How to build and run a Security Operations Center



Similar documents
Module 1: Overview. Module 2: AlienVault USM Solution Deployment. Module 3: AlienVault USM Basic Configuration

Client Security Risk Assessment Questionnaire

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Open Source Incident Management Tool for CSIRTs

How To Create Situational Awareness

All your apps & data in the cloud, all in one place.

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

Domain 1 The Process of Auditing Information Systems

DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Network Security Administrator

Caretower s SIEM Managed Security Services

INCIDENT RESPONSE CHECKLIST

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

SAP Secure Operations Map. SAP Active Global Support Security Services May 2015

How To Control Vcloud Air From A Microsoft Vcloud (Vcloud)

Information Technology General Controls And Best Practices

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

Cybersecurity: An Innovative Approach to Advanced Persistent Threats

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Ellucian Cloud Services. Joe Street Cloud Services, Sr. Solution Consultant

Vendor Audit Questionnaire

IT Security and OT Security. Understanding the Challenges

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

INNOVATE. MSP Services Overview SVEN RADEMACHER THROUGH MOTIVATION

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Vistara Lifecycle Management

Music Recording Studio Security Program Security Assessment Version 1.1

How To Manage Security On A Networked Computer System

TRIPWIRE NERC SOLUTION SUITE

GE Measurement & Control. Cyber Security for Industrial Controls

Remote Access Procedure. e-governance

Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia

Projectplace: A Secure Project Collaboration Solution

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

Critical Controls for Cyber Security.

Fear Not What Security Can Do to Your Firm; Instead, Imagine What Your Firm Can Do When Secured!

University of Central Florida Class Specification Administrative and Professional. Information Security Officer

Managed Security Services for Data

Cloud Vendor Evaluation

Company Overview. Enterprise Cloud Solutions

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

Time to Value: Successful Cloud Software Implementation

PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD

Secure, Scalable and Reliable Cloud Analytics from FusionOps

How to effectively respond to an information security incident

Managed Services. Business Intelligence Solutions

Altius IT Policy Collection Compliance and Standards Matrix

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s

State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1

Payment Card Industry Data Security Standard

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less

SUPPLIER SECURITY STANDARD

How To Manage Your Information Systems At Aerosoft.Com

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

End-user Security Analytics Strengthens Protection with ArcSight

The Role of Digital Forensics within a Corporate Organization

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

About Us. 2 Managed Services E: sales@ironcovesolutions.com T: W: Our Mission. What We Do

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Solution Briefing. Integrating the LogLogic API with NSN s Remediation & Escalation Mgmt. System

Maximizing Configuration Management IT Security Benefits with Puppet

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Cutting Through SIEM Vendor Marketing. Make the right technology decision A. Ananth

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

University of Pittsburgh Security Assessment Questionnaire (v1.5)

System Security Plan University of Texas Health Science Center School of Public Health

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

Security Information & Event Management (SIEM)

Cyber Security Operations Center (CSOC) for Critical Infrastructure Protection

Summary of Technical Information Security for Information Systems and Services Managed by NUIT (Newcastle University IT Service)

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Enabling Security Operations with RSA envision. August, 2009

Retention & Destruction

PCI Requirements Coverage Summary Table

"Service Lifecycle Management strategies for CIOs"

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

Cloud Security:Threats & Mitgations

Information security controls. Briefing for clients on Experian information security controls

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Unified Security Management and Open Threat Exchange

Automation Suite for. 201 CMR Compliance

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

NASA Consolidated Active Directory Overview ( August 20, 2012 ) Les Chafin Infrastructure Engineering HPES

H.I.P.A.A. Compliance Made Easy Products and Services

GMS GRAPHICAL MANAGEMENT SYSTEM

The SIEM Evaluator s Guide

Security from a customer s perspective. Halogen s approach to security

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

Security Controls for the Autodesk 360 Managed Services

Tunisia s experience in building an ISAC. Haythem EL MIR Technical Manager NACS Head of the Incident Response Team cert-tcc

GroupWise SMTP Infrastructure Design:

PCI Requirements Coverage Summary Table

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Transcription:

How to build and run a Security Operations Center v1.1 Nicolas FISCHBACH Senior Manager, Network Engineering Security, COLT Telecom nico@securite.org - http://www.securite.org/nico/

About Nicolas Fischbach Head of Technology Security at COLT Tier-1 SP in EU, data/voice/managed services 13 countries, going NGN, expanding reach Recognized Service Provider security architect Member of the Honeynet Project Teacher (university and engineering schools) Frequent speaker and writer

Agenda Introduction : Why build a SOC Non-technical requirements Technical requirements Technology deployment Processes, procedures and KPI Challenges Conclusion

Intro :: SecOps as we know it Usually non-existing Often a side-job (engineering group) Limited FTEs (less than half a dozen) No proper separation of duty Lack of change management Reactive security etc...

Intro :: Various groups SOC CERT CSIRT (Company/Computer/Corporate) PSIRT (Product) Internal audit / Legal&Regulatory / Safety C(I)SO organization Where do you put the SOC and is it really a SOC you are looking for?

Intro :: Duties of a SOC Define the duties of your SOC Internal security devices management External security devices management Managed customer services Proactive/reactive incident handling Security event management Forensics Vulnerability management Audit/Pen-test

Intro :: Optional duties? Technical Infrastructure Badge systems / CCTV Facilities Management Fire alarms, building management systems Physical security teams (S)PoC for Business Continuity and/or Disaster Recovery Law Enforcement Agencies interface Data Retention, Lawful Intercept, etc.

Non-tech :: The SOC in the ORG Separation of duty with IT, Network Ops, Engineering, etc. Where is it to be attached? Eng, Ops, C(I)SO, Audit? Integrated/outside helpdesk 1st/2nd/3rd level and vendor escalation? Vendor management (vs Eng/Procurement) Who watches the SOC

Non-tech :: SOC P&Ps Define clear operations Procedures Processes Policies Ticket management system Authorization system Authentication of incoming requests Bureaucracy vs flexibility SOC handbook (count 1+ year)

Non-tech :: SOC SLAs and KPIs Which KPIs and SLAs make sense You can t really measure on failure You can t really measure on volume What is a change? What are realistic SLAs for changes What are realistic SLAs for TTR

Non-tech :: Setting priorities What needs to be dealt with? In near real-time (NRT) Next business day(s) Long term What triggers it? Security events Change requests / TTs Forensics / event analysis Law enforcement

Non-tech :: Basic requirements Is your SOC 24x7? Follow the sun approach How many FTEs do you need -20% due to leaves/trainings/sickness 9 FTEs is a minimum for a basic 24x7 SOC What are the legal requirements Data protection Security clearances (and background checks)

Tech :: SOC PHY architecture Separate network(s) Heavily filtered / dedicated non-internet connected network How to interface with customers ( secure channel) for requests How to inferface with customers networks/devices (management and monitoring)?

Tech :: SOC OSS architecture Should all the systems be contained inside the SOC? Management platforms Monitoring platforms AAA systems Secure storage and backup Data may be used in court Chain of custody

Tech :: SOC Dashboard For you or for management? :) SEM (Security Event management) Data visualization What do you want to measure, display, act on, report on, etc? MSSP-only? Internal and Internet facing systems? Internal knowledge base

Tech :: External interfaces Network Operations / IT Operations Third parties Customers Often no clear demarcation between network and security especially on complex devices Integrated or separated test lab?

Tech :: Data feeds You'll be flooded with data. Do you really need more? Commercial data feeds Public data feeds Vulnerability analysis data

Ops :: Data Visualization You will have *LOTS* of data Parsers are helpful Visualization is key Pick the right tool Write the right rules Have enough displays

Ops :: Keeping the SOC secure Physical access Logical access Keep the networks REALLY separated Hardened clients and servers Intrusion detection in the SOC Patch management, vulnerability management, etc. Dedicated system/network ops within the SOC?

Challenges Humans Processes and procedures Legacy Technology Noise

Challenges :: Humans Finding the right people Skills 24x7 Language Background checks / Security clearance Keeping these guys motivated Security analyst, incident manager, administrative contact, hard core geek

Challenges :: P&Ps Key procedures Key processes Bureaucracy vs flexibility Integration with the Ticketing system Request system

Challenges :: Legacy Green field approach How much legacy? Technologies / vendors EoS/EoL Undocumented configurations / setups People

Challenges :: Noise How do you deal with the noise? Internet background noise Scans and SPAM Dark IPs and Netflow Honeypots Customer generated noise ACLs/Security policies with logging IDS systems Anti{-virus, -malware, etc}

Challenges :: Technology Which technology can you decide on? Which technology is forced on you by Marketing and Sales How to pick The right AAA system The right SEM platform The right management and monitoring platform

Challenges :: Technical How to run your own OSS/NMS/IS inside the SOC? How to get stable and secure remote connectivity into all the devices you need to manage Separated networks and their limitations (Internet vs secure) Fine-tuning of systems (esp. a SEM) takes at least a year

Challenges :: SEM/SIM A challenge of his own Events/second driven Database structure and strage size Rules/ AI / NNs /marketing Log parsers, input modules, etc. Do you have development people inside a SOC? More complex and time consuming than OSS/NMS

Conclusion Building a SOC is complex Pick the right technology, team and P&Ps Maintaining a SOC in the long run is even more a challenge Remember 1) It s all about people 2) It s all about having the right technology in place 3) It s all about trying to make the 3Ps work by finding the right mix of flexibility and bureaucracy