Six Degrees of Global Admin at Nullcon

Six Degrees of Global Admin at Nullcon

In Windows and Active Directory, there is one system responsible for making access decisions in nearly *all* cases: the Security Reference Monitor. This system makes access decisions by analyzing security descriptors on securable objects and User Rights Assignments:

No alt text provided for this image

In "Azure", the story is very, very different. There are multiple forms of access control, and multiple services responsible for making access decisions.

"Azure" means the 600+ distinct services that comprise Microsoft's cloud computing platform.

No alt text provided for this image

Understanding who has control of any given object in any given Azure service requires a complete understanding of *all* of these systems and how they cooperate with one another.?

Whether you're an attacker or defender, I will explain and demonstrate in my?@nullcon?talk how graphs bring accurate and clear understanding of effective permissions in Azure.

You can register for?@nullcon?here:?



要查看或添加评论,请登录

Andy Robbins的更多文章

  • Azure Managed Identities: "Secure by Default", and yet...

    Azure Managed Identities: "Secure by Default", and yet...

    First we should understand what Managed Identities are. I think the best way is to understand the problem they are…

  • How to Easily Identity Tier Zero Azure Assets

    How to Easily Identity Tier Zero Azure Assets

    First, you need to understand the problem we are trying to solve with Tiered Administration. Tiered Administration…

    2 条评论
  • Emergent Cloud Trust

    Emergent Cloud Trust

    Yesterday in my webinar on ACR Task abuse, I shared this slide with the question, "What privileges are needed to bridge…

  • The Enormous Impact of New Abuse Primitives

    The Enormous Impact of New Abuse Primitives

    New abuse primitives that take advantage of legitimate administrative protocols and features are wildly exciting. Why?…

  • The Unexpected Impact of 3 New BloodHound Edges

    The Unexpected Impact of 3 New BloodHound Edges

    In the upcoming #BloodHound 4.1 release, we are introducing 3 new edges.

    7 条评论
  • Find and Fix These Three Common AD Issues

    Find and Fix These Three Common AD Issues

    Here are three of the most common issues BloodHound Enterprise finds, their impacts, and how you can use FOSS…

    3 条评论
  • Three Reasons Why We Need Empirical Security

    Three Reasons Why We Need Empirical Security

    What’s the problem? Administrators and security professionals have been dealing with a lot of bullshit for the last…

    1 条评论
  • Like it or not: Active Directory is here to stay

    Like it or not: Active Directory is here to stay

    Amidst the recent spike in ransomware events (or coverage), PrintNightmare, and our own work and research into how…

    8 条评论
  • It's time to stop ignoring prevention.

    It's time to stop ignoring prevention.

    Point #1: Red teamers know how year after year the same tools and methodologies can be used to take over almost any…

    1 条评论

社区洞察

其他会员也浏览了