đ Link to the Room
đ Study Notes
- Many companies move their systems from on-premises to the cloud to save money and improve stability and security. However, the cloud also brings new security risks. If these risks are not understood, cloud systems can be less secure than before.
- This beginner room explains common cloud security risks and mistakes. It also shows how a SOC analyst can help protect cloud environments.
Learning Objectives
- Learn the cloud models: IaaS, PaaS, SaaS
- Understand basic cloud security risks
- Learn the basics of cloud security
- Understand why monitoring cloud systems is challenging for SOC teams
What Is Cloud
- The cloud means using computers and services over the internet instead of owning your own servers.
- You donât buy or maintain hardware, you just use it and pay for what you need.
- e.g. AWS, Google Drive
âď¸ IaaS â You manage the OS
- Infrastructure as a Service
- You get a virtual computer, then you install and manage the operating system and software.
- The cloud provider manages the hardware.
- e.g. AWS, Azure, Google Cloud
- Basically itâs like renting an empty apartment, you only bring the furniture.
âď¸ PaaS â You write code
- Platform as a Service
- You write code, Click deploy, the provider handles servers, OS, and setup
- Examples: Vercel, Heroku, Google App Engine, TryHackMe rooms
- Itâs like renting a furnished apartment, you just move in.
âď¸ SaaS â You just use it
- Software as a Service
- Ready-to-use software; no installation; works in a browser;
- e.g. Google Docs. Gmail, Dropbox, Slack
- Basically like staying in a hotel when everything is done for you.
Â
[!NOTE]
â IaaS â you manage most things
â PaaS â you manage code only
â SaaS â you manage nothing
Â
âWhich cloud model allows you to migrate a big on-premises network to the cloud?
IaaSSolution: This is mentioned in the text as well as you can easily google it :) â
âWhich cloud model do Elastic Cloud and CrowdStrike Falcon fit into? Note: You may need to perform external research to answer this question.
SaaSSolution: Same as previous one - search for it on the web. â
Â
Security of the Cloud
- The cloud uses the same tech as on-prem systems (Linux, TCP/IP, etc.).
- The cloud is not magic â itâs basically someone elseâs computer.
- Cloud systems can be attacked, just like local computers.
- Security of the providerâs infrastructure is called âSecurity of the cloudâ.
Risk: Cloud Provider Vulnerabilities
-
Big providers (AWS, Google Cloud) are well secured, but not perfect - If breached, attackers often target large customers = This is a supply chain risk.
- Always apply basic defenses:
- Network segmentation
- Login monitoring
- Endpoint monitoring
- Smaller or less-known providers are higher risk
- Past incidents show:
- Malware deployed to all VMs (IaaS breaches)
- Sensitive data leaked (SaaS breaches)
- Choose cloud providers carefully and be careful what data you trust them with.
Risk: Poor Visibility in the Cloud
- Users cannot see inside the cloud providerâs internal systems
- Some attacks happen entirely inside SaaS infrastructure
- SOC teams cannot access provider internal logs, this makes detection very difficult
Â
SaaS risks: token theft, data exfiltration, shadow IT (employees using unapproved SaaS tools) especially this can lead to unexpected data breaches.
Â
Example Cloud Incidents
1. Okta (SaaS, 2023): Support system breached; session tokens exposed; attackers logged into customer tenants.
2. BeyondTrust (SaaS, 2024): Remote Support SaaS compromised; attackers gained remote access to customers.
3. Google Cloud (IaaS, 2025): Cloud Run vulnerability; unauthorized access to container images.
Â
Cloud â fully safe
You trade control and visibility for convenience.
Â
âIs the cloud provider responsible for securing and monitoring its own infrastructure (Yea/Nay)?
YeaSolution: Cloud providers are responsible for securing and monitoring their own infrastructure (physical data centers, HW, networking, Virtualization layer) = this is called âSecurity of the cloudâ. You as a customer are responsible for what you put in. â
âBut should you trust the cloud provider without watching for supply chain threats? (Yea/Nay)
NaySolution: Cloud providers can be breached and that would affect many customers at once. â
Â
Security in the Cloud
- You are responsible for securing your cloud resources: VMs (IaaS), Apps (PaaS), SaaS accounts & credentials.
- Treat cloud resources like on-prem systems â monitor & harden them.
Cloud Migration Pitfalls
- Moving old VMs or files to the cloud doesnât make them secure as cloud has new, cloud-specific threats.
- On-premises security practices often donât work in the cloud.
- Example: Weak passwords without MFA are dangerous in public clouds.
Logging in the Cloud
-
You canât install your usual SIEM tools in the cloud like you do on-premises. Instead, you have to use the cloud providerâs logging tools (e.g., AWS CloudTrail)
-
Problems you might face with cloud logs:
- Extra cost â some logs require paid plans
- Messy or incomplete logs â not all info is there or easy to read
- Hard to connect to your SIEM, especially for SaaS apps
Cloud Incidents
- Capital One (AWS misconfig) â 1M Social Insurance Numbers stolen
- Various SaaS breaches â caused by weak passwords, leaked API keys, stolen cookies â attackers steal data
Â
âDoes moving an unpatched server to the cloud make it secure again? (Yea/Nay)
NaySolution: Moving an old, unpatched server to the cloud doesnât fix its vulnerabilities as the server has the same security flaws as it had. â Â
Cloud â automatic security â it helps with availability and hardware, but doesnât fix your mistakes.
Â
âWhat is the first major obstacle to integrating most cloud products with a SIEM?
Paid LogsSolution: Many cloud providers charge extra to export logs or use advanced logging features and if your SIEM relies on these logs, you canât collect everything for free. â
Â
What to Protect & Monitor
- SaaS (easiest) - ingest logs via API, watch for risky actions (e.g., public docs, suspicious logins, data exports)
- IaaS (harder) - monitor: Workloads (VMs, containers), cloud services (databases, storage), control plane (cloud admin console logins/actions)
Cloud Monitoring Challenges
- On-premises tools (EDR, SIEM) often donât work the same in the cloud
- Cloud limitations: Containers & auto-scaling (EDR not supported), SIEM integration may be tricky, forensics limited (memory/disk access)
- Logging volume: On-prem > IaaS > SaaS = this means the amount of logs you get decreases as you move from on-premises systems to cloud services.
Â
| Model | Logging Capabilities |
|---|---|
| On-premises | you control everything, you can log everything from servers, apps, network, endpoints |
| IaaS | you control the VMs and workloads, but the cloud provider controls the underlying infrastructure, hence fewer logs available |
| SaaS | you only see user activity and app-level events which means least amount of logs |
Â
The less control you have, the less logging data you get â harder to monitor everything.
Â
Common Cloud Security Tools
| tool | what does it do |
|---|---|
| CASB | enforce cloud security policies |
| CWPP | protect workloads from malware |
| CSPM | alert on misconfigurations |
- Even without these, SIEM + logs = decent SOC coverage
Recommended Actions
1. List your clouds: know where critical data lives
2. Know the risks: plan for possible cloud breaches
3. Enable cloud logs: SaaS + IaaS + PaaS
4. Enable workload logs: treat VMs like on-premises systems
5. Collect the logs: forward to SIEM (cloud logs arenât kept long)
6. Monitor for anomalies: detect suspicious logins and admin actions
Â
âWhat term describes cloud compute resources like VMs or containers?
Workloads
âWhich of the mentioned cloud security tools do Falco and Tetragon fit into? Note: You may need to perform external research to answer this question.
CWPP
Â
Challenge
- In this challenge you need to visit static site to get two flags. Happy exercising!
Â
âWhat is the flag you get after completing the first exercise?
THM{****_**_*_********}
âWhat is the flag you get after completing the second exercise?
THM{*****_***_*****_**********}
Â
Summary
- Learned IaaS, PaaS, SaaS differences
- Discovered cloud risks and migration pitfalls
- Saw that protecting cloud resources is challenging
- Logging and SOC monitoring in the cloud is harder than on-prem