SlideShare a Scribd company logo
1 of 16
INTRODUCTION
The Security Kung Fu Series is a four-part series intended to guide you in the mastery of the art of
Security Kung Fu.
As we embarked on creating this series, we always knew that in the back of everyone’s minds were a
couple of curious thoughts: Why “Kung Fu?” And, “what does martial arts have to do with how I protect
my network?”
Well, “Kung Fu” is a Chinese term referring to any study, learning, or practice that requires patience,
energy, hard work, discipline and time to complete. So, really, it’s not just martial arts.
Perhaps, by this definition, you’re starting to see the parallels we see with IT security, and the vital roles
many of you play within your respective organizations.
For on demand access to each recording of the series visit the Security Kung Fu Series Page.
© 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 2
© 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
AGENDA
3
• Respect your Security Kung Fu Masters
• The cybersecurity climate
• Anatomy of an attack
• Uncovering the “Detection Deficit”
• Playing with fire[wall logs]
• SIEM and NCCM Solutions
• Firewall-centric capabilities of SolarWinds® Log &
Event Manager (LEM) and SolarWinds® Network
Configuration Manager (NCM)
• Q&A
© 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
SECURITY KUNG FU MASTERS
4
Ian Trump
Cyber Security Strategist
Jamie Hynds
Sr. Product Manager - Security
SolarWinds
© 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
THE CYBERSECURITY CLIMATE
• Cybersecurity market reaches
$75 BILLION IN 2015
• Cybersecurity market anticipated to reach
$170 BILLION BY 2020
• Cyber crime costs projected to reach
$2 TRILLION BY 2019
5
https://www.forbes.com/sites/stevemorgan/2015/12/20/cybersecurity​-​market-reaches-
75-billion-in-2015​​-​expected-to-reach-170-billion-by-2020/
ANATOMY OF AN ATTACK
Delivery Exploitation Installation C2 Actions
WAN to LAN End Point End Point LAN to WAN End Point
Lockheed Martin Cyber Kill Chain®
ANATOMY OF AN ATTACK
AN EXAMPLE OF LATERAL MOVEMENT
BREACH NOTIFICATION
Regulations, Rules, & Requirements
• State law in many states
o Forty-seven states, the District of Columbia, Guam, Puerto Rico, and the Virgin
Islands have enacted legislation requiring private, governmental or educational
entities to notify individuals of security breaches of information involving
personally identifiable information
o Only three states—Alabama, New Mexico, and South Dakota—do not currently
have a law requiring consumer notification of security breaches
• Federal law
o H.R.1770 - Data Security and Breach Notification Act of 2015 – on legislative
calendar as of 2017
o HIPAA & GLBA
© 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
THE “DETECTION DEFICIT”
9
http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/
PLAYING WITH FIRE[WALL LOGS]
What kinds of events do firewalls log?
• Traffic, traffic, traffic
o Many devices can log both traffic statistics and per-ACL/policy
o For ACLs/policy, you can specify whether to log (and in some cases when – session start vs.
end)
• Device administration
o Configuration changes, sometimes down to the specific command ran
o Authentication (both admins and things like VPN)
• Add-on module and “smarter” data
o UTMs and Next-Gen Firewalls, IPS modules, etc. generate lots of security-specific details
o VPN connections and tunnels
SIEM AND NCCM SOLUTIONS
How do security information and event management (SIEM) solutions help me
manage firewall logs?
• High volume makes it hard to be high value!
o Make logs work for you now, rather than waiting for an investigation
• Apply your environment details to logs to make them more intelligent
• Correlate (in real-time or as a part of investigation/troubleshooting) firewall data with
other event sources to get a full picture of what’s actually happening
• Leverage active response on the device or somewhere else to isolate problems
SIEM AND NCCM SOLUTIONS
How does configuration management help mitigate risk and contribute to
compliance?
• Consistently configure devices to policy baseline
• Audit configurations for compliance to standards and policies
• Monitor configurations for unauthorized changes and remediate
• Archive configs to rollback a config change or recover a failed device
• Assess vulnerabilities in device firmware
• Upgrade outdated device firmware
• Discover, inventory and manage device lifecycle
• Maintain device documentation (e.g., location, purpose, configuration contacts, etc.)
SOLARWINDS NETWORK CONFIGURATION MANAGER
Centralized network change and configuration management software.
• Automated configuration backups, comparisons, and rollback
• Real-time configuration change detection and audits for compliance management
• Bulk deploy configuration changes
Download Free Trial | Learn More
© 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 13
SOLARWINDS LOG & EVENT MANAGER
Affordable SIEM solution that helps you detect and respond to security threats.
• Real-time event correlation for instantaneous detection of malicious and suspicious
activity
• Automated remediation and advanced search for forensic analysis and
troubleshooting
• Out-of-the-box compliance rules and reports for HIPAA, PCI, SOX, FISMA, and may
more.
Download Free Trial | Learn More
© 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 14
SECURITY KUNG FU WEBINAR SERIES
The SolarWinds, SolarWinds & Design, Orion, and THWACK trademarks
are the exclusive property of SolarWinds Worldwide, LLC or its affiliates,
are registered with the U.S. Patent and Trademark Office, and may be
registered or pending registration in other countries. All other SolarWinds
trademarks, service marks, and logos may be common law marks or are
registered or pending registration. All other trademarks mentioned herein
are used for identification purposes only and are trademarks of (and may
be registered trademarks) of their respective companies.

More Related Content

What's hot

Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...Shawn Tuma
 
WatchGuard - Security event juni 2016
WatchGuard - Security event juni 2016WatchGuard - Security event juni 2016
WatchGuard - Security event juni 2016Marketing Team
 
2021/0/15 - Solarwinds supply chain attack: why we should take it sereously
2021/0/15 - Solarwinds supply chain attack: why we should take it sereously2021/0/15 - Solarwinds supply chain attack: why we should take it sereously
2021/0/15 - Solarwinds supply chain attack: why we should take it sereouslySirris
 
Businessday okt 2016 - WatchGuard
Businessday okt 2016 - WatchGuardBusinessday okt 2016 - WatchGuard
Businessday okt 2016 - WatchGuardMarketing Team
 
Protect Your Infrastructure: Basics of Cloud Security | Fpwebinar
Protect Your Infrastructure: Basics of Cloud Security | Fpwebinar Protect Your Infrastructure: Basics of Cloud Security | Fpwebinar
Protect Your Infrastructure: Basics of Cloud Security | Fpwebinar Fpweb
 
Discovery Home S B Chapter 8
Discovery  Home  S B  Chapter  8Discovery  Home  S B  Chapter  8
Discovery Home S B Chapter 8tinwerf
 
Cyber Hygiene Checklist
Cyber Hygiene ChecklistCyber Hygiene Checklist
Cyber Hygiene ChecklistShawn Tuma
 
@COISSA Cloud Computing and Privacy
@COISSA Cloud Computing and Privacy@COISSA Cloud Computing and Privacy
@COISSA Cloud Computing and PrivacyDino Tsibouris
 
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityKeeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityDistil Networks
 
ECDL IT Security PowerPoint Presentation
ECDL IT Security PowerPoint PresentationECDL IT Security PowerPoint Presentation
ECDL IT Security PowerPoint PresentationCiaran Comerford
 
Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry
Unsafe at Any Speed: 7 Dirty Secrets of the Security IndustryUnsafe at Any Speed: 7 Dirty Secrets of the Security Industry
Unsafe at Any Speed: 7 Dirty Secrets of the Security Industrydigitallibrary
 
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis ElevateInsider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis ElevateFidelis Cybersecurity
 
Sntcapril2 decreasenetworkriskwithalertmanagementdraftv2-150417114740-convers...
Sntcapril2 decreasenetworkriskwithalertmanagementdraftv2-150417114740-convers...Sntcapril2 decreasenetworkriskwithalertmanagementdraftv2-150417114740-convers...
Sntcapril2 decreasenetworkriskwithalertmanagementdraftv2-150417114740-convers...garciathomasbic
 
Sntc April 2: Decrease Network Risk with Alert Management Draft v2
Sntc April 2:  Decrease Network Risk with Alert Management Draft v2Sntc April 2:  Decrease Network Risk with Alert Management Draft v2
Sntc April 2: Decrease Network Risk with Alert Management Draft v2B2BContact
 
Information Security
Information SecurityInformation Security
Information Securityvadapav123
 
Lec21 security
Lec21 securityLec21 security
Lec21 securityimran6994
 
Part 1: Identifying Insider Threats with Fidelis EDR Technology
Part 1: Identifying  Insider Threats with Fidelis EDR Technology Part 1: Identifying  Insider Threats with Fidelis EDR Technology
Part 1: Identifying Insider Threats with Fidelis EDR Technology Fidelis Cybersecurity
 
Talk1 esc3 muscl-standards and regulation_v1_1
Talk1 esc3 muscl-standards and regulation_v1_1Talk1 esc3 muscl-standards and regulation_v1_1
Talk1 esc3 muscl-standards and regulation_v1_1Sylvain Martinez
 

What's hot (20)

Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...
 
