SlideShare a Scribd company logo
04 February 2021 @ 16:00 UTC+1
Elastic Morocco User Group
How Elastic Security Meets SOC Needs
Hamza OUADIÂ
Cyber Security Analyst
Store, Search, &
Analyze
Visualize &
Manage
Ingest
Elastic Stack
Kibana
Elasticsearch
Beats Logstash
Elastic Stack
Reliably and securely take data from any source, in any format, then search,
analyze, and visualize it in real time.
Elastic est une société de recherche
Nous mettons l'accent sur la valeur pour les
utilisateurs en produisant des résultats rapides
qui fonctionnent à grande échelle et qui sont
pertinents. C'est notre ADN. Nous pensons que
la recherche est une expérience. C'est ce qui
nous définit et nous rend uniques
Vitesse, Scalabilité,
Pertinence
3 Solutions
Elastic Enterprise Search
(Recherche en entreprise)
Elastic Security
(Sécurité à 360°)
Elastic Observability
(Observabilité à 360°)
Endpoint SIEM
How Elastic Security
Meets SOC Needs
Agenda
Introduction
Data Integration
Data Processing
Data Analytics
1
2
3
4
Demo : Elastic Security
5
Questions & Answers
6
SOC : Security Operations Center
Introduction
Image Source : https://bit.ly/3ac9lyK
SOC : Security Operations Center
Introduction
SIEM
Logs
Logs
Logs
Analyst
Event Lifecycle
Introduction
Data
Integration
Data Processing Data Analytics
Data Integration
Host & Network Telemetry
Data Integrations
Network
Data
Packetbeat :
• Flows
• DNS
• TLS
• HTTP
Filebeat :
• IDS/IPS/NMS modules: Zeek NMS, Suricata IDS
• NetFlow, CEF
• Firewall modules: Cisco ASA, FTD, Palo Alto Networks,
Ubiquiti IPTables
• Kubernetes modules: CoreDNS, Envoy proxy
• Google VPC flow logs, PubSub Input
elastic.co/integrations
Host
Data
Winlogbeat :
• Windows event logs
• Sysmon
• PowerShell
Filebeat :
• System logs (auth logs) (Linux)
• Multiline Event logs
Auditbeat :
• System module (Linux, macOS, Win.): packages, processes,
logins, sockets, users and groups
• Auditd module (Linux Kernel Audit info)
• File integrity monitoring (Linux, macOS, Win.)
Elastic Agent :
• One agent for all: logs, metrics and security
• 1-click integrations with Fleet
• Detection & Response
Custom
Data
Community Beats :
• Community driven Beats agents
Data Processing
“If I had nine hours to chop down a tree, I’d spend the
first six sharpening my ax.” – Abraham Lincoln
Event Normalization
Elastic Common Schema (ECS)
Data Processing
Benefits
• Correlate data from different sources
• Ability to re-use analysis content
• Ability to re-use Elastic-provided content
Status
• Version v1.7 published : github.com/elastic/ecs
• Supported in Beats and APM
• Community feedback welcome
Event Parsing & Enrichment
Data Processing
• Input: Syslog, File, TCP/UDP, Beats
• Filter: GROK, DNS, TLD, Geo IP, Date, JSON
• Output: Elasticsearch, Email
Data Analytics
Detection Rules
Data Analysis
• Event-Centric Correlation (KQL Query)
• Sequence-Based Correlation (EQL Query)
• Threshold-Based Alerting
• Indicator-Based Alerting
• Machine Learning Jobs
Elastic Security
Detection, Prevention and Response for Unified Protection
Endpoint + SIEM
Elastic Security
+
DEMO
Elastic Security
Elastic is a Search Company
Search. Observe. Protect.
www.elastic.co
Thank you | Questions ?

