Simulating Cloud Misconfiguration Attacks: S3 Exploits on AWS

If you use Amazon Web Services (AWS), chances are the S3 object storage service gets a lot of use. It’s easy to use, extremely reliable, and incredibly popular. But it’s also a service that’s easy to get wrong, and data breaches related to S3 misconfigurations have become all too commonplace. 

Join Josh Stella, co-founder & CTO of Fugue, as he conducts a live simulation of various tactics bad actors use to exploit cloud resource misconfigurations to find and extract sensitive data in S3 buckets. 

In this webinar, you’ll learn:

  • The types of AWS misconfigurations that can result in an S3 data breach
  • How black hat hackers exploit these misconfigurations to access and extract data
  • Immediate, actionable steps you can take to improve the security of data in S3



Sign Up For This Live Simulation

I’m seeing a lot of cloud configuration errors in the real world —and it’s scaring the hell out of me.

David Linthicum Chief Cloud Strategy Officer, Deloitte Consulting

david-l