{"id":6648,"date":"2024-08-19T22:10:07","date_gmt":"2024-08-19T14:10:07","guid":{"rendered":"https:\/\/aict.nkust.edu.tw\/digitrans\/?p=6648"},"modified":"2024-08-22T22:28:55","modified_gmt":"2024-08-22T14:28:55","slug":"11%e8%90%ac%e7%b6%b2%e5%9f%9f%e4%b8%8d%e7%95%b6%e8%a8%ad%e5%ae%9a%ef%bc%8c%e6%8b%9b%e8%87%b4%e6%86%91%e8%ad%89%e9%81%ad%e7%ab%8a%e5%8f%8a%e9%a7%ad%e5%ae%a2%e5%8b%92%e7%b4%a2","status":"publish","type":"post","link":"https:\/\/aict.nkust.edu.tw\/digitrans\/?p=6648","title":{"rendered":"11\u842c\u7db2\u57df\u4e0d\u7576\u8a2d\u5b9a\uff0c\u62db\u81f4\u6191\u8b49\u906d\u7aca\u53ca\u99ed\u5ba2\u52d2\u7d22"},"content":{"rendered":"\n<p>2024-08-19 | \u6797\u598d\u6eb1<\/p>\n\n\n\n<p>Palo Alto Networks\u7814\u7a76\u4eba\u54e1\u63ed\u9732\uff0c\u96f2\u7aef\u61c9\u7528\u74b0\u5883\u8a2d\u5b9a\u4e0d\u7576\u5c0e\u81f4\u653b\u64ca\u8005\u5f97\u4ee5\u7aca\u53d6\u91cd\u8981\u8cc7\u6599\uff0c\u4e26\u5411\u53d7\u5bb3\u4f01\u696d\u52d2\u7d22\u7684\u653b\u64ca\u884c\u52d5\u3002<\/p>\n\n\n\n<p>Unite 24\u8cc7\u5b89\u7814\u7a76\u5c0f\u7d44\u6307\u51fa\uff0c\u9019\u6ce2\u653b\u64ca\u767c\u751f\u5728\u90e8\u7f72\u5e33\u865f\u71df\u904b\u54e1\uff08cloud operator\uff09\uff0c\u4e26\u555f\u7528\u6b0a\u9650\u904e\u65bc\u5bec\u9b06\u7684\u8eab\u5206\u9a57\u8b49\u7ba1\u7406\uff08Identity &amp; Authentication Management\uff0cIAM\uff09\u7684\u96f2\u7aef\u74b0\u5883\u3002\u7531\u65bc\u9019\u4e9b\u5e33\u865f\u71df\u904b\u54e1\u672a\u80fd\u9075\u5faa\u96f2\u7aef\u5b89\u5168\u6700\u4f73\u5be6\u4f5c\uff0c\u8b93\u99ed\u5ba2\u5f97\u4ee5\u53d6\u5f97\u5305\u542b\u654f\u611f\u8b8a\u9805\uff0c\u50cf\u662f\u9a57\u8b49\u6191\u8b49\u7684\u74b0\u5883\u8b8a\u9805\u6a94\uff08.env\uff09\u6a94\uff0c\u4e26\u9032\u884c\u591a\u7a2e\u624b\u6cd5\u5b58\u53d6\u3002.env\u6a94\u662f\u4e00\u7a2e\u8a2d\u5b9a\u6a94\uff0c\u5141\u8a31\u7528\u6236\u5b9a\u7fa9\u61c9\u7528\u7a0b\u5f0f\u6216\u5e73\u81fa\u4f7f\u7528\u7684\u914d\u7f6e\u8b8a\u9805\u3002\u9019\u4e9b\u6a94\u6848\u5e38\u5305\u542b\u654f\u611f\u8cc7\u8a0a\uff0c\u50cf\u662f\u5b58\u53d6\u91d1\u9470\u3001\u8edf\u9ad4\u5373\u670d\u52d9\uff08Software-as-a-service\uff0cSaaS\uff09API\u91d1\u9470\u3001\u548c\u8cc7\u6599\u5eab\u767b\u5165\u8cc7\u8a0a\u3002<\/p>\n\n\n\n<p>\u5728\u7814\u7a76\u4eba\u54e1\u89c0\u5bdf\u5230\u7684\u884c\u52d5\u4e2d\uff0c\u653b\u64ca\u8005\u5728\u591a\u500bAmazon Web Services\uff08AWS\uff09\u8a2d\u7acb\u653b\u64ca\u57fa\u790e\u67b6\u69cb\uff0c\u5148\u6383\u7784\u7db2\u969b\u7db2\u8def\u4ee5\u627e\u5c0b\u516c\u958b\u66dd\u96aa\u7684bucket\uff0c\u518d\u6feb\u7528\u5176\u5916\u6d29\u7684\u74b0\u5883\u8b8a\u9805\u3002\u9019\u6ce2\u653b\u64ca\u4e2d\uff0c11\u842c\u500b\u7db2\u57df\u6210\u70ba\u9396\u5b9a\u5c0d\u8c61\uff0c\u6700\u5f8c\u53d6\u5f979\u842c\u591a\u500b\u7368\u7279\u7684\u8b8a\u9805\u3002\u9019\u4e9b\u8b8a\u9805\u4e2d\uff0c7,000\u500b\u5c6c\u65bc\u7d44\u7e54\u7684\u96f2\u7aef\u670d\u52d9\uff0c\u7814\u7a76\u4eba\u54e1\u4e26\u8ffd\u8e641,500\u500b\u8b8a\u9805\u662f\u4f86\u81ea\u793e\u4ea4\u5a92\u9ad4\u5e33\u865f\u3002\u7814\u7a76\u4eba\u54e1\u8aaa\uff0c\u53d7\u5bb3\u7d44\u7e54.env\u6a94\u6848\u4e4b\u6240\u4ee5\u5916\u6d29\uff0c\u4e26\u975e\u51fa\u65bc\u61c9\u7528\u7a0b\u5f0f\u6216\u670d\u52d9\u6f0f\u6d1e\uff0c\u6216\u662f\u7522\u54c1\u5ee0\u5546\u539f\u6709\u8a2d\u5b9a\u4e0d\u7576\uff0c\u800c\u662f\u53d7\u5bb3\u7d44\u7e54\u81ea\u5df1\u7684\u914d\u7f6e\u4e0d\u614e\uff0c\u50cf\u662f\u4e0d\u5e38\u8b8a\u66f4\u5bc6\u78bc\uff0c\u6216\u662f\u5ffd\u7565\u4f7f\u7528\u6700\u5c0f\u6b0a\u9650\u7684\u5b89\u5168\u539f\u5247\u3002<\/p>\n\n\n\n<p>\u7814\u7a76\u4eba\u54e1\u63ed\u9732\u7684\u90e8\u5206\u6848\u4f8b\u4e2d\uff0c\u653b\u64ca\u8005\u5229\u7528\u6578\u7a2e\u767c\u73fe\uff08discovery\uff09API\uff0c\u9396\u5b9aAWS\u670d\u52d9\u5305\u62ecIAM\u3001Security Token Service\uff08STS\uff09\u3001Simple Storage Service\uff08S3\uff09\u548cSimple Email Service\uff08SES\uff09\u767c\u51fa\u547c\u53eb\uff0c\u4e26\u7372\u5f97\u56de\u50b3AWS UserID\u3001AWS\u5e33\u865f\u865f\u78bc\u4ee5\u53caAmazon Resource Name\uff08ARN\uff09\u3002\u9032\u4e00\u6b65\u63a2\u67e5ARN\u6a94\uff0c\u9084\u53ef\u4ee5\u53d6\u5f97\u95dc\u806f\u7684AWS\u670d\u52d9\u3001\u4ee3\u7ba1AWS\u8cc7\u6e90\u7684\u96f2\u7aef\u5340\u57df\u3001AWS\u5e33\u865f\u53ca\u548cIAM\u6191\u8b49\u76f8\u95dc\u7684\u8cc7\u6e90\u578b\u614b\uff08\u5982\u4f7f\u7528\u8005\u6216\u7fa4\u7d44\uff09\u3002<\/p>\n\n\n\n<p>\u5229\u7528\u9019\u4e9b\u5230\u624b\u7684IAM\u6191\u8b49\u8cc7\u8a0a\uff0c\u7814\u7a76\u4eba\u54e1\u89c0\u5bdf\u5230\u653b\u64ca\u8005\u5c0dAWS EC2\u3001\u53caAWS Lambda\u670d\u52d9\u767c\u52d5\u6b0a\u9650\u64f4\u5f35\uff08escalation of privilege\uff09\u3001\u7a0b\u5f0f\u78bc\u57f7\u884c\uff08code execution\uff09\u653b\u64ca\u3002<\/p>\n\n\n\n<p>\u6700\u5f8c\uff0c\u653b\u64ca\u8005\u4e26\u5229\u7528\u96f2\u7aef\u5bb9\u5668\u5167\u7684\u8cc7\u6599\uff0c\u5411\u53d7\u5bb3\u7d44\u7e54\u52d2\u8d16\u3002\u7814\u7a76\u4eba\u54e1\u5206\u6790\uff0c\u99ed\u5ba2\u7528\u4ee5\u52d2\u7d22\u53d7\u5bb3\u7d44\u7e54\u7684\u65b9\u6cd5\u5305\u62ec\u5229\u7528\u6d0b\u8471\u8def\u7531\u5668\uff08Tor\uff09\u7db2\u8def\u57f7\u884c\u5075\u5bdf\u548c\u521d\u59cb\u7684\u5b58\u53d6\uff0c\u5229\u7528VPN\u9054\u6210\u6a6b\u5411\u79fb\u52d5\u548c\u8cc7\u6599\u7aca\u53d6\uff0c\u518d\u4f7f\u7528\u865b\u64ec\u79c1\u6709\u7db2\u8def\uff08VPS\uff09\u7aef\u9ede\u9032\u884c\u5176\u4ed6\u64cd\u4f5c\u3002\u9019\u6ce2\u653b\u64ca\u5b8c\u5168\u6c92\u7528\u5230\u52a0\u5bc6\uff0c\u800c\u662f\u7aca\u5f97\u8cc7\u6599\u5f8c\u518d\u628a\u52d2\u7d22\u8a0a\u606f\u7559\u5728\u53d7\u5bb3\u8005\u96f2\u7aef\u5bb9\u5668\u5167\u3002<\/p>\n\n\n\n<p>\u5f9e\u88ab\u5bb3\u7db2\u57df\u6578\u91cf\u4e4b\u5927\uff0c\u7814\u7a76\u4eba\u54e1\u5224\u65b7\u99ed\u5ba2\u662f\u5229\u7528\u81ea\u52d5\u5316\u624b\u6cd5\u57f7\u884c\u653b\u64ca\uff0c\u4ed6\u5011\u4e5f\u6839\u64da\u624b\u6cd5\u5224\u65b7\uff0c\u767c\u52d5\u653b\u64ca\u7684\u662f\u4e00\u7fa4\u7cbe\u65bc\u96f2\u7aef\u67b6\u69cb\u6d41\u7a0b\u53ca\u624b\u6cd5\u7684\u99ed\u5ba2\u3002<\/p>\n\n\n\n<p>Palo Alto Networks\u5718\u968a\u4e26\u672a\u8aaa\u660e\u9019\u6ce2\u653b\u64ca\u662f\u7531\u8ab0\u767c\u52d5\uff0c\u53ea\u8aaa\u901a\u5831AWS\u5f8c\uff0cAWS\u5df2\u89e3\u6c7a\u7528\u6236bucket\u66dd\u9732\u5728\u516c\u958b\u7db2\u969b\u7db2\u8def\u7684\u554f\u984c\u3002\u8a72\u516c\u53f8\u4e26\u5efa\u8b70\u7528\u6236\u4ee5\u9632\u706b\u7246\u3001DNS\u5b89\u5168\u3001URL\u904e\u6ffe\u3001\u4ee5\u53caIAM\u65b9\u6848\u4f86\u5f37\u5316\u96f2\u7aef\u5b89\u5168\u9632\u8b77\u3002<\/p>\n\n\n\n<p>\u8cc7\u6599\u4f86\u6e90:<a href=\"https:\/\/www.ithome.com.tw\/news\/164545\">https:\/\/www.ithome.com.tw\/news\/164545<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>2024-08-19 | \u6797\u598d\u6eb1 Palo Alto Networks\u7814\u7a76\u4eba\u54e1\u63ed\u9732\uff0c\u96f2\u7aef\u61c9\u7528\u74b0\u5883\u8a2d\u5b9a\u4e0d\u7576\u5c0e\u81f4\u653b\u64ca\u8005\u5f97\u4ee5\u7aca\u53d6\u91cd\u8981\u8cc7\u6599\uff0c\u4e26\u5411\u53d7\u5bb3\u4f01\u696d\u52d2\u7d22\u7684\u653b\u64ca\u884c\u52d5\u3002 Unite 24\u8cc7&hellip;<\/p>\n","protected":false},"author":9,"featured_media":6649,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[352],"tags":[204],"class_list":["post-6648","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-information-security","tag-204"],"gutentor_comment":0,"jetpack_featured_media_url":"https:\/\/i0.wp.com\/aict.nkust.edu.tw\/digitrans\/wp-content\/uploads\/2024\/08\/0819-threat_actor-palo_alto_networks.jpg?fit=960%2C420&ssl=1","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/posts\/6648","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6648"}],"version-history":[{"count":1,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/posts\/6648\/revisions"}],"predecessor-version":[{"id":6650,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/posts\/6648\/revisions\/6650"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/media\/6649"}],"wp:attachment":[{"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6648"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6648"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6648"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}