CaseStudy Veeva ThreatStack F5 Cloud Security Threat Detection
AIP F5 Brand
/@aipf5Brand
Published: November 2, 2022
Insights
This video provides an in-depth exploration of how Veeva Systems, a leading software provider for the life sciences community, addresses its cloud security, visibility, and compliance requirements through the adoption of F5/Threat Stack solutions. Featuring Russell Shupert, Senior Director of Security Engineering at Veeva Systems, the discussion highlights the unique challenges of securing cloud environments, particularly for early adopters in highly regulated industries. The webinar serves as a practical case study, detailing Veeva's journey from confronting initial cloud security hurdles to implementing a sophisticated threat detection and compliance system that significantly enhances operational efficiency and incident response capabilities.
The core of the discussion revolves around the evolution of cloud security and Veeva's strategic decision-making process. Shupert explains that early cloud adopters like Veeva struggled with adapting traditional data center security tools to a cloud-native landscape, necessitating either homegrown solutions or the careful evaluation of emerging cloud security vendors. A pivotal moment, influenced by global incidents like the SolarWinds hack, led Veeva to re-evaluate its trust in third-party security providers and prioritize tools that operate with a low-privileged access model. This critical requirement, combined with the need for actionable, high-fidelity data, ultimately guided their selection of Threat Stack.
Shupert elaborates on the tangible benefits realized from the Threat Stack implementation, emphasizing its seamless integration with major cloud providers like Amazon CloudTrail and Azure. A key differentiator for Veeva was Threat Stack's ability to correlate vast amounts of data, drastically reducing false positives from over 90% to under 20%, thereby transforming their security operations. The system provides comprehensive, contextualized information for incident response, allowing Veeva to quickly understand the blast radius of a threat and its position within the MITRE kill chain. Looking ahead, Veeva's strategy includes minimizing the number of security vendors to reduce complexity and centralize information, a goal further supported by F5's acquisition of Threat Stack, which is seen as a natural fit for expanding cloud security offerings.
Key Takeaways:
- Veeva Systems' Industry Focus: Veeva Systems specializes in building software for the highly regulated life sciences community, including pharmaceutical, biotech, consumer health, and med tech sectors, underscoring the critical importance of robust security and compliance in their operations.
- Evolution of Cloud Security: Early cloud adopters like Veeva faced significant challenges in securing their environments due to the lack of cloud-specific security tools, often relying on adapted traditional methods or developing in-house solutions. However, cloud security offerings have matured significantly, now providing capabilities comparable to traditional data center security.
- Observability as a Core Challenge: Achieving comprehensive observability in complex cloud environments is a magnified challenge compared to traditional data centers, requiring specialized tools and strategies to gain visibility into distributed systems.
- Impact of Supply Chain Security Incidents: Global events, such as the SolarWinds incident, prompted Veeva to critically re-evaluate its trust in third-party security vendors and prioritize solutions with stringent security models, particularly those operating with low-privileged access.
- Preference for Low-Privileged Security Tools: A key selection criterion for Veeva was the requirement for security tools that do not operate with default privileged or administrative access, preferring elevation only when explicitly commanded. Threat Stack was unique in offering this capability at the time of Veeva's adoption.
- Actionable Intelligence Over Noise: Veeva prioritized security solutions that deliver reliable, actionable data with a significantly low false positive rate. Threat Stack reduced their false positive rate from over 90% to under 20%, allowing security teams to focus on genuine threats rather than chasing irrelevant alerts.
- Comprehensive Incident Response Capabilities: Threat Stack provides all necessary correlated data at the security engineer's fingertips, detailing both external and internal impacts of a threat. This enables rapid assessment of the blast radius and precise positioning within the MITRE kill chain, facilitating quicker and more effective incident mitigation.
- Quantifiable Operational Efficiency Gains: By drastically reducing false positives, Veeva's security operations team reclaimed approximately 85% of their time previously spent on alert investigation. This freed up resources to focus on proactive security measures, tool maturation, and strategic tuning.
- Seamless Cloud Provider Integration: Threat Stack offers native, seamless integration with major cloud providers such as Amazon (specifically CloudTrail) and Azure, ensuring immediate data flow and simplifying deployment across complex, multi-account cloud infrastructures.
- Scalability and Rapid Deployment: Despite Veeva's highly complex cloud deployment model, encompassing hundreds of Amazon accounts and 31 core product teams, Threat Stack was implemented efficiently. Initial configuration took less than four hours, and full agent rollout across all environments (Dev, test, production, QA) was completed within months.
- Strategic Vendor Consolidation: Veeva's long-term security objective includes minimizing the number of security vendors to reduce operational complexity, improve system integration, and centralize information for faster threat response.
- F5 Acquisition as a Strategic Enabler: F5's acquisition of Threat Stack is viewed positively by Veeva, aligning with their vendor consolidation strategy and enhancing F5's overall cloud security offerings, allowing Veeva to potentially leverage a single, trusted vendor for a broader range of security needs.
Tools/Resources Mentioned:
- Threat Stack (now part of F5)
- F5
- Amazon (AWS)
- Amazon CloudTrail
- Azure
- SolarWinds (mentioned as a cautionary example of a third-party supply chain incident)
Key Concepts:
- Observability: The ability to understand the internal state of a system based on its external outputs. In cloud environments, this involves comprehensive monitoring of logs, metrics, and traces across distributed services to detect anomalies and threats.
- DevSecOps: An approach that integrates security practices into every phase of the software development lifecycle, emphasizing automation, collaboration, and continuous security monitoring.
- Offensive Security: Proactive security testing techniques, such as internal and external penetration testing and bug bounty programs, designed to identify vulnerabilities before malicious actors can exploit them.
- Low-Privileged Model: A security principle where applications or processes operate with the minimum necessary permissions required to perform their functions, significantly reducing the potential impact of a security breach.
- False Positive Rate: The proportion of security alerts that are incorrectly identified as threats. A high false positive rate leads to "alert fatigue" and wastes security team resources.
- Blast Radius: The extent of potential damage or impact that a security incident could have on an organization's systems, data, or operations.
- MITRE ATT&CK Kill Chain: A globally accessible knowledge base of adversary tactics and techniques based on real-world observations. It provides a framework for understanding the stages of an attack and developing defensive strategies.
- Vendor Consolidation: A strategic initiative to reduce the number of technology vendors an organization uses, aiming to simplify management, improve integration, reduce costs, and streamline support.
Examples/Case Studies:
- Veeva Systems' Cloud Security Journey: The entire discussion serves as a case study of Veeva's transition to a cloud-first architecture, the inherent security challenges faced as an early adopter, and their methodical approach to evaluating and implementing a cloud-native security solution.
- SolarWinds Incident: This real-world supply chain attack was cited as a significant catalyst that prompted Veeva to re-evaluate its trust models for third-party security tools and prioritize solutions with specific operational characteristics, such as low-privileged access.
- Threat Stack's Impact on Veeva's Security Operations Center (SOC): A concrete example of success was the dramatic reduction in false positive rates from over 90% to under 20%, directly leading to an 85% time savings for Veeva's security operations team, allowing them to shift focus from reactive alert chasing to proactive security enhancements.