Securing production databases on AWS is a top priority for cloud and security teams, but less attention is paid to preventing the kinds of alternative attack vectors we've seen in the news recently. One scenario involves building new databases from backup snapshots to steal data without detection.
In this session, Wayne Crissman, Fugue's Director of Security, demonstrate these exploits live against his own AWS environment.
- How malicious actors can exploit data without directly accessing databases
- How encrypted data can be accessed with IAM privilege escalation
- How you can assess and improve your security posture against such attacks