Jump to content
  • Sign Up
×
×
  • Create New...

Cloud computing forensics techniques for evidence acquisition


Recommended Posts

  • Diamond Member



Cloud computing forensics techniques for evidence acquisition

Planning for digital forensics in cloud computing can be a challenge for security teams. Until recently, few tools were available to help analysts inspect systems and acquire information for cloud computing forensics investigations.

When considering digital evidence acquisition and analysis, analysts usually seek to obtain the following data:

  • Network packets for traffic analysis.
  • Workload memory.
  • Workload disk volumes.
  • Logs and event data from workloads and cloud environments.

Cloud forensics evidence acquisition and analysis have gotten easier over time. But a major challenge ********: Concerns about cloud forensics investigations often focus more on, “Will the evidence hold up in court?” instead of, “Can we do something about these findings?

By learning more about cloud forensics techniques and tools to enable or automate investigations, security teams are better equipped to address this challenge.

Cloud forensics evidence collection techniques

The digital forensics techniques and tools used depend on where security analysts collect evidence from, including workloads, containers and other areas on the network.

Cloud workload collection

Evidence collection for cloud workloads differs based on the types of workloads in use. Capturing disk in a running instance is similar to performing disk capture in virtual environments internally. This is because major IaaS providers enable customers to perform a snapshot capture of a VM workload. Analysts can convert the snapshot to a live analysis volume and attach it to a forensics workstation in the cloud or on premises. In most cloud environments, customers can capture IaaS OS and data drives directly from the management portal.

Capturing memory in a shared environment requires a method of capture on a per-instance basis. To acquire running memory of instances, security teams need separate tools, whether remote or local. A variety of tools are available for this purpose. For example, Acquire Volatile Memory for Linux, or

This is the hidden content, please
, from
This is the hidden content, please
is a free, open source utility that captures memory from traditional workload instances. WinPmem and Linpmem, which are specific to Windows and Linux, respectively, are other examples of free workload capture tools.

Hibernating a workload is another method for creating a memory capture on the local disk volume in some cloud environments, such as AWS. In

This is the hidden content, please
Cloud, security teams can generate a RAM disk for in-memory data. Many third-party, agent-based tools have been adapted to work in cloud environments, which might be more suitable for large enterprises.

Container forensics collection

Forensics in container-based environments is somewhat different. For container environments where the organization controls the underlying runtime engine, tools such as

This is the hidden content, please
and Docker Explorer, can help evaluate the shared union file system with individual container logs and container history.

For cloud container infrastructure, such as

This is the hidden content, please
Elastic Kubernetes Service, Azure Kubernetes Service and
This is the hidden content, please
Kubernetes Engine, a new feature in Kubernetes known as the Kubelet Checkpoint API enables analysts to make a copy or a running container image for offline analysis. Note, this capability might not be available in all PaaS models currently.

Serverless functions should largely rely on logs and actual code versions for evidence because there usually isn’t much else to collect.

Network forensics collection

Network forensics is made possible in most cloud environments with emerging network traffic mirroring and packet capture capabilities. Teams can use flow log data to build network traffic behavioral models.

Additionally, any client can use Virtual Private Cloud Traffic Mirroring in AWS and

This is the hidden content, please
Cloud Packet Mirroring. These services enable the client to automatically copy traffic to a network intrusion detection system or storage location for forensics analysis.
This is the hidden content, please
does not currently offer a packet replication system at the network level in Azure, but the
This is the hidden content, please
service can copy traffic to a selected destination by installing agents on any VMs teams want to copy traffic from.

Network detection and response tools are also widely available for leading cloud provider environments.

How to document cloud computing forensics investigations

Organizations need to enable write-once storage that is owned and controlled solely by the forensics and incident response teams. Ensure the identity and access management policy is documented and a least privilege access model is in place.

Log evidence acquisition and evidence storage location activities extensively. Do this with storage logging, as well as general cloud control plane logging with tools such as AWS CloudTrail, Azure Monitor and Cloud Logging in

This is the hidden content, please
Cloud.

Building a comprehensive cloud computing forensics program requires analysts to send logs to a storage environment that supports integrity monitoring, if possible.

How to automate cloud forensics investigations

Automation has become another major focus area for cloud computing forensics and incident response. Consider the following activities as potential opportunities to implement automation:

  • Assess the environment — continuously. Use cloud-native tools, such as AWS Config,
    This is the hidden content, please
    GuardDuty, Azure Security Center and
    This is the hidden content, please
    Cloud Security Command Center, to evaluate resources for security conditions, where possible.
  • Locate and tag suspect assets. Any number of network traffic patterns or events in a cloud environment could indicate suspicious or malicious behavior. One of the most effective ways to label suspicious assets is by automatically assigning metadata tags to assets behaving unusually. This enables organizations to track them and respond more effectively.
  • Perform evidence acquisition. Automated processes can be initiated to acquire evidence, such as memory and disk, as well as local processes or indicators of compromise. Initiate scripts or tools through cloud-compatible methods that produce logs and audit trails to ensure proper monitoring and chain of custody.
  • Remediation. For any remediation efforts, including quarantine of assets or termination of workloads, automation can help ensure the process is ********* immediately and consistently when suspicious behavior is detected.

Cloud service providers are beginning to offer built-in tools and service capabilities to help with automation. For example, AWS offers

This is the hidden content, please
to help teams deploy a completely automated forensics evidence acquisition platform in the cloud.

Equipped with methodologies, security teams can more effectively perform forensics investigations in the cloud. This knowledge — aided by ample third-party and open source tools, new cloud-native features and automation — can add value to enterprise cloud security programs.

Dave Shackleford is founder and principal consultant with Voodoo Security; SANS analyst, instructor and course author; and GIAC technical director.





This is the hidden content, please

#Cloud #computing #forensics #techniques #evidence #acquisition

This is the hidden content, please

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Unfortunately, your content contains terms that we do not allow. Please edit your content to remove the highlighted words below.
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Vote for the server

    To vote for this server you must login.

    Jim Carrey Flirting GIF

  • Recently Browsing   0 members

    • No registered users viewing this page.

Important Information

Privacy Notice: We utilize cookies to optimize your browsing experience and analyze website traffic. By consenting, you acknowledge and agree to our Cookie Policy, ensuring your privacy preferences are respected.