How to Transform Alert Fatigue Into Proactive Security Management — 4 Must-Read Blog Posts

The cybersecurity talent shortage is real, with an estimated 1.8 million unfilled roles expected by 2020. And with 72% of CISOs claiming that their teams are facing alert fatigue, there’s not a lot of margin for error when it comes to getting accurate, context-rich alerts in front of under-resourced teams.

Traditional approaches to managing security alerts have often driven teams into a reactive mode where they’re overwhelmed by huge volumes of alerts or spend way too much critical time gathering information and digging around in log files. If this proliferation of data can be transformed into actionable intelligence, however, teams can become significantly more proactive and reduce risk over time.

Today, we’ll take a look at four must-read Threat Stack blog posts that provide great advice on how you can more away from reactive, ad hoc tactics and adopt a more structured, proactive approach by making alerts a key element of your overall information security strategy.

1. Ending Alert Fatigue: Threat Stack and VictorOps on Modern-Day Security and Incident Management

Based on a webinar we presented with VictorOps, this post points out that alert fatigue occurs when Security and DevOps teams become so desensitized to alerts through the “normalization of deviance” that even truly anomalous activities may be ignored.

It’s difficult to justify tolerating or avoiding these problems, so this post outlines seven best practices for combatting alert fatigue:

  1. Make All Alerts Contextual and Actionable: Without context you can’t determine a course of action.
  2. Reduce Redundant Alerts: Cut inefficiency and overload by reducing and consolidating alerts whenever possible.
  3. Designate Alerts to a Single Source or Timeline: Unify security alerting by streamlining security functions into a single place like Threat Stack’s Cloud Security Platform®, and use an open communication channel like Slack to stream alerts, provide teamwide visibility, and allow for open discussions to resolve issues.
  4. Adjust Anomaly Detection Thresholds: Remember to fine tune your baselines on a regular basis. This will dramatically cut down on the number of alerts about nothing.
  5. Ensure That Correct Individuals and Teams are Alerted: Make sure all your team members have the right access to the right alerts so they can take effective action without wasting time and expertise.
  6. Customize Personal Notifications: If it’s not a high-severity alert, don’t let it trigger a page that wakes you up in the middle of the night.
  7. Revisit and Adjust Regularly: As you know, security is never a once and done activity. Keep fatigue at bay by continuing to make alerts meaningful and honing processes so they let you remediate effectively.

Read the full post here. (Note: This post contains a link to the complete Threat Stack / VictorOps webinar.)

2. How to Use Alerts to Become More Proactive About Security

While many companies continually react to alerts, true security maturity means using actionable alerts to proactively become more effective. In this post, Christian Lappin discusses best practices for developing a more proactive approach to alerting:

  1. Eliminate Ad Hoc Alert Handling: Ad hoc processes waste resources and lengthen mean time to know. It is always a best practice to replace these with standardized, repeatable, automated processes for triage and response.
  2. Optimize Alert Management: As we pointed out earlier, it can be difficult to determine the cause of a problem if you don’t have context. One of the most effective ways of adding context is to integrate your organization’s security tool with the incident management and chatops tools that your Ops and Dev teams already use (such as PagerDuty and Slack) so they can view all the data about an event in a single place.
  3. Perform a Response Audit: Defining, streamlining, and automating your alert processes is a great start, but you need to conduct response audits to confirm that you’re following these processes and are strengthening them through continual process improvement. With the results of an audit in hand, you can improve your strategy and make your entire alerting process more proactive over time, while reducing your organization’s overall risk.

Read the full post here.

3. Threat Stack Introduces Alert Trends

This post describes the “Alert Trends” view we added to Threat Stack’s Cloud Security Platform®. The name says it all: Alert Trends is the visualization of alert history over time.

Instead of showing a single point in time, the feature lets you see alert trends so you can identify the areas you need to focus on. Alert Trends enables you to:

  • Quickly detect peaks and valleys in alerts, navigate to anomalies, identify trends, and take action either by creating a rule or a suppression to handle the identified behavior
  • Immediately narrow the time window of alerts to minutes, hours, or days
  • Reduce the time needed to review alerts and therefore drive faster resolution times


Read the full post here.

4. Threat Stack Introduces Rapid Baselining — Transforming Data Into Actionable Intelligence

This post gives a detailed introduction to Rapid Baselining — a powerful upgrade to the way that Security and DevOps professionals find and identify areas of risk within their cloud infrastructure. Rapid Baselining groups alerts based on the associated rule and the metadata within the alert. The goal is to give you enhanced insight into alert trends and more actionable data from which you can continuously improve your security posture.

To maximize the value of Threat Stack’s Cloud Security Platform, Rapid Baselining provides a way to more effectively leverage the data at hand and tune alerts in your unique environments. By grouping alerts into logical subsets, you can create stronger workflows around:

  • Investigating Anomalous Behavior: Rapidly establish a baseline and obtain much clearer insight into the activity on your hosts. By being able to create groupings, this feature also allows you to highlight unique or rare alerts, which are often indicators of malicious or unsafe activity.
  • Alert Tuning: Once a baseline is established, you can quickly tune rules so they surface behaviors that are important to you.
  • Strengthening Security Posture: Leverage alert metadata and organize it in a new way to easily find unhealthy behavioral patterns across the infrastructure. Catching these behaviors early and remediating the underlying causes will help you continuously improve the overall security posture of your organization.

With Rapid Baselining, Threat Stack is giving you a new way to investigate alerts and find patterns in your infrastructure. Regularly acting on those findings, tuning your alerts appropriately, and remediating unsafe behaviors will drive down the risk that your organization is exposed to.

Read the full post here.

Looking Ahead . . .

If you’re suffering from alert fatigue, or you’re not getting value out of your alerts because you don’t have a structured approach to managing them, it makes sense to replace your current ad hoc tactics with a more proactive approach. We hope the four blog posts discussed above offer the motivation and information you need to start bringing greater control and management to your alerting processes.

  • If you’re uncertain about where you stand in terms of proactive security, take our 3-minute Cloud SecOps Maturity Assessment.
  • And if the prospect of setting up proactive alerts seems overwhelming because of constrained resources or lack of expertise, you don’t need to go it alone. The Threat Stack Cloud SecOps Program℠ allows you to take advantage of our experts to help you monitor and triage alerts proactively to stay ahead of threats.

*** This is a Security Bloggers Network syndicated blog from Blog – Threat Stack authored by Raymond Saurez. Read the original post at: