SlideShare a Scribd company logo
1 of 17
Copyright © 2016 Splunk Inc.Copyright © 2016 Splunk Inc.
Splunk Adoption @athenahealth
Jake McAleer, CISA, Senior Manager - IT Security
@johnjakem
Copyright © 2016 Splunk Inc.Copyright © 2016 Splunk Inc.
Some Background...
33
athenahealth
Founded in 1997, provides cloud based services such as network-
enabled EHR, practice management and population health services
Connecting more than 72,000 providers and health systems nationwide
4,000+ employees
We were voted Forbes “Most Innovative Growth Company” and a
Deloitte “Fast 500 Company” in 2014 and have earned numerous
employer awards
Three InfoSec Towers
Risk, SIRT (Security Incident Response Team), and ITSec
44
My Background and Role
Previous work experience includes sysadmin and network engineer
Manage the ITSec and Access Control teams at athenahealth
– Team of five helps run various security-related tools including server anti-virus,
web proxy, IDS, DLP, and e-mail sandboxing solutions
At company for just over a year now; I personally never used Splunk at my
other companies
athenahealth has been Splunk customer for 3 years
Favorite Splunk tagline: “Get drunk with Splunk”
Fun Fact: In college, I accidentally wrote an uncontrolled forking process
for a homework assignment that took down almost all of the Unix servers.
55
What Was The Need?
InfoSec had many sources of information:
• When something is flagged, how do we prioritize and take appropriate action?
• Strategic approach where we need to understand:
• What is alerting?
• Why is it alerting?
• Is it a high value or high risk target?
• All of the necessary information to take action
• Easily correlate information from multiple tools in a “single pane of glass”.
66
Enter Splunk
• Easily consume data from various sources (syslog, text files, etc.)
• Splunk Enterprise Security (ES) for the SIRT
• Crafted alerts and reporting to look for high value targets
• If we see a bad pattern within our network, we can quickly alert and take action
• We can tweak and tailor alerts and reports over time
• Official Splunk and 3rd party apps
• Our teams use Splunk every day
77
Splunk At athenahealth
Over ten “power users”
Anti-malware, anti-virus, system data, system
logs, VPN/firewall/router logs, various other
unstructured data
400GB/day license
Goal: Retain two years of searchable data
Windows logs are the most verbose
7
100s of Forwarders
8 Indexers
3 Search Heads + 1 Deployment Server
WinEventLog:Security
5x any other sources
88
Value to the Organization
• Immediate visibility
• Virtually any data, even mainframe and other legacy infrastructure
• Less “alert fatigue” via very granular control
• Ability to dig in and investigate, correlate (it’s not a proprietary black hole)
Alerts must be clear and actionable or they’re a waste!
https://www.pagerduty.com/blog/lets-talk-about-alert-fatigue/
• Better team efficiency - Reduce confusion and wasted time over where to look
for information
• Intuitive UI
• Distributed design allows for HA and a mix of Windows and Linux services
99
Top Security Takeaways
Think about where all your disparate pieces of security information live
How do you handle unstructured data?
Control over how to consume data and alert on it
Some of the reasons we like Splunk:
– Intuitive user experience
– Flexibility and ability to bring in unstructured data
– Granular security within search apps
– Fast searches – Sub-minute versus couple of hours (use SSDs!)
– 3rd party app support
– Vendor and VAR support and knowledge base
Beyond Security
1111
Be Visible & Valuable
Champion the technology - Be a helping hand to other groups
Keep an eye on the infrastructure and offer help and feedback to groups
Have strong documentation that’s easy to find and search
Don’t make it painful to get access, grant it automatically
Conduct regular meetings with business users
– General user overview
– Specialized meetings for administrators, developers, etc.
– Lunch & Learn Sessions for informal training (food always helps!)
Vendor vetting process
– How logs are consumable (both on-prem and cloud)?
1212
Example: Ease Of Use
Step 1: Start somewhere
Step 3: Find what you’re really looking for
Step 5: Setup an alert
Step 2: Tweak your search
Step 4: Finalize your search
172.16.2.3
Saved Alert Search Tips:
• Avoid NOT (Computationally expensive)
• Be specific (Exact text, hostnames, etc.)
• Think and plan for the unexpected
• Provide all of the necessary info to be actionable
1313
Get People Hooked
Linux server logs
Windows server and domain controller logs (including account lockouts)
Virtual Server Infrastructure (ESXi, OpenStack, etc.)
DHCP and DNS logs
SSO logs (PingFed, Okta, Azure, etc.)
In-house developed application logs, SFTP server logs
VPN, firewall, and router logs
Two-factor, web proxy, and MDM logs
Endpoint logs (anti-virus, anti-malware, Bit9, Carbon Black, etc.)
1414
Be Careful Of Your Own Success
Remind groups what Splunk is and is not to be used for
Be the gatekeeper. Keep it clean. Use permissions within the app.
Documentation, documentation, documentation
Use alerting to warn you of high amounts of logs and proactively get
ahead of it before you go over your daily license limit
Run the forwarders so you have the final say
Ask for other groups to help chip in towards more licenses
On prem vs. hosted Splunk...which one is better for you? Can you grow?
1515
Where To Next?
Designed to scale
– Just got asked “Where can we store six years’ worth of log data?”
Emphasis on a ‘devops’ mentality across the org
– OpenStack and AWS
Improve the risk data around assets
Continue to develop our threat feed data
1616
DMC – Distributed Management Console
Thank You

