When cloud logs fall short, the network tells the truth


Key takeaways

  • Cloud migrations often create blind spots, making real-time visibility essential for cyber defense

  • Network-layer telemetry can overcome cloud log inconsistencies

  • Following steps for monitoring and operationalizing visibility can improve defense

  • This article was inspired by a Corelight DefeNDRs podcast. Listen here.

The illusion of cloud simplicity

“Don’t worry about security, the cloud has you covered!”

Cloud migration was often promised with security that would “take care of itself.”

In practice, dynamic infrastructure, overlapping APIs, container sprawl, and multi‑cloud architectures have created new blind spots and attack surfaces for security teams to protect.

As common attacks now also evade EDR tools, defenders are revisiting a familiar lesson: cloud defense, like network defense, requires traffic visibility.

The analyst advantage and the data normalization challenge

Standardizing cloud-native logs can be complicated because each provider uses different fields and structures.

“Our cloud research team understands how the sheer volume of API calls and the constant addition of new services across cloud providers make log standardization and analysis a real challenge,” says Vince Stoffer, field CTO at Corelight.

This fragmentation underscores the importance of network telemetry—the common denominator that remains consistent across providers and environments. 

Fortunately, most cybersecurity analysts are already familiar with looking at network data, so when cloud telemetry is expressed similarly, they can quickly spot odd or suspicious patterns. Add cloud inventory context (i.e., accounts, projects, VPC/VNet, and cluster/pod labels), and together, this creates a common, provider-agnostic signal for detection and investigation.

This is where network detection and response (NDR) shines. It delivers consistent, real-time visibility across multi- and hybrid- clouds and normalizes telemetry between environments.  

Trusted to defend the world’s most sensitive networks, Corelight’s Network Detection & Response (NDR) platform combines deep visibility with advanced behavioral and anomaly detections to help your SOC protect your cloud environments.

Start protecting your cloud today

Detecting adversary patterns in dynamic cloud environments

As cloud deployments grow more dynamic and complex, security fundamentals don’t change. Even short-lived workloads still talk in steady patterns and use predictable ports. Dependable signals defenders can watch out for include: 

  • Adversaries communicating externally to exfiltrate data or maintain C2 over unusual ports or network protocols

  • Deviations in production containers and managed services, which are typically immutable and consistent after deployment

  • Adversaries with admin access disabling host-based sensors and container runtime monitoring sensors

  • Unusual signs of enumeration or discovery activity between systems or services that may indicate adversaries mapping resources 

By using traffic mirroring and virtual taps, network-level telemetry collection is largely tamper-resistant and offers visibility independent of host integrity. Combining network data with endpoint data, and container runtime data for process‑level context can fill the gaps in cloud-native security and improve detection accuracy in dynamic cloud environments. So, what types of threats are visible in monitored cloud network traffic?

  • Supply‑chain compromises: Malicious container images and packages that drop cryptominers beaconing to pools

  • Infostealer‑led intrusions: Stolen credentials or session tokens enabling console/API access

  • Interactive admin tooling in containers: SSH, RDP, or VNC in immutable production environments is often suspicious, especially between containers

  • Misuse of managed services and data egress: Connections to new regions, unfamiliar APIs, or sudden spikes against outbound volume can signal attack

  • Coinminers communicating with mining pools: Coinminers abuse compromised cloud resources to mine cryptocurrency

If you accept that network monitoring is key to cloud security, the next question is “What should you monitor?”

  • East-west and north-south traffic: intra-cloud communications (service-to-service, node-to-node) and internet ingress/egress

  • Container traffic (Kubernetes) identifying deviations after application deployment

  • TLS metadata (SNI, certificate subjects) to reveal managed service endpoints and support service‑aware baselines

  • DNS Data to identify communications with malicious domains and network tunneling

  • Flow logs for breadth and traffic mirroring/pcap for depth

The next step is to build an effective workflow:

  • Start by turning on flow logs and traffic mirroring, and note their latency and fidelity so you know what each source can and can’t tell you. 

  • Pull cloud network telemetry into a single platform, standardize it, and enrich it with cloud inventory and tags so context travels with the data.

  • Establish and tune baselines by role, service, port, and known external peers. Begin with your most critical services, then iterate to cut noise without losing true drift signals. Alert on new destinations, ports, or protocols

  • Monitor egress tightly. Cover your choke points by instrumenting VPC/VNet egress. Add node-level viewpoints in your container platforms  to look for newly observed domains or IPs and atypical destinations, periodic beaconing and low‑and‑slow transfers, and time‑of‑day or volume spikes

  • Profile managed‑service access via TLS metadata; alert on first‑seen APIs, endpoints, or regions per workload.

  • Hunt for miner footprints: connections to known pools and characteristic protocols

  • Flag interactive protocols in containers (SSH/RDP/VNC) and lateral movement patterns within clusters

  • Correlate endpoint compromises: if a user device is breached, pivot to cloud egress for matching infrastructure and behaviors

And keep yourself honest with continuous validation—emulate adversaries to confirm you can detect infostealers, cryptomining, C2, and suspicious admin behavior.

Multi-cloud security is more than achievable when you apply timeless network principles to modern architectures.

As attackers lean on AI and slip past trusted controls, network visibility isn’t optional— it’s the foundation for understanding your environment and catching threats before anomalies become incidents, on the ground or in the cloud.

This article was inspired by a conversation between Richard Bejtlich, Corelight’s strategist and author in residence, and David Burkett, Corelight’s cloud security researcher, on Corelight’s DefeNDR podcast series. Subscribe or listen to the episode here.

To learn how Corelight’s Open NDR Platform unifies cloud and network evidence for fast, effective detection and response, explore more at Corelight.com/elitedefense

Sponsored and written by Corelight.



Source link