TruSTAR Enclave: Not Your Grandpa’s 'Trusted Circle'

In the early 2010s, ‘Trusted Circles’ were the primary way to share intelligence with other people and parties in cybersecurity. Exclusively a group permissions capability, data shared to ‘trusted circles’ would be shared to whoever had permissions to access data in that ‘trusted circle’ at that time.

Since creating the cyber intelligence Enclave in 2016 for intelligence management, TruSTAR has consistently expanded the capability and use-cases for Enclaves beyond the ‘trusted circle’ concept. Today, TruSTAR’s Enclave technology is the most advanced cloud-based governance engine for enterprise cyber intelligence. On this, the five-year anniversary of Enclaves, we wanted to take stock of how the feature has evolved to meet the needs of integration, automation and intelligence sharing.

2021 & Beyond

In the last five years, TruSTAR Enclaves have come a long way from their initial conception as a way to “stage” your data in the cloud before you shared it with others. Here are some capabilities currently in the works for the future of Enclaves.

“Rather than responding to a stream of cyber events ‘playing whack-a-mole’, we need to recall events gathered from security systems seamlessly. Creating a virtual ‘memory’ to absorb events will enable Machine Learning (ML) to identify patterns more effectively and efficiently address malicious activity.”

As TruSTAR continues to build on machine learning infrastructure across the platform, we will also provide tools for the enterprise to conduct their own machine learning on their own historical events in their Enclaves to move from the reactive to the predictive.

The Enclave has evolved from an initial edge-case for an Enterprise to stage test data on TruSTAR before it is released to other teams and tools, to becoming the de facto way enterprises manage intelligence in the cloud. It has become the foundational architectural element for data-centric security leaders who are beginning to see their data sets as the permanent and primary asset for their program while tools and applications will change and evolve. And, while it has come a long way, the Enclave will continue to grow and change as new use-cases in integration, automation and intel sharing become increasingly top of mind to keep pace with the ever-evolving security landscape.

For more on how Enclaves can help accelerate automation and efficiency in your security program, check out our white paper on Data-Centric Security Automation.

Related Articles

From Macros to No Macros: Continuous Malware Improvements by QakBot
Security
13 Minute Read

From Macros to No Macros: Continuous Malware Improvements by QakBot

This blog, the Splunk Threat Research Team (STRT) showcases a year's evolution of QakBot. We also dive into a recent change in tradecraft meant to evade security controls. Last, we reverse engineered the QakBot loader to showcase some of its functions.
All of Us Can Defend Each of Us
Security
2 Minute Read

All of Us Can Defend Each of Us

Splunk's Global Security Strategist Mick Baccio shares his experience attending Hackers on the Hill and invites you to join him and SURGe leader, Ryan Kovar, for the Data Security Predictions 2023 webinar.
CI/CD Detection Engineering: Failing, Part 3
Security
4 Minute Read

CI/CD Detection Engineering: Failing, Part 3

In part 3 of our now 4-part series, we walk you through how we failed to use CircleCI to continually test detentions!