Security Audit Update - 2026-02-27¶
Summary of Changes¶
This update adds 14 new critical and high-risk Azure AD applications to the security audit findings, with emphasis on healthcare systems (TASY), infrastructure exposure (Engineering Portals), and directory control risks.
Files Updated/Created¶
1. Vectors Database¶
File: /home/rx/lab/scan-dor/vectors/all-findings.jsonl
- Action: Appended 14 new JSONL findings
- Size: 40 lines → 54 lines (14 new findings)
- Findings Added:
- 10 new Azure AD applications
- 3 infrastructure endpoints
- 2 critical patterns
2. Main Credentials Document¶
File: /home/rx/lab/scan-dor/01-credenciais-encontradas.md
- Action: Added new section 6 "Novos Achados - Auditoria Expandida (2026-02-27)"
- Content Added:
- Section 3.1: 10 new Azure AD app details
- Section 6: Comprehensive findings breakdown
- Section 7: Pattern analysis
- Section 8: Updated remediation priorities
3. Azure Apps Expanded¶
File: /home/rx/lab/scan-dor/08-azure-apps-expanded.md (NEW)
- Size: 13 KB
- Content:
- Complete inventory of 14 Azure AD applications with risk levels
- Detailed application profiles with secrets, URLs, permissions
- Mermaid diagram showing risk network
- Secret expiry timeline
- Permission escalation paths
- Immediate remediation actions
4. Healthcare Risk Analysis¶
File: /home/rx/lab/scan-dor/09-tasy-healthcare-risk.md (NEW)
- Size: 14 KB
- Content:
- TASY Hospital Information System analysis (CRITICAL)
- Patient data at risk assessment
- LGPD (Brazil) compliance violations
- Attack scenarios and patient safety impact
- Mermaid diagram: TASY risk chain to patient impact
- Detailed remediation roadmap
- Regulatory fines up to R$ 50 million
New Applications Discovered¶
CRITICAL RISK (1)¶
- TASY-NACIONAL-JUTTA-BATISTA-PRD (b3a95d25-d382-4a72)
- Hospital information system with patient medical records
- Production instance: hisjuttabatista.rededor.com.br
- LGPD violation if compromised
- Estimated patient impact: Thousands of patients
HIGH RISK (12)¶
- app-portal-engenharia-acesso (6751b57d-32db-439c)
- Internal engineering portal (Backstage-like)
- Production: portal.e-dor.net, portal.plt.e-dor.net
-
Expiry: 2027-03-06
-
app-portal-engenharia-acesso-dev (fbe8fac2-3675-4a25)
- Engineering portal DEV environment
- AWS ALB endpoint exposed: portal-alb-main-535306139.us-east-1.elb.amazonaws.com
- Infrastructure reconnaissance risk
-
Expiry: 2027-06-12
-
APEX-AUTHENTICATION (4459f6a9-f5d9-452e)
- Oracle APEX authentication service
- 6 active secrets (DEV + PRD)
- Redirect URIs: app.idor.org, appdev.idor.org
-
Expiry: 2028-02-23
-
Portal Conecta Produção (5d56154f-4a53-4de6)
- Directory.ReadWrite.All (full AD control)
- URL: portalconecta.rededor.com.br
- NEXT TO EXPIRE: 2026-03-27 (28 days)
-
SAML SSO potential hijacking
-
TASY-NACIONAL-AWS2-HML (204da288-210a-4aee)
- TASY test environment on AWS
- May contain production data snapshots
-
Expiry: 2027-08-21
-
RDSL Posição Financeira DEV (edeac5c0-1259-40aa)
- Finance portal with Lambda API Gateway integration
- Production endpoint: f2vlc24t34.execute-api.sa-east-1.amazonaws.com
- Development endpoint: ne2ozeh8k8.execute-api.sa-east-1.amazonaws.com
-
Expiry: 2028-01-15
-
PAT-Token-Manager (df077825-c298-4ae5) - Already found, expanded
- User_impersonation(DevOps) scope
-
Expiry: 2027-01-31
-
dor-dev-hub (8a7d0eab-4320-46da) - Already found, expanded
- DevOps access
-
Expiry: 2028-02-13
-
sp-aws-migration-assessment-rdor (6f662732-49ad-47a3)
- AWS infrastructure assessment service principal
- Expiry: 2026-05-10 (72 days)
-
RedeDor_Neoh (8107cd20-a527-4a2b)
- Daemon/background application
- No declared permissions (suggests mobile or service)
- Expiry: 2028-02-04
-
AWS ALB Infrastructure
- Engineering Portal ALB publicly exposed in Azure AD config
- Status: UNREACHABLE_FROM_PUBLIC (internal only)
- But endpoint metadata leaked in app configuration
-
Lambda API Gateway
- RDSL Finance RDSL Posição Financeira endpoints
- Both return 403 (alive but protected)
MEDIUM RISK (2)¶
-
AWS Migration Assessment (6f662732-49ad-47a3)
