What exactly is Autonomic Security Operations (ASO), and why do many of the best minds in cybersecurity think it’s the future of security operations?
This guide will give you an overview of key concepts and terms, explain why and when ASO is important, and point you to resources to learn more and help you get started on your ASO journey.
As described in “Autonomic Security Operations: 10X Transformation of the Security Operations Center” by cybersecurity leaders Anton Chuvakin, senior security staff, Office of the CISO at Google, and Iman Ghanizada, global head of Autonomic Security at Google, ASO is a new approach for improving an organization's security posture and reducing risk. It addresses the increasingly difficult issues traditional Security Operations Centers (SOCs) face — including alert fatigue, false positives (and false negatives!), talent deficit, turnover and burnout. Issues that are hindering organizations from winning the war against ubiquitous threat actors, insider risk, misconfiguration, and configuration drift.
Chuvakin and Ghanizada position ASO as “a combination of philosophies, practices, and tools that improve an organization’s ability to withstand security attacks through an adaptive, agile, and highly automated approach to threat management.”[1]
ASO uses automation, machine learning (ML), and artificial intelligence (AI) to minimize the need for human intervention while improving the effectiveness and efficiency of cybersecurity operations.
“Autonomic” computing refers to the idea of creating self-managing and self-healing computing systems. Think of it not just as a self-driving car, but a self-driving car that can also adjust and repair its own engine without disruption.
In security operations, autonomic capabilities go beyond automating repetitive tasks to free up resources. They also enable intelligent detection and response to security threats and improve risk management.
Key capabilities of ASO include:
Once again, it’s about ASO using automation, AI/ML, and advanced intelligence and analytics to increase the efficiency and effectiveness of cybersecurity in a modern, connected, and cloud-centric world. By focusing on automating repetitive and manual work, faster threat detection and response, and increased situational awareness, companies can reduce risk and protect their most valuable assets.
Autonomous vs. Autonomic |
|
“Autonomous” and “autonomic” often show up as synonyms, but in technology terms, they convey different meanings. |
Autonomic computing is not only about operating independently, but also having the awareness and adaptability to respond to its environment. Defined by IBM in a 2001 manifesto, “The Vision of Autonomic Computing,” there are four areas of autonomic computing: self-configuration, self-healing, self-optimization, and self-protection.[2] A car that could self-tune and refuel without intervention would be operating autonomically. |
Key characteristics of every autonomic computing system are “automation, adaptivity, and awareness.” The concept itself is not new. In fact, IBM published a manifesto about it more than 20 years ago.[3]
However, the exponential shifts in computing power and scale over the past two decades have made it increasingly apparent that organizations must transform the way they secure and operate if they are to survive, never mind grow and scale. Today, there are two critical trends driving the need for a shift to autonomic security operations sooner rather than later:
Traditional SOCs are just not set up to address these challenges. They face a shortage of talent and skills to run the tools and systems they already have. They operate with processes that aren’t designed to meet cloud-centric and hybrid workload needs. And they’re tasked with managing an existing arsenal of typically isolated tools and technologies that do not and cannot streamline and support detection and response at scale.
Likewise, standardized, one-size-fits-all MDR solutions have proven inadequate because they are unable to continuously customize services to address the unique and evolving needs of their customers within a dynamic threat landscape.
Digital transformation drives the need for security transformation |
Attackers evolve faster than security and IT organizations |
Traditional SOC issues | Autonomic Security Operations |
|
|
A key goal of ASO is process automation and use of more cloud-native technologies and adaptive solutions that can address the expanding attack surface and manage modern threats at cloud scale. So how can you get started?
If getting started with ASO seems like an insurmountable task, it doesn’t have to be. While the Google paper indicates a need for 10x the resources currently in place, it’s really about getting to 10x the productivity — and it is possible to do that by taking advantage of specific services and technologies, such as Netenrich Adaptive MDR™, powered by Resolution Intelligence Cloud™. This solution leverages automation, machine learning, and other capabilities to drastically increase productivity, pivoting away from traditional SOC and standardized MDR models (aka 24/7 alert monitoring) to focus on high-priority issues and proactive threat hunting.
Getting started with ASO requires:
An effective strategy for achieving these tasks involves leveraging automation technology, streamlining processes, maintaining direct communication with all relevant personnel within the organization (with the right roles and system access), and aligning initiatives with overarching business needs. The approach enables process automation and remediation while empowering the organization to make informed decisions.
Achieving a state of ASO, as Google's Chuvakin and Ghanizada note, requires a combination of philosophies, practices, and tools that will improve an organization's ability to recognize the important threats, withstand security attacks, and have full visibility across their entire infrastructure. As part of this, they see a need to shift perspective on security operations to be more like Site Reliability Engineering (SRE), whereby teams spend 50% of their time on operations and 50% on automation with a relentless focus on reducing "toil." Per Chuvakin and Ghanizada, “Detection engineers develop solutions to solve detection challenges at scale and not shuffle through traditional analyst workflows. They also manage the alerts their solutions create, and use that data to further refine their detection logic.”
By implementing a solution such as Netenrich Adaptive MDR, organizations can take a first step toward automating operations and security processes and workflows. This solution seamlessly integrates our agile, engineering-centric approach and MDR expertise with Google SecOps technologies (SIEM, SOAR, Mandiant, and more) and operates on a continuous, agile engineering loop of three key disciplines — data engineering, detection engineering, and response engineering — to deliver adaptive, customized, and comprehensive protection.
Additionally, powered by our cloud-native Resolution Intelligence Cloud™ technology, which operates at Google speed and scale with minimal operational overhead, we can focus on solving customers’ current security challenges and quickly adapt to meet their evolving requirements.
Further, Resolution Intelligence Cloud allows customers to address the need for a flexible and scalable security foundation — for example, a cybersecurity mesh architecture (CSMA) — and leverages the MITRE ATT&CK Framework to improve threat detection and incident response.
If you’re looking to “future proof” your approach to securing your organization's digital operations and want to learn more about how to achieve ASO with Netenrich Adaptive MDR, check out the resources below or contact us.
For years, security vendors have been engineering detections (aka alerts) based on external global data and what they believe is important. Consequently, organizations need to hire a lot of people (aka a SOC) to sift through the tremendous amount of noise these broad detections create. Most SOCs are in panic-driven reaction mode, with too many tier-one analysts spending the majority of their time triaging a mountain of non-contextualized alerts (aka 24/7 monitoring).
Achieving ASO begins with metrics and data quality. That’s why Netenrich focuses on filtering, analyzing, and proofing data for quality and then, continuously designing, redesigning, adapting, and finetuning detections that are unique to organizations’ business to reduce noise and ensure high-fidelity signals.
Netenrich also focuses on quantifiably managing risk by using advanced data analytics and machine learning algorithms to monitor and tune processes and systems. The goal is to understand what’s normal and acceptable across environments so we can engineer detections that drastically reduce false positives while also performing control engineering on the backend to make continual improvements and ensure optimal efficiency.
Additionally, with Resolution Intelligence Cloud, we can automate, for example, log analysis, patch management, and vulnerability scanning while also crunching alerts down to a manageable number shorten response pipelines and focus more time on other higher-priority tasks.
|
Data VisibilityData quality begins with data visibility. This step is about discovering what’s in an environment and determining what data to collect. |
|
Security AnalyticsSecurity analytics is about gaining situational awareness and quantifying risk. At Netenrich, we use behavioral modeling to create deeper risk profiles and perform enrichment on particular events or assets to gain greater context before tying it all together to better understand potential impact. |
|
Intelligent RoutingIntelligent routing means getting the right information to the right people at the right time. Resolution Intelligence Cloud allows us to customize impact-based escalation policies that dictate the distribution of actionable insights (ActOns) to relevant individuals for review and response. |
|
Response OrchestrationFor response orchestration, we automate data aggregation and analysis to reduce manual toil and free teams to work on more challenging work. When we route an alert to an end user, that user has a clear picture of what’s affected, what the impact is, and what the associated threat intelligence is. This actionable intelligence is also tied into a collaborative workbench, where users can bring in other relevant decision-makers. |
|
Continuous FeedbackNetenrich is constantly measuring various metrics and reviewing historical trends to improve data quality and adapt workflows. From every lesson learned, we tune systems and make changes to improve processes and ultimately, achieve specific organizational KPIs. |
Tune in to this video playlist to learn how you can leverage Resolution Intelligence Cloud to implement an ASO framework and better secure your organization.
Google Cloud security specialists Dr. Anton Chuvakin and Timothy Peacock lead a challenging discussion about modern-day SIEM. David Swift, a Netenrich expert, joins them to share real-world observations on the daily threat hunting and threat research grind.
[1] “Autonomic Security Operations: 10X Transformation of the Security Operations Center,” Iman Ghanizada and Dr. Anton Chuvakin, 2023.
[2] “The Vision of Autonomic Computing,” Jeffrey Kephart and David Chess, IBM, 2001.
[3] Techopedia: Autonomic Computing