RSA Security Analytics



Similar documents
Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics

RSA Security Anatomy of an Attack Lessons learned

THE EVOLUTION OF SIEM

Rashmi Knowles Chief Security Architect EMEA

What s New in Security Analytics Be the Hunter.. Not the Hunted

Security Analytics for Smart Grid

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

SANS Top 20 Critical Controls for Effective Cyber Defense

Advanced SOC Design. Next Generation Security Operations. Shane Harsch Senior Solutions Principal, MBA GCED CISSP RSA

End-user Security Analytics Strengthens Protection with ArcSight

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Detect & Investigate Threats. OVERVIEW

RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst

Enabling Security Operations with RSA envision. August, 2009

Using Network Forensics to Visualize Advanced Persistent Threats

IBM QRadar Security Intelligence April 2013

Breach Found. Did It Hurt?

DYNAMIC DNS: DATA EXFILTRATION

McAfee Network Security Platform

Integrating MSS, SEP and NGFW to catch targeted APTs

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Discover & Investigate Advanced Threats. OVERVIEW

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.

Joining Forces: Bringing Big Data to your Security Team

Advanced Persistent Threats

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

SIEM is only as good as the data it consumes

Unified Security, ATP and more

A New Perspective on Protecting Critical Networks from Attack:

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

The Next Generation Security Operations Center

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Intelligence Driven Security

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

ADVANCED THREATS IN THE ENTERPRISE. Finding an Evil in the Haystack with RSA ECAT. White Paper

QRadar SIEM and FireEye MPS Integration

Advanced Threats: The New World Order

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

IBM Security Intelligence Strategy

GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

Combating a new generation of cybercriminal with in-depth security monitoring

Getting Ahead of Advanced Threats

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

How To Manage Security On A Networked Computer System

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

QRadar SIEM and Zscaler Nanolog Streaming Service

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Introducing IBM s Advanced Threat Protection Platform

Security Information & Event Management (SIEM)

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊

After the Attack: RSA's Security Operations Transformed

How To Connect Log Files To A Log File On A Network With A Network Device (Network) On A Computer Or Network (Network Or Network) On Your Network (For A Network)

State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1

Redefining SIEM to Real Time Security Intelligence

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Content Security: Protect Your Network with Five Must-Haves

How To Create Situational Awareness

AppGuard. Defeats Malware

FISMA / NIST REVISION 3 COMPLIANCE

Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions

24/7 Visibility into Advanced Malware on Networks and Endpoints

Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

You ll learn about our roadmap across the Symantec and gateway security offerings.

ESG Brief. Overview by The Enterprise Strategy Group, Inc. All Rights Reserved.

Data Science Transforming Security Operations

The SIEM Evaluator s Guide

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

Bernard Montel Directeur Technique RSA. Copyright 2012 EMC Corporation. All rights reserved.

Security Analytics The Beginning of the End(Point)

Defending Against Cyber Attacks with SessionLevel Network Security

The Hillstone and Trend Micro Joint Solution

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Endpoint Threat Detection without the Pain

Unknown threats in Sweden. Study publication August 27, 2014

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

The Value of QRadar QFlow and QRadar VFlow for Security Intelligence

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Cyb T er h Threat D f e ense S l o uti tion Moritz Wenz, Lancope 1

Why Device Fingerprinting Provides Better Network Security than IP Blocking. How to transform the economics of hacking in your favor

IBM SECURITY QRADAR INCIDENT FORENSICS

Presentation Title: When Anti-virus Doesn t Cut it: Catching Malware with SIEM

SIEM Orchestration. How McAfee Enterprise Security Manager can drive action, automate remediation, and increase situational awareness

Concierge SIEM Reporting Overview

The Sophos Security Heartbeat:

How To Manage Sourcefire From A Command Console

Transcription:

RSA Security Analytics This is what SIEM was Meant to Be 1

The Original Intent of SIEM Single compliance & security interface Compliance yes, but security? Analyze & prioritize alerts across various sources Limited detection due to reliance on logs & signatures The cornerstone of security operations 2 T Weak at investigation & incident response 2

A new approach is needed 3

SIEM Baseline Requirements How important is each of the following in your firm's decision to adopt security information management (SIM) within your organization 90% 88% 86% 84% 82% 80% 78% 76% 74% 72% 70% 90% 87% 80% Incident response Compliance and reporting Event correlation Log management % of respondents who answered "important" or "very important" - n=580 Critics give SIEM 2.5 out of 4 stars 77% Forrester ForrSights Security Survey Q2 2013 4

