SOC ESSENTIALS What I Learned Building the SOC @ St. Jude Medical. Russ Staiger, Sr. Information Security Analyst



Similar documents
Splunk: Using Big Data for Cybersecurity

Security & Threat Detection: Go Beyond Monitoring

Advanced SOC Design. Next Generation Security Operations. Shane Harsch Senior Solutions Principal, MBA GCED CISSP RSA

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Best Practices in File Integrity Monitoring. Ed Jowett, CISSP ITIL Practitioner Sr. Systems Engineer, Tripwire Inc.

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

RETHINKING ORC: NRF S CYBER SECURITY EFFORTS. OMG Cross Domain Threat & Risk Information Exchange Day, March 23, 2015

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

SOLUTION BRIEF. Next Generation APT Defense for Healthcare

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Metrics that Matter Security Risk Analytics

White Paper Achieving HIPAA Compliance through Security Information Management. White Paper / HIPAA

RSA SIEM and DLP Infrastructure and Information Monitoring in One Solution

Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel

Intelligence Driven Security

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

After the Attack. The Transformation of EMC Security Operations

Address C-level Cybersecurity issues to enable and secure Digital transformation

Advanced Threats: The New World Order

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy

RSA Security Anatomy of an Attack Lessons learned

QRadar SIEM and Zscaler Nanolog Streaming Service

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

Big Data and Security: At the Edge of Prediction

Converting Security & Log Data into Business Intelligence: Art or Science? Phone Conference

CIP Supply Chain Risk Management (RM ) Statement of Jacob S. Olcott Vice President, BitSight Technologies January 28, 2016

University of Pittsburgh Security Assessment Questionnaire (v1.5)

CyberArk Privileged Threat Analytics. Solution Brief

PCI DSS Reporting WHITEPAPER

Prevent cyber attacks. SEE. what you are missing. Netw rk Infrastructure Security Management

Discover & Investigate Advanced Threats. OVERVIEW

The session is about to commence. Please switch your phone to silent!

Detect & Investigate Threats. OVERVIEW

Cyber Threat Intelligence and Incident Coordination Center (C 3 ) Protecting the Healthcare Industry from Cyber Attacks

Uncover security risks on your enterprise network

How To Manage Log Management

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate

Cyber Governance Preparing for the Inevitable Perimeter Breach

The Future of the Advanced SOC

Information Security and Risk Management

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Dealing with Big Data in Cyber Intelligence

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

ALERT LOGIC FOR HIPAA COMPLIANCE

Evolution Of Cyber Threats & Defense Approaches

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

Cyber intelligence exchange in business environment : a battle for trust and data

Using SIEM for Real- Time Threat Detection

IBM QRadar Security Intelligence April 2013

Building a Security Operations Center. Randy Marchany VA Tech IT Security Office and Lab marchany@vt.edu

CONNECTING ACCESS GOVERNANCE AND PRIVILEGED ACCESS MANAGEMENT

Trusted Geolocation in The Cloud Technical Demonstration

FIVE PRACTICAL STEPS

After the Attack: RSA's Security Operations Transformed

Key Cyber Risks at the ERP Level

How To Protect Your Organization From Insider Threats

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

Risk Analytics for Cyber Security

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

BIG SHIFT TO CLOUD-BASED SECURITY

2010 Data Breach Investigations Report

Securing SharePoint 101. Rob Rachwald Imperva

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

RSA Security Analytics

SecureVue Product Brochure

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

Hunting for Indicators of Compromise

Compliance Management, made easy

SECURING SENSITIVE DATA WITHIN AMAZON WEB SERVICES EC2 AND EBS

Under the Hood of the IBM Threat Protection System

QRadar SIEM and FireEye MPS Integration

Cybersecurity Strategic Consulting

The Five W's of SOC Operations. Kevin

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

Security Analytics for Smart Grid

Best Practices for Building a Security Operations Center

Microsoft Services Premier Support. Security Services Catalogue

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

Transcription:

SOC ESSENTIALS What I Learned Building the SOC @ St. Jude Medical Russ Staiger, Sr. Information Security Analyst

CTAC Vision & Mission Vision A safe, secure and resilient information technology operating environment that provides for the protection of our patient, customer, and employee information and allows for the execution of the St. Jude Medical mission and strategy. Mission The Cyber Threat Action Center s (CTAC) mission is to identify, protect against, respond to, and enhance resiliency against cyber security threats. The CTAC provides cyber security capabilities that foster excellence in the execution of St. Jude IT and business operations.

