+ All Categories
Home > Documents > MDR Framework Simplified for Security Operation Centers

MDR Framework Simplified for Security Operation Centers

Date post: 23-Mar-2022
Category:
Upload: others
View: 5 times
Download: 0 times
Share this document with a friend
12
Augment Your SOC with Advanced Threat Detection and Response MDR Framework Simplified for Security Operation Centers WHITEPAPER Author: Rajat Mohanty CEO www.paladion.net
Transcript
Page 1: MDR Framework Simplified for Security Operation Centers

Augment Your SOC with Advanced Threat Detection and ResponseMDR Framework Simplified for Security

Operation Centers

WHITEPAPER

Author:

Rajat MohantyCEO

www.paladion.net

Page 2: MDR Framework Simplified for Security Operation Centers

AUGMENT YOUR SOC WITH ADVANCED THREAT DETECTION AND RESPONSE02

OverviewSecurity teams are always on the lookout to enhance their defensive capabilities against new threats. However, Security Operations Center (SOC) are failing to counter today’s most dangerous threats: targeted and unknown attacks.

Targeted attacks are very different than last generation’s most common cyber attacks. With targeted attacks, cyber criminals spend a greater amount of time exploring sophisticated attack methods to carry out long-term large-impact breaches. New malware and fresh attacker TTPs also go undetected by traditional monitoring systems. Today, as the volume and sophistication of these new threats grows, every organization must ask, “Does my SOC detect and respond to targeted and unknown attacks?”

Unfortunately, most SOCs do not have deep enough detection or fast enough response times to mitigate targeted attacks. Organizations must adopt AI-driven Managed Detection and Response (MDR) to protect themselves from today’s worst threats.

In this paper, we describe how you can adopt advanced detection and response capabilities by augmenting your existing SOC with AI-Driven MDR.

Page 3: MDR Framework Simplified for Security Operation Centers

Traditional SOCs utilize rules to detect threats in which the attack methods are known. These include AV signatures, or rules on IPS, WAF, SIEM, and others. Yet these security approaches fail when criminals utilize unknown attacks that do not follow known attack methods.

An increasing number of targeted attacks utilize some form of unknown attack method, making the traditional, rules-based security systems deployed by SOCs insufficient to effectively eliminate modern threats. To counter these modern threats and their unknown attacks, security teams need to deploy additional, advanced analytics capabilities made possible by next-generation artificial intelligence for cybersecurity, applied in two scenarios:

When the attack methods are unknown, analytics are primarily used to either detect anomalies (in traffic, protocols, user access, and data usage) or to detect a pattern similar to earlier breaches. This occurs in the following scenarios:

• Anomaly detection analytics that focus on outliers to a population’s behavior, abnormality from past behavior, deviation to a baseline, or the like.

• Pattern detection analytics that focus on fraudulent behavior, or connecting events to uncover linked attacks.

Unknown Attack Methods:

Figure 1: Advanced security analytics group attacks into two dimensions, according to Threat Actors and Attacks. Traditional SOCs and MSSPs operate best within the top-right quadrant, but are blind to the bottom-left quadrant.

AUGMENT YOUR SOC WITH ADVANCED THREAT DETECTION AND RESPONSE 03

¹ Market Guide for Managed Detection and Response Services, 11th June 2018² Now Tech: Managed Detection and Response (MDR) Services, Q2 2018

Detect Deeper Threats by Deploying the Power and Accuracy of AI-Driven MDR

1

Known Threat Actors

Unknown Threat Actors

KnownAttacks

UnknownAttacks

• Statistical models, behavior analysis, peer analysis• Machine learning• Visual analysis

• Threat feed based detection logic• Threat modelling and attack tree enumeration• Watchlists/Blacklists

• SI

EM R

ules

• Si

gnat

ure

mat

chin

g (I

PS, W

AF,

D

LP, A

V)

• W

atch

lists

/bla

ck lis

ts

Page 4: MDR Framework Simplified for Security Operation Centers

By using analytics to detect Unknown Attacks deployed by Unknown Threat Actors, an AI-driven MDR service finds more needles within a larger and more diverse set of haystacks than traditional SOCs. These advanced analytics detect deeper threats, and raise alerts on attacks SOCs miss-stopping breaches that traditional security systems would not notice on their own-while also augmenting the capabilities of traditional security monitoring of Known Attacks from Known Attackers.

The result of augmenting a traditional SOC with AI-driven MDR: better detection of more potential breaches.

AUGMENT YOUR SOC WITH ADVANCED THREAT DETECTION AND RESPONSE04

Not all alerts are created

equal. They need to be

seen in the context of

each organization.

Only then can SOC team

focus on critical alerts for

investigating further and

for remediating the threats.”

The security industry is also investing in tracking attackers and studying their attributes. Within a comprehensive AI-driven MDR program this activity is called Threat Anticipation, and it combs through a large amount of open source and underground data to obtain insights on attackers.

• In Threat Anticipation, advanced security analytics are deployed to collect and apply threat intelligence to a variety of traffic sources, such as packet captures, netflow, and proxy, emails, DNS and Identify, and access data. This is performed by monitoring watchlists and blacklists of IP/URLs/ files, detecting Indicator of Compromise (IOCs), and enumerating attack trees.

Unknown Threat Actors: 2

Page 5: MDR Framework Simplified for Security Operation Centers

Detecting more, and deeper, threats is just one benefit of enhancing SOCs with AI-driven MDR services - the ability to respond quickly to block an attacker’s access is equally important.

With targeted attacks, the attacker’s dwell time can vary from weeks to months. Even if the attacker’s activities trigger detection from traditional security services during this dwell time, a SOC is rarely able to respond to that threat fast enough to prevent the attacker from achieving at least some of their objectives.

While many organizations understand the need to detect more, and deeper, threats, fewer organizations give improving their response capabilities the attention this upgrade deserves. But by augmenting an existing SOC with a comprehensive managed detection and response program, complete with cyber security artificial intelligence, an organization can efficiently enhance their response capabilities within the following areas.

Context related parameters: Every alert needs to be scored based on its asset, user, vulnerability, and network context. The asset context scoring is based on what the asset is, how critical it is to business, and the value of data stored or processed by it. The user context scoring similarly is based on what level of privileges the user has on systems, how sensitive the user role is in the organization, and what the user status is (employee, contractor, separated, etc).

The vulnerability context scoring is based on the status of that vulnerability relevant to the threat alert. Finally, the network context

An SOC can easily become flooded with alerts—even when an MSSP is involved. This leads to SOC teams becoming overburdened, and missing the true alerts that lead to security breaches. The first challenge to responding faster to threats is to reduce false positives, and to prioritize alerts.

AUGMENT YOUR SOC WITH ADVANCED THREAT DETECTION AND RESPONSE 05

Reduce “Noise” through Automated Triage

Stop Threats Faster by Leveraging the Speed of AI-Driven MDR

Not all alerts are created equal. They need to be reviewed within the broader context of the organization to determine the most dangerous potential threats. From there, the SOC team can focus only on those critical alerts that require further investigation and threat remediation.

For example, a DLP alert is commonly triggered based on keywords configured by an organization or by fingerprinting certain type of documents. This leads to a high number of false positives. One way to triage this would be to look at the historical information on the desktop’s outgoing data over a period of time correlated with DLP alert and any alert from anti-malware on the same desktop.

The context around the desktop user can also be correlated to understand, for example, if the user is a contractor or an employee in exit phase. This leads to better rescoring or prioritization as compared to only the DLP alert being looked at in an SIEM console or DLP console.

As a generic approach, the triage process needs to consider the following aspects:

scoring is based on the sensitivity of the network segment in how much the alert is seen and its likelihood to propagate to more critical assets.

History of the alert: Given that most target-ed attacks will be a campaign and not just a one-off attempt, each alert should also be prioritized based on what was observed in the past. From historical data, alerts should be score-based on their occurrence in the past, it prevalence across assets, its deviation from normal volume and its linkage to other alerts that potentially forms the cyber kill chain.

Threat Intel: One application of threat intelligence is to detect attacks using analytics as described earlier. The other usage of threat intelligence is to prioritize the alerts. Alerts containing bad IPs, URLs, known IOCs need immediate attention and hence are scored higher.

Page 6: MDR Framework Simplified for Security Operation Centers

Once an alert comes up with high triage score, it needs to be investigated by SOC analysts, in a manner that will answer four questions:

First, that artificial intelligence is required to quickly process the vast volume of data involved in prioritizing alerts.

Second, that even though these parameters are common across organizations, they must be combined, assigned weight, and scored in a unique manner custom tailored for each organization. An orchestration platform requires the capability to pull in data related to context, history, threat intelligence, and automate the scoring of alerts for faster triage.

Similar triaging can be done on IPS or WAF alerts by correlating the alert to the existence

Context related parameters: Every alert needs to be scored based on its asset, user, vulnerability, and network context. The asset context scoring is based on what the asset is, how critical it is to business, and the value of data stored or processed by it. The user context scoring similarly is based on what level of privileges the user has on systems, how sensitive the user role is in the organization, and what the user status is (employee, contractor, separated, etc).

The vulnerability context scoring is based on the status of that vulnerability relevant to the threat alert. Finally, the network context

AUGMENT YOUR SOC WITH ADVANCED THREAT DETECTION AND RESPONSE06

Effectively automating triage requires two realizations

Automate Investigation and Orchestrate Remediation

• What are the attacker attributes? (i.e. Who is the attacker, and what else can be known about their techniques, tools and tactics?)

• What is the damage on the asset?

scoring is based on the sensitivity of the network segment in how much the alert is seen and its likelihood to propagate to more critical assets.

History of the alert: Given that most target-ed attacks will be a campaign and not just a one-off attempt, each alert should also be prioritized based on what was observed in the past. From historical data, alerts should be score-based on their occurrence in the past, it prevalence across assets, its deviation from normal volume and its linkage to other alerts that potentially forms the cyber kill chain.

Threat Intel: One application of threat intelligence is to detect attacks using analytics as described earlier. The other usage of threat intelligence is to prioritize the alerts. Alerts containing bad IPs, URLs, known IOCs need immediate attention and hence are scored higher.

of the corresponding vulnerability, the value of the asset being attacked, and threat intelligence related to the attack source. SIEMs are also capable of doing this but have limitations due to a lack of dynamic context integration capability.

Vulnerability information, for instance, is not static. It is changing all the time as new vulnerabilities are discovered in platforms every day. Similarly, asset components and services keep changing and corresponding vulnerabilities change accordingly. Hence, vulnerability information is a moving target.

SIEMs have tried to solve this by looking at vulnerability information as static and, as a result, have not been effective in correlating vulnerability with the attack. In practice, this means that there should be a mechanism that enables the system (SIEM/supporting technology) to use available vulnerability information to predict if a specific vulnerability exists corresponding to the event that is being analyzed. This can lead to successful triaging based on vulnerability and asset data. (A blog on dynamic context information is available at: http://www.paladion.net/spatial-intelligence-soccer-and-security-monitoring/)

• Is it just one incident or part of a past campaign?

• If it is a campaign attack: What are the collateral damages, and what other systems are impacted?

Page 7: MDR Framework Simplified for Security Operation Centers

Rushing to mitigate an alert without answering these questions will only address the symptoms; it will not remove the root cause. In a traditional SOC, investigation can be very time consuming as it requires time and effort to collect data from various sources, as well as additional tools to analyze the variety of high volume data.

An organization can answer these questions much easier—and much faster—if they utilize an MDR program’s artificial intelligence platform to automate the process, to quickly pull in data from various sources, which ultimately provides a single window for data analysis. In addition, some of these questions are easier to analyze visually through techniques such as tree maps, linked node graphs, scatter plots, and bubble charts, which can also be produced much faster with a cybersecurity AI platform. For faster investigation, organizations need to deploy a security orchestration platform that can automate these tasks, and they can best gain access to such a platform by augmenting their existing security services with an AI-driven MDR program.

(One last note: SOCs must also build run books for commonly known attacks to ensure that investigation is thorough, and that the response is not dependent upon the skills of the analyst alone. These run books can be automated through workflow tools or built into an MDR partner’s orchestration platform, provided it has workflow management. By doing so, it becomes easier to manage known attacks as they occur and frees up the SOC team to work on advanced attacks.)

AUGMENT YOUR SOC WITH ADVANCED THREAT DETECTION AND RESPONSE 07

• What are the attacker attributes? (i.e. Who is the attacker, and what else can be known about their techniques, tools and tactics?)

• What is the damage on the asset?

• Is it just one incident or part of a past campaign?

