{"id":104907,"date":"2020-01-09T06:00:07","date_gmt":"2020-01-09T14:00:07","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=104907"},"modified":"2020-07-31T08:54:39","modified_gmt":"2020-07-31T15:54:39","slug":"cloud-ueba","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2020\/01\/cloud-ueba\/","title":{"rendered":"Harnessing the Power of UEBA for Cloud Security"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Implementing cloud security is a critical piece of every organization\u2019s journey to the cloud. As organizations expand their cloud footprints across infrastructure as a service (IaaS) and platform as a service (PaaS)\u00a0 capabilities that span multiple accounts and regions, and grant privileged access to multiple users across this vast landscape, it becomes apparent that monitoring user activity is an essential requirement during their cloud journey.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When it comes to monitoring user behavior, ultimately we are looking for signs of two things:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Potentially compromised credentials.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Malicious insider threats.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">In the hands of a skilled attacker, compromised credentials can be used to wreak havoc in your environment. Leveraging a user and entity behavior analytics (UEBA) engine, which is a key feature of any <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2019\/11\/cloud-native-security-platform\/\">Cloud Native Security Platform<\/a> (CNSP), you can identify sensitive activities such as risky privileged (or root) user behavior, security group changes and identity and access management (IAM) configuration updates; these may be indicators of compromised credentials or insider threats. With early detection, you can stop these attacks before they get to the point of compromise in your cloud environment.<\/span><\/p>\n<p><b>Monitoring User Behavior without UEBA<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Where do you start if you don\u2019t have UEBA deployed? Typically, by using the investigative tools and capabilities the cloud providers offer. Each cloud service provider (CSP) provides governance, compliance, operational auditing and risk auditing capabilities to evaluate their own cloud environments. This is done through event history, using audit logs, such as CloudTrail for AWS, Azure Activity Log or Google's Stackdriver Logs. With the audit logs, you are able to view a historical list of activities in your cloud environment, as well as who performed these activities.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Manually reviewing these logs is time and resource-intensive, especially in a multi-cloud environment, which is why many customers typically send them over to a tool such as a security information and event management (SIEM). Here they can begin to analyze and query the data to find out more information, establish patterns and investigate events. Unfortunately, this process simply does not work well with the public cloud. Too much data is being generated and there is a complete lack of cloud context in the process. It\u2019s unrealistic to try to make effective security decisions based on this data. Therefore, your best option for doing this effectively is to employ machine learning (ML) capabilities, like that of Prisma Cloud, or another CNSP.\u00a0<\/span><\/p>\n<p><b>UEBA with Prisma Cloud<\/b><\/p>\n<p><span style=\"font-weight: 400;\">With Prisma Cloud, you can leverage ML to take the human element out of finding indicators of compromise (IoCs) in your cloud environment. The UEBA engine uses an autonomous system to monitor the logs coming in from various sources in order to establish a baseline of \u201cnormal\u201d activity, and based on this model it has built, it begins to call out what is unusual behavior. Prisma Cloud uses this data to alert the security or security operations center (SOC or SecOps) with the behaviorally unusual findings.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Due to the fidelity of the alerts, this tremendously helps reduce the burden on the already overwhelmed cloud SOC teams since it provides rich cloud context such as who made what change, in what time period, using which device, on which resource, from what location and what was the result of that change. Additionally, when reviewing alerts of this nature, you want to be able to investigate the surrounding events that lead to the alerts. Prisma Cloud\u2019s dynamic investigation capabilities allow you to quickly uncover details surrounding anomalous alerts and even the patterns that were established before the alert was generated.<\/span><\/p>\n<figure id=\"attachment_104921\" aria-describedby=\"caption-attachment-104921\" style=\"width: 760px\" class=\"wp-caption aligncenter\"><div style=\"max-width:100%\" data-width=\"760\"><span class=\"ar-custom\" style=\"padding-bottom:62.5%;\"><img loading=\"lazy\" decoding=\"async\"  class=\" wp-image-104921 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image1-2.png\" alt=\"A screenshot from Prisma Cloud showing how UEBA can be utilized.\" width=\"760\" height=\"475\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image1-2.png 1999w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image1-2-230x144.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image1-2-500x312.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image1-2-768x480.png 768w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image1-2-1536x960.png 1536w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image1-2-480x300.png 480w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image1-2-64x40.png 64w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image1-2-874x546.png 874w\" sizes=\"auto, (max-width: 760px) 100vw, 760px\" \/><\/span><\/div><figcaption id=\"caption-attachment-104921\" class=\"wp-caption-text\">Figure 1: Anomalies generated for a specific user<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">The machine-intelligence-built model takes into consideration a deep variety of details, such as the device used, the location of the user when accessing services, the cloud service being accessed, the location of the user, the source IP address and whether the activity was performed during or outside of the user\u2019s typical work hours.\u00a0<\/span><\/p>\n<figure id=\"attachment_104934\" aria-describedby=\"caption-attachment-104934\" style=\"width: 762px\" class=\"wp-caption aligncenter\"><div style=\"max-width:100%\" data-width=\"762\"><span class=\"ar-custom\" style=\"padding-bottom:22.7%;\"><img loading=\"lazy\" decoding=\"async\"  class=\" wp-image-104934 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image2-1.png\" alt=\"A screenshot from Prisma Cloud showing how UEBA can be utilized.