We started this series detailing the major ways cloud affects SecOps before delving into updating our core capabilities and processes to better manage the cloud. Now it’s time to show some practical examples, both of which we have implemented in the real world
Your tooling finds an S3 bucket that is open to public internet access. This is in an account that does have other public buckets, but this one is unexpected. It’s similar to finding a new open file share or SharePoint site that isn’t a clear policy violation but is definitely concerning, especially since data may be exposed to the internet.
Your objective is to detect, analyze and respond as quickly as possible.
This example shows the value of our core principles. The exposure was detected in real-time. It was communicated to both SecOps and the team that owned the environment. Based on the IAM of the API call, the cloud team recognized the source of the exposure and, in this case, was able to remediate the issue before it was a problem.
You just detected a new snapshot of a customer database unexpectedly shared to another account at 3 a.m. How long has it been there? Is the data sensitive? Is that one of your accounts, or is it under the control of an attacker? Was this a deliberate change, an accident or an attack? This is the cloud equivalent of realizing a database backup was open to the internet and possibly exported externally.
The process here is similar to the first example, but this scenario shifts gears to deal with activity that is more indicative of an attack:
This example relies less on communications and more on automation and responder access. During work hours, you might have had the cloud account team handle the remediation in coordination with SecOps, but since this was a potential critical exposure, security used their playbooks, emergency access, and automation instead. In case you didn’t know, sharing snapshots to accounts under an attacker’s control is a common data exfiltration technique that works on every cloud provider.
These examples do a good job of showing how to build a modernized SecOps process for the most common security operations scenarios — remediating a misconfiguration or vulnerability and responding to an incident. In both cases we are able to detect, respond to and remediate the issue within minutes. We enabled rapid detection, information enrichment and communications across silos to engage the most knowledgeable team members and supportive automation.
Hopefully, you noticed the key differences between these examples and how many organizations run their existing operations. Assessments are continuous and real-time; we don’t rely on daily or even hourly scans that could leave resources publicly exposed for longer windows. We treat misconfigurations as potential attacks, not just mistakes to backlog. Activity (log) data is also timely, and SecOps isn’t relying on slow feeds that force them to operate 15 minutes or more behind attackers. Automated enrichment and routing via ChatOps reduces the negative impact of decentralization by engaging teams across silos instead of security emailing out spreadsheets of vulnerabilities. Responders have the access and automation to make changes during emergencies and larger incidents, while the teams that own the cloud deployments can handle most issues themselves.
Through modernizing our tools and processes, we manage the biggest security challenges of the cloud: Decentralization, administration via the internet and any resource a few clicks away from being public. Using our combination of core principles, tooling and process recommendations and practical examples should help any SecOps team improve their cloud security operations.
Recent Articles By Author