<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Pierre LALIN, Auteur</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/author/pierre-lalin/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/author/pierre-lalin/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Fri, 04 Jul 2025 08:27:16 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Pierre LALIN, Auteur</title>
	<link>https://www.riskinsight-wavestone.com/author/pierre-lalin/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Resilience Entra ID</title>
		<link>https://www.riskinsight-wavestone.com/en/2025/07/resilience-entra-id/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/07/resilience-entra-id/#respond</comments>
		
		<dc:creator><![CDATA[Pierre LALIN]]></dc:creator>
		<pubDate>Thu, 03 Jul 2025 08:42:03 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[Active directory]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[cyber resilience]]></category>
		<category><![CDATA[Entra ID]]></category>
		<category><![CDATA[risk management strategy & governance]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=26544</guid>

					<description><![CDATA[<p>Entra ID (formally known as Azure AD) is an Identity and Access Management solution. Through a Cloud-based directory, administrators provision and manage the lifecycle of various identities from Users, Applications to Devices. Unlike Microsoft Active Directory, Entra ID extends its...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/07/resilience-entra-id/">Resilience Entra ID</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">Entra ID (formally known as Azure AD) is an Identity and Access Management solution. Through a Cloud-based directory, administrators provision and manage the lifecycle of various identities from Users, Applications to Devices. Unlike Microsoft Active Directory, Entra ID extends its authentication and authorization capabilities beyond the company&#8217;s network to cover SaaS applications, on-premises and Cloud workloads using either company-owned devices or BYOD. These new features and connections are achieved thanks to web-based protocols like SAML and simplified identity structure (AD forest vs Entra ID tenant).</p>
<p style="text-align: justify;">In this article, we will expose the cyber-resilience challenge of Entra ID, explain why native features are incomplete and present the result of a PoC conducted on an open-source tool, Microsoft 365 DSC, to backup and recover Entra ID’s data.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">The challenge of cyber-resilience in managed Cloud services</h2>
<p> </p>
<p style="text-align: justify;">With Entra ID, the directory management strategy is in line with the Cloud paradigm. It means that the various network, storage, computer, OS and application layers are handled by Microsoft, leaving the customer to focus solely on his identity data.</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter wp-image-26527 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/Diapositive1.jpg" alt="" width="1280" height="720" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/Diapositive1.jpg 1280w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/Diapositive1-340x191.jpg 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/Diapositive1-69x39.jpg 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/Diapositive1-768x432.jpg 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/Diapositive1-800x450.jpg 800w" sizes="(max-width: 1280px) 100vw, 1280px" /></p>
<p style="text-align: justify;">This fundamental difference has an impact on the resiliency of the service. Indeed, the creation of snapshots to back up the integrality of the system, which is a common practice on AD, is not native on a managed service such as Entra ID. Thus, in order to face a disaster recovery scenario linked to malicious activities, we can only rely on native Microsoft functionalities: the identity lifecycle model, RBAC administration model and import/export capabilities.</p>
<p> </p>
<h2 style="text-align: justify;">The incomplete soft delete model</h2>
<p> </p>
<p style="text-align: justify;">To ensure resilience, Cloud services are widely using a soft delete mechanism. Its main purpose is to recover data in the event of an accidental deletion. For example, in Azure Recovery Service Vault, the soft delete is the last safeguard in the event of intentional or unintentional deletion of the vault. Combined with immutability parameters, the vault cannot be erased regardless of admin permissions.</p>
<p style="text-align: justify;">In Entra ID, the concept of soft delete exists but is insufficient to ensure data resilience for two reasons. On the one hand, there is neither role distinction between soft-delete and hard-delete nor Recovery role, i.e. the permissions required to delete an object are sufficient to allow for permanent deletion. On the other hand, the life cycle of objects in Entra ID (create, manage, delete) is governed by the same role:</p>
<ul>
<li>The role User Administrator can both create and hard-delete a user</li>
<li>The role Cloud Application Administrator can register an application, configure all aspects of the application and hard-delete the application</li>
<li>The role Cloud Device Administrator can add a device, configure all aspects of the device and unregister a device</li>
</ul>
<h2> </h2>
<h2 style="text-align: justify;">The impact of a deletion on Entra ID</h2>
<p> </p>
<p style="text-align: justify;">This design makes the User Administrator, Privileged Authentication Administrator, Cloud Application Administrator, Application Administrator, Cloud Device Administrator, Intune Administrator and Windows 365 Administrator roles all the more critical, as their compromise can lead to the permanent loss of identity data. The impact of such a deletion can be a loss of access to applications and data, a loss of permissions, and an inability to administrate.</p>
<p style="text-align: justify;">Although the deletion of hybrid users synchronized with an on-premise AD is reversible, information such as role assignment will be lost, threatening the rights and access model. This is not the case for Cloud identities, which are generally part of the Control Plane. As part of the Enterprise Access Model, the Control Plane includes the most sensitive access, leading to a global compromise of an Information System.</p>
<p style="text-align: justify;">In a disaster recovery scenario, some assets are more critical than others and should be backed up as a priority. These include:</p>
<ul>
<li>Control Plane users, groups and roles assigned</li>
<li>Enterprise Applications (service principals) with critical permissions over Azure or Microsoft 365</li>
<li>Administrative workstations</li>
</ul>
<h2> </h2>
<h2 style="text-align: justify;">Comparison of backup open-source methods</h2>
<p> </p>
<p style="text-align: justify;">To reduce the likelihood of Entra ID malicious data loss risk, the implementation of a backup solution seems essential, at least for the Control Plane in order to maintain control over your Information System and rebuild. We have therefore analyzed 3 open-source methods for ensuring data backup:</p>
<ul style="text-align: justify;">
<li><strong>Microsoft Graph PowerShell</strong>: this is the PowerShell library for Microsoft Graph APIs. You can build your own script(s) to export and import Entra ID objects attributes that fit with organization needs</li>
<li><strong>Microsoft Entra Exporter</strong>: this is a PowerShell module that export a local copy of some Entra ID attributes (Users, Applications, Service Principals, Roles, etc.) into JSON file</li>
<li><strong>Microsoft 365 Desired State Configuration (DSC)</strong>: this is a PowerShell module for declarative configuration, deployment and management of Microsoft 365 services</li>
</ul>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Backing up Entra ID objects with Microsoft 365 DSC</h2>
<p> </p>
<p style="text-align: justify;">In this part, we will explain how we tested the open-source solution Microsoft 365 DSC and share the results and conclusions we got.</p>
<p style="text-align: justify;">Our PoC</p>
<p style="text-align: justify;">Microsoft 365 DSC enables the management of the configuration and state of Microsoft 365 services following a declarative approach. By defining the desired state rather than specific steps, it simplifies the management of complex cloud configurations and ensures consistency across the environment.</p>
<p style="text-align: justify;">In the context of a PoC, the test population deployed in our test tenant is as follows:</p>
<ul style="text-align: justify;">
<li>30 Cloud Only Users (randomly generated by Microsoft as part of the test’s tenant creation process)</li>
<li>10 Security Groups (randomly assigned to Users)</li>
</ul>
<p style="text-align: justify;">The purpose of this PoC is to identify the benefits and limitations of the solution through a series of tested and documented uses cases:</p>
<table>
<tbody>
<tr>
<td style="text-align: center;" colspan="3" width="623">
<p><strong>Users</strong></p>
</td>
</tr>
<tr>
<td style="text-align: center;" colspan="2" width="365">
<p><strong>Use cases</strong></p>
</td>
<td style="text-align: center;" width="257">
<p><strong>Findings</strong></p>
</td>
</tr>
<tr>
<td width="161">
<p><strong>What happens if we delete a user and then restore a backup?</strong></p>
</td>
<td width="204">
<p>Does the user return with all the data that was attached to them?</p>
<p>Does their password come back, or do they have a new password?</p>
<p>Do their information return or not?</p>
</td>
<td width="257">
<p>Not all the attributes related to deleted users are retrieved. However, their password is replaced with a default password. In case of inconsistency, a non-blocking error occurs in the script, preventing the user from being set with attributes that point to non-existent object.</p>
<p>If the user has the “Ensure” attribute set to “Absent”, then they will not be retrieved.</p>
</td>
</tr>
<tr>
<td width="161">
<p><strong>What happens if a user is deactivated but, in the backup, they are active?</strong></p>
</td>
<td width="204">
<p>Do they get reactivated?</p>
</td>
<td rowspan="2" width="257">
<p>We cannot know the state of users (active or deactivated) from the backup.</p>
<p>Depending on the situation, we can set the “Ensure” parameter to “Absent” or “Present” to ensure consistency between our tenant state and our export.</p>
<p>When set to “Absent”, the user will be considered as deactivated and not be deployed during the restoration process. When set to “Present”, the user will be considered as active and be deployed during the restoration process.</p>
<p>If we attempt to recover a user marked as &#8216;Absent&#8217; and they do not exist on Entra ID, we simply get a confirmation of their non-existence.</p>
</td>
</tr>
<tr>
<td width="161">
<p><strong>What happens if a user is active but, in the backup, they are deactivated?</strong></p>
</td>
<td width="204">
<p>Do they get deactivated?</p>
</td>
</tr>
<tr>
<td width="161">
<p><strong>What happens if we add a user, and the backup doesn&#8217;t contain this new user?</strong></p>
</td>
<td width="204">
<p>Does the user get deleted?</p>
<p>Do their data remain intact?</p>
</td>
<td width="257">
<p>There is no impact observed on the new user.</p>
</td>
</tr>
<tr>
<td width="161">
<p><strong>What happens if we make a backup without changing the user?</strong></p>
</td>
<td width="204">
<p>If nothing changed, what happens?</p>
<p>If only an attribute of the user (like a group) was deleted, what happens?</p>
<p>If an attribute of the user (like a group) was added, what happens?</p>
<p>If an attribute was modified (like a password), what happens?</p>
<p>If a group they belonged to was deleted, what happens?</p>
<p>What happens with the licenses assigned to a user if a backup is made before the modification?</p>
<p>What happens if we modify a user’s role before making the backup?</p>
</td>
<td width="257">
<p>Because the username is used to associate attributes with the user, if it changes, the user cannot be found from the backup (unless it is also changed there).</p>
<p>The attributes from the backup overwrite the existing ones. Everything else remains untouched. Therefore, if an attribute is not included in the snapshot, it will stay as it was.</p>
</td>
</tr>
</tbody>
</table>
<p style="text-align: justify;"> </p>
<table>
<tbody>
<tr>
<td style="text-align: center;" colspan="3" width="623">
<p><strong>Groups</strong></p>
</td>
</tr>
<tr>
<td style="text-align: center;" colspan="2" width="365">
<p><strong>Use cases</strong></p>
</td>
<td style="text-align: center;" width="257">
<p><strong>Findings</strong></p>
</td>
</tr>
<tr>
<td width="161">
<p><strong>What happens if I delete a group and then restore a backup?</strong></p>
</td>
<td width="204">
<p>Does the group return with all the data that was attached to it?</p>
<p>Are the members of this group reintegrated?</p>
<p>Does the snapshot save who belongs to which group?</p>
<p>Are all groups saved in the snapshot?</p>
<p>Does the snapshot save the rights within the group?</p>
</td>
<td width="257">
<p>Only the security groups and Microsoft 365 groups with the right confidentiality label are backed-up.</p>
<p>The snapshot contains the members of the group and the owner but does not save the rights within the group.</p>
<p>It is necessary to redo the snapshot as the newly created group no longer has the same ID as the previous one. It won’t be recognized by the snapshot which will consider that the group does not exist.</p>
</td>
</tr>
<tr>
<td width="161">
<p><strong>What happens if I back up a group that already exists but has modified attributes?</strong></p>
</td>
<td width="204">
<p>What happens if the name has changed?</p>
<p>What happens if a user has left the group after the snapshot?</p>
<p>What happens if there are new users after the snapshot?</p>
</td>
<td width="257">
<p>The backup overwrites the old attributes except for the name.</p>
</td>
</tr>
<tr>
<td width="161">
<p><strong>What happens if a group exists in the tenant but not in the backup?</strong></p>
</td>
<td width="204">
<p>Does it get deleted or impacted after restoration?</p>
</td>
<td width="257">
<p>There is no impact observed apart from the information defined in the configuration file.</p>
</td>
</tr>
</tbody>
</table>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">The process required configuring a service account with the right permissions (<em>User.ReadWrite.All,</em> <em>Group.ReadWrite.All</em>) in Entra ID to interact with Microsoft Graph API for data export and import.</p>
<p style="text-align: justify;">These permissions enabled the service account to retrieve the necessary configuration and data from Entra ID and later re-import it.</p>
<p style="text-align: justify;">Result of the PoC Microsoft 365 DSC</p>
<p style="text-align: justify;">As a result of these tests, we were able to gather conclusive information on the solution’s benefits and limitations. On the positive side:</p>
<ul>
<li><strong>Granular Configuration Selection: </strong>The solution allows precise targeting of configurations for backup, enabling users to select specific settings.</li>
<li><strong>Recovery without deletion: </strong>During recovery, current users and groups are retained, preventing accidental deletion.</li>
<li><strong>Overwrite of Outdated Attributes: </strong>Backed-up attributes replace the old ones.</li>
<li><strong>Language of the Data Storage: </strong>Data is stored in JSON format, making it easy to manipulate and modify backup files.</li>
<li><strong>Automation Capabilities: </strong>Once the necessary tools are installed, the solution is easy to automate.</li>
<li><strong>Monitoring and Alerts: </strong>Microsoft 365 DSC can be used to monitor data consistency and receive alerts in the event of suspicious changes</li>
<li><strong>Snapshot Versions management: </strong>It enables easy maintenance and administration of multiple snapshot versions</li>
<li><strong>Detailed Logging Functionality: </strong>It offers the possibility to generate highly detailed logs, providing records of all operations for enhanced oversight.</li>
</ul>
<p style="text-align: justify;">Despite these advantages, the study revealed several limitations:</p>
<ul>
<li><strong>Incomplete Data in Backup: </strong>The backup process does not capture all attributes, leading to potential loss of important information.</li>
<li><strong>Backup Size Limit: </strong>The backup size is capped at 11MB, which may be insufficient for larger configurations or datasets.</li>
<li><strong>Deactivation Status Not Captured: </strong>Snapshots do not store deactivation statuses for users, potentially re-enabling disabled users during recovery.</li>
<li><strong>Unencrypted Data and Credentials: </strong>Security concerns arise from data and credentials being stored unencrypted, posing risks to sensitive information.</li>
<li><strong>Object IDs’ Loss: </strong>During imports, object IDs are lost, causing recreated objects to have new IDs, which can lead to duplicate entries in subsequent imports.</li>
<li><strong>Privileged Service Principal: </strong>The service principal involved has elevated privileges, increasing the risk of security vulnerabilities if not properly managed.</li>
</ul>
<p style="text-align: justify;">It is important to note that this tool does not really support “restoration” as it is possible to re-create objects, but it does not ensure service restoration and continuity. The reason being that it currently cannot restore links between new ID objects and applications, which is an issue native to Entra ID.</p>
<p style="text-align: justify;">Our opinion about Microsoft 365 DSC</p>
<p style="text-align: justify;">Microsoft 365 DSC is a great tool when it comes to basic uses and documentation as it is simple to use and to deploy on test environments. It is also quite efficient as a monitoring tool thanks to its version control and detailed logs. However, it is not adapted to large environments because of the limited scalability, the poor user experience and security issues related to configurations and credentials. It can also lead to inconsistencies or duplication as object IDs that can be referenced elsewhere are unrecoverable.</p>
<p style="text-align: justify;">Additional solutions may be required such as scripting for handling configuration files and ensuring the consistency of the modifications, as well as well-defined encryption and backup processes. Therefore, we recommend always carefully evaluating the specific needs, planning additional developments and mainly using the solution for supervision and testing purposes.</p>
<p style="text-align: justify;">Given the limitations of Microsoft&#8217;s open-source tools, it could be worthwhile to explore what third-party vendors, such as Semperis or Quest who are pure players on the subject, have to offer. These alternatives might address some of the challenges related to scalability, reliability and security, providing options that better suit larger environments. It is important to remain open to these possibilities and evaluate them based on the specific requirements of your organization.</p>
<p style="text-align: justify;"> </p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/07/resilience-entra-id/">Resilience Entra ID</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/07/resilience-entra-id/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Deceptive Security: the solution for effective detection in the cloud? – Deceptive use example in AWS cloud </title>
		<link>https://www.riskinsight-wavestone.com/en/2024/02/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/02/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud/#respond</comments>
		
		<dc:creator><![CDATA[Pierre LALIN]]></dc:creator>
		<pubDate>Fri, 16 Feb 2024 16:55:48 +0000</pubDate>
				<category><![CDATA[Focus]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Deceptive security]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=22490</guid>

					<description><![CDATA[<p>Today, cyber-attacks are part of our daily lives, and are becoming increasingly common and sophisticated.    Simultaneously, we are moving towards Information Systems that are built on an ever-increasing diversity of environments, thanks in particular to the Cloud, which is now...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/02/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud/">Deceptive Security: the solution for effective detection in the cloud? – Deceptive use example in AWS cloud </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><span data-contrast="none">Today, cyber-attacks are part of our daily lives, and are becoming increasingly </span><span data-contrast="none">common </span><span data-contrast="none"> and sophisticated.  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">Simultaneously, we are moving towards Information Systems</span><span data-contrast="none"> that are</span><span data-contrast="none"> built on an ever-increasing diversity of environments, thanks in particular to the </span><b><span data-contrast="none">Cloud,</span></b><span data-contrast="none"> which is now an integral part within corporate Information Systems. This enables </span><span data-contrast="none">corporations </span><span data-contrast="none">)</span> <span data-contrast="none">to expand their capabilities, however it </span><span data-contrast="none">is </span><span data-contrast="none">also the surface area </span><span data-contrast="none"> for </span><span data-contrast="none">risk</span><span data-contrast="none"> of attack</span><span data-contrast="none">s</span><span data-contrast="none">.  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">Conventional intrusion detection and protection techniques already exist and are developing exponentially. These are effective against the most common attacks, however are not always adapted to the specificities of the Cloud.  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">This raises questions about the use of </span><b><span data-contrast="none">proactive strategies</span></b><span data-contrast="none">, such as </span><b><span data-contrast="none">Deceptive Security</span></b><span data-contrast="none">, to stay one step ahead of attackers. Particularly in the context of Cyber-Resilience</span><span data-contrast="none">;</span><span data-contrast="none"> how can this kind of technology be used in both a traditional and a cloud environment?  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}"> </span></p>
<p><i><span data-contrast="none">When should Deceptive Security techniques be used? Are Deceptive Security solutions in the Cloud being developed today? Are there any specific strategies to consider in a Cloud environment as opposed to a traditional one? </span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">We will answer these questions in a </span><b><span data-contrast="none">mini-series of 2 articles</span></b><span data-contrast="none">. In the first article, we showed how to develop and evaluate your decoy strategy. In the second article, we’ll present a practical example of deceptive security in AWS. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}"> </span></p>
<p aria-level="1"> </p>
<h2 aria-level="1"><span data-contrast="none">Initial assumptions and choice of scenario  </span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span><span data-contrast="none"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}"> </span></h2>
<p><span data-contrast="none">Thanks to Wavestone&#8217;s expertise and the resources shared by our CyberLab, we have designed a simple scenario to illustrate the use of decoys </span><b><span data-contrast="none">in an AWS Cloud environment</span></b><span data-contrast="none">. The example detailed below is inspired by a CTF (Capture The Flag) scenario designed by the CyberLab team to illustrate the lateral propagation of an attacker. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">As in the previous scenarios, </span><b><span data-contrast="none">where we used Deceptive </span></b><b><span data-contrast="none">Security </span></b><b><span data-contrast="none">for the detection of attackers already introduced into the IS</span></b><span data-contrast="none">, the aim is once again to avoid attracting opportunistic attackers to our network with a &#8220;search&#8221; Deceptive</span><span data-contrast="none"> Security</span><span data-contrast="none"> approach. We therefore assume an initial infection of some kind, which is highly probable (all the more so in poorly controlled Cloud environments), and concentrate on detecting the intruder as it is being deployed </span><span data-contrast="none">in</span><span data-contrast="none">to </span><span data-contrast="none"> the network.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">Applying this approach to an AWS environment is no innocent matter. One of the benefits of the Cloud lies in its simplified identity management and easy delegation of access, but </span><b><span data-contrast="none">this asset can turn to the advantage of attackers</span></b><span data-contrast="none"> in the event of unintentional exposure of resources</span><span data-contrast="none">,</span><span data-contrast="none"> or the creation of dangerous links between zones of different security levels. There is no shortage of hardening and prevention measures, generously promoted by Cloud providers themselves, but these vulnerabilities remain </span><span data-contrast="none">in </span><span data-contrast="none">poorly hardened accounts and subscriptions, whose administration too often obeys rules that are still informal.  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}"> </span></p>