• If it is a campaign attack: What are the collateral damages, and what other systems are impacted?

Page 8: MDR Framework Simplified for Security Operation Centers

AUGMENT YOUR SOC WITH ADVANCED THREAT DETECTION AND RESPONSE08

Think “Use Cases” before Technology/

To upgrade a SOC supported security posture, first identify the use cases for applying analytics, (beyond the generic concept of Unknown-Unknowns and Known-Unknowns). Very often, organizations attempt to launch their new analytics-based advanced detection and response program by simply deploying an analytics platform, and collecting data that only leads to expensive data management and poor output. To avoid this, it is essential to first determine where to apply statistical or machine learning methods, as well as what gaps such methods are covering.

The best way to determine these points to take the example of an unknown malware that is part of an advanced targeted attack. Rule-based systems including SIEM or signature-based systems—including IPS, anti-malware, and WAF—are not efficient enough to detect such attacks on their own, to the point that even the sandbox technology approach fails to detect malware. Why? Because malware software can detect virtual environments and stop executing.

However, malware activity leaves traces within different technologies across the entire IT landscape. For example, most malware send out regular heartbeat information to their C&C server, and proxy logs can reveal

There are three simple steps required to augment your existing security services with AI-driven MDR.

Ready to Utilize AI-Driven MDR? Start Here

data corresponding to this malware beaconing. In the case of advanced malware, the C&C servers may not be on the list of known malicious IP address, but this “heartbeat” information—contained in proxy data—can be detected by applying the concept of entropy.

Entropy in data science terms refers to “uncertainty of data”. When we look at proxy data in general, most of the data sizes corresponding to users communicating with URLs are randomly-based on the website and page being accessed. In this case, when we apply entropy on the byte size of the communication between user and URL, the entropy will be high, owing to a high “uncertainty of data”.

This is because the user interaction data size is not a constant and varies with the interaction involved. On the other hand, if we apply the entropy function on data in which the heartbeat information being beaconed out by malware of the same size and has a similar frequency, the entropy will be zero. This is due to the fact that the byte size is the same for interaction with the C&C URL, enabling us to detect the “unknown” attack even though the attack signature or attacker is unknown.

This is just one example of just one-use case. To apply a complete analytical model in a security system, an organization must drive their application through use cases and not technology deployment.

(Details of use case-based approaches for security analytics and the platform components are available in a separate Paladion white paper “Use case approach for security analytics”)

Page 9: MDR Framework Simplified for Security Operation Centers

AUGMENT YOUR SOC WITH ADVANCED THREAT DETECTION AND RESPONSE 09

Choose a Cybersecurity Artificial Intelligence Platform

Once a set of use cases for analytics is defined, the next step is to utilize the analytics platform and connect the right data sources to it. Since the data size from security technologies and other passive sources, such as proxy, packet captures, netflows, user activity logs, etc. is high, the platform is usually a Big Data platform.

An SOC can look at commercial platforms with built-in analytics that meet their use cases, in addition to the development of their own customized platform. Typical components for own platform, AI.saac, uses HDFS file system, Hive/Hbase for data storage, Spark for real-time processing, Scala/R/Python for statistical analysis, and D3 for visualization.

However, the simplest method to select, and deploy, a cybersecurity artificial intelligence platform is to partner with an MDR provider who has already built, and successfully utilizes, their own platform.

Apply Threat Intel

Threat intelligence is the second pillar for the detection of unknown attacks. In this case, the attack itself is unknown but the attacker’s characteristics are known. SOCs can integrate threat intelligence feeds from external sources to its analytics platform and model rules to detect activities that are linked to such external feeds.

Threat intelligence feeds contain values for typical Indicators of Compromise (IOCs) including IP address, URLs, geo-location, and device profiles. Threat intelligence sources

Due to the comprehensive nature of AI-driven MDR augmentation, applying security analytics and orchestration to an existing security structure will necessitate a change in the roles and structures of SOC teams. Most SOCs have the traditional hierarchical organization structure with analyst (L1 response), senior analyst (L2 response) and SOC lead (L3 response), a structure that works well when the attacks are more uniform.

The current threat landscape has increased the number of roles in an SOC and broadened the skill requirements. There are attacks

A Final Word on Team Structure, and the Need to Restructure

have diversified over the years from niche commercial vendors to CERTs (Computer Emergency Response Team), ISACs (Information Sharing and Analysis Center), OSINT (Open Source Intelligence), global SOCs (Security Operation Center), private sharing within industry verticals, and the government.

