Back to news

July 13, 2020 | International, C4ISR, Security

Making DoD Security Operations Centers More Effective: Security Automation

Security orchestration, automation, and response (SOAR) software frees DoD analysts to apply cognitive skills to actually fixing problems.

By SPLUNKon July 10, 2020 at 6:39 PM

The Defense Department's most recent National Defense Strategy (NDS) describes a complex military environment characterized by increased global disorder, a decline in the long-standing rules-based international order, myriad threats from rogue states like Iran and North Korea, great power peers like China and Russia, malicious hackers, and terrorists in places like Yemen. One of the military domains where this dynamic is most evident is cyberspace, where bad actors arguably have comparable or better cyber capabilities than us.

“This increasingly complex security environment is defined by rapid technological change, challenges from adversaries in every operating domain, and the impact on current readiness from the longest continuous stretch of armed conflict in our nation's history,” the NDS states. “In this environment, there can be no complacency—we must make difficult choices and prioritize what is most important...”

More cybersecurity threats mean more cyberattacks on DoD networks. Essye Miller, former principal deputy for the DoD CIO, said recently that attacks on department networks are surging and that the attack surface is expanding as adversaries target DoD employees working from home during the coronavirus pandemic.

This surge in cyberattacks means that analysts working in DoD information security operations centers (SOCs) are being bombarded with security alerts. With so many events, it's hard for them to differentiate true alerts from false ones, and to determine which events are priorities to address immediately. Through no fault of their own, they end up chasing their tail when their time could be better spent on mission-critical activities that directly support warfighters.

The solution for this domain is automation. While popular in commercial software segments for years—including SalesForce automation, marketing automation, human resources automation, and IT automation—DoD security teams are just beginning to realize the benefits of what's known as security orchestration, automation, and response.

The Value of Security Automation

“Automation is nothing new to the military. The Defense Department is making great inroads into DevSecOps, for example,” explained Drew Church, senior security advisor at Splunk, referring to an agile software development process where software is quickly developed, tested, and improved over weeks and months rather than years. “A key, fundamental concept of DevSecOps is automation. The point of automation in DevSecOps is to bring together different technologies, tools, people, and processes to develop code and get it out to the war fighter more rapidly.

“Automation provides that same capability inside IT operations procedures, security operations procedures, and other business processes,” said church. “It does this in a reliable and repeatable fashion every time, and at speed and scale.”

Splunk's SOAR solution is called Phantom. It helps security teams work to identify, analyze, and mitigate threats facing their organizations. It can be used to improve efficiency, shorten incident response times and reduce the growing backlog of security incidents, even when there's a shortfall of DoD security personnel to analyze the volume of daily security alerts.

Phantom does so by integrating teams, processes, and tools, and by automating tasks, orchestrating workflows, and supporting a range of SOC functions to include event and case management, collaboration, and reporting.

In essence, it frees SOC analysts of the usual Tier I-type activities of gathering data from the security information and event management (SIEM) platform, prioritizing these alerts, performing triage to determine if an alert is real or a false alarm, configuring and managing security monitoring tools, and generating trouble tickets.

Instead, Splunk Phantom lets them spend more time on the value-added work of Tier II SOC analysts. This includes actually investigating the trouble tickets, responding to incidents, and leveraging threat intelligence to better understand the threat and be proactive rather than reactive.

“Focusing on the bureaucracy of security rather than the actual doing of security limits the effectiveness of security analysts,” said Church. “Better to free them of the tasks that can be easily automated like reviewing IP addresses, domain names, and URLs so that they can be force multipliers in conducting the thoughtful work needed to protect DoD networks.

“That automation is done for them in Phantom. It let's analysts focus on investigating and taking remediation or mitigation steps as appropriate. Where humans excel is in actually thinking through a problem. Copying and pasting from websites, emails, and reports is not the most effective use of a highly paid, resource-limited talent pool.”

Integration With Existing SOC Tools

SOC analysts make their decisions by gathering information. They sometimes review classified military intelligence, but usually they look at a lot of open-source information and data from commercial off-the-shelf products from myriad providers of cybersecurity threat intelligence products.

Some of the common ones that are relevant to the Defense Department include: McAfee's ePolicy Orchestrator, which the DoD refers to as Host Based Security Systems (HBSS); and Tenable's Security Center, which is known inside the DoD as Assured Compliance Assessment Solution (ACAS).

Splunk Phantom has more than 300 out-of-the-box integrations with products like HBSS and ACAS.

“Being integrated with each of those products permits the analyst to get the information they need without having to go to another browser window, or another tab, or a different computer,” said Church. “Phantom automatically brings all that data to the analyst. That takes somebody who spends most of their time copying information from page A into system B and lets them make more rapid and accurate determinations about the threat.”

Through the use of APIs (application programming interface), that same integration is also found with government off-the-shelf (GOTs) solutions that haven't before been integrated with Splunk Phantom because there was never a request to do so. The same goes for a custom app created by a DevSecOps shop like the Air Force's Kessel Run project in Boston, for example.

Automating these vital but drudgerous processes also pays dividends during both staffing shortfalls and times of surge, and brings consistency to SOC activities. Military service members are constantly rotating and changing duty stations; senior leadership turns over regularly. Contractors have to be relied upon to provide continuity from tour to tour.

That means that SOC processes that were well oiled on a Monday may no longer be operating smoothly on Friday because of a change of command. Or maybe there is a compelling event that grabs everyone's attention. Or possibly there are legal or policy requirements that need to be addressed, and though they don't add mission value they still must be completed.

Automation by Splunk Phantom smooths out the bumps associated with those all-to-common scenarios by keeping the flow of vital data moving to where it can be acted upon best.

“The computer's running the marathon for you so that you are free to sprint and swarm on the problems that need the most resources at any particular time,” said Church.

The Takeaway

For security analysts, incident handlers/responders, IT operations managers, security operations managers, and forward-leaning business process experts, Splunk Phantom is all about removing barriers so people can get back to accomplishing the mission, maximizing productivity of skilled personnel and organizations.

“For anybody that has a business process, a mission process, an IT operations process, or a security process and wants to free those skilled workers to get back to what you brought them onboard to do, we can help you with that,” said Church. “We do that through orchestration, we do that through automation. We bring in collaboration, and we're able to do that at scale because of the value that a company like Splunk brings to the table. By being able to have a rich ecosystem of partners and support across the board, we're able to do that even with differences from organization to organization.”

Splunk Phantom addresses technology-based processes, and orchestrates and automates those processes to get people back to doing what they do best.

https://breakingdefense.com/2020/07/making-dod-security-operations-centers-more-effective-security-automation/

On the same subject

  • BAE Systems awarded contract to maintain and repair light guns in Ukraine

    April 15, 2024 | International, Land

    BAE Systems awarded contract to maintain and repair light guns in Ukraine

    The L119 Light Gun has proved to be a trusted system that Ukrainian forces have favoured because of its accurate firepower, light weight, low logistical requirements and mobility.

  • MIT, USAF Sign Agreement To Launch AI Accelerator

    May 31, 2019 | International, Aerospace, C4ISR

    MIT, USAF Sign Agreement To Launch AI Accelerator

    New Program Will Focus On Rapid Deployment Of Artificial Intelligence Innovations In Operations, Disaster Response, And Medical Readiness Secretary of the Air Force Heather Wilson has announced a contract with Massachusetts Institute of Technology focused on accelerating artificial intelligence technologies through fundamental research in computational intelligence, reasoning, decision-making, autonomy and relevant societal implications. The agreement includes selecting eleven Airmen for a research and development collaboration team designed to field practical AI solutions for real-world, national security challenges. Beginning this summer, the combined officer and enlisted team representing various Air Force career fields, is expected to work with researchers at MIT to harness the university's student talent, renowned faculty and state-of-the art facilities and laboratories. “MIT is a leading institution for AI research, education and application, making this a huge opportunity for the Air Force as we deepen and expand our scientific and technical enterprise. Drawing from one of the best of American research universities is vital,” Wilson said. The partnership will address a broad range of AI projects such as decision support, maintenance and logistics, talent management, medical readiness, situational awareness, business operations and disaster relief. “This collaboration is very much in line with MIT's core value of service to the nation,” said Maria Zuber, MIT's vice president for research and the E.A. Griswold professor of geophysics. “MIT researchers who choose to participate will bring state-of-the-art expertise in AI to advance Air Force mission areas and help train Air Force personnel in applications of AI.” As part of its Science and Technology Strategy, the Air Force launched a number of similar partnerships with higher education institutions around the U.S., each with a different focus area underscoring the Air Force's emphasis on driving innovation through government, academic and private sector partnerships. “MIT continues to pursue research that addresses current problems, while training researchers to think through the implications for tomorrow as research is translated to new technologies and new problems,” adds Krystyn Van Vliet, associate provost and professor of materials science and engineering and of biological engineering. “The MIT-Air Force AI Accelerator allows MIT to demonstrate that concept when AI provides one of the tools for human decisions." The Air Force plans to invest approximately $15 million per year as it builds upon its five-decade long relationship with MIT. (Source: USAF, MIT news releases) http://www.aero-news.net/index.cfm?do=main.textpost&id=3df3a529-4d35-463c-8f74-f927b83e0b32

  • Marine Corps’ Mahlock takes reins of Cyber National Mission Force

    January 6, 2024 | International, Land

    Marine Corps’ Mahlock takes reins of Cyber National Mission Force

    Maj. Gen. Lorna Mahlock now leads a force she said is "competing daily against a threat that is very real, but which few can comprehend, quantify or see.”

All news