Three Wishes to Revitalize SIEM and Your SOC - Security Boulevard

Three Wishes to Revitalize SIEM and Your SOC

How many times have you hoped that a magic genie would somehow appear and grant three wishes? If the wishes were for your SIEM or security operations team, what would that be (and what kind of security certifications would you require of your genie)?

The most common wish I encounter is for a security team that delivers a new level of effectiveness. The other two wishes are usually greater efficiency—the idea of being able to do more with less—and being able to hire qualified and experienced candidates for positions that have remained unfilled for long periods of time. (Enterprising and budget-savvy CISOs may substitute one of these for wishing for an additional three wishes, if that is permissible.)

Efficiency for the Security Operations Team

While most organizations pride themselves on the overall quality of the security team and the excellence of their work, most would admit that this team is not really efficient. Too many factors work against it. The odds often seem to be in favor of attackers, and security professionals are left with a difficult, if not impossible, task. Most teams describe being inundated with alerts and incidents that may or may not prove valuable. Choosing the right place(s) to focus their attention is often based on hunches and educated guesses.

Besides a wish-granting genie, what would significantly change efficiency levels of the security team for the better? More alerts? Less alerts? More data? More intelligent data? Most security operations teams believe they have plenty of data—generally, too much. Investigations after a successful data breach usually show that the data and signs of the progressing attack were there all along; the problem was finding them in time and being able to respond quickly to mitigate or curtail theft or damage.

Despite these “20/20 hindsight” accounts, there still is a lack of appropriate data for many security teams. The siloed nature of security tools often impairs this capability. Attack campaigns – both automated and human-run – are multifaceted, and involve an expanse of both attack surface and infrastructure. Quickly and accurately finding signs of an in-progress attack requires data from many sources, including security tools, logs and strategically deployed sensors. Data from multiple tools needs to be combined. Small and otherwise inconsequential data points can be combined to show activity that might otherwise be undetectable. Other data points could be better identified as anomalous, but not indicative of an attack, eliminating false-positive alerts that greatly undermine overall security team or SIEM efficiency and effectiveness.

Reducing or eliminating false positives and false negatives would be an ultimate goal, and the closer teams can come to attaining it, the more efficient and effective they will become.

Data: A Blessing and a Curse for Security Teams

So, a full 360-degree view must come from data. At the same time, data must come quickly, ideally in real-time. Batch transmission or loading may create incomplete analysis and lead to faulty conclusions. The data set should be as complete as possible. For instance, endpoint data should provide details of who, what, how and when rather than merely detail an event by itself. Lack of clarity and context is a major contributor to inefficiency and ineffectiveness.

Top security professionals are good at correlating data to find actionable results. It takes a fair amount of work and expertise, and manually-performed correlation and analysis can only be performed on a relatively small amount of data. In this way, data can be a blessing and a curse. It’s a curse when there is far too much for the security operations team to handle. It can be a blessing when good automation is in place that can produce good correlations and perform accurate analysis. This kind of capability vastly increases the efficiency and effectiveness of the security team, because it acts as a multiplier of their efforts—far more with less—and enables all relevant data to be reviewed. It also enables professionals to do what they do best. Rather than sifting through massive amounts of data, teams can pinpoint issues quickly and further investigate them. Real security threats can be met with quick and decisive action.

While a magic genie would be nice, new technologies and procedures are helping security teams reinvent their efforts and achieve far greater levels of effectiveness and efficiency. Gartner and other analyst firms review these extended detection solutions and practices and understand their game-changing potential. Organizations that are trying to evolve their security operations teams and gain an edge against attackers should consider some of these recent technological developments. This new level of effectiveness is no longer a fairy tale or something from a faraway kingdom.

Featured eBook
Managing the AppSec Toolstack

Managing the AppSec Toolstack

The best cybersecurity defense is always applied in layers—if one line of defense fails, the next should be able to thwart an attack, and so on. Now that DevOps teams are taking  more responsibility for application security by embracing DevSecOps processes, that same philosophy applies to security controls. The challenge many organizations are facing now ... Read More
Security Boulevard

Albert Zhichun Li

Albert Zhichun Li is Chief Security Scientist at Stellar Cyber. He has over 15 years of experience in cybersecurity research. He has filed 40+ US patents and published many seminal research papers in top security, AI and system academic conferences, such as IEEE Security & Privacy, USENIX Security, ACM CCS, and NDSS in security, KDD, CIKM, IJCAI and SDM in AI, and ACM SIGCOMM, USENIX NSDI and USENIX ATC in systems. His research was featured in influential media outlets such as the Wall Street Journal, MIT Technology Review, and ACM Tech News, etc. He also served on the program committees of top academic conferences (ACM CCS, NDSS, INFOCOM). Albert has led teams to turn research ideas from scratch into large-scale research prototypes with full software stacks. Previously, at NEC Labs, his team has developed and released more than 500,000 lines of code to Business Units (BUs) as foundations for released products and cloud services, including security big-data platforms and AI algorithms. He also contributed to customer engagements and PoCs. He holds a Ph.D. in Computer Science from Northwestern University.  

albert-zhichun-li has 1 posts and counting.See all posts by albert-zhichun-li