Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Cybersecurity Blind Spots in IaC and PaC Tools Expose Cloud Platforms to New Attacks
Global Security

Cybersecurity Blind Spots in IaC and PaC Tools Expose Cloud Platforms to New Attacks

AdminBy AdminNovember 25, 2024No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


November 25, 2024Ravi LakshmananCloud Security / Supply Chain Attack

Cybersecurity researchers have uncovered two new attack techniques against infrastructure-as-code (IaC) and policy-as-code (PaC) tools such as Terraform and HashiCorp’s Open Policy Agent (OPA) that use special domain-oriented languages ​​(DSLs) to hack cloud platforms and extracted data.

“Because they’re hard languages ​​with limited capabilities, they should be more secure than standard programming languages, and they really are,” Tenable Senior Security Researcher Shelly Raban said in a technical report published last week. “However, safer does not mean bulletproof.”

OPA is a popular open-source policy engine that allows organizations to enforce policies on their own cloud environments, such as microservices, CI/CD pipelines, and Kubernetes. Policies are defined using the native query language called Rega which then evaluated under OPA to return the decision.

Cyber ​​security

The attack method developed by Tenable targets the supply chain, where an attacker gains unauthorized access via a compromised access key to inject a malicious Rego policy into the OPA server, which is then used in the policy decision stage to allow malicious activities such as credential theft data using a built-in function known as “http.send.”

Even in cases where OPA deployments restrict the use of http.send, the cybersecurity firm discovered that another feature called “net.lookup_ip_addr” to smuggle data using DNS lookups using a technique called DNS tunneling.

“So the net.lookup_ip_addr function is another function that you might want to limit or at least pay attention to in policy as it also creates a risk of data theft from your OPA deployment,” Raban said.

Terraform, similar to OPA, goals to simplify the process of configuring, deploying, and managing cloud resources using code-based definitions. These configurations can be configured using another declarative DSL called HashiCorp Configuration Language (HCL).

An attacker can target an open source IaC platform by exploiting its “terraform plan” commands that are usually run as part of GitHub “pull_query” workflows to commit unverified changes containing the malicious data source during the CI/CD process.

“This poses a risk as an external attacker in a public repository or a malicious insider (or an external attacker with leverage) in a private repository could exploit the pull request for their own malicious purposes,” Tenable noted. “The data sources run during the ‘terraforming plan’, which greatly reduces the entry point for attackers.”

Cyber ​​security

These data sources, in turn, can be a fake external data source, a Terraform module, or a DNS data sourcewhich requires the use of only third-party components from trusted sources. Some of the other recommendations to reduce such risks include:

  • Implement granular role-based access control (RBAC) and adhere to the principle of least privilege
  • Configure application-level and cloud-level logging for monitoring and analysis
  • Restrict network and data access to applications and host machines
  • Prevent automatic execution of untested and potentially malicious code in CI/CD pipelines

In addition, organizations can use IaC scanning tools and solutions like Terrascan and Checkov to proactively detect misconfigurations and compliance issues before deployment.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.