{"id":22490,"date":"2024-02-16T17:55:48","date_gmt":"2024-02-16T16:55:48","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=22490"},"modified":"2024-02-16T17:55:50","modified_gmt":"2024-02-16T16:55:50","slug":"deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/02\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud\/","title":{"rendered":"Deceptive Security: the solution for effective detection in the cloud? \u2013 Deceptive use example in AWS cloud\u00a0"},"content":{"rendered":"\n<p><span data-contrast=\"none\">Today, cyber-attacks are part of our daily lives, and are becoming increasingly <\/span><span data-contrast=\"none\">common <\/span><span data-contrast=\"none\"> and sophisticated.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Simultaneously, we are moving towards Information Systems<\/span><span data-contrast=\"none\"> that are<\/span><span data-contrast=\"none\"> built on an ever-increasing diversity of environments, thanks in particular to the <\/span><b><span data-contrast=\"none\">Cloud,<\/span><\/b><span data-contrast=\"none\"> which is now an integral part within corporate Information Systems. This enables <\/span><span data-contrast=\"none\">corporations <\/span><span data-contrast=\"none\">)<\/span> <span data-contrast=\"none\">to expand their capabilities, however it <\/span><span data-contrast=\"none\">is <\/span><span data-contrast=\"none\">also the surface area\u00a0<\/span><span data-contrast=\"none\"> for <\/span><span data-contrast=\"none\">risk<\/span><span data-contrast=\"none\"> of attack<\/span><span data-contrast=\"none\">s<\/span><span data-contrast=\"none\">.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Conventional intrusion detection and protection techniques already exist and are developing exponentially. These are effective against the most common attacks, however are not always adapted to the specificities of the Cloud.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">This raises questions about the use of <\/span><b><span data-contrast=\"none\">proactive strategies<\/span><\/b><span data-contrast=\"none\">, such as <\/span><b><span data-contrast=\"none\">Deceptive Security<\/span><\/b><span data-contrast=\"none\">, to stay one step ahead of attackers. Particularly in the context of Cyber-Resilience<\/span><span data-contrast=\"none\">;<\/span><span data-contrast=\"none\"> how can this kind of technology be used in both a traditional and a cloud environment?\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"none\">When should Deceptive Security techniques be used? Are Deceptive Security solutions in the Cloud being developed today? Are there any specific strategies to consider in a Cloud environment as opposed to a traditional one?\u00a0<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">We will answer these questions in a <\/span><b><span data-contrast=\"none\">mini-series of 2 articles<\/span><\/b><span data-contrast=\"none\">. In the first article, we showed how to develop and evaluate your decoy strategy. In the second article, we\u2019ll present a practical example of deceptive security in AWS. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p aria-level=\"1\">\u00a0<\/p>\n<h2 aria-level=\"1\"><span data-contrast=\"none\">Initial assumptions and choice of scenario\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><span data-contrast=\"none\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">Thanks to Wavestone&#8217;s expertise and the resources shared by our CyberLab, we have designed a simple scenario to illustrate the use of decoys <\/span><b><span data-contrast=\"none\">in an AWS Cloud environment<\/span><\/b><span data-contrast=\"none\">. The example detailed below is inspired by a CTF (Capture The Flag) scenario designed by the CyberLab team to illustrate the lateral propagation of an attacker.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">As in the previous scenarios, <\/span><b><span data-contrast=\"none\">where we used Deceptive <\/span><\/b><b><span data-contrast=\"none\">Security <\/span><\/b><b><span data-contrast=\"none\">for the detection of attackers already introduced into the IS<\/span><\/b><span data-contrast=\"none\">, the aim is once again to avoid attracting opportunistic attackers to our network with a &#8220;search&#8221; Deceptive<\/span><span data-contrast=\"none\"> Security<\/span><span data-contrast=\"none\"> approach. We therefore assume an initial infection of some kind, which is highly probable (all the more so in poorly controlled Cloud environments), and concentrate on detecting the intruder as it is being deployed <\/span><span data-contrast=\"none\">in<\/span><span data-contrast=\"none\">to <\/span><span data-contrast=\"none\"> the network.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Applying this approach to an AWS environment is no innocent matter. One of the benefits of the Cloud lies in its simplified identity management and easy delegation of access, but <\/span><b><span data-contrast=\"none\">this asset can turn to the advantage of attackers<\/span><\/b><span data-contrast=\"none\"> in the event of unintentional exposure of resources<\/span><span data-contrast=\"none\">,<\/span><span data-contrast=\"none\"> or the creation of dangerous links between zones of different security levels. There is no shortage of hardening and prevention measures, generously promoted by Cloud providers themselves, but these vulnerabilities remain <\/span><span data-contrast=\"none\">in <\/span><span data-contrast=\"none\">poorly hardened accounts and subscriptions, whose administration too often obeys rules that are still informal.\u00a0 <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">The attack scenario<\/span><\/b> <b><span data-contrast=\"none\">and associated luring will therefore be based on the principle of linking two AWS accounts<\/span><\/b><span data-contrast=\"none\">, here conceived as a production environment and a less critical development environment. We&#8217;ll place ourselves in a scenario where an approval relationship is used to propagate from the development account to the production account, via the endorsement of a cross-account role.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p>\u00a0<\/p>\n<h2 aria-level=\"1\"><span data-contrast=\"none\">Luring scenario\u00a0<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<h3 aria-level=\"2\"><span data-contrast=\"none\">Description of the scenario\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">Let&#8217;s assume that <\/span><b><span data-contrast=\"none\">an unauthorized user has gained access to an EC2 machine<\/span><\/b><span data-contrast=\"none\"> (domainIntegrated-EC2) within the test account (initial infection). After an initial successful connection,\u00a0<\/span><span data-contrast=\"none\"> they <\/span><span data-contrast=\"none\"> attempt<\/span><span data-contrast=\"none\"> to access commonly used resources such as Amazon Simple Storage Service (Amazon S3), or <\/span><b><span data-contrast=\"none\">tries to elevate <\/span><\/b><b><span data-contrast=\"none\">their <\/span><\/b><b><span data-contrast=\"none\"> privileges<\/span><\/b><span data-contrast=\"none\"> by assuming other roles (role chaining) related to the role to which <\/span><span data-contrast=\"none\">they have <\/span><span data-contrast=\"none\"> access.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">This lateral propagation scenario is a common attack technique in cloud environments<\/span><\/b><span data-contrast=\"none\"> due to the nature of their architecture and the cloud computing responsibility model, where the customer is responsible for securing their applications, data and access control (while the provider ensures the security of the underlying infrastructure).<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">As illustrated below, <\/span><b><span data-contrast=\"none\">lateral propagation attacks take advantage of weaknesses in the customer&#8217;s security controls<\/span><\/b><span data-contrast=\"none\">, such as misconfigured authorizations or the application of too-weak authentication mechanisms, to gain unauthorized access to other resources in the environment.