Live Breaking News & Updates on Service principal

Stay updated with breaking news from Service principal. Get real-time updates on events, politics, business, and more. Visit us for reliable news and exclusive interviews.

Poster competition launched for World Met Day

KINGSTON, Jamaica - Meteorological (Met) Service of Jamaica has launched a poster competition to mark this year’s observance of World Meteorological Day, which is commemorated annually on March 23.
T...

Middlesex , Saint-ann , Jamaica , Lawrence-tavern , Saint-andrew , Evan-thompson , Jackie-spence-hemmings , Meteorological-met-service-of-jamaica , Head-of-the-met-service-climate-branch , Excelsior-high-school , International-meteorological-organization , World-meteorological-organization

Managed Identity Attack Paths, Part 3: Function Apps

Managed Identity Attack Paths, Part 3: Function Apps
securityboulevard.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from securityboulevard.com Daily Mail and Mail on Sunday newspapers.

Andy-robbins , Security-bloggers-network , Dangerous-privileges-granted-to-service-principals , Service-principals , Company-administrator , Specterops-team-members-on-medium , Service-principal-or-function-app , Service-principal , A-service-principal , Specterops-team-members , Managed-identity , Automation-accounts

Managed Identity Attack Paths, Part 2: Logic Apps

Intro and Prior WorkIn this three part blog series we are exploring attack paths that emerge out of Managed Identity assignments in three Azure services: Automation Accounts, Logic Apps, and Function Apps.In part 1 we looked at how attack paths emerge out of Automation Account configurations. In part 2 we are looking at Logic Apps.Managed Identity assignments are an extremely effective security control that prevent the accidental exposure of credentials by removing this requirement to store or use credentials in the first place. Instead of storing and sending credentials, Azure knows that your script is allowed to authenticate as a specific Service Principal.You should absolutely be using Managed Identity assignments in Azure instead of storing or accessing credentials.But Managed Identities introduce a new problem: they can quickly create identity-based attack paths in Azure that may lead to escalation of privilege opportunities. In this series we will explore how those attack paths emerge, how they can be practically abused by an attacker, and how we as defenders can discover, mitigate, and prevent the future emergence of those attack paths.Prior work involving abusing or exploiting Logic Apps:Josh Magri wrote all about various ways to abuse both Reader and Contributor level rights against a Logic App in August of 2021Josh Magri reported a serviceable privilege escalation vulnerability involving Logic Apps to MSRC in March of 2022.Christopher Brumm wrote a very good, very in-depth post all about the security considerations surrounding Logic Apps in February of 2021What are Logic Apps?Logic Apps are another Azure service falling under the general umbrella of “Azure Automation”. Admins can use Logic Apps to construct what are called “workflows”. Workflows are comprised of triggers and actions that occur as a result of those triggers.Here’s a very basic example. In this Logic App I’m using the visual designer to first define a trigger — an HTTP POST, in this example. When the Logic App receives a POST to that URL, it will then take the “name” input and return a body saying, “Hello, <name>!”We can test the workflow right here in the GUI. We’ll say that our name is “David” in the “Input” tab and submit the request:Then we’ll see the result, “Hello, David!” in the “Output” tab:Logic Apps of course allow for much more complex and powerful workflows than this, including workflows where the actions may need to authenticate to some other service to perform a privileged action. And that’s where Managed Identities and Service Principals enter the picture.Logic Apps and Service PrincipalsLogic Apps are great for automating tasks. But what if that task requires some sort of privilege to perform? For example, what if instead of saying “Hello, David!”, we want to grant David some Azure admin role?Enter Managed Identities. As discussed in the introduction of this blog post, Managed Identities are a fantastic way to securely, automatically authenticate as a service principal without needing to store or retrieve credentials. Enabling a Managed Identity for a Logic App couldn’t be easier. Just click “Identity” under “Account Settings” and toggle the “Status” option from “Off” to “On”, then click “Save”:Let’s start thinking of these things in the form of a graph and how the various objects fit into a hierarchy. Our Logic App, “MyExampleLogicApp”, has a Managed Identity assignment to the service principal whose object ID starts with “faf5c7…”:As you can see, the Logic App finds itself within the greater hierarchy of AzureRM and AzureAD. The Service Principal associated with the Logic App does not have any privileges by default. Let’s give this Service Principal some privileges and try to stay without the bounds of least privilege by giving it “Contributor” access on the subscription the Logic App resides in. This would let the Service Principal create and manage resources in this subscription:As configured, this setup doesn’t introduce any privilege escalation opportunities: if an attacker gains control of either the Service Principal or Logic App, they’re just stuck in a loop. Let’s flesh this environment out a bit more by adding another subscription and some more descendent objects, including a Function App in another resource group:Let’s also grant “My Cool Function App” an identity it can authenticate as, and this time we’re going to grant its associated Service Principal Global Admin (or understand that it can escalate itself to Global Admin):And now have have created a privilege escalation opportunity — if an attacker gains control of “MyExampleLogicApp” or its associated Service Principal, they will be able to escalate up to Global Administrator, gaining control of everything in the Azure environment:Abusing Logic App Managed Identity AssignmentsIf an attacker has sufficient privilege to create or edit an existing workflow, they can turn that into control of the Service Principal, gaining whatever privileges the Service Principal holds. These Azure role assignments allow for creating or editing an existing workflow:OwnerContributorLogic App ContributorAdditionally, the following privilege allows one to grant themselves any of the above role assignments against the Logic App:User Access AdministratorThere are several ways to tackle this problem, but for me the most straight-forward abuse is to extract a JSON Web Token (JWT) for the Service Principal, then use that JWT to authenticate as the Service Principal outside the scope of the Logic App. Using the Azure Portal GUI, we will modify an existing workflow to include the following action:This action will make a POST request to my evil attacker-controlled web server at 159.223.206.196:8000. That evil web server is running a Python SimpleHTTPServer which will simply print any headers received to the console. At the bottom of the action you can see that the action will attempt to authenticate to my evil server using the Logic App’s system-assigned managed identity.When the workflow runs, this action will get an MS Graph-scoped token for the Logic App’s Managed Identity, then include that token in the authorization header in the POST to my evil server:Now that we have this JWT we can authenticate to MS Graph as the Service Principal, gaining any privileges held by that Service Principal.PreventionThere are several steps you should take, as a defender, to ensure these attack paths do not exist in your Azure environment:Step 1: Audit and Remove Privileges Held by Service PrincipalsYour first step should be to find any service principals that have been granted the most dangerous privileges in Azure. Audit both the active and eligible assignments for the following AzureAD admin roles:Global AdministratorPrivileged Role AdministratorPrivileged Authentication AdministratorYou should also audit for any Service Principals that have been granted any of the following MS Graph app roles:RoleManagement.ReadWrite.DirectoryAppRoleAssignment.ReadWrite.AllIf any service principal has been granted any of the above roles in AzureAD or MS Graph, you should immediately investigate that service principal for existing signs of misuse. You should also remove those role assignments from the service principals, if possible.Step 2: Audit Privileges Held by Other PrincipalsUnfortunately you may not be able to easily or immediately remove privileges that have been granted to a service principal. Your next step then will be to limit the exposure of those highly privileged service principals by auditing the users, groups, and service principals that have been granted any of the following AzureAD admin roles:Application Administrator (including those scoped specifically to the Service Principal)Cloud Application Administrator (including those scoped specifically to the Service Principal)Directory Synchronization AccountsHybrid Identity AdministratorPartner Tier1 SupportPartner Tier2 SupportYou should also audit the explicit owners of service principals you identified in Step 1 that y

Andy-robbins , Security-bloggers-network , Dangerous-privileges-granted-to-service-principals , Service-principals , Company-administrator , Service-principal-or-logic-app , Service-principal-global-admin , Specterops-team-members-on-medium , Service-principal , A-service-principal , Specterops-team-members , Managed-identity

GitHub Actions Blog Series, Part 3: Deploying with Microsoft AKS

In my last blog post, we discussed the need for businesses to adopt distributed development and delivery models in order to bring value to their customers. With the advent of distributed organizations, companies have had to adapt to new ways of both developing and making products available to their consumers. Cloud technologies have come to the forefront in providing solutions that organizations can leverage in order to meet and drive consumer demand.

Security-team-server , Security-community-edition , Azure-service-details , Service-principal , Azure-kubernetes-service , Security-azure-kubernetes-service , Github-action , Github-actions , Contrast-security , Hub-action , Contrast-security-community-edition

NOBELIUM targeting delegated administrative privileges to facilitate broader attacks

NOBELIUM targeting delegated administrative privileges to facilitate broader attacks
microsoft.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from microsoft.com Daily Mail and Mail on Sunday newspapers.

United-states , Microsoft-threat-intelligence-center , Response-team , Exchange-admin-center , Activity-log-in-partner-center , Partner-center-apis , Check-the-partner-center-activity , Microsoft , Partner-center-activity-log-apis , Microsoft-partner-center , Service-principal

Kubernetes for Beginners Google Cloud, AWS & Azure

[center][img]https://abload.de/img/0076ccf8_mediumzwkfk.jpg[/img] MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Genre: eLearning | Language: English + srt | Duration: 137 lectures (13h 4m) | Size: 4 GB[/center][center]Kubernetes for Beginners - with Spring Boot Java Microservices - Pla...

Kubernetes-microservices , Google-stackdriver , Monitoring-istio-service , Friendly , A-resource-group , Service-discovery , Service-discovery-apis , A-clusterip-kubernetes-service-for-mysql-database , Istio-service , Kubernetes-service-discovery , Kubernetes-crash-course-for-java-developers , Virtual-services-for-istio

全国碳市场正式启动,看信托公司如何参与?


  一、 全国碳市场建设
  (一)全国碳市场主要要素
  2020 年 12月生态环境部审议通过《碳排放权交易管理办法(试行)》,并于 2021年 2月1日正式实施。《办法》对交易主体、交易标的、配额分配、覆盖范围、履约期等几大要素作了相关规定(具体见下表)。2021年开始,首批2225家电力企业将进入履约期。
  (二)全国碳市场交易规则
  2021年5月19日,生态环境部发布《碳排放权登记管理规则(试行)》、《碳排放权交易管理规则(试行)》和《碳排放权结算管理规则(试行)》,在碳排放权登记、交易和结算三方面搭建起具体框架,并明确暂时由湖北碳排放交易中心负责注册登记等相关工作,由上海环境能源交易所负责交易的相关工作。2021年6月22日,上海环境能源交易所发布《关于全国碳排放权交易相关事项的公告》,就不同类型交易的涨跌幅限制、交易时段等作出规定。全国碳市场将采用挂牌协议转让、大宗协议转让以及单向竞价三种交易方式(具体见下表);交易单位以每吨二氧化碳当量(tCO2e)申报,申报量最小变动为1 tCO2e,价格最小变动为0.01元;采用全额申报方式,即卖出交易产品的数量,不超过交易账户内额交易数量,买入交易产品的资金,不超过交易账户内可用资金。
  二、信托公司参与模式探讨
  从2014年爱建信托试水首单碳交易信托产品以来,目前行业内已有8家信托公司设立了9单相关产品(具体见下表)。总结来看,信托公司参与碳市场有以下三种模式:一是碳融资类信托。即信托公司以控排企业的碳配额或CCER为抵押/质押设立信托计划,向控排企业发放贷款;亦可设立买入返售信托计划,向控排企业购买碳资产同时约定在一定的期限内,信托计划再以约定的价格将碳资产回售给控排企业。前者类似于商业银行的碳资产抵押/质押贷款融资,后者类似于证券公司的碳资产售出回购业务。前期试点中多家商业银行均开展了此类业务,信托公司中兴业信托、中航信托也有所实践。
  以兴业信托为例,今年2月,兴业信托成立“兴业信托 利丰A016碳权1号集合资金信托计划”,将海峡股权交易中心碳排放权公开交易价格作为估价标准,通过受让福建三钢闽光(行情002110,

China , Hubei , Guangdong , Shanghai , Fujian , Service-principal , Start-see , Ministry-of-environment , Shanghai-union , Service-trust-sea , Trust-service

深度专访 | 金地推动轻资产联盟成立,共同赋能代建行业发展 ——凤凰网房产深圳

深度专访 | 金地推动轻资产联盟成立,共同赋能代建行业发展 ——凤凰网房产深圳
ifeng.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from ifeng.com Daily Mail and Mail on Sunday newspapers.

China , Phoenix , Arizona , United-states , Shenzhen , Guangdong , Service-principal , Service-it , Group-company , Technology-square , Shenzhen-start

逆势向上!威海在变局中开拓新局面_威海要闻_威海_齐鲁网

逆势向上!威海在变局中开拓新局面_威海要闻_威海_齐鲁网
iqilu.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from iqilu.com Daily Mail and Mail on Sunday newspapers.

Madagascar , Burkina-faso , Japan , United-states , United-kingdom , Congo , Vietnam , Republic-of , China , Tanzania , New-market , Suffolk