{"id":22356,"date":"2024-01-30T18:22:22","date_gmt":"2024-01-30T17:22:22","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=22356"},"modified":"2024-01-30T18:22:24","modified_gmt":"2024-01-30T17:22:24","slug":"deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy\/","title":{"rendered":"Deceptive Security: the solution for effective detection in the cloud? &#8211; your luring strategy.\u00a0"},"content":{"rendered":"\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">Today, cyber-attacks are part of our daily lives, and are becoming increasingly numerous and sophisticated.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">Simultaneously<\/span><span data-contrast=\"none\">, we are moving towards Information Systems built on an ever-increasing diversity of environments, thanks in particular to the <strong>Cloud,<\/strong> which is now <\/span><span data-contrast=\"none\">an integral part within <\/span><span data-contrast=\"none\">corporate I<\/span><span data-contrast=\"none\">nformation <\/span><span data-contrast=\"none\">S<\/span><span data-contrast=\"none\">ystems<\/span><span data-contrast=\"none\">. This enables <\/span><span data-contrast=\"none\">corporation to <\/span><span data-contrast=\"none\">expand their capabilities, <\/span><span data-contrast=\"none\">however it also <\/span><span data-contrast=\"none\">the surface area and risks of attack.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">Conventional intrusion detection and protection techniques already exist and are developing exponentially. These are effective against the most common attacks, <\/span><span data-contrast=\"none\">however<\/span> <span data-contrast=\"none\">are <\/span><span data-contrast=\"none\">not <\/span><span data-contrast=\"none\">always <\/span><span data-contrast=\"none\">adapted to the specificities of the Cloud.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">This raises questions about the use of <strong>proactive strategies<\/strong>, such as <strong>Deceptive Security<\/strong>, to stay one step ahead of attackers. Particularly in the context of Cyber-Resilience: how can this kind of technology be used in both <\/span><span data-contrast=\"none\">a <\/span><span data-contrast=\"none\">traditional and <\/span><span data-contrast=\"none\">a <\/span><span data-contrast=\"none\">cloud environment<\/span><span data-contrast=\"none\">?\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><em>When should Deceptive Security techniques be used? Are Deceptive Security solutions in the Cloud being developed today? Are there any specific strategies to consider in a Cloud environment as opposed to a traditional one?\u00a0<\/em><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">We will answer these questions in a <\/span><b><span data-contrast=\"none\">mini-series of 2 articles<\/span><\/b><span data-contrast=\"none\">. In the first article, we will show you how to develop and evaluate your decoy strategy. In the second article, we&#8217;ll present a practical example of deceptive security in AWS.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p>\u00a0<\/p>\n<h1 style=\"text-align: justify;\" aria-level=\"1\"><span data-contrast=\"none\">Develop<\/span><span data-contrast=\"none\"> and <\/span> <span data-contrast=\"none\">evaluate<\/span> your\u00a0<span data-contrast=\"none\">deceptive<\/span> <span data-contrast=\"none\">strategy<\/span> <span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559738&quot;:240,&quot;335559739&quot;:360,&quot;335559740&quot;:259,&quot;335559991&quot;:567}\">\u00a0<\/span><\/h1>\n<h2 style=\"text-align: justify;\" aria-level=\"1\"><span data-contrast=\"none\">Ambitions of <\/span><span data-contrast=\"none\">Deceptive Security<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559738&quot;:240,&quot;335559739&quot;:360,&quot;335559740&quot;:259,&quot;335559991&quot;:567}\">\u00a0<\/span><\/h2>\n<h3 style=\"text-align: justify;\" aria-level=\"2\"><span data-contrast=\"none\">Deceptive Security in a nutshell<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1418,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}\">\u00a0<\/span><\/h3>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">&#8220;<strong>Deceptive Security<\/strong>&#8221; (referred to as &#8220;Deceptive&#8221; in the rest of this article), or &#8220;<strong>digital decoying<\/strong>&#8220;, is a cyber-defense technique that deals with the<strong> intrusion of attackers into an IS<\/strong> (Information System). It works by <strong>setting up traps and\/or decoys<\/strong> in an IS. These are designed to <strong>imitate legitimate technology,<\/strong> so as not to be <\/span><span data-contrast=\"none\">identified as security systems\/measures<\/span><span data-contrast=\"none\">.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">This method makes it possible to <strong>detect<\/strong> intrusions by generating alerts, to <strong>prevent damage<\/strong> to the actual infrastructure and to <strong>observe<\/strong> the practices used by the attacker.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">Before delving into the details of this subject, we recommend reading the article &#8220;<\/span><a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/11\/deceptive-security-comment-arroser-larroseur\/\"><span data-contrast=\"none\">Deceptive Security : comment arroser l\u2019arroseur ?<\/span><\/a> <span data-contrast=\"none\">&#8220;, which describes the main concepts of &#8220;<strong>Deceptive Security<\/strong>&#8220;.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p>\u00a0<\/p>\n<h3 style=\"text-align: justify;\" aria-level=\"2\"><span data-contrast=\"none\">The main objectives of Deceptive<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1418,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}\">\u00a0<\/span><\/h3>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">The use of Deceptive on an IS can have several objectives:\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:360,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">\u00a0<\/span><b><span data-contrast=\"none\">Detect <\/span><\/b><span data-contrast=\"none\">an intrusion\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"none\">\u00a0Distract <\/span><\/b><span data-contrast=\"none\">the attacker\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"none\">\u00a0Analyze <\/span><\/b><span data-contrast=\"none\">the techniques used in the attack<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-22361 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/1-1.jpg\" alt=\"\" width=\"1040\" height=\"720\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/1-1.jpg 1040w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/1-1-276x191.jpg 276w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/1-1-56x39.jpg 56w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/1-1-768x532.jpg 768w\" sizes=\"auto, (max-width: 1040px) 100vw, 1040px\" \/><\/span><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">This technology can be used at different levels of maturity, depending on the <strong>needs identified<\/strong>.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">The<\/span><span data-contrast=\"none\"> technology can be used to meet many of the needs mentioned above, but the key is to determine our requirements for this technology in advance. If we restrict the need<\/span><span data-contrast=\"none\">s for<\/span> <span data-contrast=\"none\">detection, it should be noted that the configuration, deployment and maintenance of Deceptive will be far less complex than if we push the possibilities of this technology to the maximum (e.g. setting up complex scenarios to lure the attacker and strategic analysis of his actions).<\/span><\/p>\n<p>\u00a0<\/p>\n<h3 style=\"text-align: justify;\" aria-level=\"2\"><span data-contrast=\"none\">The benefits of Deceptive<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1418,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}\">\u00a0<\/span><\/h3>\n<h4 style=\"text-align: justify;\" aria-level=\"3\"><span data-contrast=\"none\">Why Deceptive\u202f?<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1418,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}\">\u00a0<\/span><\/h4>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">As discussed in the introduction, today&#8217;s cybersecurity challenges are fueled by the need to detect and react to growing attacks.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\"><strong>Deceptive does not replace existing standard cybersecurity solutions<\/strong>. <\/span><span data-contrast=\"none\">Being a <\/span><span data-contrast=\"none\">m<\/span><span data-contrast=\"none\">ore complex<\/span><span data-contrast=\"none\"> tool<\/span><span data-contrast=\"none\">, it acts as a <strong>complement<\/strong> to <strong>cover all types of attack<\/strong>, including the most sophisticated.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">This technology is <strong>not designed to prevent an attack<\/strong>, but to alert security teams, minimize the effect<\/span><span data-contrast=\"none\">s<\/span><span data-contrast=\"none\"> of the attack and observe the intruder&#8217;s modus operandi (&#8220;Detect, Distract &amp; Analyze&#8221;).<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h4 style=\"text-align: justify;\" aria-level=\"3\"><span data-contrast=\"none\">Honeypot VS Honeytoken<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1418,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}\">\u00a0<\/span><\/h4>\n<h5 style=\"text-align: justify;\" aria-level=\"4\"><i><span data-contrast=\"none\">Presentation of concepts<\/span><\/i><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h5>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">D<\/span><span data-contrast=\"none\">epending on the need<\/span><span data-contrast=\"none\">s<\/span><span data-contrast=\"none\"> and how they are to be used<\/span><span data-contrast=\"none\">, different type<\/span><span data-contrast=\"none\">s<\/span><span data-contrast=\"none\"> of decoys <\/span><span data-contrast=\"none\">exist<\/span><span data-contrast=\"none\">. <\/span><span data-contrast=\"none\">Whatever the case<\/span><span data-contrast=\"none\">, they take on the appearance of attributes that make up our Information System.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">The best-known decoys are <strong>&#8220;honeypots&#8221;.<\/strong> These are servers or workstations that imitate real machines on the network. There&#8217;s also what&#8217;s known as a &#8220;honeynet&#8221;: a network of servers.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">Another type of decoy is of growing <\/span><span data-contrast=\"none\">in popularity<\/span><span data-contrast=\"none\">. This is a decoy that hides directly on a system. These are generally represented by documents or other files whose role is to trigger an alert when someone comes to interact with them. Finally, we have <strong>&#8220;honeytokens&#8221;,<\/strong> which are data, information, often secrets or keys used to access a dummy resource on the IS (a honeypot, for example).<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h5 style=\"text-align: justify;\" aria-level=\"4\"><i><span data-contrast=\"none\">A fundamental difference<\/span><\/i><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h5>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">Traditionally, <\/span><b><span data-contrast=\"none\">honeypots<\/span><\/b> <span data-contrast=\"none\">enable <\/span><span data-contrast=\"none\">the <\/span><b><span data-contrast=\"none\">observation and understanding of <\/span><\/b><b><span data-contrast=\"none\">an <\/span><\/b><b><span data-contrast=\"none\">attacker&#8217;s actions<\/span><\/b><span data-contrast=\"none\">,<\/span><span data-contrast=\"none\"> as well as<\/span> <span data-contrast=\"none\">detecting an intrusion. The difficulty in this case is to configure a decoy that is attractive and credible enough for the <\/span><span data-contrast=\"none\">attacker to fall into the trap, without delivering information that could compromise a component of our real infrastructure.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">However, <\/span><b><span data-contrast=\"none\">honeytokens<\/span><\/b> <span data-contrast=\"none\">can be more complex and enable the creation of <\/span><span data-contrast=\"none\">a <\/span><b><span data-contrast=\"none\">finer and more credible decoy. <\/span><\/b><span data-contrast=\"none\">Without honeytokens, the probability of trapping an attacker is lower, and analysis results are not always reliable. The honeytoken&#8217;s dependence on its environment makes it <\/span><span data-contrast=\"none\">more<\/span><span data-contrast=\"none\"> attractive <\/span><span data-contrast=\"none\">in comparison to <\/span><span data-contrast=\"none\">a honeypot<\/span><span data-contrast=\"none\">, which represents no more than a trap with no possibility of subsequent escalation. For honeypots to be effective, we recommend deploying one or more complete honeynets,<\/span><span data-contrast=\"none\"> however it i<\/span><span data-contrast=\"none\">s important to consider the\u00a0<\/span><span data-contrast=\"none\">cost of such an infrastructure.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h4 style=\"text-align: justify;\" aria-level=\"3\"><span data-contrast=\"none\">Cloud technology development<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1418,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}\">\u00a0<\/span><\/h4>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">Today, the challenge for the most mature <\/span><b><span data-contrast=\"none\">Deceptive<\/span><\/b><span data-contrast=\"none\"> solution vendors is to develop specific services in the <\/span><b><span data-contrast=\"none\">Cloud<\/span><\/b><span data-contrast=\"none\">.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">Indeed, companies are increasingly using the Cloud to <\/span><b><span data-contrast=\"none\">extend their storage, deploy virtual machines<\/span><\/b><span data-contrast=\"none\">, containers and so on. <\/span><span data-contrast=\"none\">This provision of services is very popular and effective, but at the same time, the interest of cyber-attackers is growing. Templates, or default configurations, make life easier for businesses, but can increase cybersecurity risks. Even though many Cloud providers are making great strides in this area, default configurations don&#8217;t always comply with IT security guidelines.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">The Cloud is therefore a new playground for cyber-attackers. That&#8217;s why we&#8217;re focusing today on adapting our knowledge of Deceptive to <\/span><b><span data-contrast=\"none\">protect Cloud environments and services too<\/span><\/b><span data-contrast=\"none\">.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p>\u00a0<\/p>\n<h2 style=\"text-align: justify;\" aria-level=\"1\"><span data-contrast=\"none\">Overview of the main publishers on the market<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559738&quot;:240,&quot;335559739&quot;:360,&quot;335559740&quot;:259,&quot;335559991&quot;:567}\">\u00a0<\/span><\/h2>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">It&#8217;s important to note that <\/span><b><span data-contrast=\"none\">Deceptive<\/span><\/b><span data-contrast=\"none\"> is not reserved for overly complex applications. There are <\/span><b><span data-contrast=\"none\">all kinds of offers on the market<\/span><\/b><span data-contrast=\"none\">. Some <\/span><span data-contrast=\"none\">companies <\/span><span data-contrast=\"none\">offer services that enable you to obtain a complete <\/span><span data-contrast=\"none\">off-the-shelf<\/span><span data-contrast=\"none\"> tool<\/span><span data-contrast=\"none\">, while others focus on customization, lure quality and therefore the possibility of using their tool to create your own lures (configuration and maintenance not managed by the solution itself). <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">Here&#8217;s an overview of the main publishers and their solutions:\u00a0<\/span><span data-contrast=\"none\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-22363 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/2-1.jpg\" alt=\"\" width=\"1040\" height=\"720\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/2-1.jpg 1040w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/2-1-276x191.jpg 276w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/2-1-56x39.jpg 56w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/2-1-768x532.jpg 768w\" sizes=\"auto, (max-width: 1040px) 100vw, 1040px\" \/><\/span><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">For some, the current trend is to<\/span><b><span data-contrast=\"none\"> join forces with other tools <\/span><\/b><span data-contrast=\"none\">or integrate their solution with<\/span><span data-contrast=\"none\"> an<\/span> <b><span data-contrast=\"none\">EDR<\/span><\/b><span data-contrast=\"none\"> (Endpoint Detection and Response) to increase the effectiveness of the technology and meet market needs.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">As mentioned above, the challenge that some have chosen <\/span><span data-contrast=\"none\">to tackle <\/span><span data-contrast=\"none\">is to <\/span><b><span data-contrast=\"none\">adapt to a Cloud environment<\/span><\/b><span data-contrast=\"none\">. For example, solutions such as &#8220;<\/span><span data-contrast=\"none\">Attivo<\/span><span data-contrast=\"none\"> Networks&#8221;, acquired by <\/span><span data-contrast=\"none\">SentinelOne<\/span><span data-contrast=\"none\">, are developing Cloud AWS offers that propose the creation of decoys linked to the service (e.g.: EC2, S3, AWS access keys, etc.).\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p>\u00a0<\/p>\n<h2 style=\"text-align: justify;\" aria-level=\"1\"><span data-contrast=\"none\">How to build and place decoys?<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559738&quot;:240,&quot;335559739&quot;:360,&quot;335559740&quot;:259,&quot;335559991&quot;:567}\">\u00a0<\/span><\/h2>\n<h3 style=\"text-align: justify;\" aria-level=\"2\"><span data-contrast=\"none\">Deceptive <\/span><span data-contrast=\"none\">strategies<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1418,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}\">\u00a0<\/span><\/h3>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">Once you&#8217;ve familiarized yourself with this technology and all the possibilities it offers, it<\/span><span data-contrast=\"none\"> i<\/span><span data-contrast=\"none\">s worth asking <\/span><span data-contrast=\"none\">yourself the question, <\/span><span data-contrast=\"none\">what strategy or strategies you should adopt <\/span><span data-contrast=\"none\">with regard to<\/span><span data-contrast=\"none\"> the<\/span><b><span data-contrast=\"none\"> number of traps and\/or decoys to be implemented<\/span><\/b><span data-contrast=\"none\">, and <\/span><b><span data-contrast=\"none\">where<\/span><\/b><span data-contrast=\"none\"> they should be placed in the IS.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">To adapt to different use cases, 3 strategies stand out,<\/span><b><span data-contrast=\"none\"> responding to distinct needs<\/span><\/b><span data-contrast=\"none\">:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-22365 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/3-1.jpg\" alt=\"\" width=\"1040\" height=\"720\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/3-1.jpg 1040w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/3-1-276x191.jpg 276w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/3-1-56x39.jpg 56w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/3-1-768x532.jpg 768w\" sizes=\"auto, (max-width: 1040px) 100vw, 1040px\" \/><\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">Indeed, the Deceptive strategy to be adopted is often tailor-made <\/span><b><span data-contrast=\"none\">according to the IS infrastructure<\/span><\/b><span data-contrast=\"none\"> and, above all, <\/span><b><span data-contrast=\"none\">according to the priorities and objectives<\/span><\/b><span data-contrast=\"none\"> defined beforehand.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><i><span data-contrast=\"none\">By way of example: <\/span><\/i><i><span data-contrast=\"none\">if you need to enrich your detection technologies within your IS, it may be worthwhile to study the strategy of &#8220;mass deployment&#8221; of decoys. The aim is to create a phantom IS, thereby increasing the likelihood of the cybercriminal falling into a trap that will trigger an alert to the security teams.\u00a0<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p>\u00a0<\/p>\n<h3 style=\"text-align: justify;\" aria-level=\"2\"><span data-contrast=\"none\">PARCS<\/span><span data-contrast=\"none\"> matrix<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1418,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}\">\u00a0<\/span><\/h3>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">The challenge when talking about <\/span><b><span data-contrast=\"none\">Deceptive<\/span><\/b><span data-contrast=\"none\">, and more specifically about lures, is to answer the questions: What is a good lure? How do you create a good lure? Where to place it? How many to place? etc.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">The article &#8220;\u202f<\/span><a href=\"https:\/\/www.cesar-conference.org\/wp-content\/uploads\/2020\/12\/CESAR2020_070_A-TOURNYOL-du-CLOS_HoneyWISE_v3.pdf\"><span data-contrast=\"none\">HoneyWISE : strat\u00e9gie d\u2019exploitation d\u2019honeytokens en environnement Active Directory<\/span><\/a><span data-contrast=\"none\">\u202f&#8221;, written by Augustin TOURNYOL-DU-CLOS and Nathan FAEDDA, proposes a decoy strategy against certain attacks in a specific context: AD (Active Directory). We&#8217;ll also look at honeytokens in comparison with honeypots in the rest of this article.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">The objective<\/span><span data-contrast=\"none\"> of this study <\/span><span data-contrast=\"none\">was<\/span> <span data-contrast=\"none\">to <\/span><b><span data-contrast=\"none\">simply test the implementation of decoys<\/span><\/b><span data-contrast=\"none\"> within the AD and to <\/span><b><span data-contrast=\"none\">measure their effectiveness<\/span><\/b><span data-contrast=\"none\"> using the &#8220;<\/span><b><span data-contrast=\"none\">PARCS<\/span><\/b><span data-contrast=\"none\">&#8221; matrix.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><b><span data-contrast=\"none\">PARCS<\/span><\/b><span data-contrast=\"none\"> was<\/span><span data-contrast=\"none\"> born <\/span><span data-contrast=\"none\">on the basis of<\/span> <b><span data-contrast=\"none\">5 criteria<\/span><\/b><span data-contrast=\"none\">, originally conceived in the context of an AD environment but applicable to all environments:\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-22367 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/4-1.jpg\" alt=\"\" width=\"1040\" height=\"720\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/4-1.jpg 1040w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/4-1-276x191.jpg 276w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/4-1-56x39.jpg 56w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/4-1-768x532.jpg 768w\" sizes=\"auto, (max-width: 1040px) 100vw, 1040px\" \/><\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">When designing a decoy, it&#8217;s a good idea to prepare a <\/span><b><span data-contrast=\"none\">PARCS<\/span><\/b><span data-contrast=\"none\"> to <\/span><b><span data-contrast=\"none\">check your thinking<\/span><\/b><span data-contrast=\"none\"> and <\/span><span data-contrast=\"none\">en<\/span><span data-contrast=\"none\">sure that it matches your <\/span><b><span data-contrast=\"none\">expectations<\/span><\/b><span data-contrast=\"none\">. <\/span><span data-contrast=\"none\">It is also important <\/span><span data-contrast=\"none\">to take into consideration <\/span><span data-contrast=\"none\">minimum <\/span><b><span data-contrast=\"none\">requirements<\/span><\/b><span data-contrast=\"none\"> illustrated by these 5 criteria: Relevance, Risk, Credibility, Attractiveness and Scalability.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">The objective of this matrix is to determ<\/span><span data-contrast=\"none\">ine a balance between <\/span><span data-contrast=\"none\">importance and priority based on these criteria\u2019s <\/span><span data-contrast=\"none\">(Is the lure&#8217;s attractiveness important in my use case? Do I need a scalable solution? How scalable? etc.).\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p>\u00a0<\/p>\n<h3 style=\"text-align: justify;\" aria-level=\"3\"><span data-contrast=\"none\">Example of PARCS use: <\/span><span data-contrast=\"none\">Kerberoasting<\/span><span data-contrast=\"none\"> scenario &#8220;Stealing or falsifying Kerberos tickets&#8221;<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:852,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;335559991&quot;:851}\">\u00a0<\/span><\/h3>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">Perhaps the best way to illustrate the PARCS matrix presentation is with an example from the &#8220;\u202f<\/span><a href=\"https:\/\/www.cesar-conference.org\/wp-content\/uploads\/2020\/12\/CESAR2020_070_A-TOURNYOL-du-CLOS_HoneyWISE_v3.pdf\"><span data-contrast=\"none\">HoneyWISE<\/span><\/a><span data-contrast=\"none\">\u202f&#8221; article.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">The AD attack called <\/span><b><span data-contrast=\"none\">Kerberoasting<\/span><\/b><span data-contrast=\"none\"> is, &#8220;[&#8230;] in synthesis, the offline brute force (no logon failure) of a Kerberos ticket receiving the secret of a service account, without having to send a single packet to this service or even being the local administrator of the compromised workstation&#8221;.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">&#8220;<\/span><span data-contrast=\"none\">Kerberoasting<\/span><span data-contrast=\"none\"> [&#8230;]<\/span><b><span data-contrast=\"none\"> hijacks the native operation of Kerberos<\/span><\/b><span data-contrast=\"none\"> in order to carry out an attack. This hijacking takes place on steps 3 and 4 of the Kerberos authentication process, as shown in the following diagram&#8221;<\/span><span data-contrast=\"none\">:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-22340 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/5.jpg\" alt=\"\" width=\"442\" height=\"264\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/5.jpg 442w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/5-320x191.jpg 320w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/5-65x39.jpg 65w\" sizes=\"auto, (max-width: 442px) 100vw, 442px\" \/><\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">For this attack case, Augustin TOURNYOL-DU-CLOS and Nathan FAEDDA propose in their <\/span><a href=\"https:\/\/www.cesar-conference.org\/wp-content\/uploads\/2020\/12\/CESAR2020_070_A-TOURNYOL-du-CLOS_HoneyWISE_v3.pdf\"><span data-contrast=\"none\">article<\/span><\/a><span data-contrast=\"none\"> to deploy a honeytoken against <\/span><span data-contrast=\"none\">Kerberoasting<\/span><span data-contrast=\"none\"> (see part 2.3 &#8220;Description of detection scenarios&#8221; &#8211; scenario 2).\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">Here is the result, through PARCS, of the study of this type of honeytoken in the context of a <\/span><span data-contrast=\"none\">Kerberoasting<\/span><span data-contrast=\"none\"> scenario (16\/20):<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"none\">P<\/span><\/b><span data-contrast=\"none\">ertinence (efficiency): 4\/4<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">\u00ab\u202f<\/span><span data-contrast=\"none\"> The<\/span><span data-contrast=\"none\"> alerts generated by this honeytoken are reliable. In fact, as soon as a TGS ticket is requested to access an unused and non-existent service, it becomes clear that a malicious action is underway<\/span><span data-contrast=\"none\">.