If you read this, you probably have an operational Managed Detection & Response (MDR) solution up-and-running, either outsourced or developed in-house. Is this the end? Can you now lean back and enjoy the hard work? The honest answer is, you could, but you could also increase the value of all your hard work!
Let's summarize what you have achieved by having a MDR solution in place:
Now let’s explore how you can further increase the value of the service for your company!
An important part of a functional MDR service is the reduction of noise, false positives as well as an increase of the overall maintainability of the environment that is protected as well as the preventative measures.
This can be achieved by specifically working on the following topics:
In other words: if you want to get the most out of your MDR service you need to ensure that you provide the MDR service with the best possible environment to detect deviations and anomalies. To achieve this you can use the information that the MDR service already collects to augment your security operations.
Which threat intelligence is truly relevant for your organization and how does it affect you? Ensuring that your MDR provider is able to answer these questions will aid you in avoiding reactions that are driven by fear instead of facts or data.
The mapping of new threat intelligence to tactics and techniques to determine if they are covered by the MDR service can provide you with piece of mind knowing that the behavior of relevant attackers is already acted upon. This also aids you in determining if you need to wake-up your system administrators or if you can follow the regular patch cycle.
The retention of data also plays an important part in your MDR service. Part of received threat intelligence is of course the famous Indicators Of Compromise (IOC) which are pieces of data that can be matched against the collected data. When you receive new threat intelligence you also want to match this information against the historically collected data, any MDR service could have missed something. So you need to know if these IOCs are or have been present anywhere within your infrastructure.
Besides the searching, matching & determining if the newly acquired threat intelligence information affects you, you also need your MDR service to pro-actively block certain IOCs to prevent a potential breach. Specially when the received threat intelligence warns of a potential incoming wave of attacks.
Threats evolve over time, whereby time is relative. Sometimes they evolve over months and sometimes they evolve in just a couple of days. To ensure that the MDR service is aligned with the threat landscape a continuous alignment should be performed. Which tactics and techniques are relevant to your organization, what data sources provide coverage and which detection logic is in place to ensure detection & response?
This should ideally be performed in an automated manner, however a human intervention to ensure that discrepancies or errors are caught early in the process.