aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • Public Cloud
  • Solutions

Introducing Community Security Analytics

  • aster.cloud
  • March 11, 2022
  • 6 minute read

As more organizations embrace the principles of Autonomic Security Operations, we continue to research and develop new initiatives that can simplify the adoption of a continuous detection and continuous response (CD/CR) workflow for Security Operations teams. To this end, we’re excited to announce Community Security Analytics (CSA), a set of open-sourced queries and rules designed for self-service security analytics designed to help detect common cloud-based threats. We believe that fostering a community around standardizing and sharing cloud security analytics across our portfolio of offerings can help improve detective capabilities – giving threat researchers, threat hunters, security analysts, and data governance teams a place to collaborate, while also leveraging our cloud-native threat prevention and detection capabilities by Security Command Center.

With Google Cloud, you have a secure foundation which you can directly control and independently audit & verify. This transparency and auditability allows you to verify proper access, and also detect potential threats to your data and workloads early on before it becomes a problem. Google Cloud services leave audit trails, be it administrators’ activity or users data access using Cloud Audit Logs, in addition to VM logs, application/container logs, and network logs, depending on the service. However, analyzing this plethora of voluminous yet valuable logs quickly becomes a data challenge. Assuming you’re already collecting security-relevant logs, there’s still work to be done to understand the activity they describe, and make sense of it all.


Partner with aster.cloud
for your next big idea.
Let us know here.



From our partners:

CITI.IO :: Business. Institutions. Society. Global Political Economy.
CYBERPOGO.COM :: For the Arts, Sciences, and Technology.
DADAHACKS.COM :: Parenting For The Rest Of Us.
ZEDISTA.COM :: Entertainment. Sports. Culture. Escape.
TAKUMAKU.COM :: For The Hearth And Home.
ASTER.CLOUD :: From The Cloud And Beyond.
LIWAIWAI.COM :: Intelligence, Inside and Outside.
GLOBALCLOUDPLATFORMS.COM :: For The World's Computing Needs.
FIREGULAMAN.COM :: For The Fire In The Belly Of The Coder.
ASTERCASTER.COM :: Supra Astra. Beyond The Stars.
BARTDAY.COM :: Prosperity For Everyone.

1 Community Security Analytics.jpg

Your Security Operations teams can use CSA to get started with analyzing your Google Cloud logs to audit recent behavior and help detect threats to your workloads. We’ve partnered with the MITRE Engenuity’s Center for Threat-Informed Defense, CYDERES (the security-as-a-service division of Fishtech Group), and a variety of contributing customers to develop a sample set of analytics and kick-start the development of the community. Leveraging the collective knowledge of the community, other organizations can use these queries and customize them to their own requirements.

CSA queries are mapped to the MITRE ATT&CK® framework of tactics, techniques and procedures (TTPs) to help you evaluate their applicability in your environment and include them in your threat model coverage. These queries can be run using either cloud-native or third-party analytics tools. The initial CSA release offers detections in the form of YARA-L rules for Chronicle, and SQL queries for BigQuery, with more formats to follow based on community feedback.

Read More  How To Develop Global Multiplayer Games Using Cloud Spanner

You can use CSA to further investigate high-fidelity security findings from Security Command Center (SCC) and correlate them with logs for decision-making. For example, you may use a CSA query to get the list of admin activity performed by a newly created service account key flagged by Security Command Center in order to validate any malicious activity.

It’s important to note that the detection queries provided by CSA will be self-managed and you may need to tune to minimize alert noise. If you’re looking for managed and advanced detections, take a look at SCC Premium’s growing threat detection suite (Container Threat Detection, Event Threat Detection and VM Threat Detection) which provides a list of regularly-updated managed detectors designed to identify threats within your systems in near real-time.

CSA is not meant to be a comprehensive, managed set of threat detections, but a collection of community-contributed sample analytics to give examples of essential detective controls, based on cloud techniques. Use CSA in conjunction with our threat detection and response capabilities (e.g. Security Command Center, Chronicle, BigQuery, Siemplify, or third-party SIEM) in conjunction with our threat prevention capabilities (e.g. Security Command Center, Cloud Armor, BeyondCorp).

Get Started with CSA

We’re releasing CSA with 40+ security use cases reflecting some of the most important questions we think organizations should ask of their logs, inspired by real-world questions we frequently get from organizations. Depending on the underlying activity type and log sources, CSA security questions are grouped in 6 different categories:

  1. Login & Access Patterns e.g. Who is accessing resources and from where? Are they impersonating other identities? Any excessive login failures?
  2. IAM, Keys & Secrets Changes e.g. Any changes to IAM policies? Any permissions granted over a sensitive service account? Any service account keys created by non-approved identities? Any cross-project or cross-org permissions granted?
  3. Cloud Provisioning Activity e.g. Any sensitive network resources modified like Firewall rules or VPN tunnels? Any changes made to logging settings? What about org policies?
  4. Cloud Workload Usage e.g. Any unusually high API usage by any user identity? Any excessive runaway costs signaling suspicious activity?
  5. Data Usage e.g. What BigQuery datasets and tables are most frequently accessed and by whom? Any destructive queries?
  6. Network Activity e.g. Any hosts reaching out to too many other hosts or ports in a given timeframe? Any connections from a new IP to an in-scope network for say PCI? Any web vulnerability exploit attempt?
Read More  Fedora Linux 36 Now Generally Available

To get started, browse the table of detections in the repo. Each indexed row is a specific question to help detect a particular cloud security threat, audit cloud usage and data access for compliance, or respond to a security incident. The corresponding use cases (audit, detect, respond) are highlighted in each row, along with the underlying log source, and the corresponding MITRE ATT&CK® technique, whenever applicable. Click on any particular detection to navigate to its doc page where the corresponding SQL query and YARA-L rule is linked, as well as steps to reproduce the triggering event in order to continuously test detection accuracy. Let’s look at an example….

CSA Example: Any excessive login failures from any user?

Take a look at detection #1.03,  “Excessive login failures from any user identity”:

2 Community Security Analytics v1.jpg

At a glance, you can see this particular detection is based on Google Workspace Login logs, specifically from Cloud Identity which logs users login activity across gcloud CLI, Google Workspace and Cloud Console as well login settings changes like password or 2FA enrollment changes. This question can help you detect if there are any excessive login failures in a given time span (e.g., the last 1hr) which may indicate an initial access or privilege escalation via compromised credentials or a brute force attack.

Click on that detection to learn more about it, and retrieve any available query implementation:

3 Community Security Analytics.jpg

The detection doc page gives an overview of the security use case, along with links to the corresponding YARA-L rule and SQL query which you can run in Chronicle or BigQuery respectively. In the latter case, make sure to change the variables MY_PROJECT_ID and MY_DATASET_ID to match your own.

Read More  Vertex AI Example-Based Explanations Improve ML Via Explainability

In addition, for some detections, a log sample is provided as well as steps to re-generate log events in a real-world project and re-trigger the underlying detection. This will be helpful for detection testing, as CSA adopts best practices.

MITRE ATT&CK® Mappings

As part of this launch, we’re thrilled to partner with our friends at the Center for Threat-Informed Defense to map these security questions to the MITRE ATT&CK® TTPs to help you evaluate these questions in the context of ATT&CK Enterprise threat model.

Click here to download the ATT&CK Navigator JSON layer, which you can subsequently load in ATT&CK Navigator homepage by clicking Open Existing Layer then Upload From Local.

4 Community Security Analytics.jpg

What’s Next?

We’re excited to make this growing knowledge base of security analytics for Google Cloud available for everyone to help tip the balance of cybersecurity against adversaries, by providing organizations with a baseline level of security visibility. We look forward to your feedback and contributions from GitHub issues with new use cases suggestions to Pull requests with corresponding analytics be it for BigQuery, Chronicle or your own analytics tools.

It’s important to remember that these rules and queries are community-sourced, self-managed, and do not have cost estimations or performance guarantees. As we continue to foster more input from community collaborators and partners, we’ll track feedback and work with our active participants on expanding threat coverage and prioritizing improvements to the repository.

By capturing our collective knowledge of cloud threats in this central repository, we’re aiming to drive towards a future where security analytics are no longer developed ad-hoc per organization, but rather – crowdsourced and minimally modified to provide the coverage against the threats our customers face in the cloud. We continue to find new ways to expand initiatives, helping our customers and the broader industry adopt the principles of Autonomic Security Operations.

