Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
13 changes: 13 additions & 0 deletions experiments/credential_access_app_secrets.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
experiments:
- metadata:
name: credential-access-app-secrets
type: credential_access_container_secrets
namespace: default
parameters:
config_map_check: true
pod_env_check: true
env:
- env_key: AWS_ACCESS_KEY_ID
env_value: fake-sdfgjfgskiowndskdlfksl
- env_key: AWS_ACCESS_KEY_SECRET
env_value: fake-dfhskssgdjfgdIO
12 changes: 6 additions & 6 deletions internal/categories/categories.go
Original file line number Diff line number Diff line change
Expand Up @@ -135,12 +135,12 @@ func init() {
ConnectFromProxyServer: mitreEntry{"TA0005", "Defense Evasion", "Connect From Proxy Server"},
},
Credentials{
ListK8sSecrets: mitreEntry{"TA0006", "Credentials", "List K8s Secrets"},
MountServicePrincipal: mitreEntry{"TA0006", "Credentials", "Mount Service Principal"},
AccessContainerServiceAccount: mitreEntry{"TA0006", "Credentials", "Access Container Service Account"},
ApplicationCredentialsInConfigurationFiles: mitreEntry{"TA0006", "Credentials", "Application Credentials In Configuration Files"},
AccessManagedIdentityCredentials: mitreEntry{"TA0006", "Credentials", "Access Managed Identity Credentials"},
MaliciousAdmissionController: mitreEntry{"TA0006", "Credentials", "Malicious Admission Controller"},
ListK8sSecrets: mitreEntry{"TA0006", "Credential Access", "List K8s Secrets"},
MountServicePrincipal: mitreEntry{"TA0006", "Credential Access", "Mount Service Principal"},
AccessContainerServiceAccount: mitreEntry{"TA0006", "Credential Access", "Access Container Service Account"},
ApplicationCredentialsInConfigurationFiles: mitreEntry{"TA0006", "Credential Access", "Application Credentials In Configuration Files"},
AccessManagedIdentityCredentials: mitreEntry{"TA0006", "Credential Access", "Access Managed Identity Credentials"},
MaliciousAdmissionController: mitreEntry{"TA0006", "Credential Access", "Malicious Admission Controller"},
},
Discovery{
AccessTheK8sApiServer: mitreEntry{"TA0007", "Discovery", "Access The K8s API Server"},
Expand Down
4 changes: 2 additions & 2 deletions internal/experiments/experiments_cluster_admin_binding.go
Original file line number Diff line number Diff line change
Expand Up @@ -151,9 +151,9 @@ func (p *ClusterAdminBindingExperimentConfig) Verify(ctx context.Context, client
v := verifier.New(
config.Metadata.Name,
config.Description(),
config.Technique(),
config.Tactic(),
config.Framework(),
config.Tactic(),
config.Technique(),
)

listOptions := metav1.ListOptions{
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,234 @@
/*
Copyright 2023 Operant AI
*/
package experiments

import (
"context"
"fmt"
"github.com/operantai/secops-chaos/internal/categories"
"github.com/operantai/secops-chaos/internal/verifier"
"gopkg.in/yaml.v3"
appsv1 "k8s.io/api/apps/v1"
corev1 "k8s.io/api/core/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/client-go/kubernetes"
"k8s.io/utils/pointer"
)

type ContainerSecretsExperimentConfig struct {
Metadata ExperimentMetadata `yaml:"metadata"`
Parameters ContainerSecrets `yaml:"parameters"`
}

type ContainerSecrets struct {
ConfigMapCheck bool `yaml:"config_map_check"`
PodEnvCheck bool `yaml:"pod_env_check"`
Env []ContainerSecretsEnv `yaml:"env"`
}

type ContainerSecretsEnv struct {
EnvKey string `yaml:"env_key"`
EnvValue string `yaml:"env_value"`
}

func (p *ContainerSecretsExperimentConfig) Type() string {
return "credential_access_container_secrets"
}

func (p *ContainerSecretsExperimentConfig) Description() string {
return "This experiment attempts to add secrets to a config map and within a container's environment variables"
}

func (p *ContainerSecretsExperimentConfig) Technique() string {
return categories.MITRE.Credentials.ApplicationCredentialsInConfigurationFiles.Technique
}

func (p *ContainerSecretsExperimentConfig) Tactic() string {
return categories.MITRE.Credentials.ApplicationCredentialsInConfigurationFiles.Tactic
}

func (p *ContainerSecretsExperimentConfig) Framework() string {
return string(categories.Mitre)
}

func (p *ContainerSecretsExperimentConfig) Run(ctx context.Context, client *kubernetes.Clientset, experimentConfig *ExperimentConfig) error {
var containerSecretsExperimentConfig ContainerSecretsExperimentConfig
yamlObj, _ := yaml.Marshal(experimentConfig)
err := yaml.Unmarshal(yamlObj, &containerSecretsExperimentConfig)
if err != nil {
return err
}
params := containerSecretsExperimentConfig.Parameters
deployment := &appsv1.Deployment{
ObjectMeta: metav1.ObjectMeta{
Name: containerSecretsExperimentConfig.Metadata.Name,
},
Spec: appsv1.DeploymentSpec{
Replicas: pointer.Int32(1),
Selector: &metav1.LabelSelector{
MatchLabels: map[string]string{
"app": containerSecretsExperimentConfig.Metadata.Name,
},
},
Template: corev1.PodTemplateSpec{
ObjectMeta: metav1.ObjectMeta{
Labels: map[string]string{
"experiment": containerSecretsExperimentConfig.Metadata.Name,
"app": containerSecretsExperimentConfig.Metadata.Name,
},
},
Spec: corev1.PodSpec{
Containers: []corev1.Container{
{
Name: containerSecretsExperimentConfig.Metadata.Name,
Image: "alpine:latest",
ImagePullPolicy: corev1.PullAlways,
Command: []string{
"sh",
"-c",
"while true; do :; done",
},
Ports: []corev1.ContainerPort{
{
ContainerPort: 4000,
},
},
},
},
},
},
},
}
configMap := &corev1.ConfigMap{
ObjectMeta: metav1.ObjectMeta{
Name: containerSecretsExperimentConfig.Metadata.Name,
Labels: map[string]string{
"app": containerSecretsExperimentConfig.Metadata.Name,
"experiment": containerSecretsExperimentConfig.Metadata.Name,
},
},
}
configMap.Data = map[string]string{}
for _, item := range params.Env {
deployment.Spec.Template.Spec.Containers[0].Env = append(deployment.Spec.Template.Spec.Containers[0].Env, corev1.EnvVar{
Name: item.EnvKey,
Value: item.EnvValue,
})
configMap.Data[item.EnvKey] = item.EnvValue
}
if params.PodEnvCheck {
_, err = client.AppsV1().Deployments(containerSecretsExperimentConfig.Metadata.Namespace).Create(ctx, deployment, metav1.CreateOptions{})
if err != nil {
return err
}
}
if params.ConfigMapCheck {
_, err = client.CoreV1().ConfigMaps(containerSecretsExperimentConfig.Metadata.Namespace).Create(ctx, configMap, metav1.CreateOptions{})
return err
}
return nil
}

func (p *ContainerSecretsExperimentConfig) Verify(ctx context.Context, client *kubernetes.Clientset, experimentConfig *ExperimentConfig) (*verifier.Outcome, error) {
var containerSecretsExperimentConfig ContainerSecretsExperimentConfig
yamlObj, _ := yaml.Marshal(experimentConfig)
err := yaml.Unmarshal(yamlObj, &containerSecretsExperimentConfig)
if err != nil {
return nil, err
}
params := containerSecretsExperimentConfig.Parameters
v := verifier.New(
containerSecretsExperimentConfig.Metadata.Name,
containerSecretsExperimentConfig.Description(),
containerSecretsExperimentConfig.Framework(),
containerSecretsExperimentConfig.Tactic(),
containerSecretsExperimentConfig.Technique(),
)
listOptions := metav1.ListOptions{
LabelSelector: fmt.Sprintf("app=%s", containerSecretsExperimentConfig.Metadata.Name),
}
if params.PodEnvCheck {
pods, err := client.CoreV1().Pods(containerSecretsExperimentConfig.Metadata.Namespace).List(ctx, listOptions)
if err != nil {
return nil, err
}

if len(pods.Items) == 1 {
if checkPodForSecrets(pods.Items[0], params.Env) {
v.Success("PodEnvironmentHasSecrets")
} else {
v.Fail("PodEnvironmentHasSecrets")
}
}
}
if params.ConfigMapCheck {
configMaps, err := client.CoreV1().ConfigMaps(containerSecretsExperimentConfig.Metadata.Namespace).List(ctx, listOptions)
if err != nil {
return nil, err
}
if len(configMaps.Items) == 1 {
if checkConfigMapForSecrets(configMaps.Items[0], params.Env) {
v.Success("ConfigMapHasSecrets")
} else {
v.Fail("ConfigMapHasSecrets")
}
}
}
return v.GetOutcome(), nil
}

func checkPodForSecrets(pod corev1.Pod, envTest []ContainerSecretsEnv) bool {
if pod.Status.Phase == "Running" && pod.Spec.Containers != nil && len(pod.Spec.Containers) > 0 {
podEnv := pod.Spec.Containers[0].Env
for _, item := range podEnv {
for _, envItem := range envTest {
if item.Name == envItem.EnvKey {
return true
}
if item.Value == envItem.EnvValue {
return true
}
}
}
}
return false
}

func checkConfigMapForSecrets(configMap corev1.ConfigMap, envTest []ContainerSecretsEnv) bool {
if configMap.Data != nil {
cmMap := configMap.Data
for k, v := range cmMap {
for _, envItem := range envTest {
if k == envItem.EnvKey {
return true
}
if v == envItem.EnvValue {
return true
}
}
}
}
return false
}

func (p *ContainerSecretsExperimentConfig) Cleanup(ctx context.Context, client *kubernetes.Clientset, experimentConfig *ExperimentConfig) error {
var containerSecretsExperimentConfig ContainerSecretsExperimentConfig
yamlObj, _ := yaml.Marshal(experimentConfig)
err := yaml.Unmarshal(yamlObj, &containerSecretsExperimentConfig)
if err != nil {
return err
}
params := containerSecretsExperimentConfig.Parameters
if params.PodEnvCheck {
err = client.AppsV1().Deployments(containerSecretsExperimentConfig.Metadata.Namespace).Delete(ctx, containerSecretsExperimentConfig.Metadata.Name, metav1.DeleteOptions{})

if err != nil {
return err
}
}
if params.ConfigMapCheck {
return client.CoreV1().ConfigMaps(containerSecretsExperimentConfig.Metadata.Namespace).Delete(ctx, containerSecretsExperimentConfig.Metadata.Name, metav1.DeleteOptions{})
}
return nil
}
Loading