icon-accurate@2x Challenge

As the need for rapid deployment, scalability and operational flexibility with modern information technology grows, organizations are increasingly turning to cloud-based infrastructure-as-a-service (IaaS) to meet their technology needs more cost effectively and efficiently. But the way many cloud-based IaaS environments are architected creates shared vulnerabilities that allow malicious access to a resource or service to easily escalate to account level access. This allows an attacker extensive access within an account that can easily go unnoticed. For example, temporary keys extracted from a compromised host could be used to gain API access to other services for that account. Once access is granted, an attacker would have extensive access to the complete environment that few organizations are looking for actively.

icon-fast@2x Solution

LogicHub playbooks can automatically detect and respond to this type of activity and help expedite response in multiple ways. When Amazon detects exposed AWS API keys, they send an email notifying the appropriate resources. LogicHub can continuously watch for those emails and when one is received, can automatically pull the API key from the email and disable it to prevent it from being used in an attack. LogicHub can also automatically hunt for exposed keys on repositories like Github or Pastebin and then notify the appropriate personnel while disabling the exposed key. And LogicHub can also use machine learning to baseline normal activity tied to the use of AWS API keys to automatically detect and respond to malicious activity.

Similar case studies

Automatically Quarantining Infected Hosts
Quarantine infected host automatically or with one-click authorization.
Automating EDR Alert Triage
Automatically analyze, investigate and triage EDR events and alerts at scale.
Automating Phishing Triage
Automatic analysis, detection and triage of potential phishing attempts.
Automating SIEM Alert Triage
Automatically analyze, investigate and triage SIEM events and alerts at scale.
Detecting and Disabling Compromised Credentials
Automatically detect and disable compromised user and admin credentials.
Detecting Exposed AWS Keys
Find and disable AWS keys that have been inadvertantly exposed.
Hunting for insider threats
Automatically hunt for and detect insider threats.
Malicious Powershell Commands
Detect the malicious user of Powershell commands.
Managed O365 detection and response
Cloud productivity managed detection and response for O365 users.
Threat Hunting in Github
Using automated playbooks to deliver continuous threat hunting.
Using TIP to Automatically Triage Network Events More Accurately
Using threat intelligence platforms to accurately triage network events.
Managed Detection and Response for G-Suite
Cloud productivity managed detection and response for G-Suite users.
MDR After Hours Incident Response
Managed detection and response for after hours threat protection.
Respond to user reported incident
Automate incident response to issues reported by users.