The State of Siem: Detection Risk
The State of Siem: Detection Risk
The State of Siem: Detection Risk
X X X X X
X X X X X
X X X X X
Table of Contents
1.0 EXECUTIVE SUMMARY ..................................................................................................................... 3
METHODOLOGY .................................................................................................................................. 7
2.0 STATE OF DETECTION COVERAGE AS MEASURED BY MITRE ATT&CK ........................ 8
2.1 Coverage across all ATT&CK techniques ....................................................................................... 9
2.2 Coverage for top ATT&CK techniques used by adversaries in the wild ............................................. 9
2.3 % of broken/nonfunctioning SIEM rules ........................................................................................ 9
2.4 % of default vendor-supplied detection content that is disabled ....................................................... 10
2.5 Top log sources with no detections ............................................................................................................ 10
3.0 BEST PRACTICE RECOMMENDATIONS .......................................................................................... 11
3.1 Review current SIEM processes ................................................................................................................... 12
3.2 Become more intentional about how you develop
and manage detection content ................................................................................................................... 12
3.3 Build or refresh your use case management processes .......................................................................... 13
3.4 Measure and continuously improve ............................................................................................................ 13
EXECUTIVE SUMMARY
“Use cases are the core of security monitoring activities. A
“
structured process to identify, prioritize, implement, and maintain
use cases allows organizations to align monitoring efforts to
security strategy, choose the best solutions and maximize the
value obtained from security monitoring tools.”
SIEMs are foundational to the modern SOC, cloud monitoring tools, identity providers, etc.).
providing the essential role of helping security This data is then analyzed using predefined threat
teams rapidly detect and respond to cyberattacks detection rules and queries to identify suspicious or
before they can have a material impact on the unauthorized behavior.
business of the organization.
In this 2nd annual data-driven report, CardinalOps
In order to be effective, SIEMs now aggregate log set out to gain visibility into the current state of
and event data from an exponentially-growing threat detection coverage in enterprise SOCs.
number of data sources across the infrastructure
(applications, network and endpoint security tools,
www.cardinalops.com 3
Using the 190+ adversary techniques in MITRE ATT&CK as the baseline,
baseline we found that actual
CONTINUOUSLY MANAGE YOUR DETECTION POSTURE
detection coverage remains far below what most organizations expect and what SOCs are expected
to provide. In particular, we found that on average:
5 14 of
the
top
80%
Enterprise SIEMs are MISSING DETECTIONS for
15%
of SIEM rules are broken and will never fire
due to common issues such as misconfigured
data sources and missing fields.
www.cardinalops.com 4
Organizations disable
75%
of generic out-of-the-box
vendor content due to noisiness
& customization challenges
(e.g., log source types, field names, etc.).
Only
25%
of organizations that forward identity
logs such as Active Directory and Okta
to their SIEM, actually use them in
their detection rules.
Worse, organizations are often unaware of the gap between the theoretical
security they assume they have and the actual security they get in practice,
creating a false impression of their detection posture.
Lack of skilled personnel to understand and develop use cases across diverse
scenarios and log source types.
www.cardinalops.com 6
CONTINUOUSLY MANAGE YOUR DETECTION POSTURE
In section 2 of the report, we provide a series of Google Cloud and former Gartner Research Vice
best practice recommendations to help CISOs President and Distinguished Analyst.
and detection engineering teams address these
challenges, and be more intentional about how It is our goal to help the security community move
detection coverage is measured and continuously forward in recognizing the importance of bringing
improved over time. These recommendations are automated, repeatable, and consistent processes
based on the experience of our in-house security to detection engineering, and to provide
team and SIEM experts like Dr. Anton Chuvakin, independent benchmarks enabling CISOs and SOC
Head of Security Solution Strategy at leaders to answer the question “How prepared
are we to detect the highest priority threats?”
METHODOLOGY
Rather than rely on subjective survey-based data, CardinalOps analyzed
configuration data from real-world production SIEM instances to gain visibility
into the current state of threat detection coverage in modern SOCs.
www.cardinalops.com 7
CONTINUOUSLY MANAGE YOUR DETECTION POSTURE
1.0
STATE OF
DETECTION COVERAGE
AS MEASURED BY
MITRE ATT&CK
“Organizations need to become more intentional about
detection in their SOCs. What should we detect? Do we have
use cases for those scenarios? Do they actually work? Do they
help my SOC analysts effectively triage and respond?”
www.cardinalops.com 8
CONTINUOUSLY MANAGE YOUR DETECTION POSTURE
On average, SIEMs only cover 20% of the 190+ adversary techniques described in MITRE
ATT&CK v10.1
On average, SIEMs cover fewer than 5 of the top 14 techniques used by adversaries
in the wild, based on 2021 threat intelligence data from Recorded Future, Red Canary,
and Picus Security.
15% of SIEM rules are broken and will never fire, primarily due to fields that are not
extracted correctly or log sources that are not sending the required data.
On average, 75% of default out-of-the box (OOB) rules provided by SIEM vendors are
disabled, due to the difficulty of adapting generic rules to each organization’s unique
infrastructure, log sources, naming conventions, etc..
■ The top 3 log sources that are ingested by the SIEM – but not being used for any
detections – are identity sources; SaaS productivity suites such as Office 365 and G Suite;
and cloud infrastructure log sources.
■ In fact, 75% of organizations that forward identity log sources to their SIEM,
such as Active Directory and Okta, do not use them for any detection use cases.
www.cardinalops.com 10
CONTINUOUSLY MANAGE YOUR DETECTION POSTURE
1.0 2.0
BEST PRACTICE
RECOMMENDATIONS
“
“MITRE is a really good method of categorizing, measuring,
and enhancing security operations. Those that are most
successful use MITRE to communicate with others in their
businesses, to measure processes and success.”
www.cardinalops.com 11
CONTINUOUSLY MANAGE YOUR DETECTION POSTURE
■ What is the approach for finding ■ How are detections developed today and
false negatives – and what adversary what is the process for turning threat
techniques, behaviors, and threats knowledge into detections?
are currently being missed?
■ How long does it typically take to develop
■ How are use cases managed and new detections?
prioritized? Typically, we find they’re
added to the backlog via an ad-hoc ■ Is there a systematic process to
process driven by a combination of: periodically identify detections that are
no longer functional due to infrastructure
- Threat analysts changes, changes in vendor log source
- Red teaming formats, etc.?
- Breach and attack
simulation (BAS) tools
- Manual pen testing
- News about the latest high-profile
attacks or vulnerabilities
Focus on effectiveness, coverage, and improvements. Ask your team questions such as:
www.cardinalops.com 12
CONTINUOUSLY MANAGE YOUR DETECTION POSTURE
Choose 3-5 enhancements to address the questions from the last section, with an agreed-
upon timeline.
www.cardinalops.com 13
CONTINUOUSLY MANAGE YOUR DETECTION POSTURE
HOW CARDINALOPS
CAN HELP
“Network defenders do not need 100 percent accuracy in
our models to support risk decisions. We can strive to simply
reduce our uncertainty about ranges of possibilities. The concept
of measurement is not the elimination of uncertainty but the
“
abatement of it. If we can collect a metric that helps us reduce
that uncertainty, even if by just a little, then we have improved
our situation from not knowing anything to knowing something.”
- Douglas Hubbard
(as reviewed by Rick Howard, former CISO at Palo Alto Networks)
How to Measure Anything: Finding the Value of ‘Intangibles’ in Business
www.cardinalops.com 14
CONTINUOUSLY MANAGE YOUR DETECTION POSTURE
CardinalOps’ cloud-based platform content and metrics enabling your SOC team
continuously ensures your SIEM/XDR has to stay ahead of constant change in the
high-fidelity detections for the adversary attack surface and threat landscape – plus
techniques most relevant to your business continuously identify and remediate broken
priorities and infrastructure, mapped to the rules and misconfigured log sources – so you
MITRE ATT&CK framework. can close the riskiest detection gaps that
leave your organization exposed.
Leveraging proprietary analytics and AI-
powered, API-driven automation, the
platform continuously delivers new detection
After connecting to the SIEM/XDR via its API, the service will analyze all
rules, alerts, and log source types to:
Provide a coverage heat map based on MITRE ATT&CK for all use cases in your production
SIEM/XDR
www.cardinalops.com 15
CONTINUOUSLY MANAGE YOUR DETECTION POSTURE
www.cardinalops.com 16
CONTINUOUSLY MANAGE YOUR DETECTION POSTURE
www.cardinalops.com 17
CONTINUOUSLY MANAGE YOUR DETECTION POSTURE
Screenshot Examples
You can also view a 2-minute demo here.
Map with all ATT&CK techniques color-coded according to health of detection rules.
