Comprehensive Guide To Security Operations - Copyright © 2022, CyberEdge Group
Comprehensive Guide To Security Operations - Copyright © 2022, CyberEdge Group
Crystal Bedell
Foreword by Mark Manglicmot
Comprehensive Guide to Security Operations
Published by:
CyberEdge Group, LLC
1997 Annapolis Exchange Parkway
Suite 300
Annapolis, MD 21401
(800) 327-8711
www.cyber-edge.com
Copyright © 2022, CyberEdge Group, LLC. All rights reserved. De initive Guide™ and
the CyberEdge Press logo are trademarks of CyberEdge Group, LLC in the United
States and other countries. All other trademarks and registered trademarks are the
property of their respective owners.
Except as permitted under the United States Copyright Act of 1976, no part of this
publication may be reproduced, stored in a retrieval system or transmitted in any
form or by any means, electronic, mechanical, photocopying, recording, scanning
or otherwise, without the prior written permission of the publisher. Requests to
the publisher for permission should be addressed to Permissions Department,
CyberEdge Group, 1997 Annapolis Exchange Parkway, Suite 300, Annapolis, MD,
21401 or transmitted via email to [email protected].
Publisher’s Acknowledgements
CyberEdge Group thanks the following individuals for their respective contributions:
Editor: Susan Shuttleworth
Graphic Design: Debbi Stocco
Arctic Wolf Contributors: Mark Manglicmot and Con Mallon
Table of Contents
Foreword..................................................................................................................... v
Introduction.............................................................................................................. vii
Chapters at a Glance...........................................................................vii
Helpful Icons.....................................................................................viii
24x7 Monitoring.................................................................................34
Comprehensive and Centralized View of Security Posture...............35
More than Technology.......................................................................35
Flexibility............................................................................................36
Bonus: Cultural Fit.............................................................................36
Foreword
This book sets out to change all that, once and for all, by giving
you a framework for implementing a security operations func-
tion. Security operations can be thought of as all the pieces of
a security framework working in concert to effectively reduce
risk to a negligible level. That’s right. Effective security opera-
tions will help you arrive at a place where you finally feel in
control – and that starts to feel like an end to your cyber risk.
Chapters at a Glance
Chapter 1, “What Do We Mean by Cyber Risk,” explains
why a company can spend hundreds of thousands of dollars on
security and still succumb to an attack.
Helpful Icons
TIP
Tips provide practical advice that you can apply in your own
organization.
DON’T FORGET
When you see this icon, take note as the related content
contains key information that you won’t want to forget.
CAUTION
Proceed with caution because if you don’t it may prove costly
to you and your organization.
TECH TALK
Content associated with this icon is more technical in nature
and is intended for IT practitioners.
ON THE WEB
Want to learn more? Follow the corresponding URL to
discover additional content available on the Web.
Chapter 1
What Do We Mean
by Cyber Risk?
In this chapter
• Learn how the cybersecurity market is growing
• Understand the formula for risk
• Read how two companies hit by the same ransomware can
have radically different experiences
TIP Company B’s backup policy includes both hot and cold storage
backups. The hot backup is easily accessible while the cold
storage backup is completely removed from the network to
ensure its protection. If the hot backup becomes compro-
mised, the company can recover the data using the cold stor-
age backup.
Security awareness training is also a key component of
Company B’s cybersecurity strategy. The organization under-
stands that all its investments in technology are of little help
if end users don’t think twice before responding to a phishing
email.
Finally, Company B has a documented incident response plan
that includes a contact list with assigned duties so that when
an attack happens – and it does – everyone in the organiza-
tion knows how to respond to lessen the impact.
After an attack, Company B performs a post-incident analysis.
The goal of this exercise is to review lessons learned and
determine what they need to do differently to prevent the
attack from recurring. The organization determines how the
attack occurred and fills the gaps in its security posture to
build resilience and ensure that it doesn’t happen again.
Company A and B are similar companies hit by the same
ransomware, but with very different outcomes. In the next
chapter, we’ll look at the role security operations played in
determining those outcomes.
Chapter 2
What Do We Mean by
Security Operations?
In this chapter
• Learn who needs security operations
• Understand why security operations is necessary to end risk
• Explore the security journey
Know Thyself
There is no one-size-fits-all approach to security operations.
In order to effectively reduce the likelihood of a security
incident, you must tailor security operations to your business’
specific mission and priorities. By extension, you must under-
stand what assets are central to the business, thus what assets
12 | Comprehensive Guide to Security Operations
Layer 1
While you can’t foresee all attacks, knowing the location,
motive, and type of threat actors challenging your organiza-
tion can help you improve your defenses and prepare for
future attacks. Information on prevalent attacks and attacks
on your industry, your competitors, and companies similar to
yours provides valuable insights. It can indicate the types of
security controls you should implement and the behavior you
should look for when monitoring the environment for anoma-
lies, hunting threats, and performing incident response.
Identify the types of attackers that are targeting your valuable
assets and what those specific assets are. For example, are
organized crime syndicates targeting you for quick monetary
gains? Are nation-state attackers looking to steal your organi-
zation’s trade secrets?
14 | Comprehensive Guide to Security Operations
Layer 2
The more you know about an attacker’s tactics, techniques,
and procedures (TTPs), the better you can defend against
them and detect them in your environment.
Understanding the enemy will give you a sense of what assets
threat actors frequently target so you can focus your defense.
Vulnerability Management
A strong vulnerability management strategy helps prevent
attacks before they occur by eliminating the weaknesses
attackers can exploit to gain a foothold in your environment.
Vulnerabilities range from software defects and misconfigura-
tions to missing patches and weak credentials.
Human Security
A discussion about cyber risk and vulnerability management
is incomplete without addressing the human element. For
many companies, people are both their greatest asset and
their greatest risk. End users have their own business objec-
tive, and it’s not security. Their focus is on getting their work
done, sometimes at any cost. That could mean finding a work-
around so they can access files from home or mindlessly click-
ing a phishing link they think will grant a manager access to a
network resource. Addressing these risks is important to help
prevent a cyberattack.
Consistent end-user awareness training and a culture of
security can help turn people into a strong defense. To avoid
contributing to cyberattacks, people must understand the
important role they play in protecting the business and must
be taught how to get their work done securely. Finally, to
mitigate the impact of a human error, processes must be
implemented to give end users the ability to report an event
and allow security operations to remediate the issue as quickly
as possible.
16 | Comprehensive Guide to Security Operations
Right of Boom
Reducing the effects of a cyberattack comes down to speed, as
outlined in Figure 4-1. The goal is to detect and stop an
attacker before they disrupt service, cause damage, or steal
data. The longer it takes the security operations team to
detect, respond to, and investigate an attack, the greater the
likely impact to the business.
18 | Comprehensive Guide to Security Operations
Detect quickly
The first step right of boom is detection. The security opera-
tions team relies on sensors across endpoints, the network,
and cloud to quickly identify cyber threats. Continuous
monitoring must be implemented to enable the team to detect
anomalous activity with an understanding of the potential
impact of the event. In addition, team members must under-
stand their unique roles and responsibilities and how they
align with compliance requirements.
Lively response
Once an attack is detected, security analysts quickly work
to contain the threat and prevent it from spreading in the
environment. For example, if the team detects malware, ana-
lysts take action to prevent lateral movement infecting other
systems.
The faster an attack is contained, the lower the impact to the
business. Examples of containment measures include discon-
necting devices from the Internet, disabling remote access,
and changing passwords. However, the specific strategies and
procedures used depend on the type of incident and the risk of
the threat versus the business impact of the containment mea-
sures. A low-risk threat, for example, won’t necessitate shut-
ting down critical business services.
Rapid recovery
With the threat contained, the security operations team
focuses on remediation. Remediation requires assessing the
attack to determine its scope and severity: what systems have
been affected, and what is the potential business impact?
Perhaps just one server was compromised, but the business
risk might be lateral movement to other critical assets. By
comparison, ransomware spreads quickly and may require
action to prevent further infection.
Chapter 4: Reduce the Business Impact of a Cyberattack | 19
Restore swiftly
Finally, we come to the last function of NIST’s Cybersecurity
Framework: recover. The goal is to get back to business fast
and learn from your mistakes to avoid similar incidents in
the future. Recover activities include undertaking root-cause
analysis focused on implementing improvements based on
lessons learned; and reviewing existing strategies and iden-
tifying activities to maintain resilience and restore impaired
capabilities.
Continuous improvement
TIP Your security operations team can actively improve the orga-
nization’s security posture by taking the time after an incident
response to look at the big picture and making a strategic
effort to reduce your attack surface. That means taking the
lessons learned from security incidents and applying them to
your overall security program.
Lessons learned is the feedback loop where every incident
enables you to be better prepared for the next one. By docu-
menting and sharing this information with leadership, you
set the organization up to prioritize and proactively manage
tactical and strategic vulnerabilities and improve weak areas.
Your security operations team also periodically reviews the
security architecture and network configurations in an effort
to minimize the attack surface and deploy proactive counter-
measures to protect the environment against new threats.
Apply expertise
Security operations requires more than plugging in technology
solutions and waiting for lights to blink green. To effectively
reduce the business impact of a cyberattack, an effective team
should consist of experienced and educated cybersecurity
professionals who understand how attackers move through
the kill chain and know the best way to stunt the attacker’s
efforts. They can respond to threats while reducing the risk of
business impact.
Attacks evolve, and your IT environment must evolve with
them. The certified cybersecurity professionals on an effective
security operations team, through their tenure, continue to
develop pragmatic approaches to detecting and remediating
threats while developing intuition that enables them to know
where to look next. These people are by far your most impor-
tant asset when it comes to building effective security opera-
tions that can eliminate cybersecurity risk.
Chapter 5
Achieving World-class
Security Operations
In this chapter
• Understand some of the many processes needed for security
operations
• Consider the challenges of building your own security opera-
tions function
• Explore the benefits of working with a security operations
provider
Technology
Rest assured, we don’t advise ripping and replacing your
existing technology investments. The data from these tools
is likely to have value. Instead, optimize IT and security con-
trols and send the telemetry to a cloud platform for storage,
enrichment, and analysis. Putting your security-related data
in a centralized location allows it to be used to drive multiple
security outcomes – “gather it once and use it many times”
being the mantra here.
A platform is the primary piece of technology used by a
security operations function to achieve visibility into the IT
environment. The platform has three main functions:
1. Collect data – The platform works with your existing
technology stack, spanning endpoints, the network, and
cloud resources, to collect events from your IT environ-
ment. The platform centrally stores all security logs and
telemetry to aid with regulatory compliance efforts and
provides on-demand access to this event data.
2. Enrich data – The platform correlates the events from
your IT environment with threat intelligence from com-
mercial and open-source feeds. All event data is contextu-
alized so you can quantify your digital risk with an under-
standing of vulnerabilities, system misconfigurations, and
exposure to account takeovers. The platform also enables
you to see security events from multiple perspectives,
based on a broad set of telemetry sources.
3. Analyze data – The platform leverages machine learning
and cloud-native detection engines to automatically detect
advanced threats. To help reduce false positives, the secu-
rity operations team writes custom detection rules for your
environment. Finally, the platform aggregates alerts into
incidents to eliminate alert fatigue.
TIP To ensure scalability, it’s recommended you take a best-of-
breed approach to technology selection. Then, when consider-
ing external assistance, find a partner with a security opera-
tions platform that is cloud based and vendor agnostic.
Ideally, the platform is developed and maintained by the ser-
vice provider.
Chapter 5: Achieving World-class Security Operations | 23
Frameworks
As discussed in Chapter 2, an industry-standard framework is
helpful for guiding the efforts of a security operations func-
tion. Frameworks provide best practices and processes for risk
assessment, threat lifecycle management, and more. By align-
ing your wholistic cyber program with, for example, the NIST
Cybersecurity Framework, the security operations function
can benchmark its efforts and gauge what changes need to be
made for continuous improvement.
