Home / Stream/ Securing/Cribl.Cloud Security Practices

Cribl.Cloud Security Practices

The Cribl.Cloud security architecture is designed to provide a secure and reliable platform for customers. The figure below is a simplified overview of the Cribl Cloud security architecture. The actual implementation involves additional components and processes.

Cribl.Cloud security architecture
Cribl.Cloud security architecture

Key Security Architecture Components

  • Cribl Build: This section represents the initial phase where code is built, scanned for vulnerabilities, and deployed to the Cribl Cloud infrastructure.
  • Cribl.Cloud (Cribl Control Plane): The core Cribl.Cloud infrastructure managed by Cribl, where customer data and applications reside. Cribl enforces isolation per tenant within the Cribl.Cloud environment.
  • Cribl Scanning Infrastructure: Cribl.Cloud safeguards your data through a multi-layered monitoring and detection infrastructure.
  • Security Control Plane: The centralized management and enforcement layer in the Cribl Cloud environment that monitors security policies, configurations, and actions and integrates various security tools and services for incident reporting.
  • Cribl Security: The Security Team, responsible for managing the infrastructure and providing security services.

Data Flow

Data flows from the Build phase to the Cribl.Cloud infrastructure, where it is processed and analyzed by Cribl’s security control plane. The Cribl Security team also proactively manages the infrastructure and implements additional security controls to protect customer data. Alerts and notifications are sent to the Cribl Security team.

Security Controls

Cribl.Cloud prioritizes data security with a comprehensive set of controls that safeguard data at rest, in transit, and during processing. These controls encompass the following.

Secure Development

Cribl.Cloud prioritizes secure development through:

  • Application Security Testing (AST): Regular code and dependency scans for vulnerabilities during the build process and nightly for Cribl Cloud deployments.
  • Image Hardening: Images are built with security best practices in mind to minimize potential risks.

Continuous Monitoring and Detection

Cribl.Cloud employes a robust monitoring and detection infrastructure to identify and address potential threats:

  • Runtime Sensor: Continuously monitors system activity for anomalies and triggers alerts.
  • Cloud Event Logs: Captures detailed logs from cloud providers, including API calls, resource modifications, and system events. Advanced machine learning analyzes these logs to proactively detect unusual patterns indicative of security threats. Vulnerability Scanning: Regular scans identify vulnerabilities within the infrastructure.
  • File Integrity Monitoring: Monitors file integrity to detect unauthorized changes.
  • Malware Detection: Continuously detects and analyzes potential malware attacks.
  • End of Life Technologies Detection: Identifies and addresses outdated technologies to mitigate security risks.
  • Sensitive Data Identification: Proactively identifies and protects sensitive data within the platform.

Cribl Security Control Plane

The Cribl Security Control Plane empowers users with a centralized platform for comprehensive security management:

  • Software Bill of Materials (SBOM): Provides a detailed inventory of all software components used within the environment.
  • Asset Inventory: Tracks and manages all assets within the Cribl.Cloud environment.
  • Security Misconfiguration Detection and Remediation: Identifies and addresses security misconfigurations to strengthen the overall security posture.
  • Threat Detection and Response: Proactively detects and responds to potential security threats.
  • Threat Intelligence Integration: Leverages threat intelligence feeds to stay informed about the latest threats and vulnerabilities.
  • Alerting: Sends timely alerts to security teams for prompt investigation and response.
  • Security Policy Enforcement: Enforces pre-defined security policies to maintain a secure environment.
  • Cloud Events Integration: Integrates with cloud events for enhanced security monitoring and improved threat detection capabilities.

Cribl.Cloud/Customer Responsibilities

This matrix outlines the shared responsibilities between Cribl.Cloud and the customer for various aspects of the Cribl platform.

Responsibility AreaCribl.CloudCustomer
Infrastructure & Network ManagementManage all configurations and network connections in the dataplane to manage Cribl product suiteManage customer-managed network devices and infrastructure (Hybrid).
Data Flow ManagementManage data flow from Sources to Cribl.Cloud and Cribl.Coud to DestinationsManage data flow configurations and software settings
Security ManagementImplement infrastructure security, audit, and compliance (Cribl.Cloud environment)Implement  security for customer-managed infrastructure (Hybrid).
Compliance Cribl is SOC 2 and ISO 27001 compliantImplement secure data management practices (data locality, transport, disposal)
Service InfrastructureSet up default key management and certificate upgradesConfigure Data Flow on Workers (Pipelines & Routes) (in Cribl.Cloud & Hybrid)
User Access ManagementProvide authentication mechanisms for customersProvision and assign user roles and permissions
Service Upgrades & MaintenanceOrchestrate service upgrades, patch, and maintenance for Cribl.CloudOrchestrate service upgrades, patch, and maintenance for customer-managed infrastructure (Hybrid).
Monitoring & Incident ResponseImplement continuous monitoring and incident response on Cribl. Cloud assetsImplement monitoring and incident response on integration assets not hosted by Cribl Cloud
ComplianceMaintain compliance certifications and attestations for Cribl.CloudComply with relevant security standards and regulations
Cribl.Cloud Service LifecycleDevelop software application to be deployed to Cribl.Cloud instancesSign up for Cribl.Cloud and initial set up
Network Access ControlManage inbound and outbound firewall rules (Cribl.Cloud can open ports based on customer action)Manage inbound and outbound firewall rules

Keep in mind the following:

  • Customers are responsible for enforcing secure communication over secure channels using Cribl software.
  • Customers are responsible for restricting application-level access controls within Cribl.
  • Customers are responsible for configuring integration accounts using least privilege access

Cribl.Cloud Benefits

Cribl Cloud is committed to providing a secure and reliable platform for our customers. We prioritize data privacy and security by implementing robust measures to protect your sensitive information at every stage.

Cribl Cloud offers a comprehensive security posture built on several key pillars:

  • Robust Security Posture:

    • Configuration and vulnerability management to proactively identify and address potential weaknesses.
    • Endpoint security to safeguard your data at its source.
    • Incident response plans to minimize the impact of security breaches.
    • Threat intelligence to stay ahead of evolving threats.
  • Comprehensive Data Protection:

    • Limited metadata collection to ensure only essential data is analyzed.
    • Robust encryption techniques to protect data at rest and in transit.
    • Strict access controls to limit access to sensitive information.
  • Proactive Threat Management:

    • Continuous infrastructure monitoring for potential threats and vulnerabilities.
    • Advanced threat detection tools for prompt identification of security incidents.
    • 24/7 managed security operations center for real-time response and mitigation.
  • Industry-Leading Compliance:

    • Adherence to industry standards and regulations, including SOC 2, to ensure the security and privacy of your data.

By prioritizing security and data privacy, Cribl.Cloud provides a trusted platform for your data processing and analytics needs.