SIEM - Activating Defense through Response by Ankur Vats

Security Researcher at Adobe, Chapter Leader at OWASP & null
Feb. 3, 2016
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
1 of 33

More Related Content

Slideshows for you

McAfee SIEM solution McAfee SIEM solution
McAfee SIEM solution hashnees
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmPriyanka Aash
Security Information Event Management - nullhydSecurity Information Event Management - nullhyd
Security Information Event Management - nullhydn|u - The Open Security Community
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)Ben Rothke
SOC and SIEM.pptxSOC and SIEM.pptx
SOC and SIEM.pptxSandeshUprety4
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi

Similar to SIEM - Activating Defense through Response by Ankur Vats

Introduction to SIEM.pptxIntroduction to SIEM.pptx
Introduction to SIEM.pptxneoalt
MIT-MON Day4 Context.pptxMIT-MON Day4 Context.pptx
MIT-MON Day4 Context.pptxCouronne1
Event log monitoring for the pci dssEvent log monitoring for the pci dss
Event log monitoring for the pci dssSarahLamusu
SIEM brochure A4 8pp FINAL WEBSIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBMerlin Govender
EventLog Analyzer - Product overviewEventLog Analyzer - Product overview
EventLog Analyzer - Product overviewManageEngine EventLog Analyzer
Leveraging Log Management to provide business valueLeveraging Log Management to provide business value
Leveraging Log Management to provide business valueEnterprise Technology Management (ETM)

More from OWASP Delhi

Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesGetting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesOWASP Delhi
Securing dns records from subdomain takeoverSecuring dns records from subdomain takeover
Securing dns records from subdomain takeoverOWASP Delhi
Effective Cyber Security Report WritingEffective Cyber Security Report Writing
Effective Cyber Security Report WritingOWASP Delhi
Data sniffing over Air GapData sniffing over Air Gap
Data sniffing over Air GapOWASP Delhi
UDP HunterUDP Hunter
UDP HunterOWASP Delhi
Demystifying Container EscapesDemystifying Container Escapes
Demystifying Container EscapesOWASP Delhi

Recently uploaded

AI and ML Series - Generative Extraction and Classification of Documents in S...AI and ML Series - Generative Extraction and Classification of Documents in S...
AI and ML Series - Generative Extraction and Classification of Documents in S...DianaGray10
Diogo Monteiro- KAMK Certificate - Demola Global Project 2023.pdfDiogo Monteiro- KAMK Certificate - Demola Global Project 2023.pdf
Diogo Monteiro- KAMK Certificate - Demola Global Project 2023.pdfDiogoMonteiro786960
OpenFOAM benchmark for EPYC server: cavity mediumOpenFOAM benchmark for EPYC server: cavity medium
OpenFOAM benchmark for EPYC server: cavity mediumtakuyayamamoto1800
Future of Virtual realityFuture of Virtual reality
Future of Virtual realitymdpavel4
AWS Toolkit.pptxAWS Toolkit.pptx
AWS Toolkit.pptxBrandon Minnick, MBA
OpenFOAM benchmark for EPYC server -Influence of coarsestLevelCorr in GAMG so...OpenFOAM benchmark for EPYC server -Influence of coarsestLevelCorr in GAMG so...
OpenFOAM benchmark for EPYC server -Influence of coarsestLevelCorr in GAMG so...takuyayamamoto1800

SIEM - Activating Defense through Response by Ankur Vats

  1. ACTIVATING DEFENCE IN RESPONSE Ankur Vats EMPLOYEE-PERSONAL
  2. BUZZ WORDS Incident – Something Happened Breach – Someone came inside and accessed data Response – What are we doing once something happened? Visibility – Do we have the right set of tools to view what is happening in out premises? Alerts – Do we get notified when something happens? Threats – Are there any incidents that can cause disturbance to business continuity? EMPLOYEE-PERSONAL
  3. TYPICAL CORPORATE ENVIRONMENT 3EMPLOYEE-PERSONAL
  4. LOG MANAGEMENT Log management (LM) comprises an approach to dealing with large volumes of computer-generated log messages (also known as audit records, audit trails, event-logs, etc.). LM covers Log collection, Centralized aggregation, Long-term retention, Log analysis (in real-time and in bulk after storage) as well as Log search and Reporting. 4EMPLOYEE-PERSONAL
  5. LOG MANAGEMENT 5EMPLOYEE-PERSONAL
  6. LOG MANAGEMENT CHALLENGES Analyzing Logs for Relevant Security Intelligence Centralizing Log Collection Meeting IT Compliance Requirements Conducting Effective Root Cause Analysis Making Log Data More Meaningful Tracking Suspicious User Behavior 6EMPLOYEE-PERSONAL
  7. INTRODUCTION TO SIEM The term Security Information Event Management (SIEM), coined by Mark Nicolett and Amrit Williams of Gartner in 2005. Security Information and Event Management (SIEM) is a term for software and products services combining security information management (SIM) and security event manager (SEM). The segment of security management that deals with real- time monitoring, correlation of events, notifications and console views is commonly known as Security Event Management (SEM). The second area provides long-term storage, analysis and7EMPLOYEE-PERSONAL
  8. KEY OBJECTIVES  Identify threats and possible breaches  Collect audit logs for security and compliance  Conduct investigations and provide evidence 8EMPLOYEE-PERSONAL
  9. WHY IS SIEM NECESSARY? Rise in data breaches due to internal and external threats Attackers are smart and traditional security tools just don’t suffice Mitigate sophisticated cyber-attacks Manage increasing volumes of logs from multiple sources Meet stringent compliance requirements 9EMPLOYEE-PERSONAL
  10. TYPICAL FEATURES OF SIEM 10EMPLOYEE-PERSONAL
  11. SIEM PROCESS FLOW Log/Data Collection Extract Intelligent Informatio n (Normaliz ation) Correlatio n Incidence Response Presentation Dashboards & Reports 11EMPLOYEE-PERSONAL
  12. TYPICAL WORKING OF AN SIEM SOLUTION 12EMPLOYEE-PERSONAL
  13. System Inputs Event Data Operating Systems Applications Devices Databases Contextual Data Vulnerability Scans User Information Asset Information Threat Intelligence Data Collection Normalization Correlation Logic/Rules Aggregation SIEM System Outputs Analysis Reports Real Time Monitoring SIEM ARCHITECTURE EMPLOYEE-PERSONAL
  14. CONTEXT 14 “User Broberts Successfully Authenticated to 10.100.52.105 from client 10.10.8.22 “ “10.100.52.105 New Client Connection 10.10.8.22 on account: Broberts: Success” Long story short: what needs to be done is to break down every known log message out there, and put it into a normalized format, like this: “User [USERNAME] [STATUS] Authenticated to [DESTIP] from client [SOURCEIP]” “10.100.52.105 New Client Connection 10.10.8.22 on account: Broberts: Success” EMPLOYEE-PERSONAL
  15. LOGS INGEST IN SIEM Logs from your security controls:  IDS  Endpoint Security (Antivirus, antimalware)  Data Loss Prevention  VPN Concentrators  Web filters  Honeypots  Firewalls Logs from your network infrastructure:  Routers  Switches  Domain Controllers  Wireless Access Points  Application Servers  Databases 15 Non-log Infrastructure Information  Configuration  Locations  Owners  Network Maps  Vulnerability Reports  Software Inventory Non-log Business Information  Business Process Mappings  Points of Contact  Partner Information EMPLOYEE-PERSONAL
  16. 8 CRITICAL FEATURES OF SIEM 16EMPLOYEE-PERSONAL
  17. #1. LOG COLLECTION Universal Log Collection  To collect logs from heterogeneous sources (Windows systems, Unix/Linux systems, applications, databases, routers, switches, and other devices). Log collection method - agent- based or agentless  Both Recommended Centralized log collection Events Per Second (EPS) – Rate at which your IT infrastructure sends events  If not calculated properly the SIEM solution will start dropping events before they are stored in the database leading to incorrect reports, search results, alerts, and correlation. 17EMPLOYEE-PERSONAL
  18. #2. USER ACTIVITY MONITORING SIEM solutions should have Out- of-the-box user activity monitoring, Privileged user monitoring and audit (PUMA) reporting feature. Ensure that the SIEM solution gives the ‘Complete audit trail’  Know which user performed the action, what was the result of the action, on what server it happened, and user workstation/device from where the action was triggered. 18EMPLOYEE-PERSONAL
