{"id":91623,"date":"2020-07-28T10:30:26","date_gmt":"2020-07-28T17:30:26","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=91623"},"modified":"2023-09-26T09:10:46","modified_gmt":"2023-09-26T16:10:46","slug":"empower-analysts-reduce-burnout-isecurity-operations-center","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/07\/28\/empower-analysts-reduce-burnout-isecurity-operations-center\/","title":{"rendered":"Empower your analysts to reduce burnout in your security operations center"},"content":{"rendered":"
Effective cybersecurity starts with a skilled and empowered team. In a world with more remote workers and an evolving threat landscape, you need creative problem solvers defending your organization. Unfortunately, many traditional security organizations operate in a way that discourages growth, leading to burnout and high turnover.<\/p>\n
Sixty-six percent of IT professionals say they have considered finding a new job with less stress<\/a>. Fifty-one percent are even willing to take a pay cut. And the average tenure of a cybersecurity analyst is only one to three years. Even if stressed employees don\u2019t quit, they may become cynical or lose focus, putting your organization at risk. Given the huge talent shortage\u2014estimated between one<\/a> and three million<\/a> cybersecurity professionals\u2014it\u2019s critical to understand some of the factors that lead to burnout, so you can grow and retain your team. In this blog, I\u2019ll provide insights into what drives burnout and walk through recommendations for using automation, training, and metrics to build a more effective security organization.<\/p>\n Burnout starts with a vicious cycle. Because management has a limited budget, they staff many of their positions with entry-level roles. Security organizations are inherently risk-averse, so managers are reticent to give low-skilled roles decision-making authority. Security professionals in such an environment have few opportunities to use creative problem-solving skills, limiting the opportunity for them to grow their skills. If their skills don\u2019t grow, they don\u2019t advance and neither does the organization.<\/p>\n This cycle was documented in 2015, when Usenix studied burnout in a security operations center (SOC).<\/a> By embedding an anthropologically trained computer science graduate in a SOC for 6 months, researchers identified four key areas that interact with each other to contribute to job satisfaction:<\/p>\n Graphic from\u00a0A Human Capital Model for Mitigating Security Analyst Burnout<\/i><\/a>, USENIX Association, 2015.<\/p>\n To combat the vicious cycle of burnout, you need to create a positive connection between these four areas and turn it into a virtuous<\/em> cycle. Strategic investments in growth, automation, and metrics can make a real difference without requiring you to rewrite roles. Many of these recommendations have been implemented in the Microsoft SOC, resulting in a high-performing culture. I also believe you can expand these learnings to your entire security organization, who may also be dealing with stress related to remote work and COVID-19<\/a>.<\/p>\n Managers are understandably wary about giving too much decision-making authority to junior employees with limited skills, but if you give them no opportunities to try new ideas they won\u2019t improve. Look for lower-risk opportunities for Tier One analysts to think outside set procedures. They may periodically make mistakes, but if you foster a culture of continuous learning and a growth mindset they will gain new skills from the experience.<\/p>\n To advance skills on your team, it\u2019s also important to invest in training. The threat landscape changes so rapidly that even your most senior analysts will need to dedicate time to stay up to date. The Microsoft SOC focuses its training on the following competencies<\/a>:<\/p>\n Not all training should be formal. Most managers hire junior employees with the hope that they will learn on the job, but you need to create an environment that facilitates that. An apprenticeship model provides growth opportunities for both junior and senior members of your team.<\/p>\n At Microsoft, we believe the best use of artificial intelligence and automation is to support humans\u2014not replace them<\/a>. In the SOC, technology can reduce repetitive tasks so that people can focus on more complex threats and analysis. This allows defenders to use human intelligence to proactively hunt for adversaries that got past the first line of defense. Your organization will be more secure, and analysts can engage in interesting challenges.<\/p>\n Solutions like Microsoft Threat Protection can reduce some of the tedium involved in correlating threats across domains. Microsoft Threat Protection orchestrates across emails, endpoints, identity, and applications<\/a> to automatically block attacks or prioritize incidents for analysts to pursue.<\/p>\n Azure Sentinel, a cloud-native SIEM, uses machine learning algorithms to reduce alert fatigue<\/a>. Azure Sentinel can help identify complex, multi-stage attacks by using a probabilistic kill chain to combine low fidelity signals into a few actionable alerts.<\/p>\n It isn\u2019t enough to apply machine learning to today\u2019s monotonous challenges. Engage your team in active reflection and continuous improvement so they can finetune automation, playbooks, and other operations as circumstances change.<\/p>\n Every good SOC needs to track its progress to prove its value to the organization, make necessary improvements, and build the case for budgets. But don\u2019t let your metrics become just another checklist. Measure data that is motivational to analysts and reflects the successes of the SOC. It\u2019s also important to allocate the tracking of metrics to the right team members. For example, managers rather than analysts should be responsible for mapping metrics to budgets.<\/p>\n The Microsoft SOC tracks the following metrics<\/a>:<\/p>\n Time to acknowledgment:<\/strong> For any alert that has a track record of 90 percent true positive, Microsoft tracks how long between when an alert starts \u201cblinking\u201d and when an analyst starts the investigation.<\/p>\n Time to remediate:<\/strong> Microsoft tracks how long it takes to remediate an incident, so we can determine if we are reducing the time that attackers have access to our environment.<\/p>\n Incidents remediated manually and via automation:<\/strong> To evaluate the effectiveness of our automation technology and to ensure we are appropriately staffed, we track how many incidents we remediate via automation versus manual effort.<\/p>\n Escalations between tiers:<\/strong> We also track issues that are remediated through tiers to accurately capture the amount of work that is happening at each tier. For example, if an incident gets escalated from Tier One to Tier Two, we don\u2019t want to fully attribute the work to Tier Two or we may end up understaffing Tier One.<\/p>\n As organizations continue to confront the COVID-19 pandemic and eventually move beyond it, many security teams will be asked to do more with less. A continuous learning culture that uses automation and metrics to encourage growth will help you build a creative, problem-solving culture that is able to master new skills.<\/p>\n Read more about Microsoft Threat Protection<\/a>.<\/p>\n Find out about Azure Sentinel.<\/a><\/p>\n Bookmark the\u00a0Security blog<\/a> to keep up with our expert coverage on security matters. Also, follow us at @MSFTSecurity<\/a>\u00a0for the latest news and updates on cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":" Strategic use of automation and metrics can help you create a continuous learning culture that keeps your team engaged in the work.<\/p>\n","protected":false},"author":96,"featured_media":91627,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"content-type":[3662],"topic":[3674,3684,3685],"products":[3726],"threat-intelligence":[],"tags":[],"coauthors":[1916],"class_list":["post-91623","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-news","topic-incident-response","topic-security-operations","topic-siem-and-xdr","products-microsoft-sentinel"],"yoast_head":"\nBurnout in the security operations center<\/h3>\n
\n
<\/p>\n
Create a continuous learning culture<\/h3>\n
\n
Support operational efficiency with automation<\/h3>\n
Track metrics that encourage growth<\/h3>\n