Some cybersecurity horror tales aren’t your typical horror tales: there’s no hazard from a chainsaw-wielding maniac hiding behind a server rack, the Candyman received’t seem in case you say his identify thrice whereas observing your 4K monitor, and it’s not like a vampire or werewolf can chunk right into a firewall.
As a substitute, the cybersecurity horror tales recounted listed here are tales that end in… (dramatic pause) …bad customer experiences.
The names of the actors have been eliminated to guard the harmless, however the horror… sure, the horror was very actual. Fortuitously, these tales function a studying expertise for the remainder of us.
A ghost within the machine?
There was as soon as an organization that constructed lovely dashboards. Big, sprawling issues that monitored issues like latency, packet jitter, and an entire slew of low-level community assets and processes. The safety and reliability crew cherished their dashboards and all the info it supplied to them.
In the future, nevertheless, because the safety and reliability crew gazed at their wall of dashboards displaying every part was regular, a help engineer walked in and knowledgeable them that the platform was down.
It turned out that regardless of all their dashboarding efforts, the corporate failed to observe whether or not customers may log into service. This created a scenario the place the reliability crew didn’t know that the platform was down till help instructed them. Assist solely knew as a result of a buyer referred to as and instructed them.
As the truth of the scenario started to daybreak on the reliability crew, one crew member gestured quizzically to the wall of screens displaying systemic concord and, surprised, requested, “Is there one thing incorrect with the packet jitter?”
Monitor with intent
To resolve this difficulty, the safety and reliability groups realized that they might detect platform entry points by monitoring person logins. They even took this resolution a step additional and created artificial person monitoring by having an software robotically try to login each 5 minutes from a number of, geographically distinct areas. This additionally supplied perception into website reachability. This allowed them to be proactive and detect points earlier than prospects did.
This firm used time collection information (login metrics) to see the connection between the variety of login connections and the quantity of back-end information connections consuming CPU assets getting used relative to time. The mixed information from person logins and artificial monitoring revealed that the issue was… congestion. Too many customers have been making an attempt to login very first thing within the morning, which overwhelmed the system.
Fortuitously, they have been in a position to improve the variety of database connections to accommodate the elevated service calls for. Additionally they discovered a useful lesson about monitoring: Don’t attempt to monitor every part. As a substitute, perceive what you’re monitoring and what the aim of monitoring that course of is. The purpose must be to floor the mandatory insights to the individuals who want that data to take applicable motion.
Irregular IP addresses
Being able to detect irregular habits generally is a lifesaver. One outstanding SaaS growth platform discovered this out the onerous manner when hacked accounts went undetected for months and code from compromised repositories was leaked. The hack was traced to 2 IP addresses on the opposite facet of the world that related to 1000’s of accounts on the SaaS platform. Little question this was a nightmare for everybody concerned.
Monitoring habits
Fortunately, you’ll be able to forestall the identical factor from taking place to you by utilizing behavioral modeling. Conduct modeling is a time collection query as a result of it entails monitoring occasions over time. By modeling the habits of a person, you’ll be able to decide after they login, on what machine, and the place on this planet they’re situated.
Monitoring this information over time reveals regular utilization patterns for customers and organizations. It’s also possible to use this information to assemble mathematical fashions of regular use information after which search for outliers.
Within the instance, the SaaS firm may have monitored every account and group, in addition to how usually clone operations occurred and the place these duties originated from.
Each SaaS consists of a set of traits that outline its service. Any irregular habits in relation to that attribute set turns into an occasion. The monitoring crew can then resolve what the occasion threshold is. For instance, if three various kinds of situations happen in a brief window then there’s a excessive chance that one thing is incorrect.
As a bonus, understanding buyer habits might help firms present higher service to their prospects. As an illustration, notifying the shopper that they’re about to hit some form of utilization restrict.
The purpose is that, from a cybersecurity perspective, time collection information can uncover a variety of issues, points, and phenomena, you simply must search for them. For instance, 1000’s of logins and code scrapes, throughout a number of accounts and organizations, coming from two IP addresses.
It may be difficult for safety and reliability groups to remain forward of nefarious actors, anticipate the restrictions of their very own infrastructure, or predict what their prospects are going to do. Failure to consider and plan for this stuff can finish in catastrophe. However viewing these identical challenges by way of the lens of time collection information reveals a variety of options.