• About UsLeadershipPartnersStrategic AlliancesInvestorsCareersEvents
  • Contact
  • Login
  • EnglishFrançaisDeutsch
    • Why Lacework
    • PLATEFORME

      Platform Overview

      Protection basée sur les données, de la création du code au cloud, le tout dans une seule plateforme.

      capacités

      Code Security

      Code Security

      Quickly prioritize and fix first and third-party code risks

      Infrastructure as Code Security (IaC)

      Fix misconfigurations before code is deployed

      Software Composition Analysis (SCA)

      Detect third-party software risks and build SBOMs

      Static Application Security Testing (SAST)

      Find security weaknesses in your in-house code

      Cloud Security

      Cloud-Native Application Protection Platform (CNAPP)

      Secure across the entire application lifecycle

      Cloud Workload Protection Platform (CWPP)

      Monitor workloads continuously for threats

      Cloud Infrastructure Entitlement Management (CIEM)

      Reduce cloud identity security risks

      Cloud Security Posture Management (CSPM)

      Assess and prioritize vulnerabilities and other risks

      Kubernetes Security (K8s)

      Find risks and threats in your K8s clusters

      environnements

      AWS

      Amazon Web Services (AWS)

      Simplification de la sécurité pour Amazon Web Services

      Azure

      Microsoft Azure

      Sécurisation des applications Microsoft Azure en continu

      GCP

      Google Cloud

      Automatisation de la sécurité pour Google Cloud

      Multicloud

      Protection des environnements multi-cloud et hybrides

      AWS

      Oracle Cloud Infrastructure (OCI)

      Minimize security risks in Oracle Cloud

      technologie

      Polygraph® : moteur d'analyse comportementale

      Identification et reconnaissance automatiques des comportements habituels grâce à notre technologie brevetée de machine learning

      Ingestion de données

      Obtenez une vue plus complète grâce à une approche avec et sans agent

      Intégrations

      Optimisez votre productivité grâce à une intégration avec vos workflows existants

      Attack path analysis (APA)

      Map attack paths and spot active intruders

      Lacework AI Assist

      Leverage ML/AI capabilities to conduct deep analysis of cloud and security events

    • SOLUTIONS

      Solutions Overview

      Cloud security solutions for teams to build more securely and unlock business outcomes through faster innovation.

      use cases

      Gestion des vulnérabilités

      Identification et correction des vulnérabilités, de la conception à l'exécution

      Container Security

      Visibilité sur l'activité des hôtes et des containers

      Risk Prioritization

      Cut alert noise with better cloud context

      Cloud Compliance

      Rationalisez les audits et conformez-vous aux normes du secteur

      Threat Management

      Detect known and unknown cloud threats faster

      Operational Efficiency

      Work smarter with your existing team

      secteur et taille

      HealthTech

      Protection des données de santé et preuve de conformité HIPAA

      Cloud Security for Enterprise

      Gain automated code-to-cloud security at scale

      FinTech

      Prévention de la cybercriminalité grâce à des transactions financières sécurisées

      Sécurité du cloud pour les startups

      Automatisation des processus pour stimuler la croissance des petites entreprises

      Gaming

      Sécurisation des données des joueurs tout en optimisant le développement des jeux

      rôle d'utilisateur

      Sécurité

      Identification des problèmes liés au cloud, avec des informations contextuelles détaillées permettant d'agir rapidement

      Développeur

      Développement plus rapide en intégrant la sécurité en continu et en bénéficiant d'une visibilité complète

    • CLIENTS

      Customers Overview

      Les entreprises les plus innovantes au monde font confiance à Lacework.

      RÉUSSITE CLIENT

      Études de casFormation : Lacework AcademyDocumentation produit

      ASSISTANCE CLIENT

      Customer CenterAssistanceSe connecterNous contacter
    • RESSOURCES

      Resources Overview

      Découvrez l’approche moderne de Lacework en matière de sécurité du cloud grâce à nos articles, études de cas, vidéos, e-books, webinaires et livres blancs.

      RESSOURCES ET INSIGHTS

      BlogÉtudes de casRapports du secteurInfographiesPrésentations des solutionsVidéosE-booksLivres blancsWebinairesCode to Cloud PodcastSecurity Job Board

      FORMATION ET DOCUMENTATION

      Académie LaceworkDocumentation
    • Company

      About UsLeadershipPartnersStrategic AlliancesInvestorsCareersEvents
    • Contact
    • ENDEFR
    • Voir une démoLogin
Blog

Heightened cyber threats have everyone on edge, what do you need to know?

Mark Nunnikhoven - Distinguished Cloud Strategist
March 22, 2022
4 min read Cloud Security

Heightened cyber threats have everyone on edge, what do you need to know?The Lapsus$ cybercriminal collective recently entered the hacking scene, and they have come out the gates on a mission. Taking a rather unorthodox approach in their public persona, they’ve claimed a number of notable hacks in the past couple of months. This week, they claim to have breached identity platform provider Okta and Microsoft.

It’s the issue with Okta that has the security community abuzz. And why wouldn’t it? Okta is an extremely popular service helping companies simplify their access to other services. It’s a key part of many companies’ security strategies, and is trusted with a lot of sensitive access for a wide range of companies, and for good reason. Services like this greatly simplify identity and authentication challenges.

Any significant breach at a service like Okta would have a very large blast radius. Given the potential, staying on top of this is a critical issue for the security of your organization.

Getting to the bottom of an incident takes time. During the early stages, speculation can run rampant…especially on social media. While speculation can be a useful tool, your security practice needs to work from data and confirmed facts, not guesses.

We now know the attack against Okta’s service was much more limited than Lapsus$ implied to the public. As this story moves on to examine how Okta responded to the confirmed compromise initially, it’s important companies use this moment to stop, evaluate security posture, and implement best practices to harden defenses against an increasing threat landscape.

Incident response is a dynamic process during which new information often comes to light. Okta has updated their original statement and released a detailed blog post of the incident. The new post provides some clarification and explanation of how Okta operates. In addition, it states that some customer data may have been “viewed or acted upon.” Those customers are receiving detailed, individual reports from Okta now.

 

Larger Context

Security isn’t a binary state. You aren’t “secure” or “insecure.” Consideration needs to be paid to the larger context. Visibility into your internal systems is critical but so is an understanding of the status of your service providers and the larger world around the organization.

This issue comes to light at a time of heightened awareness around cybersecurity, due in large part to recent world events. The threat landscape has changed significantly over the past few months, so much so the White House recently called for organizations to act immediately to strengthen their cybersecurity postures.

This call to action is one of many initiatives in the US to shine a light on current cybersecurity challenges. The administration and the SEC are also working on stricter data breach reporting requirements. Taken together, it’s clear cybersecurity is an important aspect of any business.

What Should You Be Doing?

How can you take steps to protect your organization today? As a security strategy, you should focus on visibility, insights, and action across your business.

That three step process will help keep your security efforts in line with other business initiatives. Cybersecurity is critical but it’s only one aspect of running a business.

Alongside the call for heightened awareness of cybersecurity issues, the White House offered a number of steps that you can take today to address these challenges. Some of these are tried and true advice about the basics. Keep your systems updated, have a strong backup strategy, use modern security tools which continuously monitor environments, enable multi-factor authentication, and more.

One of the steps stood out in particular: “Run exercises and drill your emergency plans so that you are prepared to respond quickly to minimize the impact of any attack.”

Organizations often struggle to respond to cybersecurity incidents because they are making up the workflow as they go. That’s a sure fire recipe for disaster. Walking through your incident response process helps familiarize your organization with it. It can also highlight any potential gaps or areas where you’re lacking visibility.

These exercises don’t have to be full run throughs, however. Tabletop exercises can be just as effective and they are much easier to set up on a regular basis. Regardless of the format of these exercises, the goal is to make sure everyone is on the same page before you’re in crisis mode responding to a cybersecurity incident.

Direct Action

In the light of the current situation with Okta and the White Houses general warning, here are the steps you want to be taking right now within your security practice:

  1. Gain greater visibility. Increase the sensitivity of the alerts you are actively monitoring. What might’ve been safe to ignore previously probably merits your attention in the current climate.
  2. Maximize the effectiveness of your security team. They have the subject matter experience that can provide the insights other teams need to bake security into their everyday activities.
  3. Take action when warranted. If your monitoring and observability activities highlight something that’s suspicious, have a bias towards action. In a different threat environment, you might investigate further before taking any action. That risk calculus has changed for most organizations now. Take reasonable actions to mitigate possible threats and then investigate further.

The Future

Cybercrime and cybersecurity incidents aren’t going anywhere. Organizations need to take steps to protect themselves. The second half of the White House’s statement acknowledges that and addresses the longer term.

The path forward means adding security earlier in our technology lifecycle. Commonly coined as “shift left” this effort is really about expanding security thinking throughout the development process of technology.

The memo sums it up as, “bake it in, don’t bolt it on.”

Tactics like dependence awareness (a/k/a software bill of materials), vulnerability management, and providing builders the right insights at the right time will help improve security over the long term.

Cybersecurity is a continuous practice. It requires visibility into your environment so that your teams can draw specific insights that help drive action that makes sense for your organization.

There will be more breaches. There will be bigger breaches. So, make sure your teams are focusing on the basics and making steady improvements to your organization’s security posture.

For more information: CISA, the Cybersecurity & Infrastructure Security Agency has a number of freely available packages to help you run tabletop exercises. They are a fantastic resource to help get you started.

Suggested for you

May 30, 2023

Comment sécuriser vos environnements Kubernetes en cinq étapes

See Details
January 10, 2023

50 CISOs to watch

See Details
Blog December 14, 2022

It’s time to scale up your cloud security posture

Read Blog

Exploration

  • PLATEFORME
  • Solutions
  • Polygraph
  • Détection des menaces
  • Gestion des vulnérabilités
  • Container Security
  • Multi-cloud
  • Cloud Security Posture and Compliance
  • Expérience Polygraph

Enterprise

  • À propos de nous
  • Investisseurs
  • Récompenses
  • Événements
  • Communiqués de presse
  • Médiathèque
  • Lacework Labs
  • Mentions légales
  • Sécurité et confidentialité
  • Confiance
  • Cookies Settings

Apprendre

  • Blog
  • Ressources
  • Académie Lacework
  • Documentation

Assistance

  • Assistance
  • Statut
  • Se connecter

Nous contacter

Pour obtenir une démo ou échanger avec notre équipe commerciale :

Nous contacter

© 2023, Lacework, Tous droits réservés.

  • Politique de confidentialité
  • Conditions d’utilisation