Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Protect assets from ransomware, trojans, rootkits and more.
Intelligence and visibility across AWS, O365, DevOps and more.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
Join eSentire as they explore how to build a comprehensive training and…
The Texas Cyber Summit is a multi-track multi-day deeply technical…
Join Dustin Hillard, CTO at eSentire, and Tia Hopkins, VP, Cyber Risk…
Over the past few years, we have seen a significant movement towards the adoption of cloud computing and cloud security. In addition to storing critical data assets solely in physical data centers (“on-prem environment”), organizations are utilizing the cloud to store and maintain these critical data assets, largely due to its cost-effectiveness, instant scalability, and reliability.
In fact, while some organizations maintain a strictly cloud environment, many others have chosen to utilize cloud and on-prem environments (“hybrid environment”) to run their applications seamlessly.
However, we have also seen the adoption of multi-cloud, especially given the monumental rise of cloud providers like Microsoft Azure, Google Cloud, and Amazon Web Services (AWS). The 2021 State of the Multicloud report highlights that 92% of organizations have adopted a multi-cloud strategy today, with 62% of organizations utilizing at least two cloud platforms.
A multi-cloud environment simply means that an organization is leveraging more than one cloud service provider (CSP), depending on which provider is the most appropriate solution for each use case. For example, your organization may choose to leverage AWS for infrastructure and Google Workspace for internal team collaboration.
Regardless of the CSP chosen by your team, one thing is clear: when it comes to cloud security, every cloud service provider maintains a shared responsibility model. So, although the provider maintains some responsibility for securing their cloud environment, the organization also has to take responsibility over cloud security.
This means that you, as the cloud customer, will always be responsible for the data you store in the cloud and managing who has access to it. This is why cloud misconfigurations are a significant threat for cloud security. For example, if your organization uses AWS for data storage, the onus of securing that data storage and maintaining the integrity of that security will always fall on your organization, not on AWS.
Of course, the shared responsibility differs greatly between the use of IaaS, PaaS, and SaaS:
One of the most fundamental challenges for securing data assets in the cloud is misconfigurations, which has resulted in multiple high-profile security breaches, such as with CapitalOne and Tesla. Of course, this is complicated further by the fact that each cloud service provider has their own set of best practices and toolsets for proper configuration and access management, known as the CIS benchmark. Therefore, it’s critical to have capabilities for cloud security posture management and 24/7 cloud threat detection and investigations in the cloud.
eSentire’s MDR for Cloud offering provides Cloud Security Posture Management (CSPM) as well as 24/7 Threat Detection and Investigation to ensure you have deep visibility into your cloud environment and that it’s protected from cloud-specific cyber threats.
Cloud Security Posture Management: We reduce your cyber risk by improving cloud visibility, tracking assets and monitoring for misconfigurations, policy notifications, and security vulnerabilities.
24/7 Threat Detection and Investigations: We detect and investigate cyber threats specific to multi-cloud environments by leveraging our Security Operations Center (SOC) analysts and Threat Hunters, purpose-built cloud security tools, a cloud-native Atlas XDR platform, and creating proprietary cloud detections using the MITRE ATT&CK framework.
This means your organization benefits from:
Decreased threat dwell-time
A cloud security posture that evolves with the cyber threat landscape
Resilience against the most advanced cyber threat actors
Moving away from legacy security tools for cloud risks
Alleviating your IT staff and security resources
Maximize ROI on multi-cloud environments
Enforcement of critical security rules
Reduce cloud knowledge gaps
Improved time to value in managing risks at the administration level of your multi-cloud environment
Your organization (alongside your security provider) must be aware of what resources are publicly accessible and what’s “typical behavior” for users and endpoints for those resources. Second, once those typical behaviors are established, your security provider can alert the SOC when there are deviations with any of those publicly accessible resources.
Here’s what a real-world example looks like of eSentire protecting your cloud assets:
Amazon Web Services (AWS)
Azure Sentinel & Azure Active Directory (AD)
Google Cloud Platform (GCP)
A threat actor gains access to your AWS Elastic Compute Cloud (EC2) instance to download user data to harvest sensitive information or find additional AWS vulnerabilities.
A threat actor attempts to gain access to a user account by removing important security controls like multi-factor authentication (MFA)..
Threat actors can create cloud instances in unused geographic service regions to avoid detection since GCP users can maintain control over where the data is stored.
How eSentire Investigates and Responds
Our SOC analysts get alerted on suspicious query activity based on the proprietary detectors we have built. The SOC analysts then conduct deeper investigation to identify the source user, determine the exact instances where the downloads took place, and correlate the information with any other suspicious activity found.
A sudden change in MFA requirements is very unusual and a potential indicator of compromise. So, our 24/7 SOC Analysts are alerted via Azure Sentinel whenever MFA requirements are removed and follow a proprietary runbook to streamline the investigation process.
With the right context established and the eSentire Atlas XDR platform’s direct integration with Azure AD, our analyst can suspend the credentials of the user who removed the MFA policy, minimizing the risk of any other important security policies being tampered with
We use our proprietary GCP detector to scan for cloud activity in unused regions and alert our 24/7 SOC Analysts if any such activity is identified immediately.
If a true positive is confirmed, the user credentials are suspended and our analysts will perform additional investigations to determine whether additional malicious admin activities have happened.
Once our SOC analysts conduct their investigations, you’re alerted on whether the incident is a true or false positive, full support over the incident response and resolution, and a 20-minute SLO for investigations, leading to a drastically reduced threat dwell-time.
It’s very clear that multi-cloud is the next chapter in the cloud adoption story, especially as there is no real need for businesses to rely solely on one platform anymore.
eSentire is the Authority in Managed Detection and Response, protecting the critical data and applications of 1000+ organizations in 70+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events. Combining cutting-edge machine learning XDR technology, 24/7 Threat Hunting, and proven security operations leadership, eSentire mitigates business risk, and enables security at scale. The Team eSentire difference means enterprises are protected by the best in the business with a named Cyber Risk Advisor, 24/7 access to SOC Cyber Analysts & Elite Threat Hunters, and industry-leading threat intelligence research from eSentire’s Threat Response Unit (TRU). eSentire provides Managed Risk, Managed Detection and Response and Incident Response services. For more information, visit www.esentire.com and follow @eSentire.