Lack of visibility and prioritization
“You end up with
each security analyst having their own spreadsheet. Now, you’ve lost
visibility,” says Bob. “There’s no central place for all of your
security alerts. That creates huge problems. For example, how do you
prioritize alerts, so you know what to work on first? Again, you can
put this into the individual spreadsheet that contains the alert, but
there’s no overall prioritized queue where you can pick things off the
top. And, at the end of shift, handover is a nightmare. It takes the
new analyst an hour or more reading spreadsheets to figure out what’s
going on.”
Cutting and pasting instead of investigating
However,
this pales in comparison with the effort of analyzing each alert. Bob
reveals, “We get 300 to 400 alerts every day. 95% are false positives
rather than real incidents, but we have to investigate each one. That
means chasing down contextual information from lots of different
sources–for example, threat feeds, public tools like Shodan and
VirusTotal, and detailed logs from the system that raised the alert.
If we had to go and retrieve all of this information manually, our
investigation times would skyrocket. And, of course, you then have to
put all this data in a spreadsheet or document, which means that
people wear out their keyboards cutting and pasting.”
How ServiceNow accelerates security incident response
With the Security Incident Response application of ServiceNow®
Security Operations, we automate alert processing. When a
monitoring system sends an alert, ServiceNow
automatically prioritizes it based on the type of alert. ServiceNow
also automates retrieval of contextual information, attaching data
from monitoring tools, public security tools, and threat feeds
directly to the incident.
According to Bob, “We want to bring data to the analyst, rather than
having the analyst chase the data. That way, they can focus on
investigation, instead of wasting time manually collecting the data
they need. In fact, we process alerts six times faster this way than
if we did everything manually.”
Automated workflows also help us to drive efficiency. Bob points to
an example: failed authentications. “When there’s an authentication
failure, ServiceNow automatically contacts the user asking them if
they tried to log in. Once they confirm, ServiceNow closes the alert.
We only open a security incident if the user didn’t try to log in.
That’s a huge timesaver. Instead of wasting our analysts’ time, it’s
all handsfree. And, that’s only one example. For instance, we also use
automated workflows to handle phishing email reports.”
Making the most of scarce security staff
For Bob, that
time saved is critical–and not just because we respond more quickly to
security incidents. He explains, “ServiceNow is a rapidly growing
company, so we don’t face as many budgetary constraints as some other
security organizations. However, there’s enormous competition for
experienced security analysts. We can’t just hire more people. We
can’t just hire more staff, given that the security industry is facing
a talent shortage of 1.8 million people within the next four years.”
“We need to get the most out of our existing team and automation
lets us do that. Yes, we’re saving money–conservatively, more than
$400,000 a year–but the real headline is that we’ve increased the
number of incidents each analyst can handle by 50%."
Attracting and retaining security expertise
Automation
isn’t just increasing the productivity of our security analysts. It’s
also making them happier. “Giving our team a great work experience is
incredibly important. If you’re spending all of your time cutting and
pasting data, you’re going to get frustrated,” says Bob.
“By automating these mind-numbing tasks, we’re freeing up time for
high-value, fulfilling activities. Our analysts want to do interesting
work, whether that’s investigating incidents or writing knowledge base
articles that help us respond better to future incidents. That
dramatically increases job satisfaction, so that we attract and retain
the best talent. Given the huge amount of competition out there, we
need to be that preferred place to work.”
From customized to off the shelf
As stated previously, Bob and his team started out with a
custom ServiceNow app. What benefits have they seen now that they are
using ServiceNow® Security Incident Response?
One security analyst on Bob’s team talks about moving from ITIL
incidents to security incidents. “When we used ITIL incidents, it was
very basic. We could only put in the category and subcategory.
Everything else had to go in the incident notes. That made it hard to
find the information we needed or to track the state of the ticket.
Now, information is in searchable fields, and we’ve got full support
for NIST incident response steps, so we can easily follow the ticket
through detection and analysis, containment, eradication, and recovery.”
End-to-end visibility with Performance Analytics
Bob
agrees and points to the management visibility that this delivers.
“Because we’ve got security-specific fields and states, we can now
look at our incident data much more effectively using
ServiceNow® Performance Analytics. We’ve got dashboards
that show us exactly where we are and track our progress, and
historical analysis lets us pinpoint areas for improvement and
demonstrate compliance to our audit teams.”
Rich integrations and value-added functionality
“Of course, we also get the full benefits of the ServiceNow
roadmap,” continues Bob. “Instead of building and maintaining our own
integrations to data sources, we get these out of the box–and they are
much richer than the ones we created by ourselves. We also get new
functionality with every release. For example, we’re looking forward
to some significant UI enhancements in the London release, which will
increase our efficiency even further.”
Painless migration
Bob says that the cutover was straightforward. “We went from
using ITIL incidents to using security incidents in a day. Previously,
we didn’t automatically convert alerts into incidents, so this made
the transition easy. If we had, we would have needed to run ITIL
incidents and security incidents in parallel until we were sure we
were getting the same results for both. That’s something to keep in
mind if you’re transitioning from a custom solution to the
out-of-the-box application.”
Is automation always the right answer?
What about other types of automation, such as orchestration of
preventative controls? Here, Bob is more cautious: “Security and IT
teams have different priorities. For IT, it’s all about keeping
systems up and running. For instance, let’s suppose security detects a
virus on a domain controller. We can’t just shut it down
automatically. Instead, we need to talk to IT to understand the impact
and take a risk-based decision together.”
“That’s why automated security orchestration needs to be approached
with caution. We do automate some activities, but we are careful about
the impact on the environment. We only take automated orchestration
decisions with trusted threat information providers.”
What about the future?
Bob is enthusiastic about what
the future holds, planning to take further advantage of existing
ServiceNow Security Operations capabilities, such as the ability to
integrate CMDB data. “There’s huge value in enriching security
incidents with configuration information. When you have the right CI
data at your fingertips–assets, relationships, system owners, and so
on–it makes it much easier to investigate and remediate service
issues. And, by using information such as service maps, you can
prioritize much more accurately by including business impact. There’s
just one caveat. You need a highly accurate CMDB for security incident
purposes–more accurate than you need for IT alone.”
With ServiceNow Security Operations, we’ve strengthened and
accelerated our security processes. We’ve moved away from
time-consuming emails and spreadsheets, creating an automated security
response environment that simplifies investigation, eliminates
time-consuming data collection, and provides end-to-end visibility.
Now, we respond faster and can scale as our business grows. In fact,
we’re already saving 8,700 hours a year in our security operations
center, and we expect that to increase as we continue on our security
automation journey.
Just as important, we are creating the fulfilling experience that
our security analysts deserve. This allows us to attract and retain
the best security talent, so that we continue to meet our security
promise of protecting our customers and our business.