Control: 1.22 Ensure access to AWSCloudShellFullAccess is restricted
Description
AWS CloudShell is a convenient way of running CLI commands against AWS services; a managed IAM policy ('AWSCloudShellFullAccess') provides full access to CloudShell, which allows file upload and download capability between a user's local system and the CloudShell environment. Within the CloudShell environment a user has sudo permissions, and can access the internet. So it is feasible to install file transfer software (for example) and move data from CloudShell to external internet servers.
Access to this policy should be restricted as it presents a potential channel for data exfiltration by malicious cloud admins that are given full permissions to the service. AWS documentation describes how to create a more restrictive IAM policy which denies file transfer permissions.
Remediation
From Console:
- Open the IAM console at https://console.aws.amazon.com/iam/.
- In the left pane, select Policies.
- Search for and select AWS CloudShellFullAccess.
- On the Entities attached tab, for each item, check the box and select Detach.
Usage
Run the control in your terminal:
powerpipe control run aws_compliance.control.cis_v300_1_22
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run aws_compliance.control.cis_v300_1_22 --share
SQL
This control uses a named query:
iam_user_group_role_cloudshell_fullaccess_restricted