1. Introduction
The rapid adoption of public cloud services has prompted organizations to migrate their valuable data from on-premises servers to cloud data centers. Recent reports [
1] indicate that a significant portion of global businesses, approximately 70%, currently conduct their daily activities in the cloud, with Microsoft Azure, Amazon Web Service (AWS), and Google Cloud Platform (GCP) emerging as the top three cloud service providers (CSPs) [
2]. These providers offer a range of services based on the primary cloud services model, namely Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS). While cloud services offer various benefits, ensuring the security of cloud resources remains a critical concern due to the prevalence of cloud data breaches [
3,
4].
Over the past decade, security has consistently emerged as a prominent challenge in the cloud landscape, as highlighted in a series of cloud state reports published by Flexera [
2]. Key security issues include data security, confidentiality, and integrity [
5]. Industry experts have highlighted [
6] cloud platform misconfiguration, sensitive data leakage, insecure interfaces/APIs, and unauthorized access as the primary cloud attack vectors. The latter raises a significant question of who bears the responsibility for configuring and safeguarding cloud resources? In traditional settings, organizations assume full responsibility for securing on-premises systems. However, in the realm of public cloud environments, this responsibility is shared between cloud service providers (CSPs) and their customers. According to this model, cloud customers must ensure that they uphold security, governance, and compliance measures “in the cloud”, while the CSPs are accountable for the security “of the cloud” (physical and infrastructure security) [
7].
Table 1 demonstrates the overall structure of the shared responsibility model, which highlights the potential variability in the distribution of responsibilities between CSPs and their customers, contingent on the type of cloud service model employed [
8]. However, the exact responsibilities of each party can vary depending on the specific CSP, and each CSP has its own standard security control. It is important for cloud customers to understand the shared responsibility model of their CSP and to take appropriate steps to secure their own data and applications in the cloud.
Likewise, as organizations continue to migrate their data in the cloud environment, they still must comply with data and technologies regulations like General Data Protection and Regulations (GDPR), Health Insurance Portability and Accountability Act (HIPPA), and Payment Card Industry Data Security Standards (PCI-DSS) [
9]. Those regulations enforce the implementation of policies and practices to protect Personal Identifiable Information (PII) and other standards depending on the organization’s service type [
10]. Compliance is not synonymous with security; however, it is one of the security processes. Complying with such regulations can help organizations pass IT security audits or any other audit relevant to a particular standardization. Failing to comply can cause an organization to pay high amounts of fines and can cause reputation damage.
Irrespective of the type of cloud service deployment, there are responsibilities that the cloud customers always retain. Those include ensuring the security of their data, accounts, endpoints protection, and access management. Thus, the above-explained model shows that the data proprietor (the entity that stores data in the cloud) has the responsibility for implementing proper configurations to protect its data and control who can access those data. Furthermore, the EU’s GDPR data privacy legislation, which went into effect on 25 May 2018, explains that the responsibilities of securing personal data are on the data owner’s shoulders, not the CSP’s [
11]. They must also ensure that the cloud providers with whom they collaborate support appropriate security and compliance safeguards. In other words, organizations still own their data and identities even in the public cloud. Hence, they are ultimately responsible for their security and all other components found under their control.
Moreover, various reports and guidelines published by organizations and agencies such as ENISA, the European Union Agency for Cybersecurity [
12], and the US National Institute of Standards and Technology (NIST) [
13] emphasize that cloud security is a shared responsibility between the involved parties (cloud actors). Each party should understand their roles and obligations and establish clear and transparent contracts and service level agreements that specify the security objectives, controls, and metrics. The NIST Cloud Computing Reference Architecture [
13] outlines the five main cloud actors, comprising (1) the cloud consumer—a person or an entity that uses cloud services or resources from a cloud provider; (2) the cloud provider—an entity that provides cloud services or resources to cloud consumers; (3) the cloud auditor—the entity that conducts independent assessments of the cloud services or resources, such as security, performance, and compliance; (4) the cloud broker—the entity that intermediates between cloud consumers and cloud providers; and (5) the cloud carrier—the entity that transports data between cloud consumers and cloud providers, such as by providing network connectivity or bandwidth. While we acknowledge the significance of all cloud actors, comprehending their responsibilities and developing policies and procedures for their respective aspects of cloud security, this study particularly emphasizes the responsibilities of cloud consumers.
NIST has recently introduced a Cybersecurity Framework 2.0 (public draft) as an updated version of its predecessor, aiming to align with the continually evolving cybersecurity landscape and assist organizations in more efficiently managing cybersecurity risks. The framework outlines six core functions to achieve cybersecurity outcomes. These encompass the following [
14]: (1) Govern—establish and monitor the organization’s cybersecurity risk management strategy, expectations, and policy. (2) Identify—help determine the current cybersecurity risk to the organization. (3) Protect—use safeguards to prevent or reduce cybersecurity risk. (4) Detect—find and analyze possible cybersecurity attacks and compromises. (5) Respond—take action regarding a detected cybersecurity incident. (6) Recover—restore assets and operations that were impacted by a cybersecurity incident.
One of the tools that can be leveraged to achieve some of these security outcomes is the SIEM system. SIEM stands for security information and event management. SIEM systems collect, aggregate, and analyze data from various sources, such as logs, events, alerts, and incidents, and provide security teams with a centralized view of an organization’s security posture, enabling security teams to identify, investigate, and remediate potential security incidents more effectively.
The traditional deployment method for SIEM systems is self-managed on-premises. This mandates that organizations conduct a thorough assessment of the magnitude of the log and event data they produce, as well as the necessary system resources for their efficient management. Following the surge in cloud computing adoption, most major SIEM vendors now offer a cloud-based version of their products. This gives organizations the option to deploy SIEM solutions either on-premises or in the cloud.
However, cloud-based SIEM solutions that were originally designed for traditional IT environments may not be well suited to cloud environments. This is because cloud infrastructures have unique characteristics and requirements that may not align with the capabilities and configurations of traditional SIEM systems. For example, cloud environments are dynamic, scalable, heterogeneous, distributed, and multi-tenant, which makes it difficult to collect and analyze data from various sources and locations. Cloud environments also have specific data types and formats that are not supported by traditional SIEM solutions.
Some of the major cloud service providers have proactively anticipated these challenges and have recently started to introduce cloud-native SIEM solutions. Examples include Chronical SIEM for Google Cloud [
15] and Microsoft Sentinel for Microsoft Azure [
16]. These cloud-native SIEM solutions are purpose-built for the cloud environment from the start, utilizing microservice architectures and incorporating cloud-specific analysis methods and detection capabilities.
These cloud-native solutions are deemed essential. However, it is still the responsibility of cloud consumers to take the necessary steps to integrate SIEM solutions into their cloud environment. Considering the persistent and widespread risk of encountering threats and malicious activities in any cloud computing infrastructure, establishing a cloud-native centralized system for monitoring, detecting, and responding to security threats is critically important.
Therefore, as a part of our contribution, we present an architectural deployment framework that integrates a cloud-native SIEM solution within a public cloud environment. We propose and demonstrate in an empirical way a security design for internet-exposed infrastructure elements that need to reside behind a web application firewall (WAF), but also describe the steps for setting up a cloud-based Security Operation Center (SOC) leveraging cloud-native solutions. Beyond threat monitoring and detection, the framework encompasses a module for compliance assessment. This component evaluates compliance with pertinent industry standards and regulatory requirements, ensuring that the deployed cloud infrastructure aligns with the necessary criteria for compliance.
The rest of this paper is structured as follows:
Section 2 provides a comprehensive review of the related works in the field, emphasizes the research gap, and sets the stage for our contribution.
Section 3 presents the method, materials, and steps employed to design the proposed architecture.
Section 4 discusses the results obtained from the deployed system, demonstrating the effectiveness and limitations of the proposed model. Finally, in
Section 5, we provide the concluding remarks and future direction.
2. Related Works
This section aims to provide an overview of the existing research and literature pertinent to the subject of our study and highlights the contribution of our research.
In the realm of cloud security, several established frameworks serve as pivotal guides for organizations aiming to fortify their cloud environments. These frameworks and several other guidelines from states or federal agencies offer structured approaches and best practices to mitigate risks and ensure the integrity, confidentiality, and availability of data and services in cloud infrastructures.
Among the notable [
17,
18] frameworks are the NIST Cybersecurity Framework, which provides a comprehensive set of guidelines for managing and reducing cybersecurity risks, while the NIST Special Publication (SP800-144) provides guidelines on security and privacy in public cloud computing. It covers the security and privacy challenges and considerations for organizations that outsource data, applications, and infrastructure to a public cloud environment. Similarly, the Center for Internet Security (CIS) Controls provides a prioritized and actionable framework to help organizations enhance their cybersecurity posture and defend against cyber threats. Also, both ENISA and the Cybersecurity and Infrastructure Security Agency (CISA) have released extensive guidelines specifically tailored to address the unique challenges and requirements of cloud security. ENISA provides valuable insights into cloud security best practices and risk management strategies within the European context, while CISA offers comprehensive resources for safeguarding critical infrastructure and enhancing cybersecurity resilience in the United States.
In addition, the Cloud Security Alliance (CSA) provides a suite of resources and frameworks tailored specifically to cloud security. Their frameworks, such as the Cloud Controls Matrix (CCM) and the Security Guidance for Critical Areas of Focus in Cloud Computing, are instrumental in establishing robust cloud security strategies. Likewise, COBIT 5, a globally recognized framework for the governance and management of enterprise IT, was extended to COBIT 5 for cloud computing to provide practical guidance for enterprises using or considering using cloud computing. The framework highlights cloud computing challenges, governance and management in the cloud, cloud assurance reviews, and cloud risk assessment.
Furthermore, ISO/IEC2701 [
19], an extension of the ISO/IEC 27001 standard [
20], focuses specifically on information security controls for cloud services. It provides additional guidelines and controls to address the unique challenges and requirements of cloud computing environments. Moreover, the major CSPs (Azure, AWS, Google) developed well-architected frameworks that provide tailored recommendations and specific guidance for securing cloud environments within their respective platforms.
Table 2 presents an overview of implementation strategies and recommendations tailored for incident management and compliance, specifically aligned with the Microsoft Well-Architected Framework in accordance with Microsoft Azure as the cloud environment utilized in this study.
Several other studies have been carried out on this subject matter, Jakub et al. [
22] highlighted the critical nature of security in cloud environments and the difficulty of maintaining a comprehensive view of the safety of individual resources in large cloud computing systems. To address this challenge, the authors propose the utilization of SIEM technology for central monitoring and maintaining awareness of security threats. The paper analyses the technical requirements, logic, and legal framework of SIEM in the context of the Czech Republic and proposes a framework for utilizing SIEM in cloud computing environments. López et al. [
23] conducted a comprehensive review of the status and prospects of SIEM technology. The study highlights that SIEM technology is constantly evolving and facing new requirements and demands from users, such as compatibility with cutting-edge technologies (e.g., blockchain, cloud, containers), adherence to international standards and regulations (e.g., GDPR), and improvements in detection engines and response mechanisms. It also proposes a new framework termed SIEM-SC (security compliance), which integrates blockchain, encryption, and containers to enhance the security and compliance of SIEM systems. The authors claim that their framework is compatible with GDPR and can improve the performance, scalability, and reliability of SIEM technology. In [
24], Adriano et al. proposed a low-cost serverless SIEM solution that utilizes cloud services to store and correlate security events. The authors highlight the advantages of SIEMs in detecting and responding to security incidents but also acknowledge the high cost and maintenance requirements associated with traditional SIEMs. The study addresses these issues by investigating techniques to index, compress, and store events in a cost-efficient and safe way for a long time. The proposed solution leverages a serverless platform, like Amazon Lambda, to streamline the management of SIEMs and charge the customer only for the event processing time.
