Well, That Escalated Quickly

Photo by Joshua Sortino on Unsplash

Just like the cliché says, security is only as strong as the weakest link. We know that a single Identity and Access Management (IAM) misconfiguration in our AWS environment can lead to compromise of our entire cloud environment. It’s the task of the Security Team at Afterpay to manage this risk, while at the same time making sure that engineers are not slowed down in their everyday tasks. To tackle this (not-so-easy) problem, we have developed an automated and scalable solution to consistently and flexibly manage IAM in our AWS accounts.

Motivation

AWS IAM is at the heart of AWS Security, and as our organisation scales, we need to ensure a robust and consistent IAM model across our AWS accounts. One of the most common tactics attackers use to escalate privileges in cloud environments is to abuse overly permissive identity and access policies. Cloud Cover was born to reduce the chance of IAM misconfigurations in our AWS environments.

Goals

When we designed Cloud Cover, a few things were important to us:

What is Cloud Cover?

Cloud Cover is a tool that provides employees access to our AWS accounts through the use of temporary IAM role credentials. We use AWS roles that can be assumed, rather than users, to prevent the use of long-lived static credentials. IAM roles and policies are defined by Cloud Cover as infrastructure as code (IAC), and are deployed into our AWS accounts using a CI/CD pipeline.

IAM roles deployed by Cloud Cover are mapped to Okta groups, and engineers are assigned to these groups based on their team and responsibilities. We developed a set of AWS IAM base roles that users can federate into using Okta, which ensure least-privilege permissions. The goal was to capture 90% of the use cases for engineers who work with AWS with these base roles. As this base set of roles will not fit all use cases, individual teams can attach missing permissions to roles in their AWS accounts. Additional permissions can be requested by creating a pull request in Cloud Cover”s Github repo.

Endorsed and Custom Policies

To allow engineers to request additional IAM permissions and attach these to their base roles, Cloud Cover makes a distinction between “endorsed” and “custom” policies in its GitHub repo.

“Endorsed” policies are policies that are endorsed by the Security Team and are deemed secure enough to be used freely. It is our intent that these policies can be attached to any role definition without requiring approval through pull requests.

“Custom” policies can be created by individual teams when no endorsed policies fit their use case. These policies are defined in the Cloud Cover Github repo in the AWS account folder of the team owning that particular AWS account. The creation and attachment of “custom” policies requires approval, via a pull request in the Cloud Cover GitHub repo, before additional permissions can be granted.

Service-Based Permissions

To further enforce the principle of least privilege, some role policies are constrained to prefixes of services that are deployed in an AWS account. An example where this may be useful is to have more granular control over what secrets in AWS Secrets Manager can be accessed by different IAM roles within an AWS account, based on the services deployed there (i.e. only secrets for certain services can be accessed by engineers in a given AWS account).

Permissions Boundaries

The roles and policies managed by Cloud Cover are to a great extent only applicable to roles humans federate into. However, the principle of least privilege should not only apply to “human” IAM roles, but should also be applied to service roles created by these human roles. Therefore, the current Cloud Cover base roles can only create machine roles under certain conditions. An example of a condition is that roles can only be created if the new role has an AWS Permissions Boundaries attached to it, to restrict what actions that new role can perform. Another condition is that roles can only be created and passed to roles and policies that are prefixed with certain “prefixes” (as explained above).

It is important to note that there is no impact on the way machine roles are created using CI/CD pipelines, since these are checked for security issues prior to deployment using our code scanning tool Intersect.

Service Control Policy

To ensure that permissions attached to the Cloud Cover IAM roles are only defined as code in Cloud Cover”s GitHub repo, we have developed an AWS Service Control Policy (SCP) that prevents unauthorised modifications to the base roles in our AWS ecosystem.

Technical Details

Since all Cloud Cover IAM roles and permissions are defined as code, we had to come up with a way to convert the code into IAM roles in our AWS environment. To achieve this, a set of Python scripts was developed to create CloudFormation templates based on the role definitions in Cloud Cover, with the help of a tool called Troposphere.

Role definitions are specified in a yaml file for each AWS account in our organization. This role definition yaml file includes a specification of policies attached to the role (including assume role policies, permissions boundaries and regular role policies). These policies can comprise “endorsed”, “custom” or AWS managed policies.

engineer-role.yml

AssumeRolePolicy: endorsed:saml
Boundaries:
- custom:permissions-boundary
Policies:
- aws:PowerUserAccess
- endorsed:engineer-policy
- endorsed:iam-create-role
- custom:s3

Example of a role definition

For each account, the role definitions are fetched from that specific account’s folder, and validated. Subsequently, a CloudFormation template is created, containing all roles and policies as defined in the role definitions.

Whenever changes are made to role or policy definitions, and these changes are pushed to GitHub on feature branches, the Cloud Cover CI/CD pipeline validates the modifications to the IAM roles. The deployment of these changes occurs in this CI/CD pipeline as well, but only after the feature branch has been merged into the main branch.

An example of how permissions are managed and requested in Cloud Cover

Stay Tuned!

Cloud Cover was created to improve cloud hygiene and security, by providing an automated, self-service way of managing permissions and access to our cloud environment.

Over the course of the coming months, we’ll be rolling Cloud Cover out across the organisation. Stay tuned for our lessons learned!

We should also mention that we are growing! If you are the type of person that likes to solve tricky security problems at scale, check out our open roles or let us know what you’re looking for out of your next security role.