You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: docs/risks/ebs.md
+9
Original file line number
Diff line number
Diff line change
@@ -70,6 +70,15 @@ After an EBS Snapshot is made public, an attacker can then:
70
70
71
71
Also, consider using [Cloudsplaining](https://github.com/salesforce/cloudsplaining/#cloudsplaining) to identify violations of least privilege in IAM policies. This can help limit the IAM principals that have access to the actions that could perform Resource Exposure activities. See the example report [here](https://opensource.salesforce.com/cloudsplaining/)
72
72
73
+
## Basic Detection
74
+
The following CloudWatch Log Insights query will include exposure actions taken by endgame:
| filter eventSource='ec2.amazonaws.com' and (eventName='ModifySnapshotAttribute' and requestParameters.attributeType='CREATE_VOLUME_PERMISSION')
78
+
```
79
+
80
+
This query assumes that your CloudTrail logs are being sent to CloudWatch and that you have selected the correct log group.
81
+
73
82
## References
74
83
75
84
*[Sharing an Unencrypted Snapshot using the Console](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ebs-modifying-snapshot-permissions.html#share-unencrypted-snapshot)
Copy file name to clipboardexpand all lines: docs/risks/ec2-amis.md
+9
Original file line number
Diff line number
Diff line change
@@ -63,6 +63,15 @@ After an EC2 AMI is made public, an attacker can then:
63
63
64
64
Also, consider using [Cloudsplaining](https://github.com/salesforce/cloudsplaining/#cloudsplaining) to identify violations of least privilege in IAM policies. This can help limit the IAM principals that have access to the actions that could perform Resource Exposure activities. See the example report [here](https://opensource.salesforce.com/cloudsplaining/)
65
65
66
+
## Basic Detection
67
+
The following CloudWatch Log Insights query will include exposure actions taken by endgame:
Copy file name to clipboardexpand all lines: docs/risks/ecr.md
+16
Original file line number
Diff line number
Diff line change
@@ -80,6 +80,22 @@ TODO
80
80
81
81
Also, consider using [Cloudsplaining](https://github.com/salesforce/cloudsplaining/#cloudsplaining) to identify violations of least privilege in IAM policies. This can help limit the IAM principals that have access to the actions that could perform Resource Exposure activities. See the example report [here](https://opensource.salesforce.com/cloudsplaining/)
82
82
83
+
## Basic Detection
84
+
The following CloudWatch Log Insights query will include exposure actions taken by endgame:
Copy file name to clipboardexpand all lines: docs/risks/elasticfilesystem.md
+15
Original file line number
Diff line number
Diff line change
@@ -94,6 +94,21 @@ TODO
94
94
95
95
Also, consider using [Cloudsplaining](https://github.com/salesforce/cloudsplaining/#cloudsplaining) to identify violations of least privilege in IAM policies. This can help limit the IAM principals that have access to the actions that could perform Resource Exposure activities. See the example report [here](https://opensource.salesforce.com/cloudsplaining/)
96
96
97
+
## Basic Detection
98
+
The following CloudWatch Log Insights query will include exposure actions taken by endgame:
Copy file name to clipboardexpand all lines: docs/risks/elasticsearch.md
+9
Original file line number
Diff line number
Diff line change
@@ -43,6 +43,15 @@ However, if **Public Access** _is_ necessary, follow the steps below to remediat
43
43
44
44
Also, consider using [Cloudsplaining](https://github.com/salesforce/cloudsplaining/#cloudsplaining) to identify violations of least privilege in IAM policies. This can help limit the IAM principals that have access to the actions that could perform Resource Exposure activities. See the example report [here](https://opensource.salesforce.com/cloudsplaining/)
45
45
46
+
## Basic Detection
47
+
The following CloudWatch Log Insights query will include exposure actions taken by endgame:
Copy file name to clipboardexpand all lines: docs/risks/glacier.md
+15
Original file line number
Diff line number
Diff line change
@@ -54,6 +54,21 @@ TODO
54
54
55
55
Also, consider using [Cloudsplaining](https://github.com/salesforce/cloudsplaining/#cloudsplaining) to identify violations of least privilege in IAM policies. This can help limit the IAM principals that have access to the actions that could perform Resource Exposure activities. See the example report [here](https://opensource.salesforce.com/cloudsplaining/)
56
56
57
+
## Basic Detection
58
+
The following CloudWatch Log Insights query will include exposure actions taken by endgame:
Copy file name to clipboardexpand all lines: docs/risks/iam.md
+11-1
Original file line number
Diff line number
Diff line change
@@ -163,6 +163,16 @@ aws sts get-caller-identity
163
163
164
164
Also, consider using [Cloudsplaining](https://github.com/salesforce/cloudsplaining/#cloudsplaining) to identify violations of least privilege in IAM policies. This can help limit the IAM principals that have access to the actions that could perform Resource Exposure activities. See the example report [here](https://opensource.salesforce.com/cloudsplaining/)
165
165
166
+
## Basic Detection
167
+
The following CloudWatch Log Insights query will include exposure actions taken by endgame:
Copy file name to clipboardexpand all lines: docs/risks/kms.md
+15
Original file line number
Diff line number
Diff line change
@@ -59,6 +59,21 @@ TODO
59
59
60
60
Also, consider using [Cloudsplaining](https://github.com/salesforce/cloudsplaining/#cloudsplaining) to identify violations of least privilege in IAM policies. This can help limit the IAM principals that have access to the actions that could perform Resource Exposure activities. See the example report [here](https://opensource.salesforce.com/cloudsplaining/)
61
61
62
+
## Basic Detection
63
+
The following CloudWatch Log Insights query will include exposure actions taken by endgame:
Also, consider using [Cloudsplaining](https://github.com/salesforce/cloudsplaining/#cloudsplaining) to identify violations of least privilege in IAM policies. This can help limit the IAM principals that have access to the actions that could perform Resource Exposure. See the example report [here](https://opensource.salesforce.com/cloudsplaining/)
93
93
94
+
## Basic Detection
95
+
The following CloudWatch Log Insights query will include exposure actions taken by endgame:
Copy file name to clipboardexpand all lines: docs/risks/rds-snapshots.md
+11-2
Original file line number
Diff line number
Diff line change
@@ -57,11 +57,20 @@ After the RDS snapshot is public or shared with the rogue user account, an attac
57
57
-[rds:DescribeDbClusterSnapshots](https://docs.aws.amazon.com/AmazonRDS/latest/APIReference/API_DescribeDBClusterSnapshots.html): _Grants permission to return information about DB cluster snapshots._
58
58
-[rds:DescribeDbSnapshotAttributes](https://docs.aws.amazon.com/AmazonRDS/latest/APIReference/API_DescribeDBSnapshotAttributes.html): _Grants permission to return a list of DB snapshot attribute names and values for a manual DB snapshot. This includes information on which AWS Accounts have access to the snapshot._
59
59
-[rds:DescribeDbSnapshots](https://docs.aws.amazon.com/AmazonRDS/latest/APIReference/API_DescribeDBSnapshots.html): _Grants permission to return information about DB snapshots_
60
-
-[rds:ModifyDbSnapshotAttribute](https://docs.aws.amazon.com/AmazonRDS/latest/APIReference/API_ModifyDBSnapshotAttribute.html): _Grants permission to add an attribute and values to, or removes an attribute and values from, a manual DB snapshot. This includes the ability to share snapshots with other AWS Accounts._
61
-
-[rds:ModifyDbClusterSnapshotAttribute](https://docs.aws.amazon.com/AmazonRDS/latest/APIReference/API_ModifyDBClusterSnapshotAttribute.html): _Grants permission to add an attribute and values to, or removes an attribute and values from, a manual DB cluster snapshot. This includes the ability to share snapshots with other AWS Accounts._
60
+
-[rds:ModifyDBSnapshotAttribute](https://docs.aws.amazon.com/AmazonRDS/latest/APIReference/API_ModifyDBSnapshotAttribute.html): _Grants permission to add an attribute and values to, or removes an attribute and values from, a manual DB snapshot. This includes the ability to share snapshots with other AWS Accounts._
61
+
-[rds:ModifyDBClusterSnapshotAttribute](https://docs.aws.amazon.com/AmazonRDS/latest/APIReference/API_ModifyDBClusterSnapshotAttribute.html): _Grants permission to add an attribute and values to, or removes an attribute and values from, a manual DB cluster snapshot. This includes the ability to share snapshots with other AWS Accounts._
62
62
63
63
Also, consider using [Cloudsplaining](https://github.com/salesforce/cloudsplaining/#cloudsplaining) to identify violations of least privilege in IAM policies. This can help limit the IAM principals that have access to the actions that could perform Resource Exposure activities. See the example report [here](https://opensource.salesforce.com/cloudsplaining/)
64
64
65
+
## Basic Detection
66
+
The following CloudWatch Log Insights query will include exposure actions taken by endgame:
| filter eventSource='rds.amazonaws.com' AND (eventName='ModifyDBSnapshotAttribute' or eventName='ModifyDBClusterSnapshotAttribute' and requestParameters.attributeName='restore')
70
+
```
71
+
72
+
This query assumes that your CloudTrail logs are being sent to CloudWatch and that you have selected the correct log group.
