TruSTAR Enclave: Not Your Grandpa’s 'Trusted Circle'

In the early 2010s, ‘Trusted Circles’ were the primary way to share intelligence with other people and parties in cybersecurity. Exclusively a group permissions capability, data shared to ‘trusted circles’ would be shared to whoever had permissions to access data in that ‘trusted circle’ at that time.

Since creating the cyber intelligence Enclave in 2016 for intelligence management, TruSTAR has consistently expanded the capability and use-cases for Enclaves beyond the ‘trusted circle’ concept. Today, TruSTAR’s Enclave technology is the most advanced cloud-based governance engine for enterprise cyber intelligence. On this, the five-year anniversary of Enclaves, we wanted to take stock of how the feature has evolved to meet the needs of integration, automation and intelligence sharing.

2021 & Beyond

In the last five years, TruSTAR Enclaves have come a long way from their initial conception as a way to “stage” your data in the cloud before you shared it with others. Here are some capabilities currently in the works for the future of Enclaves.

“Rather than responding to a stream of cyber events ‘playing whack-a-mole’, we need to recall events gathered from security systems seamlessly. Creating a virtual ‘memory’ to absorb events will enable Machine Learning (ML) to identify patterns more effectively and efficiently address malicious activity.”

As TruSTAR continues to build on machine learning infrastructure across the platform, we will also provide tools for the enterprise to conduct their own machine learning on their own historical events in their Enclaves to move from the reactive to the predictive.

The Enclave has evolved from an initial edge-case for an Enterprise to stage test data on TruSTAR before it is released to other teams and tools, to becoming the de facto way enterprises manage intelligence in the cloud. It has become the foundational architectural element for data-centric security leaders who are beginning to see their data sets as the permanent and primary asset for their program while tools and applications will change and evolve. And, while it has come a long way, the Enclave will continue to grow and change as new use-cases in integration, automation and intel sharing become increasingly top of mind to keep pace with the ever-evolving security landscape.

For more on how Enclaves can help accelerate automation and efficiency in your security program, check out our white paper on Data-Centric Security Automation.

Related Articles

Splunk SOAR Playbooks: Finding and Disabling Inactive Users on AWS
Security
6 Minute Read

Splunk SOAR Playbooks: Finding and Disabling Inactive Users on AWS

Discover how to add an additional layer of security in AWS with Splunk Phantom by scheduling a playbook to search for inactive users and activating another playbook to disable problem user accounts.
CIO Roundtable: Harnessing GenAI for Resilient Security and Observability – Insights and Strategies
Security
2 Minute Read

CIO Roundtable: Harnessing GenAI for Resilient Security and Observability – Insights and Strategies

Get insights from a recent roundtable discussion in collaboration with CIO magazine. The talk focused on the dual challenge faced by IT and security managers: mitigating risks associated with AI while leveraging AI to enhance organizational capability.
Staff Picks for Splunk Security Reading June 2021
Security
5 Minute Read

Staff Picks for Splunk Security Reading June 2021