

Search results
615 results found with an empty search
- AlgoSec | CSPM importance for CISOs. What security issues can be prevented\defended with CSPM?
Cloud Security is a broad domain with many different aspects, some of them human. Even the most sophisticated and secure systems can be... Cloud Security CSPM importance for CISOs. What security issues can be prevented\defended with CSPM? Rony Moshkovich 2 min read Rony Moshkovich Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. Tags Share this article 6/17/21 Published Cloud Security is a broad domain with many different aspects, some of them human. Even the most sophisticated and secure systems can be jeopardized by human elements such as mistakes and miscalculations. Many organizations are susceptible to such dangers, especially during critical tech configurations and transfers. Especially for example, during digital transformation and cloud migration may result in misconfigurations that can leave your critical applications vulnerable and your company’s sensitive data an easy target for cyber-attacks. The good news is that Prevasio, and other cybersecurity providers have brought in new technologies to help improve the cybersecurity situation across multiple organizations. Today, we discuss Cloud Security Posture Management (CSPM) and how it can help prevent not just misconfigurations in cloud systems but also protect against supply chain attacks. Understanding Cloud Security Posture Management First, we need to fully understand what a CSPM is before exploring how it can prevent cloud security issues. CSPM is first of all a practice for adopting security best practices as well as automated tools to harden and manage the company security strength across various cloud based services such as Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). These practices and tools can be used to determine and solve many security issues within a cloud system. Not only is CSPM critical to the growth and integrity of your cloud infrastructure, but it’s also mandatory for organizations with CIS, GDPR, PCI-DSS, NIST, HIPAA and similar compliance requirements. How Does CSPM Work? There are numerous cloud service providers such as AWS , Azure , Google Cloud, and others that provide hyper scaling cloud hosted platforms as well as various cloud compute services and solutions to organizations that previously faced many hurdles with their on-site cloud infrastructures. When you migrate your organization to these platforms, you can effectively scale up and cut down on on-site infrastructure spending. However, if not appropriately handled, cloud migration comes with potential security risks. For instance, an average Lift and Shift transfer that involves a legacy application may not be adequately security hardened or reconfigured for safe use in a public cloud setup. This may result in security loopholes that expose the network and data to breaches and attacks. Cloud misconfiguration can happen in multiple ways. However, the most significant risk is not knowing that you are endangering your organization with such misconfigurations. That being the case, below are a few examples of cloud misconfigurations that can be identified and solved by CSPM tools such as Prevasio within your cloud infrastructure: Improper identity and access management : Your organization may not have the best identity and access management system in place. For instance, lack of Multi-Factor Authentication (MFA) for all users, unreliable password hygiene, and discriminatory user policies instead of group access, Role-based access, and everything contrary to best practices, including least privilege. You are unable to log in to events in your cloud due to an accidental CloudTrail error. Cloud storage misconfigurations : Having unprotected S3 buckets on AWS or Azure. CSPM can compute situations that have the most vulnerabilities within applications Incorrect secret management : Secret credentials are more than user passwords or pins. They include encryption keys, API keys, among others. For instance, every admin must use encryption keys on the server-side and rotate the keys every 90 days. Failure to do this can lead to credentials misconfigurations. Ideally, part of your cloud package must include and rely on solutions such as AWS Secrets Manager , Azure Key Vault , and other secrets management solutions. The above are a mere few examples of common misconfigurations that can be found in your cloud infrastructure, but CSPM can provide additional advanced security and multiple performance benefits. Benefits Of CSPM CSPM manages your cloud infrastructure. Some of the benefits of having your cloud infrastructure secured with CSPM boils down to peace of mind, that reassurance of knowing that your organization’s critical data is safe. It further provides long-term visibility to your cloud networks, enables you to identify violations of policies, and allows you to remediate your misconfigurations to ensure proper compliance. Furthermore, CSPM provides remediation to safeguard cloud assets as well as existing compliance libraries. Technology is here to stay, and with CSPM, you can advance the cloud security posture of your organization. To summarize it all, here are what you should expect with CSPM cloud security: Risk assessment : CSPM tools can enable you to see your network security level in advance to gain visibility into security issues such as policy violations that expose you to risk. Continuous monitoring : Since CSPM tools are versatile they present an accurate view of your cloud system and can identify and instantly flag off policy violations in real-time. Compliance : Most compliance laws require the adoption of CIS, NIST, PCI-DSS, SOC2, HIPAA, and other standards in the cloud. With CSPM, you can stay ahead of internal governance, including ISO 27001. Prevention : Most CSPM allows you to identify potential vulnerabilities and provide practical recommendations to prevent possible risks presented by these vulnerabilities without additional vendor tools. Supply Chain Attacks : Some CSPM tools, such as Prevasio , provides you malware scanning features to your applications, data, and their dependency chain on data from external supply chains, such as git imports of external libraries and more. With automation sweeping every industry by storm, CSPM is the future of all-inclusive cloud security. With cloud security posture management, you can do more than remediate configuration issues and monitor your organization’s cloud infrastructure. You’ll also have the capacity to establish cloud integrity from existing systems and ascertain which technologies, tools, and cloud assets are widely used. CSPM’s capacity to monitor cloud assets and cyber threats and present them in user-friendly dashboards is another benefit that you can use to explore, analyze and quickly explain to your team(s) and upper management. Even find knowledge gaps in your team and decide which training or mentorship opportunities your security team or other teams in the organization might require. Who Needs Cloud Security Posture Management? At the moment, cloud security is a new domain that its need and popularity is growing by the day. CSPM is widely used by organizations looking to maximize in a safe way the most of all that hyper scaling cloud platforms can offer, such as agility, speed, and cost-cutting strategies. The downside is that the cloud also comes with certain risks, such as misconfigurations, vulnerabilities and internal\external supply chain attacks that can expose your business to cyber-attacks. CSPM is responsible for protecting users, applications, workloads, data, apps, and much more in an accessible and efficient manner under the Shared Responsibility Model. With CSPM tools, any organization keen on enhancing its cloud security can detect errors, meet compliance regulations, and orchestrate the best possible defenses. Let Prevasio Solve Your Cloud Security Needs Prevasio’s Next-Gen CSPM solution focus on the three best practices: light touch\agentless approach, super easy and user-friendly configuration, easy to read and share security findings context, for visibility to all appropriate users and stakeholders in mind. Our cloud security offerings are ideal for organizations that want to go beyond misconfiguration, legacy compliance or traditional vulnerability scanning. We offer an accelerated visual assessment of your cloud infrastructure, perform automated analysis of a wide range of cloud assets, identify policy errors, supply-chain threats, and vulnerabilities and position all these to your unique business goals. What we provide are prioritized recommendations for well-orchestrated cloud security risk mitigations. To learn more about us, what we do, our cloud security offerings, and how we can help your organization prevent cloud infrastructure attacks, read all about it here . Schedule a demo Related Articles 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? AlgoSec Reviews Mar 19, 2023 · 2 min read Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read 5 Multi-Cloud Environments Cloud Security Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call
- The network security policy management lifecycle | AlgoSec
Understand the network security policy management lifecycle, from creation to implementation and continuous review, ensuring optimal network protection and compliance. The network security policy management lifecycle Introduction IT security organizations today are judged on how they enable business transformation and innovation. They are tasked with delivering new applications to users and introducing new technologies that will capture new customers, improve productivity and lower costs. They are expected to be agile so they can respond faster than competitors to changing customer and market needs. Unfortunately, IT security is often perceived as standing in the way of innovation and business agility. This is particularly true when it comes to provisioning business application connectivity. When an enterprise rolls out a new application or migrates an application to the cloud it may take weeks or even months to ensure that all the servers, devices and network segments can communicate with each other, and at the same time prevent access to hackers and unauthorized users. But IT security does not have to be a bottleneck to business agility. Nor is it necessary to accept more risk to satisfy the demand for speed. The solution is to manage application connectivity and network security policies through a structured lifecycle methodology. IT security organizations that follow the five stages of a security policy management lifecycle can improve business agility dramatically without sacrificing security. A lifecycle approach not only ensures that the right activities are performed in the right order, it provides a framework for automating repeatable processes, and enables different technical and business groups to work together better. In this whitepaper, we will: Review the obstacles to delivering secure application connectivity and business agility. Explore the lifecycle approach to managing application connectivity and security policies. Examine how the activities at each stage of the lifecycle can help enterprises increase business agility, reduce risks, and lower operating costs. Schedule a Demo Why is it so hard to manage application and network connectivity? Top IT managers sometimes view security policy management as something routine, just part of the “plumbing.” In reality, delivering secure connectivity requires mastering complex data center and cloud infrastructures, coping with constant change, understanding esoteric security and compliance requirements, and coordinating the efforts of multiple technical and business teams. Application connectivity is complex The computing infrastructure of even a medium-sized enterprise includes hundreds of servers, storage systems, and network security devices such as firewalls, routers and load balancers. Complexity is magnified by the fact that many application components are now virtualized. Moreover, hybrid cloud architectures are becoming common. And since networking concepts differ profoundly between physical and cloud-based networks, unified visibility and control are very difficult to obtain. Change never stops Business users need access to data – fast! Yet every time a new application is deployed, changed or migrated, network and security staff need to understand how information will flow between the various web, application, database and storage servers. They need to devise application connectivity rules that allow traffic while preventing access from unauthorized users or creating gaps in their security perimeters. Security and compliance require thousands of application connectivity rules Many security policies are required to manage network access and protect confidential data from outside attackers and from unauthorized access by users or employees. In a typical enterprise, customers and businesses are only allowed to access specific web servers in a “demilitarized zone.” Some applications and databases are authorized for all employees, while others are restricted to specific departments or business units or management levels. Government regulations and industry standards require severely controlled access to credit card and financial information, Personally Identifiable Information (PII), Protected Health Information (PHI) and many other types of confidential data. Security best practices often require additional restrictions, such as limiting the use of protocols that can be used to evade security controls. To enforce these policies, IT security teams need to create and manage thousands, tens of thousands, and sometimes even hundreds of thousands of firewall rules on routers, firewalls and other network and security devices in order to comply with the necessary security, business and regulatory requirements. Technical and business groups don’t communicate After application delivery managers outline the business-level requirements of new or modified applications, network and security architects must translate them into network flows that traverse various web gateways, web servers, application servers, database servers and document repositories. Then firewall administrators and other security professionals have to create firewall rules that allow the right users to connect to the right systems, using appropriate services and protocols. Compliance and risk management officers also get involved to identify potential violations of regulations and corporate policies. These processes are handicapped by several factors: Each group speaks a different business or technical language. Information is siloed, and each group has its own tools for tracking business requirements, network topology, security rules and compliance policies. Data is often poorly documented. Often network and security groups are brought in only at the tail end of the process, when it is too late to prevent bad decisions. Application connectivity is complex The computing infrastructure of even a medium-sized enterprise includes hundreds of servers, storage systems, and network security devices such as firewalls, routers and load balancers. Complexity is magnified by the fact that many application components are now virtualized. Moreover, hybrid cloud architectures are becoming common. And since networking concepts differ profoundly between physical and cloud-based networks, unified visibility and control are very difficult to obtain. Change never stops Business users need access to data – fast! Yet every time a new application is deployed, changed or migrated, network and security staff need to understand how information will flow between the various web, application, database and storage servers. They need to devise application connectivity rules that allow traffic while preventing access from unauthorized users or creating gaps in their security perimeters. Security and compliance require thousands of application connectivity rules Many security policies are required to manage network access and protect confidential data from outside attackers and from unauthorized access by users or employees. In a typical enterprise, customers and businesses are only allowed to access specific web servers in a “demilitarized zone.” Some applications and databases are authorized for all employees, while others are restricted to specific departments or business units or management levels. Government regulations and industry standards require severely controlled access to credit card and financial information, Personally Identifiable Information (PII), Protected Health Information (PHI) and many other types of confidential data. Security best practices often require additional restrictions, such as limiting the use of protocols that can be used to evade security controls. To enforce these policies, IT security teams need to create and manage thousands, tens of thousands, and sometimes even hundreds of thousands of firewall rules on routers, firewalls and other network and security devices in order to comply with the necessary security, business and regulatory requirements. Technical and business groups don’t communicate After application delivery managers outline the business-level requirements of new or modified applications, network and security architects must translate them into network flows that traverse various web gateways, web servers, application servers, database servers and document repositories. Then firewall administrators and other security professionals have to create firewall rules that allow the right users to connect to the right systems, using appropriate services and protocols. Compliance and risk management officers also get involved to identify potential violations of regulations and corporate policies. These processes are handicapped by several factors: Each group speaks a different business or technical language. Information is siloed, and each group has its own tools for tracking business requirements, network topology, security rules and compliance policies. Data is often poorly documented. Often network and security groups are brought in only at the tail end of the process, when it is too late to prevent bad decisions. Schedule a Demo The lifecycle approach to managing application connectivity and security policies Most enterprises take an ad-hoc approach to managing application connectivity. They jump to address the connectivity needs of high-profile applications and imminent threats, but have little time left over to maintain network maps, document security policies and firewall rules, or to analyze the impact of rule changes on production applications. They are also hard-pressed to translate dozens of daily change requests from business terms into complex technical details. The costs of these dysfunctional processes include: Loss of business agility, caused by delays in releasing applications and improving infrastructure. Application outages and lost productivity, caused by errors in updating rules and configuring systems. Inflexibility, when administrators refuse to change existing rules for fear of “breaking” existing information flows. Increased risk of security breaches, caused by gaps in security and compliance policies, and by overly permissive security rules on firewalls and other devices. Costly demands on the time of network and security staff, caused by inefficient processes and high audit preparation costs. IT security groups will always have to deal with complex networks and constantly changing applications. But given these challenges, they can manage application connectivity and security policies more effectively using a lifecycle framework such as the one illustrated in Figure 1. This lifecycle approach captures all the major activities that an IT organization should follow when managing change requests that affect application connectivity and security policies, organized into five stages. Figure 1: The Network Security Policy Lifecycle Structure activities and reduce risks A lifecycle approach ensures that the right activities are performed in the right order, consistently. This is essential to reducing risks. For example, failing to conduct an impact analysis of proposed firewall rule changes can lead to service outages when the new rules inadvertently block connections between components of an application. While neglecting to monitor policies and recertify rules can result in overly permissive or unnecessary rules that facilitate data breaches. A structured process also reduces unnecessary work and increases business agility. For example, a proactive risk and compliance assessment during the Plan & Assess stage of the lifecycle can identify requirements and prevent errors before new rules are deployed onto security and network devices. This reduces costly, time-consuming and frustrating “fire drills” to fix errors in the production environment. A defined lifecycle also gives network and security professionals a basis to resist pressures to omit or shortchange activities to save time today, which can cause higher costs and greater risks tomorrow. Automate processes The only way IT organizations can cope with the complexity and rapid change of today’s infrastructure and applications is through automation. A lifecycle approach to security policy management helps enterprises structure their processes to be comprehensive, repeatable and automated. When enterprises automate the process of provisioning security policies, they can respond faster to changing business requirements, which makes them more agile and competitive. By reducing manual errors and ensuring that key steps are never overlooked, they also avoid service outages and reduce the risk of security breaches and compliance violations. Automation also frees security and networking staffs so they have time to spend on strategic initiatives, rather than on routine “keep the lights on” tasks. Ultimately, it permits enterprises to support more business applications and greater business agility with the same staff. Enable better communication A lifecycle approach to security policy management improves communication across IT groups and their senior management. It helps bring together application delivery, network, security, and compliance people in the Discover & Visualize and Plan & Assess stages of the lifecycle, to make sure that business requirements can be accurately translated into infrastructure and security changes. The approach also helps coordinate the work of network, security and operations staffs in the Migrate & Deploy, Maintain and Decommission stages, to ensure that deployment and operational activities are executed smoothly. And it helps IT and business executives communicate better about the security posture of the enterprise. Document the environment In most enterprises security policies are poorly documented. Reasons include severe time pressures on network and security staff, and tools that make it hard to record and share policy and rule information (e.g., spreadsheets and bug tracking systems designed for software development teams). The result is minor time savings in the short run (“we’ll document that later when we have more time”) at the cost of more work later, lack of documentation needed for audits and compliance verification, and the greater risk of service outages and data breaches. Organizations that adopt a lifecycle approach build appropriate self-documenting processes into each step of the lifecycle. We will now look at how these principles and practices can be implemented in each of the five stages of a security policy management lifecycle. Schedule a Demo Stage 1: Discover & visualize The first stage of the security policy management lifecycle is Discover & Visualize. This phase is key to successful security policy management. It gives IT organizations an accurate, up-to-date mapping of their application connectivity across on-premises, cloud, and software-defined environments. Without this information, IT staff are essentially working blind, and will inevitably make mistakes and encounter problems down the line. While discovery may sound easy, for most IT organizations today it is extremely difficult to perform. As discussed earlier, most enterprises have hundreds or thousands of systems in their enterprise infrastructure. Servers and devices are constantly being added, removed, upgraded, consolidated, distributed, virtualized, and moved to the cloud. Few organizations can maintain an accurate, up-to-date map of their application connectivity and network topology, and it can take months to gather this information manually Fortunately, security policy management solutions can automate the application connectivity discovery, mapping, and documentation processes (see Figure 2). These products give network and security staffs an up-to-date map of their application connectivity and network topology, eliminating many of the errors caused by out-of-date (or missing) information about systems, connectivity flows, and firewall rules. In addition, the mapping process can help business and technical groups develop a shared understanding of application connectivity requirements. Figure 2: Auto discover, map and visualize application connectivity and security infrastructure Schedule a Demo Stage 2: Plan & assess Once an enterprise has a clear picture of its application connectivity and network infrastructure, it can effectively start to plan changes. The Plan & Assess stage of the lifecycle includes activities that ensure that proposed changes will be effective in providing the required connectivity, while minimizing the risks of introducing vulnerabilities, causing application outages, or violating compliance requirements. Typically, this stage involves: Translating business application connectivity requests, typically defined in business terms, into networking terminology that security staff can understand and implement. Analyzing the network topology, to determine if the requested changes are really needed (typically 30% of requests require no changes). Conducting a proactive impact analysis of proposed rule changes to understand in advance how they will affect other applications and processes. Performing a risk and compliance assessment, to make sure that the changes don’t open security holes or cause compliance violations (see Figure 3). Assessing inputs from vulnerabilities scanners and SIEM solutions to understand business risk. Many organizations perform these activities only periodically, in conjunction with audits or as part of a major project. They omit impact analysis for “minor” change requests and even when they perform risk assessments, they often focus on firewall rules and ignore the wider business application implications. Yet automating these analysis and assessment activities and incorporating them as part of a structured lifecycle process helps keep infrastructure and security data up to date, which saves time overall and prevents bad decisions from being made based on outdated information. It also ensures that key steps are not omitted, since even a single configuration error can cause a service outage or set the stage for a security breach. Impact analysis is particularly valuable when cloud-based applications and services are part of the project as it is often extremely difficult to predict the effect of rule changes when deployed to the cloud. Figure 3: Proactively assess risk and compliance for each security policy change Schedule a Demo Stage 3: Migrate & deploy The process of deploying connectivity and security rules can be extremely labor-intensive when it involves dozens of firewalls, routers, and other network security devices. It is also very error-prone. A single “fat-finger” typing mistake can result in an outage or a hole in the security perimeter. Security policy management solutions automate critical tasks during this stage of the lifecycle, including: Designing rule changes intelligently based on security, compliance and performance considerations. Automatically migrating these rules using intuitive workflows (see Figure 4). Pushing policies to firewalls and other security devices, both on-premise and on cloud platforms – with zero touch if no exceptions are detected (see Figure 5). Validating that the intended changes have been implemented correctly. Many enterprises overlook the validation process and fail to check that rule changes have been pushed to devices and activated successfully. This can create the false impression that application connectivity has been provided, or that vulnerabilities have been removed, when in fact there are time bombs ticking in the infrastructure. By automating these tasks, IT organizations can speed up application deployments, as well as ensure that rules are accurate and consistent across different security devices. Automated deployment also eliminates the need to perform many routine maintenance tasks and therefore frees up security professionals for more strategic tasks. Figure 4: Automate firewall rule migration through easy-to-use workflows Figure 5: Deploy security changes directly onto devices with zero touch Schedule a Demo Stage 4: Maintain In the rush to support new applications and technologies, many IT security teams ignore, forget or put off activities related to monitoring and maintaining their security policy – despite the fact that most firewalls accumulate thousands of rules and objects which become out-of-date or obsolete over the years. Typical symptoms of cluttered and bloated rulesets include: Overly permissive rules that create gaps in the network security perimeter which cybercriminals can use to attack the enterprise. Excessively complicated tasks in areas such as change management, troubleshooting and auditing. Excessive audit preparation costs to prove that compliance requirements are being met, or conversely audit failures because overly permissive rules allow violations. Slower network performance, because proliferating rules overload network and security devices. Decreased hardware lifespan and increased TCO for overburdened security devices. Cleaning up and optimizing security policies on an ongoing basis can prevent these problems (see Figure 6). Activities include: Identifying and eliminating or consolidating redundant and conflicting rules. Tightening rules that are overly permissive (for example, allowing network traffic from ANY source to connect to ANY destination using ANY protocol). Reordering rules for better performance. Recertifying expired rules based on security and business needs (see Figure 7). Continuously documenting security rules and their compliance with regulations and corporate policies. Figure 6: Automatically clean up and optimize security policies Automating these maintenance activities helps IT organizations move towards a “clean,” well-documented set of security rules so they can prevent business application outages, compliance violations, security holes, and cyberattacks. It also reduces management time and effort. Another key benefit of ongoing maintenance of security policy rules is that it significantly reduces audit preparation efforts and costs by as much as 80% (see Figure 8). Preparing firewalls for a regulatory or internal audit is a tedious, time-consuming and error-prone process. Moreover, while an audit is typically a point-in-time exercise, most regulations today require enterprises to be continually compliant, which can be difficult to achieve with bloated and ever-changing rule bases. Figure 7: Review and recertify rules based on security and business needs Figure 8: Significantly reduce audit preparation efforts and costs with automated audit reports Schedule a Demo Stage 5: Decommission Every business application eventually reaches the end of its life. At that point some or all of its security policies become redundant. Yet when applications are decommissioned, their policies are often left in place, either from oversight or out of fear that removing policies could negatively affect active business applications. These obsolete or redundant security policies increase the enterprise’s attack vector and add clutter, without providing any business value.A lifecycle approach to managing application connectivity and security policies reduces the risk of application outages and data breaches caused by obsolete rules. It provides a structured and automated process for identifying and safely removing redundant firewall rules as soon as applications are decommissioned, while verifying that their removal will not impact active applications or create compliance violations (see Figure 9). Figure 9: Automatically and safely remove redundant firewall rules when applications are decommissioned Schedule a Demo Summary Network and security operations should never be a bottleneck to business agility, and must be able to respond rapidly to the ever-changing needs of the business. The solution is to move away from a reactive, fire-fighting response to business challenges and adopt a proactive lifecycle approach to managing application connectivity and security policies that will enable IT organizations to achieve critical business objectives such as: Increasing business agility by speeding up the delivery of business continuity and business transformation initiatives. Reducing the risk of application outages due to errors when creating and deploying connectivity and security rules. Reducing the risk of security breaches caused by gaps in security and compliance policies and overly permissive security rules. Freeing up network and security professionals from routine tasks so they can work on strategic projects. Schedule a Demo About AlgoSec AlgoSec is a global cybersecurity company and the industry’s only application connectivity and security policy management expert. With almost two decades of leadership in Network Security Policy Management, over 1,800 of the world’s most complex organizations trust AlgoSec to help secure their most critical workloads across public cloud, private cloud, containers, and on-premises networks. Let's start your journey to our business-centric network security. Schedule a Demo Select a size Introduction Why is it so hard to manage application and network connectivity? The lifecycle approach to managing application connectivity and security policies Stage 1: Discover & visualize Stage 2: Plan & assess Stage 3: Migrate & deploy Stage 4: Maintain Stage 5: Decommission Summary About AlgoSec Get the latest insights from the experts Choose a better way to manage your network
- AlgoSec | 5 Best Network Vulnerability Scanning Tools in 2024
Network vulnerability scanning provides in-depth insight into your organization’s security posture and highlights the specific types of... Network Security 5 Best Network Vulnerability Scanning Tools in 2024 Tsippi Dach 2 min read Tsippi Dach Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. Tags Share this article 2/11/24 Published Network vulnerability scanning provides in-depth insight into your organization’s security posture and highlights the specific types of vulnerabilities attackers may exploit when targeting it. These tools work by systematically scanning your network environment — including all desktops, laptops, mobile endpoints, servers, and other assets for known weaknesses and misconfigurations. Your analyzer then produces a detailed report that tells you exactly how hackers might breach your systems. Find out how these important tools contribute to successfully managing your security policies and protecting sensitive assets from cybercriminals and malware. What is Network Vulnerability Management? Network vulnerability scanners are cybersecurity solutions typically delivered under a software-as-a-service (SaaS) model. These solutions match your network asset configurations with a comprehensive list of known misconfigurations and security threats, including unpatched software, open ports, and other security issues. By comparing system details against a comprehensive database of known vulnerabilities, network scanning helps pinpoint areas of weakness that could potentially be exploited by threat actors. This proactive approach is essential for maintaining robust network security and protecting sensitive data from unauthorized access and cyberattacks. This provides your organization with several valuable benefits: Early detection of known security vulnerabilities. If your organization is exposed to security threats that leverage known vulnerabilities, you’ll want to address these security gaps as soon as possible. Comprehensive data for efficient risk management. Knowing exactly how many security vulnerabilities your organization is exposed to gives you clear data for conducting in-depth risk management . Regulatory compliance. Many regulatory compliance frameworks like SOC 2, ISO 27001, and PCI DSS require organizations to undergo regular vulnerability scanning. Reduced costs. Automating the process of scanning for vulnerabilities reduces the costs associated with discovering and remediating security weaknesses manually. Key Features and Functions The best network security vulnerability scanners have several important features in common: Prioritized vulnerability assessment tools. You need to be able to assess and prioritize vulnerabilities based on their severity. This allows you to commit security resources to addressing high-priority vulnerabilities first, and taking care of low-impact weaknesses afterwards. Automation and real-time analysis. Manual scanning is a difficult and time-consuming process. Your vulnerability scanner must support automated, ongoing scanning for real-time vulnerability detection, providing on-demand insights into your security risk profile. Integration with remediation tools: The best network vulnerability scanners integrate with other security tools for quick mitigation and remediation. This lets security teams quickly close security gaps and move on to the next, without having to spend time accessing and managing a separate set of security tools. How Network Vulnerability Scanning Tools Work Step 1. Scanning Process Initial network mapping is the first step in the vulnerability scanning process. At this point, your scanner maps your entire network and identifies every device and asset connected to it. This includes all web servers, workstations, firewalls , and network devices. The automatic discovery process should produce a comprehensive map showing how your network is connected, and show detailed information about each network device. It should include comprehensive port scanning to identify open ports that attackers could use to gain entry to the network. Step 2. Detection Techniques The next step in the process involves leveraging advanced detection techniques to identify known vulnerabilities in the network. Most network vulnerability scanners rely on two specific techniques to achieve this: Signature-Based Detection: The scanner checks for known vulnerabilities by comparing system details against a database of known issues. This database is drawn from extensive threat intelligence feeds and public records like the MITRE CVE Program . Heuristic Analysis: This technique relies on heuristic and behavioral techniques to identify unknown or zero-day vulnerabilities based on unusual system behavior or configurations. It may detect suspicious activities that don’t correspond to known threats, prompting further investigation. Step 3. Vulnerability Identification This step involves checking network assets for known vulnerabilities according to their unique risk profile. This includes scanning for outdated software and operating system versions, and looking for misconfigurations in network devices and settings. Most network scanners achieve this by pinging network-accessible systems, sending them TCP/UDP packets, and remotely logging into compatible systems to gather detailed information about them. Highly advanced network vulnerability scanning tools have more comprehensive sets of features for identifying these vulnerabilities, because they recognize a wider, more up-to-date range of network devices. Step 4. Assessment and Reporting This step describes the process of matching network data to known vulnerabilities and prioritizing them based on their severity. Advanced network scanning devices may use automation and sophisticated scripting to produce a list of vulnerabilities and exposed network components. First, each vulnerability is assessed for its potential impact and risk level, often based on industry-wide compliance standards like NIST. Then the tool prioritizes each vulnerability based on its severity, ease of exploitation, and potential impact on the network. Afterwards, the tool generates a detailed report outlining every vulnerability assessed and ranking it according to its severity. These reports guide the security teams in addressing the identified issues. Step 5. Continuous Monitoring and Updates Scanning for vulnerabilities once is helpful, but it won’t help you achieve the long-term goal of keeping your network protected against new and emerging threats. To do that, you need to continuously monitor your network for new weaknesses and establish workflows for resolving security issues proactively. Many advanced scanners provide real-time monitoring, constantly scanning the network for new vulnerabilities as they emerge. Regular updates to the scanner’s vulnerability database ensure it can recognize the latest known vulnerabilities and threats. If your vulnerability scanner doesn’t support these two important features, you may need to invest additional time and effort into time-consuming manual operations that achieve the same results. Step 6. Integration with Other Security Measures Security leaders must pay close attention to what happens after a vulnerability scan detects an outdated software patch or misconfiguration. Alerting security teams to the danger represented by these weaknesses is only the first step towards actually resolving them, and many scanning tools offer comprehensive integrations for launching remediation actions. Remediation integrations are valuable because they allow security teams to quickly address vulnerabilities immediately upon discovering them. The alternative is creating a list of weaknesses and having the team manually go through them, which takes time and distracts from higher-impact security tasks. Another useful integration involves large-scale security posture analytics. If your vulnerability assessment includes analysis and management tools for addressing observable patterns in your network vulnerability scans, it will be much easier to dedicate resources to the appropriate security-enhancing initiatives. Choosing a Network Vulnerability Scanning Solution There are two major categories of features that network vulnerability scanning tools must offer in order to provide best-in-class coverage against sophisticated threats. Keep these aspects in mind when reviewing your options for deploying vulnerability scans in your security workflow. Important Considerations Comprehensive Vulnerability Database. Access to an extensive CVE database is vital. Many of these are open-source and available to the general public, but the sheer number of CVE records can drag down performance. The best vulnerability management tools have highly optimized APIs capable of processing these records quickly. Customizability and Templates. Tailoring scans to specific needs and environments is important for every organization, but it takes on special significance for organizations seeking to demonstrate regulatory compliance. That’s because the outcome of compliance assessments and audits will depend on the quality of data included in your reports. False Positive Management. All vulnerability scanners are susceptible to displaying false positives, but some manage these events better than others. This is especially important in misconfiguration cases, because it can cause security teams to mistakenly misconfigure security tools that were configured correctly in the first place. Business Essentials Support for Various Platforms. Your vulnerability scan must ingest data from multiple operating systems like Windows, Linux, and a variety of cloud platforms. If any of these systems are not compatible with the scanning process, you may end up with unstable performance or unreliable data. Reporting and Analytics. Detailed reports and analytics help you establish a clear security posture assessment. Your vulnerability management tool must provide clear reports that are easy for non-technical stakeholders to understand. This will help you make the case for necessary security investments in the future. Scalability and Flexibility. These solutions must scale with the growth of your organization’s IT infrastructure . Pay attention to the usage and payment model each vulnerability scanning vendor uses. Some of them may be better suited to small, growing organizations while others are more appropriate for large enterprises and government agencies. Top 5 Network Vulnerability Scanning Providers 1. AlgoSec AlgoSec is a network security platform that helps organizations identify vulnerabilities and orchestrate network security policies in response. It includes comprehensive features for managing firewalls routers , and other security device configurations, and enables teams to proactively scan for new vulnerabilities on their network. AlgoSec reports on misconfigurations and vulnerabilities, and can show how simulated changes to IT infrastructure impact the organization’s security posture. It provides in-depth visibility and control over multi-cloud and on-premises environments. Key features: Comprehensive network mapping. AlgoSec supports automatic network asset discovery, giving security teams complete coverage of the hybrid network. In-depth automation. The platform supports automatic security policy updates in response to detected security vulnerabilities, allowing security teams to manage risk proactively. Detailed risk analysis. When AlgoSec detects a vulnerability, it provides complete details and background on the vulnerability itself and the risk it represents. 2. Tenable Nessus Tenable Nessus is one of the industry’s most reputable names in vulnerability assessment and management. It is widely used to identify and fix vulnerabilities including software flaws, missing security patches, and misconfigurations. It supports a wide range of operating systems and applications, making it a flexible tool for many different use cases. Key features: High-speed discovery. Tenable supports high speed network asset discovery scans through advanced features. Break up scans into easily managed subnetworks and configure ping settings to make the scan faster. Configuration auditing. Security teams can ensure IT assets are compliant with specific compliance-oriented audit policies designed to meet a wide range of assets and standards. Sensitive data discovery. Tenable Nessus can discover sensitive data located on the network and provide clear, actionable steps for protecting that data in compliance with regulatory standards. 3. Rapid7 Nexpose Nexpose offers real-time monitoring and risk assessment designed for enterprise organizations. As an on-premises vulnerability scanner, the solution is well-suited to the needs of large organizations with significant IT infrastructure deployments. It collects vulnerability information, prioritizes it effectively, and provides guidance on remediating risks. Key Features: Enterprise-ready on-premises form factor. Rapid7 designed Nexpose to meet the needs of large organizations with constant vulnerability scanning needs. Live monitoring of the attack surface. Organizations can continuously scan their IT environment and prioritize discovered vulnerabilities using more than 50 filters to create asset groups that correspond to known threats. Integration with penetration testing. Rapid7 comes with a wide range of fully supported integrations and provides vulnerability and exploitability context useful for pentest scenarios. 4. Qualys Qualys is an enterprise cloud security provider that includes vulnerability management in its IT security and compliance platform. It includes features that help security teams understand and manage security risks while automating remediation with intuitive no-code workflows. It integrates well with other enterprise security solutions, but may not be accessible for smaller organizations. Key features: All-in-one vulnerability management workflow . Qualys covers all of your vulnerability scanning and remediation needs in a single, centralized platform. It conducts asset discovery, detects vulnerabilities, prioritizes findings, and launches responses with deep customization and automation capabilities. Web application scanning . The platform is well-suited to organizations with extensive public-facing web applications outside the network perimeter. It supports container runtime security, including container-as-a-service environments. Complete compliance reporting . Security teams can renew expiring certificates directly through Qualys, making it a comprehensive solution to obtaining and maintaining compliance. 5. OpenVAS (Greenbone Networks) OpenVAS is an open-source tool that offers a comprehensive scanning to organizations of all sizes. It is available under a General Public License (GPL) agreement, making it a cost-effective option compared to competing proprietary software options. It supports a range of customizable plugins through its open source developer community. Key Features: Open-source vulnerability scanner. Organizations can use and customize OpenVAS at no charge, giving it a significant advantage for organizations that prioritize cost savings. Customizable plugins. As with many open-source tools, there is a thriving community of developers involved in creating customizable plugins for unique use cases. Supports a wide range of vulnerability tests . The high level of customization offered by OpenVAS allows security teams to run many different kinds of vulnerability tests from a single, centralized interface. Honorable Mentions Nmap (Network Mapper): A versatile and free open-source tool, NMAP is popular for network discovery and security auditing. It’s particularly noted for its flexibility in scanning both large networks and single hosts. Nmap is a powerful and popular Linux command-line tool commonly featured in cybersecurity education courses. Microsoft’s Azure Security Center: Ideal for organizations heavily invested in the Azure cloud platform, this tool provides integrated security monitoring and policy management across hybrid cloud workloads. It unifies many different security features, including vulnerability assessment, proactive threat hunting, and more. IBM Security QRadar Vulnerability Manager: This is a comprehensive solution that integrates with other IBM QRadar products, providing a full-spectrum view of network vulnerabilities. It’s especially valuable for enterprises that already rely on IBM infrastructure for security workflows. McAfee Vulnerability Manager: A well-known solution offering robust vulnerability scanning capabilities, with additional features for risk and compliance management. It provides a combination of active and passive monitoring, along with penetration testing and authentication scanning designed to provide maximum protection to sensitive network assets. Choosing the Right Vulnerability Management Tool Choosing the right vulnerability management tool requires in-depth knowledge of your organization’s security and IT infrastructure context. You need to select the tool that matches your unique use cases and security requirements while providing the support you need to achieve long-term business goals. Those goals may change over time, which makes ongoing evaluation of your security tools an even more important strategic asset to keep in your arsenal. Gathering clear and detailed information about your organization’s security posture allows you to flexibility adapt to changes in your IT environment without exposing sensitive assets to additional risk. AlgoSec provides a wide range of flexible options for vulnerability scanning, policy change management, and proactive configuration simulation. Enhance your organization’s security capabilities by deploying a vulnerability management solution that provides the visibility and flexibility you need to stay on top of a challenging industry. Schedule a demo Related Articles 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? AlgoSec Reviews Mar 19, 2023 · 2 min read Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read 5 Multi-Cloud Environments Cloud Security Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call
- Why CNAPP is not enough
Learn all about CNAPP limitations, why CNAPP is not enough in the cloud, and what additional cloud security pillars businesses need. Why CNAPP is not enough Select a size Which network Can AlgoSec be used for continuous compliance monitoring? Yes, AlgoSec supports continuous compliance monitoring. As organizations adapt their security policies to meet emerging threats and address new vulnerabilities, they must constantly verify these changes against the compliance frameworks they subscribe to. AlgoSec can generate risk assessment reports and conduct internal audits on-demand, allowing compliance officers to monitor compliance performance in real-time. Security professionals can also use AlgoSec to preview and simulate proposed changes to the organization’s security policies. This gives compliance officers a valuable degree of lead-time before planned changes impact regulatory guidelines and allows for continuous real-time monitoring. Executive summary: Why CNAPP is not enough Cloud native application protection platforms (CNAPPs) are unified security platforms that consolidate a diverse suite of tools and capabilities into a single solution. Widely adopted across industries, the cloud native application protection platform market is projected to reach $19.3 billion by 2027, a CAGR of almost 20% from 2022. These cloud security platforms are often positioned as "all-in-one" or "end-to-end" fortifications for contemporary cloud environments. However, a pressing question persists: Are CNAPPs enough? The dominant assumption is that CNAPPs can single-handedly tackle all enterprise cloud security requirements. However, enterprises should be aware of some critical CNAPP limitations; these can involve: Application security Network security Policy management Without addressing the cloud security blind spots of CNAPPs, minor vulnerabilities can escalate into significant security and compliance incidents. This article dives into the reasons why CNAPPs are so popular, what capabilities they offer, and how companies can transcend their limitations. Why are enterprises embracing cloud-native application protection platforms? CNAPPs are unified and integrated cloud security platforms, promising robust and centralized governance, security, and compliance control and oversight. They’re a captivating option when dealing with complex multi-cloud and hybrid cloud architectures. Setting CNAPP limitations aside for a moment, let’s explore what tools and capabilities these popular cloud security platforms feature. Cloud security posture management (CSPM) CSPM tools continuously monitor and scan IaaS, PaaS, and SaaS infrastructure for misconfigurations and risks. They also support triage and remediation of any cloud misconfigurations identified. Cloud infrastructure entitlement management (CIEM) CIEM tools are the cloud-native version of identity and access management (IAM) solutions. They detect and mitigate identity-related risks such as overprivileged accounts and subpar password policies. Cloud workload protection Cloud workload protection solutions monitor cloud-native workloads across hybrid and multi-cloud architectures for threats. Workloads in the cloud may refer to data, applications, serverless functions, containers, or virtual machines. But do cloud workload protection tools provide comprehensive runtime security and application security? More on that soon. External attack surface management (EASM) EASM tools focus on inventorying, monitoring, and reducing risks across public-facing digital assets. The overall objective of EASM solutions is to minimize the cloud attack surface and reveal blind spots. Container and Kubernetes security Container and Kubernetes security capabilities are crucial components of cloud security platforms, focusing on managing and fortifying containerized applications across multi-cloud environments. Vulnerability management Vulnerability management tools proactively scan cloud layers (workloads, APIs, applications, and data) for misconfigurations like insecure APIs, unencrypted data, and excessive permissions. As highlighted above, cloud native application protection platforms are equipped with a diverse and dynamic range of tools. However, risk-ridden cloud security blind spots make these tools insufficient for complete visibility and coverage across complex environments. CNAPP limitations and cloud security blind spots The features covered in the previous section are essential cloud security pillars. Nevertheless, CNAPPs aren't all-encompassing. This section examines these cloud native application protection platforms' biggest cloud security blind spots. In other words, why CNAPP is not enough. Inadequate hybrid cloud coverage One of the biggest cloud security blind spots businesses face? Legacy architecture. CNAPPs are purpose-built to operate in cloud environments. That means, companies with on-premises or hybrid setups might struggle to achieve interconnected visibility and security—even with strong CSPM or cloud workload protection tools. Disproportionate focus on runtime security Runtime security is in the CNAPP wheelhouse. However, some cloud security platforms over-emphasize runtime security and lack coverage in the initial stages of application pipelines. This incomplete visibility is a major application security vulnerability. Remember: A strong runtime security posture doesn’t make up for subpar application security capabilities. Lack of application visibility and context Modern multi-cloud and hybrid environments are primarily made up of applications . While the term “cloud native application security platform” suggests robust application security, CNAPPs often lack deep visibility into applications and their connectivity flows. CNAPP limitations also include a lack of application context: Businesses might know what applications they have, but they may not be able to map broader network security risks to specific applications. Incomplete network security CNAPPs have various features and telemetry capabilities that support cloud network security, but they lack advanced network security controls and tools. For example, CNAPPs can’t fine-tune firewalls, conduct deep packet inspections, or establish network traffic rules. Subpar API security Cloud native application protection platforms don’t always have deep API security capabilities. This is an issue, given APIs are an increasingly prevalent attack vector for adversaries. Weak API security is an application security vulnerability because without API visibility and context, it’s impossible to map application dependencies and identity misconfigurations. Restricted DevSecOps support CNAPPs can help security teams shift left, but they’re not a comprehensive DevSecOps powerhouse. This is due to many of the above-mentioned deficiencies: fractured application and connectivity visibility, as well as a lack of advanced network security options. In complex hybrid cloud architectures, these weaknesses complicate compliance and policy management—and consequently compromise DevSecOps programs. What additional layers of security do enterprises need? Cloud native application protection platform components like CSPM and CIEM are critical security pillars, but it’s evident that CNAPP is not enough for businesses today. Let’s discuss what additional capabilities you need. Advanced application security With applications dominating enterprise IT environments, companies need a cutting-edge application security tool with complete hybrid coverage, as well as connectivity and dependency mapping. Must-have features include deep application contextualization and the ability to map network risks to specific applications. Network security posture management (NSPM) Achieving visibility, security, and compliance across hybrid networks isn’t straightforward, which is why businesses need a strong NSPM tool. Top NSPM solutions enable businesses to visualize their network topology and apply unique firewall rules to understand, control, and secure traffic. They also help businesses enforce zero trust tenets like least privilege and network micro-segmentation. Automated security policy management Cloud environments are dynamic and constantly in flux, making policy and configuration management a tricky endeavor. The initial challenge is designing the right policies, but the bigger complexity is enforcing them consistently without compromising speed or scale. And that’s exactly what the best policy management tools do: Automate every step of the lifecycle, from risk analysis and policy design to implementation and validation. Hybrid cloud compliance management The underlying challenge across every pillar of cloud security, from API security to safe DevSecOps workflows, is ensuring compliance. Today, enterprises have a labyrinth of regulatory requirements they need to adhere to—from GDPR and SOX to industry-specific regulations like HIPAA. You need a compliance tool that can: Generate audit-ready reports Automatically vet policy change requests against compliance requirements Automatically discover traffic flows The benefits of transcending CNAPP limitations There are multiple benefits that enterprises can unlock by adding additional layers of security, such as those discussed above: Reinforced application security posture: Complete and contextual application visibility across the entire lifecycle Enhanced hybrid cloud governance: Control over hybrid cloud infrastructure, applications, data, security tools, and policies Fewer data breaches: Avoidance of the financial, legal, and reputational consequences of suffering data breaches (now featuring an average cost of $4.4 million, according to IBM ) Stronger compliance posture: Adherence to federal, local, and industry-specific laws and regulations More developer-friendly environments: Streamlined and optimized DevSecOps workflows; high-speed development with zero security compromises Boosted cloud performance: Major productivity gains and increased cloud ROI via optimized hybrid cloud governance To wrap up, it’s time to meet the cloud security platform that can help enterprises plug traditional CNAPP gaps and provide comprehensive hybrid cloud security. AlgoSec: A cloud security platform built for modern challenges AlgoSec is a cutting-edge cloud security solution that reinforces every CNAPP pillar while also addressing the most critical CNAPP limitations. AlgoSec Cloud Enterprise (ACE) streamlines every aspect of complex hybrid cloud security, including with automated compliance and policy management. From its emphasis on application visibility and security to zero-touch change management, ACE, along with supporting tools such as AppViz , FireFlow , and Firewall Analyzer , plugs every CNAPP gap and reinforces your overall cloud security posture. No, CNAPP is not enough, and enterprises should swiftly adopt an application-centric hybrid cloud security platform like AlgoSec to achieve the additional layers of cloud security needed in today’s threat landscape. To learn more about how AlgoSec strengthens everything from API security to DevSecOps workflows, and see why over 2,200 companies are already using it, request a demo today. FAQs What are some key CNAPP limitations? CNAPP limitations include excessive emphasis on runtime security, incomplete application security and visibility, weak API security, and DevSecOps deficiencies. What is cloud security posture management (CSPM)? CSPM tools are security solutions that monitor cloud-native infrastructure for security risks and misconfigurations. What is cloud infrastructure entitlement management (CIEM)? CIEM is a type of cloud security tool that focuses on IAM risks in cloud environments. Get the latest insights from the experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- Firewall rule cleanup & performance optimization tool
Efficiently improve network security and performance by cleaning up and optimizing your firewall rules Streamline operations and meet compliance requirements with ease Firewall rule cleanup & performance optimization tool Select a size Which network Can AlgoSec be used for continuous compliance monitoring? Yes, AlgoSec supports continuous compliance monitoring. As organizations adapt their security policies to meet emerging threats and address new vulnerabilities, they must constantly verify these changes against the compliance frameworks they subscribe to. AlgoSec can generate risk assessment reports and conduct internal audits on-demand, allowing compliance officers to monitor compliance performance in real-time. Security professionals can also use AlgoSec to preview and simulate proposed changes to the organization’s security policies. This gives compliance officers a valuable degree of lead-time before planned changes impact regulatory guidelines and allows for continuous real-time monitoring. Streamlining firewall policies: cleanup & optimization Dangers of outdated firewall rulesets How to audit your existing firewall policy How to properly perform a firewall cleanup Firewall optimization best practices Automate firewall configurations with AlgoSec Get the latest insights from the experts Use these six best practices to simplify compliance and risk mitigation with the AlgoSec Copy White paper Learn how AlgoSec can help you pass PCI-DSS Audits and ensure Copy Solution overview See how this customer improved compliance readiness and risk Copy Case study Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- AlgoSec launches its AI-powered Security Platform, to securely manage application-centric connectivity and remediate risk in real time
