Detection and Response of APTs became an ultimate goal of Cyber Security and security services can't ignore this fact anymore

Author- Arindam Bhattacharya

When cyber security compromises taken place, it has already passed through multiple defense layers to attain the final goal of persistence those are very hard to detect because of the family of compromises involved, no independent traffic but a carrier in others service entities.

The time such activities detected (appearing  false positives or true positive?) that means the multi layer kill chain compromise already took place prior but the silo incidents are overlooked that intern gave a room for an unknown security breach for longer with no clues.

When a network operation is of sensitive nature and that "unknown factor" indicates there is an issue in multiple dimension - Capability, Hygiene and Maturity etc. 

Detection challenges are more in "on premise" than Cloud that has an offer for stricter policies & controls but compliance "in the cloud" sometimes remains a challenge due to absence of full stride solutions - meaning the customer managed app or infra layer may not provide rigid security due to absence of proper security modules. Moreover, "In the cloud" is always not effective due to poor configuration management that makes logical security not adequate even though capability of the cloud is there. 

"In the cloud" here means where user operates while "of the cloud" means where provider operates their services such as in IaaS where cloud provider manages physical hardware, Hypervisor, core network security etc. 

So, coming to the point - when the challenges are foreseen, a single fix may not be enough to treat without knowing the depth & stages of the compromise branches. 

Same time, researchers have also very limited visibility from outside but a view without "end to end" may not produce much result unless the product OEMs including customers and vendors are running their own Research units. Reproducing similar persistent threat (of unique type) is also not possible due to variant.of IT devices, aps, tools etc  but ensuring each level research focus may ease the process a lot. 

The gap here is absence of a mapped branches so that an analyst can understand what to look for. A complete mapping of a threat traverse is possible only if the threat is detected as a threat. But here, It's always not streight forward because automated threats detection never become easy and it's not only the potential behavioural but also a set of actions that would appear as real without having a clue that it has connection with the threat. That is where false positive confusion comes in. What looks as false positive, may not be always the one! For example a crtical resource accessed by a known and authorised user. Since the user is authorised and so, the event is false positive! But was there a correlation across multiple system to verify whether the user access stamp is available across other identity hops or whether the user was leave? It's easy to say but while implementing we have challenges as there would be multiple data points from multiple dissimilar systems as well but data can solve it and needs telemetry.data from all system within same time stamp or atleast nearest. 

Machine learning technologies are inbuilt with the security threat management products but they may not be much effective because they work within a set of defined rules and extra learnings are subject to time and by that "time" threats could have materialized and occured a incident. Same goes for deep learning models.

While a ML/ DL model will work best when the training data and inferences match near but either of these two if have differences, then wrong anomalies are likely that would force manual intervention to re-train the model. That means, even after adopting to ML/ DL possibilities are that challenges still remains. 

Also, there are challenges with the security of the models if they are not checked against vulnerabilities or against logical weaknesses. These are practical challenges but there are ways to deal with it. Training data needs to be more extensive and non exhaustive to allow machine to learn and make more accurate decisions. Correct correlations which are practically not possible, let machine resolve that.

To conclude, it's highly necessary that adopting cmmc, trust marks for vendors / OEMs be obtained in  every industry that may sensitize the issue more and develop better awareness & trust in the supply chain to deal with the ever increasing cyber threats. 

Comments

Popular posts from this blog

Secure Key Management- An important risk carrier

BPRFPC: An abstracted Architectural model for an End to end view

Can Security issues be reduced with DevSecOps