OPERATE and MONITOR Phase

Monitoring and Alerting

Monitoring and alerting is the process of collecting logs and metrics about everything happening in our infrastructure and sending notifications based on the metrics threshold value.

Metrics monitoring

Log monitoring

Alerting

Security-focused logging and monitoring policy is used to prevent sensitive information from being logged in plain text. We can write a test case in our logging system to look for certain patterns of data. For example, a regex to find out sensitive information so that we can detect the logs in a lower environment.

Application performance Monitoring (APMarrow-up-right) improves the visibility into a distributed microservices architecture. The APM data can help enhance software security by allowing a full view of an application. Distributed tracingarrow-up-right tools like Zipkinarrow-up-right and Jaegerarrow-up-right kind of stitch all logs together and bring full visibility of requests from start to end. It speeds up response time for new bugs or attacks.

Although all cloud providers have their own monitoring toolsets and some tools are accessible from the marketplace. Also, there are paid monitoring tool providers like Newrelicarrow-up-right, Datadogarrow-up-right, Appdynamicsarrow-up-right, and Splunkarrow-up-right that provide all types of monitoring.

Security information and event management (SIEM)

Security information and event management (SIEMarrow-up-right) offer real-time monitoring and analysis of events as well as tracking and logging of security data for compliance or auditing purposes. Splunkarrow-up-right, Elastic SIEMarrow-up-right, and Wazuharrow-up-right which give automated detection of suspicious activity and tools with behavior-based rules also can detect anomalies using prebuilt ML jobs.

Auditing

After the deployment visibility comes from the level of auditing that has been put in place on application and infrastructure. The goal would be to have your auditing at a level that allows you to feed info into a security tool to give needed data. We can enable audits on GCP with Audit Logsarrow-up-right, AWS cloud using CloudTrailarrow-up-right or on Azure with platform logsarrow-up-right. For auditing applications, we can enable inbuilt audit logs and send the audit data to any logging tool like Elasticseacharrow-up-right using auditbeatarrow-up-right or Splunkarrow-up-right and create an auditing dashboard.

Kubernetes runtime security monitoring

Falcoarrow-up-right is a cloud native Kubernetes threat detection tool. It can detect unexpected behavior, intrusions, and data theft in real time. In the backend, it uses Linux eBPF technology to trace your system and applications at runtime. For example, it can detect if someone tries to read a secret file inside a container, access a pod as a root user, etc, and trigger a webhook or send logs to the monitoring system. There are similar tools like Tetragonarrow-up-right, KubeArmorarrow-up-right, and Traceearrow-up-right which also provide Kubernetes runtime security.

Till now, we have seen how DevSecOps CI/CD pipeline looks like. Now, let’s dive into adding more security layer on top.

Last updated