• Home
  • BVSSH
  • Engineering Enablement
  • Playbooks
  • Frameworks
  • Good Reads
Search

What are you looking for?

Practice : Infrastructure Threat Detection

Purpose and Strategic Importance

Infrastructure Threat Detection provides visibility into malicious activity, misconfigurations, and unauthorised access attempts within cloud and on-prem environments. It’s essential for identifying early signs of compromise and defending against evolving threats to systems and data.

By monitoring infrastructure-level behaviours and signals, organisations can detect and respond to threats before they escalate - supporting incident response, forensics, and ongoing risk reduction.


Description of the Practice

  • Detects threats by analysing logs, behaviours, and telemetry from hosts, containers, VMs, and cloud services.
  • Tools include AWS GuardDuty, Azure Defender, Google Security Command Center, Wazuh, CrowdStrike, and Falco.
  • Common alerts include port scanning, rootkit installation, lateral movement, policy changes, and anomalous login patterns.
  • Threats are triaged, correlated, and escalated through SIEMs and response playbooks.

How to Practise It (Playbook)

1. Getting Started

  • Enable native threat detection features in cloud platforms and logging agents.
  • Configure alerts for high-impact activities (e.g. root access, new IAM roles, unauthorised network changes).
  • Review existing alert coverage and prioritise gaps in visibility or telemetry collection.
  • Create or adapt incident playbooks tied to infrastructure-level threats.

2. Scaling and Maturing

  • Integrate alerts into centralised SIEM or SOAR platforms.
  • Correlate infrastructure alerts with application and identity telemetry for context-rich investigation.
  • Continuously tune detection rules based on environment, threat landscape, and false positive rates.
  • Tag assets by criticality and ownership to prioritise alert response and routing.
  • Use threat detection findings to inform architectural decisions and hardening priorities.

3. Team Behaviours to Encourage

  • Treat threat alerts as opportunities to learn and improve - not blame.
  • Make detection health a shared goal between platform, security, and ops teams.
  • Include detection coverage as part of infrastructure-as-code reviews and releases.
  • Conduct regular drills using simulated threats to validate response readiness.

4. Watch Out For…

  • Alert fatigue from poorly tuned or unactionable signals.
  • Gaps in detection due to unmanaged services or legacy systems.
  • Over-reliance on default configurations without reviewing thresholds and exclusions.
  • Lack of training or ownership for responding to infrastructure alerts.

5. Signals of Success

  • Threats are detected and triaged quickly with minimal false positives.
  • Teams know how to respond and act on alerts with clarity and confidence.
  • Detection coverage improves over time and adapts to changing environments.
  • Alerts lead to measurable risk reduction and informed engineering decisions.
  • Detection is seen as an enabler, not just an audit requirement.
Associated Standards
  • Access is continuously verified and contextual
  • Credentials are short-lived and auditable
  • Security is considered from the start
  • Sensitive data and credentials are managed securely
  • Teams understand the threat models relevant to their domain

Technical debt is like junk food - easy now, painful later.

Awesome Blogs
  • LinkedIn Engineering
  • Github Engineering
  • Uber Engineering
  • Code as Craft
  • Medium.engineering