RSAC DisruptOps发表演讲《Break the Top 10 Cloud Attack Killchains》,试图提出流行的云攻击思路和有效的防御方法。
云敏感数据泄露包括:
- GitHub/BitBucket
- Shared images
- Snapshots
- Compromised instance -> embedded code
- Compromised instance or dev/admin system – >
– Shell history
– Config/Credentials file
– Local code
攻击流程大体为:
- Identify Internet exposed resource (instance/ container)
- Identify vulnerability on exposed resource
- Exploit vulnerability and gain foothold/ persistence
- Pivot to rest of virtual network and peered networks
- Exploit additional resources, including pivoting into the cloud management plane
资料下载: