LogRhythm Threat Detection Cookbook. LogRhythm Labs Threat Intelligence
|
|
|
- Noel Gordon Johnston
- 9 years ago
- Views:
Transcription
1 LogRhythm Threat Detection Cookbook LogRhythm Labs Threat Intelligence
2 Contents Attack SQL Injection...3 Exploit Scanner User-Agents...4 URL-Encoded Control Characters...5 Cross-Site Scripting...6 Excessive HTTP Errors...7 Repeat Signature Detection...8 Bad Bot User-Agents...9 Denial of Service Web Server DDoS Attack...10 Compromise Internal Attack then Privilege Escalation...11 Lateral Movement then External Connection...12 Vulnerability Exploited Internally...13 Malware Malware Not Cleaned...14 Outbreak Spamming Zombie...16 Network Anomaly Common Applications on Non-Standard Ports...17 Non-Standard Use of Common Ports...18 Threat List-TOR Server or TOR Exit Node...19 Connection with Non-Whitelisted Country...20 Host Compromised-Recon Followed By Attack...21 Attack Followed by Firewall Allow...22 Excessive Firewall Denies...23 Rogue Host Detection...24 Internationalized Domain s...25 Suspicious Top Level Domains...26 Account Anomaly Failed Non-Primary Exchange Account Authentication...27 Recently Disabled Account Access Activity...28 Account Created, Used, Deleted...29 New Administrator Activity...30 Audit Disabled by Admin...31 Concurrent VPN Connections...32 Password Modified By Another User...33 Abnormal Origin Location...34 Abnormal File Access...35 Abnormal Process Activity...36 Abnormal Authentication Behavior...37 Abnormal Amount Of Audit Failures...38 Behavioral Anomaly New Common Event...39 Abnormal Process Activity by Host...40 Recon Port Scan: Slow...41 Vulnerability Vulnerability After Software Install...42 Operations Ops Warning: Abnormal Log Volume Fluctuation
3 Attack SQL Injection Because they are one of the few services on a network that accept inbound connections, Web Applications are a common entry point for attackers. SQL Injection attacks are one of the most prevalent threats that they face. In these attacks, the adversary attempts to execute commands on the remote host by sending commands to the back-end database through unprotected input channels. While attackers have many methods to obscure their attacks, the majority of the attacks will require use of a set of common characters. This LogRhythm AI Engine rule checks for common URL-encoded SQL Injection strings and alerts on attacks. This rule should be configured to watch Web Server logs, though if the environment has employed additional protections such as a Web Application Firewall, S/IPS, and/or a network Firewall, these logs should feed into the AIE rule as well to alert on all attacks. Web Server Logs Intrusion Detection / Prevention Logs Web Application Firewall Logs Perimeter Firewall Connection Logs Ext:Host Atck:SQL Injection 95 All Access Logs and Error Logs should be captured from the Web Application logs. Any time these strings are observed either entering the network from an external source, this alarm will trigger. Attacks that make it past base-network defenses and are observed in the server logs should be evaluated to determine if the attack was successful, and if so, what the attacker was able to obtain using the SQL Injection attack. Any open SQL Injection vulnerabilities should be remediated in the application by accepting only parameterized queries in order. 3
4 Attack Exploit Scanner User-Agents There are many tools available for finding and exploiting vulnerabilities in web applications, and although changing User-Agent values is trivial, a significant portion of attackers don't bother changing the easily-identifiable defaults. For example, "Havij" is a tool that can automatically inject a SQLi attack into a vulnerable web server -- by default, the string "Havij" will be in the User-Agent and thus easily detected in server logs. Being aware of this malicious activity is the first step towards mitigation. At least one of the following web server logs must be collecting: Error logs Access logs Ext:Malicious User-Agent 115 By default, web server logs for Apache and IIS will be filtered. If the local deployment uses a custom log source that parses the User-Agent string to the <object> metadata field, it will work here as well. Follow-up investigation can be performed by analyzing associated metadata and utilizing LogRhythm's expansive queries: Investigate the source IP address in the SIEM for other suspicious activity originating from that host Launch an additional investigation using the User-Agent string as the "object" field Utilize the "WAD: Attacking IPs" investigation layout for quicker visibility into the origin of this alarm Enable the smart response plugin "Add Item To List" -- described in the Activate Smart Response Plugin section of the deployment guide -- to automatically create and maintain a list of malicious IP addresses Use LogRhythm Network Monitor to search for additional traffic Use LogRhythm Network Monitor to collect packet capture for HTTP sessions 4
5 Attack URL-Encoded Control Characters Many web applications are vulnerable to code injection attacks -- in this case, attacks via HTTP requests that contain URL-encoded control characters in the URI. These requests can be identified by matching a list of suspicious URL-encoded characters with observed traffic. Some investigation may be required to eliminate false positives, but once malicious activity is identified, rules for blocking should be relatively easy to implement. One of the following types of web server Log Sources must be collecting: Error logs Access logs Ext:Suspicious URL Characters 116 Int:Suspicious URL Characters 117 By default, web server logs for Apache and IIS will be filtered. If the local deployment uses a custom Log Source that parses the User-Agent string to the <object> metadata field, it will work here as well. Once this rule is triggered, investigate the root cause by analyzing associated metadata and utilizing LogRhythm's expansive queries: Investigate the source IP address for other suspicious activity originating from that host Utilize the "WAD: Attacking IPs" investigation layout for quicker visibility into the origin of this alarm Enable the smart response plugin "Add Item To List" -- described in the Activate Smart Response Plugin section of the deployment guide -- to automatically create and maintain a list of malicious IP addresses Use LogRhythm Network Monitor to search for additional traffic Use LogRhythm Network Monitor to collect packet capture for HTTP sessions 5
6 Attack Cross-Site Scripting Vulnerable Web Applications can be used to infect unsuspecting visitors in a Cross-Site Scripting attack (XSS) -- attackers can embed JavaScript within the application (persistent XSS) or utilize social engineering and a specially crafted link (reflected XSS). When a user clicks these links, or in some cases even visits a compromised web page, the client-side code will execute, and any number of actions can be performed: hijacking the user's browser, injecting malware, stealing session tokens, sniffing the user's traffic, and browsing intranet applications. The following combination of log sources covers both server and clients. Web Server Logs Intrusion Detection/ Prevention Logs Web Application Firewall Logs/Perimeter Firewall Connection Logs Web Proxy Logs User System Logs Ext:Host Atck:XSS Attack 97 Int:Host Atck:XSS Attack 98 It is important to note that these attacks can happen both on internal, organization-run applications as well as popular, external applications. However, the most important logs to monitor for this activity on are the application logs -- all Access Logs and Error Logs should be captured. This alarm will trigger any time the "<script>" tag is observed in one of two places: within a URL that a user is visiting or when an attacker attempts to inject into a web form. Attacks that make it past base-network defenses and are observed in the server logs should be evaluated to discover what may have resulted from the attack. Any XSS vulnerabilities discovered within company-owned applications should be remediated within the application by properly escaping all user supplied input. 6
