SlideShare a Scribd company logo
1 of 33
SOC Meets Cloud: What Breaks,
What Changes, What to Do?
SESSION TRACK TITLE
Anton Chuvakin
Advisor at Office of the CISO
Google Cloud
Outline
• SOC + Cloud: A Primer
• What Stays the Same?
• What Breaks or Disappears?
• What Changes?
• What to Do?
SOC + Cloud: A Primer
Inspiration: you have a SOC or a Detection and
Response team, and suddenly
your organization embraces public cloud.
What do you do? First? Next?
What should you plan for?
What should you fear?
What should you strive for?
What is your endgame?
Was security consulted about cloud migration?
Involved in planning?
Informed in advance?
A security operations center provides
centralized and consolidated
cybersecurity incident prevention,
detection and response capabilities.
–Gartner
First Things First: A SOC is Still … a SOC :-)
SOC is first a TEAM. Next a PROCESS. And it uses TECHNOLOGY too.
Second, Cloud Is More Secure Than Most Data Centers
Your SOC DNA?
1990s NOC and Help Center Security Engineering Team
What to Expect!?
SOC / security with 1990s DNA
+
Cloud-native IT/business with 2020s DNA
=
Fun, Tricky problems! :-)
SOC + Cloud: What Stays
The Same?
Mostly Stay the Same
SOC value
Detection and
response still as
important
SOC broad
approaches
We collect telemetry,
analyze, detect,
triage, respond. Yes,
this is true even for a
very “shift-lefty”
environments!
Threats
Mostly the same, but
YMMV
Security
fundamentals
Attackers attack, we
defend / detect and
respond
A Big One: Threat Assessment / Threat Models
● A curiously hard question!
● Cloud threats are on-premise threats … but against cloud
assets
● Cloud threats are the same … but the ranking is different!
● Cloud threats are unique and different … but my cloud is just
VMs?
● Cloud provider takes care of threats :-)
Google Threat Horizons Report #7 (2023)
Compromise, direct evidence
of threat activities
A mix of old threats
in the cloud (many) and
New cloud threats (few)
SOC + Cloud: What Breaks
or Disappears?
Base: Total Participants (n=400)
Q305. First, think about what’s required to protect on-prem environments vs. cloud environments. Which would you say is more difficult for your organization?
Q314. Below are some ways cloud and on-prem security could differ for your org. For each, which type of environment is greater?
Level of
Difficulty
Level of
Risk
The average security pro
says cloud security is
slightly more difficult than
on-prem and involves a
higher level of risk.
Is it because most of them
don’t know cloud?
Greater on
Cloud
Greater
On-prem
37%
30%
48%
35%
Cloud vs. On-Prem Security Perceptions
Similar
Greater on
Cloud
Greater
On-prem
Similar
Mostly Break / Disappear
Manual IT
processes
Deployment, changes,
updates to
infrastructure;
“Everything as Code”
Ops - Dev
Clear separation
between Dev and
Ops, no more “just
call the sysadmin”;
more dealing with
developers
Hardware
Duh! This is a bit
obvious, but it does
affect architecting
D&R
Asset model
No more “what is this
IP”? Where is this
server located?
Traditional SOC Monitors Cloud, This Happens!
● Teams lacking cloud skills
● Uncommon telemetry collection methods
● Log data volumes may be high
● Ill-fitting tools, alien licensing models
● Alien detection context (!)
● Lack of clarity on cloud detection use cases
● Governance sprawl
● Lack of input from security into cloud decisions
● Cloud vulnerabilities are … different.
SOC + Cloud: What
Changes?
Challenges with D&R in the Cloud
Joint nature
Many (but not all) cloud incidents will involve a CSP,
and many will involve a client, a cloud provider and one
or more security service providers
Skills Cloud D&R requires both solid security detection and
response skills and equally solid cloud native
technologies skills
Data In many cases, telemetry, logs, traces data won’t be
available or won’t be available via familiar mechanisms
Change in Interesting Ways
Automation
SOAR works better, IT
is ahead in
automation
Analyst skills
From Windows and
packets to containers,
CI/CD and cloud IAM;
knowledge of how IT
works now
Applications
Less infrastructure
security, more
application security
(also see:
developers!)
Data Sources
Logs, EDR, network
traffic rebalance,
observability arrives.
Logs still lead!
Tools Change: Learn IAM. Really, That’s The Message :-)
“Manage access to projects, folders, and
organizations”
“How to grant, change, and revoke a
principal's access to a single service account.”
“Custom roles: Roles that you create to tailor
permissions to the needs of your organization
when predefined roles don't meet your needs.”
“Our org has to grow its public
cloud skills and knowledge to
succeed long-term”
Base: Total Participants (n=400)
“Agree” % = Agree + strongly agree, 5-pt. scale
Q410: How much do you agree or disagree with the following?
Cloud Skills for On-premise SOC Immigrants...
83%
“Our security team's cloud-
specific knowledge is limited
and needs to grow”
“Professionals with cloud-
specific security skills are
scarce and difficult to find”
75% 72%
Agree: Agree: Agree:
Data Sources for On-premise SOC Immigrants...
● NEW MONITORING SUBJECTS
○ Virtual machines [on a hypervisor you don’t own]
○ Containers
○ Functions and services
○ SaaS services
● NEW MONITORING DATA SOURCES
○ Cloud platform logs (e.g. GCP Cloud Audit Log)
○ Various other logs
○ Observability (in-app telemetry, essentially logs)
● NEW MONITORING ASSET CONTEXT
○ Account, resource group, distinguished names (sir? :-))
Investigation
Triage
Collection Detection
Incident
Response
Without logs it’s impossible to trace or detect a potential threat.
● Identify data sources and determine what to collect
● Configure logging and other data sources
● Develop processes for ingesting and normalizing data from various sources
● Implement data quality checks and data validation processes
● Implement data retention policies to cover security and compliance
Side note: Classic SOC Wisdom: Collection …
Shared D&R for On-premise SOC Immigrants...
● “CSP does this, client does that”
● Easy huh? Well, no…
● Example: detection and shared responsibility
See a Modern IT Practice? Steal it for Your SOC!
Adapt to this FIRST... … Steal SECOND!
CI/CD process Applications change, need
good asset coverage and
vulnerability context
CI/CD for detections
IT automation Need to integrate to not be
left behind
SOAR and friends,
security ops automation
Everything as code Absorb new context around
infrastructure
Detection as code
What Changes? Use case / Source / Methods
1 2 3
1 2 3
TOOLS: There is a Lot of Cloud - IaaS, PaaS, SaaS
EDR NDR Logs CASB
IaaS OK (*) OK (*) OK NO (*)
PaaS NO Sort of OK Sort of
SaaS NO NO OK OK
Fortunately, SOAR works with all of them...
Cloud: Good News for Your SOC!
● Much easier, less expensive, more scalable
SIEM
● Easier SOAR, improved EDR
● Robust (*) API for log and telemetry access
● Some threat detection is done for you (e.g.
VMTD)
● Security will get better fast all around you.
SOC + Cloud: What to Do?
SOC: Lessons from Ops or from Dev?
“The joke is an ops is 10 years behind dev, and I would say
security is 10 years behind ops, if I had to estimate.”
-- Kelly Shortridge (source: Kelly on Cloud Security Podcast)
“You can’t “ops” your way to SOC success, but you can “dev” your
way there”
-- Anton Chuvakin (source: “Kill SOC Toil, Do SOC Eng” blog)
Example Cloud Detection Use Cases
Recommendations
● Cloud is hard, especially if you don’t understand it? Learn cloud before complaining about it. Focus
on IAM, learn new detection context
● If your cloud use is similar to on-premise, then your threats are similar. Assess your cloud threats!
● Create/refine your cloud detection use cases
● Evolve SOC to more automation to catch up with modern cloud IT; evolve to integrated D&R
content
● Rely more on CSP data feeds and tools; link them to SOC tools
● Focus on cloud hygiene and posture: this helps your D&R. Cloud calls for more automation, and
also makes automation easier. Kill toil, automate!
● Start with what you know, but evolve to the cloud native way! Evolve to Autonomic Security
Operations, engineering-led D&R (how?!)

More Related Content

Similar to SOC Meets Cloud: What Breaks, What Changes, What to Do?

Presentation copy
Presentation   copyPresentation   copy
Presentation copyAdel Zalok
 
Zero Trust 20211105
Zero Trust 20211105 Zero Trust 20211105
Zero Trust 20211105 Thomas Treml
 
Cloud computing security - Insights
Cloud computing security - InsightsCloud computing security - Insights
Cloud computing security - Insightsgiorgiacaleffi
 
Security Operations Cloud vs On Prem ISC2 Bangalore SlideShare.pptx
Security Operations  Cloud vs On Prem ISC2 Bangalore SlideShare.pptxSecurity Operations  Cloud vs On Prem ISC2 Bangalore SlideShare.pptx
Security Operations Cloud vs On Prem ISC2 Bangalore SlideShare.pptxVikas Singh Yadav
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 
Agenda EuroCloud dogodka 14.septembra
Agenda EuroCloud dogodka 14.septembraAgenda EuroCloud dogodka 14.septembra
Agenda EuroCloud dogodka 14.septembraZeleno d.o.o.
 
Serverless security - how to protect what you don't see?
Serverless security - how to protect what you don't see?Serverless security - how to protect what you don't see?
Serverless security - how to protect what you don't see?Sqreen
 
Comprehensive Cloud Security Requires an Automated Approach
Comprehensive Cloud Security Requires an Automated ApproachComprehensive Cloud Security Requires an Automated Approach
Comprehensive Cloud Security Requires an Automated ApproachCloudPassage
 
Threat Hunting, Detection, and Incident Response in the Cloud
Threat Hunting, Detection, and Incident Response in the CloudThreat Hunting, Detection, and Incident Response in the Cloud
Threat Hunting, Detection, and Incident Response in the CloudBen Johnson
 
Why the cloud is more secure than your existing systems
Why the cloud is more secure than your existing systemsWhy the cloud is more secure than your existing systems
Why the cloud is more secure than your existing systemsErnest Mueller
 
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...Livingstone Advisory
 
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton ChuvakinAnton Chuvakin
 
System Security on Cloud
System Security on CloudSystem Security on Cloud
System Security on CloudTu Pham
 
UTSpeaks: Clearing up the Cloud - How should we navigate the pitfalls of IT’s...
UTSpeaks: Clearing up the Cloud - How should we navigate the pitfalls of IT’s...UTSpeaks: Clearing up the Cloud - How should we navigate the pitfalls of IT’s...
UTSpeaks: Clearing up the Cloud - How should we navigate the pitfalls of IT’s...University of Technology, Sydney
 
Using Splunk or ELK for Auditing AWS/GCP/Azure Security posture
Using Splunk or ELK for Auditing AWS/GCP/Azure Security postureUsing Splunk or ELK for Auditing AWS/GCP/Azure Security posture
Using Splunk or ELK for Auditing AWS/GCP/Azure Security postureCloudVillage
 
Using Splunk/ELK for auditing AWS/GCP/Azure security posture
Using Splunk/ELK for auditing AWS/GCP/Azure security postureUsing Splunk/ELK for auditing AWS/GCP/Azure security posture
Using Splunk/ELK for auditing AWS/GCP/Azure security postureJose Hernandez
 

Similar to SOC Meets Cloud: What Breaks, What Changes, What to Do? (20)

Presentation copy
Presentation   copyPresentation   copy
Presentation copy
 
Zero Trust 20211105
Zero Trust 20211105 Zero Trust 20211105
Zero Trust 20211105
 
cloud-computing-security.ppt
cloud-computing-security.pptcloud-computing-security.ppt
cloud-computing-security.ppt
 
Cloud computing security - Insights
Cloud computing security - InsightsCloud computing security - Insights
Cloud computing security - Insights
 
New Horizons SCYBER Presentation
New Horizons SCYBER PresentationNew Horizons SCYBER Presentation
New Horizons SCYBER Presentation
 
Security Operations Cloud vs On Prem ISC2 Bangalore SlideShare.pptx
Security Operations  Cloud vs On Prem ISC2 Bangalore SlideShare.pptxSecurity Operations  Cloud vs On Prem ISC2 Bangalore SlideShare.pptx
Security Operations Cloud vs On Prem ISC2 Bangalore SlideShare.pptx
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Agenda EuroCloud dogodka 14.septembra
Agenda EuroCloud dogodka 14.septembraAgenda EuroCloud dogodka 14.septembra
Agenda EuroCloud dogodka 14.septembra
 
Serverless security - how to protect what you don't see?
Serverless security - how to protect what you don't see?Serverless security - how to protect what you don't see?
Serverless security - how to protect what you don't see?
 
Comprehensive Cloud Security Requires an Automated Approach
Comprehensive Cloud Security Requires an Automated ApproachComprehensive Cloud Security Requires an Automated Approach
Comprehensive Cloud Security Requires an Automated Approach
 
Threat Hunting, Detection, and Incident Response in the Cloud
Threat Hunting, Detection, and Incident Response in the CloudThreat Hunting, Detection, and Incident Response in the Cloud
Threat Hunting, Detection, and Incident Response in the Cloud
 
Why the cloud is more secure than your existing systems
Why the cloud is more secure than your existing systemsWhy the cloud is more secure than your existing systems
Why the cloud is more secure than your existing systems
 
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
 
Cloud Computing Security Issues
Cloud Computing Security Issues Cloud Computing Security Issues
Cloud Computing Security Issues
 
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
 
System Security on Cloud
System Security on CloudSystem Security on Cloud
System Security on Cloud
 
UTSpeaks: Clearing up the Cloud - How should we navigate the pitfalls of IT’s...
UTSpeaks: Clearing up the Cloud - How should we navigate the pitfalls of IT’s...UTSpeaks: Clearing up the Cloud - How should we navigate the pitfalls of IT’s...
UTSpeaks: Clearing up the Cloud - How should we navigate the pitfalls of IT’s...
 
Incident response in cloud environments
Incident response in cloud environmentsIncident response in cloud environments
Incident response in cloud environments
 
Using Splunk or ELK for Auditing AWS/GCP/Azure Security posture
Using Splunk or ELK for Auditing AWS/GCP/Azure Security postureUsing Splunk or ELK for Auditing AWS/GCP/Azure Security posture
Using Splunk or ELK for Auditing AWS/GCP/Azure Security posture
 
Using Splunk/ELK for auditing AWS/GCP/Azure security posture
Using Splunk/ELK for auditing AWS/GCP/Azure security postureUsing Splunk/ELK for auditing AWS/GCP/Azure security posture
Using Splunk/ELK for auditing AWS/GCP/Azure security posture
 

More from Anton Chuvakin

Future of SOC: More Security, Less Operations
Future of SOC: More Security, Less OperationsFuture of SOC: More Security, Less Operations
Future of SOC: More Security, Less OperationsAnton Chuvakin
 
Meet the Ghost of SecOps Future by Anton Chuvakin
Meet the Ghost of SecOps Future by Anton ChuvakinMeet the Ghost of SecOps Future by Anton Chuvakin
Meet the Ghost of SecOps Future by Anton ChuvakinAnton Chuvakin
 
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...Anton Chuvakin
 
SOC Lessons from DevOps and SRE by Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton ChuvakinSOC Lessons from DevOps and SRE by Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton ChuvakinAnton Chuvakin
 
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 BoothHey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 BoothAnton Chuvakin
 
20 Years of SIEM - SANS Webinar 2022
20 Years of SIEM - SANS Webinar 202220 Years of SIEM - SANS Webinar 2022
20 Years of SIEM - SANS Webinar 2022Anton Chuvakin
 
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2020  Groovy SOC Tunes aka Modern SOC TrendsSOCstock 2020  Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2020 Groovy SOC Tunes aka Modern SOC TrendsAnton Chuvakin
 
Modern SOC Trends 2020
Modern SOC Trends 2020Modern SOC Trends 2020
Modern SOC Trends 2020Anton Chuvakin
 
Anton's 2020 SIEM Best and Worst Practices - in Brief
Anton's 2020 SIEM Best and Worst Practices - in BriefAnton's 2020 SIEM Best and Worst Practices - in Brief
Anton's 2020 SIEM Best and Worst Practices - in BriefAnton Chuvakin
 
Five SIEM Futures (2012)
Five SIEM Futures (2012)Five SIEM Futures (2012)
Five SIEM Futures (2012)Anton Chuvakin
 
RSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics PresentationRSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics PresentationAnton Chuvakin
 
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinFive Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinAnton Chuvakin
 
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinFive Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinAnton Chuvakin
 
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton ChuvakinPractical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton ChuvakinAnton Chuvakin
 
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton ChuvakinLog management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton ChuvakinAnton Chuvakin
 
On Content-Aware SIEM by Dr. Anton Chuvakin
On Content-Aware SIEM by Dr. Anton ChuvakinOn Content-Aware SIEM by Dr. Anton Chuvakin
On Content-Aware SIEM by Dr. Anton ChuvakinAnton Chuvakin
 
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton Chuvakin
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton ChuvakinMaking Log Data Useful: SIEM and Log Management Together by Dr. Anton Chuvakin
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton ChuvakinAnton Chuvakin
 

More from Anton Chuvakin (20)

Future of SOC: More Security, Less Operations
Future of SOC: More Security, Less OperationsFuture of SOC: More Security, Less Operations
Future of SOC: More Security, Less Operations
 
Meet the Ghost of SecOps Future by Anton Chuvakin
Meet the Ghost of SecOps Future by Anton ChuvakinMeet the Ghost of SecOps Future by Anton Chuvakin
Meet the Ghost of SecOps Future by Anton Chuvakin
 
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
 
SOC Lessons from DevOps and SRE by Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton ChuvakinSOC Lessons from DevOps and SRE by Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton Chuvakin
 
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 BoothHey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
 
20 Years of SIEM - SANS Webinar 2022
20 Years of SIEM - SANS Webinar 202220 Years of SIEM - SANS Webinar 2022
20 Years of SIEM - SANS Webinar 2022
 
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2020  Groovy SOC Tunes aka Modern SOC TrendsSOCstock 2020  Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
 
Modern SOC Trends 2020
Modern SOC Trends 2020Modern SOC Trends 2020
Modern SOC Trends 2020
 
Anton's 2020 SIEM Best and Worst Practices - in Brief
Anton's 2020 SIEM Best and Worst Practices - in BriefAnton's 2020 SIEM Best and Worst Practices - in Brief
Anton's 2020 SIEM Best and Worst Practices - in Brief
 
Generic siem how_2017
Generic siem how_2017Generic siem how_2017
Generic siem how_2017
 
Tips on SIEM Ops 2015
Tips on SIEM Ops 2015Tips on SIEM Ops 2015
Tips on SIEM Ops 2015
 
Five SIEM Futures (2012)
Five SIEM Futures (2012)Five SIEM Futures (2012)
Five SIEM Futures (2012)
 
RSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics PresentationRSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics Presentation
 
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinFive Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
 
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinFive Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
 
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton ChuvakinPractical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
 
SIEM Primer:
SIEM Primer:SIEM Primer:
SIEM Primer:
 
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton ChuvakinLog management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
 
On Content-Aware SIEM by Dr. Anton Chuvakin
On Content-Aware SIEM by Dr. Anton ChuvakinOn Content-Aware SIEM by Dr. Anton Chuvakin
On Content-Aware SIEM by Dr. Anton Chuvakin
 
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton Chuvakin
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton ChuvakinMaking Log Data Useful: SIEM and Log Management Together by Dr. Anton Chuvakin
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton Chuvakin
 

Recently uploaded

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Recently uploaded (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

SOC Meets Cloud: What Breaks, What Changes, What to Do?

  • 1. SOC Meets Cloud: What Breaks, What Changes, What to Do? SESSION TRACK TITLE Anton Chuvakin Advisor at Office of the CISO Google Cloud
  • 2. Outline • SOC + Cloud: A Primer • What Stays the Same? • What Breaks or Disappears? • What Changes? • What to Do?
  • 3. SOC + Cloud: A Primer
  • 4. Inspiration: you have a SOC or a Detection and Response team, and suddenly your organization embraces public cloud. What do you do? First? Next? What should you plan for? What should you fear? What should you strive for? What is your endgame? Was security consulted about cloud migration? Involved in planning? Informed in advance?
  • 5. A security operations center provides centralized and consolidated cybersecurity incident prevention, detection and response capabilities. –Gartner First Things First: A SOC is Still … a SOC :-) SOC is first a TEAM. Next a PROCESS. And it uses TECHNOLOGY too.
  • 6. Second, Cloud Is More Secure Than Most Data Centers
  • 7. Your SOC DNA? 1990s NOC and Help Center Security Engineering Team
  • 8. What to Expect!? SOC / security with 1990s DNA + Cloud-native IT/business with 2020s DNA = Fun, Tricky problems! :-)
  • 9. SOC + Cloud: What Stays The Same?
  • 10.
  • 11. Mostly Stay the Same SOC value Detection and response still as important SOC broad approaches We collect telemetry, analyze, detect, triage, respond. Yes, this is true even for a very “shift-lefty” environments! Threats Mostly the same, but YMMV Security fundamentals Attackers attack, we defend / detect and respond
  • 12. A Big One: Threat Assessment / Threat Models ● A curiously hard question! ● Cloud threats are on-premise threats … but against cloud assets ● Cloud threats are the same … but the ranking is different! ● Cloud threats are unique and different … but my cloud is just VMs? ● Cloud provider takes care of threats :-)
  • 13. Google Threat Horizons Report #7 (2023) Compromise, direct evidence of threat activities A mix of old threats in the cloud (many) and New cloud threats (few)
  • 14. SOC + Cloud: What Breaks or Disappears?
  • 15. Base: Total Participants (n=400) Q305. First, think about what’s required to protect on-prem environments vs. cloud environments. Which would you say is more difficult for your organization? Q314. Below are some ways cloud and on-prem security could differ for your org. For each, which type of environment is greater? Level of Difficulty Level of Risk The average security pro says cloud security is slightly more difficult than on-prem and involves a higher level of risk. Is it because most of them don’t know cloud? Greater on Cloud Greater On-prem 37% 30% 48% 35% Cloud vs. On-Prem Security Perceptions Similar Greater on Cloud Greater On-prem Similar
  • 16. Mostly Break / Disappear Manual IT processes Deployment, changes, updates to infrastructure; “Everything as Code” Ops - Dev Clear separation between Dev and Ops, no more “just call the sysadmin”; more dealing with developers Hardware Duh! This is a bit obvious, but it does affect architecting D&R Asset model No more “what is this IP”? Where is this server located?
  • 17. Traditional SOC Monitors Cloud, This Happens! ● Teams lacking cloud skills ● Uncommon telemetry collection methods ● Log data volumes may be high ● Ill-fitting tools, alien licensing models ● Alien detection context (!) ● Lack of clarity on cloud detection use cases ● Governance sprawl ● Lack of input from security into cloud decisions ● Cloud vulnerabilities are … different.
  • 18. SOC + Cloud: What Changes?
  • 19. Challenges with D&R in the Cloud Joint nature Many (but not all) cloud incidents will involve a CSP, and many will involve a client, a cloud provider and one or more security service providers Skills Cloud D&R requires both solid security detection and response skills and equally solid cloud native technologies skills Data In many cases, telemetry, logs, traces data won’t be available or won’t be available via familiar mechanisms
  • 20. Change in Interesting Ways Automation SOAR works better, IT is ahead in automation Analyst skills From Windows and packets to containers, CI/CD and cloud IAM; knowledge of how IT works now Applications Less infrastructure security, more application security (also see: developers!) Data Sources Logs, EDR, network traffic rebalance, observability arrives. Logs still lead!
  • 21. Tools Change: Learn IAM. Really, That’s The Message :-) “Manage access to projects, folders, and organizations” “How to grant, change, and revoke a principal's access to a single service account.” “Custom roles: Roles that you create to tailor permissions to the needs of your organization when predefined roles don't meet your needs.”
  • 22. “Our org has to grow its public cloud skills and knowledge to succeed long-term” Base: Total Participants (n=400) “Agree” % = Agree + strongly agree, 5-pt. scale Q410: How much do you agree or disagree with the following? Cloud Skills for On-premise SOC Immigrants... 83% “Our security team's cloud- specific knowledge is limited and needs to grow” “Professionals with cloud- specific security skills are scarce and difficult to find” 75% 72% Agree: Agree: Agree:
  • 23. Data Sources for On-premise SOC Immigrants... ● NEW MONITORING SUBJECTS ○ Virtual machines [on a hypervisor you don’t own] ○ Containers ○ Functions and services ○ SaaS services ● NEW MONITORING DATA SOURCES ○ Cloud platform logs (e.g. GCP Cloud Audit Log) ○ Various other logs ○ Observability (in-app telemetry, essentially logs) ● NEW MONITORING ASSET CONTEXT ○ Account, resource group, distinguished names (sir? :-))
  • 24. Investigation Triage Collection Detection Incident Response Without logs it’s impossible to trace or detect a potential threat. ● Identify data sources and determine what to collect ● Configure logging and other data sources ● Develop processes for ingesting and normalizing data from various sources ● Implement data quality checks and data validation processes ● Implement data retention policies to cover security and compliance Side note: Classic SOC Wisdom: Collection …
  • 25. Shared D&R for On-premise SOC Immigrants... ● “CSP does this, client does that” ● Easy huh? Well, no… ● Example: detection and shared responsibility
  • 26. See a Modern IT Practice? Steal it for Your SOC! Adapt to this FIRST... … Steal SECOND! CI/CD process Applications change, need good asset coverage and vulnerability context CI/CD for detections IT automation Need to integrate to not be left behind SOAR and friends, security ops automation Everything as code Absorb new context around infrastructure Detection as code
  • 27. What Changes? Use case / Source / Methods 1 2 3 1 2 3
  • 28. TOOLS: There is a Lot of Cloud - IaaS, PaaS, SaaS EDR NDR Logs CASB IaaS OK (*) OK (*) OK NO (*) PaaS NO Sort of OK Sort of SaaS NO NO OK OK Fortunately, SOAR works with all of them...
  • 29. Cloud: Good News for Your SOC! ● Much easier, less expensive, more scalable SIEM ● Easier SOAR, improved EDR ● Robust (*) API for log and telemetry access ● Some threat detection is done for you (e.g. VMTD) ● Security will get better fast all around you.
  • 30. SOC + Cloud: What to Do?
  • 31. SOC: Lessons from Ops or from Dev? “The joke is an ops is 10 years behind dev, and I would say security is 10 years behind ops, if I had to estimate.” -- Kelly Shortridge (source: Kelly on Cloud Security Podcast) “You can’t “ops” your way to SOC success, but you can “dev” your way there” -- Anton Chuvakin (source: “Kill SOC Toil, Do SOC Eng” blog)
  • 33. Recommendations ● Cloud is hard, especially if you don’t understand it? Learn cloud before complaining about it. Focus on IAM, learn new detection context ● If your cloud use is similar to on-premise, then your threats are similar. Assess your cloud threats! ● Create/refine your cloud detection use cases ● Evolve SOC to more automation to catch up with modern cloud IT; evolve to integrated D&R content ● Rely more on CSP data feeds and tools; link them to SOC tools ● Focus on cloud hygiene and posture: this helps your D&R. Cloud calls for more automation, and also makes automation easier. Kill toil, automate! ● Start with what you know, but evolve to the cloud native way! Evolve to Autonomic Security Operations, engineering-led D&R (how?!)