<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Google Cloud Build bug lets hackers launch supply chain attack in Cloud Security</title>
    <link>https://community.isc2.org/t5/Cloud-Security/Google-Cloud-Build-bug-lets-hackers-launch-supply-chain-attack/m-p/60941#M329</link>
    <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;An interesting issue with Google Cloud, which is only partially fixed at the present time.&amp;nbsp; There is a design issue, which assists supply chain attacks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.bleepingcomputer.com/news/security/google-cloud-build-bug-lets-hackers-launch-supply-chain-attacks/" target="_blank"&gt;https://www.bleepingcomputer.com/news/security/google-cloud-build-bug-lets-hackers-launch-supply-chain-attacks/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
    <pubDate>Mon, 09 Oct 2023 10:38:34 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2023-10-09T10:38:34Z</dc:date>
    <item>
      <title>Google Cloud Build bug lets hackers launch supply chain attack</title>
      <link>https://community.isc2.org/t5/Cloud-Security/Google-Cloud-Build-bug-lets-hackers-launch-supply-chain-attack/m-p/60941#M329</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;An interesting issue with Google Cloud, which is only partially fixed at the present time.&amp;nbsp; There is a design issue, which assists supply chain attacks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.bleepingcomputer.com/news/security/google-cloud-build-bug-lets-hackers-launch-supply-chain-attacks/" target="_blank"&gt;https://www.bleepingcomputer.com/news/security/google-cloud-build-bug-lets-hackers-launch-supply-chain-attacks/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 10:38:34 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Cloud-Security/Google-Cloud-Build-bug-lets-hackers-launch-supply-chain-attack/m-p/60941#M329</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-10-09T10:38:34Z</dc:date>
    </item>
    <item>
      <title>Re: Google Cloud Build bug lets hackers launch supply chain attack</title>
      <link>https://community.isc2.org/t5/Cloud-Security/Google-Cloud-Build-bug-lets-hackers-launch-supply-chain-attack/m-p/60944#M330</link>
      <description>&lt;P&gt;Once again, this plays into the theory that SAAS is a double-edged sword.&amp;nbsp; On one hand it exposes a larger attack surface than a hosted app behind a VPN.&amp;nbsp; But it also reduces the risk caused by not keeping up with vendor patches.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jul 2023 22:03:52 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Cloud-Security/Google-Cloud-Build-bug-lets-hackers-launch-supply-chain-attack/m-p/60944#M330</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2023-07-18T22:03:52Z</dc:date>
    </item>
    <item>
      <title>Re: Google Cloud Build bug lets hackers launch supply chain attack</title>
      <link>https://community.isc2.org/t5/Cloud-Security/Google-Cloud-Build-bug-lets-hackers-launch-supply-chain-attack/m-p/60946#M331</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/311867713"&gt;@denbesten&lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; I agree, even the clients have a duty of care and due diligence even the NIST SP800-53 R5 points this out, but I wonder how many have actually assessed their Cloud Providers and actually asked for proof they are being maintained other than through SOC Level 1, 2 Reports?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Which as the auditors state, allowing the Cloud Providers to audit themselves every 12 months for the SOC 1, 2 reports cannot be objective.&amp;nbsp; These assessments need to be completed independently by another third party, with independent reporting conducted etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jul 2023 22:20:33 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Cloud-Security/Google-Cloud-Build-bug-lets-hackers-launch-supply-chain-attack/m-p/60946#M331</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-07-18T22:20:33Z</dc:date>
    </item>
  </channel>
</rss>

