<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: David</title>
    <description>The latest articles on Forem by David (@dave-d-gee).</description>
    <link>https://forem.com/dave-d-gee</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3808763%2Fc91892cc-596c-4feb-a393-5e584f4c38c7.png</url>
      <title>Forem: David</title>
      <link>https://forem.com/dave-d-gee</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/dave-d-gee"/>
    <language>en</language>
    <item>
      <title>Cloud Security Incident Response: Detecting and Containing a Brute-Force Attack with Microsoft Sentinel</title>
      <dc:creator>David</dc:creator>
      <pubDate>Sun, 08 Mar 2026 12:39:06 +0000</pubDate>
      <link>https://forem.com/dave-d-gee/cloud-security-incident-response-detecting-and-containing-a-brute-force-attack-with-microsoft-3gdc</link>
      <guid>https://forem.com/dave-d-gee/cloud-security-incident-response-detecting-and-containing-a-brute-force-attack-with-microsoft-3gdc</guid>
      <description>&lt;p&gt;Recently, I documented a real-world cloud security investigation where I used &lt;strong&gt;Microsoft Sentinel&lt;/strong&gt; to detect and contain a potential ransomware attack before full system compromise.&lt;/p&gt;

&lt;p&gt;In this case study, I walk through the &lt;strong&gt;end-to-end incident response process&lt;/strong&gt;, including:&lt;/p&gt;

&lt;p&gt;🔎 Detecting brute-force authentication attempts&lt;br&gt;
📊 Investigating suspicious identity activity using &lt;strong&gt;KQL queries&lt;/strong&gt;&lt;br&gt;
🧠 Mapping attacker behaviour to the &lt;strong&gt;MITRE ATT&amp;amp;CK framework&lt;/strong&gt;&lt;br&gt;
⚡ Rapid containment of compromised accounts&lt;br&gt;
📉 Reducing Mean Time To Detect (MTTD) to ~30 minutes and containing the threat within ~2.5 hours&lt;/p&gt;

&lt;p&gt;The goal of this write-up was to demonstrate how &lt;strong&gt;modern cloud SIEM platforms like Microsoft Sentinel can enable proactive threat detection and rapid response in Azure environments.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Cyber threats targeting cloud identities are increasing rapidly, and having &lt;strong&gt;strong monitoring, alerting, and threat-hunting capabilities&lt;/strong&gt; is essential for security teams.&lt;/p&gt;

&lt;p&gt;I hope this breakdown helps other &lt;strong&gt;SOC analysts, cloud engineers, and security professionals&lt;/strong&gt; improve their investigation workflows.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Canonical URL:
https://medium.com/@davidud2016/how-i-handled-a-cloud-security-incident-end-to-end-using-microsoft-sentinel-5ed4a301e3ea
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Happy to discuss investigation techniques, KQL queries, or Sentinel workflows with anyone working in **cloud security and incident response.&lt;/p&gt;

</description>
      <category>ai</category>
      <category>security</category>
      <category>career</category>
      <category>architecture</category>
    </item>
    <item>
      <title>From Compliance to Cyber Resilience — A Practical Security Shift</title>
      <dc:creator>David</dc:creator>
      <pubDate>Fri, 06 Mar 2026 11:57:07 +0000</pubDate>
      <link>https://forem.com/dave-d-gee/from-compliance-to-cyber-resilience-a-practical-security-shift-3n8n</link>
      <guid>https://forem.com/dave-d-gee/from-compliance-to-cyber-resilience-a-practical-security-shift-3n8n</guid>
      <description>&lt;p&gt;[(&lt;a href="https://medium.com/@davidud2016/from-compliance-to-cyber-resilience-514e48a5bd6f)" rel="noopener noreferrer"&gt;https://medium.com/@davidud2016/from-compliance-to-cyber-resilience-514e48a5bd6f)&lt;/a&gt;]&lt;/p&gt;

&lt;p&gt;TL;DR&lt;/p&gt;

&lt;p&gt;Compliance ≠ Security&lt;/p&gt;

&lt;p&gt;Resilience = Risk-based + Adaptive controls&lt;/p&gt;

&lt;p&gt;Automation bridges detection and response&lt;/p&gt;

&lt;p&gt;Monitoring must be continuous and meaningful&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Compliance Limitations&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Compliance frameworks such as ISO 27001, NIST CSF, CIS Controls, and regulatory standards play an important role in establishing baseline security practices. They ensure that organisations implement fundamental safeguards such as access controls, logging, encryption, and governance processes.&lt;/p&gt;

&lt;p&gt;However, compliance has several limitations when it comes to defending against modern cyber threats.&lt;/p&gt;

&lt;p&gt;Static vs Dynamic Threat Landscape&lt;/p&gt;

&lt;p&gt;Compliance frameworks are typically reviewed annually or periodically, while cyber threats evolve daily. Attackers constantly modify techniques, exploit new vulnerabilities, and adapt to defensive controls.&lt;/p&gt;

&lt;p&gt;For example:&lt;/p&gt;

&lt;p&gt;A control requiring multi-factor authentication may pass compliance checks, but attackers may still bypass it through phishing-based session hijacking or MFA fatigue attacks.&lt;/p&gt;

&lt;p&gt;Security policies may exist on paper but fail during real-world incidents due to a lack of operational integration.&lt;/p&gt;

&lt;p&gt;Checklist Mentality&lt;/p&gt;

&lt;p&gt;Compliance-driven security often leads to a checkbox approach where the objective becomes passing audits rather than strengthening the real security posture.&lt;/p&gt;

&lt;p&gt;Typical symptoms include:&lt;/p&gt;

&lt;p&gt;Controls implemented purely for audit evidence&lt;/p&gt;

&lt;p&gt;Limited operational monitoring of controls&lt;/p&gt;

&lt;p&gt;Security documentation that does not reflect real system behaviour&lt;/p&gt;

&lt;p&gt;Lack of Continuous Assurance&lt;/p&gt;

&lt;p&gt;Compliance assessments are snapshot evaluations, not continuous measurements. This creates blind spots between audits where security posture may degrade.&lt;/p&gt;

&lt;p&gt;Cyber resilience requires continuous validation, not periodic confirmation.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Risk Prioritisation Framework&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;One of the biggest weaknesses of compliance-driven security is the tendency to treat all controls equally. In reality, not all risks carry the same probability or business impact.&lt;/p&gt;

&lt;p&gt;A resilient security strategy prioritises threats based on risk exposure.&lt;/p&gt;

&lt;p&gt;Core Risk Calculation Model&lt;/p&gt;

&lt;p&gt;A practical way to prioritise threats is through risk scoring.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Risk Score = Likelihood × Impact × Exploitability&lt;br&gt;
&lt;/code&gt;&lt;br&gt;
Where:&lt;/p&gt;

&lt;p&gt;Likelihood represents the probability of the threat occurring&lt;/p&gt;

&lt;p&gt;Impact measures potential business damage&lt;/p&gt;

&lt;p&gt;Exploitability reflects how easy it is for attackers to leverage the vulnerability&lt;/p&gt;

&lt;p&gt;Example Risk-Based Decision Logic&lt;/p&gt;

&lt;p&gt;&lt;code&gt;if risk_score &amp;gt; threshold:&lt;br&gt;
    initiate_investigation()&lt;br&gt;
    trigger_response_playbook()&lt;br&gt;
&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;This approach helps security teams:&lt;/p&gt;

&lt;p&gt;Focus on high-impact threats first&lt;/p&gt;

&lt;p&gt;Reduce alert fatigue&lt;/p&gt;

&lt;p&gt;Allocate resources efficiently&lt;/p&gt;

&lt;p&gt;Align security priorities with business risk tolerance&lt;/p&gt;

&lt;p&gt;Risk Context Enrichment&lt;/p&gt;

&lt;p&gt;Modern risk prioritisation also incorporates contextual intelligence, including:&lt;/p&gt;

&lt;p&gt;Asset criticality&lt;/p&gt;

&lt;p&gt;User privilege level&lt;/p&gt;

&lt;p&gt;Threat intelligence indicators&lt;/p&gt;

&lt;p&gt;Historical attack patterns&lt;/p&gt;

&lt;p&gt;This ensures alerts are evaluated within the broader operational context, not just technical signals.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Adaptive Controls and Automation&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Traditional security controls are often static: firewalls block predefined ports, policies enforce fixed rules, and alerts require manual investigation.&lt;/p&gt;

&lt;p&gt;Adaptive security introduces dynamic controls that respond to threat signals automatically.&lt;/p&gt;

&lt;p&gt;Examples of Adaptive Controls&lt;/p&gt;

&lt;p&gt;includes:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Conditional access policies triggered by risky login behaviour&lt;/li&gt;
&lt;li&gt;Endpoint isolation when malware activity is detected&lt;/li&gt;
&lt;li&gt;Automatic credential revocation following suspicious access patterns&lt;/li&gt;
&lt;li&gt;Network segmentation triggered by anomalous traffic patterns&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These controls enable organisations to respond in seconds rather than hours.&lt;/p&gt;

&lt;p&gt;Automation in Security Operations which is criticalfor scaling security operations in large environments.&lt;/p&gt;