Copy file name to clipboardexpand all lines: docs/risks/s3.md
+16
Original file line number
Diff line number
Diff line change
@@ -48,6 +48,22 @@ TODO
48
48
49
49
Also, consider using [Cloudsplaining](https://github.com/salesforce/cloudsplaining/#cloudsplaining) to identify violations of least privilege in IAM policies. This can help limit the IAM principals that have access to the actions that could perform Resource Exposure activities. See the example report [here](https://opensource.salesforce.com/cloudsplaining/)
50
50
51
+
## Basic Detection
52
+
The following CloudWatch Log Insights query will include exposure actions taken by endgame:
Also, consider using [Cloudsplaining](https://github.com/salesforce/cloudsplaining/#cloudsplaining) to identify violations of least privilege in IAM policies. This can help limit the IAM principals that have access to the actions that could perform Resource Exposure activities. See the example report [here](https://opensource.salesforce.com/cloudsplaining/)
92
92
93
+
## Basic Detection
94
+
The following CloudWatch Log Insights query will include exposure actions taken by endgame:
Copy file name to clipboardexpand all lines: docs/risks/ses.md
+15
Original file line number
Diff line number
Diff line change
@@ -74,6 +74,21 @@ The policy below allows the Evil Principal (`arn:aws:iam::999988887777:user/evil
74
74
75
75
Also, consider using [Cloudsplaining](https://github.com/salesforce/cloudsplaining/#cloudsplaining) to identify violations of least privilege in IAM policies. This can help limit the IAM principals that have access to the actions that could perform Resource Exposure activities. See the example report [here](https://opensource.salesforce.com/cloudsplaining/)
76
76
77
+
## Basic Detection
78
+
The following CloudWatch Log Insights query will include exposure actions taken by endgame:
Copy file name to clipboardexpand all lines: docs/risks/sns.md
+9
Original file line number
Diff line number
Diff line change
@@ -89,6 +89,15 @@ TODO
89
89
90
90
Also, consider using [Cloudsplaining](https://github.com/salesforce/cloudsplaining/#cloudsplaining) to identify violations of least privilege in IAM policies. This can help limit the IAM principals that have access to the actions that could perform Resource Exposure activities. See the example report [here](https://opensource.salesforce.com/cloudsplaining/)
91
91
92
+
## Basic Detection
93
+
The following CloudWatch Log Insights query will include exposure actions taken by endgame:
Copy file name to clipboardexpand all lines: docs/risks/sqs.md
+9
Original file line number
Diff line number
Diff line change
@@ -54,6 +54,15 @@ TODO
54
54
55
55
Also, consider using [Cloudsplaining](https://github.com/salesforce/cloudsplaining/#cloudsplaining) to identify violations of least privilege in IAM policies. This can help limit the IAM principals that have access to the actions that could perform Resource Exposure activities. See the example report [here](https://opensource.salesforce.com/cloudsplaining/)
56
56
57
+
## Basic Detection
58
+
The following CloudWatch Log Insights query will include exposure actions taken by endgame:
0 commit comments