SESSION ID: CRWD-01 Active Response: Automated Risk Reduction or Manual Action? sec ops | dream Monzy Merza Chief Security Evangelist Splunk @monzymerza #RSAC #RSAC Agenda Active Response Drivers Facets of Active Response Balancing Business Risk and Active Response Required Capabilities Presenter’s Company Logo – replace on master slide 2 #RSAC Sources of Cyber Risk Cyber Criminals Presenter’s Company Logo – replace on master slide Malicious Insiders 3 Nation States #RSAC Active Response Drivers Constant, Simultaneous Attacks Triaging and False Positives Time to Response Human Resource Constraints Presenter’s Company Logo – replace on master slide 4 #RSAC HUMAN TIME RESPONSE IS UNTENABLE Presenter’s Company Logo – replace on master slide 5 #RSAC Human-Enabling Active Reponse 101111101010010001000001 111011111011011111010100 100010000011110111110101 001 101111101010010001000001 111011111011011111010100 100010000011110111110101 001 Risk Based Presenter’s Company Logo – replace on master slide Connecting Data and People 6 Context & Intelligence #RSAC Facets of Active Response Transparency and human enablement is core to risk based active response Presenter’s Company Logo – replace on master slide 7 #RSAC Conventional Active Response Block and tackle Config changes on endpoints, network or gateways Policy changes on access/auth or business systems Attach back Fire packets at the attack source Interact via CnC or payload Presenter’s Company Logo – replace on master slide 8 #RSAC Conventional Active Response Challenges Advantages Complex business and mission requirements Block-and-tackle cause and effect is well understood Distributed and diverse infrastructure Action is decisive Repercussions Attack back is human mediated Presenter’s Company Logo – replace on master slide 9 #RSAC Facets of Active Response – Risk Based Context through post-processing Signaling and messaging Enrichment of event data – asset, identity, access lookup Tiered analysis – submit malware to a sanbox Expert system communication – start packet capture Summarization – forward summary data to ticketing system Evidence preservation Disk forensic snapshot Move event data out of rotation repository Presenter’s Company Logo – replace on master slide 10 #RSAC Risk-Based Active Response Challenges Advantages Technology managed by different teams Integration challenges – lack of open APIs No central broker or nerve center Presenter’s Company Logo – replace on master slide 11 Low business risk in case of errors Analyst has deeper context and knowledge Not making any configuration changes #RSAC AND NOW FOR SOMETHING CONTROVERSIAL… Presenter’s Company Logo – replace on master slide 12 #RSAC …LOW OR HIGH CONFIDENCE AS IT RELATES TO BUSINESS RISK Presenter’s Company Logo – replace on master slide 13 #RSAC Confidence Drives Depth of Decision What is the business risk? How complete is the threat context? What/who will be impacted by change? How hard is it to revert the change? Who has the Get Out of Jail Free Card? Presenter’s Company Logo – replace on master slide 14 #RSAC Natural Remedy for Active Response Focus on business risk and mission Let the machines be machines Enable the human to be human Presenter’s Company Logo – replace on master slide 15 #RSAC BALANCING BUSINESS RISK AND ACTIVE RESPONSE Presenter’s Company Logo – replace on master slide 16 #RSAC Who Does What Machine Human Correlate Contextualize Auto-collect Prioritize Message, signal Mediate action Execute action Apply gut feel Presenter’s Company Logo – replace on master slide 17 #RSAC Production Active Response Actions High Confidence Low Confidence Alert on correlations Block on IP or domain Modify configs Report on actions taken Presenter’s Company Logo – replace on master slide 18 Alert on correlations Contextualize alerts Gather more data for alert artifacts Kick off secondary analysis Prepare for human #RSAC Examples of Confidence Low Confidence High Confidence Threat feed matches from ISAC or internal sources Trigger from inline dynamic analysis engine Correlation alert for beaconing activity Presenter’s Company Logo – replace on master slide 19 Threat feed match from a free intel feel Correlation alert from a statistical engine Individual signature match from IDS/IPS #RSAC THE MACHINE CAPABILITY Presenter’s Company Logo – replace on master slide 20 #RSAC Key Technical Capabilities Security instrumentation Aggregation, correlation, alert Integration across the instrumentation A nerve center – orchestration, messaging Tracking of all actions and messages Presenter’s Company Logo – replace on master slide 21 #RSAC Security Instrumentation Network Presenter’s Company Logo – replace on master slide Endpoint Threat Intelligence 22 Authentication Security Instrumentation – Core Capabilities #RSAC Persist, Repeat Threat intelligence • • • Third-party threat intel Open source blacklist Internal threat intelligence • • • Firewall, IDS, IPS DNS Email • • • AV/IPS/FW Malware detection Endpoint forensics • • • Directory services Asset mgmt Authentication logs Reputation services, known relay/C2 sites, infected sites, IOC, attack/campaign intent and attribution • • • Web proxy NetFlow Network Who talked to whom, traffic, malware download/delivery, C2, exfiltration, lateral movement Network Endpoint Access/Identity Presenter’s Company Logo – replace on master slide • • • • • Config mgmt OS logs File system Running process, services, process owner, registry mods, file system changes, patching level, network connections by process/service Access level, privileged use/escalation, system ownership, user/system/service business criticality Application Services VPN, SSO 23 Building Confidence for Active Response #RSAC Persist, Repeat Threat intelligence • • • Third-party threat intel Open-source blacklist Internal threat intelligence • • • Firewall, IDS, IPS DNS Email • • • AV/IPS/FW Malware detection Endpoint forensics • • • Directory services Asset mgmt Authentication logs Update threat lists. Enrich threat list info with new knowledge. • • • Web proxy NetFlow Network Add to custom policy groups: vlans, watch list, bad actors, policy groups. Start/stop packet capture. Network Endpoint Access/Identity Presenter’s Company Logo – replace on master slide • • • • • Config mgmt OS logs File system Acquire config info, invoke snapshots, submit files to sandbox, update local signatures, clean up infected files, start/stop processes and services. Acquire business info, groups, travel, organizational priority. Modify membership, revoke tokens or certs. Application Services VPN, SSO 24 #RSAC Presenter’s Company Logo – replace on master slide 25 #RSAC High Confidence Policy Change IDS Alerts Layer 7 FW Attack Corp Machine Bypass FW Block Presenter’s Company Logo – replace on master slide IDS Event to a Critical Server #RSAC Low Confidence Aggregation Dynamic analysis alert Did it detonate on the endpoint? Check for endpoint logs Check for AV logs Take a snapshot – proc list, netstat Start packet capture Disk forensic snapshot Presenter’s Company Logo – replace on master slide #RSAC Active Response Is Survival Attack volume is high Human time response is not tenable Active response enables the human analyst Active response != cutting people’s Internets Presenter’s Company Logo – replace on master slide #RSAC Thank You Questions? More discussions: [email protected] Presenter’s Company Logo – replace on master slide
© Copyright 2026 Paperzz