An identity centric approach to cloud investigation

An identity centric approach to cloud investigation

Identity is the new security perimeter. This is especially true for the cloud-native environments where most critical resources are just one hop away.
When you analyze the top 10 latest cloud breaches, the most common denominator is the compromise of identity accounts. In half of the breaches, an identity compromise is the source of the breach. In the other half, the source is a vulnerability or misconfiguration that eventually leads to an account compromise. The compromised account is then used to move laterally in the cloud environment, ultimately achieving the goal of data compromise or service disruption.
In this post, we’ll explore how AiStrike approaches cloud threat investigation and response through an identity-centric approach.
Before we delve further into cloud identity risks, let’s first define what a cloud identity is. In simple terms, any entity that can be assigned permission to initiate an activity is an identity. In the cloud ecosystem, this can be a user, a local account (i.e., root), a service account, a machine account, an API, or an instance profile attached to a host or container.
One of the biggest security challenges, we see in the cloud is overprivileged roles. Per the Microsoft 2023 State of Cloud Permissions Risks Report:
If you add all this up, we have:
The 2023 Gartner Cloud Security Governance Survey showed that 71% of the organizations are most concerned about cybersecurity incidents related to unauthorized data access. Investigation and response capabilities for on-premises environments are not optimized for the complexity of the shared responsibilities and supply chain relationships in the cloud deployments. To be efficient in the cloud, investigation and response require an identity centric approach to effectively follow the steps an attacker could take in the cloud.
AiStrike identity-centric approach to cloud investigation and response includes:
AiStrike discovers all forms of cloud identities – human and machine, enriches them with context, and builds behavior fingerprint to baseline normal and prioritize risk from unauthorized activities.
Some of our key use cases for cloud identity analytics include:
So, you have monitored for identity anomalies and found something unauthorized—what next? This is only 50% of the work; the rest involves understanding the impact, tracking down the origin of the issue, and initiating remediation to fix the issue strategically at the root cause. How can this be done at scale? What is the role of AI in simplifying and streamlining threat investigation and response focused on identities?
We will cover this in part two of the blog series, so please stay tuned for more.