Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Hacking Monitoring for Fun and Profit

Hacking Monitoring for Fun and Profit

Omer Levi Hevroni

December 08, 2020
Tweet

More Decks by Omer Levi Hevroni

Other Decks in Technology

Transcript

  1. CNCF Omer Levi Hevroni | AppSec Engineer @ Snyk |

    @omerlh Hacking Monitoring for Fun and Profit
  2. • What is Threat Modeling? • What is Monitoring? •

    How hackers can leverage our monitoring systems? ◦ AKA Threat modeling our monitoring systems What we are going to discuss @omerlh
  3. Threat Modeling Manifesto https://www.threatmodelingmanifesto.org/ • What are we building? •

    What can go wrong? • What are we doing about it? • Did we do a good job? @omerlh
  4. • What are we building? • What can go wrong?

    • What are we doing about it? • Did we do a good job? Threat Modeling @omerlh
  5. “ Monitoring based on metrics exposed by the internals of

    the system, including logs, interfaces like the Java Virtual Machine Profiling Interface, or an HTTP handler that emits internal statistics. “ White-box Monitoring @omerlh
  6. • Monitoring system • Time-Series database • Alerting system •

    Auto-discovery Prometheus https://prometheus.io/ @omerlh
  7. • Check for known vulns • Review manifests files before

    deployment • Testing • Authentication/VPN ◦ Grafana has built-in authentication ◦ Use products like oauth proxy for all the rest Other Mitigations @omerlh
  8. • What are we building? • What can go wrong?

    • What are we doing about it? • Did we do a good job? Threat Modeling @omerlh
  9. • Least Privilege • Block access • Tracing • Limit

    to test data only Potential Mitigations @omerlh
  10. • Monitoring is just code • Careful when exposed to

    the internet • Conduct threat model for monitoring Key Takeaway @omerlh