SlideShare a Scribd company logo
0
Getting Security Operations
Right with TTP0
Ismael Valenzuela
SANS Instructor, McAfee
@aboutsecurity
Rob Gresham
Splunk> Phantom
@SOCologize
Where were you in 1986?
0
What is the story?
https://securingtomorrow.mcafee.com/mcafee-
labs/emotet-trojan-acts-as-loader-spreads-
automatically/
Google Market Summary
We keep seeing the same situation...
SOC Strategic Mission: manage & report risk
Success: interrupt adversary
activity to mitigate loss,
managing and
communicating risk
Requires a strategic and
tactical approach to security,
where Cyber Threat
Intelligence (CTI) is central to
this mission
10,000 hours or 6 months?
So we sat down...
• And started to think about what works...
0
Monitor
Discover
RespondMeasure
Automate
Transform
Learn
0Security Operations Story
30 9060
Understand the business, set initial goals
& outline a realistic, high-impact plan
Create awareness, maintain focus and
augment visibility
Report & celebrate success, identify
points of change, increase scope in spiral
motion
0Security Operations Story: NSM
30 9060
Understand the business, set initial goals
& outline a realistic, high-impact plan
Create awareness, maintain focus and
augment visibility
Report & celebrate success, identify
points of change, increase scope in spiral
motion
DISCOVER… the business
MONITOR… define zones, critical assets
RESPOND… define IRP for them
AUTOMATE… core actions (Create
tickets, data transfer processes)
MEASURE… time to notify, remediate
TRANSFORM… create awareness
DISCOVER… anomalies or gaps
MONITOR… critical, high alerts
RESPOND… refine IRP
AUTOMATE… contextual data
MEASURE… time to investigate, recovery
TRANSFORM… analytical quality
DISCOVER… hunt retroactively
MONITOR… new attack points (scope)
RESPOND… apply lessons learned
AUTOMATE… response scenarios
MEASURE… alignment to business goals
0Discover
What’s important, Crown Jewels, save one’s SOEL
• Understand the Business Units and talk to your IT cohorts
• Understand what’s critical to enterprise operations
• Review the Business Continuity Plan (if they have one)
• Start early, don’t wait...
“In preparing for battle I have always found that plans are useless, but
planning is indispensable.” - Dwight D. Eisenhower
0Monitor
SOC Zoning
Using the concept of SOC Zones to defend your organization allows
for both IT and business context in order simplify building effective
Use-Cases
Set the stage to build efficient response processes around...
• Zones
• Categories
• Severity
• Sensitivity
• Resource Tiers
0Monitor
Other Examples:
• OT/ICS
• Manufacturing
• R&D
• PCI Zones
• business-critical
application
• Cloud critical hosting
• DMZ
Zoning should be implemented
in a way that reflects business-
critical capability
0Monitor
Determine
essential security
feeds and
intelligence
sources
0Monitor
Effective
application of
content
(threat content
engineering)
0Response
Block Processes and C2 Channels
• External Contextualization
• Internal Scoping (beyond reporting)
• Root Cause Analysis
• Triage Forensics
• Contain not remediate
• Eradicate / Recovery
• Lessons Learned
0
AUTOMATE: Introducing TTP0 DRONE
0Automate
Configure & automate ticket creation with DRONE, by @DFIRENCE -
https://github.com/TTP0/drone
0Check out our WIKI
• https://github.com/TTP0/drone/wiki/OVERVIEW
0TRANSFORM
Create awareness by telling a story -
https://github.com/TTP0/ttp0_community_templates
TLP: RED TLP: RED
44
JAN FEB MAR APR MAY JUN
JUL AUG SEP OCT NOV DEC
FEYE - APT1
Blog/Report
Victim
Weapons
<ActorNameHere> - <YYYY>
SPEARPHISHING
00Tier Threat Response Team
Threat Mitigation and Recovery Team (12 - Team)
Incident Leader
Hunt
Scan & Assess
Vulnerability
Analysis
Risk Assessment
Find & Analyze
System Integrity
Forensics
Monitor
Network (SO,
Bro, Snort)
Host (HIPS,
Raptor, ePO)
Harden
Windows
(Applocker, GPO,
EMET)
Linux/Unix
(IPTables, rkhunter)
Infrastructure
(ACLs, MAC Blocks)
Intelligence - LE
Liaison
Incident Response
Lead
Incident Responder
SOC IR
SOC Analyst
Red Teamer
CTI Analyst
Host Forensics
Net Forensics
Host Discovery
0
0www.ttp0.io
0What is available today
- TTP0 DRONE by @DFIRENCE
- Automates incident creation with zones, tiers, etc
- Requires python 2.7, installed TheHive
- GitHub: https://github.com/TTP0/drone
- Opbrief PPT templates by TLP
- Actor Tracker PPT templates by TLP
- 0Tier Threat Response model vs 3Tier Traditional SOC
- A curated list of awesome GitHub resources we use
0What we are working on
- Security Operations Story templates
- Tying Use Case to Responses Playbooks
- Investigation and Response Metrics
- Security Operations Templates for Managers
- Tools matrix
- SWOT * TWOS Analysis
- Staff management & SOC scheduling configurations
- How To Guidelines:
- Zoning, tiers, etc.
- Use Case prioritization
- Standardize Automation Investigation Playbooks
0Thanks! Follow us @TTP_0
TTP0 Founders:
Ask us how to contribute: info@ttp0.io
@dfirence @carric
Carlos Diaz Carric Dooley Rob Gresham Ismael Valenzuela
@SOCologize @aboutsecurity
Thank you!

