What Is Cloud Investigation? Cyber Terms Explained

Featuring: Tal Mozes, CEO and Co-Founder, Mitiga

So, what is cloud investigation?

Maybe before we dive deep into cloud investigation, let's talk about what is the cloud that we're referring to in cybersecurity? Because the cloud has different parts in your organization.

One of them will be the infrastructure—and the usual suspects will be the GCP, AWS, and Azure. But also you have a lot of applications like your identity, if it's Okta or Active Directory or anything else. And you also have your productivity. It could be G-Suite, it could be Office 365. All of those SaaS applications have high visibility, usually by the security team or the CIO.

But there are a lot of other SaaS applications that are less visible, and they're usually under the control of the business units. And that could be GitHub, GitLab under R&D, Mercator, Salesforce under the GTM teams, and so on. And usually, it's hard to find who's holding the keys to those cloud applications, and the visibility over there is limited, and usually logs are not being collected.

Going back to the original question about cloud investigation: Cloud investigation is the ability or capability to be able to look back into different events and actions that have happened in those different cloud and SaaS environments, not just one day. It could be a year or two years.

Usually, it takes over 220 days on average to find out that you have been breached and to be able to investigate what has happened. It could be investigating a user, or a business process, and this investigation capability is what allows you to investigate through multiple cloud environments at the same time, and to correlate it, in most cases, with a hybrid environment that includes on-prem technologies.

Want to learn how modern enterprises are investigating in the cloud?
Check out Investigation Workbench.

Video

What is Cloud Incident Response? Cyber Terms Explained

Cloud incident response, process-wise, is not very different than a regular incident response—which is the process once we realize we have been breached. We need to start investigating what has happened, what is the impact, when did it happen, and what we need to return to business as usual as soon as possible.

Video

What is a Security Data Lake? Cyber Terms Explained

When we talk about a Security Data Lake, Data Lake is not a very new concept. It's the concept of aggregating alot of data from different resources into a centralized repository.

Video

Mitiga — RSA Conference 2024 Innovation Sandbox

Each year, RSA Conference invites cybersecurity’s boldest new innovators to compete in RSAC Innovation Sandbox, a contest that puts the spotlight on startups with potentially game-changing ideas.