SlideShare a Scribd company logo
4
Most read
7
Most read
CLOUD ATTACKS
A Live Simulation of Cloud Misconfiguration Exploits
Josh Stella, Co-Founder & CTO
Fugue
#InfoSecWorld
AGENDA
1. Overview of cloud misconfiguration risk
2. Live Demo: Cloud misconfiguration exploits in action
3. Actionable steps to secure your cloud environment
4. Q&A
#InfoSecWorld
A MAJOR SECURITY RISK
Nearly all successful attacks on
cloud services are the result of customer
misconfiguration, mismanagement and
mistakes.
93%CONCERNED FOR MAJOR SECURITY BREACH
DUE TO MISCONFIGURATION
“
⎯ Neil MacDonald, Gartner
“
CLOUD MISCONFIGURATION IS A MAJOR SECURITY RISK
66%IAM 59%SECURITY
GROUP RULES 51%OBJECT STORAGE
ACCESS POLICIES
42%ENCRYPTION IN
TRANSIT DISABLED
Many dangerous cloud misconfigurations are:
• not recognized as misconfigurations by security teams
• not considered policy violations by compliance frameworks
• exceedingly common in enterprise cloud environments
CLOUD MISCONFIGURATION IS OFTEN OVERLOOKED
Before Cloud
1. Identify your target
organization
2. Search for vulnerabilities
to exploit
HACKER STRATEGY HAS EVOLVED
Cloud
1. Identify misconfiguration
vulnerabilities
2. Prioritize your target
organizations
Bad actors use automation to find and exploit cloud misconfiguration
Before Cloud
1. Network and security teams deliver
infrastructure to app teams
2. Network analysis and threat
detection tools identify intrusions;
human-guided response
SECURITY STRATEGY MUST EVOLVE TOO
Cloud
1. Developers create their own
infrastructure and are empowered
to secure it
2. Policy as code validation tools
prevent misconfiguration;
automated detection and
remediation eliminates it
Cloud security is a software engineering problem, not a security analysis problem.
A DEMONSTRATION OF A CLOUD MISCONFIGURATION ATTACK
ONE
Firewall
Misconfiguration
Causes often include
“drift” and orphaned
resources
THIS MISCONFIGURATION ATTACK IN REVIEW
TWO
Accessing
EC2 instance
Causes include
unpatched instances
containing a vulnerability
(often orphaned)
THREE
Getting IAM role
access to S3
Insecure use of IAM
and EC2 permissions
FOUR
Bucket discovery
and duplication
The danger of a single
IAM role with broad
permissions
1: Monitor all access point configurations
• Continuously monitor Security Groups for misconfiguration
(e.g. access from 0.0.0.0/0)
2: Apply Principle of Least Permission
• Ruthlessly limit IAM roles to business requirements for the app
• Use different end points for read and write operations
• Eliminate S3 bucket listing in production environments
3: Don’t allow EC2 instances to have IAM roles that allow attaching or
replacing role policies
KEY TAKEAWAYS AND RECOMMENDATIONS
4. Ruthlessly clean up unused cloud resources
(especially EC2 instances and S3 buckets)
• “Orphaned” resources are common and can contain misconfigurations and unpatched
OS or application vulnerabilities
5. Include cloud misconfiguration in penetration testing
• Use outside pen testers who understand cloud misconfiguration and how to exploit it
6. Use automated remediation for security-critical cloud resources
• Focus first on VPCs, S3 buckets, Security Groups, EC2, and IAM)
7. Use an open source policy as code framework for validating compliance
• Open Policy Agent and Rego policy language
KEY TAKEAWAYS AND RECOMMENDATIONS
#InfoSecWorld
QUESTIONS? Q&A
Resources:
Fugue Developer is free forever: www.fugue.co/go
Validate Terraform with Regula: https://github.com/fugue/regula
Fregot (for working with Rego): https://github.com/fugue/fregot
Open Policy Agent: https://www.openpolicyagent.org/
THANK YOU!
Josh Stella, Co-Founder & CTO
Fugue

More Related Content

PPTX
Humla workshop on Android Security Testing - null Singapore
PDF
CSS17: Houston - Stories from the Security Operations Center
PDF
2015.04.24 Updated > Android Security Development - Part 1: App Development
PDF
Web App Attacks - Stats & Remediation
PPTX
Top 5 Priorities for Cloud Security
PPTX
CSS 17: NYC - Stories from the SOC
PPTX
How Malware Works - Understanding Software Vulnerabilities
PDF
Acronis Active Protection: A Way To Combat Ransomware Attack
Humla workshop on Android Security Testing - null Singapore
CSS17: Houston - Stories from the Security Operations Center
2015.04.24 Updated > Android Security Development - Part 1: App Development
Web App Attacks - Stats & Remediation
Top 5 Priorities for Cloud Security
CSS 17: NYC - Stories from the SOC
How Malware Works - Understanding Software Vulnerabilities
Acronis Active Protection: A Way To Combat Ransomware Attack

What's hot (20)

PDF
Security Risks & Vulnerabilities in Skype
PPTX
CSS 17: NYC - Realities of Security in the Cloud
PPT
New microsoft application security problem
PDF
Re solution - corona virus cyber security infographic
DOCX
Cisco WebEx vulnerability: it’s a kind of magic
PPTX
Secure Coding 2013
PDF
Realities of Security in the Cloud
PPTX
CSS17: Atlanta - Realities of Security in the Cloud
PDF
Internship brochure
PDF
The Intersection of Security & DevOps
PDF
The World Against the Bad, Cisco AMP Solution to the Rescue
PDF
Reality Check: Security in the Cloud
PPTX
Intel McAfee DeepSAFE Technology
PPTX
Leveraging Osquery for DFIR @ Scale _BSidesSF_2020
PDF
Realities of Security in the Cloud
PPTX
Agile Network India | DevSecOps - The What and the Why | Ritesh Shregill
PDF
Owasp and friends
PDF
Cisco amp for endpoints
PDF
Managing Application Config and Secrets
PDF
Protecting Against Web Attacks
Security Risks & Vulnerabilities in Skype
CSS 17: NYC - Realities of Security in the Cloud
New microsoft application security problem
Re solution - corona virus cyber security infographic
Cisco WebEx vulnerability: it’s a kind of magic
Secure Coding 2013
Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the Cloud
Internship brochure
The Intersection of Security & DevOps
The World Against the Bad, Cisco AMP Solution to the Rescue
Reality Check: Security in the Cloud
Intel McAfee DeepSAFE Technology
Leveraging Osquery for DFIR @ Scale _BSidesSF_2020
Realities of Security in the Cloud
Agile Network India | DevSecOps - The What and the Why | Ritesh Shregill
Owasp and friends
Cisco amp for endpoints
Managing Application Config and Secrets
Protecting Against Web Attacks
Ad

Similar to Cloud Attacks: A Live Simulation of Cloud MIsconfiguration Attacks (20)

PPTX
Zero_Trust_In_Cloud_rbhfbru_newfiu_bewfuguy_cưenfbui.pptx
DOCX
Why Cloud Penetration Testing Essential
PPTX
Core strategies to develop defense in depth in AWS
PPTX
7 Ways To Cyberattack And Hack Azure
PDF
Outpost24 webinar - Mastering the art of multicloud security
PDF
CISSP-2022 Update domain 3 certification handouts
PDF
The 3 Recommendations for Cloud Security
PDF
Cloud security snippets on the use case of the cloud
PPTX
CSPM UNIT 4 HPS PRESENTATION FOR REFERENCE
PDF
Breaking Secure Mobile Applications - Hack In The Box 2014 KL
PPT
Cloud computing final show
PDF
Cloud security risks
PDF
Cloud security risks
PPTX
Cloud Security_ Unit 4
PDF
Cloud Security Network – Definition and Best Practices.pdf
PDF
The Ultimate Guide For Cloud Penetration Testing.pdf
PDF
Cloud Security Governance
PDF
BlueTeamCon-Presentation from TrustedSec
PDF
Keynote: Which way is the SolarWind Blowing? Techniques are changing…are you ...
PDF
Chaos engineering for cloud native security
Zero_Trust_In_Cloud_rbhfbru_newfiu_bewfuguy_cưenfbui.pptx
Why Cloud Penetration Testing Essential
Core strategies to develop defense in depth in AWS
7 Ways To Cyberattack And Hack Azure
Outpost24 webinar - Mastering the art of multicloud security
CISSP-2022 Update domain 3 certification handouts
The 3 Recommendations for Cloud Security
Cloud security snippets on the use case of the cloud
CSPM UNIT 4 HPS PRESENTATION FOR REFERENCE
Breaking Secure Mobile Applications - Hack In The Box 2014 KL
Cloud computing final show
Cloud security risks
Cloud security risks
Cloud Security_ Unit 4
Cloud Security Network – Definition and Best Practices.pdf
The Ultimate Guide For Cloud Penetration Testing.pdf
Cloud Security Governance
BlueTeamCon-Presentation from TrustedSec
Keynote: Which way is the SolarWind Blowing? Techniques are changing…are you ...
Chaos engineering for cloud native security
Ad

Recently uploaded (20)

PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PPTX
Reimagine Home Health with the Power of Agentic AI​
PPTX
history of c programming in notes for students .pptx
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
Digital Systems & Binary Numbers (comprehensive )
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
Nekopoi APK 2025 free lastest update
PPTX
Computer Software and OS of computer science of grade 11.pptx
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PDF
Designing Intelligence for the Shop Floor.pdf
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PPTX
L1 - Introduction to python Backend.pptx
PDF
medical staffing services at VALiNTRY
Odoo POS Development Services by CandidRoot Solutions
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
Reimagine Home Health with the Power of Agentic AI​
history of c programming in notes for students .pptx
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Upgrade and Innovation Strategies for SAP ERP Customers
Design an Analysis of Algorithms II-SECS-1021-03
Digital Systems & Binary Numbers (comprehensive )
Which alternative to Crystal Reports is best for small or large businesses.pdf
Nekopoi APK 2025 free lastest update
Computer Software and OS of computer science of grade 11.pptx
Odoo Companies in India – Driving Business Transformation.pdf
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
Designing Intelligence for the Shop Floor.pdf
Operating system designcfffgfgggggggvggggggggg
Navsoft: AI-Powered Business Solutions & Custom Software Development
L1 - Introduction to python Backend.pptx
medical staffing services at VALiNTRY

Cloud Attacks: A Live Simulation of Cloud MIsconfiguration Attacks

  • 1. CLOUD ATTACKS A Live Simulation of Cloud Misconfiguration Exploits Josh Stella, Co-Founder & CTO Fugue
  • 2. #InfoSecWorld AGENDA 1. Overview of cloud misconfiguration risk 2. Live Demo: Cloud misconfiguration exploits in action 3. Actionable steps to secure your cloud environment 4. Q&A
  • 3. #InfoSecWorld A MAJOR SECURITY RISK Nearly all successful attacks on cloud services are the result of customer misconfiguration, mismanagement and mistakes. 93%CONCERNED FOR MAJOR SECURITY BREACH DUE TO MISCONFIGURATION “ ⎯ Neil MacDonald, Gartner “
  • 4. CLOUD MISCONFIGURATION IS A MAJOR SECURITY RISK 66%IAM 59%SECURITY GROUP RULES 51%OBJECT STORAGE ACCESS POLICIES 42%ENCRYPTION IN TRANSIT DISABLED
  • 5. Many dangerous cloud misconfigurations are: • not recognized as misconfigurations by security teams • not considered policy violations by compliance frameworks • exceedingly common in enterprise cloud environments CLOUD MISCONFIGURATION IS OFTEN OVERLOOKED
  • 6. Before Cloud 1. Identify your target organization 2. Search for vulnerabilities to exploit HACKER STRATEGY HAS EVOLVED Cloud 1. Identify misconfiguration vulnerabilities 2. Prioritize your target organizations Bad actors use automation to find and exploit cloud misconfiguration
  • 7. Before Cloud 1. Network and security teams deliver infrastructure to app teams 2. Network analysis and threat detection tools identify intrusions; human-guided response SECURITY STRATEGY MUST EVOLVE TOO Cloud 1. Developers create their own infrastructure and are empowered to secure it 2. Policy as code validation tools prevent misconfiguration; automated detection and remediation eliminates it Cloud security is a software engineering problem, not a security analysis problem.
  • 8. A DEMONSTRATION OF A CLOUD MISCONFIGURATION ATTACK
  • 9. ONE Firewall Misconfiguration Causes often include “drift” and orphaned resources THIS MISCONFIGURATION ATTACK IN REVIEW TWO Accessing EC2 instance Causes include unpatched instances containing a vulnerability (often orphaned) THREE Getting IAM role access to S3 Insecure use of IAM and EC2 permissions FOUR Bucket discovery and duplication The danger of a single IAM role with broad permissions
  • 10. 1: Monitor all access point configurations • Continuously monitor Security Groups for misconfiguration (e.g. access from 0.0.0.0/0) 2: Apply Principle of Least Permission • Ruthlessly limit IAM roles to business requirements for the app • Use different end points for read and write operations • Eliminate S3 bucket listing in production environments 3: Don’t allow EC2 instances to have IAM roles that allow attaching or replacing role policies KEY TAKEAWAYS AND RECOMMENDATIONS
  • 11. 4. Ruthlessly clean up unused cloud resources (especially EC2 instances and S3 buckets) • “Orphaned” resources are common and can contain misconfigurations and unpatched OS or application vulnerabilities 5. Include cloud misconfiguration in penetration testing • Use outside pen testers who understand cloud misconfiguration and how to exploit it 6. Use automated remediation for security-critical cloud resources • Focus first on VPCs, S3 buckets, Security Groups, EC2, and IAM) 7. Use an open source policy as code framework for validating compliance • Open Policy Agent and Rego policy language KEY TAKEAWAYS AND RECOMMENDATIONS
  • 12. #InfoSecWorld QUESTIONS? Q&A Resources: Fugue Developer is free forever: www.fugue.co/go Validate Terraform with Regula: https://github.com/fugue/regula Fregot (for working with Rego): https://github.com/fugue/fregot Open Policy Agent: https://www.openpolicyagent.org/
  • 13. THANK YOU! Josh Stella, Co-Founder & CTO Fugue