SlideShare a Scribd company logo
Can’t Touch This: Detecting Lateral
Movement in Zero-Touch Environments
Presented by Phillip Marlow
GCDA, GMON, GCIH, GCIA
Master’s Degree Candidate at the SANS Technology Institute
Approved for Public Release; Distribution Unlimited. Case Number 20-3244
©2020 The MITRE Corporation. ALL RIGHTS RESERVED.
The author's affiliation with The MITRE Corporation is provided for identification
purposes only, and is not intended to convey or imply MITRE's concurrence with, or
support for, the positions, opinions or viewpoints expressed by the author.
Master’s Degree Candidate
12/6/2022 ‹#› www.sans.edu
Approved for Public Release; Distribution Unlimited. Case Number 20-3244
©2020 The MITRE Corporation. ALL RIGHTS RESERVED.
Objectives
 Understand the security value of zero-touch environments
 Understand how to detect zero-touch policy violations using a
network monitor
 Understand how to distinguish malicious lateral movement from
non-malicious policy violations using a SIEM
Master’s Degree Candidate
12/6/2022 ‹#› www.sans.edu
Approved for Public Release; Distribution Unlimited. Case Number 20-3244
©2020 The MITRE Corporation. ALL RIGHTS RESERVED.
Attack Paths
1. Direct attack against the application server
2. Compromise workstation & pivot through bastion
3. Compromise workstation & pivot through DevOps pipeline
Internet
Workstation
Bastion
App Server
Source Repo
Test
Servers
Configuration
Server
1 2
3
Master’s Degree Candidate
12/6/2022 ‹#› www.sans.edu
Approved for Public Release; Distribution Unlimited. Case Number 20-3244
©2020 The MITRE Corporation. ALL RIGHTS RESERVED.
What is Zero-Touch?
 Goal: Make production safer and prevent outages
 Rule: Every change in production must either be
 made by automation (no humans)
 prevalidated by software
 made via an audited break-glass mechanism
 ZTP encompasses a set of principles and tools to enforce this
From:
https://www.usenix.org/sites/default/files/conference/protected-files/srecon19emea_slides_wolafka.pdf
No Humans
Master’s Degree Candidate
12/6/2022 ‹#› www.sans.edu
Approved for Public Release; Distribution Unlimited. Case Number 20-3244
©2020 The MITRE Corporation. ALL RIGHTS RESERVED.
Lateral Movement in a Zero-Touch
Environment
 Normally, there is no traffic between the workstation, bastion,
and application server
Internet
Workstation
Bastion
App Server
Source Repo
Test
Servers
Configuration
Server
Master’s Degree Candidate
12/6/2022 ‹#› www.sans.edu
Approved for Public Release; Distribution Unlimited. Case Number 20-3244
©2020 The MITRE Corporation. ALL RIGHTS RESERVED.
Lateral Movement in a Zero-Touch
Environment
 Normally, there is no traffic between the workstation, bastion,
and application server
 Therefore, any traffic can be automatically identified as an
anomaly
Internet
Workstation
Bastion
App Server
Source Repo
Test
Servers
Configuration
Server
Master’s Degree Candidate
12/6/2022 ‹#›
Master’s Degree Candidate www.sans.edu
Network Alerts
 Provide a starting point
 Not enough on their own to
determine if a breach has
occurred
Master’s Degree Candidate
12/6/2022 ‹#› www.sans.edu
Approved for Public Release; Distribution Unlimited. Case Number 20-3244
©2020 The MITRE Corporation. ALL RIGHTS RESERVED.
SIEM Timelines
Master’s Degree Candidate
12/6/2022 ‹#› www.sans.edu
Approved for Public Release; Distribution Unlimited. Case Number 20-3244
©2020 The MITRE Corporation. ALL RIGHTS RESERVED.
Benign Policy Violation Trends
 Temporary decrease in the number of running containers
 Temporary decrease in the number of container images
 Low level of HIDS alerts
Master’s Degree Candidate
12/6/2022 ‹#› www.sans.edu
Approved for Public Release; Distribution Unlimited. Case Number 20-3244
©2020 The MITRE Corporation. ALL RIGHTS RESERVED.
Benign Policy Violation Events
 Multiple zero-touch violations in short sequence
 No reconnaissance or incident response commands
Master’s Degree Candidate
12/6/2022 ‹#› www.sans.edu
Approved for Public Release; Distribution Unlimited. Case Number 20-3244
©2020 The MITRE Corporation. ALL RIGHTS RESERVED.
Attack Trends
 Increase in the number of container images
 Increase in the number of running containers, followed several
minutes later by a decrease back to normal levels
 Spike in HIDS alerts
Master’s Degree Candidate
12/6/2022 ‹#› www.sans.edu
Approved for Public Release; Distribution Unlimited. Case Number 20-3244
©2020 The MITRE Corporation. ALL RIGHTS RESERVED.
Attack Events
 Reconnaissance commands run shortly after zero-touch violation
 HIDS alerts spike following reconnaissance activity
Master’s Degree Candidate
12/6/2022 ‹#› www.sans.edu
Approved for Public Release; Distribution Unlimited. Case Number 20-3244
©2020 The MITRE Corporation. ALL RIGHTS RESERVED.
Incident Response Trends
 Temporary decrease in number of running containers
Master’s Degree Candidate
12/6/2022 ‹#› www.sans.edu
Approved for Public Release; Distribution Unlimited. Case Number 20-3244
©2020 The MITRE Corporation. ALL RIGHTS RESERVED.
Incident Response Events
 Both reconnaissance commands and incident response
commands are run following the zero-touch violation
 Timing should be checked against the incident response log
Master’s Degree Candidate
12/6/2022 ‹#› www.sans.edu
Approved for Public Release; Distribution Unlimited. Case Number 20-3244
©2020 The MITRE Corporation. ALL RIGHTS RESERVED.
Zero-Touch Violation Patterns
Zero-Touch Policy Violation Type
Log
Data
Type
Manual Updates Attack Incident Response
HIDS Alerts Low High Low
Incident Response
Commands
None None Yes
Reconnaissance
Commands
None Yes Yes
Container Images Temporary decrease Increase No change or increase
Running
Containers
Temporary decrease Changes Temporary decrease
Master’s Degree Candidate
12/6/2022 ‹#› www.sans.edu
Approved for Public Release; Distribution Unlimited. Case Number 20-3244
©2020 The MITRE Corporation. ALL RIGHTS RESERVED.
Summary
 Monitoring for zero-touch policy violations can benefit both
development and security teams
 Correlating these alerts with host-based data can make it easier
for analysts to categorize alerts
 Questions? Comments? Contact me at: phillip@marlow1.com or
@wolramp on Twitter

More Related Content

PDF
Emulating an Adversary with Imperfect Intelligence
PPTX
Harmony Endpoint - 10 Minutes Pitch (2).pptx
PPTX
Check Point Corporate Overview 2020 - Detailed
PDF
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
PPTX
Presales-Present_GravityZone Products_June2023.pptx
PPTX
Presales-Present_GravityZone Products_June2023.pptx
PPTX
EDR - Cehckpoint CPX 2024 Harmony Endpoint.pptx
PDF
philip_industry zero trust presentation ppt
Emulating an Adversary with Imperfect Intelligence
Harmony Endpoint - 10 Minutes Pitch (2).pptx
Check Point Corporate Overview 2020 - Detailed
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
EDR - Cehckpoint CPX 2024 Harmony Endpoint.pptx
philip_industry zero trust presentation ppt

Similar to Can't Touch This: Detecting Lateral Movement In Zero Touch Environments (20)

PDF
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
PDF
ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own ...
PDF
Advanced Web Security Deployment
PDF
IoT - the Next Wave of DDoS Threat Landscape
PPTX
Finding Secrets in Source Code the DevOps Way
PPTX
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
PPTX
Info sec for startups
PPTX
Top 5 predictions webinar
PPTX
Everything You Need to Know About BlueKeep
PPTX
The Five Biggest Cyber Security Trends In 2022
PDF
Sprite guard on line brochure
PDF
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
PPTX
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
PPTX
Mind the gap_cpx2022_moti_sagey_final
PDF
NCVO/Zurich webinar: Beyond cyber essentials
PDF
cyber_cost_brief_it_cast_25_aug_2020_harper_mabe.pdf
PPTX
India Cyber Threat Report 2023 (Seqrite)_
PDF
Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...
PPTX
Netpluz DDoS Mitigation - Managed Cyber Security
PPTX
Zero Trust in the Age of AI by Deblohit Bose.pptx
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own ...
Advanced Web Security Deployment
IoT - the Next Wave of DDoS Threat Landscape
Finding Secrets in Source Code the DevOps Way
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Info sec for startups
Top 5 predictions webinar
Everything You Need to Know About BlueKeep
The Five Biggest Cyber Security Trends In 2022
Sprite guard on line brochure
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Mind the gap_cpx2022_moti_sagey_final
NCVO/Zurich webinar: Beyond cyber essentials
cyber_cost_brief_it_cast_25_aug_2020_harper_mabe.pdf
India Cyber Threat Report 2023 (Seqrite)_
Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...
Netpluz DDoS Mitigation - Managed Cyber Security
Zero Trust in the Age of AI by Deblohit Bose.pptx
Ad

Recently uploaded (20)

PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Empathic Computing: Creating Shared Understanding
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
KodekX | Application Modernization Development
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Approach and Philosophy of On baking technology
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Empathic Computing: Creating Shared Understanding
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
“AI and Expert System Decision Support & Business Intelligence Systems”
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
KodekX | Application Modernization Development
MYSQL Presentation for SQL database connectivity
Unlocking AI with Model Context Protocol (MCP)
Mobile App Security Testing_ A Comprehensive Guide.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Dropbox Q2 2025 Financial Results & Investor Presentation
Approach and Philosophy of On baking technology
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
A Presentation on Artificial Intelligence
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Per capita expenditure prediction using model stacking based on satellite ima...
The AUB Centre for AI in Media Proposal.docx
Understanding_Digital_Forensics_Presentation.pptx
Ad

Can't Touch This: Detecting Lateral Movement In Zero Touch Environments

  • 1. Can’t Touch This: Detecting Lateral Movement in Zero-Touch Environments Presented by Phillip Marlow GCDA, GMON, GCIH, GCIA Master’s Degree Candidate at the SANS Technology Institute Approved for Public Release; Distribution Unlimited. Case Number 20-3244 ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. The author's affiliation with The MITRE Corporation is provided for identification purposes only, and is not intended to convey or imply MITRE's concurrence with, or support for, the positions, opinions or viewpoints expressed by the author.
  • 2. Master’s Degree Candidate 12/6/2022 ‹#› www.sans.edu Approved for Public Release; Distribution Unlimited. Case Number 20-3244 ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Objectives  Understand the security value of zero-touch environments  Understand how to detect zero-touch policy violations using a network monitor  Understand how to distinguish malicious lateral movement from non-malicious policy violations using a SIEM
  • 3. Master’s Degree Candidate 12/6/2022 ‹#› www.sans.edu Approved for Public Release; Distribution Unlimited. Case Number 20-3244 ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Attack Paths 1. Direct attack against the application server 2. Compromise workstation & pivot through bastion 3. Compromise workstation & pivot through DevOps pipeline Internet Workstation Bastion App Server Source Repo Test Servers Configuration Server 1 2 3
  • 4. Master’s Degree Candidate 12/6/2022 ‹#› www.sans.edu Approved for Public Release; Distribution Unlimited. Case Number 20-3244 ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. What is Zero-Touch?  Goal: Make production safer and prevent outages  Rule: Every change in production must either be  made by automation (no humans)  prevalidated by software  made via an audited break-glass mechanism  ZTP encompasses a set of principles and tools to enforce this From: https://www.usenix.org/sites/default/files/conference/protected-files/srecon19emea_slides_wolafka.pdf No Humans
  • 5. Master’s Degree Candidate 12/6/2022 ‹#› www.sans.edu Approved for Public Release; Distribution Unlimited. Case Number 20-3244 ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Lateral Movement in a Zero-Touch Environment  Normally, there is no traffic between the workstation, bastion, and application server Internet Workstation Bastion App Server Source Repo Test Servers Configuration Server
  • 6. Master’s Degree Candidate 12/6/2022 ‹#› www.sans.edu Approved for Public Release; Distribution Unlimited. Case Number 20-3244 ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Lateral Movement in a Zero-Touch Environment  Normally, there is no traffic between the workstation, bastion, and application server  Therefore, any traffic can be automatically identified as an anomaly Internet Workstation Bastion App Server Source Repo Test Servers Configuration Server
  • 7. Master’s Degree Candidate 12/6/2022 ‹#› Master’s Degree Candidate www.sans.edu Network Alerts  Provide a starting point  Not enough on their own to determine if a breach has occurred
  • 8. Master’s Degree Candidate 12/6/2022 ‹#› www.sans.edu Approved for Public Release; Distribution Unlimited. Case Number 20-3244 ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. SIEM Timelines
  • 9. Master’s Degree Candidate 12/6/2022 ‹#› www.sans.edu Approved for Public Release; Distribution Unlimited. Case Number 20-3244 ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Benign Policy Violation Trends  Temporary decrease in the number of running containers  Temporary decrease in the number of container images  Low level of HIDS alerts
  • 10. Master’s Degree Candidate 12/6/2022 ‹#› www.sans.edu Approved for Public Release; Distribution Unlimited. Case Number 20-3244 ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Benign Policy Violation Events  Multiple zero-touch violations in short sequence  No reconnaissance or incident response commands
  • 11. Master’s Degree Candidate 12/6/2022 ‹#› www.sans.edu Approved for Public Release; Distribution Unlimited. Case Number 20-3244 ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Attack Trends  Increase in the number of container images  Increase in the number of running containers, followed several minutes later by a decrease back to normal levels  Spike in HIDS alerts
  • 12. Master’s Degree Candidate 12/6/2022 ‹#› www.sans.edu Approved for Public Release; Distribution Unlimited. Case Number 20-3244 ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Attack Events  Reconnaissance commands run shortly after zero-touch violation  HIDS alerts spike following reconnaissance activity
  • 13. Master’s Degree Candidate 12/6/2022 ‹#› www.sans.edu Approved for Public Release; Distribution Unlimited. Case Number 20-3244 ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Incident Response Trends  Temporary decrease in number of running containers
  • 14. Master’s Degree Candidate 12/6/2022 ‹#› www.sans.edu Approved for Public Release; Distribution Unlimited. Case Number 20-3244 ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Incident Response Events  Both reconnaissance commands and incident response commands are run following the zero-touch violation  Timing should be checked against the incident response log
  • 15. Master’s Degree Candidate 12/6/2022 ‹#› www.sans.edu Approved for Public Release; Distribution Unlimited. Case Number 20-3244 ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Zero-Touch Violation Patterns Zero-Touch Policy Violation Type Log Data Type Manual Updates Attack Incident Response HIDS Alerts Low High Low Incident Response Commands None None Yes Reconnaissance Commands None Yes Yes Container Images Temporary decrease Increase No change or increase Running Containers Temporary decrease Changes Temporary decrease
  • 16. Master’s Degree Candidate 12/6/2022 ‹#› www.sans.edu Approved for Public Release; Distribution Unlimited. Case Number 20-3244 ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Summary  Monitoring for zero-touch policy violations can benefit both development and security teams  Correlating these alerts with host-based data can make it easier for analysts to categorize alerts  Questions? Comments? Contact me at: phillip@marlow1.com or @wolramp on Twitter

Editor's Notes

  • #2: Phillip Marlow is a cybersecurity and DevOps engineer. He helps organizations understand how to adopt DevOps practices to increase their security rather than sacrifice it in the name of speed. Often DevOps and security are thought of as separate fields. Sometimes organizations will consider one a foundation for the other. In other places, leadership will throw it all together as DevSecOps and hope their engineers can figure it out. But by thoughtfully bringing these two fields together, both groups can benefit and easily achieve outcomes that would be difficult for one field to accomplish on its own.
  • #3: This research brings together tools and techniques from security with practices from DevOps to achieve improve confidentiality, integrity, and availability of deployed applications. Specifically, it will show that by using network monitoring and a SIEM, analysts can detect lateral movement and distinguish between policy violations and malicious intrusions.
  • #4: In 2015, FireEye reported that 100% of incidents they investigated involved lateral movement, which made use of valid credentials harvested before or during the attack (FireEye, 2015). Recent reports continue to detect this trend, including the 2020 Verizon Data Breach Investigations Report (Verizon, 2020). This is in part due to requirements for employees to have privileged credentials to administer and update applications and the servers they run on. It is also due in part to the standard practice of leaving these credentials unencrypted on employee workstations, such as when using stored AWS API tokens or private SSH keys. One mitigation that we will explore in this presentation is removing those privileged credentials from employee workstations and instead requiring all updates to an application be made by automation. With the application server as the attacker’s target, there are 3 primary paths they could use: 1. A direct attack against the application server. This is a well studied path and generally the domain of IDS/IPS and firewalls. 2. Compromise an employee workstation, for example through phishing, and then pivot to the application server. This will be the primary attack path considered in this research. 3. Compromise an employee workstation, then use that access to modify the application source code or configuration. While dangerous, this path is harder due to the testing changes must go through before they are deployed to the application server.
  • #5: Google’s definition of the zero-touch network and zero-touch production environment is vendor-neutral and applies to many highly automated environments. The lack of any manual interaction under normal circumstances gives zero-touch its name. Even under abnormal circumstances, all manual intervention must be highly audited (Koley, 2016). This takes the DevOps practice of automation to a logical, and useful, extreme. By defining certain network connections that should not happen under normal circumstances, we can create automated alerts for these connections. Analysts can then examine other useful details, such as application changes that occurred at that time, to determine if an attack is occurring.
  • #6: To visualize how a zero-touch environment can make it easier to detect policy violations, including potential attacks, consider this scenario. An employee is working and making updates to the application server. As these updates are happening, they all flow through the DevOps process and are recorded and tested before the configuration change is allowed. During this normal operation, there is no traffic flowing through the bastion host to the application server.
  • #7: When this traffic does occur, it can be easily and automatically identified. This can happen because the structure of this environment and the existence of a zero-touch policy makes lateral movement clearly stand out. This is a useful example of a security policy being implemented as code, an important DevSecOps concept. This anomaly and the alert it generates is the starting point an analyst needs to zero in on a particular interaction.
  • #8: These alerts of zero-touch policy violations can be detected using any network monitoring tool capable of decoding the traffic in a given environment. For example, above is the Snort alert from an on-premise environment. These alerts draw analyst attention to the possibility of a problem but are not by themselves enough to know if an attack is occurring. To know what is really going on, analysts can use these alerts along with host-based logs correlated by a SIEM to detect common patterns that allow categorizing events. The next several slides will illustrate the major categories of policy violations and demonstrate patterns in the logs which can help an analyst correctly separate attacks from other violations.
  • #9: Two different formats of timeline are generated for an analyst to use when categorizing zero-touch violations. The top image shows a 1-minute duration of aggregated metrics, which are useful in showing trends in the data rather than individual data points. This longer timeframe also allows better visualization of metrics that are continuous, but that the host-based agents do not report every second, such as the total number of containers present on the system. The bottom image shows the same metrics with a 1-second aggregation. This format allows individual events to stand out in the data and helps analysts see the exact sequence of events with increased precision.
  • #10: Continued manual patching by development teams is likely to be one of the most common violations of a zero-touch policy immediately following implementation. The SIEM timelines show a few features which can indicate that this manual patching is going on. First, a temporary decrease in both the number of running containers (orange) and the total number of container images (green) is consistent with updating a running application which uses the latest tag. There are also a small number of HIDS alerts overall (yellow). Taken together, these all suggest a benign policy violation that can be referred to the business and not an attack.
  • #11: Looking at individual events for this case also suggests a benign policy violation. First, multiple zero-touch violations (red spikes) between the same hosts in a short timeframe can suggest that an employee is copying files to the server, then logging into to perform an update. When the HIDS alerts are further filtered to identify command line data, it shows that no commands are logged that are indicative of either reconnaissance or incident response.
  • #12: Following the initial zero-touch violation, there are a few patterns seen in these timelines that suggest an attack. First, we can see the total number of container images (green) increases, suggesting a new image has been installed. Immediately following that, the number of running containers (orange) increases, showing the new image is now being run. Once the new service is running, there is a spike in the overall number of HIDS alerts (yellow).
  • #13: Looking at individual events, we see that early on multiple reconnaissance commands are run (blue). These are commands such as netstat or ps which are often used to determine what is available on a server. A Windows equivalent might include commands such as tasklist, ipconfig, or others from JP CERT’s list of commands abused by attackers (Tomonaga, 2016). Taken together with the trend data for containers and HIDS alerts, these patterns demonstrates typical attacker behavior in performing some reconnaissance, then downloading and running additional tools. While the HIDS alerts by themselves could alert an analyst to this attack, by beginning with a zero-touch violation this attack can be detected earlier and easily tracked back to the previous step in the attack chain.
  • #14: The only allowed zero-touch violation is via an audited break-glass mechanism, such as when conducting incident response. Since this may happen, even long after the organization has adopted zero-touch, it is important to understand what it looks like so it can be quickly categorized. In this situation, we see a temporary decrease in the number of running containers (orange), which can indicate an image with no modification has been captured for forensic analysis. If there were modifications, we might also see an increase in the total number of container images (green).
  • #15: In the individual events timeline, we see both reconnaissance commands (blue) and incident response commands (gray) being run to collect and preserve forensic evidence. Reconnaissance commands have a lot of overlap with incident response commands, so overall this data together with the trends in container images seen suggests incident response activity. Of course all of this can, and should, be correlated with the incident response team’s log of activity. If this activity isn’t supported by an incident response log entry, it is possible it instead represents an attack against the application server’s availability.
  • #16: This table summarizes the experimental results seen over the last several slides. It can provide a quick reference for analysts when reviewing zero-touch violation alerts and assist in reaching an initial categorization. Trends in application data and privileged commands which occur immediately after a zero-touch violation can provide analysts a lot of value. By matching these patterns against the timelines generated for an event, analysts can reach not only an initial categorization, but also find helpful starting points for further investigation if needed.
  • #17: The whole organization can benefit from monitoring for zero-touch policy violations. Development teams can get feedback on misconfigurations and security teams get another tool for detecting one of the most common attack techniques – lateral movement using valid credentials. Instead of just adding more alerts for analysts to sift through, this monitoring goes one step further and helps analysts determine whether an event requires further investigation by displaying related data on an easy to consume timeline. Even for those organizations who are not able to take advantage of this technique right away, this proof of concept can provide another example of the benefits of adopting DevOps and zero-touch policies.