Specific security operations frameworks that may be used
include the MITRE ATT&CK Framework (a globally accessible
knowledge base of adversary tactics and techniques), and
Lockheed Martin’s Cyber Kill Chain® framework (part of
the Intelligence Driven Defense® model for identifying and
preventing cyber intrusions).
What is most important is focusing on the complete security
operations framework. Look to implement a security program
and outcomes that span the disciplines of identifying, protect-
ing against, detecting, responding to, and recovering from
threats against high-value assets. This approach should cover
all attack surfaces: endpoint, network, cloud, identity, and
human. The combination of visibility across your environment
with a focus on key cybersecurity functions enables you to
prevent, detect, and respond to any attack.
Processes
In addition to the processes described in industry frameworks,
security operations requires others to function optimally.
These additional processes include:
People
Last, but certainly not least, a security operations function
requires certified security professionals with a variety of skill-
sets. Security analysts, threat hunters, forensics investigators,
systems administrators, and systems managers are just a few
of the titles needed for effective security operations.
Security operations must be staffed for 24x7 coverage and
then some to avoid employee burnout. Staff should be able
to take sick or vacation time without forcing others to work a
double shift. Also, people need space to learn and explore — to
grow their own knowledge base and be innovative and effec-
tive in their work.
Chapter 5: Achieving World-class Security Operations | 25
Build it yourself
When considering a new project or other endeavor, many peo-
ple have the misconception that building it internally will
reduce costs. However, building a security operations function
requires resources that may already be difficult to come by.
And without the proper resources, you’re likely to fall short of
achieving fully functional and effective security operations.
Budget constraints
Let’s start with the most obvious challenge: cost. Security
operations requires a significant investment. To build an
effective function, you need to fully invest in the technology,
tools, and people we described in the first half of this chapter.
If you don’t have the budget to hire 10-12 full-time employees
(the minimum requirement for a fully staffed security opera-
tions team), to continually invest in the team’s training, and
to procure and manage the platform, then a DIY approach to
security operations is a nonstarter.
Time investment
You simply can’t build a security operations function over-
night. Even if you receive financial resources, you need time
to procure and set up technology, staff the team, and establish
processes. This typically takes up to two years to complete.
Meanwhile, the security team must continue its existing
efforts to maintain the status quo.
Time continues to be a challenge even after the security
operations team is functional. Faced with a constant barrage
of cybersecurity attacks, security operations teams may find
it difficult to do anything other than detect and respond.
Organizations often find themselves in constant firefighting
mode. They often can’t step away long enough to apply lessons
learned, reduce the attack surface, or deploy countermeasures,
never mind assisting the business with new initiatives.
Evolving threats
Building an effective security operations function is also
challenging because threats are constantly evolving. Malware
morphs to evade detection, and attackers shift their focus to
other parts of the environment. (The increasing number of
attacks against the supply chain is a good example of how
attackers evolve their tactics to target weaker areas in an
environment.)
Organizations need threat intelligence and expertise to keep
up with the latest TTPs attackers are using against their
targets. This is an ongoing need that requires dedicated staff
and budget.
Expanding landscape
SOCs face a challenge of staying current with expanding orga-
nizational requirements with limited staff. Threats multiply as
new technology is added to the existing environment. This can
be personally owned devices allowed under a bring your own
device (BYOD) policy, cloud, or machine turnover. Evolving
threats multiplied by a expanding landscape results in reduced
security confidence and increased cyber risk.
Outsource to a security
operations provider
The last and most viable option for the majority of organiza-
tions is to outsource to a security operations provider. Security
operations providers are in the business of leveraging people,
processes, and technology to eliminate risk. They understand
the challenges of building your own security operations func-
tion, remove the complexity for you, and significantly reduce
your time to value.
28 | Comprehensive Guide to Security Operations
Broad visibility
Security operations providers collect and retain log data
from your environment to achieve broad visibility into your
endpoints, network, and cloud platform. This broad visibility
enables the provider’s security analysts to detect threats early.
