Security Effectiveness Report 2020
Security Effectiveness Report 2020
Security Effectiveness Report 2020
Table of Contents
Conclusion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
SPECIAL REPORT SECURITY EFFECTIVENESS REPORT 2020 5
Cyber Effectiveness
as a Business Metric
Measuring the effectiveness of and justifying the investment in security controls
has become a key performance metric for enterprises because boards of
directors and CEOs are expected to provide verifiable proof that business assets
are protected from the fallout of a potential breach. However, as organizations
begin to address cyber risk as a business problem, they also continue to manage
security as an IT function. This dynamic exposes the misalignment between IT,
which owns infrastructure, and the security team, which owns the cyber security
controls and processes that protect the business. Our experts have found that this
disconnect increases the need for security teams to generate reliable evidence of
effectiveness.
Security leaders report that they need to be able to confidently answer important
questions, such as:
6 SPECIAL REPORT SECURITY EFFECTIVENESS REPORT 2020
The statistics outlined in this report were generated through careful analysis of
thousands of attack behaviors. These attack behaviors were executed in enterprise
production environments supporting over 900 million consumers, and against 123
market-leading security technologies, such as network, email, endpoint and cloud
solutions.
Industry verticals
11 123
Market-leading
security technologies
Enterprise
Production Environments
900 million
consumers affected
SPECIAL REPORT SECURITY EFFECTIVENESS REPORT 2020 7
It is alarming that
9%
alerts are only generated for
of attacks
53% Missed
9% Alerted
26% Detected
33% Prevented
Definitions of Figure 1. Aggregated data for attack interactions. Total is greater than 100% because alerted
is a subset of detected and attacks can be either or both detected and prevented.
Attack Interactions
Missed An attack that
was not prevented or
detected. Many organizations are performing below their predicted levels of effectiveness.
Alerted Event raised to The data (Fig. 1) shows that many companies find a discrepancy between their
an analyst or response expected capabilities and the measured results. On average, they detect only 26%
level, typically through of attacks and prevent 33% of them, which provides an opportunity to optimize
a SIEM. their investments. It is alarming that alerts are only generated for 9% of attacks.
Detected Security
control creates an Altogether, this has a negative impact on incident response because SIEMs and
event identifying an other technologies responsible for triggering alerts cannot deliver a high level of
attack. fidelity to both prioritize and address security concerns.
Prevented Security
control successfully
blocks an attack.
8 SPECIAL REPORT SECURITY EFFECTIVENESS REPORT 2020
Host-based Controls
An over-reliance on host-based controls, which can be associated with a lack
of visibility into status of security controls, may cause additional exposure for
organizations.
10 SPECIAL REPORT SECURITY EFFECTIVENESS REPORT 2020
Security tools are often configured to address such challenges but may be poorly
optimized. The most common reasons for poor optimization include:
ATT When we asked security executives, “How do you believe your controls are
&CK performing in each focus area?” many found that after executing an initial iteration
of testing, their production environments performed well below expectations
Operationalize Threat against these challenges:
Intelligence
The MITRE Adversarial • Reconnaissance
Tactics, Techniques &
• Infiltrations and ransomware
Common Knowledge
(ATT&CK) framework • Policy evasion
has emerged as a key
resource for security teams • Malicious file transfer
attempting the process of
• Command and control
defending against threat
actors. Technologies • Data exfiltration
designed to test or validate
security defenses offer new • Lateral movement
means to operationalize
threat intelligence. Security
teams can leverage
ATT&CK to perform gap
assessments on their
defenses and discover what
needs improvement.
SPECIAL REPORT SECURITY EFFECTIVENESS REPORT 2020 11
4%
of reconnaissance activity
generated an alert
Reconnaissance
After testing network traffic, organizations reported only 4% of reconnaissance
activity generated an alert. This exposes the risk associated with misconfigured
controls, resulting in higher risks of successful scanning and profiling as well as a
high percentage of missed early stage attack tactics.
54% Missed
4% Alerted
26% Detected
37% Prevented
Common Causes
• Network segmentation misconfiguration
• Lack of internal security control points—inside network traffic is not monitored
the same way
• Inability to distinguish reconnaissance from normal network monitoring
Example
A Fortune 500 company leveraging security validation discovered an inadvertently
misconfigured proxy that was responsible for maintaining segmentation across
two regulated systems. This misconfiguration enabled communications between
networks and exposed a portion of the company’s critical internal business
network. With continuous validation in place, the security team was immediately
alerted on this change and the company quickly restored segmentation and
addressed exposure.
12 SPECIAL REPORT SECURITY EFFECTIVENESS REPORT 2020
68%
of the time.
68% Missed
7% Alerted
21% Detected
35% Prevented
Common Causes
• Deployed under default “out-of-the-box” configurations
• Unknown fail-open conditions in security controls
• Outdated or poorly maintained signatures
Example
During an initial testing period within a government entity, the security team
identified that their network firewall blocked only 24% of executed attacks. Using
detailed information that identified the attack patterns and behaviors, the security
team was able to work with the client’s vendor to optimize the firewall and
increase attack blocking capability to 74%.
SPECIAL REPORT SECURITY EFFECTIVENESS REPORT 2020 13
Policy Evasion
When executing evasive focused attack techniques to bypass policies, 65% of the
time, security environments were not able to prevent or detect the approaches
being tested.
65% Missed
15% Alerted
25% Detected
31% Prevented
Common Causes
• Outdated classification categories
• Limited network monitoring on expected protocols
• Inadequate tracking and communication of changes for one-off exceptions
Example
A Fortune 500 company leveraged security validation to continuously monitor
for changes causing environmental drift, and the investigating team discovered
that data was not being delivered to the SIEM. After analyzing test results,
they discovered that syslogs were being sent over UDP instead of TCP and a
misconfigured load balancer was dropping all UDP traffic. As a result, events were
not being sent to the SIEM and correlation rules did not trigger alerts to initiate the
incident response process. The ability to test this with real attack actions exposed
this scenario and allowed the company’s security team to remove the risk.
14 SPECIAL REPORT SECURITY EFFECTIVENESS REPORT 2020
48% Missed
23% Alerted
29% Detected
37% Prevented
Common Causes
• Unaware of vendor removal of malware signatures
• Misconfiguration of existing security controls
• Under-resourced or aging sandboxing techniques and technologies
Example
An insurance provider leveraged security validation to test various network zones,
including areas designated as hardened. Test results provided evidence that 35%
of malicious file transfers attempted were allowed by the company’s security
tools and no alerts were generated in the SIEM for attempts that were detected
and prevented. Continuous security validation identified misconfigurations, and
this discovery resulted in the rapid optimization of security tools to minimize risk
exposure going forward.
SPECIAL REPORT SECURITY EFFECTIVENESS REPORT 2020 15
39% Missed
3% Alerted
26% Detected
40% Prevented
Common Causes
• Outdated or missing site classification
• Lack of SSL inspection
• Security events not making it to the SIEM
Example
To rationalize significant security investments and identify areas for divestiture, a
critical infrastructure customer in the energy sector leveraged security validation.
The team’s testing efforts identified areas of overlap in capabilities, inefficiencies in
product expectations and gaps in overall security posture. The findings provided
evidence to support cost reductions in endpoint technologies, correct alerting
gaps to the SIEM and deliver improved executive reporting through a third-party
analytics platform.
16 SPECIAL REPORT SECURITY EFFECTIVENESS REPORT 2020
67%
of the time.
Data Exfiltration
Data leakage and protection remains a top concern for CISOs, but exfiltration
techniques and tactics were successful 67% of the time during initial testing.
67% Missed
11% Alerted
31% Detected
29% Prevented
Common Causes
• Unknown fail-open conditions in security controls
• Lack of SSL inspection
• Misconfiguration of existing security controls
• Under-resourced sandboxing technologies or outdated signatures
Example
A Fortune 1000 company testing data loss prevention (DLP) policies and the
ability to stop data leakage observed that its next-generation firewall was not
blocking techniques used to exfiltrate data. security validation exposed the gap
and identified the misconfigured device. Further analysis showed that the firewall
vendor disabled detection capabilities in the latest release without making it
widely known to customers. With this new awareness, the company reconfigured
firewall policies and restored detection, prevention and alerting capabilities.
SPECIAL REPORT SECURITY EFFECTIVENESS REPORT 2020 17
Lateral Movement
Lateral movement is an essential tactic to infiltration of a network. Fifty-four
percent of the techniques and tactics used to execute testing of lateral movement
are missed, and 96% of the behaviors executed did not have a corresponding alert
generated in the SIEM.
54% Missed
4% Alerted
37% Prevented
Common Causes
• Network segmentation misconfiguration
• Lack of internal security control points—inside network traffic is not monitored
the same way
• Inability to distinguish administrative behaviors from malicious activities
Example
A large private healthcare provider had concerns about APT41, a specific actor
reported to be actively targeting the healthcare industry. Leveraging security
validation with integrated threat intelligence, the company discovered that its
network security controls did not detect or prevent known techniques and
tactics associated with attacks used by APT41. This exposed the company to dual
espionage, criminal activity and over 46 different malware families. The testing
results enabled the team to proactively optimize their controls and ensure they
were prepared to defend against this adversary.
18 SPECIAL REPORT SECURITY EFFECTIVENESS REPORT 2020
Continuous Validation
Adversary Coverage
• Tests on both adversary techniques and technical attacks
• New content delivered quickly as threat actors evolve
• Coverage across adversary attack vectors—email, endpoint, and network
• Customizable content to maximize test relevancy for your organization
Business Metrics
• Provides metrics to assess business risk and value of investments
Enterprise Readiness
• Proven in large complex environments
• Backed by a global support team and customer success program
Conclusion
Companies are at much greater risk than they realize. As organizations—from the
C-suite and board of directors down to those on the front lines of cyber defense—
struggle to strengthen cyber hygiene and minimize risk, it has become imperative
that organizations validate security effectiveness.
The best way for your organization to combat this disconnect is to validate the
effectiveness of your security program through ongoing, automated assessment,
optimization and rationalization. This will enable you to minimize cyber risk across
your entire organization by protecting not only critical assets but also brand
reputation and economic value.
22 SPECIAL REPORT SECURITY EFFECTIVENESS REPORT 2020