Section 3: Security Services and Data Discovery Flashcards
(40 cards)
Which of the following pieces of information do attackers typically try to gather from an application running on a Cloud system when they perform an SSRF attack?
Application secret key and token
User credentials
Application private certificate and secret key
Application cookie and private certificate
b5af1104-a068-4ffb-bd9d-9bf15605ba09
During the Capital One attack, the attacker asked the application to return its own secret key and token information provided by the AWS management environment by querying the metadata service.
Book 3 Page 8
An attacker queries the metadata service of an EC2 system with an IP address of 169.254.169.254. What information would they receive from the metadata service that can enable them to make calls to AWS API from an attacker’s machine?
Temporary access token
API key
System password
Metadata ID
dabaca1e-7791-4339-a5db-302a6f3e6e78
This metadata service is available by querying the IP address 169.254.169.254, which acts as a REST interface. This is not a normal IP address that is routable to some web server in AWS.
The metadata service interacts with the AWS IAM service to create a temporary access token for that instance that can be used to make calls for resources through the AWS API.
Book 3 Page 10
What is the next step after Cloud Service Discovery that an attacker typically performs to determine which infrastructure is available for different services?
System infrastructure discovery
Cloud infrastructure discovery
Cloud service scanning
Cloud infrastructure scanning
229b11f1-0340-4280-a651-b4ff2e4915b4
Right after a Cloud Service Discovery, the attacker will do Cloud Infrastructure Discovery (T1580), which determines the infrastructure available from these services.
Book 3 Page 11
What rule should be followed when provisioning bucket access to a web application?
IAM access analyzer
Star (*) permissions
Least privilege
Full access
2799230a-f8a4-405d-8aa7-9ce5b9246387
When building new tools and testing them out, developers tend to create roles that are over provisioned, thus violating the rule of least privilege. As a security professional, you always want your compute application to be granted only the permissions it absolutely needs.
Book 3 Page 13
What three pieces of information are needed to configure an AWS CLI on any workstation?
SecretAccessKey, Credential, and Token
AccessKeyID, SecretAccessKey, and IP Address
AccessKeyID, SecretAccessKey, and Token
AccessKeyID, Password, and Token
287cf37c-cacd-4319-9cc1-d41b1b400a9e
AccessKeyID, SecretAccessKey, and Token. These three pieces of information are all that is needed to configure an AWS CLI on any workstation — even sitting at home, with the credentials necessary to make calls to the AWS API service as if they were the inspector-role. They would simply need to update the AWS CLI’s credentials file3 to use the retrieved secrets.
Book 3 Page 28
An analyst would like to query Azure metadata services. What should be the value of the custom header field for them to be able to perform this?
Securitytoken:true
Encrypted:true
Metadata:false
Metadata:true
cd4daffe-0e2e-40e7-bec0-8f93f2509084
Azure requires a custom header to be sent as part of the HTTP GET request. The value of the header must be Metadata:true to signify in the request that: yes, you know this is for metadata and nothing else. Without the header, the Azure metadata service will drop the query.
Book 3 Page 31
Azure has two types of managed identities. Which managed identity is enabled on the cloud resource and has a lifecycle tied to that of the resource?
User-assigned
Metadata-assigned
Cloud-assigned
System-assigned
9d9abab7-ba2a-4b19-9aad-d05b4253ab96
System-assigned managed identity is enabled on cloud resource, and its lifecycle is tied to that of the resource. System-assigned allows the Azure customer to allow Azure to generate and assign a new identity during a cloud resource deployment (or even after the resource has been provisioned). The lifecycle is also handled by Azure in that, when the cloud resource in which this identity is assigned is deleted, so is the identity.
Book 3 Page 32
AWS implemented the IMDSv2 service to add a layer of security on metadata service calls. What HTTP method needs to be used as a part of the IMDSv2 metadata call?
HTTP GET method
HTTP HEAD method
HTTPS PUT method
HTTP PUT method
ec084689-75fa-4847-a6cc-af308954be24
While communicating to IMDSv2, the cURL command must use an HTTP PUT command to /latest/api/token to return a TOKEN value. Applications that are vulnerable to SSRF are usually performing a GET; the requirement for a PUT will plug up that hole.
Book 3 Page 33
Which AWS service can be used to locate the use of EC2 IMDSv1 tokens?
AWS AccessAnalyzer
AWS GuardDuty
AWS CloudTrail
AWS CloudWatch
b57a45af-c1a1-4f95-8f18-5090f0578180
CloudWatch has a metric of MetadataNoToken that tracks calls to the IMDSv1 service on EC2s through CloudWatch agent.
Book 3 Page 34
An analyst is dealing with lot of findings generated through GuardDuty. What could they do to limit and remove findings from the dashboard?
Suppression rule
Signature rule
Filtering rule
Alerting rule
9702172b-9434-4304-929a-aa08be39c293
GuardDuty can be noisy, and it may flag activity that is normal in your environment, or you may not wish to see reports. To limit and remove findings from the dashboard, you can create a filter and apply it as a suppression rule.
Book 3 Page 42
Which of the following accurately describes serverless architecture?
Executing software without having to manage the compute resources under it
Using continuous integration and continuous deployment to deploy new software
Deploying new software into a cloud hosted EC2 instance
Executing infrastructure as code to deploy new infrastructure
40ca896-bb52-4a31-95d1-cc4e1803c6f8
A serverless architecture means that the customer does not manage the underlining compute resource, elasticity, and deployment.
Book 3 Page 46
Which of the following accurately describes serverless architecture?
Deploying new software into a cloud hosted EC2 instance
Executing software without having to manage the compute resources under it
Using continuous integration and continuous deployment to deploy new software
Executing infrastructure as code to deploy new infrastructure
540ca896-bb52-4a31-95d1-cc4e1803c6f8
A serverless architecture means that the customer does not manage the underlining compute resource, elasticity, and deployment.
Book 3 Page 46
Which of the following would be a good use of AWS Lambda?
Sending a notification to the user when their order status has changed
Running a permanent website using Python Flask framework
Performing a one-time update of a database table
Executing workloads that require local access to resources
9ac389b8-3291-4a91-9c6f-6289f5b4b02d
Sending a notification to the user when their order status has changed
AWS Lambda is a serverless compute service that lets you run arbitrary code when an event occurs. Long running applications or ones that need local resources are better served with alternate services.
Book 3 Page 47
Which unique feature of Azure Functions helps ensure application of least privilege?
Invocation options
IAM principals
No concurrency limit
Input/output bindings
18f2425a-d4d2-4e77-86bf-1a5d7e62472f
Azure Functions supports resource binding for input and output. In the configuration of the Azure function, you specify the Azure Blob that data will be read from or written to.
Book 3 Page 48
Which Lambda/Functions logging feature can be used for troubleshooting an application?
Log and print statement recording
Log Forwarding
CloudWatch log groups
General execution information
c9727066-0049-4fdb-871c-27bb4a3c3eff
AWS Lambda and Azure Functions will record logging/print statements from the app itself. Normally you turn this off to reduce costs, but it might be necessary for application troubleshooting.
Book 3 Page 49
How do Lambda functions access sensitive environment information?
Stored in protected S3 buckets
Sending an HTTP request to a service on a local port
Querying the AWS secrets server
Injected environment variables at runtime
b847ce7a-0c44-4330-9a47-507ae01677d8
Lambda makes key data available through environment variables that are injected into the runtime environment of the Lambda function upon execution.
Book 3 Page 50
What attack can be performed where the goal is to execute code within the operating environment of a Lambda function in order to return the sensitive information stored in the environment variables?
Privilege escalation
Data exfiltration
Command injection
Denial of service
3a68f177-6d65-4e79-a81f-2bc18ceecdf5
Command injection, or command and scripting interpreter attack, is when the attacker abuses the execution of a command, script, or binary by providing an input value that was not expected. A typical command injection vulnerability comes from improperly sanitized inputs.
Book 3 Page 51
When interacting with a cloud environment, which tool offers the least amount of customization?
Command Line
SDK
CLI
GUI
b16c75ca-a5f6-45f4-885a-74c537fc9e2f
One drawback of using web GUIs to access cloud environments is that they are designed for a broad audience and not tailored specifically to your needs.
Book 3 Page 59
Which of the following provides a way to add metadata to your AWS or Azure resource that is user controlled?
Keys
Comments
Tags
Metadata
588e5ca9-d54a-4cfb-8626-523feac143a0
Tags are a way to add metadata to your AWS or Azure resource that is user controlled and can greatly help in an investigation. Tags themselves have no special magical property, but they can be used to change the way IAM policies work, how your automations use the resource, and how you bill sub teams.
Book 3 Page 69
What feature can cloud customers use to add metadata to AWS or Azure resources?
Instance Metadata Service
Pins
Notes
Tags
edc3c507-8185-4ada-a073-8be6295813b2
Tags are a user-controlled way to add metadata to your AWS or Azure resource that can significantly help in an investigation. They have no particular magical property in and of themselves, but they can change how IAM policies work, how your automation uses the resource, and how you bill sub-teams.
Book 3 Page 69
Which of the following is an AWS resource inventory, configuration history, and configuration change notification service?
AWS Security Hub
AWS Config
AWS Configuration Manager
GuardDuty
dba1d1a5-7af0-468c-94db-4008089300e4
AWS Config was introduced in November of 2014 as an AWS resource inventory, configuration history, and configuration change notification service. AWS has since expanded AWS Config to support integration of compliance and conformance packs with configuration rules that let you define how resources should be configured and perform alerts or automated response actions when the rule is broken.
Book 3 Page 71
Which AWS service focuses on resource inventory and configuration history?
AWS GuardDuty
AWS Configuration Manager
AWS Glacier
AWS Config
adb6bff4-12f4-4158-882c-d9a4194fbefa
AWS Config was introduced in November 2014, initially focusing on resource inventory and configuration history.
Book 3 Page 71
As an analyst, which of the following AWS services can be utilized to see a timeline of changes, details of changes, and to help tell the story of the resource?
AWS Config
AWS SecurityConfig
AWS GuardDuty
AWS SecurityHub
9a5454da-3f9e-4310-a8bd-36da45961634
AWS Config provides GUI and command-line access to resources and relationships. It gives a timeline of changes, details of changes, and can be used to help tell the story of the resource.
Book 3 Page 77
An analyst would like to use the “Run Command” feature to launch customized commands and search for IoCs on AWS cloud systems. Which of the following is a requirement to perform this?
Target instances should have EDR installed.
Target instances should be SSM-managed.
Target instances should be reachable from the Internet.
Target instances should be running Linux.
483a01b5-2969-4088-a0a6-a4587c403423
The AWS System Manager (SSM) is an agent that runs on your EC2s with a dedicated GUI to run operations on your EC2s. The real power of System Manager is how the AWS service can collect some of the results and provide visualizations and invoke automations. System Manager was built to run commands across a fleet of systems and can be used to use the Run Command feature.
Book 3 Page 86