SANS Report Reveals Significant Growth in Automation: Maximize Your Investments

NOOR BOULOS

The SANS 2021 Automation and Integration Survey is now available for download, focusing on the question: First we walked, now we run – but should we? 

Let’s face it, we’ve talked about security automation for years. We’ve grappled with what, when and how to automate. We’ve debated the human vs machine topic. And at certain points, when we’ve been “burned” (automatically shutting down systems in error), we’ve wondered if there’s any place at all for automation. But in our heart of hearts, we’ve known for years that automation is the future. Now the future is here. 

While most organizations had at least minimal automation of key security and incident response (IR) processes, the events of 2020 served as a tipping point. The new SANS report discusses how the global pandemic forced many organizations to accelerate their plans for automation, where they are prioritizing their investments and the plans they have for the future. The survey spanned companies of all sizes, representing a diverse blend of industries and with operations in North American, Europe, Asia Pacific and Africa. 

Some of the key findings include:

  • Nearly one-third of organizations indicated that their plans for automation accelerated because of the COVID-19 pandemic.
  • More than 80% of organizations have at least partial automation of key security and IR processes, up from 47% in 2020. 
  • Drilling deeper, IR processes saw the most significant growth in automation – with extensive automation jumping nearly 18%, from 10.5% in 2020 to 28.3% in 2021. 
  • Security operations and event or alert processing remains the top area for automation with 35.5% reporting extensive automation.
  • The future looks bright for security automation, with 85% planning on automating key security and IR processes in the next 12 months alone.

As you look to the future and use these survey results to help better understand how to expand your use of automation within your security operations, it’s important to consider when to apply automation within the security lifecycle to maximize business value. At ThreatQuotient, we have long believed that data is the lifeblood of detection and response automation, so the key to effective automation starts with data. Let’s take the two primary use cases in the report, Alert Triage and Incident Response, as examples. 

Alert Triage:
Analysts are inundated by the number of alerts that require human attention, generated by noisy SIEM rules and default defense infrastructure. In an attempt to reduce the volume and velocity of security alerts they must tackle on a daily basis, analysts apply external threat data and threat intelligence feeds directly to the SIEM, but challenges continue for two main reasons. First, the amount of external threat data is staggering. Sending all of this data directly to the SIEM for correlation results in tons of non-contextual alerts, each of which requires significant work by an analyst to research. Second, there is a lack of decision support capabilities in current tools to provide additional context and understanding to determine relevance, before applying threat intelligence feeds directly to the SIEM. Prioritization is imperative to focus and determine the appropriate next actions to take during the alert triage process.

With the ThreatQ Platform you can address the alert triage challenge and stop the useless alerts before they happen by ONLY feeding threat intelligence that is relevant to the organization. By automatically applying context, relevance and prioritization to threat data prior to applying it to the SIEM, the SIEM becomes more efficient and effective. Customized threat intelligence scores based on parameters you set, coupled with context, allows for prioritization based on what’s relevant to your specific environment. Now, using a subset of threat data that has been curated into threat intelligence, the additional overlay allows the SIEM to generate fewer false positives and encounter fewer scalability issues. 

Incident Response:
The current approach to Security Orchestration, Automation and Response (SOAR) has focused on automating processes. The challenge is that when applied to detection and response, process-focused playbooks are inherently inefficient and complex because the decision-making criteria and logic are built into the playbooks and updates need to be made in each playbook. This complexity grows exponentially as you increase the number of playbooks. Automating and orchestrating noisy data just amplifies the noise.

With ThreatQ TDR Orchestrator you can take a simplified, data-driven approach to SOAR, where the data, or information, drives playbook initiation and data learned by actions taken is used for analytics and to improve future response. Putting the “smarts in the platform” and not individual playbooks provides for simpler configuration and maintenance, and a more efficient and effective automation outcomes. Users can curate and prioritize data upfront, automate what’s relevant and simplify actions taken.

Download your copy of the SANS 2021 Automation and Integration Survey now to learn more about how organizations are using automation. To see how ThreatQuotient can help you apply automation with confidence and get more from your existing investments in teams and tools, schedule a demo.

0 Comments

Blog Archive

About ThreatQuotient™

ThreatQuotient™ understands that the foundation of intelligence-driven security is people. The company’s open and extensible threat intelligence platform, ThreatQ™, empowers security teams with the context, customization and prioritization needed to make better decisions, accelerate detection and response and advance team collaboration.
LEARN MORE
Share This