All Projects → cyberark → Skyark

cyberark / Skyark

Licence: mit
SkyArk helps to discover, assess and secure the most privileged entities in Azure and AWS

Programming Languages

powershell
5483 projects

Projects that are alternatives of or similar to Skyark

Cloud Custodian
Rules engine for cloud security, cost optimization, and governance, DSL in yaml for policies to query, filter, and take actions on resources
Stars: ✭ 3,926 (+646.39%)
Mutual labels:  aws, cloud, azure
Terratag
Terratag is a CLI tool that enables users of Terraform to automatically create and maintain tags across their entire set of AWS, Azure, and GCP resources
Stars: ✭ 385 (-26.81%)
Mutual labels:  aws, cloud, azure
Kubestriker
A Blazing fast Security Auditing tool for Kubernetes
Stars: ✭ 213 (-59.51%)
Mutual labels:  aws, azure, security-tools
Smogcloud
Find cloud assets that no one wants exposed 🔎 ☁️
Stars: ✭ 168 (-68.06%)
Mutual labels:  aws, cloud, security-tools
Terracognita
Reads from existing Cloud Providers (reverse Terraform) and generates your infrastructure as code on Terraform configuration
Stars: ✭ 452 (-14.07%)
Mutual labels:  aws, cloud, azure
Externalsecret Operator
An operator to fetch secrets from cloud services and inject them in Kubernetes
Stars: ✭ 177 (-66.35%)
Mutual labels:  aws, cloud, azure
Midway
🍔 A Node.js Serverless Framework for front-end/full-stack developers. Build the application for next decade. Works on AWS, Alibaba Cloud, Tencent Cloud and traditional VM/Container. Super easy integrate with React and Vue. 🌈
Stars: ✭ 5,080 (+865.78%)
Mutual labels:  aws, cloud, azure
Learning Cloud
List of resources - courses, sample code, articles and screencasts for learning AWS, Azure, GCP and Alibaba Cloud
Stars: ✭ 100 (-80.99%)
Mutual labels:  aws, cloud, azure
Arvados
An open source platform for managing and analyzing biomedical big data
Stars: ✭ 274 (-47.91%)
Mutual labels:  aws, cloud, azure
Scoutsuite
Multi-Cloud Security Auditing Tool
Stars: ✭ 3,803 (+623%)
Mutual labels:  aws, cloud, azure
Cloud Security Remediation Guides
Security Remediation Guides
Stars: ✭ 121 (-77%)
Mutual labels:  aws, cloud, azure
Prowler
Prowler is a security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. It contains more than 200 controls covering CIS, ISO27001, GDPR, HIPAA, SOC2, ENS and other security frameworks.
Stars: ✭ 4,561 (+767.11%)
Mutual labels:  aws, cloud, security-tools
Gocloud
☁️ Go API for open cloud
Stars: ✭ 112 (-78.71%)
Mutual labels:  aws, cloud, azure
Aws Auto Remediate
Open source application to instantly remediate common security issues through the use of AWS Config
Stars: ✭ 191 (-63.69%)
Mutual labels:  aws, cloud, security-tools
Seldon Server
Machine Learning Platform and Recommendation Engine built on Kubernetes
Stars: ✭ 1,435 (+172.81%)
Mutual labels:  aws, cloud, azure
Engine
Deploy your apps on any Cloud provider in just a few seconds
Stars: ✭ 1,132 (+115.21%)
Mutual labels:  aws, cloud, azure
Cloud Portal
Self service web portal for different Cloud platforms like Azure, AWS and VMWare vSphere.
Stars: ✭ 60 (-88.59%)
Mutual labels:  aws, cloud, azure
Cloudsploit
Cloud Security Posture Management (CSPM)
Stars: ✭ 1,338 (+154.37%)
Mutual labels:  aws, cloud, azure
Infracost
Cloud cost estimates for Terraform in pull requests💰📉 Love your cloud bill!
Stars: ✭ 4,505 (+756.46%)
Mutual labels:  aws, cloud, azure
Leapp
Leapp is the tool to access your cloud; It securely stores your access information and generates temporary credential sets to access your cloud ecosystem from your local machine.
Stars: ✭ 306 (-41.83%)
Mutual labels:  aws, cloud, azure

alt text

SkyArk is a cloud security project with two main scanning modules:

  1. AzureStealth - Scans Azure environments
  2. AWStealth - Scan AWS environments

These two scanning modules will discover the most privileged entities in the target AWS and Azure.

The Main Goal - Discover The Most Privileged Cloud Users

SkyArk currently focuses on mitigating the new threat of Cloud Shadow Admins, and helps organizations to discover, assess and protect cloud privileged entities.
Stealthy and undercover cloud admins may reside in every public cloud platform and SkyArk helps mitigating the risk in AWS and Azure.
In defensive/pentest/risk assessment procedures - make sure to address the threat and validate that those privileged entities are indeed well secured.

Background:

SkyArk deals with the new uprising threat of Cloud Shadow Admins - how attackers can find and abuse non-trivial and so-called “limited” permissions to still make it through and escalate their privileges and become full cloud admins.
Furthermore, attackers can easily use those tricky specific permissions to hide stealthy admin entities that will wait for them as an undercover persistence technique.

