Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations

8/4/2020
02:00 PM
Nilesh Dherange
Nilesh Dherange
Commentary
Connect Directly
LinkedIn
RSS
E-Mail vvv
100%
0%

Retooling the SOC for a Post-COVID World

Residual work-from-home policies will require changes to security policies, procedures, and technologies.

Things have changed a lot since the start of 2020. Our workforces have shifted to a largely off-site model, as have schools, entertainment, and pretty much all other activities that can be maintained without face-to-face interaction.

Those organizations that have been able to keep functioning with pandemic work-from-home mandates in place did so by relying on VPNs and software-as-a-service (SaaS) applications. In the process, many of these businesses have found that their workforce is just as effective being remote and costs actually went down. Now, some are planning to maintain this "new normal" or remote workforce, and they're trying to figure out how to change their operations to match.

We know the security operations team, particularly in the security operations center (SOC), needs to adapt to this rapidly evolving environment as well as to the new generation of attacks and attackers that come with it. So, how do we deal with these changes?

The first step is understanding what people, processes, and technologies are already in place. For example, what information is the SOC receiving? What are team members trained for? Are current staffing levels sufficient? 

Typical SOCs are being inundated with terabytes worth of logs every day — sometimes many terabytes. Fortunately, most SOCs have tools in place that can consolidate and classify that incoming flood of data. The real challenge is deriving actionable intelligence from it, or finding the needles in the haystack. We've all heard — and may even have been part of — stories about SOCs that were so overwhelmed with data that they didn't catch a red team test until the team knocked on their door.

How prepared are SOC team members for responding to threats in this new environment? For example, when an incident is identified, how effective is the established process they'll follow to mitigate and remediate it? Has this process been reviewed and tested? Has it been updated to adapt for changes in the threat landscape? How will the SOC handle the new risks and new threats that are constantly turning up?

The human element is often overlooked in security reviews, and it can be one of the most complex parts to manage. The workforce occupies that center spot on the Venn diagram among myriad factors: security, efficiency, privacy, and culture. These are just a few pieces of the workforce puzzle. With the shift toward more remote work and SaaS applications taking over for on-premises servers, how has workplace policy kept up? How have the users been trained to deal with organizational and personal security?

Also, while existing threats will remain — possibly on a smaller scale because fewer people will be in office environments — attacks against familiar assets will continue to evolve. However, new threats introduced by a remote workforce have grown in scale. This will require the SOC to defend against more and broader threats due to the greater number of users being in the wild than previously. Are current SOC staffing levels sufficient to address this increased workload? Can more tools and/or automation fill the void?

Given these new challenges facing the SOC, consider implementing the following practices.

First, review existing policies and procedures to reflect the new remote working reality. Second, train users to protect themselves from the most common attacks they're likely to see working from home. These two steps will go a long way toward taking some of the load off SOC team members, making them more effective and efficient.

As for the SecOps team, make sure they've recognized the new normal, and that policies and procedures are in place to help them handle the increased percentage of work-from-home threats. Second, make sure they have the right tools in place to maximize their productivity and efficacy. This will require a review of existing tools and possibly adding new ones to fill in any gaps.

Related Content:

 

 

Register now for this year's fully virtual Black Hat USA, scheduled to take place August 1–6, and get more information about the event on the Black Hat website. Click for details on conference information and to register.

Nilesh Dherange is CTO of security analytics vendor Gurucul, and an expert on identity, data science, and machine learning. Nilesh was an integral member of identity technology vendor Vaau, which was acquired by Sun Microsystems. He also co-founded BON Marketing Group and ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/30/2020
'Act of War' Clause Could Nix Cyber Insurance Payouts
Robert Lemos, Contributing Writer,  10/29/2020
6 Ways Passwords Fail Basic Security Tests
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/28/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How to Measure and Reduce Cybersecurity Risk in Your Organization
In this Tech Digest, we examine the difficult practice of measuring cyber-risk that has long been an elusive target for enterprises. Download it today!
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5991
PUBLISHED: 2020-10-30
NVIDIA CUDA Toolkit, all versions prior to 11.1.1, contains a vulnerability in the NVJPEG library in which an out-of-bounds read or write operation may lead to code execution, denial of service, or information disclosure.
CVE-2020-15273
PUBLISHED: 2020-10-30
baserCMS before version 4.4.1 is vulnerable to Cross-Site Scripting. The issue affects the following components: Edit feed settings, Edit widget area, Sub site new registration, New category registration. Arbitrary JavaScript may be executed by entering specific characters in the account that can ac...
CVE-2020-15276
PUBLISHED: 2020-10-30
baserCMS before version 4.4.1 is vulnerable to Cross-Site Scripting. Arbitrary JavaScript may be executed by entering a crafted nickname in blog comments. The issue affects the blog comment component. It is fixed in version 4.4.1.
CVE-2020-15277
PUBLISHED: 2020-10-30
baserCMS before version 4.4.1 is affected by Remote Code Execution (RCE). Code may be executed by logging in as a system administrator and uploading an executable script file such as a PHP file. The Edit template component is vulnerable. The issue is fixed in version 4.4.1.
CVE-2020-7373
PUBLISHED: 2020-10-30
vBulletin 5.5.4 through 5.6.2 allows remote command execution via crafted subWidgets data in an ajax/render/widget_tabbedcontainer_tab_panel request. NOTE: this issue exists because of an incomplete fix for CVE-2019-16759. ALSO NOTE: CVE-2020-7373 is a duplicate of CVE-2020-17496. CVE-2020-17496 is ...