<p><b><span data-contrast="none">The attack scenario</span></b> <b><span data-contrast="none">and associated luring will therefore be based on the principle of linking two AWS accounts</span></b><span data-contrast="none">, here conceived as a production environment and a less critical development environment. We&#8217;ll place ourselves in a scenario where an approval relationship is used to propagate from the development account to the production account, via the endorsement of a cross-account role.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}"> </span></p>
<p> </p>
<h2 aria-level="1"><span data-contrast="none">Luring scenario </span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span></h2>
<h3 aria-level="2"><span data-contrast="none">Description of the scenario  </span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span></h3>
<p><span data-contrast="none">Let&#8217;s assume that </span><b><span data-contrast="none">an unauthorized user has gained access to an EC2 machine</span></b><span data-contrast="none"> (domainIntegrated-EC2) within the test account (initial infection). After an initial successful connection, </span><span data-contrast="none"> they </span><span data-contrast="none"> attempt</span><span data-contrast="none"> to access commonly used resources such as Amazon Simple Storage Service (Amazon S3), or </span><b><span data-contrast="none">tries to elevate </span></b><b><span data-contrast="none">their </span></b><b><span data-contrast="none"> privileges</span></b><span data-contrast="none"> by assuming other roles (role chaining) related to the role to which </span><span data-contrast="none">they have </span><span data-contrast="none"> access. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}"> </span></p>
<p><b><span data-contrast="none">This lateral propagation scenario is a common attack technique in cloud environments</span></b><span data-contrast="none"> due to the nature of their architecture and the cloud computing responsibility model, where the customer is responsible for securing their applications, data and access control (while the provider ensures the security of the underlying infrastructure).</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">As illustrated below, </span><b><span data-contrast="none">lateral propagation attacks take advantage of weaknesses in the customer&#8217;s security controls</span></b><span data-contrast="none">, such as misconfigured authorizations or the application of too-weak authentication mechanisms, to gain unauthorized access to other resources in the environment.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: center;"><img decoding="async" class="aligncenter wp-image-22454 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/1.jpg" alt="" width="1269" height="655" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/1.jpg 1269w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/1-370x191.jpg 370w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/1-71x37.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/1-768x396.jpg 768w" sizes="(max-width: 1269px) 100vw, 1269px" /><br /><i><span data-contrast="none">Scenario from the attacker&#8217;s point of view</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:1135,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:1135,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<p><span data-contrast="none">0. After compromising a &#8220;domainIntegrated&#8221; EC2 machine, the attacker discovers that it has a role associated with it (&#8220;Semi-Admin-role&#8221;): </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: center;"><img decoding="async" class="aligncenter wp-image-22456 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/2.jpg" alt="" width="1242" height="125" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/2.jpg 1242w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/2-437x44.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/2-71x7.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/2-768x77.jpg 768w" sizes="(max-width: 1242px) 100vw, 1242px" /> <br /><i><span data-contrast="none">Enumeration of EC2 machine domainIntegrated</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:720,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">It then lists the rights of the &#8220;Semi-Admin-Role&#8221;:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1135,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<p style="text-align: center;"><img loading="lazy" decoding="async" class="aligncenter wp-image-22458 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/3.jpg" alt="" width="1172" height="544" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/3.jpg 1172w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/3-411x191.jpg 411w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/3-71x33.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/3-768x356.jpg 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/3-1170x544.jpg 1170w" sizes="auto, (max-width: 1172px) 100vw, 1172px" /> <br /><i><span data-contrast="none">Enumeration of Semi-Admin-Role rights</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:720,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">First, this role has </span><b><span data-contrast="none">modification privileges </span></b><span data-contrast="none">on a resource in the &#8220;AWS &#8211; SHARED&#8221; account: it can assume (sts:assumeRole) and modify (iam:UpdateRole) a role called &#8220;LambdaAuto&#8221;. He can then assume (by &#8220;role chaining&#8221;, step 5 in the diagram above) another role called &#8220;SecurityAudit&#8221; in a different account, called AWS MASTER. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">The attacker also realizes that </span><span data-contrast="none">they </span> <b><span data-contrast="none">can directly assume another role</span></b><span data-contrast="none"> (&#8220;IAM-RO-Role&#8221;) in the AWS &#8211; MASTER account. This latter role attracts particular attention, as the MASTER account&#8217;s name suggests a </span><b><span data-contrast="none">much greater scope of action</span></b><span data-contrast="none"> than the simple SHARED account, and the IAM-RO-Role role suggests an extended scope of vision over the account&#8217;s resources.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1135,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<ol>
<li><span data-contrast="none">The attacker assumes the &#8220;SemiAdmin-role&#8221;, which then allows </span><span data-contrast="none">the</span><span data-contrast="none">m </span><span data-contrast="none"> to assume the &#8220;IAM-RO&#8221; role and attempt other actions that will enable </span><span data-contrast="none">them</span><span data-contrast="none"> to analyze </span><span data-contrast="none">their</span><span data-contrast="none"> field of vision.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="%1" data-font="Tahoma" data-listid="24" data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Indeed, after assuming the &#8220;IAM-RO&#8221; role, he proceeds to an IAM enumeration where </span><span data-contrast="none">they</span><span data-contrast="none"> becomes aware of the roles and users in </span><span data-contrast="none">their</span><span data-contrast="none"> field of vision:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></li>
</ol>
<p><br /><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-22460 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/4.jpg" alt="" width="1260" height="294" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/4.jpg 1260w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/4-437x102.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/4-71x17.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/4-768x179.jpg 768w" sizes="auto, (max-width: 1260px) 100vw, 1260px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="none">List of roles in the field of view of the IAM-RO role </span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:1135,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:1135,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-22462 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/5.jpg" alt="" width="1222" height="213" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/5.jpg 1222w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/5-437x76.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/5-71x12.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/5-768x134.jpg 768w" sizes="auto, (max-width: 1222px) 100vw, 1222px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="none">List of users in the field of view of the IAM-RO role </span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:720,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<p><span data-contrast="none">The &#8220;SecurityAudit&#8221; role in particular attracts </span><span data-contrast="none">their</span><span data-contrast="none"> attention thanks to the </span><b><span data-contrast="none">privileges</span></b><span data-contrast="none"> that this name suggests and the role description, which provides information on these privileges: </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:491,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-22464 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/6.jpg" alt="" width="1264" height="76" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/6.jpg 1264w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/6-437x26.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/6-71x4.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/6-768x46.jpg 768w" sizes="auto, (max-width: 1264px) 100vw, 1264px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="none">SecurityAudit role description</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:207,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">However, the attacker only has read access to the resources listed. </span><span data-contrast="none">They </span><span data-contrast="none"> will therefore look to see if any of these resources can be written to from the SHARED account, where </span><span data-contrast="none">they</span> <span data-contrast="none">have</span> <span data-contrast="none">high privileges. For example, if certain MASTER account roles can be endorsed by SHARED account roles:  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-22466 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/7.jpg" alt="" width="1266" height="181" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/7.jpg 1266w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/7-437x62.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/7-71x10.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/7-768x110.jpg 768w" sizes="auto, (max-width: 1266px) 100vw, 1266px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="none">List of roles that can be assumed from an external account (here the SHARED account)</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:1135,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<p><span data-contrast="none">The attacker investigates the approval relationship of the &#8220;SecurityAudit&#8221; role, which authorizes an endorsement by the &#8220;LambdaAuto&#8221; role of the SHARED account.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:284,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<p><span data-contrast="none">0. Back on the SHARED account, all the attacker has to do is check that the other counterpart of this approval relationship, i.e. that the &#8220;LambdaAuto&#8221; role does indeed authorize the &#8220;SecurityAudit&#8221; role&#8217;s endorsement in its approval policy. This is not the case, but the &#8220;SemiAdminRole&#8221; role allows it to configure this authorization.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">1.Once the &#8220;LambdaAuto&#8221; role approval policy has been modified, it can now assume the &#8220;LambdaAuto&#8221; role.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">2. Then </span><span data-contrast="none">they </span><span data-contrast="none"> take</span><span data-contrast="none"> on (by role-chaining) the role of &#8220;SecurityAudit&#8221;, the real decoy.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-22468 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/8.jpg" alt="" width="1265" height="634" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/8.jpg 1265w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/8-381x191.jpg 381w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/8-71x36.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/8-768x385.jpg 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/8-800x400.jpg 800w" sizes="auto, (max-width: 1265px) 100vw, 1265px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="none">Role chaining of the attacker</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<p><span data-contrast="none">After attempting to take on the &#8220;SecurityAudit&#8221; role, from which </span><span data-contrast="none">they</span><span data-contrast="none"> hope</span><span data-contrast="none"> to gain the privileges of a security auditor (announced in step 1), the attacker in reality finds </span><span data-contrast="none">themself</span><span data-contrast="none"> without any real powers, for example :</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:207,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-22470 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/9.jpg" alt="" width="1267" height="78" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/9.jpg 1267w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/9-437x27.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/9-71x4.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/9-768x47.jpg 768w" sizes="auto, (max-width: 1267px) 100vw, 1267px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="none">Example of denied access from the SecurityAudit </span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:491,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<h3 aria-level="2"><span data-contrast="none">Creating lures</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1418,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}"> </span></h3>
<p><span data-contrast="none">The diagram below shows how decoys are added at different stages of the attack and how they are configured by the defender:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-22472 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/10.jpg" alt="" width="1278" height="744" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/10.jpg 1278w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/10-328x191.jpg 328w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/10-67x39.jpg 67w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/10-120x70.jpg 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/10-768x447.jpg 768w" sizes="auto, (max-width: 1278px) 100vw, 1278px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="none">Scenario from the defender&#8217;s point of view </span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:1135,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:1135,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<p><span data-contrast="none">0.The &#8220;Semi-Admin-Role&#8221; is the </span><b><span data-contrast="none">entry point</span></b><span data-contrast="none"> into the decoy scenario. It can therefore be associated with any resource likely to be compromised (here the EC2 &#8220;domainIntegrated&#8221;) to redirect the attacker to the decoys.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">No alerts are configured at this level, as the Semi-Admin role&#8217;s connection to all SHARED account resources makes it likely that unintentional endorsements will be triggered, resulting in false-positive alerts.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<ol>
<li data-leveltext="%1" data-font="Tahoma" data-listid="19" data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Once the IAM-RO role has been assumed, the attacker is then invited into an account entirely dedicated to luring and </span><span data-contrast="none">familiarising</span> <span data-contrast="none">themselves </span><span data-contrast="none"> with the surrounding resources, </span><b><span data-contrast="none">gaining a complete overview of all the account&#8217;s roles and users.</span></b><span data-contrast="none">  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="%1" data-font="Tahoma" data-listid="19" data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">By populating the attacker&#8217;s field of vision not only with the main &#8220;SecurityAudit&#8221; decoy, but also with other dummy roles and users, we ensure that the account&#8217;s appearance appears credible and that our key decoy, the SecurityAudit role, is not isolated.  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></li>
</ol>
<p><span data-contrast="none">We thus add to the account :  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<ul>
<li data-leveltext="o" data-font="Courier New" data-listid="16" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:1080,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="2"><span data-contrast="none">Users : different user names attracting the attacker. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1094,&quot;335559739&quot;:96,&quot;335559740&quot;:259,&quot;335559746&quot;:40}"> </span></li>
<li data-leveltext="o" data-font="Courier New" data-listid="16" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:1080,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="2"><span data-contrast="none">The &#8220;LambdaFunction&#8221; role: this role is created to simulate a Lambda function that calls on AWS services. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1094,&quot;335559739&quot;:96,&quot;335559740&quot;:259,&quot;335559746&quot;:40}"> </span></li>
<li data-leveltext="o" data-font="Courier New" data-listid="16" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:1080,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="2"><span data-contrast="none">The &#8220;LogsAndS3Bucket&#8221; role: a role created to facilitate access to logging services and S3 storage resources within the account. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1094,&quot;335559739&quot;:96,&quot;335559740&quot;:259,&quot;335559746&quot;:40}"> </span></li>
<li data-leveltext="o" data-font="Courier New" data-listid="16" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:1080,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="2"><span data-contrast="none">The &#8220;taskExecutionRole&#8221;: the task execution role that can be used for different purposes and services associated with the account. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1094,&quot;335559739&quot;:96,&quot;335559740&quot;:259,&quot;335559746&quot;:40}"> </span></li>
</ul>
<p><span data-contrast="none">3.  The &#8220;SemiAdminRole&#8221; role has deliberately been configured with permission (iam:UpdateRole) on the &#8220;LambdaAuto&#8221; role, enabling it to modify this role and thus add the approval relationship to the &#8220;SemiAdminRole&#8221; role. For monitoring purposes, an initial alert can be triggered at this level when the &#8220;LambdaAuto&#8221; approval relationship is updated, enabling the &#8220;SemiAdminRole&#8221; to assume it.  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span style="color: initial;" data-contrast="none">4. The &#8220;LambdaAuto&#8221; role is deliberately created as the gateway to the &#8220;SecurityAudit&#8221; role, once its approval relationship has been modified using the privileges of the &#8220;SeminAdminRole&#8221; role.</span><span style="color: initial;" data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">5. The &#8220;SecurityAudit&#8221; role is deliberately configured with an approval relationship authorizing the &#8220;LambdaAuto&#8221; role of the SHARED account to assume it.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">6. At this stage, the attacker had assumed that </span><span data-contrast="none">they </span><span data-contrast="none"> would be granted security auditor rights. However, a very restrictive Security Control Policy (SCP) was applied, granting </span><span data-contrast="none">them </span><span data-contrast="none">no privileges on the account.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p> <br /><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:207,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-22474 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/11.jpg" alt="" width="1031" height="539" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/11.jpg 1031w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/11-365x191.jpg 365w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/11-71x37.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/11-768x402.jpg 768w" sizes="auto, (max-width: 1031px) 100vw, 1031px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="none">The policy prohibiting all actions from the Security-Audit-Role</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:-304,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<h2 aria-level="1"> </h2>
<h2 aria-level="1"><span data-contrast="none">Alerting chain</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559738&quot;:240,&quot;335559739&quot;:360,&quot;335559740&quot;:259,&quot;335559991&quot;:567}"> </span></h2>
<p><span data-contrast="none">An alerting chain in the AWS cloud refers to a means of communicating notifications or alerts generated by AWS services to users or teams responsible for managing these services, enabling them to take rapid action to resolve problems and minimize service interruptions.  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:284,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:284,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">To set up an alerting chain, you first need to configure AWS services to generate alerts when certain events occur, such as</span><span data-contrast="none">,</span><span data-contrast="none"> a server down or an application exceeding a specific CPU usage threshold. Once these alerts have been generated, they can be sent to the appropriate alerting chain according to the notification preferences configured by the user or the team responsible for managing the service.  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:284,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">In order to detect the attacker, we use the following AWS services to create the alerting chain:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1135,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:644,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><a href="bookmark://_CloudTrail"><b><span data-contrast="none">CloudTrail</span></b></a><span data-contrast="none"> l to track actions performed on the compromised AWS account;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:644,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="none">EventBridge</span></b><span data-contrast="none"> to detect any &#8220;AssumeRole&#8221; event of the &#8220;SecurityAudit&#8221; role and trigger an alert ;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:644,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><a href="bookmark://_SNS_-_Simple"><span data-contrast="none">Simple Notification Service (SNS</span></a><span data-contrast="none">)</span><span data-contrast="none"> to send the alert by e-mail with the information gathered during the attack. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></li>
</ul>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:567,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-22476 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/12.jpg" alt="" width="1255" height="629" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/12.jpg 1255w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/12-381x191.jpg 381w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/12-71x36.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/12-768x385.jpg 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/12-800x400.jpg 800w" sizes="auto, (max-width: 1255px) 100vw, 1255px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="none">Illustration of the alerting chain</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:567,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<h3 aria-level="2"><span data-contrast="none">Alerting chain creation steps : </span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1418,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}"> </span></h3>
<h4 aria-level="3"><span data-contrast="none">Cloudtrail configuration </span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1418,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}"> </span></h4>
<p><span data-contrast="none">The first step in creating an alerting chain on AWS is to enable CloudTrail (if not already activated) in your AWS account. CloudTrail logs all activity and API calls in your account, which can be useful for security, compliance and troubleshooting purposes.  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">Based on the logs generated in CloudTrail, we&#8217;ve created an EventBridge rule that sends notifications to the SNS service whenever the &#8220;SecurityAudit&#8221; role is assumed (event type: AssumeRole).</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<h4 aria-level="3"><span data-contrast="none">Creation of an EventBridge rule</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1418,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}"> </span></h4>
<p><span data-contrast="none">A rule monitors specific types of events, and when a corresponding event occurs, it is routed to the service associated with the rule and handling the event (in this case, the SNS service). </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:144,&quot;335559740&quot;:259,&quot;335559746&quot;:60}"> </span></p>
<p><span data-contrast="none">The event model detects all events of the &#8220;AssumeRole&#8221; type occurring in the account used and triggers the alert. In order to avoid false positives when triggering alerts, we have refined the event model to be as accurate as possible for the events we are interested in.  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:144,&quot;335559740&quot;:259,&quot;335559746&quot;:60}"> </span></p>
<p><span data-contrast="none">This means including relevant fields, such as event source, detail type or specific values, to refine the matching criteria. This reduces the risk of unrelated events triggering the rule.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:144,&quot;335559740&quot;:259,&quot;335559746&quot;:60}"> </span></p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-22478 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/13.jpg" alt="" width="1013" height="448" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/13.jpg 1013w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/13-432x191.jpg 432w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/13-71x31.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/13-768x340.jpg 768w" sizes="auto, (max-width: 1013px) 100vw, 1013px" /></p>
<p style="text-align: center;"><i><span data-contrast="none">The event model detecting all &#8220;AssumeRole&#8221; events on the &#8220;SecurityAudit&#8221; role</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:1135,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<p><span data-contrast="none">The Eventbridge service must therefore first be linked to the SNS target.  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-22480 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/14.jpg" alt="" width="1157" height="154" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/14.jpg 1157w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/14-437x58.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/14-71x9.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/14-768x102.jpg 768w" sizes="auto, (max-width: 1157px) 100vw, 1157px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="none">The target related to the EventBridge rule</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:1135,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<h4 aria-level="3"><span data-contrast="none">SNS rubric configuration </span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1418,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}"> </span></h4>
<p><span data-contrast="none">At this stage, an SNS topic is created and linked to a subscription of an e-mail endpoint authenticated later. The SNS topic will be the target of the EventBridge rule. Once the topic has been created, the e-mail subscription is carried out by selecting the e-mail address as the protocol (endpoint) where the alerts are to be received.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><i><span data-contrast="none">Other targets than e-mail could be considered for receiving alerts (ServiceNow, SIEM, etc.).</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span> <br /><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-22482 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/15.jpg" alt="" width="883" height="339" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/15.jpg 883w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/15-437x168.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/15-71x27.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/15-768x295.jpg 768w" sizes="auto, (max-width: 883px) 100vw, 883px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="none">Details of the SNS rubric</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:1135,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:491,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<p aria-level="3"><strong>Alert customization  </strong></p>
<p><span data-contrast="none">EventBridge&#8217;s Input Transformer function was used to customize the content of the alert, so that only the most important elements were displayed.  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">It allows you to customize the text of an event before it is transmitted to the target.  This is achieved by defining JSON variables to reference values in the original event source.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p aria-level="4"><b><span data-contrast="none">Input transformer configuration </span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">In our case, the variables listed below will constitute the alert message:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-22484 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/16.jpg" alt="" width="992" height="529" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/16.jpg 992w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/16-358x191.jpg 358w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/16-71x39.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/16-768x410.jpg 768w" sizes="auto, (max-width: 992px) 100vw, 992px" /></p>
<p style="text-align: center;"><i><span data-contrast="none">Input transformer creation</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:568,&quot;335559731&quot;:284,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:284,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p aria-level="4"><b><span data-contrast="none">Input model</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">The input model will use the variables defined previously within the final alert message: </span><span data-contrast="none"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-22486 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/17.jpg" alt="" width="1275" height="245" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/17.jpg 1275w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/17-437x84.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/17-71x14.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/17-768x148.jpg 768w" sizes="auto, (max-width: 1275px) 100vw, 1275px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="none">Input model creation</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:568,&quot;335559731&quot;:284,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">Once the &#8220;SecurityAudit&#8221; role has been endorsed, an alert is sent to the endpoint created:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:284,&quot;335559738&quot;:120,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-22488 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/18.jpg" alt="" width="1267" height="431" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/18.jpg 1267w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/18-437x149.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/18-71x24.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/18-768x261.jpg 768w" sizes="auto, (max-width: 1267px) 100vw, 1267px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="none">Example of e-mail alert content</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:284,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:284,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<h3><b><span data-contrast="none">Cost of the AWS services used </span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></h3>
<p><span data-contrast="none">AWS offers a pay-per-use approach to pricing its cloud services. With AWS, you only pay for the services you need, as long as you continue to use them, without a long-term contract. You only pay for the services you use, and if you stop using them, you won&#8217;t be charged any additional costs or termination fees. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">The services deployed in this scenario are not intended to be used except in the event of an intrusion or security incident. The associated costs are therefore negligible.  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p> </p>
<h2 aria-level="1"><span data-contrast="none">Decoy evaluation with the PARCS matrix</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559738&quot;:240,&quot;335559739&quot;:360,&quot;335559740&quot;:259,&quot;335559991&quot;:567}"> </span></h2>
<p><span data-contrast="none">Several criteria can be used to evaluate a lure, and here are the results of our analysis based on the PARCS matrix:  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="none">P</span></b><span data-contrast="none">ertinence (efficiency) : 4/4</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></li>
</ul>
<p><span data-contrast="none">«  Various approaches can be adopted to effectively spot the initial compromise of an EC2 instance and the lateral propagation of an attacker</span><span data-contrast="none">.</span><span data-contrast="none"> In our context, depending on the resources at our disposal, one possible strategy is to monitor operations by analyzing logs, which will enable malicious actions to be detected. These observations could then be used to generate alerts for administrators. For example, an alert could be triggered in the event of an intrusion attempt via a brute force attack on the RDP service of EC2 instances within our AWS environment, thanks to GuardDuty. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:360,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></p>
<p><span data-contrast="none">In addition, it would be possible to use a combination of AWS services such as CloudTrail and EventBridge to establish detection rules and automate interventions in response to specific activities, including those related to cross-account access, and create detection rules that monitor all endorsement events to trigger actions in the event of corresponding events. </span><span data-contrast="none">»</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:360,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="none">A</span></b><span data-contrast="none">ttractivité (attractiveness): 4/4</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></li>
</ul>
<p><span data-contrast="none">« The decoy is distinguished by a dedicated account, significantly increasing its power of attraction. By having access to the metadata of all the resources within </span><span data-contrast="none">their </span><span data-contrast="none"> reach, the attacker can also verify various levels of privilege, which substantially enhances credibility. Thanks to the ability to visualize the dates and times of the last uses of resources in </span><span data-contrast="none">their</span><span data-contrast="none"> field of vision, </span><span data-contrast="none">they</span><span data-contrast="none"> can deduce that these resources are rarely used. With this in mind, a lambda function is implemented to automate the execution of various resources or their authentication, thus guaranteeing proof of recent use.  »</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:360,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><b><span data-contrast="none">R</span></b><span data-contrast="none">isque (risk): 4/4</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></li>
</ul>
<p><span data-contrast="none">« </span><span data-contrast="none">The authorization granted to the IAM-RO role only confers IAM privileges to the attacker in the context of a purely fictitious account. Thanks to appropriate configuration of the upstream SCP, any attempted actions by the Security-Audit role will also be thwarted. The only elements deliberately introduced in a real environment are the Semi-Admin and Lambda-Auto roles, which are subject to stringent policies preventing any assignment of rights or privileges in the event of attempted malicious use. These policies include read-only access (IAMReadOnlyAccess) and a restriction preventing any modification of account role authorizations, as defined by the SCP</span><span data-contrast="none">. »</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:360,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:360,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><b><span data-contrast="none">C</span></b><span data-contrast="none">rédibilité  (credibility): 3/4</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></li>
</ul>
<p><span data-contrast="none">« </span><span data-contrast="none">The credibility of the decoy may be called into question by the resources available to it and potential limitations, such as an Inline Policy that restricts permissions and possible actions. It&#8217;s important to take these factors into account, as they can create doubts in attackers and compromise the decoy&#8217;s effectiveness. It is therefore crucial to put in place measures that make the decoy as realistic and convincing as possible, ensuring that it has access to the relevant resources and authorizations to create a credible scenario. </span><span data-contrast="none">»</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:360,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:360,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"><b><span data-contrast="none">S</span></b><span data-contrast="none">calabilité (scalability) : 3/4</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></li>
</ul>
<p><span data-contrast="none">« </span><span data-contrast="none">Depending on the size of an infrastructure, it may be possible to implement fluid deployment and maintenance of components, thanks to the use of automated scripts empowered to perform operations on resources. However, careful monitoring of all resources is essential to consolidate security in the face of possible attacks, and to ensure rapid reaction to defend an extended perimeter.</span><span data-contrast="none">»</span><span data-contrast="none"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:360,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559738&quot;:240,&quot;335559739&quot;:360,&quot;335559740&quot;:259,&quot;335559991&quot;:567}"> </span></p>
<p><span data-contrast="none">In conclusion, implementing such a Deceptive Security scenario in the Cloud, offers an approach to improving its overall security. It helps restrict an attacker&#8217;s ability to explore and propagate across the network</span><span data-contrast="none">,</span><span data-contrast="none"> by presenting deceptive paths, delaying their progress and enabling faster detection and response. Decoys, which resemble attractive targets, divert attackers&#8217; attention and resources away from real assets, increasing the chances of early detection. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">In addition, alert mechanisms play a crucial role in providing rapid information on potential intrusions to security teams, enabling rapid incident response and limiting the impact of attacks. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">Combining these </span><span data-contrast="none">defence</span> <span data-contrast="none">strategies strengthens the overall security posture of Cloud environments, improves their resilience in the face of constantly evolving cyber threats, and guarantees the integrity and confidentiality of sensitive data.  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">By using these deceptive security measures, companies can strengthen their </span><span data-contrast="none">defence</span> <span data-contrast="none">against cyberattacks. However, it is important to note that Deceptive Security does not replace existing standard cybersecurity solutions, and that protection against cyberattacks requires the use of complementary security techniques for optimal defense.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p> </p>
<h3 aria-level="1"><span data-contrast="none">ANNEX &#8211; </span><span data-contrast="none">AWS Services </span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559738&quot;:240,&quot;335559739&quot;:360,&quot;335559740&quot;:259,&quot;335559991&quot;:567}"> </span></h3>
<p><i><span data-contrast="none">Definitions from source : AWS documentation → </span></i><i><span data-contrast="none">docs.aws.amazon.com</span></i><i><span data-contrast="none">.</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">SCP &#8211; Service control policies : Service control policies are a type of policy that enable central control of authorizations. This ensures that broad guidelines are followed for all AWS accounts in the organization. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">EC2 &#8211; Elastic Compute Cloud : AWS EC2 allows you to rent servers (EC2 instances) to best meet your workload needs. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">STS &#8211; Security Token Service : AWS STS enables you to request temporary security credentials for AWS resources. This makes it possible to grant temporary access to resources via API calls, the AWS console or the AWS CLI (Console Line Interface). </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">Please note: Each STS token has a lifecycle, defined when it is created, of between 15 minutes and 36 hours. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">CloudTrail : AWS CloudTrail is a service that records the actions performed by an AWS user, role or service.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">Fonction Lambda : The Lambda function is a service for executing code.</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">SNS &#8211; Simple Notification Service</span><span data-contrast="none"> : </span><span data-contrast="none">Amazon SNS is a web service for managing the sending of messages (SMS, e-mail, HTTP.S, etc.).</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><i><span data-contrast="none">Thanks to </span></i><i><span data-contrast="none"> Charles BULABULA</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span><i><span data-contrast="none"> for his contribution to this article.</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/02/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud/">Deceptive Security: the solution for effective detection in the cloud? – Deceptive use example in AWS cloud </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/02/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Deceptive Security: the solution for effective detection in the cloud? &#8211; your luring strategy. </title>
		<link>https://www.riskinsight-wavestone.com/en/2024/01/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/01/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy/#respond</comments>
		
		<dc:creator><![CDATA[Pierre LALIN]]></dc:creator>
		<pubDate>Tue, 30 Jan 2024 17:22:22 +0000</pubDate>
				<category><![CDATA[Focus]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Deceptive security]]></category>
		<category><![CDATA[decoy]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=22356</guid>

					<description><![CDATA[<p>    Today, cyber-attacks are part of our daily lives, and are becoming increasingly numerous and sophisticated.   Simultaneously, we are moving towards Information Systems built on an ever-increasing diversity of environments, thanks in particular to the Cloud, which is now...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/01/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy/">Deceptive Security: the solution for effective detection in the cloud? &#8211; your luring strategy. </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">Today, cyber-attacks are part of our daily lives, and are becoming increasingly numerous and sophisticated. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">Simultaneously</span><span data-contrast="none">, we are moving towards Information Systems built on an ever-increasing diversity of environments, thanks in particular to the <strong>Cloud,</strong> which is now </span><span data-contrast="none">an integral part within </span><span data-contrast="none">corporate I</span><span data-contrast="none">nformation </span><span data-contrast="none">S</span><span data-contrast="none">ystems</span><span data-contrast="none">. This enables </span><span data-contrast="none">corporation to </span><span data-contrast="none">expand their capabilities, </span><span data-contrast="none">however it also </span><span data-contrast="none">the surface area and risks of attack. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">Conventional intrusion detection and protection techniques already exist and are developing exponentially. These are effective against the most common attacks, </span><span data-contrast="none">however</span> <span data-contrast="none">are </span><span data-contrast="none">not </span><span data-contrast="none">always </span><span data-contrast="none">adapted to the specificities of the Cloud. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">This raises questions about the use of <strong>proactive strategies</strong>, such as <strong>Deceptive Security</strong>, to stay one step ahead of attackers. Particularly in the context of Cyber-Resilience: how can this kind of technology be used in both </span><span data-contrast="none">a </span><span data-contrast="none">traditional and </span><span data-contrast="none">a </span><span data-contrast="none">cloud environment</span><span data-contrast="none">? </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><em>When should Deceptive Security techniques be used? Are Deceptive Security solutions in the Cloud being developed today? Are there any specific strategies to consider in a Cloud environment as opposed to a traditional one? </em></p>
<p style="text-align: justify;"><span data-contrast="none">We will answer these questions in a </span><b><span data-contrast="none">mini-series of 2 articles</span></b><span data-contrast="none">. In the first article, we will show you how to develop and evaluate your decoy strategy. In the second article, we&#8217;ll present a practical example of deceptive security in AWS.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p> </p>
<h1 style="text-align: justify;" aria-level="1"><span data-contrast="none">Develop</span><span data-contrast="none"> and </span> <span data-contrast="none">evaluate</span> your <span data-contrast="none">deceptive</span> <span data-contrast="none">strategy</span> <span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559738&quot;:240,&quot;335559739&quot;:360,&quot;335559740&quot;:259,&quot;335559991&quot;:567}"> </span></h1>
<h2 style="text-align: justify;" aria-level="1"><span data-contrast="none">Ambitions of </span><span data-contrast="none">Deceptive Security</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559738&quot;:240,&quot;335559739&quot;:360,&quot;335559740&quot;:259,&quot;335559991&quot;:567}"> </span></h2>
<h3 style="text-align: justify;" aria-level="2"><span data-contrast="none">Deceptive Security in a nutshell</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1418,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="none">&#8220;<strong>Deceptive Security</strong>&#8221; (referred to as &#8220;Deceptive&#8221; in the rest of this article), or &#8220;<strong>digital decoying</strong>&#8220;, is a cyber-defense technique that deals with the<strong> intrusion of attackers into an IS</strong> (Information System). It works by <strong>setting up traps and/or decoys</strong> in an IS. These are designed to <strong>imitate legitimate technology,</strong> so as not to be </span><span data-contrast="none">identified as security systems/measures</span><span data-contrast="none">. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">This method makes it possible to <strong>detect</strong> intrusions by generating alerts, to <strong>prevent damage</strong> to the actual infrastructure and to <strong>observe</strong> the practices used by the attacker. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">Before delving into the details of this subject, we recommend reading the article &#8220;</span><a href="https://www.riskinsight-wavestone.com/en/2017/11/deceptive-security-comment-arroser-larroseur/"><span data-contrast="none">Deceptive Security : comment arroser l’arroseur ?</span></a> <span data-contrast="none">&#8220;, which describes the main concepts of &#8220;<strong>Deceptive Security</strong>&#8220;. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p> </p>
<h3 style="text-align: justify;" aria-level="2"><span data-contrast="none">The main objectives of Deceptive</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1418,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="none">The use of Deceptive on an IS can have several objectives: </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:360,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none"> </span><b><span data-contrast="none">Detect </span></b><span data-contrast="none">an intrusion </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="none"> Distract </span></b><span data-contrast="none">the attacker </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><b><span data-contrast="none"> Analyze </span></b><span data-contrast="none">the techniques used in the attack</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-22361 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/1-1.jpg" alt="" width="1040" height="720" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/1-1.jpg 1040w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/1-1-276x191.jpg 276w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/1-1-56x39.jpg 56w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/1-1-768x532.jpg 768w" sizes="auto, (max-width: 1040px) 100vw, 1040px" /></span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">This technology can be used at different levels of maturity, depending on the <strong>needs identified</strong>.  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">The</span><span data-contrast="none"> technology can be used to meet many of the needs mentioned above, but the key is to determine our requirements for this technology in advance. If we restrict the need</span><span data-contrast="none">s for</span> <span data-contrast="none">detection, it should be noted that the configuration, deployment and maintenance of Deceptive will be far less complex than if we push the possibilities of this technology to the maximum (e.g. setting up complex scenarios to lure the attacker and strategic analysis of his actions).</span></p>
