- BOLA/IDOR op API + token audience verkeerd gescoped.
- Chain: low-priv → privilege escalation → export van klantdata.
- Fix: authZ checks centraliseren + resource-level policies + tests.
GEANONIMISEERDE ENGAGEMENTS
Case studies
Voorbeeld-cases met focus op attack chains, bewijs en remediation. Details zijn bewust geanonimiseerd.
- Secrets in CI logs + permissive IAM policies.
- Chain: key reuse → role assumption → access tot prod data store.
- Fix: short-lived creds, least-priv IAM, secret scanning, guardrails.
- Misconfig + weak delegation leidde tot privilege escalation.
- Chain: foothold → ticket abuse → DC admin (met bewijs, geen impact).
- Fix: hardening GPO’s, tiering model, detection tuning, patch cadence.
- Over-permissive deploy token + missing branch protections.
- Chain: PR abuse → pipeline secrets → attempted artifact modification (stop op RoE).
- Fix: signed builds, protected environments, least-priv tokens, approvals.