{"id":105412,"date":"2020-01-23T13:00:06","date_gmt":"2020-01-23T21:00:06","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=105412"},"modified":"2020-07-30T19:59:22","modified_gmt":"2020-07-31T02:59:22","slug":"cortex-secops-strategies","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2020\/01\/cortex-secops-strategies\/","title":{"rendered":"3 SecOps Strategies To Enable Your Smart People To Focus on Smart Things"},"content":{"rendered":"<p><i><span style=\"font-weight: 400;\">This blog is the third in a series based on our book, \u201cElements of Security Operations,\u201d a guide to building and optimizing effective and scalable security operations. <\/span><\/i><a href=\"https:\/\/start.paloaltonetworks.com\/elements-of-security-operations.html\"><i><span style=\"font-weight: 400;\">Download a free copy today<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">.\u00a0<\/span><\/i><\/p>\n<p><img loading=\"lazy\" decoding=\"async\"  class=\"alignright size-medium wp-image-105413 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image2-3-230x234.png\" alt=\"This is a closeup of the periodic table-style \u201cElements of Security Operations,\u201d showing one element, Employee Utilization. Better SecOps strategies will improve your handling of this element.\" width=\"230\" height=\"234\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image2-3-230x234.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image2-3-295x300.png 295w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image2-3-39x40.png 39w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image2-3.png 374w\" sizes=\"auto, (max-width: 230px) 100vw, 230px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Presumably, you hire smart people because you want them to spend their time doing smart things. But what happens when your processes are broken, outdated, poorly defined or unscalable? Your talented employees are forced to waste energy overcoming these challenges rather than spending it on the activities for which they provide unique value. The key to solving these problems is implementing better SecOps strategies.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is a pervasive challenge in the average enterprise security operations center (SOC), where alert-generating security tools have multiplied way too fast for anyone to meaningfully integrate them, while at the same time threats have gotten more sophisticated and harder to detect. Analysts toil away to manually identify, validate and remediate an endless flow of alerts. This is not maximizing their job satisfaction, their efficiency nor their overall impact on your security posture.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here\u2019s what the typical SecOps analyst time allocation looks like today relative to the ideal state:<\/span><\/p>\n<p><div style=\"max-width:100%\" data-width=\"775\"><span class=\"ar-custom\" style=\"padding-bottom:38.58%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-105426 aligncenter lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image1-7-230x89.png\" alt=\"Incident response is broken out into three stages: Threat identification, investigation, and mitigation. Analysts traditionally spend most of their time in the identification and mitigation phases. In the ideal state, they'd spend most of their time in the middle investigation phase, where their expertise offers the most value.\" width=\"775\" height=\"299\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image1-7-230x89.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image1-7-500x193.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image1-7-768x296.png 768w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image1-7-1536x592.png 1536w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image1-7-510x197.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image1-7-104x40.png 104w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image1-7-650x251.png 650w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image1-7-874x337.png 874w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image1-7.png 1999w\" sizes=\"auto, (max-width: 775px) 100vw, 775px\" \/><\/span><\/div><\/p>\n<p><span style=\"font-weight: 400;\">The majority of an analyst\u2019s time is spent weeding through false positives and low-fidelity alerts to identify and triage malicious threats. A lot of time is also spent in threat mitigation. Some of this is due to a lack of automation. Other difficulties are introduced by inefficient interfaces with teams and tools outside of the security operations organization that need to be involved in halting the attack. Proportionally little time is spent actually investigating the root cause and impact of a confirmed security incident, and even less time is spent on operational improvement. These latter two areas are where human analysis is most important, and where your talented analysts can have the greatest impact.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">Smarter SecOps Strategies<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Enterprises need to fix this. We need to let smart people do smart things. Here are three strategies to get you started:<\/span><\/p>\n<h4><span style=\"font-weight: 400;\">1. Focus on Prevention-Based Architecture.\u00a0<\/span><\/h4>\n<p><span style=\"font-weight: 400;\">Preventing an attack outright is always the ultimate security outcome. Prevention architecture may exist outside of the SecOps function itself, but it affects the efficiency and efficacy of achieving the SOC mission. Without a prevention-based architecture, analysts can be overwhelmed with false-positives and low-fidelity data. This can result in detuning sensors and ignoring alerts. Analysts may begin to rush investigations or overlook making updates to controls, which amplifies the problem. A properly implemented prevention-based architecture ensures that machines are used for what they are good at \u2013 events \u2013 and people can focus on what they are good at \u2013 situations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A prevention-based architecture cuts down on the noise in the SOC and is comprised of:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\"> Consistent protection across the network, cloud and endpoints.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Centralized management of security controls and devices to provide consistency and reduce administration time.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Automated threat prevention that can update security controls in minutes, not days.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Prevention based on data, assets, applications and services (DAAS) to move controls closer to critical assets and to reduce policy and rule maintenance.<\/span><\/li>\n<\/ul>\n<h4><span style=\"font-weight: 400;\">2. Automate Repetitive Processes.<\/span><\/h4>\n<p><span style=\"font-weight: 400;\">Prevention of known threats isn\u2019t the only function that should be automated by your security tools. Any process that is repetitive and\/or transactional and <\/span><i><span style=\"font-weight: 400;\">can<\/span><\/i><span style=\"font-weight: 400;\"> be automated <\/span><i><span style=\"font-weight: 400;\">should<\/span><\/i><span style=\"font-weight: 400;\"> be automated. This is one of the absolutely key things that we work with our clients on, and it is critical to overcoming alert fatigue and product\/data silos.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Automation can be driven by rules as well as machine learning, and it relies on several primary tools:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2019\/12\/cortex-what-is-xdr\/\"><span style=\"font-weight: 400;\">XDR<\/span><\/a><span style=\"font-weight: 400;\"> for automated alert grouping, enrichment and prioritization, among other things.<\/span><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2019\/10\/cortex-demisto-v5-soar\/\"><span style=\"font-weight: 400;\">Security orchestration, automation and response (SOAR)<\/span><\/a><span style=\"font-weight: 400;\"> tools that run playbooks to aggregate threat intelligence, open tickets, route issues to the appropriate person and execute remediation through integration with different point tools, among other things.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">While analysis and investigation of an incident is a key human function, machine learning and automation can be built into and around these processes to assist in a variety of different ways to accelerate investigations, increase confidence and decrease administrative burden.<\/span><\/p>\n<p><div style=\"max-width:100%\" data-width=\"669\"><span class=\"ar-custom\" style=\"padding-bottom:18.24%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-105441 aligncenter lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image3-1-230x42.png\" alt=\"If you can document the steps to do an investigation or perform mitigation, chances are good you can automate it. Find those opportunities. - Scott Okupski, Automation Global Practice Lead, Palo Alto Networks\" width=\"669\" height=\"122\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image3-1-230x42.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image3-1-500x92.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image3-1-768x141.png 768w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image3-1-1536x282.png 1536w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image3-1-510x93.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image3-1-218x40.png 218w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image3-1-650x119.png 650w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image3-1-874x160.png 874w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image3-1.png 1822w\" sizes=\"auto, (max-width: 669px) 100vw, 669px\" \/><\/span><\/div><\/p>\n<h4><span style=\"font-weight: 400;\">3. Structure Tasks to Avoid Burnout.\u00a0<\/span><\/h4>\n<p><span style=\"font-weight: 400;\">Security operations staff are prone to burnout due to console fatigue and extreme workloads. To avoid this, team members should be assigned different tasks throughout the day. These tasks should be structured in a rotation and may include:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\"> Shift turnover stand-up meeting (beginning of shift).<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Event triage.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Incident response.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Project work.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Training.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Reporting.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Shift turnover stand-up meeting (end of shift).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Another tactic to avoid burnout is to schedule shifts to avoid high-traffic commute times. Depending on the area, 8 a.m.-5 p.m. may line up with peak (vehicle) traffic patterns. Shifting the schedule by two hours could reduce stress on the staff.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While these three tips are great starting points, there are many more considerations covered in the <\/span><a href=\"https:\/\/start.paloaltonetworks.com\/elements-of-security-operations.html\"><span style=\"font-weight: 400;\">Elements of Security Operations book<\/span><\/a><span style=\"font-weight: 400;\"> that will help you get the most out of your security resources. <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/campaigns\/brighttalk.html?commid=382770\"><span style=\"font-weight: 400;\">Join us for our \u201c4 Life Hacks to Love Your Security Job\u201d webinar on Feb. 25<\/span><\/a><span style=\"font-weight: 400;\"> to hear me and Kasey Cross discuss additional strategies to improve SecOps employee utilization and satisfaction.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We\u2019ve embraced each of the above concepts to develop a lean, efficient and constantly improving security operations center for our own company, with analysts who are able to contribute to meaningful work regardless of seniority. To see how these concepts work in practice, read this <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/content\/dam\/pan\/en_US\/assets\/pdf\/use-cases\/how-a-security-company-does-security.pdf\"><span style=\"font-weight: 400;\">case study on the Palo Alto Networks SOC<\/span><\/a><span style=\"font-weight: 400;\">. This case study walks through our SOC structure, philosophy and strategies, and describes the implementation processes for Cortex XDR and Demisto (SOAR) to improve our visibility and automation.<\/span><\/p>\n<h2><\/h2>\n<h3><span style=\"font-weight: 400;\">Get Hands-on with Cortex XDR<\/span><\/h3>\n<figure id=\"attachment_105148\" aria-describedby=\"caption-attachment-105148\" style=\"width: 459px\" class=\"wp-caption alignleft\"><div style=\"max-width:100%\" data-width=\"459\"><span class=\"ar-custom\" style=\"padding-bottom:72.55%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-105148 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image1-5-230x167.png\" alt=\"This image shows the elements of security operations in the style of the periodic table of the elements.\" width=\"459\" height=\"333\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image1-5-230x167.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image1-5-500x362.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image1-5-414x300.png 414w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image1-5-55x40.png 55w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image1-5.png 602w\" sizes=\"auto, (max-width: 459px) 100vw, 459px\" \/><\/span><\/div><figcaption id=\"caption-attachment-105148\" class=\"wp-caption-text\">This blog is the third in a series based off our book, \"Elements of Security Operations.\" Read the first two posts, \"<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/01\/cortex-security-operations\/\">The Six Pillars of Effective Security Operations<\/a>\" and \"<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/01\/cortex-soc-metrics\/\">Do Your SOC Metrics Incentivize Bad Behavior?<\/a>\"<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">Interested in playing around with XDR while learning new tips for prevention, detection, investigation, and threat hunting? <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/events\/investigation-and-threat-hunting-virtual-workshop\"><span style=\"font-weight: 400;\">Attend one of our free investigation and threat hunting virtual hands-on workshops<\/span><\/a><span style=\"font-weight: 400;\"> and get great insights, SecOps strategies and hands-on experience from the comfort of your desk.<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Watch for future posts in <\/span><\/i><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/elements-of-security-operations\/\"><i><span style=\"font-weight: 400;\">Kerry Matre\u2019s series<\/span><\/i><\/a><i><span style=\"font-weight: 400;\"> on \u201cElements of Security Operations.\u201d <\/span><\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Your employees often don\u2019t get to focus on the activities for which they provide unique value. The solution? Implementing better SecOps strategies.<\/p>\n","protected":false},"author":432,"featured_media":104830,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6770],"tags":[6980,673,635],"coauthors":[4695],"class_list":["post-105412","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-the-future","tag-elements-of-security-operations","tag-security-operations-center","tag-soc","sec_ops_category-must-read-articles"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image1.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/105412","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/432"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=105412"}],"version-history":[{"count":8,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/105412\/revisions"}],"predecessor-version":[{"id":105549,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/105412\/revisions\/105549"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/104830"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=105412"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=105412"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=105412"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=105412"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}