<?xml version="1.0" encoding="UTF-8" ?> <rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel> <title>unicrons.cloud</title><link>https://unicrons.cloud/en/</link><atom:link href="https://unicrons.cloud/en/feed.xml" rel="self" type="application/rss+xml" /> <language>en</language> <pubDate>Tue, 31 Mar 2026 06:31:02 -0000</pubDate> <lastBuildDate>Tue, 31 Mar 2026 06:31:02 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.9</generator> <image> <url>None</url> <title>unicrons.cloud</title> <link>https://unicrons.cloud/en/</link> </image> <item> <title>WriteUp: Cloud Village CTF DEFCON 33</title> <author>Andoni Alonso</author> <description>&lt;h1&gt;WriteUp: Cloud Village CTF DEFCON 33&lt;/h1&gt; &lt;p&gt;Once again, we couldn&#39;t resist the call of a CTF scoreboard! 🎯 This time, we participated in the &lt;a href=&#34;https://www.cloud-village.org/dc33&#34;&gt;Cloud Village CTF at DEFCON 33&lt;/a&gt;.&lt;/p&gt; &lt;figure markdown&gt; ![Cloud Village CTF](../assets/images/writeup-cloud-village-ctf-2025/ctf.png){ width=&#34;500&#34; } &lt;/figure&gt; &lt;p&gt;We managed to solve &lt;strong&gt;13 out of 25 challenges&lt;/strong&gt; and secured a &lt;strong&gt;Top 10 finish&lt;/strong&gt; out of 146 teams! :material-podium:&lt;/p&gt;</description> <link>https://unicrons.cloud/en/2025/08/31/writeup-cloud-village-ctf-defcon-33/</link> <pubDate>Sun, 31 Aug 2025 00:00:00 +0000</pubDate> <source url="https://unicrons.cloud/en/feed.xml">unicrons.cloud</source><guid isPermaLink="true">https://unicrons.cloud/en/2025/08/31/writeup-cloud-village-ctf-defcon-33/</guid> </item> <item> <title>WriteUp: Cloud Security Championship #2 - Contain Me If You Can</title> <author>Andoni Alonso</author> <author>Samuel Burgos</author> <description>&lt;p&gt;The second challenge of the &lt;a href=&#34;https://cloudsecuritychampionship.com/&#34;&gt;Cloud Security Championship organized by Wiz&lt;/a&gt; is called &lt;em&gt;Contain Me If You Can&lt;/em&gt;. This time we need to escape from a containerized environment to retrieve the flag located at &lt;code&gt;/flag&lt;/code&gt; on the host&#39;s filesystem.&lt;/p&gt; &lt;figure markdown&gt; ![Contain Me If You Can](../assets/images/writeup-cloudsecuritychampionship-2/contain-me-if-you-can.png){ width=&#34;550&#34; } [Cloud Security Championship #2](https://cloudsecuritychampionship.com/challenge/2) &lt;/figure&gt;</description> <link>https://unicrons.cloud/en/2025/08/15/writeup-cloud-security-championship-2---contain-me-if-you-can/</link> <pubDate>Fri, 15 Aug 2025 00:00:00 +0000</pubDate> <source url="https://unicrons.cloud/en/feed.xml">unicrons.cloud</source><guid isPermaLink="true">https://unicrons.cloud/en/2025/08/15/writeup-cloud-security-championship-2---contain-me-if-you-can/</guid> </item> <item> <title>WriteUp: Cloud Security Championship #1 - Perimeter Leak</title> <author>Samuel Burgos</author> <author>Andoni Alonso</author> <description>&lt;p&gt;The &lt;a href=&#34;wiz.io/blog/the-ultimate-cloud-security-championship-12-months-x-12-challenges&#34;&gt;Cloud Security Championship organized by Wiz&lt;/a&gt; has launched its first challenge. Over the next 12 months, they will be publishing different challenges, each prepared by one of their researchers.&lt;/p&gt; &lt;p&gt;This first challenge is called &lt;em&gt;Perimeter Leak&lt;/em&gt; and tells us that we must find a secret in an S3 bucket.&lt;/p&gt; &lt;figure markdown&gt; ![Perimeter Leak](../assets/images/writeup-cloudsecuritychampionship-1/perimeter-leak.png){ width=&#34;550&#34; } [Cloud Security Championship #1](https://cloudsecuritychampionship.com/challenge/1) &lt;/figure&gt;</description> <link>https://unicrons.cloud/en/2025/07/01/writeup-cloud-security-championship-1---perimeter-leak/</link> <pubDate>Tue, 01 Jul 2025 00:00:00 +0000</pubDate> <source url="https://unicrons.cloud/en/feed.xml">unicrons.cloud</source><guid isPermaLink="true">https://unicrons.cloud/en/2025/07/01/writeup-cloud-security-championship-1---perimeter-leak/</guid> </item> <item> <title>aws-root-manager: A tool to manage root access in your AWS organization</title> <author>Samuel Burgos</author> <author>Andoni Alonso</author> <description>&lt;h1&gt;&lt;code&gt;aws-root-manager&lt;/code&gt;: Manage AWS root access in your organization&lt;/h1&gt; &lt;p&gt;In AWS, managing &lt;em&gt;root&lt;/em&gt; credentials has always been a friction point for organization administrators. Every time a new account was created, we had to configure MFA for &lt;em&gt;root&lt;/em&gt; access following &lt;a href=&#34;https://docs.aws.amazon.com/accounts/latest/reference/getting-started.html&#34;&gt;best practices&lt;/a&gt; and the &lt;a href=&#34;https://maturitymodel.security.aws.dev/en/1.-quickwins/root-protection/&#34;&gt;maturity model&lt;/a&gt;. However, enabling MFA is a manual step, and with AWS Organizations, this problem scaled. We could ignore it, apply an SCP to &lt;a href=&#34;https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_scps_examples_general.html#example-scp-root-user&#34;&gt;block actions performed with the root user&lt;/a&gt;, and deal with the failed check reported by all security tools.&lt;/p&gt; &lt;p&gt;In 2023, AWS announced that MFA would become mandatory, and the time is near. On &lt;strong&gt;March 24&lt;/strong&gt;, 2025, registering an MFA will be required when using the &lt;em&gt;root&lt;/em&gt; user.&lt;/p&gt; &lt;p&gt;To address this issue, on November 15, 2024, AWS &lt;a href=&#34;https://docs.aws.amazon.com/IAM/latest/UserGuide/id_root-enable-root-access.html&#34;&gt;announced&lt;/a&gt; a new feature that allows centralized &lt;em&gt;root&lt;/em&gt; access management within an organization without having to manually intervene in each account. However, if we have a large number of accounts, performing the actions one by one is not the most convenient approach.&lt;/p&gt; &lt;p&gt;To simplify this management, we have created &lt;a href=&#34;https://github.com/unicrons/aws-root-manager&#34;&gt;&lt;code&gt;aws-root-manager&lt;/code&gt; :simple-github:&lt;/a&gt;, a tool that efficiently and automatically manages the state of &lt;em&gt;root&lt;/em&gt; credentials across all accounts in an organization.&lt;/p&gt; &lt;figure markdown&gt; ![logo](../assets/images/aws-root-manager/logo.png){ width=&#34;200&#34;} &lt;/figure&gt;</description> <link>https://unicrons.cloud/en/2025/03/21/aws-root-manager-a-tool-to-manage-root-access-in-your-aws-organization/</link> <pubDate>Fri, 21 Mar 2025 00:00:00 +0000</pubDate> <source url="https://unicrons.cloud/en/feed.xml">unicrons.cloud</source><guid isPermaLink="true">https://unicrons.cloud/en/2025/03/21/aws-root-manager-a-tool-to-manage-root-access-in-your-aws-organization/</guid> </item> <item> <title>IAM policy mishaps: Case 2 - SNS</title> <author>Samuel Burgos</author> <author>Andoni Alonso</author> <description>&lt;h1&gt;IAM policy mishaps: Case 2 - SNS&lt;/h1&gt; &lt;p&gt;Did you think we had forgotten about the IAM series? Well, you were right. Sorry for the delay, but here we are again.&lt;/p&gt; &lt;p&gt;Today, we are going to talk about &lt;strong&gt;Amazon Simple Notification Service (SNS)&lt;/strong&gt;.&lt;/p&gt; &lt;p&gt;!!! info Demo Repository Remember that if you want to try the examples we are presenting, check out our &lt;a href=&#34;https://github.com/unicrons/iam-mishaps-demo&#34; target=&#34;_blank&#34;&gt;repo :simple-github:&lt;/a&gt;.&lt;/p&gt; &lt;pre&gt;&lt;code&gt;We have prepared the different scenarios in Terraform :simple-terraform:. &lt;/code&gt;&lt;/pre&gt;</description> <link>https://unicrons.cloud/en/2025/02/21/iam-policy-mishaps-case-2---sns/</link> <pubDate>Fri, 21 Feb 2025 00:00:00 +0000</pubDate> <source url="https://unicrons.cloud/en/feed.xml">unicrons.cloud</source><guid isPermaLink="true">https://unicrons.cloud/en/2025/02/21/iam-policy-mishaps-case-2---sns/</guid> </item> <item> <title>Import your Powerpipe results into AWS SecurityHub</title> <author>Samuel Burgos</author> <author>Andoni Alonso</author> <description>&lt;p&gt;Continuing with what we saw in &lt;a href=&#34;./steampipe-config-generator.md&#34;&gt;Automate your Steampipe AWS configuration with AWS Organizations&lt;/a&gt;, we have developed a &lt;a href=&#34;https://github.com/unicrons/powerpipe-securityhub-importer&#34;&gt;&lt;strong&gt;powerpipe-securityhub-importer&lt;/strong&gt; :simple-github:&lt;/a&gt; to import the results of your controls in AWS SecurityHub.&lt;/p&gt; &lt;p&gt;&lt;a href=&#34;https://powerpipe.io/&#34;&gt;Powerpipe&lt;/a&gt; allows us to run &lt;em&gt;benchmarks&lt;/em&gt; that, through &lt;a href=&#34;https://steampipe.io/&#34;&gt;Steampipe&lt;/a&gt;, provide us with the results of our controls.&lt;/p&gt; &lt;figure markdown&gt; ![architecture](../assets/images/powerpipe-securityhub-importer/flow.png#only-light) ![architecture](../assets/images/powerpipe-securityhub-importer/flow_dark.png#only-dark) &lt;/figure&gt;</description> <link>https://unicrons.cloud/en/2024/10/18/import-your-powerpipe-results-into-aws-securityhub/</link> <pubDate>Fri, 18 Oct 2024 00:00:00 +0000</pubDate> <source url="https://unicrons.cloud/en/feed.xml">unicrons.cloud</source><guid isPermaLink="true">https://unicrons.cloud/en/2024/10/18/import-your-powerpipe-results-into-aws-securityhub/</guid> </item> <item> <title>Automate your Steampipe AWS configuration with AWS Organizations</title> <author>Samuel Burgos</author> <author>Andoni Alonso</author> <description>&lt;p&gt;This time we bring you our first public &lt;em&gt;tool&lt;/em&gt;!&lt;/p&gt; &lt;p&gt;If you use &lt;a href=&#34;https://steampipe.io/&#34;&gt;Steampipe&lt;/a&gt; with your AWS organization, this will interest you. We have built this &lt;em&gt;tool&lt;/em&gt; to automate the creation and maintenance of the configuration files necessary to work with all the accounts in an AWS organization.&lt;/p&gt; &lt;figure markdown&gt; ![architecture](../assets/images/steampipe-config-generator/flow.png#only-light) ![architecture](../assets/images/steampipe-config-generator/flow_dark.png#only-dark) &lt;/figure&gt;</description> <link>https://unicrons.cloud/en/2024/10/18/automate-your-steampipe-aws-configuration-with-aws-organizations/</link> <pubDate>Fri, 18 Oct 2024 00:00:00 +0000</pubDate> <source url="https://unicrons.cloud/en/feed.xml">unicrons.cloud</source><guid isPermaLink="true">https://unicrons.cloud/en/2024/10/18/automate-your-steampipe-aws-configuration-with-aws-organizations/</guid> </item> <item> <title>Deploy IAM Roles across an AWS Organization as code</title> <author>Samuel Burgos</author> <author>Andoni Alonso</author> <description>&lt;p&gt;In environments with multiple AWS accounts, managing roles can be a challenge. AWS IAM offers us a robust solution for managing roles within each account, but when it comes to consistently implementing roles across all accounts in an organization, the task can become complex.&lt;/p&gt; &lt;p&gt;In this post, we will see how to automatically deploy IAM roles across all accounts in an AWS organization as code, using CloudFormation, Organizations, and Terraform.