Operationalizing
Security Intelligence
Matthias Maier
CISSP, CEH, Product Marketing Manager
Who I am
• Now Product Marketing Manager EMEA
• 8 Years Consultant Security + Big Data
• 3+ Years at Splunk, McAfee (Intel Security),
Tibco LogLogic
• worked with top organizations across
industries advising customers
• CISSP, Certified ethical Hacker
3
Make machine data accessible,
usable and valuable to everyone.
3
4
Turning Machine Data Into Business Value
Index Untapped Data: Any Source, Type, Volume
Online
Services Web
Services
Servers
Security GPS
Location
Storage
Desktops
Networks
Packaged
Applications
Custom
ApplicationsMessaging
Telecoms
Online
Shopping
Cart
Web
Clickstreams
Databases
Energy
Meters
Call Detail
Records
Smartphones
and Devices
RFID
On-
Premises
Private
Cloud
Public
Cloud
Ask Any Question
Application Delivery
Security, Compliance
and Fraud
IT Operations
Business Analytics
Internet of Things and
Industrial Data
SECURITY USE CASES
In
SECURITY &
COMPLIANCE
REPORTING
REAL-TIME
MONITORING OF
KNOWN THREATS
MONITORING
OF UNKNOWN,
ADVANCED
THREATS
INCIDENT
INVESTIGATIONS
& FORENSICS
INSIDER
THREAT
Splunk Can Complement OR Replace an Existing SIEM
INSIDER
THREAT
Disclaimer
6
During the course of this presentation, we may make forward looking statements regarding future events
or the expected performance of the company. We caution you that such statements reflect our current
expectations and estimates based on factors currently known to us and that actual events or results
could differ materially. For important factors that may cause actual results to differ from those contained
in our forward-looking statements, please review our filings with the SEC. The forward-looking
statements made in the this presentation are being made as of the time and date of its live presentation.
If reviewed after its live presentation, this presentation may not contain current or accurate information.
We do not assume any obligation to update any forward looking statements we may make.
In addition, any information about our roadmap outlines our general product direction and is subject to
change at any time without notice. It is for informational purposes only and shall not, be incorporated
into any contract or other commitment. Splunk undertakes no obligation either to develop the features
or functionality described or to include any such feature or functionality in a future release.
Agenda
The super hero and the fish market – a short story
What is Security Intelligence
Examples of Operationalizing Security Intelligence
Call to action
https://i.ytimg.com/vi/4GmMNF1b0Lw/maxresdefault.jpg
http://www.technobuffalo.com/wp-content/uploads/2015/07/Xena.jpeg
https://epicheroism.files.wordpress.com/2013/09/k
war-1680x1050.jpg
http://www.entrust.com/wp-
content/uploads/2013/02/Entrust-MobileDemo-
RSA20131.jpg
http://www.123rf.com/photo_30266410_seattle-july-5-customers-at-pike-place-fish-company-wait-to-order-fish-at-the-famous-seafood-market-.html
Lone hacker…
Organized Criminals
Crossing the Chasm
Crossing the Chasm
Security Intelligence
Information relevant to protecting an
organization from external and inside
threats as well as the processes, policies
and tools designed to gather and analyze
that information.
http://whatis.techtarget.com/definition/security-intelligence-SI
Security Intelligence
Information relevant to protecting an
organization from external and inside
threats as well as the processes, policies
and tools designed to gather and analyze
that information.
http://whatis.techtarget.com/definition/security-intelligence-SI
Intelligence
Actionable information that provides an
organization with decision support and possibly
a strategic advantage. SI is a comprehensive
approach that integrates multiple processes and
practices designed to protect the organization.
http://whatis.techtarget.com/definition/security-intelligence-SI
Intelligence
Actionable information that provides an
organization with decision support and possibly
a strategic advantage. SI is a comprehensive
approach that integrates multiple processes and
practices designed to protect the organization.
http://whatis.techtarget.com/definition/security-intelligence-SI
Operationalizing Security Intelligence
Alerts
Alert 1 Alert 2
Host A Host B
Accessing unusual network segments Malware Found but couldn’t be removed
Worth an Investigation?
Which one to investigate first?
