www.lacework.com
Open in
urlscan Pro
141.193.213.21
Public Scan
URL:
https://www.lacework.com/blog/how-to-get-a-handle-on-the-log4j-issue-in-your-environment/
Submission: On December 30 via manual from IN — Scanned from DE
Submission: On December 30 via manual from IN — Scanned from DE
Form analysis
3 forms found in the DOMGET https://www.lacework.com/
<form method="get" id="searchform" action="https://www.lacework.com/" role="search">
<label aria-label="Search" for="s"></label>
<div class="input-group">
<input class="field form-control" id="s" name="s" type="text" placeholder="Search …" value="">
<span class="input-group-btn">
<button class="submit btn btn-primary waves-effect waves-light" id="searchsubmit" name="submit" type="submit" value="Search"><span>Search</span></button>
</span>
</div>
</form>
GET https://www.lacework.com/
<form method="get" id="searchform" action="https://www.lacework.com/" role="search" class=" waves-effect waves-light">
<label aria-label="Search" for="s"></label>
<div class="input-group">
<input class="field form-control" id="s" name="s" type="text" placeholder="Search …" value="">
<span class="input-group-btn">
<button class="submit btn btn-primary waves-effect waves-light" id="searchsubmit" name="submit" type="submit" value="Search"><span>Search</span></button>
</span>
</div>
</form>
GET https://www.lacework.com/
<form method="get" id="searchform" action="https://www.lacework.com/" role="search">
<label aria-label="Search" for="s"></label>
<div class="input-group">
<input class="field form-control" id="s" name="s" type="text" placeholder="Search …" value="">
<span class="input-group-btn">
<button class="submit btn btn-primary waves-effect waves-light" id="searchsubmit" name="submit" type="submit" value="Search"><span>Search</span></button>
</span>
</div>
</form>
Text Content
Latest on critical Apache Log4j vulnerability Read More > Skip to content * * * * EN * USA (ENGLISH) * FRENCH (FRANÇAIS) * GERMAN (DEUTSCH) * PLATFORM * SOLUTIONS * PARTNERS * CUSTOMERS * COMPANY * CAREERS * CONTACT US * BLOG * PRESS RELEASES * Search MENU MENUMENU * EN * USA (ENGLISH) * FRENCH (FRANÇAIS) * GERMAN (DEUTSCH) * 888-292-5027 * Login * Support * Blog * CONTACT US Search MENUMENU * PLATFORM * * * CAPABILITIES Multicloud Security Cloud Compliance Container Security Cloud Workload Protection * * ENVIRONMENTS AWS Cloud Security Azure Cloud Security Google Cloud Security Kubernetes Security * SOLUTIONS * * * FEATURES Behavioral Anomaly Detection File Integrity Monitoring Host Intrusion Detection Host Vulnerability Monitoring Bringing together the power of Lacework and New Relic Supercharge your SecOps with Lacework and Snowflake * * USE CASES Cloud Security Automation for the Enterprise Mergers and Acquisitions SIEM Optimization Tool Consolidation Threat Detection and Response Runtime Threat Defense Buildtime Configuration and Threat Defense Cloud Security Cost Savings Calculator * * USER ROLES Audit and Compliance DevSecOps Engineering/DevOps FinTech HealthTech Security Solutions * PARTNERS * CUSTOMERS * RESOURCES * COMPANY * About Us * Awards * Careers * Contact Us * Events * In the News * Investors * Legal * Lacework Academy * Lacework Labs * Press Releases * Trust Lacework Cloud Care Whether you’re a Lacework customer or not, we’re here to help with our free Cloud Care, a Log4j rescue program. Get access to: * Free 14-Day Cloud Threat Hunting Assessment * Complimentary Coverage Booster for Customers * 24/7 Rescue Hotline support at 888-599-9519 Free 14-Day Cloud Threat Hunting Assessment Home > Blog > How To Get a Handle on the Log4j Issue in Your Environment HOW TO GET A HANDLE ON THE LOG4J ISSUE IN YOUR ENVIRONMENT Dec 15, 2021 by Mark Nunnikhoven - Distinguished Cloud Strategist Editor’s Note: Log4j is an unfolding situation that we are closely monitoring. We will be updating our blog on a regular basis so check back for updates. The vulnerability with the Log4j logging library has been keeping IT teams up at night since late last week. We know when a zero day event occurs like this it creates understandable panic and we’re here to help. Naturally when an issue like this comes up, your sole focus should be on responding to the issue. You need to reduce the risk to your organization as quickly as possible. To that end, here’s a cheat sheet to help you plan that work and to help make sure that nothing has fallen through the cracks. WHAT IS LOG4J? Log4j is an open source library for applications written in Java. It helps developers record what’s happening in their applications. These recorded logs help make sure that things are working smoothly and they provide critical information when things aren’t going as planned. WHERE IS LOG4J USED? Log4j has been around for years and is currently in its second major version. This library is so popular in the Java community that it is basically the standard for logging. This means that it’s used in most applications that are written in Java. The problem is that most users are unaware and don’t need to be aware of what language their applications were written in.That’s why you’re seeing reports from various services and vendors about updates being required. Log4j is part of the plumbing that runs most Java applications. WHAT HAPPENED? On Thursday, 09-Dec-2021, the team of volunteers behind Log4j announced a serious vulnerability in the library. There are two CVE (common vulnerabilities and exposures) identifiers assigned to this issue, CVE-2021-44228 and CVE-2021-45046. This vulnerability had the two things that we never want to see in a security issue, let alone see in the same security issues because it’s easy to take advantage of and gives attackers the ability to run their code on your systems. Officially, the severity of this issue is rated 10 out of 10. “That’s not good” is a massive understatement. In simple terms, this means it’s worth stopping normal operational and security work and addressing this issue immediately. WHAT DO I NEED TO DO? Responding to incidents like this is always a challenge. Because log4j is part of the plumbing of some applications, getting a handle on the scope of your exposure is very difficult. Here’s the general process you’ll should