Security

Cybersecurity teams, beware: The defender’s dilemma is a lie

Comment

Image of a group of yellow plastic toy soldiers pointing guns at each other on a blue background.
Image Credits: A. Martin UW Photography (opens in a new window) / Getty Images

David J. Bianco

Contributor

David J. Bianco is the staff security strategist on the SURGe by Splunk team.

Practically every security professional has run across “the defender’s dilemma” sometime in their career. It goes like this: “Defenders have to be right every time. Attackers only need to be right once.”

The idea that attackers have all the advantages and that defenders must be passive and wait for something to respond to is practically an axiom of cybersecurity.

It is also a lie.

Basing a security strategy around the defender’s dilemma harms your security program. Starting with an incorrect premise leads to bad decisions. You may waste money on products, services or capabilities you don’t truly need or underinvest in the ones you do. Your security staff becomes overwhelmed, demoralized and has trouble delivering good outcomes.

If you believe the lie of the defender’s dilemma, there are other lies you have to believe as well because the defender’s dilemma relies upon them. Let’s look at each of these lies in detail and discuss strategies you can use to negate their harmful effects and turn them into advantages for your team.

Lie No. 1: Defense and offense are separate

The defender’s dilemma implies that your security team is purely passive, sitting around waiting for attacks to happen. But thinking in terms of “defense” and “offense” is a false dichotomy.

The Pyramid of Pain shows that by consistently detecting and responding to threat actor activity quickly enough to stop attacks in their tracks, you can impose cost on that actor, turning defense into offense. By concentrating your detection development efforts on the top half of the pyramid, you may not be able to prevent attacks entirely, but you will make actors work harder to be successful. That changes the economics of their attacks and also buys you valuable time to respond.

Lie No. 2: Defenders must be on duty 24/7

Your defenses must operate around the clock, while attackers can carefully choose the timing of their attacks to occur on evenings, weekends or holidays. That doesn’t mean humans always have to be engaged for everything, though.

Automation and SOAR technology can turn IR playbooks into an automated response. Driving an incident to containment within seconds or minutes of detection and collecting basic IR data along the way improves time-to-containment and significantly decreases reliance on off-hours staffing.

Consider also what each side is doing in between attacks. While threat actors plan their next attacks, your team should not be sitting idle. Use the time between incidents to level up group capabilities and individual skills. Learn from past incidents to improve detection and playbooks. Take classes or learn new skills. Use threat hunting to identify new detection or IR techniques. What you might have fallen prey to yesterday could be something you detect and interdict tomorrow.

Lie No. 3: Defenders have to play fair

Defenders rightly expect attackers to lie and cheat to achieve their goals, but sometimes we forget that lying and cheating can work both ways. Security leaders should connect with their own inner liars and cheaters. Deception technology does this well.

Deception technology has existed for decades in one form or another. “The Cuckoo’s Egg” documents Clifford Stoll’s defensive deception efforts as early as 1986. He did it all manually, but today you can simply buy an appliance that will automate or semi-automate a range of different cheats and tricks. There are also numerous free, open source deception packages if that’s more to your taste.

Honeypots, honey tokens, honeynets, dark nets: You have a range of options, including tricking adversaries into attacking heavily monitored systems, tar-pitting scans instead of outright blocking them and seeding legitimate document caches with a few carefully placed fakes that your DLP systems know about.

All of these techniques force attackers to waste time, shifting it to you to use to your advantage. They also provide additional alerting opportunities you might not have had before. There are solutions for nearly every budget, time commitment and skill level.

Lie No. 4: You can’t defend against zero-day attacks

It’s easy to understand why some believe this. Creating detection for as-yet-undisclosed exploits is a tricky business at best. However, most defenses aren’t exploit specific. For example, firewalls and network ACLs are quite effective against many different attack techniques. The very concept of defense in depth shows that you needn’t know the exact entry vector in advance but can still mount effective defenses to prevent or slow down an attacker.

Similarly, try some non-exploit-specific detection strategies, such as looking for anomalies in authentication, network or other logs. Establishing baselines and then looking for significant deviations is a type of threat-hunting explicitly designed to be attack agnostic and uncover a wide range of threat actor activity.

In reality, many detective, protective and corrective security controls are not tied to specific exploits, techniques or vulnerabilities. Over-focusing on detecting specific exploits risks exposure to the latest zero-days. You’ll be better off with a more balanced, defense-in-depth approach to detection and prevention when the next inevitable mass exploitation event hits.

Lie No. 5: Defenders have to get it right every time

The final lie is the defender’s dilemma itself. It fundamentally mischaracterizes the idea of what an “attack” is. “Attackers only have to be right once” strongly implies that the attack encompasses a single event — the “one time” they have to be right. In reality, an attack is a sequence of events, from conception through initial access and continuing until the threat actor achieves their goal or you manage to stop them. The very fact that the idea of an attack lifecycle (such as the Lockheed-Martin Cyber Kill Chain) exists implies that attacks happen over time.

You have many chances to detect attacks over their lifetimes, not just during the initial beachhead. By ensuring that you have a robust set of detections that cover all (or most) phases of the Kill Chain, you’ll maximize the probability that you’ll notice at least part of the attack and be able to respond more quickly.

The truth: The attacker’s dilemma

By now, it should be clear that the defender’s dilemma is wrong. In fact, the exact opposite is true: Attackers have to get everything right throughout the entire attack lifecycle. They have to evade all the controls and avoid tripping any alarms. You only need to detect them once in order to engage your security team and wake the dragon.

This concept is known as the attacker’s dilemma (or sometimes the intruder’s dilemma). It’s a very powerful idea. A threat actor typically has many steps to carry out during an attack. Human nature being what it is, they will almost certainly make mistakes. Also, attackers usually operate with imperfect knowledge of their environment, figuring things out as they go, and this fumbling around is likely to set off alarms. From a single alert, you can investigate, interdict and uncover the details of an attack’s entire kill chain.

The attacker’s dilemma is beneficial

Structuring your security program around the attacker’s dilemma has many benefits. Instead of wasted resources, low morale and “inevitable” data breaches, you begin to identify and prioritize opportunities, perhaps based partly on how much cost they impose on your adversaries. These priorities typically lead to smarter, more effective resource allocation.

The positive energy that comes with flipping the tables on the attackers also greatly impacts morale. People want to feel like their work is making a difference. Motivated employees are more engaged and tend to stay longer, reducing turnover and allowing for more opportunities to improve. This magic combination of better resource allocation and more motivated employees makes it much easier to achieve good security outcomes on a regular basis. As your team sees security wins, their morale improves even further, feeding into a virtuous upward spiral.

No one should be paying attention to the defender’s dilemma anymore. Perhaps it was closer to the truth a couple of decades ago, in cybersecurity’s ancient times, but today it’s not only wrong but actively harmful. By adjusting your mindset and implementing some of the above strategies, you can begin building the attacker’s dilemma in your own organization, bringing real improvement to both security outcomes and the quality of life of your security team.

More TechCrunch

Infra.Market, an Indian startup that helps construction and real estate firms procure materials, has raised $50M from MARS Unicorn Fund.

MARS doubles down on India’s Infra.Market with new $50M investment

Small operations can lose customers by not offering financing, something the Berlin-based startup wants to change.

Cloover wants to speed solar adoption by helping installers finance new sales

India’s Adani Group is in discussions to venture into digital payments and e-commerce, according to a report.

Adani looks to battle Reliance, Walmart in India’s e-commerce, payments race, report says

Ledger, a French startup mostly known for its secure crypto hardware wallets, has started shipping new wallets nearly 18 months after announcing the latest Ledger Stax devices. The updated wallet…

Ledger starts shipping its high-end hardware crypto wallet

A data protection taskforce that’s spent over a year considering how the European Union’s data protection rulebook applies to OpenAI’s viral chatbot, ChatGPT, reported preliminary conclusions Friday. The top-line takeaway…

EU’s ChatGPT taskforce offers first look at detangling the AI chatbot’s privacy compliance

Here’s a shoutout to LatAm early-stage startup founders! We want YOU to apply for the Startup Battlefield 200 at TechCrunch Disrupt 2024. But you’d better hurry — time is running…

LatAm startups: Apply to Startup Battlefield 200

The countdown to early-bird savings for TechCrunch Disrupt, taking place October 28–30 in San Francisco, continues. You have just five days left to save up to $800 on the price…

5 days left to get your early-bird Disrupt passes

Venture investment into Spanish startups also held up quite well, with €2.2 billion raised across some 850 funding rounds.

Spanish startups reached €100 billion in aggregate value last year

Featured Article

Onyx Motorbikes was in trouble — and then its 37-year-old owner died

James Khatiblou, the owner and CEO of Onyx Motorbikes, was watching his e-bike startup fall apart.  Onyx was being evicted from its warehouse in El Segundo, Los Angeles. The company’s unpaid bills were stacking up. His chief operating officer had abruptly resigned. A shipment of around 100 CTY2 dirt bikes from Chinese supplier Suzhou Jindao…

17 hours ago
Onyx Motorbikes was in trouble — and then its 37-year-old owner died

Featured Article

Iyo thinks its gen AI earbuds can succeed where Humane and Rabbit stumbled

Iyo represents a third form factor in the push to deliver standalone generative AI devices: Bluetooth earbuds.

17 hours ago
Iyo thinks its gen AI earbuds can succeed where Humane and Rabbit stumbled

Arati Prabhakar, profiled as part of TechCrunch’s Women in AI series, is director of the White House Office of Science and Technology Policy.

Women in AI: Arati Prabhakar thinks it’s crucial to get AI ‘right’

AniML, the French startup behind a new 3D capture app called Doly, wants to create the PhotoRoom of product videos, sort of. If you’re selling sneakers on an online marketplace…

Doly lets you generate 3D product videos from your iPhone

Elon Musk’s AI startup, xAI, has raised $6 billion in a new funding round, it said today, as Musk shores up capital to aggressively compete with rivals including OpenAI, Microsoft,…

Elon Musk’s xAI raises $6B from Valor, a16z, and Sequoia

Indian startup Zypp Electric plans to use fresh investment from Japanese oil and energy conglomerate ENEOS to take its EV rental service into Southeast Asia early next year, TechCrunch has…

Indian EV startup Zypp Electric secures backing to fund expansion to Southeast Asia

Last month, one of the Bay Area’s better-known early-stage venture capital firms, Uncork Capital, marked its 20th anniversary with a party in a renovated church in San Francisco’s SoMa neighborhood,…

A venture capital firm looks back on changing norms, from board seats to backing rival startups

The families of victims of the shooting at Robb Elementary School in Uvalde, Texas are suing Activision and Meta, as well as gun manufacturer Daniel Defense. The families bringing the…

Families of Uvalde shooting victims sue Activision and Meta

Like most Silicon Valley VCs, what Garry Tan sees is opportunities for new, huge, lucrative businesses.

Y Combinator’s Garry Tan supports some AI regulation but warns against AI monopolies

Everything in society can feel geared toward optimization – whether that’s standardized testing or artificial intelligence algorithms. We’re taught to know what outcome you want to achieve, and find the…

How Maven’s AI-run ‘serendipity network’ can make social media interesting again

Miriam Vogel, profiled as part of TechCrunch’s Women in AI series, is the CEO of the nonprofit responsible AI advocacy organization EqualAI.

Women in AI: Miriam Vogel stresses the need for responsible AI

Google has been taking heat for some of the inaccurate, funny, and downright weird answers that it’s been providing via AI Overviews in search. AI Overviews are the AI-generated search…

What are Google’s AI Overviews good for?

When it comes to the world of venture-backed startups, some issues are universal, and some are very dependent on where the startups and its backers are located. It’s something we…

The ups and downs of investing in Europe, with VCs Saul Klein and Raluca Ragab

Welcome back to TechCrunch’s Week in Review — TechCrunch’s newsletter recapping the week’s biggest news. Want it in your inbox every Saturday? Sign up here. OpenAI announced this week that…

Scarlett Johansson brought receipts to the OpenAI controversy

Accurate weather forecasts are critical to industries like agriculture, and they’re also important to help prevent and mitigate harm from inclement weather events or natural disasters. But getting forecasts right…

Deal Dive: Can blockchain make weather forecasts better? WeatherXM thinks so

pcTattletale’s website was briefly defaced and contained links containing files from the spyware maker’s servers, before going offline.

Spyware app pcTattletale was hacked and its website defaced

Featured Article

Synapse, backed by a16z, has collapsed, and 10 million consumers could be hurt

Synapse’s bankruptcy shows just how treacherous things are for the often-interdependent fintech world when one key player hits trouble. 

3 days ago
Synapse, backed by a16z, has collapsed, and 10 million consumers could be hurt

Sarah Myers West, profiled as part of TechCrunch’s Women in AI series, is managing director at the AI Now institute.

Women in AI: Sarah Myers West says we should ask, ‘Why build AI at all?’

Keeping up with an industry as fast-moving as AI is a tall order. So until an AI can do it for you, here’s a handy roundup of recent stories in the world…

This Week in AI: OpenAI and publishers are partners of convenience

Evan, a high school sophomore from Houston, was stuck on a calculus problem. He pulled up Answer AI on his iPhone, snapped a photo of the problem from his Advanced…

AI tutors are quietly changing how kids in the US study, and the leading apps are from China

Welcome to Startups Weekly — Haje‘s weekly recap of everything you can’t miss from the world of startups. Sign up here to get it in your inbox every Friday. Well,…

Startups Weekly: Drama at Techstars. Drama in AI. Drama everywhere.

Last year’s investor dreams of a strong 2024 IPO pipeline have faded, if not fully disappeared, as we approach the halfway point of the year. 2024 delivered four venture-backed tech…

From Plaid to Figma, here are the startups that are likely — or definitely — not having IPOs this year