ask ada icon

Ask Ada

BETA

Gen-AI Based
Cloud Security

Inline Remediation as opposed to Post Attack Mitigation

Why is Post-Attack Mitigation flawed?

  • Post-exploit Mitigation works by killing the suspicious process in response to an alert indicating malicious intent.
  • Quoting Grsecurity, “post-exploitation detection/mitigation is at the mercy of an exploit writer putting little to no effort into avoiding tripping these detection mechanisms.” [reference]
  • Post-Exploit Mitigation provides false sense of security.

Post Exploit Mitigation is a bad strategy for the following reasons

  • Attacker already has gained grounds
  • Attacker can disable defenses before the mitigation can kick in
  • Review this blog from grsecurity instantiating what can happen
  • Reducing the attack surface is the best policy

AccuKnox Zero Trust Security: Multi-layered Defense with Proactive Prevention from Zero Day Attacks

An essential aspect of Zero Trust security is to have multi-layered defense to make it impossible to penetrate in the event of a breach

At Run-time, it’s imperative that the enforcement approach should be proactive and not reactive i.e. to mitigate attack vectors when it’s executed not “after” it has executed.

At AccuKnox we believe in in-line mitigation is true security and are second to none with our ability to prevent Zero-Day attacks!!

Unique and Differentiated approach at Runtime Security to protect mission critical workloads

  • Observe and Auto-detect Application Behavior
  • Generate Granular policies to Whitelist (allow specific and deny all) based on App Behavior
    • Files accessed by the app
    • Process executed by the app
    • Process that are making network connections by the app

AccuKnox Runtime Security Comparison (vs) Others

AccuKnox Runtime Security (vs) Others

Open Source Enterprise
Brand X Brand Y Brand Z
Design Approach Zero Trust Enforcement + Observability Observability + Add-on Enforcement Observability + Add-on Enforcement Observability + Add-on Enforcement
Enforcement Method Inline Mitigation Any LSM Post-execution Stop container Post-execution Kill Proc from user space Post-execution Kill Proc from kernel space
Reliability Stable. Only stops malicious actions. App keeps working. ⚠️ Potential service impact ⚠️ Potential service impact ⚠️ Potential service impact
Policy Creation Auto-discovered policies Auto-discovered policies ? manual rules

Conclusion

  • Proactively reduces attack surface
    • Implements least permissive security posture by design rather than an after thought
    • Using discovery-engine for workload behaviors analysis
    • Inline mitigation: KubeArmor Policy enforcement using LSMs
    • High Stability: KubeArmor uses safe, granular policy actions such that service is not impacted
    • Automated Security Policy Updates:
    • Ensuring that security posture is inline with application updates
    • Shift left mode where changes in runtime security posture is determined in dev/staging environment

Furthermore it is based on robust, proven opensource technologies like eBPF, LSM (Linux Security Modules) and does not rely on proprietary modification to runC libraries, inefficient use of Iptables, etc.

In summary, AccuKnox and its companion OpenSource project, KubeArmor delivers in-line mitigation and consequently Zero Trust run-time Security by design a opposed to “best efforts” run-time security. Since run-time security is the last line of defense it is imperative that it is effective and efficient and not “good enough”.