Quantify the value of Netskope One SSE – Get the 2024 Forrester Total Economic Impact™ study

fermer
fermer
  • Pourquoi Netskope signe chevron

    Changer la façon dont le réseau et la sécurité fonctionnent ensemble.

  • Nos clients signe chevron

    Netskope sert plus de 3 400 clients dans le monde, dont plus de 30 entreprises du Fortune 100

  • Nos partenaires signe chevron

    Nous collaborons avec des leaders de la sécurité pour vous aider à sécuriser votre transition vers le cloud.

Un leader sur SSE. Désormais leader en matière de SASE à fournisseur unique.

Découvrez pourquoi Netskope a été classé parmi les leaders de l'édition 2024 du Gartner® Magic Quadrant™️ pour le Secure Access Service Edge à fournisseur unique.

Recevoir le rapport
Coup de projecteur sur les idées novatrices de nos clients

Découvrez comment des clients innovants naviguent avec succès dans le paysage évolutif de la mise en réseau et de la sécurité d’aujourd’hui grâce à la plateforme Netskope One.

Obtenir l'EBook
Coup de projecteur sur les idées novatrices de nos clients
La stratégie de commercialisation de Netskope privilégie ses partenaires, ce qui leur permet de maximiser leur croissance et leur rentabilité, tout en transformant la sécurité des entreprises.

En savoir plus sur les partenaires de Netskope
Groupe de jeunes professionnels diversifiés souriant
Votre réseau de demain

Planifiez votre chemin vers un réseau plus rapide, plus sûr et plus résilient, conçu pour les applications et les utilisateurs que vous prenez en charge.

Obtenir le livre blanc
Votre réseau de demain
Netskope Cloud Exchange

Le Netskope Cloud Exchange (CE) fournit aux clients des outils d'intégration puissants pour optimiser les investissements dans l'ensemble de leur infrastructure de sécurité.

En savoir plus sur Cloud Exchange
Aerial view of a city
  • Security Service Edge signe chevron

    Protégez-vous contre les menaces avancées et compatibles avec le cloud et protégez les données sur tous les vecteurs.

  • SD-WAN signe chevron

    Fournissez en toute confiance un accès sécurisé et performant à chaque utilisateur, appareil, site et cloud distant.

  • Secure Access Service Edge signe chevron

    Netskope One SASE fournit une solution SASE cloud-native, entièrement convergée et à fournisseur unique.

La plateforme du futur est Netskope

Security Service Edge (SSE), Cloud Access Security Broker (CASB), Cloud Firewall, Next Generation Secure Web Gateway (SWG), et Private Access for ZTNA intégrés nativement dans une solution unique pour aider chaque entreprise dans son cheminement vers l'architecture Secure Access Service Edge (SASE).

Présentation des produits
Vidéo Netskope
Next Gen SASE Branch est hybride - connectée, sécurisée et automatisée

Netskope Next Gen SASE Branch fait converger Context-Aware SASE Fabric, Zero-Trust Hybrid Security et SkopeAI-Powered Cloud Orchestrator dans une offre cloud unifiée, ouvrant la voie à une expérience de succursale entièrement modernisée pour l'entreprise sans frontières.

En savoir plus Next Gen SASE Branch
Personnes au bureau de l'espace ouvert
L'architecture SASE pour les nuls

Obtenez votre exemplaire gratuit du seul guide consacré à la conception d'une architecture SASE dont vous aurez jamais besoin.

Obtenir l'EBook
SASE Architecture For Dummies eBook
Optez pour les meilleurs services de sécurité cloud du marché, avec un temps de latence minimum et une fiabilité élevée.

Découvrez NewEdge
Autoroute éclairée traversant des lacets à flanc de montagne
Permettez en toute sécurité l'utilisation d'applications d'IA générative grâce au contrôle d'accès aux applications, à l'accompagnement des utilisateurs en temps réel et à une protection des données de premier ordre.

Découvrez comment nous sécurisons l'utilisation de l'IA générative
Autorisez ChatGPT et l’IA générative en toute sécurité
Solutions Zero Trust pour les déploiements du SSE et du SASE

En savoir plus sur la confiance zéro
Bateau roulant en pleine mer
Netskope obtient l'autorisation FedRAMP High Authorization

Choisissez Netskope GovCloud pour accélérer la transformation de votre agence.

En savoir plus sur Netskope GovCloud
Netskope GovCloud
  • Ressources signe chevron

    Découvrez comment Netskope peut vous aider à sécuriser votre migration vers le Cloud.

  • Blog signe chevron

    Découvrez comment Netskope permet la transformation de la sécurité et de la mise en réseau grâce à l'accès sécurisé à la périphérie des services (SASE).

  • Événements et ateliers signe chevron

    Restez à l'affût des dernières tendances en matière de sécurité et créez des liens avec vos pairs.

  • Définition de la sécurité signe chevron

    Tout ce que vous devez savoir dans notre encyclopédie de la cybersécurité.

Podcast Security Visionaries

Prévisions pour 2025
Dans cet épisode de Security Visionaries, Kiersten Todt, présidente de Wondros et ancienne directrice de cabinet de l'Agence pour la cybersécurité et la sécurité des infrastructures (CISA), nous parle des prévisions pour 2025 et au-delà.

Écouter le podcast Parcourir tous les podcasts
Prévisions pour 2025
Derniers blogs

Découvrez comment Netskope peut faciliter le parcours Zero Trust et SASE grâce à des capacités d'accès sécurisé à la périphérie des services (SASE).

Lire le blog
Lever de soleil et ciel nuageux
SASE Week 2024 A la demande

Apprenez à naviguer dans les dernières avancées en matière de SASE et de confiance zéro et découvrez comment ces cadres s'adaptent pour répondre aux défis de la cybersécurité et de l'infrastructure.

Explorer les sessions
SASE Week 2024
Qu'est-ce que SASE ?

Découvrez la future convergence des outils réseau et sécurité dans le modèle économique actuel, dominé par le cloud.

En savoir plus sur SASE
  • Entreprise signe chevron

    Nous vous aidons à conserver une longueur d'avance sur les défis posés par le cloud, les données et les réseaux en matière de sécurité.

  • Carrières signe chevron

    Rejoignez les 3 000 membres de l'équipe de Netskope qui construisent la première plateforme de sécurité cloud-native du secteur.

  • Solutions pour les clients signe chevron

    Nous sommes là pour vous et avec vous à chaque étape, pour assurer votre succès avec Netskope.

  • Formation et accréditations signe chevron

    Avec Netskope, devenez un expert de la sécurité du cloud.

Soutenir le développement durable par la sécurité des données

Netskope est fière de participer à Vision 2045 : une initiative visant à sensibiliser au rôle de l'industrie privée dans le développement durable.

En savoir plus
Soutenir le développement durable grâce à la sécurité des données
Contribuez à façonner l'avenir de la sécurité du cloud

At Netskope, founders and leaders work shoulder-to-shoulder with their colleagues, even the most renowned experts check their egos at the door, and the best ideas win.

Rejoignez l’équipe
Carrières chez Netskope
Les professionnels du service et de l'assistance de Netskope veilleront à ce que vous puissiez déployer avec succès notre plateforme et en tirer toute la valeur.

Aller à Solutions clients
Services professionnels Netskope
Sécurisez votre parcours de transformation numérique et tirez le meilleur parti de vos applications cloud, Web et privées grâce à la formation Netskope.

En savoir plus sur les formations et les certifications
Groupe de jeunes professionnels travaillant

Google Storage Bucket Misconfiguration

May 15 2019
Tags
Cloud Storage Security
GCP
GCS
google cloud platform
Google cloud storage
Ransomware
Storage bucket

Rhino Labs recently released a tool for scanning Google Cloud Storage (GCS) buckets, called GCPBruteBucket. The tool gives users an easy way to search for publicly exposed buckets being hosted by Google Cloud Platform (GCP). Netskope Threat Research Labs used this tool to scan a subset of the Majestic Million for not just exposed buckets, but buckets that would allow anonymous users to change permissions. Buckets which allow anonymous changes by any unauthenticated user could have any of the following happen: the original data could be deleted or modified, inappropriate content could be uploaded to the bucket, or the bucket could be deleted at any time by someone outside of the organization. Given the potential consequences, it’s important to know more about this threat and how to stop it.

In this post, we are going to cover what the misconfiguration looks like and a potential attack that will exploit it. We will cover some ways to mitigate against this in GCP and, ultimately, how Netskope will protect you from attacks based on the misconfiguration.

GCS Bucket Scanning Results

We scanned for thousands of names, and found a little over 10,000 valid bucket names in GCP. Of the buckets found, approximately 3% were publicly exposed. Approximately 5% of those were vulnerable to privilege escalation. In this context, public exposure refers to permissions being granted to ‘allUsers’ or ‘allAuthenticatedUsers’.

The ‘allUsers’ group contains unauthenticated, completely anonymous users, so this group exposes your bucket to anyone on the Internet. The ‘allAuthenticatedUsers’ group contains only users that are some kind of Google User (but don’t have to be a member of your organization). This means that anyone with a Gmail account could access content in your bucket.

Not all of the publicly available buckets are the result of a misconfiguration. As you can see in the chart above, approximately 25% of the buckets exposed were hosting web content.  The other 75% were likely publicly exposed by mistake. When hosting web content, it’s expected that the bucket will allow read-only access to ‘allUsers’. The focus of our effort was to find buckets that allow anonymous users to change the permissions. This is problematic because if anyone can change the bucket permissions, they could escalate their privileges within the bucket.

Potential Data Exfiltration and Ransom

If a user is able to promote themselves to ownership level of the bucket, then they could do the following:

  1. Copy data out of your bucket to an attacker-owned bucket.
  2. Delete all of your data, and then delete your bucket.
  3. Create a new bucket with the same name in the attacker’s project, and give read / write permissions for files to everyone. The attacker could grant ‘Storage Object Creator’ and ‘Storage Object Viewer’ roles to the ‘allUsers’ group to accomplish this.
  4. Copy the data from the backup bucket to the new bucket in the attacker’s project.

Now, the attacker’s bucket with the same name is fully available for your users to upload data into. If your users or partners are automatically uploading data to your bucket by the name, they will not even notice that anything has changed. From there, the attacker could cut-off access to the data and hold it for ransom.  See the diagram below:

Mitigating Controls in GCP

There are some mitigating controls available in GCP, which we should examine:

  1. Organization Policies
  2. VPC Service Controls
  3. Encryption of Storage Objects

Let’s discuss each control, and how it could be used to mitigate against data exposure or destruction.

Organization Policies

Organization Policies allow you to implement guard rails around your organization’s resources through constraints. There are only certain services and certain states that are available, and you can read more about them here.

The constraint that is most relevant to this misconfiguration is called “Domain restricted sharing.” If you place your storage buckets with sensitive data under a certain project or folder, you can then apply this constraint at the project or folder level to specify that no IAM permissions be granted to anyone outside of your organization. If you are a GSuite customer, you can grant access to the GSuite ID for your domain. This will prevent any user who has not authenticated to your GSuite domain from being granted IAM permissions to any resources in your project.

The issues with using this constraint are:

  • It prevents the IAM permissions being changed, so anything that’s already misconfigured when you apply this constraint will remain that way.
  • If your buckets are not already organized and segmented by projects (or folders) such that public and private buckets are clearly separated, then this will not be something you can implement.

VPC Service Controls

VPC Service Controls is another facility provided by GCP that could mitigate the misconfiguration of storage buckets. Google allows you to make resources private, so there’s no Internet access even if the IAM policy would allow it. This control allows you to setup a “VPC Service Perimeter” around projects, and then control access to that perimeter based on things like your IP address, geographic location, and conditions on the device requesting the access. You can read more about VPC Service Controls here.

In this case, you could setup a service perimeter for the project containing your bucket and apply it to the Google Cloud Storage API. Without any other configuration, any request from the Internet will be denied, even if there is an IAM policy that allows ‘allUsers’. Access to the Cloud Storage API would be restricted to resources within the service perimeter.

The issues with using a VPC Service Control are:

  • You could easily miss valid use cases and actually interrupt your business while implementing a service perimeter.
  • Much like the previous example, if your buckets are not already organized by project, this will not be a feasible solution for you.

Encryption of Storage Objects

You may be asking now if encryption will prevent the exposure of your files. Google provides encryption on stored objects by default, with keys that they manage for us. You might think that it would mitigate against data exposure in this example, but it does not. When we apply IAM permissions that allow the public to read objects in our buckets, Google is obliged to decrypt the data, the same as it would for your internal users. This also applies to Customer Managed Encryption Keys (CMEKs) that you are able to provision and control in the Key Management Service (KMS).

The one case that encryption would not allow data exposure is with Customer Supplied Encryption Keys (CSEKs), because Google never stores those. In this case, you have to store and manage your own keys. For use with storage buckets, you must supply your public key to Google to allow it to encrypt the data being stored in the bucket, but it has no way to decrypt the data for you. So if an unintended party gains access to the encrypted objects, they would need to separately obtain access to your keys in order to decrypt the data.

All of the examples for encryption, unfortunately, do nothing to help mitigate against the fact that an attacker could elevate privileges in your bucket and delete it.

Enforcement and Prevention with Netskope for IaaS

You can prevent this type of attack in your GCS buckets with Netskope for IaaS. Netskope scans resources and controls in GCP and alerts you when it finds something problematic. It doesn’t matter how your buckets are organized, or when the permissions were applied. If any of your buckets have publicly writable permissions, Netskope will alert you of the misconfiguration, so you can remediate it immediately. As long as your environment is being monitored by Netskope, you don’t have to wait for someone else to find your bucket and let you know that it’s open to the world.

We can also alert you when someone is modifying your organization policy constraints or VPC service controls. This way, you can be sure that your guardrails are not removed without your knowledge.

Conclusions

Allowing anonymous users to change the permissions in your storage buckets could be catastrophic, especially if the bucket contains sensitive information.  As we showed in our scanning results, it’s likely that there were over 200 buckets that were mistakenly exposed to the public out of 10,000 buckets found, and 14 of those buckets were vulnerable to privilege escalation. In this post we covered some of the mitigating controls offered by Google. Both, VPC service controls and organization policy constraints, can help you to maintain control over your buckets. Encryption will not help with this problem, although customer supplied keys may keep your data from being exposed if read access was mistakenly granted to the public. Netskope for IaaS can help by monitoring your environment for changes to bucket permissions, organization policies, and VPC service controls. Netskope can alert you when sensitive controls are modified, and will soon be offering ways to streamline remediation of these changes with the push of a button, or in a fully automated fashion.

author image
Colin Estep
Colin Estep has 16 years of experience in software, with 11 years focused on information security. He's a researcher at Netskope, where he focuses on security for AWS and GCP.
Colin Estep has 16 years of experience in software, with 11 years focused on information security. He's a researcher at Netskope, where he focuses on security for AWS and GCP.

Restez informé !

Abonnez-vous pour recevoir les dernières nouvelles du blog de Netskope