Threat Actors Firewall IDS/IPS Evolution of Threat Actors & Detection Implications At first, there were HACKS Preventative controls filter known attack paths AntiVirus Malicious Traffic Whitespace Successful HACKS Corporate Assets 5

Threat Actors Evolution of Threat Actors & Detection Implications Firewall IDS/IPS AntiVirus Malicious Traffic More Logs Blocked Session Blocked Session Blocked Session Alert S I E M At first, there were HACKS Preventative controls filter known attack paths Then, ATTACKS Despite increased investment in controls, including SIEM Whitespace Successful ATTACKS Corporate Assets 6

Security Analytics Threat Actors Firewall IDS/IPS AntiVirus Malicious Traffic Logs Endpoint Visibility Blocked Session Blocked Session Blocked Session Alert Process Network Visibility Network Sessions Evolution of Threat Actors & Detection Implications Now, successful ATTACK CAMPAIGNS target any and all whitespace. Complete visibility into every process and network sessions is required to eradicate the attacker opportunity. Unified platform for advanced threat detection & investigations, Corporate Assets 7

Exceeding SIEM Requirements Log Mgmt. Event Correlation Collect & parse 250+ event sources 275+ out-of-the-box correlation rules Visibility far beyond logs Logs, packets, NetFlow & endpoint together Incident Response Native, prioritized incident triage Wider SOC management capabilities Compliance & Reporting 90+ report templates Integration with compliance management program 8

RSA Security Analytics: Log-Centric Visibility Capture Time Data Enrichment LIVE Analysis Action LIVE Cloud Logs Security Operations Security Operations LIVE On Prem RSA LIVE INTELLIGENCE Threat Intelligence Rules Parsers Feeds Reports RSA Research 9

RSA SECURITY ANALYTICS SOLUTION CAPTURE, ENRICH AND ANALYZE DATA FROM ACROSS YOUR NETWORK Cloud PACKETS LOGS Visibility Capture Time Data Enrichment LIVE Analysis LIVE Incident Management Action Compliance Reporting On Prem ENDPOINT ENRICH Investigation Session Reconstruction NETFLOW Advanced Analytics Endpoint Analysis RSA LIVE INTELLIGENCE Threat Intelligence Rules Parsers Feeds Reports RSA Research 10

VISIBILITY Visibility Analysis From the ENDPOINT to the CLOUD Action 11

Move From Log-Centric Approach organizations need to collect, process, and store a plethora of data sources including asset data, identity information, network traffic (via full packet capture), NetFlow, endpoint forensic information, etc. This data volume is in part what transforms yesterday s security analysis into today s big data security analytics. --JON OLTSIK, ESG, SEPTEMBER, 2014, INFORMATION-DRIVEN SECURITY AND RSA SECURITY ANALYTICS AND RSA ECAT 12

The Power Of A Risk-Based Approach Logs Basic connection information Endpoints Where is infection located NetFlow How far intrusion spread Security Analytics Packets How you got infected and what attacker did 13

Add Compliance & Business Context IT Info Business Context Asset Intelligence Asset List Device Type, Device Content CMDBs Vulnerability data Device Owner Business Owner, Unit, Process RPO / RTO Data Class Risk Level IP Address Asset Criticality Rating Facility 14

ANALYSIS Visibility Analysis Detect and analyze attacks before they can impact your organization Action 15

Incident Detection Correlation across logs, packets, NetFlow and endpoint data - separately or together Discover attacks missed by other tools Real-time detection - Ex. detecting a pdf containing an executable, followed by encrypted traffic to a blacklisted country 16

Data Sources: Shell Crew Example Logs: What was targeted? Packets: How did the exploit occur? NetFlow: How did the attackers move around once inside? Endpoints: Was the endpoint exploited? Were others infected? Intrusion attempts Beaconing & suspicious communications Sticky-keys backdoor Malicious proxy tools WinRAR using encrypted rar files Recreate entire exploit Lateral movement via RDP Time/date stomping Indicatorsabout malicious files and code Scope of infection 17

Content Enables Security Teams Percent who felt security management was more difficult than it was 24 months ago 62% - ESG The Big Data Security Analytics Era Is Here April 2013 400+ RSA provides over 400 out -of-the-box rules, alerts, feeds &reports Unleash the potential of your security team 18

