What we've learned while automating SOCs
Lessons Learned with Automation

What we've learned while automating SOCs

It's been over year since Avantgarde Partners has been building and managing security automation orchestration run books for our clients. We have learned quite a bit about not only the implementation process from a technical perspective, but also how it best adopted within an organization. This is especially relevant as a recent report indicated that 60% of security executives surveyed are planning SOC deployments within the next 12 months. With the shear number of information security vendors, expertly mapped out by Lawrence Pingree, a common platform for intercommunication is paramount.

Very early adopters of Security Orchestration & Automation Platforms (or as John Olstik calls SAOPAs) had concrete use cases and expectations of the technology. One of the more counter-intuative discoveries has been that companies with immature security processes actually reap the most benefit, as they are essentially forced to document what their Standard Operating Procedures (SOPs) for certain alerts should be for the first time. This step alone provides immediate value.

Other than a lack of allocate budget, SAO projects took a little time to gain traction because organizations became somewhat lost in the potential of what automation can bring. To combat that paralysis, it is prudent to focus on what functions or activities are taking up the most time, which is why a phishing investigation playbook has been highlighted by the more well-known SAOP vendors: Phantom, Demisto and ServiceNow. We have witnessed the time saved in automating the manual investigation and validation steps of a potentially phished email is anywhere between 30 minutes and 4 hours.

Once there is initial success, we have taken the approach to start up to a half dozen playbooks as an immediate second step, to get the first 80% of each play book developed. There tends to be delays caused by granting access, APIs that may require upgrades, or API limitations in general that require some creativity. This method of “SecDevOps” or “security at speed” initiates a pattern of iteration, then more iteration, then more iteration, which is the appropriate “continual improvement” to model to manage these platforms.

Lastly, another benefit in beginning the journey of security automation and orchestration with a more common playbook like phishing investigation, malware enrichment or even simple ticketing automation is to establish some early wins and begin reporting the metrics upward to management, as well as across departments. The next objective is to find other areas where repeated tasks can be automated, branching outside of security. We have found that the most successful deployments extend into areas outside the SOC and into IT, Networking, even HR, which tend to entrench the technology into the organization.

The benefits of security maturity capability by using SAOPs are real, but so is the effort to realize them. We have begun to take an approach of indexing security maturity levels (loosely) against the CMMI before our engagements to empirically measure improvement. 

Paul D.

AI ? DevSecOps ? DevOps ? FinOps ? Cybersecurity ? Data Security ? Infosec Consultant ? Threat Intelligence ? Security Analytics ? Customer Advocate ? Technologist

7 年

Nice article Robi Papp, we should talk, would love to share what we working on...

回复

要查看或添加评论,请登录

Robi Papp的更多文章

  • A Goldfish Riding a Horse

    A Goldfish Riding a Horse

    As we turn the corner from living through a pandemic into living with an endemic, we also are also set to plow through…

    2 条评论
  • Hindsight is Always 2020

    Hindsight is Always 2020

    The beginning of a new year, no matter which marker is used to take the measurement (Lunar New Year, Persian New Year…

    9 条评论
  • Managing Risk, Without a Rope

    Managing Risk, Without a Rope

    To ride out the seemingly nonstop rain of late, my wife and I cuddled up and watched Free Solo, the remarkable, Oscar…

    3 条评论
  • Stay Gritty, New Orleans.

    Stay Gritty, New Orleans.

    During a short, but inspirational trip to the mystical city of New Orleans as a guest of Exabeam’s SKO, I had the…

    8 条评论
  • Why I chose Corelight . . .

    Why I chose Corelight . . .

    (Or perhaps more appropriately, "Why did Corelight choose me?") After being referred by more than one trusted advisor…

    1 条评论
  • Creating Intelligence with Response Orchestration

    Creating Intelligence with Response Orchestration

    The issue with traditional MSSPs is that they simply generate alerts. And many of them.

  • What is holding back security automation?

    What is holding back security automation?

    This is an interesting question to ponder and the context is around automation in general, not just focused in the…

    1 条评论
  • My Best Conversation @ Black Hat

    My Best Conversation @ Black Hat

    During a wind down lunch at the House of Blues at Mandalay Bay, a colleague asked me what my best conversation was…

    12 条评论
  • From Overwhelmed to Incorruptible

    From Overwhelmed to Incorruptible

    Trust is a fundamental component of security and is how social problems are solved. Social problems are break downs of…

  • The Joy of Falling Back

    The Joy of Falling Back

    One of the happiest times of the year (by 97% of the population) is one that gets barely any excitement or…

社区洞察

其他会员也浏览了