SlideShare a Scribd company logo
1 of 34
Level 1
Foundations of Cloud Security
Lesson 1 - Get acquainted with AWS ( sort of )
Objective 1:
● Understand the confusing world of AWS
● Identify the primary offerings
● Learn who to follow for new updates
● Understand security concerns
● Look at a couple of mega breaches
Identify
Services
AWS is Vast
● ~ 175 Products at the time of writing
● Super confusing names
○ AWS Systems Manager Session Manager
● Various and sundry ways to
misconfigure every single option
Scared yet?
Don’t be!
You
got
this
What’s our defense strategy?
1. Take a principles approach
2. Focus on commonality
3. Learn from mistakes
4. Keep trying
5. Community
Picture taken by user:Poppy in June 2005. Picture taken from the meadow
Focus on areas of primary technology
Compute Network Storage Databases Identity
Data
Exchange
Logs Metrics
Primary Focus
Secondary
Focus
(Tools)
Apply Security Principles
Least Privilege Defense in Depth Keep it Simple
Know your system
Strong
Authentication
https://infosec.mozilla.org/fundamentals/security_principles.html
We’ll have some call outs from these
Myth
I have to be an expert at
every AWS Service to
defend the cloud.
Fact
It’s easier to defend
security of the cloud.
So what are the primary offerings?
( my opinion not official AWS copy )
Compute Storage Networking
So what are the primary offerings?
( my opinion not official AWS copy )
Database
Data
Exchange
Foundation &
Tools
So what are the primary offerings?
( my opinion not official AWS copy )
Stay relevant
● Who to follow
○ https://twitter.com/0xdabbad00
○ https://twitter.com/quinnypig
○ https://twitter.com/jeffbarr
● Blogs for your area
○ https://aws.amazon.com/blogs/security/
Security
Concerns
How do I pwn thee?
Let me count the
ways.
Famous Data Breaches - ( not comprehensive )
● 2014 Code Spaces - leaked access key causes dissolution of business
● 2017 Uber data breach - access keys leaked in private repo
● 2018 Tesla - Hackers mine bitcoins overly permissive app
● 2019 CapitalOne - S3 Bucket exposure exposes 80,000 bank
accounts and over 1,000,000 ID numbers
● 2020 Prestige - S3 Bucket exposure of millions of travel records for
customers of Expedia, Travelocity, etc
Codespaces Response focus on traditional IR
SSH Keys
Instance Passwords
Access Key Pair
( Admin )
Leaked to Github
Attacker persists
in various and
stealthy ways.
● Creating
accounts
● STS Tokens
Deletes all the
infra and data Game over
Lessons Learned
● Access Keys will kill you before you kill the password
○ Attackers scanned for and leveraged keys very quickly
● Incident response needs to take into account cloud native tactics
○ Attackers pivoted to sophisticated persistence ( they know the platform better
than the user
● Being in the cloud itself is not a backup strategy
○ The attackers deleted all the data but it didn’t exist elsewhere
Uber Breach
● Hackers stole data for 57 million customers ( PII )
Attackers get
Access to
private git repo
Find AWS
Access Keys
Leverage to
exfil data
Lessons Learned
● Access Keys will kill you before you kill the password
○ Attackers found access keys in a private repo ( private repos are not password
stores )
● The breach was detected but not reported
● There was a pattern of incidents here for the same system
● Systems used access keys instead of other methods to gain access
Tesla Breach
● Bitcoin Mining and Espionage
Kubernetes
Console
AWS Access
Key Pair
( overly
permissive )
Bitcoin Miners
And spying
Real evidence
Lessons Learned
● Access Keys will kill you before you kill the password
○ Attackers found access keys in a kubernetes cluster they were too privileged
● The breach was in a dev/test environment with a lack of governance
● Exposed ancillary data for prototypes
● Attackers tried to evade detection by understanding detection
mechanisms ( govern CPU usage, use CloudFlare for hiding )
Capital One Breach
● Misconfigured WAF, Pivot to Credentials (SSRF), Data Exfil from S3
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html
http://169.254.169.254/latest/user-data
Lessons Learned
● Misconfiguration allowed SSRF ( Server side request forgery )
○ Pivot to calls to localhost metadata server
● Credentials for the instance were overly permissive
● Detection capabilities were not adequate to prevent breach
Are you seeing any
themes?
Least Privilege Defense in Depth
Strong
Authentication
These can all be attributed to principals failures
Overly permissive
No guardrails on
access
No 2FA or
authentication of
requestor
Lack of detection
Lack of human
response
These can all be attributed to principals failures
Simple systems
are “knowable”
Misconfiguration
is the second
largest threat to
access key leaks
Keep it Simple
Know your system
So what?
Apply Defense in Depth / Strong Authentication
● Really protect those access
keys. Assume breach in design
● Safeguard the metadata
server. Assume breach in IAM
● Detect changes and analyze.
Guardrails approach
Know your system
● Keep it simple by making the
cloud smaller. Disable things
we don’t use.
● Understand how to detect and
respond to classes of attacks
practically
Questions
Find your favorite AWS Cloud breach and share a good write up in the
discord channel. Bonus points if the initial vector isn’t a leaked access
key or SSRF ;)
Coming up
Detection of Misconfiguration

