Page 77 - Cyber Defense eMagazine October 2023
P. 77

In this article, we’re going to explore the value of unifying multiple analytics streams and explain how it
            helps organizations determine their overall security posture and risk. First, what’s the value of unified
            analytics?

            While each analytics module provides useful information on its own, when unified the value increases
            exponentially. If models are separate, security analysts need to put together the results manually to
            produce context (much like pieces of a puzzle). For example, a slightly higher than normal number of
            login attempts to a particular system via a mobile device may not be a serious risk on its own. But if that
            system  connected  to  a known  malware site  on  the  last  successful  attempt,  the sequence of  events
            presents a huge risk. Knowing these two facts requires two completely different set of analytics and data
            that must be connected to show the full picture.

            Furthermore, having separate analytics is a resource burden. Too many modules produce too much data,
            which can overwhelm small teams. And individual pieces of data don’t tell the whole story. For example,
            one module might detect someone logging in from a new IP address. But are they working remotely or
            has their account been compromised? Limited data like this can send analysts on a wild goose chase,
            which takes up time and resources. The organization winds up spending more for subpar protection.

            Unified  analytics  connects  outputs  from  each  system  to  establish  context  and  identify  relationships
            between them. For example, detecting a new IP address login along with port scanning or unusual lateral
            movement would strongly indicate that an account has been compromised. Another example: accessing
            a clinical patient record kept in a US data center remotely from an approved laptop is likely acceptable
            but  accessing  it  from  a  Linux  server  in  Guatamala  should  raise  red  flags.  By  unifying  this  different
            telemetry and applying the corresponding analytics teams can assess risk more accurately, better target
            a response, be more transparent on the process (and have more confidence in the results), understand
            the entire attack more quickly (through a unified console), reduce threat hunting costs, and improve
            overall  security.  But  not  all  solutions  make  this  easy;  in  a  survey  conducted  at  RSA  2023,  42%  of
            respondents said it took them weeks or longer to add new data sources to their SIEM and nearly half
            only chain together endpoint and network analytics.

            But unifying analytics modules is only part of the equation. The type of machine learning applied to these
            data sources is also crucial to streamlining detection and response. Most of today’s solutions (such as
            XDR and SIEM) still use rules-based ML with a predefined set of rules and instructions to look for specific
            inputs and produce specific outputs. For example, looking for malware signatures with a file hash either
            matching a signature or not. Or analyzing logs while throwing out additional endpoint telemetry gathered
            from an EDR solution. This could absolutely slow down a security analyst from identifying a threat. For
            example, if a user has uncommon access to a specific application, but this is an accepted outlier condition
            it’s important to not throw a false positive. That requires trained ML versus the automatic triggering of a
            simple rule.

            It’s rarer to find solutions using adaptive ML. These models train on actual data, which allows the system
            to  learn  new  rules  on  its  own,  discard  ones  that  aren’t  working  anymore,  and  ingest  unfamiliar  or
            unstructured data. Adaptive ML also makes it easier to scale as a network grows and can ingest more
            types of data, such as badge systems or data from HR software to show who is on vacation, has put in
            their two weeks’ notice, or is on a performance improvement plan. It may also save the organization
            money depending on how the vendor charges for that data (on the other hand, products that charge by




            Cyber Defense eMagazine – October 2023 Edition                                                                                                                                                                                                          77
            Copyright © 2023, Cyber Defense Magazine. All rights reserved worldwide.
   72   73   74   75   76   77   78   79   80   81   82