Exposed: Private Amazon S3 bucket exposure

CloudAWSAWS S3 bucketCloud Optix

Even S3 buckets with “private” mode enabled are vulnerable to attack, make sure you secure the weak link.

The thousands of cloud data storage service breaches publicized in the news have raised awareness of vulnerabilities caused through misconfigured “public” access, but cloud security breach tactics go far beyond this.

Did you know that even S3 buckets with “private” mode enabled are still vulnerable to attack? They are, and the identity and access management (IAM) roles and permissions you assign to AWS EC2 instances are the weak link.

Recent high-profile attacks targeting “private” Amazon S3 buckets are said to have exposed 140,000 Social Security numbers and 80,000 bank account numbers, exploiting over-privileged IAM roles and instance permissions through a flaw in the web application firewall (WAF). These attacks retrieve IAM credentials via an SSRF vulnerability to access data and files in “private” mode.

The risk of over-privileged IAM roles

Those IAM roles assigned to each AWS EC2 instance will have permissions to perform certain tasks and access certain services. Under normal circumstances, that role is only used on the specific EC2 instance.

However, in these breaches, an attacker steals the credentials using methods such as exploiting a flaw in the WAF to retrieve IAM credentials via an SSRF vulnerability.

The attacker then uses that compromised IAM role from a different EC2 instance to access resources, such as S3 buckets. This allows the attacker to list and sync the valuable contents to local disk and access all the data that was supposed to be “private.”

Prevention is better than a cure

Sophos Cloud Optix makes it simple for organizations to identify over-privileged and IAM roles and compromised EC2 credential attacks.

Users and services that are assigned too many permissions are easily pinpointed, allowing you to assess your IAM role security posture before an attacker does.

When stolen credentials are used, you need to act fast. In this case, Cloud Optix detects and alerts you to the use of temporary IAM role credentials that are assigned to a specific EC2 instance, which are used from a different resource.

Ensure “private” means “private” by following these simple steps from Cloud Optix and avoid the attacker techniques used here in recent high-profile attacks.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.