Detecting Cyber Threats to Critical Systems and Infrastructure
Alert Logic is a Managed Detection & Response (MDR) vendor who delivers peace of mind from threats by combining 24/7 SaaS security with visibility and detection coverage wherever your systems reside. We achieve this through a platform that provide complete coverage of your attack surface and turns data into valuable information which can be actioned to improve the security posture of your organization.
Organizations are moving away from multiple, complex, point solutions to alternatives that simplify and reduce costs associated with threat detection. One approach growing in popularity is managed detection and response (MDR). Alert Logic is the industry’s first SaaS-enabled MDR provider, delivering unrivalled security value. Our purpose-built technology and team of MDR security experts protect your organization and empower you to resolve whatever threats may come.
Detecting cyber threats to critical systems and infrastructure is more challenging than ever. Organizations are moving away from multiple, complex, point solutions to alternatives that simplify and reduce costs associated with threat detection. One approach growing in popularity is managed detection and response (MDR). Alert Logic is the industry’s first SaaS-enabled MDR provider, delivering unrivalled security value. Our purpose-built technology and team of MDR security experts protect your organization and empower you to resolve whatever threats may come. Alert Logic’s detection capabilities and application in delivering meaningful detection outcomes uses five critical capabilities:
- Comprehensive Asset Visibility
- Continuously Updated Threat Intelligence
- Advanced Analytics
- Community Defense
- Broad Compliance
Comprehensive visibility is vital for effective threat detection because as the saying goes, you can’t secure what you can’t see. Visibility includes assets across your environment, including those in the public cloud, your network infrastructure, endpoints, off-the-shelf and custom web applications, containers, and additional data sources for enrichment and context. Alert Logic integrates these data sources within different types of deployments:
|DEPLOYMENT TYPE||DATA SOURCE||DESCRIPTION|
|AWS||AWS API + CloudTrail||Cloud asset discovery and log file delivery for analysis|
|Azure||Resources API||Cloud asset discovery|
|Data Center & GCP||Discovery appliance||Discovery using IP address range belonging to network|
|Windows/Linux||Alert Logic agent||Provides host-level metadata updates|
Once the data sources are established, the information must be refreshed on a regular basis. In this effort, Alert logic uses a tailored recurring polling process.
IT estates are always evolving and dynamic, requiring constant updates to ensure asset coverage remains consistently high. We recommend and help you set-up rediscovery of new assets through polling at least once per day, and more frequent polling as needed to identify more granular changes in areas like asset configuration. Alert Logic presents this coverage through a topology map which allows you and our Security Operations Center (SOC) analysts to view assets, configuration details, and protection levels, then integrate the data in any event investigation.
Once visibility is achieved the next step is to identify and classify weaknesses that could be exploited by a bad actor. This is achieved through internal and external vulnerability scanning to identify exposures such as known vulnerabilities, misconfigurations, password complexity, and many more.
Alert Logic maintains a vulnerability library of ~120,000 vulnerabilities which is a combination of open source intelligence feeds and metadata from our 4000+ customers. Our team of experts also provide guidance to ensure you achieve efficiency with configuration, scoping, and knowledge transfer. The outputs are presented in multiple report options allowing your security staff to choose which report or set of reports works best for vulnerability management. We provide remediation guidance and tuning assistance as well.
Alert Logic is also a PCI Approved Scanning Vendor and provides dedicated scanning and reporting to satisfy PCI compliance requirements with remediation assistance. Multiple compliance mandates are also available including HIPAA, HITRUST, and SOC2.
Alert Logic continually assesses your AWS and Azure configuration by applying cloud configuration checks. The checks cover security best practices, drawing from multiple sources like Center for Internet Security (CIS) and the cloud providers themselves.
The results for CIS are available to you as separate, certified reports — as well as a unified list including scanning vulnerabilities.
Cyber threat intelligence plays a critical role in providing effective managed detection and response. It requires a combination of knowledge and expertise to add context to make data actionable. Alert Logic has built a strong threat intelligence team which works as an organized and coordinated group of experts across different areas. Below is a sample of the different Alert Logic functions and their roles:
- MALWARE ANALYSTS — study what different types of malware samples do when they get executed to help prevent it from spreading
- NETWORK SECURITY EXPERTS — analyze attacks at the network layer to create effective detection techniques
- REVERSE ENGINEERS — take apart software programs and focus on how a vulnerability works
- VULNERABILITY RESEARCHERS — study how vulnerabilities can be detected as quickly as possible
- DATA SCIENTISTS — study large structured and unstructured data sets to improve data models that create actionable outcomes
- SECURITY ARCHITECTS — bring all the elements together so customers can achieve their security outcomes
This result is a one-stop-shop that provides you with vigilance 24/7, eliminates noise and false positives, and validates incidents with severity and remediation guidance.
A collection of multiple sophisticated techniques is used to identify threats in the Alert Logic MDR platform. Below is a sample of some of those techniques and their purposes.
Log Data Monitoring
OA core function in threat detection is mining and parsing log data to find hidden threats. This function requires several types of data feeds, advanced analytics, and expertise to improve the data models and reduce false positives. Alert Logic provides:
- Insights from logs to recognize issues that need to be remediated to prevent future attacks
- Log monitoring for real-time malicious activity detection
- 24/7 expertise to help resolve any incidents based on logs and other detection sources
- Understanding of network traffic, protocols, and alert volumes at a high level and drill down to uncover the necessary details using intuitive dashboards
- Dramatically reduce wasted activity because the noise is already filtered out
- Oversight to ensure all relevant detection sources are optimally configured during the deployment process
- Compliance requirements by scanning regularly and storing logs for one year
There are several types of data sources and each of them provide distinct information for Alert Logic’s team of experts for detecting threats.
We offer integration with applications, including API-based integration with SaaS applications and passive log collecting through syslog forwarding with most firewall platforms. Available applications include products for authentication, productivity, management, and more. Alert Logic serves as a remote collector to receive log data from SaaS and firewall applications related to different incident types, depending on the product type.
The Application Registry is a repository of platform integrations in your Configuration page in the Alert Logic console, and new integration points are continually being added. The Application Registry allows you to configure multiple third-party applications to collect and generate logs. Integration with third-party applications adds administrative and security value to your organization.
Enhanced Detection With Firewall Logs
Alert Logic performs observations of relevant security information that is derived from one or multiple sources from the firewall application log data. Observations do not always meet the criteria for Alert Logic to generate an incident but can demonstrate security value. Observations can identify security patterns and allow you to conduct threat hunting. Examples of observations that Alert Logic can perform if detected from firewall application log data are the following:
- An IP addresses in logs matches with listed blacklisted IP addresses
- Brute force password guessing for a user for a certain amount of time
- An anomalous number of resource downloads for a user deviated from normal activity
- A new created service in the environment that is being used by a customer or external systems (generates Incident)
- Blacklisted IP addresses creating successful connections to most popularly exploited services in the network of a customer (generates Incident)
- A blacklisted IP address successfully probed a new internal resource (generates Incident)
- Alert Logic processes logs from the following firewalls:
- Palo Alto
Enhanced Detection With Authentication Application (OKTA, Auth0, Cisco Duo)
To battle credential theft, organizations often use Multi-Factor Authentication (MFA). Alert Logic has built collectors to capture data from Auth0, OKTA, and Cisco Duo MFA applications to create security content that is used to generate incidents for key security use cases.
The MFA products provide different levels of logging detail but the Incidents generated fall into these categories:
- Administrative Actions
- User Login AD
- User Behavior AD
|The Alert Logic Okta collector can collect data relevant to:||The Alert Logic Auth0 Log Collector gathers data relevant to:||The Alert Logic Cisco Duo collector polls the following APIs for various types of data:|
Enhanced Detection With IaaS (AWS, Azure)
Each cloud provider has unique offerings, so Alert Logic works closely with the cloud providers to understand their security challenges and provide services tailored to them. Leveraging this relationship and expertise means removing a significant factor in an already steep learning curve, reducing risk significantly along the three primary phases of the cloud journey:
Migration Phase: This phase is focused on removing barriers and gaining alignment to enable a cloudfirst strategy. In this phase Alert Logic helps you by addressing the cloud security skills gap with our SOC and threat research team. Our platform provides heterogenous coverage for cloud and on-prem environments, and the ability to bring all the elements together to maintain compliance.
Modernization Phase: In this phase security needs to keep pace with IT so the organization may become more agile. Alert Logic helps you by identifying misconfigurations in the cloud and potential vulnerabilities in applications, automating vulnerability detection to quickly identify and fix application and operating system vulnerabilities, and address threats in containers and web applications to confidently deliver security applications quickly.
Optimization Phase: Organizations in this phase are cloud-only and focused on maximizing their efficiencies. Alert Logic helps you in this phase by providing a unique agent-based solution which enables Network IDS for North/South as well as East/West traffic. Our platform is optimized for multicloud environments so organizations can choose the right cloud for the right workload while maintaining security. Native integration into cloud with API-driven integration into AWS and Azure enables critical data aggregation for a full picture of the entire cloud surface.
Enhanced Detection With CRM/SaaS (O365, SFDC)
Alert Logic builds collectors to capture data from Office 365, Salesforce and other applications to create security content to generate incidents for key security use cases. A sample includes:
- Audit Logs from Microsoft Office 365 Exchange
- Audit Logs from SharePoint
- General Audit Logs
- Administrative Actions
- User Login AD
- User Behavior AD
Enhanced Detection With 3rd Party EDR/Anti-Virus (Carbon Black, SentinelOne, CiscoAMP, Cylance, Crowdstrike)
EDR solutions are highly effective at protecting endpoints. However, bad actors are constantly innovating their attack techniques to evade detection. Analyzing EDR logs helps surface these stealthy attacks that slip through, including:
- Failed Logins
- Suspicious Service Installed
- Account Privilege Escalation
Network Traffic Analysis (NTA)
Networks Traffic Analysis (NTA) identifies attacks as they traverse in and out of the network. It analyzes traffic to and from all devices looking for patterns, abnormal behavior, and writing telemetry signatures. This allows detection of lateral movement, brute force attacks, privilege escalation, ransom ware, and C&C exploits.
Enhanced Detection For Containers
Alert Logic provides the industry’s only network intrusion detection solution and log management for containers and applications in hybrid and multi-cloud environments. By analyzing North/South as well as East/West traffic we can rapidly detect network intruders leading to shorter dwell time and reducing the impact of a successful attack. Our integrated, agent-based solution protects all workloads (container or not) and provides a graphical representation of a compromised container and its relationships.
Web Log Analytics
Alert Logic Web Log Analytics (WLA) enhances our web app threat detection capabilities by adding log-based threat detection and solves the visibility issue caused by modern transport encryption. This unique log-based threat detection analyzes the decrypted web server access logs (Apache, NGINIX, IIS) using a combination of pattern-matching, anomaly detection, signatures, and advanced correlations providing coverage for much of the OWASP Top 10.
Alert Logic WLA includes these capabilities:
- Signature-based Detection of General Web Attack Methods
- SQL Injection
- Cross-site Scripting (XSS)
- Automated Threats
- File Path Traversal
- Command Injection (CMDi)
- Known Vulnerability and Exploit Detection and Attribution
- Exploits Targeting Known Vulnerabilities (CWE)
- Known Web Shell Compromises that Lead to Remote Exploitation
- Anomaly-based Detection
- Brute-force Password Guessing Login Attempts
- Unknown Web Shell Compromises
These detection capabilities allow Alert Logic to detect incidents across a wide spectrum which include:
|Web Reconnaissance||Clear enumerating or attack activity detected|
|Server Error||Attack activity generating 500-type error responses from targeted web server|
|Access to Unauthorized Resource||Injection or Remote Command Execution followed by access to potentially uploaded (anomalous) resource indicating upload and access to web shell|
|Access to Anomalous Resource||Access to URL paths that are anomalous|
|Attack Targeting Specific Vulnerabilities||Exploits against specific known vulnerabilities|
|Unauthorized Vulnerability Scan||Web server attack observation from an unknown source|
|Authorized Vulnerability Scan||Attack from Alert Logic or other known provider as part of security assessment, auditing, or pen testing|
Alert Logic WLA is a unique solution which identifies attacks across all custom web apps throughout the enterprise, providing visibility into the most vulnerable and attacked applications, and allowing security leaders to make data-driven decisions on security controls.
File Integrity Monitoring (FIM)
Alert Logic’s FIM detects unauthorized change events to operating system, content, and application files for Windows and Linux servers. This includes integrity of system directories, registry keys, and values on the operating system. By monitoring for suspicious file change events, your organization can meet many compliance standards. Alert Logic sees the primary use case in compliance for PCI-DSS 10.5.5 and 11.5 which is change detection for log files and critical system files. It also satisfies additional compliance requirements including SOX Section 404, HIPAA – §164.312 (b), (c)(1) & (2), SOC 2, and HITRUST which all include change detection controls for integrity of files and folders.
This detection technology leverages the rich telemetry data from the Alert Logic agent installed on servers so there is no additional agent footprint necessary. Once configured it creates a repository of all SHA1 hashes of the monitored paths and records any deviations. Alert Logic recommends a recurring reporting and review schedule to investigate the detected changes. Reporting will include information of any file change events including time stamp, host name, file path, event type, and deployment. This helps provide context to understand if the changes are from external bad actors, well-meaning insiders, or malicious insiders engaging in nefarious activities.
Alert Logic’s endpoint detection intelligently blocks attacks through a combination of machine-learning attribute analysis and real-time behavior analysis and provides deep visibility without impacting performance. Our nextgeneration endpoint coverage dynamically combines machine-learning and behavior indicators to identify file-less and binary file attacks while reducing false positives for Microsoft Windows and Windows Server. This includes hosted instances of these platforms on AWS, Azure, Google Cloud and Oracle Cloud, and on macOS at no additional cost. Unlike solutions that generate models every four to six months to identify malicious files, Alert Logic automatically gathers thousands of samples each day and uses machine learning to analyze these samples to improve coverage and accuracy. Customers then transparently receive new models to get the best detection, resulting in fewer false positives because the model has already been trained with the specific software that customers are running. Alert Logic Endpoint Detection can run alongside existing anti-virus and endpoint security tools to provide the last line of defense.
To achieve community defense a security vendor needs a large data set. Alert Logic has more than 4,000 customers providing billions of IDS events and trillions of logs which are analyzed by our security platform, pushing over 7,000 incidents to our SOC each week. Each incident is manually triaged against your specific rule set to decide if it is a real incident and needs escalation. On average there are two high/critical incidents each month.
When Alert Logic identifies an attack pattern and its respective target, we are able to parse through rich telemetry data to identify and proactively inform you if you fit the same profile and provide guidance to mitigate the potential of falling victim to this type of attack.
Alert Logic helps you advance your compliance program quickly without hiring new staff, and comply with mandates and standards such as PCI, HIPAA, HITRUST, SOC 2, GDPR and NIST. Alert Logic also provides several audit-enabling reports and help your staff stay one step ahead of requirements, mandates, and auditors.
Security professionals agree there is no silver bullet in security as no investment will provide 100% guarantee. Threat detection is a critical component for achieving desired security outcomes. It must have wide visibility and be paired with strong security expertise to provide actionable intelligence and improve security posture. Alert Logic has the most robust ecosystem coverage with a large team of expertise across multiple security disciplines, making enterprise class security affordable for all organizations. This allows your organization to be better prepared for future attacks, compliance mandates, world events, or the next phase of their digital transformation journey.
To learn more about how we can help improve the security posture of your organization, please explore Alert Logic’s online resources.