  19. #3. REAL TIME EVENT CORRELATION A B C D Real-time event correlation is all about proactively dealing with threats. Correlation boosts network security by processing millions of events simultaneously to detect anomalous events on the network. Correlation can be based on log search, rules and alerts  Predefined rules and alerts are not sufficient. Custom rule and alert builder is a must for every SIEM solution.  Ensure that the process of correlating events is easy. 19EMPLOYEE-PERSONAL
  20. #4. LOG RETENTION SIEM solutions should automatically archive all log data from systems, devices & applications to a ‘centralized’ repository. Ensure that the SIEM solution has ‘Tamper Proof’ feature which ‘encrypts’ and ‘time stamps’ them for compliance and forensics purposes. Ease of retrieving and analyzing archived log data. 20EMPLOYEE-PERSONAL
  21. #5. IT COMPLIANCE REPORTS IT compliance is the core of every SIEM solution. Ensure that the SIEM solution has out-of-the-box regulatory compliance reports such as PCI DSS, FISMA, GLBA, SOX, HIPAA, etc. SIEM solutions should also have the capability to customize and build new compliance reports to comply with future regulatory acts. 21EMPLOYEE-PERSONAL
  22. #6. FILE INTEGRITY MONITORING File integrity monitoring helps security professionals in monitoring business critical files and folders. Ensure that the SIEM solution tracks and reports on all changes happening such as when files and folders are created, accessed, viewed, deleted, modified, renamed and much more. The SIEM solution should also send real-time alerts when unauthorized users access critical files and folders. 22EMPLOYEE-PERSONAL
  23. #7. LOG FORENSICS SIEM solutions should allow users to track down a intruder or the event activity using log search capability. The log search capability should be very intuitive and user-friendly, allowing IT administrators to search through the raw log data quickly. 23EMPLOYEE-PERSONAL
  24. #8. DASHBOARDS Dashboards drive SIEM solutions and help IT administrators take timely action and make the right decisions during network anomalies. Security data must be presented in a very intuitive and user-friendly manner. The dashboard must be fully customizable so that IT administrators can configure the security information they wish to see. 24EMPLOYEE-PERSONAL
  25. SIEM PRODUCTS IN MARKET Licensed versions: •IBM X-Force •HP ArcSight •LogRhythm •Splunk •Alien Vault •And others 25 Open Source: • Elastic Search + Kibana • MozDef • And many more EMPLOYEE-PERSONAL
  26. PCI DSS The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit cards from the major card schemes including Visa, MasterCard, American Express, Discover, and JCB. Private label cards – those which aren't part of a major card scheme – are not included in the scope of the PCI DSS. The PCI Standard is mandated by the card brands and administered by the Payment Card Industry Security Standards Council. The standard was created to increase controls around cardholder data to reduce credit card fraud. Validation of compliance is performed annually, either by an external Qualified Security Assessor (QSA) that creates a Report on Compliance (ROC) for organizations handling large volumes of transactions, or by Self-Assessment Questionnaire (SAQ) for companies handling smaller volumes. 26EMPLOYEE-PERSONAL
  27. USE CASES ON PCI DSS 27 Scenario Threat Use Case Rule Log Source(s ) Requirement(s) Mapping Unapproved network connections to/from your critical assets Unauthorize d access Detect all the unapproved/unauthorized network connections to/from your critical IT assets and coorelate with the rules documented in your change management process. Group all the connections by dst port and include your critical assets in the filter Routers, switches and firewalls PCI Requirement # 1.1.1, 1.2.1 Identify most vulnerable systems Exploitation of vulnerabiliti es Identify all the vulnerable systems running in the organization Integrate VM with an exiting SIEM solution VM Solution PCI Requirement # 6.1 Detect all the default accounts Unauthorize d access Identify all the systems using default accounts Create a list of default accounts and check for authentication events related to those accounts Any system PCI Requirement # 6.3.1, 6.4.4 EMPLOYEE-PERSONAL
  28. WHY SIEM IMPLEMENTATION FAILS? Lack of Planning  No defined scope Faulty Deployment Strategies  Incoherent log management data collection  High volume of irrelevant data can overload the system Operational  Lack of management oversight  Assume plug and play “Security is a process, not a product” 28EMPLOYEE-PERSONAL
  29. BUSINESS BENEFITS Real-time Monitoring  For operational efficiency and IT security purposes Cost Saving Compliance Reporting Rapid ROI(Return on Investment) 29EMPLOYEE-PERSONAL
  30. TOP CHALLENGES OF IMPLEMENTING SIEM SIEM is to Complex. SIEM takes too long to deploy. SIEM is too expensive. SIEM’s are too noisy. SIEM’s aren’t typically “cloud friendly”. 30EMPLOYEE-PERSONAL
  31. SUCCESSFUL IMPLEMENTATION CRITERIA Malware Control. Boundary Defenses. Access Control. Acceptable Use Monitoring(AUP). Application Defenses. Compliance and Audit Data Requirements. Monitoring and Reporting Requirements. Deployment and Infrastructure Activation. Network and Host Defenses. Network and System Resource Integrity. 31EMPLOYEE-PERSONAL
  32. Q & A EMPLOYEE-PERSONAL 32
  33. EMPLOYEE-PERSONAL 33