Chris Farris, Cloud Security Nerd at Turbot, joins Corey on Screaming in the Cloud to discuss the latest events in cloud security, which leads to an interesting analysis from Chris on how legal departments obscure valuable information that could lead to fewer security failures in the name of protecting company liability, and what the future of accountability for security failures looks like. Chris and Corey also discuss the newest dangers in cloud security and billing practices, and Chris describes his upcoming cloud security conference, fwd:cloudsec.
Chris Farris has been in the IT field since 1994 primarily focused on Linux, networking, and security. For the last 8 years, he has focused on public-cloud and public-cloud security. He has built and evolved multiple cloud security programs for major media companies, focusing on enabling the broader security team’s objectives of secure design, incident response and vulnerability management. He has developed cloud security standards and baselines to provide risk-based guidance to development and operations teams. As a practitioner, he’s architected and implemented multiple serverless and traditional cloud applications focused on deployment, security, operations, and financial modeling.
Chris now does cloud security research for Turbot and evangelizes for the open source tool Steampipe. He is one of the organizers of the fwd:cloudsec conference (https://fwdcloudsec.org) and has given multiple presentations at AWS conferences and BSides events.
When not building things with AWS’s building blocks, he enjoys building Legos with his kid and figuring out what interesting part of the globe to travel to next. He opines on security and technology on Mastodon, Twitter and his website https://www.chrisfarris.com
Announcer: Hello, and welcome to Screaming in the Cloud with your host, Chief Cloud Economist at The Duckbill Group, Corey Quinn. This weekly show features conversations with people doing interesting work in the world of cloud, thoughtful commentary on the state of the technical world, and ridiculous titles for which Corey refuses to apologize. This is Screaming in the Cloud.
Corey: Welcome to Screaming in the Cloud
. I’m Corey Quinn and we are here today to learn exciting things, steal exciting secrets, and make big trouble for Moose and Squirrel. Maybe that’s the podcast; maybe that’s the KGB, we’re not entirely sure. But I am joined once again by Chris Farris, cloud security nerd at Turbot
, which I will insist on pronouncing as ‘Turbo.’ Chris, thanks for coming back.
Chris: Thanks for having me.
Corey: So, it’s been a little while and it’s been an uneventful time in cloud security with nothing particularly noteworthy happening, not a whole lot of things to point out, and honestly, we’re just sort of scraping the bottom of the barrel for news… is what I wish I could say, but it isn’t true. Instead, it’s, “Oh, let’s see what disastrous tire fire we have encountered this week.” What’s top of mind for you as we record this?
Chris: I think the most interesting one I thought was, you know, going back and seeing the guilty plea from Nickolas Sharp, who formerly was an employee at Ubiquiti and apparently had, like, complete access to everything there and then ran amok with it.
Chris: The details that were buried at the time in the indictment, but came out in the press releases were he was leveraging root keys, he was leveraging lifecycle policies to suppress the CloudTrail logs. And then of course, you know, just doing dumb things like exfiltrating all of this data from his home IP address, or exfiltrating it from his home through a VPN, which have accidentally dropped and then exposed his home IP address. Oops.
Corey: There’s so much to dive into there because I am not in any way shape or form, saying that what he did was good, or I endorse any of those things. And yeah, I think he belongs in prison for what he did; let’s be very clear on this. But I personally did not have a business relationship with him. I am, however, Ubiquiti’s customer. And after—whether it was an insider threat or whether it was someone external breaching them, Krebs On Security wound up doing a whole write-up on this and was single-sourcing some stuff from the person who it turned out, did this.
And they made a lot of hay about this. They sued him at one point via some terrible law firm that’s entire brand is suing media companies. And yeah, just wonderful, wonderful optics there and brilliant plan. But I don’t care about the sourcing. I don’t care about the exact accuracy of the reporting because what I’m seeing here is that what is not disputed is this person, who whether they were an employee or not was beside the point, deleted all of the audit logs and then as a customer of Ubiquiti, I received an email saying, “We have no indication or evidence that any customer data was misappropriated.” Yeah, you just turn off your logs and yeah, you could say that always and forever and save money on logging costs. [unintelligible 00:03:28] best practice just dropped, I guess. Clowns.
Chris: So, yeah. And there’s definitely, like, compliance and standards and everything else that say you turn on your logs and you protect your logs, and service control policies should have been able to detect that. If they had a security operations center, you know, the fact that somebody was using root keys should have been setting off red flags and causing escalations to occur. And that wasn’t happening.
Corey: My business partner and I have access to our AWS org, and when I was setting this stuff up for what we do here, at a very small company, neither of us can log in with root credentials without alarms going off that alert the other. Not that I don’t trust the man; let’s be very clear here. We both own the company.
Chris: In business together. Yes.
Corey: Ri—exactly. It is, in many ways, like a marriage in that one of us can absolutely ruin the other without a whole lot of effort. But there’s still the idea of separation of duties, visibility into what’s going on, and we don’t use root API keys. Let me further point out that we are not pushing anything that requires you to send data to us. We’re not providing a service that is software powered to people, much less one that is built around security. So, how is it that I have a better security posture than Ubiquiti?
Chris: You understand AWS and in-depth cloud better. You know, it really comes down to how do you, as an AWS customer, understand all of the moving parts, all of the security tooling, all of the different ways that something can happen. And Amazon will say, “Well, it’s in the documentation,” but you know, they have, what, 357 services? Are you reading the security pages of all of those? So, user education, I agree, you should have, and I have on all of my accounts, if anything pops up, if any IAM change happens, I’m getting text messages. Which is great if my account got compromised, but is really annoying when I’m actually making a change and my phone is blowing up.
Corey: Yeah. It’s worth pointing out as well that yes, Ubiquiti is publicly traded—that is understood and accepted—however, 93% of it is owned by their CEO-founder god-king. So, it is effectively one person’s personal fiefdom. And I tend to take a very dim view as a direct result. When you’re in cloud and you have suffered a breach, you have severely screwed something up somewhere. These breaches are never, “Someone stole a whole bunch of drives out of an AWS data center.” You have misconfigured something somewhere. And lashing out at people who reported on it is just a bad look.
Chris: Definitely. Only error—now, of course, part of the problem here is that our legal system encourages people to not come forward and say, “I screwed up. Here’s how I screwed up. Everybody come learn from my mistakes.” The legal professions are also there to manage risk for the company and they’re like, “Don’t say anything. Don’t say anything. Don’t even tell the government. Don’t say anything.”
Whereas we all need to learn from these errors. Which is why I think every time I do see a breach or I do see an indictment, I start diving into it to learn more. I did a blog post on some of the things that happened with Drizly and GitHub, and you know, I think the most interesting thing that came out of Drizly case was the ex-CEO of Drizly, who was CEO at the time of the breach, now has following him, for the rest of his life, an FTC order that says he must implement a security program wherever he goes and works. You know, I don’t know what happens when he becomes a Starbucks barista or whatever, but that is on him. That is not on the company; that is on him.
And I do think that, you know, we will start seeing more and more chief executive officers, chief security or information security officers becoming accountable to—or for the breaches and being personally accountable or professionally accountable for it. I think we kind of need it, even though, you know, there’s only so much a CISO can do.
Corey: One of the things that I did when I started consulting independently on AWS bills back in 2016 was, while I was looking at customer environments, I also would do a quick check for a few security baseline things. And I stopped doing it because I kept encountering a bunch of things that needed attention and it completely derailed the entire stated purpose of the engagement. And, frankly, I don’t want to be running a security consultancy. There’s a reason I focus on AWS bills. And people think I’m kidding, but I swear to you I’m not, when I say that the reason is in part because no one has a middle-of-the-night billing emergency. It is strictly a business-hours problem. Whereas with security, wake up.
