Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    [mc4wp_form id=3515]
    What's Hot

    Name That Toon: Last Line of Defense

    April 16, 2024

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024
    Facebook Twitter Instagram
    • Privacy Policy
    • Contact Us
    Facebook Twitter Instagram Pinterest Vimeo
    AI Home SecurityAI Home Security
    • Home
    • Home Security
    • Cyber Security
    • Biometric Technology
    Contact
    AI Home SecurityAI Home Security
    Home»Cyber Security»A Detection and Response Benchmark Designed for the Cloud
    Cyber Security

    A Detection and Response Benchmark Designed for the Cloud

    justmattgBy justmattgNovember 20, 2023No Comments5 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    [ad_1]

    The speed and sophistication of cloud attacks have rapidly narrowed the time security teams have to detect and respond before suffering a breach. According to the “Mandiant M-Trends 2023” report, the dwell time for an on-prem environment is 16 days. By contrast, it only takes 10 minutes to execute an attack in the cloud after discovering an exploitable target. Add the pressure of having four business days to disclose a material cyber incident to the SEC, and it becomes clear that everything moves faster in the cloud. Security teams need help.

    Legacy detection and response frameworks cannot adequately protect organizations. Most existing benchmarks are designed for endpoint-centric environments and are simply too slow for security teams protecting modern cloud environments.

    The industry needs a modern detection and response benchmark, one designed for the cloud. Outpacing attackers in the cloud requires security teams to meet the 5/5/5 Benchmark, which specifies five seconds to detect, five minutes to triage, and five minutes to respond to threats.

    When the cost of a cloud breach is $4.45 million, according to IBM’s “Cost of a Data Breach Report 2023”), security teams need to be able to detect and respond to attacks at cloud speed. If they don’t, the blast radius will quickly expand and the financial impact will quickly compound. Meeting the 5/5/5 Benchmark will help organizations operate confidently and securely in the cloud.

    The 5/5/5 Cloud Detection and Response Benchmark

    Operating in the cloud securely requires a new mindset. Cloud-native development and release processes pose unique challenges for threat detection and response. DevOps workflows — including code committed, built, and delivered for applications — involve new teams and roles as key players in the security program. Rather than the exploitation of traditional remote code execution vulnerabilities, cloud attacks focus more heavily on software supply chain compromise and identity abuse, both human and machine. Ephemeral workloads require augmented approaches to incident response and forensics.

    While identity and access management, vulnerability management, and other preventive controls are necessary in cloud environments, you cannot stay safe without a threat detection and response program to address zero-day exploits, insider threats, and other malicious behavior. It’s impossible to prevent everything.

    The 5/5/5 benchmark challenges organizations to acknowledge the realities of modern attacks and to push their cloud security programs forward. The benchmark is described in the context of challenges and opportunities that cloud environments present to defenders. Achieving 5/5/5 requires the ability to detect and respond to cloud attacks faster than the attackers can complete them.

    5 Seconds to Detect Threats

    Challenge: The initial stages of cloud attacks are heavily automated due to the uniformity of a cloud provider’s APIs and architectures. Detection at this speed requires telemetry from computer instances, orchestrators, and other workloads, which is often unavailable or incomplete. Effective detection requires granular visibility across many environments, including multicloud deployments, connected SaaS applications, and other data sources.

    Opportunity: The uniformity of the cloud provider infrastructure and known schemas of API endpoints also make it easier to get data from the cloud. The proliferation of third-party cloud-detection technologies like eBPF has made it possible to gain deep and timely visibility into IaaS instances, containers, clusters, and serverless functions.

    5 Minutes to Correlate and Triage

    Challenge: Even within the context of a single cloud service provider, correlation across components and services is

    challenging. The overwhelming amount of data available in the cloud often lacks security context, leaving users with the responsibility for analysis. In isolation, it is impossible to fully understand the security implications of any given signal. The cloud control plane, orchestration systems, and deployed workloads are tightly intertwined, making it easy for attackers to pivot between them.

    Opportunity: Combining data points from within and across your environments provides actionable insights to your threat detection team. Identity is a key control in the cloud that enables the attribution of activity across environment boundaries. The difference between “alert on a signal” and “detection of a real attack” lies in the ability to quickly connect the dots, requiring as little manual effort by security operations teams as possible.

    5 Minutes to Initiate Response

    Challenge: Cloud applications are often designed using serverless functions and containers, which live less than 5 minutes on average. Traditional security tools expect long-lived and readily available systems for forensic investigation. The complexity of modern environments makes it difficult to identify the full scope of affected systems and data and to determine appropriate response actions across cloud service providers, SaaS providers, and partners and suppliers.

    Opportunity: Cloud architecture allows us to embrace automation. API- and infrastructure-as-code-based mechanisms for the definition and deployment of assets enable rapid response and remediation actions. It is possible to quickly destroy and replace compromised assets with clean versions, minimizing business disruption. Organizations typically require additional security tools to automate response and perform forensic investigations

    Next Steps

    To dive deeper into the world of cloud attacks, we invite you to play the role of attacker and defender and try out our Kraken Discovery Lab. The Kraken Lab highlights SCARLETEEL, a renowned cyber-attack operation aimed at cloud environments. Participants will uncover the intricacies of credential harvesting and privilege escalation, all within a comprehensive cloud framework. Join the next Kraken Discovery Lab.

    About the Author

    Ryan Davis

    Ryan Davis is Sysdig’s Senior Director of Product Marketing. Ryan is focused on driving go-to-market strategy for core cloud security initiatives and use cases.

    [ad_2]

    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous Article27 Malicious PyPI Packages with Thousands of Downloads Found Targeting IT Experts
    Next Article Silverfort’s Unified Identity Protection Platform
    justmattg
    • Website

    Related Posts

    Cyber Security

    Name That Toon: Last Line of Defense

    April 16, 2024
    Cyber Security

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024
    Cyber Security

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024
    Add A Comment

    Leave A Reply Cancel Reply

    Demo
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Cyber Security

    Name That Toon: Last Line of Defense

    justmattgApril 16, 2024

    [ad_1] The enemies are always getting closer, using the same advanced technologies as security pros…

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024

    Muddled Libra Shifts Focus to SaaS and Cloud for Extortion and Data Theft Attacks

    April 16, 2024

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    [mc4wp_form id=3515]
    Demo
    Top Posts

    Name That Toon: Last Line of Defense

    April 16, 2024

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Latest Reviews
    Cyber Security

    Name That Toon: Last Line of Defense

    justmattgApril 16, 2024

    [ad_1] The enemies are always getting closer, using the same advanced technologies as security pros…

    Cyber Security

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    justmattgApril 16, 2024

    [ad_1] Apr 16, 2024NewsroomSupply Chain / Software Security Security researchers have uncovered a “credible” takeover…

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    [mc4wp_form id=3515]
    Demo
    MOST POPULAR

    Name That Toon: Last Line of Defense

    April 16, 2024

    California mountain lion P-22 left mark on wildlife conservation

    January 1, 2023

    Congress Again Writes To Home Minister Amit Shah Over Rahul Gandhi’s Security

    January 1, 2023
    OUR PICKS

    Name That Toon: Last Line of Defense

    April 16, 2024

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    [mc4wp_form id=3515]
    Facebook Twitter Instagram Pinterest
    • Privacy Policy
    • Contact Us
    AI Home Security © 2025 All rights reserved | Designed By ESmartsSolution

    Type above and press Enter to search. Press Esc to cancel.

    ↑