A few weeks ago, researching another topic, I posed a question - Which domain within the security ecosystem has struggled to move the needle over the past few years? After trawling through a multitude of annual breach analysts reports (Verizon Breach Report, M-Trends, et al., I concluded that “identities accessing cloud infrastructure” was an irritatingly tough nut to crack. Over the years, there have been many PAM and IAM solutions that have come up with innovative solutions, but the problem space is still a huge challenge to address primarily due to the rapidly shifting landscape.
A large part of why the problem space is stubbornly persistent is the radical shift in the operating mindset for enterprises:
In numerous conversations with customers, the “lift and shift” motion to the cloud has removed one key road bump from the purview of infrastructure teams - scarcity. When a data center is physically landlocked on on-prem (compute, network & storage), there are some rigorous conversations, policies, and processes in place to ensure "what" and "who” will be consuming these limited resources. For all intents and purposes, in a cloud paradigm, this “scarcity” is effectively removed. This lack of scarcity, coupled with the “move fast and break things” approach to the DevOps movement, creates a vast potential for "IT infrastructure sprawl” (Shadow IT) and, by definition, a massive headache from a risk perspective.
Cloud environments are, by nature, extremely flexible in the “pure-play” services (Kinesis, RedShift, Quicksight, etc) they offer - last count, AWS had over 175. Combine each service with a capability level access control (could be 100’s for some services) and then multiply this by the number of employees that have been granted access, and the number of permutations quickly becomes impossible to maintain and manage. Most enterprises remove this complexity by merely over provisioning access and controls. While this will off course, remove the admin overhead in constantly managing access it presents far bigger problems downstream. The bullets below highlight exactly how potentially damaging over provisioning can be:
Source: Cloudknox Research, 2019
From the diagram below you can see there is a huge delta (i.e. permissions gap ) between what has been “granted” and what is "actually used”. This delta also causes massive potential exposure to the SecOps teams in trying to reduce the attack surface.
Source: Cloudknox Research, 2019
Now you start to get a better understanding of why the problem statement outlined at the start is a super hard problem to address.
As luck would have it at the same time I was doing research on this blog our friends at Cloudknox released their debut Splunk integration on our App Store. At the highest level Cloudknox approaches the problem by enforcing the age-old principle of “least privilege”.
Source: Splunk App for Cloudknox
Aside from freeing up potentially 100’s of man hours from the security side of the house on “least privilege” hygiene Cloudknox also adds another highly curated and rich data set to add to your security data lake. When combining with say cyber threat intelligence (CTI) and network telemetry you start to get a force multiplier on your data lake whereby you get highly enriched insights that you can actually take action on. It’s also fair to say depending on the data set you can not only add value to the security and risk teams but also for the business itself.
----------------------------------------------------
Thanks!
Hash Basu-Choudhuri
The world’s leading organizations rely on Splunk, a Cisco company, to continuously strengthen digital resilience with our unified security and observability platform, powered by industry-leading AI.
Our customers trust Splunk’s award-winning security and observability solutions to secure and improve the reliability of their complex digital environments, at any scale.