Skip to main content

CCC Monitoring

Provides the ability to continuously observe, track, and analyze the performance, availability, and health of the service resources or applications.

Release Details

Version:
DEV
Assurance Level:
Release Manager:
DB
Development Build

Contributors

DT
Development Team

Change Log

  • Development build - no formal changelog available

Capabilities

IDTitleDescriptionThreat Mappings
CCC.Monitor.F01Metric collectionGathering numerical (quantitative) data points about the performance, health, or behaviour of systems, applications or infrastructure.
0
CCC.Monitor.F02TracingAn observability technique providing an end-to-end view of a request or transaction flow through a complex system to enable a single action to be linked to resulting events in multiple downstream systems.
0
CCC.Monitor.F03ReportingSummarised view of metrics in a structured, sharable format.
0
CCC.Monitor.F04Health ChecksA type of monitoring that focuses on the operational status and readiness of components or entire systems.
0
CCC.Monitor.F05SLO MonitoringDefine and monitor Service Level Objectives (SLO) using Service Level Indicators (SLI) based on metrics.
0
CCC.Monitor.F06Synthetic MonitoringProactively checking sample user interactions to identify issues before real users are impacted.
0
CCC.Monitor.F07Uptime MonitoringChecking whether a specific service or application is accessible from an external perspective.
0
CCC.Monitor.F08Application Performance Monitoring (APM)A comprehensive approach to monitoring the performance, availability and user experience of an application through multiple levels of data collection
0
CCC.Monitor.F09DashboardA visual representation of the health of systems being monitored. Pulling together metrics, current alerts, SLO/SLI's, health checks and other monitoring features into a single location to enable a view of the health of the overall system.
0
CCC.Monitor.F10TriggeringAutomatically initiating actions like alerts, notifications or automated workflows based on pre-defined conditions being met.
0
CCC.Monitor.F11Integration with Third-Party ToolsMonitoring tools are able to integrate with a number of downstream systems in order to send notifications and alerts, raise tickets and create incident reports.
0
CCC.Core.F03Access Log PublicationThe service automatically publishes structured, verbose records of activities performed within the scope of the service by external actors.
3
CCC.Core.F06Access ControlThe service automatically enforces user configurations to restrict or allow access to a specific component or a child resource based on factors such as user identities, roles, groups, or attributes.
1
CCC.Core.F07Event PublicationThe service automatically publishes a structured state-change record upon creation, deletion, or modification of data, configuration, components, or child resources.
2
CCC.Core.F09Metrics PublicationThe service automatically publishes structured, numeric, time-series data points related to the performance, availability, and health of the service or its child resources.
3
CCC.Core.F10Log PublicationThe service automatically publishes structured, verbose records of activities, operations, or events that occur within the service.
2
CCC.Core.F14API AccessThe service exposes a port enabling external actors to interact programmatically with the service and its resources using HTTP protocol methods such as GET, POST, PUT, and DELETE.
1
CCC.Core.F15Cost ManagementThe service monitors data published by child or networked resources to infer usage patterns and generate cost reports for the service.
1
CCC.Core.F17AlertingThe service may be configured to emit a notification based on a user-defined condition related to the data published by a child or networked resource.
2

Threats

IDTitleDescriptionExternal MappingsCapability MappingsControl Mappings
CCC.Monitor.TH01Capture Personal Identifiable InformationUnauthorised viewers may get access to PII if it is incorrectly collected by monitoring systems through metrics or tracing.
1
1
0
CCC.Monitor.TH02Health Checks Used to Identify Attack TargetsHealth Checks are used to inform those responsible for maintaining a system that there is a problem, but if that information gets into the hands of a malicious actor, it can be used to target already problematic systems and mask malicious activity.
1
1
1
CCC.Monitor.TH03External Monitoring DoSIf an external monitoring service is compromised, it can act as a host for instigating denial of service attacks on internal system which otherwise may not be protected against this form of attack.
1
1
1
CCC.Monitor.TH04External Monitoring AccessIf an external monitoring system is compromised, it acts as a trusted external remote service and can then access internal services which would otherwise not be accessible directly.
1
1
1
CCC.Monitor.TH05Data Exfiltration Through Tampered MetricsIf a malicious actor is able to make changes to the metrics being collected, it could be used to encrypt and or compress sensitive data and bypass controls preventing exfiltration. The data can then be staged in the monitoring system and exfiltrated in bulk at a later point in time
1
1
1
CCC.Monitor.TH06Cost Exhaustion Through Tampered Alerts or Metrics CollectionMonitoring systems are expected to generate traffic, but it a malicious actor were to change alerts that were being fired at an API which charged per requests or generate large volumes of metric data which would then need to be stored and processed, or even triggering resource scaling, this would cause an increase in cloud bill.
1
1
1
CCC.Monitor.TH07Trigger Malicious CodeIf a malicious actor is able to create new triggers, they would be able to use valid metric data to trigger malicious actions and re-compromise a newly replaced container or compute instance.
1
1
0
CCC.Core.TH01Access is Granted to Unauthorized UsersLogic designed to give different permissions to different entities may be misconfigured or manipulated, allowing unauthorized entities to access restricted parts of the service, its data, or its child resources. This could result in a loss of data confidentiality or tolerance of unauthorized actions which impact the integrity and availability of resources and data.
1
1
4
CCC.Core.TH07Logs are Tampered With or DeletedTampering or deletion of service logs will reduce the system's ability to maintain an accurate record of events. Any actions that compromise the integrity of logs could disrupt system availability by disrupting monitoring, hindering forensic investigations, and reducing the accuracy of audit trails.
1
1
1
CCC.Core.TH08Runtime Metrics are ManipulatedManipulation of runtime metrics can lead to inaccurate representations of system performance and resource utilization. This compromised data integrity may also impact system availability through misinformed scaling decisions, budget exhaustion, financial losses, and hindered incident detection.
1
1
0
CCC.Core.TH09Runtime Logs are Read by Unauthorized EntitiesUnauthorized access to logs may expose valuable information about the system's configuration, operations, and security mechanisms. This could jeopardize system availability through the exposure of vulnerabilities and support the planning of attacks on the service, system, or network. If logs are not adequately sanitized, this may also directly impact the confidentiality of sensitive data.
1
1
1
CCC.Core.TH10State-change Events are Read by Unauthorized EntitiesUnauthorized access to state-change events can reveal information about the system's design and usage patterns. This opens the system up to attacks of opportunity and support the planning of attacks on the service, system, or network.
1
1
1
CCC.Core.TH11Publications are Incorrectly TriggeredIncorrectly triggered publications may disseminate inaccurate or misleading information, creating a data integrity risk. Such misinformation can cause unintended operations to be initiated, conceal legitimate issues, and disrupt the availability or reliability of systems and their data.
1
1
0
CCC.Core.TH15Automated Enumeration and Reconnaissance by Non-human EntitiesAutomated processes may be used to gather details about service and child resource elements such as APIs, file systems, or directories. This information can reveal vulnerabilities, misconfigurations, and the network topology, which can be used to plan an attack against the system, the service, or its child resources.
1
1
1
CCC.Core.TH16Publications are DisabledPublication of events, metrics, and runtime logs may be disabled, leading to a lack of expected security and operational information being shared. This can impact system availability by delaying the detection of incidents while also impacting system design decisions and enforcement of operational thresholds, such as autoscaling or cost management.
1
1
1

Controls

IDTitleObjectiveControl FamilyThreat MappingsGuideline MappingsAssessment Requirements
CCC.Monitor.C01Rate Limiting on External MonitoringPrevent DoS attacks using External Monitoring tools. Logging & Monitoring
1
4
1
CCC.Monitor.C02Rate Limiting on Metric GenerationPrevent Malicious Actor or misconfiguration from flooding services with metric data. Logging & Monitoring
1
4
1
CCC.Core.C04Log All Access and ChangesEnsure that all access attempts are logged to maintain a detailed audit trail for security and compliance purposes. Logging & Monitoring
1
5
3
CCC.Core.C07Alert on Unusual Enumeration ActivityEnsure that logs and associated alerts are generated when unusual enumeration activity is detected that may indicate reconnaissance activities. Logging & Monitoring
1
4
2
CCC.Monitor.C03Access External MonitoringControl access to Synthetic monitoring solutions using API keys or Certificate based authentication to ensure they don't become an attack path, preventing monitoring systems from forging network requests to gain access to internal systems. Identity and Access Management
1
4
1
CCC.Monitor.C04Restrict access to Monitoring DashboardsControl access to Monitoring Dashboards and reports to ensure they don't highlight an attack path. Identity and Access Management
1
4
1
CCC.Monitor.C05Restrict access to silence or acknowledge an alertEnsure only a subset of users can silence or acknowledge alerts to prevent attackers hiding their activity. Identity and Access Management
1
3
1
CCC.Monitor.C06Metrics pushed for authorised services onlyUse IAM to control which types of metrics or traces can be pushed by different system to avoid a compromised system pushing fabricated metrics about a different service Identity and Access Management
1
2
1
CCC.Core.C03Implement Multi-factor Authentication (MFA) for AccessEnsure that all sensitive activities require two or more identity factors during authentication to prevent unauthorized access. Identity and Access Management
1
6
4
CCC.Core.C05Prevent Access from Untrusted EntitiesEnsure that secure access controls enforce the principle of least privilege to restrict access to authorized entities from explicitly trusted sources only. Identity and Access Management
1
8
6
CCC.Core.C02Encrypt Data for StorageEnsure that all data stored is encrypted at rest using strong encryption algorithms. Data
1
7
1
CCC.Core.C09Ensure Integrity of Access LogsEnsure that access logs are always recorded to an external location that cannot be manipulated from the context of the service(s) it contains logs for. Data
3
5
3
CCC.Core.C11Protect Encryption KeysEnsure that encryption keys are managed securely by enforcing the use of approved algorithms, regular key rotation, and customer-managed encryption keys (CMEKs). Data
1
7
6