SANS - Enterprise cloud threat hunting and attack investigation

Tuesday
 
26
 
November
12:30 pm
 - 
4:30 pm
Topic

Speakers

Josh Lemon

Josh Lemon

Managing Director
SoteriaSec

Synopsis

The world is changing and so is the data we need to conduct our investigations. Cloud platforms change how data is stored and accessed. They remove an investigator’s ability to put their hands directly on the data. Many investigators are trying to force old methods for on-premise examination onto cloud-hosted platforms. Rather than resisting change, threat hunters and investigators must learn to embrace the new opportunities presented to them in the form of new cloud-based evidence sources. This workshop will give attendees insight into the rapidly changing world of enterprise cloud environments by uncovering new evidence sources that only exist in the cloud and using contemporary techniques for conducting threat hunting and investigations.

This workshop aims to advance the knowledge of security and incident response professionals when it comes to approaching cloud-based platforms. While several commercial vendors offer capabilities to collect evidence from cloud platforms, this workshop will focus on how teams can acquire evidence and data without requiring proprietary information or software. For this workshop, in-depth exercises are included throughout to provide hands-on experience for attendees to practice the knowledge presented in the workshop.

This workshop will provide hands-on exercises for analysing cloud-based evidence and the open-source tools available to perform this analysis. Attendees will leave with a solid overview of where fundamental evidence for Amazon and Google is located and how to obtain it quickly during an investigation. Attendees will leave with an understanding of common attack techniques used today by threat actors and where to find evidence of these attacks. In addition to this knowledge, attendees will also be shown how to investigate cloud-based network evidence at scale, leveraging built-in cloud infrastructure to aid investigators and speed up incident identification, scoping, and analysis.

Outline:

  • Common Attacks against Cloud Infrastructure
  • Quick cloud language primer
  • Opensource Tools for Cloud evidence analysis
  • Azure Authentication Attack Analysis
  • AWS Log Extraction and Analysis
  • Google Cloud Storage Buckets and Network Log Analysis

Who Should Attend?

This workshop is best suited to experienced Information Security Professionals who directly support and aid in responding to data breach incidents and intrusions on cloud-based infrastructure. This workshop is designed for: experienced digital forensic analysts who want to expand their understanding of cloud-based investigations and incident response team

What are the attendee takeaways?

Incident Response and Hunting Across Clouds

  • Common attacks by threat actors
  • Mapping Attacks to MITRE ATT&CK(R) Cloud Matrix
  • Types of clouds
  • DFIR in the cloud
  • Core concepts
  • SOF-ELK architecture
  • Logstash
  • Search process

Azure DFIR Knowledge

  • Available Evidence
  • Understanding Sign-In and Audit Logs
  • Analysis of Password Spray Attacks
  • AWS DIFR Knowledge

Prerequisites

Bring your own device, up to date Web Browser (ideally MS Edge or Google Chrome; Internet Explorer will not work)

8GB of RAM or more is required.

Keyboard and Mouse

Wireless networking (802.11 standard) is required. There is no wired Internet access in the classroom.

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.

Acknowledgement of Country