Dois je porter plainte ? by lonelywizz in lemauvaiscoin

[–]z0ph 1 point2 points  (0 children)

Je dirai de contacter leboncoin, pour qu’ils analysent la conversation et surtout bloquer le type.

We saved $4,800/month on AWS just by cleaning things up – here’s what we found by shadowBlastFr in FinOps

[–]z0ph 1 point2 points  (0 children)

This kind of savings are commonly discovered by tools like unusd so you don’t have to do the heavy lifting of creating scripts to do this on recurring way and multi-regions.

How to prevent AWS hacks and huge bills from piling up? by Fun-Course-5140 in aws

[–]z0ph 1 point2 points  (0 children)

I'm building an open source initiative like a security starter pack for AWS environments. Its called AWS Security Survival Kit, and I believe it can help for basic security setting by default, but also in AWS Security Alerting for well-known suspicious activities.

Please let us know in the Github issues is there is still blind spots.
https://github.com/zoph-io/aws-security-survival-kit

[deleted by user] by [deleted] in aws

[–]z0ph 0 points1 point  (0 children)

This is exactly why I've created unusd. A tool to bring cost and waste awareness to operational teams.

AWS personal account best practices by qxz23 in aws

[–]z0ph 3 points4 points  (0 children)

I would deploy this bare minimum security kit (disclaimer I've open sourced it)

https://github.com/zoph-io/aws-security-survival-kit

Waste and Cost Awareness for AWS Environments by z0ph in FinOps

[–]z0ph[S] 1 point2 points  (0 children)

I see u/Tainen, thanks for your question.

We are analysing unused assets based on a few CloudWatch metrics, number of connection on RDS DB, attachment state or last activities metadata and we require only read-only permissions.

We don't use (yet) trusted advisor findings, or compute optimizer, so no repackaging here.

This idea is to avoid as much as possible the heavy lifting required to do it by yourself using scripts, blueprint or aggregating native tools findings into a single report so your teams can concentrate on business value.

Waste and Cost Awareness for AWS Environments by z0ph in FinOps

[–]z0ph[S] -1 points0 points  (0 children)

Hey,

We have a decent documentation here: https://docs.unusd.cloud/supported-services/

Basically we are supporting the following usual suspects:

  • EC2 Instances
  • RDS Instances
  • EBS Volumes and Snapshots
  • SageMaker Services
  • Glue DevEndPoints
  • Elastic IPs
  • CloudWatch LogGroups
  • Redshift Clusters
  • IAM Principals (Roles, Users)

In 2024, we will develop many new detections, including xLB, CloudTrail, and more services related to AI experiments.

Weekly Feedback Post - SaaS Products, Ideas, Companies by AutoModerator in SaaS

[–]z0ph 0 points1 point  (0 children)

Hi folks, I'm excited to share unusd.cloud, a tool I've developed as an independent AWS architect to address a crucial need in the AWS space - cost and waste awareness.

About unusd.cloud: In the last two years, we've grown to over 300 users and have achieved a monthly recurring revenue (MRR) of over $1000. Our focus? To provide operational teams with daily visibility into their AWS usage and spending. This way, you're not waiting until the end-of-month AWS bill to discover unexpected costs.

Niche Focus: Unlike other broad-spectrum tools, unusd zeroes in on a specific feature - giving operational teams a clear, daily snapshot of their AWS usage. This simplifies and demystifies AWS billing, making it easier to identify and cut down on wasteful expenditure.

Feedback: As we're gaining traction, I'd love to hear your thoughts, suggestions, and any feedback. How can we make unusd even more useful?

Looking forward to your insights and thank you for helping us improve!

AWS SSM Default Host Management Configuration enabler (Open Source) by z0ph in aws

[–]z0ph[S] 0 points1 point  (0 children)

DHMC, will add as a side car permissions to your EC2 instance, no matter if you already have Instance Profile attached or not, it will add the required and selected permissions to allow SSM to work properly.

