SlideShare a Scribd company logo
1 of 28
Building a Security Operations Center
Randy Marchany
VA Tech IT Security Office and Lab
marchany@vt.edu
2
CyberSecurity Operations Center
• Security Operations Center (SOC) term is
being taken over by physical surveillance
companies
• We’re building a Cyber Security Operations
Center (CSOC) that doesn’t have any
physical surveillance capability.
• It could be a component of a SOC in the
future
4
Why?
• We’ve been collecting security related data
for a number of years and needed a focal
point to help us see the big picture
• Data from
• Security Reviews
• Vulnerability scans (push/pull)
• IPS/IDS data
• System logs
• We want to build a “security history” for a host
5
Why?
• The CSOC is a logical place to collect,
analyze and distribute data collected to
support our Defense in Depth Strategy
• Preventing Network Based Attacks
• Preventing Host Based Attacks
• Eliminating Security Vulnerabilities
• Supporting Authorized Users
• Providing tools for Minimizing Business Loss
6
Why?
• We want to measure and report compliance with our IT policies,
state/federal laws and regulations
• FERPA, HIPAA, PCI, ITAR, GLB, SOX
• VT Policies
• 7000 Acceptable Use of Computer and Communication Systems 3/28/2002
• 7010 Policy for Securing Technology Resources and Services 1/22/2007
• 7025 Safeguarding Nonpublic Customer Information 5/12/2004
• 7030 Policy on Privacy Statements on Virginia Tech Web Sites 3/27/2002
• 7035 Privacy Policy for Employees' Electronic Communications 3/14/2005
• 7040 Personal Credentials for Enterprise Electronic Services 4/01/2008
• 7100 Administrative Data Management and Access Policy 4/01/2008
• 7105 Policy for Protecting University Information in Digital Form 7/1/2008
• 7200 University IT Security Program 6/12/2006
• 7205 IT Infrastructure, Architecture and Ongoing Operations 6/12/2006
• 7210 IT Project Management 6/12/2006
• 7215 IT Accessibility 6/12/2006
• 1060 Policy on Social Security Numbers 5/25/2007
7
Where?
• OS Syslog/event logs, IDS logs, IPS logs,
PID logs, Firewall logs, Pen Test Logs, PCI,
netflow
• CSOC needs to be able to analyze and
display this data quickly
• Data resides on separate, distributed servers
• CSOC pulls data from these servers as
needed
• CSOC lives in the IT Security Office & Lab
8
What?
• Provides real-time view of the VT network’s
security status
• Provides info to assess risk, attacks,
mitigation
• Provides metrics
• Executive
• Operational
• Incident
9
What?
• Event Generators (E boxes)
• Any form of IDS sensor (firewalls, IPS, IDS, Snort,
Active Directory servers, Remedy, vulnerability
scanners, TACACS, application software
• Most are Polling Generators
• Generate specific event data in response to a
specific action
• Example: IDS or firewall
13
14
15
Security Operations Center Infrastructure v1.0 6/4/2008
<Function>
ITSO Staff
Daily Scan
Nexpose
Acunetix
Core Impact
Vulnerability
Results Database
Central Syslog
Servers
Dshield
Checknet
Snort
Sensors
Host Locator DB
Remedy
Correlation & Report
Generation
text
BASE
IP Ranges, Dept.
Liaisons, DHCP, VPN,
Modem Pool
Nessus
nmap Scanner
User
Scan Results
(PDF)
User Initiated
Scan
Green – E boxes
Blue – D boxes
Grey – A boxes
Yellow – K boxes
16
Putting the Pieces Together
• RDWEB – locate any device in our network
• DSHIELD – Collect Firewall logs
• SNORT – Sensors monitoring for patterns
• VULNSCAN – “pull” vulnerability scanner
• CHECKNET – “push” vulnerability scanner
• REMEDY – Trouble Ticket system used by
Help Desk
• CENTRAL SYSLOG – collects syslogs
17
IDS Infrastructure
Campus Systems
VT Dshield
Dshield
MySQL DB
MySQL DB
Snort BASE
CheckNet Failure
DB
CheckNet
WWW
Nessus, Comm
Scanners
User Vuln
Scanner
MySQL DB
Remedy Trouble
Ticket System
CIRT Help Desk
IPS
SNORT
Sensors
Central
Syslog
Servers
18
19
20
21
22
23
24
25
26
27
28
29
30
Futures
• There are commercial tools that do all of this
• They cost lots of $$$
• We don’t have lots of $$$
• Had to grow our own
• Improves our skill set, proactive and reactive
capabilities
• We can better evaluate commercial products
because of our experience
31
Reference
• Reference paper “Security Operation
Center Concepts & Implementation” by
Renaud Bidou
• We used this as our blueprint
32
Contact Information
• Randy Marchany
• VA Tech IT Security Office & Lab
• 1300 Torgersen Hall
• VA Tech
• Blacksburg, VA 24060
• 540-231-9523
• marchany@vt.edu
• http://security.vt.edu

More Related Content

Similar to Building a Security Operations Center

Managed security services
Managed security servicesManaged security services
Managed security servicesmanoharparakh
 
SIEM enabled risk management , SOC and GRC v1.0
SIEM enabled risk management , SOC and GRC v1.0SIEM enabled risk management , SOC and GRC v1.0
SIEM enabled risk management , SOC and GRC v1.0Rasmi Swain
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsTechcello
 
Developer Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the CloudDeveloper Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the CloudMicro Focus
 
The Sysdig Secure DevOps Platform
The Sysdig Secure DevOps PlatformThe Sysdig Secure DevOps Platform
The Sysdig Secure DevOps PlatformAshnikbiz
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New PerspectiveWen-Pai Lu
 
Cisco Analytics: Accelerate Network Optimization with Virtualization
Cisco Analytics: Accelerate Network Optimization with VirtualizationCisco Analytics: Accelerate Network Optimization with Virtualization
Cisco Analytics: Accelerate Network Optimization with VirtualizationCisco Canada
 
Security Monitoring Course - Ali Ahangari
Security Monitoring Course - Ali AhangariSecurity Monitoring Course - Ali Ahangari
Security Monitoring Course - Ali AhangariAli Ahangari
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)Shah Sheikh
 
MIT-MON Day4 Context.pptx
MIT-MON Day4 Context.pptxMIT-MON Day4 Context.pptx
MIT-MON Day4 Context.pptxCouronne1
 
Soc analyst course content v3
Soc analyst course content v3Soc analyst course content v3
Soc analyst course content v3ShivamSharma909
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course contentShivamSharma909
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 
SplunkLive! - Splunk for IT Operations
SplunkLive! - Splunk for IT OperationsSplunkLive! - Splunk for IT Operations
SplunkLive! - Splunk for IT OperationsSplunk
 
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFiBuilding the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFiDataWorks Summit
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityMousumi Manna
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityMousumi Manna
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityTapan Biswas
 

Similar to Building a Security Operations Center (20)

Managed security services
Managed security servicesManaged security services
Managed security services
 
SIEM enabled risk management , SOC and GRC v1.0
SIEM enabled risk management , SOC and GRC v1.0SIEM enabled risk management , SOC and GRC v1.0
SIEM enabled risk management , SOC and GRC v1.0
 
SIEM.pdf
SIEM.pdfSIEM.pdf
SIEM.pdf
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS Applications
 
Developer Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the CloudDeveloper Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the Cloud
 
The Sysdig Secure DevOps Platform
The Sysdig Secure DevOps PlatformThe Sysdig Secure DevOps Platform
The Sysdig Secure DevOps Platform
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
 
Cisco Analytics: Accelerate Network Optimization with Virtualization
Cisco Analytics: Accelerate Network Optimization with VirtualizationCisco Analytics: Accelerate Network Optimization with Virtualization
Cisco Analytics: Accelerate Network Optimization with Virtualization
 
Security Monitoring Course - Ali Ahangari
Security Monitoring Course - Ali AhangariSecurity Monitoring Course - Ali Ahangari
Security Monitoring Course - Ali Ahangari
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
Will your cloud be compliant
Will your cloud be compliantWill your cloud be compliant
Will your cloud be compliant
 
MIT-MON Day4 Context.pptx
MIT-MON Day4 Context.pptxMIT-MON Day4 Context.pptx
MIT-MON Day4 Context.pptx
 
Soc analyst course content v3
Soc analyst course content v3Soc analyst course content v3
Soc analyst course content v3
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course content
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
SplunkLive! - Splunk for IT Operations
SplunkLive! - Splunk for IT OperationsSplunkLive! - Splunk for IT Operations
SplunkLive! - Splunk for IT Operations
 
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFiBuilding the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 

Recently uploaded

Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 

Building a Security Operations Center

  • 1. Building a Security Operations Center Randy Marchany VA Tech IT Security Office and Lab marchany@vt.edu
  • 2. 2 CyberSecurity Operations Center • Security Operations Center (SOC) term is being taken over by physical surveillance companies • We’re building a Cyber Security Operations Center (CSOC) that doesn’t have any physical surveillance capability. • It could be a component of a SOC in the future
  • 3. 4 Why? • We’ve been collecting security related data for a number of years and needed a focal point to help us see the big picture • Data from • Security Reviews • Vulnerability scans (push/pull) • IPS/IDS data • System logs • We want to build a “security history” for a host
  • 4. 5 Why? • The CSOC is a logical place to collect, analyze and distribute data collected to support our Defense in Depth Strategy • Preventing Network Based Attacks • Preventing Host Based Attacks • Eliminating Security Vulnerabilities • Supporting Authorized Users • Providing tools for Minimizing Business Loss
  • 5. 6 Why? • We want to measure and report compliance with our IT policies, state/federal laws and regulations • FERPA, HIPAA, PCI, ITAR, GLB, SOX • VT Policies • 7000 Acceptable Use of Computer and Communication Systems 3/28/2002 • 7010 Policy for Securing Technology Resources and Services 1/22/2007 • 7025 Safeguarding Nonpublic Customer Information 5/12/2004 • 7030 Policy on Privacy Statements on Virginia Tech Web Sites 3/27/2002 • 7035 Privacy Policy for Employees' Electronic Communications 3/14/2005 • 7040 Personal Credentials for Enterprise Electronic Services 4/01/2008 • 7100 Administrative Data Management and Access Policy 4/01/2008 • 7105 Policy for Protecting University Information in Digital Form 7/1/2008 • 7200 University IT Security Program 6/12/2006 • 7205 IT Infrastructure, Architecture and Ongoing Operations 6/12/2006 • 7210 IT Project Management 6/12/2006 • 7215 IT Accessibility 6/12/2006 • 1060 Policy on Social Security Numbers 5/25/2007
  • 6. 7 Where? • OS Syslog/event logs, IDS logs, IPS logs, PID logs, Firewall logs, Pen Test Logs, PCI, netflow • CSOC needs to be able to analyze and display this data quickly • Data resides on separate, distributed servers • CSOC pulls data from these servers as needed • CSOC lives in the IT Security Office & Lab
  • 7. 8 What? • Provides real-time view of the VT network’s security status • Provides info to assess risk, attacks, mitigation • Provides metrics • Executive • Operational • Incident
  • 8. 9 What? • Event Generators (E boxes) • Any form of IDS sensor (firewalls, IPS, IDS, Snort, Active Directory servers, Remedy, vulnerability scanners, TACACS, application software • Most are Polling Generators • Generate specific event data in response to a specific action • Example: IDS or firewall
  • 9. 13
  • 10. 14
  • 11. 15 Security Operations Center Infrastructure v1.0 6/4/2008 <Function> ITSO Staff Daily Scan Nexpose Acunetix Core Impact Vulnerability Results Database Central Syslog Servers Dshield Checknet Snort Sensors Host Locator DB Remedy Correlation & Report Generation text BASE IP Ranges, Dept. Liaisons, DHCP, VPN, Modem Pool Nessus nmap Scanner User Scan Results (PDF) User Initiated Scan Green – E boxes Blue – D boxes Grey – A boxes Yellow – K boxes
  • 12. 16 Putting the Pieces Together • RDWEB – locate any device in our network • DSHIELD – Collect Firewall logs • SNORT – Sensors monitoring for patterns • VULNSCAN – “pull” vulnerability scanner • CHECKNET – “push” vulnerability scanner • REMEDY – Trouble Ticket system used by Help Desk • CENTRAL SYSLOG – collects syslogs
  • 13. 17 IDS Infrastructure Campus Systems VT Dshield Dshield MySQL DB MySQL DB Snort BASE CheckNet Failure DB CheckNet WWW Nessus, Comm Scanners User Vuln Scanner MySQL DB Remedy Trouble Ticket System CIRT Help Desk IPS SNORT Sensors Central Syslog Servers
  • 14. 18
  • 15. 19
  • 16. 20
  • 17. 21
  • 18. 22
  • 19. 23
  • 20. 24
  • 21. 25
  • 22. 26
  • 23. 27
  • 24. 28
  • 25. 29
  • 26. 30 Futures • There are commercial tools that do all of this • They cost lots of $$$ • We don’t have lots of $$$ • Had to grow our own • Improves our skill set, proactive and reactive capabilities • We can better evaluate commercial products because of our experience
  • 27. 31 Reference • Reference paper “Security Operation Center Concepts & Implementation” by Renaud Bidou • We used this as our blueprint
  • 28. 32 Contact Information • Randy Marchany • VA Tech IT Security Office & Lab • 1300 Torgersen Hall • VA Tech • Blacksburg, VA 24060 • 540-231-9523 • marchany@vt.edu • http://security.vt.edu