Hackers of India

Tackling Advanced Threat Landscape with MDR - Best Practices

 Vijayakumar K M 

2023/08/07


Presentation Material

AI Generated Summarymay contain errors

Here is a summarized version of the content:

Threat Deduction and Response Cycle

The threat deduction and response cycle consists of five stages:

  1. Deduction: Identify potential threats using various levels of analysis.
  2. Containment: Use playbooks to automate containment measures based on threat actor TTPs (Tactics, Techniques and Procedures).
  3. Response: Implement security automation workflows to investigate entries and respond to threats.
  4. Effectiveness Measurement: Assess the effectiveness of the MDR (Managed Detection and Response) solution using red teaming and blue teaming exercises.
  5. Continuous Improvement: Refine the MDR capability based on lessons learned from the threat deduction and response cycle.

MDR Components

A comprehensive MDR solution should include:

  1. Credible strong threat intelligence
  2. User and Entity Behavior Analysis (UEBA) capability
  3. In-built SOAR (Security Orchestration, Automation, and Response) capability

Speed to Respond

To respond quickly to threats, consider implementing security automation workflows for:

  1. Enriching alerts as part of well activity
  2. Containment measures such as blocking malicious traffic at the firewall level or EDR (Endpoint Detection and Response) level
  3. User awareness and blocking malicious emails at the gateway level

Measuring MDR Effectiveness

To measure the effectiveness of an MDR solution, consider:

  1. Assessing the ability to detect threats published in threat advisories
  2. Conducting red teaming and blue teaming exercises to test controls
  3. Evaluating the overall maturity of the SOC (Security Operations Center) using a framework such as the Gartner SOC Maturity Model

By following this approach, organizations can enhance their threat detection and response capabilities, ultimately improving their security posture.