Threat Management
How detection posture management can help CISOs track the right metrics

(The MITRE Corporation)
In today's economy, CISOs are increasingly focused on optimizing and rationalizing their security stacks, while also leveraging automation to reduce the need to hire from the ever-scarce talent supply.At the same time, many CISOs ask themselves: Which new metrics should we track? Both to justify security budgets to leadership and to drive continuous improvement in their security operations.Security leaders have typically tracked metrics such as mean time to detect (MTTD) and mean time to respond (MTTR). Of course, these metrics are still important. Detecting and responding quickly to attacks — before they have a material impact on the business — stands as important function of the security team.But MTTD and MTTR metrics are missing critical information about which attacks were never – and will never be – detected in the first place, either because of important gaps in detection coverage — or due to alerts that got buried in a sea of noisy alerts and were never pursued by the SOC team. The surprising disparity between perceived and actual coverageMany organizations are unaware of the disparity between their assumed theoretical security and the defenses they actually have in place.In fact, according to anonymized and aggregated data from diverse production SIEMs, including Splunk, Microsoft Sentinel, and IBM QRadar – encompassing more than 14,000 log sources, thousands of detection rules, and hundreds of log sources – our analysis found:On average, enterprise SIEMs contain detections for fewer than five of the top 14 MITRE ATT&CK techniques employed by adversaries in the wild. Fifteen percent of SIEM detection rules are broken and will never fire, primarily because of fields that are not extracted correctly or log sources not sending the required data. Only 25% of organizations that forward identity logs to their SIEM, such as Active Directory and Okta, actually use them in detection rules – meaning they’re likely to miss top ATT&CK tactics like Privilege Escalation and Credential Access. Seventy-five percent of generic out-of-the-box detection content provided by SIEM vendors is disabled because of noisiness and customization challenges experienced by detection engineering teams. And according to IDC, 20-30% of all alerts are simply ignored or not investigated in a timely manner, often from classic “alert fatigue” caused by too many noisy alerts.Are we missing detections for the ATT&CK techniques, adversaries, and crown-jewel assets most relevant to our business? Do we have detections that have become noisy, broken, or misconfigured from ongoing changes in our infrastructure – thereby creating additional gaps for attackers to take advantage of? Are we missing telemetry for important security monitoring layers like cloud or IAM? Can we reduce costs (and complexity) by eliminating underutilized or redundant security tools from our stack? What threats are we choosing not to detect based on practicality, cost, and/or the risk profile (that the team should present to the business as part of a formal or informal risk acceptance process)? We now have multiple SIEMs (such as Splunk or IBM QRadar plus Microsoft Sentinel or Chronicle SIEM) to optimize costs and monitor hybrid and multi-cloud environments – how do we obtain an aggregate view of the company’s detection coverage? Are we proactively developing new detections based on a threat-informed perspective — or simply operating in a reactive, ad-hoc way to the latest requests from internal teams?
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds