From the Datacenter to the Dean s office



Similar documents
Transform E- Commerce the Domino s Pizza Way

Keeping Splunk in Check: Tools to BeGer Manage Your Investment

Deployment Best PracHces for Splunk Apps Monitoring MicrosoK- based Infrastructure

Splunk Apps for Monitoring Microso< Based Infrastructure

Gain Insight into Your Cloud Usage with the Splunk App for AWS

More Comprehensive Digital Intelligence - CorrelaFng Client and Server- side Data

Architec;ng Splunk for High Availability and Disaster Recovery

Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals

Splunk Cloud as a SIEM for Cybersecurity CollaboraFon

Kevin Hayes, CISSP, CISM MULTIPLY SECURITY EFFECTIVENESS WITH SIEM

Deploying Splunk on Amazon Web Services

Building a Security Operations Center. Randy Marchany VA Tech IT Security Office and Lab marchany@vt.edu

Defining, building, and making use cases work

Splunk Enterprise in the Cloud Vision and Roadmap

Splunk implementa-on. Our experiences throughout the 3 year journey

All your apps & data in the cloud, all in one place.

Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks

Advanced Configuration Steps

Monitoring Oracle Enterprise Performance Management System Release Deployments from Oracle Enterprise Manager 12c

Evaluating, choosing and implementing a SIEM solution. Dan Han, Virginia Commonwealth University

Cutting Through SIEM Vendor Marketing. Make the right technology decision A. Ananth

State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1

How to Leverage Splunk s Security Intelligence PlaKorm for Security OperaNons Environments

Leveraging Machine Data to Deliver New Insights for Business Analytics

Application Security Best Practices. Matt Tavis Principal Solutions Architect

In Depth with Deployment Server Sanford Owings

VMware vcenter Log Insight Getting Started Guide

Cloud Security. Are you on the train or the tracks? ISSA CISO Executive Forum April 18, Brian Grayek CISSP, CCSK, ITILv3

Server Monitoring: Centralize and Win

BSA Best Practices Webinars Role Based Access Control Sean Berry Customer Engineering

CorreLog: Mature SIEM Solution on Day One Paul Gozaloff, CISSP. Presentation for SC Congress esymposium CorreLog, Inc. Tuesday, August 5, 2014

WebLogic on Oracle Database Appliance: Combining High Availability and Simplicity

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

Preparing a SQL Server for EmpowerID installation

Description of Application

How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment

How To - Implement Single Sign On Authentication with Active Directory

GRAVITYZONE UNIFIED SECURITY MANAGEMENT. Use Cases for Beta Testers

Server & Application Monitor

Getting Started with Clearlogin A Guide for Administrators V1.01

Virtual Server and Storage Provisioning Service. Service Description

Think like an MBA not a CISSP

Radia Cloud. User Guide. For the Windows operating systems Software Version: Document Release Date: June 2014

Virtual Appliance Setup Guide

OneLogin Integration User Guide

Splunk for Networking and SDN

Configuring Situation Events in Action Manager for WebSphere Business Monitor Version 6.0

Web based training for field technicians can be arranged by calling These Documents are required for a successful install:

Secret Server Qualys Integration Guide

Real World Big Data Architecture - Splunk, Hadoop, RDBMS

#splunkconf. Analyzing & Mitigating Malicious Web Activity using Splunk Enterprise

Achieving and Exceeding Compliance Through Open Source Solutions

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

User Guide. Version R91. English

How To Be Successful At Workday

GigaSpaces XAP 10.0 Administration Training ADMINISTRATION, MONITORING AND TROUBLESHOOTING GIGASPACES XAP DISTRIBUTED SYSTEMS

Proof of Concept Guide

NetFlow Analytics for Splunk

Total Cloud Control with Oracle Enterprise Manager 12c. Kevin Patterson, Principal Sales Consultant, Enterprise Manager Oracle

WHITE PAPER. Domo Advanced Architecture

Google Integration Instructions

WatchDox Administrator's Guide. Application Version 3.7.5

Public Cloud Service Definition

Integrating Cisco ISE with GO!Enterprise MDM Quick Start

Using ArcGIS for Server in the Amazon Cloud

LEARNING SOLUTIONS website milner.com/learning phone

Mark Bennett. Search and the Virtual Machine

Patching, AlerFng, BYOD and More: Managing Security in the Enterprise with Splunk Enterprise

Blackboard Open Source Monitoring

Remote Application Server Version 14. Last updated:

Adding ObserveIT video audit logs to your SIEM

CSN38:Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO

Propalms TSE Deployment Guide

Netwrix Auditor for Windows Server

Office 365 SharePoint Online

D-Link Central WiFiManager Configuration Guide

Reality Check: What You Need to Know about PC and Mac Desktop Costs Understanding the Real Costs of Deploying Macs and PCs

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Why Your SIEM Isn t Adding Value And Why It May Not Be The Tool s Fault. Best Practices Whitepaper June 18, 2014

Deploying the Splunk App for Microso> Exchange

Enterprise Network Deployment, 10,000 25,000 Users

Heroix Longitude Quick Start Guide V7.1

Course Agenda: Managing Active Directory with NetIQ Directory and Resource Administrator and NetIQ Exchange Administrator

Windows Inputs and MicrosoC Apps Strategy

Proactive Network Performance Monitoring

Splunk Company Overview

Apple Configurator MDM Site - Review

Best Practices for Monitoring Databases on VMware. Dean Richards Senior DBA, Confio Software

Guide to Auditing and Logging in the Oracle E-Business Suite

HP Client Automation Standard Fast Track guide

Technology Highlights Of. (Medusa)

FISMA / NIST REVISION 3 COMPLIANCE

SchoolBooking SSO Integration Guide

LogLogic. Application Security Use Case: PCI Compliance. Jaime D Anna Sr Dir of Product Strategy, TIBCO Software

Cloud Managed Printing

Installation and Deployment

Remote Application Server Version 14. Last updated:

How To Manage Sourcefire From A Command Console

Transcription:

Copyright 2013 Splunk Inc. From the Datacenter to the Dean s office Mark Runals Sr Security Engineer, The Ohio State University #splunkconf

About Me! Started at OSU July 12 = 14 months using Splunk! Splunk training =.conf2012 + advanced admin class! ArcSight admin for 3 years medium sized deployment! MoRo - Solve for 80% and move on 2

OSU Splunk Environment June 12! 1 beefy server! 350GB license! ~100GB per day Aug 13! Enterprise level centralized log management service! 1,000 Splunk agents deployed, 300+ sourcetypes! 20 indexers! 16 core, 24GB RAM, 10k SAS drives RAID 10! 1TB per day of 2TB license! ~100 people through home- grown training! Mostly covered Office of the CIO (OCIO) Security Logs! Security logs from ~45 colleges 3

Agenda! OSU Environment! Program Drivers! Splunk Admin Nerdy Stuff! FTE Requirements! Geeng Funding! Cost Share and Centralizafon! ROI 4

OSU Environment! Large: 63,000 students, 32,000 FTE, 14 colleges, 174 undergraduate majors, 12,000 courses.! Highly distributed: 100 IT groups, 30 CIOs, 7+ campuses, 891 buildings.! Complicated: teaching, research, business affiliates, teaching hospital... subject to HIPAA, FERPA, PCI, FISMA, GLB, etc.! Diverse: you name the technology, we probably have it. Many OS plalorms, somware packages, versions, network gear, security gear, etc. 4,000+ web servers, 100+ email systems. Mulfple acfve directory domains and other authenfcafon sources. Desire2Learn, PeopleSom, and lots of home- grown applicafons. 5

Project Scope Change 2 Months into Job Maturafon Complex event correlafon Original plan (with SIEM) More mature with fewer clients (lots of work) Basic monitoring Log review & triage Implemented plan Significantly more clients, quicker, to address audit concerns Log collecfon Rollout & Adopfon 6

Program Drivers! Internal audit Mulfple colleges not managing and/or monitoring logs Huge driver for tool selecfon, deployment, adopfon! RFP key strategy decision point Start with log management or go right to advanced correlafon (SIEM)! Powell s Axiom: There are 3 desired business outcomes Minimize risk Reduce cost Generate revenue Goal Achieved (in part) via offering this 7

General User Perspecfve No write access in Search app Not able to schedule searches Not able to run real fme searches Each group has individual app InfoSec Web Portal 2FA SSO x 250! Based on locally created template! Contains standard audit content! Place for them to share among team Separate SH for! Security group 1 Search head Addifonal one on deck! Deployment server! Job server! Operafonal dashboards (future) 8

Distributed vs. Centralized! Opfon 1 Indexer/search head at each college or department Concerns over lack of control Higher overall admin TCO Distributed hardware funding! Op#on 2 Centralized hardware & provide access to web console Reduced barrier to entry/onboarding Central management of system More secure Setup beefy syslog server to receive syslog data 9

