Git Product home page Git Product logo

threatmodel-for-aws-s3's Introduction

threatmodel-for-aws-s3's People

Contributors

jon-trust avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

threatmodel-for-aws-s3's Issues

privesc and lateral roles

Not much coverage of the privileged escalation threats, or what I've started calling the 'lateral roles' vector that occur when there are open IAM roles that are NOT locked down by;

  • really specific condition statement (like principal OrgID, identity federation, and MFA as the best combination)
  • principal AND condition (principal alone typically still allows an EC2 from attacker account use an resource default like Cognito or managed role as just 1 of numerous examples)
  • less specific condition statement (like a resource tag, permissions boundary policy, or a time based condition for so-called temporary permissions)
  • deliberately exposing a role assumed to be 'protected' by an ExternalD that is weak, reused, guessable, not actually a secret, or persistent (never rotated)

Essentially the most common vector used to attack AWS customers are not in practice most of the vectors in the threat model so far, it is far easier than all them! The easiest is to just become an authorised AWS user that nobody suspects, specifically these are IAM Roles that were created for a real use case and left open for any attacker to assume without any form of protection described above.

This is not some new attack vector I'm describing, it isn't something I identified. It is AWS fundamentals, a basic, common, well-known, and very widely understood, attack vector.

It would be great to see this explored in the threat model more than most of the other attack vectors that are essentially very low likelihood in comparison to open IAM roles that every account I've seen as an AWS APN Partner of the year with all AWS Competencies obtained, it is very obviously abused in every account I've assessed mostly because it is so easy to forget and ignore once a role is deemed to be working as intended.

EDIT: obviously (maybe not so obvious) this is in context to a Role that can interact with S3)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.