\u202f\u00bb<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:993,&quot;335559731&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"none\">A<\/span><\/b><span data-contrast=\"none\">ttractivit\u00e9 (attractiveness): 3\/4<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"none\">\u00ab\u202f<\/span><span data-contrast=\"none\"> The<\/span><span data-contrast=\"none\"> attractiveness of this token lies in the fact that carrying out the attack does not require any privileges, and can potentially gain privileges while being silent (generation of traffic deemed legitimate). Provided that the account chosen to lure the attacker appears privileged and managed by a user (so that the password is likely to be simple), this honeytoken is highly attractive.<\/span><span data-contrast=\"none\">\u202f\u00bb<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:993,&quot;335559731&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><b><span data-contrast=\"none\">R<\/span><\/b><span data-contrast=\"none\">isque\u202f(risk): 4\/4<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"6\" data-aria-level=\"1\"><span data-contrast=\"none\">\u00ab\u202f<\/span><span data-contrast=\"none\">In our example, a 64-character password has been defined, which cannot be broken in a reasonable time.<\/span><span data-contrast=\"none\">\u202f\u00bb<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:993,&quot;335559731&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"7\" data-aria-level=\"1\"><b><span data-contrast=\"none\">C<\/span><\/b><span data-contrast=\"none\">r\u00e9dibilit\u00e9\u202f(credibility): 3\/4<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"8\" data-aria-level=\"1\"><span data-contrast=\"none\">\u00ab\u202f<\/span><span data-contrast=\"none\"> Subject<\/span><span data-contrast=\"none\"> to the choice of account name and attributes according to the production context in which it is deployed, since the attack is based on normal Kerberos operation, it should come as no surprise that it can be carried out. <\/span><span data-contrast=\"none\">Credibility is therefore high.\u202f\u00bb<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:993,&quot;335559731&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"9\" data-aria-level=\"1\"><b><span data-contrast=\"none\">S<\/span><\/b><span data-contrast=\"none\">calabilit\u00e9\u202f(scalability): 2\/4<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"10\" data-aria-level=\"1\"><span data-contrast=\"none\">\u00ab\u202f<\/span><span data-contrast=\"none\"> The<\/span><span data-contrast=\"none\"> decoy account can be deployed automatically on several domains using scripts. However, for an effective lure, contextualization remains essential and will be the major obstacle to effective mass deployment. The cost of providing this contextualization and keeping it up to date must therefore be taken into <\/span><span data-contrast=\"none\">account. <\/span><span data-contrast=\"none\">\u202f\u00bb<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:993,&quot;335559731&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p style=\"text-align: justify;\" aria-level=\"1\"><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:567,&quot;335559738&quot;:240,&quot;335559739&quot;:360,&quot;335559740&quot;:259,&quot;335559991&quot;:567}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><b><span data-contrast=\"none\">To conclude, Deceptive Security<\/span><\/b><span data-contrast=\"none\"> solutions must be considered on a case-by-case basis. It is imperative to determine in advance the objectives to be prioritized, the strategy to be adopted, the scope to be covered, and so on.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">In certain situations, especially for companies with mature IT security systems, it may be appropriate to implement <\/span><b><span data-contrast=\"none\">Deceptive Security<\/span><\/b><span data-contrast=\"none\"> solutions. This is to be applied in addition to standard minimum security tools such as firewalls, antivirus, intrusion detection and\/or prevention systems, etc. The aim is to cover<\/span><b><span data-contrast=\"none\"> all types of cyberattack<\/span><\/b><span data-contrast=\"none\"> (&#8220;0-day&#8221; type, with no known pattern).\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">This technology can be difficult to implement for smaller companies, as they may not have the essential security tools in place by default, nor the resources to configure (e.g., design decoys, create strategies and scenarios) and maintain such a solution (e.g., dedicated maintenance teams).\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"none\">Today, the market is expanding, mainly <\/span><span data-contrast=\"none\">around<\/span><span data-contrast=\"none\"> detection thanks to Deceptive, but not exclusively. For the time being, however, vendors&#8217; interest in building deceptive solutions is focused on traditional environments. <\/span><span data-contrast=\"none\">Solutions for Cloud AWS, Azure, etc., are still underdeveloped.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p><em>Thanks to Augustin TOURNYOL DU CLOS for his contribution to this article.<\/em><\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:259,&quot;469777462&quot;:[360],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0 \u00a0 Today, cyber-attacks are part of our daily lives, and are becoming increasingly numerous and sophisticated.\u00a0\u00a0 Simultaneously, we are moving towards Information Systems built on an ever-increasing diversity of environments, thanks in particular to the Cloud, which is now&#8230;<\/p>\n","protected":false},"author":1292,"featured_media":22384,"comment_status":"open","ping_status":"closed","sticky":true,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3977],"tags":[3208,3129,4344],"coauthors":[2863,4341,4343,4342],"class_list":["post-22356","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-focus","tag-cloud-en","tag-deceptive-security-en","tag-decoy"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Deceptive Security: the solution for effective detection in the cloud? - your luring strategy.