be following; 1. Monitor production for exploit attempts 2. Look for all installations of log4j in your environment 3. Prioritize that list of affected systems 4. Working through that list, either turn off the affected feature or upgrade to the latest log4j version While that list seems straightforward, it presents a number of challenges. A number of researchers and vendors in the community have reported widespread attacks related to this issue. Making matters worse, attackers are using a number of different techniques. This means you’re not looking for one but several different types of attacks on your network. This post from Lacework Labs highlights some of the techniques we’ve already seen in the wild. Cybercriminals know they have a window of opportunity here as teams rush to mitigate the issue. That means that you and your teams have to balance fixing the problem while monitoring production for active attacks. This is a really hard balance to strike, but it’s a critical one. You don’t want to close one gap just as attackers gain a foothold through another. In production, you should be focusing your efforts on looking for anomalies in your activity data. That will help spot the new techniques as they are deployed by cybercriminals. In the end, security controls will only buy you so much time to fix the root cause, the version of log4j in use. Finding the vulnerable systems is the biggest hurdle. You can’t fix what you don’t know about. Vendors with affected products will be notifying customers. That will happen either through direct contact or their blogs so make sure to check in with your vendors to understand how to mitigate the issue for those products. The community has also published several scanners to help determine if specific systems are affected that might help you out. If you’re thinking, “This is a lot of manual effort.” You are correct. Sometimes there’s no way around it. Each set of systems is going to need to be checked for vulnerable applications and a specific plan made to address each occurrence detected. Once you know the scope of the work, it’s time to walk through the dependencies in your network. Some systems will be simple fixes. You can turn off the impacted feature of log4j or quickly patch while others will require coordination between teams and testing of the remediation plan. Hopefully you’ll get to the point where you have a grasp of what needs to be done. The next step is to order that work to reduce the risk to your organization as quickly as possible. High value systems should be done first, working your way through the long tail of the list. It would be nice if there was a faster way, but there isn’t. The key thing is to remember the ease with which attackers are taking advantage of this vulnerability. We’ve seen multiple reports of attackers taking an opportunistic approach with this vulnerability. They are scanning systems at will and attacking any they find vulnerable. Remember that risk is the combination of the likelihood of an event occurring and the possible impact from that event. We do know that attackers are actively hunting for victims which means there’s a strong likelihood of your systems being attacked. If that attack is successful, the attacker gains access to your environment and can run their code. That could have a significant impact on your business. This is one of those times when downtime and other disruptions are usually an acceptable trade off in order to reduce the risk to the business. I’M A LACEWORK CUSTOMER, WHAT DO I NEED TO KNOW? The Lacework Customer Success team has documentation available to help you understand how to use the Lacework platform to help uncover any vulnerable systems and aid with any investigations related to log4j. With the Lacework Polygraph technology, you can identify anomalous behavior that may be indicative of an attacker trying to exploit vulnerable systems. This is important as you actively patch your environment and need to pay extra attention to any vulnerable services running in production. Additionally, you can leverage the Polygraph visualizations to look at New Connection Events from Java applications. As with any major incident, this documentation will be updated as new information becomes available. Lacework Labs will be monitoring for post-exploit activity, including historical data. We will provide specific recommendations to customers if a compromise is detected. WHAT’S NEXT? The situation is likely to change quickly over the next few days. Please continue to monitor the updates from your vendors and work through the list of impacted systems. It’s exhausting work but the critical nature of this vulnerability means it can’t wait. Stay tuned to the Lacework blog and social media handles (we’re @Lacework on Twitter) for more as this situation develops. Copyright 2021 Lacework Inc. All rights reserved. POST NAVIGATION Lacework is the data-driven security platform for the cloud. The Lacework Cloud Security Platform, powered by Polygraph, automates cloud security at scale so our customers can innovate with speed and safety. Search QUICK LINKS -------------------------------------------------------------------------------- * Blog * Careers * About Lacework * Legal * Press Releases * Privacy Policy * Trust PRODUCT/PLATFORM -------------------------------------------------------------------------------- * Overview * AWS Security * Azure Security * GCP Security * Container Security * Workload Security USE CASES -------------------------------------------------------------------------------- * Overview * Host Intrusion Detection * Runtime Threat Defense * File Integrity Monitoring * Kubernetes Security * Anomaly Detection * Configuration Compliance * Account Security CONTACT INFO -------------------------------------------------------------------------------- 888-292-5027 Contact Us 6201 America Center Dr Suite 200 San Jose, CA 95002 © 2021, Lacework, Inc. - Privacy Policy | Terms of Use ✓ Thanks for sharing! AddToAny More… This website uses cookies to enable and improve the use of our website. Review our Privacy Policy to learn more. By clicking on the “I accept” button, you consent to the use of cookies on your device. I ACCEPT