In fact, the one time I have been woken up in the middle of the night by a customer phone call, they were freaking out because it was a security incident and their bill had just pegged through the stratosphere. It’s, “Cool. Fix the security problem first, then we’ll worry about the bill during business hours. Bye.” And then I stopped leaving my phone off of Do Not Disturb at night.
Chris: Your AWS bill is one of your indicators of compromise. Keep an eye on it.
Corey: Oh, absolutely. We’ve had multiple engagements discover security issues on that. “So, what are these instances in Australia doing?” “We don’t have anything there.” “I believe you’re being sincere when you say this.”
Chris: “Last month, you’re at $1,000 and this month, you’re at $50,000. And oh, by the way, it’s the ninth, so you might want to go look at that.”
Corey: Here’s the problem that you start seeing in large-scale companies though. You or I wind up posting our IAM credentials on GitHub somewhere in public—and I do this from time to time, intentionally with absolutely no permissions attached to a thing—and I started look at the timeline of, “Okay 3, 2, 1, go,” with the push and now I start counting. What happens? At what time does the quarantine policy apply? When do I get an email alert? When do people start trying to exploit it? From where are they trying to exploit it?
It’s a really interesting thing to look into, just from the position of how this stuff all fits together and works. And that’s great, but there’s a whole ‘nother piece to it where if you or I were to do such a thing and actually give it admin credentials, okay, my, I don’t know, what, $50, $100 a month account that I use for a lot of my test stuff now starts getting charged enormous piles of money that winds up looking like a mortgage in San Francisco, I’m going to notice that. But if you have a company that spending, I don’t know, between ten and $20 million a month, do you have any idea how much Bitcoin you’ve got to be mining in that account to even make a slight dent in the overall trajectory of those accounts?
Chris: In the overall bill, a lot. And in a particularly mismanaged account, my experience is you will notice it if you’re monitoring billing anomalies on a per-account basis. I think it’s important to note, you talked about that quarantine policy. If you look at what actually Amazon drops a deny on, it’s effectively start EC2 instances and change IAM policies. It doesn’t prevent anybody from listing all your buckets and exfiltrating all your data. It doesn’t prevent anybody from firing up Lambdas and other less commonly used resources. Don’t assume oh, Amazon dropped the quarantine policy. I’m safe.
Corey: I was talking to somebody who spends $4 a month on S3 and they wound up suddenly getting $60 grand a day and Lambda charges, because max out the Lambda concurrency in every region and set it to mine crypto for 15 minutes apiece, yeah, you’ll spend $60,000 a day to get, what $500 in crypto. But it’s super economical as long as it’s in someone else’s account. And then Amazon hits them with a straight face on these things, where, “Please pay the bill.” Which is horrifying when there’s several orders of magnitude difference between your normal bill and what happens post-breach. But what I did my whole post on “17 Ways to Run Containers on AWS,” followed by “17 More Ways to Run Containers on AWS,” and [unintelligible 00:12:00] about three services away from having a third one ready to go on that, the point is not, “Too many ways to run containers,” because yes, that is true and it’s also amusing to me—less so to the containers team at AWS which does not have a sense of humor or sense of self-awareness of which they have been alerted—and fine, but every time you’re running a container, it is a way to turn it into a crypto mining operation, in some way shape or form, which means there are almost 40-some-odd services now that can reasonably be used to spin up cryptocurrency mining. And that is the best-case breach scenario in a bunch of ways. It costs a bunch of money and things to clean up, but ‘we lost customer data.’ That can destroy companies.
Chris: Here’s the worst part. Crypto mining is no longer profitable even when I’ve got stolen API keys because bitcoin’s in the toilet. So, now they are going after different things. Actually, the most recent one is they look to see if your account is out of the SCS sandbox and if so, they go back to the tried-and-true way of doing internet scams, which is email spam.
Corey: For me, having worked in operations for a very long time, I’ve been in situations where I worked at Expensify and had access to customer data there. I have worked in other finance companies—I worked at Blackrock. Where I work now, I have access to customer billing data. And let me be serious here for a second, I take all of these things seriously, but I also in all of those roles slept pretty well at night. The one that kept me up was a brief stint I did as the Director of Tech Ops at Grindr over ten years ago because unlike the stuff where I’m spending the rest of my career and my time now, it’s not just money anymore.
Whereas today, if I get popped, someone can get access to what a bunch of companies are paying AWS. It’s scandalous, and I will be sued into oblivion and my company will not exist anymore and I will have a cloud hanging over my head forever. So, I have to be serious about it—
Chris: But nobody will die.
Corey: Nobody dies. Whereas, “Oh, this person is on Grindr and they’re not out publicly,” or they live in a jurisdiction where that is punishable by imprisonment or death, you have blood on your hands, on some level, and I have never wanted that kind of responsibility.
Chris: Yeah. It’s reasonably scary. I’ve always been happy to say that, you know, the worst thing that I had to do was keep the Russians off CNN and my friends from downloading Rick and Morty.
Corey: Exactly. It’s, “Oh, heavens, you’re winding up costing some giant conglomerate somewhere theoretical money on streaming subscriptions.” It’s not material to the state of the world. And part of it, too, is—what’s always informed my approach to things is, I’m not a data hoarder in the way that it seems our entire industry is. For the Last Week in AWS newsletter, the data that I collect and track is pretty freaking small.
It’s, “You want to sign up for the lastweekinaws.com
newsletter. Great, I need your email address.” I don’t need your name, I don’t need the company you work at. You want to give me a tagged email address? Fine. You want to give me some special address that goes through some anonymizing thing? Terrific. I need to know where I’m sending the newsletter. And then I run a query on that for metrics sometimes, which is this really sophisticated database query called a count. How many subscribers do I have at any given point because that matters to our sponsors. But can we get—you give us any demographic? No, I cannot. I can’t. I have people who [unintelligible 00:15:43] follow up surveys sometimes and that’s it.
Chris: And you’re able to make money doing that. You don’t have to collect, okay, you know, Chris’s zip code is this and Bob’s zip code is that and Frank’s zip code is the other thing.
Chris: Or job titles, or you know, our mother’s maiden name or anything else like that.
Corey: I talk about what’s going on in the world of AWS, so it sort of seems to me that if you’re reading this stuff every week, either because of the humor or in spite of the humor, you probably are in a position where services and goods tied to that ecosystem would be well-received by you or one of the other 32,000 people who happen to be reading the newsletter or listening to the podcast or et cetera, et cetera, et cetera. It’s an old-timey business model. It’s okay, I want to wind up selling, I don’t know, expensive wristwatches. Well, maybe I’ll advertise in a magazine that caters to people who have an interest in wristwatches, or caters to a demographic that traditionally buys those wristwatches. And okay, we’ll run an ad campaign and see if it works.
Chris: It’s been traditional advertising, not the micro-targeting stuff. And you know, television was the same way back in the broadcast era, you know? You watched a particular show, people of that demographic who watched that particular show had certain advertisers they wanted.
Corey: That part of the challenge I’ve seen too, from sponsors of this show, for example, is they know it works, but they’re trying to figure out how to do any form of attribution on this. And my answer—which sounds self-serving, but it’s true—is, there’s no effective way to do it because every time you try, like, “Enter this coupon code,” yeah, I assure you, some of these things wind up costing millions of dollars to deploy at large companies at scale and they provide value for doing it. No one’s going to punch in a coupon code to get 10% off or something like that. Procurement is going to negotiate custom contracts and it’s going to be brought up maybe by someone who heard the podcast ad. Maybe it just sits in the back of their mind until they hear something and it just winds of contributing to a growing awareness of these things.
You’re never going to do attribution that works on things like that. People try sometimes to, “Oh, you’ll get $25 in credit,” or, “We’ll give you a free t-shirt if you fill out the form.” Yeah, but now you’re biasing for people who find that a material motivator. When I’m debating what security suite I’m going to roll out at my enterprise I don’t want a free t-shirt for that. In fact, if I get a free t-shirt and I wear that shirt from the vendor around the office while I’m trying to champion bringing that thing in, I look a little compromised.
