Background: #fff
Foreground: #000
PrimaryPale: #8cf
PrimaryLight: #18f
PrimaryMid: #04b
PrimaryDark: #014
SecondaryPale: #ffc
SecondaryLight: #fe8
SecondaryMid: #db4
SecondaryDark: #841
TertiaryPale: #eee
TertiaryLight: #ccc
TertiaryMid: #999
TertiaryDark: #666
Error: #f88
<!--{{{-->
<link rel='stylesheet' href='font-awesome/css/fontawesome.min.css' />
<link rel='stylesheet' href='font-awesome/css/all.css' />
<!--}}}-->
— [[InterfaceOptions]] — [[AdvancedOptions]] —
<!--{{{-->
<div class='header' role='banner' macro='gradient vert [[ColorPalette::PrimaryDark]] [[ColorPalette::PrimaryLight]]'>
<div class='headerShadow'>
<img src="iCSF/cloud-security-alliance-fr.png" align="right"><a href='https://CloudSecurityAlliance.fr/go/Circle' target='_blank'><img src="iCSA/CircleCSA51.png" align="right"></a>
</div>
<div class='headerForeground'>
<span class='siteTitle' refresh='content' tiddler='SiteTitle'></span>&nbsp;
<span class='siteSubtitle' refresh='content' tiddler='SiteSubtitle'></span>&nbsp;
</div>
</div>
<div id='mainMenu' role='navigation' refresh='content' tiddler='MainMenu'></div>
<div id='sidebar'>
<div id='sidebarOptions' role='navigation' refresh='content' tiddler='SideBarOptions'></div>
<div id='sidebarTabs' role='complementary' refresh='content' force='true' tiddler='SideBarTabs'></div>
</div>
<div id='displayArea' role='main'>
<div id='messageArea' class='messageArea'></div>
<div style="text-align:center"><span class='HeaderMenu' refresh='content' tiddler='HeaderMenu'></span></div>
<div id='tiddlerDisplay'></div>
<div style="text-align:center"><span class='FooterNews' refresh='content' tiddler='FooterDisclaimer'></span></div>
</div>
<!--}}}-->
/*{{{*/
body {background:[[ColorPalette::Background]]; color:[[ColorPalette::Foreground]];}
a {color:[[ColorPalette::PrimaryMid]];}
a:hover {background-color:[[ColorPalette::PrimaryMid]]; color:[[ColorPalette::Background]];}
a img {border:0;}
h1,h2,h3,h4,h5,h6 {color:[[ColorPalette::SecondaryDark]]; background:transparent;}
h1 {border-bottom:2px solid [[ColorPalette::TertiaryLight]];}
h2,h3 {border-bottom:1px solid [[ColorPalette::TertiaryLight]];}
.button {color:[[ColorPalette::PrimaryDark]]; border:1px solid [[ColorPalette::Background]];}
.button:hover {color:[[ColorPalette::PrimaryDark]]; background:[[ColorPalette::SecondaryLight]]; border-color:[[ColorPalette::SecondaryMid]];}
.button:active {color:[[ColorPalette::Background]]; background:[[ColorPalette::SecondaryMid]]; border:1px solid [[ColorPalette::SecondaryDark]];}
.header {background:[[ColorPalette::PrimaryMid]];}
.headerShadow {color:[[ColorPalette::Foreground]];}
.headerShadow a {font-weight:normal; color:[[ColorPalette::Foreground]];}
.headerForeground {color:[[ColorPalette::Background]];}
.headerForeground a {font-weight:normal; color:[[ColorPalette::PrimaryPale]];}
.tabSelected {color:[[ColorPalette::PrimaryDark]];
 background:[[ColorPalette::TertiaryPale]];
 border-left:1px solid [[ColorPalette::TertiaryLight]];
 border-top:1px solid [[ColorPalette::TertiaryLight]];
 border-right:1px solid [[ColorPalette::TertiaryLight]];
}
.tabUnselected {color:[[ColorPalette::Background]]; background:[[ColorPalette::TertiaryMid]];}
.tabContents {color:[[ColorPalette::PrimaryDark]]; background:[[ColorPalette::TertiaryPale]]; border:1px solid [[ColorPalette::TertiaryLight]];}
.tabContents .button {border:0;}
#sidebar { display: none; }
/* #sidebar {} */
#sidebarOptions input {border:1px solid [[ColorPalette::PrimaryMid]];}
#sidebarOptions .sliderPanel {background:[[ColorPalette::PrimaryPale]];}
#sidebarOptions .sliderPanel a {border:none;color:[[ColorPalette::PrimaryMid]];}
#sidebarOptions .sliderPanel a:hover {color:[[ColorPalette::Background]]; background:[[ColorPalette::PrimaryMid]];}
#sidebarOptions .sliderPanel a:active {color:[[ColorPalette::PrimaryMid]]; background:[[ColorPalette::Background]];}
.wizard { background:[[ColorPalette::PrimaryPale]]; }
.wizard__title { color:[[ColorPalette::PrimaryDark]]; border:none; }
.wizard__subtitle { color:[[ColorPalette::Foreground]]; border:none; }
.wizardStep { background:[[ColorPalette::Background]]; color:[[ColorPalette::Foreground]]; }
.wizardStep.wizardStepDone {background:[[ColorPalette::TertiaryLight]];}
.wizardFooter {background:[[ColorPalette::PrimaryPale]];}
.wizardFooter .status {background:[[ColorPalette::PrimaryDark]]; color:[[ColorPalette::Background]];}
.wizard .button {color:[[ColorPalette::Foreground]]; background:[[ColorPalette::SecondaryLight]]; border: 1px solid;
 border-color:[[ColorPalette::SecondaryPale]] [[ColorPalette::SecondaryDark]] [[ColorPalette::SecondaryDark]] [[ColorPalette::SecondaryPale]];}
.wizard .button:hover {color:[[ColorPalette::Foreground]]; background:[[ColorPalette::Background]];}
.wizard .button:active {color:[[ColorPalette::Background]]; background:[[ColorPalette::Foreground]]; border: 1px solid;
 border-color:[[ColorPalette::PrimaryDark]] [[ColorPalette::PrimaryPale]] [[ColorPalette::PrimaryPale]] [[ColorPalette::PrimaryDark]];}
.wizard .notChanged {background:transparent;}
.wizard .changedLocally {background:#80ff80;}
.wizard .changedServer {background:#8080ff;}
.wizard .changedBoth {background:#ff8080;}
.wizard .notFound {background:#ffff80;}
.wizard .putToServer {background:#ff80ff;}
.wizard .gotFromServer {background:#80ffff;}
.messageArea { border:2px solid [[ColorPalette::Background]]; background:[[ColorPalette::PrimaryMid]]; color:[[ColorPalette::Background]]; }
.messageToolbar__button { color:[[ColorPalette::PrimaryMid]]; background:[[ColorPalette::SecondaryPale]]; border:none; }
.messageToolbar__button_withIcon { background:inherit; }
.messageToolbar__button_withIcon:active { background:inherit; border:none; }
.messageToolbar__icon { fill:[[ColorPalette::TertiaryDark]]; }
.messageToolbar__icon:hover { fill:[[ColorPalette::Foreground]]; }
.popupTiddler {background:[[ColorPalette::TertiaryPale]]; border:2px solid [[ColorPalette::TertiaryMid]];}
.popup {background:[[ColorPalette::TertiaryPale]]; color:[[ColorPalette::TertiaryDark]]; border-left:1px solid [[ColorPalette::TertiaryMid]]; border-top:1px solid [[ColorPalette::TertiaryMid]]; border-right:2px solid [[ColorPalette::TertiaryDark]]; border-bottom:2px solid [[ColorPalette::TertiaryDark]]; }
.popup hr {color:[[ColorPalette::PrimaryDark]]; background:[[ColorPalette::PrimaryDark]]; border-bottom:1px;}
.popup li.disabled {color:[[ColorPalette::TertiaryMid]];}
.popup li a, .popup li a:visited {color:[[ColorPalette::Foreground]]; border: none;}
.popup li a:hover {background:[[ColorPalette::SecondaryLight]]; color:[[ColorPalette::Foreground]]; border: none;}
.popup li a:active {background:[[ColorPalette::SecondaryPale]]; color:[[ColorPalette::Foreground]]; border: none;}
.popupHighlight {background:[[ColorPalette::Background]]; color:[[ColorPalette::Foreground]];}
.listBreak div {border-bottom:1px solid [[ColorPalette::TertiaryDark]];}
.tiddler .defaultCommand {font-weight:bold;}
.shadow .title {color:[[ColorPalette::TertiaryDark]];}
.title {color:[[ColorPalette::SecondaryDark]];}
.subtitle {color:[[ColorPalette::TertiaryDark]];}
.toolbar {color:[[ColorPalette::PrimaryMid]];}
.toolbar a {color:[[ColorPalette::TertiaryLight]];}
.selected .toolbar a {color:[[ColorPalette::TertiaryMid]];}
.selected .toolbar a:hover {color:[[ColorPalette::Foreground]];}
.tagging, .tagged {border:1px solid [[ColorPalette::TertiaryPale]]; background-color:[[ColorPalette::TertiaryPale]];}
.selected .tagging, .selected .tagged {background-color:[[ColorPalette::TertiaryLight]]; border:1px solid [[ColorPalette::TertiaryMid]];}
.tagging .listTitle, .tagged .listTitle {color:[[ColorPalette::PrimaryDark]];}
.tagging .button, .tagged .button {border:none;}
.footer {color:[[ColorPalette::TertiaryLight]];}
.selected .footer {color:[[ColorPalette::TertiaryMid]];}
.error, .errorButton {color:[[ColorPalette::Foreground]]; background:[[ColorPalette::Error]];}
.warning {color:[[ColorPalette::Foreground]]; background:[[ColorPalette::SecondaryPale]];}
.lowlight {background:[[ColorPalette::TertiaryLight]];}
.zoomer {background:none; color:[[ColorPalette::TertiaryMid]]; border:3px solid [[ColorPalette::TertiaryMid]];}
.imageLink, #displayArea .imageLink {background:transparent;}
.annotation {background:[[ColorPalette::SecondaryLight]]; color:[[ColorPalette::Foreground]]; border:2px solid [[ColorPalette::SecondaryMid]];}
.viewer .listTitle {list-style-type:none; margin-left:-2em;}
.viewer .button {border:1px solid [[ColorPalette::SecondaryMid]];}
.viewer blockquote {border-left:3px solid [[ColorPalette::TertiaryDark]];}
.viewer table, table.twtable {border:2px solid [[ColorPalette::TertiaryDark]];}
.viewer th, .viewer thead td, .twtable th, .twtable thead td {background:[[ColorPalette::SecondaryMid]]; border:1px solid [[ColorPalette::TertiaryDark]]; color:[[ColorPalette::Background]];}
.viewer td, .viewer tr, .twtable td, .twtable tr {border:1px solid [[ColorPalette::TertiaryDark]];}
.viewer pre {border:1px solid [[ColorPalette::SecondaryLight]]; background:[[ColorPalette::SecondaryPale]];}
.viewer code {color:[[ColorPalette::SecondaryDark]];}
.viewer hr {border:0; border-top:dashed 1px [[ColorPalette::TertiaryDark]]; color:[[ColorPalette::TertiaryDark]];}
.highlight, .marked {background:[[ColorPalette::SecondaryLight]];}
.editor input {border:1px solid [[ColorPalette::PrimaryMid]];}
.editor textarea {border:1px solid [[ColorPalette::PrimaryMid]]; width:100%;}
.editorFooter {color:[[ColorPalette::TertiaryMid]];}
.readOnly {background:[[ColorPalette::TertiaryPale]];}
#backstageArea {background:[[ColorPalette::Foreground]]; color:[[ColorPalette::TertiaryMid]];}
#backstageArea a {background:[[ColorPalette::Foreground]]; color:[[ColorPalette::Background]]; border:none;}
#backstageArea a:hover {background:[[ColorPalette::SecondaryLight]]; color:[[ColorPalette::Foreground]]; }
#backstageArea a.backstageSelTab {background:[[ColorPalette::Background]]; color:[[ColorPalette::Foreground]];}
#backstageButton a {background:none; color:[[ColorPalette::Background]]; border:none;}
#backstageButton a:hover {background:[[ColorPalette::Foreground]]; color:[[ColorPalette::Background]]; border:none;}
#backstagePanel {background:[[ColorPalette::Background]]; border-color: [[ColorPalette::Background]] [[ColorPalette::TertiaryDark]] [[ColorPalette::TertiaryDark]] [[ColorPalette::TertiaryDark]];}
.backstagePanelFooter .button {border:none; color:[[ColorPalette::Background]];}
.backstagePanelFooter .button:hover {color:[[ColorPalette::Foreground]];}
#backstageCloak {background:[[ColorPalette::Foreground]]; opacity:0.6; filter:alpha(opacity=60);}
/*}}}*/
/*{{{*/
* html .tiddler {height:1%;}
/* font-size:.75em; */
body {font-size:1em; font-family:arial,helveticahelvetica; margin:0; padding:0;}
h1,h2,h3,h4,h5,h6 {font-weight:bold; text-decoration:none;}
h1,h2,h3 {padding-bottom:1px; margin-top:1.2em;margin-bottom:0.3em;}
h4,h5,h6 {margin-top:1em;}
h1 {font-size:1.35em;}
h2 {font-size:1.25em;}
h3 {font-size:1.1em;}
h4 {font-size:1em;}
h5 {font-size:1em;}
hr {height:1px;}
a {text-decoration:none;}
dt {font-weight:bold;}
ol {list-style-type:decimal;}
ol ol {list-style-type:lower-alpha;}
ol ol ol {list-style-type:lower-roman;}
ol ol ol ol {list-style-type:decimal;}
ol ol ol ol ol {list-style-type:lower-alpha;}
ol ol ol ol ol ol {list-style-type:lower-roman;}
ol ol ol ol ol ol ol {list-style-type:decimal;}
.txtOptionInput {width:10em;}
#contentWrapper .chkOptionInput {border:0;}
.externalLink {text-decoration:underline;}
.indent {margin-left:3em;}
.outdent {margin-left:3em; text-indent:-3em;}
code.escaped {white-space:nowrap;}
.tiddlyLinkExisting {font-weight:bold;}
.tiddlyLinkNonExisting {font-style:italic;}
/* the 'a' is required for IE, otherwise it renders the whole tiddler in bold */
a.tiddlyLinkNonExisting.shadow {font-weight:bold;}
#mainMenu .tiddlyLinkExisting,
#mainMenu .tiddlyLinkNonExisting,
#sidebarTabs .tiddlyLinkNonExisting {font-weight:normal; font-style:normal;}
#sidebarTabs .tiddlyLinkExisting {font-weight:bold; font-style:normal;}
.header {position:relative;}
.header a:hover {background:transparent;}
.headerShadow {position:relative; padding:4.5em 0 1em 1em; left:-1px; top:-1px;}
.headerForeground {position:absolute; padding:4.5em 0 1em 1em; left:0; top:0;}
.siteTitle {font-size:3em;}
.siteSubtitle {font-size:1.5em;}
#mainMenu {position:absolute; left:0; width:10em; text-align:right; line-height:1.6em; padding:1.5em 0.5em 0.5em 0.5em; font-size:1.1em;}
#sidebar { display: none; }
/* #sidebar {position:absolute; right:3px; width:16em; font-size:.9em;} */
#sidebarOptions {padding-top:0.3em;}
#sidebarOptions a {margin:0 0.2em; padding:0.2em 0.3em; display:block;}
#sidebarOptions input {margin:0.4em 0.5em;}
#sidebarOptions .sliderPanel {margin-left:1em; padding:0.5em; font-size:.85em;}
#sidebarOptions .sliderPanel a {font-weight:bold; display:inline; padding:0;}
#sidebarOptions .sliderPanel input {margin:0 0 0.3em 0;}
#sidebarTabs .tabContents {width:15em; overflow:hidden;}
.wizard { padding:0.1em 2em 0; }
.wizard__title { font-size:2em; }
.wizard__subtitle { font-size:1.2em; }
.wizard__title, .wizard__subtitle { font-weight:bold; background:none; padding:0; margin:0.4em 0 0.2em; }
.wizardStep { padding:1em; }
.wizardFooter { padding:0.8em 0.4em 0.8em 0; }
.wizardFooter .status { padding:0.2em 0.7em; margin-left:0.3em; }
.wizardFooter .button { margin:0.5em 0 0; font-size:1.2em; padding:0.2em 0.5em; }
.messageArea { position:fixed; top:0; right:20em; margin:0.5em; padding:0.7em 1em; z-index:2000; }
.messageToolbar { text-align:right; padding:0.2em 0; }
.messageToolbar__button { text-decoration:underline; }
.messageToolbar__icon { height: 1em; }
.messageArea__text a { text-decoration:underline; }
.tiddlerPopupButton {padding:0.2em;}
.popupTiddler {position: absolute; z-index:300; padding:1em; margin:0;}
.popup {position:absolute; z-index:300; font-size:.9em; padding:0.3em 0; list-style:none; margin:0; padding: 0.3em 0; border: none; box-shadow: 1px 2px 5px [[ColorPalette::TertiaryMid]];}
.popup .popupMessage {padding:0.4em;}
.popup hr {display:block; height:1px; width:auto; padding:0; margin:0.2em 0;}
.popup li.disabled {padding:0.4em;}
.popup li a {display:block; padding: 0.5em 0.5em; font-weight:normal; cursor:pointer;}
.listBreak {font-size:1px; line-height:1px;}
.listBreak div {margin:2px 0;}
.tabset {padding:1em 0 0 0.5em;}
.tab {margin:0 0 0 0.25em; padding:2px;}
.tabContents {padding:0.5em;}
.tabContents ul, .tabContents ol {margin:0; padding:0;}
.txtMainTab .tabContents li {list-style:none;}
.tabContents li.listLink { margin-left:.75em;}
#contentWrapper {display:block;}
#splashScreen {display:none;}
/* 0C wide displayArea top(1)/right(17)/bottom(0)/left(14) */
#displayArea {margin:0 0 0 10em;}
.toolbar {text-align:right; font-size:.9em;}
.tiddler {padding:1em 1em 0;}
.missing .viewer,.missing .title {font-style:italic;}
.title {font-size:1.6em; font-weight:bold;}
.missing .subtitle {display:none;}
.subtitle {font-size:1.1em;}
.tiddler .button {padding:0.2em 0.4em;}
.tagging {margin:0.5em 0.5em 0.5em 0; float:left; display:none;}
.isTag .tagging {display:block;}
.tagged {margin:0.5em; float:right;}
.tagging, .tagged {font-size:0.9em; padding:0.25em;}
.tagging ul, .tagged ul {list-style:none; margin:0.25em; padding:0;}
.tagClear {clear:both;}
.footer {font-size:.9em;}
.footer li {display:inline;}
.annotation {padding:0.5em; margin:0.5em;}
* html .viewer pre {width:99%; padding:0 0 1em 0;}
.viewer {line-height:1.4em; padding-top:0.5em;}
.viewer .button {margin:0 0.25em; padding:0 0.25em;}
.viewer blockquote {line-height:1.5em; padding-left:0.8em;margin-left:2.5em;}
.viewer ul, .viewer ol {margin-left:0.5em; padding-left:1.5em;}
.viewer table, table.twtable {border-collapse:collapse; margin:0.8em 1.0em;}
.viewer th, .viewer td, .viewer tr,.viewer caption,.twtable th, .twtable td, .twtable tr,.twtable caption {padding:3px;}
table.listView {font-size:0.85em; margin:0.8em 1.0em;}
table.listView th, table.listView td, table.listView tr {padding:0 3px 0 3px;}
.viewer pre {padding:0.5em; margin-left:0.5em; font-size:1.2em; line-height:1.4em; overflow:auto;}
.viewer code {font-size:1.2em; line-height:1.4em;}
.editor {font-size:1.1em;}
.editor input, .editor textarea {display:block; width:100%; box-sizing: border-box; font:inherit;}
.editorFooter {padding:0.25em 0; font-size:.9em;}
.editorFooter .button {padding-top:0; padding-bottom:0;}
.fieldsetFix {border:0; padding:0; margin:1px 0px;}
.zoomer {font-size:1.1em; position:absolute; overflow:hidden;}
.zoomer div {padding:1em;}
* html #backstage {width:99%;}
* html #backstageArea {width:99%;}
#backstageArea {display:none; position:relative; overflow: hidden; z-index:150; padding:0.3em 0.5em;}
#backstageToolbar {position:relative;}
#backstageArea a {font-weight:bold; margin-left:0.5em; padding:0.3em 0.5em;}
#backstageButton {display:none; position:absolute; z-index:175; top:0; right:0;}
#backstageButton a {padding:0.1em 0.4em; margin:0.1em;}
#backstage {position:relative; width:100%; z-index:50;}
#backstagePanel { display:none; z-index:100; position:absolute; width:90%; margin-left:3em; }
.backstagePanelFooter {padding-top:0.2em; float:right;}
.backstagePanelFooter a {padding:0.2em 0.4em;}
#backstageCloak {display:none; z-index:20; position:absolute; width:100%; height:100px;}
.whenBackstage {display:none;}
.backstageVisible .whenBackstage {display:block;}
/*}}}*/
/*{{{*/
body {font-size:1em;}
#sidebarOptions {font-size:1.05em;}
#sidebarOptions a {font-style:normal;}
#sidebarOptions .sliderPanel {font-size:0.95em;}
.subtitle {font-size:0.8em;}
.viewer table.listView {font-size:0.95em;}
/*}}}*/
/*{{{*/
@media print {
#mainMenu, #sidebar, .messageArea, .toolbar, #backstageButton, #backstageArea {display: none !important;}
#displayArea { margin-right: 0; }
/* #displayArea {margin: 1em 1em 0em;} */
noscript {display:none;}
}
/*}}}*/
<!--{{{-->
<div class='toolbar' role='navigation' macro='toolbar [[ToolbarCommands::ViewToolbar]]'></div>
<div class='title' macro='view title'></div>
<div class='viewer' macro='view text wikified'></div>
<div class='tagClear'></div>
<!--}}}-->
/% |Author|Eric Shulman|License|http://www.TiddlyTools.com/#LegalStatements|
!show
<<tiddler {{
 var co=config.options;
 if (co.chkShowLeftSidebar===undefined) co.chkShowLeftSidebar=true;
 var mm=document.getElementById('mainMenu');
 var da=document.getElementById('displayArea');
 if (mm) {
 mm.style.display=co.chkShowLeftSidebar?'block':'none';
 da.style.marginLeft=co.chkShowLeftSidebar?'':'1em';
 }
'';}}>><html><nowiki><a href='javascript:;' title="$2"
onmouseover="
 this.href='javascript:void(eval(decodeURIComponent(%22(function(){try{('
 +encodeURIComponent(encodeURIComponent(this.onclick))
 +')()}catch(e){alert(e.description?e.description:e.toString())}})()%22)))';"
onclick="
 var co=config.options;
 var opt='chkShowLeftSidebar';
 var show=co[opt]=!co[opt];
 var mm=document.getElementById('mainMenu');
 var da=document.getElementById('displayArea');
 if (mm) {
 mm.style.display=show?'block':'none';
 da.style.marginLeft=show?'':'1em';
 }
 saveOptionCookie(opt);
 var labelShow=co.txtToggleLeftSideBarLabelShow||'&#x25BA;';
 var labelHide=co.txtToggleLeftSideBarLabelHide||'&#x25C4;';
 if (this.innerHTML==labelShow||this.innerHTML==labelHide)
 this.innerHTML=show?labelHide:labelShow;
 this.title=(show?'masquer':'montrer')+' le menu à gauche';
 var sm=document.getElementById('storyMenu');
 if (sm) config.refreshers.content(sm);
 return false;
">$1</a></html>
!end
%/<<tiddler {{
 var src='.ToggleLeftSidebar';
 src+(tiddler&&tiddler.title==src?'##info':'##show');
}} with: {{
 var co=config.options;
 var labelShow=co.txtToggleLeftSideBarLabelShow||'&#x25BA;&#x25C1;'; /%0C%/
 var labelHide=co.txtToggleLeftSideBarLabelHide||'&#x25C4;&#x25B7;'; /%0C%/
 '$1'!='$'+'1'?'$1':(co.chkShowLeftSidebar?labelHide:labelShow);
}} {{
 var tip=(config.options.chkShowLeftSidebar?'cacher':'montrer')+' le menu gauche'; /%0C%/
 '$2'!='$'+'2'?'$2':tip;
}}>>
/% |Author|Eric Shulman|License|https://www.TiddlyTools.com/#LegalStatements|
%/<html><nowiki><a href="javascript:;" title="masquer/montrer l'en-tête" /%0C%/
onmouseover="
 this.href='javascript:void(eval(decodeURIComponent(%22(function(){try{('
 +encodeURIComponent(encodeURIComponent(this.onclick))
 +')()}catch(e){alert(e.description?e.description:e.toString())}})()%22)))';"
onclick="
 var c=document.getElementById('contentWrapper'); if (!c) return;
 for (var i=0; i<c.childNodes.length; i++)
 if (hasClass(c.childNodes[i],'header')) { var h=c.childNodes[i]; break; }
 if (!h) return;
 config.options.chkHideSiteTitles=h.style.display!='none';
 h.style.display=config.options.chkHideSiteTitles?'none':'block';
 saveOptionCookie('chkHideSiteTitles');
 return false;
">&#x25b3;&#x25bc;</a></html>
/* |Author|Eric Shulman|License|http://www.TiddlyTools.com/#LegalStatements|
*/
//{{{
version.extensions.BreadcrumbsPlugin= {major: 2, minor: 1, revision: 4, date: new Date(2011,2,16)};
var defaults={
 chkShowBreadcrumbs: true,
 chkReorderBreadcrumbs: true,
 chkCreateDefaultBreadcrumbs: true,
 chkShowStartupBreadcrumbs: false,
 chkBreadcrumbsReverse: false,
 chkBreadcrumbsLimit: false,
 txtBreadcrumbsLimit: 5,
 chkBreadcrumbsLimitOpenTiddlers:false,
 txtBreadcrumbsLimitOpenTiddlers:3,
 chkBreadcrumbsHideHomeLink: false,
 chkBreadcrumbsSave: false,
 txtBreadcrumbsHomeSeparator: ' | ',
 txtBreadcrumbsCrumbSeparator: ' > '
};
for (var id in defaults) if (config.options[id]===undefined)
 config.options[id]=defaults[id];
config.macros.breadcrumbs = {
 crumbs: [], // the list of current breadcrumbs
 askMsg: "Save current breadcrumbs before clearing?\n"
 +"Press OK to save, or CANCEL to continue without saving.",
 saveMsg: 'Enter the name of a tiddler in which to save the current breadcrumbs',
 saveTitle: 'SavedBreadcrumbs',
 handler: function(place,macroName,params,wikifier,paramString,tiddler) {
 var area=createTiddlyElement(place,"span",null,"breadCrumbs",null);
 area.setAttribute("homeSep",params[0]||config.options.txtBreadcrumbsHomeSeparator);
 area.setAttribute("crumbSep",params[1]||config.options.txtBreadcrumbsCrumbSeparator);
 this.render(area);
 },
 add: function (title) {
 var thisCrumb = title;
 var ind = this.crumbs.indexOf(thisCrumb);
 if(ind === -1)
 this.crumbs.push(thisCrumb);
 else if (config.options.chkReorderBreadcrumbs)
 this.crumbs.push(this.crumbs.splice(ind,1)[0]); // reorder crumbs
 else
 this.crumbs=this.crumbs.slice(0,ind+1); // trim crumbs
 if (config.options.chkBreadcrumbsLimitOpenTiddlers)
 this.limitOpenTiddlers();
 this.refresh();
 return false;
 },
 getAreas: function() {
 var crumbAreas=[];
 // find all DIVs with classname=="breadCrumbs"
 var all=document.getElementsByTagName("*");
 for (var i=0; i<all.length; i++)
 try{ if (hasClass(all[i],"breadCrumbs")) crumbAreas.push(all[i]); } catch(e) {;}
 // or, find single DIV w/fixed ID (backward compatibility)
 var byID=document.getElementById("breadCrumbs")
 if (byID && !hasClass(byID,"breadCrumbs")) crumbAreas.push(byID);
 if (!crumbAreas.length && config.options.chkCreateDefaultBreadcrumbs) {
 // no crumbs display... create one
 var defaultArea = createTiddlyElement(null,"span",null,"breadCrumbs",null);
 defaultArea.style.display= "none";
 var targetArea= document.getElementById("tiddlerDisplay");
 targetArea.parentNode.insertBefore(defaultArea,targetArea);
 crumbAreas.push(defaultArea);
 }
 return crumbAreas;
 },
 refresh: function() {
 var crumbAreas=this.getAreas();
 for (var i=0; i<crumbAreas.length; i++) {
 crumbAreas[i].style.display = config.options.chkShowBreadcrumbs?"inline":"none";
 removeChildren(crumbAreas[i]);
 this.render(crumbAreas[i]);
 }
 },
 render: function(here) {
 var co=config.options; var out=""
 if (!co.chkBreadcrumbsHideHomeLink) {
 createTiddlyButton(here,"Accueil",null,this.home,"tiddlyLink tiddlyLinkExisting");
 out+=here.getAttribute("homeSep")||config.options.txtBreadcrumbsHomeSeparator;
 }
 for (c=0; c<this.crumbs.length; c++) // remove non-existing tiddlers from crumbs
 if (!store.tiddlerExists(this.crumbs[c]) && !store.isShadowTiddler(this.crumbs[c]))
 this.crumbs.splice(c,1);
 var count=this.crumbs.length;
 if (co.chkBreadcrumbsLimit && co.txtBreadcrumbsLimit<count) count=co.txtBreadcrumbsLimit;
 var list=[];
 for (c=this.crumbs.length-count; c<this.crumbs.length; c++) list.push('[['+this.crumbs[c]+']]');
 if (co.chkBreadcrumbsReverse) list.reverse();
 out+=list.join(here.getAttribute("crumbSep")||config.options.txtBreadcrumbsCrumbSeparator);
 wikify(out,here);
 },
 home: function() {
 var cmb=config.macros.breadcrumbs;
 if (config.options.chkBreadcrumbsSave && confirm(cmb.askMsg)) cmb.saveCrumbs();
 story.closeAllTiddlers(); restart();
 cmb.crumbs = []; var crumbAreas=cmb.getAreas();
 for (var i=0; i<crumbAreas.length; i++) crumbAreas[i].style.display = "none";
 return false;
 },
 saveCrumbs: function() {
 var tid=prompt(this.saveMsg,this.saveTitle); if (!tid||!tid.length) return; // cancelled by user
 var t=store.getTiddler(tid);
 if(t && !confirm(config.messages.overwriteWarning.format([tid]))) return;
 var who=config.options.txtUserName;
 var when=new Date();
 var text='[['+this.crumbs.join(']]\n[[')+']]';
 var tags=t?t.tags:[]; tags.pushUnique('story');
 var fields=t?t.fields:{};
 store.saveTiddler(tid,tid,text,who,when,tags,fields);
 story.displayTiddler(null,tid);
 story.refreshTiddler(tid,null,true);
 displayMessage(tid+' has been '+(t?'updated':'created'));
 },
 limitOpenTiddlers: function() {
 var limit=config.options.txtBreadcrumbsLimitOpenTiddlers; if (limit<1) limit=1;
 for (c=this.crumbs.length-1; c>=0; c--) {
 var tid=this.crumbs[c];
 var elem=story.getTiddler(tid);
 if (elem) { // tiddler is displayed
 if (limit <=0) { // display limit has been reached
 if (elem.getAttribute("dirty")=="true") { // tiddler is being edited
 var msg= "'"+tid+"' is currently being edited.\n\n"
 +"Press OK to save and close this tiddler\n"
 +"or press Cancel to leave it opened";
 if (confirm(msg)) {
 story.closeTiddler(tid);
 }
 }
 else story.closeTiddler(this.crumbs[c]);
 }
 limit--;
 }
 }
 }
};
//}}}
// // PreviousTiddler ('back') command and macro
//{{{
config.commands.previousTiddler = {
 text: 'back',
 tooltip: 'view the previous tiddler',
 handler: function(event,src,title) {
 var crumbs=config.macros.breadcrumbs.crumbs;
 if (crumbs.length<2) config.macros.breadcrumbs.home();
 else story.displayTiddler(story.findContainingTiddler(src),crumbs[crumbs.length-2]);
 return false;
 }
};
config.macros.previousTiddler= {
 label: 'back',
 prompt: 'view the previous tiddler',
 handler: function(place,macroName,params,wikifier,paramString,tiddler) {
 var label=params.shift(); if (!label) label=this.label;
 var prompt=params.shift(); if (!prompt) prompt=this.prompt;
 createTiddlyButton(place,label,prompt,function(ev){
 return config.commands.previousTiddler.handler(ev,this)
 });
 }
}//}}}
// // HIJACKS
//{{{
// update crumbs when a tiddler is displayed
if (Story.prototype.breadCrumbs_coreDisplayTiddler==undefined)
 Story.prototype.breadCrumbs_coreDisplayTiddler=Story.prototype.displayTiddler;
Story.prototype.displayTiddler = function(srcElement,tiddler) {
 var title=(tiddler instanceof Tiddler)?tiddler.title:tiddler;
 this.breadCrumbs_coreDisplayTiddler.apply(this,arguments);
 if (!startingUp || config.options.chkShowStartupBreadcrumbs)
 config.macros.breadcrumbs.add(title);
}
// update crumbs when a tiddler is deleted
if (TiddlyWiki.prototype.breadCrumbs_coreRemoveTiddler==undefined)
 TiddlyWiki.prototype.breadCrumbs_coreRemoveTiddler=TiddlyWiki.prototype.removeTiddler;
TiddlyWiki.prototype.removeTiddler= function() {
 this.breadCrumbs_coreRemoveTiddler.apply(this,arguments);
 config.macros.breadcrumbs.refresh();
}
//}}}
/* |Author|Eric Shulman|License|http://www.TiddlyTools.com/#LegalStatements|
!Configuration
<<<
<<option chkDisableWikiLinks>> Disable ALL automatic WikiWord tiddler links
<<option chkAllowLinksFromShadowTiddlers>> ... except for WikiWords //contained in// shadow tiddlers
<<option chkDisableNonExistingWikiLinks>> Disable automatic WikiWord links for non-existing tiddlers
Disable automatic WikiWord links for words listed in: <<option txtDisableWikiLinksList>>
Disable automatic WikiWord links for tiddlers tagged with: <<option txtDisableWikiLinksTag>>
<<<
!Code
*/
//{{{
version.extensions.DisableWikiLinksPlugin= {major: 1, minor: 6, revision: 0, date: new Date(2008,7,22)};
if (config.options.chkDisableNonExistingWikiLinks==undefined) config.options.chkDisableNonExistingWikiLinks= false;
if (config.options.chkDisableWikiLinks==undefined) config.options.chkDisableWikiLinks=false;
if (config.options.txtDisableWikiLinksList==undefined) config.options.txtDisableWikiLinksList="DisableWikiLinksList";
if (config.options.chkAllowLinksFromShadowTiddlers==undefined) config.options.chkAllowLinksFromShadowTiddlers=true;
if (config.options.txtDisableWikiLinksTag==undefined) config.options.txtDisableWikiLinksTag="excludeWikiWords";
// find the formatter for wikiLink and replace handler with 'pass-thru' rendering
initDisableWikiLinksFormatter();
function initDisableWikiLinksFormatter() {
 for (var i=0; i<config.formatters.length && config.formatters[i].name!="wikiLink"; i++);
 config.formatters[i].coreHandler=config.formatters[i].handler;
 config.formatters[i].handler=function(w) {
  // supress any leading "~" (if present)
  var skip=(w.matchText.substr(0,1)==config.textPrimitives.unWikiLink)?1:0;
  var title=w.matchText.substr(skip);
  var exists=store.tiddlerExists(title);
  var inShadow=w.tiddler && store.isShadowTiddler(w.tiddler.title);
  // check for excluded Tiddler
  if (w.tiddler && w.tiddler.isTagged(config.options.txtDisableWikiLinksTag))
   { w.outputText(w.output,w.matchStart+skip,w.nextMatch); return; }
  // check for specific excluded wiki words
  var t=store.getTiddlerText(config.options.txtDisableWikiLinksList);
  if (t && t.length && t.indexOf(w.matchText)!=-1)
   { w.outputText(w.output,w.matchStart+skip,w.nextMatch); return; }
  // if not disabling links from shadows (default setting)
  if (config.options.chkAllowLinksFromShadowTiddlers && inShadow)
   return this.coreHandler(w);
  // check for non-existing non-shadow tiddler
  if (config.options.chkDisableNonExistingWikiLinks && !exists)
   { w.outputText(w.output,w.matchStart+skip,w.nextMatch); return; }
  // if not enabled, just do standard WikiWord link formatting
  if (!config.options.chkDisableWikiLinks)
   return this.coreHandler(w);
  // just return text without linking
  w.outputText(w.output,w.matchStart+skip,w.nextMatch)
 }
}
Tiddler.prototype.coreAutoLinkWikiWords = Tiddler.prototype.autoLinkWikiWords;
Tiddler.prototype.autoLinkWikiWords = function()
{
 if (!config.options.chkDisableWikiLinks)
  return this.coreAutoLinkWikiWords.apply(this,arguments);
 return false;
}
Tiddler.prototype.disableWikiLinks_changed = Tiddler.prototype.changed;
Tiddler.prototype.changed = function()
{
 this.disableWikiLinks_changed.apply(this,arguments);
 var t=store.getTiddlerText(config.options.txtDisableWikiLinksList,"").readBracketedList();
 if (t.length) for (var i=0; i<t.length; i++)
  if (this.links.contains(t[i]))
   this.links.splice(this.links.indexOf(t[i]),1);
};
//}}}
/* |Author|Yakov Litvin|Forked from|[[abego.ForEachTiddlerPlugin|http://tiddlywiki.abego-software.de/#ForEachTiddlerPlugin]], by Udo Borkowski| */
//{{{
(function(){
// Only install once
if (version.extensions.ForEachTiddlerPlugin) {
 alert("Warning: more than one copy of ForEachTiddlerPlugin is set to be launched");
 return;
} else
 version.extensions.ForEachTiddlerPlugin = {
  source: "[repository url here]",
  licence: "[licence url here]",
  copyright: "Copyright (c) Yakov Litvin, 2012 [url of the meta page]"
 };
config.macros.forEachTiddler = {
 actions: {
  addToList: {},
  write: {}
 }
};
config.macros.forEachTiddler.handler = function(place,macroName,params,wikifier,paramString,tiddler) {
 var parsedParams = this.parseParams(params);
 if (parsedParams.errorText) {
  this.handleError(place, parsedParams.errorText);
  return;
 }//else
  parsedParams.place = place;
  parsedParams.inTiddler = tiddler? tiddler : getContainingTiddler(place);
 parsedParams.actionName = parsedParams.actionName ? parsedParams.actionName : "addToList";
 var actionName = parsedParams.actionName;
 var action = this.actions[actionName];
 if (!action) {
  this.handleError(place, "Unknown action '"+actionName+"'.");
  return;
 }
 var element = document.createElement(action.element);
 jQuery(element).attr({ refresh: "macro", macroName: macroName }).data(parsedParams);
 place.appendChild(element);
 this.refresh(element);
};
config.macros.forEachTiddler.refresh = function(element) {
 var parsedParams = jQuery(element).data(),
  action = this.actions[parsedParams.actionName];
 jQuery(element).empty();
 try {
  var tiddlersAndContext = this.getTiddlersAndContext(parsedParams);
  action.handler(element, tiddlersAndContext.tiddlers,
    parsedParams.actionParameter, tiddlersAndContext.context);
 } catch (e) {
  this.handleError(place, e);
 }
};
config.macros.forEachTiddler.getTiddlersAndContext = function(parameter) {
 var context = config.macros.forEachTiddler.createContext(parameter.place, parameter.filter, parameter.whereClause, parameter.sortClause, parameter.sortAscending, parameter.actionName, parameter.actionParameter, parameter.scriptText, parameter.tiddlyWikiPath, parameter.inTiddler);
 var tiddlyWiki = parameter.tiddlyWikiPath ? this.loadTiddlyWiki(parameter.tiddlyWikiPath) : store;
 context["tiddlyWiki"] = tiddlyWiki;
 var tiddlers = this.findTiddlers(parameter.filter, parameter.whereClause, context, tiddlyWiki);
 context["tiddlers"] = tiddlers;
 if (parameter.sortClause)
  this.sortTiddlers(tiddlers, parameter.sortClause, parameter.sortAscending, context);
 return {tiddlers: tiddlers, context: context};
};
config.macros.forEachTiddler.actions.addToList.element = "ul";
config.macros.forEachTiddler.actions.addToList.handler = function(place, tiddlers, parameter, context) {
 var p = 0;
 if (parameter.length > p) {
  config.macros.forEachTiddler.createExtraParameterErrorElement(place, "addToList", parameter, p);
  return;
 }
 for (var i = 0; i < tiddlers.length; i++) {
  var tiddler = tiddlers[i];
  var listItem = document.createElement("li");
  place.appendChild(listItem);
  createTiddlyLink(listItem, tiddler.title, true);
 }
};
var parseNamedParameter = function(name, parameter, i) {
 var beginExpression = null;
 if ((i < parameter.length) && parameter[i] == name) {
  i++;
  if (i >= parameter.length) {
   throw "Missing text behind '%0'".format([name]);
  }
  return config.macros.forEachTiddler.paramEncode(parameter[i]);
 }
 return null;
}
config.macros.forEachTiddler.actions.write.element = "span";
config.macros.forEachTiddler.actions.write.handler = function(place, tiddlers, parameter, context) {
 var p = 0;
 if (p >= parameter.length) {
  this.handleError(place, "Missing expression behind 'write'.");
  return;
 }
 var textExpression = config.macros.forEachTiddler.paramEncode(parameter[p]);
 p++;
 var beginExpression = parseNamedParameter("begin", parameter, p);
 if (beginExpression !== null)
  p += 2;
 var endExpression = parseNamedParameter("end", parameter, p);
 if (endExpression !== null)
  p += 2;
 var noneExpression = parseNamedParameter("none", parameter, p);
 if (noneExpression !== null)
  p += 2;
 var filename = null;
 var lineSeparator = undefined;
 if ((p < parameter.length) && parameter[p] == "toFile") {
  p++;
  if (p >= parameter.length) {
   this.handleError(place, "Filename expected behind 'toFile' of 'write' action.");
   return;
  }
  filename = config.macros.forEachTiddler.getLocalPath(config.macros.forEachTiddler.paramEncode(parameter[p]));
  p++;
  if ((p < parameter.length) && parameter[p] == "withLineSeparator") {
   p++;
   if (p >= parameter.length) {
    this.handleError(place, "Line separator text expected behind 'withLineSeparator' of 'write' action.");
    return;
   }
   lineSeparator = config.macros.forEachTiddler.paramEncode(parameter[p]);
   p++;
  }
 }
 if (parameter.length > p) {
  config.macros.forEachTiddler.createExtraParameterErrorElement(place, "write", parameter, p);
  return;
 }
 var func = config.macros.forEachTiddler.getEvalTiddlerFunction(textExpression, context);
 var count = tiddlers.length;
 var text = "";
 if (count > 0 && beginExpression)
  text += config.macros.forEachTiddler.getEvalTiddlerFunction(beginExpression, context)(undefined, context, count, undefined);
 for (var i = 0; i < count; i++) {
  var tiddler = tiddlers[i];
  text += func(tiddler, context, count, i);
 }
 if (count > 0 && endExpression)
  text += config.macros.forEachTiddler.getEvalTiddlerFunction(endExpression, context)(undefined, context, count, undefined);
 if (count == 0 && noneExpression)
  text += config.macros.forEachTiddler.getEvalTiddlerFunction(noneExpression, context)(undefined, context, count, undefined);
 if (filename) {
  if (lineSeparator !== undefined) {
   lineSeparator = lineSeparator.replace(/\\n/mg, "\n").replace(/\\r/mg, "\r");
   text = text.replace(/\n/mg,lineSeparator);
  }
  saveFile(filename, convertUnicodeToUTF8(text));
 } else
  wikify(text, place, null/* highlightRegExp */, context.inTiddler);
};
config.macros.forEachTiddler.parseParams = function(params) {
 var i = 0; // index running over the params
 var tiddlyWikiPath = undefined;
 if ((i < params.length) && params[i] == "in") {
  i++;
  if (i >= params.length)
   return { errorText: "TiddlyWiki path expected behind 'in'." };
  tiddlyWikiPath = this.paramEncode((i < params.length) ? params[i] : "");
  i++;
 }
 if ((i < params.length) && params[i] == "filter") {
  i++;
  var filter = (i < params.length) ? params[i] : undefined;
  i++;
 }
 var whereClause ="true";
 if ((i < params.length) && params[i] == "where") {
  i++;
  whereClause = this.paramEncode((i < params.length) ? params[i] : "");
  i++;
 }
 var sortClause = null;
 var sortAscending = true;
 if ((i < params.length) && params[i] == "sortBy") {
  i++;
  if (i >= params.length)
   return { errorText: "sortClause missing behind 'sortBy'." };
  sortClause = this.paramEncode(params[i]);
  i++;
  if ((i < params.length) && (params[i] == "ascending" || params[i] == "descending")) {
    sortAscending = params[i] == "ascending";
    i++;
  }
 }
 var scriptText = null;
 if ((i < params.length) && params[i] == "script") {
  i++;
  scriptText = this.paramEncode((i < params.length) ? params[i] : "");
  i++;
 }
 var actionName = "addToList";
 if (i < params.length) {
  if (!config.macros.forEachTiddler.actions[params[i]])
   return { errorText: "Unknown action '"+params[i]+"'." };
  else {
   actionName = params[i];
   i++;
  }
 }
 var actionParameter = params.slice(i);
 return {
   filter:   filter,
   whereClause:  whereClause,
   sortClause:  sortClause,
   sortAscending:  sortAscending,
   actionName:  actionName,
   actionParameter: actionParameter,
   scriptText:  scriptText,
   tiddlyWikiPath:  tiddlyWikiPath
  }
};
var getContainingTiddler = function(e) {
 while(e && !hasClass(e,"tiddler"))
  e = e.parentNode;
 var title = e ? e.getAttribute("tiddler") : null;
 return title ? store.getTiddler(title) : null;
};
config.macros.forEachTiddler.createContext = function(placeParam, filterParam, whereClauseParam, sortClauseParam, sortAscendingParam, actionNameParam, actionParameterParam, scriptText, tiddlyWikiPathParam, inTiddlerParam) {
 return {
  place  : placeParam,
  filter  : filterParam,
  whereClause : whereClauseParam,
  sortClause : sortClauseParam,
  sortAscending : sortAscendingParam,
  script  : scriptText,
  actionName : actionNameParam,
  actionParameter : actionParameterParam,
  tiddlyWikiPath : tiddlyWikiPathParam,
  inTiddler : inTiddlerParam, // the tiddler containing the <<forEachTiddler ...>> macro call.
  viewerTiddler : getContainingTiddler(placeParam) //the tiddler showing the forEachTiddler result
 };
};
config.macros.forEachTiddler.loadTiddlyWiki = function(path, idPrefix) {
 if (!idPrefix) {
  idPrefix = "store";
 }
 var lenPrefix = idPrefix.length;
 var content = loadFile(this.getLocalPath(path));
 if(content === null) {
  throw "TiddlyWiki '"+path+"' not found.";
 }
 var tiddlyWiki = new TiddlyWiki();
 if (!tiddlyWiki.importTiddlyWiki(content))
  throw "File '"+path+"' is not a TiddlyWiki.";
 tiddlyWiki.dirty = false;
 return tiddlyWiki;
};
config.macros.forEachTiddler.getEvalTiddlerFunction = function (javaScriptExpression, context) {
 var script = context["script"];
 var functionText = "var theFunction = function(tiddler, context, count, index) { return "+javaScriptExpression+"}";
 var fullText = (script ? script+";" : "")+functionText+";theFunction;";
 return eval(fullText);
};
config.macros.forEachTiddler.findTiddlers = function(filter, whereClause, context, tiddlyWiki) {
 var result = [];
 var func = config.macros.forEachTiddler.getEvalTiddlerFunction(whereClause, context);
 if(filter) {
  var tids = tiddlyWiki.filterTiddlers(filter);
  for(var i = 0; i < tids.length; i++)
   if(func(tids[i], context, undefined, undefined))
    result.push(tids[i]);
 } else
  tiddlyWiki.forEachTiddler(function(title,tiddler) {
   if(func(tiddler, context, undefined, undefined))
    result.push(tiddler);
  });
 return result;
};
config.macros.forEachTiddler.sortAscending = function(tiddlerA, tiddlerB) {
 return ((tiddlerA.forEachTiddlerSortValue == tiddlerB.forEachTiddlerSortValue)
   ? 0
   : ((tiddlerA.forEachTiddlerSortValue < tiddlerB.forEachTiddlerSortValue)
    ? -1
    : +1))
};
config.macros.forEachTiddler.sortDescending = function(tiddlerA, tiddlerB) {
 return ((tiddlerA.forEachTiddlerSortValue == tiddlerB.forEachTiddlerSortValue)
   ? 0
   : ((tiddlerA.forEachTiddlerSortValue < tiddlerB.forEachTiddlerSortValue)
    ? +1
    : -1))
};
config.macros.forEachTiddler.sortTiddlers = function(tiddlers, sortClause, ascending, context) {
 var func = config.macros.forEachTiddler.getEvalTiddlerFunction(sortClause, context);
 var count = tiddlers.length;
 var i;
 for (i = 0; i < count; i++) {
  var tiddler = tiddlers[i];
  tiddler.forEachTiddlerSortValue = func(tiddler,context, undefined, undefined);
 }
 tiddlers.sort(ascending ? this.sortAscending : this.sortDescending);
 for (i = 0; i < tiddlers.length; i++)
  delete tiddlers[i].forEachTiddlerSortValue;
};
config.macros.forEachTiddler.createErrorElement = function(place, exception) {
 var message = (exception.description) ? exception.description : exception.toString();
 return createTiddlyElement(place,"span",null,"forEachTiddlerError","<<forEachTiddler ...>>: "+message);
};
config.macros.forEachTiddler.handleError = function(place, exception) {
 if (place) {
  this.createErrorElement(place, exception);
 } else {
  throw exception;
 }
};
config.macros.forEachTiddler.createExtraParameterErrorElement = function(place, actionName, parameter, firstUnusedIndex) {
 var message = "Extra parameter behind '"+actionName+"':";
 for (var i = firstUnusedIndex; i < parameter.length; i++) {
  message += " "+parameter[i];
 }
 this.handleError(place, message);
};
config.macros.forEachTiddler.paramEncode = function(s) {
 var reGTGT = new RegExp("\\$\\)\\)","mg");
 var reGT = new RegExp("\\$\\)","mg");
 return s.replace(reGTGT, ">>").replace(reGT, ">");
};
config.macros.forEachTiddler.getLocalPath = function(originalPath) {
 var originalAbsolutePath = originalPath;
 if(originalAbsolutePath.search(/^((http(s)?)|(file)):/) != 0) {
  if (originalAbsolutePath.search(/^(.\:\\)|(\\\\)|(\/)/) != 0){// is relative?
   var currentUrl = document.location.toString();
   var currentPath = (currentUrl.lastIndexOf("/") > -1) ?
    currentUrl.substr(0, currentUrl.lastIndexOf("/") + 1) :
    currentUrl + "/";
   originalAbsolutePath = currentPath + originalAbsolutePath;
  } else
   originalAbsolutePath = "file://" + originalAbsolutePath;
  originalAbsolutePath = originalAbsolutePath.replace(/\\/mg,"/");
 }
 return getLocalPath(originalAbsolutePath);
};
setStylesheet(
 ".forEachTiddlerError{color: #ffffff;background-color: #880000;}",
 "forEachTiddler");
config.macros.fet = config.macros.forEachTiddler;
String.prototype.startsWith = function(prefix) {
 var n = prefix.length;
 return (this.length >= n) && (this.slice(0, n) == prefix);
};
String.prototype.endsWith = function(suffix) {
 var n = suffix.length;
 return (this.length >= n) && (this.right(n) == suffix);
};
String.prototype.contains = function(substring) {
 return this.indexOf(substring) >= 0;
};
})();
Tiddler.prototype.getSlice = function(sliceName,defaultText) {
 var re = TiddlyWiki.prototype.slicesRE;
 re.lastIndex = 0;
 var m = re.exec(this.text);
 while(m) {
  if(m[2]) {
   if(m[2] == sliceName)
    return m[3];
  } else {
   if(m[5] == sliceName)
    return m[6];
  }
  m = re.exec(this.text);
 }
 return defaultText;
};
Tiddler.prototype.getSection = function(sectionName,defaultText) {
 var beginSectionRegExp = new RegExp("(^!{1,6}[ \t]*" + sectionName.escapeRegExp() + "[ \t]*\n)","mg"),
  sectionTerminatorRegExp = /^!/mg;
 var match = beginSectionRegExp.exec(this.text), sectionText;
 if(match) {
  sectionText = this.text.substr(match.index+match[1].length);
  match = sectionTerminatorRegExp.exec(sectionText);
  if(match)
   sectionText = sectionText.substr(0,match.index-1); // don't include final \n
  return sectionText
 }
 return defaultText;
};
//}}}
/* |Author|SaqImtiaz|Version|1.11|0C_Tuned| */
//{{{
config.hoverMenu={};
config.hoverMenu.settings={ align: 'right', x: 4, y: 100 };
config.hoverMenu.handler=function()
{
  var theMenu = createTiddlyElement(document.getElementById("contentWrapper"), "div","hoverMenu");
  theMenu.setAttribute("refresh","content");
  theMenu.setAttribute("tiddler","HoverMenu");
  var menuContent = store.getTiddlerText("HoverMenu");
  wikify(menuContent,theMenu);
        var Xloc = this.settings.x;
        Yloc =this.settings.y;
        var ns = (navigator.appName.indexOf("Netscape") != -1);
        function SetMenu(id)
   {
   var GetElements=document.getElementById?document.getElementById(id):document.all?document.all[id]:document.layers[id];
   if(document.layers)GetElements.style=GetElements;
   GetElements.sP=function(x,y){this.style[config.hoverMenu.settings.align]=x +"px";this.style.top=y +"px";};
   GetElements.x = Xloc;
   GetElements.y = findScrollY();
   GetElements.y += Yloc;
   return GetElements;
   }
  window.LoCate_XY=function()
   {
   var pY =  findScrollY();
   ftlObj.y += (pY + Yloc - ftlObj.y)/15;
   ftlObj.sP(ftlObj.x, ftlObj.y);
   setTimeout("LoCate_XY()", 10);
   }
  ftlObj = SetMenu("hoverMenu");
   LoCate_XY();
};
window.old_lewcid_hovermenu_restart = restart;
restart = function()
{
  window.old_lewcid_hovermenu_restart();
  config.hoverMenu.handler();
};
setStylesheet(
"#hoverMenu .button, #hoverMenu .tiddlyLink {border:none; background:#008; color:#fff; padding:0 20px; float:right; margin-bottom:5px;}\sn"+
"#hoverMenu .button:hover, #hoverMenu .tiddlyLink:hover {border:none; color:#fff; background:#00f; padding:0 20px; float:right; margin-bottom:5px;}\sn"+
"#hoverMenu .button {width:100%; text-align:center}"+
"#hoverMenu { position:absolute; width:10px;}\sn"+
"\sn","hoverMenuStyles");
config.macros.renameButton={};
config.macros.renameButton.handler = function(place,macroName,params,wikifier,paramString,tiddler)
{
  if (place.lastChild.tagName!="BR")
       {
  place.lastChild.firstChild.data = params[0];
  if (params[1]) {place.lastChild.title = params[1];}
       }
};
config.shadowTiddlers["HoverMenu"]="<<top>><<jump ≡→ '' top>>[[CCM]]^^[[CCSK]]^^^^[[CAIQ]]^^^^[[Agenda]]^^^^[[Hebdo|Newsletters]]^^^^[[Outils]]^^^^[[Veille|Veille Web]]^^";
config.macros.top={};
config.macros.top.handler=function(place,macroName)
{ createTiddlyButton(place,"→↑↑","↑ Haut de page ↑",this.onclick); }
config.macros.top.onclick=function()
{ window.scrollTo(0,0); };
config.commands.top =
{ text:" ^ ", tooltip:"^ Haut de page ^" };
config.commands.top.handler = function(event,src,title)
{ window.scrollTo(0,0); }

config.macros.jump= {};
config.macros.jump.handler = function (place,macroName,params,wikifier,paramString,tiddler)
{
 var label = (params[0] && params[0]!=".")? params[0]: 'jump';
 var tooltip = (params[1] && params[1]!=".")? params[1]: '→ Aller vers un article déjà ouvert';
 var top = (params[2] && params[2]=='top') ? true: false;
 var btn =createTiddlyButton(place,label,tooltip,this.onclick);
 if (top==true)
       btn.setAttribute("top","true")
}
config.macros.jump.onclick = function(e)
{
 if (!e) var e = window.event;
 var theTarget = resolveTarget(e);
 var top = theTarget.getAttribute("top");
 var popup = Popup.create(this);
 if(popup)
  {
   if(top=="true")
    {createTiddlyButton(createTiddlyElement(popup,"li"),'↑ Tout en Haut ↑','→ Aller tout en haut de cette page',config.macros.jump.top);
     createTiddlyElement(popup,"hr");}

  story.forEachTiddler(function(title,element) {
   createTiddlyLink(createTiddlyElement(popup,"li"),title,true);
   });
  }
 Popup.show(popup,false);
 e.cancelBubble = true;
 if (e.stopPropagation) e.stopPropagation();
 return false;
}
config.macros.jump.top = function()
{
       window.scrollTo(0,0);
}

Popup.show = function(unused,slowly)
{
var curr = Popup.stack[Popup.stack.length-1];
 var rootLeft = findPosX(curr.root);
 var rootTop = findPosY(curr.root);
 var rootHeight = curr.root.offsetHeight;
 var popupLeft = rootLeft;
 var popupTop = rootTop + rootHeight;
 var popupWidth = curr.popup.offsetWidth;
 var winWidth = findWindowWidth();
 if (isChild(curr.root,'hoverMenu'))
       var x = config.hoverMenu.settings.x;
 else
       var x = 0;
 if(popupLeft + popupWidth+x > winWidth)
  popupLeft = winWidth - popupWidth -x;
 if (isChild(curr.root,'hoverMenu'))
    {curr.popup.style.right = x + "px";}
 else
  curr.popup.style.left = popupLeft + "px";
 curr.popup.style.top = popupTop + "px";
 curr.popup.style.display = "block";
 addClass(curr.root,"highlight");
 if(config.options.chkAnimate)
  anim.startAnimating(new Scroller(curr.popup,slowly));
 else
  window.scrollTo(0,ensureVisible(curr.popup));
}
window.isChild = function(e,parentId) {
 while (e != null) {
  var parent = document.getElementById(parentId);
  if (parent == e) return true;
  e = e.parentNode;
  }
 return false;
};
//}}}
/* |Author|Eric Shulman|License|http://www.TiddlyTools.com/#LegalStatements|
!Configuration
<<<
Use {{{<hide linebreaks>}}} within HTML content to wiki-style rendering of line breaks. To //always// omit all line breaks from the rendered output, you can set this option:
><<option chkHTMLHideLinebreaks>> ignore all line breaks
which can also be 'hard coded' into your document by adding the following to a tiddler, tagged with <<tag systemConfig>>
>{{{config.options.chkHTMLHideLinebreaks=true;}}}
<<<
!Code
*/
//{{{
version.extensions.HTMLFormattingPlugin= {major: 2, minor: 4, revision: 1, date: new Date(2010,5,7)};
// find the formatter for HTML and replace the handler
initHTMLFormatter();
function initHTMLFormatter()
{
 for (var i=0; i<config.formatters.length && config.formatters[i].name!="html"; i++);
 if (i<config.formatters.length) config.formatters[i].handler=function(w) {
  if (!this.lookaheadRegExp)
   this.lookaheadRegExp = new RegExp(this.lookahead,"mg");
  this.lookaheadRegExp.lastIndex = w.matchStart;
  var lookaheadMatch = this.lookaheadRegExp.exec(w.source)
  if(lookaheadMatch && lookaheadMatch.index == w.matchStart) {
   var html=lookaheadMatch[1];
   // if <nowiki> is present, just let browser handle it!
   if (html.indexOf('<nowiki>')!=-1)
    createTiddlyElement(w.output,"span").innerHTML=html;
   else {
    // if <hide linebreaks> is present, or chkHTMLHideLinebreaks is set
    // suppress wiki-style literal handling of newlines
    if (config.options.chkHTMLHideLinebreaks||(html.indexOf('<hide linebreaks>')!=-1))
     html=html.replace(/\n/g,' ');
    // remove all \r's added by IE textarea and mask newlines and macro brackets
    html=html.replace(/\r/g,'').replace(/\n/g,'\\n').replace(/<</g,'%%(').replace(/>>/g,')%%');
    // create span, let browser parse HTML
    var e=createTiddlyElement(w.output,"span"); e.innerHTML=html;
    // then re-render text nodes as wiki-formatted content
    wikifyTextNodes(e,w);
   }
   w.nextMatch = this.lookaheadRegExp.lastIndex; // continue parsing
  }
 }
}
// wikify #text nodes that remain after HTML content is processed (pre-order recursion)
function wikifyTextNodes(theNode,w)
{
 function unmask(s) { return s.replace(/\%%\(/g,'<<').replace(/\)\%%/g,'>>').replace(/\\n/g,'\n'); }
 switch (theNode.nodeName.toLowerCase()) {
  case 'style': case 'option': case 'select':
   theNode.innerHTML=unmask(theNode.innerHTML);
   break;
  case 'textarea':
   theNode.value=unmask(theNode.value);
   break;
  case '#text':
   var txt=unmask(theNode.nodeValue);
   var newNode=createTiddlyElement(null,"span");
   theNode.parentNode.replaceChild(newNode,theNode);
   wikify(txt,newNode,highlightHack,w.tiddler);
   break;
  default:
   for (var i=0;i<theNode.childNodes.length;i++)
    wikifyTextNodes(theNode.childNodes.item(i),w); // recursion
   break;
 }
}
//}}}
/* |Author|Eric Shulman|License|http://www.TiddlyTools.com/#LegalStatements|
!Code
*/
//{{{
version.extensions.ImageSizePlugin= {major: 1, minor: 2, revision: 2, date: new Date(2010,7,24)};
//}}}
//{{{
var f=config.formatters[config.formatters.findByField("name","image")];
f.match="\\[[<>]?[Ii][Mm][Gg](?:\\([^,]*,[^\\)]*\\))?\\[";
f.lookaheadRegExp=/\[([<]?)(>?)[Ii][Mm][Gg](?:\(([^,]*),([^\)]*)\))?\[(?:([^\|\]]+)\|)?([^\[\]\|]+)\](?:\[([^\]]*)\])?\]/mg;
f.handler=function(w) {
 this.lookaheadRegExp.lastIndex = w.matchStart;
 var lookaheadMatch = this.lookaheadRegExp.exec(w.source)
 if(lookaheadMatch && lookaheadMatch.index == w.matchStart) {
  var floatLeft=lookaheadMatch[1];
  var floatRight=lookaheadMatch[2];
  var width=lookaheadMatch[3];
  var height=lookaheadMatch[4];
  var tooltip=lookaheadMatch[5];
  var src=lookaheadMatch[6];
  var link=lookaheadMatch[7];
  var e = w.output;
  if(link) { // LINKED IMAGE
   if (config.formatterHelpers.isExternalLink(link)) {
    if (config.macros.attach && config.macros.attach.isAttachment(link)) {
     // see [[AttachFilePluginFormatters]]
     e = createExternalLink(w.output,link);
     e.href=config.macros.attach.getAttachment(link);
     e.title = config.macros.attach.linkTooltip + link;
    } else
     e = createExternalLink(w.output,link);
   } else
    e = createTiddlyLink(w.output,link,false,null,w.isStatic);
   addClass(e,"imageLink");
  }
  var img = createTiddlyElement(e,"img");
  if(floatLeft) img.align="left"; else if(floatRight) img.align="right";
  if(width||height) {
   var x=width.trim(); var y=height.trim();
   var stretchW=(x.substr(x.length-1,1)=='+'); if (stretchW) x=x.substr(0,x.length-1);
   var stretchH=(y.substr(y.length-1,1)=='+'); if (stretchH) y=y.substr(0,y.length-1);
   if (x.substr(0,2)=="{{")
    { try{x=eval(x.substr(2,x.length-4))} catch(e){displayMessage(e.description||e.toString())} }
   if (y.substr(0,2)=="{{")
    { try{y=eval(y.substr(2,y.length-4))} catch(e){displayMessage(e.description||e.toString())} }
   img.style.width=x.trim(); img.style.height=y.trim();
   config.formatterHelpers.addStretchHandlers(img,stretchW,stretchH);
  }
  if(tooltip) img.title = tooltip;
  if (config.macros.attach && config.macros.attach.isAttachment(src))
   src=config.macros.attach.getAttachment(src); // see [[AttachFilePluginFormatters]]
  else if (config.formatterHelpers.resolvePath) { // see [[ImagePathPlugin]]
   if (config.browser.isIE || config.browser.isSafari) {
    img.onerror=(function(){
     this.src=config.formatterHelpers.resolvePath(this.src,false);
     return false;
    });
   } else
    src=config.formatterHelpers.resolvePath(src,true);
  }
  img.src=src;
  w.nextMatch = this.lookaheadRegExp.lastIndex;
 }
}
config.formatterHelpers.imageSize={
tip: '', dragtip: 'DRAG=étirer/réduire, '
}
config.formatterHelpers.addStretchHandlers=function(e,stretchW,stretchH) {
 e.title=((stretchW||stretchH)?this.imageSize.dragtip:'')+this.imageSize.tip;
 e.statusMsg='width=%0, height=%1';
 e.style.cursor='move';
 e.originalW=e.style.width;
 e.originalH=e.style.height;
 e.minW=Math.max(e.offsetWidth/20,10);
 e.minH=Math.max(e.offsetHeight/20,10);
 e.stretchW=stretchW;
 e.stretchH=stretchH;
 e.onmousedown=function(ev) { var ev=ev||window.event;
  this.sizing=true;
  this.startX=!config.browser.isIE?ev.pageX:(ev.clientX+findScrollX());
  this.startY=!config.browser.isIE?ev.pageY:(ev.clientY+findScrollY());
  this.startW=this.offsetWidth;
  this.startH=this.offsetHeight;
  return false;
 };
 e.onmousemove=function(ev) { var ev=ev||window.event;
  if (this.sizing) {
   var s=this.style;
   var currX=!config.browser.isIE?ev.pageX:(ev.clientX+findScrollX());
   var currY=!config.browser.isIE?ev.pageY:(ev.clientY+findScrollY());
   var newW=(currX-this.offsetLeft)/(this.startX-this.offsetLeft)*this.startW;
   var newH=(currY-this.offsetTop )/(this.startY-this.offsetTop )*this.startH;
   if (this.stretchW) s.width =Math.floor(Math.max(newW,this.minW))+'px';
   if (this.stretchH) s.height=Math.floor(Math.max(newH,this.minH))+'px';
   clearMessage(); displayMessage(this.statusMsg.format([s.width,s.height]));
  }
  return false;
 };
 e.onmouseup=function(ev) { var ev=ev||window.event;
  if (ev.shiftKey) { this.style.width=this.style.height=''; }
  if (ev.ctrlKey) { this.style.width=this.originalW; this.style.height=this.originalH; }
  this.sizing=false;
  clearMessage();
  return false;
 };
 e.onmouseout=function(ev) { var ev=ev||window.event;
  this.sizing=false;
  clearMessage();
  return false;
 };
}
//}}}
/* |Author|Eric Shulman|License|http://www.TiddlyTools.com/#LegalStatements|!Code
*/
//{{{
version.extensions.InlineJavascriptPlugin= {major: 1, minor: 9, revision: 6, date: new Date(2010,12,15)};
config.formatters.push( {
 name: "inlineJavascript",
 match: "\\<script",
 lookahead: "\\<script(?: type=\\\"[^\\\"]*\\\")?(?: src=\\\"([^\\\"]*)\\\")?(?: label=\\\"([^\\\"]*)\\\")?(?: title=\\\"([^\\\"]*)\\\")?(?: key=\\\"([^\\\"]*)\\\")?( show)?\\>((?:.|\\n)*?)\\</script\\>",
 handler: function(w) {
  var lookaheadRegExp = new RegExp(this.lookahead,"mg");
  lookaheadRegExp.lastIndex = w.matchStart;
  var lookaheadMatch = lookaheadRegExp.exec(w.source)
  if(lookaheadMatch && lookaheadMatch.index == w.matchStart) {
   var src=lookaheadMatch[1];
   var label=lookaheadMatch[2];
   var tip=lookaheadMatch[3];
   var key=lookaheadMatch[4];
   var show=lookaheadMatch[5];
   var code=lookaheadMatch[6];
   if (src) { // external script library
    var script = document.createElement("script"); script.src = src;
    document.body.appendChild(script); document.body.removeChild(script);
   }
   if (code) { // inline code
    if (show) // display source in tiddler
     wikify("{{{\n"+lookaheadMatch[0]+"\n}}}\n",w.output);
    if (label) { // create 'onclick' command link
     var link=createTiddlyElement(w.output,"a",null,"tiddlyLinkExisting",wikifyPlainText(label));
     var fixup=code.replace(/document.write\s*\(/gi,'place.bufferedHTML+=(');
     link.code="function _out(place,tiddler){"+fixup+"\n};_out(this,this.tiddler);"
     link.tiddler=w.tiddler;
     link.onclick=function(){
      this.bufferedHTML="";
      try{ var r=eval(this.code);
       if(this.bufferedHTML.length || (typeof(r)==="string")&&r.length)
        var s=this.parentNode.insertBefore(document.createElement("span"),this.nextSibling);
       if(this.bufferedHTML.length)
        s.innerHTML=this.bufferedHTML;
       if((typeof(r)==="string")&&r.length) {
        wikify(r,s,null,this.tiddler);
        return false;
       } else return r!==undefined?r:false;
      } catch(e){alert(e.description||e.toString());return false;}
     };
     link.setAttribute("title",tip||"");
     var URIcode='javascript:void(eval(decodeURIComponent(%22(function(){try{';
     URIcode+=encodeURIComponent(encodeURIComponent(code.replace(/\n/g,' ')));
     URIcode+='}catch(e){alert(e.description||e.toString())}})()%22)))';
     link.setAttribute("href",URIcode);
     link.style.cursor="pointer";
     if (key) link.accessKey=key.substr(0,1); // single character only
    }
    else { // run script immediately
     var fixup=code.replace(/document.write\s*\(/gi,'place.innerHTML+=(');
     var c="function _out(place,tiddler){"+fixup+"\n};_out(w.output,w.tiddler);";
     try  { var out=eval(c); }
     catch(e) { out=e.description?e.description:e.toString(); }
     if (out && out.length) wikify(out,w.output,w.highlightRegExp,w.tiddler);
    }
   }
   w.nextMatch = lookaheadMatch.index + lookaheadMatch[0].length;
  }
 }
} )
//}}}
// // Backward-compatibility for TW2.1.x and earlier
//{{{
if (typeof(wikifyPlainText)=="undefined") window.wikifyPlainText=function(text,limit,tiddler) {
 if(limit > 0) text = text.substr(0,limit);
 var wikifier = new Wikifier(text,formatter,null,tiddler);
 return wikifier.wikifyPlain();
}
//}}}
// // GLOBAL FUNCTION: $(...) -- 'shorthand' convenience syntax for document.getElementById()
//{{{
if (typeof($)=='undefined') { function $(id) { return document.getElementById(id.replace(/^#/,'')); } }
//}}}
/* |Author|Eric Shulman|License|http://www.TiddlyTools.com/#LegalStatements|
!Configuration
<<<
<<option chkFloatingSlidersAnimate>> allow floating sliders to animate when opening/closing
<<<
!Code
*/
//{{{
version.extensions.NestedSlidersPlugin= {major: 2, minor: 4, revision: 9, date: new Date(2008,11,15)};
// options for deferred rendering of sliders that are not initially displayed
if (config.options.chkFloatingSlidersAnimate===undefined)
 config.options.chkFloatingSlidersAnimate=false; // avoid clipping problems in IE
// default styles for 'floating' class
setStylesheet(".floatingPanel { position:absolute; z-index:10; padding:0.5em; margin:0em; \
 background-color:#eee; color:#000; border:1px solid #000; text-align:left; }","floatingPanelStylesheet");
// if removeCookie() function is not defined by TW core, define it here.
if (window.removeCookie===undefined) {
 window.removeCookie=function(name) {
  document.cookie = name+'=; expires=Thu, 01-Jan-1970 00:00:01 UTC; path=/;';
 }
}
config.formatters.push( {
 name: "nestedSliders",
 match: "\\n?\\+{3}",
 terminator: "\\s*\\={3}\\n?",
 lookahead: "\\n?\\+{3}(\\+)?(\\([^\\)]*\\))?(\\!*)?(\\^(?:[^\\^\\*\\@\\[\\>]*\\^)?)?(\\*)?(\\@)?(?:\\{\\{([\\w]+[\\s\\w]*)\\{)?(\\[[^\\]]*\\])?(\\[[^\\]]*\\])?(?:\\}{3})?(\\#[^:]*\\:)?(\\>)?(\\.\\.\\.)?\\s*",
 handler: function(w)
  {
   lookaheadRegExp = new RegExp(this.lookahead,"mg");
   lookaheadRegExp.lastIndex = w.matchStart;
   var lookaheadMatch = lookaheadRegExp.exec(w.source)
   if(lookaheadMatch && lookaheadMatch.index == w.matchStart)
   {
    var defopen=lookaheadMatch[1];
    var cookiename=lookaheadMatch[2];
    var header=lookaheadMatch[3];
    var panelwidth=lookaheadMatch[4];
    var transient=lookaheadMatch[5];
    var hover=lookaheadMatch[6];
    var buttonClass=lookaheadMatch[7];
    var label=lookaheadMatch[8];
    var openlabel=lookaheadMatch[9];
    var panelID=lookaheadMatch[10];
    var blockquote=lookaheadMatch[11];
    var deferred=lookaheadMatch[12];
    // location for rendering button and panel
    var place=w.output;
    // default to closed, no cookie, no accesskey, no alternate text/tip
    var show="none"; var cookie=""; var key="";
    var closedtext=">"; var closedtip="";
    var openedtext="<"; var openedtip="";
    // extra "+", default to open
    if (defopen) show="block";
    // cookie, use saved open/closed state
    if (cookiename) {
     cookie=cookiename.trim().slice(1,-1);
     cookie="chkSlider"+cookie;
     if (config.options[cookie]==undefined)
      { config.options[cookie] = (show=="block") }
     show=config.options[cookie]?"block":"none";
    }
    // parse label/tooltip/accesskey: [label=X|tooltip]
    if (label) {
     var parts=label.trim().slice(1,-1).split("|");
     closedtext=parts.shift();
     if (closedtext.substr(closedtext.length-2,1)=="=")
      { key=closedtext.substr(closedtext.length-1,1); closedtext=closedtext.slice(0,-2); }
     openedtext=closedtext;
     if (parts.length) closedtip=openedtip=parts.join("|");
     else { closedtip="afficher "+closedtext; openedtip="masquer "+closedtext; }
    }
    // parse alternate label/tooltip: [label|tooltip]
    if (openlabel) {
     var parts=openlabel.trim().slice(1,-1).split("|");
     openedtext=parts.shift();
     if (parts.length) openedtip=parts.join("|");
     else openedtip="hide "+openedtext;
    }
    var title=show=='block'?openedtext:closedtext;
    var tooltip=show=='block'?openedtip:closedtip;
    // create the button
    if (header) { // use "Hn" header format instead of button/link
     var lvl=(header.length>5)?5:header.length;
     var btn = createTiddlyElement(createTiddlyElement(place,"h"+lvl,null,null,null),"a",null,buttonClass,title);
     btn.onclick=onClickNestedSlider;
     btn.setAttribute("href","javascript:;");
     btn.setAttribute("title",tooltip);
    }
    else
     var btn = createTiddlyButton(place,title,tooltip,onClickNestedSlider,buttonClass);
    btn.innerHTML=title; // enables use of HTML entities in label
    // set extra button attributes
    btn.setAttribute("closedtext",closedtext);
    btn.setAttribute("closedtip",closedtip);
    btn.setAttribute("openedtext",openedtext);
    btn.setAttribute("openedtip",openedtip);
    btn.sliderCookie = cookie; // save the cookiename (if any) in the button object
    btn.defOpen=defopen!=null; // save default open/closed state (boolean)
    btn.keyparam=key; // save the access key letter ("" if none)
    if (key.length) {
     btn.setAttribute("accessKey",key); // init access key
     btn.onfocus=function(){this.setAttribute("accessKey",this.keyparam);}; // **reclaim** access key on focus
    }
    btn.setAttribute("hover",hover?"true":"false");
    btn.onmouseover=function(ev) {
     // optional 'open on hover' handling
     if (this.getAttribute("hover")=="true" && this.sliderPanel.style.display=='none') {
      document.onclick.call(document,ev); // close transients
      onClickNestedSlider(ev); // open this slider
     }
     // mouseover on button aligns floater position with button
     if (window.adjustSliderPos) window.adjustSliderPos(this.parentNode,this,this.sliderPanel);
    }
    // create slider panel
    var panelClass=panelwidth?"floatingPanel":"sliderPanel";
    if (panelID) panelID=panelID.slice(1,-1); // trim off delimiters
    var panel=createTiddlyElement(place,"div",panelID,panelClass,null);
    panel.button = btn; // so the slider panel know which button it belongs to
    btn.sliderPanel=panel; // so the button knows which slider panel it belongs to
    panel.defaultPanelWidth=(panelwidth && panelwidth.length>2)?panelwidth.slice(1,-1):"";
    panel.setAttribute("transient",transient=="*"?"true":"false");
    panel.style.display = show;
    panel.style.width=panel.defaultPanelWidth;
    panel.onmouseover=function(event) // mouseover on panel aligns floater position with button
     { if (window.adjustSliderPos) window.adjustSliderPos(this.parentNode,this.button,this); }
    // render slider (or defer until shown)
    w.nextMatch = lookaheadMatch.index + lookaheadMatch[0].length;
    if ((show=="block")||!deferred) {
     // render now if panel is supposed to be shown or NOT deferred rendering
     w.subWikify(blockquote?createTiddlyElement(panel,"blockquote"):panel,this.terminator);
     // align floater position with button
     if (window.adjustSliderPos) window.adjustSliderPos(place,btn,panel);
    }
    else {
     var src = w.source.substr(w.nextMatch);
     var endpos=findMatchingDelimiter(src,"+++","===");
     panel.setAttribute("raw",src.substr(0,endpos));
     panel.setAttribute("blockquote",blockquote?"true":"false");
     panel.setAttribute("rendered","false");
     w.nextMatch += endpos+3;
     if (w.source.substr(w.nextMatch,1)=="\n") w.nextMatch++;
    }
   }
  }
 }
)
function findMatchingDelimiter(src,starttext,endtext) {
 var startpos = 0;
 var endpos = src.indexOf(endtext);
 // check for nested delimiters
 while (src.substring(startpos,endpos-1).indexOf(starttext)!=-1) {
  // count number of nested 'starts'
  var startcount=0;
  var temp = src.substring(startpos,endpos-1);
  var pos=temp.indexOf(starttext);
  while (pos!=-1) { startcount++; pos=temp.indexOf(starttext,pos+starttext.length); }
  // set up to check for additional 'starts' after adjusting endpos
  startpos=endpos+endtext.length;
  // find endpos for corresponding number of matching 'ends'
  while (startcount && endpos!=-1) {
   endpos = src.indexOf(endtext,endpos+endtext.length);
   startcount--;
  }
 }
 return (endpos==-1)?src.length:endpos;
}
//}}}
//{{{
window.onClickNestedSlider=function(e)
{
 if (!e) var e = window.event;
 var theTarget = resolveTarget(e);
 while (theTarget && theTarget.sliderPanel==undefined) theTarget=theTarget.parentNode;
 if (!theTarget) return false;
 var theSlider = theTarget.sliderPanel;
 var isOpen = theSlider.style.display!="none";
 // if SHIFT-CLICK, dock panel first (see [[MoveablePanelPlugin]])
 if (e.shiftKey && config.macros.moveablePanel) config.macros.moveablePanel.dock(theSlider,e);
 // toggle label
 theTarget.innerHTML=isOpen?theTarget.getAttribute("closedText"):theTarget.getAttribute("openedText");
 // toggle tooltip
 theTarget.setAttribute("title",isOpen?theTarget.getAttribute("closedTip"):theTarget.getAttribute("openedTip"));
 // deferred rendering (if needed)
 if (theSlider.getAttribute("rendered")=="false") {
  var place=theSlider;
  if (theSlider.getAttribute("blockquote")=="true")
   place=createTiddlyElement(place,"blockquote");
  wikify(theSlider.getAttribute("raw"),place);
  theSlider.setAttribute("rendered","true");
 }
 // show/hide the slider
 if(config.options.chkAnimate && (!hasClass(theSlider,'floatingPanel') || config.options.chkFloatingSlidersAnimate))
  anim.startAnimating(new Slider(theSlider,!isOpen,e.shiftKey || e.altKey,"none"));
 else
  theSlider.style.display = isOpen ? "none" : "block";
 // reset to default width (might have been changed via plugin code)
 theSlider.style.width=theSlider.defaultPanelWidth;
 // align floater panel position with target button
 if (!isOpen && window.adjustSliderPos) window.adjustSliderPos(theSlider.parentNode,theTarget,theSlider);
 // if showing panel, set focus to first 'focus-able' element in panel
 if (theSlider.style.display!="none") {
  var ctrls=theSlider.getElementsByTagName("*");
  for (var c=0; c<ctrls.length; c++) {
   var t=ctrls[c].tagName.toLowerCase();
   if ((t=="input" && ctrls[c].type!="hidden") || t=="textarea" || t=="select")
    { try{ ctrls[c].focus(); } catch(err){;} break; }
  }
 }
 var cookie=theTarget.sliderCookie;
 if (cookie && cookie.length) {
  config.options[cookie]=!isOpen;
  if (config.options[cookie]!=theTarget.defOpen) window.saveOptionCookie(cookie);
  else window.removeCookie(cookie); // remove cookie if slider is in default display state
 }
 // prevent SHIFT-CLICK from being processed by browser (opens blank window... yuck!)
 // prevent clicks *within* a slider button from being processed by browser
 // but allow plain click to bubble up to page background (to close transients, if any)
 if (e.shiftKey || theTarget!=resolveTarget(e))
  { e.cancelBubble=true; if (e.stopPropagation) e.stopPropagation(); }
 Popup.remove(); // close open popup (if any)
 return false;
}
//}}}
//{{{
// click in document background closes transient panels
document.nestedSliders_savedOnClick=document.onclick;
document.onclick=function(ev) { if (!ev) var ev=window.event; var target=resolveTarget(ev);
 if (document.nestedSliders_savedOnClick)
  var retval=document.nestedSliders_savedOnClick.apply(this,arguments);
 // if click was inside a popup... leave transient panels alone
 var p=target; while (p) if (hasClass(p,"popup")) break; else p=p.parentNode;
 if (p) return retval;
 // if click was inside transient panel (or something contained by a transient panel), leave it alone
 var p=target; while (p) {
  if ((hasClass(p,"floatingPanel")||hasClass(p,"sliderPanel"))&&p.getAttribute("transient")=="true") break;
  p=p.parentNode;
 }
 if (p) return retval;
 // otherwise, find and close all transient panels...
 var all=document.all?document.all:document.getElementsByTagName("DIV");
 for (var i=0; i<all.length; i++) {
   // if it is not a transient panel, or the click was on the button that opened this panel, don't close it.
  if (all[i].getAttribute("transient")!="true" || all[i].button==target) continue;
  // otherwise, if the panel is currently visible, close it by clicking it's button
  if (all[i].style.display!="none") window.onClickNestedSlider({target:all[i].button})
  if (!hasClass(all[i],"floatingPanel")&&!hasClass(all[i],"sliderPanel")) all[i].style.display="none";
 }
 return retval;
};
//}}}
//{{{
// adjust floating panel position based on button position
if (window.adjustSliderPos==undefined) window.adjustSliderPos=function(place,btn,panel) {
 if (hasClass(panel,"floatingPanel") && !hasClass(panel,"undocked")) {
  // see [[MoveablePanelPlugin]] for use of 'undocked'
  var rightEdge=document.body.offsetWidth-1;
  var panelWidth=panel.offsetWidth;
  var left=0;
  var top=btn.offsetHeight;
  if (place.style.position=="relative" && findPosX(btn)+panelWidth>rightEdge) {
   left-=findPosX(btn)+panelWidth-rightEdge; // shift panel relative to button
   if (findPosX(btn)+left<0) left=-findPosX(btn); // stay within left edge
  }
  if (place.style.position!="relative") {
   var left=findPosX(btn);
   var top=findPosY(btn)+btn.offsetHeight;
   var p=place; while (p && !hasClass(p,'floatingPanel')) p=p.parentNode;
   if (p) { left-=findPosX(p); top-=findPosY(p); }
   if (left+panelWidth>rightEdge) left=rightEdge-panelWidth;
   if (left<0) left=0;
  }
  panel.style.left=left+"px"; panel.style.top=top+"px";
 }
}
//}}}
//{{{
// TW2.1 and earlier:
// hijack Slider stop handler so overflow is visible after animation has completed
Slider.prototype.coreStop = Slider.prototype.stop;
Slider.prototype.stop = function()
 { this.coreStop.apply(this,arguments); this.element.style.overflow = "visible"; }
// TW2.2+
// hijack Morpher stop handler so sliderPanel/floatingPanel overflow is visible after animation has completed
if (version.major+.1*version.minor+.01*version.revision>=2.2) {
 Morpher.prototype.coreStop = Morpher.prototype.stop;
 Morpher.prototype.stop = function() {
  this.coreStop.apply(this,arguments);
  var e=this.element;
  if (hasClass(e,"sliderPanel")||hasClass(e,"floatingPanel")) {
   // adjust panel overflow and position after animation
   e.style.overflow = "visible";
   if (window.adjustSliderPos) window.adjustSliderPos(e.parentNode,e.button,e);
  }
 };
}
//}}}
/* |Author|Eric Shulman|License|http://www.TiddlyTools.com/#LegalStatements|
*/
//{{{
version.extensions.QuoteOfTheDayPlugin= {major: 1, minor: 4, revision: 1, date: new Date(2008,3,21)};
config.macros.QOTD = {
 clickTooltip: "click to view another item",
 timerTooltip: "auto-timer stopped... 'mouseout' to restart timer",
 timerClickTooltip: "auto-timer stopped... click to view another item, or 'mouseout' to restart timer",
 handler:
 function(place,macroName,params) {
 var tid=params.shift(); // source tiddler containing HR-separated quotes
 var p=params.shift();
 var click=true; // allow click for next item
 var inline=false; // wrap in slider for animation effect
 var random=true; // pick an item at random (default for "quote of the day" usage)
 var folder=false; // use local filesystem folder list
 var cookie=""; // default to no cookie
 var next=0; // default to first item (or random item)
 while (p) {
 if (p.toLowerCase()=="noclick") var click=false;
 if (p.toLowerCase()=="inline") var inline=true;
 if (p.toLowerCase()=="norandom") var random=false;
 if (p.toLowerCase().substr(0,7)=="cookie:") var cookie=p.substr(8);
 if (!isNaN(p)) var delay=p;
 p=params.shift();
 }
 if ((click||delay) && !inline) {
 var panel = createTiddlyElement(null,"div",null,"sliderPanel");
 panel.style.display="none";
 place.appendChild(panel);
 var here=createTiddlyElement(panel,click?"a":"span",null,"QOTD");
 }
 else
 var here=createTiddlyElement(place,click?"a":"span",null,"QOTD");
 here.id=(new Date()).convertToYYYYMMDDHHMMSSMMM()+Math.random().toString(); // unique ID
 // get items from tiddler or file list
 var list=store.getTiddlerText(tid,"");
 if (!list||!list.length) { // not a tiddler... maybe an image directory?
 var list=this.getImageFileList(tid);
 if (!list.length) { // maybe relative path... fixup and try again
 var h=document.location.href;
 var p=getLocalPath(decodeURIComponent(h.substr(0,h.lastIndexOf("/")+1)));
 var list=this.getImageFileList(p+tid);
 }
 }
 if (!list||!list.length) return false; // no contents... nothing to display!
 here.setAttribute("list",list);
 if (delay) here.setAttribute("delay",delay);
 here.setAttribute("random",random);
 here.setAttribute("cookie",cookie);
 if (click) {
 here.title=this.clickTooltip
 if (!inline) here.style.display="block";
 here.setAttribute("href","javascript:;");
 here.onclick=function(event)
 { config.macros.QOTD.showNextItem(this); }
 }
 if (config.options["txtQOTD_"+cookie]!=undefined) next=parseInt(config.options["txtQOTD_"+cookie]);
 here.setAttribute("nextItem",next);
 config.macros.QOTD.showNextItem(here);
 if (delay) {
 here.title=click?this.timerClickTooltip:this.timerTooltip
 here.onmouseover=function(event)
 { clearTimeout(this.ticker); };
 here.onmouseout=function(event)
 { this.ticker=setTimeout("config.macros.QOTD.tick('"+this.id+"')",this.getAttribute("delay")); };
 here.ticker=setTimeout("config.macros.QOTD.tick('"+here.id+"')",delay);
 }
 },
 tick: function(id) {
 var here=document.getElementById(id); if (!here) return;
 config.macros.QOTD.showNextItem(here);
 here.ticker=setTimeout("config.macros.QOTD.tick('"+id+"')",here.getAttribute("delay"));
 },
 showNextItem:
 function (here) {
 // hide containing slider panel (if any)
 var p=here.parentNode;
 if (p.className=="sliderPanel") p.style.display = "none"
 // get a new quote
 var index=here.getAttribute("nextItem");
 var items=here.getAttribute("list").split("\n----\n");
 if (index<0||index>=items.length) index=0;
 if (here.getAttribute("random")=="true") index=Math.floor(Math.random()*items.length);
 var txt=items[index];
 // re-render quote display element, and advance index counter
 removeChildren(here); wikify(txt,here);
 index++; here.setAttribute("nextItem",index);
 var cookie=here.getAttribute("cookie");
 if (cookie.length) {
 config.options["txtQOTD_"+cookie]=index.toString();
 saveOptionCookie("txtQOTD_"+cookie);
 }
 // redisplay slider panel (if any)
 if (p.className=="sliderPanel") {
 if(anim && config.options.chkAnimate)
 anim.startAnimating(new Slider(p,true,false,"none"));
 else p.style.display="block";
 }
 },
 getImageFileList: function(cwd) { // returns HR-separated list of image files
 function isImage(fn) {
 var ext=fn.substr(fn.length-3,3).toLowerCase();
 return ext=="jpg"||ext=="gif"||ext=="png";
 }
 var files=[];
 if (config.browser.isIE) {
 cwd=cwd.replace(/\//g,"\\");
 // IE uses ActiveX to read filesystem info
 var fso = new ActiveXObject("Scripting.FileSystemObject");
 if(!fso.FolderExists(cwd)) return [];
 var dir=fso.GetFolder(cwd);
 for(var f=new Enumerator(dir.Files); !f.atEnd(); f.moveNext())
 if (isImage(f.item().path)) files.push("[img[%0]]".format(["file:///"+f.item().path.replace(/\\/g,"/")]));
 } else {
 // FireFox (mozilla) uses "components" to read filesystem info
 // get security access
 if(!window.Components) return;
 try { netscape.security.PrivilegeManager.enablePrivilege("UniversalXPConnect"); }
 catch(e) { alert(e.description?e.description:e.toString()); return []; }
 // open/validate directory
 var file=Components.classes["@mozilla.org/file/local;1"].createInstance(Components.interfaces.nsILocalFile);
 try { file.initWithPath(cwd); } catch(e) { return []; }
 if (!file.exists() || !file.isDirectory()) { return []; }
 var folder=file.directoryEntries;
 while (folder.hasMoreElements()) {
 var f=folder.getNext().QueryInterface(Components.interfaces.nsILocalFile);
 if (f instanceof Components.interfaces.nsILocalFile)
 if (isImage(f.path)) files.push("[img[%0]]".format(["file:///"+f.path.replace(/\\/g,"/")]));
 }
 }
 return files.join("\n----\n");
 }
}
//}}}
/% |Author|Eric Shulman|License|http://www.TiddlyTools.com/#LegalStatements|
!end
!show
<<tiddler {{
 var here=story.findContainingTiddler(place); if (here) {
  var nodes=here.getElementsByTagName("*");
  for (var i=0; i<nodes.length; i++) if (hasClass(nodes[i],"title"))
   { removeChildren(nodes[i]); wikify("$1",nodes[i]); break; }
 }
'';}}>>
!end
%/<<tiddler {{'.ReplaceTiddlerTitle##'+('$1'=='$'+'1'?'info':'show')}} with: [[$1]]>>
/* |Author|Eric Shulman|License|http://www.TiddlyTools.com/#LegalStatements|
*/
//{{{
version.extensions.SinglePageModePlugin= {major: 2, minor: 9, revision: 7, date: new Date(2010,11,30)};
//}}}
//{{{
config.paramifiers.SPM = { onstart: function(v) {
 config.options.chkSinglePageMode=eval(v);
 if (config.options.chkSinglePageMode && config.options.chkSinglePagePermalink && !config.browser.isSafari) {
 config.lastURL = window.location.hash;
 if (!config.SPMTimer) config.SPMTimer=window.setInterval(function() {checkLastURL();},1000);
 }
} };
//}}}
//{{{
if (config.options.chkSinglePageMode==undefined)
 config.options.chkSinglePageMode=false;
if (config.options.chkSinglePagePermalink==undefined)
 config.options.chkSinglePagePermalink=true;
if (config.options.chkSinglePageKeepFoldedTiddlers==undefined)
 config.options.chkSinglePageKeepFoldedTiddlers=false;
if (config.options.chkSinglePageKeepEditedTiddlers==undefined)
 config.options.chkSinglePageKeepEditedTiddlers=false;
if (config.options.chkTopOfPageMode==undefined)
 config.options.chkTopOfPageMode=false;
if (config.options.chkBottomOfPageMode==undefined)
 config.options.chkBottomOfPageMode=false;
if (config.options.chkSinglePageAutoScroll==undefined)
 config.options.chkSinglePageAutoScroll=false;
//}}}
//{{{
config.SPMTimer = 0;
config.lastURL = window.location.hash;
function checkLastURL()
{
 if (!config.options.chkSinglePageMode)
 { window.clearInterval(config.SPMTimer); config.SPMTimer=0; return; }
 if (config.lastURL == window.location.hash) return; // no change in hash
 var tids=decodeURIComponent(window.location.hash.substr(1)).readBracketedList();
 if (tids.length==1) // permalink (single tiddler in URL)
 story.displayTiddler(null,tids[0]);
 else { // restore permaview or default view
 config.lastURL = window.location.hash;
 if (!tids.length) tids=store.getTiddlerText("DefaultTiddlers").readBracketedList();
 story.closeAllTiddlers();
 story.displayTiddlers(null,tids);
 }
}
if (Story.prototype.SPM_coreDisplayTiddler==undefined)
 Story.prototype.SPM_coreDisplayTiddler=Story.prototype.displayTiddler;
Story.prototype.displayTiddler = function(srcElement,tiddler,template,animate,slowly)
{
 var title=(tiddler instanceof Tiddler)?tiddler.title:tiddler;
 var tiddlerElem=story.getTiddler(title); // ==null unless tiddler is already displayed
 var opt=config.options;
 var single=opt.chkSinglePageMode && !startingUp;
 var top=opt.chkTopOfPageMode && !startingUp;
 var bottom=opt.chkBottomOfPageMode && !startingUp;
 if (single) {
 story.forEachTiddler(function(tid,elem) {
 // skip current tiddler and, optionally, tiddlers that are folded.
 if ( tid==title
 || (opt.chkSinglePageKeepFoldedTiddlers && elem.getAttribute("folded")=="true"))
 return;
 // if a tiddler is being edited, ask before closing
 if (elem.getAttribute("dirty")=="true") {
 if (opt.chkSinglePageKeepEditedTiddlers) return;
 // if tiddler to be displayed is already shown, then leave active tiddler editor as is
 // (occurs when switching between view and edit modes)
 if (tiddlerElem) return;
 // otherwise, ask for permission
 var msg="'"+tid+"' is currently being edited.\n\n";
 msg+="Press OK to save and close this tiddler\nor press Cancel to leave it opened";
 if (!confirm(msg)) return; else story.saveTiddler(tid);
 }
 story.closeTiddler(tid);
 });
 }
 else if (top)
 arguments[0]=null;
 else if (bottom)
 arguments[0]="bottom";
 if (single && opt.chkSinglePagePermalink && !config.browser.isSafari) {
 window.location.hash = encodeURIComponent(String.encodeTiddlyLink(title));
 config.lastURL = window.location.hash;
 document.title = wikifyPlain("SiteTitle") + " - " + title;
 if (!config.SPMTimer) config.SPMTimer=window.setInterval(function() {checkLastURL();},1000);
 }
 if (tiddlerElem && tiddlerElem.getAttribute("dirty")=="true") { // editing... move tiddler without re-rendering
 var isTopTiddler=(tiddlerElem.previousSibling==null);
 if (!isTopTiddler && (single || top))
 tiddlerElem.parentNode.insertBefore(tiddlerElem,tiddlerElem.parentNode.firstChild);
 else if (bottom)
 tiddlerElem.parentNode.insertBefore(tiddlerElem,null);
 else this.SPM_coreDisplayTiddler.apply(this,arguments); // let CORE render tiddler
 } else
 this.SPM_coreDisplayTiddler.apply(this,arguments); // let CORE render tiddler
 var tiddlerElem=story.getTiddler(title);
 if (tiddlerElem&&opt.chkSinglePageAutoScroll) {
 // scroll to top of page or top of tiddler
 var isTopTiddler=(tiddlerElem.previousSibling==null);
 var yPos=isTopTiddler?0:ensureVisible(tiddlerElem);
 // if animating, defer scroll until after animation completes
 var delay=opt.chkAnimate?config.animDuration+10:0;
 setTimeout("window.scrollTo(0,"+yPos+")",delay);
 }
}
if (Story.prototype.SPM_coreDisplayTiddlers==undefined)
 Story.prototype.SPM_coreDisplayTiddlers=Story.prototype.displayTiddlers;
Story.prototype.displayTiddlers = function() {
 // suspend single/top/bottom modes when showing multiple tiddlers
 var opt=config.options;
 var saveSPM=opt.chkSinglePageMode; opt.chkSinglePageMode=false;
 var saveTPM=opt.chkTopOfPageMode; opt.chkTopOfPageMode=false;
 var saveBPM=opt.chkBottomOfPageMode; opt.chkBottomOfPageMode=false;
 this.SPM_coreDisplayTiddlers.apply(this,arguments);
 opt.chkBottomOfPageMode=saveBPM;
 opt.chkTopOfPageMode=saveTPM;
 opt.chkSinglePageMode=saveSPM;
}
//}}}
/* |Author|SaqImtiaz|Version|2.02.2008.01.25|License|[[Creative Commons Attribution-ShareAlike 3.0 License|http://creativecommons.org/licenses/by-sa/3.0/]]| */
{{{
//!BEGIN-PLUGIN-CODE
config.tableSorting = {
 darrow: "\u2193",
 uarrow: "\u2191",
 getText : function (o) {
  var p = o.cells[SORT_INDEX];
  return p.innerText || p.textContent || '';
 },
 sortTable : function (o,rev) {
  SORT_INDEX = o.getAttribute("index");
  var c = config.tableSorting;
  var T = findRelated(o.parentNode,"TABLE");
  if(T.tBodies[0].rows.length<=1)
   return;
  var itm = "";
  var i = 0;
  while (itm == "" && i < T.tBodies[0].rows.length) {
   itm = c.getText(T.tBodies[0].rows[i]).trim();
   i++;
  }
  if (itm == "")
   return;
  var r = [];
  var S = o.getElementsByTagName("span")[0];
  c.fn = c.sortAlpha;
  if(!isNaN(Date.parse(itm)))
   c.fn = c.sortDate;
  else if(itm.match(/^[$|£|€|\+|\-]{0,1}\d*\.{0,1}\d+$/))
   c.fn = c.sortNumber;
  else if(itm.match(/^\d*\.{0,1}\d+[K|M|G]{0,1}b$/))
   c.fn = c.sortFile;
  for(i=0; i<T.tBodies[0].rows.length; i++) {
    r[i]=T.tBodies[0].rows[i];
  }
  r.sort(c.reSort);
  if(S.firstChild.nodeValue==c.darrow || rev) {
   r.reverse();
   S.firstChild.nodeValue=c.uarrow;
  }
  else
   S.firstChild.nodeValue=c.darrow;
  var thead = T.getElementsByTagName('thead')[0];
  var headers = thead.rows[thead.rows.length-1].cells;
  for(var k=0; k<headers.length; k++) {
   if(!hasClass(headers[k],"nosort"))
    addClass(headers[k].getElementsByTagName("span")[0],"hidden");
  }
  removeClass(S,"hidden");
  for(i=0; i<r.length; i++) {
   T.tBodies[0].appendChild(r[i]);
   c.stripe(r[i],i);
   for(var j=0; j<r[i].cells.length;j++){
    removeClass(r[i].cells[j],"sortedCol");
   }
   addClass(r[i].cells[SORT_INDEX],"sortedCol");
  }
 },
 stripe : function (e,i){
  var cl = ["oddRow","evenRow"];
  i&1? cl.reverse() : cl;
  removeClass(e,cl[1]);
  addClass(e,cl[0]);
 },
 sortNumber : function(v) {
  var x = parseFloat(this.getText(v).replace(/[^0-9.-]/g,''));
  return isNaN(x)? 0: x;
 },
 sortDate : function(v) {
  return Date.parse(this.getText(v));
 },
 sortAlpha : function(v) {
  return this.getText(v).toLowerCase();
 },
 sortFile : function(v) {
  var j, q = config.messages.sizeTemplates, s = this.getText(v);
  for (var i=0; i<q.length; i++) {
   if ((j = s.toLowerCase().indexOf(q[i].template.replace("%0\u00a0","").toLowerCase())) != -1)
    return q[i].unit * s.substr(0,j);
  }
  return parseFloat(s);
 },
 reSort : function(a,b){
  var c = config.tableSorting;
  var aa = c.fn(a);
  var bb = c.fn(b);
  return ((aa==bb)? 0 : ((aa<bb)? -1:1));
 }
};
Story.prototype.tSort_refreshTiddler = Story.prototype.refreshTiddler;
Story.prototype.refreshTiddler = function(title,template,force,customFields,defaultText){
 var elem = this.tSort_refreshTiddler.apply(this,arguments);
 if(elem){
  var tables = elem.getElementsByTagName("TABLE");
  var c = config.tableSorting;
  for(var i=0; i<tables.length; i++){
   if(hasClass(tables[i],"sortable")){
    var x = null, rev, table = tables[i], thead = table.getElementsByTagName('thead')[0], headers = thead.rows[thead.rows.length-1].cells;
    for (var j=0; j<headers.length; j++){
     var h = headers[j];
     if (hasClass(h,"nosort"))
      continue;
     h.setAttribute("index",j);
     h.onclick = function(){c.sortTable(this); return false;};
     h.ondblclick = stopEvent;
     if(h.getElementsByTagName("span").length == 0)
      createTiddlyElement(h,"span",null,"hidden",c.uarrow);
     if(!x && hasClass(h,"autosort")) {
      x = j;
      rev = hasClass(h,"reverse");
     }
    }
    if(x)
     c.sortTable(headers[x],rev);
   }
  }
 }
 return elem;
};
setStylesheet("table.sortable span.hidden {visibility:hidden;}\n"+
 "table.sortable thead {cursor:pointer;}\n"+
 "table.sortable .nosort {cursor:default;}\n"+
 "table.sortable td.sortedCol {background:#ffc;}","TableSortingPluginStyles");
function stopEvent(e){
 var ev = e? e : window.event;
 ev.cancelBubble = true;
 if (ev.stopPropagation) ev.stopPropagation();
 return false;
}
config.macros.nosort={
 handler : function(place){
  addClass(place,"nosort");
 }
};
config.macros.autosort={
 handler : function(place,m,p,w,pS){
  addClass(place,"autosort"+" "+pS);
 }
};
}}}
/* |Author|Eric Shulman|License|http://www.TiddlyTools.com/#LegalStatements| */
//{{{
version.extensions.WikifyPlugin= {major: 1, minor: 1, revision: 4, date: new Date(2009,3,29)};
config.macros.wikify={
 handler: function(place,macroName,params,wikifier,paramString,tiddler) {
  var fmt=params.shift();
  var values=[];
  var out="";
  if (!fmt.match(/\%[0-9]/g) && params.length) // format has no markers, just join all params with spaces
   out=fmt+" "+params.join(" ");
  else { // format param has markers, get values and perform substitution
   while (p=params.shift()) values.push(this.getFieldReference(place,p));
   out=fmt.format(values);
  }
  if (macroName=="wikiCalc") out=eval(out).toString();
  wikify(out.unescapeLineBreaks(),place,null,tiddler);
 },
 getFieldReference: function(place,p) { // "slicename::tiddlername" or "fieldname@tiddlername" or "fieldname"
  if (typeof p != "string") return p; // literal non-string value... just return it...
  var parts=p.split(config.textPrimitives.sliceSeparator);
  if (parts.length==2) {// maybe a slice reference?
   var tid=parts[0]; var slice=parts[1];
   if (!tid || !tid.length || tid=="here") { // no target (or "here"), use containing tiddler
    tid=story.findContainingTiddler(place);
    if (tid) tid=tid.getAttribute("tiddler")
    else tid="SiteSlices"; // fallback for 'non-tiddler' areas (e.g, header, sidebar, etc.)
   }
   var val=store.getTiddlerSlice(tid,slice); // get tiddler slice value
  }
  if (val==undefined) {// not a slice, or slice not found, maybe a field reference?
   var parts=p.split("@");
   var field=parts[0];
   if (!field || !field.length) field="checked"; // missing fieldname, fallback: checked@tiddlername
   var tid=parts[1];
   if (!tid || !tid.length || tid=="here") { // no target (or "here"), use containing tiddler
    tid=story.findContainingTiddler(place);
    if (tid) tid=tid.getAttribute("tiddler")
    else tid="SiteFields"; // fallback for 'non-tiddler' areas (e.g, header, sidebar, etc.)
   }
   var val=store.getValue(tid,field);
  }
  // not a slice or field, or slice/field not found... return value unchanged
  return val===undefined?p:val;
 }
}
//}}}
//{{{
// define alternative macroName for triggering pre-rendering call to eval()
config.macros.wikiCalc=config.macros.wikify;
//}}}
!
<!--{{{-->
<span class='yourSearchNumber' macro='foundTiddler number'></span>
<span class='yourSearchTitle' macro='foundTiddler title text 100'/></span> —
<span class='yourSearchTags' macro='foundTiddler field tags 0'/></span>
<!--}}}-->
/* |YourSearchPlugin v2.1.6 (2012-04-19)|http://tiddlywiki.abego-software.de/#YourSearchPlugin|https://github.com/abego/YourSearchPlugin|
|Author|UdoBorkowski (ub [at] abego-software [dot] de)|[[BSD open source license|http://www.abego-software.de/legal/apl-v10.html]]| */
///%
if(!version.extensions.YourSearchPlugin){version.extensions.YourSearchPlugin={major:2,minor:1,revision:6,source:"http://tiddlywiki.abego-software.de/#YourSearchPlugin",licence:"[[BSD open source license (abego Software)|http://www.abego-software.de/legal/apl-v10.html]]",copyright:"Copyright (c) abego Software GmbH, 2005-2012 (www.abego-software.de)"};if(!window.abego){window.abego={}}if(!Array.forEach){Array.forEach=function(c,e,d){for(var b=0,a=c.length;b<a;b++){e.call(d,c[b],b,c)}};Array.prototype.forEach=function(d,c){for(var b=0,a=this.length;b<a;b++){d.call(c,this[b],b,this)}}}abego.toInt=function(b,a){if(!b){return a}var c=parseInt(b);return(c==NaN)?a:c};abego.createEllipsis=function(a){var b=createTiddlyElement(a,"span");b.innerHTML="&hellip;"};abego.shallowCopy=function(b){if(!b){return b}var a={};for(var c in b){a[c]=b[c]}return a};abego.copyOptions=function(a){return !a?{}:abego.shallowCopy(a)};abego.countStrings=function(d,c){if(!c){return 0}var a=c.length;var f=0;var e=0;while(true){var b=d.indexOf(c,e);if(b<0){return f}f++;e=b+a}return f};abego.getBracedText=function(j,e,a){if(!e){e=0}var k=/\{([^\}]*)\}/gm;k.lastIndex=e;var d=k.exec(j);if(d){var l=d[1];var b=abego.countStrings(l,"{");if(!b){if(a){a.lastIndex=k.lastIndex}return l}var g=j.length;for(var f=k.lastIndex;f<g&&b;f++){var h=j.charAt(f);if(h=="{"){b++}else{if(h=="}"){b--}}}if(!b){if(a){a.lastIndex=f-1}return j.substring(d.index+1,f-1)}}};abego.select=function(d,c,b,a){if(!a){a=[]}d.forEach(function(e){if(c.call(b,e)){a.push(e)}});return a};abego.consumeEvent=function(a){if(a.stopPropagation){a.stopPropagation()}if(a.preventDefault){a.preventDefault()}a.cancelBubble=true;a.returnValue=true};abego.TiddlerFilterTerm=function(d,b){if(!b){b={}}var c=d;if(!b.textIsRegExp){c=d.escapeRegExp();if(b.fullWordMatch){c="\\b"+c+"\\b"}}var a=new RegExp(c,"m"+(b.caseSensitive?"":"i"));this.tester=new abego.MultiFieldRegExpTester(a,b.fields,b.withExtendedFields)};abego.TiddlerFilterTerm.prototype.test=function(a){return this.tester.test(a)};abego.parseNewTiddlerCommandLine=function(c){var a=/(.*?)\.(?:\s+|$)([^#]*)(#.*)?/.exec(c);if(!a){a=/([^#]*)()(#.*)?/.exec(c)}if(a){var d;if(a[3]){var b=a[3].replace(/#/g,"");d=b.parseParams("tag")}else{d=[[]]}var e=a[2]?a[2].trim():"";d.push({name:"text",value:e});d[0].text=[e];return{title:a[1].trim(),params:d}}else{return{title:c.trim(),params:[[]]}}};abego.parseTiddlerFilterTerm=function(queryText,offset,options){var re=/\s*(?:(?:\{([^\}]*)\})|(?:(=)|([#%!])|(?:(\w+)\s*\:(?!\/\/))|(?:(?:("(?:(?:\\")|[^"])+")|(?:\/((?:(?:\\\/)|[^\/])+)\/)|(\w+\:\/\/[^\s]+)|([^\s\)\-\"]+)))))/mg;var shortCuts={"!":"title","%":"text","#":"tags"};var fieldNames={};var fullWordMatch=false;re.lastIndex=offset;while(true){var i=re.lastIndex;var m=re.exec(queryText);if(!m||m.index!=i){throw"Word or String literal expected"}if(m[1]){var lastIndexRef={};var code=abego.getBracedText(queryText,0,lastIndexRef);if(!code){throw"Invalid {...} syntax"}var f=Function("tiddler","return ("+code+");");return{func:f,lastIndex:lastIndexRef.lastIndex,markRE:null}}if(m[2]){fullWordMatch=true}else{if(m[3]){fieldNames[shortCuts[m[3]]]=1}else{if(m[4]){fieldNames[m[4]]=1}else{var textIsRegExp=m[6];var text=m[5]?window.eval(m[5]):m[6]?m[6]:m[7]?m[7]:m[8];options=abego.copyOptions(options);options.fullWordMatch=fullWordMatch;options.textIsRegExp=textIsRegExp;var fields=[];for(var n in fieldNames){fields.push(n)}if(fields.length==0){options.fields=options.defaultFields}else{options.fields=fields;options.withExtendedFields=false}var term=new abego.TiddlerFilterTerm(text,options);var markREText=textIsRegExp?text:text.escapeRegExp();if(markREText&&fullWordMatch){markREText="\\b"+markREText+"\\b"}return{func:function(tiddler){return term.test(tiddler)},lastIndex:re.lastIndex,markRE:markREText?"(?:"+markREText+")":null}}}}}};abego.BoolExp=function(i,c,j){this.s=i;var h=j&&j.defaultOperationIs_OR;var e=/\s*\)/g;var f=/\s*(?:(and|\&\&)|(or|\|\|))/gi;var b=/\s*(\-|not)?(\s*\()?/gi;var a;var d=function(p){b.lastIndex=p;var l=b.exec(i);var o=false;var k=null;if(l&&l.index==p){p+=l[0].length;o=l[1];if(l[2]){var n=a(p);e.lastIndex=n.lastIndex;if(!e.exec(i)){throw"Missing ')'"}k={func:n.func,lastIndex:e.lastIndex,markRE:n.markRE}}}if(!k){k=c(i,p,j)}if(o){k.func=(function(m){return function(q){return !m(q)}})(k.func);k.markRE=null}return k};a=function(s){var n=d(s);while(true){var p=n.lastIndex;f.lastIndex=p;var k=f.exec(i);var o;var q;if(k&&k.index==p){o=!k[1];q=d(f.lastIndex)}else{try{q=d(p)}catch(r){return n}o=h}n.func=(function(t,m,l){return l?function(u){return t(u)||m(u)}:function(u){return t(u)&&m(u)}})(n.func,q.func,o);n.lastIndex=q.lastIndex;if(!n.markRE){n.markRE=q.markRE}else{if(q.markRE){n.markRE=n.markRE+"|"+q.markRE}}}};var g=a(0);this.evalFunc=g.func;if(g.markRE){this.markRegExp=new RegExp(g.markRE,j.caseSensitive?"mg":"img")}};abego.BoolExp.prototype.exec=function(){return this.evalFunc.apply(this,arguments)};abego.BoolExp.prototype.getMarkRegExp=function(){return this.markRegExp};abego.BoolExp.prototype.toString=function(){return this.s};abego.MultiFieldRegExpTester=function(b,a,c){this.re=b;this.fields=a?a:["title","text","tags"];this.withExtendedFields=c};abego.MultiFieldRegExpTester.prototype.test=function(b){var d=this.re;for(var a=0;a<this.fields.length;a++){var c=store.getValue(b,this.fields[a]);if(typeof c=="string"&&d.test(c)){return this.fields[a]}}if(this.withExtendedFields){return store.forEachField(b,function(e,g,f){return typeof f=="string"&&d.test(f)?g:null},true)}return null};abego.TiddlerQuery=function(b,a,d,c,e){if(d){this.regExp=new RegExp(b,a?"mg":"img");this.tester=new abego.MultiFieldRegExpTester(this.regExp,c,e)}else{this.expr=new abego.BoolExp(b,abego.parseTiddlerFilterTerm,{defaultFields:c,caseSensitive:a,withExtendedFields:e})}this.getQueryText=function(){return b};this.getUseRegExp=function(){return d};this.getCaseSensitive=function(){return a};this.getDefaultFields=function(){return c};this.getWithExtendedFields=function(){return e}};abego.TiddlerQuery.prototype.test=function(a){if(!a){return false}if(this.regExp){return this.tester.test(a)}return this.expr.exec(a)};abego.TiddlerQuery.prototype.filter=function(a){return abego.select(a,this.test,this)};abego.TiddlerQuery.prototype.getMarkRegExp=function(){if(this.regExp){return"".search(this.regExp)>=0?null:this.regExp}return this.expr.getMarkRegExp()};abego.TiddlerQuery.prototype.toString=function(){return(this.regExp?this.regExp:this.expr).toString()};abego.PageWiseRenderer=function(){this.firstIndexOnPage=0};merge(abego.PageWiseRenderer.prototype,{setItems:function(a){this.items=a;this.setFirstIndexOnPage(0)},getMaxPagesInNavigation:function(){return 10},getItemsCount:function(a){return this.items?this.items.length:0},getCurrentPageIndex:function(){return Math.floor(this.firstIndexOnPage/this.getItemsPerPage())},getLastPageIndex:function(){return Math.floor((this.getItemsCount()-1)/this.getItemsPerPage())},setFirstIndexOnPage:function(a){this.firstIndexOnPage=Math.min(Math.max(0,a),this.getItemsCount()-1)},getFirstIndexOnPage:function(){this.firstIndexOnPage=Math.floor(this.firstIndexOnPage/this.getItemsPerPage())*this.getItemsPerPage();return this.firstIndexOnPage},getLastIndexOnPage:function(){return Math.min(this.getFirstIndexOnPage()+this.getItemsPerPage()-1,this.getItemsCount()-1)},onPageChanged:function(a,b){},renderPage:function(a){if(a.beginRendering){a.beginRendering(this)}try{if(this.getItemsCount()){var d=this.getLastIndexOnPage();var c=-1;for(var b=this.getFirstIndexOnPage();b<=d;b++){c++;a.render(this,this.items[b],b,c)}}}finally{if(a.endRendering){a.endRendering(this)}}},addPageNavigation:function(c){if(!this.getItemsCount()){return}var k=this;var g=function(n){if(!n){n=window.event}abego.consumeEvent(n);var i=abego.toInt(this.getAttribute("page"),0);var m=k.getCurrentPageIndex();if(i==m){return}var l=i*k.getItemsPerPage();k.setFirstIndexOnPage(l);k.onPageChanged(i,m)};var e;var h=this.getCurrentPageIndex();var f=this.getLastPageIndex();if(h>0){e=createTiddlyButton(c,"Précédent","Page précédente (Raccourci: Alt-'<')",g,"prev");e.setAttribute("page",(h-1).toString());e.setAttribute("accessKey","<")}for(var d=-this.getMaxPagesInNavigation();d<this.getMaxPagesInNavigation();d++){var b=h+d;if(b<0){continue}if(b>f){break}var a=(d+h+1).toString();var j=b==h?"currentPage":"otherPage";e=createTiddlyButton(c,a,"Aller page %0".format([a]),g,j);e.setAttribute("page",(b).toString())}if(h<f){e=createTiddlyButton(c,"Suivant","Page suivante (Raccourci: Alt-'>')",g,"next");e.setAttribute("page",(h+1).toString());e.setAttribute("accessKey",">")}}});abego.LimitedTextRenderer=function(){var l=40;var c=4;var k=function(p,z,v){var q=p.length;if(q==0){p.push({start:z,end:v});return}var u=0;for(;u<q;u++){var w=p[u];if(w.start<=v&&z<=w.end){var o;var s=u+1;for(;s<q;s++){o=p[s];if(o.start>v||z>w.end){break}}var x=z;var y=v;for(var t=u;t<s;t++){o=p[t];x=Math.min(x,o.start);y=Math.max(y,o.end)}p.splice(u,s-u,{start:x,end:y});return}if(w.start>v){break}}p.splice(u,0,{start:z,end:v})};var d=function(n){var q=0;for(var p=0;p<n.length;p++){var o=n[p];q+=o.end-o.start}return q};var b=function(n){return(n>="a"&&n<="z")||(n>="A"&&n<="Z")||n=="_"};var f=function(p,r){if(!b(p[r])){return null}for(var o=r-1;o>=0&&b(p[o]);o--){}var q=o+1;var t=p.length;for(o=r+1;o<t&&b(p[o]);o++){}return{start:q,end:o}};var a=function(o,q,p){var n;if(p){n=f(o,q)}else{if(q<=0){return q}n=f(o,q-1)}if(!n){return q}if(p){if(n.start>=q-c){return n.start}if(n.end<=q+c){return n.end}}else{if(n.end<=q+c){return n.end}if(n.start>=q-c){return n.start}}return q};var j=function(r,q){var n=[];if(q){var u=0;do{q.lastIndex=u;var o=q.exec(r);if(o){if(u<o.index){var p=r.substring(u,o.index);n.push({text:p})}n.push({text:o[0],isMatch:true});u=o.index+o[0].length}else{n.push({text:r.substr(u)});break}}while(true)}else{n.push({text:r})}return n};var i=function(p){var n=0;for(var o=0;o<p.length;o++){if(p[o].isMatch){n++}}return n};var h=function(v,u,q,t,o){var w=Math.max(Math.floor(o/(t+1)),l);var n=Math.max(w-(q-u),0);var r=Math.min(Math.floor(q+n/3),v.length);var p=Math.max(r-w,0);p=a(v,p,true);r=a(v,r,false);return{start:p,end:r}};var m=function(r,y,o){var n=[];var v=i(r);var u=0;for(var p=0;p<r.length;p++){var x=r[p];var w=x.text;if(x.isMatch){var q=h(y,u,u+w.length,v,o);k(n,q.start,q.end)}u+=w.length}return n};var g=function(t,p,o){var n=o-d(p);while(n>0){if(p.length==0){k(p,0,a(t,o,false));return}else{var q=p[0];var v;var r;if(q.start==0){v=q.end;if(p.length>1){r=p[1].start}else{k(p,v,a(t,v+n,false));return}}else{v=0;r=q.start}var u=Math.min(r,v+n);k(p,v,u);n-=(u-v)}}};var e=function(p,x,w,n,o){if(n.length==0){return}var u=function(z,I,D,F,C){var H;var G;var E=0;var B=0;var A=0;for(;B<D.length;B++){H=D[B];G=H.text;if(F<E+G.length){A=F-E;break}E+=G.length}var y=C-F;for(;B<D.length&&y>0;B++){H=D[B];G=H.text.substr(A);A=0;if(G.length>y){G=G.substr(0,y)}if(H.isMatch){createTiddlyElement(z,"span",null,"marked",G)}else{createTiddlyText(z,G)}y-=G.length}if(C<I.length){abego.createEllipsis(z)}};if(n[0].start>0){abego.createEllipsis(p)}var q=o;for(var r=0;r<n.length&&q>0;r++){var t=n[r];var v=Math.min(t.end-t.start,q);u(p,x,w,t.start,t.start+v);q-=v}};this.render=function(p,q,o,t){if(q.length<o){o=q.length}var r=j(q,t);var n=m(r,q,o);g(q,n,o);e(p,q,r,n,o)}};(function(){function alertAndThrow(msg){alert(msg);throw msg}if(version.major<2||(version.major==2&&version.minor<1)){alertAndThrow("YourSearchPlugin requires TiddlyWiki 2.1 or newer.\n\nCheck the archive for YourSearch plugins\nsupporting older versions of TiddlyWiki.\n\nArchive: http://tiddlywiki.abego-software.de/archive")}abego.YourSearch={};var lastResults=undefined;var lastQuery=undefined;var setLastResults=function(array){lastResults=array};var getLastResults=function(){return lastResults?lastResults:[]};var getLastResultsCount=function(){return lastResults?lastResults.length:0};var matchInTitleWeight=4;var precisionInTitleWeight=10;var matchInTagsWeight=2;var getMatchCount=function(s,re){var m=s.match(re);return m?m.length:0};var standardRankFunction=function(tiddler,query){var markRE=query.getMarkRegExp();if(!markRE){return 1}var matchesInTitle=tiddler.title.match(markRE);var nMatchesInTitle=matchesInTitle?matchesInTitle.length:0;var nMatchesInTags=getMatchCount(tiddler.getTags(),markRE);var lengthOfMatchesInTitle=matchesInTitle?matchesInTitle.join("").length:0;var precisionInTitle=tiddler.title.length>0?lengthOfMatchesInTitle/tiddler.title.length:0;var rank=nMatchesInTitle*matchInTitleWeight+nMatchesInTags*matchInTagsWeight+precisionInTitle*precisionInTitleWeight+1;return rank};var findMatches=function(store,searchText,caseSensitive,useRegExp,sortField,excludeTag){lastQuery=null;var candidates=store.reverseLookup("tags",excludeTag,false);try{var defaultFields=[];if(config.options.chkSearchInTitle){defaultFields.push("title")}if(config.options.chkSearchInText){defaultFields.push("text")}if(config.options.chkSearchInTags){defaultFields.push("tags")}lastQuery=new abego.TiddlerQuery(searchText,caseSensitive,useRegExp,defaultFields,config.options.chkSearchExtendedFields)}catch(e){return[]}var results=lastQuery.filter(candidates);var rankFunction=abego.YourSearch.getRankFunction();for(var i=0;i<results.length;i++){var tiddler=results[i];var rank=rankFunction(tiddler,lastQuery);tiddler.searchRank=rank}if(!sortField){sortField="title"}var sortFunction=function(a,b){var searchRankDiff=a.searchRank-b.searchRank;if(searchRankDiff==0){if(a[sortField]==b[sortField]){return(0)}else{return(a[sortField]<b[sortField])?-1:+1}}else{return(searchRankDiff>0)?-1:+1}};results.sort(sortFunction);return results};var maxCharsInTitle=80;var maxCharsInTags=50;var maxCharsInText=250;var maxCharsInField=50;var itemsPerPageDefault=25;var itemsPerPageWithPreviewDefault=10;var yourSearchResultID="yourSearchResult";var yourSearchResultItemsID="yourSearchResultItems";var lastSearchText=null;var resultElement=null;var searchInputField=null;var searchButton=null;var lastNewTiddlerButton=null;var initStylesheet=function(){if(version.extensions.YourSearchPlugin.styleSheetInited){return}version.extensions.YourSearchPlugin.styleSheetInited=true;setStylesheet(store.getTiddlerText("YourSearchStyleSheet"),"yourSearch")};var isResultOpen=function(){return resultElement!=null&&resultElement.parentNode==document.body};var closeResult=function(){if(isResultOpen()){document.body.removeChild(resultElement)}};var closeResultAndDisplayTiddler=function(e){closeResult();var title=this.getAttribute("tiddlyLink");if(title){var withHilite=this.getAttribute("withHilite");var oldHighlightHack=highlightHack;if(withHilite&&withHilite=="true"&&lastQuery){highlightHack=lastQuery.getMarkRegExp()}story.displayTiddler(this,title);highlightHack=oldHighlightHack}return(false)};var adjustResultPositionAndSize=function(){if(!searchInputField){return}var root=searchInputField;var rootLeft=findPosX(root);var rootTop=findPosY(root);var rootHeight=root.offsetHeight;var popupLeft=rootLeft;var popupTop=rootTop+rootHeight;var winWidth=findWindowWidth();if(winWidth<resultElement.offsetWidth){resultElement.style.width=(winWidth-100)+"px";winWidth=findWindowWidth()}var popupWidth=resultElement.offsetWidth;if(popupLeft+popupWidth>winWidth){popupLeft=winWidth-popupWidth-30}if(popupLeft<0){popupLeft=0}resultElement.style.left=popupLeft+"px";resultElement.style.top=popupTop+"px";resultElement.style.display="block"};var scrollVisible=function(){if(resultElement){window.scrollTo(0,ensureVisible(resultElement))}if(searchInputField){window.scrollTo(0,ensureVisible(searchInputField))}};var ensureResultIsDisplayedNicely=function(){adjustResultPositionAndSize();scrollVisible()};var indexInPage=undefined;var currentTiddler=undefined;var pager=new abego.PageWiseRenderer();var MyItemRenderer=function(parent){this.itemHtml=store.getTiddlerText(".YourSearchItemTemplate");if(!this.itemHtml){alertAndThrow(".YourSearchItemTemplate not found")}this.place=document.getElementById(yourSearchResultItemsID);if(!this.place){this.place=createTiddlyElement(parent,"div",yourSearchResultItemsID)}};merge(MyItemRenderer.prototype,{render:function(pager,object,index,indexOnPage){indexInPage=indexOnPage;currentTiddler=object;var item=createTiddlyElement(this.place,"div",null,"yourSearchItem");item.innerHTML=this.itemHtml;applyHtmlMacros(item,null);refreshElements(item,null)},endRendering:function(pager){currentTiddler=null}});var refreshResult=function(){if(!resultElement||!searchInputField){return}var html=store.getTiddlerText("YourSearchResultTemplate");if(!html){html="<b>Tiddler YourSearchResultTemplate not found</b>"}resultElement.innerHTML=html;applyHtmlMacros(resultElement,null);refreshElements(resultElement,null);var itemRenderer=new MyItemRenderer(resultElement);pager.renderPage(itemRenderer);ensureResultIsDisplayedNicely()};pager.getItemsPerPage=function(){var n=(config.options.chkPreviewText)?abego.toInt(config.options.txtItemsPerPageWithPreview,itemsPerPageWithPreviewDefault):abego.toInt(config.options.txtItemsPerPage,itemsPerPageDefault);return(n>0)?n:1};pager.onPageChanged=function(){refreshResult()};var reopenResultIfApplicable=function(){if(searchInputField==null||!config.options.chkUseYourSearch){return}if((searchInputField.value==lastSearchText)&&lastSearchText&&!isResultOpen()){if(resultElement&&(resultElement.parentNode!=document.body)){document.body.appendChild(resultElement);ensureResultIsDisplayedNicely()}else{abego.YourSearch.onShowResult(true)}}};var invalidateResult=function(){closeResult();resultElement=null;lastSearchText=null};var isDescendantOrSelf=function(self,e){while(e!=null){if(self==e){return true}e=e.parentNode}return false};var onDocumentClick=function(e){if(e.target==searchInputField){return}if(e.target==searchButton){return}if(resultElement&&isDescendantOrSelf(resultElement,e.target)){return}closeResult()};var onDocumentKeyup=function(e){if(e.keyCode==27){closeResult()}};addEvent(document,"click",onDocumentClick);addEvent(document,"keyup",onDocumentKeyup);var myStorySearch=function(text,useCaseSensitive,useRegExp){lastSearchText=text;setLastResults(findMatches(store,text,useCaseSensitive,useRegExp,"title","excludeSearch"));abego.YourSearch.onShowResult()};var myMacroSearchHandler=function(place,macroName,params,wikifier,paramString,tiddler){initStylesheet();lastSearchText="";var searchTimeout=null;var doSearch=function(txt){if(config.options.chkUseYourSearch){myStorySearch(txt.value,config.options.chkCaseSensitiveSearch,config.options.chkRegExpSearch)}else{story.search(txt.value,config.options.chkCaseSensitiveSearch,config.options.chkRegExpSearch)}lastSearchText=txt.value};var clickHandler=function(e){doSearch(searchInputField);return false};var keyHandler=function(e){if(!e){e=window.event}searchInputField=this;switch(e.keyCode){case 13:if(e.ctrlKey&&lastNewTiddlerButton&&isResultOpen()){lastNewTiddlerButton.onclick.apply(lastNewTiddlerButton,[e])}else{doSearch(this)}break;case 27:if(isResultOpen()){closeResult()}else{this.value="";clearMessage()}break}if(String.fromCharCode(e.keyCode)==this.accessKey||e.altKey){reopenResultIfApplicable()}if(this.value.length<3&&searchTimeout){clearTimeout(searchTimeout)}if(this.value.length>2){if(this.value!=lastSearchText){if(!config.options.chkUseYourSearch||config.options.chkSearchAsYouType){if(searchTimeout){clearTimeout(searchTimeout)}var txt=this;searchTimeout=setTimeout(function(){doSearch(txt)},500)}}else{if(searchTimeout){clearTimeout(searchTimeout)}}}if(this.value.length==0){closeResult()}};var focusHandler=function(e){this.select();clearMessage();reopenResultIfApplicable()};var args=paramString.parseParams("list",null,true);var buttonAtRight=getFlag(args,"buttonAtRight");var sizeTextbox=getParam(args,"sizeTextbox",this.sizeTextbox);var txt=createTiddlyElement(null,"input",null,"txtOptionInput searchField",null);if(params[0]){txt.value=params[0]}txt.onkeyup=keyHandler;txt.onfocus=focusHandler;txt.setAttribute("size",sizeTextbox);txt.setAttribute("accessKey",this.accessKey);txt.setAttribute("autocomplete","off");if(config.browser.isSafari){txt.setAttribute("type","search");txt.setAttribute("results","5")}else{if(!config.browser.isIE){txt.setAttribute("type","text")}}var btn=createTiddlyButton(null,this.label,this.prompt,clickHandler);if(place){if(!buttonAtRight){place.appendChild(btn)}place.appendChild(txt);if(buttonAtRight){place.appendChild(btn)}}searchInputField=txt;searchButton=btn};var openAllFoundTiddlers=function(){closeResult();var results=getLastResults();var n=results.length;if(n){var titles=[];for(var i=0;i<n;i++){titles.push(results[i].title)}story.displayTiddlers(null,titles)}};var createOptionWithRefresh=function(place,optionParams,wikifier,tiddler){invokeMacro(place,"option",optionParams,wikifier,tiddler);var elem=place.lastChild;var oldOnClick=elem.onclick;elem.onclick=function(e){var result=oldOnClick.apply(this,arguments);refreshResult();return result};return elem};var removeTextDecoration=function(s){var removeThis=["''","{{{","}}}","//","<<<","/***","***/"];var reText="";for(var i=0;i<removeThis.length;i++){if(i!=0){reText+="|"}reText+="("+removeThis[i].escapeRegExp()+")"}return s.replace(new RegExp(reText,"mg"),"").trim()};var getShortCutNumber=function(){var i=indexInPage;return(i>=0&&i<=9)?(i<9?(i+1):0):-1};var limitedTextRenderer=new abego.LimitedTextRenderer();var renderLimitedText=function(place,s,maxLen){limitedTextRenderer.render(place,s,maxLen,lastQuery.getMarkRegExp())};var oldTiddlyWikiSaveTiddler=TiddlyWiki.prototype.saveTiddler;TiddlyWiki.prototype.saveTiddler=function(title,newTitle,newBody,modifier,modified,tags,fields){oldTiddlyWikiSaveTiddler.apply(this,arguments);invalidateResult()};var oldTiddlyWikiRemoveTiddler=TiddlyWiki.prototype.removeTiddler;TiddlyWiki.prototype.removeTiddler=function(title){oldTiddlyWikiRemoveTiddler.apply(this,arguments);invalidateResult()};config.macros.yourSearch={label:"yourSearch",prompt:"Gives access to the current/last YourSearch result",handler:function(place,macroName,params,wikifier,paramString,tiddler){if(params.length==0){return}var name=params[0];var func=config.macros.yourSearch.funcs[name];if(func){func(place,macroName,params,wikifier,paramString,tiddler)}},tests:{"true":function(){return true},"false":function(){return false},found:function(){return getLastResultsCount()>0},previewText:function(){return config.options.chkPreviewText}},funcs:{itemRange:function(place){if(getLastResultsCount()){var lastIndex=pager.getLastIndexOnPage();var s="%0 - %1".format([pager.getFirstIndexOnPage()+1,lastIndex+1]);createTiddlyText(place,s)}},count:function(place){createTiddlyText(place,getLastResultsCount().toString())},query:function(place){if(lastQuery){createTiddlyText(place,lastQuery.toString())}},version:function(place){var t="YourSearch %0.%1.%2".format([version.extensions.YourSearchPlugin.major,version.extensions.YourSearchPlugin.minor,version.extensions.YourSearchPlugin.revision]);var e=createTiddlyElement(place,"a");e.setAttribute("href","http://tiddlywiki.abego-software.de/#YourSearchPlugin");e.innerHTML='<font color="black" weight="bold" face="Arial, Helvetica, sans-serif">'+t+"<font>"},copyright:function(place){var e=createTiddlyElement(place,"a");e.setAttribute("href","http://www.abego-software.de");e.innerHTML='<font color="black" face="Arial, Helvetica, sans-serif">&copy; 2005-2019 <b><font color="blue">abego</font></b> Software<font>'},newTiddlerButton:function(place){if(lastQuery){var r=abego.parseNewTiddlerCommandLine(lastQuery.getQueryText());var btn=config.macros.newTiddler.createNewTiddlerButton(place,r.title,r.params,"","",null,"text");var oldOnClick=btn.onclick;btn.onclick=function(){closeResult();oldOnClick.apply(this,arguments)};lastNewTiddlerButton=btn}},linkButton:function(place,macroName,params,wikifier,paramString,tiddler){if(params<2){return}var tiddlyLink=params[1];var text=params<3?tiddlyLink:params[2];var tooltip=params<4?text:params[3];var accessKey=params<5?null:params[4];var btn=createTiddlyButton(place,text,tooltip,closeResultAndDisplayTiddler,null,null,accessKey);btn.setAttribute("tiddlyLink",tiddlyLink)},closeButton:function(place,macroName,params,wikifier,paramString,tiddler){createTiddlyButton(place,"Fermer","Fermer la zone de recherche (touche \'ESC\')",closeResult)},openAllButton:function(place,macroName,params,wikifier,paramString,tiddler){var n=getLastResultsCount();if(n==0){return}var title=n==1?"open tiddler":"Ouvrir les %0 articles".format([n]);var button=createTiddlyButton(place,title,"Ouvrir tous les articles (Raccourci : Alt-O)",openAllFoundTiddlers);button.setAttribute("accessKey","O")},naviBar:function(place,macroName,params,wikifier,paramString,tiddler){pager.addPageNavigation(place)},"if":function(place,macroName,params,wikifier,paramString,tiddler){if(params.length<2){return}var testName=params[1];var negate=(testName=="not");if(negate){if(params.length<3){return}testName=params[2]}var test=config.macros.yourSearch.tests[testName];var showIt=false;try{if(test){showIt=test(place,macroName,params,wikifier,paramString,tiddler)!=negate}else{showIt=(!eval(testName))==negate}}catch(ex){}if(!showIt){place.style.display="none"}},chkPreviewText:function(place,macroName,params,wikifier,paramString,tiddler){var elem=createOptionWithRefresh(place,"chkPreviewText",wikifier,tiddler);elem.setAttribute("accessKey","P");elem.title="Prévisualisation des articles (Raccourci : Alt-P)";return elem}}};config.macros.foundTiddler={label:"foundTiddler",prompt:"Provides information on the tiddler currently processed on the YourSearch result page",handler:function(place,macroName,params,wikifier,paramString,tiddler){var name=params[0];var func=config.macros.foundTiddler.funcs[name];if(func){func(place,macroName,params,wikifier,paramString,tiddler)}},funcs:{title:function(place,macroName,params,wikifier,paramString,tiddler){if(!currentTiddler){return}var shortcutNumber=getShortCutNumber();var tooltip=shortcutNumber>=0?"Ouvrir l\'article (Raccourci : Alt-%0)".format([shortcutNumber.toString()]):"Open tiddler";var btn=createTiddlyButton(place,null,tooltip,closeResultAndDisplayTiddler,null);btn.setAttribute("tiddlyLink",currentTiddler.title);btn.setAttribute("withHilite","true");renderLimitedText(btn,currentTiddler.title,maxCharsInTitle);if(shortcutNumber>=0){btn.setAttribute("accessKey",shortcutNumber.toString())}},tags:function(place,macroName,params,wikifier,paramString,tiddler){if(!currentTiddler){return}renderLimitedText(place,currentTiddler.getTags(),maxCharsInTags)},text:function(place,macroName,params,wikifier,paramString,tiddler){if(!currentTiddler){return}renderLimitedText(place,removeTextDecoration(currentTiddler.text),maxCharsInText)},field:function(place,macroName,params,wikifier,paramString,tiddler){if(!currentTiddler){return}var name=params[1];var len=params.length>2?abego.toInt(params[2],maxCharsInField):maxCharsInField;var v=store.getValue(currentTiddler,name);if(v){renderLimitedText(place,removeTextDecoration(v),len)}},number:function(place,macroName,params,wikifier,paramString,tiddler){var numberToDisplay=getShortCutNumber();if(numberToDisplay>=0){var text="%0)".format([numberToDisplay.toString()]);createTiddlyElement(place,"span",null,"shortcutNumber",text)}}}};var opts={chkUseYourSearch:true,chkPreviewText:true,chkSearchAsYouType:true,chkSearchInTitle:true,chkSearchInText:true,chkSearchInTags:true,chkSearchExtendedFields:true,txtItemsPerPage:itemsPerPageDefault,txtItemsPerPageWithPreview:itemsPerPageWithPreviewDefault};for(var n in opts){if(config.options[n]==undefined){config.options[n]=opts[n]}}config.shadowTiddlers.AdvancedOptions+="\n<<option chkUseYourSearch>> Use 'Your Search' ";config.shadowTiddlers.YourSearchStyleSheet="/***\n!~YourSearchResult Stylesheet\n***/\n/*{{{*/\n.yourSearchResult {\n\tposition: absolute;\n\twidth: 800px;\n\n\tpadding: 0.2em;\n\tlist-style: none;\n\tmargin: 0;\n\n\tbackground: #f0f8ff;\n\tborder: 1px solid DarkGray;\n}\n\n/*}}}*/\n/***\n!!Summary Section\n***/\n/*{{{*/\n.yourSearchResult .summary {\n\tborder-bottom-width: thin;\n\tborder-bottom-style: solid;\n\tborder-bottom-color: #999999;\n\tpadding-bottom: 4px;\n}\n\n.yourSearchRange, .yourSearchCount, .yourSearchQuery   {\n\tfont-weight: bold;\n}\n\n.yourSearchResult .summary .button {\n\tfont-size: 10px;\n\n\tpadding-left: 0.3em;\n\tpadding-right: 0.3em;\n}\n\n.yourSearchResult .summary .chkBoxLabel {\n\tfont-size: 10px;\n\n\tpadding-right: 0.3em;\n}\n\n/*}}}*/\n/***\n!!Items Area\n***/\n/*{{{*/\n.yourSearchResult .marked {\n\tbackground: none;\n\tfont-weight: bold;\n}\n\n.yourSearchItem {\n\tmargin-top: 2px;\n}\n\n.yourSearchNumber {\n\tcolor: #0000FF;\n}\n\n\n.yourSearchTags {\n\tcolor: #3333ff;\n}\n\n.yourSearchText {\n\tcolor: #000080;\n\tmargin-bottom: 6px;\n}\n\n/*}}}*/\n/***\n!!Footer\n***/\n/*{{{*/\n.yourSearchFooter {\n\tmargin-top: 8px;\n\tborder-top-width: thin;\n\tborder-top-style: solid;\n\tborder-top-color: #999999;\n}\n\n.yourSearchFooter a:hover{\n\tbackground: none;\n\tcolor: none;\n}\n/*}}}*/\n/***\n!!Navigation Bar\n***/\n/*{{{*/\n.yourSearchNaviBar a {\n\tfont-size: 16px;\n\tmargin-left: 4px;\n\tmargin-right: 4px;\n\tcolor: black;\n\ttext-decoration: underline;\n}\n\n.yourSearchNaviBar a:hover {\n\tbackground-color: none;\n}\n\n.yourSearchNaviBar .prev {\n\tfont-weight: bold;\n\tcolor: blue;\n}\n\n.yourSearchNaviBar .currentPage {\n\tcolor: #0000FF;\n\ttext-decoration: none;\n}\n\n.yourSearchNaviBar .next {\n\tfont-weight: bold;\n\tcolor: blue;\n}\n/*}}}*/\n";config.shadowTiddlers.YourSearchResultTemplate='<!--\n{{{\n-->\n<span macro="yourSearch if found">\n<!-- The Summary Header ============================================ -->\n<table class="summary" border="0" width="100%" cellspacing="0" cellpadding="0"><tbody>\n  <tr>\n\t<td align="left">\n\t\tYourSearch Result <span class="yourSearchRange" macro="yourSearch itemRange"></span>\n\t\t&nbsp;of&nbsp;<span class="yourSearchCount" macro="yourSearch count"></span>\n\t\tfor&nbsp;<span class="yourSearchQuery" macro="yourSearch query"></span>\n\t</td>\n\t<td class="yourSearchButtons" align="right">\n\t\t<span macro="yourSearch newTiddlerButton"></span>\n\t\t<span macro="yourSearch openAllButton"></span>\n\t\t<span macro="yourSearch closeButton"></span>\n\t</td>\n  </tr>\n</tbody></table>\n\n<!-- The List of Found Tiddlers ============================================ -->\n<div id="yourSearchResultItems" itemsPerPage="25" itemsPerPageWithPreview="10"></div>\n\n<!-- The Footer (with the Navigation) ============================================ -->\n<table class="yourSearchFooter" border="0" width="100%" cellspacing="0" cellpadding="0"><tbody>\n  <tr>\n\t<td align="left">\n\t\tNombre de pages : <span class="yourSearchNaviBar" macro="yourSearch naviBar"></span>\n\t</td>\n\t<td align="right"><span macro="yourSearch version"></span>, <span macro="yourSearch copyright"></span>\n\t</td>\n  </tr>\n</tbody></table>\n<!-- end of the \'tiddlers found\' case =========================================== -->\n</span>\n\n\n<!-- The "No tiddlers found" case =========================================== -->\n<span macro="yourSearch if not found">\n<table class="summary" border="0" width="100%" cellspacing="0" cellpadding="0"><tbody>\n  <tr>\n\t<td align="left">\n\t\tRecherche infructueuse: aucun article trouvé pour <span class="yourSearchQuery" macro="yourSearch query"></span>.\n\t</td>\n\t<td class="yourSearchButtons" align="right">\n\t\t<span macro="yourSearch closeButton"></span>\n\t</td>\n  </tr>\n</tbody></table>\n</span>\n\n\n<!--\n}}}\n-->\n';config.shadowTiddlers.YourSearchItemTemplate="<!--\n{{{\n-->\n<span class='yourSearchNumber' macro='foundTiddler number'></span>\n<span class='yourSearchTitle' macro='foundTiddler title'/></span>&nbsp;-&nbsp;\n<span class='yourSearchTags' macro='foundTiddler field tags 50'/></span>\n<span macro=\"yourSearch if previewText\"><div class='yourSearchText' macro='foundTiddler field text 250'/></div></span>\n<!--\n}}}\n-->";config.shadowTiddlers.YourSearch="<<tiddler [[YourSearch Help]]>>";config.shadowTiddlers["YourSearch Result"]="The popup-like window displaying the result of a YourSearch query.";config.macros.search.handler=myMacroSearchHandler;var checkForOtherHijacker=function(){if(config.macros.search.handler!=myMacroSearchHandler){alert("Message from YourSearchPlugin:\n\n\nAnother plugin has disabled the 'Your Search' features.\n\n\nYou may disable the other plugin or change the load order of \nthe plugins (by changing the names of the tiddlers)\nto enable the 'Your Search' features.")}};setTimeout(checkForOtherHijacker,5000);abego.YourSearch.getStandardRankFunction=function(){return standardRankFunction};abego.YourSearch.getRankFunction=function(){return abego.YourSearch.getStandardRankFunction()};abego.YourSearch.getCurrentTiddler=function(){return currentTiddler};abego.YourSearch.closeResult=function(){closeResult()};abego.YourSearch.getFoundTiddlers=function(){return lastResults};abego.YourSearch.getQuery=function(){return lastQuery};abego.YourSearch.onShowResult=function(useOldResult){highlightHack=lastQuery?lastQuery.getMarkRegExp():null;if(!useOldResult){pager.setItems(getLastResults())}if(!resultElement){resultElement=createTiddlyElement(document.body,"div",yourSearchResultID,"yourSearchResult")}else{if(resultElement.parentNode!=document.body){document.body.appendChild(resultElement)}}refreshResult();highlightHack=null}})()};
//%/
<<forEachTiddler where 'tiddler.tags.containsAll(["$1"])' sortBy 'tiddler.title.toUpperCase()' descending write '" [["+tiddler.title+"]] \"Consulter ["+tiddler.title+"]\" [["+tiddler.title+"]] "' begin '"<<tabs tAutoTab "' end '">"+">"' none '"////"'>>
<<forEachTiddler where 'tiddler.tags.containsAll(["$1"])' sortBy 'tiddler.title.toUpperCase()' descending write '" [["+tiddler.title.substr(0,4)+"]] \""+tiddler.title+"\" [["+tiddler.title+"]] "' begin '"<<tabs tAutoTab "' end '">"+">"' none '"////"'>>
<<forEachTiddler where 'tiddler.tags.containsAll(["$1"])' sortBy 'tiddler.title.toUpperCase()' descending write '" [["+tiddler.title.substr(0,7)+"]] \""+tiddler.title+"\" [["+tiddler.title+"]] "' begin '"<<tabs tAutoTab "' end '">"+">"' none '"////"'>>
<<forEachTiddler where 'tiddler.tags.containsAll(["$1"])' sortBy 'tiddler.title.toUpperCase()' descending write '"* [["+tiddler.title+"]] \n"'>><<forEachTiddler where 'tiddler.tags.containsAll(["$1"])' sortBy 'tiddler.title.toUpperCase()' descending write '" [["+tiddler.title+"]] \"Consulter ["+tiddler.title+"]\" [["+tiddler.title+"]] "' begin '"<<tabs tAutoTab "' end '">"+">"' none '"//Aucun élément.//"'>>
{{ss2col{
<<forEachTiddler where 'tiddler.tags.containsAll(["$1"])' sortBy 'tiddler.title.toUpperCase()' descending write '"* [["+tiddler.title+"]] \n"'>>}}}<<forEachTiddler where 'tiddler.tags.containsAll(["$1"])' sortBy 'tiddler.title.toUpperCase()' descending write '" [["+tiddler.title.substr(0,10)+"]] \"Consulter ["+tiddler.title+"]\" [["+tiddler.title+"]] "' begin '"<<tabs tAutoTab "' end '">"+">"' none '"//Aucun élément.//"'>>
{{ss2col{
<<forEachTiddler where 'tiddler.tags.containsAll(["$1"])' sortBy 'tiddler.title.toUpperCase()' descending write '"* [["+tiddler.title+"]] \n"'>>}}}<<forEachTiddler where 'tiddler.tags.containsAll(["$1"])' sortBy 'tiddler.title.toUpperCase()' descending write '" [["+tiddler.title.substring(13, tiddler.title.length)+"]] \"Consulter ["+tiddler.title+"]\" [["+tiddler.title+"]] "' begin '"<<tabs tAutoTab "' end '">"+">"' none '"//Aucun élément.//"'>>
<<forEachTiddler where 'tiddler.tags.containsAll(["$1"])' sortBy 'tiddler.title.toUpperCase()' descending write '" [["+tiddler.title.substr(0,10)+"]] \"["+tiddler.title+"]\" [["+tiddler.title+"]] "' begin '"<<tabs tAutoTab "' end '">"+">"' none '"//Aucun élément.//"'>>
<<forEachTiddler where 'tiddler.tags.containsAll(["$1"])' sortBy 'tiddler.title.toUpperCase()' descending write '"* [["+tiddler.title+"]]\n"' begin '""' end '""' none '"* Aucune publication pour le moment\n"'>>
<<forEachTiddler where 'tiddler.tags.containsAny(["$1"])' sortBy 'tiddler.title.toUpperCase()' descending write '(index < 24) ? "|"+tiddler.title.substr(0,10)+"|[["+tiddler.title.substr(13,254)+"|"+tiddler.title+"]]|\n" : ""' begin '"|Date|!$2 |\n"' end '""' none '"* Aucune publication\n"'>>
<<forEachTiddler where 'tiddler.tags.containsAny(["$1"])' sortBy 'tiddler.title.toUpperCase()' descending write '(index < 24) ? "• "+tiddler.title.substr(0,10)+" → [["+tiddler.title.substr(13,254)+"|"+tiddler.title+"]].\n" : ""' begin '"!!Date & $2\n"' end '""' none '"* Aucune publication\n"'>>
<<forEachTiddler where 'tiddler.tags.containsAll(["$1"])' sortBy 'tiddler.title.toUpperCase()' descending write '"* [["+tiddler.title+"]]+++[»] "+tiddler.title+" ===  \n"' begin '""' end '""' none '"* Rien pour le moment\n"'>>
[[Accueil]]
{{floatL{
|@@color:#00F;<html><i class="fa fa-home" aria-hidden="true"></i></html>@@|__[[Accueil]]__|
|@@color:#00F;<html><i class="fa fa-chalkboard-teacher" aria-hidden="true"></i></html>@@|__[[CSA FR|Chapitre Français]]__|
|@@color:#00F;<html><i class="fa fa-info-circle" aria-hidden="true"></i></html>@@|__[[Actualités]]__|
|@@color:#00F;<html><i class="fa fa-blog" aria-hidden="true"></i></html>@@|__[[Blog]]__|
|@@color:#00F;<html><i class="fa fa-book" aria-hidden="true"></i></html>@@|__[[Publications]]__|
|@@color:#00F;<html><i class="fa fa-eye" aria-hidden="true"></i></html>@@|__[[Veille Web]]__|
|@@color:#00F;<html><i class="fa fa-pencil-alt" aria-hidden="true"></i></html>@@|__[[Newsletters]]__|
|@@color:#00F;<html><i class="fa fa-book-reader" aria-hidden="true"></i></html>@@|__[[Références]]__|
|@@color:#00F;<html><i class="fa fa-tools" aria-hidden="true"></i></html>@@|__[[Outils]]__|
|@@color:#00F;<html><i class="fa fa-exclamation-triangle" aria-hidden="true"></i></html>@@|__[[Alertes|Alertes et Vulnérabilités]]__|
|@@color:#00F;<html><i class="fa fa-podcast" aria-hidden="true"></i></html>@@|__[[Podcasts]]__|
|@@color:#00F;<html><i class="fa fa-video" aria-hidden="true"></i></html>@@|__[[Webinars|CloudBytes]]__|
|@@color:#00F;<html><i class="fa fa-calendar-alt" aria-hidden="true"></i></html>@@|__[[Agenda]]__|
|@@color:#00F;<html><i class="fa fa-archive" aria-hidden="true"></i></html>@@|__[[Archives]]__|
|[img[iCSF/flag_fr.png]]|__[[Traductions]]__|
|ssTableNo|k
|^^→^^|^^[[Contact]]^^|
[img[LinkedIN|iCSF/In.png][LinkedIN]][img[Slack|iCSF/Slack_icon2.png][Slack]][img[Twitter|iCSF/Twitter_icon.png][Twitter]][img[iCSF/inEnglish.png][in English]]<<search 'Moteur de Recherche'>>[img(50%,1px)[iCSF/BluePixel.gif]]<<tiddler RollLeftCol>>[img(50%,1px)[iCSF/BluePixel.gif]]}}}
In this article, you can find the translation of the ''Menu'', and the links to all ''Weekly Newsletters'' published in English - that is since early February 2020.
<<tabs tEnglish 'Menu' 'Menu' [[in English##Menu]] 'Weekly Newsletters' 'All weekly Newsletters in English' [[in English##Actu]]>>
/%
!Menu
{{floatL{
|!Icon|!Menu in French|!Menu in English|
| @@color:#00F;<html><i class="fa fa-home" aria-hidden="true"></i></html>@@ |[[Accueil]]|[[Home|Accueil]]|
| @@color:#00F;<html><i class="fa fa-chalkboard-teacher" aria-hidden="true"></i></html>@@ |[[CSA FR|Chapitre Français]]|[[French Chapter|Chapitre Français]]|
| @@color:#00F;<html><i class="fa fa-info-circle" aria-hidden="true"></i></html>@@ |[[Actualités]]|[[News|Actualités]]|
| @@color:#00F;<html><i class="fa fa-blog" aria-hidden="true"></i></html>@@ |[[Blog]]|[[Blog]]|
| @@color:#00F;<html><i class="fa fa-book" aria-hidden="true"></i></html>@@ |[[Publications]]|[[Artefacts and Publications|Publications]]|
| @@color:#00F;<html><i class="fa fa-eye" aria-hidden="true"></i></html>@@ |[[Veille Web]]|[[Cloud and Security watch|Veille Web]]|
| @@color:#00F;<html><i class="fa fa-pencil-alt" aria-hidden="true"></i></html>@@ |[[Newsletters]]|[[Weekly newsletters|Newsletters]]|
| @@color:#00F;<html><i class="fa fa-book-reader" aria-hidden="true"></i></html>@@ |[[Références]]|[[Sites and documents of reference|Références]]|
| @@color:#00F;<html><i class="fa fa-tools" aria-hidden="true"></i></html>@@ |[[Outils]]|[[Cloud and Security tools|Outils]]|
| @@color:#00F;<html><i class="fa fa-exclamation-triangle" aria-hidden="true"></i></html>@@ |[[Alertes|Alertes et Vulnérabilités]]|[[Alerts et Vulnerabilities|Alertes et Vulnérabilités]]|
| @@color:#00F;<html><i class="fa fa-podcast" aria-hidden="true"></i></html>@@ |__[[Podcasts]]__|__[[CSA Podcasts|Podcasts]]__|
| @@color:#00F;<html><i class="fa fa-video" aria-hidden="true"></i></html>@@ |__[[Webinars|CloudBytes]]__|__[[CloudBytes Webinars|CloudBytes]]__|
| @@color:#00F;<html><i class="fa fa-archive" aria-hidden="true"></i></html>@@ |[[Archives]]|[[Site archives since 2010|Archives]]|
|[img[iCSF/flag_fr.png]]|__[[Traductions]]__|__[[CSA documents translated into French|Traductions]]__|
| → |[[Contact]]|[[How to contact a French Chapter representative|Contact]]|
|>|>| [img[LinkedIN|iCSF/In.png][LinkedIN]][img[Slack|iCSF/Slack_icon2.png][Slack]][img[Twitter|iCSF/Twitter_icon.png][Twitter]] |
|>|>| Search engine: <<search>> |
}}}
!Actu
<<tiddler fAll2LiTabs10 with: ActuEN","_EN_>>
!end
%/
Chapitre Français •<<tiddler .ToggleLeftSidebar>>•
Cloud Security Alliance
[[myCSS]]
<!--{{{-->
<div class='toolbar' macro='toolbar [[ToolbarCommands::ViewToolbar]]'></div>
<div class='title' macro='view title'></div>
<div class='viewer' macro='view text wikified'></div>
<div class='viewer' macro='tiddler ReplaceDoubleClick'></div>
<div class='tagClear'></div>
<!--}}}-->
//{{{
config.options.txtUserName='CSA-FR';
config.options.chkAnimate=false;
config.options.chkRegExpSearch=false;
config.options.chkCaseSensitiveSearch=false;
config.options.chkOpenInNewWindow=true;
config.messages.tiddlerLinkTooltip="→ %0";
config.messages.externalLinkTooltip="→ %0";
config.options.chkHideSiteTitles=true;
config.macros.search.prompt="Recherche sur ce site";
config.macros.search.successMsg="%1 → %0 article(s)";
config.macros.search.failureMsg="%0 → Aucun article";
config.macros.search.label="Recherche";
merge(config.views.wikified,{ dateFormat: "0DD.0MM.YYYY",});
merge(config.macros.search,{ label: "", prompt: "Moteur de recherche local",});
config.options.chkUseYourSearch=true;
config.options.chkPreviewText=false;
config.options.chkSearchAsYouType=true;
config.options.chkSearchInTitle=true;
config.options.chkSearchInText=true;
config.options.chkSearchInTags=true;
config.options.chkSearchExtendedFields=false;
config.options.txtItemsPerPage=10;
config.options.txtItemsPerPageWithPreview=10;
config.options.chkShowLeftSidebar=true;
config.options.chkDisableWikiLinks=true;
config.options.chkAllowLinksFromShadowTiddlers=true;
config.options.chkDisableNonExistingWikiLinks=true;
config.options.chkSinglePageAutoScroll=true;
config.options.chkSinglePagePermalink=false;
config.options.chkSinglePageMode=false;
config.options.chkTopOfPageMode=true;
config.options.chkBottomOfPageMode=false;
config.options.chkShowBreadcrumbs=true;
config.options.txtBreadcrumbsLimit=8;
config.options.chkReorderBreadcrumbs=true;
config.options.txtBreadcrumbsCrumbSeparator="  <html><i class='fa fa-shoe-prints' aria-hidden='true'></i><i class='fa fa-shoe-prints' aria-hidden='true'></i></html>  ";
config.options.chkBreadcrumbsSave=false;
config.options.chkShowStartupBreadcrumbs=false;
config.options.chkBreadcrumbsReverse=false;
config.options.chkBreadcrumbsLimitOpenTiddlers=true;
config.options.txtBreadcrumbsLimitOpenTiddlers=20;
config.options.chkBreadcrumbsHideHomeLink=false;
config.options.chkCreateDefaultBreadcrumbs=true;
readOnly=true;
config.options.chkHttpReadOnly=true;
config.options.chkBackstage=false;
showBackstage=false;
merge(config.shadowTiddlers,{ ToolbarCommands: '|~ViewToolbar|closeTiddler closeOthers|\n|~EditToolbar|+saveTiddler -cancelTiddler deleteTiddler|',});
merge(config.commands.closeTiddler,{ text: "[fermer]", tooltip: "Fermer cet article" });
merge(config.commands.closeOthers,{ text: "[isoler]", tooltip: "Fermer les autres articles" });
//}}}
/*{{{*/
.ssCol30 {width:30%; float:left; margin-left:1%; margin-right:1%; border-color:#00F; border-style:solid; border-width:3px; }
.ssCol45 {width:45%; float:left; margin-left:1%;}
/* multi-column tiddler content (not supported in Internet Explorer) */
.ss2col { display:block;
 -moz-column-count:2; -moz-column-gap:1em; -moz-column-width:50%; /* FireFox */
 -webkit-column-count:2; -webkit-column-gap:1em; -webkit-column-width:50%; /* Safari */
 column-count:2; column-gap:1em; column-width:50%; /* Opera */
}
.clear {clear:both;}
.ssTableNo,
.ssTableNo table,
.ssTableNo td,
.ssTableNo tr,
.ssTableNo th,
.ssTableNo tbody
{ border:0 !important; }
/* {font-size:.70em;} */
body {font-size:.8em;font-family:Verdana,times,serif; margin:0; padding:0;}
pre, .tagged, .tagging, #messageArea, .popup, .tiddlyLink, .button { border-radius: 5px; }
.tiddlyLink { padding: 0px 2px; margin: 0 -2px; }
img[align="left"] { margin-right: .5em; }
img[align="right"] { margin-left: .5em; }
.toolbar {text-align:left; font-size:.7em;}
img {border:2px solid [[ColorPalette::Background]];}
.headerShadow {position:relative; padding:0.5em 0em 1em 1em; left:-1px; top:-1px;}
.headerForeground {position:absolute; padding:0.5em 0em 1em 1em; left:0px; top:0px;}
.headerShadow .right { position: absolute; top: 0; }
.headerShadow .right { right: 0; }
.headerForeground .right { display: none; }
/* InlineTabs */
.tabSelected {font-weight:bold; font-size:125%; color:[[ColorPalette::PrimaryDark]]; background:[[ColorPalette::TertiaryPale]]; border-left:2px solid [[ColorPalette::PrimaryMid]]; border-top:2px solid [[ColorPalette::PrimaryLight]]; border-right:2px solid [[ColorPalette::PrimaryMid]]; border-bottom-style:2px solid [[ColorPalette::PrimaryMid]]; }
.tabContents {color:[[ColorPalette::PrimaryDark]]; background:[[ColorPalette::Background]]; border:2px solid [[ColorPalette::PrimaryMid]];}
/* StyleSheetRotate90 */
.ssRot90 { float:left; width:0.6em; font-size:100%; font-family:Verdana,times,serif; line-height:60%; color:#00f !important; background:inherit !important; transform: rotate(90deg);}
/* StyleSheetFirstLetter */
.firstletter { float:left; width:0.6em; font-size:250%; font-family:Verdana,times,serif; line-height:60%; color:#00f !important; background:inherit !important; }
.firstletterC { float:center; width:0.6em; font-size:250%; line-height:60%; color:#00f !important; background:inherit !important; }
.FirstLetter { width:0.6em; font-size:150%; font-family:Verdana,times,serif; line-height:60%; !important; background:inherit !important; }
/* StyleSheetTableList */
.viewer ul {margin-top: 0; margin-bottom: 0;}
.viewer {text-align: justify;}
.viewer th {background:[[ColorPalette::TertiaryPale]]; color:[[ColorPalette::PrimaryMid]];}
/* Alignement */
.floatL { display:block;text-align:left; }
.floatR { display:block;text-align:right; }
.floatC { display:block;text-align:center; }
.ssTabl99 {width:99%}
.ssTabl96 {width:96%}
.ssTabl2,
.ssTabl2 td,
.ssTabl2 th,
.ssTabl2 tbody
{table-layout:fixed; width:98%; }