Advanced Threats Are Hard to Find The SOC is a must-have for enterprise and intellectual property protections. Cyber Criminals Another Day, Another Retailer in a Massive Credit Card Breach Bloomberg Businessweek, March 2014 Nation States/Hacktivists Banks Seek U.S. Help on Iran Cyber attacks Wall Street Journal, Jan 2013 100% Valid credentials were used 40 Average # of systems accessed 229 Median # of days before detection Insider Threats Edward Snowden Tells SXSW He'd Leak Those Secrets Again NPR, March 2014 67% Of victims were notified by external entity Source: Mandiant M-Trends Report 2012/2013/2014

Cyber Threat Action Center U.S. APAC EMEA Visibility Detect Correlate Analyze Prioritize Action Remediate with precision & speed

CTAC Impact ACTOR PEOPLE PROCESS TECHNOLOGY THREAT Human directed Goal-oriented Dynamic (adjusts to changes) Coordinated Multiple tools & activities New evasion techniques CTAC Fusion of people, process, & technology Isolated & secure research Rapid learning and response Sharing & collaboration Contextual & behavioral Leverage threat intel

IT Info Security Policy Relationship

IT Info Security Policy Relationship At a minimum, SOC development should address the requirements of your IT Information Security policy. The policy should also aid the SOC by: Monitoring and coverage requirements (24x7 model or off-hours) Mandated training for SOC teams on a regular (min. annual) basis Incident Response intake, escalation and reporting requirements Data classification standard (HIPAA, ephi/phi, PII, PCI)

CTAC Structure

The Right People Initial CTAC Team Consists of: 4 Level I Analysts (1-2 years of fundamentals) 3 Level II Analysts (3-5 years of full-spectrum experience) 2 Level III Analysts (dedicated researchers) Supported by: 4 SIEM Engineers 3 Vulnerability Management Analysts 3 Device/Tool Admins

The Right Processes and Technology Implement security controls Archer GRC aids IT Compliance Increase visibility of Enterprise network events SIEM indexes big data and makes it searchable Correlate findings and establish context Off-the-shelf and custom in-house-developed applications Automate event/incident response Archer Security Operations Security best-practice Insecure activity Emerging compliance issues

Physical Build-Out Fully-configurable video wall 6 mechanical sit-stand desks 2 fixed full-size desks 1 hoteling position Forensic area Vulnerability Mgmt area Intel Operations area Secure conference room w/ VTC Senior office Server room

Physical Build-Out All HVAC and facility boundaries are built to eliminate any ability to eavesdrop or overhear activities. Double-paned, tempered glass used for our observation window from the public hallway. Include a window shade for use during sensitive functions.

SOC Must Foster Secure Collaboration Need-to-know basis starts in a contained, regulated process Don t allow the unfounded to become externally unproductive: Events can become incidents. SOC must contain this narrative. Discussion frequently needs to be rapid and open. Secure it. Sensitive personnel issues are common. The venue must respect this.

The Unexpected

The Unexpected Cosmetic considerations count. We have an external display w/ security awareness slides outside. Anticipate physical expansion in your blueprint. It may happen soon. Keep things re-configurable where possible. Fundamental operations come first. Keep analyst downtime low during construction and transition. Keep your pre-soc processes alive for DR/BC. Redundancy is key. Update them accordingly.

The Unexpected A new SOC changes many things, some counter-intuitively Dispel sociopolitical issues of isolationism early. Invite reasonable visitation and have an open house. Avoid creating a message that defense is absolute because the SOC has arrived. Market the SOC as member of the IT business. Get a logo, get swag to hand out: mouse pads, stickers

The Unexpected ADA requirements will affect your physical layout and can come as a surprise. Plan for these early. This door opened into a high-traffic hallway because of access ramp inside. Many costly solutions proposed ($10-50k)

The Unexpected Be creative where permissible.

Questions? Thank you!