Skip to content

FAQ

Where does AWS Access Analyzer fall short?

AWS Access Analyzer analyzes new or updated resource-based policies within 30 minutes of policy updates (triggered by CloudTrail log entries), and during periodic scans (every 24 hours). If an attacker leverages the expose or smash commands but quickly rolls back the changes with --undo, you might not find out about the attack with Access Analyzer until 30 minutes later.

However, Access Analyzer can still be especially useful in ensuring that if attacks do gain a foothold in your infrastructure. If the attacker ran Endgame or perform resource exposure attacks without the tool, you can still use Access Analyzer to alert on those changes so you can respond to the issue, instead of allowing a persistent backdoor.

The primary drawback with AWS Access Analyzer is that it does not support 11/17 resource types currently supported by Endgame. It also does not support AWS RAM Resource sharing outside of your trust zone, or resource-specific sharing APIs (such as RDS snapshots, EBS snapshots, and EC2 AMIs).

See the Recommendations to AWS section for more details.

Attack tools

Pacu is an AWS exploitation framework created by Spencer Gietzen, designed for testing the security of Amazon Web Services environments. The iam__backdoor_assume_role module was a particular point of inspiration for endgame - it creates backdoors in IAM roles by creating trust relationships with one or more roles in the account, allowing those users to assume those roles after they are no longer using their current set of credentials.

Detection/scanning tools

Cloudsplaining, is an AWS IAM assessment tool produced by Kinnaird McQuade that showed us the pervasiveness of least privilege violations in AWS IAM across the industry. Two findings of particular interest to endgame are Resource Exposure and Service Wildcards. Resource Exposure describes actions that grant access to share resources with rogue accounts or to the internet - i.e., modifying Resource-based Policies, sharing resources with AWS RAM, or via resource-specific sharing APIs (such as RDS snapshots, EBS snapshots, or EC2 AMIs).

Prevention tools

Policy Sentry is a least-privilege IAM Authoring tool created by Kinnaird McQuade that demonstrated to the industry how to write least privilege IAM policies at scale, restricting permissions according to specific resources and access levels.