You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Implement initial EKS support and first attack techniques (#542)
* Implement initial EKS support and first attack technique (closes#374, #540)
* Add new EKS attack technique: backdoor EKS aws-auth configmap (closes#375)
* Bump AWS Go SDK
* Bump Go version from 1.18 to 1.19
* Update docs
* Replace io/ioutil with io due to the bump to Go 1.19
Uses the EKS Cluster Access Management to assign cluster administrator privileges to an IAM role. This allows the role to perform any action inside the Kubernetes cluster.
You can use the following CloudTrail events to identify when someone grants access to your EKS cluster:
46
+
47
+
-**CreateAccessEntry**, when someone creates an access entry for a principal (meaning it's the first this principal is granted privileges in the cluster)':
Through EKS API Server audit logs, by looking for changes to the aws-auth ConfigMap in the kube-system namespace. Here's what a relevant audit event looks like:
Stratus Red Team currently supports AWS, Azure, GCP and Kubernetes.
3
+
Stratus Red Team currently supports AWS, Azure, GCP, Kubernetes, and Amazon EKS.
4
4
See [Connecting to your cloud account](https://stratus-red-team.cloud/user-guide/getting-started/#connecting-to-your-cloud-account) for setup instructions.
Copy file name to clipboardExpand all lines: docs/user-guide/getting-started.md
+11-2
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
3
3
## Installation
4
4
5
-
Direct install (required Go 1.18+):
5
+
Direct install (required Go 1.19+):
6
6
7
7
```
8
8
go install -v github.com/datadog/stratus-red-team/v2/cmd/stratus@latest
@@ -94,7 +94,7 @@ For more information, see [Usage](./usage.md), [Examples](./examples.md) and the
94
94
95
95
## Connecting to your cloud account
96
96
97
-
Stratus Red Team currently supports AWS and Kubernetes.
97
+
Stratus Red Team currently supports AWS, Azure, Kubernetes, and Amazon EKS.
98
98
99
99
!!! warning
100
100
@@ -108,6 +108,15 @@ In order to use Stratus attack techniques against AWS, you need to be authentica
108
108
109
109
- Using static credentials in `~/.aws/config`, and setting your desired AWS profile using `export AWS_PROFILE=my-profile`
110
110
111
+
### EKS
112
+
113
+
Stratus Red Team does **not** create an EKS cluster for you. It assumes you're already authenticated to an EKS cluster.
114
+
115
+
To use Stratus attack techniques against Amazon EKS, you need to be authenticated against AWS, as described above. Stratus Red Team will use the current AWS credentials and Kubernetes context to interact with the EKS cluster. It will check that the Kubernetes cluster you're connected to is an EKS cluster, and refuse to run otherwise.
116
+
117
+
- Authenticate to AWS (for instance, using [`aws-vault`](https://github.com/99designs/aws-vault))
118
+
- Run `aws eks update-kubeconfig --name your-cluster-name --region your-region` to update your `~/.kube/config` file with the EKS cluster configuration
119
+
111
120
### Azure
112
121
113
122
- Use the [Azure CLI](https://docs.microsoft.com/en-us/cli/azure/install-azure-cli) to authenticate against your Azure tenant:
0 commit comments