The Current State of Cybersecurity
The Current State of CybersecurityThe Current State of Cybersecurity
The Current State of Cybersecurity
 
WatchGuard - Security event juni 2016
WatchGuard - Security event juni 2016WatchGuard - Security event juni 2016
WatchGuard - Security event juni 2016
 
2021/0/15 - Solarwinds supply chain attack: why we should take it sereously
2021/0/15 - Solarwinds supply chain attack: why we should take it sereously2021/0/15 - Solarwinds supply chain attack: why we should take it sereously
2021/0/15 - Solarwinds supply chain attack: why we should take it sereously
 
Businessday okt 2016 - WatchGuard
Businessday okt 2016 - WatchGuardBusinessday okt 2016 - WatchGuard
Businessday okt 2016 - WatchGuard
 
Protect Your Infrastructure: Basics of Cloud Security | Fpwebinar
Protect Your Infrastructure: Basics of Cloud Security | Fpwebinar Protect Your Infrastructure: Basics of Cloud Security | Fpwebinar
Protect Your Infrastructure: Basics of Cloud Security | Fpwebinar
 
Discovery Home S B Chapter 8
Discovery  Home  S B  Chapter  8Discovery  Home  S B  Chapter  8
Discovery Home S B Chapter 8
 
Cyber Hygiene Checklist
Cyber Hygiene ChecklistCyber Hygiene Checklist
Cyber Hygiene Checklist
 
@COISSA Cloud Computing and Privacy
@COISSA Cloud Computing and Privacy@COISSA Cloud Computing and Privacy
@COISSA Cloud Computing and Privacy
 
Beyond The Dark Hacking Screen
Beyond The Dark Hacking ScreenBeyond The Dark Hacking Screen
Beyond The Dark Hacking Screen
 
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityKeeping up with the Revolution in IT Security
Keeping up with the Revolution in IT Security
 
ECDL IT Security PowerPoint Presentation
ECDL IT Security PowerPoint PresentationECDL IT Security PowerPoint Presentation
ECDL IT Security PowerPoint Presentation
 
Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry
Unsafe at Any Speed: 7 Dirty Secrets of the Security IndustryUnsafe at Any Speed: 7 Dirty Secrets of the Security Industry
Unsafe at Any Speed: 7 Dirty Secrets of the Security Industry
 
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis ElevateInsider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
 
Sntcapril2 decreasenetworkriskwithalertmanagementdraftv2-150417114740-convers...
Sntcapril2 decreasenetworkriskwithalertmanagementdraftv2-150417114740-convers...Sntcapril2 decreasenetworkriskwithalertmanagementdraftv2-150417114740-convers...
Sntcapril2 decreasenetworkriskwithalertmanagementdraftv2-150417114740-convers...
 
Sntc April 2: Decrease Network Risk with Alert Management Draft v2
Sntc April 2:  Decrease Network Risk with Alert Management Draft v2Sntc April 2:  Decrease Network Risk with Alert Management Draft v2
Sntc April 2: Decrease Network Risk with Alert Management Draft v2
 
Information Security
Information SecurityInformation Security
Information Security
 
Lec21 security
Lec21 securityLec21 security
Lec21 security
 
Part 1: Identifying Insider Threats with Fidelis EDR Technology
Part 1: Identifying  Insider Threats with Fidelis EDR Technology Part 1: Identifying  Insider Threats with Fidelis EDR Technology
Part 1: Identifying Insider Threats with Fidelis EDR Technology
 
Talk1 esc3 muscl-standards and regulation_v1_1
Talk1 esc3 muscl-standards and regulation_v1_1Talk1 esc3 muscl-standards and regulation_v1_1
Talk1 esc3 muscl-standards and regulation_v1_1
 

Similar to Security Kung Fu: Firewall Logs

Security Kung Fu: Security vs Compliance
Security Kung Fu: Security vs ComplianceSecurity Kung Fu: Security vs Compliance
Security Kung Fu: Security vs ComplianceSolarWinds
 
Security Kung Fu: Security vs. Compliance
Security Kung Fu: Security vs. ComplianceSecurity Kung Fu: Security vs. Compliance
Security Kung Fu: Security vs. ComplianceJoshua Berman
 
Security Kung Fu: Active Directory Changes
Security Kung Fu: Active Directory ChangesSecurity Kung Fu: Active Directory Changes
Security Kung Fu: Active Directory ChangesJoshua Berman
 
Security Kung Fu: Active Directory Changes
Security Kung Fu: Active Directory ChangesSecurity Kung Fu: Active Directory Changes
Security Kung Fu: Active Directory ChangesSolarWinds
 
APAC Partner Update: SolarWinds Security
APAC Partner Update: SolarWinds SecurityAPAC Partner Update: SolarWinds Security
APAC Partner Update: SolarWinds SecuritySolarWinds
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSECSean Whalen
 
Chamber Technology Committee Presentation
Chamber Technology Committee PresentationChamber Technology Committee Presentation
Chamber Technology Committee PresentationTony DeGonia (LION)
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityErnest Staats
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowNuuko, Inc.
 
Microsegmentation from strategy to execution
Microsegmentation from strategy to executionMicrosegmentation from strategy to execution
Microsegmentation from strategy to executionAlgoSec
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for CybersecurityShawn Tuma
 
PCI DSS Simplified: What You Need to Know
PCI DSS Simplified: What You Need to KnowPCI DSS Simplified: What You Need to Know
PCI DSS Simplified: What You Need to KnowAlienVault
 
9-Steps-Info-Sec-Whitepaper-final.pdf
9-Steps-Info-Sec-Whitepaper-final.pdf9-Steps-Info-Sec-Whitepaper-final.pdf
9-Steps-Info-Sec-Whitepaper-final.pdfSoniaCristina49
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Kirti Ahirrao
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsAbbie Hosta
 
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)Shawn Tuma
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are ComingErnest Staats
 

Similar to Security Kung Fu: Firewall Logs (20)

Security Kung Fu: Security vs Compliance
Security Kung Fu: Security vs ComplianceSecurity Kung Fu: Security vs Compliance
Security Kung Fu: Security vs Compliance
 
Security Kung Fu: Security vs. Compliance
Security Kung Fu: Security vs. ComplianceSecurity Kung Fu: Security vs. Compliance
Security Kung Fu: Security vs. Compliance
 
Security Kung Fu: Active Directory Changes
Security Kung Fu: Active Directory ChangesSecurity Kung Fu: Active Directory Changes
Security Kung Fu: Active Directory Changes
 
Security Kung Fu: Active Directory Changes
Security Kung Fu: Active Directory ChangesSecurity Kung Fu: Active Directory Changes
Security Kung Fu: Active Directory Changes
 
APAC Partner Update: SolarWinds Security
APAC Partner Update: SolarWinds SecurityAPAC Partner Update: SolarWinds Security
APAC Partner Update: SolarWinds Security
 
Tyler Technology Expo
Tyler Technology ExpoTyler Technology Expo
Tyler Technology Expo
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSEC
 
Chamber Technology Committee Presentation
Chamber Technology Committee PresentationChamber Technology Committee Presentation
Chamber Technology Committee Presentation
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
 
CyberOps.pptx
CyberOps.pptxCyberOps.pptx
CyberOps.pptx
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should Know
 
Microsegmentation from strategy to execution
Microsegmentation from strategy to executionMicrosegmentation from strategy to execution
Microsegmentation from strategy to execution
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for Cybersecurity
 
PCI DSS Simplified: What You Need to Know
PCI DSS Simplified: What You Need to KnowPCI DSS Simplified: What You Need to Know
PCI DSS Simplified: What You Need to Know
 
9-Steps-Info-Sec-Whitepaper-final.pdf
9-Steps-Info-Sec-Whitepaper-final.pdf9-Steps-Info-Sec-Whitepaper-final.pdf
9-Steps-Info-Sec-Whitepaper-final.pdf
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal Threats
 
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are Coming
 
Leveraging Log Management to provide business value
Leveraging Log Management to provide business valueLeveraging Log Management to provide business value
Leveraging Log Management to provide business value
 

Recently uploaded

Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxnada99848
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 

Recently uploaded (20)

Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptx
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 

Security Kung Fu: Firewall Logs

  • 1.
  • 2. INTRODUCTION The Security Kung Fu Series is a four-part series intended to guide you in the mastery of the art of Security Kung Fu. As we embarked on creating this series, we always knew that in the back of everyone’s minds were a couple of curious thoughts: Why “Kung Fu?” And, “what does martial arts have to do with how I protect my network?” Well, “Kung Fu” is a Chinese term referring to any study, learning, or practice that requires patience, energy, hard work, discipline and time to complete. So, really, it’s not just martial arts. Perhaps, by this definition, you’re starting to see the parallels we see with IT security, and the vital roles many of you play within your respective organizations. For on demand access to each recording of the series visit the Security Kung Fu Series Page. © 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 2
  • 3. © 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. AGENDA 3 • Respect your Security Kung Fu Masters • The cybersecurity climate • Anatomy of an attack • Uncovering the “Detection Deficit” • Playing with fire[wall logs] • SIEM and NCCM Solutions • Firewall-centric capabilities of SolarWinds® Log & Event Manager (LEM) and SolarWinds® Network Configuration Manager (NCM) • Q&A
  • 4. © 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. SECURITY KUNG FU MASTERS 4 Ian Trump Cyber Security Strategist Jamie Hynds Sr. Product Manager - Security SolarWinds
  • 5. © 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. THE CYBERSECURITY CLIMATE • Cybersecurity market reaches $75 BILLION IN 2015 • Cybersecurity market anticipated to reach $170 BILLION BY 2020 • Cyber crime costs projected to reach $2 TRILLION BY 2019 5 https://www.forbes.com/sites/stevemorgan/2015/12/20/cybersecurity​-​market-reaches- 75-billion-in-2015​​-​expected-to-reach-170-billion-by-2020/
  • 6. ANATOMY OF AN ATTACK Delivery Exploitation Installation C2 Actions WAN to LAN End Point End Point LAN to WAN End Point Lockheed Martin Cyber Kill Chain®
  • 7. ANATOMY OF AN ATTACK AN EXAMPLE OF LATERAL MOVEMENT
  • 8. BREACH NOTIFICATION Regulations, Rules, & Requirements • State law in many states o Forty-seven states, the District of Columbia, Guam, Puerto Rico, and the Virgin Islands have enacted legislation requiring private, governmental or educational entities to notify individuals of security breaches of information involving personally identifiable information o Only three states—Alabama, New Mexico, and South Dakota—do not currently have a law requiring consumer notification of security breaches • Federal law o H.R.1770 - Data Security and Breach Notification Act of 2015 – on legislative calendar as of 2017 o HIPAA & GLBA
  • 9. © 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. THE “DETECTION DEFICIT” 9 http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/
  • 10. PLAYING WITH FIRE[WALL LOGS] What kinds of events do firewalls log? • Traffic, traffic, traffic o Many devices can log both traffic statistics and per-ACL/policy o For ACLs/policy, you can specify whether to log (and in some cases when – session start vs. end) • Device administration o Configuration changes, sometimes down to the specific command ran o Authentication (both admins and things like VPN) • Add-on module and “smarter” data o UTMs and Next-Gen Firewalls, IPS modules, etc. generate lots of security-specific details o VPN connections and tunnels
  • 11. SIEM AND NCCM SOLUTIONS How do security information and event management (SIEM) solutions help me manage firewall logs? • High volume makes it hard to be high value! o Make logs work for you now, rather than waiting for an investigation • Apply your environment details to logs to make them more intelligent • Correlate (in real-time or as a part of investigation/troubleshooting) firewall data with other event sources to get a full picture of what’s actually happening • Leverage active response on the device or somewhere else to isolate problems
  • 12. SIEM AND NCCM SOLUTIONS How does configuration management help mitigate risk and contribute to compliance? • Consistently configure devices to policy baseline • Audit configurations for compliance to standards and policies • Monitor configurations for unauthorized changes and remediate • Archive configs to rollback a config change or recover a failed device • Assess vulnerabilities in device firmware • Upgrade outdated device firmware • Discover, inventory and manage device lifecycle • Maintain device documentation (e.g., location, purpose, configuration contacts, etc.)
  • 13. SOLARWINDS NETWORK CONFIGURATION MANAGER Centralized network change and configuration management software. • Automated configuration backups, comparisons, and rollback • Real-time configuration change detection and audits for compliance management • Bulk deploy configuration changes Download Free Trial | Learn More © 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 13
  • 14. SOLARWINDS LOG & EVENT MANAGER Affordable SIEM solution that helps you detect and respond to security threats. • Real-time event correlation for instantaneous detection of malicious and suspicious activity • Automated remediation and advanced search for forensic analysis and troubleshooting • Out-of-the-box compliance rules and reports for HIPAA, PCI, SOX, FISMA, and may more. Download Free Trial | Learn More © 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 14
  • 15.
  • 16. SECURITY KUNG FU WEBINAR SERIES The SolarWinds, SolarWinds & Design, Orion, and THWACK trademarks are the exclusive property of SolarWinds Worldwide, LLC or its affiliates, are registered with the U.S. Patent and Trademark Office, and may be registered or pending registration in other countries. All other SolarWinds trademarks, service marks, and logos may be common law marks or are registered or pending registration. All other trademarks mentioned herein are used for identification purposes only and are trademarks of (and may be registered trademarks) of their respective companies.