More Related Content

Similar to 001 - Get acquainted with the AWS platform -- hide01.ir.pptx

Harnessing the Power of AI in AWS Pentesting.pdf
Harnessing the Power of AI in AWS Pentesting.pdfHarnessing the Power of AI in AWS Pentesting.pdf
Harnessing the Power of AI in AWS Pentesting.pdfMike Felch
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...Michael Noel
 
Core strategies to develop defense in depth in AWS
Core strategies to develop defense in depth in AWSCore strategies to develop defense in depth in AWS
Core strategies to develop defense in depth in AWSShane Peden
 
Sql server security in an insecure world
Sql server security in an insecure worldSql server security in an insecure world
Sql server security in an insecure worldGianluca Sartori
 
Rugged Building Materials and Creating Agility with Security
Rugged Building Materials and Creating Agility with SecurityRugged Building Materials and Creating Agility with Security
Rugged Building Materials and Creating Agility with SecurityDavid Etue
 
The Golden Rules - Detecting more with RSA Security Analytics
The Golden Rules  - Detecting more with RSA Security AnalyticsThe Golden Rules  - Detecting more with RSA Security Analytics
The Golden Rules - Detecting more with RSA Security AnalyticsDemetrio Milea
 
No Easy Breach DerbyCon 2016
No Easy Breach DerbyCon 2016No Easy Breach DerbyCon 2016
No Easy Breach DerbyCon 2016Matthew Dunwoody
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Michael Noel
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application SecurityNicholas Davis
 
Don't Build "Death Star" Security - O'Reilly Software Architecture Conference...
Don't Build "Death Star" Security - O'Reilly Software Architecture Conference...Don't Build "Death Star" Security - O'Reilly Software Architecture Conference...
Don't Build "Death Star" Security - O'Reilly Software Architecture Conference...David Timothy Strauss
 
Cybersecurity Challenges with Generative AI - for Good and Bad
Cybersecurity Challenges with Generative AI - for Good and BadCybersecurity Challenges with Generative AI - for Good and Bad
Cybersecurity Challenges with Generative AI - for Good and BadIvo Andreev
 
JS-Experts - Cybersecurity for Generative AI
JS-Experts - Cybersecurity for Generative AIJS-Experts - Cybersecurity for Generative AI
JS-Experts - Cybersecurity for Generative AIIvo Andreev
 
Serverless Security Checklist
Serverless Security ChecklistServerless Security Checklist
Serverless Security ChecklistSimform
 
Is DevOps Braking Your Company?
Is DevOps Braking Your Company?Is DevOps Braking Your Company?
Is DevOps Braking Your Company?conjur_inc
 
2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion DetectionAPNIC
 
Secure Coding 101 - OWASP University of Ottawa Workshop
Secure Coding 101 - OWASP University of Ottawa WorkshopSecure Coding 101 - OWASP University of Ottawa Workshop
Secure Coding 101 - OWASP University of Ottawa WorkshopPaul Ionescu
 
Annual OktCyberfest 2019
Annual OktCyberfest 2019Annual OktCyberfest 2019
Annual OktCyberfest 2019Fahad Al-Hasan
 

Similar to 001 - Get acquainted with the AWS platform -- hide01.ir.pptx (20)

Harnessing the Power of AI in AWS Pentesting.pdf
Harnessing the Power of AI in AWS Pentesting.pdfHarnessing the Power of AI in AWS Pentesting.pdf
Harnessing the Power of AI in AWS Pentesting.pdf
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
 
