Detecting Ssrf Events on Aws Using Splunk Prt325

Title

AWS re:Invent 2022 - Detecting SSRF events on AWS using Splunk (PRT325)

Summary

  • Tom Smith, a security strategist with eight years at Splunk, discusses detecting server-side request forgery (SSRF) events on AWS using Splunk.
  • He explains SSRF, recreates an attack based on a real-world event, and highlights the differences between what AWS logs and what Splunk can detect.
  • The attack involved exploiting the AWS metadata service endpoint to gain credentials and admin access within 15 minutes.
  • AWS services like Security Hub, GuardDuty, and CloudTrail provided some alerts, but not until after significant actions had already been taken by the attacker.
  • Splunk's capabilities, including Cloud Data Manager, Enterprise Security (ES), and SOAR, can help detect and automate responses to such attacks.
  • The presentation emphasizes the importance of the AWS shared responsibility model, testing code, and meticulous IAM strategy to prevent such breaches.

Insights

  • AWS's default configurations can leave systems vulnerable to SSRF attacks, as demonstrated by the ease with which the attack was recreated.
  • AWS services alone may not provide timely or detailed enough alerts to prevent or understand the full scope of an attack.
  • Integrating AWS data with Splunk can provide earlier detection of suspicious activities and a more comprehensive view of security events.
  • The use of Splunk's Cloud Data Manager simplifies the process of ingesting AWS data into Splunk, overcoming previous challenges with data onboarding.
  • Splunk's Enterprise Security can automatically detect and alert on unusual activities, such as new logins from unfamiliar locations or rapid IAM changes.
  • Automation and orchestration through SOAR can significantly reduce the time to respond to incidents and mitigate damage.
  • The shared responsibility model is crucial to understand; customers are responsible for securing their data, applications, and operating systems on AWS.
  • Regular testing of code and a well-planned IAM strategy are essential for maintaining security in the cloud.