Critical Azure Vulnerability
To help support our customers with their OMIGOD investigation and remediation efforts, InsightCloudSec now captures the Azure OMS extension version. As of September 18th, 2021, Microsoft released version 1.13.40 of the software agent which patches the vulnerability (CVE-2021-38647). The Insight
Compute Instance Running Vulnerable Version of OMSwill identify Azure Virtual Machines running a version of the OMS extension that is vulnerable to OMIGOD.
If you have questions or concerns reach out to us at [email protected].
Microsoft Azure is one of the world’s leading public cloud providers, offering a variety of cloud services. InsightCloudSec supports Microsoft Azure, Microsoft Azure Government (also termed GovCloud), and Microsoft Azure China. These three differ primarily in supported services and regions.
Follow the instructions included on this page for set up and make sure to create the prerequisite roles.
Azure AD Graph API Message
You may encounter a message on the Azure Portal that reads similar to:
"This application is using Azure AD Graph API, which is on a deprecation path. Starting June 30th, 2020 we will no longer add any new features to Azure AD Graph API. We strongly recommend that you upgrade your application to use Microsoft Graph API instead of Azure AD Graph API to access Azure Active Directory resources..."
Take note that Microsoft will continue to support the existing Azure AD Graph APIs until June 30th 2022. We are actively working on ensuring support for the new API while maintaining support for all existing functionality. If you have questions or concerns reach out to us at [email protected].
Before you get started with this setup, ensure that you have the following:
- A Microsoft Azure account with the appropriate admin permissions
- A InsightCloudSec account with Domain Admin permissions
- The appropriate Azure roles. You will need to verify that the prerequisite roles exist or that you have permissions to create/modify the required roles. Click here for details on Azure custom roles.
The major differences between Azure, Azure Government, and Azure China are supported services and regions, refer to the list of supported services for each one below.
Listed below are the supported services (and their components) and regions for Microsoft Azure public cloud.
Advisor App Services App Service plans Application gateways Azure Active Directory (Group, Service Principal, User) Azure Blob Storage Azure Cache for Redis Azure Cosmos DB Azure Database for PostgreSQL/MySQL/MariaDB Azure Databricks Azure Defender Azure Files Azure Synapse Analytics Batch (Accounts, Pools) Container instances Container registries (Container Image) Compute/Network Usage Limit Data factories Data Lake Storage Gen1 Diagnostic settings Disks DNS zones Event Hubs ExpressRoute circuits Firewall (Rule, Rule Collection) Front Doors Function App HDInsight clusters IP Groups Key vaults (Key, Secret) Kubernetes services Load balancers Log Analytics workspaces Logic apps Management groups NAT gateways Network interfaces Network security groups (Flow Logs, Security Rules) Peerings Public IP addresses Region Resource groups Role Definition Route tables (Route) Service Bus (Queue) Shared Image Gallery (Image Definition, Image Version) Dedicated SQL pools SQL Servers SSL Certificate Storage accounts Subscriptions Virtual machine (Dedicated Host, Image) Virtual machine scale sets Virtual networks (Private Endpoint, Service Endpoint, Service Endpoint Policy Subnet
australiacentral australiaeast australiasoutheast brazilsouth canadacentral canadaeast centralindia centralus eastasia eastus eastus2 francecentral japaneast japanwest koreacentral koreasouth northcentralus northeurope southafricanorth southcentralus southeastasia southindia uaenorth uksouth ukwest westcentralus westeurope westindia westus westus2
Listed below are the supported services and regions for Microsoft Azure Government cloud.
HDInsight Virtual Machines Azure Functions Web Apps Container Registry CosmosDB Azure Database for MySQL Azure Database for PostgreSQL Azure SQL Database Azure Cache For Redis Azure Active Directory Virtual Network Storage Managed Disks Enhanced tag visibility Log Analytics Workspace
usgovarizona usgoviowa usgovtexas usgovvirginia
Microsoft Azure China supports the same services as Microsoft Azure Public cloud. Supported regions for Microsoft Azure China are listed below.
chinaeast chinaeast2 chinanorth chinanorth2
You can add an Azure account into InsightCloudSec using the following steps.
1. Determined whether you are using regular Azure or Azure Government. Login to the Azure Dashboard (portal.azure.com).
2. Add a New Application Registration.
- Select "Azure Active Directory" from the navigation menu on the far left.
- Select "App registrations" under Azure Active Directory's Manage menu.
- Select "New registration".
3. Describe the New App Registration
- Enter a "Name" to denote that this app is used for InsightCloudSec, e.g., "InsightCloudSec Azure Test". By creating a specific InsightCloudSec app, you are then able to monitor all actions taken by InsightCloudSec. This facilitates troubleshooting, helping you understand what InsightCloudSec is doing versus what other apps are doing.
- Select the supported account type.
- Enter a "Redirect URI". This value is optional, but:
- May be required later for authentication.
- If entered, must follow specified URL format, e.g., "https://<name_of_site>"
4. Select "Register" to create the app registration.
In the Following Steps, You Will Need to Save...
- The Application (client) ID
- The Tenant (directory) ID
- The Key value
- The Subscription ID
You will copy each of these values outside of your browser, using whatever application you prefer to take notes, e.g., Notes, Google docs, etc.
5. Once you have registered your app, a preview panel opens. This panel shows an overview of your newly created app and displays both the Application ID and the Tenant ID. Copy both of these IDs to a safe location; you will need to use these values later.
6. Create and Save a Key for this Application.
- From the new application's Overview page, select "Certificates & secrets" from the Manage menu on the left-hand side.
- Under Client secrets, click "New client secret".
- Give your client secret a description.
- Set an expiration period for your secret.
- Click "Add". Your new client secret's values will be displayed on the Certificates & secrets page under Client secrets.
8. Copy the generated client secret key to your notes.
This is the only opportunity you have to copy this secret key.
9. Setup Permissions for this App Registration.
- From the application's Overview page, select "API permissions" from the Manage menu on the left-hand side.
- Select "Add a permission".
- Scroll down on the Request API permissions panel to locate and select "Azure Active Directory Graph".
10. Select "Application Permissions".
- Select the "Directory.Read.All" under the Directory heading.
- Click "Add permissions".
Grant Admin Consent
If you are not an admin, you'll need an admin to grant permissions by clicking on the "Grant admin consent ..." button and then confirming consent, shown in the screenshot below.
12. Assign a Role to this Subscription by navigating to the Subscriptions page.
- Select "All Services" from the navigation menu, then select "Subscriptions".
13. Identify the subscription with which you wish to associate your application; copy the subscription ID to your notes.
14. Click the desired subscription's name, then select "Access control (IAM)". From the Access control (IAM) panel, click "Add --> Add role assignment."
15. Select the role you wish to assign.
- Select the type of role, e.g., "Reader" in the example.
- Leave the Assign access to field as the default value.
- In the "Select" field, begin typing the name of the application you created earlier. Select that application once it appears, then click "Save".
InsightCloudSec recommends using the "Reader" role for read-only permissions to all resources. Note this role does not include the following additional permissions:
which is used to provide read/write access to enable harvesting of file share data.
For the permissions above, the
config/list/actionpermission provides visibility to determine if Web Apps are configured to require authentication and for to Serverless Functions to determine if the function is enabled/disabled. The caveat is that those permissions also provide access to any environment variables configured for WebApps, which may contain sensitive information.
For users that want to maintain "Reader" but include these permissions, we recommend using the "Reader Plus" Custom Role.
Access all of the roles and details on the Microsoft Azure - Custom Roles page.
To access read/write permissions, we recommend using the "Contributor" role. Contributor - Can create and manage all types of Azure resources but can’t grant access to others.
1. From your InsightCloudSec platform open the Clouds page from the navigation menu on the left.
2. Select "Add Cloud" in the upper right.
3. Determine whether you are connecting a regular Azure account, an Azure China account, or an Azure Government account and make sure to select the correct type. Click "See More" to display the full list of supported Cloud Service Providers.
4. Select an "Authentication Type", then provide the requisite Account Details. Click "Add Cloud".
5. Add any Badges you would like to this particular cloud account (also under Show Advanced). Badges provide a way to assign additional metadata about resources within the InsightCloudSec platform. They are key/value pairs which can be used for filtering and identifying resources from parent cloud account.
6. Confirm the addition of your Azure Cloud account.
Note: Your main cloud page should show your newly added Microsoft Azure cloud account.
- InsightCloudSec will begin harvesting immediately and the data should start to surface after five minutes or so, depending on the size of your cloud account.
Updated 4 days ago