Chris: Yeah. Yeah, I am—[laugh] I got no response to that [laugh].
Corey: No, no. I hear you. One thing I do want to talk about is the last time we spoke, you mentioned you were involved in getting fwd:cloudsec
—a conference—off the ground. Like all good cloud security conferences, it’s named after an email subject line.
It is co-located with re:Inforce this year in Anaheim, California. Somewhat ominously enough, I used to live a block-and-a-half away from the venue. But I don’t anymore and in fact, because nobody checks the global event list when they schedule these things, I will be on the other side of the world officiating a wedding the same day. So, yet again, I will not be at re:Inforce.
Chris: That is a shame because I think you would have made an excellent person to contribute to our call for papers and attend. So yes, fwd:cloudsec is deliberately actually named after a subject line because all of the other Amazon conferences seem to be that way. And we didn’t want to be going backwards and thinking, you know, past tense. We were looking forward to our conference. Yeah, so we’re effectively a vendor-neutral cloud security conference. We liked the idea of being able to take the talks that Amazon PR would never allow on stage at re:Inforce and run with it.
Corey: I would question that. I do want to call that out because I gave a talk at re:Invent one year about a vulnerability I found and reported, with the help of two other people, Scott Piper and Brandon Sherman, to the AWS security team. And we were able to talk about that on stage with Zack Glick, who at the time, was one of basically God’s own prototypes, working over in the AWS environment next to Dan [Erson 00:19:56]. Now, Dan remains the salt of the earth, and if he ever leaves basically just short the entire US economy. It’s easier. He is amazing. I digress. The point being is that they were very open about talking about an awful lot of stuff that I would never have expected that they would be okay with.
Chris: And last year at re:Inforce, they had an excellent, excellent chalk talk—but it was a chalk talk, not recorded—on how ransomware attacks operate. And they actually, like, revealed some internal, very anonymized patterns of how attacks are working. So, they’re starting to realize what we’ve been saying in the cloud security community for a while, which is, we need more legitimate threat intelligence. On the other hand, they don’t want to call it threat intelligence because the word threat is threatening, and therefore, you know, we’re going to just call it, you know, patterns or whatever. And our conference is, again, also multi-cloud, a concept that until recently, AWS, you know, didn’t really want to acknowledge that there were other clouds and that people would use both of them [crosstalk 00:21:01]—
Corey: Multi-cloud security is a nightmare. It’s just awful.
Chris: Yeah, I don’t like multi-cloud, but I’ve come to realize that it is a thing. That you will either start at a company that says, “We’re AWS and we’re uni-cloud,” and then next thing, you know, either some rogue developer out there has gone and spun up an Azure subscription or your acquire somebody who’s in GCP, or heaven forbid, you have to go into some, you know, tinhorn dictator’s jurisdiction and they require you to be on-prem or leverage Oracle Cloud or something. And suddenly, congratulations, you’re now multi-cloud. So yes, our goal is really to be the things that aren’t necessarily onstage or aren’t all just, “It’s great.” Even your talk was how great the incident response and vulnerability remediation process was.
Corey: How great my experience with it was at the time, to be clear. Because I also have gotten to a point where I am very aware that, in many cases when dealing with AWS, my reputation precedes me. So, when I wind up tweeting about a problem or opening a support case, I do not accept as a given that my experience is what everyone is going to experience. But a lot of the things they did made a lot of sense and I was frankly, impressed that they were willing to just talk about anything that they did internally. Because previously that had not been a thing that they did in open forums like that.
Chris: But you go back to the Glue incident where somebody found a bug and they literally went and went to every single CloudTrail event going back to the dawn of the service to validate that, okay, the, only two times we ever saw this happen were between the two researcher’s accounts who disclosed it. And so, kudos to them for that level of forward communication to their customers because yeah, I think we still haven’t heard anything out of Azure for last year’s—or a year-and-a-half ago’s Wiz findings.
Corey: Well, they did do a broad blog post about this that they put out, which I thought, “Okay, that was great. More of this please.” Because until they start talking about security issues and culture and the remediation thereof, I don’t give a shit what they have to say about almost anything else because it all comes back to security. The only things I use Azure for, which admittedly has some great stuff; their computer vision API? Brilliant—but the things I use them for are things that I start from a premise of security is not important to that service.
The thing I use it for on the soon-to-be-pivoted to Mastodon Twitter thread client that I built, it writes alt-text for images that are about to be put out publicly. Yeah, there’s no security issue from that perspective. I am very hard-pressed to imagine a scenario in which that were not true.
Chris: I can come up with a couple, but you know—
Corey: It feels really contrived. And honestly, that’s the thing that concerns me, too: the fact that I finally read, somewhat recently, an AWS white paper talking about—was it a white paper or was it blog post? I forget the exact media that it took. But it was about how they are seeing ransomware attacks on S3, which was huge because before that, I assumed it was something that was being made up by vendors to sell me something.
Chris: So, that was the chalk talk.
Chris: They finally got the chalk talk from re:Inforce, they gave it again at re:Invent because it was so well received and now they have it as a blog post out there, so that, you know, it’s not just for people who show up in the room, they can hear it; it’s actually now documented out there. And so, kudos to the Amazon security team for really getting that sort of threat intelligence out there to the community.
Corey: Now, it’s in writing, and that’s something that I can cite as opposed to, “Well, I was at re:Invent and I heard—” Yeah, we saw the drink tab. We know what you might have thought you heard or saw at re:Invent. Give us something we can take to the board.
Chris: There were a lot of us on that bar tab, so it’s not all you.
Corey: Exactly. And it was my pleasure to do it, to be clear. But getting back to fwd:cloudsec, I’m going to do you a favor. Whether it’s an actual favor or the word favor belongs in quotes, the way that I submit CFPs, or conference talks, is optimized because I don’t want to build a talk that is never going to get picked up. Why bother to go through all the work until I have to give it somewhere?
So, I start with a catchy title and then three to five sentences. And if people accept it, great, then I get to build the talk. This is a forcing function in some ways because if you get a little delayed, they will not move the conference for you. I’ve checked. But the title of a talk that I think someone should submit for fwd:cloudsec is, “I Am Smarter Than You, so Cloud Security is Easy.”
And the format and the conceit of the talk is present it with sort of a stand-it-up-to-take-it-down level of approach where you are over-confident in the fact that you are smarter than everyone else and best practices don’t apply to you and so much of this stuff is just security theater designed as a revenue extraction mechanism as opposed to something you should actually be doing. And talk about why none of these things matter because you use good security and you know, it’s good because you came up with it and there’s no way that you could come up with something that you couldn’t break because you’re smart. It says so right in the title and you’re on stage and you have a microphone. They don’t. Turn that into something. I feel like there’s a great way to turn that in a bunch of different directions. I’d love to see someone give that talk.
Chris: I think Nickolas Sharp thought that too.
Corey: [laugh]. Exactly. In fact, that will be a great way to bring it back around at the end. And it’s like, “And that’s why I’m better at security than you are. If you have any questions beyond this, you can reach me at whatever correctional institute I go in on Thursday.” Exactly. There’s ways to make it fun and engaging. Because from my perspective, talks have to be entertaining or people don’t pay attention.
Chris: They’re either entertaining, or they’re so new and advanced. We’re definitely an advanced cloud security practice thing. They were 500 levels. Not to brag or anything, but you know, you want the two to 300-level stuff, you can go CCJ up the street. We’re hitting and going above and beyond what a lot of the [unintelligible 00:27:18]—
Corey: I am not as advanced on that path as you are; I want to be very clear on this. You speak, I listen. You’re one of those people when it comes to security. Because again, no one’s life is hanging in the balance with respect to what I do. I am confident in our security posture here, but nothing’s perfect. Everything is exploitable, on some level.
It’s also not my core area of focus. It is yours. And if you are not better than I am at this, then I have done something sort of strange, or so of you, in the same way that it is a near certainty—but not absolute—that I am better at optimizing AWS bills than you are. Specialists exist for a reason and to discount that expertise is the peak of hubris. Put that in your talk.
Chris: Yeah. So, one talk I really want to see, and I’ve been threatening to give it for a while, is okay, if there’s seventeen ways—or sorry, seventeen times two, soon to be seventeen times three ways to run containers in AWS, there’s that many ways to exfiltrate credentials from those containers. What are all of those things? Do we have a holistic way of understanding, this is how credentials can be exfiltrated so that we then as defenders can go figure out, okay, how do we build detections and mitigations for this?
Corey: Yeah. I’m a huge fan of Canarytokens myself, for that exact purpose. There are many devices I have where the only credentials in plain text on disk are things that as soon as they get used, I wind up with a bunch of things screaming at me that there’s been a problem and telling me where it is. I’m not saying that my posture is impenetrable. Far from it. But you’re going to have to work for it a little bit harder than running some random off-the-shelf security scanner against my AWS account and finding, oops, I forgot to turn on a bucket protection.
Chris: And the other area that I think is getting really interesting is, all of the things that have credentials into your Cloud account, whether it’s something like CircleCI or GitHub. I was having a conversation with somebody just this morning and we were talking about Roles Anywhere, and I was like, “Roles Anywhere is great if you’ve got a good strong PKI solution and can keep that private certificate or that certificate you need safe.” If you just put it on a disk, like, you would have put your AKIA and secret on a desk, congratulations, you haven’t really improved security. You’ve just gotten rid of the IAM users that are being flagged in your CSPM tool, and congratulations, you have, in fact, achieved security theater.
Corey: It’s obnoxious, on some level. And part of the problem is cost and security are aligned and that people care about them right after they really should have cared about them. The difference is you can beg, cry, whine, et cetera to AWS for concessions, you can raise another round of funding; there have solutions with money. But security? That ship has already sailed.
Chris: Yeah. Once the data is out, the data is out. Now, I will say on the bill, you get reminded of it every month, about three or four days after. It’s like, “Oh. Crap, yeah, I should have turned off that EC2 instance. I just burned $100.” Or, “Oh hey, we didn’t turn off that application. I just burned $100,000.” That doesn’t happen on security. Security events tend to be few and far between; they’re just much bigger when they happen.
Corey: I really want to thank you for taking the time to chat with me. I’m sure I’ll have you back on between now and re:Inforce slash fwd:cloudsec or anything else we come up with that resembles an email subject line. If people want to learn more and follow along with your adventures—as they should—where’s the best place for him to find you these days?
Chris: So, I am now pretty much living on Mastodon
on the InfoSec Exchange. And my website, chrisfarris.com
is where you can find the link to that because it’s not just at, you know, whatever. You have to give the whole big long URL in Mastodon. It’s no longer—
Corey: Yeah. It’s like a full-on email address with weird domains.
Corey: Excellent choice. And of course, links to that go in the [show notes 00:31:32], so click the button. It’s easier. Thanks again for your time. I really appreciate it.
Chris: Thank you.
Corey: Chris Farris, Cloud Security Nerd at Turbot slash Turbo. I’m Cloud Economist Corey Quinn and this is Screaming in the Cloud. If you’ve enjoyed this podcast, please leave a five-star review on your podcast platform of choice, whereas if you’ve hated this podcast, please leave a five-star review on your podcast platform of choice, along with an angry comment that resembles a lawsuit being filed, and then have it processed-served to me because presumably, you work at Ubiquiti.
Corey: If your AWS bill keeps rising and your blood pressure is doing the same, then you need The Duckbill Group. We help companies fix their AWS bill by making it smaller and less horrifying. The Duckbill Group works for you, not AWS. We tailor recommendations to your business and we get to the point. Visit duckbillgroup.com
to get started.