Forrester’s Security Survey 2022 reveals that the primary challenge for security decision-makers is the ever-evolving nature of IT threats. The security operations center (SOC) and its analysts are pivotal in detecting and mitigating attacks that surpass preventive measures. However, many security operations (SecOps) teams struggle, having evolved out of necessity into a loosely structured discipline focused on responding to alerts of potential attacks.
Forrester defines security operations as The practice within an enterprise dedicated to hunting for, detecting, investigating, and responding to cyberattacks.
In many organizations, the SOC is still an ad hoc team of IT professionals stepping into the realm of cybersecurity. SecOps teams often face several challenges:
In summary, many SOCs face significant challenges in fulfilling their primary mission of detection and response due to an overwhelming volume of alerts, insufficient staffing and processes, employee burnout, and a focus on product proficiency rather than core security principles.
The SOC is at a crucial juncture similar to the one software development faced years ago. It’s grappling with overwhelming data (big data and log management), struggling to innovate and update monolithic processes (detections and incident response), and lacks ownership beyond initial deployment (content management). The software industry responded to these challenges by transitioning from building monolithic software with a waterfall methodology to adopting microservices and agile practices. The SOC can benefit from these lessons by applying them to detection and response engineering — the engineering-centric capability responsible for creating new detections and automating response workflows.
Frameworks like the software development lifecycle (SDLC) and Forrester’s Modern Application Delivery (MAD) Model provide a foundation for enhancing development processes with a focus on business value. These models can be adapted to detection and response engineering to accelerate the creation, tuning, and retirement of rules and analytics. To leverage the benefits of the SDLC, structure your detection and response engineering program around the detection and response development lifecycle (DR-DLC). The DR-DLC is an SDLC-based framework tailored for detection and response engineering, emphasizing business value through a tight cycle process from ideation to delivery and continuous testing.
Keith McCammon, Chief Security Officer at Red Canary, advises, “Focus first on detection and response. Operationalize threat intelligence through engineering-driven detection that is repeatable, scalable, and testable. Testing is critical and often overlooked — you should test and measure everything you can, from your data pipeline to your team’s response.” This framework helps your team establish a consistent and timely build process that includes ideation, design, build, test, release, and continuous monitoring.
Continue reading and download the report to learn how to build a leading detection and response engineering practice.
COPYRIGHTS DIGITAL MARKETING COMMUNITY 2019