Pillaging Keys, Secrets and Certificates from Key Vaults
Pillaging keys, secrets, and certificates from Key Vaults
Explanation
Azure Key Vault is a service for managing application secrets, keys, and certificates in the Azure platform. The primary use case of Key Vault is to provide a secure way for application developers to centrally store sensitive information that their code needs to use at runtime without making that information part of the code. The sensitive information that is commonly stored in Key Vault could be tokens, passwords, data store connection strings, API keys, and other secret types.
Access to a Key Vault resource is controlled through two planes:
Management Plane
Data Plane
When reviewing key vaults, it is important to first look at the access policies to see if your current user account has rights to the vaults. If your user does not have rights to the vaults and you are attempting to stay under the radar, you may want to look at how you can access the vaults with other authorized security principals. In many cases, these rights are applied to automation Run as accounts (see later in this chapter), app registrations, and/or managed identities.
Here are some options for using alternative principals to access key vaults:
Exfiltrate secrets, keys and certificates in Key Vault
Last updated