
Keep your Azure Active Directory Protected
Celia CatalánShare
Whenever we talk about cybersecurity we think about the servers that we have hosted in our company and we worry about their exposure to the outside world and the impact that the compromise of any resource on our network could have. However, there are already many companies that use cloud services or hybrid systems to deploy their infrastructure.
Today we are going to talk about Azure, and what are some of the entry points that some attackers exploit to compromise an organization and we will also give some basic security recommendations.
Entry Vectors to Azure AD
Vulnerable Applications + Managed Identities:
Azure is often used to expose old applications and add a layer of security, however, an application with vulnerabilities still has them just because it is uploaded to the cloud. In this case, when an application is deployed in Azure, a Managed Identity is associated with it, that is, an Azure account that will be used by the application and to which the necessary permissions will be assigned to access different resources such as databases or Key Vaults within the organization.
In the event that an attacker manages to exploit an RCE or SSRF type vulnerability in the application, they could be able to obtain the Access token of the Managed Identity, thus being able to impersonate this account and use it to access the organization and its resources, and since these types of accounts are not intended to be used by a person, they do not have MFA.
- Analyze and mitigate vulnerabilities in exposed applications.
- Limit Managed Identities permissions as much as possible.
- Monitor the actions of Managed Identities to detect any action that differs from their expected use.
Azure Blobs Exposed:
- Educate employees so that they do not store sensitive information in these resources and that they correctly manage permissions.
- Frequently review public blobs to ensure none are public.
- Limit duration of links to blobs.
Absence of MFA + Leaks:
- Continuously investigate exposed information from the organization in order to detect compromised credentials so they can be changed.
- Set mandatory MFA for all accounts.
- Implement controls in the Conditional Access Policy to restrict access to the Azure domain only from permitted locations.
Phishing:
- Raise awareness among employees about these and other phishing techniques so that they learn to recognize and avoid them.
- Limit user permissions in the Azure domain as much as possible.