aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • Platforms
  • Technology
  • Tools

Why (And How) Google Cloud Is Adding Attack Path Simulation To Security Command Center

  • aster.cloud
  • March 31, 2023
  • 3 minute read

As cloud environments scale and evolve based on changing business priorities, security teams may struggle to understand where their biggest risks are and where to focus their security controls. Some cloud security products have begun to incorporate attack path analysis to address this prioritization problem. Attack path analysis is a technique of discovering possible pathways that adversaries can take to access and compromise IT assets.

A common approach in implementing attack path analysis is to produce a graph of all assets, and then query the map to discover possible exploit paths. While this may produce impressive-looking graphs, it requires the management of large query sets, and it often fails to help teams set the right priorities.


Partner with aster.cloud
for your next big idea.
Let us know here.



From our partners:

CITI.IO :: Business. Institutions. Society. Global Political Economy.
CYBERPOGO.COM :: For the Arts, Sciences, and Technology.
DADAHACKS.COM :: Parenting For The Rest Of Us.
ZEDISTA.COM :: Entertainment. Sports. Culture. Escape.
TAKUMAKU.COM :: For The Hearth And Home.
ASTER.CLOUD :: From The Cloud And Beyond.
LIWAIWAI.COM :: Intelligence, Inside and Outside.
GLOBALCLOUDPLATFORMS.COM :: For The World's Computing Needs.
FIREGULAMAN.COM :: For The Fire In The Belly Of The Coder.
ASTERCASTER.COM :: Supra Astra. Beyond The Stars.
BARTDAY.COM :: Prosperity For Everyone.

To address this shortcoming of current solutions, we are taking a more intelligent approach in Security Command Center (SCC), our security and risk management solution that is built into Google Cloud. We are adding an advanced simulation engine to attack path analysis that will identify assets that are most vulnerable to attack, which can help defenders know where to apply the right security controls to better protect their cloud environment.

Attack path simulation

Adding automated simulation to attack path analysis enables Security Command Center to model how real-world adversaries could potentially attack cloud resources. Our simulation engine will analyze all assets in a Google Cloud environment, the relationships between these assets, the current state of defenses, and potential security issues, including misconfigurations and vulnerabilities. It will then mimic how an attacker could navigate the environment to gain unauthorized access to high value assets.

Read More  Improving The Speed And Security Of Your Cloud Deployments

Our attack path simulation technology comes from Foreseeti, a Swedish risk analytics company acquired by Google in 2022. Foreseeti was founded by university researchers and scientists who were inspired by large-scale simulations in other industries, including automobile crash tests and the structural analysis of bridges, and sought to apply their research and techniques to improve cybersecurity.

How it works

Attack path simulation will be driven from an external attacker’s perspective. The simulation engine employs multiple attack methods, across all known paths to valued assets, with the goal of reaching and compromising the asset. It will consider obvious exposure points, such as open firewall ports and public IP addresses, but also factor in less-obvious factors.

For example, the simulation engine will be able to compute scenario-based risk assessments, such as what happens if a user gets phished and also has an over-privileged account; or if an attacker exploits a vulnerability in an operating system, which they can subsequently leverage to abuse a default service account.

In building the simulation model, we understood that it could potentially yield too many possible attack paths to be useful to security teams. So we configured it to identify the specific attack paths leading to the highest value resources that could be compromised with the least resistance. By factoring in the value of cloud assets (such as databases containing customer information), along with the level of effort and skill required by an attacker to reach the asset, simulation results should reveal the most critical attack paths and the resources most exposed to attackers.

Read More  Apple expands developer support and resources

To make day-to-day operations less taxing for security teams, we designed attack simulations to run automatically over time rather than require an engineer to manually invoke them every time there is a change to the environment. Additionally, the attack path simulation model will directly access information about the Google Cloud environment, including detailed asset information, comprehensive security data, and rapid support for new services — helping ensure that simulation results accurately reflect the most current state of the environment.

Who benefits from attack path simulation?

Attack path simulation can put vital information at the fingertips of security professionals and engineers, including:

  • Security Operations Center (SOC) and vulnerability management teams can get more actionable information on their cloud security findings, which can lead to better prioritization of the risks leading to the likeliest attack exposures.
  • The Chief Information Security Officer (CISO) can better track and manage risks in their Google Cloud environment over time, and compare progress across projects and teams.
  • DevOps teams can design more secure environments and scale faster, better leveraging risk insights to mitigate exposures earlier in the development lifecycle.