&lt;/p&gt; &lt;figure markdown&gt; ![architecture](../assets/images/aws-organization-roles/architecture.png#only-light) ![architecture](../assets/images/aws-organization-roles/architecture_dark.png#only-dark) &lt;/figure&gt;</description> <link>https://unicrons.cloud/en/2024/10/14/deploy-iam-roles-across-an-aws-organization-as-code/</link> <pubDate>Mon, 14 Oct 2024 00:00:00 +0000</pubDate> <source url="https://unicrons.cloud/en/feed.xml">unicrons.cloud</source><guid isPermaLink="true">https://unicrons.cloud/en/2024/10/14/deploy-iam-roles-across-an-aws-organization-as-code/</guid> </item> <item> <title>WriteUp: Cloud Village CTF 2024</title> <author>Samuel Burgos</author> <author>Andoni Alonso</author> <description>&lt;p&gt;You know we can&#39;t resist anything with a &lt;em&gt;scoreboard&lt;/em&gt; and related to the cloud... And neither distance nor time zones were going to stop us from giving a shot at the CTF organized by &lt;a href=&#34;https://x.com/cloudvillage_dc&#34;&gt;Cloud Village&lt;/a&gt; at #DEFCON32 last weekend.&lt;/p&gt; &lt;figure markdown&gt; ![CTF Cloud Village](../assets/images/writeup-cloud-village-ctf-2024/ctf-presentation.png){ width=&#34;450&#34; } [ctf.cloud-village.org](https://ctf.cloud-village.org/) &lt;/figure&gt;</description> <link>https://unicrons.cloud/en/2024/08/13/writeup-cloud-village-ctf-2024/</link> <pubDate>Tue, 13 Aug 2024 00:00:00 +0000</pubDate> <source url="https://unicrons.cloud/en/feed.xml">unicrons.cloud</source><guid isPermaLink="true">https://unicrons.cloud/en/2024/08/13/writeup-cloud-village-ctf-2024/</guid> </item> <item> <title>IAM policy mishaps: Case 1 - S3</title> <author>Samuel Burgos</author> <author>Andoni Alonso</author> <description>&lt;h1&gt;IAM policy mishaps: Case 1 - S3&lt;/h1&gt; &lt;p&gt;Continuing with the series of posts related to IAM &lt;em&gt;misconfigurations&lt;/em&gt;, we are going to delve a bit into its use focused on the &lt;strong&gt;AWS S3&lt;/strong&gt; service.&lt;/p&gt; &lt;p&gt;To do this, we will look at the different ways we can control the security of the service and how dangerous it is to apply a policy without clearly understanding what it does.&lt;/p&gt; &lt;p&gt;!!! info Demo repository If you want to directly try the examples we are going to present, take a look at our &lt;a href=&#34;https://github.com/unicrons/iam-mishaps-demo&#34; target=&#34;_blank&#34;&gt;repo :simple-github:&lt;/a&gt;.&lt;/p&gt; &lt;pre&gt;&lt;code&gt;We have prepared different scenarios in Terraform :simple-terraform:. &lt;/code&gt;&lt;/pre&gt;</description> <link>https://unicrons.cloud/en/2024/06/01/iam-policy-mishaps-case-1---s3/</link> <pubDate>Sat, 01 Jun 2024 00:00:00 +0000</pubDate> <source url="https://unicrons.cloud/en/feed.xml">unicrons.cloud</source><guid isPermaLink="true">https://unicrons.cloud/en/2024/06/01/iam-policy-mishaps-case-1---s3/</guid> </item> <item> <title>IAM policy mishaps: Intro to IAM</title> <author>Samuel Burgos</author> <author>Andoni Alonso</author> <description>&lt;h1&gt;IAM policy mishaps: Intro to IAM&lt;/h1&gt; &lt;p&gt;This post is based on the introduction of the talk &lt;code&gt;IAM policy mishaps: A cautionary tale of cloud misconfigurations&lt;/code&gt; that we presented on Saturday, January 27th, at &lt;a href=&#34;https://sh3llcon.es/&#34;&gt;&lt;strong&gt;Sh3llCON&lt;/strong&gt;&lt;/a&gt; (Reinosa). It is going to be the first in a series about IAM &lt;em&gt;misconfigurations&lt;/em&gt; (yes, unfortunately, it&#39;s a topic that provides enough material for a series).&lt;/p&gt;</description> <link>https://unicrons.cloud/en/2024/02/20/iam-policy-mishaps-intro-to-iam/</link> <pubDate>Tue, 20 Feb 2024 00:00:00 +0000</pubDate> <source url="https://unicrons.cloud/en/feed.xml">unicrons.cloud</source><guid isPermaLink="true">https://unicrons.cloud/en/2024/02/20/iam-policy-mishaps-intro-to-iam/</guid> </item> </channel> </rss>