Learning Library

← Back to Library

Security Operations: Prevention, Detection, Response

Key Points

  • The cybersecurity “how” is expressed as S = P + D + R, meaning security is achieved through prevention, detection, and response, aligning with the CIA triad of confidentiality, integrity, and availability.
  • So far, the covered domains (identity & access, endpoint, network, application, and data security) have focused mainly on prevention controls to stop breaches before they occur.
  • Detection involves gathering data from all these domains, feeding it into a monitoring engine, then performing analysis, reporting, and threat‑hunting to identify incidents.
  • The Security Operations Center (SOC) is the organizational unit that consolidates detection and response activities, using tools such as SIEM (Security Information and Event Management) and XDR (Extended Detection and Response).
  • The upcoming videos will dive deeper into detection techniques, threat hunting, and finally how to respond effectively once a problem is identified.

Sections

Full Transcript

# Security Operations: Prevention, Detection, Response **Source:** [https://www.youtube.com/watch?v=VEu326IZpsc](https://www.youtube.com/watch?v=VEu326IZpsc) **Duration:** 00:17:08 ## Summary - The cybersecurity “how” is expressed as S = P + D + R, meaning security is achieved through prevention, detection, and response, aligning with the CIA triad of confidentiality, integrity, and availability. - So far, the covered domains (identity & access, endpoint, network, application, and data security) have focused mainly on prevention controls to stop breaches before they occur. - Detection involves gathering data from all these domains, feeding it into a monitoring engine, then performing analysis, reporting, and threat‑hunting to identify incidents. - The Security Operations Center (SOC) is the organizational unit that consolidates detection and response activities, using tools such as SIEM (Security Information and Event Management) and XDR (Extended Detection and Response). - The upcoming videos will dive deeper into detection techniques, threat hunting, and finally how to respond effectively once a problem is identified. ## Sections - [00:00:00](https://www.youtube.com/watch?v=VEu326IZpsc&t=0s) **Security Equation: Prevention, Detection, Response** - The presenter explains the S = P + D + R formula that ties the CIA triad to cybersecurity goals, reviews prevention‑focused controls across several domains, and introduces detection via monitoring as the next step. - [00:03:11](https://www.youtube.com/watch?v=VEu326IZpsc&t=191s) **Aggregating Security Data via SIEM** - The speaker explains that fragmented security tools lead to duplicated effort and blind spots, so a SIEM consolidates logs, alerts, and network flow data into a single, correlated view for more efficient threat detection. - [00:06:19](https://www.youtube.com/watch?v=VEu326IZpsc&t=379s) **AI‑Driven Anomaly Detection in SIEM** - The speaker explains how machine‑learning and user‑behavior analytics enable SIEM systems to automatically discover unknown anomalies and produce performance reports for the security operations center. - [00:09:23](https://www.youtube.com/watch?v=VEu326IZpsc&t=563s) **Bottom‑Up EDR vs Top‑Down XDR** - The speaker contrasts EDR’s bottom‑up, agent‑based detection and automated response at the endpoint with XDR’s top‑down aggregation of endpoint, server, and SIEM data to provide a comprehensive, policy‑driven view. - [00:12:26](https://www.youtube.com/watch?v=VEu326IZpsc&t=746s) **Integrating SIEM, XDR, and Threat Hunting** - The speaker explains that SIEM and XDR should be used together—SIEM generates alerts that trigger XDR‑driven investigations—then outlines why proactive hunting is needed to catch attackers early in the reconnaissance‑to‑breach timeline. - [00:15:35](https://www.youtube.com/watch?v=VEu326IZpsc&t=935s) **Proactive Threat Hunting Workflow** - The speaker describes how threat hunters formulate hypothesis‑driven searches using SIEM/XDR tools to detect attacks early—mirroring known attacker techniques—and teases a forthcoming video on incident response. ## Full Transcript
0:00Here's a formula for you to remember. 0:03S equals P plus D plus R. 0:06What does that mean? Security is about prevention, 0:09detection and response. 0:11Remember the CIA triad I mentioned in the second video of this series? 0:14It's about confidentiality, integrity and availability. 0:17And I said everything we do in security is about trying to achieve one or more of those things. 0:22Well, that's kind of the 0:24“what” of cybersecurity. 0:27This is what we're trying to do. 0:29This equation is the “how”. 0:31This is how we're going to go about doing that. 0:34And that is with prevention, detection and response. 0:38Now, what we've covered as we've gone through the domains up to this point: 0:42Identity and access management. 0:44Endpoint security, network security, application security and data security. 0:49This is all largely been about prevention. Not 100%, 0:52but mostly with the controls that we put in place down here are about trying 0:56to prevent a data attack, a breach, any of those kinds of things. 1:02So that's what that's about. 1:03Now we're going to start looking at the other parts of the equation. 1:06Today in particular, we're going to focus on the D part of this-- this detection aspect. 1:12And then in the next video, we'll cover response. 1:15Now, how do we do detection? 