Realization of Security Events Management System via OPENSTF



Similar documents
Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Taxonomy of Intrusion Detection System

Banking Security using Honeypot

SAST, DAST and Vulnerability Assessments, = 4

Information & Asset Protection with SIEM and DLP

Vulnerability Management

End-user Security Analytics Strengthens Protection with ArcSight

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

SANS Top 20 Critical Controls for Effective Cyber Defense

The SIEM Evaluator s Guide

Security Information Management (SIM)

Security Information & Event Management (SIEM)

Information Security. Incident Management Program. What is an Incident Management Program? Why is it needed?

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability. 7 Jul 2014

PCI Requirements Coverage Summary Table

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

SERVICE ORIENTED ARCHITECTURE

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

BeyondInsight Version 5.6 New and Updated Features

What is Security Intelligence?

IT Security and OT Security. Understanding the Challenges

Fear Not What Security Can Do to Your Firm; Instead, Imagine What Your Firm Can Do When Secured!

Secure Cloud-Ready Data Centers Juniper Networks

funkwerk packetalarm NG IDS/IPS Systems

Network Security Administrator

Industrial Security for Process Automation

Cisco Advanced Services for Network Security

The Role of Threat Intelligence and Layered Security for Intrusion Prevention in the Post-Target Breach Era

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

Host-based Intrusion Prevention System (HIPS)

Tunisia s experience in building an ISAC. Haythem EL MIR Technical Manager NACS Head of the Incident Response Team cert-tcc

IBM QRadar Security Intelligence April 2013

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity

Log Audit Ensuring Behavior Compliance Secoway elog System

PROFESSIONAL SECURITY SYSTEMS

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

Syslog Analyzer ABOUT US. Member of the TeleManagement Forum

Goals. Understanding security testing

Master of Science Service Oriented Architecture for Enterprise. Courses description

Q1 Labs Corporate Overview

The Hillstone and Trend Micro Joint Solution

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Metrics that Matter Security Risk Analytics

Network- vs. Host-based Intrusion Detection

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

CLOUD GUARD UNIFIED ENTERPRISE

McAfee Network Security Platform

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

Glasnost or Tyranny? You Can Have Secure and Open Networks!

Cisco Remote Management Services for Security

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Security Information Management

Modular Network Security. Tyler Carter, McAfee Network Security

MANAGED SECURITY SERVICES

State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1

Current IBAT Endorsed Services

Find the needle in the security haystack

Basics of Internet Security

Symphony Plus Cyber security for the power and water industries

IBM Endpoint Manager Product Introduction and Overview

Ovation Security Center Data Sheet

Alcatel-Lucent Services

Information Technology Solutions

Integrating Web Application Security into the IT Curriculum

Εmerging Ways to Protect your Network

Implementing Cisco IOS Network Security v2.0 (IINS)

Name. Description. Rationale

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

Closing Wireless Loopholes for PCI Compliance and Security

Integrated Threat & Security Management.

INTRUSION DETECTION SYSTEMS and Network Security

White Paper: Consensus Audit Guidelines and Symantec RAS

How To Connect Log Files To A Log File On A Network With A Network Device (Network) On A Computer Or Network (Network Or Network) On Your Network (For A Network)

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Introduction to Network Discovery and Identity

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

A Model-based Methodology for Developing Secure VoIP Systems

IBM Security IBM Corporation IBM Corporation

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

Meeting the Challenges of Virtualization Security

Transcription:

Realization of Security Events Management System via OPENSTF Lance Yoo www.antpower.org

Requirements Analysis of Security Event Management

Background of Security Event Management Requirement We could not qualify the impact of so many heterogeneous security products It is useless to view a mass of security events with a mount of trustless information included The policy constitute could not acquire the whole view on security state There are no valid correlations with security decision and security application. An Open Loop System, which is consisted of Early Warning, Defending, Responding sub-systems, has no strong ability to desist the strikes. 第 3 页

Heterogeneous security solution leads to risks Authentication Scanner IDS/IPS Security App Firewall Endpoint Security Anti Virus Audit VPN Database NTLOG WMI SYSLOG OPSEC IDMEF SNMP 第 4 页

Impossible to handle the mass of security event 第 5 页

Sensibility And Reliability are conflict IDS False Positive/False Negative IDS acquirement and analysis of information is limited according to its network level and performance(context-free) IDS SNR enhancement lies on Efficiency of event management 第 6 页

Security Policy lack of whole view Current solution is elementary and partial No effective way to show whole security tendency Total Risks have to obey Bucket Principle Lack of practical data when leader or manager making security policy Is your security system an closed loop system? 第 7 页

Risk and Asset How to dynamic evaluate real asset value in security solution How to manage risk assessment in security application For users, Business Application is the goal, not Security Find hidden threat in time 第 8 页

The Definition of the Security Events Management It is so creative to analyze the security events real time collected from Computer, Network, Storage and Security devices. The SEM helps us to find the true security risk via the correlations on security events with different places, different layers and different types. In fact, we could not only assess the current security state and risk, but also make emergency responding with pre-defined policies automatically. Dynamic security system Model is the major body of intelligent system 第 9 页

SEM in security system Security Event Management SEM Core of risk management 第 10 页

The goal of SEM Correlation and Aggregation of security events The risk quantization and visualization Closed Loop System, Response in time 第 11 页

Technologies in security event management

SEM 4lization Normalization Aggregation Correlation Visualization 第 13 页

Normalization Collect Adaptor IDMEF Syslog NT Event Database SNMP v1-3 Specific Interface 第 14 页

Aggregation filtrate eliminate the redundant data classify Bind context 第 15 页

Asset Assessment stimulate event contextualization Picture above you can see security attributes of asset which will be an important part in real time risk calculation. 第 16 页

Rule-based Correlation Correlate event by predefined policy to make accurate security alarm. Strong real-time analysis ability based on small time windows as you should define correlation rule first. 第 17 页

Statistics-based Correlation Consolidate a certain time event, refer to a threshold, and make a security tendency estimation finally. Based on large time windows, less real-time analysis ability, not necessary predefined rule, reflect system the whole system security attributes. Make major categories first, classify the events then. Evaluate the attack according to the event security level and quantity. 第 18 页

Data Mining - three-dimensional risk visualization Devices on the Network Most attacks are on corporate HQ 第 19 页

The Problems solved by SEM To mitigate the burden of processing security alarms involving human To reduce the false positives of security events To avoid the potential risk under the mass volume of events To quicken the response of incidents To Manage events from IDS, Firewall, OS, Antivirus, Web server, Database 第 20 页

Implementing of SEM with OpenSTF

The Characteristic of Implementing SEM/SIM Not only the technical problems, but also the people and operation A extendable basic system plus different modules and solutions for different application environment Usually need 2nd development to form the final management system From the view of design & development method, it s similar to ERP system for enterprise management 第 22 页

Build Software System vs. Build SIM/SEM Fred Brooks -Father of IBM 360 System The Mythical Man-Month, he brought us 4 root causes of the difficulty in software system development: complexity conformity changability invisibility No Silver Bullet!? Same in SIM/SEM development! 第 23 页

The evolution of software development vs. info-sec system development Software Engineering(RUP XP CMM ) OO(MDA UML Design Pattern ) Platform(software platform, business application platform) Middleware Info-sec engineering (ISSE/SSE-CMM) Standard of Security Managment (ISO17799/BSI7799) IATF PKI/PMI Security Middleware Info Sec Application Oriented Platform 第 24 页

Global Goal Security Application Oriented Platform Business application oriented, to solve the problems of integration, interaction, extension, management of different security sub system, to reduce the total cost of own finally! 第 25 页

Security Application Oriented Platform 第 26 页

Attack-Defender Security Model Time Evolvement Domain Extension/Stratefication CORE Attacker plan Existed and New software Engineer technology Threat & Risk Risk Assessment input A s input s e t extend Lead to N e w V u l ref VUL Security Goal/Policy Attacker know enhance Common Vunerable VUL Exist knowledge enhance unknown Defender Know ref discovery Defender plan PPDRR technology management people Suite Hide and other postprocess Exploit and other attack Information acquistion Scan and validate Game Theory Attack (such as DOS) Track and trace affect SIM IDS HIDS NIDS recovery Response Prevention correlation Honeypot reattack issue Attacker event Information system Direct to Monitored host Monitored link Get event from issue Response event NetWork addr Interface Host configure Product Link Normal User Static part of issue Network Traffic 第 27 页

Information System/ Asset Attacker Defender Attack-Defender Security Model Security Goal/ Policy & Vulnerability 第 28 页

Distributed Programming in SOA Service Oriented Design Model is a revolution after OOD, which born in context of distributed computing Service Oriented Programming(SOP)is based on OOP Service is a predefined contract implemented by component and used by other components. The providing and using of the service are connected by contract which is interface in computer programming knowledge scope. 第 29 页

Concepts in Service Oriented Architecture Service Gateway Single Sign on Service Lookup SOA Domain& Context Transaction ACID Container Protocol Independent Framework 第 30 页

OpenSTF Core s Service Component Service Domain Service (Context) Policy Service Message and Transaction Service Internal Security Service (Authentication & Authorization) Universal UI Framework(GUIStarter) 第 31 页

The Definition of Middleware in General Middleware is a kind of reusable software Middleware s goal is resource sharing in distributed system Middleware not only implements connection but also inter-operation Middleware s application must be based on platform 第 32 页

The Concept of Security Middleware in OpenSTF Middleware is the collection of components which implement a certain type security function through collaboration The collaboration between them and other middleware assured and supported by services of OpenSTF core Middleware is the format of distribution, which has many properties: uuid, vendor, version, features, list of compontes The management of middleware and inside components is reached by OpenSTF core s Component Service 第 33 页

Data Exchange in SEM To solve the problem of multi-protocol in event collection with PIF provided by OpenSTF Core SNMP SYSLOG NTLOG OPSEC Database XML Protocol Independent Framework-PIF 第 34 页

Components in Event Processing Flow 第 35 页

The concept of Components in SEM Dynamic loading event collecting component according to event source s protocol Dynamic deploying online event processing component according to the event routing and processing policy Dynamic distributing visualization or UI component according the type of console 第 36 页

Realtime Risk Evaluation with Attack-Defender Security Model Value of Asset, which is static, imported from asset evaluation by service & consulting Vulnerability found by scanner or penetration tester Thread presented by security events Protection refer to the level of countermeasures 第 37 页

Incident Response Collaboration between SEM and 3 rd -party System or Device through Message Service provided by OpenSTF core Collaboration among peoples with role based workflow which begins with Transaction Service provided by OpenSTF Core 第 38 页

第 39 页