<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cybersecurity &#8211; Kloudynet &#8211; Your trusted partner for Cloud Security and Compliance</title>
	<atom:link href="https://kloudynet.com/category/cybersecurity/feed/" rel="self" type="application/rss+xml" />
	<link>https://kloudynet.com</link>
	<description>Leading Microsoft Security Partner &#124; Identity, Data, Cloud &#38; AI Security Experts</description>
	<lastBuildDate>Fri, 04 Feb 2022 04:00:52 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>Modern XDR + SOC using Microsoft Sentinel</title>
		<link>https://kloudynet.com/modern-xdr-soc-using-azure-sentinel/</link>
					<comments>https://kloudynet.com/modern-xdr-soc-using-azure-sentinel/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 01 Dec 2020 14:54:10 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://www.kloudynet.com/?p=679</guid>

					<description><![CDATA[Microsoft recently announced its new approach with Extended Detection and Response (XDR) to deliver intelligent, automated, and integrated security across domains to help defenders connect seemingly disparate alerts and get ahead of attackers. At the same time, Microsoft announced its<a href="https://kloudynet.com/modern-xdr-soc-using-azure-sentinel/">...[...]</a>]]></description>
										<content:encoded><![CDATA[<p><span style="font-family: Segoe UI; font-size: 12pt;">Microsoft recently announced its new approach with <a href="https://www.microsoft.com/security/blog/2020/09/22/microsoft-unified-siem-xdr-modernize-security-operations/"><span style="color: blue; text-decoration: underline;">Extended Detection and Response (XDR)</span></a> to deliver intelligent, automated, and integrated security across domains to help defenders connect seemingly disparate alerts and get ahead of attackers. At the same time, Microsoft announced its unique approach for a Modern SOC by <a href="https://www.microsoft.com/en-us/security/business/threat-protection"><span style="color: blue; text-decoration: underline;">integrating SIEM and XDR</span></a> solutions together. Microsoft offers its SIEM and SOAR capabilities with their new serverless offering which is Microsoft Sentinel. I did write in detail about Microsoft Sentinel in my <a href="https://kloudynet.com/why-azure-sentinel-should-be-your-soar-and-siem-solution/"><span style="color: blue; text-decoration: underline;">last article</span></a>.<br />
</span></p>
<p><span style="font-family: Segoe UI; font-size: 12pt;">Based on the customer feedback from the field, we realized that there was a pressing need to bring in all the Microsoft Security threat detection solutions under one roof. The below reference architecture provides a complete understanding of various Microsoft Security solutions (XDR + SIEM) and their native as well as third party solution integrations. The architecture also includes a CISO dashboard developed by Kloudynet to provide full visibility across all the security products, multiple cloud platforms (Azure, AWS, GCP), and the organization&#8217;s security posture.<br />
</span></p>
<p style="text-align: center;"><img fetchpriority="high" decoding="async" class="col-md-12 wp-image-783 size-medium aligncenter" src="https://kloudynet.com/wp-content/uploads/2022/02/Kloudynet_Microsoft-Modern-XDRSOC-Offering-2022.svg" alt="" width="300" height="300" /></p>
<p style="text-align: center;"><strong>Modern XDR + SOC Architecture</strong></p>
<p><span style="font-family: Segoe UI; font-size: 12pt;">Click here to download the image in the formats: <a href="https://kloudynet.com/wp-content/uploads/2022/02/Kloudynet_Microsoft-Modern-XDRSOC-Offering-2022.svg">SVG</a>, <a href="https://kloudynet.com/wp-content/uploads/2022/02/Kloudynet_Microsoft-Modern-XDRSOC-Offering-2022.pdf">PDF</a> or <a href="https://kloudynet.com/wp-content/uploads/2022/02/Kloudynet_Microsoft-Modern-XDRSOC-Offering-2022.png">PNG</a><br />
</span></p>
<p><span style="font-family: Segoe UI; font-size: 16pt;"><strong>Microsoft Defender<br />
</strong></span></p>
<p><span style="font-family: Segoe UI; font-size: 12pt;">Microsoft Defender is offered as, <a href="https://aka.ms/m365d" target="_blank" rel="noopener noreferrer"><span style="color: blue; text-decoration: underline;">Microsoft 365 Defender</span></a> for end-user environments and <a href="https://aka.ms/azuredefender" target="_blank" rel="noopener noreferrer"><span style="color: blue; text-decoration: underline;">Defender for Cloud</span></a> for cloud and hybrid infrastructure.<br />
</span></p>
<p><span style="font-family: Segoe UI; font-size: 12pt;"><strong>Microsoft 365 Defender<br />
</strong></span></p>
<p><span style="font-family: Segoe UI; font-size: 12pt;">Microsoft 365 Defender delivers XDR capabilities for identities, endpoints, cloud apps, and emails. Microsoft 365 Defender includes the below technologies<br />
</span></p>
<ul>
<li><span style="font-family: Segoe UI; font-size: 12pt;">Microsoft Defender for Endpoint<br />
</span></li>
<li><span style="font-family: Segoe UI; font-size: 12pt;">Microsoft Defender for Office 365<br />
</span></li>
<li><span style="font-family: Segoe UI; font-size: 12pt;">Microsoft Defender for Identity<br />
</span></li>
<li><span style="font-family: Segoe UI; font-size: 12pt;">Azure Active Directory Identity Protection<br />
</span></li>
<li><span style="font-family: Segoe UI; font-size: 12pt;">Microsoft Defender for Cloud Apps<br />
</span></li>
</ul>
<p><span style="font-family: Segoe UI; font-size: 12pt;"><strong>Microsoft Defender for Cloud (Previously Azure Security Center)<br />
</strong></span></p>
<p><span style="font-family: Segoe UI; font-size: 12pt;">Defender for Cloud delivers XDR left capabilities to protect multi-cloud and hybrid workloads, that includes below capabilities<br />
</span></p>
<ul>
<li>
<div><span style="font-family: Segoe UI; font-size: 12pt;">Azure Defender which covers<br />
</span></div>
<ul>
<li><span style="font-family: Segoe UI; font-size: 12pt;">Servers (VMs running on Azure or anywhere using Azure Arc)<br />
</span></li>
<li><span style="font-family: Segoe UI; font-size: 12pt;">App Service<br />
</span></li>
<li><span style="font-family: Segoe UI; font-size: 12pt;">SQL servers on machines<br />
</span></li>
<li><span style="font-family: Segoe UI; font-size: 12pt;">Azure Storage<br />
</span></li>
<li><span style="font-family: Segoe UI; font-size: 12pt;">Kubernetes<br />
</span></li>
<li><span style="font-family: Segoe UI; font-size: 12pt;">Container Registries<br />
</span></li>
<li><span style="font-family: Segoe UI; font-size: 12pt;">Azure Key Vault<br />
</span></li>
</ul>
</li>
<li><span style="font-family: Segoe UI; font-size: 12pt;">Azure Defender for IoT<br />
</span></li>
<li><span style="font-family: Segoe UI; font-size: 12pt;">Azure Defender for SQL<br />
</span></li>
</ul>
<p><span style="font-family: Segoe UI; font-size: 16pt;"><strong>Microsoft Sentinel<br />
</strong></span></p>
<p><span style="font-family: Segoe UI; font-size: 12pt;">The XDR capabilities of Microsoft Defender delivered through Defender for Cloud and Microsoft 365</span><span style="font-family: Segoe UI; font-size: 12pt;"> Defender provides rich insights and prioritized alerts, but to gain visibility across your entire environment and include data from other security solutions such as firewalls and existing security tools, we connect Microsoft Defender to <a href="https://docs.microsoft.com/en-us/azure/sentinel/">Microsoft Sentinel</a>, Microsoft cloud-native SIEM.<br />
</span></p>
<p><span style="font-family: Segoe UI; font-size: 12pt;">Special thanks to <a href="https://www.linkedin.com/in/ahsim-nisar-12ba5419/">Ahsim Nisar</a> (Technical Specialist, Cyber Security) for providing guidance and technical inputs to build the architecture diagram<br />
</span></p>
<p>&nbsp;</p>
<p><a href="https://www.linkedin.com/in/fashaik/"><span style="font-family: Segoe UI; font-size: 12pt;">Fahad Shaikh</span></a><span style="font-family: Segoe UI; font-size: 12pt;">, Founder &amp; CEO, <a href="https://www.linkedin.com/company/kloudynet">Kloudynet Technologies</a><br />
</span></p>
]]></content:encoded>
					
					<wfw:commentRss>https://kloudynet.com/modern-xdr-soc-using-azure-sentinel/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Why Azure Sentinel should be your SOAR and SIEM solution?</title>
		<link>https://kloudynet.com/why-azure-sentinel-should-be-your-soar-and-siem-solution/</link>
					<comments>https://kloudynet.com/why-azure-sentinel-should-be-your-soar-and-siem-solution/#respond</comments>
		
		<dc:creator><![CDATA[Fahad Shaikh]]></dc:creator>
		<pubDate>Thu, 02 Jul 2020 12:43:53 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://www.kloudynet.com/?p=529</guid>

					<description><![CDATA[6-7 Mins Read Azure Sentinel is a cloud-native Security Incident and Event Management (SIEM) solution built to provide security analysts with a powerful tool to detect and respond to cyberattacks. Azure Sentinel also contains a Security Orchestration and Automated Response<a href="https://kloudynet.com/why-azure-sentinel-should-be-your-soar-and-siem-solution/">...[...]</a>]]></description>
										<content:encoded><![CDATA[<p>6-7 Mins Read</p>
<p>Azure Sentinel is a cloud-native <strong>Security Incident and Event Management (SIEM)</strong> solution built to provide security analysts with a powerful tool to detect and respond to cyberattacks. Azure Sentinel also contains a <strong>Security Orchestration and Automated Response (SOAR)</strong> capability. But before we answer why “Azure Sentinel” its important to understand the current Threat landscape and challenges organizations are facing</p>
<p>&nbsp;</p>
<h3><strong>Current Threat Landscape:</strong></h3>
<p>NotPetya is seen as one of the worlds most sophisticated and disruptive cyberattacks that began in Europe in June 2017. NotPetya was meant for pure destruction, and although it pretended not to be a ransomware, there was no chance for the victim to restore the infected machines because the data was made indecipherable with encryption.</p>
<p>The component of NotPetya that made it so lethal was that it contained multiple lateral movement techniques to spread quickly following the initial infection. According to an assessment, the total financial damage from NotPetya attacks totaled $10 billion!</p>
<p>&nbsp;</p>
<p>Furthermore, statistics say</p>
<ul>
<li>86{9ee96c6d432e164aa8f1209d1934688fca0902a21c1f7400127c265baa8231f2} of all breaches are financially motivated, where threat actors are after company financial data, intellectual property, health records, and customer identities that can be sold fast on the Dark Web.</li>
<li>70{9ee96c6d432e164aa8f1209d1934688fca0902a21c1f7400127c265baa8231f2} of breaches are perpetrated by external actors, making endpoint security a high priority in any cybersecurity strategy.</li>
<li>55{9ee96c6d432e164aa8f1209d1934688fca0902a21c1f7400127c265baa8231f2} of breaches originate from organized crime groups.</li>
<li>Attacks on Web apps accessed from endpoints were part of 43{9ee96c6d432e164aa8f1209d1934688fca0902a21c1f7400127c265baa8231f2} of breaches, more than double the results from last year.</li>
</ul>
<p>&nbsp;</p>
<p>Source: <a href="https://enterprise.verizon.com/resources/reports/2020-data-breach-investigations-report.pdf" target="_blank" rel="noopener noreferrer">https://enterprise.verizon.com/resources/reports/2020-data-breach-investigations-report.pdf</a></p>
<p>&nbsp;</p>
<h3><strong>Security Challenges for SecOps:</strong></h3>
<p>For most organizations, the Security Operations Team (SOC) is the central hub responsible for identifying and responding to cybersecurity threats. Mitre (<a href="https://attack.mitre.org/" target="_blank" rel="noopener noreferrer">attack.mitre.org</a>) defines the SOC as “a team primarily composed of security analysis organized to detect, analyze, respond to, report on, and prevent cyber security incidents. The commonly found pattern would include</p>
<p>Tier 1 – High Speed Remediation</p>
<p>Tier 2 – Advanced Analysis, Investigation, and Remediation</p>
<p>Tier 3 – Proactive Hunting and Advanced Forensics</p>
<p>&nbsp;</p>
<p>Microsoft today has adopted the fusion center model for cyber defense operations known as Cyber Defense Operations Center (CDOC)</p>
<p>&nbsp;</p>
<p><img decoding="async" class="alignnone wp-image-538" src="https://kloudynet.com/wp-content/uploads/2020/07/Microsoft-CDOC-1-300x170.png" alt="" width="476" height="270" srcset="https://kloudynet.com/wp-content/uploads/2020/07/Microsoft-CDOC-1-300x170.png 300w, https://kloudynet.com/wp-content/uploads/2020/07/Microsoft-CDOC-1-1024x579.png 1024w, https://kloudynet.com/wp-content/uploads/2020/07/Microsoft-CDOC-1-768x435.png 768w, https://kloudynet.com/wp-content/uploads/2020/07/Microsoft-CDOC-1.png 1147w" sizes="(max-width: 476px) 100vw, 476px" /></p>
<p>&nbsp;</p>
<h3><strong>Resource Challenges: </strong></h3>
<p>Staffing shortages have hit Security Operations Center especially hard for a few reasons</p>
<ul>
<li>SOCs run operations 24X7X365 and therefore require heavy investments in security personnel</li>
<li>Security analysts require unique set of knowledge and skills that are difficult to find
<ul>
<li>Understanding of common attacker techniques</li>
<li>Have strong intuition</li>
<li>Have a desire to dig into the details and volumes of alerts and logs</li>
<li>Be driven to continuously learn</li>
</ul>
</li>
</ul>
<p>With these challenges CISOs and SOC leaders are looking for solutions that make their analysts more efficient; reduce the volume of mundane, manual tasks; and provide robust automation and orchestration capabilities</p>
<p>&nbsp;</p>
<h3><strong>Security Data Challenges</strong></h3>
<p>Security teams are drowning in the volumes of data generated by the digital assets they are required to protect. IIOT devices, smart sensors, BYOD, and other devices which are connected</p>
<ul>
<li>Security teams are often required to forgo connecting data sources because of the costs associated with scaling out their SIEMs</li>
<li>Search and correlation engines cannot not handle large volumes of data and analysts’ queries</li>
<li>Static correlation rules often miss anomalies that indicated that an attacked has successfully infiltrated the system</li>
<li>Typical, early SIEM systems were not built on machine-learning models to help identify such anomalies</li>
<li>Hiring so many data scientists to build, test and deploy their own models is expensive and hard</li>
<li>Many SIEM deployments are done with a “deploy and forget mentality”. This results in analytics working on a higher number of false positives that strains personnel and makes identifying the true, high-value events difficult.</li>
</ul>
<p>&nbsp;</p>
<h3><strong>Azure Sentinel: Cloud-native SIEM </strong></h3>
<p>Azure Sentinel has been engineered to address the SecOps challenges identified earlier in this article</p>
<ul>
<li>Automatic scaling up to meet the data and storage requirements for enterprises of any size. All the log data for Azure Sentinel is stored in an <em>Azure Log Analytics Workspace</em></li>
<li>Integrating directly with the Microsoft Threat Intelligent Security Graph to help increase the likelihood of detecting advanced threats by leveraging Microsofts and its partners intelligence</li>
<li>Integrating endpoint protection logs for early detection. Securing endpoint is the future of cybersecurity based on the data provided early in the article</li>
<li>Reducing the need for human intervention by leveraging an open and flexible automation capability for investigating and responding to alerts</li>
<li>Including the advanced anomaly detection using Microsofts machine learning algorithms (FUSION)</li>
<li>Providing dashboards and user interfaces that are intuitive to analysts and built to streamline the typical operations within an SOC</li>
</ul>
<p>&nbsp;</p>
<h3><strong>Azure Sentinel: Core Capabilities </strong></h3>
<p>&nbsp;</p>
<p>Azure sentinel provides security teams with unprecedented visibility into their digital estates</p>
<p>&nbsp;</p>
<p><img decoding="async" class="alignnone wp-image-536" src="https://kloudynet.com/wp-content/uploads/2020/07/Sentinel-Core-Capabilities-300x289.png" alt="" width="352" height="339" srcset="https://kloudynet.com/wp-content/uploads/2020/07/Sentinel-Core-Capabilities-300x289.png 300w, https://kloudynet.com/wp-content/uploads/2020/07/Sentinel-Core-Capabilities.png 581w" sizes="(max-width: 352px) 100vw, 352px" /></p>
<p>&nbsp;</p>
<ul>
<li>Data collection and storage across all users, devices, applications, and infrastructure – whether on-premise or in the cloud</li>
<li>Threat detection that leverages Microsofts analytics and threat intelligence</li>
<li>Investigation of threats by hunting for suspicious activities at scale</li>
<li>Rapid response to incidents by leveraging built-in orchestration and automation of common tasks</li>
</ul>
<p>&nbsp;</p>
<h3><strong>Azure Sentinel: Components </strong></h3>
<p>&nbsp;</p>
<p>The below diagram shows the major components of Azure Sentinel</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-535" src="https://kloudynet.com/wp-content/uploads/2020/07/Sentinel-Components-300x203.png" alt="" width="414" height="280" srcset="https://kloudynet.com/wp-content/uploads/2020/07/Sentinel-Components-300x203.png 300w, https://kloudynet.com/wp-content/uploads/2020/07/Sentinel-Components.png 671w" sizes="auto, (max-width: 414px) 100vw, 414px" /></p>
<p>&nbsp;</p>
<ul>
<li><strong>Analytics</strong>: Analytics enables you to create custom alerts using Kusto Query Language (KQL). You can further take actions on these alerts by attaching the analytics to playbooks. Playbooks are created using Azure Logic Apps</li>
</ul>
<p>&nbsp;</p>
<ul>
<li><strong>Cases</strong>: Also called as incident, is an aggregation of all the relevant evidence for a specific investigation. It can contain one or multiple alerts, which are based on analytics that you define</li>
</ul>
<p>&nbsp;</p>
<ul>
<li><strong>Hunting</strong>: This is a powerful tool for investigators and security analysts who need to proactively look for security threats. The searching capability is powered by Kusto Query Language</li>
</ul>
<p>&nbsp;</p>
<ul>
<li><strong>Notebooks</strong>: By integrating Jupyter Notebooks, Azure Sentinel extends the scope of what you can do with the data that was collected. One of the major reasons for using Jupyter Notebooks is the complexity of what you are trying to do with Azure Sentinels built-in tools becomes high
<ul>
<li>When the number of queries in your investigation chain goes high</li>
<li>Doing complex KQL query gymnastics to integrate some external data or extract some specific entity type from data</li>
</ul>
</li>
</ul>
<p>Most of Azure Sentinels <a href="https://notebooks.azure.com/" target="_blank" rel="noopener noreferrer">Jupyter Notebooks</a> heavily depend on <a href="https://msticpy.readthedocs.io/en/latest/" target="_blank" rel="noopener noreferrer"><em>msticpy</em> </a>Python package which is developed by Microsofts Threat Intelligence Center</p>
<ul>
<li><strong>Data Connectors</strong>: Built-in connectors are available to facilitate data ingestion from Microsoft and partner solutions. Below is a list of some of the Microsoft and non-Microsoft connectors with Azure Sentinel. Note that this is not an exhaustive list of the built-in connectors
<ul>
<li>Amazon Web Services</li>
<li>Azure Active Directory</li>
<li>Azure Active Directory Identity Protection</li>
<li>Azure Activity</li>
<li>Azure Advanced Threat Protection</li>
<li>Azure Information Protection</li>
<li>Azure Security Center</li>
<li>Azure Security Center for IoT</li>
<li>Barracuda CloudGen Firewall</li>
<li>Barracuda Web Application Firewall</li>
<li>Check Point</li>
<li>Cisco ASA</li>
<li>Citrix Analytics (Security)</li>
<li>CyberArk (Coming soon….)</li>
<li>DNS</li>
<li>F5 BIG-IP</li>
<li>F5 Networks</li>
<li>Fortinet</li>
<li>Microsoft Cloud App Security</li>
<li>Microsoft Defender Advanced Threat Protection​</li>
<li>Microsoft web application firewall (WAF)</li>
<li>Office 365</li>
<li>Palo Alto Networks</li>
<li>Security Events</li>
<li>Threat Intelligence Platforms</li>
<li>Threat intelligence &#8211; TAXII</li>
<li>Trend Micro</li>
<li>Windows Firewall</li>
<li>Zimperium Mobile Threat Defense</li>
<li>Zscaler</li>
</ul>
</li>
</ul>
<p>&nbsp;</p>
<p>If an external solution is not on data connector list, but your appliance supports saving logs as a Syslog Common Event Format (CEF), the integration with Azure Sentinel is available via CEF connector. If CEF support is not available on your appliance, but it supports calls to REST API, you can use HTTP Data Collector API to send log data to the workspace on which Azure Sentinel is enabled.</p>
<p>&nbsp;</p>
<ul>
<li><strong>Playbooks: </strong>A playbook is a collection of procedures that can be automatically executed upon an alert triggered by Azure Sentinel. Playbooks leverage Azure Logic Apps, which help you automate and orchestrate tasks/workflows.</li>
</ul>
<p>&nbsp;</p>
<ul>
<li><strong>Workspace: </strong>A log Analytics workspace is a container that includes data and configuration information. Azure sentinel uses this container to store data that you collect from the different data sources.</li>
</ul>
<p>&nbsp;</p>
<h3><strong>Conclusion: </strong></h3>
<p>&nbsp;</p>
<p>Utilizing a cloud-native SIEM will definitely reduce the integration costs and free up resources.</p>
<p>Ease of integration with telemetry data is the key to any SIEM success. Azure Sentinel offers a resilient and a straightforward way to connect data sources, without the need to any have server or storage infrastructure and going 100{9ee96c6d432e164aa8f1209d1934688fca0902a21c1f7400127c265baa8231f2} serverless.</p>
<p>With just a few clicks you can connect Sentinel to O365, Azure AD or Azure Activities and start receiving alerts immediately and get populated on the dashboards in minutes.</p>
<p>Now month-long projects on integration of O365 with legacy SIEM can be implemented in a day by onboarding to Azure Sentinel. Helps specially if customers are struggling with such integration of detection use cases to address auditors concerns.</p>
<p>All this is also true not only for collecting data from Microsoft sources. However Azure Sentinel AWS CloudTrial connector, which is based on serverless Cloud-To-Cloud connection, provides the same benefits.</p>
<p>Hope this write up gives a birds eye view of what Azure Sentinel is, its core capabilities &amp; benefits and why enterprises should be looking at Azure Sentinel as their next SOAR and SIEM solution.</p>
<p>&nbsp;</p>
<p>Fahad, Founder &amp; CEO, kloudynet Technologies</p>
<h3 class="mt1 t-18 t-black t-normal break-words">Microsoft Gold Partner and Experts in Azure | Cybersecurity &amp; Governance | Intelligent Automation</h3>
]]></content:encoded>
					
					<wfw:commentRss>https://kloudynet.com/why-azure-sentinel-should-be-your-soar-and-siem-solution/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