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-22454 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/1.jpg\" alt=\"\" width=\"1269\" height=\"655\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/1.jpg 1269w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/1-370x191.jpg 370w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/1-71x37.jpg 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/1-768x396.jpg 768w\" sizes=\"auto, (max-width: 1269px) 100vw, 1269px\" \/><br \/><i><span data-contrast=\"none\">Scenario from the attacker&#8217;s point of view<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:1135,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:1135,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">0. After compromising a &#8220;domainIntegrated&#8221; EC2 machine, the attacker discovers that it has a role associated with it (&#8220;Semi-Admin-role&#8221;): <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-22456 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/2.jpg\" alt=\"\" width=\"1242\" height=\"125\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/2.jpg 1242w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/2-437x44.jpg 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/2-71x7.jpg 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/2-768x77.jpg 768w\" sizes=\"auto, (max-width: 1242px) 100vw, 1242px\" \/>\u00a0<br \/><i><span data-contrast=\"none\">Enumeration of EC2 machine domainIntegrated<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:720,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">It then lists the rights of the &#8220;Semi-Admin-Role&#8221;:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1135,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}\">\u00a0<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-22458 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/3.jpg\" alt=\"\" width=\"1172\" height=\"544\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/3.jpg 1172w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/3-411x191.jpg 411w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/3-71x33.jpg 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/3-768x356.jpg 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/3-1170x544.jpg 1170w\" sizes=\"auto, (max-width: 1172px) 100vw, 1172px\" \/>\u00a0<br \/><i><span data-contrast=\"none\">Enumeration of Semi-Admin-Role rights<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:720,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">First, this role has <\/span><b><span data-contrast=\"none\">modification privileges <\/span><\/b><span data-contrast=\"none\">on a resource in the &#8220;AWS &#8211; SHARED&#8221; account: it can assume (sts:assumeRole) and modify (iam:UpdateRole) a role called &#8220;LambdaAuto&#8221;. He can then assume (by &#8220;role chaining&#8221;, step 5 in the diagram above) another role called &#8220;SecurityAudit&#8221; in a different account, called AWS MASTER.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">The attacker also realizes that <\/span><span data-contrast=\"none\">they <\/span> <b><span data-contrast=\"none\">can directly assume another role<\/span><\/b><span data-contrast=\"none\"> (&#8220;IAM-RO-Role&#8221;) in the AWS &#8211; MASTER account. This latter role attracts particular attention, as the MASTER account&#8217;s name suggests a <\/span><b><span data-contrast=\"none\">much greater scope of action<\/span><\/b><span data-contrast=\"none\"> than the simple SHARED account, and the IAM-RO-Role role suggests an extended scope of vision over the account&#8217;s resources.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1135,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}\">\u00a0<\/span><\/p>\n<ol>\n<li><span data-contrast=\"none\">The attacker assumes the &#8220;SemiAdmin-role&#8221;, which then allows <\/span><span data-contrast=\"none\">the<\/span><span data-contrast=\"none\">m <\/span><span data-contrast=\"none\"> to assume the &#8220;IAM-RO&#8221; role and attempt other actions that will enable <\/span><span data-contrast=\"none\">them<\/span><span data-contrast=\"none\"> to analyze <\/span><span data-contrast=\"none\">their<\/span><span data-contrast=\"none\"> field of vision.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1\" data-font=\"Tahoma\" data-listid=\"24\" data-list-defn-props=\"{&quot;335551671&quot;:0,&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Indeed, after assuming the &#8220;IAM-RO&#8221; role, he proceeds to an IAM enumeration where <\/span><span data-contrast=\"none\">they<\/span><span data-contrast=\"none\"> becomes aware of the roles and users in <\/span><span data-contrast=\"none\">their<\/span><span data-contrast=\"none\"> field of vision:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><br \/><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-22460 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/4.jpg\" alt=\"\" width=\"1260\" height=\"294\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/4.jpg 1260w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/4-437x102.jpg 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/4-71x17.jpg 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/4-768x179.jpg 768w\" sizes=\"auto, (max-width: 1260px) 100vw, 1260px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">List of roles in the field of view of the IAM-RO role\u00a0<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:1135,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:1135,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-22462 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/5.jpg\" alt=\"\" width=\"1222\" height=\"213\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/5.jpg 1222w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/5-437x76.jpg 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/5-71x12.jpg 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/5-768x134.jpg 768w\" sizes=\"auto, (max-width: 1222px) 100vw, 1222px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">List of users in the field of view of the IAM-RO role\u00a0<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:720,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">The &#8220;SecurityAudit&#8221; role in particular attracts <\/span><span data-contrast=\"none\">their<\/span><span data-contrast=\"none\"> attention thanks to the <\/span><b><span data-contrast=\"none\">privileges<\/span><\/b><span data-contrast=\"none\"> that this name suggests and the role description, which provides information on these privileges:\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:491,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-22464 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/6.jpg\" alt=\"\" width=\"1264\" height=\"76\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/6.jpg 1264w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/6-437x26.jpg 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/6-71x4.jpg 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/6-768x46.jpg 768w\" sizes=\"auto, (max-width: 1264px) 100vw, 1264px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">SecurityAudit role description<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:207,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">However, the attacker only has read access to the resources listed. <\/span><span data-contrast=\"none\">They <\/span><span data-contrast=\"none\"> will therefore look to see if any of these resources can be written to from the SHARED account, where <\/span><span data-contrast=\"none\">they<\/span> <span data-contrast=\"none\">have<\/span> <span data-contrast=\"none\">high privileges. For example, if certain MASTER account roles can be endorsed by SHARED account roles:\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-22466 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/7.jpg\" alt=\"\" width=\"1266\" height=\"181\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/7.jpg 1266w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/7-437x62.jpg 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/7-71x10.jpg 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/7-768x110.jpg 768w\" sizes=\"auto, (max-width: 1266px) 100vw, 1266px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">List of roles that can be assumed from an external account (here the SHARED account)<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:1135,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">The attacker investigates the approval relationship of the &#8220;SecurityAudit&#8221; role, which authorizes an endorsement by the &#8220;LambdaAuto&#8221; role of the SHARED account.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:284,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">0. Back on the SHARED account, all the attacker has to do is check that the other counterpart of this approval relationship, i.e. that the &#8220;LambdaAuto&#8221; role does indeed authorize the &#8220;SecurityAudit&#8221; role&#8217;s endorsement in its approval policy. This is not the case, but the &#8220;SemiAdminRole&#8221; role allows it to configure this authorization.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">1.Once the &#8220;LambdaAuto&#8221; role approval policy has been modified, it can now assume the &#8220;LambdaAuto&#8221; role.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">2. Then <\/span><span data-contrast=\"none\">they <\/span><span data-contrast=\"none\"> take<\/span><span data-contrast=\"none\"> on (by role-chaining) the role of &#8220;SecurityAudit&#8221;, the real decoy.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-22468 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/8.jpg\" alt=\"\" width=\"1265\" height=\"634\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/8.jpg 1265w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/8-381x191.jpg 381w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/8-71x36.jpg 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/8-768x385.jpg 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/8-800x400.jpg 800w\" sizes=\"auto, (max-width: 1265px) 100vw, 1265px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">Role chaining of the attacker<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">After attempting to take on the &#8220;SecurityAudit&#8221; role, from which <\/span><span data-contrast=\"none\">they<\/span><span data-contrast=\"none\"> hope<\/span><span data-contrast=\"none\"> to gain the privileges of a security auditor (announced in step 1), the attacker in reality finds <\/span><span data-contrast=\"none\">themself<\/span><span data-contrast=\"none\"> without any real powers, for example :<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:207,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-22470 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/9.jpg\" alt=\"\" width=\"1267\" height=\"78\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/9.jpg 1267w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/9-437x27.jpg 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/9-71x4.jpg 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/9-768x47.jpg 768w\" sizes=\"auto, (max-width: 1267px) 100vw, 1267px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">Example of denied access from the SecurityAudit\u00a0<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:491,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;335559991&quot;:284}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"2\"><span data-contrast=\"none\">Creating lures<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1418,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">The diagram below shows how decoys are added at different stages of the attack and how they are configured by the defender:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-22472 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/10.jpg\" alt=\"\" width=\"1278\" height=\"744\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/10.jpg 1278w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/10-328x191.jpg 328w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/10-67x39.jpg 67w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/10-120x70.jpg 120w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/10-768x447.jpg 768w\" sizes=\"auto, (max-width: 1278px) 100vw, 1278px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">Scenario from the defender&#8217;s point of view\u00a0<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:1135,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;335559991&quot;:284}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:1135,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">0.The &#8220;Semi-Admin-Role&#8221; is the <\/span><b><span data-contrast=\"none\">entry point<\/span><\/b><span data-contrast=\"none\"> into the decoy scenario. It can therefore be associated with any resource likely to be compromised (here the EC2 &#8220;domainIntegrated&#8221;) to redirect the attacker to the decoys.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">No alerts are configured at this level, as the Semi-Admin role&#8217;s connection to all SHARED account resources makes it likely that unintentional endorsements will be triggered, resulting in false-positive alerts.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}\">\u00a0<\/span><\/p>\n<ol>\n<li data-leveltext=\"%1\" data-font=\"Tahoma\" data-listid=\"19\" data-list-defn-props=\"{&quot;335551671&quot;:0,&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Once the IAM-RO role has been assumed, the attacker is then invited into an account entirely dedicated to luring and <\/span><span data-contrast=\"none\">familiarising<\/span> <span data-contrast=\"none\">themselves <\/span><span data-contrast=\"none\"> with the surrounding resources, <\/span><b><span data-contrast=\"none\">gaining a complete overview of all the account&#8217;s roles and users.<\/span><\/b><span data-contrast=\"none\">\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1\" data-font=\"Tahoma\" data-listid=\"19\" data-list-defn-props=\"{&quot;335551671&quot;:0,&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">By populating the attacker&#8217;s field of vision not only with the main &#8220;SecurityAudit&#8221; decoy, but also with other dummy roles and users, we ensure that the account&#8217;s appearance appears credible and that our key decoy, the SecurityAudit role, is not isolated.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><span data-contrast=\"none\">We thus add to the account :\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"o\" data-font=\"Courier New\" data-listid=\"16\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:1080,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"2\"><span data-contrast=\"none\">Users\u202f: different user names attracting the attacker.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1094,&quot;335559739&quot;:96,&quot;335559740&quot;:259,&quot;335559746&quot;:40}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"o\" data-font=\"Courier New\" data-listid=\"16\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:1080,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"2\"><span data-contrast=\"none\">The &#8220;LambdaFunction&#8221; role: this role is created to simulate a Lambda function that calls on AWS services.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1094,&quot;335559739&quot;:96,&quot;335559740&quot;:259,&quot;335559746&quot;:40}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"o\" data-font=\"Courier New\" data-listid=\"16\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:1080,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"2\"><span data-contrast=\"none\">The &#8220;LogsAndS3Bucket&#8221; role: a role created to facilitate access to logging services and S3 storage resources within the account.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1094,&quot;335559739&quot;:96,&quot;335559740&quot;:259,&quot;335559746&quot;:40}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"o\" data-font=\"Courier New\" data-listid=\"16\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:1080,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"2\"><span data-contrast=\"none\">The &#8220;taskExecutionRole&#8221;: the task execution role that can be used for different purposes and services associated with the account.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1094,&quot;335559739&quot;:96,&quot;335559740&quot;:259,&quot;335559746&quot;:40}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"none\">3.\u00a0 The &#8220;SemiAdminRole&#8221; role has deliberately been configured with permission (iam:UpdateRole) on the &#8220;LambdaAuto&#8221; role, enabling it to modify this role and thus add the approval relationship to the &#8220;SemiAdminRole&#8221; role. For monitoring purposes, an initial alert can be triggered at this level when the &#8220;LambdaAuto&#8221; approval relationship is updated, enabling the &#8220;SemiAdminRole&#8221; to assume it.\u00a0 <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span style=\"color: initial;\" data-contrast=\"none\">4. The &#8220;LambdaAuto&#8221; role is deliberately created as the gateway to the &#8220;SecurityAudit&#8221; role, once its approval relationship has been modified using the privileges of the &#8220;SeminAdminRole&#8221; role.<\/span><span style=\"color: initial;\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">5. The &#8220;SecurityAudit&#8221; role is deliberately configured with an approval relationship authorizing the &#8220;LambdaAuto&#8221; role of the SHARED account to assume it.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">6. At this stage, the attacker had assumed that <\/span><span data-contrast=\"none\">they <\/span><span data-contrast=\"none\"> would be granted security auditor rights. However, a very restrictive Security Control Policy (SCP) was applied, granting <\/span><span data-contrast=\"none\">them <\/span><span data-contrast=\"none\">no privileges on the account.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p>\u00a0<br \/><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:207,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-22474 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/11.jpg\" alt=\"\" width=\"1031\" height=\"539\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/11.jpg 1031w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/11-365x191.jpg 365w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/11-71x37.jpg 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/11-768x402.jpg 768w\" sizes=\"auto, (max-width: 1031px) 100vw, 1031px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">The policy prohibiting all actions from the Security-Audit-Role<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:-304,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"1\">\u00a0<\/h2>\n<h2 aria-level=\"1\"><span data-contrast=\"none\">Alerting chain<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559738&quot;:240,&quot;335559739&quot;:360,&quot;335559740&quot;:259,&quot;335559991&quot;:567}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">An alerting chain in the AWS cloud refers to a means of communicating notifications or alerts generated by AWS services to users or teams responsible for managing these services, enabling them to take rapid action to resolve problems and minimize service interruptions.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:284,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:284,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">To set up an alerting chain, you first need to configure AWS services to generate alerts when certain events occur, such as<\/span><span data-contrast=\"none\">,<\/span><span data-contrast=\"none\"> a server down or an application exceeding a specific CPU usage threshold. Once these alerts have been generated, they can be sent to the appropriate alerting chain according to the notification preferences configured by the user or the team responsible for managing the service.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:284,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">In order to detect the attacker, we use the following AWS services to create the alerting chain:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1135,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:644,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><a href=\"bookmark:\/\/_CloudTrail\"><b><span data-contrast=\"none\">CloudTrail<\/span><\/b><\/a><span data-contrast=\"none\"> l to track actions performed on the compromised AWS account;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:644,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"none\">EventBridge<\/span><\/b><span data-contrast=\"none\"> to detect any &#8220;AssumeRole&#8221; event of the &#8220;SecurityAudit&#8221; role and trigger an alert\u202f;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:644,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><a href=\"bookmark:\/\/_SNS_-_Simple\"><span data-contrast=\"none\">Simple Notification Service (SNS<\/span><\/a><span data-contrast=\"none\">)<\/span><span data-contrast=\"none\"> to send the alert by e-mail with the information gathered during the attack.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:567,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-22476 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/12.jpg\" alt=\"\" width=\"1255\" height=\"629\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/12.jpg 1255w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/12-381x191.jpg 381w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/12-71x36.jpg 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/12-768x385.jpg 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/12-800x400.jpg 800w\" sizes=\"auto, (max-width: 1255px) 100vw, 1255px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">Illustration of the alerting chain<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:567,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"2\"><span data-contrast=\"none\">Alerting chain creation steps :\u00a0<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1418,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}\">\u00a0<\/span><\/h3>\n<h4 aria-level=\"3\"><span data-contrast=\"none\">Cloudtrail configuration\u00a0<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1418,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}\">\u00a0<\/span><\/h4>\n<p><span data-contrast=\"none\">The first step in creating an alerting chain on AWS is to enable CloudTrail (if not already activated) in your AWS account. CloudTrail logs all activity and API calls in your account, which can be useful for security, compliance and troubleshooting purposes.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Based on the logs generated in CloudTrail, we&#8217;ve created an EventBridge rule that sends notifications to the SNS service whenever the &#8220;SecurityAudit&#8221; role is assumed (event type: AssumeRole).<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h4 aria-level=\"3\"><span data-contrast=\"none\">Creation of an EventBridge rule<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1418,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}\">\u00a0<\/span><\/h4>\n<p><span data-contrast=\"none\">A rule monitors specific types of events, and when a corresponding event occurs, it is routed to the service associated with the rule and handling the event (in this case, the SNS service).\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:144,&quot;335559740&quot;:259,&quot;335559746&quot;:60}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">The event model detects all events of the &#8220;AssumeRole&#8221; type occurring in the account used and triggers the alert. In order to avoid false positives when triggering alerts, we have refined the event model to be as accurate as possible for the events we are interested in.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:144,&quot;335559740&quot;:259,&quot;335559746&quot;:60}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">This means including relevant fields, such as event source, detail type or specific values, to refine the matching criteria. This reduces the risk of unrelated events triggering the rule.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:144,&quot;335559740&quot;:259,&quot;335559746&quot;:60}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-22478 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/13.jpg\" alt=\"\" width=\"1013\" height=\"448\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/13.jpg 1013w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/13-432x191.jpg 432w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/13-71x31.jpg 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/13-768x340.jpg 768w\" sizes=\"auto, (max-width: 1013px) 100vw, 1013px\" \/><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">The event model detecting all &#8220;AssumeRole&#8221; events on the &#8220;SecurityAudit&#8221; role<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:1135,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">The Eventbridge service must therefore first be linked to the SNS target.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-22480 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/14.jpg\" alt=\"\" width=\"1157\" height=\"154\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/14.jpg 1157w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/14-437x58.jpg 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/14-71x9.jpg 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/14-768x102.jpg 768w\" sizes=\"auto, (max-width: 1157px) 100vw, 1157px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">The target related to the EventBridge rule<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:1135,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}\">\u00a0<\/span><\/p>\n<h4 aria-level=\"3\"><span data-contrast=\"none\">SNS rubric configuration\u00a0<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1418,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}\">\u00a0<\/span><\/h4>\n<p><span data-contrast=\"none\">At this stage, an SNS topic is created and linked to a subscription of an e-mail endpoint authenticated later. The SNS topic will be the target of the EventBridge rule. Once the topic has been created, the e-mail subscription is carried out by selecting the e-mail address as the protocol (endpoint) where the alerts are to be received.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"none\">Other targets than e-mail could be considered for receiving alerts (ServiceNow, SIEM, etc.).<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span>\u00a0<br \/><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-22482 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/15.jpg\" alt=\"\" width=\"883\" height=\"339\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/15.jpg 883w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/15-437x168.jpg 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/15-71x27.jpg 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/15-768x295.jpg 768w\" sizes=\"auto, (max-width: 883px) 100vw, 883px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">Details of the SNS rubric<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:1135,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:491,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}\">\u00a0<\/span><\/p>\n<p aria-level=\"3\"><strong>Alert customization\u00a0\u00a0<\/strong><\/p>\n<p><span data-contrast=\"none\">EventBridge&#8217;s Input Transformer function was used to customize the content of the alert, so that only the most important elements were displayed.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">It allows you to customize the text of an event before it is transmitted to the target.\u00a0 This is achieved by defining JSON variables to reference values in the original event source.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p aria-level=\"4\"><b><span data-contrast=\"none\">Input transformer configuration\u00a0<\/span><\/b><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">In our case, the variables listed below will constitute the alert message:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-22484 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/16.jpg\" alt=\"\" width=\"992\" height=\"529\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/16.jpg 992w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/16-358x191.jpg 358w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/16-71x39.jpg 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/16-768x410.jpg 768w\" sizes=\"auto, (max-width: 992px) 100vw, 992px\" \/><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">Input transformer creation<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:568,&quot;335559731&quot;:284,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:284,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p aria-level=\"4\"><b><span data-contrast=\"none\">Input model<\/span><\/b><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">The input model will use the variables defined previously within the final alert message:\u00a0<\/span><span data-contrast=\"none\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-22486 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/17.jpg\" alt=\"\" width=\"1275\" height=\"245\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/17.jpg 1275w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/17-437x84.jpg 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/17-71x14.jpg 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/17-768x148.jpg 768w\" sizes=\"auto, (max-width: 1275px) 100vw, 1275px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">Input model creation<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:568,&quot;335559731&quot;:284,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Once the &#8220;SecurityAudit&#8221; role has been endorsed, an alert is sent to the endpoint created:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:284,&quot;335559738&quot;:120,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:284}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-22488 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/18.jpg\" alt=\"\" width=\"1267\" height=\"431\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/18.jpg 1267w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/18-437x149.jpg 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/18-71x24.jpg 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/02\/18-768x261.jpg 768w\" sizes=\"auto, (max-width: 1267px) 100vw, 1267px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">Example of e-mail alert content<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:284,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:284,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">Cost of the AWS services used\u00a0<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">AWS offers a pay-per-use approach to pricing its cloud services. With AWS, you only pay for the services you need, as long as you continue to use them, without a long-term contract. You only pay for the services you use, and if you stop using them, you won&#8217;t be charged any additional costs or termination fees.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">The services deployed in this scenario are not intended to be used except in the event of an intrusion or security incident. The associated costs are therefore negligible.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p>\u00a0<\/p>\n<h2 aria-level=\"1\"><span data-contrast=\"none\">Decoy evaluation with the PARCS matrix<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559738&quot;:240,&quot;335559739&quot;:360,&quot;335559740&quot;:259,&quot;335559991&quot;:567}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">Several criteria can be used to evaluate a lure, and here are the results of our analysis based on the PARCS matrix:\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"none\">P<\/span><\/b><span data-contrast=\"none\">ertinence (efficiency)\u202f: 4\/4<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"none\">\u00ab\u00a0 Various approaches can be adopted to effectively spot the initial compromise of an EC2 instance and the lateral propagation of an attacker<\/span><span data-contrast=\"none\">.<\/span><span data-contrast=\"none\"> In our context, depending on the resources at our disposal, one possible strategy is to monitor operations by analyzing logs, which will enable malicious actions to be detected. These observations could then be used to generate alerts for administrators. For example, an alert could be triggered in the event of an intrusion attempt via a brute force attack on the RDP service of EC2 instances within our AWS environment, thanks to GuardDuty.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:360,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">In addition, it would be possible to use a combination of AWS services such as CloudTrail and EventBridge to establish detection rules and automate interventions in response to specific activities, including those related to cross-account access, and create detection rules that monitor all endorsement events to trigger actions in the event of corresponding events. <\/span><span data-contrast=\"none\">\u00bb<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:360,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"none\">A<\/span><\/b><span data-contrast=\"none\">ttractivit\u00e9\u202f(attractiveness): 4\/4<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"none\">\u00ab The decoy is distinguished by a dedicated account, significantly increasing its power of attraction. By having access to the metadata of all the resources within <\/span><span data-contrast=\"none\">their <\/span><span data-contrast=\"none\"> reach, the attacker can also verify various levels of privilege, which substantially enhances credibility. Thanks to the ability to visualize the dates and times of the last uses of resources in <\/span><span data-contrast=\"none\">their<\/span><span data-contrast=\"none\"> field of vision, <\/span><span data-contrast=\"none\">they<\/span><span data-contrast=\"none\"> can deduce that these resources are rarely used. With this in mind, a lambda function is implemented to automate the execution of various resources or their authentication, thus guaranteeing proof of recent use. \u202f\u00bb<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:360,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"none\">R<\/span><\/b><span data-contrast=\"none\">isque\u202f(risk): 4\/4<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"none\">\u00ab <\/span><span data-contrast=\"none\">The authorization granted to the IAM-RO role only confers IAM privileges to the attacker in the context of a purely fictitious account. Thanks to appropriate configuration of the upstream SCP, any attempted actions by the Security-Audit role will also be thwarted. The only elements deliberately introduced in a real environment are the Semi-Admin and Lambda-Auto roles, which are subject to stringent policies preventing any assignment of rights or privileges in the event of attempted malicious use. These policies include read-only access (IAMReadOnlyAccess) and a restriction preventing any modification of account role authorizations, as defined by the SCP<\/span><span data-contrast=\"none\">. \u00bb<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:360,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:360,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><b><span data-contrast=\"none\">C<\/span><\/b><span data-contrast=\"none\">r\u00e9dibilit\u00e9\u202f (credibility): 3\/4<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"none\">\u00ab <\/span><span data-contrast=\"none\">The credibility of the decoy may be called into question by the resources available to it and potential limitations, such as an Inline Policy that restricts permissions and possible actions. It&#8217;s important to take these factors into account, as they can create doubts in attackers and compromise the decoy&#8217;s effectiveness. It is therefore crucial to put in place measures that make the decoy as realistic and convincing as possible, ensuring that it has access to the relevant resources and authorizations to create a credible scenario. <\/span><span data-contrast=\"none\">\u00bb<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:360,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:360,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><b><span data-contrast=\"none\">S<\/span><\/b><span data-contrast=\"none\">calabilit\u00e9 (scalability)\u202f: 3\/4<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"none\">\u00ab <\/span><span data-contrast=\"none\">Depending on the size of an infrastructure, it may be possible to implement fluid deployment and maintenance of components, thanks to the use of automated scripts empowered to perform operations on resources. However, careful monitoring of all resources is essential to consolidate security in the face of possible attacks, and to ensure rapid reaction to defend an extended perimeter.<\/span><span data-contrast=\"none\">\u00bb<\/span><span data-contrast=\"none\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:360,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559738&quot;:240,&quot;335559739&quot;:360,&quot;335559740&quot;:259,&quot;335559991&quot;:567}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">In conclusion, implementing such a Deceptive Security scenario in the Cloud, offers an approach to improving its overall security. It helps restrict an attacker&#8217;s ability to explore and propagate across the network<\/span><span data-contrast=\"none\">,<\/span><span data-contrast=\"none\"> by presenting deceptive paths, delaying their progress and enabling faster detection and response. Decoys, which resemble attractive targets, divert attackers&#8217; attention and resources away from real assets, increasing the chances of early detection.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">In addition, alert mechanisms play a crucial role in providing rapid information on potential intrusions to security teams, enabling rapid incident response and limiting the impact of attacks.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Combining these <\/span><span data-contrast=\"none\">defence<\/span> <span data-contrast=\"none\">strategies strengthens the overall security posture of Cloud environments, improves their resilience in the face of constantly evolving cyber threats, and guarantees the integrity and confidentiality of sensitive data.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">By using these deceptive security measures, companies can strengthen their <\/span><span data-contrast=\"none\">defence<\/span> <span data-contrast=\"none\">against cyberattacks. However, it is important to note that Deceptive Security does not replace existing standard cybersecurity solutions, and that protection against cyberattacks requires the use of complementary security techniques for optimal defense.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p>\u00a0<\/p>\n<h3 aria-level=\"1\"><span data-contrast=\"none\">ANNEX &#8211; <\/span><span data-contrast=\"none\">AWS Services <\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559738&quot;:240,&quot;335559739&quot;:360,&quot;335559740&quot;:259,&quot;335559991&quot;:567}\">\u00a0<\/span><\/h3>\n<p><i><span data-contrast=\"none\">Definitions from source\u202f: AWS documentation \u2192 <\/span><\/i><i><span data-contrast=\"none\">docs.aws.amazon.com<\/span><\/i><i><span data-contrast=\"none\">.<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">SCP &#8211; Service control policies : Service control policies are a type of policy that enable central control of authorizations. This ensures that broad guidelines are followed for all AWS accounts in the organization.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">EC2 &#8211; Elastic Compute Cloud : AWS EC2 allows you to rent servers (EC2 instances) to best meet your workload needs.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">STS &#8211; Security Token Service : AWS STS enables you to request temporary security credentials for AWS resources. This makes it possible to grant temporary access to resources via API calls, the AWS console or the AWS CLI (Console Line Interface).\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Please note: Each STS token has a lifecycle, defined when it is created, of between 15 minutes and 36 hours.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">CloudTrail : AWS CloudTrail is a service that records the actions performed by an AWS user, role or service.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Fonction Lambda : The Lambda function is a service for executing code.<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">SNS &#8211; Simple Notification Service<\/span><span data-contrast=\"none\"> : <\/span><span data-contrast=\"none\">Amazon SNS is a web service for managing the sending of messages (SMS, e-mail, HTTP.S, etc.).<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:450,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"none\">Thanks to <\/span><\/i><i><span data-contrast=\"none\"> Charles BULABULA<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><i><span data-contrast=\"none\">\u00a0for his contribution to this article.<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today, cyber-attacks are part of our daily lives, and are becoming increasingly common and sophisticated.