Skip to content
@FogSecurity

Fog Security

Fog Security

Welcome to Fog Security, where we're working to prevent ransomware, bring clarity to cloud encryption, and build better data perimeters.

Resources:

YES3 Scanner

YES3 Scanner is an open source CLI python tool to scan your AWS Account's S3 configuration. This looks at both account and bucket level settings to check for potentially public access, ransomware protection configuration, and more settings such as bucket encryption.

Blog post: https://www.fogsecurity.io/blog/yes3-amazon-s3
Repository: https://github.com/FogSecurity/yes3-scanner

Finders Keypers

This open source CLI python tool helps determine blast radius and usage of AWS KMS Keys. Currently, this is difficult to do and requires custom tooling or incomplete and indirect searches through CloudTrail and IAM references in KMS key policies and KMS key grants. Finders Keypers is a tool built that checks via direct KMS Key to service resource analysis for usage of KMS keys for encryption.

Read more in our blog post here: https://www.fogsecurity.io/blog/introducing-finders-keypers-a-tool-to-discover-usage-and-blast-radius-of-encryption-keys-in-aws
Repository: https://github.com/FogSecurity/finders-keypers

AWS Default Encryption Tracker

This repository tracks default encryption settings across AWS resources. In our research of 50+ resources across 40+ AWS services, resources were found to either be unencrypted, default encrypted with AWS owned keys, or default encrypted with AWS managed keys.

Read more in our blog post here: https://www.fogsecurity.io/blog/are-my-aws-resources-encrypted-or-unencrypted-by-default
Repository: https://github.com/FogSecurity/aws-encryption-tracker

AWS IAM Reference and Resources

This repository contains parsed IAM references and tagging information to help with writing policies, tagging compliance, and more.

This includes:

  • Resources in AWS (ARN Formats)
    • All ARN Formats for Resources in AWS
    • Service Prefixes for AWS Services
  • Tagging
    • All 1000+ IAM Actions to tag resources in AWS
    • Listing of 1400+ AWS Resources that support tagging.

Repository: https://github.com/FogSecurity/aws-iam

IAM References for AWS Data Perimeters

This repository contains multiple IAM references including:

Programmatic Reference for AWS IAM Actions and Insights

Resources in this folder include downloads of the AWS Programmatic Reference for IAM Actions (which helps reduce scraping indirect Service Authorization Reference (SAR) Pages and other indirect sources). This includes historical information, actions with multiple categories (Write, Tagging, Permissions Management, List), differences between the SAR pages and the programmatic reference, actions that do not support resource scoping, and more.

Ransomware Prevention in AWS for S3 and KMS

These reference policies (including SCPs, RCPs, Bucket Policies, and more) help with preventing ransomware in Amazon S3 and KMS. These include policies to prevent against data access, data deletion, and data corruption (such as encryption with SSE-C, customer-provided encryption)

Organizational RCPs and SCPs

These reference Resource Control Policies (RCPs) and Service Control Policies (SCPs) help with creating data perimeters and improving cloud security within your AWS Organization at scale. These policies protect resources and can also limit potential actions taken by IAM principals within your AWS Organization and AWS accounts within.

IAM Actions to update encryption for existing AWS resources

This is helpful to help prevent against ransomware, as a cloud ransomware technique is to hold data hostage by changing encryption keys. This also aids in teams who need to update or manage encryption for existing AWS resources. This repository details the IAM actions required to update encryption for cloud resources that support encryption update and details which cloud resources do not support updating in place and thus need to be recreated.

Read more in our blog posts here:

Repository: https://github.com/FogSecurity/aws-data-perimeter-iam

AWS Size

This tool checks AWS resources for hard to manage and monitor limits such as managed policy character size limits. Hitting character limits may result in suboptimal security practices such as using wildcards or removing proper scoping in IAM resources. This helps by reporting resources that are close to the limit so teams have adequate time to fix their IAM resources. Current support includes 14+ resources across Organizations, IAM, S3, Secrets Manaager, Lambda, Parameter Store including IAM managed policies, S3 bucket policies, RCPs, SCPs, Lambda Environment Variables, and more.

Read more in our blog post here: https://www.fogsecurity.io/blog/aws-size-release
Repository: https://github.com/FogSecurity/aws-size

AWS Managed Keys Tracker

This tool checks which AWS Services support AWS Managed Keys, a type of KMS Encryption Key where the encryption key is managed by AWS, but exists only within the customer AWS Account. Additionally, the tool pulls the managed key policies and uploads them to a repository for reference.

Read more in our blog post here: https://www.fogsecurity.io/blog/encryption-aws-managed-kms-keys
Repository: https://github.com/FogSecurity/aws-managed-kms-keys

Popular repositories Loading

  1. yes3-scanner yes3-scanner Public

    YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection

    Python 90 6

  2. finders-keypers finders-keypers Public

    Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder

    Python 45 7

  3. aws-size aws-size Public

    Checks Hard to Find Size Limits and Usage for AWS such as AWS IAM

    Python 19

  4. aws-encryption-tracker aws-encryption-tracker Public

    Tracker for Encryption by Default for AWS Resources

    14 1

  5. aws-managed-kms-keys aws-managed-kms-keys Public

    AWS Managed KMS Keys and their Key Policies

    12

  6. aws-data-perimeter-iam aws-data-perimeter-iam Public

    Helpful IAM References for AWS Encryption Management and Data Perimeters

    12

Repositories

Showing 8 of 8 repositories

People

This organization has no public members. You must be a member to see who’s a part of this organization.

Top languages

Loading…

Most used topics

Loading…