Why The “Autonomous Security Operations Center” Is A Pipe Dream

Tech Industry

Many vendors across the security industry share a vision: to deliver an autonomous security operations center (SOC) with their technology at the center. This idea is about as likely as me being able to join Starfleet and voyage with Captain Janeway in my lifetime. Why? First, let’s level-set on exactly what autonomous means:

denoting or performed by a device capable of operating without direct human control

The idea of a security system that you could literally set and forget is a compelling one — no more staffing shortage, no more security policies, no more breaches. Yet even in the physical world, we have not perfected the art of security by machines. Estimates suggest that there are more than 20 million private security workers globally. Why so many people? Because machines cannot observe, interpret, and react to the infinite variations of human decisions quickly, completely, and accurately in the physical world … or the digital.

Second, the expectation that many have of automation does not meet the reality, for a few reasons. Automation in the SOC comes in one of two forms: manual process automation or automation built into security technologies. Manual process automation is limiting because of the following:

  • Like with physical security, humans are still mandatory, even for basic processes. Human/machine collaboration is a necessity for the automation used in global enterprises, especially with regard to security technologies. The classic example of automation technology built for practitioners in security is security orchestration, automation, and response (SOAR), the security equivalent of basic digital process automation (DPA), which effectively automates repeatable processes such as sales orders, lead generation, and payroll. It is best used for simple, repeatable systems. But even this can go off the rails without human review, such as when employees are automatically offboarded. If checks are not in place to ensure that employees who have actually left the firm are offboarded, you could end up in damaging situations … like CEOs losing access or integrity of all their accounts.
  • Automation is not designed for complex systems that require resilience. Reaping the benefits of DPA requires a simple system, and unfortunately, the SOC isn’t one. The SOC faces very inconsistent inputs in the form of constantly evolving threats, which yields inconsistent outputs. When automation is applied to a complex system made up of unpredictable inputs, it does the opposite of what we come to expect from a simple system — it lowers consistency and quality, and it reduces resilience while increasing the risk of downtime. Imagine an assembly line that starts with the wrong base part — that one little unexpected part can break the whole system.
  • Each added step to an automation chain limits the scope of applicability. Say that your security team wants to set up a SOAR (security orchestration, automation, and response) playbook that, in the event of a potentially malicious file executing on a box originating from a phishing email: isolates the endpoint; checks the reputation on VirusTotal; confirms that the file is malicious; deletes the file; deletes the phishing email across the environment; and blocks the sender of the email. This can be a very advantageous playbook for a security team that regularly faces this issue. It limits the scope of applicability, however, as a series of steps must be met prior to the playbook being triggered. This works fine for consistent inputs, but when inputs are so dramatically inconsistent as in the SOC, with constant new attacks, new technology, and new people, it stops being nearly as effective.

These are also some of the reasons why practitioners have a hard time getting a lot of value out of SOAR beyond 5–10 playbooks (most of which are focused on enrichment).

Advertisement

Lastly, automation built into security technologies is limited because:

  • Humans can always outsmart machines. Human attackers do not follow rules of engagement; they identify gaps in security technologies or even attack the security tech itself. In contrast, security tools must follow a set of rules — they are built with an intention in mind, whether it’s to detect threats on the endpoint or to find anomalies in otherwise consistent data. These constraints force a limitation on technology that cannot be overcome without the aid of humans. If an organization uses endpoint detection and response, an attacker will find a way to bypass it or not target an endpoint. If an organization collects all logs from every single asset into a security information and event management system, an attacker will find a vulnerable employee to leverage for covert access. Technology will always be limited by the purpose it was designed for and will always lack the creativity and scope to address every single potential threat.

Some come back to this last point and say, “Well actually, Deep Blue beat world champion Garry Kasparov at chess back in 1997!” And that is true. But it misses the point. Chess is a game based on a finite set of rules that both sides agree to follow. Machine learning (ML) is built within a particular set of constraints and optimizes based on those constraints — so chess would actually be a good game for ML or AI to excel at.

Security is different. If anything, attackers like breaking rules, especially the very rules that our technology is structured around. The “autonomous SOC” will not be able to operate beyond the constraints we define and thus will always be susceptible to attack and pose its own risk to the organization. We cannot be constrained to rules we put into our technology if we want a robust defense. The autonomous SOC will never be a reality because technology is simply not capable of human ingenuity.

To learn more about this topic, register to attend Forrester’s Security & Risk Forum here.

This post was written by Senior Analyst Allie Mellen and it originally appeared here.

Advertisement

Leave a Reply

Your email address will not be published.