&lt;p&gt;Use cases include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Automated threat enrichment&lt;/li&gt;
&lt;li&gt;Incident triage workflows&lt;/li&gt;
&lt;li&gt;Response playbooks for common attack patterns&lt;/li&gt;
&lt;li&gt;Integration between SIEM, SOAR, and endpoint protection platforms&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Automation reduces the workload on analysts while ensuring consistent and rapid response.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Continuous Monitoring&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Cyber resilience depends heavily on continuous visibility into systems and activity.&lt;/p&gt;

&lt;p&gt;Rather than relying on periodic security checks, organisations must implement monitoring systems capable of detecting threats in real time.&lt;/p&gt;

&lt;p&gt;Key Monitoring Approaches&lt;br&gt;
Pattern-Based Detection&lt;/p&gt;

&lt;p&gt;Pattern-based detection identifies known malicious behaviour using predefined rules or signatures.&lt;/p&gt;

&lt;p&gt;Examples include:&lt;/p&gt;

&lt;p&gt;. Repeated failed authentication attempts&lt;br&gt;
. Suspicious IP address activity&lt;br&gt;
. Known malware hash detection&lt;/p&gt;

&lt;p&gt;While useful, pattern-based detection alone cannot detect unknown attack techniques&lt;/p&gt;

&lt;p&gt;Behavioural Baseline Modelling focuses on identifying deviations from normal system behaviour.&lt;/p&gt;

&lt;p&gt;For example:&lt;/p&gt;

&lt;p&gt;A user logging in from an unusual geographic location, and A service account accessing systems outside its normal scope&lt;/p&gt;

&lt;p&gt;Sudden spikes in database queries&lt;/p&gt;

&lt;p&gt;Machine learning models are increasingly used to detect these anomalies.&lt;/p&gt;

&lt;p&gt;Security Dashboards and Observability&lt;/p&gt;

&lt;p&gt;Security dashboards consolidate signals from multiple systems including:&lt;/p&gt;

&lt;p&gt;Identity providers&lt;/p&gt;

&lt;p&gt;Cloud infrastructure logs&lt;/p&gt;

&lt;p&gt;Endpoint telemetry&lt;/p&gt;

&lt;p&gt;Network monitoring tools&lt;/p&gt;

&lt;p&gt;SOC teams can visualise the security posture in real time, enabling faster investigation and response.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Incident Readiness and Learning Loops&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Cyber resilience does not mean preventing every attack — it means responding effectively and improving continuously.&lt;/p&gt;

&lt;p&gt;Incident readiness ensures that organisations can contain and recover from incidents quickly.&lt;/p&gt;

&lt;p&gt;Core Components of Incident Readiness&lt;/p&gt;

&lt;p&gt;A mature incident response capability includes:&lt;/p&gt;

&lt;p&gt;Defined incident response playbooks&lt;/p&gt;

&lt;p&gt;Clearly assigned roles and responsibilities&lt;/p&gt;

&lt;p&gt;Escalation procedures&lt;/p&gt;

&lt;p&gt;Communication plans for stakeholders&lt;/p&gt;

&lt;p&gt;Regular incident simulation exercises (such as tabletop scenarios or red-team exercises) help ensure teams are prepared.&lt;/p&gt;

&lt;p&gt;Post-Incident Learning&lt;/p&gt;

&lt;p&gt;One of the most valuable aspects of cyber resilience is learning from incidents.&lt;/p&gt;

&lt;p&gt;Every incident should lead to improvements such as:&lt;/p&gt;

&lt;p&gt;Updated detection rules&lt;/p&gt;

&lt;p&gt;Improved response workflows&lt;/p&gt;

&lt;p&gt;Additional monitoring capabilities&lt;/p&gt;

&lt;p&gt;Security architecture adjustments&lt;/p&gt;

&lt;p&gt;This creates a continuous learning loop, strengthening the organisation’s security posture over time.&lt;/p&gt;

&lt;p&gt;Closing Insight&lt;/p&gt;

&lt;p&gt;Moving from compliance-driven security to cyber resilience is not simply a change in tools — it is a fundamental shift in mindset.&lt;/p&gt;

&lt;p&gt;Compliance answers the question:&lt;/p&gt;

&lt;p&gt;“Do we meet the required controls?”&lt;/p&gt;

&lt;p&gt;Cyber resilience answers a more important question:&lt;/p&gt;

&lt;p&gt;“Can we detect, respond to, and recover from real-world attacks?”&lt;/p&gt;

&lt;p&gt;Organisations that adopt resilience-focused strategies build security programs that adapt to evolving threats while maintaining operational continuity.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Risk Score = Likelihood × Impact × Exploitability
If Risk Score &amp;gt; Threshold → Trigger investigative workflow
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



</description>
      <category>ai</category>
      <category>webdev</category>
      <category>programming</category>
      <category>productivity</category>
    </item>
  </channel>
</rss>
