<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Omer on Security]]></title><description><![CDATA[Weekly posts for your security data lake journey.]]></description><link>https://www.omeronsecurity.com</link><image><url>https://substackcdn.com/image/fetch/$s_!jFLO!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22cccf84-28fc-4e7f-ad32-34400994e4c5_258x258.png</url><title>Omer on Security</title><link>https://www.omeronsecurity.com</link></image><generator>Substack</generator><lastBuildDate>Fri, 01 May 2026 17:00:44 GMT</lastBuildDate><atom:link href="https://www.omeronsecurity.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Omer Singer]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[omeronsecurity@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[omeronsecurity@substack.com]]></itunes:email><itunes:name><![CDATA[Omer Singer]]></itunes:name></itunes:owner><itunes:author><![CDATA[Omer Singer]]></itunes:author><googleplay:owner><![CDATA[omeronsecurity@substack.com]]></googleplay:owner><googleplay:email><![CDATA[omeronsecurity@substack.com]]></googleplay:email><googleplay:author><![CDATA[Omer Singer]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Can Splunk Overcome Its Innovator's Dilemma?]]></title><description><![CDATA[The SIEM king's future depends on the answer.]]></description><link>https://www.omeronsecurity.com/p/can-splunk-overcome-its-innovators</link><guid isPermaLink="false">https://www.omeronsecurity.com/p/can-splunk-overcome-its-innovators</guid><dc:creator><![CDATA[Omer Singer]]></dc:creator><pubDate>Thu, 22 Aug 2024 18:22:23 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ge7u!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59e8e712-efc0-425c-8752-eddd7a7a650b_1024x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ge7u!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59e8e712-efc0-425c-8752-eddd7a7a650b_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ge7u!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59e8e712-efc0-425c-8752-eddd7a7a650b_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!ge7u!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59e8e712-efc0-425c-8752-eddd7a7a650b_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!ge7u!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59e8e712-efc0-425c-8752-eddd7a7a650b_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!ge7u!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59e8e712-efc0-425c-8752-eddd7a7a650b_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ge7u!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59e8e712-efc0-425c-8752-eddd7a7a650b_1024x1024.webp" width="605" height="605" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/59e8e712-efc0-425c-8752-eddd7a7a650b_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:605,&quot;bytes&quot;:675540,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ge7u!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59e8e712-efc0-425c-8752-eddd7a7a650b_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!ge7u!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59e8e712-efc0-425c-8752-eddd7a7a650b_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!ge7u!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59e8e712-efc0-425c-8752-eddd7a7a650b_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!ge7u!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59e8e712-efc0-425c-8752-eddd7a7a650b_1024x1024.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In 2007, Beyonc&#233; topped the charts with her hit song &#8220;Irreplaceable,&#8221; and BlackBerry commanded 40% of the U.S. smartphone market. Within five years, Queen Bey still reigned, but BlackBerry was virtually wiped out with less than 1% of the market. The Innovator&#8217;s Dilemma had made BlackBerry the opposite of irreplaceable. The future of the SIEM market hinges on whether Splunk is more like Beyonc&#233; or BlackBerry.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.omeronsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.omeronsecurity.com/subscribe?"><span>Subscribe now</span></a></p><h1>A Winning Formula</h1><p>IT, and later security teams, fell in love with Splunk&#8217;s fast and flexible search engine. In the early 2000s, the company pioneered an approach to centrally analyzing and troubleshooting vast amounts of event logs. Splunk made working with the icky structure of most machine data a more palatable experience. </p><p>At the heart of the platform&#8217;s success was its innovative indexing technology. Unlike traditional databases that required structured data input, Splunk was designed to handle a wide range of unstructured data. This flexibility allowed organizations to ingest logs, metrics, and other machine data without needing upfront schema definitions. What does this look like behind the scenes? </p><p>During ingestion, Splunk breaks down the data into individual events and stores them in an indexed format. This index is not a simple database table. It's a highly optimized structure that allows for lookups at a latency that supports real-time troubleshooting of IT issues like website outages and application crashes. Rapid searching is facilitated by storing raw data alongside metadata, such as timestamps, source types, and host information.</p><p>The appeal to IT teams organically extended to security operations, where the previous generation of Security Information and Event Management (SIEM) solutions like ArcSight were proving slow and cumbersome. Splunk was adopted across thousands of cybersecurity organizations, and revenues rose accordingly.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lBri!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2833ee66-c782-454d-934a-3102fd269cc2_493x298.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lBri!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2833ee66-c782-454d-934a-3102fd269cc2_493x298.png 424w, https://substackcdn.com/image/fetch/$s_!lBri!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2833ee66-c782-454d-934a-3102fd269cc2_493x298.png 848w, https://substackcdn.com/image/fetch/$s_!lBri!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2833ee66-c782-454d-934a-3102fd269cc2_493x298.png 1272w, https://substackcdn.com/image/fetch/$s_!lBri!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2833ee66-c782-454d-934a-3102fd269cc2_493x298.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lBri!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2833ee66-c782-454d-934a-3102fd269cc2_493x298.png" width="493" height="298" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2833ee66-c782-454d-934a-3102fd269cc2_493x298.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:298,&quot;width&quot;:493,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!lBri!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2833ee66-c782-454d-934a-3102fd269cc2_493x298.png 424w, https://substackcdn.com/image/fetch/$s_!lBri!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2833ee66-c782-454d-934a-3102fd269cc2_493x298.png 848w, https://substackcdn.com/image/fetch/$s_!lBri!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2833ee66-c782-454d-934a-3102fd269cc2_493x298.png 1272w, https://substackcdn.com/image/fetch/$s_!lBri!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2833ee66-c782-454d-934a-3102fd269cc2_493x298.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Splunk revenue growth in the early years (<a href="https://techcrunch.com/2017/09/06/is-symantec-getting-ready-to-buy-splunk">Source</a>)</figcaption></figure></div><h1>More Log Data, More Problems</h1><p>Splunk became the dominant SIEM platform at a time when most enterprise infrastructure was in data centers. When its customers shifted to the cloud, Splunk struggled to adapt its architecture and pricing model. Customers became increasingly concerned when it became evident that cloud environments produce more log data&#8212;a lot more. </p><p>While I can&#8217;t cite a source for this specific figure, my experience has been that the shift to the cloud resulted in 3x more log data for a typical environment. This can be explained by the highly dynamic nature of Infrastructure-as-a-Service (IaaS). If you&#8217;re doing it right, cloud infra is constantly spinning up and down with new virtual machines, clusters, and entire networks, popping in and out of existence based on fluctuating user demands. Every change in the cloud is logged, hence terabytes of additional machine data for the security team to collect and analyze.</p><p>Splunk&#8217;s approach to indexing log data to support fast search became a source of constant cost concerns. This isn&#8217;t just anecdotal. In the customer spending data <a href="https://siliconangle.com/2023/09/30/cisco-splunk-microscope-joint-customers-weigh/">reported</a> by SiliconAngle in 2023, a year-over-year downward trend can be seen in customer spending momentum. While 47% of customers reported plans to grow Splunk spending a few years prior, by the time the report was compiled, that number had dropped to 37%. Splunk was still prevalent in the polling data (yellow line below), but spending velocity was way down (blue line). The number of customers planning to decrease or eliminate Splunk spend had increased by over 50%. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Qjnp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed35d194-ba2d-4fc0-a8ce-4f1d26abd9d3_1706x959.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Qjnp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed35d194-ba2d-4fc0-a8ce-4f1d26abd9d3_1706x959.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Qjnp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed35d194-ba2d-4fc0-a8ce-4f1d26abd9d3_1706x959.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Qjnp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed35d194-ba2d-4fc0-a8ce-4f1d26abd9d3_1706x959.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Qjnp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed35d194-ba2d-4fc0-a8ce-4f1d26abd9d3_1706x959.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Qjnp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed35d194-ba2d-4fc0-a8ce-4f1d26abd9d3_1706x959.jpeg" width="1456" height="818" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ed35d194-ba2d-4fc0-a8ce-4f1d26abd9d3_1706x959.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:818,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Qjnp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed35d194-ba2d-4fc0-a8ce-4f1d26abd9d3_1706x959.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Qjnp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed35d194-ba2d-4fc0-a8ce-4f1d26abd9d3_1706x959.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Qjnp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed35d194-ba2d-4fc0-a8ce-4f1d26abd9d3_1706x959.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Qjnp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed35d194-ba2d-4fc0-a8ce-4f1d26abd9d3_1706x959.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This should not be interpreted as just a pricing problem. As explained in <a href="https://cribl.io/blog/understanding-splunks-new-license-model-its-not-the-pricing-model-its-the-price-tag-that-matters/">&#8220;Understanding Splunk&#8217;s New License Model: It&#8217;s Not the Pricing Model, It&#8217;s the Price Tag that Matters&#8221;</a> by Cribl CEO Clint Sharp, </p><blockquote><p>Offering additional models should not be confused with lowering prices. Changing models, for most customers, will offer at best marginal benefits&#8230; The use cases most likely to see lower query workloads are where Splunk is used as an online archive or primarily as an investigation tool without much scheduled workload. Additionally, if your users don&#8217;t particularly care about performance, you can likely ingest a lot more data but have a much poorer performing system with this license model.</p></blockquote><p>In other words, the historical vestiges of Splunk&#8217;s internal architecture are such that they struggle to deliver significant cost savings without making painful tradeoffs. This goes back to the indexing strategy that closely ties compute and storage. Without a fundamental redesign of how data is collected, stored, and searched, cost concerns have naturally increased with the inexorable shift to the cloud and the expansion of log volume. This is supported by a recent <a href="https://siliconangle.com/2023/09/30/cisco-splunk-microscope-joint-customers-weigh/">customer survey</a> where the top response to the question of Splunk&#8217;s current pricing was: &#8220;We don&#8217;t like Splunk&#8217;s pricing, but we feel locked in.&#8221;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XmKM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84aa32a1-d0c4-4c2c-9bff-5323fe7c2ede_1706x959.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XmKM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84aa32a1-d0c4-4c2c-9bff-5323fe7c2ede_1706x959.jpeg 424w, https://substackcdn.com/image/fetch/$s_!XmKM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84aa32a1-d0c4-4c2c-9bff-5323fe7c2ede_1706x959.jpeg 848w, https://substackcdn.com/image/fetch/$s_!XmKM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84aa32a1-d0c4-4c2c-9bff-5323fe7c2ede_1706x959.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!XmKM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84aa32a1-d0c4-4c2c-9bff-5323fe7c2ede_1706x959.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XmKM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84aa32a1-d0c4-4c2c-9bff-5323fe7c2ede_1706x959.jpeg" width="1456" height="818" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/84aa32a1-d0c4-4c2c-9bff-5323fe7c2ede_1706x959.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:818,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!XmKM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84aa32a1-d0c4-4c2c-9bff-5323fe7c2ede_1706x959.jpeg 424w, https://substackcdn.com/image/fetch/$s_!XmKM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84aa32a1-d0c4-4c2c-9bff-5323fe7c2ede_1706x959.jpeg 848w, https://substackcdn.com/image/fetch/$s_!XmKM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84aa32a1-d0c4-4c2c-9bff-5323fe7c2ede_1706x959.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!XmKM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84aa32a1-d0c4-4c2c-9bff-5323fe7c2ede_1706x959.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>Dipping its Toe in the Data Lake</h1><p>The challenge posed by the exploding volume of log data has not gone unnoticed. Dropping junk logs in transit is a fast way to slim down, but there&#8217;s a limit to how much data can be dropped before the security team flies blind. Using cheap cloud storage is another approach that offers a significant upside. </p><p>Consider that Splunk Cloud storage reportedly costs between $100-$150 per uncompressed TB a month (official figures are not available). Cloud-native options like Snowflake or S3 Parquet tables cost $23 per <em>compressed</em> TB a month. With log data compressed at a conservative 8x, the actual storage cost in the data lake is under $5/month per collected terabyte&#8212;a fraction of the Splunk cost.</p><p>Splunk didn't lose sight of the potential benefits of cloud-native data lakes for log data. Five years ago, the company launched Data Fabric Search (DFS) with support for external data lakes and Splunk indexes, aiming to provide a unified search experience across storage options.</p><p>Then, in 2021, Splunk launched a separate data lake product called Federated Search for Amazon S3. Done right, this could have enabled a rebalancing for customers looking to optimize between storage cost and search performance. With Federated Search, Splunk users could search against data in cheap cloud storage without paying for indexing upfront. Why has this feature not addressed the price concerns that are clearly still pervasive in the latest customer polls? </p><p>The first issue is performance. Splunk&#8217;s <a href="https://docs.splunk.com/Documentation/SVA/current/Architectures/FSS3">official documentation</a> warns, &#8220;Customers attempting to use this feature for real-time searches will perceive <strong>slower performance and reduced search functionality</strong> when compared with indexed Splunk searches on ingested data.&#8221; How much slower depends on a number of factors but, unlike alternatives like Snowflake, scaling up when necessary is cumbersome and manual. An approach that can&#8217;t deliver a consistently adequate search experience will struggle to achieve widespread adoption. </p><p>The second issue is around predictability. Splunk added an additional cost component to Federated Search that meters by how much data is queried. The documentation states, &#8220;Customers need to acquire additional licensing to enable Federated Search for Amazon S3. This is based on "Data Scan Units", and is described as the total amount of data that all searches using Federated Search for Amazon S3 have scanned in the customer's Amazon S3 buckets. <strong>This licensing SKU is independent from Splunk Virtual Compute (SVC) and any Ingest based licenses that customers may have acquired.</strong>&#8221; It would be challenging to predict how much data a SOC will need to scan, and detection engineers may be discouraged from paying by the byte for scanning their log data throughout the day. An organization might figure out how much 100 saved search detection rules would cost. Now for every new rule they develop, what would be the cost in terms of Data Scan Units? </p><p>Finally, this approach might reduce storage costs but become more expensive overall. As Splunk&#8217;s documentation warns, &#8220;Customers attempting to use this feature for high frequency searches will <strong>likely incur</strong> <strong>higher costs</strong> than natively ingesting and searching in the Splunk platform.&#8221; The DSU model drives cost anxiety even higher as stated in the documentation, &#8220;that over the course of a year, the DSUs operate on a 'use it or lose it' model.&#8221; It&#8217;s no wonder that most Splunk customers have been unable to address their cost concerns with Federated Search. </p><h1>Signs to Watch For</h1><p>The shortcomings of Federated Search in Splunk are not necessarily here to stay. Security teams that have invested years into their Splunk deployment may be wondering if their puppy can learn new tricks. If this is you, what should you watch for in coming product and pricing announcements? </p><p>Telltale investment areas include the junk data cleanup that drove many big customers to adopt Cribl upstream from Splunk. Improving the usability and closing functionality gaps in Ingest Actions would indicate that Splunk is serious about addressing its spiraling ingest costs. </p><p>More importantly, watch for a Federated Search that does not actively discourage its users. The elimination of Data Scan Units as a tax on top of the already significant Virtual Compute cost would be a sign that Splunk is serious about enabling data lake adoption. If DSUs are not completely eliminated, they can still be changed. Successful cloud data platforms like Snowflake, BigQuery, and Databricks all offer time-based compute pricing due to its advantages over volume-based pricing. These include predictability (new detections don&#8217;t increase costs as long as they run in parallel) and affordability (speed improvements reduce run time, driving down costs). Charging by bytes-scanned only makes sense for limited, infrequent search use cases.</p><p>Cisco paid many billions for Splunk&#8217;s products and customer base. Will the new owners be able to overcome the innovator&#8217;s dilemma that threatens Splunk&#8217;s hold on the SIEM market? New competitors are leaning heavily on architectures that effectively expose the cost and scale efficiencies of the cloud. Splunk&#8217;s future depends on its ability to embrace flexible data storage options and customer data ownership. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.omeronsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Omer on Security! Subscribe for weekly guidance on your security data lake journey.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[How to Jumpstart Your Collaboration with the Data Team]]></title><description><![CDATA[To make a longstanding impact, security leaders don't need to look further than the company's existing data analysts]]></description><link>https://www.omeronsecurity.com/p/how-to-jumpstart-your-collaboration</link><guid isPermaLink="false">https://www.omeronsecurity.com/p/how-to-jumpstart-your-collaboration</guid><dc:creator><![CDATA[Omer Singer]]></dc:creator><pubDate>Thu, 01 Aug 2024 16:01:03 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac00ba1e-eeca-4c8d-9917-eee82ce4931a_1157x855.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The term &#8220;DataSecOps&#8221; isn&#8217;t catchy. Nevertheless, incorporating data analytics best practices into the security operation can dramatically improve visibility and threat detection. Not to mention the cost savings of using general-purpose data lake technology alongside proprietary security logging platforms. </p><p>While security organizations can build up data expertise over time, the best way to adopt data analytics best practices is through collaboration with the data team.&nbsp;Here&#8217;s proven advice on how to get started. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.omeronsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.omeronsecurity.com/subscribe?"><span>Subscribe now</span></a></p><h2>Are Data Dynamos Security Savvy?&nbsp;</h2><p>Unfortunately, traditional SIEM solutions, with their proprietary backends and languages, have driven a wedge between cyber and data teams. The two organizations have lacked common ground for years. </p><p>The sophistication of recent ransomware, credential stuffing, and cryptomining attacks makes the divide even wider. For example, hacker tools like OpenBullet come packed with features and plugins designed to bypass defensive measures. Understanding present-day attacks to the point of effectively detecting and mitigating them takes years of domain expertise. We can&#8217;t expect all data practitioners to also be security experts.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8zZr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F059affa9-fb72-4bb3-9d80-e5432f1776a9_975x692.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8zZr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F059affa9-fb72-4bb3-9d80-e5432f1776a9_975x692.png 424w, https://substackcdn.com/image/fetch/$s_!8zZr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F059affa9-fb72-4bb3-9d80-e5432f1776a9_975x692.png 848w, https://substackcdn.com/image/fetch/$s_!8zZr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F059affa9-fb72-4bb3-9d80-e5432f1776a9_975x692.png 1272w, https://substackcdn.com/image/fetch/$s_!8zZr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F059affa9-fb72-4bb3-9d80-e5432f1776a9_975x692.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8zZr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F059affa9-fb72-4bb3-9d80-e5432f1776a9_975x692.png" width="563" height="399.58564102564105" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/059affa9-fb72-4bb3-9d80-e5432f1776a9_975x692.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:692,&quot;width&quot;:975,&quot;resizeWidth&quot;:563,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A screencap showing the OpenBullet credential stuffing tool interface, solving the CAPTCHA.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A screencap showing the OpenBullet credential stuffing tool interface, solving the CAPTCHA." title="A screencap showing the OpenBullet credential stuffing tool interface, solving the CAPTCHA." srcset="https://substackcdn.com/image/fetch/$s_!8zZr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F059affa9-fb72-4bb3-9d80-e5432f1776a9_975x692.png 424w, https://substackcdn.com/image/fetch/$s_!8zZr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F059affa9-fb72-4bb3-9d80-e5432f1776a9_975x692.png 848w, https://substackcdn.com/image/fetch/$s_!8zZr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F059affa9-fb72-4bb3-9d80-e5432f1776a9_975x692.png 1272w, https://substackcdn.com/image/fetch/$s_!8zZr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F059affa9-fb72-4bb3-9d80-e5432f1776a9_975x692.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Popular credential stuffing tool comes with evasion features (<a href="https://www.f5.com/labs/articles/threat-intelligence/business-email-compromise-with-credential-stuffing-attack-tools">Source</a>)</figcaption></figure></div><p>This makes it critical to take the right approach to collaboration between cyber and data organizations. Your company&#8217;s Director of Data Analytics might not yet be familiar with the MITRE ATT&amp;CK framework or the persistence methods of Linux cryptomining malware, but they can still start playing an important role in defending the business. This lines up with how most centralized data teams support other departments. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4K52!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac00ba1e-eeca-4c8d-9917-eee82ce4931a_1157x855.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4K52!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac00ba1e-eeca-4c8d-9917-eee82ce4931a_1157x855.jpeg 424w, https://substackcdn.com/image/fetch/$s_!4K52!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac00ba1e-eeca-4c8d-9917-eee82ce4931a_1157x855.jpeg 848w, https://substackcdn.com/image/fetch/$s_!4K52!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac00ba1e-eeca-4c8d-9917-eee82ce4931a_1157x855.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!4K52!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac00ba1e-eeca-4c8d-9917-eee82ce4931a_1157x855.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4K52!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac00ba1e-eeca-4c8d-9917-eee82ce4931a_1157x855.jpeg" width="1157" height="855" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ac00ba1e-eeca-4c8d-9917-eee82ce4931a_1157x855.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:855,&quot;width&quot;:1157,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:81388,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4K52!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac00ba1e-eeca-4c8d-9917-eee82ce4931a_1157x855.jpeg 424w, https://substackcdn.com/image/fetch/$s_!4K52!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac00ba1e-eeca-4c8d-9917-eee82ce4931a_1157x855.jpeg 848w, https://substackcdn.com/image/fetch/$s_!4K52!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac00ba1e-eeca-4c8d-9917-eee82ce4931a_1157x855.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!4K52!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac00ba1e-eeca-4c8d-9917-eee82ce4931a_1157x855.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">The data team supports many departments, potentially including cybersecurity (<a href="https://medium.com/super/how-should-our-company-structure-our-data-team-e71f6846024d">Source</a>, modified by me)</figcaption></figure></div><p>When reaching out to the central data team, you can give examples of threat detection challenges that can be seen as typical data problems. Framing use cases in familiar terms early in the conversation will establish confidence that the right people are in the room and no one is wasting their time. </p><ul><li><p><strong>Communication with known bad actors: </strong>Identifying communication requires point lookups in network traffic data against known malicious IPs and domains.</p></li><li><p><strong>A series of actions associated with attack techniques: </strong>Piecing together event sequences using event correlation methods to detect known attack patterns.</p></li><li><p><strong>Large amounts of data copied out of the organization: </strong>Calculating data volumes and checking for high or unusual results.</p></li><li><p><strong>Failed login attempts recurring across accounts: </strong>Analyzing login logs for repetitive failed attempts using pattern recognition techniques.</p></li><li><p><strong>Unexpected changes to critical systems and environments: </strong>Applying contextual datasets to log events from operating systems and cloud providers.</p></li></ul><p>You can also frame the new collaboration using the &#8220;Three Vs&#8221; that are familiar to any experienced data practitioner. The organization&#8217;s threat detection challenge involves <strong>volume</strong>, with terabytes of security data generated across the environments. High SIEM ingest and storage costs often limit data collection and retention. </p><p>It also involves <strong>velocity</strong> in that threats often take too long to identify, scope, and mitigate. Since many event log sources are never collected to the SIEM, activity records often must be reactively loaded and analyzed days or weeks after the initial breach event. Proactively analyzing such sources can help the security team keep up with attacks as they unfold. </p><p>Finally, the data/cyber partnership must deal with the <strong>variety</strong> of security data. Activity logs and contextual datasets come in diverse formats and schemas, which presents a challenge when integrating, analyzing, and correlating the feeds. </p><h2>Enabling the new collaboration</h2><p>You need to put a few things in place to bring together the cybersecurity and data teams. The first is to establish a common data platform. This is the Achilles heel of locked-in SIEM platforms like Palo Alto Network&#8217;s XSIAM&#8212;they keep security and data orgs apart. In contrast, general-purpose analytics platforms like Snowflake support the enterprise&#8217;s typical data analytics use cases and cybersecurity. This provides the necessary foundation for effective collaboration.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Ir40!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9af27986-5526-4191-bd37-3aae54bb1998_600x348.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ir40!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9af27986-5526-4191-bd37-3aae54bb1998_600x348.png 424w, https://substackcdn.com/image/fetch/$s_!Ir40!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9af27986-5526-4191-bd37-3aae54bb1998_600x348.png 848w, https://substackcdn.com/image/fetch/$s_!Ir40!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9af27986-5526-4191-bd37-3aae54bb1998_600x348.png 1272w, https://substackcdn.com/image/fetch/$s_!Ir40!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9af27986-5526-4191-bd37-3aae54bb1998_600x348.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ir40!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9af27986-5526-4191-bd37-3aae54bb1998_600x348.png" width="600" height="348" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9af27986-5526-4191-bd37-3aae54bb1998_600x348.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:348,&quot;width&quot;:600,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;12. Workloads for the Snowflake Data Cloud - Snowflake: The Definitive  Guide [Book]&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="12. Workloads for the Snowflake Data Cloud - Snowflake: The Definitive  Guide [Book]" title="12. Workloads for the Snowflake Data Cloud - Snowflake: The Definitive  Guide [Book]" srcset="https://substackcdn.com/image/fetch/$s_!Ir40!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9af27986-5526-4191-bd37-3aae54bb1998_600x348.png 424w, https://substackcdn.com/image/fetch/$s_!Ir40!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9af27986-5526-4191-bd37-3aae54bb1998_600x348.png 848w, https://substackcdn.com/image/fetch/$s_!Ir40!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9af27986-5526-4191-bd37-3aae54bb1998_600x348.png 1272w, https://substackcdn.com/image/fetch/$s_!Ir40!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9af27986-5526-4191-bd37-3aae54bb1998_600x348.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Leading data platforms support a variety of workloads, including cybersecurity</figcaption></figure></div><p>Once you and your new friends from the data team agree on a joint data platform, you&#8217;ll need to agree on a data ingest strategy. Depending on the use cases you prioritize, this might involve native connectors within the data platform, managed connectors within the security platform, or a dedicated solution for collecting security data. Analytics teams will be familiar with the term ETL, which stands for Extract, Transform, Load, with leaders like Fivetran and Matillion in the data space. Security-specific equivalents have emerged in the form of observability pipelines and security data fabrics. As described in a previous post, it&#8217;s an interesting space that&#8217;s seeing rapid development and likely has a solution to meet your needs with different approaches. </p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;3a6ee953-b29d-485a-8c54-3286f8e3d7a4&quot;,&quot;caption&quot;:&quot;Data Collection Wants to Be Free&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The Security Data Fabric Identity Crisis&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:27472770,&quot;name&quot;:&quot;Omer Singer&quot;,&quot;bio&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3d36588f-608f-4ff0-a760-85b0ecc26af3_2922x2252.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-04-04T14:54:31.730Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f638902-9703-4f02-a959-33dcea5a6380_1778x1000.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.omeronsecurity.com/p/the-security-data-fabric-identity&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:142941227,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:14,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Omer on Security&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22cccf84-28fc-4e7f-ad32-34400994e4c5_258x258.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Another prerequisite that the data/cyber partnership must address is the common language for collaboration. While many security products have their own proprietary search syntax, data analysts have converged on the Standard Query Language (SQL). Security teams may initially be daunted by the need to express detection logic in SQL, but recent improvements have lowered the adoption curve. </p><p>For example, <a href="https://www.anvilogic.com/">Anvilogic</a> provides a detection content library with thousands of SQL-based rules that can be deployed off the shelf or used as a starting point for custom detections. Correlated detection scenarios can be created in a low-code builder that converts logic from the UI to SQL code behind the scenes. Recent advances in Gen AI are directly relevant to the SQL skills gap, with security practitioners able to express their threat detection logic in English, which the AI copilot converts to code. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9EkE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe02f37a1-6ea0-4a33-badf-8ed773ba4493_1482x1002.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9EkE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe02f37a1-6ea0-4a33-badf-8ed773ba4493_1482x1002.png 424w, https://substackcdn.com/image/fetch/$s_!9EkE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe02f37a1-6ea0-4a33-badf-8ed773ba4493_1482x1002.png 848w, https://substackcdn.com/image/fetch/$s_!9EkE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe02f37a1-6ea0-4a33-badf-8ed773ba4493_1482x1002.png 1272w, https://substackcdn.com/image/fetch/$s_!9EkE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe02f37a1-6ea0-4a33-badf-8ed773ba4493_1482x1002.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9EkE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe02f37a1-6ea0-4a33-badf-8ed773ba4493_1482x1002.png" width="555" height="375.0824175824176" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e02f37a1-6ea0-4a33-badf-8ed773ba4493_1482x1002.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:984,&quot;width&quot;:1456,&quot;resizeWidth&quot;:555,&quot;bytes&quot;:649441,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!9EkE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe02f37a1-6ea0-4a33-badf-8ed773ba4493_1482x1002.png 424w, https://substackcdn.com/image/fetch/$s_!9EkE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe02f37a1-6ea0-4a33-badf-8ed773ba4493_1482x1002.png 848w, https://substackcdn.com/image/fetch/$s_!9EkE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe02f37a1-6ea0-4a33-badf-8ed773ba4493_1482x1002.png 1272w, https://substackcdn.com/image/fetch/$s_!9EkE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe02f37a1-6ea0-4a33-badf-8ed773ba4493_1482x1002.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Taken together, a common data platform, collection strategy, and query language enable a fruitful collaboration between security operations and data analytics teams. Good options for each of these areas are proven and readily available. Once you agree on these, you&#8217;ll be ready to improve security outcomes together.</p><h2>A Roadmap for Getting Started</h2><p>A data-driven security operation is not a solution you buy. While various products can accelerate your initiative and increase its likelihood of success, the following areas should be built out in collaboration with the data team. Taken together, these form a roadmap for taking ownership of your data and aligning with how the rest of the enterprise turns data into insights.</p><h3>1. Data Preparation</h3><p>Collecting logs from your systems and environments involves bringing streaming them to your data platform, but making them useful takes preparation. In the separate, siloed world of cybersecurity, this was called &#8220;parsing&#8221;. Data analytics best practices establish that more work upfront is a worthwhile investment.</p><p>According to an <a href="https://www.talend.com/resources/what-is-data-preparation">article</a> by data management provider Talend on the topic, &#8220;Data preparation is the process of cleaning and transforming raw data prior to processing and analysis. It is an important step prior to processing and often involves reformatting data, making corrections to data, and combining datasets to enrich data.&#8221;</p><p>Work with your data team to identify the necessary data preparation steps that will support reliable, high-fidelity threat detection. This includes having standard time zones, extracting commonly used fields from nested semi-structured data, and creating &#8220;views&#8221; that join together related datasets for easy querying. For example, you might have one table for Windows logs and another for Linux logs&#8212;a view that joins the two could be used for detections that are operating system agnostic. </p><h3>2. Health Monitoring</h3><p>Security operations teams often struggle with health monitoring. I&#8217;ve seen third-party audit findings ding a SOC for missing sensors, dead feeds, and out-of-date field names that cause detection misses. Even worse is when these issues are uncovered in a security incident retrospective.</p><p>While some SOCs have responded by assigning dedicated headcount to ensure that expected data is available and valid, the partnership between cyber and analytics can unlock powerful automation for this area. Data teams have mature tools and techniques for monitoring data health. </p><p>For example, the open source tool <a href="https://www.elementary-data.com/">Elementary</a> is used by thousands of data engineers to bake health checks directly into their data platform. This gives them an early warning on issues affecting freshness, volume, or schema changes. A data team using Elementary for their enterprise data health monitoring could easily extend their tests to cover the security data lake.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PNTe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99c5e974-f10a-4e92-b44a-0ee45db0039a_1374x860.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PNTe!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99c5e974-f10a-4e92-b44a-0ee45db0039a_1374x860.png 424w, https://substackcdn.com/image/fetch/$s_!PNTe!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99c5e974-f10a-4e92-b44a-0ee45db0039a_1374x860.png 848w, https://substackcdn.com/image/fetch/$s_!PNTe!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99c5e974-f10a-4e92-b44a-0ee45db0039a_1374x860.png 1272w, https://substackcdn.com/image/fetch/$s_!PNTe!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99c5e974-f10a-4e92-b44a-0ee45db0039a_1374x860.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PNTe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99c5e974-f10a-4e92-b44a-0ee45db0039a_1374x860.png" width="1374" height="860" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/99c5e974-f10a-4e92-b44a-0ee45db0039a_1374x860.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:860,&quot;width&quot;:1374,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:345563,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!PNTe!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99c5e974-f10a-4e92-b44a-0ee45db0039a_1374x860.png 424w, https://substackcdn.com/image/fetch/$s_!PNTe!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99c5e974-f10a-4e92-b44a-0ee45db0039a_1374x860.png 848w, https://substackcdn.com/image/fetch/$s_!PNTe!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99c5e974-f10a-4e92-b44a-0ee45db0039a_1374x860.png 1272w, https://substackcdn.com/image/fetch/$s_!PNTe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99c5e974-f10a-4e92-b44a-0ee45db0039a_1374x860.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>3. Reports and Dashboards</strong></h3><p>Building reports and dashboards is one of the most common ways in which data teams support the business. In collaboration with the security operations team, business intelligence (BI) professionals can deliver powerful and actionable insights. For example, calculating the SOC&#8217;s workload in terms of daily alert volume and how well the team is keeping up can influence hiring and training plans. Breaking down top contributors to alert volume can focus tuning efforts on noisy detection rules. And making detection coverage metrics available to leadership can raise confidence and give executive stakeholders a sense of the progress that the SOC is making in staying ahead of the threats facing the organization. </p><p>With the security team using the same data platform as the rest of the enterprise, there will surely be a well-maintained and broadly accessible BI tool where the new SOC reports can be hosted. I recommend regularly meeting with your data analysts to review how reports are being used and refine the dashboards to reflect the KPIs that drive real action across detection engineering, hiring, and architecture.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Xyyk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F628ff962-9a90-4a7a-891b-fa58ac067f27_960x720.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Xyyk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F628ff962-9a90-4a7a-891b-fa58ac067f27_960x720.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Xyyk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F628ff962-9a90-4a7a-891b-fa58ac067f27_960x720.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Xyyk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F628ff962-9a90-4a7a-891b-fa58ac067f27_960x720.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Xyyk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F628ff962-9a90-4a7a-891b-fa58ac067f27_960x720.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Xyyk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F628ff962-9a90-4a7a-891b-fa58ac067f27_960x720.jpeg" width="960" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/628ff962-9a90-4a7a-891b-fa58ac067f27_960x720.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:960,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Management dashboard of security incidents Slide01&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Management dashboard of security incidents Slide01" title="Management dashboard of security incidents Slide01" srcset="https://substackcdn.com/image/fetch/$s_!Xyyk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F628ff962-9a90-4a7a-891b-fa58ac067f27_960x720.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Xyyk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F628ff962-9a90-4a7a-891b-fa58ac067f27_960x720.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Xyyk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F628ff962-9a90-4a7a-891b-fa58ac067f27_960x720.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Xyyk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F628ff962-9a90-4a7a-891b-fa58ac067f27_960x720.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Enterprise BI teams are experienced at turning a team&#8217;s metrics into dashboards backed by live data (<a href="https://www.slideteam.net/management-dashboard-of-security-incidents.html">Source</a>)</figcaption></figure></div><h3>4. Built-in Functions</h3><p>Another advantage of giving the cyber team access to the enterprise&#8217;s central data platform is the availability of powerful built-in functions. These functions deliver a range of capabilities relevant to threat detection, threat hunting, health monitoring, and incident response. What&#8217;s really cool is that they are delivered &#8220;as a service&#8221; without the need for developer cycles. </p><p>For example, Snowflake&#8217;s built-in <a href="https://docs.snowflake.com/en/sql-reference/functions/haversine">Haversine</a> function takes the geolocation of two points and returns the distance between them.&nbsp;<a href="https://docs.snowflake.com/en/sql-reference-functions">Advanced functions</a>&nbsp;for time window operations, data generation, and semantic classification can play a role in the detection of beaconing malware, synthetically generated domains, and other TTPs.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xcCR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cffae48-f712-40ad-9323-c83ae015f043_1360x680.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xcCR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cffae48-f712-40ad-9323-c83ae015f043_1360x680.png 424w, https://substackcdn.com/image/fetch/$s_!xcCR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cffae48-f712-40ad-9323-c83ae015f043_1360x680.png 848w, https://substackcdn.com/image/fetch/$s_!xcCR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cffae48-f712-40ad-9323-c83ae015f043_1360x680.png 1272w, https://substackcdn.com/image/fetch/$s_!xcCR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cffae48-f712-40ad-9323-c83ae015f043_1360x680.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xcCR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cffae48-f712-40ad-9323-c83ae015f043_1360x680.png" width="1360" height="680" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7cffae48-f712-40ad-9323-c83ae015f043_1360x680.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:680,&quot;width&quot;:1360,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;How to use SQL for geographic place recommendations | Census&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="How to use SQL for geographic place recommendations | Census" title="How to use SQL for geographic place recommendations | Census" srcset="https://substackcdn.com/image/fetch/$s_!xcCR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cffae48-f712-40ad-9323-c83ae015f043_1360x680.png 424w, https://substackcdn.com/image/fetch/$s_!xcCR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cffae48-f712-40ad-9323-c83ae015f043_1360x680.png 848w, https://substackcdn.com/image/fetch/$s_!xcCR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cffae48-f712-40ad-9323-c83ae015f043_1360x680.png 1272w, https://substackcdn.com/image/fetch/$s_!xcCR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cffae48-f712-40ad-9323-c83ae015f043_1360x680.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Calculating geographic distance without writing any code (<a href="https://www.getcensus.com/blog/sql-in-the-wild-geographic-place-recommendations">Source</a>)</figcaption></figure></div><h3>5. Data Science</h3><p>We&#8217;ll never know how much damage resulted from security operations being late to the AI/ML revolution. It&#8217;s undeniable that the lack of data science access faced by most cybersecurity organizations has hampered their ability to succeed. Security data lakes and the partnership between cyber and data teams present an opportunity to catch up.</p><p>After lining up with the data org on an analytics platform, the security operation can start exploring which of its initiatives could benefit from data science. From insider threats, to credential stuffing and &#8220;low and slow&#8221; detection evasion, data science can help with use cases that are top of mind for many security organizations. See my previous post on behavior analytics for ways to get started. </p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;74e16779-ff6d-418e-99de-ea8e9cd65130&quot;,&quot;caption&quot;:&quot;I&#8217;m no data scientist, but I know machine learning can be a SOC&#8217;s best friend. In a previous role, my security engineering team had to convince our management (and ourselves) that we would get alerted if the Capital One hacker tried the same attack with us. Machine learning for behavior analytics gave us a way to detect a compromised AWS account trying &#8230;&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Behavior Analytics in Your Security Data Lake Just Got Way Easier&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:27472770,&quot;name&quot;:&quot;Omer Singer&quot;,&quot;bio&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3d36588f-608f-4ff0-a760-85b0ecc26af3_2922x2252.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-03-07T15:11:59.395Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11f2d57d-ff45-43db-8b5b-9f785a8572b5_1024x1024.webp&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.omeronsecurity.com/p/behavior-analytics-in-your-security&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:142340888,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:3,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Omer on Security&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22cccf84-28fc-4e7f-ad32-34400994e4c5_258x258.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>As you can see, partnering with the data team can tremendously benefit the security operation. To get started, you don&#8217;t need to hire world-class data experts for the security team. Your company already has great data resources on staff. They&#8217;re just helping other teams.</p><p>The foundational requirements and roadmap outlined above can help you and your peers on the data side of the house know what to expect from a partnership. You&#8217;ll be surprised how much support cyber/data collaboration generates among senior leadership. Data practitioners are usually happy to help defend the enterprise against threat actors. This is a great way to do more with what your organization already has&#8212;a top CISO priority in 2024.