Tuesday, August 25, 2020

Cloud-Sniper - Virtual Security Operations Center


Cloud Security Operations

What is Cloud Sniper?
Cloud Sniper is a platform designed to manage Security Operations in cloud environments. It is an open platform which allows responding to security incidents by accurately analyzing and correlating native cloud artifacts. It is to be used as a Virtual Security Operations Center (vSOC) to detect and remediate security incidents providing a complete visibility of the company's cloud security posture.
With this platform, you will have a complete and comprehensive management of the security incidents, reducing the costs of having a group of level-1 security analysts hunting for cloud-based Indicators of Compromise (IOC). These IOCs, if not correlated, will generate difficulties in detecting complex attacks. At the same time Cloud Sniper enables advanced security analysts integrate the platform with external forensic or incident-and-response tools to provide security feeds into the platform.
The cloud-based platform is deployed automatically and provides complete and native integration with all the necessary information sources, avoiding the problem that many vendors have when deploying or collecting data.
Cloud Sniper receives cloud-based and third-parties feeds and automatically responds protecting your infrastructure and generating a knowledge database of the IOCs that are affecting your platform. This is the best way to gain visibility in environments where information can be bounded by the Shared Responsibility Model enforced by cloud providers.
To detect advanced attack techniques, which may easily be ignored, the Cloud Sniper Analytics module correlates the events generating IOCs. These will give visibility on complex artifacts to analyze, helping both to stop the attack and to analyze the attacker's TTPs.
Cloud Sniper is currently available for AWS, but it is to be extended to others cloud platforms.

Automatic infrastructure deployment (for AWS)


WIKI => HOW IT WORKS

Cloud Sniper releases
1.  Automatic Incident and Response 
1. WAF filtering
2. NACLs filtering
3. IOCs knowledge database.
4. Tactics, Techniques and Procedures (TTPs) used by the attacker
2. Security playbooks
1. NIST approach
3. Automatic security tagging
4. Cloud Sniper Analytics
1. Beaconing detection with VPC Flow Logs (C2 detection analytics)

Upcoming Features and Integrations
1.  Security playbooks for cloud-based environments
2. Security incidents centralized management for multiple accounts. Web Management UI
3. WAF analytics
4. Case management (automatic case creation)
5. IOCs enrichment and Threat Intelligence feeds
6. Automatic security reports based on well-known security standards (NIST)
7. Integration with third-party security tools (DFIR)




via KitPloitRelated posts
  1. Hack And Tools
  2. Hacker Tools Github
  3. Hack Tools For Pc
  4. Hacker Tools Online
  5. Hack Tools Pc
  6. Hackrf Tools
  7. Hack Tool Apk
  8. Hackrf Tools
  9. Pentest Tools For Ubuntu
  10. Pentest Tools List
  11. Install Pentest Tools Ubuntu
  12. Nsa Hack Tools Download
  13. Hack Tools For Ubuntu
  14. Game Hacking
  15. Hacking Tools Online
  16. Hacking Tools And Software
  17. How To Make Hacking Tools
  18. Easy Hack Tools
  19. Hack Tools Download
  20. Bluetooth Hacking Tools Kali
  21. Blackhat Hacker Tools
  22. Hacker Tools Free
  23. Pentest Tools Linux
  24. Top Pentest Tools
  25. Hack Tools Online
  26. Hacker Tools Linux
  27. Best Hacking Tools 2019
  28. Pentest Tools Tcp Port Scanner
  29. Hacker Tools Free Download
  30. Hacker
  31. Hacker Tool Kit
  32. Hacker Search Tools
  33. Pentest Automation Tools
  34. Hack Tools For Games
  35. Hacking Tools Windows
  36. Hacking Tools For Beginners
  37. Usb Pentest Tools
  38. Hacker Search Tools
  39. Hacking Tools Software
  40. Hacking Tools For Beginners
  41. Hackers Toolbox
  42. Hacking Tools Software
  43. How To Install Pentest Tools In Ubuntu
  44. Hacking Tools Pc
  45. Hacker Tools Linux
  46. Hacker Tools Windows
  47. Hack Tool Apk No Root
  48. Hacker Tools 2020
  49. Pentest Reporting Tools
  50. What Is Hacking Tools
  51. Hacker Tools List
  52. Pentest Tools Url Fuzzer
  53. Underground Hacker Sites
  54. Pentest Tools Free
  55. Hacking Tools Online
  56. Hacking Tools Free Download
  57. Hacking Tools For Beginners
  58. Pentest Tools Website
  59. Github Hacking Tools
  60. Hacker Tools Apk Download
  61. Hack Tool Apk
  62. World No 1 Hacker Software
  63. Hack Apps
  64. Nsa Hack Tools Download
  65. Pentest Tools Website
  66. What Is Hacking Tools
  67. Hack Tool Apk No Root
  68. Hacking Tools Windows
  69. Hacking Tools Usb
  70. Pentest Tools Find Subdomains
  71. Pentest Tools Android
  72. Hacking Tools Online
  73. Hacking Tools 2019
  74. Hacking Tools For Windows Free Download
  75. Pentest Tools Subdomain
  76. Hacker Tools Free Download
  77. Hack Website Online Tool
  78. Nsa Hack Tools Download
  79. Hackers Toolbox
  80. Hacking Tools Download
  81. Hack App
  82. How To Hack
  83. Hackrf Tools
  84. Hacking Tools For Beginners
  85. Hackers Toolbox
  86. Hacking Tools Windows 10
  87. Hak5 Tools
  88. Pentest Tools Kali Linux
  89. Growth Hacker Tools
  90. Easy Hack Tools
  91. Pentest Tools Url Fuzzer
  92. Hacker Tools 2020
  93. Hacker Tools
  94. Android Hack Tools Github
  95. Hacker Tools 2020
  96. Hacking Tools For Windows Free Download
  97. Hack Tools For Windows
  98. Hack Tools For Ubuntu
  99. Hack Tools 2019
  100. Hacker Tools For Mac
  101. Pentest Tools Website Vulnerability
  102. Hacking Tools For Windows 7
  103. Nsa Hacker Tools
  104. Hack Tools For Windows
  105. Blackhat Hacker Tools
  106. Hacker Techniques Tools And Incident Handling
  107. Underground Hacker Sites
  108. Hacking Tools Usb

0 Comments:

Post a Comment

<< Home