Skip to content

Commit f7f427f

Browse files
committed
add cdk
1 parent 89fc6d2 commit f7f427f

File tree

6 files changed

+841
-0
lines changed

6 files changed

+841
-0
lines changed

docs/attacks/application.md

Lines changed: 51 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1804,6 +1804,57 @@ requests:
18041804
```
18051805

18061806

1807+
## API
1808+
1809+
### Category: Broken Access Control
1810+
1811+
Inadequate enforcement of access controls, allowing unauthorized users to access sensitive resources or perform unauthorized actions.
1812+
Example of attacks: Accessing restricted data or functionality, privilege escalation, horizontal/vertical privilege escalation.
1813+
1814+
### Category: Excessive Data Exposure
1815+
1816+
APIs exposing more data than necessary, potentially leaking sensitive information.
1817+
Example of attacks: Exposure of personally identifiable information (PII), financial data, or sensitive business data through API responses.
1818+
1819+
### Category: Broken Authentication
1820+
1821+
Flaws in authentication mechanisms that can lead to unauthorized access or account takeover.
1822+
Example of attacks: Credential stuffing, session fixation, brute-forcing authentication tokens or passwords.
1823+
1824+
### Category: Injection Attacks
1825+
1826+
Lack of proper input validation and sanitization, enabling attackers to inject malicious code or exploit vulnerabilities.
1827+
Example of attacks: SQL injection, OS command injection, XML/XXE injection, NoSQL injection.
1828+
1829+
### Category: Improper Error Handling
1830+
1831+
APIs revealing excessive or sensitive error details, which can aid attackers in exploiting vulnerabilities.
1832+
Example of attacks: Information disclosure, error-based enumeration, bypassing security controls using error messages.
1833+
1834+
### Category: Security Misconfiguration
1835+
1836+
Poorly configured API settings, default credentials, or inadequate security configurations.
1837+
Example of attacks: Unauthorized access to API endpoints, access to sensitive configuration data, exploitation of default credentials.
1838+
1839+
### Category: Insecure Direct Object References
1840+
1841+
Improper access control mechanisms that allow attackers to directly reference internal objects or resources.
1842+
Example of attacks: Accessing other users' data, tampering with internal object references, bypassing authorization checks.
1843+
1844+
### Category: Insufficient Logging and Monitoring
1845+
1846+
Lack of proper logging and monitoring, hindering the detection and response to security incidents.
1847+
Example of attacks: Unauthorized access attempts, API abuse, suspicious activity going unnoticed due to insufficient logging.
1848+
1849+
### Category: Insecure Serverless Deployments
1850+
1851+
Security weaknesses in serverless architectures, including issues with configuration, event handling, and access controls.
1852+
Example of attacks: Unauthorized execution of serverless functions, sensitive data exposure through serverless configurations.
1853+
1854+
### Category: Denial of Service (DoS)
1855+
1856+
Vulnerabilities that can be exploited to overload or disrupt the availability of API services.
1857+
Example of attacks: Sending excessive requests, resource exhaustion, API rate limiting bypass, flooding API endpoints.
18071858

18081859

18091860
### Ref

docs/attacks/cloud.md

Lines changed: 111 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2179,3 +2179,114 @@ for email in service_account_emails:
21792179
```
21802180

21812181

2182+
2183+
## AWS cross-account enumeration
2184+
2185+
```
2186+
weirdAAL.py cross_account_enum
2187+
```
2188+
2189+
## Privilege escalation through EC2 metadata
2190+
2191+
```
2192+
weirdAAL.py ec2_metadata
2193+
```
2194+
2195+
## Enumeration of AWS Systems Manager parameters
2196+
2197+
```
2198+
weirdAAL.py ssm_enum
2199+
```
2200+
2201+
## Enumeration of EC2 instances with public IP addresses
2202+
2203+
```
2204+
weirdAAL.py public_ec2_enum
2205+
```
2206+
2207+
## Stealing EC2 instance metadata
2208+
2209+
```
2210+
weirdAAL.py steal_metadata
2211+
```
2212+
2213+
## Privilege escalation by attaching an EC2 instance profile
2214+
2215+
```
2216+
weirdAAL.py attach_instance_profile
2217+
```
2218+
2219+
## Enumeration of Elastic Beanstalk environments with public access
2220+
2221+
```
2222+
weirdAAL.py public_eb_enum
2223+
```
2224+
2225+
## Privilege escalation through hijacking AWS CLI sessions
2226+
2227+
```
2228+
weirdAAL.py hijack_cli
2229+
```
2230+
2231+
## Enumeration of ECR repositories with public access
2232+
2233+
```
2234+
weirdAAL.py public_ecr_enum
2235+
```
2236+
2237+
## Privilege escalation through hijacking AWS SDK sessions
2238+
2239+
```
2240+
weirdAAL.py hijack_sdk
2241+
```
2242+
2243+
## Enumeration of ECS clusters and services
2244+
2245+
```
2246+
weirdAAL.py ecs_enum
2247+
```
2248+
2249+
## Privilege escalation through assumed role sessions
2250+
2251+
```
2252+
weirdAAL.py assume_role
2253+
```
2254+
2255+
## Enumeration of AWS Glue Data Catalog databases
2256+
2257+
```
2258+
weirdAAL.py glue_enum
2259+
```
2260+
2261+
## Privilege escalation through EC2 instance takeover
2262+
2263+
```
2264+
weirdAAL.py ec2_takeover
2265+
```
2266+
2267+
## Enumeration of open S3 buckets and their contents
2268+
2269+
```
2270+
weirdAAL.py s3_enum --list-objects
2271+
```
2272+
2273+
## Privilege escalation through RDS database credentials
2274+
2275+
weirdAAL.py rds_priv_esc
2276+
2277+
## Enumeration of EKS clusters and associated resources
2278+
2279+
```
2280+
weirdAAL.py eks_enum
2281+
```
2282+
2283+
## Privilege escalation through KMS key policy modifications
2284+
2285+
```
2286+
weirdAAL.py kms_priv_esc
2287+
```
2288+
2289+
2290+
2291+
2292+

