Shared Cloud Environment Complicates Isolation
The compromised workload runs in a multi-tenant cloud environment (shared subscription, Kubernetes cluster, or PaaS) where isolation actions may impact other tenants or business-critical services sharing the same infrastructure.
Signals
- •The compromised resource shares a VPC/VNet, subnet, or Kubernetes namespace with production workloads owned by other teams
- •Network security groups or firewall rules are broadly scoped, making surgical isolation difficult
- •Container orchestration shows the compromised pod running on a shared node with other tenant workloads
Pivot Actions
- 1.Apply granular network policies (Kubernetes NetworkPolicy, NSG rules) to isolate the compromised workload without blocking shared-service traffic
- 2.Snapshot the compromised VM or container image for offline analysis, then redeploy a clean instance
- 3.Coordinate with the cloud platform team to identify all resources sharing the same trust boundary and assess lateral-movement risk
- 4.Use cloud-native security tools (Azure Defender, AWS GuardDuty, GCP SCC) to scope activity across the shared environment
- 5.Implement identity-level isolation (revoke the compromised service principal or IAM role) rather than network-level isolation
Alternate Evidence Sources
- •Cloud provider activity and management-plane logs (CloudTrail, Azure Activity Log, GCP Admin Activity)
- •Kubernetes audit logs and container runtime logs (containerd, CRI-O)
- •Cloud-native threat-detection findings (GuardDuty, Defender for Cloud, SCC)