Start your day with intelligence. Get The OODA Daily Pulse.
Google’s Cybersecurity Action Team was launched in early October of this year, as part of the company’s $10 billion pledge to strengthen cybersecurity, all of which grew out of the launch in August, by CISA Director Jen Easterly, of the CISA JCDC (Joint Cyber Defense Collaborative). Google is a partner company with CISA in the JCDC.
The Cybersecurity Action Team’s efforts begin with Google Cloud. They recently released their first publicly available intelligence offering – Threat Horizons, Cloud Threat Intelligence, November 2021, Issue 1 – a monthly report based on “threat intelligence observations from the Threat Analysis Group (TAG), Google Cloud Security and Trust Center, Google Cloud Threat Intelligence for Chronicle, Trust and Safety, and other internal teams.” The report provides:
At the same time as the launch of the Cybersecurity Action Team initiative by Google, the company announced that CrowdStrike will provide endpoint protection and Palo Alto Networks will provide network protection for Google Cloud customers. The entire cybersecurity initiative is also aligned with the NIST Cybersecurity Framework.
Due to the sheer scale of Google and Google Cloud, the company’s findings and recommendations promise to be best-in-class and the entire report is worth a detailed review. The report begins by reinforcing that cybersecurity fundamentals still matter: “While cloud customers continue to face a variety of threats across applications and infrastructure, many successful attacks are due to poor hygiene and a lack of basic control implementation.”
Current threats observed include:
Source: Google Cybersecurity Action Team, Threat Horizons, Cloud Threat Intelligence, November 2021, Issue 1
If your organization has experienced any of the abovementioned activities, consult the report for specific actions and mitigations. If you are not a GCP customer, their threat findings and recommendations apply in a general way to all cloud-based XaaS platforms and products, as the vulnerabilities are not specific to the GCP platform and exist on other industry offerings.
The report offers a series of cumulative recommendations, which are based on the activities they highlight in the report, as well as “valuable trends and lessons-learned…from other incidents.” Their ‘high-level’ recommendations include:
Audit published projects to ensure certificates and credentials are not accidentally exposed: Certificates and credentials are mistakenly included in projects published on GitHub and other repositories on a regular basis. Exposed certificates and credentials could allow an attacker to unauthorized access to your projects in Google Cloud. A regular audit of published projects can help ensure this mistake can be detected and fixed quickly.
Code downloaded by clients should undergo hashing authentication: It is a common practice for clients to download updates and code from cloud resources, raising concern that unauthorized code may be downloaded in the process. Meddler in the Middle (MITM) attacks may cause unauthorized source code to be pulled into production. By hashing and verifying all downloads, the integrity of the software supply chain can be preserved and an effective chain of custody can be established.
Use multiple layers of defense to combat credential and cookie theft. Cloud-hosted resources have the benefit of high availability and “anywhere, anytime” access. While cloud-hosted resources streamline workforce operations, bad actors can try to take advantage of the ubiquitous nature of the cloud to compromise cloud resources. Despite growing public attention to cybersecurity, spear-phishing and social engineering tactics are frequently successful. As for other forms of IT security, defensive measures need to be robust and layered to protect cloud resources due to ubiquitous access.
Interestingly, no matter how sophisticated the cyberthreat unearthed by this inaugural Google Threat report (based on the vast amount of network traffic they manage) or the complexity of your organization’s cybersecurity implementation, cybersecurity fundamentals still count.
Most of the countermeasures recommended at the end of the report are familiar, such as: enabling 2-Step Verification on accounts used to access Cloud resources; enforce and monitor password requirements for users; context-Aware Access; and engaging in email best practices.
If you are committed to GCP as your cloud-based service provider, the report has specific recommendations for Google cybersecurity solutions such as BeyondCorp Enterprise and Work Safer.
For more on the types of threats identified by Google’s Cybersecurity Action Team, see Cybersecurity Sensemaking | OODA Loop.
Now more than ever, organizations need to apply rigorous thought to business risks and opportunities. In doing so it is useful to understand the concepts embodied in the terms Black Swan and Gray Rhino. See: Potential Future Opportunities, Risks and Mitigation Strategies in the Age of Continuous Crisis
The OODA leadership and analysts have decades of experience in understanding and mitigating cybersecurity threats and apply this real-world practitioner knowledge in our research and reporting. This page on the site is a repository of the best of our actionable research as well as a news stream of our daily reporting on cybersecurity threats and mitigation measures. See: Cybersecurity Sensemaking
OODA’s leadership and analysts have decades of direct experience helping organizations improve their ability to make sense of their current environment and assess the best courses of action for success going forward. This includes helping establish competitive intelligence and corporate intelligence capabilities. Our special series on the Intelligent Enterprise highlights research and reports that can accelerate any organization along its journey to optimized intelligence. See: Corporate Sensemaking
This page serves as a dynamic resource for OODA Network members looking for Artificial Intelligence information to drive their decision-making process. This includes a special guide for executives seeking to make the most of AI in their enterprise. See: Artificial Intelligence Sensemaking
From the very beginning of the pandemic, we have focused on research on what may come next and what to do about it today. This section of the site captures the best of our reporting plus daily intelligence as well as pointers to reputable information from other sites. See: OODA COVID-19 Sensemaking Page.
A dynamic resource for OODA Network members looking for insights into the current and future developments in Space, including a special executive’s guide to space. See: Space Sensemaking
OODA is one of the few independent research sources with experience in due diligence on quantum computing and quantum security companies and capabilities. Our practitioner’s lens on insights ensures our research is grounded in reality. See Quantum Computing Sensemaking.
In 2020, we launched the OODAcast video and podcast series designed to provide you with insightful analysis and intelligence to inform your decision-making process. We do this through a series of expert interviews and topical videos highlighting global technologies such as cybersecurity, AI, quantum computing along with discussions on global risk and opportunity issues. See: The OODAcast