Get started on your journey to collaborate with industry partners on Community Security Analytics now.

 

 

By Roy Arsan, Solutions Architect | Iman Ghanizada, Security Solutions Manager
Source Google Cloud


For enquiries, product placements, sponsorships, and collaborations, connect with us at [email protected]. We'd love to hear from you!

Our humans need coffee too! Your support is highly appreciated, thank you!

aster.cloud

Related Topics
  • cAT
  • CSA
  • Cybersecurity Action Team
  • Google Cloud
You May Also Like
View Post
  • Computing
  • Public Cloud
  • Technology

United States Army Enterprise Cloud Management Agency Expands its Oracle Defense Cloud Services

  • April 15, 2025
DeepSeek R1 is now available on Azure AI Foundry and GitHub
View Post
  • Public Cloud
  • Technology

DeepSeek R1 is now available on Azure AI Foundry and GitHub

  • February 2, 2025
Cloud platforms among the clouds
View Post
  • Computing
  • Learning
  • Public Cloud

Best Cloud Platforms Offering Free Trials for Cloud Mastery

  • December 23, 2024
Vehicle Manufacturing
View Post
  • Hybrid Cloud
  • Public Cloud

Toyota shifts into overdrive: Developing an AI platform for enhanced manufacturing efficiency

  • December 10, 2024
IBM and AWS
View Post
  • Public Cloud

IBM and AWS Accelerate Partnership to Scale Responsible Generative AI

  • December 2, 2024
COP29 AI and Climate Change
View Post
  • Public Cloud
  • Technology

How Cloud And AI Are Bringing Scale To Corporate Climate Mitigation And Adaptation

  • November 18, 2024
Cloud Workstations
View Post
  • Public Cloud

FEDRAMP High Development in the Cloud: Code with Cloud Workstations

  • November 8, 2024
View Post
  • Public Cloud

PyTorch/XLA 2.5: vLLM support and an improved developer experience

  • October 31, 2024

Stay Connected!
LATEST
  • college-of-cardinals-2025 1
    The Definitive Who’s Who of the 2025 Papal Conclave
    • May 7, 2025
  • conclave-poster-black-smoke 2
    The World Is Revalidating Itself
    • May 6, 2025
  • 3
    Conclave: How A New Pope Is Chosen
    • April 25, 2025
  • Getting things done makes her feel amazing 4
    Nurturing Minds in the Digital Revolution
    • April 25, 2025
  • 5
    AI is automating our jobs – but values need to change if we are to be liberated by it
    • April 17, 2025
  • 6
    Canonical Releases Ubuntu 25.04 Plucky Puffin
    • April 17, 2025
  • 7
    United States Army Enterprise Cloud Management Agency Expands its Oracle Defense Cloud Services
    • April 15, 2025
  • 8
    Tokyo Electron and IBM Renew Collaboration for Advanced Semiconductor Technology
    • April 2, 2025
  • 9
    IBM Accelerates Momentum in the as a Service Space with Growing Portfolio of Tools Simplifying Infrastructure Management
    • March 27, 2025
  • 10
    Tariffs, Trump, and Other Things That Start With T – They’re Not The Problem, It’s How We Use Them
    • March 25, 2025
about
Hello World!

We are aster.cloud. We’re created by programmers for programmers.

Our site aims to provide guides, programming tips, reviews, and interesting materials for tech people and those who want to learn in general.

We would like to hear from you.

If you have any feedback, enquiries, or sponsorship request, kindly reach out to us at:

[email protected]
Most Popular
  • 1
    IBM contributes key open-source projects to Linux Foundation to advance AI community participation
    • March 22, 2025
  • 2
    Co-op mode: New partners driving the future of gaming with AI
    • March 22, 2025
  • 3
    Mitsubishi Motors Canada Launches AI-Powered “Intelligent Companion” to Transform the 2025 Outlander Buying Experience
    • March 10, 2025
  • PiPiPi 4
    The Unexpected Pi-Fect Deals This March 14
    • March 13, 2025
  • Nintendo Switch Deals on Amazon 5
    10 Physical Nintendo Switch Game Deals on MAR10 Day!
    • March 9, 2025
  • /
  • Technology
  • Tools
  • About
  • Contact Us

Input your search keywords and press Enter.