How to Check for Least Privilege with Cyscale’s New Identity Dashboard
Cloud Security Analyst at Cyscale
Monday, August 15, 2022
The Least Privilege Principle states that no user should be given more permissions and for more time than they require for their day-to-day tasks.
Compliance with the Principle of Least Privilege (PoLP) is a security best practice in cloud security that should be implemented in all cloud environments.
One specific area where the Principle of Least Privilege plays a crucial role is within Amazon Web Services (AWS). Implementing AWS Least Privilege ensures that users, applications, and services in your AWS environment only have the minimum permissions necessary to perform their functions. This approach reduces the attack surface and helps in preventing unauthorized access or accidental changes to critical resources
How do you implement Least Privilege?
- Use timed privileges; only assign privileges in the moments they are needed and revoke them after.
- Set up minimum permissions and add more on the go, if necessary.
- Remove or disable identities that haven’t been active in the last 30 days or more.
Cyscale can help you implement the Principle of Least Privilege
With a new, powerful identity dashboard, Cyscale helps you improve the visibility of your cloud identities and pinpoint vulnerabilities or misconfigurations.
Using this page, you can see your organization's identities and their level of access.
Entities that do not have permissions in the cloud but have an account are marked with the “No Access” tag on the right.
Moreover, people who have left the organization are also visible on this dashboard. It is essential to know which entities have left to ensure you have a complete offboarding process and that they no longer have permissions.
If we expand a card of an identity that no longer exists in the company, we see that their account is disabled because it is greyed out.
To understand an identity's impact on the entire organization's environment, you must have comprehensive visibility.
The following image shows that the analyzed user has accounts in Alibaba, AWS, Azure, Google Cloud, and Okta. Furthermore, we can see that they are part of the "Admins" group, as well as others, and as a result, are "Highly Privileged”.
If we expand each account’s card, we can see the environment they have access to. Besides tracking permissions, it is crucial to also track the actual environments each user has access to. In the cloud, this tends to quickly become hard to track because applications often span multiple accounts.
Being highly privileged is not necessarily an issue, however, combining it with the lack of MFA does become a problem. Cyscale highlights this situation. This can be seen immediately after expanding a person’s card, so the vulnerability is not missed.
In this example, the user’s Okta account does not have MFA. Okta is an identity and access management (IAM) service where you can onboard your accounts, which helps you manage your organization’s access to other applications through SSO.
In the image below, you can see the accounts assigned using Okta. Therefore, if there is a vulnerability in your Okta account, all those accounts may be compromised.
Another useful feature of the Identity Dashboard is the “Alerts” section. If an account has security alerts, the user can click on them and be redirected to the Alerts page. There, you can see failed controls along with:
- Severity,
- The asset involved,
- The status, and others.
You can immediately pinpoint any misconfigurations and vulnerabilities using these alerts and quickly solve them with the remediation steps provided.
Besides visibility, Cyscale provides controls that automatically check for misconfigurations.
There are over 400 controls currently available in Cyscale. A few examples of controls that verify you’re implementing the Least Privilege Principle correctly are:
- Eliminate use of the "root" user for administrative and daily tasks for AWS
- Ensure that ServiceAccount has no Admin privileges for Google Cloud Platform
- Ensure IAM policies that allow full "*:*" administrative privileges are not created for AWS
- Ensure IAM Users that are inactive for 30 days or more are deactivated for AWS
Cloud Security Analyst at Cyscale
Sabrina Lupsan merges her academic knowledge in Information Security with practical research to analyze and strengthen cloud security. At Cyscale, she leverages her Azure Security Engineer certification and her Master's in Information Security to keep the company's services at the leading edge of cybersecurity developments.
Further reading
Cloud Storage
Misconfigurations
Build and maintain a strong
Security Program from the start.
Cloud Compliance in
2024: An In-Depth Guide
The whitepaper talks about ISO 27001, SOC 2, PCI-DSS, GDPR, HIPAA.
Download WhitepaperShare this article
Stay Connected
Receive our latest blog posts and product updates.
TOP ARTICLES
Product
Our Compliance toolbox
Check out our compliance platform for cloud-native and cloud-first organizations:
CSPM ToolMulti-Cloud Data SecurityGoogle Cloud SecurityAWS Security & ComplianceIAM Cloud SecurityPrevent Cloud MisconfigurationLATEST ARTICLES