SlideShare a Scribd company logo
1 of 23
Download to read offline
SIEM EVOLUTION
A day in the life of a Security Architect

Stijn Vande Casteele

28 September 2009
Who are we / Key Brands




www.arcsight.com      © 2009 ArcSight Confidential   2
International presence:
  Leading ICT integrator in Western Europe




                                 • Leading ICT integrator in Belgium,
                                   France & Luxembourg
                                 • 32 affiliates in Western Europe
                                 • Global reach through strategic partners




  Sensitivity : "Unrestricted"                                  28 September 2009   Slide

www.arcsight.com                 © 2009 ArcSight Confidential                               3
What do I do?

• My team provides solutions to underpin the on-site and managed SIEM
  services, with a focus on the what and the how!
• Engineer a grid/cloud/infrastructure to deliver these services to customers
  (enterprises) with a focus on security operations.
• Steer the service catalogue with fresh use cases (add value).
• Integrate technologies with our architecture to build automations and enhance
  the richness of our SIEM clouds.
       •    Data sources configuration documents
       •    Automatic ticket creation
       •    Portal visualizations
       •    Self monitoring
• 2nd line support for security management related infrastructure
  (application/systems) and forensic security investigations.
• Advice in general on a diverse range of pre-sales and service questions within
  this domain.

• Objective: centre of excellence (SIEM think-thank for the Belgacom group)
www.arcsight.com                           © 2009 ArcSight Confidential            4
Agenda

  • Security Monitoring
  • SIEM architectures
  • Use Cases




www.arcsight.com          © 2009 ArcSight Confidential   5
Firewall Security Monitoring


                                                         Outbound




                                                       Logs

                                             SIEM
                   Inbound Top Drops                                           Outbound Top Drops
                     Active list with                                           Can spot infected
                      confirmed scanners from                                     internal systems or
                      Internet                                                    configuration errors (eg.
                     If firewall accepts from IP                                 wrong DNS or NTP client
                      addresses in the active list,                               configuration)
                      increase event priority

www.arcsight.com                                © 2009 ArcSight Confidential                                  6
Security Analysis

        • Unlike firewalls, IDS/IPS provides information up to OSI layer 7 via
          signature based detection methods
        • Typical attacks detected by IDS/IPS: Worms, Exploits, Brute force
          attacks, Backdoors, Cover channels.
        • IDS/IPS are best placed where “threat x asset value” is high (eg. DMZ,
          server farm)
        • IDS/IPS provide input for SIEM tools to correlate with Vulnerability
          and Asset (VA) data
                                       Z




                                                                          Z




www.arcsight.com                           © 2009 ArcSight Confidential            7
Monitoring WiFi GUEST traffic


    END-USER                                            CISCO ASA
                      CISCO WLC

                                                                            Internet




                   End-User MAC Address               End-User IP Address
                   End-User IP Address                Web Target Address
                   End-User Account Name              Web Target Port




                                 End-User MAC Address
                                 End-User IP Address
                                 End-User Account Name
                                 Web Target Address
                                 Web Target Port
www.arcsight.com                       © 2009 ArcSight Confidential                    8
Monitoring business risks


                                    Confidentiality
                              Protecting sensitive information from
                               unauthorised disclosure or malicious
                                           interception.




                                     Business
                   Availability
   Ensuring that vital IT services and
     information are available when
                                      impact
                required.
                                                                                 Integrity
                                                                          safeguarding the accuracy and
                                                                            completeness of information



www.arcsight.com                           © 2009 ArcSight Confidential                                   9
Agenda

  • Security Monitoring
  • SIEM architectures
  • Use Cases




www.arcsight.com          © 2009 ArcSight Confidential   10
Some history…




                   ArcSight 2.1 (Sept 2003)
                   ArcSight 2.2 (POC)
                   ArcSight 2.5 (Production Jan 2004)
                   ArcSight 3.0 (Production Oct 2004)
                   ArcSight 3.5 (Production Mar 2006)
                   ArcSight 4.0 (Production Sept 2007)




www.arcsight.com                          © 2009 ArcSight Confidential   11
Telindus hardware tests

    Two different hardware platforms were tested from an ArcSight manager
     performance perspective:

                   Model            Architecture   CPU                               RAM     OS
                   Sun SPARC        SPARC T1       1 x 8 core (1.2 GHz)              32 GB   Solaris 10
                   T2000
                   Sun Fire X2100   AMD X_64       1 x dual core (1.8 GHz)           4GB     Red Hat 4.5




               • As the biggest factor in database performance is the available RAM and
                 the SAN read / write speed, the OS / architecture is not so influential.


              • It seems to Telindus that ArcSight 4.0 JRE is not optimized to make use of
                the multi-thread (CMT) possibilities of the SUN T1 processor. The AMD
                X_64 / Red Hat platform significantly outperformed the SPARC T1 /
                Solaris platform.



www.arcsight.com                                      © 2009 ArcSight Confidential                         12
ArcSight test graph




                   Y-Axis = EPS (000’s)       X-Axis = Number of core CPUs
                   Y-Axis = EPS (000’s)       X-Axis = Number of core CPUs




www.arcsight.com                          © 2009 ArcSight Confidential       13
Security Event Lifecycle




www.arcsight.com          © 2009 ArcSight Confidential   14
Log Sources

                                                           Security

                                                                                                           Network Intrusion
                                                         events and
                                                         information
                                                                                                           Prevention Systems
                                                                                 NIPS

                                                                                                                 Firewalls
                                                             AV           VA data
                                                                                   HIPS

                                                               FW          Web
                                                                          Content
                                                                         screening


                                                   NBA                 Reverse
                                  Routers &
                                  switches                              proxy
                                                                                                             Diameter is proportional to the
                   Monitoring
                     logs               Web                                                                         event amounts
                                       servers

                                                               Proxy

                                              OS logs
                        DB logs
                                     AIM
                                                                                                     relevance with respect to
                                                Email /
                                              smartphone                                             security information and
                                               gateways
                                                                                                      correlation capabilities
                               Network and
                            Application events /
                               information
                                                         security information value

www.arcsight.com                                                            © 2009 ArcSight Confidential                                       15
Standardized data collection?




                   We need a uniform way how computer events are
                          described, logged, and exchanged.




www.arcsight.com                      © 2009 ArcSight Confidential   16
Agenda

  • Security Monitoring
  • SIEM architectures
  • Use Cases




www.arcsight.com          © 2009 ArcSight Confidential   17
Use Case library

                                 Insider
                                  threat




                               Use Case
                                Library


                   Perimeter                                  Regulatory
                    Defence                                   compliance




www.arcsight.com               © 2009 ArcSight Confidential                18
SIEM audit report




www.arcsight.com      © 2009 ArcSight Confidential   19
Security Operations




www.arcsight.com        © 2009 ArcSight Confidential   20
Event Management




www.arcsight.com     © 2009 ArcSight Confidential   21
Conclusions

  • Carefully plan your SIEM migrations with business and operations!
  • Make checklists, cheat sheets and technical notes to educate your
    security analysts on new evolutions.
  • Keep a change log for SIEM content adaptations.
  • Think out-of-the-box, SIEM has a lot of potential but KISS towards
    the outside.
  • Request (simple) KPI’s on how your application/service is evolving.
  • Use intake templates to facilitate the scoping exercise towards your
    client.
  • Centralize your efforts, look for partners and create centre of
    excellence in your organization around security monitoring.



www.arcsight.com                © 2009 ArcSight Confidential           22
Questions?

                   stijn.vandecasteele@telindus.be

                   http://www.linkedin.com/in/ictsecurity

                   http://www.twitter.com/securityworld




www.arcsight.com                           © 2009 ArcSight Confidential   23

More Related Content

What's hot

SIEM presentation final
SIEM presentation finalSIEM presentation final
SIEM presentation final
Rizwan S
 

What's hot (20)

MISTI Infosec 2010- SIEM Implementation
MISTI Infosec 2010- SIEM ImplementationMISTI Infosec 2010- SIEM Implementation
MISTI Infosec 2010- SIEM Implementation
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk
 
McAfee SIEM solution
McAfee SIEM solution McAfee SIEM solution
McAfee SIEM solution
 
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
 
Implementing and Running SIEM: Approaches and Lessons
Implementing  and Running SIEM: Approaches and LessonsImplementing  and Running SIEM: Approaches and Lessons
Implementing and Running SIEM: Approaches and Lessons
 
SIEM vs Log Management - Data Security Solutions 2011
SIEM vs Log Management - Data Security Solutions 2011 SIEM vs Log Management - Data Security Solutions 2011
SIEM vs Log Management - Data Security Solutions 2011
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
Siem Overview 2009
Siem Overview 2009Siem Overview 2009
Siem Overview 2009
 
