CyberWire Daily - SOAR - a first principle idea. [CSO Perspectives}

Episode Date: January 17, 2022

Rick explains the network defender evolution from defense-in-depth in the 1990s, to intrusion kill chains in 2010, to too many security tools and SOAR in 2015, and finally to devsecops somewhere in ou...r future.  Resources: “Cybersecurity First Principles: DevSecOps.” by Rick Howard, CSO Perspectives, The CyberWire, 8 June 2020. “FAQ,” RSA Conference, 2020. "Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains,” by Eric Hutchins, Michael Cloppert, Rohan Amin, Lockheed Martin Corporation, 2010, last visited 30 April 2020.   “Malware? Cyber-crime? Call the ICOPs!” by Jon Oltsik, CSO, Cybersecurity Snippets, 22 June 2015. “Market Guide for Security Orchestration, Automation and Response Solutions,” by Gartner, ID G00727304, 21 September 2020.  “MITRE ATT&CK,” by Mitre. “The Cybersecurity Canon: The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win,” book review by Rick Howard, Palo Alto Networks, 21 October 2016. “The Cyber Kill Chain is making us dumber: A Rebuttal,” by Rick Howard, LinkedIn, 29 July 2017. “The Evolution of SOAR Platforms,” by Stan Engelbrecht, SecurityWeek, 27 July 2018. “What is SOAR (Security Orchestration, Automation, and Response)?” by Kevin Casey, The Enterprisers Project, 30 October 2020. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the CyberWire Network, powered by N2K. Calling all sellers. Salesforce is hiring account executives to join us on the cutting edge of technology. Here, innovation isn't a buzzword. It's a way of life. You'll be solving customer challenges faster with agents, winning with purpose, and showing the world what AI was meant to be. Let's create the agent-first future together. Head to salesforce.com slash careers to learn more.
Starting point is 00:00:36 Hey, everyone. Rick here. SOAR stands for Security Orchestration Automation and Response. for security orchestration, automation, and response. Gartner coined the term back in 2017, but security leaders and pundits like John Olczyk at CSO Magazine started talking about the concept as far back as 2015. The problem that we were trying to solve was how to automate the handling of all the messages, alerts, and intelligence products we were receiving from the technology within our security stack.
Starting point is 00:01:07 We were overwhelmed with the volume of these things that had exploded exponentially in recent years. We were manually processing them in the Security Operations Center, or SOC, with our traditional Tier 1 and Tier 2 analysts, and we couldn't keep up. To understand why, we need to do a little cybersecurity history. My name is Rick Howard. You are listening to CSO Perspectives, my podcast about the ideas, strategies, and technologies that senior security executives wrestle with on a daily basis. On this show, we are talking about SOAR as an idea and how it fits into the DevOps and DevSecOps movements and asking the question, why aren't you moving faster down these lanes? aren't you moving faster down these lanes? Back in the early internet days for me, circa the early 1990s, the prevailing cybersecurity strategy that most network defenders pursued was something
Starting point is 00:02:16 called defense in depth. The idea was that you would wrap your digital assets inside overlapping concentric circles of defensive technology. If the bad guys got by one of the defensive circles, they would immediately run into the next. In theory, this could go on until either the network defender ran out of circles or the bad guy got tired of trying to penetrate them. That all sounded good on paper, but what most people installed were just three circles of security technology, a firewall, an intrusion detection system, and an antivirus system. What we discovered was that those overlapping circles weren't that overlapping. There were huge gaps between them that a motivated cyber adversary could easily sneak past. What we understood later was that defense in depth was a decent general purpose strategy
Starting point is 00:03:06 designed to prevent common bad guy behavior as a best practice. We just couldn't use it to defeat the precise tactics, techniques, and procedures of any specifically known adversary. Now, I'll probably get some pushback for this, but defense in depth with its three-tool security stack eventually morphed into zero trust with a completely different tool set. In other words, the tools were different, but the concept was the same. Reduce the attack surface as much as possible by limiting what employees, customers, and contractors can access. Fast forward to 2010 and the publication of the now-famous Lockheed Martin paper on intrusion kill chain prevention. This was revolutionary. Instead of a general purpose defensive strategy like defense in depth
Starting point is 00:03:52 or perhaps in conjunction with it, we would deploy prevention obstacles at every stage of the attack sequence designed specifically for all known bad guy attack campaigns. We wouldn't rely on hope that the bad guys would run into one of our general purpose security circles. Instead, we would deploy obstacles on purpose where we knew the bad guys had to go, designed explicitly for their known adversary behavior. Brilliant.
