forked from p15670423/monkey
Added ScoutSuite documentation to documentation hub
This commit is contained in:
parent
5987cee226
commit
6b52d4931e
|
@ -0,0 +1,14 @@
|
||||||
|
---
|
||||||
|
title: "Zero trust"
|
||||||
|
date: 2021-03-02T16:22:55+02:00
|
||||||
|
draft: false
|
||||||
|
weight: 10
|
||||||
|
chapter: true
|
||||||
|
tags: ["zero trust"]
|
||||||
|
pre: '<b>0</b> '
|
||||||
|
---
|
||||||
|
# Zero Trust
|
||||||
|
|
||||||
|
Gives more details about tests and tools used during Zero Trust assessment.
|
||||||
|
|
||||||
|
{{% children %}}
|
|
@ -0,0 +1,57 @@
|
||||||
|
---
|
||||||
|
title: "Scoutsuite"
|
||||||
|
date: 2021-03-02T16:23:06+02:00
|
||||||
|
draft: false
|
||||||
|
---
|
||||||
|
|
||||||
|
### What is ScoutSuite?
|
||||||
|
|
||||||
|
<a href="https://github.com/nccgroup/ScoutSuite" target="_blank" >Scout Suite</a> is an open-source cloud security-auditing tool.
|
||||||
|
It queries the cloud API to gather configuration data of the cloud infrastructure. Based on configuration
|
||||||
|
data gathered ScoutSuite shows security issues and risks present in your infrastructure.
|
||||||
|
|
||||||
|
### Which cloud providers are supported?
|
||||||
|
|
||||||
|
So far the Infection Monkey only supports AWS.
|
||||||
|
|
||||||
|
### How to enable ScoutSuite?
|
||||||
|
|
||||||
|
First of all, Infection Monkey needs access to your cloud API. You can provide access
|
||||||
|
in the following ways:
|
||||||
|
|
||||||
|
- Provide access keys:
|
||||||
|
- Create a new user with ReadOnlyAccess and SecurityAudit policies and generate keys
|
||||||
|
- Generate keys for your current user (faster but less secure)
|
||||||
|
- Configure AWS CLI:
|
||||||
|
- If the command-line interface is available on the Island, it will be used to access
|
||||||
|
the cloud API
|
||||||
|
|
||||||
|
More details about configuring ScoutSuite can be found in the tool itself, by choosing
|
||||||
|
"Cloud Security Scan" in the "Run Monkey" options.
|
||||||
|
|
||||||
|
After you're done with the setup, make sure that a checkmark appears next to the AWS option to
|
||||||
|
verify that ScoutSuite can access the API.
|
||||||
|
|
||||||
|
![Successfull setup indicator](/images/reference/zero-trust/scoutsuite_aws_configured.png
|
||||||
|
"Successful setup indicator")
|
||||||
|
|
||||||
|
### How to run cloud scan?
|
||||||
|
|
||||||
|
If you have successfully configured cloud scan, once the Monkey Agent is run **on the Island**,
|
||||||
|
the cloud infrastructure will get scanned. To make this happen, you can simply click on "From Island"
|
||||||
|
in the run options. The scope of network scan and other activities you configured the Agent to
|
||||||
|
do are irrelevant for cloud security scan, except
|
||||||
|
**Monkey Configuration -> System info collectors -> AWS collector** which needs to remain **enabled**.
|
||||||
|
|
||||||
|
### How to assess cloud scan results?
|
||||||
|
|
||||||
|
After the scan is done, ScoutSuite results will be sorted and applied to the ZeroTrust Extended framework
|
||||||
|
and displayed as a part of the ZeroTrust report. The main difference between Infection Monkey findings and
|
||||||
|
ScoutSuite findings is that ScoutSuite findings contain security rules. To see which rules were
|
||||||
|
checked click on the "Rules" button next to the relevant test. You'll see a brief overview of the rules
|
||||||
|
related to the test and a list of those rules. Expand a rule to see its description, remediation and
|
||||||
|
more details about resources flagged. Each flagged resource has a path so you can easily locate
|
||||||
|
them in the cloud and change the value that is deemed insecure.
|
||||||
|
|
||||||
|
![Open ScoutSuite rule](/images/reference/zero-trust/scoutsuite_report_rule.png
|
||||||
|
"Successful setup indicator")
|
|
@ -11,6 +11,8 @@ weight: 1
|
||||||
Want to assess your progress in achieving a Zero Trust network? The Infection Monkey can automatically evaluate your readiness across the different
|
Want to assess your progress in achieving a Zero Trust network? The Infection Monkey can automatically evaluate your readiness across the different
|
||||||
[Zero Trust Extended Framework](https://www.forrester.com/report/The+Zero+Trust+eXtended+ZTX+Ecosystem/-/E-RES137210) principles.
|
[Zero Trust Extended Framework](https://www.forrester.com/report/The+Zero+Trust+eXtended+ZTX+Ecosystem/-/E-RES137210) principles.
|
||||||
|
|
||||||
|
You can additionally scan your cloud infrastructure's compliance to ZeroTrust principles using [ScoutSuite integration.](/reference/zero-trust/scoutsuite)
|
||||||
|
|
||||||
## Configuration
|
## Configuration
|
||||||
|
|
||||||
- **Exploits -> Credentials** This configuration value will be used for brute-forcing. The Infection Monkey uses the most popular default passwords and usernames, but feel free to adjust it according to the default passwords common in your network. Keep in mind a longer list means longer scanning times.
|
- **Exploits -> Credentials** This configuration value will be used for brute-forcing. The Infection Monkey uses the most popular default passwords and usernames, but feel free to adjust it according to the default passwords common in your network. Keep in mind a longer list means longer scanning times.
|
||||||
|
|
Binary file not shown.
After Width: | Height: | Size: 48 KiB |
Binary file not shown.
After Width: | Height: | Size: 116 KiB |
Loading…
Reference in New Issue