Self-defending networks: reality or fiction?
The concept of a self-defending network is not new. In the early 2000s, leading network and security vendors such as IBM  and Cisco  used the term to describe a network-as-a-platform. A collection of network and security devices working together as one unit to defend against cyber-attacks by adapting continuously to stay one step ahead of cyber threats.
10 years ago, the technology and tools required to bring together multiple vendors to create a self-defending network was very limited. Moreover, the cost of building such as a system was prohibitive, and the market as a whole was not ready. Most security vendors had closed systems with no ability to integrate them with other third-party systems. Self-defending networking was more fiction than reality since organisations did not have a mature enough network and security ecosystem to implement it.
Things have changed. Today, the technology glue to bring different devices in a homogeneous framework is ripe, and the market is ready. The advances in data analytics, Robotic Process Automation (RPA), Machine Learning, Artificial Intelligence, and Application Programming Interfaces (APIs), means that all the ingredients necessary to create self-defending networks are in place.
Self-defending networks: why it matters
Enterprises worldwide are facing increasing challenges to protect their digital assets against the growing number of cyber-attacks. The global skills shortage in cybersecurity is not making it easier.  Cybercrime is growing rapidly worldwide. The global cost is estimated to reach $6 trillion annually by 2021 . Enterprises are continuously looking for ways to stay one step ahead of cybercriminals by ensuring that their network and security infrastructure can detect and act quickly against active cyber-attacks before any damage is done. Doing this in an efficient and cost-effective manner remains a challenging task for all organisations globally.
There is no lack of technology to defend against cyber-attacks. What is lacking is an integration layer that can ensure that people, processes, and technology are working better together in a synchronised manner to defeat even the most persistent and well-resourced attacker.
Of course, technology alone is not the solution to stop cyber-attacks. The glue between people, technology, and processes must be in place. A self-defending network can help achieve that. The key business objectives of a network-as-a-platform include: (1) ensuring that security practises and policies are aligned to business needs; (2) ensuring that the cost of security operations is manageable; (3) reducing complexity and simplifying the overall network and security infrastructure to maximise effectiveness; and (4) detecting and responding to cyber threats faster, ultimately improving the Mean Time To Detect (MTTD) and Mean Time To Respond (MTTD).
Self-defending networks: what is it?
As a whole, self-defending networks comprise technology, processes and people. From a technology point of view, the ability to manage, monitor, orchestrate, automate and respond to cyber-attacks faster and in a cost-effective manner is at the centre. All the components of a self-defending are brought together using a set of tools and automation processes that provide the glue to all the network and security layers.
An effective layered defence approach also referred to as defence-in-depth ensures that all the components are working as one. Devices providing anti-virus, proxy, firewalling, VPN, endpoint detection, IDS/IPS, vulnerability assessment, patch management, SIEM, policy compliance, routing and switching are fully integrated. All these components are combined and tightly integrated using a vendor agnostic approach to provide deep monitoring and management, orchestration and automated response in order to effectively defend against cyber-attacks.
In multi-vendor security infrastructures, the ability to integrate different technologies from different vendors is key. A best of breed approach adopted by many medium and large organisations means that a self-defending network must provide a communication layer between all the systems involved in highly secure and seamless manner. The ability to manage and integrate several vendors in order to automate and orchestrate processes is also key. Ultimately, a vendor agnostic approach is required to ensure that an organisation security investment is protected to meet current and future cyber threats. Depending on the needs of the organisation, over time, vendors and technologies can be swapped as needed, ensuring minimum disruption of the overall security infrastructure.
Self-defending networks: how it works
The core components of a self-defending network can be grouped into 5 key categories: central management, monitoring, automation, orchestration and response.
Central management and deep integration:
In order to enforce an organisation policy, central management is required to bring all the different components into a unified ecosystem. A single command and control view ensures that policies and processes can be managed from a single pane of glass. By using APIs and native plugins, devices that are part of the system can be controlled in a consistent manner. A central management engine enforces the organization’s security policy at a global level.
Monitoring is key in order to ensure visibility across the entire ecosystem. A SIEM solution is used as a central collecting engine for all raw logs and events collected from devices. That data is then sent to an engine for correlation and long-term storage. Using Big Data and security analytics, events correlation can be used to give the overall self-defending network more intelligence. Anomalies can be detected faster. Rules can be pushed to devices in order to respond to cyber-attacks real-time using known patterns, heuristics and machine learning models. The data collected overtime across the network provides greater threat intelligence. The more data the better. As the self-defending network matures, it can ‘learn’ faster overtime by self-tuning, reducing false positives, maximising its effectiveness, and helping reduce the organisation overall cost in security operations.
Automation and orchestration:
Automation refers to the use of playbooks and rules that provide an abstraction layer required to formulate response plans. Using various tools and technology such as RPA, automation is allowing processes to be systematised. Menial network tasks can be automated freeing valuable time for security teams so that they can focus on critical incidents. Rules are pushed in a consistent manner to devices enforcing a defence-in-depth approach whereby protection is implemented at several layers in order to defend more effectively against cyber-attacks.
Responding faster to attacks:
The end result of an effective self-defending network is the ability to respond faster than current systems can. By leveraging deep integration with devices that are part of the self-defending network, playbooks and rules are used to take specific actions. For example, a ransomware is detected at the endpoint device, not only is that threat neutralised at the end point, but the adjacent network switches can also quarantine the device by blocking the port until a successful remediation is applied. Many other rules can be created and applied at global level. With all these components working together in a coherent and consistent manner, security teams can reduce operational cost and complexity dramatically. The bottom line is that organisation can dramatically improve their Mean Time To Detect (MTTD) and Mean Time To Respond (MTTD).
Self-defending networks: business benefits
The benefits to organisations are tangible. Network and security automation means that security teams can free up valuable time by automating menial tasks so that they can focus on critical incidents. Playbooks can be created and re-used on demand throughout the enterprise, cutting down online enterprise applications delivery lead times and ensuring that online business applications are delivered in a fast and secure manner in the cloud or on-premise. Key business benefits can be summarised as:
1. A central management of network and security infrastructures that simplifies management of disjoint and different technologies.
2. Automation of menial tasks in order to free up time from security teams given the resourcing challenges facing many organisations worldwide.
3. Consistency in delivering services across the organisations since automation provides a way to re-uses rules and playbooks in a predictable and consistent manner.
4. Integration of network and security processes with overall organisations business workflows which brings security operations and development operations together.
5. Institutional memory within the self-defending network ecosystems means that knowledge transfer is consistent, and the intelligence acquired within the enterprise over time can be safeguarded given the global cybersecurity resourcing challenge.
Industry: Cyber Security
- CONTRACT SIEM Cyber Security Operations Engineer. REMOTE
- United Kingdom
REFCH8165 CONTRACT SIEM Cyber Security Operations Engineer. REMOTE UK SIEM Engineer. 6 month Contract. Inside IR35 Working towards a "SOC 2" environment. CLOUD (AWS) experience essential. Three key functions; Monitor, Escalate and Triage incidents. Vulnerability Management / threat intel. SIEM configuration / management, review, enhancement More specifically; Work with internal teams to identify assets. Identity applicable threat feeds and work with internal teams to remediate. Patch Patch Patch. (Help mature process / identify gaps) Configuration / fine tuning of SIEM alerts. Create dashboards, Compliance reporting. Log ingestion. Experience across ISO27001 / SOC2 / SIEM / End Point Security is essential Contact me today for more information Chris.Holt@dclsearch.com Or 07884666351
- Cyber Security Operations Engineer. REMOTE UK. SOC2
- United Kingdom
REF8164 Cyber Security Operations Engineer. REMOTE UK Internal opportunity. New position. Exclusive to DCL Search. You will be the hands on technical eyes and ears of the Cyber security capability actively working to ensure and enhance the adherence to ISO27001 and "SOC 2" controls. You role will touch on the following · Security Monitoring- SIEM · Vulnerability Management / Testing · Incident Management · Asset management · Disaster Recovery planning · Change Management AWS Cloud experience is essential as is the ability to ensure patch management is prioritised across the business. Any CLOUD SIEM experience highly desirable. Contact me today for more information Chris.Holt@dclsearch.com Or 07884666351
- Lead Security Architect
- United Kingdom
Engage with key clients in an Architectural / technical presales capacity. Including Stakeholders, end users / partners. Working on new and existing Security projects to confirm that proposed solutions are fit for purpose from both a technical and regulatory capacity. Working closely with multiple vendor . Managed security service background ideal CLOUD Security (AZURE OR AWS), IDAM background ideal.
- Threat Vulnerability Management Analyst
- United Kingdom
To monitor, identify and alert internal teams of cyber threats and vulnerabilities. MIRE Att&ck, CIS, OWASP, Vulnerability management tools MUST be able to commute to central London MUST be able to achieve UK SC Clearance. On going support and development.