Uploaded by Helen Otis

Getting Started with Cloud Red Team

advertisement
Getting Started with
Hybrid Multi-Cloud Red Teaming
© CW Labs UK Pvt. Ltd.
Introduction to
Hybrid Multi-Cloud
Red Teaming :
●
Hybrid Multi Cloud Environment Overview
●
AWS Cloud Overview
●
Google Cloud Overview
●
Azure Cloud Overview
●
CTF Exercise
2
Module - 1 :
Hybrid Multi Cloud
Environment Overview
3
Network Architecture of On-Premise Environment
Internal Network
External Network
Domain
Controller
Web server
Internet
Firewall
DNS server
Firewall
Printer
Mail server
Workstation
DMZ Zone
AD Environment
4
Network Architecture of Active Directory Forest
DC1
DC2
Cross Forest
Trust relationship
Domain 1
abc.com
DC 3
Child Domain 1
accounts.abc.com
Identity
Tree
Domain 2
xyz.com
DC 4
Child Domain 2
sales.abc.com
AD Internal Network (Forest)
DC 5
Tree2
Child Domain 1
hr.xyz.com
5
AWS Multi Accounts Architecture
AWS Organization
AWS
Master Account
AWS Child Account 1
AWS Child Account 2
AWS Child Account 2
6
Azure Cloud Working Model
n
th
u
A
tio
a
tic
n
e
Azure AD
Au
th
en
tic
at
ion
Idaas
Azure Resource
Manager (ARM)
(IaaS, PaaS, SaaS)
O365 / M365
(SaaS)
7
Azure Cloud Hierarchy
AAD Tenant
Management Group
Subscription
Resource Group
Resource
Google Cloud Working Model
n
th
u
A
tio
a
tic
n
e
Cloud
Identity
IdaaS
Google cloud
(IaaS, PaaS, SaaS)
Authentication
Google workspace
(SaaS, IdaaS)
9
GCP Cloud Hierarchy
Organization
Company
Dept X
Shared
Infrastructure
Dept Y
Folders
Team A
Team B
Product 1
Projects
Resources
Dev GCP
Project
Compute Engine
Instances
Test GCP
Project
App Engine
Services
Product 2
Production
GCP Project
Cloud Storage
Buckets
Network Connectivity between Cloud & On-Premise
Cloud to Cloud Connectivity
AWS
GCP
Azure
On-Premise to Cloud
& Cloud to On-Premise
Network Connectivity
Active Directory
On-Premise Environment
User/
Employee
11
Identity Federation from On-Premise to Cloud
portal.aws.com
portal.azure.com
console.cloud.google.com
AWS
Azure
GCP
3. IdP SAML Response
(Authentication)
3. IdP SAML Response
(Authentication)
3. IdP SAML Response
(Authentication)
OKTA|Onelogin|AAD
User
Credential SSO
2. User
Authentication
External IdP
[Source Idp]
Active directory
(On-Premise)
Internal IdP
1. DcSync with External Idp
Hybrid Multi Cloud Environment Access
AWS Account
Assume Role (ARN)
AWS Account
AWS Account
Assume Role (ARN)
Primary
AWS account
Assume Role(ARN)
AWS SSO User
Azure Subscription
Identity Sync
Identity Sync
Identity Sync
User
Workspace or
Cloud Identity user
GCP Organization
Azure AD User
Primary
Azure Tenant
Azure Subscription
On-Premise AD User
[Email / Password]
(Cross Project Access)
(Cross Subscription Access)
GCP Project
GCP Project
GCP Project
Azure Subscription
Credentials in Hybrid Multi Cloud Environment
Credentials
Long Term
Credential
Short Term
Credential
Graphical User Interface
(GUI)
Programmatic Interface
(CLI/ SDK)
Programmatic Interface
(CLI/ SDK)
Username &
Password
Access Key
Service Principal
Service Account
Access Token
14
Module - 2 :
AWS Cloud Overview
15
AWS Cloud Architecture
Cloud Space
Compute
AWS Web Portal
AWS Services
Control Plane
GUI
Storage
Data Plane
• Long Term Key : Access Key ID & Secret
• IAM Username & Password
Web Client
• SSO Username & Password
AWS CLI
End User
SDK/API
• Short Term Key : Access Key ID & Secret & Token
16
Identity and Access Management
IAM :
• AWS Identity and Access Management (IAM) enables you to manage access to AWS services and resources
securely.
