The case for Continuous Security Validation

The case for Continuous Security Validation

To achieve cybersecurity readiness, an organization should be able to make decisions on the basis of real data and evidence of security outcomes. Too often, security controls are misconfigured, poorly integrated with monitoring systems and/or the people and processes surrounding them break down.

After decades of spending on cybersecurity teams and technologies, from next-generation firewalls to MDR, the entire industry is transitioning away from a period of hyper-focus on investment and towards a focus on outcomes and metrics in security effectiveness. This transition was driven by two distinct events: the escalating threat in cyberspace, from the Russian government’s intrusions into critical infrastructure to ransomware attacks on civil infrastructure, and the second but related feeling that the investments made over the last decade were failing to stop intruders. Even as security teams invested in the people and technologies required to stop breaches, intruders kept breaking through.

Data Study

The findings from an ATTACKIQ study revealed that on average, the EDR controls in their customers’ environments only stopped the top seven adversary techniques 39 percent of the time in 2021. This high degree of failure is not the fault of security providers, as their controls stop the top techniques. Nor is it the fault of customers, who are some of the most advanced cybersecurity teams in the world. The problem is embedded in the system itself.

Complex organisms and organisations need data to understand how well their inner workings are performing. Like car engines, the human body, or the U.S.military (which has for years conducted multi-factor analyses of its “readiness” to perform key missions), security controls of people, processes, and technologies need to be assessed constantly against real threats to validate their effectiveness. A car engine has a check engine light. The human body goes to regular check-ups and now human beings wear wearable devices to track their pulse, exercise and steps taken, and oxygenation. The U.K. military trains constantly on land, air, sea, space, and cyberspace to prepare for potential conflicts. cybersecurity teams have until now lacked a means to exercise, measure, and report on their health. The result is a mismatch. Even the most effective technologies and the most effective teams will fail to stop the adversary part of the time if they do not test and train. if teams are not continually trained and tested to defend the battlespace then the failure rate will never improve.



The good news is -

The issue is that organizations aren’t testing enough. Information technology, like the human body, is not static. Misconfigurations, infrastructure changes, and team transitions all lead to degraded security control performance over time. Only by testing controls against known threats can teams generate the data they need to understand performance, tune up, get battle hardened and improve effectiveness.

Security teams can improve their cybersecurity readiness through continuous testing and security control validation, running assessments aligned to the MITRE ATT&CK framework against the total security program. Embedding Continuous Security Validation into your own Security Governance and Assurance architecture is where the true value will be realised and as it matures, organisations can then to pivot towards measuring their security operations Return On Investments, Value for Money and focus on the key metrics that defy so many Cyber Defence teams, ‘Mean Time To Detect’ and 'Mean Time To Remediate' security incidents.

Why Alchemmy?

At Alchemmy, we understand that a lack of confidence in situational awareness in Cyber Security teams has been a problem for over a decade and we can help organisation's security teams to shift the dial from dealing with overwhelming 'alert noise' of very little value to a proactive SOC team that is focused on the correctly calibrated alarm signals on the SOC console. We use the ATTACKIQ Breach Attack Simulation platform to train and calibrate SIEM/EDR analytics engines, identify gaps in configuration and tease out process failures in security incident management.

However, whilst deploying a Breach Attack Simulation platform such as ATTACKIQ to calibrate the security controls is one requirement, there is more to it than just a tool. Planning and embedding a continuous security validation process requires an organisational shift toward high performance Purple teaming. This is where your more maverick penetration testers (Red Teams), diligent Threat intelligence team and time constrained security operations analysts (Blue Teams) all interlock to build a Threat informed Defence who are constantly alert to the threats that the organisation faces (who's coming after us?) and more confident in the tools that alert them to a threat and the processes that enable a rapid response (Time to Detect/Respond). In other words separating the signal from the noise.

We have a shared passion to bring all this together for our clients to enable a shift away from the broken model of tooling that is ineffective, poorly configured and integrated and processes that are reacting on assumptions rather than evidence based. We want to grow a community that shares our passion and wants to join our mission!

?Conclusion

Both the UK’s?NCSC?and the US’s?CISA?recommend continuous, automated security testing and we also think this is most useful when aligned with MITRE ATT&CK framework. This is why Alchemmy use the ATTACKIQ platform to evaluate security effectiveness and demonstrate the impact of the real risks facing organisations. Armed with this evidence, we’re then able to help prioritise the right actions to improve resilience and show Boards where to invest to stay current with the evolving cyber threat. In order to bring this to life we engage with CISO's, SOC leaders, lead analysts and incident responders to join all the dots for a successful outcome.

要查看或添加评论,请登录

Steve Eyre的更多文章

  • The security controls problem space

    The security controls problem space

    Over the last few years my career has pivoted from designing security solutions to consulting on security operations…

  • Providing trustworthy Security Solutions Consulting

    Providing trustworthy Security Solutions Consulting

    I'll begin with an Einstein quote: "If I had an hour to solve a problem and my life depended on the solution, I would…

    2 条评论
  • Fitting Breach Attack Simulation (BAS) into your security assurance program

    Fitting Breach Attack Simulation (BAS) into your security assurance program

    Today we have three main strands of infrastructure technical security assurance testing: Identification and analysis of…

    2 条评论
  • High level summary

    High level summary

    EDR solutions do an impressive amount of work across a gigantic complex attack surface (Windows/Linux/Mac Operating…

  • SIEM is nothing without People & Process

    SIEM is nothing without People & Process

    In the crazy world of Security Operations and Cyber Defence the Unicorns come and go like Pop music's one hit wonders…

    1 条评论
  • If data is the new Gold then it's Integrity has never mattered more!

    If data is the new Gold then it's Integrity has never mattered more!

    In IT Security, Data is what we protect in the main, "it's all about the data, stupid!" What are we protecting?…

    2 条评论
  • Our Perception of Risk

    Our Perception of Risk

    What a subject to tackle on a late Friday afternoon! Mostly, when people talk about risk one tends to get heavy eyed…

  • SIEM, EDR, NSM dilemma's?

    SIEM, EDR, NSM dilemma's?

    Some opinions and predictions are out of the 2020 starter blocks already on the future of SIEM. Some say it's glory…

    4 条评论
  • Managed SOC. Where now?

    Managed SOC. Where now?

    It’s fair to say that the past and to some degree present life of MSSP's has had a chequered history. The Industry has…

  • SOC - survivors guide

    SOC - survivors guide

    Almost 10 years ago i landed a role as a security operations technical lead and on the first day of the job i was told…

    8 条评论

社区洞察

其他会员也浏览了