Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Alabama CyberNow 2018: Cloud Hardening and Digital Forensics Readiness
1. Toni de la Fuente (@ToniBlyx :: blyx.com)
Lead Security Operations / Senior Cloud Security Architect
Cloud Hardening and Digital
Forensics Readiness
3. Once upon a time…
• Digital Forensics IN
and OF the Cloud
• Attacks
• Incident Response
• Hardening
Security IN the
Cloud!
4. AWS Region
Amazon RDS MySQL
Master
Internet
gateway
Availability Zone 1 Availability Zone 2
Public subnet Public subnet
NAT gateway
EC2
Bastion
10.0.128.5
NAT gateway
EC2
Bastion
10.0.144.5
Alfresco One
Auto Scaling Group
Elastic Load
Balancing
Amazon RDS MySQL
Slave
S3 for
Shared Content
Store
10.0.0.0/16
10.0.128.0/20 10.0.144.0/20
10.0.0.0/19 10.0.32.0/19
Alfresco Index
Auto Scaling Group
Private SubnetPrivate Subnet
Alfresco Server Alfresco Server Alfresco ServerAlfresco Server
Index Server Index Server Index Server Index Server
* Immutable infrastructure
6. Common incidents
• Top 3: EC2, IAM, S3
– Access Keys compromise
– Information leaks through
misconfigured services or DNS
– Phishing attacks
– Compromised resources
– Poisoned AMI
– Application running in a role
– Infection through 3rd party
services
– Hybrid attacks
– Subdomain takeovers
– Bitcoin mining
– Did I say MISCONFIGURATIONS?
• Other services (RDS, ES, Redshift)
• What about targeted attacks?
7. Where to find AWS Access Keys…
• UserData, CloudFormation, Metadata Server
• Code: Github or other source code repositories, versions, commit history*
• Public EBS volumes
• Public AMIs
• Public S3 buckets
• Workstation or Server ~/.aws/credentials or C:UsersUSERNAME.awscredentials
• Containers
• Dev Tools: Vagrant images, Packer files, Bamboo, Jenkins…
• Vim swap files
• Service Providers (Slack bots, DataDog, CloudHealth, Okta, OneLogin, etc.)
• Google…
*See truffleHog from dxa4481 in Github
8. S3 Leaks
• Time Warner (BroadSoft)
• Verizon
• Auto Lender
• U.S. Voters
• And many others!
https://github.com/nagwww
/s3-leaks
• Amazon Macie: Machine
Learning, discover and
classify sensitive data in
AWS. PII or intellectual
property.
10. • Notifications from AWS
• Access activity (IAM)
• Billing activity (Budget alerts) new
cloud IDS!
• API Logs
• CloudWatch Events/Alarms
• Service Specific Events
• Dashboards
• CloudWatch
• Personal Health
• Cost Explorer
• Other
• Third party (dedicated tools)
• NIDS (Snort, Suricata, etc.)
• HIDS (Wazuh/OSSEC, Osquery,
rkhunter, Auditd)
• ELK
Incident Indicators
https://cloudonaut.io/aws-monitoring-primer/
11. Cloud Incident Handling Workflow
Instance
Compromise
Start
Forensic
Workstation
Live
or
Dead
Attach the
Tools Volume
Apply
Isolation
SG
Credential
Compromise
Check new
resources created
Disable Keys
Make API log report if
enabled
If found
Isolate them
Create a report
Attach the
Evidence
Collection
Volume
Isolate
it?
Log in to the
instance
Perform
Evidence
Acquisition
Take
snapshot to
all volumes
Stop it
Make Volumes to
Snapshots
Attach Volumes
to Forensic
Workstation
Attach the
Evidence
Collection
Volume
Log in to the
Forensic
Workstation
Analyze /
Further
Investigation
Incident
Live
Dead
Create
Support Case
with Provider
Revoke Access
Revoke Sessions
Outside Info
Acquisition
(instance
profile,endpo
ints,metadat
a, etc)_
Perform
Timeline
Pre-built
Volatiliy
frofile
Pre-built
LiME krnl
mod
RAM
Acquisition
Yes
NIC Network
Scan
Create
Internal Case
Separate Network
with Internet
Access to Scan
CAINE /
SIFT / DEFT
/ FCCU /
HELIX3 /
FIRE
Windows_Life_Response
Sysinternals
Nirsoft
FTK Imager
Autopsy
Sleuthkit
Trigger a
Network
Capture / VPC
Logs
TAG
Resources
under
investigation
*
Hashing
comparison-gold
image, carving,
cloud-init, search
malware, IOC, etc
12. Assets Acquisition Specific to AWS
Perform
Evidence
Acquisition
AWS Infrastructure Logs:
CloudTrail and VPC FlowLogs
AWS Service Logs:
S3 Logs, RDS Logs, Lambda, API Gateway, Route53, CloudFront, etc.
Host Based Logs (volume snapshot)
Messages/System, security, audit, applications, etc.
Additional data from AWS view:
instance profile, endpoints, syslogs, screen, metadata, etc
More Outside:
Limits, check resources creation from given date (all regions)
13. Digital Forensics as a Service? How to be Prepared
• DFaaS: capabilities we can use from a cloud vendor to perform tasks
related to Digital Forensics
• Multi Account Strategy
• Dedicated Account for Forensics
• Dedicated Account for Security Operations
• Acquisition tools ready to use
• Live Data
• Acquire data, what data?
14. • AWS Security assessment tool, 80 check
points (CIS extras)
• New “forensics-ready” group of checks:
• Checks if you are collecting all what you
may need in case of an incident
• Digital Forensics as a Service helper
• CloudTrail, S3, Config, VPCFlowlog, Macie,
GuardDuty, CloudFront, ES, Lambda,
ELB/ALB, Route53, Redshift and more
• https://github.com/toniblyx/prowler
15. CIS Benchmarks
• Center for Internet Security (non-profit)
• Hardening guides for most popular OS, Cloud Providers, Mobile Devices,
Network Devices and others
• Include recommendations regarding security, how to audit them (with
commands if they exist) and how to remediate them.
• Profile definitions:
• Level 1: reduced hardening
• Level 2: defense in depth
• You can help developing benchmarks https://workbench.cisecurity.org/
• There are two CIS Benchmark guides for AWS:
• CIS Benchmarks for CIS Amazon Web Services Foundations Benchmark 1.1.0
• CIS Amazon Web Services Three-tier Web Architecture Benchmark 1.0.0
16. Prowler: Features
AWS Security Best Practices
Assessment, Auditing, Hardening and
Forensics Readiness Tool
• 80 check points (CIS + extras)
• It covers hardening and security best
practices for all AWS regions related
to:
• Identity and Access Management (24
checks)
• Logging (8 checks)
• Monitoring (15 checks)
• Networking (5 checks)
• Extras (25 checks)
• Forensics related group of checks
• With Prowler you can:
• get a colourish or monochrome report
• a CSV format report for diff
• run specific checks without having to run
the entire report
• check multiple AWS accounts in parallel
17. Prowler: Requirements
• OS: Linux, OSX, Cygwin, Alpine
• Latest AWS-CLI: pip install awscli
• Prowler: git clone
https://github.com/toniblyx/prowler
• Configure valid Access Key and
Region: aws configure / export keys
/ instance profile
• Make sure your Secret and Access
Keys are associated to a user with
proper permissions to do all checks
• Usage: ./prowler
20. Digital Forensics as a Service: Tools/Challenges
• Userland / Process Memory Acquisition
• AWS System Manager (ssm)
• aws_ir, Margaritashotgun (LiME)
• Volatility and Rekall automation
• ECFS: extended core file snapshot format
• Containers
• Analysis process
• IOC
• Something like LibVMI: VM introspection
would help (Volatility integration)
• Storage Acquisition and Processing
• Depends on the Storage used
• Easier for EBS Snapshots à Volumes
• DFTimewolf (Grr)
• Multiple Account Tools, Resources and
Vendors
• We don’t capture just one resource!
• Enterprise grade
• Processing collected data
• Turbinia
• Plaso
• Laika BOSS
• BinaryAlert
• Analyze data
• Timeline with ALL ACQUIRED DATA?
• Timesketch
• EVERYTHING? Room to improve here!
• Multiple data formats
• Multiple sources
• Correlation
25. Instance / Network / Provider
• Put all what you need in your well known AMI (gold image):
• Hardening applied / Tested (Packer/Vagrant)
• CIS Benchmark!
• No configuration or access needed
• Local tools
• Osquery / Wazuh-OSSEC / rkhunter / grr
• Update rules / serverless
• local configuration (SELinux/AppArmour)
• AuditD
• Collect telemetry host network data (Snort/Suricata)
• Collect everything your provider allows you
• Networking
• APIs / Accesses (AWS API Call Limit)
• Red Team / Third party pentesting*
28. Thanks!
Special Thanks to:
Ismael Valenzuela @aboutsecurity
Andrew K. @andrewkrug & ThreatResponse.cloud Team
Alex Maestretti @maestretti
Lorenzo Martinez @lawwait
Lórien Domenech @loriendr
Open Source Community improving Prowler!
30. References
• Cloud Security Alliance, Mapping the Forensic Standard ISO/IEC 27037 to Cloud Computing, June 2013
• Dr. Keyun Ruan University College Dublin, Designing a Forensic-enabling Cloud Ecosystem, 2013
• International Standard ISO/IEC 27037, Information technology — Security techniques — Guidelines for identification, collection, acquisition, and preservation of digital evidence, October
2012
• Josiah Dykstra, Digital Forensics for IaaS Cloud Computing, June 2012
• Keyun Ruan, Ibrahim Baggili (PhD), Prof Joe Carthy, Prof Tahar Kechadi University College Dublin, Zayed University, Survey on Cloud forensics and critical criteria for Cloud forensic capability:
A preliminary analysis
• Keyun Ruan, Joe Carthy, Tahar Kechadi and Mark Crosbie, Cloud Forensics
• Keyun Ruan, University College Dublin, Cloud Forensics: challenges & opportunitiess, 2010
• NIST Cloud Computing Forensic Science Working Group Information Technology Laboratory, NIST Cloud Computing Forensic Science Challenges, June 2014
• Peter Mell Timothy Grance, NIST Special Publication 800-145, The NIST Definition of Cloud Computing, September 2011
• Report From the First Digital Forensic Research Workshop (DFRWS), A Road Map for Digital Forensic Research, August 2001
• Forensics-as-a-Service (FaaS): Computer Forensic Workflow Management and Processing Using Cloud. Yuanfeng Wen, Xiaoxi Man, Khoa Le and Weidong Shi
• http://static1.squarespace.com/static/5417f7f9e4b0b77770545590/t/56f3c598906340a7f6e78dbd/1458816415654/AWS_Cloud_and_Security.pdf
• https://www.blackhat.com/docs/us-16/materials/us-16-Amiga-Account-Jumping-Post-Infection-Persistency-And-Lateral-Movement-In-AWS-wp.pdf
• https://alestic.com/2015/10/aws-iam-readonly-too-permissive/
• Backdooring an AWS account
• Exploring an AWS account post-compromise
• Disrupting AWS logging
• AWS IAM "ReadOnlyAccess" Managed Policy is Too Permissive (For Us)
• Access Keys will kill you before you kill the password
• Account Jumping Post Infection Persistency and Lateral Movement in AWS
• Disrupt CloudTrail and pwning automation tools
• RSA 2017 talk: Cloud Security Automate or Die, same tittle as mine but a bit different approach
• RSA 2017 talk: Securing Serverless applications in the Cloud
• RSA 2017 talk: DevSecOps on the Offense: Automating Amazon Web Services Account Takeover
• https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2017/august/when-a-web-application-ssrf-causes-the-cloud-to-rain-credentials-and-more/
• https://www.sans.org/reading-room/whitepapers/cloud/digital-forensic-analysis-amazon-linux-ec2-instances-38235