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.omeronsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Omer on Security! Subscribe for weekly guidance on your security data lake journey.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The Inside Scoop on Insider Risk]]></title><description><![CDATA[Avoid Insider Risk Project Failure with Mencken&#8217;s Law of Threat Detection]]></description><link>https://www.omeronsecurity.com/p/the-inside-scoop-on-insider-risk</link><guid isPermaLink="false">https://www.omeronsecurity.com/p/the-inside-scoop-on-insider-risk</guid><dc:creator><![CDATA[Omer Singer]]></dc:creator><pubDate>Thu, 27 Jun 2024 13:20:25 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!lmXC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F596c187e-e9af-46a4-96d9-2935ba0df03b_1024x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Ask an experienced CISO which initiatives have had the least success in making it from plan to production, and you&#8217;re likely to hear about Insider Risk or Insider Threat Detection. There are good reasons to invest in stopping disgruntled or dishonest employees from misusing their access&#8230; it&#8217;s just hard to do. Meanwhile, the allure of machine learning for solving the problem drives organizations down the path to project failure time and again. In this post, I&#8217;ll introduce Mencken&#8217;s Law of Threat Detection to explain why this keeps happening and how you can swing the odds in your favor.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lmXC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F596c187e-e9af-46a4-96d9-2935ba0df03b_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lmXC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F596c187e-e9af-46a4-96d9-2935ba0df03b_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!lmXC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F596c187e-e9af-46a4-96d9-2935ba0df03b_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!lmXC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F596c187e-e9af-46a4-96d9-2935ba0df03b_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!lmXC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F596c187e-e9af-46a4-96d9-2935ba0df03b_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lmXC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F596c187e-e9af-46a4-96d9-2935ba0df03b_1024x1024.webp" width="497" height="497" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/596c187e-e9af-46a4-96d9-2935ba0df03b_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:497,&quot;bytes&quot;:790434,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!lmXC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F596c187e-e9af-46a4-96d9-2935ba0df03b_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!lmXC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F596c187e-e9af-46a4-96d9-2935ba0df03b_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!lmXC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F596c187e-e9af-46a4-96d9-2935ba0df03b_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!lmXC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F596c187e-e9af-46a4-96d9-2935ba0df03b_1024x1024.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>Insider Threats Remain a Top Challenge</h1><p>H. L. Mencken was a famously pessimistic American journalist and critic. A hundred years ago, he wrote classic gems like "No one ever went broke underestimating the intelligence of the American public" and "Bachelors know more about women than married men; if they didn&#8217;t they&#8217;d be married too." His relationship pessimism might be misguided, but it&#8217;s right on the money for insider threats. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.omeronsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.omeronsecurity.com/subscribe?"><span>Subscribe now</span></a></p><p>How serious is the problem? In 2023, nearly 3 out of 4 organizations <a href="https://techreport.com/statistics/cybersecurity/insider-threat-statistics/">reported</a> feeling moderately to extremely vulnerable to insider threats. Rightfully so, says the report, with over 30% of data breaches attributed to insider attacks. Another <a href="https://techjury.net/blog/insider-threat-statistics/">study</a> found that these attacks have increased by around 50% over the past two years. And the financial impact of an insider-related breach averages $17 million in North America.</p><p>A <a href="https://www.steptoe.com/en/news-publications/hazards-of-the-digital-age-a-case-study-of-tesla-v-cao-on-handling-confidential-material.html">well-documented</a> insider incident hit Tesla in late 2018 when an employee, Guangzhi Cao, stole thousands of sensitive files before joining a Chinese competitor. The case was settled in April 2021, with Cao agreeing to pay an undisclosed amount to Tesla and cooperate in the investigation. Notably, the security investigation began only after Cao resigned from his role and was not triggered by any activity related to the data theft. </p><p>Insider threats pose a unique challenge to security teams because they skip many of the initial steps in the cyber kill chain. They know the environment, they&#8217;re provided some level of authorized access, and they don&#8217;t need to get directions from an external Command &amp; Control (C2). They can go straight to taking Actions on Objectives. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gX_7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F641e6dbc-cbc1-4ca6-a107-7d32cdd9d4d4_1200x473.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gX_7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F641e6dbc-cbc1-4ca6-a107-7d32cdd9d4d4_1200x473.png 424w, https://substackcdn.com/image/fetch/$s_!gX_7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F641e6dbc-cbc1-4ca6-a107-7d32cdd9d4d4_1200x473.png 848w, https://substackcdn.com/image/fetch/$s_!gX_7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F641e6dbc-cbc1-4ca6-a107-7d32cdd9d4d4_1200x473.png 1272w, https://substackcdn.com/image/fetch/$s_!gX_7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F641e6dbc-cbc1-4ca6-a107-7d32cdd9d4d4_1200x473.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gX_7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F641e6dbc-cbc1-4ca6-a107-7d32cdd9d4d4_1200x473.png" width="1200" height="473" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/641e6dbc-cbc1-4ca6-a107-7d32cdd9d4d4_1200x473.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:473,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Cyber Kill Chain. The Cyber Kill Chain is a framework&#8230; | by NorthStar |  Medium&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Cyber Kill Chain. The Cyber Kill Chain is a framework&#8230; | by NorthStar |  Medium" title="Cyber Kill Chain. The Cyber Kill Chain is a framework&#8230; | by NorthStar |  Medium" srcset="https://substackcdn.com/image/fetch/$s_!gX_7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F641e6dbc-cbc1-4ca6-a107-7d32cdd9d4d4_1200x473.png 424w, https://substackcdn.com/image/fetch/$s_!gX_7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F641e6dbc-cbc1-4ca6-a107-7d32cdd9d4d4_1200x473.png 848w, https://substackcdn.com/image/fetch/$s_!gX_7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F641e6dbc-cbc1-4ca6-a107-7d32cdd9d4d4_1200x473.png 1272w, https://substackcdn.com/image/fetch/$s_!gX_7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F641e6dbc-cbc1-4ca6-a107-7d32cdd9d4d4_1200x473.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Insiders can go straight to Actions on Objectives (<a href="https://northstar1.medium.com/cyber-kill-chain-339016ad812b">source</a>)</figcaption></figure></div><p>Threat detection depends on breaking the cyber kill chain before the threat actor can complete their objectives. Detection engineers consider ways to spot recon activity, malware execution, and other signs of an attack. A threat that can jump to the last stage in the chain is at a distinct advantage.</p><p>As a result, many security teams become receptive to alternative approaches. User Behavior Analytics (UBA), involving machine learning and anomaly detection, is closely associated with combatting insider threats. The idea is that the algorithms will learn what &#8220;good&#8221; looks like, and anything else will be flagged as likely malicious. For large enterprises, this becomes the basis of a data science project for the insider risk program. Smaller SOCs buy and deploy off-the-shelf solutions for the same goal. </p><h1>Mencken&#8217;s Law of Threat Detection</h1><p>From large organizations with teams of data scientists to smaller ones buying commercial UBA products, everyone seems to be struggling to pull off their insider threat initiatives. I&#8217;ve spoken with security leaders over the years at enterprises ranging from large banks to travel tech. Their insider risk initiatives always seem to be in science project mode, with production launch just a few quarters beyond the horizon. Commercial UBA products have disappointed all but the blissfully unaware. The result is that most CISOs have not achieved an effective insider threat detection program.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NO6A!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21e9a9d1-9dd3-45c2-93d0-f6907b74740d_825x448.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NO6A!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21e9a9d1-9dd3-45c2-93d0-f6907b74740d_825x448.png 424w, https://substackcdn.com/image/fetch/$s_!NO6A!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21e9a9d1-9dd3-45c2-93d0-f6907b74740d_825x448.png 848w, https://substackcdn.com/image/fetch/$s_!NO6A!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21e9a9d1-9dd3-45c2-93d0-f6907b74740d_825x448.png 1272w, https://substackcdn.com/image/fetch/$s_!NO6A!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21e9a9d1-9dd3-45c2-93d0-f6907b74740d_825x448.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NO6A!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21e9a9d1-9dd3-45c2-93d0-f6907b74740d_825x448.png" width="825" height="448" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/21e9a9d1-9dd3-45c2-93d0-f6907b74740d_825x448.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:448,&quot;width&quot;:825,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Time to detect and contain an insider incident&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Time to detect and contain an insider incident" title="Time to detect and contain an insider incident" srcset="https://substackcdn.com/image/fetch/$s_!NO6A!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21e9a9d1-9dd3-45c2-93d0-f6907b74740d_825x448.png 424w, https://substackcdn.com/image/fetch/$s_!NO6A!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21e9a9d1-9dd3-45c2-93d0-f6907b74740d_825x448.png 848w, https://substackcdn.com/image/fetch/$s_!NO6A!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21e9a9d1-9dd3-45c2-93d0-f6907b74740d_825x448.png 1272w, https://substackcdn.com/image/fetch/$s_!NO6A!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21e9a9d1-9dd3-45c2-93d0-f6907b74740d_825x448.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Could a pessimistic approach hold the key to more successful outcomes? I propose we turn to that old downer H. L. Mencken. Considering all the failed data science projects and UBA deployments for insider risk, he might inspire a new guiding principle for addressing this challenge.</p><div class="pullquote"><p><strong>Mencken&#8217;s Law of Threat Detection:</strong> </p><p>Never rely on machine learning to detect a threat you haven&#8217;t modeled.</p></div><p>At first glance, this is a depressing rule. Why should machine learning success depend on the SOC&#8217;s threat modeling? I previously wrote about the challenge of implementing cybersecurity anomaly detection and achieving a consistent relationship between unusual and anomalous event categorization. Lacework, for example, attempted to eliminate detection rules with machine learning but was itself eliminated as a private entity when Fortinet eventually acquired it at a fraction of the $8.3 billion valuation it once held.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;e55738b6-2f53-480a-a84f-d9d7b2c19ead&quot;,&quot;caption&quot;:&quot;Could anyone have predicted the spectacular downfall of cloud security heavyweight Lacework? Leading VCs had poured over a billion dollars of funding into the company, attracting high-profile tech executives, top-tier engineering talent, and over 1,000 employees at its peak. What they missed about the company&#8217;s AI strategy is instructive for a cybersecu&#8230;&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Lacework&#8217;s AI Didn&#8217;t Work&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:27472770,&quot;name&quot;:&quot;Omer Singer&quot;,&quot;bio&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3d36588f-608f-4ff0-a760-85b0ecc26af3_2922x2252.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-04-23T14:20:36.819Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f5c509c-3bec-4a0c-8555-f23bca23769d_974x649.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.omeronsecurity.com/p/laceworks-ai-didnt-work&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:143769507,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:16,&quot;comment_count&quot;:1,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Omer on Security&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22cccf84-28fc-4e7f-ad32-34400994e4c5_258x258.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>The same challenges apply to insider threat detection, where there are no training datasets for insider threat activity, and &#8220;unusual&#8221; things happen every day across an even wider range of systems and exfiltration paths. </p><p>While machine learning may be able to detect some cases of insider TTPs, it is wildly optimistic to assume that it would detect something we haven&#8217;t explicitly set out to catch. There are too many potential points of failure, from access to the relevant log data, to successful baselining, to tuning to a degree of accuracy where a SOC analyst would review the resulting alert. How would a pessimist like Mencken go about detecting insider threats? </p><h1>Pessimistic or Realistic?</h1><p>Mencken&#8217;s Law points us to a more limited but potentially successful path to insider threat detection. Something very interesting happens when we start with threat modeling early in the insider risk initiative. For a primer on threat modeling and how it supports detection engineering in general, check out The Detection Responsibility Handshake: </p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;ede687b5-e2db-423e-91fa-a205e0cf4ab9&quot;,&quot;caption&quot;:&quot;Choosing a SIEM solution is a daunting process and most buyers miss an important part of the preparation. The typical SIEM RFP lists sources to collect, and ways to search and report. But that makes a risky assumption that the vendor will be able to turn those sources and features into effective threat detection.&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The Detection Responsibility Handshake&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:27472770,&quot;name&quot;:&quot;Omer Singer&quot;,&quot;bio&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3d36588f-608f-4ff0-a760-85b0ecc26af3_2922x2252.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2023-12-14T16:07:20.967Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a62338d-7e3b-483b-925e-5edea98e4226_1080x1081.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.omeronsecurity.com/p/the-detection-responsibility-handshake&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:139735543,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Omer on Security&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22cccf84-28fc-4e7f-ad32-34400994e4c5_258x258.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Insider threat modeling is critical because it often reveals a surprising path to detection. It turns out that many insider threat techniques can be effectively detected without machine learning. And where detection implementation avoids the need to train and maintain an ML baseline for each employee, the required effort is dramatically reduced. The odds of overall project success are improved accordingly.</p><p>For example, take the previously mentioned scenario from Tesla, in which an insider copied 300,000 files to his personal iCloud account. In evaluating this TTP, we can analyze historical file transfer records and chart the occurrence of high-volume transfers. If a transfer of over 1,000 files is rare in the environment, then that can serve as a fixed threshold in a static detection. There would be little additional value in benchmarking individual employees and alerting when users transfer an &#8220;unusually high&#8221; number of files. Both approaches would have spotted the insider threat that evaded detection at Tesla. </p><p>In other cases, threat modeling would reveal detection strategies where a single event achieves a similar outcome without building and maintaining an ML black box. For example, a team might model an insider performing data exfiltration via email forwarding. UBA-style profiling of anomalous forwarding activity could be one way to improve detection coverage for this TTP. However, alternative techniques, such as alerting when a user creates a mailbox-level email forwarding rule or comparing destination email addresses to the sender&#8217;s name, could catch many instances of this threat. </p><p>A guiding principle for mature detection engineering teams is that coverage is never absolute, and tradeoffs always exist. The time it takes to build and maintain a detection can be spent working on another detection- so tradeoffs must be considered. Threat modeling allows SOC teams to evaluate options for insider threat detection and consider the full range of effective alternatives, including <a href="https://www.anvilogic.com/threat-detection-library">highly-quality detection libraries</a>, threat-informed static detections, and multi-dimensional correlations. </p><p>Many insider threat scenarios can be addressed without the effort and uncertainty of ML-based user behavior analytics. Mencken himself once said, "All men are frauds. The only difference between them is that some admit it. I myself deny it." Insider threat detection poses an enduring challenge for security operations teams after years of disappointing products and scuttled data science projects. Security leaders should instead consider making incremental progress toward insider risk reduction through investments in threat modeling and detection engineering.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.omeronsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Omer on Security! Subscribe for free for weekly guidance on security data lakes and detection engineering.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Help Stop SOAR Abuse]]></title><description><![CDATA[Risk and complexity are on the rise from use cases that automation was never intended to support]]></description><link>https://www.omeronsecurity.com/p/help-stop-soar-abuse</link><guid isPermaLink="false">https://www.omeronsecurity.com/p/help-stop-soar-abuse</guid><dc:creator><![CDATA[Omer Singer]]></dc:creator><pubDate>Tue, 18 Jun 2024 15:48:03 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!BBI-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f937f47-2dde-47dc-ad20-eb56fbf3205c_1024x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BBI-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f937f47-2dde-47dc-ad20-eb56fbf3205c_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BBI-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f937f47-2dde-47dc-ad20-eb56fbf3205c_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!BBI-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f937f47-2dde-47dc-ad20-eb56fbf3205c_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!BBI-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f937f47-2dde-47dc-ad20-eb56fbf3205c_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!BBI-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f937f47-2dde-47dc-ad20-eb56fbf3205c_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BBI-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f937f47-2dde-47dc-ad20-eb56fbf3205c_1024x1024.webp" width="385" height="385" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1f937f47-2dde-47dc-ad20-eb56fbf3205c_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:385,&quot;bytes&quot;:441764,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!BBI-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f937f47-2dde-47dc-ad20-eb56fbf3205c_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!BBI-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f937f47-2dde-47dc-ad20-eb56fbf3205c_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!BBI-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f937f47-2dde-47dc-ad20-eb56fbf3205c_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!BBI-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f937f47-2dde-47dc-ad20-eb56fbf3205c_1024x1024.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Don&#8217;t get me wrong&#8212;Security Orchestration, Automation, and Response (SOAR) is an increasingly valuable part of security operations. Also, this isn&#8217;t a &#8220;SOAR is dead&#8221; post, although <a href="https://torq.io/hyperautomation/">hyperautomation</a> is certainly a cooler name. This is about using the right tool for the job. Read on to learn how SOC teams unintentionally take on long-term risk and complexity by using (or abusing) SOAR for detection engineering use cases. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.omeronsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.omeronsecurity.com/subscribe?"><span>Subscribe now</span></a></p><h1>SOAR Picks Up The SIEM Slack</h1><p>Security automation is a best practice for reducing the burden of manual SOC processes. For example, many SOCs have an automated playbook that sorts through employee-reported phishing emails, checks elements against threat intelligence, and yanks any related emails from company mailboxes. Should the same automation approach be applied to threat detection? </p><p>The problem starts when detection requirements involve uncollected activity logs, a common situation given SOCs tend to have less than half their data in the SIEM. Visibility gaps become detection gaps. The workaround goes like this: the SOAR reaches out to a data source API, asks a question, and notifies the team based on the result. It sounds workable, and I&#8217;ve spoken with several security leaders considering SOAR to solve their SIEM detection gaps. </p><p>Another way SOAR compensates for SIEM shortcomings is by attempting to reduce alert noise. Many SIEM deployments generate far more alerts than the SOC can process, resulting in missed threats and a generally bummer experience. Some teams have taken to automation playbooks as a correlation layer for noisy atomic alerts. The hope is for SOAR to close out a significant portion of alerts or tickets based on automated steps before they reach the analyst&#8217;s queue. </p><h1>Rubber Bands, Paperclips, and Playbooks</h1><p>We just reviewed some compelling-sounding applications for security automation. The effectiveness of these use cases in an enterprise production environment is another story. Since SOAR solutions were designed to help with manual tasks downstream from the SIEM, they have critical gaps affecting teams trying to MacGyver a threat detection solution. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HEvW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef2d64bd-85e4-4bf8-b3ff-28b92825dc05_410x487.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HEvW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef2d64bd-85e4-4bf8-b3ff-28b92825dc05_410x487.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HEvW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef2d64bd-85e4-4bf8-b3ff-28b92825dc05_410x487.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HEvW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef2d64bd-85e4-4bf8-b3ff-28b92825dc05_410x487.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HEvW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef2d64bd-85e4-4bf8-b3ff-28b92825dc05_410x487.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HEvW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef2d64bd-85e4-4bf8-b3ff-28b92825dc05_410x487.jpeg" width="410" height="487" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ef2d64bd-85e4-4bf8-b3ff-28b92825dc05_410x487.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:487,&quot;width&quot;:410,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:74611,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HEvW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef2d64bd-85e4-4bf8-b3ff-28b92825dc05_410x487.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HEvW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef2d64bd-85e4-4bf8-b3ff-28b92825dc05_410x487.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HEvW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef2d64bd-85e4-4bf8-b3ff-28b92825dc05_410x487.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HEvW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef2d64bd-85e4-4bf8-b3ff-28b92825dc05_410x487.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Pop culture aid for readers born after 1986 (<a href="https://www.wired.com/images_blogs/gadgetlab/2960.jpg">Source</a>)</figcaption></figure></div><p>One challenge with using SOAR as a rule engine stems from how logs are turned into alerts. Logs that match detection logic are often clumped together, with many matching events happening around the same time. For example, a password-spraying attack involving thousands of attempts in a few minutes. That&#8217;s why SIEM rule engines include sophisticated deduplication and debouncing mechanisms to merge related detections and prevent issuing a succession of identical alerts. </p><p>Also, detection engineering has matured recently, including through alignment with the MITRE ATT&amp;CK framework. Security organizations speak in ATT&amp;CK terms and measure coverage against ATT&amp;CK-mapped tactics and techniques (TTPs). A team that makes up for SIEM shortcomings by breaking out some of its detections to the SOAR cannot effectively track and prioritize its detection coverage. The result is a detection engineering mess.</p><p>SOC metrics suffer because the SOAR does not report key SIEM stats such as top offenders, mean time to detect, and false positive rates. As with MITRE ATT&amp;CK coverage, these metrics are not supported by solutions not designed for threat detection. This impacts the SOC's overall maturity, especially that of the detection engineering program, at a time when improving maturity is a priority for many CISOs.</p><p>Finally, security analysts are directly impacted by SOAR abuse when they find themselves on the hook to build extensive detection content from scratch. Unlike SIEM products with frequently updated content packs, SOAR providers do not consider threat detection coverage in the scope of their solution. The customer team must then bear the burden of researching emerging attacks, developing detection logic, and testing it for false positives and negatives. All this is especially time-consuming when performed outside of a purpose-built detection engineering workbench.</p><h1>The Right Tool for the Job</h1><p>Using the intended tool for each phase in the SOC lifecycle can avoid workarounds that cause a detection engineering mess. This is especially clear as the traditional SIEM continues to unbundle (or <a href="https://rakgarg.substack.com/p/the-great-splunkbundling">Splunkbundle</a>). From data collection to analytics to automation, reliance on best-of-breed tooling removes the motivation to hack unintended use cases. </p><p>For data collection, owning the data pipeline and the data lake removes the aforementioned limitations on visibility. With <a href="https://www.anvilogic.com/calculator">80% lower costs</a> and always-hot retention, previously siloed source data becomes directly available for downstream analytics- including purpose-built threat detection tooling.</p><p>A purpose-built detection engine should include differentiated capabilities for cutting development time, reducing noise, and improving fidelity. Since the fastest detections to create are the ones you don&#8217;t need to build yourself, a <a href="https://www.anvilogic.com/threat-detection-library">threat detection content library</a> is the ultimate timesaver and is out of scope for SOAR vendors.</p><p>Also significant are the advanced detection engineering capabilities of purpose-built platforms. For example, multi-stage detection scenarios that identify events of interest in log data and correlate those into threat scenarios. Alerting on threat scenarios, rather than individual atomic detections, is an emerging best practice that results in significantly higher fidelity. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!W0E7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1d65ef8-1e0d-4437-ac79-f12f0535bcb5_1239x389.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!W0E7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1d65ef8-1e0d-4437-ac79-f12f0535bcb5_1239x389.png 424w, https://substackcdn.com/image/fetch/$s_!W0E7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1d65ef8-1e0d-4437-ac79-f12f0535bcb5_1239x389.png 848w, https://substackcdn.com/image/fetch/$s_!W0E7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1d65ef8-1e0d-4437-ac79-f12f0535bcb5_1239x389.png 1272w, https://substackcdn.com/image/fetch/$s_!W0E7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1d65ef8-1e0d-4437-ac79-f12f0535bcb5_1239x389.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!W0E7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1d65ef8-1e0d-4437-ac79-f12f0535bcb5_1239x389.png" width="1239" height="389" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c1d65ef8-1e0d-4437-ac79-f12f0535bcb5_1239x389.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:389,&quot;width&quot;:1239,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:180529,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!W0E7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1d65ef8-1e0d-4437-ac79-f12f0535bcb5_1239x389.png 424w, https://substackcdn.com/image/fetch/$s_!W0E7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1d65ef8-1e0d-4437-ac79-f12f0535bcb5_1239x389.png 848w, https://substackcdn.com/image/fetch/$s_!W0E7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1d65ef8-1e0d-4437-ac79-f12f0535bcb5_1239x389.png 1272w, https://substackcdn.com/image/fetch/$s_!W0E7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1d65ef8-1e0d-4437-ac79-f12f0535bcb5_1239x389.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: Anvilogic</figcaption></figure></div><p>Implementing <a href="https://www.anvilogic.com/use-case?tab=cloud-admin">multi-stage scenario-based detections</a> in a SOAR solution would be cumbersome, if not impossible, at scale. From time-window correlation to grouping indicators by ATT&amp;CK technique, workflow automation does not support detection engineering best practices. With good visibility, SIEM can apply enrichment data and context in an iterative process to avoid false positives and negatives. Detection logic, rather than workflow automation, is the right place to address alert fidelity. </p><p>There&#8217;s also a data angle to consider. Events of interest, as shown in the second tier below, are fertile ground for threat hunters and data scientists to connect the dots in patterns that don&#8217;t emerge from raw events. Advanced use cases require quality detection output stored back in the data platform. When a team relies on downstream automation to sort through the noise, they take on new visibility gaps around activity patterns in the environment. This will be an increasingly important SOC design principle as a wave of AI-powered triage automation solutions hits the shelves.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9Bh4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca0c168b-5213-4f42-b0e2-3c0014aba8d3_1157x690.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9Bh4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca0c168b-5213-4f42-b0e2-3c0014aba8d3_1157x690.png 424w, https://substackcdn.com/image/fetch/$s_!9Bh4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca0c168b-5213-4f42-b0e2-3c0014aba8d3_1157x690.png 848w, https://substackcdn.com/image/fetch/$s_!9Bh4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca0c168b-5213-4f42-b0e2-3c0014aba8d3_1157x690.png 1272w, https://substackcdn.com/image/fetch/$s_!9Bh4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca0c168b-5213-4f42-b0e2-3c0014aba8d3_1157x690.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9Bh4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca0c168b-5213-4f42-b0e2-3c0014aba8d3_1157x690.png" width="1157" height="690" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ca0c168b-5213-4f42-b0e2-3c0014aba8d3_1157x690.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:690,&quot;width&quot;:1157,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:349592,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!9Bh4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca0c168b-5213-4f42-b0e2-3c0014aba8d3_1157x690.png 424w, https://substackcdn.com/image/fetch/$s_!9Bh4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca0c168b-5213-4f42-b0e2-3c0014aba8d3_1157x690.png 848w, https://substackcdn.com/image/fetch/$s_!9Bh4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca0c168b-5213-4f42-b0e2-3c0014aba8d3_1157x690.png 1272w, https://substackcdn.com/image/fetch/$s_!9Bh4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca0c168b-5213-4f42-b0e2-3c0014aba8d3_1157x690.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: Anvilogic</figcaption></figure></div><p>The relationship between SIEM and SOAR is too often a case of &#8220;garbage in, garbage out.&#8221; Fixing that requires detection engineering maturity, where high-fidelity alerts set up the automation solution for success. Reliable detection output can be enriched by the SOAR and routed across the organization to reduce the pressure on the SOC and enable self-service remediation. By avoiding SOAR abuse, investments in security automation can go further, and the potential of hyperautomation can be unleashed.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.omeronsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Omer on Security! Subscribe for free to receive weekly guidance for your security data lake journey.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[You've Never Seen Lock-In Like This Before]]></title><description><![CDATA[How cybersecurity platforms are raising switching costs and maximizing profits]]></description><link>https://www.omeronsecurity.com/p/youve-never-seen-lock-in-like-this</link><guid isPermaLink="false">https://www.omeronsecurity.com/p/youve-never-seen-lock-in-like-this</guid><dc:creator><![CDATA[Omer Singer]]></dc:creator><pubDate>Fri, 31 May 2024 14:41:53 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!U2xE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc24a1865-4d18-4ade-803d-e00cf014619f_1792x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!U2xE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc24a1865-4d18-4ade-803d-e00cf014619f_1792x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!U2xE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc24a1865-4d18-4ade-803d-e00cf014619f_1792x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!U2xE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc24a1865-4d18-4ade-803d-e00cf014619f_1792x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!U2xE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc24a1865-4d18-4ade-803d-e00cf014619f_1792x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!U2xE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc24a1865-4d18-4ade-803d-e00cf014619f_1792x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!U2xE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc24a1865-4d18-4ade-803d-e00cf014619f_1792x1024.webp" width="1456" height="832" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c24a1865-4d18-4ade-803d-e00cf014619f_1792x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:832,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1164060,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!U2xE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc24a1865-4d18-4ade-803d-e00cf014619f_1792x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!U2xE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc24a1865-4d18-4ade-803d-e00cf014619f_1792x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!U2xE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc24a1865-4d18-4ade-803d-e00cf014619f_1792x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!U2xE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc24a1865-4d18-4ade-803d-e00cf014619f_1792x1024.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>For some of its largest vendors, cybersecurity has become a race towards maximum lock-in. Palo Alto Networks, CrowdStrike, SentinelOne, and other major providers now compete across endpoint, cloud, identity, and SIEM- with success dependent on customers buying it all and staying put. </p><p>For security leaders, this trend threatens to curtail access to innovative new solutions and erode the bargaining power needed to keep budget expansion aligned with the rest of the business. Can organizations continue to leverage products from platform providers without losing their independence? Like the Eagles sang in Hotel California: &#8220;You can check out any time you like... But you can never leave."</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.omeronsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.omeronsecurity.com/subscribe?"><span>Subscribe now</span></a></p><h1>Buying Your Business</h1><p>One sign that platform players are counting on long-term lock-in is their willingness to buy new business. They&#8217;re willing to take losses upfront because they believe any customer entering their walled garden will face difficulty switching later. This approach can be seen in the recent string of increasingly aggressive &#8220;loss leader&#8221; moves.</p><p>For example, CrowdStrike announced in May that Microsoft customers could get a heavily subsidized endpoint agent to run alongside the competing Defender product. In an <a href="https://www.sdxcentral.com/articles/news/crowdstrikes-safety-net-catches-the-breaches-that-microsoft-defender-misses/2024/05/">interview</a>, CrowdStrike Head of Products Raj Rajamani made it clear that Microsoft customers would find this offering &#8220;very attractively priced.&#8221;</p><p>Palo Alto Networks has been especially aggressive at luring customers onto its platform. Earlier this year, the company <a href="https://www.paloaltonetworks.com/company/press/2024/palo-alto-networks-enables-customers-to-break-free-from-legacy-solutions-with-cortex-platform-offer-for-endpoint-security">announced</a> a new offer where they give away their product for free for the whole duration of new customer&#8217;s existing contracts. According to the press release: </p><blockquote><p>The offer enables qualified customers to accelerate platformization and seamlessly transition to Cortex XDR by providing&nbsp; a "no-cost" period of the solution until existing legacy contracts expire. Additionally, the program includes a baseline package of "no-cost" professional services to assist with the agent migration.</p></blockquote><p>Platformization, with its high switching costs, is what justifies extended free-use offers. Buyers should take this into account when considering heavily subsidized product offers.  </p><p>This approach was taken to the extreme a few months later when Palo Alto struck a major deal with IBM for its SIEM business. Interestingly, IBM&#8217;s cloud SIEM product is being taken to the woodchipper. This deal isn&#8217;t about technology or capabilities. It&#8217;s about capturing customers. </p><p>Unconfirmed rumors place the deal size at around $500 million, on top of which PANW will pay IBM consultants to migrate customers to their platform. It would take years of subscription payments to offset these substantial expenditures, and the new class of &#8220;all-in-one&#8221; cybersecurity platforms is designed to make that happen with the full Hotel California experience. </p><h1>Platform Exclusivity</h1><p>Why is switching from a platform that includes both SIEM and endpoint agents nearly impossible? Consider the challenge of an ordinary SIEM migration, where endpoint telemetry is one of the top sources for threat detection. The migrating team reviews migrated detection logic and verifies that coverage is maintained in the new system. But for a SIEM+endpoint migration, all endpoint-related SIEM detections must be rebuilt&#8212;a huge additional effort.</p><p>The secret to this double lock-in is how next-gen SIEM platforms mandate their own endpoint agents. For example, Palo Alto Networks XSIAM <a href="https://docs-cortex.paloaltonetworks.com/r/Cortex-XSIAM/Cortex-XSIAM-Administrator-Guide/Cortex-XSIAM-License">licensing documentation</a> specifies that the SIEM cannot be purchased separately from the Cortex agent. </p><p>Platform exclusivity also extends to content and capabilities. Feeding agent telemetry to a SIEM is one thing, but detection rules and models designed and tuned for a particular agent provide questionable effectiveness for third-party agents. Also, agent <a href="https://docs-cortex.paloaltonetworks.com/r/Cortex-XSIAM/Cortex-XSIAM-Administrator-Guide/Agent-Audit-Log-Notification-Format">health monitoring</a> is being increasingly folded into the all-in-one SIEM platform, potentially breaking essential SOC processes that depend on analyzing agent logs to identify deployment gaps and agent health issues. </p><p>I&#8217;ve heard of rare situations where an exception was made for a customer to keep their former agent while ramping up the next-gen SIEM. A team in that situation should take extra caution in validating that the competitor&#8217;s platform properly analyzes the signal from the &#8220;other guy&#8217;s&#8221; agents. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!D2Wv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9462d37-440a-4968-8a01-6bb2a341e06b_3000x1685.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!D2Wv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9462d37-440a-4968-8a01-6bb2a341e06b_3000x1685.png 424w, https://substackcdn.com/image/fetch/$s_!D2Wv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9462d37-440a-4968-8a01-6bb2a341e06b_3000x1685.png 848w, https://substackcdn.com/image/fetch/$s_!D2Wv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9462d37-440a-4968-8a01-6bb2a341e06b_3000x1685.png 1272w, https://substackcdn.com/image/fetch/$s_!D2Wv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9462d37-440a-4968-8a01-6bb2a341e06b_3000x1685.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!D2Wv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9462d37-440a-4968-8a01-6bb2a341e06b_3000x1685.png" width="1456" height="818" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c9462d37-440a-4968-8a01-6bb2a341e06b_3000x1685.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:818,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Customer Login | CrowdStrike&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Customer Login | CrowdStrike" title="Customer Login | CrowdStrike" srcset="https://substackcdn.com/image/fetch/$s_!D2Wv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9462d37-440a-4968-8a01-6bb2a341e06b_3000x1685.png 424w, https://substackcdn.com/image/fetch/$s_!D2Wv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9462d37-440a-4968-8a01-6bb2a341e06b_3000x1685.png 848w, https://substackcdn.com/image/fetch/$s_!D2Wv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9462d37-440a-4968-8a01-6bb2a341e06b_3000x1685.png 1272w, https://substackcdn.com/image/fetch/$s_!D2Wv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9462d37-440a-4968-8a01-6bb2a341e06b_3000x1685.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">CrowdStrike&#8217;s Next-Gen SIEM is built around its agent</figcaption></figure></div><p>The tight coupling between SIEM and endpoint makes migrating either one incredibly difficult. Many SOCs could find migrating both at the same time to be nearly impossible. The platform vendors are incentivized to maximize this lock-in at the expense of security organizations.</p><h1>The Modular Alternative</h1><p>The prospect of double lock-in has driven interest in open, modular SOC architectures. This week, Jon Oltsik, the well-known analyst and founder of the cybersecurity practice at Enterprise Security Group, wrote about how &#8220;no vendor will deliver the whole enchilada.&#8221; In his CSO Online article &#8220;<a href="https://www.csoonline.com/article/2126804/cybersecurity-is-at-a-crossroads-its-time-to-shift-to-an-architectural-approach.html">Cybersecurity at a crossroads: Time to shift to an architectural approach</a>,&#8221; Oltsik rallied against the idea of an all-in-one platform. </p><blockquote><p>First, the notion of moving all the data to one repository is completely outdated due to data volume and constant change. Future security operations must adhere to a federated data model&#8230;</p><p>Note that I do see large organizations standardizing with data lake technologies like Databricks and Snowflake, and I also see a role here for things like the Amazon security lake. While this makes sense today, we&#8217;ll see new data management platforms in the future with compelling security use cases. Enterprise security operations architectures must have the flexibility to migrate or integrate data in the future.</p></blockquote><p>Turning to an architecture with enough flexibility to run security operations across a mix of data platforms presents an alternative to platformization. For mega vendors spending huge sums to construct walled gardens, this is the ultimate nightmare. But how do enterprise security leaders feel about it? </p><p>CISOs Umesh Yerram and Arvin Bansal, each responsible for protecting large and complex enterprises, recently published an excellent whitepaper titled <a href="https://www.linkedin.com/pulse/protect-your-organization-vendor-technology-threat-changes-yerram--pk1ve/">Modular Stack: The Future of Cybersecurity Design</a>. Yerram and Bansal acknowledge that big changes are happening in the SIEM market but warn of the dangers that consolidation presents to security operations:</p><blockquote><p>Enterprises are made up of heterogeneous, hybrid environments that CISO organizations must secure using a range of security controls. The consolidation in the SIEM marketplace will not benefit CISO organizations significantly due to few key reasons:</p><p>1.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Consolidation will result in more vendor lock-in</p><p>2.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Innovation is put on the back burner to prioritize integration efforts.</p><p>3.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Integration of these consolidations will take time, and most will fail based on the history of past consolidations.</p></blockquote><p>Speaking from experience, Yerram and Bansal urge their fellow security leaders to watch out for short-term discounts from platform consolidators. They argue that &#8220;the significant changes in the SIEM market necessitate a strategic approach to security detection &amp; response architecture that emphasizes the principles of standardization, flexibility, data ownership, cost-efficiency, and advanced technology adoption.&#8221; </p><p>Data ownership is a key enabler for a modular design strategy. Last week, I wrote about four elements of ownership and why XDR vendors that built their SIEM around agents see independent ownership as a threat. They want to hold your data on their platform, so swapping out any part of their portfolio becomes a monumental task.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;bb56bcfb-ccb7-4a0c-8122-56905a4700f6&quot;,&quot;caption&quot;:&quot;This isn&#8217;t another post about the morning of May 15, when IBM Qradar customers learned that the company was exiting the SIEM business. They could start from scratch with Palo Alto Networks&#8217; XSIAM product or something else entirely. You don&#8217;t have to go home, but you can&#8217;t stay here.&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Survivor's Guide to SIEM in 2024&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:27472770,&quot;name&quot;:&quot;Omer Singer&quot;,&quot;bio&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3d36588f-608f-4ff0-a760-85b0ecc26af3_2922x2252.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-05-23T14:47:39.705Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc820aa9c-0af8-4be0-b09f-30472992d857_1200x800.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.omeronsecurity.com/p/survivors-guide-to-siem-in-2024&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:144818226,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:1,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Omer on Security&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22cccf84-28fc-4e7f-ad32-34400994e4c5_258x258.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>The Modular Stack whitepaper also includes several great diagrams showing what forward-thinking CISOs envision as the opposite of the locked-in platform. In the image below, the security organization is aligned with the rest of the enterprise on a data platform that supports myriad use cases and cross-collaboration. Security data lives alongside business data and is used to power threat detection, vulnerability management, compliance automation, etc. These use cases can be supported by best-of-breed applications with SIEM capabilities and detection content plugged into the team&#8217;s data lake.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lwwZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8fb6f9e6-b203-474d-a3cf-64dc2409d59d_1074x455.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lwwZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8fb6f9e6-b203-474d-a3cf-64dc2409d59d_1074x455.png 424w, https://substackcdn.com/image/fetch/$s_!lwwZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8fb6f9e6-b203-474d-a3cf-64dc2409d59d_1074x455.png 848w, https://substackcdn.com/image/fetch/$s_!lwwZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8fb6f9e6-b203-474d-a3cf-64dc2409d59d_1074x455.png 1272w, https://substackcdn.com/image/fetch/$s_!lwwZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8fb6f9e6-b203-474d-a3cf-64dc2409d59d_1074x455.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lwwZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8fb6f9e6-b203-474d-a3cf-64dc2409d59d_1074x455.png" width="1074" height="455" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8fb6f9e6-b203-474d-a3cf-64dc2409d59d_1074x455.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:455,&quot;width&quot;:1074,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!lwwZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8fb6f9e6-b203-474d-a3cf-64dc2409d59d_1074x455.png 424w, https://substackcdn.com/image/fetch/$s_!lwwZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8fb6f9e6-b203-474d-a3cf-64dc2409d59d_1074x455.png 848w, https://substackcdn.com/image/fetch/$s_!lwwZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8fb6f9e6-b203-474d-a3cf-64dc2409d59d_1074x455.png 1272w, https://substackcdn.com/image/fetch/$s_!lwwZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8fb6f9e6-b203-474d-a3cf-64dc2409d59d_1074x455.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Modular architecture for maximum data ownership (<a href="https://www.linkedin.com/pulse/protect-your-organization-vendor-technology-threat-changes-yerram--pk1ve/">Source</a>)</figcaption></figure></div><p>With logs normalized in the security data lake and a best-of-breed SOAR solution downstream, a SIEM purchase decision becomes reversible. A team might choose to buy <a href="https://www.anvilogic.com/">Anvilogic</a>, for example, as the SIEM layer for the data lake, and a year or a decade later, replace it with an alternative that meets new requirements or offers better pricing. The modularity in this approach de-risks the whole operation, leading to lower costs and full access to innovation.</p><p>The competition between two movements, one towards platformization and one towards modularity, may be decided by an awkward question. Like signing a prenup before the wedding, security leaders should ask, &#8220;Is it reversible?&#8221; Not because they think they&#8217;ll soon part ways but out of recognition that lock-in inevitably leads to higher costs and fewer options. As CISOs Yerram and Bansal concluded in their whitepaper, access to &#8220;innovative best-of-breed threat detection capabilities on top of standardized data&#8221; is the best position for security organizations. Just don&#8217;t tell that to the platform companies banking on lock-in.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.omeronsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Omer on Security! Subscribe to receive weekly guidance for your security data lake journey.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Survivor's Guide to SIEM in 2024]]></title><description><![CDATA[How an ownership mindset can help you navigate big changes in the SOC landscape]]></description><link>https://www.omeronsecurity.com/p/survivors-guide-to-siem-in-2024</link><guid isPermaLink="false">https://www.omeronsecurity.com/p/survivors-guide-to-siem-in-2024</guid><dc:creator><![CDATA[Omer Singer]]></dc:creator><pubDate>Thu, 23 May 2024 14:47:39 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!6NAm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc820aa9c-0af8-4be0-b09f-30472992d857_1200x800.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6NAm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc820aa9c-0af8-4be0-b09f-30472992d857_1200x800.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6NAm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc820aa9c-0af8-4be0-b09f-30472992d857_1200x800.jpeg 424w, https://substackcdn.com/image/fetch/$s_!6NAm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc820aa9c-0af8-4be0-b09f-30472992d857_1200x800.jpeg 848w, https://substackcdn.com/image/fetch/$s_!6NAm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc820aa9c-0af8-4be0-b09f-30472992d857_1200x800.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!6NAm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc820aa9c-0af8-4be0-b09f-30472992d857_1200x800.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6NAm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc820aa9c-0af8-4be0-b09f-30472992d857_1200x800.jpeg" width="559" height="372.6666666666667" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c820aa9c-0af8-4be0-b09f-30472992d857_1200x800.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:800,&quot;width&quot;:1200,&quot;resizeWidth&quot;:559,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6NAm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc820aa9c-0af8-4be0-b09f-30472992d857_1200x800.jpeg 424w, https://substackcdn.com/image/fetch/$s_!6NAm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc820aa9c-0af8-4be0-b09f-30472992d857_1200x800.jpeg 848w, https://substackcdn.com/image/fetch/$s_!6NAm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc820aa9c-0af8-4be0-b09f-30472992d857_1200x800.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!6NAm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc820aa9c-0af8-4be0-b09f-30472992d857_1200x800.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: Bethesda Softworks</figcaption></figure></div><p>This isn&#8217;t another post about the morning of May 15, when IBM Qradar customers learned that the company was exiting the SIEM business. They could start from scratch with Palo Alto Networks&#8217; XSIAM product or something else entirely. You don&#8217;t have to go home, but you can&#8217;t stay here. </p><p>Industry pundits have been discussing the news ad nauseam, so I won&#8217;t rehash why these products hit a wall and whether those were savvy business deals. Instead, I present how an ownership mindset can prepare your organization for what comes next.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.omeronsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.omeronsecurity.com/subscribe?"><span>Subscribe now</span></a></p><h1>One: Own Your Pipelines</h1><p>So far, the biggest progress towards breaking lock-in and taking ownership has been around data pipelines. In the past, data collection tooling was seen as an integral part of SIEM. Splunk has Universal Forwarders, Securonix has Remote Ingestion Nodes, etc. Typical enterprise deployments include thousands of agents installed on servers and networks throughout the organization. </p><p>The many-to-one approach became less popular as demand grew for multiple pipeline destinations, including cloud storage and data science platforms. Cribl (founded by former Splunk product leaders) built a huge following by pointing out that SIEM vendors charging by volume might lack the motivation to add robust volume reduction features to their pipeline products. The business case was made to separate the pipeline from the SIEM, and many security organizations successfully took ownership of their pipeline. </p><p>Running thousands of vendor-specific agents across servers, clusters, and networks is a huge source of lock-in. We should all feel for Qradar customers, who have significant on-prem environments and depend on agents like &#8220;IBM&#174; WinCollect 10&#8221; for their pipeline. As I described in my previous post on security data fabric, there are plenty of open-source or independent alternatives available now. </p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;57e71bba-6418-4448-8098-371d4c3ee800&quot;,&quot;caption&quot;:&quot;Data Collection Wants to Be Free Big changes are happening to how security teams get their data. For years, data collection was a function of the SIEM. Splunk&#8217;s app store, for example, includes hundreds of supported connectors that integrate with everything from firewalls to vulnerability scanners. In parallel, large SOCs formed te&#8230;&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The Security Data Fabric Identity Crisis&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:27472770,&quot;name&quot;:&quot;Omer Singer&quot;,&quot;bio&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3d36588f-608f-4ff0-a760-85b0ecc26af3_2922x2252.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-04-04T14:54:31.730Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f638902-9703-4f02-a959-33dcea5a6380_1778x1000.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.omeronsecurity.com/p/the-security-data-fabric-identity&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:142941227,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:12,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Omer on Security&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22cccf84-28fc-4e7f-ad32-34400994e4c5_258x258.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>The important thing is that your team can send data from any source to any destination they choose- including multiple parallel destinations. This opens up effective evaluation and migration options as the SIEM landscape twists and turns.</p><h1>Two: Own Your Data</h1><p>One thing is having the flexibility to ship logs to your destinations of choice. Owning the data is something else, and it&#8217;s often overlooked, especially when it&#8217;s all in the cloud. What&#8217;s the difference between storing your data in a cloud-based security platform like Exabeam or a cloud-based data platform like Snowflake? </p><p>Your level of data ownership depends on the freedom to: </p><ul><li><p>Query the data directly from third-party tools</p></li><li><p>Use the data for data science and ML model training</p></li><li><p>Easily export data to an open format such as Parquet or JSON</p></li><li><p>Set your own retention policies</p></li><li><p>Create views on the data for easy access by different users and applications</p></li><li><p>Govern who can access data based on granular role-based access controls</p></li><li><p>Audit how the data has been accessed and modified</p></li></ul><p>Since most security platforms don&#8217;t give you open access to their data backend, your level of data ownership is significantly limited. This is especially true for the XDR vendors that built their SIEM offering around EDR, where data ownership was never on the table. As a result, a replatform project would involve wholesale export and import of many terabytes- an effort that they&#8217;re incentivized to discourage. </p><p>Cloud data platforms like Snowflake were designed for interoperability, with dozens of tools for ETL, BI, and data science expected to be plugged in. Many Snowflake customers use multiple data visualization products, for example, and can easily try new ones. The flexibility and level of ownership demonstrated below are becoming available to security organizations, promising to enable more &#8220;plug-and-play&#8221; security operations.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cw0L!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d432ec8-5d51-43eb-8178-b77de54ebe7b_1200x546.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cw0L!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d432ec8-5d51-43eb-8178-b77de54ebe7b_1200x546.png 424w, https://substackcdn.com/image/fetch/$s_!cw0L!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d432ec8-5d51-43eb-8178-b77de54ebe7b_1200x546.png 848w, https://substackcdn.com/image/fetch/$s_!cw0L!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d432ec8-5d51-43eb-8178-b77de54ebe7b_1200x546.png 1272w, https://substackcdn.com/image/fetch/$s_!cw0L!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d432ec8-5d51-43eb-8178-b77de54ebe7b_1200x546.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cw0L!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d432ec8-5d51-43eb-8178-b77de54ebe7b_1200x546.png" width="1200" height="546" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0d432ec8-5d51-43eb-8178-b77de54ebe7b_1200x546.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:546,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;dbt and Sigma Integration | phData&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="dbt and Sigma Integration | phData" title="dbt and Sigma Integration | phData" srcset="https://substackcdn.com/image/fetch/$s_!cw0L!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d432ec8-5d51-43eb-8178-b77de54ebe7b_1200x546.png 424w, https://substackcdn.com/image/fetch/$s_!cw0L!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d432ec8-5d51-43eb-8178-b77de54ebe7b_1200x546.png 848w, https://substackcdn.com/image/fetch/$s_!cw0L!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d432ec8-5d51-43eb-8178-b77de54ebe7b_1200x546.png 1272w, https://substackcdn.com/image/fetch/$s_!cw0L!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d432ec8-5d51-43eb-8178-b77de54ebe7b_1200x546.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Data ownership in the modern data stack facilitates tool adoption and migration</figcaption></figure></div><h1>Three: Own Your Detections</h1><p>Security operations teams spend an incredible amount of energy on detection engineering. Haider Dost <a href="https://medium.com/snowflake/detection-development-lifecycle-af166fffb3bc">wrote a great article</a> about the seven stages his team goes through in their detection development lifecycle. The thought and effort required to work through these stages are necessary to achieve high-fidelity detections in an enterprise environment.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!e4ub!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ef4d123-8252-4f47-ad1d-5880a66dbc2d_700x680.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!e4ub!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ef4d123-8252-4f47-ad1d-5880a66dbc2d_700x680.png 424w, https://substackcdn.com/image/fetch/$s_!e4ub!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ef4d123-8252-4f47-ad1d-5880a66dbc2d_700x680.png 848w, https://substackcdn.com/image/fetch/$s_!e4ub!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ef4d123-8252-4f47-ad1d-5880a66dbc2d_700x680.png 1272w, https://substackcdn.com/image/fetch/$s_!e4ub!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ef4d123-8252-4f47-ad1d-5880a66dbc2d_700x680.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!e4ub!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ef4d123-8252-4f47-ad1d-5880a66dbc2d_700x680.png" width="700" height="680" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7ef4d123-8252-4f47-ad1d-5880a66dbc2d_700x680.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:680,&quot;width&quot;:700,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!e4ub!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ef4d123-8252-4f47-ad1d-5880a66dbc2d_700x680.png 424w, https://substackcdn.com/image/fetch/$s_!e4ub!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ef4d123-8252-4f47-ad1d-5880a66dbc2d_700x680.png 848w, https://substackcdn.com/image/fetch/$s_!e4ub!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ef4d123-8252-4f47-ad1d-5880a66dbc2d_700x680.png 1272w, https://substackcdn.com/image/fetch/$s_!e4ub!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ef4d123-8252-4f47-ad1d-5880a66dbc2d_700x680.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Detection Development Lifecycle (<a href="https://medium.com/snowflake/detection-development-lifecycle-af166fffb3bc">Source</a>)</figcaption></figure></div><p>SIEM vendors tend to underplay the investment required to preserve detection investments during migration. The Google Chronicle team, for example, released a post titled <a href="https://www.googlecloudcommunity.com/gc/Community-Blog/Migrate-Off-That-Old-SIEM-Already/ba-p/705149">Migrate Off That Old SIEM Already!</a> where they paid lip service to this challenge, writing:</p><blockquote><p><strong>Don't migrate all content.</strong> Migrating all of your existing detection content, rules, alerts, dashboards, and visualizations to a new SIEM is a lot of work and it's not always necessary. Take the time to evaluate your current detection coverage and only migrate the rules that you need for your new environment.</p></blockquote><p>That misses the point! While some detections might no longer be required, any SIEM migration strategy must account for the hundreds or thousands of threat detections that must be ported to the new platform. </p><p>This is an even bigger challenge when moving between platforms with different capabilities, where migration must account for both syntax and functionality. To pick on the SIEM formerly known as Chronicle (they&#8217;ve rebranded to SecOps), GCP posted this month on <a href="https://www.googlecloudcommunity.com/gc/Community-Blog/New-to-Google-SecOps-Introducing-Statistical-Search/ba-p/750365">newly added support for statistical search</a> using &#8220;Count Distinct.&#8221; Detection engineers building rules in Splunk have used aggregate statistics for years. This begs the question: Do the XDR next-gen SIEMs support this function yet? What other functionality is not supported by the newcomers?</p><p>The safest approach is investing in detection rules not tied to a particular platform. Standard languages like SQL and Python will always have broad platform support and include analytics functions that cover everything that the detection engineering team needs. Already, several leading SIEM solutions support SQL, and the trend from proprietary, vendor-specific rule languages to general-purpose analytics languages enables detection ownership. This may be the biggest factor in minimizing the impact of an unexpected SIEM migration situation.</p><h1>Four: Own Your Requirements</h1><p>When platform vendors spend millions to buy out their competition, they count on customers having fuzzy, loosely defined requirements. The fallout is experienced only later when security operations teams scramble to work around limitations in their new tooling. I&#8217;ve seen cases where this happens mid-migration, forcing the whole project to revert after months of effort. The fallout includes breach risk, team burnout, and compliance issues.</p><p>With all the shakeups in the SIEM market, it&#8217;s prudent to proactively capture detailed SIEM requirements based on what&#8217;s working in the current deployment. In large organizations, these requirements span multiple teams and use cases. Documenting the capabilities and performance expectations around custom ingest, activity analytics, incident investigation, health monitoring, and maturity metrics is an extensive project. But an up-front investment in owning your requirements enables fast reactions and confident decision-making if your SIEM of choice changes hands or goes under. </p><p>The hits will keep on coming. Unlike some segments of cybersecurity, the SIEM space in 2024 is still far from stabilizing on a handful of safe choices. Your organization can develop an ownership mindset by seeing its pipelines, data, content, and requirements as independent and modular. Owning your future can help you survive and thrive through these crazy times.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.omeronsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Omer on Security! Subscribe for free to receive weekly guidance on your security data lake journey.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Navigating a Market for Lemons]]></title><description><![CDATA[The case for testing SIEM threat detection performance]]></description><link>https://www.omeronsecurity.com/p/navigating-a-market-for-lemons</link><guid isPermaLink="false">https://www.omeronsecurity.com/p/navigating-a-market-for-lemons</guid><dc:creator><![CDATA[Omer Singer]]></dc:creator><pubDate>Tue, 14 May 2024 14:11:24 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!chPV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0caeed2-90af-4f2c-a120-cb076c4db9a9_1024x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!chPV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0caeed2-90af-4f2c-a120-cb076c4db9a9_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!chPV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0caeed2-90af-4f2c-a120-cb076c4db9a9_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!chPV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0caeed2-90af-4f2c-a120-cb076c4db9a9_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!chPV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0caeed2-90af-4f2c-a120-cb076c4db9a9_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!chPV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0caeed2-90af-4f2c-a120-cb076c4db9a9_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!chPV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0caeed2-90af-4f2c-a120-cb076c4db9a9_1024x1024.webp" width="521" height="521" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a0caeed2-90af-4f2c-a120-cb076c4db9a9_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:521,&quot;bytes&quot;:387024,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!chPV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0caeed2-90af-4f2c-a120-cb076c4db9a9_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!chPV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0caeed2-90af-4f2c-a120-cb076c4db9a9_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!chPV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0caeed2-90af-4f2c-a120-cb076c4db9a9_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!chPV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0caeed2-90af-4f2c-a120-cb076c4db9a9_1024x1024.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Bruce Schneier is a genuine cybersecurity legend. The author of <em>Applied Cryptography</em>, inventor of the term &#8220;security theater,&#8221; and long-time blogger wrote a short piece about USB sticks in 2007. I was reminded of this post while walking down the aisles at this year&#8217;s RSA conference. </p><p>Schneier&#8217;s &#8220;<a href="https://www.schneier.com/blog/archives/2007/04/a_security_mark.html">A Security Market for Lemons</a>&#8221; proves, with references to Noble Prize-winning research, that in cybersecurity, it&#8217;s not the best product that beats the competition. The nature of our industry is such that weak solutions routinely get purchased over stronger alternatives. This unfortunate dynamic dominates the SIEM space, where buyers rarely measure and compare threat detection performance&#8212;even for one of the largest items in their budget. That needs to change for the sake of the industry and everyone&#8217;s security posture.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.omeronsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.omeronsecurity.com/subscribe?"><span>Subscribe now</span></a></p><h1>A Security Market for Lemons, Explained</h1><p>In his post on the &#8220;market for lemons&#8221; phenomenon, Schneier asks, &#8220;Why are there so many bad security products out there?&#8221; That question is as relevant today as ever. The disruption caused by recent breaches at UnitedHealth and First American Financial Corp must have involved several layers of failed protection. Why are industry-leading solutions failing our defenders? </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FUVF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d4b6334-f2e3-4828-801b-95e6a0fd73d7_500x500.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FUVF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d4b6334-f2e3-4828-801b-95e6a0fd73d7_500x500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!FUVF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d4b6334-f2e3-4828-801b-95e6a0fd73d7_500x500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!FUVF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d4b6334-f2e3-4828-801b-95e6a0fd73d7_500x500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!FUVF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d4b6334-f2e3-4828-801b-95e6a0fd73d7_500x500.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FUVF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d4b6334-f2e3-4828-801b-95e6a0fd73d7_500x500.jpeg" width="310" height="310" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5d4b6334-f2e3-4828-801b-95e6a0fd73d7_500x500.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:500,&quot;width&quot;:500,&quot;resizeWidth&quot;:310,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Stream episode A Hacker's Mind. New Book. Bruce Schneier, Security  Technologist and Cryptographer. by Cybercrime Magazine podcast | Listen  online for free on SoundCloud&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Stream episode A Hacker's Mind. New Book. Bruce Schneier, Security  Technologist and Cryptographer. by Cybercrime Magazine podcast | Listen  online for free on SoundCloud" title="Stream episode A Hacker's Mind. New Book. Bruce Schneier, Security  Technologist and Cryptographer. by Cybercrime Magazine podcast | Listen  online for free on SoundCloud" srcset="https://substackcdn.com/image/fetch/$s_!FUVF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d4b6334-f2e3-4828-801b-95e6a0fd73d7_500x500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!FUVF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d4b6334-f2e3-4828-801b-95e6a0fd73d7_500x500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!FUVF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d4b6334-f2e3-4828-801b-95e6a0fd73d7_500x500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!FUVF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d4b6334-f2e3-4828-801b-95e6a0fd73d7_500x500.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Bruce Schneier, cryptographer and squid fan</figcaption></figure></div><p>Schneier explains that the issue is not just that cybersecurity is a challenging problem. The cybersecurity market suffers from an acute case of &#8220;information asymmetry.&#8221; In cryptography, threat detection, and much of the cyber industry, the vendor knows much about its product&#8217;s effectiveness that the buyer doesn&#8217;t. The analogy is to a used car salesman who knows he&#8217;s selling a &#8220;lemon&#8221; model where the transmission tends to fall out after a few hundred miles on the highway. He knows the defect, but the poor soul who just stepped onto the lot does not. </p><p>This imbalance is more dangerous than it seems. An American economist won a Nobel prize in the 1970s for <a href="https://en.wikipedia.org/wiki/The_Market_for_Lemons">showing</a> what happens when buyers can&#8217;t spot the lemons. Since good products are inherently more costly than lousy ones, they&#8217;re priced out by the seemingly identical lemons. A vicious cycle of &#8220;adverse selection&#8221; emerges; eventually, the whole market is lemons. </p><p>Among the most cited and downloaded economic journal papers of all time, the market for lemons theory applies to various areas of our lives. But cybersecurity effectiveness is uniquely hard to judge. No performance benchmarks are trusted for comparing competing products, and the test scores in advertisements seem quite fishy when compared as a group. If a high school class averaged 99% on an exam, that test was probably left in the copy machine the day before.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mxrT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8b8255f-a277-439d-bf9f-5f65b731af8e_1800x1232.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mxrT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8b8255f-a277-439d-bf9f-5f65b731af8e_1800x1232.jpeg 424w, https://substackcdn.com/image/fetch/$s_!mxrT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8b8255f-a277-439d-bf9f-5f65b731af8e_1800x1232.jpeg 848w, https://substackcdn.com/image/fetch/$s_!mxrT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8b8255f-a277-439d-bf9f-5f65b731af8e_1800x1232.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!mxrT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8b8255f-a277-439d-bf9f-5f65b731af8e_1800x1232.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mxrT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8b8255f-a277-439d-bf9f-5f65b731af8e_1800x1232.jpeg" width="1456" height="997" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b8b8255f-a277-439d-bf9f-5f65b731af8e_1800x1232.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:997,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;ATP Test: Defending Against Data Stealers and Ransomware&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="ATP Test: Defending Against Data Stealers and Ransomware" title="ATP Test: Defending Against Data Stealers and Ransomware" srcset="https://substackcdn.com/image/fetch/$s_!mxrT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8b8255f-a277-439d-bf9f-5f65b731af8e_1800x1232.jpeg 424w, https://substackcdn.com/image/fetch/$s_!mxrT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8b8255f-a277-439d-bf9f-5f65b731af8e_1800x1232.jpeg 848w, https://substackcdn.com/image/fetch/$s_!mxrT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8b8255f-a277-439d-bf9f-5f65b731af8e_1800x1232.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!mxrT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8b8255f-a277-439d-bf9f-5f65b731af8e_1800x1232.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">With such great results, ransomware must be going the way of polio and smallpox</figcaption></figure></div><p>It speaks volumes that the SIEM space hasn&#8217;t seen an equivalent attempt at comparative effectiveness analysis. In his article, Bruce Schneier describes the effect that the market for lemons dynamic has on the competitive landscape. </p><blockquote><p>In the late 1980s and early 1990s, there were more than a hundred competing firewall products. The few that &#8220;won&#8221; weren&#8217;t the most secure firewalls; they were the ones that were easy to set up, easy to use and didn&#8217;t annoy users too much.</p></blockquote><p>When buyers can&#8217;t accurately assess the value or effectiveness of a product in advance, the market opens up for lemons. Other conditions that drive lemon markets include an incentive for sellers to pass off a low-quality product as a higher-quality one, limitations on data sharing between market participants, buyer pessimism, and lack of regulation and warranties. Each of these conditions is present in cybersecurity, especially in the SIEM market. </p><h1>Spotting the Lemons</h1><p>I often encounter &#8220;adverse selection&#8221; when speaking with security leaders evaluating SIEM solutions. Their selection criteria revolves around feature availability (&#8220;Does the product do UBA? Is there a management API?&#8221;) and content quantity (&#8220;How many integrations? How many rules?&#8221;). Both appeal to decision-makers because they&#8217;re easy to check before purchasing. Unfortunately, the link between these selection criteria and the product&#8217;s effectiveness at threat detection is weak at best. </p><p>The perils of buying detections by the pound were laid out in my post on <a href="https://www.omeronsecurity.com/p/the-detection-responsibility-handshake">The Detection Responsibility Handshake</a>. Regarding feature availability, missing features can be a dealbreaker if, for example, your plan is to detect threats across multiple log repositories in two or more clouds (it&#8217;s pretty cool how <a href="https://www.anvilogic.com/multi-cloud-threat-detection">Anvilogic</a> does that). However, security leaders should distinguish between feature availability and product effectiveness. An outcome-based approach means performance testing across the people, processes, and technology involved in the SIEM deployment. Specifically, threat detection performance.</p><p>Take, for example, this recent exchange between an irate financial services SOC director and one of my colleagues. The SOC had engaged a third-party red team to drill an attack on the cloud environment. As usually happens, the red team achieved their objectives and captured the metaphorical flag. The SOC director was mad because his team had received no alerts during the exercise. No warnings that may have given them a chance to fight back. What the hexadecimal happened?!</p><p>Detection failure can result from a range of causes. These causes can be identified with a breach postmortem or testing during the SIEM selection process. Obviously, it&#8217;s better to know about these issues proactively. They include: </p><ul><li><p>Visibility failure: Was something (e.g., license or capacity limitation) preventing the relevant log data from being collected? </p></li><li><p>Rule failure: Was the logic needed to surface an event of interest missing or disabled? </p></li><li><p>Bandwidth failure: Was the alert buried in a queue where the SOC could not keep up? </p></li><li><p>Triage failure: Was the alert too vague or lacking the context needed for proper escalation? </p></li><li><p>Retention failure: Was the data needed for detection and response no longer accessible when relevant intelligence was received or the investigation began? </p></li></ul><p>When the SOC director and my colleague reviewed what happened during the red team exercise, the root cause surprised them. The log events capturing the attacker&#8217;s tracks had been received. These events triggered rules designed to flag the TTPs used in the exercise, and alerts were issued. So why didn&#8217;t the SOC know about the attack? </p><p>It turned out that the alert notifications were dropped at the SOC&#8217;s outsourced service provider. The MSSP didn&#8217;t pass the alerts along because they had applied overly broad allowlists that automatically suppressed them. In this case, it was a triage failure, but any of the causes described above could have been responsible.</p><p>What had started as a frustrating experience for the SOC director turned into an opportunity to examine the performance of their SIEM and its dependencies. This level of testing is crucial for measuring performance and identifying shortcomings. </p><h1>Let&#8217;s Talk About SIEM Performance</h1><p>The outcome of a drill like the one described above should include a performance score that quantifies the SOC's success at spotting attacks. Performance metrics will depend on the solution, its coverage for the environment, its fit for the team, and many other factors that depend on the vendor and the organization doing the testing. That&#8217;s why we may never see standard scores or reliable third-party comparisons in the SIEM space. But that shouldn&#8217;t discourage you from testing SIEM performance upfront and repeatedly after deployment. </p><p>Armed with an outcome-based evaluation, you shrink the vendor&#8217;s information advantage. You can start spotting the lemons through red team exercises, adversary emulation tooling, or tabletop simulations. You might find that you are relying on a lemon today or that the next-next-gen solution with the great conference swag is actually a lemon. A committed movement towards SIEM testing will level the playing field and encourage the development of products and features that make a difference in the fight against threat actors. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.omeronsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Omer on Security! Subscribe for free to receive weekly guidance on your security data lake journey.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Lacework’s AI Didn’t Work]]></title><description><![CDATA[Why the Lacework crash is a lesson on the limitations of AI in cybersecurity]]></description><link>https://www.omeronsecurity.com/p/laceworks-ai-didnt-work</link><guid isPermaLink="false">https://www.omeronsecurity.com/p/laceworks-ai-didnt-work</guid><dc:creator><![CDATA[Omer Singer]]></dc:creator><pubDate>Tue, 23 Apr 2024 14:20:36 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!6Bqt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f5c509c-3bec-4a0c-8555-f23bca23769d_974x649.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6Bqt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f5c509c-3bec-4a0c-8555-f23bca23769d_974x649.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6Bqt!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f5c509c-3bec-4a0c-8555-f23bca23769d_974x649.jpeg 424w, https://substackcdn.com/image/fetch/$s_!6Bqt!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f5c509c-3bec-4a0c-8555-f23bca23769d_974x649.jpeg 848w, https://substackcdn.com/image/fetch/$s_!6Bqt!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f5c509c-3bec-4a0c-8555-f23bca23769d_974x649.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!6Bqt!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f5c509c-3bec-4a0c-8555-f23bca23769d_974x649.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6Bqt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f5c509c-3bec-4a0c-8555-f23bca23769d_974x649.jpeg" width="489" height="325.83264887063655" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1f5c509c-3bec-4a0c-8555-f23bca23769d_974x649.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:649,&quot;width&quot;:974,&quot;resizeWidth&quot;:489,&quot;bytes&quot;:156861,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6Bqt!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f5c509c-3bec-4a0c-8555-f23bca23769d_974x649.jpeg 424w, https://substackcdn.com/image/fetch/$s_!6Bqt!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f5c509c-3bec-4a0c-8555-f23bca23769d_974x649.jpeg 848w, https://substackcdn.com/image/fetch/$s_!6Bqt!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f5c509c-3bec-4a0c-8555-f23bca23769d_974x649.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!6Bqt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f5c509c-3bec-4a0c-8555-f23bca23769d_974x649.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Could anyone have predicted the <a href="https://techcrunch.com/2024/04/18/wiz-is-in-talks-to-buy-lacework-for-150-200m-security-firm-was-last-valued-at-8-3b/">spectacular downfall</a> of cloud security heavyweight Lacework? Leading VCs had poured over a billion dollars of funding into the company, attracting high-profile tech executives, top-tier engineering talent, and over 1,000 employees at its peak. What they missed about the company&#8217;s AI strategy is instructive for a cybersecurity industry counting more than ever on artificial intelligence.</p><p>In my analysis below, I&#8217;m relying only on what&#8217;s publicy available on Lacework&#8217;s website and documentation. Everything that follows is my personal interpretation of how a flawed AI strategy doomed the startup once <a href="https://www.lacework.com/press-release/lacework-closes-seriesd-funding-round">called</a> &#8220;one of this generation&#8217;s most important cybersecurity companies.&#8221; </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.omeronsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.omeronsecurity.com/subscribe?"><span>Subscribe now</span></a></p><h1>Lost in Translation</h1><p>Lacework&#8217;s crown jewel was its Polygraph technology. Applying artificial intelligence across extensive cloud activity logs, <a href="https://www.lacework.com/platform/polygraph">Polygraph</a> was described as &#8220;the revolutionary way to use your data to automatically find what matters most across your cloud environment.&#8221; Out with threat detection rules that define what attacks look like. In with anomaly-based detections that learn what&#8217;s expected in the environment and flag the bad guys when they do something out of the ordinary. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Eu1i!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6299ad8-ed43-40bc-b2ff-17373ad732bc_1666x772.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Eu1i!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6299ad8-ed43-40bc-b2ff-17373ad732bc_1666x772.png 424w, https://substackcdn.com/image/fetch/$s_!Eu1i!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6299ad8-ed43-40bc-b2ff-17373ad732bc_1666x772.png 848w, https://substackcdn.com/image/fetch/$s_!Eu1i!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6299ad8-ed43-40bc-b2ff-17373ad732bc_1666x772.png 1272w, https://substackcdn.com/image/fetch/$s_!Eu1i!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6299ad8-ed43-40bc-b2ff-17373ad732bc_1666x772.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Eu1i!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6299ad8-ed43-40bc-b2ff-17373ad732bc_1666x772.png" width="1456" height="675" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b6299ad8-ed43-40bc-b2ff-17373ad732bc_1666x772.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:675,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:168015,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Eu1i!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6299ad8-ed43-40bc-b2ff-17373ad732bc_1666x772.png 424w, https://substackcdn.com/image/fetch/$s_!Eu1i!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6299ad8-ed43-40bc-b2ff-17373ad732bc_1666x772.png 848w, https://substackcdn.com/image/fetch/$s_!Eu1i!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6299ad8-ed43-40bc-b2ff-17373ad732bc_1666x772.png 1272w, https://substackcdn.com/image/fetch/$s_!Eu1i!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6299ad8-ed43-40bc-b2ff-17373ad732bc_1666x772.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Lacework Polygraph was designed to deliver accurate alerts without rules (<a href="https://www.lacework.com/platform/polygraph">Source</a>)</figcaption></figure></div><p>Shifting threat detection from signatures to algorithms was not without precedent. Before Lacework created Polygraph, endpoint vendors like Cylance and CrowdStrike used machine learning to disrupt the incumbents in their industry. Symantec, McAfee, and other traditional antivirus providers relied on signatures that encoded telltale bits of malware for detection. As researchers identified new viruses, signature rules were pushed out to millions of endpoint protection agents worldwide. </p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!x6u3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb400f57d-5872-4e8b-98c5-545bcf41d935_345x190.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!x6u3!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb400f57d-5872-4e8b-98c5-545bcf41d935_345x190.jpeg 424w, https://substackcdn.com/image/fetch/$s_!x6u3!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb400f57d-5872-4e8b-98c5-545bcf41d935_345x190.jpeg 848w, https://substackcdn.com/image/fetch/$s_!x6u3!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb400f57d-5872-4e8b-98c5-545bcf41d935_345x190.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!x6u3!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb400f57d-5872-4e8b-98c5-545bcf41d935_345x190.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!x6u3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb400f57d-5872-4e8b-98c5-545bcf41d935_345x190.jpeg" width="345" height="190" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b400f57d-5872-4e8b-98c5-545bcf41d935_345x190.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:190,&quot;width&quot;:345,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Gateway AntiVirus Statistics&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Gateway AntiVirus Statistics" title="Gateway AntiVirus Statistics" srcset="https://substackcdn.com/image/fetch/$s_!x6u3!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb400f57d-5872-4e8b-98c5-545bcf41d935_345x190.jpeg 424w, https://substackcdn.com/image/fetch/$s_!x6u3!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb400f57d-5872-4e8b-98c5-545bcf41d935_345x190.jpeg 848w, https://substackcdn.com/image/fetch/$s_!x6u3!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb400f57d-5872-4e8b-98c5-545bcf41d935_345x190.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!x6u3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb400f57d-5872-4e8b-98c5-545bcf41d935_345x190.jpeg 1456w" sizes="100vw"></picture><div></div></div></a><figcaption class="image-caption">A nostalgic antivirus signature update window</figcaption></figure></div><p>The new anti-malware solutions took a different approach, relying on machine learning instead of signatures. CrowdStrike explained the difference in a 2016 <a href="https://www.crowdstrike.com/blog/crowdstrike-machine-learning-virustotal/">post</a> titled &#8220;CrowdStrike Machine Learning and VirusTotal<strong>.&#8221;</strong> </p><blockquote><p>Traditional AV engines look for signatures or heuristics, i.e. sequences of specific bytes in the file. A malware author can easily change those detected sequences or add obfuscation layers. In contrast, using machine learning, we look at the broader picture and extract so-called &#8220;features&#8221; from the files analyzed.</p></blockquote><p>CrowdStrike <a href="https://cloudstoragesecurity.com/news/css-partners-with-crowdstrike-to-deliver-ai-powered-malware-scanning">trained</a> its ML models on millions of known malware samples before it could detect threats as effectively as signature-based antivirus. Once its algorithms were sufficiently trained, updates could be delivered less frequently, and new threats could be identified more reliably. Could Lacework achieve a similar breakthrough against threats in the cloud? </p><p>Unfortunately for the Polygraph team, there was no equivalent database with millions of cloud attacks that could be fed into an ML model. Researchers have been collecting malware file samples for years. In the cloud, attacks are mainly API calls recorded in log data, spread over time, and are rarely packaged for analysis. Lacework&#8217;s &#8220;no rules&#8221; and &#8220;high fidelity&#8221; algorithms would need to look elsewhere for their training. </p><h1>Unusual but Not Malicious</h1><p>The difficulty of cloud threat detection would never stand in the way of enterprises shifting their data centers to AWS, Azure, and GCP. With the great cloud migration underway, Lacework <a href="https://www.lacework.com/platform/threat-detection">told</a> anxious security leaders that they could &#8220;uncover unknown threats like abnormal logins and escalation of privileges with patented Polygraph anomaly-based approach.&#8221;</p><p>From this description, we can <a href="https://docs.lacework.net/console/view-the-lacework-polygraph">learn</a> where Lacework&#8217;s algorithms would find the needed training data: in the customer&#8217;s environment. </p><blockquote><p>The polygraph technology dynamically develops a behavioral model of your services and infrastructure. The model understands natural hierarchies including processes, containers, pods, and machines. It then develops behavioral models that the polygraph monitors in search of activities that fall outside the model&#8217;s parameters. </p></blockquote><p>In a post from 2017, one of the Lacework cofounders <a href="https://www.lacework.com/blog/more-machine-learning-models-better-results/">explained</a> how they apply machine learning to turn the customer&#8217;s own activity patterns into highly effective threat detections that attackers would struggle to circumvent. </p><blockquote><p>We use unsupervised machine learning to build a baseline for each cloud deployment. We develop exhaustive insights, with information about all entities and their behaviors. Every baseline is as unique as the deployment it protects, making it easy to accurately spot the changes (using supervised machine learning) that always accompany an attack. A successful hacker would 1) have to have an omniscient understanding of your specific cloud deployment and 2) design an attack that perfectly mimicked normal behavior in that deployment. A tough challenge indeed.</p></blockquote><p>This approach may have worked well in Lacework&#8217;s early days when Polygraph ran in a test environment and at early customers&#8212; many of whom were startups. Unfortunately, production cloud environments running at full scale are notoriously busy places. The DevOps movement encourages multiple code releases a day. AWS has over 200 services, where cloud users can spin up complex clusters in seconds and tear them down just as easily. Lacework&#8217;s Polygraph technology had to monitor environments where &#8220;unusual&#8221; things happened frequently and rarely involved an attack. </p><p>While Lacework promised &#8220;high fidelity alert reduction&#8221; for the cloud, they didn&#8217;t experience the same liftoff as CrowdStrike saw on the endpoint. Instead, the company <a href="https://www.securityweek.com/cloud-security-firm-lacework-lays-20-workforce/">laid off</a> 20% of its workforce just months after <a href="https://www.lacework.com/press-release/lacework-closes-seriesd-funding-round">raising</a> $1.3 billion at a whopping $8.3 billion valuation. This wasn&#8217;t just a matter of rising interest rates. AI for anomaly detection on cloud activity wasn&#8217;t the same magic sauce as AI trained on millions of samples for malware detection. </p><h1>The &#8220;No Rules&#8221; Dillema</h1><p>Lacework heavily promoted its technology for threat detection with &#8220;no rules.&#8221; Its official <a href="https://docs.lacework.net/console/lacework-polygraph-faqs">documentation</a> states that &#8220;polygraph is the first and only zero touch cloud workload protection platform, which requires no rules, no policies, and no logs for breach detection.&#8221; The company released an ebook titled <a href="https://www.lacework.com/blog/cloud-security-automation-for-dummies/">&#8220;Cloud Security Automation for Dummies&#8221;</a> that equated automation with having &#8220;No rules to write or maintain.&#8221; But even if the AI worked as intended, was the &#8220;no rules&#8221; philosophy doomed from the start? </p><p>While security teams at early-stage startups might appreciate a cloud security solution with few knobs to turn, established security organizations have detection engineering functions dedicated to striking a balance between noisy alerts and missed attacks. This balance requires customization and fine-tuning. Detection-as-code has seen widespread adoption as a best practice for spotting threats. And detection-as-code, at its core, is all about rules.</p><p>Likely in response to pressure from up-market customers demanding greater flexibility, Lacework eventually launched the Lacework Query Language (LQL). LQL  enabled custom rule creation and detection signatures maintained by the Lacework research team. For example, a <a href="https://www.lacework.com/blog/how-to-use-audit-logs-and-lacework-query-language-lql-to-simplify-your-kubernetes-api-migration/">blog</a> on Kubernetes threat detection describes how &#8220;Lacework has released LQL policies that detect deleted and deprecated API calls for all Kubernetes API versions in this GitHub repository.&#8221; </p><p>The new slogan for the &#8220;No Rules&#8221; cloud security platform would be &#8220;Rules Optional.&#8221;</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!eVqN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdffcd952-40fd-459a-b372-90613516e3d3_2462x342.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!eVqN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdffcd952-40fd-459a-b372-90613516e3d3_2462x342.png 424w, https://substackcdn.com/image/fetch/$s_!eVqN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdffcd952-40fd-459a-b372-90613516e3d3_2462x342.png 848w, https://substackcdn.com/image/fetch/$s_!eVqN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdffcd952-40fd-459a-b372-90613516e3d3_2462x342.png 1272w, https://substackcdn.com/image/fetch/$s_!eVqN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdffcd952-40fd-459a-b372-90613516e3d3_2462x342.