When cloud logs fall short, the network tells the truth

When cloud logs fall short, the network tells the truth

Cloud Security’s Dirty Secret: The “Set It and Forget It” Myth Just Blew Up in Our Faces

Look, I’ve been in this game long enough to smell a tech industry fairy tale when I see one. Remember when cloud migration was sold as the ultimate security panacea? “Just move to the cloud and let AWS/Azure/Google handle all that pesky security stuff.” Yeah, about that…

The reality is brutal: dynamic infrastructure, overlapping APIs, container sprawl, and multi-cloud architectures have created a perfect storm of blind spots that would make even the most seasoned security pro break into a cold sweat.

The Network Visibility Wake-Up Call

Here’s what nobody tells you about cloud security: when attackers start bypassing your fancy EDR tools (and trust me, they are), you’re going to find yourself desperately wishing you had better network visibility.

Vince Stoffer, Field CTO at Corelight, nails it: “Our cloud research team understands how the sheer volume of API calls and the constant addition of new services across cloud providers make log standardization and analysis a real challenge.”

Translation? Every cloud provider speaks a different language, and your security team is stuck playing UN interpreter during a crisis.

Why Network Telemetry Is Your Secret Weapon

The beauty of network telemetry is that it’s the universal translator of the cloud world. While AWS might call it one thing and Azure another, network traffic patterns remain consistent across the board.

Most cybersecurity analysts already speak “network data” fluently. When cloud telemetry speaks the same language, they can spot suspicious patterns faster than you can say “data breach.”

This is where Network Detection and Response (NDR) becomes your new best friend. It delivers consistent, real-time visibility across multi- and hybrid-clouds, normalizing telemetry between environments like a boss.

The Adversary Patterns You Need to Know

As cloud deployments get more complex, the threats evolve but the fundamentals stay the same. Even those fancy short-lived workloads still follow predictable patterns. Here’s what to watch for:

External communications for data exfiltration – Attackers love to maintain command-and-control over unusual ports and protocols

Deviations in production containers – Those immutable, consistent workloads suddenly acting weird? Red flag

Disabled host-based sensors – When adversaries with admin access start turning off your monitoring tools, you’ve got problems

Enumeration and discovery activity – Attackers mapping your resources like they’re planning a heist

The Threats Hiding in Your Cloud Traffic

Using traffic mirroring and virtual taps, network-level telemetry collection is largely tamper-resistant and offers visibility independent of host integrity. Combine this with endpoint data and container runtime data, and you’ve got a comprehensive security picture.

The threats you’ll see include:

Supply chain compromises – Malicious container images and packages dropping cryptominers that beacon to pools

Infostealer-led intrusions – Stolen credentials or session tokens enabling console/API access

Interactive admin tooling in containers – SSH, RDP, or VNC in immutable production environments? Suspicious AF

Misuse of managed services and data egress – Connections to new regions, unfamiliar APIs, or sudden outbound volume spikes

Coinminers communicating with mining pools – Attackers abusing your cloud resources to mine cryptocurrency

What to Monitor (and How to Do It Right)

If you’re convinced that network monitoring is key to cloud security (and you should be), here’s your monitoring checklist:

East-west and north-south traffic – Intra-cloud communications and internet ingress/egress

Container traffic (Kubernetes) – Identifying deviations after application deployment

TLS metadata – SNI, certificate subjects to reveal managed service endpoints

DNS Data – Identifying communications with malicious domains and network tunneling

Flow logs and traffic mirroring/pcap – For breadth and depth

Building Your Cloud Security Workflow

Here’s your step-by-step guide to cloud security that actually works:

Start with flow logs and traffic mirroring – Understand their latency and fidelity so you know what each source can and can’t tell you.

Pull cloud network telemetry into a single platform – Standardize it and enrich it with cloud inventory and tags so context travels with the data.

Establish and tune baselines – By role, service, port, and known external peers. Alert on new destinations, ports, or protocols.

Monitor egress tightly – Instrument VPC/VNet egress and add node-level viewpoints to look for newly observed domains or IPs.

Profile managed-service access via TLS metadata – Alert on first-seen APIs, endpoints, or regions per workload.

Hunt for miner footprints – Connections to known pools and characteristic protocols.

Flag interactive protocols in containers – SSH/RDP/VNC and lateral movement patterns within clusters.

Correlate endpoint compromises – If a user device is breached, pivot to cloud egress for matching infrastructure and behaviors.

Continuous validation – Emulate adversaries to confirm you can detect infostealers, cryptomining, C2, and suspicious admin behavior.

The Bottom Line

Multi-cloud security isn’t just achievable—it’s essential. As attackers lean on AI and slip past trusted controls, network visibility isn’t optional. It’s the foundation for understanding your environment and catching threats before anomalies become incidents, on the ground or in the cloud.

This article was inspired by a conversation between Richard Bejtlich, Corelight’s strategist and author in residence, and David Burkett, Corelight’s cloud security researcher, on Corelight’s DefeNDR podcast series.

To learn how Corelight’s Open NDR Platform unifies cloud and network evidence for fast, effective detection and response, explore more at Corelight.com/elitedefense


Tags & Viral Phrases:

  • Cloud security reality check
  • Network visibility is non-negotiable
  • Multi-cloud security made simple
  • Stop trusting, start verifying
  • The cloud security myth exposed
  • Network telemetry saves the day
  • EDR bypass protection
  • Container security fundamentals
  • Supply chain compromise prevention
  • Cryptomining detection in the cloud
  • Cloud migration security pitfalls
  • Network detection and response (NDR)
  • Cloud security workflow optimization
  • Real-time cloud threat detection
  • Cloud security fundamentals that work
  • Stop the data exfiltration madness
  • Cloud security that actually protects
  • The network visibility wake-up call
  • Cloud security doesn’t have to suck
  • Network telemetry: your cloud security secret weapon

,

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *