A few weeks ago, researching another topic, I posed a question - Which domain within the security ecosystem has struggled to move the needle over the past few years? After trawling through a multitude of annual breach analysts reports (Verizon Breach Report, M-Trends, et al., I concluded that “identities accessing cloud infrastructure” was an irritatingly tough nut to crack. Over the years, there have been many PAM and IAM solutions that have come up with innovative solutions, but the problem space is still a huge challenge to address primarily due to the rapidly shifting landscape.
A large part of why the problem space is stubbornly persistent is the radical shift in the operating mindset for enterprises:
In numerous conversations with customers, the “lift and shift” motion to the cloud has removed one key road bump from the purview of infrastructure teams - scarcity. When a data center is physically landlocked on on-prem (compute, network & storage), there are some rigorous conversations, policies, and processes in place to ensure "what" and "who” will be consuming these limited resources. For all intents and purposes, in a cloud paradigm, this “scarcity” is effectively removed. This lack of scarcity, coupled with the “move fast and break things” approach to the DevOps movement, creates a vast potential for "IT infrastructure sprawl” (Shadow IT) and, by definition, a massive headache from a risk perspective.
Cloud environments are, by nature, extremely flexible in the “pure-play” services (Kinesis, RedShift, Quicksight, etc) they offer - last count, AWS had over 175. Combine each service with a capability level access control (could be 100’s for some services) and then multiply this by the number of employees that have been granted access, and the number of permutations quickly becomes impossible to maintain and manage. Most enterprises remove this complexity by merely over provisioning access and controls. While this will off course, remove the admin overhead in constantly managing access it presents far bigger problems downstream. The bullets below highlight exactly how potentially damaging over provisioning can be:
Source: Cloudknox Research, 2019
From the diagram below you can see there is a huge delta (i.e. permissions gap ) between what has been “granted” and what is "actually used”. This delta also causes massive potential exposure to the SecOps teams in trying to reduce the attack surface.
Source: Cloudknox Research, 2019
Now you start to get a better understanding of why the problem statement outlined at the start is a super hard problem to address.
As luck would have it at the same time I was doing research on this blog our friends at Cloudknox released their debut Splunk integration on our App Store. At the highest level Cloudknox approaches the problem by enforcing the age-old principle of “least privilege”.
Source: Splunk App for Cloudknox
Aside from freeing up potentially 100’s of man hours from the security side of the house on “least privilege” hygiene Cloudknox also adds another highly curated and rich data set to add to your security data lake. When combining with say cyber threat intelligence (CTI) and network telemetry you start to get a force multiplier on your data lake whereby you get highly enriched insights that you can actually take action on. It’s also fair to say depending on the data set you can not only add value to the security and risk teams but also for the business itself.
----------------------------------------------------
Thanks!
Hash Basu-Choudhuri
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative.
Founded in 2003, Splunk is a global company — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.