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!eVqN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdffcd952-40fd-459a-b372-90613516e3d3_2462x342.png" width="1456" height="202" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dffcd952-40fd-459a-b372-90613516e3d3_2462x342.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:202,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:308595,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!eVqN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdffcd952-40fd-459a-b372-90613516e3d3_2462x342.png 424w, https://substackcdn.com/image/fetch/$s_!eVqN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdffcd952-40fd-459a-b372-90613516e3d3_2462x342.png 848w, https://substackcdn.com/image/fetch/$s_!eVqN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdffcd952-40fd-459a-b372-90613516e3d3_2462x342.png 1272w, https://substackcdn.com/image/fetch/$s_!eVqN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdffcd952-40fd-459a-b372-90613516e3d3_2462x342.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>Adding custom rules with the Lacework Query Language doesn't appear to have achieved the necessary balance between automation and flexibility. The company&#8217;s <a href="https://www.lacework.com/customers">Customers</a> page still contains mainly smaller organizations, and the GitHub project to help customers use LQL for threat hunting hasn&#8217;t been updated in over two years. The &#8220;no rules&#8221; approach to cloud threat detection wasn&#8217;t suited for the medium and large enterprises that cybersecurity companies depend on for success in the long term. </p><h1>AI Lessons Learned</h1><p>Cybersecurity entrepreneurs, investors, and practitioners can take away several important lessons from Lacework&#8217;s story. As artificial intelligence technology hits peak hype, how can you evaluate the limits of an AI strategy for threat detection use cases?</p><ul><li><p><strong>Training data matters:</strong> What training datasets were used and were they big enough to support the inference the models will be expected to make? </p></li><li><p><strong>The black-box/flexibility tradeoff:</strong> Does the solution achieve the necessary balance between automation and customization?  </p></li><li><p><strong>Independent validation:</strong> What tests could we run to expose model issues like overfitting or knowledge gaps? </p></li></ul><p>You can use these considerations as a framework for emerging AI use cases like <a href="https://www.anvilogic.com/monte-copilot">security copilot</a>. Ask how the copilot&#8217;s models were trained and how much actual analyst activity was used during training. Find out what feedback mechanism exists to tune the copilot and whether customization &#8220;as code&#8221; options exist for integration with the organization&#8217;s triage workflows. Finally, validate independently by asking it to do some basic and not-so-basic analyst work to map out the edges of the copilot&#8217;s abilities. </p><p>Shifting hard, tedious work from humans to machines has been the story of humanity from the wheel to sliced bread. Artificial intelligence is an abstract and opaque technology, and cybersecurity presents it with a fog of war where effectiveness can be especially hard to tell. Some of Silicon Valley&#8217;s sharpest minds missed the flaws in Lacework&#8217;s application of machine learning to cloud security. When a lesson costs over a billion dollars, we should pay attention. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.omeronsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Omer on Security! Subscribe for free to receive new posts for your security data lake journey.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Busting Four Myths on Usage-Based Pricing for Security Operations]]></title><description><![CDATA[Why the best cost model for security data is measured by the second]]></description><link>https://www.omeronsecurity.com/p/busting-four-myths-on-usage-based</link><guid isPermaLink="false">https://www.omeronsecurity.com/p/busting-four-myths-on-usage-based</guid><dc:creator><![CDATA[Omer Singer]]></dc:creator><pubDate>Mon, 15 Apr 2024 13:49:45 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!80nG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d2925d8-8481-4186-aead-b565989d3f4b_600x337.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!80nG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d2925d8-8481-4186-aead-b565989d3f4b_600x337.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!80nG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d2925d8-8481-4186-aead-b565989d3f4b_600x337.png 424w, https://substackcdn.com/image/fetch/$s_!80nG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d2925d8-8481-4186-aead-b565989d3f4b_600x337.png 848w, https://substackcdn.com/image/fetch/$s_!80nG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d2925d8-8481-4186-aead-b565989d3f4b_600x337.png 1272w, https://substackcdn.com/image/fetch/$s_!80nG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d2925d8-8481-4186-aead-b565989d3f4b_600x337.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!80nG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d2925d8-8481-4186-aead-b565989d3f4b_600x337.png" width="394" height="221.29666666666665" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9d2925d8-8481-4186-aead-b565989d3f4b_600x337.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:337,&quot;width&quot;:600,&quot;resizeWidth&quot;:394,&quot;bytes&quot;:304576,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!80nG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d2925d8-8481-4186-aead-b565989d3f4b_600x337.png 424w, https://substackcdn.com/image/fetch/$s_!80nG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d2925d8-8481-4186-aead-b565989d3f4b_600x337.png 848w, https://substackcdn.com/image/fetch/$s_!80nG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d2925d8-8481-4186-aead-b565989d3f4b_600x337.png 1272w, https://substackcdn.com/image/fetch/$s_!80nG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d2925d8-8481-4186-aead-b565989d3f4b_600x337.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>Usage-based pricing for security operations is about as popular as <a href="https://thereader.mitpress.mit.edu/hole-in-the-head-trepanation/">trepanning</a> for curing headaches. But does the &#8220;pay for what you use&#8221; model deserve a closer look? This post will highlight four concerns I&#8217;ve heard from security leaders and why SOCs should embrace the cost model that&#8217;s helped unleash data-driven transformations across the enterprise. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.omeronsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.omeronsecurity.com/subscribe?"><span>Subscribe now</span></a></p><h1>What is Usage-Based Pricing? </h1><p>When data platforms ran on-premises, physical servers were deployed based on an expectation of how much compute power would be needed to keep users happy. In off-hours, the utilization of those resources was low, and when things got busy, the available resources were maxed out. At that point, searches might slow down or wait in a queue.  This fixed-capacity model is still the case for virtually all cloud-based SIEM deployments.</p><p>One of the breakthroughs that Snowflake brought to data platforms was how it took advantage of the elasticity of the cloud. Users could tap into a virtually limitless pool of compute resources when needed, and &#8220;give back&#8221; resources when idle. The technology to make fully elastic scaling easy and instant was groundbreaking. The pricing model would need to be innovative as well. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!A2r0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a3fd3ad-4622-4bc8-b9d1-948396ac1eef_1736x784.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!A2r0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a3fd3ad-4622-4bc8-b9d1-948396ac1eef_1736x784.png 424w, https://substackcdn.com/image/fetch/$s_!A2r0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a3fd3ad-4622-4bc8-b9d1-948396ac1eef_1736x784.png 848w, https://substackcdn.com/image/fetch/$s_!A2r0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a3fd3ad-4622-4bc8-b9d1-948396ac1eef_1736x784.png 1272w, https://substackcdn.com/image/fetch/$s_!A2r0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a3fd3ad-4622-4bc8-b9d1-948396ac1eef_1736x784.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!A2r0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a3fd3ad-4622-4bc8-b9d1-948396ac1eef_1736x784.png" width="1456" height="658" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5a3fd3ad-4622-4bc8-b9d1-948396ac1eef_1736x784.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:658,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:125386,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!A2r0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a3fd3ad-4622-4bc8-b9d1-948396ac1eef_1736x784.png 424w, https://substackcdn.com/image/fetch/$s_!A2r0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a3fd3ad-4622-4bc8-b9d1-948396ac1eef_1736x784.png 848w, https://substackcdn.com/image/fetch/$s_!A2r0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a3fd3ad-4622-4bc8-b9d1-948396ac1eef_1736x784.png 1272w, https://substackcdn.com/image/fetch/$s_!A2r0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a3fd3ad-4622-4bc8-b9d1-948396ac1eef_1736x784.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">A partial list of Snowflake warehouse sizes (<a href="https://docs.snowflake.com/en/user-guide/warehouses-overview">Source</a>)</figcaption></figure></div><p>Snowflake created a pricing model where users query their data with a virtual warehouse that has a T-shirt size. These sizes range from X-Small to 6X-Large (that&#8217;s XXXXXX-Large), with each size twice as big and twice the cost. The total cost is calculated by the number of seconds for which the warehouse is active. So a Medium warehouse that runs for 84 seconds costs the organization 0.0011 x 84 = 0.0924 credits. These warehouses can automatically suspend and resume based on query activity, hence the term usage-based pricing. But is this a good fit for security operations? </p><h1>Myth: My Team Would Cut Back on Investigations</h1><p>When learning about usage-based pricing, some security leaders worry about analysts feeling pressured to cut short investigations. No one wants to adopt a new pricing model only to miss threats in the environment. In my work with dozens of security teams that have adopted data lakes, I have yet to see this happen. </p><p>The chart below shows why analysts don&#8217;t hold back under usage-based models. Compared to a traditional data warehouse or SIEM with fixed resources, a cloud data platform that elastically scales to meet demand is radically more cost-effective. During idle hours, the cost difference is substantial. In times of peak activity, the cost may be comparable. So while analyst activity may affect the degree to which savings are realized, cost savings are still achieved over time. Security analysts don&#8217;t need to worry if the organization is saving 80% over alternative approaches or &#8220;only&#8221; 50%. Properly informed during onboarding, analysts do not work differently on account of usage-based pricing. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!INTq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2ee8f37-6bdc-4fa1-98aa-baedad16fda1_512x254.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!INTq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2ee8f37-6bdc-4fa1-98aa-baedad16fda1_512x254.png 424w, https://substackcdn.com/image/fetch/$s_!INTq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2ee8f37-6bdc-4fa1-98aa-baedad16fda1_512x254.png 848w, https://substackcdn.com/image/fetch/$s_!INTq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2ee8f37-6bdc-4fa1-98aa-baedad16fda1_512x254.png 1272w, https://substackcdn.com/image/fetch/$s_!INTq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2ee8f37-6bdc-4fa1-98aa-baedad16fda1_512x254.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!INTq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2ee8f37-6bdc-4fa1-98aa-baedad16fda1_512x254.png" width="512" height="254" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c2ee8f37-6bdc-4fa1-98aa-baedad16fda1_512x254.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:254,&quot;width&quot;:512,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!INTq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2ee8f37-6bdc-4fa1-98aa-baedad16fda1_512x254.png 424w, https://substackcdn.com/image/fetch/$s_!INTq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2ee8f37-6bdc-4fa1-98aa-baedad16fda1_512x254.png 848w, https://substackcdn.com/image/fetch/$s_!INTq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2ee8f37-6bdc-4fa1-98aa-baedad16fda1_512x254.png 1272w, https://substackcdn.com/image/fetch/$s_!INTq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2ee8f37-6bdc-4fa1-98aa-baedad16fda1_512x254.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>Myth: We&#8217;d Get Surprise Bills</h1><p>Many SIEMs get a bad wrap for ingest-based pricing and its effect on detection coverage and IR. But at least they let you control which sources ship data, and tune down sensors that are  &#8220;too good&#8221; at generating visibility. There&#8217;s a fear that in periods of heightened SOC activity, usage-based bills could become a nasty surprise at the end of the month. </p><p>The truth is that some forms of usage-based pricing do run the risk of spiky, even unexpectedly high, costs. Data platforms that charge by &#8220;bytes scanned&#8221; have been responsible for unpleasant CFO conversations for at least one SOC leader I worked with. In their case, it was the AWS Athena service where the IR team ran a sweep that touched months-worth of log data. As a result, a single investigation cost them over $5,000. good thing it was a false alarm right?</p><p>It&#8217;s unfair and counterproductive to expect SOC analysts to predetermine how many terabytes each search will scan. At scale, this is a recipe for disaster. In fact, AWS recently introduced a &#8220;provisioned capacity&#8221; pricing model for Athena where customers get access to always-on resources without per-bytes pricing. While not exactly usage-based, AWS <a href="https://aws.amazon.com/blogs/aws/introducing-athena-provisioned-capacity/">explained</a> that the change was prompted by customers reporting that &#8220;it is difficult to forecast [the] Athena costs. Athena charges by the volume of data scanned, which is often difficult to predict as it depends on the size of your data set, the construction of the user queries, and the storage format for the data.&#8221;</p><p>The time-based usage model does not carry the same risk. There are only 24 hours in a day, and query timeout enforcement can automatically prevent runaway queries. I&#8217;ve seen cases where incident responders temporarily request beefier warehouses to meet their SLAs&#8212; but resizing can be subject to management approval where cost/latency tradeoffs can be considered. Sizing can later be readjusted as the situation permits.  </p><p>Across all of these options, Snowflake has released a slew of features to monitor costs and prevent overruns. <a href="https://www.snowflake.com/blog/more-effective-spend-management-budgets/">Budgets</a>, generally available as of last week, enable teams to set soft and hard limits to track, notify and adjust resources as needed to stay within preset budget guardrails. SOC teams can receive early warning when they are on track to blow through their weekly or monthly budgets and adjust whatever changes have taken their spending off course. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!pmuT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F018688ee-55c6-4375-905c-3b33e9c73a18_2560x1212.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!pmuT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F018688ee-55c6-4375-905c-3b33e9c73a18_2560x1212.jpeg 424w, https://substackcdn.com/image/fetch/$s_!pmuT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F018688ee-55c6-4375-905c-3b33e9c73a18_2560x1212.jpeg 848w, https://substackcdn.com/image/fetch/$s_!pmuT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F018688ee-55c6-4375-905c-3b33e9c73a18_2560x1212.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!pmuT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F018688ee-55c6-4375-905c-3b33e9c73a18_2560x1212.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!pmuT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F018688ee-55c6-4375-905c-3b33e9c73a18_2560x1212.jpeg" width="645" height="305.2232142857143" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/018688ee-55c6-4375-905c-3b33e9c73a18_2560x1212.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:689,&quot;width&quot;:1456,&quot;resizeWidth&quot;:645,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!pmuT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F018688ee-55c6-4375-905c-3b33e9c73a18_2560x1212.jpeg 424w, https://substackcdn.com/image/fetch/$s_!pmuT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F018688ee-55c6-4375-905c-3b33e9c73a18_2560x1212.jpeg 848w, https://substackcdn.com/image/fetch/$s_!pmuT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F018688ee-55c6-4375-905c-3b33e9c73a18_2560x1212.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!pmuT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F018688ee-55c6-4375-905c-3b33e9c73a18_2560x1212.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">The new Budgets feature in Snowflake helps prevent surprise bills (<a href="https://www.snowflake.com/blog/more-effective-spend-management-budgets/">Source</a>)</figcaption></figure></div><h1>Myth: Low-Latency Threat Detection and Usage-Based Pricing Don&#8217;t Mix</h1><p>Another concern I&#8217;ve heard from SOC leaders considering a move to usage-based pricing for their data platform is around detection latency. We need to run threat detection rules around the clock, they explain, and that would mean non-stop usage. Wouldn&#8217;t that break the usage-based pricing model? </p><p>Not necessarily. This is where &#8220;separation of compute from compute&#8221; comes into play. We can take advantage of Snowflake&#8217;s support for querying a database with multiple warehouses in a single account. There&#8217;s no limit to how many warehouses can be created, and each only incurs cost when it is active. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6Pw6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F691ea952-8018-4567-ac7a-e7439b58124a_450x251.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6Pw6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F691ea952-8018-4567-ac7a-e7439b58124a_450x251.png 424w, https://substackcdn.com/image/fetch/$s_!6Pw6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F691ea952-8018-4567-ac7a-e7439b58124a_450x251.png 848w, https://substackcdn.com/image/fetch/$s_!6Pw6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F691ea952-8018-4567-ac7a-e7439b58124a_450x251.png 1272w, https://substackcdn.com/image/fetch/$s_!6Pw6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F691ea952-8018-4567-ac7a-e7439b58124a_450x251.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6Pw6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F691ea952-8018-4567-ac7a-e7439b58124a_450x251.png" width="450" height="251" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/691ea952-8018-4567-ac7a-e7439b58124a_450x251.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:251,&quot;width&quot;:450,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Support for Multiple Workloads - Blog&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Support for Multiple Workloads - Blog" title="Support for Multiple Workloads - Blog" srcset="https://substackcdn.com/image/fetch/$s_!6Pw6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F691ea952-8018-4567-ac7a-e7439b58124a_450x251.png 424w, https://substackcdn.com/image/fetch/$s_!6Pw6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F691ea952-8018-4567-ac7a-e7439b58124a_450x251.png 848w, https://substackcdn.com/image/fetch/$s_!6Pw6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F691ea952-8018-4567-ac7a-e7439b58124a_450x251.png 1272w, https://substackcdn.com/image/fetch/$s_!6Pw6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F691ea952-8018-4567-ac7a-e7439b58124a_450x251.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Multiple virtual warehouses run in parallel (<a href="https://www.snowflake.com/blog/support-multiple-workloads/">Source</a>)</figcaption></figure></div><p>Security operations on the data lake can therefore divide its compute requirements across several warehouses. A small, low-cost warehouse can be running 24x7 against recent data for timely threat detection. In parallel, a much more powerful one can be standing by for ad hoc investigations. When a human analyst needs to search log data going back weeks or months, the large warehouse can return answers quickly and suspend itself within minutes of inuse. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!q6-O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19fc3351-d993-416b-8979-08848aa56bc7_1614x1022.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!q6-O!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19fc3351-d993-416b-8979-08848aa56bc7_1614x1022.png 424w, https://substackcdn.com/image/fetch/$s_!q6-O!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19fc3351-d993-416b-8979-08848aa56bc7_1614x1022.png 848w, https://substackcdn.com/image/fetch/$s_!q6-O!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19fc3351-d993-416b-8979-08848aa56bc7_1614x1022.png 1272w, https://substackcdn.com/image/fetch/$s_!q6-O!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19fc3351-d993-416b-8979-08848aa56bc7_1614x1022.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!q6-O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19fc3351-d993-416b-8979-08848aa56bc7_1614x1022.png" width="587" height="371.7129120879121" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/19fc3351-d993-416b-8979-08848aa56bc7_1614x1022.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:922,&quot;width&quot;:1456,&quot;resizeWidth&quot;:587,&quot;bytes&quot;:233337,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!q6-O!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19fc3351-d993-416b-8979-08848aa56bc7_1614x1022.png 424w, https://substackcdn.com/image/fetch/$s_!q6-O!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19fc3351-d993-416b-8979-08848aa56bc7_1614x1022.png 848w, https://substackcdn.com/image/fetch/$s_!q6-O!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19fc3351-d993-416b-8979-08848aa56bc7_1614x1022.png 1272w, https://substackcdn.com/image/fetch/$s_!q6-O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19fc3351-d993-416b-8979-08848aa56bc7_1614x1022.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Example of warehouses for different use cases (<a href="https://docs.anvilogic.com/">Source</a>)</figcaption></figure></div><p>Having multiple compute clusters available, each with its own balance of cost and performance, enables security operations with low-latency use cases to benefit from usage-based pricing. Snowflake&#8217;s product direction towards services that aren&#8217;t tied to running warehouses, like Snowpipe for ingest and serverless tasks for transformations, means ever-increasing granularity aligning each use case&#8217;s cost to its latency requirements.</p><h1>Myth: The Benefits Aren&#8217;t Worth the Added Complexity</h1><p>While leading cloud data platforms enable security leaders to save millions on detection and response, adoption has been gradual. Fears around the complexity of usage-based cost models may have played a role in that. The reality is that managing usage-based costs is easier than ever, but you don&#8217;t need to take my word for it.</p><p>One benefit of the &#8220;pay for what you use&#8221; model is how it supports experimentation. A team can try a usage-based platform without any up-front commitment and get first-hand experience with sizing resources, per-second metering, and cost guardrails. With Snowflake, for example, an account can be provisioned with a maximum budget of a few hundred dollars. The team can then freely experiment with querying data using warehouses of different sizes and know in advance exactly how much the experiment will cost. (Side note: you can get a good amount of free credits for testing out a security data lake but you didn&#8217;t hear it from me. I don&#8217;t even work there anymore.)</p><p>Every data platform has a fixed relationship between cost and performance. For most SIEMs, that relationship is hidden from users. The vendor charges you for ingest or licenses based on how much search activity they expect you to perform, and they keep infrastructure costs in check by throttling your speed. Even with SIEMs that offer some level of control over your deployment&#8217;s compute power, it&#8217;s usually so cumbersome to scale up and down that the SOC is compelled to operate at a fixed level of compute power.</p><p>Usage-based pricing blasts this model apart by removing the SIEM vendor&#8217;s &#8220;safe&#8221; assumptions for what the SOC will need to do its job. Customers get to align their spend to actual requirements, and in cybersecurity this translates to substantial  savings when unused resources don&#8217;t incur costs.  It also fosters better customer support, as Snowflake CRO Chris Degnan explained in <a href="https://www.snowflake.com/blog/consumption-based-pricing-ensuring-every-customers-value-and-success/">Consumption-based Pricing: Ensuring Every Customer&#8217;s Value and Success</a>, &#8220;Your account team becomes your day-to-day advocate and an integral part of your project team, working hard to earn your business every day.&#8221; </p><p>Perhaps most importantly, it removes the hard caps on performance that otherwise create search-related coffee breaks. When the SOC goes to Defcon 1 (that&#8217;s nuclear war, not the event in Vegas), the option to temporarily 10x search performance is something that even hard-nosed CFOs can get behind. </p><p>For all of these reasons, the move from fixed or ingest-based SIEM pricing to a usage-based model should be considered a sign of SOC maturity. While most SIEMs don&#8217;t yet support usage-based data platform options, <a href="https://www.anvilogic.com">some</a> do. Security leaders should bear in mind that some preparation and <a href="https://www.snowflake.com/en/data-cloud/pricing/cost-and-performance-optimization/">best practices</a> are needed for such a shift.  But the flexibility to pay for the time and performance your team needs can do wonders for your budget while helping to detect and respond to threats when seconds count. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.omeronsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Omer on Security! Subscribe to recieve weekly guidance for your security data lake journey.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The Security Data Fabric Identity Crisis]]></title><description><![CDATA[Why success with decoupled data pipelines takes overcoming a people problem]]></description><link>https://www.omeronsecurity.com/p/the-security-data-fabric-identity</link><guid isPermaLink="false">https://www.omeronsecurity.com/p/the-security-data-fabric-identity</guid><dc:creator><![CDATA[Omer Singer]]></dc:creator><pubDate>Thu, 04 Apr 2024 14:54:31 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!_RlG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f638902-9703-4f02-a959-33dcea5a6380_1778x1000.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_RlG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f638902-9703-4f02-a959-33dcea5a6380_1778x1000.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_RlG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f638902-9703-4f02-a959-33dcea5a6380_1778x1000.png 424w, https://substackcdn.com/image/fetch/$s_!_RlG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f638902-9703-4f02-a959-33dcea5a6380_1778x1000.png 848w, https://substackcdn.com/image/fetch/$s_!_RlG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f638902-9703-4f02-a959-33dcea5a6380_1778x1000.png 1272w, https://substackcdn.com/image/fetch/$s_!_RlG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f638902-9703-4f02-a959-33dcea5a6380_1778x1000.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_RlG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f638902-9703-4f02-a959-33dcea5a6380_1778x1000.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1f638902-9703-4f02-a959-33dcea5a6380_1778x1000.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1740321,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_RlG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f638902-9703-4f02-a959-33dcea5a6380_1778x1000.png 424w, https://substackcdn.com/image/fetch/$s_!_RlG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f638902-9703-4f02-a959-33dcea5a6380_1778x1000.png 848w, https://substackcdn.com/image/fetch/$s_!_RlG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f638902-9703-4f02-a959-33dcea5a6380_1778x1000.png 1272w, https://substackcdn.com/image/fetch/$s_!_RlG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f638902-9703-4f02-a959-33dcea5a6380_1778x1000.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Tara Moore/Getty Images</figcaption></figure></div><h1>Data Collection Wants to Be Free</h1><p>Big changes are happening to how security teams get their data. For years, data collection was a function of the SIEM. Splunk&#8217;s app store, for example, includes hundreds of supported connectors that integrate with everything from firewalls to vulnerability scanners. In parallel, large SOCs formed teams to manage open-source pipelines for shaping and routing data using technologies like Apache Kafka and NiFi. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!yqhY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3000bb5f-3066-4576-8cb9-705df4a589d8_846x545.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yqhY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3000bb5f-3066-4576-8cb9-705df4a589d8_846x545.png 424w, https://substackcdn.com/image/fetch/$s_!yqhY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3000bb5f-3066-4576-8cb9-705df4a589d8_846x545.png 848w, https://substackcdn.com/image/fetch/$s_!yqhY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3000bb5f-3066-4576-8cb9-705df4a589d8_846x545.png 1272w, https://substackcdn.com/image/fetch/$s_!yqhY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3000bb5f-3066-4576-8cb9-705df4a589d8_846x545.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yqhY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3000bb5f-3066-4576-8cb9-705df4a589d8_846x545.png" width="846" height="545" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3000bb5f-3066-4576-8cb9-705df4a589d8_846x545.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:545,&quot;width&quot;:846,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:105927,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!yqhY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3000bb5f-3066-4576-8cb9-705df4a589d8_846x545.png 424w, https://substackcdn.com/image/fetch/$s_!yqhY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3000bb5f-3066-4576-8cb9-705df4a589d8_846x545.png 848w, https://substackcdn.com/image/fetch/$s_!yqhY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3000bb5f-3066-4576-8cb9-705df4a589d8_846x545.png 1272w, https://substackcdn.com/image/fetch/$s_!yqhY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3000bb5f-3066-4576-8cb9-705df4a589d8_846x545.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Connectors coupled with SIEM</figcaption></figure></div><p>Security organizations have now reached a tipping point for their data. On one side are the three V&#8217;s of data explosion: volume, velocity, and variety. Security teams are dealing with an avalanche of logs from endpoint agents, multi-cloud hybrid infrastructure, distributed workforces, and SaaS applications. Information must be collected from within the environment and from outside via APIs. It&#8217;s also more valuable than ever, with advances in AI enabling new insights on risks and threats. Add &#8220;value&#8221; as a fourth V driving the need for data pipeline investment.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.omeronsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.omeronsecurity.com/subscribe?"><span>Subscribe now</span></a></p><p>On the other side, alternative destinations have opened up. Cheap cloud storage, subsidized cloud provider SIEMs, and powerful cloud data platforms could be better options than the monolithic SIEM for some datasets. The resulting dynamic has been described as <a href="https://rakgarg.substack.com/p/the-great-splunkbundling">The Great Splunkbundling</a>, where previously integrated components are freed from the SIEM&#8212; starting with the data pipeline. </p><p>Cribl has dominated this space with its Cribl Stream product. More powerful and cost-effective than Splunk&#8217;s own solution, Cribl Stream gained widespread adoption by maintaining compatibility while opening up a range of sources and destinations. Investors value Cribl at over $2 billion because they know that security teams (as well as IT, DevOps, and other log consumers) value optionality and specialization.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cUhT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa662dbf4-c0f5-4493-82f2-69ed7b8745c2_1200x1200.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cUhT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa662dbf4-c0f5-4493-82f2-69ed7b8745c2_1200x1200.png 424w, https://substackcdn.com/image/fetch/$s_!cUhT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa662dbf4-c0f5-4493-82f2-69ed7b8745c2_1200x1200.png 848w, https://substackcdn.com/image/fetch/$s_!cUhT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa662dbf4-c0f5-4493-82f2-69ed7b8745c2_1200x1200.png 1272w, https://substackcdn.com/image/fetch/$s_!cUhT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa662dbf4-c0f5-4493-82f2-69ed7b8745c2_1200x1200.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cUhT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa662dbf4-c0f5-4493-82f2-69ed7b8745c2_1200x1200.png" width="369" height="369" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a662dbf4-c0f5-4493-82f2-69ed7b8745c2_1200x1200.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1200,&quot;width&quot;:1200,&quot;resizeWidth&quot;:369,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Building the Future of Data for IT and Security - Cribl&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Building the Future of Data for IT and Security - Cribl" title="Building the Future of Data for IT and Security - Cribl" srcset="https://substackcdn.com/image/fetch/$s_!cUhT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa662dbf4-c0f5-4493-82f2-69ed7b8745c2_1200x1200.png 424w, https://substackcdn.com/image/fetch/$s_!cUhT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa662dbf4-c0f5-4493-82f2-69ed7b8745c2_1200x1200.png 848w, https://substackcdn.com/image/fetch/$s_!cUhT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa662dbf4-c0f5-4493-82f2-69ed7b8745c2_1200x1200.png 1272w, https://substackcdn.com/image/fetch/$s_!cUhT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa662dbf4-c0f5-4493-82f2-69ed7b8745c2_1200x1200.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Record-breaking demand for Cribl&#8217;s independent data management solution (<a href="https://cribl.io/blog/building-the-future-of-data-for-it-and-security/">Source</a>)</figcaption></figure></div><p>As security operations embrace commercial off-the-shelf data collection solutions, more providers are entering the scene. Some, such as <a href="https://databahn.ai/security-data-fabric/">Databahn</a>, tout their cybersecurity expertise and AI use cases. Others, such as <a href="https://www.businesswire.com/news/home/20220421005080/en/Dassana-Emerges-From-Stealth-With-5M-in-Funding-to-Bring-Cloud-Like-Thinking-to-Logs">Dassana</a>, <a href="https://www.monad.com/">Monad</a>, and <a href="https://corporate.comcast.com/press/releases/comcast-technology-solutions-databee-platform-large-enterprises-security-risk-compliance">DataBee</a> emphasize data sources beyond logs- including vulnerability, identity, and asset datasets that can support compliance analytics and security metrics. These newcomers identify as security data fabric solutions. </p><p>Investors and industry heavyweights have poured hundreds of millions of dollars into this emerging category. Zscaler&#8217;s <a href="https://www.calcalistech.com/ctechnews/article/b1jvqdgr6">Avalor acquisition</a> and <a href="https://www.sentinelone.com/blog/s-ventures-invests-in-auguria-to-solve-secops-overload/">SentinelOne&#8217;s investment in Auguria</a> are examples from last month. Cole Grolmus captured the activity in a <a href="https://www.linkedin.com/posts/colegrolmus_what-is-a-cybersecurity-data-fabric-and-activity-7176979782763450369-jxXT">post</a> that drew plenty of comments- not least from security data fabric companies that didn&#8217;t get included in his cool diagram:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PKk-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c231e25-669d-45cb-96d2-dd1025783a12_800x1000.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PKk-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c231e25-669d-45cb-96d2-dd1025783a12_800x1000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!PKk-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c231e25-669d-45cb-96d2-dd1025783a12_800x1000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!PKk-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c231e25-669d-45cb-96d2-dd1025783a12_800x1000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!PKk-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c231e25-669d-45cb-96d2-dd1025783a12_800x1000.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PKk-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c231e25-669d-45cb-96d2-dd1025783a12_800x1000.jpeg" width="343" height="428.75" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0c231e25-669d-45cb-96d2-dd1025783a12_800x1000.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1000,&quot;width&quot;:800,&quot;resizeWidth&quot;:343,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;logo, company name&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="logo, company name" title="logo, company name" srcset="https://substackcdn.com/image/fetch/$s_!PKk-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c231e25-669d-45cb-96d2-dd1025783a12_800x1000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!PKk-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c231e25-669d-45cb-96d2-dd1025783a12_800x1000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!PKk-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c231e25-669d-45cb-96d2-dd1025783a12_800x1000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!PKk-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c231e25-669d-45cb-96d2-dd1025783a12_800x1000.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><a href="https://www.linkedin.com/posts/colegrolmus_what-is-a-cybersecurity-data-fabric-and-activity-7176979782763450369-jxXT/">Source</a></figcaption></figure></div><p>But how should security leaders evaluate newcomers like <a href="https://tarsal.co/">Tarsal</a> (&#8220;One click to build your security data lake&#8221;)? And what is the identity crisis that threatens to crash the security data fabric party?  </p><h1>Demystifying Security Data Fabric</h1><p>Gartner <a href="https://www.gartner.com/en/information-technology/glossary/data-fabric">defines</a> data fabric (generally, not just for security) as &#8220;an emerging data management design for attaining flexible, reusable and augmented data integration pipelines, services and semantics.&#8221; The top job for data fabric is making data available in the right places, in the right formats, and reliably. It sounds highly relevant for security operations! But where does it fit into the existing SOC stack?</p><p>As Pramod Gosavi <a href="https://www.linkedin.com/pulse/bringing-digital-transformation-cybersecurity-pramod-gosavi-tu7ec/">points out</a>, security data fabric is not a security data lake. Gosavi writes that it &#8220;ingests data from multiple feeds, then aggregates &amp; and compresses, standardizes, enriches, correlates, and normalizes that data before transferring a full-time-series dataset to a security data lake.&#8221; In other words, a pipeline that connects the multitude of logs, findings, and contextual datasets to several destinations. With many enterprises <a href="https://www.omeronsecurity.com/p/the-two-headed-siem-monster">juggling multiple SIEMs</a> and data lakes, that &#8220;many to many&#8221; fabric must address substantial complexity. </p><p>For large enterprises, many sources are located within the organization&#8212; in the data center or private cloud. These require the kind of forwarder infrastructure that Cribl has perfected and most security data fabrics do not offer. Enterprise log sources such as network flows and operating system events are very high volume, so the data reduction capabilities of Cribl are another big advantage. </p><p>Where the new security data fabric solutions may have a role to play is in collecting data from behind APIs. SaaS security tools like Okta, Wiz, and Axonius have important pieces of the overall SOC puzzle. When moving away from bundled SIEM connectors, security leaders can turn to security data fabric solutions for collecting, cleaning, and enriching cloud-based sources. As in the Avalor example below, these tend to describe posture, assets, and identities. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_dy1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F462902ec-9c6d-4d0b-8a4e-e631e2d71718_980x914.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_dy1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F462902ec-9c6d-4d0b-8a4e-e631e2d71718_980x914.png 424w, https://substackcdn.com/image/fetch/$s_!_dy1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F462902ec-9c6d-4d0b-8a4e-e631e2d71718_980x914.png 848w, https://substackcdn.com/image/fetch/$s_!_dy1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F462902ec-9c6d-4d0b-8a4e-e631e2d71718_980x914.png 1272w, https://substackcdn.com/image/fetch/$s_!_dy1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F462902ec-9c6d-4d0b-8a4e-e631e2d71718_980x914.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_dy1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F462902ec-9c6d-4d0b-8a4e-e631e2d71718_980x914.png" width="457" height="426.22244897959183" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/462902ec-9c6d-4d0b-8a4e-e631e2d71718_980x914.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:914,&quot;width&quot;:980,&quot;resizeWidth&quot;:457,&quot;bytes&quot;:85098,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_dy1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F462902ec-9c6d-4d0b-8a4e-e631e2d71718_980x914.png 424w, https://substackcdn.com/image/fetch/$s_!_dy1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F462902ec-9c6d-4d0b-8a4e-e631e2d71718_980x914.png 848w, https://substackcdn.com/image/fetch/$s_!_dy1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F462902ec-9c6d-4d0b-8a4e-e631e2d71718_980x914.png 1272w, https://substackcdn.com/image/fetch/$s_!_dy1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F462902ec-9c6d-4d0b-8a4e-e631e2d71718_980x914.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: <a href="https://www.avalor.io/">Avalor.io</a></figcaption></figure></div><p>The sources supported by different security data fabric solutions form one of the considerations for selection and implementation. The bigger challenge comes from what happens after the data is available. </p><h1>Diagnosing the Identity Crisis</h1><p>The original consumers of data fabrics and Extract-Transform-Load (ETL) products are data engineers and analysts. The trouble with applying these approaches to cybersecurity is that it&#8217;s an insular field with lots of specialized knowledge and not enough data skills. Fivetran can build a big business connecting Salesforce to Snowflake for customer relationship management. Its users have been using previous iterations of the same stack for decades. The cybersecurity equivalents of Fivetran face a customer base that&#8217;s often new to SQL, BI, and data science. </p><p>The result is an identity crisis where data collection products feel compelled to provide &#8220;last mile&#8221; analytics use cases. Dassana, for example, talks about &#8220;Revolutionizing security data ETL&#8221; on <a href="https://dassana.io/why-dassana/">one page</a>, while its solution includes an app for <a href="https://dassana.io/risk-based-vulnerability-management-and-attack-surface-management/">vulnerability management</a> and another for <a href="https://dassana.io/security-kpis-and-resource-planning/">security KPIs</a>. These are great use cases to address, but they beg the question: can one startup solve the thorny issues of &#8220;many to many&#8221; data connectivity while also solving risk-based finding prioritization and scoring the SOC?</p><p>The answer may depend on the customer. Smaller security teams may prefer a security data fabric that includes connectors and prebuilt analytics. Larger security organizations, on the other hand, should strive to get as many integrations as they can off the shelf while developing their people&#8217;s data analytics capabilities. </p><p>Building and maintaining API connectors is a slog that is best to outsource&#8212; and no longer requires SIEM lock-in. But &#8220;one-click to build your security data lake&#8221; still requires you to consider how that data will be put to work for threat detection, risk management, and executive reporting. </p><h1>Putting Security Data Fabric to Work</h1><p>The value security data fabric delivers to an organization depends on the consumer side. Security leaders deploying a fabric or security ETL solution should thoroughly plan in advance for the people, processes, and tooling that will use the data.</p><p>One of the big differences between a security data fabric approach and traditional data tiering is that all the destinations should be usable. Data in the fabric is routed to where it can best be <em>used</em> rather than just stored for future rehydration. This means that the people involved in those use cases need broadly applicable analytics skills. A security data fabric architecture turns proprietary languages into a liability, as they would only be useful for one of the destinations in the fabric. SQL (the S stands for Standard) and Python are increasingly valuable for SOCs because they are supported across a broad range of security products and adjacent tooling, such as Jupyter Notebooks and PowerBI.</p><p>Consumer-side processes should also be considered early in the security data fabric initiative. With data from many sources being analyzed at many destinations, onboarding processes should ensure a consistent mapping to data models with standard schemas. Quality assurance, aging out old data, and iteratively reviewing which analytics platforms are used for each use case are all valuable processes to consider. </p><p>Finally, on the tooling side, security leaders should opt for analytics solutions that plug into the stack without breaking it. Since most security products were not designed to work with a data fabric, this is easier said than done. From threat detection platforms to compliance automation, analytics products have traditionally been built to connect directly to individual sources or the data pipeline. This is convenient for smaller organizations that haven&#8217;t yet rolled out extensive connectors. For larger SOCs, however, the &#8220;inline&#8221; approach conflicts with their existing data flows. Having to ship data out to a third-party analytics solution only to bring it back into various storage and analytics platforms impacts cost, risk, and flexibility. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bE33!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8b36eb2-58db-4227-8a51-48eda61447fc_1440x910.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bE33!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8b36eb2-58db-4227-8a51-48eda61447fc_1440x910.png 424w, https://substackcdn.com/image/fetch/$s_!bE33!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8b36eb2-58db-4227-8a51-48eda61447fc_1440x910.png 848w, https://substackcdn.com/image/fetch/$s_!bE33!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8b36eb2-58db-4227-8a51-48eda61447fc_1440x910.png 1272w, https://substackcdn.com/image/fetch/$s_!bE33!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8b36eb2-58db-4227-8a51-48eda61447fc_1440x910.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bE33!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8b36eb2-58db-4227-8a51-48eda61447fc_1440x910.png" width="1440" height="910" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d8b36eb2-58db-4227-8a51-48eda61447fc_1440x910.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:910,&quot;width&quot;:1440,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:516868,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bE33!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8b36eb2-58db-4227-8a51-48eda61447fc_1440x910.png 424w, https://substackcdn.com/image/fetch/$s_!bE33!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8b36eb2-58db-4227-8a51-48eda61447fc_1440x910.png 848w, https://substackcdn.com/image/fetch/$s_!bE33!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8b36eb2-58db-4227-8a51-48eda61447fc_1440x910.png 1272w, https://substackcdn.com/image/fetch/$s_!bE33!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8b36eb2-58db-4227-8a51-48eda61447fc_1440x910.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cybersecurity solutions are shifting from inline to downstream analytics</figcaption></figure></div><p>The &#8220;downstream&#8221; approach is preferable for enterprise security teams that have invested in their pipelines and want to avoid sensitive data leaving their perimeter. With downstream analytics, a vendor&#8217;s solution can plug into the customer&#8217;s data platforms for analytics. Not all products support this approach due to dependencies on streaming analytics and other design considerations. But products like <a href="https://www.cybersaint.io/">CyberSaint</a> for risk management and <a href="https://www.anvilogic.com/">Anvilogic</a> for SIEM that can work &#8220;downstream&#8221; from the customer&#8217;s data platforms are better aligned with security data fabric success. </p><p>Take these considerations into account when planning your security data fabric initiative. No single tool delivers successful security analytics across many sources connected to many destinations. But a combination of proven platforms and an exciting batch of well-funded innovators is set to unlock dramatic gains for data-driven security organizations.  </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.omeronsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Omer on Security! Subscribe for free to receive new posts for your security data lake journey.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Stop Playing MITRE ATT&CK Bingo]]></title><description><![CDATA[How security leaders get ATT&CK wrong and what you can do about it]]></description><link>https://www.omeronsecurity.com/p/stop-playing-mitre-att-and-ck-bingo</link><guid isPermaLink="false">https://www.omeronsecurity.com/p/stop-playing-mitre-att-and-ck-bingo</guid><dc:creator><![CDATA[Omer Singer]]></dc:creator><pubDate>Thu, 21 Mar 2024 14:30:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!SUdA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf80d289-4303-4a31-95b7-4e6c5716a582_1024x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!SUdA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf80d289-4303-4a31-95b7-4e6c5716a582_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!SUdA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf80d289-4303-4a31-95b7-4e6c5716a582_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!SUdA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf80d289-4303-4a31-95b7-4e6c5716a582_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!SUdA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf80d289-4303-4a31-95b7-4e6c5716a582_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!SUdA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf80d289-4303-4a31-95b7-4e6c5716a582_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!SUdA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf80d289-4303-4a31-95b7-4e6c5716a582_1024x1024.webp" width="477" height="477" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cf80d289-4303-4a31-95b7-4e6c5716a582_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:477,&quot;bytes&quot;:331624,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!SUdA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf80d289-4303-4a31-95b7-4e6c5716a582_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!SUdA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf80d289-4303-4a31-95b7-4e6c5716a582_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!SUdA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf80d289-4303-4a31-95b7-4e6c5716a582_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!SUdA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf80d289-4303-4a31-95b7-4e6c5716a582_1024x1024.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>A common misconception of the MITRE ATT&amp;CK framework is that it&#8217;s a cybersecurity version of Bingo. A game where you score points by covering columns and win by covering the whole board. This approach causes frustration for analysts who find themselves working on noisy alerts triggered by pointless rules. It also leads to wasted budgets and, worst of all, a false sense of security. But is there any other way to measure detection progress? And does ATT&amp;CK still offer value to detection engineers and SOC leaders? </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.omeronsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.omeronsecurity.com/subscribe?"><span>Subscribe now</span></a></p><h1>Mapping Tactics and Techniques</h1><p>By now, most SOC practitioners are familiar with the table shown below. Each column represents a &#8220;Tactic&#8221; within the <a href="https://attack.mitre.org/">MITRE ATT&amp;CK</a> framework. These roughly <a href="https://www.blackberry.com/us/en/solutions/endpoint-security/mitre-attack/mitre-attack-vs-cyber-kill-chain">correspond</a> to <a href="https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html">Cyber Kill Chain</a> stages, each being the threat actor&#8217;s steps towards their objective. The chain metaphor is helpful for defenders in the SOC, whose job is to break the chain and disrupt the attack before it can impact the business. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!15BU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb453794d-3dbb-4780-bb39-e223b5483abd_1240x830.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!15BU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb453794d-3dbb-4780-bb39-e223b5483abd_1240x830.png 424w, https://substackcdn.com/image/fetch/$s_!15BU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb453794d-3dbb-4780-bb39-e223b5483abd_1240x830.png 848w, https://substackcdn.com/image/fetch/$s_!15BU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb453794d-3dbb-4780-bb39-e223b5483abd_1240x830.png 1272w, https://substackcdn.com/image/fetch/$s_!15BU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb453794d-3dbb-4780-bb39-e223b5483abd_1240x830.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!15BU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb453794d-3dbb-4780-bb39-e223b5483abd_1240x830.png" width="1240" height="830" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b453794d-3dbb-4780-bb39-e223b5483abd_1240x830.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:830,&quot;width&quot;:1240,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;ATT&amp;CK Data &amp; Tools | MITRE ATT&amp;CK&#174;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="ATT&amp;CK Data &amp; Tools | MITRE ATT&amp;CK&#174;" title="ATT&amp;CK Data &amp; Tools | MITRE ATT&amp;CK&#174;" srcset="https://substackcdn.com/image/fetch/$s_!15BU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb453794d-3dbb-4780-bb39-e223b5483abd_1240x830.png 424w, https://substackcdn.com/image/fetch/$s_!15BU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb453794d-3dbb-4780-bb39-e223b5483abd_1240x830.png 848w, https://substackcdn.com/image/fetch/$s_!15BU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb453794d-3dbb-4780-bb39-e223b5483abd_1240x830.png 1272w, https://substackcdn.com/image/fetch/$s_!15BU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb453794d-3dbb-4780-bb39-e223b5483abd_1240x830.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">MITRE ATT&amp;CK Navigator (<a href="https://attack.mitre.org/resources/attack-data-and-tools/">Source</a>)</figcaption></figure></div><p>Naturally, security leadership wants to ensure that detections are deployed to spot attacks as early as possible. Each square in the matrix represents a technique attackers use at that stage. For example, an attacker may compromise a VPN service through stolen credentials or exploit a software vulnerability in the service itself. </p><p>The SOC leader may ask to review a heatmap like the above to confirm that detection coverage is in place. They may hear back from their team: &#8220;Good news, we&#8217;re covered for T1078: Valid Accounts.&#8221; In doing so, however, they risk turning a valuable tool into a high-risk Bingo game.</p><h1>Mounting Concerns on ATT&amp;CK Misuse</h1><p>Leading infosec voice Mick Douglas recently <a href="https://twitter.com/bettersafetynet/status/1760887302920814906">suggested</a> calling out cybersecurity products that advertise &#8220;100% MITRE ATT&amp;CK coverage&#8221;: </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ImZz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fb825c1-1fbb-4d9d-8af9-327237b69171_608x423.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ImZz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fb825c1-1fbb-4d9d-8af9-327237b69171_608x423.png 424w, https://substackcdn.com/image/fetch/$s_!ImZz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fb825c1-1fbb-4d9d-8af9-327237b69171_608x423.png 848w, https://substackcdn.com/image/fetch/$s_!ImZz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fb825c1-1fbb-4d9d-8af9-327237b69171_608x423.png 1272w, https://substackcdn.com/image/fetch/$s_!ImZz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fb825c1-1fbb-4d9d-8af9-327237b69171_608x423.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ImZz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fb825c1-1fbb-4d9d-8af9-327237b69171_608x423.png" width="608" height="423" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2fb825c1-1fbb-4d9d-8af9-327237b69171_608x423.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:423,&quot;width&quot;:608,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:81780,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ImZz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fb825c1-1fbb-4d9d-8af9-327237b69171_608x423.png 424w, https://substackcdn.com/image/fetch/$s_!ImZz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fb825c1-1fbb-4d9d-8af9-327237b69171_608x423.png 848w, https://substackcdn.com/image/fetch/$s_!ImZz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fb825c1-1fbb-4d9d-8af9-327237b69171_608x423.png 1272w, https://substackcdn.com/image/fetch/$s_!ImZz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fb825c1-1fbb-4d9d-8af9-327237b69171_608x423.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This is the latest in a growing chorus of concerns about how security teams use the framework. Douglas pointed to alert fatigue as a major issue, while others like Forrester&#8217;s Josh Zelonis have <a href="https://www.forrester.com/blogs/the-mitre-attck-framework-is-not-a-bingo-card/">pointed out</a> the potential false sense of security. Zelonis described how &#8220;techniques such as Process Injection (T1055) have multiple methods of performing them that you would have to exhaustively research and test against.&#8221; In other words, your coverage heatmap might show that you covered a technique, but you would still miss an attacker executing the technique in a different way or on a system different from the &#8220;covering&#8221; detection expected. </p><p>The experts are right to raise the alarm. Marketing departments at leading cybersecurity vendors continue to create the impression that the ATT&amp;CK framework is something you should try to cover. Google for &#8220;mitre attack coverage&#8221; and you&#8217;ll get ads like this one: </p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_OGD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2667f00a-6c53-4e2f-8a98-4857059d0966_633x177.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_OGD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2667f00a-6c53-4e2f-8a98-4857059d0966_633x177.png 424w, https://substackcdn.com/image/fetch/$s_!_OGD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2667f00a-6c53-4e2f-8a98-4857059d0966_633x177.png 848w, https://substackcdn.com/image/fetch/$s_!_OGD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2667f00a-6c53-4e2f-8a98-4857059d0966_633x177.png 1272w, https://substackcdn.com/image/fetch/$s_!_OGD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2667f00a-6c53-4e2f-8a98-4857059d0966_633x177.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_OGD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2667f00a-6c53-4e2f-8a98-4857059d0966_633x177.png" width="633" height="177" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2667f00a-6c53-4e2f-8a98-4857059d0966_633x177.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:177,&quot;width&quot;:633,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:37281,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_OGD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2667f00a-6c53-4e2f-8a98-4857059d0966_633x177.png 424w, https://substackcdn.com/image/fetch/$s_!_OGD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2667f00a-6c53-4e2f-8a98-4857059d0966_633x177.png 848w, https://substackcdn.com/image/fetch/$s_!_OGD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2667f00a-6c53-4e2f-8a98-4857059d0966_633x177.png 1272w, https://substackcdn.com/image/fetch/$s_!_OGD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2667f00a-6c53-4e2f-8a98-4857059d0966_633x177.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>To avoid falling into this trap, switch from using ATT&amp;CK as a goalpost to using it as a foundation for your detection engineering lifecycle. </p><h1>ATT&amp;CK for Threat Modeling</h1><p>Instead of playing ATT&amp;CK matrix bingo, use ATT&amp;CK as a knowledgebase and common language for developing and prioritizing detection requirements. Keep in mind that ATT&amp;CK was intended to represent the ways in which the bad guys operate. As such, it can help in every step along the Detection Responsibility Handshake.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;d30c92a9-68f4-4f8f-853b-8865dab701f6&quot;,&quot;caption&quot;:&quot;Choosing a SIEM solution is a daunting process and most buyers miss an important part of the preparation. The typical SIEM RFP lists sources to collect, and ways to search and report. But that makes a risky assumption that the vendor will be able to turn those sources and features into effective threat detection.&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The Detection Responsibility Handshake&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:27472770,&quot;name&quot;:&quot;Omer Singer&quot;,&quot;bio&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3d36588f-608f-4ff0-a760-85b0ecc26af3_2922x2252.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2023-12-14T16:07:20.967Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a62338d-7e3b-483b-925e-5edea98e4226_1080x1081.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.omeronsecurity.com/p/the-detection-responsibility-handshake&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:139735543,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:1,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Omer on Security&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22cccf84-28fc-4e7f-ad32-34400994e4c5_258x258.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>First, ATT&amp;CK gives us a way to talk about the threats facing the organization. If we&#8217;re worried about becoming the next UnitedHealth Group (<a href="https://www.crn.com/news/security/2024/change-healthcare-breach-unitedhealth-provides-up-to-2b-in-provider-aid-medical-claims-software-coming">$22 million in ransom</a>, government investigation incoming), we might refer to the <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-353a">CISA advisory</a> for the threat actor behind the breach. Five techniques associated with ALPHV Blackcat are laid out in the report:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!tVQf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff06a2f4c-397a-4714-ad8c-5151676f8f88_931x877.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tVQf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff06a2f4c-397a-4714-ad8c-5151676f8f88_931x877.png 424w, https://substackcdn.com/image/fetch/$s_!tVQf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff06a2f4c-397a-4714-ad8c-5151676f8f88_931x877.png 848w, https://substackcdn.com/image/fetch/$s_!tVQf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff06a2f4c-397a-4714-ad8c-5151676f8f88_931x877.png 1272w, https://substackcdn.com/image/fetch/$s_!tVQf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff06a2f4c-397a-4714-ad8c-5151676f8f88_931x877.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tVQf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff06a2f4c-397a-4714-ad8c-5151676f8f88_931x877.png" width="931" height="877" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f06a2f4c-397a-4714-ad8c-5151676f8f88_931x877.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:877,&quot;width&quot;:931,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:152191,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!tVQf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff06a2f4c-397a-4714-ad8c-5151676f8f88_931x877.png 424w, https://substackcdn.com/image/fetch/$s_!tVQf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff06a2f4c-397a-4714-ad8c-5151676f8f88_931x877.png 848w, https://substackcdn.com/image/fetch/$s_!tVQf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff06a2f4c-397a-4714-ad8c-5151676f8f88_931x877.png 1272w, https://substackcdn.com/image/fetch/$s_!tVQf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff06a2f4c-397a-4714-ad8c-5151676f8f88_931x877.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>These are critical components of the initial threat analysis performed in threat modeling. </p><p>Across these techniques, we refer to MITRE ATT&amp;CK for associated data sources and components. Our objective at this stage is to understand the relevant systems and datasets. For example, knowing that the Blackcat group uses Kerberos token generation for domain access, we refer to technique ID <a href="https://attack.mitre.org/techniques/T1558/">T1558</a> and read up on the platforms affected by this technique: Linux, Windows, and macOS. We then apply knowledge of our environment and its vulnerabilities: maybe we&#8217;re a Windows shop, and some of our servers run an older version of the OS, which makes it <a href="https://book.hacktricks.xyz/windows-hardening/stealing-credentials/credentials-protections">easy to steal Kerberos tickets</a>.</p><p>Looking up the threat actor&#8217;s technique on MITRE.org also yields guidance on what logs we need to collect. Notice that in the descriptions below, the idea of &#8220;coverage&#8221; gets very fuzzy. We can log &#8220;Service Ticket Operations&#8221; to the SIEM but only incrementally build detections to spot &#8220;irregular patterns of activity.&#8221; This one aspect of detecting the technique can take numerous detection engineering efforts. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_SHf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f68dea0-7f8e-4142-aa28-26a42cdd6c6c_1324x514.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_SHf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f68dea0-7f8e-4142-aa28-26a42cdd6c6c_1324x514.png 424w, https://substackcdn.com/image/fetch/$s_!_SHf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f68dea0-7f8e-4142-aa28-26a42cdd6c6c_1324x514.png 848w, https://substackcdn.com/image/fetch/$s_!_SHf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f68dea0-7f8e-4142-aa28-26a42cdd6c6c_1324x514.png 1272w, https://substackcdn.com/image/fetch/$s_!_SHf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f68dea0-7f8e-4142-aa28-26a42cdd6c6c_1324x514.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_SHf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f68dea0-7f8e-4142-aa28-26a42cdd6c6c_1324x514.png" width="1324" height="514" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5f68dea0-7f8e-4142-aa28-26a42cdd6c6c_1324x514.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:514,&quot;width&quot;:1324,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:170452,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_SHf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f68dea0-7f8e-4142-aa28-26a42cdd6c6c_1324x514.png 424w, https://substackcdn.com/image/fetch/$s_!_SHf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f68dea0-7f8e-4142-aa28-26a42cdd6c6c_1324x514.png 848w, https://substackcdn.com/image/fetch/$s_!_SHf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f68dea0-7f8e-4142-aa28-26a42cdd6c6c_1324x514.png 1272w, https://substackcdn.com/image/fetch/$s_!_SHf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f68dea0-7f8e-4142-aa28-26a42cdd6c6c_1324x514.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Reviewing the rich details provided by MITRE, CISA, and independent researchers can show us what threat actors like Blackcat would likely try in our environment. Weighing the risk factors for our environment, we can design the detection requirements for the SOC to address. The team can then demonstrate coverage for its prioritized threat scenarios rather than the techniques of the ATT&amp;CK framework.</p><h1>ATT&amp;CK for Building Detections</h1><p>Knowing that ATT&amp;CK coverage is not a goal to pursue doesn&#8217;t mean your detection engineering velocity doesn&#8217;t matter. On the contrary, the numerous ways attackers can operate in your environment should translate to greater urgency. As the SOC implements detections for the prioritized threat scenarios, the ATT&amp;CK framework provides several opportunities to speed up detection engineering. </p><p>The first way to knock out detections faster is to get them from a detection content provider. Attackers reuse techniques across their victims and common targets, from Windows to AWS and Okta. Understanding your threat detection requirements regarding the MITRE technique links you to the relevant content in threat detection libraries like <a href="https://www.anvilogic.com/">Anvilogic</a>&#8217;s Armory. The fastest rule to build is one that someone else has already built.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!pHrR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54f4be4c-e39d-4912-adae-80356067369c_2098x1446.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!pHrR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54f4be4c-e39d-4912-adae-80356067369c_2098x1446.png 424w, https://substackcdn.com/image/fetch/$s_!pHrR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54f4be4c-e39d-4912-adae-80356067369c_2098x1446.png 848w, https://substackcdn.com/image/fetch/$s_!pHrR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54f4be4c-e39d-4912-adae-80356067369c_2098x1446.png 1272w, https://substackcdn.com/image/fetch/$s_!pHrR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54f4be4c-e39d-4912-adae-80356067369c_2098x1446.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!pHrR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54f4be4c-e39d-4912-adae-80356067369c_2098x1446.png" width="1456" height="1004" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/54f4be4c-e39d-4912-adae-80356067369c_2098x1446.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1004,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:394359,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!pHrR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54f4be4c-e39d-4912-adae-80356067369c_2098x1446.png 424w, https://substackcdn.com/image/fetch/$s_!pHrR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54f4be4c-e39d-4912-adae-80356067369c_2098x1446.png 848w, https://substackcdn.com/image/fetch/$s_!pHrR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54f4be4c-e39d-4912-adae-80356067369c_2098x1446.png 1272w, https://substackcdn.com/image/fetch/$s_!pHrR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54f4be4c-e39d-4912-adae-80356067369c_2098x1446.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Finding detection content by MITRE technique</figcaption></figure></div><p>Using ATT&amp;CK as part of detection engineering is also important for efficiency at scale. As your team reuses detection components across tens or hundreds of multi-stage scenario detections in production, they need a systematic way to keep up with new components being created. For example, a detection scenario might look for a malware alert followed by indications of Windows autostart manipulation. This is a great way to spot an attacker that evaded endpoint protection. As your team adds additional rules for spotting this persistence technique, ATT&amp;CK can link the new components to the detection scenarios that use them. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!a54O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdafb90af-331e-4dbd-bd86-fe123b7f79e2_1520x1030.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!a54O!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdafb90af-331e-4dbd-bd86-fe123b7f79e2_1520x1030.png 424w, https://substackcdn.com/image/fetch/$s_!a54O!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdafb90af-331e-4dbd-bd86-fe123b7f79e2_1520x1030.png 848w, https://substackcdn.com/image/fetch/$s_!a54O!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdafb90af-331e-4dbd-bd86-fe123b7f79e2_1520x1030.png 1272w, https://substackcdn.com/image/fetch/$s_!a54O!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdafb90af-331e-4dbd-bd86-fe123b7f79e2_1520x1030.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!a54O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdafb90af-331e-4dbd-bd86-fe123b7f79e2_1520x1030.png" width="1456" height="987" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dafb90af-331e-4dbd-bd86-fe123b7f79e2_1520x1030.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:987,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:176554,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!a54O!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdafb90af-331e-4dbd-bd86-fe123b7f79e2_1520x1030.png 424w, https://substackcdn.com/image/fetch/$s_!a54O!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdafb90af-331e-4dbd-bd86-fe123b7f79e2_1520x1030.png 848w, https://substackcdn.com/image/fetch/$s_!a54O!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdafb90af-331e-4dbd-bd86-fe123b7f79e2_1520x1030.png 1272w, https://substackcdn.com/image/fetch/$s_!a54O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdafb90af-331e-4dbd-bd86-fe123b7f79e2_1520x1030.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Using a MITRE technique to dynamically include detection rules in a scenario</figcaption></figure></div><p>The example above defines a threat scenario where autostart manipulation follows an endpoint attack. There is no end to the ways in which an attacker can abuse autostart features in Windows. That&#8217;s why &#8220;coverage&#8221; for this persistence technique is counter-productive while using it to automatically pull in relevant new rules is helpful. </p><p>Making demonstrable progress toward covering your prioritized threat scenarios is a worthy outcome. MITRE ATT&amp;CK can help with achieving that progress. And if you can&#8217;t cover the board and win the game, maybe that&#8217;s a sign that you&#8217;re doing real SOC work. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.omeronsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Omer on Security! Subscribe receive weekly guidance on your security data lake journey.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Behavior Analytics in Your Security Data Lake Just Got Way Easier]]></title><description><![CDATA[Snowflake's new machine learning functions bring ML to SOCs without data scientists]]></description><link>https://www.omeronsecurity.com/p/behavior-analytics-in-your-security</link><guid isPermaLink="false">https://www.omeronsecurity.com/p/behavior-analytics-in-your-security</guid><dc:creator><![CDATA[Omer Singer]]></dc:creator><pubDate>Thu, 07 Mar 2024 15:11:59 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!PQdS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11f2d57d-ff45-43db-8b5b-9f785a8572b5_1024x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PQdS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11f2d57d-ff45-43db-8b5b-9f785a8572b5_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PQdS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11f2d57d-ff45-43db-8b5b-9f785a8572b5_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!PQdS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11f2d57d-ff45-43db-8b5b-9f785a8572b5_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!PQdS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11f2d57d-ff45-43db-8b5b-9f785a8572b5_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!PQdS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11f2d57d-ff45-43db-8b5b-9f785a8572b5_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PQdS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11f2d57d-ff45-43db-8b5b-9f785a8572b5_1024x1024.webp" width="651" height="651" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/11f2d57d-ff45-43db-8b5b-9f785a8572b5_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:651,&quot;bytes&quot;:354064,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!PQdS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11f2d57d-ff45-43db-8b5b-9f785a8572b5_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!PQdS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11f2d57d-ff45-43db-8b5b-9f785a8572b5_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!PQdS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11f2d57d-ff45-43db-8b5b-9f785a8572b5_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!PQdS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11f2d57d-ff45-43db-8b5b-9f785a8572b5_1024x1024.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I&#8217;m no data scientist, but I know machine learning can be a SOC&#8217;s best friend. In a previous role, my security engineering team had to convince our management (and ourselves) that we would get alerted if the <a href="https://www.cnn.com/2019/07/29/business/capital-one-data-breach/index.html">Capital One hacker</a> tried the same attack with us. Machine learning for behavior analytics gave us a way to detect a compromised AWS account trying to steal documents from our cloud. And now, prebuilt machine learning functions in Snowflake cut the effort involved from weeks to hours. And you don&#8217;t need to be a data scientist to use them.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.omeronsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.omeronsecurity.com/subscribe?"><span>Subscribe now</span></a></p><h1>Could Capital One Have Detected the 2019 Breach? </h1><p>The hacker &#8220;erratic&#8221; behind one of the largest breaches of all time was not stealthy. She bragged about copying over 30 GB of documents out of <a href="https://medium.com/nerd-for-tech/capital-one-data-breach-2019-f85a259eaa60">700 cloud storage buckets</a>. Despite all that activity, the breach stayed undetected from March to July. When we read the breach reports, my team knew we needed detection time that would not be measured in months.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NtLH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bc9d319-8bd8-496c-b5c2-783727a1810b_1414x996.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NtLH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bc9d319-8bd8-496c-b5c2-783727a1810b_1414x996.png 424w, https://substackcdn.com/image/fetch/$s_!NtLH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bc9d319-8bd8-496c-b5c2-783727a1810b_1414x996.png 848w, https://substackcdn.com/image/fetch/$s_!NtLH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bc9d319-8bd8-496c-b5c2-783727a1810b_1414x996.png 1272w, https://substackcdn.com/image/fetch/$s_!NtLH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bc9d319-8bd8-496c-b5c2-783727a1810b_1414x996.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NtLH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bc9d319-8bd8-496c-b5c2-783727a1810b_1414x996.png" width="591" height="416.2913719943423" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9bc9d319-8bd8-496c-b5c2-783727a1810b_1414x996.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:996,&quot;width&quot;:1414,&quot;resizeWidth&quot;:591,&quot;bytes&quot;:212655,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NtLH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bc9d319-8bd8-496c-b5c2-783727a1810b_1414x996.png 424w, https://substackcdn.com/image/fetch/$s_!NtLH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bc9d319-8bd8-496c-b5c2-783727a1810b_1414x996.png 848w, https://substackcdn.com/image/fetch/$s_!NtLH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bc9d319-8bd8-496c-b5c2-783727a1810b_1414x996.png 1272w, https://substackcdn.com/image/fetch/$s_!NtLH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bc9d319-8bd8-496c-b5c2-783727a1810b_1414x996.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">The breach involved thousands of documents copied from AWS S3 (<a href="https://www.researchgate.net/figure/Running-Example-an-illustration-of-the-Capital-One-Data-Breach_fig1_342140502">Source</a>)</figcaption></figure></div><p>Could behavior analytics help detect this kind of cloud breach? We considered how a compromised account would act differently from how it typically behaved. This is where ML can play a role by learning what is normal for users, like how many documents they download in an hour. Then, a detection rule could compare recent activity to this baseline and flag suspicious behavior. Since &#8220;erratic&#8221; copied out tens of thousands of documents, she would likely have tripped this alarm early in the exfiltration phase.</p><h1>Baselining Your Cloud with ML Functions</h1><p>My team spent a long time building the machine learning code for our UEBA baselining project. We needed a data scientist with skills in R and Jupyter to plug into the data lake and move data back and forth. Luckily for security operations teams everywhere, Snowflake now provides fully automated built-in machine learning functions as a shortcut to UEBA.</p><p>Snowflake is a cloud data platform with cheap storage and a compute engine that scales up and down to run fast detections and investigations. That&#8217;s made it a popular option for security teams looking to augment their SIEM. Like everything in Snowflake, the new machine learning functions are delivered as a fully managed service. Snowflake&#8217;s <a href="https://docs.snowflake.com/en/sql-reference/classes/anomaly_detection">Anomaly Detection</a> function is described as follows:</p><blockquote><p>Anomaly detection allows you to detect outliers in your time series data by using a machine learning algorithm. You use CREATE SNOWFLAKE.ML.ANOMALY_DETECTION to create and train the detection model, and then use the &lt;name&gt;!DETECT_ANOMALIES method to detect anomalies.</p></blockquote><p>Helpful examples are given in the official docs <a href="https://docs.snowflake.com/en/sql-reference/classes/anomaly_detection">here</a> and in blog posts like <a href="https://medium.com/@kenny.nagano/no-data-science-team-no-problem-f0d16353015d">No Data Science Team? No Problem</a> which aren&#8217;t just a good starting point- they&#8217;re evidence that data science is getting democratized. This is all great news for the SOC.</p><p>You'll need relevant log data to train the anomaly detection service in your Snowflake account. AWS can generate CloudTrail logs for S3 file downloads, but these &#8220;GetObject&#8221; events get so chatty in production that many security teams haven&#8217;t been able to collect them. This is where the cheap and limitless storage of the data lake comes in. As I showed in a previous post, Snowflake is so cost-effective for security data that you can afford to bring in datasets that would otherwise never get collected- and now you can use that data for behavior analytics.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;d0fce62d-ca36-45c0-9f20-30c3be2ede4d&quot;,&quot;caption&quot;:&quot;How does Snowflake perform against the 8 SIEM cost factors outlined in last week&#8217;s post? For a data lake solution to be worth operationalizing, it must be dramatically more cost-effective and scalable than all-in-one SIEM alternatives. Snowflake has increasingly&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Defrosting Snowflake SIEM Cost Factors&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:27472770,&quot;name&quot;:&quot;Omer Singer&quot;,&quot;bio&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3d36588f-608f-4ff0-a760-85b0ecc26af3_2922x2252.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-02-01T15:46:52.198Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec6030df-cc29-4ca5-b0c3-65d987975a54_1792x1024.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.omeronsecurity.com/p/defrosting-snowflake-siem-cost-factors&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:140982021,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Omer on Security&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22cccf84-28fc-4e7f-ad32-34400994e4c5_258x258.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>The result of baselining file downloads for your AWS users is a trained model representing what is normal for each one. You can also extend the ML function to baseline users together with additional fields, such as the user&#8217;s department. In this way, your model learns not just from activities but also from tags that represent the user&#8217;s context. </p><p>No installation, maintenance, or tuning is required to run the model training function. The same goes for the function that compares new data to the existing model. It&#8217;s just a simple command of DETECT_ANOMALIES to get back a result like this for each user: </p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HNCl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30260b47-5e95-4a2c-a0bd-850653ade8e7_1520x234.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HNCl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30260b47-5e95-4a2c-a0bd-850653ade8e7_1520x234.png 424w, https://substackcdn.com/image/fetch/$s_!HNCl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30260b47-5e95-4a2c-a0bd-850653ade8e7_1520x234.png 848w, https://substackcdn.com/image/fetch/$s_!HNCl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30260b47-5e95-4a2c-a0bd-850653ade8e7_1520x234.png 1272w, https://substackcdn.com/image/fetch/$s_!HNCl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30260b47-5e95-4a2c-a0bd-850653ade8e7_1520x234.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HNCl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30260b47-5e95-4a2c-a0bd-850653ade8e7_1520x234.png" width="1456" height="224" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/30260b47-5e95-4a2c-a0bd-850653ade8e7_1520x234.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:224,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:38040,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HNCl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30260b47-5e95-4a2c-a0bd-850653ade8e7_1520x234.png 424w, https://substackcdn.com/image/fetch/$s_!HNCl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30260b47-5e95-4a2c-a0bd-850653ade8e7_1520x234.png 848w, https://substackcdn.com/image/fetch/$s_!HNCl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30260b47-5e95-4a2c-a0bd-850653ade8e7_1520x234.png 1272w, https://substackcdn.com/image/fetch/$s_!HNCl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30260b47-5e95-4a2c-a0bd-850653ade8e7_1520x234.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>This example shows user123 downloaded 150 files from the organization&#8217;s S3 buckets in the last hour. The ML model had forecast 50 downloads for this user and set 70 as an upper bound for what should be considered an anomaly. The bounds of the &#8220;normal&#8221; range are determined automatically by the model during training and may be recalculated when you retrain the model. Since user123 is way out of the normal range, the function returns TRUE. This is Snowflake saying that the user is acting very fishy.</p><h1>From Anomaly to Threat Detection</h1><p>To complete our UEBA project, my team needed a way to pull our homegrown anomaly detection model into our detection engineering process. At the time, this involved our wonky but lovable scripts and container clusters galore. This is still the way many enterprise SOCs use data lakes today. But Snowflake and its cybersecurity ecosystem have made progress that changes the game.</p><p>One option mentioned in the documentation linked above is the new Snowflake Alerts service. You can use it as a fully managed way to run the DETECT_ANOMALIES command on a schedule and receive an email containing the results. This has the advantage of not requiring an external solution but doesn&#8217;t provide a framework for developing and managing detections. </p><p>Another option is to use a SIEM solution that can serve as a security wrapper for Snowflake. I joined <a href="https://www.anvilogic.com/">Anvilogic</a> because security teams at big companies were choosing it as their way to turn Snowflake into a security data lake. Now, with its anomaly detection functions, Snowflake gives security teams more than just cost savings and performance at scale. Any threat scenario you create in Anvilogic can call the DETECT_ANOMALIES function as part of its detection logic. The function&#8217;s output can trigger an alert or serve as one indicator in a sequence of events for the SOC. Anomaly detection built into the data lake gives security teams without data science expertise an easy shortcut to ML-powered threat detection.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.omeronsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Omer on Security! Subscribe to receive weekly guidance for your security data lake journey.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Want Better Cloud Security? Make Your Detections Multi-Dimensional]]></title><description><![CDATA[How detection engineers are using data from other sources to secure their clouds]]></description><link>https://www.omeronsecurity.com/p/want-better-cloud-security-make-your</link><guid isPermaLink="false">https://www.omeronsecurity.com/p/want-better-cloud-security-make-your</guid><dc:creator><![CDATA[Omer Singer]]></dc:creator><pubDate>Thu, 29 Feb 2024 14:43:25 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!HFB_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3cb43e72-9b81-4870-9370-8175704d30ee_1024x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HFB_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3cb43e72-9b81-4870-9370-8175704d30ee_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HFB_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3cb43e72-9b81-4870-9370-8175704d30ee_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!HFB_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3cb43e72-9b81-4870-9370-8175704d30ee_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!HFB_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3cb43e72-9b81-4870-9370-8175704d30ee_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!HFB_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3cb43e72-9b81-4870-9370-8175704d30ee_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HFB_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3cb43e72-9b81-4870-9370-8175704d30ee_1024x1024.webp" width="449" height="449" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3cb43e72-9b81-4870-9370-8175704d30ee_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:449,&quot;bytes&quot;:558186,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HFB_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3cb43e72-9b81-4870-9370-8175704d30ee_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!HFB_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3cb43e72-9b81-4870-9370-8175704d30ee_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!HFB_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3cb43e72-9b81-4870-9370-8175704d30ee_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!HFB_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3cb43e72-9b81-4870-9370-8175704d30ee_1024x1024.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>It took decades for the security community to get the upper hand against attacks on endpoints, and cloud environments pose an even bigger detection challenge. Where endpoint attacks often involve malware to package attacker capabilities, cloud attacks succeed through seemingly legitimate requests to the cloud provider. In the hustle and bustle of an enterprise cloud environment, atomic (one-dimensional) detections face a harsh tradeoff between low accuracy and overwhelming noise. Correlating between cloud and non-cloud activity can provide fidelity for effective detection coverage.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.omeronsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.omeronsecurity.com/subscribe?"><span>Subscribe now</span></a></p><h1>Most Cloud Detections Don&#8217;t Work</h1><p>A <a href="https://www.invictus-ir.com/news/automated-first-response-in-aws-using-sigma-and-athena">recent study</a> of cloud threat detection by Invictus IR should be a wake-up call for any SOC with a cloud footprint to secure. The researchers ran 32 well-known attack techniques in AWS, each leaving traces in the CloudTrail logs. Despite having access to evidence of the attack, the researchers found that &#8220;GuardDuty only triggered for just <strong>three</strong> of the simulated attacks, which is very limited. Especially because these attacks are all well-known.&#8221;</p><p>The built-in AWS threat detections were a no-show. Sigma, the leading open-source project for threat detection rules, also failed the test, with barely a third of attacks being detected. You can see how few of the well-known attack techniques were identified in the table below.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!p3CH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1137d33-eb16-45c4-b988-03d84db8598f_1139x598.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!p3CH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1137d33-eb16-45c4-b988-03d84db8598f_1139x598.png 424w, https://substackcdn.com/image/fetch/$s_!p3CH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1137d33-eb16-45c4-b988-03d84db8598f_1139x598.png 848w, https://substackcdn.com/image/fetch/$s_!p3CH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1137d33-eb16-45c4-b988-03d84db8598f_1139x598.png 1272w, https://substackcdn.com/image/fetch/$s_!p3CH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1137d33-eb16-45c4-b988-03d84db8598f_1139x598.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!p3CH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1137d33-eb16-45c4-b988-03d84db8598f_1139x598.png" width="1139" height="598" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c1137d33-eb16-45c4-b988-03d84db8598f_1139x598.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:598,&quot;width&quot;:1139,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!p3CH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1137d33-eb16-45c4-b988-03d84db8598f_1139x598.png 424w, https://substackcdn.com/image/fetch/$s_!p3CH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1137d33-eb16-45c4-b988-03d84db8598f_1139x598.png 848w, https://substackcdn.com/image/fetch/$s_!p3CH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1137d33-eb16-45c4-b988-03d84db8598f_1139x598.png 1272w, https://substackcdn.com/image/fetch/$s_!p3CH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1137d33-eb16-45c4-b988-03d84db8598f_1139x598.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Two-thirds of common cloud attacks were undetected in the study (<a href="https://www.invictus-ir.com/news/automated-first-response-in-aws-using-sigma-and-athena">Source</a>)</figcaption></figure></div><p>But wait! The results reflect only the disturbing proportion of false negative results (93% and 66% respectively). In a real deployment where detections feed a SOC&#8217;s alert backlog, detection rules must also demonstrate a low level of <em>false positive</em> results. Would the Sigma rules triggered in the study fire excessively in the real world? </p><p>On review, I believe many of the study&#8217;s successful detections would not have been enabled in a production environment. For example, <a href="https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_iam_backdoor_users_keys/">IAM Backdoor Users Keys</a> accounted for three of the eleven hits in the lab. This detection rule is designed to identify when an AWS API key is created for one user by another, which could indicate a backdoor being set up for persistent access to the AWS environment. The logic filters out cases where users create keys for their own account, aiming to reduce false positives. However, there are many legitimate cases in a real environment that meet this criteria- including developers and admins going about their daily duties.</p><p>Two successful detections were attributed to the rule <a href="https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_sts_assumerole_misuse/">AWS STS Assumerole Misuse</a>, but the name is misleading. The rule triggers on the use of AssumeRole by an entity with the AssumedRole identity type, where the session issuer is also a role. The documentation warns that this activity is not necessarily misuse:</p><blockquote><p><strong>falsepositives</strong>:</p><p>AssumeRole may be done by a system or network administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.</p><p>AssumeRole from unfamiliar users or hosts should be investigated. If known behavior is causing false positives, it can be exempted from the rule.</p></blockquote><p>That sounds like a lot of work for the triage team. So much extra work that they&#8217;d probably shut the rule off entirely. How can a detection engineer reduce the noisiness so that rules stay enabled and ready to detect cloud attacks? And what about spotting attack techniques that seem to blend in with the normal activity of the cloud environment? </p><h1>Bringing in Another Dimension</h1><p>Like a detective collecting evidence, cloud threat detection should include more than one log source. An attack that is easy to miss when looked at only from the cloud perspective can become obvious when looking across cloud, endpoint, identity, and other types of activity. This turns the cloud&#8217;s unique properties (API-driven, all activity associated with a user) to the defender&#8217;s advantage. </p><p>Detection engineers can still start with basic detections like those from the study above. To improve their fidelity so that they become useful in a real-world environment, the rules can be expanded to account for the involved users, assets, and networks. Weak signals that would otherwise be ignored can amplify the detection such that when it alerts- the SOC does take notice. </p><p>Design decisions and tooling selection determine how easy it will be to create these high-fidelity detections. Because logs from different sources may arrive at different times, a log repository that depends on combining or enriching data at load time may struggle to support multi-dimensional detections. Data platforms that are good at join operations, on the other hand, make it easy to combine signals from different sources at query time. This is an area where the <a href="https://www.omeronsecurity.com/p/the-splunk-effect">Splunk Effect</a> pushes analysts to search for standalone indicators, while SQL-based analytics encourage analysts to combine dimensions like Lego blocks. </p><h1>Getting Started</h1><p>Building multi-dimensional detections is not rocket science. SOC analysts can start with threat modeling as described in <a href="https://www.omeronsecurity.com/p/the-detection-responsibility-handshake">The Detection Responsibility Handshake</a> and consider the different areas where an attack would likely leave traces. Combining these areas into one detection can achieve the fidelity required for use in prod.</p><p>Once you have in mind the two or more activity types you want to combine, you&#8217;ll need to determine the field that they have in common. This is known as the join or pivot field. For example, to combine cloud and endpoint activity, you may join on the email address associated with the cloud user and the endpoint agent. Sometimes, this field is present in each of the logs, and sometimes, a lookup table is required. That table would be kept up to date with a mapping of computer names to email addresses, for example, based on data pulled from a CMDB.