How to Easily Identity Tier Zero Azure Assets

How to Easily Identity Tier Zero Azure Assets

First, you need to understand the problem we are trying to solve with Tiered Administration.

Tiered Administration protects your most privileged assets from compromise in the event that less privileged assets are compromised.

It's the wombo combo of least privilege and defense in depth.?

Do Tiered Administration effectively and you DRAMATICALLY reduce risks posed by ransomware actors, insider threats, etc.

Most efforts get stuck in the very first step: identifying which assets go into which tiers.

Here's how you do this:

You need to first understand what your most privileged assets are. These will comprise your "Tier Zero". These assets control EVERYTHING, including EACH OTHER.

For?Azure, you should follow this logic:

No alt text provided for this image

Some of this is obvious: Global Admins are obviously Tier Zero.

Some of this is not as obvious. This blog post dives into why those two particular MS Graph app roles grant Tier Zero privileges:

What's even less obvious is the final question in that logic: "Does it control or contain something that IS Tier Zero?"

Let's talk about control.

In this setup, a Virtual Machine (VM) has a managed identity assignment to a Service Principal (SP) with a T0 MS Graph app role:

No alt text provided for this image

That means SP A is Tier Zero, and so is "Virtual Machine 001". This blog post explains why:

But because SP B controls the VM, SP B must ALSO be considered Tier Zero, unless you revoke SP B's control over the VM:

No alt text provided for this image

Now let's talk about hierarchal containment. In Azure, permissions always trickle down to all child objects. Control a parent object and you control all of its children.

The AzureAD Tenant contains all objects, so it is obviously a Tier Zero asset itself:

No alt text provided for this image

But because the VM is Tier Zero, *all* of its parent objects must also be considered Tier Zero as well.

The resource group, subscription, and management group(s) above the VM *must* be considered Tier Zero:

No alt text provided for this image

Need help? This script will help you easily identify Tier Zero service principals by their AzureAD and MS Graph App Role assignments:

Want to know more? Next week I'm speaking at?@Quest's?#TEC2022?on Managed Identity attack paths.

I'll publish more details and free tooling you can use to manage those attack paths:

It is such a small number of people who understand this concept. BRAVO!!!

Gavin A.

IAM Strategy Owner @ Maersk

2 年

Love the classification logic. Too often you see DC's and only DC's considered to be T0.

要查看或添加评论,请登录

Andy Robbins的更多文章

  • Azure Managed Identities: "Secure by Default", and yet...

    Azure Managed Identities: "Secure by Default", and yet...

    First we should understand what Managed Identities are. I think the best way is to understand the problem they are…

  • Emergent Cloud Trust

    Emergent Cloud Trust

    Yesterday in my webinar on ACR Task abuse, I shared this slide with the question, "What privileges are needed to bridge…

  • Six Degrees of Global Admin at Nullcon

    Six Degrees of Global Admin at Nullcon

    In Windows and Active Directory, there is one system responsible for making access decisions in nearly *all* cases: the…

  • The Enormous Impact of New Abuse Primitives

    The Enormous Impact of New Abuse Primitives

    New abuse primitives that take advantage of legitimate administrative protocols and features are wildly exciting. Why?…

  • The Unexpected Impact of 3 New BloodHound Edges

    The Unexpected Impact of 3 New BloodHound Edges

    In the upcoming #BloodHound 4.1 release, we are introducing 3 new edges.

    7 条评论
  • Find and Fix These Three Common AD Issues

    Find and Fix These Three Common AD Issues

    Here are three of the most common issues BloodHound Enterprise finds, their impacts, and how you can use FOSS…

    3 条评论
  • Three Reasons Why We Need Empirical Security

    Three Reasons Why We Need Empirical Security

    What’s the problem? Administrators and security professionals have been dealing with a lot of bullshit for the last…

    1 条评论
  • Like it or not: Active Directory is here to stay

    Like it or not: Active Directory is here to stay

    Amidst the recent spike in ransomware events (or coverage), PrintNightmare, and our own work and research into how…

    8 条评论
  • It's time to stop ignoring prevention.

    It's time to stop ignoring prevention.

    Point #1: Red teamers know how year after year the same tools and methodologies can be used to take over almost any…

    1 条评论

社区洞察

其他会员也浏览了