{"id":16734,"date":"2019-10-30T11:21:06","date_gmt":"2019-10-30T19:21:06","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/10\/30\/news-10473\/"},"modified":"2019-10-30T11:21:06","modified_gmt":"2019-10-30T19:21:06","slug":"news-10473","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/10\/30\/news-10473\/","title":{"rendered":"Exposed: The cost of errors in the public cloud"},"content":{"rendered":"<p><strong>Credit to Author: Rich Beckett| Date: Wed, 30 Oct 2019 17:23:56 +0000<\/strong><\/p>\n<div class=\"entry-content\">\n<p>Who\u2019s in charge of security in the public cloud?<\/p>\n<p>It may sound like an odd question, but when working with a cloud provider such as Amazon Web Services (AWS), Microsoft Azure or Google Cloud Platform, it\u2019s important to understand that security is a shared responsibility.<\/p>\n<p>Public cloud providers offer customers a great deal of flexibility in how they build their cloud environments. The consequence of all this flexibility, however, is that providers don&#8217;t offer complete protection for virtual networks, virtual machines or data that&#8217;s in the cloud.<\/p>\n<p>That <a href=\"https:\/\/vimeo.com\/328655427\">shared responsibility<\/a> model means cloud providers ensure security of the cloud, while the organization (the cloud provider\u2019s customer, i.e. you) is responsible for anything run in the cloud. Now, admins don\u2019t always know what the cloud provider takes care of, and the security controls they themselves must apply. This, as you can imagine, leads to exposed data, file, database and hard drive snapshots.<\/p>\n<p>You might have heard of S3 bucket breaches \u2013 of which there have been many! But, this article series aims to break down the other big security-breach risks and how to protect against them, starting with the most common of all&#8230;<\/p>\n<h2>Public Amazon S3 bucket exposure (with a new twist)<\/h2>\n<p>You won\u2019t have to look far to find stories of S3-related data breaches caused by misconfiguration, where S3 security settings were left set to \u201cPublic.\u201d <a href=\"https:\/\/aws.amazon.com\/blogs\/aws\/amazon-s3-block-public-access-another-layer-of-protection-for-your-accounts-and-buckets\/\">AWS has even released an update<\/a> to help customers from running afoul of this, one of the biggest causes of cloud data breaches.<\/p>\n<p>Reading about the thousands of cases out there, you\u2019d be forgiven for thinking that attackers are only <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/lion-air-the-latest-to-get-tripped-up-by-misconfigured-aws-s3-\/d\/d-id\/1335864\">after an organization\u2019s sensitive data<\/a> in these attacks. Unfortunately, you\u2019d be wrong.<\/p>\n<p>In addition to financial and PII data, one of the main uses of cloud storage accounts like Amazon S3 buckets is to host static website content like HTML files, JavaScript and Style Sheets (CSS). Attacks targeting those resources aren\u2019t targeting exposed data. Instead, they look to <a href=\"https:\/\/www.riskiq.com\/blog\/labs\/magecart-amazon-s3-buckets\/\">modify website files maliciously<\/a> to steal user financial information.<\/p>\n<h3>A fork in the (attackers) road<\/h3>\n<p>Both attack chains look the same at the start, with attackers scanning the internet for misconfigured S3 buckets using automated S3 scanners. But this is where our attack paths diverge.<\/p>\n<p>In your typical S3 data breach, attackers now list and sync the valuable contents to local disk and access all the data that was misconfigured in \u201cpublic\u201d mode.<\/p>\n<p>In the case of our data modification attack: once access is gained, attackers look for JavaScript content and modify it to include malicious code. Now, when a user visits the infected website, the malicious JavaScript code loads, logging all credit and debit card details entered to payment forms. This data is then sent to the criminal\u2019s server.<\/p>\n<h3>How to identify and prevent S3 bucket Exposure (both kinds)<\/h3>\n<p>Accidental or malicious changes to the S3 storage configurations that leave organizations exposed are all too common. <a href=\"https:\/\/www.sophos.com\/en-us\/products\/cloud-optix.aspx?cmp=33400\">Cloud Optix<\/a> makes it simple to quickly identify any publicly accessible data or website files and make them private. It adds an additional level of security to these critical services with Guardrails, ensuring no configuration changes are made without permission.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"61532\" data-permalink=\"https:\/\/news.sophos.com\/en-us\/2019\/10\/30\/exposed-the-cost-of-errors-in-the-public-cloud\/s3-policy\/\" data-orig-file=\"https:\/\/sophos.files.wordpress.com\/2019\/10\/s3-policy.png\" data-orig-size=\"2126,843\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"S3 Policy\" data-image-description=\"\" data-medium-file=\"https:\/\/sophos.files.wordpress.com\/2019\/10\/s3-policy.png?w=300\" data-large-file=\"https:\/\/sophos.files.wordpress.com\/2019\/10\/s3-policy.png?w=640\" class=\"aligncenter size-large wp-image-61532\" src=\"https:\/\/sophos.files.wordpress.com\/2019\/10\/s3-policy.png?w=640&#038;h=254\" alt=\"\" width=\"640\" height=\"254\" srcset=\"https:\/\/sophos.files.wordpress.com\/2019\/10\/s3-policy.png?w=640&amp;h=254 640w, https:\/\/sophos.files.wordpress.com\/2019\/10\/s3-policy.png?w=1280&amp;h=508 1280w, https:\/\/sophos.files.wordpress.com\/2019\/10\/s3-policy.png?w=150&amp;h=59 150w, https:\/\/sophos.files.wordpress.com\/2019\/10\/s3-policy.png?w=300&amp;h=119 300w, https:\/\/sophos.files.wordpress.com\/2019\/10\/s3-policy.png?w=768&amp;h=305 768w, https:\/\/sophos.files.wordpress.com\/2019\/10\/s3-policy.png?w=1024&amp;h=406 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/p>\n<p>Cloud Optix alerts you to exposed S3 buckets within minutes, providing contextual alerts that group the affected resources, provide a description of the issue, and remediation steps. These steps include the ability to auto-remediate \u2013 updating resource read\/write permissions where S3 storage has been left open to the public internet.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"61530\" data-permalink=\"https:\/\/news.sophos.com\/en-us\/2019\/10\/30\/exposed-the-cost-of-errors-in-the-public-cloud\/public-s3-alert\/\" data-orig-file=\"https:\/\/sophos.files.wordpress.com\/2019\/10\/public-s3-alert.png\" data-orig-size=\"987,513\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Public S3 Alert\" data-image-description=\"\" data-medium-file=\"https:\/\/sophos.files.wordpress.com\/2019\/10\/public-s3-alert.png?w=300\" data-large-file=\"https:\/\/sophos.files.wordpress.com\/2019\/10\/public-s3-alert.png?w=640\" class=\"aligncenter size-large wp-image-61530\" src=\"https:\/\/sophos.files.wordpress.com\/2019\/10\/public-s3-alert.png?w=640&#038;h=333\" alt=\"\" width=\"640\" height=\"333\" srcset=\"https:\/\/sophos.files.wordpress.com\/2019\/10\/public-s3-alert.png?w=640&amp;h=333 640w, https:\/\/sophos.files.wordpress.com\/2019\/10\/public-s3-alert.png?w=150&amp;h=78 150w, https:\/\/sophos.files.wordpress.com\/2019\/10\/public-s3-alert.png?w=300&amp;h=156 300w, https:\/\/sophos.files.wordpress.com\/2019\/10\/public-s3-alert.png?w=768&amp;h=399 768w, https:\/\/sophos.files.wordpress.com\/2019\/10\/public-s3-alert.png 987w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/p>\n<p>Going the extra mile with AI capabilities to detect suspicious user login events, Cloud Optix alerts organizations if the contents of an S3 bucket is modified from an unusual location &#8211; suggesting that shared or stolen user credentials are being used remotely.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"61531\" data-permalink=\"https:\/\/news.sophos.com\/en-us\/2019\/10\/30\/exposed-the-cost-of-errors-in-the-public-cloud\/s3-at-risk-services\/\" data-orig-file=\"https:\/\/sophos.files.wordpress.com\/2019\/10\/s3-at-risk-services.png\" data-orig-size=\"2233,943\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"S3 at risk services\" data-image-description=\"\" data-medium-file=\"https:\/\/sophos.files.wordpress.com\/2019\/10\/s3-at-risk-services.png?w=300\" data-large-file=\"https:\/\/sophos.files.wordpress.com\/2019\/10\/s3-at-risk-services.png?w=640\" class=\"aligncenter size-large wp-image-61531\" src=\"https:\/\/sophos.files.wordpress.com\/2019\/10\/s3-at-risk-services.png?w=640&#038;h=270\" alt=\"\" width=\"640\" height=\"270\" srcset=\"https:\/\/sophos.files.wordpress.com\/2019\/10\/s3-at-risk-services.png?w=640&amp;h=270 640w, https:\/\/sophos.files.wordpress.com\/2019\/10\/s3-at-risk-services.png?w=1280&amp;h=540 1280w, https:\/\/sophos.files.wordpress.com\/2019\/10\/s3-at-risk-services.png?w=150&amp;h=63 150w, https:\/\/sophos.files.wordpress.com\/2019\/10\/s3-at-risk-services.png?w=300&amp;h=127 300w, https:\/\/sophos.files.wordpress.com\/2019\/10\/s3-at-risk-services.png?w=768&amp;h=324 768w, https:\/\/sophos.files.wordpress.com\/2019\/10\/s3-at-risk-services.png?w=1024&amp;h=432 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/p>\n<p>Whatever the end goal of an S3 service breach, these simple steps in <a href=\"https:\/\/www.sophos.com\/en-us\/products\/cloud-optix.aspx?cmp=33400\">Cloud Optix<\/a> makes it simple to stay one step ahead of attackers.<\/p>\n<\/p><\/div>\n<p><a href=\"http:\/\/feedproxy.google.com\/~r\/sophos\/dgdY\/~3\/WB8HGxtliII\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/sophos.files.wordpress.com\/2019\/10\/untitled-design.png\"\/><\/p>\n<p><strong>Credit to Author: Rich Beckett| Date: Wed, 30 Oct 2019 17:23:56 +0000<\/strong><\/p>\n<p>This series aims to break down the big cloud-security breach risks and how to protect against them, starting with a new twist on public Amazon S3 bucket exposure.&lt;img src=&#8221;http:\/\/feeds.feedburner.com\/~r\/sophos\/dgdY\/~4\/WB8HGxtliII&#8221; height=&#8221;1&#8243; width=&#8221;1&#8243; alt=&#8221;&#8221;\/&gt;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[12010,23317,11728,21508,10379],"class_list":["post-16734","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-aws","tag-aws-s3-bucket","tag-cloud","tag-cloud-optix","tag-corporate"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16734","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16734"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16734\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16734"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16734"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16734"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}