SkyWrapper
SkyWrapper helps to discover suspicious creation forms and uses of temporary tokens in AWS
Category | Identity & Access Management |
---|---|
GitHub Stars | 104 |
Last Commit | 4 years ago |
This page updated | a month ago |
Pricing Details | Free and open-source |
Target Audience | Security teams, AWS administrators, DevOps engineers. |
SkyWrapper is designed for managing and monitoring temporary security tokens in AWS environments, particularly those generated by the AWS Security Token Service (STS). This tool is designed to analyze the behavior of temporary tokens created within an AWS account, aiming to identify suspicious creation forms and uses that could indicate malicious activity.
Technically, SkyWrapper leverages AWS CloudTrail logs to track the creation and usage of temporary tokens. It parses these logs to identify tokens that may have been created by other temporary tokens, a common indicator of potential security breaches. The tool utilizes SQL queries to extract relevant information from the log data, such as the useridentity
property, which contains details about the token used for the action, including the access key ID. This allows SkyWrapper to trace the origin of suspicious tokens and detect misconfigured roles that could be exploited by attackers.
Operationally, SkyWrapper requires setup and configuration to integrate with CloudTrail and Amazon Athena for log analysis. It generates detailed reports, including an Excel sheet listing all active temporary tokens, suspected compromised access keys, and exploitable roles. These reports help security teams to quickly identify and mitigate potential security threats.
Key technical details include the tool's ability to handle large volumes of log data, though it may require significant computational resources and storage for extensive AWS environments. The tool is open-source and available on GitHub, allowing for community contributions and customizations. However, its effectiveness can be limited by the complexity of token hierarchies and the sheer volume of temporary tokens in large AWS deployments, making continuous monitoring and regular updates essential for optimal security posture.