How automated responses to risk-scored activity can reduce threats. Credit: Thinkstock Gartner recently introduced a security model for the digital age it calls CARTA (Continuous Adaptive Risk and Trust Assessment). The goal is to manage emerging risks and embrace change using an adaptive security architecture that leverages increased context for automated response. Let’s consider how automated risk response can help a company quickly identify and respond to security threats.There are two basic types of closed-loop deployment models for implementing automated risk response.The first, and most common, is the bidirectional type traditionally found in API integrations between security solutions. Here, when the risk score for anomalous behavior by a user exceeds a predetermined threshold, the appropriate security solution is alerted via API with the risk score, response code and incident details to mitigate the threat. This model can incorporate contextual data such as user’s physical location and relay status information to update machine learning models and further refine future risk scoring.The second type of closed-loop risk response is process related, such as the generation of a self-audit report based on a triggered risk score. In this instance, the high-risk incident and profile is sent to the user, or project leader of a user, to request first-hand insights into the activity that is not available to security operations center (SOC) personnel. These risk score-driven reports may be generated on an ad hoc basis (for contextual feedback for specific incidents) or on a recurring, scheduled basis (i.e., weekly, monthly, etc.) for distribution as a routine self-audit review of high risk activity. Next, let’s take a closer look at some actual use case examples of closed-loop API and process-based automated risk response in action:High privileged access abuseRisk scores identify high privileged access (HPA) account abuse by leveraging a combination of data sources for accounts, access and activity data (i.e., IAM, PAM, directory services platforms, SIEM or log aggregators, application events). A prime example of suspicious behavior that would generate an alert is assigning special or elevated privileges to the user’s own account followed by an activity or transactions outside the window of password value check-out and check-in time frame. Other high-risk activities include access to resources and transactions outside normal peer behavior profiles, abnormal access to classified or sensitive documents, as well as multiple concurrent sessions from the same account, different IPs, devices, locations, etc. Step-up authenticationRisk scores per user or entity can determine access login challenges for a multi-factor authentication (MFA) solution via bidirectional API integration. For example, high-risk scores result in multiple challenges and increased security awareness for end users, while low-risk scores result in one challenge, or none, to remove friction from business process flows. This also known as adaptive authentication.Risk scoring of DLP alertsAutomates the delivery of high-scoring alerts to project leaders and managers with the context required to determine whether an alert is valid or not. Feedback from this closed-loop also provides training to machine learning models to avoid future false positives.SIEM alerts risk scoringProvides a point of reference for SOC analysts to escalate or not escalate investigation into suspicious incidents, while decreasing alert fatigue and dead ends. Via bidirectional API integration, risk-scored alerts can be sent back to SIEM solutions to prioritize “find-fix” resources.Self-audit and ID theft detectionWhile risk scoring helps detect anomalies and suspicious activity, its value increases significantly when supplemented with self-audit context from employees, partners and customers. They can confirm if they performed the high risk activity (and why), or whether their account was compromised by another user. This creates a powerful, collaborative closed-loop process flow between users and IT security that normally does not exist, and promotes deterrence and security awareness.Access outlier remediationBy continuously monitoring access and activity, risk-scored access outliers can be sent to IAM systems to trigger a certification request by the account owner or manager. If access is revoked, the IAM system is updated and feedback via API informs the monitoring solution of the change in order to re-score the user or entity.Risk-scored access certification requestsTo eliminate the threats associated with the manual review of access certification requests, which most of the time are rubber stamped using the check-all-of-the-above option, each access request has a risk score assigned to it. This enables the account owner or manager to confidently approve low-risk scored requests, and investigate high-risk scored ones. This results in more revocations, which reduces access risk. The combination of risk-based analytics with the API integration of layered security tools can enable automated responses to threats that would otherwise slip through the cracks in a siloed detection and protection architecture. This adaptive risk response model is one of those rare approaches in IT security where 1 + 1 = 3. Related content opinion Embracing risk management elevates security pros to business leaders. Why do they still find it so difficult? The transition from an “it’s all about security and protecting the crown jewels” to “we need to mitigate risk and embrace risk management” is a crucial step next step for the information security profession. By Leslie Lambert Dec 17, 2018 4 mins Risk Management Security opinion Securing connected medical devices: Will categorizing them as ICS help? Now that they’re no longer protected by an “air gap,” let’s consider what’s needed to protect connected medical devices from security threats. By Leslie Lambert Oct 04, 2018 4 mins Internet of Things Critical Infrastructure Security opinion Staying secure as the IoT tsunami hits The ubiquitous adoption of devices in virtually every industry is creating a massive, global security gap. Data science can help reign in the risks. By Leslie Lambert Jul 12, 2018 4 mins Internet of Things Data and Information Security Security opinion The time for network behavior analytics has come Once considered the eminent domain of networking teams, network telemetry data is becoming a requirement to provide security analytics with a more complete view of enterprise threats. By Leslie Lambert Jun 07, 2018 5 mins Network Security Analytics Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe