Background: #fff
Foreground: #000
PrimaryPale: #8cf
PrimaryLight: #18f
PrimaryMid: #04b
PrimaryDark: #014
SecondaryPale: #ffc
SecondaryLight: #fe8
SecondaryMid: #db4
SecondaryDark: #841
TertiaryPale: #eee
TertiaryLight: #ccc
TertiaryMid: #999
TertiaryDark: #666
Error: #f88
<!--{{{-->
<link rel='stylesheet' href='font-awesome/css/fontawesome.min.css' />
<link rel='stylesheet' href='font-awesome/css/all.css' />
<!--}}}-->
— [[InterfaceOptions]] — [[AdvancedOptions]] —
<!--{{{-->
<div class='header' role='banner' macro='gradient vert [[ColorPalette::PrimaryDark]] [[ColorPalette::PrimaryLight]]'>
<div class='headerShadow'>
<img src="iCSF/cloud-security-alliance-fr.png" align="right">
</div>
<div class='headerForeground'>
<span class='siteTitle' refresh='content' tiddler='SiteTitle'></span>&nbsp;
<span class='siteSubtitle' refresh='content' tiddler='SiteSubtitle'></span>&nbsp;
</div>
</div>
<div id='mainMenu' role='navigation' refresh='content' tiddler='MainMenu'></div>
<div id='sidebar'>
<div id='sidebarOptions' role='navigation' refresh='content' tiddler='SideBarOptions'></div>
<div id='sidebarTabs' role='complementary' refresh='content' force='true' tiddler='SideBarTabs'></div>
</div>
<div id='displayArea' role='main'>
<div id='messageArea' class='messageArea'></div>
<div style="text-align:center"><span class='HeaderMenu' refresh='content' tiddler='HeaderMenu'></span></div>
<div id='tiddlerDisplay'></div>
<div style="text-align:center"><span class='FooterNews' refresh='content' tiddler='FooterDisclaimer'></span></div>
</div>
<!--}}}-->
/*{{{*/
body {background:[[ColorPalette::Background]]; color:[[ColorPalette::Foreground]];}
a {color:[[ColorPalette::PrimaryMid]];}
a:hover {background-color:[[ColorPalette::PrimaryMid]]; color:[[ColorPalette::Background]];}
a img {border:0;}
h1,h2,h3,h4,h5,h6 {color:[[ColorPalette::SecondaryDark]]; background:transparent;}
h1 {border-bottom:2px solid [[ColorPalette::TertiaryLight]];}
h2,h3 {border-bottom:1px solid [[ColorPalette::TertiaryLight]];}
.button {color:[[ColorPalette::PrimaryDark]]; border:1px solid [[ColorPalette::Background]];}
.button:hover {color:[[ColorPalette::PrimaryDark]]; background:[[ColorPalette::SecondaryLight]]; border-color:[[ColorPalette::SecondaryMid]];}
.button:active {color:[[ColorPalette::Background]]; background:[[ColorPalette::SecondaryMid]]; border:1px solid [[ColorPalette::SecondaryDark]];}
.header {background:[[ColorPalette::PrimaryMid]];}
.headerShadow {color:[[ColorPalette::Foreground]];}
.headerShadow a {font-weight:normal; color:[[ColorPalette::Foreground]];}
.headerForeground {color:[[ColorPalette::Background]];}
.headerForeground a {font-weight:normal; color:[[ColorPalette::PrimaryPale]];}
.tabSelected {color:[[ColorPalette::PrimaryDark]];
 background:[[ColorPalette::TertiaryPale]];
 border-left:1px solid [[ColorPalette::TertiaryLight]];
 border-top:1px solid [[ColorPalette::TertiaryLight]];
 border-right:1px solid [[ColorPalette::TertiaryLight]];
}
.tabUnselected {color:[[ColorPalette::Background]]; background:[[ColorPalette::TertiaryMid]];}
.tabContents {color:[[ColorPalette::PrimaryDark]]; background:[[ColorPalette::TertiaryPale]]; border:1px solid [[ColorPalette::TertiaryLight]];}
.tabContents .button {border:0;}
#sidebar { display: none; }
/* #sidebar {} */
#sidebarOptions input {border:1px solid [[ColorPalette::PrimaryMid]];}
#sidebarOptions .sliderPanel {background:[[ColorPalette::PrimaryPale]];}
#sidebarOptions .sliderPanel a {border:none;color:[[ColorPalette::PrimaryMid]];}
#sidebarOptions .sliderPanel a:hover {color:[[ColorPalette::Background]]; background:[[ColorPalette::PrimaryMid]];}
#sidebarOptions .sliderPanel a:active {color:[[ColorPalette::PrimaryMid]]; background:[[ColorPalette::Background]];}
.wizard { background:[[ColorPalette::PrimaryPale]]; }
.wizard__title { color:[[ColorPalette::PrimaryDark]]; border:none; }
.wizard__subtitle { color:[[ColorPalette::Foreground]]; border:none; }
.wizardStep { background:[[ColorPalette::Background]]; color:[[ColorPalette::Foreground]]; }
.wizardStep.wizardStepDone {background:[[ColorPalette::TertiaryLight]];}
.wizardFooter {background:[[ColorPalette::PrimaryPale]];}
.wizardFooter .status {background:[[ColorPalette::PrimaryDark]]; color:[[ColorPalette::Background]];}
.wizard .button {color:[[ColorPalette::Foreground]]; background:[[ColorPalette::SecondaryLight]]; border: 1px solid;
 border-color:[[ColorPalette::SecondaryPale]] [[ColorPalette::SecondaryDark]] [[ColorPalette::SecondaryDark]] [[ColorPalette::SecondaryPale]];}
.wizard .button:hover {color:[[ColorPalette::Foreground]]; background:[[ColorPalette::Background]];}
.wizard .button:active {color:[[ColorPalette::Background]]; background:[[ColorPalette::Foreground]]; border: 1px solid;
 border-color:[[ColorPalette::PrimaryDark]] [[ColorPalette::PrimaryPale]] [[ColorPalette::PrimaryPale]] [[ColorPalette::PrimaryDark]];}
.wizard .notChanged {background:transparent;}
.wizard .changedLocally {background:#80ff80;}
.wizard .changedServer {background:#8080ff;}
.wizard .changedBoth {background:#ff8080;}
.wizard .notFound {background:#ffff80;}
.wizard .putToServer {background:#ff80ff;}
.wizard .gotFromServer {background:#80ffff;}
.messageArea { border:2px solid [[ColorPalette::Background]]; background:[[ColorPalette::PrimaryMid]]; color:[[ColorPalette::Background]]; }
.messageToolbar__button { color:[[ColorPalette::PrimaryMid]]; background:[[ColorPalette::SecondaryPale]]; border:none; }
.messageToolbar__button_withIcon { background:inherit; }
.messageToolbar__button_withIcon:active { background:inherit; border:none; }
.messageToolbar__icon { fill:[[ColorPalette::TertiaryDark]]; }
.messageToolbar__icon:hover { fill:[[ColorPalette::Foreground]]; }
.popupTiddler {background:[[ColorPalette::TertiaryPale]]; border:2px solid [[ColorPalette::TertiaryMid]];}
.popup {background:[[ColorPalette::TertiaryPale]]; color:[[ColorPalette::TertiaryDark]]; border-left:1px solid [[ColorPalette::TertiaryMid]]; border-top:1px solid [[ColorPalette::TertiaryMid]]; border-right:2px solid [[ColorPalette::TertiaryDark]]; border-bottom:2px solid [[ColorPalette::TertiaryDark]]; }
.popup hr {color:[[ColorPalette::PrimaryDark]]; background:[[ColorPalette::PrimaryDark]]; border-bottom:1px;}
.popup li.disabled {color:[[ColorPalette::TertiaryMid]];}
.popup li a, .popup li a:visited {color:[[ColorPalette::Foreground]]; border: none;}
.popup li a:hover {background:[[ColorPalette::SecondaryLight]]; color:[[ColorPalette::Foreground]]; border: none;}
.popup li a:active {background:[[ColorPalette::SecondaryPale]]; color:[[ColorPalette::Foreground]]; border: none;}
.popupHighlight {background:[[ColorPalette::Background]]; color:[[ColorPalette::Foreground]];}
.listBreak div {border-bottom:1px solid [[ColorPalette::TertiaryDark]];}
.tiddler .defaultCommand {font-weight:bold;}
.shadow .title {color:[[ColorPalette::TertiaryDark]];}
.title {color:[[ColorPalette::SecondaryDark]];}
.subtitle {color:[[ColorPalette::TertiaryDark]];}
.toolbar {color:[[ColorPalette::PrimaryMid]];}
.toolbar a {color:[[ColorPalette::TertiaryLight]];}
.selected .toolbar a {color:[[ColorPalette::TertiaryMid]];}
.selected .toolbar a:hover {color:[[ColorPalette::Foreground]];}
.tagging, .tagged {border:1px solid [[ColorPalette::TertiaryPale]]; background-color:[[ColorPalette::TertiaryPale]];}
.selected .tagging, .selected .tagged {background-color:[[ColorPalette::TertiaryLight]]; border:1px solid [[ColorPalette::TertiaryMid]];}
.tagging .listTitle, .tagged .listTitle {color:[[ColorPalette::PrimaryDark]];}
.tagging .button, .tagged .button {border:none;}
.footer {color:[[ColorPalette::TertiaryLight]];}
.selected .footer {color:[[ColorPalette::TertiaryMid]];}
.error, .errorButton {color:[[ColorPalette::Foreground]]; background:[[ColorPalette::Error]];}
.warning {color:[[ColorPalette::Foreground]]; background:[[ColorPalette::SecondaryPale]];}
.lowlight {background:[[ColorPalette::TertiaryLight]];}
.zoomer {background:none; color:[[ColorPalette::TertiaryMid]]; border:3px solid [[ColorPalette::TertiaryMid]];}
.imageLink, #displayArea .imageLink {background:transparent;}
.annotation {background:[[ColorPalette::SecondaryLight]]; color:[[ColorPalette::Foreground]]; border:2px solid [[ColorPalette::SecondaryMid]];}
.viewer .listTitle {list-style-type:none; margin-left:-2em;}
.viewer .button {border:1px solid [[ColorPalette::SecondaryMid]];}
.viewer blockquote {border-left:3px solid [[ColorPalette::TertiaryDark]];}
.viewer table, table.twtable {border:2px solid [[ColorPalette::TertiaryDark]];}
.viewer th, .viewer thead td, .twtable th, .twtable thead td {background:[[ColorPalette::SecondaryMid]]; border:1px solid [[ColorPalette::TertiaryDark]]; color:[[ColorPalette::Background]];}
.viewer td, .viewer tr, .twtable td, .twtable tr {border:1px solid [[ColorPalette::TertiaryDark]];}
.viewer pre {border:1px solid [[ColorPalette::SecondaryLight]]; background:[[ColorPalette::SecondaryPale]];}
.viewer code {color:[[ColorPalette::SecondaryDark]];}
.viewer hr {border:0; border-top:dashed 1px [[ColorPalette::TertiaryDark]]; color:[[ColorPalette::TertiaryDark]];}
.highlight, .marked {background:[[ColorPalette::SecondaryLight]];}
.editor input {border:1px solid [[ColorPalette::PrimaryMid]];}
.editor textarea {border:1px solid [[ColorPalette::PrimaryMid]]; width:100%;}
.editorFooter {color:[[ColorPalette::TertiaryMid]];}
.readOnly {background:[[ColorPalette::TertiaryPale]];}
#backstageArea {background:[[ColorPalette::Foreground]]; color:[[ColorPalette::TertiaryMid]];}
#backstageArea a {background:[[ColorPalette::Foreground]]; color:[[ColorPalette::Background]]; border:none;}
#backstageArea a:hover {background:[[ColorPalette::SecondaryLight]]; color:[[ColorPalette::Foreground]]; }
#backstageArea a.backstageSelTab {background:[[ColorPalette::Background]]; color:[[ColorPalette::Foreground]];}
#backstageButton a {background:none; color:[[ColorPalette::Background]]; border:none;}
#backstageButton a:hover {background:[[ColorPalette::Foreground]]; color:[[ColorPalette::Background]]; border:none;}
#backstagePanel {background:[[ColorPalette::Background]]; border-color: [[ColorPalette::Background]] [[ColorPalette::TertiaryDark]] [[ColorPalette::TertiaryDark]] [[ColorPalette::TertiaryDark]];}
.backstagePanelFooter .button {border:none; color:[[ColorPalette::Background]];}
.backstagePanelFooter .button:hover {color:[[ColorPalette::Foreground]];}
#backstageCloak {background:[[ColorPalette::Foreground]]; opacity:0.6; filter:alpha(opacity=60);}
/*}}}*/
/*{{{*/
* html .tiddler {height:1%;}
/* font-size:.75em; */
body {font-size:1em; font-family:arial,helveticahelvetica; margin:0; padding:0;}
h1,h2,h3,h4,h5,h6 {font-weight:bold; text-decoration:none;}
h1,h2,h3 {padding-bottom:1px; margin-top:1.2em;margin-bottom:0.3em;}
h4,h5,h6 {margin-top:1em;}
h1 {font-size:1.35em;}
h2 {font-size:1.25em;}
h3 {font-size:1.1em;}
h4 {font-size:1em;}
h5 {font-size:1em;}
hr {height:1px;}
a {text-decoration:none;}
dt {font-weight:bold;}
ol {list-style-type:decimal;}
ol ol {list-style-type:lower-alpha;}
ol ol ol {list-style-type:lower-roman;}
ol ol ol ol {list-style-type:decimal;}
ol ol ol ol ol {list-style-type:lower-alpha;}
ol ol ol ol ol ol {list-style-type:lower-roman;}
ol ol ol ol ol ol ol {list-style-type:decimal;}
.txtOptionInput {width:10em;}
#contentWrapper .chkOptionInput {border:0;}
.externalLink {text-decoration:underline;}
.indent {margin-left:3em;}
.outdent {margin-left:3em; text-indent:-3em;}
code.escaped {white-space:nowrap;}
.tiddlyLinkExisting {font-weight:bold;}
.tiddlyLinkNonExisting {font-style:italic;}
/* the 'a' is required for IE, otherwise it renders the whole tiddler in bold */
a.tiddlyLinkNonExisting.shadow {font-weight:bold;}
#mainMenu .tiddlyLinkExisting,
#mainMenu .tiddlyLinkNonExisting,
#sidebarTabs .tiddlyLinkNonExisting {font-weight:normal; font-style:normal;}
#sidebarTabs .tiddlyLinkExisting {font-weight:bold; font-style:normal;}
.header {position:relative;}
.header a:hover {background:transparent;}
.headerShadow {position:relative; padding:4.5em 0 1em 1em; left:-1px; top:-1px;}
.headerForeground {position:absolute; padding:4.5em 0 1em 1em; left:0; top:0;}
.siteTitle {font-size:3em;}
.siteSubtitle {font-size:1.5em;}
#mainMenu {position:absolute; left:0; width:10em; text-align:right; line-height:1.6em; padding:1.5em 0.5em 0.5em 0.5em; font-size:1.1em;}
#sidebar { display: none; }
/* #sidebar {position:absolute; right:3px; width:16em; font-size:.9em;} */
#sidebarOptions {padding-top:0.3em;}
#sidebarOptions a {margin:0 0.2em; padding:0.2em 0.3em; display:block;}
#sidebarOptions input {margin:0.4em 0.5em;}
#sidebarOptions .sliderPanel {margin-left:1em; padding:0.5em; font-size:.85em;}
#sidebarOptions .sliderPanel a {font-weight:bold; display:inline; padding:0;}
#sidebarOptions .sliderPanel input {margin:0 0 0.3em 0;}
#sidebarTabs .tabContents {width:15em; overflow:hidden;}
.wizard { padding:0.1em 2em 0; }
.wizard__title { font-size:2em; }
.wizard__subtitle { font-size:1.2em; }
.wizard__title, .wizard__subtitle { font-weight:bold; background:none; padding:0; margin:0.4em 0 0.2em; }
.wizardStep { padding:1em; }
.wizardFooter { padding:0.8em 0.4em 0.8em 0; }
.wizardFooter .status { padding:0.2em 0.7em; margin-left:0.3em; }
.wizardFooter .button { margin:0.5em 0 0; font-size:1.2em; padding:0.2em 0.5em; }
.messageArea { position:fixed; top:0; right:20em; margin:0.5em; padding:0.7em 1em; z-index:2000; }
.messageToolbar { text-align:right; padding:0.2em 0; }
.messageToolbar__button { text-decoration:underline; }
.messageToolbar__icon { height: 1em; }
.messageArea__text a { text-decoration:underline; }
.tiddlerPopupButton {padding:0.2em;}
.popupTiddler {position: absolute; z-index:300; padding:1em; margin:0;}
.popup {position:absolute; z-index:300; font-size:.9em; padding:0.3em 0; list-style:none; margin:0; padding: 0.3em 0; border: none; box-shadow: 1px 2px 5px [[ColorPalette::TertiaryMid]];}
.popup .popupMessage {padding:0.4em;}
.popup hr {display:block; height:1px; width:auto; padding:0; margin:0.2em 0;}
.popup li.disabled {padding:0.4em;}
.popup li a {display:block; padding: 0.5em 0.5em; font-weight:normal; cursor:pointer;}
.listBreak {font-size:1px; line-height:1px;}
.listBreak div {margin:2px 0;}
.tabset {padding:1em 0 0 0.5em;}
.tab {margin:0 0 0 0.25em; padding:2px;}
.tabContents {padding:0.5em;}
.tabContents ul, .tabContents ol {margin:0; padding:0;}
.txtMainTab .tabContents li {list-style:none;}
.tabContents li.listLink { margin-left:.75em;}
#contentWrapper {display:block;}
#splashScreen {display:none;}
/* 0C wide displayArea top(1)/right(17)/bottom(0)/left(14) */
#displayArea {margin:0 0 0 10em;}
.toolbar {text-align:right; font-size:.9em;}
.tiddler {padding:1em 1em 0;}
.missing .viewer,.missing .title {font-style:italic;}
.title {font-size:1.6em; font-weight:bold;}
.missing .subtitle {display:none;}
.subtitle {font-size:1.1em;}
.tiddler .button {padding:0.2em 0.4em;}
.tagging {margin:0.5em 0.5em 0.5em 0; float:left; display:none;}
.isTag .tagging {display:block;}
.tagged {margin:0.5em; float:right;}
.tagging, .tagged {font-size:0.9em; padding:0.25em;}
.tagging ul, .tagged ul {list-style:none; margin:0.25em; padding:0;}
.tagClear {clear:both;}
.footer {font-size:.9em;}
.footer li {display:inline;}
.annotation {padding:0.5em; margin:0.5em;}
* html .viewer pre {width:99%; padding:0 0 1em 0;}
.viewer {line-height:1.4em; padding-top:0.5em;}
.viewer .button {margin:0 0.25em; padding:0 0.25em;}
.viewer blockquote {line-height:1.5em; padding-left:0.8em;margin-left:2.5em;}
.viewer ul, .viewer ol {margin-left:0.5em; padding-left:1.5em;}
.viewer table, table.twtable {border-collapse:collapse; margin:0.8em 1.0em;}
.viewer th, .viewer td, .viewer tr,.viewer caption,.twtable th, .twtable td, .twtable tr,.twtable caption {padding:3px;}
table.listView {font-size:0.85em; margin:0.8em 1.0em;}
table.listView th, table.listView td, table.listView tr {padding:0 3px 0 3px;}
.viewer pre {padding:0.5em; margin-left:0.5em; font-size:1.2em; line-height:1.4em; overflow:auto;}
.viewer code {font-size:1.2em; line-height:1.4em;}
.editor {font-size:1.1em;}
.editor input, .editor textarea {display:block; width:100%; box-sizing: border-box; font:inherit;}
.editorFooter {padding:0.25em 0; font-size:.9em;}
.editorFooter .button {padding-top:0; padding-bottom:0;}
.fieldsetFix {border:0; padding:0; margin:1px 0px;}
.zoomer {font-size:1.1em; position:absolute; overflow:hidden;}
.zoomer div {padding:1em;}
* html #backstage {width:99%;}
* html #backstageArea {width:99%;}
#backstageArea {display:none; position:relative; overflow: hidden; z-index:150; padding:0.3em 0.5em;}
#backstageToolbar {position:relative;}
#backstageArea a {font-weight:bold; margin-left:0.5em; padding:0.3em 0.5em;}
#backstageButton {display:none; position:absolute; z-index:175; top:0; right:0;}
#backstageButton a {padding:0.1em 0.4em; margin:0.1em;}
#backstage {position:relative; width:100%; z-index:50;}
#backstagePanel { display:none; z-index:100; position:absolute; width:90%; margin-left:3em; }
.backstagePanelFooter {padding-top:0.2em; float:right;}
.backstagePanelFooter a {padding:0.2em 0.4em;}
#backstageCloak {display:none; z-index:20; position:absolute; width:100%; height:100px;}
.whenBackstage {display:none;}
.backstageVisible .whenBackstage {display:block;}
/*}}}*/
/*{{{*/
body {font-size:1em;}
#sidebarOptions {font-size:1.05em;}
#sidebarOptions a {font-style:normal;}
#sidebarOptions .sliderPanel {font-size:0.95em;}
.subtitle {font-size:0.8em;}
.viewer table.listView {font-size:0.95em;}
/*}}}*/
/*{{{*/
@media print {
#mainMenu, #sidebar, .messageArea, .toolbar, #backstageButton, #backstageArea {display: none !important;}
#displayArea { margin-right: 0; }
/* #displayArea {margin: 1em 1em 0em;} */
noscript {display:none;}
}
/*}}}*/
<!--{{{-->
<div class='toolbar' role='navigation' macro='toolbar [[ToolbarCommands::ViewToolbar]]'></div>
<div class='title' macro='view title'></div>
<div class='viewer' macro='view text wikified'></div>
<div class='tagClear'></div>
<!--}}}-->
/% |Author|Eric Shulman|License|http://www.TiddlyTools.com/#LegalStatements|
!show
<<tiddler {{
 var co=config.options;
 if (co.chkShowLeftSidebar===undefined) co.chkShowLeftSidebar=true;
 var mm=document.getElementById('mainMenu');
 var da=document.getElementById('displayArea');
 if (mm) {
 mm.style.display=co.chkShowLeftSidebar?'block':'none';
 da.style.marginLeft=co.chkShowLeftSidebar?'':'1em';
 }
'';}}>><html><nowiki><a href='javascript:;' title="$2"
onmouseover="
 this.href='javascript:void(eval(decodeURIComponent(%22(function(){try{('
 +encodeURIComponent(encodeURIComponent(this.onclick))
 +')()}catch(e){alert(e.description?e.description:e.toString())}})()%22)))';"
onclick="
 var co=config.options;
 var opt='chkShowLeftSidebar';
 var show=co[opt]=!co[opt];
 var mm=document.getElementById('mainMenu');
 var da=document.getElementById('displayArea');
 if (mm) {
 mm.style.display=show?'block':'none';
 da.style.marginLeft=show?'':'1em';
 }
 saveOptionCookie(opt);
 var labelShow=co.txtToggleLeftSideBarLabelShow||'&#x25BA;';
 var labelHide=co.txtToggleLeftSideBarLabelHide||'&#x25C4;';
 if (this.innerHTML==labelShow||this.innerHTML==labelHide)
 this.innerHTML=show?labelHide:labelShow;
 this.title=(show?'masquer':'montrer')+' le menu à gauche';
 var sm=document.getElementById('storyMenu');
 if (sm) config.refreshers.content(sm);
 return false;
">$1</a></html>
!end
%/<<tiddler {{
 var src='.ToggleLeftSidebar';
 src+(tiddler&&tiddler.title==src?'##info':'##show');
}} with: {{
 var co=config.options;
 var labelShow=co.txtToggleLeftSideBarLabelShow||'&#x25BA;&#x25C1;'; /%0C%/
 var labelHide=co.txtToggleLeftSideBarLabelHide||'&#x25C4;&#x25B7;'; /%0C%/
 '$1'!='$'+'1'?'$1':(co.chkShowLeftSidebar?labelHide:labelShow);
}} {{
 var tip=(config.options.chkShowLeftSidebar?'cacher':'montrer')+' le menu gauche'; /%0C%/
 '$2'!='$'+'2'?'$2':tip;
}}>>
/% |Author|Eric Shulman|License|https://www.TiddlyTools.com/#LegalStatements|
%/<html><nowiki><a href="javascript:;" title="masquer/montrer l'en-tête" /%0C%/
onmouseover="
 this.href='javascript:void(eval(decodeURIComponent(%22(function(){try{('
 +encodeURIComponent(encodeURIComponent(this.onclick))
 +')()}catch(e){alert(e.description?e.description:e.toString())}})()%22)))';"
onclick="
 var c=document.getElementById('contentWrapper'); if (!c) return;
 for (var i=0; i<c.childNodes.length; i++)
 if (hasClass(c.childNodes[i],'header')) { var h=c.childNodes[i]; break; }
 if (!h) return;
 config.options.chkHideSiteTitles=h.style.display!='none';
 h.style.display=config.options.chkHideSiteTitles?'none':'block';
 saveOptionCookie('chkHideSiteTitles');
 return false;
">&#x25b3;&#x25bc;</a></html>
/* |Author|Eric Shulman|License|http://www.TiddlyTools.com/#LegalStatements|
*/
//{{{
version.extensions.BreadcrumbsPlugin= {major: 2, minor: 1, revision: 4, date: new Date(2011,2,16)};
var defaults={
 chkShowBreadcrumbs: true,
 chkReorderBreadcrumbs: true,
 chkCreateDefaultBreadcrumbs: true,
 chkShowStartupBreadcrumbs: false,
 chkBreadcrumbsReverse: false,
 chkBreadcrumbsLimit: false,
 txtBreadcrumbsLimit: 5,
 chkBreadcrumbsLimitOpenTiddlers:false,
 txtBreadcrumbsLimitOpenTiddlers:3,
 chkBreadcrumbsHideHomeLink: false,
 chkBreadcrumbsSave: false,
 txtBreadcrumbsHomeSeparator: ' | ',
 txtBreadcrumbsCrumbSeparator: ' > '
};
for (var id in defaults) if (config.options[id]===undefined)
 config.options[id]=defaults[id];
config.macros.breadcrumbs = {
 crumbs: [], // the list of current breadcrumbs
 askMsg: "Save current breadcrumbs before clearing?\n"
 +"Press OK to save, or CANCEL to continue without saving.",
 saveMsg: 'Enter the name of a tiddler in which to save the current breadcrumbs',
 saveTitle: 'SavedBreadcrumbs',
 handler: function(place,macroName,params,wikifier,paramString,tiddler) {
 var area=createTiddlyElement(place,"span",null,"breadCrumbs",null);
 area.setAttribute("homeSep",params[0]||config.options.txtBreadcrumbsHomeSeparator);
 area.setAttribute("crumbSep",params[1]||config.options.txtBreadcrumbsCrumbSeparator);
 this.render(area);
 },
 add: function (title) {
 var thisCrumb = title;
 var ind = this.crumbs.indexOf(thisCrumb);
 if(ind === -1)
 this.crumbs.push(thisCrumb);
 else if (config.options.chkReorderBreadcrumbs)
 this.crumbs.push(this.crumbs.splice(ind,1)[0]); // reorder crumbs
 else
 this.crumbs=this.crumbs.slice(0,ind+1); // trim crumbs
 if (config.options.chkBreadcrumbsLimitOpenTiddlers)
 this.limitOpenTiddlers();
 this.refresh();
 return false;
 },
 getAreas: function() {
 var crumbAreas=[];
 // find all DIVs with classname=="breadCrumbs"
 var all=document.getElementsByTagName("*");
 for (var i=0; i<all.length; i++)
 try{ if (hasClass(all[i],"breadCrumbs")) crumbAreas.push(all[i]); } catch(e) {;}
 // or, find single DIV w/fixed ID (backward compatibility)
 var byID=document.getElementById("breadCrumbs")
 if (byID && !hasClass(byID,"breadCrumbs")) crumbAreas.push(byID);
 if (!crumbAreas.length && config.options.chkCreateDefaultBreadcrumbs) {
 // no crumbs display... create one
 var defaultArea = createTiddlyElement(null,"span",null,"breadCrumbs",null);
 defaultArea.style.display= "none";
 var targetArea= document.getElementById("tiddlerDisplay");
 targetArea.parentNode.insertBefore(defaultArea,targetArea);
 crumbAreas.push(defaultArea);
 }
 return crumbAreas;
 },
 refresh: function() {
 var crumbAreas=this.getAreas();
 for (var i=0; i<crumbAreas.length; i++) {
 crumbAreas[i].style.display = config.options.chkShowBreadcrumbs?"inline":"none";
 removeChildren(crumbAreas[i]);
 this.render(crumbAreas[i]);
 }
 },
 render: function(here) {
 var co=config.options; var out=""
 if (!co.chkBreadcrumbsHideHomeLink) {
 createTiddlyButton(here,"Accueil",null,this.home,"tiddlyLink tiddlyLinkExisting");
 out+=here.getAttribute("homeSep")||config.options.txtBreadcrumbsHomeSeparator;
 }
 for (c=0; c<this.crumbs.length; c++) // remove non-existing tiddlers from crumbs
 if (!store.tiddlerExists(this.crumbs[c]) && !store.isShadowTiddler(this.crumbs[c]))
 this.crumbs.splice(c,1);
 var count=this.crumbs.length;
 if (co.chkBreadcrumbsLimit && co.txtBreadcrumbsLimit<count) count=co.txtBreadcrumbsLimit;
 var list=[];
 for (c=this.crumbs.length-count; c<this.crumbs.length; c++) list.push('[['+this.crumbs[c]+']]');
 if (co.chkBreadcrumbsReverse) list.reverse();
 out+=list.join(here.getAttribute("crumbSep")||config.options.txtBreadcrumbsCrumbSeparator);
 wikify(out,here);
 },
 home: function() {
 var cmb=config.macros.breadcrumbs;
 if (config.options.chkBreadcrumbsSave && confirm(cmb.askMsg)) cmb.saveCrumbs();
 story.closeAllTiddlers(); restart();
 cmb.crumbs = []; var crumbAreas=cmb.getAreas();
 for (var i=0; i<crumbAreas.length; i++) crumbAreas[i].style.display = "none";
 return false;
 },
 saveCrumbs: function() {
 var tid=prompt(this.saveMsg,this.saveTitle); if (!tid||!tid.length) return; // cancelled by user
 var t=store.getTiddler(tid);
 if(t && !confirm(config.messages.overwriteWarning.format([tid]))) return;
 var who=config.options.txtUserName;
 var when=new Date();
 var text='[['+this.crumbs.join(']]\n[[')+']]';
 var tags=t?t.tags:[]; tags.pushUnique('story');
 var fields=t?t.fields:{};
 store.saveTiddler(tid,tid,text,who,when,tags,fields);
 story.displayTiddler(null,tid);
 story.refreshTiddler(tid,null,true);
 displayMessage(tid+' has been '+(t?'updated':'created'));
 },
 limitOpenTiddlers: function() {
 var limit=config.options.txtBreadcrumbsLimitOpenTiddlers; if (limit<1) limit=1;
 for (c=this.crumbs.length-1; c>=0; c--) {
 var tid=this.crumbs[c];
 var elem=story.getTiddler(tid);
 if (elem) { // tiddler is displayed
 if (limit <=0) { // display limit has been reached
 if (elem.getAttribute("dirty")=="true") { // tiddler is being edited
 var msg= "'"+tid+"' is currently being edited.\n\n"
 +"Press OK to save and close this tiddler\n"
 +"or press Cancel to leave it opened";
 if (confirm(msg)) {
 story.closeTiddler(tid);
 }
 }
 else story.closeTiddler(this.crumbs[c]);
 }
 limit--;
 }
 }
 }
};
//}}}
// // PreviousTiddler ('back') command and macro
//{{{
config.commands.previousTiddler = {
 text: 'back',
 tooltip: 'view the previous tiddler',
 handler: function(event,src,title) {
 var crumbs=config.macros.breadcrumbs.crumbs;
 if (crumbs.length<2) config.macros.breadcrumbs.home();
 else story.displayTiddler(story.findContainingTiddler(src),crumbs[crumbs.length-2]);
 return false;
 }
};
config.macros.previousTiddler= {
 label: 'back',
 prompt: 'view the previous tiddler',
 handler: function(place,macroName,params,wikifier,paramString,tiddler) {
 var label=params.shift(); if (!label) label=this.label;
 var prompt=params.shift(); if (!prompt) prompt=this.prompt;
 createTiddlyButton(place,label,prompt,function(ev){
 return config.commands.previousTiddler.handler(ev,this)
 });
 }
}//}}}
// // HIJACKS
//{{{
// update crumbs when a tiddler is displayed
if (Story.prototype.breadCrumbs_coreDisplayTiddler==undefined)
 Story.prototype.breadCrumbs_coreDisplayTiddler=Story.prototype.displayTiddler;
Story.prototype.displayTiddler = function(srcElement,tiddler) {
 var title=(tiddler instanceof Tiddler)?tiddler.title:tiddler;
 this.breadCrumbs_coreDisplayTiddler.apply(this,arguments);
 if (!startingUp || config.options.chkShowStartupBreadcrumbs)
 config.macros.breadcrumbs.add(title);
}
// update crumbs when a tiddler is deleted
if (TiddlyWiki.prototype.breadCrumbs_coreRemoveTiddler==undefined)
 TiddlyWiki.prototype.breadCrumbs_coreRemoveTiddler=TiddlyWiki.prototype.removeTiddler;
TiddlyWiki.prototype.removeTiddler= function() {
 this.breadCrumbs_coreRemoveTiddler.apply(this,arguments);
 config.macros.breadcrumbs.refresh();
}
//}}}
/* |Author|Eric Shulman|License|http://www.TiddlyTools.com/#LegalStatements|
!Configuration
<<<
<<option chkDisableWikiLinks>> Disable ALL automatic WikiWord tiddler links
<<option chkAllowLinksFromShadowTiddlers>> ... except for WikiWords //contained in// shadow tiddlers
<<option chkDisableNonExistingWikiLinks>> Disable automatic WikiWord links for non-existing tiddlers
Disable automatic WikiWord links for words listed in: <<option txtDisableWikiLinksList>>
Disable automatic WikiWord links for tiddlers tagged with: <<option txtDisableWikiLinksTag>>
<<<
!Code
*/
//{{{
version.extensions.DisableWikiLinksPlugin= {major: 1, minor: 6, revision: 0, date: new Date(2008,7,22)};
if (config.options.chkDisableNonExistingWikiLinks==undefined) config.options.chkDisableNonExistingWikiLinks= false;
if (config.options.chkDisableWikiLinks==undefined) config.options.chkDisableWikiLinks=false;
if (config.options.txtDisableWikiLinksList==undefined) config.options.txtDisableWikiLinksList="DisableWikiLinksList";
if (config.options.chkAllowLinksFromShadowTiddlers==undefined) config.options.chkAllowLinksFromShadowTiddlers=true;
if (config.options.txtDisableWikiLinksTag==undefined) config.options.txtDisableWikiLinksTag="excludeWikiWords";
// find the formatter for wikiLink and replace handler with 'pass-thru' rendering
initDisableWikiLinksFormatter();
function initDisableWikiLinksFormatter() {
 for (var i=0; i<config.formatters.length && config.formatters[i].name!="wikiLink"; i++);
 config.formatters[i].coreHandler=config.formatters[i].handler;
 config.formatters[i].handler=function(w) {
  // supress any leading "~" (if present)
  var skip=(w.matchText.substr(0,1)==config.textPrimitives.unWikiLink)?1:0;
  var title=w.matchText.substr(skip);
  var exists=store.tiddlerExists(title);
  var inShadow=w.tiddler && store.isShadowTiddler(w.tiddler.title);
  // check for excluded Tiddler
  if (w.tiddler && w.tiddler.isTagged(config.options.txtDisableWikiLinksTag))
   { w.outputText(w.output,w.matchStart+skip,w.nextMatch); return; }
  // check for specific excluded wiki words
  var t=store.getTiddlerText(config.options.txtDisableWikiLinksList);
  if (t && t.length && t.indexOf(w.matchText)!=-1)
   { w.outputText(w.output,w.matchStart+skip,w.nextMatch); return; }
  // if not disabling links from shadows (default setting)
  if (config.options.chkAllowLinksFromShadowTiddlers && inShadow)
   return this.coreHandler(w);
  // check for non-existing non-shadow tiddler
  if (config.options.chkDisableNonExistingWikiLinks && !exists)
   { w.outputText(w.output,w.matchStart+skip,w.nextMatch); return; }
  // if not enabled, just do standard WikiWord link formatting
  if (!config.options.chkDisableWikiLinks)
   return this.coreHandler(w);
  // just return text without linking
  w.outputText(w.output,w.matchStart+skip,w.nextMatch)
 }
}
Tiddler.prototype.coreAutoLinkWikiWords = Tiddler.prototype.autoLinkWikiWords;
Tiddler.prototype.autoLinkWikiWords = function()
{
 if (!config.options.chkDisableWikiLinks)
  return this.coreAutoLinkWikiWords.apply(this,arguments);
 return false;
}
Tiddler.prototype.disableWikiLinks_changed = Tiddler.prototype.changed;
Tiddler.prototype.changed = function()
{
 this.disableWikiLinks_changed.apply(this,arguments);
 var t=store.getTiddlerText(config.options.txtDisableWikiLinksList,"").readBracketedList();
 if (t.length) for (var i=0; i<t.length; i++)
  if (this.links.contains(t[i]))
   this.links.splice(this.links.indexOf(t[i]),1);
};
//}}}
/* |Author|Yakov Litvin|Forked from|[[abego.ForEachTiddlerPlugin|http://tiddlywiki.abego-software.de/#ForEachTiddlerPlugin]], by Udo Borkowski| */
//{{{
(function(){
// Only install once
if (version.extensions.ForEachTiddlerPlugin) {
 alert("Warning: more than one copy of ForEachTiddlerPlugin is set to be launched");
 return;
} else
 version.extensions.ForEachTiddlerPlugin = {
  source: "[repository url here]",
  licence: "[licence url here]",
  copyright: "Copyright (c) Yakov Litvin, 2012 [url of the meta page]"
 };
config.macros.forEachTiddler = {
 actions: {
  addToList: {},
  write: {}
 }
};
config.macros.forEachTiddler.handler = function(place,macroName,params,wikifier,paramString,tiddler) {
 var parsedParams = this.parseParams(params);
 if (parsedParams.errorText) {
  this.handleError(place, parsedParams.errorText);
  return;
 }//else
  parsedParams.place = place;
  parsedParams.inTiddler = tiddler? tiddler : getContainingTiddler(place);
 parsedParams.actionName = parsedParams.actionName ? parsedParams.actionName : "addToList";
 var actionName = parsedParams.actionName;
 var action = this.actions[actionName];
 if (!action) {
  this.handleError(place, "Unknown action '"+actionName+"'.");
  return;
 }
 var element = document.createElement(action.element);
 jQuery(element).attr({ refresh: "macro", macroName: macroName }).data(parsedParams);
 place.appendChild(element);
 this.refresh(element);
};
config.macros.forEachTiddler.refresh = function(element) {
 var parsedParams = jQuery(element).data(),
  action = this.actions[parsedParams.actionName];
 jQuery(element).empty();
 try {
  var tiddlersAndContext = this.getTiddlersAndContext(parsedParams);
  action.handler(element, tiddlersAndContext.tiddlers,
    parsedParams.actionParameter, tiddlersAndContext.context);
 } catch (e) {
  this.handleError(place, e);
 }
};
config.macros.forEachTiddler.getTiddlersAndContext = function(parameter) {
 var context = config.macros.forEachTiddler.createContext(parameter.place, parameter.filter, parameter.whereClause, parameter.sortClause, parameter.sortAscending, parameter.actionName, parameter.actionParameter, parameter.scriptText, parameter.tiddlyWikiPath, parameter.inTiddler);
 var tiddlyWiki = parameter.tiddlyWikiPath ? this.loadTiddlyWiki(parameter.tiddlyWikiPath) : store;
 context["tiddlyWiki"] = tiddlyWiki;
 var tiddlers = this.findTiddlers(parameter.filter, parameter.whereClause, context, tiddlyWiki);
 context["tiddlers"] = tiddlers;
 if (parameter.sortClause)
  this.sortTiddlers(tiddlers, parameter.sortClause, parameter.sortAscending, context);
 return {tiddlers: tiddlers, context: context};
};
config.macros.forEachTiddler.actions.addToList.element = "ul";
config.macros.forEachTiddler.actions.addToList.handler = function(place, tiddlers, parameter, context) {
 var p = 0;
 if (parameter.length > p) {
  config.macros.forEachTiddler.createExtraParameterErrorElement(place, "addToList", parameter, p);
  return;
 }
 for (var i = 0; i < tiddlers.length; i++) {
  var tiddler = tiddlers[i];
  var listItem = document.createElement("li");
  place.appendChild(listItem);
  createTiddlyLink(listItem, tiddler.title, true);
 }
};
var parseNamedParameter = function(name, parameter, i) {
 var beginExpression = null;
 if ((i < parameter.length) && parameter[i] == name) {
  i++;
  if (i >= parameter.length) {
   throw "Missing text behind '%0'".format([name]);
  }
  return config.macros.forEachTiddler.paramEncode(parameter[i]);
 }
 return null;
}
config.macros.forEachTiddler.actions.write.element = "span";
config.macros.forEachTiddler.actions.write.handler = function(place, tiddlers, parameter, context) {
 var p = 0;
 if (p >= parameter.length) {
  this.handleError(place, "Missing expression behind 'write'.");
  return;
 }
 var textExpression = config.macros.forEachTiddler.paramEncode(parameter[p]);
 p++;
 var beginExpression = parseNamedParameter("begin", parameter, p);
 if (beginExpression !== null)
  p += 2;
 var endExpression = parseNamedParameter("end", parameter, p);
 if (endExpression !== null)
  p += 2;
 var noneExpression = parseNamedParameter("none", parameter, p);
 if (noneExpression !== null)
  p += 2;
 var filename = null;
 var lineSeparator = undefined;
 if ((p < parameter.length) && parameter[p] == "toFile") {
  p++;
  if (p >= parameter.length) {
   this.handleError(place, "Filename expected behind 'toFile' of 'write' action.");
   return;
  }
  filename = config.macros.forEachTiddler.getLocalPath(config.macros.forEachTiddler.paramEncode(parameter[p]));
  p++;
  if ((p < parameter.length) && parameter[p] == "withLineSeparator") {
   p++;
   if (p >= parameter.length) {
    this.handleError(place, "Line separator text expected behind 'withLineSeparator' of 'write' action.");
    return;
   }
   lineSeparator = config.macros.forEachTiddler.paramEncode(parameter[p]);
   p++;
  }
 }
 if (parameter.length > p) {
  config.macros.forEachTiddler.createExtraParameterErrorElement(place, "write", parameter, p);
  return;
 }
 var func = config.macros.forEachTiddler.getEvalTiddlerFunction(textExpression, context);
 var count = tiddlers.length;
 var text = "";
 if (count > 0 && beginExpression)
  text += config.macros.forEachTiddler.getEvalTiddlerFunction(beginExpression, context)(undefined, context, count, undefined);
 for (var i = 0; i < count; i++) {
  var tiddler = tiddlers[i];
  text += func(tiddler, context, count, i);
 }
 if (count > 0 && endExpression)
  text += config.macros.forEachTiddler.getEvalTiddlerFunction(endExpression, context)(undefined, context, count, undefined);
 if (count == 0 && noneExpression)
  text += config.macros.forEachTiddler.getEvalTiddlerFunction(noneExpression, context)(undefined, context, count, undefined);
 if (filename) {
  if (lineSeparator !== undefined) {
   lineSeparator = lineSeparator.replace(/\\n/mg, "\n").replace(/\\r/mg, "\r");
   text = text.replace(/\n/mg,lineSeparator);
  }
  saveFile(filename, convertUnicodeToUTF8(text));
 } else
  wikify(text, place, null/* highlightRegExp */, context.inTiddler);
};
config.macros.forEachTiddler.parseParams = function(params) {
 var i = 0; // index running over the params
 var tiddlyWikiPath = undefined;
 if ((i < params.length) && params[i] == "in") {
  i++;
  if (i >= params.length)
   return { errorText: "TiddlyWiki path expected behind 'in'." };
  tiddlyWikiPath = this.paramEncode((i < params.length) ? params[i] : "");
  i++;
 }
 if ((i < params.length) && params[i] == "filter") {
  i++;
  var filter = (i < params.length) ? params[i] : undefined;
  i++;
 }
 var whereClause ="true";
 if ((i < params.length) && params[i] == "where") {
  i++;
  whereClause = this.paramEncode((i < params.length) ? params[i] : "");
  i++;
 }
 var sortClause = null;
 var sortAscending = true;
 if ((i < params.length) && params[i] == "sortBy") {
  i++;
  if (i >= params.length)
   return { errorText: "sortClause missing behind 'sortBy'." };
  sortClause = this.paramEncode(params[i]);
  i++;
  if ((i < params.length) && (params[i] == "ascending" || params[i] == "descending")) {
    sortAscending = params[i] == "ascending";
    i++;
  }
 }
 var scriptText = null;
 if ((i < params.length) && params[i] == "script") {
  i++;
  scriptText = this.paramEncode((i < params.length) ? params[i] : "");
  i++;
 }
 var actionName = "addToList";
 if (i < params.length) {
  if (!config.macros.forEachTiddler.actions[params[i]])
   return { errorText: "Unknown action '"+params[i]+"'." };
  else {
   actionName = params[i];
   i++;
  }
 }
 var actionParameter = params.slice(i);
 return {
   filter:   filter,
   whereClause:  whereClause,
   sortClause:  sortClause,
   sortAscending:  sortAscending,
   actionName:  actionName,
   actionParameter: actionParameter,
   scriptText:  scriptText,
   tiddlyWikiPath:  tiddlyWikiPath
  }
};
var getContainingTiddler = function(e) {
 while(e && !hasClass(e,"tiddler"))
  e = e.parentNode;
 var title = e ? e.getAttribute("tiddler") : null;
 return title ? store.getTiddler(title) : null;
};
config.macros.forEachTiddler.createContext = function(placeParam, filterParam, whereClauseParam, sortClauseParam, sortAscendingParam, actionNameParam, actionParameterParam, scriptText, tiddlyWikiPathParam, inTiddlerParam) {
 return {
  place  : placeParam,
  filter  : filterParam,
  whereClause : whereClauseParam,
  sortClause : sortClauseParam,
  sortAscending : sortAscendingParam,
  script  : scriptText,
  actionName : actionNameParam,
  actionParameter : actionParameterParam,
  tiddlyWikiPath : tiddlyWikiPathParam,
  inTiddler : inTiddlerParam, // the tiddler containing the <<forEachTiddler ...>> macro call.
  viewerTiddler : getContainingTiddler(placeParam) //the tiddler showing the forEachTiddler result
 };
};
config.macros.forEachTiddler.loadTiddlyWiki = function(path, idPrefix) {
 if (!idPrefix) {
  idPrefix = "store";
 }
 var lenPrefix = idPrefix.length;
 var content = loadFile(this.getLocalPath(path));
 if(content === null) {
  throw "TiddlyWiki '"+path+"' not found.";
 }
 var tiddlyWiki = new TiddlyWiki();
 if (!tiddlyWiki.importTiddlyWiki(content))
  throw "File '"+path+"' is not a TiddlyWiki.";
 tiddlyWiki.dirty = false;
 return tiddlyWiki;
};
config.macros.forEachTiddler.getEvalTiddlerFunction = function (javaScriptExpression, context) {
 var script = context["script"];
 var functionText = "var theFunction = function(tiddler, context, count, index) { return "+javaScriptExpression+"}";
 var fullText = (script ? script+";" : "")+functionText+";theFunction;";
 return eval(fullText);
};
config.macros.forEachTiddler.findTiddlers = function(filter, whereClause, context, tiddlyWiki) {
 var result = [];
 var func = config.macros.forEachTiddler.getEvalTiddlerFunction(whereClause, context);
 if(filter) {
  var tids = tiddlyWiki.filterTiddlers(filter);
  for(var i = 0; i < tids.length; i++)
   if(func(tids[i], context, undefined, undefined))
    result.push(tids[i]);
 } else
  tiddlyWiki.forEachTiddler(function(title,tiddler) {
   if(func(tiddler, context, undefined, undefined))
    result.push(tiddler);
  });
 return result;
};
config.macros.forEachTiddler.sortAscending = function(tiddlerA, tiddlerB) {
 return ((tiddlerA.forEachTiddlerSortValue == tiddlerB.forEachTiddlerSortValue)
   ? 0
   : ((tiddlerA.forEachTiddlerSortValue < tiddlerB.forEachTiddlerSortValue)
    ? -1
    : +1))
};
config.macros.forEachTiddler.sortDescending = function(tiddlerA, tiddlerB) {
 return ((tiddlerA.forEachTiddlerSortValue == tiddlerB.forEachTiddlerSortValue)
   ? 0
   : ((tiddlerA.forEachTiddlerSortValue < tiddlerB.forEachTiddlerSortValue)
    ? +1
    : -1))
};
config.macros.forEachTiddler.sortTiddlers = function(tiddlers, sortClause, ascending, context) {
 var func = config.macros.forEachTiddler.getEvalTiddlerFunction(sortClause, context);
 var count = tiddlers.length;
 var i;
 for (i = 0; i < count; i++) {
  var tiddler = tiddlers[i];
  tiddler.forEachTiddlerSortValue = func(tiddler,context, undefined, undefined);
 }
 tiddlers.sort(ascending ? this.sortAscending : this.sortDescending);
 for (i = 0; i < tiddlers.length; i++)
  delete tiddlers[i].forEachTiddlerSortValue;
};
config.macros.forEachTiddler.createErrorElement = function(place, exception) {
 var message = (exception.description) ? exception.description : exception.toString();
 return createTiddlyElement(place,"span",null,"forEachTiddlerError","<<forEachTiddler ...>>: "+message);
};
config.macros.forEachTiddler.handleError = function(place, exception) {
 if (place) {
  this.createErrorElement(place, exception);
 } else {
  throw exception;
 }
};
config.macros.forEachTiddler.createExtraParameterErrorElement = function(place, actionName, parameter, firstUnusedIndex) {
 var message = "Extra parameter behind '"+actionName+"':";
 for (var i = firstUnusedIndex; i < parameter.length; i++) {
  message += " "+parameter[i];
 }
 this.handleError(place, message);
};
config.macros.forEachTiddler.paramEncode = function(s) {
 var reGTGT = new RegExp("\\$\\)\\)","mg");
 var reGT = new RegExp("\\$\\)","mg");
 return s.replace(reGTGT, ">>").replace(reGT, ">");
};
config.macros.forEachTiddler.getLocalPath = function(originalPath) {
 var originalAbsolutePath = originalPath;
 if(originalAbsolutePath.search(/^((http(s)?)|(file)):/) != 0) {
  if (originalAbsolutePath.search(/^(.\:\\)|(\\\\)|(\/)/) != 0){// is relative?
   var currentUrl = document.location.toString();
   var currentPath = (currentUrl.lastIndexOf("/") > -1) ?
    currentUrl.substr(0, currentUrl.lastIndexOf("/") + 1) :
    currentUrl + "/";
   originalAbsolutePath = currentPath + originalAbsolutePath;
  } else
   originalAbsolutePath = "file://" + originalAbsolutePath;
  originalAbsolutePath = originalAbsolutePath.replace(/\\/mg,"/");
 }
 return getLocalPath(originalAbsolutePath);
};
setStylesheet(
 ".forEachTiddlerError{color: #ffffff;background-color: #880000;}",
 "forEachTiddler");
config.macros.fet = config.macros.forEachTiddler;
String.prototype.startsWith = function(prefix) {
 var n = prefix.length;
 return (this.length >= n) && (this.slice(0, n) == prefix);
};
String.prototype.endsWith = function(suffix) {
 var n = suffix.length;
 return (this.length >= n) && (this.right(n) == suffix);
};
String.prototype.contains = function(substring) {
 return this.indexOf(substring) >= 0;
};
})();
Tiddler.prototype.getSlice = function(sliceName,defaultText) {
 var re = TiddlyWiki.prototype.slicesRE;
 re.lastIndex = 0;
 var m = re.exec(this.text);
 while(m) {
  if(m[2]) {
   if(m[2] == sliceName)
    return m[3];
  } else {
   if(m[5] == sliceName)
    return m[6];
  }
  m = re.exec(this.text);
 }
 return defaultText;
};
Tiddler.prototype.getSection = function(sectionName,defaultText) {
 var beginSectionRegExp = new RegExp("(^!{1,6}[ \t]*" + sectionName.escapeRegExp() + "[ \t]*\n)","mg"),
  sectionTerminatorRegExp = /^!/mg;
 var match = beginSectionRegExp.exec(this.text), sectionText;
 if(match) {
  sectionText = this.text.substr(match.index+match[1].length);
  match = sectionTerminatorRegExp.exec(sectionText);
  if(match)
   sectionText = sectionText.substr(0,match.index-1); // don't include final \n
  return sectionText
 }
 return defaultText;
};
//}}}
/* |Author|SaqImtiaz|Version|1.11|0C_Tuned| */
//{{{
config.hoverMenu={};
config.hoverMenu.settings={ align: 'right', x: 4, y: 100 };
config.hoverMenu.handler=function()
{
  var theMenu = createTiddlyElement(document.getElementById("contentWrapper"), "div","hoverMenu");
  theMenu.setAttribute("refresh","content");
  theMenu.setAttribute("tiddler","HoverMenu");
  var menuContent = store.getTiddlerText("HoverMenu");
  wikify(menuContent,theMenu);
        var Xloc = this.settings.x;
        Yloc =this.settings.y;
        var ns = (navigator.appName.indexOf("Netscape") != -1);
        function SetMenu(id)
   {
   var GetElements=document.getElementById?document.getElementById(id):document.all?document.all[id]:document.layers[id];
   if(document.layers)GetElements.style=GetElements;
   GetElements.sP=function(x,y){this.style[config.hoverMenu.settings.align]=x +"px";this.style.top=y +"px";};
   GetElements.x = Xloc;
   GetElements.y = findScrollY();
   GetElements.y += Yloc;
   return GetElements;
   }
  window.LoCate_XY=function()
   {
   var pY =  findScrollY();
   ftlObj.y += (pY + Yloc - ftlObj.y)/15;
   ftlObj.sP(ftlObj.x, ftlObj.y);
   setTimeout("LoCate_XY()", 10);
   }
  ftlObj = SetMenu("hoverMenu");
   LoCate_XY();
};
window.old_lewcid_hovermenu_restart = restart;
restart = function()
{
  window.old_lewcid_hovermenu_restart();
  config.hoverMenu.handler();
};
setStylesheet(
"#hoverMenu .button, #hoverMenu .tiddlyLink {border:none; background:#008; color:#fff; padding:0 20px; float:right; margin-bottom:5px;}\sn"+
"#hoverMenu .button:hover, #hoverMenu .tiddlyLink:hover {border:none; color:#fff; background:#00f; padding:0 20px; float:right; margin-bottom:5px;}\sn"+
"#hoverMenu .button {width:100%; text-align:center}"+
"#hoverMenu { position:absolute; width:10px;}\sn"+
"\sn","hoverMenuStyles");
config.macros.renameButton={};
config.macros.renameButton.handler = function(place,macroName,params,wikifier,paramString,tiddler)
{
  if (place.lastChild.tagName!="BR")
       {
  place.lastChild.firstChild.data = params[0];
  if (params[1]) {place.lastChild.title = params[1];}
       }
};
config.shadowTiddlers["HoverMenu"]="<<top>><<jump ≡→ '' top>>[[CCM]]^^[[CCSK]]^^^^[[CAIQ]]^^^^[[Hebdo|Newsletters]]^^^^[[Outils]]^^^^[[Veille|Veille Web]]^^";
config.macros.top={};
config.macros.top.handler=function(place,macroName)
{ createTiddlyButton(place,"→↑↑","↑ Haut de page ↑",this.onclick); }
config.macros.top.onclick=function()
{ window.scrollTo(0,0); };
config.commands.top =
{ text:" ^ ", tooltip:"^ Haut de page ^" };
config.commands.top.handler = function(event,src,title)
{ window.scrollTo(0,0); }

config.macros.jump= {};
config.macros.jump.handler = function (place,macroName,params,wikifier,paramString,tiddler)
{
 var label = (params[0] && params[0]!=".")? params[0]: 'jump';
 var tooltip = (params[1] && params[1]!=".")? params[1]: '→ Aller vers un article déjà ouvert';
 var top = (params[2] && params[2]=='top') ? true: false;
 var btn =createTiddlyButton(place,label,tooltip,this.onclick);
 if (top==true)
       btn.setAttribute("top","true")
}
config.macros.jump.onclick = function(e)
{
 if (!e) var e = window.event;
 var theTarget = resolveTarget(e);
 var top = theTarget.getAttribute("top");
 var popup = Popup.create(this);
 if(popup)
  {
   if(top=="true")
    {createTiddlyButton(createTiddlyElement(popup,"li"),'↑ Tout en Haut ↑','→ Aller tout en haut de cette page',config.macros.jump.top);
     createTiddlyElement(popup,"hr");}

  story.forEachTiddler(function(title,element) {
   createTiddlyLink(createTiddlyElement(popup,"li"),title,true);
   });
  }
 Popup.show(popup,false);
 e.cancelBubble = true;
 if (e.stopPropagation) e.stopPropagation();
 return false;
}
config.macros.jump.top = function()
{
       window.scrollTo(0,0);
}

Popup.show = function(unused,slowly)
{
var curr = Popup.stack[Popup.stack.length-1];
 var rootLeft = findPosX(curr.root);
 var rootTop = findPosY(curr.root);
 var rootHeight = curr.root.offsetHeight;
 var popupLeft = rootLeft;
 var popupTop = rootTop + rootHeight;
 var popupWidth = curr.popup.offsetWidth;
 var winWidth = findWindowWidth();
 if (isChild(curr.root,'hoverMenu'))
       var x = config.hoverMenu.settings.x;
 else
       var x = 0;
 if(popupLeft + popupWidth+x > winWidth)
  popupLeft = winWidth - popupWidth -x;
 if (isChild(curr.root,'hoverMenu'))
    {curr.popup.style.right = x + "px";}
 else
  curr.popup.style.left = popupLeft + "px";
 curr.popup.style.top = popupTop + "px";
 curr.popup.style.display = "block";
 addClass(curr.root,"highlight");
 if(config.options.chkAnimate)
  anim.startAnimating(new Scroller(curr.popup,slowly));
 else
  window.scrollTo(0,ensureVisible(curr.popup));
}
window.isChild = function(e,parentId) {
 while (e != null) {
  var parent = document.getElementById(parentId);
  if (parent == e) return true;
  e = e.parentNode;
  }
 return false;
};
//}}}
/* |Author|Eric Shulman|License|http://www.TiddlyTools.com/#LegalStatements|
!Configuration
<<<
Use {{{<hide linebreaks>}}} within HTML content to wiki-style rendering of line breaks. To //always// omit all line breaks from the rendered output, you can set this option:
><<option chkHTMLHideLinebreaks>> ignore all line breaks
which can also be 'hard coded' into your document by adding the following to a tiddler, tagged with <<tag systemConfig>>
>{{{config.options.chkHTMLHideLinebreaks=true;}}}
<<<
!Code
*/
//{{{
version.extensions.HTMLFormattingPlugin= {major: 2, minor: 4, revision: 1, date: new Date(2010,5,7)};
// find the formatter for HTML and replace the handler
initHTMLFormatter();
function initHTMLFormatter()
{
 for (var i=0; i<config.formatters.length && config.formatters[i].name!="html"; i++);
 if (i<config.formatters.length) config.formatters[i].handler=function(w) {
  if (!this.lookaheadRegExp)
   this.lookaheadRegExp = new RegExp(this.lookahead,"mg");
  this.lookaheadRegExp.lastIndex = w.matchStart;
  var lookaheadMatch = this.lookaheadRegExp.exec(w.source)
  if(lookaheadMatch && lookaheadMatch.index == w.matchStart) {
   var html=lookaheadMatch[1];
   // if <nowiki> is present, just let browser handle it!
   if (html.indexOf('<nowiki>')!=-1)
    createTiddlyElement(w.output,"span").innerHTML=html;
   else {
    // if <hide linebreaks> is present, or chkHTMLHideLinebreaks is set
    // suppress wiki-style literal handling of newlines
    if (config.options.chkHTMLHideLinebreaks||(html.indexOf('<hide linebreaks>')!=-1))
     html=html.replace(/\n/g,' ');
    // remove all \r's added by IE textarea and mask newlines and macro brackets
    html=html.replace(/\r/g,'').replace(/\n/g,'\\n').replace(/<</g,'%%(').replace(/>>/g,')%%');
    // create span, let browser parse HTML
    var e=createTiddlyElement(w.output,"span"); e.innerHTML=html;
    // then re-render text nodes as wiki-formatted content
    wikifyTextNodes(e,w);
   }
   w.nextMatch = this.lookaheadRegExp.lastIndex; // continue parsing
  }
 }
}
// wikify #text nodes that remain after HTML content is processed (pre-order recursion)
function wikifyTextNodes(theNode,w)
{
 function unmask(s) { return s.replace(/\%%\(/g,'<<').replace(/\)\%%/g,'>>').replace(/\\n/g,'\n'); }
 switch (theNode.nodeName.toLowerCase()) {
  case 'style': case 'option': case 'select':
   theNode.innerHTML=unmask(theNode.innerHTML);
   break;
  case 'textarea':
   theNode.value=unmask(theNode.value);
   break;
  case '#text':
   var txt=unmask(theNode.nodeValue);
   var newNode=createTiddlyElement(null,"span");
   theNode.parentNode.replaceChild(newNode,theNode);
   wikify(txt,newNode,highlightHack,w.tiddler);
   break;
  default:
   for (var i=0;i<theNode.childNodes.length;i++)
    wikifyTextNodes(theNode.childNodes.item(i),w); // recursion
   break;
 }
}
//}}}
/* |Author|Eric Shulman|License|http://www.TiddlyTools.com/#LegalStatements|
!Code
*/
//{{{
version.extensions.ImageSizePlugin= {major: 1, minor: 2, revision: 2, date: new Date(2010,7,24)};
//}}}
//{{{
var f=config.formatters[config.formatters.findByField("name","image")];
f.match="\\[[<>]?[Ii][Mm][Gg](?:\\([^,]*,[^\\)]*\\))?\\[";
f.lookaheadRegExp=/\[([<]?)(>?)[Ii][Mm][Gg](?:\(([^,]*),([^\)]*)\))?\[(?:([^\|\]]+)\|)?([^\[\]\|]+)\](?:\[([^\]]*)\])?\]/mg;
f.handler=function(w) {
 this.lookaheadRegExp.lastIndex = w.matchStart;
 var lookaheadMatch = this.lookaheadRegExp.exec(w.source)
 if(lookaheadMatch && lookaheadMatch.index == w.matchStart) {
  var floatLeft=lookaheadMatch[1];
  var floatRight=lookaheadMatch[2];
  var width=lookaheadMatch[3];
  var height=lookaheadMatch[4];
  var tooltip=lookaheadMatch[5];
  var src=lookaheadMatch[6];
  var link=lookaheadMatch[7];
  var e = w.output;
  if(link) { // LINKED IMAGE
   if (config.formatterHelpers.isExternalLink(link)) {
    if (config.macros.attach && config.macros.attach.isAttachment(link)) {
     // see [[AttachFilePluginFormatters]]
     e = createExternalLink(w.output,link);
     e.href=config.macros.attach.getAttachment(link);
     e.title = config.macros.attach.linkTooltip + link;
    } else
     e = createExternalLink(w.output,link);
   } else
    e = createTiddlyLink(w.output,link,false,null,w.isStatic);
   addClass(e,"imageLink");
  }
  var img = createTiddlyElement(e,"img");
  if(floatLeft) img.align="left"; else if(floatRight) img.align="right";
  if(width||height) {
   var x=width.trim(); var y=height.trim();
   var stretchW=(x.substr(x.length-1,1)=='+'); if (stretchW) x=x.substr(0,x.length-1);
   var stretchH=(y.substr(y.length-1,1)=='+'); if (stretchH) y=y.substr(0,y.length-1);
   if (x.substr(0,2)=="{{")
    { try{x=eval(x.substr(2,x.length-4))} catch(e){displayMessage(e.description||e.toString())} }
   if (y.substr(0,2)=="{{")
    { try{y=eval(y.substr(2,y.length-4))} catch(e){displayMessage(e.description||e.toString())} }
   img.style.width=x.trim(); img.style.height=y.trim();
   config.formatterHelpers.addStretchHandlers(img,stretchW,stretchH);
  }
  if(tooltip) img.title = tooltip;
  if (config.macros.attach && config.macros.attach.isAttachment(src))
   src=config.macros.attach.getAttachment(src); // see [[AttachFilePluginFormatters]]
  else if (config.formatterHelpers.resolvePath) { // see [[ImagePathPlugin]]
   if (config.browser.isIE || config.browser.isSafari) {
    img.onerror=(function(){
     this.src=config.formatterHelpers.resolvePath(this.src,false);
     return false;
    });
   } else
    src=config.formatterHelpers.resolvePath(src,true);
  }
  img.src=src;
  w.nextMatch = this.lookaheadRegExp.lastIndex;
 }
}
config.formatterHelpers.imageSize={
tip: '', dragtip: 'DRAG=étirer/réduire, '
}
config.formatterHelpers.addStretchHandlers=function(e,stretchW,stretchH) {
 e.title=((stretchW||stretchH)?this.imageSize.dragtip:'')+this.imageSize.tip;
 e.statusMsg='width=%0, height=%1';
 e.style.cursor='move';
 e.originalW=e.style.width;
 e.originalH=e.style.height;
 e.minW=Math.max(e.offsetWidth/20,10);
 e.minH=Math.max(e.offsetHeight/20,10);
 e.stretchW=stretchW;
 e.stretchH=stretchH;
 e.onmousedown=function(ev) { var ev=ev||window.event;
  this.sizing=true;
  this.startX=!config.browser.isIE?ev.pageX:(ev.clientX+findScrollX());
  this.startY=!config.browser.isIE?ev.pageY:(ev.clientY+findScrollY());
  this.startW=this.offsetWidth;
  this.startH=this.offsetHeight;
  return false;
 };
 e.onmousemove=function(ev) { var ev=ev||window.event;
  if (this.sizing) {
   var s=this.style;
   var currX=!config.browser.isIE?ev.pageX:(ev.clientX+findScrollX());
   var currY=!config.browser.isIE?ev.pageY:(ev.clientY+findScrollY());
   var newW=(currX-this.offsetLeft)/(this.startX-this.offsetLeft)*this.startW;
   var newH=(currY-this.offsetTop )/(this.startY-this.offsetTop )*this.startH;
   if (this.stretchW) s.width =Math.floor(Math.max(newW,this.minW))+'px';
   if (this.stretchH) s.height=Math.floor(Math.max(newH,this.minH))+'px';
   clearMessage(); displayMessage(this.statusMsg.format([s.width,s.height]));
  }
  return false;
 };
 e.onmouseup=function(ev) { var ev=ev||window.event;
  if (ev.shiftKey) { this.style.width=this.style.height=''; }
  if (ev.ctrlKey) { this.style.width=this.originalW; this.style.height=this.originalH; }
  this.sizing=false;
  clearMessage();
  return false;
 };
 e.onmouseout=function(ev) { var ev=ev||window.event;
  this.sizing=false;
  clearMessage();
  return false;
 };
}
//}}}
/* |Author|Eric Shulman|License|http://www.TiddlyTools.com/#LegalStatements|!Code
*/
//{{{
version.extensions.InlineJavascriptPlugin= {major: 1, minor: 9, revision: 6, date: new Date(2010,12,15)};
config.formatters.push( {
 name: "inlineJavascript",
 match: "\\<script",
 lookahead: "\\<script(?: type=\\\"[^\\\"]*\\\")?(?: src=\\\"([^\\\"]*)\\\")?(?: label=\\\"([^\\\"]*)\\\")?(?: title=\\\"([^\\\"]*)\\\")?(?: key=\\\"([^\\\"]*)\\\")?( show)?\\>((?:.|\\n)*?)\\</script\\>",
 handler: function(w) {
  var lookaheadRegExp = new RegExp(this.lookahead,"mg");
  lookaheadRegExp.lastIndex = w.matchStart;
  var lookaheadMatch = lookaheadRegExp.exec(w.source)
  if(lookaheadMatch && lookaheadMatch.index == w.matchStart) {
   var src=lookaheadMatch[1];
   var label=lookaheadMatch[2];
   var tip=lookaheadMatch[3];
   var key=lookaheadMatch[4];
   var show=lookaheadMatch[5];
   var code=lookaheadMatch[6];
   if (src) { // external script library
    var script = document.createElement("script"); script.src = src;
    document.body.appendChild(script); document.body.removeChild(script);
   }
   if (code) { // inline code
    if (show) // display source in tiddler
     wikify("{{{\n"+lookaheadMatch[0]+"\n}}}\n",w.output);
    if (label) { // create 'onclick' command link
     var link=createTiddlyElement(w.output,"a",null,"tiddlyLinkExisting",wikifyPlainText(label));
     var fixup=code.replace(/document.write\s*\(/gi,'place.bufferedHTML+=(');
     link.code="function _out(place,tiddler){"+fixup+"\n};_out(this,this.tiddler);"
     link.tiddler=w.tiddler;
     link.onclick=function(){
      this.bufferedHTML="";
      try{ var r=eval(this.code);
       if(this.bufferedHTML.length || (typeof(r)==="string")&&r.length)
        var s=this.parentNode.insertBefore(document.createElement("span"),this.nextSibling);
       if(this.bufferedHTML.length)
        s.innerHTML=this.bufferedHTML;
       if((typeof(r)==="string")&&r.length) {
        wikify(r,s,null,this.tiddler);
        return false;
       } else return r!==undefined?r:false;
      } catch(e){alert(e.description||e.toString());return false;}
     };
     link.setAttribute("title",tip||"");
     var URIcode='javascript:void(eval(decodeURIComponent(%22(function(){try{';
     URIcode+=encodeURIComponent(encodeURIComponent(code.replace(/\n/g,' ')));
     URIcode+='}catch(e){alert(e.description||e.toString())}})()%22)))';
     link.setAttribute("href",URIcode);
     link.style.cursor="pointer";
     if (key) link.accessKey=key.substr(0,1); // single character only
    }
    else { // run script immediately
     var fixup=code.replace(/document.write\s*\(/gi,'place.innerHTML+=(');
     var c="function _out(place,tiddler){"+fixup+"\n};_out(w.output,w.tiddler);";
     try  { var out=eval(c); }
     catch(e) { out=e.description?e.description:e.toString(); }
     if (out && out.length) wikify(out,w.output,w.highlightRegExp,w.tiddler);
    }
   }
   w.nextMatch = lookaheadMatch.index + lookaheadMatch[0].length;
  }
 }
} )
//}}}
// // Backward-compatibility for TW2.1.x and earlier
//{{{
if (typeof(wikifyPlainText)=="undefined") window.wikifyPlainText=function(text,limit,tiddler) {
 if(limit > 0) text = text.substr(0,limit);
 var wikifier = new Wikifier(text,formatter,null,tiddler);
 return wikifier.wikifyPlain();
}
//}}}
// // GLOBAL FUNCTION: $(...) -- 'shorthand' convenience syntax for document.getElementById()
//{{{
if (typeof($)=='undefined') { function $(id) { return document.getElementById(id.replace(/^#/,'')); } }
//}}}
/* |Author|Eric Shulman|License|http://www.TiddlyTools.com/#LegalStatements|
!Configuration
<<<
<<option chkFloatingSlidersAnimate>> allow floating sliders to animate when opening/closing
<<<
!Code
*/
//{{{
version.extensions.NestedSlidersPlugin= {major: 2, minor: 4, revision: 9, date: new Date(2008,11,15)};
// options for deferred rendering of sliders that are not initially displayed
if (config.options.chkFloatingSlidersAnimate===undefined)
 config.options.chkFloatingSlidersAnimate=false; // avoid clipping problems in IE
// default styles for 'floating' class
setStylesheet(".floatingPanel { position:absolute; z-index:10; padding:0.5em; margin:0em; \
 background-color:#eee; color:#000; border:1px solid #000; text-align:left; }","floatingPanelStylesheet");
// if removeCookie() function is not defined by TW core, define it here.
if (window.removeCookie===undefined) {
 window.removeCookie=function(name) {
  document.cookie = name+'=; expires=Thu, 01-Jan-1970 00:00:01 UTC; path=/;';
 }
}
config.formatters.push( {
 name: "nestedSliders",
 match: "\\n?\\+{3}",
 terminator: "\\s*\\={3}\\n?",
 lookahead: "\\n?\\+{3}(\\+)?(\\([^\\)]*\\))?(\\!*)?(\\^(?:[^\\^\\*\\@\\[\\>]*\\^)?)?(\\*)?(\\@)?(?:\\{\\{([\\w]+[\\s\\w]*)\\{)?(\\[[^\\]]*\\])?(\\[[^\\]]*\\])?(?:\\}{3})?(\\#[^:]*\\:)?(\\>)?(\\.\\.\\.)?\\s*",
 handler: function(w)
  {
   lookaheadRegExp = new RegExp(this.lookahead,"mg");
   lookaheadRegExp.lastIndex = w.matchStart;
   var lookaheadMatch = lookaheadRegExp.exec(w.source)
   if(lookaheadMatch && lookaheadMatch.index == w.matchStart)
   {
    var defopen=lookaheadMatch[1];
    var cookiename=lookaheadMatch[2];
    var header=lookaheadMatch[3];
    var panelwidth=lookaheadMatch[4];
    var transient=lookaheadMatch[5];
    var hover=lookaheadMatch[6];
    var buttonClass=lookaheadMatch[7];
    var label=lookaheadMatch[8];
    var openlabel=lookaheadMatch[9];
    var panelID=lookaheadMatch[10];
    var blockquote=lookaheadMatch[11];
    var deferred=lookaheadMatch[12];
    // location for rendering button and panel
    var place=w.output;
    // default to closed, no cookie, no accesskey, no alternate text/tip
    var show="none"; var cookie=""; var key="";
    var closedtext=">"; var closedtip="";
    var openedtext="<"; var openedtip="";
    // extra "+", default to open
    if (defopen) show="block";
    // cookie, use saved open/closed state
    if (cookiename) {
     cookie=cookiename.trim().slice(1,-1);
     cookie="chkSlider"+cookie;
     if (config.options[cookie]==undefined)
      { config.options[cookie] = (show=="block") }
     show=config.options[cookie]?"block":"none";
    }
    // parse label/tooltip/accesskey: [label=X|tooltip]
    if (label) {
     var parts=label.trim().slice(1,-1).split("|");
     closedtext=parts.shift();
     if (closedtext.substr(closedtext.length-2,1)=="=")
      { key=closedtext.substr(closedtext.length-1,1); closedtext=closedtext.slice(0,-2); }
     openedtext=closedtext;
     if (parts.length) closedtip=openedtip=parts.join("|");
     else { closedtip="afficher "+closedtext; openedtip="masquer "+closedtext; }
    }
    // parse alternate label/tooltip: [label|tooltip]
    if (openlabel) {
     var parts=openlabel.trim().slice(1,-1).split("|");
     openedtext=parts.shift();
     if (parts.length) openedtip=parts.join("|");
     else openedtip="hide "+openedtext;
    }
    var title=show=='block'?openedtext:closedtext;
    var tooltip=show=='block'?openedtip:closedtip;
    // create the button
    if (header) { // use "Hn" header format instead of button/link
     var lvl=(header.length>5)?5:header.length;
     var btn = createTiddlyElement(createTiddlyElement(place,"h"+lvl,null,null,null),"a",null,buttonClass,title);
     btn.onclick=onClickNestedSlider;
     btn.setAttribute("href","javascript:;");
     btn.setAttribute("title",tooltip);
    }
    else
     var btn = createTiddlyButton(place,title,tooltip,onClickNestedSlider,buttonClass);
    btn.innerHTML=title; // enables use of HTML entities in label
    // set extra button attributes
    btn.setAttribute("closedtext",closedtext);
    btn.setAttribute("closedtip",closedtip);
    btn.setAttribute("openedtext",openedtext);
    btn.setAttribute("openedtip",openedtip);
    btn.sliderCookie = cookie; // save the cookiename (if any) in the button object
    btn.defOpen=defopen!=null; // save default open/closed state (boolean)
    btn.keyparam=key; // save the access key letter ("" if none)
    if (key.length) {
     btn.setAttribute("accessKey",key); // init access key
     btn.onfocus=function(){this.setAttribute("accessKey",this.keyparam);}; // **reclaim** access key on focus
    }
    btn.setAttribute("hover",hover?"true":"false");
    btn.onmouseover=function(ev) {
     // optional 'open on hover' handling
     if (this.getAttribute("hover")=="true" && this.sliderPanel.style.display=='none') {
      document.onclick.call(document,ev); // close transients
      onClickNestedSlider(ev); // open this slider
     }
     // mouseover on button aligns floater position with button
     if (window.adjustSliderPos) window.adjustSliderPos(this.parentNode,this,this.sliderPanel);
    }
    // create slider panel
    var panelClass=panelwidth?"floatingPanel":"sliderPanel";
    if (panelID) panelID=panelID.slice(1,-1); // trim off delimiters
    var panel=createTiddlyElement(place,"div",panelID,panelClass,null);
    panel.button = btn; // so the slider panel know which button it belongs to
    btn.sliderPanel=panel; // so the button knows which slider panel it belongs to
    panel.defaultPanelWidth=(panelwidth && panelwidth.length>2)?panelwidth.slice(1,-1):"";
    panel.setAttribute("transient",transient=="*"?"true":"false");
    panel.style.display = show;
    panel.style.width=panel.defaultPanelWidth;
    panel.onmouseover=function(event) // mouseover on panel aligns floater position with button
     { if (window.adjustSliderPos) window.adjustSliderPos(this.parentNode,this.button,this); }
    // render slider (or defer until shown)
    w.nextMatch = lookaheadMatch.index + lookaheadMatch[0].length;
    if ((show=="block")||!deferred) {
     // render now if panel is supposed to be shown or NOT deferred rendering
     w.subWikify(blockquote?createTiddlyElement(panel,"blockquote"):panel,this.terminator);
     // align floater position with button
     if (window.adjustSliderPos) window.adjustSliderPos(place,btn,panel);
    }
    else {
     var src = w.source.substr(w.nextMatch);
     var endpos=findMatchingDelimiter(src,"+++","===");
     panel.setAttribute("raw",src.substr(0,endpos));
     panel.setAttribute("blockquote",blockquote?"true":"false");
     panel.setAttribute("rendered","false");
     w.nextMatch += endpos+3;
     if (w.source.substr(w.nextMatch,1)=="\n") w.nextMatch++;
    }
   }
  }
 }
)
function findMatchingDelimiter(src,starttext,endtext) {
 var startpos = 0;
 var endpos = src.indexOf(endtext);
 // check for nested delimiters
 while (src.substring(startpos,endpos-1).indexOf(starttext)!=-1) {
  // count number of nested 'starts'
  var startcount=0;
  var temp = src.substring(startpos,endpos-1);
  var pos=temp.indexOf(starttext);
  while (pos!=-1) { startcount++; pos=temp.indexOf(starttext,pos+starttext.length); }
  // set up to check for additional 'starts' after adjusting endpos
  startpos=endpos+endtext.length;
  // find endpos for corresponding number of matching 'ends'
  while (startcount && endpos!=-1) {
   endpos = src.indexOf(endtext,endpos+endtext.length);
   startcount--;
  }
 }
 return (endpos==-1)?src.length:endpos;
}
//}}}
//{{{
window.onClickNestedSlider=function(e)
{
 if (!e) var e = window.event;
 var theTarget = resolveTarget(e);
 while (theTarget && theTarget.sliderPanel==undefined) theTarget=theTarget.parentNode;
 if (!theTarget) return false;
 var theSlider = theTarget.sliderPanel;
 var isOpen = theSlider.style.display!="none";
 // if SHIFT-CLICK, dock panel first (see [[MoveablePanelPlugin]])
 if (e.shiftKey && config.macros.moveablePanel) config.macros.moveablePanel.dock(theSlider,e);
 // toggle label
 theTarget.innerHTML=isOpen?theTarget.getAttribute("closedText"):theTarget.getAttribute("openedText");
 // toggle tooltip
 theTarget.setAttribute("title",isOpen?theTarget.getAttribute("closedTip"):theTarget.getAttribute("openedTip"));
 // deferred rendering (if needed)
 if (theSlider.getAttribute("rendered")=="false") {
  var place=theSlider;
  if (theSlider.getAttribute("blockquote")=="true")
   place=createTiddlyElement(place,"blockquote");
  wikify(theSlider.getAttribute("raw"),place);
  theSlider.setAttribute("rendered","true");
 }
 // show/hide the slider
 if(config.options.chkAnimate && (!hasClass(theSlider,'floatingPanel') || config.options.chkFloatingSlidersAnimate))
  anim.startAnimating(new Slider(theSlider,!isOpen,e.shiftKey || e.altKey,"none"));
 else
  theSlider.style.display = isOpen ? "none" : "block";
 // reset to default width (might have been changed via plugin code)
 theSlider.style.width=theSlider.defaultPanelWidth;
 // align floater panel position with target button
 if (!isOpen && window.adjustSliderPos) window.adjustSliderPos(theSlider.parentNode,theTarget,theSlider);
 // if showing panel, set focus to first 'focus-able' element in panel
 if (theSlider.style.display!="none") {
  var ctrls=theSlider.getElementsByTagName("*");
  for (var c=0; c<ctrls.length; c++) {
   var t=ctrls[c].tagName.toLowerCase();
   if ((t=="input" && ctrls[c].type!="hidden") || t=="textarea" || t=="select")
    { try{ ctrls[c].focus(); } catch(err){;} break; }
  }
 }
 var cookie=theTarget.sliderCookie;
 if (cookie && cookie.length) {
  config.options[cookie]=!isOpen;
  if (config.options[cookie]!=theTarget.defOpen) window.saveOptionCookie(cookie);
  else window.removeCookie(cookie); // remove cookie if slider is in default display state
 }
 // prevent SHIFT-CLICK from being processed by browser (opens blank window... yuck!)
 // prevent clicks *within* a slider button from being processed by browser
 // but allow plain click to bubble up to page background (to close transients, if any)
 if (e.shiftKey || theTarget!=resolveTarget(e))
  { e.cancelBubble=true; if (e.stopPropagation) e.stopPropagation(); }
 Popup.remove(); // close open popup (if any)
 return false;
}
//}}}
//{{{
// click in document background closes transient panels
document.nestedSliders_savedOnClick=document.onclick;
document.onclick=function(ev) { if (!ev) var ev=window.event; var target=resolveTarget(ev);
 if (document.nestedSliders_savedOnClick)
  var retval=document.nestedSliders_savedOnClick.apply(this,arguments);
 // if click was inside a popup... leave transient panels alone
 var p=target; while (p) if (hasClass(p,"popup")) break; else p=p.parentNode;
 if (p) return retval;
 // if click was inside transient panel (or something contained by a transient panel), leave it alone
 var p=target; while (p) {
  if ((hasClass(p,"floatingPanel")||hasClass(p,"sliderPanel"))&&p.getAttribute("transient")=="true") break;
  p=p.parentNode;
 }
 if (p) return retval;
 // otherwise, find and close all transient panels...
 var all=document.all?document.all:document.getElementsByTagName("DIV");
 for (var i=0; i<all.length; i++) {
   // if it is not a transient panel, or the click was on the button that opened this panel, don't close it.
  if (all[i].getAttribute("transient")!="true" || all[i].button==target) continue;
  // otherwise, if the panel is currently visible, close it by clicking it's button
  if (all[i].style.display!="none") window.onClickNestedSlider({target:all[i].button})
  if (!hasClass(all[i],"floatingPanel")&&!hasClass(all[i],"sliderPanel")) all[i].style.display="none";
 }
 return retval;
};
//}}}
//{{{
// adjust floating panel position based on button position
if (window.adjustSliderPos==undefined) window.adjustSliderPos=function(place,btn,panel) {
 if (hasClass(panel,"floatingPanel") && !hasClass(panel,"undocked")) {
  // see [[MoveablePanelPlugin]] for use of 'undocked'
  var rightEdge=document.body.offsetWidth-1;
  var panelWidth=panel.offsetWidth;
  var left=0;
  var top=btn.offsetHeight;
  if (place.style.position=="relative" && findPosX(btn)+panelWidth>rightEdge) {
   left-=findPosX(btn)+panelWidth-rightEdge; // shift panel relative to button
   if (findPosX(btn)+left<0) left=-findPosX(btn); // stay within left edge
  }
  if (place.style.position!="relative") {
   var left=findPosX(btn);
   var top=findPosY(btn)+btn.offsetHeight;
   var p=place; while (p && !hasClass(p,'floatingPanel')) p=p.parentNode;
   if (p) { left-=findPosX(p); top-=findPosY(p); }
   if (left+panelWidth>rightEdge) left=rightEdge-panelWidth;
   if (left<0) left=0;
  }
  panel.style.left=left+"px"; panel.style.top=top+"px";
 }
}
//}}}
//{{{
// TW2.1 and earlier:
// hijack Slider stop handler so overflow is visible after animation has completed
Slider.prototype.coreStop = Slider.prototype.stop;
Slider.prototype.stop = function()
 { this.coreStop.apply(this,arguments); this.element.style.overflow = "visible"; }
// TW2.2+
// hijack Morpher stop handler so sliderPanel/floatingPanel overflow is visible after animation has completed
if (version.major+.1*version.minor+.01*version.revision>=2.2) {
 Morpher.prototype.coreStop = Morpher.prototype.stop;
 Morpher.prototype.stop = function() {
  this.coreStop.apply(this,arguments);
  var e=this.element;
  if (hasClass(e,"sliderPanel")||hasClass(e,"floatingPanel")) {
   // adjust panel overflow and position after animation
   e.style.overflow = "visible";
   if (window.adjustSliderPos) window.adjustSliderPos(e.parentNode,e.button,e);
  }
 };
}
//}}}
/* |Author|Eric Shulman|License|http://www.TiddlyTools.com/#LegalStatements|
*/
//{{{
version.extensions.QuoteOfTheDayPlugin= {major: 1, minor: 4, revision: 1, date: new Date(2008,3,21)};
config.macros.QOTD = {
 clickTooltip: "click to view another item",
 timerTooltip: "auto-timer stopped... 'mouseout' to restart timer",
 timerClickTooltip: "auto-timer stopped... click to view another item, or 'mouseout' to restart timer",
 handler:
 function(place,macroName,params) {
 var tid=params.shift(); // source tiddler containing HR-separated quotes
 var p=params.shift();
 var click=true; // allow click for next item
 var inline=false; // wrap in slider for animation effect
 var random=true; // pick an item at random (default for "quote of the day" usage)
 var folder=false; // use local filesystem folder list
 var cookie=""; // default to no cookie
 var next=0; // default to first item (or random item)
 while (p) {
 if (p.toLowerCase()=="noclick") var click=false;
 if (p.toLowerCase()=="inline") var inline=true;
 if (p.toLowerCase()=="norandom") var random=false;
 if (p.toLowerCase().substr(0,7)=="cookie:") var cookie=p.substr(8);
 if (!isNaN(p)) var delay=p;
 p=params.shift();
 }
 if ((click||delay) && !inline) {
 var panel = createTiddlyElement(null,"div",null,"sliderPanel");
 panel.style.display="none";
 place.appendChild(panel);
 var here=createTiddlyElement(panel,click?"a":"span",null,"QOTD");
 }
 else
 var here=createTiddlyElement(place,click?"a":"span",null,"QOTD");
 here.id=(new Date()).convertToYYYYMMDDHHMMSSMMM()+Math.random().toString(); // unique ID
 // get items from tiddler or file list
 var list=store.getTiddlerText(tid,"");
 if (!list||!list.length) { // not a tiddler... maybe an image directory?
 var list=this.getImageFileList(tid);
 if (!list.length) { // maybe relative path... fixup and try again
 var h=document.location.href;
 var p=getLocalPath(decodeURIComponent(h.substr(0,h.lastIndexOf("/")+1)));
 var list=this.getImageFileList(p+tid);
 }
 }
 if (!list||!list.length) return false; // no contents... nothing to display!
 here.setAttribute("list",list);
 if (delay) here.setAttribute("delay",delay);
 here.setAttribute("random",random);
 here.setAttribute("cookie",cookie);
 if (click) {
 here.title=this.clickTooltip
 if (!inline) here.style.display="block";
 here.setAttribute("href","javascript:;");
 here.onclick=function(event)
 { config.macros.QOTD.showNextItem(this); }
 }
 if (config.options["txtQOTD_"+cookie]!=undefined) next=parseInt(config.options["txtQOTD_"+cookie]);
 here.setAttribute("nextItem",next);
 config.macros.QOTD.showNextItem(here);
 if (delay) {
 here.title=click?this.timerClickTooltip:this.timerTooltip
 here.onmouseover=function(event)
 { clearTimeout(this.ticker); };
 here.onmouseout=function(event)
 { this.ticker=setTimeout("config.macros.QOTD.tick('"+this.id+"')",this.getAttribute("delay")); };
 here.ticker=setTimeout("config.macros.QOTD.tick('"+here.id+"')",delay);
 }
 },
 tick: function(id) {
 var here=document.getElementById(id); if (!here) return;
 config.macros.QOTD.showNextItem(here);
 here.ticker=setTimeout("config.macros.QOTD.tick('"+id+"')",here.getAttribute("delay"));
 },
 showNextItem:
 function (here) {
 // hide containing slider panel (if any)
 var p=here.parentNode;
 if (p.className=="sliderPanel") p.style.display = "none"
 // get a new quote
 var index=here.getAttribute("nextItem");
 var items=here.getAttribute("list").split("\n----\n");
 if (index<0||index>=items.length) index=0;
 if (here.getAttribute("random")=="true") index=Math.floor(Math.random()*items.length);
 var txt=items[index];
 // re-render quote display element, and advance index counter
 removeChildren(here); wikify(txt,here);
 index++; here.setAttribute("nextItem",index);
 var cookie=here.getAttribute("cookie");
 if (cookie.length) {
 config.options["txtQOTD_"+cookie]=index.toString();
 saveOptionCookie("txtQOTD_"+cookie);
 }
 // redisplay slider panel (if any)
 if (p.className=="sliderPanel") {
 if(anim && config.options.chkAnimate)
 anim.startAnimating(new Slider(p,true,false,"none"));
 else p.style.display="block";
 }
 },
 getImageFileList: function(cwd) { // returns HR-separated list of image files
 function isImage(fn) {
 var ext=fn.substr(fn.length-3,3).toLowerCase();
 return ext=="jpg"||ext=="gif"||ext=="png";
 }
 var files=[];
 if (config.browser.isIE) {
 cwd=cwd.replace(/\//g,"\\");
 // IE uses ActiveX to read filesystem info
 var fso = new ActiveXObject("Scripting.FileSystemObject");
 if(!fso.FolderExists(cwd)) return [];
 var dir=fso.GetFolder(cwd);
 for(var f=new Enumerator(dir.Files); !f.atEnd(); f.moveNext())
 if (isImage(f.item().path)) files.push("[img[%0]]".format(["file:///"+f.item().path.replace(/\\/g,"/")]));
 } else {
 // FireFox (mozilla) uses "components" to read filesystem info
 // get security access
 if(!window.Components) return;
 try { netscape.security.PrivilegeManager.enablePrivilege("UniversalXPConnect"); }
 catch(e) { alert(e.description?e.description:e.toString()); return []; }
 // open/validate directory
 var file=Components.classes["@mozilla.org/file/local;1"].createInstance(Components.interfaces.nsILocalFile);
 try { file.initWithPath(cwd); } catch(e) { return []; }
 if (!file.exists() || !file.isDirectory()) { return []; }
 var folder=file.directoryEntries;
 while (folder.hasMoreElements()) {
 var f=folder.getNext().QueryInterface(Components.interfaces.nsILocalFile);
 if (f instanceof Components.interfaces.nsILocalFile)
 if (isImage(f.path)) files.push("[img[%0]]".format(["file:///"+f.path.replace(/\\/g,"/")]));
 }
 }
 return files.join("\n----\n");
 }
}
//}}}
/% |Author|Eric Shulman|License|http://www.TiddlyTools.com/#LegalStatements|
!end
!show
<<tiddler {{
 var here=story.findContainingTiddler(place); if (here) {
  var nodes=here.getElementsByTagName("*");
  for (var i=0; i<nodes.length; i++) if (hasClass(nodes[i],"title"))
   { removeChildren(nodes[i]); wikify("$1",nodes[i]); break; }
 }
'';}}>>
!end
%/<<tiddler {{'.ReplaceTiddlerTitle##'+('$1'=='$'+'1'?'info':'show')}} with: [[$1]]>>
/* |Author|Eric Shulman|License|http://www.TiddlyTools.com/#LegalStatements|
*/
//{{{
version.extensions.SinglePageModePlugin= {major: 2, minor: 9, revision: 7, date: new Date(2010,11,30)};
//}}}
//{{{
config.paramifiers.SPM = { onstart: function(v) {
 config.options.chkSinglePageMode=eval(v);
 if (config.options.chkSinglePageMode && config.options.chkSinglePagePermalink && !config.browser.isSafari) {
 config.lastURL = window.location.hash;
 if (!config.SPMTimer) config.SPMTimer=window.setInterval(function() {checkLastURL();},1000);
 }
} };
//}}}
//{{{
if (config.options.chkSinglePageMode==undefined)
 config.options.chkSinglePageMode=false;
if (config.options.chkSinglePagePermalink==undefined)
 config.options.chkSinglePagePermalink=true;
if (config.options.chkSinglePageKeepFoldedTiddlers==undefined)
 config.options.chkSinglePageKeepFoldedTiddlers=false;
if (config.options.chkSinglePageKeepEditedTiddlers==undefined)
 config.options.chkSinglePageKeepEditedTiddlers=false;
if (config.options.chkTopOfPageMode==undefined)
 config.options.chkTopOfPageMode=false;
if (config.options.chkBottomOfPageMode==undefined)
 config.options.chkBottomOfPageMode=false;
if (config.options.chkSinglePageAutoScroll==undefined)
 config.options.chkSinglePageAutoScroll=false;
//}}}
//{{{
config.SPMTimer = 0;
config.lastURL = window.location.hash;
function checkLastURL()
{
 if (!config.options.chkSinglePageMode)
 { window.clearInterval(config.SPMTimer); config.SPMTimer=0; return; }
 if (config.lastURL == window.location.hash) return; // no change in hash
 var tids=decodeURIComponent(window.location.hash.substr(1)).readBracketedList();
 if (tids.length==1) // permalink (single tiddler in URL)
 story.displayTiddler(null,tids[0]);
 else { // restore permaview or default view
 config.lastURL = window.location.hash;
 if (!tids.length) tids=store.getTiddlerText("DefaultTiddlers").readBracketedList();
 story.closeAllTiddlers();
 story.displayTiddlers(null,tids);
 }
}
if (Story.prototype.SPM_coreDisplayTiddler==undefined)
 Story.prototype.SPM_coreDisplayTiddler=Story.prototype.displayTiddler;
Story.prototype.displayTiddler = function(srcElement,tiddler,template,animate,slowly)
{
 var title=(tiddler instanceof Tiddler)?tiddler.title:tiddler;
 var tiddlerElem=story.getTiddler(title); // ==null unless tiddler is already displayed
 var opt=config.options;
 var single=opt.chkSinglePageMode && !startingUp;
 var top=opt.chkTopOfPageMode && !startingUp;
 var bottom=opt.chkBottomOfPageMode && !startingUp;
 if (single) {
 story.forEachTiddler(function(tid,elem) {
 // skip current tiddler and, optionally, tiddlers that are folded.
 if ( tid==title
 || (opt.chkSinglePageKeepFoldedTiddlers && elem.getAttribute("folded")=="true"))
 return;
 // if a tiddler is being edited, ask before closing
 if (elem.getAttribute("dirty")=="true") {
 if (opt.chkSinglePageKeepEditedTiddlers) return;
 // if tiddler to be displayed is already shown, then leave active tiddler editor as is
 // (occurs when switching between view and edit modes)
 if (tiddlerElem) return;
 // otherwise, ask for permission
 var msg="'"+tid+"' is currently being edited.\n\n";
 msg+="Press OK to save and close this tiddler\nor press Cancel to leave it opened";
 if (!confirm(msg)) return; else story.saveTiddler(tid);
 }
 story.closeTiddler(tid);
 });
 }
 else if (top)
 arguments[0]=null;
 else if (bottom)
 arguments[0]="bottom";
 if (single && opt.chkSinglePagePermalink && !config.browser.isSafari) {
 window.location.hash = encodeURIComponent(String.encodeTiddlyLink(title));
 config.lastURL = window.location.hash;
 document.title = wikifyPlain("SiteTitle") + " - " + title;
 if (!config.SPMTimer) config.SPMTimer=window.setInterval(function() {checkLastURL();},1000);
 }
 if (tiddlerElem && tiddlerElem.getAttribute("dirty")=="true") { // editing... move tiddler without re-rendering
 var isTopTiddler=(tiddlerElem.previousSibling==null);
 if (!isTopTiddler && (single || top))
 tiddlerElem.parentNode.insertBefore(tiddlerElem,tiddlerElem.parentNode.firstChild);
 else if (bottom)
 tiddlerElem.parentNode.insertBefore(tiddlerElem,null);
 else this.SPM_coreDisplayTiddler.apply(this,arguments); // let CORE render tiddler
 } else
 this.SPM_coreDisplayTiddler.apply(this,arguments); // let CORE render tiddler
 var tiddlerElem=story.getTiddler(title);
 if (tiddlerElem&&opt.chkSinglePageAutoScroll) {
 // scroll to top of page or top of tiddler
 var isTopTiddler=(tiddlerElem.previousSibling==null);
 var yPos=isTopTiddler?0:ensureVisible(tiddlerElem);
 // if animating, defer scroll until after animation completes
 var delay=opt.chkAnimate?config.animDuration+10:0;
 setTimeout("window.scrollTo(0,"+yPos+")",delay);
 }
}
if (Story.prototype.SPM_coreDisplayTiddlers==undefined)
 Story.prototype.SPM_coreDisplayTiddlers=Story.prototype.displayTiddlers;
Story.prototype.displayTiddlers = function() {
 // suspend single/top/bottom modes when showing multiple tiddlers
 var opt=config.options;
 var saveSPM=opt.chkSinglePageMode; opt.chkSinglePageMode=false;
 var saveTPM=opt.chkTopOfPageMode; opt.chkTopOfPageMode=false;
 var saveBPM=opt.chkBottomOfPageMode; opt.chkBottomOfPageMode=false;
 this.SPM_coreDisplayTiddlers.apply(this,arguments);
 opt.chkBottomOfPageMode=saveBPM;
 opt.chkTopOfPageMode=saveTPM;
 opt.chkSinglePageMode=saveSPM;
}
//}}}
/* |Author|SaqImtiaz|Version|2.02.2008.01.25|License|[[Creative Commons Attribution-ShareAlike 3.0 License|http://creativecommons.org/licenses/by-sa/3.0/]]| */
{{{
//!BEGIN-PLUGIN-CODE
config.tableSorting = {
 darrow: "\u2193",
 uarrow: "\u2191",
 getText : function (o) {
  var p = o.cells[SORT_INDEX];
  return p.innerText || p.textContent || '';
 },
 sortTable : function (o,rev) {
  SORT_INDEX = o.getAttribute("index");
  var c = config.tableSorting;
  var T = findRelated(o.parentNode,"TABLE");
  if(T.tBodies[0].rows.length<=1)
   return;
  var itm = "";
  var i = 0;
  while (itm == "" && i < T.tBodies[0].rows.length) {
   itm = c.getText(T.tBodies[0].rows[i]).trim();
   i++;
  }
  if (itm == "")
   return;
  var r = [];
  var S = o.getElementsByTagName("span")[0];
  c.fn = c.sortAlpha;
  if(!isNaN(Date.parse(itm)))
   c.fn = c.sortDate;
  else if(itm.match(/^[$|£|€|\+|\-]{0,1}\d*\.{0,1}\d+$/))
   c.fn = c.sortNumber;
  else if(itm.match(/^\d*\.{0,1}\d+[K|M|G]{0,1}b$/))
   c.fn = c.sortFile;
  for(i=0; i<T.tBodies[0].rows.length; i++) {
    r[i]=T.tBodies[0].rows[i];
  }
  r.sort(c.reSort);
  if(S.firstChild.nodeValue==c.darrow || rev) {
   r.reverse();
   S.firstChild.nodeValue=c.uarrow;
  }
  else
   S.firstChild.nodeValue=c.darrow;
  var thead = T.getElementsByTagName('thead')[0];
  var headers = thead.rows[thead.rows.length-1].cells;
  for(var k=0; k<headers.length; k++) {
   if(!hasClass(headers[k],"nosort"))
    addClass(headers[k].getElementsByTagName("span")[0],"hidden");
  }
  removeClass(S,"hidden");
  for(i=0; i<r.length; i++) {
   T.tBodies[0].appendChild(r[i]);
   c.stripe(r[i],i);
   for(var j=0; j<r[i].cells.length;j++){
    removeClass(r[i].cells[j],"sortedCol");
   }
   addClass(r[i].cells[SORT_INDEX],"sortedCol");
  }
 },
 stripe : function (e,i){
  var cl = ["oddRow","evenRow"];
  i&1? cl.reverse() : cl;
  removeClass(e,cl[1]);
  addClass(e,cl[0]);
 },
 sortNumber : function(v) {
  var x = parseFloat(this.getText(v).replace(/[^0-9.-]/g,''));
  return isNaN(x)? 0: x;
 },
 sortDate : function(v) {
  return Date.parse(this.getText(v));
 },
 sortAlpha : function(v) {
  return this.getText(v).toLowerCase();
 },
 sortFile : function(v) {
  var j, q = config.messages.sizeTemplates, s = this.getText(v);
  for (var i=0; i<q.length; i++) {
   if ((j = s.toLowerCase().indexOf(q[i].template.replace("%0\u00a0","").toLowerCase())) != -1)
    return q[i].unit * s.substr(0,j);
  }
  return parseFloat(s);
 },
 reSort : function(a,b){
  var c = config.tableSorting;
  var aa = c.fn(a);
  var bb = c.fn(b);
  return ((aa==bb)? 0 : ((aa<bb)? -1:1));
 }
};
Story.prototype.tSort_refreshTiddler = Story.prototype.refreshTiddler;
Story.prototype.refreshTiddler = function(title,template,force,customFields,defaultText){
 var elem = this.tSort_refreshTiddler.apply(this,arguments);
 if(elem){
  var tables = elem.getElementsByTagName("TABLE");
  var c = config.tableSorting;
  for(var i=0; i<tables.length; i++){
   if(hasClass(tables[i],"sortable")){
    var x = null, rev, table = tables[i], thead = table.getElementsByTagName('thead')[0], headers = thead.rows[thead.rows.length-1].cells;
    for (var j=0; j<headers.length; j++){
     var h = headers[j];
     if (hasClass(h,"nosort"))
      continue;
     h.setAttribute("index",j);
     h.onclick = function(){c.sortTable(this); return false;};
     h.ondblclick = stopEvent;
     if(h.getElementsByTagName("span").length == 0)
      createTiddlyElement(h,"span",null,"hidden",c.uarrow);
     if(!x && hasClass(h,"autosort")) {
      x = j;
      rev = hasClass(h,"reverse");
     }
    }
    if(x)
     c.sortTable(headers[x],rev);
   }
  }
 }
 return elem;
};
setStylesheet("table.sortable span.hidden {visibility:hidden;}\n"+
 "table.sortable thead {cursor:pointer;}\n"+
 "table.sortable .nosort {cursor:default;}\n"+
 "table.sortable td.sortedCol {background:#ffc;}","TableSortingPluginStyles");
function stopEvent(e){
 var ev = e? e : window.event;
 ev.cancelBubble = true;
 if (ev.stopPropagation) ev.stopPropagation();
 return false;
}
config.macros.nosort={
 handler : function(place){
  addClass(place,"nosort");
 }
};
config.macros.autosort={
 handler : function(place,m,p,w,pS){
  addClass(place,"autosort"+" "+pS);
 }
};
}}}
/* |Author|Eric Shulman|License|http://www.TiddlyTools.com/#LegalStatements| */
//{{{
version.extensions.WikifyPlugin= {major: 1, minor: 1, revision: 4, date: new Date(2009,3,29)};
config.macros.wikify={
 handler: function(place,macroName,params,wikifier,paramString,tiddler) {
  var fmt=params.shift();
  var values=[];
  var out="";
  if (!fmt.match(/\%[0-9]/g) && params.length) // format has no markers, just join all params with spaces
   out=fmt+" "+params.join(" ");
  else { // format param has markers, get values and perform substitution
   while (p=params.shift()) values.push(this.getFieldReference(place,p));
   out=fmt.format(values);
  }
  if (macroName=="wikiCalc") out=eval(out).toString();
  wikify(out.unescapeLineBreaks(),place,null,tiddler);
 },
 getFieldReference: function(place,p) { // "slicename::tiddlername" or "fieldname@tiddlername" or "fieldname"
  if (typeof p != "string") return p; // literal non-string value... just return it...
  var parts=p.split(config.textPrimitives.sliceSeparator);
  if (parts.length==2) {// maybe a slice reference?
   var tid=parts[0]; var slice=parts[1];
   if (!tid || !tid.length || tid=="here") { // no target (or "here"), use containing tiddler
    tid=story.findContainingTiddler(place);
    if (tid) tid=tid.getAttribute("tiddler")
    else tid="SiteSlices"; // fallback for 'non-tiddler' areas (e.g, header, sidebar, etc.)
   }
   var val=store.getTiddlerSlice(tid,slice); // get tiddler slice value
  }
  if (val==undefined) {// not a slice, or slice not found, maybe a field reference?
   var parts=p.split("@");
   var field=parts[0];
   if (!field || !field.length) field="checked"; // missing fieldname, fallback: checked@tiddlername
   var tid=parts[1];
   if (!tid || !tid.length || tid=="here") { // no target (or "here"), use containing tiddler
    tid=story.findContainingTiddler(place);
    if (tid) tid=tid.getAttribute("tiddler")
    else tid="SiteFields"; // fallback for 'non-tiddler' areas (e.g, header, sidebar, etc.)
   }
   var val=store.getValue(tid,field);
  }
  // not a slice or field, or slice/field not found... return value unchanged
  return val===undefined?p:val;
 }
}
//}}}
//{{{
// define alternative macroName for triggering pre-rendering call to eval()
config.macros.wikiCalc=config.macros.wikify;
//}}}
<!--{{{-->
<span class='yourSearchNumber' macro='foundTiddler number'></span>
<span class='yourSearchTitle' macro='foundTiddler title text 100'/></span> —
<span class='yourSearchTags' macro='foundTiddler field tags 0'/></span>
<!--}}}-->
/* |YourSearchPlugin v2.1.6 (2012-04-19)|http://tiddlywiki.abego-software.de/#YourSearchPlugin|https://github.com/abego/YourSearchPlugin|
|Author|UdoBorkowski (ub [at] abego-software [dot] de)|[[BSD open source license|http://www.abego-software.de/legal/apl-v10.html]]| */
///%
if(!version.extensions.YourSearchPlugin){version.extensions.YourSearchPlugin={major:2,minor:1,revision:6,source:"http://tiddlywiki.abego-software.de/#YourSearchPlugin",licence:"[[BSD open source license (abego Software)|http://www.abego-software.de/legal/apl-v10.html]]",copyright:"Copyright (c) abego Software GmbH, 2005-2012 (www.abego-software.de)"};if(!window.abego){window.abego={}}if(!Array.forEach){Array.forEach=function(c,e,d){for(var b=0,a=c.length;b<a;b++){e.call(d,c[b],b,c)}};Array.prototype.forEach=function(d,c){for(var b=0,a=this.length;b<a;b++){d.call(c,this[b],b,this)}}}abego.toInt=function(b,a){if(!b){return a}var c=parseInt(b);return(c==NaN)?a:c};abego.createEllipsis=function(a){var b=createTiddlyElement(a,"span");b.innerHTML="&hellip;"};abego.shallowCopy=function(b){if(!b){return b}var a={};for(var c in b){a[c]=b[c]}return a};abego.copyOptions=function(a){return !a?{}:abego.shallowCopy(a)};abego.countStrings=function(d,c){if(!c){return 0}var a=c.length;var f=0;var e=0;while(true){var b=d.indexOf(c,e);if(b<0){return f}f++;e=b+a}return f};abego.getBracedText=function(j,e,a){if(!e){e=0}var k=/\{([^\}]*)\}/gm;k.lastIndex=e;var d=k.exec(j);if(d){var l=d[1];var b=abego.countStrings(l,"{");if(!b){if(a){a.lastIndex=k.lastIndex}return l}var g=j.length;for(var f=k.lastIndex;f<g&&b;f++){var h=j.charAt(f);if(h=="{"){b++}else{if(h=="}"){b--}}}if(!b){if(a){a.lastIndex=f-1}return j.substring(d.index+1,f-1)}}};abego.select=function(d,c,b,a){if(!a){a=[]}d.forEach(function(e){if(c.call(b,e)){a.push(e)}});return a};abego.consumeEvent=function(a){if(a.stopPropagation){a.stopPropagation()}if(a.preventDefault){a.preventDefault()}a.cancelBubble=true;a.returnValue=true};abego.TiddlerFilterTerm=function(d,b){if(!b){b={}}var c=d;if(!b.textIsRegExp){c=d.escapeRegExp();if(b.fullWordMatch){c="\\b"+c+"\\b"}}var a=new RegExp(c,"m"+(b.caseSensitive?"":"i"));this.tester=new abego.MultiFieldRegExpTester(a,b.fields,b.withExtendedFields)};abego.TiddlerFilterTerm.prototype.test=function(a){return this.tester.test(a)};abego.parseNewTiddlerCommandLine=function(c){var a=/(.*?)\.(?:\s+|$)([^#]*)(#.*)?/.exec(c);if(!a){a=/([^#]*)()(#.*)?/.exec(c)}if(a){var d;if(a[3]){var b=a[3].replace(/#/g,"");d=b.parseParams("tag")}else{d=[[]]}var e=a[2]?a[2].trim():"";d.push({name:"text",value:e});d[0].text=[e];return{title:a[1].trim(),params:d}}else{return{title:c.trim(),params:[[]]}}};abego.parseTiddlerFilterTerm=function(queryText,offset,options){var re=/\s*(?:(?:\{([^\}]*)\})|(?:(=)|([#%!])|(?:(\w+)\s*\:(?!\/\/))|(?:(?:("(?:(?:\\")|[^"])+")|(?:\/((?:(?:\\\/)|[^\/])+)\/)|(\w+\:\/\/[^\s]+)|([^\s\)\-\"]+)))))/mg;var shortCuts={"!":"title","%":"text","#":"tags"};var fieldNames={};var fullWordMatch=false;re.lastIndex=offset;while(true){var i=re.lastIndex;var m=re.exec(queryText);if(!m||m.index!=i){throw"Word or String literal expected"}if(m[1]){var lastIndexRef={};var code=abego.getBracedText(queryText,0,lastIndexRef);if(!code){throw"Invalid {...} syntax"}var f=Function("tiddler","return ("+code+");");return{func:f,lastIndex:lastIndexRef.lastIndex,markRE:null}}if(m[2]){fullWordMatch=true}else{if(m[3]){fieldNames[shortCuts[m[3]]]=1}else{if(m[4]){fieldNames[m[4]]=1}else{var textIsRegExp=m[6];var text=m[5]?window.eval(m[5]):m[6]?m[6]:m[7]?m[7]:m[8];options=abego.copyOptions(options);options.fullWordMatch=fullWordMatch;options.textIsRegExp=textIsRegExp;var fields=[];for(var n in fieldNames){fields.push(n)}if(fields.length==0){options.fields=options.defaultFields}else{options.fields=fields;options.withExtendedFields=false}var term=new abego.TiddlerFilterTerm(text,options);var markREText=textIsRegExp?text:text.escapeRegExp();if(markREText&&fullWordMatch){markREText="\\b"+markREText+"\\b"}return{func:function(tiddler){return term.test(tiddler)},lastIndex:re.lastIndex,markRE:markREText?"(?:"+markREText+")":null}}}}}};abego.BoolExp=function(i,c,j){this.s=i;var h=j&&j.defaultOperationIs_OR;var e=/\s*\)/g;var f=/\s*(?:(and|\&\&)|(or|\|\|))/gi;var b=/\s*(\-|not)?(\s*\()?/gi;var a;var d=function(p){b.lastIndex=p;var l=b.exec(i);var o=false;var k=null;if(l&&l.index==p){p+=l[0].length;o=l[1];if(l[2]){var n=a(p);e.lastIndex=n.lastIndex;if(!e.exec(i)){throw"Missing ')'"}k={func:n.func,lastIndex:e.lastIndex,markRE:n.markRE}}}if(!k){k=c(i,p,j)}if(o){k.func=(function(m){return function(q){return !m(q)}})(k.func);k.markRE=null}return k};a=function(s){var n=d(s);while(true){var p=n.lastIndex;f.lastIndex=p;var k=f.exec(i);var o;var q;if(k&&k.index==p){o=!k[1];q=d(f.lastIndex)}else{try{q=d(p)}catch(r){return n}o=h}n.func=(function(t,m,l){return l?function(u){return t(u)||m(u)}:function(u){return t(u)&&m(u)}})(n.func,q.func,o);n.lastIndex=q.lastIndex;if(!n.markRE){n.markRE=q.markRE}else{if(q.markRE){n.markRE=n.markRE+"|"+q.markRE}}}};var g=a(0);this.evalFunc=g.func;if(g.markRE){this.markRegExp=new RegExp(g.markRE,j.caseSensitive?"mg":"img")}};abego.BoolExp.prototype.exec=function(){return this.evalFunc.apply(this,arguments)};abego.BoolExp.prototype.getMarkRegExp=function(){return this.markRegExp};abego.BoolExp.prototype.toString=function(){return this.s};abego.MultiFieldRegExpTester=function(b,a,c){this.re=b;this.fields=a?a:["title","text","tags"];this.withExtendedFields=c};abego.MultiFieldRegExpTester.prototype.test=function(b){var d=this.re;for(var a=0;a<this.fields.length;a++){var c=store.getValue(b,this.fields[a]);if(typeof c=="string"&&d.test(c)){return this.fields[a]}}if(this.withExtendedFields){return store.forEachField(b,function(e,g,f){return typeof f=="string"&&d.test(f)?g:null},true)}return null};abego.TiddlerQuery=function(b,a,d,c,e){if(d){this.regExp=new RegExp(b,a?"mg":"img");this.tester=new abego.MultiFieldRegExpTester(this.regExp,c,e)}else{this.expr=new abego.BoolExp(b,abego.parseTiddlerFilterTerm,{defaultFields:c,caseSensitive:a,withExtendedFields:e})}this.getQueryText=function(){return b};this.getUseRegExp=function(){return d};this.getCaseSensitive=function(){return a};this.getDefaultFields=function(){return c};this.getWithExtendedFields=function(){return e}};abego.TiddlerQuery.prototype.test=function(a){if(!a){return false}if(this.regExp){return this.tester.test(a)}return this.expr.exec(a)};abego.TiddlerQuery.prototype.filter=function(a){return abego.select(a,this.test,this)};abego.TiddlerQuery.prototype.getMarkRegExp=function(){if(this.regExp){return"".search(this.regExp)>=0?null:this.regExp}return this.expr.getMarkRegExp()};abego.TiddlerQuery.prototype.toString=function(){return(this.regExp?this.regExp:this.expr).toString()};abego.PageWiseRenderer=function(){this.firstIndexOnPage=0};merge(abego.PageWiseRenderer.prototype,{setItems:function(a){this.items=a;this.setFirstIndexOnPage(0)},getMaxPagesInNavigation:function(){return 10},getItemsCount:function(a){return this.items?this.items.length:0},getCurrentPageIndex:function(){return Math.floor(this.firstIndexOnPage/this.getItemsPerPage())},getLastPageIndex:function(){return Math.floor((this.getItemsCount()-1)/this.getItemsPerPage())},setFirstIndexOnPage:function(a){this.firstIndexOnPage=Math.min(Math.max(0,a),this.getItemsCount()-1)},getFirstIndexOnPage:function(){this.firstIndexOnPage=Math.floor(this.firstIndexOnPage/this.getItemsPerPage())*this.getItemsPerPage();return this.firstIndexOnPage},getLastIndexOnPage:function(){return Math.min(this.getFirstIndexOnPage()+this.getItemsPerPage()-1,this.getItemsCount()-1)},onPageChanged:function(a,b){},renderPage:function(a){if(a.beginRendering){a.beginRendering(this)}try{if(this.getItemsCount()){var d=this.getLastIndexOnPage();var c=-1;for(var b=this.getFirstIndexOnPage();b<=d;b++){c++;a.render(this,this.items[b],b,c)}}}finally{if(a.endRendering){a.endRendering(this)}}},addPageNavigation:function(c){if(!this.getItemsCount()){return}var k=this;var g=function(n){if(!n){n=window.event}abego.consumeEvent(n);var i=abego.toInt(this.getAttribute("page"),0);var m=k.getCurrentPageIndex();if(i==m){return}var l=i*k.getItemsPerPage();k.setFirstIndexOnPage(l);k.onPageChanged(i,m)};var e;var h=this.getCurrentPageIndex();var f=this.getLastPageIndex();if(h>0){e=createTiddlyButton(c,"Précédent","Page précédente (Raccourci: Alt-'<')",g,"prev");e.setAttribute("page",(h-1).toString());e.setAttribute("accessKey","<")}for(var d=-this.getMaxPagesInNavigation();d<this.getMaxPagesInNavigation();d++){var b=h+d;if(b<0){continue}if(b>f){break}var a=(d+h+1).toString();var j=b==h?"currentPage":"otherPage";e=createTiddlyButton(c,a,"Aller page %0".format([a]),g,j);e.setAttribute("page",(b).toString())}if(h<f){e=createTiddlyButton(c,"Suivant","Page suivante (Raccourci: Alt-'>')",g,"next");e.setAttribute("page",(h+1).toString());e.setAttribute("accessKey",">")}}});abego.LimitedTextRenderer=function(){var l=40;var c=4;var k=function(p,z,v){var q=p.length;if(q==0){p.push({start:z,end:v});return}var u=0;for(;u<q;u++){var w=p[u];if(w.start<=v&&z<=w.end){var o;var s=u+1;for(;s<q;s++){o=p[s];if(o.start>v||z>w.end){break}}var x=z;var y=v;for(var t=u;t<s;t++){o=p[t];x=Math.min(x,o.start);y=Math.max(y,o.end)}p.splice(u,s-u,{start:x,end:y});return}if(w.start>v){break}}p.splice(u,0,{start:z,end:v})};var d=function(n){var q=0;for(var p=0;p<n.length;p++){var o=n[p];q+=o.end-o.start}return q};var b=function(n){return(n>="a"&&n<="z")||(n>="A"&&n<="Z")||n=="_"};var f=function(p,r){if(!b(p[r])){return null}for(var o=r-1;o>=0&&b(p[o]);o--){}var q=o+1;var t=p.length;for(o=r+1;o<t&&b(p[o]);o++){}return{start:q,end:o}};var a=function(o,q,p){var n;if(p){n=f(o,q)}else{if(q<=0){return q}n=f(o,q-1)}if(!n){return q}if(p){if(n.start>=q-c){return n.start}if(n.end<=q+c){return n.end}}else{if(n.end<=q+c){return n.end}if(n.start>=q-c){return n.start}}return q};var j=function(r,q){var n=[];if(q){var u=0;do{q.lastIndex=u;var o=q.exec(r);if(o){if(u<o.index){var p=r.substring(u,o.index);n.push({text:p})}n.push({text:o[0],isMatch:true});u=o.index+o[0].length}else{n.push({text:r.substr(u)});break}}while(true)}else{n.push({text:r})}return n};var i=function(p){var n=0;for(var o=0;o<p.length;o++){if(p[o].isMatch){n++}}return n};var h=function(v,u,q,t,o){var w=Math.max(Math.floor(o/(t+1)),l);var n=Math.max(w-(q-u),0);var r=Math.min(Math.floor(q+n/3),v.length);var p=Math.max(r-w,0);p=a(v,p,true);r=a(v,r,false);return{start:p,end:r}};var m=function(r,y,o){var n=[];var v=i(r);var u=0;for(var p=0;p<r.length;p++){var x=r[p];var w=x.text;if(x.isMatch){var q=h(y,u,u+w.length,v,o);k(n,q.start,q.end)}u+=w.length}return n};var g=function(t,p,o){var n=o-d(p);while(n>0){if(p.length==0){k(p,0,a(t,o,false));return}else{var q=p[0];var v;var r;if(q.start==0){v=q.end;if(p.length>1){r=p[1].start}else{k(p,v,a(t,v+n,false));return}}else{v=0;r=q.start}var u=Math.min(r,v+n);k(p,v,u);n-=(u-v)}}};var e=function(p,x,w,n,o){if(n.length==0){return}var u=function(z,I,D,F,C){var H;var G;var E=0;var B=0;var A=0;for(;B<D.length;B++){H=D[B];G=H.text;if(F<E+G.length){A=F-E;break}E+=G.length}var y=C-F;for(;B<D.length&&y>0;B++){H=D[B];G=H.text.substr(A);A=0;if(G.length>y){G=G.substr(0,y)}if(H.isMatch){createTiddlyElement(z,"span",null,"marked",G)}else{createTiddlyText(z,G)}y-=G.length}if(C<I.length){abego.createEllipsis(z)}};if(n[0].start>0){abego.createEllipsis(p)}var q=o;for(var r=0;r<n.length&&q>0;r++){var t=n[r];var v=Math.min(t.end-t.start,q);u(p,x,w,t.start,t.start+v);q-=v}};this.render=function(p,q,o,t){if(q.length<o){o=q.length}var r=j(q,t);var n=m(r,q,o);g(q,n,o);e(p,q,r,n,o)}};(function(){function alertAndThrow(msg){alert(msg);throw msg}if(version.major<2||(version.major==2&&version.minor<1)){alertAndThrow("YourSearchPlugin requires TiddlyWiki 2.1 or newer.\n\nCheck the archive for YourSearch plugins\nsupporting older versions of TiddlyWiki.\n\nArchive: http://tiddlywiki.abego-software.de/archive")}abego.YourSearch={};var lastResults=undefined;var lastQuery=undefined;var setLastResults=function(array){lastResults=array};var getLastResults=function(){return lastResults?lastResults:[]};var getLastResultsCount=function(){return lastResults?lastResults.length:0};var matchInTitleWeight=4;var precisionInTitleWeight=10;var matchInTagsWeight=2;var getMatchCount=function(s,re){var m=s.match(re);return m?m.length:0};var standardRankFunction=function(tiddler,query){var markRE=query.getMarkRegExp();if(!markRE){return 1}var matchesInTitle=tiddler.title.match(markRE);var nMatchesInTitle=matchesInTitle?matchesInTitle.length:0;var nMatchesInTags=getMatchCount(tiddler.getTags(),markRE);var lengthOfMatchesInTitle=matchesInTitle?matchesInTitle.join("").length:0;var precisionInTitle=tiddler.title.length>0?lengthOfMatchesInTitle/tiddler.title.length:0;var rank=nMatchesInTitle*matchInTitleWeight+nMatchesInTags*matchInTagsWeight+precisionInTitle*precisionInTitleWeight+1;return rank};var findMatches=function(store,searchText,caseSensitive,useRegExp,sortField,excludeTag){lastQuery=null;var candidates=store.reverseLookup("tags",excludeTag,false);try{var defaultFields=[];if(config.options.chkSearchInTitle){defaultFields.push("title")}if(config.options.chkSearchInText){defaultFields.push("text")}if(config.options.chkSearchInTags){defaultFields.push("tags")}lastQuery=new abego.TiddlerQuery(searchText,caseSensitive,useRegExp,defaultFields,config.options.chkSearchExtendedFields)}catch(e){return[]}var results=lastQuery.filter(candidates);var rankFunction=abego.YourSearch.getRankFunction();for(var i=0;i<results.length;i++){var tiddler=results[i];var rank=rankFunction(tiddler,lastQuery);tiddler.searchRank=rank}if(!sortField){sortField="title"}var sortFunction=function(a,b){var searchRankDiff=a.searchRank-b.searchRank;if(searchRankDiff==0){if(a[sortField]==b[sortField]){return(0)}else{return(a[sortField]<b[sortField])?-1:+1}}else{return(searchRankDiff>0)?-1:+1}};results.sort(sortFunction);return results};var maxCharsInTitle=80;var maxCharsInTags=50;var maxCharsInText=250;var maxCharsInField=50;var itemsPerPageDefault=25;var itemsPerPageWithPreviewDefault=10;var yourSearchResultID="yourSearchResult";var yourSearchResultItemsID="yourSearchResultItems";var lastSearchText=null;var resultElement=null;var searchInputField=null;var searchButton=null;var lastNewTiddlerButton=null;var initStylesheet=function(){if(version.extensions.YourSearchPlugin.styleSheetInited){return}version.extensions.YourSearchPlugin.styleSheetInited=true;setStylesheet(store.getTiddlerText("YourSearchStyleSheet"),"yourSearch")};var isResultOpen=function(){return resultElement!=null&&resultElement.parentNode==document.body};var closeResult=function(){if(isResultOpen()){document.body.removeChild(resultElement)}};var closeResultAndDisplayTiddler=function(e){closeResult();var title=this.getAttribute("tiddlyLink");if(title){var withHilite=this.getAttribute("withHilite");var oldHighlightHack=highlightHack;if(withHilite&&withHilite=="true"&&lastQuery){highlightHack=lastQuery.getMarkRegExp()}story.displayTiddler(this,title);highlightHack=oldHighlightHack}return(false)};var adjustResultPositionAndSize=function(){if(!searchInputField){return}var root=searchInputField;var rootLeft=findPosX(root);var rootTop=findPosY(root);var rootHeight=root.offsetHeight;var popupLeft=rootLeft;var popupTop=rootTop+rootHeight;var winWidth=findWindowWidth();if(winWidth<resultElement.offsetWidth){resultElement.style.width=(winWidth-100)+"px";winWidth=findWindowWidth()}var popupWidth=resultElement.offsetWidth;if(popupLeft+popupWidth>winWidth){popupLeft=winWidth-popupWidth-30}if(popupLeft<0){popupLeft=0}resultElement.style.left=popupLeft+"px";resultElement.style.top=popupTop+"px";resultElement.style.display="block"};var scrollVisible=function(){if(resultElement){window.scrollTo(0,ensureVisible(resultElement))}if(searchInputField){window.scrollTo(0,ensureVisible(searchInputField))}};var ensureResultIsDisplayedNicely=function(){adjustResultPositionAndSize();scrollVisible()};var indexInPage=undefined;var currentTiddler=undefined;var pager=new abego.PageWiseRenderer();var MyItemRenderer=function(parent){this.itemHtml=store.getTiddlerText(".YourSearchItemTemplate");if(!this.itemHtml){alertAndThrow(".YourSearchItemTemplate not found")}this.place=document.getElementById(yourSearchResultItemsID);if(!this.place){this.place=createTiddlyElement(parent,"div",yourSearchResultItemsID)}};merge(MyItemRenderer.prototype,{render:function(pager,object,index,indexOnPage){indexInPage=indexOnPage;currentTiddler=object;var item=createTiddlyElement(this.place,"div",null,"yourSearchItem");item.innerHTML=this.itemHtml;applyHtmlMacros(item,null);refreshElements(item,null)},endRendering:function(pager){currentTiddler=null}});var refreshResult=function(){if(!resultElement||!searchInputField){return}var html=store.getTiddlerText("YourSearchResultTemplate");if(!html){html="<b>Tiddler YourSearchResultTemplate not found</b>"}resultElement.innerHTML=html;applyHtmlMacros(resultElement,null);refreshElements(resultElement,null);var itemRenderer=new MyItemRenderer(resultElement);pager.renderPage(itemRenderer);ensureResultIsDisplayedNicely()};pager.getItemsPerPage=function(){var n=(config.options.chkPreviewText)?abego.toInt(config.options.txtItemsPerPageWithPreview,itemsPerPageWithPreviewDefault):abego.toInt(config.options.txtItemsPerPage,itemsPerPageDefault);return(n>0)?n:1};pager.onPageChanged=function(){refreshResult()};var reopenResultIfApplicable=function(){if(searchInputField==null||!config.options.chkUseYourSearch){return}if((searchInputField.value==lastSearchText)&&lastSearchText&&!isResultOpen()){if(resultElement&&(resultElement.parentNode!=document.body)){document.body.appendChild(resultElement);ensureResultIsDisplayedNicely()}else{abego.YourSearch.onShowResult(true)}}};var invalidateResult=function(){closeResult();resultElement=null;lastSearchText=null};var isDescendantOrSelf=function(self,e){while(e!=null){if(self==e){return true}e=e.parentNode}return false};var onDocumentClick=function(e){if(e.target==searchInputField){return}if(e.target==searchButton){return}if(resultElement&&isDescendantOrSelf(resultElement,e.target)){return}closeResult()};var onDocumentKeyup=function(e){if(e.keyCode==27){closeResult()}};addEvent(document,"click",onDocumentClick);addEvent(document,"keyup",onDocumentKeyup);var myStorySearch=function(text,useCaseSensitive,useRegExp){lastSearchText=text;setLastResults(findMatches(store,text,useCaseSensitive,useRegExp,"title","excludeSearch"));abego.YourSearch.onShowResult()};var myMacroSearchHandler=function(place,macroName,params,wikifier,paramString,tiddler){initStylesheet();lastSearchText="";var searchTimeout=null;var doSearch=function(txt){if(config.options.chkUseYourSearch){myStorySearch(txt.value,config.options.chkCaseSensitiveSearch,config.options.chkRegExpSearch)}else{story.search(txt.value,config.options.chkCaseSensitiveSearch,config.options.chkRegExpSearch)}lastSearchText=txt.value};var clickHandler=function(e){doSearch(searchInputField);return false};var keyHandler=function(e){if(!e){e=window.event}searchInputField=this;switch(e.keyCode){case 13:if(e.ctrlKey&&lastNewTiddlerButton&&isResultOpen()){lastNewTiddlerButton.onclick.apply(lastNewTiddlerButton,[e])}else{doSearch(this)}break;case 27:if(isResultOpen()){closeResult()}else{this.value="";clearMessage()}break}if(String.fromCharCode(e.keyCode)==this.accessKey||e.altKey){reopenResultIfApplicable()}if(this.value.length<3&&searchTimeout){clearTimeout(searchTimeout)}if(this.value.length>2){if(this.value!=lastSearchText){if(!config.options.chkUseYourSearch||config.options.chkSearchAsYouType){if(searchTimeout){clearTimeout(searchTimeout)}var txt=this;searchTimeout=setTimeout(function(){doSearch(txt)},500)}}else{if(searchTimeout){clearTimeout(searchTimeout)}}}if(this.value.length==0){closeResult()}};var focusHandler=function(e){this.select();clearMessage();reopenResultIfApplicable()};var args=paramString.parseParams("list",null,true);var buttonAtRight=getFlag(args,"buttonAtRight");var sizeTextbox=getParam(args,"sizeTextbox",this.sizeTextbox);var txt=createTiddlyElement(null,"input",null,"txtOptionInput searchField",null);if(params[0]){txt.value=params[0]}txt.onkeyup=keyHandler;txt.onfocus=focusHandler;txt.setAttribute("size",sizeTextbox);txt.setAttribute("accessKey",this.accessKey);txt.setAttribute("autocomplete","off");if(config.browser.isSafari){txt.setAttribute("type","search");txt.setAttribute("results","5")}else{if(!config.browser.isIE){txt.setAttribute("type","text")}}var btn=createTiddlyButton(null,this.label,this.prompt,clickHandler);if(place){if(!buttonAtRight){place.appendChild(btn)}place.appendChild(txt);if(buttonAtRight){place.appendChild(btn)}}searchInputField=txt;searchButton=btn};var openAllFoundTiddlers=function(){closeResult();var results=getLastResults();var n=results.length;if(n){var titles=[];for(var i=0;i<n;i++){titles.push(results[i].title)}story.displayTiddlers(null,titles)}};var createOptionWithRefresh=function(place,optionParams,wikifier,tiddler){invokeMacro(place,"option",optionParams,wikifier,tiddler);var elem=place.lastChild;var oldOnClick=elem.onclick;elem.onclick=function(e){var result=oldOnClick.apply(this,arguments);refreshResult();return result};return elem};var removeTextDecoration=function(s){var removeThis=["''","{{{","}}}","//","<<<","/***","***/"];var reText="";for(var i=0;i<removeThis.length;i++){if(i!=0){reText+="|"}reText+="("+removeThis[i].escapeRegExp()+")"}return s.replace(new RegExp(reText,"mg"),"").trim()};var getShortCutNumber=function(){var i=indexInPage;return(i>=0&&i<=9)?(i<9?(i+1):0):-1};var limitedTextRenderer=new abego.LimitedTextRenderer();var renderLimitedText=function(place,s,maxLen){limitedTextRenderer.render(place,s,maxLen,lastQuery.getMarkRegExp())};var oldTiddlyWikiSaveTiddler=TiddlyWiki.prototype.saveTiddler;TiddlyWiki.prototype.saveTiddler=function(title,newTitle,newBody,modifier,modified,tags,fields){oldTiddlyWikiSaveTiddler.apply(this,arguments);invalidateResult()};var oldTiddlyWikiRemoveTiddler=TiddlyWiki.prototype.removeTiddler;TiddlyWiki.prototype.removeTiddler=function(title){oldTiddlyWikiRemoveTiddler.apply(this,arguments);invalidateResult()};config.macros.yourSearch={label:"yourSearch",prompt:"Gives access to the current/last YourSearch result",handler:function(place,macroName,params,wikifier,paramString,tiddler){if(params.length==0){return}var name=params[0];var func=config.macros.yourSearch.funcs[name];if(func){func(place,macroName,params,wikifier,paramString,tiddler)}},tests:{"true":function(){return true},"false":function(){return false},found:function(){return getLastResultsCount()>0},previewText:function(){return config.options.chkPreviewText}},funcs:{itemRange:function(place){if(getLastResultsCount()){var lastIndex=pager.getLastIndexOnPage();var s="%0 - %1".format([pager.getFirstIndexOnPage()+1,lastIndex+1]);createTiddlyText(place,s)}},count:function(place){createTiddlyText(place,getLastResultsCount().toString())},query:function(place){if(lastQuery){createTiddlyText(place,lastQuery.toString())}},version:function(place){var t="YourSearch %0.%1.%2".format([version.extensions.YourSearchPlugin.major,version.extensions.YourSearchPlugin.minor,version.extensions.YourSearchPlugin.revision]);var e=createTiddlyElement(place,"a");e.setAttribute("href","http://tiddlywiki.abego-software.de/#YourSearchPlugin");e.innerHTML='<font color="black" weight="bold" face="Arial, Helvetica, sans-serif">'+t+"<font>"},copyright:function(place){var e=createTiddlyElement(place,"a");e.setAttribute("href","http://www.abego-software.de");e.innerHTML='<font color="black" face="Arial, Helvetica, sans-serif">&copy; 2005-2019 <b><font color="blue">abego</font></b> Software<font>'},newTiddlerButton:function(place){if(lastQuery){var r=abego.parseNewTiddlerCommandLine(lastQuery.getQueryText());var btn=config.macros.newTiddler.createNewTiddlerButton(place,r.title,r.params,"","",null,"text");var oldOnClick=btn.onclick;btn.onclick=function(){closeResult();oldOnClick.apply(this,arguments)};lastNewTiddlerButton=btn}},linkButton:function(place,macroName,params,wikifier,paramString,tiddler){if(params<2){return}var tiddlyLink=params[1];var text=params<3?tiddlyLink:params[2];var tooltip=params<4?text:params[3];var accessKey=params<5?null:params[4];var btn=createTiddlyButton(place,text,tooltip,closeResultAndDisplayTiddler,null,null,accessKey);btn.setAttribute("tiddlyLink",tiddlyLink)},closeButton:function(place,macroName,params,wikifier,paramString,tiddler){createTiddlyButton(place,"Fermer","Fermer la zone de recherche (touche \'ESC\')",closeResult)},openAllButton:function(place,macroName,params,wikifier,paramString,tiddler){var n=getLastResultsCount();if(n==0){return}var title=n==1?"open tiddler":"Ouvrir les %0 articles".format([n]);var button=createTiddlyButton(place,title,"Ouvrir tous les articles (Raccourci : Alt-O)",openAllFoundTiddlers);button.setAttribute("accessKey","O")},naviBar:function(place,macroName,params,wikifier,paramString,tiddler){pager.addPageNavigation(place)},"if":function(place,macroName,params,wikifier,paramString,tiddler){if(params.length<2){return}var testName=params[1];var negate=(testName=="not");if(negate){if(params.length<3){return}testName=params[2]}var test=config.macros.yourSearch.tests[testName];var showIt=false;try{if(test){showIt=test(place,macroName,params,wikifier,paramString,tiddler)!=negate}else{showIt=(!eval(testName))==negate}}catch(ex){}if(!showIt){place.style.display="none"}},chkPreviewText:function(place,macroName,params,wikifier,paramString,tiddler){var elem=createOptionWithRefresh(place,"chkPreviewText",wikifier,tiddler);elem.setAttribute("accessKey","P");elem.title="Prévisualisation des articles (Raccourci : Alt-P)";return elem}}};config.macros.foundTiddler={label:"foundTiddler",prompt:"Provides information on the tiddler currently processed on the YourSearch result page",handler:function(place,macroName,params,wikifier,paramString,tiddler){var name=params[0];var func=config.macros.foundTiddler.funcs[name];if(func){func(place,macroName,params,wikifier,paramString,tiddler)}},funcs:{title:function(place,macroName,params,wikifier,paramString,tiddler){if(!currentTiddler){return}var shortcutNumber=getShortCutNumber();var tooltip=shortcutNumber>=0?"Ouvrir l\'article (Raccourci : Alt-%0)".format([shortcutNumber.toString()]):"Open tiddler";var btn=createTiddlyButton(place,null,tooltip,closeResultAndDisplayTiddler,null);btn.setAttribute("tiddlyLink",currentTiddler.title);btn.setAttribute("withHilite","true");renderLimitedText(btn,currentTiddler.title,maxCharsInTitle);if(shortcutNumber>=0){btn.setAttribute("accessKey",shortcutNumber.toString())}},tags:function(place,macroName,params,wikifier,paramString,tiddler){if(!currentTiddler){return}renderLimitedText(place,currentTiddler.getTags(),maxCharsInTags)},text:function(place,macroName,params,wikifier,paramString,tiddler){if(!currentTiddler){return}renderLimitedText(place,removeTextDecoration(currentTiddler.text),maxCharsInText)},field:function(place,macroName,params,wikifier,paramString,tiddler){if(!currentTiddler){return}var name=params[1];var len=params.length>2?abego.toInt(params[2],maxCharsInField):maxCharsInField;var v=store.getValue(currentTiddler,name);if(v){renderLimitedText(place,removeTextDecoration(v),len)}},number:function(place,macroName,params,wikifier,paramString,tiddler){var numberToDisplay=getShortCutNumber();if(numberToDisplay>=0){var text="%0)".format([numberToDisplay.toString()]);createTiddlyElement(place,"span",null,"shortcutNumber",text)}}}};var opts={chkUseYourSearch:true,chkPreviewText:true,chkSearchAsYouType:true,chkSearchInTitle:true,chkSearchInText:true,chkSearchInTags:true,chkSearchExtendedFields:true,txtItemsPerPage:itemsPerPageDefault,txtItemsPerPageWithPreview:itemsPerPageWithPreviewDefault};for(var n in opts){if(config.options[n]==undefined){config.options[n]=opts[n]}}config.shadowTiddlers.AdvancedOptions+="\n<<option chkUseYourSearch>> Use 'Your Search' ";config.shadowTiddlers.YourSearchStyleSheet="/***\n!~YourSearchResult Stylesheet\n***/\n/*{{{*/\n.yourSearchResult {\n\tposition: absolute;\n\twidth: 800px;\n\n\tpadding: 0.2em;\n\tlist-style: none;\n\tmargin: 0;\n\n\tbackground: #f0f8ff;\n\tborder: 1px solid DarkGray;\n}\n\n/*}}}*/\n/***\n!!Summary Section\n***/\n/*{{{*/\n.yourSearchResult .summary {\n\tborder-bottom-width: thin;\n\tborder-bottom-style: solid;\n\tborder-bottom-color: #999999;\n\tpadding-bottom: 4px;\n}\n\n.yourSearchRange, .yourSearchCount, .yourSearchQuery   {\n\tfont-weight: bold;\n}\n\n.yourSearchResult .summary .button {\n\tfont-size: 10px;\n\n\tpadding-left: 0.3em;\n\tpadding-right: 0.3em;\n}\n\n.yourSearchResult .summary .chkBoxLabel {\n\tfont-size: 10px;\n\n\tpadding-right: 0.3em;\n}\n\n/*}}}*/\n/***\n!!Items Area\n***/\n/*{{{*/\n.yourSearchResult .marked {\n\tbackground: none;\n\tfont-weight: bold;\n}\n\n.yourSearchItem {\n\tmargin-top: 2px;\n}\n\n.yourSearchNumber {\n\tcolor: #0000FF;\n}\n\n\n.yourSearchTags {\n\tcolor: #3333ff;\n}\n\n.yourSearchText {\n\tcolor: #000080;\n\tmargin-bottom: 6px;\n}\n\n/*}}}*/\n/***\n!!Footer\n***/\n/*{{{*/\n.yourSearchFooter {\n\tmargin-top: 8px;\n\tborder-top-width: thin;\n\tborder-top-style: solid;\n\tborder-top-color: #999999;\n}\n\n.yourSearchFooter a:hover{\n\tbackground: none;\n\tcolor: none;\n}\n/*}}}*/\n/***\n!!Navigation Bar\n***/\n/*{{{*/\n.yourSearchNaviBar a {\n\tfont-size: 16px;\n\tmargin-left: 4px;\n\tmargin-right: 4px;\n\tcolor: black;\n\ttext-decoration: underline;\n}\n\n.yourSearchNaviBar a:hover {\n\tbackground-color: none;\n}\n\n.yourSearchNaviBar .prev {\n\tfont-weight: bold;\n\tcolor: blue;\n}\n\n.yourSearchNaviBar .currentPage {\n\tcolor: #0000FF;\n\ttext-decoration: none;\n}\n\n.yourSearchNaviBar .next {\n\tfont-weight: bold;\n\tcolor: blue;\n}\n/*}}}*/\n";config.shadowTiddlers.YourSearchResultTemplate='<!--\n{{{\n-->\n<span macro="yourSearch if found">\n<!-- The Summary Header ============================================ -->\n<table class="summary" border="0" width="100%" cellspacing="0" cellpadding="0"><tbody>\n  <tr>\n\t<td align="left">\n\t\tYourSearch Result <span class="yourSearchRange" macro="yourSearch itemRange"></span>\n\t\t&nbsp;of&nbsp;<span class="yourSearchCount" macro="yourSearch count"></span>\n\t\tfor&nbsp;<span class="yourSearchQuery" macro="yourSearch query"></span>\n\t</td>\n\t<td class="yourSearchButtons" align="right">\n\t\t<span macro="yourSearch newTiddlerButton"></span>\n\t\t<span macro="yourSearch openAllButton"></span>\n\t\t<span macro="yourSearch closeButton"></span>\n\t</td>\n  </tr>\n</tbody></table>\n\n<!-- The List of Found Tiddlers ============================================ -->\n<div id="yourSearchResultItems" itemsPerPage="25" itemsPerPageWithPreview="10"></div>\n\n<!-- The Footer (with the Navigation) ============================================ -->\n<table class="yourSearchFooter" border="0" width="100%" cellspacing="0" cellpadding="0"><tbody>\n  <tr>\n\t<td align="left">\n\t\tNombre de pages : <span class="yourSearchNaviBar" macro="yourSearch naviBar"></span>\n\t</td>\n\t<td align="right"><span macro="yourSearch version"></span>, <span macro="yourSearch copyright"></span>\n\t</td>\n  </tr>\n</tbody></table>\n<!-- end of the \'tiddlers found\' case =========================================== -->\n</span>\n\n\n<!-- The "No tiddlers found" case =========================================== -->\n<span macro="yourSearch if not found">\n<table class="summary" border="0" width="100%" cellspacing="0" cellpadding="0"><tbody>\n  <tr>\n\t<td align="left">\n\t\tRecherche infructueuse: aucun article trouvé pour <span class="yourSearchQuery" macro="yourSearch query"></span>.\n\t</td>\n\t<td class="yourSearchButtons" align="right">\n\t\t<span macro="yourSearch closeButton"></span>\n\t</td>\n  </tr>\n</tbody></table>\n</span>\n\n\n<!--\n}}}\n-->\n';config.shadowTiddlers.YourSearchItemTemplate="<!--\n{{{\n-->\n<span class='yourSearchNumber' macro='foundTiddler number'></span>\n<span class='yourSearchTitle' macro='foundTiddler title'/></span>&nbsp;-&nbsp;\n<span class='yourSearchTags' macro='foundTiddler field tags 50'/></span>\n<span macro=\"yourSearch if previewText\"><div class='yourSearchText' macro='foundTiddler field text 250'/></div></span>\n<!--\n}}}\n-->";config.shadowTiddlers.YourSearch="<<tiddler [[YourSearch Help]]>>";config.shadowTiddlers["YourSearch Result"]="The popup-like window displaying the result of a YourSearch query.";config.macros.search.handler=myMacroSearchHandler;var checkForOtherHijacker=function(){if(config.macros.search.handler!=myMacroSearchHandler){alert("Message from YourSearchPlugin:\n\n\nAnother plugin has disabled the 'Your Search' features.\n\n\nYou may disable the other plugin or change the load order of \nthe plugins (by changing the names of the tiddlers)\nto enable the 'Your Search' features.")}};setTimeout(checkForOtherHijacker,5000);abego.YourSearch.getStandardRankFunction=function(){return standardRankFunction};abego.YourSearch.getRankFunction=function(){return abego.YourSearch.getStandardRankFunction()};abego.YourSearch.getCurrentTiddler=function(){return currentTiddler};abego.YourSearch.closeResult=function(){closeResult()};abego.YourSearch.getFoundTiddlers=function(){return lastResults};abego.YourSearch.getQuery=function(){return lastQuery};abego.YourSearch.onShowResult=function(useOldResult){highlightHack=lastQuery?lastQuery.getMarkRegExp():null;if(!useOldResult){pager.setItems(getLastResults())}if(!resultElement){resultElement=createTiddlyElement(document.body,"div",yourSearchResultID,"yourSearchResult")}else{if(resultElement.parentNode!=document.body){document.body.appendChild(resultElement)}}refreshResult();highlightHack=null}})()};
//%/
<<forEachTiddler where 'tiddler.tags.containsAll(["$1"])' sortBy 'tiddler.title.toUpperCase()' descending write '" [["+tiddler.title+"]] \"Consulter ["+tiddler.title+"]\" [["+tiddler.title+"]] "' begin '"<<tabs tAutoTab "' end '">"+">"' none '"////"'>>
<<forEachTiddler where 'tiddler.tags.containsAll(["$1"])' sortBy 'tiddler.title.toUpperCase()' descending write '" [["+tiddler.title.substr(0,4)+"]] \""+tiddler.title+"\" [["+tiddler.title+"]] "' begin '"<<tabs tAutoTab "' end '">"+">"' none '"////"'>>
<<forEachTiddler where 'tiddler.tags.containsAll(["$1"])' sortBy 'tiddler.title.toUpperCase()' descending write '" [["+tiddler.title.substr(0,7)+"]] \""+tiddler.title+"\" [["+tiddler.title+"]] "' begin '"<<tabs tAutoTab "' end '">"+">"' none '"////"'>>
<<forEachTiddler where 'tiddler.tags.containsAll(["$1"])' sortBy 'tiddler.title.toUpperCase()' descending write '"* [["+tiddler.title+"]] \n"'>><<forEachTiddler where 'tiddler.tags.containsAll(["$1"])' sortBy 'tiddler.title.toUpperCase()' descending write '" [["+tiddler.title+"]] \"Consulter ["+tiddler.title+"]\" [["+tiddler.title+"]] "' begin '"<<tabs tAutoTab "' end '">"+">"' none '"//Aucun élément.//"'>>
{{ss2col{
<<forEachTiddler where 'tiddler.tags.containsAll(["$1"])' sortBy 'tiddler.title.toUpperCase()' descending write '"* [["+tiddler.title+"]] \n"'>>}}}<<forEachTiddler where 'tiddler.tags.containsAll(["$1"])' sortBy 'tiddler.title.toUpperCase()' descending write '" [["+tiddler.title.substr(0,10)+"]] \"Consulter ["+tiddler.title+"]\" [["+tiddler.title+"]] "' begin '"<<tabs tAutoTab "' end '">"+">"' none '"//Aucun élément.//"'>>
{{ss2col{
<<forEachTiddler where 'tiddler.tags.containsAll(["$1"])' sortBy 'tiddler.title.toUpperCase()' descending write '"* [["+tiddler.title+"]] \n"'>>}}}<<forEachTiddler where 'tiddler.tags.containsAll(["$1"])' sortBy 'tiddler.title.toUpperCase()' descending write '" [["+tiddler.title.substring(13, tiddler.title.length)+"]] \"Consulter ["+tiddler.title+"]\" [["+tiddler.title+"]] "' begin '"<<tabs tAutoTab "' end '">"+">"' none '"//Aucun élément.//"'>>
<<forEachTiddler where 'tiddler.tags.containsAll(["$1"])' sortBy 'tiddler.title.toUpperCase()' descending write '" [["+tiddler.title.substr(0,10)+"]] \"["+tiddler.title+"]\" [["+tiddler.title+"]] "' begin '"<<tabs tAutoTab "' end '">"+">"' none '"//Aucun élément.//"'>>
<<forEachTiddler where 'tiddler.tags.containsAll(["$1"])' sortBy 'tiddler.title.toUpperCase()' descending write '"* [["+tiddler.title+"]]\n"' begin '""' end '""' none '"* Aucune publication pour le moment\n"'>>
<<forEachTiddler where 'tiddler.tags.containsAny(["$1"])' sortBy 'tiddler.title.toUpperCase()' descending write '(index < 24) ? "|"+tiddler.title.substr(0,10)+"|[["+tiddler.title.substr(13,254)+"|"+tiddler.title+"]]|\n" : ""' begin '"|Date|!$2 |\n"' end '""' none '"* Aucune publication\n"'>>
<<forEachTiddler where 'tiddler.tags.containsAll(["$1"])' sortBy 'tiddler.title.toUpperCase()' descending write '"* [["+tiddler.title+"]] +++[»] "+tiddler.title+" ===  \n"' begin '""' end '""' none '"* Rien pour le moment\n"'>>
[[Accueil]]
{{floatL{
|@@color:#00F;<html><i class="fa fa-home" aria-hidden="true"></i></html>@@|__[[Accueil]]__|
|@@color:#00F;<html><i class="fa fa-chalkboard-teacher" aria-hidden="true"></i></html>@@|__[[CSA FR|Chapitre Français]]__|
|@@color:#00F;<html><i class="fa fa-info-circle" aria-hidden="true"></i></html>@@|__[[Actualités]]__|
|@@color:#00F;<html><i class="fa fa-blog" aria-hidden="true"></i></html>@@|__[[Blog]]__|
|@@color:#00F;<html><i class="fa fa-book" aria-hidden="true"></i></html>@@|__[[Publications]]__|
|@@color:#00F;<html><i class="fa fa-eye" aria-hidden="true"></i></html>@@|__[[Veille Web]]__|
|@@color:#00F;<html><i class="fa fa-pencil-alt" aria-hidden="true"></i></html>@@|__[[Newsletters]]__|
|@@color:#00F;<html><i class="fa fa-book-reader" aria-hidden="true"></i></html>@@|__[[Références]]__|
|@@color:#00F;<html><i class="fa fa-tools" aria-hidden="true"></i></html>@@|__[[Outils]]__|
|@@color:#00F;<html><i class="fa fa-exclamation-triangle" aria-hidden="true"></i></html>@@|__[[Alertes|Alertes et Vulnérabilités]]__|
|@@color:#00F;<html><i class="fa fa-podcast" aria-hidden="true"></i></html>@@|__[[Podcasts]]__|
|@@color:#00F;<html><i class="fa fa-video" aria-hidden="true"></i></html>@@|__[[Webinars|CloudBytes]]__|
|@@color:#00F;<html><i class="fa fa-archive" aria-hidden="true"></i></html>@@|__[[Archives]]__|
|[img[iCSF/flag_fr.png]]|__[[Traductions]]__|
|ssTableNo|k
|^^→^^|^^[[Contact]]^^|
[img[LinkedIN|iCSF/In.png][LinkedIN]][img[Slack|iCSF/Slack_icon2.png][Slack]][img[Twitter|iCSF/Twitter_icon.png][Twitter]][img[iCSF/inEnglish.png][inEnglish]]<<search 'Moteur de Recherche'>>[img(50%,1px)[iCSF/BluePixel.gif]]<<tiddler RollLeftCol>>[img(50%,1px)[iCSF/BluePixel.gif]]}}}
In this article, you can find the translation of the ''Menu'', and the links to all ''Weekly Newsletters'' published in English - that is since early February 2020.
<<tabs tEnglish 'Menu' 'Menu' [[inEnglish##Menu]] 'Weekly Newsletters' 'All weekly Newsletters in English' [[inEnglish##Actu]]>>
/%
!Menu
{{floatL{
|!Icon|!Menu in French|!Menu in English|
| @@color:#00F;<html><i class="fa fa-home" aria-hidden="true"></i></html>@@ |[[Accueil]]|[[Home|Accueil]]|
| @@color:#00F;<html><i class="fa fa-chalkboard-teacher" aria-hidden="true"></i></html>@@ |[[CSA FR|Chapitre Français]]|[[French Chapter|Chapitre Français]]|
| @@color:#00F;<html><i class="fa fa-info-circle" aria-hidden="true"></i></html>@@ |[[Actualités]]|[[News|Actualités]]|
| @@color:#00F;<html><i class="fa fa-blog" aria-hidden="true"></i></html>@@ |[[Blog]]|[[Blog]]|
| @@color:#00F;<html><i class="fa fa-book" aria-hidden="true"></i></html>@@ |[[Publications]]|[[Artefacts and Publications|Publications]]|
| @@color:#00F;<html><i class="fa fa-eye" aria-hidden="true"></i></html>@@ |[[Veille Web]]|[[Cloud and Security watch|Veille Web]]|
| @@color:#00F;<html><i class="fa fa-pencil-alt" aria-hidden="true"></i></html>@@ |[[Newsletters]]|[[Weekly newsletters|Newsletters]]|
| @@color:#00F;<html><i class="fa fa-book-reader" aria-hidden="true"></i></html>@@ |[[Références]]|[[Sites and documents of reference|Références]]|
| @@color:#00F;<html><i class="fa fa-tools" aria-hidden="true"></i></html>@@ |[[Outils]]|[[Cloud and Security tools|Outils]]|
| @@color:#00F;<html><i class="fa fa-exclamation-triangle" aria-hidden="true"></i></html>@@ |[[Alertes|Alertes et Vulnérabilités]]|[[Alerts et Vulnerabilities|Alertes et Vulnérabilités]]|
| @@color:#00F;<html><i class="fa fa-podcast" aria-hidden="true"></i></html>@@ |__[[Podcasts]]__|__[[CSA Podcasts|Podcasts]]__|
| @@color:#00F;<html><i class="fa fa-video" aria-hidden="true"></i></html>@@ |__[[Webinars|CloudBytes]]__|__[[CloudBytes Webinars|CloudBytes]]__|
| @@color:#00F;<html><i class="fa fa-archive" aria-hidden="true"></i></html>@@ |[[Archives]]|[[Site archives since 2010|Archives]]|
|[img[iCSF/flag_fr.png]]|__[[Traductions]]__|__[[CSA documents translated into French|Traductions]]__|
| → |[[Contact]]|[[How to contact a French Chapter representative|Contact]]|
|>|>| [img[LinkedIN|iCSF/In.png][LinkedIN]][img[Slack|iCSF/Slack_icon2.png][Slack]][img[Twitter|iCSF/Twitter_icon.png][Twitter]] |
|>|>| Search engine: <<search>> |
}}}
!Actu
<<tiddler fAll2LiTabs10 with: ActuEN","_EN_>>
!end
%/
Chapitre Français •<<tiddler .ToggleLeftSidebar>>•
Cloud Security Alliance
[[myCSS]]
<!--{{{-->
<div class='toolbar' macro='toolbar [[ToolbarCommands::ViewToolbar]]'></div>
<div class='title' macro='view title'></div>
<div class='viewer' macro='view text wikified'></div>
<div class='viewer' macro='tiddler ReplaceDoubleClick'></div>
<div class='tagClear'></div>
<!--}}}-->
21 mars 2020
|  |!0|!1|!2|!3|!4|!5|!6|!7|!8|!9|
|!0| 0| 1| 2| 3| 4| 5| 6| 7| 8| 9|
|!1| a| b| c| d| e| f| g| h| i| j|
|!2| k| l| m| n| o| p| q| r| s| t|
|!3| u| v| w| x| y| z| A| B| C| D|
|!4| E| F| G| H| I| J| K| L| M| N|
|!5| O| P| Q| R| S| T| U| V| W| X|
|!6| Y| Z| +| =| -| (| )||||
+++*[T0D0] <<tiddler fAll2Tabs with: T0D0>>=== • +++*[AdvancedOptions] <<tiddler AdvancedOptions>>=== •
|2018.11...|Le Monde Informatique[>img[iCSF/flag_fr.png]]|[[Microsoft Certifié Hébergeur de Donnees de Santé en France|https://www.lemondeinformatique.fr/actualites/lire-microsoft-certifie-hebergeur-de-donnees-de-sante-en-france-73347.html]]|Azure Healthcare France|
|201.......|Le Monde Informatique[>img[iCSF/flag_fr.png]]|[[AWS Certifié Hébergeur de Donnees de Santé en France, Oui mais...|https://www.lemondeinformatique.fr/actualites/lire-aws-certifie-hebergeur-de-donnees-de-sante-oui-mais-maj-74667.html]]|AWS Healthcare France|
‘’“”“”‘’«»%/
//{{{
config.options.txtUserName='CSA-FR';
config.options.chkAnimate=false;
config.options.chkRegExpSearch=false;
config.options.chkCaseSensitiveSearch=false;
config.options.chkOpenInNewWindow=true;
config.messages.tiddlerLinkTooltip="→ %0";
config.messages.externalLinkTooltip="→ %0";
config.options.chkHideSiteTitles=true;
config.macros.search.prompt="Recherche sur ce site";
config.macros.search.successMsg="%1 → %0 article(s)";
config.macros.search.failureMsg="%0 → Aucun article";
config.macros.search.label="Recherche";
merge(config.views.wikified,{ dateFormat: "0DD.0MM.YYYY",});
merge(config.macros.search,{ label: "", prompt: "Moteur de recherche local",});
config.options.chkUseYourSearch=true;
config.options.chkPreviewText=false;
config.options.chkSearchAsYouType=true;
config.options.chkSearchInTitle=true;
config.options.chkSearchInText=true;
config.options.chkSearchInTags=true;
config.options.chkSearchExtendedFields=false;
config.options.txtItemsPerPage=10;
config.options.txtItemsPerPageWithPreview=10;
config.options.chkShowLeftSidebar=true;
config.options.chkDisableWikiLinks=true;
config.options.chkAllowLinksFromShadowTiddlers=true;
config.options.chkDisableNonExistingWikiLinks=true;
config.options.chkSinglePageAutoScroll=true;
config.options.chkSinglePagePermalink=false;
config.options.chkSinglePageMode=false;
config.options.chkTopOfPageMode=true;
config.options.chkBottomOfPageMode=false;
config.options.chkShowBreadcrumbs=true;
config.options.txtBreadcrumbsLimit=8;
config.options.chkReorderBreadcrumbs=true;
config.options.txtBreadcrumbsCrumbSeparator="  <html><i class='fa fa-shoe-prints' aria-hidden='true'></i><i class='fa fa-shoe-prints' aria-hidden='true'></i></html>  ";
config.options.chkBreadcrumbsSave=false;
config.options.chkShowStartupBreadcrumbs=false;
config.options.chkBreadcrumbsReverse=false;
config.options.chkBreadcrumbsLimitOpenTiddlers=true;
config.options.txtBreadcrumbsLimitOpenTiddlers=20;
config.options.chkBreadcrumbsHideHomeLink=false;
config.options.chkCreateDefaultBreadcrumbs=true;
readOnly=true;
config.options.chkHttpReadOnly=true;
config.options.chkBackstage=false;
showBackstage=false;
merge(config.shadowTiddlers,{ ToolbarCommands: '|~ViewToolbar|closeTiddler closeOthers|\n|~EditToolbar|+saveTiddler -cancelTiddler deleteTiddler|',});
merge(config.commands.closeTiddler,{ text: "[fermer]", tooltip: "Fermer cet article" });
merge(config.commands.closeOthers,{ text: "[isoler]", tooltip: "Fermer les autres articles" });
//}}}
/*{{{*/
.ssCol30 {width:30%; float:left; margin-left:1%; margin-right:1%; border-color:#00F; border-style:solid; border-width:3px; }
.ssCol45 {width:45%; float:left; margin-left:1%;}
/* multi-column tiddler content (not supported in Internet Explorer) */
.ss2col { display:block;
 -moz-column-count:2; -moz-column-gap:1em; -moz-column-width:50%; /* FireFox */
 -webkit-column-count:2; -webkit-column-gap:1em; -webkit-column-width:50%; /* Safari */
 column-count:2; column-gap:1em; column-width:50%; /* Opera */
}
.clear {clear:both;}
.ssTableNo,
.ssTableNo table,
.ssTableNo td,
.ssTableNo tr,
.ssTableNo th,
.ssTableNo tbody
{ border:0 !important; }
/* {font-size:.70em;} */
body {font-size:.8em;font-family:Verdana,times,serif; margin:0; padding:0;}
pre, .tagged, .tagging, #messageArea, .popup, .tiddlyLink, .button { border-radius: 5px; }
.tiddlyLink { padding: 0px 2px; margin: 0 -2px; }
img[align="left"] { margin-right: .5em; }
img[align="right"] { margin-left: .5em; }
.toolbar {text-align:left; font-size:.7em;}
img {border:2px solid [[ColorPalette::Background]];}
.headerShadow {position:relative; padding:0.5em 0em 1em 1em; left:-1px; top:-1px;}
.headerForeground {position:absolute; padding:0.5em 0em 1em 1em; left:0px; top:0px;}
.headerShadow .right { position: absolute; top: 0; }
.headerShadow .right { right: 0; }
.headerForeground .right { display: none; }
/* InlineTabs */
.tabSelected {font-weight:bold; font-size:125%; color:[[ColorPalette::PrimaryDark]]; background:[[ColorPalette::TertiaryPale]]; border-left:2px solid [[ColorPalette::PrimaryMid]]; border-top:2px solid [[ColorPalette::PrimaryLight]]; border-right:2px solid [[ColorPalette::PrimaryMid]]; border-bottom-style:2px solid [[ColorPalette::PrimaryMid]]; }
.tabContents {color:[[ColorPalette::PrimaryDark]]; background:[[ColorPalette::Background]]; border:2px solid [[ColorPalette::PrimaryMid]];}
/* StyleSheetRotate90 */
.ssRot90 { float:left; width:0.6em; font-size:100%; font-family:Verdana,times,serif; line-height:60%; color:#00f !important; background:inherit !important; transform: rotate(90deg);}
/* StyleSheetFirstLetter */
.firstletter { float:left; width:0.6em; font-size:250%; font-family:Verdana,times,serif; line-height:60%; color:#00f !important; background:inherit !important; }
.firstletterC { float:center; width:0.6em; font-size:250%; line-height:60%; color:#00f !important; background:inherit !important; }
.FirstLetter { width:0.6em; font-size:150%; font-family:Verdana,times,serif; line-height:60%; !important; background:inherit !important; }
/* StyleSheetTableList */
.viewer ul {margin-top: 0; margin-bottom: 0;}
.viewer {text-align: justify;}
.viewer th {background:[[ColorPalette::TertiaryPale]]; color:[[ColorPalette::PrimaryMid]];}
/* Alignement */
.floatL { display:block;text-align:left; }
.floatR { display:block;text-align:right; }
.floatC { display:block;text-align:center; }
.ssTabl99{width:99%}
/* NestedSlidersPlugin */
.floatingPanel { z-index:700; padding:1em; margin:0em; border:1px solid; -moz-border-radius:1em; font-size:8pt; text-align:left; }
.floatingPanel hr { margin:2px 0 1px 0; padding:0; }
#sidebarOptions .sliderPanel { margin:0; padding:0; font-size:1em; background:transparent; }
#sidebarOptions .sliderPanel a { font-weight:normal; }
#sidebarOptions .sliderPanel blockquote { margin:0;padding:0;margin-left:1em; border-left:1px dotted; padding-left:1em }
.selected .floatingPanel .button,
.selected .floatingPanel a:link,
.selected .floatingPanel a:hover,
.selected .floatingPanel a:visited,
.floatingPanel .button,
.floatingPanel a:link,
.floatingPanel a:hover,
.floatingPanel a:visited { color:[[ColorPalette::PrimaryDark]] !important; }
.QOTD { color:#00f !important; background:inherit !important; }
.horizTag li.listTitle { display:none }
.horizTag li { display: inline; font-size:90%; }
.horizTag ul { display:inline; margin:0px; padding:0px;}
.viewer td { vertical-align: top; }
.viewer th { vertical-align: top; }
.viewer dl { margin: 0; }
/*}}}*/
[img(400px,4px)[iCSF/BluePixel.gif]]
[img(200px,auto)[iCSF/Email-CSA_FR.png]]
|ssTabl99|k
| ^^<<tiddler [[Categories]]>>^^ |
| <<tiddler RollHeader>> |
|ssTabl99|k
|>| [<img(150px,auto)[iCSA/CircleCSA.png][2020.03.19 - Ouverture de la plateforme collaborative CSA Circle]]Ouverture de [[CSA Circle]] la nouvelle plateforme collaborative de la [[CSA|Cloud Security Alliance]]
Après une phase de test réussie, [[CSA Circle]] est maintenant ouverte à tous.
Incrivez-vous en suivant les instructions [[ici|2020.03.19 - Ouverture de la plateforme collaborative CSA Circle]]. | |!Dernière mise à jour du site le @@font-size:125%;@@ |!@@color:#00F;font-size:112%;<html><i class="fa fa-question-circle fa-2x" aria-hidden="true"></i></html>@@ A voir | |@@color:#00F;<html><i class="fa fa-eye fa-2x" aria-hidden="true"></i></html>@@ __@@color:#009;font-size:112%;''[[Veille Web Mars 2020|2020.03.31 - Veille - Mars 2020]]''@@__