Operationalizing Security Intelligence
1. Risk-Based 2. Context and Intelligence
3. Connecting
People and Data
25
Network Endpoint Access
Data Sources
Threat Intelligence
Persist, Repeat
Threat Intelligence
Access/Identity
Endpoint
Network
Attacker, know relay/C2 sites, infected sites, IOC,
attack/campaign intent and attribution
Where they went to, who talked to whom, attack
transmitted, abnormal traffic, malware download
What process is running (malicious, abnormal, etc.)
Process owner, registry mods, attack/malware
artifacts, patching level, attack susceptibility
Access level, privileged users, likelihood of infection,
where they might be in kill chain
• Third-party threat intel
• Open-source blacklist
• Internal threat intelligence
• Firewall, IDS, IPS
• DNS
• Email
• Endpoint (AV/IPS/FW)
• Malware detection
• PCLM
• DHCP
• OS logs
• Patching
• Active Directory
• LDAP
• CMDB
• Operating system
• Database
• VPN, AAA, SSO
Data Sources Required
• Web proxy
• NetFlow
• Network
Requirement 1: Risk Based Analytics
Risk Based Analytics
Network Endpoint AccessThreat Intelligence
Rules/String/Regex matching
Statistical outliers and anomalies
Session and Behavior profiling
Scoring and aggregation
Alerts
Alert 1 Alert 2
Host A Host B
Accessing unusual network segments Malware Found but couldn’t be removed
Worth an Investigation?
Which one to investigate first?
Example - Situation
Day 1
•Host A: IDS
Signature
Triggers
•Source:
Network
IDS
Day 5
•Host A: AV
System
Triggers
•Source:
AntiVirus
Day 10
•Host A:
Multiple
failed logins
from this
host
•Source:
Active
Directory
Day 20
•Host A:
accessing
unusual
network
segments
•Source:
Network
Traffic
Correlation
Context: Risk Scoring
Day 1
•Host A: IDS
Signature
Triggers
•Source:
Network
IDS
Day 5
•Host A: AV
System
Triggers
•Source:
AntiVirus
Day 10
•Host A:
Multiple
failed logins
from this
host
•Source:
Active
Directory
Day 20
•Host A:
accessing
unusual
network
segments
•Source:
Network
Traffic
Correlation
Risk Score
Host A: 0 + 10
Risk Score
Host A: 10 + 30
Risk Score
Host A: 40 + 30
Risk Score
Host A: 70 + 5
Requirement 2: Context and Intelligence
Context and Intelligence
Integrate across technologies
Automated context matching
Automated context acquisition
Post processing and post analysis
Threat
Intelligence
Asset
& CMDB
API/SDK
Integrations
Data
Stores
Applications
Alerts
Alert 1 Alert 2
Host A Host B
Accessing unusual network segments Malware Found but couldn’t be removed
Worth an Investigation?
Which one to investigate first?
Alerts
Alert 1 Alert 2
Host A Host B
Accessing unusual network segments Malware Found but couldn’t be removed
Risk Score Host A: 75 Risk Score Host B: 5
Worth an Investigation?
Which one to investigate first?
Alerts
Alert 1 Alert 2
Host A Host B
Accessing unusual network segments Malware Found but couldn’t be removed
Risk Score Host A: 75 Risk Score Host B: 5
System Owner: Juergen Klopp
Location: Liverpool
System Owner: Donald Duck
Department: Duckburg
Confidentiality Level: High Confidentiality Level: Low
Worth an Investigation?
Which one to investigate first?
http://www.entrust.com/wp-content/uploads/2013/02/Entrust-MobileDemo-RSA20131.jpg
Requirement 3: Connecting Data and People
Connecting People and Data
Human mediated automation
Sharing and collaboration
Free form investigation – human intuition
Interact with views and workflows
Any data, all data
Automation Collaboration Investigation Workflows All data
Visual Investigations – Kill Chain
Operationalizing Security Intelligence
1. Risk-Based 2. Context and Intelligence
3. Connecting
People and Data
42
Crossing the Chasm
Call to action
Today:
• Visit the Splunk booth and get a live demo of an Incident Investigation
• Pick up your free t-shirt
• Get at 4pm free beer at the booth!
Next 7 Days:
• Try Splunk Cloud Enterprise Security Sandbox to explore hands on
• Think about use cases or visibility gaps you have today that can be addressed!
Next 90 Days:
• Schedule a Splunk Workshop onsite to explore how you can mature your
security program with the help of Machine Data
45
Thank You
@Matthias_by

Operationalizing Security Intelligence

  • 1.
  • 2.
    Who I am •Now Product Marketing Manager EMEA • 8 Years Consultant Security + Big Data • 3+ Years at Splunk, McAfee (Intel Security), Tibco LogLogic • worked with top organizations across industries advising customers • CISSP, Certified ethical Hacker
  • 3.
    3 Make machine dataaccessible, usable and valuable to everyone. 3
  • 4.
    4 Turning Machine DataInto Business Value Index Untapped Data: Any Source, Type, Volume Online Services Web Services Servers Security GPS Location Storage Desktops Networks Packaged Applications Custom ApplicationsMessaging Telecoms Online Shopping Cart Web Clickstreams Databases Energy Meters Call Detail Records Smartphones and Devices RFID On- Premises Private Cloud Public Cloud Ask Any Question Application Delivery Security, Compliance and Fraud IT Operations Business Analytics Internet of Things and Industrial Data
  • 5.
    SECURITY USE CASES In SECURITY& COMPLIANCE REPORTING REAL-TIME MONITORING OF KNOWN THREATS MONITORING OF UNKNOWN, ADVANCED THREATS INCIDENT INVESTIGATIONS & FORENSICS INSIDER THREAT Splunk Can Complement OR Replace an Existing SIEM INSIDER THREAT
  • 6.
    Disclaimer 6 During the courseof this presentation, we may make forward looking statements regarding future events or the expected performance of the company. We caution you that such statements reflect our current expectations and estimates based on factors currently known to us and that actual events or results could differ materially. For important factors that may cause actual results to differ from those contained in our forward-looking statements, please review our filings with the SEC. The forward-looking statements made in the this presentation are being made as of the time and date of its live presentation. If reviewed after its live presentation, this presentation may not contain current or accurate information. We do not assume any obligation to update any forward looking statements we may make. In addition, any information about our roadmap outlines our general product direction and is subject to change at any time without notice. It is for informational purposes only and shall not, be incorporated into any contract or other commitment. Splunk undertakes no obligation either to develop the features or functionality described or to include any such feature or functionality in a future release.
  • 7.
    Agenda The super heroand the fish market – a short story What is Security Intelligence Examples of Operationalizing Security Intelligence Call to action
  • 8.
  • 9.
  • 10.
  • 11.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
    Security Intelligence Information relevantto protecting an organization from external and inside threats as well as the processes, policies and tools designed to gather and analyze that information. http://whatis.techtarget.com/definition/security-intelligence-SI
  • 20.
    Security Intelligence Information relevantto protecting an organization from external and inside threats as well as the processes, policies and tools designed to gather and analyze that information. http://whatis.techtarget.com/definition/security-intelligence-SI
  • 21.
    Intelligence Actionable information thatprovides an organization with decision support and possibly a strategic advantage. SI is a comprehensive approach that integrates multiple processes and practices designed to protect the organization. http://whatis.techtarget.com/definition/security-intelligence-SI
  • 22.
    Intelligence Actionable information thatprovides an organization with decision support and possibly a strategic advantage. SI is a comprehensive approach that integrates multiple processes and practices designed to protect the organization. http://whatis.techtarget.com/definition/security-intelligence-SI
  • 23.
  • 24.
    Alerts Alert 1 Alert2 Host A Host B Accessing unusual network segments Malware Found but couldn’t be removed Worth an Investigation? Which one to investigate first?
  • 25.
    Operationalizing Security Intelligence 1.Risk-Based 2. Context and Intelligence 3. Connecting People and Data 25
  • 26.
    Network Endpoint Access DataSources Threat Intelligence
  • 27.
    Persist, Repeat Threat Intelligence Access/Identity Endpoint Network Attacker,know relay/C2 sites, infected sites, IOC, attack/campaign intent and attribution Where they went to, who talked to whom, attack transmitted, abnormal traffic, malware download What process is running (malicious, abnormal, etc.) Process owner, registry mods, attack/malware artifacts, patching level, attack susceptibility Access level, privileged users, likelihood of infection, where they might be in kill chain • Third-party threat intel • Open-source blacklist • Internal threat intelligence • Firewall, IDS, IPS • DNS • Email • Endpoint (AV/IPS/FW) • Malware detection • PCLM • DHCP • OS logs • Patching • Active Directory • LDAP • CMDB • Operating system • Database • VPN, AAA, SSO Data Sources Required • Web proxy • NetFlow • Network
  • 28.
    Requirement 1: RiskBased Analytics
  • 29.
    Risk Based Analytics NetworkEndpoint AccessThreat Intelligence Rules/String/Regex matching Statistical outliers and anomalies Session and Behavior profiling Scoring and aggregation
  • 30.
    Alerts Alert 1 Alert2 Host A Host B Accessing unusual network segments Malware Found but couldn’t be removed Worth an Investigation? Which one to investigate first?
  • 31.
    Example - Situation Day1 •Host A: IDS Signature Triggers •Source: Network IDS Day 5 •Host A: AV System Triggers •Source: AntiVirus Day 10 •Host A: Multiple failed logins from this host •Source: Active Directory Day 20 •Host A: accessing unusual network segments •Source: Network Traffic Correlation
  • 32.
    Context: Risk Scoring Day1 •Host A: IDS Signature Triggers •Source: Network IDS Day 5 •Host A: AV System Triggers •Source: AntiVirus Day 10 •Host A: Multiple failed logins from this host •Source: Active Directory Day 20 •Host A: accessing unusual network segments •Source: Network Traffic Correlation Risk Score Host A: 0 + 10 Risk Score Host A: 10 + 30 Risk Score Host A: 40 + 30 Risk Score Host A: 70 + 5
  • 33.
    Requirement 2: Contextand Intelligence
  • 34.
    Context and Intelligence Integrateacross technologies Automated context matching Automated context acquisition Post processing and post analysis Threat Intelligence Asset & CMDB API/SDK Integrations Data Stores Applications
  • 35.
    Alerts Alert 1 Alert2 Host A Host B Accessing unusual network segments Malware Found but couldn’t be removed Worth an Investigation? Which one to investigate first?
  • 36.
    Alerts Alert 1 Alert2 Host A Host B Accessing unusual network segments Malware Found but couldn’t be removed Risk Score Host A: 75 Risk Score Host B: 5 Worth an Investigation? Which one to investigate first?
  • 37.
    Alerts Alert 1 Alert2 Host A Host B Accessing unusual network segments Malware Found but couldn’t be removed Risk Score Host A: 75 Risk Score Host B: 5 System Owner: Juergen Klopp Location: Liverpool System Owner: Donald Duck Department: Duckburg Confidentiality Level: High Confidentiality Level: Low Worth an Investigation? Which one to investigate first?
  • 38.
  • 39.
  • 40.
    Connecting People andData Human mediated automation Sharing and collaboration Free form investigation – human intuition Interact with views and workflows Any data, all data Automation Collaboration Investigation Workflows All data
  • 41.
  • 42.
    Operationalizing Security Intelligence 1.Risk-Based 2. Context and Intelligence 3. Connecting People and Data 42
  • 43.
  • 44.
    Call to action Today: •Visit the Splunk booth and get a live demo of an Incident Investigation • Pick up your free t-shirt • Get at 4pm free beer at the booth! Next 7 Days: • Try Splunk Cloud Enterprise Security Sandbox to explore hands on • Think about use cases or visibility gaps you have today that can be addressed! Next 90 Days: • Schedule a Splunk Workshop onsite to explore how you can mature your security program with the help of Machine Data
  • 45.

Editor's Notes

  • #4 At Splunk, our mission is to make machine data accessible, usable and valuable to everyone. And this overarching mission is what drives our company and product priorities.
  • #5 Splunk products are being used for data volumes ranging from gigabytes to hundreds of terabytes per day. Splunk software and cloud services reliably collects and indexes machine data, from a single source to tens of thousands of sources. All in real time. Once data is in Splunk Enterprise, you can search, analyze, report on and share insights form your data. The Splunk Enterprise platform is optimized for real-time, low-latency and interactivity, making it easy to explore, analyze and visualize your data. This is described as Operational Intelligence. The insights gained from machine data support a number of use cases and can drive value across your organization. [In North America] Splunk Cloud is available in North America and offers Splunk Enterprise as a cloud-based service – essentially empowering you with Operational Intelligence without any operational effort.
  • #7 Stela starts
  • #26 The process of discovering relationships across all security-relevant data, including data from IT infrastructures, point security products and all machine-generated data to rapidly adapt to a changing threat landscape. 
  • #43 The process of discovering relationships across all security-relevant data, including data from IT infrastructures, point security products and all machine-generated data to rapidly adapt to a changing threat landscape.