Permiso: https://permiso.io
Read our release blog: https://permiso.io/blog/introducing-cloud-console-cartographer-an-open-source-tool-to-help-security-team-easily-understand-log-events-generated-by-aws-console-use
Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. CloudTrail logs) and mapping them to the original user input actions in the management console UI for simplified analysis and explainability. This is extremely beneficial for defenders since numerous input actions in management console sessions can generate 10's and even many 100's of events originating from a single interactive click by the end user.
An additional capability that Cloud Console Cartographer provides defenders is the parsing of relevant data from all events related to each mapping. For example, when a user clicks on IAM->Users in the AWS Management Console and 100+ events are generated, this framework parses these logs and extracts all IAM users and long-lived access keys that were active at the time the logs were generated. This leads to point-in-time context of the environment and increased levels of visibility into what the user was seeing in the UI at the time of their activity.
An example of this IAM->Users scenario is shown below:
Lastly, what framework would be complete without some ASCII art:
Import-Module ./CloudConsoleCartographer.psd1
pwsh 6+
python3.11 python3 -m pip install -r ./UI/Code/requirements.txt
This tool offers a CLI (Command Line Interface) for processing cloud logs and simple displaying of results on the command line. More interactive analysis is better served using the Python UI Visualizer. Let's review its most common use cases:
Use the demo CloudTrail session stored in ./Demo to quickly see the power of the framework's aggregation and enhanced explainability, though as later examples will show logs can be piped into this framework's functions without requiring anything being written to disk.
First invoke Add-Signal
to apply Labels and to perform Signal/mapping evaluation. Then pass these results to one of many output functions.
Run command:
dir ./Demo/InputEvents.json | Add-Signal -Verbose | Show-EventSummary -Detail signal
Example 2 - Running the tool with CloudTrail logs queried directly from CloudTrail API and session-level CLI summary
aws cloudtrail lookup-events --lookup-attributes AttributeKey=AccessKeyId,AttributeValue=ASIAPERSHENDETJEMIQ1 | Add-Signal | Show-SessionSummary
cat ./Demo/InputEvents.json | Add-Signal | Show-SessionSummaryUI
To contribute to this project a new Signal definition must be added to ./Code/SignalDefinitions.ps1
(both LabelType
enum and Signal
class constructor) and corresponding Labels added to ./Code/AddLabel.ps1
. If Signal metadata requires substitutions (e.g. Summary property being updated with dynamic values extracted from mapped events) then this logic must be defined in ./Code/NewSignal.ps1
. Less common Signal overrides are defined in ./Code/AddSignal.ps1
.
New unit tests are required for new Signals or modifications to existing Signals. See below for more information.
New unit tests can be generated using New-UnitTest
function (e.g. dir ./Demo/InputEvents.json | New-UnitTest -Verbose
).
Testing against existing unit tests requires the Pester unit testing framework and can be executed using Invoke-Pester -TagFilter FullEvent
.