I read something interesting recently that stuck with me. Well, not “interesting”, really…it was a LinkedIn post on security sales. I usually don’t read or follow such things, but for some reason, I started reading through this one, and really engaging with the content. This piece said that “SOC analysts want fewer alerts”, and went on with further discussions of selling solutions for the “security stack”. I was drawn in by the reference to “security stack”, and it got me to thinking…what constitutes a “security stack”? What is that, exactly?
I know of another organization that was hit by a threat actor, and during the after action review, they found that the threat actor had used “net user” (native tool/LOLBin) to create new user accounts within their environment. They installed EDR, and were not satisfied with the default detection rules, so they created one to detect the use of net.exe to create user accounts. They were able to do this because they knew that within their organization, they did not use this LOLBin to manage user accounts, and they also knew which app they used, which admins did this work, and from which workstations. As such, they were able to write a detection rule with 100% fidelity, knowing that any detection was going to
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: