Security Alert Fatigue Making Life Tough for IT Pros

Security experts weigh in on ways to reduce security alert fatigue.

May 15, 2020

5 Min Read
IT Security Pro

By Karen D. Schwartz

Eric Adams understands the effect of security alert fatigue from many vantage points. As a longtime security professional, he has experienced it many times himself.

And as Kyriba‘s chief information security officer, he has seen the effect it has on good security people who have become completely frustrated, numb or less effective because of security alert fatigue.

Kyriba’s products help businesses protect against fraud and financial risk.


Kyriba’s Eric Adams

“We have seen that if there are more than about 75 events over an hour, it’s just too many alerts,” he said. “It’s like being an air traffic controller. When you have a certain threshold of events per hour, you run the risk of an analyst not running the full playbook or analysis of an event.”

In fact, alert overload is a huge problem, and it can sabotage security operations. According to one recent report, the vast majority of security analysts say it takes more than 10 minutes to investigate each alert. It’s just a matter of doing the math.

This article originally appeared on Channel Futures’ sister site, IT Pro Today.

In addition to alert overload, false positives and security analyst churn also contribute to security alert fatigue. One study found that more than two in five organizations get false positive alerts in more than 20% of cases, while 15% reported that more than half of their security alerts are false positives.

Experts Weigh In

Here, experts weigh in on ways to reduce security alert fatigue.


Devo’s Jason Mical

Upgrade and modernize if you can. Ideally, this will include as much automation as possible.

Jason Mical is cybersecurity evangelist at Devo Technology. He says the best way to do that is to replace your legacy security information and event management (SIEM) system with a newer version that is more automated and rule-based. It should also rely more on artificial intelligence and machine learning. Newer SIEMs have access to all of the data in an environment instead of just security data. That gives more context to every alert and helps prioritize them. More modern SIEMs also tend to provide more visibility. These capabilities can help winnow down the number of alerts that are actually actionable. This helps to reduce alert fatigue.

For Kyriba, the solution was an automated security operations center (SOC) based on a Respond Software product with an integrated SIEM.

“In our case, the Respond software covers Levels 1 and 2 alerts and can take actions based on a playbook, and escalate only those that need personal attention,” Adams said. “So our personnel only look at those qualified alerts, determine whether they are valid or a false positive, and provide feedback into the Respond tooling.”

The automated nature of this solution helps reduce alert fatigue and frees analysts up to work on other tasks.

If you can’t upgrade, you’re not completely out of luck; focus on …

… fine-tuning what you have. That includes:

  • Customizing your rules or change some settings. “There is constant management that has to be done with alert rules,” Mical said. “There may be an alert set up that says if you see someone communicate on Port 443, alert me to that. Now you have 20 other devices because new applications have been spun up that are firing a ton of alerts, so auditing your alert rule engine is important, especially if you have a legacy SIEM environment.”

  • Tuning the network signatures in your intrusion detection system (IDS) to make them as tight as possible. “Having quick access to network metadata related to security alerts will also help analysts quickly identify false positives and not waste too much time investigating them,” said Andre Ludwig, chief product officer at Bricata.

  • Dealing with configuration issues. “If you ensure that proper administrative configurations are enabled, you can minimize superfluous alerts,” said Armond Caglar, a principal at Cybeta, a business threat intelligence company. Ensuring proper access control is another important configuration issue; if the right people have access to the right alerts, the entire system will be more effective. “Network teams should be constantly improving, refining and updating processes tied to access and alert generation of their various technology sensors,” Caglar added. “This includes continuous adjustments made to each team member’s access, the topics assigned to them, and criticality protocol.”

Be careful how many point solutions you add. It might be tempting to add more tools to your legacy SIEM, but choose carefully or you will add complexity. Sometimes, the more data and products you apply to your SIEM, the less responsive it can become.

“Can your people handle all of those tools? Probably not,” Adams said. “So focus on the most effective, efficient and automated tools. It’s a real balance to be able to make it work for you. You need a basic set of tools and good set of telemetry, but you have to be able to handle that data in an effective way.”

Make sure your personnel and processes can handle the load, he added.

“We don’t bring on any more tooling that makes any more load for us. We look at tools that allow us to reduce the load on the human personnel.”

No matter which route you go, testing is critical. Make sure you are doing red team/blue team exercises to validate your rules. Also, do penetration testing to ensure that there is no way to circumvent them, Mical said.

Free Newsletters for the Channel
Register for Your Free Newsletter Now

You May Also Like