SESSION ID:SESSION ID:
#RSAC
Tamer El Refaey
What We’ve Learned Building a Cyber
Security Operation Center: du Case
Study
AIR-T11
Senior Director, Security Monitoring and Operations
du Telecom, UAE
84%
of breaches had available
forensic evidence*
1,400 Log sources
4,000 Events per second
72 SIEM correlation rules
Source: Verizon 2012 data breach investigation report
The
Approach
Prioritize
The Efforts
Business impact
assessment
Critical business
processes
Confidential
data
Credential
repositories
Compliance
requirements
High value
targets
Recognize
The Threats
Data leakage
Denial of service
Web defacement
Loss of revenue
Malicious insider
Malware infection
Understand
The Environment
Business processes Vendors and partners
Expected
activities
Security policiesIdentity and access
information
Privilege access
confinement
Enhance
Security Visibility
Advanced endpoint
visibility
Database activity
monitoringOpen source
intelligence
User behavior
analytics
Search
For Digital Crumbs
SIEM Advanced Security
tools
Hunting
User awareness
Measure
The Performance
Detection time
Response time
Successful breaches
Detection method
Weaknesses
Phase of detection
Visibility status
The
Outcome
#RSAC
Visibility Vs Quality
2013 2014 2015 2016
Number of detected incidents Vs
number of SIEM rules
Detected incidents SIEM rules
2013 2014 2015 2016
Trend of alert quality
% of incidents Vs alerts
#RSAC
Detection time
74%
82%
81%
86%
2013 2014 2015 2016
% of incidents detected within
24 hrs from initial attempt
19.6
12.4
10.9
18.0
2013 2014 2015 2016
Average number of days to
detect an incident
#RSAC
Phase of incident detection
Reconnaisance Attack delivery Host
exploitation
Binary
installtion
C&C Local
compromise
Internal recon Lateral
movement
Establish
persistance
Action
% of incident detection by HP kill chain phase
2013 2014 2015 2016
#RSAC
What’s after detection?
<1.5hrs
Time between incident response and containment
<4hrs <8hrs <24hrs >7 days1–7 days
<1.5hrs
Time between compromise and detection
<4hrs <8hrs <24hrs >7 days1–7 days
<1.5hrs
Time between detection and start of incident response
<4hrs <8hrs <24hrs >7 days1–7 days
What We
Learned
Insider
threat
Context
Identity
Access details
Job role
Vulnerabilities
Compliance
status
Threat score
True positive
score
Geolocation
Employment
status
OOO status
IP reputation
Hunting
User behavior
analytics
Known IOCs
Experience
Endpoint visibility
Suspicion
Automation
User notifications
Evidence collection
Response actions
Periodic reports
#RSAC
Automation Sample
Deterrence
Reduces noise
Insider threats
Show your
work
#RSAC
Dashboard_Video_v3.0
#RSAC
Apply what we discussed
Next week you should:
Decide the appropriate security KPIs for your organization and what their targets
should be
In the first three months following this presentation you should:
Identify critical assets, processes, and high value targets within your organization
Understand what the major threats you are concerned about are
Know your environment and what its good state is
Within six months you should:
Build different use cases that would look for IOCs in your environment
Select the security intelligence solutions that you would consider to implement
What We’ve Learned Building a Cyber  Security Operation Center: du Case  Study

What We’ve Learned Building a Cyber Security Operation Center: du Case Study