Identity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementIdentity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access Management
 
SIEM presentation final
SIEM presentation finalSIEM presentation final
SIEM presentation final
 
SIEM
SIEMSIEM
SIEM
 
HP ArcSight
HP ArcSight HP ArcSight
HP ArcSight
 
Whitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceWhitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security Intelligence
 
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
 
Big Data Security with HP ArcSight
Big Data Security with HP ArcSightBig Data Security with HP ArcSight
Big Data Security with HP ArcSight
 
IBM QRadar Xforce
IBM QRadar XforceIBM QRadar Xforce
IBM QRadar Xforce
 
How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...
 
SIEM
SIEMSIEM
SIEM
 

Viewers also liked

What's New Logrhythm 5.1 Data Sheet
What's New Logrhythm 5.1 Data SheetWhat's New Logrhythm 5.1 Data Sheet
What's New Logrhythm 5.1 Data Sheet
jordagro
 
LogRhythm Web Rhythm Data Sheet
LogRhythm Web Rhythm Data SheetLogRhythm Web Rhythm Data Sheet
LogRhythm Web Rhythm Data Sheet
jordagro
 
LogRhythm Advanced Agent Data Sheet
LogRhythm Advanced Agent Data SheetLogRhythm Advanced Agent Data Sheet
LogRhythm Advanced Agent Data Sheet
jordagro
 
LogRhythm Training Syllabus Data Sheet
LogRhythm Training Syllabus Data SheetLogRhythm Training Syllabus Data Sheet
LogRhythm Training Syllabus Data Sheet
jordagro
 

Viewers also liked (17)

SIEM - Your Complete IT Security Arsenal
SIEM - Your Complete IT Security ArsenalSIEM - Your Complete IT Security Arsenal
SIEM - Your Complete IT Security Arsenal
 
SIEM Architecture
SIEM ArchitectureSIEM Architecture
SIEM Architecture
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM
 
SIEM 101: Get a Clue About IT Security Analysis
SIEM 101: Get a Clue About IT Security Analysis SIEM 101: Get a Clue About IT Security Analysis
SIEM 101: Get a Clue About IT Security Analysis
 
Security Monitoring using SIEM null bangalore meet april 2015
Security Monitoring using SIEM null bangalore meet april 2015Security Monitoring using SIEM null bangalore meet april 2015
Security Monitoring using SIEM null bangalore meet april 2015
 
SANS Log Management 1
SANS Log Management 1SANS Log Management 1
SANS Log Management 1
 
建设SIEM/SOC/MSSP路上的点滴
建设SIEM/SOC/MSSP路上的点滴建设SIEM/SOC/MSSP路上的点滴
建设SIEM/SOC/MSSP路上的点滴
 
Maceo Wattley Contributor Infosec
Maceo Wattley Contributor InfosecMaceo Wattley Contributor Infosec
Maceo Wattley Contributor Infosec
 
How to Sell Security to Your CIO
How to Sell Security to Your CIOHow to Sell Security to Your CIO
How to Sell Security to Your CIO
 
Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachThreat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a Breach
 
What's New Logrhythm 5.1 Data Sheet
What's New Logrhythm 5.1 Data SheetWhat's New Logrhythm 5.1 Data Sheet
What's New Logrhythm 5.1 Data Sheet
 
LogRhythm Web Rhythm Data Sheet
LogRhythm Web Rhythm Data SheetLogRhythm Web Rhythm Data Sheet
LogRhythm Web Rhythm Data Sheet
 
LogRhythm Advanced Agent Data Sheet
LogRhythm Advanced Agent Data SheetLogRhythm Advanced Agent Data Sheet
LogRhythm Advanced Agent Data Sheet
 
Securityanalytics
SecurityanalyticsSecurityanalytics
Securityanalytics
 
LogRhythm Training Syllabus Data Sheet
LogRhythm Training Syllabus Data SheetLogRhythm Training Syllabus Data Sheet
LogRhythm Training Syllabus Data Sheet
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
 
Demo how to detect ransomware with alien vault usm_gg
Demo  how to detect ransomware with alien vault usm_ggDemo  how to detect ransomware with alien vault usm_gg
Demo how to detect ransomware with alien vault usm_gg
 

Similar to SIEM evolution

CCNA Security - Chapter 6
CCNA Security - Chapter 6CCNA Security - Chapter 6
CCNA Security - Chapter 6
Irsandi Hasan
 
Chapter 5 overview
Chapter 5 overviewChapter 5 overview
Chapter 5 overview
ali raza
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
Chrysostomos Christofi
 

Similar to SIEM evolution (20)

CCNA Security - Chapter 6
CCNA Security - Chapter 6CCNA Security - Chapter 6
CCNA Security - Chapter 6
 
CCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsCCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ips
 
Presentation cisco iron port product family
Presentation   cisco iron port product familyPresentation   cisco iron port product family
Presentation cisco iron port product family
 
Firepower ngfw internet
Firepower ngfw internetFirepower ngfw internet
Firepower ngfw internet
 
Chapter 5 overview
Chapter 5 overviewChapter 5 overview
Chapter 5 overview
 
Z111806 strengthen-security-sydney-v1910a
Z111806 strengthen-security-sydney-v1910aZ111806 strengthen-security-sydney-v1910a
Z111806 strengthen-security-sydney-v1910a
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Sklm webinar
Sklm webinarSklm webinar
Sklm webinar
 
IBM Security Intelligence
IBM Security IntelligenceIBM Security Intelligence
IBM Security Intelligence
 
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
 
Z110932 strengthen-security-jburg-v1909c
Z110932 strengthen-security-jburg-v1909cZ110932 strengthen-security-jburg-v1909c
Z110932 strengthen-security-jburg-v1909c
 
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco #ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
 
Confidential Computing overview
Confidential Computing overviewConfidential Computing overview
Confidential Computing overview
 
ICS case studies v2
ICS case studies v2ICS case studies v2
ICS case studies v2
 
Building a Security Architecture
Building a Security ArchitectureBuilding a Security Architecture
Building a Security Architecture
 
IBM Security Day, Cuenca - Ecuador
IBM Security Day, Cuenca - EcuadorIBM Security Day, Cuenca - Ecuador
IBM Security Day, Cuenca - Ecuador
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
 
General Version 9 21 09
General Version 9 21 09General Version 9 21 09
General Version 9 21 09
 
Seguridad en la Nube
Seguridad en la NubeSeguridad en la Nube
Seguridad en la Nube
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

SIEM evolution

  • 1. SIEM EVOLUTION A day in the life of a Security Architect Stijn Vande Casteele 28 September 2009
  • 2. Who are we / Key Brands www.arcsight.com © 2009 ArcSight Confidential 2
  • 3. International presence: Leading ICT integrator in Western Europe • Leading ICT integrator in Belgium, France & Luxembourg • 32 affiliates in Western Europe • Global reach through strategic partners Sensitivity : "Unrestricted" 28 September 2009 Slide www.arcsight.com © 2009 ArcSight Confidential 3
  • 4. What do I do? • My team provides solutions to underpin the on-site and managed SIEM services, with a focus on the what and the how! • Engineer a grid/cloud/infrastructure to deliver these services to customers (enterprises) with a focus on security operations. • Steer the service catalogue with fresh use cases (add value). • Integrate technologies with our architecture to build automations and enhance the richness of our SIEM clouds. • Data sources configuration documents • Automatic ticket creation • Portal visualizations • Self monitoring • 2nd line support for security management related infrastructure (application/systems) and forensic security investigations. • Advice in general on a diverse range of pre-sales and service questions within this domain. • Objective: centre of excellence (SIEM think-thank for the Belgacom group) www.arcsight.com © 2009 ArcSight Confidential 4
  • 5. Agenda • Security Monitoring • SIEM architectures • Use Cases www.arcsight.com © 2009 ArcSight Confidential 5
  • 6. Firewall Security Monitoring Outbound Logs SIEM Inbound Top Drops Outbound Top Drops Active list with Can spot infected confirmed scanners from internal systems or Internet configuration errors (eg. If firewall accepts from IP wrong DNS or NTP client addresses in the active list, configuration) increase event priority www.arcsight.com © 2009 ArcSight Confidential 6
  • 7. Security Analysis • Unlike firewalls, IDS/IPS provides information up to OSI layer 7 via signature based detection methods • Typical attacks detected by IDS/IPS: Worms, Exploits, Brute force attacks, Backdoors, Cover channels. • IDS/IPS are best placed where “threat x asset value” is high (eg. DMZ, server farm) • IDS/IPS provide input for SIEM tools to correlate with Vulnerability and Asset (VA) data Z Z www.arcsight.com © 2009 ArcSight Confidential 7
  • 8. Monitoring WiFi GUEST traffic END-USER CISCO ASA CISCO WLC Internet End-User MAC Address End-User IP Address End-User IP Address Web Target Address End-User Account Name Web Target Port End-User MAC Address End-User IP Address End-User Account Name Web Target Address Web Target Port www.arcsight.com © 2009 ArcSight Confidential 8
  • 9. Monitoring business risks Confidentiality Protecting sensitive information from unauthorised disclosure or malicious interception. Business Availability Ensuring that vital IT services and information are available when impact required. Integrity safeguarding the accuracy and completeness of information www.arcsight.com © 2009 ArcSight Confidential 9
  • 10. Agenda • Security Monitoring • SIEM architectures • Use Cases www.arcsight.com © 2009 ArcSight Confidential 10
  • 11. Some history… ArcSight 2.1 (Sept 2003) ArcSight 2.2 (POC) ArcSight 2.5 (Production Jan 2004) ArcSight 3.0 (Production Oct 2004) ArcSight 3.5 (Production Mar 2006) ArcSight 4.0 (Production Sept 2007) www.arcsight.com © 2009 ArcSight Confidential 11
  • 12. Telindus hardware tests Two different hardware platforms were tested from an ArcSight manager performance perspective: Model Architecture CPU RAM OS Sun SPARC SPARC T1 1 x 8 core (1.2 GHz) 32 GB Solaris 10 T2000 Sun Fire X2100 AMD X_64 1 x dual core (1.8 GHz) 4GB Red Hat 4.5 • As the biggest factor in database performance is the available RAM and the SAN read / write speed, the OS / architecture is not so influential. • It seems to Telindus that ArcSight 4.0 JRE is not optimized to make use of the multi-thread (CMT) possibilities of the SUN T1 processor. The AMD X_64 / Red Hat platform significantly outperformed the SPARC T1 / Solaris platform. www.arcsight.com © 2009 ArcSight Confidential 12
  • 13. ArcSight test graph Y-Axis = EPS (000’s) X-Axis = Number of core CPUs Y-Axis = EPS (000’s) X-Axis = Number of core CPUs www.arcsight.com © 2009 ArcSight Confidential 13
  • 14. Security Event Lifecycle www.arcsight.com © 2009 ArcSight Confidential 14
  • 15. Log Sources Security Network Intrusion events and information Prevention Systems NIPS Firewalls AV VA data HIPS FW Web Content screening NBA Reverse Routers & switches proxy Diameter is proportional to the Monitoring logs Web event amounts servers Proxy OS logs DB logs AIM relevance with respect to Email / smartphone security information and gateways correlation capabilities Network and Application events / information security information value www.arcsight.com © 2009 ArcSight Confidential 15
  • 16. Standardized data collection? We need a uniform way how computer events are described, logged, and exchanged. www.arcsight.com © 2009 ArcSight Confidential 16
  • 17. Agenda • Security Monitoring • SIEM architectures • Use Cases www.arcsight.com © 2009 ArcSight Confidential 17
  • 18. Use Case library Insider threat Use Case Library Perimeter Regulatory Defence compliance www.arcsight.com © 2009 ArcSight Confidential 18
  • 19. SIEM audit report www.arcsight.com © 2009 ArcSight Confidential 19
  • 20. Security Operations www.arcsight.com © 2009 ArcSight Confidential 20
  • 21. Event Management www.arcsight.com © 2009 ArcSight Confidential 21
  • 22. Conclusions • Carefully plan your SIEM migrations with business and operations! • Make checklists, cheat sheets and technical notes to educate your security analysts on new evolutions. • Keep a change log for SIEM content adaptations. • Think out-of-the-box, SIEM has a lot of potential but KISS towards the outside. • Request (simple) KPI’s on how your application/service is evolving. • Use intake templates to facilitate the scoping exercise towards your client. • Centralize your efforts, look for partners and create centre of excellence in your organization around security monitoring. www.arcsight.com © 2009 ArcSight Confidential 22
  • 23. Questions? stijn.vandecasteele@telindus.be http://www.linkedin.com/in/ictsecurity http://www.twitter.com/securityworld www.arcsight.com © 2009 ArcSight Confidential 23