Investigating a Cloud Security breach on AWS E2 Instance
Augustine Tetteh Ozor
Cloud DevOps Engineer | 2x AWS Certified | Cloud & Automation | AWS, Kubernetes, Docker, Terraform, Jenkins, and CI/CD Pipelines | Driving Scalable & Secure Infrastructure Solutions
Project Description
In this project, I was tasked with investigating a security breach on an AWS EC2 instance. The instance had been compromised by a user who had gained access to and removed a rule and possibly caused interruption to the system.
To conduct the investigation
STEPS INVOLVED IN THIS PROJECT
1. Log in to AWS Console
2. Go to EC2 Dashboard
3. Launch Instance
4. Configure the Basics
5. Key Pair (for SSH Access)
6. Network Settings
7. Security Group (Firewall)
8. Storage
9. Review and Launch
10. Access Your EC2 Instance
2. Install Apache web-server (httpd).
# Update package list
sudo apt update -y
# Install Apache
sudo apt install apache2 -y
# Start Apache service
sudo systemctl start apache2
# Enable Apache to start on boot
sudo systemctl enable apache2
#Check the status of apache
领英推荐
sudo systemctl status apache2
3. Edit the inbound security rules and added “http” on port 80 to allow us to the Apache server.
Type: Select HTTP from the dropdown (this will automatically set the port to 80).
Protocol: Set to TCP (automatically chosen for HTTP).
Port Range: Set to 80 (automatically chosen).
4. Added a user on the client side using the IAM feature in AWS. The user has been give an administrative access.
1. Navigate to IAM:
2. Add a New User:
3. Set User Details:
4. Assign Permissions:
5. Review and Create User:
2. Add a New User:
3. Set User Details:
4. Assign Permissions:
5. Review and Create User:
5. Investigated the issues to find out who revoked the access port security ground ingress using the CloudTrail. I use the resource name of the EC2 instance to filter the events on the CloudTrail and was able to detect who revoked the inbound rule. The investigation revealed that, new user then change the inbound rules and remove http port 80, making it impossible to access the Apache web-server.
6. The inbound rule has been resolved and http on port 80 was added. The client customers can now access the web server.
Finally, a written report with evidence of who was responsible for service interruption was present to the Cloud Security Architecture.
#Cloud Security #AWS #CloudTrail