What Is Cloud Investigation? Cyber Terms Explained

Featuring: Tal Mozes, CEO and Co-Founder, Mitiga

So, what is cloud investigation?

Maybe before we dive deep into cloud investigation, let's talk about what is the cloud that we're referring to in cybersecurity? Because the cloud has different parts in your organization.

One of them will be the infrastructure—and the usual suspects will be the GCP, AWS, and Azure. But also you have a lot of applications like your identity, if it's Okta or Active Directory or anything else. And you also have your productivity. It could be G-Suite, it could be Office 365. All of those SaaS applications have high visibility, usually by the security team or the CIO.

But there are a lot of other SaaS applications that are less visible, and they're usually under the control of the business units. And that could be GitHub, GitLab under R&D, Mercator, Salesforce under the GTM teams, and so on. And usually, it's hard to find who's holding the keys to those cloud applications, and the visibility over there is limited, and usually logs are not being collected.

Going back to the original question about cloud investigation: Cloud investigation is the ability or capability to be able to look back into different events and actions that have happened in those different cloud and SaaS environments, not just one day. It could be a year or two years.

Usually, it takes over 220 days on average to find out that you have been breached and to be able to investigate what has happened. It could be investigating a user, or a business process, and this investigation capability is what allows you to investigate through multiple cloud environments at the same time, and to correlate it, in most cases, with a hybrid environment that includes on-prem technologies.

Want to learn how modern enterprises are investigating in the cloud?
Check out Investigation Workbench.

Video

Cloud Security and Cyber Insurance Experts Help Organizations Learn How to Mitigate Cloud and SaaS Threats

We really need to define and understand “Where is the border between our security or what we invest in cybersecurity as a client, and between the infrastructure?” And sometimes because they're so big and because they are, we trust that they have everything, is that a right presumption from our side?

Video

Protecting Data and Access in Cloud Environments

When we're talking about this modern era now, what new challenges do you need to address that are different in terms of access, data, and identity that perhaps are different than things you might've had to think about a couple years back?

Video

Get to Know Mitiga: Cloud and SaaS Threat Detection, Investigation, and Response Leader

After 25 years of experience in cybersecurity, we came to a conclusion that in cloud detection, investigation, and response, there is still no single good solution that can oversee the entire landscape of the digital footprint.