Real-world use cases illustrate the power of analytics for detecting stealth threats. Credit: Thinkstock Machine learning has emerged as the ideal tool for exploiting the opportunities hidden in big data, as traditional methods are not well suited for rooting out the full value hidden in data lakes. It’s especially useful when the volume of data is too large for comprehensive analysis, and the range of potential linkages and relationships between disparate data sources are too great for humans to process, test all hypotheses and extract the intelligence it contains. Machine learning shines when we reach the limitations of human-scale thinking and analysis.While machine learning can deliver many benefits for security practitioners, it is not the panacea that it is sometimes purported to be. Let’s consider what we can expect from applying machine learning to advanced security analytics. The following use cases have been anonymized to protect the privacy of the organizations involved. Too much accessApplying machine learning and security analytics to directory, identity, access and activity data can reveal access outliers and excess access in user accounts that have been over-provisioned. The findings can be eye openers. A large financial organization was able to reduce account privileges and entitlements by 83% over a nine month period based on the visibility into users’ access and actions achieved with machine learning. In another example, a manufacturing firm was able to achieve an 89% reduction to account privileges and entitlements. Access is often managed with a CIO perspective to enable access, while CISOs view compromise and misuse of access as a risk to the organization. This often creates a divide between the CIO and CISO camps on this issue, also known as the one-hundred foot wall between identity and security.Hidden privileged accessMonitoring administrators with the keys to the kingdom is another popular use case for machine learning since it can drill down past the account level into privileged entitlements to uncover unexpected results. A healthcare insurance company uncovered that 70% of privileged access entitlements in user accounts within its environments were unknown/undocumented. This visibility achieved from machine learning enabled them to monitor newly found high access privileges for individuals. The lesson is that entitlements define privileged access, not the account. Replacing legacy methods of tracking privileged access at the account level machine learning provides advanced visibility into privileged access and activity at the entitlement level. Leveraging user context beyond a SOCWith so many users and activity, it’s manually unfeasible to monitor individual accounts for security incidents. Machine learning can routinely comb through millions of access and activity logs to identify anomalous behavior and high risk individuals. One company discovered that a highly privileged account had been compromised for three and a half years after anomalous behavior was exposed after a weekly self audit risk report was instituted using machine learning and shared with employees for their review and feedback. The employee whose account had been compromised reviewed the self audit risk report with personal context that was unavailable to security operation center (SOC) personnel. In this particular case, the employee noticed the account was being used on a PTO day, which is a clear sign of a shadow account login. Context is important for machine learning and is often found outside security teams among employees, partners and customers. Hybrid cloud/data center risksHybrid environments that blend cloud and on-premises infrastructures inevitably create security blind spots. One company used machine learning on data sources from on-premise and cloud sources to identify risky activity. They discovered confidential data was being accessed and downloaded from the cloud by authorized users, only to then be shared with unauthorized users via both on-premise file shares and cloud file sharing apps. Machine learning can show new and high risk uses of access and activity in hybrid environments where data access and flows are unexpected. This becomes increasingly important as environments become more fragmented with users, apps and data. Departing userRunning a proof of concept using new technologies such as machine learning is always interesting. For example, you don’t typically expect to see a security team member flagged with one of the highest risk scores during the project! Occasionally, the most trusted users in an environment can be the biggest security policy violators since they sometimes operate under the assumption that they are not subject to the security controls they are responsible for enforcing. In one case, a user began performing unusual activity on external employment websites 20 days before the PoC. Since machine learning models are not based on rules, they can discover anomalies regardless of the security clearance and privileges associated with the user account.Good apps behaving badlySaaS applications like Microsoft Office 365, Google Apps, etc. are now commonplace in most enterprise environments. Detecting when the execution space of these known good applications has been hijacked and unrecognizable executables are communicating with external IP addresses or unauthorized/ unknown domains is manually difficult. Machine learning can provide visibility into these suspicious activities for immediate investigation.These use cases all share a common thread: Machine learning picks up where human analysis of large security data sets, events and activity leaves off. By shining a light on what SOC teams cannot discern through manual inspection, machine learning makes it possible to isolate high risk behaviors that require the attention and investigation by security analysts. Related content opinion Embracing risk management elevates security pros to business leaders. Why do they still find it so difficult? The transition from an “it’s all about security and protecting the crown jewels” to “we need to mitigate risk and embrace risk management” is a crucial step next step for the information security profession. By Leslie Lambert Dec 17, 2018 4 mins Risk Management Security opinion Securing connected medical devices: Will categorizing them as ICS help? Now that they’re no longer protected by an “air gap,” let’s consider what’s needed to protect connected medical devices from security threats. By Leslie Lambert Oct 04, 2018 4 mins Internet of Things Critical Infrastructure Security opinion Staying secure as the IoT tsunami hits The ubiquitous adoption of devices in virtually every industry is creating a massive, global security gap. Data science can help reign in the risks. By Leslie Lambert Jul 12, 2018 4 mins Internet of Things Data and Information Security Security opinion The time for network behavior analytics has come Once considered the eminent domain of networking teams, network telemetry data is becoming a requirement to provide security analytics with a more complete view of enterprise threats. By Leslie Lambert Jun 07, 2018 5 mins Network Security Analytics Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe