Battle For The Modern Security Operations Center
Battle For The Modern Security Operations Center
Battle For The Modern Security Operations Center
Sponsored by Kaspersky
Authors:
Konstantin Rychkov
Battle for the Modern Security Operations Center
Christopher Kissel The Evolution of Security Operations and the Contemporary State
of Play
August 2020 Today more than ever, security is not about buying the latest security novelties; it is
about building efficiencies into the processes that contribute to overall business
priorities, without undermining key security prerequisites. Currently, over half of all
global businesses with 2,500 or more employees already have a security operations
center (SOC) in one form or another, and 72% of those have built these capabilities
within the last five years. The most advanced organizations build their internal
security operations centers so that they are integrated with overall IT governance
and guided by strategic priorities on the horizon.
The modern SOC has evolved dramatically, as have requirements for its
efficiency and effectiveness.
IDC #EUR246697320
BATTLE FOR THE MODERN SOC
Despite the security industry's active progress in this direction, legal and security
compliance are still unsolved issues. Even if we ignore the impact of numerous
"tick-box compliance" exercises aimed at passing audits, issues such as regulatory
overlaps for multinationals will remain. Moreover, this is yet another process,
console, and/or tool to manage for the SOC team.
Budgets
Demonstrating immediate ROI for SOC tooling is almost impossible, but businesses
still prefer this indicator for defining budget allocations. If we take the formula for
ROI from the official guide to CISSP-ISSMP, the hardest to assess would be the
monetary impact from applying countermeasures. And, yes, it still leans on a
reactive approach to security.
While the long-term effects of COVID-19 are still to be determined, a global IDC
survey of 880 IT professionals found that 54% of companies plan an increase in, or
no change to, their IT budgets in 2020 and 2021. More companies were expected
to have reduced their planned IT budgets than those planning to increase them,
but IT has become an essential part of every business. With a greater shift to
remote working and growing economic uncertainty, perhaps the case for getting a
better performance out of the SOC is now stronger than ever.
1
IDC Technology Spotlight: Integrated Cybersecurity Delivers Efficiency and
Effectiveness in a Challenging Environment
IDC #EUR246697320 2
BATTLE FOR THE MODERN SOC
Acquiring and raising talent internally costs money, but the time a tier-one analyst
spends at a company is decreasing each year. Nowadays, on average, a
cybersecurity analyst stays in a company for 27 months, 4 months of which are
spent on induction training.
Progression through
maturity stages by using A lack of documented processes and procedures forces SOC leaders to start from
internal resources and only scratch every time a shift in the team occurs. So, increasing turnover among
analysts decreases the efficiency of the entire security program.
enhancing the SOC stack
with technology is not Human-less Technology's Impact on Operations
feasible for most According to IDC research, the majority of CISOs find that time is wasted on routine
organizations. For that tasks and maintenance when that time could be better spent on actual response.
reason, the automation of Building a “great filter” can help to prioritize real problems and resolve the basics
security functions and the much faster.
augmentation of the We can engage tier-one analysts, and, as we build in more automation and
internal SOC with managed orchestration, our SOC will evolve along the maturity curve, as shown here:
security services are
Figure 1
inevitable and, in fact, Maturity Curve for Security Operations
recommended.
Source: IDC
Progression through stages by using internal resources and only enhancing the
SOC stack with technology is not feasible for most organizations. For that reason,
the automation of security functions and the augmentation of the internal SOC
with managed security services is inevitable and, in fact, recommended.
IDC #EUR246697320 3
BATTLE FOR THE MODERN SOC
IDC #EUR246697320 4
BATTLE FOR THE MODERN SOC
With the breadth and depth of problems that security leaders face en route to
building a next-generation SOC, it is hard to imagine a single solution that can plug
To enable a next-generation
all the gaps and would fit any environment. Frankly speaking, it truly is not yet
SOC, a solution would need
possible. Such a solution would need to include processes, people, and technology,
to include processes, with associated guidelines, wrapped into a comprehensive out-of-the-box
people, and technology, operational framework and delivered as a platform or a managed service. While
with associated guidelines, this is currently a tall order, transformation offerings exist on the market that can
wrapped into a enhance the traditional SOC and facilitate the journey up the maturity curve.
comprehensive out-of-the-
Kaspersky's Expert framework links a vast portfolio of advanced tools with
box operational framework
dedicated services and expert support. In its essence, Kaspersky's approach is to
and delivered as a platform identify issues and oversights in both the process and the underlying technology,
or a managed service. and then address them with comprehensive solutions and services to enable SOC
While this is a tall order, transformation. A high-level overview of key components is shown in Figure 2,
transformational offerings below.
exist that can enhance the
Figure 2
traditional SOC and Kaspersky for Security Operations Center
facilitate the journey up the
maturity curve.
