CosmosDB vulnerability calls for rethinking PaaS integration

CosmosDB vulnerability calls for rethinking PaaS integration

The latest hack published by Wiz is a momentous warning bell to the Cloud infosec community. It goes well beyond privileges escalation in a Jupyter notebook container managed by some Azure team. It raises several some key questions which apply not only to Microsoft, but Amazon and Google as well:

  • should features requiring services integration be subjected to customer opt-in and opt-out, no matter how sexy they are looking? I remember the day when notebooks were 'enforced' in all ComosDB accounts very well. It made me grumpier than usual ;-)
  • are other services than CosmosDB susceptible to similar, complex PaaS integration issues?
  • how to ensure undisputable, undrifting customers isolation in PaaS integration scenarios?
  • are access bypasses (eg: Azure Portal and Public Azure Datacenter IP ranges) viable long-term solutions for PaaS integration?
  • shouldn't PaaS integration rely on a limited library of battle hardened patterns that all Cloud PMs should have to use consistently?
  • shouldn't Cloud providers put more efforts into making automated, scalable and transparent APIs to give insurance to their customers that their assets haven't been impacted by a vulnerability? Rather than numb security bulletins and hollow emails? Assuming the worst.

In such stories, providers are not the only ones that should be blamed. Customers also bear their share of responsibility

要查看或添加评论,请登录

Christophe Parisel的更多文章

  • "Ultimate" weapon against your AI-powered apps

    "Ultimate" weapon against your AI-powered apps

    What will kill your AI apps? A design error..

    4 条评论
  • Adversarial lateral motion in Azure PaaS: are we prepared?

    Adversarial lateral motion in Azure PaaS: are we prepared?

    Lateral motion techniques are evolving in PaaS, and we should be worried. Let's discuss a risk confinement approach.

    19 条评论
  • How will Microsoft Majorana quantum chip ??compute??, exactly?

    How will Microsoft Majorana quantum chip ??compute??, exactly?

    During the 2020 COVID lockdown, I investigated braid theory in the hope it would help me on some research I was…

    16 条评论
  • Zero-shot attack against multimodal AI (Part 2)

    Zero-shot attack against multimodal AI (Part 2)

    In part 1, I showcased how AI applications could be affected by a new kind of AI-driven attack: Mystic Square. In the…

    6 条评论
  • Zero-shot attack against multimodal AI (Part 1)

    Zero-shot attack against multimodal AI (Part 1)

    The arrow is on fire, ready to strike its target from two miles away..

    11 条评论
  • 2015-2025: a decade of preventive Cloud security!

    2015-2025: a decade of preventive Cloud security!

    Since its birth in 2015, preventive Cloud security has proven a formidable achievement. By raising the security bar of…

    11 条评论
  • Exploiting Azure AI DocIntel for ID spoofing

    Exploiting Azure AI DocIntel for ID spoofing

    Sensitive transactions execution often requires to show proofs of ID and proofs of ownership: this requirements is…

    10 条评论
  • How I trained an AI model for nefarious purposes!

    How I trained an AI model for nefarious purposes!

    The previous episode prepared ground for today’s task: we walked through the foundations of AI curiosity. As we've…

    19 条评论
  • AI curiosity

    AI curiosity

    The incuriosity of genAI is an understatement. When chatGPT became popular in early 2023, it was even more striking…

    3 条评论
  • The nested cloud

    The nested cloud

    Now is the perfect time to approach Cloud security through the interplay between data planes and control planes—a…

    8 条评论

社区洞察

其他会员也浏览了