Nobody has ever responded to a threat they could not detect. Just ask Capital One that is facing public scrutiny over one of the largest data breaches ever: one that persisted in the company’s cloud-based infrastructure for months but was not detected until outside researchers tipped the organization off.
Like with Capital One, the vast majority of today’s breaches root back to a failure of detection. The challenge of protecting low hanging fruit has been solved – alerting, signature-based rules, blocking at the packet/signature level – it works, but it’s easy. Most failure in detection happens in the grey area between black and white.
Phishing is a great example of this, as those attacks continue to become stealthier by the day. Over the last year, ninety-eight percent of phishing attacks that made it past enterprise email security controls and into user inboxes contained no malware, which makes them much harder for enterprises to detect.
What’s scarier? As cyber-criminal activity grows more sophisticated by the day, the grey area is expanding, and the damage is particularly debilitating because symptoms are hard to detect and present a morbid outcome.
The good news is that there are a number of best practices companies can follow to limit the amount of detection failure across the network.
Securing the “Grey” Area
One of my favorite quotes is “the absence of evidence is not evidence of absence.” The fact that you don’t know you have been breached, doesn’t mean you haven’t. While everything may appear to be fine, it could simply mean that you aren’t looking at things in your network you should be looking at.
Increasing feedback and knowledge transfer across the teams that test the effectiveness of an organization’s defenses (red team) and the teams that keep the organization safe from real-world attackers by understanding their TTPs (blue team), also known as purple-teaming, is essential.
However, the reality for many companies is that the red and blue teams can be completely separate and disconnected entities. By collaborating and continuously enhancing security controls across teams, analysts can improve the effectiveness of their threat hunting skills, vulnerability detection efforts and network monitoring techniques through imitating common threat scenarios and aiding the creation of procedures designed to prevent and detect these new threats.
While purple teaming is a helpful strategy, organizations see the most value by investing heavily in the blue team and proactive threat hunting. Actively “hunting” for threats targeting your organization helps your security team to learn to seek out sophisticated threat behaviors and identify them before they turn into full on security breaches.
While it can be costly and time consuming to invest in, proactive threat hunting can help your security team uncover things that you thought you had defended against, but in reality, are still quite vulnerable to.
Lastly, automating the threat hunting process is the final level of defense to ensure your network is as secure as possible. Attackers are not scanning everything by hand, and neither should you. People’s intuitions are simply no match for today’s machine learning capabilities.
While many analysts have good awareness and ability to detect threats, there are often things happening inside the network that go unnoticed. Machine learning and automation help support an analyst during the threat hunting process, by helping them understand and access all the data across a network in seconds versus hours. This is crucial in a market where finding analysts that can accurately detect the non-trivial attacks across a network is difficult.
Achieving Meaningful Automation
Even though machine learning and automation are the supposed silver bullets of modern cybersecurity, application of the transformative technology is misconstrued and often overhyped by vendors. During the threat hunting process, not only are organizations limited by the manpower available, but analysts are simultaneously equipped with more data and tools than they know what to do with.
Machine learning and automation have the ability to provide analysts with deep, meaningful analysis to support them during the threat hunting process by uncovering the value in the data. With machine learning and automation, analysts can easily see what they can learn from the data and improve the organization’s threat hunting process.
Machine learning and automation help analysts better understand the protocols they have in place to detect threats, the gaps that may exist across the network, the number of false positives, etc.
With automation, security analysts’ work becomes streamlined so they can focus on doing what they do best: analyzing incidents and protecting their organization’s IT infrastructure. However it is a constant journey, where you need to strive to continuously improve.
If organizations start investing in meaningful automation now, they’ll be set up to succeed for the next horizon of automation – where automation systems proactively suggest what organizations can and should automate – and empower their SOC teams to become tomorrow’s super humans, today.
Credit: Google News