Understanding cyber threats helps organizations to assess their security posture against prevalent risks and make well-informed decisions around the most relevant cyber risks. These organizations are under constant pressure to identify an efficient and unified mechanism that can:
This is not easy. Adversaries have access to sophisticated tools and resources available for-hire in the Dark Web. It often feels like they’re onto the next attack while your security team is trying to understand the last one.
For their part, organizations are looking for robust processes that are well defined and can consistently combat the persistent security risks. But with threats that are constantly changing shape, traditional Security Information and Event Management (SIEM) tools and the Security Operations Center (SOC) process frameworks can struggle to improve your security posture.
That means there is an opportunity here: taking a more strategic approach to risk mitigation across the Threat Detection, Investigation and Response (TDIR) lifecycle is crucial.
Threat Detection, Investigation and Response (TDIR) is a risk-based approach to mitigate cybersecurity threats and to more efficiently detect threats.
TDIR is a direct response to the “sole use of historical indicators of compromise of even TTP-based detection models”, which Gartner says are not sufficient for staying in front of sophisticated threat actors.
The TDIR lifecycle process involves four key steps:
(Sound familiar? Explore modern SIEM and SOAR solutions that are capable of TDIR.)
Consider the case of a threat detection alert: a suspected IP address wants to connect with your application servers. It may be possible that the application is vulnerable to a known attack and your IT has isolated some network resources to investigate the scope of risk.
A security analyst is tasked to discover any false positive alerts and gather information about the target servers. Because the analyst may not have access to the threat alert process, they are likely to:
Once the issue is escalated, SOC teams may investigate additional data sources relevant to the incident. In order to classify the incident as anomalous or unexpected, the SOC analysts conduct a thorough investigation. These analysts investigate the workflow and route taken by the threat and collect logs from all dependent network nodes and endpoints.
This information is run through a threat detection model to develop a risk profile of the IT assets that may be classified as potential targets. There is a problem here: that without any available business context on these target assets, the analyst may have to engage multiple functional groups to acquire the additional knowledge.
Without asset context, incident response teams may end up resolving threats that do not qualify as high-severity risk incidents—which has some knock-on effects.
This increased workload on incident response teams has a snowball effect on how the SOC can prioritize and optimize a response plan to combat real security threats. The lack of an enriched threat detection and investigation mechanism means that:
Using the TDIR lifecycle can help you avoid these inherent limitations. Here’s some best practices for aligning with it:
Start with defining the goals and objectives for your SOC workflows and risk mitigation playbook guidelines:
Standardize TDIR workflows to provide a well-guided response strategy. Map the threat processes and behavior to the most relevant techniques (such as those in the MITRE ATT&CK framework). Consider these techniques as a playbook adopted by the adversary and use this knowledge to guide a response plan based on the threat lifecycle.
Adopt a modular approach to automate every stage of the TDIR lifecycle:
Finally, provide coverage for all types of threats: compromised and malicious insiders as well as external threat actors. The mode of attacks may range from malware and phishing attacks to data exfiltration and compromise of physical security of target assets.
See an error or have a suggestion? Please let us know by emailing ssg-blogs@splunk.com.
This posting does not necessarily represent Splunk's position, strategies or opinion.
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative.
Founded in 2003, Splunk is a global company — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.