• Terraform Weekly
  • Posts
  • weekly.tf - Issue #55 - Terraformer, Terratag, IAM Vulnerable

weekly.tf - Issue #55 - Terraformer, Terratag, IAM Vulnerable

Hi! 👋

I want to welcome all new subscribers who discovered Terraform Weekly newsletters from my Reddit post in /r/Terraform and other social networks! Make sure to check previous issues or use site search.

Keep reading and have a great day,

Anton.

AB: Be honest with you, you probably have been practicing ClickOps for so long that some of it have ended up in production, right? :) You're not alone, and this article walks you through the process of importing your existing AWS infrastructure using the open-source tool called Terraformer.

This blog addresses how you can do that easily and automatically when using Terraform and Terratag (an open-source project by env0) on top of the Gitlab CI/CD platform.

This article shows how to use terraform taint and terraform apply -replace (available since Terraform version 0.15.2) commands to recreate resources.

Most of these 7+ lessons by Shane Mitchell are very logical and should be applied in all Terraform projects.

IAM Vulnerable

Terraform project which creates your own vulnerable by design AWS IAM privilege escalation playground. 31 escalation paths included!

The IAM Vulnerable tool helps you learn how to identify and then exploit intentionally vulnerable IAM configurations that allow for privilege escalation.

In a follow-up to his IAM Vulnerable tool, Seth Art examines the identification aspect of IAM privilege escalation and reviews IAM assessment tools.

Feedback ❤️

Do you like this newsletter? Think about sharing it on social media and providing your feedback to me (e.g., @antonbabenko or reply to the email). I want to know it!