docs/attacks/pipeline.md

Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -565,3 +565,57 @@ stages:
565565

566566
In the compliant code, each step in the pipeline has an associated security configuration that specifies the necessary roles or permissions required to execute that step. This ensures that only authorized individuals or entities can perform specific actions in the pipeline.
567567

568+
569+
570+
571+
572+
## Insecure Configurations
573+
574+
Inadequate or insecure configuration settings within CI/CD tools and platforms.
575+
Example of attacks: Unauthorized access to build pipelines, exposure of sensitive credentials, misconfigured access controls.
576+
577+
## Vulnerability Management
578+
579+
Inadequate or ineffective management of vulnerabilities in CI/CD processes and artifacts.
580+
Example of attacks: Exploitation of known vulnerabilities in application dependencies, outdated software components.
581+
582+
## Inadequate Secrets Management
583+
584+
Poor handling of sensitive information such as API keys, passwords, and certificates.
585+
Example of attacks: Disclosure of secrets through repository leaks, unauthorized access to production environments.
586+
587+
## Insecure Third-Party Integrations
588+
589+
Integration of untrusted or vulnerable third-party services or libraries in CI/CD workflows.
590+
Example of attacks: Supply chain attacks, malicious code injection through compromised dependencies.
591+
592+
## Weak Access Controls
593+
594+
Insufficient controls and monitoring of access to CI/CD pipelines, repositories, and build systems.
595+
Example of attacks: Unauthorized modification of build artifacts, privilege escalation, unauthorized access to sensitive data.
596+
597+
## Insider Threats
598+
599+
Risks posed by authorized individuals with malicious intent or accidental actions.
600+
Example of attacks: Unauthorized modification of CI/CD configurations, sabotage of build pipelines, data exfiltration.
601+
602+
## Lack of Build Integrity
603+
604+
Failure to ensure the integrity and authenticity of build artifacts throughout the CI/CD process.
605+
Example of attacks: Injection of malicious code or backdoors into build artifacts, tampering with deployment packages.
606+
607+
## Inadequate Testing
608+
609+
Insufficient or ineffective testing of CI/CD pipelines, leading to undetected vulnerabilities.
610+
Example of attacks: Exploitation of untested code paths, introduction of vulnerable code during the build process.
611+
612+
## Insufficient Monitoring and Logging
613+
614+
Lack of real-time monitoring and comprehensive logging for CI/CD activities and events.
615+
Example of attacks: Difficulty in identifying and responding to security incidents, delayed detection of unauthorized activities.
616+
617+
## Lack of Compliance and Governance
618+
619+
Failure to adhere to security policies, industry regulations, and compliance requirements in CI/CD workflows.
620+
Example of attacks: Non-compliance with data protection standards, regulatory fines, legal implications.
621+

docs/mlsecops/modelrobustnessandadversarialattacks.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -587,6 +587,12 @@ jobs:
587587
This example demonstrates how to request a deployment review from the security team before deploying the application. The cml-pr action is used to create a pull request with a specific title, body, and assignee. This allows the security team to review and approve the deployment before it is executed.
588588

589589

590+
## Automate Machine Learning Lifecycle
591+
592+
https://github.com/microsoft/nni
593+
594+
595+
590596
## Resources
591597

592598
* https://github.com/devopscube/how-to-mlops

0 commit comments

Comments
 (0)