/* NestedSlidersPlugin */
.floatingPanel { z-index:700; padding:1em; margin:0em; border:1px solid; -moz-border-radius:1em; font-size:8pt; text-align:left; }
.floatingPanel hr { margin:2px 0 1px 0; padding:0; }
#sidebarOptions .sliderPanel { margin:0; padding:0; font-size:1em; background:transparent; }
#sidebarOptions .sliderPanel a { font-weight:normal; }
#sidebarOptions .sliderPanel blockquote { margin:0;padding:0;margin-left:1em; border-left:1px dotted; padding-left:1em }
.selected .floatingPanel .button,
.selected .floatingPanel a:link,
.selected .floatingPanel a:hover,
.selected .floatingPanel a:visited,
.floatingPanel .button,
.floatingPanel a:link,
.floatingPanel a:hover,
.floatingPanel a:visited { color:[[ColorPalette::PrimaryDark]] !important; }
.QOTD { color:#00f !important; background:inherit !important; }
.horizTag li.listTitle { display:none }
.horizTag li { display: inline; font-size:90%; }
.horizTag ul { display:inline; margin:0px; padding:0px;}
.viewer td { vertical-align: top; }
.viewer th { vertical-align: top; }
.viewer dl { margin: 0; }
/*}}}*/
[img(400px,4px)[iCSF/BluePixel.gif]]
[img(200px,auto)[iCSF/Email-CSA_FR.png]]
|ssTabl99|k
| ^^<<tiddler [[Categories]]>>^^ |
| <<tiddler RollHeader>> |
[>img(200px,auto)[iCSF/cloud-security-alliance.png]]Le [[Chapitre Français]] de la [[Cloud Security Alliance]] est une association formée pour faire la promotion des meilleures pratiques de sécurité au sein des infrastructures Cloud Computing.
Il se charge notamment :
* d'adapter certains documents de la [[Cloud Security Alliance]] aux spécificités françaises (notamment réglementaires)
* de favoriser les bonnes pratiques de sécurité auprès des prestataires et founisseurs de Cloud français et auprès des Entreprises qui batissent des Clouds Privés
* de publier de nouvelles recommandations de sécurité relatives au Cloud Computing
* de traduire certains documents de la [[Cloud Security Alliance]] en français
* de mener des actions pour former et évangéliser sur la sécurité du Cloud Computing
* de participer à la communauté des chapitres européens regroupés sous l'appellation "''CSA EMEA''"[>img(200px,auto)[iCSF/CSA-EMEA.png]]
* d'établir des relations avec la presse et avec des groupes de travail similaires traitant soit du Cloud Computing, soit de la Sécurité
* de participer à tout type d'événements ou de conférences liés à la sécurité du Cloud Computing
[img(25%,1px)[iCSF/BluePixel.gif]]
Le site du [[Chapitre Français]] de la [[Cloud Security Alliance]] est https://www.CloudSecurityAlliance.fr/
[img(25%,1px)[iCSF/BluePixel.gif]]
<<tiddler [[Partenariats - ISEP-FC - Masteres Spécialisés]]>>
Le site de la [[Cloud Security Alliance]] est https://www.CloudSecurityAlliance.org/
[img(25%,1px)[iCSF/BluePixel.gif]]
{{floatC{[img(400px,auto)[iCSF/Email-CSA_FR.png]]
[img(100px,auto)[iCSF/Cloud_Question.png]]
@@font-size:75%;@@
+++*[Protection des données] <<tiddler [[Protection des Données]]>>=== }}}
| !Sur les aspects protection des données, RGPD et similaires, et pour les éléments suivants | !la réponse est simple |
| • Identité et coordonnées du responsable de traitement •
• Identité et coordonnées du délégué à la protection des données •
• Catégories de données collectées •
• Finalités du traitement •
• Base juridique du traitement •
• Destinataires des données •
• Transferts de données en dehors de l'UE •
• Conservation des données •
• Exercice des droits •
• Soumission d'une réclamation auprès de l'autorité de contrôle •
• Cookies • | ''c'est sans objet''
car ...
• aucune donnée n'est collectée sur le site •
• aucun cookie n'est utilisé •
• aucun traitement de données n'est réalisé •
[img(50%,1px)[iCSF/BluePixel.gif]]
Pour toute demande de précision, utilisez l'adresse
[img(200px,auto)[iCSF/Email-CSA_FR.png]]
[img(50%,1px)[iCSF/BluePixel.gif]] |
<<tabs tHisto 'Archives 2020' 'Archives 2020' [[Archives 2020]] 'Archives 2019' 'Archives 2019' [[Archives 2019]] 'Archives 2018' 'Archives 2018' [[Archives 2018]] 'Archives 2017' 'Archives 2017' [[Archives 2017]] 'Archives 2016' 'Archives 2016' [[Archives 2016]] 'Archives 2015' 'Archives 2015' [[Archives 2015]] 'Archives 2014' 'Archives 2014' [[Archives 2014]] 'Archives 2013' 'Archives 2013' [[Archives 2013]] 'Archives 2012' 'Archives 2012' [[Archives 2012]] 'Archives 2011' 'Archives 2011' [[Archives 2011]] 'Archives 2010' 'Archives 2010' [[Archives 2010]] 'Archives 2009' 'Archives 2009' [[Archives 2009]] 'Archives 2008' 'Archives 2008' [[Archives 2008]] >> 
<<tiddler fAll2Tabs7 with: _Histo20>><<tiddler .ReplaceTiddlerTitle with: [[Archives 2020]]>>
<<tiddler fAll2Tabs7 with: _Histo19>><<tiddler .ReplaceTiddlerTitle with: [[Archives 2019]]>>
<<tiddler fAll2Tabs7 with: _Histo18>><<tiddler .ReplaceTiddlerTitle with: [[Archives 2018]]>>
Les archives ''2017'' sont en cours de reconstruction
<<tiddler fAll2Tabs7 with: _Histo17>><<tiddler .ReplaceTiddlerTitle with: [[Archives 2017]]>>
Les archives ''2016'' sont en cours de reconstruction
<<tiddler fAll2Tabs7 with: _Histo16>><<tiddler .ReplaceTiddlerTitle with: [[Archives 2016]]>>
Les archives ''2015'' sont en cours de reconstruction
<<tiddler fAll2Tabs7 with: _Histo15>><<tiddler .ReplaceTiddlerTitle with: [[Archives 2015]]>>
Les archives ''2014'' sont en cours de reconstruction
<<tiddler fAll2Tabs7 with: _Histo14>><<tiddler .ReplaceTiddlerTitle with: [[Archives 2014]]>>
Les archives ''2013'' sont en cours de reconstruction
<<tiddler fAll2Tabs7 with: _Histo13>><<tiddler .ReplaceTiddlerTitle with: [[Archives 2013]]>>
Les archives ''2012'' sont en cours de reconstruction
<<tiddler fAll2Tabs7 with: _Histo12>><<tiddler .ReplaceTiddlerTitle with: [[Archives 2012]]>>
Les archives ''2011'' sont en cours de reconstruction
<<tiddler fAll2Tabs7 with: _Histo11>><<tiddler .ReplaceTiddlerTitle with: [[Archives 2011]]>>
Les archives ''2010'' sont en cours de reconstruction
<<tiddler fAll2Tabs7 with: _Histo10>><<tiddler .ReplaceTiddlerTitle with: [[Archives 2010]]>>
Les archives ''2009'' sont en cours de reconstruction
<<tiddler fAll2Tabs7 with: _Histo09>><<tiddler .ReplaceTiddlerTitle with: [[Archives 2009]]>>
Les archives ''2008'' sont en cours de reconstruction
<<tiddler fAll2Tabs7 with: _Histo08>><<tiddler .ReplaceTiddlerTitle with: [[Archives 2008]]>>
<script label="[?]" title="affiche une aide pour naviguer sur ce site">
if (window.version) {
var msg='Aide à la navigation sur ce site\n'
+'• Texte en bleu gras : lien direct vers un article\n'
+'• ◄▷ : masque/affiche le menu à gauche\n'
+'• » : déplier/replier opour accéder à un article, un URL ou des détails\n'
+'• [?] : cette aide  ... :-)\n';
alert(msg); } return false;
</script> • Catégories : [[CAIQ]] • [[CCAK]] • [[CCM]] • [[CCSK]] • [[Cryptographie]] • [[ERP]] • [[Incidents]] • [[IoT]] • [[Menaces]] • [[Panorama]] • [[RGPD]] • [[Santé|Publications - Santé]] • [[SDP]] • [[STAR]] • [[Vulnérabilités]] •
Exemple d'article
<<tiddler [[CSA Circle]]>>
Pour rejoindre l'espace collaboratif [[CSA Circle]] du [[Chapitre Français]], rien de plus simple :
* Suivre ''[[CloudSecurityAlliance.fr/go/Circle|https://CloudSecurityAlliance.fr/go/Circle]]''.
* Cliquer sur le bouton rouge "Sign In" [img(40px,auto)[iCSF/OSignIn.jpg]] en haut à droite de l'écran.
* S'enregistrer en sélectionnant le bouton "Sign Up" [img(40px,auto)[iCSF/OSignUp.jpg]].
* Une fois connecté, afficher les communautés [img(60px,auto)[iCSF/OCommunities.jpg]] et choisir ''France Chapter'' pour s'inscrire.
<<tiddler fAll2LiTabs13end with: _CloudBytes>>
!Le [[Chapitre Français|CSA-FR]] de la [[Cloud Security Alliance]]
[>img(200px,auto)[iCSF/cloud-security-alliance.png]]
Le [[Chapitre Français|CSA-FR]] de la [[Cloud Security Alliance]] a été créé en décembre 2010 par ''[[Olivier Caleff|https://www.linkedin.com/in/caleff]]'' et ''[[Pierre Vacherand|https://www.linkedin.com/in/pierrevacherand/]]''.
Après un bon début, le [[Chapitre français|CSA-FR]] a tourné au ralenti entre 2013 et 2017.
Les activités se sont concentrées autour de participations et contributions à des événements de la [[Cloud Security Alliance]] en Europe, à des participations dans des groupes de travail de la [[Cloud Security Alliance]], et à une participation très active dans le domaine de la formation (voir ci-dessous)
En 2018, les activités reprennent avec :
* La participation à deux salons (Mars et Novembre 2018)
* La poursuite des partenariats pour les activités de formation
* L'animation du groupe LinkedIn : https://www.linkedin.com/groups/3758242
* La préparation de la relance des réunions des membres du [[Chapitre français|CSA-FR]]
__Contact :__ https://CloudSecurityAlliance.fr et [img(200px,auto)[iCSF/Email-CSA_FR.png]]
!Les partenariats
<<tiddler [[Partenariats - ISEP-FC - Masteres Spécialisés]]>>
<<tabs tCSA 'Présentation' 'Présentation' [[Cloud Security Alliance##Pres]] 'Historique' 'Historique' [[Cloud Security Alliance##Histo]] 'Mission' 'Mission' [[Cloud Security Alliance##Mission]] 'Groups de Travail' 'Groupes de Travail' [[Cloud Security Alliance##WG]] 'Liens' 'Liens' [[Cloud Security Alliance##Links]]>>
/%
!Pres
__''Présentation''__[>img(200px,auto)[iCSF/cloud-security-alliance.png]]

La [[Cloud Security Alliance]] (CSA) est une organisation à but non lucratif qui a pour mission :
* de promouvoir de bonnes pratiques en matière d'assurance de la sécurité dans le Cloud Computing
* de fournir des formations sur les utilisations du Cloud Computing pour aider à sécuriser toutes les autres formes d'informatique
La [[Cloud Security Alliance]] est dirigée par une vaste coalition de praticiens de l'industrie, d'entreprises, d'associations et d'autres intervenants clés.
[img(25%,1px)[iCSF/BluePixel.gif]]
!Histo
__''Historique''__[>img(200px,auto)[iCSF/cloud-security-alliance.png]]

Les enjeux et opportunités du cloud computing ont fait l'objet d'une attention particulière en 2008 au sein de la communauté de la sécurité de l'information.
Lors du forum CISO de l'ISSA à Las Vegas, en novembre 2008, le concept de d'une Alliance pour la sécurité du Cloud Computing ([[Cloud Security Alliance]]) a vu le jour. Après une présentation des tendances émergentes par ''[[Jim Reavis|https://www.linkedin.com/in/jimreavis/]]'', dont un appel à l'action pour la sécurisation du cloud computing, ''Jim Reavis'' et ''[[Nils Puhlmann|https://www.linkedin.com/in/npuhlmann/]]'' ont présenté la mission et la stratégie initiales de la CSA. Une série de réunions organisationnelles avec des chefs de file de l'industrie au début de décembre 2008 a officialisé la fondation de la CSA.
Le travail de sensibilisation auprès de la communauté de la sécurité de l'information pour créer un support de travail initial en vue de la Conférence RSA 2009 a donné lieu à des échanges entre des dizaines de bénévoles pour la recherche, l'auteur, la rédaction et la révision du premier livre blanc.
[img(25%,1px)[iCSF/BluePixel.gif]]
!Mission
__''Mission''__[>img(200px,auto)[iCSF/cloud-security-alliance.png]]

Promouvoir l'utilisation des meilleures pratiques pour fournir une assurance de sécurité dans le Cloud Computing, et fournir de l'éducation sur les utilisations du Cloud Computing pour aider à sécuriser toutes les autres formes d'informatique.
[img(25%,1px)[iCSF/BluePixel.gif]]
!WG
__''Groupes de Travail''__

<<tiddler [[Groupes de Travail]]>>
[img(25%,1px)[iCSF/BluePixel.gif]]
!Links
__''Liens''__

{{ss2col{
* ''Site Web CSA'' → https://CloudSecurityAlliance.org 
* ''Flux RSS'' → https://cloudsecurityalliance.org/feed/
* Annonces → https://cloudsecurityalliance.org/articles/ 
* Presse → https://blog.cloudsecurityalliance.org/press-coverage/ 
* Blog → https://blog.cloudsecurityalliance.org/ 
* Recherche → https://cloudsecurityalliance.org/research/
* Commentaires → https://cloudsecurityalliance.org/research/contribute/ 
* Groupes de travail → https://cloudsecurityalliance.org/meetings/ 
* Publications → https://cloudsecurityalliance.org/research/artifacts/ 
* Registre ''STAR'' → https://cloudsecurityalliance.org/star/registry/ 
* Aspects ''RGPD'' → https://gdpr.cloudsecurityalliance.org/ 
* Formation ''CCAK'' → https://cloudsecurityalliance.org/education/ccak/ 
* Formation ''CCSK'' → https://ccsk.cloudsecurityalliance.org/ 
* Groupe __LinkedIN__ → https://www.linkedin.com/groups/1864210/profile 
* Flux __Twitter__ → https://twitter.com/cloudsa
}}}[img(25%,1px)[iCSF/BluePixel.gif]]
!end
%/
<<tiddler [[Cloud Security Alliance]]>>
[>img(100px,auto)[iCSA/K4QCCSK.png]]Le [[Chapitre Français]] participe à l'organisation de sessions de formation officielle et ''certifiante'' [[CCSK]] ''en français'' ''CCSK Foundation'' et le ''CCSK Plus''.

Les prochaines sessions auront lieu :
* ''lundi 31 août et mardi 1er septembre'' 2020 : session CCSK Foundation
* lundi 31 août, mardi 1er et ''mercredi 2 septembre'' 2020 : session CCSK Plus
* ''lundi 3 et mardi 24 novembre 2020'' : session CCSK Foundation
* lundi 3, mardi 24 et ''mercredi 25 novembre 2020'' : session CCSK Plus

Elle comprennent tous les modules théoriques, ainsi que des exercices pratiques dans le cloud AWS (CCSK Plus), ainsi que la possibilité de passer l'examen de certification CCSK.

Elles sont dispensées par ''Guillaume Boutisseau'', ''CCSK Authorized Instructor'' de la société [img(100px,auto)[iCSF/K4CSP.png][https://CloudSecurityPass.com/]]).

Les inscriptions sont ouvertes sur le site de CloudSecurityPass ⇒ ''[[CloudSecurityAlliance.fr/go/CSPass|http://CloudSecurityAlliance.fr/go/CSPass]]''

Pour toute information complémentaire, vous pouvez aussi nous contacter sur ~~[img(200px,auto)[iCSF/Email-CSA_FR.png]]~~
|ssTableNo|k
|>|>|>|>|>|background-color:#00F; @@color:#FFF;''La galaxie CSA''@@ |
|background-color:#EEF;[img(100px,auto)[CCM|iCSA/CAOBCCM.png][CCM]]|background-color:#EEF;[img(100px,auto)[Menaces|iCSA/TopThreats_logo.png][Menaces]]|background-color:#EEF;[img(100px,auto)[CCSK|iCSA/H8UBCCSK.png][CCSK]]|background-color:#EEF;[img(100px,auto)[CAIQ|iCSA/CSA-CAI.png][CAIQ]]|background-color:#EEF;[img(100px,auto)[CCSK|iCSA/CCAK.png][CCAK]]|background-color:#EEF;|
[img(40%,1px)[iCSF/BluePixel.gif]][img[iCSF/In.png][https://www.linkedin.com/groups/3758242]] [img(40%,1px)[iCSF/BluePixel.gif]]
Lien vers le groupe ''LinkedIN'' du [[Chapitre Français]] de la [[Cloud Security Alliance]]
:→ https://www.linkedin.com/groups/3758242

^^Quelques autres groupes "Sécurité du Cloud"+++*[ici]>
* Cloud Computing, Cybersecurity, SaaS & Virtualization ⇒ https://www.linkedin.com/groups/45151/
* Cloud Technology Professionals ⇒ https://www.linkedin.com/groups/1346907/
* CyberSecurity Community ⇒ https://www.linkedin.com/groups/3799371/
* Information Security Careers Network (ISCN) ⇒ https://www.linkedin.com/groups/1368287/
* Information Security Network ⇒ https://www.linkedin.com/groups/80784/
* SaaS & Cloud Security Experts ⇒ https://www.linkedin.com/groups/122748/
* Security Experts - A Global Group ⇒ https://www.linkedin.com/groups/957667/
* The Virtualization & Cloud Computing Group ⇒ https://www.linkedin.com/groups/57400/
=== ^^
<<tiddler fAll2LiTabs10 with: PodC>>
<<QOTD RolledHeader 1852 noclick norandom>>
__[[Veille Cloud et Sécurité|Dernière Veille Mensuelle]]__ → l'actualité
----
__[[Sécurité@Cloud|Forum Sécurité@Cloud]]__ → Salon et conférences les ''23 et 24 septembre'' 2020 à Paris
----
__[[Actualités CSA|Latest Actu_M]]__ → l'actualité Cloud Security Alliance France et monde
----
__[[Alertes Cloud et Sécurité|Latest Alert_M]]__ → les alertes
----
__[[Publications CSA|Latest Publ_M]]__ → les publications de la Cloud Security Alliance
----
__[[Newsletters Hebdomadaires|Latest News_M]]__ → nouveautés et veille hebdomadaire
----
__[[Blog CSA|Latest Blog_M]]__ → les articles de Blog du [[Chapitre Français]] et de la [[Cloud Security Alliance]]
----
Espace [[Slack]] du [[Chapitre Français]] : ''[[csafr.slack.com|https://CloudSecurityAlliance.fr/go/Slack]]''
<<QOTD RolledLeftCol 3704 noclick norandom>>
[img[Lien vers l'espace Slack du Chapitre Français|iCSF/Slack_ani.gif][https://CloudSecurityAlliance.fr/go/Slack]]''[[csafr.slack.com|https://CloudSecurityAlliance.fr/go/Slack]]''
----
L'espace __[[Slack]]__ du [[Chapitre Français]] de la [[Cloud Security Alliance]]
----
__Circle__
[[CSA Circle]]
[img(125px,auto)[Circle|iCSA/CircleCSA.png][https://CloudSecurityAlliance.fr/go/Circle]]
----
''[[Sécurité@Cloud|https://cloudsecurityalliance.fr/go/k3iE/]]''
23/24 septembre 2020
Paris, France
[img(125px,auto)[Sécurité@Cloud|iCSF/ForumSecuriteCloud-2.jpg]]
----
__Références__
[[Cloud Controls Matrix]]
[img(125px,auto)[CCM|iCSA/CAOBCCM.png][Cloud Controls Matrix]]
|<<QOTD RolledMainW 9250 noclick norandom>> |
<<tiddler [[Dernière Newsletter]]>>
----
<<tiddler [[Agenda]]>>
----
<<tiddler [[CCM - Domaines]]>>
----
<<tiddler [[CCM - Référentiels]]>>
----
@@color:#00F;font-size:112%;<html><i class="fa fa-arrow-circle-right fa-2x" aria-hidden="true"></i></html>@@ Vous pouvez nous joindre sur [[LinkedIN]] et [[Slack]]
<<tiddler [[LinkedIN]]>>
<<tiddler [[Slack]]>>
[img(40%,1px)[iCSF/BluePixel.gif]][img[Lien vers l'espace Slack du Chapitre Français|iCSF/Slack_ani.gif][https://CloudSecurityAlliance.fr/go/Slack]] [img(40%,1px)[iCSF/BluePixel.gif]]
Lien vers l'espace ''Slack'' du [[Chapitre Français]] de la [[Cloud Security Alliance]]
:→'' https://csafr.slack.com ''
Seuls 3 documents de la [[Cloud Security Alliance]] ont été traduits en Français.
Après revue par la communauté, ce sont des versions définitives, même si les retours de la communauté ont été très faibles, voire inexistants dans certains cas.
Mais ces documents ont le mérite d'exister grâce aux efforts et au financement de la [[Cloud Security Alliance]], alors utilisez-les !

|!Document|!Description du sujet abordé|!Version|!Format|!Lien|!Date|
|[[CCM]]|Cloud Controls Matrix|v3.0.1|.xlsx|''[[CloudSecurityAlliance.fr/go/FRCCM|https://CloudSecurityAlliance.fr/go/FRCCM/]]''|2020.05.07|
|[[CAIQ]]|Consensus Assessments Initiative Questionnaire|v3.0.1|.xlsx|''[[CloudSecurityAlliance.fr/go/FRCAIQ|https://CloudSecurityAlliance.fr/go/FRCAIQ/]]''|2020.05.07|
|[[PLA CoC|RGPD - Présentation]]|Code of Conduct Privacy Level Agreement|v3.1|.xlsx|''[[CloudSecurityAlliance.fr/go/FRPLACOC|https://CloudSecurityAlliance.fr/go/FRPLACOC/]]''|2020.05.07|
[img(40%,1px)[iCSF/BluePixel.gif]][img[Lien vers le compte Twitter du Chapitre Français|iCSF/Twitter_icon.png][https://twitter.com/cloudsaFR]] [img(40%,1px)[iCSF/BluePixel.gif]]
Lien vers le flux Twitter du [[Chapitre Français]] de la [[Cloud Security Alliance]]
:→ https://twitter.com/cloudsaFR
[img(40%,1px)[iCSF/BluePixel.gif]][img[Lien vers le compte Twitter du Chapitre Français|iCSF/Twitter_icon.png][https://twitter.com/cloudsaFR]] [img(40%,1px)[iCSF/BluePixel.gif]]
__Autres flux Twitter à suivre :__
* Flux de la [[Cloud Security Alliance]]
:→ https://twitter.com/cloudsa
* Flux ''CSACloudbytes''
:→ https://twitter.com/hashtag/CSACloudbytes
<<tabs tVeille 'Veille 2020' 'Veille 2020' [[Veille Web##2020]] 'Veille 2019' 'Veille 2019' [[Veille Web##2019]] 'Veille 2018' 'Veille 2018' [[Veille Web##2018]] 'Veille 201x' 'Veille 201x' [[Veille Web##201x]] >>
/%
!2020
<<tiddler fAll2Tabs7 with: _Veille20>>
!2019
<<tiddler fAll2Tabs7 with: _Veille19>>
!2018
<<tiddler fAll2Tabs7 with: _Veille18>>
!201x
<<tiddler fAll2Tabs7 with: _Veille1x>>
!end
%/
<<tiddler .ReplaceTiddlerTitle with: "Veille Web Cloud et Sécurité">>
<<tiddler [[Veille.20xx.Archives]]>>
<<tiddler fAll2Tabs4 with: _Veille1x>>
Les archives sont organisées par année, de 20__''17''__ à 20__''08''__.
|ssTabl2|k
|!Dernière mise à jour du site le @@font-size:125%;@@ |!Les dernières publications |
|<<tiddler [[Accueil_L]]>> |<<tiddler [[Accueil_R]]>>
Archives du site et historique : → [[ici|Archives]] ←[img(99%,1px)[iCSF/BluePixel.gif]] | <<tiddler .ReplaceTiddlerTitle with: [[Bienvenue sur le site du Chapitre Français de la Cloud Security Alliance]]>>
!!@@color:#00F;<html><i class="fa fa-pencil-alt fa-2x" aria-hidden="true"></i></html>@@ Newsletter Hebdomadaire Cloud et Sécurité
La veille active "Cloud et Sécurité" avec des nouvelles de la [[CSA]], ses publications et la revue du Web. La dernière est datée du //''<<tiddler [[LatestWeeklyNewsDate]]>>''// et disponible ⇒__[[ici|Dernière Newsletter]]__⇐ [img(99%,4px)[iCSF/BluePixel.gif]]
!!@@color:#00F;<html><i class="fa fa-users fa-2x" aria-hidden="true"></i></html>@@ Rejoignez Circle la plate-forme collaborative de la CSA
[>img(150px,auto)[iCSA/CircleCSA.png][2020.03.19 - Ouverture de la plateforme collaborative CSA Circle]]Inscrivez-vous sur [[CSA Circle]] la plateforme collaborative de la [[CSA]] en suivant [[les instructions|2020.03.19 - Ouverture de la plateforme collaborative CSA Circle]].
[img(99%,4px)[iCSF/BluePixel.gif]]
!!@@color:#00F;<html><i class="fa fa-graduation-cap fa-2x" aria-hidden="true"></i></html>@@ Formation CCSK et CCSK+ en français en août 2020
<<tiddler [[Formations CCSK en français]]>>[img(99%,4px)[iCSF/BluePixel.gif]]
!!@@color:#00F;<html><i class="fa fa-calendar-alt fa-2x" aria-hidden="true"></i></html>@@ Agenda
<<tiddler [[Agenda]]>>[img(99%,4px)[iCSF/BluePixel.gif]]
<<tiddler Accueil_R_MM>>[img(99%,1px)[iCSF/BluePixel.gif]]
^^<<tiddler Accueil_R_MM-1>>[img(99%,1px)[iCSF/BluePixel.gif]]^^
^^<<tiddler Accueil_R_MM-2>>[img(99%,1px)[iCSF/BluePixel.gif]]^^
@@color:#00F;<html><i class="fa fa-eye fa-2x" aria-hidden="true"></i></html>@@ __@@color:#009;font-size:112%;''[[Veille Web Juillet 2020|2020.07.31 - Veille - Juillet 2020]]''@@__
<<tiddler fAll2List with: '202007","_Show_' >>
@@color:#00F;<html><i class="fa fa-eye fa-2x" aria-hidden="true"></i></html>@@ __@@color:#009;font-size:112%;''[[Veille Web Juin 2020|2020.06.30 - Veille - Juin 2020]]''@@__
<<tiddler fAll2List with: '202006","_Show_' >>
@@color:#00F;<html><i class="fa fa-eye fa-2x" aria-hidden="true"></i></html>@@ __@@color:#009;font-size:112%;''[[Veille Web Mai 2020|2020.05.31 - Veille - Mai 2020]]''@@__
<<tiddler fAll2List with: '202005","_Show_' >>
!!!Juillet 2020
* ''1er'' juillet 2020 → 'CSA Federal Summit 2020' : "''Reducing Compliance Costs with DevSecOps Principles in the Hybrid Cloud''" ⇒ [[inscription|https://www.brighttalk.com/webcast/10415/419080]]
* ''8'' juillet 2020 → 'CSA Federal Summit 2020' : "''2020 State of Federal Cloud Security: A Practitioner’s Perspective''" ⇒ [[inscription|https://www.brighttalk.com/webcast/10415/421145]]
* ''15'' juillet 2020 → 'CSA Federal Summit 2020' : "''Update on FedRAMP''" ⇒ [[inscription|https://www.brighttalk.com/webcast/10415/422428]]
!!!Juillet 2020
* //@@color:#666;''1er'' juillet 2020 → CSA Chapitre israelien : CyberWeek Israel CSA Summit • Tel Aviv, Israel — ANNULÉ@@//
!!!Août 2020
* ''31'' août 2020 → fin de l'appel à proposition pour le congrès ''CSA EMEA 2020''
* ''31'' août au ''1er / 2'' septembre 2020 → ''CSA Chapitre français : Formation CCSK / CCSK Plus'' • en ligne
!!!Septembre 2020
* ''14 au 17'' septembre 2020 → CSA : ''[[Conférence SECtember|https://csacongress.org/event/csa-emea-summit-2020/]]'' • Seattle, Etats-Unis
* ''23 au 24'' septembre 2020 → BIRP : ''[[Forum Sécurité@Cloud|https://cloudsecurityalliance.fr/go/k3iE/]]'' • Paris, Porte de Versailles
!!!Novembre 2020
* ''2'' novembre 2020 → CSA : EMEA Summit • Munich, Allemagne
* ''17 au 18'' novembre 2020 → CloserStill Media : ''[[Cloud & Cyber Security Expo Paris|https://www.cloudsecurityexpo.fr/]]'' • Paris, Porte de Versailles
* ''23 au 24 / 25'' juin 2020 → ''CSA Chapitre français : Formation CCSK / CCSK Plus'' • en ligne
/% 
* ''20 au 24'' juin 2021 → CSA Summit @CyberWeek Israel • Tel Aviv, Israel
%/
[img[iCSF/flag_fr.png]]^^oc^^[img(50%,1px)[iCSF/BluePixel.gif]]
<<tiddler [[2020.06.Actu]]>>
<<tiddler [[2020.06.30 - Alertes]]>>
<<tiddler [[2020.06.Blog]]>>
<<tiddler [[2020.06.NewsL]]>>
<<tiddler [[2020.06.Publ]]>>
<<tiddler fAny2List24_2 with: '202006","202005' 'Dernières mises à jour'>>
<<tabs tPoint 'TODO' 'TODO' [[.##TODO]] 'AdvOptions' 'AdvOptions' [[.##AdvOptions]] 'Dates' 'Dates' [[.##Dates]] 'CSA-ORG' 'CSA-ORG' [[.##CSA-ORG]] 'CIRCLE' 'CIRCLE' [[.##CIRCLE]]>>
/%
!TODO
+++*[T0D0 »] <<tiddler fAll2Tabs with: T0D0>>=== 
!AdvOptions
+++*[AdvancedOptions »] <<tiddler AdvancedOptions>>=== 
!Dates
|  |!0|!1|!2|!3|!4|!5|!6|!7|!8|!9|
|!0| 0| 1| 2| 3| 4| 5| 6| 7| 8| 9|
|!1| a| b| c| d| e| f| g| h| i| j|
|!2| k| l| m| n| o| p| q| r| s| t|
|!3| u| v| w| x| y| z| A| B| C| D|
|!4| E| F| G| H| I| J| K| L| M| N|
|!5| O| P| Q| R| S| T| U| V| W| X|
|!6| Y| Z| +| =| -| (| )|‘’|“”|«»|
!CSA-ORG
+++*[CloudSecurityAlliance.org »] <html><div align="center"><iframe src="https://CloudSecurityAlliance.org" frameborder="0" width="100%" height="600"></iframe></div></html> === 
!CIRCLE
+++*[Circle »] <html><div align="center"><iframe src="https://Circle.CloudSecurityAlliance.org" frameborder="0" width="100%" height="600"></iframe></div></html> === 
!end
%/
|[img(30px,auto)[iCSF/Francais.gif]] @@color:#00F;font-size:125%;__[[Version française|%AAAA%.%MM%.%DD% - Newsletter Hebdomadaire - #%%NN#]]__@@ |[img(30px,auto)[iCSF/Anglais.gif]] @@color:#00F;font-size:125%;__[[English version|%AAAA%.%MM%.%DD% - Weekly Newsletter - #%%NN#]]__@@ |
|<<tiddler [[%AAAA%.%MM%.%DD% - Newsletter Hebdomadaire - #%%NN#]]>> |<<tiddler [[%AAAA%.%MM%.%DD% - Weekly Newsletter - #%%NN#]]>> |
!Newsletter Hebdomadaire Cloud et Sécurité - semaine du %DD-6% au %DD% %mmmm_fr% %AAAA%
!!1 - Nouveautés CSA et Informations - %DD-6% au %DD% %mmmm_fr% %AAAA%
* Blog / Actualité / Publication / ... : %% +++*[»]> <<tiddler [[%AAAA%.%MM%.%DD% - %% ]]>>=== 
!!2 - Veille Web Cloud et Sécurité ([[plus de %LL% liens|%AAAA%.%MM%.%DD% - Veille Hebdomadaire - %DD% %mmmm_fr%]])
* À lire
** '' %% ''+++*[»]> === 
* Attaques
** %% +++*[»]> === 
* Pannes
** %% +++*[»]> === 
* Rapports et études
** %% +++*[»]> === 
* Acquisitions
** %% +++*[»]> === 
* Divers
** %% +++*[»]> === 
** Outils: %% +++*[»]> === 
!!3 - Agenda
* '' %% '' %mmmm_fr% %AAAA% → %% "[[ %% |https://CloudSecurityAlliance.FR/go/ %% ]]"

|sthabl96|k
|!⇒ [[CloudSecurityAlliance.fr/go/%Y%%M%%D%/|https://CloudSecurityAlliance.fr/go/%Y%%M%%D%/]] |
!Weekly Cloud and Security Watch Newsletter - %mmmm_en% %DDth to %DD%th, %AAAA%
!!1 - CSA News and Updates - %mmmm_en% %DDth to %DD%th, %AAAA%
* Blog / News / Publication / ...: %% +++*[»]> <<tiddler [[%AAAA%.%MM%.%DD% - %% ]]>>===
!!2 - Cloud and Security News Watch ([[over %LL% links|%AAAA%.%MM%.%DD% - Veille Hebdomadaire - %DD% %mmmm_fr%]])
* Must read
** %% +++*[»]> === 
* Attacks
** %% +++*[»]> === 
* Outages
** %% +++*[»]> === 
* Reports and Surveys
** %% +++*[»]> === 
* Acquisitions
** %% +++*[»]> === 
* Miscellaneous
** %% +++*[»]> === 
** Tools: %% +++*[»]> === 
!!3 - Agenda
* '' %% '' %mmmm_en% %AAAA% → %% "[[ %% |https://CloudSecurityAlliance.FR/go/ %% ]]"

|sthabl96|k
|!⇒ [[CloudSecurityAlliance.fr/go/%Y%%M%%D%/|https://CloudSecurityAlliance.fr/go/%Y%%M%%D%/]] |
|!%mmmm_fr%|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!%AAAA%.%MM%.%DD%|
|>|>|>|!%AAAA%.%MM%.%DD-1%|
|>|>|>|!%AAAA%.%MM%.%DD-2%|
|>|>|>|!%AAAA%.%MM%.%DD-3%|
|>|>|>|!%AAAA%.%MM%.%DD-4%|
|>|>|>|!%AAAA%.%MM%.%DD-5%|
|>|>|>|!%AAAA%.%MM%.%DD|
!Actualités, Blog, Publications et Veille "Sécurité du Cloud"
<<tiddler fAll2LiTabs13end with: 202007>>
<<tiddler fAll2Tabs10 with: VeilleM","_202007>>
Aucune alerte notable en Juillet 2020
[img(25%,1px)[iCSF/BluePixel.gif]]
<<tiddler .ReplaceTiddlerTitle with: [[Alertes et Vulnérabilités - Juillet 2020]]>>
<<tiddler fAll2LiTabs10 with: NewsL","202007>><<tiddler .ReplaceTiddlerTitle with: [[Newsletters - Juillet 2020]]>>
<<tiddler .ReplaceTiddlerTitle with: [[Actualités - Juillet 2020]]>><<tiddler fAll2LiTabs13end with: 'Actu","202007'>>
<<tiddler fAll2LiTabs13end with: 'Blog","202007'>>
[img(25%,1px)[iCSF/BluePixel.gif]]
<<tiddler .ReplaceTiddlerTitle with: [[Blog - Juillet 2020]]>>
<<tiddler fAll2LiTabs13end with: 'Publ","202007'>>
[img(25%,1px)[iCSF/BluePixel.gif]]
<<tiddler .ReplaceTiddlerTitle with: [[Publications - Juillet 2020]]>>
/%
!////
^^
Communiqué de presse de la CSA du %% juillet 2020.
[>img(150px,auto)[iCSA/	%%.jpg]]^^Article publié le %% juillet 2020 sur le blog de la CSA, après l'avoir été le %% %% 2020 sur le site de %%
__Liens :__
* Lien ⇒ %%
* Blog CSA ⇒ ''[[CloudSecurityAlliance.fr/go/k7%x/|https://CloudSecurityAlliance.fr/go/k7%x/]]''
* Site %% ⇒ ''[[CloudSecurityAlliance.fr/go/k7%z/|https://CloudSecurityAlliance.fr/go/k7%z/]]''
^^[img(25%,1px)[iCSF/BluePixel.gif]]
%/
|[img(30px,auto)[iCSF/Francais.gif]] @@color:#00F;font-size:125%;__[[Version française|2020.07.05 - Newsletter Hebdomadaire - #71]]__@@ |[img(30px,auto)[iCSF/Anglais.gif]] @@color:#00F;font-size:125%;__[[English version|2020.07.05 - Weekly Newsletter - #71]]__@@ |
|<<tiddler [[2020.07.05 - Newsletter Hebdomadaire - #71]]>> |<<tiddler [[2020.07.05 - Weekly Newsletter - #71]]>> |
!Newsletter Hebdomadaire Cloud et Sécurité - semaine du 29 juin au 05 juillet 2020
!!1 - Nouveautés CSA et Informations - 29 juin au 05 juillet 2020
* Actualité : Appel à contribution pour le Congrès EMEA de la CSA+++*[»]> <<tiddler [[2020.07.11 - Appel à contribution pour le Congrès EMEA de la CSA]]>>=== [>img(200px,auto)[iCSF/cloud-security-alliance-fr.png]]
!!2 - Veille Web Cloud et Sécurité ([[plus de %% liens|2020.07.05 - Veille Hebdomadaire - 5 juillet]])
* À lire
** '' %% ''+++*[»]> === 
* Attaques
** %% +++*[»]> === 
* Pannes
** %% +++*[»]> === 
* Rapports et études
** %% +++*[»]> === 
* Acquisitions
** %% +++*[»]> === 
* Divers
** %% +++*[»]> === 
** Outils: %% +++*[»]> === 
!!3 - Agenda
* '' %% '' juillet 2020 → clôture de l'appel à commentaires CSA "[[ %% |https://CloudSecurityAlliance.FR/go/ %% ]]"

|sthabl96|k
|!⇒ [[CloudSecurityAlliance.fr/go/K75/|https://CloudSecurityAlliance.fr/go/K75/]] |
!Weekly Cloud and Security Watch Newsletter - June 29th to July 5th, 2020[>img[iCSF/inEnglish.png]]
!!1 - CSA News and Updates - June 29th to July 5th, 2020
* News : Call for Papers for CSA EMEA Congress 2020+++*[»]> <<tiddler [[2020.07.11 - Appel à contribution pour le Congrès EMEA de la CSA]]>>=== [>img(200px,auto)[iCSF/cloud-security-alliance-fr.png]]
!!2 - Cloud and Security News Watch ([[over %% links|2020.07.05 - Veille Hebdomadaire - 5 juillet]])
* Must read
** %% +++*[»]> === 
* Attacks
** %% +++*[»]> === 
* Outages
** %% +++*[»]> === 
* Reports and Surveys
** %% +++*[»]> === 
* Acquisitions
** %% +++*[»]> === 
* Miscellaneous
** %% +++*[»]> === 
** Tools: %% +++*[»]> === 
!!3 - Agenda
* '' %% '' July 2020 → closing of the call for comments on "[[ %% |https://CloudSecurityAlliance.FR/go/ %% ]]"

|sthabl96|k
|!⇒ [[CloudSecurityAlliance.fr/go/K75/|https://CloudSecurityAlliance.fr/go/K75/]] |
|!Juin|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2020.06.30|
|2020.06.30|Help Net Security|[[Cloud IT infrastructure spending grows, non-cloud investments plunge|https://www.helpnetsecurity.com/2020/06/30/non-cloud-investments-plunge/]]|Market|
|>|>|>|!2020.06.29|
|2020.06.29|Silicon Angle|[[Data belonging to 1M students exposed by online study service OneClass|https://siliconangle.com/2020/06/29/data-belonging-1m-students-exposed-online-study-service-oneclass/]]|Data_Leak|
|2020.06.29|The Register|[[Google Cloud partially evaporates for hours amid power supply failure: Two US East Coast zones rattled|https://go.theregister.com/feed/www.theregister.com/2020/06/29/google_cloud_outage/]]|Outage GCP|
/% | → [[
[>img[iCSF/flag_fr.png]] %/
!Actualités, Blog, Publications et Veille "Sécurité du Cloud"
<<tiddler fAll2LiTabs13end with: 202006>>
<<tiddler fAll2Tabs10 with: VeilleM","_202006>>
Aucune alerte notable en Juin 2020
[img(25%,1px)[iCSF/BluePixel.gif]]
<<tiddler .ReplaceTiddlerTitle with: [[Alertes et Vulnérabilités - Juin 2020]]>>
<<tiddler fAll2LiTabs10 with: NewsL","202006>><<tiddler .ReplaceTiddlerTitle with: [[Newsletters - Juin 2020]]>>
<<tiddler .ReplaceTiddlerTitle with: [[Actualités - Juin 2020]]>><<tiddler fAll2LiTabs13end with: 'Actu","202006'>>
<<tiddler fAll2LiTabs13end with: 'Blog","202006'>>
[img(25%,1px)[iCSF/BluePixel.gif]]
<<tiddler .ReplaceTiddlerTitle with: [[Blog - Juin 2020]]>>
<<tiddler fAll2LiTabs13end with: 'Publ","202006'>>
[img(25%,1px)[iCSF/BluePixel.gif]]
<<tiddler .ReplaceTiddlerTitle with: [[Publications - Juin 2020]]>>
!//United States–Mexico–Canada Agreement: Digital Trade Provisions: NAFTA 2.0 meets the Internet//
[>img(150px,auto)[iCSA/K6UBU.jpg]]^^Article publié sue le blog de la CSA le 30 juin 2020 par Françoise Gilbert.
* Lien ⇒ https://cloudsecurityalliance.org/blog/2020/06/30/united-states-mexico-canada-agreement-digital-trade-provisions-nafta-2-0-meets-the-internet/
^^[img(25%,1px)[iCSF/BluePixel.gif]]

!//Cloud Security Alliance and International Systems Security Association Form New Partnership to Advance the Cybersecurity Profession//
^^Communiqué de presse de la CSA du 30 juin 2020.
* Lien ⇒ https://cloudsecurityalliance.org/press-releases/2020/06/30/cloud-security-alliance-and-international-systems-security-association-form-new-partnership-to-advance-the-cybersecurity-profession/
^^[img(25%,1px)[iCSF/BluePixel.gif]]
!//CSA Announces Availability of Key Cloud Security Assessment and Guidance Documents in 10 Additional Languages//
^^Communiqué de presse de la CSA du 23 juin 2020.
* Lien ⇒ https://cloudsecurityalliance.org/press-releases/2020/06/23/cloud-security-alliance-announces-availability-of-key-cloud-security-assessment-and-guidance-documents-in-10-additional-languages/
^^[img(25%,1px)[iCSF/BluePixel.gif]]
!//Cloud Security Alliance Announces PT Mitra Integrasi Informatika as an Authorized CCSK Training Partner//
^^Communiqué de presse de la CSA du 23 juin 2020.
* Lien ⇒ https://cloudsecurityalliance.org/press-releases/2020/06/23/cloud-security-alliance-announces-pt-mitra-integrasi-informatika-as-an-authorized-ccsk-training-partner/
^^[img(25%,1px)[iCSF/BluePixel.gif]]
!//How to secure cloud-based collaboration, emails, and messaging apps//
[>img(150px,auto)[iCSA/K6NBH.jpg]]^^Article publié le 23 juin 2020 sur le blog de la CSA, après l'avoir été le 16 juin 2020 sur le site de CipherCloud
__Liens :__
* Blog CSA ⇒ ''[[CloudSecurityAlliance.fr/go/k6nx/|https://CloudSecurityAlliance.fr/go/k6nx/]]''
* Site CipherCloud ⇒ ''[[CloudSecurityAlliance.fr/go/k6nz/|https://CloudSecurityAlliance.fr/go/k6nz/]]''
^^[img(25%,1px)[iCSF/BluePixel.gif]]
!//Detect and Track Threats Through UEBA and Incident Governance//
[>img(150px,auto)[iCSA/K6IB3.jpg]]^^Article publié le 18 juin 2020 sur le blog de la CSA, après l'avoir été le 21 mai 2020 sur le site de Fugue.
__Liens :__
* Blog CSA ⇒ ''[[CloudSecurityAlliance.fr/go/k6ix/|https://CloudSecurityAlliance.fr/go/k6ix/]]''
* Site Fugue ⇒ ''[[CloudSecurityAlliance.fr/go/k6iz/|https://CloudSecurityAlliance.fr/go/k6iz/]]''
^^[img(25%,1px)[iCSF/BluePixel.gif]]
!//Detect and Track Threats Through UEBA and Incident Governance//
[>img(150px,auto)[iCSA/K6GBF.jpg]]^^Article publié le 16 juin 2020 sur le blog de la CSA, après l'avoir été le 2 juin 2020 sur le site de CipherCloud
__Liens :__
* Blog CSA ⇒ ''[[CloudSecurityAlliance.fr/go/k6gx/|https://CloudSecurityAlliance.fr/go/k6gx/]]''
* Site CipherCloud ⇒ ''[[CloudSecurityAlliance.fr/go/k6gz/|https://CloudSecurityAlliance.fr/go/k6gz/]]''
^^[img(25%,1px)[iCSF/BluePixel.gif]]
!//Enterprise Architecture Working Group Charter//
^^Appel à commentaires publié le 14 juin 2020 et ouvert jusqu'au 13 juillet 2020.
<<<
//The Enterprise Architecture Working Group (EAWG) helps cloud customers and providers develop industry-recommended, secure and interoperable identity, access and compliance management configurations and practices. The working group developed cloud reference architecture, the CSA Enterprise Architecture (formerly the TCI), overlays cloud platforms and solutions on existing common enterprise architectures hardened with security criteria and industry mappings from the CSA Cloud Controls Matrix. The EAWG will further develop additional reference models and education on categories of cloud solutions and related technologies for the secure configuration and adoption of emerging technologies in a vendor-neutral manner, inclusive of all CSA members and affiliates who wish to participate. This charter lays out the scope, responsibilities, and roadmap for the EAWG. We welcome all feedback and comments during this open review period.//
<<<
__Liens :__
* Document ⇒ https://cloudsecurityalliance.org/artifacts/enterprise-architecture-charter/
^^[img(25%,1px)[iCSF/BluePixel.gif]]
!//The Octopus Scanner Malware: Attacking the open source supply chain//
[>img(150px,auto)[iCSA/K6ABT.jpg]]^^Article publié le 10 juin 2020 sur le blog de la CSA, après l'avoir été le 28 mai 2020 sur le site GitHub
__Liens :__
* Blog CSA ⇒ https://cloudsecurityalliance.org/blog/2020/06/10/the-octopus-scanner-malware-attacking-the-open-source-supply-chain/ /% ''[[CloudSecurityAlliance.fr/go/k6ax/|https://CloudSecurityAlliance.fr/go/k6ax/]]'' %/
* Site GitHub ⇒ https://securitylab.github.com/research/octopus-scanner-malware-open-source-supply-chain/ /% ''[[CloudSecurityAlliance.fr/go/k6az/|https://CloudSecurityAlliance.fr/go/k6az/]]'' %/
^^[img(25%,1px)[iCSF/BluePixel.gif]]
!//New Data Protection Law Enacted in Dubai Emirate//
[>img(150px,auto)[iCSA/K68BN.jpg]]^^Article publié le 8 juin 2020 sur le blog de la CSA par Francoise Gilbert, Cybersecurity & Privacy Expert, Cloud Security Alliance
__Liens :__
* Blog CSA ⇒ https://cloudsecurityalliance.org/blog/2020/06/08/new-data-protection-law-enacted-in-dubai-emirate/ /% ''[[CloudSecurityAlliance.fr/go/k68b/|https://CloudSecurityAlliance.fr/go/k68b/]]'' %/
^^[img(25%,1px)[iCSF/BluePixel.gif]]
!//Cloud Security Alliance Announces KORNERSTONE as Authorized CCSK Training Partner//
^^Communiqué de presse de la CSA du 8 juin 2020.
* Lien ⇒ https://cloudsecurityalliance.org/press-releases/2020/06/08/cloud-security-alliance-announces-kornerstone-as-authorized-ccsk-training-partner/
^^[img(25%,1px)[iCSF/BluePixel.gif]]
!//General James Mattis, Secretary of Defense (2017-2018), to Headline CSA's SECtember Premier Event//
^^Communiqué de presse de la CSA du 4 juin 2020.
* Lien ⇒ https://cloudsecurityalliance.org/press-releases/2020/06/04/general-james-mattis-secretary-of-defense-2017-2018-to-headline-cloud-security-alliance-s-sectember-premier-event/
^^[img(25%,1px)[iCSF/BluePixel.gif]]
!//CSA Partners with Digital Economy Promotion Agency in National Support Initiative for Learning During COVID-19//
^^Communiqué de presse de la CSA du 3 juin 2020.
* Lien ⇒ https://cloudsecurityalliance.org/press-releases/2020/06/03/cloud-security-alliance-partners-with-digital-economy-promotion-agency-in-national-support-initiative-for-learning-during-covid-19/
^^[img(25%,1px)[iCSF/BluePixel.gif]]
!//Detect and Track Threats Through UEBA and Incident Governance//
[>img(150px,auto)[iCSA/K62BD.jpg]]^^Article publié le 2 juin 2020 sur le blog de la CSA, après l'avoir été le 18 mai 2020 sur le site de CipherCloud
__Liens :__
* Blog CSA ⇒ https://cloudsecurityalliance.org/articles/detect-and-track-threats-through-ueba-and-incident-governance/ /% ''[[CloudSecurityAlliance.fr/go/k62x/|https://CloudSecurityAlliance.fr/go/k62x/]]'' %/
* Site CipherCloud ⇒ https://www.ciphercloud.com/detect-and-track-threats-through-ueba-and-insights-investigate/ /% ''[[CloudSecurityAlliance.fr/go/k62z/|https://CloudSecurityAlliance.fr/go/k62z/]]'' %/
^^[img(25%,1px)[iCSF/BluePixel.gif]]
!//CSA Announces Availability of Key Cloud Security Assessment and Guidance Documents in 10 Additional Languages//
^^Communiqué de presse de la CSA du 1er juin 2020. /% https://cloudsecurityalliance.org/press-releases/2020/06/01/cloud-security-alliance-announces-availability-of-key-cloud-security-assessment-and-guidance-documents-in-10-additional-languages/ %/
^^[img(25%,1px)[iCSF/BluePixel.gif]]
!//TOTO//
[>img(300px,auto)[iCSA/K5QCB.png]]La CSA a finalisé la liste des présentations et des intervenants pour la conférence virtuelle ''CloudBytes Connect'' qui se tiendra les 26, 27 et 28 mai.
|09 juin|	|	 minutes| → [[vidéo|	]]|
|10 juin|	|	 minutes| → [[vidéo|	]]|
|11 juin|Introduction to the Code of Conduct|22 minutes|→ [[vidéo|https://www.brighttalk.com/webinar/introduction-to-the-code-of-conduct/]]|
|11 juin|Panel Discussion: GDPR with the CSA Center of Excellence|54 minutes| → [[vidéo|https://www.brighttalk.com/webinar/panel-discussion-dpr-with-the-csa-center-of-excellence/]]|
|12 juin|	|	 minutes| → [[vidéo|	]]|
|12 juin|	|	 minutes| → [[vidéo|	]]|
|12 juin|	|	 minutes| → [[vidéo|	]]|
|12 juin|	|	 minutes| → [[vidéo|	]]|
28 juin 2020
<<tiddler [[2020.06.28 - Newsletter - #70]]>>
<<tiddler [[2020.06.30 - Veille - Juin 2020]]>>
|[img(30px,auto)[iCSF/Francais.gif]] @@color:#00F;font-size:125%;__[[Version française|2020.06.28 - Newsletter Hebdomadaire - #70]]__@@ |[img(30px,auto)[iCSF/Anglais.gif]] @@color:#00F;font-size:125%;__[[English version|2020.06.28 - Weekly Newsletter - #70]]__@@ |
|<<tiddler [[2020.06.28 - Newsletter Hebdomadaire - #70]]>> |<<tiddler [[2020.06.28 - Weekly Newsletter - #70]]>> |
!Newsletter Hebdomadaire Cloud et Sécurité - semaine du 22 au 28 juin 2020
!!1 - Nouveautés CSA et Informations - 22 au 28 juin 2020
* Agenda du 'CSA Federal Summit 2020'+++*[»]> <<tiddler [[2020.06.27 - Agenda du 'CSA Federal Summit 2020']]>>=== 
* Vidéos d'aide à la préparation du CCSK+++*[»]> <<tiddler [[2020.06.24 - Vidéos d'aide à la préparation du CCSK]]>>=== 
!!2 - Veille Web Cloud et Sécurité
La [[Veille Web|2020.06.28 - Veille Hebdomadaire - 28 juin]] avec plus de 70 liens
* À lire
** Point de vue de Francoise Gilbert sur les recommandations de la FTC pour la sécurisétion du Cloud+++*[»] 
|2020.06.28|Francoise Gilbert|![[FTC Guidance - Six Steps Towards More Secure Cloud Computing|https://www.francoisegilbert.com/?p=1491]] |FTC Recommendations|
|2020.06.15|FTC| → [[Six steps toward more secure cloud computing|https://www.ftc.gov/news-events/blogs/business-blog/2020/06/six-steps-toward-more-secure-cloud-computing]]|FTC Recommendations|
=== 
* Attaques
** L'attaque SYLKin contourne les mécanismes de sécurité de Microsoft+++*[»] 
|2020.06.25|//Avanan//|[[SYLKin Attack: New Malicious .slk files are bypassing Microsoft 365 Security, Risking 200M+ Users|https://www.avanan.com/blog/sylkin-attack-bypassing-microsoft-365-security-risking-users]]|M365 Attack|
=== 
** Docker: cible de botnets et de cryptomineurs+++*[»] 
|2020.06.22|//TrendMicro//|[[XORDDoS, Kaiji Botnet Malware Variants Target Exposed Docker Servers|https://blog.trendmicro.com/trendlabs-security-intelligence/xorddos-kaiji-botnet-malware-variants-target-exposed-docker-servers/]]|Malware Docker|
|2020.06.23|Security Week| → [[XORDDoS, Kaiji DDoS Botnets Target Docker Servers|https://www.securityweek.com/xorddos-kaiji-ddos-botnets-target-docker-servers]]|Malware Docker|
|2020.06.26|//Aqua Security//|[[Threat Alert: DzMLT has Hidden Cryptominers in Container Images|https://blog.aquasec.com/container-vulnerability-dzmlt-dynamic-container-analysis]]|Container Vulnerability|
|2020.06.25|//Palo Alto Networks//|![[Attackers Cryptojacking Docker Images to Mine for Monero|https://unit42.paloaltonetworks.com/cryptojacking-docker-images-for-mining-monero/]] |Docker Cryptojacking|
|2020.06.26|Container Journal| → [[Docker Hub Distributing Cryptomining Malware?|https://containerjournal.com/topics/container-security/docker-hub-distributing-cryptomining-malware/]]|Cryptomining Docker|
|2020.06.29|GBHackers on Security| → [[Hackers Abusing Docker Hub Account to Mine Monero Cryptocurrency|https://gbhackers.com/docker-hub-account/]]|Cryptomining Docker|
=== 
** Akamai repousse le plus gros DDoS enregistré à ce jour+++*[»] 
|2020.06.25|//Akamai//|[[Largest Ever Recorded Packet Per Second-Based DDoS Attack Mitigated by Akamai|https://blogs.akamai.com/2020/06/largest-ever-recorded-packet-per-secondbased-ddos-attack-mitigated-by-akamai.html]]|Attacks DDoS|
|2020.06.25|Bleeping Computer| → [[European bank suffers biggest PPS DDoS attack, new botnet suspected|https://www.bleepingcomputer.com/news/security/european-bank-suffers-biggest-pps-ddos-attack-new-botnet-suspected/]]|Attacks DDoS|
|2020.06.25|//The SSL Store//| → [[The Largest DDoS Attack in history just happened... and it didn't work|https://www.thesslstore.com/blog/largest-ddos-attack-in-history/]]|Attacks DDoS|
=== 
* Études
** ''The State Of Cloud Native Security'' par Palo Alto Networks+++*[»] 
|2020.06.24|//Palo Alto Networks//|![[Mapping the Cloud Native Security Genome|https://blog.paloaltonetworks.com/2020/06/cloud-native-security-genome/]] |Report|
|2020.06.24|//Palo Alto Networks//| → [[The State Of Cloud Native Security|https://www.paloaltonetworks.com/state-of-cloud-native-security]]|Report|
=== 
* Acquisitions
** ''CyberX'' par ''Microsoft''+++*[»] 
|2020.06.22|//Microsoft//|[[Microsoft acquires CyberX to accelerate and secure customers’ IoT deployments|https://www.microsoft.com/security/blog/2020/06/22/microsoft-acquires-cyberx-accelerate-customers-iot-deployments/]] ([[détails|https://blogs.microsoft.com/?p=52559045]])|Acquisitions|
|2020.06.22|//CyberX//| → [[Microsoft Acquires CyberX|https://cyberx-labs.com/blog/microsoft-acquires-cyberx/]] ([[détails|https://cyberx-labs.com/press-releases/microsoft/]])|Acquisitions|
|2020.06.22|Security Week| → [[Microsoft Acquires Industrial Cybersecurity Company CyberX|https://www.securityweek.com/microsoft-acquires-industrial-cybersecurity-company-cyberx]]|Acquisitions|
|2020.06.22|MSSP Alert| → [[Microsoft Acquires CyberX; Azure Cloud Gains IoT Security Services|https://www.msspalert.com/investments/microsoft-acquires-cyberx/]]|Acquisitions|
|2020.06.22|Redmond Channel| → [[Microsoft's CyberX Acquisition Boosts Security of Azure IoT Lineup|https://rcpmag.com/articles/2020/06/22/microsoft-cyberx-acquisition.aspx]]|Acquisition|
=== 
* Divers
** Podcast : Comment devenir un ingénieur "Cloud et Sécurité" en 2020+++*[»]>
|2020.06.28|Cloud Security Podcast|![[How To Become A Cloud Security Engineer in 2020 - Including Top Certifications|https://anchor.fm/cloudsecuritypodcast/episodes/HOW-TO-BECOME-A-CLOUD-SECURITY-ENGINEER-in-2020--Including-Top-Certifications-eg1cek]] ([[transcrption|https://www.cloudsecuritypodcast.tv/listen-to-the-episodes/how-to-become-a-cloud-security-engineer]]) |Podcast|
=== 
** API : checklist de sécurité+++*[»] 
|2020.06.26|Cloud Management Insider|[[How APIs Are Simplifying The Cloud Environment?|https://www.cloudmanagementinsider.com/how-apis-are-simplifying-the-cloud-environment/]]|APIs|
|2020.06.23|//Cloud Vector//|[[API Security Checklist: Part 2|https://www.cloudvector.com/api-security-checklist-part-2/]] (2/2)|APIs|
|2020.05.12|//Cloud Vector//| → [[API Security Checklist: Secure API Design|https://www.cloudvector.com/api-security-checklist-secure-api-design/]] (1/2)|APIs|
=== 
** Stockage dans le Cloud et forensique+++*[»] 
|2020.06.23|SANS DFIR|![[Cloud Storage Forensics Endpoint Evidence|https://www.youtube.com/watch?v=vgmKUGuMi7c]] (66 min.) |Forensics Video|
=== 
** Azure: comment est géré Azure.com; avantages et inconvénients de la gouvernance et des outils; Azure Security Center; SIEM+++*[»] 
|2020.06.24|//Microsoft//|[[Feeling fatigued? Cloud-based SIEM relieves security team burnout - Microsoft Security|https://www.microsoft.com/security/blog/2020/06/24/cloud-based-siem-security-team-burnout/]]|SIEM|
|2020.06.24|//Microsoft Azure//|![[Azure.com operates on Azure part 1: Design principles and best practices|https://azure.microsoft.com/blog/azurecom-operates-on-azure-part-1-design-principles-and-best-practices/]] (1/2) |Azure Design|
|2020.06.24|//Microsoft Azure//|![[How Azure.com operates on Azure part 2: Technology and architecture|https://azure.microsoft.com/blog/how-azurecom-operates-on-azure-part-2-technology-and-architecture/]] (2/2) |Azure Architecture|
|2020.06.24|//Microsoft Azure//|[[Deploy to Azure Container Instances with Docker Desktop|https://azure.microsoft.com/blog/deploy-to-azure-container-instances-with-docker-desktop/]]|Azure Docker|
|2020.06.24|//Microsoft Azure//|[[Stay ahead of attacks with Azure Security Center|https://azure.microsoft.com/blog/stay-ahead-of-attacks-with-azure-security-center/]] ([[inscription|https://info.microsoft.com/Stay-Ahead-of-Attacks-with-Azure-Security-Center-Registration.html?ocid=AID3011167_QSG_BLOG_411853]])|Azure Products Webinar|
|2020.06.23|Nino Crudele|[[Azure Governance and Tools – Pros and Cons|https://ninocrudele.com/azure-governance-and-tools-pros-and-cons]]|Azure Governance|
=== 
** AWS: modèle d'accreditation+++*[»] 
|2020.06.22|//AWS//|[[Accreditation models for secure cloud adoption|https://aws.amazon.com/blogs/security/accreditation-models-for-secure-cloud-adoption/]] ([[pdf|https://d1.awsstatic.com/whitepapers/accreditation-models-for-secure-cloud-adoption.pdf]])|Accreditation|
=== 
** GCP: automatiser la réponse à un événement+++*[»] 
|2020.06.24|//Google Cloud//|[[Automate your response to a Cloud Logging event|https://cloud.google.com/blog/products/management-tools/automate-your-response-to-a-cloud-logging-event/]]|Logging|
=== 
** Kubernetes: bonnes practices; menaces+++*[»] 
|2020.06.25|//StackRox//|![[Protecting Against Kubernetes Threats: Chapter 1 - Initial Access|https://www.stackrox.com/post/2020/06/protecting-against-kubernetes-threats-chapter-1-initial-access/]] |Kubernetes Threats|
|2020.06.24|DZone|[[Kubernetes Security: Don’t Forget These Best Practices|https://dzone.com/articles/kubernetes-security-dont-forget-these-best-practic]]|Kubernetes Best_Practices|
=== 
** Sécurité des données et SaaS (3/4)+++*[»] 
|2020.06.22|//Securosis//|![[Data Security in the SaaS Age: Thinking Small|https://securosis.com/blog/data-security-in-the-saas-age-thinking-small]] (3/4) |SaaS|
=== 
!!3 - Agenda
* ''1er'' juillet 2020 → 'CSA Federal Summit 2020' : "''Reducing Compliance Costs with DevSecOps Principles in the Hybrid Cloud''" ⇒ [[inscription|https://www.brighttalk.com/webcast/10415/419080]]
* ''8'' juillet 2020 → 'CSA Federal Summit 2020' : "''2020 State of Federal Cloud Security: A Practitioner’s Perspective''" ⇒ [[inscription|https://www.brighttalk.com/webcast/10415/421145]]
* ''15'' juillet 2020 → 'CSA Federal Summit 2020' : "''Update on FedRAMP''" ⇒ [[inscription|https://www.brighttalk.com/webcast/10415/422428]]

|ssTabl96|k
|!⇒ [[CloudSecurityAlliance.fr/go/K6S/|https://CloudSecurityAlliance.fr/go/K6S/]] |
!Weekly Cloud and Security Watch Newsletter - June 22nd to 28th, 2020[>img[iCSF/inEnglish.png]]
!!1 - CSA News and Updates - June 22nd to 28th, 2020
* 'CSA Federal Summit 2020' agenda+++*[»]> <<tiddler [[2020.06.27 - Agenda du 'CSA Federal Summit 2020']]>>=== 
* Complementary videos to prepare for the CCSK exam+++*[»]> <<tiddler [[2020.06.24 - Vidéos d'aide à la préparation du CCSK]]>>=== 
!!2 - Cloud and Security News Watch
[[Over 70 links|2020.06.28 - Veille Hebdomadaire - 28 juin]]
* Must read
** Francoise Gilbert's comments on the FTC Guidance towards more secure Cloud Computing+++*[»] 
|2020.06.28|Francoise Gilbert|![[FTC Guidance - Six Steps Towards More Secure Cloud Computing|https://www.francoisegilbert.com/?p=1491]] |FTC Recommendations|
|2020.06.15|FTC| → [[Six steps toward more secure cloud computing|https://www.ftc.gov/news-events/blogs/business-blog/2020/06/six-steps-toward-more-secure-cloud-computing]]|FTC Recommendations|
=== 
* Attacks
** SYLKin attack bypasses Microsoft 365 Security+++*[»] 
|2020.06.25|//Avanan//|[[SYLKin Attack: New Malicious .slk files are bypassing Microsoft 365 Security, Risking 200M+ Users|https://www.avanan.com/blog/sylkin-attack-bypassing-microsoft-365-security-risking-users]]|M365 Attack|
=== 
** Docker: Botnet malware variants; Cryptominers+++*[»] 
|2020.06.22|//TrendMicro//|[[XORDDoS, Kaiji Botnet Malware Variants Target Exposed Docker Servers|https://blog.trendmicro.com/trendlabs-security-intelligence/xorddos-kaiji-botnet-malware-variants-target-exposed-docker-servers/]]|Malware Docker|
|2020.06.23|Security Week| → [[XORDDoS, Kaiji DDoS Botnets Target Docker Servers|https://www.securityweek.com/xorddos-kaiji-ddos-botnets-target-docker-servers]]|Malware Docker|
|2020.06.26|//Aqua Security//|[[Threat Alert: DzMLT has Hidden Cryptominers in Container Images|https://blog.aquasec.com/container-vulnerability-dzmlt-dynamic-container-analysis]]|Container Vulnerability|
|2020.06.25|//Palo Alto Networks//|![[Attackers Cryptojacking Docker Images to Mine for Monero|https://unit42.paloaltonetworks.com/cryptojacking-docker-images-for-mining-monero/]] |Docker Cryptojacking|
|2020.06.26|Container Journal| → [[Docker Hub Distributing Cryptomining Malware?|https://containerjournal.com/topics/container-security/docker-hub-distributing-cryptomining-malware/]]|Cryptomining Docker|
|2020.06.29|GBHackers on Security| → [[Hackers Abusing Docker Hub Account to Mine Monero Cryptocurrency|https://gbhackers.com/docker-hub-account/]]|Cryptomining Docker|
=== 
** Akamai mitigates the largest DDoS attack so far+++*[»] 
|2020.06.25|//Akamai//|[[Largest Ever Recorded Packet Per Second-Based DDoS Attack Mitigated by Akamai|https://blogs.akamai.com/2020/06/largest-ever-recorded-packet-per-secondbased-ddos-attack-mitigated-by-akamai.html]]|Attacks DDoS|
|2020.06.25|Bleeping Computer| → [[European bank suffers biggest PPS DDoS attack, new botnet suspected|https://www.bleepingcomputer.com/news/security/european-bank-suffers-biggest-pps-ddos-attack-new-botnet-suspected/]]|Attacks DDoS|
|2020.06.25|//The SSL Store//| → [[The Largest DDoS Attack in history just happened... and it didn't work|https://www.thesslstore.com/blog/largest-ddos-attack-in-history/]]|Attacks DDoS|
=== 
* Reports and Surveys
** ''The State Of Cloud Native Security'' by Palo Alto Networks+++*[»] 
|2020.06.24|//Palo Alto Networks//|![[Mapping the Cloud Native Security Genome|https://blog.paloaltonetworks.com/2020/06/cloud-native-security-genome/]] |Report|
|2020.06.24|//Palo Alto Networks//| → [[The State Of Cloud Native Security|https://www.paloaltonetworks.com/state-of-cloud-native-security]]|Report|
=== 
* Acquisitions
** ''CyberX'' by ''Microsoft''+++*[»] 
|2020.06.22|//Microsoft//|[[Microsoft acquires CyberX to accelerate and secure customers’ IoT deployments|https://www.microsoft.com/security/blog/2020/06/22/microsoft-acquires-cyberx-accelerate-customers-iot-deployments/]] ([[détails|https://blogs.microsoft.com/?p=52559045]])|Acquisitions|
|2020.06.22|//CyberX//| → [[Microsoft Acquires CyberX|https://cyberx-labs.com/blog/microsoft-acquires-cyberx/]] ([[détails|https://cyberx-labs.com/press-releases/microsoft/]])|Acquisitions|
|2020.06.22|Security Week| → [[Microsoft Acquires Industrial Cybersecurity Company CyberX|https://www.securityweek.com/microsoft-acquires-industrial-cybersecurity-company-cyberx]]|Acquisitions|
|2020.06.22|MSSP Alert| → [[Microsoft Acquires CyberX; Azure Cloud Gains IoT Security Services|https://www.msspalert.com/investments/microsoft-acquires-cyberx/]]|Acquisitions|
|2020.06.22|Redmond Channel| → [[Microsoft's CyberX Acquisition Boosts Security of Azure IoT Lineup|https://rcpmag.com/articles/2020/06/22/microsoft-cyberx-acquisition.aspx]]|Acquisition|
=== 
* Miscellaneous
** Podcast: How To Become A Cloud Security Engineer in 2020+++*[»]>
|2020.06.28|Cloud Security Podcast|![[How To Become A Cloud Security Engineer in 2020 - Including Top Certifications|https://anchor.fm/cloudsecuritypodcast/episodes/HOW-TO-BECOME-A-CLOUD-SECURITY-ENGINEER-in-2020--Including-Top-Certifications-eg1cek]] ([[transcrption|https://www.cloudsecuritypodcast.tv/listen-to-the-episodes/how-to-become-a-cloud-security-engineer]]) |Podcast|
=== 
** API Security Checklist+++*[»] 
|2020.06.26|Cloud Management Insider|[[How APIs Are Simplifying The Cloud Environment?|https://www.cloudmanagementinsider.com/how-apis-are-simplifying-the-cloud-environment/]]|APIs|
|2020.06.23|//Cloud Vector//|[[API Security Checklist: Part 2|https://www.cloudvector.com/api-security-checklist-part-2/]] (2/2)|APIs|
|2020.05.12|//Cloud Vector//| → [[API Security Checklist: Secure API Design|https://www.cloudvector.com/api-security-checklist-secure-api-design/]] (1/2)|APIs|
=== 
** Cloud Storage Forensics Endpoint Evidence+++*[»] 
|2020.06.23|SANS DFIR|![[Cloud Storage Forensics Endpoint Evidence|https://www.youtube.com/watch?v=vgmKUGuMi7c]] (66 min.) |Forensics Video|
=== 
** Azure: How Azure.com operates on Azure; Pros and Cons of Governance and Tools; Azure Security Center; SIEM+++*[»] 
|2020.06.24|//Microsoft//|[[Feeling fatigued? Cloud-based SIEM relieves security team burnout - Microsoft Security|https://www.microsoft.com/security/blog/2020/06/24/cloud-based-siem-security-team-burnout/]]|SIEM|
|2020.06.24|//Microsoft Azure//|![[Azure.com operates on Azure part 1: Design principles and best practices|https://azure.microsoft.com/blog/azurecom-operates-on-azure-part-1-design-principles-and-best-practices/]] (1/2) |Azure Design|
|2020.06.24|//Microsoft Azure//|![[How Azure.com operates on Azure part 2: Technology and architecture|https://azure.microsoft.com/blog/how-azurecom-operates-on-azure-part-2-technology-and-architecture/]] (2/2) |Azure Architecture|
|2020.06.24|//Microsoft Azure//|[[Deploy to Azure Container Instances with Docker Desktop|https://azure.microsoft.com/blog/deploy-to-azure-container-instances-with-docker-desktop/]]|Azure Docker|
|2020.06.24|//Microsoft Azure//|[[Stay ahead of attacks with Azure Security Center|https://azure.microsoft.com/blog/stay-ahead-of-attacks-with-azure-security-center/]] ([[inscription|https://info.microsoft.com/Stay-Ahead-of-Attacks-with-Azure-Security-Center-Registration.html?ocid=AID3011167_QSG_BLOG_411853]])|Azure Products Webinar|
|2020.06.23|Nino Crudele|[[Azure Governance and Tools – Pros and Cons|https://ninocrudele.com/azure-governance-and-tools-pros-and-cons]]|Azure Governance|
=== 
** AWS: Accreditation models+++*[»] 
|2020.06.22|//AWS//|[[Accreditation models for secure cloud adoption|https://aws.amazon.com/blogs/security/accreditation-models-for-secure-cloud-adoption/]] ([[pdf|https://d1.awsstatic.com/whitepapers/accreditation-models-for-secure-cloud-adoption.pdf]])|Accreditation|
=== 
** GCP: Automate your response to a Cloud Logging event+++*[»] 
|2020.06.24|//Google Cloud//|[[Automate your response to a Cloud Logging event|https://cloud.google.com/blog/products/management-tools/automate-your-response-to-a-cloud-logging-event/]]|Logging|
=== 
** Kubernetes: Best practices; Threats+++*[»] 
|2020.06.25|//StackRox//|![[Protecting Against Kubernetes Threats: Chapter 1 - Initial Access|https://www.stackrox.com/post/2020/06/protecting-against-kubernetes-threats-chapter-1-initial-access/]] |Kubernetes Threats|
|2020.06.24|DZone|[[Kubernetes Security: Don’t Forget These Best Practices|https://dzone.com/articles/kubernetes-security-dont-forget-these-best-practic]]|Kubernetes Best_Practices|
=== 
** Data Security in the SaaS Age (3/4)+++*[»] 
|2020.06.22|//Securosis//|![[Data Security in the SaaS Age: Thinking Small|https://securosis.com/blog/data-security-in-the-saas-age-thinking-small]] (3/4) |SaaS|
=== 
!!3 - Agenda
* July ''1st'', 2020 → 'CSA Federal Summit 2020' : "''Reducing Compliance Costs with DevSecOps Principles in the Hybrid Cloud''" ⇒ [[inscription|https://www.brighttalk.com/webcast/10415/419080]]
* July ''8th'', 2020 → 'CSA Federal Summit 2020' : "''2020 State of Federal Cloud Security: A Practitioner’s Perspective''" ⇒ [[inscription|https://www.brighttalk.com/webcast/10415/421145]]
* July ''15th'', 2020 → 'CSA Federal Summit 2020' : "''Update on FedRAMP''" ⇒ [[inscription|https://www.brighttalk.com/webcast/10415/422428]]

|ssTabl96|k
|!⇒ [[CloudSecurityAlliance.fr/go/K6S/|https://CloudSecurityAlliance.fr/go/K6S/]] |
|!Juin|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2020.06.28|
|2020.06.28|Francoise Gilbert|![[FTC Guidance - Six Steps Towards More Secure Cloud Computing|https://www.francoisegilbert.com/?p=1491]] |FTC Recommendations|
|2020.06.15|FTC| → [[Six steps toward more secure cloud computing|https://www.ftc.gov/news-events/blogs/business-blog/2020/06/six-steps-toward-more-secure-cloud-computing]]|FTC Recommendations|
|2020.06.28|Cloud Security Podcast|![[How To Become A Cloud Security Engineer in 2020 - Including Top Certifications|https://anchor.fm/cloudsecuritypodcast/episodes/HOW-TO-BECOME-A-CLOUD-SECURITY-ENGINEER-in-2020--Including-Top-Certifications-eg1cek]] ([[transcrption|https://www.cloudsecuritypodcast.tv/listen-to-the-episodes/how-to-become-a-cloud-security-engineer]]) |Podcast|
|>|>|>|!2020.06.26|
|2020.06.26|VPN Mentor|[[Report: Domestic Abuse Prevention App Exposes Victims in Massive Data Breach|https://www.vpnmentor.com/blog/report-aspire-news-app-breach/]]|Data_Breach AWS_S3|
|2020.06.26|CSO Online|[[How do you secure the cloud? New data points a way|https://www.csoonline.com/article/3221388/how-do-you-secure-the-cloud-new-data-points-a-way.html]]|Reports|
|2020.06.26|Cloud Management Insider|[[How APIs Are Simplifying The Cloud Environment?|https://www.cloudmanagementinsider.com/how-apis-are-simplifying-the-cloud-environment/]]|APIs|
|2020.06.26|//Aqua Security//|[[Threat Alert: DzMLT has Hidden Cryptominers in Container Images|https://blog.aquasec.com/container-vulnerability-dzmlt-dynamic-container-analysis]]|Container Vulnerability|
|2020.06.26|//Alcide//|[[Kubernetes, OPA Gatekeeper, Alcide and Your Cluster Security|https://blog.alcide.io/kubernetes-opa-gatekeeper-alcide-and-your-cluster-security]]|Products|
|>|>|>|!2020.06.25|
|2020.06.25|//Akamai//|[[Largest Ever Recorded Packet Per Second-Based DDoS Attack Mitigated by Akamai|https://blogs.akamai.com/2020/06/largest-ever-recorded-packet-per-secondbased-ddos-attack-mitigated-by-akamai.html]]|Attacks DDoS|
|2020.06.25|Bleeping Computer| → [[European bank suffers biggest PPS DDoS attack, new botnet suspected|https://www.bleepingcomputer.com/news/security/european-bank-suffers-biggest-pps-ddos-attack-new-botnet-suspected/]]|Attacks DDoS|
|2020.06.25|Security Week| → [[Akamai Mitigates Record 809 MPPS DDoS Attack|https://www.securityweek.com/akamai-mitigates-record-809-mpps-ddos-attack?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Securityweek+%28SecurityWeek+RSS+Feed%29]]|DDoS|
|2020.06.25|//The SSL Store//| → [[The Largest DDoS Attack in history just happened... and it didn't work|https://www.thesslstore.com/blog/largest-ddos-attack-in-history/]]|Attacks DDoS|
|2020.06.25|//Palo Alto Networks//|![[Attackers Cryptojacking Docker Images to Mine for Monero|https://unit42.paloaltonetworks.com/cryptojacking-docker-images-for-mining-monero/]] |Docker Cryptojacking|
|2020.06.26|Container Journal| → [[Docker Hub Distributing Cryptomining Malware?|https://containerjournal.com/topics/container-security/docker-hub-distributing-cryptomining-malware/]]|Cryptomining Docker|
|2020.06.29|GBHackers on Security| → [[Hackers Abusing Docker Hub Account to Mine Monero Cryptocurrency|https://gbhackers.com/docker-hub-account/]]|Cryptomining Docker|
|2020.06.25|//Avanan//|[[SYLKin Attack: New Malicious .slk files are bypassing Microsoft 365 Security, Risking 200M+ Users|https://www.avanan.com/blog/sylkin-attack-bypassing-microsoft-365-security-risking-users]]|M365 Attack|
|2020.06.25|//Kaspersky//|[[How to secure DevOps|https://www.kaspersky.com/blog/devops-security-hybrid/36021/]]|DevSecOps|
|2020.06.25|//Expel//|[[So you’ve got a multi-cloud strategy; here’s how to navigate four common security challenges posts|https://expel.io/blog/multi-cloud-strategy-four-security-challenges/]]|Challenges|
|2020.06.25|//AT&T//|[[SD-WAN security explained|https://cybersecurity.att.com/blogs/security-essentials/sd-wan-security-explained]]|SD-WAN|
|2020.06.25|//StackRox//|![[Protecting Against Kubernetes Threats: Chapter 1 - Initial Access|https://www.stackrox.com/post/2020/06/protecting-against-kubernetes-threats-chapter-1-initial-access/]] |Kubernetes Threats|
|2020.06.25|Gartner|[[Gartner Forecasts Strong Revenue Growth for Global Container Management Software and Services Through 2024|https://www.gartner.com/en/newsroom/press-releases/2020-06-25-gartner-forecasts-strong-revenue-growth-for-global-co]]|Gartner containers Market|
|2020.06.25|Gartner| → [[Forecast Analysis: Container Management (Software and Services), Worldwide|https://www.gartner.com/document/3985796]] (rapport payant)|Gartner containers Market|
|2020.06.25|Silicon Angle|[[Gartner says container adoption will grow rapidly, but it won’t be that profitable|https://siliconangle.com/2020/06/25/gartner-says-container-adoption-will-grow-rapidly-wont-profitable/]]|Gartner containers Market|
|2020.06.25|//LogRhythm//|[[SOAR: The Answer to the Cybersecurity Skills Gap and a Future in the Cloud|https://logrhythm.com/in-the-news/soar-the-answer-to-the-cybersecurity-skills-gap-and-a-future-in-the-cloud/]]|SOAR|
|2020.06.25|CBR Online|[[IBM Cloud Outage: Another Wobble Raises Resilience Concerns|https://www.cbronline.com/news/ibm-cloud-issues-redux]]|Outage|
|2020.06.25|//TrendMicro//|[[8 Cloud Myths Debunked|https://blog.trendmicro.com/8-cloud-myths-debunked/]] (infographie)|Myths|
|>|>|>|!2020.06.24|
|2020.06.24|//Lexing//[>img[iCSF/flag_fr.png]]|![[Gaia-X : les lignes directrices du cloud souverain européen dévoilées|https://www.alain-bensoussan.com/avocats/gaia-x-les-lignes-directrices-du-cloud-souverain-europeen-devoilees/2020/06/24/]] |GAIA-X Europe|
|2020.06.24|Journal du Net[>img[iCSF/flag_fr.png]]|[[Cloud privé : OVHCloud sacré leader en Europe devant Atos et Orange |https://www.journaldunet.com/web-tech/cloud/1492369-cloud-prive-ovhcloud-sacre-leader-en-europe-devant-atos-et-orange/]]|Market_Shares France|
|2020.06.24|NCSC UK|[[Why cloud first is not a security problem|https://www.ncsc.gov.uk/blog-post/why-cloud-first-is-not-a-security-problem]]|Misc|
|2020.06.24|TL;DR Sec|[[How Uber Continuously Monitors the Security of its AWS Environment|https://tldrsec.com/blog/uber-aws-continuous-monitoring/]] références [[1|https://medium.com/@ubersecurity/part-1-aws-continuous-monitoring-f39f81ea6801]] et [[2|https://medium.com/@ubersecurity/part-2-aws-monitoring-case-studies-9fbc613aff28]]|AWS Monitoring|
|2020.06.24|DZone|[[Kubernetes Security: Don’t Forget These Best Practices|https://dzone.com/articles/kubernetes-security-dont-forget-these-best-practic]]|Kubernetes Best_Practices|
|2020.06.24|DZone|[[A Modern Approach to Cloud Security|https://dzone.com/articles/a-modern-approach-to-cloud-security]]|Misc|
|2020.06.24|BetaNews|[[New application security analyzer helps prevent breaches across cloud services|https://betanews.com/2020/06/24/application-security-analyzer/]]|Products|
|2020.06.24|Thomas Naunheim|[[Security considerations of Azure EA management and potential privilege escalation|https://www.cloud-architekt.net/azure-ea-management-security-considerations/]]|Azure Analysis|
|2020.06.24|E Hacking News|[[Experts discovered phishing emails in Office 365 accounts|https://www.ehackingnews.com/2020/06/experts-discovered-phishing-emails-in.html]]|O365 Phishing|
|2020.06.24|//Security Intelligence//|[[Visibility and Threat Detection in a Remote Working World|https://securityintelligence.com/posts/visibility-threat-detection-remote-work/]]|WFH Detection|
|2020.06.24|//Security Intelligence//|[[Three Approaches to Cybersecurity Planning for Post-Pandemic Cloud Adoption|https://securityintelligence.com/posts/cybersecurity-planning-post-pandemic-cloud-adoption/]]|Misc|
|2020.06.24|//Palo Alto Networks//|![[Mapping the Cloud Native Security Genome|https://blog.paloaltonetworks.com/2020/06/cloud-native-security-genome/]] |Report|
|2020.06.24|//Palo Alto Networks//| → [[The State Of Cloud Native Security|https://www.paloaltonetworks.com/state-of-cloud-native-security]]|Report|
|2020.06.24|//Microsoft//|[[Feeling fatigued? Cloud-based SIEM relieves security team burnout - Microsoft Security|https://www.microsoft.com/security/blog/2020/06/24/cloud-based-siem-security-team-burnout/]]|SIEM|
|2020.06.24|//Microsoft Azure//|![[Azure.com operates on Azure part 1: Design principles and best practices|https://azure.microsoft.com/blog/azurecom-operates-on-azure-part-1-design-principles-and-best-practices/]] (1/2) |Azure Design|
|2020.06.24|//Microsoft Azure//|![[How Azure.com operates on Azure part 2: Technology and architecture|https://azure.microsoft.com/blog/how-azurecom-operates-on-azure-part-2-technology-and-architecture/]] (2/2) |Azure Architecture|
|2020.06.24|//Microsoft Azure//|[[Deploy to Azure Container Instances with Docker Desktop|https://azure.microsoft.com/blog/deploy-to-azure-container-instances-with-docker-desktop/]]|Azure Docker|
|2020.06.24|//Microsoft Azure//|[[Stay ahead of attacks with Azure Security Center|https://azure.microsoft.com/blog/stay-ahead-of-attacks-with-azure-security-center/]] ([[inscription|https://info.microsoft.com/Stay-Ahead-of-Attacks-with-Azure-Security-Center-Registration.html?ocid=AID3011167_QSG_BLOG_411853]])|Azure Products Webinar|
|2020.06.24|//Google Cloud//|[[Automate your response to a Cloud Logging event|https://cloud.google.com/blog/products/management-tools/automate-your-response-to-a-cloud-logging-event/]]|Logging|
|2020.06.24|//Amazon AWS//|[[What is a cyber range and how do you build one on AWS?|https://aws.amazon.com/blogs/security/what-is-cyber-range-how-do-you-build-one-aws/]]|Exercise|
|2020.06.24|//Cloudonaut//|[[Containers vs. Serverless: Thoughts About Your Cloud Strategy|https://cloudonaut.io/containers-vs-serverless-cloud-strategy/]]|Containers Serverless|
|>|>|>|!2020.06.23|
|2020.06.23|ZDnet[>img[iCSF/flag_fr.png]]|[[Health Data Hub : Azure aura de la concurrence|https://www.zdnet.fr/actualites/health-data-hub-azure-aura-de-la-concurrence-39905613.htm]]|Healthcare France|
|2020.06.23|SANS DFIR|![[Cloud Storage Forensics Endpoint Evidence|https://www.youtube.com/watch?v=vgmKUGuMi7c]] (66 min.) |Forensics Video|
|2020.06.23|Nino Crudele|[[Azure Governance and Tools – Pros and Cons|https://ninocrudele.com/azure-governance-and-tools-pros-and-cons]]|Azure Governance|
|2020.06.23|MSP Alliance|[[Negotiating Public Cloud Agreements|https://mspalliance.com/negotiating-public-cloud-agreements/]]|SLAs|
|2020.06.23|YoKo Kho|[[From Recon to Bypassing MFA Implementation in OWA by Using EWS Misconfiguration|https://medium.com/bugbountywriteup/from-recon-to-bypassing-mfa-implementation-in-owa-by-using-ews-misconfiguration-b6a3518b0a63]]|Attack Analysis EWS MFA|
|2020.06.23|Computer Weekly|[[How to apply zero-trust models to container security|https://www.computerweekly.com/feature/How-to-apply-zero-trust-models-to-container-security]]|Containers Zero_Trust|
|2020.06.23|Computer Weekly|[[Gartner: Are the real cloud wars about to begin?|https://www.computerweekly.com/opinion/Gartner-Are-the-real-cloud-wars-about-to-begin]]|Misc|
|2020.06.23|//Microsoft Azure//|[[Azure Container Registry: Securing container workflows|https://azure.microsoft.com/blog/azure-container-registry-securing-container-workflows/]]||
|2020.06.23|//FireEye//|[[Clouds Are Secure, Are You Using Them Securely?|http://www.fireeye.com/blog/executive-perspective/2020/06/clouds-are-secure-are-you-using-them-securely.html]]|Misc|
|2020.06.23|//Symantec//|[[Sodinokibi: Ransomware Attackers also Scanning for PoS Software, Leveraging Cobalt Strike|https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/sodinokibi-ransomware-cobalt-strike-pos]]|Ransomware|
|2020.06.26|CBR Online| →[[This Ransomware Campaign is Being Orchestrated from the Cloud|https://www.cbronline.com/news/ransomware-cloudfront]] ([[IOC|https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/sodinokibi-ransomware-cobalt-strike-pos]])|Ransomware|
|2020.06.23|//Cloud Vector//|[[API Security Checklist: Part 2|https://www.cloudvector.com/api-security-checklist-part-2/]] (2/2)|APIs|
|2020.05.12|//Cloud Vector//| → [[API Security Checklist: Secure API Design|https://www.cloudvector.com/api-security-checklist-secure-api-design/]] (1/2)|APIs|
|2020.06.23|//Veracode//|[[Making a Case for the Cloud: Customers Give Their Honest Feedback of SaaS-Based AppSec|https://www.veracode.com/blog/managing-appsec/making-case-cloud-customers-give-their-honest-feedback-saas-based-appsec]]|SaaS|
|>|>|>|!2020.06.22|
|2020.06.22|TechBeacon|[[Cloud misconfigurations and security: 5 ways to avoid your next fail|https://techbeacon.com/security/cloud-misconfigurations-security-5-ways-avoid-your-next-fail]]|Misconfigurations|
|2020.06.22|Cado Security|[[Introducing Cado Cloud Collector — A free tool to forensically image AWS EC2 Instances|https://medium.com/@cloudyforensics/introducing-cado-cloud-collector-a-free-tool-to-forensically-image-aws-ec2-instances-ec831dd00ed7]]|Forensics AWS Tools|
|2020.06.22|Silicon.fr[img[iCSF/flag_fr.png]]|[[Health Data Hub : le Conseil d’Etat confirme le choix de Microsoft Azure|https://www.silicon.fr/health-data-hub-le-conseil-detat-confirme-le-choix-de-microsoft-azure-341736.html]]|Healthcare France|
|2020.06.22|//AWS//|[[Accreditation models for secure cloud adoption|https://aws.amazon.com/blogs/security/accreditation-models-for-secure-cloud-adoption/]] ([[pdf|https://d1.awsstatic.com/whitepapers/accreditation-models-for-secure-cloud-adoption.pdf]])|Accreditation|
|2020.06.22|//Microsoft//|[[Microsoft acquires CyberX to accelerate and secure customers’ IoT deployments|https://www.microsoft.com/security/blog/2020/06/22/microsoft-acquires-cyberx-accelerate-customers-iot-deployments/]] ([[détails|https://blogs.microsoft.com/?p=52559045]])|Acquisitions|
|2020.06.22|//CyberX//| → [[Microsoft Acquires CyberX|https://cyberx-labs.com/blog/microsoft-acquires-cyberx/]] ([[détails|https://cyberx-labs.com/press-releases/microsoft/]])|Acquisitions|
|2020.06.22|Security Week| → [[Microsoft Acquires Industrial Cybersecurity Company CyberX|https://www.securityweek.com/microsoft-acquires-industrial-cybersecurity-company-cyberx]]|Acquisitions|
|2020.06.22|MSSP Alert| → [[Microsoft Acquires CyberX; Azure Cloud Gains IoT Security Services|https://www.msspalert.com/investments/microsoft-acquires-cyberx/]]|Acquisitions|
|2020.06.22|Redmond Channel| → [[Microsoft's CyberX Acquisition Boosts Security of Azure IoT Lineup|https://rcpmag.com/articles/2020/06/22/microsoft-cyberx-acquisition.aspx]]|Acquisition|
|2020.06.22|//Microsoft Azure//|[[Rapid recovery planning for IT service providers|https://azure.microsoft.com/en-us/blog/rapid-recovery-planning-for-it-service-providers/]]|Recovery|
|2020.06.22|//TrendMicro//|[[XORDDoS, Kaiji Botnet Malware Variants Target Exposed Docker Servers|https://blog.trendmicro.com/trendlabs-security-intelligence/xorddos-kaiji-botnet-malware-variants-target-exposed-docker-servers/]]|Malware Docker|
|2020.06.23|Security Week| → [[XORDDoS, Kaiji DDoS Botnets Target Docker Servers|https://www.securityweek.com/xorddos-kaiji-ddos-botnets-target-docker-servers]]||
|2020.06.22|//Securosis//|![[Data Security in the SaaS Age: Thinking Small|https://securosis.com/blog/data-security-in-the-saas-age-thinking-small]] (3/4) |SaaS|
|2020.06.22|//Duo Security//|[[Password Spraying Leads to Compromise of Cloud Identities|https://duo.com/decipher/password-spraying-leads-to-compromise-of-cloud-identities]]|O365 Attacks|
|2020.06.22|//TrendMicro//|[[Knowing your shared security responsibility in Microsoft Azure and avoiding misconfigurations|https://blog.trendmicro.com/azure-avoiding-misconfigurations/]]|Azure Misconfigurations|
!Agenda du 'CSA Federal Summit 2020'
[>img(300px,auto)[iCSA/FedSum20.png]]Le ''CSA Federal Summit'' n'aura pas lieu sous la forme prévue cette année, mais en webcast en ligne. L'occasion pour tous de suivre cette conférence.
Les sessions seront diffusées en direct sur le site Brightalk tous les mercredi du 1er au 29 juillet 2020, de 19h à 20h.

Les 4 sessions sont les suivantes :
* [>img(200px,auto)[iCSA/K71CF.png]]1er juillet 2020 à 19h : "''Reducing Compliance Costs with DevSecOps Principles in the Hybrid Cloud''" par Daniel Domkowski, Software Delivery Specialist - Red Hat
** Inscription ⇒ [[ici|https://www.brighttalk.com/webcast/10415/419080]]
> //58% of organizations are now viewing security compliance requirements and costs as a barrier to entering new markets. Their only choice is to reinvent their approach to compliance. While the vast majority of enterprises are turning to the public cloud to simplify innovation, 93% are invested in more than one cloud. Considering security models and controls vary widely across public providers, and even more so between the cloud and on-premise environments, the most cost effective approach to compliance is one based on principles and behaviors that are cloud and environment agnostic. Enter DevSecOps in the Hybrid Cloud.//
* [>img(200px,auto)[iCSA/K78CF.png]]8 juillet 2020 à 19h : "''2020 State of Federal Cloud Security: A Practitioner’s Perspective''" par Dr. Mari Spina, Principal Cyber Security Engineer - The MITRE Corporation
** Inscription ⇒ [[ici|https://www.brighttalk.com/webcast/10415/421145]]
> //Understanding threats and shared responsibility that all Federal agencies have is key to building confidence in security. How has the government and Industry addressed these challenges and are they making progress? Dr. Spina will build on her assessment from the 2018 and 2019 Federal Summits and talk about success areas and challenges.//
* [>img(200px,auto)[iCSA/K7FCF.png]]15 juillet 2020 à 19h : "''Update on FedRAMP''" par Zach Baldwin, FedRAMP Program Manager for Strategy, Innovation, and Technology - General Services Administration, et une introduction par John Yeoh, Global VP of Research for CSA
** Inscription ⇒ [[ici|https://www.brighttalk.com/webcast/10415/422428]]
> //Mr. Baldwin will define and discuss several new initiatives that FedRAMP is working on in response to feedback for their users including: Open Security Controls Assessment Language (OSCAL), Threat-based Risk Profiling, and Agency Liaison Program.  These initiatives are all interrelated and designed to simplify the FedRAMP process, grow the cloud security marketplace and provide guidance to CSPs.//
* 29 juillet 2020 ) 19h : "''The Resurgence of Cloud''" par David Cass, Vice President Cyber & IT Risk - Federal Reserve Bank of New York Supervision Group
<<<
//Cloud has seen the typical technology pendulum swing experienced by most innovative technologies.
Organizations started with the all-in cloud-first model only to have to later step back and take a more moderate approach. Yet cloud continues to thrive. I will discuss://
* //Why do organizations struggle with cloud?//
* //The importance of strategy//
* //The impact on security, risk and compliance programs//
* //The impact on business process and operations//
<<<
__Liens :__
* site de la conférence ⇒ [[cvent.me/bV5Mlr|https://cvent.me/bV5Mlr]]
* site Brightalk pour suivre les présentations ⇒ [["federal-summit-series" sur Brighttalk.com|https://www.brighttalk.com/search/?q=federal-summit-series]]
[>img(200px,auto)[iCSA/K4CCCSK.png]]Le Chapitre ''SoCal/LA'' (South California / Los Angeles) de la [[Cloud Security Alliance]] a organisé en mai et juin 2020 des cours d'aide à la préparation au [[CCSK]].

Animés par Victor Monga+++*[»]> https://linkedin.com/in/victorvirtual === et Aneel Dadlani+++*[»]> https://linkedin.com/in/adadani ===, ils se sont déroulés sur 6 semaines et ont été enregistrés. Ils sont disponibles sur YouTube sous la forme de 6 vidéos d'une durée totale de 3h30.
Ces vidéos d'aide ne se substituent pas au suivi d'une formation officielle, mais peuvent compléter le travail personnel d'apprentissage et de préparation de l'examen CCSK.

En complément, on trouve aussi sur YouTube quelques exemples de questions posées lors d'examens CCSK passés, comme sur la chaine de SkillCertPro (10 questions).
|!Dates|!Sources|!Titres et Liens|!Tags|
|2020.05.01|CSA SoCal/LA Chapter|[[Module 1 (24 min.)|https://www.youtube.com/watch?v=4W0GmeRrbfk]]|CCSK|
|2020.05.08|CSA SoCal/LA Chapter|[[Module 2 (19 min.)|https://www.youtube.com/watch?v=oLLijwmK534]]|CCSK|
|2020.05.15|CSA SoCal/LA Chapter|[[Module 3 (22 min.)|https://www.youtube.com/watch?v=nC6n4Dc6RyA]]|CCSK|
|2020.05.22|CSA SoCal/LA Chapter|[[Module 4 (39 min.)|https://www.youtube.com/watch?v=KYso_pEUFoc]]|CCSK|
|2020.05.29|CSA SoCal/LA Chapter|[[Module 5 (63 min.)|https://www.youtube.com/watch?v=JVUawvo-eCI]]|CCSK|
|2020.06.05|CSA SoCal/LA Chapter|[[Module 6 (43 min.)|https://www.youtube.com/watch?v=VTge8e3ryiM]]|CCSK|
|2020.04.26|SkillCertPro|[[10 sample CCSK questions|https://www.youtube.com/watch?v=HGoZXsc-tXs]]|CCSK|
[img[iCSF/flag_fr.png]]oc[img(50%,1px)[iCSF/BluePixel.gif]]
|[img(30px,auto)[iCSF/Francais.gif]] @@color:#00F;font-size:125%;__[[Version française|2020.06.21 - Newsletter Hebdomadaire - #69]]__@@ |[img(30px,auto)[iCSF/Anglais.gif]] @@color:#00F;font-size:125%;__[[English version|2020.06.21 - Weekly Newsletter - #69]]__@@ |
|<<tiddler [[2020.06.21 - Newsletter Hebdomadaire - #69]]>> |<<tiddler [[2020.06.21 - Weekly Newsletter - #69]]>> |
!Newsletter Hebdomadaire Cloud et Sécurité - semaine du 15 au 21 juin 2020
!!1 - Nouveautés CSA et Informations - 15 au 21 juin 2020
* Appel à commentaires CSA : 'Critical Controls Implementation for SAP, Part 2'+++*[»]> <<tiddler [[2020.06.18 - Appel à commentaires 'Critical Controls Implementation for SAP, Part 2']]>>=== 
* Publication CSA : 'Telehealth Data in the Cloud'+++*[»]> <<tiddler [[2020.06.16 - Publication : 'Telehealth Data in the Cloud']]>>=== 
* Actualité : Appel à contribution pour le Congrès EMEA de la CSA+++*[»]> <<tiddler [[2020.06.11 - Appel à contribution pour le Congrès EMEA de la CSA]]>>=== 
!!2 - Veille Web Cloud et Sécurité
La [[Veille Web|2020.06.21 - Veille Hebdomadaire - 21 juin]] avec plus de 110 liens
* À lire
** Le Cloud comme source d'attaques (Texas Tech University)+++*[»] 
|2020.06.16|Texas Tech University|![[Cloud as an Attack Platform|https://arxiv.org/pdf/2006.07914.pdf]] (pdf) |Cloud_Abuse Attacker_Behavior|
|2020.06.16|Texas Tech University|![[Launching Stealth Attacks using Cloud|https://arxiv.org/pdf/2006.07908.pdf]] (pdf) |Cloud_Abuse Attacker_Behavior|
|2020.06.17|The Register| → [[Boffins find that over nine out of ten 'ethical' hackers are being a bit naughty when it comes to cloud services|https://www.theregister.com/2020/06/17/cloud_services_hacking/]]|Cloud_Abuse Attacker_Behavior|
=== 
** Analyse des vulnérabilités d'images Docker (Norwegian University of Science and Technology)+++*[»] 
|2020.06.17|isBuzzNews|[[Vulnerability Analysis Of 2500 Docker Hub Images – Expert On Report|https://www.informationsecuritybuzz.com/expert-comments/vulnerability-analysis-of-2500-docker-hub-images-expert-on-report/]]|Report Docker|
|2020.06.12|NTNU|! → [[Vulnerability Analysis of 2500 Docker Hub Images|https://arxiv.org/pdf/2006.02932.pdf]]|Report Docker|
|2020.06.12|NTNU| → [[Docker image analyzing tools|https://github.com/katrinewi/Docker-image-analyzing-tools]]|Tools Docker|
=== 
** Localisation et conformité (Microsoft Azure)+++*[»] 
|2020.06.18|//Microsoft Azure//|![[New Azure maps make identifying local compliance options easy|https://azure.microsoft.com/en-us/blog/new-azure-maps-make-identifying-local-compliance-options-easy/]] |Azure Compliance|
|2020.06.18|//Microsoft Azure//| → [[Azure Enables a World of Compliance|https://azure.microsoft.com/en-us/resources/azure-enables-a-world-of-compliance/]] ([[livre blanc|https://azure.microsoft.com/mediahandler/files/resourcefiles/azure-enables-a-world-of-compliance/Azure_Compliance_Maps.pdf]])|Azure Compliance|
|2020.06.18|//Microsoft Azure//| → [[Azure Global Compliance Map|https://azure.microsoft.com/en-us/resources/azure-global-compliance-map/]] ([[infographie|https://azure.microsoft.com/mediahandler/files/resourcefiles/azure-global-compliance-map/AzureComplianceInfographic.pdf]])|Azure Compliance|
|2020.06.18|//Microsoft Azure//|![[Making your data residency choices easier with Azure|https://azure.microsoft.com/blog/making-your-data-residency-choices-easier-with-azure/]] ([[document|https://aka.ms/AzureGlobalRegions]]) |Data_Residency|
|2020.06.12|//Microsoft Azure//| → [[Enabling Data Residency and Data Protection in Microsoft Azure Regions|https://azure.microsoft.com/en-us/resources/achieving-compliant-data-residency-and-security-with-azure/]] ([[pdf|https://azure.microsoft.com/mediahandler/files/resourcefiles/achieving-compliant-data-residency-and-security-with-azure/Enabling_Data_Residency_and_Data_Protection_in_Microsoft_Azure_Regions.pdf]])|Data_Residency|
=== 
* Attaques
** Campagne de phishing Office 365+++*[»] 
|2020.06.18|//Checkpoint//|![[Office 365 Phishing Campaign Exploits Samsung, Adobe and Oxford Servers|https://research.checkpoint.com/2020/phishing-campaign-exploits-samsung-adobe-and-oxford-servers/]] |O365 Phishing|
|2020.06.18|Bleeping Computer| → [[Hijacked Oxford server used by hackers for Office 365 phishing|https://www.bleepingcomputer.com/news/security/hijacked-oxford-server-used-by-hackers-for-office-365-phishing/]]|O365 Phishing|
|2020.06.18|Dark Reading| → [[O365 Phishing Campaign Leveraged Legit Domains|https://www.darkreading.com/attacks-breaches/o365-phishing-campaign-leveraged-legit-domains/d/d-id/1338124]]|O365 Phishing|
|2020.06.18|//Threatpost//| → [[Phishing Campaign Targeting Office 365, Exploits Brand Names|https://threatpost.com/phishing-campaign-targeting-office-365-exploits-brand-names/156698/]]|O365 Phishing|
=== 
** Guide de réponse aux incidents d'AWS (mise à jour)+++*[»] 
|2020.06.18|//AWS//|![[AWS Security Incident Response Guide|https://d1.awsstatic.com/whitepapers/aws_security_incident_response.pdf]] (pdf) |AWS Incident_Response|
=== 
** Cartographie d'attaque (Microsoft Threat Protection)+++*[»] 
|2020.06.18|//Microsoft Azure//|![[Inside Microsoft Threat Protection: Mapping attack chains from cloud to endpoint|https://www.microsoft.com/security/blog/2020/06/18/inside-microsoft-threat-protection-mapping-attack-chains-from-cloud-to-endpoint/]] |Attacks Analysis|
=== 
* Fuites de données
** CasualX+++*[»] 
|2020.06.15|vpnMentor|[[Niche Dating Apps Expose 100,000s of Users in Massive Data Breach|https://www.vpnmentor.com/blog/report-dating-apps-leak/]]|AWS Data_Leak|
|2020.06.15|Silicon Angle| → [[Niche dating app user data found exposed on misconfigured cloud instance|https://siliconangle.com/2020/06/15/niche-dating-app-user-data-found-exposed-misconfigured-cloud-instance/]]|AWS Data_Leak|
|2020.06.16|Data Breaches| → [[845GB of racy dating app records exposed to entire internet via leaky AWS buckets|https://www.databreaches.net/845gb-of-racy-dating-app-records-exposed-to-entire-internet-via-leaky-aws-buckets/]]|AWS Data_Leak|
|2020.06.18|Data Breaches| → [[Statement by CasualX in response to “false statements” by vpnMentor|https://www.databreaches.net/statement-by-casualx-in-response-to-false-statements-by-vpnmentor/]]|AWS Data_Leak|
=== 
* Pannes
** M365 et Azure+++*[»] 
|2020.06.15|The Register|[[Microsoft 365 and Azure outage struck Australia and New Zealand just as business rocked up for a new week|https://www.theregister.com/2020/06/15/microsoft_365_outage_australia_new_zealand/]]|Outage M365|
=== 
* Rapports et études
** Investissements et dépenses en 2020 (Gartner)+++*[»] 
|2020.06.17|//Gartner//|![[Gartner Forecasts Worldwide Security and Risk Management Spending Growth to Slow but Remain Positive in 2020|https://www.gartner.com/en/newsroom/press-releases/2020-06-17-gartner-forecasts-worldwide-security-and-risk-managem]] |Forecast Employment|
|2020.06.21|//BitDefender//| → [[Cloud Security Spending to Buoy the Security Market in 2020|https://businessinsights.bitdefender.com/cloud-security-spending-security-market]]|Market|
=== 
** Chiffrement Zoom de bout-en-bout (mise à jour)+++*[»] 
|2020.06.17|//Zoom//|[[Zoom End-to-End Encryption Whitepaper v2|https://github.com/zoom/zoom-e2e-whitepaper/blob/master/CHANGELOG.md]] ([[whitepaper|https://github.com/zoom/zoom-e2e-whitepaper/blob/master/archive/zoom_e2e_v2.pdf]])|Zoom Encryption|
=== 
* Acquisitions
** Spanugo par IBM %%+++*[»] 
|2020.06.16|Security Week| → [[IBM Acquires Cloud Security Company Spanugo|https://www.securityweek.com/ibm-acquires-cloud-security-company-spanugo]]|Acquisition|
|2020.06.15|Silicon Angle|[[IBM buys Spanugo to bolster its financial services public cloud|https://siliconangle.com/2020/06/15/ibm-buys-spanugo-bolster-financial-services-public-cloud/]]|Acquisition|
|2020.06.16|Silicon.fr[img[iCSF/flag_fr.png]]| → [[Cybersécurité : IBM s'offre la start-up Spanugo|https://www.silicon.fr/cybersecurite-ibm-spanugo-341383.html]]|Acquisition|
=== 
* Divers
** Semaine d'accès gratuit aux ressources de Cloud Academy+++*[»] 
|2020.06.19|Cloud Academy|![[Kickstart Your Tech Training With a Free Week on Cloud Academy|https://cloudacademy.com/blog/kickstart-your-tech-training-with-a-free-week-on-cloud-academy/]] |Free_Training|
|~|~| → [[Training Library|https://cloudacademy.com/library/]]|Free_Training|
=== 
** Fiches d'aide aux tests d'intrusion dans le Cloud+++*[»] 
|2020.06.21|Beau Bullock|[[Cloud Pentest Cheatsheets|https://github.com/dafthack/CloudPentestCheatsheets]] ([[pdf|https://github.com/dafthack/CloudPentestCheatsheets/blob/master/cheatsheets/Cloud%20Pentesting%20Cheatsheet.pdf]])|Pentest CheatSheets|
=== 
** Sécurité des données et SaaS (2/4)+++*[»] 
|2020.06.15|//Securosis//|![[Data Security in the SaaS Age: Focus on What You Control|https://securosis.com/blog/data-security-in-the-saas-age-focus-on-what-you-control]] (2/4)|SaaS|
=== 
** Supervision dans AWS, dans Azure et détection dans GCP+++*[»] 
|2020.06.15|Uber security|[[Part 1: AWS Continuous Monitoring|https://medium.com/@ubersecurity/part-1-aws-continuous-monitoring-f39f81ea6801]] (1/2)|AWS Monitoring|
|2020.06.15|Uber security|[[Part 2: AWS Monitoring Case Studies|https://medium.com/@ubersecurity/part-2-aws-monitoring-case-studies-9fbc613aff28]] (2/2)|AWS Monitoring|
|2020.06.18|Sami Lamppu|[[Monitor Elevate Access Activity In Azure|https://samilamppu.com/2020/06/18/monitor-elevated-global-admin-account-usage/]]|AzureAD|
|2020.06.17|//Google Cloud//|[[Setting up advanced network threat detection with Packet Mirroring|https://cloud.google.com/blog/products/networking/packet-mirroring-enables-better-network-monitoring-and-security]]|Networks Detection|
=== 
** Zero-Trust+++*[»] 
|2020.06.16|Cloud Management Insider|[[Is It Really Beneficial To Implement A Cloud Security Model On Zero Trust?|https://www.cloudmanagementinsider.com/is-it-really-beneficial-to-implement-a-cloud-security-model-on-zero-trust/]]|Zero_Trust|
|2020.06.15|//Microsoft Azure//|[[Zero Trust - Part 1: Networking|https://www.microsoft.com/security/blog/2020/06/15/zero-trust-part-1-networking/]]|Zero_Trust|
=== 
** Outils: s'entrainer à trouver des vulnérabilités sur ''Kubernetes Goat'', Kube-Scan et Kube-Bench (Kubernetes), Tsunami (GCP), BOtB (containers), Panther (AWS)+++*[»] 
|2020.06.15|Madhu Akula|[[Kubernetes Goat|https://github.com/madhuakula/kubernetes-goat]]|Kubernetes Vulnerable_Design Challenge|
|2020.06.15|Madhu Akula| → [["Vulnerable by Design" Kubernetes Cluster|https://madhuakula.com/kubernetes-goat]]|Kubernetes Vulnerable_Design Challenge|
|2020.06.19|SecTechno|[[Kube-Scan - Kubernetes Risk Assessment Tool - SecTechno|https://sectechno.com/kube-scan-kubernetes-risk-assessment-tool/]]|Tools Kubernetes|
|2020.06.20|Sectechno|[[Kube-Bench - CIS Kubernetes Benchmark Assessor|https://sectechno.com/kube-bench-cis-kubernetes-benchmark-assessor/]]|Tools|
|2020.06.18|//Google Cloud//|[[Tsunami: An extensible network scanning engine for detecting high severity vulnerabilities with high confidence|https://opensource.googleblog.com/2020/06/tsunami-extensible-network-scanning.html]]|Tools GCP|
|2020.06.15|SecTechno|[[BOtB - Container Analysis and Exploitation Tool - SecTechno|https://sectechno.com/botb-container-analysis-and-exploitation-tool/]]|Tools|
|2020.06.17|SecTechno|[[Panther – Detect Threats and Improve Cloud Security|https://sectechno.com/panther-better-data-leads-to-better-visibility/]]|Tools AWS|
=== 
** Gagner un crédit de 25$ avec l'AWS Summit+++*[»] 
|2020.06.16|The Register|[[Psst. Hey kid, you want $50 in AWS credit? Great, you just need to fill out this form and sit through these web lectures|https://www.theregister.com/2020/06/16/aws_credit_virtual_summit_incentive/]]|AWS Free |
||//AWS//| → [[AWS Summit Online FAQ|https://aws.amazon.com/events/summits/online/emea/faqs/]]|AWS Free_Credits|
=== 
!!3 - Agenda
* ''26'' juin 2020 → fin de l'appel à propositions ''[[SECtember.com|https://SECtember.com/cfp]]''
* ''26'' juin 2020 → clôture de l'appel à commentaires sur la charte "[[Application Containers and Microservices Working Group Charter|https://cloudsecurityalliance.org/artifacts/application-containers-and-microservices-working-group-charter/]]"
* ''26'' juin 2020 → clôture de l'appel à commentaires sur la charte "[[Blockchain and Distributed Ledger Technology Working Group Charter|https://cloudsecurityalliance.org/artifacts/blockchain-and-distributed-ledger-technology-working-group-charter/]]"

|ssTabl96|k
|!⇒ [[CloudSecurityAlliance.fr/go/K6L/|https://CloudSecurityAlliance.fr/go/K6L/]] |
!Weekly Cloud and Security Watch Newsletter - June 15th to 21st, 2020[>img[iCSF/inEnglish.png]]
!!1 - CSA News and Updates - June 15th to 21st, 2020
* CSA Call for comments: 'Critical Controls Implementation for SAP, Part 2'+++*[»]> <<tiddler [[2020.06.18 - Appel à commentaires 'Critical Controls Implementation for SAP, Part 2']]>>=== 
* CSA Publication 'Telehealth Data in the Cloud'+++*[»]> <<tiddler [[2020.06.16 - Publication : 'Telehealth Data in the Cloud']]>>=== 
* News : Call for Papers for CSA EMEA Congress 2020+++*[»]> <<tiddler [[2020.06.11 - Appel à contribution pour le Congrès EMEA de la CSA]]>>=== 
!!2 - Cloud and Security News Watch
[[Over 110 links|2020.06.21 - Veille Hebdomadaire - 21 juin]]
* Must read
** Cloud as a (Stealth) Attack Platform (Texas Tech University)+++*[»] 
|2020.06.16|Texas Tech University|![[Cloud as an Attack Platform|https://arxiv.org/pdf/2006.07914.pdf]] (pdf) |Cloud_Abuse Attacker_Behavior|
|2020.06.16|Texas Tech University|![[Launching Stealth Attacks using Cloud|https://arxiv.org/pdf/2006.07908.pdf]] (pdf) |Cloud_Abuse Attacker_Behavior|
|2020.06.17|The Register| → [[Boffins find that over nine out of ten 'ethical' hackers are being a bit naughty when it comes to cloud services|https://www.theregister.com/2020/06/17/cloud_services_hacking/]]|Cloud_Abuse Attacker_Behavior|
=== 
** Vulnerability Analysis of Docker Hub Images (Norwegian U. of Science & Technology)+++*[»] 
|2020.06.17|isBuzzNews|[[Vulnerability Analysis Of 2500 Docker Hub Images – Expert On Report|https://www.informationsecuritybuzz.com/expert-comments/vulnerability-analysis-of-2500-docker-hub-images-expert-on-report/]]|Report Docker|
|2020.06.12|NTNU|! → [[Vulnerability Analysis of 2500 Docker Hub Images|https://arxiv.org/pdf/2006.02932.pdf]]|Report Docker|
|2020.06.12|NTNU| → [[Docker image analyzing tools|https://github.com/katrinewi/Docker-image-analyzing-tools]]|Tools Docker|
=== 
** Azure Global and Local Compliance (Microsoft Azure)+++*[»] 
|2020.06.18|//Microsoft Azure//|![[New Azure maps make identifying local compliance options easy|https://azure.microsoft.com/en-us/blog/new-azure-maps-make-identifying-local-compliance-options-easy/]] |Azure Compliance|
|2020.06.18|//Microsoft Azure//| → [[Azure Enables a World of Compliance|https://azure.microsoft.com/en-us/resources/azure-enables-a-world-of-compliance/]] ([[livre blanc|https://azure.microsoft.com/mediahandler/files/resourcefiles/azure-enables-a-world-of-compliance/Azure_Compliance_Maps.pdf]])|Azure Compliance|
|2020.06.18|//Microsoft Azure//| → [[Azure Global Compliance Map|https://azure.microsoft.com/en-us/resources/azure-global-compliance-map/]] ([[infographie|https://azure.microsoft.com/mediahandler/files/resourcefiles/azure-global-compliance-map/AzureComplianceInfographic.pdf]])|Azure Compliance|
|2020.06.18|//Microsoft Azure//|![[Making your data residency choices easier with Azure|https://azure.microsoft.com/blog/making-your-data-residency-choices-easier-with-azure/]] ([[document|https://aka.ms/AzureGlobalRegions]]) |Data_Residency|
|2020.06.12|//Microsoft Azure//| → [[Enabling Data Residency and Data Protection in Microsoft Azure Regions|https://azure.microsoft.com/en-us/resources/achieving-compliant-data-residency-and-security-with-azure/]] ([[pdf|https://azure.microsoft.com/mediahandler/files/resourcefiles/achieving-compliant-data-residency-and-security-with-azure/Enabling_Data_Residency_and_Data_Protection_in_Microsoft_Azure_Regions.pdf]])|Data_Residency|
=== 
* Attacks
** Office 365 Phishing Campaign+++*[»] 
|2020.06.18|//Checkpoint//|![[Office 365 Phishing Campaign Exploits Samsung, Adobe and Oxford Servers|https://research.checkpoint.com/2020/phishing-campaign-exploits-samsung-adobe-and-oxford-servers/]] |O365 Phishing|
|2020.06.18|Bleeping Computer| → [[Hijacked Oxford server used by hackers for Office 365 phishing|https://www.bleepingcomputer.com/news/security/hijacked-oxford-server-used-by-hackers-for-office-365-phishing/]]|O365 Phishing|
|2020.06.18|Dark Reading| → [[O365 Phishing Campaign Leveraged Legit Domains|https://www.darkreading.com/attacks-breaches/o365-phishing-campaign-leveraged-legit-domains/d/d-id/1338124]]|O365 Phishing|
|2020.06.18|//Threatpost//| → [[Phishing Campaign Targeting Office 365, Exploits Brand Names|https://threatpost.com/phishing-campaign-targeting-office-365-exploits-brand-names/156698/]]|O365 Phishing|
=== 
** AWS Security Incident Response Guide (update)+++*[»] 
|2020.06.18|//AWS//|![[AWS Security Incident Response Guide|https://d1.awsstatic.com/whitepapers/aws_security_incident_response.pdf]] (pdf) |AWS Incident_Response|
=== 
** Attack Chains Mapping (Microsoft Threat Protection)+++*[»] 
|2020.06.18|//Microsoft Azure//|![[Inside Microsoft Threat Protection: Mapping attack chains from cloud to endpoint|https://www.microsoft.com/security/blog/2020/06/18/inside-microsoft-threat-protection-mapping-attack-chains-from-cloud-to-endpoint/]] |Attacks Analysis|
=== 
* Data Leaks
** CasulaX+++*[»] 
|2020.06.15|vpnMentor|[[Niche Dating Apps Expose 100,000s of Users in Massive Data Breach|https://www.vpnmentor.com/blog/report-dating-apps-leak/]]|AWS Data_Leak|
|2020.06.15|Silicon Angle| → [[Niche dating app user data found exposed on misconfigured cloud instance|https://siliconangle.com/2020/06/15/niche-dating-app-user-data-found-exposed-misconfigured-cloud-instance/]]|AWS Data_Leak|
|2020.06.16|Data Breaches| → [[845GB of racy dating app records exposed to entire internet via leaky AWS buckets|https://www.databreaches.net/845gb-of-racy-dating-app-records-exposed-to-entire-internet-via-leaky-aws-buckets/]]|AWS Data_Leak|
|2020.06.18|Data Breaches| → [[Statement by CasualX in response to “false statements” by vpnMentor|https://www.databreaches.net/statement-by-casualx-in-response-to-false-statements-by-vpnmentor/]]|AWS Data_Leak|
=== 
* Outages
** M365 and Azure+++*[»] 
|2020.06.15|The Register|[[Microsoft 365 and Azure outage struck Australia and New Zealand just as business rocked up for a new week|https://www.theregister.com/2020/06/15/microsoft_365_outage_australia_new_zealand/]]|Outage M365|
=== 
* Reports and Surveys
** Cloud and Security Spendings 2020 (Gartner)+++*[»] 
|2020.06.17|//Gartner//|![[Gartner Forecasts Worldwide Security and Risk Management Spending Growth to Slow but Remain Positive in 2020|https://www.gartner.com/en/newsroom/press-releases/2020-06-17-gartner-forecasts-worldwide-security-and-risk-managem]] |Forecast Employment|
|2020.06.21|//BitDefender//| → [[Cloud Security Spending to Buoy the Security Market in 2020|https://businessinsights.bitdefender.com/cloud-security-spending-security-market]]|Market|
=== 
** Zoom End-to-End Encryption (update)+++*[»] 
|2020.06.17|//Zoom//|[[Zoom End-to-End Encryption Whitepaper v2|https://github.com/zoom/zoom-e2e-whitepaper/blob/master/CHANGELOG.md]] ([[whitepaper|https://github.com/zoom/zoom-e2e-whitepaper/blob/master/archive/zoom_e2e_v2.pdf]])|Zoom Encryption|
=== 
* Acquisitions
** Spanugo by IBM+++*[»] 
|2020.06.16|Security Week| → [[IBM Acquires Cloud Security Company Spanugo|https://www.securityweek.com/ibm-acquires-cloud-security-company-spanugo]]|Acquisition|
|2020.06.15|Silicon Angle|[[IBM buys Spanugo to bolster its financial services public cloud|https://siliconangle.com/2020/06/15/ibm-buys-spanugo-bolster-financial-services-public-cloud/]]|Acquisition|
|2020.06.16|Silicon.fr[img[iCSF/flag_fr.png]]| → [[Cybersécurité : IBM s'offre la start-up Spanugo|https://www.silicon.fr/cybersecurite-ibm-spanugo-341383.html]]|Acquisition|
=== 
* Miscellaneous
** Free Week on Cloud Academy+++*[»] 
|2020.06.19|Cloud Academy|![[Kickstart Your Tech Training With a Free Week on Cloud Academy|https://cloudacademy.com/blog/kickstart-your-tech-training-with-a-free-week-on-cloud-academy/]] |Free_Training|
|~|~| → [[Training Library|https://cloudacademy.com/library/]]|Free_Training|
=== 
** Cloud Pentest Cheatsheets+++*[»] 
|2020.06.21|Beau Bullock|[[Cloud Pentest Cheatsheets|https://github.com/dafthack/CloudPentestCheatsheets]] ([[pdf|https://github.com/dafthack/CloudPentestCheatsheets/blob/master/cheatsheets/Cloud%20Pentesting%20Cheatsheet.pdf]])|Pentest CheatSheets|
=== 
** Data Security in the SaaS Age (2/4)+++*[»] 
|2020.06.15|//Securosis//|![[Data Security in the SaaS Age: Focus on What You Control|https://securosis.com/blog/data-security-in-the-saas-age-focus-on-what-you-control]] (2/4)|SaaS|
=== 
** Monitoring Case Studies in AWS, in Azure, and detection in GCP+++*[»] 
|2020.06.15|Uber security|[[Part 1: AWS Continuous Monitoring|https://medium.com/@ubersecurity/part-1-aws-continuous-monitoring-f39f81ea6801]] (1/2)|AWS Monitoring|
|2020.06.15|Uber security|[[Part 2: AWS Monitoring Case Studies|https://medium.com/@ubersecurity/part-2-aws-monitoring-case-studies-9fbc613aff28]] (2/2)|AWS Monitoring|
|2020.06.18|Sami Lamppu|[[Monitor Elevate Access Activity In Azure|https://samilamppu.com/2020/06/18/monitor-elevated-global-admin-account-usage/]]|AzureAD|
|2020.06.17|//Google Cloud//|[[Setting up advanced network threat detection with Packet Mirroring|https://cloud.google.com/blog/products/networking/packet-mirroring-enables-better-network-monitoring-and-security]]|Networks Detection|
=== 
** Zero-Trust+++*[»] 
|2020.06.16|Cloud Management Insider|[[Is It Really Beneficial To Implement A Cloud Security Model On Zero Trust?|https://www.cloudmanagementinsider.com/is-it-really-beneficial-to-implement-a-cloud-security-model-on-zero-trust/]]|Zero_Trust|
|2020.06.15|//Microsoft Azure//|[[Zero Trust - Part 1: Networking|https://www.microsoft.com/security/blog/2020/06/15/zero-trust-part-1-networking/]]|Zero_Trust|
=== 
** Tools: the "Vulnerable by Design" ''Kubernetes Goat'', Kube-Scan and Kube-Bench (Kubernetes), Tsunami (GCP), BOtB (containers), Panther (AWS)+++*[»] 
|2020.06.15|Madhu Akula|[[Kubernetes Goat|https://github.com/madhuakula/kubernetes-goat]]|Kubernetes Vulnerable_Design Challenge|
|2020.06.15|Madhu Akula| → [["Vulnerable by Design" Kubernetes Cluster|https://madhuakula.com/kubernetes-goat]]|Kubernetes Vulnerable_Design Challenge|
|2020.06.19|SecTechno|[[Kube-Scan - Kubernetes Risk Assessment Tool - SecTechno|https://sectechno.com/kube-scan-kubernetes-risk-assessment-tool/]]|Tools Kubernetes|
|2020.06.20|Sectechno|[[Kube-Bench - CIS Kubernetes Benchmark Assessor|https://sectechno.com/kube-bench-cis-kubernetes-benchmark-assessor/]]|Tools|
|2020.06.18|//Google Cloud//|[[Tsunami: An extensible network scanning engine for detecting high severity vulnerabilities with high confidence|https://opensource.googleblog.com/2020/06/tsunami-extensible-network-scanning.html]]|Tools GCP|
|2020.06.15|SecTechno|[[BOtB - Container Analysis and Exploitation Tool - SecTechno|https://sectechno.com/botb-container-analysis-and-exploitation-tool/]]|Tools|
|2020.06.17|SecTechno|[[Panther – Detect Threats and Improve Cloud Security|https://sectechno.com/panther-better-data-leads-to-better-visibility/]]|Tools AWS|
=== 
** 25$ AWS credit at the AWS Summit+++*[»] 
|2020.06.16|The Register|[[Psst. Hey kid, you want $50 in AWS credit? Great, you just need to fill out this form and sit through these web lectures|https://www.theregister.com/2020/06/16/aws_credit_virtual_summit_incentive/]]|AWS Free |
||//AWS//| → [[AWS Summit Online FAQ|https://aws.amazon.com/events/summits/online/emea/faqs/]]|AWS Free_Credits|
=== 
!!3 - Agenda
* June ''26th'' → CSA : Final day for the ''[[SECtember.com|https://SECtember.com/cfp]]'' call for papers.
* June ''26th'' → CSA : Closing of the call for comments on the "[[Application Containers and Microservices Working Group Charter|https://cloudsecurityalliance.org/artifacts/application-containers-and-microservices-working-group-charter/]]"
* June ''26th'' → CSA : Closing of the call for comments on the "[[Blockchain and Distributed Ledger Technology Working Group Charter|https://cloudsecurityalliance.org/artifacts/blockchain-and-distributed-ledger-technology-working-group-charter/]]"

|ssTabl96|k
|!⇒ [[CloudSecurityAlliance.fr/go/K6L/|https://CloudSecurityAlliance.fr/go/K6L/]] |
|!Juin|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2020.06.21|
|2020.06.21|Beau Bullock|[[Cloud Pentest Cheatsheets|https://github.com/dafthack/CloudPentestCheatsheets]] ([[pdf|https://github.com/dafthack/CloudPentestCheatsheets/blob/master/cheatsheets/Cloud%20Pentesting%20Cheatsheet.pdf]])|Pentest CheatSheets|
|>|>|>|!2020.06.20|
|2020.06.20|The Next Web|[[Understand how to move a system to the cloud and secure it with this CompTIA training|https://thenextweb.com/offers/2020/06/20/understand-how-to-move-a-system-to-the-cloud-and-secure-it-with-this-comptia-training/]]|Misc|
|2020.06.20|Sectechno|[[Kube-Bench - CIS Kubernetes Benchmark Assessor|https://sectechno.com/kube-bench-cis-kubernetes-benchmark-assessor/]]|Tools|
|2020.06.20|//JumpCloud//|[[Logging into a Windows System with a G Suite Password|https://jumpcloud.com/blog/logging-into-a-windows-system-with-a-g-suite-password]]|G_Suite Authentication|
|>|>|>|!2020.06.19|
|2020.06.19|Cloud Academy|![[Kickstart Your Tech Training With a Free Week on Cloud Academy|https://cloudacademy.com/blog/kickstart-your-tech-training-with-a-free-week-on-cloud-academy/]] |Free_Training|
|~|~| → [[Training Library|https://cloudacademy.com/library/]]|Free_Training|
|2020.06.19|Computer Weekly|[[Cloud flash storage: SSD options from AWS, Azure and GCP|https://www.computerweekly.com/feature/Cloud-flash-storage-SSD-options-from-AWS-Azure-and-GCP]]|Storage AWS AZure GCP|
|2020.06.19|SecTechno|[[Kube-Scan - Kubernetes Risk Assessment Tool - SecTechno|https://sectechno.com/kube-scan-kubernetes-risk-assessment-tool/]]|Tools Kubernetes|
|2020.06.19|Help Net Security|[[Armorblox, Box and Slack to stop targeted attacks and data loss across cloud office platforms|https://www.helpnetsecurity.com/2020/06/19/armorblox-box-slack/]]|Products|
|2020.06.19|Silicon Angle|[[These are the top 10 mistakes organizations make with their cloud strategies|https://siliconangle.com/2020/06/19/top-10-mistakes-organizations-make-cloud-strategies/]]|Best_Practices|
|2020.06.19|Dark Reading|[[5 Steps for Implementing Multicloud Identity|https://www.darkreading.com/cloud/5-steps-for-implementing-multicloud-identity/a/d-id/1338114]]|Multicloud IAM|
|2020.06.19|//Centilytics//|[[Top 5 Frequently Asked Questions (FAQs) about Azure Expert MSP Audit|https://blogs.centilytics.com/frequently-asked-questions-azure-expert-msp-audit/]]|Azure Audit|
|2020.06.19|//Amazon AWS//|[[Automating safe, hands-off deployments|https://aws.amazon.com/builders-library/automating-safe-hands-off-deployments/]]|Deployment|
|>|>|>|!2020.06.18|
|2020.06.18|Cloud Security Alliance|[[CSA Offers Guidance on Adhering to Privacy, Security Protocols for Telehealth Data in the Cloud|https://cloudsecurityalliance.org/press-releases/2020/06/18/cloud-security-alliance-offers-guidance-on-adhering-to-privacy-security-protocols-for-telehealth-data-in-the-cloud/]] ([[téléchargement|https://cloudsecurityalliance.org//artifacts/telehealth-data-in-the-cloud]])|Telehealth|
|2020.06.19|Dark Reading| → [[Cloud Security Alliance Offers Tips to Protect Telehealth Data|https://www.darkreading.com/cloud/cloud-security-alliance-offers-tips-to-protect-telehealth-data/d/d-id/1338136]]|CSA Tele_health|
|2020.06.19|Container Journal| → [[Cloud Security Alliance Offers Guidance on Adhering to Privacy, Security Protocols for Telehealth Data in the Cloud|https://containerjournal.com/news/news-releases/cloud-security-alliance-offers-guidance-on-adhering-to-privacy-security-protocols-for-telehealth-data-in-the-cloud/]]|CSA Tele_health|
|2020.06.19|//CyberSecurity Insiders//| → [[Cloud Security Alliance Offers Guidance on Adhering to Privacy, Security Protocols for Telehealth Data in the Cloud|https://www.cybersecurity-insiders.com/cloud-security-alliance-offers-guidance-on-adhering-to-privacy-security-protocols-for-telehealth-data-in-the-cloud/]]|CSA Tele_health|
|2020.06.19|Help Net Security| → [[Privacy and security concerns related to patient data in the cloud|https://www.helpnetsecurity.com/2020/06/22/patient-data-cloud/]]|CSA Tele_health|
|2020.06.18|jdSupra|[[Getting Cautious on Cloud Outsourcing: ESMA Consults on Proposed Guidelines|https://www.jdsupra.com/legalnews/getting-cautious-on-cloud-outsourcing-20292/]]|Outsourcing|
|2020.06.18|jdSupra|![[Making Plans for Something You Hope Never Happens: What's Your Continuity Plan?|https://www.jdsupra.com/legalnews/making-plans-for-something-you-hope-32069/]] |BCP SaaS|
|2020.06.18|Cyber Defense Mag.|[[Digital Healthcare: How Secure Is the Care Data?|https://www.cyberdefensemagazine.com/digital-healthcare/]]|Healthcae|
|2020.06.18|Cloud Essentials|[[Is dedicated backup essential for Microsoft 365?|https://www.cloudessentials.com/blog/is-third-party-backup-essential-microsoft365/]]|Backups|
|2020.06.18|BetaNews|[[New solution helps enterprises handle sensitive data|https://betanews.com/2020/06/18/enterprise-sensitive-data/]]|Products|
|2020.06.18|Sami Lamppu|[[Monitor Elevate Access Activity In Azure|https://samilamppu.com/2020/06/18/monitor-elevated-global-admin-account-usage/]]|AzureAD|
|2020.06.18|Cloud Management Insider|[[Why Kubernetes Governance Is Essential For Enterprises?|https://www.cloudmanagementinsider.com/why-kubernetes-governance-is-essential-for-enterprises/]]|Kubernetes Governance|
|2020.06.18|Dark Reading|[[Back to Basics with Cloud Permissions Management|https://www.darkreading.com/cloud/back-to-basics-with-cloud-permissions-management/a/d-id/1338125]]|Misc|
|2020.06.18|//Microsoft Azure//|![[Inside Microsoft Threat Protection: Mapping attack chains from cloud to endpoint|https://www.microsoft.com/security/blog/2020/06/18/inside-microsoft-threat-protection-mapping-attack-chains-from-cloud-to-endpoint/]] |Attacks Analysis|
|2020.06.18|//Microsoft Azure//|![[New Azure maps make identifying local compliance options easy|https://azure.microsoft.com/en-us/blog/new-azure-maps-make-identifying-local-compliance-options-easy/]] |Azure Compliance|
|2020.06.18|//Microsoft Azure//| → [[Azure Enables a World of Compliance|https://azure.microsoft.com/en-us/resources/azure-enables-a-world-of-compliance/]] ([[livre blanc|https://azure.microsoft.com/mediahandler/files/resourcefiles/azure-enables-a-world-of-compliance/Azure_Compliance_Maps.pdf]])|Azure Compliance|
|2020.06.18|//Microsoft Azure//| → [[Azure Global Compliance Map|https://azure.microsoft.com/en-us/resources/azure-global-compliance-map/]] ([[infographie|https://azure.microsoft.com/mediahandler/files/resourcefiles/azure-global-compliance-map/AzureComplianceInfographic.pdf]])|Azure Compliance|
|2020.06.18|//Microsoft Azure//|![[Making your data residency choices easier with Azure|https://azure.microsoft.com/blog/making-your-data-residency-choices-easier-with-azure/]] ([[document|https://aka.ms/AzureGlobalRegions]]) |Data_Residency|
|2020.06.12|//Microsoft Azure//| → [[Enabling Data Residency and Data Protection in Microsoft Azure Regions|https://azure.microsoft.com/en-us/resources/achieving-compliant-data-residency-and-security-with-azure/]] ([[pdf|https://azure.microsoft.com/mediahandler/files/resourcefiles/achieving-compliant-data-residency-and-security-with-azure/Enabling_Data_Residency_and_Data_Protection_in_Microsoft_Azure_Regions.pdf]])|Data_Residency|
|2020.06.18|//Microsoft Azure//| → [[Minimize disruption with cost-effective backup and disaster recovery solutions on Azure|https://azure.microsoft.com/en-us/blog/minimize-disruption-with-costeffective-backup-and-disaster-recovery-solutions-on-azure/]]|Azure BCP DRP|
|2020.06.18|//Microsoft Azure//|[[Barracuda and Microsoft: Securing applications in public cloud|https://www.microsoft.com/security/blog/2020/06/18/barracuda-microsoft-securing-applications-public-cloud/]]|AWS|
|2020.06.18|//Google Cloud//|[[Google Data Center Security: 6 Layers Deep|https://www.youtube.com/watch?v=kd33UVZhnAA]] (vidéo YouTube)|GCP Data_Center|
|2020.06.18|//Google Cloud//|[[Tsunami: An extensible network scanning engine for detecting high severity vulnerabilities with high confidence|https://opensource.googleblog.com/2020/06/tsunami-extensible-network-scanning.html]]|Tools GCP|
|2020.06.18|//Checkpoint//|![[Office 365 Phishing Campaign Exploits Samsung, Adobe and Oxford Servers|https://research.checkpoint.com/2020/phishing-campaign-exploits-samsung-adobe-and-oxford-servers/]] |O365 Phishing|
|2020.06.18|Bleeping Computer| → [[Hijacked Oxford server used by hackers for Office 365 phishing|https://www.bleepingcomputer.com/news/security/hijacked-oxford-server-used-by-hackers-for-office-365-phishing/]]|O365 Phishing|
|2020.06.18|Dark Reading| → [[O365 Phishing Campaign Leveraged Legit Domains|https://www.darkreading.com/attacks-breaches/o365-phishing-campaign-leveraged-legit-domains/d/d-id/1338124]]|O365 Phishing|
|2020.06.18|//Threatpost//| → [[Phishing Campaign Targeting Office 365, Exploits Brand Names|https://threatpost.com/phishing-campaign-targeting-office-365-exploits-brand-names/156698/]]|O365 Phishing|
|2020.06.24|//E Hacking News//| → [[Experts discovered phishing emails in Office 365 accounts|https://www.ehackingnews.com/2020/06/experts-discovered-phishing-emails-in.html]]|O365 Phishing|
|2020.06.18|//AWS//|![[AWS Security Incident Response Guide|https://d1.awsstatic.com/whitepapers/aws_security_incident_response.pdf]] (pdf) |AWS Incident_Response|
|2020.06.18|//Tripwire//|[[Amazon Web Services Mitigated a 2.3 Tbps DDoS Attack|https://www.tripwire.com/state-of-security/security-data-protection/amazon-web-services-mitigated-a-2-3-tbps-ddos-attack/]]|
|2020.06.18|//Threatstack//|[[System Access and User Accountability in the Cloud|https://www.threatstack.com/blog/system-access-and-user-accountability-in-the-cloud]]|Accountability|
|2020.06.18|//Fugue//|[[Announcing the Cloud Security Masterclass Program to Educate on Cloud Misconfiguration Risk|https://www.fugue.co/blog/announcing-the-cloud-security-masterclass-program-to-educate-on-cloud-misconfiguration-risk]]|Training|
|2020.06.23|//Fugue//| → Webinaire [[Locking down the Security of AWS IAM|https://resources.fugue.co/locking-down-security-of-aws-iam]]|Webinar|
|2020.06.18|//Risk Recon//|[[New Toolkit for Assessing AWS Deployments and Operations|https://blog.riskrecon.com/new-toolkit-for-assessing-aws-deployments-and-operations]] ([[téléchargement|https://www.riskrecon.com/aws-assessment-toolkit]])|AWS Assessments|
|2020.06.19|//Park My Cloud//|[[Microsoft Azure VM Types Comparison|https://www.parkmycloud.com/blog/azure-vm-types/]]|Azure VM|
|2020.06.18|//CyberArk Conjur//|[[Secrets Management Overview For Developers & DevOps|https://www.conjur.org/blog/secrets-management-overview-for-developers-devops/]]|Secrets_Management|
|>|>|>|!2020.06.17|
|2020.06.17|isBuzzNews|[[Vulnerability Analysis Of 2500 Docker Hub Images – Expert On Report|https://www.informationsecuritybuzz.com/expert-comments/vulnerability-analysis-of-2500-docker-hub-images-expert-on-report/]]|Report Docker|
|2020.06.12|NTNU|! → [[Vulnerability Analysis of 2500 Docker Hub Images|https://arxiv.org/pdf/2006.02932.pdf]]|Report Docker|
|2020.06.12|NTNU| → [[Docker image analyzing tools|https://github.com/katrinewi/Docker-image-analyzing-tools]]|Tools Docker|
|2020.06.17|SecTechno|[[Panther – Detect Threats and Improve Cloud Security|https://sectechno.com/panther-better-data-leads-to-better-visibility/]]|Tools AWS|
|2020.06.17|//Zoom//|[[Zoom End-to-End Encryption Whitepaper v2|https://github.com/zoom/zoom-e2e-whitepaper/blob/master/CHANGELOG.md]] ([[whitepaper|https://github.com/zoom/zoom-e2e-whitepaper/blob/master/archive/zoom_e2e_v2.pdf]])|Zoom Encryption|
|2020.06.17|//Zoom//|[[End-to-End Encryption Update|https://blog.zoom.us/end-to-end-encryption-update/]]|Zoom Encryption|
|2020.06.18|BetaNews| → [[Zoom relents and agrees to give free users end-to-end encryption|https://betanews.com/2020/06/18/free-zoom-end-to-end-encryption/]]|Zoom Encryption|
|2020.06.18|Dark Reading| → [[Zoom Changes Course on End-to-End Encryption|https://www.darkreading.com/application-security/zoom-changes-course-on-end-to-end-encryption/d/d-id/1338119]]|Zoom Encryption|
|2020.06.17|//Gartner//|![[Gartner Forecasts Worldwide Security and Risk Management Spending Growth to Slow but Remain Positive in 2020|https://www.gartner.com/en/newsroom/press-releases/2020-06-17-gartner-forecasts-worldwide-security-and-risk-managem]] |Forecast Employment|
|2020.06.21|//BitDefender//| → [[Cloud Security Spending to Buoy the Security Market in 2020|https://businessinsights.bitdefender.com/cloud-security-spending-security-market]]|Market|
|2020.06.22|Silicon.fr[img[iCSF/flag_fr.png]]| → [[Cybersécurité : comment le Cloud peut sauver l’année 2020|https://www.silicon.fr/cybersecurite-cloud-annee-2020-341717.html]]|Market|
|2020.06.17|//Google Cloud//|[[Setting up advanced network threat detection with Packet Mirroring|https://cloud.google.com/blog/products/networking/packet-mirroring-enables-better-network-monitoring-and-security]]|Networks Detection|
|2020.06.17|//Intezer//|![[Intezer - Best Practices for Securing a Docker Runtime Environment|https://intezer.com/container-security/best-practices-for-securing-a-docker-runtime-environment/]] |Docker Best_Practices|
|2020.06.17|//Duo//|[[Unnamed Web Host Hit With DDoS Attack|https://duo.com/decipher/unnamed-web-host-hit-with-ddos-attack]]|Attacks|
|2020.06.17|//Compare The Cloud//|[[Oracle Database in the Cloud: Azure vs AWS vs Oracle|https://www.comparethecloud.net/articles/oracle-database-in-the-cloud-azure-vs-aws-vs-oracle/]]|Databases|
|>|>|>|!2020.06.16|
|2020.06.16|Texas Tech University|![[Cloud as an Attack Platform|https://arxiv.org/pdf/2006.07914.pdf]] (pdf) |Cloud_Abuse Attacker_Behavior|
|2020.06.16|Texas Tech University|![[Launching Stealth Attacks using Cloud|https://arxiv.org/pdf/2006.07908.pdf]] (pdf) |Cloud_Abuse Attacker_Behavior|
|2020.06.17|The Register| → [[Boffins find that over nine out of ten 'ethical' hackers are being a bit naughty when it comes to cloud services|https://www.theregister.com/2020/06/17/cloud_services_hacking/]]|Cloud_Abuse Attacker_Behavior|
|2020.06.16|The Register|[[Psst. Hey kid, you want $50 in AWS credit? Great, you just need to fill out this form and sit through these web lectures|https://www.theregister.com/2020/06/16/aws_credit_virtual_summit_incentive/]]|AWS Free |
||//AWS//| → [[AWS Summit Online FAQ|https://aws.amazon.com/events/summits/online/emea/faqs/]]|AWS Free_Credits|
|2020.06.16|Dark Reading|[[Cisco Brings SecureX into Full Security Lineup to Cut Complexity|https://www.darkreading.com/cloud/cisco-brings-securex-into-full-security-lineup-to-cut-complexity/d/d-id/1338097]]|Cisco Products|
|2020.06.17|Silicon.fr[img[iCSF/flag_fr.png]]|[[SecureX : Cisco ouvrira les vannes le 30 juin|https://www.silicon.fr/securex-cisco-30-juin-341411.html]]|Cisco Products|
|2020.06.16|Cyber Defense Mag.|[[New Expectations for the Network Perimeter|https://www.cyberdefensemagazine.com/new-expectations-for-the-network-perimeter/]]|Networks|
|2020.06.16|FAIR Institute|[[Microsoft Promotes FAIR™ Analysis for Cloud Security Risk|https://www.fairinstitute.org/blog/microsoft-promotes-fair-analysis-for-cloud-security-risk]]|Azure Risk_Analysis FAIR|
|2020.06.16|CISO Mag.|[[76.36% Believe Cloud Service Provider is Responsible for Security: CISO MAG Market Trends Report|https://www.cisomag.com/shared-responsibility-model/]] ([[document|https://aspen.eccouncil.org/Docs/CISOMAG/CISO-MAG-June2020-Preview.pdf]])|Survey|
|2020.06.16|CBR Online|[[Cyber AI for SaaS Security - Computer Business Review|https://www.cbronline.com/whitepapers/cyber-ai-for-saas-security/]]|SaaS|
|2020.06.16|Cloud Management Insider|[[Is It Really Beneficial To Implement A Cloud Security Model On Zero Trust?|https://www.cloudmanagementinsider.com/is-it-really-beneficial-to-implement-a-cloud-security-model-on-zero-trust/]]|Zero_Trust|
|2020.06.16|//ThousandEyes//|The Internet Report [[Ep. 11: Excuse Me, Your BGP Is Leaking|https://blog.thousandeyes.com/internet-report-episode-11/]]|IBM_Cloud Outage|
|2020.06.16|//Dropbox//|![[New features help you manage work and home|https://blog.dropbox.com/topics/product-tips/new-dropbox-helps-manage-work-and-home]] |Dropbox Products|
|2020.06.16|CISO Mag.| → [[Dropbox Drops a Box of Security Surprises for its Premium Customers|https://www.cisomag.com/dropbox-new-security-features/]]|Dropbox Products|
|2020.06.17|TechRepublic| → [[Dropbox adds password manager, vault, and other security features|https://www.techrepublic.com/article/dropbox-adds-password-manager-vault-and-other-security-features/]]|Dropbox Products|
|2020.06.16|//Palo Alto Networks//|[[How to Create a DevSecOps Culture|https://blog.paloaltonetworks.com/2020/06/cloud-devsecops-culture/]]|DevSecOps|
|2020.06.16|//Microsoft Azure//|[[Stay ahead of multi-cloud attacks with Azure Security Center|https://www.microsoft.com/security/blog/2020/06/16/stay-ahead-multi-cloud-attacks-azure-security-center/]]|Azure Multi_Cloud|
|2020.06.16|//CyberSecurity Help//|[[Privilege escalation in Docker Desktop|https://www.cybersecurity-help.cz/vdb/SB2020061607]]|Docker Vulnerability|
|2020.06.16|//Compare The Cloud//|[[Security risks of increasingly popular cloud collaboration tools|https://www.comparethecloud.net/articles/security-risks-of-increasingly-popular-cloud-collaboration-tools/]]|Risks|
|2020.06.16|//Checkpoint//|[[Protecting Office 365 and G Suite in a Cyber Pandemic World|https://blog.checkpoint.com/2020/06/16/protecting-office-365-and-g-suite-in-a-cyber-pandemic-world/]]|O365 G-Suite|
|2020.06.15|//Palo Alto Networks//|[[Online Learning: Security and Connectivity for Teachers and Students|https://blog.paloaltonetworks.com/2020/06/network-online-learning/]]|Training|
|2020.06.16|//Kindite//|[[Advantages and Challenges of Confidential Computing for Cloud Data Protection|https://blog.kindite.com/advantages-and-challenges-of-confidential-computing-for-cloud-data-protection]]|Confidential_Computing|
|2020.06.16|//Kindite//|[[AWS KMS vs AWS CloudHSM|https://blog.kindite.com/aws-kms-vs-aws-cloudhsm]]|AWS KMS HSM|
|2020.06.16|//Fairwinds//|[[Identifying Kubernetes Config Security Threats: Pods Running as Root|https://www.cncf.io/blog/2020/06/16/identifying-kubernetes-config-security-threats-pods-running-as-root/]]|Kubernetes Threats|
|2020.06.16|//Porschift//|[[Cloud Workload Protection Priorities Rise in 2020|https://vmblog.com/archive/2020/06/16/cloud-workload-protection-priorities-rise-in-2020.aspx]]|CWPP Workloads|
|>|>|>|!2020.06.15|
|2020.06.15|FTC|![[Six steps toward more secure cloud computing|https://www.ftc.gov/news-events/blogs/business-blog/2020/06/six-steps-toward-more-secure-cloud-computing]] |Recommendations|
|2020.06.15|vpnMentor|[[Niche Dating Apps Expose 100,000s of Users in Massive Data Breach|https://www.vpnmentor.com/blog/report-dating-apps-leak/]]|AWS Data_Leak|
|2020.06.15|Silicon Angle| → [[Niche dating app user data found exposed on misconfigured cloud instance|https://siliconangle.com/2020/06/15/niche-dating-app-user-data-found-exposed-misconfigured-cloud-instance/]]|AWS Data_Leak|
|2020.06.16|The Register| → [[845GB of racy dating app records exposed to entire internet via leaky AWS buckets|https://www.theregister.com/2020/06/16/dating_apps_aws_s3_leak/]]|AWS Data_Leak|
|2020.06.16|Data Breaches| → [[845GB of racy dating app records exposed to entire internet via leaky AWS buckets|https://www.databreaches.net/845gb-of-racy-dating-app-records-exposed-to-entire-internet-via-leaky-aws-buckets/]]|AWS Data_Leak|
|2020.06.18|Data Breaches| → [[Statement by CasualX in response to “false statements” by vpnMentor|https://www.databreaches.net/statement-by-casualx-in-response-to-false-statements-by-vpnmentor/]]|AWS Data_Leak|
|2020.06.15|Uber security|[[Part 1: AWS Continuous Monitoring|https://medium.com/@ubersecurity/part-1-aws-continuous-monitoring-f39f81ea6801]] (1/2)|AWS Monitoring|
|2020.06.15|Uber security|[[Part 2: AWS Monitoring Case Studies|https://medium.com/@ubersecurity/part-2-aws-monitoring-case-studies-9fbc613aff28]] (2/2)|AWS Monitoring|
|2020.06.15|The Register|[[Microsoft 365 and Azure outage struck Australia and New Zealand just as business rocked up for a new week|https://www.theregister.com/2020/06/15/microsoft_365_outage_australia_new_zealand/]]|Outage M365|
|2020.06.15|Solutions Review|[[Barracuda: SD-WAN Is the Deployment of Choice for Secure Cloud|https://solutionsreview.com/cloud-platforms/barracuda-sd-wan-is-the-deployment-of-choice-for-secure-cloud/]]|SD-WAN|
|2020.06.15|SecTechno|[[BOtB - Container Analysis and Exploitation Tool - SecTechno|https://sectechno.com/botb-container-analysis-and-exploitation-tool/]]|Tools|
|2020.06.15|Silicon Angle|[[IBM buys Spanugo to bolster its financial services public cloud|https://siliconangle.com/2020/06/15/ibm-buys-spanugo-bolster-financial-services-public-cloud/]]|Acquisition|
|2020.06.16|Silicon.fr[img[iCSF/flag_fr.png]]| → [[Cybersécurité : IBM s'offre la start-up Spanugo|https://www.silicon.fr/cybersecurite-ibm-spanugo-341383.html]]|Acquisition|
|2020.06.16|Security Week| → [[IBM Acquires Cloud Security Company Spanugo|https://www.securityweek.com/ibm-acquires-cloud-security-company-spanugo]]|Acquisition|
|2020.06.15|Madhu Akula|[[Kubernetes Goat|https://github.com/madhuakula/kubernetes-goat]]|Kubernetes Vulnerable_Design Challenge|
|2020.06.15|Madhu Akula| → [["Vulnerable by Design" Kubernetes Cluster|https://madhuakula.com/kubernetes-goat]]|Kubernetes Vulnerable_Design Challenge|
|2020.06.15|//Microsoft Azure//|[[Zero Trust - Part 1: Networking|https://www.microsoft.com/security/blog/2020/06/15/zero-trust-part-1-networking/]]|Zero_Trust|
|2020.06.15|//Securosis//|![[Data Security in the SaaS Age: Focus on What You Control|https://securosis.com/blog/data-security-in-the-saas-age-focus-on-what-you-control]] (2/4)|SaaS|
|2020.06.15|//capsule8//|[[Can’t Contain Ourselves – Container Escapes|https://capsule8.com/blog/cant-contain-ourselves-container-escapes/]]|Containers|
|2020.06.15|//Spanning//|[[Denial-of-Service (DoS) Attacks - Web-based Application Security, Part 7|https://spanning.com/blog/denial-of-service-attacks-web-based-application-security-part-7/]]|DDoS|
|2020.06.15|//Sophos//|[[Microsoft Azure users leave front door open for cryptomining crooks|https://nakedsecurity.sophos.com/2020/06/15/microsoft-azure-users-leave-front-door-open-for-cryptomining-crooks/]]|Azure Cryptomining|
|2020.06.15|//Fugue//|[[Fugue Sees 49% Spike in Cloud Security Product Usage Since Start of COVID-19 Crisis|https://www.fugue.co/blog/fugue-sees-49-spike-in-cloud-security-product-usage-since-start-of-covid-19-crisis]]|Products|
!"//Critical Controls Implementation for SAP, Part 2//"
La date limite pour transmettre les commentaires est le 17 juillet 2020.
<<<
//SAP security documentation can be difficult to navigate and there are currently no frameworks that aligns with standard controls. This document aims to alleviate that problem by describing the implementation of the Top 20 Critical Controls for Cloud ERP Customer from a technology specific perspective, in this case SAP. SAP customers are extensively migrating to the cloud and will benefit from this document the most.//
<<<
* Téléchargement (après inscription) ⇒ ''[[CloudSecurityAlliance.fr/go/k6ia/|https://CloudSecurityAlliance.fr/go/k6ia/]]''
!"//Cloud Security Alliance Offers Guidance on Adhering to Privacy, Security Protocols for Telehealth Data in the Cloud//"
[>img(150px,auto)[iCSA/K6GPT.jpg]]
<<<
//SEATTLE – June 18, 2020 - The Cloud Security Alliance [...] announced today the release of its newest report, ''Telehealth Data in the Cloud''.
Produced by the ''Health Information Management Working Group'', the paper examines the privacy and security concerns related to processing, storing, and transmitting patient data in the cloud, including those within the context of edge computing for telehealth solutions.
In the wake of COVID-19, health delivery organizations (HDOs) have quickly increased their utilization of telehealth capabilities (i.e., remote patient monitoring (RPM) and telemedicine) to treat patients in their homes. These technology solutions allow for the delivery of patient treatment, comply with COVID-19 mitigation best practices, and reduce the risk of exposure for health care providers. Going forward, telehealth solutions - which introduce high levels of patient data over the Internet and in the cloud - can be used to remotely monitor and treat patients who have mild cases of the virus, as well as other health issues. However, this remote environment also comes with an array of privacy and security challenges.
"For health care systems, telehealth has emerged as a critical technology for safe and efficient communications between healthcare providers and patients, and accordingly, it’s vital to review the end-to-end architecture of a telehealth delivery system,” said Dr. Jim Angle, co-chair of CSA’s Health Information Management Working Group. “A full analysis can help determine whether privacy and security vulnerabilities exist, what security controls are required for proper cybersecurity of the telehealth ecosystem, and if patient privacy protections are adequate."
With the increased use of telehealth in the cloud, HDOs must adequately and proactively address data, privacy, and security issues. The HDO cannot leave this up to the cloud service provider, as it is a shared responsibility. The HDO must understand regulatory requirements, as well as the technologies that support the system. Regulatory mandates may span multiple jurisdictions, and requirements may include both the GDPR and HIPAA. Armed with the right information, the HDO can implement and maintain a secure and robust telehealth program. Cloud Access Security Brokers, the paper notes, ensure HDOs understand what cloud connections are made and what data is sent to the cloud. //
<<<
__Liens :__
* Annonce ⇒ ''[[CloudSecurityAlliance.fr/go/k6ga/|https://CloudSecurityAlliance.fr/go/k6ga/]]''
* Document ⇒ ''[[CloudSecurityAlliance.fr/go/k6gp/|https://CloudSecurityAlliance.fr/go/k6gp/]]''
|[img(30px,auto)[iCSF/Francais.gif]] @@color:#00F;font-size:125%;__[[Version française|2020.06.14 - Newsletter Hebdomadaire - #68]]__@@ |[img(30px,auto)[iCSF/Anglais.gif]] @@color:#00F;font-size:125%;__[[English version|2020.06.14 - Weekly Newsletter - #68]]__@@ |
|<<tiddler [[2020.06.14 - Newsletter Hebdomadaire - #68]]>> |<<tiddler [[2020.06.14 - Weekly Newsletter - #68]]>> |
!Newsletter Hebdomadaire Cloud et Sécurité - semaine du 7 au 14 juin 2020
!!1 - Nouveautés CSA et Informations - 7 au 14 juin 2020
* Actualité : Appel à contribution pour le Congrès EMEA de la CSA+++*[»]> <<tiddler [[2020.06.11 - Appel à contribution pour le Congrès EMEA de la CSA]]>>=== 
!!2 - Veille Web Cloud et Sécurité
La [[Veille Web|2020.06.14 - Veille Hebdomadaire - 14 juin]] avec plus de 90 liens
* À lire
** IBM ''2020 Cloud Security Landscape Report''+++*[»] 
|2020.06.10|//IBM//|![[IBM: Security in the Cloud Remains Challenged by Complexity and Shadow IT|https://www.prnewswire.com/news-releases/ibm-security-in-the-cloud-remains-challenged-by-complexity-and-shadow-it-301073885.html]] |Report IBM|
|2020.06.10|//IBM//| → [[2020 Cloud Security Landscape Report|https://ibm.biz/cloudsecurityreport]]|Report IBM|
|2020.06.10|//Security Intelligence//| → [[How Threat Actors Are Adapting to the Cloud|https://securityintelligence.com/posts/how-threat-actors-are-adapting-to-the-cloud/]]||
|2020.06.10|TechRepublic| → [[How to better defend your cloud-based environments against cyberattack|https://www.techrepublic.com/article/how-to-better-defend-your-cloud-based-environments-against-cyberattack/]]|Report IBM|
|2020.06.11|Help Net Security| → [[Top security risks for companies to address as cloud migration accelerates|https://www.helpnetsecurity.com/2020/06/11/cloud-migration-risks/]]|Report IBM|
|2020.06.12|MSSP Alert| → [[Cloud Service Providers and Security: IBM Research Findings|https://www.msspalert.com/cybersecurity-research/cloud-service-providers-ibm-findings/]]|Report IBM|
=== 
** SGAxe: "How SGX Fails in Practice"+++*[»] 
|2020.06.12|SGAxe|![[SGAxe: How SGX Fails in Practice|https://sgaxe.com/]] ([[analyse|https://sgaxe.com/files/SGAxe.pdf]]) |SGX Enclave Intel Vulnerability|
|2020.06.12|SGAxe| → [[CacheOut: Leaking Data on Intel CPUs via Cache Evictions|https://sgaxe.com/files/CacheOut.pdf]] (pdf)|SGX Intel Vulnerability|
=== 
** Rapport du NCSC néerlandais sur les Clouds Publics+++*[»] 
|2020.06.11|NCSC.NL|!Retour d'expériences du NCSC en matière d'utilisation des clouds (publics) [[en néerlandais|https://www.ncsc.nl/actueel/nieuws/2020/juni/11/clouddiensten]] ([[rapport en néerlandais|https://www.ncsc.nl/binaries/ncsc/documenten/rapporten/juni/ervaringsdocument/20/cloudervaringsdocument/Cloudervaringsdocument+NCSC.pdf]]) |Analysis|
=== 
* Attaques
** Attaque "Denial of Wallet" sur AWS+++*[»] 
|2020.06.08|Summit Route|![[Denial of Wallet Attacks on AWS|https://summitroute.com/blog/2020/06/08/denial_of_wallet_attacks_on_aws/]] |AWS Attack_Analysis|
=== 
** Prestataires Cloud ciblés+++*[»] 
|2020.06.09|//Crowdstrike//|![[Attackers Are Targeting Cloud Service Providers|https://www.crowdstrike.com/blog/crowdstrike-observes-increase-in-iaas-api-key-theft/]] |APIs|
=== 
** Mauvaises configurations de Buckets AWS S3+++*[»] 
|2020.06.09|//RiskIQ//|![[Misconfigured Amazon S3 Buckets Continue to be a Launchpad for Malicious Code|https://www.riskiq.com/blog/labs/misconfigured-s3-buckets/]] |AWS_S3 Misconfiguration|
|2020.06.09|Infosecurity Mag|[[More S3 Buckets Compromised with Magecart and Malicious Redirector|https://www.infosecurity-magazine.com/news/s3-compromised-magecart-malicious/]]|AWS_S3 Malware|
|2020.06.11|infoRisk Today| → [[Unsecured AWS S3 Buckets Infected With Skimmer Code|https://www.inforisktoday.com/unsecured-aws-s3-buckets-infected-skimmer-code-a-14421]]|AWS_S3 Compromise|
=== 
** Mauvaises configurations de workloads Kubeflow+++*[»] 
|2020.06.10|//Microsoft Azure//|[[Misconfigured Kubeflow workloads are a security risk||https://www.microsoft.com/security/blog/2020/06/10/misconfigured-kubeflow-workloads-are-a-security-risk/]]|KubeFlow Misconfiguration|
|2020.06.12|Dark Reading| → [[Cryptominers Found in Azure Kubernetes Containers|https://www.darkreading.com/attacks-breaches/cryptominers-found-in-azure-kubernetes-containers/d/d-id/1338083]]|KubeFlow Misconfiguration|
|2020.06.11|Security Week| → [[Microsoft Identifies Attack Targeting Kubeflow Environments|https://www.securityweek.com/microsoft-identifies-attack-targeting-kubeflow-environments]]|KubeFlow Misconfiguration|
=== 
** Campagnes de phishing en cours sur Office 365+++*[»] 
|2020.06.10|Bleeping Computer|[[Office 365 phishing baits business owners with relief payments|https://www.bleepingcomputer.com/news/security/office-365-phishing-baits-business-owners-with-relief-payments/]]|Phishing O365|
=== et AWS+++*[»] 
|2020.06.11|//Cado Security//|[[An Ongoing AWS Phishing Campaign|https://www.cadosecurity.com/2020/06/11/an-ongoing-aws-phishing-campaign/]]|AWS Phishing Analysis|
=== 
** Campagnes de cryptominers contre des Kubernetes Clusters+++*[»] 
|2020.06.11|//Threatpost//|[[Kubernetes Falls to Cryptomining via Machine-Learning Framework|https://threatpost.com/kubernetes-cryptomining-machine-learning-framework/156481/]]|Kubernetes Cryptomining|
|2020.06.12|//CyberSecurity Help//| → [[New cryptomining campaign targets ML-focused Kubernetes clusters|https://www.cybersecurity-help.cz/blog/1305.html]]||
=== 
* Pannes
** IBM Cloud victime collatérale d'un incident BGP+++*[»] 
|2020.06.09|//IBM//|[[IBM Cloud - June 9 Outage|https://cloud.ibm.com/status?query=IBM+Cloud+-+June+9+Outage%0D%0A%0D&selected=announcement]]|IBM Outage|
|2020.06.09|CRN| → [[Widespread Outage Hits IBM Cloud|https://www.crn.com/news/cloud/widespread-outage-hits-ibm-cloud]]|Outage IBM|
|2020.06.10|CRN| → [[IBM Blames Massive Cloud Outage On Third-Party Network Provider|https://www.crn.com/news/cloud/ibm-blames-massive-cloud-outage-on-third-party-network-provider]]|Outage IBM|
|2020.06.10|Silicon Angle| → [[IBM cloud outage brings down customer websites worldwide|https://siliconangle.com/2020/06/09/ibm-cloud-outage-leads-customer-websites-going-worldwide/]]|Outage IBM|
|2020.06.10|//Catchpoint//| → [[IBM Cloud experienced global outage on June 9|https://websee.com/verified-issues/5ee02acdfb5d6127c96b8ec8]]|Outage IBM|
|2020.06.10|CBR Online|[[IBM Blames “Incorrect Routing” by Third Party for Global Cloud Outage|https://www.cbronline.com/news/ibm-cloud-outage]]|Outage|
|2020.06.11|Bleeping Computer| → [[IBM Cloud global outage caused by "incorrect" BGP routing|https://www.bleepingcomputer.com/news/technology/ibm-cloud-global-outage-caused-by-incorrect-bgp-routing/]]|Outage IBM|
|2020.06.11|CRN (AU)| → [[IBM blames massive cloud outage on third-party network provider|https://www.crn.com.au/news/ibm-blames-massive-cloud-outage-on-third-party-network-provider-549138]]|Outage IBM|
=== 
* Rapports et études
** ENISA : remontées d'incidents des opératuers télécoms et de confiance+++*[»] 
|2020.06.09|ENISA|![[Spotlight on incident reporting of telecom security and trust services|https://www.enisa.europa.eu/news/enisa-news/spotlight-on-incident-reporting-of-telecom-security-and-trust-services]] |Incidents Telcos Repository|
|2020.06.09|ENISA| → [[Cybersecurity Incident Report and Analysis System – Visual Analysis Tool|https://www.enisa.europa.eu/topics/incident-reporting/cybersecurity-incident-report-and-analysis-system-visual-analysis/visual-tool]]|Incidents Telcos Tools|
|2020.06.10|CBR Online| → [[New EU Data on Telco “Security” Issues Shows… Switchgear Failures and Power Outages|https://www.cbronline.com/news/telco-outages-enisa]]|Incidents Telcos|
=== 
** Comparitech : bases de données cibles d'attaques dans le cloud+++*[»] 
|2020.06.10|//Comparitech//|![[We setup a honeypot to see how long for hackers find unsecured database|https://www.comparitech.com/blog/information-security/unsecured-database-honeypot/]] |Attacks Misconfiguration|
|2020.06.10|Dark Reading| → [[Misconfigured Databases Targeted Hours After Deployment|https://www.darkreading.com/cloud/misconfigured-databases-targeted-hours-after-deployment/d/d-id/1338052]]|Attacks Misconfiguration|
|2020.06.10|Security Week| → [[Misconfigured Public Cloud Databases Attacked Within Hours of Deployment|https://www.securityweek.com/misconfigured-public-cloud-databases-attacked-within-hours-deployment]]|Attacks Misconfiguration|
=== 
** RiskIQ : surface d'attaque+++*[»] 
|2020.06.11|//RiskIQ//|![[New Data-Driven Research Shows 5 Areas Organizations are Most Vulnerable Outside the Firewall|https://www.riskiq.com/blog/external-threat-management/analysis-attack-surface/]] ([[rapport|https://www.riskiq.com/research/analysis-of-an-attack-surface/]]) |Report Attack_Surface|
|2020.06.11|Dark Reading| → [[Attack Surface Area Larger Than Most Businesses Believe|https://www.darkreading.com/perimeter/attack-surface-area-larger-than-most-businesses-believe/d/d-id/1338057]]|Report Attack_Surface|
=== 
** Cobalt.io : vulnérabilités le plus courantes lors des tests d'intrusion+++*[»] 
|2020.06.09|//Cobalt.io//|[[Fourth Annual “The State of Pentesting” Finds Strong Relationship Between Security and Engineering, Accelerating Transition to DevSecOps|http://www.globenewswire.com/news-release/2020/06/09/2045649/0/en/Fourth-Annual-The-State-of-Pentesting-Finds-Strong-Relationship-Between-Security-and-Engineering-Accelerating-Transition-to-DevSecOps.html]] ([[rapport|https://resource.cobalt.io/the-state-of-pentesting-2020]])|Report Pentest|
=== 
* Acquisitions
** Peach Tech et Fuzzit par GitLab+++*[»] 
|2020.06.11|Security Week|[[GitLab Acquires Security Companies Peach Tech and Fuzzit|https://www.securityweek.com/gitlab-acquires-security-companies-peach-tech-and-fuzzit]]||
=== 
* Divers
** Évaluation du niveau de sécurité dans AWS+++*[»] 
|2020.06.14|Chris Farris|[[Conducting a Cloud Assessment in AWS|https://www.chrisfarris.com/post/cloud-assessment/]]|AWS Assessment|
=== 
** Sécurité du stockage dans le Cloud+++*[»] 
|2020.06.08|Computer Weekly|[[Cloud storage 101: NAS file storage on AWS, Azure and GCP|https://www.computerweekly.com/feature/Cloud-storage-101-NAS-file-storage-on-AWS-Azure-and-GCP]]|Storage|
|2020.06.08|//Google Cloud//|[[5 ways to enhance your cloud storage security and data protection|https://cloud.google.com/blog/products/storage-data-transfer/5-ways-to-enhance-your-cloud-storage-security-and-data-protection/]]|GCP Storage|
=== 
** la position de CIS sur le Shared Responsibility+++*[»] 
|2020.06.09|//CISecurity//|![[Cloud Security and the Shared Responsibility Model|https://www.cisecurity.org/white-papers/cloud-security-and-the-shared-responsibility-model/]] |Shared_Responsibility|
=== 
** Certifications sécurité AWS+++*[»] 
|2020.06.10|CRN (AU)|[[Ten tips for making the most of AWS security certifications|https://www.crn.com.au/news/ten-tips-for-making-the-most-of-aws-security-certifications-549074]]|AWS Certification|
=== 
** Honeypots sur AWS+++*[»] 
|2020.06.10|Nino Crudele|[[How to test your Azure Security appliances – The honeypot strategy and how to install bWapp|https://ninocrudele.com/how-to-test-your-azure-security-appliances-the-honeypot-strategy-and-how-to-install-bwapp]]|Azure Honeypot|
=== 
** Outils: Dive+++*[»] 
|2020.06.09|SecTechno|[[Dive - Tool for Exploring Each Layer in a Docker Image - SecTechno|https://sectechno.com/dive-tool-for-exploring-each-layer-in-a-docker-image/]]|Tools|
=== 
!!3 - Agenda
* ''17'' juin 2020 → clôture de l'appel à commentaires CSA "[[Healthcare Big Data in the Cloud|https://cloudsecurityalliance.org/artifacts/healthcare-big-data-in-the-cloud/]]"
* ''19 juin'' 2020 → CSA : clôture du sondage "QSS Awareness Survey 2020" • en ligne https://www.surveymonkey.com/r/QSSAWARE
* ''21 juin'' 2020 → CSA : clôture du sondage "Cloud IAM Survey" • en ligne https://www.surveymonkey.com/r/CSAIAM

|ssTabl96|k
|!⇒ [[CloudSecurityAlliance.fr/go/K6E/|https://CloudSecurityAlliance.fr/go/K6E/]] |
!Weekly Cloud and Security Watch Newsletter - June 7th to 14th, 2020[>img[iCSF/inEnglish.png]]
!!1 - CSA News and Updates - June 7th to 14th, 2020
* News : Call for Papers for CSA EMEA Congress 2020+++*[»]> <<tiddler [[2020.06.11 - Appel à contribution pour le Congrès EMEA de la CSA]]>>=== 
!!2 - Cloud and Security News Watch
[[Over 90 links|2020.06.14 - Veille Hebdomadaire - 14 juin]]
* Must read
** IBM ''2020 Cloud Security Landscape Report''+++*[»] 
|2020.06.10|//IBM//|![[IBM: Security in the Cloud Remains Challenged by Complexity and Shadow IT|https://www.prnewswire.com/news-releases/ibm-security-in-the-cloud-remains-challenged-by-complexity-and-shadow-it-301073885.html]] |Report IBM|
|2020.06.10|//IBM//| → [[2020 Cloud Security Landscape Report|https://ibm.biz/cloudsecurityreport]]|Report IBM|
|2020.06.10|//Security Intelligence//| → [[How Threat Actors Are Adapting to the Cloud|https://securityintelligence.com/posts/how-threat-actors-are-adapting-to-the-cloud/]]||
|2020.06.10|TechRepublic| → [[How to better defend your cloud-based environments against cyberattack|https://www.techrepublic.com/article/how-to-better-defend-your-cloud-based-environments-against-cyberattack/]]|Report IBM|
|2020.06.11|Help Net Security| → [[Top security risks for companies to address as cloud migration accelerates|https://www.helpnetsecurity.com/2020/06/11/cloud-migration-risks/]]|Report IBM|
|2020.06.12|MSSP Alert| → [[Cloud Service Providers and Security: IBM Research Findings|https://www.msspalert.com/cybersecurity-research/cloud-service-providers-ibm-findings/]]|Report IBM|
=== 
** SGAxe: How SGX Fails in Practice+++*[»] 
|2020.06.12|SGAxe|![[SGAxe: How SGX Fails in Practice|https://sgaxe.com/]] ([[analyse|https://sgaxe.com/files/SGAxe.pdf]]) |SGX Enclave Intel Vulnerability|
|2020.06.12|SGAxe| → [[CacheOut: Leaking Data on Intel CPUs via Cache Evictions|https://sgaxe.com/files/CacheOut.pdf]] (pdf)|SGX Intel Vulnerability|
=== 
** NCSL.NL Report on Public Clouds (in Dutch)+++*[»] 
|2020.06.11|NCSC.NL|!Retour d'expériences du NCSC en matière d'utilisation des clouds (publics) [[en néerlandais|https://www.ncsc.nl/actueel/nieuws/2020/juni/11/clouddiensten]] ([[rapport en néerlandais|https://www.ncsc.nl/binaries/ncsc/documenten/rapporten/juni/ervaringsdocument/20/cloudervaringsdocument/Cloudervaringsdocument+NCSC.pdf]]) |Analysis|
=== 
* Attacks
** Denial of Wallet Attacks on AWS+++*[»] 
|2020.06.08|Summit Route|![[Denial of Wallet Attacks on AWS|https://summitroute.com/blog/2020/06/08/denial_of_wallet_attacks_on_aws/]] |AWS Attack_Analysis|
=== 
** CSP as targets+++*[»] 
|2020.06.09|//Crowdstrike//|![[Attackers Are Targeting Cloud Service Providers|https://www.crowdstrike.com/blog/crowdstrike-observes-increase-in-iaas-api-key-theft/]] |APIs|
=== 
** Misconfigured AWS S3 Buckets+++*[»] 
|2020.06.09|//RiskIQ//|![[Misconfigured Amazon S3 Buckets Continue to be a Launchpad for Malicious Code|https://www.riskiq.com/blog/labs/misconfigured-s3-buckets/]] |AWS_S3 Misconfiguration|
|2020.06.09|Infosecurity Mag|[[More S3 Buckets Compromised with Magecart and Malicious Redirector|https://www.infosecurity-magazine.com/news/s3-compromised-magecart-malicious/]]|AWS_S3 Malware|
|2020.06.11|infoRisk Today| → [[Unsecured AWS S3 Buckets Infected With Skimmer Code|https://www.inforisktoday.com/unsecured-aws-s3-buckets-infected-skimmer-code-a-14421]]|AWS_S3 Compromise|
=== 
** Misconfigured Kubeflow workloads+++*[»] 
|2020.06.10|//Microsoft Azure//|[[Misconfigured Kubeflow workloads are a security risk||https://www.microsoft.com/security/blog/2020/06/10/misconfigured-kubeflow-workloads-are-a-security-risk/]]|KubeFlow Misconfiguration|
|2020.06.12|Dark Reading| → [[Cryptominers Found in Azure Kubernetes Containers|https://www.darkreading.com/attacks-breaches/cryptominers-found-in-azure-kubernetes-containers/d/d-id/1338083]]|KubeFlow Misconfiguration|
|2020.06.11|Security Week| → [[Microsoft Identifies Attack Targeting Kubeflow Environments|https://www.securityweek.com/microsoft-identifies-attack-targeting-kubeflow-environments]]|KubeFlow Misconfiguration|
=== 
** Ongoing Office 365+++*[»] 
|2020.06.10|Bleeping Computer|[[Office 365 phishing baits business owners with relief payments|https://www.bleepingcomputer.com/news/security/office-365-phishing-baits-business-owners-with-relief-payments/]]|Phishing O365|
=== and AWS+++*[»]>
|2020.06.11|//Cado Security//|[[An Ongoing AWS Phishing Campaign|https://www.cadosecurity.com/2020/06/11/an-ongoing-aws-phishing-campaign/]]|AWS Phishing Analysis|
=== Phishing Campaigns
** Cryptomining Campaign Targets Kubernetes Clusters+++*[»] 
|2020.06.11|//Threatpost//|[[Kubernetes Falls to Cryptomining via Machine-Learning Framework|https://threatpost.com/kubernetes-cryptomining-machine-learning-framework/156481/]]|Kubernetes Cryptomining|
|2020.06.12|//CyberSecurity Help//| → [[New cryptomining campaign targets ML-focused Kubernetes clusters|https://www.cybersecurity-help.cz/blog/1305.html]]||
=== 
* Outages
** IBM Cloud as a collateral damage of a BGP incident+++*[»] 
|2020.06.09|//IBM//|[[IBM Cloud - June 9 Outage|https://cloud.ibm.com/status?query=IBM+Cloud+-+June+9+Outage%0D%0A%0D&selected=announcement]]|IBM Outage|
|2020.06.09|CRN| → [[Widespread Outage Hits IBM Cloud|https://www.crn.com/news/cloud/widespread-outage-hits-ibm-cloud]]|Outage IBM|
|2020.06.10|CRN| → [[IBM Blames Massive Cloud Outage On Third-Party Network Provider|https://www.crn.com/news/cloud/ibm-blames-massive-cloud-outage-on-third-party-network-provider]]|Outage IBM|
|2020.06.10|Silicon Angle| → [[IBM cloud outage brings down customer websites worldwide|https://siliconangle.com/2020/06/09/ibm-cloud-outage-leads-customer-websites-going-worldwide/]]|Outage IBM|
|2020.06.10|//Catchpoint//| → [[IBM Cloud experienced global outage on June 9|https://websee.com/verified-issues/5ee02acdfb5d6127c96b8ec8]]|Outage IBM|
|2020.06.10|CBR Online|[[IBM Blames “Incorrect Routing” by Third Party for Global Cloud Outage|https://www.cbronline.com/news/ibm-cloud-outage]]|Outage|
|2020.06.11|Bleeping Computer| → [[IBM Cloud global outage caused by "incorrect" BGP routing|https://www.bleepingcomputer.com/news/technology/ibm-cloud-global-outage-caused-by-incorrect-bgp-routing/]]|Outage IBM|
|2020.06.11|CRN (AU)| → [[IBM blames massive cloud outage on third-party network provider|https://www.crn.com.au/news/ibm-blames-massive-cloud-outage-on-third-party-network-provider-549138]]|Outage IBM|
=== 
* Reports and Surveys
** ENISA on incident reporting of telcos security and trust services+++*[»] 
|2020.06.09|ENISA|![[Spotlight on incident reporting of telecom security and trust services|https://www.enisa.europa.eu/news/enisa-news/spotlight-on-incident-reporting-of-telecom-security-and-trust-services]] |Incidents Telcos Repository|
|2020.06.09|ENISA| → [[Cybersecurity Incident Report and Analysis System – Visual Analysis Tool|https://www.enisa.europa.eu/topics/incident-reporting/cybersecurity-incident-report-and-analysis-system-visual-analysis/visual-tool]]|Incidents Telcos Tools|
|2020.06.10|CBR Online| → [[New EU Data on Telco “Security” Issues Shows… Switchgear Failures and Power Outages|https://www.cbronline.com/news/telco-outages-enisa]]|Incidents Telcos|
=== 
** Comparitech on databases targeted by attacks+++*[»] 
|2020.06.10|//Comparitech//|![[We setup a honeypot to see how long for hackers find unsecured database|https://www.comparitech.com/blog/information-security/unsecured-database-honeypot/]] |Attacks Misconfiguration|
|2020.06.10|Dark Reading| → [[Misconfigured Databases Targeted Hours After Deployment|https://www.darkreading.com/cloud/misconfigured-databases-targeted-hours-after-deployment/d/d-id/1338052]]|Attacks Misconfiguration|
|2020.06.10|Security Week| → [[Misconfigured Public Cloud Databases Attacked Within Hours of Deployment|https://www.securityweek.com/misconfigured-public-cloud-databases-attacked-within-hours-deployment]]|Attacks Misconfiguration|
=== 
** RiskIQ on Attack Surface+++*[»] 
|2020.06.11|//RiskIQ//|![[New Data-Driven Research Shows 5 Areas Organizations are Most Vulnerable Outside the Firewall|https://www.riskiq.com/blog/external-threat-management/analysis-attack-surface/]] ([[rapport|https://www.riskiq.com/research/analysis-of-an-attack-surface/]]) |Report Attack_Surface|
|2020.06.11|Dark Reading| → [[Attack Surface Area Larger Than Most Businesses Believe|https://www.darkreading.com/perimeter/attack-surface-area-larger-than-most-businesses-believe/d/d-id/1338057]]|Report Attack_Surface|
=== 
** Cobalt.io : Most Common Vulnerabilities Found During Pentests+++*[»] 
|2020.06.09|//Cobalt.io//|[[Fourth Annual “The State of Pentesting” Finds Strong Relationship Between Security and Engineering, Accelerating Transition to DevSecOps|http://www.globenewswire.com/news-release/2020/06/09/2045649/0/en/Fourth-Annual-The-State-of-Pentesting-Finds-Strong-Relationship-Between-Security-and-Engineering-Accelerating-Transition-to-DevSecOps.html]] ([[rapport|https://resource.cobalt.io/the-state-of-pentesting-2020]])|Report Pentest|
=== 
* Acquisitions
** Peach Tech and Fuzzit by GitLab+++*[»] 
|2020.06.11|Security Week|[[GitLab Acquires Security Companies Peach Tech and Fuzzit|https://www.securityweek.com/gitlab-acquires-security-companies-peach-tech-and-fuzzit]]||
=== 
* Miscellaneous
** Cloud Assessment in AWS+++*[»] 
|2020.06.14|Chris Farris|[[Conducting a Cloud Assessment in AWS|https://www.chrisfarris.com/post/cloud-assessment/]]|AWS Assessment|
=== 
** Cloud Storage security+++*[»] 
|2020.06.08|Computer Weekly|[[Cloud storage 101: NAS file storage on AWS, Azure and GCP|https://www.computerweekly.com/feature/Cloud-storage-101-NAS-file-storage-on-AWS-Azure-and-GCP]]|Storage|
|2020.06.08|//Google Cloud//|[[5 ways to enhance your cloud storage security and data protection|https://cloud.google.com/blog/products/storage-data-transfer/5-ways-to-enhance-your-cloud-storage-security-and-data-protection/]]|GCP Storage|
=== 
** CIS' view on Shared Responsibility+++*[»] 
|2020.06.09|//CISecurity//|![[Cloud Security and the Shared Responsibility Model|https://www.cisecurity.org/white-papers/cloud-security-and-the-shared-responsibility-model/]] |Shared_Responsibility|
=== 
** AWS Security Certifications+++*[»] 
|2020.06.10|CRN (AU)|[[Ten tips for making the most of AWS security certifications|https://www.crn.com.au/news/ten-tips-for-making-the-most-of-aws-security-certifications-549074]]|AWS Certification|
=== 
** Honeypots on AWS+++*[»] 
|2020.06.10|Nino Crudele|[[How to test your Azure Security appliances – The honeypot strategy and how to install bWapp|https://ninocrudele.com/how-to-test-your-azure-security-appliances-the-honeypot-strategy-and-how-to-install-bwapp]]|Azure Honeypot|
=== 
** Tools: Dive+++*[»] 
|2020.06.09|SecTechno|[[Dive - Tool for Exploring Each Layer in a Docker Image - SecTechno|https://sectechno.com/dive-tool-for-exploring-each-layer-in-a-docker-image/]]|Tools|
=== 
!!3 - Agenda
* June ''17th'' → CSA : closing of the call for comments on "[[Healthcare Big Data in the Cloud|https://cloudsecurityalliance.org/artifacts/healthcare-big-data-in-the-cloud/]]"
* June ''19th'' → CSA : closing of the survey "QSS Awareness Survey 2020" • en ligne https://www.surveymonkey.com/r/QSSAWARE
* June ''21st'' → CSA : closing of the survey "Cloud IAM Survey" • en ligne https://www.surveymonkey.com/r/CSAIAM

|ssTabl96|k
|!⇒ [[CloudSecurityAlliance.fr/go/K6E/|https://CloudSecurityAlliance.fr/go/K6E/]] |
|!Juin|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2020.06.14|
|2020.06.14|Chris Farris|[[Conducting a Cloud Assessment in AWS|https://www.chrisfarris.com/post/cloud-assessment/]]|AWS Assessment|
|>|>|>|!2020.06.12|
|2020.06.12|SGAxe|![[SGAxe: How SGX Fails in Practice|https://sgaxe.com/]] ([[analyse|https://sgaxe.com/files/SGAxe.pdf]]) |SGX Enclave Intel Vulnerability|
|2020.06.12|SGAxe| → [[CacheOut: Leaking Data on Intel CPUs via Cache Evictions|https://sgaxe.com/files/CacheOut.pdf]] (pdf)|SGX Intel Vulnerability|
|2020.06.12|Open Source DFIR|[[Forensic Disk Copies in GCP & AWS|https://osdfir.blogspot.com/2020/06/forensic-disk-copies-in-gcp-aws.html]]|Forensics AWS GCP|
|2020.06.12|Bleeping Computer|[[Office 365 to offer more info on how it protects your email|https://www.bleepingcomputer.com/news/security/office-365-to-offer-more-info-on-how-it-protects-your-email/]]|0365 Azure_ATP|
|2020.06.12|//Microsoft Azure//|[[Enabling Data Residency and Data Protection in Microsoft Azure Regions|https://azure.microsoft.com/en-us/resources/achieving-compliant-data-residency-and-security-with-azure/]] ([[pdf|https://azure.microsoft.com/mediahandler/files/resourcefiles/achieving-compliant-data-residency-and-security-with-azure/Enabling_Data_Residency_and_Data_Protection_in_Microsoft_Azure_Regions.pdf]])|
|2020.06.12|//Cloud Management Insider//|[[Past, Present and Future of Quantum Computing and Cloud|https://www.cloudmanagementinsider.com/past-present-and-future-of-quantum-computing-and-cloud/]]|Quantum_Computing|
|2020.06.12|//Jump Cloud//|[[Can G Suite Serve as Your Domain Controller?|https://jumpcloud.com/blog/can-g-suite-serve-domain-controller]]|Directory-as-a-Service|
|2020.06.12|//Praetorian//|[[AWS IAM Assume Role Vulnerabilities Found in Many Top Vendors|https://www.praetorian.com/blog/aws-iam-assume-role-vulnerabilities]]|AWS IAM|
|>|>|>|!2020.06.11|
|2020.06.11|Silicon.fr[img[iCSF/flag_fr.png]]|[[Valoriser et moderniser des charges SAP dans le Cloud : contourner les 5 principaux écueils|https://www.silicon.fr/avis-expert/valoriser-et-moderniser-des-charges-sap-dans-le-cloud-contourner-les-5-principaux-ecueils]]|SAP|
|2020.06.11|NCSC.NL|!Retour d'expériences du NCSC en matière d'utilisation des clouds (publics) [[en néerlandais|https://www.ncsc.nl/actueel/nieuws/2020/juni/11/clouddiensten]] ([[rapport en néerlandais|https://www.ncsc.nl/binaries/ncsc/documenten/rapporten/juni/ervaringsdocument/20/cloudervaringsdocument/Cloudervaringsdocument+NCSC.pdf]]) |Analysis|
|2020.06.11|Security Week|[[GitLab Acquires Security Companies Peach Tech and Fuzzit|https://www.securityweek.com/gitlab-acquires-security-companies-peach-tech-and-fuzzit]]||
|2020.06.11|Help Net Security|[[5 keys to protecting OneDrive users|https://www.helpnetsecurity.com/2020/06/11/onedrive-security/]]|OneDrive|
|2020.06.11|NewtGov|[[3 Ways Agencies Can Improve Cloud Security and Performance|https://www.nextgov.com/ideas/2020/06/3-ways-agencies-can-improve-cloud-security-and-performance/165968/]]|Misc|
|2020.06.11|InfoQ|![[The Defense Department's Journey with DevSecOps|https://www.infoq.com/news/2020/06/defense-department-devsecops/]] |DevSecOps|
|2020.06.11|DZone|[[Utilizing AWS Backup To Improve Your Recovery Time|https://dzone.com/articles/utilizing-aws-backup-to-improve-your-recovery-time]]|AWS Backups|
|2020.06.11|//RiskIQ//|![[New Data-Driven Research Shows 5 Areas Organizations are Most Vulnerable Outside the Firewall|https://www.riskiq.com/blog/external-threat-management/analysis-attack-surface/]] ([[rapport|https://www.riskiq.com/research/analysis-of-an-attack-surface/]]) |Report Attack_Surface|
|2020.06.11|Dark Reading| → [[Attack Surface Area Larger Than Most Businesses Believe|https://www.darkreading.com/perimeter/attack-surface-area-larger-than-most-businesses-believe/d/d-id/1338057]]|Report Attack_Surface|
|2020.06.11|//AWS//|[[The importance of encryption and how AWS can help|https://aws.amazon.com/blogs/security/importance-of-encryption-and-how-aws-can-help/]]|AWS Encryption|
|2020.06.11|//Optiv//|[[Microsoft Defender ATP Telemetry: Viewing MITRE ATT&CK Context|https://www.optiv.com/blog/microsoft-defender-atp-telemetry-viewing-mitre-attck-context]] (1/3)|Azure_ATP Telemetry|
|2020.06.11|//Optiv//|[[Defender ATP Telemetry: Viewing MITRE ATT&CK Context|https://www.optiv.com/blog/microsoft-defender-atp-telemetry-azure-log-analytics-workspace]] (2/3)|Azure_ATP Telemetry|
|2020.06.11|//Optiv//|[[Microsoft Defender ATP Telemetry: Workbook Visualizations|https://www.optiv.com/explore-optiv-insights/blog/microsoft-defender-atp-telemetry-workbook-visualizations-part-3]] (3/3)|Azure_ATP Telemetry|
|2020.06.11|//Threatpost//|[[Kubernetes Falls to Cryptomining via Machine-Learning Framework|https://threatpost.com/kubernetes-cryptomining-machine-learning-framework/156481/]]|Kubernetes Cryptomining|
|2020.06.12|//CyberSecurity Help//| → [[New cryptomining campaign targets ML-focused Kubernetes clusters|https://www.cybersecurity-help.cz/blog/1305.html]]||
|2020.06.11|//Cado Security//|[[An Ongoing AWS Phishing Campaign|https://www.cadosecurity.com/2020/06/11/an-ongoing-aws-phishing-campaign/]]|AWS Phishing Analysis|
|2020.06.11|//Microsoft//|[[What’s new in Microsoft 365 Compliance and Risk Management |https://www.microsoft.com/security/blog/2020/06/11/whats-new-microsoft-365-compliance-risk-management/]]|M365 Compliance|
|>|>|>|!2020.06.10|
|2020.06.10|Silicon.fr[img[iCSF/flag_fr.png]]|[[Health Data Hub : le choix de Microsoft contesté devant le Conseil d’État|https://www.silicon.fr/health-data-hub-conseil-etat-341020.html]]|Health_Data_Hub France|
|2020.06.10|Nino Crudele|[[How to test your Azure Security appliances – The honeypot strategy and how to install bWapp|https://ninocrudele.com/how-to-test-your-azure-security-appliances-the-honeypot-strategy-and-how-to-install-bwapp]]|Azure Honeypot|
|2020.06.10|Bleeping Computer|[[Office 365 phishing baits business owners with relief payments|https://www.bleepingcomputer.com/news/security/office-365-phishing-baits-business-owners-with-relief-payments/]]|Phishing O365|
|2020.06.10|Cloud Academy|[[6 Ways to Prevent a Data Breach|https://cloudacademy.com/blog/ways-to-prevent-a-data-breach/]]|Data_Breach|
|2020.06.10|CRN (AU)|[[Ten tips for making the most of AWS security certifications|https://www.crn.com.au/news/ten-tips-for-making-the-most-of-aws-security-certifications-549074]]|AWS Certification|
|2020.06.10|Computer Weekly|[[Security Think Tank: Container security is evolving, so must CISOs|https://www.computerweekly.com/opinion/Security-Think-Tank-Container-security-is-evolving-so-must-CISOs]]|Containers|
|2020.06.10|GovLoop|[[Ransomware Readiness with Data Backup and Recovery|https://www.govloop.com/ransomware-readiness-with-data-backup-and-recovery/]]|Ransomware DRP|
|2020.06.10|//IBM//|![[IBM: Security in the Cloud Remains Challenged by Complexity and Shadow IT|https://www.prnewswire.com/news-releases/ibm-security-in-the-cloud-remains-challenged-by-complexity-and-shadow-it-301073885.html]] |Report IBM|
|2020.06.10|//IBM//| → [[2020 Cloud Security Landscape Report|https://ibm.biz/cloudsecurityreport]]|Report IBM|
|2020.06.10|//Security Intelligence//| → [[How Threat Actors Are Adapting to the Cloud|https://securityintelligence.com/posts/how-threat-actors-are-adapting-to-the-cloud/]]||
|2020.06.10|TechRepublic| → [[How to better defend your cloud-based environments against cyberattack|https://www.techrepublic.com/article/how-to-better-defend-your-cloud-based-environments-against-cyberattack/]]|Report IBM|
|2020.06.11|Help Net Security| → [[Top security risks for companies to address as cloud migration accelerates|https://www.helpnetsecurity.com/2020/06/11/cloud-migration-risks/]]|Report IBM|
|2020.06.12|MSSP Alert| → [[Cloud Service Providers and Security: IBM Research Findings|https://www.msspalert.com/cybersecurity-research/cloud-service-providers-ibm-findings/]]|Report IBM|
|2020.06.10|//Efficient IP//|![[IDC 2020 Global DNS Threat Report|https://www.efficientip.com/resources/idc-dns-threat-report-2020/]] |Report EfficientIP|
|2020.06.10|Security Newspaper|![[Spoofing attack in Azure DevOps Servers using CVE-2020-1327|https://www.securitynewspaper.com/2020/06/10/spoofing-attack-in-azure-devops-servers-using-cve-2020-1327/]] |CVE-2020-1327 Attacks|
|2020.06.10|//Microsoft Azure//|[[Misconfigured Kubeflow workloads are a security risk||https://www.microsoft.com/security/blog/2020/06/10/misconfigured-kubeflow-workloads-are-a-security-risk/]]|KubeFlow Misconfiguration|
|2020.06.12|Dark Reading| → [[Cryptominers Found in Azure Kubernetes Containers|https://www.darkreading.com/attacks-breaches/cryptominers-found-in-azure-kubernetes-containers/d/d-id/1338083]]|KubeFlow Misconfiguration|
|2020.06.11|Security Week| → [[Microsoft Identifies Attack Targeting Kubeflow Environments|https://www.securityweek.com/microsoft-identifies-attack-targeting-kubeflow-environments]]|KubeFlow Misconfiguration|
|2020.06.10|//PR Newswire//|[[How a Breach and Attack Simulation Platform Can Improve Your Cloud Security|https://www.prnewswire.com/news-releases/how-a-breach-and-attack-simulation-platform-can-improve-your-cloud-security-301073759.html]]|Exercise Simulation|
|2020.06.10|//JumpCloud//|[[Using Azure AD to Authenticate to Systems|https://jumpcloud.com/blog/aad-to-auth-systems]]|AzureAD|
|2020.06.10|//Google Cloud//|[[New Google Cloud firewall features|https://cloud.google.com/blog/products/identity-security/new-google-cloud-firewall-features]]|GCP Firewalls|
|2020.06.10|//Google Cloud//|[[Building resilient systems to weather the unexpected|https://cloud.google.com/blog/products/management-tools/sre-principles-in-practice-for-business-continuity]]|GCP BCP|
|2020.06.10|//Comparitech//|![[We setup a honeypot to see how long for hackers find unsecured database|https://www.comparitech.com/blog/information-security/unsecured-database-honeypot/]] |Attacks Misconfiguration|
|2020.06.10|Dark Reading| → [[Misconfigured Databases Targeted Hours After Deployment|https://www.darkreading.com/cloud/misconfigured-databases-targeted-hours-after-deployment/d/d-id/1338052]]|Attacks Misconfiguration|
|2020.06.10|Security Week| → [[Misconfigured Public Cloud Databases Attacked Within Hours of Deployment|https://www.securityweek.com/misconfigured-public-cloud-databases-attacked-within-hours-deployment]]|Attacks Misconfiguration|
|2020.06.10|//Amazon AWS//|[[Tighten S3 permissions for your IAM users and roles using access history of S3 actions|https://aws.amazon.com/blogs/security/tighten-s3-permissions-iam-users-and-roles-using-access-history-s3-actions/]]|S3 IAM|
|2020.06.10|//Microsoft Azure//|[[The science behind Microsoft Threat Protection: Attack modeling for finding and stopping evasive ransomware|https://www.microsoft.com/security/blog/2020/06/10/the-science-behind-microsoft-threat-protection-attack-modeling-for-finding-and-stopping-evasive-ransomware/]]|Microsoft_ATP Ransomware K6x:|
|2020.06.10|//Oracle//|[[Troubleshooting User Access in Identity Cloud Service when using AD Bridge|https://blogs.oracle.com/cloudsecurity/troubleshooting-user-access-in-identity-cloud-service-when-using-ad-bridge]]|IAM AD_Bridge|
|2020.06.10|//SonaType//|[[Can Kubernetes Keep a Secret?|https://blog.sonatype.com/can-kubernetes-keep-a-secret]]|Kubernetes Secret_Management|
|2020.06.10|MSSP Alert|[[Siemplify Launches Cloud-Native SOAR for MSSPs|https://www.msspalert.com/cybersecurity-services-and-products/cloud/siemplify-soar-for-mssps/]]|Products|
|2020.06.10|//Checkpoint//|[[Security Think Tank: Container security is evolving, so must CISOs|https://blog.checkpoint.com/2020/06/10/creating-harmony-for-cloud-native-security/]]|Cloud_Native|
|2020.06.10|//AWS//|[[Azure Files enhances data protection capabilities|https://azure.microsoft.com/blog/azure-files-enhances-data-protection-capabilities/]]|Azure|
|2020.06.10|//LinkedIn//|[[Open sourcing Kube2Hadoop: Secure access to HDFS from Kubernetes|https://engineering.linkedin.com/blog/2020/open-sourcing-kube2hadoop]]|Kubernetes|
|2020.06.10|//AWS//|[[Software Package Management with AWS CodeArtifact|https://aws.amazon.com/blogs/aws/software-package-management-with-aws-codeartifact/]]|AWS|
|>|>|>|!2020.06.09|
|2020.06.09|ENISA|![[Spotlight on incident reporting of telecom security and trust services|https://www.enisa.europa.eu/news/enisa-news/spotlight-on-incident-reporting-of-telecom-security-and-trust-services]] |Incidents Telcos Repository|
|2020.06.09|ENISA| → [[Cybersecurity Incident Report and Analysis System – Visual Analysis Tool|https://www.enisa.europa.eu/topics/incident-reporting/cybersecurity-incident-report-and-analysis-system-visual-analysis/visual-tool]]|Incidents Telcos Tools|
|2020.06.10|CBR Online| → [[New EU Data on Telco “Security” Issues Shows… Switchgear Failures and Power Outages|https://www.cbronline.com/news/telco-outages-enisa]]|Incidents Telcos|
|2020.06.09|SecTechno|[[Dive - Tool for Exploring Each Layer in a Docker Image - SecTechno|https://sectechno.com/dive-tool-for-exploring-each-layer-in-a-docker-image/]]|Tools|
|2020.06.09|Twitter - Random_Robbie|[[SSRF AWS Bypasses to access metadata endpoint|https://mobile.twitter.com/Random_Robbie/stats/1268186743657947137]]|AWS SSRF|
|2020.06.09|Infosecurity Mag|[[CSA Virtual Summit: Future of European Cloud Services Scheme Detailed|https://www.infosecurity-magazine.com/news/cloud-services-scheme/]]|Certification_Scheme CSA|
|2020.06.09|Infosecurity Mag|[[More S3 Buckets Compromised with Magecart and Malicious Redirector|https://www.infosecurity-magazine.com/news/s3-compromised-magecart-malicious/]]|AWS_S3 Malware|
|2020.06.11|infoRisk Today| → [[Unsecured AWS S3 Buckets Infected With Skimmer Code|https://www.inforisktoday.com/unsecured-aws-s3-buckets-infected-skimmer-code-a-14421]]|AWS_S3 Compromise|
|2020.06.09|Sami Lamppu|[[Microsoft 365 Security Solutions Available API’s|https://samilamppu.com/2020/06/09/microsoft-365-security-solution-available-apis/]]|M365 APIs|
|2020.06.09|Sami Lamppu|[[Detect Potentially Suspicious Activity In Teams With Cloud App Security|https://samilamppu.com/2020/06/09/detect-potentially-suspicious-activity-in-teams-with-cloud-app-security/]]|Teams Detection|
|2020.06.09|//IBM//|[[IBM Cloud - June 9 Outage|https://cloud.ibm.com/status?query=IBM+Cloud+-+June+9+Outage%0D%0A%0D&selected=announcement]]|IBM Outage|
|2020.06.09|CRN| → [[Widespread Outage Hits IBM Cloud|https://www.crn.com/news/cloud/widespread-outage-hits-ibm-cloud]]|Outage IBM|
|2020.06.10|CRN| → [[IBM Blames Massive Cloud Outage On Third-Party Network Provider|https://www.crn.com/news/cloud/ibm-blames-massive-cloud-outage-on-third-party-network-provider]]|Outage IBM|
|2020.06.10|Silicon Angle| → [[IBM cloud outage brings down customer websites worldwide|https://siliconangle.com/2020/06/09/ibm-cloud-outage-leads-customer-websites-going-worldwide/]]|Outage IBM|
|2020.06.10|CBR Online|[[IBM Blames “Incorrect Routing” by Third Party for Global Cloud Outage|https://www.cbronline.com/news/ibm-cloud-outage]]|Outage|
|2020.06.11|Bleeping Computer| → [[IBM Cloud global outage caused by "incorrect" BGP routing|https://www.bleepingcomputer.com/news/technology/ibm-cloud-global-outage-caused-by-incorrect-bgp-routing/]]|Outage IBM|
|2020.06.11|CRN (AU)| → [[IBM blames massive cloud outage on third-party network provider|https://www.crn.com.au/news/ibm-blames-massive-cloud-outage-on-third-party-network-provider-549138]]|Outage IBM|
|2020.06.11|The Register| → [[IBM blames 'external' network provider, incorrect routing, traffic flood for its two-hour cloud outage|https://www.theregister.com/2020/06/11/ibm_cloud_outage_report/]]|Outage IBM|
|2020.06.09|CRN (AU]|[[12 Biggest Cloud Threats And Vulnerabilities In 2020|https://www.crn.com.au/news/12-biggest-cloud-threats-and-vulnerabilities-in-2020-549025]]|Threats Vulnerabilities|
|2020.06.09|DZone|[[Is the Future of Data Security in the Cloud is Programmable? Let's See How!|https://dzone.com/articles/is-the-future-of-data-security-in-the-cloud-is-pro-1]]|Misc.|
|2020.06.09|//RiskIQ//|![[Misconfigured Amazon S3 Buckets Continue to be a Launchpad for Malicious Code|https://www.riskiq.com/blog/labs/misconfigured-s3-buckets/]] |AWS_S3 Misconfiguration|
|2020.06.09|//AWS//|[[AWS achieves its first PCI 3DS attestation|https://aws.amazon.com/blogs/security/aws-achieves-first-pci-3ds-attestation/]]|AWS PCI|
|2020.06.09|//Google Cloud//|[[3 strategies to ensure business continuity using Anthos|https://cloud.google.com/blog/topics/anthos/3-strategies-to-ensure-business-continuity-using-anthos/]]|GCP Anthos BCP|
|2020.06.09|//Crowdstrike//|![[Attackers Are Targeting Cloud Service Providers|https://www.crowdstrike.com/blog/crowdstrike-observes-increase-in-iaas-api-key-theft/]] |APIs|
|2020.06.09|//CISecurity//|![[Cloud Security and the Shared Responsibility Model|https://www.cisecurity.org/white-papers/cloud-security-and-the-shared-responsibility-model/]] |Shared_Responsibility|
|2020.06.09|//Kublr//|[[Kubernetes RBAC 101: Overview|https://kublr.com/blog/kubernetes-rbac-101-overview/]]|Kubernetes RBAC|
|2020.06.19|Cloud Native Computing Foundation| → [[Kubernetes RBAC 101: Overview|https://www.cncf.io/blog/2020/06/19/kubernetes-rbac-101-overview-2/]]|Kubernetes RBAC|
|2020.06.09|//Rhino Security Labs//|[[GKE Kubelet TLS Bootstrap Privilege Escalation|https://rhinosecuritylabs.com/cloud-security/kubelet-tls-bootstrap-privilege-escalation/]]|Kubernetes Vulnerability|
|2020.06.09|//Cobalt.io//|[[Fourth Annual “The State of Pentesting” Finds Strong Relationship Between Security and Engineering, Accelerating Transition to DevSecOps|http://www.globenewswire.com/news-release/2020/06/09/2045649/0/en/Fourth-Annual-The-State-of-Pentesting-Finds-Strong-Relationship-Between-Security-and-Engineering-Accelerating-Transition-to-DevSecOps.html]] ([[rapport|https://resource.cobalt.io/the-state-of-pentesting-2020]])|Report Pentest|
|>|>|>|!2020.06.08|
|2020.06.08|Summit Route|![[Denial of Wallet Attacks on AWS|https://summitroute.com/blog/2020/06/08/denial_of_wallet_attacks_on_aws/]] |AWS Attack_Analysis|
|2020.06.08|Christophe Tafani-Dereeper|[[Automating the provisioning of Active Directory labs in Azure|https://blog.christophetd.fr/automating-the-provisioning-of-active-directory-labs-in-azure/]]|AzureAD Tools||
|2020.06.08|Bleeping Computer|[[New Avaddon Ransomware launches in massive smiley spam campaign|https://www.bleepingcomputer.com/news/security/new-avaddon-ransomware-launches-in-massive-smiley-spam-campaign/]]|Ransomware|
|2020.06.08|GovLoop|[[Simple Steps to Security in the Cloud|https://www.govloop.com/simple-steps-to-security-in-the-cloud/]] ([[guide|https://go.govloop.com/questions-about-cloud.html]])|Best_Practices|
|2020.06.08|CSO|[[A 10-point plan to vet SaaS provider security|https://www.csoonline.com/article/3546316/a-10-point-plan-to-vet-saas-provider-security.html]]|SaaS Assessment|
|2020.06.08|Computer Weekly|[[Cloud storage 101: NAS file storage on AWS, Azure and GCP|https://www.computerweekly.com/feature/Cloud-storage-101-NAS-file-storage-on-AWS-Azure-and-GCP]]|Storage|
|2020.06.08|ShellHacks|[[Docker: Run Command in Container – Exec Example|https://www.shellhacks.com/docker-run-command-in-container-exec-example/]]|Docker|
|2020.06.08|DZone|[[Chaos Engineering - Simulate AZ Failures on AWS|https://dzone.com/articles/chaos-engineering-simulate-az-failures-on-aws]]|AWS Chaos_Engineering|
|2020.06.08|//Google Cloud//|[[5 ways to enhance your cloud storage security and data protection|https://cloud.google.com/blog/products/storage-data-transfer/5-ways-to-enhance-your-cloud-storage-security-and-data-protection/]]|GCP Storage|
|2020.06.08|//Oracle//|[[How to rapidly deploy and evaluate Oracle Identity and Access Management 12C PS4|https://blogs.oracle.com/cloudsecurity/how-to-rapidly-deploy-and-evaluate-oracle-identity-and-access-management-12c-ps4]]|OracleCloud IAM|
|2020.06.08|//Palo Alto Networks//|[[Rethinking Zero Trust Network Access for a Zero Trust Strategy|https://blog.paloaltonetworks.com/2020/06/network-zero-trust-strategy/]]|Zero_trust|
|2020.06.08|//Tripwire//|[[Using AWS Session Manager with Enhanced SSH and SCP Capability|https://www.tripwire.com/state-of-security/security-data-protection/cloud/aws-session-manager-enhanced-ssh-scp-capability/]]|AWS SSH|
|2020.06.08|//Cloud Management Insider//|[[5 Security Challenges for Containers and Their Remedies|https://www.cloudmanagementinsider.com/5-security-challenges-for-containers-and-their-remedies/]]|containers Challenges|
|2020.06.08|//Dark Trace//|[[How Darktrace’s AI caught two Microsoft 365 account takeovers|https://www.darktrace.com/en/blog/how-darktraces-ai-caught-two-microsoft-365-account-takeovers/]]|O365 Compromise|
|>|>|>|!|
|2020.06.03|GAIA-X|![[GAIA-X - the European project kicks off the next phase |https://www.data-infrastructure.eu/GAIAX/Redaktion/EN/Publications/gaia-x-the-european-project-kicks-of-the-next-phase.html]] |GAIA-X Europe|
|2020.06.08|Louis Naugès[img[iCSF/flag_fr.png]]| → [[GAIA-X : chronique d’un échec inéluctable|https://nauges.typepad.com/my_weblog/2020/06/gaia-x-chronique-dun-%C3%A9chec-in%C3%A9luctable.html]]|GAIA-X Europe|
|2020.06.08|L'Usine Nouvelle[img[iCSF/flag_fr.png]]| → [[A quoi ressemblera le projet d’infrastructure européenne des données Gaia-X ?|https://www.usinenouvelle.com/editorial/a-quoi-ressemblera-le-projet-d-infrastructure-europeenne-des-donnees-gaia-x.N972086]]|GAIA-X Europe|
|2020.06.08|IMT[img[iCSF/flag_fr.png]]| → [[Gaia-X : un réseau cloud européen interopérable et souverain|https://blogrecherche.wp.imt.fr/2020/06/04/gaia-x-un-reseau-cloud-europeen/]]|GAIA-X Europe|
|2020.06.08|IT Social[img[iCSF/flag_fr.png]]| → [[Gaia-X, le cloud souverain européen prend forme sous l’impulsion franco-allemande|https://itsocial.fr/enjeux-it/enjeux-strategie/enjeu-digital/gaia-x-le-cloud-souverain-europeen-prend-forme-sous-limpulsion-franco-allemande/]]|GAIA-X Europe|
|2020.06.08|DataNews[img[iCSF/flag_fr.png]]| → [[Le projet 'cloud' européen Gaia-X aura son siège en Belgique|https://datanews.levif.be/ict/actualite/le-projet-cloud-europeen-gaia-x-aura-son-siege-en-belgique/article-news-1297273.html?cookie_check=1592241144]]|GAIA-X Europe|
|2020.06.08|Techniques de l'Ingénieur[img[iCSF/flag_fr.png]]| → [[Cloud souverain : la mauvaise stratégie de l'Europe|https://www.techniques-ingenieur.fr/actualite/articles/cloud-souverain-la-mauvaise-strategie-de-leurope-80376/]]|GAIA-X Europe|
|2020.06.11|Le Mag IT[img[iCSF/flag_fr.png]]| → [[GAIA-X : le SeLoger.com du cloud européen|https://www.lemagit.fr/actualites/252484537/GAIA-X-le-SeLoger-du-Cloud-europeen]]|GAIA-X Europe|
|2020.06.18|Computer Weekly| → [[EU-backed bid to build data preservation cloud for European research community gathers pace|https://www.computerweekly.com/news/252484854/EU-backed-bid-to-build-data-preservation-cloud-for-European-research-community-gathers-pace]]|GAIA-X Europe|
!"//Cloud Security Alliance Issues Call for Papers for EMEA Congress 2020//"
L'appel à contribution est ouvert jusqu'au ''31 août 2020''. Les thèmes suggérés sont les suivants ://
<<<
''Papers examining new frontiers accelerating change in information security are sought''
Berlin, Germany – June 11, 2020 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications and best practices to help ensure a secure cloud computing environment, announced that the Call for Papers for CSA EMEA Congress 2020 is now open through August 31. This multi-day virtual event, to be held later this fall, will focus on information security, privacy, governance and compliance, and emerging technologies. Those interested in providing thought leadership on the research, development, practice, and requirements surrounding cloud security are encouraged to apply.
“This year’s CSA EMEA Congress promises to spark discussion on sectors that are accelerating change in information security,” said Daniele Catteddu, Chief Technology Officer, Cloud Security Alliance. “Experts on everything from IoT to the Software-Defined Perimeter will be there to drive and facilitate the sharing of best practices and education opportunities for cloud security professionals eager to shape the direction of cloud security in the coming decade.”
Cloud and cybersecurity experts are encouraged to provide vendor-neutral presentations, providing both educational and practical thought leadership on such topics as IoT, Quantum Computing, Dev Ops and Artificial Intelligence.
With training and educational opportunities for cloud security professionals, attendees representing both end-user and industry viewpoints will be able to experience a unique mixture of compelling presentations and topical discussions on topics essential to the cloud ecosystem, including: Zero Trust, the growing complexity of cloud certification, continuous assurance and compliance, the European Cloud and GDPR, DevOps and containerization, and AI-driven cloud security. In addition to Q&A sessions following certain presentations, attendees will be able to network virtually via Circle, a global community of CSA members and partners.
<<<
__Liens :__
* l'annonce sur le site de la CSA → https://cloudsecurityalliance.org/press-releases/2020/06/11/cloud-security-alliance-issues-call-for-papers-for-emea-congress-2020/
* le site Easychair pour soumettre un sujet ⇒ https://easychair.org/conferences/?conf=csaemea2020 /% ''[[CloudSecurityAlliance.fr/go/k9ee/|https://CloudSecurityAlliance.fr/go/k9ee/]]'' %/
|[img(30px,auto)[iCSF/Francais.gif]] @@color:#00F;font-size:125%;__[[Version française|2020.06.07 - Newsletter Hebdomadaire - #67]]__@@ |[img(30px,auto)[iCSF/Anglais.gif]] @@color:#00F;font-size:125%;__[[English version|2020.06.07 - Weekly Newsletter - #67]]__@@ |
|<<tiddler [[2020.06.07 - Newsletter Hebdomadaire - #67]]>> |<<tiddler [[2020.06.07 - Weekly Newsletter - #67]]>> |
!Newsletter Hebdomadaire Cloud et Sécurité - semaine du 1er au 7 juin 2020
!!1 - Nouveautés CSA et Informations - 1er au 7 juin 2020
* Actualité : Vers un Cloud souverain européen avec GAIA-X ?+++*[»]> <<tiddler [[2020.06.05 - Vers un Cloud souverain européen avec GAIA-X ?]]>>=== 
!!2 - Veille Web Cloud et Sécurité
La [[Veille Web|2020.06.07 - Veille Hebdomadaire - 7 juin]] avec plus de 90 liens
* À lire
** Vers un Cloud souverain européen avec GAIA-X ?+++*[»] 
|2020.06.03|GAIA-X|![[GAIA-X - the European project kicks off the next phase |https://www.data-infrastructure.eu/GAIAX/Redaktion/EN/Publications/gaia-x-the-european-project-kicks-of-the-next-phase.html]] |GAIA-X Europe|
|2020.06.03|Les Echos[img[iCSF/flag_fr.png]]| → [[La France et l'Allemagne défendent un cloud souverain européen|https://www.lesechos.fr/tech-medias/hightech/le-cloud-europeen-franco-allemand-devoile-ses-services-numeriques-souverains-1208046]]|GAIA-X Europe|
|2020.06.03|NeoWin| → [[Gaia-X, Europe' competitor to Silicon Valley' cloud computing offerings, takes shape - Neowin|https://www.neowin.net/news/gaia-x-europes-competitor-to-silicon-valleys-cloud-computing-offerings-takes-shape]]|GAIA-X Europe|
|2020.06.04|//Silicon.fr[img[iCSF/flag_fr.png]]//| → [[GAIA-X ou la possibilité d'un Cloud franco-allemand|https://www.silicon.fr/gaia-x-ou-la-possibilite-dun-cloud-franco-allemand-340778.html]]|GAIA-X Europe|
|2020.06.04|//OVH Cloud//| → [[GAIA-X Catalogue search engine – under the hood |https://www.ovh.com/blog/gaia-x-catalogue-search-engine-under-the-hood/]]|GAIA-X Europe|
|2020.06.04|POLITICO| → [[Germany, France launch Gaia-X platform in bid for "tech sovereignty"|https://www.politico.eu/article/germany-france-gaia-x-cloud-platform-eu-tech-sovereignty/]]|GAIA-X Europe|
|2020.06.05|Informatique News[img[iCSF/flag_fr.png]]| → [[Gaia-X, la nouvelle initiative franco-allemande pour assurer une souveraineté sur les données européennes dans le cloud|https://www.informatiquenews.fr/gaia-x-la-nouvelle-initiative-franco-allemande-pour-assurer-une-souverainete-sur-les-donnees-europeennes-dans-le-cloud-70785]]|GAIA-X Europe|
|2020.06.05|EURACTIV| → [[Altmaier charts Gaia-X as the beginning of a "European data ecosystem"|https://www.euractiv.com/section/data-protection/news/altmaier-charts-gaia-x-as-the-beginning-of-a-european-data-ecosystem/]]|GAIA-X Europe|
|2020.06.05|CloudTweaks| → [[France, Germany back European cloud computing 'moonshot'|https://www.reuters.com/article/us-europe-tech/france-germany-back-european-cloud-computing-moonshot-idUSKBN23B26B]]|GAIA-X Europe|
|2020.06.05|Channel E2E| → [[Europe' Gaia-X Counters Amazon AWS, Microsoft Azure, Google Cloud|https://www.channele2e.com/channel-partners/csps/europes-gaia-x-counters-aws-azure-google-cloud/]]|GAIA-X Europe|
|2020.06.06|The Register| → [[Franco-German cloud framework floated to protect European's data from foreign tech firms slurpage|https://go.theregister.com/feed/www.theregister.com/2020/06/06/eu_gaiax_cloud/]]|GAIA-X Europe|
=== 
** Vers un "//Great Firewall of Europe//" ?+++*[»] 
|2020.06.05|CBR Online|![[European Policy Paper: "We Want a Chinese Firewall Too"|https://www.cbronline.com/news/european-firewall-proposal]] |Europe Policy|
=== 
** Annonce IBM sur le chiffrement homomorphique+++*[»] 
|2020.06.04|//IBM//|![[IBM Releases Fully Homomorphic Encryption Toolkit for MacOS and iOS; Linux and Android Coming Soon|https://www.ibm.com/blogs/research/2020/06/ibm-releases-fully-homomorphic-encryption-toolkit-for-macos-and-ios-linux-and-android-coming-soon/]] |Homomorphic_Encryption|
|2020.06.05|//IBM//| → [[New Open Source Security Tools Let You Develop on Encrypted Data|https://developer.ibm.com/blogs/new-open-source-security-tools-let-you-develop-on-encrypted-data/]] (site [[Fully Homomorphic Encryption|https://www.research.ibm.com/labs/uk/fhe.html]])|Homomorphic_Encryption|
|2020.06.05|Security Week| → [[IBM Releases Open Source Toolkits for Processing Data While Encrypted|https://www.securityweek.com/ibm-releases-open-source-toolkits-processing-data-while-encrypted]]|Homomorphic_Encryption|
|2020.06.05|DevOps| → [[IBM Releases Fully Homomorphic Encryption Toolkit for MacOS and iOS; Linux and Android Coming Soon|https://devops.com/ibm-releases-fully-homomorphic-encryption-toolkit-for-macos-and-ios-linux-and-android-coming-soon/]]|Homomorphic_Encryption|
=== 
* Attaques et pannes
** Phishing O365+++*[»] 
|2020.06.03|Bleeping Computer|[[Office 365 phishing baits remote workers with fake VPN configs|https://www.bleepingcomputer.com/news/security/office-365-phishing-baits-remote-workers-with-fake-vpn-configs/]]|O365 Phishing|
=== 
* Rapports et études
** Ermetic+++*[»] 
|2020.06.03|//Ermetic//|[[Ermetic Reports Nearly 80% of Companies Experienced a Cloud Data Breach in Past 18 Months|https://ermetic.com/whats-new/ermetic-reports-nearly-80-of-companies-experienced-a-cloud-data-breach-in-past-18-months/]]|Report Ermetic|
|2020.06.03|Container Journal| → [[Ermetic Reports Nearly 80% of Companies Experienced a Cloud Data Breach in Past 18 Months|https://containerjournal.com/news/news-releases/ermetic-reports-nearly-80-of-companies-experienced-a-cloud-data-breach-in-past-18-months/]]|Report Ermetic|
|2020.06.03|Help Net Security| → [[Most companies suffered a cloud data breach in the past 18 months|https://www.helpnetsecurity.com/2020/06/03/cloud-data-breach/]]|Report Ermetic|
|2020.05.06|Security Week| → [[Cloud Security Company Ermetic Emerges From Stealth Mode|https://www.securityweek.com/microsoft-investigating-github-account-hacking-claims]]|Report Ermetic|
=== et OverOps+++*[»] 
|2020.06.02|BusinessWire|![[Second Annual |DevOps Survey Reveals 70% of Engineering Teams Choose Application Quality Over Software Delivery Speed|https://www.businesswire.com/news/home/20200602005310/en/Annual-DevOps-Survey-Reveals-70-Engineering-Teams]] |Survey Quality|
|2020.06.02|//OverOps//| → [[State of Software Quality Report] How Organizations are Addressing the Speed vs. Quality Challenge in 2020|https://blog.overops.com/survey-2020-the-state-of-software-quality/]]|Survey Quality|
|2020.06.02|DevOps| → [[Who’s Responsible for Security? Apparently, It Depends|https://devops.com/whos-responsible-for-security-apparently-it-depends/]]|Surey|
|2020.06.02|DevOps| → [[Survey Surfaces Tension Between Software Speed and Quality|https://devops.com/survey-surfaces-tension-between-software-speed-quality/]]|Survey Quality|
=== 
* Acquisitions
** ''Lastline'' par ''VMware''+++*[»] 
|2020.06.04|Lastline|[[Lastline to be Acquired by VMware|https://www.lastline.com/blog/lastline-to-be-acquired-by-vmware/]]|Acquisition|
|2020.06.04|MSSP Alert| → [[VMware Acquires Lastline Network Detection and Response|https://www.msspalert.com/investments/vmware-acquires-lastline-network-detection-and-response/]]|Acquisition|
|2020.06.05|Security Week| → [[VMware to Acquire Network Security Company Lastline|https://www.securityweek.com/vmware-acquire-network-security-company-lastline]]|Acquisition|
|2020.06.05|TechRadar Pro| → [[VMware snaps up network security firm Lastline|http://www.techradar.com/news/vmware-snaps-up-network-security-firm-lastline]]|Acquisition|
=== 
** SovLabs par CloudBolt+++*[»] 
|2020.06.04|DevOps|[[CloudBolt Acquires SovLabs to Advance Hybrid Cloud Strategy|https://devops.com/cloudbolt-acquires-sovlabs-to-advance-hybrid-cloud-strategy/]]|Acquisition|
=== 
** Spot par NetApp+++*[»] 
|2020.06.05|DevOps|[[NetApp Acquires Spot to Rein in Cloud Costs|https://devops.com/netapp-acquires-spot-to-rein-in-cloud-costs/]]|Acquisition|
|2020.06.06|Israel Valley[img[iCSF/flag_fr.png]]| → [[L’américain Netapp rachète la start-up israélienne Spot pour réduire la facture cloud.|https://www.israelvalley.com/2020/06/lamericain-netapp-rachete-la-start-up-israelienne-spot-pour-reduire-la-facture-cloud/]]|Acquisition|
=== 
* Vulnérabilités
** Kubernetes : CVE-2020-10749+++*[»] 
|2020.05.27|Kubernetes|[[IPv4 only clusters susceptible to MitM attacks via IPv6 rogue router advertisements #91507|https://github.com/kubernetes/kubernetes/issues/91507]]|CVE-2020-10749 Kubernetes|
|2020.06.02|CBR Online| → [[Kubernetes Bug Leaves Default Clusters Vulnerable to Man-in-the-Middle Attacks|https://www.cbronline.com/news/kubernetes-bug]]|CVE-2020-10749 Kubernetes|
|2020.06.03|//Alcide//| → [[New Kubernetes Man-In-The-Middle (MiTM) Attack Leverages IPv6 Router Advertisements|https://blog.alcide.io/new-kubernetes-man-in-the-middle-mitm-attack-leverage-ipv6-router-advertisements]]|CVE-2020-10749 Kubernetes|
|2020.06.05|//StackRox//| → [[Mitigating CVE-2020-10749 in Kubernetes Environments|https://www.stackrox.com/post/2020/06/mitigating-kubernetes-cve-2020-10749/]]|CVE-2020-10749 Kubernetes|
=== et CVE-2020-8555+++*[»] 
|2020.06.02|Medium - BreizhZeroDayHunters|[[When it's not only about a Kubernetes CVE…|https://medium.com/@BreizhZeroDayHunters/when-its-not-only-about-a-kubernetes-cve-8f6b448eafa8]]|CVE-2020–8555 Kubernetes|
=== 
** VMware Cloud Director+++*[»] 
|2020.05.19|//VMware//|[[VMSA-2020-0010: VMware Cloud Director updates address Code Injection Vulnerability (CVE-2020-3956)|https://www.vmware.com/security/advisories/VMSA-2020-0010.html]]|CVE-2020-3956|
|2020.06.04|GB Hackers on Security| → [[A Bug VMware Cloud Director Let Hackers Compromise Corporate Servers|https://gbhackers.com/critical-vmware-cloud-director-bug/]]|CVE-2020-3956 VMware|
|2020.06.03|//Sophos//| → [[VMware flaw allows takeover of multiple private clouds|https://nakedsecurity.sophos.com/2020/06/03/vmware-flaw-allows-takeover-of-multiple-private-clouds/]]|CVE-2020-3956 VMware|
|2020.06.02|Help Net Security| → [[VMware Cloud Director vulnerability enables a full cloud infrastructure takeover|https://www.helpnetsecurity.com/2020/06/02/cve-2020-3956/]]|CVE-2020-3956 VMware|
|2020.06.02|Security Week| → [[VMware Cloud Director Vulnerability Has Major Impact for Cloud Providers|https://www.securityweek.com/vmware-cloud-director-vulnerability-has-major-impact-cloud-providers]]|CVE-2020-3956 VMware|
=== 
** Login dans GCP+++*[»] 
|2020.06.04|//GitLab//|![[Privilege Escalation in Google Cloud Platform's OS Login|https://gitlab.com/gitlab-com/gl-security/gl-redteam/red-team-tech-notes/-/tree/master/oslogin-privesc-june-2020]] |GCP Vulnerability|
=== 
* Divers
** Détection de pot de miel avec Azure Sentinel+++*[»] 
|2020.06.07|Martin Rothe|[[Network IDS & Azure Sentinel|https://blog.rothe.uk/network-ids-azure-sentinel/]]|Azure_Sentinel|
|2020.06.06|Martin Rothe|[[Analyzing Honeypot Data with Azure Sentinel|https://blog.rothe.uk/analysing-honeypot-data/]]|Honeypot Azure_Sentinel|
=== 
** Comparatif des services Kubernetes+++*[»] 
|2020.06.05|//IBM//, //Digital Ocean//, //Scaleway//|![[Kubernetes managed service|https://docs.google.com/spreadsheets/d/1RPpyDOLFmcgxMCpABDzrsBYWpPYCIBuvAoUQLwOGoQw/edit]] |Kubernetes Comparison|
=== 
** Zoom et le chiffrement+++*[»] 
|2020.06.03|ZDnet|[[Zoom security: Here's how Germany got its wires crossed over video-chat privacy|https://www.zdnet.com/article/zoom-security-heres-how-germany-got-its-wires-crossed-over-video-chat-privacy/]]|Zoom|
|2020.06.03|Security Week|[[Zoom Not Offering End-to-End Encryption to Free Users to Help Law Enforcement|https://www.securityweek.com/zoom-not-offering-end-end-encryption-free-users-help-law-enforcement]]|Zoom Encryption|
|2020.06.03|CBR Online| → [[Zoom Wrestles Publicly with E2E Encryption Demons|https://www.cbronline.com/news/zoom-e2e-encryption]]|Zoom Encryption|
=== 
** Arrêt par IBM des VPC à base de Power+++*[»] 
|2020.06.02|//IBM//|[[End of Service Announcement for Virtual Servers for VPC on POWER|https://www.ibm.com/cloud/blog/announcements/end-of-service-announcement-for-virtual-servers-for-vpc-on-power]]|IBM_Cloud Power|
|2020.06.04|The Register| → [[IBM to power down Power-powered virtual private cloud, GPU-accelerated options|https://www.theregister.com/2020/06/04/ibm_vpc_power_shutdown_notice/]]|IBM_Cloud Power|
=== 
** Sécurité des données et SaaS (1/4)+++*[»] 
|2020.06.03|//Securosis//|![[Data Security in the SaaS Age: Rethinking Data Security|https://securosis.com/blog/data-security-in-the-saas-age-rethinking-data-security]] (1/4)|SaaS|
=== 
** Outils : Cloudsploit+++*[»] 
|2020.06.05|SecTechno|[[CloudSploit - Cloud Security Configuration Checks - SecTechno|https://sectechno.com/cloudsploit-cloud-security-configuration-checks/]]|Tools|
=== et Cado Host+++*[»] 
|2020.06.05|Medium - cloudyforensics|[[Introducing Cado Host - A free tool to collect forensic artefacts from compromised systems|https://medium.com/@cloudyforensics/introducing-cado-host-a-free-tool-to-collect-forensic-artefacts-from-compromised-systems-e2f93ff5a532]]|Tools|
=== 
** Complément sur la nouvelle région GCP en France+++*[»] 
|2020.06.01|//Google Cloud//|![[Nouvelle région cloud en France|https://www.linkedin.com/posts/google-cloud_google-cloud-entend-soutenir-la-croissance-activity-6671666435900612608-cpke/]] |GCP France|
=== 
!!3 - Agenda
* 9 au 12 juin : visio-conférences CSA '''Virtual EU Summit'''

|ssTabl96|k
|!⇒ [[CloudSecurityAlliance.fr/go/K67/|https://CloudSecurityAlliance.fr/go/K67/]] |
!Weekly Cloud and Security Watch Newsletter - June 1st to 7th, 2020[>img[iCSF/inEnglish.png]]
!!1 - CSA News and Updates - June 1st to 7th, 2020
* News : the GAIA-X project in bid for a "European tech soverignty+++*[»]> <<tiddler [[2020.06.05 - Vers un Cloud souverain européen avec GAIA-X ?]]>>=== 
!!2 - Cloud and Security News Watch
[[Over 90 links|2020.06.07 - Veille Hebdomadaire - 7 juin]]
* Must read
** GAIA-X platform in bid for a "European tech soverignty"?+++*[»] 
|2020.06.03|GAIA-X|![[GAIA-X - the European project kicks off the next phase |https://www.data-infrastructure.eu/GAIAX/Redaktion/EN/Publications/gaia-x-the-european-project-kicks-of-the-next-phase.html]] |GAIA-X Europe|
|2020.06.03|Les Echos[img[iCSF/flag_fr.png]]| → [[La France et l'Allemagne défendent un cloud souverain européen|https://www.lesechos.fr/tech-medias/hightech/le-cloud-europeen-franco-allemand-devoile-ses-services-numeriques-souverains-1208046]]|GAIA-X Europe|
|2020.06.03|NeoWin| → [[Gaia-X, Europe' competitor to Silicon Valley' cloud computing offerings, takes shape - Neowin|https://www.neowin.net/news/gaia-x-europes-competitor-to-silicon-valleys-cloud-computing-offerings-takes-shape]]|GAIA-X Europe|
|2020.06.04|//Silicon.fr[img[iCSF/flag_fr.png]]//| → [[GAIA-X ou la possibilité d'un Cloud franco-allemand|https://www.silicon.fr/gaia-x-ou-la-possibilite-dun-cloud-franco-allemand-340778.html]]|GAIA-X Europe|
|2020.06.04|//OVH Cloud//| → [[GAIA-X Catalogue search engine – under the hood |https://www.ovh.com/blog/gaia-x-catalogue-search-engine-under-the-hood/]]|GAIA-X Europe|
|2020.06.04|POLITICO| → [[Germany, France launch Gaia-X platform in bid for "tech sovereignty"|https://www.politico.eu/article/germany-france-gaia-x-cloud-platform-eu-tech-sovereignty/]]|GAIA-X Europe|
|2020.06.05|Informatique News[img[iCSF/flag_fr.png]]| → [[Gaia-X, la nouvelle initiative franco-allemande pour assurer une souveraineté sur les données européennes dans le cloud|https://www.informatiquenews.fr/gaia-x-la-nouvelle-initiative-franco-allemande-pour-assurer-une-souverainete-sur-les-donnees-europeennes-dans-le-cloud-70785]]|GAIA-X Europe|
|2020.06.05|EURACTIV| → [[Altmaier charts Gaia-X as the beginning of a "European data ecosystem"|https://www.euractiv.com/section/data-protection/news/altmaier-charts-gaia-x-as-the-beginning-of-a-european-data-ecosystem/]]|GAIA-X Europe|
|2020.06.05|CloudTweaks| → [[France, Germany back European cloud computing 'moonshot'|https://www.reuters.com/article/us-europe-tech/france-germany-back-european-cloud-computing-moonshot-idUSKBN23B26B]]|GAIA-X Europe|
|2020.06.05|Channel E2E| → [[Europe' Gaia-X Counters Amazon AWS, Microsoft Azure, Google Cloud|https://www.channele2e.com/channel-partners/csps/europes-gaia-x-counters-aws-azure-google-cloud/]]|GAIA-X Europe|
|2020.06.06|The Register| → [[Franco-German cloud framework floated to protect European's data from foreign tech firms slurpage|https://go.theregister.com/feed/www.theregister.com/2020/06/06/eu_gaiax_cloud/]]|GAIA-X Europe|
=== 
** Towards a "//Great Firewall of Europe//" ?+++*[»] 
|2020.06.05|CBR Online|![[European Policy Paper: "We Want a Chinese Firewall Too"|https://www.cbronline.com/news/european-firewall-proposal]] |Europe Policy|
=== 
** IBM Releases Homomorphic Encryption Open Source Toolkits+++*[»] 
|2020.06.05|IBM|![[New Open Source Security Tools Let You Develop on Encrypted Data|https://developer.ibm.com/blogs/new-open-source-security-tools-let-you-develop-on-encrypted-data/]] (site [[Fully Homomorphic Encryption|https://www.research.ibm.com/labs/uk/fhe.html]]) |Homomorphic_Encryption|
|2020.06.05|Security Week| → [[IBM Releases Open Source Toolkits for Processing Data While Encrypted|https://www.securityweek.com/ibm-releases-open-source-toolkits-processing-data-while-encrypted]]|Homomorphic_Encryption|
|2020.06.05|DevOps| → [[IBM Releases Fully Homomorphic Encryption Toolkit for MacOS and iOS; Linux and Android Coming Soon|https://devops.com/ibm-releases-fully-homomorphic-encryption-toolkit-for-macos-and-ios-linux-and-android-coming-soon/]]|Homomorphic_Encryption|
=== 
* Attacks
** Phishing O365+++*[»] 
|2020.06.03|Bleeping Computer|[[Office 365 phishing baits remote workers with fake VPN configs|https://www.bleepingcomputer.com/news/security/office-365-phishing-baits-remote-workers-with-fake-vpn-configs/]]|O365 Phishing|
=== 
* Reports and Surveys
** Ermetic+++*[»] 
|2020.06.03|//Ermetic//|[[Ermetic Reports Nearly 80% of Companies Experienced a Cloud Data Breach in Past 18 Months|https://ermetic.com/whats-new/ermetic-reports-nearly-80-of-companies-experienced-a-cloud-data-breach-in-past-18-months/]]|Report Ermetic|
|2020.06.03|Container Journal| → [[Ermetic Reports Nearly 80% of Companies Experienced a Cloud Data Breach in Past 18 Months|https://containerjournal.com/news/news-releases/ermetic-reports-nearly-80-of-companies-experienced-a-cloud-data-breach-in-past-18-months/]]|Report Ermetic|
|2020.06.03|Help Net Security| → [[Most companies suffered a cloud data breach in the past 18 months|https://www.helpnetsecurity.com/2020/06/03/cloud-data-breach/]]|Report Ermetic|
|2020.05.06|Security Week| → [[Cloud Security Company Ermetic Emerges From Stealth Mode|https://www.securityweek.com/microsoft-investigating-github-account-hacking-claims]]|Report Ermetic|
=== and OverOps+++*[»] 
|2020.06.02|BusinessWire|![[Second Annual |DevOps Survey Reveals 70% of Engineering Teams Choose Application Quality Over Software Delivery Speed|https://www.businesswire.com/news/home/20200602005310/en/Annual-DevOps-Survey-Reveals-70-Engineering-Teams]] |Survey Quality|
|2020.06.02|//OverOps//| → [[State of Software Quality Report] How Organizations are Addressing the Speed vs. Quality Challenge in 2020|https://blog.overops.com/survey-2020-the-state-of-software-quality/]]|Survey Quality|
|2020.06.02|DevOps| → [[Who’s Responsible for Security? Apparently, It Depends|https://devops.com/whos-responsible-for-security-apparently-it-depends/]]|Surey|
|2020.06.02|DevOps| → [[Survey Surfaces Tension Between Software Speed and Quality|https://devops.com/survey-surfaces-tension-between-software-speed-quality/]]|Survey Quality|
=== 
* Acquisitions
** ''Lastline'' by ''VMware''+++*[»] 
|2020.06.04|Lastline|[[Lastline to be Acquired by VMware|https://www.lastline.com/blog/lastline-to-be-acquired-by-vmware/]]|Acquisition|
|2020.06.04|MSSP Alert| → [[VMware Acquires Lastline Network Detection and Response|https://www.msspalert.com/investments/vmware-acquires-lastline-network-detection-and-response/]]|Acquisition|
|2020.06.05|Security Week| → [[VMware to Acquire Network Security Company Lastline|https://www.securityweek.com/vmware-acquire-network-security-company-lastline]]|Acquisition|
|2020.06.05|TechRadar Pro| → [[VMware snaps up network security firm Lastline|http://www.techradar.com/news/vmware-snaps-up-network-security-firm-lastline]]|Acquisition|
=== 
** SovLabs by CloudBolt+++*[»] 
|2020.06.04|DevOps|[[CloudBolt Acquires SovLabs to Advance Hybrid Cloud Strategy|https://devops.com/cloudbolt-acquires-sovlabs-to-advance-hybrid-cloud-strategy/]]|Acquisition|
=== 
** Spot by NetApp+++*[»] 
|2020.06.05|DevOps|[[NetApp Acquires Spot to Rein in Cloud Costs|https://devops.com/netapp-acquires-spot-to-rein-in-cloud-costs/]]|Acquisition|
|2020.06.06|Israel Valley[img[iCSF/flag_fr.png]]| → [[L’américain Netapp rachète la start-up israélienne Spot pour réduire la facture cloud.|https://www.israelvalley.com/2020/06/lamericain-netapp-rachete-la-start-up-israelienne-spot-pour-reduire-la-facture-cloud/]]|Acquisition|
=== 
* Vulnerabilities
** Kubernetes: CVE-2020-10749+++*[»] 
|2020.05.27|Kubernetes|[[IPv4 only clusters susceptible to MitM attacks via IPv6 rogue router advertisements #91507|https://github.com/kubernetes/kubernetes/issues/91507]]|CVE-2020-10749 Kubernetes|
|2020.06.02|CBR Online| → [[Kubernetes Bug Leaves Default Clusters Vulnerable to Man-in-the-Middle Attacks|https://www.cbronline.com/news/kubernetes-bug]]|CVE-2020-10749 Kubernetes|
|2020.06.03|//Alcide//| → [[New Kubernetes Man-In-The-Middle (MiTM) Attack Leverages IPv6 Router Advertisements|https://blog.alcide.io/new-kubernetes-man-in-the-middle-mitm-attack-leverage-ipv6-router-advertisements]]|CVE-2020-10749 Kubernetes|
|2020.06.05|//StackRox//| → [[Mitigating CVE-2020-10749 in Kubernetes Environments|https://www.stackrox.com/post/2020/06/mitigating-kubernetes-cve-2020-10749/]]|CVE-2020-10749 Kubernetes|
=== and CVE-2020-8555+++*[»] 
|2020.06.02|Medium - BreizhZeroDayHunters|[[When it's not only about a Kubernetes CVE…|https://medium.com/@BreizhZeroDayHunters/when-its-not-only-about-a-kubernetes-cve-8f6b448eafa8]]|CVE-2020–8555 Kubernetes|
=== 
** VMware Cloud Director+++*[»] 
|2020.05.19|//VMware//|[[VMSA-2020-0010: VMware Cloud Director updates address Code Injection Vulnerability (CVE-2020-3956)|https://www.vmware.com/security/advisories/VMSA-2020-0010.html]]|CVE-2020-3956|
|2020.06.04|GB Hackers on Security| → [[A Bug VMware Cloud Director Let Hackers Compromise Corporate Servers|https://gbhackers.com/critical-vmware-cloud-director-bug/]]|CVE-2020-3956 VMware|
|2020.06.03|//Sophos//| → [[VMware flaw allows takeover of multiple private clouds|https://nakedsecurity.sophos.com/2020/06/03/vmware-flaw-allows-takeover-of-multiple-private-clouds/]]|CVE-2020-3956 VMware|
|2020.06.02|Help Net Security| → [[VMware Cloud Director vulnerability enables a full cloud infrastructure takeover|https://www.helpnetsecurity.com/2020/06/02/cve-2020-3956/]]|CVE-2020-3956 VMware|
|2020.06.02|Security Week| → [[VMware Cloud Director Vulnerability Has Major Impact for Cloud Providers|https://www.securityweek.com/vmware-cloud-director-vulnerability-has-major-impact-cloud-providers]]|CVE-2020-3956 VMware|
=== 
** GCP's OS Login+++*[»] 
|2020.06.04|//GitLab//|![[Privilege Escalation in Google Cloud Platform's OS Login|https://gitlab.com/gitlab-com/gl-security/gl-redteam/red-team-tech-notes/-/tree/master/oslogin-privesc-june-2020]] |GCP Vulnerability|
=== 
* Miscellaneous
** Detection and Honeypots with Azure Sentinel+++*[»] 
|2020.06.07|Martin Rothe|[[Network IDS & Azure Sentinel|https://blog.rothe.uk/network-ids-azure-sentinel/]]|Azure_Sentinel|
|2020.06.06|Martin Rothe|[[Analyzing Honeypot Data with Azure Sentinel|https://blog.rothe.uk/analysing-honeypot-data/]]|Honeypot Azure_Sentinel|
=== 
** Kubernetes managed services+++*[»] 
|2020.06.05|//IBM//, //Digital Ocean//, //Scaleway//|![[Kubernetes managed service|https://docs.google.com/spreadsheets/d/1RPpyDOLFmcgxMCpABDzrsBYWpPYCIBuvAoUQLwOGoQw/edit]] |Kubernetes Comparison|
=== 
** Updates on Zoom encryption+++*[»] 
|2020.06.03|ZDnet|[[Zoom security: Here's how Germany got its wires crossed over video-chat privacy|https://www.zdnet.com/article/zoom-security-heres-how-germany-got-its-wires-crossed-over-video-chat-privacy/]]|Zoom|
|2020.06.03|Security Week|[[Zoom Not Offering End-to-End Encryption to Free Users to Help Law Enforcement|https://www.securityweek.com/zoom-not-offering-end-end-encryption-free-users-help-law-enforcement]]|Zoom Encryption|
|2020.06.03|CBR Online| → [[Zoom Wrestles Publicly with E2E Encryption Demons|https://www.cbronline.com/news/zoom-e2e-encryption]]|Zoom Encryption|
=== 
** IBM powers down Power-powered VPCs+++*[»] 
|2020.06.02|//IBM//|[[End of Service Announcement for Virtual Servers for VPC on POWER|https://www.ibm.com/cloud/blog/announcements/end-of-service-announcement-for-virtual-servers-for-vpc-on-power]]|IBM_Cloud Power|
|2020.06.04|The Register| → [[IBM to power down Power-powered virtual private cloud, GPU-accelerated options|https://www.theregister.com/2020/06/04/ibm_vpc_power_shutdown_notice/]]|IBM_Cloud Power|
=== 
** Data Security in the SaaS Age (1/4)+++*[»] 
|2020.06.03|//Securosis//|![[Data Security in the SaaS Age: Rethinking Data Security|https://securosis.com/blog/data-security-in-the-saas-age-rethinking-data-security]] (1/4) |SaaS|
=== 
** Tools: Cloudsploit+++*[»] 
|2020.06.05|SecTechno|[[CloudSploit - Cloud Security Configuration Checks - SecTechno|https://sectechno.com/cloudsploit-cloud-security-configuration-checks/]]|Tools|
=== and Cado Host+++*[»] 
|2020.06.05|Medium - cloudyforensics|[[Introducing Cado Host - A free tool to collect forensic artefacts from compromised systems|https://medium.com/@cloudyforensics/introducing-cado-host-a-free-tool-to-collect-forensic-artefacts-from-compromised-systems-e2f93ff5a532]]|Tools|
=== 
** Updates on the future GCP region in France+++*[»] 
|2020.06.01|//Google Cloud//|![[Nouvelle région cloud en France|https://www.linkedin.com/posts/google-cloud_google-cloud-entend-soutenir-la-croissance-activity-6671666435900612608-cpke/]] |GCP France|
=== 
!!3 - Agenda
* June 9th-12th: online CSA '''Virtual EU Summit'''

|ssTabl96|k
|!⇒ [[CloudSecurityAlliance.fr/go/K67/|https://CloudSecurityAlliance.fr/go/K67/]] |
|!Juin|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2020.06.07|
|2020.06.07|Martin Rothe|[[Network IDS & Azure Sentinel|https://blog.rothe.uk/network-ids-azure-sentinel/]]|Azure_Sentinel|
|>|>|>|!2020.06.06|
|2020.06.06|TechRadar Pro|[[Fake VPN messages used to lure Office 365 phishing victims|http://www.techradar.com/news/fake-vpn-messages-used-to-lure-office-365-phishing-victims]]|O365 Phishing|
|2020.06.06|Martin Rothe|[[Analyzing Honeypot Data with Azure Sentinel|https://blog.rothe.uk/analysing-honeypot-data/]]|Honeypot Azure_Sentinel|
|>|>|>|!2020.06.05|
|2020.06.05|IBM|![[New Open Source Security Tools Let You Develop on Encrypted Data|https://developer.ibm.com/blogs/new-open-source-security-tools-let-you-develop-on-encrypted-data/]] (site [[Fully Homomorphic Encryption|https://www.research.ibm.com/labs/uk/fhe.html]]) |Homomorphic_Encryption|
|2020.06.05|Security Week| → [[IBM Releases Open Source Toolkits for Processing Data While Encrypted|https://www.securityweek.com/ibm-releases-open-source-toolkits-processing-data-while-encrypted]]|Homomorphic_Encryption|
|2020.06.05|DevOps| → [[IBM Releases Fully Homomorphic Encryption Toolkit for MacOS and iOS; Linux and Android Coming Soon|https://devops.com/ibm-releases-fully-homomorphic-encryption-toolkit-for-macos-and-ios-linux-and-android-coming-soon/]]|Homomorphic_Encryption|
|2020.06.05|SecTechno|[[CloudSploit - Cloud Security Configuration Checks - SecTechno|https://sectechno.com/cloudsploit-cloud-security-configuration-checks/]]|Tools|
|2020.06.05|Medium - cloudyforensics|[[Introducing Cado Host - A free tool to collect forensic artefacts from compromised systems|https://medium.com/@cloudyforensics/introducing-cado-host-a-free-tool-to-collect-forensic-artefacts-from-compromised-systems-e2f93ff5a532]]|Tools|
|2020.06.05|Hakin9 Mag|[[Docker-OSX - Run Mac in a Docker container|https://hakin9.org/docker-osx-run-mac-in-a-docker-container/]]|Docker MacOS|
|2020.06.05|CBR Online|![[European Policy Paper: "We Want a Chinese Firewall Too"|https://www.cbronline.com/news/european-firewall-proposal]] |Europe Policy|
|2020.06.05|DevOps|[[NetApp Acquires Spot to Rein in Cloud Costs|https://devops.com/netapp-acquires-spot-to-rein-in-cloud-costs/]]|Acquisition|
|2020.06.06|Israel Valley[img[iCSF/flag_fr.png]]| → [[L’américain Netapp rachète la start-up israélienne Spot pour réduire la facture cloud.|https://www.israelvalley.com/2020/06/lamericain-netapp-rachete-la-start-up-israelienne-spot-pour-reduire-la-facture-cloud/]]|Acquisition|
|2020.06.05|//Akamai//|[[Innovation Driven by Operational Experience and Engineering Insight Deters NXNS Attacks|https://blogs.akamai.com/2020/06/innovation-driven-by-operational-experience-and-engineering-insight-deters-nxns-attacks.html]]|DNS_Attacks|
|2020.06.05|//IBM//, //Digital Ocean//, //Scaleway//|![[Kubernetes managed service|https://docs.google.com/spreadsheets/d/1RPpyDOLFmcgxMCpABDzrsBYWpPYCIBuvAoUQLwOGoQw/edit]] |Kubernetes Comparison|
|2020.06.05|//Microsoft Azure//|![[Customize cluster egress with a User-Defined Route|https://docs.microsoft.com/en-us/azure/aks/egress-outboundtype]] |Azure AKS|
|>|>|>|!2020.06.04|
|2020.06.04|Federal News Network|[[How the pandemic is a forcing function for the hybrid cloud evolution close|https://federalnewsnetwork.com/federal-insights/2020/06/how-the-pandemic-is-a-forcing-function-for-the-hybrid-cloud-evolution/]]|Hybrid_Cloud|
|2020.06.04|Security Week|[[SD-WAN Must Be Secure, Flexible, and Scale Across the Entire Enterprise|https://www.securityweek.com/sd-wan-must-be-secure-flexible-and-scale-across-entire-enterprise]]|SD-WAN|
|2020.06.04|Lastline|[[Lastline to be Acquired by VMware|https://www.lastline.com/blog/lastline-to-be-acquired-by-vmware/]]|Acquisition|
|2020.06.05|//Silicon.fr[img[iCSF/flag_fr.png]]//| → [[VMware acquiert Lastline, firme de sécurité réseau|https://www.silicon.fr/vmware-acquiert-lastline-340857.html]]|Acquisition|
|2020.06.04|MSSP Alert| → [[VMware Acquires Lastline Network Detection and Response|https://www.msspalert.com/investments/vmware-acquires-lastline-network-detection-and-response/]]|Acquisition|
|2020.06.05|Security Week| → [[VMware to Acquire Network Security Company Lastline|https://www.securityweek.com/vmware-acquire-network-security-company-lastline]]|Acquisition|
|2020.06.05|TechRadar Pro| → [[VMware snaps up network security firm Lastline|http://www.techradar.com/news/vmware-snaps-up-network-security-firm-lastline]]|Acquisition|
|2020.06.04|The Daily Swig|[[Kubernetes security flaw also earns bug bounty from Microsoft|https://portswigger.net/daily-swig/kubernetes-security-flaw-also-earns-bug-bounty-from-microsoft]]|Kubernetes Bug_Bounty|
|2020.06.04|DevOps|[[CloudBolt Acquires SovLabs to Advance Hybrid Cloud Strategy|https://devops.com/cloudbolt-acquires-sovlabs-to-advance-hybrid-cloud-strategy/]]|Acquisition|
|2020.06.04|BetaNews|[[Securing SaaS applications for a remote workforce|https://betanews.com/2020/06/04/saas-remote-work-security-qa/]]|SaaS Remote_Working|
|2020.06.04|//Security Intelligence//|[[How Zero Trust Will Change Your Security Design Approach|https://securityintelligence.com/posts/how-zero-trust-will-change-your-security-design-approach/]]|Zero_Trust|
|2020.06.04|//Padok//|[[Set up an SSH bastion on AWS with Terraform modules LOGO|https://www.padok.fr/en/blog/ssh-bastion-aws-terraform]]|AWS Bastion SSH|
|2020.06.04|//NeuVector//|[[How to Protect Secrets in Containers Using DPI and DLP|https://neuvector.com/cloud-security/protect-secrets-in-containers/]]|Containers Secrets_Management|
|2020.06.04|//Bit Defender//|[[Security Misconfigurations a Leading Cause of Cloud Data Breaches|https://businessinsights.bitdefender.com/security-misconfigurations-a-leading-cause-of-cloud-data-breaches]]|Misconfiguration|
|2020.06.04|//GitLab//|![[Privilege Escalation in Google Cloud Platform's OS Login|https://gitlab.com/gitlab-com/gl-security/gl-redteam/red-team-tech-notes/-/tree/master/oslogin-privesc-june-2020]] |GCP Vulnerability|
|>|>|>|!2020.06.03|
|2020.06.03|GAIA-X|![[GAIA-X - the European project kicks off the next phase |https://www.data-infrastructure.eu/GAIAX/Redaktion/EN/Publications/gaia-x-the-european-project-kicks-of-the-next-phase.html]] |GAIA-X Europe|
|2020.06.03|Les Echos[img[iCSF/flag_fr.png]]| → [[La France et l'Allemagne défendent un cloud souverain européen|https://www.lesechos.fr/tech-medias/hightech/le-cloud-europeen-franco-allemand-devoile-ses-services-numeriques-souverains-1208046]]|GAIA-X Europe|
|2020.06.03|NeoWin| → [[Gaia-X, Europe' competitor to Silicon Valley' cloud computing offerings, takes shape - Neowin|https://www.neowin.net/news/gaia-x-europes-competitor-to-silicon-valleys-cloud-computing-offerings-takes-shape]]|GAIA-X Europe|
|2020.06.04|//Silicon.fr[img[iCSF/flag_fr.png]]//| → [[GAIA-X ou la possibilité d'un Cloud franco-allemand|https://www.silicon.fr/gaia-x-ou-la-possibilite-dun-cloud-franco-allemand-340778.html]]|GAIA-X Europe|
|2020.06.04|//OVH Cloud//| → [[GAIA-X Catalogue search engine – under the hood |https://www.ovh.com/blog/gaia-x-catalogue-search-engine-under-the-hood/]]|GAIA-X Europe|
|2020.06.04|POLITICO| → [[Germany, France launch Gaia-X platform in bid for "tech sovereignty"|https://www.politico.eu/article/germany-france-gaia-x-cloud-platform-eu-tech-sovereignty/]]|GAIA-X Europe|
|2020.06.05|Informatique News[img[iCSF/flag_fr.png]]| → [[Gaia-X, la nouvelle initiative franco-allemande pour assurer une souveraineté sur les données européennes dans le cloud|https://www.informatiquenews.fr/gaia-x-la-nouvelle-initiative-franco-allemande-pour-assurer-une-souverainete-sur-les-donnees-europeennes-dans-le-cloud-70785]]|GAIA-X Europe|
|2020.06.05|EURACTIV| → [[Altmaier charts Gaia-X as the beginning of a "European data ecosystem"|https://www.euractiv.com/section/data-protection/news/altmaier-charts-gaia-x-as-the-beginning-of-a-european-data-ecosystem/]]|GAIA-X Europe|
|2020.06.05|Journal du Geek| → [[Qu’est-ce que Gaia-X, le soi-disant "cloud européen" ?|https://www.journaldugeek.com/2020/06/05/gaia-x-cloud-europeen-bonne-idee/]]||
|2020.06.05|CloudTweaks| → [[France, Germany back European cloud computing 'moonshot'|https://www.reuters.com/article/us-europe-tech/france-germany-back-european-cloud-computing-moonshot-idUSKBN23B26B]]|GAIA-X Europe|
|2020.06.05|Channel E2E| → [[Europe' Gaia-X Counters Amazon AWS, Microsoft Azure, Google Cloud|https://www.channele2e.com/channel-partners/csps/europes-gaia-x-counters-aws-azure-google-cloud/]]|GAIA-X Europe|
|2020.06.05|ZDnet| → [[Gaia-X : le couple franco-allemand officialise son projet de Cloud souverain européen|https://www.zdnet.fr/actualites/gaia-x-le-couple-franco-allemand-officialise-son-projet-de-cloud-souverain-europeen-39904699.htm]]|GAIA-X Europe|
|2020.06.06|The Register| → [[Franco-German cloud framework floated to protect European's data from foreign tech firms slurpage|https://www.theregister.com/2020/06/06/eu_gaiax_cloud/]]|GAIA-X Europe|
|2020.06.08|//Silicon.fr[img[iCSF/flag_fr.png]]//| → [[GAIA-X : le catalogue de services s'affiche en prototype|https://www.silicon.fr/gaia-x-catalogue-services-prototype-340879.html]]|GAIA-X Europe|
|2020.06.03|Bleeping Computer|[[Office 365 phishing baits remote workers with fake VPN configs|https://www.bleepingcomputer.com/news/security/office-365-phishing-baits-remote-workers-with-fake-vpn-configs/]]|O365 Phishing|
|2020.06.03|ZDnet|[[Zoom security: Here's how Germany got its wires crossed over video-chat privacy|https://www.zdnet.com/article/zoom-security-heres-how-germany-got-its-wires-crossed-over-video-chat-privacy/]]|Zoom|
|2020.06.03|Security Week|[[Zoom Not Offering End-to-End Encryption to Free Users to Help Law Enforcement|https://www.securityweek.com/zoom-not-offering-end-end-encryption-free-users-help-law-enforcement]]|Zoom Encryption|
|2020.06.03|CBR Online| → [[Zoom Wrestles Publicly with E2E Encryption Demons|https://www.cbronline.com/news/zoom-e2e-encryption]]|Zoom Encryption|
|2020.06.03|//Google Cloud//|[[Finding your GKE logs|https://cloud.google.com/blog/products/management-tools/finding-your-gke-logs]]|GCP Logging|
|2020.06.03|//Forcepoint//|[[3 Tips to Protect Data in a Multi-cloud Environment|https://www.forcepoint.com/blog/insights/3-tips-protect-multi-cloud]]|Multi_Cloud|
|2020.06.03|//Ermetic//|[[Ermetic Reports Nearly 80% of Companies Experienced a Cloud Data Breach in Past 18 Months|https://ermetic.com/whats-new/ermetic-reports-nearly-80-of-companies-experienced-a-cloud-data-breach-in-past-18-months/]]|Report Ermetic|
|2020.06.03|Container Journal| → [[Ermetic Reports Nearly 80% of Companies Experienced a Cloud Data Breach in Past 18 Months|https://containerjournal.com/news/news-releases/ermetic-reports-nearly-80-of-companies-experienced-a-cloud-data-breach-in-past-18-months/]]|Report Ermetic|
|2020.06.03|Solutions Review| → [[Ermetic: 4 in 5 Companies Experienced a Cloud Data Breach in the Past 18 Months|https://solutionsreview.com/cloud-platforms/ermetic-4-in-5-companies-experienced-a-cloud-data-breach-in-the-past-18-months/]]|Report Ermetic|
|2020.06.03|Help Net Security| → [[Most companies suffered a cloud data breach in the past 18 months|https://www.helpnetsecurity.com/2020/06/03/cloud-data-breach/]]|Report Ermetic|
|2020.06.03|BetaNews| → [[Almost 80 percent of companies have had a cloud data breach in the past 18 months|https://betanews.com/2020/06/03/companies-cloud-data-breach/]]|Report Ermetic|
|2020.05.06|Security Week| → [[Cloud Security Company Ermetic Emerges From Stealth Mode|https://www.securityweek.com/microsoft-investigating-github-account-hacking-claims]]|Report Ermetic|
|2020.06.03|//Imperva//|[[Is Your AWS Data Secure and Compliant? Cloud Database Visibility in Minutes|https://www.imperva.com/blog/is-your-aws-data-secure-and-compliant-cloud-database-visibility-in-minutes/]]|AWS Compliance|
|2020.06.03|//Securosis//|![[Data Security in the SaaS Age: Rethinking Data Security|https://securosis.com/blog/data-security-in-the-saas-age-rethinking-data-security]] (1/4) |SaaS|
|2020.06.03|//Security Intelligence//|[[It's Time to Take a Fresh Look at Zero Trust|https://securityintelligence.com/articles/its-time-to-take-a-fresh-look-at-zero-trust/]]|Zero_Trust|
|2020.06.03|//Amazon AWS//|[[Tighten S3 permissions for your IAM users and roles using access history of S3 actions|https://aws.amazon.com/about-aws/whats-new/2020/06/tighten-s3-permissions-iam-users-roles-access-history-s3-actions/]]|AWS S3 IAM|
|2020.06.03|//Amazon AWS//|[[AWS Systems Manager Explorer now adds support for a delegated administrator account to view operational data across multiple accounts and regions|https://aws.amazon.com/about-aws/whats-new/2020/06/aws-systems-manager-explorer-now-adds-support-for-a-delegated-administrator-account-to-view-operational-data-across-multiple-accounts-and-regions/]]|AWS Administration|
|>|>|>|!2020.06.02|
|2020.06.02|Medium - BreizhZeroDayHunters|[[When it's not only about a Kubernetes CVE…|https://medium.com/@BreizhZeroDayHunters/when-its-not-only-about-a-kubernetes-cve-8f6b448eafa8]]|CVE-2020–8555 Kubernetes|
|2020.06.02|BusinessWire|![[Second Annual |DevOps Survey Reveals 70% of Engineering Teams Choose Application Quality Over Software Delivery Speed|https://www.businesswire.com/news/home/20200602005310/en/Annual-DevOps-Survey-Reveals-70-Engineering-Teams]] |Survey Quality|
|2020.06.02|//OverOps//| → [[State of Software Quality Report] How Organizations are Addressing the Speed vs. Quality Challenge in 2020|https://blog.overops.com/survey-2020-the-state-of-software-quality/]]|Survey Quality|
|2020.06.02|DevOps| → [[Who’s Responsible for Security? Apparently, It Depends|https://devops.com/whos-responsible-for-security-apparently-it-depends/]]|Surey|
|2020.06.02|DevOps| → [[Survey Surfaces Tension Between Software Speed and Quality|https://devops.com/survey-surfaces-tension-between-software-speed-quality/]]|Survey Quality|
|2020.06.02|Container Journal|[[Container Orchestration: Avoiding Errors and Misconfigurations|https://containerjournal.com/topics/container-management/container-orchestration-avoiding-errors-and-misconfigurations/]]|ocntainers Misconfiguration:|
|2020.06.02|//Pivot Point Security//|[[Concerned about the security of your Cloud Services? Demand CREST|https://www.pivotpointsecurity.com/blog/concerned-about-the-security-of-your-cloud-services-demand-crest/]]|Assessment|
|2020.06.02|//Intezer//|[[Intezer - Building a Robust App Control Strategy for your Cloud Workloads|https://www.intezer.com/blog/cloud-security/building-a-robust-app-control-strategy-for-your-cloud-workloads/]]|Workloads|
|2020.06.02|//IBM//|[[End of Service Announcement for Virtual Servers for VPC on POWER|https://www.ibm.com/cloud/blog/announcements/end-of-service-announcement-for-virtual-servers-for-vpc-on-power]]|IBM_Cloud Power|
|2020.06.04|The Register| → [[IBM to power down Power-powered virtual private cloud, GPU-accelerated options|https://www.theregister.com/2020/06/04/ibm_vpc_power_shutdown_notice/]]|IBM_Cloud Power|
|2020.06.02|//Exabeam//|[[Kubernetes Security Monitoring: How to Gain Visibility and Prevent Breaches|https://www.exabeam.com/information-security/kubernetes-security-monitoring/]]|Kubernetes Monitoring|
|>|>|>|!2020.06.01|
|2020.06.01|Le Monde Informatique[img[iCSF/flag_fr.png]]|[[Les services cloud de collaboration explosent, les attaques aussi|https://www.lemondeinformatique.fr/actualites/lire-les-services-cloud-de-collaboration-explosent-les-attaques-aussi-79230.html]]|Report McAfee|
|2020.06.01|Dark Reading|[[Strengthening Secure Information Sharing Through Technology & Standards|https://www.darkreading.com/threat-intelligence/strengthening-secure-information-sharing-through-technology-and-standards/a/d-id/1337963]]|Information_Sharing|
|2020.06.01|Bleeping Computer|[[Joomla data breach leaks 2,700 user records via exposed backups|https://www.bleepingcomputer.com/news/security/joomla-data-breach-leaks-2-700-user-records-via-exposed-backups/]]|Joomla dataLeak AWS|
|2020.06.03|//Threatpost//| → [[Joomla Resources Directory Users Exposed in Leaky AWS Bucket|https://threatpost.com/joomla-resources-directory-exposed-aws-bucket/156231/]]|AWS Bucket Data_Leak|
|2020.06.01|//Google Cloud//|![[Nouvelle région cloud en France|https://www.linkedin.com/posts/google-cloud_google-cloud-entend-soutenir-la-croissance-activity-6671666435900612608-cpke/]] |GCP France|
|2020.06.01|//Amazon AWS//|![[How to perform automated incident response in a multi-account environment|https://aws.amazon.com/blogs/security/how-to-perform-automated-incident-response-multi-account-environment/]] |Incident Response|
|>|>|>|!|
|>|>|>|2020.05.27 (suite)|
|2020.05.27|Kubernetes|[[IPv4 only clusters susceptible to MitM attacks via IPv6 rogue router advertisements #91507|https://github.com/kubernetes/kubernetes/issues/91507]]|CVE-2020-10749 Kubernetes|
|2020.06.02|CBR Online| → [[Kubernetes Bug Leaves Default Clusters Vulnerable to Man-in-the-Middle Attacks|https://www.cbronline.com/news/kubernetes-bug]]|CVE-2020-10749 Kubernetes|
|2020.06.03|//Alcide//| → [[New Kubernetes Man-In-The-Middle (MiTM) Attack Leverages IPv6 Router Advertisements|https://blog.alcide.io/new-kubernetes-man-in-the-middle-mitm-attack-leverage-ipv6-router-advertisements]]|CVE-2020-10749 Kubernetes|
|2020.06.05|//StackRox//| → [[Mitigating CVE-2020-10749 in Kubernetes Environments|https://www.stackrox.com/post/2020/06/mitigating-kubernetes-cve-2020-10749/]]|CVE-2020-10749 Kubernetes|
|>|>|>|2020.05.19 (suite)|
|2020.05.19|//VMware//|[[VMSA-2020-0010: VMware Cloud Director updates address Code Injection Vulnerability (CVE-2020-3956)|https://www.vmware.com/security/advisories/VMSA-2020-0010.html]]|CVE-2020-3956|
|2020.06.04|GB Hackers on Security| → [[A Bug VMware Cloud Director Let Hackers Compromise Corporate Servers|https://gbhackers.com/critical-vmware-cloud-director-bug/]]|CVE-2020-3956 VMware|
|2020.06.03|//Sophos//| → [[VMware flaw allows takeover of multiple private clouds|https://nakedsecurity.sophos.com/2020/06/03/vmware-flaw-allows-takeover-of-multiple-private-clouds/]]|CVE-2020-3956 VMware|
|2020.06.02|Help Net Security| → [[VMware Cloud Director vulnerability enables a full cloud infrastructure takeover|https://www.helpnetsecurity.com/2020/06/02/cve-2020-3956/]]|CVE-2020-3956 VMware|
|2020.06.02|Security Week| → [[VMware Cloud Director Vulnerability Has Major Impact for Cloud Providers|https://www.securityweek.com/vmware-cloud-director-vulnerability-has-major-impact-cloud-providers]]|CVE-2020-3956 VMware|
!//GAIA-X: A Federated Data Infrastructure for Europe//
[>img(50px,auto)[iCSF/GAIA-X.gif]]Le soutien des ministres de l’Économie de la France et de l’Allemagne, respectivement Bruno Lemaire et Peter Altmaier, a été approté au projet GAIA-X lors d'une conférence de presse le jeudi 4 juin 2020.
Avec GAIA-X, il s'agit de créer une infrastructure de données pour supporter un écosystème européen vital.
Voici la présentation succincte du projet GAIA-X telle que publiée sur son site+++*[»]> https://www.data-infrastructure.eu/GAIAX/Redaktion/EN/FAQ/faq-projekt-gaia-x-01.html === (et traduite par nos soins) :
<<<
//Le projet GAIA-X se caractérise par les éléments fondamentaux suivants :[>img(500px,auto)[iCSF/GAIA-X-Arch.jpg]]
* Nous voulons créer la prochaine génération d'infrastructures de données pour l'Europe, ses États, ses entreprises et ses citoyens.
* Cette infrastructure doit répondre aux normes les plus élevées en termes de souveraineté numérique et de promotion de l'innovation. Nous considérons cette infrastructure comme le berceau d'un écosystème, où les données et les services peuvent être mis à disposition, collectés et partagés dans un environnement de confiance.
* Le concept se concentre sur les besoins précis des utilisateurs et sur le bénéfice supplémentaire comme le montrent les cas d'usage.
* Les concepts existants doivent être compris comme une proposition à l'Europe, tels que nous les avons développés avec nos partenaires français. Nous poursuivons cette voie également avec d'autres partenaires européens et en accord avec la Commission européenne.
* Notre objectif est d'établir un cadre plus solide pour cette initiative en 2020 et de lancer quelques premiers cas d'usage d'ici la fin 2020.
//
<<<
A ce jour plusieurs documents ont été publiés en octobre 2019 et en ce mois de juin 2020.Leur lecture est conseillée ''pour savoir réellement de quoi on parle'', et notamment identifier parmi tous les articles publiés, ceux qui recopient bêtement (et sont malheuresement repris), et ceux qui ont vraiment réfléchi au sujet.
Un fil de discussion dédiéa été ouvert sur la communauté ''Chapter France'' de la plateforme [[Circle]]. 

Vous trouverez ci-dessous les documents les plus importants, en prévenant toutefois que ce corpus documentaire risque d'en décevoir certains :
* il est volumineux (plus de 250 pages) mais semble complet et solide (//à l'heure de la rédaction de cet article, nous n'en avons pas fini la lecture complète//)
* il a été principalement rédigés par des universitaires et des chercheurs allemands, dont les préoccupations semblent parfois un peu éloignées des attentes et des besoins des entreperises

Liens :
* Page d'accueil du projet GAIA-X ⇒ [[HTML|https://www.data-infrastructure.eu/GAIAX/Navigation/EN/Home/home.html]]
* Foire aux Questions sur le projet GAIA-X+++*[»] 
Lien ⇒ [[HTML|https://www.data-infrastructure.eu/GAIAX/Redaktion/EN/FAQ/faq-projekt-gaia-x.html]]
* 1. What is the GAIA-X project?
* 2. Why do we need GAIA-X? What is the added benefit?
* 3. What are the key elements? Are you building another hyperscaler, that will compete against existing market offerings?
* 4. What will be Germany’s role?
* 5. What are the next steps?
* 6. Who can join the project in future and how can interested companies and organisations get involved?
* 7. How and using which procedure were the current project partners selected?
* 8. Who is involved in the project?
* 9. Is the project open for international cloud providers?
* 10. How will other European countries be involved in GAIA-X?
* 11. How will the submitted use cases be financially supported with regard to development and implementation?
* 12. Does GAIA-X currently have any users?
* 13. How are users and providers involved in the development of GAIA-X and how can they contribute their requirements for a European data infrastructure?
* 14. What is intended fort he technical conception?
* 15. Who can be contacted in case of question about GAIA-X?
* 16. What advantages does GAIA-X offer for SMEs?
* 17. What does GAIA-X have to be able to do from the user's perspective?
* 18. What does the architecture look like?
* 19. What is the purpose or task of the entity?
=== ⇒ [[HTML|https://www.data-infrastructure.eu/GAIAX/Redaktion/EN/FAQ/faq-projekt-gaia-x.html]]
* "Publication: Franco-German Position on GAIA-X" ⇒ [[PDF|https://www.data-infrastructure.eu/GAIAX/Redaktion/EN/Downloads/franco-german-position-on-gaia-x.pdf?__blob=publicationFile&v=2]]
* "Le projet GAIA-X" - "Une infrastructure de données en forme de réseau, berceau d’un écosystème européen vital" [img[iCSF/flag_fr.png]] ⇒ [[HTML|https://www.data-infrastructure.eu/GAIAX/Redaktion/EN/Publications/das-projekt-gaia-x-french.html]] [[PDF|https://www.data-infrastructure.eu/GAIAX/Redaktion/EN/Publications/das-projekt-gaia-x-french.pdf?__blob=publicationFile&v=2]]
* Project GAIA-X "A Federated Data Infrastructure as the Cradle of a Vibrant European Ecosystem" (octobre 2019) ⇒ [[HTML|https://www.data-infrastructure.eu/GAIAX/Redaktion/EN/Publications/project-gaia-x.html]] et [[PDF|https://www.data-infrastructure.eu/GAIAX/Redaktion/EN/Publications/project-gaia-x.pdf?__blob=publicationFile&v=4]]
* "Le projet GAIA-X" - Synthèse ⇒ [img[iCSF/flag_fr.png]] [[HTML|https://www.data-infrastructure.eu/GAIAX/Redaktion/EN/Publications/le-projet-gaia-x-sommaire-de-gestion.html]] et [[PDF|https://www.data-infrastructure.eu/GAIAX/Redaktion/EN/Publications/le-projet-gaia-x-sommaire-de-gestion.pdf?__blob=publicationFile&v=3]]
* "GAIA-X - the European project kicks off the next phase" (juin 2020) ⇒ [[HTML|https://www.data-infrastructure.eu/GAIAX/Redaktion/EN/Publications/gaia-x-the-european-project-kicks-of-the-next-phase.html]] et [[PDF|https://www.data-infrastructure.eu/GAIAX/Redaktion/EN/Publications/gaia-x-the-european-project-kicks-of-the-next-phase.pdf?__blob=publicationFile&v=5]]
* "GAIA-X: A Pitch Towards Europe" - "Status Report on User Ecosystems and Requirements" ⇒ [[HTML|https://www.data-infrastructure.eu/GAIAX/Redaktion/EN/Publications/gaia-x-a-pitch-towards-europe.html]] et [[PDF|https://www.data-infrastructure.eu/GAIAX/Redaktion/EN/Publications/gaia-x-a-pitch-towards-europe.pdf?__blob=publicationFile&v=4]]
* "GAIA-X: Technical Architecture" (juin 2020) ⇒ [[HTML|https://www.data-infrastructure.eu/GAIAX/Redaktion/EN/Publications/gaia-x-technical-architecture.html]] et [[PDF|https://www.data-infrastructure.eu/GAIAX/Redaktion/EN/Publications/gaia-x-technical-architecture.pdf?__blob=publicationFile&v=3]]
* "GAIA-X: Driver of digital innovation in Europe" - "Featuring the next generation of data infrastructure" (juin 2020) ⇒ [[HTML|https://www.data-infrastructure.eu/GAIAX/Redaktion/EN/Publications/gaia-x-driver-of-digital-innovation-in-europe.html]] et [[PDF|https://www.data-infrastructure.eu/GAIAX/Redaktion/EN/Publications/gaia-x-driver-of-digital-innovation-in-europe.pdf?__blob=publicationFile&v=6]]
* "GAIA-X: Policy Rules and Architecture of Standards " (juin 2020) ⇒ [[HTML|https://www.data-infrastructure.eu/GAIAX/Redaktion/EN/Publications/gaia-x-policy-rules-and-architecture-of-standards.html]] et [[PDF|https://www.data-infrastructure.eu/GAIAX/Redaktion/EN/Publications/gaia-x-policy-rules-and-architecture-of-standards.pdf?__blob=publicationFile&v=2]]

[img[iCSF/flag_fr.png]]oc[img(50%,1px)[iCSF/BluePixel.gif]]
!Actualités, Blog, Publications et Veille "Sécurité du Cloud"
<<tiddler fAll2LiTabs13end with: 202005>>
<<tiddler fAll2Tabs10 with: VeilleM","_202005>>
Aucune alerte notable en Mai 2020.
[img(25%,1px)[iCSF/BluePixel.gif]]
<<tiddler .ReplaceTiddlerTitle with: [[Alertes et Vulnérabilités - Mai 2020]]>>
<<tiddler fAll2LiTabs10 with: NewsL","202005>><<tiddler .ReplaceTiddlerTitle with: [[Newsletters - Mai 2020]]>>
<<tiddler .ReplaceTiddlerTitle with: [[Actualités - Mai 2020]]>><<tiddler fAll2LiTabs13end with: 'Actu","202005'>>
<<tiddler fAll2LiTabs13end with: 'Blog","202005'>>
[img(25%,1px)[iCSF/BluePixel.gif]]
<<tiddler .ReplaceTiddlerTitle with: [[Blog - Mai 2020]]>>
<<tiddler fAll2LiTabs13end with: 'Publ","202005'>>
[img(25%,1px)[iCSF/BluePixel.gif]]
<<tiddler .ReplaceTiddlerTitle with: [[Publications - Mai 2020]]>>
!"//Cloud Security Alliance Announces Phoenix One as Authorized CCSK Training Partner in the Philippines//"
^^Communiqué de presse de la CSA du 28 mai 2020.
* Lien ⇒ https://cloudsecurityalliance.org/press-releases/2020/05/28/cloud-security-alliance-announces-phoenix-one-as-authorized-ccsk-training-partner-in-the-philippines/
^^[img(25%,1px)[iCSF/BluePixel.gif]]
!"//Application Containers and Microservices Working Group Charter//"
^^Appel à commentaires publié le 26 mai mai 2020 sur le site de la CSA. La date limite est fixée au 26 juin.
* Lien ⇒ https://cloudsecurityalliance.org/artifacts/application-containers-and-microservices-working-group-charter/ /% ''[[CloudSecurityAlliance.fr/go/k5qr/|https://CloudSecurityAlliance.fr/go/k5qr/]]'' %/^^
[img(25%,1px)[iCSF/BluePixel.gif]]
!"//Pen Testing in the Age of Cloud//"
[>img(100px,auto)[iCSA/K5QBP.png]]^^Article publié le 26 mai 2020 sur le blog de la CSA, après l'avoir été le 19 mai 2020 sur le site de Fugue
__Liens :__
* Blog CSA ⇒ https://cloudsecurityalliance.org/articles/pen-testing-in-the-age-of-cloud/ /% ''[[CloudSecurityAlliance.fr/go/k5qx/|https://CloudSecurityAlliance.fr/go/k5qx/]]'' %/
* Site Fugue ⇒ https://www.fugue.co/blog/pen-testing-in-the-age-of-cloud /% ''[[CloudSecurityAlliance.fr/go/k5qz/|https://CloudSecurityAlliance.fr/go/k5qz/]]'' %/
[img(25%,1px)[iCSF/BluePixel.gif]]
!"//Cloud Security Alliance Announces ACinfotec as Authorized CCSK Training Partner in Thailand//"
^^Communiqué de presse de la CSA du 20 mai 2020.
* Lien ⇒ https://cloudsecurityalliance.org/articles/cloud-security-alliance-announces-acinfotec-as-authorized-ccsk-training-partner-in-thailand/
^^[img(25%,1px)[iCSF/BluePixel.gif]]
!"//The road to the cloud - The story of public versus private//"
[>img(150px,auto)[iCSA/K5EBT.png]]^^Article publié le 14 mai 2020 sur le site de la CSA. après l'avoir été ''4,5 mois'' auparavent (record battu !), le 2 décembre 2019 sur le site LinkedIN.
Son auteur est le Dr. Wendy Ng+++*[»]> https://www.linkedin.com/in/wendyng1/ ===, DevSecOps Security Advisor chez Experian
__Liens :__
* Site CSA ⇒ https://cloudsecurityalliance.org/blog/2020/05/14/the-road-to-the-cloud-the-story-of-public-versus-private/ /% ''[[CloudSecurityAlliance.fr/go/k5ex/|https://CloudSecurityAlliance.fr/go/k5ex/]]'' %/
* Site LinkedIN ⇒ https://www.linkedin.com/pulse/road-cloud-story-public-versus-private-dr-wendy-ng-cissp/ /% ''[[CloudSecurityAlliance.fr/go/k57z/|https://CloudSecurityAlliance.fr/go/k57z/]]'' %/
^^[img(25%,1px)[iCSF/BluePixel.gif]]
!"//Cloud Security Alliance and Asia Cybersecurity Exchange Renew Memorandum of Intent//"
^^Communiqué de presse CSA du 13 mai 2020.
Lien ⇒ https://cloudsecurityalliance.org/articles/cloud-security-alliance-and-asia-cybersecurity-exchange-renew-memorandum-of-intent/
^^[img(25%,1px)[iCSF/BluePixel.gif]]
!"//Cloud Security Alliance Announces Cyberstrat IT Consulting as the Newest Authorized CCSK Training Partner//"
^^Communiqué de presse de la CSA du 12 mai 2020.
* Lien ⇒ https://cloudsecurityalliance.org/articles/cloud-security-alliance-announces-cyberstrat-it-consulting-as-the-newest-authorized-ccsk-training-partner/
^^[img(25%,1px)[iCSF/BluePixel.gif]]
!"//Cloud Security Alliance Partners with Singapore IT Industry in Initiative to Support Continuous Education//"
^^Communiqué de presse de la CSA du 11 mai 2020.
* Lien ⇒ https://cloudsecurityalliance.org/articles/cloud-security-alliance-partners-with-singapore-it-industry-in-initiative-to-support-continuous-education/
^^[img(25%,1px)[iCSF/BluePixel.gif]]
!"//Mobile-Connect Controls for Secure Remote Working//"
[>img(150px,auto)[iCSA/K5CBM.jpg]]^^Article publié le 12 mai 2020 sur le blog de la CSA, après l'avoir été le 28 avril 2020 sur le site de CipherCloud
__Liens :__
* Blog CSA ⇒ ''[[CloudSecurityAlliance.fr/go/k5cx/|https://CloudSecurityAlliance.fr/go/k5cx/]]''
* Site CipherCloud ⇒ ''[[CloudSecurityAlliance.fr/go/k5cz/|https://CloudSecurityAlliance.fr/go/k5cz/]]''
^^[img(25%,1px)[iCSF/BluePixel.gif]]
!"//Cloud Security Alliance Partners with Singapore Government IT Agency in National Support Initiative//"
^^Communiqué de presse CSA du 8 mai 2020.
> //The Cloud Security Alliance //[...]// announced the 'CSA National Support Initiative', under which it has partnered with a government IT agency in Singapore to provide 50 complimentary Certificate of Cloud Security Knowledge (CCSK) Learning Management System (LMS) licenses. The partnership will allow IT professionals to continue with their learning during the COVID-19 period.//
* Site CSA ⇒ ''[[CloudSecurityAlliance.fr/go/k58p/|https://CloudSecurityAlliance.fr/go/k58p/]]''
^^[img(25%,1px)[iCSF/BluePixel.gif]]
!"//Why is Cloud DLP the most important technology for SaaS apps?//"
^^Article publié le 7 mai 2020 sur le site de la CSA. après l'avoir été le 23 avril sur le site de CipherCloud.
__Liens :__
* Site CSA ⇒ ''[[CloudSecurityAlliance.fr/go/k57x/|https://CloudSecurityAlliance.fr/go/k57x/]]''
* Site CipherCloud ⇒ ''[[CloudSecurityAlliance.fr/go/k57z/|https://CloudSecurityAlliance.fr/go/k57z/]]''
^^[img(25%,1px)[iCSF/BluePixel.gif]]
!"//The State of Cloud Security 2020 Report: Understanding Misconfiguration Risk//"
^^Article publié le 5 mai 2020, après l'avoir été le 23 avril sur le site de la socuiété Fugue.
* Lien ⇒ ''[[CloudSecurityAlliance.fr/go/k51r/|https://CloudSecurityAlliance.fr/go/k51r/]]'' ^^
[img(25%,1px)[iCSF/BluePixel.gif]]
!"//Financial Services Stakeholders Platform Working Group Charter//"
^^Appel à commentaires publié le 1er mai 2020 sur le site de la CSA. La date limite est fixée au 17 mai.
* Lien ⇒ ''[[CloudSecurityAlliance.fr/go/k51r/|https://CloudSecurityAlliance.fr/go/k51r/]]'' ^^
[img(25%,1px)[iCSF/BluePixel.gif]]
|[img(30px,auto)[iCSF/Francais.gif]] @@color:#00F;font-size:125%;__[[Version française|2020.05.31 - Newsletter Hebdomadaire - #66]]__@@ |[img(30px,auto)[iCSF/Anglais.gif]] @@color:#00F;font-size:125%;__[[English version|2020.05.31 - Weekly Newsletter - #66]]__@@ |
|<<tiddler [[2020.05.31 - Newsletter Hebdomadaire - #66]]>> |<<tiddler [[2020.05.31 - Weekly Newsletter - #66]]>> |
!Newsletter Hebdomadaire Cloud et Sécurité - semaine du 25 au 31 mai 2020
!!1 - Nouveautés CSA et Informations - 25 au 31 mai 2020
* Podcast : 'CSA STAR + SOC2 - From Readiness to Attestation'+++*[»]> <<tiddler [[2020.05.26 - Podcast : 'CSA STAR + SOC2 - From Readiness to Attestation']]>>=== 
* Blog : Applications d'aujourd'hui et cybersécurité dans le Cloud+++*[»]> <<tiddler [[2020.05.27 - Blog : Applications d'aujourd'hui et cybersécurité dans le Cloud]]>>=== 
* Publication : 'Software Defined Perimeter (SDP) and Zero Trust'+++*[»]> <<tiddler [[2020.05.27 - Publication : 'Software Defined Perimeter (SDP) and Zero Trust']]>>=== 
* Appels à commentaires CSA sur le document 'Mobile Application Security Testing - Sum-Up & Landscape Overview'+++*[»]> <<tiddler [[2020.05.08 - Appel à commentaires : 'Mobile Application Security Testing - Sum-Up & Landscape Overview']]>>=== (8 juin)
!!2 - Veille Web Cloud et Sécurité
La [[Veille Web|2020.05.31 - Veille Hebdomadaire - 31 mai]] avec plus de 70 liens
* Rapports à lire
** ''AWS Shield Threat Landscape''+++*[»] 
|2020.05.29|//AWS//|![[AWS Shield Threat Landscape report is now available|https://aws.amazon.com/blogs/security/aws-shield-threat-landscape-report-now-available/]] ([[rapport|https://aws-shield-tlr.s3.amazonaws.com/2020-Q1_AWS_Shield_TLR.pdf]])|Report AWS|
=== 
** ''McAfee Cloud Adoption & Risk Report''+++*[»] 
|2020.05.27|//McAfee//|![[Cloud Adoption & Risk Report|https://www.mcafee.com/enterprise/en-us/forms/gated-form.html]]|Report McAfee|
|2020.05.28|The Daily Swig|[[Cloud-based cyber-attacks flaring up during coronavirus pandemic|https://portswigger.net/daily-swig/cloud-based-cyber-attacks-flaring-up-during-coronavirus-pandemic]]|Attacks|
|2020.05.28|Help Net Security| → [[External attacks on cloud accounts grew 630 percent from January to April|https://www.helpnetsecurity.com/2020/05/28/external-attacks-on-cloud-accounts/]]|Report McAfee|
=== 
** ''Australian Strategic Policy Institute''+++*[»] 
|2020.05.27|ASPI|![[National security agencies and the cloud: An urgent capability issue for Australia|https://www.aspi.org.au/report/national-security-agencies-and-cloud-urgent-capability-issue-australia]] ([[rapport|https://s3-ap-southeast-2.amazonaws.com/ad-aspi/2020-05/SR%20156%20National%20security%20agencies%20and%20the%20cloud.pdf]])|Report Australia|
=== 
* Attaques et pannes
** Phishing AWS+++*[»] 
|2020.05.27|//Abnormal Security//|[[Abnormal Attack Stories: AWS Phishing|https://abnormalsecurity.com/blog/abnormal-attack-stories-aws-phishing/]]|AWS Phishing|
|2020.05.28|ZDNet| → [[Phishing attack impersonates Amazon Web Services to steal user credentials|https://www.techrepublic.com/article/phishing-attack-impersonates-amazon-web-services-to-steal-user-credentials/]]|AWS Phishing|
|2020.05.30|HackRead| → [[New AWS phishing scam steals credentials via fake AWS notification|https://www.hackread.com/aws-phishing-scam-steals-aws-credentials-fake-notification/]]|Phishing AWS|
===, et attaque de clients Cloud de NTT au Japon+++*[»] 
|2020.05.29|The Register|[[NTT warns its Singapore cloud was hacked, Japanese customer data compromised|https://www.theregister.com/2020/05/29/ntt_hacked_customer_breach/]]|Compromise|
=== 
** Panne Adobe Cloud+++*[»]>
|2020.05.27|The Register|[[Photostopped: Adobe Cloud evaporates in mass outage. Hope none of you are on a deadline, eh?|https://www.theregister.com/2020/05/27/adobe_cloud_outage/]]|Outage Adobe|
=== 
* Analyses techniques
** Active Directory via AzureAD+++*[»] 
|2020.05.27|Active Directory Security|![[From Azure AD to Active Directory (via Azure) – An Unanticipated Attack Path|https://adsecurity.org/?p=4277]]|AzureAD Attacks|
|2020.05.28|//Trimarc//| → [[Webcast: Securing Office 365 and Azure AD Defend Your Tenant|https://www.hub.trimarcsecurity.com/post/webcast-securing-office-365-and-azure-ad-defend-your-tenant]]|O365 AzureAD Tenant|
=== 
** Pièces jointes dans Office 365+++*[»] 
|2020.05.31|Bleeping Computer|[[Office 365 to give detailed info on malicious email attachments|https://www.bleepingcomputer.com/news/security/office-365-to-give-detailed-info-on-malicious-email-attachments/]]|O365 Attacks|
=== 
* Rapports et études
** Fortinet sur le manque de comptences Cloud et Sécurité+++*[»] 
|2020.05.27|//Fortinet//|[[Fortinet Survey Uncovers Critical Insights for Addressing the Growing Skills Gap|https://www.fortinet.com/blog/industry-trends/fortinet-uncovers-critical-insights-to-address-cyber-skills-gap.html]] ([[rapport|https://www.fortinet.com/content/dam/maindam/PUBLIC/02_MARKETING/08_Report/report-fortinet-survey-skills-shortage.pdf]])|Skills|
|2020.05.27|Dark Reading| → [[Cloud Security Architect Proves Hardest Infosec Role to Fill|https://www.darkreading.com/cloud/cloud-security-architect-proves-hardest-infosec-role-to-fill/d/d-id/1337925]]|Skills|
=== 
* Acquisitions
** ThousandEyes par Cisco+++*[»] 
|2020.05.28|//ThousandEyes//|[[ThousandEyes + Cisco = A Thousand Times ThousandEyes|https://blog.thousandeyes.com/cisco-announces-intent-to-acquire-thousandeyes/]]|Acquisitions|
|2020.05.28|SecurityWeek| → [[Cisco to Buy Network Intelligence Firm ThousandEyes|https://www.securityweek.com/cisco-buy-network-intelligence-firm-thousandeyes]]|Acquisitions|
|2020.05.28|Silicon Angle| → [[Cisco to acquire network intelligence startup ThousandEyes for reported $1B|https://siliconangle.com/2020/05/28/cisco-to-acquire-network-intelligence-startup-thousandeyes-reported-1b/]]|Acquisitions|
=== 
** Edgewise par Zscaler+++*[»] 
|2020.05.28|Silicon Angle|[[Zscaler buys security startup Edgewise as it beats earnings estimates|https://siliconangle.com/2020/05/28/zscaler-buys-security-startup-edgewise-beats-earnings-estimates/]]|Acquisition|
=== 
* Divers
** Annonce d'une nouvelle région Google en France en 2022+++*[»] 
|2020.05.28|Silicon.fr[img[iCSF/flag_fr.png]]|![[Google Cloud annonce une « région » France pour 2022|https://www.silicon.fr/google-cloud-annonce-une-region-france-pour-2022-340430.html]]|GCP France|
|2020.05.28|Le Mag IT[img[iCSF/flag_fr.png]]| → [[Google se donne un an et demi pour mettre son cloud en France|https://www.lemagit.fr/actualites/252483826/Google-se-donne-encore-un-an-et-demi-pour-mettre-son-cloud-en-France]]|GCP France|
|2020.05.28|DataCenter Magazine[img[iCSF/flag_fr.png]]| → [[Google Cloud ouvrira une nouvelle région en France|https://datacenter-magazine.fr/google-cloud-ouvrira-une-nouvelle-region-en-france/]]|GCP France|
|2020.05.28|Journal du Net[img[iCSF/flag_fr.png]]|[[Cloud : les pièges du stockage hybride|https://www.journaldunet.com/web-tech/cloud/1491703-les-pieges-du-stockage-hybride/]]|Storage|
=== 
** Containers+++*[»] 
|2020.05.29|Container Journal|[[Gartner’s 6 Best Practices for Containers, Kubernetes|https://containerjournal.com/topics/container-ecosystems/gartners-6-best-practices-for-containers-kubernetes/]]|Containers Kubernetes Best_Practices|
|2020.05.27|//CyberArk Conjur//|[[Top 4 Open Source Tools for Observability of Containers and Microservices|https://www.conjur.org/blog/top-4-open-source-tools-for-observability-of-containers-and-microservices/]]|Containers Micro_Services|
|2020.05.26|//Palo Alto Networks//|[[Rootless Containers: The Next Trend in Container Security|https://unit42.paloaltonetworks.com/rootless-containers-the-next-trend-in-container-security/]]|Containers|
=== 
** SDP+++*[»] 
|2020.05.29|Help Net Security|[[Why is SDP the most effective architecture for zero trust strategy adoption?|https://www.helpnetsecurity.com/2020/05/29/sdp-zero-trust/]]|SDP Zero_Tust|
=== 
** Outils forensique+++*[»] 
|2020.05.29|//Cado Security//|![[Introducing Cado Live - A Free Forensic Imaging Tool for the Cloud|https://medium.com/@cloudyforensics/introducing-cado-live-a-free-forensic-imaging-tool-for-the-cloud-5716c81d4093]] ([[vidéo|https://www.youtube.com/watch?v=9QPU6us8X_g]])|Forensics Tools|
|2020.05.29|//Cado Security//| → [[Cado Live|https://www.cadosecurity.com/community/cado-live/]]|Forensics Tools|
=== 
!!3 - Agenda
* 9 au 12 juin : visio-conférences CSA '''Virtual EU Summit'''
* 15 au 17 juin : formation ''CCSK en français'' (les inscriptions sont ouvertes)

|ssTabl96|k
|!⇒ [[CloudSecurityAlliance.fr/go/K5V/|https://CloudSecurityAlliance.fr/go/K5V/]] |
!Weekly Cloud and Security Watch Newsletter - May 25th to 31st, 2020[>img[iCSF/inEnglish.png]]
!!1 - CSA News and Updates - May 25th to 31st, 2020
* Podcast: 'CSA STAR + SOC2 - From Readiness to Attestation'+++*[»]> <<tiddler [[2020.05.26 - Podcast : 'CSA STAR + SOC2 - From Readiness to Attestation']]>>=== 
* Blog: 'Cloud Cybersecurity and the Modern Applications' (3 parts)+++*[»]> <<tiddler [[2020.05.27 - Blog : Applications d'aujourd'hui et cybersécurité dans le Cloud]]>>=== 
* Publication: 'Software Defined Perimeter (SDP) and Zero Trust'+++*[»]> <<tiddler [[2020.05.27 - Publication : 'Software Defined Perimeter (SDP) and Zero Trust']]>>=== 
* Call for comments: CSA document 'Mobile Application Security Testing - Sum-Up & Landscape Overview'+++*[»]> <<tiddler [[2020.05.08 - Appel à commentaires : 'Mobile Application Security Testing - Sum-Up & Landscape Overview']]>>=== (June 8th)
!!2 - Cloud and Security News Watch
[[Over 60 links|2020.05.31 - Veille Hebdomadaire - 31 mai]]
* Must read reports:
** ''AWS Shield Threat Landscape''+++*[»] 
|2020.05.29|//AWS//|![[AWS Shield Threat Landscape report is now available|https://aws.amazon.com/blogs/security/aws-shield-threat-landscape-report-now-available/]] ([[rapport|https://aws-shield-tlr.s3.amazonaws.com/2020-Q1_AWS_Shield_TLR.pdf]])|Report AWS|
=== 
** ''McAfee Cloud Adoption & Risk Report''+++*[»] 
|2020.05.27|//McAfee//|![[Cloud Adoption & Risk Report|https://www.mcafee.com/enterprise/en-us/forms/gated-form.html]]|Report McAfee|
|2020.05.28|The Daily Swig|[[Cloud-based cyber-attacks flaring up during coronavirus pandemic|https://portswigger.net/daily-swig/cloud-based-cyber-attacks-flaring-up-during-coronavirus-pandemic]]|Attacks|
|2020.05.28|Help Net Security| → [[External attacks on cloud accounts grew 630 percent from January to April|https://www.helpnetsecurity.com/2020/05/28/external-attacks-on-cloud-accounts/]]|Report McAfee|
=== 
** Australian report on National Security Agencies and the cloud+++*[»] 
|2020.05.27|ASPI|![[National security agencies and the cloud: An urgent capability issue for Australia|https://www.aspi.org.au/report/national-security-agencies-and-cloud-urgent-capability-issue-australia]] ([[rapport|https://s3-ap-southeast-2.amazonaws.com/ad-aspi/2020-05/SR%20156%20National%20security%20agencies%20and%20the%20cloud.pdf]])|Report Australia|
=== 
* Attacks and outages
** AWS phishing+++*[»] 
|2020.05.27|//Abnormal Security//|[[Abnormal Attack Stories: AWS Phishing|https://abnormalsecurity.com/blog/abnormal-attack-stories-aws-phishing/]]|AWS Phishing|
|2020.05.28|ZDNet| → [[Phishing attack impersonates Amazon Web Services to steal user credentials|https://www.techrepublic.com/article/phishing-attack-impersonates-amazon-web-services-to-steal-user-credentials/]]|AWS Phishing|
|2020.05.30|HackRead| → [[New AWS phishing scam steals credentials via fake AWS notification|https://www.hackread.com/aws-phishing-scam-steals-aws-credentials-fake-notification/]]|Phishing AWS|
===, and NTT Japanese customers' data compromise+++*[»] 
|2020.05.29|The Register|[[NTT warns its Singapore cloud was hacked, Japanese customer data compromised|https://www.theregister.com/2020/05/29/ntt_hacked_customer_breach/]]|Compromise|
=== 
** Adobe Cloud outage+++*[»]>
|2020.05.27|The Register|[[Photostopped: Adobe Cloud evaporates in mass outage. Hope none of you are on a deadline, eh?|https://www.theregister.com/2020/05/27/adobe_cloud_outage/]]|Outage Adobe|
=== 
* Analysis
** Active Directory attack via AzureAD+++*[»] 
|2020.05.27|Active Directory Security|![[From Azure AD to Active Directory (via Azure) – An Unanticipated Attack Path|https://adsecurity.org/?p=4277]]|AzureAD Attacks|
|2020.05.28|//Trimarc//| → [[Webcast: Securing Office 365 and Azure AD Defend Your Tenant|https://www.hub.trimarcsecurity.com/post/webcast-securing-office-365-and-azure-ad-defend-your-tenant]]|O365 AzureAD Tenant|
=== 
** Office 365 Email attachments+++*[»] 
|2020.05.31|Bleeping Computer|[[Office 365 to give detailed info on malicious email attachments|https://www.bleepingcomputer.com/news/security/office-365-to-give-detailed-info-on-malicious-email-attachments/]]|O365 Attacks|
=== 
* Survey
** Fortinet on addressing the skills gap in Cloud and Security expertise+++*[»] 
|2020.05.27|//Fortinet//|[[Fortinet Survey Uncovers Critical Insights for Addressing the Growing Skills Gap|https://www.fortinet.com/blog/industry-trends/fortinet-uncovers-critical-insights-to-address-cyber-skills-gap.html]] ([[rapport|https://www.fortinet.com/content/dam/maindam/PUBLIC/02_MARKETING/08_Report/report-fortinet-survey-skills-shortage.pdf]])|Skills|
|2020.05.27|Dark Reading| → [[Cloud Security Architect Proves Hardest Infosec Role to Fill|https://www.darkreading.com/cloud/cloud-security-architect-proves-hardest-infosec-role-to-fill/d/d-id/1337925]]|Skills|
=== 
* Acquisitions
** ThousandEyes by Cisco+++*[»] 
|2020.05.28|//ThousandEyes//|[[ThousandEyes + Cisco = A Thousand Times ThousandEyes|https://blog.thousandeyes.com/cisco-announces-intent-to-acquire-thousandeyes/]]|Acquisitions|
|2020.05.28|SecurityWeek| → [[Cisco to Buy Network Intelligence Firm ThousandEyes|https://www.securityweek.com/cisco-buy-network-intelligence-firm-thousandeyes]]|Acquisitions|
|2020.05.28|Silicon Angle| → [[Cisco to acquire network intelligence startup ThousandEyes for reported $1B|https://siliconangle.com/2020/05/28/cisco-to-acquire-network-intelligence-startup-thousandeyes-reported-1b/]]|Acquisitions|
=== 
** Edgewise by Zscaler+++*[»] 
|2020.05.28|Silicon Angle|[[Zscaler buys security startup Edgewise as it beats earnings estimates|https://siliconangle.com/2020/05/28/zscaler-buys-security-startup-edgewise-beats-earnings-estimates/]]|Acquisition|
=== 
* Miscellaneous
** Annoncement of a new GCP region in France in 2022+++*[»] 
|2020.05.28|Silicon.fr[img[iCSF/flag_fr.png]]|![[Google Cloud annonce une « région » France pour 2022|https://www.silicon.fr/google-cloud-annonce-une-region-france-pour-2022-340430.html]]|GCP France|
|2020.05.28|Le Mag IT[img[iCSF/flag_fr.png]]| → [[Google se donne un an et demi pour mettre son cloud en France|https://www.lemagit.fr/actualites/252483826/Google-se-donne-encore-un-an-et-demi-pour-mettre-son-cloud-en-France]]|GCP France|
|2020.05.28|DataCenter Magazine[img[iCSF/flag_fr.png]]| → [[Google Cloud ouvrira une nouvelle région en France|https://datacenter-magazine.fr/google-cloud-ouvrira-une-nouvelle-region-en-france/]]|GCP France|
|2020.05.28|Journal du Net[img[iCSF/flag_fr.png]]|[[Cloud : les pièges du stockage hybride|https://www.journaldunet.com/web-tech/cloud/1491703-les-pieges-du-stockage-hybride/]]|Storage|
=== 
** Containers+++*[»] 
|2020.05.29|Container Journal|[[Gartner’s 6 Best Practices for Containers, Kubernetes|https://containerjournal.com/topics/container-ecosystems/gartners-6-best-practices-for-containers-kubernetes/]]|Containers Kubernetes Best_Practices|
|2020.05.27|//CyberArk Conjur//|[[Top 4 Open Source Tools for Observability of Containers and Microservices|https://www.conjur.org/blog/top-4-open-source-tools-for-observability-of-containers-and-microservices/]]|Containers Micro_Services|
|2020.05.26|//Palo Alto Networks//|[[Rootless Containers: The Next Trend in Container Security|https://unit42.paloaltonetworks.com/rootless-containers-the-next-trend-in-container-security/]]|Containers|
=== 
** SDP+++*[»] 
|2020.05.29|Help Net Security|[[Why is SDP the most effective architecture for zero trust strategy adoption?|https://www.helpnetsecurity.com/2020/05/29/sdp-zero-trust/]]|SDP Zero_Tust|
=== 
** Forensic imaging tool for the Cloud+++*[»] 
|2020.05.29|//Cado Security//|![[Introducing Cado Live - A Free Forensic Imaging Tool for the Cloud|https://medium.com/@cloudyforensics/introducing-cado-live-a-free-forensic-imaging-tool-for-the-cloud-5716c81d4093]] ([[vidéo|https://www.youtube.com/watch?v=9QPU6us8X_g]])|Forensics Tools|
|2020.05.29|//Cado Security//| → [[Cado Live|https://www.cadosecurity.com/community/cado-live/]]|Forensics Tools|
=== 
!!3 - Agenda
* June 9th-12th: online CSA '''Virtual EU Summit'''
* June 15th-17th: CCSK training ''in French'' (open for registration)

|ssTabl96|k
|!⇒ [[CloudSecurityAlliance.fr/go/K5V/|https://CloudSecurityAlliance.fr/go/K5V/]] |
|!Mai|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2020.05.31|
|2020.05.31|Bleeping Computer|[[Office 365 to give detailed info on malicious email attachments|https://www.bleepingcomputer.com/news/security/office-365-to-give-detailed-info-on-malicious-email-attachments/]]|O365 Attacks|
|2020.05.31|KitPloit|[[Vault - A Tool For Secrets Management, Encryption As A Service, And Privileged Access Management|https://www.kitploit.com/2020/05/vault-tool-for-secrets-management.html]]|Tools Secrets_Management|
|>|>|>|!2020.05.30|
|2020.05.28|Le Big Data[img[iCSF/flag_fr.png]]|[[Cloud Computing : les inconvénients et secrets inavouables du nuage|https://www.lebigdata.fr/secrets-cloud-inconvenients]]|Misc|
|>|>|>|!2020.05.29|
|2020.05.29|The Daily Swig|[[Google launches CTF-style bug bounty challenge for Kubernetes|https://portswigger.net/daily-swig/google-launches-ctf-style-bug-bounty-challenge-for-kubernetes]]|GCP Bug_Bounty|
|2020.05.29|Open Source DFIR|[[Introducing Libcloudforensics|https://osdfir.blogspot.com/2020/05/introducing-libcloudforensics.html]]|Forensics|
|2020.05.29|Help Net Security|[[Why is SDP the most effective architecture for zero trust strategy adoption?|https://www.helpnetsecurity.com/2020/05/29/sdp-zero-trust/]]|SDP Zero_Tust|
|2020.05.29|The Register|[[NTT warns its Singapore cloud was hacked, Japanese customer data compromised|https://www.theregister.com/2020/05/29/ntt_hacked_customer_breach/]]|Compromise|
|2020.05.29|The Register|[[The top three myths of cloud data protection – busted|https://www.theregister.com/2020/05/29/cloud_data_protection_myths/]]|Protection Myths Webcast|
|2020.05.29|Computer Weekly|[[How Sega Europe slashed incident response times using cloud SIEM|https://www.computerweekly.com/news/252483852/How-Sega-Europe-slashed-incident-response-times-using-cloud-SIEM]]|SIEM|
|2020.05.29|Kubernetes|[[K8s KPIs with Kuberhealthy|ttps://kubernetes.io/blog/2020/05/29/k8s-kpis-with-kuberhealthy/]]|Kubernetes KPIs|
|2020.05.29|VMblog|[[A New Algorithm May Help Secure Cloud Computing and IoT|https://vmblog.com/archive/2020/05/29/a-new-algorithm-may-help-secure-cloud-computing-and-iot.aspx]]|AES IOT|
|2020.05.29|Computer Weekly|[[Cloud storage 101: File, block and object storage in the cloud|https://www.computerweekly.com/feature/Cloud-storage-101-File-block-and-object-storage-in-the-cloud]]|Storage|
|2020.05.29|Cloud Native Computing Foundation|[[Kubernetes Governance, What You Should Know|https://www.cncf.io/blog/2020/05/29/kubernetes-governance-what-you-should-know/]]|Kubernetes Governance|
|2020.05.29|Container Journal|[[Gartner’s 6 Best Practices for Containers, Kubernetes|https://containerjournal.com/topics/container-ecosystems/gartners-6-best-practices-for-containers-kubernetes/]]|Containers Kubernetes Best_Practices|
|2020.05.29|TechRepublic|[[Security at the network edge: Inside software-defined networking and Kubernetes|https://www.techrepublic.com/article/security-at-the-network-edge-inside-software-defined-networking-and-kubernetes/]]|SDN|
|2020.05.29|//AWS//|![[AWS Shield Threat Landscape report is now available|https://aws.amazon.com/blogs/security/aws-shield-threat-landscape-report-now-available/]] ([[rapport|https://aws-shield-tlr.s3.amazonaws.com/2020-Q1_AWS_Shield_TLR.pdf]])|Report AWS|
|2020.06.12|CBR Online|[[AWS Hit With a Record 2.3 Tbps DDoS Attack|https://www.cbronline.com/news/record-ddos-attack-aws]]|Report AWS|
|2020.05.29|//Microsoft Azure//|[[Manage authentication sessions in Azure AD Conditional Access is now generally available!|https://techcommunity.microsoft.com/t5/azure-active-directory-identity/manage-authentication-sessions-in-azure-ad-conditional-access-is/ba-p/1421687]]|AzureAD|
|2020.05.29|//Cado Security//|![[Introducing Cado Live - A Free Forensic Imaging Tool for the Cloud|https://medium.com/@cloudyforensics/introducing-cado-live-a-free-forensic-imaging-tool-for-the-cloud-5716c81d4093]] ([[vidéo|https://www.youtube.com/watch?v=9QPU6us8X_g]])|Forensics Tools|
|2020.05.29|//Cado Security//| → [[Cado Live|https://www.cadosecurity.com/community/cado-live/]]|Forensics Tools|
|2020.05.29|//Binary Edge//|[[Continuous Attack Surface Monitoring|https://blog.binaryedge.io/2020/05/29/asm-attack-surface-monitoring/]]|Attack_Surface|
|2020.05.29|//Palo Alto Networks//|[[Achieving End-to-End Zero Trust|https://blog.paloaltonetworks.com/2020/05/network-end-to-end-zero-trust/]]|Zero_Trust|
|2020.05.29|//DataDog//|[[Best practices for monitoring GCP audit logs|https://www.datadoghq.com/blog/monitoring-gcp-audit-logs/]]|GCP Best_practices Logging|
|>|>|>|!2020.05.28|
|2020.05.28|Silicon.fr[img[iCSF/flag_fr.png]]|![[Google Cloud annonce une « région » France pour 2022|https://www.silicon.fr/google-cloud-annonce-une-region-france-pour-2022-340430.html]]|GCP France|
|2020.05.28|Le Mag IT[img[iCSF/flag_fr.png]]| → [[Google se donne un an et demi pour mettre son cloud en France|https://www.lemagit.fr/actualites/252483826/Google-se-donne-encore-un-an-et-demi-pour-mettre-son-cloud-en-France]]|GCP France|
|2020.05.28|DataCenter Magazine[img[iCSF/flag_fr.png]]| → [[Google Cloud ouvrira une nouvelle région en France|https://datacenter-magazine.fr/google-cloud-ouvrira-une-nouvelle-region-en-france/]]|GCP France|
|2020.05.28|Journal du Net[img[iCSF/flag_fr.png]]|[[Cloud : les pièges du stockage hybride|https://www.journaldunet.com/web-tech/cloud/1491703-les-pieges-du-stockage-hybride/]]|Storage|
|2020.05.28|Kubernetes|![[My exciting journey into Kubernetes' history|https://kubernetes.io/blog/2020/05/my-exciting-journey-into-kubernetes-history/]]|Kubernetes Workflow|
|2020.05.28|Bleeping Computer|[[New Octopus Scanner malware spreads via GitHub supply chain attack|https://www.bleepingcomputer.com/news/security/new-octopus-scanner-malware-spreads-via-github-supply-chain-attack/]]|Supply_Chain|
|2020.05.28|GB Hackers on Security|[[How to Choose a Cloud Services Provider With Best Security considerations|https://gbhackers.com/how-to-choose-a-cloud-services-provider-with-best-security-considerations/]]|Misc|
|2020.05.28|SANS Institute|[[Introduction to Docker for security work - SANS@MIC Talk|https://www.youtube.com/watch?v=JwQvu-h1QOM]] (vidéo)|Docker|
|2020.05.28|Amit Saha|[[Using Gatekeeper in Kubernetes|https://echorand.me/posts/gatekeeper-kubernetes/]]|Kubernetes Policy|
|2020.05.28|ZDNet|[[First new Docker release under Mirantis appears|https://www.zdnet.com/article/first-new-docker-release-under-mirantis-appears/]]|Docker|
|2020.05.28|Silicon Angle|[[Zscaler buys security startup Edgewise as it beats earnings estimates|https://siliconangle.com/2020/05/28/zscaler-buys-security-startup-edgewise-beats-earnings-estimates/]]|Acquisition|
|2020.05.28|//Orange Business Service//[img[iCSF/flag_fr.png]]|[[SASE: the future of network and network security architectures|https://www.orange-business.com/en/blogs/sase-future-network-and-network-security-architectures]]|SASE|
|2020.05.28|//ThousandEyes//|[[ThousandEyes + Cisco = A Thousand Times ThousandEyes|https://blog.thousandeyes.com/cisco-announces-intent-to-acquire-thousandeyes/]]|Acquisitions|
|2020.05.28|SecurityWeek| → [[Cisco to Buy Network Intelligence Firm ThousandEyes|https://www.securityweek.com/cisco-buy-network-intelligence-firm-thousandeyes]]|Acquisitions|
|2020.05.28|Silicon Angle| → [[Cisco to acquire network intelligence startup ThousandEyes for reported $1B|https://siliconangle.com/2020/05/28/cisco-to-acquire-network-intelligence-startup-thousandeyes-reported-1b/]]|Acquisitions|
|2020.05.28|//Microsoft//|[[Managing cybersecurity like a business risk: Part 1 - Modeling opportunities and threats|https://www.microsoft.com/security/blog/2020/05/28/managing-cybersecurity-business-risks-part-1-modeling-opportunities-threats/]]|Risks Threats Modeling|
|2020.05.28|//Caylent//|[[A Kubernetes Service Mesh Tool Comparison for 2020|https://caylent.com/a-kubernetes-service-mesh-tool-comparison-for-2020]]|Mesh Tools|
|2020.05.28|//Untangle//|[[Cloud-Based Firewalls Are Key to Protecting Employees While Working Remotely|https://www.untangle.com/inside-untangle/cloud-based-firewalls-are-key-to-protecting-employees-while-working-remotely/]]|Firewalls|
|2020.05.28|//Google Cloud//|[[Tools for debugging apps on Google Kubernetes Engine|https://cloud.google.com/blog/products/containers-kubernetes/tools-for-debugging-apps-on-google-kubernetes-engine]]|Kubernetes|
|2020.05.28|//Google Cloud//|[[Expanding our work with the open source security community|https://security.googleblog.com/2020/05/expanding-our-work-with-open-source.html]]|GCP Bug_Bounty|
|2020.05.28|//Orange//|[[SASE: the future of network and network security architectures|https://www.orange-business.com/en/blogs/sase-future-network-and-network-security-architectures]]|SASE|
|>|>|>|!2020.05.27|
|2020.05.27|ASPI|![[National security agencies and the cloud: An urgent capability issue for Australia|https://www.aspi.org.au/report/national-security-agencies-and-cloud-urgent-capability-issue-australia]] ([[rapport|https://s3-ap-southeast-2.amazonaws.com/ad-aspi/2020-05/SR%20156%20National%20security%20agencies%20and%20the%20cloud.pdf]])|Report Australia|
|2020.05.27|Active Directory Security|![[From Azure AD to Active Directory (via Azure) – An Unanticipated Attack Path|https://adsecurity.org/?p=4277]]|AzureAD Attacks|
|2020.05.28|//Trimarc//| → [[Webcast: Securing Office 365 and Azure AD Defend Your Tenant|https://www.hub.trimarcsecurity.com/post/webcast-securing-office-365-and-azure-ad-defend-your-tenant]]|O365 AzureAD Tenant|
|2020.05.27|Bleeping Computer|[[Ransomware's big jump: ransoms grew 14 times in one year|https://www.bleepingcomputer.com/news/security/ransomwares-big-jump-ransoms-grew-14-times-in-one-year/]]|Ransomware|
|2020.05.27|The Register|[[Photostopped: Adobe Cloud evaporates in mass outage. Hope none of you are on a deadline, eh?|https://www.theregister.com/2020/05/27/adobe_cloud_outage/]]|Outage Adobe|
|2020.05.27|//Abnormal Security//|[[Abnormal Attack Stories: AWS Phishing|https://abnormalsecurity.com/blog/abnormal-attack-stories-aws-phishing/]]|AWS Phishing|
|2020.05.28|ZDNet| → [[Phishing attack impersonates Amazon Web Services to steal user credentials|https://www.techrepublic.com/article/phishing-attack-impersonates-amazon-web-services-to-steal-user-credentials/]]|AWS Phishing|
|2020.05.30|HackRead| → [[New AWS phishing scam steals credentials via fake AWS notification|https://www.hackread.com/aws-phishing-scam-steals-aws-credentials-fake-notification/]]|Phishing AWS|
|2020.05.27|//McAfee//|![[Cloud Adoption & Risk Report|https://www.mcafee.com/enterprise/en-us/forms/gated-form.html]]|Report McAfee|
|2020.05.28|The Daily Swig|[[Cloud-based cyber-attacks flaring up during coronavirus pandemic|https://portswigger.net/daily-swig/cloud-based-cyber-attacks-flaring-up-during-coronavirus-pandemic]]|Attacks|
|2020.05.28|Help Net Security| → [[External attacks on cloud accounts grew 630 percent from January to April|https://www.helpnetsecurity.com/2020/05/28/external-attacks-on-cloud-accounts/]]|Report McAfee|
|2020.05.27|//Threatpost//|[[DoubleGun Group Builds Massive Botnet Using Cloud Services|https://threatpost.com/doublegun-massive-botnet-cloud-services/156075/]]|Botnet|
|2020.05.27|//CyberArk Conjur//|[[Top 4 Open Source Tools for Observability of Containers and Microservices|https://www.conjur.org/blog/top-4-open-source-tools-for-observability-of-containers-and-microservices/]]|Containers Micro_Services|
|2020.05.27|//Forcepoint//|[[Azure Active Directory integrations bring risk-adaptive authentication and access|https://www.forcepoint.com/blog/x-labs/azure-active-directory-authentication-access]]|AzureAD CASB|
|2020.05.27|//Fortinet//|[[Fortinet Survey Uncovers Critical Insights for Addressing the Growing Skills Gap|https://www.fortinet.com/blog/industry-trends/fortinet-uncovers-critical-insights-to-address-cyber-skills-gap.html]] ([[rapport|https://www.fortinet.com/content/dam/maindam/PUBLIC/02_MARKETING/08_Report/report-fortinet-survey-skills-shortage.pdf]])|Skills|
|2020.05.27|Dark Reading| → [[Cloud Security Architect Proves Hardest Infosec Role to Fill|https://www.darkreading.com/cloud/cloud-security-architect-proves-hardest-infosec-role-to-fill/d/d-id/1337925]]|Skills|
|2020.05.27|//Tufin//|[[New Release of SecureCloud adds compliance reports for CIS Benchmarks|https://www.tufin.com/blog/securecloud-new-release-cis-benchmark]]|CIS_Benchmark|
|2020.05.27|//DivvyCloud//|![[Augmenting Native Cloud Service Provider Security|https://divvycloud.com/augmenting-native-cloud-security/]]|Cloud_Native|
|2020.05.27|//Palo Alto Networks//|[[Need to Secure Cloud Native Applications? Take a Look at Airport Security|https://blog.paloaltonetworks.com/2020/05/network-cloud-native-applications/]]|Misc|
|>|>|>|!2020.05.26|
|2020.05.26|IoT World Today|[[Building a Foundation for IoT Security From the Cloud to the Edge|https://www.iotworldtoday.com/2020/05/26/addressing-iot-security-challenges-from-the-cloud-to-the-edge/]]|IoT|
|2020.05.26|//PCI Pal//|[[Critical Security Considerations for a Cloud-based Contact Centre|https://www.pcipal.com/en/knowledge-centre/news/critical-security-considerations-for-a-cloud-based-contact-center/]]|Misc|
|2020.05.26|//Perimeter81//|[[Boosting Security for Organizations on Microsoft Teams | Perimeter 81|https://www.perimeter81.com/blog/cloud/tightening-security-on-microsoft-teams/]]|Teams|
|2020.05.26|//The SSL Store//|[[Cloud Security: 5 Serious Emerging Cloud Computing Threats to Avoid|https://www.thesslstore.com/blog/cloud-security-5-serious-emerging-cloud-computing-threats-to-avoid/]]|Threats|
|2020.05.26|//Palo Alto Networks//|[[Rootless Containers: The Next Trend in Container Security|https://unit42.paloaltonetworks.com/rootless-containers-the-next-trend-in-container-security/]]|Containers|
|2020.05.26|//Cloud Vector//|[[RSAC 2020 Survey - API Security Attitudes & Trends|https://www.cloudvector.com/rsac-2020-survey-api-security-attitudes-trends/]]|Survey APIs|
|2020.05.26|//InfraCloud//|[[Kubernetes Pod Security Policies with Open Policy Agent|https://www.infracloud.io/kubernetes-pod-security-policies-opa/]]|Kubernetes Policy|
|2020.05.26|//Spanning//|[[AES Encryption: A Closer Look at Advanced Encryption Standards|https://spanning.com/blog/aes-encryption/]]|Encryption|
|2020.05.26|//Compunnel Digital//|[[Business Benefits of Single Tenant vs Multi-Tenant SaaS Solutions|https://www.compunneldigital.com/blog/business-benefits-of-single-tenant-vs-multi-tenant-saas-solutions/]]|SaaS Tenant|
!"//Cloud Security Alliance’s Latest Research Examines Symbiotic Relationship Between Software Defined Perimeter (SDP) and Zero Trust//"
[>img(150px,auto)[iCSA/K5RPS.png]]
Software-Defined Perimeter (SDP) and Zero Trust
<<<
//A Zero Trust implementation using Software-Defined Perimeter enables organizations to defend new variations of old attack methods that are constantly surfacing in existing network and infrastructure perimeter-centric networking models. 
Implementing SDP improves the security posture of businesses facing the challenge of continuously adapting to expanding attack surfaces that are increasingly more complex. 
This paper will show how SDP can be used to implement ZTNs and why SDP is applied to network connectivity, meaning it is agnostic of the underlying IP-based infrastructure and hones in on securing all connections using said infrastructure - it is the best architecture for achieving Zero Trust.//
<<<
__Liens :__
* Annonce ⇒ ''[[CloudSecurityAlliance.fr/go/k5ra/|https://CloudSecurityAlliance.fr/go/k5ra/]]''
* Document ⇒ ''[[CloudSecurityAlliance.fr/go/k5rp/|https://CloudSecurityAlliance.fr/go/k5rp/]]''
!"//Cloud Cybersecurity and the Modern Applications (part 1)//"
À lire, ce long article publié en 3 parties les 26, 27 et 28 mai 2020 — Rédigé par Francesco Cipollone, Director of Events, Chapitre UK de la CSA
Seule la première partie est reproduite ci-dessous.
{{ss2col{
<<<
[>img(200px,auto)[iCSA/K5QBC.jpg]]//Modern enterprises tend to utilize a mix or hybrid of cloud services like IaaS, PaaS and SaaS (Infrastructure/Platform/Software as a Service) to develop cloud applications. 
In a hybrid situation designing of the access control should be carefully planned.
Access control can be implemented at various levels:
* At the application level — embedding access control and roles in the logic of the application
* Infrastructure — implementing access control rules at network level
* Endpoint — implementing access control rules in a firewall endpoint or process access control.
We will explore and focus mainly on infrastructure and network as the application logic could take a whole different set of articles.
!!Network Virtual Appliances (NVA) aka Firewall Appliances
Modern firewall appliances integrate some security controls and are commonly referred to as Next Generation Firewalls (briefly NGFW).
The firewall appliances have been introduced into the cloud platforms as recent as the virtual instance. The cloud platforms are based on different architecture (like Software Defined Networks — SDN) that are quite different from traditional data centers. This difference makes the traditional firewall patterns challenging to implement in the cloud.
!!Firewall as access control and its history
Firewalls as technology have been around for a while and control was deployed in the enterprise and SMB. The control originated as a simple NAT device, and evolved, like the services. As the attacks became more and more sophisticated a range of security features were integrated like:
Access Controls (as firewall Rules):
* NAT/PAT Functionalities
* Deep Packet inspection (with IDS/IPS signature or behavioral based)
* Specialized Web Controls (as WAF rules)
* And many more…
With the added security features the traditional firewall rebranded itself as the Next Generation Firewall (aka NGFW) to make it sound more trendy.
Nowadays NGFW tends to fundamental be a security control that could be used to implement some of the building blocks of several security standards (e.g. PCI-DSS, ISO 27001, Security Essentials).
This control might not be directly related with GDPR but forms a fundamental element of the due diligence for the enterprise.
The NGFW is fundamentally the same virtual appliance as the On-Premises one.
Following all of our work I have discovered that cloud appliances can present the following challenges:
* Number of interfaces
* VLANs and Sub-interfaces
* Networking and default gateways
* High-Availability configuration
* VPN and termination of them
* Zoning concept (a division of firewall interfaces in different logical trust areas)
* The load balancer in high availability configurations
It took a bit of time for me to get the above elements right in the various implementation, in fact a lot longer than I expected.
Each appliance differs slightly in configuration, but the challenges mentioned above have remained quite a constant.
As there are more and more cloud platforms, I will focus on the more popular ones (Azure and AWS).
!!Networking, VLANs and HA
The fundamental difference in networking (layer 2 and layer 3) between on-Prem and cloud appliances is the fact that the cloud platforms implement software-based networking (SDN) and prevent the appliances interacting directly with the under-layering fabric.
This has a consequence, specifically on the high availability configuration, to prevent the more traditional IP address sharing methods (HRRP, GLBP etc…).
!!Going full cloud-native
Native Access control offers seamless integration between the fabric of the cloud infrastructure (networks, endpoints) and access control.
This seamless integration implies that it is possible to deploy access control lists fundamentally at any level:
* access control list at endpoints
* access control list in the network
These powers and freedom imply that deploying too many access control lists in too many locations/network/endpoints might turn out into a management nightmare.
At this point, I haven’t come across any centralized solution that enables central management of rules even if AWS is doing some great work on maintaining the rule set for web access firewalls (AWS WAF/Firewall rules manager).
Depending on the maturity of the organization, the deployment model (infrastructure as code) and teams (DEV-(SEC)-OPS) this deployment might be more appropriate.
In a scenario where rules are deployed per stack they would be written into the deployment code (cloud formation, terraformation, azure power shell scripts). The code in the deployment stack implies that the security team would have a harder job controlling and auditing rules unless there is a reliable and ingrained process (read as dev sec ops).
!!Traditional Appliances
As discussed in the firewall history the traditional firewall appliances have been around for a while now and they have advantages and disadvantages in a cloud world.
The primary advantage is the widespread level of talent and knowledge available on the market (any network and security engineer had to interact with NAT firewalls etc).
The disadvantages though, are that the network appliances are not integrated into the cloud fabric and are more complicated to deploy.
The other advantage is that most of the rules from different appliances can be managed from a central location that can maintain synchronous configuration amongst various models, facilitate, redeploy, and most important of all avoid direct human interaction with production appliances.
One of the other advantages, or disadvantages depending on your feelings on the subject, is that the vendor tends to implement some software add-ons (sometimes referred to as blades) into their appliances. But while they offer some convenience for small and medium businesses (SMB) they tend to be less effective or configurable than standalone controls. Enterprise tends to prefer standalone controls from different vendors (to avoid vendor lock-in or complete outages if something goes wrong with an upgrade).//
[...]
<<<
}}}__Liens :__
* Article du 26 mai sur le site de la CSA &Arr; ''[[CloudSecurityAlliance.fr/go/k5qb/|https://CloudSecurityAlliance.fr/go/k5qb/]]''
* Article du 27 mai sur le site de la CSA &Arr; ''[[CloudSecurityAlliance.fr/go/k5rb/|https://CloudSecurityAlliance.fr/go/k5rb/]]''
* Article du 27 mai sur le site de la CSA &Arr; ''[[CloudSecurityAlliance.fr/go/k5sb/|https://CloudSecurityAlliance.fr/go/k5sb/]]''
!"//CSA STAR + SOC2 - From Readiness to Attestation//"
Podcast de la série "[[CSA Security Update]]" publié le 26 mai 2020 — Invité : Audrey Katcher; partner of RubinBrown’s Business Advisory Services Group[>img(150px,auto)[iCSA/CSAsecUpd.jpg]]
<<<
//As organizations look to cloud services to process more sensitive and critical data, security and risk management teams require tools to quickly assess and understand the types and rigor of security controls applied by cloud service providers. CSA STAR Attestation is the first cloud-specific attestation program designed to meet this need. CSA STAR Attestation is a collaboration between CSA and the AICPA to provide guidelines for CPAs to conduct SOC 2 engagements using criteria from the AICPA (Trust Service Principles, AT 101) and the CSA Cloud Controls Matrix.
# What is CSA STAR & SOC2? What is CSA STAR & SOC2? 
# What are the prevalent business drivers which lead to the necessity of obtaining a CSA STAR & SOC2 attestation?
# Why should my business plan for a CSA STAR & SOC2 rather than react to the demand for the attestation?
Join us as we interview Audrey Katcher; partner of RubinBrown’s Business Advisory Services Group, overseeing the group’s Information Technology Risk Services. She also serves as the Open Certification Framework Working group liaison for AICPA and made a significant contribution to the STAR Attestation guidelines.
Listen as Audrey answers these questions and more regarding STAR Attestation and the assessment process.//
<<<
__Liens :__
* Annonce ⇒ ''[[CloudSecurityAlliance.fr/go/k5qp/|https://CloudSecurityAlliance.fr/go/k5qp/]]''
* Podcast ⇒ ''[[CloudSecurityAlliance.fr/go/k5q3/|https://CloudSecurityAlliance.fr/go/k5q3/]]''
|[img(30px,auto)[iCSF/Francais.gif]] @@color:#00F;font-size:125%;__[[Version française|2020.05.24 - Newsletter Hebdomadaire - #65]]__@@ |[img(30px,auto)[iCSF/Anglais.gif]] @@color:#00F;font-size:125%;__[[English version|2020.05.24 - Weekly Newsletter - #65]]__@@ |
|<<tiddler [[2020.05.24 - Newsletter Hebdomadaire - #65]]>> |<<tiddler [[2020.05.24 - Weekly Newsletter - #65]]>> |
!Newsletter Hebdomadaire Cloud et Sécurité - 18 au 24 mai 2020
!!1 - Nouveautés CSA et Informations
* ''Ouverture des inscriptions'' pour la ''formation CCSK en français de mi juin'', et nouvelles dates fin août, et fin novembre+++*[»]> <<tiddler [[2020.05.20 - Nouvelles dates et ouverture des inscriptions pour les formations CCSK en français]]>>=== 
* Agenda final pour la conférence virtuelle ''CloudBytes Connect'' des ''26 au 28'' mai+++*[»]> <<tiddler [[2020.05.19 - 'CloudBytes Connect Virtual Conference' : Agenda final]]>>=== 
* Appels à commentaires CSA sur le document 'Mobile Application Security Testing - Sum-Up & Landscape Overview'+++*[»]> <<tiddler [[2020.05.08 - Appel à commentaires : 'Mobile Application Security Testing - Sum-Up & Landscape Overview']]>>=== (8 juin)
!!2 - Veille Web Cloud et Sécurité
La [[Veille Web|2020.05.24 - Veille Hebdomadaire - 24 mai]] avec plus de 60 liens
* À lire :
** Rapport annuel sur l'''état de la menace sur le Cloud'' d'Oracle et de KPMG+++*[»] 
|2020.05.14|//Oracle//|![[New Study: IT Pros Are More Worried About Corporate Security than Home Security|https://www.oracle.com/corporate/pressrelease/cloud-threat-report-2020-051420.html]] ([[rapport PDF|https://www.oracle.com/a/ocom/docs/cloud/oracle-cloud-threat-report-2020.pdf]])|Report Threats|
|2020.05.14|//Oracle//| → [[Enabling a Security-First Culture with the Oracle and KPMG Cloud Threat Report|https://blogs.oracle.com/cloudsecurity/intro-to-ctr-20-report]]|Report Threats|
|2020.05.21|MSSP Alert| → [[Cloud Cybersecurity Research: Oracle, KPMG Findings|https://www.msspalert.com/cybersecurity-research/oracle-kpmg-threat-report/]]|Report Threats|
=== 
** Rapport ''DBIR de Verizon''+++*[»] 
|2020.05.19|//Verizon//|![[2020 Data Breach Investigations Report|https://enterprise.verizon.com/resources/reports/dbir/2020/introduction/]] ([[téléchargement|https://enterprise.verizon.com/resources/reports/2020-data-breach-investigations-report.pdf]])|Report Verizon_DBIR|
|2020.05.19|//Duo//| → [[Attacks Based on Credential Theft On The Rise, DBIR Says|https://duo.com/decipher/attacks-based-on-credential-theft-on-the-rise-dbir-says]]|Report Verizon_DBIR|
|2020.05.19|Security Week| → [[Verizon 2020 DBIR: More Extensive, More Detailed and More Thorough Than Ever|https://www.securityweek.com/verizon-2020-data-breach-investigations-report-more-extensive-detailed-and-thorough-ever]]|Report Verizon_DBIR|
|2020.05.19|Dark Reading| → [[Web Application Attacks Double from 2019: Verizon DBIR|https://www.darkreading.com/application-security/web-application-attacks-double-from-2019-verizon-dbir/d/d-id/1337860]]|Report Verizon_DBIR|
|2020.05.20|//Tripwire//| → [[Verizon DBIR 2020: Cloud Apps, Stolen Credentials, and Errors|https://www.tripwire.com/state-of-security/security-data-protection/verizon-dbir-2020-cloud-apps-stolen-credentials-errors/]]|Report Verizon_DBIR|
|2020.05.22|Security Week| → [[Industry Reactions to Verizon 2020 DBIR: Feedback Friday|https://www.securityweek.com/industry-reactions-verizon-2020-dbir-feedback-friday]]|Report Verizon_DBIR|
|2020.05.22|ZDnet[>img[iCSF/flag_fr.png]]| → [[Les PME sont de plus en plus la cible de cyberattaques avec le passage au cloud|https://www.zdnet.fr/actualites/les-pme-sont-de-plus-en-plus-la-cible-de-cyberattaques-avec-le-passage-au-cloud-39903947.htm]]|Report Verizon_DBIR|
=== 
** Nouvelle version de la ''AWS Security Maturity Roadmap'' de ''Scott Piper''+++*[»] 
|2020.05.21|//Summit Route//|![[AWS Security Maturity Roadmap 2020|https://summitroute.com/blog/2020/05/21/aws_security_maturity_roadmap_2020/]] ([[Document|https://summitroute.com/downloads/aws_security_maturity_roadmap-Summit_Route.pdf]])|AWS Maturity|
=== 
* Vulnérabilités et alertes
** Docker sur Windows+++*[»] 
|2020.05.22|//Pen Test Partners//|![[Docker Desktop for Windows PrivEsc (CVE-2020-11492)|https://www.pentestpartners.com/security-blog/docker-desktop-for-windows-privesc-cve-2020-11492/]]|CVE-2020-11492 Docker|
|2020.05.22|Bleeping Computer| → [[Docker fixes Windows client bug letting programs run as SYSTEM|https://www.bleepingcomputer.com/news/security/docker-fixes-windows-client-bug-letting-programs-run-as-system/]]|CVE-2020-11492 Docker|
=== 
** VMware Cloud Director+++*[»] 
|2020.05.19|//VMware//|![[VMSA-2020-0010: VMware Cloud Director updates address Code Injection Vulnerability (CVE-2020-3956)|https://www.vmware.com/security/advisories/VMSA-2020-0010.html]]|CVE-2020-3956|
|2020.05.20|Security Week| → [[Remote Code Execution Vulnerability Patched in VMware Cloud Director|https://www.securityweek.com/remote-code-execution-vulnerability-patched-vmware-cloud-director]]|CVE-2020-3956|
=== 
** Récompense de 31.337$ au Bug Bounty GCP pour un chercheur en sécurité+++*[»]>
|2020.05.21|Ezequiel Pereira|![[RCE in Google Cloud Deployment Manager|https://www.ezequiel.tech/2020/05/rce-in-cloud-dm.html]]|GCP Bug_Bounty|
|2020.05.22|The Daily Swig| → [[Google Cloud security find earns South American researcher $31k bug bounty payout|https://portswigger.net/daily-swig/google-cloud-security-find-earns-south-american-researcher-31k-bug-bounty-payout]]|GCP Bug_Bounty|
=== 
* Attaques
** Analyse d'une attaques SaaS+++*[»] 
|2020.05.20|//DarkTrace//|![[The anatomy of a SaaS attack: Two threats caught and investigated by AI|https://www.darktrace.com/en/blog/the-anatomy-of-a-saa-s-attack-two-threats-caught-and-investigated-by-ai/]]|SaaS Attacks|
=== et contre Kubernetes+++*[»] 
|2020.05.19|//Threatstack//|[[Investigating Kubernetes Attack Scenarios in Threat Stack (part 2)| Threat Stack|https://www.threatstack.com/blog/investigating-kubernetes-attack-scenarios-in-threat-stack-part-2]] (2/2)|Kubernetes Attack_Scenario|
|2020.04.23|//ThreatStack//|[[Investigating Kubernetes Attack Scenarios in Threat Stack (part 1)|https://www.threatstack.com/blog/kubernetes-attack-scenarios-part-1]] (1/2)|Kubernetes Attack|
=== 
** Phishing(s) O365+++*[»] 
|2020.05.21|Bleeping Computer|[[Office 365 phishing uses Supreme Court theme and working CAPTCHA|https://www.bleepingcomputer.com/news/security/office-365-phishing-uses-supreme-court-theme-and-working-captcha/]]|O365 Phishing|
|2020.05.18|//Sophos//|[[Shiny new Azure login attracts shiny new phishing attacks|https://nakedsecurity.sophos.com/2020/05/18/shiny-new-azure-login-attracts-shiny-new-phishing-attacks/]]|Phishing Azure|
=== 
** Vols de comptes AWS+++*[»] 
|2020.05.19|//Tyler Fornes//|Test d'intrusion : [[technique de vol d'authentifiants AWS|https://twitter.com/tfornez/status/1262747748547194888]]|AWS Pen_Testing Credentials|
===, dans des containers+++*[»] 
|2020.05.19|//Rhino Security Labs//|![[Weaponizing AWS ECS Task Definitions to Steal Credentials From Running Containers|https://rhinosecuritylabs.com/aws/weaponizing-ecs-task-definitions-steal-credentials-running-containers/]]|Containers Exploit|
===, et techniques de contournement du MFA+++*[»] 
|2020.05.18|//Cofense//|[[MFA Bypass Phish Caught: OAuth2 Grants Access to User Data Without a Password|https://cofense.com/mfa-bypass-phish-caught-oauth2-grants-access-user-data-without-password/]]|O365 Phishing MFA|
|2020.05.19|//Security Intelligence//| → [[Clever Phishing Attack Bypasses MFA to Nab Microsoft Office 365 Credentials|https://threatpost.com/phishing-campaign-allows-for-mfa-bypass-on-office-365/155864/]]|O365 Phishing MFA|
=== 
** Fuite de données O365+++*[»] 
|2020.05.20|The Register|[[Microsoft gives Office 365 admins the heads-up: Some internal queries over weekend might have returned results from completely different orgs|https://www.theregister.co.uk/2020/05/18/microsoft_office_365_internal_search_mixup/]]|O365 Leak|
|2020.05.20|//Sophos//| → [[Office 365 exposed some internal search results to other companies|https://nakedsecurity.sophos.com/2020/05/20/office-365-exposed-some-internal-search-results-to-other-companies/]]|O365 Leak|
=== 
* Rapports et études
** Accurics (DevSecOps)+++*[»] 
|2020.05.19|//Accurics//|[[Accurics Releases ‘State of DevSecOps Report’, Highlights Shift Toward Provisioning Cloud Infrastructure Through Code|https://www.accurics.com/news/press-release/accurics-releases-state-of-devsecops-report/]] ([[rapport|http://start.accurics.com/CT-2020-05-Research-Report_LP-Reg.html]])|Report DevSecOps|
|2020.05.20|Security Review| → [[Accurics: 96 Percent of Reported Cloud Security Issues Aren't Addressed|https://solutionsreview.com/cloud-platforms/accurics-96-percent-of-reported-cloud-security-issues-arent-addressed/]]|Report|
=== 
* Acquisitions
** Born in the Cloud par OpenSystems+++*[»] 
|2020.05.20|//OpenSystems//|[[Open Systems Augments its Cybersecurity Capabilities With Acquisition of Leading Microsoft Azure Sentinel Expert|https://open-systems.com/press-release/open-systems-acquires-born-in-the-cloud]]||Acquisition|
=== 
* Divers
** AzureAD+++*[»] 
|2020.05.22|Hakin9 Mag|[[Stormspotter - Tool for graphing Azure and Azure Active Directory objects|https://hakin9.org/stormspotter-azure-red-team-tool-for-graphing-azure-and-azure-active-directory-objects/]]|Tools|
|2020.05.21|//Microsoft Azure//|[[Evolving Azure AD for every user and any identity with External Identities|https://techcommunity.microsoft.com/t5/azure-active-directory-identity/evolving-azure-ad-for-every-user-and-any-identity-with-external/ba-p/1257361]] ([[détails|https://azure.microsoft.com/en-us/services/active-directory/external-identities/]])|AzureAD|
=== 
** ''Cyber-résilience''+++*[»] 
|2020.05.21|//Security Intelligence//|[[The Connection Between Cloud Service Providers and Cyber Resilience|https://securityintelligence.com/articles/the-connection-between-cloud-service-providers-and-cyber-resilience/]]|Resilience|
=== 
** Gestion de la Supply Chain+++*[»] 
|2020.05.20|//Compare the Cloud//|[[Cloud Supply Chain Risk – is your MSP in control?|https://www.comparethecloud.net/articles/cloud-supply-chain-risk-is-your-msp-in-control/]]|Supply_Chain Risks|
=== 
** Gestion des secrets+++*[»] 
|2020.05.20|DZone|[[How to Manage Secrets in Kubernetes Environment|https://dzone.com/articles/how-to-manage-secrets-in-kubernetes-environment]]|Kubernetes|
|2020.05.20|//CyberArk Conjur//|[[Secrets Management Best Practices for Machines and Services to Get Secure Access|https://www.conjur.org/blog/secrets-management-best-practices-for-machines-and-services-to-get-secure-access/]]|Secret_Management|
=== 
** Quelques réflexions d'''Anton Chuvakin''+++*[»] 
|2020.05.19|Anton Chuvakin|![[Fake Cloud: Now There Are Two Hands in Your Pocket|https://medium.com/anton-on-security/fake-cloud-now-there-are-two-hands-in-your-pocket-605409a4631c]]|Misc|
=== 
** Tests d'intrusion dans le Cloud+++*[»] 
|2020.05.19|//Fugue//|[[Pen Testing in the Age of Cloud|https://www.fugue.co/blog/pen-testing-in-the-age-of-cloud]]|Pen_Testing|
=== 
!!3 - Agenda
* ''26 au 28 mai'' : visio-conférences CSA '''CloudBytes Connect Virtual Conference'''
* 9 au 12 juin : visio-conférences CSA '''Virtual EU Summit'''
* 15 au 17 juin : formation ''CCSK en français'' (les inscriptions sont ouvertes)

|ssTabl96|k
|!⇒ [[CloudSecurityAlliance.fr/go/K5O/|https://CloudSecurityAlliance.fr/go/K5O/]] |
!Weekly Cloud and Security Watch Newsletter - May 18th to 24th[>img[iCSF/inEnglish.png]]
!!1 - CSA News and Updates
* Registration now open for the CCSK training in French for the mid June session, new sessions late Agust and in November+++*[»]> <<tiddler [[2020.05.20 - Nouvelles dates et ouverture des inscriptions pour les formations CCSK en français]]>>=== 
* Agenda for the ''CloudBytes Connect Virtual Conference'', May 26th to 28th+++*[»]> <<tiddler [[2020.05.19 - 'CloudBytes Connect Virtual Conference' : Agenda final]]>>=== 
* Call for comments for a CSA document: 'Mobile Application Security Testing - Sum-Up & Landscape Overview'+++*[»]> <<tiddler [[2020.05.08 - Appel à commentaires : 'Mobile Application Security Testing - Sum-Up & Landscape Overview']]>>=== before June 8th
!!2 - Cloud and Security News Watch
[[Over 60 links|2020.05.24 - Veille Hebdomadaire - 24 mai]]
* Must read:
** Oracle and KPMG ''Cloud Threat Report'' for 2020+++*[»] 
|2020.05.14|//Oracle//|![[New Study: IT Pros Are More Worried About Corporate Security than Home Security|https://www.oracle.com/corporate/pressrelease/cloud-threat-report-2020-051420.html]] ([[rapport PDF|https://www.oracle.com/a/ocom/docs/cloud/oracle-cloud-threat-report-2020.pdf]])|Report Threats|
|2020.05.14|//Oracle//| → [[Enabling a Security-First Culture with the Oracle and KPMG Cloud Threat Report|https://blogs.oracle.com/cloudsecurity/intro-to-ctr-20-report]]|Report Threats|
|2020.05.21|MSSP Alert| → [[Cloud Cybersecurity Research: Oracle, KPMG Findings|https://www.msspalert.com/cybersecurity-research/oracle-kpmg-threat-report/]]|Report Threats|
=== 
** Verizon ''Data Breach Investigations Report'' (DBIR)+++*[»] 
|2020.05.19|//Verizon//|![[2020 Data Breach Investigations Report|https://enterprise.verizon.com/resources/reports/dbir/2020/introduction/]] ([[téléchargement|https://enterprise.verizon.com/resources/reports/2020-data-breach-investigations-report.pdf]])|Report Verizon_DBIR|
|2020.05.19|//Duo//| → [[Attacks Based on Credential Theft On The Rise, DBIR Says|https://duo.com/decipher/attacks-based-on-credential-theft-on-the-rise-dbir-says]]|Report Verizon_DBIR|
|2020.05.19|Security Week| → [[Verizon 2020 DBIR: More Extensive, More Detailed and More Thorough Than Ever|https://www.securityweek.com/verizon-2020-data-breach-investigations-report-more-extensive-detailed-and-thorough-ever]]|Report Verizon_DBIR|
|2020.05.19|Dark Reading| → [[Web Application Attacks Double from 2019: Verizon DBIR|https://www.darkreading.com/application-security/web-application-attacks-double-from-2019-verizon-dbir/d/d-id/1337860]]|Report Verizon_DBIR|
|2020.05.20|//Tripwire//| → [[Verizon DBIR 2020: Cloud Apps, Stolen Credentials, and Errors|https://www.tripwire.com/state-of-security/security-data-protection/verizon-dbir-2020-cloud-apps-stolen-credentials-errors/]]|Report Verizon_DBIR|
|2020.05.22|Security Week| → [[Industry Reactions to Verizon 2020 DBIR: Feedback Friday|https://www.securityweek.com/industry-reactions-verizon-2020-dbir-feedback-friday]]|Report Verizon_DBIR|
|2020.05.22|ZDnet[>img[iCSF/flag_fr.png]]| → [[Les PME sont de plus en plus la cible de cyberattaques avec le passage au cloud|https://www.zdnet.fr/actualites/les-pme-sont-de-plus-en-plus-la-cible-de-cyberattaques-avec-le-passage-au-cloud-39903947.htm]]|Report Verizon_DBIR|
=== 
** Update of ''Scott Piper'''s ''AWS Security Maturity Roadmap''+++*[»] 
|2020.05.21|//Summit Route//|![[AWS Security Maturity Roadmap 2020|https://summitroute.com/blog/2020/05/21/aws_security_maturity_roadmap_2020/]] ([[Document|https://summitroute.com/downloads/aws_security_maturity_roadmap-Summit_Route.pdf]])|AWS Maturity|
=== 
* Vulnerabilities and alertss
** Docker Desktop for Windows+++*[»] 
|2020.05.22|//Pen Test Partners//|![[Docker Desktop for Windows PrivEsc (CVE-2020-11492)|https://www.pentestpartners.com/security-blog/docker-desktop-for-windows-privesc-cve-2020-11492/]]|CVE-2020-11492 Docker|
|2020.05.22|Bleeping Computer| → [[Docker fixes Windows client bug letting programs run as SYSTEM|https://www.bleepingcomputer.com/news/security/docker-fixes-windows-client-bug-letting-programs-run-as-system/]]|CVE-2020-11492 Docker|
=== 
** VMware Cloud Director+++*[»] 
|2020.05.19|//VMware//|![[VMSA-2020-0010: VMware Cloud Director updates address Code Injection Vulnerability (CVE-2020-3956)|https://www.vmware.com/security/advisories/VMSA-2020-0010.html]]|CVE-2020-3956|
|2020.05.20|Security Week| → [[Remote Code Execution Vulnerability Patched in VMware Cloud Director|https://www.securityweek.com/remote-code-execution-vulnerability-patched-vmware-cloud-director]]|CVE-2020-3956|
=== 
** Bug Bounty payout of 31.337$ for a GCP vulnerability+++*[»]>
|2020.05.21|Ezequiel Pereira|![[RCE in Google Cloud Deployment Manager|https://www.ezequiel.tech/2020/05/rce-in-cloud-dm.html]]|GCP Bug_Bounty|
|2020.05.22|The Daily Swig| → [[Google Cloud security find earns South American researcher $31k bug bounty payout|https://portswigger.net/daily-swig/google-cloud-security-find-earns-south-american-researcher-31k-bug-bounty-payout]]|GCP Bug_Bounty|
=== 
* Attacks
** Anatomy of a SaaS attack+++*[»] 
|2020.05.20|//DarkTrace//|![[The anatomy of a SaaS attack: Two threats caught and investigated by AI|https://www.darktrace.com/en/blog/the-anatomy-of-a-saa-s-attack-two-threats-caught-and-investigated-by-ai/]]|SaaS Attacks|
=== and Kubernetes attack scenarios+++*[»] 
|2020.05.19|//Threatstack//|[[Investigating Kubernetes Attack Scenarios in Threat Stack (part 2)| Threat Stack|https://www.threatstack.com/blog/investigating-kubernetes-attack-scenarios-in-threat-stack-part-2]] (2/2)|Kubernetes Attack_Scenario|
|2020.04.23|//ThreatStack//|[[Investigating Kubernetes Attack Scenarios in Threat Stack (part 1)|https://www.threatstack.com/blog/kubernetes-attack-scenarios-part-1]] (1/2)|Kubernetes Attack|
=== 
** O365 phishing case(s)+++*[»] 
|2020.05.21|Bleeping Computer|[[Office 365 phishing uses Supreme Court theme and working CAPTCHA|https://www.bleepingcomputer.com/news/security/office-365-phishing-uses-supreme-court-theme-and-working-captcha/]]|O365 Phishing|
|2020.05.18|//Sophos//|[[Shiny new Azure login attracts shiny new phishing attacks|https://nakedsecurity.sophos.com/2020/05/18/shiny-new-azure-login-attracts-shiny-new-phishing-attacks/]]|Phishing Azure|
=== 
** Credential theft for AWS+++*[»] 
|2020.05.19|//Tyler Fornes//|Test d'intrusion : [[technique de vol d'authentifiants AWS|https://twitter.com/tfornez/status/1262747748547194888]]|AWS Pen_Testing Credentials|
===, in containers+++*[»] 
|2020.05.19|//Rhino Security Labs//|![[Weaponizing AWS ECS Task Definitions to Steal Credentials From Running Containers|https://rhinosecuritylabs.com/aws/weaponizing-ecs-task-definitions-steal-credentials-running-containers/]]|Containers Exploit|
===, and by bypassing MFA+++*[»] 
|2020.05.18|//Cofense//|[[MFA Bypass Phish Caught: OAuth2 Grants Access to User Data Without a Password|https://cofense.com/mfa-bypass-phish-caught-oauth2-grants-access-user-data-without-password/]]|O365 Phishing MFA|
|2020.05.19|//Security Intelligence//| → [[Clever Phishing Attack Bypasses MFA to Nab Microsoft Office 365 Credentials|https://threatpost.com/phishing-campaign-allows-for-mfa-bypass-on-office-365/155864/]]|O365 Phishing MFA|
=== 
** Some search results exposed in O365+++*[»] 
|2020.05.20|The Register|[[Microsoft gives Office 365 admins the heads-up: Some internal queries over weekend might have returned results from completely different orgs|https://www.theregister.co.uk/2020/05/18/microsoft_office_365_internal_search_mixup/]]|O365 Leak|
|2020.05.20|//Sophos//| → [[Office 365 exposed some internal search results to other companies|https://nakedsecurity.sophos.com/2020/05/20/office-365-exposed-some-internal-search-results-to-other-companies/]]|O365 Leak|
=== 
* Reports
** Accurics (DevSecOps)+++*[»] 
|2020.05.19|//Accurics//|[[Accurics Releases ‘State of DevSecOps Report’, Highlights Shift Toward Provisioning Cloud Infrastructure Through Code|https://www.accurics.com/news/press-release/accurics-releases-state-of-devsecops-report/]] ([[rapport|http://start.accurics.com/CT-2020-05-Research-Report_LP-Reg.html]])|Report DevSecOps|
|2020.05.20|Security Review| → [[Accurics: 96 Percent of Reported Cloud Security Issues Aren't Addressed|https://solutionsreview.com/cloud-platforms/accurics-96-percent-of-reported-cloud-security-issues-arent-addressed/]]|Report|
=== 
* Acquisitions
** Born in the Cloud by OpenSystems+++*[»] 
|2020.05.20|//OpenSystems//|[[Open Systems Augments its Cybersecurity Capabilities With Acquisition of Leading Microsoft Azure Sentinel Expert|https://open-systems.com/press-release/open-systems-acquires-born-in-the-cloud]]||Acquisition|
=== 
* Miscellaneous
** AzureAD+++*[»] 
|2020.05.22|Hakin9 Mag|[[Stormspotter - Tool for graphing Azure and Azure Active Directory objects|https://hakin9.org/stormspotter-azure-red-team-tool-for-graphing-azure-and-azure-active-directory-objects/]]|Tools|
|2020.05.21|//Microsoft Azure//|[[Evolving Azure AD for every user and any identity with External Identities|https://techcommunity.microsoft.com/t5/azure-active-directory-identity/evolving-azure-ad-for-every-user-and-any-identity-with-external/ba-p/1257361]] ([[détails|https://azure.microsoft.com/en-us/services/active-directory/external-identities/]])|AzureAD|
=== 
** ''Cyberresilience''+++*[»] 
|2020.05.21|//Security Intelligence//|[[The Connection Between Cloud Service Providers and Cyber Resilience|https://securityintelligence.com/articles/the-connection-between-cloud-service-providers-and-cyber-resilience/]]|Resilience|
=== 
** Cloud Supply Chain+++*[»] 
|2020.05.20|//Compare the Cloud//|[[Cloud Supply Chain Risk – is your MSP in control?|https://www.comparethecloud.net/articles/cloud-supply-chain-risk-is-your-msp-in-control/]]|Supply_Chain Risks|
=== 
** Secrets Management+++*[»] 
|2020.05.20|DZone|[[How to Manage Secrets in Kubernetes Environment|https://dzone.com/articles/how-to-manage-secrets-in-kubernetes-environment]]|Kubernetes|
|2020.05.20|//CyberArk Conjur//|[[Secrets Management Best Practices for Machines and Services to Get Secure Access|https://www.conjur.org/blog/secrets-management-best-practices-for-machines-and-services-to-get-secure-access/]]|Secret_Management|
=== 
** ''Anton Chuvakin'' viewpoint+++*[»] 
|2020.05.19|Anton Chuvakin|![[Fake Cloud: Now There Are Two Hands in Your Pocket|https://medium.com/anton-on-security/fake-cloud-now-there-are-two-hands-in-your-pocket-605409a4631c]]|Misc|
=== 
** Pen Testing in the Cloud+++*[»] 
|2020.05.19|//Fugue//|[[Pen Testing in the Age of Cloud|https://www.fugue.co/blog/pen-testing-in-the-age-of-cloud]]|Pen_Testing|
=== 
!!3 - Agenda
* May 26th-28th: online CSA '''CloudBytes Connect Virtual Conference'''
* June 9th-12th: online CSA '''Virtual EU Summit'''
* June 15th-17th: CCSK training ''in French'' (open for registration)

|ssTabl96|k
|!⇒ [[CloudSecurityAlliance.fr/go/K5O/|https://CloudSecurityAlliance.fr/go/K5O/]] |
|!Mai|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2020.05.24|
|2020.05.24|rootsecdev|[[Hardening Azure Active Directory from Attacks and insider threats|https://medium.com/@rootsecdev/hardening-azure-active-directory-from-attacks-and-insider-threats-82890d6a64be]]|AzureAD|
|>|>|>|!2020.05.23|
|2020.05.23|//Microsoft//|![[Cloud security responsibilities|https://docs.microsoft.com/en-us/learn/modules/cmu-cloud-security/1-responsibilities]]|Azure Shared_Responsibilities|
|2020.05.23|//NetLab 360//|[[New activity of DoubleGuns Group, control hundreds of thousands of bots via public cloud service|https://blog.netlab.360.com/shuangqiang/]]|Botnet|
|2020.05.23|//JumpCloud//|[[Using U2F Security Keys for MFA to Cloud Applications|https://jumpcloud.com/blog/u2f-mfa-cloud-apps]]|MFA|
|>|>|>|!2020.05.22|
|2020.05.22|Bleeping Computer|[[Ransomware encrypts from virtual machines to evade antivirus|https://www.bleepingcomputer.com/news/security/ransomware-encrypts-from-virtual-machines-to-evade-antivirus/]]|Ransomware|
|2020.05.22|Hakin9 Mag|[[Stormspotter - Tool for graphing Azure and Azure Active Directory objects|https://hakin9.org/stormspotter-azure-red-team-tool-for-graphing-azure-and-azure-active-directory-objects/]]|Tools|
|2020.05.22|Dark Reading|[[Benefits of a Cloud-Based, Automated Cyber Range|https://www.darkreading.com/cloud/benefits-of-a-cloud-based-automated-cyber-range/a/d-id/1337883]]|Cyber_Range|
|2020.05.22|//Pen Test Partners//|![[Docker Desktop for Windows PrivEsc (CVE-2020-11492)|https://www.pentestpartners.com/security-blog/docker-desktop-for-windows-privesc-cve-2020-11492/]]|CVE-2020-11492 Docker|
|2020.05.22|Bleeping Computer| → [[Docker fixes Windows client bug letting programs run as SYSTEM|https://www.bleepingcomputer.com/news/security/docker-fixes-windows-client-bug-letting-programs-run-as-system/]]|CVE-2020-11492 Docker|
|2020.05.22|//CloudFlare//|[[Releasing Cloudflare Access’ most requested feature|https://blog.cloudflare.com/releasing-cloudflare-access-most-requested-feature/]]|Misc|
|2020.05.22|//DarkTrace//|[[Illuminating AWS cloud environments with Darktrace Cyber AI|https://www.darktrace.com/en/blog/illuminating-aws-cloud-environments-with-darktrace-cyber-ai]]|AWS|
|2020.05.22|//PivotPoint Security//|[[Why Your SIEM Tool Needs to Monitor Cloud Environments… or Else|https://www.pivotpointsecurity.com/blog/why-your-siem-tool-needs-to-monitor-cloud-environments-or-else/]]|SIEM|
|>|>|>|!2020.05.21|
|2020.05.21|Bleeping Computer|[[Office 365 phishing uses Supreme Court theme and working CAPTCHA|https://www.bleepingcomputer.com/news/security/office-365-phishing-uses-supreme-court-theme-and-working-captcha/]]|O365 Phishing|
|2020.05.21|BetaNews|[[Securing the cloud for healthcare|https://betanews.com/2020/05/21/securing-the-cloud-for-healthcare/]]|Healthcare|
|2020.05.21|DZone|[[Creating a Highly Available K3s Cluster|https://dzone.com/articles/creating-a-highly-available-k3s-cluster]][Kubernetes|
|2020.05.21|Ezequiel Pereira|![[RCE in Google Cloud Deployment Manager|https://www.ezequiel.tech/2020/05/rce-in-cloud-dm.html]]|GCP Bug_Bounty|
|2020.05.22|The Daily Swig| → [[Google Cloud security find earns South American researcher $31k bug bounty payout|https://portswigger.net/daily-swig/google-cloud-security-find-earns-south-american-researcher-31k-bug-bounty-payout]]|GCP Bug_Bounty|
|2020.05.21|//Summit Route//|![[AWS Security Maturity Roadmap 2020|https://summitroute.com/blog/2020/05/21/aws_security_maturity_roadmap_2020/]] ([[Document|https://summitroute.com/downloads/aws_security_maturity_roadmap-Summit_Route.pdf]])|AWS Maturity|
|2020.05.21|//Microsoft Azure//|[[Evolving Azure AD for every user and any identity with External Identities|https://techcommunity.microsoft.com/t5/azure-active-directory-identity/evolving-azure-ad-for-every-user-and-any-identity-with-external/ba-p/1257361]] ([[détails|https://azure.microsoft.com/en-us/services/active-directory/external-identities/]])|AzureAD|
|2020.05.21|//Security Intelligence//|[[The Connection Between Cloud Service Providers and Cyber Resilience|https://securityintelligence.com/articles/the-connection-between-cloud-service-providers-and-cyber-resilience/]]|Resilience|
|2020.05.21|//FireEye//|[[Clouds Are Great, Secure Clouds Are the Greatest|https://www.fireeye.com/blog/products-and-services/2020/05/clouds-are-great-secure-clouds-are-the-greatest.html]]|Misc|
|2020.05.21|//Capsule8//|[[Security Delusions Part 3: Cheat Codes|https://capsule8.com/blog/security-delusions-part-3-cheat-codes/]] (3/3)|Cheat_Codes APIs Containers|
|2020.05.21|//Fugue//|[[3 Big Amazon S3 Vulnerabilities You May Be Missing|https://www.fugue.co/blog/3-big-amazon-s3-vulnerabilities-you-may-be-missing]]|AWS_S3|
|2020.05.21|//Fugue//| → Webinaire [[Building a Highly-Secure Amazon S3 Bucket|https://resources.fugue.co/building-a-highly-secure-amazon-s3-bucket]]|Webinaire|
|2020.05.21|//Checkpoint//|[[The Best Security Management is now in the Cloud|https://blog.checkpoint.com/2020/05/21/the-best-security-management-is-now-in-the-cloud/]]|Products|
|2020.05.21|//Trustwave//|![[Phishing in a Bucket: Utilizing Google Firebase Storage|https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/phishing-in-a-bucket-utilizing-google-firebase-storage/]]|Phishing GCP|
|>|>|>|!2020.05.20|
|2020.05.20|DZone|[[How to Manage Secrets in Kubernetes Environment|https://dzone.com/articles/how-to-manage-secrets-in-kubernetes-environment]]|Kubernetes|
|2020.05.20|//DarkTrace//|![[The anatomy of a SaaS attack: Two threats caught and investigated by AI|https://www.darktrace.com/en/blog/the-anatomy-of-a-saa-s-attack-two-threats-caught-and-investigated-by-ai/]]|SaaS Attacks|
|2020.05.20|//Perimeter81//|[[SASE: Evolving Government' Cloud and Network Security Strategy|https://www.perimeter81.com/blog/cloud/sase-evolving-governments-cloud-and-network-security-strategy/]]|SASE|
|2020.05.20|//OpenSystems//|[[Open Systems Augments its Cybersecurity Capabilities With Acquisition of Leading Microsoft Azure Sentinel Expert|https://open-systems.com/press-release/open-systems-acquires-born-in-the-cloud]]|Acquisition|
|2020.05.20|//CyberArk Conjur//|[[Secrets Management Best Practices for Machines and Services to Get Secure Access|https://www.conjur.org/blog/secrets-management-best-practices-for-machines-and-services-to-get-secure-access/]]|Secret_Management|
|2020.05.20|//Box//|[[Box enables zero-trust-based access to its content from any device|https://siliconangle.com/2020/05/20/box-enables-zero-trust-based-access-content-device/]]|Zero_Trust Box|
|2020.05.20|//Compare the Cloud//|[[Cloud Supply Chain Risk – is your MSP in control?|https://www.comparethecloud.net/articles/cloud-supply-chain-risk-is-your-msp-in-control/]]|Supply_Chain Risks|
|2020.05.20|//Google Cloud//|[[Defense Innovation Unit Selects Google Cloud|https://cloud.google.com/press-releases/2020/0520/defense-innovation-unit]]|Government Anthos|
|2020.05.20|ZDnet| → [[Pentagon unit taps Google Cloud's Anthos for multi-cloud management|https://www.zdnet.com/article/pentagon-taps-google-clouds-anthos-for-multi-cloud-management/]]|Government Anthos|
|>|>|>|!2020.05.19|
|2020.05.19|ZDnet[>img[iCSF/flag_fr.png]]|[[Quelle sécurité pour les réseaux managés dans le Cloud ?|https://www.zdnet.fr/actualites/quelle-securite-pour-les-reseaux-manages-dans-le-cloud-39903423.htm]]|Networks|
|2020.05.19|Anton Chuvakin|![[Fake Cloud: Now There Are Two Hands in Your Pocket|https://medium.com/anton-on-security/fake-cloud-now-there-are-two-hands-in-your-pocket-605409a4631c]]|Misc|
|2020.05.19|Container Journal|[[Why is Enterprise Kubernetes Important?|https://containerjournal.com/topics/container-ecosystems/why-is-enterprise-kubernetes-important/]]|Kubernetes|
|2020.05.19|Container Journal|[[Why Enterprises Should Embrace Kubernetes|https://containerjournal.com/topics/container-management/why-enterprises-should-embrace-kubernetes/]]|Kubernetes|
|2020.05.19|Insider Pro|[[6 ways to be more secure in the cloud|https://www.idginsiderpro.com/article/3529382/6-ways-to-be-more-secure-in-the-cloud.html]]|Best_Practices|
|2020.05.19|//Zscaler//[>img[iCSF/flag_fr.png]]|[[SASE : cinq étapes vers une nouvelle approche de la sécurité|https://www.informatiquenews.fr/sase-cinq-etapes-vers-une-nouvelle-approche-de-la-securite-didier-guyomarch-zscaler-70278]]|SASE|
|2020.05.19|//VMware//|![[VMSA-2020-0010: VMware Cloud Director updates address Code Injection Vulnerability (CVE-2020-3956)|https://www.vmware.com/security/advisories/VMSA-2020-0010.html]]|CVE-2020-3956|
|2020.05.20|Security Week| → [[Remote Code Execution Vulnerability Patched in VMware Cloud Director|https://www.securityweek.com/remote-code-execution-vulnerability-patched-vmware-cloud-director]]|CVE-2020-3956|
|2020.05.19|//Verizon//|![[2020 Data Breach Investigations Report|https://enterprise.verizon.com/resources/reports/dbir/2020/introduction/]] ([[téléchargement|https://enterprise.verizon.com/resources/reports/2020-data-breach-investigations-report.pdf]])|Report Verizon_DBIR|
|2020.05.19|//Duo//| → [[Attacks Based on Credential Theft On The Rise, DBIR Says|https://duo.com/decipher/attacks-based-on-credential-theft-on-the-rise-dbir-says]]|Report Verizon_DBIR|
|2020.05.19|Security Week| → [[Verizon 2020 DBIR: More Extensive, More Detailed and More Thorough Than Ever|https://www.securityweek.com/verizon-2020-data-breach-investigations-report-more-extensive-detailed-and-thorough-ever]]|Report Verizon_DBIR|
|2020.05.19|Dark Reading| → [[Web Application Attacks Double from 2019: Verizon DBIR|https://www.darkreading.com/application-security/web-application-attacks-double-from-2019-verizon-dbir/d/d-id/1337860]]|Report Verizon_DBIR|
|2020.05.20|//Tripwire//| → [[Verizon DBIR 2020: Cloud Apps, Stolen Credentials, and Errors|https://www.tripwire.com/state-of-security/security-data-protection/verizon-dbir-2020-cloud-apps-stolen-credentials-errors/]]|Report Verizon_DBIR|
|2020.05.22|Security Week| → [[Industry Reactions to Verizon 2020 DBIR: Feedback Friday|https://www.securityweek.com/industry-reactions-verizon-2020-dbir-feedback-friday]]|Report Verizon_DBIR|
|2020.05.22|ZDnet[>img[iCSF/flag_fr.png]]| → [[Les PME sont de plus en plus la cible de cyberattaques avec le passage au cloud|https://www.zdnet.fr/actualites/les-pme-sont-de-plus-en-plus-la-cible-de-cyberattaques-avec-le-passage-au-cloud-39903947.htm]]|Report Verizon_DBIR|
|2020.05.27|//Sentinel One//| → [[The CISO’s Quick Guide to Verizon' 2020 Data Breach Investigations Report|https://www.sentinelone.com/blog/the-cisos-quick-guide-to-verizons-2020-data-breach-investigations-report/]]|Report Verizon_DBIR|
|2020.05.19|//Rhino Security Labs//|![[Weaponizing AWS ECS Task Definitions to Steal Credentials From Running Containers|https://rhinosecuritylabs.com/aws/weaponizing-ecs-task-definitions-steal-credentials-running-containers/]]|Containers Exploit|
|2020.05.19|//Fugue//|[[Pen Testing in the Age of Cloud|https://www.fugue.co/blog/pen-testing-in-the-age-of-cloud]]|Pen_Testing|
|2020.05.19|//Tyler Fornes//|Test d'intrusion : [[technique de vol d'authentifiants AWS|https://twitter.com/tfornez/status/1262747748547194888]]|AWS Pen_Testing Credentials|
|2020.05.19|//Accurics//|[[Accurics Releases ‘State of DevSecOps Report’, Highlights Shift Toward Provisioning Cloud Infrastructure Through Code|https://www.accurics.com/news/press-release/accurics-releases-state-of-devsecops-report/]] ([[rapport|http://start.accurics.com/CT-2020-05-Research-Report_LP-Reg.html]])|Report DevSecOps|
|2020.05.20|Security Review| → [[Accurics: 96 Percent of Reported Cloud Security Issues Aren't Addressed|https://solutionsreview.com/cloud-platforms/accurics-96-percent-of-reported-cloud-security-issues-arent-addressed/]]|Report|
|2020.05.19|//Portshift//|[[Portshift Secures Kubernetes APIs|https://containerjournal.com/topics/container-security/portshift-secures-kubernetes-apis/]]|Kubernetes APIs|
|2020.05.19|//Menlo Security//|[[Introducing Cloud App Isolation|https://www.menlosecurity.com/blog/introducing-cloud-app-isolation]]|Apps Isolation|
|2020.05.19|//Threatstack//|[[Investigating Kubernetes Attack Scenarios in Threat Stack (part 2)| Threat Stack|https://www.threatstack.com/blog/investigating-kubernetes-attack-scenarios-in-threat-stack-part-2]] (2/2)|Kubernetes Attack_Scenario|
|>|>|>|!2020.05.18|
|2020.05.18|The Register|[[Microsoft gives Office 365 admins the heads-up: Some internal queries over weekend might have returned results from completely different orgs|https://www.theregister.co.uk/2020/05/18/microsoft_office_365_internal_search_mixup/]]|O365 Leak|
|2020.05.20|//Sophos//| → [[Office 365 exposed some internal search results to other companies|https://nakedsecurity.sophos.com/2020/05/20/office-365-exposed-some-internal-search-results-to-other-companies/]]|O365 Leak|
|2020.05.18|//Imperva//|[[Cloud Compliance - A Top Challenge for organizations|https://www.imperva.com/blog/cloud-compliance-a-top-challenge-for-organizations/]]|Compliance|
|2020.05.18|//Cofense//|[[MFA Bypass Phish Caught: OAuth2 Grants Access to User Data Without a Password|https://cofense.com/mfa-bypass-phish-caught-oauth2-grants-access-user-data-without-password/]]|O365 Phishing MFA|
|2020.05.19|//Security Intelligence//| → [[Clever Phishing Attack Bypasses MFA to Nab Microsoft Office 365 Credentials|https://threatpost.com/phishing-campaign-allows-for-mfa-bypass-on-office-365/155864/]]|O365 Phishing MFA|
|2020.05.20|infoRisk Today| → [[Phishing Attack Bypassed Office 365 Multifactor Protections|https://www.inforisktoday.com/phishing-attack-bypassed-office-365-multifactor-protections-a-14310]]|O365 Phishing MFA|
|2020.05.18|//DivvyCloud//|[[Podcast: Shifting Cloud Security Left With Infrastructure-as-Code|https://divvycloud.com/podcast-shifting-cloud-security-left-with-iac/]] ([[MP3|https://divvycloud.com/wp-content/uploads/2020/05/divvycloud_2020-05-12T12_16_18-07_00.mp3]])|Podcast Infrastructure-as-Code|
|2020.05.18|//Palo Alto Networks//|[[Why DevOps Needs to Change Security: The Move to DevSecOps|https://blog.paloaltonetworks.com/2020/05/cloud-devops-needs-to-change-security/]]|DevSecOps|
|2020.05.18|//Sophos//|[[Shiny new Azure login attracts shiny new phishing attacks|https://nakedsecurity.sophos.com/2020/05/18/shiny-new-azure-login-attracts-shiny-new-phishing-attacks/]]|Phishing Azure|
|2020.05.18|//SonaType//|[[SaltStack: 20 Breaches Within Four Days|https://blog.sonatype.com/saltstack-20-breaches-within-four-days]]|Salt Data_breaches|
|>|>|>|!2020.05.14|
|2020.05.14|//Oracle//|![[New Study: IT Pros Are More Worried About Corporate Security than Home Security|https://www.oracle.com/corporate/pressrelease/cloud-threat-report-2020-051420.html]] ([[rapport PDF|https://www.oracle.com/a/ocom/docs/cloud/oracle-cloud-threat-report-2020.pdf]])|Report Threats|
|2020.05.14|//Oracle//| → [[Enabling a Security-First Culture with the Oracle and KPMG Cloud Threat Report|https://blogs.oracle.com/cloudsecurity/intro-to-ctr-20-report]]|Report Threats|
|2020.05.21|MSSP Alert| → [[Cloud Cybersecurity Research: Oracle, KPMG Findings|https://www.msspalert.com/cybersecurity-research/oracle-kpmg-threat-report/]]|Report Threats|
[>img(100px,auto)[iCSA/K4QCCSK.png]]Le [[Chapitre Français]] a le plaisir d'annoncer 3 sessions de formation officielle et ''certifiante'' [[CCSK]] ''en français''^^[img[iCSF/flag_fr.png]]^^ ''CCSK Foundation'' et le ''CCSK Plus''.
Outre celle déjà annoncée la semaine du 15 juin 2020, les 2 autres sessions auront lieu les semaines des 31 aout et 23 novembre 2020.
Elle comprennent tous les modules théoriques, ainsi que des exercices pratiques dans le cloud AWS (CCSK Plus), ainsi que la possibilité de passer l'examen de certification CCSK.
|!Dates|!Formation|!Tarif CSA|
|Lundi 15 et mardi 16 juin 2020|CCSK Foundation| 1.350 €HT|
|Lundi 15, mardi 16 et mercredi 17 juin 2020|CCSK Plus| 1.950 €HT|
|>|>|
|Lundi 31 août et mardi 1er septembre 2020|CCSK Foundation| 1.350 €HT|
|Lundi 31 août, mardi 1er et mercredi 2 septembre 2020|CCSK Plus| 1.950 €HT|
|>|>|
|Lundi 3 et mardi 24 novembre 2020|CCSK Foundation| 1.350 €HT|
|Lundi 3, mardi 24 et mercredi 25 novembre 2020|CCSK Plus| 1.950 €HT|
|>|>|
Elles seront toutes dispensées par ''Guillaume Boutisseau'', ''CCSK Authorized Instructor'' de la société [img(100px,auto)[iCSF/K4CSP.png][https://CloudSecurityPass.com/]]).

Les inscriptions sont ouvertes sur le site de CloudSecurityPass ⇒ ''[[CloudSecurityAlliance.fr/go/CSPass|http://CloudSecurityAlliance.fr/go/CSPass]]''
Pour toute information complémentaire, vous pouvez aussi nous contacter sur [img(200px,auto)[iCSF/Email-CSA_FR.png]]
!//Cloud Security Alliance Announces Agenda, Speaker Line-Up for CloudBytes Connect Virtual Conference//
[>img(300px,auto)[iCSA/K5QCB.png]]La CSA a finalisé la liste des présentations et des intervenants pour la conférence virtuelle ''CloudBytes Connect'' qui se tiendra les 26, 27 et 28 mai.
Cette conférence gratuite aura pour thème ''Virtual Roadmap: Guiding Your Journey to the Cloud''
Compte-tenu du décallage horaire, les sessions ''commenceront à 18h et se termineront à 22h''.
La participation donne droit à 4 crédits CPE, et un tirage au sort aura lieu chaque jour pour gagner un jeton pour passer l'examen CCSK.
A noter que toutes les présentations seront mises à disposition sur la plate-forme [[Circle]].
!Mardi 26 mai 2020 : "//Transitioning//"
//As organizations look to transition to the cloud, the road ahead can appear overwhelming. Sessions on this day will provide guidance and best practices for those just beginning their cloud journey.//
* 18h : "The Hits – and a Few Misses – in Vendor Security Assessments" par David Lenoe, Senior Director of Product Security, Adobe
* 19h : "Why Your Cloud Migration Needs a New Approach to Security and Governance" par Brendan Hannigan, CEO & co-founder, Sonrai Security 
* 20h : "An Interview with Sophos: Navigating cloud security" avec Richard Beckett, Senior Product Marketing Manager, Sophos et Ganesh Krishnan, Public Cloud Security Group VP of Engineering, Sophos
* 21h : "Don’t let the Attackers Weaponize Fear: Malware in the time of COVID-19" par Diana Kelley, Cybersecurity Field CTO, Microsoft
!Mercredi 27 mai 2020 : "//Enhancing//"
//For organizations with established cloud environments, enhancing security is the first line of defense against critical threats and the next step on the path towards a trusted cloud.//
* 18h : Keynote Session with IBM, avec Christopher Bontempo, VP Security Marketing, Routes and Offerings, North America, IBM Security et Patrick Vowles, Team Lead for North America Marketing, IBM Security
* 19h : "Secure your Cloud Investment by Unlocking the Network as a Data Source", par Ryan Davis, Senior Cloud Product Manager, ExtraHop
* 20h : "Enhance Security and Operational Efficiency with CASB" par Itir Clarke, Senior Product Marketing Manager, Proofpoint
* 21h : "SDP – The Yellow Brick Road to Zero Trust" par Juanita Koilpillai, Founder and CEO, Waverley Labs LLC
!Jeudi 28 mai 2020 : "//Innovating//"
//Reliance on cloud technology brings concerns about system breaches, privacy, shared responsibility, and compliance with regulations. Organizations with mature cloud environments must look beyond today's threats and develop innovative security solutions to address the needs of tomorrow's cloud.//
* 18h : "Cyber Risk Exchanges: Mastering a New Approach to Vendor Risk & Performance Monitoring" par Randy Ferree, Third-Party Risk Consultant, OneTrust Vendorpedia
* 19h : "How to Future-Proof the Cloud, from the POV of a leading food delivery app’s CISO, ethical hacker, and cloud security expert", par Peter Blanks, Chief Product Officer & Head of Engineering, Synack et Kevin Fielder, CISO, Just Eat
* 20h : "Innovative Enterprise Architecture Techniques to Complete your Digital Transformation" par Jon-Michael Brook, Principal: Security, Cloud & Privacy, Guide Holdings LLC
* 21h : "DLT Security Framework for the Finance Industry" par Williams Izzo, Director of Security Technology, Depository Trust & Clearing Corporation (DTCC); Jyoti Ponnapalli, DLT Lead, Depository Trust & Clearing Corporation (DTCC); et Kurt Seifried, Chief Blockchain Officer, CSA

__Détails :__
* Annonce ⇒ ''[[CloudSecurityAlliance.fr/go/k5ja/|https://CloudSecurityAlliance.fr/go/k5ja/]]''
* Inscriptions &Arr; ''[[CloudSecurityAlliance.fr/go/k5ji/|https://CloudSecurityAlliance.fr/go/k5ji/]]''
[img[iCSF/flag_fr.png]]^^oc^^[img(50%,1px)[iCSF/BluePixel.gif]]
|[img(30px,auto)[iCSF/Francais.gif]] @@color:#00F;font-size:125%;__[[Version française|2020.05.17 - Newsletter Hebdomadaire - #64]]__@@ |[img(30px,auto)[iCSF/Anglais.gif]] @@color:#00F;font-size:125%;__[[English version|2020.05.17 - Weekly Newsletter - #64]]__@@ |
|<<tiddler [[2020.05.17 - Newsletter Hebdomadaire - #64]]>> |<<tiddler [[2020.05.17 - Weekly Newsletter - #64]]>> |
!Newsletter Hebdomadaire Cloud et Sécurité - 11 au 17 mai 2020
!!1 - Nouveautés CSA et Informations
* Publication ''CSA'' : rappel de la disponibilité de la traduction en français des 3 documents CCM v3.0.1, CAIQ v3.0.1 et PLC CoC v3.1+++*[»]> <<tiddler [[2020.05.07 - Publication : Traduction française des documents CCM, CAIQ et PLA CoC]]>>=== 
* Appels à commentaires ''CSA'' : document ''Mobile Application Security Testing - Sum-Up & Landscape Overview''+++*[»]> <<tiddler [[2020.05.08 - Appel à commentaires : 'Mobile Application Security Testing - Sum-Up & Landscape Overview']]>>=== (8 juin)
* Sondage CSA : impact de la pandémie actuelle sur l'emploi dans le secteur de la cybersécurité, les résultats+++*[»]> <<tiddler [[2020.05.14 - Résultats du sondage CSA sur l'impact de la pandémie actuelle sur l'emploi]]>>=== 
!!2 - Veille Web Cloud et Sécurité
La [[Veille Web|2020.05.17 - Veille Hebdomadaire - 17 mai]] avec plus de 40 liens
* Rapports : Bitsight+++*[»] 
|2020.05.15|//Bitsight//|[[Report Shows Cyber Attacks on Cloud Services Have Doubled|https://www.bitsight.com/blog/report-shows-cyber-attacks-on-cloud-services-have-doubled]]|Report|
=== 
* Attaques : Office 365 dans le viseur+++*[»] 
|2020.05.15|Bleeping Computer|[[Microsoft Office 365 ATP getting malware campaign analysis|https://www.bleepingcomputer.com/news/security/microsoft-office-365-atp-getting-malware-campaign-analysis/]]|O365_ATP|
|2020.05.14|Bleeping Computer|[[New Microsoft 365 sign-in pages already spoofed for phishing|https://www.bleepingcomputer.com/news/security/new-microsoft-365-sign-in-pages-already-spoofed-for-phishing/]]|O365 Phishing|
|2020.05.11|//Armorblox//|[[Blox Tales #4: Vendor Email Fraud + Office 365 Credential Phishing|https://www.armorblox.com/blog/blox-tales-4-vendor-email-fraud-office-365-credential-phishing/]]|O365 Phishing|
===, analyse pour SaltStack+++*[»] 
|2020.05.11|//Intezer//|[[Exploitation of SaltStack Vulnerabilities Signals Increase in Cloud Server Attacks|https://intezer.com/blog/cloud-security-blog/exploitation-of-saltstack-vulnerabilities-signals-increase-in-cloud-server-attacks/]]|Salt CVE-2020-11651 CVE-2020-11652|
===, exemple de protections+++*[»] 
|2020.05.12|//Radware//|[[How to Protect Applications from Cloud-Based Attacks|https://blog.radware.com/security/cloudsecurity/2020/05/how-to-protect-applications-from-cloud-based-attacks/]]|Protection|
=== 
* Acquisitions : Idaptative par CyberArk+++*[»] 
|2020.05.13|Dark Reading|[[CyberArk Acquires Idaptive for Identity-as-a-Service Tech|https://www.darkreading.com/cloud/cyberark-acquires-idaptive-for-identity-as-a-service-tech/d/d-id/1337805]]|Acquisition|
===, Jetstack par Venafi+++*[»] 
|2020.05.14|//Venafi//|[[More cybersecurity consolidation: Venafi acquires Kubernetes startup Jetstack|https://siliconangle.com/2020/05/14/cybersecurity-consolidation-venafi-acquires-kubernetes-startup-jetstack/]]|Acquisition|
|2020.05.15|Security Week| → [[Venafi Acquires Kubernetes Services Provider Jetstack|https://www.securityweek.com/venafi-acquires-kubernetes-services-provider-jetstack]]|Acquisition|
===, Octarine par VMware+++*[»] 
|2020.05.13|ZDnet|[[VMware to acquire Kubernetes security platform Octarine)|https://www.zdnet.com/article/vmware-to-acquire-kubernetes-security-platform-octarine/]]|Acquisition|
|2020.05.14|Security Week| → [[VMware to Acquire Kubernetes Security Firm Octarine|https://www.securityweek.com/vmware-acquire-kubernetes-security-firm-octarine]]|Acquisition|
=== 
* Divers : Containers+++*[»] 
|2020.05.15|//Palo Alto Networks//|[[Containers Are Inherently Secure: Reality or Myth?|https://blog.paloaltonetworks.com/2020/05/containers-are-inherently-secure-reality-or-myth/]]|Containers|
=== et maturité+++*[»] 
|2020.05.16|//StackRox//|![[Guide to Evaluating Your Container Security Maturity|https://www.stackrox.com/post/2020/05/guide-to-evaluating-your-container-security-maturity/]]|Containers Maturity|
===, Kubernetes+++*[»] 
|2020.05.15|//StackRox//|![[Kubernetes Security 101: Risks and 29 Best Practices|https://www.stackrox.com/post/2020/05/kubernetes-security-101/]]|Kubernetes Risks Best_Practices|
===, workloads+++*[»] 
|2020.05.15|//Palo Alto Networks//|![[Gartner Market Guide for Cloud Workload Protection Platforms: Key Takeaways|https://blog.paloaltonetworks.com/2020/05/cloud-2020-guide-cloud-workload-protection-2/]] ([[Guide gartner|https://start.paloaltonetworks.com/gartner-market-guide-cwpp.html]])|Gartner Workloads|
|2020.05.12|//Microsoft Azure//|[[Monitor your Azure workload compliance with Azure Security Benchmark|https://azure.microsoft.com/blog/monitor-your-azure-workload-compliance-with-azure-security-benchmark/]]|Azure Compliance|
===, malveillance liée au COVID-19+++*[»] 
|2020.05.11|//Palo Alto Networks//|[[COVID-19 Themed Malware Within Cloud Environments|https://unit42.paloaltonetworks.com/covid-19-themed-malware-within-cloud-environments/]]|Malware COVID-19|
=== 
!!3 - Agenda
* 26 au 28 mai : visio-conférences CSA '''CloudBytes Connect Virtual Conference'''
* 9 au 12 juin : visio-conférences CSA '''Virtual EU Summit'''
* 15 au 17 juin : formation ''CCSK en français'' (les inscriptions sont ouvertes)

|ssTabl96|k
|!⇒ [[CloudSecurityAlliance.fr/go/K5H/|https://CloudSecurityAlliance.fr/go/K5H/]] |
!Weekly Cloud and Security Watch Newsletter - May 11th to 17th[>img[iCSF/inEnglish.png]]
!!1 - CSA News and Updates
* Publication: Reminder of the availability of the translation in 10 different languages of the ''CCM'', ''CAIQ'' and ''PLA CoC'' documents+++*[»]> <<tiddler [[2020.05.07 - Publication : Traduction française des documents CCM, CAIQ et PLA CoC]]>>=== 
* Call for comments for a CSA document: 'Mobile Application Security Testing - Sum-Up & Landscape Overview'+++*[»]> <<tiddler [[2020.05.08 - Appel à commentaires : 'Mobile Application Security Testing - Sum-Up & Landscape Overview']]>>=== before June 8th
* Results of the COVID-19 Workforce Impact CSA Survey+++*[»]> <<tiddler [[2020.05.14 - Résultats du sondage CSA sur l'impact de la pandémie actuelle sur l'emploi]]>>=== 
!!2 - Cloud and Security News Watch
[[Over 40 links|2020.05.17 - Veille Hebdomadaire - 17 mai]]
* Reports: Bitsight+++*[»] 
|2020.05.15|//Bitsight//|[[Report Shows Cyber Attacks on Cloud Services Have Doubled|https://www.bitsight.com/blog/report-shows-cyber-attacks-on-cloud-services-have-doubled]]|Report|
=== 
* Attacks: Office/Microsoft 365 targeted+++*[»] 
|2020.05.15|Bleeping Computer|[[Microsoft Office 365 ATP getting malware campaign analysis|https://www.bleepingcomputer.com/news/security/microsoft-office-365-atp-getting-malware-campaign-analysis/]]|O365_ATP|
|2020.05.14|Bleeping Computer|[[New Microsoft 365 sign-in pages already spoofed for phishing|https://www.bleepingcomputer.com/news/security/new-microsoft-365-sign-in-pages-already-spoofed-for-phishing/]]|O365 Phishing|
|2020.05.11|//Armorblox//|[[Blox Tales #4: Vendor Email Fraud + Office 365 Credential Phishing|https://www.armorblox.com/blog/blox-tales-4-vendor-email-fraud-office-365-credential-phishing/]]|O365 Phishing|
===; SaltStack vulnerabilities exploitation,+++*[»] 
|2020.05.11|//Intezer//|[[Exploitation of SaltStack Vulnerabilities Signals Increase in Cloud Server Attacks|https://intezer.com/blog/cloud-security-blog/exploitation-of-saltstack-vulnerabilities-signals-increase-in-cloud-server-attacks/]]|Salt CVE-2020-11651 CVE-2020-11652|
===; sample protections+++*[»] 
|2020.05.12|//Radware//|[[How to Protect Applications from Cloud-Based Attacks|https://blog.radware.com/security/cloudsecurity/2020/05/how-to-protect-applications-from-cloud-based-attacks/]]|Protection|
=== 
* Acquisitions: Idaptative by CyberArk+++*[»] 
|2020.05.13|Dark Reading|[[CyberArk Acquires Idaptive for Identity-as-a-Service Tech|https://www.darkreading.com/cloud/cyberark-acquires-idaptive-for-identity-as-a-service-tech/d/d-id/1337805]]|Acquisition|
===; Jetstack by Venafi+++*[»] 
|2020.05.14|//Venafi//|[[More cybersecurity consolidation: Venafi acquires Kubernetes startup Jetstack|https://siliconangle.com/2020/05/14/cybersecurity-consolidation-venafi-acquires-kubernetes-startup-jetstack/]]|Acquisition|
|2020.05.15|Security Week| → [[Venafi Acquires Kubernetes Services Provider Jetstack|https://www.securityweek.com/venafi-acquires-kubernetes-services-provider-jetstack]]|Acquisition|
===; Octarine by VMware+++*[»] 
|2020.05.13|ZDnet|[[VMware to acquire Kubernetes security platform Octarine)|https://www.zdnet.com/article/vmware-to-acquire-kubernetes-security-platform-octarine/]]|Acquisition|
|2020.05.14|Security Week| → [[VMware to Acquire Kubernetes Security Firm Octarine|https://www.securityweek.com/vmware-acquire-kubernetes-security-firm-octarine]]|Acquisition|
=== 
* Miscellaneous: Containers+++*[»] 
|2020.05.15|//Palo Alto Networks//|[[Containers Are Inherently Secure: Reality or Myth?|https://blog.paloaltonetworks.com/2020/05/containers-are-inherently-secure-reality-or-myth/]]|Containers|
=== and maturity+++*[»] 
|2020.05.16|//StackRox//|![[Guide to Evaluating Your Container Security Maturity|https://www.stackrox.com/post/2020/05/guide-to-evaluating-your-container-security-maturity/]]|Containers Maturity|
===, Kubernetes Risks and Best Practices+++*[»] 
|2020.05.15|//StackRox//|![[Kubernetes Security 101: Risks and 29 Best Practices|https://www.stackrox.com/post/2020/05/kubernetes-security-101/]]|Kubernetes Risks Best_Practices|
===; Workloads+++*[»] 
|2020.05.15|//Palo Alto Networks//|![[Gartner Market Guide for Cloud Workload Protection Platforms: Key Takeaways|https://blog.paloaltonetworks.com/2020/05/cloud-2020-guide-cloud-workload-protection-2/]] ([[Guide gartner|https://start.paloaltonetworks.com/gartner-market-guide-cwpp.html]])|Gartner Workloads|
|2020.05.12|//Microsoft Azure//|[[Monitor your Azure workload compliance with Azure Security Benchmark|https://azure.microsoft.com/blog/monitor-your-azure-workload-compliance-with-azure-security-benchmark/]]|Azure Compliance|
===;, COVID-19 Themed Malware+++*[»] 
|2020.05.11|//Palo Alto Networks//|[[COVID-19 Themed Malware Within Cloud Environments|https://unit42.paloaltonetworks.com/covid-19-themed-malware-within-cloud-environments/]]|Malware COVID-19|
=== 
!!3 - Agenda
* May 26th-28th: online CSA '''CloudBytes Connect Virtual Conference'''
* June 9th-12th: online CSA '''Virtual EU Summit'''
* June 15th-17th: CCSK training ''in French'' (open for registration)

|ssTabl96|k
|!⇒ [[CloudSecurityAlliance.fr/go/K5H/|https://CloudSecurityAlliance.fr/go/K5H/]] |
|!Mai|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2020.05.16|
|2020.05.16|Madhu Akula|[[Dockerfile Security Checks using OPA Rego Policies with Conftest|https://blog.madhuakula.com/dockerfile-security-checks-using-opa-rego-policies-with-conftest-32ab2316172f?gi=67f151885ed0]]|Tools Docker|
|2020.05.16|//Microsoft//|![[DevSecOps in Azure|https://docs.microsoft.com/en-us/azure/architecture/solution-ideas/articles/devsecops-in-azure]]|Azure DevSecOps|
|2020.05.16|//StackRox//|![[Guide to Evaluating Your Container Security Maturity|https://www.stackrox.com/post/2020/05/guide-to-evaluating-your-container-security-maturity/]]|Containers Maturity|
|>|>|>|!2020.05.15|
|2020.05.15|Bleeping Computer|[[Microsoft Office 365 ATP getting malware campaign analysis|https://www.bleepingcomputer.com/news/security/microsoft-office-365-atp-getting-malware-campaign-analysis/]]|O365_ATP|
|2020.05.15|Security Week|[[NortonLifeLock Releases Free Tool for Detecting Bots on Twitter|https://www.securityweek.com/nortonlifelock-releases-free-tool-detecting-bots-twitter]]|Botnets|
|2020.05.15|Help Net Security|[[Educational organizations use cloud apps to share sensitive data outside of IT control|https://www.helpnetsecurity.com/2020/05/15/educational-organizations-cloud-apps/]]|Survey|
|2020.05.15|Dark Reading|[[8 Supply Chain Security Requirements|https://www.darkreading.com/edge/theedge/8-supply-chain-security-requirements/b/d-id/1337820]]||
|2020.05.15|//StackRox//|![[Kubernetes Security 101: Risks and 29 Best Practices|https://www.stackrox.com/post/2020/05/kubernetes-security-101/]]|Kubernetes Risks Best_Practices|
|2020.05.15|//Palo Alto Networks//|[[Containers Are Inherently Secure: Reality or Myth?|https://blog.paloaltonetworks.com/2020/05/containers-are-inherently-secure-reality-or-myth/]]|Containers|
|2020.05.15|//Palo Alto Networks//|![[Gartner Market Guide for Cloud Workload Protection Platforms: Key Takeaways|https://blog.paloaltonetworks.com/2020/05/cloud-2020-guide-cloud-workload-protection-2/]] ([[Guide gartner|https://start.paloaltonetworks.com/gartner-market-guide-cwpp.html]])|Gartner Workloads|
|2020.05.15|//Bitsight//|[[Report Shows Cyber Attacks on Cloud Services Have Doubled|https://www.bitsight.com/blog/report-shows-cyber-attacks-on-cloud-services-have-doubled]]|Report|
|>|>|>|!2020.05.14|
|2020.05.14|Dark Reading|[[As Businesses Rush to the Cloud, Security Teams Struggle to Keep Up|https://www.darkreading.com/cloud/as-businesses-rush-to-the-cloud-security-teams-struggle-to-keep-up/d/d-id/1337832]]|SecOps|
|2020.05.14|Dark Reading|[[79% of Companies Report Identity-Related Breach in Past Two Years|https://www.darkreading.com/operations/79--of-companies-report-identity-related-breach-in-past-two-years/d/d-id/1337824]]|Identity|
|2020.05.14|DZone|[[Why Do SaaS Applications Need Third-Party Backup?|https://dzone.com/articles/why-do-saas-applications-need-third-party-backup]]|SaaS Third_Party|
|2020.05.14|Bleeping Computer|[[New Microsoft 365 sign-in pages already spoofed for phishing|https://www.bleepingcomputer.com/news/security/new-microsoft-365-sign-in-pages-already-spoofed-for-phishing/]]|O365 Phishing|
|2020.05.14|Bleeping Computer|[[Free service simplifies encrypting and sharing confidential data|https://betanews.com/2020/05/14/voltshare-free-encryption/]]|Encryption|
|2020.05.14|//Nuageo[img[iCSF/flag_fr.png]]//|[[La face illuminée de la transformation numérique : Proposer une nouvelle façon de travailler|https://www.nuageo.fr/2020/05/transformation-numerique-facon-travailler/]]|Misc|
|2020.05.14|//Venafi//|[[More cybersecurity consolidation: Venafi acquires Kubernetes startup Jetstack|https://siliconangle.com/2020/05/14/cybersecurity-consolidation-venafi-acquires-kubernetes-startup-jetstack/]]|Acquisition|
|2020.05.15|Security Week| → [[Venafi Acquires Kubernetes Services Provider Jetstack|https://www.securityweek.com/venafi-acquires-kubernetes-services-provider-jetstack]]|Acquisition|
|2020.05.14|//JumpCloud//|[[Cloud LDAP for MSPs|https://jumpcloud.com/blog/cloud-ldap-msp]]|LDAP|
|2020.05.14|//FireEye//|[[FireEye Cloudvisory: Control center for multi-cloud security management|https://www.helpnetsecurity.com/2020/05/14/fireeye-cloudvisory-2/]]|CSPM|
|2020.05.14|//Caylent//|[[Kubernetes Pod Security Policies|https://caylent.com/kubernetes-pod-security-policies]]|Kubernetes Policy|
|>|>|>|!2020.05.13|
|2020.05.13|Help Net Security|[[How to implement least privilege in the cloud|https://www.helpnetsecurity.com/2020/05/13/least-privilege-cloud/]]|CSA Privileges|
|2020.05.13|Dark Reading|[[CyberArk Acquires Idaptive for Identity-as-a-Service Tech|https://www.darkreading.com/cloud/cyberark-acquires-idaptive-for-identity-as-a-service-tech/d/d-id/1337805]]|Acquisition|
|2020.05.13|DZone|[[AWS Transit Gateway Examined – Part II|https://dzone.com/articles/aws-transit-gateway-examined-part-ii]]|AWS|
|2020.05.13|ZDnet|[[VMware to acquire Kubernetes security platform Octarine)|https://www.zdnet.com/article/vmware-to-acquire-kubernetes-security-platform-octarine/]]|Acquisition|
|2020.05.14|Security Week| → [[VMware to Acquire Kubernetes Security Firm Octarine|https://www.securityweek.com/vmware-acquire-kubernetes-security-firm-octarine]]|Acquisition|
|>|>|>|!2020.05.12|
|2020.05.12|//Panorays//|[[What is the Consensus Assessments Initiative Questionnaire (CAIQ)? |https://www.panorays.com/blog/what-is-caiq/]]|CAIQ|
|2020.05.12|//Radware//|[[How to Protect Applications from Cloud-Based Attacks|https://blog.radware.com/security/cloudsecurity/2020/05/how-to-protect-applications-from-cloud-based-attacks/]]|Protection|
|2020.05.12|//Microsoft Azure//|[[Monitor your Azure workload compliance with Azure Security Benchmark|https://azure.microsoft.com/blog/monitor-your-azure-workload-compliance-with-azure-security-benchmark/]]|Azure Compliance|
|2020.05.12|//RhinoSecurity Labs//|[[CloudGoat AWS Scenario Walkthrough: "EC2_SSRF"|https://rhinosecuritylabs.com/cloud-security/cloudgoat-aws-scenario-ec2_ssrf/]]|AWS|
|2020.05.12|//Cloud Vector//|[[API Security Checklist: Secure API Design|https://www.cloudvector.com/api-security-checklist-secure-api-design/]] (1/2)|APIs|
|>|>|>|!2020.05.11|
|2020.05.11|Bleeping Computer|[[Office 365 to let regular users revoke encrypted messages|https://www.bleepingcomputer.com/news/microsoft/office-365-to-let-regular-users-revoke-encrypted-messages/]]|O365 Right_Management|
|2020.05.11|//Google Cloud//|[[The case of the missing DNS packets: a Google Cloud support story|https://cloud.google.com/blog/topics/inside-google-cloud/google-cloud-support-engineer-solves-a-tough-dns-case/]]|DNS|
|2020.05.11|//Google Cloud//|[[Using logging for your apps running on Kubernetes Engine|https://cloud.google.com/blog/products/management-tools/using-logging-your-apps-running-kubernetes-engine/]]|Kubernetes GCP|
|2020.05.11|//Intezer//|[[Exploitation of SaltStack Vulnerabilities Signals Increase in Cloud Server Attacks|https://intezer.com/blog/cloud-security-blog/exploitation-of-saltstack-vulnerabilities-signals-increase-in-cloud-server-attacks/]]|Salt CVE-2020-11651 CVE-2020-11652|
|2020.05.11|//Palo Alto Networks//|[[COVID-19 Themed Malware Within Cloud Environments|https://unit42.paloaltonetworks.com/covid-19-themed-malware-within-cloud-environments/]]|Malware COVID-19|
|2020.05.11|//Armorblox//|[[Blox Tales #4: Vendor Email Fraud + Office 365 Credential Phishing|https://www.armorblox.com/blog/blox-tales-4-vendor-email-fraud-office-365-credential-phishing/]]|O365 Phishing|
|2020.05.11|//Microsoft Azure//|[[Automating cybersecurity guardrails with new Zero Trust blueprint and Azure integrations|https://azure.microsoft.com/en-us/blog/automating-cybersecurity-guardrails-with-new-zero-trust-blueprint-and-azure-integrations/]]|Azure Zero_Trust|
|2020.05.11|//Microsoft Azure//|[[Use Azure Firewall for secure and cost-effective Windows Virtual Desktop protection|https://azure.microsoft.com/en-us/blog/use-azure-firewall-for-secure-and-cost-effective-windows-virtual-desktop-protection/]]|Firewalls|
|2020.05.11|//Palo Alto Networks//|[[Bridging the DevOps and Security Divide with DevSecOps|https://blog.paloaltonetworks.com/2020/05/cloud-devsecops/]]|DevSecOps|
|2020.05.11|//AT&T CyberSecurity//|[[Stories from the SOC - Office365 Credential Abuse|https://cybersecurity.att.com/blogs/security-essentials/stories-from-the-soc-office365-credential-abuse]]|O365 Credentials Abuse|
Jim Reavis a publié les premiers résultats du sondage CSA sur l'impact de la pandémie actuelle sur l'emploi.
Les principaux enseignements sont :
* 122 réponses
* 18% des entreprises font état de licenciements dans les équipes sécurité
* les domaines les plus impactés sont : forensique, administrtaion sécurité, sécurité dans les développements logiciels
* les roles les moins impactés : sécurité opérationnel et exploitation, audit et tests d'intrusionconformité

Tous les résultats sont accessibles uniquement sur [[Circle]], et uniquement sur [[Circle]]... Une bonne raison de s'y inscrire...

Les résultats du sondage ⇒ ''[[CloudSecurityAlliance.fr/go/k5es/|https://CloudSecurityAlliance.fr/go/k5es/]]'' 
|[img(30px,auto)[iCSF/Francais.gif]] @@color:#00F;font-size:125%;__[[Version française|2020.05.10 - Newsletter Hebdomadaire - #63]]__@@ |[img(30px,auto)[iCSF/Anglais.gif]] @@color:#00F;font-size:125%;__[[English version|2020.05.10 - Weekly Newsletter - #63]]__@@ |
|<<tiddler [[2020.05.10 - Newsletter Hebdomadaire - #63]]>> |<<tiddler [[2020.05.10 - Weekly Newsletter - #63]]>> |
!Newsletter Hebdomadaire Cloud et Sécurité - 4 au 10 mai 2020
!!1 - Nouveautés CSA et Informations
* Publication ''CSA'' : validation de la traduction en français des 3 documents CCM v3.0.1, CAIQ v3.0.1 et PLC CoC v3.1+++*[»]> <<tiddler [[2020.05.07 - Publication : Traduction française des documents CCM, CAIQ et PLA CoC]]>>=== 
* Publication ''CSA'' : glossaire sécurité industrielle 'IIoT et ICS'+++*[»]> <<tiddler [[2020.05.05 - Publication : Glossaire sécurité 'IIoT et ICS']]>>=== 
* Appels à commentaires ''CSA'' : document ''Telehealth data in the cloud''+++*[»]> <<tiddler [[2020.05.01 - Appel à commentaires : 'Telehealth data in the cloud']]>>=== (17 mai)
* Appels à commentaires ''CSA'' : document ''Mobile Application Security Testing - Sum-Up & Landscape Overview''+++*[»]> <<tiddler [[2020.05.08 - Appel à commentaires : 'Mobile Application Security Testing - Sum-Up & Landscape Overview']]>>=== (8 juin)
* Appels à commentaires ''NIST'' : SP 800-210 ''General Access Control Guidance for Cloud Systems''+++*[»]> <<tiddler [[2020.04.01 - Appel à commentaires : NIST 800-210 'General Access Control Guidance for Cloud Systems']]>>=== (15 mai)
* Webinar : '''Break the Top 10 Cloud Attack Kill Chains'''+++*[»]> <<tiddler [[2020.05.07 - Webinar : 'Break the Top 10 Cloud Attack Kill Chains']]>>=== 
* Sondage CSA : impact de la pandémie actuelle sur l'emploi dans le secteur de la cybersécurité+++*[»]> <<tiddler [[2020.05.06 - Sondage CSA sur l'impact de la pandémie actuelle sur l'emploi]]>>=== 
!!2 - Veille Web Cloud et Sécurité
La [[Veille Web|2020.05.10 - Veille Hebdomadaire - 10 mai]] avec plus de 50 liens dont :
* Alertes : Framework Salt (suite) et compromissions associées+++*[»] 
|2020.05.04|Salt Exploit|![[SaltStack CVE-2020-11651 and CVE-2020-11652 Attack|https://saltexploit.com/]]|Salt CVE-2020-11651 CVE-2020-11652|
|2020.05.04|IT News| → [[Cloud servers hacked via critical SaltStack vulnerabilities|https://www.itnews.com/article/3541721/cloud-servers-hacked-via-critical-saltstack-vulnerabilities.html]]|Salt CVE-2020-11651 CVE-2020-11652|
=== 
* Analyse : Escalade de provilège dans GCP+++*[»] 
|2020.05.05|//Rhino Security Labs//|[[Privilege Escalation in Google Cloud Platform – Part 1 (IAM)|https://rhinosecuritylabs.com/gcp/privilege-escalation-google-cloud-platform-part-1/]] (1/2)|GCP IAM|
|2020.05.05|//Rhino Security Labs//|[[Privilege Escalation in Google Cloud Platform – Part 2 (Non-IAM)|https://rhinosecuritylabs.com/cloud-security/privilege-escalation-google-cloud-platform-part-2/]] (2/2)|GCP IAM|
=== 
* Rapport : VMware sur Kubernetes+++*[»] 
|2020.05.08|//VMware//|[[State of Kubernetes 2020 Report|https://k8s.vmware.com/state-of-kubernetes-2020/]]|Report Kubernetes|
|2020.05.08|Container Journal| → [[VMware Releases State of Kubernetes 2020 Report|https://containerjournal.com/topics/container-ecosystems/vmware-releases-state-of-kubernetes-2020-report/]]|Report Kubernetes|
===, Palo Alto Networks sur la malveillance liée à COVID-19 dans le Cloud+++*[»] 
|2020.05.04|//Palo Alto Networks//|![[COVID-19: Cloud Threat Landscape|https://unit42.paloaltonetworks.com/covid-19-cloud-threat-landscape/]]|COVID-19 DNS Public_Cloud|
|2020.05.04|CIO Dive| → [[Malicious domains are floating around the cloud: Here's the threat to companies|https://www.ciodive.com/news/malicious-domains-coronavirus-cloud/577220/]]|COVID-19 DNS Public_Cloud|
|2020.05.06|Silicon FR[>img[iCSF/flag_fr.png]]| → [[Le cloud public, un nid à sites malveillants ?|https://www.silicon.fr/cloud-public-sites-malveillants-339209.html]]|COVID-19 DNS Public_Cloud|
=== 
* Divers : Suggestion de 5 groupes de travail CSA à rejoindre+++*[»] 
|2020.05.05|//Panorays//|![[5 Cloud Security Alliance Working Groups to Consider Joining|https://www.panorays.com/blog/5-cloud-security-alliance-working-groups-to-consider-joining/]]|CSA|
===; Forcepoint sur l'avenir de la sécurité du Cloud+++*[»] 
|2020.05.06|//Forcepoint//|[[The Future of Cloud Security is a Cloud-Powered One|https://www.forcepoint.com/blog/insights/cloud-powered-security-sase]]|SASE|
|2020.05.06|//Forcepoint//| → [[Voice of the CTO: The Future of Cloud Security|https://www.brighttalk.com/webcast/15527/404744?sf121706630=1]]|SASE|
===; Sandbox AWS+++*[»] 
|2020.05.05|//Aurum//|[[Creating an AWS Sandbox|https://www.stuffwithaurum.com/2020/05/05/creating-an-aws-sandbox/]]|AWS Sandbox|
=== 

|ssTabl96|k
|!⇒ [[CloudSecurityAlliance.fr/go/K5A/|https://CloudSecurityAlliance.fr/go/K5A/]] |
!Weekly Cloud and Security Watch Newsletter - May 4th to 10th[>img[iCSF/inEnglish.png]]
!!1 - CSA News and Updates
* Publication: Translation in 10 different languages of the ''CCM'', ''CAIQ'' and ''PLA CoC'' documents+++*[»]> <<tiddler [[2020.05.07 - Publication : Traduction française des documents CCM, CAIQ et PLA CoC]]>>=== 
* Publication: Cloud IIoT - ICS Glossary"+++*[»]> <<tiddler [[2020.05.05 - Publication : Glossaire sécurité 'IIoT et ICS']]>>=== 
* Call for comments for a CSA document: ''Telehealth data in the cloud''+++*[»]> <<tiddler [[2020.05.01 - Appel à commentaires : 'Telehealth data in the cloud']]>>=== before May 17^^th^^
* Call for comments for a CSA document: 'Mobile Application Security Testing - Sum-Up & Landscape Overview'+++*[»]> <<tiddler [[2020.05.08 - Appel à commentaires : 'Mobile Application Security Testing - Sum-Up & Landscape Overview']]>>=== before June 8^^th^^
* Call for comments for a NIST document: SP 800-210 'General Access Control Guidance for Cloud Systems'+++*[»]> <<tiddler [[2020.04.01 - Appel à commentaires : NIST 800-210 'General Access Control Guidance for Cloud Systems']]>>=== 
* Webinar: '''Break the Top 10 Cloud Attack Kill Chains'''+++*[»]> <<tiddler [[2020.05.07 - Webinar : 'Break the Top 10 Cloud Attack Kill Chains']]>>=== 
!Cloud and Security News Watch
[[Over 50 links|2020.05.10 - Veille Hebdomadaire - 10 mai]] among which:
* Alerts: Salt Framework (folow-up) and related compromises+++*[»]>
|2020.05.04|Salt Exploit|![[SaltStack CVE-2020-11651 and CVE-2020-11652 Attack|https://saltexploit.com/]]|Salt CVE-2020-11651 CVE-2020-11652|
=== 
* Analysis: Privilege escalation in GCP+++*[»]>
|2020.05.05|//Rhino Security Labs//|[[Privilege Escalation in Google Cloud Platform – Part 1 (IAM)|https://rhinosecuritylabs.com/gcp/privilege-escalation-google-cloud-platform-part-1/]] (1/2)|GCP IAM|
|2020.05.05|//Rhino Security Labs//|[[Privilege Escalation in Google Cloud Platform – Part 2 (Non-IAM)|https://rhinosecuritylabs.com/cloud-security/privilege-escalation-google-cloud-platform-part-2/]] (2/2)|GCP IAM|
=== 
* Reports: VMware about Kubernetes+++*[»]>
|2020.05.08|//VMware//|[[State of Kubernetes 2020 Report|https://k8s.vmware.com/state-of-kubernetes-2020/]]|Report Kubernetes|
===, Palo Alto Networks on COVID-19 related threats in the public Cloud+++*[»] 
|2020.05.04|//Palo Alto Networks//|![[COVID-19: Cloud Threat Landscape|https://unit42.paloaltonetworks.com/covid-19-cloud-threat-landscape/]]|COVID-19 DNS Public_Cloud|
|2020.05.04|CIO Dive| → [[Malicious domains are floating around the cloud: Here's the threat to companies|https://www.ciodive.com/news/malicious-domains-coronavirus-cloud/577220/]]|COVID-19 DNS Public_Cloud|
=== 
* Miscellaneous: 5 CSA WG to consider joining+++*[»]>
|2020.05.05|//Panorays//|![[5 Cloud Security Alliance Working Groups to Consider Joining|https://www.panorays.com/blog/5-cloud-security-alliance-working-groups-to-consider-joining/]]|CSA|
===, Forcepoint on the future of Cloud Security+++*[»]>
|2020.05.06|//Forcepoint//|[[The Future of Cloud Security is a Cloud-Powered One|https://www.forcepoint.com/blog/insights/cloud-powered-security-sase]]|SASE|
|2020.05.06|//Forcepoint//| → [[Voice of the CTO: The Future of Cloud Security|https://www.brighttalk.com/webcast/15527/404744?sf121706630=1]]|SASE|
===; AWS Sandbox+++*[»]>
|2020.05.05|//Aurum//|[[Creating an AWS Sandbox|https://www.stuffwithaurum.com/2020/05/05/creating-an-aws-sandbox/]]|AWS Sandbox|
=== 

|ssTabl96|k
|!⇒ [[CloudSecurityAlliance.fr/go/K5A/|https://CloudSecurityAlliance.fr/go/K5A/]] |
|!Mai|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2020.05.10|
|2020.05.10|//XM Cyber//|[[How Pizza Can Be the Recipe to Understand Cloud Security|https://xmcyber.com/how-pizza-can-be-the-recipe-to-understand-cloud-security-2/]]|Misc|
|2020.05.10|//Managed Sentinel//|![[Azure Advanced Threat Protection (ATP) Design|https://www.managedsentinel.com/2020/05/10/azure-atp-design/]]|Azure_ATP|
|>|>|>|!2020.05.09|
|2020.05.09|Chris Farris|[[Adventures in Cloud Inventory|https://www.chrisfarris.com/post/adventures-in-cloud-inventory/]]|Inventory|
|>|>|>|!2020.05.08|
|2020.05.08|Dark Reading|[[As Remote Work Becomes the Norm, Security Fight Moves to Cloud, Endpoints|https://www.darkreading.com/cloud/as-remote-work-becomes-the-norm-security-fight-moves-to-cloud-endpoints/d/d-id/1337774]]|Survey Gartner|
|2020.05.08|Dark Reading|[[Why DevSecOps Is Critical for Containers and Kubernetes|https://www.darkreading.com/cloud/why-devsecops-is-critical-for-containers-and-kubernetes/a/d-id/1337735]]|DevSecOps|
|2020.05.08|Help Net Security|[[BlueCat Adaptive DNS gives network teams visibility over AWS resources and threat protection|https://www.helpnetsecurity.com/2020/05/08/bluecat-adaptive-dns/]]|AWS DNS Visibility|
|2020.05.08|//Amazon AWS//|[[Enabling AWS Security Hub integration with AWS Chatbot|https://aws.amazon.com/blogs/security/enabling-aws-security-hub-integration-with-aws-chatbot/]]|AWS_Security_Hub|
|2020.05.08|//VMware//|[[State of Kubernetes 2020 Report|https://k8s.vmware.com/state-of-kubernetes-2020/]]|Report Kubernetes|
|2020.05.08|Container Journal| → [[VMware Releases State of Kubernetes 2020 Report|https://containerjournal.com/topics/container-ecosystems/vmware-releases-state-of-kubernetes-2020-report/]]|Report Kubernetes|
|2020.05.08|//Threatpost//|[[Podcast: Shifting Cloud Security Left With Infrastructure-as-Code|https://threatpost.com/podcast-shifting-left-with-infrastructure-as-code/155546/]] ([[podcast .mp3|http://traffic.libsyn.com/digitalunderground/DivvyCloud_Sponsored_Podcast_Final.mp3]])|Podcast IaC|
|2020.05.08|//Digital Ocean//|[[How to manage Secrets in Kubernetes environment|https://medium.com/faun/introduction-2139c9df7cce]]|Secrets Kubernetes|
|2020.05.08|//N2WS//|[[Backup and restore on AWS is a nightmare – is there a way to speed it up?|https://www.theregister.co.uk/2020/05/08/speed_up_aws_backup/]] ([[futur Webcast le 28 mai|https://whitepapers.theregister.co.uk/paper/view/8720/how-to-simplify-data-protection-on-amazon-web-services?td=promo1]])|AWS Backup|
|>|>|>|!2020.05.07|
|2020.05.07|PaperMtn|[[Slack Watchman - Monitoring Slack workspaces for sensitive information|https://papermtn.co.uk/slack-watchman-monitoring-slack-workspaces-for-sensitive-information/]]|[[Tools|GitHub-Outils]]|
|2020.05.07|//Amazon AWS//|![[AWS Foundational Security Best Practices standard now available in Security Hub|https://aws.amazon.com/blogs/security/aws-foundational-security-best-practices-standard-now-available-security-hub/]]|Best_Practices AWS|
|2020.05.07|//Shared Assessments//|[[Regulatory Consistency in Cloud Due Diligence Guidance|https://sharedassessments.org/blog/regulatory-consistency-in-cloud-due-diligence-guidance/]]|Regulations|
|2020.05.07|//Park My Cloud//|[[Use this Azure IAM Checklist When You Add New Users|https://www.parkmycloud.com/blog/azure-iam/]]|Azure IAM|
|2020.05.07|//Uptycs//|[[Harnessing the AWS Nitro Architecture to Encrypt Inter-Node Traffic in Kubernetes|https://www.uptycs.com/blog/harnessing-the-aws-nitro-architecture-to-encrypt-inter-node-traffic-in-kubernetes]]|AWS Kubernetes|
|>|>|>|!2020.05.06|
|2020.05.06|NextGov|[[Homeland Security’s Biometrics Database Is on Its Way to the Amazon Cloud|https://www.nextgov.com/it-modernization/2020/05/homeland-securitys-biometrics-database-its-way-amazon-cloud/165186/]]|Misc|
|2020.05.06|SecureCloudBlog|[[Project Log 0: Automating Azure Security Reports With AZSK, NodeJS and PS|https://securecloud.blog/2020/05/06/project-log-0-automating-azure-security-reports-with-azsk-nodejs-and-ps/]]|Azure Reporting|
|2020.05.06|//Forcepoint//|[[The Future of Cloud Security is a Cloud-Powered One|https://www.forcepoint.com/blog/insights/cloud-powered-security-sase]]|SASE|
|2020.05.06|//Forcepoint//| → [[Voice of the CTO: The Future of Cloud Security|https://www.brighttalk.com/webcast/15527/404744?sf121706630=1]]|SASE|
|2020.05.06|//Capsule8//|[[Security Delusions Part 2: Modern Monsters|https://capsule8.com/blog/security-delusions-part-2-modern-monsters/]] (2/3)|Misc|
|2020.05.06|//Netskope//|[[AWS: Improve CloudTrail Logging for Assumed Role Actions|https://www.netskope.com/blog/aws-improve-cloudtrail-logging-for-assumedrole-actions]]|AWS Logging|
|2020.05.06|//Proact//|[[Proact BaaS-O365: A backup and recovery service for Microsoft Office 365 users|https://www.helpnetsecurity.com/2020/05/06/proact-baas-o365/]]|O365 BaaS|
|2020.05.06|//Cobalt.io//|[[Pentest as a Service (PtaaS) Impact Report 2020|https://blog.cobalt.io/pentest-as-a-service-ptaas-impact-report-2020-businesses-are-expanding-pentesting-scope-and-e0d7cd035c2b]]|Vulnerabilities|
|>|>|>|!2020.05.05|
|2020.05.05|SANS|[[Cloud Security Features Don't Replace the Need for Personnel Security Capabilities|https://isc.sans.edu/forums/diary/Cloud+Security+Features+Dont+Replace+the+Need+for+Personnel+Security+Capabilities/26088/]]|Misc|
|2020.05.05|SANS| → [[Commentaires|https://isc.sans.edu/forums/diary/Cloud+Security+Features+Dont+Replace+the+Need+for+Personnel+Security+Capabilities/26088/]]|Misc|
|2020.05.05|CloudTweaks|[[Episode 4: The Power of Regulatory Compliant Cloud: A European Case Study|https://cloudtweaks.com/2020/05/episode-4-power-of-regulatory-compliant-cloud-european-case-study/]]|COVID-19 Compliance|
|2020.05.05|//Panorays//|![[5 Cloud Security Alliance Working Groups to Consider Joining|https://www.panorays.com/blog/5-cloud-security-alliance-working-groups-to-consider-joining/]]|CSA|
|2020.05.05|//Rhino Security Labs//|[[Working-As-Intended: RCE to IAM Privilege Escalation in GCP Cloud Build|https://rhinosecuritylabs.com/gcp/iam-privilege-escalation-gcp-cloudbuild/]]|GCP Vulnerability|
|2020.05.05|//Rhino Security Labs//|[[Privilege Escalation in Google Cloud Platform – Part 1 (IAM)|https://rhinosecuritylabs.com/gcp/privilege-escalation-google-cloud-platform-part-1/]] (1/2)|GCP IAM|
|2020.05.05|//Rhino Security Labs//|[[Privilege Escalation in Google Cloud Platform – Part 2 (Non-IAM)|https://rhinosecuritylabs.com/cloud-security/privilege-escalation-google-cloud-platform-part-2/]] (2/2)|GCP IAM|
|2020.05.05|//KWNetApps//|[[Terraform AWS FIPS provider|https://blog.kwnetapps.com/terraform-aws-fips-provider/]]|AWS FIPS|
|2020.05.05|//Microsoft Azure//|[[Updates to Azure AD Conditional Access report-only mode, insights & reporting, and troubleshooting|https://techcommunity.microsoft.com/t5/azure-active-directory-identity/updates-to-azure-ad-conditional-access-report-only-mode-insights/ba-p/1257357]]|AzureAD|
|2020.05.05|//Microsoft Azure//|[[Azure Sphere Security Research Challenge Now Open|https://msrc-blog.microsoft.com/2020/05/05/azure-sphere-security-research-challenge/]]|Azure_Sphere|
|2020.05.05|//Microsoft Azure//|[[Azure Sphere Security Research Challenge |https://www.microsoft.com/en-us/msrc/azure-security-lab]]|Azure_Sphere|
|2020.05.06|Dark Reading| → [[Microsoft Challenges Security Researchers to Hack Azure Sphere|https://www.darkreading.com/threat-intelligence/microsoft-challenges-security-researchers-to-hack-azure-sphere/d/d-id/1337739]]|Azure_Sphere|
|2020.05.05|//Aurum//|[[Creating an AWS Sandbox|https://www.stuffwithaurum.com/2020/05/05/creating-an-aws-sandbox/]]|AWS Sandbox|
|2020.05.05|//MalwareBytes//|[[Explained: cloud-delivered security|https://blog.malwarebytes.com/explained/2020/05/explained-cloud-delivered-security/]]|Misc|
|2020.05.05|//Netskope//|[[The Path of a Packet in a SASE Architecture|https://www.netskope.com/blog/the-path-of-a-packet-in-a-sase-architecture]]|SASE|
|2020.05.05|//Lastline//|[[You're One Cloud Misconfiguration Away from a Data Breach|https://www.lastline.com/blog/youre-one-cloud-misconfiguration-away-from-a-data-breach/]]|Misconfigurations|
|>|>|>|!2020.05.04|
|2020.05.04|Christophe Parisel|[[Key teleportation in Azure and AWS|https://www.linkedin.com/pulse/key-teleportation-azure-aws-christophe-parisel/]]|AWS Secret_Management|
|2020.05.04|Salt Exploit|![[SaltStack CVE-2020-11651 and CVE-2020-11652 Attack|https://saltexploit.com/]]|Salt CVE-2020-11651 CVE-2020-11652|
|2020.05.04|IT News| → [[Cloud servers hacked via critical SaltStack vulnerabilities|https://www.itnews.com/article/3541721/cloud-servers-hacked-via-critical-saltstack-vulnerabilities.html]]|Salt CVE-2020-11651 CVE-2020-11652|
|2020.05.06|//Aqua Security//| → [[Mitigating High Severity CVEs Affecting SaltStack on Public Clouds|https://blog.aquasec.com/saltstack-cve-2020-11651-cve-2020-11652]]|Salt CVE-2020-11651 CVE-2020-11652|
|2020.05.04|jdSupra|[[Critical Guidance for Financial Institutions on Security Considerations for Cloud Computing Environments|https://www.jdsupra.com/legalnews/critical-guidance-for-financial-33435/]]|Guidance|
|2020.05.04|FINRA|[[Regulatory Notice 20-12: FINRA Warns of Fraudulent Phishing Emails Purporting to be from FINRA|https://www.finra.org/rules-guidance/notices/20-12]]|Alert O365 Phishing|
|2020.05.04|ZDNet| → [[US financial industry regulator warns of widespread phishing campaign|https://www.zdnet.com/article/us-financial-industry-regulator-warns-of-widespread-phishing-campaign/]]|O365 Phishing|
|2020.05.04|//Palo Alto Networks//|![[COVID-19: Cloud Threat Landscape|https://unit42.paloaltonetworks.com/covid-19-cloud-threat-landscape/]]|COVID-19 DNS Public_Cloud|
|2020.05.04|CIO Dive| → [[Malicious domains are floating around the cloud: Here's the threat to companies|https://www.ciodive.com/news/malicious-domains-coronavirus-cloud/577220/]]|COVID-19 DNS Public_Cloud|
|2020.05.06|Silicon FR[>img[iCSF/flag_fr.png]]| → [[Le cloud public, un nid à sites malveillants ?|https://www.silicon.fr/cloud-public-sites-malveillants-339209.html]]|COVID-19 DNS Public_Cloud|
|2020.05.04|//SAP//|[[SAP addresses gaps in connection with its contractual cybersecurity infrastructure terms relating to certain parts of its cloud products|https://www.sap.com/investors/en/financial-news/ad-hoc-news/2020/05/1956485.html]]|SAP Vulnerabilities|
|2020.05.05|Reuters| → [[SAP discloses security lapses; says there was no data breach|https://www.reuters.com/article/us-sap-cyber/sap-discloses-security-lapses-says-there-was-no-data-breach-idUSKBN22H1CB]]|SAP Vulnerabilities|
|2020.05.06|//Forcepoint//| → [[SAP to Address Security Issues With Some Cloud Products and to Notify 440,000 Customers|https://gbhackers.com/sap-security-issues/]]|SAP Vulnerabilities|
!"//Mobile Application Security Testing - Sum-Up & Landscape Overview//"
La date limite pour transmettre les commentaires est le 8 juin 2020.
<<<
//Users place a good deal of trust in mobile app stores’ abilities to review, test, flag and block apps that exhibit undesirable behavior.
However, even with the best expertise and resources touted by the most popular and established app stores, and the extensive experience gained from testing and reviewing large numbers of mobile apps, malware still manages to slip through their defenses from time to time to make the headlines.
In 2016, with the aim to define a framework for secure mobile application development, achieving privacy and security by design, CSA’s Mobile Application Security Testing (MAST) WG previously worked on and released a MAST whitepaper.
Fast forward to 2020, in this summary paper, the WG strives to give readers an overview of the current MAST landscape, what the various mobile app stores are doing in terms of security review and testing of app submitted to them, popular app testing guides and tools.//
<<<
* Téléchargement (après inscription) ⇒ ''[[CloudSecurityAlliance.fr/go/k58a/|https://CloudSecurityAlliance.fr/go/k58a/]]''
!"//Break the Top 10 Cloud Attack Kill Chains//"
[>img(250px,auto)[iCSA/K57WB.png]]Webinar [[CloudBytes]] diffusé le 7 mai 2020 — Présenté par Rich Mogull, VP Product, disruptOps
<<<
//As cloud adoption matures, so do cloud attacks.
This session will highlight the top 10 cloud kill chains and how to break them.
The presenters will lay out each step of the chain, which are the easiest to snap, and which common security defenses work across multiple chains.//
<<<
&Arr; S'inscrire au Webinar de 60 minutes [[sur le site de BrightTALK|https://CloudSecurityAlliance.fr/go/k57w/]].
[>img(200px,auto)[iCSF/cloud-security-alliance-fr.png]]La [[Cloud Security Alliance]] a relancé sa demande de validation de la traduction de 3 outils majeurs ([[CCM]], [[CAIQ]] et [[PLA CoC|2018.06.04 - Publication : PLA Code of Conduct (CoC): Statement of Adherence Self-Assessment]] dans 10 langues : allemand, danois, espagnol, italien, japonais, néerlandais, portugais, roumain, suédois, et ... français.
Il s'agit de feuilles Excel dans lesquelles il vous est demandé de valider les traductions proposer, ou de les amender.
Pour chaque document à valider, ses 10 propositions de traduction sont dans un pacquet ZIP dédié. Ainsi, pour travailler sur la version française, il faut sélectionner le document commençant par "''FR-''"
Les 3 documents sont les suivants :
* "''Cloud Controls Matrix''" (CCM) : document "FR-CSA_CCM_v.3.0.1-09-01-2017_FINAL.xlsx"
: ⇒ ''[[CloudSecurityAlliance.fr/go/k57c/|https://cloudsecurityalliance.fr/go/k57c/]]''
* "''Consensus Assessments Initiative Questionnaire''" (CAIQ) : document "FR-CAIQ_v3.0.1-09-01-2017_FINAL.xlsx"
: ⇒ ''[[CloudSecurityAlliance.fr/go/k57q/|https://cloudsecurityalliance.fr/go/k57q/]]''
* "''Code of Conduct''" du "''Privacy Level Agreement''" (PLA CoC) : document "FR-CoC_GDPR_Annex_1_Compliance_Assessment_Template.xlsx"
: ⇒ ''[[CloudSecurityAlliance.fr/go/k57p/|https://cloudsecurityalliance.fr/go/k57p/]]''

Compte-tenu de l'ampleur de la tâche, un espace collaboratif va être mis en place sur la plateforme ''Circle''. Une bonne raison de la rejoindre, si ce n'est pas déjà fait.
Le CSA a lancé un sondage de 6 questions pour évaluer l'impact de la pandémie actuelle sur la cybersécurité et l'emploi.
Pour vous préparer à y répondre sur SurveyMonkey, voici la traduction en français des questions posées :
* Secteur d'activité de votre entreprise ?
* Dans quel pays résidez-vous actuellement?
* Quel est l'impact sur COVID-19 sur l'emploi dans votre entreprise dans le domaine de la cybersécurité ?
** Choix possibles : blocage des embauches, licenciements ou fin de contrats de prestatations, nouvelles embauches ou intégrations
* Si vous avez signalé des licenciements à la question précédente, quel est le pourcentage approximatif du personnel lié à la cybersécurité qui a été licencié?
* En cas de ralentissement économique prolongé, quels rôles ou fontions liées à la cybersécurité prévoyez-vous le plus susceptibles d'être réduits dans votre organisation? Sélectionnez jusqu'à 3 maximum (référene : "ISC2 2019 Workforce Study")
** Choix possibles : exploitation, administration, gestion des risques, conformité, sécurité des technologies opérationnelles, développement logiciel sécurisé, tests d'intrusion, analyse forensique
* Pour le personnel de cybersécurité qui n'est pas directement touché par les licenciements, quels sont, selon vous, les plus grands défis pour le reste de l'année 2020 et qui sont liés aux réductions ou gels budgétaires ?

Lien vers le sondage ⇒ https://www.surveymonkey.com/r/VNL966Y 
!"Cloud Security Alliance Releases Cloud Industrial Internet of Things (IIoT) - Industrial Control Systems Security Glossary"
[>img(150px,auto)[iCSA/K55PI.jpg]]Un communiqué de presse publié le 5 mai pour annoncer la publication du document "''Cloud Industrial Internet of Things (IIoT) - Industrial Control Systems Security Glossary''".
Il contient 39 termes et définitions et a pour vocation de servir de référence pour les autres travaux liés à la sécurisation du monde industriel.
<<<
//The Industrial Control Systems (ICS) Security Glossary is a reference document that brings together ICS and IT/OT related terms and definitions. Bringing together the terms and definitions in this document is meant to minimize misinterpretation and provide a common ICS and IT/OT language. A balance has been struck between length of the definitions and understandability with reliance on the reference source as the final arbiter. The goal is to provide a common language to communicate, understand, debate, conclude, and present the results of the ICS WG’s work. The intended audience is everyone from the Board to security staff inside an organization to customers and third-party suppliers including cloud service providers.//
<<<
__Liens :__
* Communiqué de presse ⇒ ''[[CloudSecurityAlliance.fr/go/k55c/|https://CloudSecurityAlliance.fr/go/k55c/]]''
* Document ⇒ ''[[CloudSecurityAlliance.fr/go/k55p/|https://CloudSecurityAlliance.fr/go/k55p/]]''
|[img(30px,auto)[iCSF/Francais.gif]] @@color:#00F;font-size:125%;__[[Version française|2020.05.03 - Newsletter Hebdomadaire - #62]]__@@ |[img(30px,auto)[iCSF/Anglais.gif]] @@color:#00F;font-size:125%;__[[English version|2020.05.03 - Weekly Newsletter - #62]]__@@ |
|<<tiddler [[2020.05.03 - Newsletter Hebdomadaire - #62]]>> |<<tiddler [[2020.05.03 - Weekly Newsletter - #62]]>> |
!Newsletter Hebdomadaire Cloud et Sécurité - 27 avril au 3 mai 2020
!!1 - Nouveautés CSA et Informations
* Blog : De l'importance d'être prêt quand survient une pandémie+++*[»]> <<tiddler [[2020.04.28 - Blog : De l'importance d'être prêt quand survient une pandémie]]>>=== 
* Blog : Qu'est ce qu'un 'Cloud Service Provider' ?+++*[»]> <<tiddler [[2020.04.30 - Blog : Qu'est ce qu'un 'Cloud Service Provider' ?]]>>=== 
* Blog : la sécurité génère la confiance+++*[»]> <<tiddler [[2020.04.30 - Blog : la sécurité génère la confiance]]>>=== 
* Appels à commentaires ''CSA'' : 'Hybrid Clouds and its Associated Risks'+++*[»]> <<tiddler [[2020.04.10 - Appel à commentaires : 'Hybrid Clouds and its Associated Risks']]>>=== (8 mai) et 'Telehealth data in the cloud'+++*[»]> <<tiddler [[2020.05.01 - Appel à commentaires : 'Telehealth data in the cloud']]>>=== (17 mai)
* Appels à commentaires ''NIST'' : SP 800-210 'General Access Control Guidance for Cloud Systems'+++*[»]> <<tiddler [[2020.04.01 - Appel à commentaires : NIST 800-210 'General Access Control Guidance for Cloud Systems']]>>=== (15 mai)
!!2 - Veille Web Cloud et Sécurité
La [[Veille Web|2020.05.03 - Veille Hebdomadaire - 3 mai]] avec plus de 40 liens dont :
* Alertes : Framework Salt+++*[»]>
|2020.04.30|//F-Secure labs//|![[SaltStack authorization bypass|https://labs.f-secure.com/advisories/saltstack-authorization-bypass]]|CVE-2020-11651 CVE-2020-11652|
|2020.04.30|//ThreatPost//| → [[Salt Bugs Allow Full RCE as Root on Cloud Servers|https://threatpost.com/salt-bugs-full-rce-root-cloud-servers/155383/]]|CVE-2020-11651 CVE-2020-11652|
=== 
* Recommendations : Sécurisation Office 365 par le DHS/US-CERT+++*[»]>
|2020.04.29|US-CERT|![[Alert (AA20-120A): Microsoft Office 365 Security Recommendations |https://www.us-cert.gov/ncas/alerts/aa20-120a]]|O365|
|2020.04.29|Bleeping Computer| → [[US govt updates Microsoft Office 365 security best practices|https://www.bleepingcomputer.com/news/security/us-govt-updates-microsoft-office-365-security-best-practices/]]|O365|
|2020.05.01|Security Week| → [[DHS Reiterates Recommendations on Securing Office 365|https://www.securityweek.com/dhs-reiterates-recommendations-securing-office-365]]|O365|
=== 
* Attaques : Campagne de phishing PerSwaysion+++*[»]>
|2020.04.30|//Group-IB//|![[PerSwaysion Campaign - Playbook of Microsoft Document Sharing-Based Phishing Attack|https://www.group-ib.com/blog/perswaysion]]|Azure Phishing|
|2020.04.30|//Threatpost//| → [[Microsoft Sway Abused in Office 365 Phishing Attack|https://threatpost.com/microsoft-sway-abused-office-365-phishing-attack/155366/]]|Azure Phishing|
=== et via des alertes Teams+++*[»]>
|2020.05.01|Bleeping Computer|[[Convincing Office 365 phishing uses fake Microsoft Teams alerts|https://www.bleepingcomputer.com/news/security/convincing-office-365-phishing-uses-fake-microsoft-teams-alerts/]]|Phishing O365|
=== contre Office 365, et technique d'attaque contre Teams+++*[»]>
|2020.04.27|//CyberArk//|[[Beware of the GIF: Account Takeover Vulnerability in Microsoft Teams|https://www.cyberark.com/threat-research-blog/beware-of-the-gif-account-takeover-vulnerability-in-microsoft-teams/]]|Teams Attacks|
=== 
* Fuite de données : Le Figaro+++*[»]>
|2020.05.01|Safety Detectives|[[French Subscribers to Famous News Site at Risk from Hacking, Fraud|https://www.safetydetectives.com/blog/lefigaro-leak-report/]]|Data_Leak ElasticSearch|
=== et risques avec les liens de partage Google+++*[»]>
|2020.05.01|//NetSkope//|[[Leaky Links: Accidental Exposure in Google Link Sharing|https://www.netskope.com/blog/leaky-links-accidental-exposure-in-google-link-sharing]]|GCP Leakage|
=== 
* Podcast : Cloud Security Podcast+++*[»]>
|2020.05.03|Cloud Security Podcast|[[Virtual Coffee with Ashish - Cloud Security Podcast & Hacker Valley Studio|https://anchor.fm/cloudsecuritypodcast/episodes/Virtual-Coffee-with-Ashish---Cloud-Security-Podcast--Hacker-Valley-Studio-edi7ce]]|Podcast|
=== 
* Outils : ROADtools pour AzureAD+++*[»]>
|2020.04.30|Hackin9|[[ROADtools - The Azure AD exploration framework|https://hakin9.org/roadtools-the-azure-ad-exploration-framework/]]|AzureAD Tools|
=== 
* Divers : Supervision de Zoom depuis Azure Sentinel+++*[»]>
|2020.04.29|//Microsoft//|![[Monitoring Zoom with Azure Sentinel|https://techcommunity.microsoft.com/t5/azure-sentinel/monitoring-zoom-with-azure-sentinel/ba-p/1341516]]|Zoom Azure_Sentinel|
===, diverses problématiques sur AWS+++*[»] 
|2020.04.28|//Tripwire//|[[Cloud Under Pressure: Keeping AWS Projects Secure|https://www.tripwire.com/state-of-security/security-data-protection/cloud/cloud-under-pressure-keeping-aws-projects-secure/]]|AWS|
|2020.04.28|//Expel.io//|[[Finding evil in AWS: A key pair to remember|https://expel.io/blog/finding-evil-in-aws/]]|AWS Attacks|
===, Threat Modeling pour Kubernetes+++*[»] 
|2020.04.27|//TrendMicro//|![[Guidance on Kubernetes Threat Modeling|https://www.trendmicro.com/vinfo/us/security/news/virtualization-and-cloud/guidance-on-kubernetes-threat-modeling]]|Kubernetes Threats|
=== 

|ssTabl96|k
|!⇒ [[CloudSecurityAlliance.fr/go/K53/|https://CloudSecurityAlliance.fr/go/K53/]] |
!Weekly Cloud and Security Watch Newsletter - April 27th to May 3rd[>img[iCSF/inEnglish.png]]
!!1 - CSA News and Updates
* Blog: Human and cyber-pandemic: the importance to get ready+++*[»]> <<tiddler [[2020.04.28 - Blog : De l'importance d'être prêt quand survient une pandémie]]>>=== 
* Blog: What is a "Cloud Service Provider"+++*[»]> <<tiddler [[2020.04.30 - Blog : Qu'est ce qu'un 'Cloud Service Provider' ?]]>>=== 
* Blog: Why Better Security is the First Step to Greater Trust+++*[»]> <<tiddler [[2020.04.30 - Blog : la sécurité génère la confiance]]>>=== 
* Call for comments for 2 CSA documents: 'Hybrid Clouds and its Associated Risks'+++*[»]> <<tiddler [[2020.04.10 - Appel à commentaires : 'Hybrid Clouds and its Associated Risks']]>>=== before May 8th, and 'Telehealth data in the cloud'+++*[»]> <<tiddler [[2020.05.01 - Appel à commentaires : 'Telehealth data in the cloud']]>>=== before May 17th
* Call for comments for a NIST document: SP 800-210 'General Access Control Guidance for Cloud Systems'+++*[»]> <<tiddler [[2020.04.01 - Appel à commentaires : NIST 800-210 'General Access Control Guidance for Cloud Systems']]>>=== 
!2 - Cloud and Security News Watch
[[Over 40 links|2020.05.03 - Veille Hebdomadaire - 3 mai]] among which:
* Alerts: Framework Salt+++*[»]>
|2020.04.30|//F-Secure labs//|![[SaltStack authorization bypass|https://labs.f-secure.com/advisories/saltstack-authorization-bypass]]|CVE-2020-11651 CVE-2020-11652|
|2020.04.30|//ThreatPost//| → [[Salt Bugs Allow Full RCE as Root on Cloud Servers|https://threatpost.com/salt-bugs-full-rce-root-cloud-servers/155383/]]|CVE-2020-11651 CVE-2020-11652|
* Recommendations: Microsoft Office 365 security recommendations by DHS/US-CERT+++*[»]>
|2020.04.29|US-CERT|![[Alert (AA20-120A): Microsoft Office 365 Security Recommendations |https://www.us-cert.gov/ncas/alerts/aa20-120a]]|O365|
|2020.04.29|Bleeping Computer| → [[US govt updates Microsoft Office 365 security best practices|https://www.bleepingcomputer.com/news/security/us-govt-updates-microsoft-office-365-security-best-practices/]]|O365|
|2020.05.01|Security Week| → [[DHS Reiterates Recommendations on Securing Office 365|https://www.securityweek.com/dhs-reiterates-recommendations-securing-office-365]]|O365|
=== 
|2020.04.29|US-CERT|![[Alert (AA20-120A): Microsoft Office 365 Security Recommendations |https://www.us-cert.gov/ncas/alerts/aa20-120a]]|O365|
|2020.04.29|Bleeping Computer| → [[US govt updates Microsoft Office 365 security best practices|https://www.bleepingcomputer.com/news/security/us-govt-updates-microsoft-office-365-security-best-practices/]]|O365|
|2020.05.01|Security Week| → [[DHS Reiterates Recommendations on Securing Office 365|https://www.securityweek.com/dhs-reiterates-recommendations-securing-office-365]]|O365|
=== 
* Attacks: PerSwaysion phishing campaign+++*[»]>
|2020.04.30|//Group-IB//|![[PerSwaysion Campaign - Playbook of Microsoft Document Sharing-Based Phishing Attack|https://www.group-ib.com/blog/perswaysion]]|Azure Phishing|
|2020.04.30|//Threatpost//| → [[Microsoft Sway Abused in Office 365 Phishing Attack|https://threatpost.com/microsoft-sway-abused-office-365-phishing-attack/155366/]]|Azure Phishing|
=== and fake Microsoft Teams alerts+++*[»]>
|2020.05.01|Bleeping Computer|[[Convincing Office 365 phishing uses fake Microsoft Teams alerts|https://www.bleepingcomputer.com/news/security/convincing-office-365-phishing-uses-fake-microsoft-teams-alerts/]]|Phishing O365|
=== attacks against Office 365; and Account takeover vulnerability in Microsoft Teams+++*[»]>
|2020.04.27|//CyberArk//|[[Beware of the GIF: Account Takeover Vulnerability in Microsoft Teams|https://www.cyberark.com/threat-research-blog/beware-of-the-gif-account-takeover-vulnerability-in-microsoft-teams/]]|Teams Attacks|
=== 
* Data leaks: Le Figaro news platform+++*[»]>
|2020.05.01|Safety Detectives|[[French Subscribers to Famous News Site at Risk from Hacking, Fraud|https://www.safetydetectives.com/blog/lefigaro-leak-report/]]|Data_Leak ElasticSearch|
===; issues with Google Link Sharing+++*[»]>
|2020.05.01|//NetSkope//|[[Leaky Links: Accidental Exposure in Google Link Sharing|https://www.netskope.com/blog/leaky-links-accidental-exposure-in-google-link-sharing]]|GCP Leakage|
=== 
* Podcast : Cloud Security Podcast+++*[»]>
|2020.05.03|Cloud Security Podcast|[[Virtual Coffee with Ashish - Cloud Security Podcast & Hacker Valley Studio|https://anchor.fm/cloudsecuritypodcast/episodes/Virtual-Coffee-with-Ashish---Cloud-Security-Podcast--Hacker-Valley-Studio-edi7ce]]|Podcast|
=== 
* Outils : ROADtools for AzureAD+++*[»]>
|2020.04.30|Hackin9|[[ROADtools - The Azure AD exploration framework|https://hakin9.org/roadtools-the-azure-ad-exploration-framework/]]|AzureAD Tools|
=== 
* Miscellaneous: Monitoring Zoom with Azure Sentinel+++*[»]>
|2020.04.29|//Microsoft//|![[Monitoring Zoom with Azure Sentinel|https://techcommunity.microsoft.com/t5/azure-sentinel/monitoring-zoom-with-azure-sentinel/ba-p/1341516]]|Zoom Azure_Sentinel|
===; Keeping AWS Projects Secure+++*[»] 
|2020.04.28|//Tripwire//|[[Cloud Under Pressure: Keeping AWS Projects Secure|https://www.tripwire.com/state-of-security/security-data-protection/cloud/cloud-under-pressure-keeping-aws-projects-secure/]]|AWS|
|2020.04.28|//Expel.io//|[[Finding evil in AWS: A key pair to remember|https://expel.io/blog/finding-evil-in-aws/]]|AWS Attacks|
===; Kubernetes Threat Modeling+++*[»] 
|2020.04.27|//TrendMicro//|![[Guidance on Kubernetes Threat Modeling|https://www.trendmicro.com/vinfo/us/security/news/virtualization-and-cloud/guidance-on-kubernetes-threat-modeling]]|Kubernetes Threats|
=== 

|ssTabl96|k
|!⇒ [[CloudSecurityAlliance.fr/go/K53/|https://CloudSecurityAlliance.fr/go/K53/]] |
|!Mai|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2020.05.03|
|2020.05.03|Cloud Security Podcast|[[Virtual Coffee with Ashish - Cloud Security Podcast & Hacker Valley Studio|https://anchor.fm/cloudsecuritypodcast/episodes/Virtual-Coffee-with-Ashish---Cloud-Security-Podcast--Hacker-Valley-Studio-edi7ce]]|Podcast|
|2020.05.03|//JumpCloud//|[[Azure Active Directory vs. Amazon Web Services IAM|https://jumpcloud.com/blog/aad-vs-aws-iam]]|AzureAD AWS IAM|
|>|>|>|!2020.05.01|
|2020.05.01|Safety Detectives|[[French Subscribers to Famous News Site at Risk from Hacking, Fraud|https://www.safetydetectives.com/blog/lefigaro-leak-report/]]|Data_Leak ElasticSearch|
|2020.05.01|Bleeping Computer| → [[French daily Le Figaro database exposes users’ personal info|https://www.bleepingcomputer.com/news/security/french-daily-le-figaro-database-exposes-users-personal-info/]]|Data_Leak ElasticSearch|
|2020.05.01|Bleeping Computer|[[Convincing Office 365 phishing uses fake Microsoft Teams alerts|https://www.bleepingcomputer.com/news/security/convincing-office-365-phishing-uses-fake-microsoft-teams-alerts/]]|Phishing O365|
|2020.05.01|CIO Dive|[[Hasty Office 365 deployments wrought with security configuration holes|https://www.ciodive.com/news/office-365-deployment-cybersecurity-risk-dhs-cisa/577168/]]|Misconfigurations|
|2020.05.01|//CloudCheckr//|[[Emerging Public Cloud Security Challenges in 2020|https://cloudcheckr.com/article/emerging-public-cloud-security-challenges-in-2020/]]|Challenges|
|2020.05.01|//NetSkope//|[[Leaky Links: Accidental Exposure in Google Link Sharing|https://www.netskope.com/blog/leaky-links-accidental-exposure-in-google-link-sharing]]|GCP Leakage|
|!Avril|!Sources|!Titres et Liens|!Keywords|
|2020.04.30|Secure Cloud blog|[[Send Security Alerts From Microsoft Cloud To 3rd Party SIEM With Logic Apps and Event Hub|https://securecloud.blog/2020/04/30/send-security-alerts-from-microsoft-cloud-to-3rd-party-siem-with-logic-apps-and-event-hub/]]|Azure SIEM|
|>|>|>|!2020.04.30|
|2020.04.30|DZone|[[AWS Config Rules and Custom Config Rules|https://dzone.com/articles/aws-config-and-custom-config-rules]]|AWS|
|2020.04.30|Hackin9|[[ROADtools - The Azure AD exploration framework|https://hakin9.org/roadtools-the-azure-ad-exploration-framework/]]|AzureAD Tools|
|2020.04.30|Security Boulevard|[[Cloud Security Challenges in 2020|https://securityboulevard.com/2020/04/cloud-security-challenges-in-2020/]]|Challenges|
|2020.04.30|TechPluto|[[The State of Data Security in the Cloud|https://www.techpluto.com/the-state-of-data-security-in-the-cloud/]]|Misc|
|2020.04.30|isBuzzNews|[[What Are The Top 5 Kubernetes Security Challenges And Risks?|https://www.informationsecuritybuzz.com/articles/what-are-the-top-5-kubernetes-security-challenges-and-risks/]]|Kubernetes|
|2020.04.30|//F-Secure labs//|![[SaltStack authorization bypass|https://labs.f-secure.com/advisories/saltstack-authorization-bypass]]|CVE-2020-11651 CVE-2020-11652|
|2020.04.30|//ThreatPost//| → [[Salt Bugs Allow Full RCE as Root on Cloud Servers|https://threatpost.com/salt-bugs-full-rce-root-cloud-servers/155383/]]|CVE-2020-11651 CVE-2020-11652|
|2020.04.30|CBR Online| → [[Critical Vulnerability in Data Centre Configuration Tool Gives “Full Remote Command Execution as Root|https://www.cbronline.com/cybersecurity/threats/salt-vulnerability-f-secure/]]|CVE-2020-11651 CVE-2020-11652|
|2020.04.30|//Microsoft Azure//|[[Azure Container Registry: Mitigating data exfiltration with dedicated data endpoints|https://azure.microsoft.com/en-us/blog/azure-container-registry-mitigating-data-exfiltration-with-dedicated-data-endpoints/]]|Azure Containers Exfiltration|
|2020.04.30|//Group-IB//|![[PerSwaysion Campaign - Playbook of Microsoft Document Sharing-Based Phishing Attack|https://www.group-ib.com/blog/perswaysion]]|Azure Phishing|
|2020.04.30|//Threatpost//| → [[Microsoft Sway Abused in Office 365 Phishing Attack|https://threatpost.com/microsoft-sway-abused-office-365-phishing-attack/155366/]]|Azure Phishing|
|2020.04.30|//Forcepoint//|[[Debunking 5 Cloud Security Infrastructure Myths|https://www.forcepoint.com/blog/insights/5-cloud-security-myths]]|Misc|
|2020.04.30|//Ontrack//|[[Where on earth is cloud data actually located?|https://www.ontrack.com/uk/blog/top-tips/where-on-earth-is-cloud-data-actually-stored/]]|Data|
|>|>|>|!2020.04.29|
|2020.04.29|US-CERT|![[Alert (AA20-120A): Microsoft Office 365 Security Recommendations |https://www.us-cert.gov/ncas/alerts/aa20-120a]]|O365|
|2020.04.29|Bleeping Computer| → [[US govt updates Microsoft Office 365 security best practices|https://www.bleepingcomputer.com/news/security/us-govt-updates-microsoft-office-365-security-best-practices/]]|O365|
|2020.05.01|Security Week| → [[DHS Reiterates Recommendations on Securing Office 365|https://www.securityweek.com/dhs-reiterates-recommendations-securing-office-365]]|O365|
|2020.04.29|//Microsoft//|![[Monitoring Zoom with Azure Sentinel|https://techcommunity.microsoft.com/t5/azure-sentinel/monitoring-zoom-with-azure-sentinel/ba-p/1341516]]|Zoom Azure_Sentinel|
|2020.04.29|//Intezer//|[[What is Cloud Workload Protection?|https://intezer.com/cloud-security/what-is-cloud-workload-protection/]]|Workloads|
|2020.04.29|//Cisco//|[[Cisco Secure Cloud Architecture for AWS|https://blogs.cisco.com/security/cisco-secure-cloud-architecture-for-aws]]|
|>|>|>|!2020.04.28|
|2020.04.28|ISF|[[Top Tips for Using Cloud Services Securely in the COVID-19 Era|https://www.securityforum.org/uploads/2020/04/ISF_Top-Tips-for-Using-Cloud-Services-Securely-in-the-COVID-19-Era_2020.pdf]] (pdf)|COVID-19|
|2020.04.28|//Tripwire//|[[Cloud Under Pressure: Keeping AWS Projects Secure|https://www.tripwire.com/state-of-security/security-data-protection/cloud/cloud-under-pressure-keeping-aws-projects-secure/]]|AWS|
|2020.04.28|//Expel.io//|[[Finding evil in AWS: A key pair to remember|https://expel.io/blog/finding-evil-in-aws/]]|AWS Attacks|
|>|>|>|!2020.04.27|
|2020.04.27|//3DS Outscale//[>img[iCSF/flag_fr.png]]|[[Servane Augier, 3DS Outscale : "En temps de crise, il faut avoir des procédures claires et déjà appliquées dans l’organisation"|https://www.silicon.fr/servane-augier-3ds-outscale-en-temps-de-crise-il-faut-avoir-des-procedures-claires-et-deja-appliquees-dans-lorganisation-338685.html]]|Misc|
|2020.04.27|//CyberArk//|[[Beware of the GIF: Account Takeover Vulnerability in Microsoft Teams|https://www.cyberark.com/threat-research-blog/beware-of-the-gif-account-takeover-vulnerability-in-microsoft-teams/]]|Teams Attacks|
|2020.04.27|//TrendMicro//|![[Guidance on Kubernetes Threat Modeling|https://www.trendmicro.com/vinfo/us/security/news/virtualization-and-cloud/guidance-on-kubernetes-threat-modeling]]|Kubernetes Threats|
!"//Telehealth data in the cloud'//"
Cet appel à commentaires traite des données de télémédecine gérées dans le Cloud.
La date limite pour faire les commentaires est fixée au ''17 mai 2020''.
Extraits :
<<<
|ssTableNo|k
|__''Synthèse''__ |__''Conclusion''__ |
|//In the wake of COVID-19 Health Delivery Organizations (HDOs) are rapidly increasing their utilization of telehealth capabilities like Remote Patient Monitoring (RPM) and telemedicine so treat patients without leaving their home. These technology solutions allow the delivery of patient treatments, comply with the COVID-19 mitigation strategies being promulgation across the country and reduce the risk of health provider exposure. As COVID-19 progresses telehealth solutions can be used to monitor patients who have mild cases of the virus and are treated in their home. Telehealth puts large amounts of patient data over the Internet and in the cloud. These trends, in times of this global pandemic, likely will continue to grow and evolve in a post COVID environment. As the use of these capabilities increase so do the security risks. This risk makes it important to ensure that the infrastructure supporting telehealth can maintain the confidentiality, integrity, and availability of patient data. Third party vendors are using videoconferencing capabilities utilizing cloud technologies with RPM devices to remotely monitor and manage patient care. This paper will address the privacy and security concerns related to processing, storing, and transmitting patient data in the cloud for telehealth solutions.// |//Currently the response to COVID-19 relies heavily on social distancing as a major measure used to fight the pandemic. Healthcare is implementing more telehealth as a key technology for safe and efficient communications between healthcare providers and patients. According to a new WHO policy, within the optimizing service delivery action, telemedicine should be one of the alternative models for clinical services and clinical decision support. Additionally, the Centers for Medicare & Medicaid Services (CMS) has broadened access to Medicare telehealth services so that beneficiaries can receive a wider range of services from their doctors without having to travel to a healthcare facility (HHS, 2020). With the increased use of telehealth in the cloud it is imperative HDOs get data privacy and security right. The HDO cannot leave this up to the service provider, it is a shared responsibility. It is important the HDO understands regulatory requirements as well as the technologies. The regulatory requirement may span multiple jurisdictions and mandates may include both the GDPR and HIPAA. Armed with the right information the HDO can implement and maintain a secure and robust telehealth program.// |
<<<

&Arr; Lire l'original sur le site de la CSA &Arr; [[CloudSecurityAlliance.fr/go/k51a/|https://CloudSecurityAlliance.fr/go/k51a/]]
!Actualités, Blog, Publications et Veille "Sécurité du Cloud"
<<tiddler fAll2LiTabs13end with: 202004>>
<<tiddler fAll2Tabs10 with: VeilleM","_202004>>
|!Mai|!Sources|!Titres et Liens|!Keywords|
|2019.05.13|US-CERT|!//Microsoft Office 365 Security Recommendations// [[Alert (AA20-120A)|https://www.us-cert.gov/ncas/alerts/aa20-120a]]|O365|
|2019.05.13|US-CERT|!//Analysis Report: Microsoft Office 365 Security Observations// [[AR19-133A|https://www.us-cert.gov/ncas/analysis-reports/AR19-133A]]|O365|
<<tiddler .ReplaceTiddlerTitle with: [[Alertes et Vulnérabilités - Avril 2020]]>>
<<tiddler fAll2LiTabs10 with: NewsL","202004>><<tiddler .ReplaceTiddlerTitle with: [[Newsletters - Avril 2020]]>>
<<tiddler .ReplaceTiddlerTitle with: [[Actualités - Avril 2020]]>><<tiddler fAll2LiTabs13end with: 'Actu","202004'>>
<<tiddler fAll2LiTabs13end with: 'Blog","202004'>>
[img(25%,1px)[iCSF/BluePixel.gif]]
<<tiddler .ReplaceTiddlerTitle with: [[Blog - Avril 2020]]>>
<<tiddler fAll2LiTabs13end with: 'Publ","202004'>>
[img(25%,1px)[iCSF/BluePixel.gif]]
<<tiddler .ReplaceTiddlerTitle with: [[Publications - Avril 2020]]>>
!"//Nine mandates to secure your remote workforce//"
[>img(150px,auto)[iCSA/K4MBN.jpg]]^^Article publié le 22 avril 2020 sur le blog de la CSA, après l'avoir été le 13 avril 2020 sur le site de CipherCloud

__Liens :__
* Blog CSA ⇒ ''[[CloudSecurityAlliance.fr/go/k4mx/|https://CloudSecurityAlliance.fr/go/k4mx/]]''
* Site CipherCloud ⇒ ''[[CloudSecurityAlliance.fr/go/k4mz/|https://CloudSecurityAlliance.fr/go/k4mz/]]''

[img(25%,1px)[iCSF/BluePixel.gif]]
!"//Top 10 Audio/Video Conferencing Security Best Practices//"
[>img(150px,auto)[iCSA/K4MBT.jpg]]^^Article publié le 22 avril 2020 sur le blog de la CSA, après l'avoir été le 8 avril 2020 sur le site de SecureSky

__Liens :__
* Blog CSA ⇒ ''[[CloudSecurityAlliance.fr/go/k4mw/|https://CloudSecurityAlliance.fr/go/k4mw/]]''
* Site SecureSky ⇒ ''[[CloudSecurityAlliance.fr/go/k4my/|https://CloudSecurityAlliance.fr/go/k4my/]]''

[img(25%,1px)[iCSF/BluePixel.gif]]
!"//Secure Historical Cloud Data with Cloud Data Discovery//"
[>img(150px,auto)[iCSA/K4EBS.jpg]]^^Article publié le 14 avril 2020 sur le blog de la CSA, après l'avoir été le 30 mars 2020 sur le site de CipherCloud

__Liens :__
* Blog CSA ⇒ ''[[CloudSecurityAlliance.fr/go/k4ex/|https://CloudSecurityAlliance.fr/go/k4ex/]]''
* Site CipherCloud ⇒ ''[[CloudSecurityAlliance.fr/go/k4ez/|https://CloudSecurityAlliance.fr/go/k4ez/]]''

[img(25%,1px)[iCSF/BluePixel.gif]]
!"//CSA Federal Summit 2020 Announces New Date, New Focus on Cloud Security as National Security//"
^^Communiqué de presse publié le 3 avril 2020 par la CSA.{{ss2col{
<<<
[>img(150px,auto)[iCSA/202005US-WashintonDC.jpg]]//SEATTLE – April 3, 2020 – The Cloud Security Alliance (CSA), the world's leading organization dedicated to defining standards, certifications and best practices to help ensure a secure cloud computing environment, announced that in response to the ongoing concerns surrounding COVID-19, its annual Federal Summit will now be held on ''June 25, 2020'', at the Hyatt Regency Washington on Capitol Hill (Washington, DC.). With its theme of Cloud Security Is National Security, the 7th annual Federal Summit will address how rapidly developing cloud technology, risk management, and shared responsibility across agencies are central to building a trusted cloud environment.
//[...]//
Learn more or register ''here''+++*[»]> ⇒ https://csacongress.org/event/csa-federal-summit-2020/#registration ===. Members of the media and analyst community interested in attending the event should contact ''Kari Walker''+++*[»]> email : kari @ zagcommunications . com === for more information, to receive press credentials and to schedule interviews with CSA leadership and conference speakers.//
<<<
}}}__Lien :__
 ⇒ ''[[CloudSecurityAlliance.fr/go/k43p/|https://CloudSecurityAlliance.fr/go/k43p/]]''
[img(25%,1px)[iCSF/BluePixel.gif]]
!"//Using Open Policy Agent (OPA) to Apply Policy-as-Code to Infrastructure-as-Code//"
[>img(150px,auto)[iCSA/K42BU.jpg]]^^Article publié le 2 avril 2020 sur le blog de la CSA, après l'avoir été le 6 février 2020 sur le site de Fugue
__Liens :__
* Blog CSA ⇒ ''[[CloudSecurityAlliance.fr/go/k42x/|https://CloudSecurityAlliance.fr/go/k42x/]]''
* Site Fugue ⇒ ''[[CloudSecurityAlliance.fr/go/k42z/|https://CloudSecurityAlliance.fr/go/k42z/]]''

[img(25%,1px)[iCSF/BluePixel.gif]]
[>img(100px,auto)[iCSA/K4QCCSK.png]]Le [[Chapitre Français]] organise une formation officielle ''certifiante'' [[CCSK]] ''en français''^^[img[iCSF/flag_fr.png]]^^ ''CCSK Foundation'' et le ''CCSK Plus''.

Elle se déroulera la semaine du 15 juin 2020 et intègre la possibilité de passer l'examen de certification :
* Lundi 15 et mardi 16 juin 2020 : ''CCSK Foundation'' (tarif remisé CSA : 1.350 €HT)
* Lundi 15, mardi 16 et mercredi 17 juin 2020 : ''CCSK Plus'' (tarif remisé CSA : 1.950 €HT)

Elle sera dispensée par ''Guillaume Boutisseau'', ''CCSK Authorized Instructor'' de la société [img(100px,auto)[iCSF/K4CSP.png][https://CloudSecurityPass.com/]].

Les inscriptions sont ouvertes sur le site de CloudSecurityPass ⇒ ''[[CloudSecurityAlliance.fr/go/CSPass|http://CloudSecurityAlliance.fr/go/CSPass]]''
Pour toute information complémentaire, vous pouvez aussi nous contacter sur [img(200px,auto)[iCSF/Email-CSA_FR.png]]
Les sessions suivantes en français auront lieu les semaines du 31 août et 23 novembre 2020.
!"//What is a "Cloud Service Provider"//"
Article de blog publié le 30 avril 2020 — Rédigé par John DiMaria, Assurance Investigatory Fellow, Cloud Security 
{{ss2col{
<<<
[>img(200px,auto)[iCSA/K4UB2.jpg]]//Defining what is a Cloud Service Provider is not as easy as one might think, especially if you are an enterprise organization wondering if your vendors are servicing you from the cloud or not.

A cloud service provider, or CSP, is a company that offers some component of cloud computing; typically when you search the internet a cloud service is defined as, infrastructure as a service (IaaS), software as a service (SaaS) or platform as a service (PaaS) to other businesses or individuals. We know the usual suspects; Microsoft Azure, AWS and Google Cloud, but it is not always that simple.
A refined more adequate definition would be “A Cloud Service is any system that provides on-demand availability of computer system resources, e.g; data storage and computing power, without direct active management by the user”. While this may seem a bit broad that is because it should be. Cloud services come in many forms and sizes even to the point where it may not be exactly clear to the average user, if their vendor or supplier should technically be classified as a cloud service provider or not.

One benefit of using cloud computing services is that firms can avoid the upfront cost and complexity of owning and maintaining their own IT infrastructure, and instead simply pay for what they use, when they use it.
Today, rather than owning their own computing infrastructure or data centers, companies can rent access to anything from applications to storage. What that means is that if you have a supplier that handles and processes your companies healthcare data for instance, they may in fact be storing and processing your information in the cloud, either by outsourcing services or in some cases using an internal cloud or “private cloud” that they developed themselves by implementing it within the organization's dedicated resources, and infrastructure using “on-prem” services.
To add another twist, in other cases organizations may be using a diversified approach or “Hybrid Cloud” where they utilize both a private and public approach.

Let’s look at a simple use case example:
A large global bank has built their own private cloud. They wanted to take advantage of benefits of cloud computing like
* Rapid and simple deployment
* Less time to market for services
* Cost efficiency
* More utilization of server resources
* Less capital and operational costs
* This is managed by ABC bank Cloud datacenter services
* Better perceived security by managing and controlling it internally

However, one question they had was what if due to some natural disaster or a fire accident they lose their datacenter? They can’t afford to lose their data. They wanted a Disaster recovery solution, which would simply replicate all their data and services somewhere else. So, they outsourced services in a public cloud using AWS infrastructure so now they have the best of both worlds.
So, having said all that, we come to the question, how do you define your supplier as a cloud service or not? Well, think of it this way: the basic concept behind the cloud is that the location of the service, and associated processes and assets such as the hardware and operating system(s) and/or applications on which it is running, are largely immaterial to the user. They may have a separate business unit that is a private cloud that is dedicated to serving the entire internal organization, they may use a 3rd party service like AWS or Azure and in some cases may use both. In any event they are servicing you from the cloud and you should expect that they have cloud specific controls like the CSA Cloud Control Matrix (CCM) to address the applicable scope of service and to mitigate the associated risks.
Further it would be prudent to require that they submit a self-assessment against the CCM’s extended question set, the Consensus Assessment Initiative Questionnaire (CAIQ) or what is better known as CSA Security Trust Assurance and Risk (STAR) STAR Level 1 and is the first of three levels of transparency and Assurance provided by the STAR Program.

The CAIQ offers an industry-accepted way to document what security controls exist in cloud services, providing security control transparency and to some extent assurance. It provides a set of Yes/No questions a cloud consumer and cloud auditor may wish to ask of a cloud provider to ascertain their compliance to the Cloud Controls Matrix (CCM). Therefore, it helps cloud customers to gauge the security posture of prospective cloud service providers and determine if their cloud services are suitably secure. CSA took into account the combined comprehensive feedback that was collected over the years from its partners, industry experts and the CCM working group. It allows the cloud user to review the security practices of providers, accelerating their due diligence and leading to higher quality procurement experience and because it is posted on the STAR public registry and updated on a regular basis, you can easily monitor the provider’s ongoing compliance posture providing a higher level of peace of mind for the user. Because the CCM aligns itself with over 40 of the leading standards and regulations, it basically eliminates the need for any other questioner. //
<<<
}}}__Lien :__
* Article sur le site de la CSA &Arr; ''[[CloudSecurityAlliance.fr/go/k4u2/|https://CloudSecurityAlliance.fr/go/k4u2/]]''
!"//Why Better Security is the First Step to Greater Trust//"
Article de blog publié le 30 avril 2020 — Rédigé par Tim Mullahy, Executive Vice President et Managing Director, Liberty One Center
{{ss2col{
<<<
[>img(200px,auto)[iCSA/K4UBW.jpg]]//We are currently in the midst of a technological renaissance, and the world is going digital. On the one hand, that’s great. Innovations such as the Internet of Things (IoT) come hand-in-hand with incredible benefits, including new revenue streams, more efficient workflows, and untold convenience in our personal lives.
On the other hand, it’s a cybersecurity nightmare. As IoT continues to gain prominence, more and more businesses are diving headlong into bringing their products onto the Internet. The problem is that many of these organizations are not technology companies.
Instead, they’re consumer-focused vendors who have a history of selling products like home appliances, light bulbs, media players, and televisions. Products, in other words, for which endpoint security is traditionally unimportant. As a result, these vendors lack the expertise of a company with a background in digital technology.
And it shows.
In McAfee’s Mobile Threat Report 2019+++*[»]> https://www.mcafee.com/enterprise/en-us/assets/reports/rp-mobile-threat-report-2019.pdf ===, for example, the vendor revealed that the majority of IoT devices fail at even rudimentary security practices. While some of these - such as easily-guessable credentials - can be placed at the feet of the user, most are solely the domain of the vendor. The firm predicts that as IoT continues to grow, these simple, easily-patchable vulnerabilities will become increasingly valuable to criminals as an attack vector.
“Most IoT devices are being compromised by exploiting rudimentary vulnerabilities, such as easily guessable passwords and insecure default settings,” Raj Samani, Fellow and Chief Scientist at McAfee, explained in a presentation at Mobile World Congress+++*[»]> https://www.techradar.com/news/mcafee-warns-that-2019-could-be-the-year-of-everywhere-malware ===. “From building botnets to stealing banking credentials, perpetrating click fraud, or threatening reputation damage unless a ransom is paid, money is the ultimate goal for criminals.”
If you don’t find that news concerning, you should. We are already in a time of crisis, and one in which consumer trust in businesses is at an all-time low. Just a quick look at the news is enough to confirm that. See how long you can go without hearing about some new data breach or security failure.
Alternatively, you could simply have a look at the 2019 data breach timeline compiled by security agency Selfkey+++*[»]> https://selfkey.org/data-breaches-in-2019/ ===. It’s a sobering read. I’d recommend keeping a stiff drink nearby if you’re planning to go through the whole thing.
Unsurprisingly, people are fed up. Data breaches cause more than financial damage. They erode trust.
And trust is already at an all-time low. Last year, for example, Oxford Economics found that a paltry eight percent of consumers trust businesses to keep their personal information safe+++*[»]> https://www.helpnetsecurity.com/2018/10/10/consumers-feeling-uneasy/ ===. Another survey from that same year by identity security specialist Ping found that 78 percent of people stop engaging with a brand online after a breach, and 36 percent write off the brand entirely+++*[»]> https://www.techrepublic.com/article/consumers-are-more-concerned-with-cybersecurity-and-data-privacy-in-2018/ ===.
“Trust [is] both the most important aspect of any commercial interaction and the hardest to measure,” writes Immuta Chief Privacy Officer and Legal Engineer Andrew Burt+++*[»]> https://hbr.org/2019/03/cybersecurity-is-putting-customer-trust-at-the-center-of-competition ===. “If we don’t trust the maker, we simply don’t know what it is we’re getting. And because trust cannot be proven, it must be signaled - through branding, marketing, and more.”
“Security and privacy concerns can no longer take a back seat in the product development lifecycle,” he continues. “Clear and demonstrable processes must be put in place to illustrate the importance of data protection, both inside and outside every organization … Companies and consumers alike must be honest about the risks we collectively face in the digital world.”
So what exactly does this involve? How can your brand follow Burt’s advice and prioritize cybersecurity, thereby regaining the trust of its customers?
* Engage with experts. There are many agencies out there whose sole purpose is to help businesses improve their security posture. Seek one such third party out, and work with them to address vulnerabilities within your internal organization, your products, and your supply chain.
* Be transparent. If you suffer a breach, do not try to sweep it under the rug. Notify customers and shareholders the moment you suspect something has gone wrong, and explain what you are doing to mitigate the attack. Sure, you might suffer a bit of reputational damage - but the damage will be worse if you wait.
* Be accountable. Continuing my point above, if your customers suffer as a result of a breach, step up and offer reparations of some kind. Equifax, for all its failings, had the right idea when it offered a decade of free credit monitoring to everyone impacted by its breach+++*[»]> https://www.cnet.com/how-to/equifax-settlement-owes-you-125-but-the-free-credit-monitoring-may-be-a-better-offer/ ===. You’d be well-advised to do the same.
* Understand that cybersecurity is everyone’s job. Your IT department should not be the sole gatekeeper of security. Everyone, from marketing to human resources to manufacturing, now has skin in the game. It’s important to understand that and to incorporate measures at every step of your product’s lifecycle to keep you in control of your systems and data.
People no longer trust brands. They don’t believe businesses have their best interests at heart. In order to challenge that belief, you need to implement stronger security measures to show them that keeping their data safe is a priority.
Only then can you begin to regain the trust you’ve lost.//
[...]
<<<
}}}
Un article au tittre similaire "//Why greater security is the first step to greater trust//"  déjà été publié par cet auteur le 19 décembre 2019+++*[»]> https://digileaders.com/why-greater-security-is-the-first-step-to-greater-trust/ ===, mais le contenu du présent article est plus évolué.
__Lien :__
* Article sur le site de la CSA &Arr; ''[[CloudSecurityAlliance.fr/go/k4ub/|https://CloudSecurityAlliance.fr/go/k4ub/]]''
!"//Human and cyber-pandemic: the importance to get ready//"
[>img(150px,auto)[iCSA/K4SBH.jpg]]Article de blog publié le 28 avril 2020 — Rédigé par Daniele Catteddu, Chief Technology Office, Cloud Security Alliance
<<<
//Ironically, 2020 was supposed to be the year in which our luminous predictions of wealth and development would materialize. The advent of the Zeta-bytes word, trillions of smart devices in our all-encompassing smart environments, the maturation of AI and Quantum Computing, etc. Instead, we got infected by a nasty virus, and not even a malware, a real one. And despite the fact that our intelligence was able to build a machine that beat GO-masters and Poker champions, we are struggling to produce enough protective masks to reduce virus spread.
COVID-19 will likely result in the biggest societal shock since WWII. The short-term impact of this pandemic is unfortunately already very clear today, with nearly two hundred thousand casualties, healthcare systems close to collapse, and economies stalling out and forecasting the biggest depression since 1929. What we haven’t accounted for yet is the medium/long-term impact of this calamity. The more optimistic among us see the tragedy as an opportunity for a new start, a boost to our capabilities, the chance to be better as a human race. Others, perhaps more realistically, foresee a long, slow and hard process that will eventually get us back to the same levels of wealth we had at the beginning of this outbreak.
We can safely state that something went wrong with our predictions. Someone could say that COVID-19 is a black swan and by definition it could not have been foreseen. Others might argue that this is a pandemic and that in the history of our humanity there were plenty of those. The last one, not long ago, was SARS in 2003. Maybe it’s a bit too early to start drawing conclusions, but it doesn’t seem too hazardous to say that we haven't done a great job with our pandemic preparedness and response plans. Being Italian, I found particularly interesting this article in the Harvard Business Review: “Lessons from Italy’s Response to Coronavirus”+++*[»]> https://hbr.org/2020/03/lessons-from-italys-response-to-coronavirus === where the authors describe how Italy first, and then the rest of the EU Countries and then the US, showed a “…systematic failure to absorb and act upon existing information rapidly and effectively…”.
What is not reported in the article is that the Italian influenza pandemic preparedness plan was updated in 2010 and as far as I’ve read in the news during these days, never tested. Italy, unfortunately, is not a black sheep in the EU, since the only countries with plans more than 5 years old are Germany and Lithuania, while all the others have plans that are 7 to 15 years old+++*[»]> https://www.ecdc.europa.eu/en/seasonal-influenza/preparedness/influenza-pandemic-preparedness-plans ===.
I know nothing about the specifics of national pandemic preparedness and response plans, so I’ll leave it to the experts to do their jobs.
What’s interesting to me is to draw a parallel between COVID-19 and a cybersecurity preparedness and response plan. I believe that a number of similarities can be found and several lessons could be learned in order to avoid a cyber-pandemic in the near future.
!!The importance of establishing and testing your plans
The Cloud Security Alliance is currently undergoing the review of the Cloud Control Matrix (CCM) version 4. Several controls objectives will be changed, but there are some core controls that will not. One of them is about establishing, enforcing, testing and maintaining your incident management and response plan. This is clearly one of the foundational best practices in cybersecurity, but sadly one of most disregarded too. According to the 4th annual study “Cyber Resilient Organization+++*[»]> ===” by IBM and Ponemon Institute, 77% of companies surveyed still do not have a cybersecurity incident response plan applied consistently across the enterprise and 54% of the organizations that do have a plan in place, do not test their plans regularly. In essence the attitude is, “let’s put our conscience at ease with a fancy policy, but let’s not spend too much money in enforcing and testing something that’s too unlikely to happen. And if it happens, we’ll surely find a creative solution on the fly.” Bravo! That’s the right attitude...
!!Information sharing is key
The COVID19 emergency tells us that following the telltale signs, the first indicators that something anomalous was happening in various countries across the globe (substantial increase of the number of cases of aggressive pneumonia+++*[»]> https://www.ecdc.europa.eu/sites/default/files/documents/communicable-disease-threats-report-12-18-january-2020-week-3.pdf et http://www.rai.it/dl/doc/1585595608321_Il_paziente_zero_report.pdf ===) and transparently sharing those early warning signs across the global community, could have greatly improved our preparedness, response capabilities and coordination. Does this sound familiar to anyone involved in cybersecurity? In total fairness, our industry is getting better and better in intelligence sharing. Besides the well known voluntary Information Sharing and Analysis Centers (ISACs)+++*[»]> https://www.enisa.europa.eu/topics/national-cyber-security-strategies/information-sharing et https://www.fsisac.com/===, there’s also a stronger emphasis given by regulators on incident reporting. What we are still missing, perhaps, is a stronger cooperation and coordination between the public and private sector on preparedness, threat intelligence sharing and incident response.
!!Do not reinvent the wheel
In absence of a coherent and coordinated plan for preparedness or of proper training for those involved on the front line, the most likely scenario when a crisis hits is a series of random actions based on the gut-feelings of those in the chain of control. The most likely output of this scenario is at best a partially ineffective response, or at worst a total failure. An example? The medical and paramedical personnel on the front line in Italy were sent to ‘war’ understaffed, under-equipped and under-trained to deal with the pandemic. Result? A lot of them contracted the virus, several died, and the quality and speed of the response was undermined+++*[»]> http://www.rai.it/dl/doc/1585595608321_Il_paziente_zero_report.pdf (en italien) ===.
What does this mean for the IT community? DO NOT reinvent the wheel, STOP following your personal gut-feelings, and START following standards and best practices. It means stop making assumptions on the readiness of your staff and train them with both theory and practice (organize table-top exercises). Invest in preparedness; thinking short term doesn’t pay off.
!!Be ready for more frequent low probability / high impact scenarios
I mentioned in the beginning that it is debatable if COVID-19 can be considered a black swan or not. Regardless, we are certain in the presence of low probability/high impact scenarios. One of those cases is that during a risk management approach, many leaders tend to disregard since they prefer to spend their limited resources in mitigating risk scenarios that appear to be more likely to happen.
The calculation of risk assumes the availability of reliable historical data and a clear understanding of the phenomenon under analysis. In the cybersecurity space we seem to fall short on both accounts. With the historical data, our best effort is possibly represented by the Verizon annual Data Breach Investigation Report+++*[»]> https://enterprise.verizon.com/resources/reports/2019-data-breach-investigations-report.pdf ===. This year, the report included about 40K incidents. The report was first published in 2008 and has since been collecting an average of 60K incidents per year from a number of sources. A good base, but unfortunately it might be just the tip of the iceberg since most incidents and breaches are not reported. In addition, we need to factor the rate of ‘asymptomatic patients’ into our analysis. In other terms, the fact that it takes months, if not years, to realize that a breach has occurred.

We have several limitations from the understanding of the phenomenon perspective too, since our IT environments are becoming more interdependent and complex (complex supply chains, shared responsibilities, exponential number of devices and data to manage, new technologies – IoT, AI, etc.) and we don’t seem to score highly when building models for measuring systemic correlated risks. As Dan Geer says in “A Rubicon+++*[»]> https://www.hoover.org/sites/default/files/research/docs/geer_webreadypdfupdated2.pdf
===,” “Our concern is unacknowledged correlated risk, the unacknowledged correlated risk of cyberspace is why cyberspace is capable of black swan behavior. Unacknowledged correlations contribute, by definition, to heavy tails in the probability distribution of possible events.” In other words, we should expect that using the pareto principle in evaluating and managing risks might not be the recommended choice. Companies should be resilient to unexpected events. And in order to accomplish this, they must establish, enforce, test and maintain their preparedness and response plans.//
<<<
__Lien :__
* Article sur le site de la CSA &Arr; ''[[CloudSecurityAlliance.fr/go/k4sb/|https://CloudSecurityAlliance.fr/go/k4sb/]]'' 
|[img(30px,auto)[iCSF/Francais.gif]] @@color:#00F;font-size:125%;__[[Version française|2020.04.26 - Newsletter Hebdomadaire - #61]]__@@ |[img(30px,auto)[iCSF/Anglais.gif]] @@color:#00F;font-size:125%;__[[English version|2020.04.26 - Weekly Newsletter - #61]]__@@ |
|<<tiddler [[2020.04.26 - Newsletter Hebdomadaire - #61]]>> |<<tiddler [[2020.04.26 - Weekly Newsletter - #61]]>> |
!!1 - Nouveautés CSA et Informations de la semaine du 20 au 26 avril 2020
* Formation ''CCSK en Français'' en juin 2020 : un webinar de préparation le 29 avril+++*[»]> <<tiddler [[2020.04.26 - Webinar de présentation de la formation CCSK en juin 2020]]>>===, des détails sur son contenu+++*[»]> <<tiddler [[2020.04.20 - Blog : Contenu de la formation officielle CCSK du 15 juin 2020]]>>=== et sur l'examen+++*[»]> <<tiddler [[2020.04.25 - Blog : L'examen pour passer la certification CCSK en juin 2020]]>>=== 
* ''CSA Virtual EU Summit'' : Agenda et ouverture des inscriptions+++*[»]> <<tiddler [[2020.04.24 - 'CSA Virtual EU Summit' : Agenda et inscriptions]]>>=== 
* Cadre de réponse aux incidents dans le Cloud : blog+++*[»]> <<tiddler [[2020.04.22 - Blog : Cadre de réponse aux incidents dans le Cloud]]>>=== et publication+++*[»]> <<tiddler [[2020.04.21 - Publication : Cadre de réponse aux incidents dans le Cloud]]>>=== 
!!2 - Veille Web Cloud et Sécurité
La [[Veille Web|2020.04.26 - Veille Hebdomadaire - 26 avril]] avec plus de 40 liens dont :
* Rapports : CyberHaven+++*[»]>
|2020.04.22|//CyberHeaven//|[[Lack of awareness, cloud apps, and remote workers create perfect storm for insider attacks|https://www.cyberhaven.com/press/2020-insider-threat-report]] ([[rapport|https://www.cyberhaven.com/survey-2020-insider-threat-report]])|Report|
=== et Trustwave+++*[»]>
|2020.04.22|//Trustwave//|[[New Trustwave Report Reveals Cybersecurity Threats Becoming Pervasive and Attacks More Targeted|https://www.trustwave.com/en-us/company/newsroom/news/new-trustwave-report-reveals-cybersecurity-threats-becoming-pervasive-and-attacks-more-targeted/]] ([[rapport|https://www.trustwave.com/en-us/resources/library/documents/2020-trustwave-global-security-report/]])|Report|
=== 
* Azure : une vulnérabilité+++*[»]>
|2020.04.22|//Varonis//|![[Azure Skeleton Key: Exploiting Pass-Through Auth to Steal Credentials|https://blogvaronis2.wpengine.com/azure-skeleton-key/]]|Azure AzureAD Risks|
|2020.04.22|The Daily Swig| → [[Cloud security: Azure environments at risk from on-prem privilege escalation attack|https://portswigger.net/daily-swig/cloud-security-azure-environments-at-risk-from-on-prem-privilege-escalation-attack]]|Azure AzureAD Risks|
|2020.04.24|Silicon[>img[iCSF/flag_fr.png]]| → [[Office 365 : de gros trous dans l’authentification ?|https://www.silicon.fr/office-365-authentification-338541.html]]|O365 Vulnerability|
=== et des améliorations pour le Security Center+++*[»]>
|2020.04.20|//Microsoft Azure//|[[Azure Security Center enhancements|https://azure.microsoft.com/en-us/blog/azure-security-center-enhancements/]]|Azure|
=== 
* Podcast : SilverLining+++*[»]>
|2020.04.21|SilverLining IL|![[Episode 19: Understanding Cloud Attack Vectors|https://silverlining.media/019-understanding-cloud-attack-vectors/]] ([[mp3|https://techtalk-podcast.s3-eu-west-1.amazonaws.com/silver-lining/silver-lining-19.mp3]])|Podcast Attack_Vector|
=== 
* Divers : Kubernetes avec la Matrice ATT&CK+++*[»]>
|2020.04.24|//Lacework//|[[Kubernetes Recon: A Closer Look at Discovery from the Kubernetes Attack Matrix|https://www.lacework.com/kubernetes-recon-attack-matrix/]]|ATT&CK Kubernetes|
=== et des scénarios d'attaques+++*[»]>
|2020.04.23|//ThreatStack//|[[Investigating Kubernetes Attack Scenarios in Threat Stack (part 1)|https://www.threatstack.com/blog/kubernetes-attack-scenarios-part-1]] (1/2)|Kubernetes Attack|
===; le Confidential Computing+++*[»]>
|2020.04.22|Dark Reading|[[IBM Cloud Data Shield Brings Confidential Computing to Public Cloud|https://www.darkreading.com/cloud/ibm-cloud-data-shield-brings-confidential-computing-to-public-cloud/d/d-id/1337626]]|Confidential_Computting|
|2020.04.21|//Cloud Management Insider//|[[Can Azure Confidential Computing Promise Security In The Data Breach World?|https://www.cloudmanagementinsider.com/can-azure-confidential-computing-promise-security-in-the-data-breach-world/]]|Confidential_Computing|
===; les containers+++*[»]>
|2020.04.22|Container Journal|[[Containers Are Not VMs, and Other Misconceptions|https://containerjournal.com/topics/container-ecosystems/containers-are-not-vms-and-other-misconceptions/]]|Cntainers|
|2020.04.21|//Anchore//|[[Our Top 5 Strategies for Modern Container Security|https://anchore.com/blog/top-5-strategies/]]|Containers|
=== 
!3 - Weekly Cloud and Security Watch Newsletter[>img[iCSF/inEnglish.png]]
<<tiddler [[2020.04.26 - Weekly Newsletter - April 26th]]>> 
!CSA News and Updates - April 20th to 26th
* On April 29th, a Webinar to prepare for the ''CCSK'' training in June 2020+++*[»]> <<tiddler [[2020.04.26 - Webinar de présentation de la formation CCSK en juin 2020]]>>===, des détails sur son contenu+++*[»]> <<tiddler [[2020.04.20 - Blog : Contenu de la formation officielle CCSK du 15 juin 2020]]>>=== et sur l'examen+++*[»]> <<tiddler [[2020.04.25 - Blog : L'examen pour passer la certification CCSK en juin 2020]]>>=== 
* ''CSA Virtual EU Summit'': Agenda and registrations+++*[»]> <<tiddler [[2020.04.24 - 'CSA Virtual EU Summit' : Agenda et inscriptions]]>>=== 
* Guidelines for Cloud Incident Response: blog post+++*[»]> <<tiddler [[2020.04.22 - Blog : Cadre de réponse aux incidents dans le Cloud]]>>=== and publication+++*[»]> <<tiddler [[2020.04.21 - Publication : Cadre de réponse aux incidents dans le Cloud]]>>=== 
!Cloud and Security News Watch
[[Over 40 links|2020.04.26 - Veille Hebdomadaire - 26 avril]] among which:
* Reports: CyberHaven+++*[»]>
|2020.04.22|//CyberHeaven//|[[Lack of awareness, cloud apps, and remote workers create perfect storm for insider attacks|https://www.cyberhaven.com/press/2020-insider-threat-report]] ([[rapport|https://www.cyberhaven.com/survey-2020-insider-threat-report]])|Report|
=== and Trustwave+++*[»]>
|2020.04.22|//Trustwave//|[[New Trustwave Report Reveals Cybersecurity Threats Becoming Pervasive and Attacks More Targeted|https://www.trustwave.com/en-us/company/newsroom/news/new-trustwave-report-reveals-cybersecurity-threats-becoming-pervasive-and-attacks-more-targeted/]] ([[rapport|https://www.trustwave.com/en-us/resources/library/documents/2020-trustwave-global-security-report/]])|Report|
=== 
* Azure: Credentials stealing+++*[»]>
|2020.04.22|//Varonis//|![[Azure Skeleton Key: Exploiting Pass-Through Auth to Steal Credentials|https://blogvaronis2.wpengine.com/azure-skeleton-key/]]|Azure AzureAD Risks|
|2020.04.22|The Daily Swig| → [[Cloud security: Azure environments at risk from on-prem privilege escalation attack|https://portswigger.net/daily-swig/cloud-security-azure-environments-at-risk-from-on-prem-privilege-escalation-attack]]|Azure AzureAD Risks|
|2020.04.24|Silicon[>img[iCSF/flag_fr.png]]| → [[Office 365 : de gros trous dans l’authentification ?|https://www.silicon.fr/office-365-authentification-338541.html]]|O365 Vulnerability|
=== and Security Center enhancements+++*[»]>
|2020.04.20|//Microsoft Azure//|[[Azure Security Center enhancements|https://azure.microsoft.com/en-us/blog/azure-security-center-enhancements/]]|Azure|
=== 
* Podcast: SilverLining+++*[»]>
|2020.04.21|SilverLining IL|![[Episode 19: Understanding Cloud Attack Vectors|https://silverlining.media/019-understanding-cloud-attack-vectors/]] ([[mp3|https://techtalk-podcast.s3-eu-west-1.amazonaws.com/silver-lining/silver-lining-19.mp3]])|Podcast Attack_Vector|
=== 
* Miscellaneous: Kubernetes ATT&CK Matrix (Recon)+++*[»]>
|2020.04.24|//Lacework//|[[Kubernetes Recon: A Closer Look at Discovery from the Kubernetes Attack Matrix|https://www.lacework.com/kubernetes-recon-attack-matrix/]]|ATT&CK Kubernetes|
=== and Attack Scenarios+++*[»]>
|2020.04.23|//ThreatStack//|[[Investigating Kubernetes Attack Scenarios in Threat Stack (part 1)|https://www.threatstack.com/blog/kubernetes-attack-scenarios-part-1]]|Kubernetes Attack|
===; Confidential Computing+++*[»]>
|2020.04.22|Dark Reading|[[IBM Cloud Data Shield Brings Confidential Computing to Public Cloud|https://www.darkreading.com/cloud/ibm-cloud-data-shield-brings-confidential-computing-to-public-cloud/d/d-id/1337626]]|Confidential_Computting|
|2020.04.21|//Cloud Management Insider//|[[Can Azure Confidential Computing Promise Security In The Data Breach World?|https://www.cloudmanagementinsider.com/can-azure-confidential-computing-promise-security-in-the-data-breach-world/]]|Confidential_Computing|
===; containers+++*[»]>
|2020.04.22|Container Journal|[[Containers Are Not VMs, and Other Misconceptions|https://containerjournal.com/topics/container-ecosystems/containers-are-not-vms-and-other-misconceptions/]]|Cntainers|
|2020.04.21|//Anchore//|[[Our Top 5 Strategies for Modern Container Security|https://anchore.com/blog/top-5-strategies/]]|Containers|
=== 

|ssTabl96|k
|!⇒ [[CloudSecurityAlliance.fr/go/K4Q/|https://CloudSecurityAlliance.fr/go/K4Q/]] |
|!Avril|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2020.04.26|
|2020.04.26|Cloud Security Podcast|[[Serverless Security Best Practices with Abhay Bhargav, CTO, we45|https://anchor.fm/cloudsecuritypodcast/episodes/Scaling-a-DevSecOps-model--SERVERLESS-SECURITY-BEST-PRACTICES-with-Abhay-Bhargav---CTO---we45-ed90jm]]|Podcast DevSecOps|
|2020.04.26|Security Boulevard|[[Can I Use Azure AD for Authentication?|https://securityboulevard.com/2020/04/can-i-use-azure-ad-for-authentication/]]|AzureAD|
|>|>|>|!2020.04.25|
|2020.04.25|//Avast//|[[Data in Transit Encryption|https://blog.avast.com/data-in-transit-encryption]]|Encryption|
|>|>|>|!2020.04.24|
|2020.04.24|Silicon[>img[iCSF/flag_fr.png]]|[[Anthos : l’offensive multicloud de Google commence avec AWS|https://www.silicon.fr/anthos-multicloud-google-aws-338594.html]]|GCP Anthos|
|2020.04.24|Solutions Review|[[5 Key Considerations for Successful Cloud Security|https://solutionsreview.com/cloud-platforms/5-key-considerations-for-successful-cloud-security/]]|Best_Practices|
|2020.04.24|SecureCloud.blog|[[Hidden gem in Azure: Scan your docker images in ACR, view results in Sub Assessment API and Azure Security Center|https://securecloud.blog/2020/04/24/hidden-gem-in-azure-scan-your-docker-images-in-acr-view-results-in-sub-assessment-api-and-azure-security-center/]]|Azure Scanning|
|2020.04.24|Signal Sciences|[[Continuous Contextual Authentication: Cybersecurity and Identity Converge in a Hybrid-cloud World|https://www.signalsciences.com/blog/continuous-contextual-authentication-cybersecurity-and-identity-converge-in-a-hybrid-cloud-world/]]|Authentication APIs|
|2020.04.24|//Lacework//|[[Kubernetes Recon: A Closer Look at Discovery from the Kubernetes Attack Matrix|https://www.lacework.com/kubernetes-recon-attack-matrix/]]|ATT&CK Kubernetes|
|2020.04.24|//Palo Alto Networks//|[[3 Myths About Security in the Cloud|https://blog.paloaltonetworks.com/2020/04/cloud-3-myths-about-security-in-the-cloud/]]|Misc|
|2020.04.24|//Cloud Management Insider//|[[How To Ensure Security For Your Cloud Storage?|https://www.cloudmanagementinsider.com/cloud-storage-best-practices-2020/]]|Storage Best_Practices|
|2020.04.24|//IBM//|[[IBM Research – Confidentiality and Governance of Cloud Services|https://devops.com/ibm-research-confidentiality-and-governance-of-cloud-services%e2%80%af/]]|Confidentiality Governance|
|2020.04.24|//ThreatVector//|[[Video: Sherri Davidoff and Threat Hunting in the Cloud|https://threatvector.cylance.com/en_us/home/video-sherri-davidoff-and-threat-hunting-in-the-cloud.html]] ([[vidéo|https://www.youtube.com/watch?v=6YWFFxMmyC0]])|Threat_Hunting|
|2020.04.24|//NCC Group//|![[The Extended AWS Security Ramp-Up Guide|https://research.nccgroup.com/2020/04/24/the-extended-aws-security-ramp-up-guide/]]|AWS best_Practices|
|>|>|>|!2020.04.23|
|2020.04.23|Réseaux & Télécoms[>img[iCSF/flag_fr.png]]|[[Google Cloud Anthos est désormais disponible pour AWS, avec Azure à suivre|http://www.reseaux-telecoms.net/actualites/lire-google-cloud-anthos-est-desormais-disponible-pour-aws-avec-azure-a-suivre-27955.html]]|GCP Anthos|
|2020.04.23|Solutions Review|[[Google Anthos Enters General Availability with Support for AWS|https://solutionsreview.com/cloud-platforms/google-anthos-enters-general-availability-with-support-for-aws/]]|GCP Anthos|
|2020.04.23|ShiftKeft|[[Dev + Sec + Ops ! = DevSecOps|https://blog.shiftleft.io/dev-sec-ops-devsecops-5d05e3516e00]]|DevSecOps|
|2020.04.23|//ThreatStack//|[[Investigating Kubernetes Attack Scenarios in Threat Stack (part 1)|https://www.threatstack.com/blog/kubernetes-attack-scenarios-part-1]]|Kubernetes Attack|
|2020.04.23|//Microsoft Azure//|[[Update #3: Business continuity with Azure|https://azure.microsoft.com/en-us/blog/update-3-business-continuity-azure/]] (3/3)|COVID-19 Azure Resilience|
|2020.04.23|//Managed Methods//|[[Google Drive Security for Remote Learning & Working|https://managedmethods.com/blog/google-drive-security/]]|Google_Drive DLP Compliance|
|2020.04.23|//Neu Vector//|[[10 Steps to Automate Container Security Into the CI/CD Pipeline|https://neuvector.com/container-security/container-security-automation/]]|Containers CD_CI|
|2020.04.23|//Exabeam//|[[7 Cloud Security Tools to Watch for in 2020|https://www.exabeam.com/information-security/7-cloud-security-tools-to-watch-for-in-2020/]]|Tools|
|2020.April.23|//Threatstack//|[[Investigating Kubernetes Attack Scenarios in Threat Stack (part 1) | Threat Stack|https://www.threatstack.com/blog/kubernetes-attack-scenarios-part-1]] (1/2)|Kubernetes Attack_Scenario|
|>|>|>|!2020.04.22|
|2020.04.22|Dark Reading|[[Learning from the Honeypot: A Researcher and a Duplicitous Docker Image|https://www.darkreading.com/theedge/learning-from-the-honeypot-a-researcher-and-a-duplicitous-docker-image/b/d-id/1337618]]|Docker Attacks Honeypot|
|2020.04.22|Dark Reading|[[IBM Cloud Data Shield Brings Confidential Computing to Public Cloud|https://www.darkreading.com/cloud/ibm-cloud-data-shield-brings-confidential-computing-to-public-cloud/d/d-id/1337626]]|Confidential_Computting|
|2020.04.22|Container Journal|[[Containers Are Not VMs, and Other Misconceptions|https://containerjournal.com/topics/container-ecosystems/containers-are-not-vms-and-other-misconceptions/]]|Cntainers|
|2020.04.22|Rick's Cloud|[[Top Five Secure Computing Tips|https://rickscloud.com/top-five-secure-computing-tips/]]|Best_Practices|
|2020.04.22|//Varonis//|![[Azure Skeleton Key: Exploiting Pass-Through Auth to Steal Credentials|https://blogvaronis2.wpengine.com/azure-skeleton-key/]]|Azure AzureAD Risks|
|2020.04.22|The Daily Swig| → [[Cloud security: Azure environments at risk from on-prem privilege escalation attack|https://portswigger.net/daily-swig/cloud-security-azure-environments-at-risk-from-on-prem-privilege-escalation-attack]]|Azure AzureAD Risks|
|2020.04.24|Silicon[>img[iCSF/flag_fr.png]]| → [[Office 365 : de gros trous dans l’authentification ?|https://www.silicon.fr/office-365-authentification-338541.html]]|O365 Vulnerability|
|2020.04.22|//Trustwave//|[[New Trustwave Report Reveals Cybersecurity Threats Becoming Pervasive and Attacks More Targeted|https://www.trustwave.com/en-us/company/newsroom/news/new-trustwave-report-reveals-cybersecurity-threats-becoming-pervasive-and-attacks-more-targeted/]] ([[rapport|https://www.trustwave.com/en-us/resources/library/documents/2020-trustwave-global-security-report/]])|Report|
|2020.04.22|//CyberHeaven//|[[Lack of awareness, cloud apps, and remote workers create perfect storm for insider attacks|https://www.cyberhaven.com/press/2020-insider-threat-report]] ([[rapport|https://www.cyberhaven.com/survey-2020-insider-threat-report]])|Report|
|2020.04.22|//CipherCloud//|[[Why Cloud DLP is the most important technology for SaaS apps?|https://www.ciphercloud.com/why-cloud-dlp-is-the-most-important-technology-for-saas-apps/]]|DLP SaaS|
|2020.04.25|Dark Reading| → [[Communication, Cloud & Finance Apps Most Vulnerable to Insider Threat|https://www.darkreading.com/cloud/communication-cloud-and-finance-apps-most-vulnerable-to-insider-threat/d/d-id/1337636]]|Report|
|2020.04.22|//Cloudonaut//|[[Anonymize CloudFront Access Logs|https://cloudonaut.io/anonymize-cloudfront-access-logs/]]|AWS Cloudfront Anonymization Logging|
|2020.04.22|//Aqua Security//|[[Dynamic Threat Analysis for Container Images: Uncovering Hidden Risks|https://blog.aquasec.com/dynamic-container-analysis]]|Container Risks|
|>|>|>|!2020.04.21|
|2020.04.21|SilverLining IL|![[Episode 19: Understanding Cloud Attack Vectors|https://silverlining.media/019-understanding-cloud-attack-vectors/]] ([[mp3|https://techtalk-podcast.s3-eu-west-1.amazonaws.com/silver-lining/silver-lining-19.mp3]])|Podcast Attack_Vector|
|2020.04.21|CloudTweaks|[[Questions To Ask Every Cloud Storage Provider|https://cloudtweaks.com/2020/04/cloud-storage-provider-questions/]]|Storage Assessment|
|2020.04.21|Dark Reading|[[7 Steps to Avoid the Top Cloud Access Risks|https://www.darkreading.com/cloud/7-steps-to-avoid-the-top-cloud-access-risks-/a/d-id/1337545]]|Best_Practices Top_Threats|
|2020.04.21|//CloudPassage//|[[Dozen Dirtiest CVEs Q120 (Cloud Vulnerability Exposures)|https://www.cloudpassage.com/blog/dozen-dirtiest-cves-q120/]]|Vulnerabilities CVEs|
|2020.04.21|//Anchore//|[[Our Top 5 Strategies for Modern Container Security|https://anchore.com/blog/top-5-strategies/]]|Containers|
|2020.04.21|//Cloud Management Insider//|[[Can Azure Confidential Computing Promise Security In The Data Breach World?|https://www.cloudmanagementinsider.com/can-azure-confidential-computing-promise-security-in-the-data-breach-world/]]|Confidential_Computing|
|2020.04.21|//Compare the Cloud//|[[You have lots of APIs and Microservices – now what?|https://www.comparethecloud.net/articles/you-have-lots-of-apis-and-microservices-now-what/]]|APIs Microservices|
|2020.04.21|//Perimeter81//|[[SASE and Zero Trust Are a Perfect Match|https://www.perimeter81.com/blog/zero-trust/sase-and-zero-trust-perfect-match/]]|SASE Zero_Trust|
|2020.04.21|//Microsoft//|[[Security roadmap - Top priorities for the first 30 days, 90 days, and beyond|https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/security-roadmap?view=o365-worldwide]]|O365 M365|
|2020.04.10|//AppOmni//|[[SaaS Security Best Practices in #WFH World|https://cdn2.hubspot.net/hubfs/6705456/Collateral/AppOmni%20SaaS%20Security%20Best%20Practices%20WFH%20World.pdf]]|SaaS Best_Practices|
|>|>|>|!2020.04.20|
|2020.04.20|Solutions Review|[[The 4 Major Players in Cloud Management Platforms, 2020|https://solutionsreview.com/cloud-platforms/the-4-major-players-in-cloud-management-platforms-2020/]]|CSPM|
|2020.04.20|//Microsoft Azure//|[[Azure Security Center enhancements|https://azure.microsoft.com/en-us/blog/azure-security-center-enhancements/]]|Azure|
|2020.04.20|//Microsoft//|[[What's the difference between Azure Active Directory Identity Protection and Conditional Access?|https://techcommunity.microsoft.com/t5/itops-talk-blog/what-s-the-difference-between-azure-active-directory-identity/ba-p/1320887]]|AzureAD|
|2020.04.20|//SynAcktiv//|[[Azure AD introduction for red teamers|https://www.synacktiv.com/posts/pentest/azure-ad-introduction-for-red-teamers.html]]|AzureAD Pentesting|
|2020.04.20|//Capsule8//|[[Security Delusions Part 1: A History of Cloud Compunction|https://capsule8.com/blog/security-delusions-part-1-a-history-of-cloud-compunction/]] (1/3)|History Architecture|
[>img(200px,auto)[iCSA/K4QCCSK.png]]Comme annoncé précédemment, le [[Chapitre Français]] de la [[Cloud Security Alliance]] organise une formation officielle [[CCSK]] pour le ''CCSK Foundation'' et le ''CCSK Plus''. Elle se tiendra la semaine du 15 juin 2020.
Elle sera dispensée ''en français''^^[img[iCSF/flag_fr.png]]^^ par ''Guillaume Boutisseau''^^1^^, ''CCSK Authorized Instructor''.
|>|!Un webinar est organisé Mercredi 29 avril à partir de 13h30 à 14h15 |
|Programme|1 - Détails pour les formations ''CCSK Foundation'' et ''CCSK Plus'' de la semaine du 15 juin 2020 |
|~|2 - Présentation du contenu des 2 formations |
|~|3 - Présentation des conditions de réalisation de la formation |
|~|4 - Présentation des conditions de passage de l'examen pour la certification CCSK |
|~|5 - Prix et nombre de jeton pour passer l'examen |
|~|6 - Scéance de questions / réponses en direct |
Pour s'inscrire à ce webinar et recevoir le lien pour le suivre, envoyez un message avec votre adresse email à ''Guillaume Boutisseau'' sur [[Circle|CSA Circle]] ou sur [[LinkedIN]].

Vous pouvez déjà relire les articles publiés par Guillaume Boutisseau sur le sujet :
* "''CCSK la formation à suivre''"+++*[»]> <<tiddler [[2019.01.24 - Blog : CCSK la formation à suivre]]>>=== 
* "''Contenu de la formation officielle CCSK du 15 juin 2020''"+++*[»]> <<tiddler [[2020.04.20 - Blog : Contenu de la formation officielle CCSK du 15 juin 2020]]>>=== 
* "''L'examen pour passer la certification CCSK en juin 2020''"+++*[»]> <<tiddler [[2020.04.25 - Blog : L'examen pour passer la certification CCSK en juin 2020]]>>=== 

Rappel des dates : 
* Lundi 15 et mardi 16 juin 2020 : ''CCSK Foundation''
* Lundi 15, mardi 16 juin et mercredi 17 juin 2020 : ''CCSK Plus''
[img(50%,1px)[iCSF/BluePixel.gif]]
^^1^^ Guillaume Boutisseau est un "formateur certifié CCSK" ou "''CCSK Authorized Instructor''+++*[»]> https://cloudsecurityalliance.org/education/instructors ===" et son attestation est disponible+++*[ici »]> ^^ https://cloudsecurityalliance.org/rails/active_storage/blobs/eyJfcmFpbHMiOnsibWVzc2FnZSI6IkJBaHBBdkVKIiwiZXhwIjpudWxsLCJwdXIiOiJibG9iX2lkIn19--d3415bd77ff8e91832bfd76f3426ff27902b3c4a/ccsk-ttt-Guillaume-Boutisseau.pdf ^^ ===.
[img[iCSF/flag_fr.png]]^^gb oc^^[img(50%,1px)[iCSF/BluePixel.gif]]
[>img(200px,auto)[iCSA/K4PCCSK.png]]Nouvel article de ''Guillaume Boutisseau'', ''CCSK Authorized Instructor'', qui animera une formation officielle [[CCSK]] pour le ''CCSK Foundation'' et le ''CCSK Plus'' la semaine du 15 juin 2020.
!!L'examen CCSK
L'examen CCSK comporte 60 questions et dure 90 minutes. Il faut répondre correctement à au moins 80% des questions pour obtenir la certification CCSK.
Un jeton (//exam token//) est inclus dans la formation officielle. Il donne droit à 2 tentatives.

Environ 87% de l'examen porte sur le document ''CSA Guidance v4'', ce qui en fait le document le plus important. ''CCM'' et ''ENISA recommendations'' représentent à peu près 6% chacun.
[>img(100px,auto)[iCSA/K4KCC.jpg]][>img(100px,auto)[iCSA/K4KEN.jpg]][>img(100px,auto)[iCSA/K4KSG.png]]Les documents sont autorisés lors de l'examen (mode //open book//), et on peut donc consulter ces 3 documents (''Guidance v4'', ''ENISA recommendations'', ''CCM'') pendant l'examen. Mais attention, il faut bien comprendre que pour la grande majorité des questions, on ne trouve pas la réponse après une simple recherche dans ces documents. Une compréhension solide du contenu de ces documents et de la sécurité dans le cloud est indispensable. Il n'est pas non plus envisageable de chercher dans les documents pour chacune des 60 questions. La durée de l'examen (90 minutes) ne le permet pas.

Le taux de réussite à l'examen avec 1 seul jeton  (donc quand la certification est obtenue dès la première tentative ou sinon la deuxième tentative) est de ''62%''.
Le ''CCSK'' ne fait pas partie des examens faciles, mais il garantit aussi une compréhension solide de la sécurité dans le cloud, et c'est une des meilleures références dans ce domaine.

Le résultat est connu immédiatement, dès la fin de l'examen. Un tableau de performances est également présenté, il permet à ceux qui ne réussissent pas dès la premiere tentative, d'identifier les domaines à réviser plus en profondeur avant de passer à la deuxième tentative.

Un examen blanc sera proposé pendant la formation officielle du 15 juin 2020, ainsi qu'une stratégie pour se préparer, et identifier et chosir les bonnes réponses aux questions de l'examen final.
[img(50%,1px)[iCSF/BluePixel.gif]]
^^1^^ Guillaume Boutisseau est un "formateur certifié CCSK" ou "''CCSK Authorized Instructor''+++*[»]> https://cloudsecurityalliance.org/education/instructors ===" et son attestation est disponible+++*[ici »]> ^^ https://cloudsecurityalliance.org/rails/active_storage/blobs/eyJfcmFpbHMiOnsibWVzc2FnZSI6IkJBaHBBdkVKIiwiZXhwIjpudWxsLCJwdXIiOiJibG9iX2lkIn19--d3415bd77ff8e91832bfd76f3426ff27902b3c4a/ccsk-ttt-Guillaume-Boutisseau.pdf ^^ ===.
[img[iCSF/flag_fr.png]]^^gb^^[img(50%,1px)[iCSF/BluePixel.gif]]
!//Incriptions ouvertes pour le 'CSA Virtual EU Summit' du 9 au 12 juin 2020//
[>img(300px,auto)[iCSA/K69S0.jpg]]Compte-tenu de la situation sanitaire actuelle en Europe et de son évolution, le ''CSA EU Summit 2020'' initialement prévu le 9 juin 2020 à Bruxelles+++*[»]]> https://csacongress.org/event/csa-eu-summit-2020/ === est remplacé par un ''Virtual EU Summit'' du 9 au 12 juin 2020, de 9h00 à 11h30.
Un thème différent sera abordé chaque jour :
# Mardi 9 juin : certification
# Mercredi 10 juin : gestion des risques et gouvernance
# Jeudi 11 juin : respect de la vie privée et du RGPD
# Vendredi 12 juin : nouvelles tendances ayant un impact sur l'Union Européenne
[img(500px,auto)[iCSA/K69VS.png]]
|>|>|>|!09 June 2020|
|09:00|09:30|//Toward a European Certification Scheme for Cloud Services//|Eric Vétillard, Lead Certification Expert, ENISA|
|09:40|10:10|//Keynote Session - Microsoft//|Andreas Fuchsberger, International Standards Officer, Microsoft|
|10:20|10:50|//Keynote Session//||
|>|>|>|!10 June 2020|
|09:00|10:15|//Panel Discussion: Auditing and Compliance//|Daniele Catteddu, Chief Technology Officer, Cloud Security Alliance|
|>|||Craig Balding, Independent Cyber Security Consultant|
|>|||Steven Mezzio, Director, Lubin School of Business Center for Excellence in Financial Reporting|
|10:20|10:50|//Lines of Defense within the Public Sector//|
|11:00|11:30|//Keynote Session//||
|11:30|12:00|//|Keynote Speaker - OneTrust GRC//|Scott Bridgen, GRC Consulting Director, OneTrust GRC|
|>|>|>|!11 June 2020|
|09:00|10:15|//Panel Discussion: GDPR with the CSA Center of Excellence//|Linda Strick, EMEA Managing Director, Cloud Security Alliance|
|>|||Blake Brannon, Chief Technology Officer, OneTrust|
|10:20|11:00|//Keynote Session - CNIL (French Data Protection Authority)//|
|>|>|>|!12 June 2020|
|09:00|10:00|//Emerging Trends Impacting the European Union//|Daniele Catteddu, Chief Technology Officer, Cloud Security Alliance|
|>|||Raj Samani, Chief Scientist, McAfee|
|10:00|10:30|//Keynote Session//||
__Détails :__
* Inscriptions &Arr; ''[[CloudSecurityAlliance.fr/go/k69c/|https://CloudSecurityAlliance.fr/go/k69c/]]''
[img[iCSF/flag_fr.png]]^^oc^^[img(50%,1px)[iCSF/BluePixel.gif]]
!"//Guideline for the Dark Cloudy Days//"
[>img(150px,auto)[iCSA/K4MBG.jpg]]Article de blog publié le 22 avril 2020 — Rédigé par Prof. Alex SIOW, Professor (Practice) in the School of Computing, NUS et LIM Soon Tein, Vice President, IT, ST Electronics
<<<
//Given today's evolving threat landscape, incident response (IR) strategy for safeguarding is no longer optional. In 2019 alone, the cloud realm saw countless notable breaches and outages for a variety of reasons. In preparation for an inevitable incident, cloud incident response (CIR) has become an indispensable pillar of any organization and should be properly developed to achieve a good security posture. A comprehensive incident response strategy needs to be able to not only cater to today's complex threat landscape, but also be applicable in a variety of other situations such as downtime caused by system failures, operational mistakes and force majeure etc.

When in the cloud, there are other considerations to IR strategies. Handling incidents on the cloud is fundamentally different than traditional on-premises IT, and this deviation arises due in part to three key aspects - Governance, Visibility and Shared Responsibility of the cloud.
__''Governance''__
When organizations engage multiple cloud service providers (CSPs), in addition to the fact that data could reside in multiple locations in the cloud, it could also be challenging getting the various organizations to investigate an incident together.
__''Visibility''__
Running workloads and services in the cloud means that organizations no longer have the same rights of visibility as traditional IT. Much of the underlying supporting infrastructure and services are abstracted and organizations can often only view logs provided by the CSP for the specific service being used. This can be a challenge when trying to fully understand an incident and stem its spread or escalation.
__''Shared responsibility''__
Cloud security involves various stakeholders such as cloud customers and CSPs and / or third-party providers. The various stakeholders have their part to play in this shared responsibility model. Generally, the customers are responsible for their own data, and the CSPs for the cloud infrastructure and services that they provide.

[>img(400px,auto)[iCSA/K4MBG.png]]A common framework that IR teams adopt is the lifecycle in ''NIST SP800-61R2 Computer Security Incident Handling Guide'' which runs through the phases of Preparation, Detection and Analysis, Containment, Eradication and Recovery, and Post-Mortem.
To further reinforce the CIR, a vital puzzle piece of ‘Coordination and Information Sharing' that is iterated at each phase of the CIR plan should be conside	red. Effective communication is not limited to just reporting to the customers. An attack typically affects more than one organization, simultaneously. Thus incident information sharing is mutually beneficial in helping other organizations guard against the same threats. The CSA runs the ''Cloud Cyber Incident Sharing Center'' (''CloudCISC'') that facilitates the sharing of incident data between participating CSPs.
When a critical incident occurs, there is no time to waste figuring out the game plan - every second that goes by is more data being potentially compromised. Having a methodical, step-by-step response plan can help organizations be better prepared when dealing with cloud incidents, which helps to manage and minimize damage to businesses.
The ''Cloud Incident Response (CIR) Working Group (WG)'' coalesces various industry incident response best practices and frameworks available in the industry in an on-going work, '''Cloud Incident Response Framework'''. The framework covers the major causes of cloud incidents (both security and non-security related) and their handling and mitigation strategies with the aim to provide a holistic and consistent view across widely used frameworks for the reader. This serves as a go-to guide for cloud users to effectively prepare for and manage the aftermath of cloud incidents, and also a transparent and common framework for CSPs to share cloud incident response practices with their customers.
The WG recently released a '[[Cloud Incident Response - A Quick Guide|2020.04.21 - Publication : Cadre de réponse aux incidents dans le Cloud]]', a succinct prequel to the main framework covering key ideas and concepts. Readers can expect a step-by-step guide, from preparation to post-mortem, with CIR guidelines curated for different levels of incident severity in the upcoming deliverable.
As a work in progress, the ''CIR WG'' welcomes individuals who are interested in contributing to this work to join the WG by registering here+++*[»]> https://cloudsecurityalliance.org/research/join-working-group/ ===.//
<<<
__Lien :__
* Article sur le site de la CSA &Arr; ''[[CloudSecurityAlliance.fr/go/k4mb/|https://CloudSecurityAlliance.fr/go/k4mb/]]'' 
!"Cloud Incident Response Framework - A Quick Guide"
[>img(150px,auto)[iCSA/K4LPC.png]]A lire ! Ce document est publié par le Groupe de Travail ''Cloud Incident Response'' (CIR). 
<<<
//What this Quick Guide aims to do is to distill and give readers an overview of key contributions of the work currently undertaken in the CIR WG, towards a comprehensive CIR framework. The CIR WG hopes to take this opportunity to encourage volunteers to participate in the WG's efforts and provide valuable feedback to the ongoing work.//
<<<
__Table des Matières :__//{{ss2col{
<<<
//1. Executive Summary
2. Introduction
2.1 Incident Response vs Cloud Incident Response
2.2 What This Quick Guide Does
2.3 How Everything Kind of Fits Together
3. CIR Framework
3.1 Phase 1: Preparation
3.2 Phase 2: Detection and Analysis
3.3 Phase 3: Containment, Eradication, and Recovery
3.4 Phase 4: Post-Mortem
3.5 Continuous Phase: Coordination and Information Sharing
4. Incident Response Controls
5. Conclusion//
<<<
}}}
__Extrait :__//{{ss2col{
<<<
//The CIR Framework refers to several industry-accepted standards and frameworks to plan and prepare for cloud incident, mitigation strategies and post-mortem processes. The current list is not exhaustive, and the CIR WG welcomes contributions from the public.
# Technical Reference (TR) 62 – Cloud Outage Incident Response (COIR)
# CSA Security Guidance For Critical areas of Focus In Cloud Computing v4.0
# NIST 800-61 Computer Security Incident Handling Guide
# ISO/IEC 27035-1:2016
# ENISA Cloud Computing Risk Assessment
# Other relevant documents:
** ISO 22320:2011 Societal Security - Emergency Management - Requirements for Incident Response
** FedRAMP Incident Communications Procedure
** NIST 800-150 Guide to Cyber Threat Information Sharing
** NIST 800-53 Security and Privacy Controls for Information Systems and Organizations
** SANS Institute Information Security Reading Room Incident Handler's Handbook
There is an abundance of Incident Response (IR) standards, frameworks and guidelines available in the industry today, which can be overwhelming for organizations to comprehend. The following IR lifecycle diagram provides a clear understanding of how various chapters and sections across different frameworks fit into an IR lifecycle. This is especially helpful when the user needs to zoom in and plan for specific phases in the response process.//
[img(500px,auto)[iCSA/K4LPI.png]]
<<<
}}}
__Liens :__
* Document ⇒ ''[[CloudSecurityAlliance.fr/go/k4kp/|https://CloudSecurityAlliance.fr/go/k4kp/]]''
!"//Cloud Adoption Considerations for IoT and OT//"
[>img(250px,auto)[iCSA/K4LWC.png]]Webinar [[CloudBytes]] diffusé le 21 avril 2020 — Présenté par Shih Hsien Lim, Chief Security Officer, société SP Group
<<<
//IoT in the enterprise will generate new information and business models that will strain on-prem capabilities and resources. The challenges can be resolved by judicious of the cloud. This potential upside needs to be weighted against risks around data privacy, visibility, and (in)effectiveness of traditional security tools and approaches.
The increasing digitisation of OT (Operations Technology) will impose similar challenges, with the added key dimension of safety on top of the traditional tripartite of confidentiality, integrity and availability.
The talk will thus dive deeper into these real-world challenges and share some practical considerations and approaches.//
<<<
&Arr; S'inscrire au Webinar de 60 minutes [[sur le site de BrightTALK|https://CloudSecurityAlliance.fr/go/k4lw/]].
[>img(200px,auto)[iCSA/K4KCCSK.png]]Comme annoncé précédemment, le [[Chapitre Français]] de la [[Cloud Security Alliance]] organise une formation officielle [[CCSK]] pour le ''CCSK Foundation'' et le ''CCSK Plus''. Elle se tiendra la semaine du 15 juin 2020.
Elle sera dispensée ''en français''^^[img[iCSF/flag_fr.png]]^^ par ''Guillaume Boutisseau''^^1^^, ''CCSK Authorized Instructor''.
!!Contenu de la formation officielle CCSK du 15 juin 2020
La formation ''CCSK Fondation'' comprend tous les modules théoriques (module 1 à module 6, listés plus bas), elle dure 2 jours et permet d'obtenir 14 CPEs.
La formation ''CCSK Plus'' comprend tous les modules théoriques, ainsi que des exercices pratiques dans le cloud AWS (lab 1 à lab 6, listés plus bas). Elle dure 3 jours et permet d'obtenir 21 CPEs.
!!!Les modules théoriques
{{ss2col{ Les modules théoriques sont le suivants :
* module 1 : définitions et architectures du cloud
* module 2 : sécurité des infrastructures cloud
* module 3 : choix du fournisseur cloud et gestion du risque
* module 4 : sécurisation des données
* module 5 : sécurisation des applications
* module 6 : opérations dans l'environnement cloud
[img(200px,auto)[iCSA/K4KMO.png]] }}}
[>img(100px,auto)[iCSA/K4KCC.jpg]][>img(100px,auto)[iCSA/K4KEN.jpg]][>img(100px,auto)[iCSA/K4KSG.png]]Ces modules théoriques couvrent le contenu des 3 documents essentiels à la preparation de l'examen CCSK (on peut les télécharger en Anglais sur le site CSA):
* CSA Guidance v4
* Cloud Control Matrix (CCM)
* ENISA Recommendations
Les points les plus importants de ces 3 documents seront repris dans un document en Français qui sera distribué aux participants. Ce document pourra servir de référence pour l'examen, il peut aussi servir de référence pour tout projet cloud.
!!!Les exercices pratiques
Exercices pratiques (AWS):
* lab 1 : sécurisation des comptes d'accès (IAM, MFA)
* lab 2 : permissions des comptes et options de monitoring (Policies, CloudTrail, CloudWatch)
* lab 3 : sécurité des réseaux et des instances (VPC, Security Group, ACL, Inspector)
* lab 4 : chiffrement des données et sécurisation des stockages (S3, EBS, KMS)
* lab 5 : sécurité des applications et fédération des identités (WAF, OpenID, Oauth, SSO)
* lab 6 : comparaison et choix de fournisseurs cloud (STAR, CCM, CAIQ)
Les exercices pratiques permettent d'appliquer dans un environnement cloud réel les points couverts dans les modules théoriques. Les labs sont vivement recommandés à tous ceux qui n'ont pas une expérience pratique du cloud.
!!!A suivre...
Une liste plus détaillée des modules et labs compris dans la formation est disponible en Anglais sur le site CSA: https://cloudsecurityalliance.org/artifacts/ccsk-course-outlines/ 
Tous les éléments listés dans ce document seront présentés et expliqués en Français lors de la formation.
Enfin, pour se préparer à l'examen ''CCSK'', une série de questions semblables à celles de l'examen final sera distribuée aux participants et étudiée en détails.

Des détails complémentaires, dont les modalités d'inscritpions, seront publiés dans les prochains jours.
[img(50%,1px)[iCSF/BluePixel.gif]]
^^1^^ Guillaume Boutisseau est un "formateur certifié CCSK" ou "''CCSK Authorized Instructor''+++*[»]> https://cloudsecurityalliance.org/education/instructors ===" et son attestation est disponible+++*[ici »]> ^^ https://cloudsecurityalliance.org/rails/active_storage/blobs/eyJfcmFpbHMiOnsibWVzc2FnZSI6IkJBaHBBdkVKIiwiZXhwIjpudWxsLCJwdXIiOiJibG9iX2lkIn19--d3415bd77ff8e91832bfd76f3426ff27902b3c4a/ccsk-ttt-Guillaume-Boutisseau.pdf ^^ ===.
Il est aussi CCSP (ISC)2 ID:552407.
Il a déjà rédigé en janvier 2019 un article intitulé "[[CCSK la formation à suivre|2019.01.24 - Blog : CCSK la formation à suivre]]"+++*[»]> <<tiddler [[2019.01.24 - Blog : CCSK la formation à suivre]]>> ===.
[img[iCSF/flag_fr.png]]^^gb^^[img(50%,1px)[iCSF/BluePixel.gif]]
|[img(30px,auto)[iCSF/Francais.gif]] @@color:#00F;font-size:125%;__[[Version française|2020.04.19 - Newsletter Hebdomadaire - #60]]__@@ |[img(30px,auto)[iCSF/Anglais.gif]] @@color:#00F;font-size:125%;__[[English version|2020.04.19 - Weekly Newsletter - #60]]__@@ |
|<<tiddler [[2020.04.19 - Newsletter Hebdomadaire - #60]]>> |<<tiddler [[2020.04.19 - Weekly Newsletter - #60]]>> |
!!1 - Nouveautés CSA et Informations de la semaine du 13 au 19 avril 2020
* Formation ''CCSK en Français'' en juin 2020+++*[»]> <<tiddler [[2020.04.12 - Formation CCSK en Français en juin 2020]]>>=== 
* Conférences en ligne du CSA 'CloudBytes Connect' et 'Virtual EU Summit' en mai et juin 2020+++*[»]> <<tiddler [[2020.04.14 - #CSAAnywhere : conférences en ligne du CSA]]>>=== 
* Appels à commentaires : ''CSA'' 'Hybrid Clouds and its Associated Risks'+++*[»]> <<tiddler [[2020.04.10 - Appel à commentaires : 'Hybrid Clouds and its Associated Risks']]>>=== et ''NIST'' 800-210 'General Access Control Guidance for Cloud Systems'+++*[»]> <<tiddler [[2020.04.01 - Appel à commentaires : NIST 800-210 'General Access Control Guidance for Cloud Systems']]>>=== 
* Sondages : sur la technologie CASB d'ici pour le ''20 avril''+++*[»]> <<tiddler [[2020.03.09 - Sondage sur la technologie CASB]]>>===, sur la sensibilisation à la cryptographie quantique+++*[»]> <<tiddler [[2020.03.09 - Sondage sur la sensibilisation à la cryptographie quantique]]>>=== et sur l'adoption du Cloud (28 avril)+++*[»]> <<tiddler [[2020.04.18 - Actu : Sondage sur l'adoption du Cloud (1/2)]]>>=== 
!!2 - Veille Web Cloud et Sécurité
La [[Veille Web|2020.04.19 - Veille Hebdomadaire - 19 avril]] avec plus de 50 liens dont :
* Etudes et rapports : Fugue (COVID-19)+++*[»]>
|2020.04.13|//Fugue//|[[Fugue Survey Finds Widespread Concern Over Cloud Security Risks During the COVID-19 Crisis|https://www.fugue.co/press/releases/fugue-survey-finds-widespread-concern-over-cloud-security-risks-during-the-covid-19-crisis]]|Survey|
=== et Imperva+++*[»]>
|2020.04.13|//Imperva//|[[The 2020 Cyberthreat Defense Report: Simplify Security with Unified Tools and Monitoring|https://www.imperva.com/blog/the-2020-cyberthreat-defense-report-simplify-security-with-unified-tools-and-monitoring/]]|Survey|
=== 
* Fuites de données : Clearview+++*[»] 
|2020.04.17|TechDirt|[[Cybersecurity Firm Finds A Bunch Of Clearview's Secret Stuff Sitting Around In An Poorly-Secured Cloud Storage Bucket|https://www.techdirt.com/articles/20200416/17414544321/cybersecurity-firm-finds-bunch-clearviews-secret-stuff-sitting-around-poorly-secured-cloud-storage-bucket.shtml]]|Data_Leak|
===, approche pour contrer une fuite dans le Cloud+++*[»] 
|2020.04.14|//AttackIQ//|[[Defeating a Cloud Breach Part 3|https://attackiq.com/blog/2020/04/14/defeating-a-cloud-breach-part-3/]] (3/3)|Attack Breach|
|2020.04.06|//AttackIQ//|[[Defeating a Cloud Breach Part 2|https://attackiq.com/blog/2020/04/06/defeating-a-cloud-breach-part-2/]] (2/3)|Attack Breach|
|2020.03.30|//AttackIQ//|[[Defeating a Cloud Breach Part 1|https://attackiq.com/blog/2020/03/30/defeating-a-cloud-breach-part-1/]] (1/3)|Attack Breach|
=== et impacts d'erreurs de configuration+++*[»] 
|2020.04.15|Dark Reading|[[You're One Misconfiguration Away from a Cloud-Based Data Breach|https://www.darkreading.com/cloud/youre-one-misconfiguration-away-from-a-cloud-based-data-breach/a/d-id/1337464]]|Misconfiguration|
===, analyse de risques FAIR™+++*[»] 
|2020.04.13|Fair Institute|![[Amazon S3 Bucket Data Breaches – a FAIR™ Risk Analysis|https://www.fairinstitute.org/blog/amazon-s3-bucket-data-breaches-a-fair-risk-analysis]]|AWS_S3 Data_Breach Risk_Analysis||
=== 
* Attaques et pannes : Panne Cloudflare+++*[»] 
|2020.04.15|Bleeping Computer|[[Cloudflare dashboard and APIs are down, some sites having issues|https://www.bleepingcomputer.com/news/technology/cloudflare-dashboard-and-apis-are-down-some-sites-having-issues/]]|Outage cloudflare|
=== et une explication sur une panne précédente+++*[»] 
|2020.04.16|CBR Online|[[Cloudflare Admits Outage Came After Technician Unplugged Cables|https://www.cbronline.com/news/cloudflare-technician-unplugged-cables]]|Outage Cloudflare|
===, les aventures d'une image Docker "pot de miel"+++*[»] 
|2020.04.15|//Akamai//|![[A Brief History of a Rootable Docker Image|https://blogs.akamai.com/sitr/2020/04/a-brief-history-of-a-rootable-docker-image.html]]|Docker Attacks Honeypot|
|2020.04.16|//ThreatPost//| → [[Poorly Secured Docker Image Comes Under Rapid Attack|https://threatpost.com/poorly-secured-docker-image-rapid-attack/154874/]]|Docker Attacks Honeypot|
=== 
* Menaces et protection : Matrice ATT&CK pour les serveurs Cloud sous Linux+++*[»] 
|2020.04.15|//Intezer//|![[The missing MITRE ATT&CK matrix for Linux cloud servers|https://intezer.com/blog/cloud/the-missing-mitre-attck-matrix-for-linux-cloud-servers/]]|ATT&CK Linux|
===, le Cloud comme protection anti-rançongiciel+++*[»] 
|2020.04.14|Security Week|![[Backup or Disaster Recovery for Protection Against Ransomware?|https://www.securityweek.com/backup-or-disaster-recovery-protection-against-ransomware]]|Backup DRP Ransomware|
=== 
* Formation : audit Docker et Kubernetes+++*[»] 
|2020.04.14|//Appsecco//|![[Attacking and Auditing Docker Containers and Kubernetes Clusters|https://github.com/appsecco/attacking-and-auditing-docker-containers-and-kubernetes-clusters]]|Training Docker Kubernetes|
===, Azure Sentinel+++*[»] 
|2020.04.13|//Microsoft Azure//|![[Become an Azure Sentinel Ninja: The complete level 400 training|https://techcommunity.microsoft.com/t5/azure-sentinel/become-an-azure-sentinel-ninja-the-complete-level-400-training/ba-p/1246310]]|Training Azure|
=== 
* Divers : détection d'intrusion sur AWS+++*[»] 
|2020.04.15|ZDnet|[[New tool detects AWS intrusions where hackers abuse self-replicating tokens|https://www.zdnet.com/article/new-tool-detects-aws-intrusions-where-hackers-abuse-self-replicating-tokens/#ftag=RSSbaffb68]]|AWS [[Tools|Outils-GitHub]]|
=== et dans Docker+++*[»] 
|2020.04.13|//Uptics//|[[Detecting Docker Container Malware using osquery|https://www.uptycs.com/blog/detecting-docker-container-malware-using-osquery]]|Docker Malware Detection|
===, sécurité Multi-Cloud+++*[»]>
|2020.04.15|SANS|[[Top 5 Considerations for Multicloud Security|https://www.sans.org/blog/top-5-considerations-for-multicloud-security/]] ([[étude|https://www.sans.org/reading-room/whitepapers/cloud/top-5-considerations-multicloud-security-39505]])|Multi_Cloud|
===, bizarreries entre CloudTrail et des API AWS+++*[»] 
|2020.04.16|Hacking Exposed|[[The curious case of cloud trail and AWS EBS Block API access|https://www.hecfblog.com/2020/04/daily-blog-675-curious-case-of-cloud.html]]|AWS Gaps|
===, principes de sécurité de GCP+++*[»] 
|2020.04.16|Dawid Bałut|![[Security Principles of Google Cloud Platform|https://dawidbalut.com/2020/04/16/security-principles-of-google-cloud-platform/]]|GCP|
=== 
!3 - Weekly Cloud and Security Watch Newsletter[>img[iCSF/inEnglish.png]]
<<tiddler [[2020.04.19 - Weekly Newsletter - April 19th]]>> 
!CSA News and Updates - April 13th to 19th
* ''CCSK'' training in ''French'' in June 2020+++*[»]> <<tiddler [[2020.04.12 - Formation CCSK en Français en juin 2020]]>>=== 
* ''CloudBytes Connect'' and ''Virtual EU Summit'', two CSA global virtual events in May and June+++*[»]> <<tiddler [[2020.04.14 - #CSAAnywhere : conférences en ligne du CSA]]>>=== 
* Call for comments: 'CSA' 'Hybrid Clouds and its Associated Risks'+++*[»]> <<tiddler [[2020.04.10 - Appel à commentaires : 'Hybrid Clouds and its Associated Risks']]>>=== and 'NIST' SP 800-210 'General Access Control Guidance for Cloud Systems'+++*[»]> <<tiddler [[2020.04.01 - Appel à commentaires : NIST 800-210 'General Access Control Guidance for Cloud Systems']]>>=== 
* Surveys: 'Expectations and Evolution of CASBs' before ''April 20th''+++*[»]> <<tiddler [[2020.03.09 - Sondage sur la technologie CASB]]>>=== and Quantum-Safe Security Awareness before ''April 27th''+++*[»]> <<tiddler [[2020.03.09 - Sondage sur la sensibilisation à la cryptographie quantique]]>>===and on Cloud adoption before ''April 28th''+++*[»]> <<tiddler [[2020.04.18 - Actu : Sondage sur l'adoption du Cloud (1/2)]]>>=== 
!Cloud and Security News Watch
[[Over 50 links|2020.04.19 - Veille Hebdomadaire - 19 avril]] among which:
* Reports: Fugue (Concerns Over Cloud risks), and Imperva (2020 Cyberthreat Defense Report)
* Data Leaks: Clearview
* Attacks and outages: Cloudflare dashboard and APIs issue, and feedback on an earier outage; History of a rootable Docker image; Backup or Disaster Recovery for protection against ransomware; a FAIR™ Risk Analysis of Amazon S3 Bucket Data Breaches;
* Threats: MITRE ATT&CK matrix for Linux cloud servers; 
* Training: Attacking and auditing Docker containers and Kubernetes clusters; Become an Azure Sentinel Ninja
* Miscellaneous: Security Principles of Google Cloud Platform; final blog post of the 'Defeating a Cloud Breach' serie; discrepencies between CloudTrail and AWS EBS Block API access; Top Considerations for Multicloud Security; AWS intrusions detection based on self-replicating tokens abuse; Detecting Docker container malware; 

|ssTabl96|k
|!⇒ [[CloudSecurityAlliance.fr/go/K4J/|https://CloudSecurityAlliance.fr/go/K4J/]] |
|!Avril|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2020.04.18|
|2020.04.18|//Avast//|[[Data security issues in cloud computing|https://blog.avast.com/data-security-issues-in-cloud-computing]]|Privacy|
|>|>|>|!2020.04.17|
|2020.04.17|BSidesATL 2020|[[Detect: Shane Peden's 'Conquering The Cloud: Defense-In-Depth Strategies For Amazon Web Services'|http://www.youtube.com/watch?v=JuQj9uczqn8]] (vidéo)|Conference|
|2020.04.17|BSidesATL 2020|[[Protect: Oscar Salazar's 'Expose Yourself Without Insecurity: Cloud Breach Patterns'|http://www.youtube.com/watch?v=n0O4scm7mVc]] (vidéo)|Conference|
|2020.04.17|Security Week|[[DHS Working on Cloud-based Root-of-Trust to Secure Agency Email on Mobile Devices|https://www.securityweek.com/dhs-working-cloud-based-root-trust-secure-agency-email-mobile-devices]]|CRoT |
|2020.04.17|The Hacker News|[[Why SaaS opens the door to so many cyber threats (and how to make it safer)|https://thehackernews.com/2020/04/saas-cybersecurity.html]]|SaaS|
|2020.04.17|DZone|[[5 Best Security Practices for Kubernetes and Oracle Kubernetes Engine|https://dzone.com/articles/5-best-security-practices-for-kubernetes-and-oracle-kubernetes-engine]]|Best_Practices Kubernetes|
|2020.04.17|Security Newspaper|[[Pastebin is now more hacker friendly and will block cyber security researchers|https://www.securitynewspaper.com/2020/04/17/pastebin-is-now-more-hacker-friendly-and-will-block-cyber-security-researchers/]]|Pastebin|
|2020.04.17|TechDirt|[[Cybersecurity Firm Finds A Bunch Of Clearview's Secret Stuff Sitting Around In An Poorly-Secured Cloud Storage Bucket|https://www.techdirt.com/articles/20200416/17414544321/cybersecurity-firm-finds-bunch-clearviews-secret-stuff-sitting-around-poorly-secured-cloud-storage-bucket.shtml]]|Data_Leak|
|2020.04.17|//Palo Alto Networks//|[[Cloud Security 2021: 4 Key Trends You Shouldn't Miss|https://blog.paloaltonetworks.com/2020/04/cloud-security-2021/]]|Trends|
|2020.04.17|//Compare the Cloud//|[[4 Ways Armoured Vehicles Can Teach Us About Cloud Cybersecurity|https://www.comparethecloud.net/articles/4-ways-armoured-vehicles-can-teach-us-about-cloud-cybersecurity/]]|Misc|
|2020.04.17|//Menlo Security//|[[Is SaaS the New Trojan Horse in the Age of Cloud Computing?|https://www.infosecurity-magazine.com/white-papers/saas-trojan-horse/]]|SaaS|
|2020.04.17|//Proofpoint//|[[Securing Innovation in the Cloud: Best Practices for Remote Development Teams|https://www.forcepoint.com/blog/insights/remote-dev-team-best-practices]]|Innovation|
|>|>|>|!2020.04.16|
|2020.04.16|FedScoop|[[A closer look at TIC telework guidance reveals not all cloud providers are eligible|https://www.fedscoop.com/tic-telework-cloud-service-providers/]]|...|
|2020.04.16|Cybersecurity Insiders|[[Cloud Security concerns increase during Corona Virus Pandemic|https://www.cybersecurity-insiders.com/cloud-security-concerns-increase-during-corona-virus-pandemic/]]|COVID-19|
|2020.04.16|Help Net Security|[[On my mind: Transitioning to third-party cloud services|https://www.helpnetsecurity.com/2020/04/16/third-party-cloud-services/]]|Third_Party|
|2020.04.16|CBR Online|[[Cloudflare Admits Outage Came After Technician Unplugged Cables|https://www.cbronline.com/news/cloudflare-technician-unplugged-cables]]|Outage Cloudflare|
|2020.04.16|Dawid Bałut|![[Security Principles of Google Cloud Platform|https://dawidbalut.com/2020/04/16/security-principles-of-google-cloud-platform/]]|GCP|
|2020.04.16|Hakin9|[[Top 7 Cloud Security Issues and How to Overcome Them|https://hakin9.org/top-7-cloud-security-issues-and-how-to-overcome-them/]]|Risks|
|2020.04.16|Hacking Exposed|[[The curious case of cloud trail and AWS EBS Block API access|https://www.hecfblog.com/2020/04/daily-blog-675-curious-case-of-cloud.html]]|AWS Gaps|
|2020.04.16|IoTGN|[[IEC 62443: How to achieve the highest levels of industrial security|https://www.iotglobalnetwork.com/iotdir/2020/04/16/iec-62443-how-to-achieve-the-highest-levels-of-industrial-security-24420/]]|IoT IEC_62443|
|2020.04.16|arXiv.org|[[Experiential probabilistic assessment of cloud services|https://arxiv.org/ftp/arxiv/papers/2004/2004.10858.pdf]] (pdf)|Assessment|
|2020.04.16|//Voodoo Security//[>img[iCSF/flag_fr.png]]|[[Traitements cloud : quels outils et contrôles de sécurité fonctionnent le mieux ?|https://www.lemagit.fr/conseil/Traitements-Cloud-quels-outils-et-controles-de-securite-fonctionnent-le-mieux]]|Misc|
|2020.04.16|//Intezer//|[[Pre-runtime vulnerability scans or runtime protection: Which is better for your IaaS security?|https://intezer.com/blog/cloud/pre-runtime-vulnerability-scans-or-runtime-protection-which-is-better-for-your-iaas-security/]]|IaaS Scanning Protection|
|2020.04.16|//AlienVault//|[[7 key steps to Zero Trust|https://cybersecurity.att.com/blogs/security-essentials/7-key-steps-to-zero-trust]] (3/3]|Zero_Trust|
|2020.04.16|//NeuVector//|[[New tools help automate container security|https://betanews.com/2020/04/16/tools-automate-container-security/]]|Container Scanning|
|>|>|>|!2020.04.15|
|2020.04.15|SANS|[[Top 5 Considerations for Multicloud Security|https://www.sans.org/blog/top-5-considerations-for-multicloud-security/]] ([[étude|https://www.sans.org/reading-room/whitepapers/cloud/top-5-considerations-multicloud-security-39505]])|Multi_Cloud|
|2020.04.15|Dark Reading|[[You're One Misconfiguration Away from a Cloud-Based Data Breach|https://www.darkreading.com/cloud/youre-one-misconfiguration-away-from-a-cloud-based-data-breach/a/d-id/1337464]]|Misconfiguration|
|2020.04.15|Bleeping Computer|[[Cloudflare dashboard and APIs are down, some sites having issues|https://www.bleepingcomputer.com/news/technology/cloudflare-dashboard-and-apis-are-down-some-sites-having-issues/]]|Outage cloudflare|
|2020.04.15|Bleeping Computer|[[Nemty Ransomware shuts down public RaaS operation, goes private|https://www.bleepingcomputer.com/news/security/nemty-ransomware-shuts-down-public-raas-operation-goes-private/]]|RaaS Ransomware|
|2020.04.15|ZDnet|[[New tool detects AWS intrusions where hackers abuse self-replicating tokens|https://www.zdnet.com/article/new-tool-detects-aws-intrusions-where-hackers-abuse-self-replicating-tokens/#ftag=RSSbaffb68]]|AWS [[Tools|Outils-GitHub]]|
|2020.04.15|DZone|[[Disaster Recovery Problem: Solution|https://dzone.com/articles/disaster-recovery-problem-solution]]|DRaaS DRP|
|2020.04.15|//Intezer//|![[The missing MITRE ATT&CK matrix for Linux cloud servers|https://intezer.com/blog/cloud/the-missing-mitre-attck-matrix-for-linux-cloud-servers/]]|ATT&CK Linux|
|2020.04.15|//TrendMicro//|[[Principles of a Cloud Migration – Security, The W5H|https://blog.trendmicro.com/principles-of-a-cloud-migration-security-the-w5h/]]|Responsibility|
|2020.04.15|//Voodoo Security//[>img[iCSF/flag_fr.png]]|[[Cloud : cinq étapes pour sécuriser la console d'administration|https://www.lemagit.fr/conseil/Cloud-Cinq-etapes-pour-securiser-la-console-dadministration]]|Misc|
|2020.04.15|//Akamai//|![[A Brief History of a Rootable Docker Image|https://blogs.akamai.com/sitr/2020/04/a-brief-history-of-a-rootable-docker-image.html]]|Docker Attacks Honeypot|
|2020.04.16|//ThreatPost//| → [[Poorly Secured Docker Image Comes Under Rapid Attack|https://threatpost.com/poorly-secured-docker-image-rapid-attack/154874/]]|Docker Attacks Honeypot|
|2020.04.15|//FlowRoute//|[[How Cloud-Based Communication Tools Support the Spike in Global Remote Workers|https://vmblog.com/archive/2020/04/15/how-cloud-based-communication-tools-support-the-spike-in-global-remote-workers.aspx]]|Resilience|
|2020.04.15|//Awake Security//|[[Delivering On the Promise of Securing the Hybrid Cloud|Delivering On the Promise of Securing the Hybrid Cloud]]|Hybrid_Cloud|
|>|>|>|!2020.04.14|
|2020.04.14|Le MagIT[>img[iCSF/flag_fr.png]]|[[Services gratuits coupés : le cloud Azure en pénurie de capacités|https://www.lemagit.fr/actualites/252481611/Services-gratuits-coupes-le-cloud-Azure-en-penurie-de-capacites]]|Capacity Shortage|
|2020.04.14|Security Week|![[Backup or Disaster Recovery for Protection Against Ransomware?|https://www.securityweek.com/backup-or-disaster-recovery-protection-against-ransomware]]|Backup DRP Ransomware|
|2020.04.14|//Appsecco//|![[Attacking and Auditing Docker Containers and Kubernetes Clusters|https://github.com/appsecco/attacking-and-auditing-docker-containers-and-kubernetes-clusters]]|Training Docker Kubernetes|
|2020.04.14|//AlienVault//|[[Slack phishing attacks using webhooks|https://cybersecurity.att.com/blogs/labs-research/slack-phishing-attacks-using-webhooks]]|Slack Attacks|
|2020.04.15|Dark Reading| → [[Slack's Incoming Webhooks Can Be Weaponized in Phishing Attacks|https://www.darkreading.com/cloud/slack-incoming-webhooks-can-be-weaponized-in-phishing-attacks/d/d-id/1337573]]|Slack Attacks|
|2020.04.14|//Spanning//|[[Pitching SaaS Backup: 3 Obstacles to Expect|https://spanning.com/blog/pitching-saas-backup-3-obstacles-to-expect/]]|SaaS Back_Ups|
|2020.04.14|//AttackIQ//|[[Defeating a Cloud Breach Part 3|https://attackiq.com/blog/2020/04/14/defeating-a-cloud-breach-part-3/]] (3/3)|Attack Breach|
|2020.04.14|//Exabeam//|[[Top Cyber Security Best Practices for the Hybrid Cloud|https://www.exabeam.com/information-security/top-cybersecurity-best-practices-for-hybrid-cloud/]]|Hybrid_Cloud best_Practices|
|2020.04.14|//Arcserve//|[[2 decades of cloud: Where it's been and where it's heading|https://www.ciodive.com/news/cloud-adoption-disaster-recovery/575946/]]|DRaaS DRP|
|2020.04.14|//AppOmni//|[[Top 3 Myths of SaaS Data Security for Enterprises|https://cdn2.hubspot.net/hubfs/6705456/Collateral/Top-3-Myths-SaaS-Data-Security-Enterprise.pdf]]|SaaS Myths|
|>|>|>|!2020.04.13|
|2020.04.13|Help Net Security|[[You have to consider cybersecurity at all points of a cloud migration|https://www.helpnetsecurity.com/2020/04/13/cybersecurity-cloud-migration/]]|Migration|
|2020.04.13|Fair Institute|![[Amazon S3 Bucket Data Breaches – a FAIR™ Risk Analysis|https://www.fairinstitute.org/blog/amazon-s3-bucket-data-breaches-a-fair-risk-analysis]]|AWS_S3 Data_Breach Risk_Analysis|
|2020.04.13|//Microsoft Azure//|![[Become an Azure Sentinel Ninja: The complete level 400 training|https://techcommunity.microsoft.com/t5/azure-sentinel/become-an-azure-sentinel-ninja-the-complete-level-400-training/ba-p/1246310]]|Training Azure|
|2020.04.13|//Google GCP//|[[Find and fix issues faster with our new Logs Viewer|https://cloud.google.com/blog/products/management-tools/troubleshoot-issues-faster-with-cloud-logging]]|Detection Logging|
|2020.04.13|//Uptics//|[[Detecting Docker Container Malware using osquery|https://www.uptycs.com/blog/detecting-docker-container-malware-using-osquery]]|Docker Malware Detection|
|2020.04.13|//Cloud Management Insider//|[[How Containers And Hybrid Cloud Is A Perfect Match?|https://www.cloudmanagementinsider.com/benefits-of-containers-in-hybrid-cloud/]]|Containers Hybrd_Cloud|
|2020.04.13|//Cloud Passage//|[[Containerization and Container Orchestration Platform Protection: Cloud Workload Security Part 3|https://www.cloudpassage.com/blog/containerization-container-orchestration-platform-protection/]] (3/3)|Containers Orchestration|
|2020.04.13|//Fugue//|[[Fugue Survey Finds Widespread Concern Over Cloud Security Risks During the COVID-19 Crisis|https://www.fugue.co/press/releases/fugue-survey-finds-widespread-concern-over-cloud-security-risks-during-the-covid-19-crisis]]|Survey|
|2020.04.13|//Imperva//|[[The 2020 Cyberthreat Defense Report: Simplify Security with Unified Tools and Monitoring|https://www.imperva.com/blog/the-2020-cyberthreat-defense-report-simplify-security-with-unified-tools-and-monitoring/]]|Survey|
|2020.04.13|//TrendMicro//|[[Shift Well-Architecture Left. By Extension, Security Will Follow|https://blog.trendmicro.com/shift-well-architecture-left-by-extension-security-will-follow/]]|DevSecOps|
|2020.04.13|//TrendMicro//|[[What do serverless compute platforms mean for security?|https://blog.trendmicro.com/what-do-serverless-compute-platforms-mean-for-security/]]|Serverless|
!"//Etat de l'adoption du Cloud//"
Un premier sondage a été lancé sur [[Circle]] par l'un de ses membres sur le sujet de l'adoption du Cloud.
Le sondage est ouvert jusqu'au ''28 avril 2020'' et le résultat sera publié sur [[Circle]] et sera communiqué sur notre site.
Il est hébergé sur la plateforme SurveyMonkey.
Afin de vous y préparer, les 20 questions posées sont disponibles+++*[ici]> {{ss2col{ //
# How would you describe your role in the company?
# Which industry are your company operating in?
# Number of employees at your company
# The use of cloud computing...
# Degree of company's perceived risks of cloud computing regarding the three statements below
# Cloud computing is difficult to integrate with existing IT systems
# The company has a clear and coherent digital strategy including how tech drives business goals and how it could be implemented
# The standardisation of cloud computing involving security and privacy standards, interface standards for different layers, architecture and integration standards, etc is sufficient for deployment within the firm
# My company has sufficient digital capabilities (skills, right eduction, experience or knowledge within IT) to implement, maintain and use cloud computing
# Degree my firm is a cross-functional organisation (teams with members from different functional areas in the organisation, such as business and technology)
# The company's top management understand the values of digital technologies to the organisation's future
# Cloud computing is important in terms of competitive advantage for the firm
# The laws and regulations that exists nowadays are sufficient to protect privacy, access, and confidentiality in a cloud-based environment
# Support from provider and other trading partners are sufficient to build a cloud computing infrastructure according to the needs of the company
# Level of firm's functions are processes in the cloud
# At what stage of cloud computing adoption is your organisation currently engaged?
# Your firm's intention to migrate to the cloud
# What kind of deployment model is the company currently using?
# Which provider's cloud does your company use?
# Which country are you working in?
//}}} === 
* Lien vers le sondage ⇒ ''[[CloudSecurityAlliance.fr/go/k4is/|https://CloudSecurityAlliance.fr/go/k4is/]]'' 
!"//Cloud Security Alliance Expands Virtual Learning Resources Program CSAAnywhere//"
[>img(150px,auto)[iCSA/K39BC.png]]Le CSA fait des promotions sur ses formations en ligne et va organiser deux événements en ligne :
# ''CloudBytes Connect'' du 26 au 28 mai 2020
# ''Virtual EU Summit'' du 9 au 12 Juin 2020
Le communiqué de presse a été publié le 14 avril 2020 par la CSA.
<<<
//SEATTLE – April 14, 2020 – The Cloud Security Alliance (CSA)// [...] //today announced the availability of numerous online resources for cloud and cybersecurity professionals to further their education and expand their network through its CSAAnywhere program. Whether it's leveraging CSA's discounted online courses, collaborating through Circle, CSA's online global community, or earning CPE credits while learning about the latest cloud security technology and research on CloudBytes, CSA's award winning webinar channel, CSA has it covered.
//[...]//
In addition, cloud and cybersecurity professionals can take advantage of a 20-percent discount on all CSA online courses, as well as CCSK exam tokens, through May 31 with the discount code ''TrainAnywhere''.
//[...]//
CSA will be rolling out a series of global virtual events in the coming weeks, including CloudBytes Connect (May 26-28), a multi-day virtual event program that will bring the collaboration of research and community to the forefront, and the Virtual EU Summit (June 9-12), which will address trust-building measures and the private sector in a secure and trusted cloud environment. Check back for updated information.//
<<<
__Lien :__
 ⇒ ''[[CloudSecurityAlliance.fr/go/k43p/|https://CloudSecurityAlliance.fr/go/k4ep/]]''
|[img(30px,auto)[iCSF/Francais.gif]] @@color:#00F;font-size:125%;__[[Version française|2020.04.12 - Newsletter Hebdomadaire - #59]]__@@ |[img(30px,auto)[iCSF/Anglais.gif]] @@color:#00F;font-size:125%;__[[English version|2020.04.12 - Weekly Newsletter - #59]]__@@ |
|<<tiddler [[2020.04.12 - Newsletter Hebdomadaire - #59]]>> |<<tiddler [[2020.04.12 - Weekly Newsletter - #59]]>> |
!!1 - Nouveautés CSA et Informations de la semaine du 6 au 12 avril 2020
* Formation ''CCSK en Français'' en juin 2020+++*[»]> <<tiddler [[2020.04.12 - Formation CCSK en Français en juin 2020]]>>=== 
* Conférence : ''CSA Virtual EU Summit'' du 9 au 12 juin+++*[»]> <<tiddler [[2020.04.11 - Premier 'CSA Virtual EU Summit' du 9 au 12 juin]]>>=== 
* Blog : 23 Conseils pour réussir la certification ''CCSK''+++*[»]> <<tiddler [[2020.04.10 - Blog : 23 Conseils pour réussir la certification CCSK]]>>=== 
* Blog : Sécurité réseau pour le ''Cloud et le travail à distance''+++*[»]> <<tiddler [[2020.04.08 - Blog : Sécurité réseau pour le Cloud et le travail à distance]]>>=== 
* Blog : Projet CSA pour un référentiel sécurité pour la ''blockchain et les cryptomonnaies''+++*[»]> <<tiddler [[2020.04.06 - Blog : Projet CSA pour un référentiel sécurité pour la blockchain et les cryptomonnaies]]>>=== 
* Publication du Chapitre italien : '''Cloud, RGPD, NIS et DSP2'''+++*[»]> <<tiddler [[2020.04.10 - Publication du Chapitre italien : 'Cloud, RGPD, NIS et DSP2']]>>=== 
* Webinar : 'Stay Secure: In the Face of a Pandemic, Cyberattackers Seek to Take Advantage'+++*[»]> <<tiddler [[2020.04.07 - Webinar : 'Stay Secure: In the Face of a Pandemic, Cyberattackers Seek to Take Advantage']]>>=== 
* Appels à commentaires : ''CSA'' 'Hybrid Clouds and its Associated Risks'+++*[»]> <<tiddler [[2020.04.10 - Appel à commentaires : 'Hybrid Clouds and its Associated Risks']]>>=== et ''NIST'' 800-210 'General Access Control Guidance for Cloud Systems'+++*[»]> <<tiddler [[2020.04.01 - Appel à commentaires : NIST 800-210 'General Access Control Guidance for Cloud Systems']]>>=== 
* Sondages : sur la technologie CASB d'ici au ''20 avril''+++*[»]> <<tiddler [[2020.03.09 - Sondage sur la technologie CASB]]>>=== et sur la sensibilisation à la cryptographie quantique d'ici au ''27 avril''+++*[»]> <<tiddler [[2020.03.09 - Sondage sur la sensibilisation à la cryptographie quantique]]>>=== 
!!2 - Veille Web Cloud et Sécurité
La [[Veille Web|2020.04.12 - Veille Hebdomadaire - 12 avril]] avec plus de 60 liens dont :
* Etudes et rapports : TrendMicro+++*[»]>
|2020.04.08|//TrendMicro//|![[Exploring Common Threats to Cloud Security|https://www.trendmicro.com/vinfo/us/security/news/virtualization-and-cloud/exploring-common-threats-to-cloud-security]]|Report TrendMicro|
|2020.04.08|//TrendMicro//| → [[Untangling the Web of Cloud Security Threats (pdf)|https://documents.trendmicro.com/assets/white_papers/wp-untangling-the-web-of-cloud-security-threats.pdf]]|Report TrendMicro|
=== 
* Fuites de données : RigUp+++*[»] 
|2020.04.08|VPNmentor|[[Report: Massive Data Leak Exposes US Energy Sector to Cyberattack|https://www.vpnmentor.com/blog/report-rigup-leak/]]|AWS Data_Leak|
|2020.04.10|Security Week| → [[RigUp Database Exposed 76,000 Files From U.S. Energy Sector|https://www.securityweek.com/rigup-database-exposed-76000-files-us-energy-sector]]|AWS Data_Leak|
=== et Maropost+++*[»] 
|2020.04.08|CyberNews|[[Marketing giant Maropost exposes 95 million email records and doesn't seem to care about it|https://cybernews.com/security/marketing-giant-maropost-exposes-95-million-emails-and-doesnt-seem-to-care-about-it/]]|GCP Data_Leak|
|2020.04.10|//Hot for Security//| → [[Maropost customer database exposes 95 million email records|https://hotforsecurity.bitdefender.com/blog/maropost-customer-database-exposes-95-million-email-records-22955.html]]|GCP Data_Leak|
=== 
* Attaques et pannes : retour sur une panne d'Azure+++*[»] 
|2020.04.09|CIO Dive|![[Asleep at the cloud: A Microsoft Azure disruption changed who gets a wake-up call|https://www.ciodive.com/news/microsoft-azure-outage-delay-manager-asleep/575811/]]|Escalation|
===, de GCP+++*[»] 
|2020.04.08|CBR Online|[[Google Cloud Confirms, Fixes Sweeping Outage, Blames IAM API Issues|https://www.cbronline.com/news/google-cloud-issues]]|GCP Outage|
=== et du détournement de BGP+++*[»] 
|2020.04.08|//Catchpoint//|[[April Fools' BGP Hijack|https://blog.catchpoint.com/2020/04/06/april-fools-bgp-hijack/]]|BGP_Highjack|
===, fraudes au président via le Cloud+++*[»] 
|2020.04.06|FBI|![[Cyber Criminals Conduct Business Email Compromise through Exploitation of Cloud-Based Email Services, Costing US Businesses More Than $2 Billion|https://www.ic3.gov/media/2020/200406.aspx]]|Business_Email_Compromise|
=== 
* Menaces et protection : deux bons articles de Checkpoint+++*[»] 
|2020.04.10|//Checkpoint//|![[Threat Actors Migrating to the Cloud|https://research.checkpoint.com/2020/threat-actors-migrating-to-the-cloud/]]|Threat_Actors|
|2020.04.10|//Checkpoint//|[[How to Implement Layered Security into Cloud Workloads|https://blog.checkpoint.com/2020/04/10/how-to-implement-layered-security-into-cloud-workloads/]]|Workloads|
===, détection d'attaques contre les clusters Kubernetes+++*[»]>
|2020.04.08|//Microsoft Azure//|[[Detect large-scale cryptocurrency mining attack against Kubernetes clusters|https://azure.microsoft.com/en-us/blog/detect-largescale-cryptocurrency-mining-attack-against-kubernetes-clusters/]]|Azure Kubernetes Cryptomining|
=== 
* Divers : réflexions sur la résilience+++*[»] 
|2020.04.10|//Cohesity//[img[iCSF/flag_fr.png]]|![[Que ferez-vous quand votre cloud ne sera plus accessible ?|https://datacenter-magazine.fr/que-ferez-vous-quand-votre-cloud-ne-sera-plus-accessible/]]|Resilience|
===, sécurité des containers et de Docker+++*[»] 
|2020.04.10|//Lacework//|[[Who's Attacking My Containers?|https://www.lacework.com/whos-attacking-my-containers/]]|Containers Attacks|
|2020.04.10|//Uptycs//|[[8 Docker Security Best Practices To Optimize Your Container System|https://www.uptycs.com/blog/docker-security-best-practices]]|Docker Best_Practices|
===, migration des données+++*[»] 
|2020.04.06|Portail de l'IE[img[iCSF/flag_fr.png]]|![[Comment diminuer les risques liés à la migration des données dans le multi-Cloud ?|https://portail-ie.fr/analysis/2350/comment-diminuer-les-risques-lies-a-la-migration-des-donnees-dans-le-multi-cloud]]|Multi_Cloud|
===, recommendations NCSC UK+++*[»] 
|2020.04.08|NCSC UK|[[Cloud backup options for mitigating the threat of ransomware|https://www.ncsc.gov.uk/blog-post/cloud-backup-options-for-mitigating-the-threat-of-ransomware]]|BackUps Ransomware|
|2020.04.08|NCSC UK|[[NCSC IT: There's confidence and then there's SaaS|https://www.ncsc.gov.uk/blog-post/ncsc-it-theres-confidence-and-then-theres-saas]]|SaaS|
=== 
!3 - Weekly Cloud and Security Watch Newsletter[>img[iCSF/inEnglish.png]]
<<tiddler [[2020.04.12 - Weekly Newsletter - April 12th]]>> 
!CSA News and Updates - April 5th to 12th
* ''CCSK'' training in ''French'' in June 2020+++*[»]> <<tiddler [[2020.04.12 - Formation CCSK en Français en juin 2020]]>>=== 
* ''CSA Virtual EU Summit'' from June 9th to 12th+++*[»]> <<tiddler [[2020.04.11 - Premier 'CSA Virtual EU Summit' du 9 au 12 juin]]>>=== 
* Blog: 23 tips to pass the CCSK exam+++*[»]> <<tiddler [[2020.04.10 - Blog : 23 Conseils pour réussir la certification CCSK]]>>=== 
* Blog: 'Network Security for the Cloud and Mobile Workforce'+++*[»]> <<tiddler [[2020.04.08 - Blog : Sécurité réseau pour le Cloud et le travail à distance]]>>=== 
* Blog: 'CSA kicks off project to create a security framework for blockchain and cryptocurrencies'+++*[»]> <<tiddler [[2020.04.06 - Blog : Projet CSA pour un référentiel sécurité pour la blockchain et les cryptomonnaies]]>>=== 
* Publication by the CSA Italian Chapter: 'Cloud, GCPR, NIS et PSD2'+++*[»]> <<tiddler [[2020.04.10 - Publication du Chapitre italien : 'Cloud, RGPD, NIS et DSP2']]>>=== 
* Webinar: 'Stay Secure: In the Face of a Pandemic, Cyberattackers Seek to Take Advantage'+++*[»]> <<tiddler [[2020.04.07 - Webinar : 'Stay Secure: In the Face of a Pandemic, Cyberattackers Seek to Take Advantage']]>>=== 
* Call for comments: 'CSA' 'Hybrid Clouds and its Associated Risks'+++*[»]> <<tiddler [[2020.04.10 - Appel à commentaires : 'Hybrid Clouds and its Associated Risks']]>>=== and 'NIST' SP 800-210 'General Access Control Guidance for Cloud Systems'+++*[»]> <<tiddler [[2020.04.01 - Appel à commentaires : NIST 800-210 'General Access Control Guidance for Cloud Systems']]>>=== 
* Surveys: 'Expectations and Evolution of CASBs' before ''April 20th''+++*[»]> <<tiddler [[2020.03.09 - Sondage sur la technologie CASB]]>>=== and Quantum-Safe Security Awareness before ''April 27th''+++*[»]> <<tiddler [[2020.03.09 - Sondage sur la sensibilisation à la cryptographie quantique]]>>=== 
!Cloud and Security News Watch
[[Over 60 links|2020.04.12 - Veille Hebdomadaire - 12 avril]] among which:
* Reports: TrendMicro (Untangling the Web of Cloud Security Threats)
* Data Leaks: RigUp (Massive data leak exposes 76,000 files from US Energy sector) and Maropost (customer database exposed 95 million email records)
* Attacks and outages: feedback on a previous Azure disruption and GCP outage (IAM API issues), and BGP Hijack; FBI warning on BEC (Business Email Compromise through exploitation of Cloud-based email services)
* Threats: Checkpoint articles (Threat actors migrating to the Cloud, and layered security for Cloud workloads), and Kubernetes clusters (detection of large-scale cryptocurrency mining attacks)
* Miscellaneous: resilience, container an Docker best practices, and NCSC UK memos (Saas; Cloud backup options for mitigating the threat of ransomware)
|ssTabl96|k
|!⇒ [[CloudSecurityAlliance.fr/go/K4C/|https://CloudSecurityAlliance.fr/go/K4C/]] |
|!Avril|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2020.04.11|
|2020.04.11|Cloud Security Podcast|[[How to secure and improve cloud environment - Merritt Baer, Principal Security Architect, AWS|https://anchor.fm/cloudsecuritypodcast/episodes/How-to-secure-and-improve-cloud-environment---Merritt-Baer--Principal-Security-Architect--AWS-ecleai]]|Podcast AWS|
|2020.04.11|GitHub|[[Breaking and Pwning Apps and Servers on AWS and Azure - Free Training Courseware and Labs|https://github.com/appsecco/breaking-and-pwning-apps-and-servers-aws-azure-training]]|Training|
|2020.04.11|arXiv.org|[[A Role-Based Encryption Scheme for Securing Outsourced Cloud Data in a Multi-Organization Context|https://arxiv.org/pdf/2004.05419.pdf]] (pdf)|Encryption|
|2020.04.11|//Coalfire//|[[Clearing the Clouds: Comparing CMMC to other Frameworks|https://www.coalfire.com/The-Coalfire-Blog/April-2020/Comparing-CMMC-to-other-Frameworks?feed=blogs]]|Maturity|
|>|>|>|!2020.04.10|
|2020.04.10|//Cohesity//[img[iCSF/flag_fr.png]]|![[Que ferez-vous quand votre cloud ne sera plus accessible ?|https://datacenter-magazine.fr/que-ferez-vous-quand-votre-cloud-ne-sera-plus-accessible/]]|Resilience|
|2020.04.10|//Checkpoint//|![[Threat Actors Migrating to the Cloud|https://research.checkpoint.com/2020/threat-actors-migrating-to-the-cloud/]]|Threat_Actors|
|2020.04.10|//Checkpoint//|[[How to Implement Layered Security into Cloud Workloads|https://blog.checkpoint.com/2020/04/10/how-to-implement-layered-security-into-cloud-workloads/]]|Workloads|
|2020.04.10|//Lacework//|[[Who's Attacking My Containers?|https://www.lacework.com/whos-attacking-my-containers/]]|Containers Attacks|
|2020.04.10|//Uptycs//|[[8 Docker Security Best Practices To Optimize Your Container System|https://www.uptycs.com/blog/docker-security-best-practices]]|Docker Best_Practices|
|2020.04.10|//AWS//|[[Enable automatic logging of web ACLs by using AWS Config|https://aws.amazon.com/blogs/security/enable-automatic-logging-of-web-acls-by-using-aws-config/]]|AWS Logging|
|>|>|>|!2020.04.09|
|2020.04.09|TechRepublic|[[How to secure a Kubernetes cluster by preventing unwanted modules from loading|https://www.techrepublic.com/article/how-to-secure-a-kubernetes-cluster-by-preventing-unwanted-modules-from-loading/]]|Kubernetes|
|2020.04.09|CIO Dive|![[Asleep at the cloud: A Microsoft Azure disruption changed who gets a wake-up call|https://www.ciodive.com/news/microsoft-azure-outage-delay-manager-asleep/575811/]]|Escalation|
|2020.04.09|CIO Dive|[[Yes, developers break cloud security rules. But do companies have adequate policies in place?|https://www.ciodive.com/news/developer-cloud-security/575791/]]|DevSecOps|
|2020.04.09|DZone|[[Azure Sphere: A Secured Hardware Solution for Your IoT Device Security|https://dzone.com/articles/azure-sphere-a-secured-hardware-solution-for-your]]|Azure AIoT|
|2020.04.09|NextGov|[[NIST Invites Comment on Guidance for Who Gets to Access What in the Cloud|https://www.nextgov.com/it-modernization/2020/04/nist-invites-comment-guidance-who-gets-access-what-cloud/164500/]]|NIST|
|2020.04.09|CBR Online|[[All That Cloud Data Is Causing Firms to Focus on the Wrong Security Issues|https://www.cbronline.com/news/cloud-data]]|Data|
|2020.04.09|CyberSecurity Insiders|[[Box bolsters its Cloud Security with automated Malware Detection Shield|https://www.cybersecurity-insiders.com/box-bolsters-its-cloud-security-with-automated-malware-detection-shield/]]|
|2020.04.10|Help Net Security| → [[Box Shield: Mitigating malware attacks by neutralizing malicious files|https://www.helpnetsecurity.com/2020/04/10/box-shield/]]|Box Detection|
|2020.04.09|//WeScale//[img[iCSF/flag_fr.png]]|[[La gestion des secrets dans Google Cloud Platform|https://blog.wescale.fr/2020/04/09/la-gestion-des-secrets-dans-google-cloud-platform/]]|GCP Secrets|
|2020.04.09|//TrendMicro//|[[Cloud Transformation Is The Biggest Opportunity To Fix Security|https://blog.trendmicro.com/cloud-transformation-is-the-biggest-opportunity-to-fix-security/]]|Misc|
|2020.04.09|//Microsoft//|[[Security and Microsoft Teams|https://docs.microsoft.com/en-us/microsoftteams/teams-security-guide]]|M365 Teams|
|2020.04.09|//Rapid7//|[[Answers to Three FAQs About the New-and-Improved Cloud Configuration Assessment Remediation Content in InsightVM|https://blog.rapid7.com/2020/04/09/answers-to-three-faqs-about-the-new-and-improved-cloud-configuration-assessment-remediation-content-in-insightvm/]]|Configuration Assessment|
|2020.04.09|//Microsoft//|[[Enable remote work while keeping cloud deployments secure|https://www.microsoft.com/security/blog/2020/04/09/enable-remote-work-while-keeping-cloud-deployments-secure/]]|Misc.|
|2020.04.09|//Alibaba//|[[Cloud-based Security Service Provisioning: The Future of Cybersecurity|https://medium.com/@Alibaba_Cloud/cloud-based-security-service-provisioning-the-future-of-cybersecurity-d6be933c2b96]]|SecOps|
|2020.04.09|//Park My Cloud//|[[If You Just Do One Thing Today, Run the AWS IAM Access Analyzer|https://www.parkmycloud.com/blog/aws-iam-access-analyzer/]]|AWS IAM|
|2020.04.09|//Security Intelligence//|[[Why Hybrid Cloud Environments Require More Than Just First-Generation IDaaS Solutions|https://securityintelligence.com/posts/why-hybrid-cloud-environments-require-more-than-just-first-generation-idaas-solutions/]]|IDaaS|
|2020.04.09|//CyberArk Conjur//|[[How to Scan Github Repositories for Secrets & Credentials with Open Source|https://www.conjur.org/blog/how-to-scan-github-repositories-for-secrets-credentials-with-open-source/]]|GithubSecrets|
|>|>|>|!2020.04.08|
|2020.04.08|NCSC UK|[[Cloud backup options for mitigating the threat of ransomware|https://www.ncsc.gov.uk/blog-post/cloud-backup-options-for-mitigating-the-threat-of-ransomware]]|BackUps Ransomware|
|2020.04.08|NCSC UK|[[NCSC IT: There's confidence and then there's SaaS|https://www.ncsc.gov.uk/blog-post/ncsc-it-theres-confidence-and-then-theres-saas]]|SaaS|
|2020.04.08|CBR Online|[[Google Cloud Confirms, Fixes Sweeping Outage, Blames IAM API Issues|https://www.cbronline.com/news/google-cloud-issues]]|GCP Outage|
|2020.04.08|VPNmentor|[[Report: Massive Data Leak Exposes US Energy Sector to Cyberattack|https://www.vpnmentor.com/blog/report-rigup-leak/]]|AWS Data_Leak|
|2020.04.10|Security Week| → [[RigUp Database Exposed 76,000 Files From U.S. Energy Sector|https://www.securityweek.com/rigup-database-exposed-76000-files-us-energy-sector]]|AWS Data_Leak|
|2020.04.08|CyberNews|[[Marketing giant Maropost exposes 95 million email records and doesn't seem to care about it|https://cybernews.com/security/marketing-giant-maropost-exposes-95-million-emails-and-doesnt-seem-to-care-about-it/]]|GCP Data_Leak|
|2020.04.10|//Hot for Security//| → [[Maropost customer database exposes 95 million email records|https://hotforsecurity.bitdefender.com/blog/maropost-customer-database-exposes-95-million-email-records-22955.html]]|GCP Data_Leak|
|2020.04.08|0x00SEC|[[VulnHub BoredHackerBlog: Cloud AV. WriteUp - Walkthrough|https://0x00sec.org/t/vulnhub-boredhackerblog-cloud-av-writeup-walkthrough/20360]] ([[challenge to download|https://www.vulnhub.com/entry/boredhackerblog-cloud-av,453/]])|Challenge_Analysis|
|2020.04.08|FedScoop|[[CISA suggests telework adaptations to TIC 3.0|https://www.fedscoop.com/cisa-telework-adaptations-tic-3-0/]]|Teleworking|
|2020.04.08|//Catchpoint//|[[April Fools' BGP Hijack|https://blog.catchpoint.com/2020/04/06/april-fools-bgp-hijack/]]|BGP_Highjack|
|2020.04.08|CSO Online|[[Episode 7: Security in a time of crisis|https://www.csoonline.com/article/3536599/episode-7-security-in-a-time-of-crisis.html]] ([[podcast|https://playlist.megaphone.fm?e=IDG5153554764]])|Governance Risks|
|2020.04.08|//TrendMicro//|![[Exploring Common Threats to Cloud Security|https://www.trendmicro.com/vinfo/us/security/news/virtualization-and-cloud/exploring-common-threats-to-cloud-security]]|Report TrendMicro|
|2020.04.08|//TrendMicro//| → [[Untangling the Web of Cloud Security Threats (pdf)|https://documents.trendmicro.com/assets/white_papers/wp-untangling-the-web-of-cloud-security-threats.pdf]]|Report TrendMicro|
|2020.04.08|Solutions Review| → [[Trend Micro Study Shows Cloud Misconfiguration as Major Threat|https://solutionsreview.com/security-information-event-management/trend-micro-study-shows-cloud-misconfiguration-as-major-threat/]]|Report TrendMicro|
|2020.04.08|//Tripwire//|[[Auditing Cloud Administrator Behavior as a Matter of Data Breach Preparedness|https://www.tripwire.com/state-of-security/security-data-protection/cloud/auditing-cloud-administrator-behavior-data-breach-preparedness/]]|Best_Practices|
|2020.04.08|//Microsoft Azure//|[[Detect large-scale cryptocurrency mining attack against Kubernetes clusters|https://azure.microsoft.com/en-us/blog/detect-largescale-cryptocurrency-mining-attack-against-kubernetes-clusters/]]|Azure Kubernetes Cryptomining|
|2020.04.08|//Cloudonaut//|[[AWS Account Structure: Think twice before using AWS Organizations|https://cloudonaut.io/aws-account-structure-think-twice-before-using-aws-organizations/]]|AWS Accounts|
|2020.04.08|//VirtuStream//|[[The Tenets of a Trusted Cloud Partner Should Include Security, Compliance, Privacy and Transparency|https://www.virtustream.com/blog/tenets-of-a-trusted-cloud-partner]]|Tenets|
|2020.04.08|//JumpCloud//|[[What Can Azure AD Tell You About Your Organization?|https://jumpcloud.com/blog/aad-tell-you-about-org]]|AzureAD|
|2020.04.08|//AlienVault//|[[The Zero Trust Authorization Core|https://cybersecurity.att.com/blogs/security-essentials/the-zero-trust-authorization-core]] (2/3]|Zero_Trust|
|>|>|>|!2020.04.07|
|2020.04.07|Forbes|[[Cybersecurity Issues? Amazon Detective Is On The Case|https://www.forbes.com/sites/moorinsights/2020/04/07/cybersecurity-issues-amazon-detective-is-on-the-case/]]|AWS_Detective|
|2020.04.07|Kitploit|[[MSOLSpray - A Password Spraying Tool For Microsoft Online Accounts (Azure/O365)|https://www.kitploit.com/2020/04/msolspray-password-spraying-tool-for.html]]|[[Tools|GitHub-Tools]]|
|2020.04.07|//Duo Security//|[[Kinsing Malware Targets Docker|https://duo.com/decipher/kinsing-malware-targets-docker]]|Docker Attacks|
|2020.04.07|//ThousandEyes//|[[The Internet Report, Episode 2|https://blog.thousandeyes.com/internet-report-episode-2/]] ([[podcast|https://cdn.transistor.fm/file/transistor/m/shows/9326/5faf13e6ec6e6bfd7ada537b6b8cfcc0.mp3]])|
|2020.04.07|//Red Hat OpenShift//|[[Why Linux containers are a CIO's best friend|https://www.ciodive.com/news/linux-containers-kubernetes/575506/]]|Containers Linux|
|>|>|>|!2020.04.06|
|2020.04.06|Portail de l'IE[img[iCSF/flag_fr.png]]|![[Comment diminuer les risques liés à la migration des données dans le multi-Cloud ?|https://portail-ie.fr/analysis/2350/comment-diminuer-les-risques-lies-a-la-migration-des-donnees-dans-le-multi-cloud]]|Multi_Cloud|
|2020.04.06|UK Authority|[[GDS publishes guide to cloud hosting strategy|https://www.ukauthority.com/articles/gds-publishes-guide-to-cloud-hosting-strategy/]]|Strategy|
|2020.04.06|FBI|![[Cyber Criminals Conduct Business Email Compromise through Exploitation of Cloud-Based Email Services, Costing US Businesses More Than $2 Billion|https://www.ic3.gov/media/2020/200406.aspx]]|Business_Email_Compromise|
|2020.04.10|E Hacking News| → [[BEC Scams Cost American Companies Billions!|https://www.ehackingnews.com/2020/04/bec-scams-cost-american-companies.html]]|Business_Email_Compromise|
|2020.04.06|InfoSecurity Mag|[[Docker Users Targeted with Crypto Malware Via Exposed APIs|https://www.infosecurity-magazine.com/news/docker-crypto-malware/]]|Docker APIs Malware|
|2020.04.06|//Almond//[img[iCSF/flag_fr.png]]|[[Sécurité avec API : OAuth, Token-based access ou Key-based access|https://www.informatiquenews.fr/securite-avec-api-oauth-token-based-access-ou-key-based-access-68884]]|Authentication APIs|
|2020.04.06|//AttackIQ//|[[Defeating a Cloud Breach Part 2|https://attackiq.com/blog/2020/04/06/defeating-a-cloud-breach-part-2/]] (2/3)|Attack Breach|
|2020.04.06|//Microsoft//|[[Support of DANE and DNSSEC in Office 365 Exchange Online|https://techcommunity.microsoft.com/t5/exchange-team-blog/support-of-dane-and-dnssec-in-office-365-exchange-online/ba-p/1275494]]|M365 Exchange|
|2020.04.06|//Microsoft//|[[Our commitment to privacy and security in Microsoft Teams|https://www.microsoft.com/en-us/microsoft-365/blog/2020/04/06/microsofts-commitment-privacy-security-microsoft-teams/]]|M365 Teams|
|2020.04.06|//CipherCloud//|[[A Round-up of Data Breaches in March 2020|https://www.ciphercloud.com/a-round-up-of-data-breaches-in-march-2020/]]|Data_Breaches|
[>img(200px,auto)[iCSA/K4CCCSK.png]]Le [[Chapitre Français]] de la [[Cloud Security Alliance]] organise une formation officielle [[CCSK]] pour le ''CCSK Foundation'' et le ''CCSK Plus''. Elle se tiendra la semaine du 15 juin 2020 pour faciliter les interactions.
Elle sera dispensée ''en français''^^[img[iCSF/flag_fr.png]]^^ par ''Guillaume Boutisseau''^^1^^, ''CCSK Authorized Instructor''.
A ce jour, il a déjà formé plus de 150 personnes.
Comme il n'est pas possible de garantir que les conditions nécessaires à la réalisation d'une formation en présentiel soient réunies pour le mois de juin 2020, les interventions se dérouleront par visio-conférence sous la forme de classes virtuelles.

Les dates proposées sont les suivantes :
* ''lundi 15 et mardi 16 juin 2020'' : ''CCSK Foundation'' en français
* ''lundi 15, mardi 16 juin et mercredi 17 juin 2020'' : ''CCSK Plus'' en français

Des détails complémentaires, dont les modalités d'inscritpions, seront publiés dans les prochains jours.
[img(50%,1px)[iCSF/BluePixel.gif]]
^^1^^ Guillaume Boutisseau est un "formateur certifié CCSK" ou "''CCSK Authorized Instructor''+++*[»]> https://cloudsecurityalliance.org/education/instructors ===" et son attestation est disponible+++*[ici »]> ^^ https://cloudsecurityalliance.org/rails/active_storage/blobs/eyJfcmFpbHMiOnsibWVzc2FnZSI6IkJBaHBBdkVKIiwiZXhwIjpudWxsLCJwdXIiOiJibG9iX2lkIn19--d3415bd77ff8e91832bfd76f3426ff27902b3c4a/ccsk-ttt-Guillaume-Boutisseau.pdf ^^ ===.
Il est aussi CCSP (ISC)2 ID:552407.
Il a déjà rédigé en janvier 2019 un article intitulé "[[CCSK la formation à suivre|2019.01.24 - Blog : CCSK la formation à suivre]]"+++*[»]> <<tiddler [[2019.01.24 - Blog : CCSK la formation à suivre]]>> ===.
[img[iCSF/flag_fr.png]]^^gb oc^^[img(50%,1px)[iCSF/BluePixel.gif]]
!//Premier 'CSA Virtual EU Summit' du 9 au 12 juin 2020//
[>img(300px,auto)[iCSA/K69S0.jpg]]Compte-tenu de la situation sanitaire actuelle en Europe et de son évolution prévisible, de forts doutes émergent quant à la tenue du ''CSA EU Summit 2020'' initialement prévu le 9 juin 2020 à Bruxelles+++*[»]]> https://csacongress.org/event/csa-eu-summit-2020/ ===.

Ainsi la [[CSA]] organise ''du 9 au 12 juin 2020, de 9h00 à 10h30'', un ''Virtual EU Summit'' avec un nouveau thème chaque jour :
# __Mardi 9 juin : certification__
** Le règlement européen Cybersecurity Act a été adopté par le Parlement européen le 12 mars 2019 puis par le Conseil de l'Union européenne le 7 juin 2019. Il marque une  avancée pour l'autonomie stratégique européenne et poursuit deux objectifs : l'adoption du mandat permanent de l'ENISA, et la définition d'un cadre européen de certification de cybersécurité
** Ce cadre est essentiel pour renforcer la sécurité du marché unique numérique européen, et pour la certification des produits, services et processus de sécurité.
** Cette session présentera le rôle de l'ENISA et traitera de l'impact sur la certification du Cloud pour l'industrie et le secteur public.
# __Mercredi 10 juin : gestion des risques et gouvernance__
** Le recours aux technologies de l'informatique dématérialisée suscite des inquiétudes quant aux violations du système, aux menaces et au respect des réglementations
** Cette session consistera en une table ronde sur la gestion des risques et la gouvernance et examinera les outils de gestion des risques et la manière dont ils sont utilisés pour les atténuer.
** deux secteurs seront plus particulièrement utilisés à titre d'exemples : le secteur public et le secteur financier.
# __Jeudi 11 juin : respect de la vie privée et du RGPD__
** Les exigences réglementaires et de sécurité évoluent rapidement. Nous devons donc tous soit avoir des notions, soit être formés au mieux pour savoir comment être conforme dans le cadre de nos activités.
** Cette session sera organisée par le Centre d'excellence pour la protection de la vie privée de la CSA. Il traitera de la responsabilité dans le cadre du RGPD et de la manière dont les codes de conduite et les certifications sont utilisés afin de favoriser la transparence, la conformité et la confiance.
** Elle présentera également le point de vue de la CNIL, sur le respect du RGPD par le biais du code de conduite et de la certification CSA.
# __Vendredi 12 juin : nouvelles tendances ayant un impact sur l'Union Européenne__
** Il est nécessaire d'anticiper et de réfléchir sur les évolutions sécurité.
** Cette session sera axée sur les tendances futures en matière de cybersécurité du point de vue de la CSA et d'autres experts.
[>img(200px,auto)[iCSA/K69S4.png]]
__Détails :__
* Détails (à venir) et inscriptions (pas encore ouvertes) &Arr; ''[[CloudSecurityAlliance.fr/go/k69c/|https://CloudSecurityAlliance.fr/go/k69c/]]''
[img[iCSF/flag_fr.png]]^^oc^^[img(50%,1px)[iCSF/BluePixel.gif]]
!"//Principi di sicurezza applicabili ai Cloud Computing Services: GDPR, Direttiva NIS e PSD2 a confronto//"
[>img(200px,auto)[iCSF/CSA_IT.png]]Le Chapitre italien+++*[»]> https://cloudsecurityalliance.it/ === de la [[Cloud Security Alliance]] a publié une étude intitulée "Principes de sécurité applicables aux services de cloud computing : comparaison entre la GDPR, la directive NIS et la PSD2". Elle se veut être une approche à 360 degrés permet de traiter véritablement la question de la conformité, et a été rédigée par le groupe de travail "Privacy & Legal in the Cloud".

Vcici la traduction de la table des matières, de l'introduction et de la conclusion.
!!Table des matières
{{ss2col{
<<<
* Principes et mesures de sécurité applicables aux prestataires Cloud : approche RGPD
** Mesures techniques et organisationnelles envisagées par le RGPD
** Principes relatifs au transfert de données vers des pays tiers
* Principes et mesures de sécurité applicables aux prestataires Cloud : approche NIS
* Principes et mesures de sécurité applicables aux prestataires Cloud : approche DSP2
* Différences et chevauchements entre les obligations de RGPD, NIS et DSP2
** Les chevauchements entre NEI et RGPD
** Les chevauchements entre la DSP2 et la RGPD
* Conclusions
<<<
}}}
!!Introduction
<<<
//[>img(200px,auto)[iCSF/K4APP.jpg]]La protection des données à caractère personnel et, plus généralement la sécurité de l'information, sont devenues ces dernières années des questions de toute première importance, tant au niveau national que supranational. En témoigne l'adoption en 2016 et sa mise en œuvre ultérieure en 2018 de deux règlements européens qui ont redéfini le cadre de la protection des données et de la sécurité des systèmes d'information : le règlement général sur la protection des données à caractère personnel ("règlement" ou "RGPD") et la directive 2016/1148 relative à la sécurité des réseaux et des systèmes d'information, plus connue sous le nom de directive NIS (Network and Information Security). Ce cadre réglementaire comprend également la directive 2015/2366/(EU) sur les services de paiement fournis dans le marché intérieur européen ("DSP2"), qui a introduit des innovations significatives dans le monde des paiements numériques.
Les prestataires de services dans le nuage ("CSP") ont donc été "investis" par la succession des changements réglementaires et le chevauchement de nombreuses obligations résultant de l'application souvent simultanée du RGPD, de la directive NIS et parfois aussi de la DSP2. Le cumul de dispositions prescrites par différents règlements peut entraîner une confusion dans la gestion des obligations imposées par ces règlements. La clarification dans ce contexte incertain est essentielle non seulement pour permettre une bonne gestion des différentes obligations mais aussi pour permettre aux destinataires de ces obligations de mettre à profit ces recoupements afin d'optimiser, plutôt que de multiplier, leurs efforts d'exécution.
Cette étude vise donc à analyser les exigences contenues dans la GDPR et la directive de sécurité NIS afin d'identifier (1) les mesures techniques et organisationnelles que les fournisseurs de services cloud sont tenus d'appliquer et les exigences de notification du RGPD et de la Directive ; (2) les recoupements et, en même temps, (3) les différences entre ces exigences dans leur contenu, les hypothèses d'application, les critères et les risques sur la base desquels l'adéquation des mesures de sécurité doit être évaluée. Cette analyse sera également complétée par un examen des obligations correspondantes imposées par la DSP2.//
<<<
!!Conclusion
<<<
{{ss2col{
//Cette étude a mis en évidence et comparé les principales exigences de sécurité imposées par la RGPD, la directive NIS et la directive DSP2. Ces trois règlements ont un impact important sur les fournisseurs de services dans le Cloud : les fournisseurs de services dans le Cloud qui traitent des données à caractère personnel entrent dans la catégorie des contrôleurs/processeurs de données ; en même temps, ils sont considérés comme des fournisseurs de services numériques et sont donc soumis aux obligations de la directive NIS; en outre, ils peuvent jouer le rôle de fournisseurs de services de paiement (PISP) ou de fournisseurs d'informations sur les comptes bancaires (AISP) en vertu de la directive DSP2.
Comme expliqué ci-dessus, le RGPD impose de mettre en œuvre des mesures de sécurité pour assurer un niveau de sécurité approprié au risque auquel les données personnelles sont exposées tout en confiant au détenteur la tâche de décider en pratique des mesures à appliquer. Des obligations importantes de notification (et de rapport) sont également prévues en cas de violation de données personnelles en vertu des articles 33 et 34 du RGPD. Dans ce contexte, l'article 28 de la RGPD joue un rôle clé car il permet au responsable du traitement de garder le contrôle des données lorsqu'elles sont traitées pour son compte par des tiers, par exemple des fournisseurs de services dans les nuages.
D'importantes obligations de sécurité ont également été introduites par la directive NIS, qui vise à garantir un niveau élevé commun de sécurité des réseaux et des systèmes d'information. Les destinataires de ces obligations sont, outre les opérateurs de services essentiels, les fournisseurs de services numériques, y compris les fournisseurs de services Cloud. La directive NIS décrit les mesures de sécurité que les fournisseurs de services numériques doivent prendre pour atténuer les risques auxquels la sécurité des réseaux et des systèmes d'information est exposée et décrit la procédure de signalement des cyberincidents.
Plus récemment, la DSP2 a introduit de nouveaux développements importants dans le monde des paiements numériques. Premièrement, la DSP2 a introduit trois nouveaux acteurs dans l'industrie, à savoir l'AISP, le PISP et le CISP ("PSP"). Afin d'opérer en tant que PSP, ces acteurs devront passer les évaluations des banques centrales en ce qui concerne les procédures adoptées en cas d'incident informatique et le montant des investissements que l'entreprise entend faire dans la sécurité informatique. En particulier, un cadre détaillé sur la manière dont les entreprises qui ont l'intention d'opérer en tant que PSP doivent gérer les incidents informatiques est décrit dans les lignes directrices de l'EBA du 27 juillet 2017. En outre, les PSP devront accorder une grande attention à la protection des données de paiement sensibles.
Dans la pratique, les exigences du RGPD, de la directive NIS et de la DSP2 peuvent se chevaucher partiellement, tout en conservant des objets de protection différents et donc des champs d'application différents. On peut en fait identifier plusieurs points de contact entre les dispositions de sécurité des NEI et de la RGPD bien que, dans l'ensemble, les obligations de sécurité soient décrites par les NEI de manière plus spécifique et plus détaillée que la RGPD. Des chevauchements importants peuvent également affecter les procédures de notification des violations de données (dans le cadre de la RGPD  D'autres chevauchements peuvent survenir entre la RGPD et la DSP2 en raison de la classification des PSP comme responsables/responsables/co-responsables du traitement des données, de la définition des données sensibles dans le cadre de la DSP2, des procédures à activer en cas de cyberincident, de la gestion de l'analyse d'impact.
Afin d'éliminer tout problème de gestion pouvant découler de ces chevauchements, il convient de gérer ces obligations de manière coordonnée, par exemple en fusionnant la documentation afin d'optimiser les efforts d'application auxquels les entreprises sont appelées à faire face.// }}}
<<<
__Détails :__
* Annonce ⇒ ''[[CloudSecurityAlliance.fr/go/k4ai/|https://CloudSecurityAlliance.fr/go/k4ai/]]'' (en intalien) 
* Étude au format PDF ⇒ ''[[CloudSecurityAlliance.fr/go/k4aj/|https://CloudSecurityAlliance.fr/go/k4aj/]]'' (en intalien)
!"//Hybrid Clouds and its Associated Risks//"
Extraits :
|ssTableNo|k
|__''Introduction''__ |__''Conclusion''__ |
|//This document aims to describe the concept and value of hybrid clouds, highlight key application scenarios and point out security risks in the hybrid cloud. A subsequent document by CSA Hybrid Cloud Security Services Working Group [3] will propose countermeasures to help users and cloud service providers identify and reduce security and compliance risks in the hybrid cloud.// |//Hybrid cloud brings great help to enterprise development and represents the best of both worlds. The control and security of private clouds combined with the versatility and scale of public clouds meet the development requirements of enterprises. Even with all its advantages security and privacy in Hybrid cloud environments remain a major concern. This document details hybrid cloud scenarios and lists a number of threats, risks, and vulnerabilities. Subsequent artifacts from the Working Group will focus on countermeasures and strategies to mitigate these weaknesses.// |
La date limite pour faire les commentaires est fixée au ''8 mai 2020''.

&Arr; Lire l'original sur le site de la CSA &Arr; [[CloudSecurityAlliance.fr/go/k4aa/|https://CloudSecurityAlliance.fr/go/k4aa/]]
!"//23 Conseils pour réussir la certification CCSK (Certificate of Cloud Security Knowledge)//"
[<img(200px,auto)[iCSA/K4AB1.jpg]]Article de blog publié le 8 avril 2020 
Rédigé par François Quiquet, Architecte Sécurité Réseau chez Bouygues Télécom -- Certifié CISSP, CCSK, ISO 27001 LI, ISO 27005 RM
Publication initiale de l'article le 5 avril 2020
Version originale de l'article sur LinkedIN : "[[23 Conseils pour réussir la certification CCSK|https://www.linkedin.com/pulse/23-conseils-pour-r%C3%A9ussir-la-certification-ccsk-cloud-quiquet-/]]".

J'ai passé avec succès, début avril 2020, la certification CCSK (Certificate of Cloud Security Knowledge) et je vous livre ci-dessous quelques conseils et astuces pour que vous puissiez également réussir l'examen du premier coup.
!!Qu'est-ce que la CCSK ?
[>img(300px,auto)[iCSA/K4AB2.jpg]]Le [[CCSK]] est une certification "vendor neutral" sur la sécurité du Cloud. Elle est considérée comme étant la "state of the art" de la sécurité du Cloud. Elle a été créée en 2010 par la [[CSA]] (Cloud Security Alliance) un organisme qui pilote le programme [[STAR]] (Security, Trust & Assurance Registry) dont l'objectif est de fournir et de maintenir un standard de haut niveau pour permettre à des organismes d'audit indépendants de délivrer des niveaux de certification aux différents Cloud du marché.

[>img(300px,auto)[iCSA/K4AB3.jpg]]Le CSA publie régulièrement des documents de référence pour promouvoir les bonnes pratiques de la sécurité du Cloud. Le CSA anime et organise également plusieurs groupes de travail et chantiers de recherche auxquels les entreprises membres peuvent participer pour faire avancer le domaine de la sécurité du Cloud.
!!Comment passer la CCSK ?
Le [[CCSK]] est un examen qui se fait à distance (pas dans un centre d'examen), en ligne sur le web et "open book" (matériel d'étude à disposition). A la différence de la plupart des autres certifications, le [[CCSK]], dans sa version passée (v4 en ce moment), est valable a vie. Il n'est pas nécessaire de justifier d'expériences pour se présenter à l'examen. Il n'y a pas non plus de paiement annuel, ni de CPE (Continuous Professional Education) pour maintenir la certification.
Le coût de l'examen est de $395 USD et permet de disposer de deux tentatives. Si vous réussissez à le première tentative, vous pourrez utiliser la deuxième lors de la publication d'une nouvelle version du [[CCSK]]. Un jeton d'examen est valable deux ans à partir de son achat.
Pour s'inscrire à l'examen : https://ccsk.cloudsecurityalliance.org/en
!!Quel est le contenu du CCSK ?
La version [[CCSK]] v4 actuelle existe depuis le 1er décembre 2017. Elle a subi une importante mise à jour par rapport à la version v3 précédentes incluant les toutes dernières technologies du Cloud (micro-service, serverless, container, SDN, Big Data, IOT, etc ..)
[>img(400px,auto)[iCSA/K4AB4.jpg]]L'examen est un QCM de type A/B/C/D/E ou True/False composé de 60 questions à réaliser en 90 mn. Une fois que l'examen est lancée, il n'est pas possible de le mettre en pause. Le score minimum pour réussir l'examen et obtenir la certification est de 80%. Le taux de réussite à l'examen est de 62%.
Vous obtenez votre résultat immédiatement dès la fin de l'examen avec votre score global et par domaine pour identifier vos axes d'amélioration. Si vous réussissez l'examen, vous pouvez même télécharger votre certificat. Par contre, les réponses aux questions ne sont par fournies afin de préserver l'intégrité de l'examen. Il existe un kit de préparation à l'examen et une FAQ téléchargeable sur le site de la CSA : https://ccsk.cloudsecurityalliance.org/en/faq
!!Quel est le matériel d'étude du CCSK ?
[>img(400px,auto)[iCSA/K4AB5.jpg]]L'examen du [[CCSK]] teste le candidat sur le contenu de 3 documents qui sont téléchargeables gratuitement sur le site du CSA : https://cloudsecurityalliance.org/education/ccsk/#_prepare
L'ensemble de ces 3 documents représente le CBK (Common Body of Knowledge) de l'examen CCSK. Il s'agit de :
# CSA Security Guidance for Critical Areas of Focus in Cloud Computing v4
# CSA Cloud Controls Matrix (CCM)
# ENISA (European Network and Information Security Agency) Whitepaper Cloud Computing: Benefits, Risks and Recommendations for Information Security

__''Les 14 domaines du Security Guidance du CSA sont les suivants :''__
{{ss2col{
<<<
* Domaine 01 : Cloud Computing Concepts and Architectures
* Domaine 02 : Governance and Enterprise Risk Management
* Domaine 03 : Legal Issues, Contracts and Electronic Discovery
* Domaine 04 : Compliance and Audit Management
* Domaine 05 : Information Governance
* Domaine 06 : Management Plane and Business Continuity
* Domaine 07 : Infrastructure Security
* Domaine 08 : Virtualization and Containers
* Domaine 09 : Incident Response
* Domaine 10 : Application Security
* Domaine 11 : Data Security and Encryption
* Domaine 12 : Identity, Entitlement, and Access Management
* Domaine 13 : Security as a Service
* Domaine 14 : Related Technologies
<<<
__''Les chapitres importants du document de l'ENISA sont les suivants :''__
<<<
* Information Security
* Isolation failure
* Economic Denial of Service
* Licensing Risks
* VM hopping
* Five key legal issues common across all scenarios
* Top security risks in ENISA research
* OVF
* Underlying vulnerability in Loss of Governance
* User provisioning vulnerability
* Risk concerns of a cloud provider being acquired
* Security benefits of cloud
* Risks R.1 – R.35 and underlying vulnerabilities
* Data controller versus data processor definitions
* In IaaS, who is responsible for guest systems monitoring
<<<
__''Les éléments important de la CSA CCM (Cloud Controls Matrix) à connaitre sont les suivants :''__
<<<
* CCM Domains
* CCM Controls
* Architectural Relevance
* Delivery Model Applicability
* Scope Applicability
* Mapped Standards and Frameworks
<<<
}}}
Le document le plus important est de loin le Security Guidance du CSA. Il représente à lui-seul 87% des questions de l'examen. La CSA CCM représente 7% et le rapport de l'ENISA 6%.
__''La répartition exacte du nombre de questions par domaine est la suivante :''__
{{ss2col{
<<<
[img(400px,auto)[iCSA/K4AB6a.jpg]]
[img(400px,auto)[iCSA/K4AB6b.jpg]]
<<<
}}}
!!Ma préparation au CCSK

__''Mon matériel d'étude''__
Outre le matériel d'étude officiel, j'ai utilisé en plus deux autres documents qui m'ont beaucoup aidé :
* Le ''CSA Guidance Summary in 6O minutes''+++*[»]> https://freetalents.ma/wp-content/uploads/2019/10/8-CSA-Guidance-in-60Minutes.pdf === : c'est un très bon résumé de 25 pages du Security Guidance v4 du CSA. Je l'ai imprimé pour réviser et je l'avais en PDF pendant l'examen.
* [>img(150px,auto)[iCSA/K4AB7.jpg]]Le ''CCSK All-in-One Exam Guide''+++*[»]> https://amzn.to/39Nzvpf === de Graham Thompson : c'est un excellent guide de révision que je recommande fortement et auquel a participé Peter van Eijk avec qui j'ai eu l'honneur de discuter. Peter est un formateur officiel du [[CCSK]] de la CSA et je pense qu'il participe au comité de rédaction des questions. Le livre repasse en revue avec de très bonnes explications les 14 domaines du CBK mais aussi le document de l'ENISA et la CCM. A la fin de chaque chapitre, il y a un "Chapter Review" qui reprend l'essentiel à savoir pour l'examen. Le livre comprend également 150 questions de tests qui sont très proches de celles de l'examen en terme de formulation et de difficulté. Et enfin, à la fin du livre, il y a un code pour accéder à un simulateur en ligne sur le site TotalSem qui contient 200 questions supplémentaires (lien vers le livre en ebook ou en papier sur Amazon)+++*[»]> https://amzn.to/39Nzvpf === 
* Je tiens aussi à signaler l'existence de la formation [[CCSK]] en e-learning de Verisafe+++*[»]> https://www.verisafe.fr/ === avec Boris Motylewski. J'ai eu de très bons retours sur les formations de Boris qui s'investit beaucoup dans l'aide au passage des certifications (CISSP, CCSK et bientôt CCSP). Deux vidéos expliquent ce qu'est la [[CCSK]], les avantages de la [[CCSK]] et comment devenir [[CCSK]] en 30 jours. Les slides d'exemple montrent la qualité du support du cours. Elles m'ont aidé à bien comprendre les 35 risques identifiés par l'ENISA, les 11 risques majeurs, les 23 actifs potentiellement impactés (dont ceux les plus exposés) et le top 7 des vulnérabilités.

__''Mon plan de révision''__
[>img(300px,auto)[iCSA/K4AB8.jpg]]Mon passage de la certification [[CCSK]] s'est fait dans des conditions un peu particulières. En effet, initialement, je devais passer la certification CCSP (Certified Cloud Security Professional). Je révisai depuis deux mois et demi quand j'ai appris que mon examen début avril était décalé suite à la pandémie de Covid-19 qui circulait en France. Pour mettre à profit mes révisions et les connaissances acquises, j'ai décidé vers mi-mars de tenter l'examen [[CCSK]] qui se fait en ligne et à domicile. La période de confinement était pratique aux révisions : 1h le matin avant de commencer le télétravail (en remplacement du temps de transport), 1h le midi sur la pause déjeuner et 2 à 3h en fin d'après-midi, après la journée de télétravail et le soir.
En deux semaines et demi, j'ai réussi à lire l'ensemble du matériel d'étude officiel plus le matériel d'étude supplémentaire. J'ai fait plus de 700 questions de tests (ceux du livre mais aussi d'autres sur Udemy ou trouvé sur internet). J'ai fait une centaine de Flashcards. J'ai visualisé quelques vidéos sur Youtube. J'ai surtout pris beaucoup de notes personnelles. En ce qui me concerne, c'est essentiel car ça me permet de faire des révisions de dernières minute mais ça me permet surtout de mieux retenir tout ce que j'apprends.
!!23 Conseils et Astuces pour réussir le CCSK
* ''TIP #1'' : Lisez tout le matériel d'étude au moins une fois (deux fois, c'est encore mieux). Même si l'examen est open book, vous serez ainsi plus à l'aise.
* ''TIP #2'' : En plus du matériel d'étude officiel, révisez en utilisant des vidéos et/ou des (e)books pour encore mieux comprendre les domaines du CBK.
* ''TIP #3'' : Utilisez le document « CSA Guidance Summary in 6O minutes+++*[»]> https://freetalents.ma/wp-content/uploads/2019/10/8-CSA-Guidance-in-60Minutes.pdf === qui est un très bon résumé de 25 pages du Security Guidance du CSA.
* ''TIP #4'' : Ecrivez vos propres notes de révision. On retient beaucoup mieux quand on écrit soi-même.
* ''TIP #5'' : Comprenez bien en quoi le Cloud impacte les différents processus de sécurité de l'entreprise. C'est l'objectif principal de l'examen.
* ''TIP #6'' : Comprenez bien les défis, les risques, les préoccupations mais aussi les bénéfices et les avantages du Cloud pour chaque domaine du CBK.
* ''TIP #7'' : Utilisez des questions de tests et/ou des flashcards pour tester votre bonne compréhension des domaines du CBK mais aussi pour vous entraîner à utiliser les documents.
* ''TIP #8'' : Mettez en place un programme de révision et tenez-y vous. Par exemple, prévoyez 1 à 2h de révision chaque jour de la semaine et un peu plus le week-end (3 à 4h). Commencez par le Security Guidance v4 de la CSA, puis par le rapport de l'ENISA et enfin par la CCM (il suffit de survoler ce dernier et d'en comprendre la structure car vous l'aurez sous la main pendant l'examen).
* ''TIP #9'' : Pendant l'examen, lisez deux fois chaque question. Lisez les réponses. Puis relisez la question.
* ''TIP #10'' : Soyez attentifs aux réponses contenant des éléments trop techniques, trop spécifiques ou encore étant trop relatives à une technologie (comme le SAN, le NAS, etc ...). Ce sont souvent les mauvaises réponses.
* ''TIP #11'' : Identifiez les réponses qui ne sont pas spécifiques au Cloud. Ce sont souvent les mauvaises réponses.
* ''TIP #12'' : Éliminez rapidement les réponses qui n'ont rien à voir ou qui sont trop éloignées de la question.
* ''TIP #13'' : Toujours répondre aux questions d'un point de vue business. C'est le business de l'entreprise qui challenge les choix de sécurité et non l'inverse. On parle d'ailleurs du BIA (Business Impact Analysis) pour identifier les actifs critiques à protéger en priorité
* ''TIP #14'' : Soyez attentifs aux questions négatives qui contiennent le mot "NOT". On a tendance à trop l'oublier quand on choisit la réponse.
* ''TIP #15'' : Soyez attentifs aux questions qui contiennent les verbes "IS" ou "ARE". Ça permet de choisir ou d'éliminer des réponses.
* ''TIP #16'' : Si vous ne connaissez pas la bonne réponse, tentez d'éliminer rapidement deux mauvaises réponses puis choisissez la réponse qui vous semble être la meilleure parmi les deux réponses restantes.
* ''TIP #17'' : Identifiez des mots-clés dans les questions et recherchez ces mots-clés dans les documents.
* ''TIP #18'' : Utilisez la fonction de recherche avancée de votre lecteur PDF préféré pour rechercher en une seule fois un mot, une expression ou une phrases sur l'ensemble des documents. Vous gagnerez ainsi du temps.
* ''TIP #19'' : Apprenez bien la structure de chaque document. Ça permet de retrouver rapidement dans le document, le domaine relatif à la question.
* ''TIP #20'' : Utilisez deux écrans : un pour la matériel d'étude et un deuxième pour l'examen. Cela vous fera gagner du temps en évitant de passer sans cesse d'une fenêtre à l'autre.
* ''TIP #21'' : Testez et répétez plusieurs fois votre méthode et votre logistique mise en place pour être à l'aise pendant l'examen.
* ''TIP #22'' : Utilisez un traducteur (Google Translate, DeepL ou autre) pour vous aider à mieux comprendre le sens de certains mots compliqués.
* ''TIP #23'' : En cas d'échec à l'examen, ne gâchez pas votre 2e jeton pour le retenter tout de suite sur un coup de tête. Prenez du temps pour refaire des révisions et mieux comprendre les domaines du CBK.
!!Différence entre les certifications CCSK et CCSP
[>img(300px,auto)[iCSA/K4AB9.png]]La CCSP est la "Certified Cloud Security Professional". C'est une certification qui a été créé en 2015 conjointement par la CSA, l'organisme qui a créé la [[CCSK]] et l'(ISC)², l'organisme qui a créé la très célèbre et recherchée certification CISSP.
[img(500px,auto)[iCSA/K4ABA.jpg]]
__''La certification CCSP couvre les 6 domaines suivants :''__
<<<
* Domain 1 : Cloud Concepts, Architecture and Design
* Domain 2 : Cloud Data Security
* Domain 3 : Cloud Platform and Infrastructure Security
* Domain 4 : Cloud Application Security
* Domain 5 : Cloud Security Operations  
* Domain 6 : Legal, Risk and Compliance
<<<

__''Si on devait faire une opération mathématique, elle serait la suivante :''__
> @@color:#00F;CCSP = CCSK + Expanded Governance Items + Traditional Security + Privacy@@ 
__''Voici les articles à lire pour bien comprendre la différence entre les 2 certifications :''__
# Comparing the CCSP and CCSK Cloud Security Credentials+++*[»]> https://www.isc2.org/articles/Comparing-the-CCSP-and-CCSK-Cloud-Security-Credentials%20 === 
# CCSK vs CCSP: An Unbiased Comparison+++*[»]> https://cloudsecurityalliance.org/blog/2018/04/24/ccsk-vs-ccsp-unbiased-comparison/ === 
# CCSK vs CCSP – An Impartial Comparison+++*[»]> https://www.whizlabs.com/blog/ccsk-vs-ccsp/ === 
# The CCSP is a BEAST that you must defeat to get your org into the clouds+++*[»]> https://www.linkedin.com/pulse/ccsk-vs-ccsp-how-compare-cissp-emil-man-cissp-mba/ === 
!!Conclusion
Bon courage et bonne révision à tous. Gardez en tête la citation suivante :
> @@color:#00F;Dans un voyage ce n'est pas la destination qui compte mais toujours le chemin parcouru.@@
Ce n'est pas en soi l'obtention de la certification qui soit importante mais bien les connaissances que vous allez acquérir et qui vont vous faire monter en compétences. La certification est la cerise sur le gâteau.
[img[iCSF/flag_fr.png]]^^fq^^[img(50%,1px)[iCSF/BluePixel.gif]]
[img(300px,auto)[iCSA/K4ABB.jpg]]
!"//Coronavirus today and cybersecurity tomorrow//"
Article de blog publié le 8 avril 2020 — Rédigé par Jim Reavis, Co-Founder and CEO, CSA
{{ss2col{
<<<
[>img(150px,auto)[iCSA/K48BC.jpg]]//The Black Swan event that is Coronavirus is a challenge for our times that we must win. Some may say that this pandemic should not be called a Black Swan event because we had the warning signs. However, the Internet is a great archive and you cannot find a hint of the wholesale segmentation of humanity and the rapid shutdown of our global economy just a few weeks ago. How much the world has changed in 28 days. From a cloud and cybersecurity perspective, organizations are being challenged by a barrage of new cyberattacks and malware, while completely shifting significant portions of their compute infrastructure.

In the realm of Cloud Security Alliance, we are monitoring events, collaborating with members, communicating with researchers and chapters to start understanding and building a database of lessons learned, what is working well and what the challenges are ahead. At a high level, we are seeing a variety of security, capacity and design issues in the rush to work from home, we are facing an onslaught of COVID-19 phishing and other malware attacks and cybersecurity professionals have a more complicated work environment to solve problems. Your company may be locked into its initial Work From Home (WFH) plan, but the following are a collection of observations that may cause you to adjust some short term plans and also give you some pause to think about where this is taking us.

''Malicious Attackers love a crisis''.
There is no honor among thieves. In the initial days of the global COVID-19, there were claims by some purported hacker groups that they would not attack the healthcare infrastructure. That lasted about a minute as the World Health Organization and hospitals have been under constant attack. The worse the crisis gets, the more active the hackers will get.

''Multi-factor authentication''.
Let's start with MFA. This needs to be deployed everywhere, with every WFH user having it. This will prevent virtually all account takeovers from being successful. However, this is not simply a matter of home user deployment. You need to make sure that host systems, be they VPNs, cloud services or on premise servers support the authentication scheme and that legacy protocols that do not support MFA are disabled. Having Single Sign-On (SSO) on top of MFA is even better.

''Traditional VPNs are insufficient''.
Many VPN Gateways are getting overwhelmed and were not designed for the entire workforce to be using them. If you are backhauling Internet-bound traffic to the home office and then running traffic through your security gauntlets, you are probably both creating an unintentional denial of service to your on-premise data centers and slowing cloud access to a crawl. At a minimum, you need split-tunnel VPNs to allow users to only send on-premise bound traffic to the VPN Gateway, and send the rest directly to the Internet. You don't want cloud backups going over the corporate VPN. VPN logging is important to pay attention to now. There's likely to be a lot more VPN event activity and logs may be getting "rolled over." Even if not actively monitored, establish off-device "lookback" to support potential investigations. You should be performing VPN group reviews. With many new users on VPNs, take a look at your VPN groups and consider if they meet your security goals.

''Jump Boxes''.
If you didn't have them before, now is a great time to consider deploying jump boxes for administrators to securely access remotely managed servers - this could be an on-prem VM or a cloud jump box (check cloud provider blueprints for these).

''Smart Home threat vector''.
In the old days, a person's home-based work computer might literally be the only computer in a house. In today's smart home, the WFH system is coexisting with dozens and even hundreds of devices. Most of these devices are poorly maintained, unpatched and full of vulnerabilities. We have heard of corporate breaches instigated by compromised smart TVs and you can be sure that there will be a second wave of WFH users attacked by their home devices, controlled by malicious attackers. Ideally, all devices would be patched and hardened. However, if we can start with making sure that the Cable Modem/Internet Gateway/WiFi Router is patched, hardened, admin is inaccessible from the Internet, all defaults are changed and a separate network is maintained for the work devices, that would be ideal. A separate network and hardened work devices also helps mitigate the risks from the curious and bored kids you may have at home.

''Security Awareness''.
Is your corporate security awareness program up to date with this rapid shift? Make sure there are no gaps and we provide employees with appropriate guidance, such as some of the "Smart Home" issues listed previously.

''COVID-19 information centers''.
A user in this environment is liable to click on any provocative COVID-19 message, which is a hacker's dream. Organizations can mitigate this with good awareness training and by pointing users to their own comprehensive COVID-19 information centers, that include both company-specific and general information.

''State-of-the-Art Cloud Security''.
As I said before, VPNs are not up to the task of protecting and enabling WFH users on their own. There is a group of solutions with different category names, but they are Security as a Service solutions that provide users with granular access to cloud applications, threat protection and rigorous policy enforcement. Connecting users only to authorized applications is far better than providing a VPN with access to any service within the network's visibility. CSA's Software Defined Perimeter and Zero Trust, originally defined by Forrester Research, are two of the most important and complementary architectural frameworks embodying this principle. Identity becomes the perimeter and it is straight forward to implement least privilege protections. You will find the Cloud Access Security Broker (CASB) and Secure Web Gateway product categories have greatly matured over the years, to the point that they provide their own fast and secure global Internets that provide this type of capability. Being delivered as a service, these solutions can be provisioned immediately and allow an organization to develop agile and secure WFH deployment plans.

''Staggered times of usage''.
You may have noticed network latency and even unavailable services when a large number of users access services simultaneously. We have even heard of politicians suggest NetFlix should throttle content delivery to maintain room for emergency services. One lesson learned is that meetings tend to start at the top of the hour and you can improve the performance of cloud conferencing by starting at 15 minutes past the hour. No doubt there are several more simple tricks like that.

''Lock down locations''.
You may find that this is a rare point in time where you actually have a fairly good understanding of where your employees are. This could be an interesting opportunity to use filtering and access control capabilities within several security solutions to block traffic coming from many different problem locations to your applications. This may come with several caveats, but you should take the opportunity to identify previously hidden attackers.

''The downside of forced agility''.
There is concern that in the rush to enable pervasive WFH, we may institutionalize degraded security if we are not careful. Perhaps we had to punch holes in firewalls thoughtlessly. Or, we may have lowered our BYOD security policy standards to enable users to get to work with what they have. It is important that we have documented and categorized changes that deviated from our security standards and work to remediate them as we go and/or roll them back when normalcy returns.

''Where are the systemic issues?'' By and large, it appears that cloud has fared pretty well so far, although there have been some resource exhaustion issues and network performance has been an adjacent problem. Although pandemics may ultimately be more of an exception than a rule, we can think of many other disasters that can similarly strain existing IT architectures, at least on a regional basis. Compute, applications and data need to be resilient. Workloads need to move seamlessly. Organizations may not be 100% cloud in the future, but they will likely need a cloud-based architecture with a common orchestration, management and security framework.

''Maintaining your cybersecurity workforce''.
One of my biggest concerns is how our profession is handling this stressful time. In addition to being worried about their own health and the health of their family, they may find the job is made more difficult by the inability to collaborate and the hours are surely long in a crisis. Add on to that the risk of being laid off, and we have a volatile combination. The denizens of the Dark Web are counting on a weakened cybersecurity workforce and we must be vigilant about taking care of our people, keeping them motivated and protecting their jobs.


//
<<<
}}}__Lien :__
* Article sur le site de la CSA &Arr; ''[[CloudSecurityAlliance.fr/go/k48c/|https://CloudSecurityAlliance.fr/go/k48c/]]''
!"//Network Security for the Cloud and Mobile Workforce//"
Article de blog publié le 8 avril 2020 — Rédigé par Etay Bogner, VP of Zero-Trust Products, Proofpoint
{{ss2col{
<<<
[>img(150px,auto)[iCSA/K48BN.jpg]]//An increasing number of enterprises today have made large-scale shifts to cloud-based IT resources by putting their applications in the cloud, subscribing to ready-to-use software-as-a-service (SaaS) applications, and supporting an expanding remote and mobile workforce. However, these practices strain the capabilities of legacy networks built around site-centric connectivity and security stacks. There are many recognized challenges tied to dependencies on data-center-based Firewalls and VPNs, such as large network attack surfaces, unreliable end-user experiences, and administrative headaches.
!!The Mobile Workforce, The Cloud and Secure Networking
Many enterprise applications, workloads and storage have shifted to the cloud as companies adopt a "cloud first" strategy to get out of the requirement of owning and operating infrastructure. They are migrating their own custom applications to the cloud to run on public cloud infrastructure, in addition to subscribing to enterprise SaaS applications and countless other productivity applications.
The idea of people always working in the same office location during specific work hours seems quaint in 2020. The workday doesn't end at 5 PM; many people work extra hours at home in the evening and on weekends, and they need remote access to their office computer. People are mobile; they work from home or wherever they happen to be. In fact, some people may never even go to a company site - especially if they aren't actual employees of the company. An organization's workforce is very likely to include contractors, partners and consultants who need varying levels of access to applications, data and other company resources. What's more, workers may use non-corporate-owned, unmanaged devices as they access the network and applications.
With people and computing resources scattered about, unknown devices connecting from near and far, and cloud-based applications now essential to business operations, the traditional site-centric perimeter of network security is long gone. Nevertheless, strong security is needed more than ever as concerns become more pervasive and damaging, and cyber-attacks and breaches surface with alarming regularity.
!!The Problem of Network Security with an Overly Permissive VPN
In terms of networking, people have to connect to something regardless of where they work. Most organizations do that today by connecting workers to the network in the corporate data center or headquarters.
For those employees in an office, it's typically a simple LAN or WAN connection; those outside the office (i.e., mobile or remote workers) usually connect via a VPN. The security paradigm for either method of connectivity is flawed because once authenticated users access the enterprise network, they are considered "trusted" and have overly broad access to the network. VPNs have their own problems because the user experience can be bad, and from the IT perspective, VPNs can be difficult to manage.
The connectivity and security challenges escalate when the organization uses cloud applications. For branch or mobile workers, the enterprise can either bring all traffic back to the headquarters network hub and then send it out to the cloud or allow the traffic to go straight to the cloud from wherever the user is. Backhauling all remote traffic to a central facility isn't practical. Companies do it to enforce the on-premise security stack, but this practice puts a strain on network and application performance and degrades the user experience. What's more, mobile users lose "locality," meaning that someone who is traveling quite far from the home network – perhaps out of the country – still has their traffic backhauled to the network hub, which results in latency and throughput issues.
Allowing user traffic to go straight to the cloud or the internet is too risky. This practice circumvents corporate security infrastructure and policy and doesn't allow all traffic to be logged for audit and security purposes. Companies compensate by installing one after another security solutions - CASBs for SaaS applications, and VPNs for IaaS/PaaS, which becomes more complex and expensive with the growing number of instances.
It's simply not practical or cost-effective to deploy so many security solutions, especially for cloud applications. It forces corporate IT departments to become systems integrators to make a lot of disparate solutions work together for the sake of trying to hold onto a porous security perimeter.
!!Enter Secure Access Service Edge (SASE)
Cloud-based IT resources serving mobile workforces and others in the enterprise require highly available network access that is reliable and secure." According to a recent report by Gartner, "As a result, secure access services need to be everywhere as well. The data-centric model will not scale. Network gymnastics to route traffic to and from the enterprise data center make no sense when very little of what a user needs remains in the data center. Worse, we impact user productivity, user experience and costs by restricting access to SaaS only if a user is on the enterprise network or has used a VPN, or requiring different agents for SWG, CASB and VPN, which creates agent bloat and user confusion. In other cases, branch-office traffic is forced through the data center for inspection when users access any cloud-based resource, increasing latency and the cost associated with dedicated MPLS circuits."
To provide a more secure and manageable alternative to legacy networking solutions SASE offers reduced risk, application-specific access, efficient management and a consistent end-user experience. Administrators can onboard each network resource to a SASE platform once and manage all policies centrally in the cloud, avoiding the need to configure and sync across different locations. Fully-cloud based SASE platforms require little setup or maintenance and operate in the data center or VPC that the user is enabling access to. All of the intelligence, as well as the security enforcement, is done in the cloud.
Next generation network service providers are building the fabric that delivers user-centric computing to enterprises. Advanced Zero trust SASE platforms offer a multi-tenant global overlay network but can function like a private enterprise wide area network for organizations. All of the infrastructure of this network is provided by the vendor in the cloud, so there is no hardware for a customer organization to deploy. SASE platforms provide the micro-segmented access to applications and network resources that workers require. They deliver a best-of-breed network security stack in the cloud to help enterprises chain together the needed security services at every point in the network.//
<<<
}}}__Lien :__
* Article sur le site de la CSA &Arr; ''[[CloudSecurityAlliance.fr/go/k48b/|https://CloudSecurityAlliance.fr/go/k48b/]]''
!"//Stay Secure: In the Face of a Pandemic, Cyberattackers Seek to Take Advantage//"
[>img(250px,auto)[iCSA/K47WS.png]]Webinar [[CloudBytes]] diffusé le 7 avril 2020 — Présenté par Thomas Martin, précédemment CIO de GE et fondateur de NephōSec, et  Chris Hertz, Chief Revenue Officer de DivvyCloud
<<<
//Join Thomas Martin, former GE CIO and Founder of NephōSec, and Chris Hertz, Chief Revenue Officer of DivvyCloud, for a deep dive into the current state of cloud security and practical guidance on ways to stop cyberattackers who seek to take advantage of the disruption caused by the coronavirus pandemic. Topics covered include:
• Discussion of the increased challenges faced by security and IT professionals during times of crisis.
• Key findings from the 2020 State of Enterprise Cloud Adoption and Security Report as a guide to what to focus on.
• Critical actions and steps that enterprises can take to protect their cloud environments from cyberattackers.//
<<<
&Arr; S'inscrire au Webinar de 60 minutes [[sur le site de BrightTALK|https://www.brighttalk.com/webcast/10415/392806]].
!"//CSA kicks off project to create a security framework for blockchain and cryptocurrencies//"
Article de blog publié le 6 avril 2020 — Rédigé par John DiMaria, Assurance Investigatory Fellow, CSA
{{ss2col{
<<<
[>img(150px,auto)[iCSA/K46BC.jpg]]//Like many new technologies, many industries are moving ahead with experimentation and deployments of DLT (Distributed Ledger Technology), especially in the finance sector. The benefits offered by DLTs such as tamper evident and tamper proof records, near instant settlement via smart contracts and the potential for multi-party coordination without a trusted third party are attractive indeed.
!!No widely used standards or security frameworks for Distributed Ledger Technologies (DLT)
At this time, there are currently no widely accepted security frameworks or standards for DLT (Distributed Ledger Technologies). There isn't even a widely accepted vocabulary, ask five DLT experts what the term “decentralized” means and you'll get six answers. Now is the time for a DLT vendor and platform agnostic security framework. This means actual testing and deployment, it can't be an academic standard, and it needs to be operational. The companies showing leadership in DLT technology also need to show security leadership, not only for customer confidence, but also because DLT's will become the next battleground for hackers, it literally will be where all the value is stored and processed. Involvement in this standard will also position organizations to help shape it and ensure that it is useful for all parties, and of course, involvement will make deployment that much easier.
!!Recent attacks on DLT resulted in millions of dollars of losses
DLTs are already being used to store and process value, and we have seen attacks that have resulted in millions of dollars of theft and losses. Organizations are rapidly gaining operational DLT security knowledge, and now is the time to coordinate and create a security framework to ensure a safe and secure future.
!!Get in on the ground floor to help secure DLT.
For financial institutions and blockchain experts interested in participating in the creation of the DLT security framework, please reach out to research@cloudsecurityalliance.org for more information.//
[...]
<<<
}}}__Lien :__
* Article sur le site de la CSA &Arr; ''[[CloudSecurityAlliance.fr/go/k46b/|https://CloudSecurityAlliance.fr/go/k46b/]]''
|[img(30px,auto)[iCSF/Francais.gif]] @@color:#00F;font-size:125%;__[[Version française|2020.04.05 - Newsletter Hebdomadaire - #58]]__@@ |[img(30px,auto)[iCSF/Anglais.gif]] @@color:#00F;font-size:125%;__[[English version|2020.04.05 - Weekly Newsletter - #58]]__@@ |
|<<tiddler [[2020.04.05 - Newsletter Hebdomadaire - #58]]>> |<<tiddler [[2020.04.05 - Weekly Newsletter - #58]]>> |
!!1 - Nouveautés CSA et Informations de la semaine du 30 mars au 5 avril 2020
* Blog : CAIQ ou une autre méthode ?+++*[»]> <<tiddler [[2020.04.04 - Blog : CAIQ ou une autre méthode ?]]>>=== 
* Webinar : 'CSA's Executive Series: When AI Goes Wrong'+++*[»]> <<tiddler [[2020.04.02 - Webinar : 'CSA's Executive Series: When AI Goes Wrong']]>>=== 
* Appel à commentaires : NIST 800-210 'General Access Control Guidance for Cloud Systems'+++*[»]> <<tiddler [[2020.04.01 - Appel à commentaires : NIST 800-210 'General Access Control Guidance for Cloud Systems']]>>=== 
* Appel à commentaires : CSA 'The Six Pillars of DevSecOps: Automation+++*[»]> <<tiddler [[2020.03.30 - Appel à commentaires : 'The Six Pillars of DevSecOps: Automation]]>>=== 
* Webinar : le 7 avril, 'Stay Secure: In the Face of a Pandemic, Cyberattackers Seek to Take Advantage'+++*[»]> <<tiddler [[2020.04.07 - Webinar : 'Stay Secure: In the Face of a Pandemic, Cyberattackers Seek to Take Advantage']]>>=== 
!!2 - Veille Web Cloud et Sécurité
La [[Veille Web|2020.04.05 - Veille Hebdomadaire - 5 avril]] avec plus de 80 liens dont :
* Etudes et rapports : Divvy Cloud+++*[»]>
|2020.04.03|//Divvy Cloud//|[[2020 State of Enterprise Cloud and Container Adoption and Security|https://divvycloud.com/state-of-cloud-report-2020/]] '[[rapport|https://divvycloud.com/wp-content/uploads/2020/04/2020-State-of-Enterprise-Cloud-and-Container-Adoption-and-Security.pdf]])|Report Containers|
=== 
* Fuites de données : Key Ring+++*[»] 
|2020.04.02|VPNmentor|[[Report: Popular Digital Wallet Exposes Millions to Risk in Huge Data Leak|https://www.vpnmentor.com/blog/report-keyring-leak/]]|AWS_S3 Data_Leak Key_Ring|
|2020.04.02|//Threatpost//| → [[44M Digital Wallet Items Exposed in Key Ring Cloud Misconfig|https://threatpost.com/44m-digital-wallet-key-ring-cloud-misconfig/154260/]]|AWS_S3 Data_Leak Key_Ring|
===, SOS Online Backup+++*[»] 
|2020.04.01|VPNmentor|[[Report: Cloud Backup Provider Exposes Customer Data in Massive Leak|https://www.vpnmentor.com/blog/report-sosonlinebackup-leak/]]|Data_Leak|
=== 
* Attaques et pannes : attaques en lien avec le COVID-19+++*[»] 
|2020.04.04|//Menlo Security//|[[Sophisticated COVID-19–Based Phishing Attacks Leverage PDF Attachments and SaaS to Bypass Defenses|https://www.menlosecurity.com/blog/sophisticated-covid-19-based-phishing-attacks-leverage-pdf-attachments-and-saas-to-bypass-defenses]]|Phishing COVID19|
|2020.04.02|CBR Online|[[Microsoft Azure Throttles Cloud Access, Blames Capacity Crunch|https://www.cbronline.com/news/microsoft-azure-capacity-crunch]]|Azure Resilience|
===, détournement de traffic Cloud+++*[»] 
|2020.04.05|ZDnet|![[Russian telco hijacks internet traffic for Google, AWS, Cloudflare, and others|https://www.zdnet.com/article/russian-telco-hijacks-internet-traffic-for-google-aws-cloudflare-and-others/]]|BGP_Highjack|
===, malware Kinsing visant les containers+++*[»]>
|2020.04.03|//Aqua Security//|![[Threat Alert: Kinsing Malware Attacks Targeting Container Environments|https://blog.aquasec.com/threat-alert-kinsing-malware-container-vulnerability]]|Docker Attacks|
|2020.04.03|//Threatpost//| → [[Self-Propagating Malware Targets Thousands of Docker Ports Per Day|https://threatpost.com/self-propagating-malware-docker-ports/154453/]]|Docker Attacks|
===, panne GCP+++*[»]>
|2020.04.01|//Google Cloud//|[[Google Cloud infrastructure components Incident #20003|https://status.cloud.google.com/incident/zall/20003]]|GCP Outage|
=== 
* Menaces et vulnérabilités : instances Redis vulnérables+++*[»] 
|2020.04.02|//TrendMicro//|![[More Than 8,000 Unsecured Redis Instances Found in the Cloud|https://blog.trendmicro.com/trendlabs-security-intelligence/more-than-8000-unsecured-redis-instances-found-in-the-cloud/]]|Misconfigurations Redis|
===, malware Raccoon et GCP+++*[»] 
|2020.03.31|//TrendMicro//|[[Raccoon Stealer's Abuse of Google Cloud Services and Multiple Delivery Techniques|https://blog.trendmicro.com/trendlabs-security-intelligence/raccoon-stealers-abuse-of-google-cloud-services-and-multiple-delivery-techniques/]]|GCP MaaS|
=== 
* Divers : après les questionnements, des doutes sur la sécurité de Zoom+++*[»]>  
|2020.04.05|//Divvy Cloud//|[[Zoom Recordings Exposed|https://divvycloud.com/zoom-recordings-exposed/]]|Zoom Data_Leak|
|2020.04.03|Washington Post|[[Zoom videos exposed online, highlighting privacy risk|https://www.washingtonpost.com/technology/2020/04/03/thousands-zoom-video-calls-left-exposed-open-web/]]|Zoom Data_Leak|
|2020.04.03|Citizen Lab|![[Move Fast & Roll Your Own Crypto|https://citizenlab.ca/2020/04/move-fast-roll-your-own-crypto-a-quick-look-at-the-confidentiality-of-zoom-meetings/]]|Zoom Confidentiality Cryptography|
|2020.04.03|The Intercept|[[Zoom's Encryption Is "Not Suited for Secrets" and Has Surprising Links to China, Researchers Discover|https://theintercept.com/2020/04/03/zooms-encryption-is-not-suited-for-secrets-and-has-surprising-links-to-china-researchers-discover/]]|Zoom Data_Leak|
|2020.04.01|//Zoom//|[[The Facts Around Zoom and Encryption for Meetings/Webinars|https://blog.zoom.us/wordpress/2020/04/01/facts-around-zoom-encryption-for-meetings-webinars/]]|Zoom Encryption|
|2020.03.31|The Intercept|[[Zoom Meetings Aren't End-to-End Encrypted, Despite Misleading Marketing|https://theintercept.com/2020/03/31/zoom-meeting-encryption/]]|Zoom Encryption|
===, consortium pour la sécurité du routage+++*[»] 
|2020.03.31|Internet Society|![[Leading CDN and Cloud Providers Join MANRS to Improve Routing Security|https://www.internetsociety.org/news/press-releases/2020/leading-cdn-and-cloud-providers-join-manrs-to-improve-routing-security/]]|Networking Prevention|
|2020.04.03|//Threatpost//| → [[Cloud Providers, CDNs Team Up to Battle Internet Routing Attacks|https://threatpost.com/cloud-cdns-team-internet-routing-attacks/154434/]]|Networking Prevention|
===, matrice ATT&CK pour Kubernetes+++*[»] 
|2020.04.02|//Microsoft//|![[Attack matrix for Kubernetes|https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/]]|ATT&CK Kubernetes|
===, SIEM+++*[»] 
|2020.04.01|//Panther Labs//|[[Panther Labs Launches Open-Source Cloud-Native SIEM|https://www.securityweek.com/panther-labs-launches-open-source-cloud-native-siem]]|SIEM Tools|
|2020.03.31|//Exabeam//|[[Plugging AWS Into Your SIEM: A Practical Guide|https://www.exabeam.com/siem/plugging-aws-into-your-siem-a-practical-guide/]]|SIEM AWS|
=== 
!3 - Weekly Cloud and Security Watch Newsletter[>img[iCSF/inEnglish.png]]
<<tiddler [[2020.04.05 - Weekly Newsletter - April 5th]]>> 
!CSA News and Updates - March 30th to April 5th
* Blog: 'Why use the CAIQ for vendor analysis vs. other questionnaires?'+++*[»]> <<tiddler [[2020.04.04 - Blog : CAIQ ou une autre méthode ?]]>>=== 
* Webinar: 'CSA's Executive Series: When AI Goes Wrong'+++*[»]> <<tiddler [[2020.04.02 - Webinar : 'CSA's Executive Series: When AI Goes Wrong']]>>=== 
* Call for comments: NIST 800-210 'General Access Control Guidance for Cloud Systems'+++*[»]> <<tiddler [[2020.04.01 - Appel à commentaires : NIST 800-210 'General Access Control Guidance for Cloud Systems']]>>=== 
* Call for comments: CSA's 'The Six Pillars of DevSecOps: Automation+++*[»]> <<tiddler [[2020.03.30 - Appel à commentaires : 'The Six Pillars of DevSecOps: Automation]]>>=== 
* Webinar on April 7th, 'Stay Secure: In the Face of a Pandemic, Cyberattackers Seek to Take Advantage'+++*[»]> <<tiddler [[2020.04.07 - Webinar : 'Stay Secure: In the Face of a Pandemic, Cyberattackers Seek to Take Advantage']]>>=== 
!Cloud and Security News Watch
[[Over 80 links|2020.04.05 - Veille Hebdomadaire - 5 avril]] among which:
* Reports: Divvy Cloud (2020 State of Enterprise Cloud and Container Adoption and Security)
* Data Leaks: Key Ring (popular digital wallet); SOS Online Backup (Cloud backup provider)
* Attacks and outages: some related to the COVID-19 outbreak; hijacks of internet traffic for Google, AWS, Cloudflare, and others; Kinsing malware targeting container environments; GCP outage
* Threats: Unsecured Redis instances in the Cloud; Raccoon malware abuse of Google Cloud Services
* Miscellaneous: issues with Zoom (recordings exposed, encryption not end-to-end...); leading CDN and Cloud Providers Join MANRS to improve routing security; ATT&CK matrix for Kubernetes; Open-Source Cloud-Native SIEM
|ssTabl96|k
|!⇒ [[CloudSecurityAlliance.fr/go/K45|https://CloudSecurityAlliance.fr/go/K45/]] |
|!Avril|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2020.04.05|
|2020.04.05|François Quiquet[>img[iCSF/flag_fr.png]]|![[23 Conseils pour réussir la certification CCSK (Certificate of Cloud Security Knowledge)|https://www.linkedin.com/pulse/23-conseils-pour-r%25C3%25A9ussir-la-certification-ccsk-cloud-quiquet-/]]|CCSK|
|2020.04.05|ZDnet|![[Russian telco hijacks internet traffic for Google, AWS, Cloudflare, and others|https://www.zdnet.com/article/russian-telco-hijacks-internet-traffic-for-google-aws-cloudflare-and-others/]]|BGP_Highjack|
|2020.04.07|Security Week| → [[Russian Telco Hijacked Internet Traffic of Major Networks - Accident or Malicious Action?|https://www.securityweek.com/russian-telco-hijacked-internet-traffic-major-networks-accident-or-malicious-action]]|BGP_Highjack|
|2020.04.05|//Divvy Cloud//|[[Zoom Recordings Exposed|https://divvycloud.com/zoom-recordings-exposed/]]|Zoom Data_Leak|
|2020.04.05|//JumpCloud//|[[Azure AD versus Ping Identity|https://jumpcloud.com/blog/aad-versus-ping-identity]]|AzureAD Ping_Identity|
|>|>|>|!2020.04.04|
|2020.04.04|TechBeacon|[[3 ways to build a more secure private cloud|https://techbeacon.com/security/3-ways-build-more-secure-private-cloud]]|Private_Cloud|
|2020.04.04|Kitploit|[[Serverless Prey - Serverless Functions For Establishing Reverse Shells To Lambda, Azure Functions, And Google Cloud Function|https://www.kitploit.com/2020/04/serverless-prey-serverless-functions.html]]|[[Tools|GitHub-Tools]]|
|2020.04.04|//Menlo Security//|[[Sophisticated COVID-19–Based Phishing Attacks Leverage PDF Attachments and SaaS to Bypass Defenses|https://www.menlosecurity.com/blog/sophisticated-covid-19-based-phishing-attacks-leverage-pdf-attachments-and-saas-to-bypass-defenses]]|Phishing COVID19|
|>|>|>|!2020.04.03|
|2020.04.03|Hackers Online|[[OWASP IoTGoat Firmware To Find IoT Devices Vulnerabilities|https://hackersonlineclub.com/owasp-iotgoat-firmware-to-find-iot-devices-vulnerabilities/]]|IoT Security_Challenge|
|2020.04.03|Dark Reading|[[Want to Improve Cloud Security? It Starts with Logging|https://www.darkreading.com/cloud/want-to-improve-cloud-security-it-starts-with-logging/a/d-id/1337383]]|Logging|
|2020.04.03|Bleeping Computer|[[Zoom's Web Client is Down, Users Report 403 Forbidden Errors|https://www.bleepingcomputer.com/news/technology/zooms-web-client-is-down-users-report-403-forbidden-errors/]]|Zoom Outage|
|2020.04.03|DZone|[[50+ Useful Kubernetes Tools List – Part 2|https://dzone.com/articles/50-useful-kubernetes-tools-list-part-2]]|Kubernetes Tools|
|2020.04.03|jdSupra|[[Processing in Office 365 eDiscovery|https://www.jdsupra.com/legalnews/processing-in-office-365-ediscovery-21377/]]|eDiscovery|
|2020.04.03|ZDnet|[[Australian Privacy Foundation labels CLOUD Act-readying Bill as 'deeply flawed'|https://www.zdnet.com/article/australian-privacy-foundation-labels-cloud-act-readying-bill-as-deeply-flawed/]]|CLOUD_Act|
|2020.04.03|Washington Post|[[Zoom videos exposed online, highlighting privacy risk|https://www.washingtonpost.com/technology/2020/04/03/thousands-zoom-video-calls-left-exposed-open-web/]]|Zoom Data_Leak|
|2020.04.03|Citizen Lab|![[Move Fast & Roll Your Own Crypto|https://citizenlab.ca/2020/04/move-fast-roll-your-own-crypto-a-quick-look-at-the-confidentiality-of-zoom-meetings/]]|Zoom Confidentiality Cryptography|
|2020.04.03|The Intercept|[[Zoom's Encryption Is "Not Suited for Secrets" and Has Surprising Links to China, Researchers Discover|https://theintercept.com/2020/04/03/zooms-encryption-is-not-suited-for-secrets-and-has-surprising-links-to-china-researchers-discover/]]|Zoom Data_Leak|
|2020.04.03|CRN AU|[[6 big challenges security partners face when migrating to the cloud|https://www.crn.com.au/news/6-big-challenges-security-partners-face-when-migrating-to-the-cloud-545968]]|Misc|
|2020.04.03|//Almond//[>img[iCSF/flag_fr.png]]|[[Sécurité avec API : OAuth, Token-based access ou Key-based access|https://www.globalsecuritymag.fr/Securite-avec-API-OAuth-Token,20200403,97298.html]]|APIs|
|2020.04.03|//Google Cloud//|[[Connecting to Google Cloud: your networking options explained|https://cloud.google.com/blog/products/networking/google-cloud-network-connectivity-options-explained]]|GCP Networking|
|2020.04.03|//Aqua Security//|![[Threat Alert: Kinsing Malware Attacks Targeting Container Environments|https://blog.aquasec.com/threat-alert-kinsing-malware-container-vulnerability]]|Docker Attacks|
|2020.04.03|//Threatpost//| → [[Self-Propagating Malware Targets Thousands of Docker Ports Per Day|https://threatpost.com/self-propagating-malware-docker-ports/154453/]]|Docker Attacks|
|2020.04.05|ZDnet| → [[Docker servers targeted by new Kinsing malware campaign|https://www.zdnet.com/article/docker-servers-targeted-by-new-kinsing-malware-campaign/]]|Docker Attacks|
|2020.04.06|GBHackers on Security| → [[Kinsing Malware Attacks Misconfigured Open Docker Daemon API Ports|https://gbhackers.com/kinsing-malware-attack/]]|Docker Attacks|
|2020.04.06|Dark Reading| → [[Misconfigured Containers Again Targeted by Cryptominer Malware|https://www.darkreading.com/attacks-breaches/misconfigured-containers-again-targeted-by-cryptominer-malware/d/d-id/1337492]]|Docker Attacks|
|2020.04.06|Security Week| → [[Kinsing Linux Malware Deploys Crypto-Miner in Container Environments|https://www.securityweek.com/kinsing-linux-malware-deploys-crypto-miner-container-environments]]|Docker Attacks|
|2020.04.06|//Tripwire//| → [[Misconfigured Docker API Ports Targeted by Kinsing Malware|https://www.tripwire.com/state-of-security/security-data-protection/cloud/misconfigured-docker-api-ports-targeted-by-kinsing-malware/]]|Docker Attacks|
|2020.04.07|//Duo Security//| → [[Kinsing Malware Targets Docker|https://duo.com/decipher/kinsing-malware-targets-docker]]|Docker Attacks|
|2020.04.03|//Divvy Cloud//|[[2020 State of Enterprise Cloud and Container Adoption and Security|https://divvycloud.com/state-of-cloud-report-2020/]] '[[rapport|https://divvycloud.com/wp-content/uploads/2020/04/2020-State-of-Enterprise-Cloud-and-Container-Adoption-and-Security.pdf]])|Report Containers|
|2020.04.03|//HashiCorp//|[[Enforcing AWS S3 Security Best Practices Using Terraform & Sentinel|https://medium.com/hashicorp-engineering/enforcing-aws-s3-security-best-practice-using-terraform-sentinel-ddcd181ff4b7]]|AWS Best_Practices|
|>|>|>|!2020.04.02|
|2020.04.02|VPNmentor|[[Report: Popular Digital Wallet Exposes Millions to Risk in Huge Data Leak|https://www.vpnmentor.com/blog/report-keyring-leak/]]|AWS_S3 Data_Leak Key_Ring|
|2020.04.02|InfoSecurity Mag| → [[Key Ring App Data Leak Exposes 44 Million Images|https://www.infosecurity-magazine.com/news/key-ring-app-data-leak-exposes-44m/]]|AWS_S3 Data_Leak Key_Ring|
|2020.04.02|//Threatpost//| → [[44M Digital Wallet Items Exposed in Key Ring Cloud Misconfig|https://threatpost.com/44m-digital-wallet-key-ring-cloud-misconfig/154260/]]|AWS_S3 Data_Leak Key_Ring|
|2020.04.06|CISO Mag| → [[Data Breach Exposes 14 Million Key Ring Users Data|https://www.cisomag.com/data-breach-exposes-14-million-key-ring-users-data/]]|AWS_S3 Data_Leak Key_Ring|
|2020.04.02|Bleeping Computer|[[Office 365 Phishing Uses CSS Tricks to Bypass Email Gateways|https://www.bleepingcomputer.com/news/security/office-365-phishing-uses-css-tricks-to-bypass-email-gateways/]]|O365 Phishing|
|2020.04.02|DZone|![[Azure, AWS, and GCP: A Multicloud Service Cheat Sheet|https://dzone.com/articles/azure-aws-and-gcp-a-multicloud-service-cheat-sheet]]|Azure AWS GCP Comparisons|
|2020.04.02|CBR Online|[[Microsoft Azure Throttles Cloud Access, Blames Capacity Crunch|https://www.cbronline.com/news/microsoft-azure-capacity-crunch]]|Azure Resilience|
|2020.04.02|//Microsoft//|![[Attack matrix for Kubernetes|https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/]]|ATT&CK Kubernetes|
|2020.04.02|//Microsoft Azure//|[[Announcing server-side encryption with customer-managed keys for Azure Managed Disks|https://azure.microsoft.com/en-us/blog/announcing-serverside-encryption-with-customermanaged-keys-for-azure-managed-disks/]]|Azure Encryption|
|2020.04.02|//TrendMicro//|![[More Than 8,000 Unsecured Redis Instances Found in the Cloud|https://blog.trendmicro.com/trendlabs-security-intelligence/more-than-8000-unsecured-redis-instances-found-in-the-cloud/]]|Misconfigurations Redis|
|2020.04.02|//TrendMicro//|[[Cloud-First but Not Cloud-Only: Why Organizations Need to Simplify Cybersecurity|https://blog.trendmicro.com/cloud-first-but-not-cloud-only-why-organizations-need-to-simplify-cybersecurity/]]|Misc|
|2020.04.02|//Cloudonaut//|![[Top 14 Must-Haves for Your AWS Architecture Checklist|https://cloudonaut.io/aws-architecture-checklist/]]|AWS Architecture|
|2020.04.02|//Phoenix TS//|[[Head in the Cloud? Time to Face Cyber Security Reality|https://phoenixts.com/blog/head-in-the-cloud-time-to-face-cyber-security-reality/]]|Misc|
|>|>|>|!2020.04.01|
|2020.04.01|VPNmentor|[[Report: Cloud Backup Provider Exposes Customer Data in Massive Leak|https://www.vpnmentor.com/blog/report-sosonlinebackup-leak/]]|Data_Leak|
|2020.04.01|Silicon Angle| → [[SOS Online Backup exposed 135M records via unsecured cloud storage|https://siliconangle.com/2020/04/01/cloud-backup-provider-sos-online-backup-exposed-135m-records-via-unsecured-cloud-storage/]]|Data_Leak|
|2020.04.01|HackRead|[["World's most secure online backup" provider exposes 135M records|https://www.hackread.com/worlds-most-secure-online-backup-provider-exposes-records/]]|Data_Leak|
|2020.04.01|Security Week|[[AWS Security Service 'Amazon Detective' Now Generally Available|https://www.securityweek.com/aws-security-service-amazon-detective-now-generally-available]]|AWS_Detective|
|2020.04.03|CBR Online| → [[Amazon Detective Spots Unusual Behaviour Buried in the Data Logs|https://www.cbronline.com/news/amazon-detective]]|AWS_Detective|
|2020.04.01|(ISC)2|[[Cybersecurity's Top Needed Skill: Cloud Security|https://blog.isc2.org/isc2_blog/2020/04/cybersecuritys-top-needed-skill-cloud-security.html]]|Training|
|2020.04.01|DevOps|[[How to Secure Online Coding Platforms|https://devops.com/how-to-secure-online-coding-platforms/]]|Coding Threat_Modeling|
|2020.04.01|DevOps|[[Comparing Three Approaches to Multi-Cloud Security Management|https://devops.com/comparing-three-approaches-to-multi-cloud-security-management/]]|Multi_Cloud|
|2020.04.01|//Google Cloud//|[[Google Cloud infrastructure components Incident #20003|https://status.cloud.google.com/incident/zall/20003]]|GCP Outage|
|2020.04.01|//Google Cloud//|[[Achieving identity and access governance on Google Cloud|https://cloud.google.com/blog/products/identity-security/achieving-identity-and-access-governance-on-google-cloud]]|CGP Identity|
|2020.04.02|The Register| → [[Google Cloud Engine outage caused by 'large backlog of queued mutations'|https://www.theregister.co.uk/2020/04/02/google_cloud_services_outage_caused/]]|GCP Outage|
|2020.04.01|//Zoom//|[[The Facts Around Zoom and Encryption for Meetings/Webinars|https://blog.zoom.us/wordpress/2020/04/01/facts-around-zoom-encryption-for-meetings-webinars/]]|Zoom Encryption|
|2020.04.01|//Panther Labs//|[[Panther Labs Launches Open-Source Cloud-Native SIEM|https://www.securityweek.com/panther-labs-launches-open-source-cloud-native-siem]]|SIEM Tools|
|2020.04.01|//Menlo Security//|[[2020 Will Be the Year That SaaS Breaks Enterprise Security|https://www.menlosecurity.com/blog/2020-will-be-the-year-that-saas-breaks-enterprise-security]]|SaaS|
|2020.04.01|//AlienVault//|[[The foundation of a Zero Trust architecture|https://cybersecurity.att.com/blogs/security-essentials/the-foundation-of-a-zero-trust-architecture]] (1/3]|Zero_Trust|
|!Mars|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2020.03.31|
|2020.03.31|Internet Society|![[Leading CDN and Cloud Providers Join MANRS to Improve Routing Security|https://www.internetsociety.org/news/press-releases/2020/leading-cdn-and-cloud-providers-join-manrs-to-improve-routing-security/]]|Networking Prevention|
|2020.03.31|MANRS|![[MANRS for CDN and Cloud Providers|https://www.manrs.org/cdn-cloud-providers/]]|Networking Prevention|
|2020.04.03|APNIC| → [[CDNs and cloud providers join MANRS to improve routing security|https://blog.apnic.net/2020/04/03/cdns-and-cloud-providers-join-manrs-to-improve-routing-security/]]|Networking Prevention|
|2020.04.03|//Threatpost//| → [[Cloud Providers, CDNs Team Up to Battle Internet Routing Attacks|https://threatpost.com/cloud-cdns-team-internet-routing-attacks/154434/]]|Networking Prevention|
|2020.03.31|Summit Route|[[Isolated networks on AWS|https://summitroute.com/blog/2020/03/31/isolated_networks_on_aws/]]|AWS Isolation|
|2020.03.31|The Intercept|[[Zoom Meetings Aren't End-to-End Encrypted, Despite Misleading Marketing|https://theintercept.com/2020/03/31/zoom-meeting-encryption/]]|Zoom Encryption|
|2020.03.31|The Register|[[Outage hits some Google Cloud services, error rate curve flattens and they're coming back|https://www.theregister.co.uk/2020/03/31/google_cloud_infrastructure_outage/]]|GCP Outage|
|2020.03.31|The Last Watchdog|[[Security Compass streamlines the insertion of security best practices into DevOps|https://www.lastwatchdog.com/new-tech-security-compass-streamlines-the-insertion-of-security-best-practices-into-devops/]]|DevSecOps|
|2020.03.31|KitPloit|[[Awspx - A Graph-Based Tool For Visualizing Effective Access And Resource Relationships In AWS Environments|https://www.kitploit.com/2020/03/awspx-graph-based-tool-for-visualizing.html]]|Tools AWS|
|2020.03.31|Container Journal|[[Catch Breaches Faster With Automated Kubernetes Audit Log Monitoring|https://containerjournal.com/topics/container-security/catch-breaches-faster-with-automated-kubernetes-audit-log-monitoring/]]|Monitoring Logging Kubernetes|
|2020.03.31|Security Boulevard|[[Cybersecurity Cloud Transition Likely to Accelerate|https://securityboulevard.com/2020/03/cybersecurity-cloud-transition-likely-to-accelerate/]]|Misc|
|2020.03.31|arXiv.org|![[Cybersecurity in the AWS Cloud|https://arxiv.org/pdf/2003.12905.pdf]] (pdf)|AWS|
|2020.03.31|arXiv.org|[[A Security and Performance Driven Architecture for Cloud Data Centers|https://arxiv.org/pdf/2003.12598.pdf]] (pdf)|Data_Centers|
|2020.03.31|//TrendMicro//|[[Raccoon Stealer's Abuse of Google Cloud Services and Multiple Delivery Techniques|https://blog.trendmicro.com/trendlabs-security-intelligence/raccoon-stealers-abuse-of-google-cloud-services-and-multiple-delivery-techniques/]]|GCP MaaS|
|2020.04.02|CyberDefense Mag| → [[New Raccoon Stealer uses Google Cloud Services to evade detection|https://www.cyberdefensemagazine.com/new-raccoon-stealer-uses-google-cloud-services-to-evade-detection/]]|GCP MaaS|
|2020.03.31|//Google Cloud//|[[Introducing Service Directory: Manage all your services in one place at scale|https://cloud.google.com/blog/products/networking/introducing-service-directory]]|GCP Directory|
|2020.04.01|The Register| → [[Who you gonna call? Google Cloud Platform's beta Service Directory is like a phone book for microservice discovery|https://www.theregister.co.uk/2020/04/01/google_cloud_service_directory_beta/]]|GCP Directory|
|2020.03.31|//Lastline//|[[The Challenge of Obtaining Visibility into Cloud Security|https://www.lastline.com/blog/the-challenge-of-obtaining-visibility-into-cloud-security/]]|Visibility|
|2020.03.31|//G2//|[[5 SaaS Security Concerns and How to Address Them|https://learn.g2.com/saas-security]]|SaaS|
|2020.03.31|//Backblaze//|[[Look Before You Sync: Cloud Backup Vs. Cloud Sync|https://www.backblaze.com/blog/cloud-backup-vs-cloud-sync/]]|BackUp Synchronization|
|2020.03.31|//Sysdig//|[[PCI Compliance for Containers and Kubernetes|https://sysdig.com/blog/container-pci-compliance/]]|Compliance Containers|
|2020.03.31|//Exabeam//|[[Plugging AWS Into Your SIEM: A Practical Guide|https://www.exabeam.com/siem/plugging-aws-into-your-siem-a-practical-guide/]]|SIEM AWS|
|2020.03.31|//HashiCorp//|[[HashiCorp Vault: Delivering Secrets with Kubernetes|https://medium.com/hashicorp-engineering/hashicorp-vault-delivering-secrets-with-kubernetes-1b358c03b2a3]]|Kubernetes Secrets|
|>|>|>|!2020.03.30|
|2020.03.30|Summit Route|[[AWS Phishing Emails|https://summitroute.com/blog/2020/03/30/aws_phishing_emails/]]|AWS Phishing|
|2020.03.30|The Register|[[Cloud'n'server hosting giant OVH more like OMG: Data center hardware failure knocks out services in France|https://www.theregister.co.uk/2020/03/30/ovh_cloud_outage/]]|OVH Outage|
|2020.03.30|Christophe Tafani-Dereeper|[[They told me I could be anything, so I became a Kubernetes node – Using K3s for command and control on compromised Linux hosts|https://blog.christophetd.fr/using-k3s-for-command-and-control-on-compromised-linux-hosts/]] ([[video|https://www.youtube.com/watch?v=CH7S5rE3j8w]])|Kubernetes K3s APT|
|2020.03.30|Christophe Tafani-Dereeper|[[Using K3s for command and control on compromised Linux hosts|https://blog.christophetd.fr/using-k3s-for-command-and-control-on-compromised-linux-hosts/]]|Kubernetes Attacks|
|2020.03.30|DevOps|[[How to Secure Your Kubernetes Cluster on GKE|https://devops.com/how-to-secure-your-kubernetes-cluster-on-gke/]]|GKE Kubernetes|
|2020.03.30|//Microsoft//|[[Introducing new Microsoft 365 Personal Family subscriptions|https://www.microsoft.com/en-us/microsoft-365/blog/2020/03/30/introducing-new-microsoft-365-personal-family-subscriptions/]]|O365 M365|
|2020.03.31|Redmond Channel Partner| → [[Some Office 365 Products Getting 'Microsoft 365' Rebrand|https://rcpmag.com/articles/2020/03/31/office-365-microsoft-365-rebrand.aspx]]|O365 M365|
|2020.03.31|NetGuide NZ| → [[Microsoft overhauls Office 365, rebrands it 'Microsoft 365'|https://netguide.co.nz/story/microsoft-overhauls-office-365-rebrands-it-microsoft-365]]|O365 M365|
|2020.04.01|Ars Technica| → [[Microsoft announces Microsoft 365, a service to replace personal Office 365|https://arstechnica.com/gadgets/2020/04/office-365-is-now-microsoft-365-and-its-getting-new-apps-and-features/]]|O365 M365|
|2020.03.30|//McAfee//[>img[iCSF/flag_fr.png]]|[[Le partage des responsabilités est primordial à la sécurité du cloud|https://www.globalsecuritymag.fr/Le-partage-des-responsabilites-est,20200330,97144.html]]|Shared_responsibility|
|2020.03.30|//G Suite//|[[Less secure app turn-off suspended until further notice|https://gsuiteupdates.googleblog.com/2020/03/less-secure-app-turn-off-suspended.html]]|G_Suite|
|2020.03.30|//Microsoft//|[[Enable remote collaboration quickly and securely with Azure AD|https://techcommunity.microsoft.com/t5/azure-active-directory-identity/enable-remote-collaboration-quickly-and-securely-with-azure-ad/ba-p/1257334]]|AzureAD|
|2020.03.30|//AttackIQ//|[[Defeating a Cloud Breach Part 1|https://attackiq.com/blog/2020/03/30/defeating-a-cloud-breach-part-1/]] (1/3)|Attack Breach|
|2020.03.30|//Toshiba//|[[World Back Up Day : Toshiba fait cinq recommandations pour la sauvegarde des données|https://www.globalsecuritymag.fr/World-Back-Up-Day-Toshiba-fait,20200330,97122.html]]|Backup|
|2020.03.30|//Coalfire//|[[Accelerate Your Path to Cloud Compliance|https://www.coalfire.com/The-Coalfire-Blog/March-2020/Accelerate-Your-Path-to-Cloud-Compliance]]|Compliance|
|2020.03.30|//ForgeRock//|[[Part Two: 5 More IAM Capabilities to Support Remote Work and Online Business at Scale|https://www.forgerock.com/blog/part-two-5-more-iam-capabilities-support-remote-work-and-online-business-scale]] (2/2)|IAM|
|2020.03.30|Alex Smolen|[[Fine-tuning access with AWS IAM global condition context keys|https://medium.com/@alsmola/fine-tuning-access-with-aws-iam-global-condition-context-keys-784d6374ee]]|AWS IAM Keys|
!"//Why use the CAIQ for vendor analysis vs. other questionnaires?//"
Article de blog publié le 4 avril 2020 — Rédigé par John DiMaria, Assurance Investigatory Fellow, CSA
{{ss2col{
<<<
[>img(150px,auto)[iCSA/K44BW.png]]//Security assessments, security questionnaires, vendor assessments, RFPs are all unavoidable in today's world of cloud computing and drain valuable resources and time when completing them. However, they're a big part of closing new deals and maintaining or up-selling to existing accounts. If you are a start-up trying to escalate, it can be even more daunting.
Well, here is some information only old fixtures like me know from doing this for 30 years:
!!The challenge with most security questionnaires
A questionnaire addresses only the "perception" of risk by your customers; it does not address your "actual" risks. Customer security teams often create these questionnaires based on their own risks using a list of specific controls based on their internal experiences or what they are using. They usually apply the same prescription to every vendor they work with, regardless if it's reasonable or even applicable.
In many cases, it is to check a box or cover a legal requirement of due diligence recommended by the General Council. This means that you can (technically) complete this questionnaire without having any tangible evidence of security at all. And here is the kicker, they may not even look at your answers and many times don't. Face it, if you are a person tasked with administering security questionnaires and you have; for example, 1000 vendors and you send them all a questionnaire that say covers 114 + controls similar to ISO/IEC 27001 plus maybe a few of your own and now they all come back… are you going to read every line and vet each question to make sure it is complete enough and if a few are not; are you going to audit them or even call to discuss it? Chances are the answer is NO, or at best, you address the "showstoppers." Even if you wanted to address every single one 100%, it would take a huge investment. So, the questionnaire is just a tad better than blind trust.
Now obviously, none of what I just described is advisable, but it does happen to some extent. So how do you make the best use of your time, help your customers satisfy their requirements, provide an actual account of what you have in place with applicable controls, AND ensure it is updated and maintained for them?
!!One questionnaire that aligns with over 40 leading standards and regulations
CSA, through the power of years of research, has combined the comprehensive feedback that was collected over the years from its partners, working groups and the industry to produce the Cloud Control Matrix (CCM). The CCM is a set of sector-specific controls for cloud service providers. There is also a set of questions a cloud consumer and auditor may wish to ask a cloud provider to ascertain their compliance to the CCM called the Consensus Assessment Initiative Questionnaire (CAIQ).
The CAIQ offers an industry-accepted way to document what security controls exist in cloud services, providing security control transparency and to some extent assurance. Therefore, it helps cloud customers to gauge the security posture of prospective cloud service providers and determine if their cloud services are suitably secure. It allows the cloud user to review the security practices of providers, accelerating their due diligence and leading to higher quality procurement experience and because it is posted on the STAR public registry and updated on a regular basis, the customer can easily monitor the provider's ongoing compliance posture providing a higher level of peace of mind for the user.
!!Eliminates the need for multiple questionnaires
Because the CCM aligns itself with over 40 of the leading standards and regulations, it basically eliminates the need for any other questionnaire. This allows the cloud service provider (CSP) to break down how you express risk to a customer with your actual risk. And because of the detailed mappings, within the main CCM document, they can see the connection with many other standards and/or regulations they may have questions about.
!!For cloud customers
It is prudent to require that your cloud providers submit a CAIQ self-assessment to the CSA STAR registry. This means the provider will have completed the first of three levels of transparency and assurance provided by the CSA STAR Program.
* The CSA STAR compliance program lets you select the level of transparency and assurance you may want to require from CSPs as part of your procurement process and ongoing monitoring.
* The STAR registry is a trusted source of information on the security and privacy posture of CSPs. It enforces accountability and lets you build a coherent GRC program.
* The STAR Foundation tools (including the CCM, CAIQ, and GDPR Code of Conduct) support your own GRC approach and ensure language alignment between you and your CSP.
If your provider is not listed on the STAR registry, you can submit a request to have them verified using our ready-made editable template that you can revise and e-mail directly to your provider(s).
After you've selected the appropriate level for your organization you can check their status in the STAR registry.
!!To cloud service providers
The Security, Trust, Assurance, and Risk (STAR) registry is a cost-effective solution that decreases complexity while increasing trust and transparency. Demonstrate your adherence to security and privacy best practices to future and current customers by submitting to the registry.
* Accelerate your sales cycle
* Solidify your position as a trusted provider of cloud services
* Better build, establish and maintain a robust security program that is internationally accepted
* Expand your business by helping customers navigate secure cloud adoption
* Be part of a global database that is becoming the marketplace for providers used by cloud users
* You can update your entry annually and it is maintained by CSA. You just need to provide a link to your customers.
* CSA experts will help you with the initial business communication to facilitate eliminating or reducing those multiple questionnaires
//[...]
<<<
}}}__Lien :__
* Article sur le site de la CSA &Arr; ''[[CloudSecurityAlliance.fr/go/k44b/|https://CloudSecurityAlliance.fr/go/k44b/]]''
!"//Cloud Adoption Considerations for IoT and OT//"
Webinar [[CloudBytes]] diffusé le 2 avril 2020 — Présenté par Bob Gourley, Directeur technique et co-fondateur de OODA
<<<
//to learn about when AI goes wrong including... 6 categories of real-world AI failures, notable failures in operational systems, compliance needs, a guide for securing AI for framework//
<<<
&Arr; S'inscrire au Webinar de 60 minutes [[sur le site de BrightTALK|https://CloudSecurityAlliance.fr/go/k41w/]].
!"//General Access Control Guidance for Cloud Systems//"
[>img(150px,auto)[iCSF/NIST.gif]]Ce document de travail propose une première approche pour comprendre les défis de sécurité dans le cloud en analysant les aspects de contrôle d'accès (AC) dans les trois modèles de services cloud : IaaS, PaaS et SaaS.
Les caractéristiques essentielles qui affecteraient la conception du contrôle d'accès au cloud sont également résumées, telles que l'accès au réseau, la mise en commun des ressources, l'élasticité rapide, les services à la consommation et le partage des données.
Diverses orientations pour la conception du contrôle d'accès de l'IaaS, du PaaS et du SaaS sont proposées en fonction de leurs caractéristiques respectives.
Des recommandations pour la conception du contrôle d'accès dans différents systèmes cloud sont également incluses pour faciliter les futures mises en œuvre.
En outre, des exemples de règles sont synthétisées pour chaque système de cloud.

En conclusion : un document assez court et synthétique (26 pages) à consulter. La date limite pour faire les commentaires est fixée au ''15 mai 2020''.

La table des matières :{{ss2col{
<<<
//Executive Summary
* 1 - Introduction
** 1.1 - Purpose
** 1.2 - Scope
** 1.3 - Audience
** 1.4 - Document Structure
* 2 - Cloud Access Control Characteristics
* 3 - Access Control Guidance for IaaS
** 3.1 - Guidance for Network
** 3.2 - Guidance for Hypervisor
** 3.3 - Guidance for Virtual Machines
** 3.4 - Guidance for APIs
** 3.5 - Recommendations for IaaS Access Control
* 4 - Access Control System for PaaS
** 4.1 - Guidance for Memory Data
** 4.2 - Guidance for APIs
** 4.3 - Recommendations for PaaS Access Control
* 5 - AC System for SaaS
** 5.1 - Guidance for Data Owner's Control
** 5.2 - Guidance for Confidentiality
** 5.3 - Guidance for Privilege Management
** 5.4 - Guidance for Multiple Replicas of Data
** 5.5 - Guidance for Multi-tenancy
** 5.6 - Guidance for Attribute and Role Management
** 5.7 - Guidance for Policies
** 5.8 - Guidance for APIs
** 5.9 - Recommendations for SaaS Access Control
* 6 - Guidance for Inter and Intra Operation
* 7 - Conclusions
References
List of Appendices
Guidance and SP 800-53 Revision 4 AC Control Mapping//
<<<
}}}
__Liens sur le site du NIST :__
&Arr; Lire [[l'annonce|https://CloudSecurityAlliance.fr/go/k41d/]]
&Arr; Télécharger [[le document|https://CloudSecurityAlliance.fr/go/k41d/]]
!Actualités, Blog, Publications et Veille "Sécurité du Cloud"
<<tiddler fAll2LiTabs13end with: 202003>>
<<tiddler fAll2Tabs10 with: VeilleM","_202003>>
|!Mars|!Sources|!Titres et Liens|!Keywords|
|2020.03.05|//Source Incite//|[[SRC-2020-0011 : ManageEngine Desktop Central FileStorage getChartImage Deserialization of Untrusted Data Remote Code Execution Vulnerability|https://srcincite.io/advisories/src-2020-0011/]]|Zoho CVE-2020-10189|
|2020.03.06|//Zoho//|[[We acknowledge the vulnerability in versions of Desktop Central released before 1/20/20 (build 10.0.473 and below)|https://mobile.twitter.com/manageengine/status/1235985409731149824]]|Zoho CVE-2020-10189|
|2020.03.06|US-CERT| → [[Zoho Releases Security Update on ManageEngine Desktop Central|https://www.us-cert.gov/ncas/current-activity/2020/03/06/zoho-releases-security-update-manageengine-desktop-central]]|Zoho CVE-2020-10189|
|2020.03.06|Bleeping Computer| → [[Zoho Fixes No-Auth RCE Zero-Day in ManageEngine Desktop Central|https://www.bleepingcomputer.com/news/security/zoho-fixes-no-auth-rce-zero-day-in-manageengine-desktop-central/]]|Zoho CVE-2020-10189|
|2020.03.06|//Desktop Central//| → [[ManageEngine Desktop Central remote code execution vulnerability (CVE-2020-10189)|https://www.manageengine.com/products/desktop-central/remote-code-execution-vulnerability.html]]|Zoho CVE-2020-10189|
[img(25%,1px)[iCSF/BluePixel.gif]]
<<tiddler .ReplaceTiddlerTitle with: [[Alertes et Vulnérabilités - Mars 2020]]>>
<<tiddler fAll2LiTabs10 with: NewsL","202003>><<tiddler .ReplaceTiddlerTitle with: [[Newsletters - Mars 2020]]>>
<<tiddler .ReplaceTiddlerTitle with: [[Actualités - Mars 2020]]>><<tiddler fAll2LiTabs13end with: 'Actu","202003'>>
<<tiddler fAll2LiTabs13end with: 'Blog","202003'>>
[img(25%,1px)[iCSF/BluePixel.gif]]
<<tiddler .ReplaceTiddlerTitle with: [[Blog - Mars 2020]]>>
<<tiddler fAll2LiTabs13end with: 'Publ","202003'>>
[img(25%,1px)[iCSF/BluePixel.gif]]
<<tiddler .ReplaceTiddlerTitle with: [[Publications - Mars 2020]]>>
!"//The Six Pillars of DevSecOps: Automation//"
{{ss2col{
<<<
//Security automation is the programmatic execution of security actions to identify, protect, detect, respond, and recover from cyber threats.
Automation is a critical component of DevSecOps because it creates process efficiency, enabling developers, infrastructure, and security teams to focus on delivering value rather than repeating manual efforts and errors with every release.
Example activities that can be automated include application, host, and container vulnerability scanning.
DevOps teams utilizing CI/CD and infrastructure as code are agile and release features incrementally and at a much faster pace than teams using a waterfall approach.
This creates the need to automate security capabilities so as to provide timely and meaningful feedback.
This security capability must be embedded in the software delivery pipeline in order to keep pace with rapid changes in organizational assets and regulatory compliance.
Due to the complexity of cloud infrastructure and the potential downstream impact of even small code changes, security needs to be included in design, implementation, testing, release, and monitored in production.
A pragmatic approach introducing tentative and modest automation of security capabilities enables rapid feedback and can potentially eliminate whole classes of risk, such as container scanning to ensure OS hardening or software composition analysis for known CVEs.//
<<<
}}}La date limite pour faire les commentaires est fixée au ''22 avril 2020''.
&Arr; Lire [[l'original|https://CloudSecurityAlliance.fr/go/k3ua/]] sur le site de la CSA
|[img(30px,auto)[iCSF/Francais.gif]] @@color:#00F;font-size:125%;__[[Version française|2020.03.29 - Newsletter Hebdomadaire - #57]]__@@ |[img(30px,auto)[iCSF/Anglais.gif]] @@color:#00F;font-size:125%;__[[English version|2020.03.29 - Weekly Newsletter - #57]]__@@ |
|<<tiddler [[2020.03.29 - Newsletter Hebdomadaire - #57]]>> |<<tiddler [[2020.03.29 - Weekly Newsletter - #57]]>> |
!!1 - Nouveautés CSA et Informations de la semaine du 23 au 29 mars 2020
* Podcast : 'CSA STAR Certification Case Study'+++*[»]> <<tiddler [[2020.03.25 - Podcast : 'CSA STAR Certification Case Study']]>>=== 
* Blog : les 7 étapes pour sécuriser le télétravail dans le Cloud+++*[»]> <<tiddler [[2020.03.27 - Blog : les 7 étapes pour sécuriser le télétravail dans le Cloud]]>>=== 
* Blog : Questions pour ses fournisseurs en cette période de télétravail massif+++*[»]> <<tiddler [[2020.03.26 - Blog : Questions pour ses fournisseurs en cette période de télétravail massif]]>>=== 
!!2 - Veille Web Cloud et Sécurité
La [[Veille Web|2020.03.29 - Veille Hebdomadaire - 29 mars]] avec plus d'une soixantaine de liens dont :
* Etudes et rapports : Exabeam+++*[»] 
|2020.03.25|//Exabeam//|[[Exabeam Research Shows Companies are Embracing Cloud-based Security Tools, but Concerns Around Risk, Ease of Deployment Remain|https://www.exabeam.com/pr/exabeam-research-shows-companies-are-embracing-cloud-based-security-tools-but-concerns-around-risk-ease-of-deployment-remain/]]|Report Exabeam|
|2020.03.25|MSSP Alert| → [[Cloud-Based Security Tool Adoption: Latest Research Findings|https://www.msspalert.com/cybersecurity-research/cloud-based-tool-adoption/]]|Report Exabeam|
|2020.03.27|Help Net Security| → [[While many migrate security tools to the cloud, concerns remain|https://www.helpnetsecurity.com/2020/03/27/migrate-security-tools/]]|Report Exabeam|
=== 
* Alertes : Kubernetes+++*[»] 
|2020.03.24|//Alcide//|[[New Kubernetes Vulnerabilities: CVE-2020-8551, CVE-2020-8552|https://blog.alcide.io/new-kubernetes-vulnerabilities-cve-2020-855-cve-2020-8552]]|Kubernetes Vulnerabilities|
=== 
* Attaques et pannes : Fuite de données+++*[»] 
|2020.03.25|//vpnMentor//|[[Report: Cloud Storage Data Breach Exposes Users' Private Information|https://www.vpnmentor.com/blog/report-datadepositbox-leak/]]|Data_Leak AWS_S3|
===, incidents GCP+++*[»] 
|2020.03.27|CIO Dive|[[Understanding Google Cloud's recent service hiccups|https://www.ciodive.com/news/google-cloud-platform-outage/575047/]]|GCP Outages|
===, malveillance par le Cloud+++*[»] 
|2020.03.27|TechRepublic|[[Why Microsoft's Office 365 has become an all-access pass for phishers to exploit|https://www.techrepublic.com/article/why-microsofts-office-365-has-become-an-all-access-pass-for-phishers-to-exploit/]]|O365 Phishing|
|2020.03.25|//ZScaler//|[[Multistaged Downloader Leverages Google Drive to Download Advanced Malware|https://www.zscaler.com/blogs/research/multistaged-downloader-leverages-google-drive-download-advanced-malware]]|Attacks Malware Google_Drive|
|2020.03.23|Washington Post|[[How the cloud has opened new doors for hackers|https://www.washingtonpost.com/technology/2020/03/02/cloud-hack-problems/]]||
|2020.03.24|Dark Reading|![[How Attackers Could Use Azure Apps to Sneak into Microsoft 365|https://www.darkreading.com/cloud/how-attackers-could-use-azure-apps-to-sneak-into-microsoft-365/d/d-id/1337399]]|Azure Attacks|
===, tableau de bord Internet+++*[»] 
|2020.03.23|CBR Online|[[New Global Internet Outages Map: "Concerning" Rise in ISP Outages|https://www.cbronline.com/news/global-internet-outages-map]]|Outages|
=== 
* Divers : Impacts de la pandémie COVID-19 et du télétravail+++*[»]>  
|2020.03.28|//Microsoft Azure//|![[Update #2 on Microsoft cloud services continuity|https://azure.microsoft.com/en-us/blog/update-2-on-microsoft-cloud-services-continuity/]]|COVID-19 Azure Resilience|
|2020.03.27|Solutions Review|[[The Coronavirus Cloud Computing Survival Guide for Businesses|https://solutionsreview.com/cloud-platforms/the-coronavirus-cloud-computing-survival-guide-for-businesses/]]|COVID-19 Recommendations|
|2020.03.26|DZone|[[Enabling WFH With Office 365 Requires State-of-the-Art Security and Data Backup|https://dzone.com/articles/enabling-wfh-with-office-365-requires-state-of-the]]|HomeWorking Backups|
|2020.03.24|Silicon.fr[>img[iCSF/flag_fr.png]]|[[Microsoft Azure : à qui la priorité sur les ressources cloud ?|https://www.silicon.fr/microsoft-azure-priorite-cloud-336761.html]]|Azure|
|2020.03.24|Beeping Computer|[[Microsoft Cuts Back More Office 365 Features to Handle High Load|https://www.bleepingcomputer.com/news/microsoft/microsoft-cuts-back-more-office-365-features-to-handle-high-load/]]|O365|
|2020.03.24|//3DS Outscale//[>img[iCSF/flag_fr.png]]|[[Cybersécurité et risques liés au télétravail|https://www.globalsecuritymag.fr/3DS-Outscale-Cybersecurite-et,20200324,96966.html]]|Home_Working|
|2020.03.23|//Thousand Eyes//|[[State of Internet Health During COVID-19|https://blog.thousandeyes.com/internet-health-during-covid-19/]]|Status Outages|
===, questionnements sur Zoom+++*[»] 
|2020.03.27|Forbes|[[Beware Zoom Users: Here's How People Can 'Zoom-Bomb' Your Chat|https://www.forbes.com/sites/kateoflahertyuk/2020/03/27/beware-zoom-users-heres-how-people-can-zoom-bomb-your-chat/]]|Zoom|
|2020.03.26|Vice|[[Zoom iOS App Sends Data to Facebook Even if You Don't Have a Facebook Account|https://www.vice.com/en_us/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account]]|Zoom Privacy|
|2020.03.25|//Checkpoint//[>img[iCSF/flag_fr.png]]|[[Qui regarde qui dans Zoom ? Conseils pour une utilisation de Zoom en toute sécurité|https://www.globalsecuritymag.fr/Qui-regarde-qui-dans-Zoom-Conseils,20200326,97015.html]]|Zoom Privacy|
=== 
!3 - Weekly Cloud and Security Watch Newsletter[>img[iCSF/inEnglish.png]]
<<tiddler [[2020.03.29 - Weekly Newsletter - March 29th]]>> 
!CSA News and Updates - March 23rd to 29th
* Podcast : 'CSA STAR Certification Case Study'[>img(200px,auto)[iCSF/cloud-security-alliance-fr.png]]
* Blog : '7 Steps to Securing Your Remote Work Lifecycle in the Cloud'
* Blog : 'Right Questions to Ask Your Vendors in Times of Large-Scale Remote Working'
!Cloud and Security News Watch
[[Over 60 links|2020.03.29 - Veille Hebdomadaire - 29 mars]] among which:
* Reports: Exabeam
* Alerts: Kubernetes
* Attacks: Data Leaks, GCP incidents, Global Internet Outages Map, New doors for hackers thanks to the Cloud, 
* Miscellaneous: COVID-19 and WFH impacts, Zoom issues and Zoom-bombing
|ssTabl96|k
|!⇒ [[CloudSecurityAlliance.fr/go/K3T/|https://CloudSecurityAlliance.fr/go/K3T/]] |
|!Mars|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2020.03.29|
|2020.03.29|//JumpCloud//|[[Comparing Azure AD and AD FS|https://jumpcloud.com/blog/aad-vs-adfs]]|AzureAD|
|>|>|>|!2020.03.28|
|2020.03.28|//Microsoft Azure//|![[Update #2 on Microsoft cloud services continuity|https://azure.microsoft.com/en-us/blog/update-2-on-microsoft-cloud-services-continuity/]] (2/3)|COVID-19 Azure Resilience|
|2020.03.29|The Register| → [[Microsoft reveals 775 percent Azure surge, quotas on some resources and 'significant new capacity' coming ASAP|https://www.theregister.co.uk/2020/03/29/microsoft_reveals_775_percent_azure_usage_surge_in_coronavirus_lockdown_zones/]]|COVID-19 Azure Resilience|
|2020.03.29|Silicon Angle| → [[Microsoft sees massive 775% spike in cloud services traffic|https://siliconangle.com/2020/03/29/microsoft-sees-massive-775-spike-cloud-services-traffic/]]|COVID-19 Azure Resilience|
|2020.03.30|Bleeping Computer| → [[Microsoft Cloud Services See 775% Growth As More Work Remotely|https://www.bleepingcomputer.com/news/microsoft/microsoft-cloud-services-see-775-percent-growth-as-more-work-remotely/]]|COVID-19 Azure Resilience|
|2020.03.30|JDN[>img[iCSF/flag_fr.png]]| → [[Azure : une demande en hausse de 775% dans les régions en confinement|https://www.journaldunet.com/web-tech/cloud/1490015-azure-une-demande-en-hausse-775-dans-les-regions-en-confinement/]]|COVID-19 Azure Resilience|
|2020.03.18|Enterprise Networking Planet|[[Kubernetes 1.18 Improves Networking and Security for Cloud Native|http://www.enterprisenetworkingplanet.com/datacenter/kubernetes-1.18-improves-networking-and-security-for-cloud-native.html]]|Kubernetes|
|>|>|>|!2020.03.27|
|2020.03.27|Forbes|[[Beware Zoom Users: Here's How People Can 'Zoom-Bomb' Your Chat|https://www.forbes.com/sites/kateoflahertyuk/2020/03/27/beware-zoom-users-heres-how-people-can-zoom-bomb-your-chat/]]|Zoom|
|2020.03.27|Solutions Review|[[The Coronavirus Cloud Computing Survival Guide for Businesses|https://solutionsreview.com/cloud-platforms/the-coronavirus-cloud-computing-survival-guide-for-businesses/]]|COVID-19 Recommendations|
|2020.03.27|CIO Dive|[[Understanding Google Cloud's recent service hiccups|https://www.ciodive.com/news/google-cloud-platform-outage/575047/]]|GCP Outages|
|2020.03.30|CRN Australia| → [[Google Cloud confirms global outage|https://www.crn.com.au/news/google-cloud-confirms-global-outage-539947]]|GCP Outages|
|2020.03.27|TechRepublic|[[Why Microsoft's Office 365 has become an all-access pass for phishers to exploit|https://www.techrepublic.com/article/why-microsofts-office-365-has-become-an-all-access-pass-for-phishers-to-exploit/]]|O365 Phishing|
|2020.03.27|Security Boulevard|[[Why Traditional Security Is Failing Us, Part 2|https://securityboulevard.com/2020/03/why-traditional-security-is-failing-us-part-2/]] (2/2)|Treats|
|2020.03.27|TechBeacon|[[Why your data is safer in the cloud than on premises|https://techbeacon.com/security/why-your-data-safer-cloud-premises]]|Data|
|2020.03.27|IT Brief NZ|[[The top four cloud IT security misconfigurations and how to fix them|https://itbrief.co.nz/story/the-top-four-cloud-it-security-misconfigurations-and-how-to-fix-them]]|Misconfigurations|
|2020.03.27|NextGov|[[Microsoft Upgrades Classified Cloud Offering|https://www.nextgov.com/it-modernization/2020/03/microsoft-upgrades-classified-cloud-offering/164169/]]|Azure Government|
|2020.03.27|//Chekpoint//|[[Public Cloud - 4 Subtle Differences with Significant Security Concerns|https://blog.checkpoint.com/2020/03/27/public-cloud-4-subtle-differences-with-significant-security-concerns/]]|Public_Cloud|
|2020.03.27|//Compare the Cloud//|[[Managed Kubernetes: Understanding Your Options in the Cloud|https://www.comparethecloud.net/kubernetes/managed-kubernetes-understanding-your-options-in-the-cloud/]]|Kubernetes|
|>|>|>|!2020.03.26|
|2020.03.26|Dark Reading|[[How to Prevent an AWS Cloud Bucket Data Leak|https://www.darkreading.com/edge/theedge/how-to-prevent-an-aws-cloud-bucket-data-leak--/b/d-id/1337093]]|Data_Leak|
|2020.03.26|Vice|[[Zoom iOS App Sends Data to Facebook Even if You Don't Have a Facebook Account|https://www.vice.com/en_us/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account]]|Zoom Privacy|
|2020.03.27|TechRadar| → [[Video calling app Zoom's iOS version is sharing user data with Facebook|https://www.techradar.com/news/video-calling-app-zooms-ios-version-is-sharing-user-data-with-facebook]]|Zoom Privacy|
|2020.03.26|DZone|[[Enabling WFH With Office 365 Requires State-of-the-Art Security and Data Backup|https://dzone.com/articles/enabling-wfh-with-office-365-requires-state-of-the]]|HomeWorking Backups|
|2020.03.26|//Optiv Security//|[[Operationalizing NSA Guidance (or any Guidance, For That Matter!)|https://www.infosecurity-magazine.com/opinions/operationalizing-nsa-guidance?&web_view=true]]|Guidance NSA|
|2020.03.26|//Intrinsec//[>img[iCSF/flag_fr.png]]|[[Bonnes pratiques - Sécurité de votre environnement cloud|https://www.intrinsec.com/bonnes-pratiques-cloud/]]|Best_Practices|
|2020.03.26|//Tripwire//|[[The Future is Hybrid: Practicing Security in the Hybrid Cloud|https://www.tripwire.com/state-of-security/security-data-protection/cloud/future-hybrid-practicing-security-hybrid-cloud/]]|Hybrid_Cloud|
|2020.03.26|//CloudCheckr//|![[The 5 AWS Security Mistakes You Might Be Making and How to Fix Them|https://cloudcheckr.com/cloud-security/the-5-aws-security-mistakes-you-might-be-making-and-how-to-fix-them/]]|AWS Bad_Practices Misconfigurations|
|2020.03.26|//Omdia//|[[Introducing Zero-Trust Access|https://www.darkreading.com/cloud/introducing-zero-trust-access-/a/d-id/1337362]]|Zero_Trust|
|2020.03.26|//Compare the Cloud//|[[Innovation & collaboration: Recent trends in cloud security|https://www.comparethecloud.net/articles/cloud-security-trends/]]|Trends|
|2020.03.26|//ForgeRock//|[[5 IAM Capabilities You Need to Support Remote Work, Study, and Play at Scale|https://www.forgerock.com/blog/5-iam-capabilities-you-need-support-remote-work-study-and-play-scale]] (1/2)|IAM|
|>|>|>|!2020.03.25|
|2020.03.25|Silicon.fr[>img[iCSF/flag_fr.png]]|[[Conteneurs : Microsoft développe une couche de sécurité sur Azure|https://www.silicon.fr/conteneurs-microsoft-securite-azure-336844.html]]|Azure Containers|
|2020.03.25|DZone|[[Zero-Trust for Next Generation Clouds|https://dzone.com/articles/zero-trust-for-next-generation-clouds]]|Zero_Trust|
|2020.03.25|InfoSec Mag|![[Cloud Native Threats: The Role of Infrastructure|https://www.infosecurity-magazine.com/blogs/cloud-native-threats/]]|Threats|
|2020.03.25|Help Net Security|[[How to secure customer data for SaaS success|https://www.helpnetsecurity.com/2020/03/25/saas-success/]]`|SaaS|
|2020.03.25|Help Net Security|[[Cloud-native security considerations for critical enterprise workloads|https://www.helpnetsecurity.com/2020/03/25/cloud-native-security-considerations/]]|Misconfigurations|
|2020.03.25|VMblog|[[VMblog Expert Interview: Cloud Disaster Recovery Service - A Chat with Executives from JetStream Software, Cloudian and ENS-Inc|https://vmblog.com/archive/2020/03/25/vmblog-expert-interview-cloud-disaster-recovery-service-a-chat-with-executives-from-jetstream-software-cloudian-and-ens-inc.aspx]]|DRaaS|
|2020.03.25|//Checkpoint//[>img[iCSF/flag_fr.png]]|[[Qui regarde qui dans Zoom ? Conseils pour une utilisation de Zoom en toute sécurité|https://www.globalsecuritymag.fr/Qui-regarde-qui-dans-Zoom-Conseils,20200326,97015.html]]|Zoom Privacy|
|2020.03.25|//vpnMentor//|[[Report: Cloud Storage Data Breach Exposes Users' Private Information|https://www.vpnmentor.com/blog/report-datadepositbox-leak/]]|Data_Leak AWS_S3|
|2020.03.25|//Summit Route//|[[AWS SCP Best Practices|https://summitroute.com/blog/2020/03/25/aws_scp_best_practices/]]|AWS Best_Practices|
|2020.03.25|//ZScaler//|[[Multistaged Downloader Leverages Google Drive to Download Advanced Malware|https://www.zscaler.com/blogs/research/multistaged-downloader-leverages-google-drive-download-advanced-malware]]|Attacks Malware Google_Drive|
|2020.03.25|//Exabeam//|[[Exabeam Research Shows Companies are Embracing Cloud-based Security Tools, but Concerns Around Risk, Ease of Deployment Remain|https://www.exabeam.com/pr/exabeam-research-shows-companies-are-embracing-cloud-based-security-tools-but-concerns-around-risk-ease-of-deployment-remain/]]|Report Exabeam|
|2020.03.25|MSSP Alert| → [[Cloud-Based Security Tool Adoption: Latest Research Findings|https://www.msspalert.com/cybersecurity-research/cloud-based-tool-adoption/]]|Report Exabeam|
|2020.03.25|TechRepublic| → [[Organizations are moving their security to the cloud, but concerns remain|https://www.techrepublic.com/article/organizations-are-moving-their-security-to-the-cloud-but-concerns-remain/]]|Report Exabeam|
|2020.03.27|Help Net Security| → [[While many migrate security tools to the cloud, concerns remain|https://www.helpnetsecurity.com/2020/03/27/migrate-security-tools/]]|Report Exabeam|
|2020.03.25|//Microsoft Azure//|[[Keeping your cloud deployments secure during challenging times|https://azure.microsoft.com/en-us/blog/keeping-your-cloud-deployments-secure-during-challenging-times/]]|Deployment|
|2020.03.25|//Microsoft Azure//|[[Azure Dedicated Host: New capabilities and benefits|https://azure.microsoft.com/en-us/blog/azure-dedicated-host-new-capabilities-and-benefits/]]|Hosting|
|>|>|>|!2020.03.24|
|2020.03.24|Silicon.fr[>img[iCSF/flag_fr.png]]|[[Microsoft Azure : à qui la priorité sur les ressources cloud ?|https://www.silicon.fr/microsoft-azure-priorite-cloud-336761.html]]|Azure|
|2020.03.24|Dark Reading|![[How Attackers Could Use Azure Apps to Sneak into Microsoft 365|https://www.darkreading.com/cloud/how-attackers-could-use-azure-apps-to-sneak-into-microsoft-365/d/d-id/1337399]]|Azure Attacks|
|2020.03.18|//Varonis//| ⇡ [[Using Malicious Azure Apps to Infiltrate a Microsoft 365 Tenant|https://www.varonis.com/blog/using-malicious-azure-apps-to-infiltrate-a-microsoft-365-tenant/]]|Azure Attacks|
|2020.04.01|BetaNews| → [[How Malicious Azure apps can be used to target Office 365|https://betanews.com/2020/04/01/malicious-azure-apps-attack-office-365/]]|Azure Attacks|
|2020.03.24|Dark Reasing|![[How to Secure Your Kubernetes Deployments|https://www.darkreading.com/cloud/how-to-secure-your-kubernetes-deployments/a/d-id/1337324]]|Kubernetes Best_Practices|
|2020.03.24|Container Journal|[[Kubernetes Security: Key Factors to Consider|https://containerjournal.com/topics/container-security/kubernetes-security-key-factors-to-consider/]]|Kubernetes|
|2020.03.24|Security Boulevard|[[A Security Audit Is Critical to Mitigate Risk|https://securityboulevard.com/2020/03/a-security-audit-is-critical-to-mitigate-risk/]]|Audit|
|2020.03.24|Beeping Computer|[[Microsoft Cuts Back More Office 365 Features to Handle High Load|https://www.bleepingcomputer.com/news/microsoft/microsoft-cuts-back-more-office-365-features-to-handle-high-load/]]|O365|
|2020.03.24|IoT for All|[[Asset Tracking with Google Cloud Platform|https://www.iotforall.com/asset-tracking-with-gcp/]]|Asset_Management|
|2020.03.24|//3DS Outscale//[>img[iCSF/flag_fr.png]]|[[Cybersécurité et risques liés au télétravail|https://www.globalsecuritymag.fr/3DS-Outscale-Cybersecurite-et,20200324,96966.html]]|Home_Working|
|2020.03.24|//Security Intelligence//|[[Do You Know Your Responsibilities When It Comes to Container Security?|https://securityintelligence.com/posts/do-you-know-your-responsibilities-when-it-comes-to-container-security/]]|Containers|
|2020.03.24|//Optiv//|[[Container Compromise to IaaS Recon|https://www.optiv.com/blog/container-compromise-iaas-recon]]|Containers Compromise|
|2020.03.24|//Alcide//|[[New Kubernetes Vulnerabilities: CVE-2020-8551, CVE-2020-8552|https://blog.alcide.io/new-kubernetes-vulnerabilities-cve-2020-855-cve-2020-8552]]|Kubernetes Vulnerabilities|
|2020.03.24|//Panorays//|[[The Future of Cloud Security: Challenges, Trends and Solutions |https://www.panorays.com/blog/the-future-of-cloud-security-challenges-trends-and-solutions/]]|Challenges Trends CAIQ|
|>|>|>|!2020.03.23|
|2020.03.23|Washington Post|[[How the cloud has opened new doors for hackers|https://www.washingtonpost.com/technology/2020/03/02/cloud-hack-problems/]]||
|2020.03.23|ComputerWeekly|![[The AWS bucket list: Keep your cloud secure|https://www.computerweekly.com/feature/The-AWS-bucket-list-Keep-your-cloud-secure]]|AWS|
|2020.03.23|CBR Online|[[New Global Internet Outages Map: "Concerning" Rise in ISP Outages|https://www.cbronline.com/news/global-internet-outages-map]]|Outages|
|2020.03.23|Tal Maor|[[Lateral Movement Graph for Azure AD|https://medium.com/@talthemaor/lateral-movement-graph-for-azure-ad-7c5e0136e2d8]]|AzureAD Attacks|
|2020.03.23|//Varonis//|[[How to Connect to Office 365 PowerShell: Azure AD Modules|https://www.varonis.com/blog/connect-to-office-365-powershell/]]|AzureAD PowerShell|
|2020.03.23|CIO[>img[iCSF/flag_fr.png]]|[[Cloud public : la sécurité reste un frein|https://www.cio-online.com/actualites/lire-cloud-public-la-securite-reste-un-frein-12045.html]]|Report|
|2020.03.23|//Thousand Eyes//|[[State of Internet Health During COVID-19|https://blog.thousandeyes.com/internet-health-during-covid-19/]]|Status Outages|
|2020.03.23|//IONOS//[>img[iCSF/flag_fr.png]]|[[Sécurité accrue pour les conteneurs et les Kubernetes avec les filtres syscall|https://www.globalsecuritymag.fr/Securite-accrue-pour-les,20200323,96930.html]]|Containers Kubernetes|
|2020.03.23|//Cisco//|[[Understanding the Shared Responsibility Model: Securing Public Cloud Just Got Easier|https://blogs.cisco.com/security/understanding-the-shared-responsibility-model-securing-public-cloud-just-got-easier]]|Public_Cloud Shared_Responsibility|
|2020.03.23|//Compare the Cloud//|[[Reasons for the hybrid cloud: disaster recovery and cost|https://www.comparethecloud.net/articles/reasons-for-the-hybrid-cloud-disaster-recovery-and-cost/]]|DRP Hybrid_Cloud|
|2020.03.23|//CloudCheckr//|[[Government Clouds for Federal Agencies: The Public Sector Guide to IaaS Success|https://cloudcheckr.com/document/white-paper-public-cloud-success/]]|Government|
!"//7 Steps to Securing Your Remote Work Lifecycle in the Cloud//"
[>img(150px,auto)[iCSA/K3RB7.jpg]]Article de blog publié le 27 mars 2020 — Rédigé par Martin JohnsonVP Marketing at Polyrize+++*[»]> https://www.polyrize.com/ === 
<<<
//Current global events and government mandates are forcing many organizations that have not, to date, encouraged remote work to suddenly allow their employees en masse to make a quick, often chaotic scramble for the exit and into the safety of their own homes. Typically, that means an unplanned migration to business-enablement cloud apps and services, even before security measures have been fully established. So, it is important, as soon as the dust settles, for those same organizations to then look to ensure that they are establishing formal processes to secure the entire remote work lifecycle in the cloud. In all probability, remote work will become the new normal, and a growing attack vector, even after the current crisis passes.

As many companies who have allowed remote work for a while know, as employees move outside of the network perimeter and into the cloud, so too does your business-critical data, and, unfortunately, your employees' risky collaboration and bad file sharing habits. Cloud email, file sharing, instant messaging, and collaboration are critical to facilitate remote work, but organizations need to ensure that use of these apps is managed in a way that protects their business-critical resources by preventing account takeovers and data leakage.
This means making sure cloud users are only granted up-front the least amount of privileges within those services needed to do their specific jobs; that resource sharing is limited to specific groups to prevent external oversharing while employees and contractors do their work; and that remote offboarding is a quick, efficient, and thorough process when they leave.

To that end, it is recommended that you take the following 7 steps to secure your remote work lifecycle with respect to leveraging cloud services:
* ''STEP 1: Segregate your cloud workflows by group, department or location'' to determine what apps and resources they and their associated employees and contractors need to do their jobs. If possible, roll-out new cloud services incrementally for remote access, allowing only a manageable number of individuals from each group to try out the app and their associated access privileges before full deployment.
* ''STEP 2: Adhere to the principle of least privilege access'' by ensuring employees have the minimum access privileges needed to do their job. For example, consultants shouldn't have unfettered access to customer PII and interns shouldn't have access to sensitive engineering documents and IP. It also means placing controls on privileged users of both SaaS and IaaS services to prevent them from abusing admin privileges for non-admin related activities that can place your organization at high risk. In addition, you should eliminate unused or stale permissions of employees and external contractors to effectively reduce your attack surface by minimizing the risk of account takeovers and data loss.
* ''STEP 3: Ensure your business-critical resources are protected with MFA''. This means identifying and consolidating your business-critical resources within IT-sanctioned cloud apps that have been fully vetted for MFA support, as well as PII security controls, SOC-2 compliance, encryption support, etc.
* ''STEP 4: Make sure that file and folder sharing permissions within your sanctioned apps are restricted within specific groups'', depending on usage. This will help prevent accidental oversharing of business-critical data. Realize that a sensitive file carelessly dropped into a folder with overly-broad sharing rights will inherit those same rights and be automatically exposed.
* ''STEP 5: Implement cloud DLP policies'' to provide a last line of defense against the leakage of business-critical data. This includes placing strict controls on externally sharing sensitive files, especially those containing PII, PCI and PHI, with contractors and on copying files to personal accounts.
* ''STEP 6: Set up processes for off-boarding remote employees and contractors''. This process can be a challenge since many cloud services are managed outside of your SSO. Adopting a unified, cross-service access control solution that allows you to identify and revoke permissions when employees or contractors leave the company is recommended.
* ''STEP 7: Reprioritize security team resources to cloud data protection'', focused on preventing data leakage and account takeovers.

Ultimately, with few exceptions, all organizations will need to accept the fact that remote work is here to stay, and that cloud apps and services are critical to making it work effectively. Reorienting your employees, security teams, and processes to that new reality is critical to reducing your remote-work attack surface and ensuring that your business remains secure against the financial, reputational, and compliance related impact of cloud account takeovers and data loss throughout the remote work lifecycle//
[...]
<<<
__Liens :__
* Article sur le site de la CSA &Arr; ''[[CloudSecurityAlliance.fr/go/k3rx/|https://CloudSecurityAlliance.fr/go/k3rx/]]'', et sur celui de Polyrize &Arr; ''[[CloudSecurityAlliance.fr/go/k3rz/|https://CloudSecurityAlliance.fr/go/k3rz/]]'' 
!"//The Right Questions to Ask Your Vendors in Times of Large-Scale Remote Working//"
[>img(150px,auto)[iCSA/K3QBT.jpg]]Article de blog publié le 26 mars 2020 — Rédigé par Elad Shapira+++*[»]> https://www.linkedin.com/in/eladshapira/ ===, Head of Security, Panorays+++*[»]> https://www.panorays.com/ === 
Il propose des critères d'évaluation des fournisseurs, répartis en 18 questions dans 4 catégories : généralités, authentification et autorisation, résilience et continuité d'activités, procédure et processus.
<<<
//In the wake of coronavirus, companies are now applying immediate work-from-home policies. This sudden and massive change poses a set of new cybersecurity risks and is forcing security teams to take immediate action.
One of these cybersecurity risks emanates from the supply chain. While a large company may be able to quickly undergo the transition from a relatively concentrated workforce to a large-scale remote workforce, its supply chain partners may not.
In an effort to ensure the cyber resilience of the supply chain during these turbulent times, Panorays has readily made available the related vendor evaluation criteria, broken down to 18 questions. Companies are welcome to use these questions to assess their vendors' preparedness for work from home.
!!1 - General
# Do you already have remote work practices and policies?
# How many of your employees already have remote work capabilities?
# How much of your day-to-day activity is suitable for remote working today?
# What is your remote access mechanism?
# Which client devices are allowed to access your digital assets remotely?
!!2 - Authentication and Authorization
# Do you enforce 2FA for employees with remote work capabilities?
# Do you enforce strong passwords for all employees with remote work capabilities?
!!3 - Resilience and Business Continuity
# Is your network structured to support remote access for all of your employees?
# Do you expect operational problems or negative impact to your service due to remote access?
# Do you expect the pre-agreed SLA might be breached?
# Do you backup regularly and require your employees to use and save files only on company-related places (such as internal Google Drive or dedicated services)?
# Do you have redundant inbound connectivity for your facilities / internal systems?
!!4 - Procedure and Processes
# Do you train your employees with dedicated security awareness for working in public places such as coffee shops or restaurants? In particular, are they instructed to leave the end point station locked and verify use of a secure Wi-Fi network such as by using an employee's mobile phone?
# Did you train your employees with respect to the above procedures / processes before allowing remote working?
# Do you have clear procedures / processes / controls in place for verifying the authenticity of communications (email, phone, IM) with respect to activities such as fund transfers, account creation, account reset, etc.?
# Do you have a security solution protecting the end point stations (anti virus, EDR etc)?
# Do you have tools or procedures to support remote patch management for your servers, services and end-points?
# Do you have a secure manner of communication between employees working remotely?
These questions will help companies assess the cybersecurity risk emanating from their suppliers that have adopted work-from-home practices. It's important to note that considering the sudden shift in business behavior, the regular spreadsheet evaluation process will not work, considering the time and human effort it requires. As such, automation of the process is essential. Doing so will allow companies to easily add questions without the need to resend the full questionnaire, track progress, measure and quickly calculate risk levels. Most of all, it will allow companies to quickly and easily scale this process to ensure their security policy is enforced throughout the supply chain. //
[...]
<<<
__Lien :__
* blog original en anglais &Arr; ''[[CloudSecurityAlliance.fr/go/k3kb/|https://CloudSecurityAlliance.fr/go/k3kb/]]''
!"//CSA STAR Certification Case Study//"
[>img(150px,auto)[iCSA/CSAsecUpd.jpg]]Podcast de la série "[[CSA Security Update]]" publié le 25 mars 2020 — Invité : Larry Greenblatt, CISSP, CCSP; Information Security Specialist chez QAD
<<<
//The Security Trust Assurance and Risk (STAR) Program encompasses key principles of transparency, rigorous auditing, and harmonization of standards. Companies who use STAR indicate best practices and validate the security posture of their cloud offerings.
The STAR registry documents the security and privacy controls provided by popular cloud computing offerings. This publicly accessible registry allows cloud customers to assess their security providers in order to make the best procurement decisions.
Listen as we interview Larry Greenblatt, Information Security Specialist at QAD as he takes us through his journey to CSA STAR Certification from business case to implementation to through the audit process as well as discussing the ROI and the importance the maturity evaluation and how this has facilitated improving their business overall.//
<<<
__Liens :__
* Annonce : https://www.buzzsprout.com/303731/3118498-csa-star-certification-case-study-guest-larry-greenblatt-cissp-ccsp-information-security-specialist-at-qad
* Podcast : https://www.buzzsprout.com/303731/3118498-csa-star-certification-case-study-guest-larry-greenblatt-cissp-ccsp-information-security-specialist-at-qad.mp3
|[img(30px,auto)[iCSF/Francais.gif]] @@color:#00F;font-size:125%;__[[Version française|2020.03.22 - Newsletter Hebdomadaire - #56]]__@@ |[img(30px,auto)[iCSF/Anglais.gif]] @@color:#00F;font-size:125%;__[[English version|2020.03.22 - Weekly Newsletter - #56]]__@@ |
|<<tiddler [[2020.03.22 - Newsletter Hebdomadaire - #56]]>> |<<tiddler [[2020.03.22 - Weekly Newsletter - #56]]>> |
!Newsletter Hebdomadaire Cloud et Sécurité - 16 au 22 mars 2020
!!1 - Nouveautés CSA et Informations
* Ouverture de la plateforme collaborative [[CSA Circle]] pour le Chapitre Français+++*[»]> <<tiddler [[2020.03.19 - Ouverture de la plateforme collaborative CSA Circle]]>>=== 
* Blog : Continuous Auditing and Continuous Certification+++*[»]> <<tiddler [[2020.03.20 - Blog : Continuous Auditing and Continuous Certification]]>>=== 
* Ouverture des inscriptions pour la conférence SECtember+++*[»]> <<tiddler [[2020.03.16 - Ouverture des inscriptions pour la conférence SECtember]]>>=== 
* Webinar: 'Top 5 Latest Cloud Security Hacks and How You Can Avoid Them'+++*[»]> <<tiddler [[2020.03.17 - Webinar : 'Top 5 Latest Cloud Security Hacks and How You Can Avoid Them']]>>=== 
!!2 - Veille Web Cloud et Sécurité
La [[Veille Web|2020.03.22 - Veille Hebdomadaire - 22 mars]] avec plus d'une soixantaine de liens dont :
* À lire : Sécurisation des comptes AWS+++*[»] 
|2020.03.20|//AWS//|![[Top 10 security items to improve in your AWS account|https://aws.amazon.com/blogs/security/top-10-security-items-to-improve-in-your-aws-account/]]|AWS Best_Practices|
=== 
* Etudes et rapports : Firemon+++*[»] 
|2020.03.18|The Last Watchdog|[[FireMon survey shows security lags behind fast pace of hybrid cloud deployments|https://www.lastwatchdog.com/shared-intel-firemon-survey-shows-security-lags-behind-fast-pace-of-hybrid-cloud-deployments/]]|Survey Firemon|
=== 
* Supervision : les flux latéraux (Est-Ouest)+++*[»] 
|2020.03.18|//Lastline//|![[Why Monitoring East-West Traffic is Crucial for Cloud Security|https://www.lastline.com/blog/why-monitoring-east-west-traffic-is-crucial-for-cloud-security/]]|Strategy Monitoring|
=== 
* Attaques : nouvelles attaques conre O365+++*[»]>
|2020.03.20|Solutions Numériques[>img[iCSF/flag_fr.png]]|[[Nouveau vecteur d'attaque : Office 365 ciblé par des applications Azure malveillantes|https://www.solutions-numeriques.com/nouveau-vecteur-dattaque-office-365-cible-par-des-applications-azure-malveillantes/]]|O365 Attacks|
===, et Docker+++*[»]>
|2020.03.17|H4CKarandas|[[Hacking Docker Remotely|https://hackarandas.com/blog/2020/03/17/hacking-docker-remotely/]]|Docker |
=== 
* Fuites de données : aux Etats-Unis+++*[»]>
|2020.03.20|CyberNews|[[Report: unidentified database exposes 200 million Americans|https://cybernews.com/security/report-unidentified-database-exposes-200-million-americans/]]|Data_Leak|
|2020.03.20|Dark Reading| → [[200M Records of US Citizens Leaked in Unprotected Database|https://www.darkreading.com/cloud/200m-records-of-us-citizens-leaked-in-unprotected-database/d/d-id/1337377]]|Data_Leak|
|2020.03.20|Forbes| → [[Beware - This Open Database On Google Cloud 'Exposes 200 Million Americans': Are You At Risk?|https://www.forbes.com/sites/zakdoffman/2020/03/20/stunning-new-google-cloud-breach-hits-200-million-us-citizens-check-here-if-youre-now-at-risk/]]|Data_Leak|
===, au Royaume-Uni (2 cas)+++*[»]>
|2020.03.20|//vpnMentor//|[[Report: British Printing Press Leaks Confidential Material & More|https://www.vpnmentor.com/blog/report-doxzoo-leak/]]|Data_Leak AWS|
|2020.03.20|Security Week| → [[UK Printing Company Exposed Military Documents|https://www.securityweek.com/uk-printing-company-exposed-military-documents]]|Data_Leak AWS|
|>|>|>||
|2020.03.19|//Service Discovery//|[[A UK-based Security Company Seemed To Have Inadvertently Exposed Its 'Leaks Database' with 5B+ Records|https://securitydiscovery.com/data-breach-database-data-breach/]]|Data_Leak ElasticSearch Keepnet_Labs|
|2020.03.21|Security Week| → [[Unprotected Database Exposed 5 Billion Previously Leaked Records|https://www.securityweek.com/unprotected-database-exposed-5-billion-previously-leaked-records]]|Data_Leak ElasticSearch Keepnet_Labs|
===, et ailleurs+++*[»]>
|2020.03.17|//vpnMentor//|[[Report: Two Corporate Finance Companies Leak Half a Million Legal and Financial Documents Online|https://www.vpnmentor.com/blog/report-mca-wizard-leak/]]|Data_Leak|
|2020.03.17|Security Week| → [[Financial Services Firms Exposed 500,000 Sensitive Documents|https://www.securityweek.com/financial-services-firms-exposed-500000-sensitive-documents]]|Data_Leak AWS_S3|
|2020.03.17|Dark Reading| → [[500,000 Documents Exposed in Open S3 Bucket Incident|https://www.darkreading.com/cloud/500000-documents-exposed-in-open-s3-bucket-incident/d/d-id/1337343]]|Data_Leak AWS_S3|
=== 
* Vulnérabilité corrigée : sur Azure (il y a 8 mois)+++*[»]>
|2020.03.18|//CyberArk//|[[I Know What Azure Did Last Summer|https://www.cyberark.com/threat-research-blog/i-know-what-azure-did-last-summer/]]|Azure Portal Vulnerability|
|2020.03.18|//Threatpost//| → [[Azure Red Flag: Microsoft Accidentally Fixes Cloud Config 'Bug'|https://threatpost.com/azure-red-flag-microsoft-fixes-cloud-config-bug/153928/]]|Azure Portal Vulnerability|
=== 
* Outils : MSOLSpray+++*[»]>
|2020.03.16|Beau Bullock|[[MSOLSpray: a password spraying tool for Microsoft Online accounts (Azure/O365)|https://github.com/dafthack/MSOLSpray]]|[[Tools|Outils-GitHub]] Aeure O365|
===, bibliothèque d'alertes Sentinel et capagnes de recherches basées sur Sysmon et ATT&CK+++*[»]>
|2020.03.19|Hakin9|[[Repository of sentinel alerts and hunting queries leveraging sysmon and the MITRE ATT&CK framework|https://hakin9.org/repository-of-sentinel-alerts-and-hunting-queries-leveraging-sysmon-and-the-mitre-attck-framework/]]|Sentinel ATT&CK|
||GitHub| → [[Sentinel Attack|https://github.com/BlueTeamLabs/sentinel-attack/wiki/Deploying-sentinel-ATT&CK-analytics]]|[[Tools|Outils-GitHub]] Sentinel ATT&CK|
=== 
* Divers : Garantie de service et engagement de résilience de prestataires de services Cloud+++*[»]>
|2020.03.21|//Microsoft Azure//|[[Our commitment to customers and Microsoft cloud services continuity|https://azure.microsoft.com/en-us/blog/our-commitment-to-customers-and-microsoft-cloud-services-continuity/]] (1/3)|Azure Resilience|
|2020.03.19|Silicon.fr[>img[iCSF/flag_fr.png]]|[[Office 365 : Microsoft active des leviers de résilience|https://www.silicon.fr/office-365-microsoft-resilience-336497.html]]|COVID-19 O365|
|2020.03.18|Bleeping Computer|[[Microsoft Scales Back Office 365 Features to Handle High Loads|https://www.bleepingcomputer.com/news/microsoft/microsoft-scales-back-office-365-features-to-handle-high-loads/]]|O365|
|2020.03.16|Silicon.fr[>img[iCSF/flag_fr.png]]|[[Coronavirus : quelles garanties chez les fournisseurs de Cloud ?|https://www.silicon.fr/coronavirus-fournisseurs-cloud-336217.html]]|Resilience|
=== 

|ssTabl96|k
|!⇒ [[CloudSecurityAlliance.fr/go/K3M/|https://CloudSecurityAlliance.fr/go/K3M/]] |
!Weekly Cloud and Security Watch Newsletter - March 16th to 22nd
!!CSA News and Updates
* The French Chapter workspace is now available on the CSA 'Circle' portal+++*[»]> <<tiddler [[2020.03.19 - Ouverture de la plateforme collaborative CSA Circle]]>>=== 
* Blog : Continuous Auditing and Continuous Certification+++*[»]> <<tiddler [[2020.03.20 - Blog : Continuous Auditing and Continuous Certification]]>>=== 
* Registration opens for the SECtember conference+++*[»]> <<tiddler [[2020.03.16 - Ouverture des inscriptions pour la conférence SECtember]]>>=== 
* Webinar: 'Top 5 Latest Cloud Security Hacks and How You Can Avoid Them'+++*[»]> <<tiddler [[2020.03.17 - Webinar : 'Top 5 Latest Cloud Security Hacks and How You Can Avoid Them']]>>=== 
!!Cloud and Security News Watch
[[Over 60 links|2020.03.22 - Veille Hebdomadaire - 22 mars]] among which:
* Top 10 security items to improve in your AWS account+++*[»]> 
|2020.03.20|//AWS//|![[Top 10 security items to improve in your AWS account|https://aws.amazon.com/blogs/security/top-10-security-items-to-improve-in-your-aws-account/]]|AWS Best_Practices|
=== 
* Reports: Firemon+++*[»]> 
|2020.03.18|The Last Watchdog|[[FireMon survey shows security lags behind fast pace of hybrid cloud deployments|https://www.lastwatchdog.com/shared-intel-firemon-survey-shows-security-lags-behind-fast-pace-of-hybrid-cloud-deployments/]]|Survey Firemon|
=== 
* Monitoring: East-West Traffic Crucial for Cloud Security
* Attacks: O365 as a target, Hacking Docker remotely
* Data leaks: 200M Records of US Citizens, UK Printing Press and UK Printing Company, Financial documents exposed in open S3 bucket
* Tools: MSOLSpray for password spraying, Repository of Sentinel alerts and hunting queries leveraging Sysmon and the MITRE ATT&CK framework
* Miscellaneous: CSPs commitment to customers and services continuity

|ssTabl96|k
|!⇒ [[CloudSecurityAlliance.fr/go/K3M/|https://CloudSecurityAlliance.fr/go/K3M/]] |
|!Mars|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2020.03.22|
|2020.03.22|Cloud Security podcast|[[HASHICORP, Working Remotely, Incident Response, AWS Cloud Native - Will Bengston|https://anchor.fm/cloudsecuritypodcast/episodes/HASHICORP--Working-Remotely--Incident-Response--AWS-Cloud-Native---Will-Bengston-ebpa0f]]|Podcast|
|>|>|>|!2020.03.21|
|2020.03.21|//Microsoft Azure//|[[Our commitment to customers and Microsoft cloud services continuity|https://azure.microsoft.com/en-us/blog/our-commitment-to-customers-and-microsoft-cloud-services-continuity/]] (1/3)|Azure Resilience|
|2020.03.21|//Delta Risk//|[[Microsoft Defender ATP and ActiveEye Integration Makes it Easier to Detect Threats|https://deltarisk.com/blog/microsoft-defender-atp-and-activeeye-integration-makes-it-easier-to-detect-threats/]]|Detection|
|>|>|>|!2020.03.20|
|2020.03.20|Solutions Numériques[>img[iCSF/flag_fr.png]]|[[Nouveau vecteur d'attaque : Office 365 ciblé par des applications Azure malveillantes|https://www.solutions-numeriques.com/nouveau-vecteur-dattaque-office-365-cible-par-des-applications-azure-malveillantes/]]|O365 Attacks|
|2020.03.20|CyberNews|[[Report: unidentified database exposes 200 million Americans|https://cybernews.com/security/report-unidentified-database-exposes-200-million-americans/]]|Data_Leak|
|2020.03.20|Dark Reading| → [[200M Records of US Citizens Leaked in Unprotected Database|https://www.darkreading.com/cloud/200m-records-of-us-citizens-leaked-in-unprotected-database/d/d-id/1337377]]|Data_Leak|
|2020.03.20|Forbes| → [[Beware - This Open Database On Google Cloud 'Exposes 200 Million Americans': Are You At Risk?|https://www.forbes.com/sites/zakdoffman/2020/03/20/stunning-new-google-cloud-breach-hits-200-million-us-citizens-check-here-if-youre-now-at-risk/]]|Data_Leak|
|2020.03.24|CISO Mag| → [[Unidentified Database Exposes 800 GB of Americans' Personal Records|https://www.cisomag.com/unidentified-database-exposes-800-gb-of-americans-personal-records/]]|Data_Leak|
|2020.03.20|Cyber Defense Magazine|[[Conquering the Cyber Security Challenges of The Cloud|http://www.cyberdefensemagazinebackup.com/conquering-the-cyber-security-challenges-of-the-cloud/]]|Challenges|
|2020.03.20|IT Web|[[Hasty cloud adoption increases companies' risk profile|https://www.itweb.co.za/content/KzQenqjVd8lqZd2r]]|Risks|
|2020.03.20|//vpnMentor//|[[Report: British Printing Press Leaks Confidential Material & More|https://www.vpnmentor.com/blog/report-doxzoo-leak/]]|Data_Leak AWS|
|2020.03.20|Security Week| → [[UK Printing Company Exposed Military Documents|https://www.securityweek.com/uk-printing-company-exposed-military-documents]]|Data_Leak AWS|
|2020.03.20|SC Magazine| → [[UK printer's S3 Bucket exposes military documents, AWS issues patch|https://www.scmagazineuk.com/uk-printers-s3-bucket-exposes-military-documents-aws-issues-patch/article/1677806]]|Data_Leak AWS|
|2020.03.20|//NakedSecurity//|[[Exchange rate service's customer details hacked via AWS|https://nakedsecurity.sophos.com/2020/03/20/exchange-rate-services-customer-details-hacked-via-aws/]]|Data_Leak AWS|
|2020.03.20|//Cloud Academy//|[[The 12 AWS Certifications: Which is Right for You and Your Team?|https://cloudacademy.com/blog/choosing-the-right-aws-certification/]]|Training|
|2020.03.20|//Hunton//|[[Irish DPA Issues Guidance to Secure Cloud-Based Environments|https://www.huntonprivacyblog.com/2020/03/20/irish-dpa-issues-guidance-to-secure-cloud-based-environments/]]|Privacy Guidance Ireland|
|2020.03.20|//Palo Alto Networks//|[[The Best Method to Secure the Cloud Starts Offline|https://blog.paloaltonetworks.com/2020/03/cloud-secure-the-cloud/]]|Misc|
|2020.03.20|//ProtonMail//|[[Using Zoom? Here are the privacy issues you need to be aware of|https://protonmail.com/blog/zoom-privacy-issues/]]|Zoom Privacy|
|2020.03.20|//AWS//|![[Top 10 security items to improve in your AWS account|https://aws.amazon.com/blogs/security/top-10-security-items-to-improve-in-your-aws-account/]]|AWS Best_Practices|
|>|>|>|!2020.03.19|
|2020.03.19|Silicon.fr[>img[iCSF/flag_fr.png]]|[[Office 365 : Microsoft active des leviers de résilience|https://www.silicon.fr/office-365-microsoft-resilience-336497.html]]|COVID-19 O365|
|2020.03.19|The Register|[[NASA to launch 247 petabytes of data into AWS - but forgot about eye-watering cloudy egress costs before lift-off|https://www.theregister.co.uk/2020/03/19/nasa_cloud_data_migration_mess/]]|Misc|
|2020.03.19|Cyber Defense Magazine|[[Create Remote User Deployments and Security Nearly Instantly with Secure Desktop as a Service (DaaS)|https://www.cyberdefensemagazine.com/create-remote-user-deployments-and-security-nearly-instantly-with-secure-desktop-as-a-service-daas/]]|DaaS|
|2020.03.19|Hakin9|[[Repository of sentinel alerts and hunting queries leveraging sysmon and the MITRE ATT&CK framework|https://hakin9.org/repository-of-sentinel-alerts-and-hunting-queries-leveraging-sysmon-and-the-mitre-attck-framework/]]|Sentinel ATT&CK|
||GitHub| → [[Sentinel Attack|https://github.com/BlueTeamLabs/sentinel-attack/wiki/Deploying-sentinel-ATT&CK-analytics]]|[[Tools|Outils-GitHub]] Sentinel ATT&CK|
|2020.03.19|//Microsoft Azure//|[[Microsoft Teams at 3: Everything you need to connect with your teammates and be more productive |https://www.microsoft.com/en-us/microsoft-365/blog/2020/03/19/microsoft-teams-3-everything-you-need-connect-teammates-be-more-productive/]]|COVID-19 Teams|
|2020.03.19|GeekWire| → [[Microsoft Teams hits 44M daily active users, spiking 37% in one week amid remote work surge|https://www.geekwire.com/2020/microsoft-teams-hits-44m-users-huge-37-growth-spike-1-week-amid-remote-work-surge/]]|COVID-19 Teams|
|2020.03.19|//Service Discovery//|[[A UK-based Security Company Seemed To Have Inadvertently Exposed Its 'Leaks Database' with 5B+ Records|https://securitydiscovery.com/data-breach-database-data-breach/]]|Data_Leak ElasticSearch Keepnet_Labs|
|2020.03.21|Security Week| → [[Unprotected Database Exposed 5 Billion Previously Leaked Records|https://www.securityweek.com/unprotected-database-exposed-5-billion-previously-leaked-records]]|Data_Leak ElasticSearch Keepnet_Labs|
|2020.03.19|//Threatpost//|[[Cloud Misconfig Mistakes Show Need For DevSecOps|https://threatpost.com/cloud-misconfig-devsecops/153921/]]|Misconfigurations DevSecOps|
|2020.03.19|//Fugue//|[[Cloud Security for Newly Distributed Engineering Teams|https://www.fugue.co/blog/cloud-security-for-newly-distributed-engineering-teams]]|Best_Practices Remote_Security|
|2020.03.19|//Palo Alto Networks//|[[Do MSSPs Have What it Takes to Win Today's Cybersecurity War?|https://blog.paloaltonetworks.com/2020/03/network-mssps/]]|MSSPs|
|2020.03.19|//Caylent//|![[50+ Useful Kubernetes Tools List - Part 2|https://caylent.com/50-useful-kubernetes-tools-list-part-2]]|Kubernetes Tools|
|>|>|>|!2020.03.18|
|2020.03.18|Bleeping Computer|![[Microsoft Scales Back Office 365 Features to Handle High Loads|https://www.bleepingcomputer.com/news/microsoft/microsoft-scales-back-office-365-features-to-handle-high-loads/]]|O365|
|2020.03.18|Solutions Review|[[Flexera: 68 Percent of CIOs Worry About Vendor Lock-In with Public Cloud|https://solutionsreview.com/cloud-platforms/flexera-68-percent-of-cios-worry-about-vendor-lock-in-with-public-cloud/]] ([[rapport|https://info.flexera.com/SLO-REPORT-CIO-Priorities-2020]])|Survey|
|2020.03.18|The Last Watchdog|[[FireMon survey shows security lags behind fast pace of hybrid cloud deployments|https://www.lastwatchdog.com/shared-intel-firemon-survey-shows-security-lags-behind-fast-pace-of-hybrid-cloud-deployments/]]|Survey Firemon|
|2020.03.18|//Varonis//|![[Using Malicious Azure Apps to Infiltrate a Microsoft 365 Tenant|https://www.varonis.com/blog/using-malicious-azure-apps-to-infiltrate-a-microsoft-365-tenant/]]|Azure Attacks|
|2020.03.18|//Lastline//|![[Why Monitoring East-West Traffic is Crucial for Cloud Security|https://www.lastline.com/blog/why-monitoring-east-west-traffic-is-crucial-for-cloud-security/]]|Strategy Monitoring|
|2020.03.18|//CyberArk//|[[I Know What Azure Did Last Summer|https://www.cyberark.com/threat-research-blog/i-know-what-azure-did-last-summer/]]|Azure Portal Vulnerability|
|2020.03.18|//Threatpost//| → [[Azure Red Flag: Microsoft Accidentally Fixes Cloud Config 'Bug'|https://threatpost.com/azure-red-flag-microsoft-fixes-cloud-config-bug/153928/]]|Azure Portal Vulnerability|
|2020.03.18|//Forcepoint//|[[SaaS Security: Prioritizing Security During a Time of Social Distancing|https://www.forcepoint.com/blog/insights/prioritizing-saas-security-during-social-distancing]]|SaaS|
|2020.03.18|//Tuffin//[>img[iCSF/flag_fr.png]]|[[Sécuriser les environnements de cloud hybrides : un impératif stratégique|https://www.globalsecuritymag.fr/Securiser-les-environnements-de,20200319,96798.html]]|Hybrid_Cloud|
|2020.03.18|//Cloud Management Insider//|[[CSA Invites Professionals To Review Cloud Control Matrix v4|https://www.cloudmanagementinsider.com/csa-invites-professionals-to-review-cloud-control-matrix-v4/]]|CSA|
|2020.03.18|//Kinvolk//|[[Writing Kubernetes network policies with Inspektor Gadget's Network Policy Advisor|https://kinvolk.io/blog/2020/03/writing-kubernetes-network-policies-with-inspektor-gadgets-network-policy-advisor/]]|Kubernetes Network_Policy|
|2020.03.18|//NetSPI//|[[Gaining AWS Console Access via API Keys|https://blog.netspi.com/gaining-aws-console-access-via-api-keys/]]|AWS APIs|
|>|>|>|!2020.03.17|
|2020.03.17|H4CKarandas|[[Hacking Docker Remotely|https://hackarandas.com/blog/2020/03/17/hacking-docker-remotely/]]|Docker|
|2020.03.17|Lawfare|[[Better to Be Realistic About the Security Opportunities of Cloud Computing|https://www.lawfareblog.com/better-be-realistic-about-security-opportunities-cloud-computing]]|Cyberspace_Solarium|
|2020.03.17|DZone|[[Set Up An Amazon Elasticsearch Service Domain Using A VPC With VPN|https://dzone.com/articles/set-up-an-amazon-elasticsearch-service-domain-usin]]|Misc|
|2020.03.17|Security Boulevard|[[Why Traditional Security Is Failing Us|https://securityboulevard.com/2020/03/why-traditional-security-is-failing-us/]] (1/2)|Treats|
|2020.03.17|Tal Maor|[[Moving laterally between Azure AD joined machines|https://medium.com/@talthemaor/moving-laterally-between-azure-ad-joined-machines-ed1f8871da56]]|AzureAD Attacks|
|2020.03.17|//Security Intelligence//|[[Grow Your Business With an Evolving Cloud Security Strategy|https://securityintelligence.com/posts/grow-your-business-with-an-evolving-cloud-security-strategy/]]|Strategy|
|2020.03.17|//vpnMentor//|[[Report: Two Corporate Finance Companies Leak Half a Million Legal and Financial Documents Online|https://www.vpnmentor.com/blog/report-mca-wizard-leak/]]|Data_Leak|
|2020.03.17|Security Week| → [[Financial Services Firms Exposed 500,000 Sensitive Documents|https://www.securityweek.com/financial-services-firms-exposed-500000-sensitive-documents]]|Data_Leak AWS_S3|
|2020.03.17|Dark Reading| → [[500,000 Documents Exposed in Open S3 Bucket Incident|https://www.darkreading.com/cloud/500000-documents-exposed-in-open-s3-bucket-incident/d/d-id/1337343]]|Data_Leak AWS_S3|
|2020.03.17|SC Magazine|[[Secure Access Service Edge (SASE) - key points for early adopters|https://www.scmagazine.com/home/opinion/secure-access-service-edge-sase-key-points-for-early-adopters/]]|SASE|
|2020.03.17|//Cloudnaut//|[[Advanced AWS Networking: Pitfalls That You Should Avoid|https://cloudonaut.io/advanved-aws-networking-pitfalls-that-you-should-avoid/]]|AWS Networking|
|2020.03.17|//Forcepoint//|[[SASE: What is its impact today, and where do we go from here?|https://www.forcepoint.com/blog/insights/forcepoint-converged-security-gartner-sase-impact]]|SASE|
|2020.03.17|//UpGuard//|[[What is Zero Trust? A Model for More Effective Security|[https://www.upguard.com/blog/zero-trust]]|Zero_Trust|
|2020.03.17|//OVHcloud//|[[Managing Harbor at cloud scale : The story behind Harbor Kubernetes Operator|https://www.ovh.com/blog/managing-harbor-at-cloud-scale-the-story-behind-harbor-kubernetes-operator/]]|Kubernetes Harbor_Project|
|2020.03.17|//Rancher//|[[Enhancing Kubernetes Security with Pod Security Policies, Part 2|https://rancher.com/blog/2020/pod-security-policies-part-2/]] (2/2)|Kubernetes|
|2020.03.17|//Barracuda Networks//[>img[iCSF/flag_fr.png]]|[[Les entreprises sont responsables de leur protection Cloud|https://www.globalsecuritymag.fr/Les-entreprises-sont-responsables,20200317,96734.html]]|Governance|
|2020.03.17|//Quest//[>img[iCSF/flag_fr.png]]|[[Sauvegardes dans le cloud : Mimikatz vient en aide aux cybercriminels|https://www.globalsecuritymag.fr/Sauvegardes-dans-le-cloud-Mimikatz,20200309,96463.html]]|Risks Backups|
|>|>|>|!2020.03.16|
|2020.03.16|Silicon.fr[>img[iCSF/flag_fr.png]]|[[Coronavirus : quelles garanties chez les fournisseurs de Cloud ?|https://www.silicon.fr/coronavirus-fournisseurs-cloud-336217.html]]|Resilience|
|2020.03.16|TechBeacon|[[How a zero-trust approach can protect your cloud resources|https://techbeacon.com/security/how-zero-trust-approach-can-protect-your-cloud-resources]]|Zero_Trust|
|2020.03.16|Beau Bullock|[[MSOLSpray: a password spraying tool for Microsoft Online accounts (Azure/O365)|https://github.com/dafthack/MSOLSpray]]|[[Tools|Outils-GitHub]] Aeure O365|
|2020.03.16|//Microsoft Azure//|[[Azure Container Registry: Preview of customer-managed keys|https://azure.microsoft.com/en-us/blog/azure-container-registry-preview-of-customer-managed-keys/]]|Azure Containers Registry|
|2020.03.16|//FNTS//|[[How to leverage DRaaA to avoid costly outages|https://info.fnts.com/blog/how-to-leverage-draas-to-avoid-costly-outages]]|DRaaS|
|2020.03.16|//Aqua Security//|[[Trivy Vulnerability Scanner from Aqua Security Adopted by Leading Cloud Native Platforms|https://www.prnewswire.com/news-releases/trivy-vulnerability-scanner-from-aqua-security-adopted-by-leading-cloud-native-platforms-301022747.html]]|Containers Registry|
|2020.03.17|Slicon Angle|[[Aqua Security debuts open-source container image registry scanner|https://siliconangle.com/2020/03/17/aqua-security-debuts-open-source-container-image-registry-scanner/]]|Containers Registry|
|2020.03.16|//Commvault//[>img[iCSF/flag_fr.png]]|[[Gérer la complexité pour exploiter tout le potentiel de la reprise après sinistre multi-cloud|https://www.globalsecuritymag.fr/Gerer-la-complexite-pour-exploiter,20200311,96561.html]]|DRaaS|
!"//Continuous Auditing and Continuous Certification//"
[>img(150px,auto)[iCSA/K3KBC.jpg]]Article de blog publié le 20 mars 2020 — Rédigé par Alain Pannetrat, Senior Researcher CSA et fondateur de Omzlo.com
<<<
//For some cloud customers in sensitive or highly-regulated industries, such as banking or healthcare, "traditional" annual or bi-annual audits do not provide enough assurance to move to the cloud. To address the concerns of this segment of the industry, the Cloud Security Alliance is building STAR Continuous: an innovative framework designed to provide assurance to customers on a monthly, daily or even hourly basis.
The foundation of STAR Continuous is continuous auditing: the continuous evaluation of certain characteristics of an information system, mostly by automated means, in order to get near real-time assurance. Continuous audits can be used as a basis for a novel type of certification (or attestation) as well as for self-assessments. In many ways, the industry is already doing continuous auditing. Yet cloud customers cannot fully take advantage of it, due to lack of relevant standards and best practices.
Read on to learn more about the genesis and purpose of STAR Continuous.
!When a certification or an attestation is not good enough
[>img(320px,auto)[iCSA/K3KBC.png]]Certification and attestation schemes such as those offered by the CSA Open Certification Framework (OCF), ISO/IEC, or AICPA, have strongly contributed to the success of the cloud by providing many cloud customers the necessary assurance that the cloud service they are using meet relevant security requirements. These schemes rely on annual or biannual audits conducted by trusted independent auditors. However, for some cloud customers in sensitive or highly-regulated industries, such as banking or healthcare, the time elapsed between annual or bi-annual third-party audits is perceived as a "blind spot": a much more frequent level of scrutiny is required.
Over the years, CSA has participated in several research initiatives with industry, public bodies and academia in order to develop new certification tools providing a more continuous level of assurance. Recently, as part of the European Commission-funded project EU-SEC+++*[»]> https://www.sec-cert.eu/ ===, CSA participated in a pilot for the continuous certification of a cloud service for a major Spanish financial institution (LaCaixa) and successfully demonstrated the feasibility of providing continuous assurance to demanding cloud customers.
The continuous certification scheme CSA has developed extends a "traditional" certification scheme with a continuous process of automated checks. The whole process can be summarised in two consecutive phases: an initialisation phase and a continuous audit phase.

__''Initialisation phase:''__
The CSP undergoes a traditional third-party audit in order to obtain a certification or attestation. In addition, the CSP defines:
* A continuous certification target which comprises a set of security objectives, each associated with a policy that defines the assessment frequency (e.g. check every 4 hours).
* A set of tools capable of verifying that the security objectives are fulfilled..
The third party auditor involved in the certification checks:
* That the defined continuous certification target covers a satisfactory scope of the certified information system.
* That the reporting tools are trustworthy and fit-for-purpose.
* If this process is successful the continuous certification target is transmitted to the certification authority (i.e. CSA), which creates a corresponding entry for the cloud service in a dedicated public registry of continuously certified cloud services.

__''Continuous audit phase:''__
The third-party auditor periodically performs checks to confirm that the assessment tools are trustworthy (e.g. integrity checks).
The assessment tools continuously reports back to the certification authority (i.e. CSA) through a dedicated API the results of the assessment of each defined security objective, according to the frequency defined in policies within the continuous certification target:
* If a CSP reports in due time that all security objectives are met, the cloud service is marked as "compliant" in the corresponding entry in the public registry.
* If a CSP reports non-compliances or if the CSP fails to report about security objectives in due time, the entry will ultimately be removed from the public registry if the situation is not resolved with a predefined period of time.
It's important to note that the public registry (STAR) will not provide details of non-compliances in order not to potentially compromise the security cloud services under scrutiny.
CSA's research has highlighted that one of the biggest challenge in the process outlined above is the definition of the continuous certification target, and in particular the set security objectives that are used to assess an information system.
Let's see why.
!!Security Level Objectives and Security Qualitative Objectives
Traditional certification typically relies on control frameworks such as the CSA Cloud Control Matrix or ISO/IEC 27002. These frameworks contain high-level control objectives that are interpreted by humans and translated into applicable technical or organisational security controls. This process is slow and complex and cannot be conducted on a daily or hourly basis. On the other hand, at least some of the applicable technical or organisational security controls can be evaluated automatically and frequently, if we are able to express them as quantifiable or qualifiable attributes of an information system, associated to metrics and expected results.
Thinking in terms of quantifiable or qualifiable attributes, metrics and expected results is, in fact, a familiar concept in the cloud, as embodied through Service Level Agreements (SLA), where cloud providers express expected results usually related to performance attributes of a cloud service, along with the metrics used to assess them. What has been done for performance in SLAs can also be done for security and the standardisation community has been working to build Security Level Agreements for cloud computing through the development of ISO/IEC 19086+++*[»]> https://www.iso.org/standard/67545.html ===.

The continuous certification scheme CSA has developed uses ISO/IEC 19086 as a foundation, using its well-defined terminology and conceptual model. The standard notably defines 3 important concepts:
* Metric: a standard of measurement that defines the conditions and the rules for performing the measurement and for understanding the results of a measurement.
* Cloud service level objective (SLO): commitment a cloud service provider (ISO/IEC 17788:2014, 3.2.15) makes for a specific, quantitative characteristic of a cloud service (ISO/IEC 17788:2014, 3.2.8), where the value follows the interval scale or ratio scale.
* Cloud service qualitative objective (SQO): commitment a cloud service provider (ISO/IEC 17788:2014, 3.2.15) makes for a specific, qualitative characteristic of a cloud service (ISO/IEC 17788:2014, 3.2.8), where the value follows the nominal scale or ordinal scale.
Consider for example, as a control objective, the need to define and regularly test business continuity plans. At a high level, such a control objective is difficult to quantify or measure explicitly, with a corresponding expected result. At a lower level however, we can identify many useful technical attributes of an information system that can be used to highlight the strength of business continuity plans. For instance, the number of successful backup restoration simulated per month/week, the recovery point actual, or data durability. Each one of these attributes can be tested and measured according to a metric, and corresponding objectives can be set. Moreover, these attributes can be tested automatically and regularly.
It turns out that this work of translating high-level control objectives into SLOs and SQOs is hard, due to the absence of existing guidance in the field. Just like we did for traditional certification through the creation of control frameworks, we now need to create standards for security attributes, metrics, SLOs and SQOs in order to enable the practical deployment of continuous audit-based certification.
!!It's also a tool for self-assessment
The usefulness of a continuous auditing framework is clearly not limited to third-party certification for customers in sensitive industries. In fact, such a framework could be just as important and useful for organisations wishing to perform a continuous assessment of their cloud assets.
Again this will only reach its true potential if there is a standard set of security attributes, metrics, SLOs and SQOs that the industry adopts as a reference for continuous auditing, giving practitioners a meaningful reference to assess and relate the security of competing cloud services.
With the right platform, we can well imagine a continuous audit-based self-assessment that mirrors what the CSA CAIQ is doing today as a point-in-time assurance tool.
!!Continuous is already there
One major IaaS provider recently joked with us that there is never a day in the year where there is not at least one external auditor setting a foot in their data centres.
In order to do business today, cloud providers are obliged to be compliant with dozens of compliance schemes, both international and regional, or sector specific, such as ISO 27001, AICPA SOC, CSA STAR, PCI DSS, FedRamp, FISMA, HIPAA, or BSI C5 just to name a few. There is a lot of overlap in security requirements between these various assurance schemes. As a result, cloud service providers are under "continuous" scrutiny.
Moreover, as a natural part of information security management, most cloud providers and customers are using security tools that continuously assess the security of their information systems. Cloud security tool vendors have developed a rich set of data points and assessment mechanisms to address industry requirements. In many ways, what we call SQOs, SLOs and metrics, already exist, albeit under different names.
Unfortunately many of these efforts remain invisible to cloud customers, due to the lack of supporting standards and best practices.
!!What Cloud Security Alliance is doing
By creating STAR Continuous, the Cloud Security Alliance aims to build the next generation of certification and self-assessment tools, based on a continuous auditing.
In this process, we established the following goals:
* Capitalise on existing standards, such as ISO/IEC 19086, avoid reinventing the wheel.
* Be technological neutral: continuous auditing tools should be freely selectable by the industry, as long as they can demonstrate that they are trustworthy and fit-for-purpose.
* Strike a balance between transparency and security, while providing continuous assurance to all cloud customers.
* Complement but not replace traditional certification.

In the context of this effort, the Cloud Security Alliance is launching a new initiative dedicated to the definition of security attributes and metrics associated with the control objectives defined within our Cloud Control Matrix (CCM), the CSA Continuous Audit Metrics Working Group.
We are now seeking the help of cloud customers, cloud providers, security tool vendors, auditors and all relevant experts in order to define the very first industry-wide catalogue of security attributes and metrics for continuous auditing.//
[...]
<<<
__Lien :__
* blog original en anglais &Arr; ''[[CloudSecurityAlliance.fr/go/k3kb/|https://CloudSecurityAlliance.fr/go/k3kb/]]''
!"//Circle : la plateforme collaborative de la CSA//"
[>img[iCSA/CircleCSA.png]]Après une phase de test, la plateforme collaborative [[CSA Circle]] est maintenant ouverte à tous.
Si vous vous intéressez au ''Cloud Computing et à la sécurité'', et si vous souhaitez rejoindre une communauté de personnes avec le même centre d'intérêt que vous, ... la plateforme [[Circle|CSA Circle]] est faite pour vous.

Vous y retrouverez :
* les annonces de notre [[Chapitre Français|CSA-FR]]
* les points d'entrée vers tous les [[Groupes de Travail]] de la [[Cloud Security Alliance]]
* la possibilité de recevoir toutes les informations dès leur parution ou sous la forme d'un email quotidien
* une communauté de partage ''Cloud Computing et sécurité''

Cette plateforme [[Circle|CSA Circle]] a également pour objectif de remplacer :
* les groupes [[LinkedIN]], utilisés depuis la création de la CSA il y a plus de 10 ans
* la plateforme ''Basecamp'', utilisée par de nombreux groupes de travail pour le partage de document
* les autres plateformes de partage comme ''GoogleDocs'' ou autre
|!Le conseil du jour : ''inscrivez-vous sur [[Circle|CSA Circle]]'' ⇒ ''[[CloudSecurityAlliance.fr/go/Circle/|https://CloudSecurityAlliance.fr/go/Circle/]]''|
[>img[iCSA/CircleCSA.png]]<<tiddler [[CSA Circle]]>>[img(40%,1px)[iCSF/BluePixel.gif]]
Lien vers [[CSA Circle]] ⇒ ''[[CloudSecurityAlliance.fr/go/Circle/|https://CloudSecurityAlliance.fr/go/Circle/]]''
[img(40%,1px)[iCSF/BluePixel.gif]]
!"//Top 5 Latest Cloud Security Hacks and How You Can Avoid Them//"
[>img(250px,auto)[iCSA/K3HWT.png]]Webinar [[CloudBytes]] diffusé le 17 mars 2020 — Présenté par Roger Grimes, Data-Driven Defense Evangelist, société KnowBe4
<<<
//Most people know that cloud security overall is often better than traditional on-premise security. However, that doesn't mean that cloud products can't be hacked or misconfigured even if you are using the best security practices. Social engineering is the number one threat to your cloud security that nobody is talking about, and your users are the last line of defense against these hacks!
Join Roger Grimes, KnowBe4's Data-Driven Defense Evangelist, as he breaks down the ways that bad actors can get around even the most up-to-date cloud security defenses and what you can do to keep your cloud safe. He'll discuss:
* Top 5 hacks the bad guys can use to get around your cloud security defenses
* How to defend your organization against these hacks
* The role that your users play in an effective defense strategy
* How to spot (and stop) these types of attacks before it's too late
Attend this webinar to learn about various cloud hacks and how they compromise security, and what you can do to help better defend against them!//
<<<
&Arr; S'inscrire au Webinar de 60 minutes [[sur le site de BrightTALK|https://CloudSecurityAlliance.fr/go/k3hw/]].
!"//Registration Now Open for SECtember, Cloud Security Alliance's Premier Event//"
[>img(300px,auto)[iCSA/202009US-SECtember.png]]Les inscriptions pour la conférence [[SECtember]] de la mi septembre 2020 sont maintenant ouvertes !
Les frais de participation dépendant de la date d'inscription :
* 995$, soit environ 900€, jusqu'au 28 mai 2020
* 1.195$, soit environ 1.080€, jusqu'au 4 septembre 2020
* 1.495$, soit environ 1.350€, ensuite.
<<<
//''Annual conference to provide global perspective on strategic cloud, cybersecurity issues''
SEATTLE - March 16, 2020 - The Cloud Security Alliance (CSA), the world's leading organization dedicated to defining standards, certifications and best practices to help ensure a secure cloud computing environment, announced today that registration has opened for [[SECtember]](Seattle, Sept. 14-18, 2020), the first global event dedicated to the intersection of cloud and cybersecurity.
This premier event will bring together thought leaders from five continents to provide a global perspective on strategic cloud and cybersecurity issues and deliver state-of-the-art educational activities.
Those interested in attending are encouraged to register now and take advantage of early registration pricing ($995) through May 29. Afterward, rates will increase to $1,195 through Sept. 4, at which time late registration pricing ($1,495) will go into effect through Sept. 18.
"[[SECtember]] promises to provide attendees with unparalleled learning opportunities thanks to the event's proximity to the headquarters of several large enterprise organizations and tech giants. As a result, [[SECtember]] will be able to feature in-depth trainings, networking opportunities and expert-led sessions from some of the brightest minds in the cloud and cybersecurity sector," said Jim Reavis, co-founder and CEO, Cloud Security Alliance.
The event will provide attendees with the chance to upskill their cloud security knowledge through an enhanced roster of training, including:
* Certificate of Cloud Security Knowledge (CCSK) Foundation (1-day course offered on both Sept. 14 and Sept. 15)
* Certificate of Cloud Auditing Knowledge (Sept. 15)
* Certificate of Cloud Security Knowledge - Plus - Azure (Sept. 14-15)
* Certificate of Cloud Security Knowledge - Plus - AWS (Sept. 14-15)
* Advanced Cloud Security Practitioner (Sept. 14-15)
[[SECtember]] will also feature numerous opportunities to access to Seattle's leading technology and cybersecurity companies. Organizations and governments seeking to send delegations to maximize the benefits of this unique conference will also benefit from various executive briefings that will be held over the course of the five-day event.//
[...]
<<<
__Lien :__
 ⇒ ''[[CloudSecurityAlliance.fr/go/k3gc/|https://CloudSecurityAlliance.fr/go/k3gc/]]
!!1 - Nouveautés CSA et Informations de la semaine du 9 au 15 mars 2020
* Remise sur les cours en ligne de la CSA jusqu'au 30 avril+++*[»]> <<tiddler [[2020.03.09 - Remise sur les cours en ligne de la CSA]]>>===  [>img(200px,auto)[iCSF/cloud-security-alliance-fr.png]]
* Sondage sur la technologie CASB d'ici au 20 avril+++*[»]> <<tiddler [[2020.03.09 - Sondage sur la technologie CASB]]>>=== 
* Sondage sur la sensibilisation à la cryptographie quantique d'ici au 27 avril+++*[»]> <<tiddler [[2020.03.09 - Sondage sur la sensibilisation à la cryptographie quantique]]>>=== 
* Publication : Gestion des risques pour les équipements médicaux connectés+++*[»]> <<tiddler [[2020.03.12 - Publication : Gestion des risques pour les équipements médicaux connectés]]>>=== 
* Webinar CloudBytes 'Top 5 Latest Cloud Security Hacks' le 17 mars+++*[»]> <<tiddler [[2020.03.17 - Webinar : 'Top 5 Latest Cloud Security Hacks and How You Can Avoid Them']]>>=== 
* Ouverture des inscriptions pour la conférence SECtember de septembre 2020+++*[»]> <<tiddler [[2020.03.16 - Ouverture des inscriptions pour la conférence SECtember]]>>=== 
!!2 - Veille Web Cloud et Sécurité
La [[Veille Web|2020.03.15 - Veille Hebdomadaire - 15 mars]] avec plus d'une soixantaine de liens dont :
* Références : mise à jour de recommandations de l'ACSC+++*[»]>
|2020.03.09|cyber.gov.au|[[Cloud Computing Security for Cloud Service Providers|https://www.cyber.gov.au/publications/cloud-computing-security-for-cloud-service-providers]] ([[PDF|https://www.cyber.gov.au/sites/default/files/2020-03/PROTECT%20-%20Cloud%20Computing%20Security%20for%20Cloud%20Service%20Providers%20%28March%202020%29.pdf]])|Guidelines|
|2020.03.09|cyber.gov.au|[[Cloud Computing Security for Tenants|https://www.cyber.gov.au/publications/cloud-computing-security-for-tenants]] ([[PDF|https://www.cyber.gov.au/sites/default/files/2020-03/PROTECT%20-%20Cloud%20Computing%20Security%20for%20Tenants%20%28March%202020%29.pdf]])|Guidelines|
=== 
* Etudes et rapports : A10 Networks+++*[»]>
|2020.03.13|//A10 Networks//|[[The State of DDoS Weapons|https://www.a10networks.com/marketing-comms/reports/state-ddos-weapons/]]|DDoS|
|2020.03.13|Dark Reading| → [[DDoS Attack Trends Reveal Stronger Shift to IoT, Mobile|https://www.darkreading.com/iot/ddos-attack-trends-reveal-stronger-shift-to-iot-mobile/d/d-id/1337318]]|Report|
===, Axonius+++*[»]>
|2020.03.10|//Axonius//|[[Combatting Complexity by Focusing on Fundamentals: New Study from Axonius and ESG Uncovers IT Megatrends Driving Decreased Asset Visibility, Increased Risk|http://www.prweb.com/releases/combatting_complexity_by_focusing_on_fundamentals_new_study_from_axonius_and_esg_uncovers_it_megatrends_driving_decreased_asset_visibility_increased_risk/prweb16968933.htm]] ([[téléchargement|https://info.axonius.com/2020-asset-management-trends-esg-ebook]])|Report Axonius|
|2020.03.10|Solutions Review| → [[Axonius: 69 Percent of Enterprises Have a Cloud Visibility Gap|https://solutionsreview.com/cloud-platforms/axonius-69-percent-of-enterprises-have-a-cloud-visibility-gap/]]|Report Axonius|
|2020.03.10|BetaNews| → [[IT teams struggle with asset visibility and management|https://betanews.com/2020/03/10/it-asset-management-struggle/]]|Report Axonius|
|2020.03.13|Help Net Security| → [[Cloud + BYOD + IoT = major security gaps|https://www.helpnetsecurity.com/2020/03/13/major-security-gaps/]]|Report Axonius|
===, Volterra+++*[»]>
|2020.03.09|//Volterra//|[[Infrastructure and Security Challenges Threaten Multi-Cloud and Edge Deployments, New Survey from Volterra Shows|https://www.volterra.io/company/news/infrastructure-security-challenges-threaten-multi-cloud-edge-deployments/]]|Report Volterra|
|2020.03.09|VMblog| → [[Infrastructure and Security Challenges Threaten Multi-Cloud and Edge Deployments, New Survey from Volterra Shows|https://vmblog.com/archive/2020/03/09/infrastructure-and-security-challenges-threaten-multi-cloud-and-edge-deployments-new-survey-from-volterra-shows.aspx]]|Report Volterra|
|2020.03.11|Help Net Security| → [[Multi-cloud and edge deployments threatened by security and connectivity problems|https://www.helpnetsecurity.com/2020/03/11/multi-cloud-deployments/]]|Report Volterra|
=== 
* Fuite de données : Open Exchange Rates+++*[»]>
|2020.03.12|//Open Exchange Rates//|[[Notice of Data Breach|https://pastebin.com/raw/AzDPAN9N]]  ([[email|https://twitter.com/SylvieLorxu/status/1238149687200358401]])|Data_Breach AWS Third_Party|
|2020.03.13|Security Week| → [[Currency Data Provider 'Open Exchange Rates' Discloses Breach|https://www.securityweek.com/currency-data-provider-open-exchange-rates-discloses-breach]]|Data_Breach AWS Third_Party|
=== 
* Divers : Backup dans le Cloud, Bottlerocket nouveau système d'exploitation AWS en open source+++*[»]>
|2020.03.10|//AWS//|[[Bottlerocket - Open Source OS for Container Hosting|https://aws.amazon.com/blogs/aws/bottlerocket-open-source-os-for-container-hosting/]]|AWS Operating_System|
|2020.03.11|CBR Online| → [[AWS's New Open Source OS "Bottlerocket": A Baby RHEL Competitor?|https://www.cbronline.com/news/aws-operating-system-bottlerocket]]|AWS Operating_System|
|2020.03.12|//Cloud Management Insider//| → [[AWS launches Open Source OS for Containers|https://www.cloudmanagementinsider.com/aws-launches-bottlerocket/]]|AWS Operating_System|
===, et toujours des articles sur l'analyse des risques dans le Cloud, la sécurité des containers, de Kubernetes, et le Zero-Trust
!3 - Weekly Cloud and Security Watch Newsletter[>img[iCSF/inEnglish.png]]
<<tiddler [[2020.03.15 - Weekly Newsletter - March 15th]]>>
!CSA News and Updates - March 9th to 15th
* Price Reduction for Online CSA Educational Programs until April 30^^th^^+++*[»]> <<tiddler [[2020.03.09 - Remise sur les cours en ligne de la CSA]]>>===  [>img(200px,auto)[iCSF/cloud-security-alliance-fr.png]]
* 'Expectations and Evolution of CASBs' CSA survey opens until March 30^^th^^+++*[»]> <<tiddler [[2020.03.09 - Sondage sur la technologie CASB]]>>=== 
* 'Quantum-Safe Solutions' CSA survey opens until March 30^^th^^+++*[»]> <<tiddler [[2020.03.09 - Sondage sur la sensibilisation à la cryptographie quantique]]>>=== 
* 'Managing the Risk for Medical Devices Connected to the Cloud" CSA publication+++*[»]> <<tiddler [[2020.03.12 - Publication : Gestion des risques pour les équipements médicaux connectés]]>>=== 
* The 'Top 5 Latest Cloud Security Hacks' CloudBytes webinar will teka place on March 17^^th^^+++*[»]> <<tiddler [[2020.03.17 - Webinar : 'Top 5 Latest Cloud Security Hacks and How You Can Avoid Them']]>>=== 
* Registration Now Open for SECtember 2020+++*[»]> <<tiddler [[2020.03.16 - Ouverture des inscriptions pour la conférence SECtember]] === 
!Cloud and Security News Watch
[[Over 60 links|2020.03.15 - Veille Hebdomadaire - 15 mars]] among which:
* References: updates of some ACSC guidelines+++*[»]>
|2020.03.09|cyber.gov.au|[[Cloud Computing Security for Cloud Service Providers|https://www.cyber.gov.au/publications/cloud-computing-security-for-cloud-service-providers]] ([[PDF|https://www.cyber.gov.au/sites/default/files/2020-03/PROTECT%20-%20Cloud%20Computing%20Security%20for%20Cloud%20Service%20Providers%20%28March%202020%29.pdf]])|Guidelines|
|2020.03.09|cyber.gov.au|[[Cloud Computing Security for Tenants|https://www.cyber.gov.au/publications/cloud-computing-security-for-tenants]] ([[PDF|https://www.cyber.gov.au/sites/default/files/2020-03/PROTECT%20-%20Cloud%20Computing%20Security%20for%20Tenants%20%28March%202020%29.pdf]])|Guidelines|
=== 
* Surveys and reports: A10 Networks+++*[»]>
|2020.03.13|//A10 Networks//|[[The State of DDoS Weapons|https://www.a10networks.com/marketing-comms/reports/state-ddos-weapons/]]|DDoS|
|2020.03.13|Dark Reading| → [[DDoS Attack Trends Reveal Stronger Shift to IoT, Mobile|https://www.darkreading.com/iot/ddos-attack-trends-reveal-stronger-shift-to-iot-mobile/d/d-id/1337318]]|Report|
===, Axonius+++*[»]>
|2020.03.10|//Axonius//|[[Combatting Complexity by Focusing on Fundamentals: New Study from Axonius and ESG Uncovers IT Megatrends Driving Decreased Asset Visibility, Increased Risk|http://www.prweb.com/releases/combatting_complexity_by_focusing_on_fundamentals_new_study_from_axonius_and_esg_uncovers_it_megatrends_driving_decreased_asset_visibility_increased_risk/prweb16968933.htm]] ([[téléchargement|https://info.axonius.com/2020-asset-management-trends-esg-ebook]])|Report Axonius|
|2020.03.10|Solutions Review| → [[Axonius: 69 Percent of Enterprises Have a Cloud Visibility Gap|https://solutionsreview.com/cloud-platforms/axonius-69-percent-of-enterprises-have-a-cloud-visibility-gap/]]|Report Axonius|
|2020.03.10|BetaNews| → [[IT teams struggle with asset visibility and management|https://betanews.com/2020/03/10/it-asset-management-struggle/]]|Report Axonius|
|2020.03.13|Help Net Security| → [[Cloud + BYOD + IoT = major security gaps|https://www.helpnetsecurity.com/2020/03/13/major-security-gaps/]]|Report Axonius|
===, Volterra+++*[»]>
|2020.03.09|//Volterra//|[[Infrastructure and Security Challenges Threaten Multi-Cloud and Edge Deployments, New Survey from Volterra Shows|https://www.volterra.io/company/news/infrastructure-security-challenges-threaten-multi-cloud-edge-deployments/]]|Report Volterra|
|2020.03.09|VMblog| → [[Infrastructure and Security Challenges Threaten Multi-Cloud and Edge Deployments, New Survey from Volterra Shows|https://vmblog.com/archive/2020/03/09/infrastructure-and-security-challenges-threaten-multi-cloud-and-edge-deployments-new-survey-from-volterra-shows.aspx]]|Report Volterra|
|2020.03.11|Help Net Security| → [[Multi-cloud and edge deployments threatened by security and connectivity problems|https://www.helpnetsecurity.com/2020/03/11/multi-cloud-deployments/]]|Report Volterra|
=== 
* Data leaks: Open Exchange Rates+++*[»]>
|2020.03.12|//Open Exchange Rates//|[[Notice of Data Breach|https://pastebin.com/raw/AzDPAN9N]]  ([[email|https://twitter.com/SylvieLorxu/status/1238149687200358401]])|Data_Breach AWS Third_Party|
|2020.03.13|Security Week| → [[Currency Data Provider 'Open Exchange Rates' Discloses Breach|https://www.securityweek.com/currency-data-provider-open-exchange-rates-discloses-breach]]|Data_Breach AWS Third_Party|
=== 
* Miscellaneous : Backups in the Cloud, Bottlerocket new AWS open source operating systems+++*[»]>
|2020.03.10|//AWS//|[[Bottlerocket - Open Source OS for Container Hosting|https://aws.amazon.com/blogs/aws/bottlerocket-open-source-os-for-container-hosting/]]|AWS Operating_System|
|2020.03.11|CBR Online| → [[AWS's New Open Source OS "Bottlerocket": A Baby RHEL Competitor?|https://www.cbronline.com/news/aws-operating-system-bottlerocket]]|AWS Operating_System|
|2020.03.12|//Cloud Management Insider//| → [[AWS launches Open Source OS for Containers|https://www.cloudmanagementinsider.com/aws-launches-bottlerocket/]]|AWS Operating_System|
===, some other articles on risk analysis, containers security, Kubernetes, and  Zero-Trust
|ssTabl96|k
|!⇒ [[CloudSecurityAlliance.fr/go/K3F/|https://CloudSecurityAlliance.fr/go/K3F/]] |
|!Mars|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2020.03.15|
|2020.03.15|Chrstophe Parisel|[[Embracing "native"​ security in Azure|https://www.linkedin.com/pulse/embracing-native-security-azure-christophe-parisel/]]|Azure|
|2020.03.15|MSSP Alert|[[Zero Trust Security Explained|https://www.msspalert.com/cybersecurity-research/zero-trust-security-explained/]]|Zero_Trust|
|>|>|>|!2020.03.14|
|2020.03.14|Bleeping Computer|[[BlackWater Malware Abuses Cloudflare Workers for C2 Communication|https://www.bleepingcomputer.com/news/security/blackwater-malware-abuses-cloudflare-workers-for-c2-communication/]]|Malware COVID-19|
|2020.03.17|SC Magazine| → [[COVID-19 decoy doc, Cloudflare service used to spread 'BlackWater' malware|https://www.scmagazine.com/home/security-news/malware/covid-19-decoy-doc-cloudflare-service-used-to-spread-blackwater-malware/]]|Malware COVID-19|
|2020.03.14|Medium|[[HTTP Desync Attacks with Python and AWS|https://medium.com/@emilefugulin/http-desync-attacks-with-python-and-aws-1ba07d2c860f]]|AWS Attacks|
|2020.03.14|//Rancher//|[[Enhancing Kubernetes Security with Pod Security Policies, Part 1|https://rancher.com/blog/2020/pod-security-policies-part-1]] (1/2)|Kubernetes|
|2020.03.14|//Varonis//|[[13 Must-Know Office 365 PowerShell Commands|https://www.varonis.com/blog/office-365-powershell-commands/]]|O365 PowerShell|
|>|>|>|!2020.03.13|
|2020.03.13|DZone|[[A Sneak Peek Into Amazon Web Services Cloud (AWS)|https://dzone.com/articles/a-sneak-peek-into-amazon-web-services-cloud-aws]]|AWS|
|2020.03.13|DevOps|[[Catch Emerging Security Risks Earlier by Leveraging Kubernetes Audit Logs|https://devops.com/catch-emerging-security-risks-earlier-by-leveraging-kubernetes-audit-logs/]]|Kubernetes Logs|
|2020.03.13|Information Security Newspaper|[[List of 8 million people, their address, and phones, who bought something from eBay or Amazon|https://www.securitynewspaper.com/2020/03/13/list-of-8-million-people-their-address-and-phones-who-bought-something-from-ebay-and-amazon/]]|Data_Leak|
|2020.03.13|//A10 Networks//|[[The State of DDoS Weapons|https://www.a10networks.com/marketing-comms/reports/state-ddos-weapons/]]|DDoS|
|2020.03.13|Dark Reading| → [[DDoS Attack Trends Reveal Stronger Shift to IoT, Mobile|https://www.darkreading.com/iot/ddos-attack-trends-reveal-stronger-shift-to-iot-mobile/d/d-id/1337318]]|Report|
|2020.03.13|Security Brief NZ|[[Cyber threats, rising costs, cloud integration - Dell reveals data trends|https://securitybrief.co.nz/story/cyber-threats-rising-costs-cloud-integration-dell-reveals-data-trends]]|Report Dell|
|2020.03.13|//Nuageo//[>img[iCSF/flag_fr.png]]|[[Calculer les gains du Cloud|https://www.nuageo.fr/2020/03/livre-blanc/]]|Misc|
|2020.03.13|//Aqua Security//|[[3 new rules of cloud-native application security|https://techbeacon.com/security/3-new-rules-cloud-native-application-security]]|Cloud_Native|
|2020.03.13|//PaloAlto Networks//|[[The Art of Automation: Creating Threat Intelligence Bots in the Cloud|https://blog.paloaltonetworks.com/2020/03/cloud-threat-intelligence-bot/]]|Threat_Intelligence|
|2020.03.13|//Park my Cloud//|[[AWS EBS Volume Types & What to Use Them For|https://www.parkmycloud.com/blog/ebs-volume-types/]]|AWS Storage|
|>|>|>|!2020.03.12|
|2020.03.12|Dark Reading|[[CASB 101: Why a Cloud Access Security Broker Matters|https://www.darkreading.com/theedge/casb-101-why-a-cloud-access-security-broker-matters/b/d-id/1337302]]|CASB|
|2020.03.12|The Daily Swigg|[[Google awards $100k to Dutch bug hunter for cutting-edge cloud security research|https://portswigger.net/daily-swig/google-awards-100k-to-dutch-bug-hunter-for-cutting-edge-cloud-security-research]]|GCP Bug_Bounty|
|2020.03.12|Information Security Newspaper| → [[Google pays $100k USD to an infosec researcher for reporting vulnerability in GCP|https://www.securitynewspaper.com/2020/03/12/google-pays-100k-usd-to-an-infosec-researcher-for-reporting-vulnerability-in-gcp/]]|GCP Bug_Bounty|
|2020.03.12|//ThreatPost//| → [[$100K Paid Out for Google Cloud Shell Root Compromise|https://threatpost.com/100k-google-cloud-shell-root-compromise/153665/]]|GCP Bug_Bounty|
|2020.03.12|DZone|[[Five Security Best Practices for Kubernetes Deployments|https://dzone.com/articles/five-security-best-practices-for-kubernetes-deploy]]|Kubernetes|
|2020.03.12|DZone|[[Docker Without Root Privileges|https://dzone.com/articles/docker-without-root-privileges]]|Docker|
|2020.03.12|jdSupra|[[HIPAA Compliant Cloud Storage|https://www.jdsupra.com/legalnews/hipaa-compliant-cloud-storage-10059/]]|HIPPA|
|2020.03.12|DZone|[[Engineers Own Cloud Security and They Need Better Tools|https://dzone.com/articles/engineers-own-cloud-security-and-they-need-better]]|Misc|
|2020.03.12|//SANS//|[[Frequently Asked Questions - MGT516: Managing Security Vulnerabilities: Enterprise and Cloud|https://www.sans.org/blog/faqs-mgt516-managing-security-vulnerabilities-enterprise-and-cloud/]] ([[cursus MGT516|https://www.sans.org/course/managing-enterprise-cloud-security-vulnerabilities]])|Training|
|2020.03.12|//Microsoft Azure//|[[Use DMARC to validate email in Office 365|https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/use-dmarc-to-validate-email?view=o365-worldwide]]|O365 DMARC|
|2020.03.12|Bleeping Computer| →  [[Office 365 ATP To Block Email Domains That Fail Authentication|https://www.bleepingcomputer.com/news/security/office-365-atp-to-block-email-domains-that-fail-authentication/]]|O365 DMARC|
|2020.03.12|//Open Exchange Rates//|[[Notice of Data Breach|https://pastebin.com/raw/AzDPAN9N]]  ([[email|https://twitter.com/SylvieLorxu/status/1238149687200358401]])|Data_Breach AWS Third_Party|
|2020.03.13|Security Week| → [[Currency Data Provider 'Open Exchange Rates' Discloses Breach|https://www.securityweek.com/currency-data-provider-open-exchange-rates-discloses-breach]]|Data_Breach AWS Third_Party|
|2020.03.12|//CyberArk Conjur//|[[Enhance your product's supportability with a logs-first approach|https://www.conjur.org/blog/enhance-your-products-supportability-with-a-logs-first-approach/]]|Logs|
|2020.03.12|//Forcepoint//|[[The Top Critical Features for Cloud Security Controls|https://www.forcepoint.com/blog/insights/forrester-andras-cser-policy-setting-controls-cloud-security]]|Controls|
|2020.03.12|//Alibaba Cloud//|[[Setting up HTTP to HTTPS Redirection with Alibaba Cloud Container Service|https://medium.com/@Alibaba_Cloud/setting-up-http-to-https-redirection-with-alibaba-cloud-container-service-6ed92137bc70]]|Alibaba_Cloud|
|2020.03.12|//Netwrix//|[[The Cloud Security Risk of Remote Workers, and How to Stop It|https://blog.netwrix.com/2020/03/12/the-cloud-security-risk-of-remote-workers-and-how-to-stop-it/]]|Remote_Security|
|2020.03.12|//MalwareBytes//|[[RemoteSec: achieving on-prem security levels with cloud-based remote teams|https://blog.malwarebytes.com/business-2/2020/03/remotesec-achieving-on-prem-security-levels-with-cloud-based-remote-teams/]]|Remote_Security|
|>|>|>|!2020.03.11|
|2020.03.11|UnderNews[>img[iCSF/flag_fr.png]]|[[Slack : comment garantir la sécurité les données ?|https://www.undernews.fr/reseau-securite/slack-comment-garantir-la-securite-les-donnees.html]]|Slack|
|2020.03.11|Container Journal|[[Unpacking Containers to Find Network Vulnerabilities|https://containerjournal.com/topics/container-security/unpacking-containers-to-find-network-vulnerabilities/]]|Containers Vulnerabilities|
|2020.03.11|DZone|[[Go Cloud, but Don't Forget to Backup Your Physical Servers and Data|https://dzone.com/articles/go-cloud-but-dont-forget-to-backup-your-physical-s]]|Backups Tools|
|2020.03.11|Analytics India Mag|[[What Makes Cloud Security Challenging For Cybersecurity Teams?|https://analyticsindiamag.com/what-makes-cloud-security-challenging-for-cybersecurity-teams/]]|Misc|
|2020.03.11|DevOps.com|[[The DevOps Sweet Spot: Inserting Security at Pull Requests (Part 1)|https://devops.com/the-devops-sweet-spot-inserting-security-at-pull-requests-part-1/]] (1/2)|DevSecOps|
|2020.03.11|arXiv.org|[[Are We Susceptible to Rowhammer? An End-to-End Methodology for Cloud Providers|https://arxiv.org/pdf/2003.04498.pdf]] (pdf)|Rowhammer DRAM|
|2020.03.11|//Atempo, OVHcloud//|[[Atempo and OVHcloud sign a strategic partnership for a sovereign cloud solution|https://vmblog.com/archive/2020/03/11/atempo-and-ovhcloud-sign-a-strategic-partnership-for-a-sovereign-cloud-solution.aspx]]|Backups|
|2020.03.13|Silicon.fr[>img[iCSF/flag_fr.png]]| → [[Cloud souverain : Atempo et OVHcloud unis pour la sauvegarde en mode SaaS|https://www.silicon.fr/cloud-souverain-atempo-ovhcloud-335952.html]]|Backups|
|2020.03.11|//Coalfire//|[[Third Party Risk Management and the Cloud|https://www.coalfire.com/The-Coalfire-Blog/March-2020/Third-Party-Risk-Management-and-the-Cloud]]|Risk_Management|
|2020.03.11|//SpecterOps//|[[Through the Looking Glass - Part 1|https://posts.specterops.io/through-the-looking-glass-part-1-f539ae308512]] (1/2)|AWS Traffic_Mirroring|
|2020.03.11|//Spanning//|[[Risk Mitigation: How SaaS Backup Addresses Operational Risk|https://spanning.com/blog/risk-mitigation-how-saas-backup-addresses-operational-risk/]]|SaaS Backups|
|2020.03.11|//DivvyCloud//|[[Full Life Cycle Cloud Security|https://divvycloud.com/full-life-cycle-cloud-security/]]|Misc|
|2020.03.11|//Compare the Cloud//|[[Ensuring Security In An Era Of AI And Cloud Platforms|https://www.comparethecloud.net/articles/ensuring-security-in-an-era-of-ai-and-cloud-platforms/]]|Misc|
|2020.03.11|//Sensu//|[[Monitoring multi-cloud environments|https://blog.sensu.io/monitoring-multi-cloud-environments]]|Monitoring|
|2020.03.11|//OxygenForensics//|[[10 Quick Facts About Oxygen Forensic Cloud Extractor|https://www.forensicfocus.com/News/article/sid=3880/]]|Forensics|
|2020.03.11|//FireOak Strategy//|[[Increase performance and reduce system load by automatically excluding Office 365 traffic from your organization's split tunnel VPN|https://fireoakstrategies.com/split-tunnel-vpn/]]|O365 VPN|
|2020.03.11|//Google GCP//|[[Important changes to less secure apps and account recovery management in the Admin console |https://gsuiteupdates.googleblog.com/2020/03/lsa-account-recovery-settings-changes.html]]|GCP|
|>|>|>|!2020.03.10|
|2020.03.10|//AWS//|[[Bottlerocket - Open Source OS for Container Hosting|https://aws.amazon.com/blogs/aws/bottlerocket-open-source-os-for-container-hosting/]]|AWS Operating_System|
|2020.03.11|CBR Online| → [[AWS's New Open Source OS "Bottlerocket": A Baby RHEL Competitor?|https://www.cbronline.com/news/aws-operating-system-bottlerocket]]|AWS Operating_System|
|2020.03.12|//Cloud Management Insider//| → [[AWS launches Open Source OS for Containers|https://www.cloudmanagementinsider.com/aws-launches-bottlerocket/]]|AWS Operating_System|
|2020.03.10|//Axonius//|[[Combatting Complexity by Focusing on Fundamentals: New Study from Axonius and ESG Uncovers IT Megatrends Driving Decreased Asset Visibility, Increased Risk|http://www.prweb.com/releases/combatting_complexity_by_focusing_on_fundamentals_new_study_from_axonius_and_esg_uncovers_it_megatrends_driving_decreased_asset_visibility_increased_risk/prweb16968933.htm]] ([[téléchargement|https://info.axonius.com/2020-asset-management-trends-esg-ebook]])|Report Axonius|
|2020.03.10|Solutions Review| → [[Axonius: 69 Percent of Enterprises Have a Cloud Visibility Gap|https://solutionsreview.com/cloud-platforms/axonius-69-percent-of-enterprises-have-a-cloud-visibility-gap/]]|Report Axonius|
|2020.03.10|BetaNews| → [[IT teams struggle with asset visibility and management|https://betanews.com/2020/03/10/it-asset-management-struggle/]]|Report Axonius|
|2020.03.13|Help Net Security| → [[Cloud + BYOD + IoT = major security gaps|https://www.helpnetsecurity.com/2020/03/13/major-security-gaps/]]|Report Axonius|
|2020.03.12|jdSupra|[[Source Code Escrow Agreements Are Reaching For The Cloud|https://www.jdsupra.com/legalnews/source-code-escrow-agreements-are-73777/]]|Escrow Code|
|2020.03.10|//Forecepoint//|[[SASE Will Redefine Network and Cloud Security: So What Does it Mean?|https://www.forcepoint.com/forcepoint-gartner-sase-converging-network-cloud-security]]|SASE|
|2020.03.10|//JumpCloud//|[[Using IDaaS To Improve Security|https://jumpcloud.com/blog/idaas-improve-security/]]|IDaaS|
|2020.03.10|//Threatstack//|[[15 Cloud & Cloud Security Certifications for 2020|https://www.threatstack.com/blog/15-cloud-cloud-security-certifications-for-2020]]|Training Certification|
|2020.03.10|//AddWeb Solution//|[[DevSecOps - Incorporating The 10 Best Security Practices Of The Industry|https://addwebsolution.com/blog/devsecops-incorporating-ten-best-security-practices-industry]]|DevSecOps|
|>|>|>|!2020.03.09|
|2020.03.09|Dark Reading|[[Cyber Resiliency, Cloud & the Evolving Role of the Firewall|https://www.darkreading.com/cloud/cyber-resiliency-cloud-and-the-evolving-role-of-the-firewall/a/d-id/1337206]]|Resilience|
|2020.03.09|cyber.gov.au|[[Cloud Computing Security for Cloud Service Providers|https://www.cyber.gov.au/publications/cloud-computing-security-for-cloud-service-providers]] ([[PDF|https://www.cyber.gov.au/sites/default/files/2020-03/PROTECT%20-%20Cloud%20Computing%20Security%20for%20Cloud%20Service%20Providers%20%28March%202020%29.pdf]])|Guidelines|
|2020.03.09|cyber.gov.au|[[Cloud Computing Security for Tenants|https://www.cyber.gov.au/publications/cloud-computing-security-for-tenants]] ([[PDF|https://www.cyber.gov.au/sites/default/files/2020-03/PROTECT%20-%20Cloud%20Computing%20Security%20for%20Tenants%20%28March%202020%29.pdf]])|Guidelines|
|2020.03.09|Daniel Hood|[[How to Embezzle Money Using Amazon AMIs|https://blog.iamwritingaboutsecurity.com/posts/how-to-embezzle-money/]]|AWS AMI|
|2020.03.09|arXiv.org|[[Secure Cloud Storage with Client-Side Encryption Using a Trusted Execution Environment|https://arxiv.org/pdf/2003.04163.pdf]] (pdf)|Storage Encryption|
|2020.03.09|//Volterra//|[[Infrastructure and Security Challenges Threaten Multi-Cloud and Edge Deployments, New Survey from Volterra Shows|https://www.volterra.io/company/news/infrastructure-security-challenges-threaten-multi-cloud-edge-deployments/]]|Report Volterra|
|2020.03.09|VMblog| → [[Infrastructure and Security Challenges Threaten Multi-Cloud and Edge Deployments, New Survey from Volterra Shows|https://vmblog.com/archive/2020/03/09/infrastructure-and-security-challenges-threaten-multi-cloud-and-edge-deployments-new-survey-from-volterra-shows.aspx]]|Report Volterra|
|2020.03.11|Help Net Security| → [[Multi-cloud and edge deployments threatened by security and connectivity problems|https://www.helpnetsecurity.com/2020/03/11/multi-cloud-deployments/]]|Report Volterra|
|2020.03.09|//Panorays//|[[Service Announcement: The Right Questions to Ask Your Vendors in Times of Large-Scale Remote Working|https://www.panorays.com/blog/service-announcement-the-right-questions-to-ask-your-vendors-in-times-of-large-scale-remote-working/]]|Third_Party Vendor_Assessment|
|2020.03.09|//Microsoft//|[[Top 5 ways your Azure AD can help you enable remote work|https://techcommunity.microsoft.com/t5/azure-active-directory-identity/top-5-ways-your-azure-ad-can-help-you-enable-remote-work/ba-p/1144691]]|AzureAD|
|2020.03.09|Georgios Kapoglis|[[Fantastic AWS Attacks and Where to Find Them (vidéo)|https://www.youtube.com/watch?v=IOyV8ww-lKM]]| BSidesSF 2020|AWS Attcks|
|2020.03.09|//StackRox//|![[Azure Kubernetes (AKS) Security Best Practices Part 4 of 4: Cluster|https://www.stackrox.com/post/2020/03/azure-kubernetes-aks-security-best-practices-part-4-of-4/]] (4/4)|Azure Kubernetes Best_Practices|
!Managing the Risk for Medical Devices Connected to the Cloud
[>img(150px,auto)[iCSA/K3CPM.jpg]]Même si l'annonce a été faite, le site de la CSA ne permet d'accéder qu'au draft du document.
<<<
//Avec l'augmentation du nombre de dispositifs IoT, les prestataires de santé sont confrontés à la transformation numérique la plus importante qu'ils aient jamais connue.
La nouvelle génération d'appareils médicaux connectés est porteuse de la promesse de meilleurs soins pour les patients, de meilleures données cliniques, d'une plus grande efficacité et d'une diminution des coûts.
Cependant, elle présente également des risques accrus en matière de sécurité.
L'objectif de ce document est de présenter le concept de gestion des dispositifs médicaux en fonction de leur proximité avec le patient et d'introduire des pratiques visant à sécuriser l'utilisation du cloud pour les dispositifs médicaux.//
<<<
__Table des Matières :__//{{ss2col{
<<<
# Medical Device Security Life Cycle
## Pre-Purchase
## Post Purchase/Pre-Deployment
### Network
### Web Application Interface
### Wireless Communications
### Secure Communication Channels
## Deployment/Operations Management
### Devices with Zero Degrees of Separation
### Devices with One Degree of Separation
### Devices with Two Degrees of Separation
### Devices with Three Degrees of Separation
### Devices with Four Degrees of Separation
## Decommission/Disposal
# Recommendations and Conclusion
## Recommendations
## Conclusion/Need for further Studies
# References
<<<
}}}//__Liens :__
* Annonce 'Newest Cloud Security Alliance Paper Sheds Light on Best Practices for Managing Risks Associated with Cloud-Connected Medical Devices' ⇒ ''[[CloudSecurityAlliance.fr/go/k3cp/|https://CloudSecurityAlliance.fr/go/k3cp/]]''
* Document ⇒ ''[[CloudSecurityAlliance.fr/go/k3cw/|https://CloudSecurityAlliance.fr/go/k3cw/]]''
[img(50%,1px)[iCSF/BluePixel.gif]]
!"//Expectations and Evolution of CASBs//"
Un sondage est lancé par la CSA sur le sujet de la technologie CASB.
Son objectif est de mieux cerner le niveau d'attente des utilisateurs et leurs évolutions.
Le sondage est ouvert jusqu'au ''20 avril 2020'' et est hébergé sur la plateforme SurveyMonkey.
Afin de vous y préparer, les 28 questions posées sont disponibles+++*[ici]> 
!!Intro
1. What inhibitors has your organization encountered in adopting or fully utilizing your cloud security vendor's technology? (Check all that apply)
* Inadequate staffing or staff expertise / Company culture / Solution complexity / Inadequate budget / Complexity in setting up / Solution usability / Lack of complete feature set / Poor support / None / Other (please specify)
2. What are your top 3 security projects to implement or improve by type? (Select up to 3)
* Network security / Cloud security / Endpoint security / Email security / Application security / Security awareness training / Insider threat management / Compliance / Other (please specify)
3. Where is your organization in the CASB procurement lifecycle?
* Initial research / Evaluating vendors / POC/pilot / Implementation / Operational / Not considering
!!Visibility
4. To your knowledge, where do your users keep sensitive data in the cloud? (Check all that apply)
* Microsoft Sharepoint Online/OneDrive / Google Drive / Box / SalesForce / Workday / AWS / Azure / ServiceNow / Unsure / N/A - no sensitive, organizational data in the cloud / Other (please specify)
5. Rate the importance of visibility features in CASB services.
* None / Low / importance / Medium importance / High importance
* Locate and track all cloud services accessed
* Discover sensitive data
* Assess cloud service compliance gaps
* Identify cloud usage by user or device
* Detect data traffic and usage of cloud services
* Detect user behavior activity
* Detect cloud-to-cloud activity (e.g. OAuth)
* Other (please specify)
6. Do you use CASB services for identifying any of the following? (Check all that apply)
* Data classification / Data sensitivity levels (e.g. contextual) / Data location / User profiles (e.g. privilege) / Device categorization / User behavior activity / Unauthorized access (e.g. location, network, threat) / Configuration errors in IaaS and PaaS / Compliance gaps / Other (please specify)
7. Rate how effective your CASB is with multi-cloud visibility across IaaS and PaaS usage.
* Unsure / Low / Medium / High
8. What visibility features are missing from CASB services?
* Details...
!!Compliance
9. Are you using a CASB effectively as your internal compliance tool?
* Yes / No / Unsure
10. Does your CASB effectively assist your organization in compliance with regulations and standards?
* Yes / No / Unsure
11. Does your CASB effectively assist with data residency requirements?
* Yes / No / Unsure
12. Which standards and regulations does your organization adhere to? (Check all that apply)
* GDPR / CCPA / HIPAA / PCI-DSS / FISMA/FedRAMP/DoD_8500.x / ISO / CSA CCM/STAR / NIST / None / Other (please specify)
13. Rate the level of importance for potential compliance features in a CASB.
* Unsure / Low / Medium / High
* Blocking of applications and services
* Automation of policy enforcement
* Bringing unapproved applications to compliance with regulation
* Recommend compensating controls
* Reporting compliance adherence
!!Data Security
14. What level of file sharing in the cloud is allowed by your organization?
* Public / External / Internal with all company domain / Internal with individual members / Private only
15. Rate how effective your CASB is at the following...
* Unsure / Low / Medium / High
* Prevent data exfiltration for approved apps
* Prevent data exfiltration for unapproved apps
* Prevent upload of sensitive data
* Prevent download of sensitive data
* Detect anomalies in user behaviors
* Protecting cloud users from account takeover
16. Rate how effective your CASB is at the following… (Unsure, Low, Medium, High)
* Unsure / Low / Medium / High
* Control user access from certain locations (countries, outside of corporate network, etc.)
* Control user access from unmanaged devices
* Discover/monitor sensitive data in the cloud (DLP)
* Govern cloud applications (Shadow IT visibility, OAuth apps control)
* Report on compliance gaps/violations
* Discover, assess and solve IaaS/PaaS misconfigurations (Cloud Security Posture Management)
17. Which of the below would most enhance your DLP program?
* Context-based controls (device, browser, network, location, etc.) / User role-based controls (privilege, VIP, etc.) / User behavior monitoring / Risk-based controls (threat intel, users targeted by cyberattacks, etc.) / Risk-aware incident response (prioritized to incidents based on access conditions and threat intelligence) / Fewer solutions to manage / Superior compliance management / Superior incident management workflows / ITSM and SIEM integrations / Other (please specify)
!!Threat Protection
18. What cybersecurity mechanism do you use to control user access?
* Secure Web Gateway / Next-gen firewall / Traditional VPN appliance / Cloud based VPN / Zero Trust/Always On VPN / CASB (API-based only) / CASB (API-based and Reverse Proxy) / CASB (API-based and Forward Proxy) / Other (please specify)
19. What type of security mechanism do you use to prevent malicious or non-compliant access?
* Network based access control / Multi Factor Authentication for VPN only / Multi Factor Authentication for VPN and cloud applications / Adaptive access controls (Conditional access, risk-based authentication, etc.) / MDM/Device posture and hygiene compliance / Zero Trust Network Access / Other (please specify)
20. Which identity and access management providers (IDaaS) do you deploy or plan to deploy? (Check all that apply)
* OneLogin / Okta / Microsoft Azure AD / Microsoft ADFS / Ping Identity / IDaptive / SecureAuth / ForgeRock / Auth0 / Other (please specify)
21. What multi-factor controls does your organization use?
* Standalone cloud delivered multi factor authentication provider / Standalone on-premise multi factor authentication provider / MFA included with Identity Provider / Risk-based authentication (2fa based on condition) / N/A
22. Rate how effective your CASB is at threat protection on each of the following.
* Unsure / Low / Medium / High
* Detecting cloud account takeover
* Detecting data breach
* Ingesting threat intelligence feeds
* Identifying malware
* Identifying and monitoring misconfigurations
23. Rate your CASB as an effective mechanism on the following abilities. - Unsure, Low, Medium, High
* Unsure / Low / Medium / High
* Detection
* Correlation
* Remediation
* Response
!!Demographics
24. What is the size of your organization?
* 1-50 employees / 51-500 employees / 501-1000 employees / 1001-5000 employees / 5001-10000 employees / 10000+ employees
25. What region do you work in?
* Americas / APAC (Asia, Pacific Islands) / EMEA (Europe, Middle East, Africa)
26. In what country do you work?
27. Which of the following best describes the principal industry of your organization?
28. What is your level or responsibility?
* C-level Executive / Manager / Staff
=== 
* Lien vers le sondage ⇒ ''[[CloudSecurityAlliance.fr/go/k39b/|https://CloudSecurityAlliance.fr/go/k39b/]]'' 
!"//QSS Awareness Survey 2020//"
Un sondage est lancé par la CSA sur le sujet de la cryptographie quantique.
Son objectif est de mieux cerner le niveau de sensibilisation aux questions de sécurité quantique et sur les approches qui peuvent être utilisées pour y répondre.
Le sondage est ouvert jusqu'au ''27 avril 2020'' et est hébergé sur la plateforme SurveyMonkey.
Afin de vous y préparer, les 11 questions posées sont disponibles+++*[ici]> 
!!General Quantum-Safe Awareness
1. What would you rate your awareness of quantum computing technology's impact on data security?
* Very aware / Somewhat aware / A little aware / Not at all aware
2. When do you expect the quantum computing threat to be real?
* Right now / In 2-5 years / In 5-10 years / In 10-20 years / In 20+ years
3. How confident are you that current security approaches will keep your organization's data safe from quantum computing attacks?
* Not at all confident / A little confident / Somewhat confident / Very confident / Unsure
4. How would you rate the priority for preparing against the threat of the quantum computer?
* High priority / Moderate priority / Low priority / Not a priority
* 5. Are you or your company working or are planning to work on protecting your organisation against the future threat of quantum computers?
* Yes  / No / Unsure 
!!Not Implementing Quantum-Safe Technology
6. What is the main reason you are not implementing or are not planning to implement quantum-safe technologies in your organization?
* Not a priority / Unaware of existing solutions / It is too expensive / Lack of budget / No buy-in from upper management / Lack of standardization / Other (possibility to specify)
!!Familiarity with Quantum-Safe Solutions
7. Rate your level of agreement with the following statement: "There are currently quantum-safe technologies on the market that can help protect against quantum-based cyber-attacks."
* Strongly agree / Agree / Neither agree nor disagree / Disagree / Strongly disagree
* 8. Which of these quantum resistant technologies are you familiar with? (Select all that apply)?
* Quantum random number generator (QRNG) / Quantum key distribution (QKD) / Post Quantum algorithms / Longer symmetric keys / Longer hash functions / None of these
9. What would be the value for you of a more detailed analysis on the applications of these different technologies?
* High value / Moderate value / Low value / No value at all
10. When are you planning on adding Quantum-Safe Security as a requirement for your cryptography suppliers?
* Required now / In the next year / In 2-5 years / In 5+ years / No plans
11. Are you interested in learning more about quantum computers, the threat to data security, and quantum-safe solutions?
* Not at all interested / A little interested / Somewhat interested / Very interested
=== 
* Lien vers le sondage ⇒ ''[[CloudSecurityAlliance.fr/go/k39q/|https://CloudSecurityAlliance.fr/go/k39q/]]'' 
!"//Cloud Security Alliance Announces Temporary Price Reduction in Online Educational Programs//"
[>img(300px,auto)[iCSA/K39IC.jpg]]Compte tenu de la situation actuelle liée à la pandémie du coronavirus COVID-19, la CSA a annoncé le 9 mars 2020 une remise de 100 dollars sur tous les cours de formation en ligne proposés sur le CSA Knowledge Center.
Cette remise restera en vigueur jusqu'au 30 avril 2020.
__Lien :__
 ⇒ ''[[CloudSecurityAlliance.fr/go/k39t/|https://CloudSecurityAlliance.fr/go/k39t/]]
!!1 - Nouveautés CSA et Informations de la semaine du 2 au 8 mars 2020
* Actu : Report du Forum Securité@Cloud 2020+++*[»]> <<tiddler [[2020.03.03 - Report du Forum Securité@Cloud 2020 aux 23 et 24 septembre]]>>=== 
* Blog : Retour sur le CSA Summit à RSA 2020, parties 1+++*[»]> <<tiddler [[2020.03.02 - Blog : Retour sur le CSA Summit à RSA 2020 (1/2)]]>>=== et 2+++*[»]> <<tiddler [[2020.03.03 - Blog : Retour sur le CSA Summit à RSA 2020 (2/2)]]>>=== 
* Podcast : IoT et Régions Intelligentes, aspects de résilience+++*[»]> <<tiddler [[2020.03.02 - Podcast : 'IoT and SMART Nations - Building Resilience']]>>=== 
* Webinar : Inscriptions ouvertes pour le prochain CloudBytes 'Top 5 Latest Cloud Security Hacks'+++*[»]> <<tiddler [[2020.03.17 - Webinar : 'Top 5 Latest Cloud Security Hacks and How You Can Avoid Them']]>>=== 
!!2 - Veille Web Cloud et Sécurité
La [[Veille Web|2020.03.08 - Veille Hebdomadaire - 8 mars]] avec plus d'une soixantaine de liens dont :
* Etudes et rapports : AtScale+++*[»]>
|2020.03.04|//AtScale//|[[79% of Enterprises Want Better Integrated Security and Governance for Their Data in the Cloud|https://www.atscale.com/press/enterprises-security-governance-data-cloud/]] ([[rapport|https://www.atscale.com/resource/2020-big-data-analytics-maturity-survey-report/]])|Survey|
=== 
* Alertes : Zoho et Desktop Central+++*[»]>
<<tiddler [[2020.03.31 - Alertes]]>>
===, 
* Attaques : liste d'atttaques+++*[»]>
|2020.03.06|Dark Reading|[[7 Cloud Attack Techniques You Should Worry About|https://www.darkreading.com/cloud/7-cloud-attack-techniques-you-should-worry-about/d/d-id/1337259]]|Attacks|
===, noms de domaines (homoglyphes+++*[»]>
|2020.03.04|//Soluble//|![[Emoji to Zero-Day: Latin Homoglyphs in Domains and Subdomainsy|https://www.soluble.ai/blog/public-disclosure-emoji-to-zero-day]]|DNS IDN_Homograph_Attack|
||Wikipedia| → [[IDN homograph attack|https://en.wikipedia.org/wiki/IDN_homograph_attack]]|DNS IDN_Homograph_Attack|
|2020.03.04|Bleeping Computer| → [[Zero-Day Bug Allowed Attackers to Register Malicious Domains|https://www.bleepingcomputer.com/news/security/zero-day-bug-allowed-attackers-to-register-malicious-domains/]]|DNS IDN_Homograph_Attack|
|2020.03.04|Security Week| → [[A Zero-Day Homograph Domain Name Attack|https://www.securityweek.com/zero-day-homograph-domain-name-attack]]|DNS IDN_Homograph_Attack|
=== et Microsoft+++*[»]>
|2020.03.05|//Vullnerability//|[[670+ Subdomains of Microsoft are Vulnerable to Takeover (Lead to Account Takeover)|https://vullnerability.com/blog/microsoft-subdomain-account-takeover]] ([[vidéo|http://www.youtube.com/watch?v=Jg3mkLm2K2g]])|DNS Attacks|
|2020.03.05|Security Week| → [[Over 600 Microsoft Subdomains Can Be Hijacked: Researchers|https://www.securityweek.com/over-600-microsoft-subdomains-can-be-hijacked-researchers]]|DNS Attacks|
|2020.03.05|Dark Reading| → [[Researchers Find 670+ Microsoft Subdomains Vulnerable to Takeover|https://www.darkreading.com/vulnerabilities---threats/researchers-find-670+-microsoft-subdomains-vulnerable-to-takeover/d/d-id/1337246]]|DNS Attacks|
===), Ransomware et backups dans le Cloud+++*[»]>
|2020.03.03|Bleeping Computer|![[Ransomware Attackers Use Your Cloud Backups Against You|https://www.bleepingcomputer.com/news/security/ransomware-attackers-use-your-cloud-backups-against-you/]]|Ransomware|
=== 
* Divers : CASB+++*[»]>
|2020.03.02|//Nuageo//[>img[iCSF/flag_fr.png]]|[[CASB, la nouvelle star de l'écosystème Cloud?|https://www.nuageo.fr/2020/03/casb-star-ecosysteme-cloud/]]|CASB|
|2020.03.03|//Cisco//|[[What is CASB?|https://umbrella.cisco.com/blog/2020/03/03/what-is-casb/]]|CASB|
===, groupe de travail ENISA+++*[»]>
|2020.03.06|ENISA|[[After cloud…cybersecurity certification: launching the ENISA ad hoc Working Group on Cloud Services|https://www.enisa.europa.eu/news/enisa-news/after-cloud-cybersecurity-certification-launching-the-enisa-ad-hoc-working-group-on-cloud-services]]|ENISA|
|2019.12.19|ENISA|Call 02/19 - Cloud Services: [[Call for expression of interest for an ad hoc Working Group|https://www.enisa.europa.eu/news/enisa-news/call-for-expression-of-interest-for-an-ad-hoc-working-group]] ([[Terms of Reference|https://www.enisa.europa.eu/topics/standards/adhoc_wg_calls/ahWG02/tor_ahwg02_cloud]])|ENISA|
===, retours sur le référentiel SecNumCloud+++*[»]>
|2020.03.05|ZDnet[>img[iCSF/flag_fr.png]]|![[Secnumcloud : qu'est ce qu'il ne faut pas faire pour plaire à l'Anssi|https://www.zdnet.fr/actualites/secnumcloud-qu-est-ce-qu-il-ne-faut-pas-faire-pour-plaire-a-l-anssi-39900067.htm]]|SecNumCloud|
===, Zero Trust+++*[»]>
|2020.03.05|//JumpCloud//|[[A Cloud-Based Model for Zero Trust Security|https://jumpcloud.com/blog/cloud-model-zero-trust-security/]]|Zero_Trust|
|2020.03.05|Federal News Network|[[NIST issuing revised draft of zero trust guidance for public comment|https://federalnewsnetwork.com/march-2020-zero-trust-month/2020/03/nist-issuing-revised-draft-of-zero-trust-guidance-for-public-comment/]]|Zero_Trust NIST|
=== 
!3 - Weekly Cloud and Security Watch Newsletter[>img[iCSF/inEnglish.png]]
<<tiddler [[2020.03.08 - Weekly Newsletter - March 8th]]>>
!CSA News and Updates - March 2nd to 8th
* Blog: Recap of the CSA Summit at RSA 2020 - part 1+++*[»]> <<tiddler [[2020.03.02 - Blog : Retour sur le CSA Summit à RSA 2020 (1/2)]]>>=== and 2+++*[»]> <<tiddler [[2020.03.03 - Blog : Retour sur le CSA Summit à RSA 2020 (2/2)]]>>=== 
* Podcast: 'IoT and SMART Nations - Building Resilience'+++*[»]> <<tiddler [[2020.03.02 - Podcast : 'IoT and SMART Nations - Building Resilience']]>>=== 
* Webinar: Register for 'Top 5 Latest Cloud Security Hacks and How You Can Avoid Them'+++*[»]> <<tiddler [[2020.03.17 - Webinar : 'Top 5 Latest Cloud Security Hacks and How You Can Avoid Them']]>>=== 
* Event: Forum Securité@Cloud postponed in September+++*[»]> <<tiddler [[2020.03.03 - Report du Forum Securité@Cloud 2020 aux 23 et 24 septembre]]>>=== 
!Cloud and Security News Watch
[[Over 60 links|2020.03.08 - Veille Hebdomadaire - 8 mars]] among which:
* Reports: AtScale+++*[»]>
|2020.03.04|//AtScale//|[[79% of Enterprises Want Better Integrated Security and Governance for Their Data in the Cloud|https://www.atscale.com/press/enterprises-security-governance-data-cloud/]] ([[rapport|https://www.atscale.com/resource/2020-big-data-analytics-maturity-survey-report/]])|Survey|
=== 
* Alerts: Zoho Releases Security Update on ManageEngine Desktop Central+++*[»]>
<<tiddler [[2020.03.31 - Alertes]]>>
===, 
* Attacks: 7 Cloud Attack Techniques+++*[»]>
|2020.03.06|Dark Reading|[[7 Cloud Attack Techniques You Should Worry About|https://www.darkreading.com/cloud/7-cloud-attack-techniques-you-should-worry-about/d/d-id/1337259]]|Attacks|
===, Domain names issues with Latin Homoglyphs+++*[»]>
|2020.03.04|//Soluble//|![[Emoji to Zero-Day: Latin Homoglyphs in Domains and Subdomainsy|https://www.soluble.ai/blog/public-disclosure-emoji-to-zero-day]]|DNS IDN_Homograph_Attack|
||Wikipedia| → [[IDN homograph attack|https://en.wikipedia.org/wiki/IDN_homograph_attack]]|DNS IDN_Homograph_Attack|
|2020.03.04|Bleeping Computer| → [[Zero-Day Bug Allowed Attackers to Register Malicious Domains|https://www.bleepingcomputer.com/news/security/zero-day-bug-allowed-attackers-to-register-malicious-domains/]]|DNS IDN_Homograph_Attack|
|2020.03.04|Security Week| → [[A Zero-Day Homograph Domain Name Attack|https://www.securityweek.com/zero-day-homograph-domain-name-attack]]|DNS IDN_Homograph_Attack|
=== and Microsoft Subdomains Vulnerable to Takeover+++*[»]> 
|2020.03.05|//Vullnerability//|[[670+ Subdomains of Microsoft are Vulnerable to Takeover (Lead to Account Takeover)|https://vullnerability.com/blog/microsoft-subdomain-account-takeover]] ([[vidéo|http://www.youtube.com/watch?v=Jg3mkLm2K2g]])|DNS Attacks|
|2020.03.05|Security Week| → [[Over 600 Microsoft Subdomains Can Be Hijacked: Researchers|https://www.securityweek.com/over-600-microsoft-subdomains-can-be-hijacked-researchers]]|DNS Attacks|
|2020.03.05|Dark Reading| → [[Researchers Find 670+ Microsoft Subdomains Vulnerable to Takeover|https://www.darkreading.com/vulnerabilities---threats/researchers-find-670+-microsoft-subdomains-vulnerable-to-takeover/d/d-id/1337246]]|DNS Attacks|
===, Ransomware and Cloud Backups+++*[»]>
|2020.03.03|Bleeping Computer|![[Ransomware Attackers Use Your Cloud Backups Against You|https://www.bleepingcomputer.com/news/security/ransomware-attackers-use-your-cloud-backups-against-you/]]|Ransomware|
=== 
* Miscellaneous: CASB+++*[»]>
|2020.03.02|//Nuageo//[>img[iCSF/flag_fr.png]]|[[CASB, la nouvelle star de l'écosystème Cloud?|https://www.nuageo.fr/2020/03/casb-star-ecosysteme-cloud/]]|CASB|
|2020.03.03|//Cisco//|[[What is CASB?|https://umbrella.cisco.com/blog/2020/03/03/what-is-casb/]]|CASB|
===, ENISA ad hoc Working Group on Cloud Services+++*[»]>
|2020.03.06|ENISA|[[After cloud…cybersecurity certification: launching the ENISA ad hoc Working Group on Cloud Services|https://www.enisa.europa.eu/news/enisa-news/after-cloud-cybersecurity-certification-launching-the-enisa-ad-hoc-working-group-on-cloud-services]]|ENISA|
|2019.12.19|ENISA|Call 02/19 - Cloud Services: [[Call for expression of interest for an ad hoc Working Group|https://www.enisa.europa.eu/news/enisa-news/call-for-expression-of-interest-for-an-ad-hoc-working-group]] ([[Terms of Reference|https://www.enisa.europa.eu/topics/standards/adhoc_wg_calls/ahWG02/tor_ahwg02_cloud]])|ENISA|
===, Feedback on the French SecNumCloud+++*[»]>
|2020.03.05|ZDnet[>img[iCSF/flag_fr.png]]|![[Secnumcloud : qu'est ce qu'il ne faut pas faire pour plaire à l'Anssi|https://www.zdnet.fr/actualites/secnumcloud-qu-est-ce-qu-il-ne-faut-pas-faire-pour-plaire-a-l-anssi-39900067.htm]]|SecNumCloud|
===, Zero Trust+++*[»]>
|2020.03.05|//JumpCloud//|[[A Cloud-Based Model for Zero Trust Security|https://jumpcloud.com/blog/cloud-model-zero-trust-security/]]|Zero_Trust|
|2020.03.05|Federal News Network|[[NIST issuing revised draft of zero trust guidance for public comment|https://federalnewsnetwork.com/march-2020-zero-trust-month/2020/03/nist-issuing-revised-draft-of-zero-trust-guidance-for-public-comment/]]|Zero_Trust NIST|
=== 
|ssTabl96|k
|!⇒ [[CloudSecurityAlliance.fr/go/K38/|https://CloudSecurityAlliance.fr/go/K38/]] |
|!Mars|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2020.03.08|
|2020.03.08|//Tripwire//|[[To Be or Not to Be: BCSI in the Cloud?|https://www.tripwire.com/state-of-security/security-data-protection/cloud/bcsi-in-cloud/]]|Risk_Assessment|
|2020.03.08|||//Barracuda Networks//|[[Future shock: the cloud is the new network|https://www.barracuda.com/cloud-market]]|Report|
|>|>|>|!2020.03.06|
|2020.03.06|ENISA|[[After cloud…cybersecurity certification: launching the ENISA ad hoc Working Group on Cloud Services|https://www.enisa.europa.eu/news/enisa-news/after-cloud-cybersecurity-certification-launching-the-enisa-ad-hoc-working-group-on-cloud-services]]|ENISA|
|2020.03.06|Dark Reading|[[7 Cloud Attack Techniques You Should Worry About|https://www.darkreading.com/cloud/7-cloud-attack-techniques-you-should-worry-about/d/d-id/1337259]]|Attacks|
|2020.03.06|Bleeping Computer|[[FBI Warns of BEC Attacks Abusing Microsoft Office 365, Google G Suite|https://www.bleepingcomputer.com/news/security/fbi-warns-of-bec-attacks-abusing-microsoft-office-365-google-g-suite/]]|Attacks|
|2020.03.06|jdSupra|[[Contract Corner: Basics of Uptime Commitment in Cloud Service Level Agreements|https://www.jdsupra.com/legalnews/contract-corner-basics-of-uptime-89492/]]|SLA|
|2020.03.06|Help Net Security|[[HITRUST Shared Responsibility: Assigning privacy and responsibility on the cloud|https://www.helpnetsecurity.com/2020/03/06/hitrust-shared-responsibility-program-and-matrix-1-0/]]|Shared_Responsibility|
|2020.03.06|TechBeacon|[[5 keys to securing multi-cloud environments|https://techbeacon.com/security/5-keys-securing-multi-cloud-environments]]|Multi_Cloud Recommendations|
|2020.03.06|//Fraktal//|[[Cloud WAF Comparison Using Real-World Attacks|https://medium.com/fraktal/cloud-waf-comparison-using-real-world-attacks-acb21d37805e]]|WAF|
|2020.03.06|//PaloAlto Networks//|[[Breaking Down Silos with DevSecOp|https://blog.paloaltonetworks.com/2020/03/cloud-break-silos-devsecops/]]|DevSecOps|
|2020.03.06|//Slack//[>img[iCSF/flag_fr.png]]|[[Continuite de l'activité chez Slack : comment permettre à nos clients de rester operationnels pendant l'episode COVID 19|https://slackhq.com/continuite-de-lactivite-chez-slack-comment-permettre-a-nos-clients-de-rester-operationnels-pendant-lepisode-covid-19]]|COVID-19 BCP|
|2020.03.06|//Slack//| → [[Business continuity at Slack: Keeping our customers up and running during COVID-19|https://slackhq.com/business-continuity-plan-covid-19]]|COVID-19 BCP|
|>|>|>|!2020.03.05|
|2020.03.05|ZDnet[>img[iCSF/flag_fr.png]]|![[Secnumcloud : qu'est ce qu'il ne faut pas faire pour plaire à l'Anssi|https://www.zdnet.fr/actualites/secnumcloud-qu-est-ce-qu-il-ne-faut-pas-faire-pour-plaire-a-l-anssi-39900067.htm]]|SecNumCloud|
|2020.03.05|Le Mag IT[>img[iCSF/flag_fr.png]]|[[Azure Bastion apporte confort et sécurité à la gestion des VM|https://www.lemagit.fr/conseil/Azure-Bastion-apporte-confort-et-securite-a-la-gestion-des-VM]]|Azure|
|2020.03.05|The Register|[[Enable that MF-ing MFA: 1.2 million Azure Active Directory accounts compromised every month, reckons Microsoft|https://www.theregister.co.uk/2020/03/05/microsoft_12_million_enterprise_accounts_are_compromised_every_month/]] ([[vidéo|https://www.youtube.com/watch?v=B_mhJO2qHlQ]])|AzureAD Attacks|
|2020.03.05|ZDnet|[[New Bill to prepare Australian law enforcement for the US CLOUD Act|https://www.zdnet.com/article/new-bill-to-prepare-australian-law-enforcement-for-the-us-cloud-act/]] (documents de référence [[1|https://parlinfo.aph.gov.au/parlInfo/download/legislation/bills/r6511_first-reps/toc_pdf/20025b01.pdf]] et [[2|https://parlinfo.aph.gov.au/parlInfo/download/legislation/ems/r6511_ems_0ac5ae09-3e3e-400b-ae5e-680a68af4e45/upload_pdf/733176.pdf]])|CLOUD_Act|
|2020.03.05|//Source Incite//|[[SRC-2020-0011 : ManageEngine Desktop Central FileStorage getChartImage Deserialization of Untrusted Data Remote Code Execution Vulnerability|https://srcincite.io/advisories/src-2020-0011/]]|Zoho CVE-2020-10189|
|2020.03.06|//Zoho//|[[We acknowledge the vulnerability in versions of Desktop Central released before 1/20/20 (build 10.0.473 and below)|https://mobile.twitter.com/manageengine/status/1235985409731149824]]|Zoho CVE-2020-10189|
|2020.03.06|US-CERT| → [[Zoho Releases Security Update on ManageEngine Desktop Central|https://www.us-cert.gov/ncas/current-activity/2020/03/06/zoho-releases-security-update-manageengine-desktop-central]]|Zoho CVE-2020-10189|
|2020.03.06|Bleeping Computer| → [[Zoho Fixes No-Auth RCE Zero-Day in ManageEngine Desktop Central|https://www.bleepingcomputer.com/news/security/zoho-fixes-no-auth-rce-zero-day-in-manageengine-desktop-central/]]|Zoho CVE-2020-10189|
|2020.03.06|//Desktop Central//| → [[ManageEngine Desktop Central remote code execution vulnerability (CVE-2020-10189)|https://www.manageengine.com/products/desktop-central/remote-code-execution-vulnerability.html]]|Zoho CVE-2020-10189|
|2020.03.05|//JumpCloud//|[[A Cloud-Based Model for Zero Trust Security|https://jumpcloud.com/blog/cloud-model-zero-trust-security/]]|Zero_Trust|
|2020.03.05|//Menlo Security//|[[Stop Data Exfiltration with Cloud DLP|https://www.menlosecurity.com/blog/stop-data-exfiltration-with-cloud-dlp]]|DLP|
|2020.03.11|Security Boulevard| → [[Report Details Security Threats Posed by Cloud File Services|https://securityboulevard.com/2020/03/report-details-security-threats-posed-by-cloud-file-services/]]|DLP|
|2020.03.05|//Sysdig//|[[GitOps Security with k8s-security-configwatch|https://sysdig.com/blog/gitops-k8s-security-configwatch/]]|Kubernetes|
|2020.03.05|//Microsoft Azure//|[[Azure Sentinel Side-by-Side with Splunk|https://techcommunity.microsoft.com/t5/azure-sentinel/azure-sentinel-side-by-side-with-splunk/ba-p/1211266]]|Azure_Sentinel Splunk|
|2020.03.05|//Vullnerability//|[[670+ Subdomains of Microsoft are Vulnerable to Takeover (Lead to Account Takeover)|https://vullnerability.com/blog/microsoft-subdomain-account-takeover]] ([[vidéo|http://www.youtube.com/watch?v=Jg3mkLm2K2g]])|DNS Attacks|
|2020.03.05|Security Week| → [[Over 600 Microsoft Subdomains Can Be Hijacked: Researchers|https://www.securityweek.com/over-600-microsoft-subdomains-can-be-hijacked-researchers]]|DNS Attacks|
|2020.03.05|Dark Reading| → [[Researchers Find 670+ Microsoft Subdomains Vulnerable to Takeover|https://www.darkreading.com/vulnerabilities---threats/researchers-find-670+-microsoft-subdomains-vulnerable-to-takeover/d/d-id/1337246]]|DNS Attacks|
|>|>|>|!2020.03.04|
|2020.03.04|Silicon[>img[iCSF/flag_fr.png]]|[[Les malfaiteurs derrière les rançongiciels s'attaquent à votre seul moyen de protection : les sauvegardes|https://cyberguerre.numerama.com/3644-les-malfaiteurs-derriere-les-rancongiciels-sattaquent-a-votre-seul-moyen-de-protection-les-sauvegardes.html]]|Ransomware Backups|
|2020.03.04|Container Journal|[[Establishing a Kubernetes Pod Security Policy|https://containerjournal.com/topics/container-security/establishing-a-kubernetes-pod-security-policy/]]|Kubernetes|
|2020.03.04|Solutions Review|[[The 8 Best Cloud Security LinkedIn Groups You Should Join|https://solutionsreview.com/cloud-platforms/the-8-best-cloud-security-linkedin-groups-you-should-join/]]|LinkedIn|
|2020.03.04|//Soluble//|![[Emoji to Zero-Day: Latin Homoglyphs in Domains and Subdomainsy|https://www.soluble.ai/blog/public-disclosure-emoji-to-zero-day]]|DNS IDN_Homograph_Attack|
||Wikipedia| → [[IDN homograph attack|https://en.wikipedia.org/wiki/IDN_homograph_attack]]|DNS IDN_Homograph_Attack|
|2020.03.04|Bleeping Computer| → [[Zero-Day Bug Allowed Attackers to Register Malicious Domains|https://www.bleepingcomputer.com/news/security/zero-day-bug-allowed-attackers-to-register-malicious-domains/]]|DNS IDN_Homograph_Attack|
|2020.03.04|Security Week| → [[A Zero-Day Homograph Domain Name Attack|https://www.securityweek.com/zero-day-homograph-domain-name-attack]]|DNS IDN_Homograph_Attack|
|2020.03.04|Cloud Native Computing Foundation|[[CNCF Survey results are here: Deployments are growing in size and speed as cloud native adoption becomes mainstream|https://www.cncf.io/blog/2020/03/04/2019-cncf-survey-results-are-here-deployments-are-growing-in-size-and-speed-as-cloud-native-adoption-becomes-mainstream/]] '[[rapport|https://www.cncf.io/wp-content/uploads/2020/03/CNCF_Survey_Report.pdf]])|Report CNCF|
|2020.03.09|Jaxcenter| → [[CNCF survey reveals 78% use Kubernetes in production|https://jaxenter.com/kuberetes-cncf-169420.html]]|Report CNCF|
|2020.03.24|DZone| → [[6 Interesting Trends from the Latest CNCF Survey|https://dzone.com/articles/-6-interesting-trends-from-the-latest-cncf-survey]]|Report CNCF|
|2020.03.04|//Cloud Management Insider//|[[Amazon S3 Bucket Security - Don't be the Next Data Breach Headline!|https://www.cloudmanagementinsider.com/amazon-s3-bucket-security/]]|AWS_S3 Data_Leak|
|2020.03.04|//AtScale//|[[79% of Enterprises Want Better Integrated Security and Governance for Their Data in the Cloud|https://www.atscale.com/press/enterprises-security-governance-data-cloud/]] ([[rapport|https://www.atscale.com/resource/2020-big-data-analytics-maturity-survey-report/]])|Survey|
|2020.03.04|//Microsoft//|[[Become a security focused CSP with Microsoft 365 Business|https://techcommunity.microsoft.com/t5/azure-active-directory-identity/become-a-security-focused-csp-with-microsoft-365-business/ba-p/1144690]]|O365 Risks|
|2020.03.04|//Microsoft Azure//|[[Announcing preview of Backup Reports|https://azure.microsoft.com/en-us/blog/announcing-preview-of-backup-reports/]]|Azure Backups|
|2020.03.04|//TrendMicro//|[[Security Risks in Online Coding Platforms|https://blog.trendmicro.com/trendlabs-security-intelligence/security-risks-in-online-coding-platforms/]]|DevSecOps|
|2020.03.04|//TrendMicro//|[[Supply Chain Risk for the 2020s: Cloud and DevOps Under the Microscope|https://vmblog.com/archive/2020/03/04/supply-chain-risk-for-the-2020s-cloud-and-devops-under-the-microscope.aspx]]|Supply_Chain|
|2020.03.04|//eSentire//|[[Applying the 80/20 Rule to Cloud Security|https://www.scmagazine.com/home/advertise/applying-the-80-20-rule-to-cloud-security/]]|Best_Practices|
|2020.03.12|//eSentire//| → [[Applying the 80/20 rule to cloud security|https://www.helpnetsecurity.com/2020/03/12/paretos-principle-cloud-security/]]|Best_Practices|
|2020.03.04|//CloudPassage//|![[API-level Connectivity and Control for IaaS and PaaS: Cloud Workload Security Part 2|https://www.cloudpassage.com/blog/api-level-connectivity-and-control-for-iaas-and-paas/]] (2/2)|APIs|
|2020.03.04|//NCC Group//|[[A Survey of Istio's Network Security Features|https://research.nccgroup.com/2020/03/04/a-survey-of-istios-network-security-features/]]|Service_Mesh|
|>|>|>|!2020.03.03|
|2020.03.03|Silicon[>img[iCSF/flag_fr.png]]|[[Bug Bounty : YesWeHack chasse les failles pour 3DS Outscale|https://www.silicon.fr/bug-bounty-yeswehack-chasse-les-failles-pour-3ds-outscale-335338.html]]|Bug_Bounty Outscale|
|2020.03.03|Bleeping Computer|![[Ransomware Attackers Use Your Cloud Backups Against You|https://www.bleepingcomputer.com/news/security/ransomware-attackers-use-your-cloud-backups-against-you/]]|Ransomware|
|2020.03.03|ZDnet|[[Australian government's certified cloud list to expire come June 30|https://www.zdnet.com/article/australian-governments-certified-cloud-list-to-expire-come-june-30/]]|Australia Government|
|2020.03.03|Security Week|[[Advancing DevSecOps Into the Future|https://www.securityweek.com/advancing-devsecops-future]]|DevSecOps|
|2020.03.05|IT News|[[ASD scraps cloud security certification program|https://www.itnews.com.au/news/asd-scraps-cloud-security-certification-program-538820]]|Australia Government Certification|
|2020.03.04|Technology Decisions| → [[ACSC shutters cloud certification program|https://www.technologydecisions.com.au/content/cloud-and-virtualisation/article/acsc-shutters-cloud-certification-program-1415216250]]|Australia Government Certification|
|2020.03.05|IT News| → [[ASD warned cloud accreditation U-turn jeopardises security, adoption|https://www.itnews.com.au/news/asd-warned-cloud-accreditation-u-turn-jeopardises-security-adoption-538913]]|Australia Government Certification|
|2020.03.05|Federal News Network|[[NIST issuing revised draft of zero trust guidance for public comment|https://federalnewsnetwork.com/march-2020-zero-trust-month/2020/03/nist-issuing-revised-draft-of-zero-trust-guidance-for-public-comment/]]|Zero_Trust NIST|
|2020.03.03|//VMware//[>img[iCSF/flag_fr.png]]|[[VMware et la sécurisation des workloads et réseaux dans le datacenters et Clouds|https://datacenter-magazine.fr/vmware-et-la-securisation-des-workloads-et-reseaux-dans-le-datacenters-et-clouds/]]|Workloads|
|2020.03.03|//Microsoft//|[[Quick wins - single sign-on (SSO) and Multi-Factor Authentication (MFA)|https://www.microsoft.com/security/blog/2020/03/03/single-sign-on-sso-multi-factor-authentication-mfa/]]|Authentication|
|2020.03.03|//BackBlaze//|[[Pathways to the Cloud: Six Tools for Moving Your Files|https://www.backblaze.com/blog/pathways-to-the-cloud/]]|[[Tools|GitHub-Tools]]|
|2020.03.03|//CyberArk Conjur//|[[How Modern Cloud Design Patterns Impact Security|https://www.conjur.org/blog/how-modern-design-patterns-impact-security/]]|Architecture|
|2020.03.03|//JumpCloud//|[[Azure AD Replacement|https://jumpcloud.com/blog/aad-replacement/]]|AzureAD|
|2020.03.03|//XM Cyber//|[[Why Identity and Access Management is the New Public Cloud Perimeter|https://xmcyber.com/why-identity-and-access-management-is-the-new-public-cloud-perimeter/]]|IAM|
|2020.03.03|//Cisco//|[[What is CASB?|https://umbrella.cisco.com/blog/2020/03/03/what-is-casb/]]|CASB|
|>|>|>|!2020.03.02|
|2020.03.02|Computer Weekly|[[Rook 101: Building software-defined containerised storage in Kubernetes|https://www.computerweekly.com/feature/Rook-101-Building-software-defined-containerised-storage-in-Kubernetes]]|Kubernetes|
|2020.03.02|Wachington Post|[[How the cloud has opened new doors for hackers|https://www.washingtonpost.com/technology/2020/03/02/cloud-hack-problems/]]|Risks|
|2020.03.02|Container Jounal|[[IPFS Emerges as Tool to Distribute Container Images|https://containerjournal.com/topics/container-management/ipfs-emerges-as-tool-to-distribute-container-images/]]|Containers Images|
|2020.03.02|//Nuageo//[>img[iCSF/flag_fr.png]]|![[CASB, la nouvelle star de l'écosystème Cloud?|https://www.nuageo.fr/2020/03/casb-star-ecosysteme-cloud/]]|CASB|
|2020.03.02|//Microsoft//|[[Microsoft identity acronyms - what do they mean and how do they relate to each other?|https://www.microsoft.com/security/blog/2020/03/02/microsoft-identity-acronyms-what-they-mean-how-they-relate/]]|IAM|
|2020.03.02|//Google GCP//|[[How to detect and prevent network outages - and stay compliant too|https://cloud.google.com/blog/products/networking/how-to-test-for-and-help-prevent-bad-network-connectivity]]|Outages Prevention|
|2020.03.02|//Alcide//|[[GitOps - A Security Perspective (Part 1)|https://blog.alcide.io/gitops-a-security-perspective]] (1/2)|Kubernetes GitHub|
!Report du Forum Securité@Cloud aux 23 et 24 septembre 2020
[>img(250px,auto)[iCSF/K33AR.jpg]]L'annonce du report est tombée le 3 mars matin...
<<<
//Suite à l'annonce du ministre de la santé de l'annulation de "tous les rassemblements de plus de 5000 personnes en milieu confiné" #coronavirus, nous sommes dans l'obligation de reporter nos #salons @Cloud_WorldExpo @IoTWorldParis1 @SalonMtoM
Nouvelles dates à venir très vite.//
<<<
* Lien ⇒ https://twitter.com/ForumSecuCloud/status/1234753693813219328/


