Skip to content

east-african-techguy/DeploymentGrazor

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

18 Commits
 
 
 
 
 
 

Repository files navigation

DeploymentGrazor

Used to discover secrets in insecure Azure Deployments

Description

Azure deployment templates are static files stored in your tenant used to describe instantiated resources. When infrastructure as code tools such as bicep or terraform are used without either the @secure or "sensitive" decorators. This could result in secrets being exposed in clear text from deployment settings in Azure portal. To automate the process of discovering such secrets the DeploymentGrazor tool was created. This tool automates the AZT605.3 threat outlined on the Azure Threat Matrix

azure threat matrix

Versions Notes: Version 1.0 - 04-06-22

How to install the Azure PowerShell Module:

Guide for installing Azure "AZ" PowerShell Module: https://docs.microsoft.com/en-us/powershell/azure/install-az-ps

If local admin (PowerShell command): Install-Module -Name Az -AllowClobber Install-Module AzureAD -AllowClobber Else: Install-Module -Name Az -AllowClobber -Scope CurrentUser Install-Module AzureAD -AllowClobber -Scope CurrentUser

How to run Deployment Grazor:

  1. Download/sync locally the script file templateScan.ps1 and DeploymentGrazor.ps1
  2. Open PowerShell in the Deployment Grazor folder with the permission to run scripts: "powershell -ExecutionPolicy Bypass -NoProfile"
  3. Import-Module ./DeploymentGrazor.ps1
  4. Run Start-DeploymentScan
  5. Results of scan will be written in a txt file in the directory used to execute the script

About

Powershell script used to discover secrets in Azure deployment templates

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published