1:16Well, it basically means I need to get information from all of these different domains 1:21that I've been discussing previously and feed them into some sort of monitoring engine. 1:27So that's what we're going to be taking a look at. Monitoring. 1:30Then we're going to analyze. 1:31Then we're going to report. 1:33And then we're going to do this thing called threat hunting. 1:35This is what the purview of this area is. 1:38And then in that final video, we'll take a look at the response. 1:41What do I do with all of this information once I realize that I've got a problem? 1:46Now, these two functions are largely done 1:49by an organization called the SOC, the Security Operations Center. 1:53So bear in mind, this is kind of all 1:56coming together in that one organization that's going to do that particular work. 2:00And what are the technologies that they're used to do, this kind of detection, to do this kind of work? 2:06Well, it's basically two predominant things. 2:09It's a security information and event management system 2:13or an XDR, an extended detection and response system. 2:17We're going to take a look at both of those as we go through this video. 2:22Okay. Now, we've introduced this idea of detection. 2:25Let's go into it a little bit deeper. 2:27And specifically, we're going to start off talking about this thing. 2:30The security information and event management system or SIEM. 2:34Some people pronounce it “seam”, you can choose to pronounce it 2:37however you like. So I'll call it a SIEM. 2:39What is a SIEM do? What's its purpose? 2:42Well, it's if you think of this way, we look at all the different domains that we've talked about in the past. 2:47Each one of these could be a source of security information. 2:50And in fact, what typically happens this is not best practice-- it’s typical practice --is I have a console 2:56some sort of security management system that is unique to that particular domain. 3:01The identity management security console, the access management 3:06security console, the endpoint management console and so on and so forth. 3:11In fact, I've got multiples of those consoles and really multiples of the individuals, 3:15the security operators, analysts that have to deal 3:18with those particular domains and have that specific domain knowledge. 3:23You can see this is very expensive. 3:25And also, what else is missing here? 3:28I don't have any consistent single view of what's happening. 3:32So the left hand doesn't know what the right hand is doing. 3:34And if an attacker comes in and hits one of these systems, 3:38it may generate alarms in lots of these systems. 3:40And then we've got a lot of people chasing all the same problem. 3:44It's not very efficient. 3:45So this is why the SIEM came into existence. 3:48Its purpose then was to say, instead of operating all of these things independently, 3:53let's come along with a layer on top of them 3:57where we take all of these information systems, 4:00feed it into a higher level system. 4:04That's our SIEM. 4:05So we create a database up here that is about this collection stuff. 4:10We're going to collect logs, we're going to collect alarms and events 4:13that occur, and we're going to collect flow data that goes across the network. 4:17So each one of these systems would be able to give us different types of information. 4:22We take all of that and we bring that up to the SIEM-- 4:25big database, and then we start applying some analytics to it. 4:29One of the things we're going to do is correlate because as I mentioned, a single attack 4:34might generate an alarm in multiples of these domains and across multiples of these systems. 4:40So what I'd like to be able to do is not see this as four different events or four different alarms. 4:46I want to see this as a single. 4:47So one of the first things the SIEM will do after it's collected is correlate 4:51all that information and get it down to a smaller, more manageable subset. 4:56Another thing we're going to do then is start analyzing the information we have. 5:00We're going to take a look at, for instance, rules that are based upon our security policies. 5:05I might say if a certain condition, such as traffic coming from a particular geo 5:10and then it meets some other criteria, 5:13like someone tries to log in too many times or something like that 5:17and some other criteria. So we can start building these very complex rules. 5:22And a good SIEM will have a lot of these that already come out of the box. 5:25But I can also customize them and build all these rules. 5:28Then if all of those things happen, I want to take a specific action. 5:32I want to generate an alarm. 5:34I want it to be of a certain priority. 5:36I want it to be assigned to a particular person. 5:39And so ultimately, what I'm going to do with those priorities 5:42is I'm going to assign them as well as high, medium and low. 5:47The SIEM system ought to be able to do that. 5:49And I could do that from a rule or I could have the system do that 5:52automatically based upon its confidence level, 5:55based upon calculations that it's done and things of that sort. 5:59Another thing in the analysis I want to do is look for anomalies. 6:02So these are things where I know I'm looking for a specific use 6:06case, a specific set of examples, a specific set of indicators of compromise. 6:12And when I see those, then I know I've got a problem, or at least I know 6:15I have a high probability there's a problem and someone should investigate. 6:20In this case, I may be looking to say, just tell me if something looks weird. 