LogRhythm Security Intelligence and Analytics in the Public Sector Whitepaper 2016
SECURITY INTELLIGENCE IN THE PUBLIC SECTOR
Executive Summary
As state agencies, civilian agencies and military branches grow more dependent
on systems and communications in cyberspace, defending the underlying
infrastructure and information and the data it transports is absolutely essential
to our nation’s security and well-being. Cyber threats are constantly evolving,
and agencies must operate under the assumption that a motivated adversary can
and will infiltrate their network environments.
Enormous annual investments in cybersecurity strategies, products and services
have resulted in an overly complex security infrastructure that sometimes fails
to detect malicious intrusions in a timely manner. This is largely due to disjointed
intelligence, alert overload and a dearth of skilled cybersecurity practitioners.
A security intelligence and analytics platform can actually simplify an agency’s
approach to cybersecurity by unifying and analyzing disjointed threat data in order
to surface the important threats and provide automated response capabilities.
The main objective of a security intelligence and analytics platform is to deliver
the right information, at the right time, with the appropriate context, to the
right people in order to significantly decrease the amount of time it takes to
detect and respond to damaging cyber threats. Such a platform takes forensic
data from existing security tools (i.e., log data from firewalls and user activities
from behavioral analytics systems) and aggregates, correlates, and analyzes
the information. This takes the burden off people who would otherwise need to
perform these activities manually to find the threats that pose the biggest risk
to the agency.
A security intelligence platform can help agencies by:
• Increasing the value of their investments in existing security technology
• Discovering and alerting on threats quickly so they can be blocked or stopped
• Increasing the agency’s level of security intelligence maturity
• Meeting compliance requirements for applicable standards and regulations
By following best practices to simplify security intelligence, an agency reduces
the burden on its security operations team and allows technology to do the work
of surfacing and responding to cybersecurity threats.
The LogRhythm Security Intelligence and Analytics Platform empowers agencies
to detect, respond to and neutralize emergent cyber threats, thus preventing
damaging data breaches and other cyber incidents. The deep visibility and
insight delivered by LogRhythm’s platform empowers agencies to secure their
environment and comply with regulatory requirements.
WWW.LOGRHYTHM.COM
PAGE 3
SECURITY INTELLIGENCE IN THE PUBLIC SECTOR
Introduction
Civilian, military and state agencies alike have
grown dependent on a complex set of networks and
communications that represent their own slice of
cyberspace. Due to this dependency, these complex
systems are part of the United States’ national critical
infrastructure. Defending this infrastructure?—?and more
importantly, the information and data it transports
and holds?—?is essential to our nation’s security and
well-being. A strong cyber defense has an impact on
every agency’s mission success.
The threats against this infrastructure are dynamic and
constantly evolving. Some threats are quite advanced and
persistent in their pursuits. Threat actors are well organized
and well-funded, and many of them are known to be
supported by nation states. Attackers relentlessly look for
vulnerabilities to exploit and patiently wait for the right
time to strike. They change their tactics quickly and more
easily than agencies can update their defenses. For most
agencies today, if motivated adversaries want to penetrate
a network, they will.
While defensive strategies are still critically essential today,
it’s even more important to have the ability to find and
associate the subtle signs that a computer system has been
compromised—and to do so quickly to have the opportunity
to disrupt the attack. The time between compromise and
mitigation is a period of great risk for an agency.
Unfortunately, the time it takes to discover a compromise
(known as mean time to detect, or MTTD) is often measured
in weeks or months. The time it takes to process sufficient
intelligence about the attack in order to respond to it
(known as mean time to respond, or MTTR) is too often
measured in days or even weeks. Given such a lengthy head
start, the attackers most likely have already succeeded in
their malicious mission.
The Federal government has already invested tens if not
hundreds of billions of dollars in cybersecurity strategies,
products, and services. All of this investment has led to
an overly complex security infrastructure that exceeds
the human capacity to operate and maintain it efficiently
and effectively. Incident alerts numbering in the tens of
thousands each day overwhelm the security operations
(OPSEC) teams who cannot possibly investigate and
respond to everything.
Across the board with the public sector, there are two
pervasive issues that contribute to this complexity:
• the fact that security tools are, more often than not,
deployed in silos, and
• a lack of trained InfoSec professions in the
cybersecurity workforce.
Security tools, and the intelligence derived from them, are
often deployed in silos.
These are all valuable tools in their own right, and a layered
defense using multiple tactics is critically important,
but the result is a complex security environment with
disjointed intelligence and too many alerts to realistically
evaluate and respond to. Too often, these products aren’t
integrated?—?meaning they can’t exchange and correlate
data?—?so there is little opportunity to connect the dots that
would point to an intrusion. Too many individual dots create
a fog that masks the signs of an attack.
Organizations in the public sector are struggling with
keeping trained personnel on staff due to the lack of
trained InfoSec professionals in the workforce and
frequent turnover.
This issue becomes more acute when teams spend time
training a resource to become highly proficient, and then
that resource leaves. This tends to happen frequently in the
public sector because resources are working on a contract
basis, or they go to the public sector for more attractive pay.
New analysts coming in to fill the vacated roles need time
to ramp up and gain similar expertise. In the meantime, the
mission is jeopardized when the security team is a jack of all
trades but a master of none.
With too much complexity and not enough trained
people, it’s crucial that DoD, civilian and state
agencies simultaneously simplify and strengthen
their approach to cybersecurity to be successful in
their true missions and to stay a step ahead of cyber
adversaries and nation states.
WWW.LOGRHYTHM.COM
PAGE 4
Please complete the form to gain access to this content