Introduction: Why crack when you can log in?
SAAS applications are the basis of modern organizations, nutrition and performance performance. But each new application introduces critical safety risks through application integration and multiple users, creating simple access points for threat subjects. As a result of the SAAS violations increased, and according to cyber -posts in May 2024, identity and credentials caused by incorrect conditions 80% of security impact.
The subtle signs of the compromise are lost in the noise, and then the multi-stage attacks unfold unnoticed due to the canceled solutions. Think about the accounting of the account in Entra ID and then escalation of privileges in GitHub as well as Slack data. Everyone seems unrelated when viewed isolated, but in a connected temporary scale of events is a dangerous violation.
Saas Saas Saas Platform This is a multilayer solution that combines posture management with threats and identity reaction in real time. This allows organizations to get a true identity card of its SAAS ecosystem, identify and respond to threats and prevent future attacks.
Start working with the visibility and coating of Saas
You can’t protect what you don’t know. Most existing solutions (IAM, PAM, IAM, etc.) do not cover the SAAS apps or have no depth required to detect SAAS threats. That is why the first step is to overcome the shadows and get full visibility in the organization’s stack, including all applications, accounts and all hidden other integrations that security teams have no idea.
The wing detection approach is not included without agents and trusted persons. It is simply connected through API with basic IDPs (eg OKTA, Google Workspace and Azure AD), as well as to the Saas critical business (from Microsoft 365 and Salesforce to Slack, GitHub, etc.).
The wing discovers:
- Human (users) and inhuman (service accounts, API keys, etc.).
- Connecting the application and integration of other manufacturers and their resolution.
- Applications running on AI and data use.
- Foreign Ministry status, administrators in various Saas applications (including stale administrator)
The visibility itself is not enough. Understanding identity behavior in SAAS apps is key to detect and respond to real threats over time. It is here that a layer of detection of a threat focused on identity is received.
Want to see the wing in action? Ask the demonstration with one of our security experts.
Identification of the Saas Identity threat . From scattered magazines to a clear attack story
The wing reflects identity and poppy events to present as the attackers think. It then correlates them with MITER ATT & CK methods to convert long and dirty SAAS magazines into one clear attack history – simplification of research, alert fatigue, and accelerating the average time (Mttr).
Each detection is enriched with an intelligence threat to context: IP reputation (geolacation and privacy), use of VPN/Tor and more. Thus, instead of digging unprocessed magazines all day, analysts can understand the gaming book of the attacker in a few minutes.
Example of real life how hackers try to use identity:
- Step 1 – Password Trying: A password spray attack aimed at multiple user accounts in the Entra ID. The attacker tried to log in with the help of attacks on the basis of accounts for compromise of one or more user accounts without starting the lock mechanisms.
- Step 2 – Overlapping User: Attempts to login in several accounts from the same user (UA) confirmed that the attacker systematically tested accounts over the scale during the intelligence phase.
- Step 3 – successful entry after reconstruction: The attacker successfully entered the account. This entrance corresponded to the same custom agent used during the intelligence phase, which indicates that the credentials were compromised by earlier password spray activity.
- Step 4 – Escalation of privileges using the destination of the role: The attacker escaped the privileges of the compromised account, having assigned an IT administrative role in the ID entrad. This gave the attacker to broader visibility and control, including access to OAUT -related OAuth, services such as Github.
- Step 5 – Experience Data from GitHub: With increased privileges, the attacker took advantage of the associated Entra ID account, access to GitHub to Infiltrate Internation Repositories. Activities indicate that private repositories have been downloaded, including projects that may contain the source code, API keys or internal documentation. The attacker used this consolidation to highlight sensitive intellectual property directly from GitHub.
Temporary Path of the Attack
Threat terms (ref. Each detection has a detailed context on the affected identity, trigger, and where and when it happened (App, Timestamp, Geolocation).
Temporary Attacking Scale helps prompt security groups:
- Imagine the attack unfolded with a chronological idea of the relevant detections.
- Mark each detection of MITER ATT & CK methods, such as active scan, valid accounts, accounts, etc.
- Enrich the context warning and poppy, IPS, custom agents, geolocation, VPN/Tor and evidence.
- Connect anomalies with ordinary activity (for example, the resolution changes after successful brute force).
Prioritization of threats
Not all security threats are created equal. Each threat is assigned an assessment of confidence in the violation, quantifying the likelihood that the threat will have a successful violation. This metric is calculated on the basis of factors such as:
- Type of detection (ie, password spray, spike activity, etc.)
- Number of detection per threat (ie one identity has 4 detection)
- Miter ATT & CK attack tactics (ie initial access, exports, etc.)
SECOPS can sort and focus on the most important threats. For example, one unsuccessful entry from a new IP may be a low priority when viewing on its own, but a successful entry, which will be carried out with the exaltration of the data, will receive a higher trust. In the dashboard you can see a priority priority threatening with high -degree threats at the top, which deserve immediate attention and reduced risk further, crossing the fatigue and providing real detection of threats.
Want to see the wing in action? Ask the demonstration with one of our security experts.
Track threat and progress status
The wing tracking structure helps the sacaps to remain organized and avoid threats that slipped through the cracks. Teams can update statuses and track each threat from creating to permission.
Main features:
- Flag threats for subsequent implementation for effective prioritizing or monitoring specific cases.
- Flag threats to launch the Webhook event so that they appear in external systems such as Siem or Soar and are not seen.
- Update threatening status based on the SOC and IR teams conducted.
Quickly resolve with conquest on the softening of the consequences
When the SECOPS is in a certain threat, they receive an individual book by softening the consequences with steps, taking into account the specific type of attack and the SAAS app. The efforts of the effects include:
- Individual recommendations for each detection type
- Relevant documentation (eg how to set up Okta policy)
- Best Practices to Decide the Lee and Prevent Recurion (Posture)
Prevention: Check the root cause
Once the threat is stopped, you will need to ask yourself what contributed to this threat to succeed and how you can make sure it will not happen again.
Security teams should check if these events are linked to the main risk factors in the SAAS organization, so they do not just treat symptoms (active violation), but turn to the root cause.
This is possible because the Wing layer platform combines the Saas posture (SSPM) manual with the identity threat. The wing continuously monitors incorrect settings (based on the CISA underwater swimming frame), determining these risky settings – for example, credentials without MFA or administrator that never end.
Completion: Closing Security Cycle
Wing Security brings clarity to Saas Chaos through a multi -layered security platform that combines deep visibility, priority risk management and real -time detection. By combining posture management (SSPM) and identifying identity threat and reaction (ITDR), organizations can reduce risk impact, respond to context threats and remain ahead of the SAAS identity -based attacks.
Order the demonstration with the wing To find blind spots, early catch threats and fix what your business exposes.