Securing Clouds: Untraditional Defenses I am in your , hacking

Moses Frost, Multi-Domain Architect Security @mosesrenegade

BRKSEC-2605 Cisco Webex Teams

Questions? Use Cisco Webex Teams to chat with the speaker after the session How 1 Find this session in the Cisco Events Mobile App 2 Click “Join the Discussion” 3 Install Webex Teams or go directly to the team space 4 Enter messages/questions in the team space

BRKSEC-2605 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 # cat whoami.json

{ “Moses Frost @mosesrenegade on social media”, “@ Cisco since 2012, One of the Cyber Threat Defense / CDC Architects”, “Red Teamer, Hacker, Tinkerer, Forensics, Security since the 90’s”, “SANS Author / Instructor”, “Fun Facts!” [ “BBS’s in the ‘90s ( Obv/2 )”, “Linux Kernel 1.3 (Dev Tree, Because why not)”, “Never wants to troubleshoot ISDN again <- no” ] }

BRKSEC-2605 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 4 Obligatory

Cuban Descent

From Miami

BRKSEC-2605 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 5 Agenda

• Traditional Defenses - A Crash Course

• Cloud Crash Course

• hacky hack hack : The Cloud

• Defenses in the Cloud

• Conclusion

BRKSEC-2605 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 6 Some restrictions

Time: We cannot cover … All the cloud infrastructures (Azure, GCP, Digital Ocean, , Etc, etc) … and Services Meshes (Only briefly) … Microservices and Cloud Native Applications We would need a week or so 

BRKSEC-2605 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 7 Instead check these out! Either today, tomorrow, or On-Demand!

{ “BRKSEC-2186”: “A MultiCloud Segmentation Journey through with Tetration”, “BRKSEC-2602”: “Cloud Managed Security Architecture and Design”, “BRKSEC-2382”: “Application Centric and User-Centric Security with Duo”, “BRKSEC-1839”: “Introduction to Application Security and DevSecOps” }

BRKSEC-2605 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 8 Traditional Defenses – Crash Course

What are ‘traditional’ defenses? DataCent er Several options Firewall Web Server Web - Network Defenses Application - I need to block ports with a Firewall, Inspect Packets with an IPS, protect users with File Server Files on Disk segmentation

- Server / Systems Defenses Domain Controller User - ACL on Filesystems Permissions - User Permissions - RBAC

- Application / Defenses - Secure Coding - WAF

BRKSEC-2605 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 9 Traditional Defenses – Crash Course

What are ‘traditional’ defenses? DataCent Firewall er Several options Port 80: Web Server Web - Network Defenses Allowed! Application - I need to block ports with a Firewall, Inspect Packets with an IPS, protect users with File Server Files on Disk segmentation TCP: 445 - Server / Systems Defenses DENIED! X Domain Controller User - ACL on Filesystems Permissions - User Permissions - RBAC

- Application / Database Defenses - Secure Coding - WAF

BRKSEC-2605 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 10 Traditional Defenses – Crash Course

What are ‘traditional’ defenses? DataCent er Several options Firewall Web Server Web - Network Defenses Application - I need to block ports with a Firewall, Inspect Packets with an IPS, protect users with File Server Access Files on Disk segmentation Access Servers Files - Server / Systems Defenses Domain Controller User - ACL on Filesystems X Permissions - User Permissions - RBAC

- Application / Database Defenses - Secure Coding - WAF

BRKSEC-2605 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 11 Traditional Defenses – Crash Course

What are ‘traditional’ defenses? X WAF Several options /user=`OR1=1; Web Server Web - Network Defenses Application - I need to block ports with a Firewall, Inspect /user=1 Packets with an IPS, protect users with Firewall File Server Files on Disk segmentation

- Server / Systems Defenses Domain Controller User - ACL on Filesystems DataCent Permissions er - User Permissions - RBAC

- Application / Database Defenses - Secure Coding - WAF

BRKSEC-2605 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 12 Cloud Crash Course Cloud Architectures a Crash Course

All cloud architectures are the same but different

Function AWS Azure Cloud Virtual Machines EC2, Lightsail Virtual Machine Compute Virtual Private VPC VPC VPC “Networks” Function Lambda Functions Functions

Object Store S3 Blob Storage Objects

Databases RDS Azure SQL Cloud SQL Permissions IAM AzureAD / Azure Google IAM Permissions

BRKSEC-2605 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 14 Cloud Architecture Components

API Routers Gatewa y We will focus on a few of the cloud services S3 - Amazon claims it has about 175 services, Azure over 600

EC Lambda We will cover the ones that are common User 2 Permissions VPC

The mature Cloud Service Providers will have the following services typically available: AWS S3 or a Environment that is not behind a Virtual Public Cloud Compute or Virtual Machines Some type of Serverless Environment There is a permission model on all cloud providers, they all differ

BRKSEC-2605 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 15 Compute and Networking

Typically Cloud Native Applications Multiple Availability Zones for cannot rely on the underlying hardware or networking - Compute Considerations that make Cloud - For or Datastorage Nodes Environments Unique: - For AWS S3 buckets (multi-region) - Compute can disappear You can interact dynamically with most of these providers - Networking and VPCs can suddenly disappear - Scalable Services

- Storage can disappear - Terraform / Ansible / Cloudformation You design your application around this

BRKSEC-2605 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 16 Example Architecture for Wordpress*

Network “A” Side Computer in “A”

Network “A” Side Computer in “A”

* This image is from AWS at: https://github.com/aws- samples/aws-refarch- wordpress

BRKSEC-2605 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 17 Hacky hack hack: the cloud "If I had an hour to solve a problem, I'd spend 55 minutes thinking about the problem and five minutes thinking about solutions."

-- Albert Einstein

BRKSEC-2605 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 19 Hacking the cloud?

We will be using ‘CloudGoat’ by Rhino Security to demonstrate the attacks in the talk • https://rhinosecuritylabs.com/aws/cloudgoat-vulnerable-design-aws- environment/ We will be using two scenarios: - cloud_breach_s3 - ec2_ssrf

BRKSEC-2605 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 20 A word on Cloud Architecture

Cloud Service Providers have very specific items that we need to be aware of: They usually provide an API SDK or just a pain API to control your assets

Amazon Amazon arn:aws:ec2:7654321:* API User – Company A EC2 Public IP

User – C