Ctadel

CDR: Cloud Detection & Response

What CDR detects

Cloud audit logs are noisy. The detection set focuses on the high-signal patterns that actual cloud incidents follow:

TacticExamples
Privilege escalationSelf-attached admin-equivalent policies, role assumption chains, IAM self-modification
Initial accessNew user creation outside business hours, IP from anonymising service
PersistenceBackdoor IAM user, scheduled function with broad permissions, new SSH key on a VM
DiscoveryBurst of IAM enumeration calls
Lateral movementRole assumed from unusual accounts, cross-cloud token use
Defense evasionAudit-log disabled, log retention shortened, bucket logging removed
ExfiltrationHigh-volume object reads, cross-account share creation, snapshot copied to another account
ImpactResource group / project deletion, encryption key destruction

Every rule has a MITRE ATT&CK technique and tactic mapping, so detections are correlatable with the rest of your threat model.

T1078.004Cloud Accounts T1567.002Exfiltration to Cloud Storage T1078.001Default Accounts

How CDR consumes logs

CloudSource
ScalewayAudit logs
AWSCloudTrail
GCPCloud Audit Logs
AzureActivity Log

OVHcloud CDR is on the roadmap and not in scope today.

Setup adds a small amount of permission to your read-only credential, the ability to read the audit log stream. That's it. We never touch your data plane.

Findings vs incidents

CDR produces two related shapes:

  • Findings: individual events that match a detection rule. Most are interesting on their own; some only matter in clusters.
  • Incidents: auto-grouped findings that share an actor (identity, source IP) and a time window. An incident with eight privilege-escalation findings from one identity is one thing to triage, not eight.

Incidents have their own status workflow (OPEN, INVESTIGATING, CONTAINED, RESOLVED) and a timeline view.

Response actions

For a subset of detections we can suggest, and with explicit approval execute, response actions:

  • Disable an IAM user.
  • Revoke an active session.
  • Detach a recently-attached policy.
  • Quarantine a security group (replace its rules with deny-all).

By default, all response actions are suggestions only. Auto-execution is opt-in per rule. The full action catalogue is in the Runtime module page.

What's next