Do you think humans are doing a better job? Research shows that 95% of the permissions granted to users aren't used which creates huge problems and is a reason for spending millions in security tools. Why not use Slauth and other checks such as policy simulators to get tightened policies pre-deployed
verdverm|2 years ago
My concern is for those who blindly trust LLMs. Security posturing is not the place to be an early adopter of AI tools. You have to understand both IAM and system architecture to know if what the LLM is saying is correct, so where does that leave us?
I think they can be an extra pair of eyes, but not the driver. Still, there is a signal to noise problem that remains, due to the inherent hallucinations.
wg0|2 years ago
Similarly, LLMs used for SQL generation meant for business analytics is also a critical area where if numbers are wrong, it might lead to a business going bankrupt.
For Prototype, fun exercise, sure go all in.
DanielSlauth|2 years ago
thehucklecat|2 years ago
my policies are definitely too broad, but feels like I should be able to tighten them up without changing code. (just potentially breaking things if I get it wrong and go too tight).
lijok|2 years ago
These would be the "s3:*" and "Resources: *" scoped permissions I assume? I can't imagine users are explicitly typing out permissions, 95% of which are not relevant for the task.
> which creates huge problems
Such as? What is the material impact of a workflow or a user having too many permissions?
> and is a reason for spending millions in security tools
Are you claiming that overscoped IAM permissions alone are responsible for 1M+ security tooling bills in companies? Would you be willing to share information on which tools these are?
kkapelon|2 years ago
Security obviously https://en.wikipedia.org/wiki/Principle_of_least_privilege
rtkwe|2 years ago
At my job for example we don't have a separate support team for the ETL work we do so I have a lot of access I don't use unless things are breaking and then I can't wait for the access approval process to get added to database XXX or bucket YYY to diagnose what data has broken our processes.
jsploit|2 years ago
It'd potentially cost millions more to recover from a GPT-4 disaster.
milkshakes|2 years ago
jmathai|2 years ago
candiddevmike|2 years ago
verdverm|2 years ago
I wrote some code once to fetch all those preconfigured role permissions and then present them in a more digestible way