Passionate security researcher and professional #EntraID #Azure #GCP #Kubernetes | Sharing technical tips and ideas | Currently MIA
Jan 27 โข 4 tweets โข 1 min read
Do you have ๐๐ฒ๐ฟ๐๐ถ๐ฐ๐ฒ ๐ฝ๐ฟ๐ถ๐ป๐ฐ๐ถ๐ฝ๐ฎ๐น๐ using "Policy.ReadWrite.
ConditionalAccess" in ๐๐ป๐๐ฟ๐ฎ ๐๐? Then you might be vulnerable to your ๐ฒ๐ป๐๐ถ๐ฟ๐ฒ ๐๐ฒ๐ป๐ฎ๐ป๐ being ๐ฟ๐ฎ๐ป๐๐ผ๐บ๐๐ฎ๐ฟ๐ฒ๐ฑ ๐ฌ
Here is why ๐งต๐
๐ ๐๐ฎ๐ฐ๐ธ๐ด๐ฟ๐ผ๐๐ป๐ฑ
"Policy.ReadWrite.ConditionalAccess" has full control over Conditional Access Policies (CAPs).
Mounting a #Kubernetes service account to a pod with permissions to deploy other pods implies that if your app has RCE, a threat actor will be able to infect other Services in the cluster (yes, even if you use strict PSPs) #KubernetesSecurity#k8s#aks#gke#eks #DevSecOps
๐งต ๐
Background:
โช๏ธ A Service in #k8s is an object that balances HTTP requests between pods belonging to that Service
โช๏ธ A Service identifies its pods through a set of labels (e.g. "fancy-app: prod", "db: users", etc)