Continuous Auditing & Threat Detection in Multi-Cloud Infrastructure
<div>Efficient change control and configuration management is imperative for addressing the emerging</div><div>security threats in cloud infrastructure. These threats majorly exploit misconfiguration vulnerabilities</div><div>e.g. excessive permissions, disabled logging features and publicly accessible cloud storage buckets.</div><div>Traditional security tools and mechanisms are unable to effectively and continuously track changes in</div><div>cloud infrastructure owing to transience and unpredictability of cloud events. Therefore, novel tools</div><div>that are proactive, agile and continuous are imperative. This paper proposes CSBAuditor, a novel cloud</div><div>security system that continuously monitors cloud infrastructure, to detect malicious activities and</div><div>unauthorized changes. CSBAuditor leverages two concepts: state transition analysis and reconciler</div><div>pattern to overcome the aforementioned security issues. Furthermore, security metrics are used to</div><div>compute severity scores for detected vulnerabilities using a novel scoring system: Cloud Security</div><div>Scoring System. CSBAuditor has been evaluated using various strategies including security chaos</div><div>engineering fault injection strategies on Amazon Web Services (AWS) and Google Cloud Platform</div><div>(GCP). CSBAuditor effectively detects misconfigurations in real-time with a detection rate of over</div><div>98%. Also, the performance overhead is within acceptable limits.</div>