Of course, threat intelligence isn’t only external. In the case of a targeted attack campaign, an attacker would be inside the network carrying out multiple attacks against the organization. The need for tracking internal IP addresses and internal IOCs is an interesting perspective that Gartner analysts Oliver Rochford and Neil MacDonald propose in their research note “The Five Characteristics of an intelligence-driven SOC”. Threat intelligence also requires an ai-driven platform not only to capture the IOCs, but also to apply it in the context of internal event information.

Page 10: MDR Framework Simplified for Security Operation Centers

AUGMENT YOUR SOC WITH ADVANCED THREAT DETECTION AND RESPONSE10

ranging from known to unknown, at infrastructure/application/data layers, and those that vary based on the technology being targeted.

Each of these attack types requires different types of detection and response mechanisms. In this context, expecting an analyst to manage all the variations based on seniority is not reasonable.

Core SOC Team

Analysts Investigators 1st Responder SIEM Admin SOC Lead

CIRC Team

IncidentHandler

IncidentResponder

ForensicExperts

CTAC Team

Data Scientists Hunters ThreatIntelligence

PhishingMonitoring

SOC Engineering

Team SOC Architects ContentEngineering

Tool Builders

SOC SMETeam

ProductSpecialists

SIEM Specialists VulnerabilitySpecialists

SOC SupportTeam

Quality Control CISO SOC Admin

AVMT

NetworkScanning

ApplicationTesting

Red Team

SOC roles need more specialization including analysts, hunters, threat intelligence experts, incident responders, data scientists, content authors, forensic experts, and technology specialists. There is a need for more integrated horizontal teams as opposed to vertical hierarchy.

Based on these next generation SOC requirements, a proposed SOC structure is given in the diagram. CIRC stands for Cyber Incident Response Center while CTAC is Cyber Threat Analytics Center.

Page 11: MDR Framework Simplified for Security Operation Centers

AUGMENT YOUR SOC WITH ADVANCED THREAT DETECTION AND RESPONSE 11

Summary

See What Our Customers Have to Say About AI-Driven MDR:

Read the Full Case Study Here: https://www.paladion.net/mdr-case-study-manufacturing-giant-reduces-attacker-dwell-time

Partnering with an AI-driven MDR vendor will augment a SOC’s capability to counter targeted attacks, by adding advanced secu-rity analytics and orchestration capabilities. These capabilities need improved use cases, additional technology platforms, and new sets of roles to produce a truly next-genera-tion security posture. But once implement-ed, the capabilities provided by a true AI-driven MDR partner will increase an orga-nization’s depth of detection and speed of response, to effectively counter undetected targeted attacks.

Paladion’s AI-driven MDR service has powerfully augmented our existing security posture. They tailored their security services to meet our specific needs and deployed their services quickly and simply. They both increased the speed of our detection and response, and done so with a very high-touch, people-first approach that our internal security team loves.

- Chief Information Officer Fortune 500 Manufacturing Company

Page 12: MDR Framework Simplified for Security Operation Centers

Paladion is a global cyber defense company that provides Managed Detection and Response Services, DevOps Security, Cyber Forensics, Incident Response, and more by tightly bundling its AI platform - AI.saac and advanced managed security services. Paladion is consistently rated and recognized by leading independent analyst firms, and awarded by CRN, Asian Banker, Red Herring, amongst others. For 17 years, Paladion has been actively managing cyber risk for over 700 customers from its five AI-Driven SOCs placed across the globe.

ABOUT PALADION

WW Headquarters: 11480 Commerce Park Drive, Suite 210, Reston, VA 20191 USA. Ph: +1-703-956-9468Bangalore: +91-80-42543444, Mumbai: +91-2233655151, Delhi: +91-9910301180, London: +44(0)2071487475, Dubai: +971-4-2595526,Sharjah: +971-50-8344863, Doha: +974 33777866, Riyadh: +966(0)114725163, Muscat: +968 99383575, Kuala Lumpur: +60-3-7660-4988,Bangkok: +66 23093650-51, Jalan Kedoya Raya: +62-8111664399.

[email protected] | www.paladion.net


Recommended