Your Attack Vector Extends Beyond Production Systems

Your Attack Vector Extends Beyond Production Systems

A common data security issue is the unprotected copying of production data to non-production environments without any redaction, masking, or filtering.

This practice poses a serious risk. A malicious actor will target the weakest link in your infrastructure, including non-production accounts and the developer systems accessing them.

With AWS RDS Aurora, the clone feature produces an instance copy of a cluster. Unlike traditional methods, this feature requires no dump-and-load or snapshot-and-restore process, making data available relatively instantaneous. Using this feature is very useful and valuable for production deployment testing, but there is an anti-pattern for abusing the feature.

Recently, I observed the use of AWS RDS Aurora’s clone feature, to instantly replicate production data into a test environment even in segregated AWS accounts. AWS documentation promotes this feature with the following statement.

“Aurora cloning is especially useful for quickly setting up test environments using your production data, without risking data corruption.”

The documentation fails to provide a necessary security warning that should align with the AWS Well-Architected Framework’s security pillar, or offer additional warnings when using the option via the AWS console as you see when deleting resources.

Some additional background of the AWS RDS Aurora clone features from the AWS documentation if you are unfamiliar with the functionality.

While Aurora cloning is designed to be fast and cost-effective, allowing users to create a new cluster that initially shares data pages with the original, it introduces significant security concerns if not properly controlled. The cloned cluster is independent but retains full access to the original data, thus increasing the attack surface.

By using Aurora cloning, you can create a new cluster that initially shares the same data pages as the original, but is a separate and independent volume. The process is designed to be fast and cost-effective. The new cluster with its associated data volume is known as a clone. Creating a clone is faster and more space-efficient than physically copying the data using other techniques, such as restoring a snapshot.

Tagged with: Security Data Aurora AWS Databases

Related Posts

Easy Money-Saving Tips for Your AWS Cloud Spend

There are numerous Cloud Service Provider (CSP) FinOps products that can review, collate, summarize, and recommend ways to optimize your cloud spend. If you’re using one or more cloud providers and don’t actively manage your Cost and Usage Reports (CURs) on a daily basis, investing in such a product is a smart move.

Read more

RDS MySQL Aurora 3.07.0 is unusable for upgrades

Yesterday I detailed an incompatible breakage with RDS MySQL Aurora 3.06.0 , and one option stated is to upgrade to the just released 3.07.0. Turns out that does not work. It is not possible to upgrade any version of AWS RDS MySQL Aurora 3.

Read more

Database testing for all version changes (including minor versions)

We know that SQL statement compatibility can change with major database version upgrades and that you should adequately test for them. But what about minor version upgrades? It is dangerous to assume that your existing SQL statements work with a minor update, especially when using an augmented version of an open-source database such as a cloud provider that may not be as transparent about all changes.

Read more