- Expiry: 2026-05-10
-
RedeDor_Neoh (8107cd20-a527-4a2b)
- Expiry: 2028-02-04
Critical Patterns Identified¶
Pattern 1: Directory.ReadWrite.All Proliferation¶
Risk Level: CRITICAL
Three applications with full Azure AD directory control: - CyberArk Identity RDOR - Portal Conecta Produção - Portal de Relacionamento - Dev (via app roles)
Impact: Compromise of ANY = full tenant control
Pattern 2: Production/Development Secret Mixing¶
Risk Level: HIGH
- APEX has 6 secrets across DEV and PRD
- TASY has separate apps but same architecture
- RDSL exposes both endpoints
Impact: DEV compromise → PRD compromise
Pattern 3: Infrastructure Endpoint Disclosure¶
Risk Level: HIGH
- Engineering ALB endpoint in Azure AD config
- Lambda API Gateway URLs in metadata
- idor.org domain hints at separate systems
Impact: Network topology reconnaissance easier
Pattern 4: Healthcare Data Systems¶
Risk Level: CRITICAL
- TASY systems contain sensitive medical records
- No visible encryption indicators
- LGPD compliance risk (R$ 50 million+ fines possible)
Expiry Timeline¶
URGENT - Next 30 Days¶
- Portal Conecta: 2026-03-27 (28 days)
- Portal Prd Audit Secret: 2026-03-01 (2 days - already identified)
Watch - Next 90 Days¶
- AWS Migration Assessment: 2026-05-10 (72 days)
- MSAL Dev: 2026-05-09 (71 days)
Long-term¶
- CyberArk: 2026-12-17 (294 days)
- TASY PRD: 2027-12-11 (653 days)
- APEX: 2028-02-23 (757 days)
Compliance & Regulatory Impact¶
LGPD (Lei Geral de Proteção de Dados) - Brazil¶
TASY healthcare systems subject to strict data protection: - Potential fines: up to 2% of annual revenue or R$ 50 million - Per violation, per patient affected - Hospital closure in severe cases - Mandatory patient notification within 72 hours
Healthcare Data Protection¶
- HIPAA equivalent (Brazil - LGPD)
- Patient Safety implications
- Medical record integrity requirements
- Regulatory investigation risk
Immediate Actions Required¶
TODAY (Critical)¶
- Rotate TASY-NACIONAL-JUTTA-BATISTA-PRD secret
- Rotate Portal Conecta secret (expires 2026-03-27)
- Remove Portal Prd audit secret
THIS WEEK (High Priority)¶
- Audit Directory.ReadWrite.All permissions
- Rotate APEX secrets (6 active)
- Review Portal Dev Graph API compromise
- Restrict Engineering Portal ALB disclosure
- Audit TASY HML environment
THIS MONTH (Medium Priority)¶
- Implement secret rotation automation
- Enable audit logging for all critical apps
- Conditional access policies
- LGPD compliance audit for healthcare
Documentation Structure¶
scan-dor/
├── 01-credenciais-encontradas.md (UPDATED - added section 6)
├── 08-azure-apps-expanded.md (NEW - complete app inventory)
├── 09-tasy-healthcare-risk.md (NEW - healthcare analysis)
├── vectors/
│ └── all-findings.jsonl (UPDATED - 54 lines total)
└── AUDIT-UPDATE-2026-02-27.md (THIS FILE)
Statistics¶
- New Azure AD Apps: 10 new applications found
- New Infrastructure Findings: 3 endpoints
- New Patterns: 2 critical patterns
- Total JSONL Findings: 54 lines (14 additions)
- Healthcare Systems at Risk: 2 TASY instances
- Patient Data at Risk: Thousands of patients (Jutta Batista hospital)
- Applications with Directory Write: 3 (CRITICAL)
- Secrets Expiring in <30 days: 1 (Portal Conecta)
Risk Summary¶
| Severity | Count | Key Finding |
|---|---|---|
| CRITICAL | 1 | TASY Hospital Information System - Patient Data Breach Risk |
| HIGH | 12 | Multiple apps with Directory write, AWS infrastructure exposure |
| MEDIUM | 2 | AWS migration assessment, Neoh daemon app |
| TOTAL | 15 | 14 new findings + 1 infrastructure pattern |
References to Detailed Analysis¶
- Azure Apps Inventory:
/home/rx/lab/scan-dor/08-azure-apps-expanded.md - Healthcare Risk Analysis:
/home/rx/lab/scan-dor/09-tasy-healthcare-risk.md - Main Credentials Report:
/home/rx/lab/scan-dor/01-credenciais-encontradas.md(Section 6) - Findings Vector Database:
/home/rx/lab/scan-dor/vectors/all-findings.jsonl
Audit Date: 2026-02-27 Classification: INTERNAL SECURITY FINDINGS Distribution: Security Team, Management, Compliance