Security Graphs on AWS
Build a security graph with Amazon Neptune to efficiently manage the security of your IT infrastructure
What is a security graph?
Why use a graph for your organization's security?
Modern security profiles take a layered security approach. No individual layer stops all threats, but together they mitigate a wide variety of threats and provide redundancy should any layer fail. It is important to realize that these layers are often loosely coupled and individually managed. By storing this information in a graph, the relationships between those layers can be modeled and analyzed to provide a holistic view of the security profile and to find gaps across the layers.
Bad actors plan their schemes in form of a graph. They need to understand what infrastructure they can utilize that will have pathways to the system or data they target, what identities they can compromise that will give them access to that infrastructure, and what telemetry or monitoring they need to circumvent. To protect your organization’s resources, you can model them as a graph representing how they are connected to each other and the users. This makes it easy to discover valuable insights, such as over extended permissions leading to resources vulnerability. If a resource is compromised, you can query your graph to find out the attack surface and where security may be compromised through the installation of backdoors or other malware.
Why use a graph database to store your security graph?
Using a relational database for your security graph is challenging because relational databases are built for storing and analyzing tabular data. They are inefficient at storing and querying the relationships between highly interconnected entities such as network resources and access patterns where you need to explore and visualize connections and groups within the data. Using a relational database and SQL to query relationships can result in multiple complex joins and longer processing times that may lead to missed opportunitites in indentifying security risks.
Security Graph Use Cases
Cloud Security Posture Management (CSPM)
Data Flow/Exfiltration Prevention
Identity and Access Management
Digital Forensics
Using Amazon Neptune for Security Graphs
You can build your security graph solution using Amazon Neptune, a fast, reliable, fully managed graph database service that makes it easy to build and run applications with highly connected data.
Amazon Neptune is purpose-built for storing billions of relationships and querying the graph with milliseconds latency. Neptune is compatible with open graph APIs, and supports popular graph models Property Graph and W3C's RDF, and their respective query languages Apache TinkerPop Gremlin, openCypher, and SPARQL. While graph databases usually require extensive hardware management, provisioning, and manual scaling, Neptune is a fully managed service, so you no longer have to worry about database management tasks. You can be up and running with Neptune clusters in a matter of minutes, with a few clicks in the AWS Management Console or API calls.
With Neptune, you can query relationships in your data to easily uncover insights in your data such as users with access to resources or how your infrastructure is connected. Neptune provides a fully managed service to execute fast graph queries to be able to detect unwanted access or exposed resources in real time and helps you manage the security of your IT infrastructure. You can also use Neptune’s native integration with Amazon OpenSearch Service or export your graph data to analytics and security tools such as Splunk to search for insights in your data and discover security events.
Benefits of Amazon Neptune for security graphs
High scalability and availability
Cost-effective customer data platforms
Highly Secure
Using relationships as 'First-class citizens'
Getting started
Get started with Amazon Neptune, a fully managed graph database
Graph your AWS resources with Amazon Neptune
In the post below, we walk through an example released for Neptune’s integration with Altimeter. Altimeter is an open-source project (MIT License) from Tableau Software, LLC that scans AWS resources and links these resources into a graph. You can store, query, and visualize the data in Neptune. You can query the graph to examine the AWS resources and their relationships in an account. For example, you can query for resources or pathways that expose a cluster with a public IP address to check for security and compliance.
JupiterOne

Wiz
