Proactive cloud threat hunting through adversary emulation

dc.contributor.authorBunde, C. O.
dc.date.accessioned2026-04-21T10:21:43Z
dc.date.issued2025
dc.descriptionFull - text thesis
dc.description.abstractOrganizations have increasingly adopted cloud computing infrastructure as the foundation for delivering digital services, a trend known as 'digital transformation.' While cloud computing offers flexibility, cost reduction, and improved productivity, there are also significant security concerns due to reduced visibility and an increased attack surface. The emergence of cloud-conscious threat actors exacerbates these concerns. This research focused on operationalizing cloud threat hunting as a proactive measure to reduce attacker dwell time in organizational environments. The aim was to review threat-hunting approaches for the cloud environment, concentrating on threats targeting IAM misconfigurations. This included analyzing adversary emulation methods that can support threat-hunting in the cloud, developing and testing a threat-hunting model for operationalization, and validating the performance of the threat model. The study's objectives were achieved through a design science approach, employing an experimental methodology divided into offensive and counter-offensive phases. For the offensive phase, adversary emulation provided a comprehensive summary of common threat scenarios. For the counter-offensive phase, three hypotheses were formulated based on MITRE ATT&CK techniques: Hypothesis 1 focused on T1078.004, Hypothesis 2 on T1098.003, and Hypothesis 3 on T1136.003. The study demonstrated the effectiveness of the developed threat-hunting model in identifying cloud-specific threats. All three hypotheses, which focused on key IAM misconfiguration attack vectors, were validated as true, highlighting the importance of proactive threat hunting for these attack vectors. Keywords: Cloud Threat Hunting, IAM Misconfigurations, Adversary Emulation, MITRE ATT&CK Techniques
dc.identifier.citationBunde, C. O. (2025). Proactive cloud threat hunting through adversary emulation [Strathmore University]. https://hdl.handle.net/11071/16419
dc.identifier.urihttps://hdl.handle.net/11071/16419
dc.language.isoen
dc.publisherStrathmore University
dc.titleProactive cloud threat hunting through adversary emulation
dc.typeThesis

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Proactive cloud threat hunting through adversary emulation.pdf
Size:
12.32 MB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: