com</link>
    <description>InfoQ AWS CloudTrail feed</description>
    <item>
      <title>Non-Production Endpoints as an Attack Surface in AWS</title>
      <link>https://www.infoq.com/news/2024/06/surface-attack-endpoint-aws/?utm_campaign=infoq_content&amp;utm_source=infoq&amp;utm_medium=feed&amp;utm_term=AWS+CloudTrail</link>
      <description>&lt;img src="https://res.infoq.com/news/2024/06/surface-attack-endpoint-aws/en/headerimage/generatedHeaderImage-1718309783456.jpg"/&gt;&lt;p&gt;The security team at Datadog recently disclosed a security issue on AWS where non-production endpoints were used as an attack surface to silently perform permission enumeration. AWS has since remediated these specific bypasses.&lt;/p&gt; &lt;i&gt;By Renato Losio&lt;/i&gt;</description>
      <category>AWS CloudTrail</category>
      <category>Cloud Security</category>
      <category>Application Security</category>
      <category>Cloud</category>
      <category>Development</category>
      <category>DevOps</category>
      <category>news</category>
      <pubDate>Sat, 29 Jun 2024 05:14:00 GMT</pubDate>
      <guid>https://www.infoq.com/news/2024/06/surface-attack-endpoint-aws/?utm_campaign=infoq_content&amp;utm_source=infoq&amp;utm_medium=feed&amp;utm_term=AWS+CloudTrail</guid>
      <dc:creator>Renato Losio</dc:creator>
      <dc:date>2024-06-29T05:14:00Z</dc:date>
      <dc:identifier>/news/2024/06/surface-attack-endpoint-aws/en</dc:identifier>
    </item>
  </channel>
</rss>
