Visibility Detect Respond AWS SANS Whitepaper
Visibility Detect Respond AWS SANS Whitepaper
Building on Shackleford’s perspective, AWS Marketplace will share how you can specifically apply this process to
your AWS environment. They will introduce relevant software seller solutions that can help you gain better context
for events in your environment and boost your remediation efforts. Finally, AWS Marketplace solution sellers will be
featured as available options for strengthening your security visibility in AWS.
The featured solutions for this use case can be accessed in AWS Marketplace:
In general, security teams need to focus on two major types of event monitoring in
the cloud:
Cloud security monitoring and response increasingly focus on automation. While not all
cloud security processes should be completely automated, there are many innovative
automation capabilities built into the cloud control plane that can significantly improve
many security monitoring and operations practices.
Collectively, logging and event monitoring, as well as automation strategies and tools,
can enable security teams to build a continuous monitoring strategy in the cloud. This
consists of two core strategies:
• Baseline monitoring and logging for workloads and the cloud control plane
Security teams should also leverage automation for improved operational capabilities
with services like AWS Lambda and AWS Config.
1
his paper mentions solution names to provide real-life examples of how cloud security tools can be used. The use of these examples is not an
T
endorsement of any solution.
AWS CloudTrail solves one of the most challenging issues many security teams face
when migrating IT resources into AWS: the capture and maintenance of cloud service
event data that can feed log management and SIEM platforms. AWS CloudTrail uses
Amazon S3 buckets for storage of the log data, allowing security teams to leverage the
same APIs to access data quickly and easily for correlation and aggregation internally.
Log data can also be automatically deleted after a certain period of time, or archived
to internal storage or additional Amazon services like Amazon S3 Glacier for longer-
term retention. Aggregation of log data across accounts and regions is possible, as is
automated alerting and notification when certain events are registered. AWS CloudTrail
log file integrity can also be enabled to hash all logs upon delivery and then monitor
them afterward as well.
Most major CSPs allow logs to be downloaded from their environment (e.g., leading SaaS
providers) or stored in a dedicated storage node (e.g., a dedicated S3 bucket). There are
also a number of third-party security event aggregation and analysis platforms available
for the cloud, including Sumo Logic2 and others. These services may offer teams a
simpler way to aggregate logs from multiple cloud services, and they often integrate
more readily with these services through provider APIs.
2
Sumo Logic is a registered trademark of Sumo Logic Inc.
To enable consistent workload monitoring and logging, It’s important to make the distinction between
many organizations need to create and enable a central cloud system monitoring and cloud environment
cloud log repository to store logs generated within monitoring. You must log and monitor systems
workloads. There are many ways to accomplish this, but just as you always have.
AWS has a unique agent, Amazon CloudWatch, that can
be installed into Amazon EC2 workloads. This agent forwards syslog and other standard
events to a dedicated Amazon CloudWatch logging group. From there, these logs can
be parsed and analyzed, or streamed to a different event management and monitoring
solution through streaming services like Amazon Kinesis Data Firehose.
For most organizations, the data export costs associated with large volumes of workload
logs can prove somewhat prohibitive to simply sending all logs back to on-premises
data collectors and SIEM tools. While this may work with a small volume of cloud
services and workloads, large organizations will eventually want to enable cloud-native
log collection and analysis tools instead.
• DHCP traffic
Analysts can use this data to detect unusual patterns of communication between
instances and workloads in the VPC environment, as well as specific malicious or
suspicious activities originating outside the cloud and targeting assets (for example,
SSH brute-force attempts). Keep in mind that enabling this type of logging can produce
a staggering quantity of event data, and you will need to leverage some sort of toolkit
(SIEM, security analytics, etc.) to build behavioral baselines for monitoring purposes.
• AWS Config—This configuration monitoring toolkit for your AWS systems can define
your baseline image, monitor systems continually and alert whenever a system’s
configuration changes. AWS Config is natively integrated into AWS, and it can
easily be set up to help keep your system state secure. Another key feature of AWS
Config is its inventory capability. One advantage of the cloud is that nothing can
hide, because all assets are 1) software-defined and 2) linked inextricably to the
CSP’s backplane. For this reason, the discovery and inventory elements of change
and configuration management should be easier than ever! In the case of AWS
Config, it doesn’t get much easier—the service just finds everything and then lets
you query AWS to see what you have. Recent additions to the AWS Config service
allow for automated remediation and alerting as well.
• Amazon CloudWatch—This service allows you to monitor data and events and
create alarms based on events in your AWS environment. Amazon CloudWatch,
which integrates with almost all AWS services, can collect and track metrics,
monitor log files, initiate alarms and automatically respond to changes in your
AWS environment. For this reason, it’s one of the most flexible monitoring tools
you can use.
• Amazon Detective—This service collects and aggregates logs across AWS resources
and performs deep analysis on them to detect behavior anomalies and other
events for faster and more efficient root-cause analysis and investigations. This
feature is still in preview as of early 2020.
• Adding context—If logs can be “tagged” as originating from a specific ISP or CSP,
that can help provide context on the use cases of the service. For example, logs
from identity management services like AWS Identity and Access Management
(IAM) have a specific user context, whereas events from Amazon EC2 may need
additional details about workloads to provide the proper context for evaluation.
Another area of focus for cloud events should be the originating point of cloud activity.
Security teams should consider a login from a new country or location where the
organization doesn’t do business or have users to be a very high priority alert. Many
cloud logs include enough detail to note where the login came from.
• Incident notifications from your CSP—This depends on your CSP model and
deployment type, as well as contractual SLAs and terms.
• Billing alarms—These are key! If you have a reasonable idea of a monthly billing
range, you can break this down to define “checkpoints” of what your bill should be
at any given time. If these thresholds are crossed, a billing alarm could alert you
and investigate what is causing the additional cost.
• IAM activity (logins in particular)—Monitor your user activity within the cloud. In
particular, monitor admins carefully, because these user credentials are prime
targets for attackers. Any nonfederated user access should also be a high priority.
• Cloud environment logs (e.g., AWS CloudTrail)—General API logs can tell you when
instances are created or changed, when storage attributes change and so on.
Focus on the types of events that could be problematic to the environment. These
event types include access or changes to critical assets, modification of identity
policies, deletion or changes to cryptographic keys, and so on.
• Priority 1
- Launching a workload that is not from an approved template
- Launching any containers from unapproved images in a repository
- Launching any assets in unapproved regions
- Modifying any IAM roles or policies
- Modifying or disabling cloud control plane logging or other security controls
- Logins to the web console (unauthorized)
• Priority 2
- Unusual user behaviors (trying to access unauthorized resources, etc.)
- Adding/updating new workload images
- Adding/updating new container images
- Logins to the web console (authorized)
- Updating/changing serverless configuration
• Priority 3
- Changes to security groups or network access control lists (ACLs)
- Updating/changing serverless function code
For example, AWS CloudTrail captures an enormous range of event data, and tools like
Amazon CloudWatch enable you to search for many different events. Table 1 on the next
page lists some examples of starting points.
Security teams also need to be proactive in securing the cloud environment. Security
operations and engineering teams should work with cloud operations and engineering
teams to implement more effective controls around:
• IAM and privileges (and credential security)—This can be one of the most difficult
areas to solidify in cloud security, because there are many types of privileges
and roles that can be defined. AWS has a service called AWS IAM Access Analyzer,
which is free and integrated into the AWS IAM platform. This service can help with
assessing any AWS native or custom IAM policies to determine where excessive or
unintended privilege allocation may be present based on AWS best practices and
assigned users/groups.
• Activity in specific regions—One of the best quick wins for security teams is
to purposefully disable all geographic regions not in use; a follow-up to this is
enabling explicit monitoring for cloud control plane logs (like AWS CloudTrail) to
look for any activity in regions marked as “not in use” or “disabled.” A common
tactic intruders use for malicious activities like cryptocurrency mining is to create
unauthorized assets and workloads in unused regions to “buy time” before
detection. Teams should consider any alert for activity in an unauthorized or
unused region a high priority.
Regardless of the tools chosen, SOC teams need to adapt their workflows and
monitoring processes to include as much log and event data from the cloud as possible.
This invariably requires significant effort to better learn and understand the patterns of
events and service interaction in the cloud environments chosen. Spending some time
each month or quarter developing “game day” or tabletop exercises to flesh out cloud
monitoring and response use cases is an excellent way to engage the SOC team in cloud
initiatives and improve the team’s skills and processes at the same time.
• Producing reports and metrics—Once evidence has been collected and cases
are underway or resolved, generating reports and metrics can take a lot of
analysts’ time.
• Automated forensic imaging of disk and memory from a suspect system, driven by
alerts triggered in network- and host-based anti-malware platforms and tools
A fair number of vendors and tools can help integrate automation activities and
unify disparate tools and platforms in use for detection and response. These include
Swimlane, Demisto, IBM Resilient Incident Response Platform3 and more, most of which
leverage APIs with other platforms and tools to allow them to share data and create
streamlined response workflows. Factors to consider when evaluating these automation
tools include maturity of the vendor, integration partners, alignment with SIEM and
event management, and ease of use and implementation.
3
wimlane is a trademark of Swimlane LLC; Demisto is a trademark of Demisto Inc.; IBM and IBM Resilient Incident Response Platform are registered
S
trademarks of International Business Machines Corp.
Conclusion
The cloud has a lot to offer in the way of security monitoring and visibility. Security
teams have the ability to capably monitor for both event-driven and behavior-driven
activity, and they now have a single environment they can query for all the cloud
control plane visibility they could want. Security teams need to adapt monitoring and
preventive/detection tools in some cases, although they might have more options due
to cloud-native and third-party controls and services that are rapidly expanding. Teams
can implement and monitor the entire spectrum of control areas, too, ranging from
network controls like firewalls and intrusion detection services to endpoint protection
and monitoring agents to vulnerability scanning continuously. With large-scale analytics
processing and numerous options to enable, collect, store and transmit log and
event data from their cloud assets and environment, teams can more readily analyze
everything happening in this part of the hybrid cloud network and correlate this data
with internal event information generated from existing security tools (some of which
may be covering both internal and public cloud space).
