Cloud SecOps V7
Cloud SecOps V7
Cloud SecOps V7
net
Guide to Next-Generation
Cloud SecOps
ABSTRACT
Security Operations (SecOps) face many challenges,
including a shortage of skilled people, proliferating
security technologies, and a reactive mindset. In the
cloud, these challenges are made even more acute by
cloud-specific threats, access control issues, and a shared
security model with cloud providers.
04 Introduction
10 Cloud-Specific Threats
Multi-Cloud Architectures
13 How Next-Generation MDR Addresses Cloud
Security Challenges
14 Cloud-Native
15 Full Response
20 High-Level Architecture
21 Solution Components
22 Threat Response
25 Conclusion
26 About Paladion
INTRODUCTION
Security Operations (SecOps), which is challenging enough in
the data center, becomes even more difficult in the cloud. Issues
include a shortage of skilled people and a proliferating number of
security technologies. Taking a reactive approach is not realistic;
organizations must get ahead of attacks to stay protected.
4
PROBLEMS
LURK IN THE
CLOUD
Appealing as the cloud may be for its flexibility
and economic benefits, cloud infrastructures
present serious security challenges. These
include the shared security model, the rapid
release of new cloud features, access control
issues, and more.
1. McAfee, 5 Key Findings for 2019 Cloud Adoptions and Risk Report, 2019
2. Redlock, 13 Cloud Security Statistics to Know in 2019 (with 9 Best Practices), 2018
3. Forcepoint, The Human Point: An Intersection of Behaviors, Intent & Data, 2017
5
NEW THREATS IN THE CLOUD
The cloud opens up new attack surface areas, ranging from smaller vulnerabilities to
entirely new types of cyber threats.
Examples include:
• Cloud console takeovers that give hackers control of the entire cloud.
• Cloud-based email like Office 365 that brings spear phishing, account takeovers,
and business email compromises that can result in financial or IP theft.
• SaaS services that can be hijacked through failures from the SaaS provider or
internal users.
6
API AND CLOUD INTEGRATION
VULNERABILITIES
7
THE IMPACT OF THE SHARED RESPONSIBILITY SECURITY MODEL
The CSP is responsible for securing its infrastructure and network. Their SecOps team
monitors the compute, storage, and network hardware comprising the cloud platform.
The customer, in turn, is responsible for their own data and application security, including
the patching and access control issues that arise with working in the cloud.
Infrastructure Data
Network Applications
This shared responsibility model makes a great deal of sense. The CSP cannot be
expected to know which users are authorized to use the software installed in the
customer’s cloud. Nor is it realistic for the CSP to remember the specifics of how the
customer wants to secure its data and applications.
However, the shared responsibility model leads to a lot of problems too. At a minimum,
the cloud becomes yet another digital asset SecOps has to monitor by installing cloud-
based versions of on-premise SIEM systems, Intrusion Detection Systems (IDSs), and other
security tools.
8
RAPID CHANGE AND HIGH-VOLUME FEATURE RELEASES
CSPs frequently introduce new features and solutions to attract new customers and
keep existing customers from defecting. Some of these changes can have huge
impacts on SecOps. For instance, a CSP might launch a complete Internet of Things
(IoT) management platform along with a data analytics service to go with it. That’s
fine – right up until someone in the business decides to take advantage of this new
feature without telling SecOps…and in doing so, inadvertently exposing their network
and data to hundreds or thousands of untracked and unsecured devices.
CSPs make many security tools available in their cloud platforms, such as virtual web
application firewalls and cloud-based IDSs. However, these CSP security offerings tend to
be immature or incomplete compared to their traditional data center counterparts. This
gap leads to SecOps teams having to install and manage their own tools.
9
CLOUD-SPECIFIC THREATS
Human error is always a huge problem, but the cloud magnifies common
mistakes into organization-wide vulnerabilities. Simple configuration
errors can leave entire databases unprotected. These mistakes often
result from application testing or other processes that require the use
of a database in a non-production environment and are easily missed by
SecOps teams…often because they’re never even made aware of these test
instances.
Advanced Persistent Threats (APTs) are often based in the public cloud,
so that they can infiltrate an organization’s cloud assets laterally.
10
ACCESS CONTROL ISSUES IN THE CLOUD
Who accessed what? That’s one of the most critical questions facing SecOps teams as
they analyze session logs and reports.
Deciphering the access control map becomes more complicated in the cloud. Users may
get in using a “side door” by accessing digital assets remotely without having to pass
through the corporate network. Cloud Access Security Brokers (CASBs) can help – as can
identity access systems that have been set up for cloud use.
Few organizations are one hundred percent in the public cloud. Many businesses have
data across on-premise, public, and private cloud architectures. Others have applications
and data that span AWS, Azure, and Google cloud. Such hybrid cloud architecture sets
up a tricky security dynamic for SecOps to track by requiring many overlapping and
repetitive systems for multiple cloud instances…further increasing the possibilities for
human error and the need for automation.
11
THE PEOPLE SHORTAGE
12
HOW NEXT-
GENERATION
MDR ADDRESSES
CLOUD SECURITY
CHALLENGES
To understand how Next-Generation MDR mitigates
cloud security risks, it’s useful to compare it with
traditional MDR practices.
13
CLOUD-NATIVE
Next-Gen MDR solutions have been developed specifically with cloud use cases in mind
and integrate deeply into an organization’s entire cloud stack. This means that they
can work seamlessly across multiple clouds, including containers, microservices, cloud
consoles, and data repositories while leveraging existing security tools. For example, a
Next-Gen MDR solution can provide threat detection by using unified SIEM, EDR, user
access, and flow data across AWS, Azure, private clouds, and traditional data centers.
With complete integration, the MDR solution can access data about the status of each
element of the stack to detect and respond to threats. The offering also includes a regular
review of their configurations to ensure no new solutions have created unintended
vulnerabilities.
A Security Operations Center (SOC) is typically on the receiving end of outputs from
multiple security systems, including NGFW, Unified Threat Management (UTM), and
more. This security data piles up, even with analytics systems like SIEM in place. An under-
resourced SecOps team may be overwhelmed by the deluge of security data.
Next-Gen MDR automates the handling of huge volumes of security data, which helps
reduce the workload placed on SecOps teams. It pulls data from a wide range of existing
security products like IPSs, firewalls, UTMs, anti-virus, SIEMs, endpoint detection and
response solutions, web application firewalls (WAFs), user behavior analytics (UBA), and
cloud security solutions.
14
CONTINUOUS SECURITY POSTURE MANAGEMENT (CSPM)
FULL RESPONSE
Next-Gen MDR contains threats and orchestrates a complete response to evict the
attacker. Some responses can even be fully automated with the client’s agreement. The
SOC’s goal is to avoid the unfortunate but common scenario where a managed security
service spots a threat, opens a ticket, and sends it over the wall to the customer. Given the
pace of attacks and the overloaded nature of SOCs, that can be a formula for disaster.
Next-Gen MDRs manage a wide variety of cloud cybersecurity use cases, filling in
detection and response gaps created by shortages of personnel and tool limitations. In
addition to cyber defense countermeasures like mitigating APTs and securing SaaS apps,
common cloud use cases include:
15
NEXT-GEN MDR IN ACTION
A Next-Gen MDR platform should be able to provide the detection and response service
timeline depicted in the “Left-of-Hack” and “Right-of-Hack” diagram in Figure 1. The figure
offers a useful way to visualize the timing of threat detection and response actions. Each
of the six steps within this workflow represents processes occurring along the timeline of
an attack. The “Left-of-Hack” portion includes the proactive steps taken to detect threats
before they occur. The earliest form of detection is threat anticipation, followed by threat
hunting, which happens closer to the time of a hack, while security monitoring serves as
the detection capability occurring up to the moment of a possible compromise.
The “Right-of-Hack” includes the time-to-respond workflows, which follow a similar time-
based pattern. The incident analysis takes place immediately after an attack, followed by
auto-containment, and then response orchestration.
16
PALADION’S NEXT-
GEN MDR: AI.SAAC
Paladion’s Next-Gen MDR is AI.saac, a patented
AI platform first deployed in 2011. It achieves
proactive results by mining customer’s
security data on a 24/7 basis across three
dimensions:
17
This broad detection process takes a proactive fight against malicious actors across
the public cloud. It can ferret out threats in cloud assets on most platforms (e.g., Azure,
Google, AWS), operating systems, as well as in containers (e.g., Docker), microservices,
and cloud consoles. The platform can also detect threats coming from SaaS solutions
like Box and Salesforce. There are few, if any, places for APTs or malware to hide with
this approach. Machine learning models make it hard for threats to evolve and escape
detection.
WHY BE PROACTIVE?
18
APPLYING THE POWER OF AI AND MACHINE LEARNING
AI and machine learning are now commonplace in cybersecurity products. AI.saac takes
those technologies even further and has a proven track record. It is powered by neural
nets as well as by supervised and unsupervised natural language processing (NLP).
• Threat feed-based
detection logic
• SIEM Rules
• Threat modelling
and attack tree
Unknown Attacks
• Signature matching
• Watchlists/Blacklists
(IPS, WAF, DLP, AV) leverages advanced security
analytics to group attacks
• Statistical models, • Watchlists/Blacklists across two dimensions, based
behavior analysis,
on threat actors and attacks.
peer analysis
• Machine learning
• Visual analysis
Figure 4 – Tactical threat intel process, where commodity threat data (e.g., cloud sources, open
sources) is collected, parsed, and scored before being curated through validation and correlation.
The result is a collection of operationalized threat data used by the AI.saac platform.
19
HIGH-LEVEL ARCHITECTURE
AI.saac-MDR Platform
Existing
security tools Ticketing
Detection Response systems, etc.
(e.g. SIEM, APIs APIs
NGFW, IPS)
Anticipate Hunt Monitor Analyze Contain Orchestrate
Agents
Figure 5 – High-level
The system deploys agents across all digital assets, including on-premise servers, cloud
instances (e.g., AWS and Azure), Virtual Private Clouds (VPCs), and Virtual Networks
(VNets), and endpoints like mobile devices or laptops. The agents and integrated security
tools feed event data into the platform’s detection processes. These, in turn, anticipate,
hunt, and monitor for threats.
APIs connect the platform’s response processes to external ticketing solutions. Both
detection and response processes are visible to end-users at the Paladion SOC as well as
to the customer’s SecOps team members
20
SOLUTION COMPONENTS
The AI.saac-MDR contains multiple services and core technologies along with hundreds of
AI models, use cases, and playbooks.
Core technologies: Threat intelligence, impact analyzer, endpoint detection and response
(EDR), UBA, network traffic analysis, advanced threat analytics, triage, big data SIEM, one-
touch integration, and deep forensics
21
THREAT RESPONSE
AI.SAAC-MDR
Paladion works with clients to clearly outline CUSTOMER
what types of threats can be automatically
SUCCESS STORY
responded to and which require human
intervention. In the case of the latter, threats A global e-commerce company had made a
significant investment in security solutions, yet
are auto contained to limit the damage until
these tools were not performing adequately. The
a human can be brought into the loop. company’s internal security teams were over-
stretched to the point where they could not
investigate and respond to threats in a timely
manner. At the same time, the company found
INCIDENT ANALYSIS itself targeted by APTs.
22
AUTO-CONTAINMENT
The platform is also capable of orchestrating an incident response. The goal is to contain
attacks in minutes, orchestrate an effective response, and destroy the root cause of
the attack. After automated responses, there may be human follow-up, stakeholder
notification, machine repairs, or other recommendations.
For events requiring client input, a Paladion Incident Responder reaches out to the
customer with a complete incident analysis to orchestrate a full, coordinated response.
This response spans across both the Paladion team and the customer’s SecOps staff.
The platform guides the SecOps team in forensics breach investigations and helps to
resume regular customer operations as soon as possible. Of course, the system learns
from each incident and evolves customer defenses to perform better in future events.
23
DATA-RICH TICKETS
Given the time-starved nature of SecOps work, anything that cuts down on incident
management time is welcome. The Paladion approach is to provide SecOps team members
with information-rich tickets they can use to expedite incident response. Before creating a
ticket, AI.saac goes through a 20-point checklist covering:
• IP reputation, IOC matches, associated alerts, source behavior, and target behavior
Cloud configurations are complex and constantly changing. It can be confusing for anyone,
so we’ve created continuously updated “cheat sheets” that identify customer areas of
responsibility when entrusting data to either Azure or AWS. We provide comprehensive
checklists of key strategies for ensuring cloud deployment security.
These cheat sheets make it easier to ensure security for cloud-based deployments, but if
you aren’t comfortable with the technical requirements, our team of top-notch security
experts will work with you to ensure you have the right controls in place.
For example, Strategy 4 for AWS covers key details for managing the security of Amazon
Machine Images. Since not all users who can create AMIs will understand the security
ramifications, we recommend that you create minimum security standards or AMI
templates with pre-defined security for users. An Azure example covers how to automate
security controls on new VMs.
24
CONCLUSION
AI-Driven Next-Gen MDR makes it possible to establish a robust and enduring security
posture in the cloud. With deep detection and full response capabilities, the Next-Gen
platform, AI.saac, helps organizations overcome limitations on staffing as well as the
effects of a reactive mindset and proliferating security technologies. It enables SecOps
to stay on top of complex, constantly evolving cloud environments. AI and ML power
the detection capability and inform the automated incident response processes –
complementing and augmenting the in-house SecOps team’s ability to secure its assets
in the cloud.
SCHEDULE A DEMO
25
ABOUT PALADION
Paladion is a next-generation cybersecurity provider to technology,
manufacturing, and cloud-first companies across the United
States. They are consistently recognized and rated by independent
technology advisory firms for their Managed Detection and Response
Services, Cloud security, and Vulnerability Management & Response
services, which is anchored by their patented Artificial Intelligence
platform – AI.saac.
26