More Related Content

What's hot

Intelligent Cloud Conference 2018 - Next Generation of Data Integration with ...
Intelligent Cloud Conference 2018 - Next Generation of Data Integration with ...Intelligent Cloud Conference 2018 - Next Generation of Data Integration with ...
Intelligent Cloud Conference 2018 - Next Generation of Data Integration with ...
Tom Kerkhove
 
Refactoring the Monolith: A Systematic Approach to Application Modernization
Refactoring the Monolith: A Systematic Approach to Application ModernizationRefactoring the Monolith: A Systematic Approach to Application Modernization
Refactoring the Monolith: A Systematic Approach to Application Modernization
Dynatrace
 
Intelligent Cloud Conference 2018 - Building secure cloud applications with A...
Intelligent Cloud Conference 2018 - Building secure cloud applications with A...Intelligent Cloud Conference 2018 - Building secure cloud applications with A...
Intelligent Cloud Conference 2018 - Building secure cloud applications with A...
Tom Kerkhove
 
Customer Presentation - QuikTrip
Customer Presentation - QuikTripCustomer Presentation - QuikTrip
Customer Presentation - QuikTrip
Splunk
 
Build and Manage a Highly Secure Cloud Environment on AWS and Azure
Build and Manage a Highly Secure Cloud Environment on AWS and AzureBuild and Manage a Highly Secure Cloud Environment on AWS and Azure
Build and Manage a Highly Secure Cloud Environment on AWS and Azure
CloudHesive
 
Flink Forward Berlin 2018: Yonatan Most & Avihai Berkovitz - "Anomaly Detecti...
Flink Forward Berlin 2018: Yonatan Most & Avihai Berkovitz - "Anomaly Detecti...Flink Forward Berlin 2018: Yonatan Most & Avihai Berkovitz - "Anomaly Detecti...
Flink Forward Berlin 2018: Yonatan Most & Avihai Berkovitz - "Anomaly Detecti...
Flink Forward
 
Combining Logs, Metrics, and Traces for Unified Observability
Combining Logs, Metrics, and Traces for Unified ObservabilityCombining Logs, Metrics, and Traces for Unified Observability
Combining Logs, Metrics, and Traces for Unified Observability
Elasticsearch
 
Building Cloud Apps using Azure SQL Database
Building Cloud Apps using Azure SQL DatabaseBuilding Cloud Apps using Azure SQL Database
Building Cloud Apps using Azure SQL Database
WinWire Technologies Inc
 
Meetup introduction to elastic stack - search at scale - skilledfield slide...
Meetup   introduction to elastic stack - search at scale - skilledfield slide...Meetup   introduction to elastic stack - search at scale - skilledfield slide...
Meetup introduction to elastic stack - search at scale - skilledfield slide...
Mouaz Alnouri
 
Monitoring docker, k8s and your applications with the elastic stack
Monitoring docker, k8s and your applications with the elastic stackMonitoring docker, k8s and your applications with the elastic stack
Monitoring docker, k8s and your applications with the elastic stack
SmartWave
 
SAJACC WG Report Summary and Conclusions Jan 2013
SAJACC WG Report Summary and Conclusions  Jan 2013SAJACC WG Report Summary and Conclusions  Jan 2013
SAJACC WG Report Summary and Conclusions Jan 2013
Alan Sill
 
Logs, metrics and real time data analytics
Logs, metrics and real time data analyticsLogs, metrics and real time data analytics
Logs, metrics and real time data analytics
Ewere Diagboya
 
_Search? Made Simple: Elastic + App Search
_Search? Made Simple: Elastic + App Search_Search? Made Simple: Elastic + App Search
_Search? Made Simple: Elastic + App Search
Elasticsearch
 
Monitoring your workload hosted on Microsoft Azure
Monitoring your workload hosted on Microsoft AzureMonitoring your workload hosted on Microsoft Azure
Monitoring your workload hosted on Microsoft Azure
Vikram Pendse
 
Amis Query (02-09-2008): Reports From Oracle Open World - Database
Amis Query (02-09-2008): Reports From Oracle Open World - DatabaseAmis Query (02-09-2008): Reports From Oracle Open World - Database
Amis Query (02-09-2008): Reports From Oracle Open World - Database
Marco Gralike
 
Azure Container Apps
Azure Container AppsAzure Container Apps
Azure Container Apps
ICS
 
Blockchain in the Food Supply Chain
Blockchain in the Food Supply ChainBlockchain in the Food Supply Chain
Blockchain in the Food Supply Chain
Peter Kirchner
 
Elastic Cloud Enterprise @ Cisco
Elastic Cloud Enterprise @ CiscoElastic Cloud Enterprise @ Cisco
Elastic Cloud Enterprise @ Cisco
Elasticsearch
 
Migrating a legacy logging system: Etsy’s journey to Elastic Cloud
Migrating a legacy logging system: Etsy’s journey to Elastic CloudMigrating a legacy logging system: Etsy’s journey to Elastic Cloud
Migrating a legacy logging system: Etsy’s journey to Elastic Cloud
Elasticsearch
 
New York Elastic{ON} Tour Opening Keynote
New York Elastic{ON} Tour Opening KeynoteNew York Elastic{ON} Tour Opening Keynote
New York Elastic{ON} Tour Opening Keynote
Elasticsearch
 

What's hot (20)

Intelligent Cloud Conference 2018 - Next Generation of Data Integration with ...
Intelligent Cloud Conference 2018 - Next Generation of Data Integration with ...Intelligent Cloud Conference 2018 - Next Generation of Data Integration with ...
Intelligent Cloud Conference 2018 - Next Generation of Data Integration with ...
 
Refactoring the Monolith: A Systematic Approach to Application Modernization
Refactoring the Monolith: A Systematic Approach to Application ModernizationRefactoring the Monolith: A Systematic Approach to Application Modernization
Refactoring the Monolith: A Systematic Approach to Application Modernization
 
Intelligent Cloud Conference 2018 - Building secure cloud applications with A...
Intelligent Cloud Conference 2018 - Building secure cloud applications with A...Intelligent Cloud Conference 2018 - Building secure cloud applications with A...
Intelligent Cloud Conference 2018 - Building secure cloud applications with A...
 
Customer Presentation - QuikTrip
Customer Presentation - QuikTripCustomer Presentation - QuikTrip
Customer Presentation - QuikTrip
 
Build and Manage a Highly Secure Cloud Environment on AWS and Azure
Build and Manage a Highly Secure Cloud Environment on AWS and AzureBuild and Manage a Highly Secure Cloud Environment on AWS and Azure
Build and Manage a Highly Secure Cloud Environment on AWS and Azure
 
Flink Forward Berlin 2018: Yonatan Most & Avihai Berkovitz - "Anomaly Detecti...
Flink Forward Berlin 2018: Yonatan Most & Avihai Berkovitz - "Anomaly Detecti...Flink Forward Berlin 2018: Yonatan Most & Avihai Berkovitz - "Anomaly Detecti...
Flink Forward Berlin 2018: Yonatan Most & Avihai Berkovitz - "Anomaly Detecti...
 
Combining Logs, Metrics, and Traces for Unified Observability
Combining Logs, Metrics, and Traces for Unified ObservabilityCombining Logs, Metrics, and Traces for Unified Observability
Combining Logs, Metrics, and Traces for Unified Observability
 
Building Cloud Apps using Azure SQL Database
Building Cloud Apps using Azure SQL DatabaseBuilding Cloud Apps using Azure SQL Database
Building Cloud Apps using Azure SQL Database
 
Meetup introduction to elastic stack - search at scale - skilledfield slide...
Meetup   introduction to elastic stack - search at scale - skilledfield slide...Meetup   introduction to elastic stack - search at scale - skilledfield slide...
Meetup introduction to elastic stack - search at scale - skilledfield slide...
 
