I was surprised to see the report from Mandiant that states the following facts -
1. 100% of the breaches had updated Anti-Virus software
2. 63% of the breaches were reported by third parties
3. It took 243 days to detect an attack
This clearly points to the fact that existing monitoring capabilities are no match for the changing threat landscape. The traditional technologies lack the sophisticated capabilities and visibility required to detect and protect against such advanced attacks.
So, what’s wrong? If you see the organizations have responded to threats and its changing nature by implementing several point tools like Anti-Viruses, Anti-malwares, Firewall, IPS, URL filters, Application security gateways, DLP solutions and SIEM solutions to detect and prevent security attacks. Further they have designed processes and detective mechanism like Vulnerability Assessments and application security scanners but still failed to mitigate the sophisticated attacks like Advanced Persistent Threats (APT), especially running in stealth mode, which cannot be detected by point security tools. It needed behaviour analysis for anomalies, which means detecting unusual behavioural patterns but to achieve that, one need to baseline what is normal and the same requires huge volume of data and substantial manpower.
Another problem with point tools is that it provides huge amount of monitoring data/logs which is correlated in SIEM giving standalone threat information but threat indicators should also be integrated and correlated with asset criticality and process related weakness to identify risks holistically so that appropriate resources can be allocated based on priority for mitigation.
SIEM also has a limitation of being good at collecting logs from desperate systems and aid in correlation and compliance but limits the analytical capability for threat detection, forensic and also unable to query retained collected for performing analysis.
In a nutshell, the
1. APT, frauds and insider attacks are increasing
2. Traditional technologies are failing to detect advanced and persistent attacks
3. Monitoring millions of transactions for structured data and identifying attack or fraud pattern is difficult manually and need substantial man power and advanced skills.
4. Managing and analyzing huge amount of data from point security tools and relying purely on correlation rules in SIEM to identify threats has failed to protect from advanced attacks. SIEM has limits in querying the retained data for analytics and also unable to handle millions of transaction per second along with its inability to provide business context. Further not all attacks have/leave logs.
5. Assessing risks without the visibility of critical assets which are judgmental and managerial opinion
These problems are not easy to solve, but I am presenting my opinion to increase the chances of detection by integration of data from point tools and also using network visibility to identify anomalies.
Implement solution to store big data and analyze data in real time. Three options can be considered.
1. Work with existing SIEM and create a data cave / warehouse to store all data from SIEM and few other point tools like DAM and buy analytics engine to analyze large amount of data using rules. This can be either achieved by third party vendors providing analytics engine over the cloud or by buying professional analytics tools and integrate reporting and alerting in GRC tool
2. Implement SIEM with big data and analytics from professional vendors in this space
3. Manually configure threat indicators for identifying advanced threats by reverse engineering and using point tools like Firewall alerts, IPS rules, end point IPS, proxy servers, web application firewalls and other security tools