Maximising Your Investments Through Security Automation

Written by Noor Boulos 

Let’s face it, we’ve talked about security automation for years. We’ve grappled with what, when and how to automate. We’ve debated the human vs machine topic. And at certain points, when we’ve been “burned” (automatically shutting down systems in error), we’ve wondered if there’s any place at all for automation. But in our heart of hearts, we’ve known for years that automation is the future. Now the future is here.

While most organisations had at least minimal automation of key security and incident response (IR) processes, the events of 2020 served as a tipping point. The new SANS report discusses how the global pandemic forced many organisations to accelerate their plans for automation, where they are prioritising their investments and the plans they have for the future. The survey spanned companies of all sizes, representing a diverse blend of industries and with operations in North American, Europe, Asia Pacific and Africa.

 

Some of the key findings include:

  • Nearly one-third of organisations indicated that their plans for automation accelerated because of the COVID-19 pandemic.
  • More than 80% of organisations have at least partial automation of key security and IR processes, up from 47% in 2020.
  • Drilling deeper, IR processes saw the most significant growth in automation – with extensive automation jumping nearly 18%, from 10.5% in 2020 to 28.3% in 2021.
  • Security operations and event or alert processing remains the top area for automation with 35.5% reporting extensive automation.
  • The future looks bright for security automation, with 85% planning on automating key security and IR processes in the next 12 months alone.

 

As you look to the future and use these survey results to help better understand how to expand your use of automation within your security operations, it’s important to consider when to apply automation within the security lifecycle to maximise business value. At ThreatQuotient, we have long believed that data is the lifeblood of detection and response automation, so the key to effective automation starts with data. Let’s take the two primary use cases in the report, Alert Triage and Incident Response, as examples.

 

Alert Triage:

Analysts are inundated by the number of alerts that require human attention, generated by noisy SIEM rules and default defense infrastructure. In an attempt to reduce the volume and velocity of security alerts they must tackle on a daily basis, analysts apply external threat data and threat intelligence feeds directly to the SIEM, but challenges continue for two main reasons. First, the amount of external threat data is staggering. Sending all of this data directly to the SIEM for correlation results in tons of non-contextual alerts, each of which requires significant work by an analyst to research. Second, there is a lack of decision support capabilities in current tools to provide additional context and understanding to determine relevance, before applying threat intelligence feeds directly to the SIEM. Prioritisation is imperative to focus and determine the appropriate next actions to take during the alert triage process.

With the ThreatQ Platform you can address the alert triage challenge and stop the useless alerts before they happen by ONLY feeding threat intelligence that is relevant to the organisation. By automatically applying context, relevance and prioritisation to threat data prior to applying it to the SIEM, the SIEM becomes more efficient and effective. Customised threat intelligence scores based on parameters you set, coupled with context, allows for prioritisation based on what’s relevant to your specific environment. Now, using a subset of threat data that has been curated into threat intelligence, the additional overlay allows the SIEM to generate fewer false positives and encounter fewer scalability issues.

 

Incident Response:

The current approach to Security Orchestration, Automation and Response (SOAR) has focused on automating processes. The challenge is that when applied to detection and response, process-focused playbooks are inherently inefficient and complex because the decision-making criteria and logic are built into the playbooks and updates need to be made in each playbook. This complexity grows exponentially as you increase the number of playbooks. Automating and orchestrating noisy data just amplifies the noise.

With ThreatQ TDR Orchestrator you can take a simplified, data-driven approach to SOAR, where the data, or information, drives playbook initiation and data learned by actions taken is used for analytics and to improve future response. Putting the “smarts in the platform” and not individual playbooks provides for simpler configuration and maintenance, and a more efficient and effective automation outcomes. Users can curate and prioritise data upfront, automate what’s relevant and simplify actions taken.

 

Previous post Why Ransomware is such a threat to business continuity
Next post Happy Birthday ‘The Internet’ – New Research Shows UK Usage Continues To Rise