Planning for Success with Risk-Based Alerting

In our last RBA blog post, we talked about some of the problems RBA can help solve. In this post, we explain the methodology we use with Splunk customers as their security teams start working with RBA.

In working with our customers, the Splunk Superstar RBA Braintrust has developed a powerful methodology to kickstart your RBA implementation. From first moves to production, these four levels take you step-by-step through the process of successfully getting RBA up and running.

Level 1 is all about getting familiar with how RBA works in your environment. This level uses the defaults in Splunk ES to start with and then you can monitor and tune those rules to produce higher-fidelity alerts.

Level 2 is the classic development phase of any software-based project. You’ll take what you learned in Level 1 to monitor and modify your existing rules to produce higher-fidelity Risk Notables.

Level 3 prepares your RBA implementation for production by setting up useful dashboards and modifying your existing case management processes to be more effective with RBA. In short, this level is all about getting RBA polished for real-world use.

Level 4 is the top of the mountain: time to Go-Live. Your team puts RBA into production and carefully monitors activity and results, fine-tuning rules and processes as needed.

Lest you think this sounds either too easy or too complicated, let me reassure you that it's not. I'll be diving into a more detailed explanation of the RBA journey in my next blog post. For now, though, let's look at some success factors for starting an RBA implementation.

Treating RBA as a Project

As with any new process, RBA needs to be designed and implemented as a project within your organization. At a minimum, the RBA project should include buy-in from stakeholders, a set of clear goals and a detailed plan to implement RBA.

As an engineer, I often just want to build the thing and assume everyone will see the value immediately, but I highly recommend you develop buy-in at multiple levels before you begin your RBA implementation. It may take some effort to convince leadership that the time invested into building RBA enables them to meet or surpass many of their cherished security or resilience goals, but having them on-board will make all the difference.

My initial blog post covers this from a few different angles for various personas. In addition, here are two presentations from Splunk customers explaining the value that RBA has added to their organizations:

When you discuss RBA within your organization, there are some key points to remember.

Goals and Plans

You can use RBA to improve different aspects of your SOC operations and security posture. We recommend that you select one or two goals and focus on those, along with devising metrics or means to measure success. Here's two I particularly like to use:

After you kick off the project plan, make sure you track progress, give regular status updates to stakeholders, and work through any roadblocks you may hit. While RBA can seem complicated at first, using the methodology in this guide will help you develop and execute a solid implementation plan.

Setting Expectations

Implementing a solid RBA strategy isn't a flick-the-switch solution, but it is foundational to improving your security maturity. While you can probably figure out how to do some kind of risk-based alerting with any security product out there, my goal is to share the proven RBA methodology that the Splunk team has developed while working with our customers to get you started on your own RBA journey.

Committing to RBA means investing in your people so they can transform your approach to cybersecurity. A successful implementation will change how your security team operates, empowering them to work on what matters most and develop creative projects that leverage and synergize with RBA while relieving stress, workloads, and burnout. Typically, RBA users see anywhere from 50% to 90% reduction in alerts, with the remaining alerts being higher fidelity. That’s definitely worth the work to implement RBA in your organization!

How long will this RBA journey take? That’s a good question! There’s no one answer because every organization is different: different infrastructure, different resources, and different security issues. Some teams will want to do everything on their own; others may choose to engage Splunk Professional Services or a Splunk Partner for guidance or to work alongside their internal security team.

Want to Know More?

Trust me, your RBA journey will be worth the work. The Essential Guide to Risk-Based Alerting is my new e-book designed to help you get started with RBA, from first steps to moving into production and beyond. I purposely designed it to be easy to follow, based on dozens of customer implementations and collected wisdom.

For a one-two punch with art of the possible and the steps you'll take to get there, watch Ted Skinner's and my RBA webinars.

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.