SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsAs supply chain security continues to evolve in 2025, much of the focus remains on malicious packages in ecosystems like PyPI, NPM, and compromised GitHub Actions workflows. But what about your Terraform modules and providers?
In this talk, we’ll examine how infrastructure-as-code can be maliciously misused to influence CI pipelines and gain deeper access into target environments. We’ll walk through realistic attack paths that demonstrate how Terraform could be exploited in threat scenarios, complete with technical examples and a Proof-of-Concept “Evil Terraform” provider. Finally, we’ll discuss practical mitigations and security controls you can implement to reduce risk, both specific to Terraform and more broadly across your CI/CD workflows.
Dakota Riley is a Staff Security Engineer at LiveRamp. He has experience assisting customers with cloud native security efforts, including IAM, Infrastructre-As-Code, automation/tooling, and detection engineering.
Read more about Dakota Riley