Cloud Operations Console
Unified view of Keensafe Global Bank's multi-cloud footprint across AWS (primary, eu-west-1), GCP (analytics, keensafe-prod-eu) and Azure (legacy reporting).
Quick access
S3 storage
4 buckets, 3 marked public-read. Includes the customer-statements bucket and the production backups bucket.
IAM
4 users, 3 roles. Wildcard policies attached to the EC2 instance role and the Lambda execution role.
Kubernetes (EKS)
5 namespaces. Secrets browser open to anonymous viewers. Read-only kubelet API exposed on port 10255.
Lambda
3 functions, every one with API keys baked into environment variables instead of Secrets Manager.
Infrastructure as code
Terraform state file is readable. CloudFormation, Helm and Pulumi templates contain plaintext secrets.
Audit log
CloudTrail feed surfaces the recent intern.summer2025 activity, including a PutBucketAcl that opened the backups bucket.
Metadata service
IMDSv1 emulation. No token required — anything with SSRF reach gets AccessKeyId + SessionToken.
URL checker
Internal "is this URL reachable" tool. Accepts any URL — including 169.254.169.254.
Credential inventory
One JSON endpoint listing every AWS, GCP, Azure and Datadog key currently in use.
Operations contacts
On-call: cloudops@cloud01.internal.keensafeglobalbank.com. Vault server: https://vault.internal.keensafeglobalbank.com:8200. Pipeline:
/debug/config.