7 Attack Excessive HTTP Errors As an attacker probes web applications for vulnerabilities, the web servers may generate dozens or hundreds of HTTP errors. This rule looks for an origin host logging 20 or more unique HTTP errors in 2 minutes. In addition to preemptively detecting potential attacks, tracking HTTP errors can also find broken links and other problems with web servers affecting normal use. The following log source must be collecting: Web server Ext:Recon:Excessive HTTP Errors 89 The logs from your web server must use the common events listed in the AIE rule. Optional: Broken links can cause web crawlers like Googlebot to trigger many of these alarms. If it's impractical to resolve all the known issues with a web site, it's advisable to add an exclude filter for repeated visits by crawler hosts. Follow-up investigations should be done to determine if the web server was successfully compromised. Similarly, this rule should prompt closing of new vulnerabilities as they are discovered. 7
8 Attack Repeat Signature Detection This AI Engine rule looks for 10 or more attack, malware, or other security activity logs in a short time span. Such redundancy reduces the chance of being bogged down by one-off false positives. Using the Vendor Message field as the Group By value will focus on devices like Ss that assign signature values. The following log source types must be available Intrusion Detection System logs Malware Scanner logs Ext:Host Atck:Repeat Signature Detected 496 None required. This alarm is a strong indication that a host has been compromised or infected with malware. To determine if the host is actually compromised, run an investigation on the target host looking for additional suspicious activity -- the target host may be either the origin or impacted, based on the signature that was detected. It may also be helpful to look for other alarms affecting the same host. 8
9 Attack Bad Bot User-Agents Many webcrawlers, scrapers, crawlers, spiders, etc will constantly scan web servers for vulnerabilities -- these are collectively categorized as Bad Bots. Although their UserAgents can be easily changed, many will use their defaults. Using this rule will allow web server admins to block such scans as new ones arise. At least one of the following web server logs must be collecting: Error logs Access logs Ext:Bad Bot User-Agent 487 Int:Bad Bot User-Agent 486 By default, web server logs for Apache and IIS will be filtered. If the local deployment uses a custom log source that parses the User-Agent string to the <object> metadata field, it will work here as well. Once this rule is triggered, investigate the root cause by analyzing associated metadata and utilizing LogRhythm's expansive queries: Investigate the source IP address for other suspicious activity originating from that host Launch an additional investigation using the User-Agent string as the "object" field Utilize the "WAD: Attacking IPs" investigation layout for quicker visibility into the origin of this alarm Enable the smart response plugin "Add Item To List" -- described in the Activate Smart Response Plugin section of the deployment guide -- to automatically create and maintain a list of malicious IP addresses Use LogRhythm Network Monitor to search for additional traffic Use LogRhythm Network Monitor to collect packet capture for HTTP sessions 9
10 Denial of Service Web Server DDoS Attack Distributed denial-of-service attacks (DDoS) involve a large number of remote hosts making many requests of a specific server with the intention of exhausting its resources or saturating the network connection to the point of effectively taking the server offline. This rule creates a 20 minute traffic baseline and alarms when the following 20 minute period contains at least 25 times the number of connections from unique remote hosts. Utilize the following log source types: Collection of network traffic logs impacting the web server Susp:Web Server DDoS Attack 456 List NBAD: Internal/DMZ Webservers This AIE rule by default filters on a list of web servers. Populate this list with hosts the rule should analyze. Because of the high resource cost of behavioral rules, it is advised to only configure this rule to monitor hosts which are susceptible to external denial of service attacks. Mitigating the effects of DDoS attacks typically requires specialized services 10
11 Compromise Internal Attack then Privilege Escalation After a malicious actor has successfully carried out the first stages of attacking a system, they will frequently seek to escalate their privileges to gain further access and spread across the infected network. Fortunately, these account actions will be logged and can be detected when following an attack or compromise. The following log sources must be collecting: Windows Security Event Logs or Unix host logs Security devices, both network and host-based, that can identify successful compromises and attack events. Compromise: Internal Attack then Privilege Escalation 63 In the Local Security Policy on Windows hosts, make sure Audit Account Management is turned on. If a system has been successfully compromised, and a malicious actor is actively creating and modifying accounts to gain access to more systems, it's extremely important to lock the impacted accounts and systems as quickly as possible. 11
12 Compromise Lateral Movement then External Connection After compromising a system and strengthening their foothold, malicious actors will likely attempt to exfiltrate valuable data -intellectual property, network enumeration, financial data, etc -- from the compromised network. LogRhythm Advanced Intelligence Engine can detect when a newly-compromised machine begins making outbound connections, and quickly reacting to this alarm can prevent excessive loss of an organization's data. The following log sources must be collecting: Network monitoring device tracking outbound connections Security devices, both network and host-based, that can identify successful compromises and attack events. Compromise: Lateral Movement then External Connection 60 This rule is dependent on other security devices in the network being able to detect Attack and Compromise events. For example, an S detecting an infected host beaconing to a known malware server or Anti-Virus triggering on successful malware execution. Internal Attack and Compromise events should already be priorities for follow-up investigation, and this rule should be treated as an even more threatening. If this rule is triggered correctly, the infected machine has already begun to exfiltrate data and should be immediately disconnected from the network. The source of the compromise should be quickly identified and also stopped from further spread. 12
13 Compromise Vulnerability Exploited Internally Vulnerability scanners allow security operations teams to actively find attack vectors before they are exploited. When this knowledge is integrated into LogRhythm, other corresponding events, such as Attacks, can be put into context. For example, this rule looks for attack events on a specific host. If that attack vector is a known vulnerability, based on scan results, then this rule will trigger. The following log sources must be collecting: Vulnerability Scanner Security devices, both network and host-based, that can identify attack events. Compromise: Vuln Exploited Internally 109 Collection from a vulnerability scanner to LogRhythm must be configured. If a vulnerability and attack event are corroborated on the same host, there is a very high chance of malicious activity. This alarm should be quickly followed up with an investigation into the circumstances of the attack. Post-cleanup, it should be determined if the vulnerability can be eliminated or at least mitigated to prevent further incidents. 13
14 Malware Malware Not Cleaned In some cases, a malware removal tool will quarantine or delete malware only for it to pop back from memory or another hiding place. This rule will find instances where a malware cleaning event is followed by a malware detection event on the same host. One or more of the following Log Source types must be collecting: Antivirus Intrusion Detection Systems Gateway Any other device that can identify malware Malware: Not Cleaned 509 For antivirus software installed on individual hosts, each host will need to forward the AV logs to the SIEM. If the organization is using an AV system that already collects from all hosts, then this system's logs can be used. Persistence in malware is a particularly dangerous sign -- on top of being hard to remove, it likely means that malware has other advanced capabilities and may be lurking elsewhere. In this case, reformatting the machine is likely the only solution. 14
15 Malware Outbreak Several malware events emanating from different hosts within the organization may be an indication that malware has begun to spread throughout the network. It may also mean those hosts are falling victim to an external zero-day exploit or other similar, external security event. In any case, an outbreak is more threatening than an isolated infection and should be treated accordingly. One or more of the following Log Source types must be collecting: Antivirus Intrusion Detection Systems Gateway Any other device that can identify malware 72 Malware: Outbreak For antivirus software installed on individual hosts, each host will need to forward the AV logs to the SIEM. If the organization is using an AV system that already collects from all hosts, then this system's logs can be used. For a large infection, it's important to quickly stop the malware from spreading. Quarantine infected hosts before doing in depth analysis or remediation. 15
16 Malware Spamming Zombie Spammers may find and use open SMTP relays to send spam -- this is generally done over SMTP connections on ports 25 or 587. On the organizational network, most traffic is workstations communicating with an Exchange server, and thus the organization's mail servers should be the only hosts making outbound SMTP connections (when users check their externally-hosted, personal , it's generally through a web UI over port 443). By monitoring for any systems other than mail servers attempting to make outbound SMTP connections, potential spamming activity can be discovered. One of the following log source types must be collecting: Perimeter Firewall Connection Logs LogRhythm Network Monitor or other perimeter flow data Int:Host Comp:Spamming Zombie 53 An exclude filter should be added where Origin Host = Mail Servers. It's best practice to create a list of mail servers and utilize this list in the exclude filter. Any time a non-mail server attempts to make an SMTP connection, this AIE rule will fire. The origin host should then be investigated further to determine if it has been compromised. 16
17 Network Anomaly Common Applications on Non-Standard Ports Malware may use common network protocols like HTTP and SSH to hide command and control communication among legitimate traffic. However, the malware operator may find it easier for configuration and collection purposes to use a non-standard port. By dissecting network traffic at the application layer, Network Monitor is able to properly label applications and find such port mismatches. At least one of the following Log Sources must be collecting: LogRhythm Network Monitor An equivalent network protocol analyzer Detects Susp:Port Misuse:HTTP HTTP traffic not using standard port Susp:Port Misuse:SSH Out Outbound SSH traffic not on standard SSH port Susp:Port Misuse:SSH In Inbound SSH traffic not using standard SSH port Network Monitor can be configured for full packet captures per application of interest -- having this content will help with follow-up investigations. The rules shown here can be used to detect other applications that might be used for covert channels -- this will allow for easy, customized expansion based on each enterprise's particular network footprint. Note that an alert does not necessarily mean that a host is infected, and it may be desirable to whitelist known hosts or IPs that trigger the alert. Alerts generated by these rules may be indications of malware infection. This can be confirmed by examining the host machine exhibiting the behavior, looking for additional alerts, suspicious log activity, or by collecting and analyzing the content of the network traffic between the host and the traffic's destination. 17
18 Network Anomaly Non-Standard Use of Common Ports In order to hide command and control communication among legitimate traffic, malicious implants may use standard protocol ports even if their covert channels don't conform to protocol standards. Because LogRhythm Network Monitor can accurately identify protocols without relying solely on port, it is able to detect port misuse by such malware. At least one of the following Log Sources must be collecting: LogRhythm Network Monitor An equivalent network protocol analyzer Detects Susp:Port Misuse:80 non-http traffic using standard HTTP port Susp:Port Misuse:53 non-dns traffic using standard DNS port Susp:Port Misuse:22 non-ssh traffic using standard SSH port Susp:Port Misuse:443 non-ssl/tls traffic using standard port List NBAD: Search: SSL/TLS 260+ Netmon-defined web apps that use 443 (eg gmail amazon netflix) 2171 Network Monitor can be configured for full packet captures per application of interest -- having this content will help with follow-up investigations. The rules shown here can be used for any combination of ports and protocols - this will allow for easy, customized expansion based on each enterprise's particular network footprint. Note that an alert does not necessarily mean that a host is infected, and it may be desirable to whitelist known, legitimate applications that trigger the alert. For HTTPS applications that use 443, the whitelist is already provided as NBAD Search SSL/TLS. Alerts generated by these rules may be indications of infection. This can be confirmed by examining the host machine exhibiting the behavior and/or by collecting and analyzing the network traffic collected between the host and the traffic's destination. 18
19 Network Anomaly Threat List-TOR Server or TOR Exit Node This pair of AI Engine rules looks for communication involving hosts associated with the TOR network. Within most corporate networks, it is unlikely that hosts or users have acceptable reasons for utilizing TOR. Because these rules are designed to alarm on either inbound or outbound network traffic, one of two things may be occurring: a host on the TOR network is sending traffic to your network, which may indicate an attack or reconnaissance event; or a device on the network is communicating with a TOR host, which could indicate a network user joining the TOR network. Utilize the following log sources: Any log data that parses IP addresses or hostnames with IPto resolution enabled Ext:Susp:Threat List:Tor Exit Node 484 Ext:Susp:Threat List:Tor Server 485 List Threat List: Tor Servers List Threat List: Tor Exit Nodes To use these threat lists, LogRhythm-provided PowerShell scripts must be scheduled to update the lists. See the Third Party Threat List Integration Guide for details. Be mindful that the actual purpose for using TOR cannot be known by this alarm alone, and the internal or external TOR user could be using anonymity for benign purposes. To determine this, first look at directionality -- it should be clear whether the traffic is originating inside or outside of your network. For inbound traffic, run an investigation over the time period covering the traffic, and set origin or impacted host to the TOR host. If the traffic is outbound, an investigation on that host will help determine if it is compromised, or if there is a potential policy violation by a user joining a TOR network. 19
20 Network Anomaly Connection with Non-Whitelisted Country Although many organizations are multinational and regularly have VPN connections from external countries, connections from countries that don't have an organizational presence should be suspicious. This rule detects VPN connections from countries not in a custom whitelist. The following types Log Sources must be collecting: Firewall Perimeter Flow Data LogRhythm Network Monitor or equivalent network protocol analyzer Susp:Inbound Connection With Non-Whitelisted Country 439 Susp:Outbound Connection With Non-Whitelisted Country 454 The "NBAD White Listed Countries" System List should be populated with allowed countries. Whenever there is an inbound connection attempt from a country not on the whitelist, an AIE event will be generated. The origin IP should then be investigated for other suspicious activity. 20
21 Network Anomaly Host Compromised-Recon Followed By Attack Generally, reconnaissance will be performed on a network before an attack is launched. Attackers will fingerprint hosts and applications to determine if any operating systems or applications are vulnerable before using known exploits against them. By utilizing network security monitors that can detect reconnaissance techniques, this activity can be detected. A combination of the following Log Sources can be used Intrusion detection devices Network security monitoring devices Ext:Host Comp:Recon Followed By Attack 20 Int:Host Atck:Recon Followed By Attack 54 Optional: Create an Exclude Filter for Origin Host in Rule Block 1 and/or Rule Block 2 where the Origin Host is the name of any vulnerability scanners. There are two versions of this rule: Internal and External. This rule will fire when external reconnaissance is followed by an attack on the same machine, indicating an attack pattern. The origin host should then be investigated further to determine if it has been compromised. 21
22 Network Anomaly Attack Followed by Firewall Allow Intrusion Detection Systems are designed to detecting malicious activity traversing the network, but may not always be able to determine if an attack was successful. This rule looks for an Attack event followed by allowed traffic between the same two hosts. This could be an indication that an attack was successful and the attacker is exploiting the compromised system. The following log sources must be collecting: Intrusion Detection System LogRhythm Network Monitor or equivalent network protocol analyzer Susp:Attack Followed By Firewall Allow 420 Optional: Create an Exclude Filter in Rule Block 1 for publicly available services such as: Impacted Host is a web server and Impacted Port is 80. The host should be further investigated for evidence of possible infection. 22
23 Network Anomaly Excessive Firewall Denies A spike in firewall denies can indicate any number of issues -- from external vulnerability scans, to malware beaconing, to users running non-standard services. This rule alerts security analysts to begin investigating this suspicious behavior. The following log sources must be collecting: Firewalls Susp:Excessive External FW Denies 453 Susp:Excessive External FW Denies Flwd By Allow 472 Susp:Excessive FW Accepts to Multiple IHosts 423 This rule will look for 400 or more firewall denies for a single origin host within a 5 minute window. The threshold should be adjusted based on use case. For instance, if looking for a user attempting to access an external FTP site for possible data exfiltration, the threshold should be set much lower. Based on tuning, this rule should be the starting point for further investigation. 23
24 Network Anomaly Rogue Host Detection New, unauthorized hosts are known as Rogue Hosts. These devices may be used by malicious actors as backdoors into the network or data exfiltration proxies leaving the network. Visibility into new hosts allows for such activity be detected before breaches spin out of control. This rule will alarm on all new host activity in the past 10 days and compare live data to past collection. The following prerequisites must be met: Collecting from a device that shows network traffic LogRhythm Network Monitor OR Firewall traffic OR Netflow, etc Define all internal networks ranges if possible. At the very least define your internal wireless network ranges In Log Manager advanced settings, turn on DNSIPTo resolution Susp:Rogue Host Detection 383 When turning on this rule for the first time, turn on suppression for 2 or 3 days to create an accurate baseline. After this period, turn off suppression. Anytime a new host shows up that is not in the 10-day baseline, the LogRhythm user will be able to see this event. It's not uncommon for many false positives to be generated as the baseline continues to solidify. New hosts should be investigated to ensure they are authorized. 24
25 Network Anomaly Internationalized Domain s Since 2009, the Domain System has supported URLs that contain non-ascii, Unicode characters from Cyrillic, Chinese, Arabic, etc. Even symbols are now included. These new domains are known as Internationalized Domain s (N). These new characters allows for a potential 'Homographic Attacks' -- registering a malicious site using characters that are technically distinct yet visually identical to ASCII counterparts, and then exploiting this fact via phishing or other means. Additionally, the Punycode representation of Unicode may confuse users and result in a phish. For example, 'logrhythm.com' with a trademark symbol in Unicode will be represented as 'xn-logrhythm-cma.com' in Punycode/ASCII. Both may appear legitimate in the eyes of unsuspecting users. At least one of the following Log Sources must be collecting: LogRhythm Network Monitor An equivalent network protocol analyzer AIER Susp:N 537 Because most Ns are not used for malicious purposes, legitimate domains that are frequently seen within the organization can be excluded in the AIE rule block to eliminate false positives. When this alarm is seen from hosts within the network, they should be investigated for signs of an infection or successful phishing attempt. 25
26 Network Anomaly Suspicious Top Level Domains Many Top Level Domains (TLDs) have been identified as having an inordinate amount of malicious domains. Malicious entities (eg, botnet controllers or exploit kits landing pages) will frequently exploit lax registration policies to create their malicious infrastructure using these TLDs. In addition to supplying a list of several suspect TLDs, this rule allows each organization to specify their own in an ad hoc fashion. At least one of the following Log Sources must be collecting: LogRhythm Network Monitor An equivalent network protocol analyzer AIER Susp:Atypical TLDs 538 The default suspicious domains are ru, cc, ua, ro, am, cl, ms, pl, su, tk, com.co, xn--p1ai -- any additions can be customized, but should following the same regex formatting. It's likely that false positives will occur before tuning to the organization's network. TLDs can either be removed from this list or individual domains can be added to the exclude section of the AIE rule block. A whitelist of legitimate domains using these TLDs is also provided as the list 'Top Common Domains on Suspicious TLDs'. Traffic to these suspicious TLDs should be further investigated to see if the domain should be whitelisted or is actually malicious. Hosts visiting these malicious sites should then be examined to determine if they are compromised. 26
27 Account Anomaly Failed Non-Primary Exchange Account Authentication Restricting and tracking IT administrator access to sensitive data is difficult. Fortunately, in addition to having visibility into the audit trails necessary to track such activity, LogRhythm also prevents that trail from being deleted. This alarm rule detects attempts by a user to access specified Exchange accounts specified in the "PUM: Sensitive Users s", assuming that user isn't also the primary user on the machine initiating the authentication. The following types of Log Sources must be collecting: Windows Security Event Logs Acnt Susp:Multiple Failed Attempts To Logon To Non-Primary Exchange Account 163 Ensure MS Exchange is configured to audit access control and logon activity. This is documented in the "Privileged User Monitoring" deployment guide. Once this rule is triggered, investigate the root cause by analyzing associated metadata and utilizing LogRhythm's expansive queries: Launch an additional investigation by setting origin login to the suspect user, targeting all log sources to find other activity from the account. To build a more complete picture on what the user has been up to, launch an additional investigation by setting account to the suspect user. Utilize the "PUM: Privileged User Activity" investigation layout for quicker visibility into the origin of the alarm Enable the smart response plugin "Disable Local windows Account" to automatically disable the user account. This is described in the "Activate Smart Response Plugin" section of the deployment guide. 27
28 Account Anomaly Recently Disabled Account Access Activity When a privileged user leaves an organization, it can be difficult to find and remove all previous accesses and authorizations. Monitoring for account deleted or account disabled events allows for correlations to be made when these events are followed by access failures or authentication failures -these are indications that a individual is probing for any old access privileges still present in the network. One of the following log source types must be collecting: Windows Security Event Logs \nix host logs Acnt Susp:Recently Disabled Account Access Failures 76 Acnt Susp:Recently Disabled Account Access Success 88 Acnt Susp:Recently Disabled Priv Acnt Access Failures 513 Acnt Susp:Recently Disabled Priv Acnt Access Success 512 In the Local Security Policy on Windows hosts, make sure Audit Account Management is turned on for successes and Audit Account Logon events is turned on for success and failures. After an employee has left an organization and unsuccessfully attempts to access network resources, this alarm will trigger. First, verify all access has been removed from that user's account. Additionally, the user should then be investigated in LogRhythm to see why they were attempting unauthorized access. 28
29 Account Anomaly Account Created, Used, Deleted Attempting to hide their tracks, a malicious insider might create a temporary account for performing malicious activity. This will allow them to access data or some other resource through this proxy account before deleting it. This rule will detect such activity and maintain the evidence trail. Utilize the following log sources: Windows Domain Control Security Event Logs Acnt Susp:Account Created Used Deleted 37 None required. If suspicious, users that trigger this alarm should be questioned about their activity. An Investigation should be launched to determine the activity performed by the temporary account, and this should be used to verify the original user's story. 29
30 Account Anomaly New Administrator Activity Tracking administrator actions is useful for both auditing potential privilege abuse and for security monitoring. This rule is part of the Privileged User Monitoring (PUM) module and will alarm when accounts are added to groups that have elevated privileges. Both malicious actors and rogue administrators may create additional accounts in order to hide their trail -- but they will not escape this rule. Utilize the following log sources: Populate the list PUM: Privileged Groups with privileged groups relevant to your organization Windows Security Event Logs \nix host logs Acnt Audit:New Administrator Activity 164 In the Local Security Policy on Windows hosts, make sure Audit Account Management is turned on for successes. Optional: Configure smart response to automatically add this user to the privileged user list for use with other PUM AI Engine rules. New users added to a privileged group should be confirmed as legitimate -- otherwise, they should be considered malicious and deleted before determining their origin. 30
31 Account Anomaly Audit Disabled by Admin After achieving privilege escalation, a malicious actor will attempt to hide their tracks. This means removing data from logs, hiding malicious files, and disabling audits. Fortunately, LogRhythm collects from logs in real time, meaning that these events can be tracked. Utilize the following log sources: Windows Security Event Logs \nix host logs Int:Susp:Audit Disabled By Privileged User 36 In Windows, make sure the audit object access setting is turned on for successes and failures in the local security policy. If audits are being disabled, it's highly likely that malicious activity is taking place. Immediately launch LogRhythm investigations on the Log Source where this is occurring. 31
32 Account Anomaly Concurrent VPN Connections Users will typically only have a VPN connection from one IP address at a time. If a parallel VPN connection is detected from a different source, this may be indication that the credentials of that user have been compromised and are being used by a malicious actor. This rule will detect such concurrent connections. Utilize the following log source: VPN Logs Ext:Acnt Comp:Concurrent VPN Auths From Same User 75 Optional: Users that have legitimate, concurrent VPN connections can be whitelisted for reduced false positives. When this rule fires, an investigation should be launched against the user in question to discover any malicious activity. 32
33 Account Anomaly Password Modified By Another User Typically, users should only be modifying their own password, and awareness of external password changes could be indication of an account compromise. For example, this rule will fire if a malicious user is changing passwords for easier access. One of the following log source types must be collecting: Windows Security Event Logs \nix host logs Acnt Audit:Password Modified By Another User 250 For Windows hosts, make sure Audit Account Management is turned on for successes in the local security policy. To eliminate potential false-positive alarms for IT administrators changing passwords, create a list of all IT admins and then exclude that list from the origin logins. Although this will cut down on excessive alarms, keep in mind that it may also leave a blind spot if an administrator is compromised. Anytime a user is seen modifying a password on an account that is not their own this rule will trigger. The origin login field will show the user who modified the password; the account field will show the account that has been modified. The user modifying another account\u2019s password should be investigated to make sure it is legitimate activity. 33
34 Account Anomaly Abnormal Origin Location If a user authenticates to the network from an atypical physical location, this may be a sign that the user's account has been compromised and is being accessed by a malicious actor. This rule will track locations on a per user basis, baselining log in origins for the past 30 days. Once a user authenticates from a location not seen in that period, the rule will trigger. One or more of the following Log Source types must be collecting: Windows Security Event Logs \nix host logs Any logs tracking authentication activity Acnt Susp:Abnormal Origin Location 288 In Windows, make sure the audit object access setting is turned on for successes and failures in the local security policy. This rule will most likely be activated frequently as users travel and log into the network remotely -- the first step to reducing these false positives will be to create a list of frequent travelers that can be excluded from this rule. A secondary exclude list could be made for locations where individual users will infrequently visit, but still see regular access by the company as a whole (eg, a training center where several employees only visit once per year). By default, this rule will create an event and not an alarm. Ultimately, this rule is best used when paired with additional indications of account compromise. If investigating a suspicious login, perform the following: Launch an additional investigation using the suspect username as origin login Launch an additional investigation using the suspect username as account Enable the smart response plugin "Disable Local Windows Account" to automatically disable bad acting users. This is described in the Activate Smart Response Plugin section of the deployment guide. 34
35 Account Anomaly Abnormal File Access File Integrity Monitoring (FIM) allows LogRhythm to track access and changes to important files. Additionally, by trending an individual user's weekly access to files under FIM protection, LogRhythm can find deviations from week to week that may be indications of account compromise or an insider threat -specifically, accessing either a different set of sensitive files (only 25% similarity) between weeks or accessing many more unique objects than the week before (tuned to trigger at five times as many). One or more of the following Log Source types must be collecting: Windows Security Event Logs \nix host logs Any logs showing FIM activity Acnt Susp:Abnormal File Access 287 In Windows Agents, turn on object access successes and failures in the local security policy. This rule will likely generate false positives, particularly in environments where users are constantly working on new projects, referencing new guides/design specs, and using new tools. This rule is not set to trigger an alarm by default -only an event will be generated when it fires. This event can then be used for more advanced, highly correlated account compromised scenarios. If investigating this event: Launch an additional investigation using the suspect username as origin login Launch an additional investigation using the suspect username as account Enable the smart response plugin "Disable Local windows Account" to automatically disable suspicious or compromised users. This process is described in the Activate Smart Response Plugin section of the deployment guide. 35
36 Account Anomaly Abnormal Process Activity This rule compares processes run by a user on a week to week basis. Significant weekly deviations, in this case a 75% difference in processes, may be an indication that the account is being controlled by an external entity. One or more of the following Log Source types must be collecting: Windows Security Event Logs \nix host logs Any other process monitoring logs Acnt Susp:Abnormal Process Activity 289 Ensure Audit Process Tracking is enabled for successes and failures in the Windows local security policy. This rule can generate false positives as users switch tasks between weeks -- therefore, it's best to use these events in conjunction with other indicators of compromise. To aid investigations into these events: Launch an additional investigation using the suspect username as origin login Launch an additional investigation using the suspect username as account Enable the smart response plugin \u201cdisable Local Windows Account\u201d to automatically disable suspicious users. This is described in the Activate Smart Response Plugin section of the deployment guide. 36
37 Account Anomaly Abnormal Authentication Behavior A user that significantly changes the services they use may be an indication of compromise -- specifically, a malicious actor that is using the new account to access as many parts of the local infrastructure as possible. This rule tracks the hosts that a user authenticates with in a seven day period and sets a baseline. If in the next seven-day period the user has less than fifty-percent overlap between hosts, this rule will trigger. One or more of the following Log Source types must be collecting: Windows Security Event Logs \nix host logs Any logs showing authentication activity. Acnt Susp:Abnormal Authentication Behavior 286 In Windows, make sure Audit Account Management is activated for successes in the Local Security Policy. This rule is designed to be noisy -- for example, it's not uncommon to see this rule fire in a development environment where users are connecting to new hosts each week. When this rule does fire, it will only create -- not alarm. This will allow for the event to be fed back into the master corroborated rule for more advanced highly correlated account compromised scenarios. To aid investigations into events triggered by this rule: Launch an additional investigation using the suspect username as origin login Launch an additional investigation using the suspect username as account Enable the smart response plugin "Disable Local windows Account" to automatically disable bad acting users. This is described in the Activate Smart Response Plugin section of the deployment guide. 37
38 Account Anomaly Abnormal Amount Of Audit Failures Abnormal amounts of audit failures can be an indication of an account compromise. This rule analyzes such failures by baselining normal audit failures for individual users each seven day period. If the next seven day period sees a three-fold increase in audit failures, the event will trigger. One or more of the following Log Source types must be collecting: Windows Security Event Logs \nix host logs Any logs showing authentication activity. Acnt Susp:Abnormal Amount Of Audit Failures 285 In Windows, make sure Audit Account Management is activated for successes in the Local Security Policy. Like many statistical analytics, this rule is can be noisy. It's not uncommon to see this rule fire as users mistype their password more one week than the previous week. By default, this rule will not trigger an alarm -- only an event will be created. This allows the event to be fed back into the master corroboration rule for more advanced, highly-correlated account compromised scenarios. To aid investigations into these events: Launch an additional investigation using the suspect username as origin login Launch an additional investigation using the suspect username as account Enable the smart response plugin "Disable Local windows Account" to automatically disable bad acting users. This is described in the Activate Smart Response Plugin section of the deployment guide. 38
39 General Activity New Common Event Identifying new Common Events generated by a single log source can help find many types of issues. For instance, if a configuration change is made that causes a new type of Operations Information Common Event to be generated, it could be indicative of a misconfiguration. Or, when a new S is deployed and churning away false positives, a new type of S event is something that would be interesting to investigate. This rule is designed to monitor generated Common Events separately for each Log Source and generate an event when a new Common Event is observed. Specifically, it will alarm on Common Events not seen in the preceding 7 days. General log collection should be configured: General logs General:New Common Event 468 Optional : This rule is configured to monitor all log sources for new Common Events. If it's desirable to track only specific log sources (eg, a new device deployment), a log source filter can be used. will be dependent on the use-case -- debugging a new device will have a different follow-up than security-related events. 39
40 Host Anomaly Abnormal Process Activity by Host This rule compares processes run by a host on a week to week basis. Significant weekly deviations, in this case a 50% difference in processes, may be an indication that the account is being controlled by an external entity and malicious tools are running on the infected machine. One or more of the following Log Source types must be collecting: Windows Security Event Logs \nix host logs Any other process monitoring logs Behavioral Anomaly: Abnormal Process Activity by Host 295 Ensure Audit Process Tracking is enabled for successes and failures in the Windows local security policy. This rule can generate false positives on hosts that frequently switch tasks between weeks -- therefore, it's best to use this rule on machines that are relatively stable. To aid investigations into these events: Launch an additional investigation using the suspect username as origin login Launch an additional investigation using the suspect username as account Enable the smart response plugin \u201cdisable Local Windows Account\u201d to automatically disable suspicious users. This is described in the Activate Smart Response Plugin section of the deployment guide. 40
41 Recon Port Scan: Slow Before launching attacks against a network or particular device, an attacker must first find entry points. Typically, such attacks are very noisy. Advanced attackers will use techniques to avoid detection of their reconnaissance -for example, by spacing out individual probes, they can reduce the chance that each probe will be connected to the others. This rule should reduce the effectiveness of that tactic. A combination of the following Log Sources can be used Intrusion detection devices Network security monitoring devices LogRhythm Network Monitor or equivalent network protocol analyzer Recon: Port Scan: Slow 30 Optional : Create an Exclude Filter for Origin Host in Rule Block 1 where the Origin Host is the name of any vulnerability scanners. Port Scans on public-facing devices will be frequent. Thus, it's more efficient to pay attention to reconnaissance when it's corroborated with follow-up attacks or other suspicious activity. It can also be useful to use Recon rules to build a baseline for normal activity, only alarming when scan rates significantly increase. 41
42 Vulnerability Vulnerability After Software Install New software installations or updates can introduce known vulnerabilities. When vulnerability scanners detect software versions susceptible to exploits, LogRhythm can correlate that information to recent changes to the system. The following log sources are required: Windows event logs A Vulnerability Scanner Vulnerability: After Software Install 494 Certain devices that run outdated software versions but are properly hardened can be whitelisted from this rule to cut down on repeated false positives. Vulnerable software should be immediately updated to a secure version or hardened in such a way to remove any possibility of exploitation. For more information on the specific vulnerability, search the National Vulnerability Database ( 42
43 Operations Ops Warning: Abnormal Log Volume Fluctuation Large fluctuations in the number of logs generated by a system can be cause for concern. An increasing log volume may indicate a malware outbreak, denial of service attack, or other noisy malicious activity. Significant log decreases may mean configuration errors, hardware failures, or other problems. Because LogRhythm is already tracking incoming logs, it's very easy to keep tabs on logging metadata. General log collection should be configured: General logs Ops Warning: Abnormal Log Volume Fluctuation 248 Add include filters for specific higher risk hosts of interest, or exclude filters for log sources that frequent have large fluctuations. The first step after seeing this alarm should be to find other alarms from the same log source -- although it might not always be the case, hopefully other alarms were triggered that can help diagnose the issue. 43
AI Engine Rules June 2014
AI Engine Rules June 2014 LogRhythm AI Engine Rules 2014 LogRhythm, Inc. All rights reserved This document contains proprietary information, which is protected by copyright. The software described in this
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
RSA Security Analytics
RSA Security Analytics This is what SIEM was Meant to Be 1 The Original Intent of SIEM Single compliance & security interface Compliance yes, but security? Analyze & prioritize alerts across various sources
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
IBM Advanced Threat Protection Solution
IBM Advanced Threat Protection Solution Fabio Panada IBM Security Tech Sales Leader 1 Advanced Threats is one of today s key mega-trends Advanced Threats Sophisticated, targeted attacks designed to gain
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Global Partner Management Notice
Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with
Recommended Practice Case Study: Cross-Site Scripting. February 2007
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? Drive-by Downloads are a common technique used by attackers to silently install malware on a victim s computer. Once a target website has been weaponized with
CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics
CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics TRADITIONAL SIEMS ARE SHOWING THEIR AGE Security Information and Event Management (SIEM) tools have been a
Advanced Persistent Threats
White Paper INTRODUCTION Although most business leaders and IT managers believe their security technologies adequately defend against low-level threats, instances of (APTs) have increased. APTs, which
Centre for the Protection of National Infrastructure Effective Log Management
Centre for the Protection of National Infrastructure Effective Log Management Tom Goldsmith, 2nd April 2014 [email protected] Effective Log Management / Contents Contents 1 Executive Summary 5 2 About
UNCLASSIFIED. http://www.govcertuk.gov.uk. General Enquiries. Incidents [email protected] Incidents [email protected].
Version 1.2 19-June-2013 GUIDELINES Incident Response Guidelines Executive Summary Government Departments have a responsibility to report computer incidents under the terms laid out in the SPF, issued
Comprehensive Advanced Threat Defense
1 Comprehensive Advanced Threat Defense June 2014 PAGE 1 PAGE 1 1 INTRODUCTION The hot topic in the information security industry these days is Advanced Threat Defense (ATD). There are many definitions,
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current
RSA Security Anatomy of an Attack Lessons learned
RSA Security Anatomy of an Attack Lessons learned Malcolm Dundas Account Executive John Hurley Senior Technology Consultant 1 Agenda Advanced Enterprise/ Threats The RSA Breach A chronology of the attack
Protecting Your Data From The Inside Out UBA, Insider Threats and Least Privilege in only 10 minutes!
We protect your most sensitive information from insider threats. Protecting Your Data From The Inside Out UBA, Insider Threats and Least Privilege in only 10 minutes! VARONIS SYSTEMS About Me Dietrich
Why Device Fingerprinting Provides Better Network Security than IP Blocking. How to transform the economics of hacking in your favor
Why Device Fingerprinting Provides Better Network Security than IP Blocking How to transform the economics of hacking in your favor Why Device Fingerprinting Provides Better Network Security than IP Blocking
THE ROLE OF IDS & ADS IN NETWORK SECURITY
THE ROLE OF IDS & ADS IN NETWORK SECURITY The Role of IDS & ADS in Network Security When it comes to security, most networks today are like an egg: hard on the outside, gooey in the middle. Once a hacker
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY
IT FIREWALL POLICY TABLE OF CONTENT 1. INTRODUCTION... 3 2. TERMS AND DEFINITION... 3 3. PURPOSE... 5 4. SCOPE... 5 5. POLICY STATEMENT... 5 6. REQUIREMENTS... 5 7. OPERATIONS... 6 8. CONFIGURATION...
How To Connect Log Files To A Log File On A Network With A Network Device (Network) On A Computer Or Network (Network Or Network) On Your Network (For A Network)
SIEM FOR BEGINNERS EVERYTHING YOU WANTED TO KNOW ABOUT LOG MANAGEMENT BUT WERE AFRAID TO ASK www.alienvault.com A Rose By Any Other Name SLM/LMS, SIM, SEM, SEC, SIEM Although the industry has settled on
Advanced Web Security, Lab
Advanced Web Security, Lab Web Server Security: Attacking and Defending November 13, 2013 Read this earlier than one day before the lab! Note that you will not have any internet access during the lab,
Cyber Essentials. Test Specification
Cyber Essentials Test Specification Contents Scope of the Audit...2 Assumptions...3 Success Criteria...3 External systems...4 Required tests...4 Test Details...4 Internal systems...7 Tester pre-requisites...8
Metric Matters. Dain Perkins, CISSP [email protected]
Metric Matters Dain Perkins, CISSP [email protected] My Perspective Information security metrics do not show us how we need to improve our defenses Image: http://abcnews.go.com/sports/2014-fifa-world-cup-us-goalie-tim-howard/story?id=24400295
THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.
THE 2014 THREAT DETECTION CHECKLIST Six ways to tell a criminal from a customer. Telling criminals from customers online isn t getting any easier. Attackers target the entire online user lifecycle from
Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix
Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to
Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed) 01.1 Purpose
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
How To Prevent Hacker Attacks With Network Behavior Analysis
E-Guide Signature vs. anomaly-based behavior analysis News of successful network attacks has become so commonplace that they are almost no longer news. Hackers have broken into commercial sites to steal
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Top 5 Essential Log Reports
Top 5 Essential Log Reports Version 1.0 Contributors: Chris Brenton - Independent Security Consultant - [email protected] Tina Bird, Security Architect, PGP Corporation Marcus J Ranum, CSO, Tenable
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
Top 20 Critical Security Controls
Top 20 Critical Security Controls July 2015 Contents Compliance Guide 01 02 03 04 Introduction 1 How Rapid7 Can Help 2 Rapid7 Solutions for the Critical Controls 3 About Rapid7 11 01 INTRODUCTION The Need
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
Security Intelligence Blacklisting
The following topics provide an overview of Security Intelligence, including use for blacklisting and whitelisting traffic and basic configuration. Security Intelligence Basics, page 1 Security Intelligence
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router
Deploying Layered Email Security. What is Layered Email Security?
Deploying Layered Email Security This paper is intended for users of Websense Email Security who want to add Websense Hosted Email Security to deploy a layered email security solution. In this paper: Review
Protecting Critical Infrastructure
Protecting Critical Infrastructure SCADA Network Security Monitoring March 20, 2015 Table of Contents Introduction... 4 SCADA Systems... 4 In This Paper... 4 SCADA Security... 4 Assessing the Security
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
Bridging the gap between COTS tool alerting and raw data analysis
Article Bridging the gap between COTS tool alerting and raw data analysis An article on how the use of metadata in cybersecurity solutions raises the situational awareness of network activity, leading
AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals
AlienVault Unified Security Management (USM) 5.x Policy Management Fundamentals USM 5.x Policy Management Fundamentals Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
Achieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
CS 558 Internet Systems and Technologies
CS 558 Internet Systems and Technologies Dimitris Deyannis [email protected] 881 Heat seeking Honeypots: Design and Experience Abstract Compromised Web servers are used to perform many malicious activities.
JOOMLA SECURITY. ireland website design. by Oliver Hummel. ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City
JOOMLA SECURITY by Oliver Hummel ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City CONTACT Nicholas Butler 051-393524 089-4278112 [email protected] Contents Introduction 3 Installation
Advanced Threats: The New World Order
Advanced Threats: The New World Order Gary Lau Technology Consulting Manager Greater China [email protected] 1 Agenda Change of Threat Landscape and Business Impact Case Sharing Korean Incidents EMC CIRC
Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: Large organizations have spent millions of dollars on security
SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security
SIEM Optimization 101 ReliaQuest E-Book Fully Integrated and Optimized IT Security Introduction SIEM solutions are effective security measures that mitigate security breaches and increase the awareness
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
Section 12 MUST BE COMPLETED BY: 4/22
Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege
White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management
White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES By James Christiansen, VP, Information Risk Management Executive Summary Security breaches in the retail sector are becoming more
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT
Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
IBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
Web Application Firewall
Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
Sitefinity Security and Best Practices
Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis? This paper presents a scenario in which an attacker attempts to hack into the internal network
ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details
Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
Introduction: 1. Daily 360 Website Scanning for Malware
Introduction: SiteLock scans your website to find and fix any existing malware and vulnerabilities followed by using the protective TrueShield firewall to keep the harmful traffic away for good. Moreover
www.contextis.com Effective Log Management
www.contextis.com About About Information Security has a client base including some of the world s most high profile blue chip companies and government organisations. Our strong track record is based above
Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited
Contemporary Web Application Attacks Ivan Pang Senior Consultant Edvance Limited Agenda How Web Application Attack impact to your business? What are the common attacks? What is Web Application Firewall
Protecting the Infrastructure: Symantec Web Gateway
Protecting the Infrastructure: Symantec Web Gateway 1 Why Symantec for Web Security? Flexibility and Choice Best in class hosted service, appliance, and virtual appliance (upcoming) deployment options
defending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
INTRUSION DECEPTION CZYLI BAW SIĘ W CIUCIUBABKĘ Z NAMI
INTRUSION DECEPTION CZYLI BAW SIĘ W CIUCIUBABKĘ Z NAMI Na przykładzie Junos WebApp Secure Edmund Asare INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations
Web Application Security
E-SPIN PROFESSIONAL BOOK Vulnerability Management Web Application Security ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMBATING THE WEB VULNERABILITY THREAT Editor s Summary
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
Guidelines for Web applications protection with dedicated Web Application Firewall
Guidelines for Web applications protection with dedicated Web Application Firewall Prepared by: dr inŝ. Mariusz Stawowski, CISSP Bartosz Kryński, Imperva Certified Security Engineer INTRODUCTION Security
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Firewalls. Chapter 3
Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
24/7 Visibility into Advanced Malware on Networks and Endpoints
WHITEPAPER DATA SHEET 24/7 Visibility into Advanced Malware on Networks and Endpoints Leveraging threat intelligence to detect malware and exploitable vulnerabilities Oct. 24, 2014 Table of Contents Introduction
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
Targeted attacks: Tools and techniques
Targeted attacks: Tools and techniques Performing «red-team» penetration tests Lessons learned Presented on 17/03/2014 For JSSI OSSIR 2014 By Renaud Feil Agenda Objective: Present tools techniques that
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
USM IT Security Council Guide for Security Event Logging. Version 1.1
USM IT Security Council Guide for Security Event Logging Version 1.1 23 November 2010 1. General As outlined in the USM Security Guidelines, sections IV.3 and IV.4: IV.3. Institutions must maintain appropriate
Cyb T er h Threat D f e ense S l o uti tion Moritz Wenz, Lancope 1
C b Th Cyber Threatt Defense D f S Solution l ti Moritz Wenz, Lancope 1 The Threat Landscape is evolving Enterprise Response Antivirus (Host-Based) IDS/IPS (Network Perimeter) Reputation (Global) and Sandboxing
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Controls Book
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program s Book Cyber-security s Summary Council on Cyber-security Critical Security s (CSC) CSC-01 CSC-02 CSC-03 CSC-04 CSC-05 IT Asset
WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks
WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on
Why a Network-based Security Solution is Better than Using Point Solutions Architectures
Why a Network-based Security Solution is Better than Using Point Solutions Architectures In This Paper Many threats today rely on newly discovered vulnerabilities or exploits CPE-based solutions alone
SPEAR PHISHING UNDERSTANDING THE THREAT
SPEAR PHISHING UNDERSTANDING THE THREAT SEPTEMBER 2013 Due to an organisation s reliance on email and internet connectivity, there is no guaranteed way to stop a determined intruder from accessing a business
How We're Getting Creamed
ed Attacks How We're Getting Creamed By Ed Skoudis June 9, 2011 ed Attacks - 2011 Ed Skoudis 1 $ cut -f5 -d: /etc/passwd grep -i skoudis Ed Skoudis Started infosec career at Bellcore in 1996 working for
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
RSA Security Analytics the complete approach to security monitoring or how to approach advanced threats
RSA Security Analytics the complete approach to security monitoring or how to approach advanced threats Grzegorz Mucha [email protected] Advanced Threats Threat Landscape Criminals Petty criminals
Seven Strategies to Defend ICSs
INTRODUCTION Cyber intrusions into US Critical Infrastructure systems are happening with increased frequency. For many industrial control systems (ICSs), it s not a matter of if an intrusion will take
modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:
SERVER SECURITY STANDARD Security Standards are mandatory security rules applicable to the defined scope with respect to the subject. Overview Scope Purpose Instructions Improperly configured systems,
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
