SIEM Implementation Approach Discussion. April 2012



Similar documents
Caretower s SIEM Managed Security Services

How To Manage Security On A Networked Computer System

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

The Protection Mission a constant endeavor

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

Cybersecurity and internal audit. August 15, 2014

Information Shield Solution Matrix for CIP Security Standards

Intelligence Driven Security

Critical Controls for Cyber Security.

SANS Top 20 Critical Controls for Effective Cyber Defense

Managed Security Service Providers vs. SIEM Product Solutions

Italy. EY s Global Information Security Survey 2013

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Information & Asset Protection with SIEM and DLP

File Integrity Monitoring: A Critical Piece in the Security Puzzle. Challenges and Solutions

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Attachment A. Identification of Risks/Cybersecurity Governance

IBM QRadar Security Intelligence April 2013

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

Cybersecurity The role of Internal Audit

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

Information Technology Policy

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Payment Card Industry Data Security Standard

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Corporate Security Intelligence Services

Defining, building, and making use cases work

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

High End Information Security Services

Obtaining Enterprise Cybersituational

Service Asset & Configuration Management PinkVERIFY

Security from a customer s perspective. Halogen s approach to security

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

INCIDENT RESPONSE CHECKLIST

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

CALNET 3 Category 7 Network Based Management Security. Table of Contents

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Safeguarding the cloud with IBM Dynamic Cloud Security

How To Buy Nitro Security

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Thales Service Definition for PSN Secure Gateway Service for Cloud Services

White Paper. Protecting Databases from Unauthorized Activities Using Imperva SecureSphere

How To Secure A Database From A Leaky, Unsecured, And Unpatched Server

LogRhythm and NERC CIP Compliance

Spyders Managed Security Services

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

How To Monitor Your Entire It Environment

Information Technology Engineers Examination. Information Technology Service Manager Examination. (Level 4) Syllabus

OCIE CYBERSECURITY INITIATIVE

FairWarning Mapping to PCI DSS 3.0, Requirement 10

Feature. Log Management: A Pragmatic Approach to PCI DSS

What is Security Intelligence?

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

PCI Compliance for Cloud Applications

How To Create Situational Awareness

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

The Value of Vulnerability Management*

McAfee Security Information Event Management (SIEM) Administration Course 101

IBM Security QRadar Vulnerability Manager

Q1 Labs Corporate Overview

Find the needle in the security haystack

Information Security. Incident Management Program. What is an Incident Management Program? Why is it needed?

BeyondInsight Version 5.6 New and Updated Features

External Supplier Control Requirements

Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises

Scalability in Log Management

D. Grzetich 6/26/2013. The Problem We Face Today

RSA SIEM and DLP Infrastructure and Information Monitoring in One Solution

Looking at the SANS 20 Critical Security Controls

QRadar SIEM 6.3 Datasheet

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

Der Weg, wie die Verantwortung getragen werden kann!

Information security controls. Briefing for clients on Experian information security controls

Obtaining Value from Your Database Activity Monitoring (DAM) Solution

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

Strengthen security with intelligent identity and access management

White Paper: Meeting and Exceeding GSI/GCSx Information Security Monitoring Requirements

IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices

FIVE PRACTICAL STEPS

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

SUPPLIER SECURITY STANDARD

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

White Paper. Time for Integrated vs. Bolted-on IT Security. Cyphort Platform Architecture: Modular, Open and Flexible

Microsoft s Compliance Framework for Online Services

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

Achieving SOX Compliance with Masergy Security Professional Services

Transcription:

SIEM Implementation Approach Discussion April 2012

Agenda What are we trying to solve? Summary Observations from the Security Assessments related to Logging & Monitoring Problem Statement Solution Conceptual Level Insourcing versus Outsourcing Vendors Implementation Considerations Copyright 2012 Deloitte Development LLC. All rights reserved. 1

What are we trying to solve?

Summary Observations from the Security Assessments related to Logging & Monitoring Inconsistent logging of security events (servers, databases, network devices, security devices, etc.) No logging standard Monitoring of logs ranged from non-existent to limited Correlation capability of security events was mostly non-existent (for identifying threats timely) Log retention was not consistent Limited monitoring for sensitive data leakage via network Limited monitoring for change in system configurations (security related) Copyright 2012 Deloitte Development LLC. All rights reserved. 3

Problem Statement Institutions may not detect security incidents (e.g., unauthorized access to sensitive repositories, changes in security configurations to critical systems, sensitive data leakage, etc.) on a timely basis (or at all). While this can be applied broadly, the focus of the observations was related to infrastructure (network, operating systems, and databases) perimeter devices, security devices, as well as select internal servers. Copyright 2012 Deloitte Development LLC. All rights reserved. 4

Typical Scenario Recovery Manual detection process 60.00 40.00 20.00 Acceptable Risk 0.00 20.00 High Risk 40.00 60.00 80.00 Day 1 Day 2 Day 3 Day 4 Day 5 Day 6 Day 7 Day 8 Day 9 Day 10 Day 11 Day 12 Day 13 Day 14 Day 15 Day 16 Day 17 Outbreak of critical event Corrective Action Taken Copyright 2012 Deloitte Development LLC. All rights reserved. 5

