Industries

Helping clients meet their business challenges begins with an in-depth understanding of the industries in which they work. That’s why KPMG LLP established its industry-driven structure. In fact, KPMG LLP was the first of the Big Four firms to organize itself along the same industry lines as clients.

How We Work

We bring together passionate problem-solvers, innovative technologies, and full-service capabilities to create opportunity with every insight.

Learn more

Careers & Culture

What is culture? Culture is how we do things around here. It is the combination of a predominant mindset, actions (both big and small) that we all commit to every day, and the underlying processes, programs and systems supporting how work gets done.

Learn more

The False Positive Conundrum

Balancing security and efficiency

False positives, while not uncommon in the realm of application security, pose a significant and persistent challenge for organizations. These misleading alerts, which suggest potential security issues but turn out to be benign, can disrupt daily operations and drain the time of valuable resources. This impact is particularly felt by developers, whose precious cycles are needed to drive innovation and growth.

When security teams encounter a barrage of alerts, many of which eventually prove to be false positives, they inadvertently invest substantial time and effort in assessing these alerts for genuine security risks. This well-intentioned but often unproductive task can lead to a sense of frustration among security team members. The constant need to sift through alerts that don't represent actual threats erodes their motivation and can distract them from addressing legitimate security concerns.

This situation highlights a need for a more refined and efficient alert system. Traditional security mechanisms, while essential, may lack the sophistication required to distinguish genuine threats from false positives, so organizations are increasingly recognizing the importance of an alert system that not only identifies potential issues but also streamlines the validation process, allowing security teams to focus their expertise where it truly matters.

However, the consequences of mishandling false positives extend beyond immediate frustration. They can lead to what is commonly known as "alert fatigue." This phenomenon takes root when security teams find themselves becoming desensitized to alerts, either because they receive too many alerts or alerts that are not relevant. Over time, security teams may begin to ignore or dismiss alerts without adequately investigating them, leading to actual security threats being overlooked.

In light of these potential consequences, it becomes critical to have strategies for minimizing false positives, streamlining alert management, and enabling security teams to focus their efforts on detecting real security threats. Some of these strategies can include:

1

Effectively Prioritizing and Triaging Alerts12: This method prioritizes alerts based on potential impact and severity. By triaging alerts on risk level and prioritizing the most severe alerts for immediate action, security teams can direct their attention to critical risks and quickly dismiss those not an immediate concern, reducing the time and resources spent on potential false positives. This proactive approach allows security teams to stay ahead of potential false positives and maintain a high level of alert precision.

Achieving this goal involves creating a transparent alert prioritization process, which encompasses defining precise criteria for identifying high-priority alerts. By establishing these clear and well-defined thresholds, organizations establish a structured framework that minimizes ambiguity and facilitates faster decision-making and response times. Additionally, it is also important to regularly review and update alert rules to reflect any changes that may affect the accuracy of the alerts. Default priorities set by vulnerability scanners may not always reflect the specific context of a system or business, which is why establishing a tailored approach is essential. It is important to review alerts and prioritize them based on the potential impact on the system and business.

2

Adopting Machine Learning (ML) Solutions to Automate Workflows: Using ML to automate workflows can reduce the number of false positive alerts by enabling security teams to differentiate between real security threats and benign events. The power of ML lies in its capability to discern subtle patterns within large volumes of data and use these patterns to identify true security threats while ignoring non-relevant risks. Teams can train a ML model to recognize patterns from historical closed alerts and use this to predict whether alerts that are currently open are likely to be false positives.

The integration of ML into security workflows can not only enhance response times but also contribute to a more streamlined and robust security posture. Organizations can leverage the insights generated by ML algorithms to proactively address vulnerabilities by identifying and fixing the underlying issues that triggered these false alerts in the first place. As a result, not only is the burden of false positives lightened, but the overall cybersecurity resilience of the organization is strengthened. 

3

Regularly Reviewing Security Standards3: This entails assessing current vulnerability management practices, identifying areas of weakness, and implementing new policies and procedures to address these weaknesses. Regularly reviewing and updating policies can lower the number of false positive alerts by ensuring that security teams employ the most relevant and practical methodologies for detecting and responding to security threats.

In addition, conducting regular reviews can help ensure that security teams are following leading practices for managing alerts, such as implementing new workflows for alert triage and response or offering additional training to security analysts to better identify critical risks. In essence, the act of regularly reviewing and updating security standards isn't merely a compliance exercise; it is a proactive strategy for refining security practices, reducing the noise of false positives, and fortifying the organization's overall security posture.

In today's rapidly evolving digital landscape, false positive alerts have emerged as a persistent challenge that organizations and security teams grapple with in their application security journey. These erroneous warnings not only disrupt the workflow of security professionals but also, more critically, divert their attention and resources away from genuine threats. However, by implementing these strategies, security teams can focus on genuine threats and respond effectively.

Footnotes

  1. National Institute of Standards and Technology (NIST), Creating a Patch and Vulnerability Management Program, November 16, 2005
  2. Open Worldwide Application Security Project (OWASP), OWASP Vulnerability Management Guide, June 1, 2020
  3. Carnegie Mellon University, Cyber Resilience Review (CRR) Resource Guide: Vulnerability Management, December 17, 2020

Explore more

Cybersecurity considerations 2023

The golden thread

Read more

Meet our team

Image of Caleb Queern
Caleb Queern
Managing Director, Cyber Security, KPMG US
Image of Jackie Mak
Jackie Mak
Manager, Cyber Security Services, KPMG US

Explore other services tailored to your business

Thank you!

Thank you for contacting KPMG. We will respond to you as soon as possible.

Contact KPMG

Use this form to submit general inquiries to KPMG. We will respond to you as soon as possible.

By submitting, you agree that KPMG LLP may process any personal information you provide pursuant to KPMG LLP's Privacy Statement.

An error occurred. Please contact customer support.

Job seekers

Visit our careers section or search our jobs database.

Submit RFP

Use the RFP submission form to detail the services KPMG can help assist you with.

Office locations

International hotline

You can confidentially report concerns to the KPMG International hotline

Press contacts

Do you need to speak with our Press Office? Here's how to get in touch.

Headline