Out-of-the-box Content Examples Intelligence feeds 275+ correlation rules 90+ reports 375+ log & network parsers APT Domains Data exfiltration Compliance templates Abnormal.exe files Suspicious Proxies Identity & access anomalies Network activity Packers Malicious Networks Unusual connections Operations Instant Messenger traffic Threat blacklists Endpoint & network activity Suspicious behavior Botnets O-day identifiers Reconnaissance detection User activity SQL injection 19

ACTION Visibility Analysis Take targeted action on the most important incidents Action 20

Packets Logs Endpoint & Malware Native Incident Management unified incidents & workflow analyst starting point 21

Prioritize & Streamline Workflow Unified, risk-score driven alerts Assign & track Integrate RSA Security Operations Management (SecOps) 3 rd party ticketing systems 22

RSA SecOps Domain RSA Security Operations Management Process People Framework & Alignment Technology Incident Response Breach Response SOC Program Management 23

Security Analytics vs. SecOps SA Incident Triage SecOps Alert Aggregation Dashboards Incident Response Workflow IR Procedure & Content Breach Response Workflow, tasks, content Risk Assessment Questionnaire Tracking Notification SOC Program Management GRC Integration (Risk, Policy, BC) 24

Benefits Detect and analyze before attacks impact the business Investigate, prioritize, and remediate incidents Unleash the potential of your existing security team Evolve existing tools with better visibility & workflow 25

26

Beverage Manufacturer RSA Security Analytics I really like the vision of where Security Analytics is going, which isn t seen anywhere else in the industry, it offers true value and intelligence Before After Security siloes, isolated incident response Visibility limited to the perimeter Blind to signs of compromise Full visibility and context into attacks that were unachievable in a traditional SIEM Quick and easy log collection & analysis Discovered massive amounts of IOCs Deployed globally without scaling issues 27

Security Attacks are Inevitable Must be ARMED to quickly identify and respond to attacks before they can damage the business Constant compromise does not mean constant loss 28

See Everything. Fear Nothing. EMC, RSA, the EMC logo and the RSA logo are trademarks of EMC Corporation in the U.S. and other countries.

Common SIEM Use Cases in Security Analytics Use case Unauthorized privilege access Unusual protocol use Virus outbreak Trojan Backdoor use Abnormal system access Unauthorized account administration Access policies Alert/Report Admin commands from a username not in a list of admins Unusual commands being executed Unexpected protocol hitting a firewall/gateway Port scans Large network transfers High # of alerts from a given set of AV systems Specific event class from an IDS High # of failed logons Account enable from list of locked accounts Access from an unauthorized location Can be run as a real-time alert, or a regular report for review 30

SIEM and Account Takeover How a SIEM tries to detect it Alert for failed logons followed by successful logon Lots of noise Why that doesn t work Low and slow approach evades detection Can t take Security Analytics approach Tag the session as high # of failed logons, tag the session as going to/from a critical asset, monitor the entire session for signs of bot activity, tag the source IP address if coming from unexpected source geography, tag the session if using nonstandard user agent 31

SIEM and Known Attack Sequences How a SIEM tries to detect it Create correlation rule for precise sequence e.g. failed longs, followed by successful logon, followed by DB Connect, followed by connection to Romania Why that doesn t work Any variation on the attack will fool the SIEM rule Can only rely on indicators in logs from critical systems Cannot scale beyond small set of rules Security Analytics approach Tag session with known attack indicators - e.g. high # of failed logons, use of weird protocols, use of weird tools etc), Tag session as going to/from critical asset Monitor the entire session to give investigative context 32

SIEM and Deviation from Normal Activity How a SIEM tries to detect it Define rules for known good alert for any nonstandard activity Why that doesn t work Impossible to keep up with all normal activities Cannot scale beyond only a small rule set Security Analytics approach Tag session for unexpected attributes nonstandard tools being used, unexpected source address, protocol misuse, unexpected scripting, strange encoding 33

Incident Detection Attack Step Traditional SIEM RSA Security Analytics Alert for access over non-standard port No Yes Recreate activity of suspect IP address across environment No Yes Show user activity across AD and VPN Yes Yes Alert for different credentials used for AD and VP Yes Yes Reconstruct exfiltrated data No Yes 34

Only RSA Security Analytics Can Tell If This Is A Targeted Attack Attack Step Traditional SIEM RSA Security Analytics Alert for suspected SPAM host Yes Yes Show all WWW requests where executable downloaded No Yes Recreate email with suspect link No Yes Analyze malware and incorporate community intelligence Determine whether attack is part of a targeted campaign No No Yes Yes 35

EMC, RSA, the EMC logo and the RSA logo are trademarks of EMC Corporation in the U.S. and other countries.