Overview
Incydr monitors file activity that takes place in both personal and corporate cloud storage accounts. When file activity is detected, Incydr applies its trusted activity model to those events. This article explains how Incydr applies defined or inferred trust to file events in cloud storage to identify and prioritize untrusted activity.
Trusted cloud file activity
Users can interact with files in cloud services by:
- Uploading files to a cloud service either from a browser or a desktop sync app.
- Changing sharing permissions to share files with other users in corporate cloud storage drives.
- Emailing attachments through cloud-based email services.
- Downloading reports from Salesforce environments.
Incydr determines whether file activity generated by these methods is trusted using either defined or inferred trust. Because identifying trust depends on the method used to interact with the cloud storage service, each method requires a different configuration.
Files uploaded to cloud services
Users can upload files to the cloud using either a browser (when checking files into a source code repository or adding files to a cloud storage drive) or a desktop sync app (such as the Slack desktop application or any desktop sync app that syncs local and cloud files). Incydr determines whether these uploads are trusted using both defined and inferred trust.
- Many cloud services have well-defined structures that allow personal activity to be easily differentiated from corporate use. For example:
- Source code repositories contain unique structures in URLs that categorize projects, branches, and products.
- Jira or OneDrive corporate tools use unique URL addresses to identify corporate sites.
- Slack provides unique workspace names for organizations, clubs, and social groups.
- Google Drive currently does not provide the information needed to differentiate uploads to personal drives from those to corporate locations. Thus, Incydr uses inferred trust to determine when a file has been uploaded from a monitored endpoint to a monitored corporate drive to identify it as trusted.
| Browser activity | Desktop sync activity | |
|---|---|---|
| Example trusted action |
|
File synced to a drive via the Google Drive for desktop (formerly Google Drive File Stream) |
| Type of trust applied | Defined | |
| Metadata evaluated for trust | Tab URL, Tab title | Domain, Sync username |
| Configuration needed |
|
Set up trusted domains. |
Defined trust can only be established when the cloud service easily differentiates between personal and corporate accounts by using unique structures or paths in the URL.
The following list describes whether common cloud service vendors provide unique URLs:
- OneDrive: Yes
- Box: Yes, only if you configure a custom URL (which is not required)
- Dropbox: No
- Google Drive: No
Files shared in corporate cloud storage
Corporate cloud storage services like Box, Google Drive, and OneDrive allow users to share files with other collaborators using tools available in the browser after logging in. File sharing permissions changes can only be detected by Incydr's data connections.
| Sharing activity | |
|---|---|
| Example trusted action | File in a corporate Box, Google Drive, or Microsoft OneDrive is shared with internal coworkers |
| Type of trust applied | Defined |
| Metadata evaluated for trust | Email domains of Shared with recipients |
| Configuration needed | Connect Incydr to the vendor environment in Data Connections |
Attachments sent through cloud-based email services
A common exfiltration vector is email: users can simply send sensitive attachments to a personal email address, or inadvertently to other untrusted recipients. Incydr determines whether this activity is trusted using defined trust.
| Email activity | |
|---|---|
| Example trusted action |
|
| Type of trust applied | Defined |
| Metadata evaluated for trust | Email domains |
| Configuration needed |
Set up trusted domains If your organization uses Gmail or Office 365 email, connect Incydr to those environments in Data Connections |
Reports downloaded from Salesforce
Business services like Salesforce house your vital business data in databases and reporting tools. By monitoring this environment directly, Incydr can identify when reports containing critical business data have been downloaded to an unmonitored device. Without this level of monitoring, you might not know that a report had been downloaded to a personal computer or mobile device at all.
| Salesforce report downloads | |
|---|---|
| Example trusted action | Report in Salesforce is downloaded to an endpoint that is monitored by Incydr |
| Type of trust applied | Inferred |
| Metadata evaluated for trust | Incydr username |
| Configuration needed |
|
Considerations
- Incydr evaluates events for exact matches of your trusted activity values, although wildcards are allowed for more flexibility. Use caution with leading and trailing wildcards as you can inadvertently trust unintended destinations.
- Files downloaded into a folder syncing with a cloud service are automatically categorized as trusted activity because the file is not being exfiltrated from the device.
- Inferred trust uses an authorized data connection and the Incydr agent installed on an employee's endpoint. If a user is in scope for monitoring by the data connector but does not have an endpoint that is monitored by Incydr (or vice versa), corresponding file events cannot be matched, resulting in events falsely being flagged as untrusted.
- Matching cloud activity with corresponding endpoint activity to determine inferred trust can take up to one hour.
- Delayed detection of corresponding file events can cause Incydr to flag sharing in corporate cloud services as untrusted. This can happen if the vendor has throttled the Incydr data connection's API requests or if the employee's endpoint is offline or powered down immediately following the activity.
- Some vendors are better than others at using separate domains for personal versus corporate cloud storage.
- Use defined trust when you can easily differentiate personal accounts from corporate accounts. Vendors that require unique corporate domains include:
- Microsoft OneDrive
- Box, if you configure a custom subdomain for your corporate environment (which is not required or enabled by default)
- Connect Incydr to the corporate cloud storage environment in Data Connections to use inferred trust when you cannot easily differentiate personal accounts from corporate accounts. Inferred trust works well for these vendors:
- Google Drive, which does not provide unique URLs or useful tab title information to clearly identify personal accounts
- Box, if you have not configured a custom subdomain for your corporate environment
- Microsoft OneDrive, as a failsafe and backup in case defined trust cannot be determined or if trusted activity is not configured.
- Use defined trust when you can easily differentiate personal accounts from corporate accounts. Vendors that require unique corporate domains include:
Comments
0 comments
Please sign in to leave a comment.