<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Etienne Lafore, Auteur</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/author/etienne-lafore/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/author/etienne-lafore/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Fri, 31 Jan 2025 15:11:05 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Etienne Lafore, Auteur</title>
	<link>https://www.riskinsight-wavestone.com/author/etienne-lafore/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Enterprise Access Model (2/2): What are the solutions to secure the Control Plane </title>
		<link>https://www.riskinsight-wavestone.com/en/2025/01/enterprise-access-model-2-2-what-are-the-solutions-to-secure-the-control-plane/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/01/enterprise-access-model-2-2-what-are-the-solutions-to-secure-the-control-plane/#respond</comments>
		
		<dc:creator><![CDATA[Etienne Lafore]]></dc:creator>
		<pubDate>Fri, 31 Jan 2025 15:11:04 +0000</pubDate>
				<category><![CDATA[Focus]]></category>
		<category><![CDATA[CICD]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[compromise]]></category>
		<category><![CDATA[control plane]]></category>
		<category><![CDATA[IT support]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=25229</guid>

					<description><![CDATA[<p>In the first article of this series, we explored the foundation of Microsoft’s Enterprise Access Model (EAM), focusing on the critical task of scoping the Control Plane to safeguard cloud administration. We delved into the evolving security landscape, where the...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/01/enterprise-access-model-2-2-what-are-the-solutions-to-secure-the-control-plane/">Enterprise Access Model (2/2): What are the solutions to secure the Control Plane </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"><span data-contrast="auto">In the first article of this series, we explored the foundation of Microsoft’s Enterprise Access Model (EAM), focusing on the critical task of scoping the Control Plane to safeguard cloud administration. We delved into the evolving security landscape, where the traditional AD 3-tiers model is no longer sufficient for the complexities and dependencies of cloud environments. The shift to the cloud has introduced new risks, particularly the global compromise originating from a single weak point of the Control Plane. Then, we emphasized the importance of identifying and isolating key components whose compromise could lead to a global compromise of Entra ID. </span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">In this second article, we will analyze practical attack scenarios that threaten the Control Plane and provide actionable recommendations to mitigate these risks. Specifically, we will explore three common attack scenarios that pose significant threats to the control plane: IT Support compromise, Control Plane Administrator Laptop compromise and CI/CD compromise. By understanding these attack vectors and implementing robust security measures, you can significantly enhance your cloud environment&#8217;s resilience against potential compromises.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span></p>
<h2><b><span data-contrast="auto">IT support compromise</span></b><span data-ccp-props="{}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">Imagine a scenario where the account of a member of the IT support is compromised. This might occur through a phishing attack, social engineering, or even a credential stuffing attempt. Such accounts often can reset passwords, including those of very high-privilege users, like Application Administrator or an Azure’s </span><i><span data-contrast="auto">Owner</span></i><span data-contrast="auto"> at root level, thereby gaining unauthorized access to critical resources from Entra ID to the Cloud to On-premises to SaaS.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{}"> <img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-25220" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/1-IT-support-compromise-scenario.jpg" alt="1-IT-support-compromise-scenario" width="930" height="417" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/1-IT-support-compromise-scenario.jpg 930w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/1-IT-support-compromise-scenario-426x191.jpg 426w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/1-IT-support-compromise-scenario-71x32.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/1-IT-support-compromise-scenario-768x344.jpg 768w" sizes="(max-width: 930px) 100vw, 930px" /></span></p>
<p style="text-align: justify;"><span data-contrast="auto">This type of attack illustrates a critical point we discussed in the first article: the need to scope and isolate the control plane effectively. The help desk, while essential for everyday operations, must be rigorously segregated from high-privilege administrative functions. The lack of such separation can allow an attacker to pivot from a compromised help desk account to a Global Admin role.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">To mitigate this risk, organizations must implement a series of strategic defenses:</span><span data-ccp-props="{}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">First, isolating control plane accounts from those managed by IT support is essential. This ensures that even if a help desk account is compromised, it cannot be used to access or manipulate high-privilege accounts. </span><span data-ccp-props="{}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Second, using cloud-only accounts dedicated to control plane tasks reduces the likelihood of legacy systems being exploited as an entry point. </span><span data-ccp-props="{}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Third, coupling these accounts with phishing-resistant Multi-Factor Authentication (MFA), Just-In-Time admin (JIT), robust identity governance and conditional access policies, strict workstation conformity creates a multi-layered defense that significantly diminishes the risk of such an attack.</span><span data-ccp-props="{}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">This scenario underscores the importance of viewing every account as a potential threat vector. By enforcing strict segregation and controls, you can ensure that your control plane remains secure, even if a lower-tier account is compromised.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span></p>
<h2><b><span data-contrast="auto">Control Plane Admin’s Laptop compromise</span></b><span data-ccp-props="{}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">Now, consider </span><span data-contrast="auto">a situation where the </span><span data-contrast="auto">attacker successfully compromises Intune’s </span><span data-contrast="auto">Mobile Device Manager (MDM) admin account</span><span data-contrast="auto">. With this access, the attacker gains control over Intune admin portal, allowing him to manipulate the laptop of a control plane admin. He can deploy malicious configurations, install backdoors, or directly connect to the admin’s laptop (Remote Help). This access turns the admin’s laptop into a powerful tool for further exploitation, granting the attacker the ability to execute commands, exfiltrate sensitive data, and manipulate cloud resources without the need for additional sophisticated hacking.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{}"> <img decoding="async" class="aligncenter size-full wp-image-25222" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/2-Control-plane-administration-workstation-compromise-scenario.jpg" alt="2-Control-plane-administration-workstation-compromise-scenario." width="925" height="414" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/2-Control-plane-administration-workstation-compromise-scenario.jpg 925w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/2-Control-plane-administration-workstation-compromise-scenario-427x191.jpg 427w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/2-Control-plane-administration-workstation-compromise-scenario-71x32.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/2-Control-plane-administration-workstation-compromise-scenario-768x344.jpg 768w" sizes="(max-width: 925px) 100vw, 925px" /></span></p>
<p style="text-align: justify;"><span data-contrast="auto">This scenario reminds us of a key principle from the first article: cloud security must be approached holistically. It is not just about securing identities but also ensuring that the devices used to access the Control Plane are secured. In this case, the Control Plane admin’s laptop becomes a critical asset that, if compromised, could undermine even the most sophisticated cloud defences.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">To prevent such an outcome, organizations need to integrate admin workstations in the Control Plane. At a minimum, devices used for administrative tasks must be tightly controlled through dedicated MDM policies, ensuring strict access controls, encryption, and continuous monitoring. However, for higher-risk scenarios, leveraging Privileged Access Workstations (PAWs) is essential. PAWs are isolated, hardened machines dedicated solely to administrative activities. They operate under a far stricter security regime than standard devices—limited internet access, dedicated management, and enhanced monitoring—ensuring that they cannot easily become a tool for attackers.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">This scenario demonstrates that endpoint security is inseparable from cloud security. By securing the very devices that control your cloud infrastructure, you reduce the chances of a breach originating from compromised endpoints, ensuring that your Control Plane remains protected against even the most sophisticated attacks.</span><span data-ccp-props="{}"> </span></p>
<p> </p>
<h2><b><span data-contrast="auto">CI/CD compromise</span></b><span data-ccp-props="{}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">As cloud environments rely heavily on automation, CI/CD pipelines for managing infrastructure become prime targets for attackers. Imagine a scenario where an attacker gains access to a DevOps engineer’s account via phishing or credential theft. With this foothold, he pushes malicious Infrastructure as Code (IaC) change into a Git repository, knowing this will trigger an automated Azure pipeline. The pipeline validates, plans, and deploys the infrastructure on Azure, leading to the destruction or alteration of key Azure resources, i.e. the foundations of the Landing Zone. Alternatively, the attacker modifies the Azure Pipeline’s YAML configuration. By doing so, he causes the pipeline to leak a service principal secret in the logs or debug console, which is then used to make unauthorized Graph API calls. Abusing the overprivileged identity, the attacker can escalate its privilege, compromising Entra ID identities or Office 365 accounts. Runners also play a crucial role in the CICD pipeline. They are agents responsible for executing jobs in the pipeline. They can be hosted and maintained by the Cloud Provider or hosted on-premises. As with any server, their compromise can be used as a pivot point to bounce back to the Landing Zone (e.g., token stealing) or other associated services.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{}"> <img decoding="async" class="aligncenter size-full wp-image-25224" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/3-CICD-compromise-scenario.jpg" alt="3-CICD-compromise-scenario." width="932" height="387" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/3-CICD-compromise-scenario.jpg 932w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/3-CICD-compromise-scenario-437x181.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/3-CICD-compromise-scenario-71x29.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/3-CICD-compromise-scenario-768x319.jpg 768w" sizes="(max-width: 932px) 100vw, 932px" /></span></p>
<p style="text-align: justify;"><span data-contrast="auto">This scenario illustrates interconnectedness of cloud security. The CI/CD pipeline, often seen as a back-office function, is, in reality, deeply integrated with the Control Plane. Its compromise can lead to widespread, devastating consequences to the very foundation of your cloud operations.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">To protect against such threat, it is crucial to isolate the Control Plane’s pipeline whose purpose is to build the Landing Zone from project pipelines. Then, one should apply the principle of least privilege, ensuring that accounts and runners within the pipeline have only the permissions they need to perform their tasks. For example, to limit runner permissions we can use federated identity and request OpenID Connect (OIDC) tokens, which provide scoped and temporary access to Cloud Services like Azure. Additionally, adopting automated security practices such as Configuration as Code (CaC) or Policy as Code (PaC), can help reduce human error and ensure consistent security across your deployments.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">In cloud security, every process and every tool must be viewed through the lens of potential risk. The CI/CD pipeline is no exception. By securing this critical component, you not only protect your control plane but also ensure the stability and security of your entire cloud infrastructure. This holistic approach to cloud security is what will ultimately keep your operations running smoothly, even in the face of sophisticated attacks.</span><span data-ccp-props="{}"> </span></p>
<p> </p>
<h2 style="text-align: justify;"><b><span data-contrast="auto">Synthesis</span></b><span data-ccp-props="{}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">In this article, we have examined three attack scenarios that threaten the security of the control plane in cloud environments: IT support compromise, Control Plane Admin’s laptop compromise, and CI/CD pipeline compromise. </span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Each of these scenarios highlights the importance of a multi-layered security approach that includes both technical and organizational measures. We propose a four-step strategy designed to design your Control Plane and secure it against potential attacks:</span><span data-ccp-props="{}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="-" data-font="Aptos" data-listid="5" data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Aptos&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="0" data-aria-level="1"><b><span data-contrast="auto">Step 1: define what is systemic for your infrastructure:</span></b><span data-contrast="auto"> identify the critical components and accounts within your control plane that, if compromised, could lead to a global disruption.</span></li>
<li data-leveltext="-" data-font="Aptos" data-listid="5" data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Aptos&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="0" data-aria-level="1"><b><span data-contrast="auto">Step 2: assess your current risk with a security audit:</span></b><span data-contrast="auto"> conduct regular security audits to evaluate the current state of your control plane security. This will help you identify vulnerabilities and prioritize remediation efforts.</span></li>
<li data-leveltext="-" data-font="Aptos" data-listid="5" data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Aptos&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="0" data-aria-level="1"><b><span data-contrast="auto">Step 3: define a roadmap to isolate and secure the assets most at risk:</span></b><span data-contrast="auto"> based on your audit findings, develop a clear roadmap for securing the most critical assets. This should include timelines, resource allocation, and specific actions to mitigate identified risks.</span><span data-ccp-props="{}"> </span></li>
<li data-leveltext="-" data-font="Aptos" data-listid="5" data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Aptos&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="0" data-aria-level="1"><b><span data-contrast="auto">Step 4: prepare for cloud eraser scenarios:</span></b><span data-contrast="auto"> consider worst-case scenarios where entire sections of your cloud infrastructure might be compromised or disabled. Develop contingency plans and ensure that backups and disaster recovery processes are in place.</span><span data-ccp-props="{}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">By following these recommendations, you can build a robust defense against potential threats to your control plane, ensuring that your cloud environment remains secure and resilient.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">Thank you to <strong>Louis CLAVERO</strong> for contributing to this article.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/01/enterprise-access-model-2-2-what-are-the-solutions-to-secure-the-control-plane/">Enterprise Access Model (2/2): What are the solutions to secure the Control Plane </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/01/enterprise-access-model-2-2-what-are-the-solutions-to-secure-the-control-plane/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Enterprise Access Model (1/2): How to scope your Control Plane to secure your Cloud Administration and prevent a global Cloud compromise</title>
		<link>https://www.riskinsight-wavestone.com/en/2025/01/enterprise-access-model-1-2-how-to-scope-your-control-plane-to-secure-your-cloud-administration-and-prevent-a-global-cloud-compromise/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/01/enterprise-access-model-1-2-how-to-scope-your-control-plane-to-secure-your-cloud-administration-and-prevent-a-global-cloud-compromise/#respond</comments>
		
		<dc:creator><![CDATA[Etienne Lafore]]></dc:creator>
		<pubDate>Mon, 27 Jan 2025 06:38:19 +0000</pubDate>
				<category><![CDATA[Focus]]></category>
		<category><![CDATA[cloud administration]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[control plane]]></category>
		<category><![CDATA[enterprise access model]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=25214</guid>

					<description><![CDATA[<p>  This article is the first of a series of 2, tackling the implementation of the Enterprise Access Model, an administration model proposed by Microsoft to secure the administration of Cloud environments.   Today, most companies use public cloud to host...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/01/enterprise-access-model-1-2-how-to-scope-your-control-plane-to-secure-your-cloud-administration-and-prevent-a-global-cloud-compromise/">Enterprise Access Model (1/2): How to scope your Control Plane to secure your Cloud Administration and prevent a global Cloud compromise</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><i><span data-contrast="auto">This article is the first of a series of 2, tackling the implementation of the Enterprise Access Model, an administration model proposed by Microsoft to secure the administration of Cloud environments. </span></i><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Today, most companies use public cloud to host numerous workloads from business to functional services. Although this brings benefits, the Cloud also introduces new paradigms, which need to be understood clearly in order to be secured.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Historically, enterprises have relied on a 3-tier model for securing Active Directory environments. This model segments the network into three distinct tiers: Tier 0 for highly sensitive systems and data, Tier 1 for server administration, and Tier 2 for end-user workstations and devices. While this model has proven effective in on-premises environments, the shift to cloud-based infrastructures requires a reevaluation of its applicability.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">This article delves into a recent, concerning trend: the global compromise of Entra ID, originating from the compromise of a helpdesk account. Such an attack can have severe repercussions, even more so than an AD Domain Administrator compromise. We will explore the mechanisms behind these attacks, their implications, and, most importantly, how we should protect against this kind of privilege escalation and implement an adapted and secured administration model.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span></p>
<h2><b><span data-contrast="auto">Understanding Entra ID, Active Directory, and Azure Permissions</span></b><span data-ccp-props="{}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">As shown in </span><span data-contrast="auto">Figure 1</span><span data-contrast="auto">, Active Directory and Entra ID (formerly Azure Active Directory) are two Identity services with different structural properties and IAM protocols. While Entra ID focuses on identity and access management across both cloud and on-premises environments, providing authentication and user management, Azure permissions extend to the broader management of cloud infrastructure and services. Understanding the distinctions and interconnections between these tools is essential for maintaining robust security and effective access control in modern enterprise environments.</span><span data-ccp-props="{}"> </span><i><span data-contrast="none"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-25202" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/Figure-1-Differences-cles-entre-Active-Directory-et-Entra-ID.jpg" alt="Figure 1: Active Directory and Entra ID key differences" width="538" height="300" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/Figure-1-Differences-cles-entre-Active-Directory-et-Entra-ID.jpg 538w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/Figure-1-Differences-cles-entre-Active-Directory-et-Entra-ID-343x191.jpg 343w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/Figure-1-Differences-cles-entre-Active-Directory-et-Entra-ID-71x39.jpg 71w" sizes="auto, (max-width: 538px) 100vw, 538px" /></span></i></p>
<p style="text-align: center;"><span data-ccp-props="{}"> <i>Figure </i><i>1</i><i>: Active Directory and Entra ID key differences</i></span></p>
<p> </p>
<p style="text-align: justify;"><span data-contrast="auto">Between Active Directory, Entra ID, and Azure- each manages its own permission model:</span><span data-ccp-props="{}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="-" data-font="Aptos" data-listid="26" data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Aptos&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="0" data-aria-level="1"><span data-contrast="auto">Active Directory uses a unified permission model for all its objects, from users to servers.</span><span data-ccp-props="{}"> </span></li>
<li data-leveltext="-" data-font="Aptos" data-listid="26" data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Aptos&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="0" data-aria-level="1"><span data-contrast="auto">Entra ID uses Role-Based Access Control (RBAC) to manage its tenant&#8217;s objects (e.g., users, devices, applications).</span><span data-ccp-props="{}"> </span></li>
<li data-leveltext="-" data-font="Aptos" data-listid="26" data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Aptos&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="0" data-aria-level="1"><span data-contrast="auto">Azure Resource Manager (RM) uses RBAC to manage Azure resources</span><span data-ccp-props="{}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">However, there is a bridge between Entra ID and Azure RM thanks to the single tenant’s relationship to an Azure organization: the Entra ID’s Global Admin role is assigned by default the User Access Administrator role in the Azure RM service. As a result, it can grant itself full permissions in Azure. </span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Although there is a link between Azure and Entra ID, it&#8217;s important to remember that the roles in Entra ID and Azure RM can be assigned independently. For example, a standard Entra ID user with very limited permissions on Entra ID can hold the highest privileges in Azure RM, which is a critical point of vulnerability exploited in attacks.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Privilege escalation in Entra ID can lead to an extensive compromise of Azure RM (including all resources and infrastructures), Microsoft 365, workstations, Windows servers, cloud networks, and more.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">The most privileged roles in both systems are:</span><span data-ccp-props="{}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Symbol" data-listid="24" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="auto">Entra ID</span></b><span data-contrast="auto">: Global Administrator</span><span data-ccp-props="{}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="24" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="auto">Azure RM</span></b><span data-contrast="auto">: Owner (which can be scoped from Management Groups down to resources)</span><span data-ccp-props="{}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">These significant differences mean that the concepts from the traditional AD 3-tier model cannot be directly applied to cloud environments. We must rethink and adapt these concepts to ensure they are relevant and effective in cloud-based contexts, particularly by adequately addressing the specific requirements and risks associated with cloud environments.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335559685&quot;:1440}"> </span></p>
<h2><b><span data-contrast="auto">A real-life global Entra ID compromise</span></b><span data-ccp-props="{}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">To focus on Cloud Administration compromise and privilege escalation, a small number of hypotheses will be taken:</span><span data-ccp-props="{}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="-" data-font="Tahoma" data-listid="18" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">The victim has an Entra ID tenant as Identity Provider.</span><span data-ccp-props="{}"> </span></li>
<li data-leveltext="-" data-font="Tahoma" data-listid="18" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">The victim</span><span data-contrast="auto"> uses Intune to manage its entire workstation fleet</span><span data-contrast="auto">.</span><span data-ccp-props="{}"> </span></li>
<li data-leveltext="-" data-font="Tahoma" data-listid="18" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">The victim has an Azure subscription for its Virtual Desktop Infrastructure activities.</span><span data-ccp-props="{}"> </span></li>
<li data-leveltext="-" data-font="Tahoma" data-listid="18" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">A helpdesk account is compromised (the source of the attack is not relevant, but it is important to note that this is a likely scenario that could have been the result of several different compromise like phishing, credential theft, workstation compromise, social engineering, etc.).</span><span data-ccp-props="{}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span></p>
<h3><b><span data-contrast="auto">1 Compromising a helpdesk account</span></b><span data-ccp-props="{&quot;335559685&quot;:1066,&quot;335559739&quot;:240,&quot;335559991&quot;:709}"> </span></h3>
<ul style="text-align: justify;">
<li data-leveltext="-" data-font="Tahoma" data-listid="18" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"><span data-contrast="auto">Following our last hypothesis, the attacker has gained control of a helpdesk account, that can reset passwords and MFA. </span><span data-ccp-props="{}"> </span></li>
</ul>
<h3><b><span data-contrast="auto">2 Initial Attempt to Reset Global Administrator Account</span></b></h3>
<ul style="text-align: justify;">
<li data-leveltext="-" data-font="Tahoma" data-listid="21" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">The attacker initially attempts to reset the Global Administrator account, seeking the quickest path to becoming the Global Administrator of Entra ID.</span></li>
<li data-leveltext="-" data-font="Tahoma" data-listid="21" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">This action is blocked by default by Microsoft. The Global Administrator role is a “privileged role”, and only specific privileged roles are authorized to reset its password or modify its attributes.</span> <span data-contrast="auto">Microsoft updates </span><a href="https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/permissions-reference"><span data-contrast="none">here</span></a><span data-contrast="auto"> its list of privileged built-in Entra ID roles.</span><span data-ccp-props="{}"> </span></li>
</ul>
<h3><b><span data-contrast="auto">3 Targeting a High-Value Standard User Account</span></b></h3>
<ul style="text-align: justify;">
<li data-leveltext="-" data-font="Tahoma" data-listid="21" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Restricted to resetting standard Entra ID user passwords, the attacker identifies a user with the username &#8220;VDI Admin”, who is the Owner of an Azure RM subscription used for workstation administration services.</span><span data-ccp-props="{}"> </span></li>
<li data-leveltext="-" data-font="Tahoma" data-listid="21" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Despite MFA being enabled on the account, the attacker successfully resets both the password and MFA mechanisms, gaining access to the account.</span><span data-ccp-props="{}"> </span></li>
</ul>
<h3><b><span data-contrast="auto">4 Searching the available subscription</span></b><span data-ccp-props="{}"> </span></h3>
<ul style="text-align: justify;">
<li data-leveltext="-" data-font="Tahoma" data-listid="21" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"><span data-contrast="auto">With the VDI Admin password reset, the attacker logs in and accesses the subscription. Through reconnaissance, they discover access to a key vault containing credentials for a service account.</span><span data-ccp-props="{}"> </span></li>
<li data-leveltext="-" data-font="Tahoma" data-listid="21" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"><span data-contrast="auto">The service account is identified as having the &#8220;Intune Administrator&#8221; role in Entra ID.</span><span data-ccp-props="{}"> </span></li>
</ul>
<h3><b><span data-contrast="auto">5 Utilizing Intune Administrator Privileges</span></b><span data-ccp-props="{}"> </span></h3>
<ul style="text-align: justify;">
<li data-leveltext="-" data-font="Tahoma" data-listid="21" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="7" data-aria-level="1"><span data-contrast="auto">The attacker logs in as the Intune Administrator, gaining permissions related to workstation administration, including the ability to run scripts on any workstation.</span><span data-ccp-props="{}"> </span></li>
<li data-leveltext="-" data-font="Tahoma" data-listid="21" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="7" data-aria-level="1"><span data-contrast="auto">They deploy a script on the Global Administrator’s workstation to extract authentication cookies from the Global Administrator’s browser.</span><span data-ccp-props="{}"> </span></li>
</ul>
<h3><b><span data-contrast="auto">6 Compromising the Global Administrator Account</span></b></h3>
<ul style="text-align: justify;">
<li data-leveltext="-" data-font="Tahoma" data-listid="21" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="9" data-aria-level="1"><span data-contrast="auto">The attacker obtains the Global Administrator’s authentication cookies and uses them on their own workstation to impersonate the Global Administrator.</span><span data-ccp-props="{}"> </span></li>
<li data-leveltext="-" data-font="Tahoma" data-listid="21" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="9" data-aria-level="1"><span data-contrast="auto">This grants the attacker control over the entire Microsoft Entra ID tenant, which includes compromising the Microsoft365 tenant, the Azure RM environments, and all other Microsoft cloud-based tools relying on Entra ID.</span><span data-ccp-props="{}"> </span></li>
</ul>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-25204" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/Figure-2-Chemin-de-compromission-globale-du-Cloud-Azure-.jpg" alt="Figure 2: A global Cloud compromise path " width="573" height="358" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/Figure-2-Chemin-de-compromission-globale-du-Cloud-Azure-.jpg 573w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/Figure-2-Chemin-de-compromission-globale-du-Cloud-Azure--306x191.jpg 306w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/Figure-2-Chemin-de-compromission-globale-du-Cloud-Azure--62x39.jpg 62w" sizes="auto, (max-width: 573px) 100vw, 573px" /></p>
<p style="text-align: center;"><i><span data-contrast="none">Figure </span></i><i><span data-contrast="none">2</span></i><i><span data-contrast="none">: A global Cloud compromise </span></i><i><span data-contrast="none">path</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:240}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">By following these steps, the attacker, beyond being able to compromise the entire cloud infrastructure, can deeply affect a company&#8217;s business through unauthorized access to emails &amp; documents, backups, endpoints and corporate network. This attack demonstrates the critical importance of securing high privilege accounts that have permissions that could lead to a global compromise. </span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;134245418&quot;:true}"> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-25206" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/Figure-3-Impact-dune-compromission-du-Control-Plane-.jpg" alt="Figure 3 Impact of a compromise at the Control Plane level " width="599" height="288" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/Figure-3-Impact-dune-compromission-du-Control-Plane-.jpg 599w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/Figure-3-Impact-dune-compromission-du-Control-Plane--397x191.jpg 397w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/Figure-3-Impact-dune-compromission-du-Control-Plane--71x34.jpg 71w" sizes="auto, (max-width: 599px) 100vw, 599px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="none">Figure </span></i><i><span data-contrast="none">3: </span></i><i><span data-contrast="none">Impact of a compromise at the Control Plane level</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:240}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span></p>
<h2 style="text-align: justify;"><b><span data-contrast="auto">How to ensure this does not happen: Implement the Enterprise Access Model and scope your Control Plane</span></b><span data-ccp-props="{}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">As discussed in the first part, cloud directories, particularly Entra ID, exhibit key differences from Active Directory. Consequently, the traditional three-tier model requires adaptation to be fully effective in cloud environments. To address these challenges, Microsoft has introduced a new administration framework specifically designed for cloud environments: </span><a href="https://learn.microsoft.com/en-us/security/privileged-access-workstations/privileged-access-access-model"><span data-contrast="none">the Enterprise Access Model</span></a><span data-contrast="auto">.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{}"> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-25208" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/Figure-4-LEnterprise-Access-Model.jpg" alt="Figure 4: The Enterprise Access Model " width="600" height="335" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/Figure-4-LEnterprise-Access-Model.jpg 600w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/Figure-4-LEnterprise-Access-Model-342x191.jpg 342w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/Figure-4-LEnterprise-Access-Model-71x39.jpg 71w" sizes="auto, (max-width: 600px) 100vw, 600px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="none">Figure </span></i><i><span data-contrast="none">4</span></i><i><span data-contrast="none">: The Enterprise Access Model</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:240}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">While there are some modifications, the core concept remains the same: sensitive resources must be isolated to ensure that a compromise in one plane (formerly tier) does not lead to a compromise in another. This leads us to a crucial question: how should we scope our Control Plane within our Information System to effectively isolate it and mitigate the risks of a global compromise?</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">The answer lies in identifying the systemic components within our Information System — those whose compromise could lead to a widespread breach. Losing one project is far less critical than a global compromise of the entire Information System.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">In our cloud environment, numerous components interact to support projects, from CI/CD infrastructure and deployment pipelines to various IAM tools (such as Identity Providers like AD, Entra ID or Okta, IGA, etc.), along with cross-functional security tools (like EDR, Bastion, and MDM for example). While these are generic components likely present in many systems, there are also numerous environment-specific ones to consider.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">We must assess the impact of compromising high-privilege accounts within these components. For instance, if an attacker gains control of a high-privilege account for the CI/CD infrastructure, they could potentially alter the CI/CD processes and/or run a specific pipeline to deploy unauthorized changes in the cloud, which would allow them to gain global access. Thus, these high-privilege CI/CD accounts should be part of the Control Plane. Similarly, consider the EDR solution: if a high-privilege administrator can execute scripts across all workstations, potentially stealing authentication cookies, accessing critical data, or rendering all workstations inoperable, then this high-privilege account must also be included in the Control Plane.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">By carefully scoping and securing our Control Plane, we can significantly reduce the risk of a global compromise within our Information System.</span><span data-ccp-props="{}"> </span></p>
<p> </p>
<h2 style="text-align: justify;"><b><span data-contrast="auto">Synthesis</span></b><span data-ccp-props="{&quot;335559685&quot;:0}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">As we have seen, the risk of global compromise in a Cloud environment is significant. While cloud computing offers enhanced flexibility, resilience, and cost optimization, it also introduces new paradigms and operational methodologies that must be mastered to ensure security.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">The traditional 3-tier model from the on-premises world, particularly from Active Directory, is not suited for organizing administration in the cloud. To address this, Microsoft has introduced the Enterprise Access Model (EAM). This model expands the 3 tiers into five distinct planes, with the most critical being the Control Plane. However, just as with the 3-tier model, isolation measures are crucial in the EAM, requiring the identification of critical components and high-privilege accounts within your Information System as a top priority for cloud security.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">The next article in this series will provide concrete examples of attack scenarios that can lead to a global compromise of cloud environments. It will also include security recommendations to enhance cloud administration and prevent such risks from becoming security incidents.</span><span data-ccp-props="{}"> </span></p>
<p> </p>
<p> </p>
<p> </p>
<p style="text-align: justify;"><span data-ccp-props="{}"> Thank you to <strong>Louis CLAVERO</strong> for contributing to this article.</span></p>
<p> </p>
<p> </p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/01/enterprise-access-model-1-2-how-to-scope-your-control-plane-to-secure-your-cloud-administration-and-prevent-a-global-cloud-compromise/">Enterprise Access Model (1/2): How to scope your Control Plane to secure your Cloud Administration and prevent a global Cloud compromise</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/01/enterprise-access-model-1-2-how-to-scope-your-control-plane-to-secure-your-cloud-administration-and-prevent-a-global-cloud-compromise/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Protecting the Control Plane: Critical Stakes in Cloud Security </title>
		<link>https://www.riskinsight-wavestone.com/en/2024/05/protecting-the-control-plane-critical-stakes-in-cloud-security/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/05/protecting-the-control-plane-critical-stakes-in-cloud-security/#respond</comments>
		
		<dc:creator><![CDATA[Etienne Lafore]]></dc:creator>
		<pubDate>Fri, 17 May 2024 09:35:12 +0000</pubDate>
				<category><![CDATA[Focus]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[control plane]]></category>
		<category><![CDATA[enterprise access model]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=23154</guid>

					<description><![CDATA[<p>In the age of hybrid information systems, securing cloud resources is a cornerstone of enterprise security. Faced with constantly evolving threats and increasingly complex IT environments, companies are seeking more effective and scalable cloud information systems and access management solutions.  ...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/05/protecting-the-control-plane-critical-stakes-in-cloud-security/">Protecting the Control Plane: Critical Stakes in Cloud Security </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"><span data-contrast="auto">In the age of hybrid information systems, securing cloud resources is a cornerstone of enterprise security. Faced with constantly evolving threats and increasingly complex IT environments, companies are seeking more effective and scalable cloud information systems and access management solutions. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">To meet this challenge, Microsoft has defined the </span><a href="https://learn.microsoft.com/en-us/security/privileged-access-workstations/privileged-access-access-model"><i><span data-contrast="none">Enterprise Access Model</span></i></a><span data-contrast="auto">, offering a new approach to identity and access management adapted to the reality of the cloud. This model promises to redefine how companies manage access to digital resources, whether within cloud solutions like Azure, Office 365 applications, or other strategic services. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">This article proposes a methodology and examples for implementing the Enterprise Access Model and defining criteria for assigning roles to the management plane or control plane. The article also aims to highlight the risks associated with poor implementation of the model, with concrete examples. Finally, it lists several best practices for configuring and managing the access model to help mitigate these risks.   </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h2 style="text-align: justify;" aria-level="1"><span data-contrast="none">Is the tiered model unsuitable for access management in the cloud? </span></h2>
<p style="text-align: justify;" aria-level="1"><i><span data-contrast="none">(For more information on this subject, please consult wavestone’s white paper available </span></i><a href="https://www.wavestone.com/app/uploads/2021/10/AD-Security-publications-V1EN_1.0-opti.pdf"><i><span data-contrast="none">here</span></i></a><i><span data-contrast="none">)</span></i><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:240,&quot;335559739&quot;:0}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">The tiering security model, applied to Active Directory, is based on the fundamental principle of segmenting privileged accounts into 3 different layers, known as </span><b><span data-contrast="auto">tiers</span></b><span data-contrast="auto">. The aim is to ensure that, if a resource or account in a tier is compromised, the higher-trusted tiers remain preserved, thus avoiding any potential propagation of the compromise to the entire system.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-23124 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/1art.jpg" alt="" width="457" height="418" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/1art.jpg 457w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/1art-209x191.jpg 209w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/1art-43x39.jpg 43w" sizes="auto, (max-width: 457px) 100vw, 457px" /></span></p>
<ul>
<li data-leveltext="o" data-font="Courier New" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><i><span data-contrast="auto">Tier 0</span></i><span data-contrast="auto"> is the most critical tier, covering all the infrastructure components managing the company&#8217;s AD Domain Controllers.  </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><i><span data-contrast="auto">Tier 1 </span></i><span data-contrast="auto">typically comprises the company&#8217;s applications and the servers that host them.  </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><i><span data-contrast="auto">Tier 2</span></i><span data-contrast="auto"> covers everything that revolves around the user environment.  </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">While the tiering model can be used to secure the Active Directory infrastructure, it encounters significant challenges when applied in a cloud context. One of the major challenges lies in the very nature of the cloud, where access and administration are generally carried out via consoles exposed on the Internet, unlike in on-premises environments. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Microsoft has therefore defined a new model, the “Enterpise Access Model”, to take account of these new challenges. This article will look at how this model can be effectively implemented in a Microsoft cloud environment.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p> </p>
<h2 style="text-align: justify;" aria-level="1"><span data-contrast="none">The Enterprise Access Model: a new model adapted to the needs of the cloud</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:240,&quot;335559739&quot;:0}"> </span></h2>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">One of the key features of the Enterprise Access Model is the implementation of a privileged access mode for certain critical tasks and the management of a multitude of critical resources, either on-premises or in the Cloud. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-23129 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/2bis.jpg" alt="" width="840" height="452" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/2bis.jpg 840w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/2bis-355x191.jpg 355w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/2bis-71x39.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/2bis-768x413.jpg 768w" sizes="auto, (max-width: 840px) 100vw, 840px" /></span></p>
<p style="text-align: center;"><span data-contrast="none">Source  : </span><span data-contrast="none">https://learn.microsoft.com/en-us/security/privileged-access-workstations/privilegedaccess-access-model</span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p style="text-align: justify;"><span style="text-decoration: underline;">Evolution of purpose and scope  </span></p>
<p style="text-align: justify;"><span style="text-decoration: underline;">Tier 0 -&gt; control plane   </span></p>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Symbol" data-listid="18" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Control plane: includes management of all aspects of access control, identity management, and all elements that could jeopardize the tenant. </span><span data-ccp-props="{}"> </span></li>
</ul>
<p style="text-align: justify;"><span style="text-decoration: underline;">Tier 1 divided into 2 parts   </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Management plane: management of the application infrastructure base, such as servers or configuration of PaaS (Platform as a Service) services. </span><span data-ccp-props="{}"> </span></li>
<li><span data-contrast="auto">Data/Workload Plane: management and configuration of applications, resources, and APIs. </span><span data-ccp-props="{}"> </span></li>
</ul>
<p style="text-align: justify;"><span style="text-decoration: underline;">Tier 2 divided into 2 parts   </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">User access: includes B2B, B2C, and public access scenarios. </span><span data-ccp-props="{}"> </span></li>
<li><span data-contrast="auto">App access: takes into account the attack surface of application-to-application exchanges via APIs.</span><span data-ccp-props="{}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335559685&quot;:720}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">Which accounts should be included in the control plane? </span></b><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">To define the accounts in the control plane, this article proposes an approach based on the criticality of the roles and the impact they can have on the cloud environment. If the role could have a systemic impact on the enterprise (destruction of a large part of the cloud and backups, for example), it should be managed in the control plane. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Make sure to carry out a complete analysis, as some common roles, such as helpdesk administrator, with no critical privileges on direct resources, can take control of accounts that do!  </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-23158 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/3artEN.png" alt="" width="855" height="450" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/3artEN.png 855w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/3artEN-363x191.png 363w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/3artEN-71x37.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/3artEN-768x404.png 768w" sizes="auto, (max-width: 855px) 100vw, 855px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="auto">Strategy based on criticality</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p aria-level="1"> </p>
<h2 style="text-align: justify;" aria-level="1"><span data-contrast="none">Optimizing security: applying the Enterprise Access Model to the Microsoft cloud  </span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:240,&quot;335559739&quot;:0}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">At the heart of Microsoft&#8217;s cloud ecosystem are roles, an essential component that governs how users and services interact with cloud resources.   </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">This section takes a deep dive into this crucial aspect of identity and access management in the cloud. The section will explain what Azure roles are, how they work, and why good management is crucial to the security and performance of a company’s cloud infrastructure.   </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h3 style="text-align: justify;"><b><span data-contrast="auto">Organization of roles in Microsoft clouds: </span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">Roles are a set of permissions that control who can access Azure resources and what actions they can perform. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-23148 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/4art.png" alt="" width="657" height="527" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/4art.png 657w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/4art-238x191.png 238w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/4art-49x39.png 49w" sizes="auto, (max-width: 657px) 100vw, 657px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="auto">Roles in Microsoft Cloud </span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">It&#8217;s important to differentiate between three types of roles: </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul>
<li><span data-contrast="auto">Azure roles are dedicated to accessing and managing Azure resources. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Microsoft Entra roles are used to manage resources in the Microsoft Entra ID directory.  </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Microsoft Entra roles used to manage associated Office 365 resources. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">It&#8217;s important to note that these roles can be </span><b><span data-contrast="auto">interconnected</span></b><span data-contrast="auto">. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h3> </h3>
<h3 style="text-align: justify;"><b><span data-contrast="auto">Azure roles</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">Azure roles are organized according to the principle of Role-Based Access Control (RBAC), which is an integrated feature of Microsoft&#8217;s Azure cloud platform.  </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">They are dedicated to the management and access of Azure resources, and encompass elements such as Azure virtual machines, SQL databases, services, as well as application services such as web apps.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Azure role assignment is a key step in implementing access management in a cloud environment. It determines who has access to which resources, and what privileges are granted.  </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">‘Security Principals’, on Azure, refers to the entities, including users, groups, or services, to which permissions are assigned. There are several types of security principals on Azure, which may or may not be human.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-23135 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/5art.jpg" alt="" width="703" height="213" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/5art.jpg 703w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/5art-437x132.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/5art-71x22.jpg 71w" sizes="auto, (max-width: 703px) 100vw, 703px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="auto">Security Principal</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Scope, when assigning roles in Azure, is crucial in determining where permissions apply. It can be specified at different levels, as shown in the diagram below:  </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-23137 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/6art.jpg" alt="" width="644" height="366" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/6art.jpg 644w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/6art-336x191.jpg 336w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/6art-69x39.jpg 69w" sizes="auto, (max-width: 644px) 100vw, 644px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="auto">The scope of RBAC</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">To better understand role assignment as well as the strategy based on the criticality of roles, and their impact on the cloud in terms of their placement in the control plane, this article proposes two concrete examples:</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-23139 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/7art.jpg" alt="" width="962" height="527" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/7art.jpg 962w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/7art-349x191.jpg 349w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/7art-71x39.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/7art-768x421.jpg 768w" sizes="auto, (max-width: 962px) 100vw, 962px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="auto">Strategy application example</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">In example 1, a user is assigned the owner role (allowing him to read, write, and assign roles to other users throughout the scope to which the role is assigned), on the scope of a management group. In this example, the owner role is critical because the scope is very high-level: it will therefore have full authority over all subscriptions, resource groups, and resources in its management group. This is why the owner role is in the control plane. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">In example 2, a group is assigned the contributor role (allowing it to read and write to the entire scope to which the role is assigned), on the scope of a subscription. In this example, the impact is limited to one subscription, and therefore probably not systemic for the enterprise. This is why, in this case, the contributor role is in the management plane. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">The key takeaway from these examples is that the criticality of a role is not only related to its permissions but also to the scope over which it is assigned.    </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span></p>
<h3 style="text-align: justify;" aria-level="2"><span data-contrast="none">Segmentation between Microsoft Entra ID and Azure? The case of global admin </span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40,&quot;335559739&quot;:0}"> </span></h3>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Microsoft Entra ID and Azure roles are defined independently: in Microsoft Entra ID and Azure RBAC respectively. This means that authorizations assigned to Microsoft Entra ID roles do not provide access to Azure resources, and vice versa. However, as global admin within Microsoft Entra ID, they can grant themselves access to all associated Azure subscriptions and management groups.  </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">When the global admin grants themselves access to Azure, they are assigned the role of user access administrator in the Azure management group root scope. This enables them to view all resources and grant themselves access to any subscription or management group in the directory. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">It is therefore important to control who and how many people are assigned the global admin role, and to manage it in the </span><i><span data-contrast="auto">Control Plane</span></i><span data-contrast="auto">. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-23141 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/8art.jpg" alt="" width="673" height="546" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/8art.jpg 673w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/8art-235x191.jpg 235w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/8art-48x39.jpg 48w" sizes="auto, (max-width: 673px) 100vw, 673px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="auto">Global Admin Azure</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h3 style="text-align: justify;" aria-level="2"><span data-contrast="none">Privilege escalation through password reset and MFA </span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40,&quot;335559739&quot;:0}"> </span></h3>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">This method relies on exploiting privileges that allow passwords to be reset for user accounts or systems. Attackers often target specific roles that have this privilege because, once compromised, they can reset the passwords of more sensitive accounts and thus gain access to take control of critical systems.  </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">The table below highlights the Microsoft Entra ID roles that can reset the password of any subscription owner.  </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Note that security measures such as MFA (Multi-Factor Authentication) can reduce this risk, as detailed in the rest of this article.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-23143 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/9art.jpg" alt="" width="930" height="379" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/9art.jpg 930w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/9art-437x178.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/9art-71x29.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/9art-768x313.jpg 768w" sizes="auto, (max-width: 930px) 100vw, 930px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="auto">Can a user with a role in column 1 reset the password of the user in row 1?  </span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto"><span style="text-decoration: underline;">Attack scenario 1:</span> </span></b><span data-contrast="auto">Escalation of privilege to an Azure role from a Microsoft Entra ID role: </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">A helpdesk administrator, which is a very common role in the enterprise, can reset the password of a subscription owner and thus access Azure from within Microsoft Entra ID. As a result, segmentation between the two worlds is no longer guaranteed. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto"><span style="text-decoration: underline;">Attack scenario 2:</span> </span></b><span data-contrast="auto">Escalation of privilege to a Microsoft Entra ID role from a Microsoft Entra ID role: </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Within Microsoft Entra ID, privilege escalation from a helpdesk administrator to an Authentication Administrator is possible.  </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">These </span><b><span data-contrast="auto">two scenarios</span></b><span data-contrast="auto"> are no longer possible if MFA is set up, as the password alone cannot be used to authenticate to the account. In most cases, this security measure covers this type of privilege escalation. However, certain roles have the upper hand on both parameters, i.e. password reset and MFA setting, and it is not uncommon for user support to have this ability.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-23145 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/10art.jpg" alt="" width="885" height="346" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/10art.jpg 885w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/10art-437x171.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/10art-71x28.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/10art-768x300.jpg 768w" sizes="auto, (max-width: 885px) 100vw, 885px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="auto">Does a user with a role in column 1 have rights on the MFA?</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p style="text-align: justify;"><span style="text-decoration: underline;"><b>Attack scenario 3: </b></span><span data-contrast="auto">Privilege escalation from an authentication administrator to Azure or Microsoft Entra ID : </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Here the authentication administrator is a role that can manage and reset the authentication methods of users who do not have an administrator role. In addition to being able to control the MFA, this role can also modify or reset the passwords of a large proportion of users. The tables above show that it can take on the role of a helpdesk administrator or a subscription owner.  </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">These roles need to be managed in the control plane to avoid privilege escalation scenarios and maintain the watertight seal between Microsoft Entra ID and Azure.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p> </p>
<h2 style="text-align: justify;" aria-level="1"><span data-contrast="none">Reinforce your security, some examples of additional security measures</span></h2>
<p style="text-align: justify;" aria-level="2"><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40,&quot;335559739&quot;:0}"> </span></p>
<h3 style="text-align: justify;"><span data-contrast="none">Grant privileges to a managed identity rather than to a user</span><span data-contrast="auto"> </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">To limit the risks associated with assigning control plane roles, it is recommended to use Managed Identities as alternatives to user authorizations, or Privileged Identity Management (PIM) to better manage high-privileged users. This approach limits the risk of privilege escalation. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Managed Identities are authentication entities managed by Azure for applications and services. Rather than granting privileges to individual users, you can assign authorizations to the Managed Identities associated with these applications or services. </span><span data-contrast="auto">This approach offers the following advantages: </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ol>
<li data-leveltext="%1." data-font="Tahoma" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Reduced credential exposure: using Managed Identities reduces the potential attack surface, as credentials are not exposed or shared. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Secure automation: applications and services using Managed Identities can automate tasks without the need for high-privileged user accounts. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li data-leveltext="%1." data-font="Tahoma" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Centralized control: authorizations are managed centrally, facilitating privilege management across the entire cloud environment.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ol>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h3 style="text-align: justify;" aria-level="2"><span data-contrast="none">Limiting risks with Privileged Identity Management (PIM)  </span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40,&quot;335559739&quot;:0}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">When assigning high-privilege roles or control plane roles, especially to users, it is very important to control and monitor the assignment of these roles. The use of PIM, a feature that enables precise management of administrative privileges, may prove useful. PIM is based on: </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ol>
<li data-leveltext="%1." data-font="Tahoma" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Temporary elevation of privileges: users can be granted administrative privileges on a temporary basis to perform specific tasks, thus reducing the risks associated with permanent authorizations and errors. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Mandatory justification for elevated privileges. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li data-leveltext="%1." data-font="Tahoma" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Implementation of control and monitoring. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Creation of a workflow to validate privilege elevations: /!\ requires a high level of maturity to manage reactivity and HNO (non-working hours) requirements.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ol>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Securing a cloud environment is an essential concern. Attacks using the concepts and intricacies of cloud management will increase in the near future, therefore; it would be a loss to wait until attackers start dealing with this subject before companies start dealing with it properly. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">This article has </span><span data-contrast="auto">explored various aspects of privilege management and security in the cloud, highlighting fundamental strategies and practices for effectively protecting the control plane, which brings together data and resources that are highly sensitive to the integrity of a company&#8217;s infrastructure.  </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">The article explored Microsoft&#8217;s enterprise access model, based on the “Zero Trust” principle. This model offers a flexible and secure approach to access management in a cloud environment.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">It was</span><span data-contrast="auto"> then presented that Microsoft Azure roles and some of the risks of privilege escalation, highlighting the importance of accurate authorization assignment and continuous monitoring to prevent abuse and potential threats.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Securing the control plane in a cloud environment is of paramount importance in protecting a company&#8217;s sensitive data and resources. Exploring the strategies and best practices discussed in this article, it&#8217;s clear that every organization needs to carefully define its role model, ensuring that accounts and permissions are appropriately assigned in the control plane or management plane. It is imperative that measures are put in place to ensure the isolation of each plane, while paying particular attention to precise authorization management and continuous monitoring to prevent abuse and potential threats (including privilege escalation).  </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Security in the cloud is no longer an option, but an absolute necessity!</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/05/protecting-the-control-plane-critical-stakes-in-cloud-security/">Protecting the Control Plane: Critical Stakes in Cloud Security </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/05/protecting-the-control-plane-critical-stakes-in-cloud-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Deceptive Security: the solution for effective detection in the cloud? – Deceptive use example in AWS cloud </title>
		<link>https://www.riskinsight-wavestone.com/en/2024/02/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/02/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud/#respond</comments>
		
		<dc:creator><![CDATA[Etienne Lafore]]></dc:creator>
		<pubDate>Fri, 16 Feb 2024 16:55:48 +0000</pubDate>
				<category><![CDATA[Focus]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Deceptive security]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=22490</guid>

					<description><![CDATA[<p>Today, cyber-attacks are part of our daily lives, and are becoming increasingly common and sophisticated.    Simultaneously, we are moving towards Information Systems that are built on an ever-increasing diversity of environments, thanks in particular to the Cloud, which is now...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/02/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud/">Deceptive Security: the solution for effective detection in the cloud? – Deceptive use example in AWS cloud </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><span data-contrast="none">Today, cyber-attacks are part of our daily lives, and are becoming increasingly </span><span data-contrast="none">common </span><span data-contrast="none"> and sophisticated.  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">Simultaneously, we are moving towards Information Systems</span><span data-contrast="none"> that are</span><span data-contrast="none"> built on an ever-increasing diversity of environments, thanks in particular to the </span><b><span data-contrast="none">Cloud,</span></b><span data-contrast="none"> which is now an integral part within corporate Information Systems. This enables </span><span data-contrast="none">corporations </span><span data-contrast="none">)</span> <span data-contrast="none">to expand their capabilities, however it </span><span data-contrast="none">is </span><span data-contrast="none">also the surface area </span><span data-contrast="none"> for </span><span data-contrast="none">risk</span><span data-contrast="none"> of attack</span><span data-contrast="none">s</span><span data-contrast="none">.  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">Conventional intrusion detection and protection techniques already exist and are developing exponentially. These are effective against the most common attacks, however are not always adapted to the specificities of the Cloud.  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">This raises questions about the use of </span><b><span data-contrast="none">proactive strategies</span></b><span data-contrast="none">, such as </span><b><span data-contrast="none">Deceptive Security</span></b><span data-contrast="none">, to stay one step ahead of attackers. Particularly in the context of Cyber-Resilience</span><span data-contrast="none">;</span><span data-contrast="none"> how can this kind of technology be used in both a traditional and a cloud environment?  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}"> </span></p>
<p><i><span data-contrast="none">When should Deceptive Security techniques be used? Are Deceptive Security solutions in the Cloud being developed today? Are there any specific strategies to consider in a Cloud environment as opposed to a traditional one? </span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">We will answer these questions in a </span><b><span data-contrast="none">mini-series of 2 articles</span></b><span data-contrast="none">. In the first article, we showed how to develop and evaluate your decoy strategy. In the second article, we’ll present a practical example of deceptive security in AWS. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}"> </span></p>
<p aria-level="1"> </p>
<h2 aria-level="1"><span data-contrast="none">Initial assumptions and choice of scenario  </span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span><span data-contrast="none"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}"> </span></h2>
<p><span data-contrast="none">Thanks to Wavestone&#8217;s expertise and the resources shared by our CyberLab, we have designed a simple scenario to illustrate the use of decoys </span><b><span data-contrast="none">in an AWS Cloud environment</span></b><span data-contrast="none">. The example detailed below is inspired by a CTF (Capture The Flag) scenario designed by the CyberLab team to illustrate the lateral propagation of an attacker. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">As in the previous scenarios, </span><b><span data-contrast="none">where we used Deceptive </span></b><b><span data-contrast="none">Security </span></b><b><span data-contrast="none">for the detection of attackers already introduced into the IS</span></b><span data-contrast="none">, the aim is once again to avoid attracting opportunistic attackers to our network with a &#8220;search&#8221; Deceptive</span><span data-contrast="none"> Security</span><span data-contrast="none"> approach. We therefore assume an initial infection of some kind, which is highly probable (all the more so in poorly controlled Cloud environments), and concentrate on detecting the intruder as it is being deployed </span><span data-contrast="none">in</span><span data-contrast="none">to </span><span data-contrast="none"> the network.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">Applying this approach to an AWS environment is no innocent matter. One of the benefits of the Cloud lies in its simplified identity management and easy delegation of access, but </span><b><span data-contrast="none">this asset can turn to the advantage of attackers</span></b><span data-contrast="none"> in the event of unintentional exposure of resources</span><span data-contrast="none">,</span><span data-contrast="none"> or the creation of dangerous links between zones of different security levels. There is no shortage of hardening and prevention measures, generously promoted by Cloud providers themselves, but these vulnerabilities remain </span><span data-contrast="none">in </span><span data-contrast="none">poorly hardened accounts and subscriptions, whose administration too often obeys rules that are still informal.  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}"> </span></p>
<p><b><span data-contrast="none">The attack scenario</span></b> <b><span data-contrast="none">and associated luring will therefore be based on the principle of linking two AWS accounts</span></b><span data-contrast="none">, here conceived as a production environment and a less critical development environment. We&#8217;ll place ourselves in a scenario where an approval relationship is used to propagate from the development account to the production account, via the endorsement of a cross-account role.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}"> </span></p>
<p> </p>
<h2 aria-level="1"><span data-contrast="none">Luring scenario </span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span></h2>
<h3 aria-level="2"><span data-contrast="none">Description of the scenario  </span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span></h3>
<p><span data-contrast="none">Let&#8217;s assume that </span><b><span data-contrast="none">an unauthorized user has gained access to an EC2 machine</span></b><span data-contrast="none"> (domainIntegrated-EC2) within the test account (initial infection). After an initial successful connection, </span><span data-contrast="none"> they </span><span data-contrast="none"> attempt</span><span data-contrast="none"> to access commonly used resources such as Amazon Simple Storage Service (Amazon S3), or </span><b><span data-contrast="none">tries to elevate </span></b><b><span data-contrast="none">their </span></b><b><span data-contrast="none"> privileges</span></b><span data-contrast="none"> by assuming other roles (role chaining) related to the role to which </span><span data-contrast="none">they have </span><span data-contrast="none"> access. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}"> </span></p>
<p><b><span data-contrast="none">This lateral propagation scenario is a common attack technique in cloud environments</span></b><span data-contrast="none"> due to the nature of their architecture and the cloud computing responsibility model, where the customer is responsible for securing their applications, data and access control (while the provider ensures the security of the underlying infrastructure).</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">As illustrated below, </span><b><span data-contrast="none">lateral propagation attacks take advantage of weaknesses in the customer&#8217;s security controls</span></b><span data-contrast="none">, such as misconfigured authorizations or the application of too-weak authentication mechanisms, to gain unauthorized access to other resources in the environment.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: center;"><img loading="lazy" decoding="async" class="aligncenter wp-image-22454 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/1.jpg" alt="" width="1269" height="655" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/1.jpg 1269w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/1-370x191.jpg 370w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/1-71x37.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/1-768x396.jpg 768w" sizes="auto, (max-width: 1269px) 100vw, 1269px" /><br /><i><span data-contrast="none">Scenario from the attacker&#8217;s point of view</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:1135,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:1135,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<p><span data-contrast="none">0. After compromising a &#8220;domainIntegrated&#8221; EC2 machine, the attacker discovers that it has a role associated with it (&#8220;Semi-Admin-role&#8221;): </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: center;"><img loading="lazy" decoding="async" class="aligncenter wp-image-22456 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/2.jpg" alt="" width="1242" height="125" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/2.jpg 1242w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/2-437x44.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/2-71x7.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/2-768x77.jpg 768w" sizes="auto, (max-width: 1242px) 100vw, 1242px" /> <br /><i><span data-contrast="none">Enumeration of EC2 machine domainIntegrated</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:720,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">It then lists the rights of the &#8220;Semi-Admin-Role&#8221;:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1135,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<p style="text-align: center;"><img loading="lazy" decoding="async" class="aligncenter wp-image-22458 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/3.jpg" alt="" width="1172" height="544" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/3.jpg 1172w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/3-411x191.jpg 411w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/3-71x33.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/3-768x356.jpg 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/3-1170x544.jpg 1170w" sizes="auto, (max-width: 1172px) 100vw, 1172px" /> <br /><i><span data-contrast="none">Enumeration of Semi-Admin-Role rights</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:720,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">First, this role has </span><b><span data-contrast="none">modification privileges </span></b><span data-contrast="none">on a resource in the &#8220;AWS &#8211; SHARED&#8221; account: it can assume (sts:assumeRole) and modify (iam:UpdateRole) a role called &#8220;LambdaAuto&#8221;. He can then assume (by &#8220;role chaining&#8221;, step 5 in the diagram above) another role called &#8220;SecurityAudit&#8221; in a different account, called AWS MASTER. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">The attacker also realizes that </span><span data-contrast="none">they </span> <b><span data-contrast="none">can directly assume another role</span></b><span data-contrast="none"> (&#8220;IAM-RO-Role&#8221;) in the AWS &#8211; MASTER account. This latter role attracts particular attention, as the MASTER account&#8217;s name suggests a </span><b><span data-contrast="none">much greater scope of action</span></b><span data-contrast="none"> than the simple SHARED account, and the IAM-RO-Role role suggests an extended scope of vision over the account&#8217;s resources.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1135,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<ol>
<li><span data-contrast="none">The attacker assumes the &#8220;SemiAdmin-role&#8221;, which then allows </span><span data-contrast="none">the</span><span data-contrast="none">m </span><span data-contrast="none"> to assume the &#8220;IAM-RO&#8221; role and attempt other actions that will enable </span><span data-contrast="none">them</span><span data-contrast="none"> to analyze </span><span data-contrast="none">their</span><span data-contrast="none"> field of vision.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="%1" data-font="Tahoma" data-listid="24" data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Indeed, after assuming the &#8220;IAM-RO&#8221; role, he proceeds to an IAM enumeration where </span><span data-contrast="none">they</span><span data-contrast="none"> becomes aware of the roles and users in </span><span data-contrast="none">their</span><span data-contrast="none"> field of vision:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></li>
</ol>
<p><br /><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-22460 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/4.jpg" alt="" width="1260" height="294" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/4.jpg 1260w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/4-437x102.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/4-71x17.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/4-768x179.jpg 768w" sizes="auto, (max-width: 1260px) 100vw, 1260px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="none">List of roles in the field of view of the IAM-RO role </span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:1135,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:1135,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-22462 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/5.jpg" alt="" width="1222" height="213" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/5.jpg 1222w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/5-437x76.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/5-71x12.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/5-768x134.jpg 768w" sizes="auto, (max-width: 1222px) 100vw, 1222px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="none">List of users in the field of view of the IAM-RO role </span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:720,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<p><span data-contrast="none">The &#8220;SecurityAudit&#8221; role in particular attracts </span><span data-contrast="none">their</span><span data-contrast="none"> attention thanks to the </span><b><span data-contrast="none">privileges</span></b><span data-contrast="none"> that this name suggests and the role description, which provides information on these privileges: </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:491,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-22464 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/6.jpg" alt="" width="1264" height="76" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/6.jpg 1264w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/6-437x26.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/6-71x4.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/6-768x46.jpg 768w" sizes="auto, (max-width: 1264px) 100vw, 1264px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="none">SecurityAudit role description</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:207,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">However, the attacker only has read access to the resources listed. </span><span data-contrast="none">They </span><span data-contrast="none"> will therefore look to see if any of these resources can be written to from the SHARED account, where </span><span data-contrast="none">they</span> <span data-contrast="none">have</span> <span data-contrast="none">high privileges. For example, if certain MASTER account roles can be endorsed by SHARED account roles:  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-22466 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/7.jpg" alt="" width="1266" height="181" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/7.jpg 1266w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/7-437x62.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/7-71x10.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/7-768x110.jpg 768w" sizes="auto, (max-width: 1266px) 100vw, 1266px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="none">List of roles that can be assumed from an external account (here the SHARED account)</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:1135,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<p><span data-contrast="none">The attacker investigates the approval relationship of the &#8220;SecurityAudit&#8221; role, which authorizes an endorsement by the &#8220;LambdaAuto&#8221; role of the SHARED account.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:284,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<p><span data-contrast="none">0. Back on the SHARED account, all the attacker has to do is check that the other counterpart of this approval relationship, i.e. that the &#8220;LambdaAuto&#8221; role does indeed authorize the &#8220;SecurityAudit&#8221; role&#8217;s endorsement in its approval policy. This is not the case, but the &#8220;SemiAdminRole&#8221; role allows it to configure this authorization.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">1.Once the &#8220;LambdaAuto&#8221; role approval policy has been modified, it can now assume the &#8220;LambdaAuto&#8221; role.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">2. Then </span><span data-contrast="none">they </span><span data-contrast="none"> take</span><span data-contrast="none"> on (by role-chaining) the role of &#8220;SecurityAudit&#8221;, the real decoy.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-22468 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/8.jpg" alt="" width="1265" height="634" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/8.jpg 1265w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/8-381x191.jpg 381w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/8-71x36.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/8-768x385.jpg 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/8-800x400.jpg 800w" sizes="auto, (max-width: 1265px) 100vw, 1265px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="none">Role chaining of the attacker</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<p><span data-contrast="none">After attempting to take on the &#8220;SecurityAudit&#8221; role, from which </span><span data-contrast="none">they</span><span data-contrast="none"> hope</span><span data-contrast="none"> to gain the privileges of a security auditor (announced in step 1), the attacker in reality finds </span><span data-contrast="none">themself</span><span data-contrast="none"> without any real powers, for example :</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:207,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-22470 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/9.jpg" alt="" width="1267" height="78" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/9.jpg 1267w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/9-437x27.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/9-71x4.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/9-768x47.jpg 768w" sizes="auto, (max-width: 1267px) 100vw, 1267px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="none">Example of denied access from the SecurityAudit </span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:491,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<h3 aria-level="2"><span data-contrast="none">Creating lures</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1418,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}"> </span></h3>
<p><span data-contrast="none">The diagram below shows how decoys are added at different stages of the attack and how they are configured by the defender:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-22472 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/10.jpg" alt="" width="1278" height="744" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/10.jpg 1278w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/10-328x191.jpg 328w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/10-67x39.jpg 67w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/10-120x70.jpg 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/10-768x447.jpg 768w" sizes="auto, (max-width: 1278px) 100vw, 1278px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="none">Scenario from the defender&#8217;s point of view </span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:1135,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:1135,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<p><span data-contrast="none">0.The &#8220;Semi-Admin-Role&#8221; is the </span><b><span data-contrast="none">entry point</span></b><span data-contrast="none"> into the decoy scenario. It can therefore be associated with any resource likely to be compromised (here the EC2 &#8220;domainIntegrated&#8221;) to redirect the attacker to the decoys.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">No alerts are configured at this level, as the Semi-Admin role&#8217;s connection to all SHARED account resources makes it likely that unintentional endorsements will be triggered, resulting in false-positive alerts.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<ol>
<li data-leveltext="%1" data-font="Tahoma" data-listid="19" data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Once the IAM-RO role has been assumed, the attacker is then invited into an account entirely dedicated to luring and </span><span data-contrast="none">familiarising</span> <span data-contrast="none">themselves </span><span data-contrast="none"> with the surrounding resources, </span><b><span data-contrast="none">gaining a complete overview of all the account&#8217;s roles and users.</span></b><span data-contrast="none">  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="%1" data-font="Tahoma" data-listid="19" data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">By populating the attacker&#8217;s field of vision not only with the main &#8220;SecurityAudit&#8221; decoy, but also with other dummy roles and users, we ensure that the account&#8217;s appearance appears credible and that our key decoy, the SecurityAudit role, is not isolated.  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></li>
</ol>
<p><span data-contrast="none">We thus add to the account :  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<ul>
<li data-leveltext="o" data-font="Courier New" data-listid="16" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:1080,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="2"><span data-contrast="none">Users : different user names attracting the attacker. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1094,&quot;335559739&quot;:96,&quot;335559740&quot;:259,&quot;335559746&quot;:40}"> </span></li>
<li data-leveltext="o" data-font="Courier New" data-listid="16" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:1080,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="2"><span data-contrast="none">The &#8220;LambdaFunction&#8221; role: this role is created to simulate a Lambda function that calls on AWS services. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1094,&quot;335559739&quot;:96,&quot;335559740&quot;:259,&quot;335559746&quot;:40}"> </span></li>
<li data-leveltext="o" data-font="Courier New" data-listid="16" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:1080,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="2"><span data-contrast="none">The &#8220;LogsAndS3Bucket&#8221; role: a role created to facilitate access to logging services and S3 storage resources within the account. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1094,&quot;335559739&quot;:96,&quot;335559740&quot;:259,&quot;335559746&quot;:40}"> </span></li>
<li data-leveltext="o" data-font="Courier New" data-listid="16" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:1080,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="2"><span data-contrast="none">The &#8220;taskExecutionRole&#8221;: the task execution role that can be used for different purposes and services associated with the account. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1094,&quot;335559739&quot;:96,&quot;335559740&quot;:259,&quot;335559746&quot;:40}"> </span></li>
</ul>
<p><span data-contrast="none">3.  The &#8220;SemiAdminRole&#8221; role has deliberately been configured with permission (iam:UpdateRole) on the &#8220;LambdaAuto&#8221; role, enabling it to modify this role and thus add the approval relationship to the &#8220;SemiAdminRole&#8221; role. For monitoring purposes, an initial alert can be triggered at this level when the &#8220;LambdaAuto&#8221; approval relationship is updated, enabling the &#8220;SemiAdminRole&#8221; to assume it.  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span style="color: initial;" data-contrast="none">4. The &#8220;LambdaAuto&#8221; role is deliberately created as the gateway to the &#8220;SecurityAudit&#8221; role, once its approval relationship has been modified using the privileges of the &#8220;SeminAdminRole&#8221; role.</span><span style="color: initial;" data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">5. The &#8220;SecurityAudit&#8221; role is deliberately configured with an approval relationship authorizing the &#8220;LambdaAuto&#8221; role of the SHARED account to assume it.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">6. At this stage, the attacker had assumed that </span><span data-contrast="none">they </span><span data-contrast="none"> would be granted security auditor rights. However, a very restrictive Security Control Policy (SCP) was applied, granting </span><span data-contrast="none">them </span><span data-contrast="none">no privileges on the account.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p> <br /><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:207,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-22474 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/11.jpg" alt="" width="1031" height="539" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/11.jpg 1031w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/11-365x191.jpg 365w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/11-71x37.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/11-768x402.jpg 768w" sizes="auto, (max-width: 1031px) 100vw, 1031px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="none">The policy prohibiting all actions from the Security-Audit-Role</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:-304,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<h2 aria-level="1"> </h2>
<h2 aria-level="1"><span data-contrast="none">Alerting chain</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559738&quot;:240,&quot;335559739&quot;:360,&quot;335559740&quot;:259,&quot;335559991&quot;:567}"> </span></h2>
<p><span data-contrast="none">An alerting chain in the AWS cloud refers to a means of communicating notifications or alerts generated by AWS services to users or teams responsible for managing these services, enabling them to take rapid action to resolve problems and minimize service interruptions.  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:284,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:284,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">To set up an alerting chain, you first need to configure AWS services to generate alerts when certain events occur, such as</span><span data-contrast="none">,</span><span data-contrast="none"> a server down or an application exceeding a specific CPU usage threshold. Once these alerts have been generated, they can be sent to the appropriate alerting chain according to the notification preferences configured by the user or the team responsible for managing the service.  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:284,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">In order to detect the attacker, we use the following AWS services to create the alerting chain:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1135,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:644,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><a href="bookmark://_CloudTrail"><b><span data-contrast="none">CloudTrail</span></b></a><span data-contrast="none"> l to track actions performed on the compromised AWS account;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:644,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="none">EventBridge</span></b><span data-contrast="none"> to detect any &#8220;AssumeRole&#8221; event of the &#8220;SecurityAudit&#8221; role and trigger an alert ;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:644,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><a href="bookmark://_SNS_-_Simple"><span data-contrast="none">Simple Notification Service (SNS</span></a><span data-contrast="none">)</span><span data-contrast="none"> to send the alert by e-mail with the information gathered during the attack. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></li>
</ul>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:567,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-22476 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/12.jpg" alt="" width="1255" height="629" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/12.jpg 1255w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/12-381x191.jpg 381w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/12-71x36.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/12-768x385.jpg 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/12-800x400.jpg 800w" sizes="auto, (max-width: 1255px) 100vw, 1255px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="none">Illustration of the alerting chain</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:567,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<h3 aria-level="2"><span data-contrast="none">Alerting chain creation steps : </span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1418,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}"> </span></h3>
<h4 aria-level="3"><span data-contrast="none">Cloudtrail configuration </span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1418,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}"> </span></h4>
<p><span data-contrast="none">The first step in creating an alerting chain on AWS is to enable CloudTrail (if not already activated) in your AWS account. CloudTrail logs all activity and API calls in your account, which can be useful for security, compliance and troubleshooting purposes.  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">Based on the logs generated in CloudTrail, we&#8217;ve created an EventBridge rule that sends notifications to the SNS service whenever the &#8220;SecurityAudit&#8221; role is assumed (event type: AssumeRole).</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<h4 aria-level="3"><span data-contrast="none">Creation of an EventBridge rule</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1418,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}"> </span></h4>
<p><span data-contrast="none">A rule monitors specific types of events, and when a corresponding event occurs, it is routed to the service associated with the rule and handling the event (in this case, the SNS service). </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:144,&quot;335559740&quot;:259,&quot;335559746&quot;:60}"> </span></p>
<p><span data-contrast="none">The event model detects all events of the &#8220;AssumeRole&#8221; type occurring in the account used and triggers the alert. In order to avoid false positives when triggering alerts, we have refined the event model to be as accurate as possible for the events we are interested in.  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:144,&quot;335559740&quot;:259,&quot;335559746&quot;:60}"> </span></p>
<p><span data-contrast="none">This means including relevant fields, such as event source, detail type or specific values, to refine the matching criteria. This reduces the risk of unrelated events triggering the rule.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:144,&quot;335559740&quot;:259,&quot;335559746&quot;:60}"> </span></p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-22478 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/13.jpg" alt="" width="1013" height="448" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/13.jpg 1013w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/13-432x191.jpg 432w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/13-71x31.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/13-768x340.jpg 768w" sizes="auto, (max-width: 1013px) 100vw, 1013px" /></p>
<p style="text-align: center;"><i><span data-contrast="none">The event model detecting all &#8220;AssumeRole&#8221; events on the &#8220;SecurityAudit&#8221; role</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:1135,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<p><span data-contrast="none">The Eventbridge service must therefore first be linked to the SNS target.  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-22480 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/14.jpg" alt="" width="1157" height="154" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/14.jpg 1157w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/14-437x58.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/14-71x9.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/14-768x102.jpg 768w" sizes="auto, (max-width: 1157px) 100vw, 1157px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="none">The target related to the EventBridge rule</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:1135,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<h4 aria-level="3"><span data-contrast="none">SNS rubric configuration </span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1418,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}"> </span></h4>
<p><span data-contrast="none">At this stage, an SNS topic is created and linked to a subscription of an e-mail endpoint authenticated later. The SNS topic will be the target of the EventBridge rule. Once the topic has been created, the e-mail subscription is carried out by selecting the e-mail address as the protocol (endpoint) where the alerts are to be received.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><i><span data-contrast="none">Other targets than e-mail could be considered for receiving alerts (ServiceNow, SIEM, etc.).</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span> <br /><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-22482 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/15.jpg" alt="" width="883" height="339" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/15.jpg 883w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/15-437x168.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/15-71x27.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/15-768x295.jpg 768w" sizes="auto, (max-width: 883px) 100vw, 883px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="none">Details of the SNS rubric</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:1135,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:491,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<p aria-level="3"><strong>Alert customization  </strong></p>
<p><span data-contrast="none">EventBridge&#8217;s Input Transformer function was used to customize the content of the alert, so that only the most important elements were displayed.  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">It allows you to customize the text of an event before it is transmitted to the target.  This is achieved by defining JSON variables to reference values in the original event source.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p aria-level="4"><b><span data-contrast="none">Input transformer configuration </span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">In our case, the variables listed below will constitute the alert message:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-22484 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/16.jpg" alt="" width="992" height="529" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/16.jpg 992w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/16-358x191.jpg 358w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/16-71x39.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/16-768x410.jpg 768w" sizes="auto, (max-width: 992px) 100vw, 992px" /></p>
<p style="text-align: center;"><i><span data-contrast="none">Input transformer creation</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:568,&quot;335559731&quot;:284,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:284,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p aria-level="4"><b><span data-contrast="none">Input model</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">The input model will use the variables defined previously within the final alert message: </span><span data-contrast="none"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-22486 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/17.jpg" alt="" width="1275" height="245" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/17.jpg 1275w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/17-437x84.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/17-71x14.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/17-768x148.jpg 768w" sizes="auto, (max-width: 1275px) 100vw, 1275px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="none">Input model creation</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:568,&quot;335559731&quot;:284,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">Once the &#8220;SecurityAudit&#8221; role has been endorsed, an alert is sent to the endpoint created:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:284,&quot;335559738&quot;:120,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-22488 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/18.jpg" alt="" width="1267" height="431" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/18.jpg 1267w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/18-437x149.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/18-71x24.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/18-768x261.jpg 768w" sizes="auto, (max-width: 1267px) 100vw, 1267px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="none">Example of e-mail alert content</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:284,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:284,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<h3><b><span data-contrast="none">Cost of the AWS services used </span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></h3>
<p><span data-contrast="none">AWS offers a pay-per-use approach to pricing its cloud services. With AWS, you only pay for the services you need, as long as you continue to use them, without a long-term contract. You only pay for the services you use, and if you stop using them, you won&#8217;t be charged any additional costs or termination fees. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">The services deployed in this scenario are not intended to be used except in the event of an intrusion or security incident. The associated costs are therefore negligible.  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p> </p>
<h2 aria-level="1"><span data-contrast="none">Decoy evaluation with the PARCS matrix</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559738&quot;:240,&quot;335559739&quot;:360,&quot;335559740&quot;:259,&quot;335559991&quot;:567}"> </span></h2>
<p><span data-contrast="none">Several criteria can be used to evaluate a lure, and here are the results of our analysis based on the PARCS matrix:  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="none">P</span></b><span data-contrast="none">ertinence (efficiency) : 4/4</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></li>
</ul>
<p><span data-contrast="none">«  Various approaches can be adopted to effectively spot the initial compromise of an EC2 instance and the lateral propagation of an attacker</span><span data-contrast="none">.</span><span data-contrast="none"> In our context, depending on the resources at our disposal, one possible strategy is to monitor operations by analyzing logs, which will enable malicious actions to be detected. These observations could then be used to generate alerts for administrators. For example, an alert could be triggered in the event of an intrusion attempt via a brute force attack on the RDP service of EC2 instances within our AWS environment, thanks to GuardDuty. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:360,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></p>
<p><span data-contrast="none">In addition, it would be possible to use a combination of AWS services such as CloudTrail and EventBridge to establish detection rules and automate interventions in response to specific activities, including those related to cross-account access, and create detection rules that monitor all endorsement events to trigger actions in the event of corresponding events. </span><span data-contrast="none">»</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:360,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="none">A</span></b><span data-contrast="none">ttractivité (attractiveness): 4/4</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></li>
</ul>
<p><span data-contrast="none">« The decoy is distinguished by a dedicated account, significantly increasing its power of attraction. By having access to the metadata of all the resources within </span><span data-contrast="none">their </span><span data-contrast="none"> reach, the attacker can also verify various levels of privilege, which substantially enhances credibility. Thanks to the ability to visualize the dates and times of the last uses of resources in </span><span data-contrast="none">their</span><span data-contrast="none"> field of vision, </span><span data-contrast="none">they</span><span data-contrast="none"> can deduce that these resources are rarely used. With this in mind, a lambda function is implemented to automate the execution of various resources or their authentication, thus guaranteeing proof of recent use.  »</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:360,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><b><span data-contrast="none">R</span></b><span data-contrast="none">isque (risk): 4/4</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></li>
</ul>
<p><span data-contrast="none">« </span><span data-contrast="none">The authorization granted to the IAM-RO role only confers IAM privileges to the attacker in the context of a purely fictitious account. Thanks to appropriate configuration of the upstream SCP, any attempted actions by the Security-Audit role will also be thwarted. The only elements deliberately introduced in a real environment are the Semi-Admin and Lambda-Auto roles, which are subject to stringent policies preventing any assignment of rights or privileges in the event of attempted malicious use. These policies include read-only access (IAMReadOnlyAccess) and a restriction preventing any modification of account role authorizations, as defined by the SCP</span><span data-contrast="none">. »</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:360,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:360,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><b><span data-contrast="none">C</span></b><span data-contrast="none">rédibilité  (credibility): 3/4</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></li>
</ul>
<p><span data-contrast="none">« </span><span data-contrast="none">The credibility of the decoy may be called into question by the resources available to it and potential limitations, such as an Inline Policy that restricts permissions and possible actions. It&#8217;s important to take these factors into account, as they can create doubts in attackers and compromise the decoy&#8217;s effectiveness. It is therefore crucial to put in place measures that make the decoy as realistic and convincing as possible, ensuring that it has access to the relevant resources and authorizations to create a credible scenario. </span><span data-contrast="none">»</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:360,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:360,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"><b><span data-contrast="none">S</span></b><span data-contrast="none">calabilité (scalability) : 3/4</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></li>
</ul>
<p><span data-contrast="none">« </span><span data-contrast="none">Depending on the size of an infrastructure, it may be possible to implement fluid deployment and maintenance of components, thanks to the use of automated scripts empowered to perform operations on resources. However, careful monitoring of all resources is essential to consolidate security in the face of possible attacks, and to ensure rapid reaction to defend an extended perimeter.</span><span data-contrast="none">»</span><span data-contrast="none"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:360,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559738&quot;:240,&quot;335559739&quot;:360,&quot;335559740&quot;:259,&quot;335559991&quot;:567}"> </span></p>
<p><span data-contrast="none">In conclusion, implementing such a Deceptive Security scenario in the Cloud, offers an approach to improving its overall security. It helps restrict an attacker&#8217;s ability to explore and propagate across the network</span><span data-contrast="none">,</span><span data-contrast="none"> by presenting deceptive paths, delaying their progress and enabling faster detection and response. Decoys, which resemble attractive targets, divert attackers&#8217; attention and resources away from real assets, increasing the chances of early detection. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">In addition, alert mechanisms play a crucial role in providing rapid information on potential intrusions to security teams, enabling rapid incident response and limiting the impact of attacks. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">Combining these </span><span data-contrast="none">defence</span> <span data-contrast="none">strategies strengthens the overall security posture of Cloud environments, improves their resilience in the face of constantly evolving cyber threats, and guarantees the integrity and confidentiality of sensitive data.  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">By using these deceptive security measures, companies can strengthen their </span><span data-contrast="none">defence</span> <span data-contrast="none">against cyberattacks. However, it is important to note that Deceptive Security does not replace existing standard cybersecurity solutions, and that protection against cyberattacks requires the use of complementary security techniques for optimal defense.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p> </p>
<h3 aria-level="1"><span data-contrast="none">ANNEX &#8211; </span><span data-contrast="none">AWS Services </span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559738&quot;:240,&quot;335559739&quot;:360,&quot;335559740&quot;:259,&quot;335559991&quot;:567}"> </span></h3>
<p><i><span data-contrast="none">Definitions from source : AWS documentation → </span></i><i><span data-contrast="none">docs.aws.amazon.com</span></i><i><span data-contrast="none">.</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">SCP &#8211; Service control policies : Service control policies are a type of policy that enable central control of authorizations. This ensures that broad guidelines are followed for all AWS accounts in the organization. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">EC2 &#8211; Elastic Compute Cloud : AWS EC2 allows you to rent servers (EC2 instances) to best meet your workload needs. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">STS &#8211; Security Token Service : AWS STS enables you to request temporary security credentials for AWS resources. This makes it possible to grant temporary access to resources via API calls, the AWS console or the AWS CLI (Console Line Interface). </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">Please note: Each STS token has a lifecycle, defined when it is created, of between 15 minutes and 36 hours. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">CloudTrail : AWS CloudTrail is a service that records the actions performed by an AWS user, role or service.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">Fonction Lambda : The Lambda function is a service for executing code.</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">SNS &#8211; Simple Notification Service</span><span data-contrast="none"> : </span><span data-contrast="none">Amazon SNS is a web service for managing the sending of messages (SMS, e-mail, HTTP.S, etc.).</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><i><span data-contrast="none">Thanks to </span></i><i><span data-contrast="none"> Charles BULABULA</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span><i><span data-contrast="none"> for his contribution to this article.</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/02/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud/">Deceptive Security: the solution for effective detection in the cloud? – Deceptive use example in AWS cloud </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/02/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Deceptive Security: the solution for effective detection in the cloud? &#8211; your luring strategy. </title>
		<link>https://www.riskinsight-wavestone.com/en/2024/01/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/01/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy/#respond</comments>
		
		<dc:creator><![CDATA[Etienne Lafore]]></dc:creator>
		<pubDate>Tue, 30 Jan 2024 17:22:22 +0000</pubDate>
				<category><![CDATA[Focus]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Deceptive security]]></category>
		<category><![CDATA[decoy]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=22356</guid>

					<description><![CDATA[<p>    Today, cyber-attacks are part of our daily lives, and are becoming increasingly numerous and sophisticated.   Simultaneously, we are moving towards Information Systems built on an ever-increasing diversity of environments, thanks in particular to the Cloud, which is now...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/01/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy/">Deceptive Security: the solution for effective detection in the cloud? &#8211; your luring strategy. </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">Today, cyber-attacks are part of our daily lives, and are becoming increasingly numerous and sophisticated. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">Simultaneously</span><span data-contrast="none">, we are moving towards Information Systems built on an ever-increasing diversity of environments, thanks in particular to the <strong>Cloud,</strong> which is now </span><span data-contrast="none">an integral part within </span><span data-contrast="none">corporate I</span><span data-contrast="none">nformation </span><span data-contrast="none">S</span><span data-contrast="none">ystems</span><span data-contrast="none">. This enables </span><span data-contrast="none">corporation to </span><span data-contrast="none">expand their capabilities, </span><span data-contrast="none">however it also </span><span data-contrast="none">the surface area and risks of attack. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">Conventional intrusion detection and protection techniques already exist and are developing exponentially. These are effective against the most common attacks, </span><span data-contrast="none">however</span> <span data-contrast="none">are </span><span data-contrast="none">not </span><span data-contrast="none">always </span><span data-contrast="none">adapted to the specificities of the Cloud. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">This raises questions about the use of <strong>proactive strategies</strong>, such as <strong>Deceptive Security</strong>, to stay one step ahead of attackers. Particularly in the context of Cyber-Resilience: how can this kind of technology be used in both </span><span data-contrast="none">a </span><span data-contrast="none">traditional and </span><span data-contrast="none">a </span><span data-contrast="none">cloud environment</span><span data-contrast="none">? </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><em>When should Deceptive Security techniques be used? Are Deceptive Security solutions in the Cloud being developed today? Are there any specific strategies to consider in a Cloud environment as opposed to a traditional one? </em></p>
<p style="text-align: justify;"><span data-contrast="none">We will answer these questions in a </span><b><span data-contrast="none">mini-series of 2 articles</span></b><span data-contrast="none">. In the first article, we will show you how to develop and evaluate your decoy strategy. In the second article, we&#8217;ll present a practical example of deceptive security in AWS.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p> </p>
<h1 style="text-align: justify;" aria-level="1"><span data-contrast="none">Develop</span><span data-contrast="none"> and </span> <span data-contrast="none">evaluate</span> your <span data-contrast="none">deceptive</span> <span data-contrast="none">strategy</span> <span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559738&quot;:240,&quot;335559739&quot;:360,&quot;335559740&quot;:259,&quot;335559991&quot;:567}"> </span></h1>
<h2 style="text-align: justify;" aria-level="1"><span data-contrast="none">Ambitions of </span><span data-contrast="none">Deceptive Security</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559738&quot;:240,&quot;335559739&quot;:360,&quot;335559740&quot;:259,&quot;335559991&quot;:567}"> </span></h2>
<h3 style="text-align: justify;" aria-level="2"><span data-contrast="none">Deceptive Security in a nutshell</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1418,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="none">&#8220;<strong>Deceptive Security</strong>&#8221; (referred to as &#8220;Deceptive&#8221; in the rest of this article), or &#8220;<strong>digital decoying</strong>&#8220;, is a cyber-defense technique that deals with the<strong> intrusion of attackers into an IS</strong> (Information System). It works by <strong>setting up traps and/or decoys</strong> in an IS. These are designed to <strong>imitate legitimate technology,</strong> so as not to be </span><span data-contrast="none">identified as security systems/measures</span><span data-contrast="none">. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">This method makes it possible to <strong>detect</strong> intrusions by generating alerts, to <strong>prevent damage</strong> to the actual infrastructure and to <strong>observe</strong> the practices used by the attacker. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">Before delving into the details of this subject, we recommend reading the article &#8220;</span><a href="https://www.riskinsight-wavestone.com/en/2017/11/deceptive-security-comment-arroser-larroseur/"><span data-contrast="none">Deceptive Security : comment arroser l’arroseur ?</span></a> <span data-contrast="none">&#8220;, which describes the main concepts of &#8220;<strong>Deceptive Security</strong>&#8220;. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p> </p>
<h3 style="text-align: justify;" aria-level="2"><span data-contrast="none">The main objectives of Deceptive</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1418,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="none">The use of Deceptive on an IS can have several objectives: </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:360,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none"> </span><b><span data-contrast="none">Detect </span></b><span data-contrast="none">an intrusion </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="none"> Distract </span></b><span data-contrast="none">the attacker </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><b><span data-contrast="none"> Analyze </span></b><span data-contrast="none">the techniques used in the attack</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-22361 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/1-1.jpg" alt="" width="1040" height="720" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/1-1.jpg 1040w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/1-1-276x191.jpg 276w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/1-1-56x39.jpg 56w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/1-1-768x532.jpg 768w" sizes="auto, (max-width: 1040px) 100vw, 1040px" /></span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">This technology can be used at different levels of maturity, depending on the <strong>needs identified</strong>.  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">The</span><span data-contrast="none"> technology can be used to meet many of the needs mentioned above, but the key is to determine our requirements for this technology in advance. If we restrict the need</span><span data-contrast="none">s for</span> <span data-contrast="none">detection, it should be noted that the configuration, deployment and maintenance of Deceptive will be far less complex than if we push the possibilities of this technology to the maximum (e.g. setting up complex scenarios to lure the attacker and strategic analysis of his actions).</span></p>
<p> </p>
<h3 style="text-align: justify;" aria-level="2"><span data-contrast="none">The benefits of Deceptive</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1418,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}"> </span></h3>
<h4 style="text-align: justify;" aria-level="3"><span data-contrast="none">Why Deceptive ?</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1418,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}"> </span></h4>
<p style="text-align: justify;"><span data-contrast="none">As discussed in the introduction, today&#8217;s cybersecurity challenges are fueled by the need to detect and react to growing attacks. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none"><strong>Deceptive does not replace existing standard cybersecurity solutions</strong>. </span><span data-contrast="none">Being a </span><span data-contrast="none">m</span><span data-contrast="none">ore complex</span><span data-contrast="none"> tool</span><span data-contrast="none">, it acts as a <strong>complement</strong> to <strong>cover all types of attack</strong>, including the most sophisticated. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">This technology is <strong>not designed to prevent an attack</strong>, but to alert security teams, minimize the effect</span><span data-contrast="none">s</span><span data-contrast="none"> of the attack and observe the intruder&#8217;s modus operandi (&#8220;Detect, Distract &amp; Analyze&#8221;).</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<h4 style="text-align: justify;" aria-level="3"><span data-contrast="none">Honeypot VS Honeytoken</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1418,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}"> </span></h4>
<h5 style="text-align: justify;" aria-level="4"><i><span data-contrast="none">Presentation of concepts</span></i><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></h5>
<p style="text-align: justify;"><span data-contrast="none">D</span><span data-contrast="none">epending on the need</span><span data-contrast="none">s</span><span data-contrast="none"> and how they are to be used</span><span data-contrast="none">, different type</span><span data-contrast="none">s</span><span data-contrast="none"> of decoys </span><span data-contrast="none">exist</span><span data-contrast="none">. </span><span data-contrast="none">Whatever the case</span><span data-contrast="none">, they take on the appearance of attributes that make up our Information System. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">The best-known decoys are <strong>&#8220;honeypots&#8221;.</strong> These are servers or workstations that imitate real machines on the network. There&#8217;s also what&#8217;s known as a &#8220;honeynet&#8221;: a network of servers.  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">Another type of decoy is of growing </span><span data-contrast="none">in popularity</span><span data-contrast="none">. This is a decoy that hides directly on a system. These are generally represented by documents or other files whose role is to trigger an alert when someone comes to interact with them. Finally, we have <strong>&#8220;honeytokens&#8221;,</strong> which are data, information, often secrets or keys used to access a dummy resource on the IS (a honeypot, for example).</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<h5 style="text-align: justify;" aria-level="4"><i><span data-contrast="none">A fundamental difference</span></i><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></h5>
<p style="text-align: justify;"><span data-contrast="none">Traditionally, </span><b><span data-contrast="none">honeypots</span></b> <span data-contrast="none">enable </span><span data-contrast="none">the </span><b><span data-contrast="none">observation and understanding of </span></b><b><span data-contrast="none">an </span></b><b><span data-contrast="none">attacker&#8217;s actions</span></b><span data-contrast="none">,</span><span data-contrast="none"> as well as</span> <span data-contrast="none">detecting an intrusion. The difficulty in this case is to configure a decoy that is attractive and credible enough for the </span><span data-contrast="none">attacker to fall into the trap, without delivering information that could compromise a component of our real infrastructure. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">However, </span><b><span data-contrast="none">honeytokens</span></b> <span data-contrast="none">can be more complex and enable the creation of </span><span data-contrast="none">a </span><b><span data-contrast="none">finer and more credible decoy. </span></b><span data-contrast="none">Without honeytokens, the probability of trapping an attacker is lower, and analysis results are not always reliable. The honeytoken&#8217;s dependence on its environment makes it </span><span data-contrast="none">more</span><span data-contrast="none"> attractive </span><span data-contrast="none">in comparison to </span><span data-contrast="none">a honeypot</span><span data-contrast="none">, which represents no more than a trap with no possibility of subsequent escalation. For honeypots to be effective, we recommend deploying one or more complete honeynets,</span><span data-contrast="none"> however it i</span><span data-contrast="none">s important to consider the </span><span data-contrast="none">cost of such an infrastructure. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<h4 style="text-align: justify;" aria-level="3"><span data-contrast="none">Cloud technology development</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1418,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}"> </span></h4>
<p style="text-align: justify;"><span data-contrast="none">Today, the challenge for the most mature </span><b><span data-contrast="none">Deceptive</span></b><span data-contrast="none"> solution vendors is to develop specific services in the </span><b><span data-contrast="none">Cloud</span></b><span data-contrast="none">. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">Indeed, companies are increasingly using the Cloud to </span><b><span data-contrast="none">extend their storage, deploy virtual machines</span></b><span data-contrast="none">, containers and so on. </span><span data-contrast="none">This provision of services is very popular and effective, but at the same time, the interest of cyber-attackers is growing. Templates, or default configurations, make life easier for businesses, but can increase cybersecurity risks. Even though many Cloud providers are making great strides in this area, default configurations don&#8217;t always comply with IT security guidelines. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">The Cloud is therefore a new playground for cyber-attackers. That&#8217;s why we&#8217;re focusing today on adapting our knowledge of Deceptive to </span><b><span data-contrast="none">protect Cloud environments and services too</span></b><span data-contrast="none">. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p> </p>
<h2 style="text-align: justify;" aria-level="1"><span data-contrast="none">Overview of the main publishers on the market</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559738&quot;:240,&quot;335559739&quot;:360,&quot;335559740&quot;:259,&quot;335559991&quot;:567}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="none">It&#8217;s important to note that </span><b><span data-contrast="none">Deceptive</span></b><span data-contrast="none"> is not reserved for overly complex applications. There are </span><b><span data-contrast="none">all kinds of offers on the market</span></b><span data-contrast="none">. Some </span><span data-contrast="none">companies </span><span data-contrast="none">offer services that enable you to obtain a complete </span><span data-contrast="none">off-the-shelf</span><span data-contrast="none"> tool</span><span data-contrast="none">, while others focus on customization, lure quality and therefore the possibility of using their tool to create your own lures (configuration and maintenance not managed by the solution itself). </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">Here&#8217;s an overview of the main publishers and their solutions: </span><span data-contrast="none"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-22363 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/2-1.jpg" alt="" width="1040" height="720" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/2-1.jpg 1040w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/2-1-276x191.jpg 276w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/2-1-56x39.jpg 56w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/2-1-768x532.jpg 768w" sizes="auto, (max-width: 1040px) 100vw, 1040px" /></span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">For some, the current trend is to</span><b><span data-contrast="none"> join forces with other tools </span></b><span data-contrast="none">or integrate their solution with</span><span data-contrast="none"> an</span> <b><span data-contrast="none">EDR</span></b><span data-contrast="none"> (Endpoint Detection and Response) to increase the effectiveness of the technology and meet market needs. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">As mentioned above, the challenge that some have chosen </span><span data-contrast="none">to tackle </span><span data-contrast="none">is to </span><b><span data-contrast="none">adapt to a Cloud environment</span></b><span data-contrast="none">. For example, solutions such as &#8220;</span><span data-contrast="none">Attivo</span><span data-contrast="none"> Networks&#8221;, acquired by </span><span data-contrast="none">SentinelOne</span><span data-contrast="none">, are developing Cloud AWS offers that propose the creation of decoys linked to the service (e.g.: EC2, S3, AWS access keys, etc.). </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p> </p>
<h2 style="text-align: justify;" aria-level="1"><span data-contrast="none">How to build and place decoys?</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559738&quot;:240,&quot;335559739&quot;:360,&quot;335559740&quot;:259,&quot;335559991&quot;:567}"> </span></h2>
<h3 style="text-align: justify;" aria-level="2"><span data-contrast="none">Deceptive </span><span data-contrast="none">strategies</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1418,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="none">Once you&#8217;ve familiarized yourself with this technology and all the possibilities it offers, it</span><span data-contrast="none"> i</span><span data-contrast="none">s worth asking </span><span data-contrast="none">yourself the question, </span><span data-contrast="none">what strategy or strategies you should adopt </span><span data-contrast="none">with regard to</span><span data-contrast="none"> the</span><b><span data-contrast="none"> number of traps and/or decoys to be implemented</span></b><span data-contrast="none">, and </span><b><span data-contrast="none">where</span></b><span data-contrast="none"> they should be placed in the IS. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">To adapt to different use cases, 3 strategies stand out,</span><b><span data-contrast="none"> responding to distinct needs</span></b><span data-contrast="none">:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-22365 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/3-1.jpg" alt="" width="1040" height="720" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/3-1.jpg 1040w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/3-1-276x191.jpg 276w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/3-1-56x39.jpg 56w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/3-1-768x532.jpg 768w" sizes="auto, (max-width: 1040px) 100vw, 1040px" /></span></p>
<p style="text-align: justify;"><span data-contrast="none">Indeed, the Deceptive strategy to be adopted is often tailor-made </span><b><span data-contrast="none">according to the IS infrastructure</span></b><span data-contrast="none"> and, above all, </span><b><span data-contrast="none">according to the priorities and objectives</span></b><span data-contrast="none"> defined beforehand. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><i><span data-contrast="none">By way of example: </span></i><i><span data-contrast="none">if you need to enrich your detection technologies within your IS, it may be worthwhile to study the strategy of &#8220;mass deployment&#8221; of decoys. The aim is to create a phantom IS, thereby increasing the likelihood of the cybercriminal falling into a trap that will trigger an alert to the security teams. </span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p> </p>
<h3 style="text-align: justify;" aria-level="2"><span data-contrast="none">PARCS</span><span data-contrast="none"> matrix</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1418,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="none">The challenge when talking about </span><b><span data-contrast="none">Deceptive</span></b><span data-contrast="none">, and more specifically about lures, is to answer the questions: What is a good lure? How do you create a good lure? Where to place it? How many to place? etc. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">The article &#8220; </span><a href="https://www.cesar-conference.org/wp-content/uploads/2020/12/CESAR2020_070_A-TOURNYOL-du-CLOS_HoneyWISE_v3.pdf"><span data-contrast="none">HoneyWISE : stratégie d’exploitation d’honeytokens en environnement Active Directory</span></a><span data-contrast="none"> &#8221;, written by Augustin TOURNYOL-DU-CLOS and Nathan FAEDDA, proposes a decoy strategy against certain attacks in a specific context: AD (Active Directory). We&#8217;ll also look at honeytokens in comparison with honeypots in the rest of this article. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">The objective</span><span data-contrast="none"> of this study </span><span data-contrast="none">was</span> <span data-contrast="none">to </span><b><span data-contrast="none">simply test the implementation of decoys</span></b><span data-contrast="none"> within the AD and to </span><b><span data-contrast="none">measure their effectiveness</span></b><span data-contrast="none"> using the &#8220;</span><b><span data-contrast="none">PARCS</span></b><span data-contrast="none">&#8221; matrix. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="none">PARCS</span></b><span data-contrast="none"> was</span><span data-contrast="none"> born </span><span data-contrast="none">on the basis of</span> <b><span data-contrast="none">5 criteria</span></b><span data-contrast="none">, originally conceived in the context of an AD environment but applicable to all environments: </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-22367 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/4-1.jpg" alt="" width="1040" height="720" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/4-1.jpg 1040w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/4-1-276x191.jpg 276w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/4-1-56x39.jpg 56w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/4-1-768x532.jpg 768w" sizes="auto, (max-width: 1040px) 100vw, 1040px" /></span></p>
<p style="text-align: justify;"><span data-contrast="none">When designing a decoy, it&#8217;s a good idea to prepare a </span><b><span data-contrast="none">PARCS</span></b><span data-contrast="none"> to </span><b><span data-contrast="none">check your thinking</span></b><span data-contrast="none"> and </span><span data-contrast="none">en</span><span data-contrast="none">sure that it matches your </span><b><span data-contrast="none">expectations</span></b><span data-contrast="none">. </span><span data-contrast="none">It is also important </span><span data-contrast="none">to take into consideration </span><span data-contrast="none">minimum </span><b><span data-contrast="none">requirements</span></b><span data-contrast="none"> illustrated by these 5 criteria: Relevance, Risk, Credibility, Attractiveness and Scalability. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">The objective of this matrix is to determ</span><span data-contrast="none">ine a balance between </span><span data-contrast="none">importance and priority based on these criteria’s </span><span data-contrast="none">(Is the lure&#8217;s attractiveness important in my use case? Do I need a scalable solution? How scalable? etc.). </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p> </p>
<h3 style="text-align: justify;" aria-level="3"><span data-contrast="none">Example of PARCS use: </span><span data-contrast="none">Kerberoasting</span><span data-contrast="none"> scenario &#8220;Stealing or falsifying Kerberos tickets&#8221;</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:852,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="none">Perhaps the best way to illustrate the PARCS matrix presentation is with an example from the &#8220; </span><a href="https://www.cesar-conference.org/wp-content/uploads/2020/12/CESAR2020_070_A-TOURNYOL-du-CLOS_HoneyWISE_v3.pdf"><span data-contrast="none">HoneyWISE</span></a><span data-contrast="none"> &#8221; article. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">The AD attack called </span><b><span data-contrast="none">Kerberoasting</span></b><span data-contrast="none"> is, &#8220;[&#8230;] in synthesis, the offline brute force (no logon failure) of a Kerberos ticket receiving the secret of a service account, without having to send a single packet to this service or even being the local administrator of the compromised workstation&#8221;. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">&#8220;</span><span data-contrast="none">Kerberoasting</span><span data-contrast="none"> [&#8230;]</span><b><span data-contrast="none"> hijacks the native operation of Kerberos</span></b><span data-contrast="none"> in order to carry out an attack. This hijacking takes place on steps 3 and 4 of the Kerberos authentication process, as shown in the following diagram&#8221;</span><span data-contrast="none">:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-22340 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/5.jpg" alt="" width="442" height="264" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/5.jpg 442w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/5-320x191.jpg 320w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/5-65x39.jpg 65w" sizes="auto, (max-width: 442px) 100vw, 442px" /></span></p>
<p style="text-align: justify;"><span data-contrast="none">For this attack case, Augustin TOURNYOL-DU-CLOS and Nathan FAEDDA propose in their </span><a href="https://www.cesar-conference.org/wp-content/uploads/2020/12/CESAR2020_070_A-TOURNYOL-du-CLOS_HoneyWISE_v3.pdf"><span data-contrast="none">article</span></a><span data-contrast="none"> to deploy a honeytoken against </span><span data-contrast="none">Kerberoasting</span><span data-contrast="none"> (see part 2.3 &#8220;Description of detection scenarios&#8221; &#8211; scenario 2). </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">Here is the result, through PARCS, of the study of this type of honeytoken in the context of a </span><span data-contrast="none">Kerberoasting</span><span data-contrast="none"> scenario (16/20):</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="none">P</span></b><span data-contrast="none">ertinence (efficiency): 4/4</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="none">« </span><span data-contrast="none"> The</span><span data-contrast="none"> alerts generated by this honeytoken are reliable. In fact, as soon as a TGS ticket is requested to access an unused and non-existent service, it becomes clear that a malicious action is underway</span><span data-contrast="none">. »</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:993,&quot;335559731&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></li>
</ul>
</li>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><b><span data-contrast="none">A</span></b><span data-contrast="none">ttractivité (attractiveness): 3/4</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><span data-contrast="none">« </span><span data-contrast="none"> The</span><span data-contrast="none"> attractiveness of this token lies in the fact that carrying out the attack does not require any privileges, and can potentially gain privileges while being silent (generation of traffic deemed legitimate). Provided that the account chosen to lure the attacker appears privileged and managed by a user (so that the password is likely to be simple), this honeytoken is highly attractive.</span><span data-contrast="none"> »</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:993,&quot;335559731&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></li>
</ul>
</li>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"><b><span data-contrast="none">R</span></b><span data-contrast="none">isque (risk): 4/4</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="6" data-aria-level="1"><span data-contrast="none">« </span><span data-contrast="none">In our example, a 64-character password has been defined, which cannot be broken in a reasonable time.</span><span data-contrast="none"> »</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:993,&quot;335559731&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></li>
</ul>
</li>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="7" data-aria-level="1"><b><span data-contrast="none">C</span></b><span data-contrast="none">rédibilité (credibility): 3/4</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="8" data-aria-level="1"><span data-contrast="none">« </span><span data-contrast="none"> Subject</span><span data-contrast="none"> to the choice of account name and attributes according to the production context in which it is deployed, since the attack is based on normal Kerberos operation, it should come as no surprise that it can be carried out. </span><span data-contrast="none">Credibility is therefore high. »</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:993,&quot;335559731&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></li>
</ul>
</li>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="9" data-aria-level="1"><b><span data-contrast="none">S</span></b><span data-contrast="none">calabilité (scalability): 2/4</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="10" data-aria-level="1"><span data-contrast="none">« </span><span data-contrast="none"> The</span><span data-contrast="none"> decoy account can be deployed automatically on several domains using scripts. However, for an effective lure, contextualization remains essential and will be the major obstacle to effective mass deployment. The cost of providing this contextualization and keeping it up to date must therefore be taken into </span><span data-contrast="none">account. </span><span data-contrast="none"> »</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:993,&quot;335559731&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></li>
</ul>
</li>
</ul>
<p style="text-align: justify;" aria-level="1"><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559738&quot;:240,&quot;335559739&quot;:360,&quot;335559740&quot;:259,&quot;335559991&quot;:567}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="none">To conclude, Deceptive Security</span></b><span data-contrast="none"> solutions must be considered on a case-by-case basis. It is imperative to determine in advance the objectives to be prioritized, the strategy to be adopted, the scope to be covered, and so on. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">In certain situations, especially for companies with mature IT security systems, it may be appropriate to implement </span><b><span data-contrast="none">Deceptive Security</span></b><span data-contrast="none"> solutions. This is to be applied in addition to standard minimum security tools such as firewalls, antivirus, intrusion detection and/or prevention systems, etc. The aim is to cover</span><b><span data-contrast="none"> all types of cyberattack</span></b><span data-contrast="none"> (&#8220;0-day&#8221; type, with no known pattern).  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">This technology can be difficult to implement for smaller companies, as they may not have the essential security tools in place by default, nor the resources to configure (e.g., design decoys, create strategies and scenarios) and maintain such a solution (e.g., dedicated maintenance teams). </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">Today, the market is expanding, mainly </span><span data-contrast="none">around</span><span data-contrast="none"> detection thanks to Deceptive, but not exclusively. For the time being, however, vendors&#8217; interest in building deceptive solutions is focused on traditional environments. </span><span data-contrast="none">Solutions for Cloud AWS, Azure, etc., are still underdeveloped.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p> </p>
<p> </p>
<p> </p>
<p><em>Thanks to Augustin TOURNYOL DU CLOS for his contribution to this article.</em></p>
<p> </p>
<p> </p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/01/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy/">Deceptive Security: the solution for effective detection in the cloud? &#8211; your luring strategy. </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/01/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Confidential Computing: Revolution or New Mirage?</title>
		<link>https://www.riskinsight-wavestone.com/en/2022/12/confidential-computing-revolution-or-new-mirage/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2022/12/confidential-computing-revolution-or-new-mirage/#respond</comments>
		
		<dc:creator><![CDATA[Etienne Lafore]]></dc:creator>
		<pubDate>Fri, 16 Dec 2022 17:27:36 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[confidential computing]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[encryption]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=19284</guid>

					<description><![CDATA[<p>The encryption of data in transit and at rest now makes it possible to ensure a good level of security. For data being processed, a solution is now emerging confidential computing. I had the opportunity to organize a round table...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/12/confidential-computing-revolution-or-new-mirage/">&lt;strong&gt;Confidential Computing: Revolution or New Mirage?&lt;/strong&gt;</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The encryption of data in transit and at rest now makes it possible to ensure a good level of security. For data being processed, a solution is now emerging confidential computing.</p>
<p style="text-align: justify;">I had the opportunity to organize a round table on confidential computing for the Assises de la Sécurité de 2022, moderated by Thierry AUGER, CISO &amp; Corporate CIO of Lagardère, and including Mathieu Jeandron of AWS, Thiébaut Meyer of Google Cloud, Arnaud Jumelet of Microsoft France and Julien Levrard of OVHCloud. This article intends to summarize the exchanged elements by discussing use cases, the technology, and the initial steps to be taken.</p>
<h1> </h1>
<h1><strong>Purposes of Confidential Computing</strong></h1>
<p> </p>
<p style="text-align: justify;">The principle of confidential computing is to create an enclave that ensures that only the processes running within the enclave has access to clear text data. Before going into more detail about how the technology works, we&#8217;ll look at how it can be used to improve cybersecurity.</p>
<p> </p>
<p><strong>Multi-party Confidential Data Analytics </strong></p>
<p style="text-align: justify;">Several parties want to share data in such a way that none of the external parties will be able to access thier data. This requirement will be met by putting in place a confidential computing enclave. Only the cellar will be able to see the information of what each party shares.</p>
<p>Example: Several banks wish to collaborate on the development of a fraud detection algorithm. However, none of the banks wants their customer information to be used for this analysis in the fear of data getting exposed to other parties.</p>
<p> </p>
<p><strong>Federated AI Learning</strong></p>
<p style="text-align: justify;">Several parties want to pool their data to train an artificial intelligence algorithm. The data must not be disclosed to or known by another actor. The confidential computing enclave will guarantee that only the artificial intelligence algorithm has access to the data.</p>
<p style="text-align: justify;">For example, several hospitals want to train an AI model to upgrade their medical diagnosis on a larger scale. Medical secrecy also requires, under no circumstances another actor will have access to their patient&#8217;s data.</p>
<p> </p>
<p><strong>Protection of Calculations in Edge Computing</strong></p>
<p style="text-align: justify;">Edge computing cannot guarantee the same level of physical security for processing as the data center. However, it is desired that the embedded code and processed data remain inaccessible and unmodifiable. The confidential computing enclave will be able to provide the aforementioned guarantee.</p>
<p style="text-align: justify;">Example: An IoT solution provider wants to ensure that the code embedded in its objects cannot be accessed, guaranteeing its intellectual property.</p>
<p style="text-align: justify;">Finally, the most frequently cited use case is <em>the protection from its infrastructure provider.</em></p>
<p style="text-align: justify;">Here, it&#8217;s important to make sure that the administrators of the infrastructure on which I&#8217;m going to carry out my processing cannot access my data. Satya Nadella, CEO of Microsoft, stated at the Microsoft Build in May 2022 that he considers <a href="https://www.linkedin.com/pulse/10-technologies-coming-together-help-you-build-whats-next-nadella">confidential computing to be a game-changer</a>.</p>
<p style="text-align: justify;">For example, a cloud service provider should not have access to the data processed on its infrastructure. Today, confidential computing provides a hardware-based guarantee in addition to the existing logical isolation mechanisms and implemented security measures. This can restrict the administrators&#8217; actions. In the event of a vulnerability on the latter, the enclave also provides enhanced security against malicious access by a different virtual machine running on the same hypervisor.</p>
<h1> </h1>
<h1><strong>The promises seem interesting, but how does confidential computing work?</strong></h1>
<p> </p>
<p style="text-align: justify;">Confidential computing aims to perform the processing in an enclave accessible only to the processor; this property is materially guaranteed by the processor and its firmware (*). A secure channel is established between the enclave and the processor, preventing any intermediate components (Hypervisor, OS, etc.) from accessing the data.</p>
<p><em><sup>(*) The technical implementation of the enclave differs based on the processor founders (Intel, AMD, ARM, IBM, etc.). Let&#8217;s not elaborate on it in this article.</sup></em></p>
<p>There are two primary forms of an enclave:</p>
<ul>
<li>Enclave at the machine or container level: all processing performed within the virtual machine or container is protected.</li>
<li>Application-level enclave: the enclave will protect only a portion of the application (for example, the code performing sensitive processing: raw data is never accessible, only the results are)</li>
</ul>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-19278 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/Image1.png" alt="" width="445" height="227" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/Image1.png 445w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/Image1-374x191.png 374w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/Image1-71x36.png 71w" sizes="auto, (max-width: 445px) 100vw, 445px" /></p>
<p>During the round table, Arnaud Jumelet presented an analogy with a building:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-19280 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/Image2.png" alt="" width="863" height="501" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/Image2.png 863w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/Image2-329x191.png 329w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/Image2-67x39.png 67w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/Image2-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/Image2-768x446.png 768w" sizes="auto, (max-width: 863px) 100vw, 863px" /></p>
<p style="text-align: justify;">An enclave at the level of a VM or container can be compared to the protection that an apartment would provide in relation to the rest of the entire building: only those with the keys can enter.</p>
<p style="text-align: justify;">In the case of an enclave at the application or code level, it can be compared to a safe within the apartment that protects the processing.</p>
<p style="text-align: justify;">In the first case, the building manager (i.e., the IS infrastructure management) has no view of what is going on in the flat, whereas in the latter case, not even those with access to the apartment (i.e., the VM administrator) can see what is happening in the safe.</p>
<h2> </h2>
<h2><strong>I</strong><strong>t all sounds magical; does it cover all my risks?</strong></h2>
<p> </p>
<p style="text-align: justify;">Confidential computing is a new toolbox for reducing risks. Mathieu Jeandron warns that it should not be used in opposition to existing measures; it is a matter of adding a hardware-based guarantee to the logical isolation offered by virtualization.</p>
<p style="text-align: justify;">Like any tool, it can have its own security flaws, such as <a href="https://en.wikipedia.org/wiki/Side-channel_attack">side-channel attacks (like the SQUIP vulnerability)</a> or attacks affecting other functions of the processors (such as attack on the server). However, these attacks require a high level of expertise. During the round table, Thiébaut Meyer stated that disabling hyperthreading can reduce the risks associated with these vulnerabilities. It is also crucial that the enclave, upon startup, verifies that it is running in a trusted space like process challenge, processor firmware version verification, etc.</p>
<p>Mathieu Jeandron mentioned that completely understanding confidential computing will not address all his risks, with respect to the following:</p>
<ul>
<li>In the context of a VM-level enclave, the VM administrator will always have access</li>
<li>Vulnerability in the code running in an enclave could still be exploited by an attacker to access the data</li>
<li>Compromise of the supply chain producing the processors is always a possibility&#8230;</li>
</ul>
<p style="text-align: justify;">Implementing an enclave can blind certain external cybersecurity detection mechanisms; beware that what is on one side could be lost on the other!</p>
<p style="text-align: justify;">To make a well-thought-out plan for using the technology, it is important to understand both the technology and the associated risks.</p>
<h2> </h2>
<h2><strong>Data protection is a matter of key management</strong></h2>
<p> </p>
<p style="text-align: justify;">Encryption is never far away when it comes to data protection. Moreover, encryption requires key generation and storage tools. Julien Levrard reminded us that the protection provided by the enclave is only one part of the problem, whereas it must be seen holistically! </p>
<p style="text-align: justify;">Specifically, both the data to be processed and the code running in the enclave originate from outside the enclave. The data must therefore be encrypted, and only the enclave must have access to decrypt the data. Therefore, the keys must be sequestered in an HSM or KMS, which must verify that the correct enclave is requesting access prior to releasing the keys. The customer will have the option of utilizing the services of the supplier or implementing BYOK or HYOK.</p>
<h1> </h1>
<h1><strong>I see an opportunity, but isn&#8217;t it too complicated to go there?</strong></h1>
<p> </p>
<p style="text-align: justify;">The Confidential Computing Consortium, which aims to promote the technology, provides <a href="https://confidentialcomputing.io/projects/">accelerators</a> to facilitate this adoption. For example, Arnaud Jumelet mentioning about the open-source project <a href="https://github.com/openenclave/openenclave">OpenEnclave</a> or <a href="https://enarx.dev/">Enarx</a>. There are also services that offer player-building solutions, such as Securitee, <a href="https://cosmian.com/">Cosmian</a> or <a href="https://www.decentriq.com/">Decentriq</a>. Furthermore, many software players have also incorporated the integration of confidential computing functionalities to their roadmaps; in the future, this may be the default operation!</p>
<p style="text-align: justify;">The majority of confidential computing initiatives in France are currently in the Proof of Concept (POC) stage. However, some use cases are already in production; the SIGNAL messaging system uses confidential computing to protect messages, for instance. Thiébaut Meyer even indicated that the first ransomware used this technology to evade detection!</p>
<p style="text-align: justify;">Julien Levrard explained that the technical requirements for testing are straightforward: simply order a server of the latest generation and activate the function in the firmware or subscribe to cloud resources that are compatible. In an enclave, one can then easily deploy an OS or container with the appropriate drivers. For the business use cases described at the beginning of this article, however, the application code must be redesigned.</p>
<h1> </h1>
<h1 style="text-align: justify;"><strong>Confidential Computing- A Maturing Technology</strong></h1>
<p> </p>
<p style="text-align: justify;">Confidential computing has matured to the point where an expert <a href="https://fr.wikipedia.org/wiki/Assembleur">assembler</a> is no longer required to use it. This is probably the right time for companies with use cases to test this technology to better understand it before deciding on its use in the production.  Moreover, it makes sense to incorporate this into a security roadmap.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/12/confidential-computing-revolution-or-new-mirage/">&lt;strong&gt;Confidential Computing: Revolution or New Mirage?&lt;/strong&gt;</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2022/12/confidential-computing-revolution-or-new-mirage/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Zero trust and identity as the new perimeter : what about tokens ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2022/12/zero-trust-and-identity-as-the-new-perimeter-what-about-tokens/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2022/12/zero-trust-and-identity-as-the-new-perimeter-what-about-tokens/#respond</comments>
		
		<dc:creator><![CDATA[Etienne Lafore]]></dc:creator>
		<pubDate>Thu, 01 Dec 2022 09:00:00 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[AAD]]></category>
		<category><![CDATA[zero trust]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=19101</guid>

					<description><![CDATA[<p>Introduced just over 10 years ago by Forrester, Zero Trust is a security philosophy that starts from the premise that the cyber threat is omnipresent, both outside and inside the IS, and consequently proposes an access management strategy based on...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/12/zero-trust-and-identity-as-the-new-perimeter-what-about-tokens/">Zero trust and identity as the new perimeter : what about tokens ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">Introduced just over 10 years ago by <a href="https://www.forrester.com/blogs/the-definition-of-modern-zero-trust/">Forrester</a>, <em>Zero Trust</em> is a security philosophy that starts from the premise that the cyber threat is omnipresent, both outside and inside the IS, and consequently proposes an access management strategy based on the three basic principles: explicit verification, minimising privileges, and constant monitoring.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-19102 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/1EN.png" alt="" width="602" height="134" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/1EN.png 602w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/1EN-437x97.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/1EN-71x16.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/1EN-600x134.png 600w" sizes="auto, (max-width: 602px) 100vw, 602px" /></p>
<p style="text-align: center;"><strong><em>Figure 1 :</em></strong><em> The three fundamental principles of the Zero Trust model</em></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">Despise these principles being well-known now, their practical implementation still represents a challenge for many organisations.</p>
<p style="text-align: justify;">Currently, there is not and will not be a specific product that can be used to implement a Zero Trust model, instead, there are many distinctive implementation architectures. For user access, Zero Trust can be applied using two main architectural models (which are not in conflict and can be complementary):</p>
<ul style="text-align: justify;">
<li>A model using a cut-off infrastructure element, e.g., a Secure Access Service Edge (SASE) approach. It dynamically controls network access to IS resources (where the user&#8217;s identity and posture are being used to make the decision).</li>
<li>An approach where only identity is used to make the cut: access to IS resources is conditional, requiring proof of authentication and authorisation. In this approach, access control is carried out by an identity provider (identity manager or IdP) and by the targeted resources themselves.</li>
</ul>
<p style="text-align: justify;">The second type of architecture will be the topic of this article. We will focus on the implementation process which uses Azure Active Directory (AAD) as the Identity Provider.</p>
<p style="text-align: justify;">Before understanding how the Identity Provider can be used to implement Zero Trust, here is a small description of the theory on the token-based access management mechanism.</p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;">AAD-based access management: a token story</h1>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">AAD-based access management follows the principles of the access scheme involving an Identity Provider, i.e. a service to which the target resource delegates the management of the life cycle of user identities and their authentication.</p>
<p style="text-align: justify;">In this scheme, a user&#8217;s access to a resource requires the presentation of a valid pass, issued by the Identity Provider after the user’s authentication process and (potentially) verification of his entitlement to access the target resource. These passes are called tokens and are cryptographically signed to protect against the use of fake tokens.</p>
<p style="text-align: justify;"><em>What is a token?</em> A token is a string of characters containing various information called clauses, transmitted, for example, by HTTP (HyperText Transfer Protocol) requests.</p>
<p style="text-align: justify;">AAD, as an identity provider, can issue three types of tokens, known as Security Tokens:</p>
<p> </p>
<p style="text-align: justify;"><em><img loading="lazy" decoding="async" class="alignleft wp-image-19126 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Icone-1.png" alt="" width="46" height="41" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Icone-1.png 46w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Icone-1-44x39.png 44w" sizes="auto, (max-width: 46px) 100vw, 46px" />ID Token:</em> <strong>Evidence of user authentication. </strong>It contains information about the user&#8217;s identity and the authentication context. It is not associated with any specific resource nor involved in access control.</p>
<p style="text-align: justify;"><em style="font-size: revert; color: initial;"><img loading="lazy" decoding="async" class="alignleft wp-image-19128 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Icone-2.png" alt="" width="46" height="41" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Icone-2.png 46w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Icone-2-44x39.png 44w" sizes="auto, (max-width: 46px) 100vw, 46px" />Access Token:</em> <strong style="font-size: revert; color: initial;">A pass authorising access to a particular resource</strong><span style="font-size: revert; color: initial;">. It may contain attributes or claims that allows the targeted resource to refine access control, such as the permissions delegated to the client application (scopes) on the resource. However, in case of Azure AD (a </span><strong style="font-size: revert; color: initial;">self-supporting token (*) (</strong><span style="font-size: revert; color: initial;">JWT</span><strong style="font-size: revert; color: initial;">)</strong><span style="font-size: revert; color: initial;">): it </span><strong style="font-size: revert; color: initial;">cannot be revoked after it has been issued</strong><span style="font-size: revert; color: initial;">. Its </span><strong style="font-size: revert; color: initial;">lifetime has an average of one hour</strong><span style="font-size: revert; color: initial;">. In other words, an Access Token remains valid until its lifetime ends. <br /></span><strong style="font-size: revert; color: initial;"><em><sup>(*)</sup></em></strong><em style="font-size: revert; color: initial;">Another implementation of OAuth could have been with opaque tokens which requires querying the Authorization server in order to find the details. This type of implementation would allow for easier revocation. This is not the choice made by Microsoft.</em></p>
<p style="text-align: justify;"><em><img loading="lazy" decoding="async" class="alignleft wp-image-19130 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Icone-3.png" alt="" width="44" height="41" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Icone-3.png 44w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Icone-3-42x39.png 42w" sizes="auto, (max-width: 44px) 100vw, 44px" />Refresh Token:</em> is provided at the same time as the Access Token; <strong>it allows obtaining a new Access Token/Refresh Token pair after the expiration of the previous Access Token, without explicit user re-authentication</strong>. It also allows to retrieve Access Tokens for other resources without explicit user authentication. In the context of Azure AD, its lifetime is 90 days or 24 hours for Single Page Applications, and unlike Access Token, it can be revoked before its expiration.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">It should be noted that Microsoft has defined a fourth type of token, the Primary Refresh Token, which allows single sign-in between applications on a given device. This token will not be mentioned in the rest of the document for the sake of simplicity.</p>
<p style="text-align: justify;">Now we need to understand how these different tokens circulate from actor to actor!</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><strong>Initial access to the target resource</strong></h2>
<p> </p>
<p style="text-align: justify;">At the time of the initial access, we assume that there are no valid tokens: no Access Tokens for the target resource nor Refresh Tokens. When the user wants to access the target resource, he will be redirected to AAD to be authenticated (and eventually authorised).</p>
<p> </p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-19114 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Schema-1-VO.png" alt="" width="4398" height="2434" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Schema-1-VO.png 4398w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Schema-1-VO-345x191.png 345w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Schema-1-VO-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Schema-1-VO-768x425.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Schema-1-VO-1536x850.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Schema-1-VO-2048x1133.png 2048w" sizes="auto, (max-width: 4398px) 100vw, 4398px" /></p>
<p style="text-align: center;"><strong><em>Figure 2:</em></strong><em> Dynamic process of obtaining an Access Token/Refresh Token pair during the initial access to the resource</em></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">The resulting Access Token will be included in each request to the target resource. The target resource will process them as long as the access token has not expired.</p>
<p> </p>
<h2 style="text-align: justify;"><strong>Renewal of access rights to the resource</strong></h2>
<p style="text-align: justify;"><strong> </strong></p>
<p style="text-align: justify;">After the expiration of the initial Access Token, the Refresh Token will be used to silently retrieve, without user intervention, a new Access Token/Refresh Token pair.</p>
<p> </p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-19118 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Schema-2-VO.png" alt="" width="4398" height="2482" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Schema-2-VO.png 4398w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Schema-2-VO-338x191.png 338w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Schema-2-VO-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Schema-2-VO-768x433.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Schema-2-VO-1536x867.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Schema-2-VO-2048x1156.png 2048w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Schema-2-VO-800x450.png 800w" sizes="auto, (max-width: 4398px) 100vw, 4398px" /></p>
<p style="text-align: center;"><strong><em>Figure 3:</em></strong><em> Access session dynamic maintenance via the renewal of the Access Token/Refresh Token pair</em></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">In an access management model, which involves an Identity Provider such as AAD, it can be noticed that <strong>the tokens are the keys to the castle and the Identity Provider is the gatekeeper</strong>. Let&#8217;s now look at how well this access management model implements the principles of Zero Trust for applications that rely on AAD to manage their login sessions.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Tokens: vulnerable vehicles of implicit trust</h2>
<p> </p>
<p style="text-align: justify;">Looking at how Azure AD-based access management works, we see that:</p>
<ul style="text-align: justify;">
<li>Access to any resource delegating access management requires proof of authentication and authorisation, through the presentation of a valid Access Token, regardless of the network origin of the access.</li>
<li>An Access Token only gives access to one resource. Access to a different resource requires a dedicated Access Token from the Identity Provide.</li>
<li>The Refresh Token allows to obtain Access Tokens for all resources to which the user is authorised</li>
</ul>
<p style="text-align: justify;">The application of Zero Trust principles is partial and perfectible at this stage:</p>
<ul style="text-align: justify;">
<li>By default, the delivery of the Access Token is done against a basic authentication (login and password)</li>
<li>The validity of the Access Token is decorrelated from the context. It can be used during its validity period, independent of the potential compromised signals that could have been detected</li>
<li>The Access Token can be renewed without verification, if the authentication context did not changed</li>
</ul>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Conditional Access (CA) reinforces the conditions for issuing tokens and securing of the sessions</h3>
<p style="text-align: justify;">Conditional Access (CA) is an AAD function requiring an AAD Premium P1 or M365 Business Premium licence that allows context to be considered in access management.</p>
<p style="text-align: justify;">Thanks to CA, it is possible to integrate a set of signals related to the user&#8217;s identity, the terminal used, the target resource, the access context and/or the risk level into the access authorisation decision.</p>
<p style="text-align: justify;">The CA also allows non-binary authorisation decisions to be applied. Thus, an access carried out in a certain context can be authorised under specific conditions, which aim to compensate and reduce the level of risk associated with the access context. </p>
<p> </p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-19142 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/2EN.png" alt="" width="1604" height="705" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/2EN.png 1604w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/2EN-435x191.png 435w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/2EN-71x31.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/2EN-768x338.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/2EN-1536x675.png 1536w" sizes="auto, (max-width: 1604px) 100vw, 1604px" /></p>
<p style="text-align: center;"><strong><em>Figure 4:</em></strong><em> The principal of Conditional Access</em></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">The distribution of an Access Token can be conditioned by implementing a two-factor authentication, which helps to protect against unauthorised access (as a result of stolen credentials).</p>
<p style="text-align: justify;">In addition, the CA offers other mechanisms for conditioning the use of tokens. Here we will focus on two mechanisms in particular: Sign-In Frequency (SIF) and Continuous Access Evaluation (CAE).</p>
<p style="text-align: justify;"><strong> </strong></p>
<h3 style="text-align: justify;">The Sign-In Frequency: influences the frequency of explicit user authentication</h3>
<p style="text-align: justify;">The Sign-In Frequency is used to define a maximum duration during which the user must re-authenticate after having been initially authorised access to the target resource.</p>
<p style="text-align: justify;">Beyond the given timeframe, the Refresh Token cannot be anymore used to implicitly renew the Access Token/Refresh Token pair.</p>
<p style="text-align: justify;">The SIF is thus a means of <strong>limiting the implicit trust given to Refresh Tokens over time</strong>.</p>
<p style="text-align: justify;">The operation of the mechanism is illustrated below, for a SIF set at 90 minutes.</p>
<p> </p>
<p style="text-align: justify;"> </p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-19163 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/EN.png" alt="" width="1096" height="517" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/EN.png 1096w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/EN-405x191.png 405w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/EN-71x33.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/EN-768x362.png 768w" sizes="auto, (max-width: 1096px) 100vw, 1096px" /></p>
<p style="text-align: center;"><strong><em>Figure 5:</em></strong><em> Illustration of the operation of the Sign-in Frequency</em></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">Note that the <strong>SIF has no effect on the validity of Access Tokens already issued</strong>. An Access Token that has not yet expired can still be used to access the associated resource, even after the maximum duration defined by the SIF has expired. The SIF only intervenes to prevent an implicit renewal of Access Tokens already issued or the implicit obtaining of new Access Tokens. In order to act on the Access Tokens already issued, it is necessary to turn to the Continuous Access Evaluation (CAE).</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Continuous Access Evaluation (CAE) represents the way of linking the validity of Access Tokens to the context</h3>
<p style="text-align: justify;">CAE is a CA feature, available since January 2022, that allows <strong>context to be considered throughout the access session and not only at the time of the initial authorisation</strong>, so that it can <strong>force a renewal of the Access Token already issued in response to certain signals</strong>, including signals that suggests a compromise.</p>
<p> </p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-19146 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/4EN.png" alt="" width="3124" height="473" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/4EN.png 3124w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/4EN-437x66.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/4EN-71x11.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/4EN-768x116.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/4EN-1536x233.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/4EN-2048x310.png 2048w" sizes="auto, (max-width: 3124px) 100vw, 3124px" /></p>
<p style="text-align: center;"><strong><em>Figure 6:</em></strong><em> Types of signals that can force the renewal of the Access Token</em></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">CAE requires a communication link between AAD and the target resource to notify the latter of signals requiring re-authentication and to retrieve the conditional access policies defined for it. When the target resource receives an access request, it checks if it has not previously received a notification about the concerned user and whether the access context is different from the one allowed by the conditional access policies or not. If so, it rejects the access request and sends the user back to AAD with a request (challenge) for explicit re-authentication and a re-evaluation of the applicable access policies.</p>
<p style="text-align: justify;">It should be noted that <strong>CAE is not a transparent mechanism for the target resources and its implementation requires changes in their operating logic</strong>. The implementation of CAE requires a CAE-capable client application capable of interpreting the request (challenge) returned by the target resource while redirecting the user to AAD. Microsoft has started to implement AAD for its <a href="https://learn.microsoft.com/en-us/azure/active-directory/conditional-access/concept-continuous-access-evaluation">M365 collaboration suite applications</a>.</p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;"><em>Summary</em></h1>
<p style="text-align: justify;">Nowadays, it is possible to implement a Zero Trust access philosophy based on identity, however, to avoid falling into the shortcomings of historical security models, the conditions for issuing and using these tokens must be tightened up, otherwise they will become carriers of implicit and excessive trust.</p>
<p style="text-align: justify;">The use of mechanisms allows us to integrate signals that authorises the evaluation of context and allows a continuous control on the issued tokens when necessary.</p>
<p style="text-align: justify;">However, it must be kept in mind that, in the face of a token theft scenario, these mechanisms play a reactive role depending on detection capabilities, and not a preventive role capable of preventing the use of stolen tokens. We will have the opportunity return with more details in a future article, discussing the problems of a token theft and the various existing and emerging solutions for dealing with them. </p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/12/zero-trust-and-identity-as-the-new-perimeter-what-about-tokens/">Zero trust and identity as the new perimeter : what about tokens ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2022/12/zero-trust-and-identity-as-the-new-perimeter-what-about-tokens/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Compliance in the Cloud, a new Paradigm</title>
		<link>https://www.riskinsight-wavestone.com/en/2022/10/compliance-in-the-cloud-a-new-paradigm/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2022/10/compliance-in-the-cloud-a-new-paradigm/#respond</comments>
		
		<dc:creator><![CDATA[Etienne Lafore]]></dc:creator>
		<pubDate>Fri, 07 Oct 2022 08:00:00 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Deep-dive]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[Azure]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[CSPM]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=18873</guid>

					<description><![CDATA[<p>Feedback on AWS and Azure Misconfigurations in cloud environments are still a source of major incidents and will keep on reoccurring endlessly. With the news continuously providing new examples:  leakage of 1 billion citizens&#8217; data linked to a key leak,...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/10/compliance-in-the-cloud-a-new-paradigm/">Compliance in the Cloud, a new Paradigm</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 style="text-align: justify;">Feedback on AWS and Azure</h1>
<p style="text-align: justify;">Misconfigurations in cloud environments are still a source of major incidents and will keep on reoccurring endlessly. With the news continuously providing new examples:  <a href="https://twitter.com/cz_binance/status/1543905416748359680">leakage of 1 billion citizens&#8217; data linked to a key leak</a>, <a href="https://lambdascientifica.com/new-office-365-phishing-campaign-used-stolen-kaspersky-amazon-ses-token-to-trick-victims/">phishing campaign using a Kaspersky AWS key</a>, <a href="https://gizmodo.com/iranian-chat-app-gets-its-data-wiped-out-in-a-cyberatta-1846181651">misconfiguration of a NoSQL database</a>, <a href="https://www.darkreading.com/application-security/cloud-misconfig-exposes-3tb-sensitive-airport-data-amazon-s3-bucket">3TB of sensitive airport data&#8230;</a></p>
<p style="text-align: justify;">The objective of this article is to illustrate how to anticipate a scenario by implementing a Control Tower, or a tool for continuous supervision of the configuration of Cloud resources.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">To begin with, a little theory about logs</h2>
<p style="text-align: justify;">Cloud logs can be divided into 3 categories:</p>
<ul style="text-align: justify;">
<li><strong>System logs</strong>: They are generated by the OS and applications hosted in IaaS/CaaS mode. The stakes are not different from a classic on premise IS, but only the architecture of logs collection can be adapted.</li>
</ul>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-18841 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image1.png" alt="" width="1187" height="333" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image1.png 1187w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image1-437x123.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image1-71x20.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image1-768x215.png 768w" sizes="auto, (max-width: 1187px) 100vw, 1187px" /></p>
<ul style="text-align: justify;">
<li><strong>Security infrastructure admin logs</strong>: Includes the logs of the security appliances, but also of the PaaS security services used by the customer and the logs of the network flows. For the appliances, there are no new changes here either, it is the same component already in use and well known. However, for security PaaS services and network logs, it is necessary to implement a specific integration and adapt the detection scenarios.</li>
<li><strong>Cloud Infra API logs</strong>: During each API call to create, modify or delete a resource, the Cloud Service Provider will generate a log.</li>
</ul>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">These logs are accessible in dedicated managed services such as AWS CloudTrail, AWS config or Azure activity log:</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-18843 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image2.png" alt="" width="475" height="60" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image2.png 475w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image2-437x55.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image2-71x9.png 71w" sizes="auto, (max-width: 475px) 100vw, 475px" /></p>
<p style="text-align: justify;">The time taken to make the logs available will depend on the SLA of the CSP, but they are generally available within 15 minutes after the operation has been carried out.</p>
<p style="text-align: justify;">Exploiting these logs will enable you to move from a manual and static compliance to an automatic and continuous compliance:</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-18877 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image3ENTer.png" alt="" width="1038" height="301" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image3ENTer.png 1038w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image3ENTer-437x127.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image3ENTer-71x21.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image3ENTer-768x223.png 768w" sizes="auto, (max-width: 1038px) 100vw, 1038px" /></p>
<p> </p>
<h2 style="text-align: justify;">What are the technical options for building a Control Tower?</h2>
<p style="text-align: justify;">There are three main options for a customer to implement a control tower:</p>
<ul style="text-align: justify;">
<li><strong>Native (</strong>built-in)</li>
<li><strong>Custom native</strong></li>
<li><strong>Cloud Security Posture Management </strong>(CSPM)</li>
</ul>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Native (built-in)</h3>
<p style="text-align: justify;">In the first case, the tools activated by the Cloud Service Provider are default, sometimes free of charge, using predefined alerts to assess the compliance of your environments and deliver using a security score.</p>
<p style="text-align: justify;">For example, Trusted Advisor on AWS or Microsoft Defender for Cloud on Azure.           </p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-18849 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image4.png" alt="" width="4116" height="1230" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image4.png 4116w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image4-437x131.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image4-71x21.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image4-768x230.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image4-1536x459.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image4-2048x612.png 2048w" sizes="auto, (max-width: 4116px) 100vw, 4116px" /></p>
<p style="text-align: justify;">These native and non-customized solutions make it possible to initiate a control tower, but they are limited as they are a generic response to specific problems.</p>
<h3 style="text-align: justify;"> </h3>
<h3 style="text-align: justify;">Custom native</h3>
<p style="text-align: justify;">Cloud providers provide many services that allow customers to build a compliance tool for their infrastructure. The CSP tools available are customised to create specific compliance alerts and custom dashboards/KPIs.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-18853 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image5EN.png" alt="" width="1186" height="562" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image5EN.png 1186w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image5EN-403x191.png 403w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image5EN-71x34.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image5EN-768x364.png 768w" sizes="auto, (max-width: 1186px) 100vw, 1186px" /></p>
<p style="text-align: justify;">In this option, it is necessary to allocate 10-to-40-man days to the project, in order to implement the monitoring infrastructure, define the first alerts and build the dashboards.</p>
<p style="text-align: justify;">The use of several tenants, organizations or Clouds will require a specific architecture to be defined as there is no turnkey solution.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">CSPM : Cloud Security Posture Management</h3>
<p style="text-align: justify;">Wavestone sees a booming market within CSPM where, <a href="https://www.marketsandmarkets.com/Market-Reports/cloud-security-posture-management-market-71228949.html">Marketsandmarkets</a> estimates that the CSPM market will more than double between 2022 and 2027 from $4.2 billion to $8.6 billion.</p>
<p style="text-align: justify;">CSPMs natively support numerous Cloud providers and provide their customers with numerous dashboards based on the major market repositories. Customers can also easily define their own standards, policies and alerts.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-18857 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image6EN.png" alt="" width="4389" height="1874" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image6EN.png 4389w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image6EN-437x187.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image6EN-71x30.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image6EN-768x328.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image6EN-1536x656.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image6EN-2048x874.png 2048w" sizes="auto, (max-width: 4389px) 100vw, 4389px" /></p>
<p style="text-align: justify;">The deployment of this type of tool is very simple, within few days it can be accessible to the customer.</p>
<p style="text-align: justify;">The recurring costs may however be significant: typically 3 &#8211; 5% of the Cloud bill in addition to the Cloud services to be activated (similar to the native and custom services option).</p>
<p style="text-align: justify;">Detection speed will also be slightly slower as the CSPM SLA adds to the CSP log generation SLA, typically 20 minutes &#8211; 1 hour detection time.</p>
<p> </p>
<h2 style="text-align: justify;">What should my Control Tower monitor?</h2>
<p style="text-align: justify;">The major problem customers face when implementing a CSPM with proposed alert activation, is the generation of tens or even hundreds of thousands of high criticality alerts to process. Teams don&#8217;t know where to start and are often feel discouraged. Care must be taken not to overload the security teams!</p>
<p style="text-align: justify;">For the implementation of a control tower on a production Cloud IS, we recommend deploying security controls in waves of 10 &#8211; 15 at a time. To do this, you need to prioritise the most important topics. Below is an example of prioritisation:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-18861 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image7EN.png" alt="" width="3283" height="1170" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image7EN.png 3283w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image7EN-437x156.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image7EN-71x25.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image7EN-768x274.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image7EN-1536x547.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image7EN-2048x730.png 2048w" sizes="auto, (max-width: 3283px) 100vw, 3283px" /></p>
<p style="text-align: justify;">Unfortunately, every rule has its exceptions! Mainly linked to the existing Cloud, specific architectures or technical constraints, it is therefore essential to foresee this situation and the associated governance at the design stage:</p>
<ul style="text-align: justify;">
<li>Validation: by the local CISO and/or the global CISO</li>
<li>Expiration</li>
<li>Review: decentralised (locally or during annual global audits) or centralised (through continuous global monitoring)</li>
</ul>
<p style="text-align: justify;">Using tags for cloud resources is currently, the easiest way to do this, however, be aware that some resources may not be compatible such as IAM services.</p>
<p style="text-align: justify;">No matter which model is chosen, the issues to be addressed remain mainly the same:</p>
<ul style="text-align: justify;">
<li>Ensuring the legitimate use and application of exceptions</li>
<li>Define specific indicators on exceptions for subjects at risk from Top Management</li>
<li>Set up regular exception monitoring campaigns</li>
<li>Alerting and dealing with when an exception expires</li>
</ul>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">How to implement an effective remediation process?</h2>
<p style="text-align: justify;">The implementation of a control tower will generate numerous alerts, which will have to be corrected. The three options possible are listed below: </p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-18865 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image8EN.png" alt="" width="4013" height="1201" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image8EN.png 4013w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image8EN-437x131.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image8EN-71x21.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image8EN-768x230.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image8EN-1536x460.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image8EN-2048x613.png 2048w" sizes="auto, (max-width: 4013px) 100vw, 4013px" /></p>
<h3 style="text-align: justify;">Deny</h3>
<p style="text-align: justify;">Why remediate when you can simply block non-compliant resources preventively?</p>
<p style="text-align: justify;">With <a href="https://github.com/Azure/Community-Policy">Azure Policy</a> or <a href="https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_scps.html">AWS SCP</a>, it is natively possible to block certain configurations and thus avoid generating new alerts.</p>
<p style="text-align: justify;">For use cases that are not covered, it is possible to set up checks on deployment templates in the CI/CD chains (this nevertheless requires a high level of maturity).</p>
<p style="text-align: justify;">Deploying a deny mechanism on existing environments is rarely implemented as the risk of generating dissatisfaction among development teams is too high:</p>
<ul>
<li style="text-align: justify;">Existing non-compliant resources can no longer be modified</li>
<li style="text-align: justify;">It will generate an additional burden on the development teams because habits must be changed</li>
<li style="text-align: justify;">&#8230;</li>
</ul>
<h3 style="text-align: justify;"> </h3>
<h3>Automatic remediation</h3>
<p style="text-align: justify;">Here, the aim is to correct deviant configurations directly and automatically but beware of side effects!</p>
<p style="text-align: justify;">To do this, it is possible to use the cloud provider&#8217;s native services (Azure policy or AWS SSM Manager) or to develop functions for unsupported cases (AWS Lambda, Azure Function or Azure LogicApps).</p>
<p> </p>
<h3 style="text-align: justify;">Manual</h3>
<p style="text-align: justify;">Unfortunately, this is the most common solution, but also the most expensive in terms of human resources. Deviating configurations are remediated manually by the teams.</p>
<p style="text-align: justify;">To guarantee the success of a manual remediation, it is necessary to have strong support from top management to ensure the adhesion and motivation of the teams.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="alignleft wp-image-18869 size-medium" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image9EN-211x191.png" alt="" width="211" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image9EN-211x191.png 211w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image9EN-43x39.png 43w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image9EN-768x694.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image9EN-1536x1389.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/10/Image9EN-2048x1851.png 2048w" sizes="auto, (max-width: 211px) 100vw, 211px" />The implementation of a Cloud OWSAP type dashboard highlighting the priorities of the moment is a good solution, allowing each person to take responsibility for their area. Each of the subjects mentioned opposite can have one or more indicators.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">However, having the support of management is not sufficient, it is necessary to know the person responsible for the resource in order to ask  them to make the changes. In a large international group this is not easy. Our recommendation is to appoint at least one security officer per account/subscription who should have detailed knowledge of the applications and the people responsible for the resources.</p>
<p style="text-align: justify;">In parallel, it is necessary to implement an effective training and awareness programme. In order to minimise the number of alerts and avoid filling the bathtub faster than it empties, the development teams must be fully aware of the security requirements in the cloud.</p>
<p style="text-align: justify;">To begin the remediation process, our advice is to start centrally with an ample sized team in charge of implementing the control tower, but also in charge of mobilising and training local relays, enabling local teams to monitor and manage compliance on their own.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Compliance alert or security alert?</h2>
<p style="text-align: justify;">Most companies consider that monitoring the compliance of their cloud resources is not a responsibility of the SOC teams. But the boundary is not so easy to define, especially given the number of security incidents in the cloud that stem from configuration errors: public exposure of a storage resource containing critical data, unconfigured MFA on an admin account, or RDP or SSH exposed on the internet.</p>
<p style="text-align: justify;">Generating a security alert to the SOC will leverage existing processes and tools for 24/7 handling even if the SOC resources are not cloud experts.</p>
<p style="text-align: justify;">And finally, this will be a good opportunity to bring Cloud security and SOC teams together to improve security supervision by adapting it to the reality of the cloud.</p>
<p style="text-align: justify;"> </p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/10/compliance-in-the-cloud-a-new-paradigm/">Compliance in the Cloud, a new Paradigm</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2022/10/compliance-in-the-cloud-a-new-paradigm/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cloud security posture management: towards an industrialization of the control of its cloud environment</title>
		<link>https://www.riskinsight-wavestone.com/en/2022/09/cloud-security-posture-management-towards-an-industrialization-of-the-control-of-its-cloud-environment/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2022/09/cloud-security-posture-management-towards-an-industrialization-of-the-control-of-its-cloud-environment/#respond</comments>
		
		<dc:creator><![CDATA[Etienne Lafore]]></dc:creator>
		<pubDate>Mon, 05 Sep 2022 08:00:00 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[management]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=18691</guid>

					<description><![CDATA[<p>Today, many companies have initiated a migration to the public cloud, and this brings its share of benefits, but also new attack surfaces. In this article, we will look at how companies can best manage their security posture, by verifying...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/09/cloud-security-posture-management-towards-an-industrialization-of-the-control-of-its-cloud-environment/">Cloud security posture management: towards an industrialization of the control of its cloud environment</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">Today, many companies have initiated a migration to the public cloud, and this brings its share of benefits, but also new attack surfaces. In this article, we will look at how companies can best manage their security posture, by verifying the correct configuration of resources.</p>
<p style="text-align: justify;">Due to a lack of internal resources or expertise, it is still common to see configuration errors, such as a publicly deployed Storage Account or S3 bucket, allowing attackers to access and exfiltrate the data, or Network Security Groups that have not been properly configured to restrict flows, allowing attackers to compromise the cloud account through the exploitation of uncontrolled flows.</p>
<p style="text-align: justify;">These misconfigurations create new surfaces of exposure and provide attackers with new ways to compromise IS.</p>
<p style="text-align: justify;">Ensuring secure and controlled use of cloud services is a major challenge, which requires specific skills and appropriate governance.</p>
<p style="text-align: justify;">&nbsp;</p>
<h1>What is cloud security posture management?</h1>
<p>&nbsp;</p>
<p style="text-align: justify;">Cloud security posture management is a set of strategies and tools to reduce the security risks associated with cloud usage. This is achieved by implementing controls on the configuration of resources as well as mechanisms to react in case of detection of a deviation from good practices.</p>
<p style="text-align: justify;">There are 4 main pillars in the management of the cloud security posture:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-18695 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/1E.png" alt="" width="602" height="108" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/1E.png 602w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/1E-437x78.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/1E-71x13.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/1E-600x108.png 600w" sizes="auto, (max-width: 602px) 100vw, 602px" /></p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-18697" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/2E.png" alt="" width="65" height="29" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/2E.png 143w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/2E-71x31.png 71w" sizes="auto, (max-width: 65px) 100vw, 65px" /> One of the first steps in managing the cloud security posture is to understand the entire environment; inventory and classification of resources, compliance indicators, risk visualization dashboards, etc. This overview makes it possible to identify the exposed surface of the environment and to prioritize the work to be done.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-18699" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/3E.png" alt="" width="65" height="38" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/3E.png 138w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/3E-67x39.png 67w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/3E-120x70.png 120w" sizes="auto, (max-width: 65px) 100vw, 65px" /> Effective cloud security posture management relies on several tools that automatically detect resource configurations that do not comply with good security practices. Most of the tools allow companies to assess themselves against standards and norms (CIS, GDPR, HIPAA, &#8230;) and thus identify gaps between the current environment and the target to be reached. In addition to the generic security rules proposed by the tools, companies can also integrate rules specific to their context in order to refine the controls carried out and thus build their own security framework.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-18701" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/4E.png" alt="" width="65" height="29" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/4E.png 114w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/4E-71x31.png 71w" sizes="auto, (max-width: 65px) 100vw, 65px" /> Cloud environments offer advanced industrialization and automation capabilities that enable the rapid deployment of new solutions to reduce time to market, the time it takes to bring an idea to fruition and deliver a finished product to consumers. In this context of rapid evolution, it is necessary to ensure continuous monitoring of the environment in order to be able to react as quickly as possible when a non-compliant resource is deployed: quarantine of the resource, automatic remediation, etc.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-18703" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/5E.png" alt="" width="65" height="24" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/5E.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/5E-71x27.png 71w" sizes="auto, (max-width: 65px) 100vw, 65px" /> One of the challenges of security is to succeed in integrating it as early as possible in the project cycle, in order to limit the impact of misconfiguration of a resource. To give an example, as part of the management of the security posture, it is possible to integrate compliance controls from the development phase with the integration of Terraform or CloudFormation template analysis in the CI/CD chains. Note that this step requires advanced maturity and mastery of the other three pillars mentioned above.</p>
<p style="text-align: justify;">&nbsp;</p>
<h2>Focus on CSPM tools: which type of tool for which use case?</h2>
<p>&nbsp;</p>
<p style="text-align: justify;">CSPM (Cloud Security Posture Management) tools are a range of software that can assist companies in managing their cloud security posture. There are many of them on the market, which we will distinguish into 3 main categories:</p>
<ul style="text-align: justify;">
<li>Tools from market publishers (e.g., Prisma Cloud, Cloud Conformity, Cloud Health, CloudGuard, Zscaler, Aquasec&#8230;)</li>
<li>Native tools from cloud providers (e.g., Microsoft Defender for Cloud &amp; Azure policy, AWS config&#8230;)</li>
<li>Open-source tools (e.g., Cloud Custodian, ScoutSuite&#8230;).</li>
</ul>
<p style="text-align: justify;">Although these tools have a common objective, there are many differences, and it is important to study the impacts in order to determine the most appropriate solution for the local context. Some examples of points of attention when selecting a CSPM tool:</p>
<h3 style="text-align: justify;"><strong>Governance and administration of the tool</strong>:</h3>
<p style="text-align: justify;">What resources are available to facilitate the management of the tool (e.g., available roles and RBAC model, implemented processes, management interface, possible interconnections, etc.)?</p>
<h3 style="text-align: justify;"><strong>Tool coverage</strong>:</h3>
<p style="text-align: justify;">Is the tool single or multi-cloud? What services are supported? What security rules are implemented in the tool?</p>
<h3 style="text-align: justify;"><strong>Tool features</strong>:</h3>
<p style="text-align: justify;">What are the dashboard capabilities? Is it possible to set up alerts? Some CSPM tools specialize in one or more of the security posture management pillars mentioned above or are more mature for one cloud provider than for others. It is important to study the features offered by each tool to ensure that it covers all the desired use cases.</p>
<h3 style="text-align: justify;"><strong>Ease of deployment</strong>:</h3>
<p style="text-align: justify;">How is the tool deployed? How long does it take? Is the tool available in SaaS mode or does it require the implementation of a specific architecture?</p>
<h3 style="text-align: justify;"><strong>Ease of use</strong>:</h3>
<p style="text-align: justify;">How is the user interface? This criterion is particularly important because some tools, although very flexible, require specific skills (e.g., scripting) and may require detailed knowledge of the subject.</p>
<h3 style="text-align: justify;"><strong>Available support</strong>:</h3>
<p style="text-align: justify;">Are security standards updated automatically? How long do new cloud services take to implement after they are released? The cloud is a very evolving environment, new services are regularly made available, implying new security risks. The ability of a CSPM vendor to adapt to its customers&#8217; evolutions by proposing new rules and supported services is therefore a major asset.</p>
<h3 style="text-align: justify;"><strong>Pricing</strong>:</h3>
<p style="text-align: justify;">What is the pricing model? Do we have to pay per resource? How many people are needed to administer the tool? Depending on the tool chosen, prices can vary widely. Particular attention must be paid to the choice of a solution that is well sized in relation to the expectations expressed.&nbsp;</p>
<p style="text-align: justify;">Based on these criteria, it is possible to observe major trends shared by tools in the same category.</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-18705 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/6E.png" alt="" width="933" height="458" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/6E.png 933w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/6E-389x191.png 389w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/6E-71x35.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/6E-768x377.png 768w" sizes="auto, (max-width: 933px) 100vw, 933px" /></p>
<p>&nbsp;</p>
<p style="text-align: justify;">To summarize: CSPM tools from market vendors offer a lot of functionality that is easily deployable but not very customizable.</p>
<p style="text-align: justify;">Native CSPM tools from cloud providers are easily integrated into the existing ecosystem and have cloud provider-specific functionality, which does not always cover all needs.</p>
<p style="text-align: justify;">As for open-source tools, they have the advantage of being very flexible and giving the user a great deal of leeway, but these tools are complex to maintain over time and require specific skills to be deployed and used.</p>
<p style="text-align: justify;">Choosing the most appropriate type of tool therefore requires identifying the challenges specific to one&#8217;s context and studying how each type of solution responds according to its characteristics.</p>
<p style="text-align: justify;">Here are some examples of questions an enterprise might ask when selecting a CSPM tool: Is the enterprise&#8217;s security posture management maturity appropriate for its current use of the cloud? If not, is the delay in tooling or in the definition of security best practices in a Group framework? Does the company have the internal skills to ensure that the management of the security posture evolves at the same speed as the business needs of cloud usage?</p>
<p style="text-align: justify;">Indeed, the choice of a CSPM tool must be part of a more global process of managing the security posture, in other words, by relying on the company&#8217;s local governance and expertise capacities.</p>
<p>&nbsp;</p>
<h1>CSPM industrialization: the key steps</h1>
<p>&nbsp;</p>
<p style="text-align: justify;">Implementing an effective security posture management is a long process with several steps. Any company wishing to gain in maturity on the subject must define an industrialization strategy allowing to progressively reach the target. The following chart is an example of an industrialization strategy:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-18707 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/7E.png" alt="" width="602" height="313" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/7E.png 602w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/7E-367x191.png 367w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/7E-71x37.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/7E-600x313.png 600w" sizes="auto, (max-width: 602px) 100vw, 602px" /></p>
<p>&nbsp;</p>
<p style="text-align: justify;">This consists firstly of the initial compliance of the cloud environments to secure them. This phase can be carried out using cloud native CSPM tools or using a tool from the market. The advantage of these tools is that they provide a framework and generic security rules on which a company with little experience in this area can rely. In order to capitalize on the tool&#8217;s feedback, a governance and action plan must be put in place to:</p>
<ul style="text-align: justify;">
<li>Prioritize the identified projects</li>
<li>Define indicators for monitoring compliance (e.g., percentage of resource compliance by service and/or by criticality)</li>
<li>Support projects in bringing their environment into compliance by providing them with the necessary elements to remediate non-conformities</li>
</ul>
<p style="text-align: justify;">Once the desired minimum level of security has been reached (or in parallel with the initial compliance), one of the next challenges is to ensure that new cloud projects do not create new vulnerabilities. It is therefore necessary to set up a structure to support development teams in their cloud projects. This structure should allow the following:</p>
<ul style="text-align: justify;">
<li>Maintain a group cloud security repository that is adapted to the company&#8217;s context and evolves with the demands of new business use cases</li>
<li>The implementation of security validation processes (automated or not) in order to validate the various project stages (cloud eligibility, transition from development environment to production, etc.)</li>
<li>Security monitoring of cloud services used within the company</li>
</ul>
<p style="text-align: justify;">The first two steps allow to secure the existing and future evolutions.</p>
<p style="text-align: justify;">The next two steps aim to add a layer of additional validations and controls to perpetuate the use of best practices throughout the organization. In order to implement a generalized continuous monitoring, it is preferable to initially focus on a test perimeter; this test phase allows to:</p>
<ul style="text-align: justify;">
<li>Test a new approach in terms of monitoring infrastructure. Technically, this means setting up the CSPM tool(s) needed to ensure both spot audits on a specific perimeter and continuous monitoring of the entire test perimeter. From an organizational point of view, this translates into the implementation of validation processes and specialized teams.</li>
<li>Define organization-wide control points and mechanisms to ensure their durability: management of the life cycle of security rules, definition of remediation actions per rule, etc.</li>
<li>Prepare the scaling of continuous monitoring.</li>
</ul>
<p style="text-align: justify;">Based on the feedback from the previous test phase, the scope of continuous monitoring can then be extended to industrialize the management of cloud security posture within the organization.</p>
<p style="text-align: justify;">The last step corresponds to the last pillar of cloud security posture management, anticipation, and therefore the implementation of advanced features to improve existing practices. Security is integrated upstream of the production launch, i.e., on the left side of this cycle, which is called the &#8220;shift-left&#8221;.</p>
<p style="text-align: justify;">&nbsp;</p>
<h1>Synthesis</h1>
<p>&nbsp;</p>
<p style="text-align: justify;">Managing the cloud security posture within an organization is a major challenge with strong impacts requiring a progressive and incremental implementation.</p>
<p style="text-align: justify;">By relying on the four pillars of security posture management &#8211; Visualize, Control, Monitor, Shift-Left; companies are able to ensure the compliance of their cloud environment while following the needs and changes of the business. This objective requires dedicated governance and tools adapted to the local context, all of which evolve with the company&#8217;s cloud security maturity.</p>
<p style="text-align: justify;">There are many CSPM solutions available and each one has its own benefits and disadvantages. Particular attention should be paid to the study of the solution that is best suited to the needs expressed and to the future developments envisaged.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/09/cloud-security-posture-management-towards-an-industrialization-of-the-control-of-its-cloud-environment/">Cloud security posture management: towards an industrialization of the control of its cloud environment</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2022/09/cloud-security-posture-management-towards-an-industrialization-of-the-control-of-its-cloud-environment/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Cloud Act: does it mean your data is better protected?</title>
		<link>https://www.riskinsight-wavestone.com/en/2018/10/the-cloud-act-does-it-mean-your-data-is-better-protected/</link>
		
		<dc:creator><![CDATA[Etienne Lafore]]></dc:creator>
		<pubDate>Wed, 10 Oct 2018 06:31:27 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Cloud Act]]></category>
		<category><![CDATA[digital trust]]></category>
		<category><![CDATA[e-privacy]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[personal data]]></category>
		<category><![CDATA[protection of personal data]]></category>
		<category><![CDATA[règlementation]]></category>
		<category><![CDATA[regulation]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=11303/</guid>

					<description><![CDATA[<p>After several attempts to enact laws that facilitate the appropriation of data from customers of US-based services that is being stored outside the United States, the US Congress passed the “Clarifying Lawful Overseas Use of Data (CLOUD) Act” in March...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/10/the-cloud-act-does-it-mean-your-data-is-better-protected/">The Cloud Act: does it mean your data is better protected?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>After several attempts to enact laws that facilitate the appropriation of data from customers of US-based services that is being stored outside the United States, the US Congress passed the <strong>“Clarifying Lawful Overseas Use of Data (CLOUD) Act”</strong> in March 2018, which provides a legal framework for accessing data from US suppliers held outside their home jurisdiction.</em></p>
<p>The bill, originally created to amend a 1986 bill, The Stored Communication Act, allows the United States to force US-based service providers to transfer their customers’ data hosted overseas much more rapidly. It currently takes an average of ten months to obtain the data, rendering investigations conducted from within the US highly unproductive. The bill aims to allow US authorities (from sheriffs to the CIA) to access the <strong>data hosted by US companies, without the authorization of a judge</strong>. <strong>Large technology companies</strong>, who have supported the bill in the Senate, <strong>will be able to oppose a request if</strong>:</p>
<ul>
<li>The customer or subscriber is not a U.S. citizen or resident <em>(</em><a href="https://www.congress.gov/bill/115th-congress/senate-bill/2383/text">section 3.2.b.h.2.i</a><em>), </em><strong><u>and</u></strong></li>
<li>The transfer would require the provider to contravene the regulations of the country hosting the data (<a href="https://www.congress.gov/bill/115th-congress/senate-bill/2383/text">section 3.2.b.h.2.ii</a>)</li>
</ul>
<p>Such a request would then be brought before a US court which would be able to quash (or uphold) the request for the data transfer. Its decision will be based, among other things, on the validity of the information provided, the US’s interest in the request, the scope of the violation, and the chances of it being deemed to contravene the law in the foreign country. The public nature of the appeal is not specified, especially regarding the capacity of companies to communicate about contested requests. Today, it seems likely that the major US players are using such appeals to maintain the trust of their customers.</p>
<p>In order to avoid contravening the regulations of the countries concerned, <strong>the US can enter into bilateral agreements with them</strong>, which, in return for their goodwill, will be able to access data from the United States.</p>
<p>In the US, the CLOUD Act remains contested due to the risks introduced by the potential agreements with foreign countries. The fact that an executive power can put in place mutual agreements worries the American people, who fear that foreign powers are using the CLOUD Act to access their data without any safeguards.</p>
<h2>What are the consequences for customers in Europe?</h2>
<p>While tech giants (like Facebook, Google, Microsoft, and Apple) have supported the bill (with the US authorities refraining from approaching them for back-door access and providing a clear framework for data transfer), <strong>these </strong><strong>regulations raise concerns about customer privacy</strong> for the targeted businesses. The act could leave customers without a right to consult, or any information about access to their data by US authorities.</p>
<p>However, European customers whose data is processed in Europe are now protected by the General Data Protection Regulation (GDPR). Articles 45 and 48 of the regulation, which is now in force, lay down a clear set of rules for allowing data to be transferred to third-party countries. According to Frank Jennings (a renowned lawyer on cloud matters), the European Data Protection Board, which oversees the implementation of the GDPR, <a href="https://www.theregister.co.uk/2018/04/03/us_government_serves_microsoft_with_fresh_warrant_for_irishheld_emails/">will be responsible for deciding</a> whether data appropriation under the CLOUD Act constitutes a necessary measure for the safeguarding of US national security, or whether a request does not comply with the new regulation. <strong>This could force the United States to negotiate with the EU or its Member States on the conditions for such data transmission, thus protecting their citizens against illegitimate transfers</strong>. US customers, however, would remain within the scope of the CLOUD Act.</p>
<p>Negotiations are due to begin between the European Commission and the US. EU leaders have already criticized the US bill as being hastily adopted, something that may complicate negotiations. In the meantime, <a href="https://www.eff.org/deeplinks/2018/03/nearly-100-public-interest-organizations-urge-council-europe-ensure-high">some 100 civil society organizations</a> have urged transparency from the European Council about the negotiations of the CLOUD Act as set out by the &#8220;Convention on Cybercrime&#8221; (or &#8220;Budapest Convention&#8221;).</p>
<h2>Privacy laws: an asset for companies?</h2>
<p>While the GDPR has preoccupied a good number of companies with respect to the changes it involves for their information systems, and that <a href="https://www.riskinsight-wavestone.com/en/2018/03/e-privacy-urgent-attendre/">the ePrivacy Directive is in preparation</a>, it is instructive to consider the connections between regulatory developments and the world of business. Data privacy laws could, whether in the near or distant future, <strong>be considered as an aid to protecting </strong><strong>business’ data and to</strong> <a href="https://www.riskinsight-wavestone.com/en/2017/01/vie-privee-ere-numerique/"><strong>maintaining customers’ trust</strong></a><strong>.</strong></p>
<p>In a world where data-privacy issues are becoming increasingly important (think of <a href="http://www.lemonde.fr/pixels/article/2018/03/22/ce-qu-il-faut-savoir-sur-cambridge-analytica-la-societe-au-c-ur-du-scandale-facebook_5274804_4408996.html">Cambridge Analytica</a> <a href="https://www.cnet.com/news/google-dumps-home-minis-top-touch-function-over-privacy/">and Google Home Mini</a> ), protection of customer data can be a decisive factor when choosing between competing offers. The position US providers will take on privacy and data protection issues is therefore eagerly awaited.</p>
<h2>What can you do today?</h2>
<p>To conclude, the new regulations on privacy remain somewhat ambiguous and may even clash in certain areas. The main conclusion remains that, <strong>as a result of the GDPR, Europeans should be better protected against the CLOUD Act</strong>, provided US suppliers reject inappropriate requests, and the courts with responsibility for arbitrating them play their roles correctly. Meanwhile, non-European customers will not gain greater protection by choosing to host their data in Europe.</p>
<p>While awaiting the implementation of new laws dealing with confidentiality and possible data appropriation, there are steps you can take to protect your personal and business data against it being inappropriately accessed while overseas, and other potential threats:</p>
<ol>
<li>Clarify with your provider <strong>under what conditions it may be required to give access to your data,</strong> without forgetting to consider any mutual legal assistance treaties.</li>
<li><strong>Define or review your hosting strategy</strong> according to the type of data held, your provider’s nationality, and the hosting site’s location.</li>
<li><strong>Favor data hosting in European data centers</strong>, or in countries with well-established data privacy frameworks.</li>
<li><strong>Choosing a French or European supplier enables you to avoid the risks associated with the CLOUD Act</strong>. You must, however, stipulate contractually that it does not use US subcontractors (either directly or indirectly)!</li>
</ol>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/10/the-cloud-act-does-it-mean-your-data-is-better-protected/">The Cloud Act: does it mean your data is better protected?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Cloud: The end of IT backup &#8211; or a new way of doing it?</title>
		<link>https://www.riskinsight-wavestone.com/en/2017/12/cloud-end-backup-new-way/</link>
		
		<dc:creator><![CDATA[Etienne Lafore]]></dc:creator>
		<pubDate>Thu, 14 Dec 2017 16:33:30 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[Azure]]></category>
		<category><![CDATA[BCP]]></category>
		<category><![CDATA[Cloud based backup]]></category>
		<category><![CDATA[DRaaS]]></category>
		<category><![CDATA[IaaS]]></category>
		<category><![CDATA[PaaS]]></category>
		<category><![CDATA[SaaS]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=10258/</guid>

					<description><![CDATA[<p>Businesses are increasingly using cloud services (SaaS, PaaS, and IaaS) in their IT environments. They provide more flexibility on costs and can be more attractive than using conventional IT infrastructure. In 2016, in France, 48% of companies employing more than 250...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/12/cloud-end-backup-new-way/">The Cloud: The end of IT backup &#8211; or a new way of doing it?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Businesses are increasingly using cloud services (SaaS, PaaS, and IaaS) in their IT environments. They provide more flexibility on costs and can be more attractive than using conventional IT infrastructure. </em><a href="https://www.insee.fr/fr/statistiques/2672067"><em>In 2016, in France, 48% of companies employing more than 250 people used it—an increase of 12 percentage points, compared with 2014.</em></a><em> The greater availability of cloud infrastructure is often identified as an opportunity. However, the risk of failure of a service provider’s data center is rarely addressed, even though its services rely on data centers that are decidedly physical and not in the cloud. Such data centers face the same threats as traditional data centers: natural disasters, human error, etc. How, therefore, can backup be provided for these cloud infrastructures?</em></p>
<p>&nbsp;</p>
<h2><strong>SAAS COMPUTER BACKUP: THE SERVICE PROVIDER’S RESPONSIBILITY TO PUT IN PLACE</strong></h2>
<p>SaaS <em>(</em>Software as a Service) is software that is made available on, and consumed directly from, the internet. It is managed by one or more providers.  The customer does not have the wherewithal to carry out the backup activities is case of disaster (no access to raw data, source codes, applications that could duplicate the infrastructure, etc.), so it has to rely on the provider’s goodwill.</p>
<p>&nbsp;</p>
<h3>Levels of disaster recovery are variable for SaaS, depending on the provider’s degree of maturity</h3>
<p>Three major trends are emerging:</p>
<ul>
<li><strong>Providers who offer an inclusive disaster recovery plan.</strong> As part of their standard offering, the provider offers recovery at a remote data center, usually augmented with outsourced backup. However, they rarely offer commitments on recovery times.<br />
<em>Examples are the big SaaS players (such as: Office 365, SalesForce, and SAP), as well as some intermediate players (such as Evernote, and Xero);</em></li>
</ul>
<ul>
<li><strong>Suppliers who offer outsourced backup only.</strong> In their case, there is no clearly established disaster recovery plan, as such. The customer then has to question the ability of the provider to restore backup files in the event of a disaster at the main site.<br />
<em>Examples are intermediate suppliers (such as Zervant and Sellsy);</em></li>
</ul>
<ul>
<li><strong>Suppliers who don’t mention the issue or do not have anything in place.</strong> The subject of backup doesn’t even get raised, so it’s better to assume that nothing is being done.<br />
<em>Small players are usually in this situation.</em></li>
</ul>
<p>&nbsp;</p>
<h3>Getting contracts right is key</h3>
<p>In the vast majority of cases, SaaS providers have no provisions in their contracts on how they will manage disaster recovery, even though they might stress their ability to handle that risk. In fact, contracts usually include default Act of God clauses stipulating that the supplier is not liable for a breach of contractual obligations if this is caused by an event beyond their reasonable control. The legal risks must therefore be addressed when framing the agreement, and these types of clauses should be removed to ensure an appropriate level of cover.</p>
<p>Just as they do when framing conventional contracts, customers must ensure that clear service level agreements are in place, in particular for disaster recovery. These need to cover:</p>
<ul>
<li><strong>Recovery times</strong> (Recovery Time Objective &#8211; RTO) and<strong> data loss</strong> (Recovery Point &#8211; RPO) in the event of a disaster;</li>
</ul>
<ul>
<li>The <strong>provider’s disaster recovery plan, including crisis management procedures</strong>, as well as the obligation to carry out <strong>conclusive </strong><strong>tests</strong> every year with real-world scenarios, as part of the plan, with the customer having the option to review the test report;</li>
</ul>
<ul>
<li><strong>Financial penalties</strong> and the right to terminate the contract (in particular, with a provision to recover usable data) if commitments are breached.</li>
</ul>
<p>&nbsp;</p>
<h2>IAAS/PAAS disaster recovery: THE CUSTOMER’S RESPONSIBILITY TO PUT IN PLACE</h2>
<p>Infrastructure as a Service (IaaS) is a standardized, automated offering of computing, storage, and network resources owned and hosted by a provider, and made available to the customer on demand. A Platform as a Service (PaaS) offering is similar to an IaaS offer, but it is different in that it only applies to software development stack (database, EDI, business process management…) according to Gartner’s definition.<a name="_ftnref1"></a> Unlike SaaS, disaster recovery remains the customer’s responsibility in both cases: IaaS/PaaS providers make services available in various data centers, and the customer is responsible for their use and configuration. Two solutions are available to customers using these services: to entrust things to a provider, or manage it themselves.</p>
<p>&nbsp;</p>
<h3>The market for cloud disaster recovery is not a mature one</h3>
<p>Cloud disaster recovery providers are referred to by the acronym DRaaS: <em>Disaster Recovery as a Service</em>. Initially, DRaaS providers offered cloud-based IS disaster recovery of an “on premise” datacenter. But, today, they also offer to provide recovery for infrastructure already in the cloud, such as AWS or Azure. Levels of maturity remain very variable, depending on the provider and which cloud is used. Some DRaaS providers require that their own cloud is used for recovery, which means they cannot offer a PaaS recovery service.</p>
<p>As with SaaS, there are <strong>no</strong> <strong>default contractual provisions.</strong> Therefore, any guarantees required for data loss or recovery time will need to be negotiated. Suppliers generally promise to be able to tailor their offer to the customer’s requirements! To ensure that the recovery performs correctly, the customer must plan for <strong>disaster recovery tests </strong>to be carried out regularly (we recommend once a year).</p>
<p>&nbsp;</p>
<h3>Operating your own disaster recovery plan, using tools offered by the supplier</h3>
<p>For &#8220;on-premise” infrastructure, you will need to think about, and define, your DRP strategy right from the design phase. This strategy must include the option of performing tests to ensure a sufficient level of confidence in your plan.</p>
<p>Implementation can be simplified by the tools offered by cloud providers, and the high levels of standardization in cloud environments. The major players have set out, in white papers, the key guidelines to follow in pursuing such a project (for example, <a href="https://d0.awsstatic.com/International/fr_FR/whitepapers/aws-disaster-recovery.pdf.pdf">AWS</a> and <a href="https://docs.microsoft.com/en-us/azure/architecture/resiliency/disaster-recovery-azure-applications">Azure</a>).</p>
<p><strong>Conceptually, these DRP strategies remain close to those used in “on-premise” data centers.</strong></p>
<p>There are four main ones:</p>
<ul>
<li><strong>backup and restore</strong>: simple backups of data and images of machines on a remote site, which are restored if an incident occurs;</li>
<li><strong>pilot light</strong>: replication of databases and the provision of machines, in the form of images, ready to be used if an incident occurs;</li>
<li><strong>warm standby</strong>: full replication of the main site (data and machines); the recovery site is undersized in performance terms but ready to scale up if an incident occurs;</li>
<li><strong>multi-site (or active-active)</strong>: the two sites are identical and share the load from users. If an incident occurs, the remaining site can scale up to cover all users.</li>
</ul>
<p>Hybrid solutions that are better designed to take account of recovery time requirements, and cost and complexity considerations, can also be considered.</p>
<p><strong>The real contribution that the cloud can make to DRP is the numerous tools that it can offer to simplify its implementation and activation.</strong></p>
<p>As a result, data replication can be simplified for asynchronous geo-replication options (where multiple copies are replicated to other regions). The RPO varies, depending on the types of data and tools involved. Aside from this option, local data redundancy is almost always included.</p>
<p>The high degree of standardization also makes it possible to automate the recovery: the scripts or APIs made available by providers make it possible to automate deployment of infrastructures, resize instances (according to previously defined configuration), distribute loads and traffic, carry out IP addressing, etc., in order to considerably speed up a backup site’s activation time.</p>
<p>The monitoring and alert tools, which are also on offer, are intended to facilitate in-service support and can be used to detect an incident in the shortest possible time, or in some cases, partially automate the activation of a backup site.</p>
<p>Lastly, this ability to provision new resources within a few minutes enables the associated OPEX to be minimized. <strong>By using such a strategy, it’s possible to make gains of 40 to 70% on the cost of DRP infrastructure.</strong></p>
<p>&nbsp;</p>
<h3>Toward greater support by providers?</h3>
<p>During 2017, Azure is planning to offer an <a href="https://docs.microsoft.com/fr-fr/azure/site-recovery/site-recovery-azure-to-azure">option</a> to provide recovery for virtual machines hosted on its platform by enhancing its &#8220;Site Recovery&#8221; service. In fact, &#8220;Site Recovery&#8221;, in its current form, offers to support traditional site backup, by using the Azure cloud to host the secondary site, but Microsoft wants to extend this service to provide a Recovery as a Service option. This tool would allow the automatic deployment of the secondary site (of the active-passive type), automatic data replication, and easier testing.</p>
<p>This option was available as a &#8220;public preview&#8221; at the end of May 2017. There is no equivalent project in train from the other main IaaS/PaaS providers.</p>
<p>&nbsp;</p>
<h2>THE CLOUD AND PROVIDER SYSTEMIC RISK</h2>
<p>Backup of cloud-based services is dealt with differently, depending on the type of service used. SaaS recovery must be managed through contracts and are the responsibility of the provider, while IaaS/PaaS recovery, simplified by the tools available, remains the responsibility of the customer.</p>
<p>There is a risk of the widespread failure of a provider’s hosting region as recent incidents have shown. Even though these incidents have been short-lived, or have had minor impacts, the possibility of widespread failure cannot be ignored. The issue of cyber-resilience, then, must still be dealt with. Using a second cloud provider can cover the risk of destruction, or a major outage of a first provider’s infrastructure. This solution is very complex because portability between providers is a difficult issue. For now, there are few companies that have risked it, although  <a href="http://www.usine-digitale.fr/article/snap-se-repose-sur-le-cloud-d-amazon-pour-la-redondance-de-son-systeme-d-information.N499899">Snapchat</a> is an example: it uses Google’s cloud for its production, and plans to use Amazon’s for its DRP within five years.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/12/cloud-end-backup-new-way/">The Cloud: The end of IT backup &#8211; or a new way of doing it?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Le Cloud, la fin ou renouveau du secours informatique ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2017/08/le-cloud-la-fin-ou-renouveau-du-secours-informatique/</link>
		
		<dc:creator><![CDATA[Etienne Lafore]]></dc:creator>
		<pubDate>Thu, 17 Aug 2017 17:36:50 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[Azure]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Cloud security]]></category>
		<category><![CDATA[IaaS]]></category>
		<category><![CDATA[PaaS]]></category>
		<category><![CDATA[PCA]]></category>
		<category><![CDATA[PCI]]></category>
		<category><![CDATA[PRA]]></category>
		<category><![CDATA[PSI]]></category>
		<category><![CDATA[SaaS]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=9954/</guid>

					<description><![CDATA[<p>Les entreprises ont de plus en plus recours aux services cloud (SaaS, PaaS, IaaS) pour leur environnement informatique. Ils apportent plus de flexibilité avec des coûts pouvant être plus avantageux qu’une infrastructure classique. En 2016, en France, 48% des entreprises...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/08/le-cloud-la-fin-ou-renouveau-du-secours-informatique/">Le Cloud, la fin ou renouveau du secours informatique ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Les entreprises ont de plus en plus recours aux services cloud (SaaS, PaaS, IaaS) pour leur environnement informatique. Ils apportent plus de flexibilité avec des coûts pouvant être plus avantageux qu’une infrastructure classique. <a href="https://www.insee.fr/fr/statistiques/2672067">En 2016, en France, 48% des entreprises de plus 250 personnes y avaient recours soit une augmentation de 12 points par rapport à 2014.</a> La plus grande disponibilité des infrastructures Cloud est souvent identifiée comme une opportunité. Néanmoins, le risque de défaillance d’un datacenter du fournisseur n’est que rarement traité, alors que ses services reposent sur des datacenters bien physiques et non pas sur des nuages. Ces datacenters font face aux mêmes menaces que les « datacenters traditionnels » : catastrophes naturelles, erreurs humaines… Il est donc nécessaire de se demander comment assurer le secours informatique de ces infrastructures Cloud.</em></p>
<h2>Le secours informatique SaaS, une responsabilité du fournisseur à formaliser</h2>
<p>Un service SaaS (<em>Software as a Service</em>) est un logiciel mis à disposition et directement consommable depuis Internet. Il est géré et administré par un ou plusieurs fournisseurs.  Le client n’a donc pas la latitude nécessaire pour opérer le secours (pas d’accès aux données brutes, pas d’accès aux codes sources, ni aux applicatifs pour dupliquer l’infrastructure…), il doit donc s’en remettre au bon vouloir de son fournisseur.</p>
<h3>Un niveau de couverture du secours informatique pour SaaS variable suivant la maturité du fournisseur</h3>
<p>Trois grandes tendances se dessinent :</p>
<ul>
<li><strong>Les fournisseurs qui disposent d’un plan de secours informatique inclus<br />
</strong>Dans le cadre de l’offre standard, le fournisseur assure un secours sur un datacenter distant, complété généralement par des sauvegardes externalisées. Il ne s’engage néanmoins que rarement sur les délais de reprise.<br />
<em><em>Ex : les grands acteurs du SaaS (ex : Office 365, SalesForce, SAP…) , ainsi que certains acteurs de taille intermédiaire (ex : Evernote, Xero…) ;</em></em></li>
</ul>
<ul>
<li><strong>Les fournisseurs qui disposent simplement d’une sauvegarde externalisée<br />
</strong>En tant que tel, aucun plan de secours informatique n’est clairement établi. Le client doit alors s’interroger sur la capacité du fournisseur à restaurer les sauvegardes en cas de sinistre global sur le site principal.<br />
<em>Ex : Des fournisseurs de taille intermédiaire (ex : Zervant, Sellsy…) ;</em></li>
</ul>
<ul>
<li><strong>Les fournisseurs qui ne communiquent pas ou n’en disposent pas<br />
</strong>Le sujet du secours informatique n’est pas abordé, il est donc préférable de considérer que rien n’est fait.<br />
<em>Ex : Les acteurs de petite taille sont généralement dans ce cas.</em></li>
</ul>
<h3>L&#8217;importance de l&#8217;aspect contractuel<strong><br />
</strong></h3>
<p>Dans la très grande majorité des cas, les fournisseurs SaaS ne s’engagent pas dans leur contrat sur leur façon de gérer le secours ; même lorsque ceux-ci mettent en avant leur capacité à traiter cette problématique. En effet, les contrats comportent généralement par défaut des clauses de Force Majeure stipulant que le fournisseur n’est pas responsable de manquement aux obligations du contrat dans la mesure où ce manquement est causé par un évènement en dehors de leur contrôle raisonnable. Le risque juridique doit donc être traité lors de la souscription et ces clauses supprimées pour s’assurer un bon niveau de couverture.</p>
<p>Lors de la souscription, comme pour des contrats classiques, les clients doivent s’assurer que figure bien des engagements de service, en particulier pour les secours informatiques :</p>
<ul>
<li>Le <strong>délai de reprise</strong> (Durée Maximale d’Interruption Acceptable ou DMIA) et les <strong>pertes de données</strong> (Perte de Données Maximale Acceptable ou PDMA) en cas de sinistre;</li>
<li>Le <strong>plan de secours informatique du fournisseur incluant les modalités de gestion de crise</strong> ainsi que l’obligation de conduire plusieurs <strong>tests</strong> <strong>probants</strong> par an de ce plan avec la possibilité pour le client d’accès au rapport des tests ;</li>
<li>Les <strong>pénalités financières</strong> et le droit de résilier le contrat (avec en particulier la récupération des données exploitables) en cas de manquement aux engagements.</li>
</ul>
<h2>Le secours informatique du IaaS/PaaS, une mise en oeuvre et une responsabilité du client</h2>
<p>Le IaaS (<em>Infrastructure as a Service</em>) est une offre standardisée et automatisée de ressources de calcul, de moyens de stockage et de ressources réseau détenus et hébergés par un fournisseur et mis à disposition au client à la demande. L’offre PaaS (<em>Platform as a Service</em>) est similaire à celle du IaaS, à la différence près qu’elle ne concerne que les infrastructures applicative (définitions Gartner)<a href="#_ftn1" name="_ftnref1"></a> Contrairement au cas du SaaS, le secours reste sous la responsabilité du client dans les deux cas : les fournisseurs IaaS/PaaS mettent à disposition des ressources dans différents datacenters et le client est responsable de l’usage et de la configuration qu’il en fait. Deux solutions s’offrent aux clients utilisant ces services : confier à un prestataire son secours ou bien le gérer lui-même.</p>
<h3>Avoir recours à un prestataire de secours, un marché peu mature<strong><br />
</strong></h3>
<p>Les prestataires de secours dans le Cloud sont désignés par l’acronyme « DRaaS » pour <em>Disaster Recovery as a Service</em>. Initialement, les fournisseurs DRaaS proposaient d’assurer dans le Cloud le secours de votre SI « on-premise ». Mais ils proposent également aujourd’hui d’assurer le secours de vos infrastructures déjà dans le Cloud, AWS ou Azure par exemple. La maturité reste très variable selon les fournisseurs et le cloud utilisé. Certains fournisseurs DRaaS imposent que le Cloud de destination du secours soit le leur, ne permettant pas ainsi de couvrir le secours de service PaaS.</p>
<p>Comme avec le SaaS, <strong>pas de garanties incluses</strong> <strong>par défaut</strong> quant aux pertes de données ou au délai de reprise, il faut les négocier. Les fournisseurs promettent de pouvoir s’adapter aux exigences du client ! Pour s’assurer que le secours fonctionne, le client doit prévoir la réalisation régulière de <strong>tests probants du secours </strong>(recommandation d’une fois par an).</p>
<h3>Réaliser soi-même son secours en utilisant les outils proposés par le fournisseur<strong><br />
</strong></h3>
<p>Comme sur une infrastructure « on-premise », il est nécessaire de réfléchir et définir sa stratégie de secours dès la conception. Cette stratégie doit intégrer la capacité de réaliser des tests probants permettant d’assurer un niveau de confiance suffisant dans son plan.</p>
<p>La mise en place est simplifiée par les outils mis à disposition par les fournisseurs Cloud et la forte standardisation des environnements Cloud. Les grands acteurs publient dans des livres blancs les grandes lignes directrices pour mettre en place un tel projet (par exemple <a href="https://d0.awsstatic.com/International/fr_FR/whitepapers/aws-disaster-recovery.pdf.pdf">AWS</a> ou <a href="https://docs.microsoft.com/en-us/azure/architecture/resiliency/disaster-recovery-azure-applications">Azure</a>).</p>
<p><strong>Les concepts des stratégies du secours informatique restent proches de celles pour les datacenters on-premise.</strong></p>
<p>On peut en dénombrer quatre principales :</p>
<ul>
<li><strong>la sauvegarde et restauration</strong>: simple sauvegarde des données et images des machines sur un site distant, restaurées en cas de sinistre ;</li>
<li><strong>la veilleuse</strong>: réplication des bases de données et mise à disposition des machines sous forme d’images prêtes à être démarrées en cas de sinistre ;</li>
<li><strong>le secours à chaud</strong>: réplication complète du site primaire (données et machines), le site de secours est sous-dimensionné en termes de performances et est prêt à monter en charge en cas sinistre ;</li>
<li><strong>le multi site (ou actif-actif)</strong>: les deux sites sont identiques et se partagent la charge des utilisateurs. En cas de sinistre, le site restant peut monter en charge pour accueillir la totalité des utilisateurs.</li>
</ul>
<p>Des solutions hybrides pouvant mieux s’adapter aux exigences de délai de reprise, coût et complexité de la solution peuvent être envisagées.</p>
<p><strong>Le véritable apport du Cloud pour le secours concerne les nombreux outils mis à disposition simplifiant la mise en œuvre et le déclenchement. </strong></p>
<p>La réplication des données est ainsi simplifiée pour les options de géo-réplication asynchrones (plusieurs copies répliquées dans d’autres régions). La PDMA est variable en fonction des types de données et des outils proposés. Au-delà de cette option, une redondance locale des données est presque systématiquement incluse.</p>
<p>La forte standardisation permet également d’automatiser la reprise : les scripts ou API mis à disposition par les fournisseurs permettent d’automatiser le déploiement des infrastructures, le redimensionnement des instances en fonction de métriques précédemment définies, la répartition des charges et du trafic ou, l’adressage IP etc… afin d’accélérer de façon significative l’activation d’un site de secours.</p>
<p>Les outils de surveillance et alerte qui sont également proposés visent à faciliter le Maintien en Conditions Opérationnelles (MCO) du secours et peuvent être utilisés pour détecter au plus tôt un incident voire, dans certains cas, automatiser partiellement le déclenchement du secours.</p>
<p>Enfin la capacité à provisionner des nouvelles ressources en quelques minutes permet de limiter l’OPEX. <strong>A stratégie équivalente, il est ainsi possible d’avoir des gains de 40 à 70% sur le coût du secours !</strong></p>
<h3>Vers une plus grande prise en charge par le fournisseur ?<strong><br />
</strong></h3>
<p>Azure prévoit une <a href="https://docs.microsoft.com/fr-fr/azure/site-recovery/site-recovery-azure-to-azure">option</a>, courant 2017, pour assurer le secours des machines virtuelles hébergées au sein de leur plateforme via la complétion de leur service « Site Recovery ». En effet, « Site Recovery » propose à l’heure actuelle de prendre en charge le secours de site traditionnel en utilisant le cloud Azure pour accueillir le site secondaire, mais Microsoft souhaite étendre ce service au secours de leurs propres infrastructures. Cet outil permettrait un déploiement automatique du site secondaire (de type actif-passif), une réplication automatique des données et une mise en place de tests facilitée.</p>
<p>Cette option est passée en « public preview » fin mai 2017. Un projet équivalent n’est pas d’actualité chez les autres principaux fournisseurs IaaS/PaaS.</p>
<h2>Le cloud face au risque systémique des fournisseurs</h2>
<p>Le secours informatique des services hébergés dans le cloud s’aborde différemment selon le type de service utilisé. Le secours du SaaS doit être géré contractuellement et est sous la responsabilité du fournisseur tandis que le secours du IaaS/PaaS, simplifié par les outils, reste sous la responsabilité du client.</p>
<p>Le risque de défaillance généralisé d’une région d’hébergement d’un fournisseur existe comme le montre les derniers incidents. Même si aujourd’hui, les incidents ont été de courte durée ou avec des impacts fiables, une défaillance généralisée ne peut pas être ignorée. Reste donc à traiter la problématique de cyber-résilience. L’utilisation d’un 2<sup>ème</sup> fournisseur cloud permet de couvrir le risque de destruction ou d’indisponibilité majeure des infrastructures du premier. Cette solution reste très complexe car la portabilité d’un fournisseur à un autre est délicate. Pour l’instant, peu d’entreprises s’y sont risquées, même si l’on peut citer l’exemple de <a href="http://www.usine-digitale.fr/article/snap-se-repose-sur-le-cloud-d-amazon-pour-la-redondance-de-son-systeme-d-information.N499899">Snapchat</a> qui utilise le cloud Google pour sa production et prévoit d’utiliser celui d’Amazon pour son secours d’ici à 5 ans.</p>
<p>&nbsp;</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/08/le-cloud-la-fin-ou-renouveau-du-secours-informatique/">Le Cloud, la fin ou renouveau du secours informatique ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
