www.uptycs.com Open in urlscan Pro
2606:2c40::c73c:671e  Public Scan

URL: https://www.uptycs.com/blog/osquery-security-use-cases-and-solutions
Submission: On November 06 via api from US — Scanned from US

Form analysis 1 forms found in the DOM

POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/2617658/0492e7b1-c029-4110-8042-598f482d9802

<form id="hsForm_0492e7b1-c029-4110-8042-598f482d9802_3758" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
  action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/2617658/0492e7b1-c029-4110-8042-598f482d9802"
  class="hs-form-private hsForm_0492e7b1-c029-4110-8042-598f482d9802 hs-form-0492e7b1-c029-4110-8042-598f482d9802 hs-form-0492e7b1-c029-4110-8042-598f482d9802_5ff1902f-b7f1-427e-bdca-73e57cb04a28 hs-form stacked hs-custom-form"
  target="target_iframe_0492e7b1-c029-4110-8042-598f482d9802_3758" data-instance-id="5ff1902f-b7f1-427e-bdca-73e57cb04a28" data-form-id="0492e7b1-c029-4110-8042-598f482d9802" data-portal-id="2617658" data-hs-cf-bound="true">
  <div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-0492e7b1-c029-4110-8042-598f482d9802_3758" class="" placeholder="Enter your Work Email" for="email-0492e7b1-c029-4110-8042-598f482d9802_3758"><span>Work
        Email</span><span class="hs-form-required">*</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input id="email-0492e7b1-c029-4110-8042-598f482d9802_3758" name="email" required="" placeholder="email@work.com" type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
  </div>
  <div class="hs-dependent-field">
    <div class="hs_honeypot_queue hs-honeypot_queue hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-honeypot_queue-0492e7b1-c029-4110-8042-598f482d9802_3758" class="" placeholder="Enter your What color is the sky?"
        for="honeypot_queue-0492e7b1-c029-4110-8042-598f482d9802_3758"><span>What color is the sky?</span></label>
      <legend class="hs-field-desc" style="display: none;"></legend>
      <div class="input"><input name="honeypot_queue" class="hs-input" type="hidden" value=""></div>
    </div>
  </div>
  <div class="hs_submit hs-submit">
    <div class="hs-field-desc" style="display: none;"></div>
    <div class="actions"><input type="submit" class="hs-button primary large" value="Submit"></div>
  </div><input name="hs_context" type="hidden"
    value="{&quot;embedAtTimestamp&quot;:&quot;1699315080628&quot;,&quot;formDefinitionUpdatedAt&quot;:&quot;1689357225520&quot;,&quot;lang&quot;:&quot;en&quot;,&quot;userAgent&quot;:&quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.105 Safari/537.36&quot;,&quot;pageTitle&quot;:&quot;Protect Your Cloud-Native Applications with Osquery EDR Solutions&quot;,&quot;pageUrl&quot;:&quot;https://www.uptycs.com/blog/osquery-security-use-cases-and-solutions&quot;,&quot;pageId&quot;:&quot;11761744813&quot;,&quot;isHubSpotCmsGeneratedPage&quot;:true,&quot;canonicalUrl&quot;:&quot;https://www.uptycs.com/blog/osquery-security-use-cases-and-solutions&quot;,&quot;contentType&quot;:&quot;blog-post&quot;,&quot;hutk&quot;:&quot;c7831e4cb4b7cb2d3770696d73806b79&quot;,&quot;__hsfp&quot;:3081353101,&quot;__hssc&quot;:&quot;26386402.1.1699315081740&quot;,&quot;__hstc&quot;:&quot;26386402.c7831e4cb4b7cb2d3770696d73806b79.1699315081740.1699315081740.1699315081740.1&quot;,&quot;formTarget&quot;:&quot;#hs_form_target_form_235578626&quot;,&quot;formInstanceId&quot;:&quot;3758&quot;,&quot;rawInlineMessage&quot;:&quot;Thanks for submitting the form.&quot;,&quot;hsFormKey&quot;:&quot;6145cde2bbfe09751c710cad791a4c57&quot;,&quot;pageName&quot;:&quot;Protect Your Cloud-Native Applications with Osquery EDR Solutions&quot;,&quot;rumScriptExecuteTime&quot;:1667.8999996185303,&quot;rumTotalRequestTime&quot;:1806.3000001907349,&quot;rumTotalRenderTime&quot;:1856.6999998092651,&quot;rumServiceResponseTime&quot;:138.4000005722046,&quot;rumFormRenderTime&quot;:50.39999961853027,&quot;locale&quot;:&quot;en&quot;,&quot;timestamp&quot;:1699315081754,&quot;originalEmbedContext&quot;:{&quot;portalId&quot;:&quot;2617658&quot;,&quot;formId&quot;:&quot;0492e7b1-c029-4110-8042-598f482d9802&quot;,&quot;region&quot;:&quot;na1&quot;,&quot;target&quot;:&quot;#hs_form_target_form_235578626&quot;,&quot;isBuilder&quot;:false,&quot;isTestPage&quot;:false,&quot;isPreview&quot;:false,&quot;formInstanceId&quot;:&quot;3758&quot;,&quot;formsBaseUrl&quot;:&quot;/_hcms/forms&quot;,&quot;css&quot;:&quot;&quot;,&quot;inlineMessage&quot;:&quot;Thanks for submitting the form.&quot;,&quot;isMobileResponsive&quot;:true,&quot;rawInlineMessage&quot;:&quot;Thanks for submitting the form.&quot;,&quot;hsFormKey&quot;:&quot;6145cde2bbfe09751c710cad791a4c57&quot;,&quot;pageName&quot;:&quot;Protect Your Cloud-Native Applications with Osquery EDR Solutions&quot;,&quot;pageId&quot;:&quot;11761744813&quot;,&quot;contentType&quot;:&quot;blog-post&quot;,&quot;formData&quot;:{&quot;cssClass&quot;:&quot;hs-form stacked hs-custom-form&quot;},&quot;isCMSModuleEmbed&quot;:true},&quot;correlationId&quot;:&quot;5ff1902f-b7f1-427e-bdca-73e57cb04a28&quot;,&quot;renderedFieldsIds&quot;:[&quot;email&quot;,&quot;honeypot_queue&quot;],&quot;captchaStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;emailResubscribeStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;isInsideCrossOriginFrame&quot;:false,&quot;source&quot;:&quot;forms-embed-1.4100&quot;,&quot;sourceName&quot;:&quot;forms-embed&quot;,&quot;sourceVersion&quot;:&quot;1.4100&quot;,&quot;sourceVersionMajor&quot;:&quot;1&quot;,&quot;sourceVersionMinor&quot;:&quot;4100&quot;,&quot;allPageIds&quot;:{&quot;embedContextPageId&quot;:&quot;11761744813&quot;,&quot;analyticsPageId&quot;:&quot;11761744813&quot;,&quot;contentPageId&quot;:11761744813,&quot;contentAnalyticsPageId&quot;:&quot;11761744813&quot;},&quot;_debug_embedLogLines&quot;:[{&quot;clientTimestamp&quot;:1699315080680,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved customer callbacks used on embed context: [\&quot;getExtraMetaDataBeforeSubmit\&quot;]&quot;},{&quot;clientTimestamp&quot;:1699315080681,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved pageContext values which may be overriden by the embed context: {\&quot;pageTitle\&quot;:\&quot;Protect Your Cloud-Native Applications with Osquery EDR Solutions\&quot;,\&quot;pageUrl\&quot;:\&quot;https://www.uptycs.com/blog/osquery-security-use-cases-and-solutions\&quot;,\&quot;userAgent\&quot;:\&quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.105 Safari/537.36\&quot;,\&quot;pageId\&quot;:\&quot;11761744813\&quot;,\&quot;contentAnalyticsPageId\&quot;:\&quot;11761744813\&quot;,\&quot;contentPageId\&quot;:11761744813,\&quot;isHubSpotCmsGeneratedPage\&quot;:true}&quot;},{&quot;clientTimestamp&quot;:1699315080683,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved countryCode property from normalized embed definition response: \&quot;US\&quot;&quot;},{&quot;clientTimestamp&quot;:1699315081750,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved analytics values from API response which may be overriden by the embed context: {\&quot;hutk\&quot;:\&quot;c7831e4cb4b7cb2d3770696d73806b79\&quot;,\&quot;canonicalUrl\&quot;:\&quot;https://www.uptycs.com/blog/osquery-security-use-cases-and-solutions\&quot;,\&quot;contentType\&quot;:\&quot;blog-post\&quot;,\&quot;pageId\&quot;:\&quot;11761744813\&quot;}&quot;}]}"><iframe
    name="target_iframe_0492e7b1-c029-4110-8042-598f482d9802_3758" style="display: none;"></iframe>
</form>

Text Content

×

This website stores cookies on your computer. These cookies are used to collect
information about how you interact with our website and allow us to remember
you. We use this information in order to improve and customize your browsing
experience and for analytics and metrics about our visitors both on this website
and other media. To find out more about the cookies we use, see our Privacy
Policy

Accept


Tackle your most pressing Kubernetes, container security, and compliance
challenges. Meet with an Uptycs expert at KubeCon NA 2023. Meet with Us →

 * Why Uptycs?
 * Products Show submenu for Products
   
   CLOUD SECURITY
   
    * Overview - Why CNAPP
    * Workload Protection (CWPP)
    * Posture Management (CSPM)
    * Entitlement Management (CIEM)
    * Threat Detection and Response (CDR)
    * Container and K8s Security (KSPM)
   
   ENDPOINT SECURITY
   
    * Overview - Why XDR
    * Workspace and Workload Security
    * IBM Power, Linux on Z, LinuxONE, and AIX
    * Uptycs XDR vs. The Old Way

 * Solutions Show submenu for Solutions
   
   SOLUTIONS
   
    * Compliance
    * Vulnerability Management
    * Detection and Response
    * Threat Hunting
    * Forensic Investigation
    * Managed Services (MDR)
   
   ENVIRONMENTS
   
    * AWS
    * Azure
    * Google Cloud
    * IBM

 * Resources Show submenu for Resources
   
   RESOURCES
   
    * Resource Center
    * Customer Stories
    * Blog
    * Reviews
   
   COMMUNITY
   
    * Events
    * osquery Community
    * osquery: what is it
    * Cybersecurity Standup
   
   FEATURED
   
   KuppingerCole positions Uptycs a CSPM Technology Leader

 * Company Show submenu for Company
    * Overview
    * Partners
    * Press and News
    * Contact Us
   
    * Support
    * Training
    * Careers
    * Security Practices

 * Why Uptycs?
 * Products Show submenu for Products
   
   CLOUD SECURITY
   
    * Overview - Why CNAPP
    * Workload Protection (CWPP)
    * Posture Management (CSPM)
    * Entitlement Management (CIEM)
    * Threat Detection and Response (CDR)
    * Container and K8s Security (KSPM)
   
   ENDPOINT SECURITY
   
    * Overview - Why XDR
    * Workspace and Workload Security
    * IBM Power, Linux on Z, LinuxONE, and AIX
    * Uptycs XDR vs. The Old Way

 * Solutions Show submenu for Solutions
   
   SOLUTIONS
   
    * Compliance
    * Vulnerability Management
    * Detection and Response
    * Threat Hunting
    * Forensic Investigation
    * Managed Services (MDR)
   
   ENVIRONMENTS
   
    * AWS
    * Azure
    * Google Cloud
    * IBM

 * Resources Show submenu for Resources
   
   RESOURCES
   
    * Resource Center
    * Customer Stories
    * Blog
    * Reviews
   
   COMMUNITY
   
    * Events
    * osquery Community
    * osquery: what is it
    * Cybersecurity Standup
   
   FEATURED
   
   KuppingerCole positions Uptycs a CSPM Technology Leader

 * Company Show submenu for Company
    * Overview
    * Partners
    * Press and News
    * Contact Us
   
    * Support
    * Training
    * Careers
    * Security Practices

Request a demo


OSQUERY EDR: UNIVERSAL OPEN SOURCE ENTERPRISE SECURITY ANALYTICS AGENT

Tags: Osquery, System Architecture, Open Source, Cloud Security

GANESH PAI

August 06, 2019
Share:
 * 
 * 
 * 
 * 



Osquery has become a popular source of instrumentation for a wide variety of use
cases. On the GitHub security showcase, it is currently among the top most
popular open source security projects. Given the popularity, a recurring
question is what use cases can one address with osquery in an enterprise
environment?

In this blog, I’ll discuss:

 * Key attributes of osquery that make it an excellent universal agent of choice
   for collecting telemetry for multiple use cases
 * Considerations for operationalizing osquery and collecting high volume
   telemetry from an endpoint and aggregation at scale across many endpoints
 * Components of a solution for osquery-powered security analytics

 


OSQUERY: A UNIVERSAL OPEN SOURCE AGENT

Osquery is well-documented. In this blog, I’ll touch on a few key attributes of
osquery that make it a pragmatic universal open source agent. As you explore
osquery further and understand the depth and breadth of the collected data, you
will realize the possible use cases are limited only by your imagination.

 * Osquery interfaces with the kernel (e.g., openbsm, kaudit, etw) to capture
   kernel behavioral activity/events (e.g., processes launched, socket
   connections, file changes). This is done via event tables. The events and
   attributes provide a reliable source of telemetry for detecting intrusion and
   malicious behavior on an endpoint. These tables lay a sound foundation for
   Osquery-based EDR and FIM solutions.
 * Osquery can scrape point-in-time OS state via scheduled queries. The queries
   can be scheduled to run as snapshot or differential (i.e., only changes are
   sent with differential for greater efficiency). The results of scheduled
   queries provide a reliable source of telemetry for software asset inventory
   and OS configured state inventory. These set of features and tables provide a
   foundation for Osquery-based Asset Inventory and Vuln Detection.
 * Over a remote TLS connection or via the CLI, one can ask live/ad-hoc queries.
   These interfaces lay a sound foundation for incident investigation and for
   debug and diagnostics. These capabilities along with the rich set of tables
   lay the foundation for Osquery-based Incident Investigation.
 * Using parsing lens (e.g., augeas), one can parse various configuration files.
   These advanced capabilities provide a flexible and reliable source of data
   for auditing and implementing benchmarks such as CIS. They can also provide
   rich data for implementing supporting controls for compliance standards such
   as PCI, SOC2, and FedRAMP. This flexible telemetry provides a solid basis for
   data and evidence collection for Osquery-based Compliance.
 * Using the thrift extension mechanism, one can write extensions using C++,
   Python, Node, and Go. The extension mechanism provides a quick basis to add
   new capabilities to the deployment using scripting (e.g., Python).

 


OPERATIONALIZING OSQUERY: ENDPOINT LOG CONSIDERATIONS

In any reasonably sized osquery deployment, no matter your end goal or use case,
you will need a mechanism to deploy osquery at some scale and manage a fleet of
osquery agents. There are many fleet management solutions and I’ll not cover
that topic here. Rather I’ll cover some of the key considerations of
configuration-related options on the endpoint and highlight the implications of
result logs. Osquery is very flexible and has many configuration options. Very
specifically, we’ll list some topics and delve a bit more into data collection
implications.

Osquery configuration management entails:

 * Configuring of flags and options
 * Configuring cert+secret for TLS-based remote control
 * Scheduling queries
 * Configure event tables and FIM
 * Log destinations

A popular but challenging (for scaling) approach in dealing with osquery
telemetry is log forwarding. An alternate approach is to simply use HTTP/TLS for
everything. At Uptycs we specialize our solution around HTTP/TLS and we’ve built
our Endpoint Detection Network (EDN) to scale out osquery deployments.

 

Here are a few things to consider if you are planning to write to local disk/log
file for log forwarding (e.g., to Splunk or ELK):

 * Depending on how many events (activity/load on the machine) and scheduled
   queries, osquery can generate significant volume of telemetry that can result
   in significant resource utilization on the endpoint.
 * On the endpoint you will have to forward the logs reliably to a backend.
 * If you use snapshot mode and capture with high frequency, it will be
   prohibitively expense (CPU, storage and bandwidth), and if the frequency is
   low, you will miss events/data.
 * If you use differential mode, reconstructing timeline-based state in a
   backend such as splunk or ELK is a significant challenge that you need to
   consider. The differential data received by the backend is structured with
   add/remove markers relative to an epoch. Thus the backend needs state
   reconstruction logic based on discrete point-in-time events. Due to this
   challenge, many may revert to snapshot and that mode is expensive and
   inefficient.

 


OSQUERY-POWERED SECURITY ANALYTICS

As summarized earlier, osquery is extremely capable and can be used as a
universal agent for many uses cases including:

 * Intrusion/Malicious activity detection (EDR)
 * File Integrity Monitoring
 * Incident Investigation
 * Vulnerability Detection
 * Audit and Compliance

In all of the above, osquery is a valuable part of a solution that provides
structured telemetry. To complete the solution, you will need:

 * A mechanism to manage a fleet of osquery universal agents
 * Ability to aggregate osquery telemetry securely and collect it at scale
   across many agents
 * A backend or data lake with streaming and historical analytics to solve the
   broad set of security use cases

In this blog I focused on osquery use cases. Of critical importance for
enterprise-grade osquery deployments are considerations of scale. I’ll cover
that topic in my next blog post.

 

Learn more about osquery:

 * Osquery: What it is, how it works, and how to use it



STAY IN THE LOOP

Get regular updates on all things Uptycs—
from product updates to expert articles and much more

Work Email*

What color is the sky?



FOLLOW US

 * 
 * 
 * 
 * 

WHY UPTYCS?



PRODUCTS

CLOUD SECURITY

 * Overview
 * Workload Protection (CWPP)
 * Posture Management (CSPM)
 * Entitlement Management (CIEM)
 * Threat Detection and Response (CDR)
 * Container and K8s Security (KSPM)

ENDPOINT SECURITY

 * Overview
 * Workspace and Workload Security
 * IBM Power, Linux on Z, LinuxONE, and AIX
 * Uptycs XDR vs. The Old Way

SOLUTIONS

CAPABILITIES

 * Compliance
 * Asset Management
 * Vulnerability Management
 * Detection and Response
 * Threat Hunting
 * Forensic Investigation
 * Managed Services (MDR)

PLATFORMS

 * AWS
 * Azure
 * Google Cloud
 * IBM

RESOURCES

RESOURCE CENTER

 * Resource Center
 * Customer Stories
 * Blog

COMMUNITY

 * Events
 * osquery Community
 * osquery: what is it
 * Cybersecurity Standup

COMPANY

 * Overview
 * Partners
 * Press and News
 * Contact Us
 * Support
 * Training
 * Careers
 * Security Practices
 * Terms of Service


© 2023 Uptycs. All rights reserved.
 * Privacy Policy
 * Security Practices
 * Contact Us

Also of Interest
 * Streamlined Security Control with FIM Solutions
 * Osquery Optimization Techniques
 * Osquery Impact on Fragmented Security Market