• IAM allow you can create and manage AWS users and groups and use permissions to allow and deny their access to
AWS resources.
AWS IAM allows:
1. Manage IAM users, groups and their access.
2. Manage IAM roles and their permissions.
3. Manage federated users and their permissions.
17
IAM
Users
Roles
Groups
Po
li
cy
Att
ach
ed
to
U
Policy Attached
to Groups
ser
d
che
a
t
t
y A oles
c
i
l
R
Po
Policy
Effect
Actions
Policy Contains Permissions
Resources
to
AWS Services
Role Attached
to Services
Policy Data :
1. Effect - Use to Allow or Deny Access
2. Action - Include a list of actions (Get, Put, Delete) that the policy allows or denies.
3. Resource - A list of resources to which the actions apply
19
Module - 3 :
Google Cloud Overview
20
Idaas
ion
t
ica
t
en
h
t
Cloud
Identity
Au
Authentication
Google Cloud Platform
(IAAS, PASS, SAAS)
Google workspace
(SAAS, Idaas)
Organization
Company
Dept X
Shared
Infrastructure
Dept Y
Folders
Team A
Team B
Product 1
Projects
Resources
Dev GCP
Project
Compute Engine
Instances
Test GCP
Project
App Engine
Services
Product 2
Production
GCP Project
Cloud Storage
Buckets
GCP Cloud IAM
Organization
Set Of
Permission 1
Set Of
Permission 2
Folder
Project
IA
M
Po
l
icy
Ap
pl
ied
On
aR
es
ou
rc
e
Role 2
Resource
Member 1
Member 1
Role Binding
Member 2
Role Binding
Policy
Resources
Permissions are inherited
Role 1
IAM Role Binding - Organization Level
24
Module - 4 :
Azure Cloud Overview
25
IdAAs
ion
t
ica
t
en
h
t
Au
Azure
AD
Au
th
en
tic
at
io
n
Azure Resource
Manager (ARM)
O365 / M365
(Office 365)
(IAAS, PAAS, SAAS)
(SAAS)
Enterprise Global Azure Account
AAD Tenant
Management
Group
Subscription
Resource
Group
Resource
27
Role Based Access Control (RBAC)
• Azure RBAC is an authorization system built on Azure Resource Manager (ARM) that provides
fine-grained access management of Azure resources.
• Role Based Access Control [RBAC] Components •
Role Assignment
■ Security principal
■ Scope
■ Roles Definition
Role Assignment Hierarchy
Permission
inherit
from top to
bottom
Azure tenant
Group
Management
Group
User
Service
Principal
Management
Group
Identify
(Security Principal)
Mananged
Identify
Resource Group
Role Definition
[Permissions]
Subscription
Subscription
Resource
Resource
Subscription
Resource Group
Resource Group
Resource Group
Resource
Resource
Resource
Role Assignment on Subscription Level
30
Thank You !
In case of any difficulties or queries, feel free to mail us at
support@cyberwarfare.live
●
Follow us on :
LinkedIn: https://www.linkedin.com/company/cyberwarfare/
Twitter: https://twitter.com/cyberwarfarelab
●
For More Information Visit :
Enterprise Red / Blue Team Lab : https://cyberwarfare.live
Red /Blue Team Blog: https://cyberwarfare.live/blog/
© CW Labs UK Pvt. Ltd.
31
Download