Incident Response in The Cloud: Dave Shackleford
Incident Response in The Cloud: Dave Shackleford
Dave Shackleford
Sr. Instructor
SANS Institute
@daveshackleford
Top Cloud Threats/Concerns: 1
#RSAC
Other
PREPARATION
Gather Info from Providers
#RSAC
8
More Info We Need from Providers
#RSAC
9
Planning for Cloud IR
#RSAC
First, ensure you have IAM enabled for response teams when needed
Create least privilege accounts to perform specific actions in the cloud when
needed (define a role for these, ideally, for “cross-account access”)
Enable MFA for these accounts
Enable write-once storage for logs, evidence
Leverage S3 Bucket Versioning for secure retention
Enable cloud-wide logging if available
10
Planning for Cloud IR (2)
#RSAC
Create a new Security Group (AWS) or NSG (Azure) that only allows:
Inbound connections from responders
Outbound connections if absolutely necessary
You can adjust as needed
Enable triggered metric-based alarms (AWS CloudWatch, for
example)
11
#RSAC
13
SaaS Incident Detection
#RSAC
Some SaaS providers may agree to share the log and audit trail data
with customers
Many, however, will not
This leads to two scenarios:
Log data from the SaaS CSP triggers an incident response scenario internally
using SIEM, Log Management, etc.
The CSP’s internal incident response process is triggered, and they notify the
consumer within some pre-specified SLA-defined period
CASB solutions can also help with this
IaaS Incident Detection
#RSAC
There are two definitive elements of IaaS incident detection and response:
CSP Incident Response: This applies to backend storage, networks, servers, and
virtualization infrastructure only
Consumer Incident Response: All consumer VMs and associated virtual networks
should produce logs identical to internal events
One advantage of the IaaS model is the ability to include security platforms
in the CSP infrastructure
Many IaaS providers like Amazon allow virtual appliances or other security-
specific systems to be installed and managed by the consumer
Some IaaS providers also provide a suite of security services as well
Example Controls: AWS CloudTrail
#RSAC
CloudTrail is a logging service that records any API calls made to AWS:
Identity of the API caller
Time of the API call
Source IP address of the API caller
Request parameters
Response elements returned by the AWS service
CloudTrail logging captures all requests made from the standard AWS
management console, command line tools, any AWS Software
Development Kits (SDKs) and other AWS services
Example Controls: Security Monkey
#RSAC
There are many types of events and information that can help
identify potential incidents in the cloud:
Incident notification from your CSP
Billing alarms
IAM activity (logins in particular)
Cloud environment logs (CloudTrail, for example)
CloudWatch Alarms (various other metrics)
Using a hosted or managed logging service can aid in detection of
unusual activity significantly
18
Log Details to Look For
#RSAC
19
#RSAC
CONTAINMENT/ERADICATION/RECOVERY
Containment
#RSAC
22
Evidence Capture
#RSAC
23
Building a SANS SIFT Workstation in the Cloud
#RSAC
24
A Forensic Process for Disk Analysis in EC2
#RSAC
25
The ThreatResponse Suite
#RSAC
26
Need a Step-by-Step Guide?
#RSAC
POST-INCIDENT ACTIVITY
Malware detection
Other
36