Security Agents Don’t Belong In Your Cloud!
Blog Article Published: 08/18/2021
This blog was originally published by Blue Hexagon here.
Written by Saumitra Das, Blue Hexagon.
COVID-19 has significantly accelerated migration to the cloud as organizations enable an increasingly remote workforce and adopt cloud-native services to serve increasingly online customers. Unfortunately, cyber attackers are also now increasingly targeting cloud infrastructure and even using remote worker device infections to laterally intrude into the enterprise cloud deployments.
Securing cloud real estate has become paramount specifically given the unique attack surface that the cloud presents. The software-defined nature and agile code release practices in the cloud make it:
- Easier to misconfigure and expose a wider attack surface
- Harder for security teams to keep tabs on constantly ephemeral cloud
Traditional approaches used for on-premises, like security agents, have significant limitations in the cloud. However, a new “agent-less” approach to cloud security has recently become possible due to cloud-native APIs now available from CSPs. This approach provides security in a fundamentally different way – taking advantage of the unique characteristics of the cloud while being best suited to the dynamic nature of the cloud.
This new agentless approach to cloud security uses cloud-native patterns such as:
- Event triggers (e.g. AWS Cloudwatch) to maintain security inspection as assets change over time
- APIs to enable or disable services and settings, notifications (e.g. AWS SNS) to enable remediation
- Traffic mirroring (e.g AWS Traffic Mirroring, GCP Packet Mirroring, Azure vTAP) to get access to any network packet, in any region, from any host or service, programmatically.
A key defining characteristic of such an approach to cloud security is that security teams now do not need to tightly couple or interface with the typically much larger Developer and DevOps teams, to instantiate and maintain security posture. For example, they do not have to mandate the use of a third-party agent to go into every workload or developer VM and make sure the right version is always present, correctly configured, and updated after a workload is in production.
A security team should be able to deploy an agentless security solution with zero downtime or changes to existing or future workloads.
There are six key benefits of an agentless approach to security versus agents as further described in the rest of this blog post.
Zero Supply Chain Attacks
The Solarwinds attack showed us how running privileged code from a third party can lead to attacks even in sophisticated organizations. Running third-party security agents that typically have high privilege rights alongside workloads, which have your IP and data, increases security risk dramatically. Using agents involves the risk of exposing your workloads and infrastructure to code that is being developed somewhere else without your visibility or control into their security posture. In contrast, an agentless solution can be completely isolated from your workloads and indeed even sequestered into its own virtual network or even account/project so that no lateral movement from the security solution is possible. This is a superior approach that eliminates the risk of supply chain attack to zero.
Zero Privilege Escalation and Tampering
In addition to the supply chain risk, agents have been known to have unpatched vulnerabilities themselves (Example 1, Example 2, Example 3) which could then be exploited by a threat actor and lead to privilege escalation. In the Solarwinds attack, agents were often tampered with and disabled in a very targeted way (https://us-cert.cisa.gov/ncas/analysis-reports/ar21-039a). In contrast, cloud-native infrastructure mechanisms such as AWS Traffic Mirroring, GCP Packet Mirroring, and Azure vTAP cannot be disabled by an attacker in userspace or used to escalate privilege.
Zero Performance Impact
Agentless solutions have zero performance impact upon the systems they are inspecting, period! Agent-based solutions require additional configuration efforts to make sure memory and CPU resources are not affecting the workload performance itself.
Zero Downtime and Maintenance
Agentless solutions do not require any downtime on customer workloads for instantiation. They also do not require manual intervention for maintenance and updates because they operate from the outside. Agents need constant care and upkeep to keep up with vulnerabilities, OS platform changes, performance issues, version udpates and much more. This requires the cloud operations or security teams to have to then go and update the agents on all the workloads in production.
Zero Darkspace In Cloud Real Estate
Customers tell me that agent-based approaches are only able to cover up to 50% of the cloud real estate even after several months of deployment. There are five fundamental reasons for this lack of visibility and consequently lack of security inspection:
- Deploying agents require disruptive changes to existing workloads which take time and in some cases may never happen
- Maintaining and updating agents is a time-consuming effort for multiple stakeholders
- Managed cloud-native services (Databases, Elasticsearch, Analytics) and serverless computing are increasingly being adopted and do not allow for agent installation
- Agents frequently have issues with running on different operating systems or different versions of a given operating system
- Third-party appliances are frequently deployed as black-boxes inside cloud infrastructure and they cannot have security agents installed on them to monitor behavior
Indeed, many agent-based security deployments have failed to secure the enterprise cloud instances, resulting in costly data breach and business disruption.
~Zero Friction between SecOps and Dev/DevOps
Deploying agents requires security teams to coordinate and make sure all containers and VMs – across all operating systems, in all regions, in all accounts and availability zones – are running the required security agents. This requires onerous continuous coordination between security teams and Dev/DevOps for whom agility in code release and time-to-deployment is the primary concern. To exacerbate this issue, security teams are outnumbered by multiple orders of magnitude by developers and DevOps personnel. Finally, as agents need to be updated or new workloads are created, this requires continuous coordination effort, and lead to potential gaps and delays.
Read other interesting blogs by Blue Hexagon at https://bluehexagon.ai/blog/.
Trending This Week
#1 What You Need to Know About the Diaxin Team Ransomware Group
#2 How ChatGPT Can Be Used in Cybersecurity
#3 Mitigating Security Risks in Retrieval Augmented Generation (RAG) LLM Applications
#4 The 6 Phases of Data Security
#5 Roadmap to Earning Your Certificate in Cloud Security Knowledge (CCSK)
Sign up to receive CSA's latest blogs
This list receives 1-2 emails a month.