More Related Content

Similar to Getting SecOps Foundations Right with Techniques, Tactics, and Procedures Zero (TTP0)

12 Best Career in Cyber Security 2023 EMERSON EDUARDO RODRIGUES
12 Best Career in Cyber Security 2023 EMERSON EDUARDO RODRIGUES12 Best Career in Cyber Security 2023 EMERSON EDUARDO RODRIGUES
12 Best Career in Cyber Security 2023 EMERSON EDUARDO RODRIGUES
EMERSON EDUARDO RODRIGUES
 
Embracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your DecisionEmbracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your Decision
Cylance
 
SOC Meets Cloud: What Breaks, What Changes, What to Do?
SOC Meets Cloud: What Breaks, What Changes, What to Do?SOC Meets Cloud: What Breaks, What Changes, What to Do?
SOC Meets Cloud: What Breaks, What Changes, What to Do?
Anton Chuvakin
 
Building A Security Operations Center
Building A Security Operations CenterBuilding A Security Operations Center
Building A Security Operations Center
Siemplify
 
Hunting Hard & Failing Fast (ScotSoft 2019)
Hunting Hard & Failing Fast (ScotSoft 2019)Hunting Hard & Failing Fast (ScotSoft 2019)
Hunting Hard & Failing Fast (ScotSoft 2019)
Harry McLaren
 
10-essential-capabilities-of-a-modern-soc1.pdf
10-essential-capabilities-of-a-modern-soc1.pdf10-essential-capabilities-of-a-modern-soc1.pdf
10-essential-capabilities-of-a-modern-soc1.pdf
reflandahartanto00
 
Use our Threat Modeling Playbook to Improve your Product Security
Use our Threat Modeling Playbookto Improve your Product Security Use our Threat Modeling Playbookto Improve your Product Security
Use our Threat Modeling Playbook to Improve your Product Security
Sebastien Deleersnyder
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015
Claus Cramon Houmann
 
Threat Hunting, Detection, and Incident Response in the Cloud
Threat Hunting, Detection, and Incident Response in the CloudThreat Hunting, Detection, and Incident Response in the Cloud
Threat Hunting, Detection, and Incident Response in the Cloud
Ben Johnson
 
Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015
Claus Cramon Houmann
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16
James Rutt
 
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk
 
Alienvault how to build a security operations center (on a budget) (2017, a...
Alienvault   how to build a security operations center (on a budget) (2017, a...Alienvault   how to build a security operations center (on a budget) (2017, a...
Alienvault how to build a security operations center (on a budget) (2017, a...
Al Syihab
 
How I Learned to Stop Worrying and Love Building Data Products
How I Learned to Stop Worrying and Love Building Data ProductsHow I Learned to Stop Worrying and Love Building Data Products
How I Learned to Stop Worrying and Love Building Data Products
Alejandro Correa Bahnsen, PhD
 
SplunkSummit 2015 - ES Hands On Workshop
SplunkSummit 2015 - ES Hands On Workshop SplunkSummit 2015 - ES Hands On Workshop
SplunkSummit 2015 - ES Hands On Workshop
Splunk
 
Security in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptionsSecurity in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptions
Tim Mackey
 
Microservices 101: From DevOps to Docker and beyond
Microservices 101: From DevOps to Docker and beyondMicroservices 101: From DevOps to Docker and beyond
Microservices 101: From DevOps to Docker and beyond
Donnie Berkholz
 
Comptia security sy0 601 domain 4 operation and incident response
Comptia security sy0 601 domain 4 operation and incident responseComptia security sy0 601 domain 4 operation and incident response
Comptia security sy0 601 domain 4 operation and incident response
ShivamSharma909
 
Splunk for Enterprise Security Featuring UBA
Splunk for Enterprise Security Featuring UBASplunk for Enterprise Security Featuring UBA
Splunk for Enterprise Security Featuring UBA
Splunk
 