The new release deploys advanced AI for fast and accurate application discovery, provides clear visualization and mapping of application connectivity and potential security risks in complex hybrid environments AlgoSec launches its AI-powered Security Platform, to securely manage application-centric connectivity and remediate risk in real time The new release deploys advanced AI for fast and accurate application discovery, provides clear visualization and mapping of application connectivity and potential security risks in complex hybrid environments September 25, 2024 Speak to one of our experts RIDGEFIELD PARK, NJ, September 25, 2024 – Global cybersecurity leader AlgoSec has launched its newest Security Management platform version, featuring advanced artificial intelligence (AI) technology that provides an application-centric security approach and a clearer picture of risks and their impact. With this new release, the AlgoSec platform enables users to accurately identify the business applications running in their complex hybrid network, and leverage intelligent change automation to streamline security change processes, thus improving security and agility. “Security professionals are overwhelmed with a barrage of alerts that provide no context between critical threats and minor issues,” said Eran Shiff , VP Product of AlgoSec. “By mapping applications, security teams can understand their criticality, automate changes and prioritize alerts that truly matter, saving countless hours through automation.” Gartner predicts that by 2027, 50 percent of critical enterprise applications will reside outside of centralized public cloud locations, underscoring the complexity that network infrastructures face. Today’s networks are 100 times more complex than they were 10 years ago, and the pace of deployment and development at which security teams are expected to work is 100 times faster. AI-powered application discovery enhances a security team’s ability to detect and respond to threats in real-time. An application-centric approach automates change management processes, identifies security risks and mitigates risks before they impact the network infrastructure. “In today’s evolving cyber landscape, it’s essential that we rapidly identify and prioritize threats as they occur,” said Robert Eldridge, Security Solutions Director of Natilik. “AlgoSec’s AI-powered platform helps us deliver proactive network visibility and risk mitigation to our clients, keeping them ahead of potential threats”. Securing hybrid infrastructures relies on four pillars that are essential to AlgoSec’s platform update: ● AI-driven application discovery – Advanced AI feature designed to automatically discover and identify the business applications that are running by correlating them to security changes that have been made. ● Intelligent and automated application connectivity change – New enhancements allow security professionals to directly adjust existing Microsoft Azure firewall rules for new application connections. Additionally, there’s added support for application awareness in Check Point R80+ firewalls. ● Reduce risk exposure and minimize attack surface – New features focus on tightening security posture and minimizing potential vulnerabilities. It streamlines Microsoft Azure Firewall rule management by identifying and recommending the removal of unused rules. It reduces risk exposure by automatically generating change management tickets to eliminate overly permissive rules. Additionally, it ensures compliance with the latest ASD-ISM regulations. ● Better visibility across complex hybrid networks – AlgoSec has enriched its capabilities to support visibility of network security devices including: NSX-T Gateway Firewall, Azure Load Balancer, and Google Cloud map and traffic path (in early availability). To learn more about updates to the AlgoSec Security Management platform, click here . AlgoSec will demonstrate the key capabilities of release A33 during its upcoming annual AlgoSummit user event. To register, click here . About AlgoSec AlgoSec, a global cybersecurity leader, empowers organizations to secure application connectivity and cloud-native applications throughout their multi-cloud and hybrid network. Trusted by more than 1,800 of the world’s leading organizations, AlgoSec’s application-centric approach enables secure acceleration of business application deployment by centrally managing application connectivity and security policies across the public clouds, private clouds, containers, and on-premises networks. Using its unique vendor-agnostic deep algorithm for intelligent change management automation, AlgoSec enables the acceleration of digital transformation projects, helps prevent business application downtime, and substantially reduces manual work and exposure to security risks. AlgoSec’s policy management and CNAPP platforms provide a single source for visibility into security and compliance issues within cloud-native applications as well as across the hybrid network environment, to ensure ongoing adherence to internet security standards, industry, and internal regulations. Learn how AlgoSec enables application owners, information security experts, DevSecOps, and cloud security teams to deploy business applications up to 10 times faster while maintaining security at https://www.algosec.com . MEDIA CONTACT: Megan Davis Alloy, on behalf of AlgoSec [email protected]
- Zero trust container analysis system - AlgoSec
Zero trust container analysis system Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- Merging the Cloud with Application Connectivity | AlgoSec
Learn the basics of managing multiple workloads in the cloud and how to create a successful enterprise level security management program Webinars Merging the Cloud with Application Connectivity Discover the hottest trends and best practices for application-based security management As more companies make the leap into distributed architecture, the smallest gaps in network security can quickly become targets for attack. While an application-based security strategy can help you protect your hybrid cloud estate better, this shift in focus comes with its own challenges. In this webinar, we discuss: How securing application connectivity plays a key role in hybrid cloud risk management Why application orchestration is critical to managing your network within the hybrid cloud environment How to achieve effective cloud security solutions and best practices To learn more, go to https://www.algosec.com/resources/hub/hybrid_cloud/ September 27, 2022 Hillary Baron Cloud Security Alliance Oren Amiram Director Product Management, Algosec Relevant resources Firewall Rule Recertification with Application Connectivity Keep Reading What is cloud network security? Keep Reading Cloud migration: How to move applications to the cloud Keep Reading Choose a better way to manage your network Choose a better way to manage your network Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- AlgoSec | Top 10 common firewall threats and vulnerabilities
Common Firewall Threats Do you really know what vulnerabilities currently exist in your enterprise firewalls? Your vulnerability scans... Cyber Attacks & Incident Response Top 10 common firewall threats and vulnerabilities Kevin Beaver 2 min read Kevin Beaver Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. Tags Share this article 7/16/15 Published Common Firewall Threats Do you really know what vulnerabilities currently exist in your enterprise firewalls? Your vulnerability scans are coming up clean. Your penetration tests have not revealed anything of significance. Therefore, everything’s in check, right? Not necessarily. In my work performing independent security assessments , I have found over the years that numerous firewall-related vulnerabilities can be present right under your nose. Sometimes they’re blatantly obvious. Other times, not so much. Here are my top 10 common firewall vulnerabilities that you need to be on the lookout for listed in order of typical significance/priority: Password(s) are set to the default which creates every security problem imaginable, including accountability issues when network events occur. Anyone on the Internet can access Microsoft SQL Server databases hosted internally which can lead to internal database access, especially when SQL Server has the default credentials (sa/password) or an otherwise weak password. Firewall OS software is outdated and no longer supported which can facilitate known exploits including remote code execution and denial of service attacks, and might not look good in the eyes of third-parties if a breach occurs and it’s made known that the system was outdated. Anyone on the Internet can access the firewall via unencrypted HTTP connections, as these can be exploited by an outsider who’s on the same network segment such as an open/unencrypted wireless network. Anti-spoofing controls are not enabled on the external interface which can facilitate denial of service and related attacks. Rules exist without logging which can be especially problematic for critical systems/services. Any protocol/service can connect between internal network segments which can lead to internal breaches and compliance violations, especially as it relates to PCI DSS cardholder data environments. Anyone on the internal network can access the firewall via unencrypted telnet connections. These connections can be exploited by an internal user (or malware) if ARP poisoning is enabled via a tool such as the free password recovery program Cain & Abel . Any type of TCP or UDP service can exit the network which can enable the spreading of malware and spam and lead to acceptable usage and related policy violations. Rules exist without any documentation which can create security management issues, especially when firewall admins leave the organization abruptly. Firewall Threats and Solutions Every security issue – whether confirmed or potential – is subject to your own interpretation and needs. But the odds are good that these firewall vulnerabilities are creating tangible business risks for your organization today. But the good news is that these security issues are relatively easy to fix. Obviously, you’ll want to think through most of them before “fixing” them as you can quickly create more problems than you’re solving. And you might consider testing these changes on a less critical firewall or, if you’re lucky enough, in a test environment. Ultimately understanding the true state of your firewall security is not only good for minimizing network risks, it can also be beneficial in terms of documenting your network, tweaking its architecture, and fine-tuning some of your standards, policies, and procedures that involve security hardening, change management, and the like. And the most important step is acknowledging that these firewall vulnerabilities exist in the first place! Schedule a demo Related Articles 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? AlgoSec Reviews Mar 19, 2023 · 2 min read Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read 5 Multi-Cloud Environments Cloud Security Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call
- AlgoSec | Top 6 Hybrid Cloud Security Solutions: Key Features for 2024
Hybrid cloud security uses a combination of on-premises equipment, private cloud deployments, and public cloud platforms to secure an... Uncategorized Top 6 Hybrid Cloud Security Solutions: Key Features for 2024 Tsippi Dach 2 min read Tsippi Dach Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. Tags Share this article 1/15/24 Published Hybrid cloud security uses a combination of on-premises equipment, private cloud deployments, and public cloud platforms to secure an organization’s data, apps, and assets. It’s vital to the success of any organization that uses hybrid cloud network infrastructure. The key factors that make hybrid cloud security different from other types of security solutions are flexibility and agility. Your hybrid cloud security solution must be able to prevent, detect, and respond to threats regardless of the assets they compromise. That means being able to detect anomalous behaviors and enforce policies across physical endpoints, cloud-hosted software-as-a-service (SaaS) deployments, and in public cloud data centers. You need visibility and control wherever your organization stores or processes sensitive data. What is Hybrid Cloud Security? To understand hybrid cloud security, we must first cover exactly what the hybrid cloud is and how it works. Hybrid cloud infrastructure generally refers to any combination of public cloud providers (like AWS, Azure, Google Cloud) and private cloud environments. It’s easy to predict the security challenges hosting some of your organization’s apps on public cloud infrastructure and other apps on its own private cloud. How do you gain visibility across these different environments? How do you address vulnerabilities and misconfiguration risks? Hybrid cloud architecture can create complex problems for security leaders. However, it provides organizations with much-needed flexibility and offers a wide range of data deployment options. Most enterprises use a hybrid cloud strategy because it’s very rare for a large organization to entrust its entire IT infrastructure to a single vendor. As a result, security leaders need to come up with solutions that address the risks unique to hybrid cloud environments. Key Features of Hybrid Cloud Security An optimized hybrid cloud security solution gives the organization a centralized point of reference for managing security policies and toolsets across the entire environment. This makes it easier for security leaders to solve complex problems and detect advanced threats before they evolve into business disruptions. Hybrid cloud infrastructure can actually improve your security posture if managed appropriately. Some of the things you can do in this kind of environment include: Manage security risk more effectively. Lock down your most sensitive and highly regulated data in infrastructure under your direct control, while saving on cloud computing costs by entrusting less sensitive data to a third party. Distribute points of failure. Diversifying your organization’s cloud infrastructure reduces your dependence on any single cloud platform. This