That said, there’s still a lot of work for SOC teams to do in reviewing events and building
detection and response use cases. Building effective correlation cases for cloud
monitoring can also be readily accomplished with the tools and services available today,
but it will take time and a better understanding for SOC teams to adapt to different
event sources and types.
One area of significant promise is automation—teams have all the event details they need,
as well as tools and services to store and process them. With SOAR solutions and cloud-
native processing and automation engines, security operations teams should see definitive
improvements in their detection and response capabilities, because the cloud is a unified
fabric with innumerable APIs to employ (for querying information and for performing
detection, response and mitigation). As infrastructure becomes progressively more software-
defined, this will be more and more important to security professionals everywhere.
Sponsor
Security operations teams looking to advance their visibility and detection-response in AWS must develop a continuous
monitoring strategy that includes cloud-native services and third-party solutions. Proactively assessing your AWS
environment for vulnerabilities and rapidly detecting unusual events or activity are key components of this strategy.
Amazon Security Hub can help aggregate, organize, and prioritize your security alerts to enable your continuous
monitoring strategy. In addition, Amazon Detective collects and aggregates logs across AWS resources and performs
deep analysis to detect behavior anomalies and other events for faster and more efficient root cause analysis and
investigations.
The integration of security information and event management (SIEM) and security orchestration automation and
response (SOAR) technologies can also help enhance detection and response. Due to the high costs of aggregating and
exporting data, organizations are implementing cloud-native SIEM tools to increase visibility into their environment. For
example, Sumo Logic’s Cloud-Native Machine Data Analytics Service is a SIEM solution that can generate continuous
machine learning and statistical baselines from Amazon GuardDuty’s threat detection service. Customers can then
use those baselines to benchmark, prioritize, and optimize security configuration and detection across their AWS
environment.
How AWS customers are leveraging Sumo Logic to enhance their security operations
Sumo Logic is a secure cloud-native analytics platform that can help improve security visibility and accelerate detection
and response across your AWS environment. Some of the ways that customers are leveraging Sumo Logic to enhance
their security posture include:
• Improve visibility across AWS: Sumo Logic can process more than 100 petabytes of data and handle over 20
million queries daily. It is an elastic solution that scales irrespective of data volume or number of users. It can also
handle a large variety of formats, whether structured, unstructured, or semi-structured. This allows for broad visibility
across your entire AWS environment.
Strengthen your AWS security with AWS services and third-party solutions. // 1
• Actionable insights through better context: Many AWS customers use Sumo Logic to distill thousands of log lines
into easy to understand patterns. With just a few clicks, you can compare and reduce those logs into just 3-4 cluster
patterns through their LogReduce and LogCompare functions. This can bring actionable insights by creating more
signal and less noise.
• Accelerate detection and response: Sumo Logic supports cross-functional collaboration by correlating data from
multiple data sources, showing data in the context of time-series metrics. This provides a single source of truth for
monitoring and troubleshooting in order to accelerate detection and response.
Securonix and Sonrai Security are other SIEM solutions available in AWS Marketplace. Securonix combines log
management, user and entity behavior analytics (UEBA), and security incident response into a single operations platform.
The Sonrai Public Cloud Security Platform finds and removes previously invisible cloud identity risk by finding excessive
privilege, privilege escalation risk, and separation of duty risk. Demisto offers a SOAR platform that allows security teams
to automate manual tasks, not only freeing up analysts to focus on more meaningful activities but also reducing mean
time to response (MTTR).
Strengthen your AWS security with AWS services and third-party solutions. // 2
Why use AWS Marketplace?
AWS Marketplace simplifies software licensing and procurement by offering thousands of software listings from
popular categories like Security, Networking, Storage, Business Intelligence, Machine Learning, Database, and DevOps.
Organizations can leverage offerings from independent security software vendors in AWS Marketplace to secure
applications, data, storage, networking, and more on AWS, and enable operational intelligence across their entire
environment.
Customers can use 1-Click deployment to quickly launch pre-configured software and choose software solutions in
both Amazon Machine Image (AMI) formats and SaaS subscriptions, with software entitlement options such as hourly,
monthly, annual, and multi-year.
AWS Marketplace is supported by a global team of security practitioners, solutions architects, product specialists, and
other experts to help security teams connect with the software and resources needed to prioritize security operations
in AWS.
How to get started with threat detection and incident response solutions in AWS Marketplace
Security teams are using AWS native services and seller solutions in AWS Marketplace to help build automated,
innovative, and secure solutions to address relevant use cases and further harden their cloud security posture. The
following solutions can help you get started:
Strengthen your AWS security with AWS services and third-party solutions. // 3