The recent Capital One Cyber Incident provides us with yet another reminder of the dangers of becoming “cloud blind” as applications and data move to the cloud. Much has been written about the potential impact and cost of this cyberattack, but rather than focus on impact, let’s look at what readily available resources you have at your disposal that can help to ensure that your company doesn’t make these kinds of headlines.

In this blog we’re going to briefly look at how flow data can be leveraged to uncover security threats, the suspicious and malicious behaviors that lead to and describe cyberattacks. We’ll look at three flow-based capabilities that virtually any organization can leverage.

  1. The “Misconfigured Firewall”

Capital One has acknowledged that they missed, but quickly corrected, the firewall configuration issue that ultimately gave the hacker her way in. Are you listening to your firewalls? Frequently when people think about collecting NetFlow, IPFIX, and other forms of flow data, they think about watching the Ingress traffic on edge routers to monitor traffic volumes. There’s certainly nothing wrong with this type of network telemetry but why stop there? Many firewall vendors can export their own flows that contain more than basic descriptions of the traffic flowing through the firewall, they also provide important security information such as firewall error and event codes. Listen to your firewalls.

  1. Tracking Access to Cloud Resources

While the Capital One vulnerability wasn’t specific to the cloud, the data that was compromised did reside within folders in a cloud storage space. If you are housing sensitive information in the cloud, are you monitoring who’s accessing the devices that host that data? For example, Amazon’s VPC Flow Logs can be used to describe the IP traffic for a VPC, a subnet, or a network interface. Listen to your cloud resources. But let’s not just stop with basic conversation monitoring, let’s make sure we’re aware of whether any of those conversations pose a potential security threat. This can be accomplished via:

  1. Black/White Listing

An advanced flow monitoring system will allow you to compare the observed conversations to public or custom blacklists to ensure that your cloud resources aren’t initiating communication with known bad actors, a sure sign that exfiltration is taking place. Alternatively, a flow monitoring system that’s been designed with security in mind will allow you to create profiles (sometimes referred to as traffic groups) that describe acceptable users and use and notify you when profile exceptions have been observed. If the unauthorized user is someone on your network, imagine the power of knowing their user id, IP and MAC addresses, even the switch port that they are attached to. Listening to your flow data means more than just counting traffic volumes. Sometimes the who, what, and where matter far more than the, how much.

Identify Cyberattacks

Enriched flow records can provide valuable insights into security and threats. You have the data sources already. Are you listening?

Make the good kind of headlines for your company and your team, click here to learn more about how to leverage enriched flow in your environment.

About The Author

Avatar

management and security threat hunting.

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

Do NOT follow this link or you will be banned from the site!
Close