\u00a0\u00a0\u00a0 Simultaneously, we are moving towards Information Systems that are built on an ever-increasing diversity of environments, thanks in particular to the Cloud, which is now&#8230;<\/p>\n","protected":false},"author":1292,"featured_media":22384,"comment_status":"open","ping_status":"closed","sticky":true,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3977],"tags":[3358,3208,3129],"coauthors":[2863,4341],"class_list":["post-22490","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-focus","tag-aws-en","tag-cloud-en","tag-deceptive-security-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Deceptive Security: the solution for effective detection in the cloud? \u2013 Deceptive use example in AWS cloud\u00a0 - RiskInsight<\/title>\n<meta name=\"description\" content=\"Today, cyber-attacks are part of our daily lives, and are becoming increasingly common and sophisticated.\u00a0\u00a0\u00a0Simultaneously, we are moving towards Information Systems that are built on an ever-increasing diversity of environments, thanks in particular to the Cloud, which is now an integral part within corporate Information Systems. This enables corporations ) to expand their capabilities, however it is also the surface area\u00a0 for risk of attacks.\u00a0\u00a0\u00a0Conventional intrusion detection and protection techniques already exist and are developing exponentially. These are effective against the most common attacks, however are not always adapted to the specificities of the Cloud.\u00a0\u00a0\u00a0This raises questions about the use of proactive strategies, such as Deceptive Security, to stay one step ahead of attackers. Particularly in the context of Cyber-Resilience; how can this kind of technology be used in both a traditional and a cloud environment?\u00a0\u00a0\u00a0When should Deceptive Security techniques be used? Are Deceptive Security solutions in the Cloud being developed today? Are there any specific strategies to consider in a Cloud environment as opposed to a traditional one?\u00a0\u00a0We will answer these questions in a mini-series of 2 articles. In the first article, we showed how to develop and evaluate your decoy strategy. In the second article, we\u2019ll present a practical example of deceptive security in AWS. \u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/02\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Deceptive Security: the solution for effective detection in the cloud? \u2013 Deceptive use example in AWS cloud\u00a0 - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Today, cyber-attacks are part of our daily lives, and are becoming increasingly common and sophisticated.\u00a0\u00a0\u00a0Simultaneously, we are moving towards Information Systems that are built on an ever-increasing diversity of environments, thanks in particular to the Cloud, which is now an integral part within corporate Information Systems. This enables corporations ) to expand their capabilities, however it is also the surface area\u00a0 for risk of attacks.\u00a0\u00a0\u00a0Conventional intrusion detection and protection techniques already exist and are developing exponentially. These are effective against the most common attacks, however are not always adapted to the specificities of the Cloud.\u00a0\u00a0\u00a0This raises questions about the use of proactive strategies, such as Deceptive Security, to stay one step ahead of attackers. Particularly in the context of Cyber-Resilience; how can this kind of technology be used in both a traditional and a cloud environment?\u00a0\u00a0\u00a0When should Deceptive Security techniques be used? Are Deceptive Security solutions in the Cloud being developed today? Are there any specific strategies to consider in a Cloud environment as opposed to a traditional one?\u00a0\u00a0We will answer these questions in a mini-series of 2 articles. In the first article, we showed how to develop and evaluate your decoy strategy. In the second article, we\u2019ll present a practical example of deceptive security in AWS. \u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/02\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-16T16:55:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-16T16:55:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/couv1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Etienne Lafore, Pierre LALIN\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Etienne Lafore, Pierre LALIN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"20 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/02\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/02\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud\/\"},\"author\":{\"name\":\"Etienne Lafore\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/00ee9607d2b8cd5205bfe63b482a2b14\"},\"headline\":\"Deceptive Security: the solution for effective detection in the cloud? \u2013 Deceptive use example in AWS cloud\u00a0\",\"datePublished\":\"2024-02-16T16:55:48+00:00\",\"dateModified\":\"2024-02-16T16:55:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/02\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud\/\"},\"wordCount\":3101,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/02\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/couv1.png\",\"keywords\":[\"AWS\",\"cloud\",\"Deceptive security\"],\"articleSection\":[\"Focus\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/02\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/02\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/02\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud\/\",\"name\":\"Deceptive Security: the solution for effective detection in the cloud? \u2013 Deceptive use example in AWS cloud\u00a0 - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/02\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/02\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/couv1.png\",\"datePublished\":\"2024-02-16T16:55:48+00:00\",\"dateModified\":\"2024-02-16T16:55:50+00:00\",\"description\":\"Today, cyber-attacks are part of our daily lives, and are becoming increasingly common and sophisticated.\u00a0\u00a0\u00a0Simultaneously, we are moving towards Information Systems that are built on an ever-increasing diversity of environments, thanks in particular to the Cloud, which is now an integral part within corporate Information Systems. This enables corporations ) to expand their capabilities, however it is also the surface area\u00a0 for risk of attacks.\u00a0\u00a0\u00a0Conventional intrusion detection and protection techniques already exist and are developing exponentially. These are effective against the most common attacks, however are not always adapted to the specificities of the Cloud.\u00a0\u00a0\u00a0This raises questions about the use of proactive strategies, such as Deceptive Security, to stay one step ahead of attackers. Particularly in the context of Cyber-Resilience; how can this kind of technology be used in both a traditional and a cloud environment?\u00a0\u00a0\u00a0When should Deceptive Security techniques be used? Are Deceptive Security solutions in the Cloud being developed today? Are there any specific strategies to consider in a Cloud environment as opposed to a traditional one?\u00a0\u00a0We will answer these questions in a mini-series of 2 articles. In the first article, we showed how to develop and evaluate your decoy strategy. In the second article, we\u2019ll present a practical example of deceptive security in AWS. \u00a0\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/02\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/02\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/02\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/couv1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/couv1.png\",\"width\":1280,\"height\":853},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/02\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Deceptive Security: the solution for effective detection in the cloud? \u2013 Deceptive use example in AWS cloud\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/00ee9607d2b8cd5205bfe63b482a2b14\",\"name\":\"Etienne Lafore\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/etienne-lafore\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Deceptive Security: the solution for effective detection in the cloud? \u2013 Deceptive use example in AWS cloud\u00a0 - RiskInsight","description":"Today, cyber-attacks are part of our daily lives, and are becoming increasingly common and sophisticated.