You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -17,7 +17,7 @@ This article contains security best practices to use when you're designing, depl
17
17
18
18
## Best practices
19
19
20
-
These best practices are intended to be a resource for IT pros. This might include designers, architects, developers, and testers who build and deploy secure Azure solutions.
20
+
These best practices are intended to be a resource for IT pros. IT pros include designers, architects, developers, and testers who build and deploy secure Azure solutions.
21
21
22
22
*[Best practices for protecting secrets](secrets-best-practices.md)
23
23
*[Azure database security best practices](/azure/azure-sql/database/security-best-practice)
@@ -27,7 +27,7 @@ These best practices are intended to be a resource for IT pros. This might inclu
27
27
*[Azure operational security best practices](operational-best-practices.md)
28
28
*[Azure PaaS Best Practices](paas-deployments.md)
29
29
*[Azure Service Fabric security best practices](service-fabric-best-practices.md)
30
-
*[Best practices for Azure VM security](iaas.md)
30
+
*[Best practices for IaaS workloads in Azure](iaas.md)
31
31
*[Implementing a secure hybrid network architecture in Azure](/azure/architecture/reference-architectures/dmz/secure-vnet-hybrid)
32
32
*[Internet of Things security best practices](../../iot/iot-overview-security.md)
33
33
*[Securing PaaS databases in Azure](paas-applications-using-sql.md)
@@ -36,4 +36,4 @@ These best practices are intended to be a resource for IT pros. This might inclu
36
36
37
37
## Next steps
38
38
39
-
Microsoft has found that using security benchmarks can help you quickly secure cloud deployments. Benchmark recommendations from your cloud service provider give you a starting point for selecting specific security configuration settings in your environment and allow you to quickly reduce risk to your organization. See the [Microsoft cloud security benchmark](/security/benchmark/azure/introduction) for a collection of high-impact security recommendations you can use to help secure the services you use in Azure.
39
+
Microsoft finds that using security benchmarks can help you quickly secure cloud deployments. Benchmark recommendations from your cloud service provider give you a starting point for selecting specific security configuration settings in your environment and allow you to quickly reduce risk to your organization. See the [Microsoft cloud security benchmark](/security/benchmark/azure/introduction) for a collection of high-impact security recommendations to help secure the services you use in Azure.
Copy file name to clipboardExpand all lines: articles/security/fundamentals/subdomain-takeover.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ manager: rkarlin
9
9
ms.service: security
10
10
ms.subservice: security-fundamentals
11
11
ms.topic: article
12
-
ms.date: 01/19/2023
12
+
ms.date: 03/27/2024
13
13
ms.author: terrylan
14
14
15
15
---
@@ -33,7 +33,7 @@ A common scenario for a subdomain takeover:
33
33
34
34
1. The Azure resource is deprovisioned or deleted after it is no longer needed.
35
35
36
-
At this point, the CNAME record `greatapp.contoso.com`*should* be removed from your DNS zone. If the CNAME record isn't removed, it's advertised as an active domain but doesn't route traffic to an active Azure resource. This is the definition of a "dangling" DNS record.
36
+
At this point, the CNAME record `greatapp.contoso.com`*should* be removed from your DNS zone. If the CNAME record isn't removed, it's advertised as an active domain but doesn't route traffic to an active Azure resource. You now have a "dangling" DNS record.
37
37
38
38
1. The dangling subdomain, `greatapp.contoso.com`, is now vulnerable and can be taken over by being assigned to another Azure subscription's resource.
39
39
@@ -49,15 +49,15 @@ A common scenario for a subdomain takeover:
49
49
50
50
## The risks of subdomain takeover
51
51
52
-
When a DNS record points to a resource that isn't available, the record itself should have been removed from your DNS zone. If it hasn't been deleted, it's a "dangling DNS" record and creates the possibility for subdomain takeover.
52
+
When a DNS record points to a resource that isn't available, the record itself should be removed from your DNS zone. If it isn't deleted, it's a "dangling DNS" record and creates the possibility for subdomain takeover.
53
53
54
54
Dangling DNS entries make it possible for threat actors to take control of the associated DNS name to host a malicious website or service. Malicious pages and services on an organization's subdomain might result in:
55
55
56
-
-**Loss of control over the content of the subdomain** - Negative press about your organization's inability to secure its content, as well as the brand damage and loss of trust.
56
+
-**Loss of control over the content of the subdomain** - Negative press about your organization's inability to secure its content, brand damage, and loss of trust.
