A new study, conducted by 360Velocity and Dr. Chenxi Wang, found that excessive alerts, outdated metrics, and limited integration lead to over-taxed security operations centers (SOCs).
SOCs are overwhelmed
The study was conducted over the span of three months, interviewing security practitioners from enterprise companies in a cross-section of industries: Software-as-a-Service (SaaS), retail, financial services, healthcare, consumer services, and high tech.
As the threat landscape changes and enterprises move to adopt additional layers of defensive technologies, SOCs are being overwhelmed by the sheer volume of alerts and the number of investigations that require their attention. Furthermore, the study, found that in addition to a capacity issue, SOCs are facing a skills gap/training issue, as many organizations struggled to recruit, train, and retain qualified SOC analysts.
“The study findings are only further proof that with a rising threat landscape, continued constraints on both the availability and bandwidth of well-trained SOC analysts, SOCs are increasingly burdened,” said Tim Roddy, VP of cybersecurity product strategy at Fidelis Cybersecurity. “Organizations need to look at automating common tasks, integrating network visibility with endpoint detection and response, and shifting the focus from identifying signatures and indicators to attacker Techniques, Tactics, and Procedures.”
Other key findings
SOC analysts are being overwhelmed by alerts: Alerts and incidents are skyrocketing, but most SOC analysts (60 percent) can only handle between 7-8 investigations in a day. Only 10 percent of organizations said they can realistically handle 8-10 investigations in a day.
Integration is key for SOC automation, efficiency, and effectiveness: Seventy percent of survey respondents said that at least half of their security controls were NOT integrated. Lack of integration impedes not only the speed of investigation, but also the speed of remediation and control. The survey results showed a correlation between the companies that achieved a high alert triaging rate and those that have more integrated security controls.
Automation is not only becoming increasingly important for SOCs, but mandatory: A big theme in security operations today is automation. Increasing automation can lead to improved efficiency, reduced dwell time, and ultimately, better performance for security operations. Unfortunately, without automation, alert triaging can be a tedious process, which is why 83 percent of the companies had less than 50 percent of the alerts triaged daily.
SOC and Incident Response metrics are outdated and ineffective: Every organization interviewed uses metrics to measure SOC and Incident Response (IR) effectiveness. However, 80 percent feel that the metrics they are using today are ‘not effective’ or ‘had room for improvement.’
Threat hunting is an elite operation that exists only in the largest and most sophisticated organizations: Only 17 percent of organizations have a dedicated threat hunting team.
Our study uncovered a number of notable findings,” said Wang. “For organizations that want to operate efficient, highly effective security operations, we recommend following best practices such as automating tier 1 and tier 2 analysts tasks, identifying further opportunities to eliminate manual tasks, and standardize processes and procedures for threat detection and response.”