Why detective security controls are as important as preventive security controls

Historically, a major part of security investments have been allocated to preventive security controls. Although this may seem like a good strategy in theory, preventive security controls are not preventive security controls are not effective against data breaches all the time.

This is primarily because network boundaries are vanishing as companies adopt cloud.

This shift made digital identities the center of network security. The extended network perimeter poses a huge challenge for security teams especially in protecting the integrity of data and threat detection. To tackle these challenges, they need a new age behavioral analytics tool. This article elaborates

What is user behavior analytics (UBA)?

User behavior analytics, or UBA, is a technology used to detect anomalies in user behavior patterns to spot threats within the network. According to Research and Markets, the global security analytics market size is projected to grow to USD $18.1 billion by 2024 at a compound annual growth rate (CAGR) of 18.2 percent. This growth will be fueled by the demand for insider threat and compromised account detection capabilities that traditional security systems lack.

UBA solutions use data analytics and machine learning (ML) algorithms to create a baseline behavior specific to each user. They detect deviations from this baseline thus helps to detect potential security threats at its early stage.

But how is UBA really different from traditional security solutions? What does it offer that they can't? Let's take a look.

Limitations of traditional security solutions

  • False positives mask the real threats: Traditional security tools bombard admins with an overload of mislabeled security alerts since they employ rule-based threat detection techniques, unlike UBA solutions that employ ML-based techniques to detect the anomalies effectively and accurately. This makes it tough to uncover information that truly indicates a potential for real attack using traditional security solutions. In spite of organizations keeping their perimeters secure and carefully scrutinizing every move made by insiders and outsiders alike, most administrators miss the indicators of compromise amidst an overwhelming volume of false alarms.
  • Inability to detect abnormalities: The auditing techniques used by traditional security solutions can’t accurately detect unusual user behavior. Alert thresholds are subjective and unique to each network, plus they change over time, so you can’t rely on alerts to spot threats, especially slow attacks. You can detect deviations using machine learning without setting any threshold values. Machine learning analyzes user behavior over time, and spots any minor user abnormalities.

What UBA offers

  • Efficiency: Improve detection speed to help analyze the impact of security incidents and respond to them quickly.
  • Precision: Move beyond simple rules and leverage machine-learning-based techniques to accurately detect slow and targeted attacks at its early stage.
  • Reduced false positives: With false positive alerts being a source of distraction that delay breach detection, unique alert thresholds—which are specific to each user in the organization—become important. UBA calculates the threshold value for each user based on their level of activity instead of using a blanket threshold across all users.
  • Better threat detection: Traditional security solutions fail to analyze user behavior and don't detect anomalies in this behavior. As a result, when an employee is working with sensitive data, it can be hard to know whether they are just doing their job or something malicious. UBA solutions rely on the baseline activities of users to identify unusual user behavior that points to potential attacks.

UBA in action

While existing security solutions use static threshold values to differentiate between what is normal and what is not, UBA solutions use an analytical approach—a combination of data analytics and machine learning—to implement dynamic thresholds based on real-world user behavior.

UBA collects information on what users across the organization are doing over an extended period of time, then creates a baseline of "normal" activities specific to each user. Whenever there is a deviation from the established baseline, the UBA solution considers this abnormal and alerts the administrator.

The cornerstone of UBA solutions is the premise that behaviors are hard to mimic. So, when an external entity does try to break into the network, it's going to be easy to spot.

The various stages of how UBA works:

  • Collect information on users over an extended period of time.
  • Model a baseline of normal activities specific to each user.
  • Define unique thresholds based on real-world user behavior.
  • Find deviations from the norm.
  • Notify the concerned security personnel.
  • Update thresholds continuously based on recent data.

Identity protection with UBA using AD360

AD360, ManageEngine's real-time Active Directory change monitoring software, doesn't stop with just auditing your domain controllers. It goes a step further by incorporating UBA to detect insider threats more efficiently. Its built-in UBA engine helps you:

Monitor rogue users

Let's take a use case. Assume a disgruntled employee departing from the organization wants to steal critical financial information. The employee copies 200 documents containing corporate financial data. Since the user normally accesses around 10 documents a day, this behavior is abnormal. The UBA solution recognizes this abnormal behavior, and triggers an alert to the administrator.

Monitor rogue users

A traditional security without UBA capabilities can't establish a baseline of normal user activity to spot abnormalities, and would not see this level of file access as strange. However, this is a clear case where the user's activity is abnormal and requires an administrator’s attention.

Check for compromised accounts

A disgruntled employee wants to steal important information by using a coworker's credentials. After the coworker goes home for the day, the attacker attempts to log on from the coworker's computer to avoid flagging a logon event from the wrong computer. After several incorrect guesses at the coworker's password, the attacker successfully enters the correct password and logs on.

Having calculated the typical logon time of the coworker for the past months, the UBA solution detects an abnormal logon time. With UBA, not only is the unusual logon time detected, but an alert is raised and sent immediately to the administrator.

Check for compromised accounts

Detect unusual processes on member servers

An employee gets a malicious application installed when browsing the internet. They then connect to the server, where they have administrator privileges, to perform administrative tasks. The UBA solution detects this new action on the server and triggers an alert. More quickly detecting an attack enables administrators to mitigate its impact.

Detect unusual processes on member servers

Detect privilege abuse

AD360’s UBA module detects abnormal user behavior of privileged users to protect sensitive data. For instance, if a privileged user tries to access a critical file or folder and perform an unusually large volume of file modifications, AD360 will flag this event and send an alert about the possible threat.

Spot security threats caused by users' mistakes

If a user accidentally opens the door for a breach or damages data by mistake, AD360’s UBA engine can spot this anomaly immediately. Consider a user who accidentally grants everyone in the organization permission to access a sensitive file. AD360 will detect the unusual volume of file activity and trigger an alert. An admin can then take a look into why this file was suddenly accessed so many times, and detect the data breach.

Spot security threats caused by users' mistakes

Perform risk assessment

You can identify the weak points in your network by filtering the users connected to the most assets, as well as hyperactive accounts. AD360 offers risk assessment reports for monitoring these vulnerable accounts. For instance, you can find out which accounts have the highest activity count (e.g. high file activity) by running a query in the risk assessment reports.

Perform risk assessment

  • 1
     

    Get instant alerts when a host is accessed remotely for the first time.

    Monitor remote access on hosts

    Get instant alerts when a host is accessed remotely for the first time.

  • 1
     

    Keep a close eye on all user logons and activities, with details on the who, when, and where concerning the actions performed.

    Audit user activity

    Keep a close eye on all user logons and activities, with details on the who, when, and where concerning the actions performed.

  • 1
     

    Get better insights on your users' work hours and idle time to build a schedule that will improve employees’ productivity while they work from home.

    Track users’ work hours

    Get better insights on your users' work hours and idle time to build a schedule that will improve employees’ productivity while they work from home.

How AD360 takes care of your IAM needs

  • Identity lifecycle management

    Streamline identity management throughout the entire lifecycle of users—right from provisioning, to role changes and deprovisioning.

    Learn More →
  • Multi-factor authentication

    Elevate trust in identities and mitigate impersonation attacks using biometric, authenticator apps, and other advanced authentication methods. 

    Learn More →
  • Identity automation

    Eliminate redundancy and human errors, and improve business processes by automating user provisioning, stale account cleanup, and other identity-related tasks. 

    Learn More →
  • Hybrid IAM

    Centrally manage on-premises and cloud identities, or both, and govern their privileges from a single console.

    Learn More →
  • Identity analytics

    Use over 1000 preconfigured reports to monitor access to crucial data and satisfy compliance mandates.

    Learn More →

Rethink your IAM with AD360

AD360 helps you simplify IAM in your IT environment by giving users quick access to the resources they need while establishing tight access controls to ensure security across on-premises Active Directory, Exchange Servers, and cloud applications from a centralized console.

Demo request received

Thank You for the interest in ManageEngine AD360. We have received your personalized demo request and will contact you shortly.

Get a one-on-one product walk-through

Please enter business email address
  •  
  • By clicking 'Schedule 1:1 Personalized Demo', you agree to processing of personal data according to the Privacy Policy.

© 2020 Zoho Corporation Pvt. Ltd. All rights reserved.