Skip to main content

#ChaosDB / Vulnerability in the Azure Cosmos DB Jupyter Notebook

On August 21, 2021, an Azure CosmosDB vulnerability was reported for all Azure CosmosDB instances that are using Jupyter Notebooks. Using an active Jupyter Notebook an attacker was able to put his hands on the Azure CosmosDB keys that could be used to get access to the Azure CosmosDB.

Wizz.io describes in detail how somebody can use the vulnerability to steal the primary keys of the Azure CosmosDB instance. The vulnerability is serious because provides full access to Azure CosmosDB instance, including the data itself. 
Microsoft Security Response Center provided a response to this vulnerability, including what were the actions that were taken by the Azure team to mitigate the problem.

You can find below key facts that we need to be aware when you talk about #ChaosDB

  • If you did not receive a notification over email or from Azure Portal you were not affected 
  • Until now Microsoft was not able to identify CosmosDB customers data that were accessed using this vulnerability by 3rd parties or security researches
  • Using Azure Diagnostic Logs you can identify all IPs that access the Azure CosmosDB, including the unusual ones. 
  • There is no way for a customer to know if their Jupyter Notebook integration with Azure CosmosDB was enabled. You can open a ticket to the Microsoft team to find out if the feature was enabled for your account. 
  • Microsoft notified over email and Azure Portal all customers that were affected by the vulnerability
  • The feature was disabled for all customers once the vulnerability was confirmed. 
  • If you activate the functionality, but you don't use it, it will be disabled automatically, as for other festures of Azure
  • The vulnerability existing only for Azure CosmosDB customers that were using Jupyter Notebook or created an Azure CosmosDB instance between 7-13 August 2021
  • A part of Azure Cosmos DB Jupyter notebooks features is in public preview. In general, customers are not using cloud services that are in public preview for production systems. 
What your team should do in the future:
  1. Establish a key/token rotation policy for all cloud and non-cloud resources where access is based on a key or token.
  2. Activate and use Azure Diagnostic Logs and Azure Defender to identify and spot unusual IPs that access your systems. 
    1. Azure Security Center - Alerts for Azure Cosmos DB
    2. Advanced Threat Protection for Azure Cosmos DB
  3. Don't use in production private and public preview services and features of cloud vendors.
  4. Review and invest in security best practices recommended by Azure CAF and AWS CAF (Cloud Adoption Framework), Azure WAF and AWS WAF (Well-Architecture Framework).
  5. Cloud governance is important, don't ignore it and invest in it.

Comments

Popular posts from this blog

Why Database Modernization Matters for AI

  When companies transition to the cloud, they typically begin with applications and virtual machines, which is often the easier part of the process. The actual complexity arises later when databases are moved. To save time and effort, cloud adoption is more of a cloud migration in an IaaS manner, fulfilling current, but not future needs. Even organisations that are already in the cloud find that their databases, although “migrated,” are not genuinely modernised. This disparity becomes particularly evident when they begin to explore AI technologies. Understanding Modernisation Beyond Migration Database modernisation is distinct from merely relocating an outdated database to Azure. It's about making your data layer ready for future needs, like automation, real-time analytics, and AI capabilities. AI needs high throughput, which can be achieved using native DB cloud capabilities. When your database runs in a traditional setup (even hosted in the cloud), in that case, you will enc...

Cloud Myths: Migrating to the cloud is quick and easy (Pill 2 of 5 / Cloud Pills)

The idea that migration to the cloud is simple, straightforward and rapid is a wrong assumption. It’s a common misconception of business stakeholders that generates delays, budget overruns and technical dept. A migration requires laborious planning, technical expertise and a rigorous process.  Migrations, especially cloud migrations, are not one-size-fits-all journeys. One of the most critical steps is under evaluation, under budget and under consideration. The evaluation phase, where existing infrastructure, applications, database, network and the end-to-end estate are evaluated and mapped to a cloud strategy, is crucial to ensure the success of cloud migration. Additional factors such as security, compliance, and system dependencies increase the complexity of cloud migration.  A misconception regarding lift-and-shits is that they are fast and cheap. Moving applications to the cloud without changes does not provide the capability to optimise costs and performance, leading to ...

Cloud Myths: Cloud is Cheaper (Pill 1 of 5 / Cloud Pills)

Cloud Myths: Cloud is Cheaper (Pill 1 of 5 / Cloud Pills) The idea that moving to the cloud reduces the costs is a common misconception. The cloud infrastructure provides flexibility, scalability, and better CAPEX, but it does not guarantee lower costs without proper optimisation and management of the cloud services and infrastructure. Idle and unused resources, overprovisioning, oversize databases, and unnecessary data transfer can increase running costs. The regional pricing mode, multi-cloud complexity, and cost variety add extra complexity to the cost function. Cloud adoption without a cost governance strategy can result in unexpected expenses. Improper usage, combined with a pay-as-you-go model, can result in a nightmare for business stakeholders who cannot track and manage the monthly costs. Cloud-native services such as AI services, managed databases, and analytics platforms are powerful, provide out-of-the-shelve capabilities, and increase business agility and innovation. H...