{"id":726,"date":"2023-06-21T00:13:12","date_gmt":"2023-06-21T00:13:12","guid":{"rendered":"https:\/\/fde.cat\/index.php\/2023\/06\/21\/tackling-cyber-threats-with-automation-inside-salesforces-cutting-edge-security-strategy\/"},"modified":"2023-06-21T00:13:12","modified_gmt":"2023-06-21T00:13:12","slug":"tackling-cyber-threats-with-automation-inside-salesforces-cutting-edge-security-strategy","status":"publish","type":"post","link":"https:\/\/fde.cat\/index.php\/2023\/06\/21\/tackling-cyber-threats-with-automation-inside-salesforces-cutting-edge-security-strategy\/","title":{"rendered":"Tackling Cyber Threats with Automation: Inside Salesforce\u2019s Cutting-edge Security Strategy"},"content":{"rendered":"<p>In our \u201cEngineering Energizers\u201d Q&amp;A series, we examine the professional journeys that have shaped Salesforce Engineering leaders. In this special edition, we meet Avinash Reddy Thumma, lead threat detection engineer for Salesforce. Based in Hyderabad, India, Avinash\u2019s threat detection team specializes in protecting Salesforce\u2019s network by thwarting malicious threats.<\/p>\n<p>Read on to learn how Avinash and his team have revolutionized threat detection at Salesforce, using an innovative approach that combines advanced correlation and automation platforms to manage tens of millions of threat alerts every day.<\/p>\n<p><strong>What is your background?<\/strong><\/p>\n<p>My passion is cybersecurity, which I have pursued for more than 11 years. My expertise encompasses cybersecurity incident response, cloud security, threat detection development, digital forensics and threat hunting, and security orchestration and automation.<\/p>\n<p>As the lead threat detection engineer at Salesforce, I oversee the company\u2019s Intrusion Detection System (IDS), a critical line of defense against potential cyberattacks. The IDS monitors and analyzes network traffic to detect any signs of intrusion or suspicious activity.<\/p>\n<p>Before joining Salesforce, I was an incident response and digital forensics engineer, responsible for a global incident response team at another large-scale technology company. That experience gave me an acute understanding for the landscape that Salesforce incident response (IR) analysts face, and I apply that knowledge daily to help our IR team scale with the IDS to counter sophisticated cyberattacks.<\/p>\n<p><strong>What was the greatest challenge your threat detection team faced?<\/strong><\/p>\n<p>The majority of IDS alerts our IR team received each day turned out to be false positives, where benign network activity was mistakenly identified as malicious. These false alerts resulted from various factors, such as misconfigurations, incomplete threat intelligence, and system glitches. Historically, manual investigation was a time-consuming process and could take 15-45 minutes to evaluate each alert. Analysts found the abundance of false alerts to be counterproductive, eroding their trust in the IDS, reducing efficiency, and causing <a href=\"https:\/\/www.forbes.com\/sites\/edwardsegal\/2021\/11\/08\/alert-fatigue-can-lead-to-missed-cyber-threats-and-staff-retentionrecruitment-issues-study\/?sh=7e5705a35c99\" target=\"_blank\" rel=\"noopener\">alert fatigue<\/a>.<\/p>\n<p><strong>How did advanced correlation and automation help address that challenge?<\/strong><\/p>\n<p>The threat detection team adopted advanced correlation and automation platforms, which now play a crucial role in managing and analyzing the massive volume of IDS alerts.<\/p>\n<p><em>Enhanced correlation and automation effectively detects threats, combatting alert fatigue.<\/em><\/p>\n<p>Advanced correlation provides analysts with contextual data necessary for efficient triage of malicious activity. Serving as an enhanced security information and event management solution, the correlation platform aggregates and analyzes logs from the company\u2019s IT data lake environment \u2014 including servers, devices, domain controllers, etc. \u2014 enabling better interpretation of security events.<\/p>\n<p>Acting as a centralized hub, the automation system seamlessly integrates with sophisticated security tools and automates incident workflows that incorporate customized playbooks, automated triage, alert enrichment, and continuous improvement. As a result, the team reduced the number of false alerts, accelerated threat response times, and significantly minimized manual effort. Analysts now only receive alerts that require their attention, effectively resolving the issue of alert fatigue.<\/p>\n<p><strong>How do your automation and correlation platforms collaborate?<\/strong><\/p>\n<div class=\"wp-block-group is-layout-constrained wp-container-1\">\n<p>Here is how these systems work in synergy:<\/p>\n<p><strong>Alerts detected:<\/strong> Network traffic passes through the IDS, which identifies suspicious actors or possible threats, triggering a security event.<\/p>\n<p><strong>Correlation platform validates events<\/strong>: The correlation platform records the event and cross-references it with a vast amount of log data, creating a highly refined alert for the automation system.<\/p>\n<p><strong>Automation platform responds to threats<\/strong>: Upon receiving an alert, the automation system executes and automates response actions using enriched data and intelligent playbooks. Codifying response workflows, playbooks drive consistent, efficient, and standardized actions for managing alerts.<\/p>\n<p><strong>Analyst reviews the threat:<\/strong> The automation system presents the most compelling cases to the analyst for review, automatically closing out less significant cases.<\/p>\n<p><strong>Continuous updates and scaling:<\/strong> The automation system continuously refines in its detection rules and playbooks by incorporating input from the correlation platform, past incidents, and user feedback. This iterative approach drives ongoing improvements \u2014 enhancing the efficiency of the IDS and effectively distinguishing real threats from noise.<\/p>\n<\/div>\n<p><strong>What was the time-saving impact of automation on IR analysts?<\/strong><\/p>\n<p>Analysts reported that automating the closure of a false positive case saved them 15 minutes of work. Extrapolating this across a three-month period, automation saved them a total of 11 days\u2019 worth of effort.<\/p>\n<p><em>Recently, the IDS tracked as many over 90 million events in a single day, which automation deftly handled, sharing only key events with analysts<\/em>.<\/p>\n<p>Ultimately, automation provides analysts with instant access to all relevant data when they open a case or review an alert, enabling them to make prompt decisions on whether the incident requires further action.<\/p>\n<h3 class=\"wp-block-heading\"><strong>Learn more<\/strong><\/h3>\n<p>Interested in more automation stories? <a href=\"https:\/\/engineering.salesforce.com\/automation-engineering-secrets-revealed-slashing-customer-processing-time-from-hours-to-seconds\/\" target=\"_blank\" rel=\"noopener\">Read this blog<\/a> to learn how India\u2019s Salesforce Engineering team uses automation to reduce customer processing time from hours to  seconds.<\/p>\n<p>Stay connected \u2014 join our <a href=\"https:\/\/flows.beamery.com\/salesforce\/eng-social-2023\" target=\"_blank\" rel=\"noopener\">Talent Community<\/a>!<\/p>\n<p><a href=\"https:\/\/www.salesforce.com\/company\/careers\/teams\/tech-and-product\/?d=cta-tms-tp-2\" target=\"_blank\" rel=\"noopener\">Check out our Technology and Product teams<\/a> to learn how you can get involved.<\/p>\n<p>Discover the latest best practices for cybersecurity. Check out the <a href=\"https:\/\/security.salesforce.com\/blog\" target=\"_blank\" rel=\"noopener\">Salesforce Security Blog<\/a>.<\/p>\n<p>The post <a href=\"https:\/\/engineering.salesforce.com\/tackling-cyber-threats-with-automation-inside-salesforces-cutting-edge-security-strategy\/\">Tackling Cyber Threats with Automation: Inside Salesforce\u2019s Cutting-edge Security Strategy<\/a> appeared first on <a href=\"https:\/\/engineering.salesforce.com\/\">Salesforce Engineering Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/engineering.salesforce.com\/tackling-cyber-threats-with-automation-inside-salesforces-cutting-edge-security-strategy\/\" target=\"_blank\" class=\"feedzy-rss-link-icon\" rel=\"noopener\">Read More<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>In our \u201cEngineering Energizers\u201d Q&amp;A series, we examine the professional journeys that have shaped Salesforce Engineering leaders. In this special edition, we meet Avinash Reddy Thumma, lead threat detection engineer for Salesforce. Based in Hyderabad, India, Avinash\u2019s threat detection team specializes in protecting Salesforce\u2019s network by thwarting malicious threats. Read on to learn how Avinash&hellip; <a class=\"more-link\" href=\"https:\/\/fde.cat\/index.php\/2023\/06\/21\/tackling-cyber-threats-with-automation-inside-salesforces-cutting-edge-security-strategy\/\">Continue reading <span class=\"screen-reader-text\">Tackling Cyber Threats with Automation: Inside Salesforce\u2019s Cutting-edge Security Strategy<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","footnotes":""},"categories":[7],"tags":[],"class_list":["post-726","post","type-post","status-publish","format-standard","hentry","category-technology","entry"],"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":780,"url":"https:\/\/fde.cat\/index.php\/2023\/10\/31\/new-automation-tools-stopping-hundreds-of-future-threats-instantly\/","url_meta":{"origin":726,"position":0},"title":"New Automation Tools: Stopping Hundreds of Future Threats Instantly","date":"October 31, 2023","format":false,"excerpt":"By Yogi Kapur and Scott Nyberg In our \u201cEngineering Energizers\u201d Q&A series, we examine the professional journeys that have shaped Salesforce Engineering leaders. Meet Yogi Kapur, Senior Director of Salesforce\u2019s Global Computer Security Incident Response Team (CSIRT). Based in Hyderabad, India, Yogi leads his cybersecurity analyst team in responding to\u2026","rel":"","context":"In &quot;Technology&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":788,"url":"https:\/\/fde.cat\/index.php\/2023\/10\/31\/new-automation-tools-stopping-hundreds-of-future-threats-instantly-2\/","url_meta":{"origin":726,"position":1},"title":"New Automation Tools: Stopping Hundreds of Future Threats Instantly","date":"October 31, 2023","format":false,"excerpt":"By Yogi Kapur and Scott Nyberg In our \u201cEngineering Energizers\u201d Q&A series, we examine the professional journeys that have shaped Salesforce Engineering leaders. Meet Yogi Kapur, Senior Director of Salesforce\u2019s Global Computer Security Incident Response Team (CSIRT). Based in Hyderabad, India, Yogi leads his cybersecurity analyst team in responding to\u2026","rel":"","context":"In &quot;Technology&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":754,"url":"https:\/\/fde.cat\/index.php\/2023\/08\/29\/data-enrichment-and-automation-helping-salesforce-security-overcome-the-threat-identification-challenge\/","url_meta":{"origin":726,"position":2},"title":"Data Enrichment and Automation: Helping Salesforce Security Overcome the Threat Identification Challenge","date":"August 29, 2023","format":false,"excerpt":"By Matt Saunders and Scott Nyberg In our \u201cEngineering Energizers\u201d Q&A series, we examine the professional life experiences that have shaped Salesforce Engineering leaders. Meet Matt Saunders, a Principal Member of the Technical Staff at Salesforce, supporting the Detection and Response Machine Learning team. In his role, Matt focuses on\u2026","rel":"","context":"In &quot;Technology&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":790,"url":"https:\/\/fde.cat\/index.php\/2023\/08\/29\/data-enrichment-and-automation-helping-salesforce-security-overcome-the-threat-identification-challenge-2\/","url_meta":{"origin":726,"position":3},"title":"Data Enrichment and Automation: Helping Salesforce Security Overcome the Threat Identification Challenge","date":"August 29, 2023","format":false,"excerpt":"By Matt Saunders and Scott Nyberg In our \u201cEngineering Energizers\u201d Q&A series, we examine the professional life experiences that have shaped Salesforce Engineering leaders. Meet Matt Saunders, a Principal Member of the Technical Staff at Salesforce, supporting the Detection and Response Machine Learning team. In his role, Matt focuses on\u2026","rel":"","context":"In &quot;Technology&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":816,"url":"https:\/\/fde.cat\/index.php\/2024\/01\/23\/the-power-of-ai-strengthening-application-security-by-eliminating-secrets-in-code\/","url_meta":{"origin":726,"position":4},"title":"The Power of AI: Strengthening Application Security by Eliminating Secrets in Code","date":"January 23, 2024","format":false,"excerpt":"By Krishna Pandey and Scott Nyberg. In our \u201cEngineering Energizers\u201d Q&A series, we examine the professional journeys that have shaped Salesforce Engineering leaders. Meet Krishna Pandey, Director of Security Engineering at Salesforce. Based in Bangalore, India, his Application Security Technology (AST) team powers Salesforce\u2019s source code security program, charged with\u2026","rel":"","context":"In &quot;Technology&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":719,"url":"https:\/\/fde.cat\/index.php\/2023\/05\/23\/automation-at-scale-migrating-200000-machines-from-centos-7-to-rhel-9\/","url_meta":{"origin":726,"position":5},"title":"Automation at Scale: Migrating 200,000 Machines from CentOS 7 to RHEL 9","date":"May 23, 2023","format":false,"excerpt":"When a legacy operating system (OS) approaches its end-of-support date, some organizations will upgrade their OS as fast as possible. Others may kick the can down the road, delaying any headaches they might encounter during the upgrade process. Six years ago, Salesforce Engineering put the pedal to the metal, migrating\u2026","rel":"","context":"In &quot;Technology&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/fde.cat\/index.php\/wp-json\/wp\/v2\/posts\/726","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fde.cat\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fde.cat\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/fde.cat\/index.php\/wp-json\/wp\/v2\/comments?post=726"}],"version-history":[{"count":0,"href":"https:\/\/fde.cat\/index.php\/wp-json\/wp\/v2\/posts\/726\/revisions"}],"wp:attachment":[{"href":"https:\/\/fde.cat\/index.php\/wp-json\/wp\/v2\/media?parent=726"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fde.cat\/index.php\/wp-json\/wp\/v2\/categories?post=726"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fde.cat\/index.php\/wp-json\/wp\/v2\/tags?post=726"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}