Maximising your investments through security automation
Article by ThreatQuotient APJC, regional director, Anthony Stitt.
Let’s face it, we’ve talked about security automation for years. We’ve grappled with what, when and how to automate. We’ve debated the human vs machine topic. And at certain points, when we’ve been “burned” (automatically shutting down systems in error), we’ve wondered if there’s any place at all for automation. But in our heart of hearts, we’ve known for years that automation is the future. Now the future is here.
While most organisations had at least minimal automation of key security and incident response (IR) processes, the events of 2020 served as a tipping point. A new report discusses how the global pandemic forced many organisations to accelerate their automation plans, where they prioritise their investments and the plans they have for the future. The survey spanned companies of all sizes, representing a diverse blend of industries and operations in North American, Europe, Asia Pacific and Africa.
Some of the key findings include:
- Nearly one-third of organisations indicated that their plans for automation accelerated because of the COVID-19 pandemic.
- More than 80% of organisations have at least partial automation of key security and IR processes, up from 47% in 2020.
- Drilling deeper, IR processes saw the most significant growth in automation – with extensive automation jumping nearly 18%, from 10.5% in 2020 to 28.3% in 2021.
- Security operations and event or alert processing remain the top area for automation, with 35.5% reporting extensive automation.
- The future looks bright for security automation, with 85% planning on automating key security and IR processes in the next 12 months alone.
As you look to the future and use these survey results to help better understand how to expand your use of automation within your security operations, it’s important to consider when to apply automation within the security lifecycle to maximise business value. We have long believed that data is the lifeblood of detection and response automation, so the key to effective automation starts with data. Let’s take the two primary use cases in the report, Alert Triage and Incident Response, as examples.
Analysts are inundated by the number of alerts, generated by noisy SIEM rules and default defence infrastructure, that require human attention. In an attempt to reduce the volume and velocity of security alerts they must tackle on a daily basis, analysts apply external threat data, and threat intelligence feeds directly to the SIEM, but challenges continue for two main reasons.
First, the amount of external threat data is staggering. Sending all of this data directly to the SIEM for correlation results in tons of non-contextual alerts, each of which requires significant work by an analyst to research. Second, there is a lack of decision support capabilities in current tools to provide additional context and understanding to determine relevance before applying threat intelligence feeds directly to the SIEM. Prioritisation is imperative to focus and determine the appropriate next actions to take during the alert triage process.
The current approach to Security Orchestration, Automation and Response (SOAR) has focused on automating processes. The challenge is that process-focused playbooks are inherently inefficient and complex when applied to detection and response because the decision-making criteria and logic are built into the playbooks and updates need to be made in each playbook. This complexity grows exponentially as you increase the number of playbooks. Automating and orchestrating noisy data just amplifies the noise.