Dissecting a Cloud Attack: Securing Azure with AzLog

Thumb original uws dissecting a cloud attack securing azure with azlog independent white paper

Just because data, applications, and systems exist in Azure doesn’t mean your commitment to security, ability to monitor, and need to achieve compliance are any less. First, you need to collect security events, configuration changes, and access logs. Then you must centralize this data within a security information and event management (SIEM) platform to achieve visibility and maintain security.

To help you better understand what’s necessary and possible regarding logging and visibility of your Azure environment, we’ll take a look at an example of how a typical attack takes place, how to identify progression through the Cyber Attack Lifecycle using Azure’s AzLog functionality, and how to detect attackers moving laterally between the cloud and your on-premise network.

View whitepaper
Logrythm logo
Date: 2 August 2018, 0:00 am   |   Provider: LogRhythm EMEA   |   Size: 487 KB   |   Language: English
Keep Reading:
Thumb original uk uws using mitre attack in threat hunting and detection white paper

Using MITRE ATT&CK™ in Threat Hunting and Detection

MITRE ATT&CK1 is an open framework and knowledge base of adversary tactics and techniques based on real-world observations. ATT&CK provides a common taxonomy of the tactical objectives of adversaries and their methods. Having a taxonomy by itself has many valuable uses, such as providing a common vocabulary for exchanging information with others in the security community. But it also serves as a real technical framework for classifying your current detection efforts and identifying gaps where you are blind to certain types of attack beh ...

To the download
Thumb original uk the security operations maturity model quick reference guide brochure

The Security Operations Maturity Model Quick Reference Guide

Organisations should think of security operations as a critical business process. Effective security operations are the first line of defence when it comes to preventing cyberattacks. To accomplish this, organisations need mature programs that leverage people, process and technology to rapidly detect and respond to sophisticated attacks.

Yet some organisations struggle with the overall effectiveness of their security operations. They also lack the basis for measuring the effectiveness and maturing capabilities. A mature security operation e ...

To the download
Bildschirmfoto 2020 07 13 um 13.27.34

The State of Remote Working

Prior to COVID-19, most organizations had remote work capabilities in place. But, the pandemic has caused even the most-prepared IT leaders to re-evaluate their readiness to support remote work, at scale. To gain insights into the IT capabilities necessary to ensure business continuity and workforce productivity, now and for the “next norm”, we conducted a TechValidate1 survey to our customer base in April 2020.

Here’s what we learned: ...

To the download
Capture

Forrester- The Key To Enterprise Hybrid Multicloud Strategy - The Webinar

Forrester surveyed 350 IT decision makers to understand how they are developing and implementing their IT infrastructure strategies. Find out what they had to say in our webinar, The Key to an Effective Hybrid Multicloud Strategy. ...

To the download
Thumb original covid 19 and shattered supply chains final for cs

COVID-19 and shattered supply chains - Reducing vulnerabilities through smarter supply chains

Companies typically create supply chains with the expectation that materials will be easily accessible. However, as COVID-19 has shown, unexpected events can shatter this basic premise, disrupting supply chain performance.

COVID-19 has driven home the need to strengthen global supply chain networks. Supply chains should be dynamic, responsive, and interconnected to an organization’s ecosystem and processes. This requires end-to-end visibility, real-time insights, and decisive actions -particularly in escalating situations.

Systems based ...

To the download