Page 17 - Cyber Defense Magazine RSA Edition for 2021
P. 17

What’s the architecture for a successful deployment?


            For security teams, the ideal is to have a “single-pane-of-glass” that collects and collates threat telemetry
            from all of the different sources and provides a single view of threat activity across the threat lifecycle.
            Typically, organizations are electing to implement a SIEM tool, or a data-lake that provides data mining
            and search capabilities. SOAR tools are also rapidly gaining in popularity - as a way to help organizations
            collect and analyze evidence of threat activity.


            The key capability that organizations need is being able to quickly reconstruct events from the collected
            and collated telemetry to understand what happened, how it happened, and what the impact of that event
            is. With a centralized view of activity, analysts can ask  and answer questions quickly to understand
            whether there has been lateral movement from an initial compromise, whether data has been exfiltrated
            or not, etc.

            Having access to full packet capture data is an indispensable resource in enabling this capability. With
            access to the actual packets, including payload, analysts can see what activity took place on the network
            and reconstruct events precisely - right down to seeing what data may have been exfiltrated and how an
            attacker is moving around the network to increase their foothold.

            Full packet capture data is also an incredibly powerful resource for proactive threat hunting. Packet data-
            driven threat hunting and simulation exercises are a great way for teams to determine the effectiveness
            of their detection tools - including AI/ML tools - to understand why they are not detecting events that they
            ought to, or alternatively why they are incorrectly flagging non-malicious activity as malicious.


            Packet capture data is invaluable as an evidence source because it is complete and reliable. Where a
            skilled attacker will often delete or modify logs to hide their activity, it's very difficult for them to manipulate
            packet data captured off the network - particularly when in most cases they are not even aware that it’s
            being captured and don’t have access to it. This makes packet data a trusted source of “truth” about
            what’s really happening on the network.



            Right deployment, right outcome


            AI/ML  detection  tools  have  a  lot  of  promise.  However,  there  are  pitfalls  if  the  right  architecture  and
            capabilities are not in place. In order for AI/ML threat detection tools to deliver on their promise to reliably
            detect and remediate threats, companies must be able to trust them to make the right decisions, not to
            miss things, and to act accurately. To achieve this level of trust, we must be able to always verify and
            validate decisions made by AI/ML tools. To do this, companies need to ensure they have the right data.

            Packets are an indispensable resource for validating AI decisions. But in order for packet data to be
            useful it needs to be complete and accurate, with no blind spots, and provide as much lookback history
            as possible. It also needs to be easily accessible and provide fast search and data mining.


            Considering how packet data can be incorporated into workflows is also important. When packet data
            can be integrated into security tools - enabling analysts to pivot from a specific alert or event to the related





                                                                                                              17
   12   13   14   15   16   17   18   19   20   21   22