Source: Kaspersky
At the core of this offering sits a single technology platform comprising three key
components:
Expert solutions are extended versions of the offering for the mainstream market,
delivered within Kaspersky's Optimum framework. Kaspersky's Optimum framework
includes Kaspersky EDR for anomalous detection across endpoints, Kaspersky
Sandbox to convict individual files, and Kaspersky Threat Intelligence Portal.2
2
This framework is discussed in more detail here:
http://media.kaspersky.com/en/business-security/enterprise/endpoint-detection-and-
response-optimum-whitepaper.pdf
IDC #EUR246697320 5
BATTLE FOR THE MODERN SOC
MDR, under the Kaspersky Expert framework, runs 24x7 monitoring, incident
validation, and automated and managed threat hunting, with extended raw data
storage terms for retrospective threat hunting. This service enables the outsourcing
of tier-one functionalities and adds a direct communication channel to Kaspersky's
SOC experts for assurance and validation. All raw and TI data is available for
forensicating and internal investigations. The goal here is to lift the burden of time-
consuming processes and ensure the true transience of externalized operations.
Mean time to resolution (MTTR) — which is the time from the automatic
generation of an alert (from the automated analysis of events) to its resolution by
Kaspersky experts — is 25 minutes on average.3 Frankly, this metric for the industry
varies from hour to days, or even weeks, especially when we consider breach
remediation. Reaction time counted in minutes is essential in a modern and fast-
moving SOC environment.
The most important component of functionality from Kaspersky for mature SOCs is
the KATA platform, which centralizes operations in one web-based console for
network traffic analysis, endpoint activity monitoring, and unified visibility and
control. The platform automates collection, normalization, correlation, storage, and
investigation across metadata from networks, email, the web, and endpoint
telemetry. Semi-automated functionality includes root cause analysis (RCA),
forensics, YARA detection, indicator of compromise (IoC)-based discovery, IoA
mapping, querying for threat hunting, and integration with Kaspersky's TI portal.
Discovery and investigation results on the KATA platform are set to trigger and
execute a gateway-level auto-response based on customizable policies and
thresholds. The KEDR and KATA products both have a Syslog API and support all
SIEMs and security orchestration, automation, and response (SOAR) stacks that can
work with Syslog CEF. This capability can tremendously decrease the level of
"noise" and help to focus efforts on significant security events. With pre-filtered
3
http://securelist.com/managed-detection-and-response-analytics-report/94076/
IDC #EUR246697320 6
BATTLE FOR THE MODERN SOC
In a nutshell, three components of the SOC Expert core offering can provide
advanced and customizable tooling for the detection and prevention of both
known and novel 0-day and advanced threats. The managed component eliminates
the need for personnel to monitor, triage, and investigate ad-hoc incidents. On-
demand components can support the most sophisticated cases with in-depth
services and capabilities. All components are linked with the TI platform, providing
context for actions and investigations.
As mentioned already, personnel are the most critical asset and the main issue for
an SOC of any size. Training and upskilling analysts should be prioritized in a
modern security operations strategy. Kaspersky has thus included education and
training in the Expert framework for SOCs, listing courses for different levels of
personnel, from security awareness basics for lines of business to incident response,
malware analysis, and threat hunting for tier-three analysts.
With an evolution roadmap derived from realistic and critical assessments of the
organization's posture — one that incorporates industry best practices for security
operations augmented by trained personnel and backed up with technical support
— we can embark on a journey to a modern SOC.
The last major component of the value-add proposition from Kaspersky is its TI
platform. Threat data feeds are layered over the enterprise threat profile to help
triage and highlight the most relevant and impactful IoCs. The list of Kaspersky
IDC #EUR246697320 7
BATTLE FOR THE MODERN SOC
feeds includes, but is not limited to: URLs segmented by threat type (ransom,
phishing, etc.) and targeted-environment type (IoT, mobile, etc.), IP reputations,
APT IoCs, passive DNS resolutions, FQDNs, vulnerabilities and CVEs, C&C botnets,
and MD5 hashes. TI also includes methods, techniques, and tactics from ATP
research to keep defenders up to date with the threat landscape.
In the SOC Expert offering, KEDR and KATA support the import of IoCs for machine
scanning. These solutions natively integrate with Kaspersky Security Network (cloud
knowledge base), which sources TI from third-party vendors, partners, and open-
source intelligence. Kaspersky's TI portal enables the looking up and matching of
objects against feeds, with the subsequent alerting of incident-response teams.
Finally, the CyberTrace TI fusion and analysis tool helps to merge feeds from all
sources (in JSON, STIX, XML, and CSV formats, including custom internal feeds) and
push them into SIEM or run correlations across logs.
Having TI is less important than being able to use and apply it. In its early days,
security teams piled up intelligence, but, without process integration, it was
doomed to become shelfware. Actionable and company-/industry-specific
intelligence must become an integral part of operations and feed into
investigations.
Kaspersky's Expert framework and toolset for SOCs is a highly detailed and
specialized offering designed to cover gaps in security operations from people,
process, and technology perspectives. The chosen approach uniquely bonds
together service and technology to enhance the capabilities of SOC analysts, retain
and increase knowledge, retain and train talent, and enrich security functionality.
Nonetheless, as is the case with any solution, this offering has its limitations.
The sophistication of components requires SOC leads to have an advanced skills set
at their disposal. The Expert framework from Kaspersky targets very mature
environments and teams in which many components are already in place and that
operate under a detailed governance framework. The standalone components of
the Expert offering can fit a mature environment with minimal adjustment, yet a full
framework may require the restructuring of processes and integration with existing
tools, especially custom ones. A detailed assessment of requirements at the proof-
of-concept stage is advisable. Assessment services can support this analysis to a
degree, leaving the decisions to SOC leads and the CISO.
The cost associated with entire-stack implementation can be prohibitive for some
organizations, especially when Kaspersky solutions will be replacing products under
terminal licenses. ROI evaluations in such projects should be among the first steps.
Alternatively, components can be acquired separately, but the cost of integrating
these with in-house inventory must be verified.
The core technology stack of Kaspersky's Expert framework is fit to combat threats
across the estate. The functionality and effectiveness of KEDR and KATA are rated
highly by industry experts and practitioners, but some limitations apply here, as
well. KATA's traffic throughput is limited by the machine setup; it requires the well-
thought-out design and architecture of data-flow processing to sustain
IDC #EUR246697320 8
BATTLE FOR THE MODERN SOC
From the architecture perspective, both KEDR and KATA can run on physical
machines or virtual servers, and some limited functionality can be deployed in the
public cloud of choice. Currently, the biggest limitation for the KEDR component is
Kaspersky's Expert the OS on which agents can be deployed. Currently, that only includes Windows-
framework and toolkit for based devices, but the product development roadmap includes plans for Linux and
SOCs is a unique offering macOS support in 2021.
with the sole purpose of
KATA's advanced web and email analysis features reportedly work best with the
helping mature SOCs
Kaspersky stack. Deployments in heterogenous environments will require full-stack
maximize the efficiency of integration to map the metadata for analysis.
security operations and the
level of protection provided Kaspersky's threat intelligence suite, like KATA, has a dedicated server as a
prerequisite. Log correlation may require forwarding from SIEM and back,
to the enterprise. As it
generating additional network footprint. A new release of CyberTrace is planned for
evolves, such a framework
2021, which may partially solve related issues.
can become a cornerstone
of the modern SOC. On a higher level, Kaspersky's Expert offering requires a deep understanding of
technology; it is not a simple one-size-fits-all solution. Out-of-the-box capabilities
that can be customized and integrated flexibly can be invaluable for a modern SOC,
but maximizing the value of Kaspersky's suite without Kaspersky's Expert services
would not be a trivial task. The complexity and the number of components require
a clear vision and professional support from the vendor. Ideally, this offering should
come with reference architecture and a use-case portal to simplify its
operationalization.
Finally, Kaspersky's Expert framework and toolkit for SOCs is a unique offering that
continuously evolves with the addition of new features and integrations. Its sole
purpose is to help mature SOCs maximize the efficiency of security operations and
the level of protection provided to the enterprise. As it evolves with MDR and
people-centric services, such a framework can become a cornerstone of
transformation from a traditional to a modern SOC.
IDC #EUR246697320 9
IDC UK About IDC
International Data Corporation (IDC) is the premier global provider of market
5th Floor, Ealing Cross, intelligence, advisory services, and events for the information technology,
85 Uxbridge Road telecommunications and consumer technology markets. IDC helps IT
London professionals, business executives, and the investment community make fact-
W5 5TH, United Kingdom based decisions on technology purchases and business strategy. More than
44.208.987.7100 1,100 IDC analysts provide global, regional, and local expertise on technology
Twitter: @IDC and industry opportunities and trends in over 110 countries worldwide. For 50
idc-community.com years, IDC has provided strategic insights to help our clients achieve their key
www.idc.com business objectives. IDC is a subsidiary of IDG, the world’s leading technology
media, research, and events company.
IDC #EUR246697320