The deFAULT truth
of AWS Shared
Responsibility
Model
Rodrigo Montoro
Head of Threat & Detection Research
@spookerlabs
$ aws --profile Rodrigo Montoro sts get-caller-identity
Clavis Segurança da Informação
● Head of Threat & Detection Research at Clavis Security
● Living in Florianópolis (Silicon Island)
● Author of 2 patented technologies (US Patent Office)
● Speaker in different conferences (Brazil,USA,Canada)
● Proud Dad and Husband
● Full Ironman triathlon (2x)
● Crossfit and Powerlifting
Motivation
Some numbers(*) about security ‘IN’ the cloud (AWS)
Clavis Segurança da Informação
● CSPM Detections (cloudsploit)
○ 460 findings (AWS)
○ 87 services covered (around 29% of services)
● Services with Passrole
○ 330 actions
○ 92 services (around 30.7% of services)
● Detections from Elastic rules
○ 59 detections
○ ~22 services covered (around 7.3% of services)
● Detections from Sigma
○ 31 detections
○ ~20 services covered (around 6.7% of services)
* based on my analysis in open source tool and public content
With some ideas in mind …
Clavis Segurança da Informação
Security Operations Center (SOC)
AGENDA
1
AWS ecosystem / Control Plane
DeFAULT Design
Data Plane
1
1
Cross Account
1
Uncommon Services
Conclusions
7
Clavis Segurança da Informação
AWS Ecosystem / Control Plane
AWS Shared Responsibility Model
Clavis Segurança da Informação
AWS In Numbers
Clavis Segurança da Informação
● Around 13k actions
● 973 Managed policies
● Around 300 Services
● 18 regions
● 5 actions access level
Source: https://aws.permissions.cloud/
How authentication and authorization works
Clavis Segurança da Informação
AWS IAM policy flow analysis
Clavis Segurança da Informação
Management Events
Clavis Segurança da Informação
13
Clavis Segurança da Informação
DeFAULT Design
How many problems an AWS account start (with an Admin user) ?
Clavis Segurança da Informação
Next let’s add an ec2 instance
Clavis Segurança da Informação
Just to finish a s3 bucket …
Clavis Segurança da Informação
Simple scenario (only 3 services) the "deFAULT problems”
Clavis Segurança da Informação
Some more details
Clavis Segurança da Informação
● VPC Endpoint
○ Policy Resource : *
● IAM
○ Managed Policies
■ Resource: *
■ No Conditional
■ No control
service enumeration is possible by design with account id
Clavis Segurança da Informação
source: https://www.sidechannel.blog/en/enumerating-services-in-aws-accounts-in-an-anonymous-and-unauthenticated-manner/
20
Clavis Segurança da Informação
Data Plane
Data Plane
Clavis Segurança da Informação
● S3 buckets data events
● RDS Audit logs
● EKS (Kubernetes)
S3 buckets
Clavis Segurança da Informação
VPC Flow Logs
Clavis Segurança da Informação
GuardDuty
Clavis Segurança da Informação
source: https://xmind.app/m/K3fmSB/#
Events analyzed are NOT saved. Only the
payload saved is the content that triggered
the finding.
25
Clavis Segurança da Informação
Cross Account
What is Cross Account ?
Clavis Segurança da Informação
source: https://aws.amazon.com/blogs/security/how-to-audit-cross-account-roles-using-aws-cloudtrail-and-amazon-cloudwatch-events/
Vendors / Partners
Clavis Segurança da Informação
● Splunk history
● ReadOnlyAccess policy
Splunk history
Clavis Segurança da Informação
ReadOnlyAccess World (1/3) - Unwanted Permissions
Clavis Segurança da Informação
source: https://www.sidechannel.blog/en/unwanted-permissions-that-may-impact-security-when-using-the-readonlyaccess-policy-in-aws/
● s3:GetObject
● lambda:GetFunction
● ec2:DescribeInstanceAttribute
● dynamodb:{Query,Scan}
● cloudtrail:LookupEvents
ReadOnlyAccess World (2/3) - bad use everywhere
Clavis Segurança da Informação
source: https://www.wiz.io/blog/82-of-companies-unknowingly-give-3rd-parties-access-to-all-their-cloud-data
ReadOnlyAccess World (3/3) - Sample of products
Clavis Segurança da Informação
Tenable -
https://docs.tenable.com/tenablecs/quick-reference/AWS/Content/QuickReference/SetUpA
WSReadOnlyAccess.htm
Site24x7 - https://www.site24x7.com/help/aws/enable-aws-account-access.html
NewRelic -
https://docs.newrelic.com/docs/infrastructure/amazon-integrations/get-started/integrations-
managed-policies/
Autocloud - https://docs.autocloud.dev/aws-account
DivvyCloud - https://docs.divvycloud.com/docs/policies (some minor denies
http://get.divvycloud.com/policies/ReadOnlywithAWSReadOnly.json )
Cloudockit - https://www.cloudockit.com/documentation/aws-create-user-for-cloudockit/
Hava.io - https://docs.hava.io/importing/aws/getting-started-with-aws/read-only-iam-user
Cloudcraft - https://help.cloudcraft.co/article/87-connect-aws-account-with-cloudcraft
32
Clavis Segurança da Informação
Uncommon Services
What do I consider uncommon ?
Clavis Segurança da Informação
● Services without security research related
○ big part of 300 services
○ almost 13000 actions
● Very specific services with only "few" customers
So what is _REALLY_ uncommon ? How about Identity Center (SSO)?
Clavis Segurança da Informação
Passrole world
Clavis Segurança da Informação
source: https://twitter.com/noamdahan/status/1349384948998922240
Appstream 2.0 Edition
Clavis Segurança da Informação
37
Clavis Segurança da Informação
Future & Conclusions
Future and Conclusions
Clavis Segurança da Informação
● Make sure you understand default configurations
● Validate cross account / partners permissions
● Know what you are running
● Find your knowledge gaps
● Keep researching and improving detections
● Make sure you train your team
Thank you!
See you at Sector
Rodrigo Montoro
@spookerlabs
rodrigo.montoro@clavis.com.br

More Related Content

PPT
SOC presentation- Building a Security Operations Center
PDF
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
PPTX
An introduction to SOC (Security Operation Center)
PDF
Introduction to Cybersecurity
PDF
Building Security Operation Center
PPTX
Network security - Defense in Depth
PPSX
Next-Gen security operation center
PPTX
SOC Architecture Workshop - Part 1
SOC presentation- Building a Security Operations Center
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
An introduction to SOC (Security Operation Center)
Introduction to Cybersecurity
Building Security Operation Center
Network security - Defense in Depth
Next-Gen security operation center
SOC Architecture Workshop - Part 1

What's hot (20)

PPTX
SEIM-Microsoft Sentinel.pptx
PDF
Detecting AWS control plane abuse in an actionable way using Det{R}ails
PDF
Secure Design: Threat Modeling
PPTX
SOAR and SIEM.pptx
PPTX
Security Operation Center Fundamental
PDF
Cybersecurity in Industrial Control Systems (ICS)
PDF
Security operations center-SOC Presentation-مرکز عملیات امنیت
PPTX
Cybersecurity Strategies for Effective Attack Surface Reduction
PPTX
Security Operation Center - Design & Build
PPTX
Security operation center
PPTX
Dragos S4x20: How to Build an OT Security Operations Center
PDF
Cyber threat intelligence ppt
PPTX
Introduction to SIEM.pptx
PPTX
Penetration Testing
PPTX
Lost in Translation - Blackhat Brazil 2014
PPTX
Cybersecurity Training
PDF
Cyber Threat Intelligence
PDF
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
PPTX
Security operation center (SOC)
SEIM-Microsoft Sentinel.pptx
Detecting AWS control plane abuse in an actionable way using Det{R}ails
Secure Design: Threat Modeling
SOAR and SIEM.pptx
Security Operation Center Fundamental
Cybersecurity in Industrial Control Systems (ICS)
Security operations center-SOC Presentation-مرکز عملیات امنیت
Cybersecurity Strategies for Effective Attack Surface Reduction
Security Operation Center - Design & Build
Security operation center
Dragos S4x20: How to Build an OT Security Operations Center
Cyber threat intelligence ppt
Introduction to SIEM.pptx
Penetration Testing
Lost in Translation - Blackhat Brazil 2014
Cybersecurity Training
Cyber Threat Intelligence
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Security operation center (SOC)
Ad

Similar to Cloud Summit Canada com Rodrigo Montoro (20)

PDF
Resposta a Incidentes | Mind The Sec 2022 com Rodrigo Montoro
PDF
The AWS Shared Responsibility Model in Practice
PDF
Top 5 AWS Security Mistakes and How to Stop Them Before You Lose Data
PDF
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
PPTX
Pitt Immersion Day Module 5 - security overview
PDF
The AWS Shared Responsibility Model: Presented by Amazon Web Services
PDF
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in aws
PDF
AWS Security 101: Understanding the Shared Security Model - Jeff Westphal, Mi...
PDF
The AWS Shared Responsibility Model in Practice - Nirav Kothari, AWS
PDF
Information Security in AWS - Dave Walker
PPTX
Managing Security on AWS
PDF
The AWS Shared Responsibility Model in Practice
PPTX
shared-responsibilitysecurity-roadshowlondon-160317131610.pptx
PPT
Security and compliance
PPTX
AWS Spotlight Series - Modernization and Security with AWS
PPTX
How to think like a threat actor for Kubernetes.pptx
PPTX
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
PPTX
Modernizing Technology Governance
PDF
Beginners guide to aws security monitoring
PPTX
Ryan Smith's talk from the AWS Chicago user group May 22 - Security
Resposta a Incidentes | Mind The Sec 2022 com Rodrigo Montoro
The AWS Shared Responsibility Model in Practice
Top 5 AWS Security Mistakes and How to Stop Them Before You Lose Data
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Pitt Immersion Day Module 5 - security overview
The AWS Shared Responsibility Model: Presented by Amazon Web Services
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in aws
AWS Security 101: Understanding the Shared Security Model - Jeff Westphal, Mi...
The AWS Shared Responsibility Model in Practice - Nirav Kothari, AWS
Information Security in AWS - Dave Walker
Managing Security on AWS
The AWS Shared Responsibility Model in Practice
shared-responsibilitysecurity-roadshowlondon-160317131610.pptx
Security and compliance
AWS Spotlight Series - Modernization and Security with AWS
How to think like a threat actor for Kubernetes.pptx
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
Modernizing Technology Governance
Beginners guide to aws security monitoring
Ryan Smith's talk from the AWS Chicago user group May 22 - Security
Ad

More from Clavis Segurança da Informação (20)

PPTX
Bsides SP 2022 - EPSS - Final.pptx
PDF
Desenvolvimento Seguro de Software - 10o Workshop SegInfo - Apresentação
PPTX
Big Data e Segurança da Informação - 10o Workshop SegInfo - Apresentação
PDF
A maldição do local admin - 10o Workshop SegInfo - Apresentação
PDF
Adoção do PCI no Brasil - 10o Workshop SegInfo - Apresentação
PDF
PDF
Palestra Clavis - Octopus
PDF
Palestra Exceda - Clavis 2016
PDF
Clavis e Cyberark promovem almoço para sobre soluções para a área de Seguranç...
PDF
Webinar #27 - Curso Permanente ComPTIA Security+ Exame SY0 401
PDF
Webinar # 21 – Análise Forense de Redes
PDF
Manobras Evasivas: Técnicas de Evasão para Varreduras com o Nmap
PDF
Tutorial: Principais Vulnerabilidades em Aplicações Web – Rafael Soares Ferre...
PDF
Testes de Invasão ajudam a alcançar a conformidade - Segurança da Informação
PDF
Entendendo como as Mídias Socias Revolucionaram os Ataques de Força Bruta
PDF
Descobrindo (e Explorando) Vulnerabilidades em Aplicações Web com o Wmap
PDF
Gerenciamento de Vulnerabilidades em Redes Corporativas - CNASI - DF
PPT
Impacto sobre o Negócio da Exploração de Vulnerabilidades de Injeção em Aplic...
PPT
Gerenciamento de Vulnerabilidades em Redes Corporativas - CNASI RJ
PDF
Webinar #18 – A Nova Lei de Cibercrimes
Bsides SP 2022 - EPSS - Final.pptx
Desenvolvimento Seguro de Software - 10o Workshop SegInfo - Apresentação
Big Data e Segurança da Informação - 10o Workshop SegInfo - Apresentação
A maldição do local admin - 10o Workshop SegInfo - Apresentação
Adoção do PCI no Brasil - 10o Workshop SegInfo - Apresentação
Palestra Clavis - Octopus
Palestra Exceda - Clavis 2016
Clavis e Cyberark promovem almoço para sobre soluções para a área de Seguranç...
Webinar #27 - Curso Permanente ComPTIA Security+ Exame SY0 401
Webinar # 21 – Análise Forense de Redes
Manobras Evasivas: Técnicas de Evasão para Varreduras com o Nmap
Tutorial: Principais Vulnerabilidades em Aplicações Web – Rafael Soares Ferre...
Testes de Invasão ajudam a alcançar a conformidade - Segurança da Informação
Entendendo como as Mídias Socias Revolucionaram os Ataques de Força Bruta
Descobrindo (e Explorando) Vulnerabilidades em Aplicações Web com o Wmap
Gerenciamento de Vulnerabilidades em Redes Corporativas - CNASI - DF
Impacto sobre o Negócio da Exploração de Vulnerabilidades de Injeção em Aplic...
Gerenciamento de Vulnerabilidades em Redes Corporativas - CNASI RJ
Webinar #18 – A Nova Lei de Cibercrimes

Recently uploaded (20)

PDF
Connector Corner: Transform Unstructured Documents with Agentic Automation
PDF
Auditboard EB SOX Playbook 2023 edition.
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PDF
SaaS reusability assessment using machine learning techniques
PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
PDF
Co-training pseudo-labeling for text classification with support vector machi...
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PDF
Comparative analysis of machine learning models for fake news detection in so...
PPTX
MuleSoft-Compete-Deck for midddleware integrations
PPTX
future_of_ai_comprehensive_20250822032121.pptx
PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
PDF
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PPTX
SGT Report The Beast Plan and Cyberphysical Systems of Control
PPTX
agenticai-neweraofintelligence-250529192801-1b5e6870.pptx
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
Connector Corner: Transform Unstructured Documents with Agentic Automation
Auditboard EB SOX Playbook 2023 edition.
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
SaaS reusability assessment using machine learning techniques
Advancing precision in air quality forecasting through machine learning integ...
Improvisation in detection of pomegranate leaf disease using transfer learni...
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
Co-training pseudo-labeling for text classification with support vector machi...
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
Comparative analysis of machine learning models for fake news detection in so...
MuleSoft-Compete-Deck for midddleware integrations
future_of_ai_comprehensive_20250822032121.pptx
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
NewMind AI Weekly Chronicles – August ’25 Week IV
Rapid Prototyping: A lecture on prototyping techniques for interface design
SGT Report The Beast Plan and Cyberphysical Systems of Control
agenticai-neweraofintelligence-250529192801-1b5e6870.pptx
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf

Cloud Summit Canada com Rodrigo Montoro

  • 1. The deFAULT truth of AWS Shared Responsibility Model Rodrigo Montoro Head of Threat & Detection Research @spookerlabs
  • 2. $ aws --profile Rodrigo Montoro sts get-caller-identity Clavis Segurança da Informação ● Head of Threat & Detection Research at Clavis Security ● Living in Florianópolis (Silicon Island) ● Author of 2 patented technologies (US Patent Office) ● Speaker in different conferences (Brazil,USA,Canada) ● Proud Dad and Husband ● Full Ironman triathlon (2x) ● Crossfit and Powerlifting
  • 4. Some numbers(*) about security ‘IN’ the cloud (AWS) Clavis Segurança da Informação ● CSPM Detections (cloudsploit) ○ 460 findings (AWS) ○ 87 services covered (around 29% of services) ● Services with Passrole ○ 330 actions ○ 92 services (around 30.7% of services) ● Detections from Elastic rules ○ 59 detections ○ ~22 services covered (around 7.3% of services) ● Detections from Sigma ○ 31 detections ○ ~20 services covered (around 6.7% of services) * based on my analysis in open source tool and public content
  • 5. With some ideas in mind … Clavis Segurança da Informação
  • 6. Security Operations Center (SOC) AGENDA 1 AWS ecosystem / Control Plane DeFAULT Design Data Plane 1 1 Cross Account 1 Uncommon Services Conclusions
  • 7. 7 Clavis Segurança da Informação AWS Ecosystem / Control Plane
  • 8. AWS Shared Responsibility Model Clavis Segurança da Informação
  • 9. AWS In Numbers Clavis Segurança da Informação ● Around 13k actions ● 973 Managed policies ● Around 300 Services ● 18 regions ● 5 actions access level Source: https://aws.permissions.cloud/
  • 10. How authentication and authorization works Clavis Segurança da Informação
  • 11. AWS IAM policy flow analysis Clavis Segurança da Informação
  • 13. 13 Clavis Segurança da Informação DeFAULT Design
  • 14. How many problems an AWS account start (with an Admin user) ? Clavis Segurança da Informação
  • 15. Next let’s add an ec2 instance Clavis Segurança da Informação
  • 16. Just to finish a s3 bucket … Clavis Segurança da Informação
  • 17. Simple scenario (only 3 services) the "deFAULT problems” Clavis Segurança da Informação
  • 18. Some more details Clavis Segurança da Informação ● VPC Endpoint ○ Policy Resource : * ● IAM ○ Managed Policies ■ Resource: * ■ No Conditional ■ No control
  • 19. service enumeration is possible by design with account id Clavis Segurança da Informação source: https://www.sidechannel.blog/en/enumerating-services-in-aws-accounts-in-an-anonymous-and-unauthenticated-manner/
  • 20. 20 Clavis Segurança da Informação Data Plane
  • 21. Data Plane Clavis Segurança da Informação ● S3 buckets data events ● RDS Audit logs ● EKS (Kubernetes)
  • 22. S3 buckets Clavis Segurança da Informação
  • 23. VPC Flow Logs Clavis Segurança da Informação
  • 24. GuardDuty Clavis Segurança da Informação source: https://xmind.app/m/K3fmSB/# Events analyzed are NOT saved. Only the payload saved is the content that triggered the finding.
  • 25. 25 Clavis Segurança da Informação Cross Account
  • 26. What is Cross Account ? Clavis Segurança da Informação source: https://aws.amazon.com/blogs/security/how-to-audit-cross-account-roles-using-aws-cloudtrail-and-amazon-cloudwatch-events/
  • 27. Vendors / Partners Clavis Segurança da Informação ● Splunk history ● ReadOnlyAccess policy
  • 29. ReadOnlyAccess World (1/3) - Unwanted Permissions Clavis Segurança da Informação source: https://www.sidechannel.blog/en/unwanted-permissions-that-may-impact-security-when-using-the-readonlyaccess-policy-in-aws/ ● s3:GetObject ● lambda:GetFunction ● ec2:DescribeInstanceAttribute ● dynamodb:{Query,Scan} ● cloudtrail:LookupEvents
  • 30. ReadOnlyAccess World (2/3) - bad use everywhere Clavis Segurança da Informação source: https://www.wiz.io/blog/82-of-companies-unknowingly-give-3rd-parties-access-to-all-their-cloud-data
  • 31. ReadOnlyAccess World (3/3) - Sample of products Clavis Segurança da Informação Tenable - https://docs.tenable.com/tenablecs/quick-reference/AWS/Content/QuickReference/SetUpA WSReadOnlyAccess.htm Site24x7 - https://www.site24x7.com/help/aws/enable-aws-account-access.html NewRelic - https://docs.newrelic.com/docs/infrastructure/amazon-integrations/get-started/integrations- managed-policies/ Autocloud - https://docs.autocloud.dev/aws-account DivvyCloud - https://docs.divvycloud.com/docs/policies (some minor denies http://get.divvycloud.com/policies/ReadOnlywithAWSReadOnly.json ) Cloudockit - https://www.cloudockit.com/documentation/aws-create-user-for-cloudockit/ Hava.io - https://docs.hava.io/importing/aws/getting-started-with-aws/read-only-iam-user Cloudcraft - https://help.cloudcraft.co/article/87-connect-aws-account-with-cloudcraft
  • 32. 32 Clavis Segurança da Informação Uncommon Services
  • 33. What do I consider uncommon ? Clavis Segurança da Informação ● Services without security research related ○ big part of 300 services ○ almost 13000 actions ● Very specific services with only "few" customers
  • 34. So what is _REALLY_ uncommon ? How about Identity Center (SSO)? Clavis Segurança da Informação
  • 35. Passrole world Clavis Segurança da Informação source: https://twitter.com/noamdahan/status/1349384948998922240
  • 36. Appstream 2.0 Edition Clavis Segurança da Informação
  • 37. 37 Clavis Segurança da Informação Future & Conclusions
  • 38. Future and Conclusions Clavis Segurança da Informação ● Make sure you understand default configurations ● Validate cross account / partners permissions ● Know what you are running ● Find your knowledge gaps ● Keep researching and improving detections ● Make sure you train your team
  • 39. Thank you! See you at Sector Rodrigo Montoro @spookerlabs [email protected]