âThere is very little info out,â said Kellman Meghu, chief technology officer of Canadian incident response firm DeepCove Cybersecurity, âbut this does sound bad. This is why I force all my users to use AWS Identity Center sign on. No IAM-generated keys, and admin accounts are only activated through a âbreak glassâ strategy, where two people are needed to authenticate.â
By âbreak glassâ strategy, Meghu said he meant that the AWS root/admin account that controls all of an organizationâs cloud infrastructure is stored outside of AWS on a system that requires authorization from both the CEO and CTO, via credentials and hardware tokens. This access generates an alert, so if there was an unauthorized attempt to sign in, the CEO and CTO would know.
âI personally live in constant fear of this sort of thing happeningâ he said. âI create multiple separate AWS accounts using the AWS Organizations feature so accounts are completely isolated from each other. For example, there can be a âdev ORGâ for testing with no real data, and a âuat ORGâ for user testing with some data, and a âprod ORGâ where no one is allowed. You can also break things down so different application types get their own Organizations, which limits lateral movement. Azure has similar setup and options, which are called Tenants.
