/Vulnerable-Cloud-File-Storage-on-AWS-S3

This project showcases vulnerable cloud file storage on AWS S3, aiming to help developers and cloud security engineers understand security flaws when building web apps allowing file uploads to Amazon S3.

Primary LanguagePowerShell

Vulnerable-Cloud-File-Storage-on-AWS-S3

This project demonstrates the implementation of vulnerable cloud file storage on AWS S3. Its primary purpose is to assist developers and cloud security engineers in comprehending security vulnerabilities when creating a web application that enables users to upload and store files on Amazon S3.

In the rush to meet deadlines and without adequate knowledge of AWS security best practices, developers often end up misconfiguring the S3 bucket. This misconfiguration can lead to serious security vulnerabilities, potentially exposing sensitive data and making it susceptible to unauthorized access or data breaches.

🚀 PART A: Setting up an AWS S3 Bucket
🚀 PART B: Setting up Flask in VS Code
🚀 PART C: Setting up the Web Page
🚀 Secure Implementation of Cloud File Upload on S3

💡 Check Complete Walkthrough Here 👈🔻 💡

Security Recommendation

📍 PART A Solution (S3 Bucket Securtiy Measures)
📍 PART B & C Solution (Application Securtiy Measures)

Related Resources

📍 Exploiting Misconfigured S3 Bucket in AWS Lab Series by Flaws.cloud
📍 Creating a secure S3 bucket
📍 Restricting Access to AWS S3 Buckets using ACL and Bucket Policy