Core strategies to develop defense in depth in AWS
Core strategies to develop defense in depth in AWSCore strategies to develop defense in depth in AWS
Core strategies to develop defense in depth in AWS
 
Sql server security in an insecure world
Sql server security in an insecure worldSql server security in an insecure world
Sql server security in an insecure world
 
Rugged Building Materials and Creating Agility with Security
Rugged Building Materials and Creating Agility with SecurityRugged Building Materials and Creating Agility with Security
Rugged Building Materials and Creating Agility with Security
 
The Golden Rules - Detecting more with RSA Security Analytics
The Golden Rules  - Detecting more with RSA Security AnalyticsThe Golden Rules  - Detecting more with RSA Security Analytics
The Golden Rules - Detecting more with RSA Security Analytics
 
Windows network
Windows networkWindows network
Windows network
 
No Easy Breach DerbyCon 2016
No Easy Breach DerbyCon 2016No Easy Breach DerbyCon 2016
No Easy Breach DerbyCon 2016
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
 
Windows network security
Windows network securityWindows network security
Windows network security
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
 
Don't Build "Death Star" Security - O'Reilly Software Architecture Conference...
Don't Build "Death Star" Security - O'Reilly Software Architecture Conference...Don't Build "Death Star" Security - O'Reilly Software Architecture Conference...
Don't Build "Death Star" Security - O'Reilly Software Architecture Conference...
 
Cybersecurity Challenges with Generative AI - for Good and Bad
Cybersecurity Challenges with Generative AI - for Good and BadCybersecurity Challenges with Generative AI - for Good and Bad
Cybersecurity Challenges with Generative AI - for Good and Bad
 
JS-Experts - Cybersecurity for Generative AI
JS-Experts - Cybersecurity for Generative AIJS-Experts - Cybersecurity for Generative AI
JS-Experts - Cybersecurity for Generative AI
 
Serverless Security Checklist
Serverless Security ChecklistServerless Security Checklist
Serverless Security Checklist
 
Is DevOps Braking Your Company?
Is DevOps Braking Your Company?Is DevOps Braking Your Company?
Is DevOps Braking Your Company?
 
2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection
 
Secure Coding 101 - OWASP University of Ottawa Workshop
Secure Coding 101 - OWASP University of Ottawa WorkshopSecure Coding 101 - OWASP University of Ottawa Workshop
Secure Coding 101 - OWASP University of Ottawa Workshop
 
Annual OktCyberfest 2019
Annual OktCyberfest 2019Annual OktCyberfest 2019
Annual OktCyberfest 2019
 
Web security uploadv1
Web security uploadv1Web security uploadv1
Web security uploadv1
 

More from nitinscribd

Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdfSplunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdfnitinscribd
 
eu-15-Haken-Bypassing-Local-Windows-Authentication-To-Defeat-Full-Disk-Encryp...
eu-15-Haken-Bypassing-Local-Windows-Authentication-To-Defeat-Full-Disk-Encryp...eu-15-Haken-Bypassing-Local-Windows-Authentication-To-Defeat-Full-Disk-Encryp...
eu-15-Haken-Bypassing-Local-Windows-Authentication-To-Defeat-Full-Disk-Encryp...nitinscribd
 
OSC-Fall-Tokyo-2012-v9.pdf
OSC-Fall-Tokyo-2012-v9.pdfOSC-Fall-Tokyo-2012-v9.pdf
OSC-Fall-Tokyo-2012-v9.pdfnitinscribd
 
004 - Logging in the Cloud -- hide01.ir.pptx
004 - Logging in the Cloud  --  hide01.ir.pptx004 - Logging in the Cloud  --  hide01.ir.pptx
004 - Logging in the Cloud -- hide01.ir.pptxnitinscribd
 
003 - Billing -- hide01.ir.pptx
003 - Billing  --  hide01.ir.pptx003 - Billing  --  hide01.ir.pptx
003 - Billing -- hide01.ir.pptxnitinscribd
 
002 - Account Setup _ Primer -- hide01.ir.pptx
002 - Account Setup _ Primer  --  hide01.ir.pptx002 - Account Setup _ Primer  --  hide01.ir.pptx
002 - Account Setup _ Primer -- hide01.ir.pptxnitinscribd
 
how-to-bypass-AM-PPL
how-to-bypass-AM-PPLhow-to-bypass-AM-PPL
how-to-bypass-AM-PPLnitinscribd
 

More from nitinscribd (8)

Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdfSplunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
 
eu-15-Haken-Bypassing-Local-Windows-Authentication-To-Defeat-Full-Disk-Encryp...
eu-15-Haken-Bypassing-Local-Windows-Authentication-To-Defeat-Full-Disk-Encryp...eu-15-Haken-Bypassing-Local-Windows-Authentication-To-Defeat-Full-Disk-Encryp...
eu-15-Haken-Bypassing-Local-Windows-Authentication-To-Defeat-Full-Disk-Encryp...
 
OSC-Fall-Tokyo-2012-v9.pdf
OSC-Fall-Tokyo-2012-v9.pdfOSC-Fall-Tokyo-2012-v9.pdf
OSC-Fall-Tokyo-2012-v9.pdf
 
soctool.pdf
soctool.pdfsoctool.pdf
soctool.pdf
 
004 - Logging in the Cloud -- hide01.ir.pptx
004 - Logging in the Cloud  --  hide01.ir.pptx004 - Logging in the Cloud  --  hide01.ir.pptx
004 - Logging in the Cloud -- hide01.ir.pptx
 
003 - Billing -- hide01.ir.pptx
003 - Billing  --  hide01.ir.pptx003 - Billing  --  hide01.ir.pptx
003 - Billing -- hide01.ir.pptx
 
002 - Account Setup _ Primer -- hide01.ir.pptx
002 - Account Setup _ Primer  --  hide01.ir.pptx002 - Account Setup _ Primer  --  hide01.ir.pptx
002 - Account Setup _ Primer -- hide01.ir.pptx
 
how-to-bypass-AM-PPL
how-to-bypass-AM-PPLhow-to-bypass-AM-PPL
how-to-bypass-AM-PPL
 

Recently uploaded

No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...narwatsonia7
 
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...saminamagar
 
Enhancing Indigenous Peoples' right to self-determination in the context of t...
Enhancing Indigenous Peoples' right to self-determination in the context of t...Enhancing Indigenous Peoples' right to self-determination in the context of t...
Enhancing Indigenous Peoples' right to self-determination in the context of t...Christina Parmionova
 
2023 Ecological Profile of Ilocos Norte.pdf
2023 Ecological Profile of Ilocos Norte.pdf2023 Ecological Profile of Ilocos Norte.pdf
2023 Ecological Profile of Ilocos Norte.pdfilocosnortegovph
 
How to design healthy team dynamics to deliver successful digital projects.pptx
How to design healthy team dynamics to deliver successful digital projects.pptxHow to design healthy team dynamics to deliver successful digital projects.pptx
How to design healthy team dynamics to deliver successful digital projects.pptxTechSoupConnectLondo
 
If there is a Hell on Earth, it is the Lives of Children in Gaza.pdf
If there is a Hell on Earth, it is the Lives of Children in Gaza.pdfIf there is a Hell on Earth, it is the Lives of Children in Gaza.pdf
If there is a Hell on Earth, it is the Lives of Children in Gaza.pdfKatrina Sriranpong
 
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...narwatsonia7
 
history of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptxhistory of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptxhellokittymaearciaga
 
call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
High-Level Thematic Event on Tourism - SUSTAINABILITY WEEK 2024- United Natio...
High-Level Thematic Event on Tourism - SUSTAINABILITY WEEK 2024- United Natio...High-Level Thematic Event on Tourism - SUSTAINABILITY WEEK 2024- United Natio...
High-Level Thematic Event on Tourism - SUSTAINABILITY WEEK 2024- United Natio...Christina Parmionova
 
In credit? Assessing where Universal Credit’s long rollout has left the benef...
In credit? Assessing where Universal Credit’s long rollout has left the benef...In credit? Assessing where Universal Credit’s long rollout has left the benef...
In credit? Assessing where Universal Credit’s long rollout has left the benef...ResolutionFoundation
 
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best ServicesMadurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Servicesnajka9823
 
Stop throwing your old clothes and start donating
Stop throwing your old clothes and start donatingStop throwing your old clothes and start donating
Stop throwing your old clothes and start donatingSERUDS INDIA
 
Club of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological CivilizationClub of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological CivilizationEnergy for One World
 
(多少钱)Dal毕业证国外本科学位证
(多少钱)Dal毕业证国外本科学位证(多少钱)Dal毕业证国外本科学位证
(多少钱)Dal毕业证国外本科学位证mbetknu
 
Call Girls Near Surya International Hotel New Delhi 9873777170
Call Girls Near Surya International Hotel New Delhi 9873777170Call Girls Near Surya International Hotel New Delhi 9873777170
Call Girls Near Surya International Hotel New Delhi 9873777170Sonam Pathan
 
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 

Recently uploaded (20)

No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
 
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
 
Enhancing Indigenous Peoples' right to self-determination in the context of t...
Enhancing Indigenous Peoples' right to self-determination in the context of t...Enhancing Indigenous Peoples' right to self-determination in the context of t...
Enhancing Indigenous Peoples' right to self-determination in the context of t...
 
2023 Ecological Profile of Ilocos Norte.pdf
2023 Ecological Profile of Ilocos Norte.pdf2023 Ecological Profile of Ilocos Norte.pdf
2023 Ecological Profile of Ilocos Norte.pdf
 
How to design healthy team dynamics to deliver successful digital projects.pptx
How to design healthy team dynamics to deliver successful digital projects.pptxHow to design healthy team dynamics to deliver successful digital projects.pptx
How to design healthy team dynamics to deliver successful digital projects.pptx
 
If there is a Hell on Earth, it is the Lives of Children in Gaza.pdf
If there is a Hell on Earth, it is the Lives of Children in Gaza.pdfIf there is a Hell on Earth, it is the Lives of Children in Gaza.pdf
If there is a Hell on Earth, it is the Lives of Children in Gaza.pdf
 
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
 
history of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptxhistory of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptx
 
call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
High-Level Thematic Event on Tourism - SUSTAINABILITY WEEK 2024- United Natio...
High-Level Thematic Event on Tourism - SUSTAINABILITY WEEK 2024- United Natio...High-Level Thematic Event on Tourism - SUSTAINABILITY WEEK 2024- United Natio...
High-Level Thematic Event on Tourism - SUSTAINABILITY WEEK 2024- United Natio...
 
In credit? Assessing where Universal Credit’s long rollout has left the benef...
In credit? Assessing where Universal Credit’s long rollout has left the benef...In credit? Assessing where Universal Credit’s long rollout has left the benef...
In credit? Assessing where Universal Credit’s long rollout has left the benef...
 
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best ServicesMadurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
 
Stop throwing your old clothes and start donating
Stop throwing your old clothes and start donatingStop throwing your old clothes and start donating
Stop throwing your old clothes and start donating
 
Club of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological CivilizationClub of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological Civilization
 
(多少钱)Dal毕业证国外本科学位证
(多少钱)Dal毕业证国外本科学位证(多少钱)Dal毕业证国外本科学位证
(多少钱)Dal毕业证国外本科学位证
 
Call Girls Near Surya International Hotel New Delhi 9873777170
Call Girls Near Surya International Hotel New Delhi 9873777170Call Girls Near Surya International Hotel New Delhi 9873777170
Call Girls Near Surya International Hotel New Delhi 9873777170
 
