Adversaries may acquire credentials from cloud-native secret management solutions such as AWS Secrets Manager, GCP Secret Manager, Azure Key Vault, and Terraform Vault.
Secrets managers support the secure centralized management of passwords, API keys, and other credential material. Where secrets managers are in use, cloud services can dynamically acquire credentials via API requests rather than accessing secrets insecurely stored in plain text files or environment variables.
If an adversary is able to gain sufficient privileges in a cloud environment – for example, by obtaining the credentials of high-privileged Cloud Accounts or compromising a service that has permission to retrieve secrets – they may be able to request secrets from the secrets manager. This can be accomplished via commands such as get-secret-value
in AWS, gcloud secrets describe
in GCP, and az key vault secret show
in Azure.(Citation: Permiso Scattered Spider 2023)(Citation: Sysdig ScarletEel 2.0 2023)(Citation: AWS Secrets Manager)(Citation: Google Cloud Secrets)(Citation: Microsoft Azure Key Vault)
Note: this technique is distinct from Cloud Instance Metadata API in that the credentials are being directly requested from the cloud secrets manager, rather than through the medium of the instance metadata API.
View in MITRE ATT&CK®Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
CM-07 | Least Functionality | mitigates | T1555.006 | Cloud Secrets Management Stores | |
AC-06 | Least Privilege | mitigates | T1555.006 | Cloud Secrets Management Stores | |
AC-03 | Access Enforcement | mitigates | T1555.006 | Cloud Secrets Management Stores | |
AC-02 | Account Management | mitigates | T1555.006 | Cloud Secrets Management Stores |
Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
action.malware.variety.Password dumper | Password dumper (extract credential hashes) | related-to | T1555.006 | Cloud Secrets Management Stores | |
attribute.confidentiality.data_disclosure | None | related-to | T1555.006 | Cloud Secrets Management Stores |
Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
google_secops | Google Security Operations | technique_scores | T1555.006 | Cloud Secrets Management Stores |
Comments
Google Security Operations can prevent those with insufficient privileges from accessing the secrets manager, as well as detect modifications to user privileges that may allow them access. This was ranked as partial as it cannot prevent a compromised account with those permissions from accessing the secrets manager.
References
|
Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
aws_secrets_manager | AWS Secrets Manager | technique_scores | T1555.006 | Cloud Secrets Management Stores |
Comments
This control may prevent harvesting of credentials from password stores by providing a secure, finely controlled location for secrets storage. This control is only relevant for credentials that would be used from application and configuration files and not those entered directly by an end user.
References
|