Open achantavy opened 2 years ago
Further discussion on Slack: https://lyftoss.slack.com/archives/CTZUQL0KX/p1643754325800859
Summarized,
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs.
I've added more details in this one-pager: https://docs.google.com/document/d/1EOn9DBwubQhT_uk0WUO2Sx4WjSPR8mdBBbbWuheloc8/edit#. @SecPrez - can you have a look? :-)
Description:
Cartography already pulls s3 bucket policies and parses them with policyuniverse to determine internet exposure. We should expand on this feature to compute s3-specific permission relationships.
For background, S3 permissions can be defined by S3 ACLs, IAM policies, and S3 bucket policies (AWS ref).
We already surface S3 perms at the IAM level but we do not have visibility at S3 itself. Many orgs may choose to use only S3-specific perms so lack of this support in this cartography gives an incomplete picture.
Plan
I see this feature as needing 2 tasks.
It data model will look like this:
Testing for this feature can be done like this:
Help wanted! Please reach out if can work on this and we can help point in the right direction.
[optional Relevant Links:]