Proactive cloud threat hunting through adversary emulation
| dc.contributor.author | Bunde, C. O. | |
| dc.date.accessioned | 2026-04-21T10:21:43Z | |
| dc.date.issued | 2025 | |
| dc.description | Full - text thesis | |
| dc.description.abstract | Organizations have increasingly adopted cloud computing infrastructure as the foundation for delivering digital services, a trend known as 'digital transformation.' While cloud computing offers flexibility, cost reduction, and improved productivity, there are also significant security concerns due to reduced visibility and an increased attack surface. The emergence of cloud-conscious threat actors exacerbates these concerns. This research focused on operationalizing cloud threat hunting as a proactive measure to reduce attacker dwell time in organizational environments. The aim was to review threat-hunting approaches for the cloud environment, concentrating on threats targeting IAM misconfigurations. This included analyzing adversary emulation methods that can support threat-hunting in the cloud, developing and testing a threat-hunting model for operationalization, and validating the performance of the threat model. The study's objectives were achieved through a design science approach, employing an experimental methodology divided into offensive and counter-offensive phases. For the offensive phase, adversary emulation provided a comprehensive summary of common threat scenarios. For the counter-offensive phase, three hypotheses were formulated based on MITRE ATT&CK techniques: Hypothesis 1 focused on T1078.004, Hypothesis 2 on T1098.003, and Hypothesis 3 on T1136.003. The study demonstrated the effectiveness of the developed threat-hunting model in identifying cloud-specific threats. All three hypotheses, which focused on key IAM misconfiguration attack vectors, were validated as true, highlighting the importance of proactive threat hunting for these attack vectors. Keywords: Cloud Threat Hunting, IAM Misconfigurations, Adversary Emulation, MITRE ATT&CK Techniques | |
| dc.identifier.citation | Bunde, C. O. (2025). Proactive cloud threat hunting through adversary emulation [Strathmore University]. https://hdl.handle.net/11071/16419 | |
| dc.identifier.uri | https://hdl.handle.net/11071/16419 | |
| dc.language.iso | en | |
| dc.publisher | Strathmore University | |
| dc.title | Proactive cloud threat hunting through adversary emulation | |
| dc.type | Thesis |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Proactive cloud threat hunting through adversary emulation.pdf
- Size:
- 12.32 MB
- Format:
- Adobe Portable Document Format
License bundle
1 - 1 of 1
Loading...
- Name:
- license.txt
- Size:
- 1.71 KB
- Format:
- Item-specific license agreed upon to submission
- Description: