When Simple Configurations Go Rogue: The Cloud Security Threat You Didn't See Coming

When Simple Configurations Go Rogue: The Cloud Security Threat You Didn't See Coming

...And 12 Cybersecurity Posts from around LinkedIn

In this Issue

Foreword | 12 Posts on Cyber |?Featured Leader | From Cyngular's Founder | Afterword

Foreword

We're excited to share 12 more posts about cybersecurity from across LinkedIn along with information on our upcoming cyber event! Useful content this week includes 6 key points from a cybersecurity guide, top 5 emerging AI threats, and a playbook to counter the latest ransomware gangs and attacks.

We highlight a Featured Leader again this week.

Finally, a piece from researchers at Cyngular Security which discusses in detail how seemingly benign configurations can sometimes open the door to significant security threats.

We're happy to send out our twenty-fifth issue, written to deliver content of value that is easily digestible.

We welcome all feedback, submissions, and input from our readers. If you have questions, submissions, or concerns, contact Rebecca Fera .

12 Posts on Cyber

Useful LinkedIn Posts This Week in Cybersecurity

Manoj Annabathina summarized 6 key points from a 'Basic Cyber Security Guide'

Vishal Salvi explored vulnerabilities, recent breaches, and best practices in cybersecurity

Best practices for event logging and threat detection were detailed by George Varghese

Top 5 emerging AI threats and tips to protect against them, highlighted by Marcel Velica

Jacob Horne shared a GTRC trial case on DoD cyber regulations

Ali Ali underlined types of cybersecurity specialties and their importance in defending against threats

A security operations center A-Z guide, overviewed by Mohammed Sasni

SAMUEL UDOH broke down a guide entitled, "Developing a Risk-Based Internal Audit Plan"

Weekly cybersecurity update on intercepting HTTPS traffic with Burp Suite and FoxyProxy, discussed by Aditi Patil

Andrey Prozorov posted a playbook to counter the latest ransomware gangs and attacks

Mehedi Hasan Babu overviewed the differences between Nmap and Wireshark

Ben Tagoe shared an article titled, "Tailgating in Cybersecurity: A Stealthy Threat"

Our Webinar Event is Live!

Join us online on Tuesday, September 10th from 11:00 a.m. - 12:00 p.m. EST for this transformative event designed for CISOs, SOC professionals and cybersecurity experts who want to have a robust IR strategy for the cloud - and avoid getting caught off guard at the worst possible time.

Here's what you can expect:

  • Expert Panel: Paul Moskovich , co-founder of Cyngular Security who is the former Deputy Director-General of the Israeli National Cyber Directorate, former CEO for National Cyber Operations and former CISO of the famous Iron Dome by Rafael and JHMCS by Elbit Systems. Art Ocain Innovative Incident Response and Disaster Recovery Specialist, CISO, Cybersecurity and AI Expert, and professional speaker.
  • Master Cloud Security: Discover how to pull the perfect incident response plan together, test for all contingencies, and nail your real-time, seamless IR execution.
  • Get the Right Tooling, Processes, and People: Learn the cutting edge of industry best practices for situational awareness and incident recovery.
  • See Attacks Coming: Gain valuable insights into how best to detect that you’ve been attacked before you’re experiencing the consequences.

This event is not your typical webinar. It features cloud cybersecurity experts with unique solutions, tailored to the specific needs of today’s SOC teams.

Register here!

Featured Leader

Matthew Hyland

Currently a Cybersecurity Fellow at 富国银行 , Matthew Hyland has 22 years of experience in the US Air Force as a Cyber Warfare Operator, with various leadership roles in information technology and information security. Matthew's core competencies include cyber warfare, interagency coordination, threat and vulnerability management, and strategy. In his circle, Matthew is known to be an expert in strategic and tactical planning, compliance, governance, and setting the posture of information security organizations.

Along with field experience, Matthew also holds multiple certifications such as CISSP and C|CISO, and he has completed executive education courses from the Wharton School at University of Pennsylvania, MIT Sloan, and the National Defense University. Matthew's mission is to leverage his expertise in cybersecurity and information technology to enhance the readiness, agility, and innovation of the organizations he serves.

Matthew is another featured leader we are happy to share with you this week.

From Cyngular's Research Team

In the world of cloud computing, seemingly benign configurations can sometimes open the door to significant security threats. One such configuration is the FunctionApp in Azure, which, under certain circumstances, can be exploited by attackers to escalate privileges through its associated storage account. At first glance, this setup appears to be a straightforward mechanism used for application hosting. However, attackers can leverage its configuration to gain unauthorized access to sensitive data in cloud environments. From an Incident Response (IR) perspective, it’s crucial to understand how these simple configurations can be turned against us and what can be done to mitigate the threat.

Understanding the Threat

Azure FunctionApp is a server-less compute service that enables you to run code without provisioning or managing infrastructure. It is commonly used for executing code in response to events. However, its associated storage account, which is used for managing triggers and storing logs, can become a vector for privilege escalation if not properly secured.

For example, an attacker with access to the FunctionApp’s storage account can potentially gain higher privileges by exploiting shared key authorization or misconfigurations. This could allow unauthorized access to sensitive data or enable the attacker to manipulate the FunctionApp’s behavior, leading to broader compromise within the cloud environment.

The Attacker's Perspective

From an attacker's viewpoint, the FunctionApp’s storage account is a valuable target for evasion and persistence. By gaining access to this storage account, they can manipulate function triggers, access logs, and even modify the function code. This can help them to establish persistence, exfiltrate data, or disrupt operations while avoiding detection by blending in with legitimate activities.

To illustrate this, consider a scenario where an attacker uses shared key authorization to access the storage account. Once inside, they can modify function bindings or inject malicious code, effectively escalating their privileges and extending their control over the cloud environment.

Storage Account Access Keys

Storage account access keys in Azure are essential for authenticating and authorizing access to storage account resources. These keys grant full permissions to access and manage data in the storage account, including blobs, queues, tables, and files. Each storage account has two keys to facilitate seamless key rotation without downtime. Due to their powerful capabilities, it is crucial to protect these keys and limit their use to secure applications only, minimizing the risk of unauthorized access.

Deep Dive

As previously mentioned, for an attacker to compromise a Function App, they first need access to the associated storage account in order to list its access keys. Let’s assume an attacker has managed to obtain a Service Principal credential that was accidentally exposed in a public repository. With this credential, the attacker can start by searching for storage accounts associated with the Function App. Azure stores critical files for the Function App in a file share that it generates. Specifically, these files are housed in directories such as site/wwwroot. Additionally, Azure stores certain files in two containers: azure-webjobs-hosts and azure-webjobs-secrets. Both of these storage methods can be used to identify the relevant storage accounts.

Once the attacker has access, they can list all files within the Function App, including:

  • function_app.py: The default file name for Python functions within the Function App.
  • host.json: This file contains encrypted keys for the Function App. In Azure, these keys are essential for securing and controlling access to the functions hosted within the app. They play a crucial role in determining who can invoke the functions and how they are triggered.

Additionally, each function within the Function App has its own JSON file containing specific keys for that function.

The attacker could then download the host.json file and modify its masterKey section - changing the key to a new value and disabling the encryption.

After making these modifications, the attacker can upload the altered host.json file back to the storage account. Azure will take a few minutes to synchronize the changes, after which it will accept the new, unencrypted key.

At this point, the attacker can modify the Function App’s code to execute malicious actions. For example, they might download the function_app.py file and alter its source code to return the Function App’s managed identity access token (assuming the Function App has a managed identity attached). The function App’s managed identity access token! (Requires a managed identity attached to the function).

By taking these steps, the attacker could potentially gain unauthorized access to sensitive resources within the Azure environment, demonstrating the critical importance of securely managing access keys and monitoring for any unauthorized changes.

Only Storage accounts actions were performed!

Mitigation Strategies

To defend against the potential abuse of the storage account associated with Azure Function App, Cyngular Security recommends implementing the following mitigation strategies:

  • Storage Account Key Management: Regularly rotate storage account access keys and use Azure Key Vault to securely store and manage these keys. This minimizes the risk of unauthorized access through compromised keys.
  • Use Managed Identities: Wherever possible, replace shared key authorization with Azure Managed Identities for authenticating the FunctionApp to access storage accounts. Managed Identities eliminate the need for manual key management and reduce the attack surface.
  • Implement Network Security Controls: Use Virtual Network (VNet) integration for the FunctionApp and storage account, along with network security groups (NSGs) and firewalls, to restrict access to the storage account from only trusted sources.
  • Enforce Least Privilege: Ensure that roles and permissions related to the FunctionApp and its associated storage account are configured according to the principle of least privilege. This limits the potential damage in case of a security breach.
  • Education and Awareness: Educate your DevOps and security teams about the risks associated with improper storage account configurations and the importance of using secure access methods. Regular training and awareness programs can significantly reduce the chances of misconfigurations.
  • Implement Monitoring and Logging: Monitor user data scripts' execution and maintain logs to detect unauthorized changes or malicious activity. Regularly review these logs for signs of potential threats.

By applying these strategies and leveraging Cyngular Security's CIRA platform, organizations can effectively protect their Azure FunctionApps and associated storage accounts from unauthorized access and potential exploitation.

The essence of cloud security lies in proactive measures, and Cyngular Security's Cloud Investigation and Response Automation (CIRA) platform incorporates this principle - automated, efficient cloud environment investigations. By integrating Cyngular Security's CIRA, you equip your team with the capability to quickly address and mitigate threats, ensuring robust protection for your cloud assets. Embrace Cyngular Security's CIRA for a deep, effective security strategy that keeps you ahead of threats.

Read the full article with graphic support here

Visit Our Website to See the Solution

Afterword

That's all for this week's newsletter. Our next issue will include another piece from Cyngular's Founder, a Featured Leader, and a new batch of 12 useful posts. Connect with us if you have anything to submit for our next issue or want to know more about Cyngular.

Notice:

The posts in this issue reflect the views only of the individual LinkedIn users and do not reflect the views of Cyngular Security, its employees, or any other entities. The links shared in this issue were written by LinkedIn users and do not constitute an endorsement of Cyngular Security, any other entities, or this newsletter by those users, entities, or the "Featured Leader."

Reach out to Rebecca Fera if you have any concerns about CISO Signal.


Sara Ricci

Executive - IT Risk/Information Security| Cybersecurity| Business Resilience| Operational Risk| Enterprise Risk| Third Party Risk| Speaker| Mentor| C-Suite Advisor

6 个月

Congratulations Matthew! Thanks for sharing the good news. Wish you many more accolades.

回复
Paul Moskovich

Co-Founder & CEO Cyngular Security | Entrepreneur | Former Deputy Director-General of the Israeli National Cyber Directorate (INCD) | Former CISO CSO

6 个月

#Cyngular Rocks!!! Launching the #THIRDhub platform a few weeks ago as a groundbreaking disruptive solution redefines the way #SOC for cloud environments will operate from now on and how security measures like EDRs, Posture management, SIEM, and SOAR will be empowered by Cyngular’s technology. Contact me to learn more Dont be regular be #Cyngular

Rebecca Fera

Founder @ PSB Modern | Crafting Strategies that Connect, Captivate, and Convert | psbmodern.com

6 个月

Awesome insights, can't wait for the webinar!

要查看或添加评论,请登录

Cyngular Security的更多文章

社区洞察

其他会员也浏览了