AWS Community Day Indonesia 2025 - Attack the Cloud Before Attackers Do Building Adversary Simulation Playbooks.pdf

myugan 99 views 43 slides Oct 26, 2025
Slide 1
Slide 1 of 57
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57

About This Presentation

Many cloud breaches come from simple mistakes like misconfigurations, overly broad permissions, or skipping breach simulations. Attackers use gaps like these to their advantage, abusing Cloud Service Provider (CSP) features to steal data, move between accounts, or stay hidden. In this session, we wi...


Slide Content

Attack the Cloud Before Attackers Do:
Building Adversary Simulation Playbooks
Muhammad Yuga Nugraha, Satria Ady Pradana

Who We Are
•DevSecOps Engineer at Practical DevSecOps.
•Not locked into any cloud vendor, I love working with any cloud.
•Speaker at PyCon APAC 2024, PyCon SG 25, AWS Community
Day Indonesia 2024, KCD Indonesia 2024, OpenInfraDays ID
2025, Cloud Village @ DEFCON 33.
M. Yuga Nugraha

Who We Are
•Adversarial Engineer at Grab.
•Community Leader of Reversing.ID.
•Malware analyst and developer in free time.
Satria Ady Pradana

Cloud Incidents - Uber Breach

Cloud Incidents - Capital One Breach

What is Red Team?
Simulating Tactics, Techniques, and Procedures (TTPs) used by adversaries or
threat actors within controlled environment to evaluate the security posture of the
organization.

Phases of Engagement

•Emulated attacks must be performed in repeatable, consumable and
actionable way.
•Predictable outcome and side effects.
•Action should improve detection.
Do it X times!

MITRE ATT&CK Cloud Matrix

DataDog - Cloud Security Atlas

So, where do we begin?

•Define scope and objectives
•Rules of engagement
•Prepare isolated test environment (use production)
•Monitor, document, and remediate
Getting Started

What about the tooling?

WARM
Spin up infrastructure
DETONATE
Execute the attack
REVERT
Revert to a detonatable state
CLEANUP
Remove all infrastructure
State Machine

Installation

Credential Access (5), Defense Evasion (7), Discovery (3), Execution (4), Exfiltration
(5), Impact (4), Lateral Movement (2), Persistence (10), Privilege Escalation (7)

Organised by platform and tactic using the following pattern.
PLATFORM [.] TACTIC [.] TECHNIQUE
Example: aws.credential-access.ec2-get-password-data
Attack Techniques

Case: Credential Access
https://attack.mitre.org/tactics/TA0006/

Warmup

Detonate

Malicious activity?

CloudTrail Events

Nice catch!

Cleanup

Case: Discovery
https://attack.mitre.org/tactics/TA0007/

Warmup

Detonate

Nice catch!

AWS CloudTrail
????

What happened?

Nice catch!
AWS Systems Manager

Nice catch!

No finding in GuardDuty, what happened?

Create a New Scenario

https://sonraisecurity.com/blog/sandboxed-to-compromised-new-research-exposes-
credential-exfiltration-paths-in-aws-code-interpreters/

Amazon Bedrock AgentCore Code Interpreter

•Create an S3 bucket with a sample customer data file (customer.csv).
•Create an IAM role with S3 read permissions for Bedrock Agent Core
service.
•Create a Bedrock Code Interpreter with the execution role.
aws.exfiltration.s3-bedrock - Warmup

•Start a Bedrock Code Interpreter session.
•Execute a command to query the EC2 instance metadata service (IMDS).
•Retrieve temporary security credentials from Bedrock Code Interpreter.
•These credentials can be used to access the S3 bucket and exfiltrate data
(GetObject, PutObject)
aws.exfiltration.s3-bedrock - Detonation

Register New Attack

Case: Exfiltration
https://attack.mitre.org/tactics/TA0010/

Warmup

Detonate

Thank you