the noc and soc divide increases risk while breeding ...€¦ · growth in traffic driven by...

8
WHITE PAPER THE NOC AND SOC DIVIDE INCREASES RISK WHILE BREEDING INEFFICIENCIES

Upload: others

Post on 30-Jun-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The NOC and SOC Divide Increases Risk While Breeding ...€¦ · growth in traffic driven by applications and big data, the creation of complex and highly elastic multi-cloud environments,

WHITE PAPER

THE NOC AND SOC DIVIDE INCREASES RISK WHILE BREEDING INEFFICIENCIES

Page 2: The NOC and SOC Divide Increases Risk While Breeding ...€¦ · growth in traffic driven by applications and big data, the creation of complex and highly elastic multi-cloud environments,

WHITE PAPER

EXECUTIVE SUMMARY

Security leaders must sometimes feel as if they are walking up a down escalator. We’re in an era of fast-paced digital transformation that broadens the attack surface, increases workloads, and pushes the complexity of security management to new heights. At the same time, the threat landscape is becoming increasingly more difficult to defend against. Meanwhile, resource constraints hamper security reach and effectiveness. Cybersecurity and network teams are caught in the middle of this maelstrom, fighting competing priorities. While operational teams in the Network Operations Center (NOC) aim to maximize throughout, uptime, and availability, security teams in the Security Operations Center (SOC) measure their success in terms of detection, block rates, and other threat-based criteria.

Yet, the reality is that neither of these siloed approaches scales sufficiently to overcome the widening attack surface, growing complexities of managing security, and the evolving advanced threat landscape. NOC teams struggle to keep pace with security threats, while SOC teams cannot scale to meet the demands of the network and speed of attacks and changes in threats. Plus, with the NOC and SOC residing in separate silos, operational inefficiencies and security risks occur without systems and tools that facilitate collaboration and threat and network information sharing.

Page 3: The NOC and SOC Divide Increases Risk While Breeding ...€¦ · growth in traffic driven by applications and big data, the creation of complex and highly elastic multi-cloud environments,

3

WHITE PAPER: THE NOC AND SOC DIVIDE INCREASES RISK WHILE BREEDING INEFFICIENCIES

ATTACK SURFACE IS WIDENING AND MORE DIFFICULT TO DEFEND

Almost every organization has jumped on the digital transformation “express train.” The integration of digital technology across almost every area of the business is fundamentally changing operations and the services delivered to customers. Digital transformation creates all the ingredients for business success, including increased agility, faster innovation, and revenue growth.

However, that opportunity is fraught with challenges. Digital transformation without the equivalent security transformation leaves organizations vulnerable to attack. According to a recent report by Cybersecurity Ventures, the cybersecurity market will exceed $1 trillion in a four-year span ending in 2021.1 But despite all of the attention and allocation of resources, cyber threats remain real and their momentum continues to rise. Thus, in a separate report, Cybersecurity Ventures projects that cyber-crime damages will reach $6 trillion by 2021.2

Part of the problem lies in the expanding human attack surface. Over half of the world’s population is now online,3 with a growing percentage of consumers who don’t remember a time before the Internet. Thus, businesses are embracing digital transformation to meet the digital requirements of their customers and employees. And those requirements are broad and diverse. Forward-thinking organizations, for example, are providing customers and staff with real-time access to data, developing and deploying new applications at a relentless pace, and enabling a more collaborative digital employee experience.

Another aspect of the problem is the expanding digital attack surface. The rapid adoption of Internet of Things (IoT) devices, the growth in traffic driven by applications and big data, the creation of complex and highly elastic multi-cloud environments, and growing volumes of highly mobile users demanding network access anytime, anywhere are all pushing security resources to the limit. This has resulted in what is often coined the “borderless network.”

The growth in IoT provides a powerful snapshot of this burgeoning security dilemma. With open access to networks, they create vulnerabilities that conventional security approaches struggle to protect against. Some are headless, meaning that traditional vulnerability patching and updates aren’t possible. Cyber criminals recognize the problem and are seeking to exploit vulnerabilities to their advantage. To illustrate the extent of the problem, hackers at the 2016 DEF CON security conference exposed 47 new vulnerabilities affecting 23 devices from 21 manufacturers.4 During the four-day conference, hackers found ways to remotely unlock IoT-enabled locks, physically damage solar arrays, and spy on people, among other exploits.