More Related Content

What's hot

Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
RootedCON
 
SBC 2012 - Dynamic Access Control in Windows Server 2012 (Nguyễn Ngọc Thuận)
SBC 2012 - Dynamic Access Control in Windows Server 2012 (Nguyễn Ngọc Thuận)SBC 2012 - Dynamic Access Control in Windows Server 2012 (Nguyễn Ngọc Thuận)
SBC 2012 - Dynamic Access Control in Windows Server 2012 (Nguyễn Ngọc Thuận)
Security Bootcamp
 
Lessons Learned from Building and Running MHN, the World's Largest Crowdsourc...
Lessons Learned from Building and Running MHN, the World's Largest Crowdsourc...Lessons Learned from Building and Running MHN, the World's Largest Crowdsourc...
Lessons Learned from Building and Running MHN, the World's Largest Crowdsourc...
Jason Trost
 
Hunting: Defense Against The Dark Arts
Hunting: Defense Against The Dark ArtsHunting: Defense Against The Dark Arts
Hunting: Defense Against The Dark Arts
Spyglass Security
 

What's hot (20)

Five SIEM Futures (2012)
Five SIEM Futures (2012)Five SIEM Futures (2012)
Five SIEM Futures (2012)
 
Modern SOC Trends 2020
Modern SOC Trends 2020Modern SOC Trends 2020
Modern SOC Trends 2020
 
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญCurrent trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
 
Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021
Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021
Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021
 
Protect the data - Cyber security - Breaches - Brand/Reputation
Protect the data - Cyber security - Breaches - Brand/ReputationProtect the data - Cyber security - Breaches - Brand/Reputation
Protect the data - Cyber security - Breaches - Brand/Reputation
 
Unified threat management cisco 1 july 17
Unified threat management cisco 1 july 17Unified threat management cisco 1 july 17
Unified threat management cisco 1 july 17
 
Unified threat management cisco 5 july 17
Unified threat management cisco 5 july 17Unified threat management cisco 5 july 17
Unified threat management cisco 5 july 17
 
Unified threat management cisco 21 jun 17
Unified threat management cisco 21 jun 17Unified threat management cisco 21 jun 17
Unified threat management cisco 21 jun 17
 
Cisco security 7 jun 17
Cisco security 7 jun 17Cisco security 7 jun 17
Cisco security 7 jun 17
 
Cisco security3 july17
Cisco security3 july17Cisco security3 july17
Cisco security3 july17
 
Cisco security 27 jun 17
Cisco security 27 jun 17Cisco security 27 jun 17
Cisco security 27 jun 17
 
Unified threat management cisco 25 july 17
Unified threat management cisco 25  july 17Unified threat management cisco 25  july 17
Unified threat management cisco 25 july 17
 
Unified threat management 4 july 17
Unified threat management  4 july 17Unified threat management  4 july 17
Unified threat management 4 july 17
 
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
 
SBC 2012 - Dynamic Access Control in Windows Server 2012 (Nguyễn Ngọc Thuận)
SBC 2012 - Dynamic Access Control in Windows Server 2012 (Nguyễn Ngọc Thuận)SBC 2012 - Dynamic Access Control in Windows Server 2012 (Nguyễn Ngọc Thuận)
SBC 2012 - Dynamic Access Control in Windows Server 2012 (Nguyễn Ngọc Thuận)
 
Lessons Learned from Building and Running MHN, the World's Largest Crowdsourc...
Lessons Learned from Building and Running MHN, the World's Largest Crowdsourc...Lessons Learned from Building and Running MHN, the World's Largest Crowdsourc...
Lessons Learned from Building and Running MHN, the World's Largest Crowdsourc...
 
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private LimitedThreat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
 
Threat Hunting Workshop
Threat Hunting WorkshopThreat Hunting Workshop
Threat Hunting Workshop
 
Hunting: Defense Against The Dark Arts
Hunting: Defense Against The Dark ArtsHunting: Defense Against The Dark Arts
Hunting: Defense Against The Dark Arts
 
The Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryThe Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup Story
 

Viewers also liked

14 Testimonios 2 Universidad Politécnica Huatusco
14 Testimonios 2 Universidad Politécnica Huatusco14 Testimonios 2 Universidad Politécnica Huatusco
14 Testimonios 2 Universidad Politécnica Huatusco
Pedro Morlet
 
Vishal Dube Resume Visual
Vishal Dube Resume VisualVishal Dube Resume Visual
Vishal Dube Resume Visual
Vishal Dube
 

Viewers also liked (13)

14 Testimonios 2 Universidad Politécnica Huatusco
14 Testimonios 2 Universidad Politécnica Huatusco14 Testimonios 2 Universidad Politécnica Huatusco
14 Testimonios 2 Universidad Politécnica Huatusco
 
Vishal Dube Resume Visual
Vishal Dube Resume VisualVishal Dube Resume Visual
Vishal Dube Resume Visual
 
Precision Wellness- Data-Driven Decisions | Quantified Self Boston
Precision Wellness- Data-Driven Decisions | Quantified Self BostonPrecision Wellness- Data-Driven Decisions | Quantified Self Boston
Precision Wellness- Data-Driven Decisions | Quantified Self Boston
 
Avisos igreja 101216
Avisos igreja 101216Avisos igreja 101216
Avisos igreja 101216
 
Genesis hernandez (1)
Genesis hernandez (1)Genesis hernandez (1)
Genesis hernandez (1)
 
Avisos igreja 070117
Avisos igreja 070117Avisos igreja 070117
Avisos igreja 070117
 
Recommendation letter
Recommendation letterRecommendation letter
Recommendation letter
 
Inteligencias multiples en la educación
Inteligencias multiples en la educaciónInteligencias multiples en la educación
Inteligencias multiples en la educación
 
Review
ReviewReview
Review
 
Fire safety course
Fire safety courseFire safety course
Fire safety course
 
Variant Configurition in SAP: Beginners Guide | www.sapdocs.info
Variant Configurition in SAP: Beginners Guide | www.sapdocs.infoVariant Configurition in SAP: Beginners Guide | www.sapdocs.info
Variant Configurition in SAP: Beginners Guide | www.sapdocs.info
 
Resume Hatch Format Eduardo Olivares
Resume Hatch Format Eduardo OlivaresResume Hatch Format Eduardo Olivares
Resume Hatch Format Eduardo Olivares
 
Different types of antenna by shakir
Different types of antenna by shakirDifferent types of antenna by shakir
Different types of antenna by shakir
 

Similar to SplunkLive! Customer Presentation – athenahealth

SplunkLive! Denver - Nov 2012 - Interac
SplunkLive! Denver - Nov 2012 - InteracSplunkLive! Denver - Nov 2012 - Interac
SplunkLive! Denver - Nov 2012 - Interac
Splunk
 
SplunkLive! Toronto - Ceryx
SplunkLive! Toronto - CeryxSplunkLive! Toronto - Ceryx
SplunkLive! Toronto - Ceryx
Splunk
 
Making pentesting sexy ossams - BSidesQuebec2013
Making pentesting sexy ossams - BSidesQuebec2013Making pentesting sexy ossams - BSidesQuebec2013
Making pentesting sexy ossams - BSidesQuebec2013
BSidesQuebec2013
 

Similar to SplunkLive! Customer Presentation – athenahealth (20)

SplunkLive! Customer Presentation – athenahealth
SplunkLive! Customer Presentation – athenahealthSplunkLive! Customer Presentation – athenahealth
SplunkLive! Customer Presentation – athenahealth
 
SplunkLive! Customer Presentation – Covance Inc"
SplunkLive! Customer Presentation – Covance Inc"SplunkLive! Customer Presentation – Covance Inc"
SplunkLive! Customer Presentation – Covance Inc"
 
SplunkLive! Austin Customer Presentation - Baylor
SplunkLive! Austin Customer Presentation - BaylorSplunkLive! Austin Customer Presentation - Baylor
SplunkLive! Austin Customer Presentation - Baylor
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
 
Getting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionGetting Started with Splunk Breakout Session
Getting Started with Splunk Breakout Session
 
SplunkLive! Stockholm 2019 - Customer presentation: ISS
SplunkLive! Stockholm 2019 - Customer presentation: ISS SplunkLive! Stockholm 2019 - Customer presentation: ISS
SplunkLive! Stockholm 2019 - Customer presentation: ISS
 
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...
 
Splunk in the Cisco Unified Computing System (UCS)
Splunk in the Cisco Unified Computing System (UCS) Splunk in the Cisco Unified Computing System (UCS)
Splunk in the Cisco Unified Computing System (UCS)
 
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
 
SplunkLive! Denver - Nov 2012 - Interac
SplunkLive! Denver - Nov 2012 - InteracSplunkLive! Denver - Nov 2012 - Interac
SplunkLive! Denver - Nov 2012 - Interac
 
Taking Splunk to the Next Level - Manager
Taking Splunk to the Next Level - ManagerTaking Splunk to the Next Level - Manager
Taking Splunk to the Next Level - Manager
 
Getting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionGetting Started with Splunk Breakout Session
Getting Started with Splunk Breakout Session
 
Perforce on Tour 2015 - How are You Protecting Your Source Code?
Perforce on Tour 2015 - How are You Protecting Your Source Code?Perforce on Tour 2015 - How are You Protecting Your Source Code?
Perforce on Tour 2015 - How are You Protecting Your Source Code?
 
Splunk forwarders tech_brief
Splunk forwarders tech_briefSplunk forwarders tech_brief
Splunk forwarders tech_brief
 
System Security on Cloud
System Security on CloudSystem Security on Cloud
System Security on Cloud
 
SplunkLive! Toronto - Ceryx
SplunkLive! Toronto - CeryxSplunkLive! Toronto - Ceryx
SplunkLive! Toronto - Ceryx
 
Getting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionGetting Started with Splunk Breakout Session
Getting Started with Splunk Breakout Session
 
Splunk sales presentation
Splunk sales presentationSplunk sales presentation
Splunk sales presentation
 
Splunk FISMA for Continuous Monitoring
Splunk FISMA for Continuous Monitoring Splunk FISMA for Continuous Monitoring
Splunk FISMA for Continuous Monitoring
 
Making pentesting sexy ossams - BSidesQuebec2013
Making pentesting sexy ossams - BSidesQuebec2013Making pentesting sexy ossams - BSidesQuebec2013
Making pentesting sexy ossams - BSidesQuebec2013
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

SplunkLive! Customer Presentation – athenahealth

  • 1. Copyright © 2016 Splunk Inc.Copyright © 2016 Splunk Inc. Splunk Adoption @athenahealth Jake McAleer, CISA, Senior Manager - IT Security @johnjakem
  • 2. Copyright © 2016 Splunk Inc.Copyright © 2016 Splunk Inc. Some Background...
  • 3. 33 athenahealth Founded in 1997, provides cloud based services such as network- enabled EHR, practice management and population health services Connecting more than 72,000 providers and health systems nationwide 4,000+ employees We were voted Forbes “Most Innovative Growth Company” and a Deloitte “Fast 500 Company” in 2014 and have earned numerous employer awards Three InfoSec Towers Risk, SIRT (Security Incident Response Team), and ITSec
  • 4. 44 My Background and Role Previous work experience includes sysadmin and network engineer Manage the ITSec and Access Control teams at athenahealth – Team of five helps run various security-related tools including server anti-virus, web proxy, IDS, DLP, and e-mail sandboxing solutions At company for just over a year now; I personally never used Splunk at my other companies athenahealth has been Splunk customer for 3 years Favorite Splunk tagline: “Get drunk with Splunk” Fun Fact: In college, I accidentally wrote an uncontrolled forking process for a homework assignment that took down almost all of the Unix servers.
  • 5. 55 What Was The Need? InfoSec had many sources of information: • When something is flagged, how do we prioritize and take appropriate action? • Strategic approach where we need to understand: • What is alerting? • Why is it alerting? • Is it a high value or high risk target? • All of the necessary information to take action • Easily correlate information from multiple tools in a “single pane of glass”.
  • 6. 66 Enter Splunk • Easily consume data from various sources (syslog, text files, etc.) • Splunk Enterprise Security (ES) for the SIRT • Crafted alerts and reporting to look for high value targets • If we see a bad pattern within our network, we can quickly alert and take action • We can tweak and tailor alerts and reports over time • Official Splunk and 3rd party apps • Our teams use Splunk every day
  • 7. 77 Splunk At athenahealth Over ten “power users” Anti-malware, anti-virus, system data, system logs, VPN/firewall/router logs, various other unstructured data 400GB/day license Goal: Retain two years of searchable data Windows logs are the most verbose 7 100s of Forwarders 8 Indexers 3 Search Heads + 1 Deployment Server WinEventLog:Security 5x any other sources
  • 8. 88 Value to the Organization • Immediate visibility • Virtually any data, even mainframe and other legacy infrastructure • Less “alert fatigue” via very granular control • Ability to dig in and investigate, correlate (it’s not a proprietary black hole) Alerts must be clear and actionable or they’re a waste! https://www.pagerduty.com/blog/lets-talk-about-alert-fatigue/ • Better team efficiency - Reduce confusion and wasted time over where to look for information • Intuitive UI • Distributed design allows for HA and a mix of Windows and Linux services
  • 9. 99 Top Security Takeaways Think about where all your disparate pieces of security information live How do you handle unstructured data? Control over how to consume data and alert on it Some of the reasons we like Splunk: – Intuitive user experience – Flexibility and ability to bring in unstructured data – Granular security within search apps – Fast searches – Sub-minute versus couple of hours (use SSDs!) – 3rd party app support – Vendor and VAR support and knowledge base
  • 11. 1111 Be Visible & Valuable Champion the technology - Be a helping hand to other groups Keep an eye on the infrastructure and offer help and feedback to groups Have strong documentation that’s easy to find and search Don’t make it painful to get access, grant it automatically Conduct regular meetings with business users – General user overview – Specialized meetings for administrators, developers, etc. – Lunch & Learn Sessions for informal training (food always helps!) Vendor vetting process – How logs are consumable (both on-prem and cloud)?
  • 12. 1212 Example: Ease Of Use Step 1: Start somewhere Step 3: Find what you’re really looking for Step 5: Setup an alert Step 2: Tweak your search Step 4: Finalize your search 172.16.2.3 Saved Alert Search Tips: • Avoid NOT (Computationally expensive) • Be specific (Exact text, hostnames, etc.) • Think and plan for the unexpected • Provide all of the necessary info to be actionable
  • 13. 1313 Get People Hooked Linux server logs Windows server and domain controller logs (including account lockouts) Virtual Server Infrastructure (ESXi, OpenStack, etc.) DHCP and DNS logs SSO logs (PingFed, Okta, Azure, etc.) In-house developed application logs, SFTP server logs VPN, firewall, and router logs Two-factor, web proxy, and MDM logs Endpoint logs (anti-virus, anti-malware, Bit9, Carbon Black, etc.)
  • 14. 1414 Be Careful Of Your Own Success Remind groups what Splunk is and is not to be used for Be the gatekeeper. Keep it clean. Use permissions within the app. Documentation, documentation, documentation Use alerting to warn you of high amounts of logs and proactively get ahead of it before you go over your daily license limit Run the forwarders so you have the final say Ask for other groups to help chip in towards more licenses On prem vs. hosted Splunk...which one is better for you? Can you grow?
  • 15. 1515 Where To Next? Designed to scale – Just got asked “Where can we store six years’ worth of log data?” Emphasis on a ‘devops’ mentality across the org – OpenStack and AWS Improve the risk data around assets Continue to develop our threat feed data
  • 16. 1616 DMC – Distributed Management Console