-
Notifications
You must be signed in to change notification settings - Fork 274
New technique: invoke bedrock model in multiple regions #689
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pull Request Overview
This PR introduces a new attack technique that simulates an attacker enumerating Bedrock models across multiple AWS regions.
- Registers the new attack technique in the main registry.
- Implements the attack logic in a new Go file under the aws discovery folder.
Reviewed Changes
Copilot reviewed 2 out of 2 changed files in this pull request and generated no comments.
| File | Description |
|---|---|
| v2/internal/attacktechniques/main.go | Adds import for the new Bedrock enumeration technique. |
| v2/internal/attacktechniques/aws/discovery/bedrock-enumerate-models-multiple-regions/main.go | Implements the new attack technique with multi-region Bedrock model invocation. |
Comments suppressed due to low confidence (1)
v2/internal/attacktechniques/aws/discovery/bedrock-enumerate-models-multiple-regions/main.go:29
- There is an inconsistency between the usage of 'bedrock:InvokeModel' in the detonation section and 'InvokModel' in the detection section. Consider standardizing the naming to 'InvokeModel' to avoid potential confusion.
Through CloudTrail's <code>InvokModel</code> events.
|
|
||
| Detonation: | ||
|
|
||
| - Perform <code>bedrock:InvokeModel</code> to check if bedrock model is available. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I guess that's invoking it
v2/internal/attacktechniques/aws/discovery/bedrock-enumerate-models-multiple-regions/main.go
Outdated
Show resolved
Hide resolved
v2/internal/attacktechniques/aws/discovery/bedrock-enumerate-models-multiple-regions/main.go
Show resolved
Hide resolved
| `, | ||
| Platform: stratus.AWS, | ||
| IsIdempotent: true, | ||
| MitreAttackTactics: []mitreattack.Tactic{mitreattack.Discovery}, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Note to self:
- Map to AWS threat catalog
| } | ||
|
|
||
| func detonate(_ map[string]string, providers stratus.CloudProviders) error { | ||
| log.Printf("Get aws connection") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- remove debug code
v2/internal/attacktechniques/aws/discovery/bedrock-enumerate-models-multiple-regions/main.go
Show resolved
Hide resolved
* Add possibility to map attack techniques to arbitrary frameworks * Map AWS attack techniques to the Threat Techniques Catalog for AWS
What does this PR do?
Motivation
Simulates an attacker enumerating Bedrock models in multiple regions. Attackers frequently use this enumeration technique after having compromised an access key, to use it to answer their prompts.
Checklist