Security operations centers (SOCs) and their staff account for a significant amount of security spending, but these often-siloed facilities are notoriously slow at detecting breaches and responding to incidents. Breaches typically go undetected for nearly 2 months, and more than half of breaches are discovered by an external source — not the SOC.
With many organizations still operating in crisis mode with an unprecedented number of remote workers, cybercriminals are intensifying their attacks. A single breach or ransomware attack can cripple a business and further erode confidence in security operations
Other parts of the business are modernizing applications, adopting cloud and hybrid infrastructures, and embracing new mobile, internet of things (IoT) and operational technologies (OT). However, all too often, security organizations are falling behind. SOCs are still labor-intensive. They lack the ability to rapidly orchestrate and automate processes, and they struggle to deliver clear metrics on risk and compliance to justify growing costs. Finding and keeping skilled security professionals are major challenges.
All together, these factors make it increasingly challenging for SOCs to stay relevant in modern enterprises. Security programs are seen as a necessary cost of doing business, not an enabler of business change.
To effectively mitigate risk and create a leading-edge cyber defense program, SOCs must evolve at the same pace as the rest of the business, applying the latest security techniques, real-time threat intelligence and response, artificial intelligence (AI) tools and automation to move from reactive to proactive security operations.
Creating modern SOCs
Today, for a business to succeed, data must be viewed as a competitive differentiator. Analytics become an enterprise enabler, and shareholders, clients and customers benefit. SOCs must be included in this change to realize their full value and enable organizations to make intelligent business decisions using quality data points across the security value chain. The ability to deliver real-time and predictive insights from technical to societal trends data is a pivotal differentiator.
Threat intelligence combined with real-time analytics, AI and process orchestration should be the norm to support growth initiatives, resilient operations, continuous compliance and predictive risk management. As threats and vulnerabilities increase, modern SOCs must address a growing number of risks.
In this context, the SOC function must evolve to encompass the business dimension of the organization. It must be fully integrated with the enterprise risk management function and security operations. It must support early detection and response, effectively manage threats and vulnerabilities, and provide visibility into the enterprise security posture.
Today, SOCs must be more than the sum of their parts, and we examine this by taking a step back to look at the definition of risk. SOCs must understand and address these three dimensions of risks to be able to have full situational awareness.
Many organizations are just beginning their modernization journeys. There are six key strategies for operating modern SOCs that, when designed, developed and implemented correctly, help keep security aligned with the business.
1. Align fragmented systems
Effective cybersecurity management aligns fragmented systems for comprehensive visibility of an organization’s security posture. This allows enterprises to make holistic decisions that lead to better business outcomes. For this to occur, however, it is critical that organizations understand their security environments and how their teams access data.
Teams typically work in silos, disconnecting them from business operations that often contain weak procedures, structural inefficiencies or incorrect configurations. These vulnerabilities decrease security effectiveness and make it difficult for teams to access the right data or large enough volumes of data for analysis.
Organizations can minimize risk by effectively identifying, analyzing, and prioritizing threats and vulnerabilities. Many security programs follow National Institute of Standards and Technology (NIST) guidance, which requires information classification; select controls adapted to security classification, implementation and assessment; system and common control authorizations; and continuous monitoring.
Organizations prioritize risks by highest impact and greatest probability of occurrence. While this approach is widely recognized, modeling threats and understanding adversaries are not. Teams working on governance, risk and compliance (GRC) rely on manual modeling, which exposes businesses to human bias and errors. To accurately and quickly identify the right information from masses of data, organizations must automate their GRC processes.
To automate processes, organizations must first understand their threat landscape, business data, operations, risk management and security controls. With this knowledge, they can effectively and efficiently map relationships and build predictive models that will proactively identify threats and anticipate potential risks. Automation frees employees to focus on value-added tasks and projects; however, humans still need to interpret the data and associate it with risk events and scenarios.
When done correctly, alignment of fragmented systems and processes gives businesses the visibility they need to:
- Prioritize activities at operational levels
- Produce executive reports with business-relevant SOC metrics
- Demonstrate the impact on business objectives
- Understand how risk posture impacts businesses and annual trends
- Predict possible future outcomes
- Make better business decisions
- Support tactical and strategic initiatives for managing risk
2. Gain situational awareness
Situational awareness is key to successful security management. Businesses cannot adequately protect their assets if they do not know what they have, where they are located and what classifications of data reside within them. They must also assess their risks and determine the technologies in use. This requires a deep dive into internal and external systems, especially where they touch public networks, such as those of a supplier.
A comprehensive and well-maintained asset library mapped to business processes and operations improves the prioritization of assets, determines protection levels and locations, and is essential for a robust patch management and monitoring strategy. Combined with threat intelligence information tailored to the technology and organizational threat profile, it further allows tailored defense strategies and decision making.
Environmental complexities challenge businesses to achieve this level of protection. For example, security programs typically focus on process or technical aspects, risks relating to the latest vulnerabilities and patches, or security awareness training. However, security incidents can be attributed to weaknesses higher up in the organization. Therefore, it is crucial for businesses to understand where culture, security awareness and decision-making vulnerabilities exist, while also considering the effects of external forces such as regulators, government initiatives and market trends.
Organizations must manage complex sociotechnical systems that impact all areas of the business. The keys to successfully managing this complexity are highly efficient communication between cross-departmental teams and consideration of external forces.
In these sociotechnical layers, vulnerabilities can occur at any level. For example, a regulator in one region could allow weak password policies that could lead to audit penalties in another region. Or a decision by the board of directors could unwittingly trigger a hacktivist group to launch a social media campaign to launch a distributed-denial-of-service attack against the company. Poorly communicated policies by management could lead to insider threats and the release of sensitive data.
Organizations do not suffer cybersecurity breaches because of a single act or oneoff gap; rather, they accumulate contributing elements across all levels over time. This accumulation of risk can lead to high-profile breaches with disastrous consequences. To have true situational awareness, organizations must think holistically, communicate clearly, collect feedback across all layers and take account of change.
3. Fuel intelligence-driven operations
Cyberthreat intelligence is increasingly important in developing well-rounded cyberdefense strategies. However, threat intelligence programs traditionally focus on technical indicators of compromise (IOCs). IOCs by themselves are contextless and atomic in nature, similar to antivirus signatures. This one-sided view perpetuates reactive responses. To become proactive, organizations must combine security data with data from multiple sources and distill it into actionable intelligence. This puts threats into context and demonstrates relevance to industry verticals, operating regions and technology stacks.
There are primarily four types of threat intelligence, each with a different focus and relevance to various parts of the organization.
If businesses focus on certain threat types and ignore others, they receive incomplete views of the threat landscape. To see the full picture, organizations must process threat intelligence on a threat intelligence platform that supports collection, validation and storage of threat intelligence using flexible scripting and programming options that automate:
- Enrichment and triage using community and proprietary sources
- IOC processes using analysis tools such as decoders, unpackers, hashers and connection graphs
- Mature curation of signatures, use cases and scripting for deployment on endpoint incident response tools
Understanding potential attackers, their purpose and plans is critical for effective, efficient defenses that enrich, accelerate and automate security processes for:
- Security alerting. Automate the processing of relevant IOC data to remove repetitive, manual tasks, free up resources and improve detection rates.
- Incident triage and analysis. Ensure that suspected incidents and alerts are enriched with relevant information before triaging to SOC staff for investigation.
- Threat hunting and investigation. Proactively hunt for threats — an ongoing process in which artifacts and indicators with high severity are contained and affected systems are quarantined until investigations are complete.
- Intelligence sharing. Share threat intelligence across trusted groups both internally and externally to enrich the understanding of the threat landscape.
As more organizations participate in intelligence sharing, the longevity of new malware techniques will shorten, which slows attack rates and minimizes their spread and effectiveness.
By employing additional intelligence elements, businesses gain a holistic view of threats, which enables threat modeling process automation. This allows automatic calculation of the organizational risk posture, which leads into the predictive dimension of risk management.
4. Predict risks and proactively defend the business
When executives understand and anticipate threats using actionable intelligence, they make more informed risk management decisions, optimize returns on their security investments, and incorporate security and privacy into applications and infrastructures.
Active defense, borrowed from military terminology, is essential to predictive risk management because it proactively outmaneuvers adversaries, guards against attacks and helps set priorities for security management systems. NIST defines active defense as the anticipated synchronized, real-time capability to discover, detect, analyze and mitigate threats and vulnerabilities.
Active defense allows new strategies to be developed to defend valuable assets. Increased awareness provides a greater level of understanding of the “who” and “why” of an attack. It significantly changes the traditional reactive approach of security management to a proactive one. It is a top priority for security management systems, and it requires “continuous testing,” “continuous improvement” and “continuous learning” through activities such as blue and red teaming. It also incorporates security and privacy into the system development life cycle.
Combined with the other key steps covered in this paper, near real-time risk management sets the conditions for ongoing information system and common control authorization through the implementation of continuous risk-monitoring processes. This provides for efficient, cost-effective and informed risk management decisions about the systems that support mission and business functions.
By employing additional intelligence elements, businesses gain a holistic view of threats, which enables threat modeling process automation.
Integrating GRC, SOC and security operational processes across data, applications, IT, OT and IoT ecosystems will play an increasing role as ecosystems become more complicated. This complexity is driving the need for automation and orchestration across configuration, management and coordination of systems, applications and services. The business is then more efficient, with clearly defined automated playbooks and runbooks to mitigate incidents and improve security management across the enterprise. This reduces human intervention, while using an orchestrator to conduct the activity reduces costs and accelerates outcomes.
5. Leverage human and AI synergies
Modern SOCs can no longer focus solely on IT monitoring, analysis and response activities. An exponential increase in monitoring and better analytical capabilities are now required for:
- Mobile devices
- Wearable technology
- Cloud and IT infrastructure
- Cyber physical systems
- IoT devices
Adoption of cognitive computing and AI solutions will reduce workloads for risk management and SOC staff handling security events and will ultimately improve outcomes.
To increase productivity, multiple teams must work as one and not as siloed individuals or groups. This translates into multiskilled employees working agilely on goals that everyone understands. AI advances this model by enhancing skills and freeing resources for value-added activities. This approach is met with less resistance because it is not a short-term, cost-cutting activity that displaces individuals. The goal of AI is to optimize efficiencies in environments where large-scale gains are needed for organizations to survive the growing onslaught of malicious actors. Some attempts to automate discovery and triage have actually led to deskilling of Level 1 staff. This can create workplace alienation, drive down quality and increase attrition. Organizations can fall into a damaging cycle as more automation or further workforce shifts continue.
When AI is introduced to support the team rather than replace it, the staff benefits from augmented security analysis and decision support, particularly at the entry level. Organizations can then create more efficient and effective SOC teams.
In this model, the roles of levels 1 – 3 change.
- Level 1. Trains the AI system in anomaly detection to work in partnership with humans to flag unknowns and close calls for further analysis
- Level 2. Builds the ability to respond automatically to incidents, while partnering with AI for joint responses
- Level 3. Creates and trains expert systems that aid in decision making and the diagnosis of complex issues through simulation and testing
All three roles are complementary and encourage team members from each group to collaborate. They also generate demands for higher skills in each area, leading to rewarding career paths for security analysts. To achieve this, organizations must embrace multiple perspectives for understanding and incorporating AI. This moves away from treating AI as a black box and makes it a team contributor whose strengths and weaknesses are understood and appreciated.
A modern data-led SOC analysis function with an integrated human–AI collaborative workforce can handle vastly greater amounts of information and significantly increase its value to the organization.
6. Deliver a future-proof, interoperable, integrated and hybrid SOC architecture
Whether building modern SOCs or transforming existing ones, organizations must adopt the same principles used to digitally transform their businesses. The process is challenging and time-intensive but required to reach acceptable levels of SOC maturity. The key principles are:
- Future-proof. Adopt a modular SOC architecture using open standards and Agile approaches for the ongoing evolution of security management and processes.
- Interoperate with everything. When designing a SOC, businesses must follow sound architecture disciplines, remain vendor-agnostic and use APIs for foundational integration and orchestration that allow future evolution and integration of new capabilities over time without rebuilding the foundations.
- Integrate everything. All SOC capabilities and processes must integrate with one another and with GRC, security operations, IT, OT and IoT management, business application and data management processes.
- NoOps by design and automate the known. Businesses must automate all known operational processes, including those for detection, analysis, validation, prioritization and response, to reduce human interactions and minimize mistakes.
- Facilitate standardization and consistency. Develop reusable patterns, blueprints and play/run books to ensure the above principles are embedded and adhered to for standard, consistent SOC functions across geographies and teams.
- Everything as code. When designing and implementing systems using the above principles, organizations should perform all functions on serverless platforms in support of portability and reversibility, accelerated service instantiation and scale on demand.
- Hybrid operating model. Ensure that different providers can deliver SOC functions based on the above principles.
SOCs by design focus on the organization’s current state, what might happen next and how to predict the future. Modern SOCs must plan for breaches that have a high probability of occurring as well as those that may never materialize — and breaches that have already happened but have not been detected.
Organizations must consider all valuable, relevant data that’s available from the business, society, geopolitics, people, technology and processes. This is then set against the evolving threat and vulnerability landscape to assess what is likely to happen and justify decisions and prioritize actions. The SOC can no longer be considered a silo of the business and must be linked to all business lines. This means security, operational and business teams must adopt an end-to-end, integrated approach to protect and enable the business — leveraging real-time AI and remediation capabilities.
Change is a constant in business and within SOCs. To stay relevant, SOCs must continuously evolve to be ready to understand and manage both the threat and the vulnerability landscape (Figure 6).
The journey to modernize SOCs is evolutionary, beginning with a comprehensive understanding of enterprise risk factors, a 360-degree view of the threat and vulnerability landscape, and the right cultural behaviors to promote security.
Organizations must embrace active security, turn data into meaningful intelligence, and drive increased enterprise resilience and compliance. SOCs can achieve this future state through tight, cross-enterprise integration, orchestration and automation and skilled people, leveraging machine intelligence and AI. Only then can SOCs stay relevant in the modern enterprise.
Learn how to keep your security operations relevant with DXC Cyber Defense services.