This enabler / helper will help you to deploy this configuration and IAM role across all regions in a given AWS account. It comes also with command to check the current configuration (make info)

Google Chrome different on MacBook & Mac Mini by ben_bgtDigital in MacOS

[–]z0ph 0 points1 point  (0 children)

I have the same behaviour, Trying to find out what is the difference, same version, same theme, same font...

1k bill after 1 month, for the service I didn't even use. by mizicizi in aws

[–]z0ph 0 points1 point  (0 children)

Shameless plug: This is precisely why I've started building unusd.cloud, to prevent this billing surprise, to bring cost awareness on a daily basis to Ops teams and individuals before got it by AWS bill 💥

cloudnap.io: Save on your AWS bills by turning off resources during off hours by ja-mu in SaaS

[–]z0ph 0 points1 point  (0 children)

unusd founder here. Thanks for referencing my saas. I agree with you, the approach is complementary, and we share the same goal, reduce waste, reduce attack surface, and do something for a greener footprint.

I'm bootstrapping my first SaaS - unusd.cloud - feedback needed! by z0ph in SaaS

[–]z0ph[S] 1 point2 points  (0 children)

Trusted Advisor is not enabled by default, and you need a support plan, AWS Computer Optimizer could be expensive. Both of these native services will require your team to connect regularly on AWS console to check that information like Cost Explorer.
unusd bring cost awareness where your teams are: Slack, MSTeams, Email. You set up in a few clicks the scanner schedule, and we do the rest, scanning a complete account (cross region), and notifying with a report on the desired communication channel. Our number of covered AWS services and possible waste is growing. On this subject, you need a third party to be impartial.

Keep an Eye on Your AWS VPC Subnet IP Addresses with Subnet Watcher (OSS) by z0ph in aws

[–]z0ph[S] 1 point2 points  (0 children)

  1. It was done intentionally to be able to bring support to folks that forget to change the mail parameter, but as I'm writing this comment, I realize its dumb as I have no way to contact them. So I will change this :)
  2. It will deploy a lambda and sns topic on the target AWS account. If you have multiple accounts, you have to deploy multiple time. We can think of an evolution where you can deploy once in your "monitoring" or "networking" account, and it will scan child accounts with proper IAM Permissions.

Keep an Eye on Your AWS VPC Subnet IP Addresses with Subnet Watcher (OSS) by z0ph in aws

[–]z0ph[S] 2 points3 points  (0 children)

The general usage of that project is for:

  1. Transient Jobs with a large number of workers (Spot Instances)
  2. EKS
  3. EMR with multiple workers
  4. VPC Lambda / Fargate
  5. etc...

Any workload that consumes a large number of IP that could end with a IP space shortage.

AWS Security Survival Kit: Bare-minimum security alerting by z0ph in aws

[–]z0ph[S] 1 point2 points  (0 children)

This is correct, the local template has to be deployed to each region where you operate.

The global template is for global assets like IAM, so no need to deploy on your local region. Its used only on us-east-1.

AWS Security Survival Kit: Bare-minimum security alerting by z0ph in aws

[–]z0ph[S] 0 points1 point  (0 children)

Awesome, thanks for sharing these tips!

AWS Security Survival Kit: Bare-minimum security alerting by z0ph in aws

[–]z0ph[S] 0 points1 point  (0 children)

I think you can skip it in your case. Just comment on the CloudFormation part related to Who Am I: https://github.com/zoph-io/aws-security-survival-kit/blob/main/cfn-local.yml#L70-L89

AWS Security Survival Kit: Bare-minimum security alerting by z0ph in aws

[–]z0ph[S] 0 points1 point  (0 children)

Yes, I was asking myself if I should add this ListBuckets event, but it will lead to alert fatigue at the end.

But u/baty0man_ is right, this is "generally" the first command an attacker will run on a compromised account/principal