Navigating the Data Stream without Boiling the Ocean: Case Studies in Effective Log ManagementDr. Anton Chuvakin: IANS FacultyPanel members from large organizations using log management/SIEM tools [names removed due to not having permission to post themSee IANS site http://www.iansresearch.com for full details]
AgendaSIEM and Log Management Common Pitfalls and LessonsDiscussion QuestionsQ&AWebcast Q&A posted at http://chuvakin.blogspot.com/search/label/questionsSponsor Presentation
SIEM and Log Management LM:Log ManagementFocus on all uses for logsSIEM: Security Information and Event ManagementFocus on security use of logs and other data
Intro to Log Management Drivers for logging and log management
What to log? Logging policy
Log collection and retention
Log review procedures
Security monitoring
Log forensics
Other uses for log dataLog Management Maturity Curve
Top Log Management MistakesNot logging at all.Approaching logs in silo’ed fashionStoring logs for too short a timePrioritizing the log records before collectionIgnoring the logs from applicationsNot looking at the logsOnly looking at what youknow is badThinking that compliance=log storage
Discussion Questions: What to Log?What do you log? Devices? Systems? Applications?What approach was taken to determine ‘what to log?’? What process was followed?What data are you logging and why are you logging it?How you deal with custom log formats, e.g from custom applications?Structured and unstructured data: do you parse all or only index some data?Retention policy: how? What? For how long?
Discussion Questions: How to Do Log Management?What are you doing with the log data? What do you review? What motivated you to review logs?What logs are looked at periodically?What logs are looked at only after an incident?What tools used for log review? LM or SIEM?Who reviews logs?What roles are looking at logs? Who uses each of the tools?
Discussion Questions: ToolsChoosing toolsHow were the tools chosen?What are the top 3 requirements that were used?Operating tools:What each tool does? SIEM and LMJoint SIEM and LM architectureLogger in front? Other architecture choices?Key: How to figure what to filter from LM to SIEM?From correlation rules? Or devices? or use cases?

IANS Navigating the Data Stream without Boiling the Ocean: Case Studies in Effective Log Management by Dr. Anton Chuvakin

  • 1.
    Navigating the DataStream without Boiling the Ocean: Case Studies in Effective Log ManagementDr. Anton Chuvakin: IANS FacultyPanel members from large organizations using log management/SIEM tools [names removed due to not having permission to post themSee IANS site http://www.iansresearch.com for full details]
  • 2.
    AgendaSIEM and LogManagement Common Pitfalls and LessonsDiscussion QuestionsQ&AWebcast Q&A posted at http://chuvakin.blogspot.com/search/label/questionsSponsor Presentation
  • 3.
    SIEM and LogManagement LM:Log ManagementFocus on all uses for logsSIEM: Security Information and Event ManagementFocus on security use of logs and other data
  • 4.
    Intro to LogManagement Drivers for logging and log management
  • 5.
    What to log?Logging policy
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
    Other uses forlog dataLog Management Maturity Curve
  • 11.
    Top Log ManagementMistakesNot logging at all.Approaching logs in silo’ed fashionStoring logs for too short a timePrioritizing the log records before collectionIgnoring the logs from applicationsNot looking at the logsOnly looking at what youknow is badThinking that compliance=log storage
  • 12.
    Discussion Questions: Whatto Log?What do you log? Devices? Systems? Applications?What approach was taken to determine ‘what to log?’? What process was followed?What data are you logging and why are you logging it?How you deal with custom log formats, e.g from custom applications?Structured and unstructured data: do you parse all or only index some data?Retention policy: how? What? For how long?
  • 13.
    Discussion Questions: Howto Do Log Management?What are you doing with the log data? What do you review? What motivated you to review logs?What logs are looked at periodically?What logs are looked at only after an incident?What tools used for log review? LM or SIEM?Who reviews logs?What roles are looking at logs? Who uses each of the tools?
  • 14.
    Discussion Questions: ToolsChoosingtoolsHow were the tools chosen?What are the top 3 requirements that were used?Operating tools:What each tool does? SIEM and LMJoint SIEM and LM architectureLogger in front? Other architecture choices?Key: How to figure what to filter from LM to SIEM?From correlation rules? Or devices? or use cases?
  • 15.
    Discussion Questions: Complianceand Use CasesInvestigative use caseAny lessons learned on how to investigate incidents using log data?Is compliance a driver or a use case for you?
  • 16.
    How operations teamuses LM tools?
  • 17.
    Any unusual usecases for log data (=apart from security/compliance/operations)Non-security use case for SIEM?Do business people use it?
  • 18.
    Discussion Questions: Issues?IssuesAnySIEM “flooding” issues?Not knowing what to log?Challenges with custom applications?Dream a bit What would you like to have in your LM and SIEM tools?
  • 19.
  • 20.
    Questions?Dr. Anton ChuvakinEmail:anton@chuvakin.orgSite:http://www.chuvakin.orgBlog:http://www.securitywarrior.orgTwitter:@anton_chuvakinConsulting:http://www.securitywarriorconsulting.com
  • 21.
    More on AntonConsultant: http://www.securitywarriorconsulting.comBook author: “Security Warrior”, “PCI Compliance”, “Information Security Management Handbook”, “Know Your Enemy II”, “Hacker’s Challenge 3”, etcConference speaker: SANS, FIRST, GFIRST, ISSA, CSI, RSA, Interop, many, many others worldwideStandard developer: CEE, CVSS, OVAL, etcCommunity role: SANS, Honeynet Project, WASC, CSI, ISSA, OSSTMM, InfraGard, ISSA, othersPast roles: Researcher, Security Analyst, Strategist, Evangelist, Product Manager

Editor's Notes

  • #2 What makes a log management program effective? Log management activities must be prioritized in order to operate your security team effectively. We will review and analyze best practices for implementing log management programs as well as address SIEMs’ influence on the goal of optimization. This virtual discussion is ideal for risk, compliance, and security managers, as well as anyone looking for new approaches to gain intelligence from their log data.