C3SA Module 06 V1
C3SA Module 06 V1
Clients
User
Interface
Application
Services
Components Platform
Compute
Network
Infrastructure Storage
Servers
Cloud Firewall (security groups)
■ Resources are shared among customers but are isolated from each other
Select Application & OS Image
Connect to the
Instance
DEMO 1 : Spawning AWS EC2
DEMO 2 : Accessing EC2 from :
https://github.com/GoogleCloud
Google OSConfig agent Windows, Linux
Platform/osconfig
https://github.com/GoogleCloud
Google guest agent Windows, Linux
Platform/guest-agent
Middleware Operating system Open source
AWS Systems Manager Agent https://github.com/aws/amazon-
Windows, Linux, macOS
(SSM Agent) ssm-agent
https://github.com/aws/amazon-
AWS ECS container agent Windows, Linux
ecs-agent
AWS EC2 Hibernation https://github.com/aws/amazon-
Linux
Initialization Agent ec2-hibinit-agent
➤ Metadata Service
http://169.254.169.254/latest/meta-data
➤ The attacker with enough rights can retrieve the metadata & steal the
instance identity
Create Bucket
Specify Region
Create Bucket
➤ They are firewall of the VPC Subnets and are applicable at the VPC
subnet level.
➤ NACL’s are stateless, which means any rule applied to the incoming rule
will not be applicable to the outgoing rule.
➤ It supports both allow as well as deny rule.
➤ Security Groups
■ Set of Firewall rules that control the traffic for the instance.
EXERCISES
Ref :
https://docs.aws.amazon.com/AmazonC
loudWatch/latest/monitoring/cloudwatc
h_architecture.html
➤ CloudTrail
■ Actions taken by a user, role or an AWS services are recorded as
events
■ It enables auditing, security monitoring by tracking user activity and
API usage
■ CloudWatch monitors performance, whereas CloudTrail monitors
actions in the AWS environment
Ref :
https://www.whizlabs.com/wp-content/uploa
ds/2016/12/AWS-Article2-1.jpg
➤ AWS Guard Duty
■ Threat Detection service that continuously monitors for malicious activity and
unauthorized behaviour in AWS services
■ Targets Amazon S3, Workloads, AWS accounts and logs / events from
Cloudtrail, VPC & DNS
Case Study 1 : Threat Detection – Compromised EC2 Instance
https://scalesec.com/blog/threat-detection-with-aws-guardduty/
Case Study 2 : Threat Detection – Compromised IAM Credentials
https://scalesec.com/blog/threat-detection-with-aws-guardduty/
➤ AWS WAF & Shield
Access Key
➤ IAM Policies
■ When the root user do not need to share the security credentials, roles are
used.
■ Roles are permission policies that determine what an identity can or cannot
perform
■ It can be assumed by anyone who has permission to do as granted by
administrator
■ Permission are assigned to :
● The Principal (Who will assuming the role)
● The Role (Who can assume the role)
XYZ-role
IAM User
2. XYZ-role is
assumed
IAM User – Identity Based XYZ Role – Resource Based
Permission Permission
DEMO 3 : Creating IAM User with S3 Full
Access
DEMO : Creating IAM User &
Authenticate using CLI
Google Cloud Platform (GCP)
Google Compute Engine (GCE)
➤ Firewall rules are defined at the network level & only apply to network
➤ Explicit ingress / egress rules with Deny / Allow rules can be defined
➤ Firewall Network Tags can then be applied to the compute engine to
apply the firewall
DEMO : GCE Firewall Rules
Google Storage
➤ Storage contains buckets where we can place objects like file etc.
➤ GCP IAM Policies define which identities have what kind of access to an
attached specified resource
Basic Custom
Predefined
DEMO : GCP IAM User
Microsoft Azure
Azure Virtual Machine
➤ NSG filters traffic in network level, implementing this will prevent traffic
to & from the azure resources
➤ Azure Blob Storage is Microsoft's object storage solution for the cloud
https://github.com/nccgroup/ScoutSuite
EXERCISE