Defining, building, and making use cases work



Similar documents
ArcSight Express Administration and Operations Course

PCI Compliance for Cloud Applications

Enforcive /Cross-Platform Audit

High End Information Security Services

SANS Top 20 Critical Controls for Effective Cyber Defense

Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals

How To Manage Security On A Networked Computer System

Enabling Security Operations with RSA envision. August, 2009

MONITORING AND VULNERABILITY MANAGEMENT PCI COMPLIANCE JUNE 2014

SIEM Implementation Approach Discussion. April 2012

CorreLog: Mature SIEM Solution on Day One Paul Gozaloff, CISSP. Presentation for SC Congress esymposium CorreLog, Inc. Tuesday, August 5, 2014

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Secret Server Splunk Integration Guide

Security Information and

Caretower s SIEM Managed Security Services

Reports, Features and benefits of ManageEngine ADAudit Plus

End-user Security Analytics Strengthens Protection with ArcSight

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

CSN38:Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO

Clavister InSight TM. Protecting Values

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD

Ecom Infotech. Page 1 of 6

Practical examples of Big Data, security analytics and visualization

FairWarning Mapping to PCI DSS 3.0, Requirement 10

Reports, Features and benefits of ManageEngine ADAudit Plus

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Click&DECiDE s PCI DSS Version 1.2 Compliance Suite Nerys Grivolas The V ersatile BI S o l uti on!

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

Best Practices Report

RSA Solution Brief. RSA envision. Platform. Compliance and Security Information Management. RSA Solution Brief

Achieving SOX Compliance with Masergy Security Professional Services

Key USP s. Multiple PCI level GRC tool

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

Breach Findings for Large Merchants. 28 January 2015 Glen Jones Cyber Intelligence and Investigation Lester Chan Payment System Security

Don t let your SIeM become your Nightmare!

USM IT Security Council Guide for Security Event Logging. Version 1.1

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Running the SANS Top 5 Essential Log Reports with Activeworx Security Center

Top 10 SIEM Implementer s Checklist

Concierge SIEM Reporting Overview

Metric Matters. Dain Perkins, CISSP

Secrets of Event Viewer for Active Directory Security Auditing Lepide Software

74% 96 Action Items. Compliance

Critical Controls for Cyber Security.

EventTracker Knowledge Update

ALERT LOGIC LOG MANAGER & LOGREVIEW

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

whitepaper The Benefits of Integrating File Integrity Monitoring with SIEM

Operationalizing Information Security: Top 10 SIEM Implementer s Checklist

Defending Against Data Beaches: Internal Controls for Cybersecurity

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Bottom line you must be compliant. It s the law. If you aren t compliant, you are leaving yourself open to fines, lawsuits and potentially closure.

Use of Exchange Mail and Diary Service Code of Practice

Network Management and Monitoring Software

Comodo Endpoint Security Manager SME Software Version 2.1

Lab Configure IOS Firewall IDS

Enterprise SysLog Manager (ESM)

Monitoring Log Management and Alerting

An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011

Payment Card Industry Data Security Standard

Security Intelligence in Action: SANS Review of McAfee Enterprise Security Manager (ESM) 9.2

Ultimate Windows Security for ArcSight. YOUR COMPLETE ARCSIGHT SOLUTION FOR MICROSOFT WINDOWS Product Overview - October 2012

Corporate Security Intelligence Services

Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA Office: Fax:

Sarbanes-Oxley Compliance for Cloud Applications

PCI Wireless Compliance with AirTight WIPS

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊

LogLogic. Application Security Use Case: PCI Compliance. Jaime D Anna Sr Dir of Product Strategy, TIBCO Software

Sophos XG Firewall v Release Notes. Sophos XG Firewall Reports Guide v

The Cloud App Visibility Blindspot

How To Secure A Database From A Leaky, Unsecured, And Unpatched Server

Cybersecurity: What CFO s Need to Know

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite.