6:25I don't know what weird is. You figure it out. 6:27And so this is where things like artificial intelligence, in particular machine 6:31learning is particularly good because it can find patterns that we might not otherwise find. Feed it 6:37tons of this kind of information, and then tell it to look for what's the anomaly. 6:42And a particular technology we do we use to do this is called user behavior analytics. 6:48So UBA might leverage these underlying technologies 6:52as a way to find what's the thing that doesn't belong. 6:55Why is this user doing something different than all of his peers? 6:58Or why is certain things happening at certain times when we don't expect them to happen? 7:04So that's looking for the anomalies. 7:07Here we say, this is what I'm looking for; here 7:09I say, tell me for something that I don't really know what I'm looking for. 7:13And then ultimately I look for trends. I want to see 7:16because I want to generate reports to management to say, because remember, this whole organization 7:22I mentioned in the previous portion is the SOC, the security operations center. 7:27And the SOC wants to know, are we doing better this month than we were last month? 7:32Are we detecting more alarms? Are we not? 7:34Are we resolving those more quickly? 7:37And so the reporting of all of this, it would be important to know, These are some of the major functions then of a SIEM. 7:43It's about trying to reduce the footprint that we have down here 7:47and give us a single point where I can look and see the visibility of all of my systems, 7:53gather all of that information, bring it up and do these kinds of analysis activities. 7:59Okay, we've just covered the SIEM. 8:01Now let's take a look at the other technology I mentioned, XDR. 8:06This is extended detection and response. 8:08Let's do a little compare and contrast of these two different technologies so we can see how they fit together. 8:14Is it really SIEM versus XDR or not? 8:17We'll see. 8:18So, first of all, SIEMs, these again came into existence-- 8:22Largely, the vendors that did these came from one of two different camps. 8:26They were either log management vendors and they would the idea 8:29was they take the system logs from all the different 8:32devices, operating systems, databases, applications, 8:36and manage all of those things and bring them up to some centralized database. 8:41And then we do the analysis I mentioned previously. 8:44Or they were focused on the network side of things. 8:47So it's network behavior, anomaly detection, this kind of technology. 8:52Most of the SIEM vendors came either from the log management or the network management view of security, 8:58and the SIEM was designed to basically be able to reach across both of those. 9:03Well, the SIEMs could always do more than that, but that was where they traditionally came from. 9:07How about this newer technology called XDR, extended detection response? 9:12It grew out of a thing called endpoint detection and response. 9:16So we already talked about how we did detection and response here in the SIEM. 9:20The idea here was we're taking most of the information up. 9:23It was kind of a bottoms up approach. With the XDR, 9:27it's really more of a top down. And here's what I mean. 9:30What we would do with an EDR system is we would actually install 9:34some kind of capability, some kind of agent on each one of these systems, 9:39and that would sit there and would do detection and would do a certain level of response. 9:44And the idea here is we're pushing the the actions down. 9:48It's more of a instead of a “let's bring everything up 9:51and then take action”, let's do as much as we can and automate the response 9:56there on the platform as close to the source of the outage, 9:59as close to the source of the attack as we can make it. 10:03And that's what this did. With XDR, though 10:05we still need an ability to bring this information up. 10:09And this would be from servers, from desktops, from laptops. 10:13Those are the systems that we're trying to enforce policy on 10:16and look for anomalous behavior and things of that sort. 10:20So the EDR capabilities basically needed a way to report up 10:25and so that they could all give a more comprehensive view. 10:28And that's really where XDR came into existence, was to do those kinds of things. 10:33Now, it turns out you could take an XDR system and read all of these endpoint devices into it. 10:38You could actually even take the information from the SIEM and forward it into an XDR, 10:44just as you could have taken the endpoint information and fed it to the SIEM. 10:48So there's a lot of different ways that you can make these things work. 10:52But what's really interesting is that some vendors have come up with 10:55this idea is we'll keep both of these here, but we're going to add a capability 11:00here to the XDR that's called Federated Search. 11:04And what Federated Search does is it says, 11:07I want to look for particular indicators of compromise or particular 11:12incidents, particular alerts, particular conditions. 11:16And I'm going to take those and I'm going to say I'm going to query all my systems and say, 11:21do any of you have these kind of conditions happening on your system right now? 11:25The advantage to that is I don't need all of the data 11:29pre-fetched and stored in advance in some big database. 11:33I go out and get it just in time. 11:35So we leave the data in place and then we go out and gather it just as we need it. 11:40And a federated search basically tells each one of these systems, 11:43search your local database of information and see if there's a problem 11:47that matches the specific conditions that I'm spelling out. 11:51And if you have that, then report this back up. 11:54And that's the way these things work. 11:56It's a lot like the card game that a lot of kids play 11:58called Go Fish, where you say, does anybody have any threes? 12:01And everyone looks in their hand to see if they have any three cards. 12:05And if they do, then they have to turn that in. 12:07It's the same thing here. 12:09We're saying everyone run a search on your system locally and then only report the results. 12:14It's much more efficient, but in fact, we kind of need both of these 12:18because the SIEM is particularly good at doing alarms since all the information is coming up. 12:23But what we want to do is have high quality alarms. 12:26We don't want to just have tons and tons of information there. 12:29SIEMs tend to get more expensive the more information you feed into them. 12:33XDRs get around that problem by saying leave most of the data here and I'll go fetch it just in time. 12:38But still, the XDR operator 12:40needs to know that there's a reason they need to go out and look in the first place. 12:44So an alarm coming in from a SIEM might be a trigger to 12:48then cause an investigation to occur. 12:51So it's really not XDR versus SIEM. 12:54I want to leave you with the point that it's XDR plus. 12:57SIEM. These two work together and can complement each other 13:01and be part of a stronger security response. 13:05Okay. 13:06Now, we've talked about the SIEM and XDR 13:09technologies, which basically allow us to monitor, to analyze 13:13and report on the stuff that we see happening in our environment. 13:18Now let's talk about hunting. 13:20What is hunting about? 13:21Well, the reason we want to do this in the first place is 13:25this is an attack scenario, a timeline. 13:28And the first thing the bad guy does is reconnaissance. 13:31They basically check out your site, they case the joint. 13:34They try to figure out where your weak points are. 13:36So they're going to spend some time doing that initially. 13:39Then, according to Ponemon Institute’s Cost of a Data Breach survey, 13:44there's a delay in time until we have the mean-time-to-identify (MTTI). 13:50In other words, the guy attacks me at this point after he's finished his reconnaissance, he goes in. 13:56Now, how long does it take before the organization is aware that they've been attacked? 14:02Well, it turns out this is on the order of 200 days. 14:06That's a huge problem, because imagine if a bad guy 14:10was in your house for 200 days before you realized that you had been broken into. 14:15And then the mean-time-to-contain (MTTC), that is, after I am aware that there's a problem, 14:20how long before I actually have it fixed? 14:23Now we're taking a look at it about another 70 days. 14:26You put those two together, 270 days. 14:28It's the better part of a year that the since when you were attacked 14:32until you finally have recovered from all of this. 14:35So what would we like to be able to do in this? 14:37I'd like to be able to move awareness back earlier into this. 14:41If I can't completely prevent the attack, at least become aware of it sooner. 14:45And the way we do that is with threat hunting. 14:49Now, threat hunting, as compared to a basic investigation. 14:53With an investigation, we're reacting. 14:58So the system is giving me an alarm, 15:01a guy has broken in and now I'm doing 15:04the forensic investigation to find out what happened. 15:07That's what we typically do with SIEM and XDR tools. 15:10But there's something else we could do, and that's this idea of threat hunting, 15:15where I'm going to be more proactive. 15:18I'm going to basically use the skills, the experience 15:24and the instincts of a skilled 15:27cybersecurity analyst who has seen everything-- 15:30hopefully --and kind of comes up with what is essentially a hypothesis. 15:36They say, I wonder if someone has done this or that or the other thing. 15:39We don't have an alarm yet. 15:41No one has told us that we've been broken into. 15:44But I want to get ahead of this before anyone even allows the alarm to be sounded. 15:50So they develop a hypothesis based upon their experience 15:53and their instincts about what would someone go after? 15:57How might they attack us? 15:59What kinds of things would they do? 16:01We're looking at the way other attackers are breaching 16:05networks and systems and using that in our hypothesis as well. 16:09And the threat hunter then uses tools like these, 16:14the SIEM and the XDR, to go off 16:16and look for searches and look for indicators of compromise. 16:21And if they do it correctly, what we end up with is early detection. 16:25We basically move the bar back. In a perfect world, 16:29we'd be able to detect future crimes and we'd arrest the bad guys before they even break in. 16:34But we don't live in that world. 16:36The next best thing we can do is try to find out as close 16:39to the attack as possible if we can't prevent it at all. 16:43Now, what we've done with this so far is we've talked 16:46about the detection aspect of all of these things. 16:50What we want to do in the final video in the series is talk about response. 16:55So make sure you don't miss it. 16:59Thanks for watching. 17:00Please remember to hit like and subscribe and don't miss the notify bell 17:04so that you don't miss any videos in this series.