The average cost of a breach was $4.45M in 2023, with a mean time to identity of 204 days and a mean time to contain of 73, which means that every day that a breach goes undetected costs another $16,000. These are enormous costs for companies to shoulder, not to mention the personal impact on those involved, and the recent increased risks of litigation against CISOs. Teams are taking the risks seriously, spending 50% more of Enterprise IT budget on detection and response than in 2017, but despite these efforts, only ⅓ of current incidents are detected by internal tools.
When it comes to cloud security, even though documentation and information about the limitations of signature-based approaches through the history of cybersecurity is well-known and available, signatures are the de-facto approach to detection for cloud security. Signatures are also ingrained deeply in the heart of a SOC and security team’s detection and response processes, dictating organizational structure, job qualifications and what any team can reasonably be expected to achieve.
What would teams gain if they could take back a portion of the time they spend on signatures in cloud security?
To understand this, we need to first get an adequate understanding of the true cost of signatures when it comes to cloud detection and response, and examine whether a signature-based approach to cloud detection and response is really the ‘right tool for the right job.’
Due to the sheer volume involved in the cloud, detection engineers are forced to rely somewhat on out of the box detections from vendors, who are primarily detecting threats in cloud environments using signature-based methods.
People and processes are generally more important to the success of a security team than technology, and this is especially the case for the teams responsible for detection and response, including those that run the Security Operations Center (SOC), because of the broad scope, various inputs, and need for speedy responses. When it comes to detection and response in the cloud, to substantially support people and processes given the sheer volume involved, the best support for the SOC/SIEM workflow is:
The majority of the pain in working with signatures is what people must go through in order to achieve adequate scope to cover their gaps, with the best quality of detection.
Both home-grown and out-of-the-box signatures from vendors create an immense burden on the detection engineer or cloud security engineer, who will spend up to half their time on signature creation and maintenance, for example in the following scenarios:
A detection engineer or a cloud security engineer has a massive opportunity cost, in the value of their skillset to the organization, and in many cases, work on signatures ties up ½ of their time.
The side effects of signatures include delays in mean time to identify and mean time to remediate (MTTI, MTTR):
Every day that a breach goes undetected costs an organization ~$16,000, and signatures create cumbersome inputs that teams must combine into working detections that drive down MTTI and MTTR.
Much of the pain with signatures around achieving the right scope, and a high quality detection, would be reduced or altogether solved with:
RAD Security delivers the above with automated, eBPF-powered behavioral fingerprints that can be updated, verified, and changed based on your environment parameters, combined with AI-based investigation and enrichment.
Step 1. Deploy RAD and create initial baseline workload behavior
Baseline workload fingerprint for nginx image
Step 2. Detect drift and immediately enrich with real-time identity and infra context
Drift event with AI-powered investigation
Step 3. Update the fingerprint as needed over time with knowledge of your custom environment
Option to update behavioral baseline
With these steps, you can:
With RAD’s behavioral detection, teams are getting the right level of scope, and a higher quality detection than with signatures, which saves significant time and improves the time to identify and remediate in the case of a breach.
The activities involved in writing and tuning signatures, with RAD, would be replaced by automated behavioral fingerprint baselines that can quickly be updated, freeing up ½ the time of a detection engineer or security engineer. Imagine what your team could do if each person had 50% more of their time to dedicate to continuous testing, better alert definitions, expanding to new attack surfaces, documentation, or process management? How much more effective could your team work together across threat hunting, detection engineering, the SOC, and engineering?
For the below analysis of the cost of a breach, we only included costs that would have directly related to reducing the time to detect a breach, versus costs that will occur in a breach regardless of how long it remained undetected, like communications and PR. RAD’s solution can detect novel threats, not just known attacks, which means your time to detect and then respond could be reduced to zero. And showing an entire sequence of events, with the ‘Goldilocks’ scope across cloud native workloads, identity and infrastructure, reduces investigation time dramatically. By improving your MTTI and MTTR 70-99%, you can achieve cost savings of $10,000 per day, or $2-2.85M per breach.
Compliance is another area where signatures make it hard to gain a complete picture. You are left piecing together fragmented, stateless runtime data with static Kubernetes configurations and identity permissions, creating a lot of overhead with every audit. If you are being audited constantly, as is the case in many financial institutions, this burden is enough to take up multiple peoples’ weekly output. Based on customer interviews, each audit takes on average around 38 hours across multiple teams; RAD cuts this time in half by automating compliance reports that can be handed directly through to auditors. If each hour of time for a cloud security engineer costs $140, and you have 4 audits over a combined span of 20 weeks, you would be saving the equivalent of $200k in hours that could have been put to use detecting and responding to threats. In essence, you are getting ½ of a work week for one person for each week you are being audited, times the number of audits in a year.
Just as using signatures for detection and response in the cloud creates endless headaches for people and processes, behavioral detection and response creates desirable consequences for processes and people.
In the end, we can imagine a team that is finally able to take the time to adequately document, onboard new teammates, and turn the tribal knowledge of their environment into scalable detections, taking time away from signatures to do their part to ensure the SOC runs as smoothly as possible and the SIEM is giving the holistic picture of your risk posture.
In conclusion, the shift from signature-based detection to behavioral detection in cloud security isn't just a technical upgrade—it's a transformative change for security operations. By eliminating the time-consuming tasks associated with signatures, like constant tuning and updates, teams can focus on higher-value activities that truly enhance security posture. RAD's automated, behavioral detection approach not only reduces the mean time to identify and respond to threats but also empowers teams to work more effectively across detection engineering, threat hunting, and incident response. The result is not only a more secure environment but also a more efficient and cohesive team, leading to significant cost savings and a better overall ROI in cloud security.