The study presented in [
25] proposes a SIEM architecture that can be deployed to a cloud-based security service platform for analyzing and recognizing intelligent cyber threats based on virtualization technologies. The authors argue that the traditional SIEM paradigm can be shifted to cloud-based security services, leveraging the scalability, flexibility, and cost-effectiveness of cloud computing technologies. The authors claim that the proposed architecture can help improve the accuracy and efficiency of cyber threat detection and response by leveraging the advanced analytics and machine learning capabilities of virtualization technologies. Ghallab et al. [
26] provide an overview of the integrity and security problems in distributed cloud computing environments, while Kanwal et al. [
27] highlight the potential issues that are being investigated and are preventing organizations from migrating traditional IT environments to cloud computing. Alam et al. [
28] address the challenge of processing large amounts of data in real time for identifying security issues, especially when hardware infrastructure is limited. The authors propose a solution for optimizing SIEM throughput on the cloud using parallelization, which can help managed security service providers (MSSPs) to process large amounts of data efficiently and identify security issues quickly.
In [
29], Garg et al. presented a study on analytical approaches to understanding the overall structure and developments in cloud computing but also discussed the concept of cloud computing security issues in terms of vulnerabilities, threats, and attacks. Rady et al. [
30] focused on integrity and confidentiality in cloud-outsourced data. They offered a top-level view of various cryptographic algorithms primarily based on different systems inside the outsourced database security and query authentication. In addition, they proposed a structure that could help in achieving the confidentiality and integrity of query outcomes of the outsourced database. Attou et al. [
31] provide valuable insights into leveraging machine learning for intrusion detection in the cloud computing environment. The authors propose an intrusion detection system model leveraging Deep Learning (DL) algorithms, specifically, the Radial Basis Function Neural Network (RBFNN) and Random Forest (RF). Their approach demonstrates improved accuracy and a substantial increase in the Matthews Correlation Coefficient (MCC). According to the authors, integrating this proposed IDS model into cloud environments has the potential to offer cloud providers enhanced security measures, such as minimizing unauthorized access and the risk of data breaches.
PADRES, a tool designed for privacy, data regulation, and security, was created in [
32] to assist companies in evaluating their compliance with GDPR. The emphasis of the software is the analysis of web applications, which results in a GDPR classification and a report with recommendations for improvement. In addition, the software also has a component that searches for vulnerabilities by integrating open-source scanning tools. However, PADRES did not directly focus on privacy concerns, and the responsibility of designing the inputs still falls on the developer as the compliance assessment questions are answered manually. Georgiou [
33] reviewed and analyzed the existing cloud threats and focused on those that do not apply to traditional systems. They also examined CSPs’ security requirements by taking Europe’s e-health system as a case study.
The reviewed studies emphasize the significance of security in the cloud and highlight SIEM technology as a promising approach to tackling the complex security challenges posed by the dynamic and complex nature of cloud networks. Furthermore, a substantial portion of the reviewed studies predominantly concentrate on exploring security challenges related to Software as a Service (SaaS) models, while relatively fewer studies address security issues specific to Infrastructure as a Service (IaaS) models. While data confidentiality has rightly received considerable attention in the literature, it is crucial to recognize that safeguarding data confidentiality alone is inadequate for upholding the fundamental principles of the CIA triad, which encompasses confidentiality, integrity, and availability. It is undeniable that data confidentiality is a critical aspect of security, yet it is equally crucial to ensure the integrity and availability of cloud-based systems and services. Maintaining data integrity guarantees that data remain accurate, unaltered, and trustworthy throughout their lifecycle, while availability focuses on ensuring uninterrupted access to cloud resources and services. Moreover, the reviewed works have predominantly focused on security aspects; however, it is also important to recognize the significance of compliance as an integral part of an organization’s overall security strategy. Ensuring compliance entails verifying that cloud resources adhere to industry standards and regulatory requirements. Neglecting compliance requirements can lead to severe consequences, including financial penalties, loss of customer trust, and damage to the organization’s reputation.
Considering that cloud environments pose new security challenges and risks, this study adds to the existing literature by implementing a cloud-based SOC leveraging cloud-native solutions to manage incidents and compliance in cloud infrastructure, emphasizing the role of the cloud consumer in protecting the cloud ecosystem in accordance with the shared responsibility model.
3. Materials and Methods
This section outlines the approach taken to conduct our study and the resources used in the process. It provides insight into the experimental design, security event collection procedures, and employed techniques.
The first step in the SIEM’s functional process typically involves the data collection phase. At this stage, the SIEM system gathers data from various sources, such as logs, events, and other security-related information from across the network and information systems. These data are then aggregated and normalized to create a standardized dataset that can be further analyzed for security insights and alerts. Before the data collection phase, it is crucial to have a solid infrastructure in place. To obtain this infrastructure, we successfully deployed a virtual network (Vnet) within the Microsoft Azure public cloud environment. This virtual network establishes the foundation infrastructure to support the SIEM system.
A virtual network in a cloud environment is an abstraction of a physical network. It is a logically isolated section of the cloud provider’s network infrastructure and allows one to define their own IP address ranges, subnets, security groups, etc. [
34]. It still exists physically in the sense that it relies on the underlying hardware and internet connections of the cloud service provider to transmit data and signals. Hence, in the subsequent sections, when we refer to a virtual network or virtual machines (VMs), we are referring to the way these resources are abstracted and provisioned, not that they do not physically exist. The implemented Vnet consisted of three network subnets, facilitating the deployment of diverse Azure cloud resources such as VMs, firewalls, and gateways. For illustrative purposes, this study employed Microsoft Azure as a public cloud environment and adopts the Azure Well-Architected Framework recommendations for deploying solutions on a cloud-based infrastructure.
Through the subsequent subsections, we provide in-depth insights into the deployed cloud instances, highlighting their roles, functionalities, and contributions to the overall functionality and security of the implemented virtual network. We also provide a detailed account of how we integrated other solutions into this deployed infrastructure.
Figure 1 depicts the overall deployment architectural model.
3.1. Virtual Network Design
As depicted in
Figure 2, the deployed virtual network (Vnet) comprises three subnets. The first subnet, referred to as the front subnet (subnet1), is publicly accessible and Internet-facing. It includes an application gateway serving as both a web application firewall (WAF) and a public load balancer. The application gateway directs incoming traffic to the second subnet (subnet3), which consists of two VMs functioning as web servers and one VM serving as a logic server. The third subnet, referred to as the back subnet (subnet3), accommodates two VMs operating as storage servers. To balance the loads between subnet2 and subnet3, an internal load balancer is employed.
3.1.1. Application Gateway/Web Application Firewall
An Azure instance that serves as a public web traffic load balancer and as a WAF to protect against web application vulnerabilities. It supports TLS/SSL traffic encryption between users and an application gateway and between application servers and an application gateway [
35]. In this experiment, the application gateway serves as a gateway to the web servers running in the back-end pool. The servers are accessible using the public IP address of an application gateway, and a listener routes requests to a back-end pool of servers following a configured HTTP rule.
The WAF component examines incoming requests before they reach the listener and employs the Open Web Application Security Project (OWASP) core rules to detect potential threats [
27]. The OWASP defines a collection of rules known as the core rule set, which covers common security threats such as remote file inclusion, HTTP request smuggling, cross-site scripting (XSS), SQL injection, command injection, HTTP response splitting, and various types of bots and scanners. The Azure WAF currently supports four core rule sets: CRS 3.2, 3.1, 3.0, and 2.2.9. In our experiment, we utilized CRS 3.1. By default, the WAF policy consists of managed rules, but it is also possible to incorporate customized rules, for example, to restrict remote access to a cloud infrastructure based on geo-location. Additionally, the WAF policy can operate in either detection or prevention mode. A snippet of the policy settings and rules is depicted in
Figure 3.
