Update 8/3: Shape Log Analysis is now a supported log streaming endpoint on Fastly. Read the full details here.
Shape Log Analysis is a non-invasive technique used to analyze HTTP and application logs for a clearer view into attackers that are bypassing current security measures. Oftentimes bad actors, botnets, and drive by attacks will consume system resources and commit fraud against APIs in the form of Credential Stuffing, Scraping, Account Takeover and more. Without the proper defenses in place, these attacks are a pain to stop for most security teams who are forced to play “whack-a-mole" with solutions that are not built to permanently defeat fraudulent and automated attacks.
Shape Security has a unique corpus of data from attacks that have been identified and blocked over the years for the world's largest banks, airlines, hotels and many other types of infrastructure exposed to the public internet. This anonymized attack data is used to examine application logs revealing automation and fraud that is bypassing perimeter security mechanisms and making its way to your origin servers.
Through analyzing data points in Layer 7 traffic, Shape will create a threat assessment on old and new campaigns that are currently attacking specific parts of your applications.
Log Analysis Example - Figure 1
The visualization shown in Figure 1 represents all malicious and fraudulent traffic against a specific application. The green pattern hidden in the back is the normal diurnal flow of legitimate user traffic. All other colors are automated attacks driving abuse of APIs and important parts of the application.
This type of reporting can be used to not only understand types of attacks and abuse but can also be used to create a plan for integrating a mitigation solution.
Types of attacks that will be uncovered:
System Resource Consumption
Shape Log Analysis is a free service that is now integrated with Fastly CDN. To avoid complications of compressing, securing and manually sending log data to Shape, we now have the ability to securely send logs to Shape through Fastly's real time log streaming configuration. This is a simple “flip of the switch” configuration, doesn't involve sending any PII data to Shape, and gives organizations the visibility required to take action and prevent these types of attacks.
To configure Fastly CDN for Shape Log Analysis, follow these steps:
1) Request a secure S3 Bucket from Shape (send an email to firstname.lastname@example.org with title "Fastly Log Streaming Setup")
Once Shape has setup your designated S3 bucket, you will receive an email with a private access key that will be required to complete the configuration in the next step. Keep in mind that Shape uses network and security access controls between Fastly and AWS to ensure data is kept private and confidential. If there are any concerns around how log data is kept safe and secure, please ask in the setup request email.
2) Follow Fastly’s well written instructions on creating a new log endpoint and copy in the Shape specific configuration from below.
When you receive the S3 Bucket confirmation from the email@example.com email address, it will contain the following 5 items that you'll need to insert into your Fastly configuration.
1.) Bucket Name
2.) Access Key
3.) Secret Key
Click on "Advanced options" and add the following:
After completing the setup, your configuration summary for Shape Log Analysis will look like the following:
Once the Fastly logging configuration is complete, logs will be sent to Shape's secure S3 bucket for analysis. Typically we collect around two weeks worth of log data to provide a comprehensive analysis of attack traffic.
Additionally, an F5 or Shape representative will be available to provide support during the logging setup and a Threat Assessment Report will be provided as part of the service.