Maintaining access in the cloud environment
The tools and examples covered in this chapter are still applicable to the cloud environment, specifically if Infrastructure as a Service (IaaS) is used. Similarly, some Platform as a Service (PaaS) services may rely on vulnerable dependencies that can be used to maintain access.
Other methods commonly used in cloud environments include some of the following:
- Default weak configuration or protocols that can help maintain access:
- For example, in a few cases when default legacy protocols are enabled, it can be used as a way to access the cloud environment by bypassing any MFA controls
- Another example is the use of a default account for running virtual machines on the cloud as a way to ensure maintaining access
- Creating new accounts that look similar to existing accounts as a means to have access.
- Capturing many valid accounts and only using a few during any movement within the environments. This allows you to return to the...