\u00a0\u00a0\u00a0Simultaneously, we are moving towards Information Systems that are built on an ever-increasing diversity of environments, thanks in particular to the Cloud, which is now an integral part within corporate Information Systems. This enables corporations ) to expand their capabilities, however it is also the surface area\u00a0 for risk of attacks.\u00a0\u00a0\u00a0Conventional intrusion detection and protection techniques already exist and are developing exponentially. These are effective against the most common attacks, however are not always adapted to the specificities of the Cloud.\u00a0\u00a0\u00a0This raises questions about the use of proactive strategies, such as Deceptive Security, to stay one step ahead of attackers. Particularly in the context of Cyber-Resilience; how can this kind of technology be used in both a traditional and a cloud environment?\u00a0\u00a0\u00a0When should Deceptive Security techniques be used? Are Deceptive Security solutions in the Cloud being developed today? Are there any specific strategies to consider in a Cloud environment as opposed to a traditional one?\u00a0\u00a0We will answer these questions in a mini-series of 2 articles. In the first article, we showed how to develop and evaluate your decoy strategy. In the second article, we\u2019ll present a practical example of deceptive security in AWS. \u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/02\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud\/","og_locale":"en_US","og_type":"article","og_title":"Deceptive Security: the solution for effective detection in the cloud? \u2013 Deceptive use example in AWS cloud\u00a0 - RiskInsight","og_description":"Today, cyber-attacks are part of our daily lives, and are becoming increasingly common and sophisticated.\u00a0\u00a0\u00a0Simultaneously, we are moving towards Information Systems that are built on an ever-increasing diversity of environments, thanks in particular to the Cloud, which is now an integral part within corporate Information Systems. This enables corporations ) to expand their capabilities, however it is also the surface area\u00a0 for risk of attacks.\u00a0\u00a0\u00a0Conventional intrusion detection and protection techniques already exist and are developing exponentially. These are effective against the most common attacks, however are not always adapted to the specificities of the Cloud.\u00a0\u00a0\u00a0This raises questions about the use of proactive strategies, such as Deceptive Security, to stay one step ahead of attackers. Particularly in the context of Cyber-Resilience; how can this kind of technology be used in both a traditional and a cloud environment?\u00a0\u00a0\u00a0When should Deceptive Security techniques be used? Are Deceptive Security solutions in the Cloud being developed today? Are there any specific strategies to consider in a Cloud environment as opposed to a traditional one?\u00a0\u00a0We will answer these questions in a mini-series of 2 articles. In the first article, we showed how to develop and evaluate your decoy strategy. In the second article, we\u2019ll present a practical example of deceptive security in AWS. \u00a0","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/02\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud\/","og_site_name":"RiskInsight","article_published_time":"2024-02-16T16:55:48+00:00","article_modified_time":"2024-02-16T16:55:50+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/couv1.png","type":"image\/png"}],"author":"Etienne Lafore, Pierre LALIN","twitter_misc":{"Written by":"Etienne Lafore, Pierre LALIN","Est. reading time":"20 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/02\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/02\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud\/"},"author":{"name":"Etienne Lafore","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/00ee9607d2b8cd5205bfe63b482a2b14"},"headline":"Deceptive Security: the solution for effective detection in the cloud? \u2013 Deceptive use example in AWS cloud\u00a0","datePublished":"2024-02-16T16:55:48+00:00","dateModified":"2024-02-16T16:55:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/02\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud\/"},"wordCount":3101,"commentCount":0,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/02\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/couv1.png","keywords":["AWS","cloud","Deceptive security"],"articleSection":["Focus"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2024\/02\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/02\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/02\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud\/","name":"Deceptive Security: the solution for effective detection in the cloud? \u2013 Deceptive use example in AWS cloud\u00a0 - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/02\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/02\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/couv1.png","datePublished":"2024-02-16T16:55:48+00:00","dateModified":"2024-02-16T16:55:50+00:00","description":"Today, cyber-attacks are part of our daily lives, and are becoming increasingly common and sophisticated.\u00a0\u00a0\u00a0Simultaneously, we are moving towards Information Systems that are built on an ever-increasing diversity of environments, thanks in particular to the Cloud, which is now an integral part within corporate Information Systems. This enables corporations ) to expand their capabilities, however it is also the surface area\u00a0 for risk of attacks.\u00a0\u00a0\u00a0Conventional intrusion detection and protection techniques already exist and are developing exponentially. These are effective against the most common attacks, however are not always adapted to the specificities of the Cloud.\u00a0\u00a0\u00a0This raises questions about the use of proactive strategies, such as Deceptive Security, to stay one step ahead of attackers. Particularly in the context of Cyber-Resilience; how can this kind of technology be used in both a traditional and a cloud environment?\u00a0\u00a0\u00a0When should Deceptive Security techniques be used? Are Deceptive Security solutions in the Cloud being developed today? Are there any specific strategies to consider in a Cloud environment as opposed to a traditional one?\u00a0\u00a0We will answer these questions in a mini-series of 2 articles. In the first article, we showed how to develop and evaluate your decoy strategy. In the second article, we\u2019ll present a practical example of deceptive security in AWS. \u00a0","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/02\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2024\/02\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/02\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/couv1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/couv1.png","width":1280,"height":853},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/02\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-deceptive-use-example-in-aws-cloud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Deceptive Security: the solution for effective detection in the cloud? \u2013 Deceptive use example in AWS cloud\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/00ee9607d2b8cd5205bfe63b482a2b14","name":"Etienne Lafore","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/etienne-lafore\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/22490","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1292"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=22490"}],"version-history":[{"count":1,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/22490\/revisions"}],"predecessor-version":[{"id":22494,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/22490\/revisions\/22494"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/22384"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=22490"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=22490"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=22490"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=22490"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}