Article Details

Original Article Text

Click to Toggle View

When cloud logs fall short, the network tells the truth . Key takeaways Cloud migrations often create blind spots, making real-time visibility essential for cyber defense Network-layer telemetry can overcome cloud log inconsistencies Following steps for monitoring and operationalizing visibility can improve defense This article was inspired by a Corelight DefeNDRs podcast. Listen here. The illusion of cloud simplicity “Don’t worry about security, the cloud has you covered!” Cloud migration was often promised with security that would “take care of itself.” In practice, dynamic infrastructure, overlapping APIs, container sprawl, and multi‑cloud architectures have created new blind spots and attack surfaces for security teams to protect. As common attacks now also evade EDR tools, defenders are revisiting a familiar lesson: cloud defense, like network defense, requires traffic visibility. The analyst advantage and the data normalization challenge Standardizing cloud-native logs can be complicated because each provider uses different fields and structures. “Our cloud research team understands how the sheer volume of API calls and the constant addition of new services across cloud providers make log standardization and analysis a real challenge,” says Vince Stoffer, field CTO at Corelight. This fragmentation underscores the importance of network telemetry—the common denominator that remains consistent across providers and environments.  Fortunately, most cybersecurity analysts are already familiar with looking at network data, so when cloud telemetry is expressed similarly, they can quickly spot odd or suspicious patterns. Add cloud inventory context (i.e., accounts, projects, VPC/VNet, and cluster/pod labels), and together, this creates a common, provider-agnostic signal for detection and investigation. This is where network detection and response (NDR) shines. It delivers consistent, real-time visibility across multi- and hybrid- clouds and normalizes telemetry between environments.   Use Corelight NDR to protect your multi-cloud environments Trusted to defend the world’s most sensitive networks, Corelight's Network Detection & Response (NDR) platform combines deep visibility with advanced behavioral and anomaly detections to help your SOC protect your cloud environments. Detecting adversary patterns in dynamic cloud environments As cloud deployments grow more dynamic and complex, security fundamentals don’t change. Even short-lived workloads still talk in steady patterns and use predictable ports. Dependable signals defenders can watch out for include:  Adversaries communicating externally to exfiltrate data or maintain C2 over unusual ports or network protocols Deviations in production containers and managed services, which are typically immutable and consistent after deployment Adversaries with admin access disabling host-based sensors and container runtime monitoring sensors Unusual signs of enumeration or discovery activity between systems or services that may indicate adversaries mapping resources  By using traffic mirroring and virtual taps, network-level telemetry collection is largely tamper-resistant and offers visibility independent of host integrity. Combining network data with endpoint data, and container runtime data for process‑level context can fill the gaps in cloud-native security and improve detection accuracy in dynamic cloud environments. So, what types of threats are visible in monitored cloud network traffic? Supply‑chain compromises: Malicious container images and packages that drop cryptominers beaconing to pools Infostealer‑led intrusions: Stolen credentials or session tokens enabling console/API access Interactive admin tooling in containers: SSH, RDP, or VNC in immutable production environments is often suspicious, especially between containers Misuse of managed services and data egress: Connections to new regions, unfamiliar APIs, or sudden spikes against outbound volume can signal attack Coinminers communicating with mining pools: Coinminers abuse compromised cloud resources to mine cryptocurrency If you accept that network monitoring is key to cloud security, the next question is “What should you monitor?” East-west and north-south traffic: intra-cloud communications (service-to-service, node-to-node) and internet ingress/egress Container traffic (Kubernetes) identifying deviations after application deployment TLS metadata (SNI, certificate subjects) to reveal managed service endpoints and support service‑aware baselines DNS Data to identify communications with malicious domains and network tunneling Flow logs for breadth and traffic mirroring/pcap for depth The next step is to build an effective workflow: Start by turning on flow logs and traffic mirroring, and note their latency and fidelity so you know what each source can and can’t tell you.  Pull cloud network telemetry into a single platform, standardize it, and enrich it with cloud inventory and tags so context travels with the data. Establish and tune baselines by role, service, port, and known external peers. Begin with your most critical services, then iterate to cut noise without losing true drift signals. Alert on new destinations, ports, or protocols Monitor egress tightly. Cover your choke points by instrumenting VPC/VNet egress. Add node-level viewpoints in your container platforms  to look for newly observed domains or IPs and atypical destinations, periodic beaconing and low‑and‑slow transfers, and time‑of‑day or volume spikes Profile managed‑service access via TLS metadata; alert on first‑seen APIs, endpoints, or regions per workload. Hunt for miner footprints: connections to known pools and characteristic protocols Flag interactive protocols in containers (SSH/RDP/VNC) and lateral movement patterns within clusters Correlate endpoint compromises: if a user device is breached, pivot to cloud egress for matching infrastructure and behaviors And keep yourself honest with continuous validation—emulate adversaries to confirm you can detect infostealers, cryptomining, C2, and suspicious admin behavior. Multi-cloud security is more than achievable when you apply timeless network principles to modern architectures. As attackers lean on AI and slip past trusted controls, network visibility isn’t optional— it’s the foundation for understanding your environment and catching threats before anomalies become incidents, on the ground or in the cloud. This article was inspired by a conversation between Richard Bejtlich, Corelight’s strategist and author in residence, and David Burkett, Corelight’s cloud security researcher, on Corelight’s DefeNDR podcast series. Subscribe or listen to the episode here.To learn how Corelight’s Open NDR Platform unifies cloud and network evidence for fast, effective detection and response, explore more at Corelight.com/elitedefense Sponsored and written by Corelight.

Daily Brief Summary

VULNERABILITIES // Enhancing Cloud Security Through Network-Layer Telemetry and Visibility

Cloud migrations often lead to security blind spots due to dynamic infrastructure and multi-cloud architectures, necessitating real-time network visibility for effective cyber defense.

Network-layer telemetry is crucial for overcoming inconsistencies in cloud logs, providing a consistent signal across diverse environments and enhancing threat detection.

Corelight's Network Detection & Response (NDR) platform offers deep visibility and advanced anomaly detection to protect sensitive cloud environments from adversarial threats.

Effective cloud security involves monitoring east-west and north-south traffic, container deviations, and TLS metadata to detect suspicious activities and potential breaches.

Key threats visible in cloud network traffic include supply-chain compromises, infostealer-led intrusions, misuse of managed services, and cryptomining activities.

Organizations are advised to implement traffic mirroring, standardize network telemetry, and establish baselines to improve detection accuracy and reduce noise.

Continuous validation through adversary emulation is recommended to ensure detection capabilities for infostealers, cryptomining, and suspicious admin behavior.

Applying traditional network security principles to modern cloud architectures is essential as attackers increasingly utilize AI to bypass existing controls.