Webinar On Demand
Deconstructing Control Plane Compromise Attacks
Recorded May 25, 2022
View a Complimentary Webinar Sponsored by Fugue, a part of Snyk
It’s widely understood that cloud misconfigurations are the primary cloud vulnerability, but unless you broaden your definition of cloud misconfiguration to include architectural design flaws that attackers can exploit, chances are you’re overlooking them in your environment.
While the details vary, every major cloud breach follows the same pattern, with control plane compromise playing a central role. In the cloud, the API surface is the attack surface. Attackers use automation to find vulnerabilities to gain initial access to an environment. Once in, they’re after API keys that enable them to operate against the cloud control plane in order to discover knowledge about the environment, move laterally, and extract data without detection.
In this session, Josh Stella, Chief Architect at Snyk, will deconstruct how control plane compromise attacks go down in the cloud, and how to spot the kinds of architectural design flaws that they’re exploiting.
You’ll walk away from this session with an understanding of:
- How cloud hackers think and operate against the cloud control plane
- Identifying control plane compromise risk in your environment
- Why inherently secure cloud design looks like
Chief Architect, Snyk
Josh Stella is co-founder, CTO, and CEO of Fugue. Through Fugue’s masterclasses, Josh educates cloud and security professionals about cloud misconfiguration exploits and how to keep cloud infrastructure secure from attackers—often by demonstrating exploits in real time as a white hat hacker.
Previously, Josh was a Principal Solutions Architect at Amazon Web Services (AWS), where he supported customers in the area of national security. Josh also served as CTO for a technology startup and in numerous other IT leadership and technical roles over the past 25 years.