The IoT threat isn’t simply ethereal, but rather is real. For example, three of the top 10 attacks in the last quarter of 2017 targeted IoT devices. New IoT botnets such as Reaper and Hajime can target millions of exploits at once. And the types of devices targeted are quite wide ranging. Among many other examples, exploit activity quadrupled against devices like Wi-Fi cameras.5

The software-defined wide area network (SD-WAN) is another area that is dissolving the perimeter of the corporate network. Recognizing the benefits of lower total cost of ownership (TCO), businesses with operations and branches in multiple locations are implementing SD-WAN. Using SD-WAN, enterprises can avoid expensive backhaul from branches on the network by utilizing cheaper Internet links between locations while gaining greater throughput and speed.

Yet, despite the substantial advantages that SD-WAN offers, it also comes with security risks. Many different SD-WAN systems are available, and organizations need to carefully review the options to ensure the chosen solution provides the appropriate protection and networking capabilities that improve network efficiency without compromising security. In particular, SD-WAN often adds more point security products to a security environment already brimming with them. This ratchets up the complexity of security management and analytics, often forming one more security silo for NOC and SOC teams to manage manually.

Page 4: The NOC and SOC Divide Increases Risk While Breeding ...€¦ · growth in traffic driven by applications and big data, the creation of complex and highly elastic multi-cloud environments,

4

WHITE PAPER: THE NOC AND SOC DIVIDE INCREASES RISK WHILE BREEDING INEFFICIENCIES

MANAGING INDUSTRY, GOVERNMENT, AND SECURITY COMPLIANCE

Organizations face a growing wave of compliance regulations, much of it geared to increasing the security and protection of sensitive data. However, this additional compliance strutiny introduces new security challenges. The Payment Card Industry Data Security Standard (PCI DSS), for example, demands that organizations which process and store credit card information do so in a secure environment. Time and again, however, history has shown that being “PCI compliant” does not come close to guaranteeing data security. There is a long list of retailers and ecommerce companies that have fallen prey to data breaches that were supposedly PCI compliant.

In reality, PCI compliance demonstrates a certain degree of diligence, but it also highlights the fact that there’s much more to IT security than simply following some “paint-by-numbers” security guidelines. The problem is that security requirements such as PCI follow traditional thinking and are typically managed in a siloed environment.

The European Union’s General Data Protection Regulation (GDPR) legislation also significantly complicates the task of data security. GDPR introduces far-reaching legislation on data privacy—and stringent penalties for noncompliance. It requires organizations to implement controls around personal data on an individual level. The complexity associated with GDPR compliance arises from the

difficulty in tracking all of the locations where an individual’s private data may reside. The complexity is compounded by the GDPR mandate to anonymize that data and erase it upon request from the individual concerned. The ability to track and report on these, and other, compliance requirements is critical.

DEFICIENCY OF TRADITIONAL SECURITY

The threat landscape is more difficult to defend than ever. On the one hand, attack velocity is rising. For example, an average of 274 exploits per firm were detected in the last quarter of 2017, an 82% increase on the previous quarter.6 These attacks often target multiple vectors at the same time, making it increasingly difficult to defend against them without real-time intelligence sharing.

On the other hand, the variety and sophistication of attacks is spiralling. Attackers leverage Malware-as-a-Service (MaaS) to gain access to sophisticated malware that can be executed quickly and easily. Many of these MaaS services provide automated front ends used to mine for information and vulnerabilities. This information is then combined with artificial intelligence (AI) on the back end to correlate vast amounts of data used to tune and target their attacks. Polymorphic malware uses machine learning to evade security controls and to replicate at machine speed (literally into the millions daily). In these instances, traditional security architectures that feature best-of-breed security products scattered across multiple silos lack the management controls and analytics needed to prevent and detect these advanced threats.