amplifies many of the practical benefits of network segmentation. Implement Zero Trust. Hybrid cloud networks can be configured with strict access control and authentication policies. These policies should work without regard to the network’s location, providing a strong foundation for demonstrating Zero Trust . Navigate complex compliance requirements. Organizations with hybrid cloud infrastructure are well-prepared to meet strict compliance requirements that apply to certain regions, like CCPA or GDPR data classification . With the right tools, demonstrating compliance through custom reports is easy. Real-time monitoring and remediation . With the right hybrid cloud security solutions in place, you can gain in-depth oversight into cloud workloads and respond immediately to security incidents when they occur. How Do Hybrid Cloud Security Solutions Work? Integration with Cloud Platforms The first step towards building a hybrid cloud strategy is determining how your cloud infrastructure deployments will interact with one another. This requires carefully reviewing the capabilities of the major public cloud platforms you use and determining your own private cloud integration capabilities. You will need to ensure seamless operation between these platforms while retaining visibility over your entire network. using APIs to programmatically connect different aspects of your cloud environment can help automate some of the most time-intensive manual tasks. For example, you may need to manage security configurations and patch updates across many different cloud resources. This will be very difficult and time-consuming if done manually, but a well-integrated automation-ready policy management solution can make it easy. Security Controls and Measures Your hybrid cloud solution will also need to provide comprehensive tools for managing firewalls and endpoints throughout your environment. These security tools can’t work in isolation — they need consistent policies informed by observation of your organization’s real-world risk profile. That means you’ll need to deploy a centralized solution for managing the policies and rulesets these devices use, and continuously configure them to address the latest threats. You will also need to configure your hybrid cloud network to prevent lateral movement and make it harder for internal threat actors to execute attacks. This is achieved with network segmentation, which partitions different parts of your network into segments that do not automatically accept traffic from one another. Microsegmentation further isolates different assets in your network according to their unique security needs, allowing access only to an exclusive set of users and assets. Dividing cloud workloads and resources into micro-segmented network zones improves network security and makes it harder for threat actors to successfully launch malware and ransomware attacks. It reduces the attack surface and enhances your endpoint security capabilities by enabling you to quarantine compromised endpoints the moment you detect unauthorized activity. How to Choose a Hybrid Cloud Security Provider Your hybrid cloud security provider should offer an extensive range of features that help you optimize your cloud service provider’s security capabilities. It should seamlessly connect your security team to the cloud platforms it’s responsible for protecting, while providing relevant context and visibility into cloud security threats. Here are some of the key features to look out for when choosing a hybrid cloud security provider: Scalability and Flexibility. The solution must scale according to your hybrid environment’s needs. Changing security providers is never easy, and you should project its capabilities well into the future before deciding to go through with the implementation. Pay close attention to usage and pricing models that may not be economically feasible as your organization grows. SLAs and Compliance. Your provider must offer service-level agreements that guarantee a certain level of performance. These SLAs will also play an important role ensuring compliance requirements are always observed, especially in highly regulated sectors like healthcare. Security Posture Assessment. You must be able to easily leverage the platform to assess and improve your overall security posture in a hybrid cloud model. This requires visibility and control over your data, regardless of where it is stored or processed. Not all hybrid cloud security solutions have the integrations necessary to make this feasible. DevSecOps Integration. Prioritize cloud security providers that offer support for integrating security best practices into DevOps, and providing security support early in the software development lifecycle. If your organization plans on building continuous deployment capabilities now or in the future, you will need to ensure your cloud security platform is capable of supporting those workflows. Top 6 Hybrid Cloud Security Solutions 1. AlgoSec AlgoSec is an application connectivity platform that manages security policies across hybrid and multi-cloud environments . It allows security leaders to take control of their apps and security tools, managing and enforcing policies that safeguard cloud services from threats. AlgoSec supports the automation of data security policy changes and allows users to simulate configuration changes across their tech stack. This makes it a powerful tool for in-depth risk analysis and compliance reporting, while giving security leaders the features they need to address complex hybrid cloud security challenges . Key Features: Complete network visualization. AlgoSec intelligently analyzes application dependencies across the network, giving security teams clear visibility into their network topology. Zero-touch change management. Customers can automate application and policy connectivity changes without requiring manual interaction between administrators and security tools. Comprehensive security policy management. AlgoSec lets administrators manage security policies across cloud and on-premises infrastructure, ensuring consistent security throughout the organization. What Do People Say About AlgoSec? AlgoSec is highly rated for its in-depth policy management capabilities and its intuitive, user-friendly interface. Customers praise its enhanced visibility, intelligent automation, and valuable configuration simulation tools. AlgoSec provides security professionals with an easy way to discover and map their network, and scale policy management even as IT infrastructure grows. 2. Microsoft Azure Security Center Microsoft Azure Security Center provides threat protection and unified security management across hybrid cloud workloads. As a leader in cloud computing, Microsoft has equipped Azure Security Center with a wide range of cloud-specific capabilities like advanced analytics, DevOps integrations, and comprehensive access management features into a single cloud-native solution. Adaptive Application Controls leverages machine learning to give users personalized recommendations for whitelisting applications. Just-in-Time VM Access protects cloud infrastructure from brute force attacks by reducing access when virtual machines are not needed. Key Features: Unified security management. Microsoft’s security platform offers visibility both into cloud workflows and non-cloud assets. It can map your hybrid network and enable proactive threat detection across the enterprise tech stack. Continuous security assessments. The platform supports automated security assessments for network assets, services, and applications. It triggers alerts notifying administrators when vulnerabilities are detected. Infrastructure-as-a-service (IaaS) compatibility. Microsoft enables customers to extend visibility and protection to the IaaS layer, providing uniform security and control across hybrid networks. What Do People Say About Microsoft Azure Security Center? Customers praise Microsoft’s hybrid cloud security solution for its user-friendly interface and integration capabilities. However, many users complain about false positives. These may be the result of security tool misconfigurations that lead to unnecessary disruptions and expensive investigations. 3. Amazon AWS Security Hub Amazon AWS Security Hub is a full-featured cloud security posture management solution that centralized security alerts and enables continuous monitoring of cloud infrastructure. It provides a detailed view of security alerts and compliance status across the hybrid environment. Security leaders can use Amazon AWS Security Hub to automate compliance checks, and manage their security posture through a centralized solution. It provides extensive API support and can integrate with a wide variety of additional tools. Key Features: Automated best practice security checks. AWS can continuously check your security practices against a well-maintained set of standards developed by Amazon security experts. Excellent data visualization capabilities. Administrators can customize the Security Hub dashboard according to specific compliance requirements and generate custom reports to demonstrate security performance. Uniform formatting for security findings. AWS uses its own format — the AWS Security Findings Format (ASFF) — to eliminate the need to normalize data across multiple tools and platforms. What Do People Say About Amazon AWS Security Hub? Amazon’s Security Hub is an excellent choice for native cloud security posture management, providing granular control and easy compliance. However, the platform’s complexity and lack of visibility does not resonate well with all customers. Some organizations will need to spend considerable time and effort building comprehensive security reports. 4. Google Cloud Security Command Center Google’s centralized platform helps administrators identify and remediate security risks in Google Cloud and hybrid environments. It is designed to identify misconfigurations and vulnerabilities while making it easier for security leaders to manage regulatory compliance. Some of the key features it offers include real-time threat detection, security health analytics, and risk assessment tools. Google can also simulate the attack path that threat actors might use to compromise cloud networks. Key Features: Multiple service tiers. The standard service tier provides security health analytics and alerts, while the premium tier offers attack path simulations and event threat detection capabilities. AI-generated summaries. Premium subscribers can read dynamically generated summaries of security findings and attack paths in natural language, reducing this technology’s barrier to entry. Cloud infrastructure entitlement management. Google’s platform supports cloud infrastructure entitlement management, which exposes misconfigurations at the principal account level from an identity-based framework What Do People Say About Google Cloud Security Command Center? Customers applaud the feature included in Google’s premium tier for this service, but complain that it can be hard to get. Not all organizations meet the requirements necessary to use this platform’s most advanced features. Once properly implemented and configured, however, it provides state-of-the-art cloud security that integrates well with Google-centric workflows. 5. IBM Cloud Pak for Security IBM’s cloud security service connects disparate data sources across hybrid and multi-cloud environments to uncover hidden threats. It allows hybrid organizations to advance Zero Trust strategies without compromising on operational security. IBM provides its customers with AI-driven insights, seamless integrations with existing IT environments, and data protection capabilities. It’s especially well-suited for enterprise organizations that want to connect public cloud services with legacy technology deployments that are difficult or expensive to modify. Key Features : Open security. This platform is designed to integrate easily with existing security applications, making it easy for customers to scale their security tech stack and improve policy standards across the enterprise. Improved data stewardship. IBM doesn’t require customers to move their data from one place to another. This makes compliance much easier to manage, especially in complex enterprise environments. Threat intelligence integrations. Customers can integrate IBM Cloud Pak with IBM Threat Intelligence Insights to get detailed and actionable insights delivered to cloud security teams. What Do People Say About IBM Cloud Pak? IBM Cloud Pak helps connect security teams and administrators to the content they need in real time. However, it’s a complicated environment with a significant amount of legacy code, well-established workarounds, and secondary components. This impacts usability and makes it less accessible than other entries on this list. 6. Palo Alto Networks Prisma Cloud Palo Alto Networks offers comprehensive cloud-native security across multi-cloud and hybrid environments to customers. Prisma Cloud reduces risk and prevents security breaches at multiple points in the application lifecycle. Some of the key features this solution includes are continuous monitoring, API security, and vulnerability management. It provides comprehensive visibility and control to security leaders managing extensive hybrid cloud deployments. Key Features: Hardens CI/CD pipelines. This solution includes robust features for reducing the attack surface of application development environments and protecting CI/CD pipelines. Secures infrastructure-as-code (IaC) deployments. Extensive coverage for detecting and resolving misconfigurations in IaC templates like Terraform, Kubernetes, ARM, and CloudFormation. Provides context-aware prioritization. Palo Alto Networks addresses open source vulnerabilities and license compliance problems contextually, bringing attention to the most important issues first. What Do People Say About Palo Alto Networks Prisma Cloud? Palo Alto Networks is highly regarded as an enterprise security leader. Many customers praise its products, and Prisma Cloud is no different. However, it comes with a very high price tag that many organizations simply can’t afford. This is especially true when additional integration and implementation costs are factored in. Additionally, some customers have complained about the lack of embedded Identity and Access Management (IAM) controls in the solution. Optimize Hybrid Cloud Security with AlgoSec Security leaders must continually adapt their security deployments to meet evolving cybersecurity threats in hybrid cloud environments. As the threat landscape changes, the organization’s policies and capabilities must adjust to meet new demands. Achieving this level of flexibility is not easy with purely manual configuration and policy workflows. Human error is a major element in many data breaches, and organizations must develop security best practices that address that risk. Implementing the right cloud security platform can make a significant difference when it comes to securing complex hybrid cloud deployments. The ability to simulate in-depth configuration changes and automate the deployment of those changes across the entire environment offers significant advantages to operational security. Consider making AlgoSec your cybersecurity co-pilot for identifying vulnerabilities and addressing security gaps. Avoid costly misconfigurations and leverage intelligent automation to make your hybrid cloud environment more secure than ever before. Schedule a demo Related Articles 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? AlgoSec Reviews Mar 19, 2023 · 2 min read Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read 5 Multi-Cloud Environments Cloud Security Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call
- Micro-Segmentation | algosec
Security Policy Management with Professor Wool Micro-Segmentation Implementing a micro-segmentation strategy in the data center blocks lateral movement and helps protect the organization from cyberthreats. Watch this whiteboard video series on micro-segmentation and learn why and how to segment the data center, how to future-proof your policies and about the ongoing maintenance of a micro-segmented data center. Lesson 1 In this video, Prof. Wool introduces micro-segmentation: reasons for segmenting the data center, challenges, required steps when deploying a micro-segmentation strategy, and how to future-proof your policies. Introduction to Micro-segmentation Watch Lesson 2 Watch Prof. Wool as he shares tips on how to prepare for network segmentation by identifying the segment borders. Micro-segmentation – Mapping Existing Applications Watch Lesson 3 Watch this Prof. Wool video to learn how to define logical segments within a micro-segmentation project. Micro-segmentation – Defining Logical Segments Watch Lesson 4 In this video, Prof. Wool demonstrates how to generate a filtering policy during a micro-segmentation project. Micro-segmentation – Generating a Filtering Policy Watch Lesson 5 Watch this Prof. Wool video to learn about the ongoing maintenance of your data center upon completion of a micro-segmentation project. Micro-segmentation Ongoing Maintenance Watch Have a Question for Professor Wool? Ask him now Choose a better way to manage your network Choose a better way to manage your network Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- AlgoSec | Sunburst Backdoor, Part III: DGA & Security Software
In the previous parts of our blog ( part I and part II ), we have described the most important parts of the Sunburst backdoor... Cloud Security Sunburst Backdoor, Part III: DGA & Security Software Rony Moshkovich 2 min read Rony Moshkovich Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. Tags Share this article 12/22/20 Published In the previous parts of our blog ( part I and part II ), we have described the most important parts of the Sunburst backdoor functionality and its Domain Generation Algorithm (DGA). This time, let’s have a deeper look into the passive DNS requests reported by Open-Source Context and Zetalytics . The valid DNS requests generated by the malware fall into 2 groups: DNS requests that encode a local domain name DNS requests that encode data The first type of DNS requests allows splitting long domain names into separate requests. These requests are generated by the malware’s functions GetPreviousString() and GetCurrentString() . In general, the format of a DNS request that encodes a domain name may look like: USER_ID.NUM.COMPUTER_DOMAIN[.]appsync-api.us-west-2[.]avsvmcloud[.]com where: USER_ID is an 8-byte user ID that uniquely identifies a compromised host, encoded as a 15-character string NUM is a number of a domain name – either 0 or 1, encoded as a character COMPUTER_DOMAIN is an encoded local computer domain Let’s try decoding the following 3 DNS requests: olc62cocacn7u2q22v02eu.appsync-api.us-west-2.avsvmcloud.com r1qshoj05ji05ac6eoip02jovt6i2v0c.appsync-api.us-west-2.avsvmcloud.com lt5ai41qh5d53qoti3mkmc0.appsync-api.us-west-2.avsvmcloud.com String 1 Let’s start from the 1st string in the list: olc62cocacn7u2q22v02eu.appsync-api.us-west-2.avsvmcloud.com. In this string, the first 15-character string is an encoded USER_ID : “olc62cocacn7u2q” . Once it is base-64 decoded, as explained in the previous post, it becomes a 9-byte byte array: 86 7f 2f be f9 fb a3 ae c4 The first byte in this byte array is a XOR key: 0x86 . Once applied to the 8 bytes that follow it, we get the 8-byte user ID – let’s take a note and write it down, we will need it later: f9 a9 38 7f 7d 25 28 42 Next, let’s take the NUM part of the encoded domain: it’s a character “2” located at the position #15 (starting from 0) of the encrypted domain. In order to decode the NUM number, we have to take the first character of the encrypted domain, take the reminder of its division by 36 , and subtract the NUM ‘s position in the string “0123456789abcdefghijklmnopqrstuvwxyz” : num = domain[0] % 36 – “0123456789abcdefghijklmnopqrstuvwxyz”.IndexOf(domain.Substring(15, 1)); The result is 1 . That means the decrypted domain will be the 2nd part of a full domain name. The first part must have its NUM decoded as 0. The COMPUTER_DOMAIN part of the encrypted domain is “2v02eu” . Once decoded, using the previously explained method, the decoded computer domain name becomes “on.ca” . String 2 Let’s decode the second passive DNS request from our list: r1qshoj05ji05ac6eoip02jovt6i2v0c.appsync-api.us-west-2.avsvmcloud.com Just as before, the decoded 8-byte user ID becomes: f9 a9 38 7f 7d 25 28 42 The NUM part of the encoded domain, located at the position #15 (starting from 0), is a character “6” . Let’s decode it, by taking the first character ( “r” = 114 ), take the reminder of its division by 36 ( 114 % 36 = 6 ), and subtracting the position of the character “6” in the “0123456789abcdefghijklmnopqrstuvwxyz” , which is 6 . The result is 0 . That means the decrypted domain will be the 1st part of the full domain name. The COMPUTER_DOMAIN part of the encrypted domain is “eoip02jovt6i2v0c” . Once decoded, it becomes “city.kingston.” Next, we need to match 2 decrypted domains by the user ID, which is f9 a9 38 7f 7d 25 28 42 in both cases, and concatenate the first and the second parts of the domain. The result will be “city.kingston.on.ca” . String 3 Here comes the most interesting part. Lets try to decrypt the string #3 from our list of passive DNS requests: lt5ai41qh5d53qoti3mkmc0.appsync-api.us-west-2.avsvmcloud.com The decoded user ID is not relevant, as the decoded NUM part is a number -29 . It’s neither 0 nor 1 , so what kind of domain name that is? If we ignore the NUM part and decode the domain name, using the old method, we will get “thx8xb” , which does not look like a valid domain name. Cases like that are not the noise, and are not some artificially encrypted artifacts that showed up among the DNS requests. This is a different type of DNS requests. Instead of encoding local domain names, these types of requests contain data. They are generated by the malware’s function GetNextStringEx() . The encryption method is different as well. Let’s decrypt this request. First, we can decode the encrypted domain, using the same base-64 method, as before . The string will be decoded into 14 bytes: 7c a5 4d 64 9b 21 c1 74 a6 59 e4 5c 7c 7f Let’s decode these bytes, starting from the 2nd byte, and using the first byte as a XOR key. We will get: 7c d9 31 18 e7 5d bd 08 da 25 98 20 00 03 In this array, the bytes marked in yellow are an 8-byte User ID, encoded with a XOR key that is selected from 2 bytes marked in red. Let’s decode User ID: for ( int i = 0 ; i < 8 ; i++) { bytes[i + 1 ] ^= bytes[ 11 - i % 2 ]; } The decoded byte array becomes: 7c f9 a9 38 7f 7d 25 28 42 25 98 20 00 03 The User ID part in marked in yellow. Does it look familiar? Indeed, it’s the same User ID we’ve seen before, when we decoded “city.kingston.on.ca” . The next 3 bytes marked in red are: 25 98 20 . 2 0x59820 The first number 2 stands for the size of data that follows – this data is 00 03 (selected in green). The number 0x59820 , or 366,624 in decimal, is a timestamp. It’s a number of 4-second periods of time since 1 January 2010. To obtain the real time stamp, we need to multiple it by 15 to get minutes, then add those minutes to 1 January 2010: var date = ( new DateTime( 2010 , 1 , 1 , 0 , 0 , 0 , DateTimeKind.Utc)).AddMinutes(timestamp * 15 ); For the number 0x59820 , the time stamp becomes 16 July 2020 12:00:00 AM – that’s the day when the DNS request was made. The remaining 2 bytes, 00 03 , encrypt the state of 8 security products, to indicate whether each one of them is running or whether it is stopped. The 8 security products are: Windows Live OneCare / Windows Defender Windows Defender Advanced Threat Protection Microsoft Defender for Identity Carbon Black CrowdStrike FireEye ESET F-Secure 2 states for 8 products require 2 * 8 = 16 bits = 2 bytes. The 2 bytes 00 03 in binary form are: 00 00 00 00 00 00 00 11 Here, the least-significant bits 11 identify that the first product in the list, Windows Live OneCare / Windows Defender, is reported as ‘running’ ( 1 ) and as ‘stopped’ ( 1 ). Now we know that apart from the local domain, the trojanised SolarWinds software running on the same compromised host on “city.kingston.on.ca” domain has also reported the status of the Windows Defender software. What Does it Mean? As explained in the first part of our description, the malware is capable of stopping the services of security products, be manipulating registry service keys under Administrator account. It’s likely that the attackers are using DNS queries as a C2 channel to first understand what security products are present. Next, the same channel is used to instruct the malware to stop/deactivate these services, before the 2nd stage payload, TearDrop Backdoor, is deployed. Armed with this knowledge, let’s decode other passive DNS requests, printing the cases when the compromised host reports a running security software. NOTES: As a private case, if the data size field is 0 or 1 , the timestamp field is not followed with any data. Such type of DNS request is generated by the malware’s function GetNextString() . It is called ‘a ping’ in the listing below. If the first part of the domain name is missing, the recovered domain name is pre-pended with ‘*’ . The malware takes the time difference in minutes, then divides it by 30 and then converts the result from double type to int type; as a result of such conversion, the time stamps are truncated to the earliest half hour. 2D82B037C060515C SFBALLET Data: Windows Live OneCare / Windows Defender [running] 11/07/2020 12:00:00 AM Pings: 12/07/2020 12:30:00 AM 70DEE5C062CFEE53 ccscurriculum.c Data: ESET [running] 17/04/2020 4:00:00 PM Pings: 20/04/2020 5:00:00 PM AB902A323B541775 mountsinai.hospital Pings: 4/07/2020 12:30:00 AM 9ACC3A3067DC7FD5 *ripta.com Data: ESET [running] 12/09/2020 6:30:00 AM Pings: 13/09/2020 7:30:00 AM 14/09/2020 9:00:00 AM CB34C4EBCB12AF88 DPCITY.I7a Data: ESET [running] 26/06/2020 5:00:00 PM Pings: 27/06/2020 6:30:00 PM 28/06/2020 7:30:00 PM 29/06/2020 8:30:00 PM 29/06/2020 8:30:00 PM E5FAFE265E86088E *scroot.com Data: CrowdStrike [running] 25/07/2020 2:00:00 PM Pings: 26/07/2020 2:30:00 PM 26/07/2020 2:30:00 PM 27/07/2020 3:00:00 PM 27/07/2020 3:00:00 PM 426030B2ED480DED *kcpl.com Data: Windows Live OneCare / Windows Defender [running] 8/07/2020 12:00:00 AM Carbon Black [running] 8/07/2020 12:00:00 AM Full list of decoded pDNS requests can be found here . An example of a working implementation is available at this repo. Schedule a demo Related Articles 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? AlgoSec Reviews Mar 19, 2023 · 2 min read Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read 5 Multi-Cloud Environments Cloud Security Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call






