Cloud Security Operations
What is Cloud Sniper?
Cloud Sniper is a platform designed to manage Security Operations in cloud environments. It is an open platform which allows responding to security incidents by accurately analyzing and correlating native cloud artifacts. It is to be used as a Virtual Security Operations Center (vSOC) to detect and remediate security incidents providing a complete visibility of the company's cloud security posture.
With this platform, you will have a complete and comprehensive management of the security incidents, reducing the costs of having a group of level-1 security analysts hunting for cloud-based Indicators of Compromise (IOC). These IOCs, if not correlated, will generate difficulties in detecting complex attacks. At the same time Cloud Sniper enables advanced security analysts integrate the platform with external forensic or incident-and-response tools to provide security feeds into the platform.
The cloud-based platform is deployed automatically and provides complete and native integration with all the necessary information sources, avoiding the problem that many vendors have when deploying or collecting data.
Cloud Sniper receives cloud-based and third-parties feeds and automatically responds protecting your infrastructure and generating a knowledge database of the IOCs that are affecting your platform. This is the best way to gain visibility in environments where information can be bounded by the Shared Responsibility Model enforced by cloud providers.
To detect advanced attack techniques, which may easily be ignored, the Cloud Sniper Analytics module correlates the events generating IOCs. These will give visibility on complex artifacts to analyze, helping both to stop the attack and to analyze the attacker's TTPs.
Cloud Sniper is currently available for AWS, but it is to be extended to others cloud platforms.
Automatic infrastructure deployment (for AWS)
WIKI => HOW IT WORKS
Cloud Sniper releases
1. Automatic Incident and Response
1. WAF filtering
2. NACLs filtering
3. IOCs knowledge database.
4. Tactics, Techniques and Procedures (TTPs) used by the attacker
2. Security playbooks
1. NIST approach
3. Automatic security tagging
4. Cloud Sniper Analytics
1. Beaconing detection with VPC Flow Logs (C2 detection analytics)
Upcoming Features and Integrations
1. Security playbooks for cloud-based environments
2. Security incidents centralized management for multiple accounts. Web Management UI
3. WAF analytics
4. Case management (automatic case creation)
5. IOCs enrichment and Threat Intelligence feeds
6. Automatic security reports based on well-known security standards (NIST)
7. Integration with third-party security tools (DFIR)
via KitPloit Related articles
- Hacker Tools For Pc
- Hacking Tools Software
- Best Pentesting Tools 2018
- Pentest Tools Website
- Hack Website Online Tool
- Pentest Automation Tools
- Pentest Tools Apk
- New Hack Tools
- Hacking Tools And Software
- Hacker Tools Free
- Top Pentest Tools
- What Are Hacking Tools
- Pentest Tools Online
- Best Pentesting Tools 2018
- Pentest Tools For Android
- Black Hat Hacker Tools
- Hack Tool Apk No Root
- Pentest Box Tools Download
- Tools 4 Hack
- Hacker Tools For Mac
- Pentest Tools Subdomain
- Hack Tools For Ubuntu
- Hacker Tools Online
- Wifi Hacker Tools For Windows
- Pentest Tools Kali Linux
- Hacker Tool Kit
- Pentest Tools For Android
- Hacking Tools Download
- Game Hacking
- Pentest Tools For Ubuntu
- Hack Tools For Ubuntu
- Hacks And Tools
- Pentest Tools Nmap
- Hacking Apps
- Hacker Techniques Tools And Incident Handling
- Hack Tools Online
- Pentest Tools Subdomain
- Game Hacking
- Hack Tools 2019
- How To Make Hacking Tools
- New Hacker Tools
- Hack Tools For Pc
- Blackhat Hacker Tools
- Pentest Tools Download
- Pentest Tools For Android
- Android Hack Tools Github
- Tools Used For Hacking
- Wifi Hacker Tools For Windows
- Hack Tools Pc
- Hack Tools
- Android Hack Tools Github
- Kik Hack Tools
- Hacking Tools For Kali Linux
- Pentest Tools For Windows
- Hack Tools For Games
- Hacker
- Growth Hacker Tools
- Pentest Tools Linux
- Hacking Tools For Kali Linux
- Pentest Tools Subdomain
- Tools Used For Hacking
- Hack Tools Pc
- Wifi Hacker Tools For Windows
- Pentest Tools Windows
- Pentest Tools Open Source
- Pentest Tools Website Vulnerability
- Termux Hacking Tools 2019
- What Are Hacking Tools
- Hacker Tools For Windows
- Hacking Tools For Kali Linux
- Pentest Tools Review
- Hacker Tools Linux
- Hacker Tools Apk Download
- Hacking Apps
- Hack Tools For Windows
- Physical Pentest Tools
- Hack App
- Hacker Search Tools
- Android Hack Tools Github
- How To Install Pentest Tools In Ubuntu
- Hack Tools For Pc
- How To Install Pentest Tools In Ubuntu
- Pentest Tools Url Fuzzer
- Pentest Tools For Ubuntu
- Hacking Tools Name
- Hack Rom Tools
- Hack Tool Apk
- Hacking Tools And Software
- Hack Tools For Mac
- Best Hacking Tools 2019
- Hacking App
- Hacking Tools Hardware
- Ethical Hacker Tools
- Hacking Tools And Software
- Tools For Hacker
- Tools Used For Hacking
- Pentest Tools Linux
- Hacking Tools Windows
- Hacking Tools Free Download
- Wifi Hacker Tools For Windows
- Pentest Tools Github
- Hacking Tools Free Download
- Hacking Tools Github
- Pentest Tools Subdomain
- Hacking Tools Mac
- Github Hacking Tools
- Game Hacking
- Hacking Tools Windows
- Pentest Tools Framework
- Bluetooth Hacking Tools Kali
- Hack Apps
- Tools Used For Hacking
- Hack Tools Online
- Pentest Tools Apk
- Hackrf Tools
- Hacker Tools
- Hacker Hardware Tools
- Pentest Tools
- Hacker Tools Apk
- Hack Tools Mac
- Hacks And Tools
- Pentest Tools Subdomain
- Hack Tools
- Hacker Tools For Mac
- Pentest Tools Bluekeep
- Top Pentest Tools
- Hacker Tools Windows
- Pentest Recon Tools
0 comments:
Post a Comment