Pricing Login
Pricing
Back to blog results

June 7, 2022 By Chas Clawson

Why end-to-end visibility is critical to secure your apps in a serverless world

Security in a serverless world

One of the universal truths in technology is that security always lags behind innovation. Companies must move quickly as they seek to innovate, increase efficiencies and be disruptive in ever-crowded markets. Living on the bleeding edge means you will get a few cuts, but the risk of not adopting new technologies is greater than those of a few system failures or breaches. One challenge is that it is often not apparent what new risks exist until boundaries are pushed. Take the modern automobile as a real-world example. The earliest horseless carriages had no concept or need for seat restraints. As vehicle speeds increased, seatbelts were needed. As injuries climbed, safety started catching up to the risks with the invention of airbags, followed by collision warning systems, modern autonomous emergency braking and self-driving cars.

Where we’re going, we don’t need roads

With the breakneck speed of the cloud, virtual injuries are all too frequent. The new way of operating in the cloud is pushing the enterprise to its limits. Where we once focused our security efforts on securing single monolithic applications and servers, the new modern app is spread across containers, microservices, and different cloud providers. Nearly everything is provided to the enterprise “as a Service” by vendors. From IaaS, PaaS, and FaaS, to NaaS and SaaS, pick a letter and there probably is a corresponding cloud vendor offering a matching service. As these cloud compute resources become more distributed and abstracted, it’s simply too much for humans to operate and maintain. Thus, developers have responded with an “everything as code” approach, combining rich APIs with scripts and configurations. This approach treats infrastructure, operations, configuration management and security as “code,” all driving towards more automation, scale and resiliency. But the adage, "with great power comes great responsibility" is very appropriate in this age of cloud computing.

This everything-as-code approach is the root of modern observability, which has grown from traditional simple log monitoring, application performance monitoring (APM), and infrastructure metrics to redefine how developers write applications from an observability design approach. The observability driven design framework helps developers understand and articulate operational and security use cases into the functional and non-functional requirements during design and exploration. This leads developers to develop applications with the highest compatibility with other frameworks, such as GitOps and zero trust, and service the analytical needs of all stakeholders across IT and business. This naturally evolves to optimize the architecture of telemetry pipelines and control planes for automation. Such that modern services and infrastructure are written to integrate with widely adopted and standards-based declarative telemetry pipelines (CNCF landscape, OpenTelemetry) and automation control planes (Sensu), which unlock the organization’s ability to accelerate AIOps and digital transformation.

How do we secure applications and data spread across so many cloud services in an environment where developers have been empowered to spin up new resources and deploy new code faster than their defenders can adapt? It’s like trying to navigate in a world where roads reroute themselves and maps are redrawn by the minute. With all the changes brought by this digital transformation, it’s critical that companies continue to consider the security implications of this evolution and retool to secure this new serverless world.

A novel threat to serverless apps

Recently, Cado Labs discovered the first malware specifically targeting the AWS Lambda service. AWS Lambda is an event-driven, serverless computing service that can perform any defined computing task, from serving web pages to processing data to calling other APIs or interacting with various AWS services. Cado named this new variant of malware “Denonia.” They described the following challenge of securing such functions: “Short runtime durations, the sheer volume of executions, and the dynamic and ephemeral nature of Lambda functions can make it difficult to detect, investigate and respond to a potential compromise. Under the AWS Shared Responsibility Model, AWS secures the underlying Lambda execution environment but it is up to the customer to secure functions themselves. [Denonia] demonstrates how attackers are using advanced cloud-specific knowledge to exploit complex cloud infrastructure, and is indicative of potential future, more nefarious attacks.” [Muir, Matt. “Cado Discovers Denonia: The First Malware Specifically Targeting Lambda.” The Cado Blog. Cado Security, April 6, 2022]

Modern security for modern apps

Sumo Logic has been operating and helping customers navigate these challenges for over twelve years. What started as a small team of machine data nerds has evolved. The fledgling idea to leverage the cloud to empower businesses with real-time analytics delivered as a service is now an advanced cloud-native platform that provides observability, security and automation to almost every aspect of cloud computing. Key to our driving mission is the democratization of data and telemetry across ITOps, DevOps, and SecOps, and to “bring light to dark” with our cloud analytics and cloud security data lake. We believe only reliable information and context can produce better decisions and remove uncertainty. To get there, we’ve built one platform for application reliability and security delivered and consumed as a secure SaaS.

Sumo Logic Cloud SIEM timeline view of related AWS detections

Sumo Logic Cloud SIEM provides a managed library of rules covering the major cloud service providers and their services.

With new threats like Denonia, it’s imperative that organizations have a platform that correlates the many different services and streams of machine data generated by the modern IT stack. For AWS, this means seamless integration with AWS CloudTrail, CloudWatch, VPC Flow, GuardDuty and SecurityHub—to name a few. Security and development teams can leverage Sumo Logic’s unified platform to achieve real DevSecOps in order to “shift left” and improve their security posture. It’s agile enough to track changes in configurations and services without requiring hours of manual tracing and discovery efforts. It triages both security and application alerts and failures into a single organization queue. This is backed by detection content updated and responsive to the changing threat landscape—perfect for threats like Denonia. Sumo Logic Cloud SIEM manages hundreds of out-of-the-box detection and correlation rules, and we update these rules globally on average twice every week. As an example, we analyzed and deployed rules for detecting exploit attempts to all of our Cloud SIEM customers within 24 hours of the public announcement of the Log4Shell vulnerability. As attackers would update the obfuscation of the JNDI string, we rapidly and continuously updated our rules to catch the additional techniques.

In the case of Denonia, its payload was designed to monetize the attack by using infected resources to run cryptomining software, sometimes referred to as crypto-jacking. But the damage could be much more serious. Organizations should ask themselves if their AWS credentials or keys were stolen, how long would it take them to identify indicators of compromise? Is there sufficient visibility into cloud services and the network traffic they generate, such as communication with the Monero server as in Denonia’s case? Would a spike in CPU and memory usage be noticed by the development team or would those outliers be lost in the metric noise? How many tools would be needed to tie together application tracing data, metric data, log data and security signals? This correlation on its own often takes time, costs money and reduces cyber resiliency. The strength of Sumo Logic’s cloud-native analytics solution is it delivers observability, tracing, SIEM and SOAR capabilities all within a single platform.

See Sumo Logic security in action

Join me this week at RSA Conference 2022 where Sumo Logic security experts are demonstrating how to automatically detect and respond to severless threats, like those targeting your AWS Lambda service. We’re in the North Hall, Moscone Center, booth #5463, where you can see a demo, catch one of our theater presentations, or sit in on one of our mini security workshops. Take a look at our RSA Conference 2022 event page and booth guide for all the details.

Complete visibility for DevSecOps

Reduce downtime and move from reactive to proactive monitoring.

Sumo Logic cloud-native SaaS analytics

Build, run, and secure modern applications and cloud infrastructures.

Start free trial
Chas Clawson

Chas Clawson

Field CTO, Security

As a technologist interested in disruptive cloud technologies, Chas joined Sumo Logic's Cyber Security team with over 15 years in the field, consulting with many federal agencies on how to secure modern workloads. In the federal space, he spent time as an architect designing the Department of Commerce ESOC SIEM solution. He also worked at the NSA as a civilian conducting Red Team assessments and within the office of compliance and policy. Commercially, he has worked with MSSP practices and security consulting services for various fortune 500 companies. Chas also enjoys teaching Networking & Cyber Security courses as a Professor at the University of Maryland Global College.

More posts by Chas Clawson.

People who read this also enjoyed