SkyArk was initially published as part of our research on the threat of AWS Shadow Admins, this research was presented at RSA USA 2018 conference.
The AWS Shadow Admins blog post:
https://www.cyberark.com/threat-research-blog/cloud-shadow-admin-threat-10-permissions-protect/
The recording of the RSA talk:
https://www.youtube.com/watch?v=mK62I1BNmXs

About a year later, we added the AzureStealth scan to SkyArk for mitigating the Shadow Admins threat in Azure! Our research on Azure Shadow Admins threat was presented at RSA USA 2020 and Hackfest conferences. DIY: Hunting Azure Shadow Admins Like Never Before - blog post:
https://www.cyberark.com/resources/threat-research-blog/diy-hunting-azure-shadow-admins-like-never-before-2

Tool Description

SkyArk currently contains two main scanning modules AWStealth and AzureStealth.
With the scanning results - organizations can discover the entities (users, groups and roles) who have the most sensitive and risky permissions.
In addition, we also encourage organizations to scan their environments from time to time and search for suspicious deviations in their privileged entities list.
Potential attackers are hunting for those users and the defensive teams should make sure these privileged users are well secured - have strong, rotated and safety stored credentials, have MFA enabled, being monitored carefully, etc.
Remember that we cannot protect the things we don’t aware of, and SkyArk helps in the complex mission of discovering the most privileged cloud entities - including the straight-forward admins and also the stealthy shadow admins that could easily escalate their privileges and become full admins as well.

1. AzureStealth Scan

Discover the most privileged users in the scanned Azure environment - including the Azure Shadow Admins.

How To Run AzureStealth
The full details are in the AzureStealth's Readme file:
https://github.com/cyberark/SkyArk/blob/master/AzureStealth/README.md
In short:

  1. Download/sync locally the SkyArk project
  2. Open PowerShell in the SkyArk folder with the permission to run scripts:
    "powershell -ExecutionPolicy Bypass -NoProfile"
  3. Run the following commands:
(1) Import-Module .\SkyArk.ps1 -force
(2) Start-AzureStealth

AzureStealth needs only Read-Only permissions over the scanned Azure Directory (Tenant) and Subscription.
*You can also run the scan easily from within the Azure Portal by using the built-in CloudShell:

   (1) IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/cyberark/SkyArk/master/AzureStealth/AzureStealth.ps1')  
   (2) Scan-AzureAdmins  

AzureStealth DEMO:
Demo

2. AWStealth Scan

Discover the most privileged entities in the scanned AWS environment - including the Azure Shadow Admins.

How To Run AWStealth
The full details are in the AWStealth's Readme file:
https://github.com/cyberark/SkyArk/tree/master/AWStealth
In short:

  1. Download/sync locally the SkyArk project
  2. Open PowerShell in the SkyArk folder with the permission to run scripts:
    "powershell -ExecutionPolicy Bypass -NoProfile"
  3. Run the following commands:
(1) Import-Module .\SkyArk.ps1 -force
(2) Start-AWStealth

AWStealth needs only Read-Only permissions over the IAM service of the scanned AWS environment.

AWStealth DEMO:
Demo

3. SkyArk includes more small sub-modules for playing around in the cloud security field

An example for such a sub-module is AWStrace module.
AWStrace - analyzes AWS CloudTrail Logs and can provide new valuable insights from CloudTrail logs.
It especially prioritizes risky sensitive IAM actions that potential attackers might use as part of their malicious actions as AWS Shadow Admins.
The module analyzes the log files and produces informative csv result file with important details on each executed action in the tested environment.
Security teams can use the results files to investigate sensitive actions, discover the entities that took those actions and reveal additional valuable details on each executed and logged action.

Quick Start

Take a look at the Readme files of the scanning modules:
AzureStealth - https://github.com/cyberark/SkyArk/blob/master/AzureStealth/README.md
AWStealth - https://github.com/cyberark/SkyArk/blob/master/AWStealth/README.md

Share Your Thoughts And Feedback

Asaf Hecht (@Hechtov) and CyberArk Labs

More coverage on the uprising Cloud Shadow Admins threat:

On the threat in AWS:
ThreatPost: https://threatpost.com/cloud-credentials-new-attack-surface-for-old-problem/131304/
TechTarget\SearchCloudSecurity: https://searchcloudsecurity.techtarget.com/news/252439753/CyberArk-warns-of-shadow-admins-in-cloud-environments
SecurityBoulevard: https://securityboulevard.com/2018/05/cyberark-shows-how-shadow-admins-can-be-created-in-cloud-environments/
LastWatchDog: https://www.lastwatchdog.com/cyberark-shows-how-shadow-admins-can-be-created-in-cloud-environments/
Byron Acohido's Podcast: https://soundcloud.com/byron-acohido/cloud-privileged-accounts-flaws-exposed
On the threat in Azure:
https://www.zdnet.com/article/new-tool-detects-shadow-admin-accounts-in-aws-and-azure-environments/ https://securityinfive.com/episode-797-new-tool-helps-you-find-shadow-admin-account-in-aws-and-azure/ https://awsinsider.net/articles/2020/07/29/aws-azure-shadow-admin.aspx https://siliconangle.com/2020/07/29/cyberark-launches-open-source-shadow-admin-identification-tool-azure-aws/ https://itsecuritywire.com/quick-bytes/cyberark-introduces-shadow-admin-identification-tool-for-azure-and-aws/

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].