Honeypots.
Just those three syllables are enough to cause instant nausea with a cyber security professional. Why? Honeypots are hard to operationalize into an effective, easy to use and consistent defense. But times are changing with the proliferation of deception technologies (Gartner tracked 16 vendors in a September 2016B report). Can deception be easily rolled into a cyber security defense?
The problem so far has been properly operationalizing deception. Implementing is a lot of work. Todayb s deception approaches, like camouflage in the physical world, rely on consistent surroundings for concealment. When soldiers wear camouflage for snow, the desert or a forest and surroundings remain constant, youb re fine. But ascend from the forest to a snowy mountaintop and, unless you can rapidly change, youb re exposed. Every IT environment constantly changes. If deception canb t adapt like a chameleon, itb s useless. Thatb s Deception 1.0.
Enterprises need something that morphs. Modern deception must update dynamically with the environment being protected. For example, can your deception technology detect and recognize that you just updated a Linux installation? Thatb s Deception 2.0.
Thatb s the defense philosophy behind Deception 2.0. But the question is: how do security teams make deception deployable and effective? It has to be easy. And we mean dirt effing simple. A no brainer, easy as pie or any of other appropriateB idiom. A recentB reportfound that enterprises average 17,000 malware alerts per week so itb s a safe bet that alert number 17,001 wonb t be investigated. In such an environment, deception must be operationalized quickly, easily and with tremendous impact. How would that look? It should meet several key business, technical and usability criteria.
Technically, one should learn from the mistakes of many of todayb s security vendors who have built products with long deployments and complex configurations. Deception tools must able to:
- Hide in plain sight.B For aB Deception Solution, this tops the list. How does this work? A deception technology needs to have some machine learning to understand and conform to your ever-evolving organization. By implication, this also means deception should be autonomousb the tool runs on its own, no tuning required.
- Deploy within minutes: Tool is deployed easily and let it understand your environment. Once installed, the deception tool provides a list of recommendations within just a few hours. The UI says hereb s what you should do.
- Integrate with other security tools: Most security teams have their favorite tools of choice. At a minimum, a deception tool quickly integrates into your ecosystem.
From a usability perspective, security tools should:
- Fit into your current workflow. Rather than do health checks every morning in a separate UI, an alert from a deception system should go into whatever event monitoring tool youb ve got deployed.
- Enhance productivity. Deception, with its attack visibility, can help tune, for example, Splunk logs and reduce alerts. At the end of the day, you have a secondary, more reliable tool to understand if something is true or false, reducing alert fatigue. This also means accelerated investigations with improved breach response and visibility as well as augmenting the ROI from other security tools.
Lastly, and most importantly, does the deception tool help the business? It should have clear, quantifiable impact that allows the security team to stand in front of the CEO and say, b hereb s how we reduced risk.b
- Stops data/IP loss.B The name of the gameb enough said.
- Reduce time to discovery. We all know that stats that dwell times are long, often starting around the Mesozoic Era. As security professionals, compressing this time is critical for many reasons. For example, you have a better idea of who did it. What were they after? What did an employee click on?
- Improves executive awareness and understanding. With security in headlines almost daily, C-levelb s often ask, b Are we safe from [insert name of whatever spooky attack group a vendorb s marketing geek came up with]?b You want to respond, b Yes, and hereb s how we kept them out. Also, we aware of their attack methods and what theyb re hoping to do.b In other words, the tool should help show that your team has its act together.
Deception, if done properly, can be a transformational shift in security strategy. By duping attackers and decreasing the attack surface, more of a burden of effort shifts back to the attacker. To succeed, deception efforts need to be inexpensive and usable by any enterprise, large or small, well staffed or under staffed. Today, many Deception 1.0 technologies are on premise and focus on large, well-establishedB companies. But deception should become foundational, a cornerstone of everyoneb s security strategy. If anyone tells you that an expensive, professional services heavy deployment is requiredb donb t be deceived.
Get notified of the next blog post