Infrastructure as Remote Code Execution: How to Abuse Terraform to Elevate Access
Offered By: LASCON via YouTube
Course Description
Overview
Explore potential security risks associated with Terraform, a popular infrastructure-as-code tool, in this 35-minute conference talk from LASCON. Discover how malicious actors can exploit Terraform to elevate privileges, exfiltrate sensitive data, and gain unauthorized access to cloud environments. Witness live demonstrations of real-world attack scenarios and learn practical recommendations for securing Terraform implementations to protect your infrastructure from potential threats.
Syllabus
Mike McCabe - Infrastructure as Remote Code Execution: How to abuse Terraform to elevate access
Taught by
LASCON
Related Courses
Terraform Basics: Automate Provisioning of AWS EC2 InstancesCoursera Project Network via Coursera DevOps CI/CD Pipeline: Automation from development to deployment
Universidad Anáhuac via edX DevOps Pipeline: Automatización hasta el despliegue
Universidad Anáhuac via edX DevOps Foundations: Software Development Optimization
Universidad Anáhuac via edX Fundamentos de DevOps: Optimiza el desarrollo del software
Universidad Anáhuac via edX