Cloud Console Cartographer: Mapping the Cloud for Defenders

Cloud Console Cartographer

Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. CloudTrail logs) and mapping them to the original user input actions in the management console UI for simplified analysis and explainability. This is extremely beneficial for defenders since numerous input actions in management console sessions can generate 10’s and even many 100’s of events originating from a single interactive click by the end user.

An additional capability that Cloud Console Cartographer provides defenders is the parsing of relevant data from all events related to each mapping. For example, when a user clicks on IAM->Users in the AWS Management Console and 100+ events are generated, this framework parses these logs and extracts all IAM users and long-lived access keys that were active at the time the logs were generated. This leads to point-in-time context of the environment and increased levels of visibility into what the user was seeing in the UI at the time of their activity.

An example of this IAM->Users scenario is shown below:

Lastly, what framework would be complete without some ASCII art:

Usage

 

This tool offers a CLI (Command Line Interface) for processing cloud logs and simple displaying of results on the command line. More interactive analysis is better served using the Python UI Visualizer. Let’s review its most common use cases:

Example 1 – Running the tool with local CloudTrail logs and event-level CLI summary

 

Use the demo CloudTrail session stored in ./Demo to quickly see the power of the framework’s aggregation and enhanced explainability, though as later examples will show logs can be piped into this framework’s functions without requiring anything being written to disk.

Note

 

First invoke Add-Signal to apply Labels and to perform Signal/mapping evaluation. Then pass these results to one of many output functions.

Run command:

dir ./Demo/InputEvents.json | Add-Signal -Verbose | Show-EventSummary -Detail signal

Example 2 – Running the tool with CloudTrail logs queried directly from CloudTrail API and session-level CLI summary

 

aws cloudtrail lookup-events –lookup-attributes AttributeKey=AccessKeyId,AttributeValue=ASIAPERSHENDETJEMIQ1 | Add-Signal | Show-SessionSummary

Example 3 – Using Python-based UI Visualizer

 

cat ./Demo/InputEvents.json | Add-Signal | Show-SessionSummaryUI

Install