<p> </p>
<h3 style="text-align: justify;" aria-level="2"><span data-contrast="none">The benefits of Deceptive</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1418,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}"> </span></h3>
<h4 style="text-align: justify;" aria-level="3"><span data-contrast="none">Why Deceptive ?</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1418,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}"> </span></h4>
<p style="text-align: justify;"><span data-contrast="none">As discussed in the introduction, today&#8217;s cybersecurity challenges are fueled by the need to detect and react to growing attacks. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none"><strong>Deceptive does not replace existing standard cybersecurity solutions</strong>. </span><span data-contrast="none">Being a </span><span data-contrast="none">m</span><span data-contrast="none">ore complex</span><span data-contrast="none"> tool</span><span data-contrast="none">, it acts as a <strong>complement</strong> to <strong>cover all types of attack</strong>, including the most sophisticated. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">This technology is <strong>not designed to prevent an attack</strong>, but to alert security teams, minimize the effect</span><span data-contrast="none">s</span><span data-contrast="none"> of the attack and observe the intruder&#8217;s modus operandi (&#8220;Detect, Distract &amp; Analyze&#8221;).</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<h4 style="text-align: justify;" aria-level="3"><span data-contrast="none">Honeypot VS Honeytoken</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1418,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}"> </span></h4>
<h5 style="text-align: justify;" aria-level="4"><i><span data-contrast="none">Presentation of concepts</span></i><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></h5>
<p style="text-align: justify;"><span data-contrast="none">D</span><span data-contrast="none">epending on the need</span><span data-contrast="none">s</span><span data-contrast="none"> and how they are to be used</span><span data-contrast="none">, different type</span><span data-contrast="none">s</span><span data-contrast="none"> of decoys </span><span data-contrast="none">exist</span><span data-contrast="none">. </span><span data-contrast="none">Whatever the case</span><span data-contrast="none">, they take on the appearance of attributes that make up our Information System. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">The best-known decoys are <strong>&#8220;honeypots&#8221;.</strong> These are servers or workstations that imitate real machines on the network. There&#8217;s also what&#8217;s known as a &#8220;honeynet&#8221;: a network of servers.  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">Another type of decoy is of growing </span><span data-contrast="none">in popularity</span><span data-contrast="none">. This is a decoy that hides directly on a system. These are generally represented by documents or other files whose role is to trigger an alert when someone comes to interact with them. Finally, we have <strong>&#8220;honeytokens&#8221;,</strong> which are data, information, often secrets or keys used to access a dummy resource on the IS (a honeypot, for example).</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<h5 style="text-align: justify;" aria-level="4"><i><span data-contrast="none">A fundamental difference</span></i><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></h5>
<p style="text-align: justify;"><span data-contrast="none">Traditionally, </span><b><span data-contrast="none">honeypots</span></b> <span data-contrast="none">enable </span><span data-contrast="none">the </span><b><span data-contrast="none">observation and understanding of </span></b><b><span data-contrast="none">an </span></b><b><span data-contrast="none">attacker&#8217;s actions</span></b><span data-contrast="none">,</span><span data-contrast="none"> as well as</span> <span data-contrast="none">detecting an intrusion. The difficulty in this case is to configure a decoy that is attractive and credible enough for the </span><span data-contrast="none">attacker to fall into the trap, without delivering information that could compromise a component of our real infrastructure. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">However, </span><b><span data-contrast="none">honeytokens</span></b> <span data-contrast="none">can be more complex and enable the creation of </span><span data-contrast="none">a </span><b><span data-contrast="none">finer and more credible decoy. </span></b><span data-contrast="none">Without honeytokens, the probability of trapping an attacker is lower, and analysis results are not always reliable. The honeytoken&#8217;s dependence on its environment makes it </span><span data-contrast="none">more</span><span data-contrast="none"> attractive </span><span data-contrast="none">in comparison to </span><span data-contrast="none">a honeypot</span><span data-contrast="none">, which represents no more than a trap with no possibility of subsequent escalation. For honeypots to be effective, we recommend deploying one or more complete honeynets,</span><span data-contrast="none"> however it i</span><span data-contrast="none">s important to consider the </span><span data-contrast="none">cost of such an infrastructure. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<h4 style="text-align: justify;" aria-level="3"><span data-contrast="none">Cloud technology development</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1418,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}"> </span></h4>
<p style="text-align: justify;"><span data-contrast="none">Today, the challenge for the most mature </span><b><span data-contrast="none">Deceptive</span></b><span data-contrast="none"> solution vendors is to develop specific services in the </span><b><span data-contrast="none">Cloud</span></b><span data-contrast="none">. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">Indeed, companies are increasingly using the Cloud to </span><b><span data-contrast="none">extend their storage, deploy virtual machines</span></b><span data-contrast="none">, containers and so on. </span><span data-contrast="none">This provision of services is very popular and effective, but at the same time, the interest of cyber-attackers is growing. Templates, or default configurations, make life easier for businesses, but can increase cybersecurity risks. Even though many Cloud providers are making great strides in this area, default configurations don&#8217;t always comply with IT security guidelines. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">The Cloud is therefore a new playground for cyber-attackers. That&#8217;s why we&#8217;re focusing today on adapting our knowledge of Deceptive to </span><b><span data-contrast="none">protect Cloud environments and services too</span></b><span data-contrast="none">. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p> </p>
<h2 style="text-align: justify;" aria-level="1"><span data-contrast="none">Overview of the main publishers on the market</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559738&quot;:240,&quot;335559739&quot;:360,&quot;335559740&quot;:259,&quot;335559991&quot;:567}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="none">It&#8217;s important to note that </span><b><span data-contrast="none">Deceptive</span></b><span data-contrast="none"> is not reserved for overly complex applications. There are </span><b><span data-contrast="none">all kinds of offers on the market</span></b><span data-contrast="none">. Some </span><span data-contrast="none">companies </span><span data-contrast="none">offer services that enable you to obtain a complete </span><span data-contrast="none">off-the-shelf</span><span data-contrast="none"> tool</span><span data-contrast="none">, while others focus on customization, lure quality and therefore the possibility of using their tool to create your own lures (configuration and maintenance not managed by the solution itself). </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">Here&#8217;s an overview of the main publishers and their solutions: </span><span data-contrast="none"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-22363 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/2-1.jpg" alt="" width="1040" height="720" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/2-1.jpg 1040w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/2-1-276x191.jpg 276w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/2-1-56x39.jpg 56w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/2-1-768x532.jpg 768w" sizes="auto, (max-width: 1040px) 100vw, 1040px" /></span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">For some, the current trend is to</span><b><span data-contrast="none"> join forces with other tools </span></b><span data-contrast="none">or integrate their solution with</span><span data-contrast="none"> an</span> <b><span data-contrast="none">EDR</span></b><span data-contrast="none"> (Endpoint Detection and Response) to increase the effectiveness of the technology and meet market needs. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">As mentioned above, the challenge that some have chosen </span><span data-contrast="none">to tackle </span><span data-contrast="none">is to </span><b><span data-contrast="none">adapt to a Cloud environment</span></b><span data-contrast="none">. For example, solutions such as &#8220;</span><span data-contrast="none">Attivo</span><span data-contrast="none"> Networks&#8221;, acquired by </span><span data-contrast="none">SentinelOne</span><span data-contrast="none">, are developing Cloud AWS offers that propose the creation of decoys linked to the service (e.g.: EC2, S3, AWS access keys, etc.). </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p> </p>
<h2 style="text-align: justify;" aria-level="1"><span data-contrast="none">How to build and place decoys?</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559738&quot;:240,&quot;335559739&quot;:360,&quot;335559740&quot;:259,&quot;335559991&quot;:567}"> </span></h2>
<h3 style="text-align: justify;" aria-level="2"><span data-contrast="none">Deceptive </span><span data-contrast="none">strategies</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1418,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="none">Once you&#8217;ve familiarized yourself with this technology and all the possibilities it offers, it</span><span data-contrast="none"> i</span><span data-contrast="none">s worth asking </span><span data-contrast="none">yourself the question, </span><span data-contrast="none">what strategy or strategies you should adopt </span><span data-contrast="none">with regard to</span><span data-contrast="none"> the</span><b><span data-contrast="none"> number of traps and/or decoys to be implemented</span></b><span data-contrast="none">, and </span><b><span data-contrast="none">where</span></b><span data-contrast="none"> they should be placed in the IS. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">To adapt to different use cases, 3 strategies stand out,</span><b><span data-contrast="none"> responding to distinct needs</span></b><span data-contrast="none">:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-22365 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/3-1.jpg" alt="" width="1040" height="720" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/3-1.jpg 1040w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/3-1-276x191.jpg 276w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/3-1-56x39.jpg 56w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/3-1-768x532.jpg 768w" sizes="auto, (max-width: 1040px) 100vw, 1040px" /></span></p>
<p style="text-align: justify;"><span data-contrast="none">Indeed, the Deceptive strategy to be adopted is often tailor-made </span><b><span data-contrast="none">according to the IS infrastructure</span></b><span data-contrast="none"> and, above all, </span><b><span data-contrast="none">according to the priorities and objectives</span></b><span data-contrast="none"> defined beforehand. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><i><span data-contrast="none">By way of example: </span></i><i><span data-contrast="none">if you need to enrich your detection technologies within your IS, it may be worthwhile to study the strategy of &#8220;mass deployment&#8221; of decoys. The aim is to create a phantom IS, thereby increasing the likelihood of the cybercriminal falling into a trap that will trigger an alert to the security teams. </span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p> </p>
<h3 style="text-align: justify;" aria-level="2"><span data-contrast="none">PARCS</span><span data-contrast="none"> matrix</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1418,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="none">The challenge when talking about </span><b><span data-contrast="none">Deceptive</span></b><span data-contrast="none">, and more specifically about lures, is to answer the questions: What is a good lure? How do you create a good lure? Where to place it? How many to place? etc. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">The article &#8220; </span><a href="https://www.cesar-conference.org/wp-content/uploads/2020/12/CESAR2020_070_A-TOURNYOL-du-CLOS_HoneyWISE_v3.pdf"><span data-contrast="none">HoneyWISE : stratégie d’exploitation d’honeytokens en environnement Active Directory</span></a><span data-contrast="none"> &#8221;, written by Augustin TOURNYOL-DU-CLOS and Nathan FAEDDA, proposes a decoy strategy against certain attacks in a specific context: AD (Active Directory). We&#8217;ll also look at honeytokens in comparison with honeypots in the rest of this article. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">The objective</span><span data-contrast="none"> of this study </span><span data-contrast="none">was</span> <span data-contrast="none">to </span><b><span data-contrast="none">simply test the implementation of decoys</span></b><span data-contrast="none"> within the AD and to </span><b><span data-contrast="none">measure their effectiveness</span></b><span data-contrast="none"> using the &#8220;</span><b><span data-contrast="none">PARCS</span></b><span data-contrast="none">&#8221; matrix. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="none">PARCS</span></b><span data-contrast="none"> was</span><span data-contrast="none"> born </span><span data-contrast="none">on the basis of</span> <b><span data-contrast="none">5 criteria</span></b><span data-contrast="none">, originally conceived in the context of an AD environment but applicable to all environments: </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-22367 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/4-1.jpg" alt="" width="1040" height="720" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/4-1.jpg 1040w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/4-1-276x191.jpg 276w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/4-1-56x39.jpg 56w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/4-1-768x532.jpg 768w" sizes="auto, (max-width: 1040px) 100vw, 1040px" /></span></p>
<p style="text-align: justify;"><span data-contrast="none">When designing a decoy, it&#8217;s a good idea to prepare a </span><b><span data-contrast="none">PARCS</span></b><span data-contrast="none"> to </span><b><span data-contrast="none">check your thinking</span></b><span data-contrast="none"> and </span><span data-contrast="none">en</span><span data-contrast="none">sure that it matches your </span><b><span data-contrast="none">expectations</span></b><span data-contrast="none">. </span><span data-contrast="none">It is also important </span><span data-contrast="none">to take into consideration </span><span data-contrast="none">minimum </span><b><span data-contrast="none">requirements</span></b><span data-contrast="none"> illustrated by these 5 criteria: Relevance, Risk, Credibility, Attractiveness and Scalability. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">The objective of this matrix is to determ</span><span data-contrast="none">ine a balance between </span><span data-contrast="none">importance and priority based on these criteria’s </span><span data-contrast="none">(Is the lure&#8217;s attractiveness important in my use case? Do I need a scalable solution? How scalable? etc.). </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p> </p>
<h3 style="text-align: justify;" aria-level="3"><span data-contrast="none">Example of PARCS use: </span><span data-contrast="none">Kerberoasting</span><span data-contrast="none"> scenario &#8220;Stealing or falsifying Kerberos tickets&#8221;</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:852,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="none">Perhaps the best way to illustrate the PARCS matrix presentation is with an example from the &#8220; </span><a href="https://www.cesar-conference.org/wp-content/uploads/2020/12/CESAR2020_070_A-TOURNYOL-du-CLOS_HoneyWISE_v3.pdf"><span data-contrast="none">HoneyWISE</span></a><span data-contrast="none"> &#8221; article. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">The AD attack called </span><b><span data-contrast="none">Kerberoasting</span></b><span data-contrast="none"> is, &#8220;[&#8230;] in synthesis, the offline brute force (no logon failure) of a Kerberos ticket receiving the secret of a service account, without having to send a single packet to this service or even being the local administrator of the compromised workstation&#8221;. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">&#8220;</span><span data-contrast="none">Kerberoasting</span><span data-contrast="none"> [&#8230;]</span><b><span data-contrast="none"> hijacks the native operation of Kerberos</span></b><span data-contrast="none"> in order to carry out an attack. This hijacking takes place on steps 3 and 4 of the Kerberos authentication process, as shown in the following diagram&#8221;</span><span data-contrast="none">:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-22340 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/5.jpg" alt="" width="442" height="264" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/5.jpg 442w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/5-320x191.jpg 320w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/5-65x39.jpg 65w" sizes="auto, (max-width: 442px) 100vw, 442px" /></span></p>
<p style="text-align: justify;"><span data-contrast="none">For this attack case, Augustin TOURNYOL-DU-CLOS and Nathan FAEDDA propose in their </span><a href="https://www.cesar-conference.org/wp-content/uploads/2020/12/CESAR2020_070_A-TOURNYOL-du-CLOS_HoneyWISE_v3.pdf"><span data-contrast="none">article</span></a><span data-contrast="none"> to deploy a honeytoken against </span><span data-contrast="none">Kerberoasting</span><span data-contrast="none"> (see part 2.3 &#8220;Description of detection scenarios&#8221; &#8211; scenario 2). </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">Here is the result, through PARCS, of the study of this type of honeytoken in the context of a </span><span data-contrast="none">Kerberoasting</span><span data-contrast="none"> scenario (16/20):</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="none">P</span></b><span data-contrast="none">ertinence (efficiency): 4/4</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="none">« </span><span data-contrast="none"> The</span><span data-contrast="none"> alerts generated by this honeytoken are reliable. In fact, as soon as a TGS ticket is requested to access an unused and non-existent service, it becomes clear that a malicious action is underway</span><span data-contrast="none">. »</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:993,&quot;335559731&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></li>
</ul>
</li>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><b><span data-contrast="none">A</span></b><span data-contrast="none">ttractivité (attractiveness): 3/4</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><span data-contrast="none">« </span><span data-contrast="none"> The</span><span data-contrast="none"> attractiveness of this token lies in the fact that carrying out the attack does not require any privileges, and can potentially gain privileges while being silent (generation of traffic deemed legitimate). Provided that the account chosen to lure the attacker appears privileged and managed by a user (so that the password is likely to be simple), this honeytoken is highly attractive.</span><span data-contrast="none"> »</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:993,&quot;335559731&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></li>
</ul>
</li>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"><b><span data-contrast="none">R</span></b><span data-contrast="none">isque (risk): 4/4</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="6" data-aria-level="1"><span data-contrast="none">« </span><span data-contrast="none">In our example, a 64-character password has been defined, which cannot be broken in a reasonable time.</span><span data-contrast="none"> »</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:993,&quot;335559731&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></li>
</ul>
</li>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="7" data-aria-level="1"><b><span data-contrast="none">C</span></b><span data-contrast="none">rédibilité (credibility): 3/4</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="8" data-aria-level="1"><span data-contrast="none">« </span><span data-contrast="none"> Subject</span><span data-contrast="none"> to the choice of account name and attributes according to the production context in which it is deployed, since the attack is based on normal Kerberos operation, it should come as no surprise that it can be carried out. </span><span data-contrast="none">Credibility is therefore high. »</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:993,&quot;335559731&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></li>
</ul>
</li>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="9" data-aria-level="1"><b><span data-contrast="none">S</span></b><span data-contrast="none">calabilité (scalability): 2/4</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="10" data-aria-level="1"><span data-contrast="none">« </span><span data-contrast="none"> The</span><span data-contrast="none"> decoy account can be deployed automatically on several domains using scripts. However, for an effective lure, contextualization remains essential and will be the major obstacle to effective mass deployment. The cost of providing this contextualization and keeping it up to date must therefore be taken into </span><span data-contrast="none">account. </span><span data-contrast="none"> »</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:993,&quot;335559731&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></li>
</ul>
</li>
</ul>
<p style="text-align: justify;" aria-level="1"><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559738&quot;:240,&quot;335559739&quot;:360,&quot;335559740&quot;:259,&quot;335559991&quot;:567}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="none">To conclude, Deceptive Security</span></b><span data-contrast="none"> solutions must be considered on a case-by-case basis. It is imperative to determine in advance the objectives to be prioritized, the strategy to be adopted, the scope to be covered, and so on. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">In certain situations, especially for companies with mature IT security systems, it may be appropriate to implement </span><b><span data-contrast="none">Deceptive Security</span></b><span data-contrast="none"> solutions. This is to be applied in addition to standard minimum security tools such as firewalls, antivirus, intrusion detection and/or prevention systems, etc. The aim is to cover</span><b><span data-contrast="none"> all types of cyberattack</span></b><span data-contrast="none"> (&#8220;0-day&#8221; type, with no known pattern).  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">This technology can be difficult to implement for smaller companies, as they may not have the essential security tools in place by default, nor the resources to configure (e.g., design decoys, create strategies and scenarios) and maintain such a solution (e.g., dedicated maintenance teams). </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">Today, the market is expanding, mainly </span><span data-contrast="none">around</span><span data-contrast="none"> detection thanks to Deceptive, but not exclusively. For the time being, however, vendors&#8217; interest in building deceptive solutions is focused on traditional environments. </span><span data-contrast="none">Solutions for Cloud AWS, Azure, etc., are still underdeveloped.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}"> </span></p>
<p> </p>
<p> </p>
<p> </p>
<p><em>Thanks to Augustin TOURNYOL DU CLOS for his contribution to this article.</em></p>
<p> </p>
<p> </p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/01/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy/">Deceptive Security: the solution for effective detection in the cloud? &#8211; your luring strategy. </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/01/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