Index Creafon Strategy Colleges! 1 5 admins for enfre technology stack! Primary focus audit compliance! Large variety of log sources! Easy RBAC! Office of the CIO! Service organizafon! Dedicated teams at various fers! RBAC about to become a PITA Syslog IIS Firewall x Servers Apache IDS Firewall y Servers Middleware DC Firewalls Server Management Basketweaving Psychobotany Xenopsychology 10

Updafng Configs! Do you have anything in- house? Chef, Puppet, Other?! Our challenges Each college IT shop is autonomous Nothing is standard No centralized asset management Most IT shops have < 20 servers Splunk deployment server 11

Deployment Server! Used deployment server to manage inputs Use the clientname feature of deploymentclient.conf ê Standardize naming convenfon for forwarder type, group, & OS from start!! ê No CLI support for feature (yet) ê We didn t provide a scripted install solufon to the colleges! Other fps One DS can manage ~2k check- ins a minute Change default phonehome interval via deployment package ê great for troubleshoofng Use DS to manage index.conf files on idx/sh Put tech X props/transforms in same package; deploy to both idx/sh 12

FTE Requirements Centrally hosted service work items! New client interacfon! Onboard new data! Data management! Knowledge management! Deploying apps! Training! Content creafon! Tesfng! Tuning Splunk! Customer interacfon! Deployment management! Polifcs! Data requests! General program management issues! Planning! Services support! Fixing stuff! General BS 3 FTE 2 FTE Care and feeding 1 FTE Program & service management Content creafon OSU current = ~1 person working 1.5 FTE+ OSU opfmal = 3 FTE 13

General Program Funding! CISO pushed back on accepfng risk Understand the appefte for security/response > ask for appropriate resources Our metrics are probably the same as yours > tell stories on what is happening If you are given money 1) spend it 2) on the things you requested funding for! Our focus was on informafon security In hindsight bringing more folks to the table could have led to more money ê Who doesn t need analyfc capabilifes? ê How complex do you want your RFP to be? 14

What About Cost Share?! Ini#al cost share solu#on to colleges Program side salaries funded centrally as our porfon Esfmate use and buy Splunk license capacity upfront Buy hardware to support license capacity eg 1 idx per 100GB Take average/peak use per month for first 3 months ê metrics.log query to determine usage (next slide) Cost per GB x Usage! Pay to play lessons learned Typical group has NO idea volume of log producfon Groups appreciated being able to kick the fres no charge for first 3 months Lower adopfon rates (use not mandated) Metrics log direcfonally correct; not exactly accurate 15

Usage Query! Created in first week of using Splunk and haven t revisited it /shrug index=_internal source=*metrics.log group=per_index_thruput chart sum(ev) AS Total_Logs eval(sum(ev)/86400) AS Avg_EPS eval(sum(kb) / 1048576) as GB by series eval Total_Logs=tostring(Total_Logs,"commas") eval Avg_EPS=round(Avg_EPS) eval GB=round(GB,1)!! If you come up with a berer query let me know! 16

Cost Share Resolved(ish)! University provided central funding for a number of security efforts Not charging colleges to onboard security logs ê Loose definifon - logs used in typical invesfgafon ê Firewall, OS, AV, web, authenfcafon, etc. (focus on IP, MAC, username)! Outcome Major upfck in adopfon (surprised?) use sfll not mandated Kicked the can what about when the colleges realize Splunk s potenfal and want to send non security logs? 17

ROI! Providing university free solufon to meet audit requirements! Colleges don t have to resource in- house solufon! All teams centralized log collecfon; powerful search capability! Database group user account audifng on 140 db! Networking group capacity planning for wireless environment! Security group broader view; richer invesfgafons; quicker resolufon; powerful alert engine! Using Exchange, AD, and VMware Splunk apps 18

Takeaways! Don t undersize your server hardware especially inifal install! As you are able / have resources try to think how decisions today will provide or restrict opfons 6 months from now! If you have limited Splunk admin personnel you need engineers over analysts! Limited FTE + data diversity + aggressive rollout = your Splunk admin(s) will NOT be experts on finding/understanding/using the data in Splunk 19

Quesfons? 20

Contact Info runals.3@osu.edu runals.blogspot.com 21

Next Steps 1 2 3 Download the.conf2013 Mobile App If not iphone, ipad or Android, use the Web App Take the survey & WIN A PASS FOR.CONF2014 Or one of these bags! Go to Planning and Execu#on for Successful Deployments Room: Brera 2&3, Level 3 Today, 10:15-11:15am 22

THANK YOU