</p><p>The following three screenshots demonstrate a multi-dimensional detection implemented in SQL. This detection is designed to catch an attacker in the recon stage, early in the kill chain. A detection engineer may start by looking at AWS CloudTrail, where a bunch of enumeration events have taken place:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XgeB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23d74221-246d-400c-bbfe-bd8f69e55368_1408x1068.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XgeB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23d74221-246d-400c-bbfe-bd8f69e55368_1408x1068.png 424w, https://substackcdn.com/image/fetch/$s_!XgeB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23d74221-246d-400c-bbfe-bd8f69e55368_1408x1068.png 848w, https://substackcdn.com/image/fetch/$s_!XgeB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23d74221-246d-400c-bbfe-bd8f69e55368_1408x1068.png 1272w, https://substackcdn.com/image/fetch/$s_!XgeB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23d74221-246d-400c-bbfe-bd8f69e55368_1408x1068.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XgeB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23d74221-246d-400c-bbfe-bd8f69e55368_1408x1068.png" width="1408" height="1068" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/23d74221-246d-400c-bbfe-bd8f69e55368_1408x1068.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1068,&quot;width&quot;:1408,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:136312,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!XgeB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23d74221-246d-400c-bbfe-bd8f69e55368_1408x1068.png 424w, https://substackcdn.com/image/fetch/$s_!XgeB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23d74221-246d-400c-bbfe-bd8f69e55368_1408x1068.png 848w, https://substackcdn.com/image/fetch/$s_!XgeB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23d74221-246d-400c-bbfe-bd8f69e55368_1408x1068.png 1272w, https://substackcdn.com/image/fetch/$s_!XgeB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23d74221-246d-400c-bbfe-bd8f69e55368_1408x1068.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cloud recon detection logic</figcaption></figure></div><p>However, this logic on its own would be too noisy in production. Many legitimate use cases and tools run &#8220;describe&#8221; and &#8220;list&#8221; commands across AWS resources. Rather than giving up on detecting reconnaissance in the cloud, the detection engineer can add another dimension based on their threat modeling. They might reason that an attacker who compromises a cloud admin&#8217;s laptop would do a few things once they&#8217;ve established a foothold. </p><p>One of the attacker&#8217;s moves would be to enumerate the cloud resources that the compromised admin can access. Another would be to scan the local network to identify vulnerable hosts that would be more persistent and reliable than a laptop, such as local file servers or network devices. These scans could be identified by looking at network connections recorded by the EDR agent.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IJFa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F014bcba9-3d49-417a-872a-ce9ee88da3a1_1438x1396.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IJFa!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F014bcba9-3d49-417a-872a-ce9ee88da3a1_1438x1396.png 424w, https://substackcdn.com/image/fetch/$s_!IJFa!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F014bcba9-3d49-417a-872a-ce9ee88da3a1_1438x1396.png 848w, https://substackcdn.com/image/fetch/$s_!IJFa!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F014bcba9-3d49-417a-872a-ce9ee88da3a1_1438x1396.png 1272w, https://substackcdn.com/image/fetch/$s_!IJFa!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F014bcba9-3d49-417a-872a-ce9ee88da3a1_1438x1396.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IJFa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F014bcba9-3d49-417a-872a-ce9ee88da3a1_1438x1396.png" width="1438" height="1396" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/014bcba9-3d49-417a-872a-ce9ee88da3a1_1438x1396.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1396,&quot;width&quot;:1438,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:216720,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!IJFa!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F014bcba9-3d49-417a-872a-ce9ee88da3a1_1438x1396.png 424w, https://substackcdn.com/image/fetch/$s_!IJFa!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F014bcba9-3d49-417a-872a-ce9ee88da3a1_1438x1396.png 848w, https://substackcdn.com/image/fetch/$s_!IJFa!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F014bcba9-3d49-417a-872a-ce9ee88da3a1_1438x1396.png 1272w, https://substackcdn.com/image/fetch/$s_!IJFa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F014bcba9-3d49-417a-872a-ce9ee88da3a1_1438x1396.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Local network recon detection logic</figcaption></figure></div><p>A user performing both scans around the same time is much less likely to happen during normal operations. To combine the two signals into one high-fidelity alert, the detection engineer would join the two logic blocks above into one query that can run against the aggregated datasets. In this example, a helper function resolves the user&#8217;s identity based on their hostname or cloud resource identifier. The function referenced below would reference the lookup table described above, where CMDB data is regularly pulled in to map hosts to users or cloud user accounts to email addresses. </p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3-sF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5a44a2c-374a-49f0-8f4f-a03631dd1e24_1516x334.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3-sF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5a44a2c-374a-49f0-8f4f-a03631dd1e24_1516x334.png 424w, https://substackcdn.com/image/fetch/$s_!3-sF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5a44a2c-374a-49f0-8f4f-a03631dd1e24_1516x334.png 848w, https://substackcdn.com/image/fetch/$s_!3-sF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5a44a2c-374a-49f0-8f4f-a03631dd1e24_1516x334.png 1272w, https://substackcdn.com/image/fetch/$s_!3-sF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5a44a2c-374a-49f0-8f4f-a03631dd1e24_1516x334.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3-sF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5a44a2c-374a-49f0-8f4f-a03631dd1e24_1516x334.png" width="1456" height="321" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b5a44a2c-374a-49f0-8f4f-a03631dd1e24_1516x334.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:321,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:51047,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3-sF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5a44a2c-374a-49f0-8f4f-a03631dd1e24_1516x334.png 424w, https://substackcdn.com/image/fetch/$s_!3-sF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5a44a2c-374a-49f0-8f4f-a03631dd1e24_1516x334.png 848w, https://substackcdn.com/image/fetch/$s_!3-sF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5a44a2c-374a-49f0-8f4f-a03631dd1e24_1516x334.png 1272w, https://substackcdn.com/image/fetch/$s_!3-sF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5a44a2c-374a-49f0-8f4f-a03631dd1e24_1516x334.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Joining the two dimensions based on the user&#8217;s identity</figcaption></figure></div><p>The query above combines the two previous queries into multi-dimensional detection logic. A platform like <a href="https://anvilogic.com/">Anvilogic</a> that supports SQL JOIN operations could be used to operationalize these rules by automatically adding the necessary time windows, scheduled execution, and version control.</p><h1>More Examples</h1><p>Many cloud detections look for actions that are easy for attackers to bypass, such as root user activity in production, or logging being disabled. Multi-dimensional detections can help with more realistic attack techniques, such as stolen credentials used to tamper with a cloud environment. What might that look like? </p><p>An attacker that steals a user&#8217;s access token from a public code repository could limit their actions to blend in with the cloud environment, but they would need to use it from their own systems. A multi-dimensional detection could check for activity in the cloud control plane that doesn&#8217;t align with the corresponding activity on the user&#8217;s endpoint. The lack of network activity for a user supposedly interacting with the AWS console, for example, could be a dead giveaway. </p><p>A similar approach could amplify weak signals from a security agent on the endpoint. If a laptop or server triggers some low-severity endpoint detections, the SOC would likely not be notified. A <a href="https://www.microsoft.com/en-us/security/blog/2023/12/05/microsoft-incident-response-lessons-on-preventing-cloud-identity-compromise/">report</a> from Microsoft&#8217;s IR team describes how threat actors often deploy malware as a stepping stone toward more sensitive environments:</p><blockquote><p>Tokens can also be stolen from endpoint devices themselves via credential-stealing malware. Microsoft IR has been engaged with organizations where credential-stealing malware was installed on an administrator&#8217;s endpoint device via an initial phishing email. While the admin used separate accounts for their day-to-day and administrative work, the Global Administrator had signed into both accounts from the same device. The malware had the capability to extract all the credentials and tokens on the device, eventually leading to tenant-level compromise.</p><p>Tokens on endpoints are typically stored as cookies, and theft can occur in several ways. Commodity malware such as Emotet, Redline, IcedID, and others have the capability to steal both credentials and tokens. Pirated or cracked software often has token and cookie stealing malware embedded within it as well.</p></blockquote><p>Weak signals around malware activity or pirated software could serve as one detection dimension. When they happen in conjunction with cloud account role assumptions or privilege escalations for the host or associated users, a high-severity alert could be triggered for the SOC to investigate.</p><p>By all accounts, threat actors have become much more comfortable targeting cloud infrastructure. It&#8217;s now on security operations teams to keep up on the detection side. But as we saw in the Invictus report, relying on alerts from the cloud service provider is risky, and community-based content for cloud detection remains basic and noisy. Effective cloud threat detection takes a more advanced approach&#8212;with multi-dimensional threat detection providing an opportunity for defenders to gain the upper hand against attackers in the cloud.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.omeronsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Omer on Security! Subscribe for free to receive weekly guidance on your security data lake journey.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The Splunk Effect]]></title><description><![CDATA[How a generation of security analysts missed out on the data revolution]]></description><link>https://www.omeronsecurity.com/p/the-splunk-effect</link><guid isPermaLink="false">https://www.omeronsecurity.com/p/the-splunk-effect</guid><dc:creator><![CDATA[Omer Singer]]></dc:creator><pubDate>Thu, 15 Feb 2024 17:06:31 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ZB-C!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d1ade45-11c9-4a1e-8e8c-1979f8e8f059_1024x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZB-C!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d1ade45-11c9-4a1e-8e8c-1979f8e8f059_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZB-C!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d1ade45-11c9-4a1e-8e8c-1979f8e8f059_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!ZB-C!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d1ade45-11c9-4a1e-8e8c-1979f8e8f059_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!ZB-C!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d1ade45-11c9-4a1e-8e8c-1979f8e8f059_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!ZB-C!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d1ade45-11c9-4a1e-8e8c-1979f8e8f059_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZB-C!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d1ade45-11c9-4a1e-8e8c-1979f8e8f059_1024x1024.webp" width="556" height="556" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6d1ade45-11c9-4a1e-8e8c-1979f8e8f059_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:556,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Create an image of a serious man whose eyes are covered by a lady's hands. On the lady's fingers, where they cover the man's eyes, draw eyes on top, giving the illusion that the man is seeing through the eyes drawn on the lady's fingers. The setting is artistic and thought-provoking, capturing a moment of deep connection and intrigue between the two. The man's expression is serious and contemplative, while the hands covering his eyes add an element of mystery and creativity to the scene.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Create an image of a serious man whose eyes are covered by a lady's hands. On the lady's fingers, where they cover the man's eyes, draw eyes on top, giving the illusion that the man is seeing through the eyes drawn on the lady's fingers. The setting is artistic and thought-provoking, capturing a moment of deep connection and intrigue between the two. The man's expression is serious and contemplative, while the hands covering his eyes add an element of mystery and creativity to the scene." title="Create an image of a serious man whose eyes are covered by a lady's hands. On the lady's fingers, where they cover the man's eyes, draw eyes on top, giving the illusion that the man is seeing through the eyes drawn on the lady's fingers. The setting is artistic and thought-provoking, capturing a moment of deep connection and intrigue between the two. The man's expression is serious and contemplative, while the hands covering his eyes add an element of mystery and creativity to the scene." srcset="https://substackcdn.com/image/fetch/$s_!ZB-C!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d1ade45-11c9-4a1e-8e8c-1979f8e8f059_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!ZB-C!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d1ade45-11c9-4a1e-8e8c-1979f8e8f059_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!ZB-C!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d1ade45-11c9-4a1e-8e8c-1979f8e8f059_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!ZB-C!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d1ade45-11c9-4a1e-8e8c-1979f8e8f059_1024x1024.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The data revolution has transformed every facet of modern enterprises, unleashing productivity and insights across each department with one notable exception. In cybersecurity, a generation of analysts finds itself years behind its peers, tethered to an approach that is powerless to tap into the biggest thing in tech since the World Wide Web. Much of the blame for this predicament falls on Splunk&#8212;the pervasive platform that inadvertently shaped security operations into a silo of search-driven rather than analysis-driven methodologies. Understanding how we got here can help  us rejoin the rest of the enterprise and hopefully not miss out on the promise of data and AI.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.omeronsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.omeronsecurity.com/subscribe?"><span>Subscribe now</span></a></p><h1>Like Google for Your Logs</h1><p>In 2006, ComputerWorld published an article titled &#8220;<a href="https://www.computerworld.com/article/2546902/splunk-inc--s-splunk-data-center-search-party.html">Splunk Inc.'s Splunk Data Center Search Party</a>&#8221; that described the hit new product&#8217;s key to success.</p><blockquote><p>Splunk's sweet spot is knowledgeable IT experts who have a good idea of what they are looking for but are having difficulty finding it in the haystack of error logs and application dumps from a myriad of different servers. </p><p>Like Google, it automatically indexes everything, but its true power is unleashed when an experienced searcher is looking for something specific.</p></blockquote><p>With Splunk, a network admin troubleshooting a connectivity issue could search the index for firewall error codes associated with dropped packets. Searches would often be successful because the relevant error codes were well-known. IT professionals fell in love with a product that could quickly tell them where to find the needle in the haystack and fix the outage.</p><h1>The Effect on Security Operations</h1><p>While Splunk started as an observability solution, security teams also began adopting it. Then-dominant SIEM products like ArcSight had been designed to run on powerful but rigid databases like Oracle. The downside of this approach was that the solutions were cumbersome and required lots of upfront work to prepare the data. Splunk&#8217;s flexibility and the fact that it already contained relevant log data at many enterprises led security teams to pull Splunk onto their toolbench. </p><p>Splunk responded to this demand by launching Enterprise Security with rule sets and dashboards designed for SOC use cases. Cybersecurity eventually came to account for over half of Splunk&#8217;s sales, while the product itself came to define the SIEM category. But the platform remained a &#8220;Google for Logs&#8221; at heart.</p><p>As a result, security operations methodologies became shaped around Splunk&#8217;s product capabilities. Many SOC practitioners today view these as equivalent: </p><ul><li><p><strong>Search == Analytics</strong>: Splunk's design as a log search engine has led analysts to prioritize search queries over deeper data analytics. This focus on looking up data has constrained the development of analytical competencies among security professionals.</p></li><li><p><strong>Logs == Data</strong>: The emphasis on logs as the primary source of security insights has narrowed analysts' perspectives. Detection logic often fails to see data as a rich, multifaceted resource that extends beyond event logs to user context, asset properties, trends, and baselines.</p></li><li><p><strong>Enrichment == Contextualization</strong>: Index-based search engines deal with enrichment on load much better than they do joining datasets at query time. This has fostered a preference for adding superficial and often outdated properties (enrichment) rather than integrating and understanding security events' broader and up-to-date context (contextualization).</p></li><li><p><strong>Leaderboards == Metrics</strong>: The search platform's orientation towards displaying data in leaderboards (&#8220;Top 10 Attacker IP Addresses&#8221;) overshadowed meaningful metrics aligned with security operations' strategic goals. In other fields, metrics are often calculated periodically and recorded in dedicated tables- a kind of batch  processing for which data warehouses are well suited.</p></li><li><p><strong>UEBA == Data Science</strong>: Dedicated User and Entity Behavior Analytics (UEBA) features introduced basic behavioral analytics to many security operations. However, this has often come at the expense of adopting more comprehensive data science methodologies that could offer deeper insights and predictive capabilities tailored to the organization.</p></li></ul><p>The root of the problem is that cybersecurity is fundamentally not a search problem. Some approaches to threat detection do involve looking for known string values, such as for a user agent string in the crypto miner alert shown below. </p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!WIvc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f16c755-2ac4-446e-b1f6-f729219bcbf1_700x207.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!WIvc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f16c755-2ac4-446e-b1f6-f729219bcbf1_700x207.png 424w, https://substackcdn.com/image/fetch/$s_!WIvc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f16c755-2ac4-446e-b1f6-f729219bcbf1_700x207.png 848w, https://substackcdn.com/image/fetch/$s_!WIvc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f16c755-2ac4-446e-b1f6-f729219bcbf1_700x207.png 1272w, https://substackcdn.com/image/fetch/$s_!WIvc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f16c755-2ac4-446e-b1f6-f729219bcbf1_700x207.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!WIvc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f16c755-2ac4-446e-b1f6-f729219bcbf1_700x207.png" width="700" height="207" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1f16c755-2ac4-446e-b1f6-f729219bcbf1_700x207.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:207,&quot;width&quot;:700,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!WIvc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f16c755-2ac4-446e-b1f6-f729219bcbf1_700x207.png 424w, https://substackcdn.com/image/fetch/$s_!WIvc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f16c755-2ac4-446e-b1f6-f729219bcbf1_700x207.png 848w, https://substackcdn.com/image/fetch/$s_!WIvc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f16c755-2ac4-446e-b1f6-f729219bcbf1_700x207.png 1272w, https://substackcdn.com/image/fetch/$s_!WIvc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f16c755-2ac4-446e-b1f6-f729219bcbf1_700x207.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Example of a typical Splunk alert (<a href="https://medium.com/@vitbukac/practical-splunk-detection-rules-how-to-part-1-crawl-a24bc39a4b9d">source</a>)</figcaption></figure></div><p>This approach, however, is brittle in that an attacker can easily modify their user agent string and bypass the rule. Rules that search for event names associated with an attack, such as bucket enumeration, are prohibitively noisy in an enterprise environment. Cybersecurity is adversarial; anything the defender can easily search for is the first thing the attacker would change. It's very different from troubleshooting a network connection issue!</p><p>The ineffectiveness of applied search methodologies was described in David Bianco&#8217;s <a href="https://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html">The Pyramid of Pain</a> in 2013. He observed that while the good guys were winning some battles against cybercriminals, &#8220;seeing how these indicators were being applied&#8230;<strong>almost no one is using them effectively</strong>.&#8221; Security analysts took hashes and IP addresses from threat reports and googled them in their logs. Avoiding these detections was a piece of cake for the bad guys.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!g6Xa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818ae7e0-bfd6-4362-90df-fa13576fb280_720x405.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!g6Xa!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818ae7e0-bfd6-4362-90df-fa13576fb280_720x405.png 424w, https://substackcdn.com/image/fetch/$s_!g6Xa!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818ae7e0-bfd6-4362-90df-fa13576fb280_720x405.png 848w, https://substackcdn.com/image/fetch/$s_!g6Xa!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818ae7e0-bfd6-4362-90df-fa13576fb280_720x405.png 1272w, https://substackcdn.com/image/fetch/$s_!g6Xa!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818ae7e0-bfd6-4362-90df-fa13576fb280_720x405.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!g6Xa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818ae7e0-bfd6-4362-90df-fa13576fb280_720x405.png" width="720" height="405" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/818ae7e0-bfd6-4362-90df-fa13576fb280_720x405.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:405,&quot;width&quot;:720,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!g6Xa!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818ae7e0-bfd6-4362-90df-fa13576fb280_720x405.png 424w, https://substackcdn.com/image/fetch/$s_!g6Xa!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818ae7e0-bfd6-4362-90df-fa13576fb280_720x405.png 848w, https://substackcdn.com/image/fetch/$s_!g6Xa!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818ae7e0-bfd6-4362-90df-fa13576fb280_720x405.png 1272w, https://substackcdn.com/image/fetch/$s_!g6Xa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818ae7e0-bfd6-4362-90df-fa13576fb280_720x405.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Higher levels are harder for attackers to bypass (<a href="https://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html">source</a>)</figcaption></figure></div><p>The pyramid of pain teaches us that adversaries will dodge the only indicators you can search for and the only indicators that matter you can&#8217;t search for. </p><p>The problem for our field is that defenders have been trained to go into battle with search engine technology designed to look up log events containing strings. Those strings range from trivial to simple for an attacker to switch and avoid detection- but security analysts have been conditioned to work within these constraints. As such, many of the &#8220;next-gen&#8221; SIEM solutions, such as Google Chronicle, address some of Splunk&#8217;s scale challenges while perpetuating the SOC&#8217;s dependence on search. The rule below (from the public Chronicle GitHub account) demonstrates the brittle nature of search-based detection rules still found in the latest generation of SIEM technology. </p><pre><code>rule ryuk_ransomware_detector_sysmon_behavior {
 meta:
    author = "Lee Archinal"
    description = "This detects characteristics of the Ryuk Ransomware strain of malware  License: https://github.com/Neo23x0/sigma/blob/master/LICENSE.Detection.Rules.md."
    reference = "https://tdm.socprime.com/tdm/info/vZQdVgPbH0b7"
    version = "0.01"
    created = "2019/07/15"
    product = "windows"
    service = "sysmon"
    mitre = "impact, t1486, execution, t1204"

  events:
($selection1.metadata.product_event_type = "11" and (re.regex($selection1.target.file.full_path, `.*\.ryk`) or $selection1.target.file.full_path = "RyukReadMe.html"))

  condition:
    $selection1
}</code></pre><h1>The SOC Can Catch Up</h1><p>Contrast the search rule example above with how the rest of the enterprise derives insights from data. Departments that &#8220;1337 h4x0rs&#8221; might consider less technically proficient, such as sales, finance, and marketing, are years ahead and significantly more successful at achieving their objectives. Without detouring into the questionable incentives of the security operation (<em>quis custodiet ipsos custodes?</em>), we can just look at how an enterprise sales organization answers its data questions, for example, how it predicts which of its customers is most likely to jump ship. Such &#8220;churn analysis&#8221; can trigger a friendly phone call, special discounts, or other attempts to avoid loss.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Vw-H!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74861423-7d3d-40b1-9163-60cd12a582dc_1400x700.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Vw-H!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74861423-7d3d-40b1-9163-60cd12a582dc_1400x700.png 424w, https://substackcdn.com/image/fetch/$s_!Vw-H!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74861423-7d3d-40b1-9163-60cd12a582dc_1400x700.png 848w, https://substackcdn.com/image/fetch/$s_!Vw-H!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74861423-7d3d-40b1-9163-60cd12a582dc_1400x700.png 1272w, https://substackcdn.com/image/fetch/$s_!Vw-H!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74861423-7d3d-40b1-9163-60cd12a582dc_1400x700.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Vw-H!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74861423-7d3d-40b1-9163-60cd12a582dc_1400x700.png" width="1400" height="700" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/74861423-7d3d-40b1-9163-60cd12a582dc_1400x700.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:700,&quot;width&quot;:1400,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Churn Prediction Model: A Data-Driven Approach to Customer Retention | by  Gauravpandey | Medium&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Churn Prediction Model: A Data-Driven Approach to Customer Retention | by  Gauravpandey | Medium" title="Churn Prediction Model: A Data-Driven Approach to Customer Retention | by  Gauravpandey | Medium" srcset="https://substackcdn.com/image/fetch/$s_!Vw-H!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74861423-7d3d-40b1-9163-60cd12a582dc_1400x700.png 424w, https://substackcdn.com/image/fetch/$s_!Vw-H!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74861423-7d3d-40b1-9163-60cd12a582dc_1400x700.png 848w, https://substackcdn.com/image/fetch/$s_!Vw-H!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74861423-7d3d-40b1-9163-60cd12a582dc_1400x700.png 1272w, https://substackcdn.com/image/fetch/$s_!Vw-H!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74861423-7d3d-40b1-9163-60cd12a582dc_1400x700.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In this <a href="https://quickstarts.snowflake.com/guide/hex-churn-model/index.html?index=..%2F..index#0">Snowflake Quickstart</a> example, the customer has ten dimensions that can be used to evaluate churn risk. Some may be associated with activity, such as calling the customer service center, while others wouldn&#8217;t appear in the log data. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Zylt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F209590bc-608b-44db-bf6a-7d1f0b319902_1205x326.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Zylt!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F209590bc-608b-44db-bf6a-7d1f0b319902_1205x326.png 424w, https://substackcdn.com/image/fetch/$s_!Zylt!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F209590bc-608b-44db-bf6a-7d1f0b319902_1205x326.png 848w, https://substackcdn.com/image/fetch/$s_!Zylt!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F209590bc-608b-44db-bf6a-7d1f0b319902_1205x326.png 1272w, https://substackcdn.com/image/fetch/$s_!Zylt!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F209590bc-608b-44db-bf6a-7d1f0b319902_1205x326.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Zylt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F209590bc-608b-44db-bf6a-7d1f0b319902_1205x326.png" width="1205" height="326" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/209590bc-608b-44db-bf6a-7d1f0b319902_1205x326.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:326,&quot;width&quot;:1205,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Zylt!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F209590bc-608b-44db-bf6a-7d1f0b319902_1205x326.png 424w, https://substackcdn.com/image/fetch/$s_!Zylt!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F209590bc-608b-44db-bf6a-7d1f0b319902_1205x326.png 848w, https://substackcdn.com/image/fetch/$s_!Zylt!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F209590bc-608b-44db-bf6a-7d1f0b319902_1205x326.png 1272w, https://substackcdn.com/image/fetch/$s_!Zylt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F209590bc-608b-44db-bf6a-7d1f0b319902_1205x326.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>These inputs are crunched in a data science model that leverages a Random Forest classifier trained on historical data within an analytics platform. The sales team would collaborate with data scientists to develop a data app that can be used in daily sales operations, even by less data-savvy salespeople. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qRtR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e577dae-18db-4cc7-91b3-e7b49a904440_779x291.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qRtR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e577dae-18db-4cc7-91b3-e7b49a904440_779x291.png 424w, https://substackcdn.com/image/fetch/$s_!qRtR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e577dae-18db-4cc7-91b3-e7b49a904440_779x291.png 848w, https://substackcdn.com/image/fetch/$s_!qRtR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e577dae-18db-4cc7-91b3-e7b49a904440_779x291.png 1272w, https://substackcdn.com/image/fetch/$s_!qRtR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e577dae-18db-4cc7-91b3-e7b49a904440_779x291.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qRtR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e577dae-18db-4cc7-91b3-e7b49a904440_779x291.png" width="779" height="291" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4e577dae-18db-4cc7-91b3-e7b49a904440_779x291.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:291,&quot;width&quot;:779,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:132491,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qRtR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e577dae-18db-4cc7-91b3-e7b49a904440_779x291.png 424w, https://substackcdn.com/image/fetch/$s_!qRtR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e577dae-18db-4cc7-91b3-e7b49a904440_779x291.png 848w, https://substackcdn.com/image/fetch/$s_!qRtR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e577dae-18db-4cc7-91b3-e7b49a904440_779x291.png 1272w, https://substackcdn.com/image/fetch/$s_!qRtR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e577dae-18db-4cc7-91b3-e7b49a904440_779x291.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Customers with high churn risk identified through analytics</figcaption></figure></div><p>No one would suggest that a sales team try to &#8220;search&#8221; for churn-risk customers or that finance would &#8220;search&#8221; for budget inefficiencies. But in security operations, facing the double challenge of finding someone actively trying to avoid detection, search is the status quo. Splunk&#8217;s success as a SIEM bears much of the blame. </p><p>Meanwhile, a new class of cloud data platforms blends data warehouse, data lake, and search workloads to address the shortcomings of past platforms like Oracle and Hadoop. Snowflake, BigQuery, and others have added native <a href="https://www.snowflake.com/blog/snowflake-sql-making-schema-on-read-a-reality-part-1-2/">JSON support with schema-on-read</a>, <a href="https://docs.snowflake.com/en/user-guide/search-optimization-service">fast search</a>, and <a href="https://www.snowflake.com/blog/dynamic-tables-delivering-declarative-streaming-data-pipelines/">streaming analytics</a>. All are delivered as a service. The limitations and overhead that drove the SOC away from Oracle and Hadoop to NoSQL alternatives like Splunk and Elasticsearch have been eliminated. </p><p>To ditch its over-dependence on search, an enterprise SOC can start by leveraging the cloud data platform that other departments at the company are already using. In this way, security analysts can access production tooling (e.g., data pipeline and data warehouse), functioning processes (e.g., role management and cost monitors), and people who are experts at the data stuff. Working with the central data science team is a great strategy for security leaders navigating their organization toward analytics best practices. </p><p>Also helpful is the growing ecosystem of security products that plug into cloud data platforms with support for the full spectrum of analytics- including search, statistical baselining, and data science. Anvilogic, for example, <a href="https://www.snowflake.com/thankyou/pbs-anivilogic-deep-learning-2024-01-24/">recently demonstrated</a> how general-purpose data science methodologies can make a big difference in effective threat detection at scale.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!AwVz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bab1ca6-988b-4b6e-a633-324850612834_979x629.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!AwVz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bab1ca6-988b-4b6e-a633-324850612834_979x629.png 424w, https://substackcdn.com/image/fetch/$s_!AwVz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bab1ca6-988b-4b6e-a633-324850612834_979x629.png 848w, https://substackcdn.com/image/fetch/$s_!AwVz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bab1ca6-988b-4b6e-a633-324850612834_979x629.png 1272w, https://substackcdn.com/image/fetch/$s_!AwVz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bab1ca6-988b-4b6e-a633-324850612834_979x629.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!AwVz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bab1ca6-988b-4b6e-a633-324850612834_979x629.png" width="979" height="629" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8bab1ca6-988b-4b6e-a633-324850612834_979x629.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:629,&quot;width&quot;:979,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:202673,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!AwVz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bab1ca6-988b-4b6e-a633-324850612834_979x629.png 424w, https://substackcdn.com/image/fetch/$s_!AwVz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bab1ca6-988b-4b6e-a633-324850612834_979x629.png 848w, https://substackcdn.com/image/fetch/$s_!AwVz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bab1ca6-988b-4b6e-a633-324850612834_979x629.png 1272w, https://substackcdn.com/image/fetch/$s_!AwVz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bab1ca6-988b-4b6e-a633-324850612834_979x629.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Webinar: How Anvilogic is Scaling Deep Learning on Snowflake (<a href="https://www.snowflake.com/thankyou/pbs-anivilogic-deep-learning-2024-01-24/">source</a>)</figcaption></figure></div><p>A narrow fixation on search has held back security operations. The historical reasons for why this happened are no longer binding, but many SOCs haven&#8217;t yet adjusted. To move forward, security leaders can recognize the implications of Splunk's historical influence on security operations and embrace the transformative potential of security data lakes as the path to joining the rest of the enterprise in analytics success.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.omeronsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Omer on Security! Subscribe for free to receive weekly guidance on your security data lake journey.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The Two-Headed SIEM Monster]]></title><description><![CDATA[Industry trends point to multiple SIEMs becoming a wider problem for security operations]]></description><link>https://www.omeronsecurity.com/p/the-two-headed-siem-monster</link><guid isPermaLink="false">https://www.omeronsecurity.com/p/the-two-headed-siem-monster</guid><dc:creator><![CDATA[Omer Singer]]></dc:creator><pubDate>Thu, 08 Feb 2024 15:52:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!a55U!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd84918bc-41d8-4d85-909a-a482025457e4_416x501.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The government <a href="https://www.irs.gov/privacy-disclosure/security-information-and-event-management-siem-systems">defines</a> SIEM as &#8220;a single system to improve the detection and remediation of security issues,&#8221; but what happens when you have more than one?  The SIEM&#8217;s role as the place where security events get centralized has eroded as security data exploded simultaneously as analytics requirements for large SOCs became more sophisticated. Now, emerging trends are transforming the problem from too many silos to too many SIEMs. This spells trouble for security operations, where two heads are not at all better than one.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!a55U!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd84918bc-41d8-4d85-909a-a482025457e4_416x501.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!a55U!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd84918bc-41d8-4d85-909a-a482025457e4_416x501.png 424w, https://substackcdn.com/image/fetch/$s_!a55U!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd84918bc-41d8-4d85-909a-a482025457e4_416x501.png 848w, https://substackcdn.com/image/fetch/$s_!a55U!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd84918bc-41d8-4d85-909a-a482025457e4_416x501.png 1272w, https://substackcdn.com/image/fetch/$s_!a55U!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd84918bc-41d8-4d85-909a-a482025457e4_416x501.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!a55U!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd84918bc-41d8-4d85-909a-a482025457e4_416x501.png" width="446" height="537.1298076923077" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d84918bc-41d8-4d85-909a-a482025457e4_416x501.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:501,&quot;width&quot;:416,&quot;resizeWidth&quot;:446,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!a55U!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd84918bc-41d8-4d85-909a-a482025457e4_416x501.png 424w, https://substackcdn.com/image/fetch/$s_!a55U!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd84918bc-41d8-4d85-909a-a482025457e4_416x501.png 848w, https://substackcdn.com/image/fetch/$s_!a55U!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd84918bc-41d8-4d85-909a-a482025457e4_416x501.png 1272w, https://substackcdn.com/image/fetch/$s_!a55U!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd84918bc-41d8-4d85-909a-a482025457e4_416x501.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Imperator Mar'gok, sorcerer king of the Gorian Empire</figcaption></figure></div><h1>Endpoint Vendors Stock Up on SIEM</h1><p>Let&#8217;s unpack the trends pushing SOCs to rely on multiple SIEMs. We&#8217;ll see that these powerful currents will likely shape security operations for years to come.</p><p>First, what do all the Gartner EDR MQ leaders have in common? Under the banner of XDR, they&#8217;ve all started selling SIEM.</p><ul><li><p>CrowdStrike says we&#8217;ve got <a href="https://www.crowdstrike.com/products/next-gen-siem/">Next-Gen SIEM and Log Management</a></p></li><li><p>Microsoft will sell you <a href="https://www.microsoft.com/en-us/security/business/siem-and-xdr/microsoft-sentinel">An easy and powerful SIEM solution</a></p></li><li><p>Palo Alto didn&#8217;t like that others copied &#8220;XDR&#8221; so they called their SIEM by a different name and have written that <a href="https://www.paloaltonetworks.com/cyberpedia/what-is-security-information-and-event-management-SIEM">SIEM solutions will adapt and evolve</a></p></li></ul><p>And the same goes for the rest. None of these vendors are content with selling endpoint agents that feed into Splunk or other dedicated SIEM platforms. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!m7DE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F217d864f-4548-43d9-9eb8-975836c6485a_3446x3744.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!m7DE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F217d864f-4548-43d9-9eb8-975836c6485a_3446x3744.png 424w, https://substackcdn.com/image/fetch/$s_!m7DE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F217d864f-4548-43d9-9eb8-975836c6485a_3446x3744.png 848w, https://substackcdn.com/image/fetch/$s_!m7DE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F217d864f-4548-43d9-9eb8-975836c6485a_3446x3744.png 1272w, https://substackcdn.com/image/fetch/$s_!m7DE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F217d864f-4548-43d9-9eb8-975836c6485a_3446x3744.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!m7DE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F217d864f-4548-43d9-9eb8-975836c6485a_3446x3744.png" width="496" height="538.9230769230769" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/217d864f-4548-43d9-9eb8-975836c6485a_3446x3744.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1582,&quot;width&quot;:1456,&quot;resizeWidth&quot;:496,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!m7DE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F217d864f-4548-43d9-9eb8-975836c6485a_3446x3744.png 424w, https://substackcdn.com/image/fetch/$s_!m7DE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F217d864f-4548-43d9-9eb8-975836c6485a_3446x3744.png 848w, https://substackcdn.com/image/fetch/$s_!m7DE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F217d864f-4548-43d9-9eb8-975836c6485a_3446x3744.png 1272w, https://substackcdn.com/image/fetch/$s_!m7DE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F217d864f-4548-43d9-9eb8-975836c6485a_3446x3744.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Splunk&#8217;s challenges have likely played a role in this industry trend. The recently Ciscoed company controls more of the security event management space than all the endpoint vendors combined. But its estimated $2 billion in annual security revenue is seen by many as up for grabs, waiting to become a line item in a bill from the vendor that already runs on thousands of your endpoints. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.omeronsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.omeronsecurity.com/subscribe?"><span>Subscribe now</span></a></p><p>Technological advances have also played a role, as the groundbreaking search performance that previously drew SOC teams to Splunk and Elastic has aged. CrowdStrike paid $400M for Humio, while SentinelOne bought Scalyr for less than $200M. Palo Alto rents big data technology from Google, while <a href="https://www.snowflake.com/en/why-snowflake/customers/all-customers/case-study/trellix/">Trellix went with Snowflake</a>. As a result, these crossover challengers are able to claim comparable capabilities as pure-play incumbents.</p><p>I say &#8220;claim&#8221; because a healthy dose of skepticism is warranted. Humio had not seen significant enterprise adoption before CrowdStrike stuck its logo on the tin. Splunk is infinitely more proven at large-scale analytics for hunting and threat detection. I believe endpoint vendors hope their search platform is &#8220;good enough&#8221; to replace SIEM beyond the SME market. Given that the EDR vendors have thousands of agents deployed across every enterprise, they&#8217;ll likely get a shot to prove it.</p><h1>Your Cloud Comes With SIEM</h1><p>Since every large business and government agency now has a public cloud footprint, another significant force towards multiple SIEMs is that each major CSP has its own SIEM offerings. AWS is still in the early days with its Security Lake offering, but Azure and Google are serious about theirs.</p><p>Both have poured billions into related acquisitions and engineering. Microsoft reports that <a href="https://www.microsoft.com/en-us/security/blog/2021/07/08/microsoft-named-a-visionary-in-the-2021-gartner-magic-quadrant-for-siem-for-azure-sentinel/">thousands of customers</a> use Sentinel and offer significant subsidies for keeping Azure and Office365 event logs on the platform. As a result, many organizations have chosen to use the CSP&#8217;s built-in SIEM, at least as a stopgap measure for analyzing that platform&#8217;s logs.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ISow!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd734eaa0-39c2-4953-817f-61e92dd61c41_1424x714.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ISow!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd734eaa0-39c2-4953-817f-61e92dd61c41_1424x714.png 424w, https://substackcdn.com/image/fetch/$s_!ISow!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd734eaa0-39c2-4953-817f-61e92dd61c41_1424x714.png 848w, https://substackcdn.com/image/fetch/$s_!ISow!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd734eaa0-39c2-4953-817f-61e92dd61c41_1424x714.png 1272w, https://substackcdn.com/image/fetch/$s_!ISow!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd734eaa0-39c2-4953-817f-61e92dd61c41_1424x714.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ISow!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd734eaa0-39c2-4953-817f-61e92dd61c41_1424x714.png" width="566" height="283.7949438202247" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d734eaa0-39c2-4953-817f-61e92dd61c41_1424x714.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:714,&quot;width&quot;:1424,&quot;resizeWidth&quot;:566,&quot;bytes&quot;:116619,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ISow!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd734eaa0-39c2-4953-817f-61e92dd61c41_1424x714.png 424w, https://substackcdn.com/image/fetch/$s_!ISow!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd734eaa0-39c2-4953-817f-61e92dd61c41_1424x714.png 848w, https://substackcdn.com/image/fetch/$s_!ISow!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd734eaa0-39c2-4953-817f-61e92dd61c41_1424x714.png 1272w, https://substackcdn.com/image/fetch/$s_!ISow!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd734eaa0-39c2-4953-817f-61e92dd61c41_1424x714.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Azure data collection is subsidized for Microsoft Sentinel customers</figcaption></figure></div><h1>When a SIEM is Just a Side-SIEM</h1><p>Several factors will keep these new SIEMs from replacing King Splunk at large enterprises. If several of these are present, the XDR or cloud SIEM would take an additive position as a side-SIEM.</p><ul><li><p><strong>Data also used by other teams:</strong> Splunk is often used by teams outside of cybersecurity, including IT and DevOps. Much of the data collected to Splunk may also be used by these teams, which have their own requirements to support observability use cases. </p></li><li><p><strong>Other active security use cases: </strong>Splunk may be used for security use cases beyond security operations, such as vulnerability management, fraud detection, and regulatory compliance.</p></li><li><p><strong>Analytics requirements: </strong>Enterprise detection teams perform significant analytics, including correlation, anomaly detection, and behavior modeling. Underlying search technology with limited joining abilities and no data science support will not provide the parity needed for a complete replacement.</p></li><li><p><strong>Reporting requirements: </strong>Splunk dashboards can be pretty epic.. and many security leaders rely on them for metrics and trend charts. </p></li><li><p><strong>Cloud egress: </strong>A SIEM that&#8217;s only offered in one cloud may impose prohibitive egress costs and compliance issues for data shipped out from other clouds used by the enterprise. </p></li><li><p><strong>Integration requirements:</strong> Hybrid environments and enterprises with infrastructure deployed over decades have a &#8220;long tail&#8221; of integration requirements. Switching from Splunk would require significant log collection and normalization development.</p></li><li><p><strong>Content requirements:</strong> Solutions provided as part of a highly opinionated suite (such as Palo Alto Networks) tend to be optimized for their products. Third-party EDR or CNAPP may receive little or no pre-built content. The effort involved with building and maintaining effective rules and correlations would fall on the individual security team.</p></li></ul><p>Beyond these reasons that Splunk will likely stick around, there&#8217;s also the soft side of cyber. Many security analysts are deeply invested in SPL expertise and certifications that would become obsolete if their Splunk were decommissioned. </p><h1>The Impact on Security Operations</h1><p>The problems caused by working across multiple SIEM solutions have not received much attention. Network security provider Corelight, which generates oodles of data and knows this problem well, has observed that &#8220;defenders have been deploying a secondary SIEM&#8221; in a post titled <em><a href="https://corelight.com/blog/one-siem-is-not-enough">One SIEM is not enough?</a></em> Anton Chuvakin warned in <em><a href="https://medium.com/anton-on-security/living-with-multiple-siems-c7fea37c5020">Living With Multiple SIEMs</a></em> about the &#8220;Complexity and hence fragility of the multi-system setup (due to both data flow integration needs and detection content organization). Complexity kills security.&#8221; But the trends described above warrant a deeper analysis of the dangers.</p><p>First, it&#8217;s <strong>harder to detect threats</strong> across multiple SIEMs. Attackers don&#8217;t limit themselves to one part of the environment; They strike through email to land on the endpoint and pivot to the cloud control plane from where they extract data through the network. A sensor limited to just one of these areas will not reliably identify the attack as it unfolds.</p><p>The defenders must also contend with hundreds of detections <strong>managed in separate repositories</strong>. Detection engineering at scale requires a lifecycle with version control, testing, and repeatable processes to ensure that detections work as expected. This is hard enough within a single platform and is unlikely to succeed across multiple sets of detection rules. </p><p>Consider what happens when a new zero-day vulnerability hits the headlines. Detection engineers scramble to ensure that exploitation attempts are identified, contained, and mitigated immediately. Comparing coverage from the various SIEM providers, for example, one in Azure and one in AWS, would require the team to <strong>manually confirm that both have covered the relevant services</strong> <strong>and TTPs</strong>. </p><p>Consider that each detection and response solution may use a different language with its <strong>proprietary rule syntax</strong> and format. Teams may be tempted to divide responsibility between the analysts, with some specializing in SIEM A and some in SIEM B. Rule development would progress in separate tracks, with coverage progressing piecemeal. At scale, writing good queries is vital to optimize performance, and this expertise is hard to develop across multiple solutions.</p><p>There&#8217;s also the challenge of <strong>ensuring data quality</strong>. Without one central SIEM, the security operation takes on substantial complexity to ensure the expected datasets consistently arrive as expected. This is also true for maintaining data models, as changes to upstream data must be applied in different locations. A unified pipeline, not exclusive to one of the SIEMs, helps here, but data quality can still be affected by varying retention policies and modifications in the different systems. </p><p>Incident response is slower and less effective in a spinning swivel-chair, with <strong>investigations performed across separate search consoles</strong>. Each set of results may represent a portion of the attack and must be manually reconciled into a unified timeline. This becomes exceedingly difficult when an attack spans significant time and assets. </p><p>Finally, the all-important goal of <strong>automation takes a drastic hit</strong>. Each SIEM requires separate integration through a distinct set of APIs running against a unique data model. Playbooks developed for one set of alerts would need to be built from scratch for a parallel environment monitored in a separate SIEM. Attempts to leverage data science and machine learning for automating the routine tasks that grind down the SOC might be supported in one SIEM or another but would not be portable across systems.</p><h1>Conclusion</h1><p>Security operations leaders should be mindful of the downsides of using multiple SIEMs. While eager vendors may downplay the difficulties introduced with their side-SIEM, buyers should take time during planning to connect with similar organizations that have deployed the same set of multiple SIEMs. Discussing key concerns should include detection fidelity, rule management complexity, ensuring data quality, investigation effort, and automation success. While industry trends have made adopting multiple detection and response platforms increasingly tempting, potential cost savings must be weighed against the risk and complexity inherent in the &#8220;two-headed&#8221; approach.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.omeronsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Omer on Security! Subscribe for free to receive weekly guidance on your security data lake journey.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Defrosting Snowflake SIEM Cost Factors]]></title><description><![CDATA[An unauthorized playbook for estimating security data lake spend]]></description><link>https://www.omeronsecurity.com/p/defrosting-snowflake-siem-cost-factors</link><guid isPermaLink="false">https://www.omeronsecurity.com/p/defrosting-snowflake-siem-cost-factors</guid><dc:creator><![CDATA[Omer Singer]]></dc:creator><pubDate>Thu, 01 Feb 2024 15:46:52 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!IanV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec6030df-cc29-4ca5-b0c3-65d987975a54_1792x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>How does Snowflake perform against the <a href="https://www.omeronsecurity.com/p/8-siem-cost-factors-you-need-to-know">8 SIEM cost factors</a> outlined in last week&#8217;s post? For a data lake solution to be worth operationalizing, it must be dramatically more cost-effective and scalable than all-in-one SIEM alternatives. Snowflake has increasingly <a href="https://www.snowflake.com/news/snowflake-launches-new-cybersecurity-workload-to-detect-and-respond-to-threats-with-the-data-cloud/">emphasized its cybersecurity workload</a>, but let's break down the cost factors to get a sense of the potential savings.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IanV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec6030df-cc29-4ca5-b0c3-65d987975a54_1792x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IanV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec6030df-cc29-4ca5-b0c3-65d987975a54_1792x1024.png 424w, https://substackcdn.com/image/fetch/$s_!IanV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec6030df-cc29-4ca5-b0c3-65d987975a54_1792x1024.png 848w, https://substackcdn.com/image/fetch/$s_!IanV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec6030df-cc29-4ca5-b0c3-65d987975a54_1792x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!IanV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec6030df-cc29-4ca5-b0c3-65d987975a54_1792x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IanV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec6030df-cc29-4ca5-b0c3-65d987975a54_1792x1024.png" width="1456" height="832" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ec6030df-cc29-4ca5-b0c3-65d987975a54_1792x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:832,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3766178,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!IanV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec6030df-cc29-4ca5-b0c3-65d987975a54_1792x1024.png 424w, https://substackcdn.com/image/fetch/$s_!IanV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec6030df-cc29-4ca5-b0c3-65d987975a54_1792x1024.png 848w, https://substackcdn.com/image/fetch/$s_!IanV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec6030df-cc29-4ca5-b0c3-65d987975a54_1792x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!IanV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec6030df-cc29-4ca5-b0c3-65d987975a54_1792x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>Cost Factor: Data Collection</h1><p>Snowflake supports loading new data using its Snowpipe service. There are several ingest modes available, each with its own mix of latency, cost, and overhead tradeoffs. <a href="https://docs.snowflake.com/en/user-guide/data-load-snowpipe-auto">Snowpipe auto ingest</a> is the most popular option for consistent intake of machine data. It typically makes new data available within one minute, though latency and cost are affected by the shape of the loaded files. Low-volume &#8220;trickle&#8221; data or lots of small files can be more expensive to load. The typical cost to load an uncompressed terabyte of log data is around 20 credits or $60 at $3 per credit. That&#8217;s a conservative credit cost, many customers have negotiated discounts to less than $3 per credit. </p><p>It is worth mentioning that Snowpipe Streaming, the newest ingest mode, provides lower latency and cost for many scenarios&#8212;especially for environments with security logs already flowing through Kafka (currently a requirement). Not having to stage files before loading also makes the ingest cost more predictable- data lakes getting better at streaming data is an exciting trend to watch. </p><p>There&#8217;s also an opportunity to further reduce costs by batch-loading certain datasets that aren&#8217;t needed for real-time detections. Loading a high-volume, low-use data source three times a day, for example, instead of streaming it continuously can save big bucks.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OFWY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e759514-aa84-44f7-8f15-3b8b30d06c02_961x324.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OFWY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e759514-aa84-44f7-8f15-3b8b30d06c02_961x324.png 424w, https://substackcdn.com/image/fetch/$s_!OFWY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e759514-aa84-44f7-8f15-3b8b30d06c02_961x324.png 848w, https://substackcdn.com/image/fetch/$s_!OFWY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e759514-aa84-44f7-8f15-3b8b30d06c02_961x324.png 1272w, https://substackcdn.com/image/fetch/$s_!OFWY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e759514-aa84-44f7-8f15-3b8b30d06c02_961x324.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OFWY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e759514-aa84-44f7-8f15-3b8b30d06c02_961x324.png" width="961" height="324" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5e759514-aa84-44f7-8f15-3b8b30d06c02_961x324.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:324,&quot;width&quot;:961,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Snowpipe Streaming: Real-time Data Ingestion to Snowflake - Syntio&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Snowpipe Streaming: Real-time Data Ingestion to Snowflake - Syntio" title="Snowpipe Streaming: Real-time Data Ingestion to Snowflake - Syntio" srcset="https://substackcdn.com/image/fetch/$s_!OFWY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e759514-aa84-44f7-8f15-3b8b30d06c02_961x324.png 424w, https://substackcdn.com/image/fetch/$s_!OFWY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e759514-aa84-44f7-8f15-3b8b30d06c02_961x324.png 848w, https://substackcdn.com/image/fetch/$s_!OFWY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e759514-aa84-44f7-8f15-3b8b30d06c02_961x324.png 1272w, https://substackcdn.com/image/fetch/$s_!OFWY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e759514-aa84-44f7-8f15-3b8b30d06c02_961x324.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Loading data from external sources to Snowflake for storage and analytics</figcaption></figure></div><p>Let&#8217;s ignore those optimizations for our purposes here. We can estimate costs for an organization using Snowpipe auto ingest to collect 7 TB/d uncompressed log data, with each credit costing $3, as follows:</p><ul><li><p>Daily Snowflake Credit Count: 7 TB * 20 credits/TB = 140 credits/day.</p></li><li><p>Daily Cost in Dollars: 140 credits * $3/credit = $420.</p></li><li><p>Annual Cost: $420/day * 365 days = <strong>$153,300</strong>.</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.omeronsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.omeronsecurity.com/subscribe?"><span>Subscribe now</span></a></p><h1>Cost Factor: Hot Data Retention</h1><p>In Snowflake, all data is treated as 'hot', meaning that it's always accessible for analysis. This approach simplifies the data management strategy and cost planning. The cost for hot data retention in Snowflake is usually $23 per <em>compressed</em> terabyte per month. That&#8217;s the same cost as plain old S3, with the difference being that the data is automatically compressed, encrypted, and ready to query.</p><p>It&#8217;s easy to trip up your calculations on this, so remember whether you&#8217;re budgeting for data in its original state (uncompressed) or storage (compressed). Snowflake has <a href="https://www.snowflake.com/blog/performance-improvements-summit-2022/">improved its compression</a> over the years, and I typically see higher than 8x compression these days, but to be conservative we can assume a 5x compression factor. </p><p>This cost factor needs to take into account the retention period dictated by your security policy. Snowflake doesn&#8217;t impose a retention limit, and I&#8217;ve seen security data lakes with over five years of hot data. This works because the storage in the data lake is fully separate from the compute clusters. Data that isn&#8217;t in scope for a given query is pruned away by the engine and does not affect performance. </p><p>There&#8217;s also the option to create tasks that drop records based on logic such as source type, date, environment, etc. This enables a retention policy that is tuned to operational requirements and not just a fixed time period. But to keep things simple here, let&#8217;s assume that all collected data will be kept for one year.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rVTY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F430b7eba-3610-43e2-9acd-d1e6a09dd004_450x242.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rVTY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F430b7eba-3610-43e2-9acd-d1e6a09dd004_450x242.png 424w, https://substackcdn.com/image/fetch/$s_!rVTY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F430b7eba-3610-43e2-9acd-d1e6a09dd004_450x242.png 848w, https://substackcdn.com/image/fetch/$s_!rVTY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F430b7eba-3610-43e2-9acd-d1e6a09dd004_450x242.png 1272w, https://substackcdn.com/image/fetch/$s_!rVTY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F430b7eba-3610-43e2-9acd-d1e6a09dd004_450x242.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rVTY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F430b7eba-3610-43e2-9acd-d1e6a09dd004_450x242.png" width="450" height="242" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/430b7eba-3610-43e2-9acd-d1e6a09dd004_450x242.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:242,&quot;width&quot;:450,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Automatic Concurrency Scaling in Snowflake | Snowflake Auto Scaling&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Automatic Concurrency Scaling in Snowflake | Snowflake Auto Scaling" title="Automatic Concurrency Scaling in Snowflake | Snowflake Auto Scaling" srcset="https://substackcdn.com/image/fetch/$s_!rVTY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F430b7eba-3610-43e2-9acd-d1e6a09dd004_450x242.png 424w, https://substackcdn.com/image/fetch/$s_!rVTY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F430b7eba-3610-43e2-9acd-d1e6a09dd004_450x242.png 848w, https://substackcdn.com/image/fetch/$s_!rVTY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F430b7eba-3610-43e2-9acd-d1e6a09dd004_450x242.png 1272w, https://substackcdn.com/image/fetch/$s_!rVTY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F430b7eba-3610-43e2-9acd-d1e6a09dd004_450x242.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Snowflake&#8217;s original claim to fame was separating database storage from compute</figcaption></figure></div><p>Another area where it&#8217;s easy to make a calculation error is how the data accumulates. In the first year, you start with no data stored and each month more data adds up. Since we consider retention to be one year, from the second year onwards the new data will replace old data and storage will level out. You can be conservative in your calculations by ignoring the lower storage costs of the first year and estimating based on the steady-state amount. In our example scenario,  7 TB/d retained for one year <a href="https://www.businessnewsdaily.com/9958-excel-running-total.html">works out</a> to approximately 500 TB of compressed data in storage. </p><p>For our 7 TB/d scenario with 365 days retention, we can estimate annual hot data retention costs as:</p><ol><li><p><strong>Monthly Hot Storage Cost</strong>:</p><ul><li><p>Cost per TB: $23</p></li><li><p>Total Storage: 500 TB</p></li><li><p>Monthly Cost = 500 TB * $23/TB = $11,500</p></li></ul></li><li><p><strong>Annual Hot Storage Cost</strong>:</p><ul><li><p>Annual Cost = Monthly Cost * 12 months</p></li><li><p>Annual Cost = $11,500/month * 12 = <strong>$138,000</strong></p></li></ul></li></ol><h1>Cost Factor: Cold Data Retention</h1><p>Ironically, Snowflake doesn&#8217;t have a cold storage tier. That&#8217;s a significant departure from traditional SIEM solutions that often require managing multiple tiers. This eliminates the added cost of cold data storage and, more importantly, prevents the complexity and unpredictability of additional charges for data retrieval or rehydration.</p><p>Annual Cold Storage Cost: <strong>$0</strong></p><h1>Cost Factor: <strong>Detection Processing</strong></h1><p>SIEM use cases require Snowflake to run automated queries for threat detection. These detection queries vary widely by the security team&#8217;s environment, maturity,  and risk profile. Many SOCs only have a handful of rules running against their data lake, and some (like IOC matches) can safely be run once or twice a day. But we can be conservative (meaning surprises bring savings instead of overages) by assuming the security team has deployed several hundred rules and runs them continuously.</p><p>Snowflake provides compute power through virtual warehouses that have T-shirt sizes from <a href="https://docs.snowflake.com/en/user-guide/warehouses-overview#warehouse-size">XS to 6XL</a>. Even the XS is pretty beefy, and a virtual warehouse can be resized in a few seconds as needed. Going up a size brings twice the power at twice the cost, measured by the time the warehouse is powered on. </p><p>I polled the forward-deployed engineers that support <a href="https://www.anvilogic.com/learn/bg-data-lake">Anvilogic</a> customers with multi-data platform threat detection. The recommendation they gave me for an organization ingesting 7 TB daily to Snowflake was to budget at that level for a Medium-sized warehouse running 24/7. That&#8217;s based on experience with Anvilogic customers, and anyone getting started with detection processing in a data lake should run their own tests to confirm the compute power needed for detection rules in their environment.</p><p>To estimate the annual cost for detection processing in Snowflake using an 'M' size warehouse, which costs 4 credits per hour, we need to consider the warehouse's operation over the entire year. Here's how the calculation would look:</p><ol><li><p><strong>Hourly Cost of 'M' Size Warehouse</strong>:</p><ul><li><p>4 credits per hour.</p></li></ul></li><li><p><strong>Cost per Credit</strong>:</p><ul><li><p>Assuming a credit cost of $3.</p></li></ul></li><li><p><strong>Daily Cost of Running the Warehouse 24/7 for Detection</strong>:</p><ul><li><p>Daily Cost = Hourly Cost * 24 hours/day</p></li><li><p>Daily Cost = 4 credits/hour * $3/credit * 24 hours/day</p></li><li><p>Daily Cost = $288/day</p></li></ul></li><li><p><strong>Annual Cost of Detection Processing</strong>:</p><ul><li><p>Annual Cost = Daily Cost * 365 days</p></li><li><p>Annual Cost = $288/day * 365 days</p></li><li><p>Annual Cost = <strong>$105,120</strong>.</p></li></ul></li></ol><h1>Cost Factor: Investigation Processing</h1><p>One of Snowflake&#8217;s key benefits to SIEM use cases is how compute resources can be instantly turned on and off. This eliminates wasteful spending that would otherwise be incurred during inactive periods. </p><p>The ability to quickly resize compute power, in the form of virtual warehouse T-shirt sizing, is also a source of savings. I&#8217;ve seen security operations teams running at relatively low power levels in their day-to-day, pump up their warehouse by 10x when the proverbial stuff hits the fan. That let those teams meet remediation SLAs in crunch time while avoiding high compute spend during normal operations.</p><p>Going by guidance from Anvilogic&#8217;s experienced security engineers, we can estimate investigation processing spend for investigation with a Medium sized warehouse. A conservative estimate might be 8 hours a day of actively searching the data lake. We&#8217;ll include weekends and holidays to build a buffer and account for busy times and breach investigations (which somehow always start on a Friday afternoon of a holiday weekend).</p><ol><li><p><strong>Daily Cost of Running the Warehouse for 8 Hours for Investigation</strong>:</p><ul><li><p>Daily Cost = Hourly Cost * 8 hours/day.</p></li><li><p>Daily Cost = 4 credits/hour * $3/credit * 8 hours/day.</p></li><li><p>Daily Cost = $96/day.</p></li></ul></li><li><p><strong>Annual Cost of Investigation Processing</strong>:</p><ul><li><p>Annual Cost = Daily Cost * 365 days.</p></li><li><p>Annual Cost = $96/day * 365 days.</p></li><li><p>Annual Cost = <strong>$35,040</strong>.</p></li></ul></li></ol><h1>Cost Factor: Archive Processing</h1><p>Archived data needs to be processed in order to be useful again. As many organizations find out at the most stressful time possible, rehydration from archive to SIEM can be <a href="https://docs.splunk.com/Documentation/Splunk/9.1.3/Indexer/Restorearchiveddata">complex</a> and costly. Snowflake eliminates the need for an archive tier as hot data is stored directly in cheap and limitless cloud blob storage. I covered this concept in my post on security data lakes <a href="https://www.omeronsecurity.com/p/this-is-a-security-data-lake">here</a>. </p><p>Annual Archive Processing Cost: <strong>$0</strong></p><h1>Cost Factor: Cloud Egress Costs</h1><p>The big cloud service providers tax data moving out of their network. According to the recent study quoted below, moving 50 TB out of AWS costs around $4,300. That would be the weekly egress cost for our 7 TB/d example organization if they were based in AWS but using SIEM hosted in Azure or GCP. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!768H!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10e03e5f-01d0-4f2a-9c5f-a4bf027ff150_1400x949.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!768H!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10e03e5f-01d0-4f2a-9c5f-a4bf027ff150_1400x949.png 424w, https://substackcdn.com/image/fetch/$s_!768H!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10e03e5f-01d0-4f2a-9c5f-a4bf027ff150_1400x949.png 848w, https://substackcdn.com/image/fetch/$s_!768H!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10e03e5f-01d0-4f2a-9c5f-a4bf027ff150_1400x949.png 1272w, https://substackcdn.com/image/fetch/$s_!768H!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10e03e5f-01d0-4f2a-9c5f-a4bf027ff150_1400x949.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!768H!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10e03e5f-01d0-4f2a-9c5f-a4bf027ff150_1400x949.png" width="1400" height="949" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/10e03e5f-01d0-4f2a-9c5f-a4bf027ff150_1400x949.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:949,&quot;width&quot;:1400,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;The surprising truth about Cloud Egress Costs | by Alexandre Gu&#233;rin | Medium&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="The surprising truth about Cloud Egress Costs | by Alexandre Gu&#233;rin | Medium" title="The surprising truth about Cloud Egress Costs | by Alexandre Gu&#233;rin | Medium" srcset="https://substackcdn.com/image/fetch/$s_!768H!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10e03e5f-01d0-4f2a-9c5f-a4bf027ff150_1400x949.png 424w, https://substackcdn.com/image/fetch/$s_!768H!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10e03e5f-01d0-4f2a-9c5f-a4bf027ff150_1400x949.png 848w, https://substackcdn.com/image/fetch/$s_!768H!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10e03e5f-01d0-4f2a-9c5f-a4bf027ff150_1400x949.png 1272w, https://substackcdn.com/image/fetch/$s_!768H!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10e03e5f-01d0-4f2a-9c5f-a4bf027ff150_1400x949.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><a href="https://medium.com/@alexandre_43174/the-surprising-truth-about-cloud-egress-costs-d1be3f70d001">Source: The Surprising Truth about Cloud Egress Costs</a></figcaption></figure></div><p>A significant benefit to using Snowflake for security data is that it is available in all three of the major clouds. So a SOC could potentially use a Snowflake account in AWS for CloudTrail, CrowdStrike, and other sources originating in Amazon services- while using a Snowflake account in Azure for o365, Defender, and other Microsoft services. There would still be a need for correlating threat signals across those environments, and this could be achieved by extracting events of interest without moving the raw data between clouds. Multi-cloud support provides an opportunity for significant savings.</p><p>Annual Cloud Egress Cost: <strong>$0</strong></p><h1>Cost Factor: SIEM Solution</h1><p>Snowflake needs a security layer on top to make it useful for threat detection and response. Some SOCs have built their own rules engine for Snowflake and create threat detection rules in SQL from scratch. There are also well-established SIEMs that can operationalize Snowflake for threat detection and response, including off-the-shelf rules and analytics.</p><p>Some of these solutions are charged by data volume, in addition to the Snowflake ingest cost factor. Others have done away with traditional SIEM pricing in favor of feature or asset-based pricing. Ensure that the security layer for your data lake does not become a limiting factor for visibility and effectiveness. </p><p>Annual SIEM Solution Cost: <strong>Varies by solution.</strong></p><h1>Conclusion</h1><p>We&#8217;ve now gone through each of the Snowflake cost factors associated with threat detection &amp; response use cases. The Snowflake data platform cost estimate for our example 7 TB/d SIEM with one year of hot retention is approximately <strong>$450,000</strong>. </p><p>Cost factor analysis helps us to understand the ways in which budget constraints may impact our security initiatives with a given platform. We can plot ingest costs at different volume levels to verify that siloed datasets can be brought in to support better detections. We can see whether the team can afford to adopt a full year of hot storage. And we can budget for new use cases like threat hunting, which may require their own cost factor.</p><p>Be sure to run your own numbers and validate them in a test environment before committing to any new approach. Hopefully, this walkthrough gave you a better sense of Snowflake&#8217;s transformational cost-effectiveness for security use cases and an approach to measuring the potential in your own environment. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.omeronsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Omer on Security! Subscribe for free to receive weekly guidance on your security data lake journey.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[8 SIEM Cost Factors You Need to Know]]></title><description><![CDATA[Navigate the complexity of SIEM by breaking down what's costing you money]]></description><link>https://www.omeronsecurity.com/p/8-siem-cost-factors-you-need-to-know</link><guid isPermaLink="false">https://www.omeronsecurity.com/p/8-siem-cost-factors-you-need-to-know</guid><dc:creator><![CDATA[Omer Singer]]></dc:creator><pubDate>Thu, 18 Jan 2024 16:11:53 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!e52M!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4404d7a4-f948-4908-b90e-0b4c3226b671_1024x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Misalignment between your environment and your SIEM&#8217;s cost model can break your security operation. Cost models pressure data collection, analysis, and retention, impacting key SOC metrics like the miss rate, false positive rate, and response time. As a security leader, one of the best ways you can help your security operations team is to understand all the ways in which the deployed SIEM impacts your budget and then use that knowledge to reduce constraints on the SOC. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!e52M!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4404d7a4-f948-4908-b90e-0b4c3226b671_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!e52M!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4404d7a4-f948-4908-b90e-0b4c3226b671_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!e52M!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4404d7a4-f948-4908-b90e-0b4c3226b671_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!e52M!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4404d7a4-f948-4908-b90e-0b4c3226b671_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!e52M!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4404d7a4-f948-4908-b90e-0b4c3226b671_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!e52M!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4404d7a4-f948-4908-b90e-0b4c3226b671_1024x1024.webp" width="444" height="444" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4404d7a4-f948-4908-b90e-0b4c3226b671_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:444,&quot;bytes&quot;:370859,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!e52M!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4404d7a4-f948-4908-b90e-0b4c3226b671_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!e52M!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4404d7a4-f948-4908-b90e-0b4c3226b671_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!e52M!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4404d7a4-f948-4908-b90e-0b4c3226b671_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!e52M!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4404d7a4-f948-4908-b90e-0b4c3226b671_1024x1024.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>Overview</h1><p>The cost model defines how your SIEM draws from the cybersecurity budget across the security operations lifecycle. The move to the cloud added significant complexity for larger SOCs, making it especially important to enumerate the ways in which you incur hard costs. Your SIEM cost model should include all the factors listed below. You should even track factors that don&#8217;t apply to you today, recording them as zero cost and using the complete list for comparing alternative approaches. </p><ol><li><p>Data collection</p></li><li><p>Hot retention</p></li><li><p>Cold retention</p></li><li><p>Detection processing</p></li><li><p>Investigation processing</p></li><li><p>Archive processing</p></li><li><p>Cloud egress</p></li><li><p>SIEM solution</p></li></ol><p>Each cost factor will have a way in which the provider meters it and a cost level. One solution can be more cost-effective for a given factor by metering differently (e.g. charging by feature instead of by data volume) or by having a lower cost level (e.g. $20 per TB instead of $50 per TB). Let&#8217;s review what goes into each cost factor and consider illustrative examples. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.omeronsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.omeronsecurity.com/subscribe?"><span>Subscribe now</span></a></p><h1>Cost Factor: Data Collection</h1><p><strong>What you spend on extracting source data and loading it to your data platform. </strong></p><p>Event logs and other security records must be copied from their origin across your network, cloud accounts, or point solution APIs. The initial leg of the data journey is sometimes performed on SIEM infrastructure, such as Splunk forwarders, and in other cases tooling with additional metering, such as Cribl Stream. </p><p>Data collection costs are typically measured in terms of annual spend by daily volume (e.g. $900k annual cost for 1.5 TB/d) but some solutions price by ingest amount (e.g. $0.10 per TB). Some simple multiplication can get you to an annualized &#8220;TB/d&#8221; figure either way. Don&#8217;t forget to include costs associated with related services such as Logstash virtual machines, AWS-managed Kafka, or Snowflake&#8217;s Snowpipe service.</p><h1>Cost Factor: Hot Retention</h1><p><strong>What you spend on storing your security data for active use.</strong></p><p>Hot retention refers to the storage of data that is frequently accessed and used for immediate analysis in a SIEM environment. This type of data storage is essential for real-time threat detection and rapid response in security operations. The expectation is that hot data can be used without rehydration processes which introduce delays, management overhead and analytics constraints. </p><p>Hot retention costs should be captured in a way that lines up with data collection and accounts for the retention period. For example, $200k annual cost for 7 TB/d retained for 90 days. So while individual records may be retained for only 90 days in hot availability, the cost is represented in annual terms. As the retention period can have a dramatic impact on the effectiveness of threat detection and response, you don&#8217;t want to lose this aspect when comparing solutions. </p><p>Some organizations have a security policy that mandates high availability (HA) for the SIEM. Consider the level of HA that you require, and if multiple copies of the data will be needed as a result. </p><p>Bear in mind that storage costs may depend on how the data is compressed. While data collection figures track how much <em>uncompressed</em> data is generated by the environment, storage costs for some solutions are calculated by <em>compressed</em> data volume. When that&#8217;s the case, your annual storage cost estimate should factor in the daily volume of data collected, the compression ratio, and the retention period.</p><h1>Cost Factor: Cold Retention</h1><p><strong>What you spend on storing security data that is not fully available for active use.</strong></p><p>Many security operations teams rely on cold storage archives to meet compliance requirements within budget constraints. This introduces challenges when archived data is need for investigations, IOC sweeps, threat hunting, data science or metrics. But archiving is often necessary with technologies with expensive hot storage or for organizations with multi-year regulatory retention requirements.  </p><p>Storage costs for cold retention are calculated the same way as for hot retention. The additional costs involved with moving data to and from the archive are factored separately in &#8220;Archive Processing&#8221; below.</p><h1>Cost Factor: Detection Processing</h1><p><strong>What you spend on automated analytics for threat detection.</strong></p><p>The security operations team relies on detection rules to automatically identify events of interest in the environment. Running these detection rules requires computational power (&#8220;compute&#8221; for short) to analyze collected data against logic or algorithms designed to spot attacks.</p><p>In the cloud, compute can take many forms. Some services charge by &#8220;bytes scanned&#8221;, some use abstract CPU cycles, others use query time. The cost model for compute affect the level and predictability of detection processing costs. While compute costs may have been a secondary concern in the on-prem days of fixed hardware and tightly coupled storage/compute, the game is very different in the cloud. </p><p>Costs should be estimated based on the expected quantity and frequency of detection rules in production. Developing heuristics that account for ingest volume, data complexity, rule quantity and analytics complexity is a significant challenge. Machine learning models that continually train on new data also play a role in this cost factor. Security operations teams should work with their SIEM vendor to review the heuristics provided for estimating compute requirements. These should reflect extensive experience with similar organizations and help to avoid resource exhaustion or surprise overages.</p><h1>Cost Factor: Investigation Processing</h1><p><strong>What you spend to search during triage, incident response and threat hunting.</strong></p><p>Like for running detections, investigations also require compute power to crunch the collected data. Some solutions use different engines (e.g. stream vs batch processing) for detections and investigations, while others will use the same for both. Getting to at least a basic understanding of how the query engine works will help the security organization to estimate how much its investigations will cost.</p><p>Consumption-based pricing is common in cloud environments, and security operations teams increasingly need to predict costs based on future consumption. But cybersecurity is intrinsically unpredictable, and any SOC can go through quiet periods, fire drills, and full-blown breach response. As with detection processing, planners should work with their vendors to estimate costs based on heuristics developed over time at organizations with similar profiles. Ample buffers and the natural tendency of things to &#8220;even out&#8221; will help predictions to stay within the target range throughout the year. </p><p>An additional benefit of planning with cost factors is that you can set up monitoring and guardrails to avoid surprises and correct problematic trends early. </p><p>Finally, a word of caution on solutions that don&#8217;t have a variable cost for investigation processing. There&#8217;s no free lunch, so watch for hidden limits that the vendor put in place to cap their downside costs. Often such solutions will limit search time windows, performance, or the kinds of supported analytics. </p><h1>Cost Factor: Archive Processing</h1><p><strong>What you spend to make data from cold storage searchable again.</strong></p><p>Archive processing involves the retrieval and rehydration of old logs from cold storage back into the SIEM system when needed. This process is crucial for retrospective investigations and threat hunting across time periods that extend beyond the hot retention window.</p><p>Retrieving data from cold storage typically incurs costs, as this data is often stored in a less accessible format to save on storage expenses. The cost depends on the volume of data being retrieved and the frequency of such retrievals.</p><p>Rehydration refers to the process of making archived logs usable again by the SIEM system, often involving re-indexing or transforming the data into a format suitable for analysis. This process can be resource-intensive, especially for large volumes of data, thus impacting the associated costs.</p><p>Some solutions impose constraints on rehydration including minimum data volume and time limits on restored data. Read the fine print to ensure that cost estimates take these restrictions into account. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PMGb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4defd828-ae37-41d5-8fb4-6b5a090ff191_870x667.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PMGb!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4defd828-ae37-41d5-8fb4-6b5a090ff191_870x667.png 424w, https://substackcdn.com/image/fetch/$s_!PMGb!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4defd828-ae37-41d5-8fb4-6b5a090ff191_870x667.png 848w, https://substackcdn.com/image/fetch/$s_!PMGb!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4defd828-ae37-41d5-8fb4-6b5a090ff191_870x667.png 1272w, https://substackcdn.com/image/fetch/$s_!PMGb!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4defd828-ae37-41d5-8fb4-6b5a090ff191_870x667.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PMGb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4defd828-ae37-41d5-8fb4-6b5a090ff191_870x667.png" width="870" height="667" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4defd828-ae37-41d5-8fb4-6b5a090ff191_870x667.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:667,&quot;width&quot;:870,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:98093,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!PMGb!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4defd828-ae37-41d5-8fb4-6b5a090ff191_870x667.png 424w, https://substackcdn.com/image/fetch/$s_!PMGb!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4defd828-ae37-41d5-8fb4-6b5a090ff191_870x667.png 848w, https://substackcdn.com/image/fetch/$s_!PMGb!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4defd828-ae37-41d5-8fb4-6b5a090ff191_870x667.png 1272w, https://substackcdn.com/image/fetch/$s_!PMGb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4defd828-ae37-41d5-8fb4-6b5a090ff191_870x667.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Rehydration fine print example from Microsoft Sentinel. <a href="https://learn.microsoft.com/en-us/azure/azure-monitor/logs/restore?tabs=api-1">Source</a></figcaption></figure></div><h1>Cost Factor: Cloud Egress</h1><p><strong>What you spend on moving data between clouds and regions.</strong></p><p>Cloud egress refers to the costs associated with transferring data from various cloud services and regions to a SIEM solution. This factor is significant for organizations that utilize cloud services across different providers and geographical locations. When data is moved between cloud providers or regions to get to the SIEM, egress costs are incurred.</p><p>This cost factor is especially significant for organizations that depend on a SIEM solution that is only available in one cloud- for example, Chronicle in GCP, Sentinel in Azure, or Securonix in AWS. If the company has a significant footprint in a different cloud, shipping activity logs to the SIEM will drive up egress charges. To get a ballpark sense of these costs, shipping 2 TB/d of CloudTrail from AWS to GCP would run upwards of $50k a year.</p><h1>Cost Factor: SIEM Solution</h1><p>In many cases, there is an additional cost for the SIEM solution that operationalizes the data platform for the SOC. Splunk offers purpose-built capabilities and content in its Enterprise Security product. <a href="https://www.anvilogic.com/">Anvilogic</a> provides a SIEM layer for multiple data platforms, including Splunk and Snowflake. </p><p>Most SIEM solutions operate on a licensing model, which can be based on factors like data volume, number of users, or features used. </p><h1>Conclusion</h1><p>There is a direct line between how a SIEM charges and how well it performs. A security operations team cannot succeed if it can&#8217;t collect the data it needs, keep it for as long as necessary, or apply the required analytics power. When evaluating options to replace or augment an existing SIEM solution, examine each cost factor to ensure that it lines up with your environmental and operational requirements. For more information, see my post on <a href="https://www.omeronsecurity.com/p/defrosting-snowflake-siem-cost-factors">Snowflake cost factors for SIEM use cases</a>.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.omeronsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Omer on Security! Subscribe for free to receive weekly guidance on your security data lake journey.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Threat Modeling with ChatGPT]]></title><description><![CDATA[How AI can help us understand the threats we care about, with a step-by-step example for Azure and sample prompts to get started]]></description><link>https://www.omeronsecurity.com/p/threat-modeling-with-chatgpt</link><guid isPermaLink="false">https://www.omeronsecurity.com/p/threat-modeling-with-chatgpt</guid><dc:creator><![CDATA[Omer Singer]]></dc:creator><pubDate>Thu, 11 Jan 2024 14:55:09 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!kOs6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7ad4212-8337-4ab9-9975-1168b75e3a1e_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>SOC leaders need threat models like architects need blueprints. However, some feedback to my post on  <a href="https://www.omeronsecurity.com/p/the-detection-responsibility-handshake">The Detection Responsibility Handshake</a> was that security operations are short on threat models. Many lack the experience or time to begin threat modeling. Let's explore how AI can help.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!kOs6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7ad4212-8337-4ab9-9975-1168b75e3a1e_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!kOs6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7ad4212-8337-4ab9-9975-1168b75e3a1e_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!kOs6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7ad4212-8337-4ab9-9975-1168b75e3a1e_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!kOs6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7ad4212-8337-4ab9-9975-1168b75e3a1e_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!kOs6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7ad4212-8337-4ab9-9975-1168b75e3a1e_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!kOs6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7ad4212-8337-4ab9-9975-1168b75e3a1e_1024x1024.png" width="410" height="410" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d7ad4212-8337-4ab9-9975-1168b75e3a1e_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:410,&quot;bytes&quot;:2277139,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!kOs6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7ad4212-8337-4ab9-9975-1168b75e3a1e_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!kOs6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7ad4212-8337-4ab9-9975-1168b75e3a1e_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!kOs6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7ad4212-8337-4ab9-9975-1168b75e3a1e_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!kOs6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7ad4212-8337-4ab9-9975-1168b75e3a1e_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>A New Application for LLMs</h1><p>ChatGPT, with its latest release, emerges as a powerful assistant for threat modeling. This tool is not just a repository of information; it's a dynamic resource adept at understanding and applying cybersecurity best practices. With a deep background in cloud architecture details, modern attacker techniques, and reasoning capabilities around probability and impact, ChatGPT can be a great resource for cybersecurity planning initiatives.</p><p>Threat modeling is a strategic process that involves identifying, assessing, and addressing potential threats in a proactive manner to combat cyber risks. This approach shifts the paradigm from a reactive to a proactive defense, making it easier for organizations to anticipate and mitigate threats before they can cause any damage. Given that it is not feasible to address every possible threat, the goal is to prepare for those threats that are most likely to occur and have a significant negative impact.</p><p>Many organizations, while recognizing the importance of threat modeling, often find themselves constrained by resources and time. This is where ChatGPT can play a transformative role. By leveraging AI, organizations can streamline their threat modeling processes, making them more efficient and effective. This blog will delve into how ChatGPT can be applied in the context of securing modern cloud-centric environments. We&#8217;ll use Azure as an example, but this article's approach can be applied to any environment where you are responsible for detecting and responding to threats. </p><p>With the help of tools like ChatGPT, threat modeling need not be a daunting task. Instead, it can be an integrated, manageable, and even streamlined part of your security operations, informing your detection engineering strategy and overall cybersecurity posture.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.omeronsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.omeronsecurity.com/subscribe?"><span>Subscribe now</span></a></p><h1>Integrating ChatGPT in Threat Modeling</h1><p>Large language models (LLMs) are good at going from a small prompt to a broad response that covers an entire topic. ChatGPT is a pro at synthesizing large amounts of information based on what it knows about cybersecurity and modern information systems. This is a crucial ability in threat modeling, where understanding the landscape is half the battle. </p><p>However, it's important to remember that ChatGPT is an AI tool, not a silver bullet. It can't replace human judgment, intuition, and experience. While it can suggest possible risks to consider, the final assessment and decision-making rest with us cybersecurity professionals.</p><p>As we&#8217;ll see in the following threat modeling exercise, the security engineer provides the context, sets the boundaries for the exercise, and interprets ChatGPT&#8217;s output through the lens of their organization&#8217;s specific needs and challenges. This requires organizational knowledge and strategic decision-making that the robots are not going to do for us. The goal of integrating ChatGPT in threat modeling is to form a symbiotic relationship where AI capabilities complement the expertise and contextual understanding of the security team. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!aQbS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a62338d-7e3b-483b-925e-5edea98e4226_1080x1081.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!aQbS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a62338d-7e3b-483b-925e-5edea98e4226_1080x1081.png 424w, https://substackcdn.com/image/fetch/$s_!aQbS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a62338d-7e3b-483b-925e-5edea98e4226_1080x1081.png 848w, https://substackcdn.com/image/fetch/$s_!aQbS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a62338d-7e3b-483b-925e-5edea98e4226_1080x1081.png 1272w, https://substackcdn.com/image/fetch/$s_!aQbS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a62338d-7e3b-483b-925e-5edea98e4226_1080x1081.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!aQbS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a62338d-7e3b-483b-925e-5edea98e4226_1080x1081.png" width="1080" height="1081" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7a62338d-7e3b-483b-925e-5edea98e4226_1080x1081.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1081,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!aQbS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a62338d-7e3b-483b-925e-5edea98e4226_1080x1081.png 424w, https://substackcdn.com/image/fetch/$s_!aQbS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a62338d-7e3b-483b-925e-5edea98e4226_1080x1081.png 848w, https://substackcdn.com/image/fetch/$s_!aQbS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a62338d-7e3b-483b-925e-5edea98e4226_1080x1081.png 1272w, https://substackcdn.com/image/fetch/$s_!aQbS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a62338d-7e3b-483b-925e-5edea98e4226_1080x1081.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In the next section, we'll work through a step-by-step example of harnessing ChatGPT for threat modeling for an Azure environment. This guide will help you navigate the process, from setting up ChatGPT to using its outputs for effective threat modeling and risk prioritization. The results can guide your detection engineering, the solutions you onboard, and how you use them.</p><h1><strong>Step-by-Step Example: Threat Modeling Azure Cloud</strong></h1><h2>Step 1: Set the environment</h2><p>To effectively utilize ChatGPT as an assistant for threat modeling, start by clearly defining the scope of the exercise. Here we are threat modeling your hypothetical  Azure environment. This involves identifying the services you use, the nature of your deployments, and any specific configurations unique to your organization. This information is provided via a prompt. The goal is to give ChatGPT a comprehensive view of your Azure landscape. This baseline understanding is crucial for ChatGPT to generate relevant and contextual threat models.</p><p><strong>Prompt:</strong> "ChatGPT, I need to conduct threat modeling for a hypothetical Azure cloud environment that uses Azure Active Directory, Azure Storage, and Azure Virtual Machines with a mix of IaaS and PaaS and custom security configurations. Can you provide an overview of potential threat areas?"</p><p><strong>ChatGPT Response:</strong> "In your Azure environment, potential threat areas include:</p><ol><li><p>Misconfigurations in Azure Storage leading to unauthorized data access.</p></li><li><p>Insecure management of credentials in Azure Active Directory.</p></li><li><p>Vulnerabilities in custom configurations that may lead to exploitation.</p></li><li><p>Risks associated with the integration of IaaS and PaaS, such as insufficient isolation.</p></li><li><p>Security gaps in Virtual Machines, including unpatched OS or applications."</p></li></ol><h2>Step 2: Define the threats</h2><p>Once ChatGPT is configured with your Azure environment details, the next step is to ask it to identify potential threats. ChatGPT, drawing from its vast knowledge base, can enumerate a list of common and emerging threats specific to Azure. These can range from misconfigured storage accounts to potential security loopholes in Azure Active Directory. This list serves as a starting point for deeper analysis.</p><p>Your organization's past experiences and existing threat intelligence are invaluable. Share this information with ChatGPT to refine the threat list further. This step ensures that the model considers theoretical threats and those you have previously encountered or are more likely based on your industry and history.</p><p><strong>Prompt:</strong> "ChatGPT, could you identify potential threats for our Azure environment that include remote file inclusion attacks on virtual machines and unauthorized access to cloud service accounts due to exposure of access keys in a code repository?"</p><p><strong>ChatGPT Response:</strong> "Potential threats for your Azure environment:</p><ol><li><p>Remote File Inclusion (RFI) attacks targeting virtual machines, allowing attackers to execute malicious scripts or drop malware.</p></li><li><p>Threats from exposed cloud service account access keys, possibly due to accidental code repository exposure, leading to unauthorized access and control over Azure services.</p></li><li><p>Risks of data breaches or service disruption stemming from these vulnerabilities."</p></li></ol><h2>Step 3: Consider known vulnerabilities</h2><p>No production environment is 100% locked down. Review vulnerability scans, CSPM findings, and audit reports for known vulnerabilities or areas of concern within your Azure environment. This list could also include details about past incidents, areas where compliance is tricky, or parts of your infrastructure that have often been challenging to secure. ChatGPT can use this information to prioritize threats and tailor the threat model to your unique vulnerabilities.</p><p>Also provide ChatGPT with details about the key assets in your Azure environment &#8211; which might include databases, virtual machines, or application services &#8211; and their critical functionalities. Any system has inherent vulnerabilities and ways in which it can be abused by attackers and malicious insiders. This step helps ChatGPT understand which assets are most crucial and should be prioritized in the threat modeling process, as well as known issues that attackers could use to target these assets.</p><p>Remember to stay within your company&#8217;s security policies whenever handling sensitive information about security posture and vulnerabilities.</p><p><strong>Prompt:</strong> "ChatGPT, given the threats, assets, and vulnerabilities we've discussed in our Azure environment, can you analyze and prioritize the top risks to our organization?"</p><p><strong>ChatGPT Response:</strong> "Based on the discussion about your Azure environment's threats, assets, and vulnerabilities, here's an analysis and prioritization of the top risks:</p><ol><li><p><strong>Risk to Outdated Operating Systems in Virtual Machines</strong>:</p><ul><li><p>Priority: High</p></li><li><p>Rationale: The presence of known vulnerabilities in outdated OS makes these systems highly susceptible to attacks. The potential for unauthorized access and subsequent network compromise poses a significant risk to the organization.</p></li></ul></li><li><p><strong>Risk to Customer Database</strong>:</p><ul><li><p>Priority: Very High</p></li><li><p>Rationale: The database contains sensitive customer information. Vulnerabilities here pose a grave risk due to the potential for substantial data breaches, leading to severe privacy and legal implications.</p></li></ul></li><li><p><strong>Risk to Payment Processing Service</strong>:</p><ul><li><p>Priority: High</p></li><li><p>Rationale: Given its critical role in operations, any compromise in this service could lead to operational disruptions and loss of customer trust. While it might be better protected than other assets, the impact of a breach here would be considerable.</p></li></ul></li></ol><p>Each of these risks requires immediate attention, with prioritized efforts towards securing the customer database due to its potential for the most direct and severe impact on the organization."</p><h2>Step 4: Analyze the risks</h2><p>With a comprehensive list of threats and vulnerabilities, use ChatGPT to analyze and rank these risks based on their likelihood and potential impact. This analysis will help you focus on the most significant threats, ensuring that your detection engineering resources are allocated efficiently.</p><p><strong>Prompt:</strong> "ChatGPT, analyze and prioritize the top risks for our organization based on the discussed threats, assets, and vulnerabilities in our Azure environment."</p><p><strong>ChatGPT Response:</strong> "Considering the various factors in your Azure environment, here's an analysis and prioritization of the top risks:</p><ol><li><p><strong>Risk Associated with Outdated Operating Systems in Virtual Machines</strong>:</p><ul><li><p>Priority: High</p></li><li><p>Rationale: The risk is significant due to the ease of exploiting known vulnerabilities in outdated systems. The impact includes potential unauthorized access, data breaches, and further network compromise.</p></li></ul></li><li><p><strong>Risk to the Customer Database</strong>:</p><ul><li><p>Priority: Very High</p></li><li><p>Rationale: This risk stands out due to the sensitivity of the data involved. A breach here could lead to severe privacy violations, legal implications, and reputational damage. It's imperative to secure this asset due to the direct and severe impact on the organization.</p></li></ul></li><li><p><strong>Risk to Payment Processing Service</strong>:</p><ul><li><p>Priority: High</p></li><li><p>Rationale: While potentially well-secured, the critical nature of this service means any compromise could disrupt operations and damage customer trust. The impact of a breach here, though potentially less direct than the customer database, is still considerable due to operational and financial implications.</p></li></ul></li></ol><p>The prioritization highlights the urgent need to address vulnerabilities in the customer database and outdated operating systems, followed by reinforcing the security of the payment processing service. Each risk presents unique challenges and should be managed with specific, tailored security measures."</p><h2>Step 5: Create threat scenarios</h2><p>Finally, leverage ChatGPT to develop detailed threat scenarios for the highest-ranked risks. These scenarios should include the potential attack vectors, the likely course of an attack, and the possible impact on your Azure environment. These scenarios will be instrumental in planning your defense strategies and ensuring that your security measures are as relevant and effective as possible.</p><p><strong>Prompt:</strong> "Considering our risk analysis, could you develop detailed threat scenarios for our Azure environment that focus on the risks associated with outdated operating systems in virtual machines, vulnerabilities in the customer database, and the payment processing service?"</p><p><strong>ChatGPT Response:</strong> "Certainly. Based on the prioritized risks, here are the detailed threat scenarios for your Azure environment:</p><ol><li><p><strong>Outdated Operating Systems in Virtual Machines</strong>:</p><ul><li><p><strong>Scenario</strong>: An attacker exploits a vulnerability in the outdated OS of a virtual machine. This breach allows the attacker to gain unauthorized access, potentially installing malware or using the VM as a pivot point for lateral movement within the network.</p></li><li><p><strong>Detection Focus</strong>: Monitor for signs of unusual activity, such as unexpected system access, changes in file integrity, or unusual network traffic patterns originating from these VMs.</p></li></ul></li><li><p><strong>Customer Database Vulnerabilities</strong>:</p><ul><li><p><strong>Scenario</strong>: A cybercriminal discovers and exploits a security flaw in the database, gaining unauthorized read and write access. The attacker could then exfiltrate sensitive customer data or manipulate database entries, leading to data integrity issues.</p></li><li><p><strong>Detection Focus</strong>: Implement stringent monitoring of database access logs, look for anomalous query patterns, and set up alerts for data extraction activities that deviate from the norm.</p></li></ul></li><li><p><strong>Payment Processing Service Vulnerabilities</strong>:</p><ul><li><p><strong>Scenario</strong>: An intruder targets the payment processing service, aiming to intercept or alter transaction data. This could involve injecting malicious code or initiating unauthorized transactions.</p></li><li><p><strong>Detection Focus</strong>: Keep a close watch on transaction logs, monitor for unexpected changes in transaction data or patterns, and track any unauthorized modifications to the service&#8217;s operational code.</p></li></ul></li></ol><p>Each scenario underscores the need for specific detection strategies, focusing on the most likely methods of exploitation and the potential impact of a breach. Implementing these targeted detection strategies will enhance your ability to identify and respond to incidents promptly, mitigating the risks to your Azure environment."</p><h1>Next Steps and Limitations</h1><p>With detailed threat scenarios in hand, the security operations team is in a position to work on what matters most. These scenarios can represent the requirements for monitoring the environment, driving the detection engineering backlog, tool selection, and which data sources should be collected. </p><p>It&#8217;s worth noting that this approach is the opposite of the &#8220;hoarding mentality&#8221; that often comes with new SOC initiatives such as starting a security data lake. In the example above, it&#8217;s clear that endpoint activity logs are less of a priority than network flow logs from the cloud environment, database monitoring records, or code change history. Those sources are urgent to collect because they support the detections that cover the threat scenarios we care about most.</p><p>While AI tools can provide valuable assistance with threat modeling, it's important to recognize their limitations. ChatGPT operates based on the data it has been trained on, and thus, it may not always be up-to-date with the latest threats or specific nuances of your unique environment. It should be viewed as a tool to augment, not replace, the expertise of cybersecurity professionals. Use ChatGPT to gather insights and generate ideas, but always couple these with human judgment and contextual understanding. Be mindful that AI-assisted threat modeling is part of a larger, comprehensive approach that includes human expertise, contextual analysis, and ongoing attention to developments in the threat landscape.</p><p>The significance of AI in cybersecurity, including ChatGPT, is expected to increase in the future. As the cybersecurity field matures, there will be a shift towards outcome-driven planning, where AI tools can help identify risks, model threats, predict incidents, and flag gaps. The integration of AI in cybersecurity operations will provide more dynamic, real-time decision-making capabilities, and better access to data, delivering value for the SOC. This, in turn, will drive initiatives to provide AI models with more access to information about the environment. To support this approach, SOCs will need a scalable and analytics-oriented architecture which can be achieved through the adoption of security data lakes. Therefore, security data lake adoption will play a key role in the shift toward AI-driven cybersecurity strategies.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.omeronsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Omer on Security! Subscribe for free to receive weekly guidance for your security data lake journey.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[New Years Resolution: Don't Lose Control]]></title><description><![CDATA[Making the most of a sure-to-be-crazy 2024]]></description><link>https://www.omeronsecurity.com/p/new-years-resolution-dont-lose-control</link><guid isPermaLink="false">https://www.omeronsecurity.com/p/new-years-resolution-dont-lose-control</guid><dc:creator><![CDATA[Omer Singer]]></dc:creator><pubDate>Thu, 04 Jan 2024 16:40:08 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!gPO6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F589c5752-2272-4ecf-aaa5-71742a2cce02_1024x790.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The start of the new year is an opportunity to break old habits and reflect on how you can become a better version of your old self. And 2024 is going to be the kind of year that puts us all to the test. If there&#8217;s one resolution I can add to your list, it&#8217;s to not lose control of your security program. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gPO6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F589c5752-2272-4ecf-aaa5-71742a2cce02_1024x790.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gPO6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F589c5752-2272-4ecf-aaa5-71742a2cce02_1024x790.jpeg 424w, https://substackcdn.com/image/fetch/$s_!gPO6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F589c5752-2272-4ecf-aaa5-71742a2cce02_1024x790.jpeg 848w, https://substackcdn.com/image/fetch/$s_!gPO6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F589c5752-2272-4ecf-aaa5-71742a2cce02_1024x790.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!gPO6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F589c5752-2272-4ecf-aaa5-71742a2cce02_1024x790.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gPO6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F589c5752-2272-4ecf-aaa5-71742a2cce02_1024x790.jpeg" width="1024" height="790" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/589c5752-2272-4ecf-aaa5-71742a2cce02_1024x790.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:790,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Fun Vintage Photos Show How People Celebrated New Year's Eve in 1930s to  1950s - Rare Historical Photos&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Fun Vintage Photos Show How People Celebrated New Year's Eve in 1930s to  1950s - Rare Historical Photos" title="Fun Vintage Photos Show How People Celebrated New Year's Eve in 1930s to  1950s - Rare Historical Photos" srcset="https://substackcdn.com/image/fetch/$s_!gPO6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F589c5752-2272-4ecf-aaa5-71742a2cce02_1024x790.jpeg 424w, https://substackcdn.com/image/fetch/$s_!gPO6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F589c5752-2272-4ecf-aaa5-71742a2cce02_1024x790.jpeg 848w, https://substackcdn.com/image/fetch/$s_!gPO6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F589c5752-2272-4ecf-aaa5-71742a2cce02_1024x790.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!gPO6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F589c5752-2272-4ecf-aaa5-71742a2cce02_1024x790.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: rarehistoricalphotos.com</figcaption></figure></div><p>As William Yeats wrote in the <a href="https://www.poetryfoundation.org/poems/43290/the-second-coming">The Second Coming</a>:</p><div class="pullquote"><p>Turning and turning in the widening gyre&nbsp;&nbsp;&nbsp;</p><p>The falcon cannot hear the falconer;</p><p>Things fall apart; the centre cannot hold;</p><p>Mere anarchy is loosed upon the world</p></div><p>He describes an old world dying and a new world being born. In 2024, security leaders will face challenges to their leadership and control from multiple directions. But these challenges also contain opportunities, so that leaders who navigate these challenges successfully could finish the year stronger than ever. Here are three areas to hold on tight and stay in control this year.</p><h2>&#129302; The GenAI Blackbox</h2><p>In the SOC, GenAI is crossing from hype to foundational without becoming any less of a blackbox. This is in contrast to the shift from on-prem to the cloud. That last Big Change&#8482; to the security operation actually provided new opportunities for visibility, with APIs to describe the environment in great detail and virtual snapshots for agent-less scanning. </p><p>Not so with GenAI. Consider that Microsoft has reported <a href="https://www.microsoft.com/en-us/security/blog/2023/11/08/insights-from-microsoft-security-copilot-early-adopters/">substantial efficiency gains</a> at early adopters, and Anvilogic has released <a href="https://www.youtube.com/watch?v=X8JLOuLgd58">natural language security data lake investigations</a>&#8212;but these SOC assistants depend on models that even their trainers would be hard-pressed to explain. If Tier 1 analysts are using a copilot to operate at Tier 3 level, are they operating at that level successfully? Threat detection and response is an area where a subtle mistake (for example in regex creation or command interpretation) can have significant repercussions. </p><p>This is not to say that advances in machine learning can&#8217;t be responsibly applied to security operations. But staying in control takes coupling copilot adoption with guardrails, tests and reviews. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ii6x!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff0440cf-9f43-4ea5-9e39-61186aa1cbe1_2392x1192.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ii6x!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff0440cf-9f43-4ea5-9e39-61186aa1cbe1_2392x1192.png 424w, https://substackcdn.com/image/fetch/$s_!ii6x!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff0440cf-9f43-4ea5-9e39-61186aa1cbe1_2392x1192.png 848w, https://substackcdn.com/image/fetch/$s_!ii6x!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff0440cf-9f43-4ea5-9e39-61186aa1cbe1_2392x1192.png 1272w, https://substackcdn.com/image/fetch/$s_!ii6x!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff0440cf-9f43-4ea5-9e39-61186aa1cbe1_2392x1192.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ii6x!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff0440cf-9f43-4ea5-9e39-61186aa1cbe1_2392x1192.png" width="1456" height="726" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ff0440cf-9f43-4ea5-9e39-61186aa1cbe1_2392x1192.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:726,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1748983,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ii6x!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff0440cf-9f43-4ea5-9e39-61186aa1cbe1_2392x1192.png 424w, https://substackcdn.com/image/fetch/$s_!ii6x!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff0440cf-9f43-4ea5-9e39-61186aa1cbe1_2392x1192.png 848w, https://substackcdn.com/image/fetch/$s_!ii6x!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff0440cf-9f43-4ea5-9e39-61186aa1cbe1_2392x1192.png 1272w, https://substackcdn.com/image/fetch/$s_!ii6x!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff0440cf-9f43-4ea5-9e39-61186aa1cbe1_2392x1192.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">GenAI being used to interpret a suspicious Powershell command (<a href="https://www.youtube.com/watch?v=X8JLOuLgd58">Source</a>)</figcaption></figure></div><p>Security organizations will find it increasingly important to harness the power of LLMs while mitigating the inevitable hallucinations and errors. Plus, the stakes are about to get higher. Online <a href="https://www.lesswrong.com/posts/BWMKzBunEhMGfpEgo/when-will-gpt-5-come-out-prediction-markets-vs-extrapolation">prediction markets</a> are betting real money that GPT-5 is coming this Fall, and will likely start supporting SOC work shortly after.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Jebv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf18f93a-3a87-4aaa-92fb-9e73c49b07ae_1170x424.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Jebv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf18f93a-3a87-4aaa-92fb-9e73c49b07ae_1170x424.webp 424w, https://substackcdn.com/image/fetch/$s_!Jebv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf18f93a-3a87-4aaa-92fb-9e73c49b07ae_1170x424.webp 848w, https://substackcdn.com/image/fetch/$s_!Jebv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf18f93a-3a87-4aaa-92fb-9e73c49b07ae_1170x424.webp 1272w, https://substackcdn.com/image/fetch/$s_!Jebv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf18f93a-3a87-4aaa-92fb-9e73c49b07ae_1170x424.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Jebv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf18f93a-3a87-4aaa-92fb-9e73c49b07ae_1170x424.webp" width="1170" height="424" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/af18f93a-3a87-4aaa-92fb-9e73c49b07ae_1170x424.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:424,&quot;width&quot;:1170,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:15976,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Jebv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf18f93a-3a87-4aaa-92fb-9e73c49b07ae_1170x424.webp 424w, https://substackcdn.com/image/fetch/$s_!Jebv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf18f93a-3a87-4aaa-92fb-9e73c49b07ae_1170x424.webp 848w, https://substackcdn.com/image/fetch/$s_!Jebv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf18f93a-3a87-4aaa-92fb-9e73c49b07ae_1170x424.webp 1272w, https://substackcdn.com/image/fetch/$s_!Jebv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf18f93a-3a87-4aaa-92fb-9e73c49b07ae_1170x424.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Predicted release date for GPT-5 (<a href="https://www.lesswrong.com/posts/BWMKzBunEhMGfpEgo/when-will-gpt-5-come-out-prediction-markets-vs-extrapolation">Source</a>)</figcaption></figure></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/upload/f_auto,q_auto/v1/mirroredImages/zX4iQGfk6rnis2dXR/yui1b7ik2aikbassxzza" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/upload/f_auto,q_auto/v1/mirroredImages/zX4iQGfk6rnis2dXR/yui1b7ik2aikbassxzza 424w, https://substackcdn.com/image/upload/f_auto,q_auto/v1/mirroredImages/zX4iQGfk6rnis2dXR/yui1b7ik2aikbassxzza 848w, https://substackcdn.com/image/upload/f_auto,q_auto/v1/mirroredImages/zX4iQGfk6rnis2dXR/yui1b7ik2aikbassxzza 1272w, https://substackcdn.com/image/upload/f_auto,q_auto/v1/mirroredImages/zX4iQGfk6rnis2dXR/yui1b7ik2aikbassxzza 1456w" sizes="100vw"><img src="https://substackcdn.com/image/upload/f_auto,q_auto/v1/mirroredImages/zX4iQGfk6rnis2dXR/yui1b7ik2aikbassxzza" data-attrs="{&quot;src&quot;:&quot;https://substackcdn.com/image/upload/f_auto,q_auto/v1/mirroredImages/zX4iQGfk6rnis2dXR/yui1b7ik2aikbassxzza&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/upload/f_auto,q_auto/v1/mirroredImages/zX4iQGfk6rnis2dXR/yui1b7ik2aikbassxzza 424w, https://substackcdn.com/image/upload/f_auto,q_auto/v1/mirroredImages/zX4iQGfk6rnis2dXR/yui1b7ik2aikbassxzza 848w, https://substackcdn.com/image/upload/f_auto,q_auto/v1/mirroredImages/zX4iQGfk6rnis2dXR/yui1b7ik2aikbassxzza 1272w, https://substackcdn.com/image/upload/f_auto,q_auto/v1/mirroredImages/zX4iQGfk6rnis2dXR/yui1b7ik2aikbassxzza 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.omeronsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.omeronsecurity.com/subscribe?"><span>Subscribe now</span></a></p><h2>&#129760; Mega Acquisitions and Startup Fire Sales</h2><p>A number of major deals shook up the security operations space over the past year. Notable examples include <a href="https://www.sumologic.com/press-release/francisco-partners-completes-acquisition-of-sumo-logic/">Francisco Partners taking over Sumo Logic</a> and <a href="https://www.reuters.com/technology/cyber-security-company-securonix-raises-1-bln-vista-led-round-2022-02-15/">Securonix going with Vista Equity Partners</a>. This trend is expected to continue in 2024. </p><p>When a private equity firm puts their money into a software provider, the expectation is that a return on investment will start to materialize on a set timeline. Customers of PE-owned companies need to be vigilant that the beancounter&#8217;s financial considerations don&#8217;t come at the expense of product capabilities and roadmap plans. </p><p>The biggest acquisition of the year, and <a href="https://www.cnbc.com/2023/09/21/cisco-acquiring-splunk-for-157-a-share-in-cash.html">Cisco&#8217;s largest ever</a>, was Splunk. By fronting $28 billion cash, Cisco made it clear that they are serious about cybersecurity. What that means for customers will emerge in 2024. As Splunk provides core infrastructure for many of the world&#8217;s largest security operations, leaders need to have a plan B in order to stay in control regardless of where Cisco takes things. </p><p>At the shallow end of the pool, cybersecurity startups had a rough 2023 and many are expected to tap out in 2024. After an incredible run that pushed valuations to eye-watering heights, cybersecurity funding dried up and conditions are such that <a href="https://www.scmagazine.com/perspective/cybersecurity-funding-in-2024-survival-of-the-financially-fittest">&#8220;only the toughest survive.&#8221;</a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qBmh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F187c9c6f-38a3-428a-a93d-1da5787d000d_1610x942.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qBmh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F187c9c6f-38a3-428a-a93d-1da5787d000d_1610x942.png 424w, https://substackcdn.com/image/fetch/$s_!qBmh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F187c9c6f-38a3-428a-a93d-1da5787d000d_1610x942.png 848w, https://substackcdn.com/image/fetch/$s_!qBmh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F187c9c6f-38a3-428a-a93d-1da5787d000d_1610x942.png 1272w, https://substackcdn.com/image/fetch/$s_!qBmh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F187c9c6f-38a3-428a-a93d-1da5787d000d_1610x942.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qBmh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F187c9c6f-38a3-428a-a93d-1da5787d000d_1610x942.png" width="1456" height="852" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/187c9c6f-38a3-428a-a93d-1da5787d000d_1610x942.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:852,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:154218,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qBmh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F187c9c6f-38a3-428a-a93d-1da5787d000d_1610x942.png 424w, https://substackcdn.com/image/fetch/$s_!qBmh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F187c9c6f-38a3-428a-a93d-1da5787d000d_1610x942.png 848w, https://substackcdn.com/image/fetch/$s_!qBmh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F187c9c6f-38a3-428a-a93d-1da5787d000d_1610x942.png 1272w, https://substackcdn.com/image/fetch/$s_!qBmh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F187c9c6f-38a3-428a-a93d-1da5787d000d_1610x942.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>For security organizations that have critical initiatives, frozen budgets and an eye to the ML opportunity, startups remain essential for success. Staying in control will therefore require security leaders to perform extra due diligence and procure wisely, with provisions that reduce the risk from a fire sale or liquidation event. These conditions also favor the &#8220;connected application&#8221; security data lake model, where the solution provider uses the customer&#8217;s data platform and lock-in is minimized at the data level. </p><h2>&#9876;&#65039; Wartime Madness </h2><p>The world is ringing in the new year with more conflict than at any time in recent memory. Ongoing wars, demonstrations and counter-demonstrations are sure to bleed into the cybersphere. During times of crisis and heightened uncertainty, staying in control requires a wartime mentality. </p><p>Now is a good time to revisit the basics: things like visibility and patching should take precedence over aspirational initiatives. Projects that require a lot of investment with fuzzy outcomes can be delayed in favor of fundamentals like detection coverage. </p><p>Attack vectors that favor grassroots or lone-wolf attackers should be threat modeled heavily. For example, <a href="https://www.bitdefender.com/blog/hotforsecurity/supply-chain-attack-detected-in-pypi-library/">Python supply chain attacks</a> that &#8220;allow even inexperienced attackers to use them as a platform to spread malware, whether through typosquatting, dependency confusion, or simple social engineering attacks&#8221; should be addressed through layered controls. </p><p>Security leaders should also take into account the mental impact of global war. Team members may be distracted, depressed or even personally affected by what&#8217;s happening outside the SOC. Take control of the situation by recognizing the tumultuous reality all around us, and launching positive initiatives to counter the negativity. 2024 could be the year that security analysts acquire new skills like data science or learn new languages like SQL. Eliminating busywork through automation could help improve the atmosphere of the SOC while also reducing risk from errors. </p><h2>Wish Us All Luck, We&#8217;ll Need It</h2><p>The signs point to a challenging year where the only certainty is that we&#8217;ll be surprised. Whether by the AI we rely on, the providers we buy from or the world we live in, strange stuff will happen. Security leaders should resolve to do what it takes to stay in control through these challenges. With the right approach, we can reach the halfway point of the decade stronger than we started it. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.omeronsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Omer on Security! Subscribe for free to receive new posts weekly.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The Detection Responsibility Handshake]]></title><description><![CDATA[How threat modeling supports smarter SIEM selection]]></description><link>https://www.omeronsecurity.com/p/the-detection-responsibility-handshake</link><guid isPermaLink="false">https://www.omeronsecurity.com/p/the-detection-responsibility-handshake</guid><dc:creator><![CDATA[Omer Singer]]></dc:creator><pubDate>Thu, 14 Dec 2023 16:07:20 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!aQbS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a62338d-7e3b-483b-925e-5edea98e4226_1080x1081.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Choosing a SIEM solution is a daunting process and most buyers miss an important part of the preparation. The typical SIEM RFP lists sources to collect, and ways to search and report. But that makes a risky assumption that the vendor will be able to turn those sources and features into effective threat detection. </p><p>As the SIEM space embraces new data lake technologies and heads into its biggest shakeup since moving to the cloud, it&#8217;s time for an outcome-based approach: meet the detection responsibility handshake.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!aQbS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a62338d-7e3b-483b-925e-5edea98e4226_1080x1081.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!aQbS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a62338d-7e3b-483b-925e-5edea98e4226_1080x1081.png 424w, https://substackcdn.com/image/fetch/$s_!aQbS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a62338d-7e3b-483b-925e-5edea98e4226_1080x1081.png 848w, https://substackcdn.com/image/fetch/$s_!aQbS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a62338d-7e3b-483b-925e-5edea98e4226_1080x1081.png 1272w, https://substackcdn.com/image/fetch/$s_!aQbS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a62338d-7e3b-483b-925e-5edea98e4226_1080x1081.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!aQbS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a62338d-7e3b-483b-925e-5edea98e4226_1080x1081.png" width="1080" height="1081" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7a62338d-7e3b-483b-925e-5edea98e4226_1080x1081.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1081,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:577171,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!aQbS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a62338d-7e3b-483b-925e-5edea98e4226_1080x1081.png 424w, https://substackcdn.com/image/fetch/$s_!aQbS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a62338d-7e3b-483b-925e-5edea98e4226_1080x1081.png 848w, https://substackcdn.com/image/fetch/$s_!aQbS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a62338d-7e3b-483b-925e-5edea98e4226_1080x1081.png 1272w, https://substackcdn.com/image/fetch/$s_!aQbS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a62338d-7e3b-483b-925e-5edea98e4226_1080x1081.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.omeronsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.omeronsecurity.com/subscribe?"><span>Subscribe now</span></a></p><h2>SIEM Evaluation&#8217;s Missing Link</h2><p>When considering a move from one SIEM to another, how do we figure out which is the right one for us? Each competitor will say that theirs is the best. The temptation is to stack each solution&#8217;s supported sources, detection rules and behavioral models and then see who&#8217;s got more. As if we buy security content by the pound.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lSah!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ba76906-95c8-4deb-b13b-d335cf2133e3_2314x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lSah!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ba76906-95c8-4deb-b13b-d335cf2133e3_2314x300.png 424w, https://substackcdn.com/image/fetch/$s_!lSah!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ba76906-95c8-4deb-b13b-d335cf2133e3_2314x300.png 848w, https://substackcdn.com/image/fetch/$s_!lSah!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ba76906-95c8-4deb-b13b-d335cf2133e3_2314x300.png 1272w, https://substackcdn.com/image/fetch/$s_!lSah!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ba76906-95c8-4deb-b13b-d335cf2133e3_2314x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lSah!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ba76906-95c8-4deb-b13b-d335cf2133e3_2314x300.png" width="1456" height="189" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5ba76906-95c8-4deb-b13b-d335cf2133e3_2314x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:189,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:78875,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!lSah!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ba76906-95c8-4deb-b13b-d335cf2133e3_2314x300.png 424w, https://substackcdn.com/image/fetch/$s_!lSah!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ba76906-95c8-4deb-b13b-d335cf2133e3_2314x300.png 848w, https://substackcdn.com/image/fetch/$s_!lSah!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ba76906-95c8-4deb-b13b-d335cf2133e3_2314x300.png 1272w, https://substackcdn.com/image/fetch/$s_!lSah!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ba76906-95c8-4deb-b13b-d335cf2133e3_2314x300.png 1456w" sizes="100vw"></picture><div></div></div></a><figcaption class="image-caption">Content measured by the pound</figcaption></figure></div><p>The problem with this approach is that it assumes that within those thousands of detections are the ones we need. After all, we&#8217;re buying the SIEM so we can catch attacks in our environment&#8212;not in the vendor&#8217;s demo. </p><p>In my previous experience buying a SOC platform, I had the team put it to the test by running a red team exercise during the POC. This gave us a chance to see if the product could turn the data it collects into alerts we could respond to. But a red team exercise is still limited in how many TTPs it can simulate, making it more of a &#8220;sanity check&#8221; than an comprehensive comparison method.</p><p>We can be smarter about selecting security operations tooling. Instead of letting the vendor check RFP boxes and sell us content by the pound, we can define evaluation criteria in terms of the outcomes we&#8217;re looking to achieve. Here&#8217;s how that works.</p><h2>The Detection Responsibility Handshake</h2><p>The savvy SIEM buyer comes prepared with threat models for their environment. These threat models represent the prioritized concerns of the security team based on the threat landscape, the organization&#8217;s environment and its crown jewels. The &#8220;detection responsibility handshake&#8221; is where the customer&#8217;s threat models are presented as requirements to the vendor, who must then meet those requirements with threat scenarios that are covered by the solution. Rule quantity is replaced with how well the solution can protect the individual customer.</p><p>This approach puts more work up front on the evaluating security team. I would argue that&#8217;s a good thing, and that the time spent creating threat models is where domain expertise is built and maintained. In a recent <a href="https://www.linkedin.com/posts/omer-singer_does-anyone-build-threat-models-or-are-we-activity-7140102188181159939-aJbm?utm_source=share&amp;utm_medium=member_desktop">poll</a> that I ran on LinkedIn, around half of respondents reported using threat models in their security operation. Spending hundreds of thousands, often millions of dollars, on a SIEM solution without first building  threat models is gambling with the company&#8217;s money.</p><p>If you&#8217;re wondering how to get started, there are great resources available on threat modeling. CrowdStrike, for example, kicks off its <a href="https://www.crowdstrike.com/cybersecurity-101/observability/detection-engineering/">detection engineering overview</a> by explaining that &#8220;detection engineering starts with threat modeling &#8211; identifying the threats that are relevant to your organization.&#8221; The federal agency CMS (whose CISO Robert Wood created the awesome resource <a href="https://www.softsideofcyber.com/">Soft Side of Cyber</a>) has published their internal <a href="https://security.cms.gov/policy-guidance/threat-modeling-handbook">threat modeling handbook</a>, with links to several established frameworks. </p><p>The customer side of the detection responsibility handshake flows likes this:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZIQU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb9c55a4-7ddb-45c7-82a7-9ff440fa2fa5_260x592.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZIQU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb9c55a4-7ddb-45c7-82a7-9ff440fa2fa5_260x592.png 424w, https://substackcdn.com/image/fetch/$s_!ZIQU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb9c55a4-7ddb-45c7-82a7-9ff440fa2fa5_260x592.png 848w, https://substackcdn.com/image/fetch/$s_!ZIQU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb9c55a4-7ddb-45c7-82a7-9ff440fa2fa5_260x592.png 1272w, https://substackcdn.com/image/fetch/$s_!ZIQU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb9c55a4-7ddb-45c7-82a7-9ff440fa2fa5_260x592.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZIQU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb9c55a4-7ddb-45c7-82a7-9ff440fa2fa5_260x592.png" width="260" height="592" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/eb9c55a4-7ddb-45c7-82a7-9ff440fa2fa5_260x592.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:592,&quot;width&quot;:260,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:64270,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ZIQU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb9c55a4-7ddb-45c7-82a7-9ff440fa2fa5_260x592.png 424w, https://substackcdn.com/image/fetch/$s_!ZIQU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb9c55a4-7ddb-45c7-82a7-9ff440fa2fa5_260x592.png 848w, https://substackcdn.com/image/fetch/$s_!ZIQU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb9c55a4-7ddb-45c7-82a7-9ff440fa2fa5_260x592.png 1272w, https://substackcdn.com/image/fetch/$s_!ZIQU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb9c55a4-7ddb-45c7-82a7-9ff440fa2fa5_260x592.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">The customer&#8217;s side of the responsibility handshake</figcaption></figure></div><ol><li><p><strong>Threats</strong>: Who is attacking organizations like ours and what are their capabilities?</p></li><li><p><strong>Vulnerabilities: </strong>Where are we exposed to attacks from these threats? </p></li><li><p><strong>Risk Analysis:</strong> Based on the threats we&#8217;re facing and our current security posture, what are the biggest risks to our organization?</p></li><li><p><strong><a href="https://cltc.berkeley.edu/about-us/citizen-clinic/citizen-clinic-cybersecurity-education-center/threat-scenario-development/">Scenario Development:</a></strong> What attack scenarios does our analysis indicate we should prioritize? </p></li></ol><p>This process can establish an informed foundation for everything that the security team chooses to do and not to do. That can include the SIEM selection process. It becomes a &#8220;handshake&#8221; by presenting the scenarios to the vendor as requirements. </p><h2>Working the Detection Responsibility Handshake</h2><p>To see how the handshake can work in practice, consider the following attack scenarios developed during threat modeling at a large financial services organization:</p><h4>1. Spear Phishing Targeting Financial Executives</h4><p>Targeting high-level executives with sophisticated email campaigns to gain access to sensitive financial data and systems.</p><h4>2. Cloud Storage Data Exfiltration</h4><p>Unauthorized extraction of sensitive data due to misconfigured cloud storage permissions or compromised cloud service accounts.</p><h4>3. Third-Party Vendor Network Breach</h4><p>A cyberattack on a third-party vendor leading to backdoor entry into the network.</p><h4>4. Insider Threat Leading to Data Leak</h4><p>Actions by an employee, either malicious or negligent, resulting in sensitive data being leaked or exposed.</p><h4>5. Credential Stuffing Attack on Customer Portals</h4><p>Automated attempts using stolen credentials to gain unauthorized access to customer accounts.</p><h4>6. APTs via Compromised Remote Access Tools</h4><p>Long-term, covert operations exploiting vulnerabilities in remote desktop or VPN tools to maintain persistent access.</p><h4>7. Cryptomining Malware Infiltration in Enterprise Systems</h4><p>A scenario where systems are covertly infiltrated with cryptomining malware. This could happen through phishing, compromised software updates, or exploiting vulnerabilities in network defenses. The malware uses the institution's computing resources to mine cryptocurrency, potentially leading to system slowdowns, increased energy consumption, and compromised system integrity.</p><h4>8. Breach of AWS Environment Leading to Data and System Compromise </h4><p>Attackers gain unauthorized access to the AWS cloud environment, possibly through compromised credentials or exploiting misconfigurations. This breach could lead to extensive data theft, manipulation of financial transactions, and unauthorized access to critical cloud-hosted applications. </p><h4>9. Compromise of Identity Provider </h4><p>A compromised administrative account in an identity provider like Okta, leading to widespread access to multiple systems and data breaches.</p><h4>10. Supply Chain Compromise of Mobile App</h4><p>An attack targeting the software supply chain involved in the development of the company&#8217;s mobile application. This could involve the infiltration of a backdoor into a third-party library used in the app. The end result is a compromised mobile banking application, allowing threat actors to access sensitive customer data and perform unauthorized transactions.</p><p>In the visual at the top of the post, these would be the prioritized requirements sent across the "responsibility boundary&#8221; from the security team to the vendor.</p><h2>Putting the Vendor on the Hook</h2><p>At this point, we&#8217;ve presented what we care about as a security team. Now the vendor&#8217;s work can begin. Instead of talking about what data sources they support, the vendor must address the specific scenarios that we&#8217;ve developed and presented.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Fg0U!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc503da32-6f92-4723-b9c6-2282dce12483_241x583.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Fg0U!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc503da32-6f92-4723-b9c6-2282dce12483_241x583.png 424w, https://substackcdn.com/image/fetch/$s_!Fg0U!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc503da32-6f92-4723-b9c6-2282dce12483_241x583.png 848w, https://substackcdn.com/image/fetch/$s_!Fg0U!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc503da32-6f92-4723-b9c6-2282dce12483_241x583.png 1272w, https://substackcdn.com/image/fetch/$s_!Fg0U!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc503da32-6f92-4723-b9c6-2282dce12483_241x583.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Fg0U!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc503da32-6f92-4723-b9c6-2282dce12483_241x583.png" width="241" height="583" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c503da32-6f92-4723-b9c6-2282dce12483_241x583.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:583,&quot;width&quot;:241,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:59405,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Fg0U!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc503da32-6f92-4723-b9c6-2282dce12483_241x583.png 424w, https://substackcdn.com/image/fetch/$s_!Fg0U!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc503da32-6f92-4723-b9c6-2282dce12483_241x583.png 848w, https://substackcdn.com/image/fetch/$s_!Fg0U!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc503da32-6f92-4723-b9c6-2282dce12483_241x583.png 1272w, https://substackcdn.com/image/fetch/$s_!Fg0U!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc503da32-6f92-4723-b9c6-2282dce12483_241x583.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">The vendor&#8217;s side of the responsibility handshake</figcaption></figure></div><p>For each of our threat modeled scenarios, the vendor should map its <a href="https://www.anvilogic.com/learn/building-trust-with-detections-patterns">prebuilt scenario detections</a>. These scenarios should be covered by threat identifiers, each of which combines rules and required data sources. Working backwards from prioritized threat scenarios reveals which sources are important for the organization to collect. This is in contrast to a typical SIEM evaluation that leans on the question &#8220;what sources do you support?&#8221;</p><p>If we&#8217;ve identified cryptomining as a top concern, for example, then the vendor can show that they have a detection scenario called &#8220;Cryptomining Activity Identification&#8221;. This scenario includes threat identifiers such as:</p><ul><li><p>Unexpected high CPU usage on individual machines or across the network.</p></li><li><p>Unusual system behavior, like slowing down of devices.</p></li><li><p>Detection of cryptomining scripts in web traffic or on endpoints.</p></li><li><p>Network traffic to known cryptomining pools or domains.</p></li></ul><p>Now we can dig into how the vendor detect the presence of these threat identifiers. We might see rules like &#8220;CPU usage exceeds threshold&#8221; or &#8220;CPU usage exceeds baseline&#8221;. And the vendor would then explain that for our AWS environment, CloudWatch needs to be collected for the <a href="https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/viewing_metrics_with_cloudwatch.html">EC2 metric</a> &#8220;CPUUtilization&#8221;. This process would repeat across the threat modeled scenarios and the corresponding detections in the solution. Some gaps are to be expected and these can be considered when comparing solutions.</p><p>The detection responsibility handshake provides us with a clear understanding of what we need to collect, why we need it and how it will help us to protect the organization. When the SIEM buyer takes this approach, the vendor is on the hook to prove that their content, capabilities and integrations cover what really matters. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.omeronsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Omer on Security! Subscribe for free to receive new posts weekly.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>