Shadow Access breaks cloud and data security, audit, compliance and governance and IAM operations in the cloud must be instrumented for this new age of access and data security.
Expanding Cloud Access Surface
This may be new for some, but everything you spin up in the Cloud has an identity with access to a critical cloud service, supply chain or data. Weaponization of access, therefore, is a significant problem in the cloud. The most recent Verizon DBIR report highlights that 80% of breaches were related to identity and access. Zettabytes of data are being stored in cloud platforms which is driving a massive demand for access to this data. New Identities and access are being automatically created with little to no governance. In AWS alone there are 12,800 cloud services with 13,800 permissions attached, creating an enormous set of permutations and combinations of cloud access.
Developers and product teams are rapidly combining cloud services with data to create new applications like AI Chatbots, customer data platforms, software supply chains, and third-party SaaS. These developer combinations continually expand the cloud access surface and also create chains of invisible and vulnerable access that can be quickly weaponized by external parties looking to exfiltrate sensitive data.
What Causes Shadow Access?
There are two key trends that are creating the perfect storm to enable the weaponization of access.
One is the automated cloud via infrastructure as code driven by the CI/CD toolchains that are in use everywhere.
The second important trend is the general environment of overly permissioned cloud environments plus programmatic access that is now commonplace in cloud native environments. The automation, programmability, and speed of the cloud make weaponization of access very easy for attackers and adversaries. APIs, automated provisioning, and generally overly permissioned cloud environments amplify the weaponization of access.
“The existence of hundreds (or sometimes thousands) of identities – both human and programmatic – across the CI/CD ecosystem, paired with a lack of strong identity and access management practices and common usage of overly permissive accounts, leads to a state where compromising nearly any user account on any system, could grant powerful capabilities to the environment, and could serve as a segue into the production environment.”
– Verbatim from OWASP Top 10 CI CD SEC-2
Types of Shadow Access:
There are many types of shadow access created by combinations of identities (i.e. third party, developer, stale accounts, machine identities) with access types, such as dormant access, chained (or secondary access), unauthorized access (via malicious systems or IP), cross account access.
These identity vectors combine with access exploit vectors to access cloud services including: SW supply chain, Applications, APIs, developer toolchains and cloud data including – disaster recovery assets, databases/stores, and sensitive data (PII, PHI,PCI).
Shadow Access results from this collection of identities and permissions creating toxic combinations of live and active pathways to access and exfiltrate data. Attackers weaponize the weakest link in this chain to exfiltrate data and carry out attacks including ransomware attacks and crypto-mining.
A perfect illustration of Shadow Access is the CircleCI breach. In this incident, the unauthorized actor exfiltrated customer information on December 22, 2022, which included environment variables, keys, and tokens for third-party systems.
Customers want to know whether their stolen keys were weaponized against their cloud accounts. Stated differently, customers want to track Shadow Access activity in their environments from these access keys and stop them. CircleCI or any other current tool has no way of answering this question.
Today Red teams, identity practitioners, audit, governance, security operations and data owners are all impacted by shadow access risks.They cannot solve the problem because of their own silos of processes – IAM processes, Data Security, SecOps and IAM governance that do not share data or context.
Cloud teams deal with too many IAM tools. This scatters IAM data (permissions, ticketing, access, approvals) in several different places.
- In the current environment, context is missing, making it difficult to dynamically manage the right accesses to the right data.
- IAM governance is broken by IaC driven cloud automation and overly permissioned practices.
Each of these teams are asking the same question – is there a weaponized pathway to get to my data?
Solving the problem of shadow access and weaponization needs new operational processes built on the ground truth of accurate IAM data, and a process that delivers a closed loop across detection, audit and governance and can continuously operationalize the principle of least privilege.
Shadow Access is a New Cloud Security Alliance IAM Subgroup!
The IAM Working Group will educate and guide the use of traditional on-premises and cloud-based IAM systems with and between cloud services, including integration and federation of internet access tokens and credentials with on premises IAM.
- Join the Cloud Security Alliance IAM Working Group
- Get involved with the Shadow Access Subgroup
Original Blog by Venkat Raghavan here