Organizations With SEIM Recovery Automated detection process 60.00 40.00 20.00 Acceptable Risk 0.00 High Risk 20.00 40.00 60.00 80.00 Day 1 Day 2 Day 3 Day 4 Day 5 Day 6 Day 7 Day 8 Day 9 Day 10 Day 11 Day 12 Day 13 Day 14 Day 15 Day 16 Day 17 Outbreak of critical event Corrective Action Taken Copyright 2012 Deloitte Development LLC. All rights reserved. 6

Organizations With SEIM and Active Threat Management/Effective Incident Escalation Automated detection and remediation process 60.00 40.00 20.00 Acceptable Risk 0.00 20.00 40.00 60.00 80.00 Day 1 Day 2 Day 3 Day 4 Day 5 Day 6 Day 7 Day 8 Day 9 Day 10 Day 11 Day 12 Day 13 Day 14 Day 15 Day 16 Day 17 Outbreak of worm Corrective Action Taken Copyright 2012 Deloitte Development LLC. All rights reserved. 7

SEIM Addressing of Organizational Challenges Challenges addressed by LMR Risk Containment Operational Cost Compliance Lack of visibility from external threats (Intrusion Detection) Lack of visibility from internal threats (Extrusion Detection) Limited visibility of misappropriation and mis-use Inability to effectively enforce and monitor security controls High loss of revenue due to virus and worm outbreaks Disabling or limitation of audit controls due to information overload Inability to correlate events from disparate sources High operational cost to monitor security events High exposure window due to the time to react Too much technology making monitoring (operationally) cost prohibitive Inability to effectively demonstrate security compliance Copyright 2012 Deloitte Development LLC. All rights reserved. 8

Conceptual Solution

Solution Conceptual Level Develop a Logging & Monitoring Strategy Develop logging standard aligned with regulatory and business needs Align / provision logging on devices based on logging standard (careful on DB!) Microsoft werpoint Presentat Perform analysis on requirements, options (in-house versus MSSP, SOC approach), and sustainment considerations for implementing log management and monitoring processes Procure tool (and/or services) and resources for managing and monitoring logs (SIEM, DLP - network, FIM) Design Use Cases for monitoring Implementation strategy (phases, tuning, etc.) Copyright 2012 Deloitte Development LLC. All rights reserved. 10

Detective Controls (Sample for illustration purposes) Higher business value Infrastructure Threats Outbreak Threats Mis-use of privilege Insider Threat Data Leakage Advanced Persistent Threats Industry Channel Threats Fraud and Misappropri ation Business Applications Web Application Gateway APT feed CTI feed Cyber-beacon feed DLP Emerging Threats High Business Impact Vulnerability data Identity Management Database/DAM etc. File and Print Authentication Servers (Radius, TACACS+, AD etc.) IDS/IPS/WAF/NAC Content Management (AV, Malware Detection, URL etc.) Network Behavioral Analysis Current Threats Structured Controls FW/VPN OS logs Core Switches Distribution Switches Access Level Switches Infrastructure Threats Good Controls Typically Exist Copyright 2012 Deloitte Development LLC. All rights reserved. 11

SEIM as Part of an Organizational Security Architecture (Typical) SAMPLE 12 Copyright 2012 Deloitte Development LLC. All rights reserved. 12

Insourcing versus Outsourcing

Comparison of an in versus outsourced solution Level 1 and Security Status Monitoring MSSP s can often provide repeatable and highly effective services for level 1 (traditional) security threats. This includes traditional security monitoring of common threats that are faced by other organizations. Level 2 (Advanced Threat) The MSSP is generally dependent on the organization for advanced threat monitoring (e.g., emerging threats that are not defined in the SLA), coordination with internal application owners, case and ticket tracking, etc. Most MSSP operate under a model of monitor, detect, escalate and handoff. MSSP s define a maximum number of complementary use cases that will be integrated into the SOC, per year. Additional use cases may affect the financial impact of operating the SOC over time. Infrastructure Monitoring MSSP s can monitor against organization s defined use cases for Infrastructure Monitoring. However the logic around the dynamic nature of the infrastructure requires specific (client specific) familiarity and assimilation into the fabric of the organization. For example, new initiatives that results in increased firewall activity. A process workflow can be created to notify MSSP s of these activities, but usually there is a threshold of how often these notifications occurs and typically do not include smaller changes. Copyright 2012 Deloitte Development LLC. All rights reserved. 14

Comparison of an in versus outsourced solution Perimeter Threat Monitoring MSSP s generally have repeatable and optimized processes around perimeter threat monitoring. Given the fact that MSSP s work with other like organizations, MSSP s can distinguish between a general Internet threat and a more focused organizational specific threat. Internal Threat Monitoring Internal (Insider) Threat Monitoring requires detailed understanding of the Lines of Business, expected behavior and a good appreciation for the organization s specific operational and business model, including the tendency for expected behavior to change over time. Outlier Threat Analysis Similar to Internal Threat Monitoring, Outlier Threat Analysis is the evaluation of threats against an organization s baseline. However the baseline at client may change based on various factors and therefore an internal SOC is better geared to evaluate against outlier and statistical models. Copyright 2012 Deloitte Development LLC. All rights reserved. 15

Comparison of an in versus outsourced solution Business and Fraud Monitoring Most MSSP have good capability on traditional security monitoring, but have limited capability against client focused business and fraud monitoring. The reason being that MSSP s are designed and operate on a scalable platform to service a large subset of clients. However Business and Fraud patterns differ from organization by organization. IT Service Management Security Monitoring A key part of security monitoring is reconciling security events against ITIL based services. For example, comparing configuration changes against approved changes (or releases). Most MSSP s support the export of cases (or incidents) into a ticketing system, but usually do not have the ability to receive changes to CI s (Configuration Item s) related to an approved change, especially from the diverse ticketing processes. An insource SOC can build a process to either receive information on approved changes, automate CI s on assets related to a change or be able to interface with the change initiator to validate change approval. Privilege User Monitoring Similar to IT Service Management Monitoring, MSSP s can monitor based on client use cases, but are unable to fully reconcile use of privilege out of role (or duty). An internal SOC can build Identity Provisioning input into the SOC to evaluate security events against role, segregation of duty and other factors. Copyright 2012 Deloitte Development LLC. All rights reserved. 16

Comparison of an in versus outsourced solution General Cyber Threat Monitoring MSSP s have threat vectors for general cyber threats, should they have other like monitored organizations. Therefore they theoretically can provide repeatable capability against general cyber threats. Brand Protection and Cyber Beacon Monitoring Most of the threats nowadays originate or can be depicted through an organizations Cyber Beacon. Cyber Beacon is how an Organization is viewed in cyber space, including data points from a Web 2.0 perspective. Most innovative organizations are starting to pre-empt threats by obtaining advanced knowledge from Cyber Threat Intelligence from these sources. This includes how the brand or association with the brand is used and the threats posed by Spammer, Phishers, etc. Unless provided as a supplementary service (not part of the core offering) most MSSP s do not have the ability to perform brand and cyber beacon monitoring. However this can be built within the people, process and technology of an insourced SOC. Non-traditional multi-dimensional threat monitoring As organizations expand the foot print of Security Status monitoring, the organization may consider non-traditional security monitoring. For example Physical Security and the like. Most MSSP s that monitor for logical threats are usually not tooled (people, process and technology) to address these non-traditional devices. Copyright 2012 Deloitte Development LLC. All rights reserved. 17

Vendors

SIEM and MSSP Vendors Copyright 2012 Deloitte Development LLC. All rights reserved. 19

Implementation Considerations

Implementation Considerations Decide on Sourcing Strategy (inhouse versus MSSP) Identify what data sources will you need to monitor in order to detect potential security incidents => may lead to identification of additional tools needs (e.g., network DLP, FIM, etc.) SIEM on its own does not provide any value! Regardless of what any of the vendors say, implementing a logging and monitoring solution properly will require take some time Device Inventory is Key Develop specific technical and functional requirements for the solution Develop Architecture and Sizing (EPS rates and Log Capacity) will impact cost Copyright 2012 Deloitte Development LLC. All rights reserved. 21

Implementation Considerations (cont.) Logging Standard Developed Device Identification and Integration - Exact devices to be integrated have been identified? (This can be a pain and can impact project schedule if not nailed down early) - Data classification in place? Develop Configuration Guides for Device Integration and consistency Types of devices databases will add complexities; some devices may require custom connector development Change Management Process (can impact device integration) Cyber Threat Intelligence (CTI) Feed consideration May require additional products syslog server Number and Type of Use Cases for SIEM (outside of out-of-box rules) these should be developed in conjunction with the phased strategy Tuning will be key! (Level 1, 2 and 3) Copyright 2012 Deloitte Development LLC. All rights reserved. 22

Lesson s Learned Requirements analysis: Define the requirements, control objectives, compliance requirements and problem definition; Determine appropriate control levels: Ensure that the rollout plan is mapped to control objectives; Optimize and prioritize: The key factor of a successful SEIM deployment is the appropriate selection and prioritization of log sources; Threat landscape matrix: Define a threat inventory based on the risk and control requirement profile of the client. This will be used for architecture development; Set expectation: Ensure that management and technical staff understand the key realities of the architecture; Define enterprise infrastructure requirements: This can include data store requirements, retention, network bandwidth requirements etc. It is important to involve key stakeholders; Solution analysis: Review and map compliance/risk requirements against solutions; Customized for unique requirements: SEIM solutions offer base capability however require customization to meet organizational risk and compliance goals; Process development: Define the people and processes required to support the architecture. In Deloitte s experience, SEM/SEIM projects usually fail due to weaknesses in processes, people and vision Copyright 2012 Deloitte Development LLC. All rights reserved. 23

Copyright 2012 Deloitte Development LLC. All rights reserved. Questions?