Gaining Holistic Visibility With Elastic Security
Gaining Holistic Visibility With Elastic Security
visibility with
Elastic Security
elastic.co
Table of Contents
Requirement:
• Visibility needed across larger attack surface
Requirement:
• Deeper visibility needed from existing data (e.g., behavioral insights)
Requirement:
• Same or better visibility needed by more teams, at cloud scale
Requirement:
• Greater efficiency, adaptiveness, resilience needed
How secure are all of our endpoints and servers, legacy and new, on-prem and in the cloud?
Are there any unusual traffic patterns or email activity we need to investigate?
Are there any unexpected changes to security policies in our cloud environment?
How do we find visibility gaps that we’re not even aware of? (e.g., shadow IT services)
How can we quickly and accurately verify whether suspicious activity is malicious?
How does the latest and greatest attack model/framework apply to our situation?
For that system, has there recently been any cleartext used for authentication?
These only represent an example fractional subset of the broad range of questions that security teams might
need to pursue.
From a business standpoint, the following types of questions might be top of mind:
How can we provide insights needed by business owners to make informed decisions?
How can we demonstrate consistent improvements in our process, not just key performance
indicators (KPIs)?
How can we quantify and show that our investments are paying off?
What corporate risks are presented by any of our new business initiatives?
Understanding where you stand on these issues is critical. First, you need the right visibility.
Data can be structured or unstructured, static or dynamic, generated on-premises or cloud-based — but
regardless of type or format, security teams share the common objective of using data to gain key insights
and decide and act on those insights.
vis·i·bil·i·ty
noun
the quality or state of being
capable of being seen
• conspicuous
• accessible
• degree of clearness
Similar to Merriam-Webster’s definition, in security, visibility is not limited to only “capable of being seen.” That
is fundamental, but security insights should also be conspicuous, accessible, readily seen, and clear enough to
facilitate decisive planning and effective remediation.
Teams typically face a common tradeoff — do they have the time, resources, and staff to tackle visibility
challenges? If not, are they prepared to deal with the negative impact from compromising on achieving desired
outcomes?
Put simply: Is the heavy lift needed to get visibility, and to operationalize that visibility, worth it?
In the table below, Column 1 includes key aspects of visibility each functional security team will need. Columns
2 and 3 describe some of the challenges in attaining that corresponding level of visibility. These are not small
issues — gaining visibility and operationalizing that visibility can be daunting, expensive, and in some cases
not feasible, depending on the capabilities of the underlying data fabric and supporting technologies (we’ll
cover why in the next section).
As a result, unfortunately, too many security teams can relate to the pain points described in Column 4.
Threat detection
Alert triage Relative Adequate context Training tier I/ Alert overload; alert
prioritization; level (e.g., enrichment, II analysts to fatigue; reduced
of fidelity; clear gathering threat understand number of incidents
understanding intelligence/ how to interpret addressed properly;
of how an indicators of and escalate priority issues are
incident impacts compromise (IoCs)/ appropriately missed
security posture; indicators of attack
prescriptive actions/ (IoAs), related
recommendations alerts)
Note that each team/function has its unique objectives to work toward. Ideally, they are all working in concert
as they execute their respective portion of a common overall basic workflow:
Or, if you map this to a set of tasks that these teams must support:
Again, throughout this entire flow, there is the need for “process” — that is, not only getting the visibility, but
also operationalizing that visibility.
• Efficacy: they lack the specific context needed to achieve a desired outcome
• Scaling: they lack the adequate context needed for coverage across the organization
Why does this happen? Again, security teams are fundamentally solving two core problems, which require key
attributes to address:
There are a number of commonly used KPIs and metrics associated with each of these core problem areas:
Detection and Mean time to detect Damage from breach or Speed, accuracy
prevention (MTTD)/mean time to data loss ($)
identify (MTTI) (dwell
time) Disruption to employee
productivity (time)
Coverage (% of issues)
Revenue loss ($)
For example, when a security team uses a security tool that is native to a cloud infrastructure environment,
they might benefit from speed and accuracy, but that tool may primarily focus on visibility of activity generated
within that cloud environment. Will they be able to easily pull in bespoke data sources and integrate with other
tools from across the rest of their environment, and run correlated detections and perform investigations
across multiple environments, including on-premises and other clouds? Speed and accuracy for a portion of
the overall security-relevant dataset should not come at the cost of coverage. Adequate context is needed
For example, a security tool may lack the flexibility and simplicity to process all network firewall data the same
way, regardless of vendor. Considering the skills gap, this is a critical advantage that security teams need in
place to be adaptive and resilient while maintaining visibility.
They may also struggle to customize their workflows to meet their team’s specific requirements, and to provide
other ops teams access to the same data to view through a different lens so that those teams can, for example,
answer observability questions from within the same platform — and vice versa, so that they can gain easy
access to observability data to analyze in a security context. As organizations standardize at the data fabric
layer, this is again another critical advantage needed to maintain visibility and consistency.
Note that each layer builds on the completeness and strength of the previous layer. By addressing the
foundation — i.e., by ensuring we have a solid data strategy that can maintain speed, accuracy, flexibility, and
simplicity as we scale — we can ensure that all security teams involved in the broader security operations
function can gain holistic visibility, and also the ability to easily operationalize that visibility, without
compromising on speed, accuracy, flexibility, or simplicity. It is critical to avoid those compromises, regardless
of how each team prefers to analyze, visualize, and operationalize security use cases.
Context Difficult to quickly Cannot get Rigidity prevents Data is not easy to
(data) access and search enough context to easy addition of normalize; high-
across a distributed adequately provide new data sources volume data is
environment inputs needed for quickly; heavy not indexed and
analytical methods dependence on therefore not easily
deployment/ accessible
environment
The most common and important way we interact with data is to search across it. At the most fundamental
level, your security team’s ability to quickly and accurately search at scale is the underpinning of success for
your security program. If you solve the search problem — again, with speed, accuracy, flexibility, and simplicity
— it is then relatively straightforward to build on top of that foundation — at the analytics layer, the visualization
layer, and the operations layer. With this foundation, you can implement and scale virtually any security use
case.
The Elastic Stack (formerly known as the ELK Stack) has been used for years by security teams as their data
foundation for exactly this reason. At the heart of the Elastic Stack is Elasticsearch, known for its speed, scale,
and relevance. Security teams have long used the Elastic Stack to extract valuable security insights from all
their data. They can quickly search all data, structured and unstructured, from all different types of logs, static
and dynamic forms, ad hoc inputs — any data that is searchable. This core advantage has enabled them to
evolve quickly and solve complex security problems for a multitude of security functions, including threat
hunting, security information and event management (SIEM), threat research, compliance, security monitoring
and investigation, digital forensics and incident response, endpoint protection, antifraud, and more.
Security Overview
Cases
Alerts
Timelines
Events
Elastic Security provides an ideal solution for gaining the holistic visibility you need and enables security teams
to easily operationalize that visibility. With Elastic, teams can collaborate more effectively to protect critical
assets, perform fast and accurate investigations, improve and formalize a threat hunting practice, and generally
solve and operationalize any security use case at scale.
Google Chrome
Timeline
Action Easily perform real- Timeline helps Eliminate silos Embedded case
(operations) time collaboration teams quickly verify by leveraging management
across all teams, and investigate, integrations plus integrations
leveraging document, plan, with Slack, JIRA, increases efficiency
common views and and execute on ServiceNow, IBM and collaboration
automation best containment/ Resilient, Swimlane, across security
mitigation and Palo Alto, and more operations
response actions
Prioritization Packaged SIEM Alerts are prioritized Intuitive SIEM Packaged SIEM
(visualization) visualizations in a clean, dashboards, visualizations
(Alerts, Timeline, extremely intuitive Kibana, and Lens enable
Cases) streamline view; investigative enable less skilled straightforward
operations drilldowns, analysts to filter interpretation
across detection, enrichment, and and process results of data; Kibana
triage, hunting, threat hunting easily, customize and Lens enable
investigation, and workflows enable views, and optimize customization of
response functions teams to verify, investigative data processing
scope, and prioritize workflow and visualizations
accurately without requiring a
skilled developer
Context Fast, federated Include high-volume Easily onboard Normalize data with
(data) search to quickly and non-traditional new data sources the Elastic Common
access and search data sources and using Elastic Agent, Schema; index
across a complex, enrichment for Beats, or Logstash, and easily access
distributed high degree of on-premises and high-volume data
environment coverage without in all major cloud sources without
compromising environments exorbitant cost
speed
With Elastic, holistic visibility is not limited by a restrictive pricing model. What you pay is determined only by
the amount of underlying server resources you use, no matter the use case or amount of data ingested. This
translates to an operationally viable path to maturity and scale, without the need for constant license upgrades
and increased spend for high volumes of data indexed resulting in delayed realization of value.
As an open source company, the Elastic team extends beyond our employee base. Elasticsearch, Kibana, Beats,
Logstash, and the Elastic Security solution weren’t built solely by us — they were built with contributions by the
Elastic community. We leverage this approach to your benefit. For example, our world-class security research
team develops detection rules in the open alongside the community, and we welcome community-driven
detections to share collective knowledge and accelerate community learning to improve visibility for all.
About Elastic
Elastic makes data usable in real time and at scale for enterprise search, observability, and security. Elastic
solutions are built on a single free and open technology stack that can be deployed anywhere to instantly find
actionable insights from any type of data — from finding documents, to monitoring infrastructure, to hunting for
threats. Thousands of organizations worldwide, including Cisco, Goldman Sachs, Microsoft, The Mayo Clinic,
NASA, The New York Times, Wikipedia, and Verizon, use Elastic to power mission-critical systems. Founded in
2012, Elastic is publicly traded on the NYSE under the symbol ESTC. Learn more at elastic.co.