|
| ▲ | mikestew 4 hours ago | parent | next [-] |
| The real story here is a big gap in existing implementations where shared credentials are needed and used pretty much across all the systems but there are no good solutions for managing such use cases. This strikes me as so wrong, I wonder if I’m misreading your comment. For instance, team password managers are a thing. And IT teams at many large corporations are not passing around an unsecured CSV files full of passwords. |
| |
| ▲ | sandeepkd 4 hours ago | parent | next [-] | | Lets take a concrete example, suppose you have AWS root account credentials. Are you going to assign them to one individual identity or as a company you would keep them accessible to a group of admins. Its going to be the second choice almost for every big company which makes them shared credentials. Coming to team password managers at high level, its a shared location guarded behind closed doors (probably encryption at transit and rest). They would be another set of software that every company specially small business or contractors may not be incentivized to pay for. Some one in their naivety considered Github as a safe enough place, assuming that the access is guarded which turned out to be wrong and exposed this thing. Lastly IT teams in large corporations being secure is a myth for most part. Your root keys for the most popular CA providers were shared in plain text emails not so long ago. | | |
| ▲ | antonvs 4 hours ago | parent | next [-] | | This organization is using AWS apparently. They would store the root account credentials in AWS Secret Manager. That costs $0.40 per month. People in the relevant admin group would have access to them. They would log in with their individual AWS credentials in order to access the root credentials if they need that. But, requiring AWS root credentials itself is an anti-pattern and implies an immature organization. That should not be needed for day-to-day operation. This is all just ignorance and incompetence, nothing more. > Lastly IT teams in large corporations being secure is a myth for most part. This is CISA. The Cybersecurity and Infrastructure Security Agency for the United States. Security is what they're supposed to specialize in. The only potential excuse here is that DOGE gutted them to a point that has completely compromised their capabilities. However, this situation is bad enough that it suggests that problems predated that incident. | | |
| ▲ | sandeepkd 4 hours ago | parent [-] | | To be honest I do not know how to respond to this, cause this plays out quite often this way and sounds pretty convincing on surface. Unfortunately this is the gap between theory and implementation. There is a reason why the ROOT credentials are called ROOT. In case of anything going wrong, all your regular user accounts would be locked, see how you lock yourself out of this circular dependency. ONE SHOULD NEVER NOT PUT THEIR ROOT CREDENTIALS IN THE SECRET MANAGER OF SAME ACCOUNT. Its a classical circular problem, compilers compiler type. For AWS itself they have this additional concept of management account that allows you to defer this problem to just one more level. Bottomline, you can have any number of boxes to lock other boxes and put their key to bounding box, ultimately there would be one outermost box that is locked by key which is not in any box |
| |
| ▲ | Hikikomori 3 hours ago | parent | prev [-] | | We deleted the root credentials efter initial setup where we added mgmt iam accounts used by our automation. If we ever needed them we used the recovery process. All users and services use temporary credentials. | | |
| ▲ | sandeepkd 3 hours ago | parent | next [-] | | I made an assumption that you have federated AWS account setup. One organization management AWS account and then federated accounts under it and you are referring to deletion of deletion of ROOT credentials in the federated accounts. Considering thats not the case, what you just did is move the goal post to a account recovery process. Question becomes who has ability to recover the account, in case its tied with email then most likely it has to be a shared email box. What you have now is a much more fragile system in case of custom domains, where whoever is controlling the email domain (DNS management capability) can take over the AWS accounts. | | |
| ▲ | Hikikomori 3 hours ago | parent [-] | | One account, org, federated, whatever. You don't need to store the root credentials. An email per account where only security team has access. Whoever can modify domain can already do this. |
| |
| ▲ | sandeepkd 3 hours ago | parent | prev [-] | | This would be a incorrect representation/comparison of the problem being discussed. The semantics of ROOT account changes in the case when a separate management IAM account is introduced. In this case the question would become how you are securing the ROOT credentials for the separate AWS IAM management account/tenant. | | |
|
| |
| ▲ | realo 4 hours ago | parent | prev | next [-] | | You are right... Most use Excel files ... | |
| ▲ | throwawaypath 3 hours ago | parent | prev [-] | | >For instance, team password managers are a thing. And IT teams at many large corporations are not passing around an unsecured CSV files full of passwords. It's CURRENTYEAR. No one should be using team password managers or files to store credentials. There should not be storable credentials. |
|
|
| ▲ | morpheuskafka 3 hours ago | parent | prev | next [-] |
| He worked for CISA. Surely there is either a security clearance with indoctrination and training, or at the very least, some sort of mandatory training/onboarding for all contractor staff? |
|
| ▲ | MrDarcy 4 hours ago | parent | prev | next [-] |
| The error and omission of not enforcing mandatory security training covering posting plaintext passwords to public sites for CISA contractors is itself an act of gross negligence. So much so the contracting company’s insurer would cite it as the reason why the claim is not covered by their policy. |
|
| ▲ | Forgeties79 3 hours ago | parent | prev | next [-] |
| > While I agree that it should not have happened, at the same time its probably true that most people are never formally trained on security. This isn’t a grocery store or something it’s CISA. This is like a gun going off in a cop’s holster while he’s texting and driving without a seatbelt. Yeah he’s a contractor but that doesn’t suddenly allow for such incompetence. |
| |
| ▲ | sandeepkd 3 hours ago | parent [-] | | I have worked with some of the experienced folks in federal space in the past, who were super smart, experienced and COSTLY from managements perspective. They had the ability to challenge the management on such things. Most of them have either retired, managed out or moved on. What you have here is not a reflection of the individual but the entire management chain. Its a race to make most money and at times these contractors are number of seats to fill at lowest possible cost. | | |
|
|
| ▲ | antonvs 4 hours ago | parent | prev [-] |
| > shared credentials are needed and used pretty much across all the systems but there are no good solutions for managing such use cases. What do you mean by this? There are password managers and more enterprise-oriented secrets managers, and application platforms typically have integration with them. Individuals shouldn't be using shared secrets. This is a completely solved problem and it's not difficult to set up properly, especially in a cloud environment like AWS, where you can use services like AWS Secrets Manager. |
| |