TruSTAR Enclave: Not Your Grandpa’s 'Trusted Circle'

In the early 2010s, ‘Trusted Circles’ were the primary way to share intelligence with other people and parties in cybersecurity. Exclusively a group permissions capability, data shared to ‘trusted circles’ would be shared to whoever had permissions to access data in that ‘trusted circle’ at that time.

Since creating the cyber intelligence Enclave in 2016 for intelligence management, TruSTAR has consistently expanded the capability and use-cases for Enclaves beyond the ‘trusted circle’ concept. Today, TruSTAR’s Enclave technology is the most advanced cloud-based governance engine for enterprise cyber intelligence. On this, the five-year anniversary of Enclaves, we wanted to take stock of how the feature has evolved to meet the needs of integration, automation and intelligence sharing.

2021 & Beyond

In the last five years, TruSTAR Enclaves have come a long way from their initial conception as a way to “stage” your data in the cloud before you shared it with others. Here are some capabilities currently in the works for the future of Enclaves.

“Rather than responding to a stream of cyber events ‘playing whack-a-mole’, we need to recall events gathered from security systems seamlessly. Creating a virtual ‘memory’ to absorb events will enable Machine Learning (ML) to identify patterns more effectively and efficiently address malicious activity.”

As TruSTAR continues to build on machine learning infrastructure across the platform, we will also provide tools for the enterprise to conduct their own machine learning on their own historical events in their Enclaves to move from the reactive to the predictive.

The Enclave has evolved from an initial edge-case for an Enterprise to stage test data on TruSTAR before it is released to other teams and tools, to becoming the de facto way enterprises manage intelligence in the cloud. It has become the foundational architectural element for data-centric security leaders who are beginning to see their data sets as the permanent and primary asset for their program while tools and applications will change and evolve. And, while it has come a long way, the Enclave will continue to grow and change as new use-cases in integration, automation and intel sharing become increasingly top of mind to keep pace with the ever-evolving security landscape.

For more on how Enclaves can help accelerate automation and efficiency in your security program, check out our white paper on Data-Centric Security Automation.

Related Articles

Threat Hunting with Splunk: Hands-on Tutorials for the Active Hunter
Security
4 Minute Read

Threat Hunting with Splunk: Hands-on Tutorials for the Active Hunter

Curious about threat hunting in Splunk? Wanna brush up on your baddie-finding skills? Here's the place to find every one of our expert articles for hunting with Splunk.
Staff Picks for Splunk Security Reading July 2022
Security
2 Minute Read

Staff Picks for Splunk Security Reading July 2022

Welcome to the Splunk staff picks blog. Each month, Splunk security experts curate a list of presentations, whitepapers, and customer case studies that we feel are worth a read.
Using Splunk to Secure Your Productivity and Team Collaboration Environment
Security
2 Minute Read

Using Splunk to Secure Your Productivity and Team Collaboration Environment

See how Splunk helps teams work and collaborate securely while using Google Chrome and Google Workspace.