57
57
58
-
-**Cookie harvesting from unsuspecting visitors** - It's common for web apps to expose session cookies to subdomains (*.contoso.com), consequently any subdomain can access them. Threat actors can use subdomain takeover to build an authentic looking page, trick unsuspecting users to visit it, and harvest their cookies (even secure cookies). A common misconception is that using SSL certificates protects your site, and your users' cookies, from a takeover. However, a threat actor can use the hijacked subdomain to apply for and receive a valid SSL certificate. Valid SSL certificates grant them access to secure cookies and can further increase the perceived legitimacy of the malicious site.
58
+
-**Cookie harvesting from unsuspecting visitors** - It's common for web apps to expose session cookies to subdomains (*.contoso.com). Any subdomain can access them. Threat actors can use subdomain takeover to build an authentic looking page, trick unsuspecting users to visit it, and harvest their cookies (even secure cookies). A common misconception is that using SSL certificates protects your site, and your users' cookies, from a takeover. However, a threat actor can use the hijacked subdomain to apply for and receive a valid SSL certificate. Valid SSL certificates grant them access to secure cookies and can further increase the perceived legitimacy of the malicious site.
59
59
60
-
-**Phishing campaigns** - Authentic-looking subdomains might be used in phishing campaigns. This is true for malicious sites and for MX records that would allow the threat actor to receive emails addressed to a legitimate subdomain of a known-safe brand.
60
+
-**Phishing campaigns** - Malicious actors often exploit authentic-looking subdomains in phishing campaigns. The risk extends to both malicious websites and MX records, which could enable threat actors to receive emails directed to legitimate subdomains associated with trusted brands.
61
61
62
62
-**Further risks** - Malicious sites might be used to escalate into other classic attacks such as XSS, CSRF, CORS bypass, and more.
63
63
@@ -91,7 +91,7 @@ Run the query as a user who has:
91
91
- at least reader level access to the Azure subscriptions
92
92
- read access to Azure resource graph
93
93
94
-
If you're a global administrator of your organization's tenant, elevate your account to have access to all of your organization's subscription using the guidance in [Elevate access to manage all Azure subscriptions and management groups](../../role-based-access-control/elevate-access-global-admin.md).
94
+
If you're a Global Administrator of your organization's tenant, follow the guidance in [Elevate access to manage all Azure subscriptions and management groups](../../role-based-access-control/elevate-access-global-admin.md) to gain access to all your organization's subscriptions
95
95
96
96
> [!TIP]
97
97
> Azure Resource Graph has throttling and paging limits that you should consider if you have a large Azure environment.
@@ -106,17 +106,17 @@ Learn more about the PowerShell script, **Get-DanglingDnsRecords.ps1**, and down
106
106
107
107
## Remediate dangling DNS entries
108
108
109
-
Review your DNS zones and identify CNAME records that are dangling or have been taken over. If subdomains are found to be dangling or have been taken over, remove the vulnerable subdomains and mitigate the risks with the following steps:
109
+
Review your DNS zones and identify CNAME records that are dangling or taken over. If subdomains are found to be dangling or have been taken over, remove the vulnerable subdomains and mitigate the risks with the following steps:
110
110
111
111
1. From your DNS zone, remove all CNAME records that point to FQDNs of resources no longer provisioned.
112
112
113
-
1. To enable traffic to be routed to resources in your control, provision additional resources with the FQDNs specified in the CNAME records of the dangling subdomains.
113
+
1. To enable traffic to be routed to resources in your control, provision more resources with the FQDNs specified in the CNAME records of the dangling subdomains.
114
114
115
115
1. Review your application code for references to specific subdomains and update any incorrect or outdated subdomain references.
116
116
117
-
1. Investigate whether any compromise has occurred and take action per your organization's incident response procedures. Tips and best practices for investigating this issue can be found below.
117
+
1. Investigate whether any compromise occurred and take action per your organization's incident response procedures. Tips and best practices for investigating:
118
118
119
-
If your application logic is such that secrets such as OAuth credentials were sent to the dangling subdomain, or privacy-sensitive information was sent to the dangling subdomains, that data might have been exposed to third-parties.
119
+
If your application logic results in secrets, such as OAuth credentials, being sent to dangling subdomains or if privacy-sensitive information is transmitted to those subdomains, there is a possibility for this data to be exposed to thirdparties.
120
120
121
121
1. Understand why the CNAME record was not removed from your DNS zone when the resource was deprovisioned and take steps to ensure that DNS records are updated appropriately when Azure resources are deprovisioned in the future.
0 commit comments