Starting point is 00:04:19 Winner, winner, chicken dinner. We all thought that this was going to give the network defender the edge, that it was just a matter of time before we got this cybersecurity situation under control. We couldn't have been more wrong. While intrusion kill chain prevention is still a key cornerstone strategy for any modern InfoSec program, along with zero trust, resilience, and risk forecasting, the unintended consequence of the intrusion kill change strategy
Starting point is 00:04:46 was that the security vendor community came out of the woodwork to provide the tools to meet the need. And as a result, we are all managing more tools. Instead of network defenders providing the care and feeding for only three concentric circles of protection, some had a lot more. And it's my experience that many small organizations are now managing at least 15 tools in their security stack. Medium-sized groups have upwards of 50, Fortune 500 businesses and government organizations have at least 100, and many have well over 200. At the 2020 RSA conference earlier this year, there were over 650 security vendor companies exhibiting their wares on the main showroom floor. And that doesn't account for the security vendors who weren't there.
Starting point is 00:05:33 That's a lot of tools. And every one of those tools that have been deployed in our security stack is constantly spewing alerts and messages into the SOC. spewing alerts and messages into the SOC. At my last CSO gig, our internal SOC was trying to process over a billion alerts every quarter using the same manpower that we had when we only had three tools in the security stack. As Channing Tatum said in one of my favorite movies, Kingsman, The Golden Circle. That dog don't hunt. By 2015, network defenders started to complain to their trusted vendors that they were tired of, air quotes here, orchestrating all of their alerts without any help from them. They started to kvetch that the vendors should start orchestrating that telemetry information for them so that they could concentrate on more strategic matters. One of the technologies that
Starting point is 00:06:23 emerged from that chaos discussion is security orchestration Automation and Response, or SOAR. Before I describe what SOAR technology does, let's first discuss the typical security data flow for most organizations of any significant size within their SOC. As I said at the top of the show, most InfoSec programs have some notion of a security stack, with one-to-n security tools deployed in the environment for maximum benefit. Each of those tools sits on the network, collecting telemetry that will help the tool fulfill its purpose. SOC analysts can log into each tool in turn
Starting point is 00:07:04 to understand what the tool is seeing and make security alerting and blocking decisions with that intelligence. As the N gets larger though, that gets more cumbersome to do. Logging into a hundred tools and then trying to make sense of all of the different data elements is not for the faint of heart. To help, InfoSec programs started deploying SIMs, or Security Information and Event Management Systems, another tool in the security stack designed to specifically collect the telemetry
Starting point is 00:07:33 for all those security vendors into one place. This is essentially log management and provides a rudimentary orchestration capability that aids SOC analysts in data aggregation and correlation, alerting, retention, and forensic analysis. SOC leaders usually divide their analysts into three tiers. The first tier consists of the newbies and the interns. They don't have a lot of experience yet, so their task is to grind through all of those alerts and make decisions on what to do. Ignore them, save them, process them, or pass
Starting point is 00:08:06 them to the second tier when they need help deciding what to do with them. The second tier analysts perform a similar process with the alerts they get from the tier one analysts. These folks have more experience than the newbies and interns in tier one, but they don't know everything yet. If they can't figure out what to do, they pass it to the Unix graybeards in tier three. These are the folks that have been around for a long time and have been there and done that. They know where all the bodies are buried. If they can't figure out what to do with it, it can't be figured out. But even with a sim, you still have billions of messages coming into the sock every quarter. They are centralized now into one system, but you still have to process them.
Starting point is 00:08:45 This is where SOAR comes in. SOAR technologies provide SOC analysts the tools to automate their decisions, ignore, delete, process, or pass up the chain. Instead of a tier one analyst sitting in the SOC all day long and swiping left most of the time to get rid of the same alert over and over again, spewed from the same device in the security
Starting point is 00:09:11 stack, SOAR technologies can help automate that process. Instead of using a human to swipe left, you use code to do it. And yes, I'm loosely including newbies and interns into the human category. When we decided to use SOAR technologies in my last CSO gig, within a year, we had reduced the number of messages in the SIM that needed to be processed by a human every quarter from over a billion, that is, billion with a giant B, to just under 500. Even Unix graybeards, as slow as they move,
Starting point is 00:09:42 can process 500 alerts in 90 days. I kid, I kid. I used to be a Unix graybeards, as slow as they move, can process 500 alerts in 90 days. I kid, I kid. I used to be a Unix graybeard, so I kid. If the SOC did nothing other than automatically process these messages, the technology investment would be worth it. By using a SOAR technology, you can essentially eliminate the need for tier one and tier two analysts. And I'm not talking about firing
Starting point is 00:10:09 those newbies and interns either. I'm talking about repurposing them to more strategic tasks, like maybe automating the thousand other projects that need to be automated within the SOC. If we start to do that, then we are getting closer to DevSecOps. The DevOps movement started around 2010, but started to gain traction when Gene Kim published his cybersecurity canon Hall of Fame book, The Phoenix Project, in 2013.
Starting point is 00:10:35 Sometime after, the network defender community realized that they were being left behind in this infrastructure as code movement. behind in this infrastructure as code movement. They realized that if they didn't get on the bandwagon soon with all of the other IT and networking people, they would end up being in the same position that they are in right now, mostly considered as an afterthought in any kind of software development process. If the network defenders could somehow join forces with the DevOps community, they could leapfrog years of bureaucratic neglect and friction from the IT community by shifting left in the software development lifecycle process. And by the way, shifting left is a good thing in software development, but mindlessly swiping left in the sock is a bad thing. That's a lollipop. Oh, that is not a lollipop. Left swipe. Left swipe.
Starting point is 00:11:21 But that's as far as it went. It was a good idea, but few have pursued it. As in all cases, there are exceptions. But for the most part, the DevOps communities and the security communities are still sitting on opposite sides of a great divide. It's as if the security community is waiting to be invited to the DevOps community. And the DevOps community is waiting for the network defenders to start writing some code. My advice to the security community is to stop waiting for an engraved invitation. Just start. And I have the perfect place to begin.
Starting point is 00:11:52 The good news with most popular SOAR products is that they know how to connect to many of those 650 security products out there. That means your InfoSec team doesn't have to figure it out on their own. The SOAR vendor does the work for you. The first step is to get busy reducing those billion alerts every quarter that your Tier 1 analysts are manually processing today. Once you get that done, the sky's the limit. One immediate thing you could do is to use your SOAR technology to update your security stack with the proper prevention controls
Starting point is 00:12:23 for a current adversary campaign. How about Fancy Bear? In the last episode, Season 3, Episode 3 and 4, I mentioned how big a fan I am of the MITRE ATT&CK framework. It houses the most comprehensive open source collection of adversary tactics, techniques, and procedures in the world right now. So go to the MITRE ATT&CK webpage, look up all the mitigations
Starting point is 00:12:52 for Fancy Bear, and there will be a lot. For every tool in your security stack, decide how to implement the recommended Fancy Bear mitigations for it. Now, you will not be able to implement every mitigation
Starting point is 00:13:03 for every tool at all phases of the intrusion kill chain. That's okay. Do as many as you can. Then, fire up your SOAR tool. Automate the delivery of the Fancy Bear mitigation set to your deployed security stack. If you get that done, move to the next adversary group. How about Electric Panda? This model has one big advantage. Instead of individually implementing the Fancy Bear and Electric Panda mitigation set for every tool in the security stack, and probably losing track of it all because you have 100 tools in your stack, you centrally manage it with your SOAR tool. When changes to the mitigation set occur later,
Starting point is 00:13:42 you have one place to go to make the updates. When Fancy Bear and Electric Panda update their attack sequences, you have only one place to look to determine if your organization is vulnerable. If you get this done, you have essentially automated your defensive playbook for two known adversary campaigns. The next step is to rinse and repeat. According to the Cyber Threat Alliance, a cyber threat intelligence sharing group for security vendors, there are roughly just over 100 active adversary groups working on the internet today. The MITRE ATT&CK framework tracks the bulk of them in terms of potential mitigations. 100 active adversary groups is not that many. In a small amount of time, one coder in the SOC could build the network defensive campaign framework for all known adversary groups.
Starting point is 00:14:28 This is a worthy DevSecOps project and one that we all need to pursue. SOAR is a nice label on which to hang all things involved with automating tasks within the SOC. You can use a SOAR vendor or you can just roll your own. The point is to start building your own code as infrastructure now.
Starting point is 00:14:50 By taking this first step, you can get out from under all of the noise that those billion alerts every quarter were causing. Free up some personnel assets at the entry level and redirect them to more strategic pursuits. All of that is good and positive. As you go, your team is learning about DevOps as a philosophy. Once you get comfortable with it, start reaching out to your DevOps team on the other side of the aisle and insert yourself into a shift left mindset for
Starting point is 00:15:16 the development process. And that's a wrap. If you agree or disagree with anything I have said, hit me up on LinkedIn or Twitter, and we can continue the conversation there. Next week, I have invited our pool of CyberWire's experts to sit around the hash table to discuss how they think about SOAR and orchestration and DevSecOps. You won't want to miss that. The CyberWire's CSO Perspectives is edited by John
Starting point is 00:15:46 Petrick and executive produced by Peter Kilby. Our theme song is by Blue Dot Sessions, remixed by the insanely talented Elliot Peltzman, who also does the show's mixing, sound design, and original score. And I am Rick Howard. Thanks for listening.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.