Sherlocked Security – Cloud Workload Protection Platform (CWPP) 🔐
Secure Your Compute Resources across VMs, Containers, and Serverless workloads with precision. Sherlocked Security’s CWPP offering delivers runtime threat detection, configuration audits, and DevSecOps-driven remediation strategies.
📄 1. Statement of Work (SOW)
- Service Name: Cloud Workload Protection Platform (CWPP)
- Client Type: DevOps-Driven Startups, SaaS Providers, Financial Institutions, HealthTech
- Service Model: Workload Security Assessment + Runtime Threat Protection
- Compliance Coverage: NIST 800-190, PCI-DSS, ISO 27001, SOC 2, HIPAA, CIS Benchmarks
🎯 Supported Workload Types
- Virtual Machines (AWS EC2, Azure VMs, GCE)
- Containers (Docker, Kubernetes, ECS, AKS, GKE)
- Serverless (AWS Lambda, Azure Functions, GCP Cloud Functions)
🧠 2. Our Approach
- 🔹 Defense-in-Depth for Cloud Workloads
- 🔹 Runtime Protection + Configuration Review
- 🔹 DevSecOps-Aligned Fix Recommendations
Visual Workflow:
[Workload Discovery] → [Config Review] →
[Vulnerability Scan] → [Runtime Behavior Analysis] → [Threat Detection] →
[Remediation Guidance] → [Continuous Monitoring]
🧪 3. Methodology
Phase-by-Phase Flow:
[Kickoff] → [Workload Inventory] → [Host Hardening Checks] → [Container Image Analysis] →
[Runtime Monitoring Deployment] → [Threat Behavior Correlation] → [Alert Triage & Response Plan] →
[Fix Recommendations] → [Post-Fix Audit & Certification]
📦 4. Deliverables to the Client
- ✅ Host/Container Misconfiguration Matrix
- 🧾 Statement of Work (SOW)
- 📘 Security Assessment Report:
- Workload Type & Context
- Vulnerability & Misconfiguration Summary
- Runtime Threat Findings
- Severity Ratings (CVSS + Business Impact)
- Exploit Evidence & Screenshots
- Remediation Steps (Manual & IaC)
- References & Tooling Used
- 📊 Runtime Behavior Visuals & Threat Maps
- 📽️ Report Walkthrough Call
- 🔁 Fix Support and Retesting
- 🛡️ Posture Certificate
🤝 5. What We Need from You
- ✅ List of Workloads (VMs, Containers, Serverless)
- ✅ Runtime Access (Read-Only or Agent Install Permissions)
- ✅ Kubernetes Configs (if applicable)
- ✅ CI/CD Pipelines Access (for Image Scanning)
- ✅ Asset Criticality Classification (Prod/Staging)
- ✅ Contact Point from DevOps or Infra Security Team
🧰 6. Tools & Technology Stack
- 🛠️ Falco / Sysdig (Runtime Monitoring)
- 🔍 Trivy / Clair / Grype (Image Scanning)
- 🔐 CrowdStrike / Prisma Cloud / Aqua CSP
- 📦 Docker Bench / kube-bench
- 🔁 Custom Linux Host Hardening Scripts
- 🧬 EDR/XDR Integration Support
🚀 7. Engagement Lifecycle
- Discovery Call
- Access Provisioning
- Kickoff & Scope Finalization
- Agent/Image Integration
- Static & Runtime Workload Testing
- Draft Report Review
- Final Report Delivery
- Fix Support + Revalidation
- Security Certificate Issued
🌟 8. Why Sherlocked Security?
Feature | Sherlocked Advantage |
---|---|
📦 Workload-Aware Testing | Support for VMs, Containers, and Serverless |
🧠 Runtime Threat Detection | Syscall-level analysis & custom rules |
🛠️ DevOps Tooling Integrations | CI/CD, GitHub, and container registries |
🔁 Revalidation Free | 1 round included post remediation |
💬 Real-Time Support | Slack/Teams with Infra/DevSec Experts |
🏆 Protection Certificate | Given after fixes & runtime validation |
📚 9. Real-World Case Studies
🛑 Unprotected Container in Production
- Issue: A Kubernetes container was running as root with no resource limits.
- Impact: Container compromised and used for crypto mining.
🛠️ Fintech VM Workload Hardening
- Client: Indian lending platform hosted on AWS
- Findings: SSH brute-force attempts on exposed EC2; Vulnerable Log4j version in container
- Our Role: Setup of runtime threat detection and guided hardening
- Outcome: Zero workload compromise over 6 months; PCI-DSS certification achieved
🛡️ 10. SOP – Standard Operating Procedure
- Discovery Call + Scope Agreement
- Runtime Agent/Scanner Setup
- Static Config and Image Scan
- Host Hardening + Root Detection
- Runtime Threat Monitoring Phase
- Alert Analysis and Report Generation
- Fix Recommendations Walkthrough
- Patch Verification + Re-Scan
- Certificate Issuance
📋 11. Sample CWPP Checklist (Preview)
- ✅ Identify all running workloads across IaaS and PaaS.
- ✅ Deploy agents or agentless scanners to monitor workloads.
- ✅ Enforce runtime behavior policies and anomaly detection.
- ✅ Protect against malware, fileless attacks, and exploits.
- ✅ Implement image scanning and CI/CD integration.
- ✅ Monitor communication between workloads for suspicious behavior.
- ✅ Enable host-based firewalls and system hardening.
- ✅ Segment workloads using security groups or microsegmentation.
- ✅ Integrate with cloud-native and third-party threat intel feeds.
- ✅ Automate incident response and containment actions.