Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Long living creds in Cloud?

Ashish
February 27, 2018

Long living creds in Cloud?

Long living creds in Cloud? Do we really need it?

Ashish

February 27, 2018
Tweet

More Decks by Ashish

Other Decks in Technology

Transcript

  1. Who am I? Ashish Rajan https://au.linkedin.com/in/ashishrajan @hashishrajan Security, Startups, Public

    Speaker, Meetup Organiser Trying to make cloud a safer space J Versent – 2nd in the list of fastest growing startup in Australia for 2017 (source: BRW Australia 2017 edition) AWS Security Competency Partner
  2. What is covered • What are the kind of creds

    found in Cloud • What does it do? • Are long terms creds the only option?
  3. • Email and Password • UserName and Password • API

    Keys (Access Keys) • SSH Keys (Key Pairs) • Windows Password Keys (Key Pairs) • Private keys for SSL certificates What are the kind of creds? (AWS)
  4. • O365 Email and Password • Azure AD UserName and

    Password • API Keys (App only Access Token) • API Keys (User + App Access Token) • OS(Windows/Linux) Password • Storage Account Keys • Private keys for SSL certificates What are the kind of creds? (Azure)
  5. Solution 1. Use RBAC (Role based Access Control) 2. Linting

    tools to eliminate any secrets in repositories 3. Enable Federation between AWS and your Organisation 4. Short Term API Keys Linkedin: https://au.linkedin.com/in/ashishrajan Twitter: @hashishrajan
  6. Short Term API Keys 1. AWS – AWS STS (Secure

    Token Service) 2. Azure – Azure SAS (Shared Access Signature) Linkedin: https://au.linkedin.com/in/ashishrajan Twitter: @hashishrajan
  7. AWS STS 1. Instance Profile IAM Role 2. Access Keys

    – (Temporary) Linkedin: https://au.linkedin.com/in/ashishrajan Twitter: @hashishrajan
  8. Tools 1. Saml2aws (https://github.com/Versent/saml2aws) 2. AWS MFA (https://github.com/lonelyplanet/aws-mfa) 3. AWS

    + Azure AD (https://github.com/dtjohnson/aws-azure- login) Linkedin: https://au.linkedin.com/in/ashishrajan Twitter: @hashishrajan
  9. AWS STS – Best Practise 1. Disable STS in all

    region except your own region (us-east is an exception) 2. MFA for the use of API keys 3. Where possible enable Federation for centralised User Management 4. IAM Roles should be defined with the least privilege in mind 5. Where possible, when using IAM Instance Profile – add a conditional statement for SourceIP to prevent possible SSRF/XXE attack vectors 6. Define a Process for compromised creds/Keys - IAM Users and Federated Users and 3rd Party Providers
  10. Next Evolution of security in creds (AWS) 1. Federation enabled

    but an IAM User is created 2. Root user logs into the Console 3. Root user creates an Access Keys 4. Multiple Failed login attempts by a user 5. Multiple API calls (>5) to non-authorised services Linkedin: https://au.linkedin.com/in/ashishrajan Twitter: @hashishrajan