Automation insights

Automation insights

UEBA and SOAR to improve in-depth defense

UEBA and SOAR to improve in-depth defense

Dec 27, 2021

Paul-Arthur

Jonville

Okay, bad news first. At some point, every company will be breached by an attacker. There's no 100% security-proof system. You need a User Entity Behavior Analytics (UEBA) tool.

Indeed, attackers can breach your firewalls, send you malicious e-mails, or even bribe one of your employees to gain access to your firewalls. Your protection tools and systems can quickly become obsolete when facing rapidly evolving threats.

A UEBA gives you an extra layer of protection at the core of your system when your first layers of security have failed and the attacker is inside.

Below, we're going to learn together:

  • What exactly is a UEBA;

  • Can you combine UEBA and SOAR?

  • Why you should have both.


What's a UEBA?

A UEBA is a cyber security process slightly different from your usual firewalls or detection and response tools. As its name states, it focuses on behavior monitored rather than precise Indicators of Compromise (IoC). To that end, there's an essential emphasis on expected behavior, which is used to detect what can be called abnormal.

Let's take an example to introduce the process. If one of the users on your private network is used to downloading a few files every day but suddenly starts downloading thousands of them, the UEBA detects this abnormality and goes red. It would notify the user concerned and a security agent to ensure this abnormal behavior isn't malicious.

But how can a UEBA detect such deviations from normal behaviors? It uses several technologies to acknowledge past behaviors and compare them to new ones: machine learning, algorithms, and statistical analyses, to name a few. This is known as baselining. To that end, it ingests data from a general data repository such as a data lake or data warehouse or through a SIEM. They should not deploy agents directly in the IT environment to collect the data.

This way, a UEBA can detect a deviation from the previously established pattern about a particular user. Thus, it shows which anomalies could result in a potential, tangible threat. UEBA can also aggregate data in your reports and logs and analyze files, flow, and packet information.

You're not going after security events or monitoring all your devices here. Instead, you will track all the users and entities in your system. Threats that we would call insider or internal and would divide into:

  • Compromised insider: an employee has given unintentionally, through phishing, for instance, access to an attacker.

  • Malicious insiders are employees, former employees, contractors, or associates who deliberately harm your company by stealing intellectual property and/or customer information for financial interest or to cause disruption.

  • Negligent insider: employees or contractors deliberately bypass security policies out of convenience or incompetence.

As we said at the beginning of this paragraph, a UEBA doesn't focus on your typical IoCs when detecting threats. It focuses on threats already in your systems, which is why we say that it's the last layer of protection in your security architecture.

In this regard, even though a UEBA relies on cross-organizational security data to work, which your SIEM usually collects, these two tools are different in how they work and what they're looking after.

A SIEM is an aggregation of different and complex tools and technologies that aims to give you a comprehensive view of your system's security. It uses data and event information to see standard patterns and trends and alerts you when abnormal trends and events occur. A UEBA works the same way but uses user behavior information to detect normal behavior and what's not.

A SIEM, however, is rules-based. Facing a SIEM, advanced hackers can work around or evade the rules. UEBA, on the other hand, does not rely on rules. Instead, it uses risk-scoring techniques and advanced algorithms to detect anomalies over time.


UEBA and SOAR what up


The benefits of a UEBA

Some would say, "why would I need a UEBA? I have all the next-gen security tools in my security stack!"

First, bear in mind that the human element is the cause of 85% of successful attacks: compromised, negligent, or malicious insiders. All of them include a human as the primary vector of the successful attack. Second, even though cyber security tools are evolving, defense is more often than not profoundly reactive.

As a result, we're confronted with waves of rapidly changing threats. We're trying to cope with attackers' ingenuity in discovering and weaponizing unknowns.

When you combine these two elements, you end up with systems that are soon to be breached. This isn't meant to be alarmist or defeatist. Rather, it's about facing the truth regarding cybersecurity. No matter what defenses you have in place, you can't achieve 100% impermeability to all threats. There are too many unknown variables to be certain of absolute security. Thinking that you're invulnerable if you're protected against certain threats can leave you caught off guard when an attack occurs.

Acknowledging this helps you prepare for this eventuality instead of facing it naked, unprepared.

We can think of this as one of the last inner layers of defense once the enemy is inside its walls. You want to be able to keep track of your enemy once it breaches the gates, to know where they're going, what they're targeting, and where to hit. Moreover, sometimes, you wouldn't be aware of the breaches until enemies advance on the kill chain to deliver their payload.

The bottom line is: don't only focus on preventive measures but also insider detection.

As always, think of an onion or a Vauban fortification, multiple layers of defense complementary to each other. The goal is enhanced security posture, with no holes left behind.


Can you pair UEBA and SOAR?

How can you maximize UEBA's efficiency and efficacy within your system?

This is where Security orchestration, automation, and response (SOAR) helps. As we've said multiple times here, a SOAR is designed to orchestrate your tool stack and automate information sharing and decisions via playbooks. In these playbooks or workflows, you connect the tools you're using to automate the flows between them.

Why is this useful? First, companies usually use an increasing number of tools from different providers, which lack semantic awareness. The SOAR is a wrapper. It connects them and enables the automation of flows. As such, it makes your system coherent as an orchestrator.

As a layer of defense, it must be connected with the other tools you use to deliver its maximum efficiency. As an informative tool about the whereabouts of your users' activities on your network, its main mission is to provide an exhaustive vision, not to act.

However, threats can materialize quickly once they deliver payloads. We're talking about machine-time speed. Can you imagine a human having to switch between alerts coming from the UEBA and mitigation processes? You need to leverage the power of your other tools to mitigate active threats. A SOAR helps you decide.

By integrating UEBA and SOAR capabilities, security teams can proactively detect and react to complex security events, perform automated behavioral profiling, and automatically interact with IT and security systems to mitigate incidents.

Let's take the example of a malicious insider, the most challenging insider threat in complexity. The user is 100% legit. The only things that could uncover them would be abnormal traffic or suspicious privilege escalation. The UEBA acts as an alert if this behavior diverts from its baseline. However, once you're alerted, you need to act fast to counter eventual data theft.

Working in the old style would require you to switch between your user management system, endpoint monitor, firewalls, or proxies to neutralize the user's activity and potential data outflows.

The SOAR enables you to predetermine these steps in playbooks and set triggers. For instance, a UEBA alert can trigger your user privilege revocation playbook. The security agent is notified of the alert and can even be advised on which steps to take next. The playbook can autonomously mitigate the threat from detection to remediation, making it an automation platform.


UEBA and SOAR



Conclusion

The sky's the limit when talking about the SOAR orchestration and automation capabilities. We've already talked about EDR and SIEM pairing benefits with a SOAR. Here again, we've shown that a UEBA can benefit immensely when oversaw by a SOAR: you're able to act upon alerts via the SOAR platform.
All in all, a SOAR is a wrapper. It enables you to make the best out of your tools and build advanced security processes such as a Zero Trust architecture, for instance.

Automate processes with AI,
amplify Human strategic impact.

Get a demo

Automate processes with AI,
amplify Human strategic impact.

Get a demo