Alerts that Matter: Operationally Efficient Cloud Breach Prevention

Cloud Security

The reason why cloud threat detection is so difficult is for one reason – it requires expertise to make sense of vast amounts of disjointed data. There is too much data to sort though, aggregate, correlate, and determine the outcome on behaviors. Analyzing data requires understanding of the context, for cloud threat detection this adds another layer of complexity since the cloud context is continuously evolving, some of which is ephemeral. For successful cloud threat detection, security analysts must use contextual information to be successful which is impossible to do without the right purpose-built tools and services. Contextualizing, cleaning benign data, aggregating, correlating and generating security insights in near real-time and cost-effective manner is a very challenging problem to solve. So, what do other tools do? They overwhelm you with too many alerts. There is an alert for every activity in the cloud that on its own might be anomalous behavior that has no risk associated with it. When there is an alert for every activity, teams become desensitized to the alert onslaught, and threat actors achieve their goal with the help of your security tools.

Skyhawk Synthesis takes tens of thousands of raw data points over the course of days and weeks and determines the relationship of these data points, and then identifies which are actual threats to your crown jewels, and which are just one-off behaviors. Skyhawk alerts matter.

So, how do we do this?

Let’s start with some events. Take a look these anomalous cloud events:

We see that for the user Catherine.brown, there are first time cloud API calls and non-typical cloud API calls. In another security tool, these activities would cause several alerts and your security team would need to figure out the relationship between these activities and events.

With Skyhawk, you don’t have to, we aggregate this data and determine all the relationships and dependencies to see if this is something of interest in terms of your security. In addition, since Skyhawk correlates, we may be able to alert on an anomalous combination of calls, even though each call on its own might not be anomalous.

As a result, we are able to determine that all of these events align to a single malicious behavior indicator (MBI) which shows there is anomalous Cloud API Usage Activity. This tells the team there is something going on in cloud infrastructure they need to pay attention to. Skyhawk Synthesis then continues to sort through the data and then correlate events, into MBIs. MBIs are then correlated into the attack sequence.

 

Behind each of these MBIs, there are 10 or more events, that are then correlated into an attack sequence, providing all the evidence to the security team so they understand how the threat actor got in, how they are moving through the environment, and what they were able to compromise.

Throughout this entire process, tens of thousands of data points are sorted down to just a few alerts. This graphic shows a real example from one of our customers. From approximately 60,000 events over a one-month period, the security team got 50 alerts that needed to be investigated. The man-hours saved from a security team is immeasurable. It would take too many incident responders, more than money can buy, to start with 60,000 data points and then to get to 50 alerts before it is too late. Security teams do not have this time because as they are researching these events, threat actors are penetrating their environment and threatening their crown jewels.

The sorting of interesting data points to meaningful alerts:

  • 60,000 events are sorted through and if they are interesting, they are aggregated and grouped into anomalies
  • 6K anomalies are grouped into MBIs and then sequenced
  • 1200 sequences are evaluated for risk
  • 100 sequences are flagged as suspicious, and continued to be evaluate for risk
  • 50 sequences are then promoted as an alert that the security team must investigate

Even if you have unlimited budget, which we know is never the case, there isn’t enough cloud security expertise to hire, and the operational cost will be immense. With Skyhawk Security Synthesis Platform, this operational efficiency is already significant in providing the best TCO and improving security by directing the security teams to know exactly which are the REALerts that they need to focus on. These alerts matter. Security teams will not be wasting time on benign events – they will be focusing on the key threats to your cloud and your business.

Want to learn more? Contact us today for a demo!

Blog

Continuous evolving clouds with continuously evolving threats need continuous threat exposure management (CTEM). This programmatic approach to managing threat exposures can help organizations dramatically reduce breaches. Many organizations are well on their way. According to a Gartner Peer Insights survey,

Cloud SecurityAIData BreachThreat Detection
Blog

Skyhawk Security stands out in a competitive market! The organization is proud to announce that it has been named a finalist in the 2024 Cloud Security Awards program in four categories: Cloud Security Innovator of the Year Best Use of

Cloud SecurityAIData BreachThreat Detection
Blog

The Cybertech conference of 2024 was supposed to mark the tenth year of the event that has long been considered the most significant in the local industry. The event that started as an event by Israelis, for Israelis, has long

Cloud SecurityAIData BreachThreat Detection
Blog

US National Institute of Standards and Technology (NIST) defines “Attack surface” as: The set of points on the boundary of a system, a system element, or an environment where an attacker can try to enter, cause an effect on, or

Cloud SecurityAIData BreachThreat Detection
Blog

It is a fact that the security industry suffers from a chronic shortage of skilled employees. This global shortage, which ISC2 estimates at 4 million professionals. The global workforce is estimated at 5.5 million people, meaning it nearly needs to

Cloud SecurityAIData BreachThreat Detection
Blog

Please check out this guest blog post by Alex Sharpe, a Cyber Security Expert with decades of experience. The SEC Cybersecurity Rule is designed to provide transparency so investors can make information decisions. The rule effectively imposes two requirements on

Cloud SecurityAIData BreachThreat Detection

Thanks For Reaching Out!

One of our expert will get back to you
promptly at asafshachar@gmail.com

Ready?
Fill out the form and we'll schedule your demo
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.