Tuesday, August 25, 2020

Cloud-Sniper - Virtual Security Operations Center


Cloud Security Operations

What is Cloud Sniper?
Cloud Sniper is a platform designed to manage Security Operations in cloud environments. It is an open platform which allows responding to security incidents by accurately analyzing and correlating native cloud artifacts. It is to be used as a Virtual Security Operations Center (vSOC) to detect and remediate security incidents providing a complete visibility of the company's cloud security posture.
With this platform, you will have a complete and comprehensive management of the security incidents, reducing the costs of having a group of level-1 security analysts hunting for cloud-based Indicators of Compromise (IOC). These IOCs, if not correlated, will generate difficulties in detecting complex attacks. At the same time Cloud Sniper enables advanced security analysts integrate the platform with external forensic or incident-and-response tools to provide security feeds into the platform.
The cloud-based platform is deployed automatically and provides complete and native integration with all the necessary information sources, avoiding the problem that many vendors have when deploying or collecting data.
Cloud Sniper receives cloud-based and third-parties feeds and automatically responds protecting your infrastructure and generating a knowledge database of the IOCs that are affecting your platform. This is the best way to gain visibility in environments where information can be bounded by the Shared Responsibility Model enforced by cloud providers.
To detect advanced attack techniques, which may easily be ignored, the Cloud Sniper Analytics module correlates the events generating IOCs. These will give visibility on complex artifacts to analyze, helping both to stop the attack and to analyze the attacker's TTPs.
Cloud Sniper is currently available for AWS, but it is to be extended to others cloud platforms.

Automatic infrastructure deployment (for AWS)


WIKI => HOW IT WORKS

Cloud Sniper releases
1.  Automatic Incident and Response 
1. WAF filtering
2. NACLs filtering
3. IOCs knowledge database.
4. Tactics, Techniques and Procedures (TTPs) used by the attacker
2. Security playbooks
1. NIST approach
3. Automatic security tagging
4. Cloud Sniper Analytics
1. Beaconing detection with VPC Flow Logs (C2 detection analytics)

Upcoming Features and Integrations
1.  Security playbooks for cloud-based environments
2. Security incidents centralized management for multiple accounts. Web Management UI
3. WAF analytics
4. Case management (automatic case creation)
5. IOCs enrichment and Threat Intelligence feeds
6. Automatic security reports based on well-known security standards (NIST)
7. Integration with third-party security tools (DFIR)




via KitPloit
More info

  1. World No 1 Hacker Software
  2. Hacking Tools 2019
  3. Hacking Tools 2020
  4. Hack App
  5. Hacking Tools Mac
  6. Nsa Hack Tools Download
  7. Hacker Tools Software
  8. Hack Tools For Pc
  9. Pentest Tools Framework
  10. Blackhat Hacker Tools
  11. Pentest Tools Website
  12. Growth Hacker Tools
  13. Hack Tools For Ubuntu
  14. Hacking Tools For Kali Linux
  15. Hacker Tools For Windows
  16. World No 1 Hacker Software
  17. Pentest Tools Bluekeep
  18. Hacker Tools For Mac
  19. Hacker Tools Apk Download
  20. Pentest Box Tools Download
  21. Hack Tool Apk
  22. Best Hacking Tools 2020
  23. Hacking Tools Hardware
  24. Pentest Tools Github
  25. Hack App
  26. Github Hacking Tools
  27. Nsa Hacker Tools
  28. Hacker Tools Mac
  29. Hacking Tools For Beginners
  30. Pentest Tools Linux
  31. How To Hack
  32. Pentest Tools Github
  33. Pentest Tools Framework
  34. Hacking Tools
  35. Bluetooth Hacking Tools Kali
  36. Hacking Tools Windows
  37. Pentest Tools Apk
  38. Hack Rom Tools
  39. Usb Pentest Tools
  40. Hacker
  41. Pentest Tools Website
  42. Pentest Tools Url Fuzzer
  43. Hacking Tools Download
  44. Hacking Tools For Windows Free Download
  45. New Hack Tools
  46. Top Pentest Tools
  47. Hack Tools For Ubuntu
  48. Pentest Tools Nmap
  49. Hacker Tools Apk
  50. Hacker Techniques Tools And Incident Handling
  51. Hacking Tools For Kali Linux
  52. Pentest Tools List
  53. Hack Tools Github
  54. Pentest Tools For Windows
  55. Hacker Tools Apk
  56. Pentest Tools Port Scanner
  57. Hack Tools For Ubuntu
  58. Best Hacking Tools 2019
  59. Pentest Tools For Windows
  60. Kik Hack Tools
  61. Pentest Reporting Tools
  62. Hacker
  63. How To Install Pentest Tools In Ubuntu
  64. What Are Hacking Tools
  65. Pentest Tools Url Fuzzer
  66. Hacking Tools Github
  67. Best Pentesting Tools 2018
  68. Pentest Tools For Windows
  69. New Hack Tools
  70. Termux Hacking Tools 2019
  71. Tools 4 Hack
  72. Pentest Tools Bluekeep
  73. New Hacker Tools
  74. Game Hacking
  75. Pentest Tools Apk
  76. Hack Apps
  77. How To Make Hacking Tools
  78. Physical Pentest Tools
  79. Pentest Tools Find Subdomains
  80. Nsa Hack Tools
  81. Hacking Tools Mac
  82. Pentest Tools
  83. Hacking Tools Kit
  84. Hacking Tools For Windows Free Download
  85. Game Hacking
  86. Game Hacking
  87. Pentest Tools Bluekeep
  88. Hacker Tools Windows
  89. Usb Pentest Tools
  90. Pentest Recon Tools
  91. Pentest Tools Find Subdomains
  92. Nsa Hack Tools Download
  93. Blackhat Hacker Tools
  94. Hacker Tools Apk
  95. Ethical Hacker Tools
  96. Hack Tools For Games
  97. Hacker Search Tools
  98. Easy Hack Tools
  99. Usb Pentest Tools
  100. Hack Apps
  101. Hack And Tools
  102. Hacker Tools Online
  103. Hackers Toolbox
  104. Hacking Tools Github
  105. How To Hack
  106. How To Hack
  107. Pentest Recon Tools
  108. Pentest Automation Tools
  109. Tools Used For Hacking
  110. Black Hat Hacker Tools
  111. Hackrf Tools
  112. Hack Tools
  113. Easy Hack Tools
  114. Pentest Tools Kali Linux
  115. Hack Website Online Tool
  116. Hacking Tools Hardware
  117. Pentest Tools For Mac
  118. Pentest Tools For Android
  119. Pentest Tools Nmap
  120. Hacking Tools For Beginners
  121. Hack Tools Download
  122. Hacking Tools And Software
  123. Pentest Tools Tcp Port Scanner

No comments: