In the world of cybersecurity, all too often it feels like “another day, another unprotected asset and another breach.” Last month’s breach of Ecuadoran data by Novaestrat1 stands out given that the breach seems to have affected almost the entire population of the country and an arrest has already been made2, but more importantly, it highlights how the introduction of IaaS+SaaS has destroyed the traditional perimeter concept upon which security has been based since the first data centers were built. A colleague and I were debating how best to configure defenses to detect a Novaestrat-esque data compromise, and we thought it worth sharing our discussion and thought process.
I’ve been privileged to have worked with many Fortune 500 and federal government entities whose budgets were, in a practical sense, empowered to buy whatever made a positive impact on their defensive posture, so we didn’t limit defensive selection. As a generalization, I’ve seen most defenses comprised of a series of capabilities like the following:
Given the solution selection, this would pose a relatively robust environment for detecting incidents. An argument can be made about adding more tactical details like firewalls, a web application firewall, etc., but we’ll use this as a baseline and a lens for discussing a Novaestrat-specific breed of breach.
For those unfamiliar with it, the Novaestrat compromise involved an employee unintentionally exposing an (internal) Elasticsearch server in Florida to the internet, which contained millions of personally identifiable information (PII) records to the internet. Once exposed, it simply became a matter of time before someone (friendly or otherwise) would discover the host and its data.
Let’s break the result down security defense by security defense:
In sum, because the Elasticsearch server didn’t have a vulnerability that exposed the data, didn’t have an active attack associated with it, and couldn’t have been validated by a BAS solution, the only chance an organization like Novaestrat has of catching a data breach like this is after an adversary on the internet sees the data.
Despite unlimited funding, traditional defenses and detection methods are still almost certain to fail.
The term we’re using at CyCognito to describe risks like those posed by the rogue Novaestrat server is “shadow risk.” Shadow risk arises from the 21st century IT ecosystem that involves partners and subsidiaries who have your data, assets you own that are exposed to the internet (from workloads in the cloud to data-center servers to routers in offices), and IaaS and SaaS providers you use in the course of business. The level of technical control varies in each case, and critically, the level of visibility you have varies, creating types of risk that are new.
Going back in time with the knowledge that traditional tools couldn’t protect against this high-profile breach, what could an organization like Novaestrat have done to combat their shadow risk problem
The CyCognito platform is able to identify data exposures (as shown above) so that organizations can take action before a breach occurs.
To find attacker-exposed assets like the Elasticsearch server, organizations would need something that continuously scans the entire internet looking for misconfigured assets, exposed data, default configurations and credentials, and systems with vulnerabilities and other risks. That solution would then need to take that data it discovered from all areas of the modern IT ecosystem (traditional data centers, partners, subsidiaries, IaaS, SaaS, etc.), and accurately determine what belonged to their organization. This would be a new approach that matches the new reality of distributed IT ecosystems—and one that CyCognito is creating for its customers today.
[1] https://www.cnbc.com/2019/09/17/ecuador-data-breach-leaks-personal-information-for-millions-of-citizens.html
[2] https://www.zdnet.com/article/arrest-made-in-ecuadors-massive-data-breach/
Download the report now to stay ahead of emerging threats and strengthen your organization’s security posture for 2024.
Download the report to learn about the historical trends behind the emergence of exposure management, how to develop a strategic plan and assemble a team to smoothly transition frameworks, and example tech stacks to consider for your organization.
Get a free scan of your attack surface and gain valuable insight into your organization's risk posture by allowing CyCognito to discover, contextualize, and test externally exposed assets on a portion of your parent company or a single subsidiary.
Discover insights on application security, exposure management and other key topics below.
The definitive guide to attack surface management. Learn everything you need to know to reduce your cyber security risk with attack surface management.
Exposure management is a set of processes which allow organizations to assess the visibility, accessibility, and risk factors of their digital assets.
Vulnerability assessment is the process of identifying, quantifying, and prioritizing vulnerabilities in a system.
Explore CyCognito modules ASM, AST and EI in the resources below.
Scalable, continuous, and comprehensive testing for all external assets, all the time.
CyCognito Automated Security Testing dynamically applies payload-based testing techniques across your entire external attack surface.
CyCognito Exploit Intelligence uses threat intelligence about attackers’ behavior and exploitability for enhanced prioritization.