\u00a0 - RiskInsight<\/title>\n<meta name=\"description\" content=\"Today, cyber-attacks are part of our daily lives, and are becoming increasingly numerous and sophisticated.\u00a0\u00a0Simultaneously, we are moving towards Information Systems built on an ever-increasing diversity of environments, thanks in particular to the Cloud, which is now an integral part within corporate Information Systems. This enables corporation to expand their capabilities, however it also the surface area and risks of attack.\u00a0\u00a0Conventional intrusion detection and protection techniques already exist and are developing exponentially. These are effective against the most common attacks, however are not always adapted to the specificities of the Cloud.\u00a0\u00a0This raises questions about the use of proactive strategies, such as Deceptive Security, to stay one step ahead of attackers. Particularly in the context of Cyber-Resilience: how can this kind of technology be used in both a traditional and a cloud environment?\u00a0\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Deceptive Security: the solution for effective detection in the cloud? - your luring strategy.\u00a0 - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Today, cyber-attacks are part of our daily lives, and are becoming increasingly numerous and sophisticated.\u00a0\u00a0Simultaneously, we are moving towards Information Systems built on an ever-increasing diversity of environments, thanks in particular to the Cloud, which is now an integral part within corporate Information Systems. This enables corporation to expand their capabilities, however it also the surface area and risks of attack.\u00a0\u00a0Conventional intrusion detection and protection techniques already exist and are developing exponentially. These are effective against the most common attacks, however are not always adapted to the specificities of the Cloud.\u00a0\u00a0This raises questions about the use of proactive strategies, such as Deceptive Security, to stay one step ahead of attackers. Particularly in the context of Cyber-Resilience: how can this kind of technology be used in both a traditional and a cloud environment?\u00a0\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-30T17:22:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-30T17:22:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/couv-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1365\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Etienne Lafore, Pierre LALIN, Nathan FAEDDA, Charlotte SIROT\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Etienne Lafore, Pierre LALIN, Nathan FAEDDA, Charlotte SIROT\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy\/\"},\"author\":{\"name\":\"Etienne Lafore\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/00ee9607d2b8cd5205bfe63b482a2b14\"},\"headline\":\"Deceptive Security: the solution for effective detection in the cloud? &#8211; your luring strategy.\u00a0\",\"datePublished\":\"2024-01-30T17:22:22+00:00\",\"dateModified\":\"2024-01-30T17:22:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy\/\"},\"wordCount\":2085,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/couv1.png\",\"keywords\":[\"cloud\",\"Deceptive security\",\"decoy\"],\"articleSection\":[\"Focus\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy\/\",\"name\":\"Deceptive Security: the solution for effective detection in the cloud? - your luring strategy.\u00a0 - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/couv1.png\",\"datePublished\":\"2024-01-30T17:22:22+00:00\",\"dateModified\":\"2024-01-30T17:22:24+00:00\",\"description\":\"Today, cyber-attacks are part of our daily lives, and are becoming increasingly numerous and sophisticated.\u00a0\u00a0Simultaneously, we are moving towards Information Systems built on an ever-increasing diversity of environments, thanks in particular to the Cloud, which is now an integral part within corporate Information Systems. This enables corporation to expand their capabilities, however it also the surface area and risks of attack.\u00a0\u00a0Conventional intrusion detection and protection techniques already exist and are developing exponentially. These are effective against the most common attacks, however are not always adapted to the specificities of the Cloud.\u00a0\u00a0This raises questions about the use of proactive strategies, such as Deceptive Security, to stay one step ahead of attackers. Particularly in the context of Cyber-Resilience: how can this kind of technology be used in both a traditional and a cloud environment?\u00a0\u00a0\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/couv1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/couv1.png\",\"width\":1280,\"height\":853},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Deceptive Security: the solution for effective detection in the cloud? &#8211; your luring strategy.\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/00ee9607d2b8cd5205bfe63b482a2b14\",\"name\":\"Etienne Lafore\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/etienne-lafore\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Deceptive Security: the solution for effective detection in the cloud? - your luring strategy.\u00a0 - RiskInsight","description":"Today, cyber-attacks are part of our daily lives, and are becoming increasingly numerous and sophisticated.\u00a0\u00a0Simultaneously, we are moving towards Information Systems built on an ever-increasing diversity of environments, thanks in particular to the Cloud, which is now an integral part within corporate Information Systems. This enables corporation to expand their capabilities, however it also the surface area and risks of attack.\u00a0\u00a0Conventional intrusion detection and protection techniques already exist and are developing exponentially. These are effective against the most common attacks, however are not always adapted to the specificities of the Cloud.\u00a0\u00a0This raises questions about the use of proactive strategies, such as Deceptive Security, to stay one step ahead of attackers. Particularly in the context of Cyber-Resilience: how can this kind of technology be used in both a traditional and a cloud environment?\u00a0\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy\/","og_locale":"en_US","og_type":"article","og_title":"Deceptive Security: the solution for effective detection in the cloud? - your luring strategy.\u00a0 - RiskInsight","og_description":"Today, cyber-attacks are part of our daily lives, and are becoming increasingly numerous and sophisticated.\u00a0\u00a0Simultaneously, we are moving towards Information Systems built on an ever-increasing diversity of environments, thanks in particular to the Cloud, which is now an integral part within corporate Information Systems. This enables corporation to expand their capabilities, however it also the surface area and risks of attack.\u00a0\u00a0Conventional intrusion detection and protection techniques already exist and are developing exponentially. These are effective against the most common attacks, however are not always adapted to the specificities of the Cloud.\u00a0\u00a0This raises questions about the use of proactive strategies, such as Deceptive Security, to stay one step ahead of attackers. Particularly in the context of Cyber-Resilience: how can this kind of technology be used in both a traditional and a cloud environment?\u00a0\u00a0","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy\/","og_site_name":"RiskInsight","article_published_time":"2024-01-30T17:22:22+00:00","article_modified_time":"2024-01-30T17:22:24+00:00","og_image":[{"width":2048,"height":1365,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/couv-1.jpg","type":"image\/jpeg"}],"author":"Etienne Lafore, Pierre LALIN, Nathan FAEDDA, Charlotte SIROT","twitter_misc":{"Written by":"Etienne Lafore, Pierre LALIN, Nathan FAEDDA, Charlotte SIROT","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy\/"},"author":{"name":"Etienne Lafore","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/00ee9607d2b8cd5205bfe63b482a2b14"},"headline":"Deceptive Security: the solution for effective detection in the cloud? &#8211; your luring strategy.\u00a0","datePublished":"2024-01-30T17:22:22+00:00","dateModified":"2024-01-30T17:22:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy\/"},"wordCount":2085,"commentCount":0,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/couv1.png","keywords":["cloud","Deceptive security","decoy"],"articleSection":["Focus"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy\/","name":"Deceptive Security: the solution for effective detection in the cloud? - your luring strategy.\u00a0 - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/couv1.png","datePublished":"2024-01-30T17:22:22+00:00","dateModified":"2024-01-30T17:22:24+00:00","description":"Today, cyber-attacks are part of our daily lives, and are becoming increasingly numerous and sophisticated.\u00a0\u00a0Simultaneously, we are moving towards Information Systems built on an ever-increasing diversity of environments, thanks in particular to the Cloud, which is now an integral part within corporate Information Systems. This enables corporation to expand their capabilities, however it also the surface area and risks of attack.\u00a0\u00a0Conventional intrusion detection and protection techniques already exist and are developing exponentially. These are effective against the most common attacks, however are not always adapted to the specificities of the Cloud.\u00a0\u00a0This raises questions about the use of proactive strategies, such as Deceptive Security, to stay one step ahead of attackers. Particularly in the context of Cyber-Resilience: how can this kind of technology be used in both a traditional and a cloud environment?\u00a0\u00a0","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/couv1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/couv1.png","width":1280,"height":853},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/deceptive-security-the-solution-for-effective-detection-in-the-cloud-your-luring-strategy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Deceptive Security: the solution for effective detection in the cloud? &#8211; your luring strategy.\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/00ee9607d2b8cd5205bfe63b482a2b14","name":"Etienne Lafore","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/etienne-lafore\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/22356","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1292"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=22356"}],"version-history":[{"count":6,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/22356\/revisions"}],"predecessor-version":[{"id":22377,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/22356\/revisions\/22377"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/22384"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=22356"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=22356"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=22356"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=22356"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}