\" width=\"762\" height=\"173\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image2-1.png 1999w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image2-1-230x52.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image2-1-500x113.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image2-1-768x174.png 768w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image2-1-1536x347.png 1536w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image2-1-510x115.png 510w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image2-1-177x40.png 177w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image2-1-650x147.png 650w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image2-1-874x198.png 874w\" sizes=\"auto, (max-width: 762px) 100vw, 762px\" \/><\/span><\/div><figcaption id=\"caption-attachment-104934\" class=\"wp-caption-text\">Figure 2: An alert showing the unusual and suspicious activities being performed by a user<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">At a high level, the alerts are generated based on an unusual location, an unusual activity that the user is performing, or a combination of an unusual activity being performed from an unusual location. Prisma Cloud categorizes these anomalous user and entity behaviors into the following three categories: unusual user activity, excessive login failures and account hijacking attempts or brute force attacks.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When investigating these alerts, the cloud SOC team can quickly uncover the extent of the unusual activity by viewing it across their cloud environment.<\/span><\/p>\n<figure id=\"attachment_104947\" aria-describedby=\"caption-attachment-104947\" style=\"width: 759px\" class=\"wp-caption aligncenter\"><div style=\"max-width:100%\" data-width=\"759\"><span class=\"ar-custom\" style=\"padding-bottom:36.5%;\"><img loading=\"lazy\" decoding=\"async\"  class=\" wp-image-104947 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image6.png\" alt=\"A screenshot from Prisma Cloud showing how UEBA can be utilized.\" width=\"759\" height=\"277\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image6.png 1999w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image6-230x84.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image6-500x183.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image6-768x281.png 768w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image6-1536x562.png 1536w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image6-510x186.png 510w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image6-109x40.png 109w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image6-650x238.png 650w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image6-874x320.png 874w\" sizes=\"auto, (max-width: 759px) 100vw, 759px\" \/><\/span><\/div><figcaption id=\"caption-attachment-104947\" class=\"wp-caption-text\">Figure 3: Alerts for anomalous behavior for a specific user entity mapped across the globe<\/figcaption><\/figure>\n<p><b>Bringing it Home<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Using the techniques illustrated above, a UEBA engine helps easily and autonomously detect insider threats and user and entity account compromises. This way, you can give your security team back valuable hours in their day that they would\u2019ve otherwise spent investigating these incidents manually.<\/span><\/p>\n<figure id=\"attachment_104960\" aria-describedby=\"caption-attachment-104960\" style=\"width: 760px\" class=\"wp-caption aligncenter\"><div style=\"max-width:100%\" data-width=\"760\"><span class=\"ar-custom\" style=\"padding-bottom:45.66%;\"><img loading=\"lazy\" decoding=\"async\"  class=\" wp-image-104960 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image3.png\" alt=\"A screenshot from Prisma Cloud showing how UEBA can be utilized.\" width=\"760\" height=\"347\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image3.png 1999w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image3-230x105.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image3-500x229.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image3-768x351.png 768w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image3-1536x702.png 1536w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image3-510x233.png 510w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image3-87x40.png 87w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image3-650x297.png 650w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image3-874x400.png 874w\" sizes=\"auto, (max-width: 760px) 100vw, 760px\" \/><\/span><\/div><figcaption id=\"caption-attachment-104960\" class=\"wp-caption-text\">Figure 4: Trending view, showing access patterns and calling out unusual access patterns<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">Finally, Prisma Cloud provides a method by which admins can provide feedback to the machine learning model so it continuously learns and increases the fidelity behind the alerts. Learn more about <\/span><span style=\"font-weight: 400;\"><a href=\"https:\/\/start.paloaltonetworks.com\/ESG-research-cloud-native-devsecops-report.html\">best practices for cloud-native security<\/a>.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Why a user and entity behavior analytics (UEBA) engine is essential for cloud security, and where to start if you don\u2019t have it deployed.<\/p>\n","protected":false},"author":663,"featured_media":104908,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6768],"tags":[6901,1166,147,7238,148,635],"coauthors":[6973],"class_list":["post-104907","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-the-cloud","tag-cloud-native-security-platform","tag-cloud-security","tag-iaas","tag-identity-security","tag-paas","tag-soc"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/CS-insider-threats-r2d1-1200x627.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/104907","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/663"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=104907"}],"version-history":[{"count":6,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/104907\/revisions"}],"predecessor-version":[{"id":105703,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/104907\/revisions\/105703"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/104908"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=104907"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=104907"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=104907"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=104907"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}