The Technology Headlines DEMAND FORCASTING & AI | Page 9
THE TECHNOLOGY HEADLINES
EXPERT ANALYSIS
“ One successful spear-phishing attack shouldn’t be able to
“
bring down your entire cloud environment
providers? This provides convenience and transparency,
but also drastically increasesthe blast radius of a successful
compromise. from that position. Can other instances be accessed? Or
worse, can they achieve privilege escalation within the
account and gain full control of the cloud account?
These are all important issues that are crucial to
understand,and questions that need to be answered in order
to determine which avenues an attacker might take within
your estate. In the course of many simulated attacks on cloud
environments, Context researchers have found exploitable
weaknesses in all these areas. For private hybrid cloud environments, where a public cloud
provider is not being used for any public-facing services but
purely as an extension of an on-premise environment, an
egress assessment serves to determine if any services have
not been locked down sufficiently to allow data to flow out
from the VPC to the Internet, or worse, out from an on-
premise instance, through the VPC and out to the Internet.
To help understand your exposure to various attacks, start
with a baseline account configuration review. This can be
done in AWS, Azure, and Google Cloud Platform, for example,
and assesses the configuration of a cloud account itself, its
access permissions, and any resources deployed within the
account. What resources are users able to access,how could
resources be misconfigured and how might a potential
attacker leverage these misconfigurations?
The next step is an assumed compromise breakout
assessment. This involves starting from an assumed
compromise position on a compute instance and assessing
what the blast radius is, and what an attacker can achieve
AUGUST 2019
Finally, a bespoke scenario assessment can be tailored
specifically to your estate, to assess the risks posed by
each threat actor in your threat model. These can all also
be performed inside cloud environments such as web
application assessments, build reviews, and internal and
external infrastructure assessments.
Migration to the cloud is only going one way, butour
research and experience shows that vulnerabilities in cloud
environments can have real-world consequences if exploited
by malicious attackers. So, you need to find and fix those
weak links before they do.
9