<<tiddler fAll2List with: '202003","_Show_' >> [img(99%,1px)[iCSF/BluePixel.gif]]
Archives du site et historique : → [[ici|Archives]] ←[img(99%,1px)[iCSF/BluePixel.gif]] |<<tiddler RollMainW>> | <<tiddler .ReplaceTiddlerTitle with: [[Bienvenue sur le site du Chapitre Français de la Cloud Security Alliance]]>>
[>img(200px,auto)[iCSF/cloud-security-alliance.png]]Le [[Chapitre Français]] de la [[Cloud Security Alliance]] est une association formée pour faire la promotion des meilleures pratiques de sécurité au sein des infrastructures Cloud Computing.
Il se charge notamment :
* d'adapter certains documents de la [[Cloud Security Alliance]] aux spécificités françaises (notamment réglementaires)
* de favoriser les bonnes pratiques de sécurité auprès des prestataires et founisseurs de Cloud français et auprès des Entreprises qui batissent des Clouds Privés
* de publier de nouvelles recommandations de sécurité relatives au Cloud Computing
* de traduire certains documents de la [[Cloud Security Alliance]] en français
* de mener des actions pour former et évangéliser sur la sécurité du Cloud Computing
* de participer à la communauté des chapitres européens regroupés sous l'appellation "''CSA EMEA''"[>img(200px,auto)[iCSF/CSA-EMEA.png]]
* d'établir des relations avec la presse et avec des groupes de travail similaires traitant soit du Cloud Computing, soit de la Sécurité
* de participer à tout type d'événements ou de conférences liés à la sécurité du Cloud Computing
[img(25%,1px)[iCSF/BluePixel.gif]]
Le site du [[Chapitre Français]] de la [[Cloud Security Alliance]] est https://www.CloudSecurityAlliance.fr/
[img(25%,1px)[iCSF/BluePixel.gif]]
<<tiddler [[Partenariats - ISEP-FC - Masteres Spécialisés]]>>
Le site de la [[Cloud Security Alliance]] est https://www.CloudSecurityAlliance.org/
[img(25%,1px)[iCSF/BluePixel.gif]]
{{floatC{[img(400px,auto)[iCSF/Email-CSA_FR.png]]
[img(100px,auto)[iCSF/Cloud_Question.png]]
@@font-size:75%;@@
+++*[Protection des données] <<tiddler [[Protection des Données]]>>=== }}}
| !Sur les aspects protection des données, RGPD et similaires, et pour les éléments suivants | !la réponse est simple |
| • Identité et coordonnées du responsable de traitement •
• Identité et coordonnées du délégué à la protection des données •
• Catégories de données collectées •
• Finalités du traitement •
• Base juridique du traitement •
• Destinataires des données •
• Transferts de données en dehors de l'UE •
• Conservation des données •
• Exercice des droits •
• Soumission d'une réclamation auprès de l’autorité de contrôle •
• Cookies • | ''c'est sans objet''
car ...
• aucune donnée n'est collectée sur le site •
• aucun cookie n'est utilisé •
• aucun traitement de données n'est réalisé •
[img(50%,1px)[iCSF/BluePixel.gif]]
Pour toute demande de précision, utilisez l'adresse
[img(200px,auto)[iCSF/Email-CSA_FR.png]]
[img(50%,1px)[iCSF/BluePixel.gif]] |
<<tabs tHisto 'Archives 2020' 'Archives 2020' [[Archives 2020]] 'Archives 2019' 'Archives 2019' [[Archives 2019]] 'Archives 2018' 'Archives 2018' [[Archives 2018]] 'Archives 2017' 'Archives 2017' [[Archives 2017]] 'Archives 2016' 'Archives 2016' [[Archives 2016]] 'Archives 2015' 'Archives 2015' [[Archives 2015]] 'Archives 2014' 'Archives 2014' [[Archives 2014]] 'Archives 2013' 'Archives 2013' [[Archives 2013]] 'Archives 2012' 'Archives 2012' [[Archives 2012]] 'Archives 2011' 'Archives 2011' [[Archives 2011]] 'Archives 2010' 'Archives 2010' [[Archives 2010]] 'Archives 2009' 'Archives 2009' [[Archives 2009]] 'Archives 2008' 'Archives 2008' [[Archives 2008]] >> 
<<tiddler fAll2Tabs7 with: _Histo20>><<tiddler .ReplaceTiddlerTitle with: [[Archives 2020]]>>
<<tiddler fAll2Tabs7 with: _Histo19>><<tiddler .ReplaceTiddlerTitle with: [[Archives 2019]]>>
<<tiddler fAll2Tabs7 with: _Histo18>><<tiddler .ReplaceTiddlerTitle with: [[Archives 2018]]>>
Les archives ''2017'' sont en cours de reconstruction
<<tiddler fAll2Tabs7 with: _Histo17>><<tiddler .ReplaceTiddlerTitle with: [[Archives 2017]]>>
Les archives ''2016'' sont en cours de reconstruction
<<tiddler fAll2Tabs7 with: _Histo16>><<tiddler .ReplaceTiddlerTitle with: [[Archives 2016]]>>
Les archives ''2015'' sont en cours de reconstruction
<<tiddler fAll2Tabs7 with: _Histo15>><<tiddler .ReplaceTiddlerTitle with: [[Archives 2015]]>>
Les archives ''2014'' sont en cours de reconstruction
<<tiddler fAll2Tabs7 with: _Histo14>><<tiddler .ReplaceTiddlerTitle with: [[Archives 2014]]>>
Les archives ''2013'' sont en cours de reconstruction
<<tiddler fAll2Tabs7 with: _Histo13>><<tiddler .ReplaceTiddlerTitle with: [[Archives 2013]]>>
Les archives ''2012'' sont en cours de reconstruction
<<tiddler fAll2Tabs7 with: _Histo12>><<tiddler .ReplaceTiddlerTitle with: [[Archives 2012]]>>
Les archives ''2011'' sont en cours de reconstruction
<<tiddler fAll2Tabs7 with: _Histo11>><<tiddler .ReplaceTiddlerTitle with: [[Archives 2011]]>>
Les archives ''2010'' sont en cours de reconstruction
<<tiddler fAll2Tabs7 with: _Histo10>><<tiddler .ReplaceTiddlerTitle with: [[Archives 2010]]>>
Les archives ''2009'' sont en cours de reconstruction
<<tiddler fAll2Tabs7 with: _Histo09>><<tiddler .ReplaceTiddlerTitle with: [[Archives 2009]]>>
Les archives ''2008'' sont en cours de reconstruction
<<tiddler fAll2Tabs7 with: _Histo08>><<tiddler .ReplaceTiddlerTitle with: [[Archives 2008]]>>
Catégories : [[CAIQ]] • [[CCAK]] • [[CCM]] • [[CCSK]] • [[Cryptographie]] • [[ERP]] • [[Incidents]] • [[IoT]] • [[Menaces]] • [[Panorama]] • [[RGPD]] • [[Santé|Publications - Santé]] • [[SDP]] • [[STAR]] • [[Vulnérabilités]] •
Pour rejoindre l'espace collaboratif [[CSA Circle]] du [[Chapitre Français]], rien de plus simple :
* Suivre ''[[CloudSecurityAlliance.fr/go/Circle|https://CloudSecurityAlliance.fr/go/Circle]]''.
* Cliquer sur le bouton rouge "Sign In" [img(40px,auto)[iCSF/OSignIn.jpg]] en haut à droite de l'écran.
* S'enregistrer en sélectionnant le bouton "Sign Up" [img(40px,auto)[iCSF/OSignUp.jpg]].
* Une fois connecté, afficher les communautés [img(60px,auto)[iCSF/OCommunities.jpg]] et choisir ''France Chapter'' pour s'inscrire.
<<tiddler fAll2LiTabs13end with: _CloudBytes>>
!Le [[Chapitre Français|CSA-FR]] de la [[Cloud Security Alliance]]
[>img(200px,auto)[iCSF/cloud-security-alliance.png]]
Le [[Chapitre Français|CSA-FR]] de la [[Cloud Security Alliance]] a été créé en décembre 2010 par ''[[Olivier Caleff|https://www.linkedin.com/in/caleff]]'' et ''[[Pierre Vacherand|https://www.linkedin.com/in/pierrevacherand/]]''.
Après un bon début, le [[Chapitre français|CSA-FR]] a tourné au ralenti entre 2013 et 2017.
Les activités se sont concentrées autour de participations et contributions à des événements de la [[Cloud Security Alliance]] en Europe, à des participations dans des groupes de travail de la [[Cloud Security Alliance]], et à une participation très active dans le domaine de la formation (voir ci-dessous)
En 2018, les activités reprennent avec :
* La participation à deux salons (Mars et Novembre 2018)
* La poursuite des partenariats pour les activités de formation
* L'animation du groupe LinkedIn : https://www.linkedin.com/groups/3758242
* La préparation de la relance des réunions des membres du [[Chapitre français|CSA-FR]]
__Contact :__ https://CloudSecurityAlliance.fr et [img(200px,auto)[iCSF/Email-CSA_FR.png]]
!Les partenariats
<<tiddler [[Partenariats - ISEP-FC - Masteres Spécialisés]]>>
<<tabs tCSA 'Présentation' 'Présentation' [[Cloud Security Alliance##Pres]] 'Historique' 'Historique' [[Cloud Security Alliance##Histo]] 'Mission' 'Mission' [[Cloud Security Alliance##Mission]] 'Groups de Travail' 'Groupes de Travail' [[Cloud Security Alliance##WG]] 'Liens' 'Liens' [[Cloud Security Alliance##Links]]>>
/%
!Pres
__''Présentation''__[>img(200px,auto)[iCSF/cloud-security-alliance.png]]

La [[Cloud Security Alliance]] (CSA) est une organisation à but non lucratif qui a pour mission :
* de promouvoir de bonnes pratiques en matière d'assurance de la sécurité dans le Cloud Computing
* de fournir des formations sur les utilisations du Cloud Computing pour aider à sécuriser toutes les autres formes d'informatique
La [[Cloud Security Alliance]] est dirigée par une vaste coalition de praticiens de l'industrie, d'entreprises, d'associations et d'autres intervenants clés.
[img(25%,1px)[iCSF/BluePixel.gif]]
!Histo
__''Historique''__[>img(200px,auto)[iCSF/cloud-security-alliance.png]]

Les enjeux et opportunités du cloud computing ont fait l'objet d'une attention particulière en 2008 au sein de la communauté de la sécurité de l'information.
Lors du forum CISO de l'ISSA à Las Vegas, en novembre 2008, le concept de d'une Alliance pour la sécurité du Cloud Computing ([[Cloud Security Alliance]]) a vu le jour. Après une présentation des tendances émergentes par ''[[Jim Reavis|https://www.linkedin.com/in/jimreavis/]]'', dont un appel à l'action pour la sécurisation du cloud computing, ''Jim Reavis'' et ''[[Nils Puhlmann|https://www.linkedin.com/in/npuhlmann/]]'' ont présenté la mission et la stratégie initiales de la CSA. Une série de réunions organisationnelles avec des chefs de file de l'industrie au début de décembre 2008 a officialisé la fondation de la CSA.
Le travail de sensibilisation auprès de la communauté de la sécurité de l'information pour créer un support de travail initial en vue de la Conférence RSA 2009 a donné lieu à des échanges entre des dizaines de bénévoles pour la recherche, l'auteur, la rédaction et la révision du premier livre blanc.
[img(25%,1px)[iCSF/BluePixel.gif]]
!Mission
__''Mission''__[>img(200px,auto)[iCSF/cloud-security-alliance.png]]

Promouvoir l'utilisation des meilleures pratiques pour fournir une assurance de sécurité dans le Cloud Computing, et fournir de l'éducation sur les utilisations du Cloud Computing pour aider à sécuriser toutes les autres formes d'informatique.
[img(25%,1px)[iCSF/BluePixel.gif]]
!WG
__''Groupes de Travail''__

<<tiddler [[Groupes de Travail]]>>
[img(25%,1px)[iCSF/BluePixel.gif]]
!Links
__''Liens''__

{{ss2col{
* ''Site Web CSA'' → https://CloudSecurityAlliance.org 
* ''Flux RSS'' → https://cloudsecurityalliance.org/feed/
* Annonces → https://cloudsecurityalliance.org/articles/ 
* Presse → https://blog.cloudsecurityalliance.org/press-coverage/ 
* Blog → https://blog.cloudsecurityalliance.org/ 
* Recherche → https://cloudsecurityalliance.org/research/
* Commentaires → https://cloudsecurityalliance.org/research/contribute/ 
* Groupes de travail → https://cloudsecurityalliance.org/meetings/ 
* Publications → https://cloudsecurityalliance.org/research/artifacts/ 
* Registre ''STAR'' → https://cloudsecurityalliance.org/star/registry/ 
* Aspects ''RGPD'' → https://gdpr.cloudsecurityalliance.org/ 
* Formation ''CCAK'' → https://cloudsecurityalliance.org/education/ccak/ 
* Formation ''CCSK'' → https://ccsk.cloudsecurityalliance.org/ 
* Groupe __LinkedIN__ → https://www.linkedin.com/groups/1864210/profile 
* Flux __Twitter__ → https://twitter.com/cloudsa
}}}[img(25%,1px)[iCSF/BluePixel.gif]]
!end
%/
[img(40%,1px)[iCSF/BluePixel.gif]][img[iCSF/In.png][https://www.linkedin.com/groups/3758242]] [img(40%,1px)[iCSF/BluePixel.gif]]
Lien vers le groupe ''LinkedIN'' du [[Chapitre Français]] de la [[Cloud Security Alliance]]
:→ https://www.linkedin.com/groups/3758242

^^Quelques autres groupes "Sécurité du Cloud" +++*[ici]>
* Cloud Computing, Cybersecurity, SaaS & Virtualization ⇒ https://www.linkedin.com/groups/45151/
* Cloud Technology Professionals ⇒ https://www.linkedin.com/groups/1346907/
* CyberSecurity Community ⇒ https://www.linkedin.com/groups/3799371/
* Information Security Careers Network (ISCN) ⇒ https://www.linkedin.com/groups/1368287/
* Information Security Network ⇒ https://www.linkedin.com/groups/80784/
* SaaS & Cloud Security Experts ⇒ https://www.linkedin.com/groups/122748/
* Security Experts - A Global Group ⇒ https://www.linkedin.com/groups/957667/
* The Virtualization & Cloud Computing Group ⇒ https://www.linkedin.com/groups/57400/
=== ^^
<<tiddler fAll2LiTabs10 with: PodC>>
<<QOTD RolledHeader 1852 noclick norandom>>
<<QOTD RolledLeftCol 3704 noclick norandom>>
<<QOTD RolledMainW 9250 noclick norandom>>
[img(40%,1px)[iCSF/BluePixel.gif]][img[Lien vers l'espace Slack du Chapitre Français|iCSF/Slack_ani.gif][https://csafr.slack.com/]] [img(40%,1px)[iCSF/BluePixel.gif]]
Lien vers l'espace ''Slack'' du [[Chapitre Français]] de la [[Cloud Security Alliance]]
:→'' https://csafr.slack.com ''
Il n'y a que 3 traductions en français de documents de la [[Cloud Security Alliance]] pour le moment, et ce ne sont pas des versions définitives.

|!Sigle|!Sujet|!Format|!Lien|!Date|
|[[CCM]]|Cloud Controls Matrix|.xlsx|[[CloudSecurityAlliance.fr/go/jc1m|https://CloudSecurityAlliance.fr/go/jc1m]]|2019.12.01|
|[[CAIQ]]|Consensus Assessments Initiative Questionnaire|.xlsx|[[CloudSecurityAlliance.fr/go/jc1q|https://CloudSecurityAlliance.fr/go/jc1q]]|2019.12.01|
|[[CoC PLA|RGPD - Présentation]]|Code of Conduct Privacy Level Agreement|.xlsx|[[CloudSecurityAlliance.fr/go/jc1p|https://CloudSecurityAlliance.fr/go/jc1p]]|2019.12.01|
[img(40%,1px)[iCSF/BluePixel.gif]][img[Lien vers le compte Twitter du Chapitre Français|iCSF/Twitter_icon.png][https://twitter.com/cloudsaFR]] [img(40%,1px)[iCSF/BluePixel.gif]]
Lien vers le flux Twitter du [[Chapitre Français]] de la [[Cloud Security Alliance]]
:→ https://twitter.com/cloudsaFR
[img(40%,1px)[iCSF/BluePixel.gif]][img[Lien vers le compte Twitter du Chapitre Français|iCSF/Twitter_icon.png][https://twitter.com/cloudsaFR]] [img(40%,1px)[iCSF/BluePixel.gif]]
__Autres flux Twitter à suivre :__
* Flux de la [[Cloud Security Alliance]]
:→ https://twitter.com/cloudsa
* Flux ''CSACloudbytes''
:→ https://twitter.com/hashtag/CSACloudbytes
<<tabs tVeille 'Veille 2020' 'Veille 2020' [[Veille Web##2020]] 'Veille 2019' 'Veille 2019' [[Veille Web##2019]] 'Veille 2018' 'Veille 2018' [[Veille Web##2018]] 'Veille 201x' 'Veille 201x' [[Veille Web##201x]] >>
/%
!2020
<<tiddler fAll2Tabs7 with: _Veille20>>
!2019
<<tiddler fAll2Tabs7 with: _Veille19>>
!2018
<<tiddler fAll2Tabs7 with: _Veille18>>
!201x
<<tiddler fAll2Tabs7 with: _Veille1x>>
!end
%/
<<tiddler .ReplaceTiddlerTitle with: "Veille Web Cloud et Sécurité">>
<<tiddler [[Veille.20xx.Archives]]>>
<<tiddler fAll2Tabs4 with: _Veille1x>>
Les archives sont organisées par année, de 20__''17''__ à 20__''08''__.
__[[Veille Cloud et Sécurité|2020.03.31 - Veille - Mars 2020]]__ → l'actualité
----
__[[Sécurité@Cloud|Forum Sécurité@Cloud]]__ → Salon et conférences les ''23 et 24 septembre'' 2020 à Paris
----
__[[Actualités CSA|2020.03.Actu]]__ → l'actualité Cloud Security Alliance France et monde
----
__[[Alertes Cloud et Sécurité|2020.03.31 - Alertes]]__ → les alertes
----
__[[Publications CSA|2020.03.Publ]]__ → les publications de la Cloud Security Alliance
----
__[[Newsletters Hebdomadaires|2020.03.NewsL]]__ → nouveautés et veille hebdomadaire
----
__[[Blog CSA|2020.03.Blog]]__ → les articles de Blog du [[Chapitre Français]] et de la [[Cloud Security Alliance]]
----
Espace [[Slack]] du [[Chapitre Français]] : ''[[csafr.slack.com|https://csafr.slack.com/]]''
[img[Lien vers l'espace Slack du Chapitre Français|iCSF/Slack_ani.gif][https://csafr.slack.com/]]''[[csafr.slack.com|https://csafr.slack.com/]]''
----
L'espace __[[Slack]]__ du [[Chapitre Français]] de la [[Cloud Security Alliance]]
----
__Circle__
[[CSA Circle]]
[img(125px,auto)[Circle|iCSA/CircleCSA.png][https://CloudSecurityAlliance.fr/go/Circle]]
----
''[[Sécurité@Cloud|https://cloudsecurityalliance.fr/go/k3iE/]]''
23/24 septembre 2020
Paris, France
[img(125px,auto)[Sécurité@Cloud|iCSF/ForumSecuriteCloud-2.jpg]]
----
__Références__
[[Cloud Controls Matrix]]
[img(125px,auto)[CCM|iCSA/CAOBCCM.png][Cloud Controls Matrix]]
<<tiddler [[LatestWeeklyNewsletter]]>>
----
<<tiddler [[LatestMonthlyUpdates]]>>
----
<<tiddler [[LatestCalenDates]]>>
----
<<tiddler [[Top Articles 2019]]>> 
----
|ssTableNo|k
|>|background-color:#00F; @@color:#FFF;''La galaxie CSA''@@ |
|background-color:#EEF;[img(100px,auto)[CCM|iCSA/CAOBCCM.png][CCM]]|background-color:#EEF;[img(100px,auto)[Menaces|iCSA/TopThreats_logo.png][Menaces]]|
|background-color:#EEF;[img(100px,auto)[CCSK|iCSA/H8UBCCSK.png][CCSK]]|background-color:#EEF;[img(100px,auto)[CAIQ|iCSA/CSA-CAI.png][CAIQ]]|
|background-color:#EEF;[img(100px,auto)[CCSK|iCSA/CCAK.png][CCAK]]|background-color:#EEF;|
----
<<tiddler [[CCM - Domaines]]>>
----
<<tiddler [[CCM - Référentiels]]>>
----
@@color:#00F;font-size:112%;<html><i class="fa fa-arrow-circle-right fa-2x" aria-hidden="true"></i></html>@@ Vous pouvez nous joindre sur [[LinkedIN]] et [[Slack]]
<<tiddler [[LinkedIN]]>>
<<tiddler [[Slack]]>>
!Les articles les plus lus en 2019 :
# 2019.05.14 : [[Analyse du DHS/CISA sur les risques liés à Office 365|2019.05.14 - Blog : Analyse du DHS/CISA sur les risques liés à Office 365]]+++*[»]> <<tiddler [[2019.05.14 - Blog : Analyse du DHS/CISA sur les risques liés à Office 365]]>>=== 
# 2019.10.25 : [[Modèle MITRE ATT&CK adapté au Cloud|2019.10.25 - Modèle MITRE ATT&CK adapté au Cloud]]+++*[»]> <<tiddler [[2019.10.25 - Modèle MITRE ATT&CK adapté au Cloud]]>>=== 
# 2019.08.06 : [[Top Threats to Cloud Computing: Egregious Eleven|2019.08.06 - Publication : 'Top Threats to Cloud Computing: Egregious Eleven']]+++*[»]> <<tiddler [[2019.08.06 - Publication : 'Top Threats to Cloud Computing: Egregious Eleven']]>>=== 
# 2019.08.03 : [[Mise à jour et compléments pour la CCM v3.0.1|2019.08.03 - Publication : Mise à jour et compléments pour la CCM v3.0.1]]+++*[»]> <<tiddler [[2019.08.03 - Publication : Mise à jour et compléments pour la CCM v3.0.1]]>>=== 
# 2019.07.01 : [[Utiliser CAIQ-Lite pour évaluer des prestataires ou fournisseurs|2019.07.01 - Blog : Utiliser CAIQ-Lite pour évaluer des prestataires ou fournisseurs]]+++*[»]> <<tiddler [[2019.07.01 - Blog : Utiliser CAIQ-Lite pour évaluer des prestataires ou fournisseurs]]>>=== 
# 2019.02.16 : [[Compromission de Visma, prestataire Cloud en Norvège|2019.02.16 - Blog : Compromission de Visma, prestataire Cloud en Norvège]]+++*[»]> <<tiddler [[2019.02.16 - Blog : Compromission de Visma, prestataire Cloud en Norvège]]>>=== 
<<tiddler [[2020.03.29 - Newsletter Hebdomadaire - 29 mars]]>>
<<tiddler fAny2List24 with: '202003","202002' 'Dernières mises à jour'>>
|!Évènement|!Date et lieu|
|Agence Européenne de Défense : [[Atelier AED|https://www.eda.europa.eu/info-hub/events/2020/04/21/default-calendar/cloud-computing-information-security-challenges]]|21 avril • Bruxelles, Belgique|
|CSA : [[EMEA EU Summit|https://csacongress.org/event/csa-eu-summit-2020/]]|9 juin 2020 • Bruxelles, Belgique|
|3DS Outscale : [[Cloud Days 2020|https://pages.outscale.com/inscriptions-cloud-days-2020?utm_campaign=EU-Fr%202020%20Cloud%20Days&utm_source=CloudSecurityAlliance.fr]]|25 juin 2020 • La Défense, Espace grande Arche|
|CSA Chapitre israelien : CyberWeek Israel CSA Summit |1er juillet 2020 • Tel Aviv, Israel|
|CSA : [[Conférence SECtember|https://csacongress.org/event/csa-emea-summit-2020/]]|14 au 17 septembre 2020 • Seattle, Etats-Unis|
|BIRP : [[Forum Sécurité@Cloud|https://cloudsecurityalliance.fr/go/k3iE/]]|23 & 24 septembre 2020 • Paris, Porte de Versailles|
|CSA : EMEA Summit |2 novembre 2020 • Munich, Allemagne|
[img[iCSF/flag_fr.png]]^^oc^^[img(50%,1px)[iCSF/BluePixel.gif]]
!"//Break the Top 10 Cloud Attack Kill Chains//"
[>img(250px,auto)[iCSA/K57WB.png]]Webinar [[CloudBytes]] diffusé le 7 mai 2020 — Présenté par Rich Mogull, VP Product, disruptOps
<<<
//As cloud adoption matures, so do cloud attacks.
This session will highlight the top 10 cloud kill chains and how to break them.
The presenters will lay out each step of the chain, which are the easiest to snap, and which common security defenses work across multiple chains.//
<<<
&rArr; S'inscrire au Webinar de 60 minutes [[sur le site de BrightTALK|https://CloudSecurityAlliance.fr/go/k57w/]].
!"//Cloud Adoption Considerations for IoT and OT//"
[>img(250px,auto)[iCSA/K4LWC.png]]Webinar [[CloudBytes]] diffusé le 21 avril 2020 — Présenté par Shih Hsien Lim, Chief Security Officer, société SP Group
<<<
//IoT in the enterprise will generate new information and business models that will strain on-prem capabilities and resources. The challenges can be resolved by judicious of the cloud. This potential upside needs to be weighted against risks around data privacy, visibility, and (in)effectiveness of traditional security tools and approaches.
The increasing digitisation of OT (Operations Technology) will impose similar challenges, with the added key dimension of safety on top of the traditional tripartite of confidentiality, integrity and availability.
The talk will thus dive deeper into these real-world challenges and share some practical considerations and approaches.//
<<<
&rArr; S'inscrire au Webinar de 60 minutes [[sur le site de BrightTALK|https://CloudSecurityAlliance.fr/go/k4lw/]].
|!Mars|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2020.03.31|
|2020.03.31|NetGuide NZ|[[Microsoft overhauls Office 365, rebrands it 'Microsoft 365'|https://netguide.co.nz/story/microsoft-overhauls-office-365-rebrands-it-microsoft-365]]|O365 M365|
|2020.03.31|The Register|[[Outage hits some Google Cloud services, error rate curve flattens and they're coming back|https://www.theregister.co.uk/2020/03/31/google_cloud_infrastructure_outage/]]|GCP Outage|
|>|>|>|!2020.03.30|
|2020.03.30|Summit Route|[[AWS Phishing Emails|https://summitroute.com/blog/2020/03/30/aws_phishing_emails/]]|AWS Phishing|
|2020.03.30|The Register|[[Cloud'n'server hosting giant OVH more like OMG: Data center hardware failure knocks out services in France|https://www.theregister.co.uk/2020/03/30/ovh_cloud_outage/]]|OVH Outage|
|2020.03.30|Christophe Tafani-Dereeper|[[They told me I could be anything, so I became a Kubernetes node – Using K3s for command and control on compromised Linux hosts|https://blog.christophetd.fr/using-k3s-for-command-and-control-on-compromised-linux-hosts/]] ([[video|https://www.youtube.com/watch?v=CH7S5rE3j8w]])|Kubernetes K3s APT|
|2020.03.30|DevOps|[[How to Secure Your Kubernetes Cluster on GKE|https://devops.com/how-to-secure-your-kubernetes-cluster-on-gke/]]|GKE Kubernetes|
|2020.03.30|//McAfee//[>img[iCSF/flag_fr.png]]|[[Le partage des responsabilités est primordial à la sécurité du cloud|https://www.globalsecuritymag.fr/Le-partage-des-responsabilites-est,20200330,97144.html]]|Shared_responsibility|
|2020.03.30|//Microsoft//|[[Enable remote collaboration quickly and securely with Azure AD|https://techcommunity.microsoft.com/t5/azure-active-directory-identity/enable-remote-collaboration-quickly-and-securely-with-azure-ad/ba-p/1257334]]|AzureAD|
|2020.03.30|//AttackIQ//|[[Defeating a Cloud Breach Part 1|https://attackiq.com/blog/2020/03/30/defeating-a-cloud-breach-part-1/]]|attack Breach|
|2020.03.30|//Toshiba//|[[World Back Up Day : Toshiba fait cinq recommandations pour la sauvegarde des données|https://www.globalsecuritymag.fr/World-Back-Up-Day-Toshiba-fait,20200330,97122.html]]|Backup|
|2020.03.30|//Coalfire//|[[Accelerate Your Path to Cloud Compliance|https://www.coalfire.com/The-Coalfire-Blog/March-2020/Accelerate-Your-Path-to-Cloud-Compliance]]|Compliance|
!"//Cloud Adoption Considerations for IoT and OT//"
Webinar [[CloudBytes]] diffusé le 2 avril 2020 — Présenté par Bob Gourley, Directeur technique et co-fondateur de OODA
<<<
//to learn about when AI goes wrong including... 6 categories of real-world AI failures, notable failures in operational systems, compliance needs, a guide for securing AI for framework//
<<<
&rArr; S'inscrire au Webinar de 60 minutes [[sur le site de BrightTALK|https://CloudSecurityAlliance.fr/go/k41w/]].
!"//The Six Pillars of DevSecOps: Automation//"
{{ss2col{
<<<
//Security automation is the programmatic execution of security actions to identify, protect, detect, respond, and recover from cyber threats.
Automation is a critical component of DevSecOps because it creates process efficiency, enabling developers, infrastructure, and security teams to focus on delivering value rather than repeating manual efforts and errors with every release.
Example activities that can be automated include application, host, and container vulnerability scanning.
DevOps teams utilizing CI/CD and infrastructure as code are agile and release features incrementally and at a much faster pace than teams using a waterfall approach.
This creates the need to automate security capabilities so as to provide timely and meaningful feedback.
This security capability must be embedded in the software delivery pipeline in order to keep pace with rapid changes in organizational assets and regulatory compliance.
Due to the complexity of cloud infrastructure and the potential downstream impact of even small code changes, security needs to be included in design, implementation, testing, release, and monitored in production.
A pragmatic approach introducing tentative and modest automation of security capabilities enables rapid feedback and can potentially eliminate whole classes of risk, such as container scanning to ensure OS hardening or software composition analysis for known CVEs.//
<<<
}}}La date limite pour faire les commentaires est fixée au ''22 avril 2020''.
&rArr; Lire [[l'original|https://CloudSecurityAlliance.fr/go/k3ua/]] sur le site de la CSA
!Actualités, Blog, Publications et Veille "Sécurité du Cloud"
<<tiddler fAll2LiTabs13end with: 202003>>
<<tiddler fAll2Tabs10 with: VeilleM","_202003>>
|!Mars|!Sources|!Titres et Liens|!Keywords|
|2020.03.05|//Source Incite//|[[SRC-2020-0011 : ManageEngine Desktop Central FileStorage getChartImage Deserialization of Untrusted Data Remote Code Execution Vulnerability|https://srcincite.io/advisories/src-2020-0011/]]|Zoho CVE-2020-10189|
|2020.03.06|//Zoho//|[[We acknowledge the vulnerability in versions of Desktop Central released before 1/20/20 (build 10.0.473 and below)|https://mobile.twitter.com/manageengine/status/1235985409731149824]]|Zoho CVE-2020-10189|
|2020.03.06|US-CERT| → [[Zoho Releases Security Update on ManageEngine Desktop Central|https://www.us-cert.gov/ncas/current-activity/2020/03/06/zoho-releases-security-update-manageengine-desktop-central]]|Zoho CVE-2020-10189|
|2020.03.06|Bleeping Computer| → [[Zoho Fixes No-Auth RCE Zero-Day in ManageEngine Desktop Central|https://www.bleepingcomputer.com/news/security/zoho-fixes-no-auth-rce-zero-day-in-manageengine-desktop-central/]]|Zoho CVE-2020-10189|
|2020.03.06|//Desktop Central//| → [[ManageEngine Desktop Central remote code execution vulnerability (CVE-2020-10189)|https://www.manageengine.com/products/desktop-central/remote-code-execution-vulnerability.html]]|Zoho CVE-2020-10189|
[img(25%,1px)[iCSF/BluePixel.gif]]
<<tiddler .ReplaceTiddlerTitle with: [[Alertes et Vulnérabilités - Mars 2020]]>>
<<tiddler fAll2LiTabs10 with: NewsL","202003>><<tiddler .ReplaceTiddlerTitle with: [[Newsletters - Mars 2020]]>>
<<tiddler .ReplaceTiddlerTitle with: [[Actualités - Mars 2020]]>><<tiddler fAll2LiTabs13end with: 'Actu","202003'>>
<<tiddler fAll2LiTabs13end with: 'Blog","202003'>>
[img(25%,1px)[iCSF/BluePixel.gif]]
<<tiddler .ReplaceTiddlerTitle with: [[Blog - Mars 2020]]>>
<<tiddler fAll2LiTabs13end with: 'Publ","202003'>>
[img(25%,1px)[iCSF/BluePixel.gif]]
<<tiddler .ReplaceTiddlerTitle with: [[Publications - Mars 2020]]>>
!1 - Les nouveautés CSA de la semaine du 23 au 29 mars 2020
* Podcast : 'CSA STAR Certification Case Study'+++*[»]> <<tiddler [[2020.03.25 - Podcast : 'CSA STAR Certification Case Study']]>>=== [>img[iCSF/cloud-security-alliance-fr.png]]
* Blog : les 7 étapes pour sécuriser le télétravail dans le Cloud+++*[»]> <<tiddler [[2020.03.27 - Blog : les 7 étapes pour sécuriser le télétravail dans le Cloud]]>>=== 
* Blog : Questions pour ses fournisseurs en cette période de télétravail massif+++*[»]> <<tiddler [[2020.03.26 - Blog : Questions pour ses fournisseurs en cette période de télétravail massif]]>>=== 
!2 - Veille Web
La [[Veille Web|2020.03.29 - Veille Hebdomadaire - 29 mars]] avec plus d'une soixantaine de liens dont :
* Etudes et rapports : Exabeam+++*[»]> 
|2020.03.25|//Exabeam//|[[Exabeam Research Shows Companies are Embracing Cloud-based Security Tools, but Concerns Around Risk, Ease of Deployment Remain|https://www.exabeam.com/pr/exabeam-research-shows-companies-are-embracing-cloud-based-security-tools-but-concerns-around-risk-ease-of-deployment-remain/]]|Report Exabeam|
|2020.03.25|MSSP Alert| → [[Cloud-Based Security Tool Adoption: Latest Research Findings|https://www.msspalert.com/cybersecurity-research/cloud-based-tool-adoption/]]|Report Exabeam|
|2020.03.27|Help Net Security| → [[While many migrate security tools to the cloud, concerns remain|https://www.helpnetsecurity.com/2020/03/27/migrate-security-tools/]]|Report Exabeam|
=== 
* Alertes : Kubernetes+++*[»]> 
|2020.03.24|//Alcide//|[[New Kubernetes Vulnerabilities: CVE-2020-8551, CVE-2020-8552|https://blog.alcide.io/new-kubernetes-vulnerabilities-cve-2020-855-cve-2020-8552]]|Kubernetes Vulnerabilities|
=== 
* Attaques et pannes : Fuite de données+++*[»]> 
|2020.03.25|//vpnMentor//|[[Report: Cloud Storage Data Breach Exposes Users' Private Information|https://www.vpnmentor.com/blog/report-datadepositbox-leak/]]|Data_Leak AWS_S3|
===, incidents GCP+++*[»]> 
|2020.03.27|CIO Dive|[[Understanding Google Cloud's recent service hiccups|https://www.ciodive.com/news/google-cloud-platform-outage/575047/]]|GCP Outages|
===, malveillance par le Cloud+++*[»]> 
|2020.03.27|TechRepublic|[[Why Microsoft's Office 365 has become an all-access pass for phishers to exploit|https://www.techrepublic.com/article/why-microsofts-office-365-has-become-an-all-access-pass-for-phishers-to-exploit/]]|O365 Phishing|
|2020.03.25|//ZScaler//|[[Multistaged Downloader Leverages Google Drive to Download Advanced Malware|https://www.zscaler.com/blogs/research/multistaged-downloader-leverages-google-drive-download-advanced-malware]]|Attacks Malware Google_Drive|
|2020.03.23|Washington Post|[[How the cloud has opened new doors for hackers|https://www.washingtonpost.com/technology/2020/03/02/cloud-hack-problems/]]||
|2020.03.24|Dark Reading|![[How Attackers Could Use Azure Apps to Sneak into Microsoft 365|https://www.darkreading.com/cloud/how-attackers-could-use-azure-apps-to-sneak-into-microsoft-365/d/d-id/1337399]]|Azure Attacks|
===, tableau de bord Internet+++*[»]> 
|2020.03.23|CBR Online|[[New Global Internet Outages Map: “Concerning” Rise in ISP Outages|https://www.cbronline.com/news/global-internet-outages-map]]|Outages|
=== 
* Divers : Impacts de la pandémie COVID-19 et du télétravail+++*[»]>  
|2020.03.28|//Microsoft Azure//|![[Update #2 on Microsoft cloud services continuity|https://azure.microsoft.com/en-us/blog/update-2-on-microsoft-cloud-services-continuity/]]|COVID-19 Azure Resilience|
|2020.03.27|Solutions Review|[[The Coronavirus Cloud Computing Survival Guide for Businesses|https://solutionsreview.com/cloud-platforms/the-coronavirus-cloud-computing-survival-guide-for-businesses/]]|COVID-19 Recommendations|
|2020.03.26|DZone|[[Enabling WFH With Office 365 Requires State-of-the-Art Security and Data Backup|https://dzone.com/articles/enabling-wfh-with-office-365-requires-state-of-the]]|HomeWorking Backups|
|2020.03.24|Silicon.fr[>img[iCSF/flag_fr.png]]|[[Microsoft Azure : à qui la priorité sur les ressources cloud ?|https://www.silicon.fr/microsoft-azure-priorite-cloud-336761.html]]|Azure|
|2020.03.24|Beeping Computer|[[Microsoft Cuts Back More Office 365 Features to Handle High Load|https://www.bleepingcomputer.com/news/microsoft/microsoft-cuts-back-more-office-365-features-to-handle-high-load/]]|O365|
|2020.03.24|//3DS Outscale//[>img[iCSF/flag_fr.png]]|[[Cybersécurité et risques liés au télétravail|https://www.globalsecuritymag.fr/3DS-Outscale-Cybersecurite-et,20200324,96966.html]]|Home_Working|
|2020.03.23|//Thousand Eyes//|[[State of Internet Health During COVID-19|https://blog.thousandeyes.com/internet-health-during-covid-19/]]|Status Outages|
===, questionnements sur Zoom+++*[»]> 
|2020.03.27|Forbes|[[Beware Zoom Users: Here’s How People Can ‘Zoom-Bomb’ Your Chat|https://www.forbes.com/sites/kateoflahertyuk/2020/03/27/beware-zoom-users-heres-how-people-can-zoom-bomb-your-chat/]]|Zoom|
|2020.03.26|Vice|[[Zoom iOS App Sends Data to Facebook Even if You Don’t Have a Facebook Account|https://www.vice.com/en_us/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account]]|Zoom Privacy|
|2020.03.25|//Checkpoint//[>img[iCSF/flag_fr.png]]|[[Qui regarde qui dans Zoom ? Conseils pour une utilisation de Zoom en toute sécurité|https://www.globalsecuritymag.fr/Qui-regarde-qui-dans-Zoom-Conseils,20200326,97015.html]]|Zoom Privacy|
=== 
!3 - Weekly Cloud and Security Watch Newsletter[>img[iCSF/inEnglish.png]]
<<tiddler [[2020.03.29 - Weekly Newsletter - March 29th]]>> 
!CSA updates and news - March 23rd to 29th
* Podcast : 'CSA STAR Certification Case Study'[>img[iCSF/cloud-security-alliance-fr.png]]
* Blog : '7 Steps to Securing Your Remote Work Lifecycle in the Cloud'
* Blog : 'Right Questions to Ask Your Vendors in Times of Large-Scale Remote Working'
!Cloud and Security News Watch
[[Over 60 links|2020.03.29 - Veille Hebdomadaire - 29 mars]] among which:
* Reports: Exabeam
* Alerts: Kubernetes
* Attacks: Data Leaks, GCP incidents, Global Internet Outages Map, New doors for hackers thanks to the Cloud, 
* Miscellaneous: COVID-19 and WFH impacts, Zoom issues and Zoom-bombing
|ssTabl99|k
|!⇒ [[CloudSecurityAlliance.fr/go/K3T/|https://CloudSecurityAlliance.fr/go/K3T/]] |
|!Mars|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2020.03.29|
|2020.03.29|//Jump Cloud//|[[Comparing Azure AD and AD FS|https://jumpcloud.com/blog/aad-vs-adfs]]|AzureAD|
|>|>|>|!2020.03.28|
|2020.03.28|//Microsoft Azure//|![[Update #2 on Microsoft cloud services continuity|https://azure.microsoft.com/en-us/blog/update-2-on-microsoft-cloud-services-continuity/]]|COVID-19 Azure Resilience|
|2020.03.29|The Register| → [[Microsoft reveals 775 percent Azure surge, quotas on some resources and ‘significant new capacity’ coming ASAP|https://www.theregister.co.uk/2020/03/29/microsoft_reveals_775_percent_azure_usage_surge_in_coronavirus_lockdown_zones/]]|COVID-19 Azure Resilience|
|2020.03.29|Silicon Angle| → [[Microsoft sees massive 775% spike in cloud services traffic|https://siliconangle.com/2020/03/29/microsoft-sees-massive-775-spike-cloud-services-traffic/]]|COVID-19 Azure Resilience|
|2020.03.30|Bleeping Computer| → [[Microsoft Cloud Services See 775% Growth As More Work Remotely|https://www.bleepingcomputer.com/news/microsoft/microsoft-cloud-services-see-775-percent-growth-as-more-work-remotely/]]|COVID-19 Azure Resilience|
|2020.03.30|JDN[>img[iCSF/flag_fr.png]]| → [[Azure : une demande en hausse de 775% dans les régions en confinement|https://www.journaldunet.com/web-tech/cloud/1490015-azure-une-demande-en-hausse-775-dans-les-regions-en-confinement/]]|COVID-19 Azure Resilience|
|2020.03.18|Enterprise Networking Planet|[[Kubernetes 1.18 Improves Networking and Security for Cloud Native|http://www.enterprisenetworkingplanet.com/datacenter/kubernetes-1.18-improves-networking-and-security-for-cloud-native.html]]|Kubernetes|
|>|>|>|!2020.03.27|
|2020.03.27|Forbes|[[Beware Zoom Users: Here’s How People Can ‘Zoom-Bomb’ Your Chat|https://www.forbes.com/sites/kateoflahertyuk/2020/03/27/beware-zoom-users-heres-how-people-can-zoom-bomb-your-chat/]]|Zoom|
|2020.03.27|Solutions Review|[[The Coronavirus Cloud Computing Survival Guide for Businesses|https://solutionsreview.com/cloud-platforms/the-coronavirus-cloud-computing-survival-guide-for-businesses/]]|COVID-19 Recommendations|
|2020.03.27|CIO Dive|[[Understanding Google Cloud's recent service hiccups|https://www.ciodive.com/news/google-cloud-platform-outage/575047/]]|GCP Outages|
|2020.03.30|CRN Australia| → [[Google Cloud confirms global outage|https://www.crn.com.au/news/google-cloud-confirms-global-outage-539947]]|GCP Outages|
|2020.03.27|TechRepublic|[[Why Microsoft's Office 365 has become an all-access pass for phishers to exploit|https://www.techrepublic.com/article/why-microsofts-office-365-has-become-an-all-access-pass-for-phishers-to-exploit/]]|O365 Phishing|
|2020.03.27|Security Boulevard|[[Why Traditional Security Is Failing Us, Part 2|https://securityboulevard.com/2020/03/why-traditional-security-is-failing-us-part-2/]] (2/2)|Treats|
|2020.03.27|TechBeacon|[[Why your data is safer in the cloud than on premises|https://techbeacon.com/security/why-your-data-safer-cloud-premises]]|Data|
|2020.03.27|IT Brief NZ|[[The top four cloud IT security misconfigurations and how to fix them|https://itbrief.co.nz/story/the-top-four-cloud-it-security-misconfigurations-and-how-to-fix-them]]|Misconfigurations|
|2020.03.27|NextGov|[[Microsoft Upgrades Classified Cloud Offering|https://www.nextgov.com/it-modernization/2020/03/microsoft-upgrades-classified-cloud-offering/164169/]]|Azure Government|
|2020.03.27|//Chekpoint//|[[Public Cloud - 4 Subtle Differences with Significant Security Concerns|https://blog.checkpoint.com/2020/03/27/public-cloud-4-subtle-differences-with-significant-security-concerns/]]|Public_Cloud|
|2020.03.27|//Compare the Cloud//|[[Managed Kubernetes: Understanding Your Options in the Cloud|https://www.comparethecloud.net/kubernetes/managed-kubernetes-understanding-your-options-in-the-cloud/]]|Kubernetes|
|>|>|>|!2020.03.26|
|2020.03.26|Dark Reading|[[How to Prevent an AWS Cloud Bucket Data Leak|https://www.darkreading.com/edge/theedge/how-to-prevent-an-aws-cloud-bucket-data-leak--/b/d-id/1337093]]|Data_Leak|
|2020.03.26|Vice|[[Zoom iOS App Sends Data to Facebook Even if You Don’t Have a Facebook Account|https://www.vice.com/en_us/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account]]|Zoom Privacy|
|2020.03.27|TechRadar| → [[Video calling app Zoom's iOS version is sharing user data with Facebook|https://www.techradar.com/news/video-calling-app-zooms-ios-version-is-sharing-user-data-with-facebook]]|Zoom Privacy|
|2020.03.26|DZone|[[Enabling WFH With Office 365 Requires State-of-the-Art Security and Data Backup|https://dzone.com/articles/enabling-wfh-with-office-365-requires-state-of-the]]|HomeWorking Backups|
|2020.03.26|//Optiv Security//|[[Operationalizing NSA Guidance (or any Guidance, For That Matter!)|https://www.infosecurity-magazine.com/opinions/operationalizing-nsa-guidance?&web_view=true]]|Guidance NSA|
|2020.03.26|//Intrinsec//[>img[iCSF/flag_fr.png]]|[[Bonnes pratiques - Sécurité de votre environnement cloud|https://www.intrinsec.com/bonnes-pratiques-cloud/]]|Best_Practices|
|2020.03.26|//Tripwire//|[[The Future is Hybrid: Practicing Security in the Hybrid Cloud|https://www.tripwire.com/state-of-security/security-data-protection/cloud/future-hybrid-practicing-security-hybrid-cloud/]]|Hybrid_Cloud|
|2020.03.26|//CloudCheckr//|![[The 5 AWS Security Mistakes You Might Be Making and How to Fix Them|https://cloudcheckr.com/cloud-security/the-5-aws-security-mistakes-you-might-be-making-and-how-to-fix-them/]]|AWS Bad_Practices Misconfigurations|
|2020.03.26|//Omdia//|[[Introducing Zero-Trust Access|https://www.darkreading.com/cloud/introducing-zero-trust-access-/a/d-id/1337362]]|Zero_Trust|
|2020.03.26|//Compare the Cloud//|[[Innovation & collaboration: Recent trends in cloud security|https://www.comparethecloud.net/articles/cloud-security-trends/]]|Trends|
|>|>|>|!2020.03.25|
|2020.03.25|Silicon.fr[>img[iCSF/flag_fr.png]]|[[Conteneurs : Microsoft développe une couche de sécurité sur Azure|https://www.silicon.fr/conteneurs-microsoft-securite-azure-336844.html]]|Azure Containers|
|2020.03.25|DZone|[[Zero-Trust for Next Generation Clouds|https://dzone.com/articles/zero-trust-for-next-generation-clouds]]|Zero_Trust|
|2020.03.25|InfoSec Mag|![[Cloud Native Threats: The Role of Infrastructure|https://www.infosecurity-magazine.com/blogs/cloud-native-threats/]]|Threats|
|2020.03.25|Help Net Security|[[How to secure customer data for SaaS success|https://www.helpnetsecurity.com/2020/03/25/saas-success/]]`|SaaS|
|2020.03.25|Help Net Security|[[Cloud-native security considerations for critical enterprise workloads|https://www.helpnetsecurity.com/2020/03/25/cloud-native-security-considerations/]]|Misconfigurations|
|2020.03.25|VMblog|[[VMblog Expert Interview: Cloud Disaster Recovery Service - A Chat with Executives from JetStream Software, Cloudian and ENS-Inc|https://vmblog.com/archive/2020/03/25/vmblog-expert-interview-cloud-disaster-recovery-service-a-chat-with-executives-from-jetstream-software-cloudian-and-ens-inc.aspx]]|DRaaS|
|2020.03.25|//Checkpoint//[>img[iCSF/flag_fr.png]]|[[Qui regarde qui dans Zoom ? Conseils pour une utilisation de Zoom en toute sécurité|https://www.globalsecuritymag.fr/Qui-regarde-qui-dans-Zoom-Conseils,20200326,97015.html]]|Zoom Privacy|
|2020.03.25|//vpnMentor//|[[Report: Cloud Storage Data Breach Exposes Users' Private Information|https://www.vpnmentor.com/blog/report-datadepositbox-leak/]]|Data_Leak AWS_S3|
|2020.03.25|//Summit Route//|[[AWS SCP Best Practices|https://summitroute.com/blog/2020/03/25/aws_scp_best_practices/]]|AWS Best_Practices|
|2020.03.25|//ZScaler//|[[Multistaged Downloader Leverages Google Drive to Download Advanced Malware|https://www.zscaler.com/blogs/research/multistaged-downloader-leverages-google-drive-download-advanced-malware]]|Attacks Malware Google_Drive|
|2020.03.25|//Exabeam//|[[Exabeam Research Shows Companies are Embracing Cloud-based Security Tools, but Concerns Around Risk, Ease of Deployment Remain|https://www.exabeam.com/pr/exabeam-research-shows-companies-are-embracing-cloud-based-security-tools-but-concerns-around-risk-ease-of-deployment-remain/]]|Report Exabeam|
|2020.03.25|MSSP Alert| → [[Cloud-Based Security Tool Adoption: Latest Research Findings|https://www.msspalert.com/cybersecurity-research/cloud-based-tool-adoption/]]|Report Exabeam|
|2020.03.25|TechRepublic| → [[Organizations are moving their security to the cloud, but concerns remain|https://www.techrepublic.com/article/organizations-are-moving-their-security-to-the-cloud-but-concerns-remain/]]|Report Exabeam|
|2020.03.27|Help Net Security| → [[While many migrate security tools to the cloud, concerns remain|https://www.helpnetsecurity.com/2020/03/27/migrate-security-tools/]]|Report Exabeam|
|2020.03.25|//Microsoft Azure//|[[Keeping your cloud deployments secure during challenging times|https://azure.microsoft.com/en-us/blog/keeping-your-cloud-deployments-secure-during-challenging-times/]]|Deployment|
|2020.03.25|//Microsoft Azure//|[[Azure Dedicated Host: New capabilities and benefits|https://azure.microsoft.com/en-us/blog/azure-dedicated-host-new-capabilities-and-benefits/]]|Hosting|
|>|>|>|!2020.03.24|
|2020.03.24|Silicon.fr[>img[iCSF/flag_fr.png]]|[[Microsoft Azure : à qui la priorité sur les ressources cloud ?|https://www.silicon.fr/microsoft-azure-priorite-cloud-336761.html]]|Azure|
|2020.03.24|Dark Reading|![[How Attackers Could Use Azure Apps to Sneak into Microsoft 365|https://www.darkreading.com/cloud/how-attackers-could-use-azure-apps-to-sneak-into-microsoft-365/d/d-id/1337399]]|Azure Attacks|
|2020.03.18|//Varonis//| ⇡ [[Using Malicious Azure Apps to Infiltrate a Microsoft 365 Tenant|https://www.varonis.com/blog/using-malicious-azure-apps-to-infiltrate-a-microsoft-365-tenant/]]|Azure Attacks|
|2020.03.24|Dark Reasing|![[How to Secure Your Kubernetes Deployments|https://www.darkreading.com/cloud/how-to-secure-your-kubernetes-deployments/a/d-id/1337324]]|Kubernetes Best_Practices|
|2020.03.24|Container Journal|[[Kubernetes Security: Key Factors to Consider|https://containerjournal.com/topics/container-security/kubernetes-security-key-factors-to-consider/]]|Kubernetes|
|2020.03.24|Security Boulevard|[[A Security Audit Is Critical to Mitigate Risk|https://securityboulevard.com/2020/03/a-security-audit-is-critical-to-mitigate-risk/]]|Audit|
|2020.03.24|Beeping Computer|[[Microsoft Cuts Back More Office 365 Features to Handle High Load|https://www.bleepingcomputer.com/news/microsoft/microsoft-cuts-back-more-office-365-features-to-handle-high-load/]]|O365|
|2020.03.24|IoT for All|[[Asset Tracking with Google Cloud Platform|https://www.iotforall.com/asset-tracking-with-gcp/]]|Asset_Management|
|2020.03.24|//3DS Outscale//[>img[iCSF/flag_fr.png]]|[[Cybersécurité et risques liés au télétravail|https://www.globalsecuritymag.fr/3DS-Outscale-Cybersecurite-et,20200324,96966.html]]|Home_Working|
|2020.03.24|//Security Intelligence//|[[Do You Know Your Responsibilities When It Comes to Container Security?|https://securityintelligence.com/posts/do-you-know-your-responsibilities-when-it-comes-to-container-security/]]|Containers|
|2020.03.24|//Optiv//|[[Container Compromise to IaaS Recon|https://www.optiv.com/blog/container-compromise-iaas-recon]]|Containers Compromise|
|2020.03.24|//Alcide//|[[New Kubernetes Vulnerabilities: CVE-2020-8551, CVE-2020-8552|https://blog.alcide.io/new-kubernetes-vulnerabilities-cve-2020-855-cve-2020-8552]]|Kubernetes Vulnerabilities|
|2020.03.24|//Panorays//|[[The Future of Cloud Security: Challenges, Trends and Solutions |https://www.panorays.com/blog/the-future-of-cloud-security-challenges-trends-and-solutions/]]|Challenges Trends CAIQ|
|>|>|>|!2020.03.23|
|2020.03.23|Washington Post|[[How the cloud has opened new doors for hackers|https://www.washingtonpost.com/technology/2020/03/02/cloud-hack-problems/]]||
|2020.03.23|ComputerWeekly|![[The AWS bucket list: Keep your cloud secure|https://www.computerweekly.com/feature/The-AWS-bucket-list-Keep-your-cloud-secure]]|AWS|
|2020.03.23|CBR Online|[[New Global Internet Outages Map: “Concerning” Rise in ISP Outages|https://www.cbronline.com/news/global-internet-outages-map]]|Outages|
|2020.03.23|//Varonis//|[[How to Connect to Office 365 PowerShell: Azure AD Modules|https://www.varonis.com/blog/connect-to-office-365-powershell/]]|AzureAD PowerShell|
|2020.03.23|CIO[>img[iCSF/flag_fr.png]]|[[Cloud public : la sécurité reste un frein|https://www.cio-online.com/actualites/lire-cloud-public-la-securite-reste-un-frein-12045.html]]|Report|
|2020.03.23|//Thousand Eyes//|[[State of Internet Health During COVID-19|https://blog.thousandeyes.com/internet-health-during-covid-19/]]|Status Outages|
|2020.03.23|//IONOS//[>img[iCSF/flag_fr.png]]|[[Sécurité accrue pour les conteneurs et les Kubernetes avec les filtres syscall|https://www.globalsecuritymag.fr/Securite-accrue-pour-les,20200323,96930.html]]|Containers Kubernetes|
|2020.03.23|//Cisco//|[[Understanding the Shared Responsibility Model: Securing Public Cloud Just Got Easier|https://blogs.cisco.com/security/understanding-the-shared-responsibility-model-securing-public-cloud-just-got-easier]]|Public_Cloud Shared_Responsibility|
|2020.03.23|//Compare the Cloud//|[[Reasons for the hybrid cloud: disaster recovery and cost|https://www.comparethecloud.net/articles/reasons-for-the-hybrid-cloud-disaster-recovery-and-cost/]]|DRP Hybrid_Cloud|
|2020.03.23|//CloudCheckr//|[[Government Clouds for Federal Agencies: The Public Sector Guide to IaaS Success|https://cloudcheckr.com/document/white-paper-public-cloud-success/]]|Government|
!"//7 Steps to Securing Your Remote Work Lifecycle in the Cloud//"
[>img(150px,auto)[iCSA/K3RB7.jpg]]Article de blog publié le 27 mars 2020 — Rédigé par Martin JohnsonVP Marketing at Polyrize+++*[»]> https://www.polyrize.com/ === 
<<<
//Current global events and government mandates are forcing many organizations that have not, to date, encouraged remote work to suddenly allow their employees en masse to make a quick, often chaotic scramble for the exit and into the safety of their own homes. Typically, that means an unplanned migration to business-enablement cloud apps and services, even before security measures have been fully established. So, it is important, as soon as the dust settles, for those same organizations to then look to ensure that they are establishing formal processes to secure the entire remote work lifecycle in the cloud. In all probability, remote work will become the new normal, and a growing attack vector, even after the current crisis passes.

As many companies who have allowed remote work for a while know, as employees move outside of the network perimeter and into the cloud, so too does your business-critical data, and, unfortunately, your employees’ risky collaboration and bad file sharing habits. Cloud email, file sharing, instant messaging, and collaboration are critical to facilitate remote work, but organizations need to ensure that use of these apps is managed in a way that protects their business-critical resources by preventing account takeovers and data leakage.
This means making sure cloud users are only granted up-front the least amount of privileges within those services needed to do their specific jobs; that resource sharing is limited to specific groups to prevent external oversharing while employees and contractors do their work; and that remote offboarding is a quick, efficient, and thorough process when they leave.

To that end, it is recommended that you take the following 7 steps to secure your remote work lifecycle with respect to leveraging cloud services:
* ''STEP 1: Segregate your cloud workflows by group, department or location'' to determine what apps and resources they and their associated employees and contractors need to do their jobs. If possible, roll-out new cloud services incrementally for remote access, allowing only a manageable number of individuals from each group to try out the app and their associated access privileges before full deployment.
* ''STEP 2: Adhere to the principle of least privilege access'' by ensuring employees have the minimum access privileges needed to do their job. For example, consultants shouldn’t have unfettered access to customer PII and interns shouldn’t have access to sensitive engineering documents and IP. It also means placing controls on privileged users of both SaaS and IaaS services to prevent them from abusing admin privileges for non-admin related activities that can place your organization at high risk. In addition, you should eliminate unused or stale permissions of employees and external contractors to effectively reduce your attack surface by minimizing the risk of account takeovers and data loss.
* ''STEP 3: Ensure your business-critical resources are protected with MFA''. This means identifying and consolidating your business-critical resources within IT-sanctioned cloud apps that have been fully vetted for MFA support, as well as PII security controls, SOC-2 compliance, encryption support, etc.
* ''STEP 4: Make sure that file and folder sharing permissions within your sanctioned apps are restricted within specific groups'', depending on usage. This will help prevent accidental oversharing of business-critical data. Realize that a sensitive file carelessly dropped into a folder with overly-broad sharing rights will inherit those same rights and be automatically exposed.
* ''STEP 5: Implement cloud DLP policies'' to provide a last line of defense against the leakage of business-critical data. This includes placing strict controls on externally sharing sensitive files, especially those containing PII, PCI and PHI, with contractors and on copying files to personal accounts.
* ''STEP 6: Set up processes for off-boarding remote employees and contractors''. This process can be a challenge since many cloud services are managed outside of your SSO. Adopting a unified, cross-service access control solution that allows you to identify and revoke permissions when employees or contractors leave the company is recommended.
* ''STEP 7: Reprioritize security team resources to cloud data protection'', focused on preventing data leakage and account takeovers.

Ultimately, with few exceptions, all organizations will need to accept the fact that remote work is here to stay, and that cloud apps and services are critical to making it work effectively. Reorienting your employees, security teams, and processes to that new reality is critical to reducing your remote-work attack surface and ensuring that your business remains secure against the financial, reputational, and compliance related impact of cloud account takeovers and data loss throughout the remote work lifecycle//
[...]
<<<
__Liens :__
* Article sur le site de la CSA &rArr; ''[[CloudSecurityAlliance.fr/go/k3rx/|https://CloudSecurityAlliance.fr/go/k3rx/]]'', et sur celui de Polyrize &rArr; ''[[CloudSecurityAlliance.fr/go/k3rz/|https://CloudSecurityAlliance.fr/go/k3rz/]]'' 
!"//The Right Questions to Ask Your Vendors in Times of Large-Scale Remote Working//"
[>img(150px,auto)[iCSA/K3QBT.jpg]]Article de blog publié le 26 mars 2020 — Rédigé par Elad Shapira+++*[»]> https://www.linkedin.com/in/eladshapira/ ===, Head of Security, Panorays+++*[»]> https://www.panorays.com/ === 
Il propose des critères d'évaluation des fournisseurs, répartis en 18 questions dans 4 catégories : généralités, authentification et autorisation, résilience et continuité d'activités, procédure et processus.
<<<
//In the wake of coronavirus, companies are now applying immediate work-from-home policies. This sudden and massive change poses a set of new cybersecurity risks and is forcing security teams to take immediate action.
One of these cybersecurity risks emanates from the supply chain. While a large company may be able to quickly undergo the transition from a relatively concentrated workforce to a large-scale remote workforce, its supply chain partners may not.
In an effort to ensure the cyber resilience of the supply chain during these turbulent times, Panorays has readily made available the related vendor evaluation criteria, broken down to 18 questions. Companies are welcome to use these questions to assess their vendors’ preparedness for work from home.
!!1 - General
# Do you already have remote work practices and policies?
# How many of your employees already have remote work capabilities?
# How much of your day-to-day activity is suitable for remote working today?
# What is your remote access mechanism?
# Which client devices are allowed to access your digital assets remotely?
!!2 - Authentication and Authorization
# Do you enforce 2FA for employees with remote work capabilities?
# Do you enforce strong passwords for all employees with remote work capabilities?
!!3 - Resilience and Business Continuity
# Is your network structured to support remote access for all of your employees?
# Do you expect operational problems or negative impact to your service due to remote access?
# Do you expect the pre-agreed SLA might be breached?
# Do you backup regularly and require your employees to use and save files only on company-related places (such as internal Google Drive or dedicated services)?
# Do you have redundant inbound connectivity for your facilities / internal systems?
!!4 - Procedure and Processes
# Do you train your employees with dedicated security awareness for working in public places such as coffee shops or restaurants? In particular, are they instructed to leave the end point station locked and verify use of a secure Wi-Fi network such as by using an employee’s mobile phone?
# Did you train your employees with respect to the above procedures / processes before allowing remote working?
# Do you have clear procedures / processes / controls in place for verifying the authenticity of communications (email, phone, IM) with respect to activities such as fund transfers, account creation, account reset, etc.?
# Do you have a security solution protecting the end point stations (anti virus, EDR etc)?
# Do you have tools or procedures to support remote patch management for your servers, services and end-points?
# Do you have a secure manner of communication between employees working remotely?
These questions will help companies assess the cybersecurity risk emanating from their suppliers that have adopted work-from-home practices. It’s important to note that considering the sudden shift in business behavior, the regular spreadsheet evaluation process will not work, considering the time and human effort it requires. As such, automation of the process is essential. Doing so will allow companies to easily add questions without the need to resend the full questionnaire, track progress, measure and quickly calculate risk levels. Most of all, it will allow companies to quickly and easily scale this process to ensure their security policy is enforced throughout the supply chain. //
[...]
<<<
__Lien :__
* blog original en anglais &rArr; ''[[CloudSecurityAlliance.fr/go/k3kb/|https://CloudSecurityAlliance.fr/go/k3kb/]]''
!"//CSA STAR Certification Case Study//"
Podcast de la série "[[CSA Security Update]]" publié le 25 mars 2020 — Invité : Larry Greenblatt, CISSP, CCSP; Information Security Specialist chez QAD
<<<
[>img(150px,auto)[iCSA/CSAsecUpd.jpg]]//The Security Trust Assurance and Risk (STAR) Program encompasses key principles of transparency, rigorous auditing, and harmonization of standards. Companies who use STAR indicate best practices and validate the security posture of their cloud offerings.
The STAR registry documents the security and privacy controls provided by popular cloud computing offerings. This publicly accessible registry allows cloud customers to assess their security providers in order to make the best procurement decisions.
Listen as we interview Larry Greenblatt, Information Security Specialist at QAD as he takes us through his journey to CSA STAR Certification from business case to implementation to through the audit process as well as discussing the ROI and the importance the maturity evaluation and how this has facilitated improving their business overall.//
<<<
__Liens :__
* Annonce : https://www.buzzsprout.com/303731/3118498-csa-star-certification-case-study-guest-larry-greenblatt-cissp-ccsp-information-security-specialist-at-qad
* Podcast : https://www.buzzsprout.com/303731/3118498-csa-star-certification-case-study-guest-larry-greenblatt-cissp-ccsp-information-security-specialist-at-qad.mp3
!1 - Les nouveautés CSA de la semaine du 16 au 22 mars 2020
* Ouverture de la plateforme collaborative [[CSA Circle]] pour le Chapitre Français+++*[»]> <<tiddler [[2020.03.19 - Ouverture de la plateforme collaborative CSA Circle]]>>=== [>img[iCSF/cloud-security-alliance-fr.png]]
* Blog : Continuous Auditing and Continuous Certification+++*[»]> <<tiddler [[2020.03.20 - Blog : Continuous Auditing and Continuous Certification]]>>=== 
* Ouverture des inscriptions pour la conférence SECtember+++*[»]> <<tiddler [[2020.03.16 - Ouverture des inscriptions pour la conférence SECtember]]>>=== 
* Webinar: 'Top 5 Latest Cloud Security Hacks and How You Can Avoid Them'+++*[»]> <<tiddler [[2020.03.17 - Webinar : 'Top 5 Latest Cloud Security Hacks and How You Can Avoid Them']]>>=== 
!2 - Veille Web
La [[Veille Web|2020.03.22 - Veille Hebdomadaire - 22 mars]] avec plus d'une soixantaine de liens dont :
* Etudes et rapports : Firemon+++*[»]> 
|2020.03.18|The Last Watchdog|[[FireMon survey shows security lags behind fast pace of hybrid cloud deployments|https://www.lastwatchdog.com/shared-intel-firemon-survey-shows-security-lags-behind-fast-pace-of-hybrid-cloud-deployments/]]|Survey Firemon|
=== 
* Supervision : les flux latéraux (Est-Ouest)+++*[»]> 
|2020.03.18|//Lastline//|![[Why Monitoring East-West Traffic is Crucial for Cloud Security|https://www.lastline.com/blog/why-monitoring-east-west-traffic-is-crucial-for-cloud-security/]]|Strategy Monitoring|
=== 
* Attaques : nouvelles attaques conre O365+++*[»]>
|2020.03.20|Solutions Numériques[>img[iCSF/flag_fr.png]]|[[Nouveau vecteur d’attaque : Office 365 ciblé par des applications Azure malveillantes|https://www.solutions-numeriques.com/nouveau-vecteur-dattaque-office-365-cible-par-des-applications-azure-malveillantes/]]|O365 Attacks|
===, et Docker+++*[»]>
|2020.03.17|H4CKarandas|[[Hacking Docker Remotely|https://hackarandas.com/blog/2020/03/17/hacking-docker-remotely/]]|Docker |
=== 
* Fuites de données : aux Etats-Unis+++*[»]>
|2020.03.20|CyberNews|[[Report: unidentified database exposes 200 million Americans|https://cybernews.com/security/report-unidentified-database-exposes-200-million-americans/]]|Data_Leak|
|2020.03.20|Dark Reading| → [[200M Records of US Citizens Leaked in Unprotected Database|https://www.darkreading.com/cloud/200m-records-of-us-citizens-leaked-in-unprotected-database/d/d-id/1337377]]|Data_Leak|
|2020.03.20|Forbes| → [[Beware—This Open Database On Google Cloud ‘Exposes 200 Million Americans’: Are You At Risk?|https://www.forbes.com/sites/zakdoffman/2020/03/20/stunning-new-google-cloud-breach-hits-200-million-us-citizens-check-here-if-youre-now-at-risk/]]|Data_Leak|
===, au Royaume-Uni (2 cas)+++*[»]>
|2020.03.20|//vpnMentor//|[[Report: British Printing Press Leaks Confidential Material & More|https://www.vpnmentor.com/blog/report-doxzoo-leak/]]|Data_Leak AWS|
|2020.03.20|Security Week| → [[UK Printing Company Exposed Military Documents|https://www.securityweek.com/uk-printing-company-exposed-military-documents]]|Data_Leak AWS|
|>|>|>||
|2020.03.19|//Service Discovery//|[[A UK-based Security Company Seemed To Have Inadvertently Exposed Its ‘Leaks Database’ with 5B+ Records|https://securitydiscovery.com/data-breach-database-data-breach/]]|Data_Leak ElasticSearch Keepnet_Labs|
|2020.03.21|Security Week| → [[Unprotected Database Exposed 5 Billion Previously Leaked Records|https://www.securityweek.com/unprotected-database-exposed-5-billion-previously-leaked-records]]|Data_Leak ElasticSearch Keepnet_Labs|
===, et ailleurs+++*[»]>
|2020.03.17|//vpnMentor//|[[Report: Two Corporate Finance Companies Leak Half a Million Legal and Financial Documents Online|https://www.vpnmentor.com/blog/report-mca-wizard-leak/]]|Data_Leak|
|2020.03.17|Security Week| → [[Financial Services Firms Exposed 500,000 Sensitive Documents|https://www.securityweek.com/financial-services-firms-exposed-500000-sensitive-documents]]|Data_Leak AWS_S3|
|2020.03.17|Dark Reading| → [[500,000 Documents Exposed in Open S3 Bucket Incident|https://www.darkreading.com/cloud/500000-documents-exposed-in-open-s3-bucket-incident/d/d-id/1337343]]|Data_Leak AWS_S3|
=== 
* Vulnérabilité corrigée : sur Azure (il y a 8 mois) +++*[»]>
|2020.03.18|//CyberArk//|[[I Know What Azure Did Last Summer|https://www.cyberark.com/threat-research-blog/i-know-what-azure-did-last-summer/]]|Azure Portal Vulnerability|
|2020.03.18|//Threatpost//| → [[Azure Red Flag: Microsoft Accidentally Fixes Cloud Config 'Bug'|https://threatpost.com/azure-red-flag-microsoft-fixes-cloud-config-bug/153928/]]|Azure Portal Vulnerability|
=== 
* Outils : MSOLSpray+++*[»]>
|2020.03.16|GitHub|[[MSOLSpray: a password spraying tool for Microsoft Online accounts (Azure/O365)|https://github.com/dafthack/MSOLSpray]]|[[Tools|Outils-GitHub]] Aeure O365|
===, bibliothèque d'alertes Sentinel et capagnes de recherches basées sur Sysmon et ATT&CK+++*[»]>
|2020.03.19|Hakin9|[[Repository of sentinel alerts and hunting queries leveraging sysmon and the MITRE ATT&CK framework|https://hakin9.org/repository-of-sentinel-alerts-and-hunting-queries-leveraging-sysmon-and-the-mitre-attck-framework/]]|Sentinel ATT&CK|
||GitHub| → [[Sentinel Attack|https://github.com/BlueTeamLabs/sentinel-attack/wiki/Deploying-sentinel-ATT&CK-analytics]]|[[Tools|Outils-GitHub]] Sentinel ATT&CK|
=== 
* Divers : Garantie de service et engagement de résilience de prestataires de services Cloud+++*[»]>
|2020.03.21|//Microsoft Azure//|[[Our commitment to customers and Microsoft cloud services continuity|https://azure.microsoft.com/en-us/blog/our-commitment-to-customers-and-microsoft-cloud-services-continuity/]]|Azure Resilience|
|2020.03.19|Silicon.fr[>img[iCSF/flag_fr.png]]|[[Office 365 : Microsoft active des leviers de résilience|https://www.silicon.fr/office-365-microsoft-resilience-336497.html]]|COVID-19 O365|
|2020.03.18|Bleeping Computer|[[Microsoft Scales Back Office 365 Features to Handle High Loads|https://www.bleepingcomputer.com/news/microsoft/microsoft-scales-back-office-365-features-to-handle-high-loads/]]|O365|
|2020.03.16|Silicon.fr[>img[iCSF/flag_fr.png]]|[[Coronavirus : quelles garanties chez les fournisseurs de Cloud ?|https://www.silicon.fr/coronavirus-fournisseurs-cloud-336217.html]]|Resilience|
=== 
!3 - Weekly Cloud and Security Watch Newsletter[>img[iCSF/inEnglish.png]]
<<tiddler [[2020.03.22 - Weekly Newsletter - March 22nd]]>>
!CSA updates and news - March 16th to 22nd
* The French Chapter workspace is now available on the CSA 'Circle' portal+++*[»]> <<tiddler [[2020.03.19 - Ouverture de la plateforme collaborative CSA Circle]]>>=== [>img[iCSF/cloud-security-alliance-fr.png]]
* Blog : Continuous Auditing and Continuous Certification+++*[»]> <<tiddler [[2020.03.20 - Blog : Continuous Auditing and Continuous Certification]]>>=== 
* Registration opens for the SECtember conference+++*[»]> <<tiddler [[2020.03.16 - Ouverture des inscriptions pour la conférence SECtember]]>>=== 
* Webinar: 'Top 5 Latest Cloud Security Hacks and How You Can Avoid Them'+++*[»]> <<tiddler [[2020.03.17 - Webinar : 'Top 5 Latest Cloud Security Hacks and How You Can Avoid Them']]>>=== 
!Cloud and Security News Watch
[[Over 60 links|2020.03.22 - Veille Hebdomadaire - 22 mars]] among which:
* Reports: Firemon
* Monitoring: East-West Traffic Crucial for Cloud Security
* Attacks: O365 as a target, Hacking Docker remotely
* Data leaks: 200M Records of US Citizens, UK Printing Press and UK Printing Company, Financial documents exposed in open S3 bucket
* Tools: MSOLSpray for password spraying, Repository of Sentinel alerts and hunting queries leveraging Sysmon and the MITRE ATT&CK framework
* Miscellaneous: CSPs commitment to customers and services continuity

|ssTabl99|k
|!⇒ [[CloudSecurityAlliance.fr/go/K3M/|https://CloudSecurityAlliance.fr/go/K3M/]] |
|!Mars|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2020.03.22|
|2020.03.22|Cloud Security podcast|[[HASHICORP, Working Remotely, Incident Response, AWS Cloud Native - Will Bengston|https://anchor.fm/cloudsecuritypodcast/episodes/HASHICORP--Working-Remotely--Incident-Response--AWS-Cloud-Native---Will-Bengston-ebpa0f]]|Podcast|
|>|>|>|!2020.03.21|
|2020.03.21|//Microsoft Azure//|[[Our commitment to customers and Microsoft cloud services continuity|https://azure.microsoft.com/en-us/blog/our-commitment-to-customers-and-microsoft-cloud-services-continuity/]]|Azure Resilience|
|2020.03.21|//Delta Risk//|[[Microsoft Defender ATP and ActiveEye Integration Makes it Easier to Detect Threats|https://deltarisk.com/blog/microsoft-defender-atp-and-activeeye-integration-makes-it-easier-to-detect-threats/]]|Detection|
|>|>|>|!2020.03.20|
|2020.03.20|Solutions Numériques[>img[iCSF/flag_fr.png]]|[[Nouveau vecteur d’attaque : Office 365 ciblé par des applications Azure malveillantes|https://www.solutions-numeriques.com/nouveau-vecteur-dattaque-office-365-cible-par-des-applications-azure-malveillantes/]]|O365 Attacks|
|2020.03.20|CyberNews|[[Report: unidentified database exposes 200 million Americans|https://cybernews.com/security/report-unidentified-database-exposes-200-million-americans/]]|Data_Leak|
|2020.03.20|Dark Reading| → [[200M Records of US Citizens Leaked in Unprotected Database|https://www.darkreading.com/cloud/200m-records-of-us-citizens-leaked-in-unprotected-database/d/d-id/1337377]]|Data_Leak|
|2020.03.20|Forbes| → [[Beware—This Open Database On Google Cloud ‘Exposes 200 Million Americans’: Are You At Risk?|https://www.forbes.com/sites/zakdoffman/2020/03/20/stunning-new-google-cloud-breach-hits-200-million-us-citizens-check-here-if-youre-now-at-risk/]]|Data_Leak|
|2020.03.24|CISO Mag| → |[[Unidentified Database Exposes 800 GB of Americans’ Personal Records|https://www.cisomag.com/unidentified-database-exposes-800-gb-of-americans-personal-records/]]|Data_Leak|
|2020.03.20|Cyber Defense Magazine|[[Conquering the Cyber Security Challenges of The Cloud|http://www.cyberdefensemagazinebackup.com/conquering-the-cyber-security-challenges-of-the-cloud/]]|Challenges|
|2020.03.20|IT Web|[[Hasty cloud adoption increases companies’ risk profile|https://www.itweb.co.za/content/KzQenqjVd8lqZd2r]]|Risks|
|2020.03.20|//vpnMentor//|[[Report: British Printing Press Leaks Confidential Material & More|https://www.vpnmentor.com/blog/report-doxzoo-leak/]]|Data_Leak AWS|
|2020.03.20|Security Week| → [[UK Printing Company Exposed Military Documents|https://www.securityweek.com/uk-printing-company-exposed-military-documents]]|Data_Leak AWS|
|2020.03.20|//NakedSecurity//|[[Exchange rate service’s customer details hacked via AWS|https://nakedsecurity.sophos.com/2020/03/20/exchange-rate-services-customer-details-hacked-via-aws/]]|Data_Leak AWS|
|2020.03.20|//Cloud Academy//|[[The 12 AWS Certifications: Which is Right for You and Your Team?|https://cloudacademy.com/blog/choosing-the-right-aws-certification/]]|Training|
|2020.03.20|//Hunton//|[[Irish DPA Issues Guidance to Secure Cloud-Based Environments|https://www.huntonprivacyblog.com/2020/03/20/irish-dpa-issues-guidance-to-secure-cloud-based-environments/]]|Privacy Guidance Ireland|
|2020.03.20|//Palo Alto Networks//|[[The Best Method to Secure the Cloud Starts Offline|https://blog.paloaltonetworks.com/2020/03/cloud-secure-the-cloud/]]|Misc|
|2020.03.20|//ProtonMail//|[[Using Zoom? Here are the privacy issues you need to be aware of|https://protonmail.com/blog/zoom-privacy-issues/]]|Zoom Privacy|
|>|>|>|!2020.03.19|
|2020.03.19|Silicon.fr[>img[iCSF/flag_fr.png]]|[[Office 365 : Microsoft active des leviers de résilience|https://www.silicon.fr/office-365-microsoft-resilience-336497.html]]|COVID-19 O365|
|2020.03.19|The Register|[[NASA to launch 247 petabytes of data into AWS - but forgot about eye-watering cloudy egress costs before lift-off|https://www.theregister.co.uk/2020/03/19/nasa_cloud_data_migration_mess/]]|Misc|
|2020.03.19|Cyber Defense Magazine|[[Create Remote User Deployments and Security Nearly Instantly with Secure Desktop as a Service (DaaS)|https://www.cyberdefensemagazine.com/create-remote-user-deployments-and-security-nearly-instantly-with-secure-desktop-as-a-service-daas/]]|DaaS|
|2020.03.19|Hakin9|[[Repository of sentinel alerts and hunting queries leveraging sysmon and the MITRE ATT&CK framework|https://hakin9.org/repository-of-sentinel-alerts-and-hunting-queries-leveraging-sysmon-and-the-mitre-attck-framework/]]|Sentinel ATT&CK|
||GitHub| → [[Sentinel Attack|https://github.com/BlueTeamLabs/sentinel-attack/wiki/Deploying-sentinel-ATT&CK-analytics]]|[[Tools|Outils-GitHub]] Sentinel ATT&CK|
|2020.03.19|//Microsoft Azure//|[[Microsoft Teams at 3: Everything you need to connect with your teammates and be more productive |https://www.microsoft.com/en-us/microsoft-365/blog/2020/03/19/microsoft-teams-3-everything-you-need-connect-teammates-be-more-productive/]]|COVID-19 Teams|
|2020.03.19|GeekWire| → [[Microsoft Teams hits 44M daily active users, spiking 37% in one week amid remote work surge|https://www.geekwire.com/2020/microsoft-teams-hits-44m-users-huge-37-growth-spike-1-week-amid-remote-work-surge/]]|COVID-19 Teams|
|2020.03.19|//Service Discovery//|[[A UK-based Security Company Seemed To Have Inadvertently Exposed Its ‘Leaks Database’ with 5B+ Records|https://securitydiscovery.com/data-breach-database-data-breach/]]|Data_Leak ElasticSearch Keepnet_Labs|
|2020.03.21|Security Week| → [[Unprotected Database Exposed 5 Billion Previously Leaked Records|https://www.securityweek.com/unprotected-database-exposed-5-billion-previously-leaked-records]]|Data_Leak ElasticSearch Keepnet_Labs|
|2020.03.19|//Threatpost//|[[Cloud Misconfig Mistakes Show Need For DevSecOps|https://threatpost.com/cloud-misconfig-devsecops/153921/]]|Misconfigurations DevSecOps|
|2020.03.19|//Fugue//|[[Cloud Security for Newly Distributed Engineering Teams|https://www.fugue.co/blog/cloud-security-for-newly-distributed-engineering-teams]]|Best_Practices Remote_Security|
|2020.03.19|//Palo Alto Networks//|[[Do MSSPs Have What it Takes to Win Today’s Cybersecurity War?|https://blog.paloaltonetworks.com/2020/03/network-mssps/]]|MSSPs|
|>|>|>|!2020.03.18|
|2020.03.18|Bleeping Computer|![[Microsoft Scales Back Office 365 Features to Handle High Loads|https://www.bleepingcomputer.com/news/microsoft/microsoft-scales-back-office-365-features-to-handle-high-loads/]]|O365|
|2020.03.18|Solutions Review|[[Flexera: 68 Percent of CIOs Worry About Vendor Lock-In with Public Cloud|https://solutionsreview.com/cloud-platforms/flexera-68-percent-of-cios-worry-about-vendor-lock-in-with-public-cloud/]] ([[rapport|https://info.flexera.com/SLO-REPORT-CIO-Priorities-2020]])|Survey|
|2020.03.18|The Last Watchdog|[[FireMon survey shows security lags behind fast pace of hybrid cloud deployments|https://www.lastwatchdog.com/shared-intel-firemon-survey-shows-security-lags-behind-fast-pace-of-hybrid-cloud-deployments/]]|Survey Firemon|
|2020.03.18|//Varonis//|![[Using Malicious Azure Apps to Infiltrate a Microsoft 365 Tenant|https://www.varonis.com/blog/using-malicious-azure-apps-to-infiltrate-a-microsoft-365-tenant/]]|Azure Attacks|
|2020.03.18|//Lastline//|![[Why Monitoring East-West Traffic is Crucial for Cloud Security|https://www.lastline.com/blog/why-monitoring-east-west-traffic-is-crucial-for-cloud-security/]]|Strategy Monitoring|
|2020.03.18|//CyberArk//|[[I Know What Azure Did Last Summer|https://www.cyberark.com/threat-research-blog/i-know-what-azure-did-last-summer/]]|Azure Portal Vulnerability|
|2020.03.18|//Threatpost//| → [[Azure Red Flag: Microsoft Accidentally Fixes Cloud Config 'Bug'|https://threatpost.com/azure-red-flag-microsoft-fixes-cloud-config-bug/153928/]]|Azure Portal Vulnerability|
|2020.03.18|//Forcepoint//|[[SaaS Security: Prioritizing Security During a Time of Social Distancing|https://www.forcepoint.com/blog/insights/prioritizing-saas-security-during-social-distancing]]|SaaS|
|2020.03.18|//Tuffin//[>img[iCSF/flag_fr.png]]|[[Sécuriser les environnements de cloud hybrides : un impératif stratégique|https://www.globalsecuritymag.fr/Securiser-les-environnements-de,20200319,96798.html]]|Hybrid_Cloud|
|2020.03.18|//Cloud Management Insider//|[[CSA Invites Professionals To Review Cloud Control Matrix v4|https://www.cloudmanagementinsider.com/csa-invites-professionals-to-review-cloud-control-matrix-v4/]]|CSA|
|>|>|>|!2020.03.17|
|2020.03.17|H4CKarandas|[[Hacking Docker Remotely|https://hackarandas.com/blog/2020/03/17/hacking-docker-remotely/]]|Docker|
|2020.03.17|Lawfare|[[Better to Be Realistic About the Security Opportunities of Cloud Computing|https://www.lawfareblog.com/better-be-realistic-about-security-opportunities-cloud-computing]]|Cyberspace_Solarium|
|2020.03.17|DZone|[[Set Up An Amazon Elasticsearch Service Domain Using A VPC With VPN|https://dzone.com/articles/set-up-an-amazon-elasticsearch-service-domain-usin]]|Misc|
|2020.03.17|Security Boulevard|[[Why Traditional Security Is Failing Us|https://securityboulevard.com/2020/03/why-traditional-security-is-failing-us/]] (1/2)|Treats|
|2020.03.17|//Security Intelligence//|[[Grow Your Business With an Evolving Cloud Security Strategy|https://securityintelligence.com/posts/grow-your-business-with-an-evolving-cloud-security-strategy/]]|Strategy|
|2020.03.17|//vpnMentor//|[[Report: Two Corporate Finance Companies Leak Half a Million Legal and Financial Documents Online|https://www.vpnmentor.com/blog/report-mca-wizard-leak/]]|Data_Leak|
|2020.03.17|Security Week| → [[Financial Services Firms Exposed 500,000 Sensitive Documents|https://www.securityweek.com/financial-services-firms-exposed-500000-sensitive-documents]]|Data_Leak AWS_S3|
|2020.03.17|Dark Reading| → [[500,000 Documents Exposed in Open S3 Bucket Incident|https://www.darkreading.com/cloud/500000-documents-exposed-in-open-s3-bucket-incident/d/d-id/1337343]]|Data_Leak AWS_S3|
|2020.03.17|SC Magazine|[[Secure Access Service Edge (SASE) - key points for early adopters|https://www.scmagazine.com/home/opinion/secure-access-service-edge-sase-key-points-for-early-adopters/]]|SASE|
|2020.03.17|//Cloudnaut//|[[Advanced AWS Networking: Pitfalls That You Should Avoid|https://cloudonaut.io/advanved-aws-networking-pitfalls-that-you-should-avoid/]]|AWS Networking|
|2020.03.17|//Forcepoint//|[[SASE: What is its impact today, and where do we go from here?|https://www.forcepoint.com/blog/insights/forcepoint-converged-security-gartner-sase-impact]]|SASE|
|2020.03.17|//UpGuard//|[[What is Zero Trust? A Model for More Effective Security|[https://www.upguard.com/blog/zero-trust]]|Zero_Trust|
|2020.03.17|//OVHcloud//|[[Managing Harbor at cloud scale : The story behind Harbor Kubernetes Operator|https://www.ovh.com/blog/managing-harbor-at-cloud-scale-the-story-behind-harbor-kubernetes-operator/]]|Kubernetes Harbor_Project|
|2020.03.17|//Rancher//|[[Enhancing Kubernetes Security with Pod Security Policies, Part 2|https://rancher.com/blog/2020/pod-security-policies-part-2/]] (2/2)|Kubernetes|
|2020.03.17|//Barracuda Networks//[>img[iCSF/flag_fr.png]]|[[Les entreprises sont responsables de leur protection Cloud|https://www.globalsecuritymag.fr/Les-entreprises-sont-responsables,20200317,96734.html]]|Governance|
|2020.03.17|//Quest//[>img[iCSF/flag_fr.png]]|[[Sauvegardes dans le cloud : Mimikatz vient en aide aux cybercriminels|https://www.globalsecuritymag.fr/Sauvegardes-dans-le-cloud-Mimikatz,20200309,96463.html]]|Risks Backups|
|>|>|>|!2020.03.16|
|2020.03.16|Silicon.fr[>img[iCSF/flag_fr.png]]|[[Coronavirus : quelles garanties chez les fournisseurs de Cloud ?|https://www.silicon.fr/coronavirus-fournisseurs-cloud-336217.html]]|Resilience|
|2020.03.16|TechBeacon|[[How a zero-trust approach can protect your cloud resources|https://techbeacon.com/security/how-zero-trust-approach-can-protect-your-cloud-resources]]|Zero_Trust|
|2020.03.16|GitHub|[[MSOLSpray: a password spraying tool for Microsoft Online accounts (Azure/O365)|https://github.com/dafthack/MSOLSpray]]|[[Tools|Outils-GitHub]] Aeure O365|
|2020.03.16|//Microsoft Azure//|[[Azure Container Registry: Preview of customer-managed keys|https://azure.microsoft.com/en-us/blog/azure-container-registry-preview-of-customer-managed-keys/]]|Azure Containers Registry|
|2020.03.16|//FNTS//|[[How to leverage DRaaA to avoid costly outages|https://info.fnts.com/blog/how-to-leverage-draas-to-avoid-costly-outages]]|DRaaS|
|2020.03.16|//Aqua Security//|[[Trivy Vulnerability Scanner from Aqua Security Adopted by Leading Cloud Native Platforms|https://www.prnewswire.com/news-releases/trivy-vulnerability-scanner-from-aqua-security-adopted-by-leading-cloud-native-platforms-301022747.html]]|Containers Registry|
|2020.03.17|Slicon Angle|[[Aqua Security debuts open-source container image registry scanner|https://siliconangle.com/2020/03/17/aqua-security-debuts-open-source-container-image-registry-scanner/]]|Containers Registry|
|2020.03.16|//Commvault//[>img[iCSF/flag_fr.png]]|[[Gérer la complexité pour exploiter tout le potentiel de la reprise après sinistre multi-cloud|https://www.globalsecuritymag.fr/Gerer-la-complexite-pour-exploiter,20200311,96561.html]]|DRaaS|
!"//Continuous Auditing and Continuous Certification//"
[>img(150px,auto)[iCSA/K3KBC.jpg]]Article de blog publié le 20 mars 2020 — Rédigé par Alain Pannetrat, Senior Researcher CSA et fondateur de Omzlo.com
<<<
//For some cloud customers in sensitive or highly-regulated industries, such as banking or healthcare, “traditional” annual or bi-annual audits do not provide enough assurance to move to the cloud. To address the concerns of this segment of the industry, the Cloud Security Alliance is building STAR Continuous: an innovative framework designed to provide assurance to customers on a monthly, daily or even hourly basis.
The foundation of STAR Continuous is continuous auditing: the continuous evaluation of certain characteristics of an information system, mostly by automated means, in order to get near real-time assurance. Continuous audits can be used as a basis for a novel type of certification (or attestation) as well as for self-assessments. In many ways, the industry is already doing continuous auditing. Yet cloud customers cannot fully take advantage of it, due to lack of relevant standards and best practices.
Read on to learn more about the genesis and purpose of STAR Continuous.
!When a certification or an attestation is not good enough
[>img(320px,auto)[iCSA/K3KBC.png]]Certification and attestation schemes such as those offered by the CSA Open Certification Framework (OCF), ISO/IEC, or AICPA, have strongly contributed to the success of the cloud by providing many cloud customers the necessary assurance that the cloud service they are using meet relevant security requirements. These schemes rely on annual or biannual audits conducted by trusted independent auditors. However, for some cloud customers in sensitive or highly-regulated industries, such as banking or healthcare, the time elapsed between annual or bi-annual third-party audits is perceived as a “blind spot”: a much more frequent level of scrutiny is required.
Over the years, CSA has participated in several research initiatives with industry, public bodies and academia in order to develop new certification tools providing a more continuous level of assurance. Recently, as part of the European Commission-funded project EU-SEC+++*[»]> https://www.sec-cert.eu/ ===, CSA participated in a pilot for the continuous certification of a cloud service for a major Spanish financial institution (LaCaixa) and successfully demonstrated the feasibility of providing continuous assurance to demanding cloud customers.
The continuous certification scheme CSA has developed extends a “traditional” certification scheme with a continuous process of automated checks. The whole process can be summarised in two consecutive phases: an initialisation phase and a continuous audit phase.

__''Initialisation phase:''__
The CSP undergoes a traditional third-party audit in order to obtain a certification or attestation. In addition, the CSP defines:
* A continuous certification target which comprises a set of security objectives, each associated with a policy that defines the assessment frequency (e.g. check every 4 hours).
* A set of tools capable of verifying that the security objectives are fulfilled..
The third party auditor involved in the certification checks:
* That the defined continuous certification target covers a satisfactory scope of the certified information system.
* That the reporting tools are trustworthy and fit-for-purpose.
* If this process is successful the continuous certification target is transmitted to the certification authority (i.e. CSA), which creates a corresponding entry for the cloud service in a dedicated public registry of continuously certified cloud services.

__''Continuous audit phase:''__
The third-party auditor periodically performs checks to confirm that the assessment tools are trustworthy (e.g. integrity checks).
The assessment tools continuously reports back to the certification authority (i.e. CSA) through a dedicated API the results of the assessment of each defined security objective, according to the frequency defined in policies within the continuous certification target:
* If a CSP reports in due time that all security objectives are met, the cloud service is marked as “compliant” in the corresponding entry in the public registry.
* If a CSP reports non-compliances or if the CSP fails to report about security objectives in due time, the entry will ultimately be removed from the public registry if the situation is not resolved with a predefined period of time.
It’s important to note that the public registry (STAR) will not provide details of non-compliances in order not to potentially compromise the security cloud services under scrutiny.
CSA’s research has highlighted that one of the biggest challenge in the process outlined above is the definition of the continuous certification target, and in particular the set security objectives that are used to assess an information system.
Let’s see why.
!!Security Level Objectives and Security Qualitative Objectives
Traditional certification typically relies on control frameworks such as the CSA Cloud Control Matrix or ISO/IEC 27002. These frameworks contain high-level control objectives that are interpreted by humans and translated into applicable technical or organisational security controls. This process is slow and complex and cannot be conducted on a daily or hourly basis. On the other hand, at least some of the applicable technical or organisational security controls can be evaluated automatically and frequently, if we are able to express them as quantifiable or qualifiable attributes of an information system, associated to metrics and expected results.
Thinking in terms of quantifiable or qualifiable attributes, metrics and expected results is, in fact, a familiar concept in the cloud, as embodied through Service Level Agreements (SLA), where cloud providers express expected results usually related to performance attributes of a cloud service, along with the metrics used to assess them. What has been done for performance in SLAs can also be done for security and the standardisation community has been working to build Security Level Agreements for cloud computing through the development of ISO/IEC 19086+++*[»]> https://www.iso.org/standard/67545.html ===.

The continuous certification scheme CSA has developed uses ISO/IEC 19086 as a foundation, using its well-defined terminology and conceptual model. The standard notably defines 3 important concepts:
* Metric: a standard of measurement that defines the conditions and the rules for performing the measurement and for understanding the results of a measurement.
* Cloud service level objective (SLO): commitment a cloud service provider (ISO/IEC 17788:2014, 3.2.15) makes for a specific, quantitative characteristic of a cloud service (ISO/IEC 17788:2014, 3.2.8), where the value follows the interval scale or ratio scale.
* Cloud service qualitative objective (SQO): commitment a cloud service provider (ISO/IEC 17788:2014, 3.2.15) makes for a specific, qualitative characteristic of a cloud service (ISO/IEC 17788:2014, 3.2.8), where the value follows the nominal scale or ordinal scale.
Consider for example, as a control objective, the need to define and regularly test business continuity plans. At a high level, such a control objective is difficult to quantify or measure explicitly, with a corresponding expected result. At a lower level however, we can identify many useful technical attributes of an information system that can be used to highlight the strength of business continuity plans. For instance, the number of successful backup restoration simulated per month/week, the recovery point actual, or data durability. Each one of these attributes can be tested and measured according to a metric, and corresponding objectives can be set. Moreover, these attributes can be tested automatically and regularly.
It turns out that this work of translating high-level control objectives into SLOs and SQOs is hard, due to the absence of existing guidance in the field. Just like we did for traditional certification through the creation of control frameworks, we now need to create standards for security attributes, metrics, SLOs and SQOs in order to enable the practical deployment of continuous audit-based certification.
!!It’s also a tool for self-assessment
The usefulness of a continuous auditing framework is clearly not limited to third-party certification for customers in sensitive industries. In fact, such a framework could be just as important and useful for organisations wishing to perform a continuous assessment of their cloud assets.
Again this will only reach its true potential if there is a standard set of security attributes, metrics, SLOs and SQOs that the industry adopts as a reference for continuous auditing, giving practitioners a meaningful reference to assess and relate the security of competing cloud services.
With the right platform, we can well imagine a continuous audit-based self-assessment that mirrors what the CSA CAIQ is doing today as a point-in-time assurance tool.
!!Continuous is already there
One major IaaS provider recently joked with us that there is never a day in the year where there is not at least one external auditor setting a foot in their data centres.
In order to do business today, cloud providers are obliged to be compliant with dozens of compliance schemes, both international and regional, or sector specific, such as ISO 27001, AICPA SOC, CSA STAR, PCI DSS, FedRamp, FISMA, HIPAA, or BSI C5 just to name a few. There is a lot of overlap in security requirements between these various assurance schemes. As a result, cloud service providers are under “continuous” scrutiny.
Moreover, as a natural part of information security management, most cloud providers and customers are using security tools that continuously assess the security of their information systems. Cloud security tool vendors have developed a rich set of data points and assessment mechanisms to address industry requirements. In many ways, what we call SQOs, SLOs and metrics, already exist, albeit under different names.
Unfortunately many of these efforts remain invisible to cloud customers, due to the lack of supporting standards and best practices.
!!What Cloud Security Alliance is doing
By creating STAR Continuous, the Cloud Security Alliance aims to build the next generation of certification and self-assessment tools, based on a continuous auditing.
In this process, we established the following goals:
* Capitalise on existing standards, such as ISO/IEC 19086, avoid reinventing the wheel.
* Be technological neutral: continuous auditing tools should be freely selectable by the industry, as long as they can demonstrate that they are trustworthy and fit-for-purpose.
* Strike a balance between transparency and security, while providing continuous assurance to all cloud customers.
* Complement but not replace traditional certification.

In the context of this effort, the Cloud Security Alliance is launching a new initiative dedicated to the definition of security attributes and metrics associated with the control objectives defined within our Cloud Control Matrix (CCM), the CSA Continuous Audit Metrics Working Group.
We are now seeking the help of cloud customers, cloud providers, security tool vendors, auditors and all relevant experts in order to define the very first industry-wide catalogue of security attributes and metrics for continuous auditing.//
[...]
<<<
__Lien :__
* blog original en anglais &rArr; ''[[CloudSecurityAlliance.fr/go/k3kb/|https://CloudSecurityAlliance.fr/go/k3kb/]]''
!"//Circle : la plateforme collaborative de la CSA//"
[>img[iCSA/CircleCSA.png]]Après une phase de test, la plateforme collaborative [[CSA Circle]] est maintenant ouverte à tous.
Si vous vous intéressez au ''Cloud Computing et à la sécurité'', et si vous souhaitez rejoindre une communauté de personnes avec le même centre d'intérêt que vous, ... la plateforme [[Circle|CSA Circle]] est faite pour vous.

Vous y retrouverez :
* les annonces de notre [[Chapitre Français|CSA-FR]]
* les points d'entrée vers tous les [[Groupes de Travail]] de la [[Cloud Security Alliance]]
* la possibilité de recevoir toutes les informations dès leur parution ou sous la forme d'un email quotidien
* une communauté de partage ''Cloud Computing et sécurité''

Cette plateforme [[Circle|CSA Circle]] a aussi pour objectif de centraliser en remplaçant :
* les groupes [[LinkedIN]], utilisés depuis la création de la CSA il y a plus de 10 ans
* la plateforme ''Basecamp'', utilisée par de nombreux groupes de travail pour le partage de document
* les autres plateformes de partage comme ''GoogleDocs'' ou autre
|!Le conseil du jour : ''inscrivez-vous sur [[Circle|CSA Circle]]'' ⇒ ''[[CloudSecurityAlliance.fr/go/Circle/|https://CloudSecurityAlliance.fr/go/Circle/]]''|
[>img[iCSA/CircleCSA.png]]<<tiddler [[CSA Circle]]>>[img(40%,1px)[iCSF/BluePixel.gif]]
Lien vers [[CSA Circle]] ⇒ ''[[CloudSecurityAlliance.fr/go/Circle/|https://CloudSecurityAlliance.fr/go/Circle/]]''
[img(40%,1px)[iCSF/BluePixel.gif]]
!"//Top 5 Latest Cloud Security Hacks and How You Can Avoid Them//"
[>img(250px,auto)[iCSA/K3HWT.png]]Webinar [[CloudBytes]] diffusé le 17 mars 2020 — Présenté par Roger Grimes, Data-Driven Defense Evangelist, société KnowBe4
<<<
//Most people know that cloud security overall is often better than traditional on-premise security. However, that doesn’t mean that cloud products can’t be hacked or misconfigured even if you are using the best security practices. Social engineering is the number one threat to your cloud security that nobody is talking about, and your users are the last line of defense against these hacks!
Join Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, as he breaks down the ways that bad actors can get around even the most up-to-date cloud security defenses and what you can do to keep your cloud safe. He’ll discuss:
* Top 5 hacks the bad guys can use to get around your cloud security defenses
* How to defend your organization against these hacks
* The role that your users play in an effective defense strategy
* How to spot (and stop) these types of attacks before it’s too late
Attend this webinar to learn about various cloud hacks and how they compromise security, and what you can do to help better defend against them!//
<<<
&rArr; S'inscrire au Webinar de 60 minutes [[sur le site de BrightTALK|https://CloudSecurityAlliance.fr/go/k3hw/]].
!"//Registration Now Open for SECtember, Cloud Security Alliance’s Premier Event//"
[>img(300px,auto)[iCSA/202009US-SECtember.png]]Les inscriptions pour la conférence [[SECtember]] de la mi septembre 2020 sont maintenant ouvertes !
Les frais de participation dépendant de la date d'inscription :
* 995$, soit environ 900€, jusqu'au 28 mai 2020
* 1.195$, soit environ 1.080€, jusqu'au 4 septembre 2020
* 1.495$, soit environ 1.350€, ensuite.
<<<
//''Annual conference to provide global perspective on strategic cloud, cybersecurity issues''
SEATTLE - March 16, 2020 - The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications and best practices to help ensure a secure cloud computing environment, announced today that registration has opened for [[SECtember]](Seattle, Sept. 14-18, 2020), the first global event dedicated to the intersection of cloud and cybersecurity.
This premier event will bring together thought leaders from five continents to provide a global perspective on strategic cloud and cybersecurity issues and deliver state-of-the-art educational activities.
Those interested in attending are encouraged to register now and take advantage of early registration pricing ($995) through May 29. Afterward, rates will increase to $1,195 through Sept. 4, at which time late registration pricing ($1,495) will go into effect through Sept. 18.
"[[SECtember]] promises to provide attendees with unparalleled learning opportunities thanks to the event’s proximity to the headquarters of several large enterprise organizations and tech giants. As a result, [[SECtember]] will be able to feature in-depth trainings, networking opportunities and expert-led sessions from some of the brightest minds in the cloud and cybersecurity sector," said Jim Reavis, co-founder and CEO, Cloud Security Alliance.
The event will provide attendees with the chance to upskill their cloud security knowledge through an enhanced roster of training, including:
* Certificate of Cloud Security Knowledge (CCSK) Foundation (1-day course offered on both Sept. 14 and Sept. 15)
* Certificate of Cloud Auditing Knowledge (Sept. 15)
* Certificate of Cloud Security Knowledge - Plus - Azure (Sept. 14-15)
* Certificate of Cloud Security Knowledge - Plus - AWS (Sept. 14-15)
* Advanced Cloud Security Practitioner (Sept. 14-15)
[[SECtember]] will also feature numerous opportunities to access to Seattle’s leading technology and cybersecurity companies. Organizations and governments seeking to send delegations to maximize the benefits of this unique conference will also benefit from various executive briefings that will be held over the course of the five-day event.//
[...]
<<<
__Lien :__
⇒ ''[[CloudSecurityAlliance.fr/go/k3gc/|https://CloudSecurityAlliance.fr/go/k3gc/]]
!1 - Les nouveautés CSA de la semaine du 9 au 15 mars 2020
* Remise sur les cours en ligne de la CSA jusqu'au 30 avril+++*[»]> <<tiddler [[2020.03.09 - Remise sur les cours en ligne de la CSA]]>>===  [>img[iCSF/cloud-security-alliance-fr.png]]
* Sondage sur la technologie CASB d'ici au 30 mars+++*[»]> <<tiddler [[2020.03.09 - Sondage sur la technologie CASB]]>>=== 
* Sondage sur la sensibilisation à la cryptographie quantique d'ici au 30 mars+++*[»]> <<tiddler [[2020.03.09 - Sondage sur la sensibilisation à la cryptographie quantique]]>>=== 
* Publication : Gestion des risques pour les équipements médicaux connectés+++*[»]> <<tiddler [[2020.03.12 - Publication : Gestion des risques pour les équipements médicaux connectés]]>>=== 
* Webinar CloudBytes 'Top 5 Latest Cloud Security Hacks' le 17 mars+++*[»]> <<tiddler [[2020.03.17 - Webinar : 'Top 5 Latest Cloud Security Hacks and How You Can Avoid Them']]>>=== 
* Ouverture des inscriptions pour la conférence SECtember de septembre 2020+++*[»]> <<tiddler [[2020.03.16 - Ouverture des inscriptions pour la conférence SECtember]]>>=== 
!2 - Veille Web
La [[Veille Web|2020.03.15 - Veille Hebdomadaire - 15 mars]] avec plus d'une soixantaine de liens dont :
* Références : mise à jour de recommandations de l'ACSC+++*[»]>
|2020.03.09|cyber.gov.au|[[Cloud Computing Security for Cloud Service Providers|https://www.cyber.gov.au/publications/cloud-computing-security-for-cloud-service-providers]] ([[PDF|https://www.cyber.gov.au/sites/default/files/2020-03/PROTECT%20-%20Cloud%20Computing%20Security%20for%20Cloud%20Service%20Providers%20%28March%202020%29.pdf]])|Guidelines|
|2020.03.09|cyber.gov.au|[[Cloud Computing Security for Tenants|https://www.cyber.gov.au/publications/cloud-computing-security-for-tenants]] ([[PDF|https://www.cyber.gov.au/sites/default/files/2020-03/PROTECT%20-%20Cloud%20Computing%20Security%20for%20Tenants%20%28March%202020%29.pdf]])|Guidelines|
=== 
* Etudes et rapports : A10 Networks+++*[»]>
|2020.03.13|//A10 Networks//|[[The State of DDoS Weapons|https://www.a10networks.com/marketing-comms/reports/state-ddos-weapons/]]|DDoS|
|2020.03.13|Dark Reading| → [[DDoS Attack Trends Reveal Stronger Shift to IoT, Mobile|https://www.darkreading.com/iot/ddos-attack-trends-reveal-stronger-shift-to-iot-mobile/d/d-id/1337318]]|Report|
===, Axonius+++*[»]>
|2020.03.10|//Axonius//|[[Combatting Complexity by Focusing on Fundamentals: New Study from Axonius and ESG Uncovers IT Megatrends Driving Decreased Asset Visibility, Increased Risk|http://www.prweb.com/releases/combatting_complexity_by_focusing_on_fundamentals_new_study_from_axonius_and_esg_uncovers_it_megatrends_driving_decreased_asset_visibility_increased_risk/prweb16968933.htm]] ([[téléchargement|https://info.axonius.com/2020-asset-management-trends-esg-ebook]])|Report Axonius|
|2020.03.10|Solutions Review| → [[Axonius: 69 Percent of Enterprises Have a Cloud Visibility Gap|https://solutionsreview.com/cloud-platforms/axonius-69-percent-of-enterprises-have-a-cloud-visibility-gap/]]|Report Axonius|
|2020.03.10|BetaNews| → [[IT teams struggle with asset visibility and management|https://betanews.com/2020/03/10/it-asset-management-struggle/]]|Report Axonius|
|2020.03.13|Help Net Security| → [[Cloud + BYOD + IoT = major security gaps|https://www.helpnetsecurity.com/2020/03/13/major-security-gaps/]]|Report Axonius|
===, Volterra+++*[»]>
|2020.03.09|//Volterra//|[[Infrastructure and Security Challenges Threaten Multi-Cloud and Edge Deployments, New Survey from Volterra Shows|https://www.volterra.io/company/news/infrastructure-security-challenges-threaten-multi-cloud-edge-deployments/]]|Report Volterra|
|2020.03.09|VMblog| → [[Infrastructure and Security Challenges Threaten Multi-Cloud and Edge Deployments, New Survey from Volterra Shows|https://vmblog.com/archive/2020/03/09/infrastructure-and-security-challenges-threaten-multi-cloud-and-edge-deployments-new-survey-from-volterra-shows.aspx]]|Report Volterra|
|2020.03.11|Help Net Security| → [[Multi-cloud and edge deployments threatened by security and connectivity problems|https://www.helpnetsecurity.com/2020/03/11/multi-cloud-deployments/]]|Report Volterra|
=== 
* Fuite de données : Open Exchange Rates+++*[»]>
|2020.03.12|//Open Exchange Rates//|[[Notice of Data Breach|https://pastebin.com/raw/AzDPAN9N]]  ([[email|https://twitter.com/SylvieLorxu/status/1238149687200358401]])|Data_Breach AWS Third_Party|
|2020.03.13|Security Week| → [[Currency Data Provider 'Open Exchange Rates' Discloses Breach|https://www.securityweek.com/currency-data-provider-open-exchange-rates-discloses-breach]]|Data_Breach AWS Third_Party|
=== 
* Divers : Backup dans le Cloud, Bottlerocket nouveau système d'exploitation AWS en open source+++*[»]>
|2020.03.10|//AWS//|[[Bottlerocket - Open Source OS for Container Hosting|https://aws.amazon.com/blogs/aws/bottlerocket-open-source-os-for-container-hosting/]]|AWS Operating_System|
|2020.03.11|CBR Online| → [[AWS's New Open Source OS “Bottlerocket”: A Baby RHEL Competitor?|https://www.cbronline.com/news/aws-operating-system-bottlerocket]]|AWS Operating_System|
|2020.03.12|//Cloud Management Insider//| → [[AWS launches Open Source OS for Containers|https://www.cloudmanagementinsider.com/aws-launches-bottlerocket/]]|AWS Operating_System|
===, et toujours des articles sur l'analyse des risques dans le Cloud, la sécurité des containers, de Kubernetes, et le Zero-Trust
!3 - Weekly Cloud and Security Watch Newsletter[>img[iCSF/inEnglish.png]]
<<tiddler [[2020.03.15 - Weekly Newsletter - March 15th]]>>
!CSA updates and news - March 9th to 15th
* Price Reduction for Online CSA Educational Programs until April 30^^th^^+++*[»]> <<tiddler [[2020.03.09 - Remise sur les cours en ligne de la CSA]]>>===  [>img[iCSF/cloud-security-alliance-fr.png]]
* 'Expectations and Evolution of CASBs' CSA survey opens until March 30^^th^^+++*[»]> <<tiddler [[2020.03.09 - Sondage sur la technologie CASB]]>>=== 
* 'Quantum-Safe Solutions' CSA survey opens until March 30^^th^^+++*[»]> <<tiddler [[2020.03.09 - Sondage sur la sensibilisation à la cryptographie quantique]]>>=== 
* 'Managing the Risk for Medical Devices Connected to the Cloud" CSA publication+++*[»]> <<tiddler [[2020.03.12 - Publication : Gestion des risques pour les équipements médicaux connectés]]>>=== 
* The 'Top 5 Latest Cloud Security Hacks' CloudBytes webinar will teka place on March 17^^th^^+++*[»]> <<tiddler [[2020.03.17 - Webinar : 'Top 5 Latest Cloud Security Hacks and How You Can Avoid Them']]>>=== 
* Registration Now Open for SECtember 2020+++*[»]> <<tiddler [[2020.03.16 - Ouverture des inscriptions pour la conférence SECtember]] === 
!Cloud and Security News Watch
[[Over 60 links|2020.03.15 - Veille Hebdomadaire - 15 mars]] among which:
* References: updates of some ACSC guidelines+++*[»]>
|2020.03.09|cyber.gov.au|[[Cloud Computing Security for Cloud Service Providers|https://www.cyber.gov.au/publications/cloud-computing-security-for-cloud-service-providers]] ([[PDF|https://www.cyber.gov.au/sites/default/files/2020-03/PROTECT%20-%20Cloud%20Computing%20Security%20for%20Cloud%20Service%20Providers%20%28March%202020%29.pdf]])|Guidelines|
|2020.03.09|cyber.gov.au|[[Cloud Computing Security for Tenants|https://www.cyber.gov.au/publications/cloud-computing-security-for-tenants]] ([[PDF|https://www.cyber.gov.au/sites/default/files/2020-03/PROTECT%20-%20Cloud%20Computing%20Security%20for%20Tenants%20%28March%202020%29.pdf]])|Guidelines|
=== 
* Surveys and reports: A10 Networks+++*[»]>
|2020.03.13|//A10 Networks//|[[The State of DDoS Weapons|https://www.a10networks.com/marketing-comms/reports/state-ddos-weapons/]]|DDoS|
|2020.03.13|Dark Reading| → [[DDoS Attack Trends Reveal Stronger Shift to IoT, Mobile|https://www.darkreading.com/iot/ddos-attack-trends-reveal-stronger-shift-to-iot-mobile/d/d-id/1337318]]|Report|
===, Axonius+++*[»]>
|2020.03.10|//Axonius//|[[Combatting Complexity by Focusing on Fundamentals: New Study from Axonius and ESG Uncovers IT Megatrends Driving Decreased Asset Visibility, Increased Risk|http://www.prweb.com/releases/combatting_complexity_by_focusing_on_fundamentals_new_study_from_axonius_and_esg_uncovers_it_megatrends_driving_decreased_asset_visibility_increased_risk/prweb16968933.htm]] ([[téléchargement|https://info.axonius.com/2020-asset-management-trends-esg-ebook]])|Report Axonius|
|2020.03.10|Solutions Review| → [[Axonius: 69 Percent of Enterprises Have a Cloud Visibility Gap|https://solutionsreview.com/cloud-platforms/axonius-69-percent-of-enterprises-have-a-cloud-visibility-gap/]]|Report Axonius|
|2020.03.10|BetaNews| → [[IT teams struggle with asset visibility and management|https://betanews.com/2020/03/10/it-asset-management-struggle/]]|Report Axonius|
|2020.03.13|Help Net Security| → [[Cloud + BYOD + IoT = major security gaps|https://www.helpnetsecurity.com/2020/03/13/major-security-gaps/]]|Report Axonius|
===, Volterra+++*[»]>
|2020.03.09|//Volterra//|[[Infrastructure and Security Challenges Threaten Multi-Cloud and Edge Deployments, New Survey from Volterra Shows|https://www.volterra.io/company/news/infrastructure-security-challenges-threaten-multi-cloud-edge-deployments/]]|Report Volterra|
|2020.03.09|VMblog| → [[Infrastructure and Security Challenges Threaten Multi-Cloud and Edge Deployments, New Survey from Volterra Shows|https://vmblog.com/archive/2020/03/09/infrastructure-and-security-challenges-threaten-multi-cloud-and-edge-deployments-new-survey-from-volterra-shows.aspx]]|Report Volterra|
|2020.03.11|Help Net Security| → [[Multi-cloud and edge deployments threatened by security and connectivity problems|https://www.helpnetsecurity.com/2020/03/11/multi-cloud-deployments/]]|Report Volterra|
=== 
* Data leaks: Open Exchange Rates+++*[»]>
|2020.03.12|//Open Exchange Rates//|[[Notice of Data Breach|https://pastebin.com/raw/AzDPAN9N]]  ([[email|https://twitter.com/SylvieLorxu/status/1238149687200358401]])|Data_Breach AWS Third_Party|
|2020.03.13|Security Week| → [[Currency Data Provider 'Open Exchange Rates' Discloses Breach|https://www.securityweek.com/currency-data-provider-open-exchange-rates-discloses-breach]]|Data_Breach AWS Third_Party|
=== 
* Miscellaneous : Backups in the Cloud, Bottlerocket new AWS open source operating systems+++*[»]>
|2020.03.10|//AWS//|[[Bottlerocket - Open Source OS for Container Hosting|https://aws.amazon.com/blogs/aws/bottlerocket-open-source-os-for-container-hosting/]]|AWS Operating_System|
|2020.03.11|CBR Online| → [[AWS's New Open Source OS “Bottlerocket”: A Baby RHEL Competitor?|https://www.cbronline.com/news/aws-operating-system-bottlerocket]]|AWS Operating_System|
|2020.03.12|//Cloud Management Insider//| → [[AWS launches Open Source OS for Containers|https://www.cloudmanagementinsider.com/aws-launches-bottlerocket/]]|AWS Operating_System|
===, some other articles on risk analysis, containers security, Kubernetes, and  Zero-Trust
|ssTabl99|k
|!⇒ [[CloudSecurityAlliance.fr/go/K3F/|https://CloudSecurityAlliance.fr/go/K3F/]] |
|!Mars|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2020.03.15|
|2020.03.15|MSSP Alert|[[Zero Trust Security Explained|https://www.msspalert.com/cybersecurity-research/zero-trust-security-explained/]]|Zero_Trust|
|>|>|>|!2020.03.14|
|2020.03.14|Bleeping Computer|[[BlackWater Malware Abuses Cloudflare Workers for C2 Communication|https://www.bleepingcomputer.com/news/security/blackwater-malware-abuses-cloudflare-workers-for-c2-communication/]]|Malware COVID-19|
|2020.03.17|SC Magazine| → [[COVID-19 decoy doc, Cloudflare service used to spread 'BlackWater' malware|https://www.scmagazine.com/home/security-news/malware/covid-19-decoy-doc-cloudflare-service-used-to-spread-blackwater-malware/]]|Malware COVID-19|
|2020.03.14|Medium|[[HTTP Desync Attacks with Python and AWS|https://medium.com/@emilefugulin/http-desync-attacks-with-python-and-aws-1ba07d2c860f]]|AWS Attacks|
|2020.03.14|//Rancher//|[[Enhancing Kubernetes Security with Pod Security Policies, Part 1|https://rancher.com/blog/2020/pod-security-policies-part-1]] (1/2)|Kubernetes|
|2020.03.14|//Varonis//|[[13 Must-Know Office 365 PowerShell Commands|https://www.varonis.com/blog/office-365-powershell-commands/]]|O365 PowerShell|
|>|>|>|!2020.03.13|
|2020.03.13|DZone|[[A Sneak Peek Into Amazon Web Services Cloud (AWS)|https://dzone.com/articles/a-sneak-peek-into-amazon-web-services-cloud-aws]]|AWS|
|2020.03.13|DevOps|[[Catch Emerging Security Risks Earlier by Leveraging Kubernetes Audit Logs|https://devops.com/catch-emerging-security-risks-earlier-by-leveraging-kubernetes-audit-logs/]]|Kubernetes Logs|
|2020.03.13|Information Security Newspaper|[[List of 8 million people, their address, and phones, who bought something from eBay or Amazon|https://www.securitynewspaper.com/2020/03/13/list-of-8-million-people-their-address-and-phones-who-bought-something-from-ebay-and-amazon/]]|Data_Leak|
|2020.03.13|//A10 Networks//|[[The State of DDoS Weapons|https://www.a10networks.com/marketing-comms/reports/state-ddos-weapons/]]|DDoS|
|2020.03.13|Dark Reading| → [[DDoS Attack Trends Reveal Stronger Shift to IoT, Mobile|https://www.darkreading.com/iot/ddos-attack-trends-reveal-stronger-shift-to-iot-mobile/d/d-id/1337318]]|Report|
|2020.03.13|Security Brief NZ|[[Cyber threats, rising costs, cloud integration - Dell reveals data trends|https://securitybrief.co.nz/story/cyber-threats-rising-costs-cloud-integration-dell-reveals-data-trends]]|Report Dell|
|2020.03.13|//Nuageo//[>img[iCSF/flag_fr.png]]|[[Calculer les gains du Cloud|https://www.nuageo.fr/2020/03/livre-blanc/]]|Misc|
|2020.03.13|//Aqua Security//|[[3 new rules of cloud-native application security|https://techbeacon.com/security/3-new-rules-cloud-native-application-security]]|Cloud_Native|
|2020.03.13|//PaloAlto Networks//|[[The Art of Automation: Creating Threat Intelligence Bots in the Cloud|https://blog.paloaltonetworks.com/2020/03/cloud-threat-intelligence-bot/]]|Threat_Intelligence|
|2020.03.13|//Park my Cloud//|[[AWS EBS Volume Types & What to Use Them For|https://www.parkmycloud.com/blog/ebs-volume-types/]]|AWS Storage|
|>|>|>|!2020.03.12|
|2020.03.12|Dark Reading|[[CASB 101: Why a Cloud Access Security Broker Matters|https://www.darkreading.com/theedge/casb-101-why-a-cloud-access-security-broker-matters/b/d-id/1337302]]|CASB|
|2020.03.12|The Daily Swigg|[[Google awards $100k to Dutch bug hunter for cutting-edge cloud security research|https://portswigger.net/daily-swig/google-awards-100k-to-dutch-bug-hunter-for-cutting-edge-cloud-security-research]]|GCP Bug_Bounty|
|2020.03.12|Information Security Newspaper| → [[Google pays $100k USD to an infosec researcher for reporting vulnerability in GCP|https://www.securitynewspaper.com/2020/03/12/google-pays-100k-usd-to-an-infosec-researcher-for-reporting-vulnerability-in-gcp/]]|GCP Bug_Bounty|
|2020.03.12|//ThreatPost//| → [[$100K Paid Out for Google Cloud Shell Root Compromise|https://threatpost.com/100k-google-cloud-shell-root-compromise/153665/]]|GCP Bug_Bounty|
|2020.03.12|DZone|[[Five Security Best Practices for Kubernetes Deployments|https://dzone.com/articles/five-security-best-practices-for-kubernetes-deploy]]|Kubernetes|
|2020.03.12|DZone|[[Docker Without Root Privileges|https://dzone.com/articles/docker-without-root-privileges]]|Docker|
|2020.03.12|jdSupra|[[HIPAA Compliant Cloud Storage|https://www.jdsupra.com/legalnews/hipaa-compliant-cloud-storage-10059/]]|HIPPA|
|2020.03.12|DZone|[[Engineers Own Cloud Security and They Need Better Tools|https://dzone.com/articles/engineers-own-cloud-security-and-they-need-better]]|Misc|
|2020.03.12|//SANS//|[[Frequently Asked Questions - MGT516: Managing Security Vulnerabilities: Enterprise and Cloud|https://www.sans.org/blog/faqs-mgt516-managing-security-vulnerabilities-enterprise-and-cloud/]] ([[cursus MGT516|https://www.sans.org/course/managing-enterprise-cloud-security-vulnerabilities]])|Training|
|2020.03.12|//Microsoft Azure//|[[Use DMARC to validate email in Office 365|https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/use-dmarc-to-validate-email?view=o365-worldwide]]|O365 DMARC|
|2020.03.12|Bleeping Computer| →  [[Office 365 ATP To Block Email Domains That Fail Authentication|https://www.bleepingcomputer.com/news/security/office-365-atp-to-block-email-domains-that-fail-authentication/]]|O365 DMARC|
|2020.03.12|//Open Exchange Rates//|[[Notice of Data Breach|https://pastebin.com/raw/AzDPAN9N]]  ([[email|https://twitter.com/SylvieLorxu/status/1238149687200358401]])|Data_Breach AWS Third_Party|
|2020.03.13|Security Week| → [[Currency Data Provider 'Open Exchange Rates' Discloses Breach|https://www.securityweek.com/currency-data-provider-open-exchange-rates-discloses-breach]]|Data_Breach AWS Third_Party|
|2020.03.12|//CyberArk Conjur//|[[Enhance your product’s supportability with a logs-first approach|https://www.conjur.org/blog/enhance-your-products-supportability-with-a-logs-first-approach/]]|Logs|
|2020.03.12|//Forcepoint//|[[The Top Critical Features for Cloud Security Controls|https://www.forcepoint.com/blog/insights/forrester-andras-cser-policy-setting-controls-cloud-security]]|Controls|
|2020.03.12|//Alibaba Cloud//|[[Setting up HTTP to HTTPS Redirection with Alibaba Cloud Container Service|https://medium.com/@Alibaba_Cloud/setting-up-http-to-https-redirection-with-alibaba-cloud-container-service-6ed92137bc70]]|Alibaba_Cloud|
|2020.03.12|//Netwrix//|[[The Cloud Security Risk of Remote Workers, and How to Stop It|https://blog.netwrix.com/2020/03/12/the-cloud-security-risk-of-remote-workers-and-how-to-stop-it/]]|Remote_Security|
|2020.03.12|//MalwareBytes//|[[RemoteSec: achieving on-prem security levels with cloud-based remote teams|https://blog.malwarebytes.com/business-2/2020/03/remotesec-achieving-on-prem-security-levels-with-cloud-based-remote-teams/]]|Remote_Security|
|>|>|>|!2020.03.11|
|2020.03.11|UnderNews[>img[iCSF/flag_fr.png]]|[[Slack : comment garantir la sécurité les données ?|https://www.undernews.fr/reseau-securite/slack-comment-garantir-la-securite-les-donnees.html]]|Slack|
|2020.03.11|Container Journal|[[Unpacking Containers to Find Network Vulnerabilities|https://containerjournal.com/topics/container-security/unpacking-containers-to-find-network-vulnerabilities/]]|Containers Vulnerabilities|
|2020.03.11|DZone|[[Go Cloud, but Don't Forget to Backup Your Physical Servers and Data|https://dzone.com/articles/go-cloud-but-dont-forget-to-backup-your-physical-s]]|Backups Tools|
|2020.03.11|Analytics India Mag|[[What Makes Cloud Security Challenging For Cybersecurity Teams?|https://analyticsindiamag.com/what-makes-cloud-security-challenging-for-cybersecurity-teams/]]|Misc|
|2020.03.11|DevOps.com|[[The DevOps Sweet Spot: Inserting Security at Pull Requests (Part 1)|https://devops.com/the-devops-sweet-spot-inserting-security-at-pull-requests-part-1/]] (1/2)|DevSecOps|
|2020.03.11|//Atempo, OVHcloud//|[[Atempo and OVHcloud sign a strategic partnership for a sovereign cloud solution|https://vmblog.com/archive/2020/03/11/atempo-and-ovhcloud-sign-a-strategic-partnership-for-a-sovereign-cloud-solution.aspx]]|Backups|
|2020.03.13|Silicon.fr[>img[iCSF/flag_fr.png]]| → [[Cloud souverain : Atempo et OVHcloud unis pour la sauvegarde en mode SaaS|https://www.silicon.fr/cloud-souverain-atempo-ovhcloud-335952.html]]|Backups|
|2020.03.11|//Coalfire//|[[Third Party Risk Management and the Cloud|https://www.coalfire.com/The-Coalfire-Blog/March-2020/Third-Party-Risk-Management-and-the-Cloud]]|Risk_Management|
|2020.03.11|//SpecterOps//|[[Through the Looking Glass - Part 1|https://posts.specterops.io/through-the-looking-glass-part-1-f539ae308512]] (1/2)|AWS Traffic_Mirroring|
|2020.03.11|//Spanning//|[[Risk Mitigation: How SaaS Backup Addresses Operational Risk|https://spanning.com/blog/risk-mitigation-how-saas-backup-addresses-operational-risk/]]|SaaS Backups|
|2020.03.11|//DivvyCloud//|[[Full Life Cycle Cloud Security|https://divvycloud.com/full-life-cycle-cloud-security/]]|Misc|
|2020.03.11|//Compare the Cloud//|[[Ensuring Security In An Era Of AI And Cloud Platforms|https://www.comparethecloud.net/articles/ensuring-security-in-an-era-of-ai-and-cloud-platforms/]]|Misc|
|2020.03.11|//Sensu//|[[Monitoring multi-cloud environments|https://blog.sensu.io/monitoring-multi-cloud-environments]]|Monitoring|
|2020.03.11|//OxygenForensics//|[[10 Quick Facts About Oxygen Forensic Cloud Extractor|https://www.forensicfocus.com/News/article/sid=3880/]]|Forensics|
|2020.03.11|//FireOak Strategy//|[[Increase performance and reduce system load by automatically excluding Office 365 traffic from your organization’s split tunnel VPN|https://fireoakstrategies.com/split-tunnel-vpn/]]|O365 VPN|
|>|>|>|!2020.03.10|
|2020.03.10|//AWS//|[[Bottlerocket - Open Source OS for Container Hosting|https://aws.amazon.com/blogs/aws/bottlerocket-open-source-os-for-container-hosting/]]|AWS Operating_System|
|2020.03.11|CBR Online| → [[AWS's New Open Source OS “Bottlerocket”: A Baby RHEL Competitor?|https://www.cbronline.com/news/aws-operating-system-bottlerocket]]|AWS Operating_System|
|2020.03.12|//Cloud Management Insider//| → [[AWS launches Open Source OS for Containers|https://www.cloudmanagementinsider.com/aws-launches-bottlerocket/]]|AWS Operating_System|
|2020.03.10|//Axonius//|[[Combatting Complexity by Focusing on Fundamentals: New Study from Axonius and ESG Uncovers IT Megatrends Driving Decreased Asset Visibility, Increased Risk|http://www.prweb.com/releases/combatting_complexity_by_focusing_on_fundamentals_new_study_from_axonius_and_esg_uncovers_it_megatrends_driving_decreased_asset_visibility_increased_risk/prweb16968933.htm]] ([[téléchargement|https://info.axonius.com/2020-asset-management-trends-esg-ebook]])|Report Axonius|
|2020.03.10|Solutions Review| → [[Axonius: 69 Percent of Enterprises Have a Cloud Visibility Gap|https://solutionsreview.com/cloud-platforms/axonius-69-percent-of-enterprises-have-a-cloud-visibility-gap/]]|Report Axonius|
|2020.03.10|BetaNews| → [[IT teams struggle with asset visibility and management|https://betanews.com/2020/03/10/it-asset-management-struggle/]]|Report Axonius|
|2020.03.13|Help Net Security| → [[Cloud + BYOD + IoT = major security gaps|https://www.helpnetsecurity.com/2020/03/13/major-security-gaps/]]|Report Axonius|
|2020.03.12|jdSupra|[[Source Code Escrow Agreements Are Reaching For The Cloud|https://www.jdsupra.com/legalnews/source-code-escrow-agreements-are-73777/]]|Escrow Code|
|2020.03.10|//Forecepoint//|[[SASE Will Redefine Network and Cloud Security: So What Does it Mean?|https://www.forcepoint.com/forcepoint-gartner-sase-converging-network-cloud-security]]|SASE|
|2020.03.10|//JumpCloud//|[[Using IDaaS To Improve Security|https://jumpcloud.com/blog/idaas-improve-security/]]|IDaaS|
|2020.03.10|//Threatstack//|[[15 Cloud & Cloud Security Certifications for 2020|https://www.threatstack.com/blog/15-cloud-cloud-security-certifications-for-2020]]|Training Certification|
|>|>|>|!2020.03.09|
|2020.03.09|Dark Reading|[[Cyber Resiliency, Cloud & the Evolving Role of the Firewall|https://www.darkreading.com/cloud/cyber-resiliency-cloud-and-the-evolving-role-of-the-firewall/a/d-id/1337206]]|Resilience|
|2020.03.09|cyber.gov.au|[[Cloud Computing Security for Cloud Service Providers|https://www.cyber.gov.au/publications/cloud-computing-security-for-cloud-service-providers]] ([[PDF|https://www.cyber.gov.au/sites/default/files/2020-03/PROTECT%20-%20Cloud%20Computing%20Security%20for%20Cloud%20Service%20Providers%20%28March%202020%29.pdf]])|Guidelines|
|2020.03.09|cyber.gov.au|[[Cloud Computing Security for Tenants|https://www.cyber.gov.au/publications/cloud-computing-security-for-tenants]] ([[PDF|https://www.cyber.gov.au/sites/default/files/2020-03/PROTECT%20-%20Cloud%20Computing%20Security%20for%20Tenants%20%28March%202020%29.pdf]])|Guidelines|
|2020.03.09|//Volterra//|[[Infrastructure and Security Challenges Threaten Multi-Cloud and Edge Deployments, New Survey from Volterra Shows|https://www.volterra.io/company/news/infrastructure-security-challenges-threaten-multi-cloud-edge-deployments/]]|Report Volterra|
|2020.03.09|VMblog| → [[Infrastructure and Security Challenges Threaten Multi-Cloud and Edge Deployments, New Survey from Volterra Shows|https://vmblog.com/archive/2020/03/09/infrastructure-and-security-challenges-threaten-multi-cloud-and-edge-deployments-new-survey-from-volterra-shows.aspx]]|Report Volterra|
|2020.03.11|Help Net Security| → [[Multi-cloud and edge deployments threatened by security and connectivity problems|https://www.helpnetsecurity.com/2020/03/11/multi-cloud-deployments/]]|Report Volterra|
|2020.03.09|//Panorays//|[[Service Announcement: The Right Questions to Ask Your Vendors in Times of Large-Scale Remote Working|https://www.panorays.com/blog/service-announcement-the-right-questions-to-ask-your-vendors-in-times-of-large-scale-remote-working/]]|Third_Party Vendor_Assessment|
|2020.03.09|//Microsoft//|[[Top 5 ways your Azure AD can help you enable remote work|https://techcommunity.microsoft.com/t5/azure-active-directory-identity/top-5-ways-your-azure-ad-can-help-you-enable-remote-work/ba-p/1144691]]|AzureAD|
!Managing the Risk for Medical Devices Connected to the Cloud
[>img(150px,auto)[iCSA/K3CPM.jpg]]Même si l'annonce a été faite, le site de la CSA ne permet d'accéder qu'au draft du document.
<<<
//Avec l'augmentation du nombre de dispositifs IoT, les prestataires de santé sont confrontés à la transformation numérique la plus importante qu'ils aient jamais connue.
La nouvelle génération d'appareils médicaux connectés est porteuse de la promesse de meilleurs soins pour les patients, de meilleures données cliniques, d'une plus grande efficacité et d'une diminution des coûts.
Cependant, elle présente également des risques accrus en matière de sécurité.
L'objectif de ce document est de présenter le concept de gestion des dispositifs médicaux en fonction de leur proximité avec le patient et d'introduire des pratiques visant à sécuriser l'utilisation du cloud pour les dispositifs médicaux.//
<<<
__Table des Matières :__//
<<<
* Medical Device Security Life Cycle
** Pre-Purchase
** Post Purchase/Pre-Deployment
*** Network
*** Web Application Interface
*** Wireless Communications
*** Secure Communication Channels
** Deployment/Operations Management
*** Devices with Zero Degrees of Separation
*** Devices with One Degree of Separation
*** Devices with Two Degrees of Separation
*** Devices with Three Degrees of Separation
*** Devices with Four Degrees of Separation
** Decommission/Disposal
* Recommendations and Conclusion
** Recommendations
** Conclusion/Need for further Studies
* References
<<<
//__Liens :__
* Annonce 'Newest Cloud Security Alliance Paper Sheds Light on Best Practices for Managing Risks Associated with Cloud-Connected Medical Devices' ⇒ ''[[CloudSecurityAlliance.fr/go/k3cp/|https://CloudSecurityAlliance.fr/go/k3cp/]]''
* Document ⇒ ''[[CloudSecurityAlliance.fr/go/k3cw/|https://CloudSecurityAlliance.fr/go/k3cw/]]''
[img(50%,1px)[iCSF/BluePixel.gif]]
!"//Expectations and Evolution of CASBs//"
Un sondage est lancé par la CSA sur le sujet de la technologie CASB.
Son objectif est de mieux cerner le niveau d'attente des utilisateurs et leurs évolutions.
Le sondage est ouvert jusqu'au ''30 mars 2020'' et est hébergé sur la plateforme SurveyMonkey.
Afin de vous y préparer, les 28 questions posées sont disponibles +++*[ici]> 
!!Intro
1. What inhibitors has your organization encountered in adopting or fully utilizing your cloud security vendor's technology? (Check all that apply)
* Inadequate staffing or staff expertise / Company culture / Solution complexity / Inadequate budget / Complexity in setting up / Solution usability / Lack of complete feature set / Poor support / None / Other (please specify)
2. What are your top 3 security projects to implement or improve by type? (Select up to 3)
* Network security / Cloud security / Endpoint security / Email security / Application security / Security awareness training / Insider threat management / Compliance / Other (please specify)
3. Where is your organization in the CASB procurement lifecycle?
* Initial research / Evaluating vendors / POC/pilot / Implementation / Operational / Not considering
!!Visibility
4. To your knowledge, where do your users keep sensitive data in the cloud? (Check all that apply)
* Microsoft Sharepoint Online/OneDrive / Google Drive / Box / SalesForce / Workday / AWS / Azure / ServiceNow / Unsure / N/A - no sensitive, organizational data in the cloud / Other (please specify)
5. Rate the importance of visibility features in CASB services.
* None / Low / importance / Medium importance / High importance
* Locate and track all cloud services accessed
* Discover sensitive data
* Assess cloud service compliance gaps
* Identify cloud usage by user or device
* Detect data traffic and usage of cloud services
* Detect user behavior activity
* Detect cloud-to-cloud activity (e.g. OAuth)
* Other (please specify)
6. Do you use CASB services for identifying any of the following? (Check all that apply)
* Data classification / Data sensitivity levels (e.g. contextual) / Data location / User profiles (e.g. privilege) / Device categorization / User behavior activity / Unauthorized access (e.g. location, network, threat) / Configuration errors in IaaS and PaaS / Compliance gaps / Other (please specify)
7. Rate how effective your CASB is with multi-cloud visibility across IaaS and PaaS usage.
* Unsure / Low / Medium / High
8. What visibility features are missing from CASB services?
* Details...
!!Compliance
9. Are you using a CASB effectively as your internal compliance tool?
* Yes / No / Unsure
10. Does your CASB effectively assist your organization in compliance with regulations and standards?
* Yes / No / Unsure
11. Does your CASB effectively assist with data residency requirements?
* Yes / No / Unsure
12. Which standards and regulations does your organization adhere to? (Check all that apply)
* GDPR / CCPA / HIPAA / PCI-DSS / FISMA/FedRAMP/DoD_8500.x / ISO / CSA CCM/STAR / NIST / None / Other (please specify)
13. Rate the level of importance for potential compliance features in a CASB.
* Unsure / Low / Medium / High
* Blocking of applications and services
* Automation of policy enforcement
* Bringing unapproved applications to compliance with regulation
* Recommend compensating controls
* Reporting compliance adherence
!!Data Security
14. What level of file sharing in the cloud is allowed by your organization?
* Public / External / Internal with all company domain / Internal with individual members / Private only
15. Rate how effective your CASB is at the following...
* Unsure / Low / Medium / High
* Prevent data exfiltration for approved apps
* Prevent data exfiltration for unapproved apps
* Prevent upload of sensitive data
* Prevent download of sensitive data
* Detect anomalies in user behaviors
* Protecting cloud users from account takeover
16. Rate how effective your CASB is at the following… (Unsure, Low, Medium, High)
* Unsure / Low / Medium / High
* Control user access from certain locations (countries, outside of corporate network, etc.)
* Control user access from unmanaged devices
* Discover/monitor sensitive data in the cloud (DLP)
* Govern cloud applications (Shadow IT visibility, OAuth apps control)
* Report on compliance gaps/violations
* Discover, assess and solve IaaS/PaaS misconfigurations (Cloud Security Posture Management)
17. Which of the below would most enhance your DLP program?
* Context-based controls (device, browser, network, location, etc.) / User role-based controls (privilege, VIP, etc.) / User behavior monitoring / Risk-based controls (threat intel, users targeted by cyberattacks, etc.) / Risk-aware incident response (prioritized to incidents based on access conditions and threat intelligence) / Fewer solutions to manage / Superior compliance management / Superior incident management workflows / ITSM and SIEM integrations / Other (please specify)
!!Threat Protection
18. What cybersecurity mechanism do you use to control user access?
* Secure Web Gateway / Next-gen firewall / Traditional VPN appliance / Cloud based VPN / Zero Trust/Always On VPN / CASB (API-based only) / CASB (API-based and Reverse Proxy) / CASB (API-based and Forward Proxy) / Other (please specify)
19. What type of security mechanism do you use to prevent malicious or non-compliant access?
* Network based access control / Multi Factor Authentication for VPN only / Multi Factor Authentication for VPN and cloud applications / Adaptive access controls (Conditional access, risk-based authentication, etc.) / MDM/Device posture and hygiene compliance / Zero Trust Network Access / Other (please specify)
20. Which identity and access management providers (IDaaS) do you deploy or plan to deploy? (Check all that apply)
* OneLogin / Okta / Microsoft Azure AD / Microsoft ADFS / Ping Identity / IDaptive / SecureAuth / ForgeRock / Auth0 / Other (please specify)
21. What multi-factor controls does your organization use?
* Standalone cloud delivered multi factor authentication provider / Standalone on-premise multi factor authentication provider / MFA included with Identity Provider / Risk-based authentication (2fa based on condition) / N/A
22. Rate how effective your CASB is at threat protection on each of the following.
* Unsure / Low / Medium / High
* Detecting cloud account takeover
* Detecting data breach
* Ingesting threat intelligence feeds
* Identifying malware
* Identifying and monitoring misconfigurations
23. Rate your CASB as an effective mechanism on the following abilities. - Unsure, Low, Medium, High
* Unsure / Low / Medium / High
* Detection
* Correlation
* Remediation
* Response
!!Demographics
24. What is the size of your organization?
* 1-50 employees / 51-500 employees / 501-1000 employees / 1001-5000 employees / 5001-10000 employees / 10000+ employees
25. What region do you work in?
* Americas / APAC (Asia, Pacific Islands) / EMEA (Europe, Middle East, Africa)
26. In what country do you work?
27. Which of the following best describes the principal industry of your organization?
28. What is your level or responsibility?
* C-level Executive / Manager / Staff
=== 
* Lien vers le sondage ⇒ ''[[CloudSecurityAlliance.fr/go/k39b/|https://CloudSecurityAlliance.fr/go/k39b/]]'' 
!"//QSS Awareness Survey 2020//"
Un sondage est lancé par la CSA sur le sujet de la cryptographie quantique.
Son objectif est de mieux cerner le niveau de sensibilisation aux questions de sécurité quantique et sur les approches qui peuvent être utilisées pour y répondre.
Le sondage est ouvert jusqu'au ''30 mars 2020'' et est hébergé sur la plateforme SurveyMonkey.
Afin de vous y préparer, les 11 questions posées sont disponibles +++*[ici]> 
!!General Quantum-Safe Awareness
1. What would you rate your awareness of quantum computing technology's impact on data security?
* Very aware / Somewhat aware / A little aware / Not at all aware
2. When do you expect the quantum computing threat to be real?
* Right now / In 2-5 years / In 5-10 years / In 10-20 years / In 20+ years
3. How confident are you that current security approaches will keep your organization's data safe from quantum computing attacks?
* Not at all confident / A little confident / Somewhat confident / Very confident / Unsure
4. How would you rate the priority for preparing against the threat of the quantum computer?
* High priority / Moderate priority / Low priority / Not a priority
* 5. Are you or your company working or are planning to work on protecting your organisation against the future threat of quantum computers?
* Yes  / No / Unsure 
!!Not Implementing Quantum-Safe Technology
6. What is the main reason you are not implementing or are not planning to implement quantum-safe technologies in your organization?
* Not a priority / Unaware of existing solutions / It is too expensive / Lack of budget / No buy-in from upper management / Lack of standardization / Other (possibility to specify)
!!Familiarity with Quantum-Safe Solutions
7. Rate your level of agreement with the following statement: “There are currently quantum-safe technologies on the market that can help protect against quantum-based cyber-attacks."
* Strongly agree / Agree / Neither agree nor disagree / Disagree / Strongly disagree
* 8. Which of these quantum resistant technologies are you familiar with? (Select all that apply)?
* Quantum random number generator (QRNG) / Quantum key distribution (QKD) / Post Quantum algorithms / Longer symmetric keys / Longer hash functions / None of these
9. What would be the value for you of a more detailed analysis on the applications of these different technologies?
* High value / Moderate value / Low value / No value at all
10. When are you planning on adding Quantum-Safe Security as a requirement for your cryptography suppliers?
* Required now / In the next year / In 2-5 years / In 5+ years / No plans
11. Are you interested in learning more about quantum computers, the threat to data security, and quantum-safe solutions?
* Not at all interested / A little interested / Somewhat interested / Very interested
=== 
* Lien vers le sondage ⇒ ''[[CloudSecurityAlliance.fr/go/k39q/|https://CloudSecurityAlliance.fr/go/k39q/]]'' 
!"//Cloud Security Alliance Announces Temporary Price Reduction in Online Educational Programs//"
[>img(300px,auto)[iCSA/K39IC.jpg]]Compte tenu de la situation actuelle liée à la pandémie du coronavirus COVID-19, la CSA a annoncé le 9 mars 2020 une remise de 100 dollars sur tous les cours de formation en ligne proposés sur le CSA Knowledge Center.
Cette remise restera en vigueur jusqu'au 30 avril 2020.
__Lien :__
⇒ ''[[CloudSecurityAlliance.fr/go/k39t/|https://CloudSecurityAlliance.fr/go/k39t/]]
!1 - Les nouveautés CSA de la semaine du 2 au 8 mars 2020
* Actu : Report du Forum Securité@Cloud 2020+++*[»]> <<tiddler [[2020.03.03 - Report du Forum Securité@Cloud 2020 les 23 et 24 septembre]]>>=== [>img[iCSF/cloud-security-alliance-fr.png]]
* Blog : Retour sur le CSA Summit à RSA 2020, parties 1+++*[»]> <<tiddler [[2020.03.02 - Blog : Retour sur le CSA Summit à RSA 2020 (1/2)]]>>=== et 2+++*[»]> <<tiddler [[2020.03.03 - Blog : Retour sur le CSA Summit à RSA 2020 (2/2)]]>>=== 
* Podcast : IoT et Régions Intelligentes, aspects de résilience+++*[»]> <<tiddler [[2020.03.02 - Podcast : 'IoT and SMART Nations - Building Resilience']]>>=== 
* Webinar : Inscriptions ouvertes pour le prochain CloudBytes 'Top 5 Latest Cloud Security Hacks'+++*[»]> <<tiddler [[2020.03.17 - Webinar : 'Top 5 Latest Cloud Security Hacks and How You Can Avoid Them']]>>=== 
!2 - Veille Web
La [[Veille Web|2020.03.08 - Veille Hebdomadaire - 8 mars]] avec plus d'une soixantaine de liens dont :
* Etudes et rapports : AtScale+++*[»]>
|2020.03.04|//AtScale//|[[79% of Enterprises Want Better Integrated Security and Governance for Their Data in the Cloud|https://www.atscale.com/press/enterprises-security-governance-data-cloud/]] ([[rapport|https://www.atscale.com/resource/2020-big-data-analytics-maturity-survey-report/]])|Survey|
=== 
* Alertes : Zoho et Desktop Central+++*[»]>
<<tiddler [[2020.03.31 - Alertes]]>>
===, 
* Attaques : liste d'atttaques+++*[»]>
|2020.03.06|Dark Reading|[[7 Cloud Attack Techniques You Should Worry About|https://www.darkreading.com/cloud/7-cloud-attack-techniques-you-should-worry-about/d/d-id/1337259]]|Attacks|
===, noms de domaines (homoglyphes+++*[»]>
|2020.03.04|//Soluble//|![[Emoji to Zero-Day: Latin Homoglyphs in Domains and Subdomainsy|https://www.soluble.ai/blog/public-disclosure-emoji-to-zero-day]]|DNS IDN_Homograph_Attack|
||Wikipedia| → [[IDN homograph attack|https://en.wikipedia.org/wiki/IDN_homograph_attack]]|DNS IDN_Homograph_Attack|
|2020.03.04|Bleeping Computer| → [[Zero-Day Bug Allowed Attackers to Register Malicious Domains|https://www.bleepingcomputer.com/news/security/zero-day-bug-allowed-attackers-to-register-malicious-domains/]]|DNS IDN_Homograph_Attack|
|2020.03.04|Security Week| → [[A Zero-Day Homograph Domain Name Attack|https://www.securityweek.com/zero-day-homograph-domain-name-attack]]|DNS IDN_Homograph_Attack|
=== et Microsoft+++*[»]>
|2020.03.05|//Vullnerability//|[[670+ Subdomains of Microsoft are Vulnerable to Takeover (Lead to Account Takeover)|https://vullnerability.com/blog/microsoft-subdomain-account-takeover]] ([[vidéo|http://www.youtube.com/watch?v=Jg3mkLm2K2g]])|DNS Attacks|
|2020.03.05|Security Week| → [[Over 600 Microsoft Subdomains Can Be Hijacked: Researchers|https://www.securityweek.com/over-600-microsoft-subdomains-can-be-hijacked-researchers]]|DNS Attacks|
|2020.03.05|Dark Reading| → [[Researchers Find 670+ Microsoft Subdomains Vulnerable to Takeover|https://www.darkreading.com/vulnerabilities---threats/researchers-find-670+-microsoft-subdomains-vulnerable-to-takeover/d/d-id/1337246]]|DNS Attacks|
===), Ransomware et backups dans le Cloud+++*[»]>
|2020.03.03|Bleeping Computer|![[Ransomware Attackers Use Your Cloud Backups Against You|https://www.bleepingcomputer.com/news/security/ransomware-attackers-use-your-cloud-backups-against-you/]]|Ransomware|
=== 
* Divers : CASB+++*[»]>
|2020.03.02|//Nuageo//[>img[iCSF/flag_fr.png]]|[[CASB, la nouvelle star de l’écosystème Cloud?|https://www.nuageo.fr/2020/03/casb-star-ecosysteme-cloud/]]|CASB|
|2020.03.03|//Cisco//|[[What is CASB?|https://umbrella.cisco.com/blog/2020/03/03/what-is-casb/]]|CASB|
===, groupe de travail ENISA+++*[»]>
|2020.03.06|ENISA|[[After cloud…cybersecurity certification: launching the ENISA ad hoc Working Group on Cloud Services|https://www.enisa.europa.eu/news/enisa-news/after-cloud-cybersecurity-certification-launching-the-enisa-ad-hoc-working-group-on-cloud-services]]|ENISA|
|2019.12.19|ENISA|Call 02/19 - Cloud Services: [[Call for expression of interest for an ad hoc Working Group|https://www.enisa.europa.eu/news/enisa-news/call-for-expression-of-interest-for-an-ad-hoc-working-group]] ([[Terms of Reference|https://www.enisa.europa.eu/topics/standards/adhoc_wg_calls/ahWG02/tor_ahwg02_cloud]])|ENISA|
===, retours sur le référentiel SecNumCloud+++*[»]>
|2020.03.05|ZDnet[>img[iCSF/flag_fr.png]]|![[Secnumcloud : qu’est ce qu'il ne faut pas faire pour plaire à l’Anssi|https://www.zdnet.fr/actualites/secnumcloud-qu-est-ce-qu-il-ne-faut-pas-faire-pour-plaire-a-l-anssi-39900067.htm]]|SecNumCloud|
===, Zero Trust+++*[»]>
|2020.03.05|//JumpCloud//|[[A Cloud-Based Model for Zero Trust Security|https://jumpcloud.com/blog/cloud-model-zero-trust-security/]]|Zero_Trust|
|2020.03.05|Federal News Network|[[NIST issuing revised draft of zero trust guidance for public comment|https://federalnewsnetwork.com/march-2020-zero-trust-month/2020/03/nist-issuing-revised-draft-of-zero-trust-guidance-for-public-comment/]]|Zero_Trust NIST|
=== 
!3 - Weekly Cloud and Security Watch Newsletter[>img[iCSF/inEnglish.png]]
<<tiddler [[2020.03.08 - Weekly Newsletter - March 8th]]>>
!CSA updates and news - March 2nd to 8th
* Blog: Recap of the CSA Summit at RSA 2020 - part 1+++*[»]> <<tiddler [[2020.03.02 - Blog : Retour sur le CSA Summit à RSA 2020 (1/2)]]>>=== and 2+++*[»]> <<tiddler [[2020.03.03 - Blog : Retour sur le CSA Summit à RSA 2020 (2/2)]]>>=== [>img[iCSF/cloud-security-alliance-fr.png]]
* Podcast: 'IoT and SMART Nations - Building Resilience'+++*[»]> <<tiddler [[2020.03.02 - Podcast : 'IoT and SMART Nations - Building Resilience']]>>=== 
* Webinar: Register for 'Top 5 Latest Cloud Security Hacks and How You Can Avoid Them'+++*[»]> <<tiddler [[2020.03.17 - Webinar : 'Top 5 Latest Cloud Security Hacks and How You Can Avoid Them']]>>=== 
* Event: Forum Securité@Cloud postponed in September+++*[»]> <<tiddler [[2020.03.03 - Report du Forum Securité@Cloud 2020 les 23 et 24 septembre]]>>=== 
!Cloud and Security News Watch
[[Over 60 links|2020.03.08 - Veille Hebdomadaire - 8 mars]] among which:
* Reports: AtScale+++*[»]>
|2020.03.04|//AtScale//|[[79% of Enterprises Want Better Integrated Security and Governance for Their Data in the Cloud|https://www.atscale.com/press/enterprises-security-governance-data-cloud/]] ([[rapport|https://www.atscale.com/resource/2020-big-data-analytics-maturity-survey-report/]])|Survey|
=== 
* Alerts: Zoho Releases Security Update on ManageEngine Desktop Central+++*[»]>
<<tiddler [[2020.03.31 - Alertes]]>>
===, 
* Attacks: 7 Cloud Attack Techniques+++*[»]>
|2020.03.06|Dark Reading|[[7 Cloud Attack Techniques You Should Worry About|https://www.darkreading.com/cloud/7-cloud-attack-techniques-you-should-worry-about/d/d-id/1337259]]|Attacks|
===, Domain names issues with Latin Homoglyphs+++*[»]>
|2020.03.04|//Soluble//|![[Emoji to Zero-Day: Latin Homoglyphs in Domains and Subdomainsy|https://www.soluble.ai/blog/public-disclosure-emoji-to-zero-day]]|DNS IDN_Homograph_Attack|
||Wikipedia| → [[IDN homograph attack|https://en.wikipedia.org/wiki/IDN_homograph_attack]]|DNS IDN_Homograph_Attack|
|2020.03.04|Bleeping Computer| → [[Zero-Day Bug Allowed Attackers to Register Malicious Domains|https://www.bleepingcomputer.com/news/security/zero-day-bug-allowed-attackers-to-register-malicious-domains/]]|DNS IDN_Homograph_Attack|
|2020.03.04|Security Week| → [[A Zero-Day Homograph Domain Name Attack|https://www.securityweek.com/zero-day-homograph-domain-name-attack]]|DNS IDN_Homograph_Attack|
=== and Microsoft Subdomains Vulnerable to Takeover+++*[»]> 
|2020.03.05|//Vullnerability//|[[670+ Subdomains of Microsoft are Vulnerable to Takeover (Lead to Account Takeover)|https://vullnerability.com/blog/microsoft-subdomain-account-takeover]] ([[vidéo|http://www.youtube.com/watch?v=Jg3mkLm2K2g]])|DNS Attacks|
|2020.03.05|Security Week| → [[Over 600 Microsoft Subdomains Can Be Hijacked: Researchers|https://www.securityweek.com/over-600-microsoft-subdomains-can-be-hijacked-researchers]]|DNS Attacks|
|2020.03.05|Dark Reading| → [[Researchers Find 670+ Microsoft Subdomains Vulnerable to Takeover|https://www.darkreading.com/vulnerabilities---threats/researchers-find-670+-microsoft-subdomains-vulnerable-to-takeover/d/d-id/1337246]]|DNS Attacks|
===, Ransomware and Cloud Backups+++*[»]>
|2020.03.03|Bleeping Computer|![[Ransomware Attackers Use Your Cloud Backups Against You|https://www.bleepingcomputer.com/news/security/ransomware-attackers-use-your-cloud-backups-against-you/]]|Ransomware|
=== 
* Miscellaneous: CASB+++*[»]>
|2020.03.02|//Nuageo//[>img[iCSF/flag_fr.png]]|[[CASB, la nouvelle star de l’écosystème Cloud?|https://www.nuageo.fr/2020/03/casb-star-ecosysteme-cloud/]]|CASB|
|2020.03.03|//Cisco//|[[What is CASB?|https://umbrella.cisco.com/blog/2020/03/03/what-is-casb/]]|CASB|
===, ENISA ad hoc Working Group on Cloud Services+++*[»]>
|2020.03.06|ENISA|[[After cloud…cybersecurity certification: launching the ENISA ad hoc Working Group on Cloud Services|https://www.enisa.europa.eu/news/enisa-news/after-cloud-cybersecurity-certification-launching-the-enisa-ad-hoc-working-group-on-cloud-services]]|ENISA|
|2019.12.19|ENISA|Call 02/19 - Cloud Services: [[Call for expression of interest for an ad hoc Working Group|https://www.enisa.europa.eu/news/enisa-news/call-for-expression-of-interest-for-an-ad-hoc-working-group]] ([[Terms of Reference|https://www.enisa.europa.eu/topics/standards/adhoc_wg_calls/ahWG02/tor_ahwg02_cloud]])|ENISA|
===, Feedback on the French SecNumCloud+++*[»]>
|2020.03.05|ZDnet[>img[iCSF/flag_fr.png]]|![[Secnumcloud : qu’est ce qu'il ne faut pas faire pour plaire à l’Anssi|https://www.zdnet.fr/actualites/secnumcloud-qu-est-ce-qu-il-ne-faut-pas-faire-pour-plaire-a-l-anssi-39900067.htm]]|SecNumCloud|
===, Zero Trust+++*[»]>
|2020.03.05|//JumpCloud//|[[A Cloud-Based Model for Zero Trust Security|https://jumpcloud.com/blog/cloud-model-zero-trust-security/]]|Zero_Trust|
|2020.03.05|Federal News Network|[[NIST issuing revised draft of zero trust guidance for public comment|https://federalnewsnetwork.com/march-2020-zero-trust-month/2020/03/nist-issuing-revised-draft-of-zero-trust-guidance-for-public-comment/]]|Zero_Trust NIST|
=== 
|ssTabl99|k
|!⇒ [[CloudSecurityAlliance.fr/go/K38/|https://CloudSecurityAlliance.fr/go/K38/]] |
|!Mars|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2020.03.08|
|2020.03.08|//Tripwire//|[[To Be or Not to Be: BCSI in the Cloud?|https://www.tripwire.com/state-of-security/security-data-protection/cloud/bcsi-in-cloud/]]|Risk_Assessment|
|2020.03.08|||//Barracuda Networks//|[[Future shock: the cloud is the new network|https://www.barracuda.com/cloud-market]]|Report|
|>|>|>|!2020.03.06|
|2020.03.06|ENISA|[[After cloud…cybersecurity certification: launching the ENISA ad hoc Working Group on Cloud Services|https://www.enisa.europa.eu/news/enisa-news/after-cloud-cybersecurity-certification-launching-the-enisa-ad-hoc-working-group-on-cloud-services]]|ENISA|
|2020.03.06|Dark Reading|[[7 Cloud Attack Techniques You Should Worry About|https://www.darkreading.com/cloud/7-cloud-attack-techniques-you-should-worry-about/d/d-id/1337259]]|Attacks|
|2020.03.06|Bleeping Computer|[[FBI Warns of BEC Attacks Abusing Microsoft Office 365, Google G Suite|https://www.bleepingcomputer.com/news/security/fbi-warns-of-bec-attacks-abusing-microsoft-office-365-google-g-suite/]]|Attacks|
|2020.03.06|jdSupra|[[Contract Corner: Basics of Uptime Commitment in Cloud Service Level Agreements|https://www.jdsupra.com/legalnews/contract-corner-basics-of-uptime-89492/]]|SLA|
|2020.03.06|Help Net Security|[[HITRUST Shared Responsibility: Assigning privacy and responsibility on the cloud|https://www.helpnetsecurity.com/2020/03/06/hitrust-shared-responsibility-program-and-matrix-1-0/]]|Shared_Responsibility|
|2020.03.06|TechBeacon|[[5 keys to securing multi-cloud environments|https://techbeacon.com/security/5-keys-securing-multi-cloud-environments]]|Multi_Cloud Recommendations|
|2020.03.06|//Fraktal//|[[Cloud WAF Comparison Using Real-World Attacks|https://medium.com/fraktal/cloud-waf-comparison-using-real-world-attacks-acb21d37805e]]|WAF|
|2020.03.06|//PaloAlto Networks//|[[Breaking Down Silos with DevSecOp|https://blog.paloaltonetworks.com/2020/03/cloud-break-silos-devsecops/]]|DevSecOps|
|2020.03.06|//Slack//[>img[iCSF/flag_fr.png]]|[[Continuite de l'activité chez Slack : comment permettre à nos clients de rester operationnels pendant l'episode COVID 19|https://slackhq.com/continuite-de-lactivite-chez-slack-comment-permettre-a-nos-clients-de-rester-operationnels-pendant-lepisode-covid-19]]|COVID-19 BCP|
|2020.03.06|//Slack//| → [[Business continuity at Slack: Keeping our customers up and running during COVID-19|https://slackhq.com/business-continuity-plan-covid-19]]|COVID-19 BCP|
|>|>|>|!2020.03.05|
|2020.03.05|ZDnet[>img[iCSF/flag_fr.png]]|![[Secnumcloud : qu’est ce qu'il ne faut pas faire pour plaire à l’Anssi|https://www.zdnet.fr/actualites/secnumcloud-qu-est-ce-qu-il-ne-faut-pas-faire-pour-plaire-a-l-anssi-39900067.htm]]|SecNumCloud|
|2020.03.05|Le Mag IT[>img[iCSF/flag_fr.png]]|[[Azure Bastion apporte confort et sécurité à la gestion des VM|https://www.lemagit.fr/conseil/Azure-Bastion-apporte-confort-et-securite-a-la-gestion-des-VM]]|Azure|
|2020.03.05|The Register|[[Enable that MF-ing MFA: 1.2 million Azure Active Directory accounts compromised every month, reckons Microsoft|https://www.theregister.co.uk/2020/03/05/microsoft_12_million_enterprise_accounts_are_compromised_every_month/]] ([[vidéo|https://www.youtube.com/watch?v=B_mhJO2qHlQ]])|AzureAD Attacks|
|2020.03.05|ZDnet|[[New Bill to prepare Australian law enforcement for the US CLOUD Act|https://www.zdnet.com/article/new-bill-to-prepare-australian-law-enforcement-for-the-us-cloud-act/]] (documents de référence [[1|https://parlinfo.aph.gov.au/parlInfo/download/legislation/bills/r6511_first-reps/toc_pdf/20025b01.pdf]] et [[2|https://parlinfo.aph.gov.au/parlInfo/download/legislation/ems/r6511_ems_0ac5ae09-3e3e-400b-ae5e-680a68af4e45/upload_pdf/733176.pdf]])|CLOUD_Act|
|2020.03.05|//Source Incite//|[[SRC-2020-0011 : ManageEngine Desktop Central FileStorage getChartImage Deserialization of Untrusted Data Remote Code Execution Vulnerability|https://srcincite.io/advisories/src-2020-0011/]]|Zoho CVE-2020-10189|
|2020.03.06|//Zoho//|[[We acknowledge the vulnerability in versions of Desktop Central released before 1/20/20 (build 10.0.473 and below)|https://mobile.twitter.com/manageengine/status/1235985409731149824]]|Zoho CVE-2020-10189|
|2020.03.06|US-CERT| → [[Zoho Releases Security Update on ManageEngine Desktop Central|https://www.us-cert.gov/ncas/current-activity/2020/03/06/zoho-releases-security-update-manageengine-desktop-central]]|Zoho CVE-2020-10189|
|2020.03.06|Bleeping Computer| → [[Zoho Fixes No-Auth RCE Zero-Day in ManageEngine Desktop Central|https://www.bleepingcomputer.com/news/security/zoho-fixes-no-auth-rce-zero-day-in-manageengine-desktop-central/]]|Zoho CVE-2020-10189|
|2020.03.06|//Desktop Central//| → [[ManageEngine Desktop Central remote code execution vulnerability (CVE-2020-10189)|https://www.manageengine.com/products/desktop-central/remote-code-execution-vulnerability.html]]|Zoho CVE-2020-10189|
|2020.03.05|//JumpCloud//|[[A Cloud-Based Model for Zero Trust Security|https://jumpcloud.com/blog/cloud-model-zero-trust-security/]]|Zero_Trust|
|2020.03.05|//Menlo Security//|[[Stop Data Exfiltration with Cloud DLP|https://www.menlosecurity.com/blog/stop-data-exfiltration-with-cloud-dlp]]|DLP|
|2020.03.11|Security Boulevard| → [[Report Details Security Threats Posed by Cloud File Services|https://securityboulevard.com/2020/03/report-details-security-threats-posed-by-cloud-file-services/]]|DLP|
|2020.03.05|//Sysdig//|[[GitOps Security with k8s-security-configwatch|https://sysdig.com/blog/gitops-k8s-security-configwatch/]]|Kubernetes|
|2020.03.05|//Microsoft Azure//|[[Azure Sentinel Side-by-Side with Splunk|https://techcommunity.microsoft.com/t5/azure-sentinel/azure-sentinel-side-by-side-with-splunk/ba-p/1211266]]|Azure_Sentinel Splunk|
|2020.03.05|//Vullnerability//|[[670+ Subdomains of Microsoft are Vulnerable to Takeover (Lead to Account Takeover)|https://vullnerability.com/blog/microsoft-subdomain-account-takeover]] ([[vidéo|http://www.youtube.com/watch?v=Jg3mkLm2K2g]])|DNS Attacks|
|2020.03.05|Security Week| → [[Over 600 Microsoft Subdomains Can Be Hijacked: Researchers|https://www.securityweek.com/over-600-microsoft-subdomains-can-be-hijacked-researchers]]|DNS Attacks|
|2020.03.05|Dark Reading| → [[Researchers Find 670+ Microsoft Subdomains Vulnerable to Takeover|https://www.darkreading.com/vulnerabilities---threats/researchers-find-670+-microsoft-subdomains-vulnerable-to-takeover/d/d-id/1337246]]|DNS Attacks|
|>|>|>|!2020.03.04|
|2020.03.04|Silicon[>img[iCSF/flag_fr.png]]|[[Les malfaiteurs derrière les rançongiciels s'attaquent à votre seul moyen de protection : les sauvegardes|https://cyberguerre.numerama.com/3644-les-malfaiteurs-derriere-les-rancongiciels-sattaquent-a-votre-seul-moyen-de-protection-les-sauvegardes.html]]|Ransomware Backups|
|2020.03.04|Container Journal|[[Establishing a Kubernetes Pod Security Policy|https://containerjournal.com/topics/container-security/establishing-a-kubernetes-pod-security-policy/]]|Kubernetes|
|2020.03.04|Solutions Review|[[The 8 Best Cloud Security LinkedIn Groups You Should Join|https://solutionsreview.com/cloud-platforms/the-8-best-cloud-security-linkedin-groups-you-should-join/]]|LinkedIn|
|2020.03.04|//Soluble//|![[Emoji to Zero-Day: Latin Homoglyphs in Domains and Subdomainsy|https://www.soluble.ai/blog/public-disclosure-emoji-to-zero-day]]|DNS IDN_Homograph_Attack|
||Wikipedia| → [[IDN homograph attack|https://en.wikipedia.org/wiki/IDN_homograph_attack]]|DNS IDN_Homograph_Attack|
|2020.03.04|Bleeping Computer| → [[Zero-Day Bug Allowed Attackers to Register Malicious Domains|https://www.bleepingcomputer.com/news/security/zero-day-bug-allowed-attackers-to-register-malicious-domains/]]|DNS IDN_Homograph_Attack|
|2020.03.04|Security Week| → [[A Zero-Day Homograph Domain Name Attack|https://www.securityweek.com/zero-day-homograph-domain-name-attack]]|DNS IDN_Homograph_Attack|
|2020.03.04|Cloud Native Computing Foundation|[[CNCF Survey results are here: Deployments are growing in size and speed as cloud native adoption becomes mainstream|https://www.cncf.io/blog/2020/03/04/2019-cncf-survey-results-are-here-deployments-are-growing-in-size-and-speed-as-cloud-native-adoption-becomes-mainstream/]] '[[rapport|https://www.cncf.io/wp-content/uploads/2020/03/CNCF_Survey_Report.pdf]])|Report CNCF|
|2020.03.09|Jaxcenter| → [[CNCF survey reveals 78% use Kubernetes in production|https://jaxenter.com/kuberetes-cncf-169420.html]]|Report CNCF|
|2020.03.24|DZone| → [[6 Interesting Trends from the Latest CNCF Survey|https://dzone.com/articles/-6-interesting-trends-from-the-latest-cncf-survey]]|Report CNCF|
|2020.03.04|//Cloud Management Insider//|[[Amazon S3 Bucket Security - Don’t be the Next Data Breach Headline!|https://www.cloudmanagementinsider.com/amazon-s3-bucket-security/]]|AWS_S3 Data_Leak|
|2020.03.04|//AtScale//|[[79% of Enterprises Want Better Integrated Security and Governance for Their Data in the Cloud|https://www.atscale.com/press/enterprises-security-governance-data-cloud/]] ([[rapport|https://www.atscale.com/resource/2020-big-data-analytics-maturity-survey-report/]])|Survey|
|2020.03.04|//Microsoft//|[[Become a security focused CSP with Microsoft 365 Business|https://techcommunity.microsoft.com/t5/azure-active-directory-identity/become-a-security-focused-csp-with-microsoft-365-business/ba-p/1144690]]|O365 Risks|
|2020.03.04|//Microsoft Azure//|[[Announcing preview of Backup Reports|https://azure.microsoft.com/en-us/blog/announcing-preview-of-backup-reports/]]|Azure Backups|
|2020.03.04|//TrendMicro//|[[Security Risks in Online Coding Platforms|https://blog.trendmicro.com/trendlabs-security-intelligence/security-risks-in-online-coding-platforms/]]|DevSecOps|
|2020.03.04|//TrendMicro//|[[Supply Chain Risk for the 2020s: Cloud and DevOps Under the Microscope|https://vmblog.com/archive/2020/03/04/supply-chain-risk-for-the-2020s-cloud-and-devops-under-the-microscope.aspx]]|Supply_Chain|
|2020.03.04|//eSentire//|[[Applying the 80/20 Rule to Cloud Security|https://www.scmagazine.com/home/advertise/applying-the-80-20-rule-to-cloud-security/]]|Best_Practices|
|2020.03.12|//eSentire//| → [[Applying the 80/20 rule to cloud security|https://www.helpnetsecurity.com/2020/03/12/paretos-principle-cloud-security/]]|Best_Practices|
|2020.03.04|//CloudPassage//|![[API-level Connectivity and Control for IaaS and PaaS: Cloud Workload Security Part 2|https://www.cloudpassage.com/blog/api-level-connectivity-and-control-for-iaas-and-paas/]] (2/2)|APIs|
|>|>|>|!2020.03.03|
|2020.03.03|Silicon[>img[iCSF/flag_fr.png]]|[[Bug Bounty : YesWeHack chasse les failles pour 3DS Outscale|https://www.silicon.fr/bug-bounty-yeswehack-chasse-les-failles-pour-3ds-outscale-335338.html]]|Bug_Bounty Outscale|
|2020.03.03|Bleeping Computer|![[Ransomware Attackers Use Your Cloud Backups Against You|https://www.bleepingcomputer.com/news/security/ransomware-attackers-use-your-cloud-backups-against-you/]]|Ransomware|
|2020.03.03|ZDnet|[[Australian government's certified cloud list to expire come June 30|https://www.zdnet.com/article/australian-governments-certified-cloud-list-to-expire-come-june-30/]]|Australia Government|
|2020.03.03|Security Week|[[Advancing DevSecOps Into the Future|https://www.securityweek.com/advancing-devsecops-future]]|DevSecOps|
|2020.03.05|IT News|[[ASD scraps cloud security certification program|https://www.itnews.com.au/news/asd-scraps-cloud-security-certification-program-538820]]|Australia Government Certification|
|2020.03.04|Technology Decisions| → [[ACSC shutters cloud certification program|https://www.technologydecisions.com.au/content/cloud-and-virtualisation/article/acsc-shutters-cloud-certification-program-1415216250]]|Australia Government Certification|
|2020.03.05|IT News| → [[ASD warned cloud accreditation U-turn jeopardises security, adoption|https://www.itnews.com.au/news/asd-warned-cloud-accreditation-u-turn-jeopardises-security-adoption-538913]]|Australia Government Certification|
|2020.03.05|Federal News Network|[[NIST issuing revised draft of zero trust guidance for public comment|https://federalnewsnetwork.com/march-2020-zero-trust-month/2020/03/nist-issuing-revised-draft-of-zero-trust-guidance-for-public-comment/]]|Zero_Trust NIST|
|2020.03.03|//VMware//[>img[iCSF/flag_fr.png]]|[[VMware et la sécurisation des workloads et réseaux dans le datacenters et Clouds|https://datacenter-magazine.fr/vmware-et-la-securisation-des-workloads-et-reseaux-dans-le-datacenters-et-clouds/]]|Workloads|
|2020.03.03|//Microsoft//|[[Quick wins—single sign-on (SSO) and Multi-Factor Authentication (MFA)|https://www.microsoft.com/security/blog/2020/03/03/single-sign-on-sso-multi-factor-authentication-mfa/]]|Authentication|
|2020.03.03|//BackBlaze//|[[Pathways to the Cloud: Six Tools for Moving Your Files|https://www.backblaze.com/blog/pathways-to-the-cloud/]]|Tools|
|2020.03.03|//CyberArk Conjur//|[[How Modern Cloud Design Patterns Impact Security|https://www.conjur.org/blog/how-modern-design-patterns-impact-security/]]|Architecture|
|2020.03.03|//Jump Cloud//|[[Azure AD Replacement|https://jumpcloud.com/blog/aad-replacement/]]|AzureAD|
|2020.03.03|//XM Cyber//|[[Why Identity and Access Management is the New Public Cloud Perimeter|https://xmcyber.com/why-identity-and-access-management-is-the-new-public-cloud-perimeter/]]|IAM|
|2020.03.03|//Cisco//|[[What is CASB?|https://umbrella.cisco.com/blog/2020/03/03/what-is-casb/]]|CASB|
|>|>|>|!2020.03.02|
|2020.03.02|Computer Weekly|[[Rook 101: Building software-defined containerised storage in Kubernetes|https://www.computerweekly.com/feature/Rook-101-Building-software-defined-containerised-storage-in-Kubernetes]]|Kubernetes|
|2020.03.02|Wachington Post|[[How the cloud has opened new doors for hackers|https://www.washingtonpost.com/technology/2020/03/02/cloud-hack-problems/]]|Risks|
|2020.03.02|//Nuageo//[>img[iCSF/flag_fr.png]]|![[CASB, la nouvelle star de l’écosystème Cloud?|https://www.nuageo.fr/2020/03/casb-star-ecosysteme-cloud/]]|CASB|
|2020.03.02|//Microsoft//|[[Microsoft identity acronyms—what do they mean and how do they relate to each other?|https://www.microsoft.com/security/blog/2020/03/02/microsoft-identity-acronyms-what-they-mean-how-they-relate/]]|IAM|
|2020.03.02|//Google GCP//|[[How to detect and prevent network outages—and stay compliant too|https://cloud.google.com/blog/products/networking/how-to-test-for-and-help-prevent-bad-network-connectivity]]|Outages Prevention|
|2020.03.02|//Alcide//|[[GitOps - A Security Perspective (Part 1)|https://blog.alcide.io/gitops-a-security-perspective]] (1/2)|Kubernetes GitHub|
!Report du Forum Securité@Cloud aux 23 et 24 septembre 2020
[>img(250px,auto)[iCSF/K33AR.jpg]]L'annonce du report est tombée le 3 mars matin...
<<<
//Suite à l'annonce du ministre de la santé de l'annulation de "tous les rassemblements de plus de 5000 personnes en milieu confiné" #coronavirus, nous sommes dans l'obligation de reporter nos #salons @Cloud_WorldExpo @IoTWorldParis1 @SalonMtoM
Nouvelles dates à venir très vite.//
<<<
* Lien ⇒ https://twitter.com/ForumSecuCloud/status/1234753693813219328/


[>img(250px,auto)[iCSF/K34AR.jpg]]...et la nouvelle date annoncé le 4 mars en fin de journée : les ''23 et 24 septembre 2020''.
<<<
//Et voilà, c'est fait  ... nouvelles dates pour les salons
23-24 septembre - Paris Porte de Versailles
D'ici là, on va continuer de vous parler de #sécurité du #Cloud & #IoT, #SecNumCloud bref de #cybersécurité et de #confiance !//
<<<
!"//CSA Summit at RSA 2020 - Recap Part 2//"
[>img(150px,auto)[iCSA/K33BC.jpg]]Article de blog publié le 3 mars 2020 — Rédigé par Frank Guanco, Research Program Manager, CSA
La première partie est accessible [[ici|2020.03.02 - Blog : Retour sur le CSA Summit à RSA 2020 (1/2)]]
<<<
//In this post we’ll be exploring the big ideas and takeaways from the afternoon sessions. Several main questions and ideas our afternoon speakers addressed were:
* How are enterprises supposed to prepare for incidents if their service provider is in control of their data?
* Why is there still a shortage of security professionals, and how can we attract and qualify new employees?
* How can organizations improve security training for current employees?
* Who’s ultimately responsible for security given inter-country cyberattacks? The private sector or the government?
!!Secure Your IT Transformation
Digital Transformation was in the air as Jay Chaudhry, CEO of Zscaler and Christopher Porter, CISO of Fannie Mae, provided takeaways on this subject via key technologies enabling this transformation like cloud, mobility, the internet's connectivity layer, and the Internet of Things. Emerging trends in digital transformation include 5G having the potential to be the new Local Area Network, Zero Trust Network Access as the new norm for Enterprise Security. Porter shared Fannie Mae's takeaway with digital transformation by pointing out that 'data is new oil' and their lessons learned. Fannie Mae's lessons learned were to drive security into the fabric of your business, a mindset change for infrastructure, and how digital transformation is imperative and is a top-down initiative.
!!Incident Response in the Cloud: Fog of War or Skies Clearing?
In this lively talk by Aravind Swaminathan, Partner Global Co-Chair Cyber, Privacy & Data Innovation at Orrick, Herrington & Sutcliffe brought his perspective on managing inventions through the lens of legal forensics. Considerations such as who can control the environment, the details of the investigation, and risk assurance are of prime importance for negotiating the contract with providers. He stressed the importance of negotiating for what you really want. As he said, 'You won't win every time, but you won't win if you'd don't ask.'
!!Transforming Security for the Clouds
Shannon Lietz brought her expertise and expertise with DevSecOps in this session. From the pipelines of DevOps creating value and availability to DevSecOps creating trust and confidence, determining your key performance indicator can be your metric for world class security. Securability is ephemeral, but this risk reduction is significant and having KPIs and planning with this in mind will benefit your security posture.
!!Collaborating with Security to Enable the Business
During this panel session Jason Garbis (Vice President of Products, AppGate) asked our panelist what sorts of skills they develop in their team, and what they look for when hiring.
Stephen Scharf CSO at DTCC said "I look for intelligence and energy...those two things you can't teach. Do they look like they have mindset that's problem solving... someone that's approaching problems from creative ways."
Towards the end, recapping the most important thing they think security professionals should focus on, Jerry Archer (CISO, Sallie Mae) said:
Security needs to surf the wave...need to have the solution before the business needs it. You want to be out in front of that problem. Security gets to lead that change, build security in from the very beginning. That we get to fulfill the notion of security before everyone starts building on top of it.
!!Building the Next Generation Cybersecurity Workforce
The Co-Founder & Vice President of the International Consortium of Minority Cybersecurity Professionals, Larry Whiteside Jr. asked why there’s still a skills shortage in the cybersecurity workforce? His answer was partly that "Cybersecurity professionals are unicorns...you have to think a certain way." But he said that doesn’t answer it completely, he stressed that:
* We can't say there's not enough people
* Can say there's too many jobs
* Can't say there's a pipeline if not taking steps
So how do we start taking steps? By partnering with diverse candidates and organizations and increasing training opportunities. Companies should reach out in your local community. Most highschool and college students don't even know this career field exists or that it’s an option.
“2020 is the year of action whether it's big or small...we all have a responsibility to take some level of action” - Larry Whiteside Jr.
__Takeaways__
* Be confident there's a problem and a way to solve it
* Talk to HR
* Create a training plan for your team
!!A strategic view of the future of our industry from the incomparable Dan Geer
In this session Dan Geer (Chief Information Security Officer, In-Q-Tel), examined the hard choices we’re faced with. He ended his speech admonishing everyone to remember that we can’t be passive. Freedom isn’t free. You can read his full presentation here.
!!Other articles summarizing the sessions:
You can download this year’s summit presentations +++*[here]> https://csacongress.org/event/csa-summit-at-rsa-conference-2020/#home ===. Below are links to articles that were written about several of the sessions at this year’s summit.
* Glenn Gerstell: +++*[Government Vs. Private Sector in the New Digital Reality - Journal of Cyber Policy]> === 
* John Yeoh: +++*[Next Cloud Security Challenge: Containers and Kubernetes]> === 
* Dan Geer: +++*[A strategic view of the future of our industry from the incomparable Dan Geer]> http://geer.tinho.net/geer.cloudsecurityalliance.24ii20.txt === 
//[...]
<<<
__Lien :__
* blog original en anglais &rArr; ''[[CloudSecurityAlliance.fr/go/k33b/|https://CloudSecurityAlliance.fr/go/k33b/]]''
* slides présentées : ''[[CloudSecurityAlliance.fr/go/k2op/|https://CloudSecurityAlliance.fr/go/k2op/]]''
** [[Why IAM is the New Perimeter in Public Cloud and How to Govern It|https://cloudsecurityalliance.org/artifacts/why-iam-is-the-new-perimeter-in-public-cloud-and-how-to-govern-it]] par Brian Johnson, CEO & Co-Founder - DivvyCloud
** [[Case Study: Obvious and Not-So Obvious Lessons Learned On the Path to Cloud-First IT|https://cloudsecurityalliance.org/artifacts/case-study-obvious-and-not-so-obvious-lessons-learned-on-the-path-to-cloud-first-it]] par Tony Taylor, CISO - Land O’ Lakes | Rajiv Gupta, SVP and GM of Cloud Security - McAfee
** [[Building the Next Generation Cybersecurity Workforce|https://cloudsecurityalliance.org/artifacts/building-the-next-generation-cybersecurity-workforce]] par Larry Whiteside Jr, Founder / Investor/ Veteran CISO
** [[Reinventing the Cloud Assurance with CCAK and CCM|https://cloudsecurityalliance.org/artifacts/reinventing-the-cloud-assurance-with-ccak-and-ccm]] par Daniele Catteddu, Chief Technology Officer - CSA | Shawn Harris, Principal Security Architect - Starbucks Coffee Company 
** [[Transforming Security for the Clouds|https://cloudsecurityalliance.org/artifacts/transforming-security-for-the-clouds]] par Shannon Lietz, Director, Adversary Management - Intuit
** [[The Future of a Secure Digital Transformation|https://cloudsecurityalliance.org/artifacts/the-future-of-a-secure-digital-transformation]] par Jay Chaudhry CEO, Chairman and Founder - Zscaler
!"//CSA Summit at RSA 2020 - Recap Part 1//"
[>img(150px,auto)[iCSA/K32BC.jpg]]Article de blog publié le 2 mars 2020 — Rédigé par Frank Guanco, Research Program Manager, CSA
La deuxième partie est accessible [[ici|2020.03.03 - Blog : Retour sur le CSA Summit à RSA 2020 (2/2)]]
<<<
//CSA was excited to welcome a diverse group of speakers to discuss cloud security and privacy during this year’s CSA Summit at RSA Conference 2020. We heard from Glenn Gerstell, Alex Stamos, Phil Venables, Dan Geer and many others. Our speakers addressed the following questions and topics:
* Who’s ultimately responsible for security given inter-country cyberattacks? The private sector or the government?
* What can organizations do to prepare and respond to a breach?
* How can we embed security into the business culture?
In this post, we’ll be exploring the highlights, key ideas, and big insights from the morning sessions.
!!Cybersecurity as a First Class Business Risk: Challenges and Opportunities
Phil Venables (Board Director, Goldman Sachs Bank and Senior Advisor (Risk and Cybersecurity))
In this opening session of the CSA Summit at RSA Conference 2020, Phil Venables shared insights on security as a business and technology issue and how a culture of security comes from actions. The considerations for executing this is threefold:
* Enterprise integration and how to embed security into the fabric of business decision-making
* Technology integration that involves embedding improvement into technology delivery
* Resilience and recovery through limiting blast radius of events and integrating incident response and operational controls
As security moves towards the future, Venables shared the unique position of those in the industry like the camaraderie of the security community and the higher purpose of security that impacts innovation essential to progress. As the session closed, Venables shared a quote; "We are careening into the future at the speed of light. Relax and enjoy the ride."
You can read more about his session in this article from Infosecurity Magazine +++*[here]> https://www.infosecurity-magazine.com/news/rsac-security-business-technical/ ===.
!!PANEL: Preparing and Responding to a Breach
The panelists focused on the human aspect of breaches and how organizations can prepare their individual employees through proper training. At one point, Diana Kelley, Cybersecurity Field CTO, Microsoft drove home the idea that no one should be exempt from regular trainings.
“Annual or biannual training is for everyone...just because they have a title people don't get exempt from that training” - Diana Kelley, Cybersecurity Field CTO, Microsoft.
Outside of training your internal employees Andy Kirkland (Global Chief Information Security Officer (CISO), Starbucks) emphasized the importance of fourth-party risk and understanding the full extent of how your supply chain works. For instance, what are the shared providers of the providers and attack vectors that come from those?
Ultimately John Yeoh VP or research wrapped up the session by aptly stating that - “You can share responsibility, but can't share accountability.”
!!Tech’s Failures and a Way Back to Global Competitiveness
In this talk, Alex Stamos from Stanford Internet Observatory, Stanford University, covered some of the core issues behind the techlash and why Silicon Valley has done such a poor job in responding. He also discussed how Silicon Valley could work collectively and with DC to build a durable competitive advantage for US tech.
Read more about his session in this article from Infosecurity magazine +++*[here]> https://www.infosecurity-magazine.com/news/rsac-harms-technology-policies/ ===.
!!We Cannot Afford to Lose the Digital Revolution
As Glenn Gerstell (Former General Counsel, National Security Agency and Central Security Service) presented keynote, he started by sharing the story of NASA astronaut Christina Koch landing in Kazakhstan after almost a year in orbit and the uniqueness of landing in an area that is considered a US rival. This is the state of the new digital reality. Gerstell stated that this is the Fourth Industrial Revolution. Where it is possible for countries to leapfrog another via technology and the strategic implications of this reality.
The balance between the federal government and the private sector in regards to technology is going through rapid change and is of utmost importance in the digital age.
Gerstell noted three critical challenges:
* China as an adversary and partner. That China can harness their private and public sectors to grow national strategic goals.
* Rebalancing the role of the private and public sector where categories like AI and IoT provides ease, but in the wrong hands can wreak havoc.
Ultimately, who bears the responsibility for keeping our nation safe?
You can read more about his session in this article from the Journal of Cyber Policy +++*[here]> https://journalofcyberpolicy.com/2020/02/24/government-vs-private-sector-new-digital-reality/ ===.
Other articles summarizing the sessions:
You can download this year’s summit presentations here. Below are links to articles that were written about several of the sessions at this year’s summit.
* Phil Venables: +++*[#RSAC: Make Security a Business and a Technical Issue]> https://www.infosecurity-magazine.com/news/rsac-security-business-technical/ === 
* Alex Stamos: +++*[#RSAC: Realize the Harms and Benefits of Technology and Create Policies to Enable the Public]> https://www.infosecurity-magazine.com/news/rsac-harms-technology-policies/ === 
* Highlights: +++*[Cloud Security Alliance 2020 Highlights - Journal of Cyber Policy]> https://journalofcyberpolicy.com/2020/02/25/cloud-security-alliance-2020-highlights/ ===.
//[...]
<<<
__Lien :__
* blog original en anglais &rArr; ''[[CloudSecurityAlliance.fr/go/k32b/|https://CloudSecurityAlliance.fr/go/k32b/]]''
* slides présentées : ''[[CloudSecurityAlliance.fr/go/k2op/|https://CloudSecurityAlliance.fr/go/k2op/]]''
!"//IoT and SMART Nations - Building Resilience//"
[>img(150px,auto)[iCSA/CSAsecUpd.jpg]]Podcast de la série "[[CSA Security Update]]" publié le 2 mars 2020 — Invité : David Mudd, BSI Group 
<<<
//IoT defines the journey of digital technology and data to enable organizations to perform better, boost well-being and respond to local and global challenges - presenting a huge opportunity but risk as well. 
With SMART Cites and SMART Nations emerging, a sustainable, pragmatic approach is necessary, ensuring the people, processes, and systems are secure. With predictions that three-quarters of the world’s 9 billion people will be city-dwellers by 2050, it’s vital we ensure cities provide a safe and pleasant environment that is sustainable and resilient to change. 
Listen as we interview David Mudd, Global Digital and Connected Product Certification Director with BSI Group and discuss these pressing issues as well as how IoT can make a positive impact on the environment and the business community in general as well as how CSA is working with industry through the development of the CSA IoT Control Matrix.//
<<<
__Liens :__
* Annonce : https://www.buzzsprout.com/303731/2895877-iot-and-smart-nations-building-resilience-guest-david-mudd-bsi-group
* Podcast : https://www.buzzsprout.com/303731/2895877-iot-and-smart-nations-building-resilience-guest-david-mudd-bsi-group.mp3
!1 - Les nouveautés CSA de la semaine du 24 février au 1^^er^^ mars 2020
* Blog : Méconnaissance, saut dans l'inconnu et CCAK+++*[»]> <<tiddler [[2020.02.24 - Blog : Méconnaissance, saut dans l'inconnu et CCAK]]>>=== [>img[iCSF/cloud-security-alliance-fr.png]]
* Publication : Bonnes pratiques pour une architecture Microservice+++*[»]> <<tiddler [[2020.02.24 - Publication : Bonnes pratiques pour une architecture Microservices]]>>=== 
* Actu : Nouvelles études de la CSA+++*[»]> <<tiddler [[2020.02.24 - Nouvelles études de la CSA]]>>=== 
* Actu : Nouvelles approches pour l'audit Cloud+++*[»]> <<tiddler [[2020.02.24 - Nouvelles approches pour l'audit Cloud]]>>=== 
* Actu : Appel à contribution pour la conférence [[SECtember]]+++*[»]> <<tiddler [[2020.02.24 - Ouverture prochaine des inscriptions à la conférence SECtember]]>>=== 
!2 - Veille Web
La [[Veille Web|2020.03.01 - Veille Hebdomadaire - 1er mars]] avec plus d'une soxantaine de liens dont :
* __Derniers jours :__ Pensez à faire la rotation de certains de vos certificats AWS+++*[»]>
|2020.01.07|//AWS//|![[Urgent & Important - Rotate Your Amazon RDS, Aurora, and Amazon DocumentDB (with MongoDB compatibility) Certificates|https://aws.amazon.com/blogs/aws/urgent-important-rotate-your-amazon-rds-aurora-and-documentdb-certificates/]]|AWS Certificates|
|2020.01.08|CBR Online| → [[AWS to DB Users: Download Fresh Certs Urgently, or Risk Applications Breaking|https://www.cbronline.com/cloud/aws-certificate-update/]]|AWS Certificates|
|2020.01.09|Dark Reading| → [[AWS Issues 'Urgent' Warning for Database Users to Update Certs|https://www.darkreading.com/cloud/aws-issues-urgent-warning-for-database-users-to-update-certs/d/d-id/1336766]]|AWS Certificates|
|2020.01.10|Continuity Central| → [[Amazon AWS warns certain users to update certificates or face lost connectivity |https://www.continuitycentral.com/index.php/news/technology/4780-amazon-aws-warns-certain-users-to-update-certificates-or-face-lost-connectivity]]|AWS Certificates|
=== 
* __À lire :__ Rapports Rezilion+++*[»]>
|2020.02.27|//Rezilion//|![[Only Half of Cloud Vulnerabilities Pose Actual Security Threats, Finds Rezilion Study|https://www.rezilion.com/blog/only-half-of-cloud-vulnerabilities-pose-actual-security-threats-finds-rezilion-study/]] ([[Rapport pdf|https://www.rezilion.com/wp-content/uploads/2019/11/Rezilion-CARTA-Runtime-Vuln-Memory-Analysis-Report.pdf]])|Report Rezilion|
|2020.02.27|Security Week| → [[Less Than Half of Vulnerabilities in Popular Docker Images Pose Risk: Study|https://www.securityweek.com/less-half-vulnerabilities-popular-docker-images-pose-risk-study]]|Report Rezilion|
=== et Sophos+++*[»]>
|2020.02.25|//Sophos//|![['Cloud Snooper' Attack Bypasses Firewall Security Measures|https://news.sophos.com/en-us/2020/02/25/cloud-snooper-attack-bypasses-firewall-security-measures/]] ([[rapport|https://news.sophos.com/wp-content/uploads/2020/02/CloudSnooper_report.pdf]])|Report Attacks|
|2020.02.27|Dark Reading| → [['Cloud Snooper' Attack Circumvents AWS Firewall Controls|https://www.darkreading.com/cloud/cloud-snooper-attack-circumvents-aws-firewall-controls/d/d-id/1337171]]|Report Attacks|
=== 
* Rapports : Firemon+++*[»]>
|2020.02.24|//Firemon//|[[New Research: Nearly 60% of Security Professionals Believe Cloud Deployments Surpass Security Capabilities According to FireMon's 2020 State of Hybrid Cloud Security|https://www.realwire.com/releases/FireMons-2020-State-of-Hybrid-Cloud-Security]] ([[rapport|: https://www.firemon.com/2020-state-of-hybrid-cloud-security-report/]])|Report|
|2020.02.24|Dark Reading| → [[Enterprise Cloud Use Continues to Outpace Security|https://www.darkreading.com/cloud/enterprise-cloud-use-continues-to-outpace-security/d/d-id/1337130]]||
|2020.03.18|The Last Watchdog| → [[FireMon survey shows security lags behind fast pace of hybrid cloud deployments|https://www.lastwatchdog.com/shared-intel-firemon-survey-shows-security-lags-behind-fast-pace-of-hybrid-cloud-deployments/]]|Survey|
===, Thales+++*[»]>
|2020.02.24|//Thales//|[[Organizations Struggle with Cloud Security in the Post Digital Transformation Era - Highlights from our 2020 Data Threat Report-Global Edition|https://blog.thalesesecurity.com/2020/02/24/organizations-struggle-with-cloud-security-in-the-post-digital-transformation-era-highlights-from-our-2020-data-threat-report-global-edition/]] ([[rapport|https://www.thalesesecurity.com/2020/data-threat-report]])|Report|
|2020.02.24|Information Age| → [[Lack of encryption in cloud causing security challenges, says Thales study|https://www.information-age.com/lack-encryption-cloud-causing-security-challenges-thales-study-123487867/]]|Report|
=== 
* Annonces Cloud : Cisco+++*[»]>
|2020.02.24|//Cisco//|[[Cisco SecureX|https://www.cisco.com/c/en/us/products/security/securex.html]]|Products Cisco|
|2020.02.24|Silicon Angle| → [[Cisco unifies cloud security with SecureX|https://siliconangle.com/2020/02/24/cisco-unifies-cloud-security-cisco-securex/]]|Products Cisco|
|2020.02.24|BetaNews| → [[Cisco launches new cloud-native security platform|https://betanews.com/2020/02/24/cisco-securex-cloud/]]|Products Cisco|
===, Google+++*[»]>
|2020.02.24|//Google Cloud//|[[Google Cloud Security: continuing to give good the advantage|https://cloud.google.com/blog/products/identity-security/bringing-the-best-of-google-cloud-security-to-the-enterprise]]|Products GCP|
|2020.02.24|ZDnet| → [[Google Cloud unveils new tools for detecting modern threats|https://www.zdnet.com/article/google-cloud-unveils-new-tools-for-detecting-modern-threats/]]|Products GCP|
|2020.02.24|Silicon Angle| → [[Google beefs up cloud protection with new threat detection, fraud prevention tools|https://siliconangle.com/2020/02/24/google-beefs-cloud-protection-new-threat-detection-fraud-prevention-tools/]]|Products GCP|
===  
* Ransomware+++*[»]>
|2020.02.28|CBR Online|[[Ransomware is Encrypting Backups Too, Warns NCSC: From Cloud, to USB|https://www.cbronline.com/news/ncsc-offline-data-backups-advisory]]|Ransomware Backups|
|2020.02.24|//Divvy Cloud//|[[S3 Bucket Ransomware Attack: What Is It and How Can It Happen?|https://divvycloud.com/s3-bucket-ransomware-attack/]]|Ransomware|
=== 
* Divers : APIs+++*[»]>
|2020.02.27|Journal du Net[>img[iCSF/flag_fr.png]]|[[API Amazon S3 : comment protéger les données de la privatisation des standards d'échange ?|https://www.journaldunet.com/solutions/cloud-computing/1489277-api-s3-comment-proteger-nos-donnees-de-la-privatisation-des-standards-d-echange/]]|APIs|
|2020.02.25|//Google GCP//|[[Now, you can explore Google Cloud APIs with Cloud Code|https://cloud.google.com/blog/products/application-development/how-cloud-code-improves-app-dev-on-gcp]]|GCP APIs|
|2020.02.24|Infosec Institute|[[Secure your APIs — don’t give hackers a chance!|https://resources.infosecinstitute.com/secure-your-apis-dont-give-hackers-a-chance/]]|APIs|
===, Fuite de données+++*[»]>
|2020.02.26|The Register|[[Rotherwood Healthcare AWS bucket security fail left elderly patients' DNR choices freely readable online|https://www.theregister.co.uk/2020/02/26/rotherwood_healthcare_data_leak_10k_records_aws/]]|Data_Leak AWS|
===, Gestion d'incident+++*[»]>
|2020.03.01|//AllCloud//|![[Preparing Your Organization for Incident Response on AWS|https://allcloud.io/blog/preparing-your-organization-for-incident-response-on-aws/]]|Incident_Handling AWS|
===, Risques+++*[»]>
|2020.02.25|ISC2|[[White Paper on Cloud Security Risks - And How To Mitigate Them|https://blog.isc2.org/isc2_blog/2020/02/white-paper-on-cloud-security-risks-and-how-to-mitigate-them.html]] ([[livre blanc|https://www.isc2.org/landing/Cloud-Security-Risks]])|Whitepaper ISC2|
=== 
!3 - Weekly Cloud and Security Watch Newsletter[>img[iCSF/inEnglish.png]]
<<tiddler [[2020.03.01 - Weekly Newsletter - March 1st]]>>
!CSA updates and news - February 24th to March 1st
* Blog: 'The Knowledge Gap, Risk of the Unknown & the Certificate of Cloud Auditing Knowledge'+++*[»]> <<tiddler [[2020.02.24 - Blog : Méconnaissance, saut dans l'inconnu et CCAK]]>>=== [>img[iCSF/cloud-security-alliance-fr.png]]
* Artefact: 'Best Practices in Implementing a Secure Microservices Architecture'+++*[»]> <<tiddler [[2020.02.24 - Publication : Bonnes pratiques pour une architecture Microservices]]>>=== 
* Annoucement: CSA Continues to Drive Leadership in Cloud Security with New Research+++*[»]> <<tiddler [[2020.02.24 - Nouvelles études de la CSA]]>>=== 
* Annoucement: Cloud Security Alliance 2020 Initiatives Changing the Face of IT Audit and Cloud Assurance+++*[»]> <<tiddler [[2020.02.24 - Nouvelles approches pour l'audit Cloud]]>>=== 
* Annoucement: Cloud Security Alliance Opens the Call for Papers for [[SECtember]]+++*[»]> <<tiddler [[2020.02.24 - Ouverture prochaine des inscriptions à la conférence SECtember]]>>=== 
!Cloud and Security News Watch
[[Over 60 links|2020.03.01 - Veille Hebdomadaire - 1er mars]] among which:
* Last days to rotate your Amazon RDS, Aurora, and Amazon DocumentDB (with MongoDB compatibility) Certificates
* Must read reports from Rezilion (only half of cloud vulnerabilities pose actual security threats), and Sophos ('Cloud Snooper' attack which circumvents AWS Firewall controls)
* Other reports from Firemon (Enterprise Cloud use continues to outpace security), and Thales (Lack of encryption in cloud causes security challenge)
* Announcements from Cisco (SecureX), and Google (threat detection and fraud prevention tools)
* Misc: APIs, Data leak prevention, Incident Response, Ransomware, and an ISC2 white paper on Cloud security risks
* Threats: S3 Bucket Ransomware Attack
|ssTabl99|k
|!⇒ [[CloudSecurityAlliance.fr/go/K31/|https://CloudSecurityAlliance.fr/go/K31/]] |
|!Mars|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2020.03.01|
|2020.03.01|//AllCloud//|![[Preparing Your Organization for Incident Response on AWS|https://allcloud.io/blog/preparing-your-organization-for-incident-response-on-aws/]]|Incident_Handling AWS|
|!Février|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2020.02.28|
|2020.02.28|Cloud Security Podcast|![[Docker Security Best practice - Container Security 101 in AWS|https://anchor.fm/cloudsecuritypodcast/episodes/Docker-Security-Best-practice--Container-Security-101-in-AWS---Michael-Hausenblaus--Product-Developer-Advocate--AWS-eb5mnj]]|Docker Containers|
|2020.02.28|DevOps|[[Castles in the Cloud: How to Take Your Business Kingdom Off-Prem with Confidence|https://devops.com/castles-in-the-cloud-how-to-take-your-business-kingdom-off-prem-with-confidence/]]|Misc|
|2020.02.28|Solutions Review|[[The Top 6 Cloud Security Books You Need to Read in 2020|https://solutionsreview.com/cloud-platforms/the-top-6-cloud-security-books-you-need-to-read-in-2020/]]|Misc|
|2020.02.28|OrissaPOST|[[BGR India hacked, data dumped on Dark Web|https://www.orissapost.com/bgr-india-hacked-data-dumped-on-dark-web/]]|Data_Leak AWS|
|2020.02.28|The Hacker News|[[Why Businesses Should Consider Managed Cloud-Based WAF Protection|https://thehackernews.com/2020/02/cloud-waf-security.html]]|WAF|
|2020.02.28|CIO Magazine|[[Posture management: Cloud security tools rise in wake of breaches|https://www.cio.com/article/3529426/posture-management-cloud-security-tools-rise-in-wake-of-breaches.html]]|CSPM Data_Breaches|
|2020.02.28|//JumpCloud//|[[Understanding Azure AD’s Basic/O365 Apps Tier|https://jumpcloud.com/blog/understanding-aad-o365-apps/]] (2/4)|AzureAD|
|2020.02.28|//Catchpoint//|[[Monitoring at the Edge of the Third Act of the Internet|https://blog.catchpoint.com/2020/02/28/monitoring-at-the-edge-of-the-third-act-of-the-internet/]]|Networks|
|>|>|>|!2020.02.27|
|2020.02.27|Silicon.fr[>img[iCSF/flag_fr.png]]|[[Le Cloud est-il vraiment si sûr pour nos données ?|https://www.silicon.fr/avis-expert/le-cloud-est-il-vraiment-si-sur-pour-nos-donnees%e2%80%89]]|Data|
|2020.02.27|Journal du Net[>img[iCSF/flag_fr.png]]|[[API Amazon S3 : comment protéger les données de la privatisation des standards d'échange ?|https://www.journaldunet.com/solutions/cloud-computing/1489277-api-s3-comment-proteger-nos-donnees-de-la-privatisation-des-standards-d-echange/]]|APIs|
|2020.02.27|Security Week|[[Let's Encrypt Issues Over 1 Billion Certificates|https://www.securityweek.com/lets-encrypt-issues-over-1-billion-certificates]]|Certificates|
|2020.02.27|TechRepublic|[[Small cloud configuration mistakes can open up big security risks|https://www.techrepublic.com/article/cloud-misconfigurations-are-a-new-risk-for-the-enterprise/]]|Misconfigurations|
|2020.02.27|Secure Cloud Blog|[[Securing Client Credentials Flow with Certificate|https://securecloud.blog/2020/02/27/securing-client-credentials-flow-with-certificate/]]|Certificates|
|2020.02.27|ZDnet|[[Ransomware victims thought their backups were safe. They were wrong|https://www.zdnet.com/article/ransomware-victims-thought-their-backups-were-safe-they-were-wrong/]]|Ransomware Backups|
|2020.02.28|CBR Online| → [[Ransomware is Encrypting Backups Too, Warns NCSC: From Cloud, to USB|https://www.cbronline.com/news/ncsc-offline-data-backups-advisory]]|Ransomware Backups|
|2020.02.27|ZDnet[>img[iCSF/flag_fr.png]]| → [[Ces victimes de ransomware pensaient que leurs sauvegardes étaient en sécurité. Elles avaient tort|https://www.zdnet.fr/actualites/ces-victimes-de-ransomware-pensaient-que-leurs-sauvegardes-etaient-en-securite-elles-avaient-tort-39899921.htm]]|Ransomware Backups|
|2020.02.27|CSA|[[Continuous auditing and continuous certification|https://www.linkedin.com/pulse/continuous-auditing-certification-alain-pannetrat/]]|STAR|
|2020.02.27|//Maarten Goet//|[[Defender ATP & Linux: trusting Microsoft to protect your open-source workloads|https://medium.com/wortell/defender-atp-linux-trusting-microsoft-to-protect-your-open-source-workloads-cf32a2288a45]]|Workloads Linux|
|2020.02.27|//Rezilion//|![[Only Half of Cloud Vulnerabilities Pose Actual Security Threats, Finds Rezilion Study|https://www.rezilion.com/blog/only-half-of-cloud-vulnerabilities-pose-actual-security-threats-finds-rezilion-study/]] ([[Rapport pdf|https://www.rezilion.com/wp-content/uploads/2019/11/Rezilion-CARTA-Runtime-Vuln-Memory-Analysis-Report.pdf]])|Report Rezilion|
|2020.02.27|Security Week| → [[Less Than Half of Vulnerabilities in Popular Docker Images Pose Risk: Study|https://www.securityweek.com/less-half-vulnerabilities-popular-docker-images-pose-risk-study]]|Report Rezilion|
|2020.02.27|//Securosis//|[[Mastering the Journey - Building Network Manageability and Security for your Path|https://.com/blog/mastering-the-journey-building-network-manageability-and-security-for-your-path]] (3/6)|Misc|
|2020.02.27|//UpGuard//|[[What is the Consensus Assessments Initiative Questionnaire (CAIQ)?|https://www.upguard.com/blog/caiq]]|CAIQ|
|2020.02.27|//ForgeRock//|[[Cloud Series: Building a Secure Identity Cloud|https://www.forgerock.com/blog/cloud-series-building-secure-identity-cloud]]|Identity|
|2020.02.27|//Cloud Academy//|[[5 Steps to Vulnerability Management for Containers|https://cloudacademy.com/blog/5-steps-to-vulnerability-management-for-containers/]]|Containers Vulnerability_Management|
|2020.02.27|//Alcide//|[[Are You a Kubernetes Pros or a Kubernetes Novice?|https://blog.alcide.io/are-you-a-kubernetes-pros-or-a-kubernetes-novice]]|Kubernetes|
|>|>|>|!2020.02.26|
|2020.02.26|Dark Reading|[[How to Prevent an AWS Cloud Bucket Data Leak|https://www.darkreading.com/application-security/database-security/how-to-prevent-an-aws-cloud-bucket-data-leak--/d/d-id/1337093]]|Data_Leak AWS|
|2020.02.26|The Register|[[Rotherwood Healthcare AWS bucket security fail left elderly patients' DNR choices freely readable online|https://www.theregister.co.uk/2020/02/26/rotherwood_healthcare_data_leak_10k_records_aws/]]|Data_Leak AWS|
|2020.02.26|CISO Mag|[[What Early Adopters Need to Know About SASE|https://www.cisomag.com/how-to-evaluate-a-sase-vendor/]]|SASE|
|2020.02.26|//Palo Alto Networks//|[[The Role of Identity Access Management (IAM) in Cloud Security|https://blog.paloaltonetworks.com/2020/02/cloud-iam-security/]]|IAM|
|2020.02.26|//AT&T Cybersecurity//|[[To Address Cloud Security Challenges, Simplify and Unify|https://www.channelfutures.com/from-the-industry/to-address-cloud-security-challenges-simplify-and-unify]]|Misc|
|>|>|>|!2020.02.25|
|2020.02.25|Journal du Net[>img[iCSF/flag_fr.png]]|[[Le français InterCloud s'érige en opérateur télécoms des clouds|https://www.journaldunet.com/solutions/cloud-computing/1489191-le-francais-intercloud-s-erige-en-operateur-telecoms-des-clouds/]]|Misc|
|2020.02.25|Nicolas Fischbach|![[Ensure Your Cloud Security Is as Modern as Your Business|https://www.darkreading.com/cloud/ensure-your-cloud-security-is-as-modern-as-your-business/a/d-id/1337080]]|Recommendations|
|2020.02.25|ISC2|[[White Paper on Cloud Security Risks - And How To Mitigate Them|https://blog.isc2.org/isc2_blog/2020/02/white-paper-on-cloud-security-risks-and-how-to-mitigate-them.html]] ([[livre blanc|https://www.isc2.org/landing/Cloud-Security-Risks]])|Whitepaper ISC2|
|2020.03.30|Help Net Security| → [[Whitepaper: Cloud security risks and how to mitigate them|https://www.helpnetsecurity.com/2020/03/30/whitepaper-cloud-security-risks/]]|Whitepaper ISC2|
|2020.02.25|PenTest IT|[[UPDATE: Prowler 2.2.0|https://pentestit.com/prowler-2-2-0-aws-cis-benchmark-tool-released/]]|[[Tools|Outils-GitHub]] Prowler|
|2020.02.25|Help Net Security|[[Cloud-based collaboration tools are a major driver of data exfiltration|https://www.helpnetsecurity.com/2020/02/25/cloud-based-collaboration-tools/]]|Report Code42|
|2020.02.25|Secure Cloud Blog|[[Microsoft 365 - Security Monitoring|https://securecloud.blog/2020/02/25/microsoft-365-security-monitoring/]]|M365 Monitoring|
|2020.02.25|Cloud Academy|[[Azure Kubernetes Service (AKS): What Is It and Why Do We Use It?|https://cloudacademy.com/blog/azure-kubernetes-service-aks-what-is-it-and-why-do-we-use-it/]]|Kubernetes|
|2020.02.25|Gigamon|[[NetFlow/IPFIX Generation from AWS Cloud|https://blog.gigamon.com/2020/02/25/netflow-ipfix-generation-from-aws-clouds/]]|Networks AWS|
|2020.02.25|Computer Weekly|[[Cloud data leaks compounded by lack of automation tools|https://www.computerweekly.com/news/252479094/Cloud-data-leaks-compounded-by-lack-of-automation-tools]]|Data_Leaks|
|2020.02.25|SecurityBrief|[[New Azure and AWS integration announced amid increasing cyber threats|https://securitybrief.eu/story/new-azure-and-aws-integration-announced-amid-increasing-cyber-threats]]|AWS Azure Integration|
|2020.02.25|//Sophos//|![['Cloud Snooper' Attack Bypasses Firewall Security Measures|https://news.sophos.com/en-us/2020/02/25/cloud-snooper-attack-bypasses-firewall-security-measures/]] ([[rapport|https://news.sophos.com/wp-content/uploads/2020/02/CloudSnooper_report.pdf]])|Report Attacks|
|2020.02.25|//Sophos//| → [[The “Cloud Snooper” malware that sneaks into your Linux servers|https://nakedsecurity.sophos.com/2020/02/25/the-cloud-snooper-malware-that-sneaks-into-your-linux-servers/]]|Report Attacks|
|2020.02.25|//Sophos//| → [[Harden your public cloud environment against APT-style attacks|https://news.sophos.com/en-us/2020/02/25/harden-your-public-cloud-environment-against-apt-style-attacks/]]|APT Attacks|
|2020.02.26|Computer Weekly| → [[Cloud Snooper firewall bypass may be work of nation state|https://www.computerweekly.com/news/252479189/Cloud-Snooper-firewall-bypass-may-be-work-of-nation-state]]|Report Attacks|
|2020.02.27|Dark Reading| → [['Cloud Snooper' Attack Circumvents AWS Firewall Controls|https://www.darkreading.com/cloud/cloud-snooper-attack-circumvents-aws-firewall-controls/d/d-id/1337171]]|Report Attacks|
|2020.03.03|CBR Online| → [[Rootkit in the Cloud: Hacker Group Breaches AWS Servers|https://www.cbronline.com/news/aws-servers-hacked-rootkit-in-the-cloud]]|Report Attacks|
|2020.02.25|//Microsoft//|[[Basic Auth and Exchange Online - February 2020 Update|https://techcommunity.microsoft.com/t5/exchange-team-blog/basic-auth-and-exchange-online-february-2020-update/ba-p/1191282]]|O365|
|2020.02.26|The Register| → [[Admins beware! Microsoft gives heads-up for 'disruptive' changes to authentication in Office 365 email service|https://www.theregister.co.uk/2020/02/26/exchange_online_microsoft/]]|O365|
|2020.02.25|//Google GCP//|[[Now, you can explore Google Cloud APIs with Cloud Code|https://cloud.google.com/blog/products/application-development/how-cloud-code-improves-app-dev-on-gcp]]|GCP APIs|
|2020.02.25|//Lastline//|[[The challenge of obtaining visibility into cloud security|https://betanews.com/2020/02/25/visibility-cloud-security/]]|Visibility|
|>|>|>|!2020.02.24|
|2020.02.24|Marteen Goet|[[Microsoft Threat Protection: going down the rabbit hole|https://medium.com/wortell/microsoft-threat-protection-going-down-the-rabbit-hole-6f917d7c98f]]|Threat_Protection|
|2020.02.24|Dark Reading|[[Solving the Cloud Data Security Conundrum|https://www.darkreading.com/cloud/solving-the-cloud-data-security-conundrum/a/d-id/1337074]]|Enryption|
|2020.02.24|Silicon Angle|[[Kubernetes is popular, complex, a security risk, and destined for invisibility|https://siliconangle.com/2020/02/24/kubernetes-is-popular-complex-a-security-risk-and-destined-for-invisibility-thecube/]]|Kubernetes|
|2020.02.24|SC Magazine|[[Phishers using strong tactics and poor bait in Office 365 scam|https://www.scmagazine.com/home/email-security/phishers-using-strong-tactics-and-poor-bait-in-office-365-scam/]]|O365 Phishing|
|2020.02.24|Infosec Institute|[[Secure your APIs — don’t give hackers a chance!|https://resources.infosecinstitute.com/secure-your-apis-dont-give-hackers-a-chance/]]|APIs|
|2020.02.24|//Divvy Cloud//|[[S3 Bucket Ransomware Attack: What Is It and How Can It Happen?|https://divvycloud.com/s3-bucket-ransomware-attack/]]|Ransomware|
|2020.02.24|//StackRox//|[[Top 7 Container Security Use Cases for Kubernetes Environments|https://www.stackrox.com/post/2020/02/top-7-container-security-use-cases-for-kubernetes-environments/]]|Containers|
|2020.02.24|//Google Cloud//|[[Google Cloud Security: continuing to give good the advantage|https://cloud.google.com/blog/products/identity-security/bringing-the-best-of-google-cloud-security-to-the-enterprise]]|Products GCP|
|2020.02.24|ZDnet| → [[Google Cloud unveils new tools for detecting modern threats|https://www.zdnet.com/article/google-cloud-unveils-new-tools-for-detecting-modern-threats/]]|Products GCP|
|2020.02.24|Silicon Angle| → [[Google beefs up cloud protection with new threat detection, fraud prevention tools|https://siliconangle.com/2020/02/24/google-beefs-cloud-protection-new-threat-detection-fraud-prevention-tools/]]|Products GCP|
|2020.02.24|//Firemon//|[[New Research: Nearly 60% of Security Professionals Believe Cloud Deployments Surpass Security Capabilities According to FireMon's 2020 State of Hybrid Cloud Security|https://www.realwire.com/releases/FireMons-2020-State-of-Hybrid-Cloud-Security]] ([[rapport|: https://www.firemon.com/2020-state-of-hybrid-cloud-security-report/]])|Report|
|2020.02.24|Dark Reading| → [[Enterprise Cloud Use Continues to Outpace Security|https://www.darkreading.com/cloud/enterprise-cloud-use-continues-to-outpace-security/d/d-id/1337130]]|
|2020.03.18|The Last Watchdog| → [[FireMon survey shows security lags behind fast pace of hybrid cloud deployments|https://www.lastwatchdog.com/shared-intel-firemon-survey-shows-security-lags-behind-fast-pace-of-hybrid-cloud-deployments/]]|Survey|
|2020.02.24|//Kindite//|[[Cloud Data Protection - Let it Flow|https://blog.kindite.com/cloud-data-protection-let-it-flow]]|Data_Protection|
|2020.02.24|//Gemalto//|[[Testing Cloud application stability using the principles of Chaos Engineering|https://blog.gemalto.com/corporate/2020/02/24/testing-cloud-application-stability-using-the-principles-of-chaos-engineering/]]|Chaos_Engineering|
|2020.02.24|//Cisco//|[[Cisco SecureX|https://www.cisco.com/c/en/us/products/security/securex.html]]|Products Cisco|
|2020.02.24|Silicon Angle| → [[Cisco unifies cloud security with SecureX|https://siliconangle.com/2020/02/24/cisco-unifies-cloud-security-cisco-securex/]]|Products Cisco|
|2020.02.24|BetaNews| → [[Cisco launches new cloud-native security platform|https://betanews.com/2020/02/24/cisco-securex-cloud/]]|Products Cisco|
|2020.02.24|//JumpCloud//|[[Understanding Azure AD’s Free Tier|https://jumpcloud.com/blog/understanding-aad-pricing-free/]] (1/4)|AzureAD|
|2020.02.24|//Thales//|[[Organizations Struggle with Cloud Security in the Post Digital Transformation Era - Highlights from our 2020 Data Threat Report-Global Edition|https://blog.thalesesecurity.com/2020/02/24/organizations-struggle-with-cloud-security-in-the-post-digital-transformation-era-highlights-from-our-2020-data-threat-report-global-edition/]] ([[rapport|https://www.thalesesecurity.com/2020/data-threat-report]])|Report|
|2020.02.24|Information Age| → [[Lack of encryption in cloud causing security challenges, says Thales study|https://www.information-age.com/lack-encryption-cloud-causing-security-challenges-thales-study-123487867/]]|Report|
!"//The Right Questions to Ask Your Vendors in Times of Large-Scale Remote Working//"
[>img(150px,auto)[iCSA/K3QBT.jpg]]^^Article publié le 26 mars 2020 sur le blog de la CSA, et après l'avoir été le 9 mars sur le site de la société Panorays.
Panorays a publié des critères d'évaluation des fournisseurs, répartis en 18 questions dans 4 catégories : généralités, authentification et autorisation, résilience et continuité d'activités, procédure et processus.
&rArr; lire [[l'article|https://CloudSecurityAlliance.fr/go/k3qx/]] sur le blog de la Cloud Security Alliance, ou [[l'original|https://CloudSecurityAlliance.fr/go/k3qz/]]^^

[img(25%,1px)[iCSF/BluePixel.gif]]
!"//Cloud Security for Newly Distributed Engineering Teams//"
[>img(150px,auto)[iCSA/K3NBC.jpg]]^^Article publié le 23 mars 2020 sur le blog de la CSA, et après l'avoir été le 19 mars sur le site de la société Fugue.
&rArr; lire [[l'article|https://CloudSecurityAlliance.fr/go/k3nx/]] sur le blog de la Cloud Security Alliance, ou [[l'original|https://CloudSecurityAlliance.fr/go/k3nz/]]^^


[img(25%,1px)[iCSF/BluePixel.gif]]
!"//New Threat Intelligence Report Reveals the Rise of Emotet//"
[>img(150px,auto)[iCSA/K3GBN.jpg]]^^Article publié le 16 mars 2020 sur le blog de la CSA, et après l'avoir été le 25 février sur le site de la société Mimecast.
&rArr; lire [[l'article|https://CloudSecurityAlliance.fr/go/k3nx/]] sur le blog de la Cloud Security Alliance, ou [[l'original|https://CloudSecurityAlliance.fr/go/k3nz/]]^^


[img(25%,1px)[iCSF/BluePixel.gif]]
!"//California Consumer Privacy Act - 10 Things You Should Know//"
[>img(150px,auto)[iCSA/K3CBC.jpg]]^^Article publié le 12 mars 2020 sur le blog de la CSA, et après l'avoir été le 27 décembre 2019 il y a 2,5 mois sur le site de Françoise Gilbert
Les 10 questions traitées sont :// {{ss2col{
<<<
# What is CCPA?
# Who is subject to CCPA?
# What Personal Information is Protected?
# Transparency and Content of Privacy Notices
# Rights Granted to Consumers
# Transfer of Data to an Affiliated Entity
# Contracts with Service Providers and Third Parties
# Enforcement, Class Actions and Financial Risks
# Differences Between CCPA and GDPR
# Does CCPA Applies to Your Business? Most Probably Yes!
<<<
}}}
//&rArr; lire [[l'article|https://CloudSecurityAlliance.fr/go/k3cx/]] sur le blog de la Cloud Security Alliance, ou [[l'original|https://CloudSecurityAlliance.fr/go/k3cz/]]^^

[img(25%,1px)[iCSF/BluePixel.gif]]
!"//CSA’s Certificate of Cloud Security Knowledge (CCSK) Is Now an Accepted Ohio TechCred® Credential//"
[>img(400px,auto)[iCSA_/CCSK_banner.jpg]]^^Annonce faite le 11 mars 2020 sur le site de la CSA
<<<
//Ohio program allows employers to upskill their employees’ cloud security knowledge, build a stronger, tech-savvy workforce
SEATTLE - March 11, 2020 - The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today announced that its award-winning Certificate of Cloud Security Knowledge (CCSK) exam has been approved as a covered credential and certification under the Ohio TechCred program.
TechCred is a state-run program that gives employers the chance to upskill current and future employees in today’s tech-infused economy by reimbursing them up to $2,000 per credential when current or prospective employees complete an eligible technology-focused credential.//
[...]
<<<
⇒ https://cloudsecurityalliance.org/press-releases/2020/03/11/csa-s-certificate-of-cloud-security-knowledge-ccsk-is-now-an-accepted-ohio-techcred-credential/ ^^

[img(25%,1px)[iCSF/BluePixel.gif]]
!"//CSA’s Certificate of Cloud Security Knowledge Named Winner in 16th Annual Info Security PG’s 2020 Global Excellence Awards®//"
[>img(400px,auto)[iCSA_/CCSK_banner.jpg]]^^Article publié le 9 mars 2020 sur le blog de la CSA
<<<
//Industry’s leading cloud certification program earned Gold
SEATTLE - March 9, 2020 - The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, announced today that Info Security Products Guide, the industry’s leading information security research and advisory guide, has named the Certificate for Cloud Security Knowledge (CCSK) a winner in the 16th Annual 2020 Info Security PG’s Global Excellence Awards®. The CCSK earned Gold in the category for Professional Certification Programs. These prestigious global awards recognize cybersecurity and information technology vendors with advanced, ground-breaking products, solutions, and services that are helping set the bar higher for others in all areas of security and technologies.
The CCSK is the first credential dedicated to cloud security. Called the "mother of all cloud computing certifications" by CIO.com, the vendor-neutral CCSK tests for a broad foundation of cloud security knowledge, covering such topics as architecture, governance, compliance, operations, encryption, and virtualization. It serves as the foundation for those seeking to demonstrate a deep-seated knowledge and competency with cyber, information, software and cloud computing infrastructure security. Since it was launched in 2010, thousands of IT and security professionals have upgraded their skillsets and enhanced their careers through CCSK certification.//
[...]
<<<
__Liens :__
⇒ https://cloudsecurityalliance.org/articles/csa-s-certificate-of-cloud-security-knowledge-named-winner-in-16th-annual-info-security-pg-s-2020-global-excellence-awards/
⇒ https://cloudsecurityalliance.org/press-releases/2020/03/09/csa-s-certificate-of-cloud-security-knowledge-named-winner-in-16th-annual-info-security-pg-s-2020-global-excellence-awards/ ^^

[img(25%,1px)[iCSF/BluePixel.gif]]
!"//RSA Conference 2020: Focusing on Human-Centric Security//"
[>img(150px,auto)[iCSA/K36BR.jpg]]^^Article publié le 6 mars 2020 sur le blog de la CSA, et après l'avoir été le 2 mars 2020 sur le site de la société CipherCloud
__Liens :__
⇒ https://cloudsecurityalliance.org/blog/2020/03/06/rsa-conference-2020-wrap-up/
⇒ https://www.ciphercloud.com/rsa-conference-2020-wrap-up-human-centric-security/ ^^
[img(25%,1px)[iCSF/BluePixel.gif]]
!Actualités, Blog, Publications et Veille "Sécurité du Cloud"
<<tiddler fAll2LiTabs13end with: 202002>>
<<tiddler fAll2Tabs10 with: VeilleM","_202002>>
|!Février|!Sources|!Titres et Liens|!Keywords|
|>|>|>|Aucune alerte pour le moment|
[img(25%,1px)[iCSF/BluePixel.gif]]
<<tiddler .ReplaceTiddlerTitle with: [[Alertes et Vulnérabilités - Février 2020]]>>
<<tiddler fAll2LiTabs10 with: NewsL","202002>><<tiddler .ReplaceTiddlerTitle with: [[Newsletters - Février 2020]]>>
<<tiddler .ReplaceTiddlerTitle with: [[Actualités - Février 2020]]>><<tiddler fAll2LiTabs13end with: 'Actu","202002'>>
<<tiddler fAll2LiTabs13end with: 'Blog","202002'>>
[img(25%,1px)[iCSF/BluePixel.gif]]
<<tiddler .ReplaceTiddlerTitle with: [[Blog - Février 2020]]>>
<<tiddler fAll2LiTabs13end with: 'Publ","202002'>>
[img(25%,1px)[iCSF/BluePixel.gif]]
<<tiddler .ReplaceTiddlerTitle with: [[Publications - Février 2020]]>>
!"//How CSA is Working to Address Privacy//"
[>img(150px,auto)[iCSA/K2PBH.jpg]]Article de blog publié le 25 février 2020 — Rédigé par John DiMaria, Assurance Investigatory Fellow, CSA
<<<
//The European Data Protection Board (EDPB) published an +++*[infographic]> https://ec.europa.eu/commission/sites/beta-political/files/190125_gdpr_infographics_v4.pdf === on compliance and enforcement of the GDPR from May 2018 to January 2019. It shows that 95,180 complaints have been made to EU national data protection authorities by individuals who believe their rights under the GDPR have been violated. Two-thirds of the most common of these complaints had to do with telemarketing and promotional emails, which practically every organization uses as the primary tool of communication.
Anyone can file a complaint about anyone else. The question is — how poised is your organization to prove you have a "Standard of Care" in place to protect your organization and have a documented defense in place? As the cloud is a shared high-risk sector, CSA developed a simple yet high-quality way for Cloud Service Providers to evaluate where they are in the compliance process and get detailed feedback from 3rd party legal experts using the CSA GDPR Code of Conduct (COC). CSA established the +++*[CSA GDPR Center of Excellence (CoE)]> https://gdpr.cloudsecurityalliance.org/ === to help organizations improve their privacy posture and achieve compliance with the European General Data Protection Regulation and other global privacy regulations.
!!What is the GDPR Center of Excellence?
The GDPR CoE coordinates CSA's privacy activities globally with the objective of establishing global standards for privacy compliance. The center focuses on cloud computing, IoT and Blockchain, with cloud being the initial focus.
It aims to improve the level of privacy offered to individuals in their use of technology, to increase transparency and accountability, and accelerate the adoption of privacy designed technology services.
The CoE creates a network of technology customers and providers, subject matter experts, and resources with the goal of defining compliance solutions, and awareness and educational material for privacy.
!!What resources does it have to help with privacy in the cloud?
Two documents were produced and currently in practice to help organizations evaluate themselves and ultimately comply with requirements—the +++*[GDPR Code of Conduct]> https://gdpr.cloudsecurityalliance.org/code-of-conduct === and the Privacy Level Agreement (PLA) Code of Practice.
__GDPR Code of Conduct__
The CSA Code of Conduct for GDPR Compliance provides a consistent and comprehensive framework for complying with the EU's GDPR. The CSA Code of Conduct is designed to offer both a compliance tool for GDPR compliance and transparency guidelines regarding the level of data protection offered by the Cloud Service Provider.
__GDPR Code of Conduct (COC) self-assessment on the STAR registry__
The GDPR COC +++*[self-assessment]> https://gdpr.cloudsecurityalliance.org/star-submit === is an evidenced based self-assessment. Your submission is vetted thoroughly by our GDPR experts and once approved, you can file a PLA Code of Conduct (CoC): Statement of Adherence and your organization will be posted on the registry. After publication, your company will receive authorized use of a Compliance Mark, valid for one year. You are then expected to revise your assessment every time there is a change to the company policies or practices related to the service under assessment.
The GDPR COC is still in the self-assessment stage, but a third-party certification will be available as soon as the CSA COC and Certification Mechanism has been approved by the CSAs Data Protection Authority (DPA) (est. Q3).
!!Establish a security-conscious culture.
It makes sense no matter where you fall in the supply chain to take data privacy seriously. The CSA GDPR COC can help you establish a security-conscious culture. GDPR requires organizations to identify their security strategy and adopt adequate administrative and technical measures to protect personal data. Thanks to CSA's research, the CSA GDPR COC provides the roadmap that will facilitate your organization's efforts to ensure, your processes will become more consolidated, ensuring good governance, compliance and prove that all-important due diligence. Additionally, your data will be easier to use, and you will realize an underlying value and ROI.
//[...]//
You can access the GDPR Code of Conduct +++*[here]> https://gdpr.cloudsecurityalliance.org/code-of-conduct ===. The PLA Code of Practice is available +++*[here]> https://gdpr.cloudsecurityalliance.org/code-of-conduct ===.//
<<<
__Lien :__
* blog original en anglais &rArr; ''[[CloudSecurityAlliance.fr/go/k2pb/|https://CloudSecurityAlliance.fr/go/k2pb/]]''
!Best Practices in Implementing a Secure Microservices Architecture
[>img(200px,auto)[iCSA/K2LPC.jpg]]Des conteneurs d'application et une architecture de micro-services sont mis en œuvre pour concevoir, développer et déployer des applications en s'appuyant sur des approches de développement logiciel agiles telles que le DevOps.
La sécurité doit être intégrée dans ces approches de développement de logiciels.
Ce document sert à identifier les bonnes pratiques en matière de sécurité des microservices dans l'ingénierie de systèmes sécurisés fiables à travers le prisme du développeur, de l'opérateur et de l'architecte.

