Thank you for your interest in our newsletters. You will receive an email shortly to confirm your subscription.
Riaan Naudé, Director of Consulting, UK
9 mins read
Building and maintaining an effective detection capability is a significant undertaking for a business of any size. Not only is the technical challenge vast, with a range of attack types and systems to defend, but you also need highly skilled people and effective processes.
In an ideal world, the work of a Security Operation Center (SOC) would be exciting all the time. (I’ll use SOC as the catch-all term for the team responsible for detecting threats.) The detection capability that you build would continue to function as your environment changes. It would remain up-to-date and consistent across offices and regions, and your users wouldn’t click on things that say, “click here”. You could focus your time on fending off the most advanced attackers.
Unfortunately, we don’t live in an ideal world, and developing a consistent detection capability is a challenge for SOCs. Why?
Yet despite the obvious challenges, investing in your detection capability will pay dividends. According to Verizon, a quarter of breaches remain undetected for a month. Once an attack has been detected, your SOC has an opportunity to respond; closing the gap between detection and response reduces the risk posed to the organization.
How can SOCs achieve this? Consider the following goals:
All environments undergo constant change. The larger the environment, the more changes there will be. These changes could relate to the network, the infrastructure, and even security controls, and they all have the potential to impact detection capability. For example, a log source could stop ingesting, or a network segment could have isolated key hosts. Even in a fantasy world where threats don’t evolve, this presents a window of opportunity for attackers. The goal of regression testing is to ensure that the detection capability you’ve built in the past continues to function consistently. This is where tooling comes in.
Using attack simulation tooling, you can replicate a wide variety of attacker actions to test what you are capable of detecting and whether your logs and alerts are effective. Now you can continuously monitor and maintain your detection capability as you build it. This can be executed in multiple locations across your estate to understand what you can detect and where in your environment you can (or can’t) detect it.
Such tooling exists and, in my opinion, every organization stands to benefit from using it. During Purple Teaming exercises, for example, it’s common to identify a detection capability that doesn't operate as intended, either through a fault in its initial implementation or due to other environmental changes. Testing your detection capability with attack simulation tooling can uncover these blind spots on a continual basis, with less effort than doing so manually.
Testing your detection capability manually requires collaboration between SOCs and red teams. Automating this takes the pressure off both teams. SOC analysts can focus on the more exciting work of building capability, rather than manual maintenance, while red teams can focus on building and simulating realistic, complex attacks.
Alas, no. Tooling alone won’t carry you on the journey to creating a high-performance SOC. If set up and used correctly, attack simulation tooling can provide the data needed for SOCs to improve, but it’s how you use this data to drive long-term improvements that generates real value.
For instance, mapping your control coverage to MITRE, and overlaying that with threat intelligence, will provide significant coverage. Add in the technical validation from attack simulation tooling and you can put this theory into practice, gathering empirical data that confirms (or denies) how you perceive your capability, and thus your risk mitigation.
Start by thinking like an attacker and looking at the whole picture. Consider the following key questions and work on sub-strategies when answering them:
Being able to answer questions like these is the crux of managing the risks associated with a cyber attack. It’s about understanding the battlefield and what you have in your armory. The intricacies of your detection capability and your preventative controls should be a surprise to your attacker, not to you. They’re your home-field advantage.
The challenge, as I have mentioned, is that the picture is continuously changing. By using tooling to highlight inevitable fluctuations in detection capability, and continuously contextualizing this with threat intelligence, you can successfully prioritize actions and remediations based on real risks.
Continued investment is necessary both for maintaining the detection capability you already have and for progressively improving it. To ensure investment, it helps to provide evidence of the dynamic nature of the problem. In addition, continuing to provide such data and acting upon it will clearly demonstrate the Return on Investment (ROI) over time.
So, with some hard work, more data, and a clear focus, you can serve up a big slice of ROI pie whilst still focusing all your SOC efforts on doing the interesting work: detecting better and securing your business.
Director of Consulting, UK
I am a London-based South African with a passion for people and security. I have been in the security industry since 2009, after starting my IT career as a desktop support technician. I like to share my thoughts and opinions to get people thinking, talking, and debating security.