Monitoring docker, k8s and your applications with the elastic stack
Monitoring docker, k8s and your applications with the elastic stackMonitoring docker, k8s and your applications with the elastic stack
Monitoring docker, k8s and your applications with the elastic stack
 
SAJACC WG Report Summary and Conclusions Jan 2013
SAJACC WG Report Summary and Conclusions  Jan 2013SAJACC WG Report Summary and Conclusions  Jan 2013
SAJACC WG Report Summary and Conclusions Jan 2013
 
Logs, metrics and real time data analytics
Logs, metrics and real time data analyticsLogs, metrics and real time data analytics
Logs, metrics and real time data analytics
 
_Search? Made Simple: Elastic + App Search
_Search? Made Simple: Elastic + App Search_Search? Made Simple: Elastic + App Search
_Search? Made Simple: Elastic + App Search
 
Monitoring your workload hosted on Microsoft Azure
Monitoring your workload hosted on Microsoft AzureMonitoring your workload hosted on Microsoft Azure
Monitoring your workload hosted on Microsoft Azure
 
Amis Query (02-09-2008): Reports From Oracle Open World - Database
Amis Query (02-09-2008): Reports From Oracle Open World - DatabaseAmis Query (02-09-2008): Reports From Oracle Open World - Database
Amis Query (02-09-2008): Reports From Oracle Open World - Database
 
Azure Container Apps
Azure Container AppsAzure Container Apps
Azure Container Apps
 
Blockchain in the Food Supply Chain
Blockchain in the Food Supply ChainBlockchain in the Food Supply Chain
Blockchain in the Food Supply Chain
 
Elastic Cloud Enterprise @ Cisco
Elastic Cloud Enterprise @ CiscoElastic Cloud Enterprise @ Cisco
Elastic Cloud Enterprise @ Cisco
 
Migrating a legacy logging system: Etsy’s journey to Elastic Cloud
Migrating a legacy logging system: Etsy’s journey to Elastic CloudMigrating a legacy logging system: Etsy’s journey to Elastic Cloud
Migrating a legacy logging system: Etsy’s journey to Elastic Cloud
 
New York Elastic{ON} Tour Opening Keynote
New York Elastic{ON} Tour Opening KeynoteNew York Elastic{ON} Tour Opening Keynote
New York Elastic{ON} Tour Opening Keynote
 

Similar to How Elastic Security Meets SOC Needs

Oscar Cabanillas - Elastic - OSL19
Oscar Cabanillas - Elastic - OSL19Oscar Cabanillas - Elastic - OSL19
Oscar Cabanillas - Elastic - OSL19
marketingsyone
 
AWS October Webinar Series - Introducing Amazon Elasticsearch Service
AWS October Webinar Series - Introducing Amazon Elasticsearch ServiceAWS October Webinar Series - Introducing Amazon Elasticsearch Service
AWS October Webinar Series - Introducing Amazon Elasticsearch Service
Amazon Web Services
 
Obtén visibilidad completa y encuentra problemas de seguridad ocultos
Obtén visibilidad completa y encuentra problemas de seguridad ocultosObtén visibilidad completa y encuentra problemas de seguridad ocultos
Obtén visibilidad completa y encuentra problemas de seguridad ocultos
Elasticsearch
 
Examining OpenData with a Search Index using Elasticsearch
Examining OpenData with a Search Index using ElasticsearchExamining OpenData with a Search Index using Elasticsearch
Examining OpenData with a Search Index using Elasticsearch
FaithWestdorp
 
Openstack security presentation 2013
Openstack security presentation 2013Openstack security presentation 2013
Openstack security presentation 2013
brian_chong
 
All Your Security Events Are Belong to ... You!
All Your Security Events Are Belong to ... You!All Your Security Events Are Belong to ... You!
All Your Security Events Are Belong to ... You!
Xavier Mertens
 
All your logs are belong to you!
All your logs are belong to you!All your logs are belong to you!
All your logs are belong to you!
Security BSides London
 
Logging, Metrics, and APM: The Operations Trifecta
Logging, Metrics, and APM: The Operations TrifectaLogging, Metrics, and APM: The Operations Trifecta
Logging, Metrics, and APM: The Operations Trifecta
Elasticsearch
 
Elastic Security Brochure
Elastic Security BrochureElastic Security Brochure
Elastic Security Brochure
Joseph DeFever
 
Elastic Security : Protéger son entreprise avec la Suite Elastic
Elastic Security : Protéger son entreprise avec la Suite ElasticElastic Security : Protéger son entreprise avec la Suite Elastic
Elastic Security : Protéger son entreprise avec la Suite Elastic
Elasticsearch
 
Alabama CyberNow 2018: Cloud Hardening and Digital Forensics Readiness
Alabama CyberNow 2018: Cloud Hardening and Digital Forensics ReadinessAlabama CyberNow 2018: Cloud Hardening and Digital Forensics Readiness
Alabama CyberNow 2018: Cloud Hardening and Digital Forensics Readiness
Toni de la Fuente
 
Introducing Open Distro for Elasticsearch - ADB201 - New York AWS Summit
Introducing Open Distro for Elasticsearch - ADB201 - New York AWS SummitIntroducing Open Distro for Elasticsearch - ADB201 - New York AWS Summit
Introducing Open Distro for Elasticsearch - ADB201 - New York AWS Summit
Amazon Web Services
 
Présentation ELK/SIEM et démo Wazuh
Présentation ELK/SIEM et démo WazuhPrésentation ELK/SIEM et démo Wazuh
Présentation ELK/SIEM et démo Wazuh
Aurélie Henriot
 
Why Elastic? @ 50th Vinitaly 2016
Why Elastic? @ 50th Vinitaly 2016Why Elastic? @ 50th Vinitaly 2016
Why Elastic? @ 50th Vinitaly 2016
Christoph Wurm
 
Monitor all the cloud things - security monitoring for everyone
Monitor all the cloud things - security monitoring for everyoneMonitor all the cloud things - security monitoring for everyone
Monitor all the cloud things - security monitoring for everyone
Duncan Godfrey
 
ThroughTheLookingGlass_EffectiveObservability.pptx
ThroughTheLookingGlass_EffectiveObservability.pptxThroughTheLookingGlass_EffectiveObservability.pptx
ThroughTheLookingGlass_EffectiveObservability.pptx
Grace Jansen
 
ELK Solutions Enablement Session - 17th March'2020
ELK Solutions Enablement Session - 17th March'2020ELK Solutions Enablement Session - 17th March'2020
ELK Solutions Enablement Session - 17th March'2020
Ashnikbiz
 
4aa5 3404
4aa5 34044aa5 3404
4aa5 3404
Bloombase
 
Automate threat detections and avoid false positives
  Automate threat detections and avoid false positives  Automate threat detections and avoid false positives
Automate threat detections and avoid false positives
Elasticsearch
 
ELK stack introduction
ELK stack introduction ELK stack introduction
ELK stack introduction
abenyeung1
 

Similar to How Elastic Security Meets SOC Needs (20)

Oscar Cabanillas - Elastic - OSL19
Oscar Cabanillas - Elastic - OSL19Oscar Cabanillas - Elastic - OSL19
Oscar Cabanillas - Elastic - OSL19
 
AWS October Webinar Series - Introducing Amazon Elasticsearch Service
AWS October Webinar Series - Introducing Amazon Elasticsearch ServiceAWS October Webinar Series - Introducing Amazon Elasticsearch Service
AWS October Webinar Series - Introducing Amazon Elasticsearch Service
 
Obtén visibilidad completa y encuentra problemas de seguridad ocultos
Obtén visibilidad completa y encuentra problemas de seguridad ocultosObtén visibilidad completa y encuentra problemas de seguridad ocultos
Obtén visibilidad completa y encuentra problemas de seguridad ocultos
 
Examining OpenData with a Search Index using Elasticsearch
Examining OpenData with a Search Index using ElasticsearchExamining OpenData with a Search Index using Elasticsearch
Examining OpenData with a Search Index using Elasticsearch
 
Openstack security presentation 2013
Openstack security presentation 2013Openstack security presentation 2013
Openstack security presentation 2013
 
All Your Security Events Are Belong to ... You!
All Your Security Events Are Belong to ... You!All Your Security Events Are Belong to ... You!
All Your Security Events Are Belong to ... You!
 
All your logs are belong to you!
All your logs are belong to you!All your logs are belong to you!
All your logs are belong to you!
 
Logging, Metrics, and APM: The Operations Trifecta
Logging, Metrics, and APM: The Operations TrifectaLogging, Metrics, and APM: The Operations Trifecta
Logging, Metrics, and APM: The Operations Trifecta
 
Elastic Security Brochure
Elastic Security BrochureElastic Security Brochure
Elastic Security Brochure
 
Elastic Security : Protéger son entreprise avec la Suite Elastic
Elastic Security : Protéger son entreprise avec la Suite ElasticElastic Security : Protéger son entreprise avec la Suite Elastic
Elastic Security : Protéger son entreprise avec la Suite Elastic
 
Alabama CyberNow 2018: Cloud Hardening and Digital Forensics Readiness
Alabama CyberNow 2018: Cloud Hardening and Digital Forensics ReadinessAlabama CyberNow 2018: Cloud Hardening and Digital Forensics Readiness
Alabama CyberNow 2018: Cloud Hardening and Digital Forensics Readiness
 
Introducing Open Distro for Elasticsearch - ADB201 - New York AWS Summit
Introducing Open Distro for Elasticsearch - ADB201 - New York AWS SummitIntroducing Open Distro for Elasticsearch - ADB201 - New York AWS Summit
Introducing Open Distro for Elasticsearch - ADB201 - New York AWS Summit
 
Présentation ELK/SIEM et démo Wazuh
Présentation ELK/SIEM et démo WazuhPrésentation ELK/SIEM et démo Wazuh
Présentation ELK/SIEM et démo Wazuh
 
Why Elastic? @ 50th Vinitaly 2016
Why Elastic? @ 50th Vinitaly 2016Why Elastic? @ 50th Vinitaly 2016
Why Elastic? @ 50th Vinitaly 2016
 
Monitor all the cloud things - security monitoring for everyone
Monitor all the cloud things - security monitoring for everyoneMonitor all the cloud things - security monitoring for everyone
Monitor all the cloud things - security monitoring for everyone
 
ThroughTheLookingGlass_EffectiveObservability.pptx
ThroughTheLookingGlass_EffectiveObservability.pptxThroughTheLookingGlass_EffectiveObservability.pptx
ThroughTheLookingGlass_EffectiveObservability.pptx
 
ELK Solutions Enablement Session - 17th March'2020
ELK Solutions Enablement Session - 17th March'2020ELK Solutions Enablement Session - 17th March'2020
ELK Solutions Enablement Session - 17th March'2020
 
4aa5 3404
4aa5 34044aa5 3404
4aa5 3404
 
Automate threat detections and avoid false positives
  Automate threat detections and avoid false positives  Automate threat detections and avoid false positives
Automate threat detections and avoid false positives
 
ELK stack introduction
ELK stack introduction ELK stack introduction
ELK stack introduction
 

More from Anna Ossowski

Load testing Elasticsearch with Gatling
Load testing Elasticsearch with GatlingLoad testing Elasticsearch with Gatling
Load testing Elasticsearch with Gatling
Anna Ossowski
 
Elastic Morocco Meetup Nov 2020
Elastic Morocco Meetup Nov 2020Elastic Morocco Meetup Nov 2020
Elastic Morocco Meetup Nov 2020
Anna Ossowski
 
Elastic stockholm-meetup
Elastic stockholm-meetupElastic stockholm-meetup
Elastic stockholm-meetup
Anna Ossowski
 
Elastic Morocco user group meetup June
Elastic Morocco user group meetup JuneElastic Morocco user group meetup June
Elastic Morocco user group meetup June
Anna Ossowski
 
Elastic Morocco user group meetup July
Elastic Morocco user group meetup JulyElastic Morocco user group meetup July
Elastic Morocco user group meetup July
Anna Ossowski
 
Visualise Covid-19 Data Using the Elastic Stack
Visualise Covid-19 Data Using the Elastic StackVisualise Covid-19 Data Using the Elastic Stack
Visualise Covid-19 Data Using the Elastic Stack
Anna Ossowski
 
Tworzenie wyszukiwarek w elastic search
Tworzenie wyszukiwarek w elastic searchTworzenie wyszukiwarek w elastic search
Tworzenie wyszukiwarek w elastic search
Anna Ossowski
 
Elastic stack upgrade
Elastic stack upgradeElastic stack upgrade
Elastic stack upgrade
Anna Ossowski
 
Elastic South Africa Meetup September 2020
Elastic South Africa Meetup September 2020Elastic South Africa Meetup September 2020
Elastic South Africa Meetup September 2020
Anna Ossowski
 
Elastic South Africa Meetup July 2020
Elastic South Africa Meetup July 2020Elastic South Africa Meetup July 2020
Elastic South Africa Meetup July 2020
Anna Ossowski
 
Elastic South Africa Meetup June 2020
Elastic South Africa Meetup June 2020Elastic South Africa Meetup June 2020
Elastic South Africa Meetup June 2020
Anna Ossowski
 
Elastic South Africa Meetup April 2020
Elastic South Africa Meetup April 2020Elastic South Africa Meetup April 2020
Elastic South Africa Meetup April 2020
Anna Ossowski
 
[Virtual Meetup] Using Elasticsearch as a Time-Series Database in the Endpoin...
[Virtual Meetup] Using Elasticsearch as a Time-Series Database in the Endpoin...[Virtual Meetup] Using Elasticsearch as a Time-Series Database in the Endpoin...
[Virtual Meetup] Using Elasticsearch as a Time-Series Database in the Endpoin...
Anna Ossowski
 
Tracking and visualizing COVID-19 with Elastic stack
Tracking and visualizing COVID-19 with Elastic stackTracking and visualizing COVID-19 with Elastic stack
Tracking and visualizing COVID-19 with Elastic stack
Anna Ossowski
 

More from Anna Ossowski (14)

Load testing Elasticsearch with Gatling
Load testing Elasticsearch with GatlingLoad testing Elasticsearch with Gatling
Load testing Elasticsearch with Gatling
 
Elastic Morocco Meetup Nov 2020
Elastic Morocco Meetup Nov 2020Elastic Morocco Meetup Nov 2020
Elastic Morocco Meetup Nov 2020
 
Elastic stockholm-meetup
Elastic stockholm-meetupElastic stockholm-meetup
Elastic stockholm-meetup
 
Elastic Morocco user group meetup June
Elastic Morocco user group meetup JuneElastic Morocco user group meetup June
Elastic Morocco user group meetup June
 
Elastic Morocco user group meetup July
Elastic Morocco user group meetup JulyElastic Morocco user group meetup July
Elastic Morocco user group meetup July
 
Visualise Covid-19 Data Using the Elastic Stack
Visualise Covid-19 Data Using the Elastic StackVisualise Covid-19 Data Using the Elastic Stack
Visualise Covid-19 Data Using the Elastic Stack
 
Tworzenie wyszukiwarek w elastic search
Tworzenie wyszukiwarek w elastic searchTworzenie wyszukiwarek w elastic search
Tworzenie wyszukiwarek w elastic search
 
Elastic stack upgrade
Elastic stack upgradeElastic stack upgrade
Elastic stack upgrade
 
Elastic South Africa Meetup September 2020
Elastic South Africa Meetup September 2020Elastic South Africa Meetup September 2020
Elastic South Africa Meetup September 2020
 
Elastic South Africa Meetup July 2020
Elastic South Africa Meetup July 2020Elastic South Africa Meetup July 2020
Elastic South Africa Meetup July 2020
 
Elastic South Africa Meetup June 2020
Elastic South Africa Meetup June 2020Elastic South Africa Meetup June 2020
Elastic South Africa Meetup June 2020
 
Elastic South Africa Meetup April 2020
Elastic South Africa Meetup April 2020Elastic South Africa Meetup April 2020
Elastic South Africa Meetup April 2020
 
[Virtual Meetup] Using Elasticsearch as a Time-Series Database in the Endpoin...
[Virtual Meetup] Using Elasticsearch as a Time-Series Database in the Endpoin...[Virtual Meetup] Using Elasticsearch as a Time-Series Database in the Endpoin...
[Virtual Meetup] Using Elasticsearch as a Time-Series Database in the Endpoin...
 
Tracking and visualizing COVID-19 with Elastic stack
Tracking and visualizing COVID-19 with Elastic stackTracking and visualizing COVID-19 with Elastic stack
Tracking and visualizing COVID-19 with Elastic stack
 

Recently uploaded

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 

Recently uploaded (20)

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 

How Elastic Security Meets SOC Needs

  • 1. 04 February 2021 @ 16:00 UTC+1 Elastic Morocco User Group How Elastic Security Meets SOC Needs Hamza OUADIÂ Cyber Security Analyst
  • 2.
  • 3. Store, Search, & Analyze Visualize & Manage Ingest Elastic Stack Kibana Elasticsearch Beats Logstash Elastic Stack Reliably and securely take data from any source, in any format, then search, analyze, and visualize it in real time.
  • 4. Elastic est une société de recherche Nous mettons l'accent sur la valeur pour les utilisateurs en produisant des résultats rapides qui fonctionnent à grande échelle et qui sont pertinents. C'est notre ADN. Nous pensons que la recherche est une expérience. C'est ce qui nous définit et nous rend uniques Vitesse, Scalabilité, Pertinence
  • 5. 3 Solutions Elastic Enterprise Search (Recherche en entreprise) Elastic Security (Sécurité à 360°) Elastic Observability (Observabilité à 360°)
  • 6. Endpoint SIEM How Elastic Security Meets SOC Needs
  • 7. Agenda Introduction Data Integration Data Processing Data Analytics 1 2 3 4 Demo : Elastic Security 5 Questions & Answers 6
  • 8. SOC : Security Operations Center Introduction Image Source : https://bit.ly/3ac9lyK
  • 9. SOC : Security Operations Center Introduction SIEM Logs Logs Logs Analyst
  • 12. Host & Network Telemetry Data Integrations
  • 13. Network Data Packetbeat : • Flows • DNS • TLS • HTTP Filebeat : • IDS/IPS/NMS modules: Zeek NMS, Suricata IDS • NetFlow, CEF • Firewall modules: Cisco ASA, FTD, Palo Alto Networks, Ubiquiti IPTables • Kubernetes modules: CoreDNS, Envoy proxy • Google VPC flow logs, PubSub Input elastic.co/integrations
  • 14. Host Data Winlogbeat : • Windows event logs • Sysmon • PowerShell Filebeat : • System logs (auth logs) (Linux) • Multiline Event logs Auditbeat : • System module (Linux, macOS, Win.): packages, processes, logins, sockets, users and groups • Auditd module (Linux Kernel Audit info) • File integrity monitoring (Linux, macOS, Win.) Elastic Agent : • One agent for all: logs, metrics and security • 1-click integrations with Fleet • Detection & Response
  • 15. Custom Data Community Beats : • Community driven Beats agents
  • 16. Data Processing “If I had nine hours to chop down a tree, I’d spend the first six sharpening my ax.” – Abraham Lincoln
  • 17. Event Normalization Elastic Common Schema (ECS) Data Processing Benefits • Correlate data from different sources • Ability to re-use analysis content • Ability to re-use Elastic-provided content Status • Version v1.7 published : github.com/elastic/ecs • Supported in Beats and APM • Community feedback welcome
  • 18. Event Parsing & Enrichment Data Processing • Input: Syslog, File, TCP/UDP, Beats • Filter: GROK, DNS, TLD, Geo IP, Date, JSON • Output: Elasticsearch, Email
  • 20. Detection Rules Data Analysis • Event-Centric Correlation (KQL Query) • Sequence-Based Correlation (EQL Query) • Threshold-Based Alerting • Indicator-Based Alerting • Machine Learning Jobs
  • 21.
  • 22. Elastic Security Detection, Prevention and Response for Unified Protection
  • 25. Elastic is a Search Company Search. Observe. Protect. www.elastic.co Thank you | Questions ?