Created
December 10, 2021 18:06
-
-
Save kmcquade/7cdddabd4c84a68c9bceb096c244fb97 to your computer and use it in GitHub Desktop.
Explanation for a vendor on a potential way to represent risky action combinations for their product via yaml
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
### | |
# Format is below | |
# | |
# risk-name: | |
# target-name: # AND logic | |
# - service:actionName | |
# - service:act* | |
# | |
#### | |
# List of high priority resource exposure actions here: https://gist.github.com/kmcquade/3161a6737285dc0508a9fa3446e22090 | |
Resource Exposure: | |
acm-pca: | |
description: | |
actions: | |
- acm-pca:PutPolicy | |
- acm-pca:DeletePolicy | |
iam-role: | |
description: | |
actions: | |
- iam:UpdateAssumeRolePolicy | |
# ...etc. | |
# List of credentials exfiltration actions here: https://gist.github.com/kmcquade/33860a617e651104d243c324ddf7992a | |
Credentials Exfiltration: | |
iam-access-key: | |
description: | |
actions: | |
- iam:CreateAccessKey | |
# ...etc. | |
Network Exposure: | |
manage-security-groups: | |
description: | |
actions: | |
- ec2:AuthorizeSecurityGroupIngress | |
- ec2:RevokeSecurityGroupIngress | |
- ec2:AuthorizeSecurityGroupEgress | |
- ec2:RevokeSecurityGroupEgress | |
- ec2:ModifySecurityGroupRules | |
- ec2:UpdateSecurityGroupRuleDescriptionsIngress | |
- ec2:UpdateSecurityGroupRuleDescriptionsEgress | |
# ...etc. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment