The “Autonomous SOC” Is A Pipe Dream

Many vendors across the security industry share a vision: to deliver an autonomous security operations center (SOC) with their technology at the center. This idea is about as likely as me being able to join Starfleet and voyage with Captain Janeway in my lifetime. Why? First, let’s level-set on exactly what autonomous means:

denoting or performed by a device capable of operating without direct human control

The idea of a security system that you could literally set and forget is a compelling one — no more staffing shortage, no more security policies, no more breaches. Yet even in the physical world, we have not perfected the art of security by machines. Estimates suggest that there are more than 20 million private security workers globally. Why so many people? Because machines cannot observe, interpret, and react to the infinite variations of human decisions quickly, completely, and accurately in the physical world … or the digital.

Second, the expectation that many have of automation does not meet the reality, for a few reasons. Automation in the SOC comes in one of two forms: manual process automation or automation built into security technologies. Manual process automation is limiting because of the following:

  • Like with physical security, humans are still mandatory, even for basic processes. Human/machine collaboration is a necessity for the automation used in global enterprises, especially with regards to security technologies. The classic example of automation technology built for practitioners in security is SOAR; the security equivalent of basic DPA, which effectively automates repeatable processes like sales orders, lead generation, and payroll. It is best used for simple, repeatable systems. But even this can go off the rails without human review such as when employees are automatically offboarded. If checks are not in place to ensure employees that have actually left the firm are offboarded, you could end up in damaging situations…like CEOs losing access or integrity of all their accounts.
  • Automation is not designed for complex systems that require resilience. Reaping the benefits of DPA requires a simple system, and unfortunately, the SOC isn’t one. The SOC faces very inconsistent inputs in the form of constantly evolving threats, which yields inconsistent outputs. When automation is applied to a complex system made up of unpredictable inputs, it does the opposite of what we come to expect from a simple system – it lowers consistency and quality, and it reduces resilience while increasing the risk of downtime. Imagine an assembly line that starts with the wrong base part – that one little unexpected part can break the whole system.
  • Each added step to an automation chain limits the scope of applicability. Say your security team wants to set up a SOAR playbook that, in the event of a potentially malicious file executing on a box originating from a phishing email: isolates the endpoint, checks the reputation on Virus Total, confirms the file is malicious, deletes the file, deletes the phishing email across the environment, and blocks the sender of the email.  This can be a very advantageous playbook for a security team that regularly faces this issue. However, it limits the scope of applicability, as a series of steps must be met prior to the playbook being triggered. This works fine for consistent inputs, but when inputs are so dramatically inconsistent as in the SOC, with constant new attacks, new technology, and new people, it stops being nearly as effective.

These are also some of the reasons practitioners have a hard time getting a lot of value out of SOAR beyond 5 – 10 playbooks (most of which are focused on enrichment).

SaleBestseller No. 1
INSIGNIA 32-inch Class F20 Series Smart HD 720p Fire TV with Alexa Voice Remote (NS-32F201NA23, 2022 Model)
  • 720p resolution View your favorite movies, shows...
  • Alexa voice control - The Alexa Voice Remote lets...
  • Fire TV experience built-in - Watch over 1 Million...
  • Supports Apple AirPlay - Share videos, photos,...
  • Supports HDMI ARC - Sends audio directly from the...
SaleBestseller No. 2
VIZIO 40-inch D-Series Full HD 1080p Smart TV with AMD FreeSync, Apple AirPlay and Chromecast Built-in, Alexa Compatibility, D40f-J09, 2022 Model
  • 1080p High-Definition - Watch TV in crisp, clear...
  • Full Array LED Backlight - Evenly distributed LEDs...
  • IQ Picture Processor - Delivers superior picture...
  • V-Gaming Engine Automatically optimizes picture...
  • SmartCast - With intuitive navigation, enjoy...

Last update on 2024-04-05 / Affiliate links / Images from Amazon Product Advertising API

Lastly, automation built into security technologies is limited because:

  • Humans can always outsmart machines. Human attackers do not follow rules of engagement; they identify gaps in security technologies or even attack the security tech itself. In contrast, security tools must follow a set of rules – they are built with an intention in mind, whether it’s to detect threats on the endpoint or to find anomalies in otherwise consistent data. These constraints force a limitation on technology that cannot be overcome without the aid of humans. If an organization uses EDR, an attacker will find a way to bypass it, or not target an endpoint. If an organization collects all logs from every single asset into a SIEM, an attacker will find a vulnerable employee to leverage for covert access. Technology will always be limited by the purpose it was designed for and will always lack the creativity and scope to address every single potential threat.

Some come back to this last point and say, “well actually, Deep Blue beat world champion Garry Kasparov at chess back in 1997!”. And that is true. But it misses the point. Chess is a game based on a finite set of rules both sides agree to follow. Machine learning is built within a particular set of constraints and optimizes based on those constraints – so chess would actually be a good game for ML or AI to excel at.

Security is different. If anything, attackers like breaking rules, especially the very rules our technology is structured around. The ‘Autonomous SOC’ will not be able to operate beyond the constraints we define, and thus, will always be susceptible to attack and pose its own risk to the organization. We cannot be constrained to rules we put into our technology if we want a robust defense. The autonomous SOC will never be a reality because technology is simply not capable of human ingenuity.

New
Samsung 85 Inch DU8000 Crystal UHD LED 4K Smart TV Bundle with 2 YR CPS Enhanced Protection Pack (2024 Model)
  • SAMSUNG USA AUTHORIZED - Includes 2 Year Extended...
  • Samsung 85 Inch DU8000 Crystal UHD LED 4K Smart TV...
  • UHD Dimming | Auto Game Mode (ALLM) | Alexa...
  • SAMSUNG TIZEN OS: Stream your favorite shows, play...
  • BUNDLE INCLUDES: Samsung DU8000 Series 4K HDR...
New
Samsung 75 Inch DU8000 Crystal UHD LED 4K Smart TV Bundle with 2 YR CPS Enhanced Protection Pack (2024 Model)
  • SAMSUNG USA AUTHORIZED - Includes 2 Year Extended...
  • Samsung 75 Inch DU8000 Crystal UHD LED 4K Smart TV...
  • UHD Dimming | Auto Game Mode (ALLM) | Alexa...
  • SAMSUNG TIZEN OS: Stream your favorite shows, play...
  • BUNDLE INCLUDES: Samsung DU8000 Series 4K HDR...

Last update on 2024-04-05 / Affiliate links / Images from Amazon Product Advertising API

There’s more to the Machine Learning aspects of this problem that I’ll be digging into in future research and a blog post. In the meantime, I’ll be speaking on this topic at Forrester’s Security and Risk Forum 2022. Come join us in DC or the virtual experience and hear my talk on The Truth Behind ML’s Madness: How AI Is Actually Used In Detection And Response.

The “Autonomous SOC” Is A Pipe Dream