Techniques shown with vertical cross-hatched lines are not covered by any detections.
www.cardinalops.com 18
CONTINUOUSLY MANAGE YOUR DETECTION POSTURE
Map with examples of sub-techniques and broken rules within the technique.
www.cardinalops.com 19
CONTINUOUSLY MANAGE YOUR DETECTION POSTURE
5.3
Example of recommended best practice rule
to close gaps in ATT&CK coverage
www.cardinalops.com 20
CONTINUOUSLY MANAGE YOUR DETECTION POSTURE
5.6
Log source types
not contributing to
detection coverage
www.cardinalops.com 21
CONTINUOUSLY MANAGE YOUR DETECTION POSTURE
www.cardinalops.com 22
CONTINUOUSLY MANAGE YOUR DETECTION POSTURE
Rapid, Secure,
API-Driven Deployment
Deployment is typically achieved in less than an hour.
■ The platform connects to your SIEM/XDR’s to run queries on that data. Raw events
API via provided credentials. never leave the SIEM. The platform only
requires access to SIEM/XDR configuration
■ Secure network connectivity is achieved information and metadata around
via your preferred process (Azure detection rules, connectors, data sources,
Lighthouse, onsite broker VMs, etc.). etc.
■ To get an initial health check, you can ■ Integration with Git-based CI/CD platforms
configure the platform with read-only is also enabled via our API.
credentials and only expand permissions
later to derive the full platform value ■ The CardinalOps platform is SOC-2
from automated provisioning of new and compliant for security and confidentiality,
remediated rules. ensuring your SIEM/XDR configuration
data is always protected using best
■ The platform never obtains or requires practices.
access to log data because it uses the SIEM
www.cardinalops.com 23
CONTINUOUSLY MANAGE YOUR DETECTION POSTURE
7.0 8.0
Most organizations track coverage of MITRE ATT&CK using static, manual approaches like
spreadsheets. Although some SIEM/XDR vendors have recently begun displaying a coverage
map in their platforms, true operationalization requires going beyond simple mapping to
include rule recommendations, identification of data quality issues, and customization of
detection content to your organizational priorities and infrastructure.
www.cardinalops.com 24
CONTINUOUSLY MANAGE YOUR DETECTION POSTURE
Adding complexity, each cloud platform has its own monitoring tools, which need to be
onboarded as log sources to the SIEM/XDR. For example, AWS log sources include S3, VPC,
EC2, CloudWatch, and Cloud Trail, as well as both system- and application-layer log sources for
containers such as Kubernetes. Plus, new cloud security tools like CSPM and CIEM also require
onboarding of new log sources.
CardinalOps helps securely accelerate your cloud initiatives by providing pre-built, ready-to-use
detection content for these new log sources.
Community sharing, blog posts, and subscription-based content can be helpful with new
threats — but copying and pasting generic content is often insufficient for addressing complex
threats like log4shell and SolarWinds. CardinalOps can help with rich, high-fidelity detection
content that’s specifically adapted to your log sources and infrastructure.
Security talent is hard to find and retain. With CardinalOps, you leverage AI-powered, API-
driven automation and analytics to replace tedious and mundane activities (like looking for
Regex typos and misconfigured collectors) – so that your best talent can focus on higher-value,
more strategic activities — such as researching new and novel attack techniques — thereby
boosting morale and retention.
In fact, customers tell us the platform has increased the detection content output of their
security engineering teams by a factor of 10 compared to their previous manual approaches.
www.cardinalops.com 25
CONTINUOUSLY MANAGE YOUR DETECTION POSTURE
Top 10 CPG Manufacturer Top 10 Private Equity Firm Top 20 Retail Cosmetics firm
Top 10 Casino Company Top 10 Money Transfer Firm Top 10 US Law Firm
Top 15 MDR Prodivder $3B Fteight Logistics Firm Top 10 Cable Operator
www.cardinalops.com 26
ABOUT
CardinalOps’ cloud-based platform continuously
ensures your SIEM/XDR has high-fidelity detections
for the adversary techniques most relevant to your
business priorities and infrastructure, as measured
by the MITRE ATT&CK framework.
Leveraging proprietary analytics and API-driven automation, the platform
continuously delivers automatically customized, deployment-ready
detection content and metrics enabling your SOC team to stay ahead
of constant change in the attack surface and threat landscape – plus
continuously identify and remediate broken rules and misconfigured log
sources – so you can close the riskiest detection gaps that leave your
organization exposed.
X X X X X X X X
X X X X X X X X
X X X X X X X X