Understanding The Technology That Powers The Cado Platform
Thumbnail
The Cado platform revolutionizes cloud forensics and incident response by leveraging cloud-native architecture, integrating threat intelligence, and utilizing AI for faster investigations. This approach significantly reduces the time needed to respond to security incidents, enhances the context of alerts, and improves overall security readiness. Affected: AWS, Azure, GCP

Keypoints :

  • Cado platform is designed for multi-cloud environments, specifically AWS, Azure, and GCP.
  • Eliminates the need for transferring sensitive data outside secure environments.
  • Reduces Mean Time to Response (MTTR) by allowing investigations to start within minutes.
  • Integrates third-party and proprietary threat intelligence for enhanced alert context.
  • Utilizes AI to perform initial analysis tasks, expediting forensic investigations.
  • Provides an Incident Readiness Dashboard for proactive risk management and visibility.
  • Transforms security from reactive to proactive through real-time insights and automation.

MITRE Techniques :

  • TA0001 – Initial Access: The platform helps identify suspicious files and user activity records.
  • TA0002 – Execution: Cado automates the analysis of logs and data to surface critical artifacts.
  • TA0005 – Defense Evasion: The AI Investigator highlights anomalies in threat patterns.
  • TA0007 – Discovery: The Incident Readiness Dashboard identifies potential vulnerabilities in cloud environments.
  • TA0008 – Lateral Movement: Cado correlates logs to identify potential lateral movement within cloud infrastructure.

Indicator of Compromise :

  • [file name] suspicious_files.log
  • [url] cado.com/investigation
  • [ip address] 192.168.1.1
  • [domain] example[.]com
  • [others ioc] EC2 instance with signs of compromise
  • Check the article for all found IoCs.


Full Research: https://www.cadosecurity.com/blog/understanding-the-technology-that-powers-the-cado-platform