3.1.2. Network Security Group (NSG)
The NSG filters network traffic in and out of Azure resources within Azure Vnet [
36]. The security rules allow or deny inbound or outbound network traffic from various Azure resources. The NSG can be associated with either a subnet or a Network Interface Card (NIC) of a particular VM. The evaluation of rules is performed according to the priority associated with them. In addition, rules creation requires specifying the direction (inbound or outbound), source/destination (IP addresses, service tags, application security group), protocol (could be UDP, TCP, or any), port or port ranges (HTTP-80, SSH-22, RDP-3389, etc.), and action (allow or deny). The NSG has preconfigured rules that can be overridden by creating augmented rules with higher priority than the default ones. In this experiment, we created two NSGs assigned to subnet2 and subnet3. The flow record in Azure Vnet enables an NSG to be stateful. It implies that if one specifies an outbound security rule for any address through a specific port, one does not need to set an inbound security rule for the response to the outbound traffic.
3.1.3. Application Security Group (ASG)
In Azure Vnet, an ASG enables the grouping of virtual machines and the configuration of network security policies based on that group [
37]. This approach offers a more streamlined alternative to traditional explicit IP-address-based configurations and multiple rule sets, which can become complex to manage. An ASG is assigned to a NIC for effective implementation. As illustrated in
Figure 1, our implementation involves utilizing an ASG to consolidate and manage two web server VMs, simplifying network security policy management.
3.1.4. Internal Load Balancing
In this study, we utilize an internal load balancer to distribute incoming flows from its front end to the back-end pool servers located in subnet3. This load distribution is performed based on the rules configured for the load balancer, ensuring efficient resource utilization and optimal performance.
3.2. Microsoft Sentinel and Log Analytics Deployment
Microsoft Sentinel is “a scalable, cloud-native, security information and event management (SIEM) and Security Orchestration Automation and Response (SOAR) solution” [
29]. It collects data from all sources, including users, servers, and applications, in both cloud-based and on-premises devices [
16]. It has built-in connectors to make it easier to integrate popular security solutions. Microsoft Sentinel can support open standard formats such as Common Events Format (CEF) and Syslog.
An Azure Log Analytics workspace is “a logical storage unit in Azure where all log data generated by Azure Monitor from various sources are stored” [
38]. It uses the Kusto Query Language (KQL) version to speedily fetch, consolidate, and analyze all data collected into Azure Monitoring Logs. To meet the objectives of this study, we deployed a Microsoft Sentinel instance with a log analytics workspace. To ingest data in our environment, we connected the VMs created in the previous section to the workspace using an Azure Monitor Agent (AMA). The AMA collects monitoring data from Azure virtual machines’ guest operating systems and sends them to Azure Monitor (log analytics workspace) [
39]. Microsoft Defender for Cloud is connected to our workspace to check industry and regulatory compliance status.
Figure 4 depicts a selection of the data connectors that were utilized. In addition, to have more data ingested in our log analytics, we installed a log analytic agent—an operation management suite (OMS) on on-premises machines that collects data and sends them to a log analytics workspace in Azure. The agent configurations are adjusted to meet the nature of events that one wishes to gather and their severity.
Figure 5 showcases the flow for data logging and processes.
For a user to detect a threat in their cloud environment, they need to be notified when suspicious activity occurs. In this regard, Microsoft Sentinel uses analytics rules to correlate alerts into incidents [
40]. These rules automatically search the environment for any suspicious activity and can be used either as-is or customized to fit the need of the organization. A playbook is set to automatically be executed if an alert is generated by Sentinel analytics rules. With the help of Microsoft solution, we ingested pre-recorded data [
41] to enable several artifacts to simulate real-world scenarios. From that, we created a rule to detect malicious phishing activity from the real-world experience available in [
42].
Furthermore, Microsoft Sentinel workbooks offer a wide range of usage options. Starting from visual data representation to complex graphing and resource investigation maps, Sentinel has different types of workbooks. In this experiment, we focused on the Investigation Insight, Identity and Access, Data Collection, and Health Monitoring workbooks.
3.3. Microsoft Defender for Cloud
Microsoft Defender for Cloud is linked to Sentinel to check industry and regulatory compliance status. Microsoft Defender for Cloud has an integrated regulatory compliance dashboard that assesses cloud instances configurations by comparing them with the industry standards, regulations, and benchmarks needed to meet compliance requirements. With a focus on cloud-centric security, the Azure Security Benchmark expands on controls developed by the Center for Internet Security (CIS) and the National Institute of Standards and Technology (NIST) [
43]. A permanent link to the deployment configurations repository is available in [
44].
4. Results and Discussions
4.1. Virtual Network Security Control
In this section, we present the key aspects of the results obtained from our study, providing insights into the effectiveness and performance of the implemented solutions. In addition to presenting the results, this section discusses the encountered challenges and limitations as well as recommendations.
To begin with, we conducted configuration validation by setting up Internet Information Services (IISs) on the virtual machines in the back-end pool. These VMs hosted a publicly accessible web page, accessible through the front IP address (public IP) of the application gateway. To validate the feasibility of the employed security configurations, we performed a Network Mapper (Nmap) scan, examining the running services, versions, and open ports. However, the scan yielded failed results as the ports were filtered, representing one of the port states recognized by Nmap [
45]. The Nmap tool can be used for both legitimate and malicious purposes. It is not an intrusion attack by itself, but it can help attackers find ways to intrude into a network. The filtered status signifies that the Nmap probes were unable to determine the status of the ports due to the preventive measures implemented by the WAF, effectively blocking their access. Moreover, we attempted to access the servers from a restricted region using a browser connected through a virtual private network (VPN). It resulted in a denied access, demonstrating the effectiveness of the custom rule in place to prevent specific remote access. In
Figure 6, a segment of the Nmap scan results and denied remote access are depicted.
The main objective was to establish secure measures within the virtual network to protect against unauthorized access to the storage server (subnet3), which may house critical data. Through the implementation of access control rules in NSG and ASG, respectively, we aimed to ensure that only authorized traffic is allowed to reach the storage server, effectively mitigating the risk of unauthorized individuals gaining access to the sensitive data. The results demonstrate the effectiveness of the network security group and application security group in managing and securing network access.
4.2. SIEM Solution
The employed SIEM system analytics allow a security analyst to identify recurring incidents and uncommon trends that would otherwise go un-noticed. The incident page is the entry point for an analyst to consume security incidents (tickets) in Sentinel, and
Figure 7 illustrates the deployed SIEM incident status page.
This page offers visibility into all entities involved in an alert and presents a user-friendly interface (UI) for investigating the detections, allowing analysts to swiftly grasp the scope of a breach. The investigation graph showcased in
Figure 8 enables the correlation of relevant data with the associated entities, facilitating a deeper understanding and determination of the potential security threat’s root cause. The Timeline tab facilitates analysts to scrutinize the chronological sequence of alerts within an incident, thereby enabling them to reconstruct the sequence of attack activities with precision and depth. Meanwhile, in the Entities tab, analysts can explore all the entities mapped as per the defined alert rule. It offers a comprehensive overview of the diverse objects implicated in the incident, ranging from users and devices to addresses and files, among others.
Working with Microsoft Sentinel workbooks provides quantified graphical data representation and allows for the creation of interactive reports that can enhance security analysts’ ability to see beneath the surface of what is going on in the cloud.
Figure 9 presents data collection and health monitoring, identity and access, and threats intelligence in the log analytics workspace workbooks. The dashboard and visual representations are very useful in the world of security operations to show trends and anomalies in day-to-day security events. Without such analytics capabilities in place, the ability of security analysts would be limited in scope and effectiveness.
The analysis of the Data Health and Monitoring workbook revealed valuable insights into critical metrics, such as ingestion size, latency, logs per source, and the identification of data collection anomalies.
Figure 9a demonstrates how events were categorized into tables based on activated log types, including security events, Syslog, Azure metrics, Azure diagnostics, and more. The workbook helps ensure seamless and uninterrupted data ingestion into the log analytics workspace. Moreover, the Identity and Access workbook (
Figure 9b) provided a comprehensive view of users and connected device activities within the Azure Active Directory. It enabled the analysis of identity and access events, including sign-in events, audit events, and risky users. The visualizations and metrics presented in this workbook proved instrumental in understanding user behaviors and identifying potential security issues.
Additionally, the Threat Intelligence workbook (
Figure 9c) played a vital role in the identification and response to threats. By leveraging indicators of compromise (IOCs) such as IP addresses, domains, URLs, and email addresses, it facilitated threat hunting across cloud workloads. The workbook’s analysis capabilities allow a deeper understanding of observed threats, including their associated threat groups, targeted assets, tactics, techniques, and procedures (TTPs).
4.3. Compliance Assessment
The compliance solution continuously evaluates a user’s cloud environment to identify risk factors based on the controls and best practices in the standards they have applied to their subscriptions. In that line, the status of all chosen standards and regulations is displayed on the regulatory compliance dashboard. This evaluation helps the compliance analyst to continue acting on the security recommendations and improve the compliance posture by reducing the risk factors. Compliance assessment offers several benefits within the cloud environment. Firstly, users have the flexibility to choose from a wide range of supported standards and benchmarks, including Azure Security Benchmark, NIST SP 800-53, HIPAA/HITRUST, PCI-DSS, SOC TSP, and more, ensuring alignment with industry-specific requirements. Additionally, users can customize the set of standards and benchmarks to focus on their specific compliance needs. Moreover, users can set up alerts to promptly detect changes in compliance status and export compliance data either as a continuous stream or as weekly snapshots. Lastly, the compliance assessment module provides actionable recommendations for investigating and remediating compliance issues, empowering users to maintain and enhance their compliance posture.
4.4. Challenges, Limitations, and Recommendations
While our system demonstrated promising results, it is essential to acknowledge the limitations encountered during the experiment. Firstly, we strategically deployed cloud resources within our budgetary limits, allowing us to initiate the implementation of solutions while considering further scalability enhancement. To ensure comprehensive evaluation, future research should aim to incorporate large-scale deployments that align more closely with organizational-level scenarios, ensuring a greater relevance and applicability of findings. Secondly, we must emphasize that our study primarily focused on exploring a cloud-native SIEM solution. Nevertheless, it is worth acknowledging the availability of various third-party SIEM solutions that offer promising opportunities for effective integration within the cloud environment, broadening the range of options for potential users. Exploring these alternative solutions can provide valuable insights and expand the scope of research in this domain.
Thirdly, while it is feasible to integrate data sourced from third-party cloud service providers (CSPs) to evaluate pertinent compliance scores, this could be a daunting task for organizations that adopted multi-cloud environments—signifying entities that have implemented two or more distinct CSPs. As of the time of composition, the sole third-party CSPs supported in Sentinel are AWS and GCP. Furthermore, it was apparent that for large-scale deployments, the mismanagement of cloud resources could potentially result in inflated charges, which may prove burdensome to organizations. In this light, it is significant to have proficient individuals who can govern cloud expenditure to circumvent unnecessary expenses. As there are various security tools, a comprehensive assessment may be required to judge which one best fits organizational demand. It is equally important to leverage the inherent features of cloud computing, such as rapid elasticity, which allows cloud resources to be shrunk and/or grown to accommodate organizational needs. Likewise, with the metered services characteristic of cloud computing systems, customers can monitor and regulate the utilization of provisioned resources in real time, thereby providing transparency between the CSPs and the customers.
Nevertheless, we maintain that the advantages of implementing a SIEM system outweigh the associated challenges. Integrating such a system within a cloud environment enables the automation of security controls, reducing risks and mitigating the impact on cloud resources. Once the requisite configurations are in place, the system alleviates the burden on security professionals, who are typically accountable for cybersecurity incidents. This can promote a more resilient security framework and enhance an organization’s overall security posture in the cloud environment.