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 

001 - Get acquainted with the AWS platform -- hide01.ir.pptx

  • 1. Level 1 Foundations of Cloud Security
  • 2. Lesson 1 - Get acquainted with AWS ( sort of ) Objective 1: ● Understand the confusing world of AWS ● Identify the primary offerings ● Learn who to follow for new updates ● Understand security concerns ● Look at a couple of mega breaches Identify Services
  • 3. AWS is Vast ● ~ 175 Products at the time of writing ● Super confusing names ○ AWS Systems Manager Session Manager ● Various and sundry ways to misconfigure every single option
  • 6. What’s our defense strategy? 1. Take a principles approach 2. Focus on commonality 3. Learn from mistakes 4. Keep trying 5. Community Picture taken by user:Poppy in June 2005. Picture taken from the meadow
  • 7. Focus on areas of primary technology Compute Network Storage Databases Identity Data Exchange Logs Metrics Primary Focus Secondary Focus (Tools)
  • 8. Apply Security Principles Least Privilege Defense in Depth Keep it Simple Know your system Strong Authentication https://infosec.mozilla.org/fundamentals/security_principles.html We’ll have some call outs from these
  • 9. Myth I have to be an expert at every AWS Service to defend the cloud.
  • 10. Fact It’s easier to defend security of the cloud.
  • 11. So what are the primary offerings? ( my opinion not official AWS copy ) Compute Storage Networking
  • 12. So what are the primary offerings? ( my opinion not official AWS copy ) Database Data Exchange Foundation & Tools
  • 13. So what are the primary offerings? ( my opinion not official AWS copy )
  • 14. Stay relevant ● Who to follow ○ https://twitter.com/0xdabbad00 ○ https://twitter.com/quinnypig ○ https://twitter.com/jeffbarr ● Blogs for your area ○ https://aws.amazon.com/blogs/security/
  • 16. How do I pwn thee? Let me count the ways.
  • 17. Famous Data Breaches - ( not comprehensive ) ● 2014 Code Spaces - leaked access key causes dissolution of business ● 2017 Uber data breach - access keys leaked in private repo ● 2018 Tesla - Hackers mine bitcoins overly permissive app ● 2019 CapitalOne - S3 Bucket exposure exposes 80,000 bank accounts and over 1,000,000 ID numbers ● 2020 Prestige - S3 Bucket exposure of millions of travel records for customers of Expedia, Travelocity, etc
  • 18. Codespaces Response focus on traditional IR SSH Keys Instance Passwords Access Key Pair ( Admin ) Leaked to Github Attacker persists in various and stealthy ways. ● Creating accounts ● STS Tokens Deletes all the infra and data Game over
  • 19. Lessons Learned ● Access Keys will kill you before you kill the password ○ Attackers scanned for and leveraged keys very quickly ● Incident response needs to take into account cloud native tactics ○ Attackers pivoted to sophisticated persistence ( they know the platform better than the user ● Being in the cloud itself is not a backup strategy ○ The attackers deleted all the data but it didn’t exist elsewhere
  • 20. Uber Breach ● Hackers stole data for 57 million customers ( PII ) Attackers get Access to private git repo Find AWS Access Keys Leverage to exfil data
  • 21. Lessons Learned ● Access Keys will kill you before you kill the password ○ Attackers found access keys in a private repo ( private repos are not password stores ) ● The breach was detected but not reported ● There was a pattern of incidents here for the same system ● Systems used access keys instead of other methods to gain access
  • 22. Tesla Breach ● Bitcoin Mining and Espionage Kubernetes Console AWS Access Key Pair ( overly permissive ) Bitcoin Miners And spying
  • 24. Lessons Learned ● Access Keys will kill you before you kill the password ○ Attackers found access keys in a kubernetes cluster they were too privileged ● The breach was in a dev/test environment with a lack of governance ● Exposed ancillary data for prototypes ● Attackers tried to evade detection by understanding detection mechanisms ( govern CPU usage, use CloudFlare for hiding )
  • 25. Capital One Breach ● Misconfigured WAF, Pivot to Credentials (SSRF), Data Exfil from S3 https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html http://169.254.169.254/latest/user-data
  • 26. Lessons Learned ● Misconfiguration allowed SSRF ( Server side request forgery ) ○ Pivot to calls to localhost metadata server ● Credentials for the instance were overly permissive ● Detection capabilities were not adequate to prevent breach
  • 27. Are you seeing any themes?
  • 28. Least Privilege Defense in Depth Strong Authentication These can all be attributed to principals failures Overly permissive No guardrails on access No 2FA or authentication of requestor Lack of detection Lack of human response
  • 29. These can all be attributed to principals failures Simple systems are “knowable” Misconfiguration is the second largest threat to access key leaks Keep it Simple Know your system
  • 31. Apply Defense in Depth / Strong Authentication ● Really protect those access keys. Assume breach in design ● Safeguard the metadata server. Assume breach in IAM ● Detect changes and analyze. Guardrails approach
  • 32. Know your system ● Keep it simple by making the cloud smaller. Disable things we don’t use. ● Understand how to detect and respond to classes of attacks practically
  • 33. Questions Find your favorite AWS Cloud breach and share a good write up in the discord channel. Bonus points if the initial vector isn’t a leaked access key or SSRF ;)
  • 34. Coming up Detection of Misconfiguration