[>img(250px,auto)[iCSF/K34AR.jpg]]...et la nouvelle date annoncée le 4 mars en fin de journée : les ''23 et 24 septembre 2020''.
<<<
//Et voilà, c'est fait  ... nouvelles dates pour les salons
23-24 septembre - Paris Porte de Versailles
D'ici là, on va continuer de vous parler de #sécurité du #Cloud & #IoT, #SecNumCloud bref de #cybersécurité et de #confiance !//
<<<
!"//CSA Summit at RSA 2020 - Recap Part 2//"
[>img(150px,auto)[iCSA/K33BC.jpg]]Article de blog publié le 3 mars 2020 — Rédigé par Frank Guanco, Research Program Manager, CSA
La première partie est accessible [[ici|2020.03.02 - Blog : Retour sur le CSA Summit à RSA 2020 (1/2)]]
<<<
//In this post we'll be exploring the big ideas and takeaways from the afternoon sessions. Several main questions and ideas our afternoon speakers addressed were:
* How are enterprises supposed to prepare for incidents if their service provider is in control of their data?
* Why is there still a shortage of security professionals, and how can we attract and qualify new employees?
* How can organizations improve security training for current employees?
* Who's ultimately responsible for security given inter-country cyberattacks? The private sector or the government?
!!Secure Your IT Transformation
Digital Transformation was in the air as Jay Chaudhry, CEO of Zscaler and Christopher Porter, CISO of Fannie Mae, provided takeaways on this subject via key technologies enabling this transformation like cloud, mobility, the internet's connectivity layer, and the Internet of Things. Emerging trends in digital transformation include 5G having the potential to be the new Local Area Network, Zero Trust Network Access as the new norm for Enterprise Security. Porter shared Fannie Mae's takeaway with digital transformation by pointing out that 'data is new oil' and their lessons learned. Fannie Mae's lessons learned were to drive security into the fabric of your business, a mindset change for infrastructure, and how digital transformation is imperative and is a top-down initiative.
!!Incident Response in the Cloud: Fog of War or Skies Clearing?
In this lively talk by Aravind Swaminathan, Partner Global Co-Chair Cyber, Privacy & Data Innovation at Orrick, Herrington & Sutcliffe brought his perspective on managing inventions through the lens of legal forensics. Considerations such as who can control the environment, the details of the investigation, and risk assurance are of prime importance for negotiating the contract with providers. He stressed the importance of negotiating for what you really want. As he said, 'You won't win every time, but you won't win if you'd don't ask.'
!!Transforming Security for the Clouds
Shannon Lietz brought her expertise and expertise with DevSecOps in this session. From the pipelines of DevOps creating value and availability to DevSecOps creating trust and confidence, determining your key performance indicator can be your metric for world class security. Securability is ephemeral, but this risk reduction is significant and having KPIs and planning with this in mind will benefit your security posture.
!!Collaborating with Security to Enable the Business
During this panel session Jason Garbis (Vice President of Products, AppGate) asked our panelist what sorts of skills they develop in their team, and what they look for when hiring.
Stephen Scharf CSO at DTCC said "I look for intelligence and energy...those two things you can't teach. Do they look like they have mindset that's problem solving... someone that's approaching problems from creative ways."
Towards the end, recapping the most important thing they think security professionals should focus on, Jerry Archer (CISO, Sallie Mae) said:
Security needs to surf the wave...need to have the solution before the business needs it. You want to be out in front of that problem. Security gets to lead that change, build security in from the very beginning. That we get to fulfill the notion of security before everyone starts building on top of it.
!!Building the Next Generation Cybersecurity Workforce
The Co-Founder & Vice President of the International Consortium of Minority Cybersecurity Professionals, Larry Whiteside Jr. asked why there's still a skills shortage in the cybersecurity workforce? His answer was partly that "Cybersecurity professionals are unicorns...you have to think a certain way." But he said that doesn't answer it completely, he stressed that:
* We can't say there's not enough people
* Can say there's too many jobs
* Can't say there's a pipeline if not taking steps
So how do we start taking steps? By partnering with diverse candidates and organizations and increasing training opportunities. Companies should reach out in your local community. Most highschool and college students don't even know this career field exists or that it's an option.
"2020 is the year of action whether it's big or small...we all have a responsibility to take some level of action" - Larry Whiteside Jr.
__Takeaways__
* Be confident there's a problem and a way to solve it
* Talk to HR
* Create a training plan for your team
!!A strategic view of the future of our industry from the incomparable Dan Geer
In this session Dan Geer (Chief Information Security Officer, In-Q-Tel), examined the hard choices we're faced with. He ended his speech admonishing everyone to remember that we can't be passive. Freedom isn't free. You can read his full presentation here.
!!Other articles summarizing the sessions:
You can download this year's summit presentations+++*[here]> https://csacongress.org/event/csa-summit-at-rsa-conference-2020/#home ===. Below are links to articles that were written about several of the sessions at this year's summit.
* Glenn Gerstell:+++*[Government Vs. Private Sector in the New Digital Reality - Journal of Cyber Policy]> === 
* John Yeoh:+++*[Next Cloud Security Challenge: Containers and Kubernetes]> === 
* Dan Geer:+++*[A strategic view of the future of our industry from the incomparable Dan Geer]> http://geer.tinho.net/geer.cloudsecurityalliance.24ii20.txt === 
//[...]
<<<
__Lien :__
* blog original en anglais &Arr; ''[[CloudSecurityAlliance.fr/go/k33b/|https://CloudSecurityAlliance.fr/go/k33b/]]''
* slides présentées : ''[[CloudSecurityAlliance.fr/go/k2op/|https://CloudSecurityAlliance.fr/go/k2op/]]''
** [[Why IAM is the New Perimeter in Public Cloud and How to Govern It|https://cloudsecurityalliance.org/artifacts/why-iam-is-the-new-perimeter-in-public-cloud-and-how-to-govern-it]] par Brian Johnson, CEO & Co-Founder - DivvyCloud
** [[Case Study: Obvious and Not-So Obvious Lessons Learned On the Path to Cloud-First IT|https://cloudsecurityalliance.org/artifacts/case-study-obvious-and-not-so-obvious-lessons-learned-on-the-path-to-cloud-first-it]] par Tony Taylor, CISO - Land O' Lakes | Rajiv Gupta, SVP and GM of Cloud Security - McAfee
** [[Building the Next Generation Cybersecurity Workforce|https://cloudsecurityalliance.org/artifacts/building-the-next-generation-cybersecurity-workforce]] par Larry Whiteside Jr, Founder / Investor/ Veteran CISO
** [[Reinventing the Cloud Assurance with CCAK and CCM|https://cloudsecurityalliance.org/artifacts/reinventing-the-cloud-assurance-with-ccak-and-ccm]] par Daniele Catteddu, Chief Technology Officer - CSA | Shawn Harris, Principal Security Architect - Starbucks Coffee Company 
** [[Transforming Security for the Clouds|https://cloudsecurityalliance.org/artifacts/transforming-security-for-the-clouds]] par Shannon Lietz, Director, Adversary Management - Intuit
** [[The Future of a Secure Digital Transformation|https://cloudsecurityalliance.org/artifacts/the-future-of-a-secure-digital-transformation]] par Jay Chaudhry CEO, Chairman and Founder - Zscaler
!"//CSA Summit at RSA 2020 - Recap Part 1//"
[>img(150px,auto)[iCSA/K32BC.jpg]]Article de blog publié le 2 mars 2020 — Rédigé par Frank Guanco, Research Program Manager, CSA
La deuxième partie est accessible [[ici|2020.03.03 - Blog : Retour sur le CSA Summit à RSA 2020 (2/2)]]
<<<
//CSA was excited to welcome a diverse group of speakers to discuss cloud security and privacy during this year's CSA Summit at RSA Conference 2020. We heard from Glenn Gerstell, Alex Stamos, Phil Venables, Dan Geer and many others. Our speakers addressed the following questions and topics:
* Who's ultimately responsible for security given inter-country cyberattacks? The private sector or the government?
* What can organizations do to prepare and respond to a breach?
* How can we embed security into the business culture?
In this post, we'll be exploring the highlights, key ideas, and big insights from the morning sessions.
!!Cybersecurity as a First Class Business Risk: Challenges and Opportunities
Phil Venables (Board Director, Goldman Sachs Bank and Senior Advisor (Risk and Cybersecurity))
In this opening session of the CSA Summit at RSA Conference 2020, Phil Venables shared insights on security as a business and technology issue and how a culture of security comes from actions. The considerations for executing this is threefold:
* Enterprise integration and how to embed security into the fabric of business decision-making
* Technology integration that involves embedding improvement into technology delivery
* Resilience and recovery through limiting blast radius of events and integrating incident response and operational controls
As security moves towards the future, Venables shared the unique position of those in the industry like the camaraderie of the security community and the higher purpose of security that impacts innovation essential to progress. As the session closed, Venables shared a quote; "We are careening into the future at the speed of light. Relax and enjoy the ride."
You can read more about his session in this article from Infosecurity Magazine+++*[here]> https://www.infosecurity-magazine.com/news/rsac-security-business-technical/ ===.
!!PANEL: Preparing and Responding to a Breach
The panelists focused on the human aspect of breaches and how organizations can prepare their individual employees through proper training. At one point, Diana Kelley, Cybersecurity Field CTO, Microsoft drove home the idea that no one should be exempt from regular trainings.
"Annual or biannual training is for everyone...just because they have a title people don't get exempt from that training" - Diana Kelley, Cybersecurity Field CTO, Microsoft.
Outside of training your internal employees Andy Kirkland (Global Chief Information Security Officer (CISO), Starbucks) emphasized the importance of fourth-party risk and understanding the full extent of how your supply chain works. For instance, what are the shared providers of the providers and attack vectors that come from those?
Ultimately John Yeoh VP or research wrapped up the session by aptly stating that - "You can share responsibility, but can't share accountability."
!!Tech's Failures and a Way Back to Global Competitiveness
In this talk, Alex Stamos from Stanford Internet Observatory, Stanford University, covered some of the core issues behind the techlash and why Silicon Valley has done such a poor job in responding. He also discussed how Silicon Valley could work collectively and with DC to build a durable competitive advantage for US tech.
Read more about his session in this article from Infosecurity magazine+++*[here]> https://www.infosecurity-magazine.com/news/rsac-harms-technology-policies/ ===.
!!We Cannot Afford to Lose the Digital Revolution
As Glenn Gerstell (Former General Counsel, National Security Agency and Central Security Service) presented keynote, he started by sharing the story of NASA astronaut Christina Koch landing in Kazakhstan after almost a year in orbit and the uniqueness of landing in an area that is considered a US rival. This is the state of the new digital reality. Gerstell stated that this is the Fourth Industrial Revolution. Where it is possible for countries to leapfrog another via technology and the strategic implications of this reality.
The balance between the federal government and the private sector in regards to technology is going through rapid change and is of utmost importance in the digital age.
Gerstell noted three critical challenges:
* China as an adversary and partner. That China can harness their private and public sectors to grow national strategic goals.
* Rebalancing the role of the private and public sector where categories like AI and IoT provides ease, but in the wrong hands can wreak havoc.
Ultimately, who bears the responsibility for keeping our nation safe?
You can read more about his session in this article from the Journal of Cyber Policy+++*[here]> https://journalofcyberpolicy.com/2020/02/24/government-vs-private-sector-new-digital-reality/ ===.
Other articles summarizing the sessions:
You can download this year's summit presentations here. Below are links to articles that were written about several of the sessions at this year's summit.
* Phil Venables:+++*[#RSAC: Make Security a Business and a Technical Issue]> https://www.infosecurity-magazine.com/news/rsac-security-business-technical/ === 
* Alex Stamos:+++*[#RSAC: Realize the Harms and Benefits of Technology and Create Policies to Enable the Public]> https://www.infosecurity-magazine.com/news/rsac-harms-technology-policies/ === 
* Highlights:+++*[Cloud Security Alliance 2020 Highlights - Journal of Cyber Policy]> https://journalofcyberpolicy.com/2020/02/25/cloud-security-alliance-2020-highlights/ ===.
//[...]
<<<
__Lien :__
* blog original en anglais &Arr; ''[[CloudSecurityAlliance.fr/go/k32b/|https://CloudSecurityAlliance.fr/go/k32b/]]''
* slides présentées : ''[[CloudSecurityAlliance.fr/go/k2op/|https://CloudSecurityAlliance.fr/go/k2op/]]''
!"//IoT and SMART Nations - Building Resilience//"
[>img(150px,auto)[iCSA/CSAsecUpd.jpg]]Podcast de la série "[[CSA Security Update]]" publié le 2 mars 2020 — Invité : David Mudd, BSI Group 
<<<
//IoT defines the journey of digital technology and data to enable organizations to perform better, boost well-being and respond to local and global challenges - presenting a huge opportunity but risk as well. 
With SMART Cites and SMART Nations emerging, a sustainable, pragmatic approach is necessary, ensuring the people, processes, and systems are secure. With predictions that three-quarters of the world's 9 billion people will be city-dwellers by 2050, it's vital we ensure cities provide a safe and pleasant environment that is sustainable and resilient to change. 
Listen as we interview David Mudd, Global Digital and Connected Product Certification Director with BSI Group and discuss these pressing issues as well as how IoT can make a positive impact on the environment and the business community in general as well as how CSA is working with industry through the development of the CSA IoT Control Matrix.//
<<<
__Liens :__
* Annonce : https://www.buzzsprout.com/303731/2895877-iot-and-smart-nations-building-resilience-guest-david-mudd-bsi-group
* Podcast : https://www.buzzsprout.com/303731/2895877-iot-and-smart-nations-building-resilience-guest-david-mudd-bsi-group.mp3
!!1 - Nouveautés CSA et Informations de la semaine du 24 février au 1er mars 2020
* Blog : Méconnaissance, saut dans l'inconnu et CCAK+++*[»]> <<tiddler [[2020.02.24 - Blog : Méconnaissance, saut dans l'inconnu et CCAK]]>>=== 
* Publication : Bonnes pratiques pour une architecture Microservice+++*[»]> <<tiddler [[2020.02.24 - Publication : Bonnes pratiques pour une architecture Microservices]]>>=== 
* Actu : Nouvelles études de la CSA+++*[»]> <<tiddler [[2020.02.24 - Nouvelles études de la CSA]]>>=== 
* Actu : Nouvelles approches pour l'audit Cloud+++*[»]> <<tiddler [[2020.02.24 - Nouvelles approches pour l'audit Cloud]]>>=== 
* Actu : Appel à contribution pour la conférence [[SECtember]]+++*[»]> <<tiddler [[2020.02.24 - Ouverture prochaine des inscriptions à la conférence SECtember]]>>=== 
!!2 - Veille Web Cloud et Sécurité
La [[Veille Web|2020.03.01 - Veille Hebdomadaire - 1er mars]] avec plus d'une soxantaine de liens dont :
* __Derniers jours :__ Pensez à faire la rotation de certains de vos certificats AWS+++*[»]>
|2020.01.07|//AWS//|![[Urgent & Important - Rotate Your Amazon RDS, Aurora, and Amazon DocumentDB (with MongoDB compatibility) Certificates|https://aws.amazon.com/blogs/aws/urgent-important-rotate-your-amazon-rds-aurora-and-documentdb-certificates/]]|AWS Certificates|
|2020.01.08|CBR Online| → [[AWS to DB Users: Download Fresh Certs Urgently, or Risk Applications Breaking|https://www.cbronline.com/cloud/aws-certificate-update/]]|AWS Certificates|
|2020.01.09|Dark Reading| → [[AWS Issues 'Urgent' Warning for Database Users to Update Certs|https://www.darkreading.com/cloud/aws-issues-urgent-warning-for-database-users-to-update-certs/d/d-id/1336766]]|AWS Certificates|
|2020.01.10|Continuity Central| → [[Amazon AWS warns certain users to update certificates or face lost connectivity |https://www.continuitycentral.com/index.php/news/technology/4780-amazon-aws-warns-certain-users-to-update-certificates-or-face-lost-connectivity]]|AWS Certificates|
=== 
* __À lire :__ Rapports Rezilion+++*[»]>
|2020.02.27|//Rezilion//|![[Only Half of Cloud Vulnerabilities Pose Actual Security Threats, Finds Rezilion Study|https://www.rezilion.com/blog/only-half-of-cloud-vulnerabilities-pose-actual-security-threats-finds-rezilion-study/]] ([[Rapport pdf|https://www.rezilion.com/wp-content/uploads/2019/11/Rezilion-CARTA-Runtime-Vuln-Memory-Analysis-Report.pdf]])|Report Rezilion|
|2020.02.27|Security Week| → [[Less Than Half of Vulnerabilities in Popular Docker Images Pose Risk: Study|https://www.securityweek.com/less-half-vulnerabilities-popular-docker-images-pose-risk-study]]|Report Rezilion|
=== et Sophos+++*[»]>
|2020.02.25|//Sophos//|![['Cloud Snooper' Attack Bypasses Firewall Security Measures|https://news.sophos.com/en-us/2020/02/25/cloud-snooper-attack-bypasses-firewall-security-measures/]] ([[rapport|https://news.sophos.com/wp-content/uploads/2020/02/CloudSnooper_report.pdf]])|Report Attacks|
|2020.02.27|Dark Reading| → [['Cloud Snooper' Attack Circumvents AWS Firewall Controls|https://www.darkreading.com/cloud/cloud-snooper-attack-circumvents-aws-firewall-controls/d/d-id/1337171]]|Report Attacks|
=== 
* Rapports : Firemon+++*[»]>
|2020.02.24|//Firemon//|[[New Research: Nearly 60% of Security Professionals Believe Cloud Deployments Surpass Security Capabilities According to FireMon's 2020 State of Hybrid Cloud Security|https://www.realwire.com/releases/FireMons-2020-State-of-Hybrid-Cloud-Security]] ([[rapport|: https://www.firemon.com/2020-state-of-hybrid-cloud-security-report/]])|Report|
|2020.02.24|Dark Reading| → [[Enterprise Cloud Use Continues to Outpace Security|https://www.darkreading.com/cloud/enterprise-cloud-use-continues-to-outpace-security/d/d-id/1337130]]||
|2020.03.18|The Last Watchdog| → [[FireMon survey shows security lags behind fast pace of hybrid cloud deployments|https://www.lastwatchdog.com/shared-intel-firemon-survey-shows-security-lags-behind-fast-pace-of-hybrid-cloud-deployments/]]|Survey|
===, Thales+++*[»]>
|2020.02.24|//Thales//|[[Organizations Struggle with Cloud Security in the Post Digital Transformation Era - Highlights from our 2020 Data Threat Report-Global Edition|https://blog.thalesesecurity.com/2020/02/24/organizations-struggle-with-cloud-security-in-the-post-digital-transformation-era-highlights-from-our-2020-data-threat-report-global-edition/]] ([[rapport|https://www.thalesesecurity.com/2020/data-threat-report]])|Report|
|2020.02.24|Information Age| → [[Lack of encryption in cloud causing security challenges, says Thales study|https://www.information-age.com/lack-encryption-cloud-causing-security-challenges-thales-study-123487867/]]|Report|
=== 
* Annonces Cloud : Cisco+++*[»]>
|2020.02.24|//Cisco//|[[Cisco SecureX|https://www.cisco.com/c/en/us/products/security/securex.html]]|Products Cisco|
|2020.02.24|Silicon Angle| → [[Cisco unifies cloud security with SecureX|https://siliconangle.com/2020/02/24/cisco-unifies-cloud-security-cisco-securex/]]|Products Cisco|
|2020.02.24|BetaNews| → [[Cisco launches new cloud-native security platform|https://betanews.com/2020/02/24/cisco-securex-cloud/]]|Products Cisco|
===, Google+++*[»]>
|2020.02.24|//Google Cloud//|[[Google Cloud Security: continuing to give good the advantage|https://cloud.google.com/blog/products/identity-security/bringing-the-best-of-google-cloud-security-to-the-enterprise]]|Products GCP|
|2020.02.24|ZDnet| → [[Google Cloud unveils new tools for detecting modern threats|https://www.zdnet.com/article/google-cloud-unveils-new-tools-for-detecting-modern-threats/]]|Products GCP|
|2020.02.24|Silicon Angle| → [[Google beefs up cloud protection with new threat detection, fraud prevention tools|https://siliconangle.com/2020/02/24/google-beefs-cloud-protection-new-threat-detection-fraud-prevention-tools/]]|Products GCP|
===  
* Ransomware+++*[»]>
|2020.02.28|CBR Online|[[Ransomware is Encrypting Backups Too, Warns NCSC: From Cloud, to USB|https://www.cbronline.com/news/ncsc-offline-data-backups-advisory]]|Ransomware Backups|
|2020.02.24|//Divvy Cloud//|[[S3 Bucket Ransomware Attack: What Is It and How Can It Happen?|https://divvycloud.com/s3-bucket-ransomware-attack/]]|Ransomware|
=== 
* Divers : APIs+++*[»]>
|2020.02.27|Journal du Net[>img[iCSF/flag_fr.png]]|[[API Amazon S3 : comment protéger les données de la privatisation des standards d'échange ?|https://www.journaldunet.com/solutions/cloud-computing/1489277-api-s3-comment-proteger-nos-donnees-de-la-privatisation-des-standards-d-echange/]]|APIs|
|2020.02.25|//Google GCP//|[[Now, you can explore Google Cloud APIs with Cloud Code|https://cloud.google.com/blog/products/application-development/how-cloud-code-improves-app-dev-on-gcp]]|GCP APIs|
|2020.02.24|Infosec Institute|[[Secure your APIs - don't give hackers a chance!|https://resources.infosecinstitute.com/secure-your-apis-dont-give-hackers-a-chance/]]|APIs|
===, Fuite de données+++*[»]>
|2020.02.26|The Register|[[Rotherwood Healthcare AWS bucket security fail left elderly patients' DNR choices freely readable online|https://www.theregister.co.uk/2020/02/26/rotherwood_healthcare_data_leak_10k_records_aws/]]|Data_Leak AWS|
===, Gestion d'incident+++*[»]>
|2020.03.01|//AllCloud//|![[Preparing Your Organization for Incident Response on AWS|https://allcloud.io/blog/preparing-your-organization-for-incident-response-on-aws/]]|Incident_Handling AWS|
===, Risques+++*[»]>
|2020.02.25|ISC2|[[White Paper on Cloud Security Risks - And How To Mitigate Them|https://blog.isc2.org/isc2_blog/2020/02/white-paper-on-cloud-security-risks-and-how-to-mitigate-them.html]] ([[livre blanc|https://www.isc2.org/landing/Cloud-Security-Risks]])|Whitepaper ISC2|
=== 
!3 - Weekly Cloud and Security Watch Newsletter[>img[iCSF/inEnglish.png]]
<<tiddler [[2020.03.01 - Weekly Newsletter - March 1st]]>>
!CSA News and Updates - February 24th to March 1st
* Blog: 'The Knowledge Gap, Risk of the Unknown & the Certificate of Cloud Auditing Knowledge'+++*[»]> <<tiddler [[2020.02.24 - Blog : Méconnaissance, saut dans l'inconnu et CCAK]]>>=== 
* Artefact: 'Best Practices in Implementing a Secure Microservices Architecture'+++*[»]> <<tiddler [[2020.02.24 - Publication : Bonnes pratiques pour une architecture Microservices]]>>=== 
* Annoucement: CSA Continues to Drive Leadership in Cloud Security with New Research+++*[»]> <<tiddler [[2020.02.24 - Nouvelles études de la CSA]]>>=== 
* Annoucement: Cloud Security Alliance 2020 Initiatives Changing the Face of IT Audit and Cloud Assurance+++*[»]> <<tiddler [[2020.02.24 - Nouvelles approches pour l'audit Cloud]]>>=== 
* Annoucement: Cloud Security Alliance Opens the Call for Papers for [[SECtember]]+++*[»]> <<tiddler [[2020.02.24 - Ouverture prochaine des inscriptions à la conférence SECtember]]>>=== 
!Cloud and Security News Watch
[[Over 60 links|2020.03.01 - Veille Hebdomadaire - 1er mars]] among which:
* Last days to rotate your Amazon RDS, Aurora, and Amazon DocumentDB (with MongoDB compatibility) Certificates
* Must read reports from Rezilion (only half of cloud vulnerabilities pose actual security threats), and Sophos ('Cloud Snooper' attack which circumvents AWS Firewall controls)
* Other reports from Firemon (Enterprise Cloud use continues to outpace security), and Thales (Lack of encryption in cloud causes security challenge)
* Announcements from Cisco (SecureX), and Google (threat detection and fraud prevention tools)
* Misc: APIs, Data leak prevention, Incident Response, Ransomware, and an ISC2 white paper on Cloud security risks
* Threats: S3 Bucket Ransomware Attack
|ssTabl96|k
|!⇒ [[CloudSecurityAlliance.fr/go/K31/|https://CloudSecurityAlliance.fr/go/K31/]] |
|!Mars|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2020.03.01|
|2020.03.01|//AllCloud//|![[Preparing Your Organization for Incident Response on AWS|https://allcloud.io/blog/preparing-your-organization-for-incident-response-on-aws/]]|Incident_Handling AWS|
|2020.03.01|Cloud Security podcast|[[Docker Security Best practice | Container Security 101 in AWS - Michael Hausenblas, Product Developer Advocate, AWS|https://anchor.fm/cloudsecuritypodcast/episodes/Docker-Security-Best-practice--Container-Security-101-in-AWS---Michael-Hausenblas--Product-Developer-Advocate--AWS-eb5mnj]]|Podcast Docker|
|!Février|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2020.02.28|
|2020.02.28|Cloud Security Podcast|![[Docker Security Best practice - Container Security 101 in AWS|https://anchor.fm/cloudsecuritypodcast/episodes/Docker-Security-Best-practice--Container-Security-101-in-AWS---Michael-Hausenblaus--Product-Developer-Advocate--AWS-eb5mnj]]|Docker Containers|
|2020.02.28|DevOps|[[Castles in the Cloud: How to Take Your Business Kingdom Off-Prem with Confidence|https://devops.com/castles-in-the-cloud-how-to-take-your-business-kingdom-off-prem-with-confidence/]]|Misc|
|2020.02.28|Solutions Review|[[The Top 6 Cloud Security Books You Need to Read in 2020|https://solutionsreview.com/cloud-platforms/the-top-6-cloud-security-books-you-need-to-read-in-2020/]]|Misc|
|2020.02.28|OrissaPOST|[[BGR India hacked, data dumped on Dark Web|https://www.orissapost.com/bgr-india-hacked-data-dumped-on-dark-web/]]|Data_Leak AWS|
|2020.02.28|The Hacker News|[[Why Businesses Should Consider Managed Cloud-Based WAF Protection|https://thehackernews.com/2020/02/cloud-waf-security.html]]|WAF|
|2020.02.28|CIO Magazine|[[Posture management: Cloud security tools rise in wake of breaches|https://www.cio.com/article/3529426/posture-management-cloud-security-tools-rise-in-wake-of-breaches.html]]|CSPM Data_Breaches|
|2020.02.28|//JumpCloud//|[[Understanding Azure AD's Basic/O365 Apps Tier|https://jumpcloud.com/blog/understanding-aad-o365-apps/]] (2/4)|AzureAD|
|2020.02.28|//Catchpoint//|[[Monitoring at the Edge of the Third Act of the Internet|https://blog.catchpoint.com/2020/02/28/monitoring-at-the-edge-of-the-third-act-of-the-internet/]]|Networks|
|>|>|>|!2020.02.27|
|2020.02.27|Silicon.fr[>img[iCSF/flag_fr.png]]|[[Le Cloud est-il vraiment si sûr pour nos données ?|https://www.silicon.fr/avis-expert/le-cloud-est-il-vraiment-si-sur-pour-nos-donnees%e2%80%89]]|Data|
|2020.02.27|Journal du Net[>img[iCSF/flag_fr.png]]|[[API Amazon S3 : comment protéger les données de la privatisation des standards d'échange ?|https://www.journaldunet.com/solutions/cloud-computing/1489277-api-s3-comment-proteger-nos-donnees-de-la-privatisation-des-standards-d-echange/]]|APIs|
|2020.02.27|Security Week|[[Let's Encrypt Issues Over 1 Billion Certificates|https://www.securityweek.com/lets-encrypt-issues-over-1-billion-certificates]]|Certificates|
|2020.02.27|TechRepublic|[[Small cloud configuration mistakes can open up big security risks|https://www.techrepublic.com/article/cloud-misconfigurations-are-a-new-risk-for-the-enterprise/]]|Misconfigurations|
|2020.02.27|Secure Cloud Blog|[[Securing Client Credentials Flow with Certificate|https://securecloud.blog/2020/02/27/securing-client-credentials-flow-with-certificate/]]|Certificates|
|2020.02.27|ZDnet|[[Ransomware victims thought their backups were safe. They were wrong|https://www.zdnet.com/article/ransomware-victims-thought-their-backups-were-safe-they-were-wrong/]]|Ransomware Backups|
|2020.02.28|CBR Online| → [[Ransomware is Encrypting Backups Too, Warns NCSC: From Cloud, to USB|https://www.cbronline.com/news/ncsc-offline-data-backups-advisory]]|Ransomware Backups|
|2020.02.27|ZDnet[>img[iCSF/flag_fr.png]]| → [[Ces victimes de ransomware pensaient que leurs sauvegardes étaient en sécurité. Elles avaient tort|https://www.zdnet.fr/actualites/ces-victimes-de-ransomware-pensaient-que-leurs-sauvegardes-etaient-en-securite-elles-avaient-tort-39899921.htm]]|Ransomware Backups|
|2020.02.27|CSA|[[Continuous auditing and continuous certification|https://www.linkedin.com/pulse/continuous-auditing-certification-alain-pannetrat/]]|STAR|
|2020.02.27|//Maarten Goet//|[[Defender ATP & Linux: trusting Microsoft to protect your open-source workloads|https://medium.com/wortell/defender-atp-linux-trusting-microsoft-to-protect-your-open-source-workloads-cf32a2288a45]]|Workloads Linux|
|2020.02.27|//Rezilion//|![[Only Half of Cloud Vulnerabilities Pose Actual Security Threats, Finds Rezilion Study|https://www.rezilion.com/blog/only-half-of-cloud-vulnerabilities-pose-actual-security-threats-finds-rezilion-study/]] ([[Rapport pdf|https://www.rezilion.com/wp-content/uploads/2019/11/Rezilion-CARTA-Runtime-Vuln-Memory-Analysis-Report.pdf]])|Report Rezilion|
|2020.02.27|Security Week| → [[Less Than Half of Vulnerabilities in Popular Docker Images Pose Risk: Study|https://www.securityweek.com/less-half-vulnerabilities-popular-docker-images-pose-risk-study]]|Report Rezilion|
|2020.02.27|//Securosis//|[[Mastering the Journey - Building Network Manageability and Security for your Path|https://.com/blog/mastering-the-journey-building-network-manageability-and-security-for-your-path]] (3/6)|Misc|
|2020.02.27|//UpGuard//|[[What is the Consensus Assessments Initiative Questionnaire (CAIQ)?|https://www.upguard.com/blog/caiq]]|CAIQ|
|2020.02.27|//ForgeRock//|[[Cloud Series: Building a Secure Identity Cloud|https://www.forgerock.com/blog/cloud-series-building-secure-identity-cloud]]|Identity|
|2020.02.27|//Cloud Academy//|[[5 Steps to Vulnerability Management for Containers|https://cloudacademy.com/blog/5-steps-to-vulnerability-management-for-containers/]]|Containers Vulnerability_Management|
|2020.02.27|//Alcide//|[[Are You a Kubernetes Pros or a Kubernetes Novice?|https://blog.alcide.io/are-you-a-kubernetes-pros-or-a-kubernetes-novice]]|Kubernetes|
|2020.02.27|//HashiCorp//|[[Using an Image Release Process for Security Wins|https://www.hashicorp.com/resources/using-an-image-release-process-for-security-wins]]|AWS Hardening|
|2020.02.27|//Caylent//|[[AWS Transit Gateway Examined – Part II|https://caylent.com/aws-transit-gateway-examined-part-ii]] (2/2)|AWS|
|>|>|>|!2020.02.26|
|2020.02.26|Dark Reading|[[How to Prevent an AWS Cloud Bucket Data Leak|https://www.darkreading.com/application-security/database-security/how-to-prevent-an-aws-cloud-bucket-data-leak--/d/d-id/1337093]]|Data_Leak AWS|
|2020.02.26|The Register|[[Rotherwood Healthcare AWS bucket security fail left elderly patients' DNR choices freely readable online|https://www.theregister.co.uk/2020/02/26/rotherwood_healthcare_data_leak_10k_records_aws/]]|Data_Leak AWS|
|2020.02.26|CISO Mag|[[What Early Adopters Need to Know About SASE|https://www.cisomag.com/how-to-evaluate-a-sase-vendor/]]|SASE|
|2020.02.26|Ozgur Alp|[[Write-up: AWS Document Signing Security Control Bypass|https://medium.com/bugbountywriteup/write-up-aws-document-signing-security-control-bypass-2b13a9c22a4d]]|AWS Document_Signing|
|2020.02.26|//Palo Alto Networks//|[[The Role of Identity Access Management (IAM) in Cloud Security|https://blog.paloaltonetworks.com/2020/02/cloud-iam-security/]]|IAM|
|2020.02.26|//AT&T Cybersecurity//|[[To Address Cloud Security Challenges, Simplify and Unify|https://www.channelfutures.com/from-the-industry/to-address-cloud-security-challenges-simplify-and-unify]]|Misc|
|2020.02.26|//Panther Labs//|![[6 AWS Services for Cloud Security Detection|https://blog.runpanther.io/aws-security-services/]] (5/5)|AWS Detection|
|2020.02.26|//Epsagon//|[[Serverless Open-Source Frameworks: OpenFaaS, Knative, & More|https://epsagon.com/blog/serverless-open-source-frameworks-openfaas-knative-more/]]|Serverless|
|>|>|>|!2020.02.25|
|2020.02.25|Journal du Net[>img[iCSF/flag_fr.png]]|[[Le français InterCloud s'érige en opérateur télécoms des clouds|https://www.journaldunet.com/solutions/cloud-computing/1489191-le-francais-intercloud-s-erige-en-operateur-telecoms-des-clouds/]]|Misc|
|2020.02.25|SilverLining IL|![[Episode 17: How to do penetration testing in cloud application|https://silverlining.media/017-how-to-do-penetration-testing-in-cloud-application/]] ([[mp3|https://silverlining.media/podlove/file/72/s/webplayer/c/episode/silver-lining-17.mp3]])|Podcast Pentesting|
|2020.02.25|Nicolas Fischbach|![[Ensure Your Cloud Security Is as Modern as Your Business|https://www.darkreading.com/cloud/ensure-your-cloud-security-is-as-modern-as-your-business/a/d-id/1337080]]|Recommendations|
|2020.02.25|ISC2|[[White Paper on Cloud Security Risks - And How To Mitigate Them|https://blog.isc2.org/isc2_blog/2020/02/white-paper-on-cloud-security-risks-and-how-to-mitigate-them.html]] ([[livre blanc|https://www.isc2.org/landing/Cloud-Security-Risks]])|Whitepaper ISC2|
|2020.03.30|Help Net Security| → [[Whitepaper: Cloud security risks and how to mitigate them|https://www.helpnetsecurity.com/2020/03/30/whitepaper-cloud-security-risks/]]|Whitepaper ISC2|
|2020.02.25|PenTest IT|[[UPDATE: Prowler 2.2.0|https://pentestit.com/prowler-2-2-0-aws-cis-benchmark-tool-released/]]|[[Tools|Outils-GitHub]] Prowler|
|2020.02.25|Help Net Security|[[Cloud-based collaboration tools are a major driver of data exfiltration|https://www.helpnetsecurity.com/2020/02/25/cloud-based-collaboration-tools/]]|Report Code42|
|2020.02.25|Secure Cloud Blog|[[Microsoft 365 - Security Monitoring|https://securecloud.blog/2020/02/25/microsoft-365-security-monitoring/]]|M365 Monitoring|
|2020.02.25|Cloud Academy|[[Azure Kubernetes Service (AKS): What Is It and Why Do We Use It?|https://cloudacademy.com/blog/azure-kubernetes-service-aks-what-is-it-and-why-do-we-use-it/]]|Kubernetes|
|2020.02.25|Gigamon|[[NetFlow/IPFIX Generation from AWS Cloud|https://blog.gigamon.com/2020/02/25/netflow-ipfix-generation-from-aws-clouds/]]|Networks AWS|
|2020.02.25|Computer Weekly|[[Cloud data leaks compounded by lack of automation tools|https://www.computerweekly.com/news/252479094/Cloud-data-leaks-compounded-by-lack-of-automation-tools]]|Data_Leaks|
|2020.02.25|SecurityBrief|[[New Azure and AWS integration announced amid increasing cyber threats|https://securitybrief.eu/story/new-azure-and-aws-integration-announced-amid-increasing-cyber-threats]]|AWS Azure Integration|
|2020.02.25|//Sophos//|![['Cloud Snooper' Attack Bypasses Firewall Security Measures|https://news.sophos.com/en-us/2020/02/25/cloud-snooper-attack-bypasses-firewall-security-measures/]] ([[rapport|https://news.sophos.com/wp-content/uploads/2020/02/CloudSnooper_report.pdf]])|Report Attacks|
|2020.02.25|//Sophos//| → [[The "Cloud Snooper" malware that sneaks into your Linux servers|https://nakedsecurity.sophos.com/2020/02/25/the-cloud-snooper-malware-that-sneaks-into-your-linux-servers/]]|Report Attacks|
|2020.02.25|//Sophos//| → [[Harden your public cloud environment against APT-style attacks|https://news.sophos.com/en-us/2020/02/25/harden-your-public-cloud-environment-against-apt-style-attacks/]]|APT Attacks|
|2020.02.26|Computer Weekly| → [[Cloud Snooper firewall bypass may be work of nation state|https://www.computerweekly.com/news/252479189/Cloud-Snooper-firewall-bypass-may-be-work-of-nation-state]]|Report Attacks|
|2020.02.27|Dark Reading| → [['Cloud Snooper' Attack Circumvents AWS Firewall Controls|https://www.darkreading.com/cloud/cloud-snooper-attack-circumvents-aws-firewall-controls/d/d-id/1337171]]|Report Attacks|
|2020.03.03|CBR Online| → [[Rootkit in the Cloud: Hacker Group Breaches AWS Servers|https://www.cbronline.com/news/aws-servers-hacked-rootkit-in-the-cloud]]|Report Attacks|
|2020.02.25|//Microsoft//|[[Basic Auth and Exchange Online - February 2020 Update|https://techcommunity.microsoft.com/t5/exchange-team-blog/basic-auth-and-exchange-online-february-2020-update/ba-p/1191282]]|O365|
|2020.02.26|The Register| → [[Admins beware! Microsoft gives heads-up for 'disruptive' changes to authentication in Office 365 email service|https://www.theregister.co.uk/2020/02/26/exchange_online_microsoft/]]|O365|
|2020.02.25|//Google GCP//|[[Now, you can explore Google Cloud APIs with Cloud Code|https://cloud.google.com/blog/products/application-development/how-cloud-code-improves-app-dev-on-gcp]]|GCP APIs|
|2020.02.25|//Lastline//|[[The challenge of obtaining visibility into cloud security|https://betanews.com/2020/02/25/visibility-cloud-security/]]|Visibility|
|>|>|>|!2020.02.24|
|2020.02.24|Marteen Goet|[[Microsoft Threat Protection: going down the rabbit hole|https://medium.com/wortell/microsoft-threat-protection-going-down-the-rabbit-hole-6f917d7c98f]]|Threat_Protection|
|2020.02.24|Dark Reading|[[Solving the Cloud Data Security Conundrum|https://www.darkreading.com/cloud/solving-the-cloud-data-security-conundrum/a/d-id/1337074]]|Enryption|
|2020.02.24|Silicon Angle|[[Kubernetes is popular, complex, a security risk, and destined for invisibility|https://siliconangle.com/2020/02/24/kubernetes-is-popular-complex-a-security-risk-and-destined-for-invisibility-thecube/]]|Kubernetes|
|2020.02.24|SC Magazine|[[Phishers using strong tactics and poor bait in Office 365 scam|https://www.scmagazine.com/home/email-security/phishers-using-strong-tactics-and-poor-bait-in-office-365-scam/]]|O365 Phishing|
|2020.02.24|Infosec Institute|[[Secure your APIs - don't give hackers a chance!|https://resources.infosecinstitute.com/secure-your-apis-dont-give-hackers-a-chance/]]|APIs|
|2020.02.24|arXiv.org[>img[iCSF/flag_fr.png]]|[[Une approche sémantique, efficace et sécurisée de recherche d'information sur des données cryptées du cloud computing|https://arxiv.org/pdf/2002.10294.pdf]] (pdf)|Encryption|
|2020.02.24|//Divvy Cloud//|[[S3 Bucket Ransomware Attack: What Is It and How Can It Happen?|https://divvycloud.com/s3-bucket-ransomware-attack/]]|Ransomware|
|2020.02.24|//StackRox//|[[Top 7 Container Security Use Cases for Kubernetes Environments|https://www.stackrox.com/post/2020/02/top-7-container-security-use-cases-for-kubernetes-environments/]]|Containers|
|2020.02.24|//Google Cloud//|[[Google Cloud Security: continuing to give good the advantage|https://cloud.google.com/blog/products/identity-security/bringing-the-best-of-google-cloud-security-to-the-enterprise]]|Products GCP|
|2020.02.24|ZDnet| → [[Google Cloud unveils new tools for detecting modern threats|https://www.zdnet.com/article/google-cloud-unveils-new-tools-for-detecting-modern-threats/]]|Products GCP|
|2020.02.24|Silicon Angle| → [[Google beefs up cloud protection with new threat detection, fraud prevention tools|https://siliconangle.com/2020/02/24/google-beefs-cloud-protection-new-threat-detection-fraud-prevention-tools/]]|Products GCP|
|2020.02.24|//Firemon//|[[New Research: Nearly 60% of Security Professionals Believe Cloud Deployments Surpass Security Capabilities According to FireMon's 2020 State of Hybrid Cloud Security|https://www.realwire.com/releases/FireMons-2020-State-of-Hybrid-Cloud-Security]] ([[rapport|: https://www.firemon.com/2020-state-of-hybrid-cloud-security-report/]])|Report|
|2020.02.24|Dark Reading| → [[Enterprise Cloud Use Continues to Outpace Security|https://www.darkreading.com/cloud/enterprise-cloud-use-continues-to-outpace-security/d/d-id/1337130]]|
|2020.03.18|The Last Watchdog| → [[FireMon survey shows security lags behind fast pace of hybrid cloud deployments|https://www.lastwatchdog.com/shared-intel-firemon-survey-shows-security-lags-behind-fast-pace-of-hybrid-cloud-deployments/]]|Survey|
|2020.02.24|//Kindite//|[[Cloud Data Protection - Let it Flow|https://blog.kindite.com/cloud-data-protection-let-it-flow]]|Data_Protection|
|2020.02.24|//Gemalto//|[[Testing Cloud application stability using the principles of Chaos Engineering|https://blog.gemalto.com/corporate/2020/02/24/testing-cloud-application-stability-using-the-principles-of-chaos-engineering/]]|Chaos_Engineering|
|2020.02.24|//Cisco//|[[Cisco SecureX|https://www.cisco.com/c/en/us/products/security/securex.html]]|Products Cisco|
|2020.02.24|Silicon Angle| → [[Cisco unifies cloud security with SecureX|https://siliconangle.com/2020/02/24/cisco-unifies-cloud-security-cisco-securex/]]|Products Cisco|
|2020.02.24|BetaNews| → [[Cisco launches new cloud-native security platform|https://betanews.com/2020/02/24/cisco-securex-cloud/]]|Products Cisco|
|2020.02.24|//JumpCloud//|[[Understanding Azure AD's Free Tier|https://jumpcloud.com/blog/understanding-aad-pricing-free/]] (1/4)|AzureAD|
|2020.02.24|//Thales//|[[Organizations Struggle with Cloud Security in the Post Digital Transformation Era - Highlights from our 2020 Data Threat Report-Global Edition|https://blog.thalesesecurity.com/2020/02/24/organizations-struggle-with-cloud-security-in-the-post-digital-transformation-era-highlights-from-our-2020-data-threat-report-global-edition/]] ([[rapport|https://www.thalesesecurity.com/2020/data-threat-report]])|Report|
|2020.02.24|Information Age| → [[Lack of encryption in cloud causing security challenges, says Thales study|https://www.information-age.com/lack-encryption-cloud-causing-security-challenges-thales-study-123487867/]]|Report|
|2020.02.24|//StackRox//|![[Azure Kubernetes (AKS) Security Best Practices Part 3 of 4: Runtime Security|https://www.stackrox.com/post/2020/02/azure-kubernetes-aks-security-best-practices-part-3-of-4/]] (3/4)|Azure Kubernetes Best_Practices|
!"//IT and Cyber Security Challenges in Healthcare Industry//"
[>img(150px,auto)[iCSA/K3VBI.jpg]]^^Article publié le 31 mars 2020 sur le blog de la CSA, après l'avoir été le 24 mars 2020 sur le site de CipherCloud
__Liens :__
⇒ https://cloudsecurityalliance.org/blog/2020/03/31/it-and-cyber-security-challenges-in-healthcare-industry/
⇒ https://www.ciphercloud.com/it-and-cyber-security-challenges-in-healthcare-industry/ ^^



[img(25%,1px)[iCSF/BluePixel.gif]]
!"//Cloud Security Alliance Inks Knowledge Partnership with ConnecTechAsia //"
^^Communiqué de presse publié le 31 mars 2020 par la CSA
Extraits :{{ss2col{
<<<
//The partnership with CSA will highlight key shifts impacting cloud computing users and enterprises
Singapore, March 31, 2020 – Asia's leading Infocomm, Media and Technology event ConnecTechAsia has inked a knowledge partnership deal with the Cloud Security Alliance (CSA), the world's leading organization dedicated to defining standards, certifications and best practices to help ensure a secure cloud computing environment. Under the partnership, CSA will play a key role in boosting event thought leadership by providing relevant and up-to-date insights on cloud computing.
//[...]//
CSA will share more at their annual CSA APAC Summit to be co-located with ConnecTechAsia at Singapore Expo on 1 October 2020. //
<<<
}}}__Lien :__
⇒ https://cloudsecurityalliance.org/press-releases/2020/03/31/cloud-security-alliance-inks-knowledge-partnership-with-connectechasia/ ^^

!"//The Right Questions to Ask Your Vendors in Times of Large-Scale Remote Working//"
[>img(150px,auto)[iCSA/K3QBT.jpg]]^^Article publié le 26 mars 2020 sur le blog de la CSA, après l'avoir été le 9 mars sur le site de Panorays.
Panorays a publié des critères d'évaluation des fournisseurs, répartis en 18 questions dans 4 catégories : généralités, authentification et autorisation, résilience et continuité d'activités, procédure et processus.
&Arr; lire [[l'article|https://CloudSecurityAlliance.fr/go/k3qx/]] sur le blog de la Cloud Security Alliance, ou [[l'original|https://CloudSecurityAlliance.fr/go/k3qz/]]^^

[img(25%,1px)[iCSF/BluePixel.gif]]
!"//Cloud Security for Newly Distributed Engineering Teams//"
[>img(150px,auto)[iCSA/K3NBC.jpg]]^^Article publié le 23 mars 2020 sur le blog de la CSA, après l'avoir été le 19 mars sur le site de Fugue.
&Arr; lire [[l'article|https://CloudSecurityAlliance.fr/go/k3nx/]] sur le blog de la Cloud Security Alliance, ou [[l'original|https://CloudSecurityAlliance.fr/go/k3nz/]]^^


[img(25%,1px)[iCSF/BluePixel.gif]]
!"//New Threat Intelligence Report Reveals the Rise of Emotet//"
[>img(150px,auto)[iCSA/K3GBN.jpg]]^^Article publié le 16 mars 2020 sur le blog de la CSA, après l'avoir été le 25 février sur le site de Mimecast.
&Arr; lire [[l'article|https://CloudSecurityAlliance.fr/go/k3nx/]] sur le blog de la Cloud Security Alliance, ou [[l'original|https://CloudSecurityAlliance.fr/go/k3nz/]]^^


[img(25%,1px)[iCSF/BluePixel.gif]]
!"//California Consumer Privacy Act - 10 Things You Should Know//"
[>img(150px,auto)[iCSA/K3CBC.jpg]]^^Article publié le 12 mars 2020 sur le blog de la CSA, après l'avoir été le 27 décembre 2019 il y a 2,5 mois sur le site de Françoise Gilbert
Les 10 questions traitées sont :// {{ss2col{
<<<
# What is CCPA?
# Who is subject to CCPA?
# What Personal Information is Protected?
# Transparency and Content of Privacy Notices
# Rights Granted to Consumers
# Transfer of Data to an Affiliated Entity
# Contracts with Service Providers and Third Parties
# Enforcement, Class Actions and Financial Risks
# Differences Between CCPA and GDPR
# Does CCPA Applies to Your Business? Most Probably Yes!
<<<
}}}
//&Arr; lire [[l'article|https://CloudSecurityAlliance.fr/go/k3cx/]] sur le blog de la Cloud Security Alliance, ou [[l'original|https://CloudSecurityAlliance.fr/go/k3cz/]]^^

[img(25%,1px)[iCSF/BluePixel.gif]]
!"//CSA's Certificate of Cloud Security Knowledge (CCSK) Is Now an Accepted Ohio TechCred® Credential//"
[>img(400px,auto)[iCSA_/CCSK_banner.jpg]]^^Annonce faite le 11 mars 2020 sur le site de la CSA
<<<
//Ohio program allows employers to upskill their employees' cloud security knowledge, build a stronger, tech-savvy workforce
SEATTLE - March 11, 2020 - The Cloud Security Alliance (CSA), the world's leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today announced that its award-winning Certificate of Cloud Security Knowledge (CCSK) exam has been approved as a covered credential and certification under the Ohio TechCred program.
TechCred is a state-run program that gives employers the chance to upskill current and future employees in today's tech-infused economy by reimbursing them up to $2,000 per credential when current or prospective employees complete an eligible technology-focused credential.//
[...]
<<<
⇒ https://cloudsecurityalliance.org/press-releases/2020/03/11/csa-s-certificate-of-cloud-security-knowledge-ccsk-is-now-an-accepted-ohio-techcred-credential/ ^^

[img(25%,1px)[iCSF/BluePixel.gif]]
!"//CSA's Certificate of Cloud Security Knowledge Named Winner in 16th Annual Info Security PG's 2020 Global Excellence Awards®//"
[>img(400px,auto)[iCSA_/CCSK_banner.jpg]]^^Article publié le 9 mars 2020 sur le blog de la CSA
<<<
//Industry's leading cloud certification program earned Gold
SEATTLE - March 9, 2020 - The Cloud Security Alliance (CSA), the world's leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, announced today that Info Security Products Guide, the industry's leading information security research and advisory guide, has named the Certificate for Cloud Security Knowledge (CCSK) a winner in the 16th Annual 2020 Info Security PG's Global Excellence Awards®. The CCSK earned Gold in the category for Professional Certification Programs. These prestigious global awards recognize cybersecurity and information technology vendors with advanced, ground-breaking products, solutions, and services that are helping set the bar higher for others in all areas of security and technologies.
The CCSK is the first credential dedicated to cloud security. Called the "mother of all cloud computing certifications" by CIO.com, the vendor-neutral CCSK tests for a broad foundation of cloud security knowledge, covering such topics as architecture, governance, compliance, operations, encryption, and virtualization. It serves as the foundation for those seeking to demonstrate a deep-seated knowledge and competency with cyber, information, software and cloud computing infrastructure security. Since it was launched in 2010, thousands of IT and security professionals have upgraded their skillsets and enhanced their careers through CCSK certification.//
[...]
<<<
__Liens :__
⇒ https://cloudsecurityalliance.org/articles/csa-s-certificate-of-cloud-security-knowledge-named-winner-in-16th-annual-info-security-pg-s-2020-global-excellence-awards/
⇒ https://cloudsecurityalliance.org/press-releases/2020/03/09/csa-s-certificate-of-cloud-security-knowledge-named-winner-in-16th-annual-info-security-pg-s-2020-global-excellence-awards/ ^^

[img(25%,1px)[iCSF/BluePixel.gif]]
!"//RSA Conference 2020: Focusing on Human-Centric Security//"
[>img(150px,auto)[iCSA/K36BR.jpg]]^^Article publié le 6 mars 2020 sur le blog de la CSA, après l'avoir été le 2 mars 2020 sur le site de CipherCloud
__Liens :__
⇒ https://cloudsecurityalliance.org/blog/2020/03/06/rsa-conference-2020-wrap-up/
⇒ https://www.ciphercloud.com/rsa-conference-2020-wrap-up-human-centric-security/ ^^
[img(25%,1px)[iCSF/BluePixel.gif]]
!Actualités, Blog, Publications et Veille "Sécurité du Cloud"
<<tiddler fAll2LiTabs13end with: 202002>>
<<tiddler fAll2Tabs10 with: VeilleM","_202002>>
|!Février|!Sources|!Titres et Liens|!Keywords|
|>|>|>|Aucune alerte pour le moment|
[img(25%,1px)[iCSF/BluePixel.gif]]
<<tiddler .ReplaceTiddlerTitle with: [[Alertes et Vulnérabilités - Février 2020]]>>
<<tiddler fAll2LiTabs10 with: NewsL","202002>><<tiddler .ReplaceTiddlerTitle with: [[Newsletters - Février 2020]]>>
<<tiddler .ReplaceTiddlerTitle with: [[Actualités - Février 2020]]>><<tiddler fAll2LiTabs13end with: 'Actu","202002'>>
<<tiddler fAll2LiTabs13end with: 'Blog","202002'>>
[img(25%,1px)[iCSF/BluePixel.gif]]
<<tiddler .ReplaceTiddlerTitle with: [[Blog - Février 2020]]>>
<<tiddler fAll2LiTabs13end with: 'Publ","202002'>>
[img(25%,1px)[iCSF/BluePixel.gif]]
<<tiddler .ReplaceTiddlerTitle with: [[Publications - Février 2020]]>>
!"//How CSA is Working to Address Privacy//"
[>img(150px,auto)[iCSA/K2PBH.jpg]]Article de blog publié le 25 février 2020 — Rédigé par John DiMaria, Assurance Investigatory Fellow, CSA
<<<
//The European Data Protection Board (EDPB) published an+++*[infographic]> https://ec.europa.eu/commission/sites/beta-political/files/190125_gdpr_infographics_v4.pdf === on compliance and enforcement of the GDPR from May 2018 to January 2019. It shows that 95,180 complaints have been made to EU national data protection authorities by individuals who believe their rights under the GDPR have been violated. Two-thirds of the most common of these complaints had to do with telemarketing and promotional emails, which practically every organization uses as the primary tool of communication.
Anyone can file a complaint about anyone else. The question is - how poised is your organization to prove you have a "Standard of Care" in place to protect your organization and have a documented defense in place? As the cloud is a shared high-risk sector, CSA developed a simple yet high-quality way for Cloud Service Providers to evaluate where they are in the compliance process and get detailed feedback from 3rd party legal experts using the CSA GDPR Code of Conduct (COC). CSA established the+++*[CSA GDPR Center of Excellence (CoE)]> https://gdpr.cloudsecurityalliance.org/ === to help organizations improve their privacy posture and achieve compliance with the European General Data Protection Regulation and other global privacy regulations.
!!What is the GDPR Center of Excellence?
The GDPR CoE coordinates CSA's privacy activities globally with the objective of establishing global standards for privacy compliance. The center focuses on cloud computing, IoT and Blockchain, with cloud being the initial focus.
It aims to improve the level of privacy offered to individuals in their use of technology, to increase transparency and accountability, and accelerate the adoption of privacy designed technology services.
The CoE creates a network of technology customers and providers, subject matter experts, and resources with the goal of defining compliance solutions, and awareness and educational material for privacy.
!!What resources does it have to help with privacy in the cloud?
Two documents were produced and currently in practice to help organizations evaluate themselves and ultimately comply with requirements - the+++*[GDPR Code of Conduct]> https://gdpr.cloudsecurityalliance.org/code-of-conduct === and the Privacy Level Agreement (PLA) Code of Practice.
__GDPR Code of Conduct__
The CSA Code of Conduct for GDPR Compliance provides a consistent and comprehensive framework for complying with the EU's GDPR. The CSA Code of Conduct is designed to offer both a compliance tool for GDPR compliance and transparency guidelines regarding the level of data protection offered by the Cloud Service Provider.
__GDPR Code of Conduct (COC) self-assessment on the STAR registry__
The GDPR COC+++*[self-assessment]> https://gdpr.cloudsecurityalliance.org/star-submit === is an evidenced based self-assessment. Your submission is vetted thoroughly by our GDPR experts and once approved, you can file a PLA Code of Conduct (CoC): Statement of Adherence and your organization will be posted on the registry. After publication, your company will receive authorized use of a Compliance Mark, valid for one year. You are then expected to revise your assessment every time there is a change to the company policies or practices related to the service under assessment.
The GDPR COC is still in the self-assessment stage, but a third-party certification will be available as soon as the CSA COC and Certification Mechanism has been approved by the CSAs Data Protection Authority (DPA) (est. Q3).
!!Establish a security-conscious culture.
It makes sense no matter where you fall in the supply chain to take data privacy seriously. The CSA GDPR COC can help you establish a security-conscious culture. GDPR requires organizations to identify their security strategy and adopt adequate administrative and technical measures to protect personal data. Thanks to CSA's research, the CSA GDPR COC provides the roadmap that will facilitate your organization's efforts to ensure, your processes will become more consolidated, ensuring good governance, compliance and prove that all-important due diligence. Additionally, your data will be easier to use, and you will realize an underlying value and ROI.
//[...]//
You can access the GDPR Code of Conduct+++*[here]> https://gdpr.cloudsecurityalliance.org/code-of-conduct ===. The PLA Code of Practice is available+++*[here]> https://gdpr.cloudsecurityalliance.org/code-of-conduct ===.//
<<<
__Lien :__
* blog original en anglais &Arr; ''[[CloudSecurityAlliance.fr/go/k2pb/|https://CloudSecurityAlliance.fr/go/k2pb/]]''
!Best Practices in Implementing a Secure Microservices Architecture
[>img(200px,auto)[iCSA/K2LPC.jpg]]Des conteneurs d'application et une architecture de micro-services sont mis en œuvre pour concevoir, développer et déployer des applications en s'appuyant sur des approches de développement logiciel agiles telles que le DevOps.
La sécurité doit être intégrée dans ces approches de développement de logiciels.
Ce document sert à identifier les bonnes pratiques en matière de sécurité des microservices dans l'ingénierie de systèmes sécurisés fiables à travers le prisme du développeur, de l'opérateur et de l'architecte.

__Table des Matières :__//
<<<
* 1.0 Overview of the Microservices Architecture
* 1.1 Service Oriented Architecture
* 1.2 Comparison between Monolithic and Microservices Architecture
* 1.3 Benefits and Challenges of Microservices
* 2.0 Microservices Architecture for Cloud-Native Applications
* 2.1 Overall Threat Model and Associated Best Practices
* 2.2 Securing the API
* 2.3 Authorization and Access Control for Microservices
* 2.4 Secure Deployment Styles and Strategies in Microservices Architecture
* 2.5 Stateful and Stateless Microservices Security
* 2.6 Container Storage Interfaces
* 2.7 Runtime Security
* 3.0 Microservices Secure Development and Governance
* 3.1 Container Security Best Practices in Microservices
* 3.2 Microservices Detective Controls
* 3.3 Microservices Messaging Patterns
* 3.4 Microservices Governance
* 4.0 Decomposing Monolithic Applications
* 4.1 Microservices: Use Cases
* 4.2 Microservices: Features
* 4.2.1 Microservice Integrity Validation
* 4.3 Monolithic Application Decomposition Best Practices
* Appendix A: Acronyms
* Appendix B: Glossary
* Appendix C: References
<<<
//__Liens :__
* Annonce ⇒ ''[[CloudSecurityAlliance.fr/go/k2om/|https://CloudSecurityAlliance.fr/go/k2om/]]''
* Document (pdf) ⇒ ''[[CloudSecurityAlliance.fr/go/k2on/|https://CloudSecurityAlliance.fr/go/k2on/]]''
!"//The Knowledge Gap, Risk of the Unknown & the Certificate of Cloud Auditing Knowledge//"
[>img(150px,auto)[iCSA/K2OBT.jpg]]Article de blog publié le 24 février 2020 — Rédigé par Daniele Catteddu+++*[»]> https://fr.linkedin.com/in/danielecatteddu [>img[iCSA/DanieleCatteddu.jpg]]===, Chief Technology Officer, CSA 
<<<
//I have a business admin academic background and so I have always approached cybersecurity risk management using those lenses. The more I have looked at the issues in cybersecurity, the more I am convinced that if you want to manage your risk, you need to be able to make informed decisions which requires access to data and information as well as the skills and expertise to analyze and make good sense of it.
Cloud has never been only a change in technology; it has also introduced a new business model around how to produce and consume information and communication (ICT) services. This new business model is heavily permeated with business relationships that deal with untrusted parties (CSPs) that have a vital role for companies, often being the backbone and neural system of the organization.
This creates challenges in:
* Coordinating and integrating internal processes and tools with the third parties' services and products
* Understanding the interdependencies within the supply chain
* Measuring trust and risk
!!Dangers of Interdependence
Referring to the wisdom of Dan Geer, one of my favorite security experts, interdependencies create complexity and complexity is an enemy of security. Complexity hides interdependencies and creates unacknowledged correlated risks, which are almost impossible to manage since they are, like a black swan, unexpected and unpredictable.
!!The real issue isn't reliable data, it's our ability to analyze the data.
When it comes to making informed risk-based decisions, we seem to have enough reliable information to base our decisions on (of course we can always increase the quality of data). Where we are lagging behind, is our analysis and evaluation capabilities; not because our current workforce is not intelligent enough, but rather because there are knowledge and mindset gaps.
''The fact that after almost 15 years of cloud computing, we are still struggling with the shared responsibility model is symptomatic of the nature and magnitude of the problem we are facing.''
Complex supply chains and the shared responsibilities model are at the core of the educational gap we are talking about. Cloud imposed a new governance approach based on indirect control. But as we all know, doing something yourself is not the same as managing someone who will do that for you.
!!It's about being a good manager, not just being a technical expert.
Inside IT teams are often technologists, but not necessarily managers. Because of this, they often miss an accountability mindset. They need to not only understand the technical aspects of their cloud architecture, but also be able to select and manage their vendors by asking them to provide the right evidence to prove they are indeed doing what they claim they will.
In other terms, what the market requires is IT and security professionals who are also practitioners, managers and auditors. They need to be able to identify the right questions to ask third parties both during the vetting process and during the continuous monitoring of the service execution. They need to know how to read the contract and technical documentation made available by the CSPs, understand how to build and manage SLAs, be able to manage compliance, etc. In other words, they need to put themselves in the shoes of security auditor, assessor, or evaluator and develop an auditor mindset.
!!The knowledge gap is also a reflection of an educational offering gap.
The lack of educational offerings in this area has been one of the main reasons that pushed CSA to work on a professional credential for cloud auditing. We want to fill the gap by building a certificate and training that equips the ICT workforce in leading and managing the cloud journey of the company they work for.
!!The Certificate of Cloud Auditing Knowledge (CCAK).
In this CCAK program we'll focus on cloud governance, risk management and compliance. It will ensure participants know CSA's best practices for audit and assessment and understand how to build a cloud auditing program. Our security control framework, the Cloud Control Matrix (CCM), will also be an important component of the body of knowledge.
The education program is meant to:
* Extend existing IS auditor certifications like ISACA CISA and security auditor certifications like ISO27001 Lead Auditor by providing additional expertise on how to assess the cloud and how to build and execute a cloud auditing program.
* Extend existing cloud security certificates like the CCSK by expanding on their curriculum with additional resources on how to govern, assess and evaluate the cloud.
If you are a cloud security expert and/or a security auditor and interested in getting involved in the CCAK development, please reach out to CSA+++*[here]> https://cloudsecurityalliance.org/education/ccak ===.
//[...]
<<<
__Lien :__
* blog original en anglais &Arr; ''[[CloudSecurityAlliance.fr/go/k2ob/|https://CloudSecurityAlliance.fr/go/k2ob/]]''
!"//Cloud Security Alliance 2020 Initiatives Changing the Face of IT Audit and Cloud Assurance//"
<<<
//''Certificate of Cloud Auditing Knowledge and Cloud Controls Matrix v4 represent critical progress to modernize the audit profession and align cloud assurance with technology innovations''

SAN FRANCISCO - FEB. 24, 2020 - RSA CONFERENCE - The Cloud Security Alliance (CSA), the world's leading organization dedicated to defining standards, certifications and best practices to help ensure a secure cloud computing environment, today announced a call for subject-matter experts to support the ongoing review of its flagship document, the ''Cloud Controls Matrix (CCM)'', Version 4 of which will be released later this year. CCM v4 will reflect the current cloud technology landscape, providing cloud users with a better, more comprehensive security framework and guidelines to facilitate both implementation and audit.

Additionally, CSA is pleased to announce that the Certificate of ''Cloud Auditing Knowledge (CCAK)'' subject-matter expert working group has held initial program development meetings and that the CCAK credential and courseware will be previewed at CSA's [[SECtember]] conference (Seattle, Sept. 14-18). The CCAK is a new credential for industry professionals that demonstrates expertise in the essential principles of assessing and auditing cloud computing systems and will be released in the second half of 2020. The CCAK will provide a common baseline of knowledge and shared nomenclature to ensure that IT and security professionals, as well as auditors, have the right expertise and tools to appropriately and accurately understand and measure the effectiveness of cloud security controls.

"For 11 years, the Cloud Security Alliance has led the industry in delivering the necessary innovations to build the trusted cloud ecosystem on a global basis. In 2020, CSA will focus on supporting the cloud community in acquiring the necessary tools, skills, and expertise to ensure that the many iterations of cloud meet robust security and privacy objectives," said 

Daniele Catteddu, Chief Technology Officer, Cloud Security Alliance. "As organizations adopt DevOps, CI/CD, and related innovations, the audit function must keep pace. With the release of CCM and CCAK, we continue to support the community in their cloud journeys."

The Cloud Controls Matrix is the de facto standard in the market. Its latest iteration will include new control objectives in areas such as container and microservices, cryptography, and identity and access management, along with implementation guidance, and will improve upon the auditability of existing controls.

Cloud auditing skills are becoming a mandatory requirement for IT auditors and will become fundamental expertise for any IT manager and professional, especially in the areas of governance, risk management, compliance, and vendor/supply chain management. Traditional IT audit education and certification do not adequately prepare professionals for the challenges cloud provides. Recent breaches demonstrate the knowledge and responsibility gap that comprehensive cloud auditing frameworks such as the CCAK will solve.

Those interested in contributing to the development of the CCAK are encouraged to join the CSA ''Cloud Audit Expert Group''. Group members should be familiar with CSA's best practices and control frameworks, such as the ''Cloud Controls Matrix (CCM)'', the ''Consensus Assessment Initiative Questionnaire (CAIQ)'', and ''CSA STAR levels of assessment'', as well as have knowledge in such key areas as cloud risk management, compliance, continuous auditing, and more. Members will be tasked with reviewing and providing advice on the scope, curriculum, objectives structure, go-to-market, and value proposition for the CCAK.

CSA thanks our corporate member and cloud assurance pioneer, Whistic, for its vision in supporting this initiative as a founding member.// [...]
<<<
&Arr; Lire [[l'annonce|https://CloudSecurityAlliance.fr/go/k2oi/]] sur le site de la CSA.

!"//CSA Continues to Drive Leadership in Cloud Security with New Research//"
<<<
//Latest initiatives serve to steer enterprises on a successful cloud migration journey
SAN FRANCISCO - Feb. 24, 2020 - RSA CONFERENCE 2020 - The Cloud Security Alliance (CSA), the world's leading organization dedicated to defining standards, certifications and best practices to help ensure a secure cloud computing environment, today announced three new publications that further CSA's commitment to helping cloud security professionals successfully steer their enterprises on their journey to the cloud: ''Banking on the Cloud - Real-World Use in the Financial Services Sector'', ''Best Practices in Implementing a Secure Microservices Architecture'', and ''DevSecOps: Collective Responsibility''. Additionally, CSA, in collaboration with McGraw-Hill, announced the release of "CCSK Certificate of Cloud Security Knowledge All-in-One Exam," by CSA-authorized trainer Graham Thompson, as a comprehensive guide to version 4 of the CCSK.
The ''Cloud Usage in the Financial Services Sector'' report provides insight into the banking and finance sectors' real-world use. Most strikingly, the survey, which was conducted by CSA's ''Financial Services Stakeholder Platform (FSSP) Working Group'', found that 91 percent of respondents are actively using cloud services or plan to use them in the next six to nine months - double the number since ''CSA's last financial services sector survey'' four years ago. Among the survey's other key findings:
* The top 25 percent of respondents already have over half their regulated workloads in public cloud services;
* 52 percent of respondents have a formal cloud security policy or standard as part of their overall Enterprise Risk Management Framework (ERMF); and
* 90 percent of respondents have a key management policy applicable to regulated and critical data, and of them, 42 percent require "on-premise" key management for regulated data and 49 percent do so for critical data.
''DevSecOps: Collective Responsibility'' is part of a planned series that will focus on the area of an organization's security posture that is arguably the foundation for all others - collective responsibility. Drafted by CSA and SAFECode, the paper provides a set of considerations that should be taken into account and identifies methods for 1) creating and maintaining executive support and engagement, 2) building an inclusive cultural program based on cumulative experience, 3) creating deep engagement through security champions, and 4) using metrics to sustain, build, and help evolve the program. This paper addresses two key culture-related measurement issues:
* How what you measure drives culture
* The challenge of measuring something as intangible as culture
''Best Practices for Implementing a Secure Microservices Architecture'' provides detailed guidance on secure application development with microservices architectures versus traditional architectures. The design of microservices architecture is intended to address the limitations of traditional application architectures. This technical guidance applies to the secure development and governance of cloud-native applications and the decomposing of applications for the cloud. ''Best Practices for Microservices'' is the third of four releases on the challenges and best practices related to application containers and microservices following ''Challenges in Securing Containers and Microservices'', and ''Best Practices for Implementing Secure Containers''.
"These diverse research projects paint a picture of cloud computing in 2020. Cloud adoption is accelerating within critical infrastructure industries where security is paramount, while organizations are embedding security into state-of-the-art cloud software development," said John Yeoh, Global Vice President of Research at Cloud Security Alliance.
Mastery of CSA research is proven by obtaining the ''Certificate of Cloud Security Knowledge (CCSK)''. CSA is proud to collaborate with McGraw-Hill and announce the release of the "CCSK Certificate of Cloud Security Knowledge All-in-One Exam Guide," written by CSA-authorized trainer Graham Thompson. The book offers exam-focused coverage of the latest cloud technologies, including virtualization, governance and security. Readers will receive real-world examples and best practices, online content that includes access to 120 additional practice questions, and a 10-percent discount code for the CCSK exam. Beyond exam preparation, the book also serves as a valuable on-the-job reference. Available for pre-order now with shipments starting March 13, 2020, the book can be purchased online for $50 through McGraw-Hill.//
[...]
<<<
__Lien :__
* annonce originale en anglais &Arr; ''[[CloudSecurityAlliance.fr/go/k2oa/|https://CloudSecurityAlliance.fr/go/k2oa/]]''
!"//Cloud Security Alliance Opens the Call for Papers for SECtember//"
[>img(300px,auto)[iCSA/202009US-SECtember.png]]L'appel à contribution est ouvert jusqu'au ''1er mai 2020''.
<<<
//''Registration for leading cloud-security event opens March 16''
SAN FRANCISCO - FEB. 24, 2020 - RSA CONFERENCE 2020 - The Cloud Security Alliance (CSA), the world's leading organization dedicated to defining standards, certifications and best practices to help ensure a secure cloud computing environment, today announced the open+++*[Call for Papers]> http://sectember.com/cfp === (CFP) for [[SECtember]], CSA's signature event to be held in Seattle, Sept. 14-18, 2020. [[SECtember]], which represents the intersection of cloud and cybersecurity, is paving the way for future industry education with a focus on the key issues and trends facing cloud and cybersecurity. The CFP is currently open through May 1.

As cloud takes over the computing technology landscape, it is fast becoming the foundation for transforming cybersecurity. [[SECtember]] is assuming the mantle to serve as the model for all future industry education, providing deep dives into technical topics such as state-of-the-art DevSecOps practices, containerization, serverless computing, and critical cloud threat vectors. Notable subject-matter experts will share their insight on a broad scope of industry topics, including global privacy strategies encompassing the General Data Protection Regulations, the California Consumer Privacy Act, and other key mandates.

"SECtember's educational sessions will be characterized by real-world enterprise experiences delivering highly secure and mission critical cloud services. We will prioritize CFP respondents who have 'been there and done that' and have a strong grasp of the cloud security trends to come," said Jim Reavis, co-founder and CEO, Cloud Security Alliance.

The annual event will offer an enhanced roster of training, including the following course line-up:
* ''Certificate of Cloud Security Knowledge (CCSK) Foundation'' (1-day course offered on both Sept. 14 and Sept. 15)
* ''Certificate of Cloud Auditing Knowledge'' (Sept. 15)
* ''Certificate of Cloud Security Knowledge - Plus - Azure'' (Sept. 14-15)
* ''Certificate of Cloud Security Knowledge - Plus - AWS'' (Sept. 14-15)
* ''Advanced Cloud Security Practitioner'' (Sept. 14-15)
[[SECtember]] will also feature numerous opportunities to access to Seattle's leading technology and cybersecurity companies. Executive briefings are being established for organizations and governments seeking to send delegations to maximize the benefits of this unique conference.

Early registration pricing ($995) is available beginning March 16 through May 29, after which rates will increase to $1,195 through Sept. 4. Late pricing rates of $1,495 will go into effect Sept. 5 through Sept. 18.
Visit the+++*[website]> https://sectember.com/ ou https://csacongress.org/event/sectember-2020/ === for more information and to stay up-to-date on the latest event news.//
[...]
<<<
__Liens :__
* annonce originale en anglais &Arr; ''[[CloudSecurityAlliance.fr/go/k2os/|https://CloudSecurityAlliance.fr/go/k2os/]]''
!!1 - Nouveautés CSA et Informations de la semaine du 17 au 23 février 2020
* Blog : Challenges 2020 pour la sécurité du Cloud+++*[»]> <<tiddler [[2020.02.18 - Blog : Challenges 2020 pour la sécurité du Cloud']]>>=== 
* Actu : Appel à contribution pour la conférence [[SECtember]]+++*[»]> <<tiddler [[2020.02.19 - Appel à contribution pour la conférence SECtember]]>>=== 
* Publication : les 6 piliers du DevSecOps : la responsabilité collective+++*[»]> <<tiddler [[2020.02.21 - Publication : les 6 piliers du DevSecOps : la responsabilité collective]]>>=== 
* Publication : Utilisation des Services Cloud dans le Secteur Finance+++*[»]> <<tiddler [[2020.02.21 - Publication : Utilisation des Services Cloud dans le Secteur Finance]]>>=== 
* Blog : Propositions sur l'Intelligence Artificielle par la Maison Blanche+++*[»]> <<tiddler [[2020.02.18 - Blog : Publication de propositions sur l'Intelligence Artificielle par la Maison Blanche]]>>=== 
* Actu : Appel à commentaires sur le document 'Software-Defined Perimeter (SDP) and Zero Trust'+++*[»]> <<tiddler [[2020.02.17 - Appel à commentaires : 'Software-Defined Perimeter (SDP) and Zero Trust']]>>=== 
!!2 - Veille Web Cloud et Sécurité
La [[Veille Web|2020.02.23 - Veille Hebdomadaire - 23 février]] avec plus de 80 liens dont :
* Fuites de données : MGM+++*[»]>
|2020.02.20|ZDnet|[[Exclusive: Details of 10.6 million MGM hotel guests posted on a hacking forum|https://www.zdnet.com/article/exclusive-details-of-10-6-million-of-mgm-hotel-guests-posted-on-a-hacking-forum/]]|DataLeak|
|2020.02.20|Bleeping Computer| → [[Hackers Share Stolen MGM Resorts Guest Database with 10M+ Records|https://www.bleepingcomputer.com/news/security/hackers-share-stolen-mgm-resorts-guest-database-with-10m-records/]]|DataLeak|
|2020.02.20|infoRisk Today| → [[Hackers Post Details on MGM Resorts Guests: Report|https://www.inforisktoday.com/hackers-post-details-on-mgm-resorts-guests-report-a-13743]]|DataLeak|
|2020.02.20|Dark Reading| → [[Personal Info of 10.6M MGM Resort Guests Leaked Online|https://www.darkreading.com/attacks-breaches/personal-info-of-106m-mgm-resort-guests-leaked-online/d/d-id/1337102]]|DataLeak|
===, NextMotion+++*[»]>
|2020.02.19|Cybersecurity Insiders|[[Plastic surgery videos leaked due to misconfigured Amazon Web Services Cloud|https://www.cybersecurity-insiders.com/plastic-surgery-videos-leaked-due-to-misconfigured-amazon-web-services-cloud/]]|Data_Leak|
=== 
* AWS : remédiation+++*[»]>
|2020.02.18|Nathan Getty|[[AWS Automated Remediation - Part 2: S3 Buckets|https://getsec.github.io/2020/02/aws-remedy-2/]] (2/2)|AWS Remediation|
|2020.02.08|Nathan Getty|[[AWS Automated Remediation - Part 1: Security Groups|https://getsec.github.io/2020/02/aws-remedy-1/]] (1/2)|AWS Remediation|
=== 
* Azure : diverses annonces et rapports+++*[»]>
|2020.02.21|Thomas Naunheim|[[Azure AD Tenant Hardening - Considerations of default settings|https://www.cloud-architekt.net/azuread-tenant-hardening-security-settings-considerations/]]|AzureAD|
|2020.02.20|Nino Crudele|![[Azure Reconnaissance and Scanning for Ethical Hackers and Special Ops Team|https://ninocrudele.com/azure-reconnaissance-and-scanning-for-ethical-hackers-and-special-ops-team-free-whitepaper]] ([[rapport|https://ninocrudele.com/wp-content/docs/Azure-Reconnaissance-and-Scanning-for-Ethical-Hackers-and-Special-Ops-Team.pdf]])|Azure PenTesting|
|2020.02.20|//Microsoft Azure//|[[Microsoft Threat Protection Now Generally Available|https://www.securityweek.com/microsoft-threat-protection-now-generally-available]]|Azure Threat_Protection|
|2020.02.20|//Microsoft Azure//|[[Microsoft Threat Protection stops attack sprawl and auto-heals enterprise assets with built-in intelligence and automation|https://www.microsoft.com/security/blog/2020/02/20/microsoft-threat-protection-intelligence-automation/]]|Azure Threat_Protection|
|2020.02.20|Dark Reading| → [[Microsoft Announces General Availability of Threat Protection, Insider Risk Management|https://www.darkreading.com/cloud/microsoft-announces-general-availability-of-threat-protection-insider-risk-management-/d/d-id/1337105]]|Azure Threat_Protection|
|2020.02.20|//Microsoft Azure//|[[Azure Sentinel uncovers the real threats hidden in billions of low fidelity signals|https://www.microsoft.com/security/blog/2020/02/20/azure-sentinel-uncovers-real-threats-hidden-billions-low-fidelity-signals/]]|Azure_Sentinel|
|2020.02.20|//Microsoft Azure//|[[Azure Security Center for IoT RSA 2020 announcements|https://azure.microsoft.com/en-us/blog/azure-security-center-for-iot-rsa-2020-announcements/]]|Azure IoT|
=== 
* Rapports : Barracuda Networks+++*[»]>
|2020.02.20|//Barracuda Networks//|[[New survey indicates security is the top concern restricting faster public cloud adoption|https://www.barracuda.com/news/article/805]] ([[rapport|https://www.barracuda.com/cloud-market]])|Report|
|2020.02.21|Solutions Review| → [[Barracuda: Security and Network Integration are Major Cloud Concerns|https://solutionsreview.com/cloud-platforms/barracuda-security-and-network-integration-are-major-cloud-concerns/]]|Report|
===, Center for Cybersecurity Policy and Law (sur FedRAMP)+++*[»]>
|2020.02.21|Center for Cybersecurity Policy and Law|![[The Future of FedRAMP|https://centerforcybersecuritypolicy.org/the-future-of-fedramp]] ([[rapport PDF|https://static1.squarespace.com/static/5acbb666f407b432519ab15e/t/5e4fd3bf54725e7ce0483940/1582289857151/20-120+Cybersecurity+-+FedRAMP+brochure.pdf]])|FedRAMP Compliance|
|2020.02.21|NextGov| → [[Industry: Include Agencies' Approval of Cloud Service Providers in FISMA Metrics|https://www.nextgov.com/cybersecurity/2020/02/industry-include-agencies-approval-cloud-service-providers-fisma-metrics/163265/]]|FedRAMP Compliance|
===, Code42+++*[»]>
|2020.02.20|//Code42//|[[Code42 Data Exposure Report: Collaborative Work Environments, Dynamic Workforce Exacerbate Insider Threat Problem|https://vmblog.com/archive/2020/02/20/code42-data-exposure-report-collaborative-work-environments-dynamic-workforce-exacerbate-insider-threat-problem.aspx]] ([[rapport|https://www.code42.com/go/2020-data-exposure-report-g/]])|Report Code42|
===, Divvy Cloud+++*[»]>
|2020.02.18|//Divvy Cloud//|[[2020 Cloud Misconfigurations Report|https://divvycloud.com/misconfigurations-report-2020/]] ([[rapport|https://divvycloud.com/wp-content/uploads/2020/02/Cloud-Misconfiguration-Report-FINAL.pdf]])|Report Misconfiguration|
|2020.02.19|//Divvy Cloud//| → [[New DivvyCloud Report Finds Breaches Caused by Cloud Misconfigurations Cost Enterprises Nearly $5 Trillion|https://divvycloud.com/new-divvycloud-misconfigurations-report/]]|Report Misconfiguration|
|2020.02.19|BetaNews| → [[Cloud misconfigurations expose over 33 billion records in two years|https://betanews.com/2020/02/19/cloud-misconfiguration/]]|Report Misconfiguration|
|2020.02.19|TechRepublic| → [[Cloud misconfigurations cost companies nearly $5 trillion|https://www.techrepublic.com/article/cloud-misconfigurations-cost-companies-nearly-5-trillion/]]|Report Misconfiguration|
|2020.02.20|Help Net Security| → [[Cloud misconfigurations surge, organizations need continuous controls|https://www.helpnetsecurity.com/2020/02/20/cloud-misconfigurations/]]|Report Misconfiguration|
|2020.02.21|Enterprise Talk| → [[Cloud Misconfigurations - Losses are Expected to Reach $5tn, Says DivvyCloud|https://enterprisetalk.com/featured/cloud-misconfigurations-losses-are-expected-to-reach-5tn-says-divvycloud/]]|Report Misconfiguration|
===, Imperva+++*[»]>
|2020.02.19|//Imperva//|[[Spikes in High-risk Vulnerabilities and Public Cloud-based Attacks Dominate Threat Landscape, Imperva Researchers Find with New Cyber Threat Index|https://www.imperva.com/company/press_releases/imperva-launches-cyber-threat-index/]] ([[Index|https://www.imperva.com/cyber-threat-index/]])|Report Threat_Index|
|2020.02.21|Help Net Security| → [[High-risk vulnerabilities and public cloud-based attacks on the rise|https://www.helpnetsecurity.com/2020/02/21/high-risk-vulnerabilities-rise/]]|Report|
===, NetSkope+++*[»]>
|2020.02.19|//NetSkope//|[[Cybercriminals Find Cover in the Cloud: New Netskope Research Finds 44% of Threats are Cloud-Enabled|https://www.netskope.com/press-releases/cloud-threat-report]] ([[rapport|https://resources.netskope.com/cloud-reports/cloud-and-threat-report-february-2020-edition]])|Report|
|2020.02.19|Dark Reading| → [[44% of Security Threats Start in the Cloud|https://www.darkreading.com/cloud/44--of-security-threats-start-in-the-cloud/d/d-id/1337088]]|Report|
|2020.02.21|Help Net Security| → [[Cloud-enabled threats are on the rise, sensitive data is moving between cloud apps|https://www.helpnetsecurity.com/2020/02/21/cloud-enabled-threats/]]|Report|
|2020.02.21|Continuity Central| → [[New threat landscape report highlights cyber risk trends|https://www.continuitycentral.com/index.php/news/technology/4902-new-threat-landscape-report-highlights-cyber-risk-trends]]|Report|
|2020.02.21|Solutions Review| → [[Netskope Releases February 2020 Netskope Cloud and Threat Report|https://solutionsreview.com/security-information-event-management/netskope-releases-february-2020-netskope-cloud-and-threat-report/]]|Report|
===, StackRox+++*[»]>
|2020.02.19|//StackRox//|[[5 Surprising Findings from StackRox's Latest Kubernetes Security Report|https://www.stackrox.com/post/2020/02/5-surprising-findings-from-stackroxs-latest-kubernetes-security-report/]] ([[rpport|https://security.stackrox.com/state-of-containers-and-kubernetes-security-report-winter-2020.html]])|Report|
|2020.02.19|Container Journal| → [[StackRox Report Reveals that Container and Kubernetes Security Concerns are Inhibiting Business Innovation|https://containerjournal.com/news/news-releases/stackrox-report-reveals-that-container-and-kubernetes-security-concerns-are-inhibiting-business-innovation/]]|Report|
=== 
* Divers : Chaos Engineering+++*[»]>
|2020.02.18|//CyberArk Conjur//|[[Security Challenges Around Chaos Engineering|https://www.conjur.org/blog/security-challenges-around-chaos-engineering/]]|Chaos_Engineering|
|2020.02.18|//Sensu//|[[Chaos engineering + monitoring, part 2: for starters|https://blog.sensu.io/chaos-engineering-monitoring-part-2-for-starters]] (2/3)|Chaos_Engineering|
|2019.07.02|//Sensu//|[[Chaos engineering + monitoring, part 1: Sensu + Gremlin|https://blog.sensu.io/chaos-engineering-monitoring-part-1-sensu-gremlin]] (1/3)|Chaos_Engineering|
===, IDaaS, responsabilité(s)+++*[»]>
|2020.02.21|//IBM//|[[Making Cloud Security a Team Sport|https://securityintelligence.com/posts/making-cloud-security-a-team-sport/]]|Best_Practices Responsibility|
|2020.02.21|//Core Security//|[[The Shared Responsibility of Cloud Security|https://www.coresecurity.com/blog/shared-responsibility-cloud-security]]|Shared_Responsibility|
=== 
!3 - Weekly Cloud and Security Watch Newsletter[>img[iCSF/inEnglish.png]]
<<tiddler [[2020.02.23 - Weekly Newsletter - February 23rd]]>>
!CSA News and Updates - February 17th to 23rd
* Blog: Cloud Security Challenges in 2020, Proposed Principles for Artificial Intelligence Published by the White House [>img(200px,auto)[iCSF/cloud-security-alliance-fr.png]]
* News: Call for Papers for the [[SECtember]] conference
* Document: The Six Pillars of DevSecOps: Collective Responsibility, Cloud Usage in the Financial Services Sector 
* Request for comments: Software-Defined Perimeter (SDP) and Zero Trust
!Cloud and Security News Watch
[[Over 80 links|2020.02.23 - Veille Hebdomadaire - 23 février]] among which:
* Data leaks: MGM, NextMotion
* AWS: remédiation
* Azure: products and service announcements, report
* Reports: Barracuda Networks, Center for Cybersecurity Policy and Law (sur FedRAMP), Code42, Divvy Cloud, Imperva, NetSkope, StackRox
* Misc: Chaos Engineering», IDaaS, Shared responsibility
|ssTabl96|k
|!⇒ [[CloudSecurityAlliance.fr/go/K2N/|https://CloudSecurityAlliance.fr/go/K2N/]] |
|!Février|!Sources|!Titres et Liens|!Keywords|
|>|>|>|!2020.02.22|
|2020.02.22|Dark Reading|[[All About SASE: What It Is, Why It's Here, How to Use It|https://www.darkreading.com/cloud/all-about-sase-what-it-is-why-its-here-how-to-use-it/d/d-id/1337120]]|SASE|
|>|>|>|!2020.02.21|
|2020.02.21|Thomas Naunheim|[[Azure AD Tenant Hardening - Considerations of default settings|https://www.cloud-architekt.net/azuread-tenant-hardening-security-settings-considerations/]]|AzureAD|
|2020.02.21|IT Business|[[Experts chime in on how to avoid misconfigurations in the cloud|https://www.itbusiness.ca/news/experts-chime-in-on-how-to-avoid-misconfigurations-in-the-cloud/114219]]|Misconfigurations|
|2020.02.21|Computer Weekly|[[Kubernetes storage 101: Container storage basics|https://www.computerweekly.com/feature/Kubernetes-storage-101-Container-storage-basics]]|Storage Kubernetes|
|2020.02.21|Center for Cybersecurity Policy and Law|![[The Future of FedRAMP|https://centerforcybersecuritypolicy.org/the-future-of-fedramp]] ([[rapport PDF|https://static1.squarespace.com/static/5acbb666f407b432519ab15e/t/5e4fd3bf54725e7ce0483940/1582289857151/20-120+Cybersecurity+-+FedRAMP+brochure.pdf]])|FedRAMP Compliance|
|2020.02.21|NextGov| → [[Industry: Include Agencies' Approval of Cloud Service Providers in FISMA Metrics|https://www.nextgov.com/cybersecurity/2020/02/industry-include-agencies-approval-cloud-service-providers-fisma-metrics/163265/]]|FedRAMP Compliance|
|2020.02.21|Ryan Stalets|![[Abusing AWS Architecture and How to Defend It - Ryan Stalets (vidéo)|https://www.youtube.com/watch?v=nEZ4oqn17PE]]|AWS S3 Attacks|
|2020.02.21|Container Journal|[[Container Security Concerns Impacting Deployments|https://containerjournal.com/topics/container-security/container-security-concerns-impacting-deployments/]]|Containers|
|2020.02.21|SANS|![[Cybersecurity in the Age of the Cloud|https://www.sans.org/reading-room/whitepapers/analyst/cybersecurity-age-cloud-39435]]|Context|
|2020.02.21|//IBM//|[[Making Cloud Security a Team Sport|https://securityintelligence.com/posts/making-cloud-security-a-team-sport/]]|Best_Practices Responsibility|
|2020.02.21|//Core Security//|[[The Shared Responsibility of Cloud Security|https://www.coresecurity.com/blog/shared-responsibility-cloud-security]]|Shared_Responsibility|
|2020.02.21|//Capsule8//|[[Container Security - Nobody Knows What It Means But It's Provocative|https://capsule8.com/blog/container-security-nobody-knows-what-it-means-but-its-provocative/]]|Containers|
|2020.02.21|//Compare the Cloud//|[[Solving Surveillance Storage Woes with the Cloud|https://www.comparethecloud.net/articles/cloud/solving-surveillance-storage-woes-with-the-cloud/]]|Storage|
|2020.02.21|//Forcepoint//|[[Visibility is the first step to better cloud security|https://federalnewsnetwork.com/commentary/2020/02/visibility-is-the-first-step-to-better-cloud-security/]]|Visibility|
|2020.02.21|//Sophos//|[[Five steps to avoid a cloud data breach|https://news.sophos.com/en-us/2020/02/21/five-steps-to-avoid-a-cloud-data-breach/]]|Data_Breach Prevention|
|2020.02.21|//AWS//|[[How to define least-privileged permissions for actions called by AWS services|https://aws.amazon.com/blogs/security/how-to-define-least-privileged-permissions-for-actions-called-by-aws-services/]]|AWS Best_Practices|
|>|>|>|!2020.02.20|
|2020.02.20|Nino Crudele|![[Azure Reconnaissance and Scanning for Ethical Hackers and Special Ops Team|https://ninocrudele.com/azure-reconnaissance-and-scanning-for-ethical-hackers-and-special-ops-team-free-whitepaper]] ([[rapport|https://ninocrudele.com/wp-content/docs/Azure-Reconnaissance-and-Scanning-for-Ethical-Hackers-and-Special-Ops-Team.pdf]])|Azure PenTesting|
|2020.02.20|ZDnet|[[Exclusive: Details of 10.6 million MGM hotel guests posted on a hacking forum|https://www.zdnet.com/article/exclusive-details-of-10-6-million-of-mgm-hotel-guests-posted-on-a-hacking-forum/]]|DataLeak|
|2020.02.20|Bleeping Computer| → [[Hackers Share Stolen MGM Resorts Guest Database with 10M+ Records|https://www.bleepingcomputer.com/news/security/hackers-share-stolen-mgm-resorts-guest-database-with-10m-records/]]|DataLeak|
|2020.02.20|infoRisk Today| → [[Hackers Post Details on MGM Resorts Guests: Report|https://www.inforisktoday.com/hackers-post-details-on-mgm-resorts-guests-report-a-13743]]|DataLeak|
|2020.02.20|Dark Reading| → [[Personal Info of 10.6M MGM Resort Guests Leaked Online|https://www.darkreading.com/attacks-breaches/personal-info-of-106m-mgm-resort-guests-leaked-online/d/d-id/1337102]]|DataLeak|
|2020.02.20|Hakin9|[[RANKED: The Countries Most at Risk of Cyber-Crime|https://hakin9.org/ranked-the-countries-most-at-risk-of-cyber-crime/]]|Report|
|2020.02.20|Container Journal|[[Locking Down the Kernel and Securing the Container|https://containerjournal.com/topics/container-security/locking-down-the-kernel-and-securing-the-container/]]|Containers|
|2020.02.20|Cybersecurity Insiders|[[Ransomware Data Recovery on Amazon Cloud/|https://www.cybersecurity-insiders.com/ransomware-data-recovery-on-amazon-cloud/]]|Ransomware|
|2020.02.20|//Shared Assessments//|[[Where Does Your Data Sleep?|https://sharedassessments.org/where-does-your-data-sleep/]]|Data|
|2020.02.20|//WeScale//|[[Istio K8S: Filtrer les IP sources derrière une chaîne de proxies|https://blog.wescale.fr/2020/02/20/istio-k8s/]]|Kubernetes Networks|
|2020.02.20|//Booz Allen//|[[5 Strategies to Secure Cloud Operations Against Today's Cyber Threats|https://www.darkreading.com/cloud/5-strategies-to-secure-cloud-operations-against-todays-cyber-threats/a/d-id/1337033]]|Best_Practices|
|2020.02.20|//Barracuda Networks//|[[New survey indicates security is the top concern restricting faster public cloud adoption|https://www.barracuda.com/news/article/805]] ([[rapport|https://www.barracuda.com/cloud-market]])|Report|
|2020.02.21|Solutions Review| → [[Barracuda: Security and Network Integration are Major Cloud Concerns|https://solutionsreview.com/cloud-platforms/barracuda-security-and-network-integration-are-major-cloud-concerns/]]|Report|
|2020.02.20|//Microsoft Azure//|[[Microsoft Threat Protection Now Generally Available|https://www.securityweek.com/microsoft-threat-protection-now-generally-available]]|Azure Threat_Protection|
|2020.02.20|//Microsoft Azure//|[[Microsoft Threat Protection stops attack sprawl and auto-heals enterprise assets with built-in intelligence and automation|https://www.microsoft.com/security/blog/2020/02/20/microsoft-threat-protection-intelligence-automation/]]|Azure Threat_Protection|
|2020.02.20|Dark Reading| → [[Microsoft Announces General Availability of Threat Protection, Insider Risk Management|https://www.darkreading.com/cloud/microsoft-announces-general-availability-of-threat-protection-insider-risk-management-/d/d-id/1337105]]|Azure Threat_Protection|
|2020.02.20|//Microsoft Azure//|[[Azure Sentinel uncovers the real threats hidden in billions of low fidelity signals|https://www.microsoft.com/security/blog/2020/02/20/azure-sentinel-uncovers-real-threats-hidden-billions-low-fidelity-signals/]]|Azure_Sentinel|
|2020.02.20|//Code42//|[[Code42 Data Exposure Report: Collaborative Work Environments, Dynamic Workforce Exacerbate Insider Threat Problem|https://vmblog.com/archive/2020/02/20/code42-data-exposure-report-collaborative-work-environments-dynamic-workforce-exacerbate-insider-threat-problem.aspx]] ([[rapport|https://www.code42.com/go/2020-data-exposure-report-g/]])|Report Code42|
|2020.02.20|//Microsoft Azure//|[[Azure Security Center for IoT RSA 2020 announcements|https://azure.microsoft.com/en-us/blog/azure-security-center-for-iot-rsa-2020-announcements/]]|Azure IoT|
|2020.02.20|//Google Cloud//|[[Making your monolith more reliable|https://cloud.google.com/blog/products/management-tools/sre-for-single-tiered-software-applications]]|GCP DevOps|
|2020.02.20|//Caylent//|[[Implementing Aqua Security to Secure Kubernetes|https://caylent.com/implementing-aqua-security-to-secure-kubernetes]]|Kubernetes|
|2020.02.20|//Secure Cloud Blog//|[[Hardening SalesForce Integration in Azure Logic Apps + Azure Secure Devops Kit Alignment of Logic Apps|https://securecloud.blog/2020/02/20/hardening-salesforce-integration-in-azure-logic-apps-azure-secure-devops-kit-alignment-of-logic-apps/]]|Hardening|
|2020.02.20|//4SL//|[[Cloud data risk growing warns 4sl|https://ibsintelligence.com/ibs-journal/ibs-news/cloud-data-risk-growing-warns-4sl/]]|Risks|
|2020.02.21|Continuity Central| → [[Take control of cloud backups or risk loss or non-compliance warns 4sl|https://www.continuitycentral.com/index.php/news/erm-news/4904-take-control-of-cloud-backups-or-risk-loss-or-non-compliance-warns-4sl]]|Risks|
|2020.02.20|//Securosis//|[[Defining the Journey - the Four Cloud Adoption Patterns|https://securosis.com/blog/defining-the-journey-the-four-cloud-adoption-patterns]] (2/6)|Misc|
|2020.02.20|//Cloud Academy//|[[Cloud Academy Training Tips|https://cloudacademy.com/blog/training-tips/]]|Training|
|2020.02.20|//Optiv//|[[Container Risks - Gaining Visibility into NIST SP 800-190, Part Six|https://www.optiv.com/blog/container-risks]] (6/6)|
|>|>|>|!2020.02.19|
|2020.02.19|Journal du Net[>img[iCSF/flag_fr.png]]|[[Le cloud en 2020 : l'année du edge, de l'automatisation et des clouds sectoriels|https://www.journaldunet.com/solutions/cloud-computing/1488803-le-cloud-en-2020-l-annee-du-edge-de-l-automatisation-et-des-clouds-propres-a-un-secteur-d-activite/]]|Misc|
|2020.02.19|Computer Weekly|[[Questions raised over Office 365 shared content policy|https://www.computerweekly.com/news/252478758/Questions-raised-over-Office-365-shared-content-policy]]|O365 Privacy|
|2020.02.19|Cybersecurity Insiders|[[Plastic surgery videos leaked due to misconfigured Amazon Web Services Cloud|https://www.cybersecurity-insiders.com/plastic-surgery-videos-leaked-due-to-misconfigured-amazon-web-services-cloud/]]|Data_Leak|
|2020.02.19|Solutions Review|[[What's Changed: 2020 Gartner Magic Quadrant for Cloud Management Platforms|https://solutionsreview.com/cloud-platforms/whats-changed-2020-gartner-magic-quadrant-for-cloud-management-platforms/]]|Market|
|2020.02.19|//Imperva//|[[Spikes in High-risk Vulnerabilities and Public Cloud-based Attacks Dominate Threat Landscape, Imperva Researchers Find with New Cyber Threat Index|https://www.imperva.com/company/press_releases/imperva-launches-cyber-threat-index/]] ([[Index|https://www.imperva.com/cyber-threat-index/]])|Report Threat_Index|
|2020.02.21|Help Net Security| → [[High-risk vulnerabilities and public cloud-based attacks on the rise|https://www.helpnetsecurity.com/2020/02/21/high-risk-vulnerabilities-rise/]]|Report|
|2020.02.19|//StackRox//|[[5 Surprising Findings from StackRox's Latest Kubernetes Security Report|https://www.stackrox.com/post/2020/02/5-surprising-findings-from-stackroxs-latest-kubernetes-security-report/]] ([[rpport|https://security.stackrox.com/state-of-containers-and-kubernetes-security-report-winter-2020.html]])|Report|
|2020.02.19|Container Journal| → [[StackRox Report Reveals that Container and Kubernetes Security Concerns are Inhibiting Business Innovation|https://containerjournal.com/news/news-releases/stackrox-report-reveals-that-container-and-kubernetes-security-concerns-are-inhibiting-business-innovation/]]|Report|
|2020.02.19|//NetSkope//|[[Cybercriminals Find Cover in the Cloud: New Netskope Research Finds 44% of Threats are Cloud-Enabled|https://www.netskope.com/press-releases/cloud-threat-report]] ([[rapport|https://resources.netskope.com/cloud-reports/cloud-and-threat-report-february-2020-edition]])|Report|
|2020.02.19|Dark Reading| → [[44% of Security Threats Start in the Cloud|https://www.darkreading.com/cloud/44--of-security-threats-start-in-the-cloud/d/d-id/1337088]]|Report|
|2020.02.21|Help Net Security| → [[Cloud-enabled threats are on the rise, sensitive data is moving between cloud apps|https://www.helpnetsecurity.com/2020/02/21/cloud-enabled-threats/]]|Report|
|2020.02.21|Continuity Central| → [[New threat landscape report highlights cyber risk trends|https://www.continuitycentral.com/index.php/news/technology/4902-new-threat-landscape-report-highlights-cyber-risk-trends]]|Report|
|2020.02.21|Solutions Review| → [[Netskope Releases February 2020 Netskope Cloud and Threat Report|https://solutionsreview.com/security-information-event-management/netskope-releases-february-2020-netskope-cloud-and-threat-report/]]|Report|
|2020.02.19|//Bitglass//|[[Cloud Security that Performs|https://www.bitglass.com/blog/cloud-security-performance-1]]|Misc|
|2020.02.19|//CoreView//|[[The top four Office 365 security pain points|https://www.helpnetsecurity.com/2020/02/19/o365-security/]]|O365 Recommendations|
|2020.02.19|//SafeBreach//|[[SafeBreach Adds Docker Support to Breach Simulation Platform|https://containerjournal.com/topics/container-security/safebreach-adds-docker-support-to-breach-simulation-platform/]]|Docker Simulation|
|2020.02.19|//Aqua Security//|https//|[[Threat Alert: New Attack Vector Targeting Your Cloud Environment|https://blog.aquasec.com/threat-alert-cloud-computing-security]]|Attack Evasion|
|>|>|>|!2020.02.18|
|2020.02.18|Nathan Getty|[[AWS Automated Remediation - Part 2: S3 Buckets|https://getsec.github.io/2020/02/aws-remedy-2/]] (2/2)|AWS Remediation|
|2020.02.18|CloudAcademy|[[AWS Reserved Instances and Savings Plans: Challenges and Solutions|https://cloudacademy.com/blog/aws-reserved-instances-and-savings-plans-challenges-and-solutions/]]|AWS|
|2020.02.18|Journal du Net[>img[iCSF/flag_fr.png]]|[[OVHcloud vs Scaleway : l'ambition mondiale face au principe de réalité|https://www.journaldunet.com/solutions/cloud-computing/1489051-scaleway-vs-ovhcloud-le-match-des-clouds-francais/]]|Misc|
|2020.02.18|//Zscaler//[>img[iCSF/flag_fr.png]]|[[Nouvelle approche de sécurité SASE : de la nécessité de mettre en place un cloud de transit sécurisé|https://www.informatiquenews.fr/nouvelle-approche-de-securite-sase-de-la-necessite-de-mettre-en-place-un-cloud-de-transit-securisenathan-howe-zscaler-67291]]|SASE|
|2020.02.18|//Microsoft Azure//|[[Advanced multistage attack detection in Azure Sentinel|https://docs.microsoft.com/en-us/azure/sentinel/fusion]]|Azure Sentinel|
|2020.02.18|//Divvy Cloud//|[[2020 Cloud Misconfigurations Report|https://divvycloud.com/misconfigurations-report-2020/]] ([[rapport|https://divvycloud.com/wp-content/uploads/2020/02/Cloud-Misconfiguration-Report-FINAL.pdf]])|Report Misconfiguration|
|2020.02.19|//Divvy Cloud//| → [[New DivvyCloud Report Finds Breaches Caused by Cloud Misconfigurations Cost Enterprises Nearly $5 Trillion|https://divvycloud.com/new-divvycloud-misconfigurations-report/]]|Report Misconfiguration|
|2020.02.19|BetaNews| → [[Cloud misconfigurations expose over 33 billion records in two years|https://betanews.com/2020/02/19/cloud-misconfiguration/]]|Report Misconfiguration|
|2020.02.19|TechRepublic| → [[Cloud misconfigurations cost companies nearly $5 trillion|https://www.techrepublic.com/article/cloud-misconfigurations-cost-companies-nearly-5-trillion/]]|Report Misconfiguration|
|2020.02.19|Computer Weekly| → [[Cost of cloud misconfigurations set at $5tn|https://www.computerweekly.com/news/252478833/Cost-of-cloud-misconfigurations-set-at-5tn]]|Misconfigurations|
|2020.02.20|Help Net Security| → [[Cloud misconfigurations surge, organizations need continuous controls|https://www.helpnetsecurity.com/2020/02/20/cloud-misconfigurations/]]|Report Misconfiguration|
|2020.02.21|Enterprise Talk| → [[Cloud Misconfigurations - Losses are Expected to Reach $5tn, Says DivvyCloud|https://enterprisetalk.com/featured/cloud-misconfigurations-losses-are-expected-to-reach-5tn-says-divvycloud/]]|Report Misconfiguration|
|2020.02.18|//Microsoft Azure//|[[New Azure Firewall certification and features in Q1 CY2020|https://azure.microsoft.com/en-us/blog/new-azure-firewall-certification-and-features-in-q1-cy2020/]]|Azure|
|2020.02.18|//Microsoft Azure//|[[Azure Firewall Manager now supports virtual networks|https://azure.microsoft.com/en-us/blog/azure-firewall-manager-now-supports-virtual-networks/]]|Azure Firewalls|
|2020.02.18|//MalwreBytes Labs//|[[Harnessing the power of identity management (IDaaS) in the cloud|https://blog.malwarebytes.com/explained/2020/02/harnessing-the-power-of-identity-management-idaas-in-the-cloud/]]|IDaaS|
|2020.02.18|//Extreme Networks//|[[7 out of 10 Organizations Have Seen Hacking Attempts via IoT|https://vmblog.com/archive/2020/02/19/7-out-of-10-organizations-have-seen-hacking-attempts-via-iot.aspx]] ([[report|https://www.extremenetworks.com/resources/white-paper/extreme-networks-security-survey-results/]])|Report|
|2020.02.18|//eXemplify//|[[Critical Questions for Evaluating Cloud Managed Services Providers|http://www.exemplifygroup.com/critical-questions-for-evaluating-cloud-managed-services-providers/]]|MSSPs|
|2020.02.18|//CyberArk Conjur//|[[Security Challenges Around Chaos Engineering|https://www.conjur.org/blog/security-challenges-around-chaos-engineering/]]|Chaos_Engineering|
|2020.02.18|//Sensu//|[[Chaos engineering + monitoring, part 2: for starters|https://blog.sensu.io/chaos-engineering-monitoring-part-2-for-starters]] (2/3)|Chaos_Engineering|
|>|>|>|!2020.02.17|
|2020.02.17|Help Net Security|[[Three API security risks in the wake of the Facebook breach|https://www.helpnetsecurity.com/2020/02/17/api-security-facebook-breach/]]|APIs Attacks|
|2020.02.17|Techtarget|[[Cloud key to top 2019 data backup and disaster recovery products|https://searchdatabackup.techtarget.com/feature/Cloud-key-to-top-2019-data-backup-and-disaster-recovery-products]]|BCP DRP|
|2020.02.17|CommsMEA|[[Surge in cloud usage drives steep rise in cybersecurity spending|https://www.commsmea.com/business/trends/21419-surge-in-cloud-usage-drives-steep-rise-in-cybersecurity-spending]]|Market|
|2020.02.17|//Securosis//|[[Your Cloud Journeys is Unique, but Not Unknown|https://securosis.com/blog/your-cloud-journeys-is-unique-but-not-unknown]] (1/6)|Public_Cloud|
|2020.02.17|//JumpCloud//|[[One User Account for Both AWS and GCP|https://jumpcloud.com/blog/one-account-aws-gcp/]]|Authentication AWS GCP|
|2020.01.17|//Talent Jump//|[[CLAMBLING - A New Backdoor Base On Dropbox (EN)|http://www.talent-jump.com/article/2020/02/17/CLAMBLING-A-New-Backdoor-Base-On-Dropbox-en/]]|Dropbox Attack|
|2020.01.17|//CipherCloud//|[[Get a grip on data in Box and beyond - for compliance sake|https://www.ciphercloud.com/get-a-grip-on-data-in-box-and-beyond-for-compliance-sake/]]|Data_Protection CASB|
|2020.01.17|//Not So Secure//|[[Hacking AWS Cognito Misconfigurations|https://www.notsosecure.com/hacking-aws-cognito-misconfigurations/]]|AWS Misconfigurations|
!The Six Pillars of DevSecOps: Collective Responsibility [>img(150px,auto)[iCSA/K2LPT.jpg]]
<<<
//The DevSecOps Working Group identified and defined six focus areas critical to integrating DevSecOps into an organization, in accordance with the six pillars described in CSA's Reflexive Security Framework.
More detailed research and guidance across each of the six pillars of DevSecOps will be revisited and established over time in order to maintain industry specific standards.
This paper is part of a planned series and will focus on the area that is arguably the foundation for all others - collective responsibility.
Fostering a sense of collective security responsibility is not only an essential element of driving security into a DevOps environment, but it is also one of the most challenging.
It requires cultivating a change to the organization's mindset, its ideas and its customs and behaviors regarding software security.
In this paper, we refer to this effort as building a security-supportive culture.//
<<<
__Table des Matières :__//
<<<
* Introduction
* Overview
* Executive Support and Engagement
* Program Design and Implementation
* Bringing Champions to the Challenge
* Reinforcing the Program through Security Awareness and Training
* Program Sustainment and Measurement
* Summary
* Appendix I: Healthy Questions and Discussion Points
* Appendix II: Further Reading
<<<
//__Liens :__
* Annonce ⇒ ''[[CloudSecurityAlliance.fr/go/k2lp/|https://CloudSecurityAlliance.fr/go/k2lp/]]''
* Document (pdf) ⇒ ''[[CloudSecurityAlliance.fr/go/k2ld/|https://CloudSecurityAlliance.fr/go/k2ld/]]''
[img(50%,1px)[iCSF/BluePixel.gif]]
!Cloud Usage in the Financial Services Sector [>img(150px,auto)[iCSA/K2LPC.jpg]]
<<<
//This survey was created and completed by members of the the Financial Services Stakeholders Platform, a CSA working group whose main objective is to identify and share the challenges, risks and best practices for the development, deployment and management of secure cloud services in the financial services industry. The goal of this survey was to analyze the level of adoption of cloud solutions and requirements from financial institutions' perspectives;
In administering the survey, the Cloud Security Alliance's intention was to take the temperature of cloud computing in the financial sector and provide guidance to accelerate adoption of secure cloud services. These takeaways will inform the Financial Services working group and serve as actionable items to address the concerns and opportunities associated with cloud computing and financial services.
This study analyzed the cloud usage of financial institutions across three main areas of interest: security concerns, regulatory requirements, and governance aspects.
The Cloud Security Alliance is a not-for-profit organization with a mission to widely promote best practices for ensuring cyber security in cloud computing and IT technologies. CSA is also tasked with educating various stakeholders within these industries about security concerns in all other forms of computing. CSA's membership is comprised of a broad coalition of industry practitioners, corporations, and professional associations. One of CSA's primary goals is to conduct surveys that assess information security trends. These surveys help gauge the maturity of information security technology at various points in the industry, as well as the rate of adoption of security best practices.//
<<<
__Table des Matières :__//
<<<
* Introduction
* Survey Participant Demographics
* Current Cloud Use by Participants
* Key Cloud Concerns & Challenges
* Technical Controls: Key Management
* Risk Management: Policy, Assessmen