Home
%3CLINGO-SUB%20id%3D%22lingo-sub-782014%22%20slang%3D%22en-US%22%3EThe%20Golden%20Hour%20remake%20-%20Defining%20metrics%20for%20a%20successful%20security%20operations%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-782014%22%20slang%3D%22en-US%22%3E%3CP%3EIn%20the%20last%20few%20weeks%20I%20have%20been%20hearing%20more%20and%20more%20prospects%20and%20customers%20ask%20about%20our%20response%20service-level%20agreement%20(SLA)%2C%20and%2C%20to%20be%20honest%2C%20it%E2%80%99s%20great%20and%20about%20time!%20Security%20operators%2C%20incident%20responders%2C%20or%20security%20analysts%20should%20all%20have%20an%20easy%20way%20to%20evaluate%20their%20work.%20And%20what%E2%80%99s%20better%20than%20well-defined%20%3CA%20href%3D%22https%3A%2F%2Fwww.bing.com%2Fsearch%3Fq%3Ddefine%2Bkey%2Bperformance%2Bindicator%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ekey%20performance%20indicator%3C%2FA%3Es%20(%3CA%20href%3D%22https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FPerformance_indicator%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EKPIs%3C%2FA%3E%3CU%3E)%3C%2FU%3E%3F%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWhen%20we%20meet%20prospects%2C%20some%20of%20the%20things%20we%20ask%20them%20are%20%22What%E2%80%99s%20your%20mean%20time%20to%20detect%3F%22%2C%20%22What%E2%80%99s%20your%20mean%20time%20to%20investigate%3F%22%2C%20and%20%22What%E2%80%99s%20your%20mean%20time%20to%20respond%20and%20mean%20time%20to%20repair%3F%22%2C%20and%20the%20most%20common%20response%20is%3A%20%E2%80%9CWhat%3F%20We%20don't%20formally%20track%20our%20time%20%E2%80%A6%20we%20%3CSTRONG%3Ethink%3C%2FSTRONG%3Eit's%20X%20minutes%2Fhours.%E2%80%9D%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20next%20question%20we%20would%20usually%20ask%20is%2C%20%22So%20how%20do%20you%20know%20that%20you%20are%20doing%20a%20good%20job%3F%22%2C%20%22How%20do%20you%20know%20that%20you%20are%20improving%2Fprogressing%20from%20time%20to%20time%3F%22%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAnswers%20we%20would%20get%20to%20these%20questions%20are%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EMy%20job%20is%20to%20%22clean%22%20the%20queue%20(SIEM%2FProduct%20Specific)%3C%2FLI%3E%0A%3CLI%3EWe%20are%20overwhelmed%20anyway%20so%20we%20are%20doing%20what%20we%20can.%3C%2FLI%3E%0A%3CLI%3EAs%20long%20as%20there%20is%20no%20breach%20on%20my%20network%2C%20I%20am%20doing%20my%20job%3C%2FLI%3E%0A%3CLI%3EAs%20long%20as%20my%20company%20is%20not%20on%20the%20front%20page%20of%20the%20newspaper%20I%E2%80%99m%20fine%3C%2FLI%3E%0A%3CLI%3Eetc.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSPAN%20style%3D%22font-family%3A%20inherit%3B%22%3EUsually%2C%20the%20last%20question%20would%20be%2C%20%22Have%20you%20heard%20about%20the%20%22golden%20hour%22%3F%22.%20The%20answer%20was%20usually%20%E2%80%9CYes%E2%80%9D.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20case%20you%E2%80%99re%20not%20familiar%20with%20the%20term%2C%20%E2%80%9Cgolden%20hour%E2%80%9D%20originated%20from%20hospitals.%20From%20%3CA%20href%3D%22https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FGolden_hour_(medicine)%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EWiki%3CU%3Epedia%3C%2FU%3E%3C%2FA%3E%3A%20%3CEM%3E%22The%20golden%20hour%2C%20also%20known%20as%20golden%20time%2C%20refers%20to%20the%20period%20of%20time%20following%20a%20traumatic%20injury%20during%20which%20there%20is%20the%20highest%20likelihood%20that%20prompt%20medical%20and%20surgical%20treatment%20will%20prevent%20death%22%3C%2FEM%3E.%20The%20term%20was%20used%20in%20the%20early%202010s%20to%20express%20how%20important%20it%20is%20to%20respond%20to%2Frepair%20a%20cybersecurity%20threat%20in%20the%20first%20hour.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFast%20forward%20to%20today's%20world%3A%20the%20term%20%E2%80%9Cgolden%20hour%E2%80%9D%20was%20deemed%20a%20buzzword%20and%20vendors%20have%20stopped%20using%20it.%20The%20concept%20was%20not%20lost%2C%20though%3B%20it%E2%80%99s%20just%20called%20something%20else.%20Nothing%20really%20changed%2C%20based%20on%20our%20perception%2C%20and%20it%20should.%20I%20think%20we%20should%20learn%20from%20our%20past%2C%20so%20we%20can%20progress%3A%20although%20the%20concept%20of%20the%20golden%20hour%20is%20great%20for%20medicine%2C%20it%E2%80%99s%20time%20to%20re-evaluate%20how%20it%E2%80%99s%20used%20in%20cybersecurity%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20some%20of%20the%20attacks%20we%E2%80%99ve%20seen%20in%20the%20last%20few%20years%20(WannaCry%2C%20Petya%2C%20Bad%20Rabbit%2C%20etc.)%2C%20the%20%22golden%20hour%22%20concept%20just%20doesn't%20hold.%20On%20top%20of%20malware%20threats%20that%20spread%20quickly%2C%20we%20have%20seen%20more%20and%20more%20attackers%20using%20automation%20(we%20provide%20%3CA%20href%3D%22%23automation%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Esome%20examples%3C%2FA%3Ein%20this%20blog).%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20should%20go%20back%20to%20basics%3A%20we%20need%20to%20do%20our%20best%20to%20prevent%20attacks%20from%20happening%20in%20the%20first%20place.%20And%20just%20because%20it's%20fun%20I%E2%80%99ll%20now%20provide%20you%20with%20one%20analogy%20from%20the%20software%20development%20world%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20624px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F125104i69F84BB424A448F9%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22clipboard_image_0.png%22%20title%3D%22clipboard_image_0.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EFigure%201%20Source%3A%20%3CA%20href%3D%22https%3A%2F%2Fdeepsource.io%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdeepsource.io%3C%2FA%3E%3CA%20href%3D%22https%3A%2F%2Fdeepsource.io%2Fblog%2Fexponential-cost-of-fixing-bugs%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3ELink%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EI'm%20sure%20you%20get%20the%20point%20(shift-left).%20%3B)%3C%2Fimg%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20you%20really%20like%20to%20secure%20your%20organization%2C%20I%20would%20recommend%20the%20following%20(divided%20into%20three%20categories)%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSTRONG%3EKnown%20knowns%3C%2FSTRONG%3E-%20We%20can't%20continue%20to%20ignore%20this%20area%20(Yes%2C%20it%E2%80%99s%20less%20)%2C%20but%20most%20(not%20all)%20of%20you%20problems%20(threats)%20could%20be%20solved%20or%20dramatically%20reduced%20by%20implementing%20a%20vulnerability%20management%20program%2C%20exploit%20mitigations%2C%20secure%20configuration%20(fix%20all%20misconfiguration%2C%20security%20hardening)%2C%20and%20by%20building%20secure%20perimeters%20(network%20perimeter%2C%20physical%20devices%2C%20application%20control%2C%20etc.).%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EKnown%20unknowns%3C%2FSTRONG%3E-%20In%20this%20area%20our%20mindset%20should%20be%2C%20%22We%20haven't%20seen%20this%20before%2C%20but%20we%20have%20the%20tools%20to%20stop%20it%22.%20We%20should%20take%20into%20consideration%20solutions%20like%20machine%20learning-driven%20next-generation%20antimalware%2C%20automatic%20containment%20(i.e.%2C%20conditional%20access)%2C%20and%20automatic%20investigation%20and%20remediation%20solutions%20to%20reduce%20risk%20as%20fast%20as%20possible%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EUnknown%20unknowns%3C%2FSTRONG%3E-%20In%20this%20area%20we%20should%20focus%20on%20visibility%20and%20expert%20assistance%3A%20best-in-class%20endpoint%20detection%20and%20response%20(EDR)%20solution%20and%20managed%20detection%20and%20response%20(MDR)%20services%20that%20have%20your%20back%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOne%20last%20recommendation%20is%20to%20define%20a%20set%20of%20KPIs%20and%20to%20monitor%20your%20efficiency%20and%20progress.%20You%20can%20start%20with%20the%20following%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EMean%20time%20to%20detect%20-%20The%20average%20time%20it%20takes%20to%20recognize%20a%20threat%3C%2FLI%3E%0A%3CLI%3EMean%20time%20to%20Investigate%20-%20The%20average%20time%20it%20takes%20to%20analyze%20the%20potential%20threat%20and%20identify%20if%20any%20further%20response%20actions%20are%20needed%3C%2FLI%3E%0A%3CLI%3EMean%20time%20to%20respond%20-%20the%20average%20time%20it%20takes%20to%20response%20and%20stop%20a%20potential%20threat%20from%20spreading%20or%20creating%20any%20damage.%3C%2FLI%3E%0A%3CLI%3EMean%20time%20to%20repair%2Frecover%20-%20The%20average%20time%20it%20takes%20to%20restore%20to%20normal%20operations%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EI%20hope%20you%20found%20this%20blog%20interesting%20and%20worth%20your%20time.%20Use%20the%20comments%20to%20give%20feedback%20and%20share%20your%20thoughts%20on%20KPIs%20that%20you%20use%20in%20your%20organization.%20(Hint%3A%20We%20might%20have%20another%20blog%20in%20the%20oven%20on%20the%20%22Top%20six%20security%20KPIs%20organizations%20should%20track%22.)%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20target%3D%22_blank%22%20name%3D%22automation%22%3E%3C%2FA%3E%3C%2FP%3E%0A%3CP%3EExamples%20of%20attackers%20using%20automation.%20%3CA%20href%3D%22https%3A%2F%2Fblog.radware.com%2Fsecurity%2Fbotnets%2F2019%2F01%2Fattackers-are-leveraging-automation%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fblog.radware.com%2Fsecurity%2Fbotnets%2F2019%2F01%2Fattackers-are-leveraging-automation%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.securityweek.com%2Fhow-machine-learning-will-help-attackers%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.securityweek.com%2Fhow-machine-learning-will-help-attackers%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.bankinfosecurity.com%2Flazy-hacking-attack-automation-continues-to-increase-a-11152%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.bankinfosecurity.com%2Flazy-hacking-attack-automation-continues-to-increase-a-11152%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-782014%22%20slang%3D%22en-US%22%3E%3CP%3EMichelangelo%20said%3CEM%3E%E2%80%9CThe%20greater%20danger%20for%20most%20of%20us%20isn't%20that%20our%20aim%20is%20too%20high%20and%20miss%20it%2C%20but%20that%20it%20is%20too%20low%20and%20we%20reach%20it.%E2%80%9D%3C%2FEM%3Ebut%20what%20would%20he%20say%20about%20people%20that%20don't%20have%20any%20goals...%20In%20this%20blogs%20we%20will%20try%20to%20brake-down%20KPIs%20needed%20for%20security%20operations%3C%2FP%3E%3C%2FLINGO-TEASER%3E

In the last few weeks I have been hearing more and more prospects and customers ask about our response service-level agreement (SLA), and, to be honest, it’s great and about time! Security operators, incident responders, or security analysts should all have an easy way to evaluate their work. And what’s better than well-defined key performance indicators (KPIs)?

 

When we meet prospects, some of the things we ask them are "What’s your mean time to detect?", "What’s your mean time to investigate?", and "What’s your mean time to respond and mean time to repair?", and the most common response is: “What? We don't formally track our time … we think it's X minutes/hours.”

 

The next question we would usually ask is, "So how do you know that you are doing a good job?", "How do you know that you are improving/progressing from time to time?"

 

Answers we would get to these questions are:

  • My job is to "clean" the queue (SIEM/Product Specific)
  • We are overwhelmed anyway so we are doing what we can.
  • As long as there is no breach on my network, I am doing my job
  • As long as my company is not on the front page of the newspaper I’m fine
  • etc.

Usually, the last question would be, "Have you heard about the "golden hour"?". The answer was usually “Yes”.

 

In case you’re not familiar with the term, “golden hour” originated from hospitals. From Wikipedia: "The golden hour, also known as golden time, refers to the period of time following a traumatic injury during which there is the highest likelihood that prompt medical and surgical treatment will prevent death". The term was used in the early 2010s to express how important it is to respond to/repair a cybersecurity threat in the first hour.

 

Fast forward to today's world: the term “golden hour” was deemed a buzzword and vendors have stopped using it. The concept was not lost, though; it’s just called something else. Nothing really changed, based on our perception, and it should. I think we should learn from our past, so we can progress: although the concept of the golden hour is great for medicine, it’s time to re-evaluate how it’s used in cybersecurity

 

In some of the attacks we’ve seen in the last few years (WannaCry, Petya, Bad Rabbit, etc.), the "golden hour" concept just doesn't hold. On top of malware threats that spread quickly, we have seen more and more attackers using automation (we provide some examples in this blog).

 

We should go back to basics: we need to do our best to prevent attacks from happening in the first place. And just because it's fun I’ll now provide you with one analogy from the software development world:

clipboard_image_0.png

Figure 1 Source: https://deepsource.io Link

 

I'm sure you get the point (shift-left). ;)

 

If you really like to secure your organization, I would recommend the following (divided into three categories)

  • Known knowns - We can't continue to ignore this area (Yes, it’s less ), but most (not all) of you problems (threats) could be solved or dramatically reduced by implementing a vulnerability management program, exploit mitigations, secure configuration (fix all misconfiguration, security hardening), and by building secure perimeters (network perimeter, physical devices, application control, etc.).
  • Known unknowns - In this area our mindset should be, "We haven't seen this before, but we have the tools to stop it". We should take into consideration solutions like machine learning-driven next-generation antimalware, automatic containment (i.e., conditional access), and automatic investigation and remediation solutions to reduce risk as fast as possible
  • Unknown unknowns - In this area we should focus on visibility and expert assistance: best-in-class endpoint detection and response (EDR) solution and managed detection and response (MDR) services that have your back

 

One last recommendation is to define a set of KPIs and to monitor your efficiency and progress. You can start with the following:

  • Mean time to detect - The average time it takes to recognize a threat
  • Mean time to Investigate - The average time it takes to analyze the potential threat and identify if any further response actions are needed
  • Mean time to respond - the average time it takes to response and stop a potential threat from spreading or creating any damage.
  • Mean time to repair/recover - The average time it takes to restore to normal operations

 

I hope you found this blog interesting and worth your time. Use the comments to give feedback and share your thoughts on KPIs that you use in your organization. (Hint: We might have another blog in the oven on the "Top six security KPIs organizations should track".)

 

Examples of attackers using automation. https://blog.radware.com/security/botnets/2019/01/attackers-are-leveraging-automation/

https://www.securityweek.com/how-machine-learning-will-help-attackers

https://www.bankinfosecurity.com/lazy-hacking-attack-automation-continues-to-increase-a-11152