How to Build a Security Dashboard



Similar documents
IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Dell SonicWALL report portfolio

Unified Threat Management. Joel M Snyder Senior Partner Opus One jms@opus1.com

On-Premises DDoS Mitigation for the Enterprise

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Unified Security Anywhere SOX COMPLIANCE ACHIEVING SOX COMPLIANCE WITH MASERGY SECURITY PROFESSIONAL SERVICES

CALNET 3 Category 7 Network Based Management Security. Table of Contents

Edge Configuration Series Reporting Overview

Configuration Information


How To Protect A Network From Attack From A Hacker (Hbss)

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

Achieving SOX Compliance with Masergy Security Professional Services

Network Monitoring Comparison

74% 96 Action Items. Compliance

How to Make Your IDS Useful. Joel M Snyder Senior Partner Opus One jms@opus1.com

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Uncover security risks on your enterprise network

Network Management and Monitoring Software

PART D NETWORK SERVICES

anomaly, thus reported to our central servers.

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

Achieving PCI-Compliance through Cyberoam

NetFlow Tips and Tricks

OLD DOMINION UNIVERSITY Router-Switch Best Practices. (last updated : )

INFORMATION PROTECTED

Guideline on Auditing and Log Management

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis

IBM Internet Security Systems

Advantages of Managed Security Services

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Network Monitoring. Sebastian Büttrich, NSRC / IT University of Copenhagen Last edit: February 2012, ICTP Trieste

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

Lesson 5: Network perimeter security

Top tips for improved network security

How I Learned to Stop Worrying and Love Compliance Ron Gula, CEO Tenable Network Security

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

SANS Top 20 Critical Controls for Effective Cyber Defense

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

Symantec Endpoint Protection Analyzer Report

First Line of Defense

End-user Security Analytics Strengthens Protection with ArcSight

Configuration Information

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

Smarter Security for Smarter Local Government. Craig Sargent, Solutions Specialist

Sophos XG Firewall v Release Notes. Sophos XG Firewall Reports Guide v

MONITORING AND VULNERABILITY MANAGEMENT PCI COMPLIANCE JUNE 2014

Symantec Security Information Manager Version 4.7

CARL : Cyberoam Aggregated Reporting and Logging :: User Guide. Table Of Contents INTRODUCTION... 4

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

Stay ahead of insiderthreats with predictive,intelligent security

FIREMON SECURITY MANAGER

Hosted Exchange Sales Toolkit. Common objections FAQs

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

WINDOWS SERVER MONITORING

Security Toolsets for ISP Defense

Let us take care of your protection so you can focus on your business.

PureMessage for Microsoft Exchange Help. Product version: 4.0

LogRhythm and PCI Compliance

CMPT 471 Networking II

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

Technology Blueprint. Protect Your . Get strong security despite increasing volumes, threats, and green requirements

NetAid Services NETENRICH. Service at a Glance. IT as a Service Offering from NetEnrich. Delivering IT as a Service

Monitoring Log Management and Alerting

The Comprehensive Guide to PCI Security Standards Compliance

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

NETFORT LANGUARDIAN MONITORING WAN CONNECTIONS. How to monitor WAN connections with NetFort LANGuardian Aisling Brennan

Meeting PCI Data Security Standards with

Secure Cloud-Ready Data Centers Juniper Networks

CorreLog Alignment to PCI Security Standards Compliance

Scott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit.

Barracuda Link Balancer

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

Tier3 Remote Monitoring System. Peace of Mind for Less Than a Cup of Coffee a Day

Network Security. Network Security. Protective and Dependable. > UTM Content Security Gateway. > VPN Security Gateway. > Multi-Homing Security Gateway

Network Instruments white paper

Monitoring Best Practices for COMMERCE

WhatsUp Gold vs. Orion

IBM Managed Security Services (Cloud Computing) hosted and Web security - express managed Web security

IDS or IPS? Pocket E-Guide

Visendo Suite a reliable solution for SMBs

Firewalls (IPTABLES)

Automate your IT Security Services

Automate PCI Compliance Monitoring, Investigation & Reporting

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Security

IronPort C300 for Medium-Sized Enterprises and Satellite Offices

Astaro Gateway Software Applications

Symantec Protection Suite Small Business Edition

SonicWALL PCI 1.1 Implementation Guide

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

Government of Canada Managed Security Service (GCMSS) Attachment 2.1: Historical Information

The Evolution of Information Security at Wayne State University

Top 10 Features: Clearswift SECURE Gateway

Managed IT Solutions. More Reliable Networks Are Our Business

SonicWALL Security Appliance

Advantages of Managed Security Services

Proactive IT Solutions More Reliable Networks Are Our Business

Transcription:

Building a Security Dashboard Joel M Snyder jms@opus1.com Senior Partner Opus One

Agenda What s a Dashboard? How do I build one (part 1)? <parts 2 through n> don t fit in an hour

A Security Dashboard Provides At a Glance view of your security posture

Since Security Posture? What s that? Security is Risk Avoidance, Joel s Definition iti is: Security Posture: The Degree to Which You Are Exposed to Risk

Risk Mitigators Reduce Risk RISK Risk Mitigator RISK

For Example: Before Mitigator After Lots of viruses Anti-virus A few viruses Lots of spam Anti-spam A few spam Lots of attacks Lots of inappropriate traffic Intrusion Prevention Content filtering A few attacks A little inappropriate traffic Lots of leaked Data Leak A little leaked data Protection data Lots of port scans Firewall A few port scans

Anomaly Detectors can Detect Risk +1 standard deviation Secondary signs of increase in risk are also visible in the form of anomalous activity

Step 1 of Building A Dashboard Identify Sources of Risk Information Risk mitigation technologies Anomaly detection technologies Traffic flow and information

Source of Information Firewall Traffic Log Mail Security Gateway IDS/IPS Network Monitoring Bandwidth Graphing Vulnerability Analyzer Log Collector Tripwire Example: Opus One Type of Information Traffic in/out of the network; prohibited inbound/outbound attempts Level of inbound email traffic; number of viruses and spam blocked Alerts on suspicious traffic; alerts on blocked traffic Systems up/down; ping latency; link/disk/memory/cpu usage Traffic levels at network port granularity System vulnerability detection; deltas in vulnerabilities; changes in open ports Information from SYSLOG, Windows Event Log, SNMP Changes in system security or sensitive files

How Do We Measure Risk Exposure? Identify assets and define their value Identify threats to assets Calculate SLE = (EF x Value) + Downtime Calculate ALE before = ARO before * SLE before Figure out a solution that mitigates risk Change EF, ALE, and ARO Compare ALE before with ALE after Calculate ALE after = ARO after * SLE after

OK, Better Question: What Do Our Data Tell Us? Mitigators can t tell you when they re broken But you may be able to see it Anomaly detectors can t tell you when something is broken But you may be able to see it

For Example, Mail Security Gateway What can you see in this information that helps you to evaluate security posture and risk?

This Turns Into 1 hr, 8 hr, 100 hr

Or Possibly

Example 2: Network Status

How About: Who is Slow? Remember: who is down is not security dashboard you ll get alerts for that stuff. We want additional insight on un-alertable data here.

Too Generic: Who is Unusually Fast/Slow? Better but would be good to Better but would be good to color code based on how far off of normal behavior this is. Even better don t fixate on ping but extend response time to applications

Step 2 of Building a Dashboard 2. Reduce output of risk mitigation tools to minimum needed to determine security posture! If you want the full boat, you can always click-through to the original data or a more detailed display

Incorporating Anomaly Detection Requires Baselining Quick: is there something wrong here or not?

Without Baselining, You ll Never Know Looks like we kick off backups on Tuesday at midnight for this system

Examples of Baseline Deviation Source of Information Firewall Traffic Log Network Monitoring Vulnerability Analyzer Log Collector Tripwire Deviation To Look For Traffic high/low; outbound deny high Application slower than normal Delta in open ports/responding services SYSLOG/Windows Log/SNMP Trap above normal levels for each system Tripwire is all about deviations!

Step 3 of Building a Dashboard 3. Determine sliding baseline for security metrics and report when baseline is exceeded You will also want to have pure bandwidth graphs on your dashboard, but you don t have room for too many

Next Steps 4. Identify most critical 12 to 16 panes of data giving insight into security posture 5. Bring together into graphical format 6. Reconcile with alerting 7. Get promotion from drooling boss

Thanks! Joel M Snyder jms@opus1.com Senior Partner Opus One