Server Monitoring: Centralize and Win

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Hard Disk Space Management

State of Vermont. Intrusion Detection and Prevention Policy. Date: Approved by: Tom Pelham Policy Number:

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring

Closing Wireless Loopholes for PCI Compliance and Security

McAfee Network Security Platform Administration Course

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

HIGH-RISK USER MONITORING

CHEAT SHEET: PCI DSS 3.1 COMPLIANCE

NERC CIP Whitepaper How Endian Solutions Can Help With Compliance

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

Transcription:

Defining, building, and making use cases work Paul Brettle Presales Manager, Americas Pacific Region

What is a use case? Compliance FISMA, PCI, SOX, etc Network security firewalls, IDS, routers & switches Malware Systems application and operating system User monitoring identity, privileged user, shared accounts SOC metrics management metrics, analyst team, infrastructure performance Fraud banking, atms Others? 2

Defining a Use Case Problem statement 1 6 Evaluate and refine Define the objective 2 Identify Identify 5 deliverables Define thresholds 4 data source 3 3

Example use case audit log cleared How do I want to be made aware? Notification to CIRT Dashboard tracking Compliance Report to Auditors of Audit Log Cleared 4 How do I know when the audit Problem log is cleared on my systems? statement Evaluate and refine Identify Define the objective Identify I need to be notified when audit logs are cleared for my critical assets Operating System deliverables Data data source IDS/IPS (Host) Firewalls Define thresholds What are my thresholds? (Always, Frequency based, something else?)

Building a use case Capture the data / requirements consistently Utilise a standard process What works for you is great Consider Use Case forms https://protect724.arcsight.com/docs/doc-1523 (Cindy Jones) Targeted, simple, manageable Steer clear of monolithic packages 5

Simple tactics to make your life easy KISS principle still stands Normal mechanisms stand, but control is the key part Keep named user control around role based access Limit options for access rights operators DON T need write to rules! Group by general use / log source type / purpose your choice! Use the numbering structures / schemes Remember the use case process and captured data Build out on deliverables Build out on threat / risk 6

ArcSight use cases Under used previously been present since ESM 4.5 Much more content and documentation around for ESM 6.0c and Express 4.0 Look at focused content built around specific data sets Usually focused around several active lists imported or used as standard Linked resources for filters, active channels etc common naming, structure etc Wizard tool to drive content configuration 7

Configuring a use case 8

Steps to build use cases 1. Problem statement 2. Define objectives 3. Identify data sources 4. Define thresholds 5. Identify the deliverables 6. Evaluate & refine as needed 1 2 3 4 5 6 9

Example use case Problem statement: Identify unauthorized privileged user access to critical servers Define the objective: Ensure we have the ability to identify when unauthorized access is: Attempted Succeeds Occurs without authorization Identify unusual behavior Allow easy identification of other activities 10

Example use case Identify the data sources: Servers Network devices Other? But also need to identify supporting data sources: Who is an privileged user? Can we identify them easily? How can we identify if they are allowed / authorized or not? Change control system? Change window? Supporting network log data? 11

Example use case Data source -> list Log data -> event Alert -> rule Consider supporting information Critical servers asset list Privileged users external list Default privileged user external list 12

Example use case Define the thresholds How to trigger rules? What content to build out? Where does the information go? Individuals? Team to process? Tracking list? 13

Example use case Identify deliverables Content to show what we want Dashboards Reports Alerts How to use the data? Dashboards Investigation Ease of use? External data compliance Audit information 14

Example use case Evaluate and refine How to improve? Where to refine and get better? What content can be extended? Focus on key data / log sources better privileged user information Integrate automated data feeds export / import Improve data, quality and content Add further capabilities on different log sources / systems 15

Review of use case approach Building Meaningful Use Cases Formalized approach to understand what is required Define, develop, build and use focused content Process helps define what is needed: Problem Statement Define Objectives Identify Data Sources Define Thresholds Identify the Deliverables Evaluate & Refine as Needed Assists in so many other areas 16

Summary Advanced Malware Server Admin Monitor Threat Intelligence User Monitoring Monitor Perimeter Monitoring Social Media Feed Insider Network Anomaly Detection Threat App Monitoring Third Party Monitor Baseline Monitoring 17

Please give me your feedback Session TB3057 Speaker Paul Brettle Please fill out a survey. Hand it to the door monitor on your way out. Thank you for providing your feedback, which helps us enhance content for future events. 18

Thank you