__Table des Matières :__//
<<<
* 1.0 Overview of the Microservices Architecture
* 1.1 Service Oriented Architecture
* 1.2 Comparison between Monolithic and Microservices Architecture
* 1.3 Benefits and Challenges of Microservices
* 2.0 Microservices Architecture for Cloud-Native Applications
* 2.1 Overall Threat Model and Associated Best Practices
* 2.2 Securing the API
* 2.3 Authorization and Access Control for Microservices
* 2.4 Secure Deployment Styles and Strategies in Microservices Architecture
* 2.5 Stateful and Stateless Microservices Security
* 2.6 Container Storage Interfaces
* 2.7 Runtime Security
* 3.0 Microservices Secure Development and Governance
* 3.1 Container Security Best Practices in Microservices
* 3.2 Microservices Detective Controls
* 3.3 Microservices Messaging Patterns
* 3.4 Microservices Governance
* 4.0 Decomposing Monolithic Applications
* 4.1 Microservices: Use Cases
* 4.2 Microservices: Features
* 4.2.1 Microservice Integrity Validation
* 4.3 Monolithic Application Decomposition Best Practices
* Appendix A: Acronyms
* Appendix B: Glossary
* Appendix C: References
<<<
//__Liens :__
* Annonce ⇒ ''[[CloudSecurityAlliance.fr/go/k2om/|https://CloudSecurityAlliance.fr/go/k2om/]]''
* Document (pdf) ⇒ ''[[CloudSecurityAlliance.fr/go/k2on/|https://CloudSecurityAlliance.fr/go/k2on/]]''
!"//The Knowledge Gap, Risk of the Unknown & the Certificate of Cloud Auditing Knowledge//"
[>img(150px,auto)[iCSA/K2OBT.jpg]]Article de blog publié le 24 février 2020 — Rédigé par Daniele Catteddu+++*[»]> https://fr.linkedin.com/in/danielecatteddu [>img[iCSA/DanieleCatteddu.jpg]]===, Chief Technology Officer, CSA 
<<<
//I have a business admin academic background and so I have always approached cybersecurity risk management using those lenses. The more I have looked at the issues in cybersecurity, the more I am convinced that if you want to manage your risk, you need to be able to make informed decisions which requires access to data and information as well as the skills and expertise to analyze and make good sense of it.
Cloud has never been only a change in technology; it has also introduced a new business model around how to produce and consume information and communication (ICT) services. This new business model is heavily permeated with business relationships that deal with untrusted parties (CSPs) that have a vital role for companies, often being the backbone and neural system of the organization.
This creates challenges in:
* Coordinating and integrating internal processes and tools with the third parties’ services and products
* Understanding the interdependencies within the supply chain
* Measuring trust and risk
!!Dangers of Interdependence
Referring to the wisdom of Dan Geer, one of my favorite security experts, interdependencies create complexity and complexity is an enemy of security. Complexity hides interdependencies and creates unacknowledged correlated risks, which are almost impossible to manage since they are, like a black swan, unexpected and unpredictable.
!!The real issue isn’t reliable data, it’s our ability to analyze the data.
When it comes to making informed risk-based decisions, we seem to have enough reliable information to base our decisions on (of course we can always increase the quality of data). Where we are lagging behind, is our analysis and evaluation capabilities; not because our current workforce is not intelligent enough, but rather because there are knowledge and mindset gaps.
''The fact that after almost 15 years of cloud computing, we are still struggling with the shared responsibility model is symptomatic of the nature and magnitude of the problem we are facing.''
Complex supply chains and the shared responsibilities model are at the core of the educational gap we are talking about. Cloud imposed a new governance approach based on indirect control. But as we all know, doing something yourself is not the same as managing someone who will do that for you.
!!It’s about being a good manager, not just being a technical expert.
Inside IT teams are often technologists, but not necessarily managers. Because of this, they often miss an accountability mindset. They need to not only understand the technical aspects of their cloud architecture, but also be able to select and manage their vendors by asking them to provide the right evidence to prove they are indeed doing what they claim they will.
In other terms, what the market requires is IT and security professionals who are also practitioners, managers and auditors. They need to be able to identify the right questions to ask third parties both during the vetting process and during the continuous monitoring of the service execution. They need to know how to read the contract and technical documentation made available by the CSPs, understand how to build and manage SLAs, be able to manage compliance, etc. In other words, they need to put themselves in the shoes of security auditor, assessor, or evaluator and develop an auditor mindset.
!!The knowledge gap is also a reflection of an educational offering gap.
The lack of educational offerings in this area has been one of the main reasons that pushed CSA to work on a professional credential for cloud auditing. We want to fill the gap by building a certificate and training that equips the ICT workforce in leading and managing the cloud journey of the company they work for.
!!The Certificate of Cloud Auditing Knowledge (CCAK).
In this CCAK program we’ll focus on cloud governance, risk management and compliance. It will ensure participants know CSA’s best practices for audit and assessment and understand how to build a cloud auditing program. Our security control framework, the Cloud Control Matrix (CCM), will also be an important component of the body of knowledge.
The education program is meant to:
* Extend existing IS auditor certifications like ISACA CISA and security auditor certifications like ISO27001 Lead Auditor by providing additional expertise on how to assess the cloud and how to build and execute a cloud auditing program.
* Extend existing cloud security certificates like the CCSK by expanding on their curriculum with additional resources on how to govern, assess and evaluate the cloud.
If you are a cloud security expert and/or a security auditor and interested in getting involved in the CCAK development, please reach out to CSA +++*[here]> https://cloudsecurityalliance.org/education/ccak ===.
//[...]
<<<
__Lien :__
* blog original en anglais &rArr; ''[[CloudSecurityAlliance.fr/go/k2ob/|https://CloudSecurityAlliance.fr/go/k2ob/]]''
!"//Cloud Security Alliance 2020 Initiatives Changing the Face of IT Audit and Cloud Assurance//"
<<<
//''Certificate of Cloud Auditing Knowledge and Cloud Controls Matrix v4 represent critical progress to modernize the audit profession and align cloud assurance with technology innovations''

SAN FRANCISCO - FEB. 24, 2020 - RSA CONFERENCE - The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications and best practices to help ensure a secure cloud computing environment, today announced a call for subject-matter experts to support the ongoing review of its flagship document, the ''Cloud Controls Matrix (CCM)'', Version 4 of which will be released later this year. CCM v4 will reflect the current cloud technology landscape, providing cloud users with a better, more comprehensive security framework and guidelines to facilitate both implementation and audit.

Additionally, CSA is pleased to announce that the Certificate of ''Cloud Auditing Knowledge (CCAK)'' subject-matter expert working group has held initial program development meetings and that the CCAK credential and courseware will be previewed at CSA’s [[SECtember]] conference (Seattle, Sept. 14-18). The CCAK is a new credential for industry professionals that demonstrates expertise in the essential principles of assessing and auditing cloud computing systems and will be released in the second half of 2020. The CCAK will provide a common baseline of knowledge and shared nomenclature to ensure that IT and security professionals, as well as auditors, have the right expertise and tools to appropriately and accurately understand and measure the effectiveness of cloud security controls.

“For 11 years, the Cloud Security Alliance has led the industry in delivering the necessary innovations to build the trusted cloud ecosystem on a global basis. In 2020, CSA will focus on supporting the cloud community in acquiring the necessary tools, skills, and expertise to ensure that the many iterations of cloud meet robust security and privacy objectives,” said 

Daniele Catteddu, Chief Technology Officer, Cloud Security Alliance. “As organizations adopt DevOps, CI/CD, and related innovations, the audit function must keep pace. With the release of CCM and CCAK, we continue to support the community in their cloud journeys.”

The Cloud Controls Matrix is the de facto standard in the market. Its latest iteration will include new control objectives in areas such as container and microservices, cryptography, and identity and access management, along with implementation guidance, and will improve upon the auditability of existing controls.

Cloud auditing skills are becoming a mandatory requirement for IT auditors and will become fundamental expertise for any IT manager and professional, especially in the areas of governance, risk management, compliance, and vendor/supply chain management. Traditional IT audit education and certification do not adequately prepare professionals for the challenges cloud provides. Recent breaches demonstrate the knowledge and responsibility gap that comprehensive cloud auditing frameworks such as the CCAK will solve.

Those interested in contributing to the development of the CCAK are encouraged to join the CSA ''Cloud Audit Expert Group''. Group members should be familiar with CSA’s best practices and control frameworks, such as the ''Cloud Controls Matrix (CCM)'', the ''Consensus Assessment Initiative Questionnaire (CAIQ)'', and ''CSA STAR levels of assessment'', as well as have knowledge in such key areas as cloud risk management, compliance, continuous auditing, and more. Members will be tasked with reviewing and providing advice on the scope, curriculum, objectives structure, go-to-market, and value proposition for the CCAK.

CSA thanks our corporate member and cloud assurance pioneer, Whistic, for its vision in supporting this initiative as a founding member.// [...]
<<<
&rArr; Lire [[l'annonce|https://CloudSecurityAlliance.fr/go/k2oi/]] sur le site de la CSA.

!"//CSA Continues to Drive Leadership in Cloud Security with New Research//"
<<<
//Latest initiatives serve to steer enterprises on a successful cloud migration journey
SAN FRANCISCO - Feb. 24, 2020 - RSA CONFERENCE 2020 - The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications and best practices to help ensure a secure cloud computing environment, today announced three new publications that further CSA’s commitment to helping cloud security professionals successfully steer their enterprises on their journey to the cloud: ''Banking on the Cloud - Real-World Use in the Financial Services Sector'', ''Best Practices in Implementing a Secure Microservices Architecture'', and ''DevSecOps: Collective Responsibility''. Additionally, CSA, in collaboration with McGraw-Hill, announced the release of “CCSK Certificate of Cloud Security Knowledge All-in-One Exam,” by CSA-authorized trainer Graham Thompson, as a comprehensive guide to version 4 of the CCSK.
The ''Cloud Usage in the Financial Services Sector'' report provides insight into the banking and finance sectors’ real-world use. Most strikingly, the survey, which was conducted by CSA’s ''Financial Services Stakeholder Platform (FSSP) Working Group'', found that 91 percent of respondents are actively using cloud services or plan to use them in the next six to nine months — double the number since ''CSA’s last financial services sector survey'' four years ago. Among the survey’s other key findings:
* The top 25 percent of respondents already have over half their regulated workloads in public cloud services;
* 52 percent of respondents have a formal cloud security policy or standard as part of their overall Enterprise Risk Management Framework (ERMF); and
* 90 percent of respondents have a key management policy applicable to regulated and critical data, and of them, 42 percent require "on-premise" key management for regulated data and 49 percent do so for critical data.
''DevSecOps: Collective Responsibility'' is part of a planned series that will focus on the area of an organization’s security posture that is arguably the foundation for all others - collective responsibility. Drafted by CSA and SAFECode, the paper provides a set of considerations that should be taken into account and identifies methods for 1) creating and maintaining executive support and engagement, 2) building an inclusive cultural program based on cumulative experience, 3) creating deep engagement through security champions, and 4) using metrics to sustain, build, and help evolve the program. This paper addresses two key culture-related measurement issues:
* How what you measure drives culture
* The challenge of measuring something as intangible as culture
''Best Practices for Implementing a Secure Microservices Architecture'' provides detailed guidance on secure application development with microservices architectures versus traditional architectures. The design of microservices architecture is intended to address the limitations of traditional application architectures. This technical guidance applies to the secure development and governance of cloud-native applications and the decomposing of applications for the cloud. ''Best Practices for Microservices'' is the third of four releases on the challenges and best practices related to application containers and microservices following ''Challenges in Securing Containers and Microservices'', and ''Best Practices for Implementing Secure Containers''.
“These diverse research projects paint a picture of cloud computing in 2020. Cloud adoption is accelerating within critical infrastructure industries where security is paramount, while organizations are embedding security into state-of-the-art cloud software development,” said John Yeoh, Global Vice President of Research at Cloud Security Alliance.
Mastery of CSA research is proven by obtaining the ''Certificate of Cloud Security Knowledge (CCSK)''. CSA is proud to collaborate with McGraw-Hill and announce the release of the “CCSK Certificate of Cloud Security Knowledge All-in-One Exam Guide,” written by CSA-authorized trainer Graham Thompson. The book offers exam-focused coverage of the latest cloud technologies, including virtualization, governance and security. Readers will receive real-world examples and best practices, online content that includes access to 120 additional practice questions, and a 10-percent discount code for the CCSK exam. Beyond exam preparation, the book also serves as a valuable on-the-job reference. Available for pre-order now with shipments starting March 13, 2020, the book can be purchased online for $50 through McGraw-Hill.//
[...]
<<<
__Lien :__
* annonce originale en anglais &rArr; ''[[CloudSecurityAlliance.fr/go/k2oa/|https://CloudSecurityAlliance.fr/go/k2oa/]]''
!"//Cloud Security Alliance Opens the Call for Papers for SECtember//"
[>img(300px,auto)[iCSA/202009US-SECtember.png]]L'appel à contribution est ouvert jusqu'au ''1^^er^^ mai 2020''.
<<<
//''Registration for leading cloud-security event opens March 16''
SAN FRANCISCO - FEB. 24, 2020 - RSA CONFERENCE 2020 - The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications and best practices to help ensure a secure cloud computing environment, today announced the open +++*[Call for Papers]> http://sectember.com/cfp === (CFP) for [[SECtember]], CSA’s signature event to be held in Seattle, Sept. 14-18, 2020. [[SECtember]], which represents the intersection of cloud and cybersecurity, is paving the way for future industry education with a focus on the key issues and trends facing cloud and cybersecurity. The CFP is currently open through May 1.

As cloud takes over the computing technology landscape, it is fast becoming the foundation for transforming cybersecurity. [[SECtember]] is assuming the mantle to serve as the model for all future industry education, providing deep dives into technical topics such as state-of-the-art DevSecOps practices, containerization, serverless computing, and critical cloud threat vectors. Notable subject-matter experts will share their insight on a broad scope of industry topics, including global privacy strategies encompassing the General Data Protection Regulations, the California Consumer Privacy Act, and other key mandates.

“SECtember’s educational sessions will be characterized by real-world enterprise experiences delivering highly secure and mission critical cloud services. We will prioritize CFP respondents who have ‘been there and done that’ and have a strong grasp of the cloud security trends to come,” said Jim Reavis, co-founder and CEO, Cloud Security Alliance.

The annual event will offer an enhanced roster of training, including the following course line-up:
* ''Certificate of Cloud Security Knowledge (CCSK) Foundation'' (1-day course offered on both Sept. 14 and Sept. 15)
* ''Certificate of Cloud Auditing Knowledge'' (Sept. 15)
* ''Certificate of Cloud Security Knowledge - Plus - Azure'' (Sept. 14-15)
* ''Certificate of Cloud Security Knowledge - Plus - AWS'' (Sept. 14-15)
* ''Advanced Cloud Security Practitioner'' (Sept. 14-15)
[[SECtember]] will also feature numerous opportunities to access to Seattle’s leading technology and cybersecurity companies. Executive briefings are being established for organizations and governments seeking to send delegations to maximize the benefits of this unique conference.

Early registration pricing ($995) is available beginning March 16 through May 29, after which rates will increase to $1,195 through Sept. 4. Late pricing rates of $1,495 will go into effect Sept. 5 through Sept. 18.
Visit the +++*[website]> https://sectember.com/ ou https://csacongress.org/event/sectember-2020/ === for more information and to stay up-to-date on the latest event news.//
[...]
<<<
__Liens :__
* annonce originale en anglais &rArr; ''[[CloudSecurityAlliance.fr/go/k2os/|https://CloudSecurityAlliance.fr/go/k2os/]]''
!1 - Les nouveautés CSA de la semaine du 17 au 23 février 2020
* Blog : Challenges 2020 pour la sécurité du Cloud+++*[»]> <<tiddler [[2020.02.18 - Blog : Challenges 2020 pour la sécurité du Cloud']]>>=== [>img[iCSF/cloud-security-alliance-fr.png]]
* Actu : Appel à contribution pour la conférence [[SECtember]]+++*[»]> <<tiddler [[2020.02.19 - Appel à contribution pour la conférence SECtember]]>>=== 
* Publication : les 6 piliers du DevSecOps : la responsabilité collective+++*[»]> <<tiddler [[2020.02.21 - Publication : les 6 piliers du DevSecOps : la responsabilité collective]]>>=== 
* Publication : Utilisation des Services Cloud dans le Secteur Finance+++*[»]> <<tiddler [[2020.02.21 - Publication : Utilisation des Services Cloud dans le Secteur Finance]]>>=== 
* Blog : Propositions sur l'Intelligence Artificielle par la Maison Blanche+++*[»]> <<tiddler [[2020.02.18 - Blog : Publication de propositions sur l'Intelligence Artificielle par la Maison Blanche]]>>=== 
* Actu : Appel à commentaires sur le document 'Software-Defined Perimeter (SDP) and Zero Trust'+++*[»]> <<tiddler [[2020.02.17 - Appel à commentaires : 'Software-Defined Perimeter (SDP) and Zero Trust']]>>=== 
!2 - Veille Web
La [[Veille Web|2020.02.23 - Veille Hebdomadaire - 23 février]] avec plus de 80 liens dont :
* Fuites de données : MGM+++*[»]>
|2020.02.20|ZDnet|[[Exclusive: Details of 10.6 million MGM hotel guests posted on a hacking forum|https://www.zdnet.com/article/exclusive-details-of-10-6-million-of-mgm-hotel-guests-posted-on-a-hacking-forum/]]|DataLeak|
|2020.02.20|Bleeping Computer| → [[Hackers Share Stolen MGM Resorts Guest Database with 10M+ Records|https://www.bleepingcomputer.com/news/security/hackers-share-stolen-mgm-resorts-guest-database-with-10m-records/]]|DataLeak|
|2020.02.20|infoRisk Today| → [[Hackers Post Details on MGM Resorts Guests: Report|https://www.inforisktoday.com/hackers-post-details-on-mgm-resorts-guests-report-a-13743]]|DataLeak|
|2020.02.20|Dark Reading| → [[Personal Info of 10.6M MGM Resort Guests Leaked Online|https://www.darkreading.com/attacks-breaches/personal-info-of-106m-mgm-resort-guests-leaked-online/d/d-id/1337102]]|DataLeak|
===, NextMotion+++*[»]>
|2020.02.19|Cybersecurity Insiders|[[Plastic surgery videos leaked due to misconfigured Amazon Web Services Cloud|https://www.cybersecurity-insiders.com/plastic-surgery-videos-leaked-due-to-misconfigured-amazon-web-services-cloud/]]|Data_Leak|
=== 
* AWS : remédiation+++*[»]>
|2020.02.18|Nathan Getty|[[AWS Automated Remediation - Part 2: S3 Buckets|https://getsec.github.io/2020/02/aws-remedy-2/]] (2/2)|AWS Remediation|
|2020.02.08|Nathan Getty|[[AWS Automated Remediation - Part 1: Security Groups|https://getsec.github.io/2020/02/aws-remedy-1/]] (1/2)|AWS Remediation|
=== 
* Azure : diverses annonces et rapports+++*[»]>
|2020.02.21|Thomas Naunheim|[[Azure AD Tenant Hardening - Considerations of default settings|https://www.cloud-architekt.net/azuread-tenant-hardening-security-settings-considerations/]]|AzureAD|
|2020.02.20|Nino Crudele|![[Azure Reconnaissance and Scanning for Ethical Hackers and Special Ops Team|https://ninocrudele.com/azure-reconnaissance-and-scanning-for-ethical-hackers-and-special-ops-team-free-whitepaper]] ([[rapport|https://ninocrudele.com/wp-content/docs/Azure-Reconnaissance-and-Scanning-for-Ethical-Hackers-and-Special-Ops-Team.pdf]])|Azure PenTesting|
|2020.02.20|//Microsoft Azure//|[[Microsoft Threat Protection Now Generally Available|https://www.securityweek.com/microsoft-threat-protection-now-generally-available]]|Azure Threat_Protection|
|2020.02.20|//Microsoft Azure//|[[Microsoft Threat Protection stops attack sprawl and auto-heals enterprise assets with built-in intelligence and automation|https://www.microsoft.com/security/blog/2020/02/20/microsoft-threat-protection-intelligence-automation/]]|Azure Threat_Protection|
|2020.02.20|Dark Reading| → [[Microsoft Announces General Availability of Threat Protection, Insider Risk Management|https://www.darkreading.com/cloud/microsoft-announces-general-availability-of-threat-protection-insider-risk-management-/d/d-id/1337105]]|Azure Threat_Protection|
|2020.02.20|//Microsoft Azure//|[[Azure Sentinel uncovers the real threats hidden in billions of low fidelity signals|https://www.microsoft.com/security/blog/2020/02/20/azure-sentinel-uncovers-real-threats-hidden-billions-low-fidelity-signals/]]|Azure_Sentinel|
|2020.02.20|//Microsoft Azure//|[[Azure Security Center for IoT RSA 2020 announcements|https://azure.microsoft.com/en-us/blog/azure-security-center-for-iot-rsa-2020-announcements/]]|Azure IoT|
=== 
* Rapports : Barracuda Networks+++*[»]>
|2020.02.20|//Barracuda Networks//|[[New survey indicates security is the top concern restricting faster public cloud adoption|https://www.barracuda.com/news/article/805]] ([[rapport|https://www.barracuda.com/cloud-market]])|Report|
|2020.02.21|Solutions Review| → [[Barracuda: Security and Network Integration are Major Cloud Concerns|https://solutionsreview.com/cloud-platforms/barracuda-security-and-network-integration-are-major-cloud-concerns/]]|Report|
===, Center for Cybersecurity Policy and Law (sur FedRAMP)+++*[»]>
|2020.02.21|Center for Cybersecurity Policy and Law|![[The Future of FedRAMP|https://centerforcybersecuritypolicy.org/the-future-of-fedramp]] ([[rapport PDF|https://static1.squarespace.com/static/5acbb666f407b432519ab15e/t/5e4fd3bf54725e7ce0483940/1582289857151/20-120+Cybersecurity+-+FedRAMP+brochure.pdf]])|FedRAMP Compliance|
|2020.02.21|NextGov| → [[Industry: Include Agencies’ Approval of Cloud Service Providers in FISMA Metrics|https://www.nextgov.com/cybersecurity/2020/02/industry-include-agencies-approval-cloud-service-providers-fisma-metrics/163265/]]|FedRAMP Compliance|
===, Code42+++*[»]>
|2020.02.20|//Code42//|[[Code42 Data Exposure Report: Collaborative Work Environments, Dynamic Workforce Exacerbate Insider Threat Problem|https://vmblog.com/archive/2020/02/20/code42-data-exposure-report-collaborative-work-environments-dynamic-workforce-exacerbate-insider-threat-problem.aspx]] ([[rapport|https://www.code42.com/go/2020-data-exposure-report-g/]])|Report Code42|
===, Divvy Cloud+++*[»]>
|2020.02.18|//Divvy Cloud//|[[2020 Cloud Misconfigurations Report|https://divvycloud.com/misconfigurations-report-2020/]] ([[rapport pdf|https://divvycloud.com/wp-content/uploads/2020/02/Cloud-Misconfiguration-Report-FINAL.pdf]])|Report Misconfiguration|
|2020.02.19|//Divvy Cloud//| → [[New DivvyCloud Report Finds Breaches Caused by Cloud Misconfigurations Cost Enterprises Nearly $5 Trillion|https://divvycloud.com/new-divvycloud-misconfigurations-report/]]|Report Misconfiguration|
|2020.02.19|BetaNews| → [[Cloud misconfigurations expose over 33 billion records in two years|https://betanews.com/2020/02/19/cloud-misconfiguration/]]|Report Misconfiguration|
|2020.02.19|TechRepublic| → [[Cloud misconfigurations cost companies nearly $5 trillion|https://www.techrepublic.com/article/cloud-misconfigurations-cost-companies-nearly-5-trillion/]]|Report Misconfiguration|
|2020.02.20|Help Net Security| → [[Cloud misconfigurations surge, organizations need continuous controls|https://www.helpnetsecurity.com/2020/02/20/cloud-misconfigurations/]]|Report Misconfiguration|
|2020.02.21|Enterprise Talk| → [[Cloud Misconfigurations - Losses are Expected to Reach $5tn, Says DivvyCloud|https://enterprisetalk.com/featured/cloud-misconfigurations-losses-are-expected-to-reach-5tn-says-divvycloud/]]|Report Misconfiguration|
===, Imperva+++*[»]>
|2020.02.19|//Imperva//|[[Spikes in High-risk Vulnerabilities and Public Cloud-based Attacks Dominate Threat Landscape, Imperva Researchers Find with New Cyber Threat Index|https://www.imperva.com/company/press_releases/imperva-launches-cyber-threat-index/]] ([[Index|https://www.imperva.com/cyber-threat-index/]])|Report Threat_Index|
|2020.02.21|Help Net Security| → [[High-risk vulnerabilities and public cloud-based attacks on the rise|https://www.helpnetsecurity.com/2020/02/21/high-risk-vulnerabilities-rise/]]|Report|
===, NetSkope+++*[»]>
|2020.02.19|//NetSkope//|[[Cybercriminals Find Cover in the Cloud: New Netskope Research Finds 44% of Threats are Cloud-Enabled|https://www.netskope.com/press-releases/cloud-threat-report]] ([[rapport|https://resources.netskope.com/cloud-reports/cloud-and-threat-report-february-2020-edition]])|Report|
|2020.02.19|Dark Reading| → [[44% of Security Threats Start in the Cloud|https://www.darkreading.com/cloud/44--of-security-threats-start-in-the-cloud/d/d-id/1337088]]|Report|
|2020.02.21|Help Net Security| → [[Cloud-enabled threats are on the rise, sensitive data is moving between cloud apps|https://www.helpnetsecurity.com/2020/02/21/cloud-enabled-threats/]]|Report|
|2020.02.21|Continuity Central| → [[New threat landscape report highlights cyber risk trends|https://www.continuitycentral.com/index.php/news/technology/4902-new-threat-landscape-report-highlights-cyber-risk-trends]]|Report|
|2020.02.21|Solutions Review| → [[Netskope Releases February 2020 Netskope Cloud and Threat Report|https://solutionsreview.com/security-information-event-management/netskope-releases-february-2020-netskope-cloud-and-threat-report/]]|Report|
===, StackRox+++*[»]>
|2020.02.19|//StackRox//|[[5 Surprising Findings from StackRox's Latest Kubernetes Security Report|https://www.stackrox.com/post/2020/02/5-surprising-findings-from-stackroxs-latest-kubernetes-security-report/]] ([[rpport|https://security.stackrox.com/state-of-containers-and-kubernetes-security-report-winter-2020.html]])|Report|
|2020.02.19|Container Journal| → [[StackRox Report Reveals that Container and Kubernetes Security Concerns are Inhibiting Business Innovation|https://containerjournal.com/news/news-releases/stackrox-report-reveals-that-container-and-kubernetes-security-concerns-are-inhibiting-business-innovation/]]|Report|
=== 
* Divers : Chaos Engineering+++*[»]>
|2020.02.18|//CyberArk Conjur//|[[Security Challenges Around Chaos Engineering|https://www.conjur.org/blog/security-challenges-around-chaos-engineering/]]|Chaos_Engineering|
|2020.02.18|//Sensu//|[[Chaos engineering + monitoring, part 2: for starters|https://blog.sensu.io/chaos-engineering-monitoring-part-2-for-starters]] (2/3)|Chaos_Engineering|
|2019.07.02|//Sensu//|[[Chaos engineering + monitoring, part 1: Sensu + Gremlin|https://blog.sensu.io/chaos-engineering-monitoring-part-1-sensu-gremlin]] (1/3)|Chaos_Engineering|
===, IDaaS, responsabilité(s)+++*[»]>
|2020.02.21|//IBM//|[[Making Cloud Security a Team Sport|https://securityintelligence.com/posts/making-cloud-security-a-team-sport/]]|Best_Practices Responsibility|
|2020.02.21|//Core Security//|[[The Shared Responsibility of Cloud Security|https://www.coresecurity.com/blog/shared-responsibility-cloud-security]]|Shared_Responsibility|
=== 
!3 - Weekly Cloud and Security Watch Newsletter[>img[iCSF/inEnglish.png]]
<<tiddler [[2020.02.23 - Weekly Newsletter - February 23rd]]>>
!CSA updates and news - February 17th to 23rd
* Blog: Cloud Security Challenges in 2020, Proposed Principles for Artificial Intelligence Published by the White House [>img[iCSF/cloud-security-alliance-fr.png]]
* News: Call for Papers for the [[SECtember]] conference
* Document: The Six Pillars of DevSecOps: Collective Responsibility, Cloud Usage in the Financial Services Sector 
* Request for comments: Software-Defined Perimeter (SDP) and Zero Trust
!Cloud and Security News Watch
[[Over 80 links|2020.02.23 - Veille Hebdomadaire - 23 février]] among which:
* Data leaks: MGM, NextMotion
* AWS: remédiation
* Azure: products and service announcements, report
* Reports: Barracuda Networks, Center for Cybersecurity Policy and Law (sur FedRAMP), Code42, Divvy Cloud, Imperva, NetSkope, StackRox
* Misc: Chaos Engineering», IDaaS, Shared responsibility
|ssTabl99|k
|!⇒ [[CloudSecurityAlliance.fr/go/K2N/|https://CloudSecurityAlliance.fr/go/K2N/]] |
|!Février|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2020.02.22|
|2020.02.22|Dark Reading|[[All About SASE: What It Is, Why It's Here, How to Use It|https://www.darkreading.com/cloud/all-about-sase-what-it-is-why-its-here-how-to-use-it/d/d-id/1337120]]|SASE|
|>|>|>|!2020.02.21|
|2020.02.21|Thomas Naunheim|[[Azure AD Tenant Hardening - Considerations of default settings|https://www.cloud-architekt.net/azuread-tenant-hardening-security-settings-considerations/]]|AzureAD|
|2020.02.21|IT Business|[[Experts chime in on how to avoid misconfigurations in the cloud|https://www.itbusiness.ca/news/experts-chime-in-on-how-to-avoid-misconfigurations-in-the-cloud/114219]]|Misconfigurations|
|2020.02.21|Computer Weekly|[[Kubernetes storage 101: Container storage basics|https://www.computerweekly.com/feature/Kubernetes-storage-101-Container-storage-basics]]|Storage Kubernetes|
|2020.02.21|Center for Cybersecurity Policy and Law|![[The Future of FedRAMP|https://centerforcybersecuritypolicy.org/the-future-of-fedramp]] ([[rapport PDF|https://static1.squarespace.com/static/5acbb666f407b432519ab15e/t/5e4fd3bf54725e7ce0483940/1582289857151/20-120+Cybersecurity+-+FedRAMP+brochure.pdf]])|FedRAMP Compliance|
|2020.02.21|NextGov| → [[Industry: Include Agencies’ Approval of Cloud Service Providers in FISMA Metrics|https://www.nextgov.com/cybersecurity/2020/02/industry-include-agencies-approval-cloud-service-providers-fisma-metrics/163265/]]|FedRAMP Compliance|
|2020.02.21|Ryan Stalets|![[Abusing AWS Architecture and How to Defend It - Ryan Stalets (vidéo)|https://www.youtube.com/watch?v=nEZ4oqn17PE]]|AWS S3 Attacks|
|2020.02.21|Container Journal|[[Container Security Concerns Impacting Deployments|https://containerjournal.com/topics/container-security/container-security-concerns-impacting-deployments/]]|Containers|
|2020.02.21|//IBM//|[[Making Cloud Security a Team Sport|https://securityintelligence.com/posts/making-cloud-security-a-team-sport/]]|Best_Practices Responsibility|
|2020.02.21|//Core Security//|[[The Shared Responsibility of Cloud Security|https://www.coresecurity.com/blog/shared-responsibility-cloud-security]]|Shared_Responsibility|
|2020.02.21|//Capsule8//|[[Container Security - Nobody Knows What It Means But It’s Provocative|https://capsule8.com/blog/container-security-nobody-knows-what-it-means-but-its-provocative/]]|Containers|
|2020.02.21|//Compare the Cloud//|[[Solving Surveillance Storage Woes with the Cloud|https://www.comparethecloud.net/articles/cloud/solving-surveillance-storage-woes-with-the-cloud/]]|Storage|
|2020.02.21|//Forcepoint//|[[Visibility is the first step to better cloud security|https://federalnewsnetwork.com/commentary/2020/02/visibility-is-the-first-step-to-better-cloud-security/]]|Visibility|
|2020.02.21|//Sophoes//|[[Five steps to avoid a cloud data breach|https://news.sophos.com/en-us/2020/02/21/five-steps-to-avoid-a-cloud-data-breach/]]|Data_Breach Prevention|
|>|>|>|!2020.02.20|
|2020.02.20|Nino Crudele|![[Azure Reconnaissance and Scanning for Ethical Hackers and Special Ops Team|https://ninocrudele.com/azure-reconnaissance-and-scanning-for-ethical-hackers-and-special-ops-team-free-whitepaper]] ([[rapport|https://ninocrudele.com/wp-content/docs/Azure-Reconnaissance-and-Scanning-for-Ethical-Hackers-and-Special-Ops-Team.pdf]])|Azure PenTesting|
|2020.02.20|ZDnet|[[Exclusive: Details of 10.6 million MGM hotel guests posted on a hacking forum|https://www.zdnet.com/article/exclusive-details-of-10-6-million-of-mgm-hotel-guests-posted-on-a-hacking-forum/]]|DataLeak|
|2020.02.20|Bleeping Computer| → [[Hackers Share Stolen MGM Resorts Guest Database with 10M+ Records|https://www.bleepingcomputer.com/news/security/hackers-share-stolen-mgm-resorts-guest-database-with-10m-records/]]|DataLeak|
|2020.02.20|infoRisk Today| → [[Hackers Post Details on MGM Resorts Guests: Report|https://www.inforisktoday.com/hackers-post-details-on-mgm-resorts-guests-report-a-13743]]|DataLeak|
|2020.02.20|Dark Reading| → [[Personal Info of 10.6M MGM Resort Guests Leaked Online|https://www.darkreading.com/attacks-breaches/personal-info-of-106m-mgm-resort-guests-leaked-online/d/d-id/1337102]]|DataLeak|
|2020.02.20|Hakin9|[[RANKED: The Countries Most at Risk of Cyber-Crime|https://hakin9.org/ranked-the-countries-most-at-risk-of-cyber-crime/]]|Report|
|2020.02.20|Container Journal|[[Locking Down the Kernel and Securing the Container|https://containerjournal.com/topics/container-security/locking-down-the-kernel-and-securing-the-container/]]|Containers|
|2020.02.20|Cybersecurity Insiders|[[Ransomware Data Recovery on Amazon Cloud/|https://www.cybersecurity-insiders.com/ransomware-data-recovery-on-amazon-cloud/]]|Ransomware|
|2020.02.20|//Shared Assessments//|[[Where Does Your Data Sleep?|https://sharedassessments.org/where-does-your-data-sleep/]]|Data|
|2020.02.20|//WeScale//|[[Istio K8S: Filtrer les IP sources derrière une chaîne de proxies|https://blog.wescale.fr/2020/02/20/istio-k8s/]]|Kubernetes Networks|
|2020.02.20|//Booz Allen//|[[5 Strategies to Secure Cloud Operations Against Today's Cyber Threats|https://www.darkreading.com/cloud/5-strategies-to-secure-cloud-operations-against-todays-cyber-threats/a/d-id/1337033]]|Best_Practices|
|2020.02.20|//Barracuda Networks//|[[New survey indicates security is the top concern restricting faster public cloud adoption|https://www.barracuda.com/news/article/805]] ([[rapport|https://www.barracuda.com/cloud-market]])|Report|
|2020.02.21|Solutions Review| → [[Barracuda: Security and Network Integration are Major Cloud Concerns|https://solutionsreview.com/cloud-platforms/barracuda-security-and-network-integration-are-major-cloud-concerns/]]|Report|
|2020.02.20|//Microsoft Azure//|[[Microsoft Threat Protection Now Generally Available|https://www.securityweek.com/microsoft-threat-protection-now-generally-available]]|Azure Threat_Protection|
|2020.02.20|//Microsoft Azure//|[[Microsoft Threat Protection stops attack sprawl and auto-heals enterprise assets with built-in intelligence and automation|https://www.microsoft.com/security/blog/2020/02/20/microsoft-threat-protection-intelligence-automation/]]|Azure Threat_Protection|
|2020.02.20|Dark Reading| → [[Microsoft Announces General Availability of Threat Protection, Insider Risk Management|https://www.darkreading.com/cloud/microsoft-announces-general-availability-of-threat-protection-insider-risk-management-/d/d-id/1337105]]|Azure Threat_Protection|
|2020.02.20|//Microsoft Azure//|[[Azure Sentinel uncovers the real threats hidden in billions of low fidelity signals|https://www.microsoft.com/security/blog/2020/02/20/azure-sentinel-uncovers-real-threats-hidden-billions-low-fidelity-signals/]]|Azure_Sentinel|
|2020.02.20|//Code42//|[[Code42 Data Exposure Report: Collaborative Work Environments, Dynamic Workforce Exacerbate Insider Threat Problem|https://vmblog.com/archive/2020/02/20/code42-data-exposure-report-collaborative-work-environments-dynamic-workforce-exacerbate-insider-threat-problem.aspx]] ([[rapport|https://www.code42.com/go/2020-data-exposure-report-g/]])|Report Code42|
|2020.02.20|//Microsoft Azure//|[[Azure Security Center for IoT RSA 2020 announcements|https://azure.microsoft.com/en-us/blog/azure-security-center-for-iot-rsa-2020-announcements/]]|Azure IoT|
|2020.02.20|//Google Cloud//|[[Making your monolith more reliable|https://cloud.google.com/blog/products/management-tools/sre-for-single-tiered-software-applications]]|GCP DevOps|
|2020.02.20|//Caylent//|[[Implementing Aqua Security to Secure Kubernetes|https://caylent.com/implementing-aqua-security-to-secure-kubernetes]]|Kubernetes|
|2020.02.20|//Secure Cloud Blog//|[[Hardening SalesForce Integration in Azure Logic Apps + Azure Secure Devops Kit Alignment of Logic Apps|https://securecloud.blog/2020/02/20/hardening-salesforce-integration-in-azure-logic-apps-azure-secure-devops-kit-alignment-of-logic-apps/]]|Hardening|
|2020.02.20|//4SL//|[[Cloud data risk growing warns 4sl|https://ibsintelligence.com/ibs-journal/ibs-news/cloud-data-risk-growing-warns-4sl/]]|Risks|
|2020.02.21|Continuity Central| → [[Take control of cloud backups or risk loss or non-compliance warns 4sl|https://www.continuitycentral.com/index.php/news/erm-news/4904-take-control-of-cloud-backups-or-risk-loss-or-non-compliance-warns-4sl]]|Risks|
|2020.02.20|//Securosis//|[[Defining the Journey - the Four Cloud Adoption Patterns|https://securosis.com/blog/defining-the-journey-the-four-cloud-adoption-patterns]] (2/6)|Misc|
|2020.02.20|//Cloud Academy//|[[Cloud Academy Training Tips|https://cloudacademy.com/blog/training-tips/]]|Training|
|2020.02.20|//Optiv//|[[Container Risks - Gaining Visibility into NIST SP 800-190, Part Six|https://www.optiv.com/blog/container-risks]] (6/6)|
|>|>|>|!2020.02.19|
|2020.02.19|Journal du Net[>img[iCSF/flag_fr.png]]|[[Le cloud en 2020 : l'année du edge, de l'automatisation et des clouds sectoriels|https://www.journaldunet.com/solutions/cloud-computing/1488803-le-cloud-en-2020-l-annee-du-edge-de-l-automatisation-et-des-clouds-propres-a-un-secteur-d-activite/]]|Misc|
|2020.02.19|Computer Weekly|[[Questions raised over Office 365 shared content policy|https://www.computerweekly.com/news/252478758/Questions-raised-over-Office-365-shared-content-policy]]|O365 Privacy|
|2020.02.19|Cybersecurity Insiders|[[Plastic surgery videos leaked due to misconfigured Amazon Web Services Cloud|https://www.cybersecurity-insiders.com/plastic-surgery-videos-leaked-due-to-misconfigured-amazon-web-services-cloud/]]|Data_Leak|
|2020.02.19|Solutions Review|[[What's Changed: 2020 Gartner Magic Quadrant for Cloud Management Platforms|https://solutionsreview.com/cloud-platforms/whats-changed-2020-gartner-magic-quadrant-for-cloud-management-platforms/]]|Market|
|2020.02.19|//Imperva//|[[Spikes in High-risk Vulnerabilities and Public Cloud-based Attacks Dominate Threat Landscape, Imperva Researchers Find with New Cyber Threat Index|https://www.imperva.com/company/press_releases/imperva-launches-cyber-threat-index/]] ([[Index|https://www.imperva.com/cyber-threat-index/]])|Report Threat_Index|
|2020.02.21|Help Net Security| → [[High-risk vulnerabilities and public cloud-based attacks on the rise|https://www.helpnetsecurity.com/2020/02/21/high-risk-vulnerabilities-rise/]]|Report|
|2020.02.19|//StackRox//|[[5 Surprising Findings from StackRox's Latest Kubernetes Security Report|https://www.stackrox.com/post/2020/02/5-surprising-findings-from-stackroxs-latest-kubernetes-security-report/]] ([[rpport|https://security.stackrox.com/state-of-containers-and-kubernetes-security-report-winter-2020.html]])|Report|
|2020.02.19|Container Journal| → [[StackRox Report Reveals that Container and Kubernetes Security Concerns are Inhibiting Business Innovation|https://containerjournal.com/news/news-releases/stackrox-report-reveals-that-container-and-kubernetes-security-concerns-are-inhibiting-business-innovation/]]|Report|
|2020.02.19|//NetSkope//|[[Cybercriminals Find Cover in the Cloud: New Netskope Research Finds 44% of Threats are Cloud-Enabled|https://www.netskope.com/press-releases/cloud-threat-report]] ([[rapport|https://resources.netskope.com/cloud-reports/cloud-and-threat-report-february-2020-edition]])|Report|
|2020.02.19|Dark Reading| → [[44% of Security Threats Start in the Cloud|https://www.darkreading.com/cloud/44--of-security-threats-start-in-the-cloud/d/d-id/1337088]]|Report|
|2020.02.21|Help Net Security| → [[Cloud-enabled threats are on the rise, sensitive data is moving between cloud apps|https://www.helpnetsecurity.com/2020/02/21/cloud-enabled-threats/]]|Report|
|2020.02.21|Continuity Central| → [[New threat landscape report highlights cyber risk trends|https://www.continuitycentral.com/index.php/news/technology/4902-new-threat-landscape-report-highlights-cyber-risk-trends]]|Report|
|2020.02.21|Solutions Review| → [[Netskope Releases February 2020 Netskope Cloud and Threat Report|https://solutionsreview.com/security-information-event-management/netskope-releases-february-2020-netskope-cloud-and-threat-report/]]|Report|
|2020.02.19|//Bitglass//|[[Cloud Security that Performs|https://www.bitglass.com/blog/cloud-security-performance-1]]|Misc|
|2020.02.19|//CoreView//|[[The top four Office 365 security pain points|https://www.helpnetsecurity.com/2020/02/19/o365-security/]]|O365 Recommendations|
|2020.02.19|//SafeBreach//|[[SafeBreach Adds Docker Support to Breach Simulation Platform|https://containerjournal.com/topics/container-security/safebreach-adds-docker-support-to-breach-simulation-platform/]]|Docker Simulation|
|2020.02.19|//Aqua Security//|https//|[[Threat Alert: New Attack Vector Targeting Your Cloud Environment|https://blog.aquasec.com/threat-alert-cloud-computing-security]]|Attack Evasion|
|>|>|>|!2020.02.18|
|2020.02.18|Nathan Getty|[[AWS Automated Remediation - Part 2: S3 Buckets|https://getsec.github.io/2020/02/aws-remedy-2/]] (2/2)|AWS Remediation|
|2020.02.18|CloudAcademy|[[AWS Reserved Instances and Savings Plans: Challenges and Solutions|https://cloudacademy.com/blog/aws-reserved-instances-and-savings-plans-challenges-and-solutions/]]|AWS|
|2020.02.18|Journal du Net[>img[iCSF/flag_fr.png]]|[[OVHcloud vs Scaleway : l'ambition mondiale face au principe de réalité|https://www.journaldunet.com/solutions/cloud-computing/1489051-scaleway-vs-ovhcloud-le-match-des-clouds-francais/]]|Misc|
|2020.02.18|//Zscaler//[>img[iCSF/flag_fr.png]]|[[Nouvelle approche de sécurité SASE : de la nécessité de mettre en place un cloud de transit sécurisé|https://www.informatiquenews.fr/nouvelle-approche-de-securite-sase-de-la-necessite-de-mettre-en-place-un-cloud-de-transit-securisenathan-howe-zscaler-67291]]|SASE|
|2020.02.18|//Microsoft Azure//|[[Advanced multistage attack detection in Azure Sentinel|https://docs.microsoft.com/en-us/azure/sentinel/fusion]]|Azure Sentinel|
|2020.02.18|//Divvy Cloud//|[[2020 Cloud Misconfigurations Report|https://divvycloud.com/misconfigurations-report-2020/]] ([[rapport pdf|https://divvycloud.com/wp-content/uploads/2020/02/Cloud-Misconfiguration-Report-FINAL.pdf]])|Report Misconfiguration|
|2020.02.19|//Divvy Cloud//| → [[New DivvyCloud Report Finds Breaches Caused by Cloud Misconfigurations Cost Enterprises Nearly $5 Trillion|https://divvycloud.com/new-divvycloud-misconfigurations-report/]]|Report Misconfiguration|
|2020.02.19|BetaNews| → [[Cloud misconfigurations expose over 33 billion records in two years|https://betanews.com/2020/02/19/cloud-misconfiguration/]]|Report Misconfiguration|
|2020.02.19|TechRepublic| → [[Cloud misconfigurations cost companies nearly $5 trillion|https://www.techrepublic.com/article/cloud-misconfigurations-cost-companies-nearly-5-trillion/]]|Report Misconfiguration|
|2020.02.19|Computer Weekly| → [[Cost of cloud misconfigurations set at $5tn|https://www.computerweekly.com/news/252478833/Cost-of-cloud-misconfigurations-set-at-5tn]]|Misconfigurations|
|2020.02.20|Help Net Security| → [[Cloud misconfigurations surge, organizations need continuous controls|https://www.helpnetsecurity.com/2020/02/20/cloud-misconfigurations/]]|Report Misconfiguration|
|2020.02.21|Enterprise Talk| → [[Cloud Misconfigurations - Losses are Expected to Reach $5tn, Says DivvyCloud|https://enterprisetalk.com/featured/cloud-misconfigurations-losses-are-expected-to-reach-5tn-says-divvycloud/]]|Report Misconfiguration|
|2020.02.18|//Microsoft Azure//|[[New Azure Firewall certification and features in Q1 CY2020|https://azure.microsoft.com/en-us/blog/new-azure-firewall-certification-and-features-in-q1-cy2020/]]|Azure|
|2020.02.18|//Microsoft Azure//|[[Azure Firewall Manager now supports virtual networks|https://azure.microsoft.com/en-us/blog/azure-firewall-manager-now-supports-virtual-networks/]]|Azure Firewalls|
|2020.02.18|//MalwreBytes Labs//|[[Harnessing the power of identity management (IDaaS) in the cloud|https://blog.malwarebytes.com/explained/2020/02/harnessing-the-power-of-identity-management-idaas-in-the-cloud/]]|IDaaS|
|2020.02.18|//Extreme Networks//|[[7 out of 10 Organizations Have Seen Hacking Attempts via IoT|https://vmblog.com/archive/2020/02/19/7-out-of-10-organizations-have-seen-hacking-attempts-via-iot.aspx]] ([[report|https://www.extremenetworks.com/resources/white-paper/extreme-networks-security-survey-results/]])|Report|
|2020.02.18|//eXemplify//|[[Critical Questions for Evaluating Cloud Managed Services Providers|http://www.exemplifygroup.com/critical-questions-for-evaluating-cloud-managed-services-providers/]]|MSSPs|
|2020.02.18|//CyberArk Conjur//|[[Security Challenges Around Chaos Engineering|https://www.conjur.org/blog/security-challenges-around-chaos-engineering/]]|Chaos_Engineering|
|2020.02.18|//Sensu//|[[Chaos engineering + monitoring, part 2: for starters|https://blog.sensu.io/chaos-engineering-monitoring-part-2-for-starters]] (2/3)|Chaos_Engineering|
|>|>|>|!2020.02.17|
|2020.02.17|Help Net Security|[[Three API security risks in the wake of the Facebook breach|https://www.helpnetsecurity.com/2020/02/17/api-security-facebook-breach/]]|APIs Attacks|
|2020.02.17|Techtarget|[[Cloud key to top 2019 data backup and disaster recovery products|https://searchdatabackup.techtarget.com/feature/Cloud-key-to-top-2019-data-backup-and-disaster-recovery-products]]|BCP DRP|
|2020.02.17|CommsMEA|[[Surge in cloud usage drives steep rise in cybersecurity spending|https://www.commsmea.com/business/trends/21419-surge-in-cloud-usage-drives-steep-rise-in-cybersecurity-spending]]|Market|
|2020.02.17|//Securosis//|[[Your Cloud Journeys is Unique, but Not Unknown|https://securosis.com/blog/your-cloud-journeys-is-unique-but-not-unknown]] (1/6)|Public_Cloud|
|2020.02.17|//JumpCloud//|[[One User Account for Both AWS and GCP|https://jumpcloud.com/blog/one-account-aws-gcp/]]|Authentication AWS GCP|
|2020.01.17|//Talent Jump//|[[CLAMBLING - A New Backdoor Base On Dropbox (EN)|http://www.talent-jump.com/article/2020/02/17/CLAMBLING-A-New-Backdoor-Base-On-Dropbox-en/]]|Dropbox Attack|
|2020.01.17|//CipherCloud//|[[Get a grip on data in Box and beyond - for compliance sake|https://www.ciphercloud.com/get-a-grip-on-data-in-box-and-beyond-for-compliance-sake/]]|Data_Protection CASB|
!The Six Pillars of DevSecOps: Collective Responsibility [>img(150px,auto)[iCSA/K2LPT.jpg]]
<<<
//The DevSecOps Working Group identified and defined six focus areas critical to integrating DevSecOps into an organization, in accordance with the six pillars described in CSA’s Reflexive Security Framework.
More detailed research and guidance across each of the six pillars of DevSecOps will be revisited and established over time in order to maintain industry specific standards.
This paper is part of a planned series and will focus on the area that is arguably the foundation for all others - collective responsibility.
Fostering a sense of collective security responsibility is not only an essential element of driving security into a DevOps environment, but it is also one of the most challenging.
It requires cultivating a change to the organization’s mindset, its ideas and its customs and behaviors regarding software security.
In this paper, we refer to this effort as building a security-supportive culture.//
<<<
__Table des Matières :__//
<<<
* Introduction
* Overview
* Executive Support and Engagement
* Program Design and Implementation
* Bringing Champions to the Challenge
* Reinforcing the Program through Security Awareness and Training
* Program Sustainment and Measurement
* Summary
* Appendix I: Healthy Questions and Discussion Points
* Appendix II: Further Reading
<<<
//__Liens :__
* Annonce ⇒ ''[[CloudSecurityAlliance.fr/go/k2lp/|https://CloudSecurityAlliance.fr/go/k2lp/]]''
* Document (pdf) ⇒ ''[[CloudSecurityAlliance.fr/go/k2ld/|https://CloudSecurityAlliance.fr/go/k2ld/]]''
[img(50%,1px)[iCSF/BluePixel.gif]]
!Cloud Usage in the Financial Services Sector [>img(150px,auto)[iCSA/K2LPC.jpg]]
<<<
//This survey was created and completed by members of the the Financial Services Stakeholders Platform, a CSA working group whose main objective is to identify and share the challenges, risks and best practices for the development, deployment and management of secure cloud services in the financial services industry. The goal of this survey was to analyze the level of adoption of cloud solutions and requirements from financial institutions’ perspectives;
In administering the survey, the Cloud Security Alliance’s intention was to take the temperature of cloud computing in the financial sector and provide guidance to accelerate adoption of secure cloud services. These takeaways will inform the Financial Services working group and serve as actionable items to address the concerns and opportunities associated with cloud computing and financial services.
This study analyzed the cloud usage of financial institutions across three main areas of interest: security concerns, regulatory requirements, and governance aspects.
The Cloud Security Alliance is a not-for-profit organization with a mission to widely promote best practices for ensuring cyber security in cloud computing and IT technologies. CSA is also tasked with educating various stakeholders within these industries about security concerns in all other forms of computing. CSA’s membership is comprised of a broad coalition of industry practitioners, corporations, and professional associations. One of CSA’s primary goals is to conduct surveys that assess information security trends. These surveys help gauge the maturity of information security technology at various points in the industry, as well as the rate of adoption of security best practices.//
<<<
__Table des Matières :__//
<<<
* Introduction
* Survey Participant Demographics
* Current Cloud Use by Participants
* Key Cloud Concerns & Challenges
* Technical Controls: Key Management
* Risk Management: Policy, Assessment & Talent Risk
* Threat Monitoring
* Cloud Sourcing
* Backout Plans
* Recommendations
* Conclusion
* About The Sponsor .
<<<
//__Liens :__
* Annonce ⇒ ''[[CloudSecurityAlliance.fr/go/k2ls/|https://CloudSecurityAlliance.fr/go/k2ls/]]''
* Document (pdf) ⇒ ''[[CloudSecurityAlliance.fr/go/k2lr/|https://CloudSecurityAlliance.fr/go/k2lr/]]''
!"//Call for Papers SECtember//"
[>img(300px,auto)[iCSA/202009US-SECtember.png]]L'appel à contribution est ouvert jusqu'au 1^^er^^ mai 2020. Les thèmes suggérés sont les suivants ://
<<<
* DevOps, DevSecOps & CI/CD security experiences
* Containerization, Microservices & Serverless computing
* Software Defined Perimeter, Microsegmentation & Zero Trust
* Cloud migration lessons learned
* Cloud encryption, key management, BYOK, HSM
* Cloud identity management
* Data governance, portability and sovereignty
* Cloud governance, compliance and risk management
* Cloud and the Board of Directors
* Continuous assurance & compliance
* Hybrid and multi cloud implementation & security architectures
* Incident Management best practices
* Nation-state cybersecurity trends and cloud-related critical infrastructure
* Cloud threats and threat actors 
* Role of adjacent and emerging technologies in cloud: IoT, Blockchain, 5G, Artificial Intelligence, Quantum Computing
* Security workforce enablement
* Global privacy strategies (GDPR, CCPA, etc.)
<<<
//Les sessions seront de 2 types :
* des "Keynotes" de 20 minutes
* des présentations de 40 minutes 
Pour rappel, la première conférence [[SECtember]] se déroulera du 14 au 18 septembre 2020 à Seattle.
&rArr; Lire [[l'appel à contribution|https://CloudSecurityAlliance.fr/go/k2jc/]] sur le site de la CSA.
&rArr; le site de la conférence → ''[[CloudSecurityAlliance.fr/go/k9ee/|https://CloudSecurityAlliance.fr/go/k9ee/]]''
!"//Proposed Principles for Artificial Intelligence Published by the White House//"
[>img(150px,auto)[iCSA/K2JBP.jpg]]Article de blog publié le 19 février 2020 — Rédigé par Francoise Gilbert, Data & Privacy Expert, DataMinding.com+++*[»]> https://dataminding.com/ === et publié simultanément sur son propre blog+++*[»]> https://www.francoisegilbert.com/?p=1480 ===.
<<<
//A draft memorandum outlining a proposed "Guidance on Regulation of Artificial Intelligence Application"+++*[»]> https://www.whitehouse.gov/wp-content/uploads/2020/01/Draft-OMB-Memo-on-Regulation-of-AI-1-7-19.pdf === ("Memorandum") for agencies to follow when regulating and taking non-regulatory actions affecting artificial intelligence was published by the White House on January 7, 2020. The proposed document addresses the objective identified in an "Executive Order 13859 on Maintaining American Leadership in Artificial Intelligence"+++*[»]> https://www.whitehouse.gov/presidential-actions/executive-order-maintaining-american-leadership-artificial-intelligence/ ===, ("Executive Order 13859") published by the White House in February 2019.2
The Memorandum sets out policy considerations that should guide oversight of artificial intelligence (AI) applications developed and deployed outside the Federal government. It is intended to inform the development of regulatory and non-regulatory approaches regarding technologies and industrial sectors that are empowered or enabled by artificial intelligence and consider ways to reduce barriers to the development and adoption of AI technologies.
!!Principles for the Stewardship of AI Applications
The memorandum sets forth ten proposed principles:
* Ensure public trust in AI
* Public participation in all stages of rulemaking process
* Scientific integrity and information quality
* Consistent application of risk assessment and management
* Maximizing benefits and evaluating risks and costs of not implementing
* Flexibility to adapt to rapid changes
* Ensure Fairness and non-discrimination in outcomes
* Disclosure and transparency to ensure public trust
* Promote safety and security
* Interagency cooperation

Details on each of these principles are provided below
!!!1. Public Trust in AI.
Government regulatory and non-regulatory approaches to AI should promote reliable, robust and trustworthy AI applications that contribute to public trust in AI.
!!!2. Public Participation.
Agencies should provide opportunities for the public to provide information and participate in all stages of the rulemaking process. To the extent practicable, agencies should inform the public and promote awareness and widespread availability of standards, as well as the creation of other informative documents.
!!!3. Scientific Integrity and Information Quality.
Agencies should hold to a high standard of quality, transparency and compliance information that is likely to have substantial influence on important public policy or private sector decisions governing the use of AI. They should develop regulatory approaches to AI in a manner that informs policy decisions and fosters public trust in AI. Suggested best practices would include: (a) transparently articulating the strengths, weaknesses, intended optimizations or outcomes; (b) bias mitigation; and (c) appropriate uses of the results of AI application.
!!!4. Risk Assessment and Management.
The fourth principle caution against an unduly conservative approach to risk management. It recommends the use of a risk-based approach to determine which risks are acceptable, and which risks present the possibility of unacceptable harm, or harm whose expected costs are greater than expected benefits. It also recommends that agencies be transparent about their evaluation of risks.
!!!5. Benefits and Costs.
The fifth principle provides that agencies should consider the full societal costs, benefits, and distributional effects before considering regulations related to the development and deployment of an AI application. Agencies should also consider critical dependencies when evaluating AI costs and benefits because data quality, changes in human processes, and other technological factors associated with AI implementation may alter the nature and magnitude of risks.
!!!6. Flexibility.
When developing regulatory and non-regulatory approaches, agencies should pursue performance-based and flexible approaches that can adapt to rapid changes and updates to AI applications. Agencies should also keep in mind international uses of AI.
!!!7. Fairness and Non-Discrimination.
Agencies should consider whether AI applications produce discriminatory outcomes as compared to existing processes, recognizing that AI has the potential of reducing present-day discrimination caused by human subjectivity.
!!!8. Disclosure and Transparency.
The eighth principle comments that transparency and disclosure may increase public trust and confidence. These disclosures may include identifying when AI is in use, for instance, if appropriate for addressing questions about how an application impacts human end-users. Further, agencies should carefully consider the sufficiency of existing or evolving legal, policy, and regulatory environments before contemplating additional measures for disclosure and transparency.
!!!9. Safety and Security.
Agencies are encouraged to promote the development of AI systems that are safe, secure, and operate as intended, and to encourage the consideration of safety and security issues throughout the AI design, development, deployment, and operation process. Particular attention should be paid to the controls in place to ensure the confidentiality, integrity, and availability of the information processed, stored, and transmitted by AI systems. Further, agencies should give additional consideration to methods for guaranteeing systemic resilience, and preventing bad actors from exploiting AI system weaknesses, cybersecurity risks posed by AI operation, and adversarial use of AI against a regulated entity’s AI technology.
!!!10. Interagency Cooperation.
Agencies should coordinate with each other to ensure consistency and predictability of AI-related policies that advance innovation and growth in AI, while appropriately protecting privacy, civil liberties, and allowing for sector- and application-specific approaches when appropriate.
!!Non-Regulatory Approaches to AI
The Memorandum recommends that an agency consider taking no action or considering non-regulatory approaches when it determines, after evaluating a particular AI application, that existing regulations are sufficient, or the benefits of a new regulation do not justify its costs. Examples of such non-regulatory approaches include: (a) sector-specific policy guidance or frameworks; (b) pilot programs and experiments; and (c) the development of voluntary consensus standards
!!Reducing Barriers to the Development and Use of AI
The Memorandum points out that "Executive Order 13859 on Maintaining American Leadership in Artificial Intelligence"+++*[»]> https://www.whitehouse.gov/presidential-actions/executive-order-maintaining-american-leadership-artificial-intelligence/ ===, instructs OMB to identify means to reduce barriers to the use of AI technologies in order to promote their innovative application while protecting civil liberties, privacy, American values, and United States economic and national security.  The Memorandum provides examples of actions that agencies can take, outside the rulemaking process, to create an environment that facilitates the use and acceptance of AI. One of the examples is agency participation in the development and use of voluntary consensus standards and conformity assessment activities.
!!Next Steps
The Memorandum points out that Executive Order 13859 requires that implementing agencies review their authorities relevant to AI applications and submit plans to OMB on achieving the goals outlined in the Memorandum within 180 days of the issuance of the final version of the Memorandum. In this respect, such agency plan will have to:
* Identify any statutory authorities specifically governing agency regulation of AI applications;
* Identify collections of AI-related information from regulated entities;
* Describe any statutory restrictions on the collection or sharing of information, such as confidential business information, personally identifiable information, protected health information, law enforcement information, and classified or other national security information);
* Report on the outcomes of stakeholder engagements that identify existing regulatory barriers to AI applications and high-priority AI applications; and
* List and describe any planned or considered regulatory actions on AI.
!!Conclusion
This draft guidance marks defines a concrete structure for outlining regulatory and non-regulatory approaches regarding AI. Businesses should evaluate the extent to which their own AI strategies have the ability to address the ten principles.
In addition, since the development of AI strategies is likely to have global consequences, they should also take into account similar initiatives that have been developed elsewhere around the world, such as by the OECD (with the "OECD Recommendation on Artificial Intelligence"+++*[»]> https://www.oecd.org/going-digital/ai/principles/ ===), the European Commission (through its "Ethics Guidelines for Trustworthy Artificial Intelligence"+++*[»]> https://ec.europa.eu/digital-single-market/en/news/ethics-guidelines-trustworthy-ai ===) or at the country level, for example in France (with the "Algorithm and Artificial Intelligence: CNIL Report on Ethics Issues"+++*[»]> https://www.cnil.fr/en/algorithms-and-artificial-intelligence-cnils-report-ethical-issues ===).//
<<<
&rArr; Lire [[l'original|https://CloudSecurityAlliance.fr/go/k2nb/]] sur le blog de la CSA.
!"//Cloud Security Challenges in 2020//"
[>img(150px,auto)[iCSA/K2IBC.jpg]]Article de blog publié le 18 février 2020 — Rédigé par Ashwin Chaudhary, Chief Executive Officer, Accedere+++*[»]> http://accedere.us/ === 
<<<
//The worldwide public cloud services market is forecast to grow 17% in 2020 to total $266.4 billion, up from $227.8 billion in 2019 according to Gartner+++*[»]> https://www.gartner.com/en/newsroom/press-releases/2019-11-13-gartner-forecasts-worldwide-public-cloud-revenue-to-grow-17-percent-in-2020 ===. As the cloud continues to be more and more heavily adopted, it’s important to be aware of the challenges organizations are faced with when leveraging cloud computing. Recently the Cloud Security Alliance presented the following major cloud challenges in its report "Top Threats to Cloud Computing: Egregious Eleven"+++*[»]> https://cloudsecurityalliance.org/artifacts/top-threats-to-cloud-computing-egregious-eleven ===. In this blog, I will be summarizing each threat covered in the report and discuss its implications to organizations today.
!!1. Data Breaches
Consequences of a data breach may include:
* Impact to reputation and trust of customers or partners
* Loss of intellectual property (IP) to competitors, which may impact products release
* Regulatory implications that may result in monetary loss
* Brand impact which may cause a market value decrease due to previously listed reasons
* Legal and contractual liabilities
* Financial expenses incurred due to incident response and forensics
!!2. Misconfiguration and Inadequate Change Control
This is one of the most common challenges of the cloud. In 2017, a misconfigured AWS Simple Storage Service (S3) cloud storage bucket exposed detailed and private data of 123 million American households. The data set belonged to Experian, a credit bureau, which sold the data to an online marketing and data analytics company called Alteryx. It was Alteryx that exposed the file. Such instances can be disastrous.
!!3. Lack of Cloud Security Architecture and Strategy
Worldwide, organizations are migrating portions of their IT infrastructure to public clouds. One of the biggest challenges during this transition is the implementation of appropriate security architecture to withstand cyberattacks. Unfortunately, this process is still a mystery for many organizations. Data are exposed to different threats when organizations assume that cloud migration is a “lift-and-shift” endeavor of simply porting their existing IT stack and security controls to a cloud environment. A lack of understanding of the shared security responsibility model is also another contributing factor.
!!4. Insufficient Identity, Credential, Access and Key Management
Cloud computing introduces multiple changes to traditional internal system management practices related to identity and access management (IAM). It isn’t that these are necessarily new issues. Rather, they are more significant issues when dealing with the cloud because cloud computing profoundly impacts identity, credential and access management. In both public and private cloud settings, CSPs and cloud consumers are required to manage IAM without compromising security.
!!5. Account Hijacking
Account hijacking is a threat in which malicious attackers gain access to and abuse accounts that are highly privileged or sensitive. In cloud environments, the accounts with the highest risks are cloud service accounts or subscriptions. Phishing attacks, exploitation of cloud-based systems, or stolen credentials can compromise these accounts.
!!6. Insider Threat
The Netwrix 2018 Cloud Security Report indicates that 58 percent of companies attribute security breaches to insiders. Insider negligence is the cause of most security incidents. Employee or contractor negligence was the root cause of 64 percent of the reported insider incidents, whereas 23 percent were related to criminal insiders and 13 percent to credential theft, according to the Ponemon Institute’s 2018 Cost of Insider Threats study. Some common scenarios cited include: misconfigured cloud servers, employees storing sensitive company data on their own insecure personal devices and systems, and employees or other insiders falling prey to phishing emails that led to malicious attacks on company assets.
!!7. Insecure Interfaces and APIs
Cloud computing providers expose a set of software user interfaces (UIs) and APIs to allow customers to manage and interact with cloud services. The security and availability of general cloud services are dependent on the security of these APIs. From authentication and access control to encryption and activity monitoring, these interfaces must be designed to protect against both accidental and malicious attempts to circumvent the security policy. Poorly designed APIs could lead to misuse or—even worse—a data breach. Broken, exposed, or hacked APIs have caused some major data breaches. Organizations must understand the security requirements around designing and presenting these interfaces on the internet.
!!8. Weak Control Plane
Moving from the data center to the cloud poses some challenges for creating a sufficient data storage and protection program. The user must now develop new processes for data duplication, migration and storage and—if using multi-cloud—it gets even more complicated. A control plane should be the solution for these problems, as it enables the security and integrity that would complement the data plane that provides stability and runtime of the data. A weak control plane means the person in charge—either a system architect or a DevOps engineer—is not in full control of the data infrastructure’s logic, security and verification. In this scenario, controlling stakeholders don’t know the security configuration, how data flows and where architectural blind spots and weak points exist. These limitations could result in data corruption, unavailability, or leakage.
!!9. Metastructure and Applistructure Failures
Cloud service providers routinely reveal operations and security protections that are necessary to implement and protect their systems successfully. Typically, API calls disclose this information and the protections are incorporated in the metastructure layer for the CSP. The metastructure is considered the CSP/customer line of demarcation—also known as the waterline. Failure possibilities exist at multiple levels in this model. For example, poor API implementation by the CSP offers attackers an opportunity to disrupt cloud customers by interrupting confidentiality, integrity, or availability of the service.
!!10. Limited Cloud Usage Visibility
Limited cloud usage visibility occurs when an organization does not possess the ability to visualize and analyze whether cloud service use within the organization is safe or malicious. This concept is broken down into two key challenges. Un-sanctioned app use: This occurs when employees are using cloud applications and resources without the specific permission and support of corporate IT and security. This scenario results in a self-support model called Shadow IT. When insecure cloud services activity does not meet corporate guidelines, this behavior is risky— especially when paired with sensitive corporate data. Gartner predicts that by 2020, one-third of all successful security attacks on companies will come through shadow IT systems and resources.
Sanctioned app misuse: Organizations are often unable to analyze how their approved applications are being leveraged by insiders who use a sanctioned app. Frequently, this use occurs without the explicit permission of the company, or by external threat actors who target the service using methods such as credential theft, Structured Query Language (SQL) injection, Domain Name System (DNS) attacks and more.
!!11. Abuse and Nefarious Use of Cloud Services
Malicious actors may leverage cloud computing resources to target users, organizations or other cloud providers. Malicious attackers can also host malware on cloud services. Cloud services that host malware can seem more legitimate because the malware uses the CSP’s domain. Furthermore, cloud-hosted malware can use cloud-sharing tools as an attack vector to further propagate itself.
//[...]
<<<
&rArr; Lire [[l'original|https://CloudSecurityAlliance.fr/go/k2nb/]] sur le blog de la CSA
!"//The Underrated Link Between Malicious Code & Cloud Security//"
[>img(250px,auto)[iCSA/K2IWT.png]]Webinar [[CloudBytes]] diffusé le 18 février 2020 — Présenté par Itai Tevet, CEO de la société Intezer
<<<
//In order for an adversary to conduct a successful cyber attack and inflict any kind of damage, they must run malicious code or commands on a victim’s machine. This fact also holds true in the world of modern cloud infrastructure, which usually comprises numerous Linux servers, containers and other services that can potentially run unauthorized software.
While there's a lot of publicly available information about securing the CI/CD process and pre-runtime scans, in this webinar, we will focus on best practices for securing your workloads in runtime. We will further explain how monitoring code in-memory can help to detect and quickly respond to cyber threats in public or private cloud servers.//
<<<
&rArr; Voir le Webinar de 42 minutes [[sur le site de BrightTALK|https://CloudSecurityAlliance.fr/go/k2hw/]]
!"//Software-Defined Perimeter (SDP) and Zero Trust//"
<<<
//A Zero Trust implementation using Software-Defined Perimeter enables organizations to defend new variations of old attack methods that are constantly surfacing in existing network and infrastructure perimeter-centric networking models.
Implementing SDP improves the security posture of businesses facing the challenge of continuously adapting to expanding attack surfaces that are increasingly more complex.
This paper will show how SDP can be used to implement ZTNs and why SDP is applied to network connectivity, meaning it is agnostic of the underlying IP-based infrastructure and hones in on securing all connections using said infrastructure - it is the best architecture for achieving Zero Trust.//
<<<
Pour accéder au document, vous devez vous enregistrer avec une adresse en "//gmail.com//", et demander une autorisation d'accès au document.
La date limite pour faire les commentaires est fixée au ''16 mars 2020''.
&rArr; Lire [[l'original|https://CloudSecurityAlliance.fr/go/k2ha/]] sur le site de la CSA
!1 - Les nouveautés CSA de la semaine du 10 au 16 février 2020
* Blog : utilisation des rapports SOC2 pour la sécurité du Cloud et la protection de la vie privée+++*[»]> <<tiddler [[2020.02.10 - Blog : 'Using SOC Reports for Cloud Security and Privacy']]>>=== [>img[iCSF/cloud-security-alliance-fr.png]]
* Actu : annonce d'un atelier 'Challenges Cloud et Sécurité' par l'Agence Européenne de Défense+++*[»]> <<tiddler [[2020.02.10 - Atelier de l'Agence Européenne de Défense sur la sécurité du Cloud]]>>=== 
!2 - Veille Web
La [[Veille Web|2020.02.16 - Veille Hebdomadaire - 16 février]] avec plus de 50 liens dont :
* Menaces : ''cas concrêt'' de recherche de compromission avec Azure Sentinel+++*[»]>
|2020.02.14|ID Access Management|![[Hunting for University of Maastricht breach using Azure Sentinel|https://identityaccess.management/2020/02/14/hunting-for-university-of-maastricht-breach-using-azure-sentinel/]]|Hunting|
===, ''ransomware'' et Cloud+++*[»]>
|2020.02.11|Dark Reading|![[Why Ransomware Will Soon Target the Cloud|https://www.darkreading.com/cloud/why-ransomware-will-soon-target-the-cloud-/a/d-id/1336957]]|Ransomware|
===, retour d'expérience du NCC Group sur ''Kubernetes''+++*[»]>
|2020.02.12|//NCC Group//|![[Deep Dive into Real-World Kubernetes Threats|https://research.nccgroup.com/2020/02/12/command-and-kubectl-talk-follow-up/]]|Kubernetes|
|2020.02.12|//NCC Group//| → [[Présentation "Command and KubeCTL, Real-World Kubernetes Security for Pentesters"|https://docs.google.com/presentation/d/1y6KGGT5Uw27cCgFMKiGv0NjRhq8YvjY_S9UG8s_TThg/]] et [[démonstration|https://github.com/antitree/cmd_and_kubectl_demos]]|Kubernetes|
=== 
* Fuites de données : encore et toujours des ''buckets S3'' mal protégés+++*[»]>
|2020.02.10|//vpnMentor//|[[Report: Inmates’ Prescriptions & PII Leaked in Breach Spanning Multiple Jailhouses|https://www.vpnmentor.com/blog/report-jailcore-leak/]]|Data_Leak AWS_S3|
|2020.02.11|Graham Cluley| → [[Prison inmates’ sensitive data left exposed on leaky cloud bucket|https://www.grahamcluley.com/prisoner-data-leak-bucket/]]|Data_Leak AWS_S3|
|2020.02.12|//TrendMicro//| → [[Misconfigured AWS S3 Bucket Leaks 36,000 Inmate Records|https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/misconfigured-aws-s3-bucket-leaks-36-000-inmate-records]]|Data_Leak AWS_S3|
=== 
* Divers : comparaison des coûts de ''sauvegarde'' entre Azure et AWS+++*[»]>
|2020.02.14|VMblog|![[Cloud Backup Comparison: Azure vs AWS|https://vmblog.com/archive/2020/02/14/cloud-backup-comparison-azure-vs-aws.aspx]]|BackUps|
===, détection et réponse+++*[»]>
|2020.02.12|SANS|![[How to Improve Security Visibility and Detection/Response Operations in AWS|https://www.sans.org/reading-room/whitepapers/analyst/improve-security-visibility-detection-response-operations-aws-39410]]|Detection Response|
===, l'''armée'' américaine fonce vers le Cloud+++*[»]>
|2020.02.11|FCW|[[Army accelerates push to the cloud|https://fcw.com/articles/2020/02/11/army-accelerates-cloud-williams.aspx]]|US Military|
|2020.02.11|GCN| → [[Army takes training for a spin in tactical cloud|https://gcn.com/articles/2020/02/11/army-tactical-cloud-training-pilot.aspx]]|Military training|
===, liens Microsoft pour la sécurité d'''Azure''+++*[»]>
|2020.02.14|Michael Howard|![[So you want to learn Azure Security?|https://michaelhowardsecure.blog/2020/02/14/so-you-want-to-learn-azure-security/]]|Azure|
=== 
!3 - Weekly Cloud and Security Watch Newsletter[>img[iCSF/inEnglish.png]]
<<tiddler [[2020.02.16 - Weekly Newsletter - February 16th]]>>
!CSA updates and news - February 10th to 16th
* Blog: 'Using SOC Reports for Cloud Security and Privacy' [>img[iCSF/cloud-security-alliance-fr.png]]
* News: European Defense Agency Workshop on 'Cloud Computing Information Security Challenges'
!Cloud and Security News Watch
[[Over 50 links|2020.02.16 - Veille Hebdomadaire - 16 février]] among which:
* Threats: Deep dive into real-world Kubernetes threats, Hunting for University of Maastricht breach using Azure Sentinel, Why ransomware will soon target the cloud
* Data leaks: Misconfigured AWS S3 Bucket leaks inmate records
* Miscellaneous: Cloud Backup Comparison: Azure vs AWS, Army accelerates push to the cloud, Detection and response, Learning about Azure Security
|ssTabl99|k
|!⇒ [[CloudSecurityAlliance.fr/go/K2G/|https://CloudSecurityAlliance.fr/go/K2G/]] |
|!Février|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2020.02.15|
|2020.02.15|Techbeacon|[[With containers, shift your security approach to the micro-perimeters|https://techbeacon.com/security/containers-shift-your-security-approach-micro-perimeters]]|Containers|
|>|>|>|!2020.02.14|
|2020.02.14|Michael Howard|![[So you want to learn Azure Security?|https://michaelhowardsecure.blog/2020/02/14/so-you-want-to-learn-azure-security/]]|Azure|
|2020.02.14|ID Access Management|![[Hunting for University of Maastricht breach using Azure Sentinel|https://identityaccess.management/2020/02/14/hunting-for-university-of-maastricht-breach-using-azure-sentinel/]]|Hunting|
|2020.02.14|Cloud Native Computing Foundation|[[Service Mess to Service Mesh|https://www.cncf.io/blog/2020/02/14/service-mess-to-service-mesh/]]|Misc|
|2020.02.14|DZone|[[Why IoT Needs a Cloud-Native IoT Messaging Service|https://dzone.com/articles/why-iot-needs-a-cloud-native-iot-messaging-service]]|IoT MQT|
|2020.02.14|VMblog|![[Cloud Backup Comparison: Azure vs AWS|https://vmblog.com/archive/2020/02/14/cloud-backup-comparison-azure-vs-aws.aspx]]|BackUps|
|2020.02.14|CSO Online|[[Overcoming the Cyber Security Challenges of the Cloud|https://www.csoonline.com/article/3521033/overcoming-the-cyber-security-challenges-of-the-cloud.html]]|Challenges|
|2020.02.14|//Google GCP//|[[Logging + Trace: love at first insight|https://cloud.google.com/blog/products/management-tools/cloud-monitoring-with-full-stack-observability]]|Logging|
|2020.02.14|//DeltaRisk//|[[Google Advanced Protection Program Helps Prevent G Suite Account Compromise|https://deltarisk.com/blog/google-advanced-protection-program-helps-prevent-g-suite-account-compromise/]]|GCP Authentication|
|>|>|>|!2020.02.13|
|2020.02.13|InfoSecurity Magazine|[[Why Leaky Clouds Lead to Data Breaches|https://www.infosecurity-magazine.com/opinions/leaky-clouds-data-breaches]]|Data_Breaches|
|2020.02.13|GovLoop|[[Changing the Operating Model: 4 Ways for Government to Overcome Cloud Barriers|https://www.govloop.com/changing-the-operating-model-4-ways-for-government-to-overcome-cloud-barriers/]]|Government|
|2020.02.13|CBR Online|[[Intel Throws Its Weight Behind Israeli Mainframe-to-Cloud Backups Minnow|https://www.cbronline.com/news/intel-capital-model9]]|BackUps|
|2020.02.13|Solutions Review|[[The 7 Best Cloud Security Podcasts You Should Listen To|https://solutionsreview.com/cloud-platforms/the-7-best-cloud-security-podcasts-you-should-listen-to/]]|Podcasts|
|2020.02.13|Container Journal|[[Kubernetes Container Management Is Not Application Management|https://containerjournal.com/topics/container-management/kubernetes-container-management-is-not-application-management/]]|Kubernetes|
|2020.02.13|//Microsoft//|[[Changing the Monolith - Part 4: Quick tech wins for a cloud-first world|https://www.microsoft.com/security/blog/2020/02/13/changing-the-monolith-part-4-quick-tech-wins-for-a-cloud-first-world/]] (4/5)|
|2020.02.13|//NucleusCyber//|[[Leveraging Azure Information Protection for Fine Grained Access and Sharing Control|https://nucleuscyber.com/leveraging-azure-information-protection-for-fine-grained-access-control/]]|Azure Data_Protection|
|>|>|>|!2020.02.12|
|2020.02.12|Sébastien Paulet|[[Cloud Act et Cloud Microsoft en France|https://sppublish.wordpress.com/2020/02/12/cloud-act-et-cloud-microsoft-en-france/]]|Cloud_Act Microsoft|
|2020.02.12|Bleeping Computer|[[Office 365 Users Get Automated Protection From Malicious Docs|https://www.bleepingcomputer.com/news/security/office-365-users-get-automated-protection-from-malicious-docs/]]|O365|
|2020.02.12|TechRepublic|[[Cloud computing security: These two Microsoft tools can help you battle shadow IT|https://www.techrepublic.com/article/cloud-computing-security-these-two-microsoft-tools-can-help-you-battle-shadow-it/]]|Microsoft Tools|
|2020.02.12|//NCC Group//|![[Deep Dive into Real-World Kubernetes Threats|https://research.nccgroup.com/2020/02/12/command-and-kubectl-talk-follow-up/]]|Kubernetes|
|2020.02.12|//NCC Group//| → [[Présentation "Command and KubeCTL, Real-World Kubernetes Security for Pentesters"|https://docs.google.com/presentation/d/1y6KGGT5Uw27cCgFMKiGv0NjRhq8YvjY_S9UG8s_TThg/]] et [[démonstration|https://github.com/antitree/cmd_and_kubectl_demos]]|Kubernetes|
|2020.02.12|//GitLab//|[[How to escalate privileges and steal secrets in Google Cloud Platform|https://about.gitlab.com/blog/2020/02/12/plundering-gcp-escalating-privileges-in-google-cloud-platform/]]|GCP Privilege_Escalation|
|2020.02.12|//Rapid7//|[[How to Handle Misconfigurations in the Cloud|https://blog.rapid7.com/2020/02/12/how-to-handle-misconfigurations-in-the-cloud/]]|Misconfigurations|
|2020.02.12|//Microsoft Azure//|[[Building on secure productivity|https://www.microsoft.com/security/blog/2020/02/12/building-on-secure-productivity/]]|O365 Safe_Documents Application_Guard|
|2020.02.12|//Google Cloud//|[[Exploring Container Security: Run what you trust; isolate what you don't|https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-engine-features-and-guidance-to-help-lock-down-your-containers]]|Containers|
|2020.02.12|//Ntirety//|[[More Cloud, More Hacks: 2020 Cyber Threats|https://www.forbes.com/sites/emilsayegh/2020/02/12/more-cloud-more-hacks-pt-2/]] (2/2)|Misc|
|2020.02.12|SANS|![[How to Improve Security Visibility and Detection/Response Operations in AWS|https://www.sans.org/reading-room/whitepapers/analyst/improve-security-visibility-detection-response-operations-aws-39410]]|Detection Response|
|>|>|>|!2020.02.11|
|2020.02.11|Dark Reading|![[Why Ransomware Will Soon Target the Cloud|https://www.darkreading.com/cloud/why-ransomware-will-soon-target-the-cloud-/a/d-id/1336957]]|Ransomware|
|2020.02.11|Intelligent CIO|[[Cloud usage drives cybersecurity spending in SANS 2020 Survey|https://www.intelligentcio.com/eu/2020/02/11/cloud-usage-drives-cybersecurity-spending-in-sans-2020-survey-2/]]|Survey|
|2020.02.11|FCW|[[Army accelerates push to the cloud|https://fcw.com/articles/2020/02/11/army-accelerates-cloud-williams.aspx]]|US Military|
|2020.02.11|GCN| → [[Army takes training for a spin in tactical cloud|https://gcn.com/articles/2020/02/11/army-tactical-cloud-training-pilot.aspx]]|Military training|
|2020.02.11|DZone|[[Build Your Cloud Strategy |https://dzone.com/articles/build-your-cloudnbspstrategy]]|Strategy|
|2020.02.11|//Centrify//[>img[iCSF/flag_fr.png]]|[[La confusion autour de la responsabilité partagée est une faille majeure de la sécurité cloud|https://datacenter-magazine.fr/la-confusion-autour-de-la-responsabilite-partagee-est-une-faille-majeure-de-la-securite-cloud/]]|Zero_Trust|
|2020.02.11|//Microsoft Azure//|[[Bring your threat intelligence to Azure Sentinel|https://techcommunity.microsoft.com/t5/azure-sentinel/bring-your-threat-intelligence-to-azure-sentinel/ba-p/1167546]]|Azure Sentinel|
|2020.02.11|//Awake Security//|[[When Data Is Currency, Who’s Responsible for Its Security?|http://www.infosecisland.com/blogview/25248-When-Data-Is-Currency-Whos-Responsible-for-Its-Security.html]]|Responsibility|
|2020.02.11|//PaloAlto networks//|[[Holistic SDN Security Makes Security Comprehensive Everywhere|https://blog.paloaltonetworks.com/2020/02/cloud-sdn-security/]]|SDN|
|2020.02.11|//vextra//|[[Vectra Network Threat Detection Launches Office 365 Security Solution|https://www.msspalert.com/cybersecurity-services-and-products/ai/vectra-office-365-security/]]|Product O365|
|2020.02.11|//Cavirin//|[[No Excuses - The "First Line of Defense" for Cloud Security is Now Available at Your Fingertips!|https://vmblog.com/archive/2020/02/11/no-excuses-the-first-line-of-defense-for-cloud-security-is-now-available-at-your-fingertips.aspx]]|Products|
|2020.02.11|//SentinelOne//|[[From Storage to SaaS Cybersecurity: The Why|https://www.sentinelone.com/blog/from-storage-to-saas-cybersecurity-the-why/]] ([[podcast|https://s3.us-east-1.amazonaws.com/audio-for-wordpress-45086892059684b045a4189d91d52199e7d604f2/2020/02/amazon_polly_28245.mp3]])|Misc|
|2020.02.11|//Cisco//|[[Do I really need additional email security when using Office 365?|https://blogs.cisco.com/security/do-i-really-need-additional-email-security-when-using-office-365]]|O365|
|>|>|>|!2020.02.10|
|2020.02.10|CRN Australia|[[Google Cloud outage browns out two services|https://www.crn.com.au/news/google-cloud-outage-browns-out-two-services-537719]]|Outage GCP|
|2020.02.10|eForensics Mag|[[5 Things You Must Know About Cyber Security in the Cloud|https://eforensicsmag.com/5-things-you-must-know-about-cyber-security-in-the-cloud-by-anzhela-sychyk/]]|Misc|
|2020.02.10|TechRepublic|[[Kubernetes rollouts: 5 security best practices|https://www.techrepublic.com/article/kubernetes-rollouts-5-security-best-practices/]]|Kubernetes|
|2020.02.10|DZone|[[Private Cloud: Benefits and Use Cases|https://dzone.com/articles/all-about-private-cloud]]|Private_Cloud|
|2020.02.10|DZone|[[Serverless Security Risks and How to Mitigate Them|https://dzone.com/articles/serverless-security-risks-and-how-to-mitigate-them]]|Serverless Risks|
|2020.02.10|//vpnMentor//|[[Report: Inmates’ Prescriptions & PII Leaked in Breach Spanning Multiple Jailhouses|https://www.vpnmentor.com/blog/report-jailcore-leak/]]|Data_Leak AWS_S3|
|2020.02.11|Graham Cluley| → [[Prison inmates’ sensitive data left exposed on leaky cloud bucket|https://www.grahamcluley.com/prisoner-data-leak-bucket/]]|Data_Leak AWS_S3|
|2020.02.12|//TrendMicro//| → [[Misconfigured AWS S3 Bucket Leaks 36,000 Inmate Records|https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/misconfigured-aws-s3-bucket-leaks-36-000-inmate-records]]|Data_Leak AWS_S3|
|2020.02.10|//DH2i//|[[Safeguarding RasPi and Shoring Up Cloud-Based DR, with a Software Defined Perimeter (SDP)|https://vmblog.com/archive/2020/02/10/safeguarding-raspi-and-shoring-up-cloud-based-dr-with-a-software-defined-perimeter-sdp.aspx]]|RaspberryPi SDP DRP|
|2020.02.10|//Microsoft Azure//|[[Three ways Azure AD Conditional Access balances security and productivity|https://techcommunity.microsoft.com/t5/azure-active-directory-identity/three-ways-azure-ad-conditional-access-balances-security-and/ba-p/1144689]]|AzureAD|
|2020.02.10|//PuPuWeb//|[[The Future of the Cloud Native Security Platform: Q&A with John Morello|https://blog.paloaltonetworks.com/2020/02/cloud-native-security-platform-qa/]] (document de //PaloAlto Networks//)|Cloud_Native|
|2020.02.10|//AWS//|[[AWS CLI v2 is now generally available|https://aws.amazon.com/blogs/developer/aws-cli-v2-is-now-generally-available/]]|AWS|
!"//Re-thinking vulnerability management in the era of Hybrid IT & DevOps//"
[>img(250px,auto)[iCSA/K2DWT.png]]Webinar [[CloudBytes]] diffusé le 13 février 2020 — Présenté par Prateek Bhajankam,VP of Product Management & Badri Raghunathan, Director of Product Management de la société Qualys
<<<
// The digital transformation through Hybrid IT and DevOps has fundamentally changed how organizations operate - with major security implications.
How do companies detect and manage vulnerabilities when the enterprise network constantly evolves, and code written this morning gets deployed this afternoon? This requires enterprises to take a proactive, continuous and automated approach to security.
Join this session to learn from industry experts on how enterprises should approach vulnerability management and take a wholistic approach that goes beyond traditional metrics.
The speakers will detail how enterprises can implement a fully integrated vulnerability workflow - from asset inventory/discovery to vulnerability detection to prioritization and finally to remediation and patching.//
<<<
&rArr; Voir le Webinar de 58 minutes [[sur le site de BrightTALK|https://CloudSecurityAlliance.fr/go/k2dw/]]
!SDP: The most Advanced Zero Trust Architecture[>img(150px,auto)[iCSA/CCM.png]]
Une présentation de septembre 2019.
<<<
//Today's "Zero Trust" implementations are like putting up a wall with multiple doors and allowing people to come and pick a lock on the door. We are then just relying on the locks.
It is much better to put up a fence around and authenticate people before they get to the doors. One does want to see who is knocking, but one doesn’t want the threat to do bad things - like pick the locks. Authentication BEFORE access is the essence of real "Zero Trust"
This presentation aims to show how Software Defined Perimeter is the optimal architecture for “Zero Trust”.//
<<<
* Lien ⇒ ''[[https://CloudSecurityAlliance.fr/go/k2ap/|https://cloudsecurityalliance.org/artifacts/sdp-the-most-advanced-zero-trust-architecture/]]''
[img(50%,1px)[iCSF/BluePixel.gif]]
!"//Sneak Preview of CSA Summit and RSA February 24 - 27 2020//"
[>img(150px,auto)[iCSA/CSAsecUpd.jpg]]Podcast de la série "[[CSA Security Update]]" publié le 11 février 2020 — Invité : Jim Reavis, CEO CSA
<<<
//Excerpt from the most recent PODCAST interview with Jim Reavis; Co-Founder and CEO of Cloud Security Alliance discussing the activities and speakers at the upcoming CSA Summit at RSA!//
<<<
__Liens :__
* Annonce : https://www.buzzsprout.com/303731/2715373-sneak-preview-of-csa-summit-and-rsa-february-24-27-2020
* Podcast : https://www.buzzsprout.com/303731/2715373-sneak-preview-of-csa-summit-and-rsa-february-24-27-2020.mp3
!Atelier de l'Agence Européenne de Défense sur la sécurité du Cloud
[>img(150px,auto)[iCSF/EDA.png]]La mission de l'''Agence Européenne de Défense'' (AED) consiste à "soutenir les États membres et le Conseil dans leurs efforts visant à améliorer les capacités de défense européennes dans le domaine de la gestion des crises et à maintenir la politique européenne de sécurité et de défense dans son état actuel et dans son évolution future".
Parmi les risques identifiés, l'AED met en avant :
* l'intégration entre la surveillance des réseaux locaux et celle du Cloud qui "//présente des problèmes encore largement non résolus//",
* la gestion des incidents qui "//présente des défis qui dépassent les frontières entre les domaines (par exemple : responsabilités contractuelles vs. connaissances techniques, accords de niveau de service vs. procédures opérationnelles standard, ...//"
* le traitement des informations classifiées de l'UE, avec notamment plusieurs entités de l'UE qui étudient la possibilité d'héberger des informations classifiées jusqu'à "Restreint UE" dans un Cloud public : une approche qui "//présente des défis importants, tant du point de vue de la réglementation/accréditation que du point de vue technologique//".

[>img(500px,auto)[iCSF/K4LEE.jpg]]L'AED a lancé un appel à la contributions pour un atelier qu'elle organise en collaboration avec CERT-EU, ENISA et EUROPOL/EC3. Elle invite les acteurs de l'industrie à se joindre au débat et à apporter leurs contributions.
Les propositions de contribution ne doivent pas dépasser 1.500 mots et doivent se concentrer sur un ou plusieurs aspects de la sécurité du Cloud, évaluer les problèmes de sécurité sur la base de l'expérience et proposer des solutions potentielles à des problèmes spécifiques.  
Les critères d'évaluation des contributions sont :
* Crédibilité : avoir des antécédents avérés sur le marché de la cybersécurité et/ou de la cyberdéfense, mais le manque d'expertise en matière de défense ne sera pas un critère d'exclusion
* Polyvalence : avoir une  bonne connaissance dans le domaine, les soumissions de PME étant fortement encouragées
* Innovation : présenter un bon niveau d'innovation et d'originalité
* Exhaustivité : démontrer une capacité à inclure des réponses dans le contexte plus large de la cyberdéfense et en relation entre le domaine cybernétique et d'autres domaines militaires.
* Pertinence : savoir s'adapter au profil des participants 

Les principales dates et échéances sont les suivantes :
* 10 février 2020 : Publication de l'appel à communications
* ''23 mars 2020'' : Date limite de soumission des contributions
* 6 avril 2020 : Notification aux partenaires industriels sélectionnés
* 21 avril 2020 : Atelier
__Lien :__
&rArr; Lire [[l'original|https://CloudSecurityAlliance.fr/go/k2ac/]] sur le site de l'AED
[img[iCSF/flag_fr.png]]^^oc^^[img(50%,1px)[iCSF/BluePixel.gif]]
!"//Can you arrest a decentralized autonomous organization that lives in outer space?//"
[>img(150px,auto)[iCSA/K2ABU.jpg]]Article de blog publié le 10 février 2020 — Rédigé par Ashwin Chaudhary, Chief Executive Officer, Accedere+++*[»]> http://accedere.us/ === 
<<<
//Data security and privacy are increasingly challenging in today’s cloud-based environments. Many organizations are storing a significant amount of data in distributed and hybrid cloud and even unmanaged environments, increasing challenges for regulatory compliance. Meanwhile, privacy mandates such as GDPR recommend data anonymization, which can be another form of encryption. Without a proper data governance program; however, organizations may face difficulties in meeting these privacy compliance mandates.
Providing independent third-party assurance such as a System and Organization Controls (SOC) 2 report helps address these concerns and helps cloud service providers (CSPs) stay ahead of the competition. This assurance also helps organizations mitigate data security and privacy risk.
Recently I authored a report on "SOC Reports for Cloud Security and Privacy"+++*[»]> ⇒ https://www.isaca.org/resources/isaca-journal/issues/2019/volume-6/soc-reports-for-cloud-security-and-privacy
Seules les 5 premières lignes de l'aricle sont disponibles aux non-membres de l'ISACA.=== In this article, I’ll be giving an overview and summarizing several of the topics discussed in the report, including:
* Cloud Assurance for CSPs
* Privacy Compliance for Cloud
* Controls for User Organizations
!Cloud Assurance for CSPs
There are several approaches CSPs can leverage to provide assurance to their customers. Below I explain how each resource can be used to provide customers with confidence in using their CSP’s services.
!!Cloud STAR Certification Roadmap
CSA7, in collaboration with the American Institute of CPAs (AICPA), developed a third-party assessment program of CSPs called the CSA Security Trust Assurance and Risk (STAR) Attestation. The STAR program provides multiple benefits, including indications of best practices and validation of the security posture of cloud offerings.
!!SOC 2 for Cloud CSA STAR Attestation
The SOC 2+ Framework allows a SOC 2 to report on any additional controls over and above the trust services criteria controls for security, availability, confidentiality, processing integrity and privacy. Taking advantage of this framework, STAR Attestation provides a framework for Certified Public Accountants performing independent assessments of CSPs using SOC 2 engagements with the CSA’s Cloud Controls Matrix (CCM).
!!Cloud Controls Matrix (CCM)
The CCM is the only meta-framework of cloud-specific security controls, mapped to leading standards, best practices and regulations. CCM provides organizations with the needed structure, detail, and clarity relating to information security tailored to cloud computing. CCM is currently considered a de-facto standard for cloud security assurance and compliance.
!!Level 2 CSA STAR Attestation
[>img(500px,auto)[iCSA/K2ABU.png]]The STAR Attestation is positioned as a third party certification at Level 2 of the Open Certification Framework. The STAR Attestation is a rigorous third-party independent assessment of the security of a cloud service provider (figure 2 and is based on type I or types II SOC attestations supplemented by the criteria in the CCM.

This assessment:
* Is based on a mature attestation standard
* Allows for the immediate adoption of the CCM and the flexibility to update the criteria as additional criteria and technology and market requirements change
* Does not require the use of any criteria that were not designed for or readily accepted by the CSP
* Provides for robust reporting on the service provider’s description of its system and on the service provider’s controls, including a description of the service auditor’s tests of controls in a format very similar to the current SSAE 18 reporting, thereby facilitating market acceptance+++*[»]> Amazon Web Services, "Shared Responsibility Model"
⇒ https://aws.amazon.com/compliance/shared-responsibility-model/ === 
* Is a mature attest standard (it serves as the standard for SOC 2 and SOC 3 reporting)
* Provides for robust reporting on the service provider’s description of its system and on the service provider’s controls, including a description of the service auditor’s tests of controls in a format very similar to the current SSAE 18 reporting, thereby facilitating market acceptance
* Provides evaluation over a period of time rather than a point in time
* Provides recognition with the AICPA logo
STAR Attestation builds on the key strengths of SOC 2 because it:
* Is a mature attest standard (it serves as the standard for SOC 2 and SOC 3 reporting)
* Provides for robust reporting on the service provider’s description of its system and on the service provider’s controls, including a description of the service auditor’s tests of controls in a format very similar to the current SSAE 18 reporting, thereby facilitating market acceptance
* Provides evaluation over a period of time rather than a point in time
* Provides recognition with the AICPA logo
!!CSA Continuous Assessment (Level 2 and 3 Continuous)
STAR Level 2 Continuous builds on top of the STAR Level 2 requirement of third-party assessments and improves it by allowing the CSP to demonstrate a higher level of assurance and transparency with the addition of a continuous self-assessment.
In STAR Level 2, a CSP is assessed by a third party through one of the Level 2 programs against a determined and appropriate scope. The Level 2 programs, including STAR Certification, STAR Attestation, and C-STAR, are based on varied but demanding cloud security criteria of the CSA CCM, the International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC) ISO/IEC 27001 standards or the AICPA Trust Services Criteria (TSC), applied toward the CSP’s assessment scope.
Level 3 Continuous Certification is a highly selective cloud security assessment program, extending the assurance level of a cloud service beyond the trust given by the certification cycle of ISO/IEC 27001 and the audit period of AICPA SOC 2 Type II reports.
STAR Level 3 Continuous requires all continuous assessments to be performed under the supervision of a third-party auditor. This differs from Level 2 Continuous, which requires a frequently submitted self-assessment on top of Level 2 by the CSP itself.
!!C5 Cloud Controls
In February 2016, the Bundesamt fur Sicherheit Institute (BSI)+++*[»]> ⇒ https://www.bsi.bund.de/ ===, or the German Federal Office for Information Security, established the "Cloud Computing Compliance Controls Catalog (C5) certification"+++*[»]> Federal Office for Information Security, "Compliance Controls Catalogue (C5)"
⇒ https://www.bsi.bund.de/EN/Topics/CloudComputing/Compliance_Controls_Catalogue/Compliance_Controls_Catalogue_node.html === after it noted the rise in cloud computing in Germany. With the C5, the BSI redefined the bar that CSPs should meet when dealing with German data. The establishment of the C5 elevated the demands on CSPs by combining the existing security standards (including international certifications such as ISO 27001) and requiring increased transparency in the data processing. C5 controls can be applied globally.
C5 is intended primarily for professional CSPs, their auditors, and customers of the CSPs. The catalog is divided into 17 thematic sections (e.g., organization of information security, physical security). C5 makes use of recognized security standards, such as ISO 27001, the Cloud Controls Matrix of the Cloud Security Alliance and BSI publications, and it uses these requirements wherever appropriate.
A SOC 2 report proves that a CSP complies with the requirements of the catalogue and that the statements made on transparency are correct. This report is based on the internationally recognized attestation system of the International Standard for Assurance Engagements (ISAE) 3000, which is used by public auditors. When auditing the annual financial statements, the auditors are already on site, and auditing, according to C5, can be performed without much additional effort.
!Privacy Compliance for Cloud
Privacy laws are now changing and may become more stringent. After GDPR, new privacy laws are already in force, such as the US California Consumer Privacy Act (CCPA). It may be prudent for organizations to be more proactive and adopt measures for privacy governance.
To demonstrate privacy-related controls, organizations can include the privacy criteria as part of the scope of their SOC 2 report.[i]Additionally, controls for any other specific laws can be included as additional subject matter. In the wake of new privacy mandates, organizations are encouraged not only to include privacy criteria in their SOC 2 report but also to demand including them in their vendors’ SOC 2 report to mitigate risk.
!!SOC 2 Description for Privacy+++*[»]> American Institute of Certified Public Accountants, "System and Organization Controls: SOC Suite of Services"
⇒ https://www.aicpa.org/soc === 
A SOC 2 report contains a description of services that the service provider provides. When the description includes privacy, service organization management discloses the service commitments and system requirements identified in the service organization’s privacy notice or in its privacy policy that are relevant to the system being described.
When making such disclosures, it may also be helpful to report users if service organization management describes the purposes, uses, and disclosures of personal information permitted by user entity agreements.
!!AICPA Trust Services Criteria (TSC) for Privacy+++*[»]> American Institute of Certified Public Accountants, "Trust Services Criteria" 2017
⇒ https://www.aicpa.org/content/dam/aicpa/interestareas/frc/assuranceadvisoryservices/downloadabledocuments/trust-services-criteria.pdf === 
With approximately 50 points of focus, the TSC organizes the privacy criteria as follows:
* Notice and communication of objectives—The entity provides notice to data subjects about its objectives related to privacy.
* Choice and consent—The entity communicates choices available regarding the collection, use, retention, disclosure, and disposal of personal information to data subjects.
* Collection—The entity collects personal information to meet its objectives related to privacy.
* Use, retention and disposal—The entity limits the use, retention, and disposal of personal information to meet its objectives related to privacy.
* Access—The entity provides data subjects with access to their personal information for review and correction (including updates) to meet its objectives related to privacy.
* Disclosure and notification—The entity discloses personal information, with the consent of the data subjects, to meet its objectives related to privacy. Notification of breaches and incidents is provided to affected data subjects, regulators and others to meet its objectives related to privacy.
* Quality—The entity collects and maintains accurate, up-to-date, complete and relevant personal information to meet its objectives related to privacy.
* Monitoring and enforcement—The entity monitors compliance to meet its objectives related to privacy, including procedures to address privacy-related inquiries, complaints, and disputes.
!Controls for User Organizations
To protect its data in the cloud, users should consider implementing the following controls to minimize the risk:
* Create a secure design before moving to the cloud
* Conduct a cloud impact assessment
* Understand the crown jewels (data) and create a flow analysis
* Monitor role-based access controls (RBAC)
* Evaluate SOC reports with relevant controls of the CSPs
* Implement multifactor authentication (MFA)
* Analyze back up and encryption controls
* Evaluate policies and procedures
* Perform configuration audits
* Perform periodic internal audits
* Ensure compliance with laws e.g. data residency
!Read the full report from ISACA
Data governance and privacy programs that align with organizational goals can help in increasing the maturity roadmap. Continuous monitoring and assurance programs such as the SOC 2 can address weaknesses and provide better visibility to the organization’s stakeholders. If you’re interested in learning more, you can find the full version of the report here+++*[»]> https://www.isaca.org/resources/isaca-journal/issues/2019/volume-6/soc-reports-for-cloud-security-and-privacy === 
//[...]
<<<
&rArr; Lire [[l'original|https://CloudSecurityAlliance.fr/go/k2ab/]] sur le blog de la CSA
!1 - Les nouveautés CSA de la semaine du 3 au 9 février 2020
* Salon : les thématiques du Forum Securité@Cloud 2020 des 18 et 19 mars 2020 sont connues+++*[»]> <<tiddler [[2020.02.07 - Thématiques du Forum Securité@Cloud 2020]]>>=== [>img[iCSF/cloud-security-alliance-fr.png]]
* Appel à Commentaires : "''Cloud Industrial IoT - ICS Security Glossary''"+++*[»]> <<tiddler [[2020.01.15 - Appel à commentaires : 'Cloud Industrial IoT - ICS Security Glossary']]>>===, derniers jours !
* Appel à Commentaires : document sur la ''gestion des risques pour les équipements médicaux connectés au Cloud''+++*[»]> <<tiddler [[2020.01.20 - Appel à commentaires : 'Managing the Risk for Medical Devices Connected to the Cloud']]>>===, derniers jours !
!2 - Veille Web
La [[Veille Web|2020.02.09 - Veille Hebdomadaire - 9 février]] avec une soixantaine de liens dont :
* À lire : rapport 'Cloud Threat Report' de PaloAlto Networks+++*[»]>
|2020.02.05|//PaloAlto Networks//|![[Unit 42 Cloud Threat Report: Spring 2020|https://unit42.paloaltonetworks.com/cloud-threat-report-intro/]] ([[rapport|https://start.paloaltonetworks.com/unit-42-cloud-threat-report]])|Report|
|2020.02.05|//PaloAlto Networks//| → [[PaloAlto Networks Report Finds Poor Security Hygiene Leads to Escalating Cloud Vulnerabilities|https://www.prnewswire.com/news-releases/palo-alto-networks-report-finds-poor-security-hygiene-leads-to-escalating-cloud-vulnerabilities-300999159.html]]|Report|
=== 
* Panne : Microsoft Teams (expiration de certificat)+++*[»]>
|2020.02.03|//Microsoft//|![[Microsoft 365 Status - Microsoft Teams is down|https://twitter.com/MSFT365Status/status/1224351597624537088]]|Outage O365 Teams|
|2020.02.03|On MSFT| → [[Microsoft Teams is down this morning, the company is investigating|https://www.onmsft.com/news/microsoft-teams-is-down-this-morning-the-company-is-investigating]]|Outage O365 Teams|
|2020.02.03|Dark Reading| → [[Bad Certificate Knocks Teams Offline|https://www.darkreading.com/operations/bad-certificate-knocks-teams-offline/d/d-id/1336951]]|Outage O365 Teams|
|2020.02.03|CBR Online| → [[Microsoft Teams Takes a Tumble after Cert Expires|https://www.cbronline.com/enterprise-it/microsoft-teams-certificate/]]|Outage O365 Teams|
|2020.02.03|GeekWire| → [[Microsoft’s Slack competitor Teams is down due to an expired authentication certificate|https://www.geekwire.com/2020/microsofts-slack-competitor-teams-due-expired-authentication-certificate/]]|Outage O365 Teams|
=== 
* Fuites de données : brésiliens fans de football+++*[»]>
|2020.02.05|ZDnet|[[Brazilian firm exposes personal details of thousands of soccer fans|https://www.zdnet.com/article/brazilian-firm-exposes-personal-details-of-thousands-of-soccer-fans/]]|Data_Leak AWS_S3|
===, et Trello+++*[»]>
|2020.02.04|CISO Mag|[[Trello App Exposes Personally Identifiable Information of its Users|https://www.cisomag.com/trello-app-exposes-personally-identifiable-information-of-its-users/]]|Data_Leak Trello|
|2020.01.30|Naked Security| → [[Trello Exposed Search Turns Up Huge Trove of Private Data|https://nakedsecurity.sophos.com/2020/01/30/trello-exposed-search-turns-up-huge-trove-of-private-data/]]|Data_Leak Trello|
=== 
* Vulnérabilités : Kubernetes+++*[»]>
|2020.02.04|Dark Reading|![[Kubernetes Shows Built-in Weakness|https://www.darkreading.com/vulnerabilities---threats/kubernetes-shows-built-in-weakness/d/d-id/1336956]]|Kubernetes Vulnerabilities|
=== 
* Rapport : PaloAlto Networks (sur GitHub)+++*[»]>
|2020.02.06|//PaloAlto Networks//|![[Unit 42 CTR: Sensitive Data Exposed in GitHub|https://start.paloaltonetworks.com/unit-42-cloud-threat-report]]|Report|
=== 
* Outils : Dufflebag+++*[»]>
|2020.02.05|Kitploit|[[Dufflebag - Search Exposed EBS Volumes For Secrets|https://www.kitploit.com/2020/02/dufflebag-search-exposed-ebs-volumes.html]]|Tools|
=== et Parliament+++*[»]>
|2020.02.04|//Cloudonaut//|[[Show your Tool: Parliament|https://cloudonaut.io/show-your-tool-parliament/]]|Tools|
=== 
* Divers : détection d'intrusion dans le Cloud+++*[»]>
|2020.02.06|//Uptycs//|![[Best Intrusion Detection Techniques In Cloud Computing|https://www.uptycs.com/blog/intrusion-detection-in-cloud-computing]]|Detection|
===, évaluation des prestataires cloud avec HECVAT+++*[»]>
|2020.02.05|Help Net Security|![[HECVAT toolkit helps higher education institutions assess cloud adoption risks|https://www.helpnetsecurity.com/2020/02/05/hecvat-toolkit/]]|Vendor_Assessment|
||EDUCAUSE|[[HECVAT - Higher Education Community Vendor Assessment Toolkit|https://www.ren-isac.net/public-resources/hecvat.html]]|Vendor_Assessment|
||EDUCAUSE|[[HECVAT Cloud Broker Index (CBI)|https://www.ren-isac.net/hecvat/cbi.html]]|Vendor_Assessment|
===, ressources et certifications AWS, surface d'attaque+++*[»]>
|2020.02.05|//XM Cyber//|![[Having Fun With Cloud Services|https://xmcyber.com/having-fun-with-cloud-services/]]|Attack_Surface|
===, risques liés au DaaS (Desktop-as-a-Service)+++*[»]>
|2020.02.04|//Hysolate//|[[3 Desktop as a Service (DaaS) Security Risks|https://www.hysolate.com/blog/desktop-as-a-service-daas-security-risks/]]|DaaS Risks|
=== 
!3 - Weekly Cloud and Security Watch Newsletter[>img[iCSF/inEnglish.png]]
<<tiddler [[2020.02.09 - Weekly Newsletter - February 9th]]>>
!CSA updates and news - February 3rd to 9th
* Themes for the 'Forum Securité@Cloud 2020' in Paris, March 18th and 19th, 2020 [>img[iCSF/cloud-security-alliance-fr.png]]
* Open Peer Reviews: "Managing the Risk for Medical Devices Connected to the Cloud" (until Feb. 14th)
* Open Peer Reviews: "Cloud Industrial Internet of Things (IIoT) - Industrial Control Systems Security Glossary" (until Feb. 15th)
!Cloud and Security News Watch
[[Over 60 links|2020.02.09 - Veille Hebdomadaire - 9 février]] among which:
* Recommended reading: PaloAlto Networks' Unit 42 'Cloud Threat Report'
* Outages: Microsoft Teams (expired authentication certificate)
* Data Leaks: personal details of soccer fans in Brazil, and Trello
* Vulnerabilities: Kubernetes
* Report: PaloAlto Networks (Sensitive Data Exposed in GitHub)
* Tools: Dufflebag (to search exposed EBS volumes for secrets) and Parliament (AWS IAM linting library)
* Miscellaneous: Best intrusion detection techniques in Cloud Computing; Best Intrusion Detection Techniques In Cloud Computing; HECVAT toolkit to assess cloud adoption risks; Having fun with Cloud Services attack surface, some Desktop as a Service (DaaS) security risks
|ssTabl99|k
|!⇒ [[CloudSecurityAlliance.fr/go/K29/|https://CloudSecurityAlliance.fr/go/K29/]] |
|!Février|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2020.02.09|
|2020.02.09|Cloud Security Podcast|[[Is public cloud secure? - Francesco Cipollone, Cloud Security Alliance|https://www.cloudsecuritypodcast.tv/listen-to-the-episodes/francesco-cipollone]]|Podcast|
|2020.02.09|Digital Journal|[[Interview: Cloud’s biggest threat? The customers who use it|http://www.digitaljournal.com/tech-and-science/technology/interview-cloud-s-biggest-threat-the-customers-who-use-it/article/566808]]]|Threats|
|2020.02.09|Bernard Marr|[[What Is A Data Passport: Building Trust, Data Privacy And Security In The Cloud|https://www.linkedin.com/pulse/what-data-passport-building-trust-privacy-security-cloud-bernard-marr/]]|Data Trust Privacy|
|2020.02.09|//RedHat//|[[What is hybrid cloud security?|https://www.redhat.com/en/topics/security/what-is-hybrid-cloud-security]]|Hybrid_Cloud|
|2020.02.09|//PuPuWeb//|![[10 Tenets of Effective SASE Solution to Secure Cloud-Enabled Organization|https://pupuweb.com/tenets-effective-sase-solution-secure-cloud-enabled-organization/]]|SASE|
|>|>|>|!2020.02.08|
|2020.02.08|Nathan Getty|[[AWS Automated Remediation - Part 1: Security Groups|https://getsec.github.io/2020/02/aws-remedy-1/]] (1/2)|AWS Remediation|
|>|>|>|!2020.02.07|
|2020.02.07|Bruce Schneier|[[Security in 2020: Revisited|https://www.schneier.com/blog/archives/2020/02/security_in_202_1.html]]|Challenges History|
|2020.02.07|//PaloAlto Networks//|[[The Cloud’s Sunny Future: The Rewards of Working in Cloud Security|https://blog.paloaltonetworks.com/2020/02/cc-working-in-cloud-security/]]|Risks|
|2020.02.07|Safe Controls|[[DevSecOps: Embedded security in agile development|https://safecontrols.blog/2020/02/07/decsecops-embedded-security-in-agile-development/]]|DevSecOps|
|>|>|>|!2020.02.06|
|2020.02.06|//PaloAlto Networks//|![[Unit 42 CTR: Sensitive Data Exposed in GitHub|https://start.paloaltonetworks.com/unit-42-cloud-threat-report]]|Report|
|2020.02.06|Techcentral.ie| → [[Infrastructure-as-code templates are source of cloud infrastructure weaknesses|https://www.techcentral.ie/infrastructure-as-code-templates-are-source-of-cloud-infrastructure-weaknesses/]]|Report|
|2020.02.07|Bleeping Computer| → [[Misconfigured Docker Registries Expose Orgs to Critical Risks|https://www.bleepingcomputer.com/news/security/misconfigured-docker-registries-expose-orgs-to-critical-risks/]]|Report|
|2020.02.10|SecTor| → [[What Exposed Docker Registries Tell Us About Cloud Deployments|https://sector.ca/what-exposed-docker-registries-tell-us-about-cloud-deployments/]]|Report|
|2020.02.10|Security Week| → [[Misconfigured Docker Registries Expose Thousands of Repositories|https://www.securityweek.com/misconfigured-docker-registries-expose-thousands-repositories/]]|Report|
|2020.02.10|//ThreatPost//| → [[Docker Registries Expose Hundreds of Orgs to Malware, Data Theft|https://threatpost.com/docker-registries-malware-data-theft/152734/]]|Report|
|2020.02.06|//Uptycs//|![[Best Intrusion Detection Techniques In Cloud Computing|https://www.uptycs.com/blog/intrusion-detection-in-cloud-computing]]|Detection|
|2020.02.06|//ThreatStack//|[[9 AWS Security Certifications to Consider in 2020|https://www.threatstack.com/blog/9-aws-security-certifications-to-consider-in-2020]]|AWS Certifications|
|2020.02.06|//Park My Cloud//|[[7 Favorite AWS Training Resources|https://www.parkmycloud.com/blog/aws-training/]]|AWS Training|
|2020.02.06|//Caylent//|[[Understanding Kubernetes Interfaces: CRI, CNI, & CSI|https://caylent.com/understanding-kubernetes-interfaces-cri-cni-csi]]|Kubernetes|
|2020.02.06|//Alibaba Cloud//|[[Analysis of TLS/SSL Handshake Failure Scenarios on Alibaba Cloud|https://www.alibabacloud.com/blog/analysis-of-tlsssl-handshake-failure-scenarios-on-alibaba-cloud_595800]]|TLS_SSL Failure|
|>|>|>|!2020.02.05|
|2020.02.05|UK Authority|[[Survey shows risk, costs and skills shortage hinder cloud adoption|https://www.ukauthority.com/articles/survey-shows-risk-costs-and-skills-shortage-hinder-cloud-adoption/]]|Survey|
|2020.02.05|ZDnet|[[Brazilian firm exposes personal details of thousands of soccer fans|https://www.zdnet.com/article/brazilian-firm-exposes-personal-details-of-thousands-of-soccer-fans/]]|Data_Leak AWS_S3|
|2020.02.05|Kitploit|[[Dufflebag - Search Exposed EBS Volumes For Secrets|https://www.kitploit.com/2020/02/dufflebag-search-exposed-ebs-volumes.html]]|Tools|
|2020.02.05|Silicon Angle|[[CIA reportedly seeking to hire multiple providers for new cloud computing contracts|https://siliconangle.com/2020/02/05/cia-seeking-hire-multiple-providers-new-cloud-computing-contracts/]]|Vendor_Assessment|
|2020.02.05|Cloud Native Computing Foundation|[[Announcing the containerd Project Journey Report|https://www.cncf.io/blog/2020/02/05/announcing-the-containerd-project-journey-report/]] ([[Analysis|https://www.cncf.io/cncf-containerd-project-journey/]])|Analysis Container|
|2020.02.05|Help Net Security|![[HECVAT toolkit helps higher education institutions assess cloud adoption risks|https://www.helpnetsecurity.com/2020/02/05/hecvat-toolkit/]]|Vendor_Assessment|
||EDUCAUSE|[[HECVAT - Higher Education Community Vendor Assessment Toolkit|https://www.ren-isac.net/public-resources/hecvat.html]]|Vendor_Assessment|
||EDUCAUSE|[[HECVAT Cloud Broker Index (CBI)|https://www.ren-isac.net/hecvat/cbi.html]]|Vendor_Assessment|
|2020.02.05|NextGov|[[CIA Issues Draft Solicitation for Next Step in Multibillion-Dollar Cloud Journey|https://www.nextgov.com/it-modernization/2020/02/cia-issues-draft-solicitation-next-step-multibillion-dollar-cloud-journey/162909/]]|Government US|
|2020.02.13|//Cloud Management Insider//| → [[The C2E Contract: Is CIA updating its cloud technology stack?|https://www.cloudmanagementinsider.com/the-cia-is-updating-its-cloud-technology-with-c2e-contract/]]|Government US|
|2020.02.05|GovLoop|[[Rethinking a Reliance on Public Cloud|https://www.govloop.com/hci-a-public-cloud-alternative/]] ([[étude|https://go.govloop.com/path-to-cloud.html]])|Survey|
|2020.02.05|//OVH Cloud//[>img[iCSF/flag_fr.png]]|[[Quelle (r)évolution pour le cloud en 2020 ?|https://www.journaldunet.com/solutions/cloud-computing/1488599-quelle-r-evolution-pour-le-cloud-en-2020/]]|Evolutions|
|2020.02.05|//JDSupra//|[[Using Microsoft 365 to Stay Compliant with Data Privacy Laws|https://www.jdsupra.com/legalnews/using-microsoft-365-to-stay-compliant-55167/]]|O365 Privacy|
|2020.02.05|//Rapid7//|[[How to Identify, Prioritize and Remediate Vulnerabilities in the Cloud|https://blog.rapid7.com/2020/02/05/how-to-identify-prioritize-and-remediate-vulnerabilities-in-the-cloud/]] (2/4)|Remediation|
|2020.02.05|//PaloAlto Networks//|![[Unit 42 Cloud Threat Report: Spring 2020|https://unit42.paloaltonetworks.com/cloud-threat-report-intro/]] ([[rapport|https://start.paloaltonetworks.com/unit-42-cloud-threat-report]])|Report|
|2020.02.05|//PaloAlto Networks//| → [[PaloAlto Networks Report Finds Poor Security Hygiene Leads to Escalating Cloud Vulnerabilities|https://www.prnewswire.com/news-releases/palo-alto-networks-report-finds-poor-security-hygiene-leads-to-escalating-cloud-vulnerabilities-300999159.html]]|Report|
|2020.02.05|DevOps.com| → [[Report Pins Cloud Security Woes on Flawed DevOps Processes|https://devops.com/report-pins-cloud-security-woes-on-flawed-devops-processes/]]|Report|
|2020.02.05|//XM Cyber//|![[Having Fun With Cloud Services|https://xmcyber.com/having-fun-with-cloud-services/]]|Attack_Surface|
|2020.02.05|//Ntirety//|[[More Cloud, More Hacks: Panic Or "Keep Calm And Carry On"?|https://www.forbes.com/sites/emilsayegh/2020/02/05/more-cloud-more-hacks-pt-1/]] (1/2)|Misc|
|2020.02.05|//Zscaler//|[[A zero trust approach simplifies user access and enables cloud migration|https://www.zscaler.com/blogs/corporate/zero-trust-approach-simplifies-user-access-and-enables-cloud-migration]]|Zero_Trust|
|2020.02.05|//Lastline//|[[You Need to Do SOMETHING to Prevent Your Clouds from Getting Hacked|https://www.lastline.com/blog/do-something-to-prevent-your-clouds-from-getting-hacked/]]|Misc|
|2020.02.05|//Virtustream//|[[Three cybersecurity questions every organisation should ask their cloud service providers|https://www.itproportal.com/features/three-cybersecurity-questions-every-organisation-should-ask-their-cloud-service-providers/]]|Vendor_Assessment|
|2020.02.05|//Datrium//|[[Datrium Expands Partner Network to Fuel Cloud Transformation and Deliver Cloud-based Disaster Recovery to Enterprises Globally|https://vmblog.com/archive/2020/02/05/datrium-expands-partner-network-to-fuel-cloud-transformation-and-deliver-cloud-based-disaster-recovery-to-enterprises-globally.aspx]]|DRP|
|2020.02.05|//JumpCloud//|[[Azure AD for Remote Users|https://jumpcloud.com/blog/azure-ad-remote-users/]]|AzureAD|
|2020.02.05|//Microsoft Azure//|[[Backup Explorer Now Available in Preview|https://azure.microsoft.com/en-us/blog/backup-explorer-now-available-in-preview/]] ([[Détails|https://docs.microsoft.com/en-us/azure/backup/monitor-azure-backup-with-backup-explorer]])|Azure BCP|
|2020.02.05|Redmond ChannelPartner| → [[Microsoft Issues Preview of Azure Backup Explorer|https://rcpmag.com/articles/2020/02/05/microsoft-previews-azure-backup-explorer.aspx]]|Azure BCP|
|2020.02.05|//VMware//|[[Cloud Companies Chase Future in Cybersecurity 'Wild West'|https://finance.yahoo.com/news/cloud-companies-chase-future-cybersecurity-110015077.html]]|Market|
|2020.02.05|//Compare the Cloud//|[[How to Design a Winning Cloud Procurement Strategy|https://www.comparethecloud.net/articles/how-to-design-a-winning-cloud-procurement-strategy/]]|Procurement|
|2020.02.05|//Netskope//|[[The CTI Cloud context dilema|https://www.enisa.europa.eu/events/2019-cti-eu/presentations/the-cti-cloud-context-dilema]]|CTI|
|>|>|>|!2020.02.04|
|2020.02.04|Dark Reading|![[Kubernetes Shows Built-in Weakness|https://www.darkreading.com/vulnerabilities---threats/kubernetes-shows-built-in-weakness/d/d-id/1336956]]|Kubernetes Vulnerabilities|
|2020.02.04|Bleeping Computer|[[Office 365 to Block Harmful Content Regardless of Custom Configs|https://www.bleepingcomputer.com/news/security/office-365-to-block-harmful-content-regardless-of-custom-configs/]]|O365|
|2020.02.04|The Register|[[The winners and losers of infrastructure clouds revealed: AWS, Microsoft, Google and Alibaba get fatter|https://www.theregister.co.uk/2020/02/04/worldwide_cloud_computing_revenue_up_37_in_2019_rivals_gain_slightly_on_aws/]]|Market|
|2020.02.04|ID Access Management|[[Integrating Defender ATP with Azure Sentinel to detect Pass-The-Hash & Pass-The-Ticket|https://identityaccess.management/2020/02/04/integrating-defender-atp-with-azure-sentinel-to-detect-pass-the-hash-pass-the-ticket/]]|Azure Sentinel|
|2020.02.04|Dark Reading|[[Companies Pursue Zero Trust, but Implementers Are Hesitant|https://www.darkreading.com/operations/identity-and-access-management/companies-pursue-zero-trust-but-implementers-are-hesitant/d/d-id/1336969]]|Zero_Trust|
|2020.02.04|//Cloudonaut//|[[Show your Tool: Parliament|https://cloudonaut.io/show-your-tool-parliament/]]|Tools|
|2020.02.04|CISO Mag|[[Trello App Exposes Personally Identifiable Information of its Users|https://www.cisomag.com/trello-app-exposes-personally-identifiable-information-of-its-users/]]|Data_Leak Trello|
|2020.01.30|Naked Security| → [[Trello Exposed Search Turns Up Huge Trove of Private Data|https://nakedsecurity.sophos.com/2020/01/30/trello-exposed-search-turns-up-huge-trove-of-private-data/]]|Data_Leak Trello|
|2020.02.04|//Microsoft Azure//|[[Introducing Conditional Access for the Office 365 suite!|https://techcommunity.microsoft.com/t5/azure-active-directory-identity/introducing-conditional-access-for-the-office-365-suite/ba-p/1131979]] ([[détails|https://aka.ms/CA_Service_Dependencies]])|O365|
|2020.02.04|//Google GCP//|[[Bringing a passion for privacy to Cloud|https://cloud.google.com/blog/products/gcp/bringing-a-passion-for-privacy-to-cloud]]|GCP Privacy|
|2020.02.04|//Compare the Cloud//|[[Maintaining control in a multi-cloud ecosystem|https://www.comparethecloud.net/articles/maintaining-control-in-a-multicloud-ecosystem/]]|Multi_Cloud|
|2020.02.04|//Hysolate//|[[3 Desktop as a Service (DaaS) Security Risks|https://www.hysolate.com/blog/desktop-as-a-service-daas-security-risks/]]|DaaS Risks|
|2020.02.04|//ThreatStack//|[[25 Best Cloud Security Podcasts to Visit in 2020|https://www.threatstack.com/blog/25-best-cloud-security-podcasts-to-visit-in-2020]]|Podcasts|
|2020.02.04|//Attivo Networks//|[[Multi-Cloud Threat Detection Innovations Drive Cyber Deception Growth|https://vmblog.com/archive/2020/02/04/multi-cloud-threat-detection-innovations-drive-cyber-deception-growth.aspx]]|Deception|
|2020.02.04|//Paladion//|[[Why DevOps Is An Attractive Target For Cybercrime Syndicates|https://www.forbes.com/sites/forbestechcouncil/2020/02/04/why-devops-is-an-attractive-target-for-cybercrime-syndicates/]]|DevOps|
|2020.02.04|//TrendMicro//|[[Four Reasons Your Cloud Security Is Keeping You Up At Night|https://blog.trendmicro.com/four-reasons-your-cloud-security-is-keeping-you-up-at-night/]]|Best_Practices|
|>|>|>|!2020.02.03|
|2020.02.03|Hacker Combat|[[How to Conquer the Cybersecurity Challenges of the Cloud?|https://hackercombat.com/how-to-conquer-the-cybersecurity-challenges-of-the-cloud/]]|Challenges|
|2020.02.03|Container Journal|[[Microservices and Cloud-Native: 2 Paths to Get There|https://containerjournal.com/topics/container-ecosystems/microservices-and-cloud-native-2-paths-to-get-there/]]|MicroServices|
|2020.02.03|//Microsoft//|![[Microsoft 365 Status - Microsoft Teams is down|https://twitter.com/MSFT365Status/status/1224351597624537088]]|Outage O365 Teams|
|2020.02.03|On MSFT| → [[Microsoft Teams is down this morning, the company is investigating|https://www.onmsft.com/news/microsoft-teams-is-down-this-morning-the-company-is-investigating]]|Outage O365 Teams|
|2020.02.03|Dark Reading| → [[Bad Certificate Knocks Teams Offline|https://www.darkreading.com/operations/bad-certificate-knocks-teams-offline/d/d-id/1336951]]|Outage O365 Teams|
|2020.02.03|CBR Online| → [[Microsoft Teams Takes a Tumble after Cert Expires|https://www.cbronline.com/enterprise-it/microsoft-teams-certificate/]]|Outage O365 Teams|
|2020.02.03|GeekWire| → [[Microsoft’s Slack competitor Teams is down due to an expired authentication certificate|https://www.geekwire.com/2020/microsofts-slack-competitor-teams-due-expired-authentication-certificate/]]|Outage O365 Teams|
|2020.02.03|//Compare the Cloud//|[[The damaging effect of cloud outages, and how to stop them|https://www.comparethecloud.net/articles/the-damaging-effect-of-cloud-outages-and-how-to-stop-them/]]|Outages Impacts|
|2020.02.03|//Catchpoint//|[[Visibility Is Critical During Cloud Migrations|https://blog.catchpoint.com/2020/02/03/cloud-migration-visibility/]]|Visibility|
!Conférences au Forum Securité@Cloud
Le cycle de conférence associé au "Forum Securité@Cloud" se déroulera les 18 et 19 mars 2020, dans le cadre du salon "''Cloud + Datacenter et IoT World - MtoM''" à Paris, Porte de Versailles. Ce Forum aborde la cybersécurité du Cloud et de l’IoT pendant les deux jours du salon dans une salle dédiée.
Les grandes thématiques du Forum par demi-journée sont les suivantes :
|>| !Mercredi 18 mars 2020 |
|Matin|Après-midi|
|''Cloud de Confiance'' • //Enjeux, Méthodologie, Outils d’analyse//
• Mesures de sécurité prendre pour migrer vers le Cloud & y rester en toute sérénité ? |''Cloud & Cybersécurité'' • //Etat de l’art, Innovations, Tendances//
• Sécurité du Cloud, sécurité par le Cloud : technologies & gouvernance| |>| !Jeudi 19 mars 2020 | |Matin|Après-midi| |''Cybersécurité IoT'' • //Réglementations, Security By Design, Méthodes//
• Sécurité & développement IoT : points de vue des experts en cybersécurité |''Préparation & réaction aux incidents'' • //Cyberattaques, Continuité - Résilience//
• Cyber-résilience : Accélération des menaces & Cloud,comment y faire face ?| ''Si vous souhaitez faire une présentation ou participer à une table ronde sur l'un des thèmes, ou même animer une table ronde, contactez nous au plus vite.'' Dès que le programe définitif sera publié, il vous sera communiqué.
!1 - Les nouveautés CSA de la semaine du 27 janvier au 2 février 2020
* Publication : Ajout 'Cloud OS Security Specifications' à la CCM v3.0.1+++*[»]> <<tiddler [[2020.01.29 - Publication : 'CSA CCM v3.0.1 Addendum - Cloud OS Security Specifications']]>>=== [>img[iCSF/cloud-security-alliance-fr.png]]
* Appel à Commentaires : document "''The Six Pillars of DevSecOps: Collective Responsibility''"+++*[»]> <<tiddler [[2020.01.21 - Appel à commentaires : 'The Six Pillars of DevSecOps: Collective Responsibility']]>>=== : plus que 3 jours pour y participer
* Appel à Commentaires : document "''Cloud Industrial IoT - ICS Security Glossary''"+++*[»]> <<tiddler [[2020.01.15 - Appel à commentaires : 'Cloud Industrial IoT - ICS Security Glossary']]>>=== 
* Appel à Commentaires : document sur la ''gestion des risques pour les équipements médicaux connectés au Cloud''+++*[»]> <<tiddler [[2020.01.20 - Appel à commentaires : 'Managing the Risk for Medical Devices Connected to the Cloud']]>>=== 
!2 - Veille Web
La [[Veille Web|2020.02.02 - Veille Hebdomadaire - 2 février]] avec seulement une cinquantaine de liens dont :
* __À prévoir :__ accès temporaire illimité sur CloudAcademy du 7 au 10 février 2002+++*[»]>
|2020.01.31|CloudAcademy|![[How to Unlock Complimentary Access to Cloud Academy|https://cloudacademy.com/blog/how-to-unlock-complimentary-access-to-cloud-academy/]]|Training|
=== 
* __À faire :__ il ne reste plus qu'un mois pour faire la rotation de certains de vos certificats AWS+++*[»]>
|2020.01.07|//AWS//|![[Urgent & Important - Rotate Your Amazon RDS, Aurora, and Amazon DocumentDB (with MongoDB compatibility) Certificates|https://aws.amazon.com/blogs/aws/urgent-important-rotate-your-amazon-rds-aurora-and-documentdb-certificates/]]|AWS Certificates|
|2020.01.09|Dark Reading|[[AWS Issues 'Urgent' Warning for Database Users to Update Certs|https://www.darkreading.com/cloud/aws-issues-urgent-warning-for-database-users-to-update-certs/d/d-id/1336766]]|AWS Certificates|
=== 
* Attaques et vulnérabilités : retour sur la vulnérabilité Azure détectée par Checkpoint et ''corrigée en novembre 2019''+++*[»]>
|2020.01.30|//Checkpoint//|![[Remote Cloud Execution - Critical Vulnerabilities in Azure Cloud Infrastructure (Part I)|https://research.checkpoint.com/2020/remote-cloud-execution-critical-vulnerabilities-in-azure-cloud-infrastructure-part-i/]] (1/2)|Azure Vulnerability CVE-2019-1372|
|2020.01.30|//Checkpoint//|![[Remote Cloud Execution - Critical Vulnerabilities in Azure Cloud Infrastructure (Part II)|https://research.checkpoint.com/2020/remote-cloud-execution-critical-vulnerabilities-in-azure-cloud-infrastructure-part-ii/]] (2/2)|Azure Vulnerability CVE-2019-1372|
|2020.01.30|Dark Reading| → [[Two Vulnerabilities Found in Microsoft Azure Infrastructure|https://www.darkreading.com/cloud/two-vulnerabilities-found-in-microsoft-azure-infrastructure/d/d-id/1336932]]|Azure Vulnerability CVE-2019-1372|
|2020.01.30|The Hacker News| → [[Microsoft Azure Flaws Could Have Let Hackers Take Over Cloud Servers|https://thehackernews.com/2020/01/microsoft-azure-vulnerabilities.html]]|Azure Vulnerability CVE-2019-1372|
===, techniques d'attaques contre Docker+++*[»]>
|2020.01.29|//PaloAlto Networks//|![[Attacker’s Tactics and Techniques in Unsecured Docker Daemons Revealed|https://unit42.paloaltonetworks.com/attackers-tactics-and-techniques-in-unsecured-docker-daemons-revealed/]]|Docker Attacks|
|2020.01.30|//Secodify//|! → [[Attacker’s Tactics and Techniques in Unsecured Docker Daemons Revealed|https://www.secodify.com/report/014e5057-1ab1-5984-be97-794338b20f6a/]]|Docker Attacks|
=== 
* Rapports : recommandations du Syntec+++*[»]>
|2020.01.29|Syntec Numérique[>img[iCSF/flag_fr.png]]|[[Pour une ambition européenne en matière de Cloud : Syntec Numérique et TECH IN France formulent dix recommandations|https://syntec-numerique.fr/actu-informatique/pour-ambition-europeenne-en-matiere-cloud-syntec-numerique-tech-france-formulent]]|Report Syntec|
|2020.01.29|Silicon[>img[iCSF/flag_fr.png]]| → [[Cloud : 10 recommandations de Syntec Numérique et Tech in France|https://www.silicon.fr/cloud-recommandations-syntec-numerique-tech-in-france-333446.html]]|Report Syntec|
===, protection des données+++*[»]>
|2020.01.29|//Microsoft Azure//|![[Data Protection and Privacy Compliance in the Cloud: Privacy Concerns Are Not Slowing the Adoption of Cloud Services, but Challenges Remain|https://azure.microsoft.com/en-us/resources/ponemon-privacy-cloud-research/]] ([[rapport pdf|https://azure.microsoft.com/mediahandler/files/resourcefiles/ponemon-privacy-cloud-research/Ponemon-privacy-cloud-research.pdf]])|Survey Ponemon|
|2020.01.29|//Microsoft Azure//| → [[10 recommendations for cloud privacy and security with Ponemon research|https://azure.microsoft.com/en-us/blog/10-recommendations-for-cloud-privacy-and-security-with-ponemon-research/]]|Survey Ponemon|
===, sondage Trendmicro et McAfee+++*[»]>
|2020.01.28|//McAfee//|[[Enterprise Supernova: The Data Dispersion Cloud Adoption and Risk Report|https://www.mcafee.com/enterprise/en-us/solutions/lp/mcafee-data-dispersion-cloud-adoption-risk-report.html]]|Survey McAfee|
|2020.01.28|//McAfee//| → [[McAfee Report Demonstrates That Data Is Widely Dispersed in the Cloud Beyond Most Enterprise Control|https://www.businesswire.com/news/home/20200127005732/en/McAfee-Report-Demonstrates-Data-Widely-Dispersed-Cloud]]|Survey McAfee|
|2020.01.28|Help Net Security| → [[52% of companies use cloud services that have experienced a breach|https://www.helpnetsecurity.com/2020/01/28/accessing-cloud-services/]]|Survey McAfee|
|2020.01.30|Silicon[>img[iCSF/flag_fr.png]]| → [[Cloud : les entreprises perdent-elles le contrôle des données ?|https://www.silicon.fr/cloud-entreprises-controle-donnees-333516.html]]|Survey McAfee|
|2020.02.11|Silicon[>img[iCSF/flag_fr.png]]|[[Cloud : des données de plus en plus hors de contrôle ?|https://www.silicon.fr/cloud-donnees-hors-controle-334007.html]]|Survey McAfee|
=== 
* Divers : bonnes pratiques+++*[»]>
|2020.01.28|Nathan Getty|![[Cloud Security Commandments|https://getsec.github.io/2020/01/csc/]]|Controls|
===, liste de tous les services AWS+++*[»]>
|2020.02.01|Techradar Pro|![[AWS: Your complete guide to Amazon Web Services & features|https://www.techradar.com/news/aws]]|AWS|
===, fondamentaux sur Azure+++*[»]>
|2020.01.30|Nino Crudele|![[Azure Fundamental for Ethical Hackers and Special Ops Team|https://ninocrudele.com/azure-fundamental-for-ethical-hackers-and-special-ops-team]] ([[pdf|https://ninocrudele.com/wp-content/docs/Azure-Fundamental-for-Ethical-Hackers-and-Special-Ops-Team.pdf]])|AWS Fundamentals|
===, SLAs, outil S3Enum+++*[»]>
|2020.01.30|Kitploit|[[S3Enum - Fast Amazon S3 Bucket Enumeration Tool For Pentesters |https://www.kitploit.com/2020/01/s3enum-fast-amazon-s3-bucket.html]]|AWS_S3 [[Tools|Outils-GitHub]]|
===, APIs, Kubernetes, Cloud Act...
!3 - Contacts
Rejoignez nous sur [[Slack]] (si vous êtes déjà membre de notre groupe sur [[LinkedIN]]), et d'ici quelques semaines, sur [[Circle|CSA Circle]]
|!Février|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2020.02.01|
|2020.02.01|Techradar Pro|![[AWS: Your complete guide to Amazon Web Services & features|https://www.techradar.com/news/aws]]|AWS|
|2020.02.01|//NCC Group//|[[Command and KubeCTL: Real-World Kubernetes Security for Pentesters|https://www.shmoocon.org/speakers#kubectl]] (Conférence Shmoocon)|Kubernetes PenTesting|
|!Janvier|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2020.01.31|
|2020.01.31|Make Use Of|[[Protect Your Google Account Using the Advanced Protection Program|https://www.makeuseof.com/tag/google-advanced-protection-program/]]|Google Authentication|
|2020.01.31|CloudAcademy|![[How to Unlock Complimentary Access to Cloud Academy|https://cloudacademy.com/blog/how-to-unlock-complimentary-access-to-cloud-academy/]]|Training|
|2020.01.31|Container Journal|[[When To Use - and Not To Use - Microservices|https://containerjournal.com/topics/container-ecosystems/when-to-use-and-not-to-use-microservices/]]|Microservices|
|2020.01.31|//Checkpoint//|[[Cloud Visibility Challenges|https://blog.checkpoint.com/2020/01/31/cloud-visibility-challenges/]]|Misc|
|2020.01.31|//Imperva//|[[Imperva Received Top Scores in Gartner’s "Critical Capabilities for Cloud Web Application Firewalls"|https://www.imperva.com/blog/criticalcomparisonsinappsecurity/]]|WAF|
|2020.01.31|//Thousand Eyes//|[[Measuring Cloud Performance: Mind Your Agency’s SLAs|https://blog.thousandeyes.com/measuring-cloud-performance-agency-slas/]]|SLA|
|2020.01.31|//CyberArk Conjur//|[[Managing Secrets Successfully in a Cloud-Native World|https://www.conjur.org/blog/managing-secrets-successfully-in-a-cloud-native-world/]]|Secret_Management|
|>|>|>|!2020.01.30|
|2020.01.30|BizTech|[[In the Cloud, IT Teams Remain Responsible for Cybersecurity|https://biztechmagazine.com/article/2020/01/cloud-it-teams-remain-responsible-cybersecurity]]|Governance Responsibility|
|2020.01.30|Cyber Defense Magazine|[[Blocking Privilege Escalation Attacks in Amazon Web Services (AWS)|https://www.cyberdefensemagazine.com/blocking-privilege-escalation-attacks-in-amazon-web-services-aws/]]|AWS Protection|
|2020.01.30|Kitploit|[[S3Enum - Fast Amazon S3 Bucket Enumeration Tool For Pentesters |https://www.kitploit.com/2020/01/s3enum-fast-amazon-s3-bucket.html]]|AWS_S3 [[Tools|Outils-GitHub]]|
|2020.01.30|Nino Crudele|![[Azure Fundamental for Ethical Hackers and Special Ops Team|https://ninocrudele.com/azure-fundamental-for-ethical-hackers-and-special-ops-team]] ([[pdf|https://ninocrudele.com/wp-content/docs/Azure-Fundamental-for-Ethical-Hackers-and-Special-Ops-Team.pdf]])|AWS Fundamentals|
|2020.01.30|//Checkpoint//|![[Remote Cloud Execution - Critical Vulnerabilities in Azure Cloud Infrastructure (Part I)|https://research.checkpoint.com/2020/remote-cloud-execution-critical-vulnerabilities-in-azure-cloud-infrastructure-part-i/]] (1/2)|Azure Vulnerability CVE-2019-1372|
|2020.01.30|//Checkpoint//|![[Remote Cloud Execution - Critical Vulnerabilities in Azure Cloud Infrastructure (Part II)|https://research.checkpoint.com/2020/remote-cloud-execution-critical-vulnerabilities-in-azure-cloud-infrastructure-part-ii/]] (2/2)|Azure Vulnerability CVE-2019-1372|
|2020.01.30|Dark Reading| → [[Two Vulnerabilities Found in Microsoft Azure Infrastructure|https://www.darkreading.com/cloud/two-vulnerabilities-found-in-microsoft-azure-infrastructure/d/d-id/1336932]]|Azure Vulnerability CVE-2019-1372|
|2020.01.30|The Hacker News| → [[Microsoft Azure Flaws Could Have Let Hackers Take Over Cloud Servers|https://thehackernews.com/2020/01/microsoft-azure-vulnerabilities.html]]|Azure Vulnerability CVE-2019-1372|
|2020.01.30|//Comarch//|[[Using the Cloud: Seven Top Security Threats to Know About|https://www.infosecurity-magazine.com/blogs/cloud-security-threats-to-know/]]|Threats|
|2020.01.30|//Cloud Passage//|[[Cloud Workload Security - Part 1: Introducing the Forrester Wave Report|https://www.cloudpassage.com/blog/cloud-workload-security-part1/]] (1/2)|Workloads|
|2019.12.24|//Forrester//| → [[Cloud Infrastructure Demands New Protection Approaches - The Forrester Wave™: Cloud Workload Security, Q4 2019|https://pages.cloudpassage.com/forrester_cloud_workload_security_q419]]|Analysis Workloads|
|2020.01.30|//Google//|[[Windows Server applications, welcome to Google Kubernetes Engine|https://cloud.google.com/blog/products/containers-kubernetes/run-windows-server-containers-on-gke]]|GCP Kubernetes Windows|
|2020.01.30|Silicon Angle| → [[Google brings Windows containers to its Kubernetes Engine|https://siliconangle.com/2020/01/30/google-brings-windows-containers-google-kubernetes-engine/]]|GCP Kubernetes Windows|
|2020.02.03|Silicon[>img[iCSF/flag_fr.png]]| → [[Google ouvre son Kubernetes aux conteneurs Windows|https://www.silicon.fr/google-kubernetes-conteneurs-windows-333643.html]]|GCP Kubernetes Windows|
|2020.01.30|//Blackblaze//|![[Drive Stats Update|https://www.backblaze.com/blog/drive-stats-update/]]|Storage|
|2020.01.30|//Microsoft//|[[Changing the Monolith - Part 3: What’s your process?|https://www.microsoft.com/security/blog/2020/01/30/changing-the-monolith-part-3-whats-your-process/]] (3/5)|Misc|
|>|>|>|!2020.01.29|
|2020.01.29|Syntec Numérique[>img[iCSF/flag_fr.png]]|[[Pour une ambition européenne en matière de Cloud : Syntec Numérique et TECH IN France formulent dix recommandations|https://syntec-numerique.fr/actu-informatique/pour-ambition-europeenne-en-matiere-cloud-syntec-numerique-tech-france-formulent]]|Report Syntec|
|2020.01.29|Silicon[>img[iCSF/flag_fr.png]]| → [[Cloud : 10 recommandations de Syntec Numérique et Tech in France|https://www.silicon.fr/cloud-recommandations-syntec-numerique-tech-in-france-333446.html]]|Report Syntec|
|2020.01.29|CloudTweaks|[[Five Ways to Secure Access to Cloud Workloads|https://cloudtweaks.com/2020/01/five-ways-secure-access-cloud-workloads/]]|Workloads|
|2020.01.29|Cloud Native Computing Foundation|[[Cloud Native Computing Foundation Announces Schedule for KubeCon + CloudNativeCon Europe 2020|https://www.cncf.io/announcement/2020/01/29/cloud-native-computing-foundation-announces-schedule-for-kubecon-cloudnativecon-europe-2020/]]|Conference Kubernetes|
|2020.01.29|VMblog|[[Virtualization Techniques in Cloud Computing|https://vmblog.com/archive/2020/01/29/virtualization-techniques-in-cloud-computing.aspx]]|Virtualization|
|2020.01.29|Dark Reading|[[Inside the Check Point Research Team's Investigation Process|https://www.darkreading.com/cloud/inside-the-check-point-research-teams-investigation-process/d/d-id/1336909]]|Misconfigurations|
|2020.01.29|The Last Watchdog|[[Strategic tactics are key to a robust Cloud Security Posture Management regime|https://www.lastwatchdog.com/guest-essay-strategic-tactics-are-key-to-a-robust-cloud-security-posture-management-regime/]]|CSPM|
|2020.01.29|AME Info|[[Don’t be an ostrich. Look for cloud cover for your cybersecurity needs|https://www.ameinfo.com/industry/technology/dont-be-an-ostrich-look-for-cloud-cover-for-your-cybersecurity-needs]]|Misc|
|2020.01.29|//Microsoft Azure//|![[Data Protection and Privacy Compliance in the Cloud: Privacy Concerns Are Not Slowing the Adoption of Cloud Services, but Challenges Remain|https://azure.microsoft.com/en-us/resources/ponemon-privacy-cloud-research/]] ([[rapport pdf|https://azure.microsoft.com/mediahandler/files/resourcefiles/ponemon-privacy-cloud-research/Ponemon-privacy-cloud-research.pdf]])|Survey Ponemon|
|2020.01.29|//Microsoft Azure//| → [[10 recommendations for cloud privacy and security with Ponemon research|https://azure.microsoft.com/en-us/blog/10-recommendations-for-cloud-privacy-and-security-with-ponemon-research/]]|Survey Ponemon|
|2020.01.29|//PaloAlto Networks//|![[Attacker’s Tactics and Techniques in Unsecured Docker Daemons Revealed|https://unit42.paloaltonetworks.com/attackers-tactics-and-techniques-in-unsecured-docker-daemons-revealed/]]|Docker Attacks|
|2020.01.30|//Secodify//|! → [[Attacker’s Tactics and Techniques in Unsecured Docker Daemons Revealed|https://www.secodify.com/report/014e5057-1ab1-5984-be97-794338b20f6a/]]|Docker Attacks|
|2020.01.29|//Sensu//|[[Security and privacy in the public cloud: What companies are missing and why it matters|https://blog.sensu.io/security-and-privacy-in-the-public-cloud]]|Privacy|
|2020.01.29|//Alcide//|[[Avoid Exposing Configs in Your SaaS Application|https://blog.alcide.io/exposing-configs]]|SaaS Misconfigurations|
|2020.01.29|//Sysdig//|[[Kubernetes Security monitoring at scale with Sysdig Falco|https://medium.com/@SkyscannerEng/kubernetes-security-monitoring-at-scale-with-sysdig-falco-a60cfdb0f67a]]|Kubernetes Monitoring|
|>|>|>|!2020.01.28|
|2020.01.28|IT Pro[>img[iCSF/flag_fr.png]]|[[Spécial FIC 2020 : quels sont les enjeux de sécurité liés à l’adoption du Cloud ?|https://www.itpro.fr/special-fic-2020-quels-sont-les-enjeux-de-securite-lies-ladoption-du-cloud/]]|Survey TrendMicro|
|2020.02.06|Le Monde Informatique[>img[iCSF/flag_fr.png]]| → [[Les enjeux de sécurité restent un frein à l'adoption du cloud|https://www.lemondeinformatique.fr/actualites/lire-les-enjeux-de-securite-restent-un-frein-a-l-adoption-du-cloud-77996.html]]|Survey TrendMicro|
|2020.01.28|Infoguerre[>img[iCSF/flag_fr.png]]|[["Cloud Act", une polémique en trompe l’œil|https://infoguerre.fr/2020/01/cloud-act-polemique-trompe-loeil/]]|CLOUD_Act|
|2020.01.28|Nathan Getty|![[Cloud Security Commandments|https://getsec.github.io/2020/01/csc/]]|Controls|
|2020.01.28|SANS|[[Spends and Trends: SANS 2020 IT Cybersecurity Spending Survey|https://www.sans.org/reading-room/whitepapers/analyst/spends-trends-2020-cybersecurity-spending-survey-39385]]|Survey|
|2020.01.28|//McAfee//|[[Enterprise Supernova: The Data Dispersion Cloud Adoption and Risk Report|https://www.mcafee.com/enterprise/en-us/solutions/lp/mcafee-data-dispersion-cloud-adoption-risk-report.html]]|Survey McAfee|
|2020.01.28|//McAfee//| → [[McAfee Report Demonstrates That Data Is Widely Dispersed in the Cloud Beyond Most Enterprise Control|https://www.businesswire.com/news/home/20200127005732/en/McAfee-Report-Demonstrates-Data-Widely-Dispersed-Cloud]]|Survey McAfee|
|2020.01.28|Help Net Security| → [[52% of companies use cloud services that have experienced a breach|https://www.helpnetsecurity.com/2020/01/28/accessing-cloud-services/]]|Survey McAfee|
|2020.01.30|Silicon[>img[iCSF/flag_fr.png]]| → [[Cloud : les entreprises perdent-elles le contrôle des données ?|https://www.silicon.fr/cloud-entreprises-controle-donnees-333516.html]]|Data|
|2020.01.28|//SpecterOps//|[[Attacking Azure, Azure AD, and Introducing PowerZure|https://posts.specterops.io/attacking-azure-azure-ad-and-introducing-powerzure-ca70b330511a]]|Azure Tools|
|2020.01.28|//JumpCloud//|[[Cybersecurity with Cloud Computing|https://jumpcloud.com/blog/cybersecurity-with-cloud-computing/]]|Best_Practices|
|2020.01.28|//Imperva//|[[Automating API Security in the Cloud|https://www.imperva.com/blog/automating-api-security-in-the-cloud/]]|API|
|2020.01.28|//Optiv//|[[Orchestrator Risks - Gaining Visibility into NIST SP 800-190, Part Five|https://www.optiv.com/blog/orchestrator-risks]] (5/6)|
|>|>|>|!2020.01.27|
|2020.01.27|Above the Law|[[Hey, You, Get Off Of My Cloud: Cybersecurity Considerations For Managed Service Providers|https://abovethelaw.com/2020/01/hey-you-get-off-of-my-cloud-cybersecurity-considerations-for-managed-service-providers/]]|MSSPs Legal|
|2020.01.27|//BSK//|[[The CLOUD Act: Where International Data Privacy and Law Enforcement Collide|https://www.bsk.com/news-insights/the-cloud-act-where-international-data-privacy-and-law-enforcement-collide]]|CLOUD_Act|
|2020.01.27|//Intezer//|[[The Forgotten Link Between Linux Threats & Cloud Security|https://www.darkreading.com/cloud/the-forgotten-link-between-linux-threats-and-cloud-security/d/d-id/1336870]]|Threats|
!"//Get a grip on data in Box and beyond - for compliance sake.//"
[>img(150px,auto)[iCSA/K2RBH.jpg]]^^Article publié le 27 février sur le blog de la CSA, et après l'avoir été le 17 février 2020, il y a 1 semaine sur le site de la société CipherCloud^^
__Liens :__
⇒ https://cloudsecurityalliance.org/blog/2020/02/27/get-a-grip-on-data-in-box-and-beyond-for-compliance-sake/
⇒ https://www.ciphercloud.com/get-a-grip-on-data-in-box-and-beyond-for-compliance-sake/
[img(25%,1px)[iCSF/BluePixel.gif]]

