Page 105 - Cyber Defense eMagazine for September 2020
P. 105

in place. Every organization is different, so automation must be used uniquely by every organization.
            Only a seasoned security team that understands the specific environment can implement automation and
            continually update playbooks. There is no “set it and forget it” strategy.



            Focus on Automation That Enables Business Continuity

            A risk-based approach is often most effective when investing in automation. Enterprises can work with
            peers and stakeholders to think through how business priorities have changed over the last few months
            amid shifting workplace processes. Evaluate key priorities, like the rising importance of securing cloud
            and SaaS applications, as well as any changes to the roles or responsibilities of employees accessing
            sensitive data and from what location. From there, enterprises can determine the biggest risks to the
            business and redouble efforts where it will have the biggest impact.



            Apply Automation to What You Know

            Automation is best used for specific processes that a security team knows and trusts, instead of applying
            it  to  every  source  in  the  environment.  Automation  not  only  requires  intimate  knowledge  of  incident
            response processes, but it also requires insight and access into the integrated systems. For example, if
            you want to trigger a vulnerability scan on a target host, even apparently innocuous steps to gather
            contextual information about hosts become challenging without a deep understanding of the process you
            want to automate, your organization’s policies, and the system you are integrating.



            Get Creative to Streamline Processes

            With IT and security teams stretched increasingly thin, automation is often most effective when used to
            complete routine tasks to free up time for teams to focus on more important business priorities. Try
            looking at automation and its potential uses creatively, beyond just running scripts.

             For  example,  automation  can  be  used  when  differentiating  between  suspicious  insider  events  and
            harmless ones. One way to do this is to use automation to continuously simulate common red team or
            adversary tactics that will quickly identify what risks may be present or gaps in security coverage.  By
            automating these tasks, enterprises can identify where the greatest user risks are and address them by
            tuning alerts or providing employee training.




            Use Automation to Add Context to Data

            Data overload is a persistent problem among security teams, who often rely on disparate tools that collect
            and store data in many different locations. Some teams attempt to solve this problem by funneling all of
            their  data  into  a  single,  searchable  repository.  But  this  method  can  involve  a  lot  of  manual,  time-
            consuming process that defeats the goal of greater efficiency.





            Cyber Defense eMagazine – September 2020 Edition                                                                                                                                                                                                         105
            Copyright © 2020, Cyber Defense Magazine.  All rights reserved worldwide.
   100   101   102   103   104   105   106   107   108   109   110