SkyArk: cloud security project
SkyArk is a cloud security project with two helpful sub-modules – AWStealth and AWStrace.
To help the cloud community in the effort of making cloud environments more secure.
SkyArk currently focuses on mitigating the new threat of Cloud Shadow Admins and helps organizations to discover, validate and protect cloud privileged entities.
Stealthy and undercover cloud admins may reside in every public cloud platform and the tool at this time helps to mitigate the risk in AWS.
In defensive/pentest/risk assessment procedures – make sure to address the threat and validate that those privileged entities are indeed well secured.
SkyArk currently contains two modules:
- AWSteatlh:
Discovers the most privileged entities in the scanned AWS environments – including AWS Shadow Admins.
With the AWStealth’s scanning results – organizations will know what users, groups, and roles have sensitive and risky permissions.
We also encourage organizations to scan their environments from time to time and search for suspicious deviations in their privileged entities list.
Potential attackers are hunting those kinds of entities. The defensive teams must make sure these privileged entities are well secured – have strong, rotated and safety stored credentials, have MFA enabled and monitored carefully.
Remember that we cannot protect the things we don’t know, and AWStealth will help to discover the most privileged entities – the straight-forward admins and the unique stealthy shadow entities that could also easily escalate privileges and become full admins. - AWStrace:
Analyzes AWS CloudTrail Logs – the module provides new valuable insights from CloudTrail logs.
It especially prioritizes risky sensitive IAM actions that potential attackers might use as part of their malicious actions as AWS Shadow Admins.
The module analyzes the log files and produces informative csv result file with important details on each executed action in the evacuated environment.
Security teams can use the results files to investigate sensitive actions, discover the entities that took those actions and reveal additional valuable details on each executed and logged action.
Download && Use
SkyArk runs in PowerShell – and uses the free AWS’s PowerShell Module:
https://aws.amazon.com/powershell/
If you have PS version 5+, the tool will prompt you and could automatically install the AWS PowerShell module for you. Otherwise, you can download “AWS Tools for Windows PowerShell” in advance:
Direct download link
git clone https://github.com/cyberark/SkyArk.git
Open PowerShell in SkyArk folder with running scripts permission:
“powershell -ExecutionPolicy Bypass -NoProfile”
Start and import SkyArk:
Perform AWStealth scan:
Perform AWStrace analysis:
© 2018 CyberArk Software Ltd. All rights reserved
Source: https://github.com/cyberark/