Page 5: The NOC and SOC Divide Increases Risk While Breeding ...€¦ · growth in traffic driven by applications and big data, the creation of complex and highly elastic multi-cloud environments,

5

WHITE PAPER: THE NOC AND SOC DIVIDE INCREASES RISK WHILE BREEDING INEFFICIENCIES

SECURITY CHALLENGES EXACERBATED BY CYBERSECURITY SKILLS SHORTAGE

The complexity of managing security has grown dramatically over the past decade—from more threat actors, to additional security vendors, to exploding security alerts (and what to do with them). All of this obviously contributes to a rise in security budgets, though this increase cannot keep pace with the rise volume and the increased complexity of security management. (See Figure 1 for how the numbers have shot up exponentially.7)

2007 2017

Threat Actors <50 >1,000

Security Vendors <100 >2,300

Alerts/Day (average) <1,000 >1,000,000

Security Spending <$3 billion >$80 billion

Cybersecurity headcount has not followed the same type of trajectory. Not only are security leaders constrained when it comes to adding more security staff but they’re finding it difficult to find, hire, and retain security professionals with specific skill sets that are in high demand.

This acute cybersecurity skills shortage simply exacerbates the broader attack surface and challenges presented by the more advanced threat landscape. Today, there are more than 1 million unfilled security openings, which is predicted to reach 3.5 million by 2021.8 And as organizations “throw” more point security products to address the expanded attack surface, they add more and more silos to an already fragmented security architecture.

Lack of cybersecurity resources contributes to a higher risk. 22% indicate that their undersized cybersecurity team contributed to past security incidents.10 70% of cybersecurity staff say their organization is impacted by the skills shortage, resulting in increased workload, hiring of inexperienced personnel, and an emphasis on firefighting emergencies—not training.11

This growing lack of qualified personnel means that security organizations must offer higher salaries and benefits to attract the right talent. This often prices many smaller organizations out of the race to attract and hire from the limited pool of security professionals. And even at the enterprise level, this skills gap means the talent pool is watered down, making their organization more susceptible to attacks.

Organizations that say they have too few cybersecurity staff. 9

Global 66%

North America 68%

Latin America 67%

Europe 66%

Middle East & Africa 67%

Asia Pacific 61%

FIGURE 1: THE RISING TIDE OF THREATS.

FIGURE 2: CYBERSECURITY SKILLS SHORTAGE IS A GLOBAL PROBLEM.

Page 6: The NOC and SOC Divide Increases Risk While Breeding ...€¦ · growth in traffic driven by applications and big data, the creation of complex and highly elastic multi-cloud environments,

6

WHITE PAPER: THE NOC AND SOC DIVIDE INCREASES RISK WHILE BREEDING INEFFICIENCIES

THE CHASM BETWEEN THE NOC AND THE SOC

The NOC and the SOC play critical roles in ensuring operational efficiencies and proactively managing security risks. The NOC focuses on driving better operational efficiencies by coordinating and automating processes such as asset management, versioning, users and privileges, connectivity and access, and auditing and compliance. The SOC concentrates on enabling a more proactive threat posture—from identifying and preventing attacks, to incident and event management and response, to risk management and mitigation.

The goals of each are different as well. The NOC measures success based on throughput and availability. The SOC measures success based on threats detected and blocked. (See Figure 3.)

Many organizations maintain both a NOC and a SOC. However, because they both have different charters and measurements, they often remain separate in the ways they communicate threat and network intelligence. Thus, when threats or network issues occur, it becomes difficult for them to jointly resolve a problem—from a security event that triggers a network failure to a network event that causes a security vulnerability. Further, when monitoring, alerting, and ticketing systems reside in separate silos, it is difficult for the NOC and SOC to collaborate on remediation activities and harder for them to reclassify events after initial scrutiny. For example, if operators in the NOC discover a problem and later realize it is the result of a security breach, they may have no tool to seamlessly transfer the information collected to their colleagues in the SOC.

Moreover, the cybersecurity skills shortage highlighted earlier in this paper has a fundamental impact on both the NOC and the SOC. The lack of specific skill sets hinders cross-functional collaboration and heightens potential risks.

Operational…Become More Efficient Security…Identify Threats More Quickly

Help the organization better coordinate and automate operations. This includes:

Help the organization discover and defend attacks and breaches more quickly. This includes:

nn Assets and versioning nn Attacks and vulnerabilities

nn Users and privileges nn Compromised users and servers

nn Connectivity and access nn Incident response and remediation

nn Auditing and compliance nn Risk management and mitigation

FIGURE 3: THE TRADITIONAL DIVIDE BETWEEN THE NOC AND SOC.

Page 7: The NOC and SOC Divide Increases Risk While Breeding ...€¦ · growth in traffic driven by applications and big data, the creation of complex and highly elastic multi-cloud environments,

7

WHITE PAPER: THE NOC AND SOC DIVIDE INCREASES RISK WHILE BREEDING INEFFICIENCIES

CONCLUSION

A proactive security posture is a must for security leaders seeking to remain ahead of the threat landscape. The NOC and the SOC are effective operations centers for their individual charters and functions. But the expanding attack surface, increased complexity of compliance management, and advanced threat landscape highlight the need for a more integrated approach. A silo-based NOC and SOC approach lacks the agility, scalability, and real-time threat intelligence needed to protect against today’s advanced threat landscape. And with finite security and network resource budgets and a cybersecurity skills shortage, security leaders simply aren’t able to cover those deficiencies with more headcount.

Instead, the walls separating the NOC and SOC silos need to come down. With the right security management and analytics tools in place, security leaders can deconstruct the boundaries, using integration to provide transparent visibility and to automate processes used to correlate data.

Page 8: The NOC and SOC Divide Increases Risk While Breeding ...€¦ · growth in traffic driven by applications and big data, the creation of complex and highly elastic multi-cloud environments,

WHITE PAPER: THE NOC AND SOC DIVIDE INCREASES RISK WHILE BREEDING INEFFICIENCIES

Copyright © 2018 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.

GLOBAL HEADQUARTERSFortinet Inc.899 Kifer RoadSunnyvale, CA 94086United StatesTel: +1.408.235.7700www.fortinet.com/sales

EMEA SALES OFFICE905 rue Albert Einstein06560 ValbonneFranceTel: +33.4.8987.0500

APAC SALES OFFICE300 Beach Road 20-01The ConcourseSingapore 199555Tel: +65.6513.3730

LATIN AMERICA HEADQUARTERSSawgrass Lakes Center13450 W. Sunrise Blvd., Suite 430Sunrise, FL 33323Tel: +1.954.368.9990

September 11, 2018 2:59 PM

wp-noc-soc

1 Steve Morgan, “2018 Cybersecurity Market Report,” Cybersecurity Ventures, May 31, 2017.

2 Steve Morgan, “Cybercrime Damages $6 Trillion By 2021,” Cybersecurity Ventures, October 16, 2017.

3 Simon Kemp, “The global state of the internet in 2017,” TNW, April 11, 2017.

4 Lucian Constantin, “Hackers found 47 new vulnerabilities in 23 IoT devices at DEF CON,” CSO, September 13, 2016.

5 “Threat Landscape Report: Q4 2017,” Fortinet, February 2018.

6 “Fortinet Threat Landscape Report Reveals Attacks Per Firm Increased by 82%,” Fortinet, February 20, 2018.

7 Dave DeWalt and David Petraeus, “The Cyber Security Mega Cycle Aftermath,” Optiv, September 7, 2017.

8 Jim Kennedy, “Cybersecurity skills shortage,” CSO, March 1, 2018.

9 “2017 Global Information Security Workforce Study: Benchmarking Workforce Capacity and Response to Cyber Risk,” Frost & Sullivan, June 2017.

10 Jon Oltsik, “Cybersecurity skills shortage creating recruitment chaos,” CSO, November 28, 2017.

11 Jon Oltsik, “Research suggests cybersecurity skills shortage is getting worse,” CSO, January 11, 2018.

208268-A-0-EN