How to get attack path simulation for your Google Cloud environment

We’ll have more details on the integration of this groundbreaking technology into Security Command Center and its availability for customers soon.

To learn more about how to secure your Google Cloud environment with Security Command Center please visit: https://cloud.google.com/security-command-center

By: Vikram Makhija (Senior Director, Engineering, Google Cloud) and Robert Lagerström (Senior Staff Software Engineer, Google Cloud)
Originally published at Google Cloud Blog

Source: Cyberpogo


For enquiries, product placements, sponsorships, and collaborations, connect with us at [email protected]. We'd love to hear from you!

Our humans need coffee too! Your support is highly appreciated, thank you!

aster.cloud

Related Topics
  • Google Cloud
  • Security
  • Security Command Center
You May Also Like
Getting things done makes her feel amazing
View Post
  • Computing
  • Data
  • Featured
  • Learning
  • Tech
  • Technology

Nurturing Minds in the Digital Revolution

  • April 25, 2025
View Post
  • People
  • Technology

AI is automating our jobs – but values need to change if we are to be liberated by it

  • April 17, 2025
View Post
  • Software
  • Technology

Canonical Releases Ubuntu 25.04 Plucky Puffin

  • April 17, 2025
View Post
  • Computing
  • Public Cloud
  • Technology

United States Army Enterprise Cloud Management Agency Expands its Oracle Defense Cloud Services

  • April 15, 2025
View Post
  • Technology

Tokyo Electron and IBM Renew Collaboration for Advanced Semiconductor Technology

  • April 2, 2025
View Post
  • Software
  • Technology

IBM Accelerates Momentum in the as a Service Space with Growing Portfolio of Tools Simplifying Infrastructure Management

  • March 27, 2025
View Post
  • Technology

IBM contributes key open-source projects to Linux Foundation to advance AI community participation

  • March 22, 2025
View Post
  • Technology

Co-op mode: New partners driving the future of gaming with AI

  • March 22, 2025

Stay Connected!
LATEST
  • college-of-cardinals-2025 1
    The Definitive Who’s Who of the 2025 Papal Conclave
    • May 7, 2025
  • conclave-poster-black-smoke 2
    The World Is Revalidating Itself
    • May 6, 2025
  • 3
    Conclave: How A New Pope Is Chosen
    • April 25, 2025
  • Getting things done makes her feel amazing 4
    Nurturing Minds in the Digital Revolution
    • April 25, 2025
  • 5
    AI is automating our jobs – but values need to change if we are to be liberated by it
    • April 17, 2025
  • 6
    Canonical Releases Ubuntu 25.04 Plucky Puffin
    • April 17, 2025
  • 7
    United States Army Enterprise Cloud Management Agency Expands its Oracle Defense Cloud Services
    • April 15, 2025
  • 8
    Tokyo Electron and IBM Renew Collaboration for Advanced Semiconductor Technology
    • April 2, 2025
  • 9
    IBM Accelerates Momentum in the as a Service Space with Growing Portfolio of Tools Simplifying Infrastructure Management
    • March 27, 2025
  • 10
    Tariffs, Trump, and Other Things That Start With T – They’re Not The Problem, It’s How We Use Them
    • March 25, 2025
about
Hello World!

We are aster.cloud. We’re created by programmers for programmers.

Our site aims to provide guides, programming tips, reviews, and interesting materials for tech people and those who want to learn in general.

We would like to hear from you.

If you have any feedback, enquiries, or sponsorship request, kindly reach out to us at:

[email protected]
Most Popular
  • 1
    IBM contributes key open-source projects to Linux Foundation to advance AI community participation
    • March 22, 2025
  • 2
    Co-op mode: New partners driving the future of gaming with AI
    • March 22, 2025
  • 3
    Mitsubishi Motors Canada Launches AI-Powered “Intelligent Companion” to Transform the 2025 Outlander Buying Experience
    • March 10, 2025
  • PiPiPi 4
    The Unexpected Pi-Fect Deals This March 14
    • March 13, 2025
  • Nintendo Switch Deals on Amazon 5
    10 Physical Nintendo Switch Game Deals on MAR10 Day!
    • March 9, 2025
  • /
  • Technology
  • Tools
  • About
  • Contact Us

Input your search keywords and press Enter.