Centralizing the log data provides a holistic view of the IT
environment. By eliminating data silos, security analysts can
correlate data and uncover anomalous behavior that might
otherwise be missed. A cloud-based platform ensures that
scalability won’t become a problem, regardless of how much
your environment grows.
24x7 coverage
A security operations provider is fully staffed with experienced
and knowledgeable security professionals to cover all time
zones. You can rest assured you have continual protection.
The provider can attract top talent because its core business
is security. A successful security operations provider has the
resources to pay a competitive wage and offer its employees
attractive benefits. In addition, the culture appeals to security
professionals who are passionate about what they do.
Strategic guidance
Besides a big-picture perspective of your environment, busi-
ness, and team, a good provider possesses vast experience and
lessons learned from its other partnerships that translate into
best practices for you. All of these assets come together in the
form of strategic guidance designed to improve your security
posture and minimize your attack surface.
Continuous improvement
The strategic guidance you receive from a security operations
provider will result in continuous improvement. Your organi-
zation’s security posture will grow stronger and the environ-
ment will become more resilient. The security partner will
demonstrate this continuous improvement by benchmarking
against a security strategy and framework tailored to your
environment and business risk. Benchmarking enables you to
understand where you are today, where you want to be tomor-
row, and how you’ll get there.
10 Requirements for
Choosing a Security
Operations Partner
In this chapter
• Understand the choice you need to make as a security leader
• Learn what to look for in a security operations provider
• Review the key features and capabilities that you need from a
security operations provider to eliminate risk
Dedicated Team
Day-to-day security operations requires a large team of
security professionals working behind the scenes. But when
it comes to interacting with the provider, you should have
a dedicated point of contact who works on your behalf. In
addition, a small group of named security operations experts
should serve as an extension of your in-house team.
At the same time, the provider must respect its security
professionals and the value they personally deliver to your
organization. Look for a provider that invests in its people by
providing training and paths for professional growth. These
investments help with employee satisfaction and retention,
which benefit you by maintaining continuity in the provider’s
security team.
As shown in Figure 6-2, the provider’s team should provide
you with the following:
Figure 6-2: Look for a provider that can deliver coverage, exper-
tise, and strategy.
34 | Comprehensive Guide to Security Operations
No Noise
TIP A security operations provider should properly tune its detec-
tion logic to keep false positives and alerts to a minimum. The
only alerts you receive should be true, actionable alerts with
guidance for remediation. You should be able to rest easy at
night knowing that if the security operations provider wakes
you with a critical alert, it is for good reason.
Organizational Understanding
The ideal security operations provider is much more than a
partner. To eliminate risk, the provider must function as an
extension of your organization. The provider’s security team
should understand your business operations and company
culture. They should learn how these impact your network
architecture and act accordingly.
Value
The security operations provider should deliver value from
day one of your engagement and a return on your investment
year over year. Most notably, the provider should reduce
the time, effort, and money your organization must spend to
manage cybersecurity incidents, freeing your security and IT
operations people to work on other tasks. The provider should
also improve your security maturity without the cost of addi-
tional staff or security tools.
In addition to the other items in this chapter, to help ensure a
suitable return on investment, look for a provider that lever-
ages your existing technology investments and offers predict-
able pricing and unlimited data collection.
24x7 Monitoring
Around-the-clock monitoring is an absolute necessity. If a
security operations provider only promises to monitor your
environment during standard business hours, then their team
will always be playing catch-up, triaging the previous night’s
alerts rather than looking at current activity. Look for a secu-
rity operations provider that is fully staffed to operate both
Chapter 6: 10 Requirements for Choosing a Security Operations Partner | 35
day and night, seven days a week, with enough wiggle room to
accommodate its employees’ vacation and sick time without
causing burnout for the rest of the team.
Figure 6-3: The ideal partner should lead you on a security jour-
ney that results in a continuously improving security posture.
Flexibility
A provider should be flexible in their approach. To achieve
value from day one, they should be able to hit the ground run-
ning with any security stack. They should also evolve as the
customer does and grow to meet the customer’s demands.