!"//Using Open Policy Agent (OPA) to Develop Policy as Code for Cloud Infrastructure//"
[>img(150px,auto)[iCSA/K2LBU.jpg]]^^Article publié le 21 février sur le blog de la CSA, et après l'avoir été le 26 novembre 2019, il y a près de 3 mois sur le site de la société Fugue^^
__Liens :__
⇒ https://cloudsecurityalliance.org/blog/2020/02/21/using-open-policy-agent-opa-to-develop-policy-as-code-for-cloud-infrastructure/
⇒ https://www.fugue.co/blog/interactively-debugging-the-rego-policy-language-with-fregot
[img(25%,1px)[iCSF/BluePixel.gif]]

!"//Glenn Gerstell to Share Perspective on What the Digital Revolution Holds in Store for Business at CSA Federal Summit 2020//"
^^Annonce du 13 février 2020[>img(150px,auto)[iCSA/202005US-WashintonDC.jpg]]^^
<<<
^^//SEATTLE - Feb. 13, 2020 - The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications and best practices to help ensure a secure cloud computing environment, announced that Glenn Gerstell, Senior Adviser for the +++[Center for Strategic & International Studies]> https://www.csis.org/ === (Washington, DC) and former National Security Agency (NSA) General Counsel, will headline its upcoming +++[Federal Summit]> https://csacongress.org/event/csa-federal-summit-2020/ === (May 12, Washington, DC). Gerstell will share his unique insight and perspective gleaned from his career working in key national security roles in his address "Coming Up Next: More Regulation ... Why the Digital Revolution Will Trigger More Duties on Private Businesses," and offer attendees a look at how the Digital Revolution will impact the future of corporate America.//^^
[...]
<<<
__Lien :__
⇒ https://cloudsecurityalliance.org/press-releases/2020/02/13/glenn-gerstell-to-share-perspective-on-what-the-digital-revolution-holds-in-store-for-business-at-csa-federal-summit-2020/
[img(25%,1px)[iCSF/BluePixel.gif]]

!"//​CCPA - Introduction, Applicability and Recommendations//"
[>img(150px,auto)[iCSA/K26BC.png]]^^Article publié le 6 février sur le blog de la CSA, et après l'avoir été le 6 janvier sur le site de la société CipherCloud.
Cet article à pour principal objectif de faire télécharger le document "CCPA Definitive Guide" de la société.
&rArr; Lire [[l'article|https://cloudsecurityalliance.org/blog/2020/02/06/ccpa-introduction-applicability-and-recommendations/]] sur le blog de la Cloud Security Alliance ou [[l'original|https://www.ciphercloud.com/ccpa-introduction-applicability-and-recommendations/]]^^
[img(25%,1px)[iCSF/BluePixel.gif]]
!Actualités, Blog, Publications et Veille "Sécurité du Cloud"
<<tiddler fAll2LiTabs13end with: 202001>>
<<tiddler fAll2Tabs10 with: VeilleM","_202001>>
|!Janvier|!Sources|!Titres et Liens|!Keywords|
|>|>|>|Aucune alerte pour le moment|
[img(25%,1px)[iCSF/BluePixel.gif]]
<<tiddler .ReplaceTiddlerTitle with: [[Alertes et Vulnérabilités - Janvier 2020]]>>
<<tiddler fAll2LiTabs10 with: NewsL","202001>><<tiddler .ReplaceTiddlerTitle with: [[Newsletters - Janvier 2020]]>>
<<tiddler .ReplaceTiddlerTitle with: [[Actualités - Janvier 2020]]>><<tiddler fAll2LiTabs13end with: 'Actu","202001'>>
<<tiddler fAll2LiTabs13end with: 'Blog","202001'>>
[img(25%,1px)[iCSF/BluePixel.gif]]
<<tiddler .ReplaceTiddlerTitle with: [[Blog - Janvier 2020]]>>
<<tiddler fAll2LiTabs13end with: 'Publ","202001'>>
[img(25%,1px)[iCSF/BluePixel.gif]]
<<tiddler .ReplaceTiddlerTitle with: [[Publications - Janvier 2020]]>>
!CSA CCM v3.0.1 Addendum - Cloud OS Security Specifications[>img(150px,auto)[iCSA/CCM.png]]
<<<
//This document is an addendum to the CCM V3.0.1 and contains a controls mapping and gap analysis between the CSA CCM and CSA's research artifact "Cloud OS Security Specifications".
It aims to help organizations adhering to the Cloud OS Security Specifications to also meet CCM requirements.//
<<<
* Détail et fichier XLSX ⇒ ''[[https://CloudSecurityAlliance.fr/go/k1tp/|https://cloudsecurityalliance.fr/go/k1tp/]]''
[img(50%,1px)[iCSF/BluePixel.gif]]
!1 - Les nouveautés CSA de la semaine du 20 au 26 janvier 2020
* Actu : Clap de fin pour ''Cloudwatt''+++*[»]> <<tiddler [[2020.01.26 - Clap de fin pour Cloudwatt]]>>=== [>img[iCSF/cloud-security-alliance-fr.png]]
* Blog : ''Blockchain et règlementation'', un sujet à creuser+++*[»]> <<tiddler [[2020.01.23 - Blog : 'Can you arrest a decentralized autonomous organization that lives in outer space?']]>>=== 
* Appel à Commentaires : document "''The Six Pillars of DevSecOps: Collective Responsibility''"+++*[»]> <<tiddler [[2020.01.21 - Appel à commentaires : 'The Six Pillars of DevSecOps: Collective Responsibility']]>>=== 
* Appel à Commentaires : document "''Cloud Industrial IoT - ICS Security Glossary''"+++*[»]> <<tiddler [[2020.01.15 - Appel à commentaires : 'Cloud Industrial IoT - ICS Security Glossary']]>>=== 
* Appel à Commentaires : document sur la ''gestion des risques pour les équipements médicaux connectés au Cloud''+++*[»]> <<tiddler [[2020.01.20 - Appel à commentaires : 'Managing the Risk for Medical Devices Connected to the Cloud']]>>=== 
!2 - Veille Web
La [[Veille Web|2020.01.26 - Veille Hebdomadaire - 26 janvier]] avec seulement une cinquantaine de liens dont :
* A lire : Disponibilité de ''Azure Security Benchmark v1 (ASB)''+++*[»]>
|2020.01.23|//Microsoft Azure//|![[Azure Security Benchmark - 90 security and compliance best practices for your workloads in Azure|https://www.microsoft.com/security/blog/2020/01/23/azure-security-benchmark-90-security-compliance-best-practices-azure-workloads/]]|Azure Benchmark|
|2020.01.23|//Microsoft Azure//| → [[Azure security benchmarks documentation|https://docs.microsoft.com/en-us/azure/security/benchmarks/]]|Azure Benchmark|
===, document de la ''NSA'' sur les vulnérabilités du Cloud+++*[»]>
|2020.01.22|NSA|![[Mitigating Cloud Vulnerabilities|https://media.defense.gov/2020/Jan/22/2002237484/-1/-1/0/CSI-MITIGATING-CLOUD-VULNERABILITIES_20200121.PDF]]|Mitigation Best_Practices|
=== 
* Fuites de données : plusieurs cas avec AWS+++*[»]>
|2020.01.24|VPNmentor|[[Report: Adult Site Leaks Extremely Sensitive Data|https://www.vpnmentor.com/blog/report-pussycash-leak/]]|Data_Leak AWS_S3|
|>|>|>|!|
|2020.01.22|VPNmentor|[[Report: Cannabis Users’ Sensitive Data Exposed in Data Breach|https://www.vpnmentor.com/blog/report-thsuite-breach/]]|Data_Leak AWS_S3|
|2020.01.23|The Register| → [[Sorry to be blunt about this... Open AWS S3 storage bucket just made 30,000 potheads' privacy go up in smoke|https://www.theregister.co.uk/2020/01/23/thsuite_data_exposed/]]|Data_Leak AWS_S3|
|>|>|>|!|
|2020.01.20|Computer Weekly|[[Exposed AWS buckets again implicated in multiple data leaks|https://www.computerweekly.com/news/252476870/Exposed-AWS-buckets-again-implicated-in-multiple-data-leaks]]|Data_Leaks AWS|
|>|>|>|!|
|2020.01.23|//Upguard//|[[Identity and Access Misstep: How an Amazon Engineer Exposed Credentials and More|https://www.upguard.com/breaches/identity-and-access-misstep-how-an-amazon-engineer-exposed-credentials-and-more]]|DataLeak AWS|
|2020.01.23|The Register| → [[Hapless AWS engineer spilled passwords, keys, confidential internal training info, customer messages on public GitHub|https://www.theregister.co.uk/2020/01/23/aws_engineer_credentials_github/]]|DataLeak AWS|
===, Azure+++*[»]>
|2020.01.22|//Microsoft Azure//|![[Access Misconfiguration for Customer Support Database|https://msrc-blog.microsoft.com/2020/01/22/access-misconfiguration-for-customer-support-database/]]|DataLeak Azure|
|2020.01.23|//Comparitech//| → [[Report: 250 million Microsoft customer service and support records exposed on the web|https://www.comparitech.com/blog/information-security/microsoft-customer-service-data-leak/]]|DataLeak Azure|
|2020.01.22|Redmond Channel partner| → [[Azure Misconfiguration Exposes 250 Million Microsoft Customer Accounts|https://rcpmag.com/articles/2020/01/22/azure-misconfiguration-exposes-250-million.aspx]]|DataLeak Azure|
|2020.01.23|Security Boulevard| → [[Microsoft Leaks 250M Customer Details in Azure Fat-Finger Faux Pas|https://securityboulevard.com/2020/01/microsoft-leaks-250m-customer-details-in-azure-fat-finger-faux-pas/]]|DataLeak Azure|
=== 
* Panne : AWS en Australie+++*[»]>
|2020.01.23|CRN AU|[[AWS cloud issues hit Sydney region|https://www.crn.com.au/news/aws-cloud-issues-hit-sydney-region-536921]]|Outage AWS Australia|
|2020.01.23|CRN AU| → [[AWS reveals rollback required to restore Sydney outage|https://www.crn.com.au/news/aws-reveals-rollback-required-to-restore-sydney-outage-536969]]|Outage AWS Australia|
== 
* Rapport : croissance de Kubernetes selon le rapport annuel du CNCF+++*[»]>
|2020.01.21|Container Journal|[[CNCF Annual Report Shows Kubernetes Growth|https://containerjournal.com/topics/container-ecosystems/cncf-annual-report-shows-kubernetes-growth/]]|Report Kubernetes|
=== 
* Divers : cloud et DRP+++*[»]>
|2020.01.24|Computer Weekly|![[Disaster recovery failover choices: Synchronous mirrors, P2V and the cloud|https://www.computerweekly.com/news/252477296/Disaster-recovery-failover-choices-Synchronous-mirrors-P2V-and-the-cloud]]|DRP|
===, Conformité, Forensique dans le Cloud+++*[»]>
|2020.01.24|Forensic Focus|![[Industry Roundup: Cloud Forensics|https://articles.forensicfocus.com/2020/01/24/industry-roundup-cloud-forensics/]]|Forensics|
===, Kubernetes, et Sécurisation AWS
!3 - Contacts
Rejoignez nous sur [[Slack]] (si vous êtes déjà membre de notre groupe sur [[LinkedIN]]), et d'ici quelques semaines, sur [[Circle|CSA Circle]]
|!Janvier|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2020.01.26|
|2020.01.26|La Tribune[>img[iCSF/flag_fr.png]]|[[Cybersécurité : le Cloud Act, favorable ou préjudiciable à la vie privée des internautes ?|https://www.latribune.fr/entreprises-finance/industrie/aeronautique-defense/le-cloud-act-favorable-ou-prejudiciable-a-la-vie-privee-des-internautes-3-5-837994.html]]|CLOUD_Act|
|2020.01.26|manage IT|[[Sichere Cloud: BSI stellt aktualisierten C5-Katalog vor|https://ap-verlag.de/sichere-cloud-bsi-stellt-aktualisierten-c5-katalog-vor/58049/]]^^Secure Cloud: BSI presents updated C5 catalog^^|BSI|
|2020.01.26|//XM Cyber//|[[Gain Full Visibility into Potential Attacks Across Amazon Web Services (AWS) Environments|https://xmcyber.com/gain-full-visibility-into-potential-attacks-across-amazon-web-services-aws-environments/]]|AWS Risks Simulation|
|2020.01.26|Nathan Getty|[[So many AWS accounts, so much information!?|https://getsec.github.io/2020/01/cross-account-scannin/]]|AWS Scanning|
|>|>|>|!2020.01.24|
|2020.01.24|Forensic Focus|![[Industry Roundup: Cloud Forensics|https://articles.forensicfocus.com/2020/01/24/industry-roundup-cloud-forensics/]]|Forensics|
|2020.01.24|CyberDefense Mag|[[Moving Network Security to The Cloud|https://www.cyberdefensemagazine.com/moving-network-security-to-the-cloud/]]|SASE|
|2020.01.24|Computer Weekly|![[Disaster recovery failover choices: Synchronous mirrors, P2V and the cloud|https://www.computerweekly.com/news/252477296/Disaster-recovery-failover-choices-Synchronous-mirrors-P2V-and-the-cloud]]|DRP|
|2020.01.24|VPNmentor|[[Report: Adult Site Leaks Extremely Sensitive Data|https://www.vpnmentor.com/blog/report-pussycash-leak/]]|Data_Leak AWS_S3|
|2020.01.24|//Veracode//|[[Forrester Study on the Benefits of Cloud vs. On-Premises AppSec|https://www.veracode.com/blog/research/forrester-study-benefits-cloud-vs-premises-appsec-1]] ([[rapport|https://info.veracode.com/analyst-report-forrester-tei-report-saas-based-appsec-platform.html]]|Report|
|2020.01.24|//Rapid7//|[[Seven Tips for Better Cloud Security in 2020|https://blog.rapid7.com/2020/01/24/seven-tips-for-better-cloud-security-in-2020/]]|Best_Practices|
|2020.01.24|//Compare the Cloud//|[[IoT in the Cloud: Azure vs AWS|https://www.comparethecloud.net/articles/cloud/iot-in-the-cloud-azure-vs-aws/]]|IoT AWS Azure|
|>|>|>|!2020.01.23|
|2020.01.23|Silicon[>img[iCSF/flag_fr.png]]|[[Collaboratif : Slack localise les données en France|https://www.silicon.fr/collaboratif-slack-localise-les-donnees-en-france-333235.html]]|Slack|
|2020.01.23|TechGenix|[[Keep a lid on your AWS cloud goodies with breach and attack simulation|http://techgenix.com/aws-cloud-breach-and-attack-simulation/]]|
|2020.01.23|KitPloit|[[AlertResponder - Automatic Security Alert Response Framework By AWS Serverless Application Model|https://www.kitploit.com/2020/01/alertresponder-automatic-security-alert.html]]|AWS Alerting|
|2020.01.23|CRN AU|[[AWS cloud issues hit Sydney region|https://www.crn.com.au/news/aws-cloud-issues-hit-sydney-region-536921]]|Outage AWS Australia|
|2020.01.23|CRN AU| → [[AWS reveals rollback required to restore Sydney outage|https://www.crn.com.au/news/aws-reveals-rollback-required-to-restore-sydney-outage-536969]]|Outage AWS Australia|
|2020.01.23|Data Privacy + Security Insider|[[Crime-as-a-Service Targets Popular Platforms|https://www.dataprivacyandsecurityinsider.com/2020/01/crime-as-a-service-targets-popular-platforms/]]|Crime-as-a-Service|
|2020.01.23|//Upguard//|[[Identity and Access Misstep: How an Amazon Engineer Exposed Credentials and More|https://www.upguard.com/breaches/identity-and-access-misstep-how-an-amazon-engineer-exposed-credentials-and-more]]|DataLeak AWS|
|2020.01.23|The Register| → [[Hapless AWS engineer spilled passwords, keys, confidential internal training info, customer messages on public GitHub|https://www.theregister.co.uk/2020/01/23/aws_engineer_credentials_github/]]|DataLeak AWS|
|2020.01.27|//DivvyCloud//| → [[AWS Data Exposed on GitHub|https://divvycloud.com/aws-data-exposed-on-github/]]|DataLeak AWS|
|2020.01.23|//Microsoft Azure//|![[Azure Security Benchmark - 90 security and compliance best practices for your workloads in Azure|https://www.microsoft.com/security/blog/2020/01/23/azure-security-benchmark-90-security-compliance-best-practices-azure-workloads/]]|Azure Benchmark|
|2020.01.23|//Microsoft Azure//| → [[Azure security benchmarks documentation|https://docs.microsoft.com/en-us/azure/security/benchmarks/]]|Azure Benchmark|
|2020.01.23|//Cloud Academy//|[[Learn Cloud Computing: Prerequisites|https://cloudacademy.com/blog/prerequisites-to-learn-cloud-computing-introduction/]]|Misc|
|2020.01.23|//Security Intelligence//|[[Head in the Clouds: Scaling Business Workloads Without Scaling Risk|https://securityintelligence.com/posts/head-in-the-clouds-scaling-business-workloads-without-scaling-risk/]]|Workloads|
|2020.01.23|//Checkpoint//[>img[iCSF/flag_fr.png]]|[[Les huit meilleures pratiques pour concilier multicloud et cybersécurité|https://itsocial.fr/enjeux/securite-dsi/cybersecurite/huit-meilleures-pratiques-concilier-multicloud-cybersecurite/]]|Best_Practices|
|>|>|>|!2020.01.22|
|2020.01.22|Silicon[>img[iCSF/flag_fr.png]]|[[Accès à privilèges dans le cloud : l’évidence de la sécurisation|https://www.silicon.fr/avis-expert/acces-a-privileges-dans-le-cloud-levidence-de-la-securisation]]|Access_Controls|
|2020.01.22|Journal du Net[>img[iCSF/flag_fr.png]]|[[Projet Gaia-X : quelles seront les clés du succès du cloud européen ?|https://www.journaldunet.com/solutions/expert/72478/projet-gaia-x---quelles-seront-les-cles-du-succes-du-cloud-europeen.shtml]]|Sovereign Europe|
|2020.01.22|NSA|![[Mitigating Cloud Vulnerabilities|https://media.defense.gov/2020/Jan/22/2002237484/-1/-1/0/CSI-MITIGATING-CLOUD-VULNERABILITIES_20200121.PDF]]|Mitigation Best_Practices|
|2020.01.23|Dark Reading| → [[NSA Offers Guidance on Mitigating Cloud Flaws|https://www.darkreading.com/cloud/nsa-offers-guidance-on-mitigating-cloud-flaws/d/d-id/1336871]]|Mitigation Best_Practices|
|2020.01.24|NextGov| → [[NSA Offers Advice on Securing Clouds|https://www.nextgov.com/cybersecurity/2020/01/nsa-offers-advice-securing-clouds/162648/]]|Mitigation Best_Practices|
|2020.01.27|Security Week| → [[NSA Shares Guidance on Mitigating Cloud Vulnerabilities|https://www.securityweek.com/nsa-shares-guidance-mitigating-cloud-vulnerabilities]]|Mitigation Best_Practices|
|2020.02.03|//BitDefender//| → [[How to Mitigate the Most Common Cloud Vulnerabilities|https://businessinsights.bitdefender.com/mitigating-the-most-common-cloud-vulnerabilities]]|Mitigation|
|2020.01.22|VPNmentor|[[Report: Cannabis Users’ Sensitive Data Exposed in Data Breach|https://www.vpnmentor.com/blog/report-thsuite-breach/]]|Data_Leak AWS_S3|
|2020.01.23|The Register| → [[Sorry to be blunt about this... Open AWS S3 storage bucket just made 30,000 potheads' privacy go up in smoke|https://www.theregister.co.uk/2020/01/23/thsuite_data_exposed/]]|Data_Leak AWS_S3|
|2020.02.06|Data Privacy Security Insider| → [[30,000 Cannabis Users’ Data Exposed|https://www.dataprivacyandsecurityinsider.com/2020/02/30000-cannabis-users-data-exposed/]]|Data_Leak AWS_S3|
|2020.01.22|Help Net Security|[[Container security requires continuous security in new DevSecOps models|https://www.helpnetsecurity.com/2020/01/22/container-security-continuous-security/]]|Containers DevSecOps|
|2020.01.22|Computer Weekly|[[Spread of Kubernetes spurs backup and disaster recovery products|https://www.computerweekly.com/feature/Spread-of-Kubernetes-spurs-backup-and-disaster-recovery-products]]|DRP Kubernetes|
|2020.01.22|Kubernetes|[[KubeInvaders - Gamified Chaos Engineering Tool for Kubernetes|https://kubernetes.io/blog/2020/01/22/kubeinvaders-gamified-chaos-engineering-tool-for-kubernetes/]]|Kubernetes Chaos_Engineering|
|2020.01.22|Dev.to|[[Kube Explained: Part 2 - Containers|https://dev.to/ethanjjackson/kube-explained-part-2-containers-5c1h]] (2/2)|Containers|
|2020.01.22|//Gremlin//|[[Democratizing Chaos Engineering and Progressing From Why to How|https://www.gremlin.com/blog/year-in-review/]]|Chaos_Engineering|
|2020.01.22|//Microsoft Azure//|![[Access Misconfiguration for Customer Support Database|https://msrc-blog.microsoft.com/2020/01/22/access-misconfiguration-for-customer-support-database/]]|DataLeak Azure|
|2020.01.23|//Comparitech//| → [[Report: 250 million Microsoft customer service and support records exposed on the web|https://www.comparitech.com/blog/information-security/microsoft-customer-service-data-leak/]]|DataLeak Azure|
|2020.01.22|Redmond Channel partner| → [[Azure Misconfiguration Exposes 250 Million Microsoft Customer Accounts|https://rcpmag.com/articles/2020/01/22/azure-misconfiguration-exposes-250-million.aspx]]|DataLeak Azure|
|2020.01.23|Security Boulevard| → [[Microsoft Leaks 250M Customer Details in Azure Fat-Finger Faux Pas|https://securityboulevard.com/2020/01/microsoft-leaks-250m-customer-details-in-azure-fat-finger-faux-pas/]]|DataLeak Azure|
|2020.01.22|//Security Intelligence//|[[Which Incident Response Investments Are You Prioritizing in 2020?|https://securityintelligence.com/articles/which-incident-response-investments-are-you-prioritizing-in-2020/]]|Incident Investments|
|2020.01.22|//Rapid7//|[[Vulnerability Management in the Cloud: Addressing the AWS Shared Responsibility Model|https://blog.rapid7.com/2020/01/22/vulnerability-management-in-the-cloud-addressing-the-aws-shared-responsibility-model/]] (1/4)|Vulnerability_Management AWS|
|2020.01.22|//Octarine//|[[Octarine Adds 2 Open Source Projects to Secure Kubernetes|https://containerjournal.com/topics/container-security/octarine-adds-2-open-source-projects-to-secure-kubernetes/]]|Kubernetes|
|2020.01.22|//Octarine//|[[kube-scan - Octarine k8s cluster risk assessment tool|https://github.com/octarinesec/kube-scan]]|Tools|
|2020.01.22|//Octarine//|[[KCCSS - Kubernetes Common Configuration Scoring System|https://github.com/octarinesec/kccss]]|Tools|
|2020.01.22|//QuickHeal//|[[First Node.js-based Ransomware : Nodera|https://blogs.quickheal.com/first-node-js-based-ransomware-nodera/]]|Node.js Ransomware|
|2020.01.22|//Checkpoint//|[[The Challenge of Compliance in the Cloud|https://blog.checkpoint.com/2020/01/22/the-challenge-of-compliance-in-the-cloud/]]|Compliance|
|2020.01.22|//OVH//[>img[iCSF/flag_fr.png]]|[[Stéphane Nappo, RSSI OVHcloud : "La séparation technique des données est essentielle pour les fournisseurs de Cloud"|https://www.zdnet.fr/actualites/stephane-nappo-rssi-ovhcloud-la-separation-technique-des-donnees-est-essentielle-pour-les-fournisseurs-de-cloud-39897551.htm]]|Data|
|>|>|>|!2020.01.21|
|2020.01.21|Container Journal|[[CNCF Annual Report Shows Kubernetes Growth|https://containerjournal.com/topics/container-ecosystems/cncf-annual-report-shows-kubernetes-growth/]]|Report Kubernetes|
|2020.01.21|//Radware//|[[The Move to Multiple Public Clouds Creates Security Silos|https://blog.radware.com/security/2020/01/the-move-to-multiple-public-clouds-creates-security-silos/]]|Public_Cloud|
|2020.01.21|//Portshift//|[[Techniques and strategies to overcome Kubernetes security challenges|https://www.helpnetsecurity.com/2020/01/21/kubernetes-security-challenges/]]|Kubernetes|
|2020.01.21|//Compare the Cloud//|[[Demystifying the cloud for CFOs|https://www.comparethecloud.net/articles/cfos-last-cloud-holdouts/]]|Misc|
|2020.01.21|//Cisco//|[[How DNS-Layer Security Can Improve Cloud Workloads|https://umbrella.cisco.com/blog/2020/01/23/how-dns-layer-security-can-improve-cloud-workloads/]]|DNS|
|2020.01.21|//Cisco//|[[What is Cloud Security?|https://umbrella.cisco.com/blog/2020/01/21/what-is-cloud-security/]]|Misc|
|2020.01.21|//Armor//|[[How to Secure AWS: Advanced Strategies and Best Practices|https://www.armor.com/blog/secure-aws/]]|AWS Best_Practices|
|2020.01.21|//Cloud Academy//|[[Kubernetes: The Current and Future State of K8s in the Enterprise|https://cloudacademy.com/blog/kubernetes-the-current-and-future-state-of-k8s-in-the-enterprise/]]|Kubernetes|
|2020.01.21|//Orca//|[[Unlocking the Key to the Cloud|https://blog.orca.security/unlocking-the-key-to-the-cloud]]|Key_Management|
|2020.01.21|//StackRox//|[[Using Containers and Kubernetes to Increase the Efficacy of Anomaly Detection|https://www.cncf.io/blog/2020/01/21/using-containers-and-kubernetes-to-increase-the-efficacy-of-anomaly-detection/]]|Detection|
|2020.01.21|//Orca//|[[Unlocking the Key to the Cloud|https://blog.orca.security/unlocking-the-key-to-the-cloud]]|Misc|
|2020.01.21|//Optiv//|[[Registry Risks - Gaining Visibility into NIST SP 800-190, Part Four|https://www.optiv.com/blog/registry-risks]] (4/6)|
|>|>|>|!2020.01.20|
|2020.01.20|Rick's Cloud|[[IoT Devices and Cloud Computing: Friends or Foes? (infographie)|https://rickscloud.com/infographic-iot-devices-and-cloud-computing-friends-or-foes/]]|IoT|
|2020.01.20|Computer Weekly|[[Exposed AWS buckets again implicated in multiple data leaks|https://www.computerweekly.com/news/252476870/Exposed-AWS-buckets-again-implicated-in-multiple-data-leaks]]|Data_Leaks AWS|
|2020.01.20|CSO|[[How Adobe monitors cloud deployments to control shadow IT|https://www.csoonline.com/article/3514449/how-adobe-monitors-cloud-deployments-to-control-shadow-it.html#tk.rss_cloudsecurity]]|Shadow_IT|
|2020.01.20|Solutions Review|[[Preparing Your Cloud Solutions for CCPA: Three Steps to Follow|https://solutionsreview.com/cloud-platforms/preparing-your-cloud-solutions-for-ccpa-three-steps-to-follow/]]|Compliance|
|2020.01.20|//AWS//|![[CloudEndure Highly Automated Disaster Recovery - 80% Price Reduction|https://aws.amazon.com/blogs/aws/cloudendure-highly-automated-disaster-recovery-80-price-reduction/]]|AWS DRP|
|2020.01.21|CRN AU|[[AWS slashes DR prices by 80 percent|https://www.crn.com.au/news/aws-slashes-dr-prices-by-80-percent-536795]]|AWS DRP|
|2020.01.28|CBR Online| → [[As AWS Slashes Disaster Recovery Costs by 80%, Can Independent Firms Compete?|https://www.cbronline.com/feature/aws-disaster-recovery]]|AWS DRP|
[>img(200px,auto)[iCSF/Cloudwatt.jpg]]Cloudwatt, 6 septembre 2012 - 31 janvier 2020.
Comme le précise la "FAQ - Fermeture de la plateforme" :
* "''[...] la plateforme Cloudwatt sera désactivée à compter du 1er février 2020 et sans action de votre part vos données seront définitivement effacées et non récupérables.''"
* Il ne vous reste plus que quelques jours pour "''transférer le plus rapidement possible vos applications et/ou vos données vers un autre service et à fermer votre compte.''"

Voici quelques liens pour les quelques jours qui restent, et pour se replonger dans une histoire malheureuse commencée il y a plus d'une décennie avec ''Andromède''.
||Twitter[>img[iCSF/flag_fr.png]]|le compte [[Cloudwatt|https://twitter.com/cloudwatt]]| <<tiddler RollCloudwatt>> |
||Twitter|le hashtag [[#cloudwatt|https://twitter.com/hashtag/cloudwatt]]|~|
||Wikipedia[>img[iCSF/flag_fr.png]]|[[Cloudwatt|https://fr.wikipedia.org/wiki/Cloudwatt]]|~|
||Wikipedia[>img[iCSF/flag_fr.png]]|[[Andromède|https://fr.wikipedia.org/wiki/Androm%C3%A8de_(cloud)]]|~|
||Cloudwatt[>img[iCSF/flag_fr.png]]|![[FAQ - Fermeture de la plateforme|https://support.cloudwatt.com/kb/faq/fermeture/]]|~|
|2019.08.29|Rude baguette[>img[iCSF/flag_fr.png]]|>|[[Cloudwatt : vie et mort du premier « cloud souverain » de la France|https://www.rudebaguette.com/2019/08/cloudwatt-orange-cloud-souverain-fin/]]|
|2019.08.01|Les Echos[>img[iCSF/flag_fr.png]]|>|[[Une page se tourne pour le cloud souverain français|https://www.lesechos.fr/tech-medias/hightech/une-page-se-tourne-pour-le-cloud-souverain-francais-1118112]]|
|2019.07.31|le Monde Informatique[>img[iCSF/flag_fr.png]]|>|[[Cloudwatt : arrêt définitif de service en février 2020|https://www.lemondeinformatique.fr/actualites/lire-cloudwatt-arret-definitif-de-service-en-fevrier-2020-76055.html]]|
|2019.07.31|ZDnet[>img[iCSF/flag_fr.png]]|>|[[Cloudwatt : arrêt du service en février prochain|https://www.zdnet.fr/actualites/cloudwatt-arret-du-service-en-fevrier-prochain-39888593.htm]]|
|2016.12.20|ZDnet[>img[iCSF/flag_fr.png]]|>|[[Retour vers le futur - Cloudwatt et Numergy, les souverains descendent du nuage|https://www.zdnet.fr/actualites/retour-vers-le-futur-cloudwatt-le-souverain-descend-de-son-nuage-39813666.htm]]|
|2015.03.21|Direction Générale des Entreprises[>img[iCSF/flag_fr.png]]|>|[[Acquisition par Orange de Cloudwatt|https://www.entreprises.gouv.fr/dge/acquisition-par-orange-cloudwatt]] ([[Communiqué .pdf|https://www.entreprises.gouv.fr/files/files/directions_services/secteurs-professionnels/numerique/cloud-computing.pdf]])|
|2015.03.18|Silicon.fr[>img[iCSF/flag_fr.png]]|>|[[Cloudwatt sur les rails de la croissance d'Orange Business Services|https://www.silicon.fr/cloudwatt-sur-les-rails-de-la-croissance-dorange-business-services-111309.html]]|
|2015.03.17|Silicon.fr[>img[iCSF/flag_fr.png]]|>|[[Numergy et Cloudwatt : embrouilles sur le financement étatique|https://www.silicon.fr/numergy-et-cloudwatt-embrouilles-sur-le-financement-etatique-111295.html]]|
|2015.03.03|Silicon.fr[>img[iCSF/flag_fr.png]]|>|[[Le faux départ du Cloud souverain (tribune)|https://www.silicon.fr/faux-depart-cloud-souverain-109780.html]]|
|2015.03.24|Les Echos[>img[iCSF/flag_fr.png]]|>|[[Cloud souverain, un gâchis à la française|https://www.lesechos.fr/2015/02/cloud-souverain-un-gachis-a-la-francaise-1105856]]|
|2014.09.24|Next INpact[>img[iCSF/flag_fr.png]]|>|Cloud souverain : deux ans après, on fait le point ([[1|https://www.nextinpact.com/dossier/734-cloud-souverain-deux-ans-apres-on-fait-le-point/1.htm]]) ([[2|https://www.nextinpact.com/dossier/734-cloud-souverain-deux-ans-apres-on-fait-le-point/2.htm]]) ([[3|https://www.nextinpact.com/dossier/734-cloud-souverain-deux-ans-apres-on-fait-le-point/3.htm]])|
|2012.09.06|Silicon.fr[>img[iCSF/flag_fr.png]]|>|[[Projet Andromède : Orange et Thales matérialisent leur alliance avec Cloudwatt|https://www.silicon.fr/projet-andromede-orange-et-thales-materialisent-leur-alliance-avec-cloudwatt-78219.html]]|
[img(50%,1px)[iCSF/BluePixel.gif]]
⇒ [[CloudSecurityAlliance/go/k1qa|https://CloudSecurityAlliance/go/k1qa]] [img[iCSF/flag_fr.png]]oc
[img(50%,1px)[iCSF/BluePixel.gif]]
<<QOTD RolledCloudwatt 1852 noclick norandom>>
[img(100px,auto)[iCSF/Cloudwatt.png]]
----
[img(100px,auto)[iCSF/Cloudwatt_1.png]]
----
[img(100px,auto)[iCSF/Cloudwatt_2.png]]
----
[img(100px,auto)[iCSF/Cloudwatt_3.png]]
----
[img(100px,auto)[iCSF/Cloudwatt_4.png]]
----
[img(100px,auto)[iCSF/Cloudwatt_5.png]]
----
[img(100px,auto)[iCSF/Cloudwatt_7.png]]
----
[img(100px,auto)[iCSF/Cloudwatt_5.png]]
----
[img(100px,auto)[iCSF/Cloudwatt_4.png]]
----
[img(100px,auto)[iCSF/Cloudwatt_3.png]]
----
[img(100px,auto)[iCSF/Cloudwatt_2.png]]
----
[img(100px,auto)[iCSF/Cloudwatt_1.png]]
!"//Can you arrest a decentralized autonomous organization that lives in outer space?//"
[>img(150px,auto)[iCSA/K1NBC.jpg]]Article de blog publié le 23 janvier 2020 — Rédigé par Kurt Seifried, Chief Blockchain Officer, CSA
<<<
//One aspect of the modern world is that lawbreaking has gotten more and more ambiguous. If I ship a pile of electronic scooters to some random city and pay contractors to drop them off around the city, have I just committed some bizarre act of littering? What about creating a website that lets people list their spare bedroom for rent and connect with people who want to rent it, typically something that isn’t regulated in most places. But what if people start subletting apartments via this site and essentially turn their apartments into short term hotels, an industry that tends to be highly regulated? Well it turns out it’s pretty simple, regulators simply define new terms or redefine old terms and create new regulations and laws to cover these new activities (“But it’s a horseless taxi! Totally different!”).

The same logic has generally been used to apply to jurisdiction. Even where you have a missing jurisdiction (“the Zone of Death”), you usually have some legal entity responsible for what is going on (a person or a company) that does reside in some jurisdiction somewhere (e.g. ships in international waters are registered in a country). Even if they live outside your jurisdiction, at least it gives you someone or something to talk to and negotiate with.

But what if the legal entity is a smart contract running on a blockchain, controlled by a technical voting process that usually boils down to voting based on how many units of the entity is owned by a voting organization. Oh and ownership of this obviously support anonymous and pseudonymous modes, assuming they even have any record-keeping or KYC (“Know Your Customer”) going on. A regulator could attempt to make contact with the owners of the DAO, if they can figure out who that is, and even then you’d still have to convince a majority of the DAO owners to vote in favor of whatever is being proposed. Again traditionally one way to deal with this is to talk to the Blockchain that runs the workload; however, as this is rapidly going away, it turns out that building security into these smart contract systems keeps not only the bad guys out, but also deflects regulation.

Conclusion: if you think things are weird and messy now, just wait until a billionaire starts tweeting via a communications platform in outer space. Oh wait:// [>img(300px,auto)[iCSA/K1NBC.png]]
[...]
<<<
&rArr; Lire [[l'original|https://CloudSecurityAlliance.fr/go/k1nb/]] sur le blog de la CSA
!"//The Six Pillars of DevSecOps: Collective Responsibility//"
<<<
//The DevSecOps Working Group identified and defined six focus areas critical to integrating DevSecOps into an organization, in accordance with the six pillars described in CSA’s Reflexive Security Framework.
More detailed research and guidance across each of the six pillars of DevSecOps will be revisited and established over time in order to maintain industry specific standards.
This paper is part of a planned series and will focus on the area that is arguably the foundation for all others - collective responsibility. Fostering a sense of collective security responsibility is not only an essential element of driving security into a DevOps environment, but it is also one of the most challenging.
It requires cultivating a change to the organization’s mindset, its ideas and its customs and behaviors regarding software security.
In this paper, we refer to this effort as building a security-supportive culture.//
<<<
--La date limite pour faire les commentaires est fixée au ''5 février 2020''.--
Le document a été publié le 21 février 2020+++*[»]> <<tiddler [[2020.02.21 - Publication : 'The Six Pillars of DevSecOps: Collective Responsibility']]>>=== 
&rArr; Lire [[l'original|https://CloudSecurityAlliance.fr/go/k1la/]] sur le site de la CSA
!"//Managing the Risk for Medical Devices Connected to the Cloud//"
<<<
//With the increased number of Internet of Things devices, Healthcare Delivery Organizations are experiencing a digital transformation bigger than anything in the past.
The new breed of connected medical devices brings the promise of improved patient care, better clinical data, improved efficiency, and reduced costs; however, they also bring increased security risks.
The goal of this paper is to present the concept of managing medical devices based on their proximity to the patient and introduce practices to secure the use of cloud computing for medical devices.//
<<<
La date limite pour faire les commentaires est fixée au ''14 février 2020''.
&rArr; Lire [[l'original|https://CloudSecurityAlliance.fr/go/k1ka/]] sur le site de la CSA
!1 - Les nouveautés CSA de la semaine du 13 au 19 janvier 2020
* Blog : Les prévisions de ''Jim Reavis'' pour 2020+++*[»]> <<tiddler [[2020.01.17 - Blog : Les prévisions de Jim Reavis pour 2020]]>>=== [>img[iCSF/cloud-security-alliance-fr.png]]
* Blog : Dans les coulisses du groupe de travail CSA ''IoT''+++*[»]> <<tiddler [[2020.01.15 - Blog : 'Behind the Scenes: IoT Working Group']]>>=== 
* Appel à Commentaires : document "''Cloud Industrial IoT - ICS Security Glossary''"+++*[»]> <<tiddler [[2020.01.15 - Appel à commentaires : 'Cloud Industrial IoT - ICS Security Glossary']]>>=== 
!2 - Veille Web
La [[Veille Web|2020.01.19 - Veille Hebdomadaire - 19 janvier]] avec seulement une quarantaine de liens dont
* A lire : Certificat ISO 27701 pour Azure+++*[»]>
|2020.01.13|//Microsoft Azure//|[[Azure is now certified for the ISO/IEC 27701 privacy standard|https://azure.microsoft.com/en-us/blog/azure-is-now-certified-for-the-iso-iec-27701-privacy-standard/?cdn=disable]]|Azure privacy ISO_27701|
===, Nouveau Benchmark CIS pour Kubernetes+++*[»]>
|2020.01.15|//Google Cloud//|[[Exploring container security: Announcing the CIS Google Kubernetes Engine Benchmark|https://cloud.google.com/blog/products/containers-kubernetes/gke-cis-benchmarks-deliver-security-best-practices]]|Kubernetes Benchmark Best_Practices|
|2020.01.15|Center for Internet Security|![[CIS Kubernetes Benchmark version 1.5.0|https://www.cisecurity.org/benchmark/]]|Kubernetes Benchmark Best_Practices|
=== 
* Attaques : JhoneRAT+++*[»]>
|2020.01.16|Talos|[[JhoneRAT: Cloud based python RAT targeting Middle Eastern countries|https://blog.talosintelligence.com/2020/01/jhonerat.html]]|Attacks|
|2020.01.20|GBHackers on Security| → [[JhoneRAT - Hackers Launching New Cloud-based Python RAT to Steal Data From Google Drive, Twitter & Google Forms|https://gbhackers.com/jhonerat/]]|Attacks|
=== 
* Divers : Annonce du Bug Bounty Kubernetes, conférence Cloud et Sécurité en 2020, impact sur les données lors de la faillite d'un CSP, Sécurité du Multi-cloud, extrait d'un livre sur les tests d'intrusion AWS avec Kali
|!Janvier|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2020.01.19|
|2020.01.19|//Cloudhelix//|[[Multicloud Gets Real, Virtual Machines Reboot, Security Goes Vertical: Are You Ready for Cloud 2020|https://www.cbronline.com/cloud/cloud-2020-outlook/]]|Predictions|
|2020.01.19|Nino Crudele|![[Azure tools: Aziverso is being refactored|https://ninocrudele.com/azure-tools-aziverso-being-refactored]]|Azure Scanning|
|>|>|>|!2020.01.17|
|2020.01.17|8 Brains[>img[iCSF/flag_fr.png]]|[[Pratique de Sécurité dans les Architectures Microservices|https://8brains.ca/pratique-de-securite-dans-les-architectures-microservices/]]|Micro_Services|
|2020.01.17|Le MagIT[>img[iCSF/flag_fr.png]]|[[Azure AD Premium P1 ou P2 : lequel vous convient le mieux ?|https://www.lemagit.fr/conseil/Azure-AD-Premium-P1-ou-P2-lequel-vous-convient]]|AzureAD|
|2020.01.17|//Checkpoint//|[[Achieving Continuous Compliance at the Speed of Cloud|https://blog.checkpoint.com/2020/01/17/achieving-continuous-compliance-at-the-speed-of-cloud/]]|Compliance|
|2020.01.17|//Checkpoint//|[[Cloud Native Security: What it Means|https://blog.checkpoint.com/2020/01/17/cloud-native-security-what-it-means/]]|Cloud_Native|
|2020.01.17|//ParkMyCloud//|[[Cloud Certification Guide: How to Master & Showcase Your Expertise in AWS, Azure, & Google Cloud|https://www.parkmycloud.com/blog/cloud-certification/]]|Certifications|
|2020.01.17|//Compare the Cloud//|[[Cloud service provider: Which questions should you be asking your CSP?|https://www.comparethecloud.net/articles/cloud-service-provider-questions/]]|Misc|
|2020.01.17|//Rancher//|[[Find Security Vulnerabilities in Kubernetes Clusters|https://rancher.com/blog/2020/kubernetes-security-vulnerabilities/]]|Kubernetes Vulnerabilities|
|2020.01.17|Cloud Security Alliance|[[CSA 2019 Year in Review and look into 2020 with Co-Founder & CEO Jim Reavis|https://www.buzzsprout.com/303731/2513809-csa-2019-year-in-review-and-look-into-2020-with-co-founder-ceo-jim-reavis]] ([[audio|https://episodes.buzzsprout.com/1yo09wjdy3o6dxermt10lnq3gaer]])|CSA Predictions|
|>|>|>|!2020.01.16|
|2020.01.16|Maarten Goet|[[Detecting CVE-2020–0601 and other attempts to exploit known vulnerabilities using Azure Sentinel|https://medium.com/wortell/detecting-cve-2020-0601-and-other-attempts-to-exploit-known-vulnerabilities-using-azure-sentinel-652fbcc0364c]]|Vulnerability CVE-2020-0601 Azure|
|2020.01.16|ThreatStack|[[The Best Cloud Security Conferences to Attend in 2020|https://www.threatstack.com/blog/the-best-cloud-security-conferences-to-attend-in-2020]]|Conference|
|2020.01.16|InsiderPro|[[Why multicloud security is your next big challenge|https://www.idginsiderpro.com/article/3514669/why-multicloud-security-is-your-next-big-challenge.html]]|Multi_Cloud|
|2020.01.16|Security Infowatch|[[Debunking 4 of the biggest cloud myths|https://www.securityinfowatch.com/video-surveillance/hosted-managed-video-surveillance/article/21121726/debunking-4-of-the-biggest-cloud-myths]]|Misc|
|2020.01.16|Talos|[[JhoneRAT: Cloud based python RAT targeting Middle Eastern countries|https://blog.talosintelligence.com/2020/01/jhonerat.html]]|Attacks|
|2020.01.17|ZDNet| → [[JhoneRAT exploits cloud services to attack Middle Eastern countries|https://www.zdnet.com/article/jhonerat-exploits-microsoft-office-cloud-services-to-attack-middle-eastern-countries/]]|Attacks|
|2020.01.20|GBHackers on Security| → [[JhoneRAT - Hackers Launching New Cloud-based Python RAT to Steal Data From Google Drive, Twitter & Google Forms|https://gbhackers.com/jhonerat/]]|Attacks|
|2020.01.16|//Recorded Future//|[[How Security Intelligence Enhances Cloud Security|https://www.recordedfuture.com/cloud-security-intelligence/]]|Threat_Intelligence|
|2020.01.16|//PaloAlto Networks//|[[Getting Cloud Smart: Security for Hybrid and Public Federal Clouds|https://blog.paloaltonetworks.com/2020/01/cloud-federal-clouds/]]|Hybrid_Cloud Government|
|2020.01.16|//Microsoft//|[[Changing the Monolith - Part 2: Whose support do you need?|https://www.microsoft.com/security/blog/2020/01/16/changing-the-monolith-part-2-whose-support-do-you-need/]] (2/5)|Misc|
|>|>|>|!2020.01.15|
|2020.01.15|TradePub|"Hands-on AWS Penetration Testing with Kali Linux" : chapitre [[Exploitation on the Cloud using Kali Linux|https://sf.tradepub.com/free-offer/aws-penetration-testing-with-kali-linux--free-sample-chapters/w_pacb109]]|PenTest|
|2020.01.15|MSSP Alert|[[AWS Cloud Data Leak: UK Consulting Firms’ Sensitive Information Exposed|https://www.msspalert.com/cybersecurity-breaches-and-attacks/aws-data-leak-uk-consulting-exposures/]]|Data_Leak AWS|
|2020.01.15|The Sneak Life|[[Une nouvelle ère de Sécurité du cloud marché est en croissance dans la demande énorme en 2020|https://www.thesneaklife.com/2020/01/15/une-nouvelle-ere-de-securite-du-cloud-marche-est-en-croissance-dans-la-demande-enorme-en-2020-trend-micro-inc-mcafee-llc-symantec-corporation-international-business-machines-corporation/]]|Market_Analysis|
|2020.01.15|//Microsoft Azure//|![[New Azure blueprint for CIS Benchmark|https://azure.microsoft.com/en-us/blog/new-azure-blueprint-for-cis-benchmark/]]|Azure Benchmark|
|2020.01.15|//Google Cloud//|[[Exploring container security: Announcing the CIS Google Kubernetes Engine Benchmark|https://cloud.google.com/blog/products/containers-kubernetes/gke-cis-benchmarks-deliver-security-best-practices]]|Kubernetes Benchmark Best_Practices|
|2020.01.15|Center for Internet Security|![[CIS Kubernetes Benchmark version 1.5.0|https://www.cisecurity.org/benchmark/]]|Kubernetes Benchmark Best_Practices|
|2020.01.15|//Catalogic Software//|[[Catalogic Software Announces KubeDR - Open Source Kubernetes Disaster Recovery|https://vmblog.com/archive/2020/01/15/catalogic-software-announces-kubedr-open-source-kubernetes-disaster-recovery.aspx]]|Kubernetes DRP|
|2020.01.15|//PaloAlto Networks//|[[Your SaaS Security Checklist|https://blog.paloaltonetworks.com/2020/01/cloud-saas-security/]]|SaaS|
|2020.01.15|//Tripwire//|[[Key Cloud Security Challenges and Strategies to Overcome Them|https://www.tripwire.com/state-of-security/security-data-protection/cloud/key-cloud-security-challenges-strategies/]]|Strategies|
|2020.01.15|//Nuage Networks//|[[How SD-WAN Helps Achieve Data Security and Threat Protection|https://www.darkreading.com/cloud/how-sd-wan-helps-achieve-data-security-and-threat-protection-/a/d-id/1336724]]|SDWAN|
|2020.01.15|//StackRox//|[[Guide to Kubernetes Egress Network Policies|https://www.stackrox.com/post/2020/01/kubernetes-egress-network-policies/]]|Kubernetes Filtering|
|2020.01.15|//AllCloud//|![[AllCloud Reveals Current and Emerging Trends in Cloud Infrastructure|https://allcloud.io/press_releases/allcloud-reveals-current-and-emerging-trends-in-cloud-infrastructure/]] ([[rapport|https://allcloud.io/go/2020-cloud-infrastructure-report/]])|Report AllCloud|
|>|>|>|!2020.01.14|
|2020.01.14|UK Authority|[[Home Office signs cloud deal with AWS|https://www.ukauthority.com/articles/home-office-signs-cloud-deal-with-aws/]]|Government AWS UK|
|2020.01.14|Blackblaze|[[A Sandbox in the Clouds: Software Testing and Development in Cloud Storage|https://www.backblaze.com/blog/a-sandbox-in-the-clouds-software-testing-and-development-in-cloud-storage/]]|Storage|
|2020.01.14|Kubernetes|![[Announcing the Kubernetes bug bounty program|https://kubernetes.io/blog/2020/01/14/kubernetes-bug-bounty-announcement/]]|Kubernetes Bug_Bounty|
|2020.01.14|Cloud Native Computing Foundation| → [[Introducing the Kubernetes Bug Bounty Program|https://www.cncf.io/blog/2020/01/14/introducing-the-kubernetes-bug-bounty-program/]]|Kubernetes Bug_Bounty|
|2020.01.14|HackerOne| → [[Kubernetes Bug Bounty Program|https://hackerone.com/kubernetes]]|Kubernetes Bug_Bounty|
|2020.01.14|Silicon Angle| → [[CNCF launches Kubernetes bug bounty program |https://siliconangle.com/2020/01/14/cncf-launches-kubernetes-bug-bounty-program/]]|Kubernetes Bug_Bounty|
|2020.01.14|International Journal of Cloud Computing| → [[Secure cloud computing using homomorphic construction|https://www.inderscience.com/info/inarticle.php?artid=104498]]|Encryption Homomorphic|
|2020.01.17|TechXplore|[[Homomorphic encryption for cloud users|https://techxplore.com/news/2020-01-homomorphic-encryption-cloud-users.html]]|Encryption Homomorphic|
|2020.01.14|//Microsoft//|[[The Changing Face of Cloud Threat Intelligence|https://www.securityweek.com/changing-face-cloud-threat-intelligence]]|CTI|
|2020.01.14|//G2//|[[Exploring the Future of Cloud Computing in 2020 and Beyond|https://learn.g2.com/future-of-cloud-computing]]|History|
|2020.01.14|//Kindite//|![[The Last Encryption Gap - Data in Use|https://blog.kindite.com/the-last-encryption-gap-data-in-use]]|Encryption|
|>|>|>|!2020.01.13|
|2020.01.13|AGEFI[>img[iCSF/flag_fr.png]]|[[Données en danger dans la faillite du cloud-provider|http://www.agefi.com/home/acteurs/detail/edition/online/article/donnees-en-danger-dans-la-faillite-du-cloud-provider-493333.html]]|CSP Failure|
|2020.01.13|Silicon[>img[iCSF/flag_fr.png]]|[[Orchestration des conteneurs : pour quels cas d’usage et avec quelles solutions ?|https://www.silicon.fr/avis-expert/orchestration-des-conteneurs-pour-quels-cas-dusage-et-avec-quelles-solutions]]|Containers|
|2020.01.13|CSO|[[Moving security operations to the cloud|https://www.csoonline.com/article/3512589/moving-security-operations-to-the-cloud.html]]|OpSec|
|2020.01.13|CISO Mag|[[5 Threat Predictions for 2020: Are You Prepared?|https://www.cisomag.com/threat-predictions-for-2020/]]|Predictions|
|2020.01.13|Hackin9|[[AWS Report - a tool for analyzing amazon resources|https://hakin9.org/aws-report-a-tool-for-analyzing-amazon-resources/]]|Tools AWS|
|2020.01.13|//Wallix//[>img[iCSF/flag_fr.png]]|[[Comment remédier aux ravages du Cloud Act ?|https://www.journaldunet.com/solutions/expert/72421/comment-remedier-aux-ravages-du-cloud-act.shtml]]|CLOUD_Act|
|2020.01.13|//Microsoft Azure//|[[Azure is now certified for the ISO/IEC 27701 privacy standard|https://azure.microsoft.com/en-us/blog/azure-is-now-certified-for-the-iso-iec-27701-privacy-standard/?cdn=disable]]|Azure privacy ISO_27701|
|2020.01.13|//PaloAlto Networks//|[[Why Cloud Security Seems So Hard, and How to Overcome These Challenges|https://blog.paloaltonetworks.com/2020/01/cloud-security-challenges/]]|Challenges|
|2020.01.13|//CipherCloud//|[[Prevent security misconfigurations in a multi-cloud environment|https://www.ciphercloud.com/prevent-security-misconfigurations-in-a-multi-cloud-environment/]]|Misconfigurations|
|2020.01.13|Cloud Security Podcast|[[Cloud Security journey of Dow Jones post the AWS Cloud Breach , with Jay Kelath, Product Security|https://www.cloudsecuritypodcast.tv/listen-to-the-episodes/jay-kelath]]|Podcast|
!"//2020 Predictions: Hear Me Now and Believe Me Later//"
[>img(150px,auto)[iCSA/K1HB3.jpg]][>img(150px,auto)[iCSA/K1HB2.jpg]]Article de blog publié le 17 janvier 2020 — Rédigé par Jim Reavis, Co-Founder et CEO de la CSA
<<<
//I am typing up my prediction blog using an invisible ink font, to reduce my embarrassment when 2021 rolls by. I know prediction articles can be a dime a dozen and prognosticators pick both easy and vague items to appear smarter than they are. I am all about that!
Before I give you my predictions, here are a few predictions others made about the year 2020:
* In 1994, RAND Corp predicted we would have ape chauffeurs.
* In 1957, Popular Mechanics said roads would be replaced by pneumatic tubes. Hyperloop isn’t quite there yet.
* In 1955, Lewyt Vacuum Company said vacuums would be nuclear powered. Yikes!
* In a 1911 Lecture at the Royal College of Surgeons of England, it was predicted that human feet would become one big toe.
* In 1900, John Elfreth Watkins Jr., the curator at the Smithsonian, said C, X, and Q would not be part of the alphabet. He wouldn’t be a fan of cloud computing.
My predictions won’t be perfect, but they will be better than that. So, here we go.
[>img(150px,auto)[iCSA/JimReavis.jpg]]
''#1 We will see an increase in Cloud Breaches''. This is primarily a function of market adoption, more usage and more data in the cloud. It is going to be caused by ”Bread and Butter” security issues:
* Misconfigured VMs, Containers, Firewalls & Storage Buckets
* Poorly managed credentials, keys, often found through “GitHub scraping.”
* Lack of multifactor authentication & IdM strategy
* API insecurity
* Change control & patching deficiencies
''#2 Artificial Intelligence "Deepfake" Ransomware''. We have already seen Deepfake spearphishing, such as when a UK company was scammed out of $243k by a Deepfake voice message purporting to be that of their German CEO. Deepfakes are getting so good that they will make for a compelling click. I see them being deployed with worm technology and with ransomware being a logical payload.

''#3 2020 US Presidential Election Mischief''. Forget about state actors hacking the election or social media manipulation being used to change the results, that is above my pay grade. I am talking about security attacks on the rest of us due to this being the most controversial and passionate presidential election in modern times. I see three attacks happening. Widespread phishing attacks will be successful due to the high passions and hyperbole. Hacktivists will target businesses appearing to lean towards one party or another. I also see ransomware attacks on government agencies.

''#4 The Year of Serverless Security''. Serverless computing, such as Function-as-a-Service, is all the rage right now. It is easy to see why, you relieve the application developer from a great deal of server management considerations and the generous pricing structure from cloud service providers makes this compelling. We are still in the early days of understanding exactly how we secure Serverless. This can be exacerbated by developers designing applications in a way that expose its weaknesses, such as inadvertently creating frequent unexpected triggering events. Serverless Security will be a big topic, we will see new startups dealing with it and we will leave the year with a better perspective of when to use Serverless and how to secure it.

''#5 Cloud Portability''. Portability of applications in the cloud has become more difficult with each passing year. Cloud service providers have created so many valuable and proprietary services that developers love, leading to a world where applications tend to be tightly coupled with their underlying infrastructure-as-a-service. This is the market at work, and many enterprises I have talked to have said a loss of portability is a trade they are willing to make in exchange for having clear accountability from the provider. Still, I have a suspicion that by the end of the year, there will be an initiative to revisit portability from stakeholders that are concerned about the downsides of lock-in.

Well, I think we will leave it at five as I don’t want to use my incredible powers to give you this year’s Super Bowl winner. I wish you all a happy and prosperous new year, let’s enjoy watching 2020 unfold together!//
<<<
&rArr; Lire [[l'original|https://CloudSecurityAlliance.fr/go/k1hb/]] sur le blog de la CSA.
&rArr; Écouter [[l'interview|https://CloudSecurityAlliance.fr/go/k1hi/]] de Jim Reavis sur le même sujet
!"//CSA 2019 Year in Review and look into 2020//"
[>img(150px,auto)[iCSA/CSAsecUpd.jpg]]Podcast de la série "[[CSA Security Update]]" publié le 17 janvier 2020 — Invité : Jim Reavis, CEO CSA
<<<
//2019 was another great year for CSA and it sets the stage for an even greater year in 2020.
Listen to this insightful interview with Jim Reavis; Co-Founder and CEO of the Cloud Security Alliance as he provides a look back at the accomplishments and milestones achieved in 2019 and provides a look into the journey we will be taking in 2020.//
<<<
__Liens :__
* Annonce : https://www.buzzsprout.com/303731/2513809-csa-2019-year-in-review-and-look-into-2020-with-co-founder-ceo-jim-reavis
* Podcast : https://www.buzzsprout.com/303731/2513809-csa-2019-year-in-review-and-look-into-2020-with-co-founder-ceo-jim-reavis.mp3
!"//Cloud Industrial Internet of Things (IIoT) - Industrial Control Systems Security Glossary//"
<<<
//The Industrial Control Systems (ICS) Security Glossary is a reference document that brings together ICS and IT/OT related terms and definitions.
Bringing together the terms and definitions in this document is meant to minimize misinterpretation and provide a common ICS and IT/OT language.
A balance has been struck between length of the definitions and understandability with reliance on the reference source as the final arbiter.
The goal is to provide a common language to communicate, understand, debate, conclude, and present the results of the ICS WG’s work.
The intended audience is everyone from the Board to security staff inside an organization to customers and third-party suppliers including cloud service providers.//
<<<
La date limite pour faire les commentaires est fixée au ''15 février 2020''.
&rArr; Lire [[l'original|https://CloudSecurityAlliance.fr/go/k1fa/]] sur le blog de la CSA
!"//Behind the Scenes: IoT Working Group with Mark Yanalitis//"
[>img(150px,auto)[iCSA/K1FBB.jpg]]Article de blog publié le 15 janvier 2020 — Rédigé par Mark Yanalitis et la CSA
<<<
//Here at CSA, our working groups are the core of what we do. From researching best practices, to tackling challenges on the horizon, they bring together security professionals from diverse backgrounds and experiences to collaborate on research that will benefit the entire industry.
In this blog series we will be interviewing different working group members to help give you an idea of what it looks like to participate in a working group. For our first blog we asked Mark Yanalitis to share his reason for joining the CSA Internet of Things Working Group and what his experience has been like.

__Interview with Mark Yanalitis__
Mark Yanalitis, MS MA CISSP is an independent security researcher, IoT work group member, and former teaching adjunct at Carnegie Mellon University Heinz College of Information Systems and Policy.

The Cloud Security Alliance (CSA) Internet of Things (IoT) work group preceded me. I was a late add. The work group already produced useful and polished works in the areas of IoT control matrix objectives, responses fulfilling National Institutes of Standards (NIST) request for public comment, and recently the distribution of the OWASP Firmware Security Testing Framework. A dedicated cadre of CSA professional backstop work groups, cross-pollinate efforts and manage the humble and essential coordination work. One of the regular challenges of national work groups is not necessarily having volunteer bench strength; it's working in a rapidly expanding data security and information privacy subject area while market adoption and technology uptake have a significant head start.

Many and varied IoT use cases exist for residential consumer, commercial, and industrial applications. Some "wouldn't it be great if" use cases existed but were in a state of dormancy. Industrial IoT (IIoT) embraced sensor-driven manufacturing line management and robotic process automation. The rapid and expansive growth in both mobile and cloud capability resulted in many existing and new IIoT use cases migrating into the commercial and consumer space while spurring the transformation of previously closed proprietary IIoT designs. The resulting rapid expansion of TCPIP and machine learning enabled sensors, assistants, toys, health devices, and home automation capability fundamentally changed threat landscapes, attack surfaces, and disclosure potentials.

The CSA IoT work group is one of several organizational bodies operating in the standards space. ENISA (European Union Agency for CyberSecurity), ESTI (EU Standards organization TC CYBER), IETF/IEEE, Internet Industry Consortium (IIC), NIST, OWASP, and UL (Underwriters Laboratories), represent major information outlets. As a researcher in this area of information security, membership in the CSA IoT work group allows me to make contributions as well as take in the perspectives of professionals who work directly in the IoT and IIoT work space. CSA IoT work group membership affords a low barrier to entry into the center of IoT data security and IoT privacy conversations, and like many other CSA venues and information outlets, CSA work group membership provides a high rate of return.//
[...]
<<<
&rArr; Lire [[l'original|https://CloudSecurityAlliance.fr/go/k1fb/]] sur le blog de la CSA
!1 - Les nouveautés CSA de la semaine du 6 au 12 janvier 2020
* Annonce : Nouvelle conférence Cloud et Sécurité "[[SECtember]]" de la CSA+++*[»]> <<tiddler [[2020.01.09 - Nouvelle conférence SECtember de la CSA]]>>=== [>img[iCSF/cloud-security-alliance-fr.png]]
* Blog : 'Five ''Predictions'' to Impact Enterprise Network Security in 2020'+++*[»]> <<tiddler [[2020.01.10 - Blog : 'Five Predictions to Impact Enterprise Network Security in 2020']]>>=== 
* Blog : 'We Need More Women Mentors For a More Complete Cybersecurity Workforce'+++*[»]> <<tiddler [[2020.01.07 - Blog : 'We Need More Women Mentors For a More Complete Cybersecurity Workforce']]>>=== 
* Publication : première partie 'Critical Controls Implementation for Systems Applications and Product (SAP)'+++*[»]> <<tiddler [[2020.01.06 - Publication : 'Critical Controls Implementation for Systems Applications and Product (SAP)' (1/2)]]>>=== 
* Blog : 'Enterprise Architecture Cloud Delivery Model - CCM Mapping'+++*[»]> <<tiddler [[2020.01.06 - Blog : 'Enterprise Architecture Cloud Delivery Model - CCM Mapping']]>>=== 
!2 - Veille Web
La [[Veille Web|2020.01.12 - Veille Hebdomadaire - 12 janvier]] avec seulement une quarantaine de liens dont
* A lire : Sur AWS, certains certificats expireront début mars 2020+++*[»]>
|2020.01.07|//AWS//|![[Urgent & Important - Rotate Your Amazon RDS, Aurora, and Amazon DocumentDB (with MongoDB compatibility) Certificates|https://aws.amazon.com/blogs/aws/urgent-important-rotate-your-amazon-rds-aurora-and-documentdb-certificates/]]|AWS Certificates|
|2020.01.08|CBR Online| → [[AWS to DB Users: Download Fresh Certs Urgently, or Risk Applications Breaking|https://www.cbronline.com/cloud/aws-certificate-update/]]|AWS Certificates|
|2020.01.09|Dark Reading| → [[AWS Issues 'Urgent' Warning for Database Users to Update Certs|https://www.darkreading.com/cloud/aws-issues-urgent-warning-for-database-users-to-update-certs/d/d-id/1336766]]|AWS Certificates|
|2020.01.10|Continuity Central| → [[Amazon AWS warns certain users to update certificates or face lost connectivity |https://www.continuitycentral.com/index.php/news/technology/4780-amazon-aws-warns-certain-users-to-update-certificates-or-face-lost-connectivity]]|AWS Certificates|
=== 
* Attaques : Technique de mouvement latéral dans le Cloud+++*[»]>
|2020.01.06|SANS|![[Lateral traffic movement in Virtual Private Clouds|https://www.sans.org/reading-room/whitepapers/cloud/lateral-traffic-movement-virtual-private-clouds-39360]]|Attacks|
=== 
* Divers : AzureAD, Phishing O365, quelques prévisions pour 2020
|!Janvier|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2020.01.12|
|2020.01.12|//Active Directory Security//|[[What is Azure Active Directory?|https://adsecurity.org/?p=4211]]|AzureAD|
|>|>|>|!2020.01.11|
|2020.01.11|TechRadar|[[What is Amazon S3?|https://www.techradar.com/news/what-is-amazon-s3]]|AWS_S3|
|2020.01.11|Kelda|[[Kube Explained: Part 1 - How CI/CD and Microservices Led to Kubernetes|https://kelda.io/blog/kube-explained-part-1-how-ci-cd-and-microservices-led-to-kubernetes/]] (2/2)|CI_CD Kubernetes|
|>|>|>|!2020.01.10|
|2020.01.10|Silicon.fr[>img[iCSF/flag_fr.png]]|[[Google Cloud muscle son stockage archive face à AWS et Azure|https://www.silicon.fr/google-cloud-stockage-archive-aws-azure-332259.html]]|Storage|
|2020.01.10|Help Net Security|[[Office 365 users: Beware of phishing emails pointing to Office Sway|https://www.helpnetsecurity.com/2020/01/10/phishing-office-sway/]]|O365 Attacks|
|2020.01.10|Bleeping_Computer|[[Enables Security Defaults in Azure Active Directory|https://www.bleepingcomputer.com/news/microsoft/microsoft-enables-security-defaults-in-azure-active-directory/]]|BleepingComputer|
|2020.01.10|NextGov|[[Can the Continuous Diagnostics and Mitigation Program Secure a Cloud Smart Government?|https://www.nextgov.com/ideas/2020/01/can-continuous-diagnostics-and-mitigation-program-secure-cloud-smart-government/162367/]]|Misc|
|2020.01.10|Federal News Network|[[Cloud computing and remote workers can reduce cybersecurity|https://federalnewsnetwork.com/federal-drive/2020/01/cloud-computing-and-remote-workers-can-reduce-cybersecurity/]] ([[audio mp3|http://www.podcastone.com/downloadsecurity?url=aHR0cHM6Ly9wZHN0LmZtL2UvY2h0YmwuY29tL3RyYWNrL0UyRzg5NS9hdy5ub3hzb2x1dGlvbnMuY29tL2xhdW5jaHBvZC9mZWRlcmFsLWRyaXZlL21wMy8wMTEwMjBfSGF6YXJfd2ViX3ZuYW9fYmU5N2I4NWMubXAzP2F3Q29sbGVjdGlvbklkPTExNDYmYXdFcGlzb2RlSWQ9ODRlNzBlYTItOTFkOS00MThmLThmYmEtMmI1YWJlOTdiODVjKip8MTU3ODgwODU3ODkyMioqfA==.mp3]])|Misc|
|2020.01.10|The Register|[[UK Home Office opens AWS cash firehose even wider with £100m public cloud services deal|https://www.theregister.co.uk/2020/01/10/home_office_hands_aws_100m_for_public_cloud_services/]]|AWS UK|
|2020.01.10|//Google Cloud//|[[Exploring container security: Navigate the security seas with ease in GKE v1.15|https://cloud.google.com/blog/products/containers-kubernetes/new-kubernetes-security-settings-2019]]|Containers|
|2020.01.10|//Cofense//|[[Phish Fryday - Cloud Services in Phishing Attacks|https://cofense.com/phish-fryday-cloud-services/]]|Attacks Phishing|
|2020.01.10|//Shared Assessments//|[[Ten Third Party Risk Management Trends to (Continuously) Monitor (and 7 resolutions to strengthen TPRM capabilities — and collaborations — in 2020)|https://sharedassessments.org/ten-third-party-risk-management-trends-to-continuously-monitor-and-7-resolutions-to-strengthen-tprm-capabilities-and-collaborations-in-2020/]]|Predictions|
|2020.01.10|//JumpCloud//|[[How To Extend Active Directory To The Cloud Without Azure|https://jumpcloud.com/blog/extend-ad-cloud-without-azure/]]|Active_Directory|
|2020.01.10|//Pen Test Partners//|[[IR & Forensics in the Cloud|https://www.pentestpartners.com/security-blog/ir-forensics-in-the-cloud/]]|Forensics|
|2020.01.10|//Cloud Passage//|[[Securing Kubernetes Master and Workers|https://www.cloudpassage.com/blog/securing-kubernetes-master-and-workers/]]|Kubernetes|
|>|>|>|!2020.01.09|
|2020.01.09|Le MagIT[>img[iCSF/flag_fr.png]]|[[Comprendre comment fonctionne le réseau sous Kubernetes|https://www.lemagit.fr/conseil/Les-cles-pour-comprendre-comment-fonctionne-le-reseau-sous-Kubernetes]]|Kubernetes|
|2020.01.09|SecureCloudBlog|[[Mad Scientists in the realms of IAM, Azure and Office 365!|https://securecloud.blog/2020/01/07/azure-ad-application-proxy-sso-and-authorization-notes-from-the-field/]]|Azure O365 IAM|
|2020.01.09|//Avanan//|[[Cybercriminals Use Microsoft Sway to Phish Office 365 Security and Your Well-Trained Users|https://www.avanan.com/blog/microsoft-sway-phishing]]|O365 Attacks|
|2020.01.09|//JDSupra//|[[Cloud Solutions Allowed for Encrypted, Unclassified Defense Data|https://www.jdsupra.com/legalnews/cloud-solutions-allowed-for-encrypted-52510/]]|Regulations Defense|
|2020.01.09|//Security Intelligence//|[[3 Multicloud Security Considerations for the Modern Enterprise|https://securityintelligence.com/posts/3-multicloud-security-considerations-for-the-modern-enterprise/]]|Multi_Cloud|
|2020.01.09|//Armor//|[[Cloud Security Tools: What You Need to Be Compliant and Secure|https://www.armor.com/blog/cloud-security-tools/]]|Tools|
|2020.01.09|//StackRox//|[[Kubernetes Networking Demystified: A Brief Guide|https://www.stackrox.com/post/2020/01/kubernetes-networking-demystified/]]|Kubernetes Networking|
|2020.01.09|//Microsoft//|[[Changing the Monolith - Part 1: Building alliances for a secure culture|https://www.microsoft.com/security/blog/2020/01/09/changing-the-monolith-part-1-building-alliances-for-a-secure-culture/]] (1/5)|Misc|
|>|>|>|!2020.01.08|
|2020.01.08|Le MagIT[>img[iCSF/flag_fr.png]]|[[Comment Azure AD complète Active Directory|https://www.lemagit.fr/conseil/Comment-Azure-AD-complete-Active-Directory]]|AzureAD|
|2020.01.08|SANS|[[Security Visibility in AWS: Authority, Access and Capability|https://www.sans.org/cyber-security-intelligence/2020/01/08/security-visibility-in-aws-authority-access-and-capability]]|AWS|
|2020.01.08|//Microsoft//|[[Government data protection—earning and retaining the public’s trust with Microsoft 365|https://www.microsoft.com/en-us/microsoft-365/blog/2020/01/08/government-data-protection-earning-retaining-public-trust-microsoft-365/]]|Azure O365 Government|
|2020.01.08|//Cyware//|[[Attackers Pick up Nasty Phishing Tactic to Gain Full Access to Users' Data Stored in the Cloud|https://cyware.com/news/attackers-pick-up-nasty-phishing-tactic-to-gain-full-access-to-users-data-stored-in-the-cloud-eaefb105]]|Phishing|
|2020.01.08|//ShiftLeft//|[[Accomplishing SOC 2 Type II in the Cloud-Native Kubernetes Era|https://blog.shiftleft.io/accomplishing-soc-2-type-ii-in-the-cloud-native-kubernetes-era-7786ff8811c3]]|Compliance Kubernetes SOC_2|
|2020.01.08|//Alibaba Cloud//|[[Easy Command-Line Access with Cloud Shell|https://medium.com/@Alibaba_Cloud/easy-command-line-access-with-cloud-shell-8e497624106f]]|Misc|
|>|>|>|!2020.01.07|
|2020.01.07|Solutions Review|[[What Can You Expect for Cloud Computing in 2020?|https://solutionsreview.com/cloud-platforms/what-can-you-expect-for-cloud-computing-in-2020/]]|Predictions|
|2020.01.07|//Google Cloud//|[[Your guide to Kubernetes best practices|https://cloud.google.com/blog/products/containers-kubernetes/your-guide-kubernetes-best-practices]]|Kubernetes Best_Practices|
|2020.01.07|//Microsoft//|[[Threat hunting in Azure Advanced Threat Protection (ATP)|https://www.microsoft.com/security/blog/2020/01/07/threat-hunting-azure-advanced-threat-protection/]]|Azure Threat_Protection|
|2020.01.07|//AWS//|![[Urgent & Important - Rotate Your Amazon RDS, Aurora, and Amazon DocumentDB (with MongoDB compatibility) Certificates|https://aws.amazon.com/blogs/aws/urgent-important-rotate-your-amazon-rds-aurora-and-documentdb-certificates/]]|AWS Certificates|
|2020.01.08|CBR Online| → [[AWS to DB Users: Download Fresh Certs Urgently, or Risk Applications Breaking|https://www.cbronline.com/cloud/aws-certificate-update/]]|AWS Certificates|
|2020.01.09|Dark Reading| → [[AWS Issues 'Urgent' Warning for Database Users to Update Certs|https://www.darkreading.com/cloud/aws-issues-urgent-warning-for-database-users-to-update-certs/d/d-id/1336766]]|AWS Certificates|
|2020.01.10|Continuity Central| → [[Amazon AWS warns certain users to update certificates or face lost connectivity |https://www.continuitycentral.com/index.php/news/technology/4780-amazon-aws-warns-certain-users-to-update-certificates-or-face-lost-connectivity]]|AWS Certificates|
|>|>|>|!2020.01.06|
|2020.01.06|SANS|![[Lateral traffic movement in Virtual Private Clouds|https://www.sans.org/reading-room/whitepapers/cloud/lateral-traffic-movement-virtual-private-clouds-39360]]|Attacks|
|2020.01.06|Dark Reading|[[What Tools Will Find Misconfigurations in My AWS S3 Cloud Buckets?|https://www.darkreading.com/edge/theedge/what-tools-will-find-misconfigurations-in-my-aws-s3-cloud-buckets/b/d-id/1336720]]|AW3 S3|
|2020.01.06|Kamran Bilgrami|[[Ethical Hacking Lessons — Building Free Active Directory Lab in Azure|https://medium.com/@kamran.bilgrami/ethical-hacking-lessons-building-free-active-directory-lab-in-azure-6c67a7eddd7f]]|Azure Active_Directory|
|2020.01.06|//PagerDuty//|[[PagerDuty Focuses Incident Response Efforts on the Cloud|https://devops.com/pagerduty-focuses-incident-response-efforts-on-the-cloud/]]|Incident_Handling|
|2020.01.06|//Blissfully//|[[SaaS Security and Compliance for HR|https://www.blissfully.com/blog/saas-security-and-compliance-for-hr/]]|SaaS Compliance|
|2020.01.06|//InfraCloud//|[[How to setup Role based access to Kubernetes Cluster|https://www.infracloud.io/role-based-access-kubernetes/]]|Kubernetes|
|2020.01.06|//Optiv//|[[Image Risks - Gaining Visibility into NIST SP 800-190, Part Three|https://www.optiv.com/blog/image-risks]] (3/6)
!"//Five Predictions to Impact Enterprise Network Security in 2020//"
[>img(150px,auto)[iCSA/K1ABF.jpg]]Article de blog publié le 10 janvier 2020 — Rédigé par +++*[Etay Bogner »]> https://linkedin.com/in/etaybogner/ ===, VP, Zero-Trust Products, +++*[Proofpoint »]> https://www.proofpoint.com/ ===
<<<
//Accelerating developments in security are playing a significant role in the evolution of enterprise networking. For years, the industry has relied on a hardware-centric, trust-based model that has become increasingly inflexible and insecure. Employees are no longer sitting in an office every day, working with local data center-based applications - there are now a wide range of popular cloud-based applications broadly deployed. It is not just that the perimeter is dissolving - security paradigms designed around the idea that users on the local area network (LAN) can be trusted are now considered high risk. As this trend continues into 2020, below are five enterprise security predictions expected to impact networking as business needs and threats both continue to evolve:
1. Security Stack Migration to the Cloud
:A fast-moving trend, expected to accelerate over the next 12 months, is that IT professionals will rely less on security protections delivered at the datacenter gateway. Instead, all security intelligence and updates will take place in the cloud. It has been going on for a long time, but now there is a consensus across the industry that the perimeter needs to be defined around the user and data rather than around offices. This means delivering security from the cloud, close to where user workspaces are located. This makes more sense than backhauling user traffic to the data center to consume security services there. Indeed, it eliminates the need to run after vulnerabilities and patch updates. For network security professionals, it’s easier to manage one central policy rather than per-site.
2. Platforms Instead of Products
:IT is gravitating toward centralization. The idea behind a more comprehensive platform that enables security services to be chained is that it will remove the need for complex integrations. In the area of network connectivity, this approach must include both network as a service and security as a service. As large enterprises make the transition, it will require numerous points of presence (PoPs) around the world so that it will always be as close as possible to the user or office in order to provide lower latency. Gartner recently formalized this approach and named it Secure Access Service Edge or SASE, a digital business enabler in the name of speed and agility.
3. Developing Technology from the Bottom Up
:A large number of vendors have announced their support for the SASE approach for several reasons. First, it encourages vendor consolidation to simplify technology acquisition and management. There has always been a debate between buying security from a single vendor for the convenience or buying best-of-breed solutions from multiple vendors. There is an increasing demand for the convergence of these two approaches. Vendors often buy third-party products to make a complete offering, but the integration (if any) is often rough and cumbersome. The new SASE architecture is an opportunity to deliver a complete offering in a way that is efficient for both the vendor and the enterprise. However, it means developing the technology from the bottom up using modern cloud-scale solutions. Many vendors with large legacy product offerings will have a problem with this.
4. Zero-Trust - Increased Focus on Users and Data
:The term Zero-Trust was widely used in 2019. Coined originally by Forrester research in 2010, it referred to a methodology for micro-segmenting the network. Today it has been expanded to a complete ZTX security framework. It makes sense to look at security in terms of what users are doing and what information they are accessing, rather than solely in terms of where their device is connected.
:Zero-trust enables administrators to limit the attack surface, continuously verify that users are who say they are, and ensure they are only accessing the data they really need. For most organizations, this is a long transformational journey and we are only at the beginning.
:Software Defined Perimeters (SDPs) are a great first step. SDPs offer a simple holistic approach where remote users no longer connect to a physical site, but to a global Network as a Service (NaaS) that provides continuously available secure connectivity. SDPs leverage huge technological advances associated with the megatrend of providing all forms of IT functionality as a service. IT resources within the SDP are typically hidden from public discovery and access is restricted by policy as needed. This removal of IT computing and data assets from general public access reduces the surface area in defense against IT security attacks.
5. Greater Convergence of Networking and Security
:The network is now everywhere. Much of the time, the backbone is the internet itself. It is now time to think of the enterprise network as virtual rather than physical and to ensure that the perimeter follows the user no matter where they are. It is no longer possible to separate the network from the security stack. Industry thought leaders are converging architecture and standardizing around this approach.
:While the cloud is the first important step for network security, it is not enough. Cloud networking is essential to delivering those services effectively over a true "virtual private network."
//[...]
<<<
&rArr; Lire [[l'original|https://CloudSecurityAlliance.fr/go/k1ab/]] sur le blog de la CSA
!"//Cloud Security Alliance Announces SECtember, a New Annual Conference for the Future of Cybersecurity//"
<<<
//[>img(200px,auto)[iCSA/202009US-Seattle.jpg]]SEATTLE - Jan. 9 2020 - The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications and best practices to help ensure a secure cloud computing environment, announced today it is changing the way the cloud and cybersecurity industry meets with the launch of [[SECtember]]+++*[»]> https://csacongress.org/event/sectember-2020/ ===, a signature event focused on educating the industry on key issues and trends faced in cloud and cybersecurity. Held in CSA’s home city of Seattle among the giants of cloud computing and the headquarters of several leaders within their respective industries, [[SECtember]] will feature in-depth training, networking opportunities and interactive sessions with global experts. ''The inaugural [[SECtember]] will be held Sept. 14-17, 2020'', at the Sheraton Grand Seattle.
“In 2009, CSA began defining cloud security before most organizations were in the cloud. In 2020, cloud computing is now the primary mode of computing around the world and is also the foundation for cybersecurity writ large and the means by which we secure all forms of computing, such as the Internet of Things. Seattle is well-established around the world as the center of cloud computing, and with the introduction of [[SECtember]], it can be the focal point of cybersecurity, as well. CSA is making a permanent commitment to bring this signature event to our home city on an annual basis, which is rapidly becoming a magnet for companies in the technology and cloud space,” said Jim Reavis, CEO and co-founder, Cloud Security Alliance.
“[[SECtember]] will bring together thought leaders from five continents to provide a global perspective on strategic cloud and cybersecurity issues and will provide state-of-the-art educational activities. We have a great deal of pride in Seattle, and while the topic of our conference is serious, we guarantee that the event will also be fun,” he added.
The annual event will offer attendees an enhanced roster of training, including courses covering the Certificate of Cloud Security Knowledge (CCSK) Foundation (1 day), CCSK Plus (2-day) along with CCSK Plus AWS and Azure, Cloud Governance & Compliance (1 day), Advanced Cloud Security Practitioner (2-day), and Certificate of Cloud Auditing Knowledge (2-day), as well as other training sessions currently in development.
//[...]
//CSA will issue a Call for Papers for [[SECtember]] on February 3.//
<<<
&rArr; Lire [[l'original|https://CloudSecurityAlliance.fr/go/k17b/]] sur le site de la CSA.
&rArr; le site de la conférence → ''[[CloudSecurityAlliance.fr/go/k9ee/|https://CloudSecurityAlliance.fr/go/k9ee/]]''
!"//We Need More Women Mentors For a More Complete Cybersecurity Workforce//"
[>img(150px,auto)[iCSA/K17BW.jpg]]Article de blog publié le 7 janvier 2020 — Rédigé par +++*[Sivan Tehila »]> https://www.linkedin.com/in/sivan-tehila/ ===, Director of Solution Architecture, +++*[Perimeter 81 »]> https://www.perimeter81.com/ ===
<<<
//It seems like everyone wants to get into the field of cybersecurity. However, this isn’t the case for women. The cybersecurity industry needs to rethink how to attract more women into the talent pool to bring more order into the gender balance. +++*[Research from Cybersecurity Ventures »]> https://cybersecurityventures.com/women-in-cybersecurity/ === shows that today women make up only 20% of the cybersecurity workforce. When it comes to recruiting women into the workforce, cybersecurity is clearly one of the worst industries for women to men ratios.
The lack of women in the cybersecurity workforce is diminishing the opportunities to fill out security positions.
The question is: how can the security industry successfully improve and increase the hiring of women in security? While there are many different challenges that women face in the security industry, I am here to highlight the different ways the security industry can improve their numbers of women in security moving forward.

__Starting at a Young Age__
The ongoing issue behind the massive gap between women and men in cybersecurity is starting from an initial perception of education at a young age. Until recently, women were not publicly shown as tech or security experts. Girls are being exposed to this idea at a very young age, and this vision and career choice continue with them when deciding which career they choose.
According to a study by +++*[Kaspersky Lab »]> https://usa.kaspersky.com/about/press-releases/2017_kaspersky-lab-study-most-women-decide-against-a-career-in-cybersecurity-before-age-16 ===, 45% of young women are not aware of the different cybersecurity career opportunities and one in six women thinks that a career in cybersecurity would be dull. The study even states that “a third of young women think that cybersecurity professionals are ‘geeks’ and a quarter think they are ‘nerds.’”
Introducing young women to the numerous STEM topics can provide a spark of interest for potential career paths early on. In order to increase the number of women entering the security fields, there needs to be an industry-accepted shift when it comes to women in security. Additionally, it is important to expose women of all ages to positive female role models from within cybersecurity and similar fields in order to change the way they are perceived.

__A Career in Cyber Comes with Benefits__
The first step to increase women in security is to emphasize all the different benefits and pluses that come with a career in cybersecurity. By joining the cybersecurity field, there are endless benefits that come with the job, such as job security, high pay, scholarships, and incentives. While there are thousands of cybersecurity jobs needed to be filled, the industry is seeing organizations seeking diversity in their workplaces, which is presenting more women to be hired in these positions. Due to the demand for skilled security people, pay for a career in cybersecurity is very high when compared to different industries.
Another major reason why women should shift left and join the cybersecurity space is that it is a field that is challenging and intriguing. The cybersecurity space is constantly changing and evolving, providing the opportunity to learn and experience different sectors that are not available or do not exist within other fields and career choices.
This career path allows women to be captivated by the always-changing work lifestyle, which presents different junctures where women can provide their expertise in decision making and strategizing, which will go a long way for their company. While in the end, everyone who works in cybersecurity plays a key role in fighting against cyberattacks - one thing is clear, the industry needs more women and the skills they offer. These different career benefits and motivations will encourage women to take an interest in learning more about the field and choose a career in cybersecurity.

__Team Diversity is Necessary & Beneficial__
Gender diversity in the workplace is +++[proven »]> https://www.gallup.com/workplace/236543/business-benefits-gender-diversity.aspx === to increase performance and turn higher profits. The reason for this is that men and women have different ideas, insights, and perspectives, which gives teams a more balanced attitude and varied approach to problem-solving.
Additionally, many women can feel intimidated breaking into a field that is male-dominated. Seeing other women on the team and in the office will encourage more women to apply and join the cybersecurity space. If women make up more than half of the world’s population, we should also make up at least half of the workforce.

__Women Mentors Needed__
While we are seeing an increase in women joining the cybersecurity field in the past few years, there is still a lack of women mentors in the field. According to a Kaspersky report, the majority of young women who work in security stated they rarely meet fellow women who work in the cybersecurity industry, and when they did meet women in the security workforce, it presented positive feedback on the industry.
So how can having female mentors in security bring more women into the field? Mentoring is important both from the point of view of helping to retain women in the industry, and attracting them to a career in security.
Publicizing different women security leaders and those upcoming in cybersecurity today as role models will encourage young women that cybersecurity is a potential career path. Organizations should take the time and effort to train and coach these role models so they can be mentors for younger women joining the organization and the industry. With the right mentorship and empowerment education, the cybersecurity industry can be one of the most intriguing career paths for women moving forward.

__Moving Forward__
Cybersecurity can be the ideal career path for anyone with the right skills, experience, and drive. By providing the right mix of female mentors in security and educating women in different career opportunities, organizations can take part in closing the skills gap by actively improving gender diversity within the industry. No matter what type of background each person comes from, they can play a huge role in closing the women in security gap in cybersecurity.
On a personal note, I find working in cybersecurity exciting, challenging, and constantly evolving. I wake up every morning and go into work knowing that I am helping protect people and businesses’ important resources, as well as their privacy. I am constantly learning new things and developing new skills in a field that requires me to always be on my toes and keeps my mind engaged.//
[...]
<<<
&rArr; Lire [[l'original|https://CloudSecurityAlliance.fr/go/k17b/]] sur le blog de la CSA
!"//Enterprise Architecture Cloud Delivery Model | CCM Mapping//"
[>img(150px,auto)[iCSA/K16BE.jpg]]Article de blog publié le 6 janvier 2020 — Rédigé par le groupe de travail "Enterprise Architecture"
<<<
//The Enterprise Architecture working group has been developing a Cloud Service Delivery Model mapping which aims to give businesses who are building out their cloud program an inside look into roles and responsibilities when it comes to IaaS, PaaS, and SaaS and specific areas within each.
This phased approach that links directly from the Cloud Controls Matrix ([[CCM]]), gives a quick glance and delivery model for identifying key areas within a business and determining whether they are the responsibility of the vendor or the cloud consumer.

__Helps eliminate assumptions when migrating to the cloud__
The best part of direct mappings like this built from the Cloud Controls Matrix, is the immense support it can generate for companies who may not quite understand the different complex areas of switching to a cloud environment. It makes it so there are never any assumptions on who within the business, or outside of the business, is responsible for certain delivery methods. Often roles and responsibilities become a blurred line when dealing with SLA’s when venturing into the cloud, and the Enterprise Architecture working group is addressing these areas by eliminating the confusion within the realms of IaaS, PaaS, and SaaS developments. These three areas map directly to the Cloud Control Matrix’s 16 current domains for full coverage.
How the mapping works
To give a quick overview of how this mapping will work, we will look at the first category of the [[CCM]] mapping portion, which in this case would be Application & Interface Security (AIS-01 Control ID from the [[CCM]]). The environment of choice would then be chosen; for instance, SaaS is going to act as our delivery method. We then cross-reference a table with a category of either CSP (Cloud Service Provider) or CSC (Cloud Service Consumer). For this case, there is a “1” annotating “yes” under CSP, and a “0” under CSC annotating a “no” response. These answers lead us to the sole responsibility for this deployment instance. Because application and programming interfaces are designed, developed, deployed, and tested by the vendor for SaaS, the security is ultimately agreed upon that it is the service provider's responsibility.

__Provides a full circle approach__
It may seem like a simplistic approach, but it is one that needs to be provided to consumers and businesses to really begin a course of action into adopting policy and structure for ownership responsibilities within the cloud. This EA delivery model, combined with other CSA items such as the [[CAIQ]] and the Cloud Controls Matrix, can develop a full circle approach to diving into the cloud and beginning to understand the approaches that are needed to become successful in understanding the knowledge surrounding it.
More easily put:
* The [[CAIQ]] would be the questions used to ask a vendor about specific items that a business may need to suffice a request for a service
* The [[CCM]] would then be used to assess the risk associated with cloud delivery models.
* Lastly the EA quick guide mapping would identify the roles and ownership capabilities.
Being able to reference architecture such as this cloud delivery model can allow for a baseline internally and give consumers the peace of mind that they are taking the correct approach.//
[...]
<<<
&rArr; Lire [[l'original|https://CloudSecurityAlliance.fr/go/k16b/]] sur le blog de la CSA
!"//Cloud Security Alliance Releases First in a Series of Critical Controls Implementation for SAP Guidelines//"
<<<
[>img(200px,auto)[iCSA/K16AC.png]]//Critical Controls Implementation for SAP
The Critical Controls Implementation for SAP is the first in a series of implementation documents that the CSA ERP Security Working Group aims to develop. These documents will focus on specific ERP technologies, starting with SAP. The Critical Controls Implementation for SAP document will be released in 2 parts. Part 1 will feature the first 10 controls with the second part featuring the rest at a later date. The document takes a technical and granular approach including information such as implementation checklists and SAP transaction numbers.//
<<<
Les 10 premiers controles sont :
# APP01 - //Secure Landscape//
# APP02 - //Baseline Secure Configurations//
# APP03 - //Security Vulnerabilities//
# INT01 - //Secure Integrations and API//
# DAT01 - //Continuous Monitoring//
# DAT02 - //Data Separation//
# DAT03 - //Data Encryption//
# BUS01 - //Inventory of Business Assets, Data and Processes//
# BUS02 - //Business Process Controls//
# BUS03 - //Continuous Compliance//
__Liens :__
* Annonce : → ''[[CloudSecurityAlliance.fr/go/k16a/|https://cloudsecurityalliance.fr/go/k16a/]]''
* Publication : → ''[[CloudSecurityAlliance.fr/go/k16p/|https://cloudsecurityalliance.fr/go/k16p/]]''
* Document "Top 20 Critical Controls for Cloud Enterprise Resource Planning (ERP) Customers" de juin 2019
** +++*[Annonce »]> <<tiddler [[2019.06.10 - Publication : Top 20 Critical Controls for Cloud Enterprise Resource Planning (ERP) Customers]]>>=== 
** +++*[Téléchargement »]>
&rArr; Téléchargement (après inscription) → ''[[CloudSecurityAlliance.fr/go/j6ax/|https://cloudsecurityalliance.fr/go/j6ax/]]''
=== 
[img(25%,1px)[iCSF/BluePixel.gif]]
!1 - Les nouveautés CSA de la semaine du 30 décembre 2019 au 5 janvier 2020
* À lire : ''Bilan 2019 et perspectives 2020'' pour le Chapitre Français de la CSA+++*[»]> <<tiddler [[2020.01.01 - Blog : Bilan 2019 et perspectives 2020]]>>=== [>img[iCSF/cloud-security-alliance-fr.png]]
* Actu : Appel à commentaires "''Compléments CCM V3.0.1 pour les spécifications sécurité de CloudOS''"+++*[»]> <<tiddler [[2019.12.12 - Appel à commentaires, document 'Compléments CCM V3.0.1 pour les spécifications sécurité de CloudOS']]>>=== 
!2 - Veille Web
La [[Veille Web|2020.01.05 - Veille Hebdomadaire - 5 janvier]] avec seulement une trentaine de liens dont
* Attaques : plus de MSSP impactés par Cloud Hopper+++*[»]>
|2019.12.30|Wall Street Journal|[[Ghosts in the Clouds: Inside China’s Major Corporate Hack|https://www.wsj.com/articles/ghosts-in-the-clouds-inside-chinas-major-corporate-hack-11577729061]]|Attacks APT CloudHopper|
|2019.12.30|infoRisk Today| → [[Report: Cloud Hopper Attacks Affected More MSPs|https://www.inforisktoday.com/report-cloud-hopper-attacks-affected-more-msps-a-13565]]|Attacks APT CloudHopper|
|2020.01.03|Forbes| → [[5 Key Security Lessons From The Cloud Hopper Mega Hack|
=== 
* Faille : Starbucks (clé API exposée)+++*[»]>
|2020.01.01|Security Affairs|[[Expert finds Starbucks API Key exposed online|https://securityaffairs.co/wordpress/95826/security/starbucks-api-key-exposed-online.html]]|API DataLeaks JumpCloud|
|2019.12.30|//HackerOne//| → [[JumpCloud API Key leaked via Open Github Repository.|https://hackerone.com/reports/716292]]|API DataLeaks JumpCloud|
|2020.01.03|CISO Mag| → [[Indian Researcher Finds Starbucks API Key Exposed Online|https://www.cisomag.com/indian-researcher-finds-starbucks-api-key-exposed-online/]]|API DataLeaks JumpCloud|
=== 
* Outils : S3Tk (pour AWS S3)+++*[»]>
|2020.01.04|KitPloit|[[S3Tk - A Security Toolkit For Amazon S3|https://www.kitploit.com/2020/01/s3tk-security-toolkit-for-amazon-s3.html]]|[[Tools|Outils-GitHub]] AWS|
=== 
* Publication : première version officielle du document OWASP "API Security Top 10 2019"+++*[»]>
|2019.12.31|OWASP|[[API Security Top 10 2019|https://github.com/OWASP/API-Security/raw/master/2019/en/dist/owasp-api-security-top-10.pdf]]|APIs OWASP|
|2020.01.01|DevOps.com| → [[Breaking Down the OWASP API Security Top 10, Part 1|https://devops.com/breaking-down-the-owasp-api-security-top-10-part-1/]] (1/2)|OWASP API|
|2020.01.03|DevOps.com| → [[Breaking Down the OWASP API Security Top 10, Part 2|https://devops.com/breaking-down-the-owasp-api-security-top-10-part-2/]] (2/2)|OWASP API|
|2019.12.31|Information Security Forum |[[Conquering the Cyber Security Challenges of the Cloud|https://www.cpomagazine.com/cyber-security/conquering-the-cyber-security-challenges-of-the-cloud/]]|Challenges|
=== 
* Divers : containers, sondage Barracuda Networks, virtualisation, quelques prévisions pour 2020
|!Janvier|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2020.01.04|
|2020.01.04|KitPloit|[[S3Tk - A Security Toolkit For Amazon S3|https://www.kitploit.com/2020/01/s3tk-security-toolkit-for-amazon-s3.html]]|[[Tools|Outils-GitHub]] AWS|
|>|>|>|!2020.01.03|
|2020.01.03|Fedscoop|[[DHS conducting market research for cloud-based vulnerability disclosure platform|https://www.fedscoop.com/vulnerability-disclosure-cloud-platform-dhs-cisa/]]|Vulnerability_Disclosure|
|2020.01.03|Container Journal|[[Containers vs. VMs: A Closer Look|https://containerjournal.com/topics/container-ecosystems/containers-vs-vms-a-closer-look/]]|Containers VM|
|2020.01.03|//Zscaler//|[[Zscaler’s SASE platform brings security and policy closer to the user in a cloud-delivered service|https://siliconangle.com/2020/01/03/zscalers-sase-platform-brings-security-and-policy-closer-to-the-user-in-a-cloud-delivered-service-cubeconversations/]] '[[vidéo|http://www.youtube.com/watch?v=pE_qlkJRuV0]])|SASE|
|2020.01.03|//Akku//|[[Navigating the World of Data Security in the Cloud: Steps to Ensure Compliance|https://www.akku.work/blog/steps-to-ensure-security-compliance/]]|Compliance|
|2020.01.03|//Netwrix//|[[Organizations May 'Uncloud' Over Security, Budgetary Concerns|https://www.darkreading.com/cloud/organizations-may-uncloud-over-security-budgetary-concerns/a/d-id/1336670]]|Misc|
|2020.01.03|//Gartner//|[[Global Cloud Security Market Size, Status and Forecast 2019-2025|https://garnerinsights.com/Global-Cloud-Security-Market-Size-Status-and-Forecast-2019-2025]]|Market_Analysis|
|>|>|>|!2020.01.02|
|2020.01.02|Federal News Network|[[Many agencies still not using FedRAMP for cloud providers, GAO says|https://federalnewsnetwork.com/federal-drive/2020/01/many-agencies-still-not-using-fedramp-for-cloud-providers-gao-says/]]|FedRAMP Compliance|
|2020.01.02|//Google//[>img[iCSF/flag_fr.png]]|[[Le Cloud en 2020 (et peut-être au-delà)|https://www.journaldunet.com/solutions/expert/72369/le-cloud-en-2020--et-peut-etre-au-dela.shtml]]|Misc|
|2020.01.02|//Optiv//|[[Extending the Hybrid Cloud Lab|https://www.optiv.com/blog/extending-hybrid-cloud-lab]] (2/7)|NIST_SP800-190 Containers|
|2020.01.02|//Extrahop//|[[2020 will be the year of the cloud breach predicts ExtraHop|https://www.continuitycentral.com/index.php/news/technology/4747-2020-will-be-the-year-of-the-cloud-breach-predicts-extrahop]]|Predictions|
|>|>|>|!2020.01.01|
|2020.01.01|DZone|[[Why I Don't Mind Having a European AWS Competitor|https://dzone.com/articles/why-i-dont-mind-to-have-an-european-aws-competitor]]|Sovereign_Cloud Europe|
|2020.01.01|Security Affairs|[[Expert finds Starbucks API Key exposed online|https://securityaffairs.co/wordpress/95826/security/starbucks-api-key-exposed-online.html]]|API DataLeaks JumpCloud|
|2019.12.30|//HackerOne//| → [[JumpCloud API Key leaked via Open Github Repository.|https://hackerone.com/reports/716292]]|API DataLeaks JumpCloud|
|2020.01.03|CISO Mag| → [[Indian Researcher Finds Starbucks API Key Exposed Online|https://www.cisomag.com/indian-researcher-finds-starbucks-api-key-exposed-online/]]|API DataLeaks JumpCloud|
|2020.01.01|//Alibaba Cloud//|[[Six Typical Issues when Constructing a Kubernetes Log System|https://medium.com/datadriveninvestor/six-typical-issues-when-constructing-a-kubernetes-log-system-e1108a01f629]]|Kubernetes Logging|
|>|>|>||
|!Décembre|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2019.12.31|
|2019.12.31|OWASP|[[API Security Top 10 2019|https://github.com/OWASP/API-Security/raw/master/2019/en/dist/owasp-api-security-top-10.pdf]]|APIs OWASP|
|2020.01.01|DevOps.com| → [[Breaking Down the OWASP API Security Top 10, Part 1|https://devops.com/breaking-down-the-owasp-api-security-top-10-part-1/]] (1/2)|OWASP API|
|2020.01.03|DevOps.com| → [[Breaking Down the OWASP API Security Top 10, Part 2|https://devops.com/breaking-down-the-owasp-api-security-top-10-part-2/]] (2/2)|OWASP API|
|2019.12.31|Information Security Forum |[[Conquering the Cyber Security Challenges of the Cloud|https://www.cpomagazine.com/cyber-security/conquering-the-cyber-security-challenges-of-the-cloud/]]|Challenges|
|2019.12.31|UK Authority|[[Scottish Government aims to boost national cloud take-up|https://www.ukauthority.com/articles/scottish-government-aims-to-boost-national-cloud-take-up/]]|Sovereign_Cloud|
|2019.12.31|VentureBeat|[[Protecting data on public clouds and edges with confidential computing|https://venturebeat.com/2019/12/31/protecting-public-cloud-and-edge-data-with-confidential-computing/]]|Confidential_Computing|
|2019.12.31|XaaS Journal|[[Survey says: Cloud Security Confidence is Growing|https://www.xaasjournal.com/survey-says-cloud-security-confidence-is-growing/]]|Survey|
|2020.01.01|CyberSecurity Insiders| → [[Cloud Security confidence surging up says Barracuda Networks|https://www.cybersecurity-insiders.com/cloud-security-confidence-surging-up-says-barracuda-networks/]]|Survey|
|2019.12.31|NextGov|[[Survey: Feds View Security as Biggest Hurdle to Cloud Adoption|https://www.nextgov.com/it-modernization/2019/12/survey-feds-view-security-biggest-hurdle-cloud-adoption/162155/]]|Survey|
|2019.12.31|//Microsoft//|[[Zero Hype|https://techcommunity.microsoft.com/t5/azure-active-directory-identity/zero-hype/ba-p/1061413]]|Zero_Trust|
|2019.12.31|//JumpCloud//|[[Manage O365 Users Without The Azure AD Console|https://jumpcloud.com/blog/manage-o365-without-azure/]]|O365 AzureAD|
|2019.12.31|//Spanning//|![[Spanning’s Best of 2019|https://spanning.com/blog/spannings-best-of-2019/]]|Year_Recap|
|2019.12.31|//Fugue//|[[Fugue’s Top 5 Posts of 2019: Cloud-Native Exploits and the Ways Engineers are Preventing Them|https://www.fugue.co/blog/fugues-top-5-posts-of-2019-cloud-native-exploits-and-the-ways-engineers-are-preventing-them]]|Year_Recap|
|2019.12.31|//Cubbit Cell//|[[Next-Generation of Cloud Computing: Distributed Cloud|https://www.interestingengineering.com/next-generation-of-cloud-computing-distributed-cloud]]|Misc|
|2019.12.31|//Kindite//|![[Best Cloud Encryption Practices|https://blog.kindite.com/best-cloud-encryption-practices]]|Encryption|
|>|>|>|!2019.12.30|
|2019.12.30|Wall Street Journal|[[Ghosts in the Clouds: Inside China’s Major Corporate Hack|https://www.wsj.com/articles/ghosts-in-the-clouds-inside-chinas-major-corporate-hack-11577729061]]|Attacks APT CloudHopper|
|2019.12.30|infoRisk Today| → [[Report: Cloud Hopper Attacks Affected More MSPs|https://www.inforisktoday.com/report-cloud-hopper-attacks-affected-more-msps-a-13565]]|Attacks APT CloudHopper|
|2020.01.03|Forbes| → [[5 Key Security Lessons From The Cloud Hopper Mega Hack|
|2019.12.30|GCN|[[How agencies can bake data security into IoT and disaster recovery|https://gcn.com/articles/2019/12/24/software-defined-perimeter-iot-dr.aspx]]|Disaster_Recovery|
|2019.12.30|Cryptosmith|[[Online Course in Cloud Security Basics|https://cryptosmith.com/2019/12/30/online-course-in-cloud-security-basics/]]|Training|
|2019.12.30|MSSP Alert|[[Cloud Service Providers: Emerging As MSSPs?|https://www.msspalert.com/cybersecurity-companies/mssps/cloud-service-providers-emerging-as-mssps/]]|MSSP|
|2019.12.30|MSSP Alert|[[Big MSP Suffers Ransomware Attack: Report|https://www.msspalert.com/cybersecurity-breaches-and-attacks/ransomware/big-msp-sodinokibi-attack/]]|Attack Ransomware CSP|
|2019.12.30|NextGov|[[After Two Years, JEDI is Finally Underway|https://www.nextgov.com/it-modernization/2019/12/after-two-years-jedi-finally-underway/162005/]]|JEDI|
|2019.12.30|//JumpCloud//|[[Identity-as-a-Service (IDaaS) Explained|https://jumpcloud.com/blog/idaas-explained/]]|IDaaS|
|2019.12.30|//MalwareBytes//|[[Explained: edge computing|https://blog.malwarebytes.com/explained/2019/12/explained-edge-computing/]]|Edge_Computing|
|2019.12.30|Informatique News[>img[iCSF/flag_fr.png]]|[[Les tendances 2020 du cloud computing|https://www.informatiquenews.fr/les-tendances-2020-du-cloud-computing-65996]]|Predictions|
<<QOTD Rolled1920 1852 noclick norandom>>
[img(150px,auto)[iCSF/Cloud2019.jpg]]
----
[img(150px,auto)[iCSF/Cloud2020.jpg]]
!1er janvier 2020 : Editorial
|ssTableNo|k
|<<tiddler Roll1920>>|Avec le changement d'année, voici venu le temps du bilan de l'année écoulée, et des bonnes résolutions pour l'année qui commence. 
Voici donc le ''bilan 2019'' assez fourni du ''Chapitre Français'' de la ''Cloud Security Alliance'', ainsi que les ''perspectives et des propositions d'objectifs pour 2020''.
Des actions sont d'ors et déjà engagées et vous devriez voir les premiers effets au cours du premier trimestre.| !!1 -- Bilan 2019 !!!1.1 -- Les actions du [[Chapitre Français]] # participation à 2 salons et conférences : [>img(150px,auto)[iCSF/Cloud2019.jpg]] ## en mars 2019, participation à la "Cloud Computing Expo Europe" et plus particulièrement au cycle de conférence "Forum Securité@Cloud"+++*[»]> [img(auto,100px)[iCSF/ForumSecuriteCloud-2019.png]][img(auto,100px)[iCSF/CCWE-2019.png]]=== ## en novembre 2019, participation au salon "Cloud & Cyber Security Paris" et plus particulièrement au cycle de conférence associé avec l'animation d'une table ronde+++*[»]> [img(200px,auto)[iCSF/CCSEP2019.png]]=== # participation à plusieurs groupes de travail de la [[Cloud Security Alliance]] # participation à l'animation et à des formations dans le cadre du partenariat avec l'ISEP Formation Continue+++*[»]> <<tiddler [[Partenariats - ISEP-FC - Masteres Spécialisés]]>>=== pour ## le ''[[Mastères Spécialisés® Expertise Cloud Computing|https://cloudsecurityalliance.fr/go/McCC/]]'' pour la 7^^ème^^ fois ## le ''[[Mastères Spécialisés® Architecture Cybersécurité et Intégration|https://cloudsecurityalliance.fr/go/McCS/]]'' pour la 2^^ème^^ fois !!!1.2 -- Le site Web [[CloudSecurityAlliance.fr|https://CloudSecurityAlliance.fr]] # le site Web est mis à jour une à deux fois par semaine avec les dernières actualités, annonces, et publications de la CSA [>img(150px,auto)[iCSF/Cloud2019.jpg]] # de gros efforts ont été faits sur ''le fond'' et la ''founiture d'informations pertinentes'' # des adaptations ont été faites tout au long de l'année, même si la forme va encore évoluer # l'ajout d'une rubrique "''Références''"+++*[»]> <<tiddler [[Références]]>>=== avec : ## des documents pertinents publiés par des agences nationales ou internationales de sécurité telles que l'ACSC (AU), l'ANSSI, le BSI (DE), le Clou.gov (US), le DoD (US), l'ENISA (EU), le NCSC (UK)... ## des documents pertinents publiés par des entités ou des organismes traitant de la sécurité et du Cloud telles que : le CIS, la CNIL, GEANT, Horizon 2020, l'ISO, l'IETF, le MITRE, le NIST, l'OWASP, PCI DSS... ## des documents pertinents publiés par des Prestataires de Services Cloud tels que : Amazon (AWS), Google (GCP), Microsoft (Azure) # l'ajout d'une rubrique "''Outils''"+++*[»]> <<tiddler [[Outils]]>>=== avec : ## des tableaux de bord de ''l'état de services Cloud'' et les pages "sécurité" des //fournisseurs d'énergie Cloud//+++*[»]> <<tiddler Outils##EtatServices>>=== ## des listes d'outils disponibles sur ''GitHub''+++*[»]> <<tiddler Outils##GitHub>>=== ## des listes de sites avec des ''challenges'' sécurité ou de composants à tester sur+++*[»]> <<tiddler Outils##Challenges>>=== ## des références de ''sites''+++*[»]> <<tiddler Outils##Sites>>=== ## des ''ports'' TCP ou UDP de références+++*[»]> <<tiddler Outils##Ports>>=== # l'intégration d'une partie des archives : ## complètes pour 2019 ## presque complètes pour 2018 ## très partielles pour les années précédentes # la mise en place d'un réducteur/minimiseur de liens/URLs+++*[»]> liens en //''CloudSecurityAlliance.fr/go/XXXX''// === ** la plupart des articles rédigés à partir de la mi-2019 de ce site l'utilisent !!!1.3 -- Autres points positifs # la ''lettre hebdomadaire''+++*[»]> <<tiddler [[Newsletters]]>>=== a été publiée toutes les semaines depuis son lancement, début Mars 2019 ## vous pouvez la retrouver sur le site [[CloudSecurityAlliance.fr|https://CloudSecurityAlliance.fr]] (rubrique [[Newsletters]]) ## elle est publiée tous les dimanches sur notre groupe LinkedIN "Cloud Security Alliance, French Chapter" # la ''veille Web Cloud et Sécurité''+++*[»]> <<tiddler [[Veille Web]]>>=== a été publiée toutes les semaines depuis son lancement, début Mars 2019 ## elle est publiée tous les dimanches sur le site [[CloudSecurityAlliance.fr|https://CloudSecurityAlliance.fr]] (rubrique [[Veille Web]]) # sur ''LinkedIN'', notre groupe "''Cloud Security Alliance, French Chapter''"+++*[»]> <<tiddler [[LinkedIN]]>>=== continue de croître avec près de 300 membres !!!1.4 -- Quelques points négatifs # aucun un "événement CSA" n'a été organisé en France [>img(150px,auto)[iCSF/Cloud2019.jpg]] # le comité de pilotage du [[Chapitre Français]] n'a pas pu être réactivé, malgré quelques tentatives # aucune formation ''CCSK''+++*[»]> <<tiddler [[CCSK]]>>===n'a été organisée, malgré quelques tentatives, mais cela pourrait déboucher en 2020 # très faible utilisation du compte ''Twitter''+++*[»]> <<tiddler [[Twitter]]>>=== ... mais ce n'est que partie remise ! !!2 -- Et pour 2020 !!!2.1 -- Continuité des actions engagées # la poursuite des publications actuelles : newsletters et veille Web hebdomadaires [>img(150px,auto)[iCSF/Cloud2020.jpg]] # la poursuite des actions d'animation et de formation dans les Mastères Spécialisés de l'ISEP Formation Continue # la poursuite de l'intégration des archives antérieures à 2018 !!!2.2 -- Relance des actions non engagées en 2019 # la réactivation du Comité de pilotage du [[Chapitre Français]] au cours du premier trimestre 2020 [>img(150px,auto)[iCSF/Cloud2020.jpg]] # une utilisation plus forte du compte Twitter # la préparation d'une formation CCSK en France # l'organisation d'un événement "Sécurité du Cloud" !!!2.3 -- Nouvelles actions [>img(150px,auto)[iCSA/CircleCSA.png]]Après quelques tests complémentaires, un portail va être ouvert pour les membres du [[Chapitre Français]] et géré directement par la Cloud Security Alliance. * ce portail est une plateforme de partage collaborative avec liste de diffusion, possibilité de partage de documents, ... * nous serons parmi l'un des premiers Chapitres à l'utiliser avant son déploiement par la CSA à tous les autres * plus d'informations seront communiquées pendant le premier trismestre 2020 !!!2.4 -- Dates à retenir 2 dates sont déjà à inscrire sur votre agenda [>img(150px,auto)[iCSF/Cloud2020.jpg]] # ''18 et 19 mars 2020'' : "Forum Securité@Cloud" dans le cadre de la "Cloud Computing World Expo" à Paris, Porte de Versailles+++*[»]> <<tiddler [[Forum Sécurité@Cloud]]>>=== # ''17 et 18 novembre 2020'' : "Cloud & Cyber Security Paris" à Paris, Porte de Versailles Quant au "CSA EMEA Congress", il devrait avoir lieu soit en octobre, soit en novembre 2020, à Bruxelles ou à Berlin. !!3 -- Contacts Si vous souhaitez participer activement au [[Chapitre Français]], ou simplement découvrir les travaux de la [[Cloud Security Alliance]], contactez nous * par [[email|Contact]] * via [[LinkedIn|https://www.linkedin.com/groups/3758242]] * via l'espace [[Slack]] [img[iCSF/flag_fr.png]]^^oc^^[img(50%,1px)[iCSF/BluePixel.gif]]
!"//​Securing data and maintaining compliance in ServiceNow//"
[>img(150px,auto)[iCSA/K1RBS.jpg]]^^Article publié le 27 janvier sur le blog de la CSA, et après l'avoir été 6 jours auparavant sur le site de la société CipherCloud.
Même s'il adresse un sujet intéressant, cet article à pour principal objectif de faire participer le lecteur à un Webcast (bis)
&rArr; Lire [[l'article|https://cloudsecurityalliance.org/blog/2020/01/27/securing-data-and-maintaining-compliance-in-servicenow/]] sur le blog de la Cloud Security Alliance ou [[l'original|https://www.ciphercloud.com/securing-data-and-maintaining-compliance-in-servicenow/]]^^

[img(25%,1px)[iCSF/BluePixel.gif]]
!"//​Prevent security misconfigurations in a multi-cloud environment//"
[>img(150px,auto)[iCSA/K1KBP.jpg]]^^Article publié le 20 janvier sur le blog de la CSA, et après l'avoir été 7 jours auparavant sur le site de la société CipherCloud.
Même s'il adresse un sujet intéressant, cet article à pour principal objectif de faire participer le lecteur à un Webcast.
&rArr; Lire [[l'article|https://cloudsecurityalliance.org/blog/2020/01/20/prevent-security-misconfigurations-in-a-multi-cloud-environment/]] sur le blog de la Cloud Security Alliance ou [[l'original|https://www.ciphercloud.com/prevent-security-misconfigurations-in-a-multi-cloud-environment/]]^^

[img(25%,1px)[iCSF/BluePixel.gif]]
!Actualités, Blog, Publications et Veille "Sécurité du Cloud"
<<tiddler fAll2LiTabs13end with: 201912>>
<<tiddler fAll2Tabs10 with: VeilleM","_201912>>
|!Décembre|!Sources|!Titres et Liens|!Keywords|
|>|>|>|Aucune alerte pour le moment|
|2019.12.26|//Checkpoint//|[[Kubernetes API Server Denial Of Service (CVE-2019-11253)|https://www.checkpoint.com/defense/advisories/public/2019/cpai-2019-1443.html]]|Kubernetes Vulnerability|
[img(25%,1px)[iCSF/BluePixel.gif]]
<<tiddler .ReplaceTiddlerTitle with: [[Alertes et Vulnérabilités - Décembre 2019]]>>
<<tiddler fAll2LiTabs10 with: NewsL","201912>><<tiddler .ReplaceTiddlerTitle with: [[Newsletters - Décembre 2019]]>>
<<tiddler .ReplaceTiddlerTitle with: [[Actualités - Décembre 2019]]>><<tiddler fAll2LiTabs13end with: Actu","201912>>
<<tiddler fAll2LiTabs13end with: Blog","201912>>
[img(25%,1px)[iCSF/BluePixel.gif]]
<<tiddler .ReplaceTiddlerTitle with: [[Blog - Décembre 2019]]>>
<<tiddler fAll2LiTabs13end with: Publ","201912>>
[img(25%,1px)[iCSF/BluePixel.gif]]
<<tiddler .ReplaceTiddlerTitle with: [[Publications - Décembre 2019]]>>
!1 - Les nouveautés CSA de la semaine du 23 au 29 décembre 2019 [>img[iCSF/cloud-security-alliance-fr.png]]
* Actu : Appel à commentaires, document "''Compléments CCM V3.0.1 pour les spécifications sécurité de CloudOS''"+++*[»]> <<tiddler [[2019.12.12 - Appel à commentaires, document 'Compléments CCM V3.0.1 pour les spécifications sécurité de CloudOS']]>>=== 
!2 - Veille Web
La [[Veille Web|2019.12.29 - Veille Hebdomadaire - 29 décembre]] avec plus de 30 liens
* Bilan 2019 et prévisions 2020 : //Alcide//, Computer Weekly, //Productiv//, Silicon Angle
* Etudes : //Coalfire//+++*[»]>
|2019.12.26|MSSP Alert|[[Study: Midmarket Businesses Face Cloud Migration Cyber Risks|https://www.msspalert.com/cybersecurity-research/midmarket-cyber-risks/]]|Study Risks|
|2019.12.11|//Coalfire//| → [[Penetration Risk Report|https://www.coalfire.com/Resources/White-Papers/2019-Coalfire-Penetration-Risk-Report]]|Study Risks|
===, ESG+++*[»]>
|2019.12.23|ESG|![[ESG Research Report: The rise of cloud-based security analytics and operations technologies|https://www.esg-global.com/research/esg-research-report-the-rise-of-cloud-based-security-analytics-and-operations-technologies]]|Report|
=== 
* Divers : Effets des attaques contre le Cloud+++*[»]>
|2019.12.27|//Catchpoint//|![[Containing the ripple effect of cloud cyberattacks|https://www.scmagazine.com/home/opinion/executive-insight/containing-the-ripple-effect-of-cloud-cyberattacks/]]|Cyberattacks Best_Practices|
===, politique de conservation des données
|!Décembre|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2019.12.29|
|2019.12.29|//Tripwire//|![[AWS vs. Azure vs. Google - What’s the Difference from a Cloud Security Standpoint?|https://www.tripwire.com/state-of-security/security-data-protection/cloud/aws-azure-google-difference-cloud-security-standpoint/]]|AWS Azure GCP|
|2019.12.29|NBC News|[[How online 'cloud buckets' are exposing private photos and other sensitive data|https://www.nbcnews.com/tech/internet/how-online-cloud-buckets-are-exposing-private-photos-other-sensitive-n1105056]]|Data_Leaks|
|>|>|>|!2019.12.28|
|2019.12.28|Silicon Angle|[[Predictions 2020: Cloud, Kubernetes and cybersecurity will rule|https://siliconangle.com/2019/12/28/predictions-2020-cloud-kubernetes-cybersecurity-will-rule/]]|Predictions|
|2019.12.28|TechRadar Pro|[[Emerging technologies securing the cloud|https://www.techradar.com/news/emerging-technologies-securing-the-cloud]]|Misc|
|>|>|>|!2019.12.27|
|2019.12.27|Computer Weekly|[[Top 10 cloud stories of 2019|https://www.computerweekly.com/news/252475348/Top-10-cloud-stories-of-2019]]|Year_Recap|
|2019.12.27|//Catchpoint//|![[Containing the ripple effect of cloud cyberattacks|https://www.scmagazine.com/home/opinion/executive-insight/containing-the-ripple-effect-of-cloud-cyberattacks/]]|Cyberattacks Best_Practices|
|2019.12.27|//Alibaba Cloud//|[[The Open Application Model from Alibaba’s Perspective|https://medium.com/@Alibaba_Cloud/the-open-application-model-from-alibabas-perspective-2352f89ad845]]|Alibaba OAM|
|2019.12.27|//Productiv//|[[Productiv 2020 Predictions: SaaS applications in 2020|https://vmblog.com/archive/2019/12/27/productiv-2020-predictions-saas-applications-in-2020.aspx]]|Predictions|
|2019.12.27|//Whois API, Inc//|[[Mitigating Phishing Attacks on Cloud/File Storage Services through Domain Reputation API|http://www.circleid.com/posts/20191227_mitigating_phishing_cloud_file_storage_services_through_domain_rep/]]|Phishing|
|2019.12.27|Cloud.Gov|![[Security Incident Response Guide|https://cloud.gov/docs/ops/security-ir/]]|Incident_Response|
|2019.12.27|Cloud.Gov| → [[Security Incident Response checklist|https://cloud.gov/docs/ops/security-ir-checklist/]]|Incident_Response|
|2019.12.27|DZone|[[A Brief Guide to Kubernetes and Containers|https://dzone.com/articles/definitive-guide-to-kubernetes]]|Kubernetes Containers|
|>|>|>|!2019.12.26|
|2019.12.26|Les Echos[>img[iCSF/flag_fr.png]]|[[La souveraineté européenne face au Cloud Act|https://www.lesechos.fr/idees-debats/cercle/opinion-la-souverainete-europeenne-face-au-cloud-act-1159010]]|CLOUD_Act Europe|
|2019.12.26|Le Mag IT[>img[iCSF/flag_fr.png]]|[[Cloud : pourquoi adopter une politique de conservation des données|https://www.lemagit.fr/conseil/Cloud-pourquoi-adopter-une-politique-de-conservation-des-donnees]]|Data Policy|
|2019.12.26|IT World Canada|[[Videoconference system stored data in open AWS bucket, says new report|https://www.itworldcanada.com/article/videoconference-system-stored-data-in-open-aws-bucket-says-new-report/425319]]|Data_Leak|
|2019.12.26|CISO Mag|[[Securing the Hybrid Cloud Environment: A New Paradigm Using Zero Trust|https://www.cisomag.com/securing-the-hybrid-cloud-environment-a-new-paradigm-using-zero-trust/]]|Hybrid_Cloud Zero_Trust|
|2019.12.26|MSSP Alert|[[Study: Midmarket Businesses Face Cloud Migration Cyber Risks|https://www.msspalert.com/cybersecurity-research/midmarket-cyber-risks/]]|Study Risks|
|2019.12.11|//Coalfire//| → [[Penetration Risk Report|https://www.coalfire.com/Resources/White-Papers/2019-Coalfire-Penetration-Risk-Report]]|Study Risks|
|2019.12.26|SecureCloud.blog|[[Reddit Thread Answer: Azure AD - Autologon endpoint|https://securecloud.blog/2019/12/26/reddit-thread-answer-azure-ad-autologon-endpoint/]]|AzureAD|
|2019.12.26|//Checkpoint//|[[Kubernetes API Server Denial Of Service (CVE-2019-11253)|https://www.checkpoint.com/defense/advisories/public/2019/cpai-2019-1443.html]]|Kubernetes Vulnerability|
|2019.12.26|//JumpCloud//|[[Bridge Active Directory To The Cloud|https://jumpcloud.com/blog/ad-cloud-bridge/]]|Active_Directory|
|2019.12.26|//Security Intelligence//|[[Demystifying Security in an Open, Hybrid Multicloud Environment|https://securityintelligence.com/posts/demystifying-security-in-an-open-hybrid-multicloud-environment/]]|Multi_Cloud|
|>|>|>|!2019.12.25|
|2019.12.25|Cyber Security Hub|[[Public Cloud Platforms - A Honey Pot For Threat Actors - Building An Understanding Of Risk And Configuration|https://www.cshub.com/cloud/articles/public-cloud-platforms-a-honey-pot-for-threat-actors]]|Risks HoneyPot|
|>|>|>|!2019.12.24|
|2019.12.24|01 Business[>img[iCSF/flag_fr.png]]|[[Cloud de confiance en France : la recette existe|https://www.linkedin.com/pulse/cloud-de-confiance-en-france-la-recette-existe-fr%C3%A9d%C3%A9ric-simottel/]]|Sovereign_Cloud|
|2019.12.24|Reddit|[[Synoptek Issues|https://www.reddit.com/r/sysadmin/comments/ef2egh/synoptek_issues/]]|Attack Ransomware CSP|
|2019.12.27|Krebs on Security| → [[Ransomware at IT Services Provider Synoptek|https://krebsonsecurity.com/2019/12/ransomware-at-it-services-provider-synoptek/]]|Attack Ransomware CSP|
|2019.12.24|Container Journal|[[5 Common Container Mistakes to Avoid|https://containerjournal.com/topics/container-management/5-common-container-mistakes-to-avoid/]]|Containers|
|2019.12.24|CSO|[[How to use Microsoft Compliance Score to improve data protection|https://www.csoonline.com/article/3490238/how-to-use-microsoft-compliance-score-to-improve-data-protection.html]]|O365 Compliance|
|2019.12.24|//Alcide//|[[Kubernetes Security Leader Alcide Releases 2020 Predictions: Kubernetes on the Edge, Intelligent and Automated K8s Security and the Rise of Distributed Tracing|https://vmblog.com/archive/2019/12/24/kubernetes-security-leader-alcide-releases-2020-predictions-kubernetes-on-the-edge-intelligent-and-automated-k8s-security-and-the-rise-of-distributed-tracing.aspx]]|Predictions|
|2019.12.24|//Alibaba Cloud//|[[From Confused to Proficient: Kubernetes Authentication and Scheduling|https://medium.com/@Alibaba_Cloud/from-confused-to-proficient-kubernetes-authentication-and-scheduling-39a058af5103]]|Kubernetes Authentication|
|2019.12.24|//Alibaba Cloud//|[[From Confused to Proficient: Analysis of Failure to Delete a Kubernetes Cluster Namespace|https://medium.com/@Alibaba_Cloud/from-confused-to-proficient-analysis-of-failure-to-delete-a-kubernetes-cluster-namespace-62c31bc1a2ac]]|Kubernetes|
|2019.12.24|DZone|[[6 Enterprise Kubernetes Takeaways from KubeCon San Diego|https://dzone.com/articles/6-enterprise-kubernetes-takeaways-from-kubecon-san]]|Kubernetes Conference|
|>|>|>|!2019.12.23|
|2019.12.23|Les Echos[>img[iCSF/flag_fr.png]]|[[Pour Tencent, l'Europe a déjà perdu la bataille du cloud|https://www.lesechos.fr/monde/europe/pour-tencent-leurope-a-deja-perdu-la-bataille-du-cloud-1158624]]|Sovereign_Cloud Europe|
|2019.12.23|Gartner|![[Say Hello to SASE (Secure Access Service Edge)|https://blogs.gartner.com/andrew-lerner/2019/12/23/say-hello-sase-secure-access-service-edge/]]|SASE|
|2019.12.23|Container Journal|[[OpenShift, Kubernetes and Docker: A Quick Comparison|https://containerjournal.com/topics/container-ecosystems/openshift-kubernetes-and-docker-a-quick-comparison/]]|Docker Kubernetes|
|2019.12.23|Avishay Bar|![[caponeme - Repository demonstrating the Capital One breach on your AWS account|https://github.com/avishayil/caponeme]]|Tools CapitalOne Demonstration|
|2019.12.23|//JumpCloud//|[[Active Directory for Cloud-Forward Sysadmins|https://jumpcloud.com/blog/active-directory-cloud-forward-sysadmins/]]|AzureAD|
|2019.12.23|//JumpCloud//|[[Sync Active Directory With AWS|https://jumpcloud.com/blog/sync-active-directory-with-aws/]]|AWS AzureAD|
|2019.12.23|//Data Insider//|[[What is a Cloud Access Security Broker?|https://digitalguardian.com/blog/what-cloud-access-security-broker]]|CASB|
|2019.12.23|//Security Intelligence//|[[Slowing Data Security Tool Sprawl in a Hybrid Multicloud World|https://securityintelligence.com/posts/slowing-data-security-tool-sprawl-in-a-hybrid-multicloud-world/]]|Hybrid_Cloud|
|2019.12.23|Transatel [>img[iCSF/flag_fr.png]]|[[Le cloud : enfer ou opportunité pour la sécurité ?|[https://www.linkedin.com/pulse/le-cloud-enfer-ou-opportunit%C3%A9-pour-la-s%C3%A9curit%C3%A9-valerian-perret/]]|Misc|
|2019.12.23|ESG|![[ESG Research Report: The rise of cloud-based security analytics and operations technologies|https://www.esg-global.com/research/esg-research-report-the-rise-of-cloud-based-security-analytics-and-operations-technologies]]|Report|
!1 - Les nouveautés CSA de la semaine du 16 au 22 décembre 2019 [>img[iCSF/cloud-security-alliance-fr.png]]
* Actu : Fin du projet ''European Security Certification Framework (EU-SEC)''+++*[»]> <<tiddler [[2019.12.19 - Fin du projet European Security Certification Framework (EU-SEC)]]>>=== 
* Actu : Appel à commentaires, ''derniers jours'' pour répondre, document "''Cloud Incident Response Framework - A Quick Guide''"+++*[»]> <<tiddler [[2019.11.28 - Appel à commentaires, document 'Cloud Incident Response Framework - A Quick Guide']]>>=== 
* Actu : Appel à commentaires, ''derniers jours'' pour répondre, document "''Hybrid Cloud and Its Associated Risks''"+++*[»]> <<tiddler [[2019.11.28 - Appel à commentaires, document 'Hybrid Cloud and Its Associated Risks']]>>=== 
* Actu : Appel à commentaires, document "''Compléments CCM V3.0.1 pour les spécifications sécurité de CloudOS'''"+++*[»]> <<tiddler [[2019.12.12 - Appel à commentaires, document 'Compléments CCM V3.0.1 pour les spécifications sécurité de CloudOS']]>>=== 
!2 - Veille Web
La [[Veille Web|2019.12.22 - Veille Hebdomadaire - 22 décembre]] avec plus de 60 liens
* Attaques et Vulnérabilités : 0-day Dropbox, élévation de privilège dans AWS, //Cloud Shell// contre AWS
* Bilan 2019 et prévisions 2020 : BetaNews, CloudFoundry, Container Journal, DevOps.com, DZone, Kubernetes, Rancher, Solutions Review
* Rapports et Sondages : Precise Security, SANS
* Info ou Intox : début 2018, Google aurait envisagé de se désengager du Cloud s'il n'était pas numéro 2 sur le marché en 2023+++*[»]>
|2019.12.17|The Information|[[Google Brass Set 2023 as Deadline to Beat Amazon, Microsoft in Cloud|https://www.theinformation.com/articles/google-brass-set-2023-as-deadline-to-beat-amazon-microsoft-in-cloud]]|GCP Strategy|
|2019.12.17|Silicon Angle| → [[Google denies report it considered quitting cloud computing business|https://siliconangle.com/2019/12/17/google-denies-report-considered-quitting-cloud-computing-business/]]|GCP Strategy|
|2019.12.18|CRN| → [[Google considered killing its cloud: report|https://www.crn.com.au/news/google-considered-killing-its-cloud-report-535749]]|GCP Strategy|
|2019.12.17|CRN| → [[Google’s Five-Year Plan For GCP Has Funding Strings Attached: Report|https://www.crn.com/news/cloud/google-reportedly-set-ambitious-goal-and-possible-deadline-for-gcp]]|GCP Strategy|
|2019.12.18|Computer Weekly| → [[Google declares report on alleged public cloud exit discussions 'inaccurate'|https://www.computerweekly.com/news/252475694/Google-declares-report-on-alleged-public-cloud-exit-discussions-inaccurate]]|GCP Strategy|
=== 
* Divers : l'approche BeyondProd de Google pour les microservices+++*[»]>
|2019.12.17|//Google//|![[BeyondProd: A new approach to cloud-native security|https://cloud.google.com/security/beyondprod/]]|Cloud_Native|
|2019.12.18|Silicon.fr[>img[iCSF/flag_fr.png]]| → [[BeyondProd : l’approche de Google pour sécuriser les microservices|https://www.silicon.fr/beyondprod-google-microservices-330083.html]]|Cloud_Native|
|2019.12.19|//Duo Security//| → [[BeyondProd Lays Out Security Principles for Cloud-Native Applications|https://duo.com/decipher/beyondprod-lays-out-security-principles-for-cloud-native-applications]]|Cloud_Native|
===, Containers, Docker
|!Décembre|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2019.12.22|
|2019.12.22|B2C|[[Cloud-Native Environments: A Challenge for Traditional Cyber Security Practices|https://www.business2community.com/cybersecurity/cloud-native-environments-a-challenge-for-traditional-cyber-security-practices-02269834]]|Cloud_Native|
|>|>|>|!2019.12.21|
|2019.12.21|BFM Business[>img[iCSF/flag_fr.png]]|[[Comment bâtir un cloud souverain de confiance ?|https://bfmbusiness.bfmtv.com/mediaplayer/video/comment-batir-un-cloud-souverain-de-confiance-2112-1210593.html]] (vidéo)|Sovereign_Cloud|
|>|>|>|!2019.12.20|
|2019.12.20|SANS|[[Workforce Automation and the Cloud: A Dichotomy|https://www.sans.org/cyber-security-intelligence/2019/12/20/workforce-automation-and-the-cloud-a-dichotomy]] ([[sondage après inscription|https://www.sans.org/reading-room/whitepapers/analyst/workforce-transformation-challenges-risks-opportunities-39340]])|Survey|
|2019.12.20|SecureCloud.blog|[[NodeJS Logging integration with Azure Log Analytics/Sentinel|https://securecloud.blog/2019/12/20/nodejs-logging-integration-with-azure-log-analytics-sentinel/]]|Azure Logging|
|2019.12.20|Healthcare IT News|[[Cybersecurity poses big challenges, but new cloud approaches hold promise|https://www.healthcareitnews.com/news/cybersecurity-poses-big-challenges-new-cloud-approaches-hold-promise]]|Challenges|
|2019.12.20|//Google Cloud//|[[Kubernetes Podcast in 2019: year-end recap|https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-podcast-in-2019-year-end-recap]]|Kubernetes Year_Recap|
|2019.12.20|//Trendmicro//|![[Why Running a Privileged Container in Docker Is a Bad Idea|https://blog.trendmicro.com/trendlabs-security-intelligence/why-running-a-privileged-container-in-docker-is-a-bad-idea/]]|Docker Containers Privileges|
|2019.12.20|//Checkpoint//|[[8 Best Practices for Multi-Cloud Security|https://blog.checkpoint.com/2019/12/20/8-best-practices-for-multi-cloud-security/]]|Multi_Cloud Best_Practices|
|2019.12.20|//Summit Route//|![[re:Invent 2019 Security Review|https://summitroute.com/blog/2019/12/20/reinvent_2019_security_review/]]|AWS Conference|
|2019.12.20|ID Access Management|[[How to remove inactive users automatically via Access Reviews?|https://identityaccess.management/2019/12/20/how-to-remove-inactive-users-automatically-via-access-reviews/]]|O365 Access_Review|
|2019.12.20|//GitLab//|[[Introducing Token-Hunter|https://about.gitlab.com/blog/2019/12/20/introducing-token-hunter/]]|Tools|
|2019.12.20|//Cloud Passage//|[[Solving Public Cloud Security Challenges with Automation|https://www.cloudpassage.com/blog/solving-public-cloud-security-challenges-with-automation/]]|Public_Cloud|
|>|>|>|!2019.12.19|
|2019.12.19|ENISA|Call 02/19 - Cloud Services: [[Call for expression of interest for an ad hoc Working Group|https://www.enisa.europa.eu/news/enisa-news/call-for-expression-of-interest-for-an-ad-hoc-working-group]] ([[Terms of Reference|https://www.enisa.europa.eu/topics/standards/adhoc_wg_calls/ahWG02/tor_ahwg02_cloud]])|ENISA|
|2019.12.19|BetaNews|[[Cloud predictions for 2020|https://betanews.com/2019/12/19/cloud-predictions-for-2020/]]|Predictions|
|2019.12.19|Solutions Review|[[20 Experts Share Predictions for Cloud in 2020 and Beyond|https://solutionsreview.com/cloud-platforms/20-experts-share-predictions-for-cloud-in-2020-and-beyond/]]|Predictions|
|2019.12.19|Solutions Review|[[11 Experts Share Predictions and Advice for Cloud Security in 2020|https://solutionsreview.com/cloud-platforms/11-experts-share-predictions-and-advice-for-cloud-security-in-2020/]]|Predictions|
|2019.12.19|Container Journal|[[Going to the Cloud? Go Containers|https://containerjournal.com/topics/container-ecosystems/going-to-the-cloud-go-containers/]]|Containers|
|2019.12.19|Sensors Tech Forum|[[On-Premise vs Cloud-to-Cloud Backup: the Best Solution for Your SaaS|https://sensorstechforum.com/on-premise-vs-cloud-cloud-backup/]]|SaaS Backup|
|2019.12.19|//Tripwire//|[[Top Cloud Security Resources: Certifications, Events and Social Media|https://www.tripwire.com/state-of-security/security-data-protection/cloud/top-cloud-security-resources-certifications-events-social-media/]]|Misc|
|2019.12.19|//Rancher//|[[Rancher Security: 2019 Recap|https://rancher.com/blog/2019/rancher-security-2019-recap/]]|Year_Recap|
|2019.12.19|//StackRox//|[[As Kubernetes Matures, Security Evolves into Safety|https://vmblog.com/archive/2019/12/19/stackrox-2020-predictions-as-kubernetes-matures-security-evolves-into-safety.aspx]]|Predictions|
|2019.12.19|//Caylent//|[[The Pros and Cons of Running Production Databases as Containers|https://caylent.com/the-pros-and-cons-of-running-production-databases-as-containers]]|Containers Databases|
|2019.12.19|//WatchGuard//|[[MSP Cloud Presence Concerns|https://www.msspalert.com/cybersecurity-guests/msp-cloud-presence-concerns/]]|MSSP|
|2019.12.19|//Apcela//|[[Prime Real Estate in the Cloud|http://www.circleid.com/posts/20191219_prime_real_estate_in_the_cloud/]]|Misc|
|2019.12.19|//Bishopfox//|![[Investigating PrivEsc Methods in AWS|https://know.bishopfox.com/research/privilege-escalation-in-aws]]|AWS Vulnerabilities|
|2019.12.19|//Bishopfox//| → [[Escalator to the Cloud: 5 Privesc Attack Vectors in AWS|https://know.bishopfox.com/blog/5-privesc-attack-vectors-in-aws]]|AWS Vulnerabilities|
|2019.12.19|//Cloud Foundry//|[[Cloud Foundry Foundation 2020 Predictions: Cloud Complexity Urges Developers to Seek Simplification|https://vmblog.com/archive/2019/12/19/cloud-foundry-foundation-2020-predictions-cloud-complexity-urges-developers-to-seek-simplification.aspx]]|Predictions|
|>|>|>|!2019.12.18|
|2019.12.18|Infosecurity Mag|[[Year in Review: Cloud Security|https://www.infosecurity-magazine.com/blogs/year-review-cloud-security/]]|Year_Recap|
|2019.12.18|Infosecurity Mag|[[Data Leak Exposes Thousands of US Defense Contractor Staff|https://www.infosecurity-magazine.com/news/cloud-data-leak-thousands/]]|AWS S3 Data_Leak|
|2019.12.18|//Microsoft//|[[Data governance and retention in your Microsoft 365 tenant - a secure and highly capable solution|https://www.microsoft.com/security/blog/2019/12/18/data-governance-retention-microsoft-365-tenant-secure-highly-capable-solution/]]|Azure Tenant|
|2019.12.18|//Security Intelligence//|[[Cloud Security in 2020 Starts With Protecting Data Wherever It Resides|https://securityintelligence.com/posts/cloud-security-in-2020-starts-with-protecting-data-wherever-it-resides/]]|Predictions|
|2019.12.18|//Threatpost//|[[Why Cloud, Collaboration Breed Insider Threats|https://threatpost.com/why-cloud-collaboration-insider-threats/151272/]]|Insider_Threats|
|2019.12.18|//Sysdig//|[[How to Monitor Kubernetes API Server|https://sysdig.com/blog/monitor-kubernetes-api-server/]]|Kubernetes|
|2019.12.18|//NeuVector//|[[How Serverless Functions Work - Using AWS Lambda as an Example|https://neuvector.com/cloud-security/how-aws-lambda-serverless-works/]]|Serverless|
|2019.12.18|//Swimlane//|[[How to investigate alerts in Microsoft Azure with SOAR|https://swimlane.com/blog/investigate-alerts-in-microsoft-azure/]]|Azure Alerting|
|2019.12.18|//Precise Security//|[[MS Office Represents 73% Of The Most Commonly Exploited Applications Worldwide|https://www.precisesecurity.com/articles/ms-office-represents-73-of-the-most-commonly-exploited-applications-worldwide/]]|Report|
|2019.12.18|//Decoder.Cloud//|![[From dropbox(updater) to NT AUTHORITY\SYSTEM|https://decoder.cloud/2019/12/18/from-dropboxupdater-to-nt-authoritysystem/]]|Dropbox Vulnerabilities|
|2019.12.21|Bleeping Computer| → [[Dropbox Zero-Day Vulnerability Gets Temporary Fix|https://www.bleepingcomputer.com/news/security/dropbox-zero-day-vulnerability-gets-temporary-fix/]]|Dropbox Vulnerability|
|2019.12.21|GBHackers On Security| → [[Unpatched Dropbox for Windows Zero-Day Bug Let Hackers get SYSTEM Privileges|https://gbhackers.com/dropbox-windows/]]|Dropbox Vulnerability|
|2019.12.18|//Blackblaze//|[[Backing Up the Death Star: How Cloud Storage Explains the Rise of Skywalker|https://www.backblaze.com/blog/backing-up-the-death-star-how-cloud-storage-explains-the-rise-of-skywalker/]]|Fun|
|2019.12.18|//Sentinel One//|[[Ransomware as a Service - What are Cryptonite, Recoil and Ghostly Locker?|https://www.sentinelone.com/blog/ransomware-as-a-service-what-are-cryptonite-recoil-and-ghostly-locker/]]|Ransomware|
|2019.12.18|Container Journal|[[Google Shares Best Practices for Securing Microservices|https://containerjournal.com/topics/container-security/google-shares-best-practices-for-securing-microservices/]]|Microservices Best_Practices|
|>|>|>|!2019.12.17|
|2019.12.17|Gov.UK|![[Managing technical lock-in in the cloud|https://www.gov.uk/guidance/managing-technical-lock-in-in-the-cloud]]|Guidance|
|2019.12.20|UK Authority| → [[GDS publishes guidance on avoiding cloud lock-in|https://www.ukauthority.com/articles/gds-publishes-guidance-on-avoiding-cloud-lock-in/]]|Guidance|
|2019.12.17|SANS|![[How to Build a Successful Cloud Security Program|https://www.sans.org/cyber-security-intelligence/2019/12/17/how-to-build-a-successful-cloud-security-program]]|Governance|
|2019.12.17|SANS|![[How to Leverage a CASB for Your AWS Environment|https://www.sans.org/reading-room/whitepapers/analyst/leverage-casb-aws-environment-39345]]|CASB AWS|
|2019.12.17|The Information|[[Google Brass Set 2023 as Deadline to Beat Amazon, Microsoft in Cloud|https://www.theinformation.com/articles/google-brass-set-2023-as-deadline-to-beat-amazon-microsoft-in-cloud]]|GCP Strategy|
|2019.12.17|Silicon Angle| → [[Google denies report it considered quitting cloud computing business|https://siliconangle.com/2019/12/17/google-denies-report-considered-quitting-cloud-computing-business/]]|GCP Strategy|
|2019.12.18|CRN| → [[Google considered killing its cloud: report|https://www.crn.com.au/news/google-considered-killing-its-cloud-report-535749]]|GCP Strategy|
|2019.12.17|CRN| → [[Google’s Five-Year Plan For GCP Has Funding Strings Attached: Report|https://www.crn.com/news/cloud/google-reportedly-set-ambitious-goal-and-possible-deadline-for-gcp]]|GCP Strategy|
|2019.12.18|Computer Weekly| → [[Google declares report on alleged public cloud exit discussions 'inaccurate'|https://www.computerweekly.com/news/252475694/Google-declares-report-on-alleged-public-cloud-exit-discussions-inaccurate]]|GCP Strategy|
|2019.12.17|IoT for All|[[Five Reasons to Upgrade to MQTT 5|https://www.iotforall.com/mqtt-iot/]]|IOT MQTT|
|2019.12.17|//Nuageo//[>img[iCSF/flag_fr.png]]|[[A la découverte du Serverless Computing|https://www.nuageo.fr/2019/12/decouverte-serverless-computing/]]|Serverless FaaS|
|2019.12.17|//Microsoft//|[[Advancing Azure Active Directory availability|https://azure.microsoft.com/en-us/blog/advancing-azure-active-directory-availability/]]|AzureAD Availability|
|2019.12.17|//Google//|![[BeyondProd: A new approach to cloud-native security|https://cloud.google.com/security/beyondprod/]]|Cloud_Native|
|2019.12.18|Silicon.fr[>img[iCSF/flag_fr.png]]| → [[BeyondProd : l’approche de Google pour sécuriser les microservices|https://www.silicon.fr/beyondprod-google-microservices-330083.html]]|Cloud_Native|
|2019.12.19|//Duo Security//| → [[BeyondProd Lays Out Security Principles for Cloud-Native Applications|https://duo.com/decipher/beyondprod-lays-out-security-principles-for-cloud-native-applications]]|Cloud_Native|
|2019.12.17|//Fortinet//|[[Seven Critical Vulnerabilities Discovered in Portainer|https://www.fortinet.com/blog/threat-research/seven-critical-vulnerabilities-portainer.html]]|Vulnerability|
|2019.12.17|//Zscaler//|[[A True SASE Solution Requires a Cloud-First Architecture|https://www.zscaler.com/blogs/corporate/true-sase-solution-requires-cloud-first-architecture]]|Network SASE|
|2019.12.17|//CloudAcademy//|[[Azure Security: Best Practices You Need to Know|https://cloudacademy.com/blog/azure-security-best-practices-you-need-to-know/]]|AWS Best_Practices|
|2019.12.17|//Forescout//|[[Forescout Research Labs Discovers Multiple Vulnerabilities in DTEN Conferencing and Collaboration Systems|https://www.forescout.com/company/blog/dten-vulnerability/]]|Data_Leak|
|2019.12.17|SANS|[[How to Build a Successful Cloud Security Program|https://www.sans.org/blog/how-to-build-a-successful-cloud-security-program/]]|Policy|
|>|>|>|!2019.12.16|
|2019.12.16|Silicon.fr[>img[iCSF/flag_fr.png]]|[[CLOUD Act : les hyperscalers optent pour la garantie chiffrement|https://www.silicon.fr/cloud-act-hyperscalers-chiffrement-329847.html]]|CLOUD_Act|
|2019.12.16|DZone|[[Desktop on Cloud: Productive, Cost-Effective and More Secure|https://dzone.com/articles/desktop-on-cloud-productive-cost-effective-and-mor]]|Desktop-aaS|
|2019.12.16|DevOps.com|[[The Top Six Cloud Computing Trends of 2019|https://devops.com/the-top-six-cloud-computing-trends-of-2019/]]|Year_Recap|
|2019.12.16|Bleeping Computer|[[Over 435K Security Certs Can Be Compromised With Less Than $3,000|https://www.bleepingcomputer.com/news/security/over-435k-security-certs-can-be-compromised-with-less-than-3-000/]]|Certificates|
|2019.12.16|Container Journal|[[Predictions 2020: The Killer App for Edge Computing in 2020 will be Kubernetes|https://containerjournal.com/topics/container-ecosystems/predictions-2020-the-killer-app-for-edge-computing-in-2020-will-be-kubernetes/]]|Kubernetes|
|2019.12.16|DZone|[[2020 Cloud and Containers Predictions|https://dzone.com/articles/2020-cloud-and-containers-predictions]]|Predictions|
|2019.12.16|Bleeping Computer|[[Google to Force OAuth in G Suite to Increase Security|https://www.bleepingcomputer.com/news/security/google-to-force-oauth-in-g-suite-to-increase-security/]]|GCP OAuth|
|2019.12.16|GCN|[[MITRE updates ATT&CK for the cloud|https://gcn.com/articles/2019/12/16/mitre-attack-cloud.aspx]]|MITRE_ATTACK|
|2019.12.16|//Offensi.com//|![[4 Google Cloud Shell bugs explained|https://offensi.com/2019/12/16/4-google-cloud-shell-bugs-explained-introduction/]] - bug [[#1|https://offensi.com/2019/12/16/4-google-cloud-shell-bugs-explained-bug-1/]], [[#2|https://offensi.com/2019/12/16/4-google-cloud-shell-bugs-explained-bug-2/]], [[#3|https://offensi.com/2019/12/16/4-google-cloud-shell-bugs-explained-bug-3/]], [[#4|https://offensi.com/2019/12/16/4-google-cloud-shell-bugs-explained-bug-4/]]|GCP Vulnerabilities|
|2019.12.16|//Google Cloud//|[[Enabling a more secure cloud with our partners|https://cloud.google.com/blog/products/identity-security/making-your-cloud-more-secure-through-google-cloud-partners]]|GCP|
|2019.12.16|//Google Cloud//|[[Turning off less secure app access to G Suite accounts|https://gsuiteupdates.googleblog.com/2019/12/less-secure-apps-oauth-google-username-password-incorrect.html]]|GCP OAuth|
|2019.12.17|//Duo Security//| → [[Google to Restrict App Access to G Suite Accounts|https://duo.com/decipher/google-to-restrict-app-access-to-g-suite-accounts]]|GCP OAuth|
|2019.12.16|//CompareTheCloud|//|[[Cloud vs on-premise: striking a balance on security|https://www.comparethecloud.net/articles/cloud/cloud-vs-on-premise-striking-a-balance-on-security/]]|Misc|
|2019.12.16|//CompareTheCloud|//|[[Taking the fog out of cloud security|https://www.comparethecloud.net/articles/taking-the-fog-out-of-cloud-security/]]|Misc|
|2019.12.16|//AppSecCo//|[[New Security Training - Attack and Defence in the AWS Cloud|https://blog.appsecco.com/new-security-training-attack-and-defence-in-the-aws-cloud-ef67f1221d0a]]|AWS Training|
!"//European Cloud Security Project Leaves Rich Legacy of Materials for Cloud Stakeholders//"
<<<
[>img(200px,auto)[iCSF/EUSEC.jpg]]//CSA contributions led to development of multi-party recognition framework for cloud security certifications, continuous auditing-based certification, and Privacy Code of Conduct
Seattle — Dec. 19, 2019 - The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today announced the European Security Certification Framework (EU-SEC) project has concluded. During the course of its three-year participation, CSA contributed to numerous initiatives to benefit cloud stakeholders, among them a multi-party recognition framework for cloud security certifications that has brought clarity to the compliance process, continuous audit-based certification that offers increased trust in the assurance process, and a Privacy Code of Conduct that helps cloud service providers understand GDPR readiness and demonstrate compliance.
The primary goal of EU-SEC is to improve trust in cloud services by creating a framework under which existing certification and assurance approaches can co-exist. The framework also adds an additional layer of trust, assurance and transparency by including continuous auditing-based certifications. It is targeted at cloud stakeholders wishing to improve the business value, efficiency and effectiveness of their approach to cloud security and privacy compliance. This includes auditors, cloud service providers, regulators, standard owners and cloud users.
In addition to all the work required to build the framework architecture, the project partners worked hard to produce a variety of materials to ensure the project outcomes remain at the disposal of cloud stakeholders. The resources include:
* White papers
* Videos
* Training packages
* Webinars
Jürgen Grossman, coordinator of the EU-SEC project said, "There have been many challenges over the last three years, but I am proud of the results that EU-SEC has achieved. These results have been obtained thanks to the hard work of all the partners who brought their expertise to the consortium. I’m confident the outcomes will benefit European cloud stakeholders.”

The Cloud Security Alliance would like to encourage anyone interested in benefiting from the framework to get in touch via the website.
The EU-SEC project, which will come to an end on Dec. 31, 2019, received funding from the European Union’s HORIZON Framework Program for research, technological development and demonstration under grant agreement #731845.

__About EU-SEC__
The project "European Security Certification Framework" (EU-SEC) aimed to create a European framework for certification schemes and evaluation concepts to secure cloud infrastructures. Within this framework, existing national and international certifications can co-exist. EU-SEC will improve the business value as well as the effectiveness and efficiency of existing cloud security certification schemes.//
<<<
__Liens :__
* Annonce :  → ''[[CloudSecurityAlliance.fr/go/jcja/|https://cloudsecurityalliance.fr/go/jcja/]]''
[img(25%,1px)[iCSF/BluePixel.gif]]
!1 - Les nouveautés CSA de la semaine du 9 au 15 décembre 2019 [>img[iCSF/cloud-security-alliance-fr.png]]
* Actu : Appel à commentaires, document "''Cloud Incident Response Framework - A Quick Guide''"+++*[»]> <<tiddler [[2019.11.28 - Appel à commentaires, document 'Cloud Incident Response Framework - A Quick Guide']]>>=== 
* Actu : Appel à commentaires, document "''Hybrid Cloud and Its Associated Risks''"+++*[»]> <<tiddler [[2019.11.28 - Appel à commentaires, document 'Hybrid Cloud and Its Associated Risks']]>>=== 
* Actu : Appel à commentaires, document "''CloudAbuse Working Group Charter''"+++*[»]> <<tiddler [[2019.10.29 - Appel à commentaires, document 'CloudAbuse Working Group Charter']]>>=== 
* Actu : Appel à commentaires, document "''Compléments CCM V3.0.1 pour les spécifications sécurité de CloudOS'''"+++*[»]> <<tiddler [[2019.12.12 - Appel à commentaires, document 'Compléments CCM V3.0.1 pour les spécifications sécurité de CloudOS']]>>=== 
!2 - Veille Web
La [[Veille Web|2019.12.15 - Veille Hebdomadaire - 15 décembre]] avec plus de 60 liens
* Attaques et vulnérabilités : //Cloud Shell// contre Azure, phishing O365
* Rapports et Sondages : Archive360, INAP
* Bilan 2019 et prévisions 2020 : Lacework
* Podcast : la mini-série "dans le cloud en Islande, terre des data centers"
* Divers : alertes AzureAD, amélioration de la protection Office 365, méthodologie de notation des prestataires Cloud par la MSPAlliance
|!Décembre|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2019.12.15|
|2019.12.15|Marco Lancini|[[Cross Account Auditing in AWS and GCP|https://www.marcolancini.it/2019/blog-cross-account-auditing/]]|Audit AWS GCP|
|>|>|>|!2019.12.14|
|2019.12.14|DZone|[[CyberRange - The Open-Source AWS Cyber Range|https://www.kitploit.com/2019/12/cyberrange-open-source-aws-cyber-range.html]]|Exercise [[Tools|Outils]]|
|>|>|>|!2019.12.13|
|2019.12.13|CloudTweaks|[[Securing Multi-Cloud Manufacturing Systems In A Zero Trust World|https://cloudtweaks.com/2019/12/securing-multi-cloud-manufacturing-systems-in-a-zero-trust-world/]]|Zero_Trust|
|2019.12.13|DZone|[[Hazelcast Resilient to Kubernetes Zone Failures|https://dzone.com/articles/hazelcast-resilient-to-kubernetes-zone-failures]]|Kubernetes Resilience|
|2019.12.13|Lacework|![[The Biggest Cloud Breaches of 2019 and How to Avoid them for 2020|https://www.lacework.com/top-cloud-breaches-2019/]]|Data_Breaches|
|2019.12.13|//Avanan//|[[Update - HTML Attachment Attack on Office 365|https://www.avanan.com/blog/html-attachment-attack-update-office365]]|O365 Attack|
|2019.12.13|//BitDefender//|[[For Cloud-native App Security, Few Companies Have Embraced DevSecOps|https://businessinsights.bitdefender.com/for-cloud-native-app-security-companies-have-embraced-devsecops]]|SecDevOps|
|2019.12.13|//Microsoft Azure//|[[Announcing Updates to the M365 Attack Simulator|https://techcommunity.microsoft.com/t5/security-privacy-and-compliance/announcing-updates-to-the-m365-attack-simulator/ba-p/1065762]]|O365 Simulation Tools|
|>|>|>|!2019.12.12|
|2019.12.12|France Inter[>img[iCSF/flag_fr.png]]|[[Episode 4 : dans le cloud en Islande, terre des data centers|https://www.franceinter.fr/emissions/le-reportage-de-la-terre-au-carre/le-reportage-de-la-terre-au-carre-12-decembre-2019]] (4/4) ([[mp3|https://media.radiofrance-podcast.net/podcast09/20693-12.12.2019-ITEMA_22227984-0.mp3]])|Podcast|
|2019.12.12|US Government Accountability Office|GAO-20-126: [[Agencies Increased Their Use of the Federal Authorization Program, but Improved Oversight and Implementation Are Needed|https://www.gao.gov/products/GAO-20-126]] ([[pdf|https://www.gao.gov/assets/710/703193.pdf]])|Controls FedRAMP|
|2019.12.13|NextGov| → [[Audit: Cloud Use Up But Agencies Skirting FedRAMP|https://www.nextgov.com/it-modernization/2019/12/audit-cloud-use-agencies-skirting-fedramp/161886/]]|Controls FedRAMP|
|2019.12.12|DZone|[[What is the Difference Between Kubernetes and Docker Swarm|https://dzone.com/articles/what-is-the-difference-between-kubernetes-and-dock]]|Kubernetes Swarm|
|2019.12.12|TechBeacon|[[5 critical features for cloud security controls|https://techbeacon.com/security/5-critical-features-cloud-security-controls]]|Controls|
|2019.12.12|SecureCloud.blog|[[Deep Diver - Azure AD Identity Protection (IPC) Alerts|https://securecloud.blog/2019/12/12/azure-ad-identity-protection-ipc-alerts/]]|AzureAD|
|2019.12.12|Dark Reading|[[Microsoft 'Campaign Views' Offers Full Look at Office 365 Attacks|https://www.darkreading.com/threat-intelligence/microsoft-campaign-views-offers-full-look-at-office-365-attacks/d/d-id/1336561]]|O365|
|2019.12.12|GBHackers on Security|[[Most Important Challenges of Cloud Migration In Your Organization With Cyber Security Principles - Guide|https://gbhackers.com/cloud-migration/]]|Migration|
|2019.12.12|//Managed Methods//|[[Next Gen Firewall & Cloud Security: What’s The Difference?|https://managedmethods.com/blog/next-gen-firewall-cloud-security-whats-the-difference/]]|Firewalls|
|2019.12.12|//Sunguard//|[[Look before you leap: a guide to resilient hybrid cloud migration|https://www.continuitycentral.com/index.php/news/technology/4715-look-before-you-leap-a-guide-to-resilient-hybrid-cloud-migration]]|Hybrid_Cloud|
|2019.12.12|//Jumploud//|[[Rethink AD|https://jumpcloud.com/blog/rethink-ad/]]|Active_Directory|
|2019.12.12|GAO|[[Agencies Increased Their Use of the Federal Authorization Program, but Improved Oversight and Implementation Are Needed|https://www.gao.gov/products/GAO-20-126]]|FedRAMP US|
|2019.12.12|GAO| → [[Synthèse (pdf)|https://www.gao.gov/assets/710/703192.pdf]] et [[rapport complet (pdf)|https://www.gao.gov/assets/710/703193.pdf]]|FedRAMP US|
|>|>|>|!2019.12.11|
|2019.12.11|France Inter[>img[iCSF/flag_fr.png]]|[[Episode 3 : dans le cloud en Islande, terre des data centers|https://www.franceinter.fr/emissions/le-reportage-de-la-terre-au-carre/le-reportage-de-la-terre-au-carre-11-decembre-2019]] (3/4) ([[mp3|https://media.radiofrance-podcast.net/podcast09/20693-11.12.2019-ITEMA_22226935-1.mp3]])|Podcast|
|2019.12.11|Solutions Review|[[6 Key Capabilities for Cloud Managed Service Providers|https://solutionsreview.com/cloud-platforms/6-key-capabilities-for-cloud-managed-service-providers/]]|CSP|
|2019.12.11|KitPloit|[[Splunk Attack Range - A Tool That Allows You To Create Vulnerable Instrumented Local Or Cloud Environments To Simulate Attacks Against And Collect The Data Into Splunk|https://www.kitploit.com/2019/12/splunk-attack-range-tool-that-allows.html]]|Tools Exercise Splunk|
|2019.12.11|//AWS//|[[10 things security teams should focus on, according to AWS' CISO|https://www.zdnet.com/article/10-things-security-teams-should-focus-on-according-to-aws-ciso/]]|Best_Practices|
|2019.12.11|//Microsoft//|[[The quiet evolution of phishing|https://www.microsoft.com/security/blog/2019/12/11/the-quiet-evolution-of-phishing/]]|O365 Phishing Report|
|2019.12.11|//Microsoft//|[[Microsoft Office 365 to Add Reply-All Mail Storm Protection|https://www.bleepingcomputer.com/news/microsoft/microsoft-office-365-to-add-reply-all-mail-storm-protection/]]|O365|
|2019.12.11|//Google Cloud//|[[What's new in Cloud Run for Anthos|https://cloud.google.com/blog/products/serverless/new-features-in-cloud-run-for-anthos-ga]]|GCP Anthos|
|2019.12.11|//Archive360//|[[More Than Sixty Percent of Enterprise IT Executives Plan to Retire Current SaaS Applications Amid Growing Security Fears|https://www.prnewswire.com/news-releases/more-than-sixty-percent-of-enterprise-it-executives-plan-to-retire-current-saas-applications-amid-growing-security-fears-300972934.html]] ([[Rapport|https://www.archive360.com/infographic-saas-security-survey]])|Survey SaaS|
|2019.12.13|Help Net Security| → [[SaaS security fears: Is your data exposed to potential risk?|https://www.helpnetsecurity.com/2019/12/13/saas-security-fears/]]|Survey SaaS|
|2019.12.11|//INAP//|[[Survey: The Top Challenges Facing IT Departments in 2020|https://www.inap.com/blog/survey-top-challenges-it-2020/]]|Survey|
|>|>|>|!2019.12.10|
|2019.12.10|France Inter[>img[iCSF/flag_fr.png]]|[[Episode 2 : dans le cloud en Islande, terre des data centers|https://www.franceinter.fr/emissions/le-reportage-de-la-terre-au-carre/le-reportage-de-la-terre-au-carre-10-decembre-2019]] (2/4) ([[mp3|https://media.radiofrance-podcast.net/podcast09/20693-10.12.2019-ITEMA_22225846-1.mp3]])|Podcast|
|2019.12.10|MSP Alliance|![[MSPAlliance Develops Cyber Risk Rating for Cloud and Managed Service Providers|https://www.mspalliance.com/mspalliance-develops-cyber-risk-rating-for-cloud-and-managed-service-providers/]]|CyberRating|
|2019.12.10|Container Journal|[[Kubernetes 1.17 Release Arrives|https://containerjournal.com/topics/container-ecosystems/kubernetes-1-17-release-arrives/]]|Kubernetes|
|2019.12.10|Dark Reading|[[Data Leak Week: Billions of Sensitive Files Exposed Online|https://www.darkreading.com/cloud/data-leak-week-billions-of-sensitive-files-exposed-online/d/d-id/1336574]]|DataLeaks|
|2019.12.10||[[5 Ways To Monitor for an Account Takeover|https://dzone.com/articles/5-ways-to-monitor-for-an-account-takeover]]|Detection|
|2019.12.10|//Microsoft//|[[Introducing the integrated Microsoft Threat Protection solution (public preview)|https://techcommunity.microsoft.com/t5/Security-Privacy-and-Compliance/Introducing-the-integrated-Microsoft-Threat-Protection-solution/ba-p/1059225]]|O365 Protection|
|2019.12.09|ZDnet| → [[Microsoft to help Office 365 customers track entire phishing campaigns, not just lone emails|https://www.zdnet.com/article/microsoft-to-help-office-365-customers-track-entire-phishing-campaigns-not-just-lone-emails/]]|O365 Protection|
|2019.12.11|Bleeping computer| → [[Microsoft Threat Protection Released in Public Preview|https://www.bleepingcomputer.com/news/microsoft/microsoft-threat-protection-released-in-public-preview/]]|O365 Protection|
|2019.12.10|//NetSPI//|![[Azure Privilege Escalation via Cloud Shell|https://blog.netspi.com/attacking-azure-cloud-shell/]]|Azure Privilege_Escalation|
|2019.12.10|//Google Cloud//|[[Exploring container security: Performing forensics on your GKE environment|https://cloud.google.com/blog/products/containers-kubernetes/best-practices-for-performing-forensics-on-containers]]|Forensics Containers|
|2019.12.10|//Alibaba Cloud//|[[How to Build Your Own Serverless ECS Instance Monitor|https://medium.com/@Alibaba_Cloud/how-to-build-your-own-serverless-ecs-instance-monitor-d420d1408073]]|AWS Serverless|
|2019.12.10|//CipherCloud//|[[Loose Lips Sink Ships - Securing Slack with CASB+|https://www.ciphercloud.com/loose-lips-sink-ships-casb-and-slack-security/]]|Slack CASB|
|2019.12.10|//Checkpoint//|[[Instant Observability into Cloud Threats with CloudGuard IaaS and Google Cloud Packet Mirroring|https://blog.checkpoint.com/2019/12/10/cloudguard-iaas-integrates-with-google-cloud-packet-mirroring/]]|Networks|
|2019.12.10|//ThousandEyes//|[[Top 4 Monitoring Myths: Debunked|https://blog.thousandeyes.com/top-4-monitoring-myths-debunked/]]|Monitoring|
|2019.12.10|//Optiv//|[[Your Risk is Shifting to Places You Can’t See|https://www.optiv.com/blog/your-risk-shifting-places-you-cant-see]] (1/7)|NIST_SP800-190 Containers|
|>|>|>|!2019.12.09|
|2019.12.09|France Inter[>img[iCSF/flag_fr.png]]|[[Episode 1 : dans le cloud en Islande, terre des data centers|https://www.franceinter.fr/emissions/le-reportage-de-la-terre-au-carre/le-reportage-de-la-terre-au-carre-09-decembre-2019]] (1/4) ([[mp3|https://media.radiofrance-podcast.net/podcast09/10212-09.12.2019-ITEMA_22224688-1.mp3]])|Podcast|
|2019.12.09|Economie Numérique[>img[iCSF/flag_fr.png]]|[[Le "Cloud de défense" - bientôt adopté par toutes les infrastructures militaires ?|http://blog.economie-numerique.net/2019/12/09/le-cloud-de-defense-bientot-adopte-par-toutes-les-infrastructures-militaires/]]|Sovereign_Cloud|
|2019.12.09|Informatique News[>img[iCSF/flag_fr.png]]|[[IBM décroche enfin la certification HDS, Hébergeur de données de santé|https://www.informatiquenews.fr/ibm-decroche-enfin-la-certification-hds-hebergeur-de-donnees-de-sante-65538]]|Healthcare France|
|2019.12.09|Zendata[>img[iCSF/flag_fr.png]]|[[Pourquoi et comment sécuriser correctement le déploiement d'Office 365|https://zendata.ch/fr/actualite/blog/item/2742-pourquoi-et-comment-securiser-correctement-le-deploiement-doffice-365]]|O365|
|2019.12.09|Bleeping Computer|[[Microsoft Office 365 ATP Now Helps Analyze Phishing Attacks|https://www.bleepingcomputer.com/news/microsoft/microsoft-office-365-atp-now-helps-analyze-phishing-attacks/]]|O365 Phishing|
|2019.12.09|Venture Beat|[[Microsoft adds 'campaign views' phishing intel to Office 365 Advanced Threat Protection|https://venturebeat.com/2019/12/09/microsoft-adds-campaign-views-phishing-intel-to-office-365-advanced-threat-protection/]]|O365 Phishing|
|2019.12.09|Security Week|[[New Office 365 Feature Provides Detailed Information on Email Attack Campaigns|https://www.securityweek.com/new-office-365-feature-provides-detailed-information-email-attack-campaigns]]|O365 Phishing|
|2019.12.09|CISO Mag|[[Buer, a New Loader Discovered in Several Malware Campaigns|https://www.cisomag.com/buer-loader-a-rising-superstar-of-the-dark-web/]]|Attacks Malware Docker|
|2019.12.09|TechBeacon|[[Data security and the cloud: 3 things your team needs to know|https://techbeacon.com/security/data-security-cloud-3-things-your-team-needs-know]]|Data_Protection|
|2019.12.09|TechCrunch|[[Over 750,000 applications for US birth certificate copies exposed online|https://techcrunch.com/2019/12/09/birth-certificate-applications-exposed/]]|DataLeaks AWS|
|2019.12.09|//PhishLabs//|[[Phishing Campaign Uses Malicious Office 365 App|https://info.phishlabs.com/blog/office-365-phishing-uses-malicious-app-persist-password-reset]]|O365 Attacks|
|2019.12.09|GBHackers on Security| → [[Microsoft Office 365 New Campaign Views to help Customers Tracking Attacks Targeting Organization and its Users|https://gbhackers.com/microsoft-office-365-campaign-views/]]|O365 Attacks|
|2019.12.10|Bleeping Computer| → [[Phishing Attack Hijacks Office 365 Accounts Using OAuth Apps|https://www.bleepingcomputer.com/news/security/phishing-attack-hijacks-office-365-accounts-using-oauth-apps/]]|O365|
|2020.01.09|Silicon Angle| → [[Office 365 hackers use malicious app to gain access to user accounts|https://siliconangle.com/2020/01/09/office-365-hackers-use-side-loaded-malicious-app-gain-access-user-accounts/]]|O365 Attacks|
|2019.12.09|//Threatpost//|[[GE, Dunkin', Forever 21 Caught Up in Broad Internal Document Leak|https://threatpost.com/ge-dunkin-forever21-internal-doc-leak/150920/]]|Data_Leaks|
|2019.12.09|//StackRox//|[[What's New in Kubernetes 1.17: A Deeper Look at New Features|https://www.stackrox.com/post/2019/12/whats-new-in-kubernetes-1.17-a-deeper-look-at-new-features/]]|Kubernetes|
|2019.12.09|//FireEye//|[[Want a Secure Cloud? Open Your Eyes First|https://www.fireeye.com/blog/executive-perspective/2019/12/want-a-secure-cloud-open-your-eyes-first.html]]|Risks|
|2019.12.09|//HPE//|[[Security Strategies for Hybrid IT, Hybrid Cloud and Multicloud Environments|https://www.cloudtp.com/doppler/security-strategies-for-hybrid-it-hybrid-cloud-and-multicloud-environments/]]|Hybrid_Cloud|
|2019.12.09|//HPE//|[[The Hidden Opportunity of Security in the Public Cloud|https://www.cloudtp.com/doppler/the-hidden-opportunity-of-security-in-the-public-cloud/]]|Public_Cloud|
!CCM V3.0.1 addendum to CSA's research artifact 'Cloud OS Security Specification'
[>img(100px,auto)[iCSA/CSAdoc.png]]La date limite pour transmettre les commentaires est le 11 janvier 2020.
<<<
//The Cloud Security Alliance (CSA) would like to invite you to review and comment on the CCM V3.0.1 addendum to CSA's research artifact "''Cloud OS Security Specification''".
It aims to help organizations adhering to the Cloud OS Security Specification to also meet CCM requirements.
This is achieved by identifying compliance gaps in the Cloud OS Security Specification document in relation to the CCM.//
<<<
* Date limite pour les commentaires : le 11 janvier 2020
* Téléchargement (après inscription) → ''[[CloudSecurityAlliance.fr/go/jccp|https://cloudsecurityalliance.fr/go/jccp/]]''
!"//The STAR Certification Journey//"
[>img(150px,auto)[iCSA/CSAsecUpd.jpg]]Podcast de la série "[[CSA Security Update]]" publié le 2 mars 2020 — Invité : Willibert Fabritius; Global Head of Information Security and Business Continuity, BSI Group
<<<
//The Security Trust Assurance and Risk (STAR) Program encompasses key principles of transparency, rigorous auditing, and harmonization of standards. Companies who use STAR indicate best practices and validate the security posture of their cloud offerings.
The STAR registry documents the security and privacy controls provided by popular cloud computing offerings. This publicly accessible registry allows cloud customers to assess their security providers in order to make the best procurement decisions.
Listen as we interview Willibert Fabritius; Global Head of Information Security and Business Continuity of BSI Group and take the journey with us down the road to Level 2 CSA STAR Certification including use cases on implementation and auditing best practices.//
<<<
__Liens :__
* Annonce : https://www.buzzsprout.com/303731/2265872-the-star-certification-journey-guest-willibert-fabritius-global-head-of-information-security-and-business-continuity-bsi-group
* Podcast : https://www.buzzsprout.com/303731/2265872-the-star-certification-journey-guest-willibert-fabritius-global-head-of-information-security-and-business-continuity-bsi-group.mp3
!1 - Les nouveautés CSA de la semaine du 2 au 8 décembre 2019 [>img[iCSF/cloud-security-alliance-fr.png]]
* Publication : ''Recommandations Cloud'' pour les entités gouvernementales danoises+++*[»]> <<tiddler [[2019.12.07 - Publication : Recommandations Cloud pour les entités gouvernementales danoises]]>> === 
* Actu : Nouvelle certification ''Cloud Auditing Knowledge'' (''CCAK'')+++*[»]> <<tiddler [[2019.12.04 - Nouvelle certification 'Cloud Auditing Knowledge (CCAK)']]>> === 
* Actu : Appel à commentaires, document "''Cloud Incident Response Framework - A Quick Guide''"+++*[»]> <<tiddler [[2019.11.28 - Appel à commentaires, document 'Cloud Incident Response Framework - A Quick Guide']]>>=== 
* Actu : Appel à commentaires, document "''Hybrid Cloud and Its Associated Risks''"+++*[»]> <<tiddler [[2019.11.28 - Appel à commentaires, document 'Hybrid Cloud and Its Associated Risks']]>>=== 
* Actu : Appel à commentaires, document "''CloudAbuse Working Group Charter''"+++*[»]> <<tiddler [[2019.10.29 - Appel à commentaires, document 'CloudAbuse Working Group Charter']]>>=== 
!2 - Veille Web
La [[Veille Web|2019.12.08 - Veille Hebdomadaire - 8 décembre]] avec plus de 60 liens
* À savoir : ''BlackDirect'' (//Microsoft and Azure Account Takeover//)+++*[»]>
|2019.12.02|//CyberArk//|[[BlackDirect: Microsoft Azure Account Takeover|https://www.cyberark.com/threat-research-blog/blackdirect-microsoft-azure-account-takeover/]]|Azure OAuth|
|2019.12.02|//CyberArk//| → Site Web [[BlackDirect|https://black.direct/]]|Azure OAuth|
|2019.12.02|//Threatpost//| → [[Microsoft OAuth Flaw Opens Azure Accounts to Takeover|https://threatpost.com/microsoft-oauth-flaw-azure-takeover/150737/]]|Azure OAuth|
|2019.12.05|CISO Mag| → [[Security Flaw in Microsoft Azure Lets Hackers Control Azure Accounts|https://www.cisomag.com/security-flaw-in-microsoft-azure-lets-hackers-control-azure-accounts/]]|Azure OAuth|
=== 
* Incidents : encore un prestataire victime de rançongiciel (CyrusOne), Mixcloud
* Annonces : ''AWS IAM Access Analyzer for S3'', Amazon Detective et AWS Nitro Enclaves, premier visa ANSSI ''SecNumCloud'' attribué à ''3Ds Outscale''
* Certification : Document de l'ENISA sur les certifications Cloud, en lien avec le groupe de travail ''CSPCERT''+++*[»]>
|2019.12.02|ENISA|![[Cybersecurity certification: lifting the EU into the cloud|https://www.enisa.europa.eu/news/enisa-news/cybersecurity-certification-lifting-the-eu-into-the-cloud]]|Certification|
|2019.12.02|ENISA| → [[CSPCERT WG - Recommendations for the implementation of the CSP Certification scheme|https://drive.google.com/file/d/1J2NJt-mk2iF_ewhPNnhTywpo0zOVcY8J/view]]|Certification|
=== 
* Divers : sécurité d'AzureAD, groupes O365
|!Décembre|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2019.12.08|
|2019.12.08|//Tripwire//|[[Moving to the Cloud: Motivations Behind the Migration|https://www.tripwire.com/state-of-security/security-data-protection/cloud/motivations-behind-migration-cloud/]]|Misc|
|2019.12.08|ID Access Management|[[How to apply access review on directory roles in Azure? - Part 2|https://identityaccess.management/2019/12/08/how-to-apply-access-review-on-enterprise-applications-in-azure-part-2/]]|Azure Access_Review|
|>|>|>|!2019.12.07|
|2019.12.07|ID Access Management|[[How to apply access review on directory roles in Azure? - Part 1|https://identityaccess.management/2019/12/07/how-to-apply-efficient-access-review-on-directory-roles-in-azure-part-1/]]|Azure Access_Review|
|>|>|>|!2019.12.06|
|2019.12.06|Maarten Goet|[[Azure Sentinel: advanced multistage attack detection - real machine learning for the real world|https://medium.com/wortell/advanced-multistage-attack-detection-real-machine-learning-for-the-real-world-2d9548276ea1]]|Azure_Sentinel|
|2019.12.06|ComputerWeekly|[[Security Think Tank: Is data more or less secure in the cloud?|https://www.computerweekly.com/opinion/Security-Think-Tank-Is-data-more-or-less-secure-in-the-cloud]]|Misconfigurations Controls|
|2019.12.06|DZone|[[10 Things You Should Expect From a Container Registry|https://dzone.com/articles/10-things-you-should-expect-from-a-container-regis]]|Container_Registry|
|2019.12.06|//PaloAlto Networks//|[[How Cloud Native Security Platforms Can Rescue Cloud Native|https://blog.paloaltonetworks.com/2019/12/cloud-native/]]|Cloud_Native|
|2019.12.06|Infoworld|[[3 cloud security ‘hacks’ to consider today|https://www.infoworld.com/article/3488500/3-cloud-security-hacks-to-consider-today.html]]|Risks|
|>|>|>|!2019.12.05|
|2019.12.05|Nino Crudele|![[Scan all public IP in Microsoft Azure using Azure CLI and Nmap|https://ninocrudele.com/scan-all-public-ip-in-microsoft-azure-using-azure-cli-and-nmap]]|Azure Scanning|
|2019.12.05|The Register|[[Kubernetes? 'I don't believe in one tool to rule the world,' says AWS' Sassy Jassy|https://www.theregister.co.uk/2019/12/05/kubernetes_aws_ceo/]]|Kubernetes|
|2019.12.04|Silicon.fr[>img[iCSF/flag_fr.png]]|[[Cloud : les architectes réseau doivent faire preuve d'adaptabilité|https://www.silicon.fr/avis-expert/cloud-les-architectes-reseau-doivent-faire-preuve-dadaptabilite]]|Networks|
|2019.12.05|SecureCloudBlog|[[AAD Security made easy: Check your Azure AD Security with One-Liner (AZSK.AAD)|https://securecloud.blog/2019/12/04/aad-security-made-easy-check-youre-azure-ad-security-with-one-liner-azsk-aad/]]|AzureAD|
|2019.12.05|//SEKOIA//[>img[iCSF/flag_fr.png]]|[[Cloud Act : entre mythes et réalités|https://medium.com/@Sekoia_team/cloud-act-entre-mythes-et-r%C3%A9alit%C3%A9s-21eb1371a7ab]]|CLOUD_Act|
|2019.12.05|//CyrusOne//|[[Managed Service Division of CyrusOne Addresses Ransomware Incident|http://investor.cyrusone.com/news-releases/news-release-details/managed-service-division-cyrusone-addresses-ransomware-incident]]|Outage Ransomware CyrusOne|
|2019.12.05|ZDnet| → [[Ransomware attack hits major US data center provider|https://www.zdnet.com/article/ransomware-attack-hits-major-us-data-center-provider/]]|Outage Ransomware CyrusOne|
|2019.12.05|CIO Dive| → [[CyrusOne hit by REvil ransomware, impacting 6 managed service customers|https://www.ciodive.com/news/cyrusone-ransomware-REvil/568549/]]|Outage Ransomware CyrusOne|
|2019.12.06|Bleeping Computer| → [[U.S. Data Center Provider Hit by Ransomware Attack|https://www.bleepingcomputer.com/news/security/us-data-center-provider-hit-by-ransomware-attack/]]|Outage Ransomware CyrusOne|
|2019.12.05|//GoDaddy//|[[Securing the Cloud: The GoDaddy Way|https://fr.godaddy.com/engineering/2019/12/05/securing-the-cloud/]]|Implementation|
|2019.12.05|//Microsoft//|[[Auto renewal for Office 365 groups expiration policy now available|https://techcommunity.microsoft.com/t5/Azure-Active-Directory-Identity/Auto-renewal-for-Office-365-groups-expiration-policy-now/ba-p/1022398]]|O365|
|2019.10.24|//Microsoft//| → [[Configure the expiration policy for Office 365 groups|https://docs.microsoft.com/en-us/azure/active-directory/users-groups-roles/groups-lifecycle]]|O365|
|2019.12.05|//Eplexity//|[[Practical Approaches to Long-Term Cloud-Native Security|https://devops.com/practical-approaches-to-long-term-cloud-native-security/]]|Strategy|
|2019.12.05|//Gigamon//|[[What Is Hybrid Cloud? Advantages and Disadvantages|https://blog.gigamon.com/2019/12/05/what-is-hybrid-cloud-advantages-and-disadvantages/]]|Hybrid_Cloud|
|2019.12.05|//Managed Methods//|[[K-12 Content Filtering & Cloud Security: Why You Need Both|https://managedmethods.com/blog/k-12-content-filtering-cloud-security-why-you-need-both/]]|Filtering|
|2019.12.05|//Caylent//|[[How to use AWS Federated Identities with Amazon EKS|https://caylent.com/how-to-use-aws-federated-identities-with-amazon-eks]]|Federated_Identities AWS|
|2019.12.05|//INAP//|[[New Survey Reveals the Big 4 Reasons Behind Cloud Migrations and the Off-Premise Exodus|https://www.inap.com/blog/reasons-cloud-data-center-migrations/]]|Report|
|>|>|>|!2019.12.04|
|2019.12.04|Silicon.fr[>img[iCSF/flag_fr.png]]|[[SecNumCloud : l'ANSSI décerne le premier visa à 3DS Outscale|https://www.silicon.fr/secnumcloud-lanssi-decerne-le-premier-visa-a-3ds-outscale-328357.html]]|SecNumCloud Outscale|
|2019.12.04|!Silicon.fr[>img[iCSF/flag_fr.png]]|[[Cloud, sécurité des données et conteneurs : les prédictions technologiques pour 2020|https://www.silicon.fr/avis-expert/cloud-securite-des-donnees-et-conteneurs-les-predictions-technologiques-pour-2020]]|Predictions|
|2019.12.04|Dark Reading|[[Navigating Security in the Cloud|https://www.darkreading.com/cloud/navigating-security-in-the-cloud/a/d-id/1336477]]|Best_Practices|
|2019.12.04|SecurityWeek|[[Cloud(y) with a Chance of a Data Breach|https://www.securityweek.com/cloudy-chance-data-breach]]|Risks|
|2019.12.04|//PaloAlto Networks//|[[Perimeter Is Where Your Workload Is: Creating Policy Abstracted from IP Addressing|https://blog.paloaltonetworks.com/2019/12/network-data-center-security/]]|Policy Implementation|
|2019.12.04|//Malware Bytes//|[[Explained: What is containerization?|https://blog.malwarebytes.com/explained/2019/12/explained-what-is-containerization/]]|Containers|
|2019.12.04|//Google Cloud//|[[Last month today: November on GCP|https://cloud.google.com/blog/products/gcp/last-month-today-november-2019-on-gcp]]|GCP|
|2019.12.04|//Checkpoint//|[[How is your Kubernetes Security Posture?|https://blog.checkpoint.com/2019/12/04/how-is-your-kubernetes-security-posture/]]|Kubernetes Security_Posture|
|2019.12.04|//AWS//|[[Avoid ransomware by moving to the cloud, says AWS Public Sector boss|https://www.zdnet.com/article/avoid-ransomware-by-moving-to-the-cloud-says-aws-public-sector-boss/]]|AWS Ransomware|
|2019.12.04|//Tripwire//|[[PSA: Beware of Exposing Ports in Docker|https://www.tripwire.com/state-of-security/devops/psa-beware-exposing-ports-docker/]]|Docker Misconfiguration|
|2019.12.04|//FireEye//|[[FireEye's cloud security capabilities now available on AWS|https://www.helpnetsecurity.com/2019/12/04/fireeye-amazon-web-services/]]|FireEye AWS|
|2019.12.04|//Lifars//|![[How to mitigate your cloud computing risks|https://lifars.com/2019/12/are-you-working-in-a-secure-cloud-environment/]]|Risks|
|2019.12.04|//Microsoft//|[[Overview of the Microsoft 365 compliance center|https://docs.microsoft.com/en-us/microsoft-365/compliance/microsoft-365-compliance-center]]|O365 Compliance|
|>|>|>|!2019.12.03|
|2019.12.03|Container Journal|[[Report: Kubernetes Use on the Rise |https://containerjournal.com/topics/container-ecosystems/report-kubernetes-use-on-the-rise/]]|Kubernetes|
|2019.12.03|CISO Mag|[["AWS" Hacker Attacks Online Music Service Mixcloud|https://www.cisomag.com/aws-hacker-attacks-online-music-service-mixcloud/]]|Attacks|
|2019.12.03|Dark Reading|[[Leveraging the Cloud for Cyber Intelligence|https://www.darkreading.com/cloud/leveraging-the-cloud-for-cyber-intelligence-/a/d-id/1336457]]|Cyber_Intelligence|
|2019.12.03|CSO|[[How to evaluate a CASB|https://www.csoonline.com/article/3454611/how-to-evaluate-a-casb.html]]|CASB|
|2019.12.03|SANS|[[How to Build a Threat Hunting Capability in AWS|https://www.sans.org/reading-room/whitepapers/analyst/build-threat-hunting-capability-aws-39300]]|Threat_Hunting|
|2019.12.03|//Microsoft//|[[Microsoft Security - a Leader in 5 Gartner Magic Quadrants|https://www.microsoft.com/security/blog/2019/12/03/microsoft-security-leader-5-gartner-magic-quadrants/]]|CASB|
|2019.12.03|//Microsoft//|[[Azure AD Domain Services classic migration now available|https://techcommunity.microsoft.com/t5/Azure-Active-Directory-Identity/Azure-AD-Domain-Services-classic-migration-now-available/ba-p/1024783]]|AzureAD|
|2019.12.03|//AWS//|[[Easily Manage Shared Data Sets with Amazon S3 Access Points|https://aws.amazon.com/blogs/aws/easily-manage-shared-data-sets-with-amazon-s3-access-points/]] ([[podcast|https://d2908q01vomqb2.cloudfront.net/polly/da4b9237bacccdf19c0760cab7aec4a8359010b0amazon_polly_34136.mp3]])|AWS S3|
|2019.12.03|//AWS//| → [[AWS announces three new cloud security products|https://siliconangle.com/2019/12/03/aws-announces-three-new-products-focused-allowing-customers-operate-securely/]]|AWS S3|
|2019.12.03|//AWS//| → [[Amazon S3 Access Points|https://aws.amazon.com/s3/features/access-points/]]|AWS S3|
|2019.12.03|Silicon Angle| → [[With S3 Access Points, Amazon aims to make it easy to manage shared data|https://siliconangle.com/2019/12/03/amazon-makes-easy-manage-shared-data-s3-access-points/]]|AWS S3|
|2019.12.05|SecurityWeek| → [[AWS Unveils New Security Services and Capabilities|https://www.securityweek.com/aws-unveils-new-security-services-and-capabilities]]|AWS|
|2019.12.03|//Compare the Cloud//|[[Multi-cloud, Fog, Edge & Hybrid Computing - What's the Difference?|https://www.comparethecloud.net/articles/multi-cloud-fog-edge-hybrid-computing-whats-the-difference/]]|Multi_Cloud|
|2019.12.03|//Tuffin//|[[How to migrate apps and workloads to the cloud securely and efficiently|https://www.tufin.com/blog/cloud-migration-apps-workloads]]|Migration|
|2019.12.03|//Park my Cloud//|[[Cloud Control: Why Is It So Hard?|https://www.parkmycloud.com/blog/drivers-to-cloud/]]|Controls|
|2019.12.03|D/SRUPTION|[[Critical Considerations For Hybrid Cloud Infrastructure|https://disruptionhub.com/critical-considerations-for-hybrid-cloud-infrastructure/]]|Hybrid_Cloud|
|2019.12.03|Wall Street Journal|[[NSA to Issue Updated Cloud Security Guidance|https://www.wsj.com/articles/nsa-to-issue-updated-cloud-security-guidance-11575409110]]|Guidance|
|>|>|>|!2019.12.02|
|2019.12.02|ENISA|![[Cybersecurity certification: lifting the EU into the cloud|https://www.enisa.europa.eu/news/enisa-news/cybersecurity-certification-lifting-the-eu-into-the-cloud]]|Certification|
|2019.12.02|ENISA| → [[CSPCERT WG - Recommendations for the implementation of the CSP Certification scheme|https://drive.google.com/file/d/1J2NJt-mk2iF_ewhPNnhTywpo0zOVcY8J/view]]|Certification|
|2019.12.02|Bleeping Computer|[[Office 365 To Get Microsoft Recommended Security Profiles|https://www.bleepingcomputer.com/news/security/office-365-to-get-microsoft-recommended-security-profiles/]]|O365|
|2019.12.02|Center for Internet Security|[[CIS Debuts New Benchmarks, Hardened Images at AWS re:Invent|https://www.cisecurity.org/press-release/cis-debuts-new-benchmarks-hardened-images-at-aws-reinvent/]]|Hardening|
|2019.12.02|//AWS//|![[Monitor, review, and protect Amazon S3 buckets using Access Analyzer for S3|https://aws.amazon.com/blogs/storage/protect-amazon-s3-buckets-using-access-analyzer-for-s3/]]|AWS S3 Monitoring|
|2019.12.02|//AWS//| → [[Introducing Access Analyzer for Amazon S3 to review access policies|https://aws.amazon.com/about-aws/whats-new/2019/12/introducing-access-analyzer-for-amazon-s3-to-review-access-policies/]]|AWS S3 Monitoring|
|2019.12.03|Help Net Security| → [[Control access and permissions to AWS services and resources|https://www.helpnetsecurity.com/2019/12/03/aws-iam-access-analyzer/]]|AWS S3 Monitoring|
|2019.12.03|The Register| → [[AWS has new tool for those leaky S3 buckets so, yeah, you might need to reconfigure a few things|https://www.theregister.co.uk/2019/12/03/aws_s3_buckets/]]|AWS S3 Monitoring|
|2019.12.03|CloudPro| → [[AWS plugs leaky S3 buckets with CloudKnox integration|https://www.cloudpro.co.uk/it-infrastructure/security/8327/aws-plugs-leaky-s3-buckets-with-cloudknox-integration]]|AWS S3 Monitoring|
|2019.12.07|//BitDefender//| → [[Amazon Battles Leaky S3 Buckets with a New Security Tool|https://businessinsights.bitdefender.com/amazon-battles-leaky-s3-buckets-with-a-new-security-tool]]|AWS Tools|
|2019.12.02|//Security Intelligence//|[[Attain Embedded Cloud Security With a DevSecOps Approach|https://securityintelligence.com/posts/attain-embedded-cloud-security-with-a-devsecops-approach/]]|DevSecOps|
|2019.12.02|//CyberArk//|[[BlackDirect: Microsoft Azure Account Takeover|https://www.cyberark.com/threat-research-blog/blackdirect-microsoft-azure-account-takeover/]]|Azure OAuth|
|2019.12.02|//CyberArk//| → Site Web [[BlackDirect|https://black.direct/]]|Azure OAuth|
|2019.12.02|//Threatpost//| → [[Microsoft OAuth Flaw Opens Azure Accounts to Takeover|https://threatpost.com/microsoft-oauth-flaw-azure-takeover/150737/]]|Azure OAuth|
|2019.12.05|CISO Mag| → [[Security Flaw in Microsoft Azure Lets Hackers Control Azure Accounts|https://www.cisomag.com/security-flaw-in-microsoft-azure-lets-hackers-control-azure-accounts/]]|Azure OAuth|
|2019.12.02|//McAfee//|[[Data in the Cloud is Much More at Risk Than Enterprises May Think|https://www.cisomag.com/a-secure-bridge-to-the-cloud/]]|Risks|
|2019.12.02|//Cloudflare//|[[The Serverlist: Full Stack Serverless, Serverless Architecture Reference Guides, and more|https://blog.cloudflare.com/serverlist-10th-edition/]]|Serverless|
[>img(200px,auto)[iCSF/DKCFCS.png]]L'agence nationale de sécurité danoise, "Center for Cybersikkerhed", et le Conseil national de la numérisation ont publié un guide intitulé "//Vejledning til anvendelse af Cloudservices//" ou "Nouvelle orientation sur le Cloud pour les agences gouvernementales", avec un ensemble de directives.
!Contexte
[>img(80px,auto)[iCSF/DK.png]]Le document intègre des considérations commerciales, juridiques et de sécurité que les autorités devraient prendre en compte lors de l'utilisation de services Cloud.
Son but est de fournir un cadre d'utilisation et un processus de prise de décision pour savoir si les services Cloud peuvent être utilisés ou non. 
Il passe donc en revue ce qu'est le Cloud, et les problèmes juridiques clés, explique comment aborder la sécurité des informations lors du transfert d'une application vers le Cloud, donne les moyens de d'évaluer les opportunités et les responsabilités liées à l'utilisation du Cloud.
Les 4 parties principales du document sont ainsi :
* Introduction aux services Cloud : les concepts de base, les modèles, leurs avantages et inconvénients
* Aspects commerciaux : besoins de l'entreprise en matière de vices Cloud, et ce que cela implique pour l'organisation.
* Aspects juridiques : sécurité des données, notamment lors du traitement de données à caractère personnel
* Aspects sécurité de l'information : exigences sécurité spécifiques apportés par les services Cloud
!Principaux éléments du guide
* Nécessité de clarifier les exigences de l'entité qui a le besoin et les implications organisationnelles des opérations et du développement basés sur le Cloud
* Évaluer les risques techniques, de sécurité, financiers, procéduraux, d'organisation et de compétence.
** Veiller à ce que les mesures de sécurité soient reflétées dans les exigences de la solution Cloud
** Permettre un contrôle adapté de la conformité du fournisseur aux exigences convenues et acceptées
** Prendre en compte les futures exigences
* Si des données à caractère personnel sont en jeu, prendre en compte certaines considérations particulières résultant du RGPD.
** L'évaluation des risques doit porter sur les risques liés au traitement de données à caractère personnel
** Mener une analyse d'impact si le niveau de risque pour les droits des personnes concernées est élevé
** Intégrer si nécessaire les aspects de localisation des données, avec éventuellement la localisation au Danemark
** Conclure un contrat de traitement de données, incluant notamment des conditions ou instructions de supervision, de déclaration d'assurance, de transfert dans des pays tiers, de localisation du traitement, ainsi que le retour et la suppression des données à la fin du contrat
** Utiliser, par exemple, la norme ISO 27701 qui permet de cartographier les liens entre les dispositions du RGD et la sécurité de l'information. Le cas échéant, s'appuyer sur les normes ISO 27001, 27002, 27017 et 27018.
Enfin, le guide rappelle aussi qu'il appartient à l'entité concernée de veiller à ce que les objectifs de sécurité soient atteints.
Même s'il est principalemnt destiné aux institutions publiques et gouvernementales, ce guide peut également s'appliqué dans le privé.
!Plan du guide
Le guide comporte 46 pages :[>img(200px,auto)[iCSF/JBTDK.png]]
|!1|>|!Introduction|
|!2|>|!Introduction aux services Cloud|
|!3|>|!Aspects commerciaux|
| |3.1|Besoins d'organisation et de compétences|
|~|3.2|Agilité et innovation|
|~|3.3|Dimensionnement|
|~|3.4|Dépendance au fournisseur|
|~|3.5|Gestion financière|
|!4|>|!Aspects juridiques|
| |4.1|Conditions spéciales pour le traitement des données personnelles|
|~|4.2|Contrats de traitement de données|
|~|4.3|Transferts en provenance de pays tiers|
|~|4.4|Évaluation d'impact|
|~|4.5|La condition de localisation requise par la loi sur la protection des données|
|~|4.6|Protection des données par la conception et par défaut|
|~|4.7|Autre législation|
|!5|>|!Aspects sécurité|
| |5.1|Évaluation des risques de la solution Cloud|
|~|5.2|Sécurité de traitement|
|~|5.3|Sécurité et nécessité de clarification|
|~|5.4|Sécurité des achats|
|~|5.5|Sécurité pendant le fonctionnement|
|~|5.6|Résiliation ou modification de la relation fournisseur|
|~|5.7|Gestion des mises à jour|
|~|5.8|Formation|
|~|5.9|Test et développement|
|!6|>|!Synthèse|
!Liens
* Annonce :  → ''[[CloudSecurityAlliance.fr/go/jc7a/|https://cloudsecurityalliance.fr/go/jc7a/]]'' 
* Document (en danois, format PDF) :  → ''[[CloudSecurityAlliance.fr/go/jc7p/|https://cloudsecurityalliance.fr/go/jc7p/]]'' 
[img[iCSF/flag_fr.png]][img(50%,1px)[iCSF/BluePixel.gif]]
!"//Cloud Security Alliance Announces Industry's First Credential for Cloud Auditing//"
<<<
[>img(200px,auto)[iCSA/CCAK.png]]//The Certificate of Cloud Auditing Knowledge ([[CCAK]]) allows professionals to demonstrate expertise in auditing cloud computing systems
Las Vegas - Dec. 4, 2019. The [[Cloud Security Alliance]] ([[CSA]]), the world's leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today announced the Certificate of Cloud Auditing Knowledge ([[CCAK]]), the only credential for industry professionals that demonstrates expertise in the essential principles of auditing cloud computing systems. Set to be released in the second half of 2020, the [[CCAK]] aims to solve the current industry knowledge gap for IT audit and security professionals trained and certified for traditional on-premise IT auditing and assurance.

Designed to provide CISOs, security and compliance managers, internal and external auditors, and practitioners of tomorrow with the proven skillset to address the specific concerns that arise from the use of various forms of cloud services, the [[CCAK]] will provide a common baseline of expertise and shared nomenclature to ensure that IT auditors and other related stakeholders are communicating appropriately and accurately regarding the effectiveness of cloud security controls.

With its focus on cloud computing, the [[CCAK]] differs from traditional IT audit certification programs, which have many excellent elements, but were not developed with an understanding of cloud computing and its many nuances. An audited organization using cloud computing, for instance, will have a very different approach to satisfying control objectives, and a cloud tenant will certainly not have the same administrative access as in a legacy IT system and will employ a wide range of security controls that will be foreign to an audit and assurance professional grounded in traditional IT audit practices.

"Cloud computing represents a radical departure from legacy IT in virtually every respect. The new technology architecture, the nature of how cloud is provisioned, and the new shared responsibility model means that IT audits must be significantly altered to provide assurance to stakeholders that their cloud adoption is secure," said Jim Reavis, co-founder and CEO, ''Cloud Security Alliance''. "Because CSA already has developed the most widely adopted cloud security audit criteria and organizational certification, we are uniquely positioned to lead efforts to ensure industry professionals have the requisite skill set for auditing cloud environments."

The [[CCAK]]'s holistic body of knowledge will be composed of the ''CSA'''s ''Cloud Controls Matrix'' ([[CCM]]), the fundamental framework of cloud control objectives; its companion ''Consensus Assessments Initiative Questionnaire'' ([[CAIQ]]), the primary means for assessing a cloud provider's adherence to ''CCM''; and the ''Security, Trust, Assurance & Risk'' ([[STAR]]) program, the global leader in cloud security audits and self-assessments, in addition to new material.

For more than 10 years, ''CSA'' has led the development of the trusted cloud ecosystem, which notably includes the ''STAR'' program and the Certificate of Cloud Security Knowledge ([[CCSK]]), the gold standard for measuring professional competency in cloud security. The [[CCAK]] and the [[CCSK]] will complement one another in that the [[CCSK]] provides the knowledge that enables an expert to secure cloud systems that will, in turn, be successfully scrutinized by an expert holding the [[CCAK]]. In many cases, an industry professional will be well served by obtaining both certificates.

Because the [[CCAK]] is intended to create a common cloud audit understanding, it's expected to become a mandatory requirement for IT auditors and highly recommended for IT managers and professionals, especially governance, risk management, compliance, and vendor/supply chain management.//
<<<
__Liens :__
* Annonce :  → ''[[CloudSecurityAlliance.fr/go/jc4a/|https://cloudsecurityalliance.fr/go/jc4a/]]''
* Page dédiée au CCAK → ''[[CloudSecurityAlliance.fr/go/CCAK/|https://cloudsecurityalliance.fr/go/CCAK/]]''
[img(25%,1px)[iCSF/BluePixel.gif]]
!1 - Les nouveautés CSA de la semaine du 25 novembre au 1^^er^^ décembre 2019 [>img[iCSF/cloud-security-alliance-fr.png]]
* Actu : Appel à commentaires, document "''Cloud Incident Response Framework - A Quick Guide''"+++*[»]> <<tiddler [[2019.11.28 - Appel à commentaires, document 'Cloud Incident Response Framework - A Quick Guide']]>>=== 
* Actu : Appel à commentaires, document "''Hybrid Cloud and Its Associated Risks''"+++*[»]> <<tiddler [[2019.11.28 - Appel à commentaires, document 'Hybrid Cloud and Its Associated Risks']]>>=== 
* Blog : 'Qu'est-ce que la Pseudo Crypto-Monnaie'+++*[»]> <<tiddler [[2019.11.25 - Blog : Qu'est-ce que la Pseudo Crypto-Monnaie]]>>=== 
* Actu : Derniers jours pour ''valider la traduction en français de 3 documents CSA'' (CCM, CAIQ et PLA CoC)+++*[»]> <<tiddler [[2019.11.13 - Demande de validation de la traduction en français de 3 documents CSA]]>>=== 
!2 - Veille Web
La [[Veille Web|2019.12.01 - Veille Hebdomadaire - 1er décembre]] avec plus de 30 liens
* Bonnes pratiques et recommendations : Docker, Kubernetes
* Rapport : ''CIGREF'' sur la régulation du marché européen du Cloud+++*[»]>
|2019.11.18|Silicon.fr[>img[iCSF/flag_fr.png]]|[[Services Cloud : Microsoft veut appliquer la conformité au RGPD partout|https://www.silicon.fr/services-cloud-microsoft-veut-appliquer-la-conformite-rgpd-partout-326317.html]]|Microsoft GDPR|
|2019.11.18|//Microsoft//| → [[Introducing more privacy transparency for our commercial cloud customers|https://blogs.microsoft.com/eupolicy/2019/11/18/introducing-privacy-transparency-commercial-cloud-customers/|https://blogs.microsoft.com/eupolicy/2019/11/18/introducing-privacy-transparency-commercial-cloud-customers/]]|Microsoft GDPR|
|2019.11.18|The Register| → [[You're about to gouda major change in Microsoft cloud security after Redmond agrees to go Dutch on data|https://www.theregister.co.uk/2019/11/18/microsoft_gdpr_moj_deal/]]|Microsoft GDPR|
|2019.11.18|CBR Online| → [[Microsoft Buckles Under EU Pressure: Changes Cloud Contracts to Reflect "Data Controller" Role|https://www.cbronline.com/news/microsoft-cloud-terms]]|Microsoft GDPR|
|2019.11.19|Le Monde Informatique[>img[iCSF/flag_fr.png]]| → [[Microsoft révise ses contrats de services cloud pour l'Union européenne|https://www.lemondeinformatique.fr/actualites/lire-microsoft-revise-ses-contrats-de-services-cloud-pour-l-union-europeenne-77118.html]]|Microsoft GDPR|
=== 
* Divers : Cloud et résilience, Cloud et PRA, évaluation des prestataires Cloud
|!Décembre|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2019.12.01|
|2019.12.01|KitPloit|[[CCAT - Cloud Container Attack Tool For Testing Security Of Container Environments|https://www.kitploit.com/2019/12/ccat-cloud-container-attack-tool-for.html]]|Tools Containers|
|2019.12.01|//Tripwire//|[[Security for Cloud Services: IaaS Deep Dive|https://www.tripwire.com/state-of-security/security-data-protection/cloud/security-cloud-services-iaas-deep-dive/]] (3/3)|IaaS|
|!Novembre|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2019.11.30|
|2019.11.30|SANS|[[Cloud Storage Acquisition from Endpoint Devices|https://www.sans.org/blog/cloud-storage-acquisition-from-endpoint-devices/]]|Forensics|
|>|>|>|!2019.11.29|
|2019.11.29|Center for Cybersikkerhed|![[Nouvelle directive sur le cloud pour les autorités publiques|https://fe-ddis.dk/cfcs/nyheder/arkiv/2019/Pages/cloudvejledning-for-offentlige-myndigheder.aspx]]|Guidelines Denmark|
|2019.11.29|Container Journal|[[Sysdig's Third Annual Container Usage Report Reveals That Container Lifespan Has Been Cut in Half |https://containerjournal.com/news/news-releases/sysdigs-third-annual-container-usage-report-reveals-that-container-lifespan-has-been-cut-in-half/]]|Containers Survey|
|2019.11.29|//Fortinet//|[[Four ways to develop a hybrid cloud security strategy|https://www.itworldcanada.com/sponsored/four-ways-to-develop-a-hybrid-cloud-security-strategy]]|Hybrid_Cloud|
|2019.11.29|//Sunguard//|![[Embedding resilience into your cloud-based modernisation strategy|https://www.continuitycentral.com/index.php/news/resilience-news/4674-embedding-resilience-into-your-cloud-based-modernisation-strategy]]|Resilience|
|>|>|>|!2019.11.28|
|2019.11.28|//DivvyCloud//|[[Forecasting the cloud security landscape in 2020|https://betanews.com/2019/11/28/forecasting-cloud-security-2020/]]|Predictions|
|2019.11.28|//Cloudonaut//|[[Checklist: Is your application ready for a container cluster?|https://cloudonaut.io/checklist-container-cluster-ecs-fargate/]]|Containers|
|>|>|>|!2019.11.27|
|2019.11.27|ZDnet|[[Predictions 2020: Cloud computing sees new alliances and new security concerns|https://news.hitb.org/content/predictions-2020-cloud-computing-sees-new-alliances-and-new-security-concerns]]|Predictions|
|2019.11.27|Container Journal|[[Securing Docker Containers: A Primer|https://containerjournal.com/topics/container-security/securing-docker-containers-a-primer/]]|Docker|
|2019.11.27|//Virtustream//[>img[iCSF/flag_fr.png]]|[[Etat des lieux du cloud dans le secteur de la santé|https://www.journaldunet.com/solutions/expert/72165/etat-des-lieux-du-cloud-dans-le-secteur-de-la-sante.shtml]]|Healthcare|
|2019.11.27|//Compare the Cloud//|[[A brief history of disaster recovery|https://www.comparethecloud.net/articles/a-brief-history-of-disaster-recovery/]] ([[vidéo|https://www.youtube.com/watch?v=BJ2g_1-m_mo]])|DRP DRaaS|
|2019.11.27|//Google Cloud//|[[Exploring container security: Day one Kubernetes decisions|https://cloud.google.com/blog/products/containers-kubernetes/security-considerations-for-google-kubernetes-engine]]|Kubernetes Best_Practices|
|2019.11.27|//Alcide//|[[Prevent Costly Mistakes that Expose Your Kubernetes Service|https://blog.alcide.io/prevent-costly-mistakes-that-expose-your-kubernetes-service]]|Kubernetes Best_Practices|
|2019.11.27|//Tresorit//|[[Choosing the Right Cloud Provider: The Importance of Security Assessments|https://www.infosecurity-magazine.com/blogs/choosing-the-right-cloud-provider/]]|Vendors Assessment|
|2019.11.27|//DeltaRisk//|[[How to Determine if SOC-as-a-Service is Right for Your Organization|https://deltarisk.com/blog/how-to-determine-if-soc-as-a-service-is-right-for-your-organization/]]|SOCaaS|
|>|>|>|!2019.11.26|
|2019.11.26|Solutions Numériques[>img[iCSF/flag_fr.png]]|[[Sécurité d'Office 365 : les entreprises doivent agir|https://www.solutions-numeriques.com/dossiers/securite-doffice-365-les-entreprises-doivent-agir/]]|O365|
|2019.11.26|Alain Bensoussan[>img[iCSF/flag_fr.png]]|[[Les contrats cloud Microsoft rattrapés par le RGPD|https://www.alain-bensoussan.com/avocats/les-contrats-cloud-microsoft-rattrapes-par-le-rgpd/2019/11/26/]]|Microsoft RGPD|
|2019.11.26|ZDnet|[[A hacking group is hijacking Docker systems with exposed API endpoints|https://www.zdnet.com/article/a-hacking-group-is-hijacking-docker-systems-with-exposed-api-endpoints/]]|Attacks Docker|
|2019.11.26|Silicon Angle|[[Vulnerable Docker instances targeted in cryptocurrency mining campaign|https://siliconangle.com/2019/11/27/vulnerable-docker-instances-targeted-cryptocurrency-mining-campaign/]]|Attacks Docker|
|2019.11.26|Silicon Angle|[[Designing security for an open-source, containerized, cloud-native world|https://siliconangle.com/2019/11/26/designing-security-for-an-open-source-containerized-cloud-native-world-kubecon/]] ([[vidéo|http://www.youtube.com/watch?v=i4Xo_OYSShk]])|Cloud_Native Containers|
|>|>|>|!2019.11.25|
|2019.11.25|LeMagIT[>img[iCSF/flag_fr.png]]|[[Sécurité du cloud : dix ans après le lancement de la CSA, les chantiers restent énormes|https://www.lemagit.fr/actualites/252474540/Securite-du-Cloud-dix-ans-apres-le-lancement-de-la-CSA-les-chantiers-restent-enormes]]|CSA trends|
|2019.11.25|CIGREF[>img[iCSF/flag_fr.png]]|![[SWIPO : Échec de la régulation du marché européen du cloud|https://www.cigref.fr/swipo-echec-regulation-marche-europeen-cloud]] ([[pdf|https://www.cigref.fr/wp/wp-content/uploads/2019/11/CP-SWIPO-Cigref-version-francaise-2019-11-25.pdf]])|Regulations SWIPO|
|2019.11.25|LeMagIT[>img[iCSF/flag_fr.png]]| → [[Pour le Cigref, la première tentative d'autorégulation du cloud en Europe est un "échec"|https://www.lemagit.fr/actualites/252474525/Pour-le-CIGREF-la-premiere-tentative-dautoregulation-du-cloud-en-Europe-est-un-echec]]|Regulations SWIPO|
|2019.11.26|Silicon.fr[>img[iCSF/flag_fr.png]]| → [[Cloud : le Cigref adoube les contrats IaaS mais critique le SaaS|https://www.silicon.fr/cloud-europeen-cigref-critique-saas-327207.html]]|Regulations SWIPO|
|2019.11.25|Silicon.fr[>img[iCSF/flag_fr.png]]|[[Multicloud : la sécurité est le principal défi à relever|https://www.silicon.fr/multicloud-securite-principal-defi-327095.html]]|Misc|
|2019.11.25|Solutions Review|[[Google Announces New Security Capabilities for Google Cloud|https://solutionsreview.com/cloud-platforms/google-announces-new-security-capabilities-for-google-cloud/]]|GCP|
|2019.11.25|CBR On Line|[[An Idiot's Guide to Kubernetes|https://www.cbronline.com/feature/an-idiots-guide-to-kubernetes]]|Kubernetes|
|2019.11.25|Techradar Pro|[[Amazon files official JEDI contract complaint|https://www.techradar.com/news/amazon-files-official-jedi-contract-complaint]]|JEDI|
|2019.11.25|eWeek|[[Recognizing the Right Stuff in Cloud Security|https://www.eweek.com/cloud/recognizing-the-right-stuff-in-cloud-security]]|Misc|
|2019.11.25|//Cisco//|[[Security's New Address: The Cloud|https://umbrella.cisco.com/blog/2019/11/25/securitys-new-address-the-cloud/]]|Gartner Network|
|2019.11.25|//Compare the Cloud//|[[Cloud Vendor Assessments - Done The Right Way|https://www.comparethecloud.net/articles/cloud-vendor-assessments-done-right/]]|Vendors Assessment|
|2019.11.25|//Heimdal//|[[What is the Zero Trust Model?|https://heimdalsecurity.com/blog/what-is-the-zero-trust-model/]]|Zero_Trust|
|2019.11.25|//DeltaRisk//|[[New G Suite Security Features Protect Against Rogue Apps|https://deltarisk.com/blog/new-g-suite-security-features-protect-against-rogue-apps/]]|GCP|
!"//Cloud Security Alliance Announces Speakers for CSA Summit at RSA Conference 2020//"
[>img(100px,auto)[iCSA/K2OEC.png]]Le CSA Summit aura lieu le 24 février 2020 à San Francisco.
&rArr; Lire [[l'article|https://cloudsecurityalliance.org/press-releases/2019/12/17/cloud-security-alliance-announces-speakers-for-csa-summit-at-rsa-conference-2020/]] sur le site de la Cloud Security Alliance.
&rArr; Le site du [[CSA Summit|https://cloudsecurityalliance.org/events/csa-summit-at-rsa-conference-2020]] à la ''RSA Conference 2020''

[img(25%,1px)[iCSF/BluePixel.gif]]
!"//​CCPA is Ambiguous About Cloud. Your Response Shouldn’t Be//"
[>img(100px,auto)[iCSA/JCIBC.jpg]]^^Article publié le 18 décembre sur le blog de la CSA, et après l'avoir été 2 jours auparavant sur le site de la société Fugue.
&rArr; Lire [[l'article|https://cloudsecurityalliance.org/blog/2019/12/18/ccpa-is-ambiguous-about-cloud-your-response-shouldn-t-be/]] sur le blog de la Cloud Security Alliance ou [[l'original|https://www.fugue.co/blog/ccpa-is-ambiguous-about-cloud.-your-response-shouldnt-be]]^^

[img(25%,1px)[iCSF/BluePixel.gif]]
!"//The Four Pillars of CASB: Visibility//"
[>img(100px,auto)[iCSA/JC4BT.jpg]]^^Article publié le 4 décembre sur le blog de la CSA, et après l'avoir été il y a plus de 6 semaines sur le site de la société Bitglass.
&rArr; Lire [[l'article|https://cloudsecurityalliance.org/articles/the-four-pillars-of-casb-visibility/]] sur le blog de la Cloud Security Alliance ou [[l'original|https://www.bitglass.com/blog/four-pillars-casb-visibility]]^^

[img(25%,1px)[iCSF/BluePixel.gif]]
!Actualités, Blog, Publications et Veille "Sécurité du Cloud"
<<tiddler fAll2LiTabs13end with: 201911>>
<<tiddler fAll2Tabs10 with: VeilleM","_201911>>
|!Novembre|!Sources|!Titres et Liens|!Keywords|
|2019.11.19|//PaloAlto Networks//|![[Docker Patched the Most Severe Copy Vulnerability to Date With CVE-2019-14271|https://unit42.paloaltonetworks.com/docker-patched-the-most-severe-copy-vulnerability-to-date-with-cve-2019-14271/]]|Docker CVE-2019-14271|
|2019.07.25|MITRE|[[CVE-2019-14271|https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14271]]|Docker CVE-2019-14271|
|2019.11.19|GBHackers on Security| → [[Most Critical Docker Vulnerability Let Hackers To Take Complete Control Over Host & All Containers Within It|https://gbhackers.com/docker-vulnerability/]]|Docker CVE-2019-14271|
[img(25%,1px)[iCSF/BluePixel.gif]]
<<tiddler .ReplaceTiddlerTitle with: [[Alertes et Vulnérabilités - Novembre 2019]]>>
<<tiddler fAll2LiTabs10 with: NewsL","201911>><<tiddler .ReplaceTiddlerTitle with: [[Newsletters - Novembre 2019]]>>
<<tiddler .ReplaceTiddlerTitle with: [[Actualités - Novembre 2019]]>><<tiddler fAll2LiTabs13end with: Actu","201911>>
<<tiddler fAll2LiTabs13end with: Blog","201911>>
[img(25%,1px)[iCSF/BluePixel.gif]]
<<tiddler .ReplaceTiddlerTitle with: [[Blog - Novembre 2019]]>>
<<tiddler fAll2LiTabs13end with: Publ","201911>>
[img(25%,1px)[iCSF/BluePixel.gif]]
<<tiddler .ReplaceTiddlerTitle with: [[Publications - Novembre 2019]]>>
Un appel à commentaires dont la date de clôture est le ''27 décembre 2019'' : "''Cloud Incident Response Framework - A Quick Guide''".
<<<
//What this Quick Guide aims to do is to distill and give readers an overview of key contributions of the work currently undertaken in the CIR WG, towards a comprehensive CIR framework. The CIR WG hopes to take this opportunity to encourage volunteers to participate in the WG's efforts and provide valuable feedback to the ongoing work.//
<<<
* Lien → ''[[CloudSecurityAlliance.fr/go/jbsi/|https://cloudsecurityalliance.fr/go/jbsi/]]''
[img(25%,1px)[iCSF/BluePixel.gif]]
Un appel à commentaires dont la date de clôture est le ''27 décembre 2019'' : "''Hybrid Cloud and Its Associated Risks''".
<<<
//Cloud computing is flourishing. Hybrid clouds, especially, have been gaining more traction as cloud customers increasingly understand that using public clouds or private clouds alone poses certain limitations. Hybrid cloud is often the starting point for organizations to get started on the cloud journey and this document aims to describe the concept and value of hybrid clouds, highlight key application scenarios and point out security risks in the hybrid cloud.//
<<<
* Lien → ''[[CloudSecurityAlliance.fr/go/jbsh/|https://cloudsecurityalliance.fr/go/jbsh/]]''
[img(25%,1px)[iCSF/BluePixel.gif]]
!"//What's a Pseudo Cryptocurrency?//"
[>img(150px,auto)[iCSA/JBLBD.jpg]]Article de blog publié le 25 novembre 2019 — Rédigé par Kurt Seifried, Chief Blockchain Officer, CSA
<<<
//You may not have yet seen the term "pseudo cryptocurrency," in fact it (as of 2019-08-22) it only shows up 2030 Google search results and a quarter million without the quotes. So if nobody is using this term, why does it matter?
Currently, we have a number of established cryptocurrencies such as Bitcoin, Ethereum, Litecoin, Zcash, Mondero and so on. They tend to share two major characteristics:
* They are decentralized, meaning no single central authority controls them entirely
* Secondly, they can be used to represent value, with varying degrees of stability, or in the case of Bitcoin: buckle up!
The term pseudo cryptocurrency is not completely established yet but appears to be in use for two main reasons. You want to talk about a cryptocurrency that isn't decentralized enough and is part of a scammy initial coin offering. Or you want to talk about something that has many of the properties of the established cryptocurrencies but isn't a currency.

The first case isn't too interesting, there are many new cryptocurrency projects that are not decentralized or "pure" enough, and to be clear there is a place for these.
The second case is much more interesting, like most new technologies we started with a single ambitious use case ("replace all the banks! 2EZ!") that has morphed and grown to other use cases (e.g. inventory tracking and food safety) and we're even starting to see hybrid projects. Measuring and tracking value is a core activity for many businesses and projects. Still, you probably don't want to actually be a currency as this means you'll have to deal with the SEC (in America) or their local counterpart, and if you're really unlucky, you may end up in front of a Senate hearing getting grilled on just what exactly it is you're planning to do.

Many systems that store and distribute information (privately and publicly) can also allow you to conduct transactions with it. For example, a résumé or CV cannot be spent to buy a candy bar, but a good résumé or CV can definitely help you get a better job so you can buy more candy bars. You can't "spend" your résumé, but you can increase the value inherent in your résumé through training, experience, certifications and so on that can then be used to get a pay raise or a better job. Measuring that value is where the pseudo cryptocurrency comes in. Allowing the market to abstract the value into a standard form makes it much easier to examine and compare résumés. For people using the system, they can listen to what the market values and get certifications that actually provide them with more value.
You can read more about Blockchain in CSA's uses cases research report +++*[here]> <<tiddler [[2018.11.27 - Publication : Blockchain DLT Use Cases]]>> ===. Interested in reading more about Blockchain from the Seifried Files?//[...]
<<<
&rArr; Lire [[l'original|https://CloudSecurityAlliance.fr/go/jbpb/]] sur le blog de la CSA
!1 - Les nouveautés CSA de la semaine du 18 au 24 novembre 2019
* Publication : 4 documents CSA sur le ''RGPD''+++*[»]> <<tiddler [[2019.11.19 - Publication : 4 documents CSA sur le RGPD]]>>=== [>img[iCSF/cloud-security-alliance-fr.png]]
* Publication : Présentations au Forum CSA 2019 du Colorado+++*[»]> <<tiddler [[2019.11.18 - Publication : Présentations au Forum CSA 2019 du Colorado]]>>=== 
* Actu : Nouvelle ''demande de validation de la traduction en français de 3 documents CSA'' (CCM, CAIQ et PLA CoC)+++*[»]> <<tiddler [[2019.11.13 - Demande de validation de la traduction en français de 3 documents CSA]]>>=== 
* Actu : CCSK Plus Labs pour plate-forme Microsoft Azure+++*[»]> <<tiddler [[2019.11.20 - CCSK Plus Labs pour plate-forme Microsoft Azure]]>>=== 
!2 - Veille Web
La +++*[Veille Web]> <<tiddler [[2019.11.24 - Veille Hebdomadaire - 24 novembre]]>>=== avec plus de 40 liens
* Alerte : analyse de la vulnérabilité ''Docker CVE-2019-14271''
* Incidents et pannes : plusieurs pannes Azure en Australie
* Outils : Benchmarking CIS pour AWS, Azure et GCP+++*[»]>
=== 
* Divers : répertoire de liens sur Dockers, Chaos Engineering pour Kubernetes, Threat Hunting pour AWS+++*[»]>
|2019.11.19|//AWS//|[[Enabling a Threat Hunting Capability in AWS (pdf)|https://pages.awscloud.com/rs/112-TZM-766/images/How-to-Build-a-Threat-Hunting-Capability-in-AWS_Whitepaper.pdf]]|Threat_Hunting|
|2019.11.21|//AWS//| → [[How to Build a Threat Hunting Capability in AWS (pdf)|https://pages.awscloud.com/rs/112-TZM-766/images/How-to-Build-a-Threat-Hunting-Capability-in-AWS_Slides.pdf]]|Threat_Hunting|
=== 
* Rapport : INAP, Information Security Forum+++*[»]>
|2019.11.19|Information Security Forum|[[ISF Releases Using Cloud Services Securely: Harnessing Core Controls|https://vmblog.com/archive/2019/11/19/isf-releases-using-cloud-services-securely-harnessing-core-controls.aspx]]|Best_Practices Controls|
|2019.11.19|Information Security Forum| → [[Using Cloud Services Securely: Harnessing Core Controls|https://www.securityforum.org/research/using-cloud-services-securely-harnessing-core-controls/]] ([[synthèse|https://www.securityforum.org/uploads/2019/11/ISF_Using-Cloud-Services-Securely_Executive-Summary-PWS-new.pdf]])|Best_Practices Controls|
===, TrendMicro
!3 - Conférences et Salons
* Le ''Cloud & Cyber Security Expo c'est cette semaine'' : ''mercredi 27 et jeudi 28 novembre'' à Paris, Porte de Versailles
** ''Troisième'' teaser et inscription gratuite+++*[»]> <<tiddler [[2019.11.22 - Cloud & Cyber Security Expo - Inscription et Extrait du Programme (3/3)]]>>=== 
** Animation d'une table ronde sur la ''Cyber-Résilence dans le Cloud''+++*[»]> <<tiddler [[2019.10.07 - Cloud & Cyber Security Expo les 27 et 28 novembre 2019]]>>=== 
|!Novembre|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2019.11.26|
|2019.11.26|Informatique News[>img[iCSF/flag_fr.png]]|[[Google abandonne Cloud Print|https://www.informatiquenews.fr/google-abandonne-cloud-print-65041]]|GCP|
|2019.11.26|InfoSecurity Mag|[[DevOps, Cloud and Remote Workers Dominate 2020 Risks|https://www.infosecurity-magazine.com/news/devops-cloud-remote-workers/]]|Trends Risks|
|>|>|>|!2019.11.24|
|2019.11.24|//Tripwire//|[[Cloud Security Threats: Escaping the Egregious Eleven - Part Two|https://www.tripwire.com/state-of-security/featured/cloud-security-threats-escaping-egregious-eleven-part-two/]] (2/2)|CSA Threats|
|2019.11.24|//Tripwire//|[[Security for Cloud Services: PaaS Deep Dive|https://www.tripwire.com/state-of-security/security-data-protection/cloud/security-cloud-services-paas-deep-dive/]] (2/3)|PaaS|
|>|>|>|!2019.11.22|
|2019.11.22|Wired|[[1.2 Billion Records Found Exposed Online in a Single Server|https://www.wired.com/story/billion-records-exposed-online/]]|Data_Leak|
|2019.11.22|Data Viper| → [[Personal and Social information of 1.2 billion people Discovered in Massive Data Leak|https://www.dataviper.io/blog/2019/pdl-data-exposure-billion-people/]]|Data_Leak|
|2019.11.22|CRN|[[Australia cops third Microsoft cloud outage in a week|https://www.crn.com.au/news/australia-cops-third-microsoft-cloud-outage-in-a-week-534452]]|Azure Outage Australia|
|2019.11.22|//Blissfully//|[[What HR Needs to Know About SaaS Security|https://www.blissfully.com/blog/what-hr-needs-to-know-about-saas-security/]]|SaaS|
|>|>|>|!2019.11.21|
|2019.11.21|Bleeping Computer|[[Microsoft 365 Experiencing OneDrive and SharePoint Outages|https://www.bleepingcomputer.com/news/microsoft/microsoft-365-experiencing-onedrive-and-sharepoint-outages/]]|O365 OneDrive Sharepoint Outage|
|2019.11.21|ComputerWeekly|[[Security Think Tank: Stopping data leaks in the cloud|https://www.computerweekly.com/opinion/Security-Think-Tank-Stopping-data-leaks-in-the-cloud]]|DataLeaks|
|2019.11.21|Federal News Network|[[Goodrich overcame naysayers, doubters to advance cloud security|https://federalnewsnetwork.com/ask-the-cio/2019/11/goodrich-overcame-naysayers-doubters-to-advance-cloud-security/]]|Misc|
|2019.11.21|IT Pro Poral|[[Monitoring multi-cloud environments|https://www.itproportal.com/features/monitoring-multi-cloud-environments/]]|Monitoring|
|2019.11.21|//Security Intelligence//|[[5 Cloud Security Considerations to Ensure a Successful Migration|https://securityintelligence.com/posts/5-cloud-security-considerations-to-ensure-a-successful-migration/]]|Migration|
|2019.11.21|//FireEye//|[[The Cloud Revolution and the Future of the SOC|https://www.fireeye.com/blog/products-and-services/2019/11/cloud-revolution-and-the-future-of-the-soc.html]] ([[podcast|https://www.hipcast.com/podcast/HqmqyRZs]] [[mp3|https://fireeyeinc.hipcast.com/download/fireeyeinc-20191119120146-2659.mp3]])|SOC|
|2019.11.21|//Caylent//|[[Top Secrets Management Tools Compared|https://caylent.com/top-secrets-management-tools-compared]]|Secret_Management|
|2019.11.21|//Respond//|[[Who Needs a SIEM with All These Cloud Services Options?|https://respond-software.com/blog/siem-cloud-service-options/]]|SIEM|
|>|>|>|!2019.11.20|
|2019.11.20|Forbes|[[The Kubernetes Ship Has Set Sail: Is Your Security Team On Board?|https://www.forbes.com/sites/forbestechcouncil/2019/11/20/the-kubernetes-ship-has-set-sail-is-your-security-team-on-board/]]|Kubernetes|
|2019.11.20|Infosec|[[Malware overview - Graboid|https://resources.infosecinstitute.com/malware-overview-graboid/]]|Graboid|
|2019.11.20|The Register|[[Cloud nine to cloud nein: Google beefs up punters' data encryption to fend off cyber-thieves|https://www.theregister.co.uk/2019/11/20/google_cloud_next/]]|GCP|
|2019.11.21|CRN| → [[Google Cloud unveils new security capabilities|https://www.crn.com.au/news/google-cloud-unveils-new-security-capabilities-534305]]|GCP|
|2019.11.20|David Balut|[[Useful training and mindset for becoming a Cloud Security Architect|https://dawidbalut.com/2019/11/20/useful-training-and-mindset-for-becoming-a-cloud-security-architect/]]|Training|
|2019.11.20|CRN|[[Microsoft blames networking build for 365 outage|https://www.crn.com.au/news/microsoft-blames-networking-build-for-365-outage-534278]]|Azure Outage Australia|
|2019.11.20|//Security Intelligence//|[[Reimagining Security for a Multicloud World|https://securityintelligence.com/posts/reimagining-security-for-a-multicloud-world/]]|Multi_Cloud|
|2019.11.20|//Checkpoint//|[[6 DevSecOps Sessions You Won't Want to Miss at AWS Re:Invent|https://blog.checkpoint.com/2019/11/20/6-devsecops-sessions-you-wont-want-to-miss-at-aws-reinvent/]]|DevSecOps|
|2019.11.20|//Google Cloud//|[[Advancing control and visibility in the cloud|https://cloud.google.com/blog/products/identity-security/new-security-tools-for-google-cloud-and-g-suite]]|GCP|
|2019.11.20|//INAP//|[[New Survey: IT Professionals Want to Embrace Cloud Services, Update IT Infrastructure and Expand Job Roles|https://www.inap.com/press-release/state-it-infrastructure-management-2019/]]|Report|
|2019.11.20|//INAP//| → [[New Survey Report: The State of IT Infrastructure Management|https://www.inap.com/blog/state-it-infrastructure-management-2019/]]|Report|
|>|>|>|!2019.11.19|
|2019.11.19|Information Security Forum|[[ISF Releases Using Cloud Services Securely: Harnessing Core Controls|https://vmblog.com/archive/2019/11/19/isf-releases-using-cloud-services-securely-harnessing-core-controls.aspx]]|Best_Practices Controls|
|2019.11.19|Information Security Forum| → [[Using Cloud Services Securely: Harnessing Core Controls|https://www.securityforum.org/research/using-cloud-services-securely-harnessing-core-controls/]] ([[synthèse|https://www.securityforum.org/uploads/2019/11/ISF_Using-Cloud-Services-Securely_Executive-Summary-PWS-new.pdf]])|Best_Practices Controls|
|2019.12.13|UK Authority| → [[Information Security Forum highlights threats to IoT and cloud|https://www.ukauthority.com/articles/information-security-forum-highlights-threats-to-iot-and-cloud/]]|Best_Practices Controls|
|2019.11.19|//PaloAlto Networks//|![[Docker Patched the Most Severe Copy Vulnerability to Date With CVE-2019-14271|https://unit42.paloaltonetworks.com/docker-patched-the-most-severe-copy-vulnerability-to-date-with-cve-2019-14271/]]|Docker CVE-2019-14271|
|2019.07.25|MITRE|[[CVE-2019-14271|https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14271]]|Docker CVE-2019-14271|
|2019.11.19|GBHackers on Security| → [[Most Critical Docker Vulnerability Let Hackers To Take Complete Control Over Host & All Containers Within It|https://gbhackers.com/docker-vulnerability/]]|Docker CVE-2019-14271|
|2019.11.19|CRN|[[Microsoft 365 outage strikes, lasts about four hours|https://www.crn.com.au/news/microsoft-365-outage-strikes-534267]]|Azure Outage Australia|
|2019.11.19|ZDnet|[[Nextcry : un ransomware s'attaque aux instances NextCloud|https://www.zdnet.fr/actualites/nextcry-un-ransomware-s-attaque-aux-instances-nextcloud-39894109.htm]]|NextCloud Ransomware|
|2019.11.19|//TrendMicro//|[[The New Norm - Trend Micro Security Predictions For 2020|https://www.trendmicro.com/vinfo/fr/security/research-and-analysis/predictions/2020]] ([[rapport (pdf)|https://documents.trendmicro.com/assets/rpt/rpt-the-new-norm-trend-micro-security-predictions-for-2020.pdf]]|Trends Report|
|2019.11.19|//Neuvector//|[[Serverless 101: When It Makes Sense and When It Doesn't|https://neuvector.com/cloud-security/why-serverless/]] (1/3)|Serverless|
|2019.11.19|NextGov|[[Flash Poll: Capturing the Power of Cloud|https://www.govexec.com/insights/reports/flash-poll-capturing-power-cloud/161239/]]|Survey|
|2019.11.19|//AWS//|[[Enabling a Threat Hunting Capability in AWS (pdf)|https://pages.awscloud.com/rs/112-TZM-766/images/How-to-Build-a-Threat-Hunting-Capability-in-AWS_Whitepaper.pdf]]|Threat_Hunting|
|2019.11.21|//AWS//| → [[How to Build a Threat Hunting Capability in AWS (pdf)|https://pages.awscloud.com/rs/112-TZM-766/images/How-to-Build-a-Threat-Hunting-Capability-in-AWS_Slides.pdf]]|Threat_Hunting|
|>|>|>|!2019.11.18|
|2019.11.18|Silicon.fr[>img[iCSF/flag_fr.png]]|[[Services Cloud : Microsoft veut appliquer la conformité au RGPD partout|https://www.silicon.fr/services-cloud-microsoft-veut-appliquer-la-conformite-rgpd-partout-326317.html]]|Microsoft GDPR|
|2019.11.18|//Microsoft//| → [[Introducing more privacy transparency for our commercial cloud customers|https://blogs.microsoft.com/eupolicy/2019/11/18/introducing-privacy-transparency-commercial-cloud-customers/|https://blogs.microsoft.com/eupolicy/2019/11/18/introducing-privacy-transparency-commercial-cloud-customers/]]|Microsoft GDPR|
|2019.11.18|The Register| → [[You're about to gouda major change in Microsoft cloud security after Redmond agrees to go Dutch on data|https://www.theregister.co.uk/2019/11/18/microsoft_gdpr_moj_deal/]]|Microsoft GDPR|
|2019.11.18|CBR Online| → [[Microsoft Buckles Under EU Pressure: Changes Cloud Contracts to Reflect "Data Controller" Role|https://www.cbronline.com/news/microsoft-cloud-terms]]|Microsoft GDPR|
|2019.11.19|Le Monde Informatique[>img[iCSF/flag_fr.png]]| → [[Microsoft révise ses contrats de services cloud pour l'Union européenne|https://www.lemondeinformatique.fr/actualites/lire-microsoft-revise-ses-contrats-de-services-cloud-pour-l-union-europeenne-77118.html]]|Microsoft GDPR|
|2019.11.18|DZone|![[The Complete Docker Collection|https://dzone.com/articles/the-complete-docker-collection-tutorials]]|Docker Tutorials|
|2019.11.18|DZone|[[Containers vs. Serverless|https://dzone.com/articles/containers-vs-serverless]]|Containers Serverless|
|2019.11.18|TechBeacon|[[Why you should shift your cloud security strategy up stack|https://techbeacon.com/security/why-you-should-shift-your-cloud-security-strategy-stack]]|Strategy|
|2019.11.18|Shivbihari Pandey|[[Million Users PII Leak Data Leak|https://medium.com/bugbountywriteup/million-users-pii-leak-attack-288c5e37b283]]|Data_Leak|
|2019.11.18|//Gremlin//|[[Simple Kubernetes Targeting for Your Chaos Experiments|https://www.gremlin.com/blog/simple-kubernetes-targeting-for-your-chaos-experiments/]]|Kubernetes Chaos_Engineering|
|2019.11.18|BetaNews|[[Chaos engineering platform improves Kubernetes container reliability|https://betanews.com/2019/11/18/chaos-engineering-kubernetes/]]|Kubernetes Chaos_Engineering|
|2019.11.18|//Threatpost//|[[Office 365 Admins Targeted in Ongoing Phishing Scam|https://threatpost.com/office-365-admins-phishing/150352/]]|O365 Phishing|
|2019.11.18|//Sysdig//|[[Announcing the Cloud Native Security Hub|https://sysdig.com/blog/cloud-native-security-hub/]]|Sharing Configurations|
|2019.11.18|//Cavirin//|![[Cavirin Free for CIS benchmark now available on AWS and GCP|https://www.helpnetsecurity.com/2019/11/18/cavirin-free/]]|Benchmarking|
|2019.11.18|//Cavirin//| → [[Cavirin Platform Comparison|https://www.cavirin.com/environments/cavirin-free.html]]|Benchmarking|
|2019.11.28|//Tripwire//|[[Security for Cloud Services: SaaS Deep Dive|https://www.tripwire.com/state-of-security/security-data-protection/cloud/security-cloud-services-saas-deep-dive/]] (1/3)|SaaS|
|2019.11.18|//DataDog//|[[8 Facts about Real-World Container Use|https://www.datadoghq.com/container-report/]]|Containers Survey|
|2019.11.18|//WatchGuard//|[[2020 Security Predictions: Ransomware Targets the Cloud|https://www.secplicity.org/2019/11/18/2020-security-predictions-ransomware-targets-the-cloud/]]|Ransomware|
|2019.11.18|Nino Crudele|![[The three most effective and dangerous cyberattacks to Azure and countermeasures (part 3 - The privilege escalation)|https://ninocrudele.com/the-three-most-effective-and-dangerous-cyberattacks-to-azure-and-countermeasures-part-3-the-privilege-escalation]] (3/3)|Azure Attacks CounterMeasurement||
|2019.11.18|//Microsoft Azure//|![[CVE-2019-1372 - Azure Stack Remote Code Execution Vulnerability|https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1372]]|Azure Vulnerability CVE-2019-1372|
|2019.11.18|//CyberArk Azure//|[[Four Ways to Keep Kubernetes’ Secrets Secret|https://www.conjur.org/blog/four-ways-to-keep-kubernetes-secrets-secret/]]|Kubernetes Secrets|
[>img(200px,auto)[iCSF/CCSEP2019.png]]Pour s'inscrire à la ''Cloud & Cyber Security Expo'' et disposer une deuxième aperçu du programme des conférences gratuites :

Suivez le lien → ''[[CloudSecurityAlliance.fr/go/jbls|https://CloudSecurityAlliance.fr/go/jbls]]''

[img(auto,60px)[iCSF/CCSA19h.jpg][https://CloudSecurityAlliance.fr/go/jbls]]
!CSA Congress EMEA 2019
[>img(250px,auto)[iCSA/201911DE-Berlin.jpg]]Après Amsterdam en 2012, et Madrid en 2016, le ''CSA Congress EMEA'' se déroulera à Berlin du 20 et 21 novembre 2019, après 2 jours de formations CSA
La [[Cloud Security Alliance]] est donc fière d'accueillir le Congrès 2019 de l'EMEA dans les locaux de son nouveau siège européen de Berlin.
Cette conférence de 4 jours comprendra 2 jours de formations, puis 2 jours de sessions de présentations et des possibilités de réseautage pour les professionnels de la sécurité du Cloud. Les participants pourront assister à un large éventail de présentations et de discussions sur des sujets d'actualité en matière de recherche, développement, pratiques et exigences liées à la sécurité dans le Cloud.
Cette année marque le dixième anniversaire de la CSA. Depuis sa création, la CSA s'est consacrée à la définition et à la sensibilisation aux bonnes pratiques afin d'assurer un environnement informatique dans le Cloud sécurisé partout dans le monde. Le congrès CSA EMEA est l'occasion pour nous de réfléchir aux expériences acquises par les entreprises et les fournisseurs alors que le Cloud est devenu le principal système informatique prédominant. Nous explorerons également de nouvelles frontières qui accélèrent le changement en matière de sécurité de l'information, telles que l'intelligence artificielle, le blockchain et l'IoT.
__Agenda :__[>img(250px,auto)[iCSA/JBICE.jpg]]
* Lundi 18 et mardi 19 novembre : formations
** ''RGPD'' : les 18 et 19
** ''CCSK'' : le 18
** ''Cloud Governance & Compliance Training Course'' : le 19
* Mercredi 20 et jeudi 21 novembre : le ''CSA Congress EMEA''
__Lieu :__
* Hotel Adlon Kempinski — Unter den Linden 77, 10117 Berlin, Germany
* Lien : ''[[CloudSecurityAlliance.fr/go/jBjH/|https://cloudsecurityalliance.fr/go/jBjH/]]''
__Appel à présentations :__ --[[ici|2019.03.30 - CSA Congress EMEA 2019 - Appel à présentations]]-- clôturé.
Pour en savoir plus et s'incrire :
* Lien → ''[[CloudSecurityAlliance.fr/go/jBjE/|https://cloudsecurityalliance.fr/go/jBjE/]]''
!Communiqué de presse "//CSA's Certificate of Cloud Computing Knowledge Plus Labs Are Now Available on Microsoft Azure Cloud Platform //"
[>img(200px,auto)[iCSA/J73CCSK.png]]
<<<
//Expansion gives Microsoft users equal access and functionality on the Azure platform

''SEATTLE and BERLIN - CSA EMEA CONGRESS - Nov. 20, 2019'' - The ''Cloud Security Alliance'' (''CSA''), the world's leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today announced that the hands-on labs available as part of the ''Certificate of Cloud Security Knowledge'' ([[CCSK]]) ''Plus'' coursework are now available on the ''Microsoft Azure'' cloud platform. Previously available only on ''Amazon Web Services'' (''AWS''), now Microsoft users will have equal access and functionality on the Azure platform, expanding the number of users who can now benefit from ''CCSK'' training and demonstrate their technical knowledge, skills, and abilities to use controls tailored to the cloud effectively.

"We're extremely excited to be able to expand the availability of our ''CCSK Plus'' training to ''Microsoft Azure'' cloud platform users looking to establish a baseline of security best practices when dealing with a broad array of responsibilities, from cloud governance to configuring technical security controls" said Ryan Bergsma, Training Program Director, ''CSA''.

The lecture-only ''CCSK Foundation'' course begins with the fundamentals, then increases in complexity as it works through all 16 domains of the ''CSA Security Guidance'', recommendations from the ''European Union Agency for Network & Information Security'' (''ENISA''), and an overview of the ''Cloud Controls Matrix'' (''CCM'').

The ''CCSK Plus'' includes expanded material and offers extensive hands-on activities that reinforce classroom instruction. During the lab sessions, students engage in a scenario of bringing a fictional organization securely into the cloud, allowing them to apply their knowledge by performing a series of activities that would be required in a real-world ''Microsoft Azure'' cloud platform or ''AWS'' environments.

Regardless of whether a student opts to prepare with the ''CCSK Foundation'' or the 'CCSK Plus'' course, the vendor-neutral ''CCSK'' tests for a broad foundation of cloud security knowledge, covering such topics as architecture, governance, compliance, operations, encryption, and virtualization. Those interested in taking the exam can also choose to take advantage of a variety of ''CCSK'' training programs, including free self-study prep courses, in-person training sessions, and instructor-led online classes. To date, thousands of IT and security professionals have upgraded their skillsets and careers by obtaining the ''CCSK''.The exam is also covered under the U.S. Dept. of Veterans Affairs GI Bill®.

Among the benefits of earning the ''CCSK'' are:
* Proven competency in key cloud security issues through an organization that specializes in cloud research
* Increased employment opportunities by filling the skills-gap for cloud-certified professionals
* Demonstrated technical knowledge, skills, and abilities to use controls tailored to the cloud effectively
* Ability to establish a baseline of security best practices when dealing with a broad array of responsibilities, from cloud governance to configuring technical security controls
Serves as a complement to other credentials//
<<<
&rArr; Lire le [[communiqué de presse|https://CloudSecurityAlliance.fr/go/jbka/]] sur le site de la CSA.
Dans le cadre du Congrès Européen du CSA, 4 nouveaux documents ont été publiés ou mis à jour :
* "''Beyond the General Data Protection Regulation (GDPR)''"
<<<
//Data residency insights from around the world. This study reveals the top data protection concerns and strategies of more than 800 senior business professionals from eight countries and a range of industries. Beyond the European Union's General Data Protection Regulation (GDPR) and other regulatory developments, enterprises think data privacy can create competitive advantage. What drives their decisions and investments in data management? Do they place their faith in cloud providers? Are they prepared to meet regulatory mandates and exceed customer expectations?//
<<<
** ⇒ https://cloudsecurityalliance.org/artifacts/beyond-the-general-data-protection-regulation-gdpr/
* "''Code of Conduct (CoC): Statement of Adherence 3rd Party Certification''"
<<<
//CSA PLA Code of Conduct for GDPR Compliance provides a consistent and comprehensive framework for complying with the EU's GDPR. The CSA PLA Code of Conduct for GDPR Compliance is designed to be an appendix to a Cloud Services Agreement to describe the level of privacy protection that a Cloud Service Provider will provide.//
<<<
** ⇒ https://cloudsecurityalliance.org/artifacts/code-of-conduct-coc-statement-of-adherence-3rd-party-certification/
* "''PLA Code of Conduct (CoC): Statement of Adherence Self-Assessment''"
<<<
//CSA PLA Code of Conduct for GDPR Compliance provides a consistent and comprehensive framework for complying with the EU's GDPR. The CSA PLA Code of Conduct for GDPR Compliance is designed to be an appendix to a Cloud Services Agreement to describe the level of privacy protection that a Cloud Service Provider will provide.//
<<<
** ⇒ https://cloudsecurityalliance.org/artifacts/pla-code-of-conduct-coc-statement-of-adherence-self-assessment/
* "''Guidance for submitting the CSA Code of Conduct (CoC) for GDPR Compliance Self-Assessment''"
<<<
//The CSA CoC for GDPR Compliance Self-Assessment is the voluntary publication of a CSP's self-assessment results based on the requirements specified in the PLA Code of Practice (CoP).//
<<<
** ⇒ https://cloudsecurityalliance.org/artifacts/guidance-for-submitting-the-csa-code-of-conduct-coc-for-gdpr-compliance-self-assessment/
!"//Colorado Chapter Forum 2019 Presentations//"
[>img(auto,150px)[iCSA/JB7-USCO.jpg]][>img(auto,150px)[iCSA/IB8-USCO.jpg]]Le ''Forum CSA du chapitre du Colorado'' s'est tenu à Denver le 7 novembre 2019.

Les 7 présentations sont maintenant disponibles en téléchargement :
* "''Change is Simply an Act of Survival''" par Bil Harmer
* "''Data Protection Controls for the Cloud''" par Toby Zimmerer
* "''Identity Round Robin Workshop Serverless''" par AWS Security
* "''Taking Compliance to the Cloud''" par Tim Weil
* "''Attackers Battle for Hijacked Resources''" par James Condon
* "''Are Your Cloud Servers Under Attack''" par Brian Hileman
* "''Shared Responsibility Model in the Age of Cloud''" par Janelle Hsia

Les présentations peuvent être téléchargées individuellement ou en une seule fois.
Lien de téléchargement du paquet complet &rArr; ''[[CloudSecurityAlliance.fr/go/jbip/|https://CloudSecurityAlliance.fr/go/jbip/]]
!1 - Les nouveautés CSA de la semaine du 11 au 17 novembre 2019
* Publication : Nouvelle version 3.1 de la ''CAIQ''+++*[»]> <<tiddler [[2019.11.15 - Publication : CAIQ version 3.1]]>>=== [>img[iCSF/cloud-security-alliance-fr.png]]
* Blog : Évolution des Technologies et Simplification+++*[»]> <<tiddler [[2019.11.15 - Blog : Evolution des Technologies et Simplification]]>>=== 
* Blog : Les principales erreurs de configuration à éviter+++*[»]> <<tiddler [[2019.11.14 - Blog : 4 erreurs de configuration]]>>=== 
* Actu : Nouvelle ''demande de validation de la traduction en français de 3 documents CSA'' (CCM, CAIQ et PLA CoC)+++*[»]> <<tiddler [[2019.11.13 - Demande de validation de la traduction en français de 3 documents CSA]]>>=== 
!2 - Veille Web
La +++*[Veille Web]> <<tiddler [[2019.11.17 - Veille Hebdomadaire - 17 novembre]]>>=== avec plus de 60 liens
* Rapports : Barracuda Networks, Blackblaze, Centrify, Firemon, ThousandEyes+++*[»]>
|2019.11.13|//ThousandEyes//|[[ThousandEyes Annual Research Report Reveals Notable Performance Variations Between AWS, GCP, Azure, Alibaba and IBM Cloud|https://vmblog.com/archive/2019/11/13/thousandeyes-annual-research-report-reveals-notable-performance-variations-between-aws-gcp-azure-alibaba-and-ibm-cloud.aspx]] ([[rapport|https://www.thousandeyes.com/resources/cloud-performance-benchmark-report-november-2019]])|Report|
=== 
* Conférence : future présentation sur les vulnérabilités liées aux APIs à la BlackHat Europe
* Pannes et attaques : nouveaux prestataires Cloud attaqués par des ransomawares
* Divers : retour sur la vulnérabilité "baseStricker" sur O365, Chaos Engineering pour Kubernetes, Phishing O365, traitement d'incidents
!3 - Conférences et Salons
* Le programme de la ''Cloud & Cyber Security Expo'' des ''27 et 28 novembre'' à Paris est partiellement disponible :
** ''Deuxième'' teaser et inscription gratuite+++*[»]> <<tiddler [[2019.11.01 - Cloud & Cyber Security Expo - Inscription et Extrait du Programme (2/3)]]>>=== 
** Animation d'une table ronde sur la ''Cyber-Résilence dans le Cloud''+++*[»]> <<tiddler [[2019.10.07 - Cloud & Cyber Security Expo les 27 et 28 novembre 2019]]>>=== 
|!Novembre|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2019.11.17|
|2019.11.17|//Tripwire//|[[MITRE ATT&CK October Update: Extending to the Cloud|https://www.tripwire.com/state-of-security/security-data-protection/cloud/mitre-attck-extending-cloud/]]|MITRE|
|2019.11.17|//Tripwire//|[[How to Implement an Efficient Cloud Security Strategy: The Experts Guide|https://www.tripwire.com/state-of-security/security-data-protection/cloud/efficient-cloud-security-strategy-experts-guide/]]|Strategy|
|>|>|>|!2019.11.16|
|2019.11.16|Ars Technica|[[Breach affecting 1 million was caught only after hacker maxed out target's storage|https://arstechnica.com/information-technology/2019/11/breach-affecting-1-million-was-caught-only-after-hacker-maxed-out-targets-storage/]]|DataBreach InfoTrax|
|>|>|>|!2019.11.15|
|2019.11.15|Silicon.fr[>img[iCSF/flag_fr.png]]|[[Cloud du Pentagone : face à Microsoft, Amazon contre-attaque pour JEDI|https://www.silicon.fr/cloud-pentagone-microsoft-amazon-contre-attaque-jedi-326209.html]]|Government JEDI|
|2019.11.15|Informatique News[>img[iCSF/flag_fr.png]]| → [[Amazon conteste le choix d'Azure sur le contrat JEDI|https://www.informatiquenews.fr/amazon-conteste-le-choix-de-microsoft-sur-le-contrat-jedi-64729]]|Government JEDI|
|2019.11.15|Breaking Defense| → [[Amazon's Big JEDI Gamble ANALYSIS|https://breakingdefense.com/2019/11/amazons-big-jedi-gamble-analysis/]]|Government JEDI|
|2019.11.15|Container Journal|![[5 Ways to Chaos Test Kubernetes|https://containerjournal.com/topics/container-security/5-ways-to-chaos-test-kubernetes/]]|Kubernetes Chaos_Engineering|
|2019.11.15|//Vanson Bourne//|[[Cloud services backup: survey finds major gap between perceptions and realities|https://www.continuitycentral.com/index.php/news/technology/4627-cloud-services-backup-survey-finds-major-gap-between-perceptions-and-cloud-realities]] ([[rapport .pdf|https://www.4sl.com/wp-content/uploads/2019/11/research-report-nov-2019.pdf]])|Backups|
|2019.11.15|Bleeping Computer|[[New NextCry Ransomware Encrypts Data on NextCloud Linux Servers|https://www.bleepingcomputer.com/news/security/new-nextcry-ransomware-encrypts-data-on-nextcloud-linux-servers/]]|NextCloud Ransomware|
|2019.11.15|Nino Crudele|![[The three most effective and dangerous cyberattacks to Azure and countermeasures (part 2 - attack the Azure Storage Service)|https://ninocrudele.com/the-three-most-effective-and-dangerous-cyberattacks-to-azure-and-countermeasures-part-2-attack-the-azure-storage-service]] (2/3)|Azure Attacks CounterMeasurement||
|2019.11.15|Nino Crudele|![[The three most effective and dangerous cyberattacks to Azure and countermeasures (part 1 - attack all the public and private IP addresses in Azure)|https://ninocrudele.com/the-three-most-effective-and-dangerous-cyberattacks-to-azure-and-countermeasures-part-1-attack-all-the-public-and-private-ip-addresses-in-azure]] (1/3)|Azure Attacks CounterMeasurement||
|>|>|>|!2019.11.14|
|2019.11.14|Wall Street Journal|[[Amazon to Protest Pentagon Contract Award to Microsoft|https://www.wsj.com/articles/amazon-to-protest-pentagon-contract-award-to-microsoft-11573769321]]|Government JEDI|
|2019.11.14|Silicon Angle| → [[Amazon protests Pentagon's cloud contract award, citing 'unmistakable bias'|https://siliconangle.com/2019/11/14/amazon-protests-pentagons-cloud-computing-contract-award-citing-unmistakable-bias/]]|Government JEDI|
|2019.11.14|CBR Online|[[Codeanywhere Blames GCP Outage for Vanished Work|https://www.cbronline.com/news/codeanywhere-gcp-projects-missing]]|GCP Outage|
|2019.11.14|Medium|[[AWS Cyber Range — The Ultimate Cyber Lab Overview|https://medium.com/aws-cyber-range/aws-cyber-range-the-ultimate-cyber-lab-overview-3affcca1c842]]|Exercise Tools|
|2019.11.14|//ForePaas//[>img[iCSF/flag_fr.png]]|[[Prêt pour le cloud souverain 2.0 ?|https://www.journaldunet.com/solutions/expert/72072/pret-pour-le-cloud-souverain-2-0.shtml]]|Sovereign_Cloud|
|2019.11.14|//Microsoft//|![[Changing security incident response by utilizing the power of the cloud-DART tools, techniques, and procedures: part 1|https://www.microsoft.com/security/blog/2019/11/14/security-incident-response-utilizing-cloud-dart-tools-techniques-procedures-part-1/]] (1/3)|Incident_Response|
|2019.11.14|//PhishLabs//|[[Active Office 365 Credential Theft Phishing Campaign Targeting Admin Credentials|https://info.phishlabs.com/blog/active-office-365-phishing-campaign-targeting-admin-credentials]]|O365 Phishing|
|2019.11.16|Bleeping Computer| → [[Microsoft Office 365 Admins Targeted by Ongoing Phishing Campaign|https://www.bleepingcomputer.com/news/security/microsoft-office-365-admins-targeted-by-ongoing-phishing-campaign/]]|O365 Phishing|
|2019.11.14|//Tripwire//|[[Aligning SECaaS with Your Organization's Cloud Security Needs|https://www.tripwire.com/state-of-security/security-data-protection/cloud/aligning-secaas-organizations-cloud-security-needs/]]|SECaaS|
|2019.11.14|//Microsoft//|[[Azure Container Registry: Preview of diagnostic and audit logs|https://azure.microsoft.com/en-us/blog/azure-container-registry-preview-of-diagnostics-and-audit-logs/]]|Azure Containers Tools|
|2019.11.14|//LogRythm//|[[Examining the baseStriker Vulnerability|https://logrhythm.com/blog/examining-the-basestriker-vulnerability/]]|O365 Vulnerability baseStricker|
|2019.11.14|//Compare The Cloud//|[[Cloud and Web Application Security: Growing Confidence and Emerging Gaps|https://www.comparethecloud.net/articles/cloud-and-web-application-security-growing-confidence-and-emerging-gaps/]]|Confidence|
|2019.11.14|//Cyware//|![[Many public cloud infrastructures suffer from serious security loophole, researchers say|https://cyware.com/news/many-public-cloud-infrastructures-suffer-from-serious-security-loophole-researchers-say-4c79a693]]|Vulnerability|
|2019.11.14|//AlienVault//|[[Cybersecurity: top of mind Q and A|https://www.alienvault.com/blogs/security-essentials/cybersecurity-questions-and-answers]]|Misc|
|2019.11.14|//Sysdig//|[[Securing Google Cloud Run serverless workloads|https://sysdig.com/blog/securing-google-cloud-run/]]|GCP|
|2019.11.14|//Sensu//|[[Kubernetes 101|https://blog.sensu.io/kubernetes-101]]|Kubernetes|
|2019.11.14|//Syxsense//|[[Worried about Cloud Security? Why On-Premise is More Dangerous|https://www.syxsense.com/why-on-premise-is-more-dangerous]]|Risks|
|2019.11.14|//Barracuda Networks//|[[Growing confidence and emerging gaps in cloud security|https://blog.barracuda.com/2019/11/14/growing-confidence-emerging-gaps-cloud-security/]]|Survey|
|>|>|>|!2019.11.13|
|2019.11.13|Economie Numérique[>img[iCSF/flag_fr.png]]|[[Cloud souverain français : vers un protectionnisme de la donnée ?|http://blog.economie-numerique.net/2019/11/13/cloud-souverain-francais-vers-un-protectionnisme-de-la-donnee/]]|Sovereign_Cloud|
|2019.11.13|ComputerWeekly|[[Taking responsibility for security in the cloud|https://www.computerweekly.com/feature/Taking-responsibility-for-security-in-the-cloud]]|Responsibility|
|2019.11.13|GBHackers on Security|[[Telegram MTProxy Used to Launch DDoS Attack Against Cloud Service Provider Arvan - Peaks Up to 5,000 Requests Per Second|https://gbhackers.com/telegram-mtproxy/]]|DDoS|
|2019.11.13|Breaking Defense|[[Can DoD Get Speed & Security With The Cloud?|https://breakingdefense.com/2019/11/can-dod-get-speed-security-with-the-cloud/]]|DevSecOps|
|2019.11.13|Silicon Angle|[[Google launches new service for monitoring multicloud networks|https://siliconangle.com/2019/11/13/google-launches-new-service-monitoring-multicloud-networks/]]|GCP|
|2019.11.13|//Avanan//|[[What Is a Cloud Access Security Broker (CASB)?|https://www.avanan.com/blog/what-is-a-casb]]|CASB|
|2019.11.13|//AlertLogic//|[[Managing Cybersecurity During Cloud Migration|https://blog.alertlogic.com/managing-cybersecurity-during-cloud-migration/]]|Migration|
|2019.11.13|//Nutanix//[>img[iCSF/flag_fr.png]]|[[Enterprise Cloud Index : 73 % des entreprises rapatrient leurs applications du cloud public vers le cloud privé|http://www.globalsecuritymag.fr/Enterprise-Cloud-Index-73-des,20191114,92735.html]]|Report|
|2019.11.13|//ThousandEyes//|[[ThousandEyes Annual Research Report Reveals Notable Performance Variations Between AWS, GCP, Azure, Alibaba and IBM Cloud|https://vmblog.com/archive/2019/11/13/thousandeyes-annual-research-report-reveals-notable-performance-variations-between-aws-gcp-azure-alibaba-and-ibm-cloud.aspx]] ([[rapport|https://www.thousandeyes.com/resources/cloud-performance-benchmark-report-november-2019]])|Report|
|2019.11.13|//ThousandEyes//|[[Top Takeaways from the Cloud Performance Benchmark|https://blog.thousandeyes.com/top-takeaways-cloud-performance-benchmark/]]|Performance|
|2019.11.18|CBR Online| → [[The Cloud Providers Ranked by Network Performance|https://www.cbronline.com/news/fastest-cloud-thousandeyes]]|Performance|
|2019.11.13|//Microsoft//|[[The refreshed Azure AD Identity Protection is now generally available|https://techcommunity.microsoft.com/t5/Azure-Active-Directory-Identity/The-refreshed-Azure-AD-Identity-Protection-is-now-generally/ba-p/1002916]]|AzureAD|
|2019.11.13|//Microsoft//|[[Azure Container Registry: preview of repository-scoped permissions|https://azure.microsoft.com/en-us/blog/azure-container-registry-preview-of-repository-scoped-permissions/]]|Azure Container Registry|
|2019.11.13|//Akamai//|[[Security at the Edge - What is Gartner's SASE & why does it matter?|https://blogs.akamai.com/2019/11/security-at-the-edge-what-is-gartners-sase-why-does-it-matter.html]]|SASE|
|2019.11.13|DevOps|[[Five Microservices Worst Practices|https://devops.com/five-microservices-worst-practices/]]|Microservices Best_Practices|
|2019.11.13|//PaloAlto Networks//|![[10 Tenets of Effective SASE Solution to Secure Cloud-Enabled Organization|https://www.paloaltonetworks.com/resources/ebooks/the-10-tenets-of-an-effective-sase-solution]]|SASE|
|>|>|>|!2019.11.12|
|2019.11.12|Le Monde Informatique[>img[iCSF/flag_fr.png]]|[[Les développeurs, insoupçonnés maillons faibles de la sécurité des clouds|https://www.lemondeinformatique.fr/actualites/lire-les-developpeurs-insoupconnes-maillons-faibles-de-la-securite-des-clouds-77046.html]]|SecDevOpsDev|
|2019.11.12|Information Security Forum|[[ISF Announces Release of Securing the IoT: Taming the Connected World|https://vmblog.com/archive/2019/11/12/isf-announces-release-of-securing-the-iot-taming-the-connected-world.aspx]]|IoT|
|2019.11.12|//Blackblaze//|[[Backblaze Hard Drive Stats Q3 2019|https://www.backblaze.com/blog/backblaze-hard-drive-stats-q3-2019/]]|Reliability|
|2019.11.12|//Uptycs//|![[Conducting A Vulnerability Assessment: A Step-By-Step Guide For Linux Workloads In The Cloud|https://www.uptycs.com/blog/how-to-conduct-a-vulnerability-assessment]]|Vulnerability_Assessment|
|2019.11.12|//PaloAlto Networks//|[[Is CASB Alone Enough? Long Live SASE|https://blog.paloaltonetworks.com/2019/11/cloud-casb-sase/]]|SASE|
|2019.11.12|//Trustwave//|[[3 Multi-Cloud Environment Challenges to Overcome|https://www.trustwave.com/en-us/resources/blogs/trustwave-blog/3-multi-cloud-environment-challenges-to-overcome/]]|Multi_Cloud|
|2019.11.12|//Lob//|[[Detecting Manual AWS Console Actions|https://arkadiyt.com/2019/11/12/detecting-manual-aws-console-actions/]]|AWS_Console|
|2019.11.12|//Sysdig//|[[Incident response in Kubernetes with Sysdig's Activity Audit|https://sysdig.com/blog/cloud-native-incident-response/]]|Kubernetes Incident_Response|
|2019.11.12|//Centrify//[>img[iCSF/flag_fr.png]]|[[Comment sécuriser l'accès aux opérations de cloud : 5 conseils|https://www.undernews.fr/reseau-securite/comment-securiser-lacces-aux-operations-de-cloud-5-conseils.html]]|Zero_Trust|
|2019.11.12|//Cyberark//|[[New Open Source Offerings Simplify Securing Kubernetes|https://www.cyberark.com/blog/new-open-source-offerings-simplify-securing-kubernetes/]]|Kubernetes Tools|
|2019.11.12|//Firemon//|[[State of the Firewall Report 2019: Zero-Touch Automation is More Headline than Reality, Network Complexity and Lack of Visibility Are Key Issues|https://www.firemon.com/state-of-the-firewall-report-2019/]] ([[rapport|https://www.firemon.com/2019-state-of-the-firewall-report/]])|Report|
|2019.11.12|//Fugue//|[[Cloud Network Security 101: AWS VPC Endpoints|https://www.fugue.co/blog/network-security-vpc-endpoints-101]]|VPC|
|2019.11.12|//3DS Outscale//[>img[iCSF/flag_fr.png]]|[[Failles Intel : des impacts à redouter chez 3DS OUTSCALE ?|https://blog.outscale.com/fr/failles-intel-des-impacts-a-redouter-chez-3ds-outscale]]|Vulnerabilities|
|>|>|>|!2019.11.11|
|2019.11.11|Help Net Security|![[Speeding MTTR when a third-party cloud service is attacked|Outage Best_Practices|
|2019.11.11|//XM Cyber//|![[Researchers Find New Approach in Attacking Cloud Infrastructure|https://xmcyber.com/researchers-find-new-approach-in-attacking-cloud-infrastructure/]]|APIs|
|2019.11.11|BlackHat Europe| → [[Inside Out - The Cloud Has Never Been So Close|https://www.blackhat.com/eu-19/briefings/schedule/index.html#inside-out---the-cloud-has-never-been-so-close-17797]]|APIs|
|2019.11.11|Dark Reading| → [[Researchers Find New Approach to Attacking Cloud Infrastructure|https://www.darkreading.com/cloud/researchers-find-new-approach-to-attacking-cloud-infrastructure/d/d-id/1336327]]|APIs|
|2019.11.11|//Heimdal//|[[Ransomware as a Service (RaaS) - A Contemporary Mal du siècle?|https://heimdalsecurity.com/blog/ransomware-as-a-service/]]|Ransomware|
|2019.11.11|//Smarter ASP//|[[Your hosting accounts are under attack|http://status.smarterasp.net/post/your-hosting-accounts-are-under-attack]]|Attack Ransomware|
|2019.11.11|//Cloud Management Insider//|[[SASE: A sassy future of network security in cloud defined by Gartner|https://www.cloudmanagementinsider.com/what-is-sase-secure-access-service-edge-gartner/]]|SASE|
|2019.11.11|ZDnet|[[Major ASP.NET hosting provider infected by ransomware|https://www.zdnet.com/article/major-asp-net-hosting-provider-infected-by-ransomware/]]|Attack Ransomware|
|2019.11.12|//MSSP Alert//| → [[Ransomware Attack Hits Web Hosting Provider SmarterASP|https://www.msspalert.com/cybersecurity-breaches-and-attacks/ransomware/smarterasp-hit/]]|Attack Ransomware|
|2019.11.11|//Centrify//|[[New Report from Centrify Reveals That the Majority of Organizations Still Misunderstand the Shared Responsibility Model for Cloud Security|https://www.centrify.com/about-us/news/press-releases/2019/reducing-risk-cloud-migration-report/]]|Report|
|2019.11.13|Help Net Security| → [[The leading challenge facing cloud migration projects is security|https://www.helpnetsecurity.com/2019/11/13/cloud-migration-projects/]]|Report|
|2019.11.11|//Zyxel//|[[The Role Of SaaS In Network Security|https://www.informationsecuritybuzz.com/articles/the-role-of-saas-in-network-security/]]|Network_Security|
|2019.11.11|//Edgewise Networks//|[[Thwarting Graboid and Protecting Containers with Zero Trust|https://www.cisomag.com/thwarting-graboid-and-protecting-containers-with-zero-trust/]]|Containers Zero_Trust|
|2019.11.11|//JumpCloud//|[[Why Use a Directory Service?|https://jumpcloud.com/blog/build-directory-service/]]|Directory|
|2019.11.11|//JumpCloud//|[[RADIUS Server In Azure|https://jumpcloud.com/blog/radius-server-azure/]]|Azure RADIUS|
!"//Consensus Assessment Initiative Questionnaire (CAIQ) v3.1//"
[>img(150px,auto)[iCSA/CAIQ31.png]]Publication de la nouvelle version ''CAIQ 3.1''
<<<
//Cloud Security Alliance (CSA) would like to present the next version of the Consensus Assessments Initiative Questionnaire (CAIQ) v3.1.
The CAIQ offers an industry-accepted way to document what security controls exist in IaaS, PaaS, and SaaS services, providing security control transparency.
It provides a set of Yes/No questions a cloud consumer and cloud auditor may wish to ask of a cloud provider to ascertain their compliance to the Cloud Controls Matrix (CCM).
Therefore, it helps cloud customers to gauge the security posture of prospective cloud service providers and determine if their cloud services are suitably secure.
CAIQ v3.1 represents a minor update to the previous CAIQ v3.0.1.
In addition to improving the clarity and accuracy, it also supports better auditability of the CCM controls.
The new updated version aims to not only correct errors but also appropriately align and improve the semantics of unclear questions for corresponding CCM v3.0.1 controls.
In total, 49 new questions were added, and 25 existing ones were revised.
For this new CAIQ version, CSA took into account the combined comprehensive feedback that was collected over the years from its partners, the industry and the CCM working group.//
[...]
<<<
&rArr; [[Détail|https://CloudSecurityAlliance.fr/go/jbfp/]] sur le site de la CSA.
&rArr; Fichier [[XLSX|https://CloudSecurityAlliance.fr/go/jbfx/]] sur le site de la CSA.
!"//Keeping Up With Changing Technology by Reducing Complexity//"
[>img(150px,auto)[iCSA/JBFBK.jpg]]Article de blog publié le 14 novembre 2019 — Rédigé par John DiMaria, CSA Research Fellow, Assurance Investigatory Fellow, Cloud Security Alliance
<<<
//+++*[Fox News reported]> https://www.foxbusiness.com/industrials/boeing-should-reconsider-pilots-response-time-ntsb === that in answer to the previous Boeing 737 accidents, the Federal safety officials say, "Boeing should consider how cockpit confusion can slow the response of pilots who are dealing with the kind of problem that likely caused two airliners to crash in the past year."
"They suggest that Boeing underestimated the time it takes for pilots to diagnose and react when they are being bombarded by multiple, cascading warning alerts."
Think about it; they were bombarded by multiple, cascading warning alerts that taxed their ability to respond in a timely fashion. There were two issues there:
# Too much complexity was built into the system
# They underestimated the time it takes to diagnose and react.
''The more complex systems become, the less secure they become, even though security technologies improve.''
While there's nothing wrong with improving technology, we always need to consider the human element since leveraging multiple systems can create a fragmented environment. Underlying the current security failings is a critical, under appreciated problem -- fragmentation.

''Root Cause of Cost Increase & Poor Data Governance''
Fragmentation is at the heart of the ineffectiveness of our efforts to continue to improve. Fragmentation happens when we focus on individual parts without adequately appreciating their relation to the evolving whole. This unbalance is one of the root causes of the more obvious security issues of continued cost increases, poor data governance, and inadequate planning. Not addressing this problem is essential because fragmentation leads to well-intentioned actions that sometimes have unintended consequences that often make things worse.
''Unintended consequences of fragmentation:''
* Inefficiency
** Narrowly focused programs and services is an excellent strategy for reducing the security budget, but it is not a strategy for efficiently implementing an effective holistic information/cybersecurity system. Efficient strategic planning should analyze and prioritize based on a holistic analysis of risk. This analysis should include all applicable elements of people, process and technology. It should hone in on the critical scope and then implement the applicable controls that are justified based on that risk assessment.
* Ineffectiveness
** It is no fluke that technologically has advanced, yet security breaches continue to grow exponentially. Risk Based Securities mid-year report noted that 2019 is on track to be the "worst year on record" for breach activity. Spending more on the parts has not improved the whole. Today many of the efforts toward improving security are directed at narrow programs with insufficient attention to the larger scope they are trying to affect. Many times scope is the problem because the scope is not "fit for purpose." The lack of an integrative way of addressing security and implementing proper controls only addresses the short-term problems and may keep costs down (for the time being) but ignores the greater objective of addressing the total system within the context of the organization.
* Commoditization
** I was on a website of an organization that was claiming "X Security Controls will stop 85% of Cyber Attacks". Not "address," not "help mitigate" but STOP! Seriously? Further, if you implement X more of the controls, you'll prevent 97% of attacks.
** Treating security as a commodity can unintentionally deemphasize the seriousness and real scope of the issue. Especially when addressing cloud security, that can be a perilous road to go down. The cloud is a dynamic environment where things are always changing, especially security threats. You have to first understand what needs to be protected and from what. Risk assessment is a real-time living process and the controls change as the environment changes. Cybersecurity is not a science; at least not yet.
** Some advertised solutions focus on delivering their well-intentioned services without consideration of their effect on the whole system or the reality that scope and specific SLA's that change the way you approach cybersecurity strategy. They also ignore how many and what controls need to be put in place. The true urgency of cybersecurity is reduced when it is treated as a commodity. Conversely, other solutions take the approach that the more complexity, the better.

''How can we start being a part of the solution?''
The CSA Cloud Control Matrix ([[CCM]]), The Consensus Assessments Initiative Questionnaire ([[CAIQ]]) and the CSA [[STAR]] Program come together as an integrated approach that helps companies understand the fundamental problem of fragmentation and how to reduce it. And the first step towards reducing fragmentation, is simply reducing complexity. Viewing security as an evolving integrated system instead of only as fragmented parts or small insignificant scopes that are not fit for purpose, can help our industry to feel hope where now there is skepticism. ''Transparency, trust and information sharing instead of detachment and isolation. Professional and corporate shared responsibility instead of narrow self-interest''.

''Here is my challenge...''
* Listen to my +++*[Podcast interview with Doctor Ron Ross; Senior Fellow at NIST]> https://www.buzzsprout.com/303731/1298485-the-growing-complexity-around-cybersecurity-and-evolving-technology-guest-dr-ron-ross-nist === "The growing complexity around cybersecurity and evolving technology."
* Take a deep dive into the [[STAR]] Program and the [[STAR]] Registry and then take a self-assessment using the CAIQ.
//
[...]
<<<
&rArr; Lire [[l'original|https://CloudSecurityAlliance.fr/go/jbfb/]] sur le blog de la CSA
!"//4 Common Cloud Misconfigurations & What To Do About Them//"
[>img(150px,auto)[iCSA/JBEBF.jpg]]Article de blog publié le 14 novembre 2019 — Rédigé par Kevin Tatum, IT Security Engineer chez ExtraHop
<<<
//In a +++*[recent report]> https://cloudsecurity.mcafee.com/cloud/en-us/forms/white-papers/wp-cloud-adoption-risk-report-iaas.html ===, McAfee uncovered the rise of Cloud-Native Breaches and the state of multi-cloud adoption. We'll define the top 4 cloud misconfiguration goofs from their list, how they can affect your organization, and what to do about them.
When it comes to personal data, the mid-2010s were a bit of a reckoning. Your credit card information, health records, and even your love life became subject to breaches. Today, nearly everyone can relate to the hassle of switching out a debit or credit card, and these issues persist-especially as enterprises move their IaaS (Infrastructure as a Service) to the cloud.
In recent years, nearly 70 percent of exposed records - 5.4 billion total - were caused by unintentional internet exposure due to misconfigured services and portals - services like Amazon Simple Storage Service, known as S3. (+++*[Luckily, S3 misconfiguration is a very avoidable issue]> https://www.extrahop.com/company/blog/2018/get-safe-smart-secure-on-aws-s3/ ===.)
As McAfee found, most of these misconfigurations go unreported and, in many cases, unnoticed.
If only 1% of IaaS issues are reported, that means a whole slew of companies inadvertently leak data or fail to report for fear of bad PR. Worse, one-quarter of the McAfee survey respondents said it takes longer than 24 hours to correct misconfigurations.
In summary, McAfee highlights significant visibility, reporting, and misconfiguration errors that are preventable. Here are the top offenders in the McAfee list and the ways they can affect your organization, followed by a remedy for these common problems.

__''4 Common Security Group Setting Misconfigurations''__

__1 -- Unrestricted Outbound Access__
Outbound traffic should always use the principle of minimalist authority. Many AWS users only configure inbound ports in security groups, but outbound ports can also be a huge security risk. Limiting outbound traffic helps direct traffic to only the applications and servers that need to communicate. This helps reduce the risk and impact of internal network scans, lateral movement, and data exfiltration.
Your servers may only need SSH or RDP inbound ports to manage them. It's rare for one of those application servers to SSH to all of the other servers in the network. Many common hacker tactics use random ports for Command and Control actions, reverse shells, or to spread malware.

__2 -- Unrestricted Access to Non-HTTP/HTTPS Ports__
Web servers are designed to host websites and web services to the internet, and they can also host other services like SSH or RDP for management or databases. But it's important to block these from the whole internet. If these ports remain improperly configured, it can open you up to attackers looking to exploit or brute force the authentication. If you open up these ports to the internet, make sure they're limited to accept traffic from particular addresses such as your office.

__3 -- Unrestricted Inbound Access on Uncommon Ports__
Some services use a high numbered TCP or UDP port to obfuscate what is running in the environment, but security through obscurity never really works. It doesn't protect you from a determined hacker or even a random internet scan. Some services also open uncommon ports without really letting you know.
Does your web server have a statistics page? Do you have PHPMyAdmin running on port 8443? Are you leaking Apache Tomcat services on port 8080? You must restrict high-level ports to only the necessary systems, and usually, that is not the internet. PHPMyAdmin on the internet makes us shudder.

__4 -- Unrestricted ICMP Access__
ICMP is a useful protocol, but leaving it open to the internet can leave you vulnerable to more straightforward, older attacks. One of the most common uses of ICMP is to use ICMP Echo to verify that your servers are online and responsive.
ICMP Echo is an excellent diagnostic tool for IT professionals. Unfortunately, it's also a great tool for hackers. A quick ping scan of the internet using Nmap or Fping can let attackers know that you have a server online, which becomes ripe for a focused attack. There are several more complicated ways to find a server on the internet, so why do a bad actor's job for them?
Attackers can use ICMP for much more than finding servers, however. As an example, a ping flood overwhelms a server with too many ICMP messages. Though simple, a ping flood is an effective type of Denial of Service attack, which becomes even more effective when multiple attackers or botnets are involved to create a Distributed Denial of Service (DDoS).
The ping sweep and ping flood may be ancient methods, but they're still put to use because they work. Do yourself a favor and block ICMP.

__''How Network Detection and Response (NDR) Can Help''__

Most cloud environments have dozens, if not hundreds, of these security risks. And really, each server needs its own set of rules.
While the ability to quickly build servers and services in the cloud has its advantages, it also comes with some of the most significant security risks. When you use default rules, it's easy to miss one rule on a single server - and if an appropriate rule is overlooked, your whole environment can quickly be compromised.
One reason cloud security has lagged so far behind traditional security is that, until very recently, network traffic in the cloud was extremely difficult to capture and parse effectively. Monitoring network communications in real time through network detection and response (NDR) is the quickest and easiest way for security teams to stay on top of complex, dynamic environments, and without NDR in the cloud, SecOps struggled to maintain the same deep visibility and rapid threat detection as is possible on-premises.
With the advent of traffic mirroring in AWS and Azure, that gap has finally begun to close.//
[...]
<<<
&rArr; Lire [[l'original|https://CloudSecurityAlliance.fr/go/jbeb/]] sur le blog de la CSA
[>img[iCSF/cloud-security-alliance-fr.png]]La [[Cloud Security Alliance]] a lancé la traduction de 3 outils majeurs dans 10 langues : allemand, danois, espagnol, italien, japonais, néerlandais, portugais, roumain, suédois, et ... français.
Il s'agit de feuilles Excel dans lesquelles il vous est demandé d'adapter les traductions ou de les commenter.
Pour chaque document, les 10 traductions sont dans un répertoire //Google Drive// dédié, et pour travailler sur la version française, il faut sélectionner le document commençant par "''FR-''"

Les 3 documents sont les suivants :
* "''Cloud Controls Matrix''" (CCM) : document "FR-CSA_CCM_v.3.0.1-09-01-2017_FINAL.xlsx"
:→ ''[[CloudSecurityAlliance.fr/go/j99c/|https://cloudsecurityalliance.fr/go/j99c/]]''
* "''Consensus Assessments Initiative Questionnaire''" (CAIQ) : document "FR-CAIQ_v3.0.1-09-01-2017_FINAL.xlsx"
:→ ''[[CloudSecurityAlliance.fr/go/j99q/|https://cloudsecurityalliance.fr/go/j99q/]]''
* "''Code of Conduct''" du "''Privacy Level Agreement''" (PLA CoC) : document "FR-CoC_GDPR_Annex_1_Compliance_Assessment_Template.xlsx"
:→ ''[[CloudSecurityAlliance.fr/go/j99p/|https://cloudsecurityalliance.fr/go/j99p/]]''

La date limite initiale était fixée en octobre 2019, mais est maintenant repoussée au ''1^^er^^ décembre 2019''.
[img(25%,1px)[iCSF/BluePixel.gif]]
!1 - Les nouveautés CSA de la semaine du 4 au 10 novembre 2019
* Publication : Présentations du ''CSA Summit'' au congrès (ISC)²+++*[»]> <<tiddler [[2019.11.04 - Publication : Présentations du CSA Summit au congrès (ISC)²]]>>=== [>img[iCSF/cloud-security-alliance-fr.png]]
* Blog : ''CMMC'', un nouveau protocole pour la conformité DoD+++*[»]> <<tiddler [[2019.11.06 - Blog : CMMC, un nouveau protocole pour la conformité DoD]]>>=== 
* Blog : Google et la ''Suprématie Quantique''+++*[»]> <<tiddler [[2019.11.06 - Blog : Google et la Suprématie Quantique]]>>=== 
* Actu : Contribution CSA à deux documents de ''l'EU-SEC sur la certification''+++*[»]> <<tiddler [[2019.11.07 - Contribution CSA à deux documents de l'EU-SEC sur la certification]]>>=== 
!2 - Veille Web
La +++*[Veille Web]> <<tiddler [[2019.11.10 - Veille Hebdomadaire - 10 novembre]]>>=== avec plus de 50 liens
* Rapports : Gurucul, Rancher Labs, Rick's Cloud, Sophos
* Conférences : présentations au BSidesCT 2019, annonces Microsoft à Ignite 2019
* Divers : sécurité des containers, retour sur le SASE du Gartner
!3 - Conférences et Salons
* Le programme de la ''Cloud & Cyber Security Expo'' des ''27 et 28 novembre'' à Paris est partiellement disponible :
** ''Deuxième'' teaser et inscription gratuite+++*[»]> <<tiddler [[2019.11.01 - Cloud & Cyber Security Expo - Inscription et Extrait du Programme (2/3)]]>>=== 
** Animation d'une table ronde sur la ''Cyber-Résilence dans le Cloud''+++*[»]> <<tiddler [[2019.10.07 - Cloud & Cyber Security Expo les 27 et 28 novembre 2019]]>>=== 
* Les inscriptions pour le ''Congrès Européen'' des ''18 au 21 novembre'' à Berlin sont toujours ouverte+++*[»]> <<tiddler [[2019.09.04 - Annonce du programme du Congrès CSA EMEA en Novembre à Berlin]]>>=== 
** Contactez-nous pour avoir une réduction sur votre inscription.+++*[»]> → [img(200px,auto)[iCSF/Email-CSA_FR.png]]=== 
|!Novembre|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2019.11.10|
|2019.11.10|BSidesCT 2019|[[Rethinking Privileged Access Management for Agile Clouds & Data Center Environments|http://www.irongeek.com/i.php?page=videos/bsidesct2019/2-01-rethinking-privileged-access-management-for-agile-clouds-data-center-environments-brian-gladstein]] ([[vidéo|http://www.youtube.com/watch?v=EMKDvB7zpf0]])|Conference Access_Management|
|2019.11.10|BSidesCT 2019|[[Event Injections: Sending Evil to the Cloud|http://www.irongeek.com/i.php?page=videos/bsidesct2019/1-02-event-injections-sending-evil-to-the-cloud-tal-melamed]] ([[vidéo|http://www.youtube.com/watch?v=NJOuXeFtgBU]])|Conference Attacks|
|2019.11.10|BSidesCT 2019|[[Building Castles in the Cloud: AWS Security and Self-Assessment|http://www.irongeek.com/i.php?page=videos/bsidesct2019/2-05-building-castles-in-the-cloud-aws-security-and-self-assessment-rami-mccarthy]] ([[vidéo|http://www.youtube.com/watch?v=W2I-b_b_-6M]])|Conference AWS|
|2019.11.10|Silicon Angle|![[As cloud security improves, a weak link emerges: people |https://siliconangle.com/2019/11/10/cloud-security-improves-weak-link-emerges-people/]]|Risks|
|>|>|>|!2019.11.08|
|2019.11.08|SANS|[[JumpStart Guide to Investigations and Cloud Security Posture Management in AWS|https://www.sans.org/reading-room/whitepapers/analyst/jumpstart-guide-investigations-cloud-security-posture-management-aws-39250]]|Investigation CSPM|
|2019.11.08|//TresorIT//|[[Should You Trust Your Cloud Storage Provider?|https://www.infosecurity-magazine.com/blogs/should-trust-cloud-storage-provider/]]|Storage|
|2019.11.08|//Sophos//|[[Exposed: Private Amazon S3 bucket exposure|https://news.sophos.com/en-us/2019/11/08/exposed-private-amazon-s3-bucket-exposure/]]|AWS Data_Leak|
|>|>|>|!2019.11.07|
|2019.11.07|Davis Wright Tremaine|[["CLOUD"s On the Horizon - How Law Enforcement Electronic Data Requests Are Going Global|https://www.dwt.com/blogs/privacy--security-law-blog/2019/11/global-law-enforcement-electronic-data-requests]]|Law_Enforcement|
|2019.11.07|The Hacker News|[[Gartner Says the Future of Network Security Lies with SASE|https://thehackernews.com/2019/11/network-security-sase.html]]|Network SASE|
|2019.11.07|//PaloAlto Networks//|[[Container Security: Vulnerability Management from Build to Run|https://blog.paloaltonetworks.com/2019/11/cloud-container-security/]]|Containers|
|2019.11.07|//Tripwire//|[[Thunder on the Horizon: 4 Security Threats for the Cloud|https://www.tripwire.com/state-of-security/risk-based-security-for-executives/connecting-security-to-the-business/thunder-horizon-4-security-threats-cloud/]]|Threats|
|2019.11.07|//Fugue//|[[Securing Cloud Environments Against Advanced Misconfiguration Risk with Fugue Best Practices|https://www.fugue.co/blog/securing-cloud-environments-against-advanced-misconfiguration-risk-with-fugue-best-practices]]|Best_Practices Framework|
|2019.11.07|//Fugue//| → [[Fugue Releases Best Practices Framework to Protect Against Advanced Cloud Misconfiguration Attacks|https://vmblog.com/archive/2019/11/07/fugue-releases-best-practices-framework-to-protect-against-advanced-cloud-misconfiguration-attacks.aspx]]|Best_Practices Framework|
|2019.11.07|//Reduxio//|[[Cloud Storage: Where Private and Public Diverge|https://vmblog.com/archive/2019/11/07/cloud-storage-where-private-and-public-diverge.aspx]]|Storage|
|2019.11.07|//JumpCloud//|[[How Cloud Services Maximize Cybersecurity|https://jumpcloud.com/blog/best-practices/cybersecurity-cloud-services/]]|Misc|
|2019.11.07|//Cloudflare//[>img[iCSF/flag_fr.png]]|[[Quoi de neuf en Francophonie?|https://blog.cloudflare.com/fr/quoi-de-neuf-en-francophonie/]]|Cloudflare|
|2019.11.07|//DS Outscale//[>img[iCSF/flag_fr.png]]|![[Le C.L.O.U.D. Act : comment échapper au radar américain ?|https://blog.outscale.com/fr/le-cloud-act-comment-echapper-au-radar-americain]]|CLOUD_Act|
|>|>|>|!2019.11.06|
|2019.11.06|Cloud Native Computing Foundation|[[Cloud Native Chaos Engineering - Enhancing Kubernetes Application Resiliency|https://www.cncf.io/blog/2019/11/06/cloud-native-chaos-engineering-enhancing-kubernetes-application-resiliency/]]|Kubernetes Chaos_Engineering Resilience|
|2019.11.06|Computer Weekly|[[Security Think Tank: Adapt security posture to your cloud model|https://www.computerweekly.com/opinion/Security-Think-Tank-Adapt-security-posture-to-your-cloud-model]]|Security_Posture|
|2019.11.06|//Rancher Labs//|[[Rancher Labs Industry Survey Shows Rapid Adoption of Containers and Kubernetes, But Challenges Remain|https://rancher.com/blog/2019/container-industry-survey-results]] ([[infographie|https://info.rancher.com/kubernetes-industry-survey-key-findings]])|Survey Kubernetes|
|2019.11.06|//Rancher Labs//| → [[Rancher Labs Industry Survey Highlights Rapid Adoption of Kubernetes for Production Workloads|https://www.businesswire.com/news/home/20191106005114/en/Rancher-Labs-Industry-Survey-Highlights-Rapid-Adoption]]|Survey Kubernetes|
|2019.11.08|Container Journal| → [[Survey Finds Kubernetes Clusters Are Multiplying|https://containerjournal.com/topics/container-ecosystems/survey-finds-kubernetes-clusters-are-multiplying/]]|Survey|
|2019.11.06|//Gurucul//|[[2020 Insider Threat Report|https://gurucul.com/2020-insider-threat-survey-report]]|Report Insider_Threats|
|2019.11.06|InfoSecurity Mag| → [[Cloud Covers Up Insider Threats|https://www.infosecurity-magazine.com/news/cloud-covers-up-insider-threats/]]|Report Insider_Threats|
|2019.11.06|Help Net Security| → [[SIEM complexity and cloud visibility put companies at risk|https://www.helpnetsecurity.com/2019/11/08/siem-complexity/]]|Report Insider_Threats|
|2019.11.06|//PaloAlto Networks//|[[The Next Generation of Network Security Is Cloud-Delivered|https://blog.paloaltonetworks.com/2019/11/cloud-next-generation-network-security/]]|Network SASE|
|2019.11.06|//Tripwire//|[[Cloud Security Threats: Escaping the Egregious Eleven - Part One|https://www.tripwire.com/state-of-security/security-data-protection/cloud/cloud-security-threats-egregious-eleven-part-one/]] (1/2)|CSA Threats|
|2019.11.04|//Microsoft//|[[Microsoft Cloud Security solutions provide comprehensive cross-cloud protection|https://www.microsoft.com/security/blog/2019/11/06/microsoft-cloud-security-solutions-provide-comprehensive-cross-cloud-protection/]]|Azure|
|2019.11.06|//ExtraHop//|[[Three Cloud Security Best Practices for 2020|https://www.sans.org/cyber-security-intelligence/2019/11/06/three-cloud-security-best-practices-for-2020]]|Best_Practices|
|2019.11.06|//ZScaler//|[[Why You Still Need a Firewall When Deploying Office 365|https://www.zscaler.com/blogs/corporate/why-you-still-need-firewall-when-deploying-office-365]]|O365|
|2019.11.05|//Bitglass//|[[Cloud Adoption 2019: A for Adoption|https://www.bitglass.com/blog/cloud-adoption-2019-a-for-adoption]] ([[téléchargement|https://pages.bitglass.com/CD-FY19Q4theCloudAdoptionReportof2019_LP.html]])|Report Bitglass|
|2019.11.06|Help Net Security|[[As more companies deploy cloud apps, they must also implement security tools|https://www.helpnetsecurity.com/2019/11/06/accessing-cloud-data-via-sso/]]|Report Bitglass|
|2019.11.06|//Microsoft//|[[Microsoft Cloud Security solutions provide comprehensive cross-cloud protection|https://www.microsoft.com/security/blog/2019/11/06/microsoft-cloud-security-solutions-provide-comprehensive-cross-cloud-protection/]]|Azure Protection|
|2019.11.06|//ExtraHop//|[[Three Cloud Security Best Practices for 2020|https://www.sans.org/blog/three-cloud-security-best-practices-for-2020/]]|Best_Practices|
|>|>|>|!2019.11.05|
|2019.11.05|Pawel Urbanek|![[How to hide AWS EC2 instances from network scanning bots using IPv6|https://pawelurbanek.com/ec2-scanner-bots-ipv6]]|AWS IPv6 Attacks|
|2019.11.05|DZone|[[How to Remediate Kubernetes Security Vulnerability: CVE-2019-11247|https://dzone.com/articles/how-to-remediate-kubernetes-security-vulnerability-1]]|CVE-2019-11247 Kubernetes|
|2019.11.05|//Sophos//|[[Sophos 2020 Threat Report|https://www.sophos.com/en-us/medialibrary/pdfs/technical-papers/sophoslabs-uncut-2020-threat-report.pdf]]|Report Attacks|
|2019.11.08|CIO| → [[Cyber criminals are exploiting android apps and misconfigured cloud platforms for attacks|https://www.cio.co.ke/cyber-criminals-are-exploiting-android-apps-and-misconfigured-cloud-platforms-for-attacks/]]|Report Attacks|
|2019.11.05|//Compare The Cloud//|[[DDoS attacks - Seven effects it has on cloud environments|https://www.comparethecloud.net/articles/ddos-attacks-seven-effects-it-has-on-cloud-environments/]]|Attacks DDoS|
|2019.11.05|//PaloAlto Networks//|[[A Firewall Admin's Introduction to Serverless Security|https://blog.paloaltonetworks.com/2019/11/cloud-serverless-security/]]|Serverless|
|2019.11.05|Computer Weekly|[[Security Think Tank: The cloud needs security by design|https://www.computerweekly.com/opinion/Security-Think-Tank-The-cloud-needs-security-by-design]]|Risks|
|>|>|>|!2019.11.04|
|2019.11.04|Rick's Cloud|[[2019 State of the Cloud in SMBs|https://rickscloud.com/2019-state-of-the-cloud-in-smbs/]]|Report|
|2019.11.04|Bleeping Computer|[[Office 365 to Prevent Malicious Docs From Infecting Windows|https://www.bleepingcomputer.com/news/microsoft/office-365-to-prevent-malicious-docs-from-infecting-windows/]]|O365 Prevention|
|2019.11.04|Container Journal|[[Persistent Data Storage Integral for Containers|https://containerjournal.com/topics/container-networking/persistent-data-storage-integral-for-containers/]]|Containers Storage|
|2019.11.04|Help Net Security|[[Organizations fail to maximize use of Microsoft 365 security features|https://www.helpnetsecurity.com/2019/11/04/microsoft-365-security-features/]]|Survey SoftwareONE|
|2019.11.04|Christophe Parisel|[[How AWS and Azure are shaping the future of microservices|https://www.linkedin.com/pulse/how-aws-azure-shaping-future-microservices-christophe-parisel/]]|MicroServices|
|2019.11.04|//Microsoft//|[[Microsoft announces new innovations in security, compliance, and identity at Ignite|https://www.microsoft.com/security/blog/2019/11/04/microsoft-announces-new-innovations-in-security-compliance-and-identity-at-ignite/]]|Azure Tools|
|2019.11.04|Security Week| → [[Microsoft Unveils New Security Tools for Azure|https://www.securityweek.com/microsoft-unveils-new-security-tools-azure]]|Azure Tools|
|2019.11.04|Bleeping Computer| → [[Microsoft 365 Helps Improve Orgs' Security and Compliance Posture|https://www.bleepingcomputer.com/news/microsoft/microsoft-365-helps-improve-orgs-security-and-compliance-posture/]]|Azure Tools|
|2019.11.04|Bleeping Computer| → [[Office 365 Breach Detection Capabilities Now in Public Preview|https://www.bleepingcomputer.com/news/microsoft/office-365-breach-detection-capabilities-now-in-public-preview/]]|Azure Tools|
|2019.11.04|Bleeping Computer| → [[Microsoft 365 Now Helps Find and Review Insider Security Threats|https://www.bleepingcomputer.com/news/microsoft/microsoft-365-now-helps-find-and-review-insider-security-threats/ ]]|Azure Tools|
|2019.11.04|Venture Beat| → [[Microsoft announces security, identity, management, and compliance updates across Azure and Office|https://venturebeat.com/2019/11/04/microsoft-announces-security-identity-management-and-compliance-updates-across-azure-and-office/]]|Azure Tools|
|2019.11.04|Computer Weekly|[[Security Think Tank: Secure the cloud when negotiating contracts|https://www.computerweekly.com/opinion/Security-Think-Tank-Secure-the-cloud-when-negotiating-contracts]]|Misc|
|2019.11.04|Dark Reading|[[To Secure Multicloud Environments, First Acknowledge You Have a Problem|https://www.darkreading.com/cloud/to-secure-multicloud-environments-first-acknowledge-you-have-a-problem/a/d-id/1336219]]|Multi_Cloud|
|2019.11.04|//Microsoft//|[[What's new in Azure Active Directory at Microsoft Ignite 2019|https://techcommunity.microsoft.com/t5/Azure-Active-Directory-Identity/What-s-new-in-Azure-Active-Directory-at-Microsoft-Ignite-2019/ba-p/827831]]|AzureAD|
|2019.11.04|//Spanning//|[[5 Steps to Securing your Office 365 Migration|https://spanning.com/blog/5-steps-securing-your-office-365-migration/]]|O365|
|2019.11.04|//Microsoft//|[[Book of News - Microsoft Ignite 2019|https://news.microsoft.com/wp-content/uploads/prod/sites/563/2019/11/Ignite-2019-Book-of-News.pdf]]|Azure|
|2019.11.04|//Forrester//|[[Predictions 2020: Cloud Computing|https://www.forrester.com/report/Predictions+2020+Cloud+Computing/-/E-RES157593]]|Predictions|
|2019.11.04|DevOps|[[Breaking Down the OWASP API Security Top 10, Part 1|https://devops.com/breaking-down-the-owasp-api-security-top-10-part-1/]] (1/2)|API|
!Communiqué de presse : "//CSA Contributes to Key How-To Guidance Documents for Multi-Party Recognition and Continuous Audit-Based Certification//"
<<<
[>img(200px,auto)[iCSF/EUSEC.jpg]]//Practical guidelines to innovative framework promoting trust in cloud services
BERLIN –– Nov. 7, 2019 - The ''Cloud Security Alliance'' (CSA), the world's leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today announced the availability two guidance documents - "+++*[Implementing Multi-Party Recognition for Cloud Security Certifications]> lien → https://cdn0.scrvt.com/fokus/ccc72dd1f339f01e/440004d502fa/EU-SEC-Guidelines---Implementing-Multi-Party-Recognition-for-Cloud-Security-Certifications---ALL-GUIDES.pdf === and +++*[Implementing Continuous Audit-Based Certification]> lien → https://cdn0.scrvt.com/fokus/2dd3c180ea11ea69/1c925e3b6fb9/EU-SEC-Guidelines---Implementing-Continuous-Audit-Based-Certification.pdf === - designed for cloud stakeholders wishing to improve the business value, efficiency and effectiveness of their approach to cloud security certification schemes.

Since January 2017, CSA has been a key partner in the +++*[European Security Certification Framework (EU-SEC)]> lien → https://www.sec-cert.eu/ ===, a project funded by the European Commission under the H2020 program for research and innovation. The aim of EU-SEC is to create a framework under which existing certification and assurance approaches can co-exist, adding at the same time an additional layer of trust, assurance and transparency by including continuous auditing-based certifications.
"Compliance fatigue and lack of clarity is a tremendous problem in the cloud industry," said Daniele Catteddu, Global CTO at CSA. "The multi-party approach to cloud security certifications is a great way to tackle this as it minimizes the compliance burden for cloud service providers, as well as delivering a competitive advantage to auditors."
"I think this [Framework] is a big step towards managing compliance and providing a common framework to many large, complex and multi-site organizations," said Jatin Sehgal, Global Leader and Managing Partner, EY CertifyPoint.

Based on survey and analysis of the certification and standardization landscape which highlighted a number of issues in the ICT market in Europe, such as lack of trust and transparency, compliance fatigue and assurance gaps, the EU-SEC embarked on an ambitious path to create a framework which would assist cloud stakeholders navigating this complex and confusing field. The intervening years have been dedicated to developing this framework, leveraging the expertise of partners such as CSA.

The publication of the +++*[EU Cybersecurity Act (EUCA)]> lien → https://ec.europa.eu/digital-single-market/en/eu-cybersecurity-act === in June 2019, which shares EU-SEC's objective of increasing trust in ICT services, has reinforced and supported the work of EU-SEC.
The newly published how-to guidance documents bring together that expertise in a practical format for auditors, standard owners, cloud service providers and auditees who are looking to innovate their approach to certification and standardization.

In order to ensure the Framework remains relevant, CSA is inviting cloud stakeholders to complete a +++*[short survey]> lien → https://www.surveymonkey.com/r/EUSEC === on the certification and standardization landscape. The valuable contribution of auditors, standard owners and cloud service providers to this survey will provide CSA with an updated understanding of existing practices and feed into the development of the framework. The survey, which closes Nov. 28, can be found +++*[here]> lien → https://www.surveymonkey.com/r/EUSEC ===.//
<<<
__A noter :__
* Le guide d'implémentation est constitué de 3 parties : une pour les dépositaires du standard, une pour les entités auditrices, et un epour les entités auditées.
* Le sondage, accessible [[ici|https://CloudSecurityAlliance.fr/go/jb7s/]], est ouvert jusqu'au jeudi 28 novembre 2019.

&rArr; Lire [[le communiqué de presse|https://CloudSecurityAlliance.fr/go/jb7p/]] sur le site de la CSA.
!"//Google's Potential Claim to the Throne of Quantum Supremacy: What Does it Mean for Cybersecurity?//"
[>img(150px,auto)[iCSA/JB6BW.jpg]]Article de blog publié le 6 novembre 2019 — Rédigé par Roberta Faux, Shamik Kacker, Bruno Huttner, John Hooks, Ron F. del Rosario et John Young
<<<
//__''A mysterious paper''__
A research paper titled "+++*[Quantum Supremacy Using a Programmable Superconducting Processor]> lien → https://www.nature.com/articles/s41586-019-1666-5 ===" briefly appeared last September 21, 2019 on NASA's Technical Report Server (TRS), but was later removed.
In the paper, researchers from +++*[Google AI Quantum Labs]> lien → https://ai.google/research/teams/applied-science/quantum/ === claimed supremacy in quantum computing by successfully running a series of ground-breaking experiments utilizing a processor with programmable superconducting qubits and completing an experiment within 200 seconds that normally would take a modern, state-of-the-art supercomputer approximately 10,000 years to complete.
Various research and scientific community websites were able to obtain +++*[a copy of the document prior to its removal]> lien → https://www.inverse.com/article/59507-full-quantum-supremacy-paper ===. Therefore, this document has been the subject of much debate, scrutiny and speculation for the past few weeks. It is very likely that the paper is currently under peer review and shall be available soon.
Whether it was a PR stunt to attract interest (it worked!) or an honest mistake, it is now official: Google published on October 23, the results of their quantum supremacy experiment in the Nature article Quantum supremacy using +++*[a programmable superconducting processor]> lien → https://www.nature.com/articles/s41586-019-1666-5 ===.

__''What is Quantum Supremacy?''__
Coined by John Preskill back in 2012, "Quantum Supremacy" describes the point where quantum computers can do things that classical computers can't, regardless of whether those tasks are useful. John is a Theoretical Physicist and Director of The Institute for Quantum Information and Matter (IQIM) at Caltech.
In the paper, Google AI Quantum Labs researchers claimed they were able to achieve this status in quantum computing through their experiments utilizing a physical quantum processor with sufficiently low error rates:
"We have performed random quantum circuit sampling in polynomial time with a physically realized quantum processor (with sufficiently low error rates), yet no efficient method is known to exist for classical computing machinery. As a result of these developments, quantum computing is transitioning from a research topic to a technology that unlocks new computational capabilities. We are only one creative algorithm away from valuable near-term applications."
Note however, that some naysayers doubt this claim. The mathematician, Gil Kalai fully expects that "quantum supremacy cannot be achieved at all". While accepting the importance of this work, Kalai argues that Google made a crucial mistake in their supremacy claims. IBM, who is also one of the main contenders in the quantum race and has built its own 53-qubit machine, was not slow to react as well. The IBM team published a counter-argument to Google's estimates, arguing that the calculation could be simulated in just 2.5 days on available supercomputers, not the 10,00 years which Google reported. Whether Google has demonstrated "quantum supremacy" or is merely on the verge of "quantum supremacy," this feat should be noted as a milestone.

__''Potential impact on current cryptographic systems''__
According to John Preskill, the experiment is a sort of "demonstration" at this early stage that Google researchers understand their quantum computing hardware and the next big step is to look for more practical applications in general computing.
Researchers also stated that the next focus should be on engineering quantum error correction technology in order to tackle problems with immediate implications to current computing paradigms such as Shor's Algorithm.
Published back in 1995 by AT&T Labs Researcher Peter Shor in his paper "Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer", the so-called Shor's Algorithm is a quantum algorithm that causes an exponential speed-up when solving factoring, discrete logarithm (DLP), and elliptic curve discrete logarithm (ECDLP) problems. Modern public key cryptography, which underpins secure communication and e-commerce on the internet, relies on the difficulty of solving these problems with our current classical computing paradigm. Therefore, a fully-realized quantum computer running Shor's algorithm will easily circumvent our current cryptographic infrastructure. Note that Shor's algorithm is not the only quantum algorithm attacking cybersecurity. Grover's algorithms can compromise our symmetric cryptography (e.g. AES). However, as it only results in a quadratic speed-up, increasing the AES key size can provide adequate resistance against Grover's quantum attack.
Does it mean that Google's experiment means doom for cybersecurity today? Not quite. As expressed above, the first caveat is about quantum error correction technology. A brief technical aside is required here to explain what we are writing about.
Today, all quantum processors utilize physical qubits, which can be in a coherent superposition of zero and one. With this type of qubits, every operation introduces some error, basically reducing the quality of the qubit. This limits the total number of operations, which can be performed before you "lose" your qubits, or decohere. In order to go further and perform longer computations, we need to move to logical qubits. A logical qubit is built from a large number of physical qubits, which protect it and enable error-free computations. This is the field of quantum error correction technology. Note that a classical computer, which runs on classical bits (zeros and ones), runs naturally on logical bits. In order to run Shor's algorithm, a quantum computer has to implement logical qubits. Now back to our development...
Google's system is using physical qubits, with a sufficiently low error rate. This was apparently enough to demonstrate quantum supremacy. However, it will probably be a good number of years before a quantum computer can run long enough computations with logical qubits. The current estimates are between 5 to +10 years.
The second caveat is that, although current cybersecurity infrastructure relies on potentially unsafe cryptographic protocols, new developments are currently underway to address this issue. This is the task of quantum-safe cryptography.

__''Can we counter the quantum threat?''__
The fact that we still have a few years before quantum supremacy transforms into a real threat to cybersecurity should not lure us into a false sense of security. We can already record data today and decrypt it once a powerful enough quantum computer is available. Information exchanged today, which may still have value in several years, is already at threat. Even adapting our infrastructure to the threat will take several years.
[>img(200px,auto)[iCSA_/PEFTQCCST.png]]According to the October 2019 research "Quantum Threat Timeline" conducted by the Global Risk Institute, the transition to quantum-safe cryptography is a challenge itself, as it requires the development and deployment of hardware and software solutions, the establishment of standards, the migration of legacy systems, and more."
Fortunately, things are already moving. Post-Quantum or Quantum-safe algorithms are actively being developed to specifically address this looming threat of quantum computing in the security of modern communication systems. The NIST in the USA has launched a competition, wherein groups of researchers around the world propose post-quantum algorithms for different cryptographic purposes. The goal is to converge to a few of them, which will become standards between 2022 and 2024.
In an interesting twist, new solutions, such as Quantum Random Number Generators and Quantum Key Distribution, based on the same quantum effects, can already be deployed today to offer quantum-safe communications.
Within the Cloud Security Alliance (CSA), the Quantum-Safe Security (QSS) working group is a forum where companies and academic institutions meet to discuss these issues, and suggest solutions. It has written a number of white papers, which address most of the above topics in a non-technical format. The latest report discusses how to prepare enterprises for the quantum threat.//
[...]
<<<
&rArr; Lire [[l'original|https://CloudSecurityAlliance.fr/go/jb6q/]] sur le blog de la CSA
!"//CMMC - the New Protocol Droid for DoD Compliance//"
[>img(150px,auto)[iCSA/JB6BC.png]]Article de blog publié le 6 novembre 2019 — Rédigé par Doug Barbin, Cybersecurity Practice Leader chez Schellman & Company, LLC
<<<
//A long time ago in a galaxy exactly ours…There was 800-171.
For some time, the US Department of Defense has been working to revise its funding procurement procedures referred to as the Defense Acquisition Regulation Supplement, or DFARS.Most important among all the details are the included requirements in the regulations (under 252.204-7012), which mandate that defense contractors meet the NIST special publication (SP) 800-171 standard that deals with Controlled [but] Unclassified Information (CUI).

__Episode I - The Mandated Requirement__
NIST 800-171, unlike its broader cousin NIST 800-53, was written for non-government entries such as government contractors and service providers.With that being said, though NIST 800-171 is required for contractors, the DFARS regulation also necessitates the more comprehensive FedRAMP authorization for cloud service providers.

__Episode II - The Rise of CMMC__
The means to communicate NIST 800-171 compliance has always been inconsistent, with many service providers performing self-attestation, but earlier this year, the DoD made a presentation on a new model based on new revisions to the requirement. This new model includes a "certification" framework, and contractors and vendors who were once able to self-attest will now need third-party validation in 2020.
This proposed framework is called the +++*[Cybersecurity Maturity Model Certification, or CMMC]> lien → https://www.acq.osd.mil/cmmc/ ===.
The model, now on version 0.4, was most recently updated on August 30, 2019. For more details, see the  +++*[August 30, 2019 briefing document]> lien → https://www.acq.osd.mil/cmmc/docs/cmmc-overview-brief-30aug19.pdf ===, as well as the latest  +++*[Criteria v 0.4 - August 30, 2019]> lien → https://www.acq.osd.mil/cmmc/docs/cmmc-draft-model-30aug19.pdf ===.
In terms of requirements, v0.4 now includes additional descriptions of levels and practices including:
* 35 practices to achieve level 1 maturity or "Basic Cyber Hygiene"
* 115 additional practices to achieve level 2 maturity or "Intermediate Cyber Hygiene"
* 91 additional practices to achieve level 3 maturity or "Good Cyber Hygiene"
* 95 additional practices to achieve level 4 maturity or "Proactive"
* 34 additional practices to achieve level 5 maturity or "Advanced Progressive"

__Episode III - Oversight Awakens__
Lastly, on October 3rd DoD issued +++*[an RFI]> lien → https://www.fbo.gov/index?s=opportunity&mode=form&id=4a4b539a0e347e540b30b3121916031c&tab=core&_cview=0 === to solicit accreditation bodies for CMMC.Note that this is not for audit firms like Schellman, but for an accreditation body that will oversee and audit the auditors.Within the request for information, the DoD disclosed that the auditors will now be referred to as CMMC 3rd Party Assessment Organizations (C3PAOs).Yes, you heard that correctly, though there's been no word on Artoo Detoo.

__Episode IV - A New Requisite__
To summarize, here is what we know, based on the above data points:
* Version 0.4 further increased the number of required practices for each leader.
* The Undersecretary of Defense is expected to create an accreditation body to authorize C3PAOs.It would not be surprising should it come together similarly to FedRAMP, which requires 3PAOs to be accredited by A2LA.
* To date, there still has been no guidance released on the content or format of CMMC or C3PAO deliverables - everyone remains in a holding pattern there.
* CMMC validation by a third party is expected to be requested in RFIs starting in June of 2020 and in RFPs starting in the fall of 2020.
//[...]
<<<
&rArr; Lire [[l'original|https://CloudSecurityAlliance.fr/go/jb6d/]] sur le blog de la CSA
!"//CSA Summit at (ISC)² Security Congress 2019//"
[>img(200px,auto)[iCSA/JAR-MCO.jpg]]Le ''CSA Summit'' s'est tenu à Orlando le 27 octobre 2019, dans le cadre du congrès (ISC)².

Les 6 présentations sont maintenant disponibles en téléchargement :
* "''Diversify Defense - Improving Cybersecurity Through Smart Consolidation''" par Jeff Costlow, ExtraHop
* "''The Next Evolution of Cloud Based Attacks and How to Prevent It''" par Brian Johnson, DivvyCloud
* "''Tell Me a Story - The Art of Explaining Risks''" par Christine Vanderpool, Florida Crystals
* "''Rethinking the Traditional Cloud Vendor Assessment Model: Proactive vs Reactive Vendor Security''" par Michael Odenwald, Whistic
* "''Security Leaders as Change Leaders''" par Marnie Wilking, Wayfair
* "''Eight Ball For The Win: Key Cloud and Cybersecurity Trends for 2020''" par Jim Reavis, Cloud Security Alliance[>img(100px,auto)[iCSA/JARCCAK.png]]
** Jim Reavis a notamment annoncé le ''CCAK'' (Certificate of Cloud Auditing Knowledge) pour 2020.

Les présentations peuvent être téléchargées individuellement ou en une seule fois.
Lien de téléchargement du paquet complet &rArr; ''[[CloudSecurityAlliance.fr/go/jb4p/|https://CloudSecurityAlliance.fr/go/jb4p/]]
!1 - Les nouveautés CSA de la semaine du 28 octobre au 3 novembre 2019
* Publication : Exigences pour les organismes procédant à l'audit et à la certification STAR+++*[»]> <<tiddler [[Publication : Exigences pour les organismes procédant à l'audit et à la certification STAR]]>>=== [>img[iCSF/cloud-security-alliance-fr.png]]
* Actu : Utilisation de SDP en anti-DDoS+++*[»]> <<tiddler [[2019.10.28 - Utilisation de SDP en anti-DDoS]]>>=== 
* Publication : Utilisation de SDP en anti-DDoS+++*[»]> <<tiddler [[2019.10.28 - Publication : Utilisation de SDP en anti-DDoS]]>>=== 
* Actu : Appel à commentaires, documents 'CloudAbuse Working Group Charter'+++*[»]> <<tiddler [[2019.10.29 - Appel à commentaires, document 'CloudAbuse Working Group Charter']]>>=== et 'Privacy Level Agreement Working Group Charter'+++*[»]> <<tiddler [[2019.10.29 - Appel à commentaires, document 'Privacy Level Agreement Working Group Charter']]>>=== 
!2 - Veille Web
La +++*[Veille Web]> <<tiddler [[2019.11.03 - Veille Hebdomadaire - 3 novembre]]>>=== avec plus de 70 liens :
* __''À lire'' :__ Article "Cloud Storage Acquisition from Endpoint Devices" sur le site du SANS+++*[»]>
|2019.10.30|SANS|![[Cloud Storage Acquisition from Endpoint Devices|https://digital-forensics.sans.org/blog/2019/10/30/cloud-storage-endpoint-devices]]|Forensics Storage|
=== 
* Phishing Office 365 : plusieurs cas récents
* Retours d'expérience sur des pannes ou des incidents : Little "Chubby" (GCP), Capital One
* Rapports et sondages : Rick's Cloud, Securonix, Sysdig
* Cloud souverain : quelques éléments sur les efforts en France et en Europe
!3 - Conférences et Salons
* Le programme de la ''Cloud & Cyber Security Expo'' des ''27 et 28 novembre'' à Paris est partiellement disponible :
** ''Deuxième'' teaser et inscription gratuite+++*[»]> <<tiddler [[2019.11.01 - Cloud & Cyber Security Expo - Inscription et Extrait du Programme (2/3)]]>>=== 
** Animation d'une table ronde sur la ''Cyber-Résilence dans le Cloud''+++*[»]> <<tiddler [[2019.10.07 - Cloud & Cyber Security Expo les 27 et 28 novembre 2019]]>>=== 
* Les inscriptions pour le ''Congrès Européen'' des ''18 au 21 novembre'' à Berlin sont toujours ouverte+++*[»]> <<tiddler [[2019.09.04 - Annonce du programme du Congrès CSA EMEA en Novembre à Berlin]]>>=== 
** Contactez-nous pour avoir une réduction sur votre inscription.+++*[»]> → [img(200px,auto)[iCSF/Email-CSA_FR.png]]=== 
|!Novembre|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2019.11.01|
|2019.11.01|BetaNews|[[How automation can contribute to cloud security [Q&A]|https://betanews.com/2019/11/01/automation-cloud-security-qa/]]|Automation|
|2019.11.01|CBR Online|[[Google Cloud's Little "Chubby" Outage|https://www.cbronline.com/news/google-cloud-outage-chubby]]|GCP Outage Lessons_Learnt|
|2019.11.01|ZDnet|[[Europe's cloud computing plan won't do much to scare the US giants|https://www.zdnet.com/article/europes-cloud-computing-plan-wont-do-much-to-scare-the-us-giants/]]|Sovereign_Cloud Europe|
|2019.11.01|//Protego//|[[State of Serverless and Security|https://www.protego.io/state-of-serverless-and-security/]] ([[infographie|https://ss-usa.s3.amazonaws.com/c/308465463/media/18915dbcb1e74090390480216989672/infographic%20survey.pdf]])|Survey Serveless|
|2019.11.01|//Fugue//|[[Securing Microsoft Azure Virtual Networks and Network Security Groups|https://www.fugue.co/blog/securing-microsoft-azure-virtual-networks-and-network-security-groups]]|Azure Networking|
|2019.11.01|//CloudCheckr//|[[5 Rules of Multi-Cloud Governance: What AWS, Azure, and Google Cloud Users Need to Know|https://cloudcheckr.com/multi-cloud/multi-cloud-governance/]]|Governance|
|!Octobre|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2019.10.31|
|2019.10.31|SANS|[[EML attachments in O365 - a recipe for phishing|https://isc.sans.edu/forums/diary/EML+attachments+in+O365+a+recipe+for+phishing/25474/]]|O365 Phishing|
|2019.10.31|DZone|[[Demystifying Security on AWS Cloud|https://dzone.com/articles/demystifying-security-on-aws-cloud]]|AWS|
|2019.10.31|SiliconAngle|[[Disaster recovery essential for data protection, and cloud makes it scalable|https://siliconangle.com/2019/10/31/disaster-recovery-essential-for-data-protection-datrium-cloud-scalable-dr-cubeconversations/]]|DRP|
|2019.10.31|Medium|[[Introducing The Multi-Cloud Cyber Range — Azure v0.01|https://medium.com/aws-cyber-range/introducing-the-multi-cloud-cyber-range-azure-v0-01-66fd13de3eef]]|Exercise Tools|
|2019.10.31|//Google Cloud//|[[Exploring container security: Use your own keys to protect your data on GKE|https://cloud.google.com/blog/products/containers-kubernetes/exploring-container-security-use-your-own-keys-to-protect-your-data-on-gke]]|GCP Containers|
|2019.10.31|//Google Cloud//|[[Admin Insider: These 6 steps can help you address security threats in G Suite|https://cloud.google.com/blog/products/g-suite/admin-insider-these-6-steps-can-help-you-block-security-threats-in-g-suite]]|GCP Protection|
|2019.10.31|//Alibaba Cloud//|[[Thoughts on the Development of Secure Container Technology|https://medium.com/@Alibaba_Cloud/thoughts-on-the-development-of-secure-container-technology-8fb30670eea]]|Containers|
|2019.10.31|//Alibaba Cloud//|[[Next-Gen Enterprise Security Based on Cloud-Native Technology|https://medium.com/@Alibaba_Cloud/next-gen-enterprise-security-based-on-cloud-native-technology-6a6c28a6011e]]|Misc|
|2019.10.31|//Viruss//|[[3 Tips to Protect Yourself From the Office 365 Phishing Scams|http://www.viruss.eu/virus-news/3-tips-to-protect-yourself-from-the-office-365-phishing-scams-3/]]|O365 Phishing|
|2019.10.31|//Synology//|[[Behold: The 2019 cloud backup myth-buster|https://www.theregister.co.uk/2019/10/31/the_cloud_backup_myth_buster/]]|BackUps|
|2019.10.31|//Alcide//|[[Kubernetes Audit: Making Log Auditing a Viable Practice Again|https://blog.alcide.io/kubernetes-audit-making-log-auditing-a-viable-practice-again]]|Kubernetes Audit Logging|
|2019.10.31|//Caylent//|[[Kubernetes Service Discovery|https://caylent.com/kubernetes-service-discovery]]|Kubernetes Discovery|
|2019.10.31|//Google Cloud//|[[How GCP helps you take command of your threat detection|https://cloud.google.com/blog/products/identity-security/how-gcp-helps-you-take-command-of-your-threat-detection]]|GCP Detection|
|2019.10.31|//Armor//|[[Achieving PCI Compliance on AWS Is More Involved Than You Think|https://www.armor.com/blog/aws-pci-compliance/]]|AWS PCI_DSS Compliance|
|2019.10.31|//Lacework//|[[AWS Security Best Practices for 2020 You Need to Implement|https://www.lacework.com/aws-security-best-practices-2020/]]|AWS Best_Practices|
|2019.10.31|//Capsule8//|[[The Curious Case of a Kibana Compromise|https://capsule8.com/blog/the-curious-case-of-a-kibana-compromise/]]|Compromise|
|2019.10.31|//Managed Methods//|[[Top 4 Cloud Security Risks for K-12|https://managedmethods.com/blog/cloud-security-risks-for-k-12/]]|Risks|
|2019.10.31|//Google Cloud//|[[How Google adopted BeyondCorp: Part 4 (services)|https://security.googleblog.com/2019/10/how-google-adopted-beyondcorp-part-4.html]] (4/4)|Services|
|2019.10.31|Nino Crudele|[[Hackazure - anything bad and good about Azure Cybersecurity|https://ninocrudele.com/hackazure-anything-bad-and-good-about-azure-cybersecurity]]|Azure|
|2019.10.31|Thomas Naunheim|[[Improve security and usability of privileged access in Microsoft Azure|https://www.cloud-architekt.net/improve-security-and-usability-privileged-access-azure/]]|Azure|
|>|>|>|!2019.10.30|
|2019.10.30|Solutions Numériques[>img[iCSF/flag_fr.png]]|[[La France et l'Allemagne ont présenté la feuille de route du futur Cloud européen|https://www.solutions-numeriques.com/securite/la-france-et-lallemagne-ont-presente-la-feuille-de-route-du-futur-cloud-europeen/]]|Sovereign_Cloud|
|2019.10.30|SANS|![[Cloud Storage Acquisition from Endpoint Devices|https://digital-forensics.sans.org/blog/2019/10/30/cloud-storage-endpoint-devices]]|Forensics Storage|
|2019.10.30|SANS|[[How to Perform a Security Investigation in AWS A SANS Whitepaper|https://www.sans.org/reading-room/whitepapers/analyst/perform-security-investigation-aws-whitepaper-39230]]|Investigation|
|2019.10.30|Down the rabbit Hole|[[Contain(er) Your Security|http://podcast.wh1t3rabbit.net/dtsr-episode-368-container-your-security]] ([[podcast mp3|http://hwcdn.libsyn.com/p/d/a/f/daf7af50cae08cd8/DtSR_Episode_368_-_Container_Your_Security.mp3]])|Containers|
|2019.10.30|APNIC|[[Internet clouds are (also) unpredictable|https://blog.apnic.net/2019/10/30/internet-clouds-are-also-unpredictable/]]|Networking Latency|
|2019.10.30|//McAfee//|[[Office 365 Users Targeted by Voicemail Scam Pages|https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/office-365-users-targeted-by-voicemail-scam-pages/]]|O365 Phishing|
|2019.10.31|Bleeping Computer| → [[New Office 365 Phishing Scams Using Audio Voicemail Recordings|https://www.bleepingcomputer.com/news/security/new-office-365-phishing-scams-using-audio-voicemail-recordings/]]|O365 Phishing|
|2019.10.31|HepNet Security| → [[Office 365 users targeted with fake voicemail alerts in suspected whaling campaign|https://www.helpnetsecurity.com/2019/10/31/office-365-voicemail-phishing/]]|O365 Phishing|
|2019.10.31|//Threatpost//| → [[Fake Voicemail/Office 365 Attack Targets Enterprise Execs|https://threatpost.com/enterprise-big-fish-fake-voicemail-office-365-attack/149730/]]|O365 Phishing|
|2019.10.30|3DS Outscale[>img[iCSF/flag_fr.png]]|![[Le Cloud Act en une infographie par 3DS Outscale|https://www.informatiquenews.fr/le-cloud-act-en-une-infographie-par-eds-outscale-64243]]|CLOUD_Act|
|2019.10.30|//Securonix//|[[More than 1 in 3 Enterprises Say Cloud Apps Are the Most Vulnerable to Insider Threat|https://www.securonix.com/press-release/more-than-1-in-3-enterprises-say-cloud-apps-are-the-most-vulnerable-to-insider-threat/]] ([[2019 Insider Threat Survey Report|https://www.securonix.com/resources/2019-insider-threat-survey-report/]])|Report Securonix|
|2019.10.30|Dark Reading| → [[Security Pros Fear Insider Attacks Stem from Cloud Apps|https://www.darkreading.com/cloud/security-pros-fear-insider-attacks-stem-from-cloud-apps/d/d-id/1336215]]|Report Securonix|
|2019.10.30|//Google Cloud//|[[Cloud storage data protection that fits your business|https://cloud.google.com/blog/products/storage-data-transfer/cloud-storage-data-protection-that-fits-your-business]]|GCP Storage|
|2019.10.30|//McAfee//|[[3 Tips to Protect Yourself From the Office 365 Phishing Scams|https://securingtomorrow.mcafee.com/consumer/consumer-threat-notices/office-365-phishing/]]|O365 Phishing|
|2019.10.30|//Protego//|[[Cloud Native Application Security - What You Need To Know|https://www.protego.io/what-you-need-to-know-about-cloud-native-security/]]|Cloud_Native|
|2019.10.30|//Microsoft//|[[Tutorial: Configure secure LDAP for an Azure Active Directory Domain Services managed domain|https://docs.microsoft.com/en-us/azure/active-directory-domain-services/tutorial-configure-ldaps]]|AzureAD LDAP|
|2019.10.30|//Nuage Networks//|[[SD-WAN Security - Challenges and Solution|https://www.nuagenetworks.net/blog/sd-wan-security-challenges-and-solution/]]|SDWAN|
|>|>|>|!2019.10.29|
|2019.10.28|Le Monde Informatique[>img[iCSF/flag_fr.png]]|[[Un projet franco-allemand jette les bases d'un cloud européen|https://www.lemondeinformatique.fr/actualites/lire-un-projet-franco-allemand-jette-les-bases-d-un-cloud-europeen-76933.html]]|Sovereign_Cloud|
|2019.10.28|Informatique News[>img[iCSF/flag_fr.png]]|[[Les licences Microsoft 365 peuvent poser des problèmes de conformité|https://www.informatiquenews.fr/les-licences-microsoft-365-peuvent-poser-des-problemes-de-conformite-64215]]|O365 License|
|2019.11.01|The Register| → [[Microsoft sees sense, will give Office 365 admins veto rights on self-service Power tools|https://www.theregister.co.uk/2019/11/01/microsoft_power_platform_u_turn/]]|O365 License|
|2019.11.01|Informatique News[>img[iCSF/flag_fr.png]]| → [[Microsoft fait marche arrière sur son "Self-Service" pour Power Platform|https://www.informatiquenews.fr/microsoft-fait-marche-arriere-sur-son-self-service-pour-power-platform-64263]]|O365 License|
|2019.10.29|Container Journal|[[Top 10 Container and Kubernetes Security Questions to Ask Your Team|https://containerjournal.com/features/top-10-container-and-kubernetes-security-questions-to-ask-your-team/]]|Containers Kubernetes|
|2019.10.29|DZone|[[Docker Explained - An Introductory Guide To Docker|https://dzone.com/articles/docker-explained-an-introductory-guide-to-docker]]|Docker|
|2019.10.29|Dark Reading|[[Why Cloud-Native Applications Need Cloud-Native Security|https://www.darkreading.com/cloud/why-cloud-native-applications-need-cloud-native-security/a/d-id/1336187]]|Cloud_Native|
|2019.10.29|Euractiv|[[European cloud network to start in late 2020|https://www.euractiv.com/section/digital/news/european-cloud-network-to-start-in-late-2020/]]|Sovereign_Cloud Europe|
|2019.10.29|Synergy Research|[[Amazon, Microsoft, Google and Alibaba Strengthen their Grip on the Public Cloud Market|https://www.srgresearch.com/articles/amazon-microsoft-google-and-alibaba-strengthen-their-grip-public-cloud-market]]|Report|
|2019.10.30|Informatique News[>img[iCSF/flag_fr.png]]| → [[Cloud : quatre leaders sur un marché concentré|https://www.informatiquenews.fr/cloud-quatre-leaders-sur-un-marche-concentre-64230]]|Report|
|2019.10.29|TMCnet|[[Capital One AWS Breach is a Headache for Consumers, the Bank and now Amazon|https://blog.tmcnet.com/blog/rich-tehrani/security/capital-one-aws-breach-is-a-headache-for-consumers-the-bank-and-now-amazon.html]]|CapitalOne Outage Lessons_Learnt|
|2019.10.29|//Sysdig//|[[Sysdig 2019 Container Usage Report: New Kubernetes and security insights|https://sysdig.com/blog/sysdig-2019-container-usage-report/]]|Report Containers Kubernetes|
|2019.10.29|Container Journal| → [[Sysdig Report Shines Light on Container Usage Patterns|https://containerjournal.com/topics/container-ecosystems/sysdig-report-shines-light-on-container-usage-patterns/]]|Report Containers Kubernetes|
|2019.10.29|//Anchore//|[[Benefits of Static Image Inspection and Policy Enforcement|https://anchore.com/benefits-static-image-inspection/]]|Containers|
|2019.10.29|//AlienVault//|[[Was the largest breach in history a misconfiguration problem?|https://www.alienvault.com/blogs/security-essentials/was-the-largest-breach-in-history-a-misconfiguration-problem]]|Misconfigurations|
|2019.10.29|//JumpCloud//|[[Azure MFA|https://jumpcloud.com/blog/azure-mfa/]]|Azure Authentication|
|2019.10.29|//Alert Logic//|[[Streamline Cybersecurity for Cloud Applications and Data on Azure|https://blog.alertlogic.com/streamline-cybersecurity-for-cloud-applications-and-data-on-azure/]]|Azure|
|2019.10.29|//Microsoft Azure//|[[Gartner names Microsoft a Leader in the 2019 Cloud Access Security Broker (CASB) Magic Quadrant|https://www.microsoft.com/security/blog/2019/10/29/gartner-microsoft-leader-2019-cloud-access-security-broker-casb-magic-quadrant/]]|CASB|
|>|>|>|!2019.10.28|
|2019.10.28|Silicon.fr[>img[iCSF/flag_fr.png]]|[[DevOps : une autre gestion du risque… et de la productivité|https://www.silicon.fr/devops-risque-productivite-311933.html]]|DevOps Risks|
|2019.10.28|Silicon.fr[>img[iCSF/flag_fr.png]]|[[Cloud : avec JEDI, Microsoft devient le fournisseur clé du Pentagone|https://www.silicon.fr/jedi-cloud-microsoft-fournisseur-cle-pentagone-311937.html]]|Government JEDI|
|2019.10.28|Federal News Network| → [[JEDI to Microsoft? It ain't over yet|https://federalnewsnetwork.com/tom-temin-commentary/2019/10/jedi-to-microsoft-it-aint-over-yet/]]|Government JEDI|
|2019.10.28|Redmond Channel Partner| → [[How Permanent Is Microsoft's Shocking JEDI Win?|https://rcpmag.com/blogs/scott-bekker/2019/10/microsoft-shocking-jedi-win.aspx]]|Government JEDI|
|2019.10.28|Direction Informatique[>img[iCSF/flag_fr.png]]|[[Avons-nous raison d'être frileux envers le cloud?|https://www.directioninformatique.com/avons-nous-raison-detre-frileux-envers-le-cloud/80472]]|Misc|
|2019.10.28|Rick's Cloud|[[2019 State of the Cloud in the Enterprise|https://rickscloud.com/2019-state-of-the-cloud-in-the-enterprise/]]|Report|
|2019.10.28|VMblog|[[Cloud-Native DevSecOps: How to Secure Your Cloud|https://vmblog.com/archive/2019/10/28/cloud-native-devsecops-how-to-secure-your-cloud.aspx]]|SecDevOps|
|2019.10.28|The Register|[[Amazon is saying nothing about the DDoS attack that took down AWS, but others are|https://www.theregister.co.uk/2019/10/28/amazon_ddos_attack/]]|AWS Outage Aftermath|
|2019.10.28|Help Net Security|[[DevOps firewall: How pre-configuring your cloud deployment can ensure compliance|https://www.helpnetsecurity.com/2019/10/28/devops-firewall/]]|DevSecOps|
|2019.10.28|Bank Info Security|[[Two Data Leaks Expose Millions of Records|https://www.bankinfosecurity.com/two-data-leaks-expose-millions-records-a-13299]]|Data_Leaks|
|2019.10.28|Jordan Potti|[[Offensive Cloud Distribution|https://github.com/jordanpotti/OffensiveCloudDistribution]] (to distribute large security scans across numerous cloud instances)|[[Tools|Outils-GitHub]]|
|2019.10.28|Sarah Gray|[[Security Best Practices - AWS Virtual Workshop|https://www.youtube.com/watch?v=mNUFa6wGEEk]] (vidéo de 1h30)|AWS Workshop|
|2019.10.28|//AWS//[>img[iCSF/flag_fr.png]]|[[Annonce de l'analyse d'image pour Amazon ECR|https://aws.amazon.com/fr/about-aws/whats-new/2019/10/announcing-image-scanning-for-amazon-ecr/]]|AWS Images|
|2019.10.28|Catchpoint|[[Four Ways to Mitigate the Impact of DNS Attacks|https://blog.catchpoint.com/2019/10/28/four-ways-to-mitigate-the-impact-of-dns-attacks/]]|AWS DDoS Outage|
|2019.10.28|//Microsoft//|[[Customize networking for DR drills: Azure Site Recovery|https://azure.microsoft.com/en-us/blog/customize-networking-for-dr-drills-azure-site-recovery/]]|Azure DRP|
|2019.10.28|//Microsoft//|[[IoT security will set innovation free: Azure Sphere general availability scheduled for February 2020|https://www.microsoft.com/security/blog/2019/10/28/iot-innovation-azure-sphere-general-availability-february-2020/]]|Azure_Sphere IoT|
|2019.10.28|//Zscaler//|[[Rethinking Office 365 Security and Networking Infrastructure|https://www.cbronline.com/opinion/office-365-networking-zscaler]]|O365 Architecture|
[>img(200px,auto)[iCSF/CCSEP2019.png]]Pour s'inscrire à la ''Cloud & Cyber Security Expo'' et disposer une deuxième aperçu du programme des conférences gratuites :

Suivez le lien → ''[[CloudSecurityAlliance.fr/go/jb1r|https://CloudSecurityAlliance.fr/go/jb1r]]''

[img(auto,60px)[iCSF/CCSA19h.jpg][https://CloudSecurityAlliance.fr/go/jb1r]]
!"//Cloud Security Alliance Health Information Management Working Group Co-Chair Dr. Jim Angle to Present at HIMSS//"
^^//Dr. Jim Angle, manager of Network Security - Vulnerability Management at Trinity Health and co-chair of CSA's Health Information Management Working Group, will be presenting "''Managing the Risk for Medical Devices Connected to the Cloud''" at the +++*[HIMSS Global Health Conference & Exhibition]> https://www.himssconference.org/ === (Orlando) on March 11 at 2:30 p.m. In his talk, Dr. Angle will share some of his key insights that laid the groundwork for the white paper of the same name by CSA's Health Information Management (HIM) Working Group, sharing with attendees how to apply the IoT Security Controls Framework to highly sensitive medical systems that support critical services.//
&rArr; Lire le [[communiqué de presse|https://cloudsecurityalliance.org/press-releases/2019/11/20/cloud-security-alliance-health-information-management-working-group-co-chair-dr-jim-angle-to-present-at-himss/]]^^

[img(25%,1px)[iCSF/BluePixel.gif]]
!"//The Four Pillars of CASB: Threat Protection//"
[>img(100px,auto)[iCSA/JBIBT.png]]^^Article publié le 18 novembre sur le blog de la CSA, et après l'avoir été il y a plus de 2 mois sur le site de la société Bitglass.
&rArr; Lire [[l'article|https://cloudsecurityalliance.org/blog/2019/11/18/the-four-pillars-of-casb-threat-protection/]] sur le blog de la Cloud Security Alliance ou [[l'original|https://www.bitglass.com/blog/four-pillars-casb-threat-protection]]^^

[img(25%,1px)[iCSF/BluePixel.gif]]
!"//Digital Transformation, Cybersecurity, Cloud Apps, and Cloud Security//"
[>img(100px,auto)[iCSA/JBIBD.jpg]]^^Article publié le 18 novembre sur le blog de la CSA, et après l'avoir été il y a plus de 2 mois sur le site de la société Bitglass.
&rArr; Lire [[l'article|https://cloudsecurityalliance.org/blog/2019/11/21/digital-transformation-cybersecurity-cloud-apps-and-cloud-security/]] sur le blog de la Cloud Security Alliance ou [[l'original|https://www.bitglass.com/blog/digital-transformation-cybersecurity-cloud-apps-cloud-security]]^^

[img(25%,1px)[iCSF/BluePixel.gif]]
!"//Traduction en japonais de 2 documents du CSA//"
^^Traductions publiées le 18 novembre 2019 :[>img(100px,auto)[iCSA/J86PT.jpg]][>img(100px,auto)[iCSA/J14PG.png]]
* "Guideline on Effectively Managing Security Service in the Cloud"
** &rArr; Lien de [[téléchargement|https://cloudsecurityalliance.org/artifacts/guideline-on-effectively-managing-security-service-in-the-cloud-japanese-translation/]]
* "Top Threats to Cloud Computing: Egregious Eleven"
** &rArr; Lien de [[téléchargement|https://cloudsecurityalliance.org/artifacts/top-threats-to-cloud-computing-egregious-eleven-japanese-translation/]]
^^
[img(25%,1px)[iCSF/BluePixel.gif]]
!"//CSA Announces Advanced Cloud Security Practitioner Training, a Highly Technical Hands-on Course for Technical Security Professionals//"
[>img(100px,auto)[iCSA/J73CCSK.png]]^^Annonce du 4 novembre pour une formation "Advanced Cloud Security Practitioner Training" les 10 et 11 décembre 2019 à Kansas City, Missouri.
Le formateur sera ''[[Rich Mogull|https://securosis.com/about/team]]'', qui est non seulement très compétent, mais aussi très pédagogue.
&rArr; Lire [[l'annonce|https://CloudSecurityAlliance.fr/go/jb4a/]] sur le site de la ''Cloud Security Alliance''
&rArr; Pour les [[détails et s'inscrire|https://CloudSecurityAlliance.fr/go/jb4i/]]^^
[img(25%,1px)[iCSF/BluePixel.gif]]
!"//3 Technical Benefits of Service Mesh, and Security Best Practices//"
[>img(100px,auto)[iCSA/JB4B3.jpg]]^^Bien que publié le 4 novembre 2019 sur le blog de la CSA, cet article l'a déjà été il y a plus d'un mois, le 26 septembre 2019 sur le site de la société Portshift.
&rArr; Lire [[l'article|https://CloudSecurityAlliance.fr/go/jb4z/]] sur le blog de la Cloud Security Alliance ou [[l'original|https://CloudSecurityAlliance.fr/go/jb4x/]]^^

[img(25%,1px)[iCSF/BluePixel.gif]]
!Actualités, Blog, Publications et Veille "Sécurité du Cloud"
<<tiddler fAll2LiTabs13end with: 201910>>
<<tiddler fAll2Tabs10 with: VeilleM","_201910>>
|!Octobre|!Sources|!Titres et Liens|!Keywords|
|>|>|>|Aucune alerte pour le moment|
<<tiddler .ReplaceTiddlerTitle with: [[Alertes et Vulnérabilités - Octobre 2019]]>>
<<tiddler fAll2LiTabs10 with: NewsL","201910>><<tiddler .ReplaceTiddlerTitle with: [[Newsletters - Octobre 2019]]>>
<<tiddler .ReplaceTiddlerTitle with: [[Actualités - Octobre 2019]]>><<tiddler fAll2LiTabs13end with: Actu","201910>>
<<tiddler fAll2LiTabs13end with: Blog","201910>>
<<tiddler .ReplaceTiddlerTitle with: [[Blog - Octobre 2019]]>>
<<tiddler fAll2LiTabs13end with: Publ","201910>>
<<tiddler .ReplaceTiddlerTitle with: [[Publications - Octobre 2019]]>>
!CloudAbuse Working Group Charter
Charte du groupe de travail "Cloud Abuse".[>img(100px,auto)[iCSA/CSAdoc.png]]
La date limite pour transmettre les commentaires est le 29 novembre 2019.
<<<
//The mission of the CloudAbuse working group is to promote operational security and aid in the timely sharing of indicators of abuse across all the member's services.
This mission is conducted through private information sharing within a community of trusted representatives of each member organization.//
<<<
* Téléchargement (après inscription) → ''[[CloudSecurityAlliance.fr/go/jatc|https://cloudsecurityalliance.fr/go/jatc/]]''
!Privacy Level Agreement Working Group Charter
Charte du groupe de travail "Open Certification Framework" (OCF)[>img(100px,auto)[iCSA/CSAdoc.png]]
La date limite pour transmettre les commentaires est le 29 novembre 2019.
<<<
//The Cloud Security Alliance would like to invite you to review and comment on the updated Privacy Level Agreement Working Group Charter.
The Privacy Level Agreement (PLA) Working Group was originally established in 2011 with the objective to define good practices and tools to help both CSPs and cloud users in their journey toward the compliance with relevant European Union privacy legislations.
The draft CSA Code of Conduct and Certification are currently under the revision of the relevant Data Protection Authorities.
The goal of CSA is, clearly to obtain the approval of both of them by the European Data Protection Board.
The current version of the PLA CoP (V3.2) doesn't thought cover the requirements of the GDPR Art.46 on international data transfer.
Given the importance of the topic in the cloud market, the CSA has decided to take action and revise the current versions of its CoC and Certification so to be able to use them as tools for international data transfer.
Moreover, in its mission to support both CSPs and customers to overcome their cloud security and privacy challenges, the CSA has also decided to initiate an analysis of other relevant Privacy and Data Protection regulations applicable to the cloud market and define, on the basis of the results already achieved, new tools and best practices for global privacy compliance.
In summary, the extension of the scope of existing CSA's best practice and tools for GDPR compliance to international data transfer and global privacy compliance, would be the main goals of the new PLA WG.
This is your opportunity to provide feedback and identify any critical areas that we might miss in our working group's focus.
The open review and comments period starts today and ends on November 29, 2019.//
<<<
* Téléchargement (après inscription) → ''[[CloudSecurityAlliance.fr/go/jatp|https://cloudsecurityalliance.fr/go/jatp/]]''
!Document "//Requirements for Bodies Providing STAR Certification//"
[>img(200px,auto)[iCSA/JATPR.png]]Publication de ce qui semble être un document de travail (avec quelques erreurs mineures) qui s'inspire de l'ISO ISO/IEC 27006:2015 qui porte sur les exigences pour les organismes procédant à l'audit et à la certification des systèmes de management de la sécurité de l'information.
__Extraits :__
<<<
//1 - General
* 1.1 - This document outlines how to conduct a STAR certification assessment to the Cloud Controls Matrix (CCM) as part of an ISO/IEC 27001 assessment.
* 1.2 - The controls set out in the CCM can be considered additional
//[...]//
4 - Requirements on a certification body
* 4.1 - A certification body must be a CSA Corporate Member in good standing
* 4.2 - A certification body conducting CCM assessments shall be ISO/IEC 27006 accredited by an IAF member accreditation body for delivery of ISO/IEC 27001 assessments.
* 4.3 - A certification body shall comply with all the requirements of ISO/IEC 27006 as well as this documents requirements when conducting a CCM assessment.
//[...]//
5 Competency requirements
* 5.1 - All assessors must be able to present evidence of passing an accredited lead auditor
course for ISO/IEC 27001 or be a qualified and experienced ISO/IEC 27001 assessor
for an IAF member accredited ISO/IEC 27001 certification body.
//[...]//
9 - Audit and Certification
9.1 - An assessment cycle will follow the assessment cycle for ISO/IEC 27001.
//[...]
<<<
//&rArr; télécharger le ''[[document|https://CloudSecurityAlliance.fr/go/jasr/]]
!Article "//Cloud Security Alliance Releases Anti-DDoS: Software-Defined Perimeter As a DDoS Prevention Mechanism//"
[>img(200px,auto)[iCSA/JASPS.png]]
<<<
//Document examines the operationalization of Software-Defined Perimeter as prevention mechanism against three well-known types of Distributed Denial of Service attacks

ORLANDO - (ISC)2 Security Congress - Oct. 28, 2019 - The Cloud Security Alliance (CSA), the world's leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today released new research on Anti-DDoS: Software-Defined Perimeter as a DDos Prevention Mechanism. Produced by CSA's Software-Defined Working (SDP) Group, this paper sheds light on the use of a SDP as a tool to prevent Distributed Denial-of-Service (DDoS) attacks. It demonstrates the efficiency and effectiveness of a SDP against several well-known attacks including HTTP Flood, TCP SYN, and UDP Reflection.

The document focuses on protecting private services, such as private business applications, employee or customer portals, and email servers, which are well-suited to being protected from DDoS attacks by a Software-Defined Perimeter. Utilizing the Seven Layer OSI Model, various scenarios are laid out based on where the aforementioned attacks may be targeted (i.e. applications, transportation, and networks), which security professionals can use as guides for securing their own enterprise systems.

"Denial of Service attacks are - and continue to be - a problem. With the adoption of cloud services, the threat of network attacks against application infrastructure increases, since traditional perimeter-defense techniques cannot adequately protect servers," said Juanita Koilpillai, co-chair, CSA Software-Defined Perimeter Working Group, and CEO and President of Waverley Labs. "This document, the latest from the SDP Working Group, was created to aid those responsible for the evaluation, design, deployment, or operation of DDoS prevention solutions within their enterprise."

Typically performed against public-facing services running on the internet, such as web servers and DNS servers, DDoS attacks attempt to overwhelm a target and prevent it from delivering its services to legitimate users. SDPs are resilient against these types of attacks, however, because they utilize a computationally lightweight mechanism (SPA) to distinguish between authorized and unauthorized users, even from remote systems. Because the vast majority of DDoS traffic is initiated by unauthorized users, SDP gateways can reject it without incurring a heavy computational load on the server.

The Software-Defined Perimeter Working Group was created with the goal of developing a solution to stop network attacks against application infrastructure. Those interested in learning more about the group or participating in future research should visit the Software-Defined Perimeter Working Group page.//
<<<
&rArr; Lire [[l'original|https://CloudSecurityAlliance.fr/go/jasa/]] sur le site de la CSA.
!Document "//Software-Defined Perimeter as a DDoS Prevention Mechanism//"
[>img(200px,auto)[iCSA/JASPS.png]]__Extraits__
<<<
//__''Goals:''__
The primary goal of this document is to increase the awareness and understanding of SDP as a tool to prevent DDoS attacks by demonstrating its efficiency and effectiveness against several wellknown attacks, including HTTP Flood, TCP SYN, and UDP Reflection.//
[...]
//__''SDP as a DDoS Defense Mechanism:''__ 
The techniques described above to detect, divert, filter and analyze are suitable for a large volume of packets associated with DDoS attacks. Many small malformed packets associated with resource depletion DDoS attacks typically bypass these techniques as they are hard to detect. However, these techniques are expensive and more frequently than not filter out good packets. SDPs are architected to allow ONLY good packets through while dropping all bad packets. In general, with SDPs, hosts are hidden, clients coordinate with (typically with multiple) perimeters so that good packets known to SDPs and upstream routers can be informed about bad packets to block. For the purpose of showing how SDPs can be used as a DDoS defense mechanism, we will use the open source reference implementation as an example. In the reference implementation, clients (users on devices) are cryptographically signed into the perimeter.//
[...]
//__''Summary:''__
The goal of this paper is to increase the awareness and understanding of SDP as a tool to prevent DDoS attacks by demonstrating its efficiency and effectiveness against several well- known attacks.
To that end we presented in the Introduction definitions of DDoS and DoS attacks. Then in the next section DDoS Attack Vectors, we presented a table DDoS attack Vectors by OSI and TCP/IP layers.
From this table we selected as our focus three well-known attacks:
# Layer 7 Application - HTTP Flood Attacks
# Layer 4 Transport - SYN "TCP" Flood
# Layer 3 Network - UDP Reflection Attacks
After selecting the vectors and attacks of focus we explained them conceptually in detail. This was followed by a section DDoS Attack Mitigations via Non SDP Defenses where we described non SDP mitigations that are available for use at various OSI layers.
We followed this up with SDP as DDoS Defense Mechanism. Here we first described the sequence of events that are followed to set up and configure SDP as a DDoS defense. Then we enumerated the protections afforded by the setup including
# Invisible services behind a deny-all SDP Gateway;
# Authenticating users on devices prior to opening up the firewall to establish connections;
# Using a dynamic firewall mechanism, to allow or which allows SDP to drop packets as fast as the switches serve them up during a DDoS attack.
Finally, we looked at the following three attacks using SDP as a defense mechanism:
# HTTP Flood Attack & SDP Defense
# TCP SYN Flood Attack & SDP Defense
# UDP Reflection Attack & SDP Defense
//
<<<
__Table des Matières__//
<<<
* Introduction
** DDoS and DoS Attacks Defined
** Goals
** Target Audience
** DDoS Attack Vectors
** DDoS Attack Vectors by OSI and TCP/IP Model Layer
** DDoS Attack Mitigations (via Non SDP Defenses)
* SDP as a DDoS Defense Mechanism
* HTTP Flood Attack & SDP Defense
** Battlefield
** Attack Explained
** Defense Explained
* TCP SYN Flood Attack and SDP Defense
** Battlefield
** Attack Explained
** Defense Explained
* UDP Reflection Attack & SDP Defense
** Battlefield
** Attack Explained
** Defense Explained
* Summary
* Glossary
* Other Reading
* Appendix
** Appendix 1: OSI & TCP/IP Layers & Logical Protocols
** Appendix 2: DDoS Attacks by OSI & TCP/IP Layers
** Appendix 3: DDoS & Other Attack Monitoring Maps
** Appendix 4: DDoS Biggest Attacks
<<<
//&rArr; télécharger le ''[[document|https://CloudSecurityAlliance.fr/go/jasp/]]
!1 - Les nouveautés CSA de la semaine du 21 au 27 octobre 2019
* [>img[iCSF/cloud-security-alliance-fr.png]]Blog : ''Corporate Contractors and the Requirement for Zero-Trust Network Access''+++*[»]> <<tiddler [[2019.10.21 - Blog : 'Corporate Contractors and the Requirement for Zero-Trust Network Access']]>>=== 
* Actu : Gouvernance du risque et certification européenne au Congrès CSA EMEA en Novembre à Berlin+++*[»]> <<tiddler [[2019.10.24 - Gouvernance du risque et certification européenne au Congrès CSA EMEA en Novembre à Berlin]]>>=== 
* __''À lire'' :__ ''Modèle MITRE ATT&CK adapté au Cloud''+++*[»]> <<tiddler [[2019.10.25 - Modèle MITRE ATT&CK adapté au Cloud]]>>=== 
!2 - Veille Web
La +++*[Veille Web]> <<tiddler [[2019.10.27 - Veille Hebdomadaire - 27 octobre]]>>=== avec plus de 60 liens :
* Pannes ou attaques : Amazon AWS, Google GCP
* Fuites de données : Adobe Cloud, AutoClerk (fonctionnaires et militaires américains)
* Annonces : attribution du contrat JEDI pour le DoD à ... Microsoft (pour le moment)
* Rapports : Skybox Security
* Divers : Docker, Kubernetes, sécurité des containers, Zero Trust et Microsoft 365+++*[»]>
|2019.10.27|Thomas Naunheim|![[Implementing Zero Trust with Microsoft 365 (Study collection)|https://www.cloud-architekt.net/implementing-zero-trust-with-microsoft-365/]]|O365 Zero_Trust|
=== 
!3 - Conférences et Salons
* Le programme de la ''Cloud & Cyber Security Expo'' des ''27 et 28 novembre'' à Paris est partiellement disponible :
** Teaser et inscription gratuite+++*[»]> <<tiddler [[2019.10.11 - Cloud & Cyber Security Expo - Inscription et Extrait du Programme (1/3)]]>>=== 
** Animation d'une table ronde sur la ''Cyber-Résilence dans le Cloud''+++*[»]> <<tiddler [[2019.10.07 - Cloud & Cyber Security Expo les 27 et 28 novembre 2019]]>>=== 
* Les inscriptions pour le ''Congrès Européen'' des ''18 au 21 novembre'' à Berlin sont toujours ouverte+++*[»]> <<tiddler [[2019.09.04 - Annonce du programme du Congrès CSA EMEA en Novembre à Berlin]]>>=== 
** Contactez-nous pour avoir une réduction sur votre inscription.+++*[»]> → [img(200px,auto)[iCSF/Email-CSA_FR.png]]=== 
|!Octobre|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2019.10.27|
|2019.10.27|Thomas Naunheim|![[Implementing Zero Trust with Microsoft 365 (Study collection)|https://www.cloud-architekt.net/implementing-zero-trust-with-microsoft-365/]]|O365 Zero_Trust|
|>|>|>|!2019.10.25|
|2019.10.25|Comparitech|[[7 million Adobe Creative Cloud accounts exposed to the public|https://www.comparitech.com/blog/information-security/7-million-adobe-creative-cloud-accounts-exposed-to-the-public/]]|DataLeak Adobe|
|2019.10.25|Bleeping Computer| → [[7.5 Million Records of Adobe Creative Cloud User Data Exposed|https://www.bleepingcomputer.com/news/security/75-million-records-of-adobe-creative-cloud-user-data-exposed/]]|DataLeak Adobe|
|2019.10.25|BetaNews| → [[Adobe exposed personal data of 7.5 million Creative Cloud users in unsecured database|https://betanews.com/2019/10/26/adobe-creative-cloud-data-leak/]]|DataLeak Adobe|
|2019.10.28|Security Week| → [[Adobe Exposed Creative Cloud Customer Information|https://www.securityweek.com/adobe-exposed-creative-cloud-customer-information]]|DataLeak Adobe|
|2019.10.25|The Register|[[You're flowing it wrong: Bad network route between Microsoft, Apple blamed for Azure, O365 MFA outage|https://www.theregister.co.uk/2019/10/25/microsoft_outage_explainer/]]|Outage O365|
|2019.10.25|DoD|!JEDI Cloud : [[Contracts For Oct. 25, 2019|https://www.defense.gov/Newsroom/Contracts/Contract/Article/1999639/]]|Government JEDI|
|2019.10.25|Silicon Angle| → [[In a big surprise, Pentagon grants Microsoft $10B JEDI cloud contract over Amazon|https://siliconangle.com/2019/10/25/surprise-move-pentagon-grants-microsoft-jedi-cloud-contract-amazon/]]|Government JEDI|
|2019.10.25|GeekWire| → [[Amazon 'surprised' after Pentagon awards coveted $10 billion JEDI cloud contract to rival Microsoft|https://www.geekwire.com/2019/microsoft-awarded-pentagons-10b-jedi-cloud-contract-huge-win-rival-amazon/]]|Government JEDI|
|2019.10.25|Federal News Network| → [[Microsoft wins DoD's controversial JEDI Cloud contract|https://federalnewsnetwork.com/defense-main/2019/10/microsoft-wins-dods-jedi-cloud-contract/]]|Government JEDI|
|2019.10.25|Defense One| → [[Microsoft Wins Massive JEDI Cloud Contract|https://www.defenseone.com/business/2019/10/microsoft-wins-massive-jedi-cloud-contract/160890/]]|Government JEDI|
|2019.10.26|The Register| → [[Pentagon beams down $10bn JEDI contract to Microsoft: Windows giant beats off Bezos|https://www.theregister.co.uk/2019/10/26/microsoft_wins_jedi_deal/]]|Government JEDI|
|2019.10.26|Security Week| → [[Pentagon Awards $10 Billion Cloud Contract to Microsoft, Snubbing Amazon|https://www.securityweek.com/pentagon-awards-10-billion-cloud-contract-microsoft-snubbing-amazon]]|Government JEDI|
|2019.10.27|BetaNews| → [[Microsoft awarded Pentagon's controversial JEDI contract|https://betanews.com/2019/10/27/microsoft-wins-jedi-contract/]]|Government JEDI|
|2019.10.25|DZone|[[Why MQTT Has Become the De-Facto IoT Standard|https://dzone.com/articles/why-mqtt-has-become-the-de-facto-iot-standard]]|MQTT|
|2019.10.25|CIO Dive|[[Senators press AWS on cloud security, call for FTC investigation|https://www.ciodive.com/news/senators-press-aws-on-cloud-security-call-for-ftc-investigation/565751/]]|CapitalOne Outage Lessons_Learnt|
|2019.10.25|//Google Cloud//|[[Exploring Container Security: Vulnerability management in open-source Kubernetes|https://cloud.google.com/blog/products/containers-kubernetes/exploring-container-security-vulnerability-management-in-open-source-kubernetes]]|containers Kubernetes Vulnerability|
|2019.10.25|//Lacework//|[[NIST Cybersecurity Framework and Your Cloud|https://www.lacework.com/nist-cybersecurity-framework/]]|NIST|
|2019.10.25|//Threatpost//|[[Is AWS Liable in Capital One Breach?|https://threatpost.com/capital-one-breach-senators-aws-investigation/149567/]]|CapitalOne Lessons_Learnt|
|2019.10.25|//BSSI//|[[Retour sur la Hack.lu - Jour 3|https://blog.bssi.fr/retour-sur-la-hack-lu-jour-3/]]|Containers|
|>|>|>|!2019.10.24|
|2019.10.24|Hack.lu|![[Who contains the containers|https://cfp.hack.lu/hacklu19/talk/VJSHEV/]]|Containers|
|2019.10.24|RootShell.be| → [[Hack.lu 2019 Day #3 Wrap-Up|https://blog.rootshell.be/2019/10/24/hack-lu-2019-day-3-wrap-up/]]|Containers|
|2019.10.23|Container Journal|[[Kubernetes Without Scale: Setting up a Personal Cluster, Part 2|https://containerjournal.com/topics/container-ecosystems/kubernetes-without-scale-setting-up-a-personal-cluster-part-2/]] (2/2)|Kubernetes|
|2019.10.24|DZone|[[Kubernetes vs. Docker: Comparing The Two Container Orchestration Giants!|https://dzone.com/articles/kubernetes-vs-docker-comparing-the-two-container-o]]|Orchestration Kubernetes Docker|
|2019.10.24|CSO Online|[[5 cloud security basics and best practices|https://www.csoonline.com/article/3446458/5-cloud-security-basics-and-best-practices.html]]|Best_Practices|
|2019.10.24|//ThreatStack//|[[How to Create a Security Risk Assessment for Containers in 5 Steps|https://www.threatstack.com/blog/create-a-security-risk-assessment-for-containers-in-5-steps]]|Containers Risk_Assessment|
|2019.10.24|//CloudCheckr//|[[7 Ways to Improve Your Cloud Computing Return on Investment|https://cloudcheckr.com/cloud-cost-management/7-ways-to-improve-your-cloud-computing-return-on-investment-roi/]]|AWS|
|2019.10.24|//Containous//|[[13 Criteria for Choosing the Best Ingress Controller for Your Kubernetes Deployment|https://vmblog.com/archive/2019/10/24/13-criteria-for-choosing-the-best-ingress-controller-for-your-kubernetes-deployment.aspx]]|Kubernetes|
|2019.10.24|//Alcide//|[[Pod Security Policy|https://blog.alcide.io/pod-security-policy]]|Security_Policy|
|2019.10.24|//Skybox Security//|[[Cloud Infrastructure Vulnerabilities to Increase 50%, According to Skybox Security Report|https://www.prnewswire.com/news-releases/cloud-infrastructure-vulnerabilities-to-increase-50-according-to-skybox-security-report-300944494.html]] ([[rapport|https://lp.skyboxsecurity.com/WICD-2019-10-Cloud-Threat-Trends-Report_Reg.html]])|Report Skybox|
|2019.10.24|//Skybox Security//| → [[Cloud Trends Report Infographic 2019|https://lp.skyboxsecurity.com/WICD-2019-10-Cloud-Threat-Trends-Infographic_03-Infographic.html]] ([[pdf|https://lp.skyboxsecurity.com/rs/440-MPQ-510/images/Skybox_Cloud_Trends_Infographic.pdf]])|Report Skybox|
|2019.10.28|Help Net Security| → [[IaaS cloud vulnerabilities expected to increase 50% over 2018 figures|https://www.helpnetsecurity.com/2019/10/28/iaas-cloud-vulnerabilities-2019/]]|Report Skybox|
|2019.10.24|//Google//|![[Advancing customer control in the cloud|https://cloud.google.com/blog/topics/inside-google-cloud/advancing-customer-control-in-the-cloud]]|CLOUD_Act|
|2019.10.24|//Google//|![[Data incident response process|https://cloud.google.com/security/incident-response/]]|Incident_Response|
|>|>|>|!2019.10.23|
|2019.10.23|DZone|[[Docker Container - Volume and Data Recovery|https://dzone.com/articles/docker-container-volume-mount-and-data-recovery]]|Docker|
|2019.10.23|Container Journal|[[Kubernetes Without Scale: Reasons to Run a Personal Cluster, Part 1|https://containerjournal.com/topics/container-ecosystems/kubernetes-without-scale-reasons-to-run-a-personal-cluster/]] (1/2)|Kubernetes|
|2019.10.23|VMblog|[[Using DRaaS to Mitigate the Damage of Ransomware|https://vmblog.com/archive/2019/09/23/using-draas-to-mitigate-the-damage-of-ransomware.aspx]]|DRaaS Mitigation|
|2019.10.23|Eversheds Sutherland|[[Legal Alert: The CLOUD Act - A cross-border data access agreement rises from the fog|https://us.eversheds-sutherland.com/NewsCommentary/Legal-Alerts/226041/Legal-Alert-The-CLOUD-Act-A-cross-border-data-access-agreement-rises-from-the-fog]]|CLOUD_Act|
|2019.10.23|//Google Cloud//|[[Find and fix misconfigurations in your Google Cloud resources|https://cloud.google.com/blog/products/identity-security/find-and-fix-misconfigurations-in-your-google-cloud-resources]] (6/6)|GCP Misconfigurations|
|>|>|>|!2019.10.22|
|2019.10.22|The Register|[[Bezos DDoS'd: Amazon Web Services' DNS systems knackered by hours-long cyber-attack|https://www.theregister.co.uk/2019/10/22/aws_dns_ddos/]]|AWS DDoS Outage|
|2019.10.23|Catchpoint|! → [[AWS Users Blindsided by DDoS Attacks|https://blog.catchpoint.com/2019/10/23/aws-ddos-attacks/]]|AWS DDoS Outage|
|2019.10.23|TechRadar| → [[AWS hit by major DDoS attack|https://www.techradar.com/news/aws-hit-by-major-ddos-attack]]|AWS DDoS Outage|
|2019.10.23|IT Pro| → [[AWS servers hit by sustained DDoS attack|https://www.itpro.co.uk/amazon-web-services-aws/34679/aws-servers-hit-by-sustained-ddos-attack]]|AWS DDoS Outage|
|2019.10.23|CBR Online| → [[AWS Hit by DDoS Attack - Google Cloud Issues Unrelated|https://www.cbronline.com/news/aws-ddos-attack]]|AWS DDoS Outage|
|2019.10.24|Dark Reading| → [[Eight-Hour DDoS Attack Struck AWS Customers|https://www.darkreading.com/cloud/eight-hour-ddos-attack-struck-aws-customers/d/d-id/1336165]]|AWS DDoS Outage|
|2019.10.24|Security Week| → [[DDoS Attack Hits Amazon Web Services|https://www.securityweek.com/ddos-attack-hits-amazon-web-services]]|AWS DDoS Outage|
|2019.10.24|InfoSec Mag| → [[AWS Left Reeling After Eight-Hour DDoS|https://www.infosecurity-magazine.com/news/aws-customers-hit-by-eighthour-ddos/]]|AWS DDoS Outage|
|2019.10.22|Ajay Kumar|[[What is Azure Security Center and its Capabilities?|https://medium.com/@intouchajay/what-is-azure-security-center-and-its-capabilities-cf19edbd6983]]|Azure|
|2019.10.22|//TrendMicro//|![[The Shared Responsibility Model|https://blog.trendmicro.com/the-shared-responsibility-model/]]|Shared_Responsibility|
|2019.10.22|//Sophos//|[[Storing your stuff securely in the cloud|https://nakedsecurity.sophos.com/2019/10/22/storing-your-stuff-securely-in-the-cloud/]]|Misc|
|2019.10.22|//Digital Ocean//|[[Issues with accessing S3/RDS resources inside Droplets across all regions|https://status.digitalocean.com/incidents/1z3kmlvz69v6]]|Outage|
|2019.10.22|//Google Cloud//|[[Google Cloud Networking Incident #19020|https://status.cloud.google.com//incident/cloud-networking/19020]]|Outage GCP|
|2019.10.22|//ExtraHop//|[[4 Common Cloud Misconfigurations & What To Do About Them|https://www.extrahop.com/company/blog/2019/4-common-cloud-misconfigurations-and-what-to-do-about-them/]]|Misconfigurations|
|2019.10.22|//Tripwire//|[[Guide to Container Security - Everything You Need to Know|https://www.tripwire.com/state-of-security/devops/guide-container-security/]]|Containers Best_Practices|
|2019.10.22|//Microsoft//|[[Users can now check their sign-in history for unusual activity|https://techcommunity.microsoft.com/t5/Azure-Active-Directory-Identity/Users-can-now-check-their-sign-in-history-for-unusual-activity/ba-p/916066]]|AzureAD|
|2019.10.22|Security Week|[[New Azure AD Feature Detects Unauthorized Access Attempts|https://www.securityweek.com/new-azure-ad-feature-detects-unauthorized-access-attempts]]|AzureAD|
|2019.10.22|//Security Discovery//|[[Religious Website and Software Provider Leaks Customer and Credit Card Data for Many Months|https://securitydiscovery.com/cloversites/]]|DataLeak ElasticSearch|
|2019.10.22|//Uptycs//|[[3 Cloud Computing Security Issues & How To Get Them Under Control|https://www.uptycs.com/blog/cloud-computing-and-security]]|Misc|
|>|>|>|!2019.10.21|
|2019.10.21|CIGREF[>img[iCSF/flag_fr.png]]|[[Cloud de confiance : les entreprises membres du Cigref proposent à l'État leur collaboration|https://www.cigref.fr/cloud-de-confiance-entreprises-membres-du-cigref-proposent-a-etat-leur-collaboration]]|Sovereign_Cloud|
|2019.10.21|(ISC)2|[[PCI Compliance in AWS - Simplified|https://blog.isc2.org/isc2_blog/2019/10/pci-compliance-in-aws-simplified.html]]|AWS PCI_DSS|
|2019.10.21|DZone|[[Designing Your First App in Kubernetes: A Summary|https://dzone.com/articles/designing-your-first-app-in-kubernetes-a-summary]]|Kubernetes|
|2019.10.21|VPNmentor|[[Report: Travel Reservations Platform Leaks US Government Personnel Data|https://www.vpnmentor.com/blog/us-travel-military-leak/]]|Data_Leaks ElasticSearch|
|2019.10.21|ZDnet| → [[Open database leaked 179GB in customer, US government, and military records|https://www.zdnet.com/article/autoclerk-database-leaked-customer-government-and-military-personal-records/]]|Data_Leaks ElasticSearch|
|2019.10.22|InfoSecurity Mag| → [[US Military Personnel Exposed in Latest Cloud Data Leak|https://www.infosecurity-magazine.com/news/military-personnel-exposed-latest/]]|Data_Leaks ElasticSearch|
|2019.10.22|DataBreach Today| → [[Unsecure Database Exposed US Military Personnel Data: Report - Exposed Database Owned by AutoClerk Hotel Reservation Management System|https://www.databreachtoday.co.uk/unsecure-database-exposed-us-military-personnel-data-report-a-13280]]|Data_Leaks ElasticSearch|
|2019.10.22|The Register| → [[Messed Western: Vuln hunters say hotel giant's Autoclerk code exposed US soldiers' info, travel plans, passwords|https://www.theregister.co.uk/2019/10/22/autoclerk_army_data/]]|Data_Leaks ElasticSearch|
|2019.10.21|InfoSec Institute|[[Lessons learned: The Capital One breach|https://resources.infosecinstitute.com/lessons-learned-the-capital-one-breach/]]|CapitalOne|
|2019.10.21|CSO|[[Top cloud security controls you should be using|https://www.csoonline.com/article/3208905/top-cloud-security-controls-you-should-be-using.html]]|Controls|
|2019.10.21|CRN AU|[[Senate pushes fix to allow US access to local clouds|https://www.crn.com.au/news/senate-pushes-fix-to-allow-us-access-to-local-clouds-532613]]|CLOUD_Act|
|2019.10.21|//Heimdal//|[[New Microsoft Phishing Campaign Targets Office365 Users|https://heimdalsecurity.com/blog/new-microsoft-phishing-campaign-targets-office365-users/]]|O365 Phishing|
|2019.10.21|//Microsoft//|[[Unverified Sender|https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/unverified-sender-feature]]|O365 Mail|
|2019.10.21|Bleeping Computer| → [[Office 365 Now Warns About Suspicious Emails with Unverified Senders|https://www.bleepingcomputer.com/news/microsoft/office-365-now-warns-about-suspicious-emails-with-unverified-senders/]]|O365 Mail|
|2019.10.21|//eXemplify//|[[Why There May Be Room for Cloud Solutions in Your Compliance Strategy|http://www.exemplifygroup.com/why-there-may-be-room-for-cloud-solutions-in-your-compliance-strategy/]]|Compliance|
|2019.10.21|//Efficient IP//|[[Cloud to the Edge Brings IP Space Complexity|https://www.efficientip.com/cloud-edge/]]|Misc|
|2019.10.21|//Microsoft//|[[Run a disaster recovery drill for Azure VMs to a secondary Azure region|https://docs.microsoft.com/en-us/azure/site-recovery/azure-to-azure-tutorial-dr-drill]]|Azure DRP|
[>img(150px,auto)[iCSF/MITRE.png]]Début octobre 2019, le [[MITRE]] a publié une extension du cadre ''MITRE ATT&CK'' pour le Cloud.

Ainsi, 36 techniques ont été ajoutées ou mises à jour pour couvrir le comportement d'attaquants contre les plates-formes Cloud.
Le ''MITRE ATT&CK Cloud'' est ainsi décliné pour :
* les plates-formes IaaS : Amazon Web Services (AWS), Microsoft Azure (Azure) et Google Cloud Platform (GCP)
* les plates-formes SaaS
* deux environnements plus spécifiques : Azure Active Directory (Azure AD) et Office 365

A noter :[>img(auto,50px)[iCSF/MITRE_ATTACK.png]]
* La matrice ''ATT&CK Cloud'' et ses déclinaisons peuvent être prises en compte séparément du reste de la matrice ''ATT&CK Enterprise''.
* La définition du mouvement latéral a été étendue afin d'intégrer l'accès et l'interaction avec le Cloud.
* La liste actuelle des plates-formes cloud sera étendue dans le courant de l'année prochaine.

Les différents élements sont les suivants :
* MITRE ATT&CK+++*[»]> <<tiddler [[MITRE ATTACK]]>>=== 
* MITRE ATT&CK Cloud+++*[»]> <<tiddler [[MITRE ATTACK Cloud]]>>=== 
* MITRE ATT&CK Cloud IaaS+++*[»]> <<tiddler [[MITRE ATTACK Cloud IaaS]]>>=== 
* MITRE ATT&CK Cloud SaaS+++*[»]> <<tiddler [[MITRE ATTACK Cloud SaaS]]>>=== 
* MITRE ATT&CK Cloud AzureAD+++*[»]> <<tiddler [[MITRE ATTACK Cloud AzureAD]]>>=== 
* MITRE ATT&CK Cloud O365+++*[»]> <<tiddler [[MITRE ATTACK Cloud O365]]>>=== 

Lien → https://attack.mitre.org/matrices/enterprise/cloud/
[img[iCSF/flag_fr.png]]^^oc^^[img(50%,1px)[iCSF/BluePixel.gif]]
[>img(300px,auto)[iCSA/JBICE.jpg]]__"''Cloud Security Alliance 2019 EMEA Congress Adds Focus on Risk Governance and European Cloud Certification Enablement''"__
Quelques précisions sur 2 sessions du prochain [[Congrès CSA EMEA|2019.11.20 - CSA Congress EMEA 2019 - Berlin]] qui se déroulera du 18 au 21 novembre 2019 à Berlin.
<<<
//__William Ochs, Rolf Becker will share insight from 60 years combined experience in banking and cybersecurity risks__
Berlin, Germany - Oct. 24, 2019 - The Cloud Security Alliance (CSA), the world's leading organization dedicated to defining standards, certifications and best practices to help ensure a secure cloud computing environment, today announced additions to its speaker line-up and session highlights for its [[upcoming CSA EMEA Congress (Berlin, Nov. 18-21, 2019)|2019.11.20 - CSA Congress EMEA 2019 - Berlin]]. Rolf Becker, Cloud Business Office Risk Governance, UBS Business Solutions AG, and Prof. William Ochs, EMEA Cloud Certification Enablement Manager for Cisco and co-chair of CSP CERT, will bring the issues surrounding risk governance and cloud certification enablement to the forefront, sharing their expertise after 30 years each in banking and cybersecurity, respectively. Registration is now open with special discounts being offered through November 1.

Those attending the [[2019 CSA EMEA Congress|2019.11.20 - CSA Congress EMEA 2019 - Berlin]] will also be privy to the inside scoop from some of the top cloud security media, learning about the elements behind a breaking story, research required, the missing pieces, challenges and how journalists might re-write the story over again.

"CSA has led the industry in research and development of best practices surrounding the General Data Protection Regulation (GDPR) and how it relates to cloud security. This year's ''CSA EMEA Congress'' will continue to build on lessons learned 18 months after GDPR's implementation as part of our ongoing mission to help both customers and cloud providers navigate the confluence of security, privacy, governance and compliance," said Daniele Catteddu, Chief Technology Officer, Cloud Security Alliance.

Focusing on two tracks — ''Cloud Privacy, Governance, and Compliance'' and ''Best Practices in Cybersecurity'' — attendees will have the chance to hear from some of the leading cloud and privacy thought leaders and policy makers.

The following panels and speakers have been added to the agenda:
* ''The European Cloud Certification Scheme: Forward Together''. Presenter: Prof. William Ochs, EMEA Cloud Certification Enablement Manager, Cisco and co-chair of CSP CERT.
** This session will review the origins of the European-wide Cloud Certification scheme, its security levels, and provide participants with both the current state of codification efforts and a picture of the next steps currently underway within both ENISA and the EU Commission. Alignment of the certification, with respect to CSA, will also be discussed. Participants will be prepared with a current understanding of CSPCERT's recommended steps for the EU Commission and ENISA, whom are key EU stakeholders with respect to cloud security certification strategies.
* ''Risk Governance on Cloud Adoption and Information Security in a Tightly Regulated Environment''. Presenter: Rolf Becker, UBS Business Solutions AG, Cloud Business Office Risk Governance.
** Cloud adoption is an enabler for efficiency, scalability, flexibility, and survival critical in a rapidly changing business environment. Attendees will learn how risk governance is an enabler for cloud adoption within highly regulated industries, such as financial services, and how it simultaneously helps organizations comply with regulatory and client demands for transparency and control.
* Panel: ''Press Perception of Cloud Technology''.
** With increased security threats to cloud technology and services quickly demanding the attention and reporting from the nation's top media, there is a lot to translate and comprehend to understand this highly complex and technical industry. In this session, some of the most credible and knowledgeable media in cloud reporting come together for a friendly discussion on cloud reporting greatness, grief and grunts. They'll pull back the curtain on some of their most recent reporting to help the audience understand the elements behind a breaking story, research required, the missing pieces, challenges and how they might re-write the story all over again. Attendees will also get a sneak peek into stories in development for the next cloud news item.
//
<<<
Pour en savoir plus et s'incrire :
* Annonce → ''[[CloudSecurityAlliance.fr/go/jaoa/|https://cloudsecurityalliance.fr/go/jaoa/]]''
* Détails et inscription → ''[[CloudSecurityAlliance.fr/go/jBjE/|https://cloudsecurityalliance.fr/go/jBjE/]]''
!"//Corporate Contractors and the Requirement for Zero-Trust Network Access//"
[>img(150px,auto)[iCSA/JALBC.jpg]]Article de blog publié le 21 octobre 2019 — Rédigé par Etay Bogner, VP, Zero-Trust Products Proofpoint, auparavant PDG de Meta Networks
<<<
//It's not a stretch to say that most industries and organizations today have contractors in the mix who need remote access to the company's network. Yet the traditional virtual private network (VPN) method of enabling access for corporate contractors — as well as other third parties such as vendors, partners, and customers — has a key flaw. The VPN model, by design, requires companies to place excessive trust in every contractor and third party who taps into the network, when a "zero trust" approach is really what's needed.

What I mean by that is that contractors generally only require access to specific applications on the network to conduct company business, not to have free reign over the whole enchilada. Companies take security risks by enabling their team of remote contractors to have excessive access. To limit those risks, IT administrators are wise to upgrade from a conventional VPN approach and adopting a software-defined perimeter (SDP) security model that enables the principles of zero-trust security. What it means to have zero-trust network access is that the solution not only provides segmented access for every user, but also verifies and audits that access.

Here's an example of what this might look like in practice if you have two remote contractors — let's call them A and B. With zero-trust SDP architecture, Remote Contractor A might have her access restricted to a single cloud-based application, as well as one application in the data center. Meanwhile, Remote Contractor B might only be able to access one application at headquarters. Neither Remote Contractor A nor Remote Contractor B are greenlighted to access the full corporate network/data center, but instead receive very finely grained access, as granted by IT, based on each manager's and/or department's project requirements.

As you can imagine, there are a number of clear benefits in providing zero-trust network access for all of your corporate contractors. Below is a summary of four of the key advantages:
# ''Risk reduction''. VPNs create a high-risk situation in terms of providing network access to remote contractors, as VPNs were not designed with this particular use case in mind. Alternatively, using a zero-trust SDP network allows for the creation of boundaries around any application based on identity and context. An SDP approach also allows an enterprise to ensure that each contractor's device follows a customized policy that's enforced. Meanwhile, any resources that a specific contractor is unauthorized to access remain invisible to the contractor, which reduces the surface for potential attacks.
# ''App-specific access, not full network access''. On a related note, the SDP allows your company to outline security policies at a granular level, associating specific remote contractors with the exact applications and/or services that they require. This is a huge security advantage compared to VPNs, which roll out free access to the entire corporate network. SDP can accomplish this goal easily since each contractor's user device can be assigned its own authenticated, unique identity, which then gets verified and authorized for every packet in real-time. Segmenting and securing access means that IT can designate each contractor the exact access he or she requires for a specific job to a limited subset of applications. This helps avoid potential security risks as mentioned above, as well as operational overhead.
# ''Easy management''. VPN configuration is notoriously complex, but an SDP approach allows for much simpler processes and management. You can use one cloud console to manage access policies for all enterprise resources in the cloud or data center. You can also easily tackle tasks like:
** Onboarding new remote contractors
** Assigning role-based policies
** Sending a link to enable remote contractors to access a specific application from their browser 
In particular, the onboarding of new contractors can be a real headache with a traditional VPN client, requiring annoying configuration issues and time-consuming troubleshooting, which can quickly become unsustainable if you're not managing contractors' devices. Fully onboarding a new remote contractor could potentially take days or even weeks in this circumstance, presenting impediments to your enterprise's ability to focus on key parts of your business. These distractions vanish when you switch to an SDP solution. # ''Superior experience for contractors''. No more VPN headaches for your remote contractors; SDP allows for a much more consistent and reliable experience with easy, transparent, worldwide access. The central management of a zero-trust network, which covers all of your applications and data, as well as all of your contractors and other third parties, assures not only granular security for the enterprise, but also a positive experience for users that will help improve retention of remote contractors. If you have a widely distributed workforce or work with remote contractors in any capacity, consider the above benefits when weighing whether to continue with a legacy-style VPN, or switch to an architecture that's user-centric and zero-trust. The latter offers secure, granular, controlled access to specific parts of your network or software platform and can be enforced consistently no matter where contractors are based or working — huge benefits in today's increasingly distributed work environment.// [...] <<< &rArr; Lire [[l'original|https://CloudSecurityAlliance.fr/go/jalb/]] sur le blog de la CSA. &rArr; https://blog.cloudsecurityalliance.org/2019/10/21/corporate-contractors-and-the-requirement-for-zero-trust-network-access/
!1 - Les nouveautés CSA de la semaine du 14 au 20 octobre 2019
* [>img[iCSF/cloud-security-alliance-fr.png]]Blog : ''Introducing Reflexive Security for integrating security, development and operations''+++*[»]> <<tiddler [[2019.10.14 - Blog : 'Introducing Reflexive Security for integrating security, development and operations']]>>=== 
!2 - Veille Web
La [[Veille Web|2019.10.20 - Veille Hebdomadaire - 20 octobre]] avec plus de 50 liens :
* __''À lire'' :__ Document "''Trusted Cloud: Microsoft Azure security, privacy, compliance, resiliency, and protected IP''"+++*[»]>
|2019.10.16|//Microsoft Azure//|[[Trusted Cloud: security, privacy, compliance, resiliency, and IP|https://azure.microsoft.com/en-us/blog/trusted-cloud-security-privacy-compliance-resiliency-and-ip/]] ([[document|http://download.microsoft.com/download/1/6/0/160216AA-8445-480B-B60F-5C8EC8067FCA/WindowsAzure-SecurityPrivacyCompliance.pdf]])|Compliance Resilience|
=== 
* Alerte : malware ''Graboid'' visant des containers Docker+++*[»]>
|2019.10.16|//PaloAlto Networks//|![[Graboid: First-Ever Cryptojacking Worm Found in Images on Docker Hub|https://unit42.paloaltonetworks.com/graboid-first-ever-cryptojacking-worm-found-in-images-on-docker-hub/]]|Docker 
CryptoJacking
Attacks| |2019.10.16|Bleeping Computer| → [[Unsecured Docker Hosts Attacked by New Graboid Cryptojacking Worm|https://www.bleepingcomputer.com/news/security/unsecured-docker-hosts-attacked-by-new-graboid-cryptojacking-worm/]]|~| |2019.10.16|Dark Reading| → [[Cryptojacking Worm Targets and Infects 2,000 Docker Hosts|https://www.darkreading.com/cloud/cryptojacking-worm-targets-and-infects-2000-docker-hosts/d/d-id/1336104]]|~| |2019.10.16|DataBreach Today| → [['Graboid' Cryptojacking Worm Spreads Through Containers|https://www.databreachtoday.com/graboid-crytopjacking-worm-spreads-through-containers-a-13256]]|~| |2019.10.16|//Threatpost//| → [[Docker Containers Riddled with Graboid Crypto-Worm|https://threatpost.com/docker-containers-graboid-crypto-worm/149235/]]|~| ===, analyse de 2 vulnérabilités Kubernetes+++*[»]> |2019.10.16|//PaloAlto Networks//|![[Analysis of Two Newly Patched Kubernetes Vulnerabilities|https://blog.paloaltonetworks.com/2019/10/cloud-kubernetes-vulnerabilities/]]|Kubernetes CVE-2019-11253 CVE-2019-16276| |2019.10.16|//Threatpost//| → [[Dangerous Kubernetes Bugs Allow Authentication Bypass, DoS|https://threatpost.com/kubernetes-bugs-authentication-bypass-dos/149265/]]|Kubernetes CVE-2019-11253 CVE-2019-16276| === * Pannes : authentification O365 (18 oct.)+++*[»]> |2019.10.18|Bleeping Computer|[[Microsoft 365 Authentication Outage, Users Unable to Login|https://www.bleepingcomputer.com/news/microsoft/microsoft-365-authentication-outage-users-unable-to-login/]]|Outage
O365| |2019.10.18|//Microsoft//| → [[Admins who are unable to access the admin center can find updates on the MFA outage MO193431 through status.office.com|https://mobile.twitter.com/MSFT365Status/status/1185211082941648897]]|~| |2019.10.18|Redmond Channel Partner| → [[Azure AD Outage Linked to Multifactor Authentication Issues|https://rcpmag.com/articles/2019/10/18/azure-ad-outage-linked-to-mfa.aspx]]|~| |2019.10.25|The Register| → [[You're flowing it wrong: Bad network route between Microsoft, Apple blamed for Azure, O365 MFA outage|https://www.theregister.co.uk/2019/10/25/microsoft_outage_explainer/]]|~| === * Divers : Cloud Souverain et "Cloud de Confiance", sécurisation de containers Docker !3 - Conférences et Salons * Le programme de la ''Cloud & Cyber Security Expo'' des ''27 et 28 novembre'' à Paris est partiellement disponible : ** Premier teaser et inscription gratuite+++*[»]> <<tiddler [[2019.10.11 - Cloud & Cyber Security Expo - Inscription et Extrait du Programme (1/3)]]>>=== ** Animation d'une table ronde sur la ''Cyber-Résilence dans le Cloud''+++*[»]> <<tiddler [[2019.10.07 - Cloud & Cyber Security Expo les 27 et 28 novembre 2019]]>>=== * Les inscriptions pour le ''Congrès Européen'' des ''18 au 21 novembre'' à Berlin sont toujours ouverte+++*[»]> <<tiddler [[2019.09.04 - Annonce du programme du Congrès CSA EMEA en Novembre à Berlin]]>>=== ** Contactez-nous pour avoir une réduction sur votre inscription.+++*[»]> → [img(200px,auto)[iCSF/Email-CSA_FR.png]]===
|!Octobre|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2019.10.19|
|2019.10.19|//JumpCloud//|[[Top Cloud Directory Service|https://jumpcloud.com/blog/top-cloud-directory-service/]]|Directories|
|>|>|>|!2019.10.18|
|2019.10.18|Bleeping Computer|[[Microsoft 365 Authentication Outage, Users Unable to Login|https://www.bleepingcomputer.com/news/microsoft/microsoft-365-authentication-outage-users-unable-to-login/]]|Outage O365|
|2019.10.18|//Microsoft//| → [[Admins who are unable to access the admin center can find updates on the MFA outage MO193431 through status.office.com|https://mobile.twitter.com/MSFT365Status/status/1185211082941648897]]|Outage O365|
|2019.10.18|Redmond Channel Partner| → [[Azure AD Outage Linked to Multifactor Authentication Issues|https://rcpmag.com/articles/2019/10/18/azure-ad-outage-linked-to-mfa.aspx]]|Outage O365|
|2019.10.18|Security Boulevard|[[Hybrid Cloud's Impact on Financial Services Security|https://securityboulevard.com/2019/10/hybrid-clouds-impact-on-financial-services-security/]]|Misc|
|2019.10.18|JDSupra|[[Singapore Issues Guidelines on Personal Data Protection and Cloud Services|https://www.jdsupra.com/legalnews/singapore-issues-guidelines-on-personal-30298/]]|Singapore Regulations|
|2019.10.18|CBR Online|[[The Security Risks of Cloud Computing Start With You|https://www.cbronline.com/feature/security-risks-of-cloud-computin]]|Risks|
|2019.10.18|Container Journal|[[Multi-Cloud, Hybrid Cloud and Kubernetes|https://containerjournal.com/topics/container-ecosystems/multi-cloud-hybrid-cloud-and-kubernetes/]]|Kubernetes Hybrid_Cloud|
|>|>|>|!2019.10.17|
|2019.10.17|Anton Chuvakin|[[Move to Cloud: A Chance to Finally Transform Security?|https://medium.com/anton-on-security/move-to-cloud-a-chance-to-finally-transform-security-e9614aae4f9c]]|Misc|
|2019.10.17|Infosec Island|[[Myth Busters: How to Securely Migrate to the Cloud|http://www.infosecisland.com/blogview/25225-Myth-Busters-How-to-Securely-Migrate-to-the-Cloud.html]]|Migration|
|2019.10.17|Bleeping Computer|[[Microsoft Adds Azure AD Sign-In History to Detect Unusual Activity|https://www.bleepingcomputer.com/news/microsoft/microsoft-adds-azure-ad-sign-in-history-to-detect-unusual-activity/]]|AzureAD Detection|
|2019.10.17|FedScoop|[[Pentagon developing JEDI cloud deployment security guidance|https://www.fedscoop.com/pentagon-jedi-security-guidance/]]|Government JEDI|
|2019.10.17|Solutions Review|[[8 Cloud Security Questions Your Business Needs to Ask|https://solutionsreview.com/cloud-platforms/8-cloud-security-questions-your-business-needs-to-ask/]]|Misc|
|2019.10.17|//Managed Methods//|[[5 Ways To Detect A Cloud Account Takeover|https://managedmethods.com/blog/5-ways-to-detect-a-cloud-account-takeover/]]|Detection|
|2019.10.17|//Panda Security//|[[48% of corporate data is now stored on the cloud|https://www.pandasecurity.com/mediacenter/security/cloud-security-encryption/]]|Storage|
|2019.10.17|//Radware//|[[Radware Unveils WAF for Kubernetes|https://containerjournal.com/topics/container-security/radware-unveils-waf-for-kubernetes/]]|Kubernetes WAF|
|2019.10.17|//CompareTheCloud|//|[[6 Pros and Cons of Cloud Storage for Business|https://www.comparethecloud.net/articles/6-pros-and-cons-of-cloud-storage-for-business/]]|Storage|
|2019.10.17|//Google Cloud//|[[Best practices for a more secure login in Google Cloud|https://cloud.google.com/blog/products/identity-security/best-practices-for-a-more-secure-login-in-google-cloud]]|GCP Authentication|
|2019.10.17|//AWS//|![[Denial of Service Attack Mitigation on AWS|https://aws.amazon.com/answers/networking/aws-ddos-attack-mitigation/]]|AWS DDoS Mitigation|
|>|>|>|!2019.10.16|
|2019.10.16|Sky News|[[Job applicants worried as hundreds of thousands of CVs exposed online|https://news.sky.com/story/job-applicants-worried-as-hundreds-of-thousands-of-cvs-exposed-online-11836935]]|DataBreach AWS Misconfiguration|
|2019.10.17|SiliconAngle| → [[250,000 resumes exposed in latest case of misconfigured cloud storage|https://siliconangle.com/2019/10/17/250000-resumes-exposed-latest-case-misconfigured-aws-cloud-storage/]]|DataBreach AWS Misconfiguration|
|2019.10.17|SC Magazine| → [[Open AWS buckets expose more than 200K CVs at two online recruitment firms|https://www.scmagazine.com/home/security-news/cloud-security/open-aws-buckets-expose-more-than-200k-cvs-at-two-online-recruitment-firms/]]|DataBreach AWS Misconfiguration|
|2019.10.16|Open Web Foundation|[[Rudr: A Kubernetes implementation of the Open Application Model specification|https://github.com/oam-dev/rudr]]|Kubernetes Tools|
|2019.10.16|Open Web Foundation| → [[Open Application Model|https://openappmodel.io/]]|Kubernetes Tools|
|2019.10.17|//Alibaba Cloud//| → [[Announcing the Open Application Model (OAM), an Open Standard for Developing and Operating Applications on Kubernetes and Other Platforms|https://medium.com/@Alibaba_Cloud/announcing-the-open-application-model-oam-an-open-standard-for-developing-and-operating-909c4fa16a6]]|Kubernetes Tools OAM|
|2019.10.16|CBR Online|[[Sovereign Cloud: Where in the World is Public Sector Data Stored?|https://www.cbronline.com/opinion/sovereign-cloud]]|Sovereign_Cloud|
|2019.10.16|//PaloAlto Networks//|![[Graboid: First-Ever Cryptojacking Worm Found in Images on Docker Hub|https://unit42.paloaltonetworks.com/graboid-first-ever-cryptojacking-worm-found-in-images-on-docker-hub/]]|Docker CryptoJacking Attacks Graboid|
|2019.10.16|Bleeping Computer| → [[Unsecured Docker Hosts Attacked by New Graboid Cryptojacking Worm|https://www.bleepingcomputer.com/news/security/unsecured-docker-hosts-attacked-by-new-graboid-cryptojacking-worm/]]|Docker CryptoJacking Attacks Graboid|
|2019.10.16|Dark Reading| → [[Cryptojacking Worm Targets and Infects 2,000 Docker Hosts|https://www.darkreading.com/cloud/cryptojacking-worm-targets-and-infects-2000-docker-hosts/d/d-id/1336104]]|Docker CryptoJacking Attacks Graboid|
|2019.10.16|DataBreach Today| → [['Graboid' Cryptojacking Worm Spreads Through Containers|https://www.databreachtoday.com/graboid-crytopjacking-worm-spreads-through-containers-a-13256]]|Docker CryptoJacking Attacks Graboid|
|2019.10.16|//Threatpost//| → [[Docker Containers Riddled with Graboid Crypto-Worm|https://threatpost.com/docker-containers-graboid-crypto-worm/149235/]]|Docker CryptoJacking Attacks Graboid|
|2019.10.16|//Tripwire//|[[Revisiting The Concepts of Disaster Recovery and Risk as Organizations Move Their Infrastructure To The Cloud|https://www.tripwire.com/state-of-security/security-data-protection/cloud/revisiting-the-concepts-of-disaster-recovery-and-risk-as-organizations-move-their-infrastructure-to-the-cloud/]]|DRP|
|2019.10.16|//PaloAlto Networks//|![[Analysis of Two Newly Patched Kubernetes Vulnerabilities|https://blog.paloaltonetworks.com/2019/10/cloud-kubernetes-vulnerabilities/]]|Kubernetes CVE-2019-11253 CVE-2019-16276|
|2019.10.16|//Threatpost//| → [[Dangerous Kubernetes Bugs Allow Authentication Bypass, DoS|https://threatpost.com/kubernetes-bugs-authentication-bypass-dos/149265/]]|Kubernetes CVE-2019-11253 CVE-2019-16276|
|2019.10.16|//Microsoft Azure//|[[Trusted Cloud: security, privacy, compliance, resiliency, and IP|https://azure.microsoft.com/en-us/blog/trusted-cloud-security-privacy-compliance-resiliency-and-ip/]] ([[document|http://download.microsoft.com/download/1/6/0/160216AA-8445-480B-B60F-5C8EC8067FCA/WindowsAzure-SecurityPrivacyCompliance.pdf]])|Compliance Resilience|
|2019.10.16|//Forcepoint//|[[Exploring SaaS security best practices|https://www.forcepoint.com/blog/insights/exploring-saas-security-best-practices]]|Misc|
|2019.10.16|//Cloud Academy//|[[AWS Security: Bastion Hosts, NAT instances and VPC Peering|https://cloudacademy.com/blog/aws-bastion-host-nat-instances-vpc-peering-security/]]|Bastion|
|>|>|>|!2019.10.15|
|2019.10.15|Ajay Kumar|[[How CASB Can Help Cloud Security Concerns?|https://medium.com/@intouchajay/how-casb-can-help-cloud-security-concerns-710b77941e19]]|CASB|
|2019.10.15|Security Week|![[Securing All Cloud Deployments With a Single Strategy|https://www.securityweek.com/securing-all-cloud-deployments-single-strategy]]|Strategy|
|2019.10.15|//AT&T Cybersecurity//|[[Security monitoring for managed cloud Kubernetes|https://www.alienvault.com/blogs/labs-research/security-monitoring-for-managed-cloud-kubernetes]]|Kubernetes Monitoring|
|2019.10.15|//CyberArk//|[[Keeping up with cloud threats|https://www.professionalsecurity.co.uk/products/cyber/keeping-up-with-cloud-threats/]]|Threats|
|>|>|>|!2019.10.14|
|2019.10.14|Les Echos[>img[iCSF/flag_fr.png]]|[[La France cherche son "cloud de confiance"|https://www.lesechos.fr/tech-medias/hightech/la-france-cherche-son-cloud-de-confiance-1139875]]|Sovereign_Cloud|
|2019.10.14|Wojciech|[[Fun with Amazon S3 - Leaks and bucket takeover attack|https://medium.com/@woj_ciech/fun-with-amazon-s3-leaks-and-bucket-takeover-attack-ddb17da1c431]]|AWS Data_Leaks S3|
|2019.10.14|0x00sec|![[Securing Docker Containers|https://0x00sec.org/t/securing-docker-containers/16913/1]]|Docker Best_Practices|
|2019.10.14|Infosec Institute|[[AWS vs. Azure vs. Cloud+: To specialize, generalize or both?|https://resources.infosecinstitute.com/aws-vs-azure-vs-cloud-plus/]]|Training Certification|
|2019.10.14|Dark Reading|[[When Using Cloud, Paranoia Can Pay Off|https://www.darkreading.com/cloud/when-using-cloud-paranoia-can-pay-off/d/d-id/1336075]]|Misc|
|2019.10.14|//Vera//|[[Mitigating Cloud Misconfiguration Risks to Your Data|https://vmblog.com/archive/2019/10/14/mitigating-cloud-misconfiguration-risks-to-your-data.aspx]]|Risks|
|2019.10.14|//JumpCloud//|[[GPOs "as-a-Service"|https://jumpcloud.com/blog/gpos-as-a-service/]]|GPO|
|2019.10.14|//Viruss//|[[Defining Cloud Security - Is It the Endpoint, Your Data, or the Environment?|http://www.viruss.eu/virus-news/defining-cloud-security-is-it-the-endpoint-your-data-or-the-environment/]]|Misc|
|2019.10.14|//Tripwire//|[[Private Cloud vs Public Cloud Security Challenges|https://www.tripwire.com/state-of-security/security-data-protection/cloud/private-public-cloud-security-challenges/]]|Challenges|
|2019.10.14|//Securosis//|[[Enterprise DevSecOps: Security Test Integration and Tooling|https://securosis.com/blog/enterprise-devsecops-security-test-integration-and-tooling]]|DevSecOps|
!"//Introducing Reflexive Security for integrating security, development and operations//"
[>img(150px,auto)[iCSA/JAEBI.jpg]]Article de blog publié le 14 octobre 2019 — Rédigé par le groupe de travail CSA DevSecOps
<<<
//Organizations today are confronted with spiraling compliance governance costs, a shortage of information security professionals, and a disconnect between strategic security and operational security. Due to these challenges, more and more companies value agility and integrated operations. In short, a security management program must now deliver more for less to match the needs of becoming cost efficient. 

How can organizations accomplish this task? In order to answer that question, CSA recently published a document defining ''Reflexive Security'', a new framework that addresses today's increasing risks and cybersecurity threats. 

[>img(250px,auto)[iCSA/J87PS.png]]__Information Security Management through Reflexive Security - Six Pillars in the Integration of Security, Development and Operations__+++*[»]> <<tiddler [[2019.08.07 - Publication : 'Six Pillars of DevSecOps']]>>=== 
This document provides a flexible framework that: 
* Focuses on collaboration and integration 
* Is outcome-oriented 
* Provides a "reflexive" response to risks. 

The word "Reflexive" comes from the reflexive relation in mathematical sets, where every element in such a relation is related to itself. In Reflexive Security, every action taken is related to the context of the security at hand and needs of the organization itself. 

__Reflexive Security versus ISMS__
While the information security management system (ISMS) approach is well-defined by the International Standard ISO/IEC 27001, organizations who thrive with agile development or other collaborative-oriented processes have found it valuable to use the Reflexive Security framework. They value it for its non-prescriptive, holistic, needs-based, and interactive approach, especially with their existing activities that are already tightly-integrated. 

Reflexive Security builds on the examples from Agile development and DevOps movements, and is solely focused on a collaborative and integrated environment. It is especially suited for cloud environments, which are crucial for facilitating efficiencies for development and operation teams. Compared to the ISMS approach, Reflexive Security is like using Agile software development versus the Waterfall mindset. 

Reflexive Security also emphasizes security across organizational roles that reacts to external and internal threats. Similar to the body's immune system, Reflexive Security values the balance of decentralization and centralization over a top-down leadership approach. This is so responsibilities and activities of information security management are infused to all members of the organization. 

The document describes the core principles of Reflexive Security in "Six Pillars," which leads to the "Six Benefits," and also explores a number of strategies for the fulfillment of this framework. 

__The Six Pillars of Reflexive Security (abbreviated as "RAMPAC"):__
* ''Responsible collectively'': Security leadership plays a shepherding role for information security within an organization; everyone is responsible for an organization's security.
* ''Pragmatic'': Security should provide value, not a hindrance.
* ''Align and bridge'': Organizational risks and requirements must be fully aligned in order to derive maximum effectiveness and value from security processes.
* ''Automate'': Automated security practices are the core of optimizing process efficiency.
* ''Measure and improve'': Performance that cannot be measured cannot be improved.
* ''Collaborate and integrate'': Arguably the most important Pillar. Security can only be achieved through collaboration, not confrontation. A security-aware and collaborative culture is necessary for everyone to feel comfortable reporting potential anomalies. 

__The Six Benefits of Reflexive Security:__
* ''Human-centric'': Security is integrated and internalized as an aspect of everyone's work, and requires mind-share within every employee.
* ''Elastic'': Growing maturity of a Reflexive Security approach could lead to achievement of formal ISMS requirements, while being flexible enough to only target critical areas for maximum value based on actual risks.
* ''Apt and holistic'': Focused on business needs and responding to the actual risk context faced by the organization when compared to traditional information security management.
* ''Resilient'': Security no longer relies on a single security function, but security practices are integrated with business processes and embedded throughout the organization. 
* ''Tailored'': Prioritized approach to provision stronger protection to core or more vulnerable processes over those less exploitable. 
* ''Dynamic'': The protection of business goals is performed by integrating security with business processes, allowing the organization to react faster and more effectively to threats and incidents. 

__Key Takeaways__
Reflexive Security is an information security management strategy that is dynamic, interactive, holistic, and effective. It represents cultural practices extrapolated from existing collaborative concepts and practices, and provides a set of widely implicating and easily understandable principles that affect an organization's cybersecurity posture. This approach is especially suitable for organizations operating under resource and personnel constraints in today's fast-paced and challenging cybersecurity landscape.//
[...]
<<<
&rArr; Lire [[l'original|https://CloudSecurityAlliance.fr/go/jaeb/]] sur le blog de la CSA.
!1 - Les nouveautés CSA de la semaine du 7 au 13 octobre 2019
* [>img[iCSF/cloud-security-alliance-fr.png]]Blog : ''Cloud Penetration Testing the Capital One Breach''+++*[»]> <<tiddler [[2019.10.10 - Blog : 'Cloud Penetration Testing the Capital One Breach']]>>=== 
* Blog : ''It's all about the Data! - Preventative Security''+++*[»]> <<tiddler [[2019.10.08 - Blog : 'It's all about the Data! - Preventative Security']]>>=== 
!2 - Veille Web
La [[Veille Web|2019.10.13 - Veille Hebdomadaire - 13 octobre]] avec plus de 70 liens :
* __''À consulter'' :__ "Azure Benchmark" du CIS+++*[»]>
|2019.10.10|//Microsoft//|[[CIS Azure Security Foundations Benchmark open for comment|https://azure.microsoft.com/en-us/blog/cis-azure-security-foundations-benchmark-open-for-comment/]] ([[draft|https://azure.microsoft.com/mediahandler/files/resourcefiles/azure-cloud-security-benchmark-draft/azure-cloud-security-benchmark-draft.pdf]])|Azure CIS_Benchmark|
|2019.10.10|Center for Internet Security| → [[CIS Microsoft Azure Foundations Benchmark v1.0.0 Now Available|https://www.cisecurity.org/blog/cis-microsoft-azure-foundations-benchmark-v1-0-0-now-available/]] ([[téléchargement|https://www.cisecurity.org/benchmark/azure/]])|Azure CIS_Benchmark|
=== 
* Sécurité des Managed Service Providers : un appel à commentaires sur un document du ''NIST'' et quelques pistes d'amélioration par MalwareBytes
* Rapports et sondages : FireEye, Thales
* Divers : CLOUD Act en Australie et en Suisse, réduction de la surface d'attaque
!3 - Conférences et Salons
* Le programme de la ''Cloud & Cyber Security Expo'' des ''27 et 28 novembre'' à Paris est partiellement disponible :
** Premier teaser et inscription gratuite+++*[»]> <<tiddler [[2019.10.11 - Cloud & Cyber Security Expo - Inscription et Extrait du Programme (1/3)]]>>=== 
** Animation d'une table ronde sur la ''Cyber-Résilence dans le Cloud''+++*[»]> <<tiddler [[2019.10.07 - Cloud & Cyber Security Expo les 27 et 28 novembre 2019]]>>=== 
* Les inscriptions pour le ''Congrès Européen'' des ''18 au 21 novembre'' à Berlin sont toujours ouverte+++*[»]> <<tiddler [[2019.09.04 - Annonce du programme du Congrès CSA EMEA en Novembre à Berlin]]>>=== 
** Contactez-nous pour avoir une réduction sur votre inscription.+++*[»]> → [img(200px,auto)[iCSF/Email-CSA_FR.png]]=== 
|!Octobre|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2019.10.12|
|2019.10.12|CyberDefense Mag|[[What Can You Do To Secure Your Data In The Cloud?|https://www.cyberdefensemagazine.com/what-can-you-do/]]|Risks|
|2019.10.12|//BitDefender//|[[Organizations Fail to Implement Cloud Security Basics - And it Bites Them|https://businessinsights.bitdefender.com/organizations-fail-to-implement-cloud-security-basics]]|Threats Guidance|
|>|>|>|!2019.10.11|
|2019.10.11|Security Boulevard|[[The Progression to Cloud Directory Services|https://securityboulevard.com/2019/10/the-progression-to-cloud-directory-services/]]|Directories|
|2019.10.11|Silicon Republic|[[AWS's Abby Fuller on balancing progress with security|https://www.siliconrepublic.com/enterprise/abby-fuller-amazon-web-services-cloud]]|Misc|
|2019.10.11|//Duo Security//|![[Imperva Breach Stemmed From Compromised Internal Compute Instance|https://duo.com/decipher/imperva-breach-stemmed-from-compromised-internal-compute-instance]]|DataBreach Imperva Analysis|
|2019.10.11|//MalwareBytes//|![[Securing the managed service provider (MSP)|https://blog.malwarebytes.com/business-2/2019/10/securing-the-managed-service-provider-msp/]]|MSP|
|>|>|>|!2019.10.10|
|2019.10.11|DZone|[[Top 5 Security Practices for AWS Backup|https://dzone.com/articles/top-5-security-practices-for-aws-backup]]|AWS Backups|
|2019.10.11|//OVHcloud//|[[Looking Back at OVHCloud Summit 2019|https://www.ovh.com/blog/looking-back-at-ovhcloud-summit-2019/]]|OVHcloud|
|2019.10.10|Silicon.fr[>img[iCSF/flag_fr.png]]| → [[OVH affirme son identité cloud et joue l'alternative de confiance|https://www.silicon.fr/ovh-cloud-confiance-263407.html]]|OVHcloud|
|>|>|>|!2019.10.10|
|2019.10.10|AllNews.ch[>img[iCSF/flag_fr.png]]|[[CLOUD Act américain: l'ASB demande des clarifications|https://www.allnews.ch/content/r%C3%A9glementation/cloud-act-am%C3%A9ricain-l%E2%80%99asb-demande-des-clarifications]]|CLOUD_Act Switzerland|
|2019.10.10|Dark Reading|[[Network Security Must Transition into the Cloud Era|https://www.darkreading.com/cloud/network-security-must-transition-into-the-cloud-era/a/d-id/1335978]]|Networking|
|2019.10.10|nixCraft|[[Set Up a Basic Iptables Firewall on Amazon Linux AMI|https://www.cyberciti.biz/faq/set-up-a-basic-iptables-firewall-on-amazon-linux-ami/]]|AWS AMI Firewall|
|2019.10.10|The Last Watchdog|[[CASBs help companies meet 'shared responsibility' for complex, rising cloud risks|https://www.lastwatchdog.com/my-take-casbs-help-companies-meet-shared-responsibility-for-complex-rising-cloud-risks/]]|CASB Shared_Responsibility|
|2019.10.10|CBR Online|![[Does Containerisation Spell the End for Virtualisation?|https://www.cbronline.com/news/kubernetes-and-containerisation]]|Kubernetes Containers|
|2019.10.10|Cloud Native Computing Foundation|[[How to make containers an architect's best friend|
|2019.10.10|Open Access Government|[[Top five areas of focus for CISOs when it comes to the cloud and cybersecurity|https://www.openaccessgovernment.org/cisos-cloud-and-cybersecurity/75363/]]|Guidance|
|2019.10.10|//Microsoft Azure//|[[16 new built-in roles - including Global reader - now available in preview|https://techcommunity.microsoft.com/t5/Azure-Active-Directory-Identity/16-new-built-in-roles-including-Global-reader-now-available-in/ba-p/900749]]|AzureAD|
|2019.10.11|Bleeping Computer| → [[Microsoft Improves Azure Active Directory Security with New Roles|https://www.bleepingcomputer.com/news/microsoft/microsoft-improves-azure-active-directory-security-with-new-roles/]]|AzureAD|
|2019.10.10|//Managed Methods//|[[How Cloud DLP Fits Into Your Cybersecurity Infrastructure|https://managedmethods.com/blog/cloud-dlp-your-cybersecurity-infrastructure/]]|DLP|
|2019.10.10|//eXemplify//|[[The 4 Industries That Get the Most Out of Cloud Security|http://www.exemplifygroup.com/the-4-industries-that-get-the-most-out-of-cloud-security/]] (infographie)|Misc|
|2019.10.10|//CloudCheckr//|[[Why the Best Financial Services Are Turning to the Cloud for Risk Management|https://cloudcheckr.com/cloud-cost-management/why-the-best-financial-services-are-turning-to-the-cloud-for-risk-management/]]|Risks|
|2019.10.10|//Alibaba Cloud//|[[Building a Serverless Application on Alibaba Cloud (Part 1)|https://medium.com/@Alibaba_Cloud/building-a-serverless-application-on-alibaba-cloud-part-1-91a439e5a949]] (1/2)|Alibaba Serverless|
|2019.10.10|//Alibaba Cloud//|[[Building a Serverless Application on Alibaba Cloud (Part 2)|https://medium.com/@Alibaba_Cloud/building-a-serverless-application-on-alibaba-cloud-part-2-d710e722cf8e]] (2/2)|Alibaba Serverless|
|2019.10.10|//Threatstack//|[[20 DevSecOps Pros Reveal the Most Important Considerations in Building a DevSecOps Pipeline|https://www.threatstack.com/blog/20-devsecops-pros-reveal-the-most-important-considerations-in-building-a-devsecops-pipeline]]|DevSecOps|
|2019.10.10|//Securosis//|[[Enterprise DevSecOps: How Security Works With Development|https://securosis.com/blog/enterprise-devsecops-how-security-works-with-development]]|DevSecOps|
|2019.10.10|//Cloudbric//|[[A Guide to PCI Compliance in the Cloud|https://www.cloudbric.com/blog/2019/10/pci-compliance-cloud-guide/]]|PCI_DSS Compliance|
|2019.10.10|//Microsoft//|[[CIS Azure Security Foundations Benchmark open for comment|https://azure.microsoft.com/en-us/blog/cis-azure-security-foundations-benchmark-open-for-comment/]] ([[draft|https://azure.microsoft.com/mediahandler/files/resourcefiles/azure-cloud-security-benchmark-draft/azure-cloud-security-benchmark-draft.pdf]])|Azure CIS_Benchmark|
|2019.10.10|Center for Internet Security| → [[CIS Microsoft Azure Foundations Benchmark v1.0.0 Now Available|https://www.cisecurity.org/blog/cis-microsoft-azure-foundations-benchmark-v1-0-0-now-available/]] ([[téléchargement|https://www.cisecurity.org/benchmark/azure/]])|Azure CIS_Benchmark|
|2019.10.10|//ExtraHop//|[[Boost Your Security in AWS|https://www.extrahop.com/company/blog/2019/essential-aws-security-features-to-know/]]|AWS|
|>|>|>|!2019.10.09|
|2019.10.09|Bleeping Computer|[[Beware of Fake Amazon AWS Suspension Emails for Unpaid Bills|https://www.bleepingcomputer.com/news/security/beware-of-fake-amazon-aws-suspension-emails-for-unpaid-bills/]]|AWS Phishing|
|2019.10.09|CyberSecurity Insiders|[[Cloud Security breach leads to a leak of 957,000 patient records|https://www.cybersecurity-insiders.com/cloud-security-breach-leads-to-a-leak-of-957000-patient-records/]]|Data_Breaches Misconfigurations|
|2019.10.09|DevOps.com|[[Common Cloud Security Mistakes and How to Avoid Them|https://devops.com/common-cloud-security-mistakes-and-how-to-avoid-them/]]|Risks Guidance|
|2019.10.09|Container Journal|[[Demystifying Persistent Storage Myths for Stateful Workloads in Kubernetes|https://containerjournal.com/topics/container-networking/demystifying-persistent-storage-myths-for-stateful-workloads-in-kubernetes/]]|Persistence Kubernetes|
|2019.10.09|The Register|[[US charges Singapore coin miner with conning cloud firms out of compute time|https://www.theregister.co.uk/2019/10/09/singapore_coin_miner_charged/]]|CryptoMining|
|2019.10.09|//Rapid7//|![[Avoiding the Zombie Cloud Apocalypse: How to Reduce Exposure in the Cloud|https://blog.rapid7.com/2019/10/09/avoiding-the-zombie-cloud-apocalypse-how-to-reduce-exposure-in-the-cloud/]]|Zombies|
|2019.10.09|//Kaspersky//|[[Protecting public clouds from common vulnerabilities|https://www.kaspersky.com/blog/vulnerabilities-in-public-clouds/28905/]]|Public_Cloud RDP SSH|
|2019.10.09|//Alibaba Cloud//|[[SSH Tunnelling With Alibaba Cloud To Expose A Local Environment|https://medium.com/@Alibaba_Cloud/ssh-tunnelling-with-alibaba-cloud-to-expose-a-local-environment-7dccfeabc5a6]]|Alibaba SSH|
|>|>|>|!2019.10.08|
|2019.10.08|Silicon.fr[>img[iCSF/flag_fr.png]]|![[Cloud souverain : quels candidats pour les trois contrats|https://www.silicon.fr/cloud-souverain-candidats-263205.html]]|Sovereign_Cloud|
|2019.10.08|NIST|![[Improving Cybersecurity of Managed Service Providers|https://www.nccoe.nist.gov/projects/building-blocks/managed-service-providers]] ([[draft|https://www.nccoe.nist.gov/sites/default/files/library/project-descriptions/msp-ic-project-description-draft.pdf]], [[commentaires|https://www.nccoe.nist.gov/sites/default/files/library/msp-comments.xlsx]])|NIST MSP|
|2019.10.09|MSSP Alerts| → [[MSP Cybersecurity Initiative: NIST, NCCoE Seek Comments|https://www.msspalert.com/cybersecurity-news/msp-cybersecurity-initiative-nist-nccoe-seek-comments/]]|NIST MSP|
|2019.10.08|RIPE|[[Internet Clouds are (also) Unpredictable: A Study on the Effects of Recent Traffic Engineering Trends In Cloud Provider Networks|https://labs.ripe.net/Members/marco_chiesa/internet-clouds-are-also-unpredictable]]|Networking Latency|
|2019.10.08|Security Week|[[Cloud is Creating Security and Network Convergence|https://www.securityweek.com/cloud-creating-security-and-network-convergence]]|Misc|
|2019.10.08|Marcel Afrahim|[[Sesame Street Store & Volusion customers are comprised; how the cookie monster is stealing credit card info|https://medium.com/@marcelx/sesame-street-volusion-customers-are-comprised-how-the-cookie-monster-is-stealing-cc-numbers-21eb51ec613b]]|Supply-Chain_Attack DataBreach GCP|
|2019.10.08|ZDnet| → [[Hackers breach Volusion and start collecting card details from thousands of sites|https://www.zdnet.com/article/hackers-breach-volusion-and-start-collecting-card-details-from-thousands-of-sites/]]|Supply-Chain_Attack DataBreach GCP|
|2019.10.08|Security Boulevard|[[Public Cloud Transformation: Keys to Data Security|https://securityboulevard.com/2019/10/public-cloud-transformation-keys-to-data-security/]]|Misc|
|2019.10.08|InformationAge|[[Cyber security for IoT and edge computing|https://www.information-age.com/cyber-security-for-iot-and-edge-computing-123485616/]]|IoT|
|2019.10.08|SecureCloudBlog|[[Advisories 1-2: Azure AD and Common WS-Trust MFA Bypass explained|https://securecloud.blog/2019/10/08/advisories-1-2-azure-ad-and-common-ws-trust-mfa-bypass-explained/]]|AzureAD Attack|
|2019.10.07|ITnews AU|[[Australia, US negotiate CLOUD Act data swap pact|https://www.itnews.com.au/news/australia-us-negotiate-cloud-act-data-swap-pact-532005]]|CLOUD_Act Australia|
|2019.10.08|Help Net Security|[[Organizations need tools that support DevOps security|https://www.helpnetsecurity.com/2019/10/08/devops-security-tools/]]|Report Trendmicro|
|2019.10.08|NextGov|[[Do You Know What's Hiding in the Cloud?|https://www.nextgov.com/ideas/2019/10/do-you-know-whats-hiding-cloud/160442/]]|Misc|
|2019.10.08|//Threatpost//|[[Intimate Details on Healthcare Workers Exposed as Cloud Security Lags|https://threatpost.com/intimate-details-healthcare-workers-exposed-cloud-security/149007/]]|Risks|
|2019.10.08|//Thales//|![[Organizations worldwide failing to adequately protect sensitive data in the cloud|https://www.thalesesecurity.com/about-us/newsroom/news-releases/thales-study-organizations-worldwide-failing-adequately-protect]]|Report Thales|
|2019.10.08|//Thales//| → [[infographie '2019 Cloud Security Study|https://go.thalesesecurity.com/rs/480-LWA-970/images/2019-Ponemon-Cloud-Security-in.pdf]] et [[rapport '2019 Cloud Security Study|https://go.thalesesecurity.com/rs/480-LWA-970/images/2019-Cloud-Security-Report-sd.pdf]]|Report Thales|
|2019.10.08|Info Security Mag| → [[Global Study Finds Orgs Are Failing to Protect Data in the Cloud|https://www.infosecurity-magazine.com/news/orgs-failing-protect-data-cloud/]]|Report Thales|
|2019.10.08|VMblog| → [[Thales Study: Organizations Worldwide Failing to Adequately Protect Sensitive Data in the Cloud|https://vmblog.com/archive/2019/10/08/thales-study-organizations-worldwide-failing-to-adequately-protect-sensitive-data-in-the-cloud.aspx]]|Report Thales|
|2019.10.10|Help Net Security| → [[Only 32% of organizations employ a security-first approach to cloud data storage|https://www.helpnetsecurity.com/2019/10/10/cloud-data-storage-security/]]|Report Thales|
|2019.10.08|//FireEye//|[[FireEye Email Threat Update: How Attackers are Getting Ahead in the Cloud|https://www.fireeye.com/blog/products-and-services/2019/10/how-attackers-are-getting-ahead-in-the-cloud.html]] ([[détails|https://www.fireeye.com/solutions/ex-email-security-products/power-of-one.html]])|Report FireEye Threats|
|2019.10.08|Security Week| → [[Email Attacks Using Cloud Services are Increasing|https://www.securityweek.com/email-attacks-using-cloud-services-are-increasing]]|Report FireEye Threats|
|2019.10.08|//LogRhythm//|[[Six Tips for Securing Your Azure Cloud Environment|https://logrhythm.com/six-tips-for-securing-your-azure-cloud-environment/]]|Azure Best_Practices|
|2019.10.08|//Gremlin//|![[After the Retrospective: Heroku Incident #1892|https://www.gremlin.com/blog/heroku-incident-1892/]]|Lessons_Learnt AWS Heroku|
|>|>|>|!2019.10.07|
|2019.10.07|Journal du Net[>img[iCSF/flag_fr.png]]|[[Stockage : mieux protéger ses données avec le modèle flash-to-flash-to-cloud|https://www.journaldunet.com/solutions/expert/71828/stockage---mieux-proteger-ses-donnees-avec-le-modele-flash-to-flash-to-cloud.shtml]]|Storage Flash|
|2019.10.07|ZDnet|[[Australia inches closer to compelling access to US data under CLOUD Act|https://www.zdnet.com/article/australia-inches-closer-to-compelling-access-to-us-data-under-cloud-act/]]|CLOUD_Act Australia|
|2019.10.07|Technopedia|[[How Cloud Computing is Changing Cybersecurity|https://www.techopedia.com/how-cloud-computing-is-changing-cybersecurity/2/33941]]|Challenges|
|2019.10.07|Maarten Goet|[[Azure Sentinel: designing access and authorizations that meet the enterprise needs|https://medium.com/wortell/azure-sentinel-designing-access-and-authorizations-that-meet-the-enterprise-needs-501bfdafaa5f]]|Azure Snetinel|
|2019.10.07|DZone|![[The Complete Kubernetes Collection [Tutorials and Tools]|https://dzone.com/articles/the-complete-kubernetes-collection-tutorials-and-tools]]|Kubernetes Tools Tutorials|
|2019.10.07|Solutions review|[[5 Tips for Designing a Flawless Cloud Security Policy|https://solutionsreview.com/cloud-platforms/5-tips-for-designing-a-flawless-cloud-security-policy/]]|Security_Policy|
|2019.10.07|Darknet.org.uk|[[LambdaGuard - AWS Lambda Serverless Security Scanner|https://www.darknet.org.uk/2019/10/lambdaguard-aws-lambda-serverless-security-scanner/]]|Tools LambdaGuard|
|2019.10.07|//Cloud Management Insider//|[[Cloud Cryptography - A foolproof solution for your cloud security|https://www.cloudmanagementinsider.com/cloud-cryptography/]]|Cryptography|
|2019.10.07|//Trendmicro//|[[Trend Micro Survey Finds Lack of IT Security Input In DevOps Introduces Cyber Risk for 72% of Companies|https://devops.com/trend-micro-survey-finds-lack-of-it-security-input-in-devops-introduces-cyber-risk-for-72-of-companies/]]|Report Trendmicro|
|2019.10.07|//Microsoft Azure//|[[Customer Provided Keys with Azure Storage Service Encryption|https://azure.microsoft.com/en-us/blog/customer-provided-keys-with-azure-storage-service-encryption/]]|Azure Encryption|
|2019.10.07|//Alcide//|[[Cloud-native applications need a unified continuous security approach|https://www.helpnetsecurity.com/2019/10/07/cloud-native-applications-security/]]|Misc|
|2019.10.07|//Zscaler//[>img[iCSF/flag_fr.png]]|[[L'avenir de la prévention contre la perte de données est dans le Cloud|http://www.globalsecuritymag.fr/L-avenir-de-la-prevention-contre,20191007,91390.html]]|DLP|
|2019.10.07|//ExtraHop//|[[Your Enterprise is Cloud-First. Is Your Security?|https://www.extrahop.com/company/blog/2019/cloud-native-security-infographic/]]|Survey|
[>img(200px,auto)[iCSF/CCSEP2019.png]]Pour s'inscrire à la ''Cloud & Cyber Security Expo'' et disposer une premier aperçu du programme des conférences gratuites :

Suivez le lien → ''[[CloudSecurityAlliance.fr/go/jabr|https://CloudSecurityAlliance.fr/go/jabr]]''

[img(auto,60px)[iCSF/CCSA19h.jpg][https://CloudSecurityAlliance.fr/go/jabr]]
!"//Cloud Penetration Testing the Capital One Breach//"
[>img(200px,auto)[iCSA/JAABC.jpg]]Article de blog publié le 10 octobre 2019 — Rédigé par Alexander Getsin, Lead Author for Cloud Penetration Testing Playbook
<<<
//''Aligning the Capital One breach with the CSA Cloud Penetration Testing Playbook''

In March 2019, Capital One suffered a unique cloud breach. 140,000 Social Security numbers and 80,000 linked bank account numbers were exposed, along with some 1 million Canadian Social Insurance Numbers. It isn't the numbers that make the breach special and worth learning about.

The initial point of compromise in this breach was a misconfigured proxy (modSecuritymodProxy, a Web Application Firewall), employed by Capital One. The attacker used the misconfigured instance to steal credentials from the meta-data service of the cloud instance. This is arguably the first high-profile breach using this technique. Capital One had to deal with a novel attack that employed a cutting-edge technique exclusive to cloud environments. Despite their impressive efforts at cloud security, their chances were slim in this case.

Just a few months ago, the Cloud Security Alliance's (CSA) Top Threats Working Group published the +++*[Cloud Penetration Testing Playbook]> <<tiddler [[2019.07.12 - Publication : 'Cloud Penetration Testing Playbook']]>>===. This playbook identifies this very attack technique. The playbook also describes 94 other public cloud attack vectors, concerns, considerations and test cases for testing and attacking public cloud environments and systems.

''What was the Breach?''
The initial compromise technique employed in this breach was the abuse of a particular feature of a misconfigured proxy (a web application firewall) employed by Capital One. The nginx server hosting the web application firewall accepts web requests meant for backend applications, processes and fulfills or responds to them as a proxy does. This specific nginx misconfiguration allowed requests to the meta-data service at 169.254.169.254.

AWS infrastructure services and consumers use the meta-data service to store environment variables. Some of the many variables and data stored in the AWS meta-data service (similar to GCP and Azure) are the temporary STS credentials that allow the instance to assume any role that has been passed to it. Anyone familiar with curl or a proxy client (such as Burp proxy) can generate requests to this meta-data service if they have local access to the instance, or if the instance is misconfigured to serve web requests to its local meta-data service.

The latter was the case: the vulnerable nginx WAF proxied web requests to itself and also served any other requests. The attacker called its iam/info meta-data to get available role names and then the temporary credentials meta-data to obtain the actual credentials at
> {{{ http://169.254.169.254/latest/meta-data/iam/security-credentials/role-name }}}
At that point, the attacker was in. Amongst other privileges, the role associated with the WAF instance had S3 bucket privileges. It's easy AWS CLI work from there. 

''What Made this Breach Special?''
This is arguably the first high-profile breach using this technique. It is novel and special in a few other ways: 
* The breach depended on a misconfiguration of a non-cloud component (the WAF software) to target an attack vector unique to cloud instances
* An ex-employee of the cloud service provider targeted clients of the cloud service provider

The more important point is that Capital One had to deal with a previously unexplored attack. AWS recognizes Capital One as a leader in cloud usage with impressive efforts at security. The fact that an ex-engineer of the CSP exploited the technical weakness only stands to show how exclusive the knowledge required, and how hard to counter this attack was.

This incident highlights increasingly sophisticated attacks that attackers can use to compromise cloud environments. The CSA Top Threats Working Group playbook provides guidance on how to test for such misconfigurations in your cloud infrastructure, reducing the knowledge gap.

''What's the Cloud Penetration Testing Playbook?''
The Cloud Penetration Testing Playbook represents a collective effort to provide guidance for the penetration testing of systems in public cloud environments.  It provides a set of testing objectives, as well as legal and compliance concerns. The overall document aims to educate key decision-makers on the complexities of penetration testing in a multi-stakeholder and vulnerabilities within a multi-layered information technology stack.

While this resource is activity-specific (penetration testing), it outlines the various methods by which attackers can and do target cloud environments. To protect information systems, defenders should be aware of the methods including those used by the Capital One threat actor.. The playbook covers most of the aspects and methodology of similar attack: 

__Initial compromise employed by the Capital One threat actor involved a misconfigured proxy server exposing temporary credentials residing in its meta-data service.__
Covered in ''Pg 13'' (of the Cloud Penetration Testing Playbook)
* c. Test for spoofing of user identity and other entities
* v. Steal credentials from meta-data of proxy or http forwarding servers (credentials in AWS meta-data)

__Data exfiltration via export of EC2 snapshots__
Covered in ''Pg 14'' (of the Cloud Penetration Testing Playbook)
* f. Test for Information disclosure (privacy breach or data leak)
* ix. Steal virtual machine images and snapshots from storage accounts; analyze them for sensitive data (likeAzure vm vhd snapshots

__Data exfiltration via download of S3 bucket objects__
Covered in ''Pg 14'' (of the Cloud Penetration Testing Playbook)
* f. Test for Information disclosure (privacy breach or data leak)iv. Exfiltrate data from publicly accessible datastore services (S3, RDS, RDS snapshots, Redshift clusters, elastic search domains) or private stores with cli / dumps (s3 aws cli get, dynamodump), and/or configure them accordingly for exfiltration).

''What Should You Do About This?''
This knowledge is now available. The playbook is a resource that CSA and Top Threats Working Group will continue to improve on.//[...]
<<<
&rArr; Lire [[l'original|https://CloudSecurityAlliance.fr/go/jaac/]] sur le blog de la CSA.
[img(25%,1px)[iCSF/BluePixel.gif]]
!"//It's all about the Data! - Preventative Security//"
[>img(200px,auto)[iCSA/JA8BI.jpg]]Article de blog publié le 8 octobre 2019 — Rédigé par John DiMaria, Assurance Investigatory Fellow, CSA
<<<
//I have always said I am a "data guy." Decisions made with data eliminate all bias, opinions, and ad hoc decisions that cause potential costly moves.
In my most recent podcast interview with Phillip Merrick, CEO of Fugue, he discussed how vendors sometimes use security events in order to sell fear, uncertainty, and doubt (FUD) to sell products. Nothing wrong with keeping up with world events and learning from others' mistakes, but there is a difference between prevention and reaction.

''Reactive Security''
Think about it. Smoke alarms go off after something happens; usually, a fire that causes smoke to rise and enter the alarm. At that point, running out of the building is the standard "reaction." Sure, there are all kinds of incidents that can scare you and make you run out and buy the latest technology to warn you when there is a fire, and even call 911 for you. But while you definitely need smoke alarms, doesn't it make sense to do a full evaluation of your premises and see what you can do to prevent that fire in the first place? Then, even if a fire does happen, there is a good chance the damage will be less than if you had done nothing at all. Even if you did just buy all the latest and greatest technology, how you know you addressed the critical areas unless you did a full evaluation first?
Preventative Security

The point is, why not spend your budget dollars wisely by using good data-driven decisions. A smart strategy means less complexity. Evaluate where you are at, give yourself credit for what you already have in place and spend dollars wisely on the areas that have little or no protection and/or areas that could use improvement. The fire department can provide you with a checklist or questionnaire pointing out things you should evaluate before you spend money so you know what you really need (and what you don't). Whereas a company that wants to sell you equipment can give you a hundred reasons why you should by their product, even before they know if you even need it. 

Security is similar. Evaluate where you are at today, draw out where you need to be tomorrow, and act on the differences - simple, smart, and cost-effective (not to mention a valuable budget justification).

''CSA's Questionnaire to Assess Cloud Compliance''
Think of the Consensus Assessments Initiative Questionnaire (CAIQ) as fulfilling the same purpose as the fire risk questioner. It allows you to evaluate where you are at today in meeting internationally accepted cloud-specific controls. The CAIQ is based upon the Cloud Controls Matrix (CCM) and provides a set of Yes/No questions a cloud consumer or cloud auditor may wish to ask of a cloud provider to ascertain their compliance to the Cloud Controls Matrix. It's vendor-neutral, and some of the improvements may not even require technology, but if they do, you'll be a smarter shopper.

[>img(500px,auto)[iCSA/JA8BI.png]]As I mentioned above - simple, smart and cost effective. Once you feel you are ready and have addressed any gaps, you can submit your CAIQ to the STAR Registry and join the other 600 plus cloud service providers that have chosen to post their completed questionnaire for not only their customers to see, but potential clients as well, increasing the level of transparency and trust. The great thing is, it is scalable, and you can build on that initial step by graduating to STAR Continuous. STAR Continuous improves upon that "point in time" or "point over a period of time" analysis by requiring that the CAIQ be updated every 30 days, increasing the level of assurance. 

If you feel it is an advantage or requirement to go even further, again, you can progress to STAR Level 2; Third-Party certification or attestation and even Level 3; continuous monitoring. See the "STAR Levels" figure on the right.

Following are costs due to non-compliance as per an Independent survey conducted by Ponemon Institute on behalf of Globalscape+++*[»]>
→ http://dynamic.globalscape.com/files/Whitepaper-The-True-Cost-of-Compliance-with-Data-Protection-Regulations.pdf
=== 
These costs, as shown in this report, are 2.71 times the cost of compliance:
* Business disruption
* Productivity losses
* Revenue losses
* Fines, penalties and
* settlement costs

''Evaluate if you are compliant.''
If you are, give yourself credit and let the world know and continue to improve and advance as applicable. If not, act on the differences, fill the gaps, and then let the world know and continue to improve and consider the other levels of STAR based on your business needs and compliance requirements.//
[...]
<<<
&rArr; Lire [[l'original|https://CloudSecurityAlliance.fr/go/ja8b/]] sur le blog de la CSA.
[img(25%,1px)[iCSF/BluePixel.gif]]
!Participation au Salon ''Cloud & Cyber Security Paris'' les 27 et 28 novembre 2019
[>img(200px,auto)[iCSF/CCSEP2019.png]]Le [[Chapitre Français]] de la [[Cloud Security Alliance]] animera :
* la table-ronde "''Cyber-résilience : anticiper, maître-mot de la sécurité''" 
* le mercredi 27 novembre 2019, entre 13h05 et 13h45.

Le salon se déroulera sur 2 jours : les ''mercredi 27 et jeudi 28 novembre 2019 à Paris, Porte de Versailles''
L'entrée donne accès aux cinq espaces du Salon :
* Cloud Expo Europe, DevOps Live, Cloud & Cyber Security Expo, Data Centre World, et Big Data World
[img[iCSF/JBRSC.png]]
|ssTabl99|k
| ! 
Pour une invitation gratuite, suivez le lien → [[CloudSecurityAlliance.fr/go/CCSEP19|https://CloudSecurityAlliance.fr/go/CCSEP19]]
  | Pour en savoir plus sur le salon : <<< //__''Cloud & Cyber Security Expo Paris 27-28 novembre 2019, Paris Porte de Versailles''__ Nous avons la chance de vivre dans un monde numérique ouvert et interconnecté. Mais comment éviter les dangers auquel il nous expose ? Devenu un rassemblement incontournable d'experts cybersécurité en France, Cloud & Cyber Security Expo Paris vous donnera les clés pour mettre en place une infrastructure numérique plus sûre et sécurisée dans votre département ou votre société. Protéger votre entreprise, c'est aussi protéger vos clients et votre pérennité. Vous apprendrez à mieux détecter, prévenir et gérer les multiples menaces en matière de cybersécurité. Venez rencontrer Sophos, Darktrace , Rohde & Schwarz CyberSecurity, Tenable, Guardicore, Hermitage Solutions, Gemalto, ITrust, Okta, BSI Group et bien d'autres ! 250 experts de l'industrie seront également présents lors d'études de cas, tables rondes et conférences pour vous guider et vous inspirer : Groupe Servier, Dailymotion, Groupe Casino, Rémy Cointreau, Médiamétrie, Carrefour Banque & Assurance, EDF Renouvelables ... Ne prenez pas le risque de passer à côté !// <<<
!1 - Les nouveautés CSA de la semaine du 30 septembre au 6 octobre 2019
* [>img[iCSF/cloud-security-alliance-fr.png]]Actu : prolongation jusqu'au ''25 octobre'' pour commenter la traduction en français de 3 documents CSA+++*[»]> <<tiddler [[2019.09.19 - Demande de validation la traduction en français de 3 documents CSA]]>>=== 
* Blog : ''Why you can't have backdoored crypto that is secure''+++*[»]> <<tiddler [[2019.10.03 - Blog : 'Why you can't have backdoored crypto that is secure']]>>=== 
* Actu : Appel à commentaires, document ''Critical Controls Implementation for SAP''+++*[»]> <<tiddler [[2019.10.03 - Appel à commentaires, document 'Critical Controls Implementation for SAP']]>>=== 
* Actu : Lancement d'un ''forfait CCSK''+++*[»]> <<tiddler [[2019.10.03 - Lancement d'un forfait CCSK]]>>===, le ''Foundation Exam Bundle''+++*[»]> <<tiddler [[2019.10.03 - Forfait CCSK 'Foundation Exam Bundle]]>>=== 
* Publication : document ''Guidelines for CPAs Providing CSA STAR Attestation v2''+++*[»]> <<tiddler [[2019.10.04 - Publication : 'Guidelines for CPAs Providing CSA STAR Attestation v2']]>>=== 
!2 - Veille Web
La [[Veille Web|2019.10.06 - Veille Hebdomadaire - 6 octobre]] avec une cinquantaine de liens, dont :
* __''À lire'' :__ où l'on repartle du Cloud souverain avec ''Dassault Systèmes'' et ''OVH''+++*[»]>
|2019.10.03|Reuters|[[France recruits Dassault Systemes, OVH for alternative to U.S. cloud firms|https://www.reuters.com/article/us-france-dataprotection/france-recruits-dassault-systemes-ovh-for-alternative-to-u-s-cloud-firms-idUSKBN1WI189]]|Sovereign_Cloud|
|2019.10.03|Silicon.fr[>img[iCSF/flag_fr.png]]| → [[Cloud souverain : Bruno Lemaire relance Dassault Systèmes et OVH|https://www.silicon.fr/cloud-souverain-bruno-lemaire-relance-dassault-systemes-et-ovh-262679.html]]|Sovereign_Cloud|
=== 
* Divers : les zombies du Cloud+++*[»]>
|2019.10.02|//Fugue//|[[Zombie Cloud Infrastructure is a Major Security Risk|https://www.fugue.co/blog/zombie-cloud-infrastructure-is-a-major-security-risk]]|Risks Infrastructure Zombies|
===, comparaison PaaS et KaaS (Kubernetes as a Service)+++*[»]>
|2019.09.30|Container Journal|[[PaaS vs. KaaS: A Primer|https://containerjournal.com/topics/container-ecosystems/paas-vs-kaas-a-primer/]]|PaaS KaaS|
=== 
* Sondages : ''Insight''+++*[»]>
|2019.09.30|Insight| → [[2019 Europe Index Intelligent Technology™ d'Insight|https://fr.insight.com/content/dam/insight-web/en_GB/images/2019/09/index-intelligent-technology-insight-france.pdf]]|Report|
|2019.10.02|Global Security Mag[>img[iCSF/flag_fr.png]]| → [[Selon l'Insight Intelligent Technology Index 2019, Les services cloud inutilisés coûtent 9,6 millions d'euros aux entreprises|http://www.globalsecuritymag.fr/Selon-l-Insight-Intelligent,20190926,91105.html]]|Survey ITI|
=== 
* Rapports : évaluation Microsoft Azure pour les services du gouvernement australien+++*[»]>
|2019.10.02|//Microsoft Azure//|[[Over 100 Azure services support PROTECTED Australian government data|https://azure.microsoft.com/en-us/blog/over-100-azure-services-support-protected-australian-government-data/]]|Azure Government Australia|
|2019.10.02|//Microsoft Azure//| → [[Australia specific assessment and compliance reports, FAQs and White Papers|https://servicetrust.microsoft.com/viewpage/AustraliaV3]]|Azure Government Australia|
|2019.10.02|//Microsoft Azure//| → [[2019 Microsoft Azure IRAP (Information Security Registered Assessor Program) Assessment Report|https://servicetrust.microsoft.com/viewpage/AustraliaV3?command=Download&downloadType=Document&downloadId=ffcb3aeb-475e-4f23-8a8f-2fc7dac18d68&tab=d1b1d320-3d79-11e9-9157-b7b7eba45f26&docTab=d1b1d320-3d79-11e9-9157-b7b7eba45f26_GRC_Assessment_Reports]]|Azure Government Australia|
=== 
|!Octobre|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2019.10.06|
|2019.10.06|//Tripwire//|[[Automating Secure Configuration Management in the Cloud|https://www.tripwire.com/state-of-security/security-data-protection/cloud/automating-secure-configuration-management-cloud/]]|Misc|
|2019.10.06|//Tripwire//|[[Secure Configuration in Cloud - IaaS, PaaS and SaaS Explained|https://www.tripwire.com/state-of-security/security-data-protection/cloud/secure-configuration-cloud-iaas-paas-saas/]]|Challenges|
|2019.10.06|//Alcide//|[[Kubernetes Network Policies Best Practices|https://blog.alcide.io/kubernetes-network-policies-best-practices]]|Kubernetes|
|2019.10.06|Alexandre Blanc|[[A backup strategy against ransomwares and threats (part 3)|https://www.linkedin.com/pulse/backup-strategy-against-ransomwares-threats-part-3-alexandre/]] (3/3)|Backups Ransomware|
|2019.10.06|Redmond Channel Partner|[[Multifactor Authentication for All at Heart of Azure AD Changes|https://rcpmag.com/articles/2019/11/06/multifactor-authentication-for-all-azure-ad.aspx]]|AzureAD MFA|
|>|>|>|!2019.10.04|
|2019.10.04|Le Monde Informatique[>img[iCSF/flag_fr.png]]|[[OVH-Outscale : le cloud souverain vraiment ressuscité ?|https://www.lemondeinformatique.fr/actualites/lire-ovh-outscale-le-cloud-souverain-vraiment-ressuscite-76657.html]]|Sovereign_Cloud France|
|2019.10.04|FCW|[[US, UK reach CLOUD Act agreement|https://fcw.com/articles/2019/10/04/cloud-act-uk-deal-johnson.aspx]]|CLOUD_Act|
|2019.10.04|IT World Canada|[[Using the Cloud Securely: A conversation between two cybersecurity leaders|https://www.itworldcanada.com/sponsored/using-the-cloud-securely-a-conversation-between-two-cybersecurity-leaders]] ([[podcast .mp3|https://i.itworldcanada.com/wp-content/uploads/2019/10/Box-Audio-Mixdown-1.mp3]])|Misc|
|2019.10.04|SecureCloudBlog|[[Azure AD - Add Custom claims for WS-Federation applications|https://securecloud.blog/2019/10/03/azure-ad-add-custom-claims-for-ws-federation-applications/]]|AzureAD|
|2019.10.04|DevOps.com|[[ESG Survey Sees Long DevSecOps Road Ahead|https://devops.com/esg-survey-sees-long-devsecops-road-ahead/]]|Report ESG|
|2019.10.04|//Risk Recon//|[[5 Risk Factors for Deciding Where to Host Cloud-Eligible Assets|https://blog.riskrecon.com/5-risk-factors-for-deciding-where-to-host-cloud-eligible-assets]]|Risks Hosting|
|2019.10.04|//Fraktal//|[[A Practical Framework for DevSecOps|https://medium.com/fraktal/practical-framework-for-devsecops-dd7fd9e63866]]|DevSecOps|
|>|>|>|!2019.10.03|
|2019.10.03|Reuters|[[France recruits Dassault Systemes, OVH for alternative to U.S. cloud firms|https://www.reuters.com/article/us-france-dataprotection/france-recruits-dassault-systemes-ovh-for-alternative-to-u-s-cloud-firms-idUSKBN1WI189]]|Sovereign_Cloud|
|2019.10.03|Silicon.fr[>img[iCSF/flag_fr.png]]| → [[Cloud souverain : Bruno Lemaire relance Dassault Systèmes et OVH|https://www.silicon.fr/cloud-souverain-bruno-lemaire-relance-dassault-systemes-et-ovh-262679.html]]|Sovereign_Cloud|
|2019.10.03|DZone|![[How To Avoid Data Breaches In The Cloud|https://dzone.com/articles/how-to-avoid-data-breaches-in-the-cloud]]|Data_Breaches|
|2019.10.03|GovLoop|[[Survey Findings: The State of Cloud Adoption|https://www.govloop.com/survey-findings-the-state-of-cloud-adoption/]]|Survey|
|2019.10.03|The Register|[[Are your Office 365 biz accounts secure? Don't find out the hard way... There are tools to keep staff, customers safe|https://www.theregister.co.uk/2019/10/03/office_365_security_compliance/]]|O365 Compliance|
|2019.10.03|Bleeping Computer|[[Office 365 Admins Can Now Block Malicious Microsoft Query IQY Files|https://www.bleepingcomputer.com/news/microsoft/office-365-admins-can-now-block-malicious-microsoft-query-iqy-files/]]|O365|
|2019.10.02|//Microsoft Azure//|[[All your creds are belong to us!|https://techcommunity.microsoft.com/t5/Azure-Active-Directory-Identity/All-your-creds-are-belong-to-us/ba-p/855124]]|Authentication|
|2019.10.03|//Fugue//|[[Cloud Security Posture Management: Benefits and Uses|https://www.fugue.co/blog/cloud-security-posture-management-benefits-and-uses]]|Security_Posture Misconfigurations|
|2019.10.03|//Managed Methods//|[[Where Cloud Security Fits In Your Cybersecurity Infrastructure|https://managedmethods.com/blog/cybersecurity-infrastructure-cloud-security/]]|Infrastructure|
|2019.10.03|//ThreatStack//|[[Cloud Security Professional Development & Educational Resource Roundup|https://www.threatstack.com/blog/cloud-security-professional-development-educational-resource-roundup]]|Education|
|2019.10.03|//Google Cloud//|[[4 steps to stop data exfiltration with Google Cloud|https://cloud.google.com/blog/products/identity-security/4-steps-to-stop-data-exfiltration-with-google-cloud]] (5/6)|GCP Exfiltration|
|2019.10.03|//Google Cloud//|[[Take time for discovery and assessment - and consider a partner - for a successful cloud migration|https://cloud.google.com/blog/products/cloud-migration/take-time-for-discovery-and-assessment-and-consider-a-partner-for-a-successful-cloud-migration]]|Migration|
|2019.10.03|//AWS//|[[Amazon Elasticsearch Service provides option to mandate HTTPS|https://aws.amazon.com/about-aws/whats-new/2019/10/amazon-elasticsearch-service-provides-option-to-mandate-https/]] ([[details|https://docs.aws.amazon.com/elasticsearch-service/latest/developerguide/es-data-protection.html]])|AWS|
|2019.10.03|Silicon.fr[>img[iCSF/flag_fr.png]]|[[Un Office 365 sécurisé, une perle rare ?|https://www.riskinsight-wavestone.com/2019/10/office-365/]]|O365|
|>|>|>|!2019.10.02|
|2019.10.02|Les Echos[>img[iCSF/flag_fr.png]]|[[Cloud Act : halte à la désinformation !|https://www.lesechos.fr/idees-debats/cercle/cloud-act-halte-a-la-desinformation-140599]]|CLOUD_Act|
|2019.10.02|Dark Reading|[[Controlling Data Leakage in Cloud Test-Dev Environments|https://www.darkreading.com/cloud/controlling-data-leakage-in-cloud-test-dev-environments/a/d-id/1335909]]|Data_Leaks|
|2019.10.02|TechTarget|[[Healthcare cybersecurity threatened by cloud misconfigurations|https://searchhealthit.techtarget.com/news/252471750/Healthcare-cybersecurity-threatened-by-cloud-misconfigurations]]|Misconfigurations|
|2019.10.02|DZone|[[Overview of AWS Security Tools and Processes|https://dzone.com/articles/aws-overview-of-security-processes]]|AWS|
|2019.10.02|CyberDefense Mag|[[Cloud Security Essentials - Session Monitoring|https://www.cyberdefensemagazine.com/cloud-security-essentials/]]|Monitoring|
|2019.10.02|CyberDefense Mag|[[Why Zero Trust is the Right Security Model for the Cloud|https://www.cyberdefensemagazine.com/why-zero-trust-is-the-right-security-model-for-the-cloud/]]|Zero_Trust|
|2019.10.02|//Microsoft Azure//|![[Over 100 Azure services support PROTECTED Australian government data|https://azure.microsoft.com/en-us/blog/over-100-azure-services-support-protected-australian-government-data/]]|Azure Government Australia|
|2019.10.02|//Microsoft Azure//| → [[Australia specific assessment and compliance reports, FAQs and White Papers|https://servicetrust.microsoft.com/viewpage/AustraliaV3]]|Azure Government Australia|
|2019.10.02|//Microsoft Azure//| → [[2019 Microsoft Azure IRAP (Information Security Registered Assessor Program) Assessment Report|https://servicetrust.microsoft.com/viewpage/AustraliaV3?command=Download&downloadType=Document&downloadId=ffcb3aeb-475e-4f23-8a8f-2fc7dac18d68&tab=d1b1d320-3d79-11e9-9157-b7b7eba45f26&docTab=d1b1d320-3d79-11e9-9157-b7b7eba45f26_GRC_Assessment_Reports]]|Azure Government Australia|
|2019.10.02|//Box//|[[Box debuts new security controls, other enhancements to workflow automation tools|https://siliconangle.com/2019/10/02/box-debuts-new-security-controls-enhancements-workflow-automation-tools/]]|Box|
|2019.10.02|//Google//[>img[iCSF/flag_fr.png]]|[[Eric Haddad, Google Cloud : nous mettons notre priorité sur la security-by-design et de privacy-by-design|http://www.globalsecuritymag.fr/Eric-Haddad-Google-Cloud-nous,20191003,91138.html]]|GCP Security_by_Design|
|2019.10.02|//Google Cloud//|[[Archive media for the long term with preservation masters|https://cloud.google.com/blog/products/storage-data-transfer/archive-media-for-the-long-term-with-preservation-masters]]|Storage|
|2019.10.02|//Fugue//|![[Zombie Cloud Infrastructure is a Major Security Risk|https://www.fugue.co/blog/zombie-cloud-infrastructure-is-a-major-security-risk]]|Risks Infrastructure Zombies|
|2019.10.02|//Security Intelligence//|[[6 Steps to Modernize Your On-Premises Identity and Access Management Architecture|https://securityintelligence.com/posts/6-steps-to-modernize-your-on-premises-identity-and-access-management-architecture/]]|IAM|
|2019.10.02|//Cyware//|[[Understanding and Preparing for Container security threats|https://cyware.com/news/understanding-and-preparing-for-container-security-threats-26031da9]]|Containers Threats|
|2019.10.02|//McAfee//|[[Security is Shifting to a Unified Cloud Edge|https://securingtomorrow.mcafee.com/business/cloud-security/security-is-shifting-to-a-unified-cloud-edge/]]|Misc|
|2019.10.02|Alexandre Blanc|[[A backup strategy against ransomwares and threats (part 2)|https://www.linkedin.com/pulse/backup-strategy-against-ransomwares-threats-part-2-alexandre/]] (2/3)|Backups Ransomware|
|>|>|>|!2019.10.01|
|2019.10.01|IT Word Canada|[[Canadian government data is getting cloudier, signaling a 'massive leap of faith' in public cloud, says Microsoft|https://www.itworldcanada.com/article/canadian-government-data-is-getting-cloudier-signaling-a-massive-leap-of-faith-in-public-cloud-says-microsoft/422307]]|Misc|
|2019.10.01|Trenches of IT|[[How I Passed the AWS Certified Security - Specialty|https://www.trenchesofit.com/2019/10/01/how-i-passed-aws-security/]]|Training AWS|
|2019.10.01|Help Net Security|[[Managing and monitoring privileged access to cloud ecosystems|https://www.helpnetsecurity.com/2019/10/01/cloud-pam/]]|Access_Controls|
|2019.10.01|//Gigamon//|[[What Is a Private Cloud? Your Data with a Room of Its Own|https://blog.gigamon.com/2019/10/01/what-is-private-cloud-your-data-with-a-room-of-its-own/]]|Private_Cloud|
|2019.10.01|//ThreatStack//|[[The Top 3 Security Mistakes SaaS Companies are Making|https://www.threatstack.com/blog/the-top-3-security-mistakes-saas-companies-are-making]]|SaaS|
|2019.10.01|//JumpCloud//|[[Benefits of Cloud-Based RADIUS Servers|https://jumpcloud.com/blog/benefits-cloud-radius-servers/]]|Radius|
|2019.10.01|//JumpCloud//|[[Security-as-a-Service: IAM|https://jumpcloud.com/blog/secaas-iam/]]|IAM|
|2019.10.01|//Netwrix//|[[The Capital One Hack: 3 Questions about Data Security in the Cloud|https://blog.netwrix.com/2019/10/01/the-capital-one-hack-3-questions-about-data-security-in-the-cloud/]]|CapitalOne Lessons_Learnt|
|2019.10.01|Alexandre Blanc|[[A backup strategy against ransomwares and threats (part 1)|https://www.linkedin.com/pulse/backup-strategy-against-ransomwares-threats-part-1-alexandre/]] (1/3)|Backups Ransomware|
|!Septembre|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2019.09.30|
|2019.09.30|Container Journal|![[PaaS vs. KaaS: A Primer|https://containerjournal.com/topics/container-ecosystems/paas-vs-kaas-a-primer/]]|
|2019.09.30|Help Net Security|[[DevSecOps is emerging as the main methodology for securing cloud-native applications|https://www.helpnetsecurity.com/2019/09/30/securing-cloud-native-applications/]]|DevSecOps|
|2019.09.30|KitPloit|[[Terraform AWS Secure Baseline|https://www.kitploit.com/2019/09/terraform-aws-secure-baseline-terraform.html]]|Tools AWS Terraform|
|2019.09.30|ZDnet|[[Docker is in deep trouble|https://www.zdnet.com/article/docker-is-in-deep-trouble/]]|Docker|
|2019.10.02|Informatique News[>img[iCSF/flag_fr.png]]| → [[En difficulté, Docker cherche de nouveaux financements|ttps://www.informatiquenews.fr/en-difficulte-docker-cherche-de-nouveaux-financements-63772]]|Docker|
|2019.09.30|CyberSecurity Hub|[[Cloud Security: A CISO Guide|https://www.cshub.com/cloud/articles/cloud-security-a-ciso-guide]]|Risks|
|2019.09.30|JDSupra|[[Luxembourg Cloud computing rules for investment fund managers: a reminder of the obligations 6 months before their Cloud Register must be drawn up|https://www.jdsupra.com/legalnews/luxembourg-cloud-computing-rules-for-47103/]]|Luxembourg|
|2019.09.30|Insight| → [[2019 Europe Index Intelligent Technology™ d'Insight|https://fr.insight.com/content/dam/insight-web/en_GB/images/2019/09/index-intelligent-technology-insight-france.pdf]]|Report|
|2019.10.02|Global Security Mag[>img[iCSF/flag_fr.png]]| → [[Selon l'Insight Intelligent Technology Index 2019, Les services cloud inutilisés coûtent 9,6 millions d'euros aux entreprises|http://www.globalsecuritymag.fr/Selon-l-Insight-Intelligent,20190926,91105.html]]|Survey ITI|
|2019.09.30|//Google Cloud//|[[Detect and respond to high-risk threats in your logs with Google Cloud|https://cloud.google.com/blog/products/identity-security/detect-and-respond-to-high-risk-threats-in-your-logs-with-google-cloud]] (4/6)|GCP Threats Detection|
|2019.09.30|//Rapid7//|[[You Can Have It Both Ways with AppSec: Security and Speed|https://blog.rapid7.com/2019/09/30/you-can-have-it-both-ways-with-appsec-security-and-speed/]]|SAST DAST|
|2019.09.30|//Spanning//|[[Why Multi-Factor Authentication (MFA) Is a Must-Have in the Microsoft World and Beyond|https://spanning.com/blog/why-multi-factor-authentication-is-a-must-have/]]|O365 MFA|
!"//Guidelines for CPAs Providing CSA STAR Attestation v2//"
Document annoncé comme publié le 20 septembre 2019, mais daté du 27 septembre 2019 et mis en ligne le 3 octobre 2019.
<<<
[>img(200px,auto)[iCSA/J9KAG.png]]//This document provides guidance for CPAs in conducting a STAR Attestation. This document is not meant to replace any American Institute of Certified Public Accountant (AICPA) Standards or AICPA Service Organization Control® (SOC) related guidance. Refer to [[aicpa.org/soc|http://www.aicpa.org/soc]] for information about SOC and how to obtain SOC related standards and guidance.//
<<<
__Table des matières :__
<<<
* Part 1 - Professional Requirements
## General
## Requirements for engagement performance
## Competency requirements
## Scope of Attestation
## Criteria establishment and selection
* Part 2 - Additional CSA Guidelines
## CSA Competency
## Scope
## Submitting materials to CSA
<<<
&rArr; ''[[CloudSecurityAlliance.fr/go/ja4s/|https://CloudSecurityAlliance.fr/go/ja4s/]]
!"//Why you can't have backdoored crypto that is secure//"
[>img(150px,auto)[iCSA/JA3BW.jpg]]Article de blog publié le 3 octobre 2019 — Rédigé par Kurt Seifried, Chief Blockchain Officer, CSA
<<<
//So as you have probably seen some parts of the US government are again making noise about end-to-end encryption.

We've seen this before (clipper chip, key escrow, etc., etc.). The new twist is that they appear to be trying a thin end of the wedge approach, banning end-to-end encryption in consumer applications (like Whatsapp, Signal and so on) but large corporations will be allowed to have end-to-end encryption to protect their systems. 

Let's ignore the whole consumer vs. corporate argument for a minute (does the CSA qualify? Would we be allowed to have internally secure communications? What about small and medium businesses? What about people who are self-employed?). 

So in order to be effective against an attacker that steals your laptop or cell phone, the encryption system also needs to be effective against a nation-state that takes (e.g. at the border, legally) your laptop or cell phone. Is this a lawful matter with a warrant and judicial transparency? Or is this part of a widespread crackdown by a repressive regime on pro-democracy supporters? Security can either be controlled by the end-user(s) involved in some specific communication/data processing, or it can also be controlled by some third party (e.g., the data processing platform). If a third party is involved, then that third party can choose to reveal the data without consent or even knowledge in most cases of the end parties, due to a lawful warrant, or because they decided to monetize your data and sell it to advertisers. Once you lose technical control of your encryption and privacy you are at risk of a number of attacks, ranging from bribery and theft from the third party to that third party going bankrupt and your data assets being auctioned off to the highest bidder. 

This is why the CSA is actively exploring and engineering Blockchain solutions that involve end-to-end privacy and technical controls that are placed in the hands of the end-users, because anything less is just a data breach away from failure.//
[...]
<<<
&rArr; Lire [[l'original|https://CloudSecurityAlliance.fr/go/ja3b/]] sur le blog de la CSA.
[img(25%,1px)[iCSF/BluePixel.gif]]
Un appel à commentaires dont la date de clôture est le ''3 novembre 2019'' : "''Critical Controls Implementation for SAP''".
<<<
//The Critical Controls Implementation for SAP is the first in a series of implementation documents that the CSA ERP Security Working Group aims to develop. These documents will focus on specific ERP technologies, starting with SAP. The Critical Controls Implementation for SAP document will be released in 2 parts. Part 1 will feature the first 10 controls with the second part featuring the rest at a later date. The document takes a technical and granular approach including information such as implementation checklists and SAP transaction numbers.//
<<<
__Extrait :__
<<<
The Critical Controls Implementation for SAP is the first document in a series of implementation documents we hope to develop that focuses on specific ERP technologies. The documents will be released in 2 parts. The first part of the document will provide controls implementation guidance for the following controls:
* APP01 - Secure Landscape
* APP02 - Baseline Secure Configurations
* APP03 - Security Vulnerabilities
* INT01 - Secure Integrations and API
* DAT01 - Continuous Monitoring
* DAT02 - Data Separation
* DAT03 - Data Encryption
* BUS01 -  Inventory of Business Assets, Data and Processes
* BUS02 - Business Process Controls
* BUS03 - Continuous Compliance
<<<
* Lien → ''[[CloudSecurityAlliance.fr/go/ja3c/|https://cloudsecurityalliance.fr/go/ja3c/]]''
[img(25%,1px)[iCSF/BluePixel.gif]]
[>img(300px,auto)[iCSA/CCSK_cwet.jpg]]La [[Cloud Security Alliance]] annonce le lancement d'un forfait CCSK .
<<<
//__''CSA Announces Availability of Certificate of Cloud Security Knowledge Foundation Exam Bundle''__
Exam bundle makes it even easier to demonstrate knowledge in key areas of cloud security

SEATTLE - October 3, 2019 - The Cloud Security Alliance (CSA), the world's leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today announced the availability of the Certificate of Cloud Security Knowledge (CCSK) Foundation Exam bundle. Now, those looking to demonstrate their competency in key cloud security areas such as governance and compliance can take the ''CCSK Foundation'' self-paced online course and receive an exam token for just $795 (a $890 value).

"There is a tremendous skills gap facing modern enterprises today, and cost shouldn't be an impediment to furthering one's career in a high-growth field with a rising demand for security professionals who can demonstrate a deep knowledge of cloud security," said Ryan Bergsma. "We're proud to be able to provide today'sinfosec leaders with an affordable option to advancement."

After purchasing the ''CCSK Foundation'' Exam bundle, students will be able to access the training for 60 days (with an automatic 30-day extension on request and further extensions at CSA's discretion). Tokens are valid for two years and include two attempts. The bundle includes seven modules:
# ''CCSK Foundation'' Introduction.
** A preview of the ''CSA CCSK Foundation Course'' content and class structure, along with the study materials that will be used throughout the course.
# Cloud Architecture.
** The fundamentals of cloud computing, including definitions, architectures, and the role of virtualization. Key topics include fundamental characteristics, cloud service and delivery models, and the Shared Responsibilities Model.
# Infrastructure Security for Cloud.
** Core infrastructure security- including networks, management interfaces, and administrator credentials. Students will also learn about virtual networking and workload security, including the basics of containers and serverless.
# Managing Cloud Security and Risk.
** Considerations and tools for risk assessment, governance, legal issues and compliance. Students will learn important considerations for managing security for cloud computing and be introduced to important CSA risk tools.
# Data Security for Cloud.
** Data security lifecycle, cloud storage models, data security issues and managing encryption. This module covers information lifecycle management for the cloud and how to apply security controls, with an emphasis on public cloud.
# Securing Cloud Applications, Users and Related Technologies.
** Identity management and application security for cloud deployments. Topics in this module include federated identity and different IAM applications, secure development, and managing application security in and for the cloud.
# Cloud Security Operations.
** Evaluating, selecting, and managing cloud computing providers. This module also discusses the role of Security as a Service providers and the impact of cloud on incident response.

The vendor-neutral CCSK tests for a broad foundation of cloud security knowledge, covering such topics as architecture, governance, compliance, operations, encryption, and virtualization. The CCSK exam body of knowledge is the CSA Security Guidance v4, the CSA Cloud Control Matrix and the ENISA Cloud Computing Risk Assessment report. Those interested in taking the exam can also choose to take advantage of a variety of CCSK training programs, including free self-study prep courses, in-person training sessions, and instructor-led online classes. Since it was launched in 2010, thousands of IT and security professionals have upgraded their skillsets and enhanced their careers by obtaining the CCSK.//
<<<
[img(25%,1px)[iCSF/BluePixel.gif]]
* Lien → ''[[CloudSecurityAlliance.fr/go/ja3a/|https://cloudsecurityalliance.fr/go/ja3a/]]''
* Le forfait est décrit [[ici|2019.10.03 - Forfait CCSK 'Foundation Exam Bundle']].
[img(25%,1px)[iCSF/BluePixel.gif]]
[>img(100px,auto)[iCSA/CCSK_cwet.jpg]]Le forfait "''Foundation Exam Bundle''" comprend la formation en ligne pour les 7 modules et un jeton pour passer l'examen.
<<<
//Teaches the fundamentals of cloud security including: architecture, data security, managing risk and more. This course comes with a test token for students to take the CCSK exam.

* [>img(100px,auto)[iCSA/CCSK_0.jpg]]''Introduction: CCSK Foundation Introduction''
** Introduction to the CSA CCSK Foundation Course content and class structure. During this module you will be introduced to your instructor, Rich Mogull and familiarize yourself with the study materials you'll be using throughout the course. 

* [>img(100px,auto)[iCSA/CCSK_1.jpg]]''Module 1: Cloud Architecture''
** The fundamentals of cloud computing, including definitions, architectures, and the role of virtualization. Key topics include fundamental characteristics, cloud service and delivery models, and the Shared Responsibilities Model. 

* [>img(100px,auto)[iCSA/CCSK_2.jpg]]''Module 2: Infrastructure Security for Cloud''
** Core infrastructure security- including networks, management interfaces, and administrator credentials. Students will also learn about virtual networking and workload security, including the basics of containers and serverless. 

* [>img(100px,auto)[iCSA/CCSK_3.jpg]]''Module 3: Managing Cloud Security and Risk''
** Considerations and tools for risk assessment, governance, legal issues and compliance. Students will learn important considerations for managing security for cloud computing and be introduced to important CSA risk tools. 

* [>img(100px,auto)[iCSA/CCSK_4.jpg]]''Module 4: Data Security For Cloud''
** Data security lifecycle, cloud storage models, data security issues and managing encryption. This module covers information lifecycle management for the cloud and how to apply security controls, with an emphasis on public cloud. 

* [>img(100px,auto)[iCSA/CCSK_5.jpg]]''Module 5: Securing Cloud Applications, Users and Related Technologies''
** Identity management and application security for cloud deployments. Topics in this module include federated identity and different IAM applications, secure development, and managing application security in and for the cloud. 

* [>img(100px,auto)[iCSA/CCSK_6.jpg]]''Module 6: Cloud Security Operations''
** Evaluating, selecting, and managing cloud computing providers. This module also discusses the role of Security as a Service providers and the impact of cloud on incident response. 
//
<<<
[img(25%,1px)[iCSF/BluePixel.gif]]
* Lien → * Lien → ''[[CloudSecurityAlliance.fr/go/ja3k/|https://cloudsecurityalliance.fr/go/ja3k/]]''
[img(25%,1px)[iCSF/BluePixel.gif]]
!"//Guardians of the Cloud: The Latest Security Findings//"
[>img(100px,auto)[iCSA/JA7BG.jpg]]^^Bien que publié le 7 octobre 2019 sur le blog de la CSA, cet article l'a déjà été il y a presque 3 mois, le 17 juillet 2019 sur le site de la société Bitglass.
&rArr; Lire [[l'article|https://CloudSecurityAlliance.fr/go/ja7z/]] sur le blog de la Cloud Security Alliance ou [[l'original|https://CloudSecurityAlliance.fr/go/ja7x/]]^^

[img(25%,1px)[iCSF/BluePixel.gif]]
!"//What to Expect at the 2019 Colorado Chapter Forum//"
[>img(100px,auto)[iCSA/JA2BW.jpg]]^^Annonce de la réunion du chapitre du Colorado et de son programme. Elle se tiendra le jeudi 7 novembre 2019 à Denver, et sera suivie d'une formation CCSK le lendemain.
&rArr; Lire [[l'article|https://blog.cloudsecurityalliance.org/2019/10/02/what-to-expect-at-the-2019-colorado-chapter-forum/]]^^

[img(25%,1px)[iCSF/BluePixel.gif]]
!"//Cloud Security Posture Management: Why You Need It Now//"
[>img(100px,auto)[iCSA/JA1BC.jpg]]^^Bien que publié le 1er octobre 2019 sur le blog de la CSA, cet article l'a déjà été il y a 2 mois, le 5 août 2019 sur le site de la société Bitglass.
&rArr; Lire [[l'article|https://CloudSecurityAlliance.fr/go/ja1z/]] sur le blog de la Cloud Security Alliance ou [[l'original|https://CloudSecurityAlliance.fr/go/ja1x/]]^^

[img(25%,1px)[iCSF/BluePixel.gif]]
!Actualités, Blog, Publications et Veille "Sécurité du Cloud"
<<tiddler fAll2LiTabs13end with: 201909>>
<<tiddler fAll2Tabs10 with: VeilleM","_201909>>
|!Septembre|!Sources|!Titres et Liens|!Keywords|
|2019.05.30|!MITRE|[[CVE-2019-12491|https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12491]]: ^^OnApp allows an attacker to run arbitrary commands with root privileges on servers managed by OnApp for XEN/KVM hypervisors^^|OnApp CVE-2019-12491|
|2019.06.07|//OnApp//|[[OnApp General Security Advisory|https://docs.onapp.com/rn/general-security-advisory]]|CVE-2019-12491 OnApp|
|2019.09.26|//Skylight//|[[All Your Cloud Are Belong To Us (CVE-2019-12491)|https://skylightcyber.com/2019/09/26/all-your-cloud-are-belong-to-us-cve-2019-12491/]]|CVE-2019-12491 OnApp|
|2019.09.26|MotherBoard| → [[Thousands of Cloud Computing Servers Could Be Owned With 'Very Simple' Attack, Researchers Say|https://www.vice.com/en_us/article/ywanev/thousands-of-cloud-computing-servers-could-be-owned-with-very-simple-attack-researchers-say]]|CVE-2019-12491 OnApp|
|2019.09.26|Dark Reading| → [[Cloud Vulnerability Could Let One Server Compromise Thousands|https://www.darkreading.com/cloud/cloud-vulnerability-could-let-one-server-compromise-thousands/d/d-id/1335943]]|CVE-2019-12491 OnApp|
|>|>|>|!|
|2019.09.08|!MITRE|[[CVE-2019-16097|https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16097]]: ^^core/api/user.go [...] allows non-admin users to create admin accounts via the POST /api/users API^^|Harbor CVE-2019-16097|
|2019.09.18|//PaloAlto Networks//|[[Critical Vulnerability in Harbor Enables Privilege Escalation from Zero to Admin (CVE-2019-16097)|https://unit42.paloaltonetworks.com/critical-vulnerability-in-harbor-enables-privilege-escalation-from-zero-to-admin-cve-2019-16097/]]|Harbor CVE-2019-16097|
|2019.09.19|Bleeping Computer| → [[Critical Bug In Harbor Container Registry Gives Admin Access|https://www.bleepingcomputer.com/news/security/critical-bug-in-harbor-container-registry-gives-admin-access/]]|Harbor CVE-2019-16097|
|2019.09.20|GBHackers on Security| → [[Critical Vulnerability in Harbor let Hackers to Escalate Privilege by Sending Malicious Request|https://gbhackers.com/critical-vulnerability-harbor/]]|Harbor CVE-2019-16097|
|2019.09.02|Harbor|[[Disallow creating an admin user when registration #8917|https://github.com/goharbor/harbor/pull/8917]]|CVE-2019-16097 Patch|
[img(25%,1px)[iCSF/BluePixel.gif]]
<<tiddler .ReplaceTiddlerTitle with: [[Alertes et Vulnérabilités - Septembre 2019]]>>
<<tiddler fAll2LiTabs10 with: NewsL","201909>><<tiddler .ReplaceTiddlerTitle with: [[Newsletters - Septembre 2019]]>>
<<tiddler .ReplaceTiddlerTitle with: [[Actualités - Septembre 2019]]>><<tiddler fAll2LiTabs13end with: Actu","201909>>
<<tiddler fAll2LiTabs13end with: Blog","201909>>
[img(25%,1px)[iCSF/BluePixel.gif]]
<<tiddler .ReplaceTiddlerTitle with: [[Blog - Septembre 2019]]>>
<<tiddler fAll2LiTabs13end with: Publ","201909>>
[img(25%,1px)[iCSF/BluePixel.gif]]
<<tiddler .ReplaceTiddlerTitle with: [[Publications - Septembre 2019]]>>
!1 - Les nouveautés CSA de la semaine du 23 au 29 septembre 2019
* [>img[iCSF/cloud-security-alliance-fr.png]]Actu : Il ne reste plus que 3 jours pour commenter la traduction en français de 3 documents CSA+++*[»]> <<tiddler [[2019.09.19 - Demande de validation la traduction en français de 3 documents CSA]]>>=== 
* Blog : ''How Blockchain Might Save Us All''+++*[»]> <<tiddler [[2019.09.27 - Blog : 'How Blockchain Might Save Us All']]>>=== 
!2 - Veille Web
La [[Veille Web|2019.09.29 - Veille Hebdomadaire - 29 septembre]] avec une soixantaine de liens :
* __''À lire'' :__ Démarche ayant amené Amazon a renforcer la sécurité de ses buckets S3+++*[»]>
|2019.09.23|Help Net Security|![[How data breaches forced Amazon to update S3 bucket security|https://www.helpnetsecurity.com/2019/09/23/s3-bucket-security/]]|AWS S3|
=== 
* __''À lire'' :__ Recommandations sécurité sur Office 365 de l'Agence nationale de Cyber Sécurité finlandaise+++*[»]>
|2019.09.23|NCSC-FI|![[Protection against Microsoft Office 365 credential phishing and data breaches|https://www.kyberturvallisuuskeskus.fi/en/ohjeet]] ([[guide .pdf|https://www.kyberturvallisuuskeskus.fi/sites/default/files/media/publication/T_MS365_eng_200919.pdf]])|O365 Best_Practices|
|2019.09.23|Bleeping Computer| → [[Finnish Govt. Releases Guide on Securing Microsoft Office 365|https://www.bleepingcomputer.com/news/security/finnish-govt-releases-guide-on-securing-microsoft-office-365/]]|O365 Best_Practices|
=== 
* Alerte : CVE-2019-12491 affectant ''OnApp'' la plate-forme d'orchestration utilisée par de très nombreux prestataires Cloud+++*[»]> <<tiddler [[2019.09.30 - Alertes]]>>=== 
* Rapports et sondages : "''Cloud-Native Breaches''" (ESG)+++*[»]>
|2019.09.24|//ESG//|[[You Might Be Cloud-First, But Security Is Still an Afterthought|https://www.businesswire.com/news/home/20190924005500/en/Cloud-First-Security-Afterthought]]|Report ESG DevSecOps|
|2019.09.24|//Capsule8//| → [[Retooling CyberSecurity Programs for the Cloud-first Era|https://info.capsule8.com/retooling-cybersecurity-programs-for-the-cloud]]|Report ESG DevSecOps|
|2019.09.24|DevOps.com| → [[DevSecOps Becomes a Higher Cloud-Native Priority|https://devops.com/devsecops-becomes-a-higher-cloud-native-priority/]]|Report ESG DevSecOps|
|2019.09.25|Help Net Security| → [[Security capabilities are lagging behind cloud adoption|https://www.helpnetsecurity.com/2019/09/25/security-capabilities-cloud-adoption/]]|Report ESG DevSecOps|
===, "''Cloud Security Intelligence''" (Coalfire)+++*[»]>
|2019.09.25|//Coalfire//|![[Cloud Security Intelligence Report|https://www.coalfire.com/Resources/White-Papers/Cloud-Security-Intelligence-Report]]|Study Threats|
===, "''Cloud-Native Breaches''" (McAfee)+++*[»]>
|2019.09.24|//McAfee//|[[McAfee Report Demonstrates Cloud-Native Breaches Differ Greatly From Malware Attacks of the Past|https://www.businesswire.com/news/home/20190924005213/en/McAfee-Report-Demonstrates-Cloud-Native-Breaches-Differ-Greatly]]|Report McAfee|
|2019.09.24|//McAfee//| → [[Cloud-Native: The Infrastructure-as-a-Service (IaaS) Adoption and Risk Report|https://www.mcafee.com/enterprise/en-us/forms/gated-form.html?docID=be66d487-f531-4484-ba0c-558b534ff779&esheet=52099611&newsitemid=20190924005213]]|Report McAfee|
|2019.09.24|Dark Reading| → [[Cloud-Native Breaches Differ Greatly from Malware Attacks of the Past: McAfee Report|https://www.darkreading.com/cloud/cloud-native-breaches-differ-greatly-from-malware-attacks-of-the-past-mcafee-report/d/d-id/1335890]]|Report McAfee|
|2019.09.24|Help Net Security| → [[99% of misconfiguration incidents in the cloud go unnoticed|https://www.helpnetsecurity.com/2019/09/25/cloud-misconfiguration-incidents/]]|Report McAfee|
=== 
* Offres produits : annonce Microsoft d'Azure Sentinel+++*[»]>
|2019.09.25|//Microsoft Azure//|[[Azure Sentinel - the cloud-native SIEM that empowers defenders is now generally available|https://www.microsoft.com/security/blog/2019/09/24/azure-sentinel-cloud-native-siem-empowers-defenders-generally-available/]]|Azure SIEM|
=== 
|>|>|>|!Alerte|
|2019.09.08|MITRE|[[CVE-2019-12491|https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12491]]: ^^OnApp allows an attacker to run arbitrary commands with root privileges on servers managed by OnApp for XEN/KVM hypervisors^^|OnApp CVE-2019-12491|
|2019.09.26|//Skylight//|[[All Your Cloud Are Belong To Us (CVE-2019-12491)|https://skylightcyber.com/2019/09/26/all-your-cloud-are-belong-to-us-cve-2019-12491/]]
 → Voir ci-dessous|CVE-2019-12491 OnApp| |>|>|>|| |!Septembre|!Sources|!Titres et Liens|!Keywords| |>|>|>|!2019.09.29| |2019.09.29|Christophe Parisel|![[An overview of security postures in Azure and AWS|https://www.linkedin.com/pulse/overview-security-postures-azure-aws-christophe-parisel/]]|Security_Posture Azure AWS| |2019.09.29|Forbes|[[New Cybersecurity Companies Have Their Heads In The Cloud|https://www.forbes.com/sites/jonmarkman/2019/09/29/new-cybersecurity-companies-have-their-heads-in-the-cloud/]]|Misc| |2019.09.29|//DivvyCloud//|[[Securing Your Cloud to Support Successful Mergers & Acquisitions|https://divvycloud.com/blog/cloud-security-mergers-acquisitions/]]|Misc| |>|>|>|!2019.09.28| |2019.09.28|Cyber Defense Mag|[[Why Cyber Security is Redefining SMEs' Business Operations on the Cloud|https://www.cyberdefensemagazine.com/why-cyber-security/]]|SMEs| |>|>|>|!2019.09.27| |2019.09.27|Bleeping Computer|[[Office 365 to Get Automated Incident Response for Hacked Accounts|https://www.bleepingcomputer.com/news/microsoft/office-365-to-get-automated-incident-response-for-hacked-accounts/]]|O365 automation Incidents| |2019.09.27|Security Boulevard|[[A Seismic Shift for Decrypted Visibility in the Cloud|https://securityboulevard.com/2019/09/a-seismic-shift-for-decrypted-visibility-in-the-cloud/]]|Encryption| |2019.09.27|//MarketResearch//[>img[iCSF/flag_fr.png]]|[[Le marché mondial des services de sécurité basés sur le cloud devrait gagner en popularité dans le monde entier d'ici 2025|https://www.loftvpro.com/le-marche-mondial-des-services-de-securite-bases-sur-le-cloud-devrait-gagner-en-popularite-dans-le-monde-entier-dici-2025/]]|Market| |2019.09.27|//Veracode//|[[Live From Gartner Security & Risk Mgmt Summit: How to Approach Container Security|https://www.veracode.com/blog/security-news/live-gartner-security-risk-mgmt-summit-how-approach-container-security]]|Containers| |2019.09.27|//BlueCat//|[[How to start achieving visibility in the cloud|https://www.helpnetsecurity.com/2019/09/27/visibility-in-the-cloud/]]|Visibility| |2019.09.27|//Oracle//|[[Multicloud is the New On-Prem|https://www.linkedin.com/pulse/multicloud-new-on-prem-matthew-o-keefe-ph-d-/]]|Multi_Cloud| |2019.09.27|//Cloud Academy//|[[AWS Security Groups: Instance Level Security|https://cloudacademy.com/blog/aws-security-groups-instance-level-security/]]|AWS| |>|>|>|!2019.09.26| |2019.09.26|Solutions Numériques[>img[iCSF/flag_fr.png]]|[[IAM/IDaaS, la clé d'une approche "Zero Trust"|https://www.solutions-numeriques.com/dossiers/iam-idaas-la-cle-dune-approche-zero-trust/]]|IAM IDaaS| |2019.09.26|Cyber Defense Mag|[[Escaping the Gravitational Pull of Data Insecurity|https://www.cyberdefensemagazine.com/escaping-the-gravitational/]]|Data Regulations| |2019.09.26|//Skylight//|![[All Your Cloud Are Belong To Us (CVE-2019-12491)|https://skylightcyber.com/2019/09/26/all-your-cloud-are-belong-to-us-cve-2019-12491/]]|CVE-2019-12491 OnApp| |2019.09.26|MotherBoard| → [[Thousands of Cloud Computing Servers Could Be Owned With 'Very Simple' Attack, Researchers Say|https://www.vice.com/en_us/article/ywanev/thousands-of-cloud-computing-servers-could-be-owned-with-very-simple-attack-researchers-say]]|CVE-2019-12491 OnApp| |2019.09.26|Dark Reading| → [[Cloud Vulnerability Could Let One Server Compromise Thousands|https://www.darkreading.com/cloud/cloud-vulnerability-could-let-one-server-compromise-thousands/d/d-id/1335943]]|CVE-2019-12491 OnApp| |2019.09.26|Dark Reading|[[Why You Need to Think About API Security|https://www.darkreading.com/application-security/why-you-need-to-think-about-api-security/a/d-id/1335861]]|APIs| |2019.09.26|Dark Reading|[[Why Clouds Keep Leaking Data|https://www.darkreading.com/edge/theedge/why-clouds-keep-leaking-data/b/d-id/1335921]]|Data_Leaks CSA| |2019.09.26|KitSploit|[[Kube-Alien - Tool To Launches Attack on K8s Cluster from Within|https://www.kitploit.com/2019/09/kube-alien-tool-to-launches-attack-on.html]]|[[Tools|Outils-GitHub]]| |2019.09.26|//Zscaler//|[[Phishing attacks abusing appspot.com and web.app domains on Google Cloud|https://www.zscaler.com/blogs/research/phishing-attacks-abusing-appspotcom-and-webapp-domains-google-cloud]]|Phishing GCP| |2019.09.26|//CloudCheckr//|[[Understanding the Shared Responsibility Model for Cloud Security|https://cloudcheckr.com/cloud-security/shared-responsibility-model/]]|Shared_Responsibility| |2019.09.26|//DivvyCloud//|[[Lion Air Data Breach! Another Misconfigured S3 Bucket|https://divvycloud.com/blog/lion-air-data-breach-another-misconfigured-s3-bucket/]]|Data_Leak AWS_S3 Malindo| |2019.09.26|//Threatpost//|[[CISOs: Support Vendor Security Ops for Best Cloud Results|https://threatpost.com/cisos-support-vendor-security-ops-for-best-cloud-results/148665/]]|SaaS Survey McKinsey| |2019.09.26|//Microsoft Azure//|[[How to prevent phishing attacks that target your customers with DMARC and Office 365|https://www.microsoft.com/security/blog/2019/09/26/how-to-prevent-phishing-attacks-dmarc-office-365/]]|O365 Phishing Prevention| |2019.09.26|//WeScale//[>img[iCSF/flag_fr.png]]|![[Le guide de Chaos Engineering : Partie 1|https://blog.wescale.fr/2019/09/26/le-guide-de-chaos-engineering-part-1/]] (1/3)|Chaos_Engineering| |2019.09.26|//StackRox//|![[12 Kubernetes configuration best practices|https://www.stackrox.com/post/2019/09/12-kubernetes-configuration-best-practices/]]|Kubernetes Best_Practices| |2019.09.26|BuildAzure|[[Security of Azure Container Registry Image Promotion Flow|https://buildazure.com/security-azure-container-registry-image-promotion/]]|Azure Registry| |>|>|>|!2019.09.25| |2019.09.25|Bleeping Computer|[[Microsoft Phishing Attack Uses Google Redirects to Evade Detection|https://www.bleepingcomputer.com/news/security/microsoft-phishing-attack-uses-google-redirects-to-evade-detection/]]|O365 Phishing| |2019.09.25|FedScoop|[[Energy is using cyber risk assessments to make cloud decisions|https://www.fedscoop.com/energy-cyber-risk-cloud-budgeting/]]|Risk_Management FAIR| |2019.09.25|Cybersecurity Insiders|[[CCSP and CCSK: Which Cloud Security Credential Is Right For You?|https://www.cybersecurity-insiders.com/ccsp-and-ccsk-which-cloud-security-credential-is-right-for-you/]]|CCSK| |2019.09.25|BetaNews|[[How to use Windows 10's Cloud Download recovery feature|https://betanews.com/2019/09/25/windows-10-cloud-download/]]|Misc| |2019.09.25|Infosec Institute|[[CCSP exam and CBK changes in August|https://resources.infosecinstitute.com/ccsp-exam-and-cbk-changes-in-august/]]|Training| |2019.09.25|NextGov|[[How Federal Agencies Can Be More Proactive About Cloud Security|https://www.nextgov.com/ideas/2019/09/how-federal-agencies-can-be-more-proactive-about-cloud-security/160073/]]|Risks| |2019.09.25|TechradarPro|[[Choosing the right cloud container platform|https://www.techradar.com/news/choosing-the-right-cloud-container-platform]]|Containers| |2019.09.25|Channel Daily News|[[Who should the CISO report to, and other CloudSec 2019 takeaways|https://channeldailynews.com/news/who-should-the-ciso-report-to-and-other-cloudsec-2019-takeaways/68969]]|Misc| |2019.09.25|//Microsoft Azure//|[[Azure Sentinel - the cloud-native SIEM that empowers defenders is now generally available|https://www.microsoft.com/security/blog/2019/09/24/azure-sentinel-cloud-native-siem-empowers-defenders-generally-available/]]|Azure SIEM Sentinel| |2019.09.26|//Microsoft Azure//| → [[Azure Sentinel general availability: A modern SIEM reimagined in the cloud|https://azure.microsoft.com/en-us/blog/azure-sentinel-general-availability-a-modern-siem-reimagined-in-the-cloud/]]|Azure SIEM Sentinel| |2019.02.28|//Microsoft Azure//| → [[Announcing new cloud-based technology to empower cyber defenders|https://blogs.microsoft.com/blog/2019/02/28/announcing-new-cloud-based-technology-to-empower-cyber-defenders/]]|Azure SIEM Sentinel| |2019.09.25|//Microsoft Azure//|[[Top 5 use cases to help you make the most of your Cloud Access Security Broker|https://www.microsoft.com/security/blog/2019/09/25/top-5-use-cases-cloud-access-security-broker/]] (1/4)|CASB| |2019.02.25|//Microsoft Azure//|![[Ensuring secrecy orders are the exception not the rule when the government seeks data owned by our customers|https://blogs.microsoft.com/on-the-issues/2019/09/25/ensuring-secrecy-orders-are-the-exception-not-the-rule-when-the-government-seeks-data-owned-by-our-customers/]]|Regulations| |2019.09.26|Ars technica| → [[Microsoft: Customers are entitled to know about federal data requests|https://arstechnica.com/tech-policy/2019/09/microsoft-battles-feds-over-gag-orders-in-law-enforcement-data-requests/]]|Regulations| |2019.09.25|//Bitglass//|[[The Four Pillars of CASB: Identity|https://www.bitglass.com/blog/four-pillars-casb-identity]]|CASB| |2019.09.25|//Proofpoint//|[[Cloud Attacks Prove Effective Across Industries in the First Half of 2019|https://www.proofpoint.com/us/threat-insight/post/cloud-attacks-prove-effective-across-industries-first-half-2019]]|Report Proofpoint| |2019.09.25|UnderNews[>img[iCSF/flag_fr.png]]| → [[85 % des organisations ont subi au moins une cyberattaque via le cloud au cours du premier semestre 2019|https://www.undernews.fr/reseau-securite/85-des-organisations-ont-subi-au-moins-une-cyberattaque-via-le-cloud-au-cours-du-premier-semestre-2019.html]]|Report Proofpoint| |2019.09.25|//Markerbench//|[[Why CISOs should Care About Cloud "Drift"|http://www.markerbench.com/blog/2019/09/25/drifting-along/]]|Misc| |2019.09.25|//Puppet//|[[2019 State of DevOps Report|https://puppet.com/resources/whitepaper/state-of-devops-report]]|Report Puppet DevOps| |2019.09.25|//Puppet//|[[2019 State of DevOps Report Reveals Shifting Security Left is Insufficient; Organizations Must Fundamentally Change How They Work Earlier in the Software Delivery Cycle|https://www.globenewswire.com/news-release/2019/09/25/1920660/0/en/2019-State-of-DevOps-Report-Reveals-Shifting-Security-Left-is-Insufficient-Organizations-Must-Fundamentally-Change-How-They-Work-Earlier-in-the-Software-Delivery-Cycle.html]]|Report Puppet DevOps| |2019.09.25|//Coalfire//|![[Cloud Security Intelligence Report|https://www.coalfire.com/Resources/White-Papers/Cloud-Security-Intelligence-Report]]|Study Threats| |>|>|>|!2019.09.24| |2019.09.24|Cybersecurity Insiders|[[Why IaaS requires cloud security automation|https://www.cybersecurity-insiders.com/why-iaas-requires-cloud-security-automation/]]|IaaS Automation| |2019.09.24|Solutions Reviews|[[Cloud Compliance: How to Maintain Compliance in Your Cloud Deployment|https://solutionsreview.com/cloud-platforms/cloud-compliance-how-to-maintain-compliance-in-your-cloud-deployment/]]|Compliance| |2019.09.24|//ESG//|[[Enterprise Strategy Group Study Finds Very Few Companies Are Securing the Majority of Their Cloud-Native Apps With DevSecOps Practices|https://www.businesswire.com/news/home/20190926005105/en/Enterprise-Strategy-Group-Study-Finds-Companies-Securing]]|Report ESG DevSecOps| |2019.09.24|//Data Theorem//|[[Security for DevOps - Enterprise Survey Report, September 2019|https://www.datatheorem.com/resources/reports/esg-security-for-devops]]|Report ESG DevSecOps| |2019.09.24|//ESG//|[[You Might Be Cloud-First, But Security Is Still an Afterthought|https://www.businesswire.com/news/home/20190924005500/en/Cloud-First-Security-Afterthought]]|Report ESG DevSecOps| |2019.09.24|//Capsule8//| → [[Retooling CyberSecurity Programs for the Cloud-first Era|https://info.capsule8.com/retooling-cybersecurity-programs-for-the-cloud]]|Report ESG DevSecOps| |2019.09.24|DevOps.com| → [[DevSecOps Becomes a Higher Cloud-Native Priority|https://devops.com/devsecops-becomes-a-higher-cloud-native-priority/]]|Report ESG DevSecOps| |2019.09.25|Help Net Security| → [[Security capabilities are lagging behind cloud adoption|https://www.helpnetsecurity.com/2019/09/25/security-capabilities-cloud-adoption/]]|Report ESG DevSecOps| |2019.09.26|Dark Reading| → [[Cloud-Native Applications: Shift to Serverless is Underway|https://www.darkreading.com/cloud/cloud-native-applications-shift-to-serverless-is-underway/d/d-id/1335931]]|Report ESG DevSecOps| |2019.09.26|InfoSecurity Mag| → [[Secure DevOps Practices Expected to Increase for Cloud Apps|https://www.infosecurity-magazine.com/news/secure-devops-cloud-apps/]]|Report ESG DevSecOps| |2019.09.24|//McAfee//|[[McAfee Report Demonstrates Cloud-Native Breaches Differ Greatly From Malware Attacks of the Past|https://www.businesswire.com/news/home/20190924005213/en/McAfee-Report-Demonstrates-Cloud-Native-Breaches-Differ-Greatly]]|Report McAfee| |2019.09.24|//McAfee//| → [[Cloud-Native: The Infrastructure-as-a-Service (IaaS) Adoption and Risk Report|https://www.mcafee.com/enterprise/en-us/forms/gated-form.html?docID=be66d487-f531-4484-ba0c-558b534ff779&esheet=52099611&newsitemid=20190924005213]]|Report McAfee| |2019.09.24|Dark Reading| → [[Cloud-Native Breaches Differ Greatly from Malware Attacks of the Past: McAfee Report|https://www.darkreading.com/cloud/cloud-native-breaches-differ-greatly-from-malware-attacks-of-the-past-mcafee-report/d/d-id/1335890]]|Report McAfee| |2019.09.24|Help Net Security| → [[99% of misconfiguration incidents in the cloud go unnoticed|https://www.helpnetsecurity.com/2019/09/25/cloud-misconfiguration-incidents/]]|Report McAfee| |2019.09.24|//PaloAlto Networks//|[[5 Considerations Before Building Your Own Cloud Security Tool|https://blog.paloaltonetworks.com/2019/09/cloud-security-tool/]]|Tools| |2019.09.24|//McAfee//|[[McAfee Cloud Adoption and Risk Report - Uncovering the scale of risk in the cloud|https://www.mcafee.com/enterprise/en-us/solutions/lp/cloud-adoption-risk.html]] ou [[ici|https://cloudsecurity.mcafee.com/cloud/en-us/forms/white-papers/wp-cloud-adoption-risk-report-2019-banner-cloud-mfe.html]]|Report McAfee| |2019.09.24|//Digital Shadows//|![[SecDevOps: Continued Database Exposures Point to Growing Challenges|https://www.digitalshadows.com/blog-and-research/secdevops-continued-database-exposures-point-to-growing-challenges/]]|SecDevOps BreachesData_| |2019.09.24|//Digital Shadows//| → [[Timeline of Inadvertant Data Breaches (2017-2019)|https://www.slideshare.net/digitalshadows/inadvertant-data-breaches]]|Data_Breaches| |2019.09.24|//Threatstack//|[[16 Kubernetes Experts Share the Most Interesting Current Trends to Look for in Kubernetes|https://www.threatstack.com/blog/16-kubernetes-experts-share-the-most-interesting-current-trends-to-look-for-in-kubernetes]]|Kubernetes Trends| |2019.09.24|//Pupuweb//|[[5 Essentials for Hybrid Identity Management and Security|https://pupuweb.com/essentials-hybrid-identity-management-security/]]|IAM| |2019.09.24|//Clever Cloud//[>img[iCSF/flag_fr.png]]|![[Le grand retour du "cloud souverain": une histoire de gouvernance et de protectionnisme|https://www.frenchweb.fr/le-grand-retour-du-cloud-souverain-une-histoire-de-gouvernance-et-de-protectionnisme/376626]]|Sovereign_Cloud| |2019.09.24|Dev.to|[[Best Practices for Event-Driven Microservice Architecture|https://dev.to/heroku/best-practices-for-event-driven-microservice-architecture-2lh7]]|Misc| |>|>|>|!2019.09.23| |2019.09.23|NCSC-FI|![[Protection against Microsoft Office 365 credential phishing and data breaches|https://www.kyberturvallisuuskeskus.fi/en/ohjeet]] ([[guide .pdf|https://www.kyberturvallisuuskeskus.fi/sites/default/files/media/publication/T_MS365_eng_200919.pdf]])|O365 Best_Practices| |2019.09.23|Bleeping Computer| → [[Finnish Govt. Releases Guide on Securing Microsoft Office 365|https://www.bleepingcomputer.com/news/security/finnish-govt-releases-guide-on-securing-microsoft-office-365/]]|O365 Best_Practices| |2019.09.23|Help Net Security|![[How data breaches forced Amazon to update S3 bucket security|https://www.helpnetsecurity.com/2019/09/23/s3-bucket-security/]]|AWS S3| |2019.09.23|Container Journal|[[Harbor Container Registry Project Advances|https://containerjournal.com/topics/container-management/harbor-container-registry-project-advances/]]|Harbor| |2019.09.23|CloudTweaks|[[Implementing Serverless Microservices Architecture on AWS|https://cloudtweaks.com/2019/09/implementing-serverless-microservices-architecture/]]|Serverless| |2019.09.23|Finextra|[[Sibos 2019: Cloud services- huge burden of security responsibility|https://www.finextra.com/newsarticle/34457/sibos-2019-cloud-services--huge-burden-of-security-responsibility]]|Shared_Responsibility| |2019.09.23|Cybersecurity Insiders|[[Controlling Access Is a Key Component of Security for Hybrid IT|https://www.cybersecurity-insiders.com/controlling-access-is-a-key-component-of-security-for-hybrid-it/]]|Access_Controls| |2019.09.23|The Next Web|[[More than 60% of Ethereum nodes run in the cloud, mostly on Amazon Web Services|https://thenextweb.com/hardfork/2019/09/23/ethereum-nodes-cloud-services-amazon-web-services-blockchain-hosted-decentralization/]]|AWS Blockchain| |2019.09.23|//Microsoft Azure//|[[How to develop your service health alerting strategy|https://azure.microsoft.com/en-us/blog/how-to-develop-your-service-health-alerting-strategy/]]|Monitoring| |2019.09.23|//Clearswift//|[[Big brands don't guarantee big security: how to bolster your information security in the cloud|https://www.clearswift.com/blog/2019/09/23/big-brands-don%E2%80%99t-guarantee-big-security-how-bolster-your-information-security-cloud]]|Risks| |2019.09.23|//Qualys//|[[Empower your Cloud Ops Teams - Publish Qualys CloudView Security Assessment Reports to their Slack Channel|https://blog.qualys.com/news/2019/09/23/empower-your-cloud-ops-teams-publish-qualys-cloudview-security-assessment-reports-to-their-slack-channel]]|SecOps| |2019.09.23|//Arbor//|[[How Cybercrime-as-a-Service Is Growing the Black Market|https://www.armor.com/blog/how-cybercrime-as-a-service-is-growing-the-black-market/]]|Crimeware|
!"//How Blockchain Might Save Us All//"
[>img(150px,auto)[iCSA/J9RBH.jpg]]Article de blog publié le 27 septembre 2019 — Rédigé par Kurt Seifried, Chief Blockchain Officer, CSA
<<<
//I've been seeing a lot of articles claiming that Blockchain will save us from hackers, and ransomware, and all sorts of other Cyber-Shenanigans. So… will Blockchain save us all? Yes, well ... sort of, it's complicated.
Let's start with a story:

__''The evolution of web browsers''__
Web browsers. Through the 1990's and 2000's the web browser became a dominant piece of software. Through the late 2000's the dominance of JavaScript became obvious, with high speed Internet it became possible to deliver multi megabyte web pages (currently cnn.com is 1.4 megabytes, YoutTube is 1.9 and even the "lean" front page of google.com is 0.45). But the performance of running JavaScript in the web browser… well let's be honest. It was becoming awful. So awful in fact that it was beginning to impact Google, who wanted to deliver rich web pages and services using JavaScript, but… the experience was so slow and awful people were getting turned off of it. Now if you're the scale of Google the solution is simple: you engineer and release a really fast web browser with a really fast JavaScript engine (V8).
This has two main effects:
* It gives people a choice of a fast web browser and…
* It shames all the other slow web browsers into improving, or being so bad that they get left behind. 

__''…and the evolution of Blockchain''__
[>img(150px,auto)[iCSA/J7OBU.jpg]]I can't help but feel that Blockchain is sort of having the same effect. For example backups. A critical component of information security is having backups. Without backups you can't recover from an attack to a known good state very easily (even if the attacker didn't delete records did he modify any? Do you have anything to compare to?). Blockchain solves the backup problem in two simple ways: everyone has a full copy of the data if they want, and the data itself has protections that will show if it was tampered or modified. Even better I can be reasonably certain I have ALL the data and that it is up to date (it's 3am, do you know if your backups are up to date?).
When it comes to ransomware the biggest problem we see again and again is that the data that got encrypted is now effectively gone because nobody has a proper backup of it that can be recovered easily, if at all. Now to be clear I don't think we should switch every data storage medium over to some Blockchain based version (I also don't think Bitcoin is going to suddenly replace the world's banking system), but I do think we should maybe ask "why can't we have some of the benefits of Blockchain in our other data storage and processing systems?"
You can read more about Blockchain uses cases in CSA's latest research report [[here|2019.07.31 - Publication : 'Documentation of Relevant Distributed Ledger Technology and Blockchain Use Cases v2']]//
[...]
<<<
&rArr; Lire [[l'original|https://CloudSecurityAlliance.fr/go/j9rb/]] sur le blog de la CSA
!1 - Les nouveautés CSA de la semaine du 16 au 22 septembre 2019
* [>img[iCSF/cloud-security-alliance-fr.png]]Actu : Demande de validation la traduction en français de 3 documents CSA+++*[»]> <<tiddler [[2019.09.19 - Demande de validation la traduction en français de 3 documents CSA]]>>=== 
* Blog : ''CAIQ V3 Updates''+++*[»]> <<tiddler [[2019.09.17 - Blog : 'CAIQ V3 Updates']]>>=== 
* Publ : ''Consensus Assessment Initiative Questionnaire (CAIQ) v3.1''+++*[»]> <<tiddler [[2019.09.17 - Publication : 'Consensus Assessment Initiative Questionnaire (CAIQ) v3.1']]>>=== 
* Actu : Appel à commentaires sur le document ''Best Practices in Implementing a Secure Microservices Architecture''+++*[»]> <<tiddler [[2019.09.16 - Appel à commentaires, document 'Best Practices in Implementing a Secure Microservices Architecture']]>>=== 
* Blog : ''Sidechains, beacon chains and why we shouldn't give up on Blockchain performance quite yet''+++*[»]> <<tiddler [[2019.09.18 - Blog : Sidechains, beacon chains and why we shouldn't give up on Blockchain performance quite yet]]>>=== 
!2 - Veille Web
La [[Veille Web|2019.09.22 - Veille Hebdomadaire - 22 septembre]] avec plus de 70 liens :
* __''À lire'' :__ Bilan sur la ''panne Amazon S3 du 28 février 2017''+++*[»]>
|2019.09.16|Gremlin|![[The 2017 Amazon S3 Outage|https://www.gremlin.com/blog/the-2017-amazon-s-3-outage/]]|AWS Outage Lessons_Learnt|
=== 
* __''À lire'' :__ ''évaluer la sécurité de ses containers et de Kubernetes''+++*[»]>
|2019.09.18|Container Journal|![[10 Questions To Assess Your Container and Kubernetes Security|https://containerjournal.com/topics/container-security/10-questions-to-assess-your-container-and-kubernetes-security/]]|Containers Kubernetes|
=== 
* ''Alertes'' : ''goHarbor.io''+++*[»]> <<tiddler [[2019.09.30 - Alertes]]>>=== 
* Rapports et sondages : ''Virtustream''+++*[»]>
|2019.09.19|//Virtustream//|[[Services Experts to Accelerate Cloud Migrations and Drive Productivity Gains|https://www.businesswire.com/news/home/20190919005138/en/New-Research-Finds-70-Enterprises-Cloud-Managed]]|Report MSP|
|2019.09.20|//Virtustream//[>img[iCSF/flag_fr.png]]| → [[70% des entreprises font appel à des experts en service cloud managés pour accélérer les migrations|http://www.globalsecuritymag.fr/70-des-entreprises-font-appel-a,20190920,90905.html]]|Report MSP|
=== 
* Piratages et fuites de données : Erreurs de ''configurations''+++*[»]>
|2019.09.20|//PaloAlto Networks//|![[Top 3 AWS Critical Cloud Misconfigurations and How to Remediate|https://blog.paloaltonetworks.com/2019/09/cloud-aws-critical-cloud-misconfigurations/]]|AWS Misconfigurations|
|2019.09.17|Cyber Security Hub|[[Behind The Data Breach: Understanding Cloud Security And Misconfigurations|https://www.cshub.com/cloud/articles/behind-the-data-breach-understanding-cloud-security-and-misconfigurations]]|Misconfigurations|
|2019.09.16|//PaloAlto Networks//|[[Top 10 Configuration Risks or Mistakes in Amazon Web Services (AWS) Deployment|https://pupuweb.com/configuration-risks-mistakes-aws/]]|AWS Risks Misconfigurations|
=== avec l'exemple de Malindo/Lion Air (S3)+++*[»]>
|2019.09.17|Bleeping Computer|[[Millions of Lion Air Passenger Records Exposed and Exchanged on Forums|https://www.bleepingcomputer.com/news/security/millions-of-lion-air-passenger-records-exposed-and-exchanged-on-forums/]]|Data_Leak AWS_S3 Malindo|
|2019.09.18|South China Morning Post| → [[Malindo Air confirms data breach, exposing millions of passengers' personal data|https://www.scmp.com/news/asia/southeast-asia/article/3027780/malindo-air-confirms-data-breach-exposing-millions]]|Data_Leak AWS_S3 Malindo|
|2019.09.18|Malindo| → [[Press Statement on Data Breach|https://www.malindoair.com/news-events/2019/09/18/Press-Statement-on-Data-Breach]]|Data_Leak AWS_S3 Malindo|
|2019.09.19|Malindo| → [[Data breach investigation details|https://www.malindoair.com/news-events/2019/09/19/Data-breach-investigation-details]]|Data_Leak AWS_S3 Malindo|
|2019.09.19|Dark Reading| → [[Lion Air the Latest to Get Tripped Up by Misconfigured AWS S3|https://www.darkreading.com/attacks-breaches/lion-air-the-latest-to-get-tripped-up-by-misconfigured-aws-s3-/d/d-id/1335864]]|Data_Leak AWS_S3 Malindo|
|2019.09.19|InfoSecurity Mag| → [[Lion Air Breach Hits Millions of Passengers|https://www.infosecurity-magazine.com/news/lion-air-breach-hits-millions-of/]]|Data_Leak AWS_S3 Malindo|
|2019.09.20|Information Security Newspaper| → [[Lion Air Group data breach: 35 million passenger data is leaked from AWS servers|https://www.securitynewspaper.com/2019/09/20/lion-air-group-data-breach-35-million-passenger-data-is-leaked-from-aws-servers/]]|Data_Leak AWS_S3 Malindo|
|2019.09.20|ZDnet| → [[AWS says servers secure following Malindo Air data breach|https://www.zdnet.com/article/aws-says-servers-secure-following-malindo-air-data-breach/]]|Data_Leak AWS_S3 Malindo|
=== et de la fuite de données en Equateur
* Divers : Cloud et posture sécurité, annonces Oracle et Google (Anthos), conteneurs et bonnes pratiques, ..
|>|>|>|!Alerte|
|2019.09.08|MITRE|[[CVE-2019-16097|https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16097]]: ^^core/api/user.go [...] allows non-admin users to create admin accounts via the POST /api/users API^^|Harbor CVE-2019-16097|
|2019.09.18|//PaloAlto Networks//|[[Critical Vulnerability in Harbor Enables Privilege Escalation from Zero to Admin (CVE-2019-16097)|https://unit42.paloaltonetworks.com/critical-vulnerability-in-harbor-enables-privilege-escalation-from-zero-to-admin-cve-2019-16097/]]|Harbor CVE-2019-16097|
|2019.09.19|Bleeping Computer| → [[Critical Bug In Harbor Container Registry Gives Admin Access|https://www.bleepingcomputer.com/news/security/critical-bug-in-harbor-container-registry-gives-admin-access/]]|Harbor CVE-2019-16097|
|2019.09.20|GBHackers on Security| → [[Critical Vulnerability in Harbor let Hackers to Escalate Privilege by Sending Malicious Request|https://gbhackers.com/critical-vulnerability-harbor/]]|Harbor CVE-2019-16097|
|2019.09.02|Harbor|[[Disallow creating an admin user when registration #8917|https://github.com/goharbor/harbor/pull/8917]]|CVE-2019-16097 Patch|
|>|>|>|!|
|>|>|>||
|!Septembre|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2019.09.22|
|2019.09.22|nixCraft|[[Amazon Linux AMI update installed packages for security|https://www.cyberciti.biz/faq/amazon-linux-ami-update-installed-packages-for-security/]]|AWS AMI|
|2019.09.22|Kitploit|[[ArmourBird CSF - Container Security Framework|https://www.kitploit.com/2019/09/armourbird-csf-container-security.html]]|[[Tools|Outils-GitHub]] ArmourBird_CSF|
|2019.09.22|//Tripwire//|[[Building a Foundation for "Smart" Steel Factories with Fog Computing, the Cloud and Cybersecurity|https://www.tripwire.com/state-of-security/ics-security/foundation-smart-steel-factories-fog-cloud-cybersecurity/]]|Smart_Factory|
|>|>|>|!2019.09.20|
|2019.09.20|GBHackers on Security|[[How Does World's Highly Secured Google Network Works? Google's Effort & Dedication|https://gbhackers.com/google-dedicate-cyber-security/]]|Google|
|2019.09.20|Security Boulevard|[[Debunking the 5 Biggest Cloud Security Myths|https://securityboulevard.com/2019/09/debunking-the-5-biggest-cloud-security-myths/]]|Risks|
|2019.09.20|Solutions Review|[[How Do You Adapt Security When You Move to the Cloud?|https://solutionsreview.com/cloud-platforms/how-do-you-adapt-security-when-you-move-to-the-cloud/]]|Recommendations|
|2019.09.20|Redmond Channel Partner|[[Microsoft Readies Raft of Updates to Office 365 and Azure Tools|https://rcpmag.com/articles/2019/09/20/office-365-azure-tools-updates.aspx]]|O365 Azure|
|2019.09.20|IT Pro[>img[iCSF/flag_fr.png]]|[[L'adoption du Cloud va plus vite que l'évolution de la sécurité|https://www.itpro.fr/ladoption-du-cloud-va-bien-plus-vite-que-levoluti