Lightspin Security Research Team Reveals AWS Identity and Access Management Vulnerable to Abuse
- Wall Street closes lower as virus spike hits travel stocks
- Netflix (NFLX) Tops Q1 EPS by 78c, Subs Miss
- Analysts Positive, Raise PTs as IBM (IBM) Tops Market Estimates and Reaffirms Guidance
- Boeing (BA) Down 3% After CFO - Aged 54 - Retires, Seen as an 'Odd' Move
AWS authorization bypass enables attacker to change login information and take over accounts undetected
Get instant alerts when news breaks on your stocks. Claim your 1-week free trial to StreetInsider Premium here.
TEL AVIV, Israel, March 24, 2021 /PRNewswire/ -- Lightspin, a pioneer in contextual cloud security protecting native, Kubernetes, and microservices from known and unknown risks, today announced the results of its research, which discovered a gap between AWS Identity and Access Management (IAM) user and group policies that an attacker can abuse to take over accounts, delete group members, steal data and shut down services. The research team was able to compromise dozens of accounts by using this technique.
"Initially, we believed this vulnerability was an isolated case," said Vladi Sandler, CEO at Lightspin. "However, upon further investigation, we found that in many cases, users could perform actions that system administrators believed were denied when they configured group security configurations. This makes users accounts believed to be safe, easy to infiltrate."
Lightspin researchers discovered that many security administrators were unaware that AWS IAM rules do not work the same way as Azure Active Directory or other authorization mechanisms.
While defining Active Directory Azure policies, if a group is denied read access to the file, all group members cannot access it. However, IAM handles group and user authorizations separately. Even if a group has an explicit denial, this will only impact group actions, not user actions. Amazon does not warn system administrators that users' accounts can still be accessed even if their group is protected.
Based on Lightspin's research, more than half of the companies they work with have unintentional loose permissions for their users due to this authorization bypass, putting them at risk. There are two options to ensure that users can't perform actions they were intended to be denied using group authorizations:
- Each user can be listed separately while setting deny rules.
- Each user can be tagged to be included in a group.
Both procedures can be cumbersome and difficult to maintain but are the best way to prevent intruders from changing login information and taking over accounts.
Lightspin has developed an open-source scanner that reports when user permissions are loosely defined, opening up an attack path for hackers. To download Lightspin's open source IAM vulnerability scanner, click here. For access to the Lightspin research findings, click here.
Lightspin's contextual cloud security platform protects native Kubernetes, and microservices from known and unknown risks. Using predictive graph-based technology, Lightspin empowers cloud and security teams to eliminate risks by proactively blocking all attack paths while maximizing productivity by dramatically reducing and prioritizing security alerts to cut down remediation time. For more information, visit: https://www.lightspin.io/
Contacts:Spicetree CommunicationsWes Rogerst: +1-912-506-0869e. email@example.com
Serious News for Serious Traders! Try StreetInsider.com Premium Free!
You May Also Be Interested In
- InventHelp Inventor Develops Modified Packaging for Food/Snack Bags (JMC-2337)
- InventHelp Inventor Develops Modified Design for Sinks (LAX-1249)
- InventHelp Inventor Develops Modified Packaging for a Case of Beer (OCM-1454)