property | value |
tags | adversary-emulation,aws-cloud,defensive-tradecraft,pkm-pocket-pipeline,threat-hunting |
url | |
original_word_count | 1417 |
Article Excerpt
As attackers get more creative in their malicious tradecraft, cloud security teams must be able to keep up with detections that provide adequate coverage against the diverse threats to their cloud environments.
Long Summary
This article covers how cloud security teams can use Stratus Red Team and Datadog Cloud SIEM together to detect and respond to threats in their AWS environments. Stratus Red Team is an open source project that comes with a number of AWS and other cloud provider-specific attack techniques, allowing security engineers to emulate adversary behavior within sandboxed environments. Datadog Cloud SIEM provides out-of-the-box rules to detect and respond to threats, and it allows security engineers to analyze operational and security telemetry in real time.
The article provides examples of threat emulation and detection validation workflows in various AWS services, including Amazon EBS, Amazon S3, and AWS IAM roles. For example, Stratus Red Team replicates an attack on Amazon EBS by creating an EBS volume and snapshot and then sharing the snapshot with an external, fictitious AWS account. Datadog Cloud SIEM provides an out-of-the-box detection rule to detect this attack. Similarly, Stratus Red Team replicates an attack on S3 by creating an S3 bucket and then backdooring the bucket’s policy with permissions that allow unauthorized access from an external, fictitious AWS account. Datadog Cloud SIEM provides an out-of-the-box detection rule to detect this attack as well.
The article also covers how to use Threatest for continuous validation. Threatest is an open source project that allows security teams to detonate an attack technique and verify that the alert they expect was generated in Datadog Cloud SIEM. The article provides an example of how to use Threatest to detect an attack on an IAM role.
In conclusion, Stratus Red Team and Datadog Cloud SIEM can be used together to detect and respond to threats in AWS environments. The article provides examples of threat emulation and detection validation workflows in various AWS services, and it also covers how to use Threatest for continuous validation.
Short Summary
📓 AWS threat emulation and detection validation with Stratus Red Team and Datadog Cloud SIEM
👉🏽 As attackers get more creative in their malicious tradecraft, cloud security teams must be able to keep up with detections that provide adequate coverage against the diverse threats to their cloud environments. 👉🏽 Explains how to use Stratus Red Team and Datadog Cloud SIEM for threat detection. 👉🏽 Highlights the use of Stratus Red Team to emulate adversary behavior in cloud environments. 👉🏽 Describes how Datadog Cloud SIEM offers out-of-the-box rules for threat detection. 👉🏽 Provides examples of threat emulation and detection in Amazon EBS, S3, and IAM roles. 👉🏽 Shows how Stratus Red Team replicates attacks on Amazon EBS and S3 for detection. 👉🏽 Emphasizes the use of Datadog Cloud SIEM's detection rules for identifying attacks. 👉🏽 Mentions the use of Threatest for continuous validation of detection alerts. 👉🏽 Explains Threatest as an open source project for detonating attack techniques. 👉🏽 Demonstrates how Threatest can be used to verify expected alerts in Datadog Cloud SIEM. 👉🏽 Concludes that Stratus Red Team and Datadog Cloud SIEM are effective for detecting threats in AWS.
🔗 summarized content: https://hut.threathunterz.com/battlefield-intel/articles-and-reports/aws-threat-emulation-and-detection-validation-with-stratus-red-team-and-datadog-cloud-siem
#CloudSecurityTeams #StratusRedTeam #DatadogCloudSIEM #Threatment #AWSEnvironments