SplunkLive! Paris 2016 - Plenary session
SplunkLive! Paris 2016 - Plenary sessionSplunkLive! Paris 2016 - Plenary session
SplunkLive! Paris 2016 - Plenary session
Splunk
 

Similar to Getting SecOps Foundations Right with Techniques, Tactics, and Procedures Zero (TTP0) (20)

12 Best Career in Cyber Security 2023 EMERSON EDUARDO RODRIGUES
12 Best Career in Cyber Security 2023 EMERSON EDUARDO RODRIGUES12 Best Career in Cyber Security 2023 EMERSON EDUARDO RODRIGUES
12 Best Career in Cyber Security 2023 EMERSON EDUARDO RODRIGUES
 
Embracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your DecisionEmbracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your Decision
 
SOC Meets Cloud: What Breaks, What Changes, What to Do?
SOC Meets Cloud: What Breaks, What Changes, What to Do?SOC Meets Cloud: What Breaks, What Changes, What to Do?
SOC Meets Cloud: What Breaks, What Changes, What to Do?
 
Building A Security Operations Center
Building A Security Operations CenterBuilding A Security Operations Center
Building A Security Operations Center
 
Hunting Hard & Failing Fast (ScotSoft 2019)
Hunting Hard & Failing Fast (ScotSoft 2019)Hunting Hard & Failing Fast (ScotSoft 2019)
Hunting Hard & Failing Fast (ScotSoft 2019)
 
10-essential-capabilities-of-a-modern-soc1.pdf
10-essential-capabilities-of-a-modern-soc1.pdf10-essential-capabilities-of-a-modern-soc1.pdf
10-essential-capabilities-of-a-modern-soc1.pdf
 
Use our Threat Modeling Playbook to Improve your Product Security
Use our Threat Modeling Playbookto Improve your Product Security Use our Threat Modeling Playbookto Improve your Product Security
Use our Threat Modeling Playbook to Improve your Product Security
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015
 
Threat Hunting, Detection, and Incident Response in the Cloud
Threat Hunting, Detection, and Incident Response in the CloudThreat Hunting, Detection, and Incident Response in the Cloud
Threat Hunting, Detection, and Incident Response in the Cloud
 
Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16
 
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout Session
 
Alienvault how to build a security operations center (on a budget) (2017, a...
Alienvault   how to build a security operations center (on a budget) (2017, a...Alienvault   how to build a security operations center (on a budget) (2017, a...
Alienvault how to build a security operations center (on a budget) (2017, a...
 
How I Learned to Stop Worrying and Love Building Data Products
How I Learned to Stop Worrying and Love Building Data ProductsHow I Learned to Stop Worrying and Love Building Data Products
How I Learned to Stop Worrying and Love Building Data Products
 
SplunkSummit 2015 - ES Hands On Workshop
SplunkSummit 2015 - ES Hands On Workshop SplunkSummit 2015 - ES Hands On Workshop
SplunkSummit 2015 - ES Hands On Workshop
 
Security in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptionsSecurity in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptions
 
Microservices 101: From DevOps to Docker and beyond
Microservices 101: From DevOps to Docker and beyondMicroservices 101: From DevOps to Docker and beyond
Microservices 101: From DevOps to Docker and beyond
 
Comptia security sy0 601 domain 4 operation and incident response
Comptia security sy0 601 domain 4 operation and incident responseComptia security sy0 601 domain 4 operation and incident response
Comptia security sy0 601 domain 4 operation and incident response
 
Splunk for Enterprise Security Featuring UBA
Splunk for Enterprise Security Featuring UBASplunk for Enterprise Security Featuring UBA
Splunk for Enterprise Security Featuring UBA
 
SplunkLive! Paris 2016 - Plenary session
SplunkLive! Paris 2016 - Plenary sessionSplunkLive! Paris 2016 - Plenary session
SplunkLive! Paris 2016 - Plenary session
 

Recently uploaded

快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
bseovas
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
saathvikreddy2003
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
AanSulistiyo
 

Recently uploaded (20)

快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
 

Getting SecOps Foundations Right with Techniques, Tactics, and Procedures Zero (TTP0)

  • 1. 0 Getting Security Operations Right with TTP0 Ismael Valenzuela SANS Instructor, McAfee @aboutsecurity Rob Gresham Splunk> Phantom @SOCologize
  • 2. Where were you in 1986?
  • 3.
  • 4. 0
  • 5. What is the story? https://securingtomorrow.mcafee.com/mcafee- labs/emotet-trojan-acts-as-loader-spreads- automatically/ Google Market Summary
  • 6. We keep seeing the same situation...
  • 7. SOC Strategic Mission: manage & report risk Success: interrupt adversary activity to mitigate loss, managing and communicating risk Requires a strategic and tactical approach to security, where Cyber Threat Intelligence (CTI) is central to this mission
  • 8. 10,000 hours or 6 months?
  • 9. So we sat down... • And started to think about what works...
  • 11. 0Security Operations Story 30 9060 Understand the business, set initial goals & outline a realistic, high-impact plan Create awareness, maintain focus and augment visibility Report & celebrate success, identify points of change, increase scope in spiral motion
  • 12. 0Security Operations Story: NSM 30 9060 Understand the business, set initial goals & outline a realistic, high-impact plan Create awareness, maintain focus and augment visibility Report & celebrate success, identify points of change, increase scope in spiral motion DISCOVER… the business MONITOR… define zones, critical assets RESPOND… define IRP for them AUTOMATE… core actions (Create tickets, data transfer processes) MEASURE… time to notify, remediate TRANSFORM… create awareness DISCOVER… anomalies or gaps MONITOR… critical, high alerts RESPOND… refine IRP AUTOMATE… contextual data MEASURE… time to investigate, recovery TRANSFORM… analytical quality DISCOVER… hunt retroactively MONITOR… new attack points (scope) RESPOND… apply lessons learned AUTOMATE… response scenarios MEASURE… alignment to business goals
  • 13. 0Discover What’s important, Crown Jewels, save one’s SOEL • Understand the Business Units and talk to your IT cohorts • Understand what’s critical to enterprise operations • Review the Business Continuity Plan (if they have one) • Start early, don’t wait... “In preparing for battle I have always found that plans are useless, but planning is indispensable.” - Dwight D. Eisenhower
  • 14. 0Monitor SOC Zoning Using the concept of SOC Zones to defend your organization allows for both IT and business context in order simplify building effective Use-Cases Set the stage to build efficient response processes around... • Zones • Categories • Severity • Sensitivity • Resource Tiers
  • 15. 0Monitor Other Examples: • OT/ICS • Manufacturing • R&D • PCI Zones • business-critical application • Cloud critical hosting • DMZ Zoning should be implemented in a way that reflects business- critical capability
  • 18. 0Response Block Processes and C2 Channels • External Contextualization • Internal Scoping (beyond reporting) • Root Cause Analysis • Triage Forensics • Contain not remediate • Eradicate / Recovery • Lessons Learned
  • 20. 0Automate Configure & automate ticket creation with DRONE, by @DFIRENCE - https://github.com/TTP0/drone
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42. 0Check out our WIKI • https://github.com/TTP0/drone/wiki/OVERVIEW
  • 43. 0TRANSFORM Create awareness by telling a story - https://github.com/TTP0/ttp0_community_templates
  • 44. TLP: RED TLP: RED 44 JAN FEB MAR APR MAY JUN JUL AUG SEP OCT NOV DEC FEYE - APT1 Blog/Report Victim Weapons <ActorNameHere> - <YYYY> SPEARPHISHING
  • 45. 00Tier Threat Response Team Threat Mitigation and Recovery Team (12 - Team) Incident Leader Hunt Scan & Assess Vulnerability Analysis Risk Assessment Find & Analyze System Integrity Forensics Monitor Network (SO, Bro, Snort) Host (HIPS, Raptor, ePO) Harden Windows (Applocker, GPO, EMET) Linux/Unix (IPTables, rkhunter) Infrastructure (ACLs, MAC Blocks) Intelligence - LE Liaison Incident Response Lead Incident Responder SOC IR SOC Analyst Red Teamer CTI Analyst Host Forensics Net Forensics Host Discovery
  • 46. 0
  • 48. 0What is available today - TTP0 DRONE by @DFIRENCE - Automates incident creation with zones, tiers, etc - Requires python 2.7, installed TheHive - GitHub: https://github.com/TTP0/drone - Opbrief PPT templates by TLP - Actor Tracker PPT templates by TLP - 0Tier Threat Response model vs 3Tier Traditional SOC - A curated list of awesome GitHub resources we use
  • 49. 0What we are working on - Security Operations Story templates - Tying Use Case to Responses Playbooks - Investigation and Response Metrics - Security Operations Templates for Managers - Tools matrix - SWOT * TWOS Analysis - Staff management & SOC scheduling configurations - How To Guidelines: - Zoning, tiers, etc. - Use Case prioritization - Standardize Automation Investigation Playbooks
  • 50. 0Thanks! Follow us @TTP_0 TTP0 Founders: Ask us how to contribute: info@ttp0.io @dfirence @carric Carlos Diaz Carric Dooley Rob Gresham Ismael Valenzuela @SOCologize @aboutsecurity