HomeCyber BalkansDetection Engineering in the Post SIEM and SOAR Era

Detection Engineering in the Post SIEM and SOAR Era

Published on

spot_img

In a bold move to achieve FEDRAMP compliance, a security team chose to forgo the traditional Security Information and Event Management (SIEM) system and create a green field environment. This decision was driven by the desire to eliminate patching requirements and the lack of a FEDRAMP-compliant off-the-shelf SIEM solution. Despite the challenges this unconventional approach presented, the team successfully navigated the complexities of maintaining security and compliance without a SIEM.

The team strategically divided the functionalities typically provided by a SIEM among different components within the architecture. By leveraging AWS S3 for storage and deploying Lambda functions to aggregate logs from various sources, they were able to effectively manage the environment with minimal resources. Close collaboration with all departments ensured that logs were collected in standardized formats and that the environment was operated through CI/CD pipelines, making the correlation of production alerts and change tickets seamless.

While this approach proved successful within FEDRAMP environments, replicating the same architecture outside of such environments posed significant challenges. The rise of SIEM and Security Orchestration, Automation, and Response (SOAR) technologies in mainstream security engineering can be attributed to the difficulties faced when trying to implement similar strategies in different contexts.

The complexities of enforcing uniform log formats across diverse sources, writing rules for vendor-specific log formats, and centralizing intelligence in the absence of a SIEM highlight the importance of these technologies in contemporary security operations. However, envisioning a world where event and state data are neatly organized in structured JSON format opens up new possibilities for rethinking security detection methodologies.

GenAI offers solutions to key technical challenges by normalizing unstructured log data into structured schemas, correlating logs to identify patterns, and executing precise queries to detect emerging threats. By utilizing callable functions, GenAI simplifies the process of parsing and analyzing logs, allowing security engineers to focus on developing detection mechanisms rather than grappling with complex SIEM configurations.

This innovative approach not only makes detection engineering possible without traditional SIEM and SOAR systems but also empowers security professionals to proactively address emerging threats through precise and efficient query mechanisms. By shifting the focus from managing SIEM and writing SOAR playbooks to developing effective detection strategies, organizations can enhance their security posture and stay ahead of evolving cyber threats.

Venkat Pothamsetty, the CTO of Network Intelligence, brings a wealth of experience in product development and security leadership to the table. With a track record of guiding companies through successful exits and leading high-energy teams to deliver top-notch products, Venkat’s insights shed light on the potential of innovative approaches to security engineering in a post-SIEM and SOAR world.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...