Patching, AlerFng, BYOD and More: Managing Security in the Enterprise with Splunk Enterprise



Similar documents
Obtaining Value from Your Database Activity Monitoring (DAM) Solution

OWASP OWASP. The OWASP Foundation Selected vulnerabilities in web management consoles of network devices

Complete Patch Management

IBM QRadar Security Intelligence April 2013

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Unified Threat Management, Managed Security, and the Cloud Services Model

Good Guys vs. the Bad Guys: Can Big Data Tools Counteract Advanced Threats?

Security Information & Event Management (SIEM)

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals

Kevin Hayes, CISSP, CISM MULTIPLY SECURITY EFFECTIVENESS WITH SIEM

INCIDENT RESPONSE CHECKLIST

ISSA Phoenix Chapter Meeting Topic: Security Enablement & Risk Reducing Best Practices for BYOD + SaaS Cloud Apps

Guide to Auditing and Logging in the Oracle E-Business Suite

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

Real World Big Data Architecture - Splunk, Hadoop, RDBMS

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia

Critical Security Controls

A Love Affair: Cyber Security, Big-data and Risk

Deploying the Splunk App for Microso> Exchange

Shifting Roles for Security in the Virtualized Data Center: Who Owns What?

Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600

Symantec Client Management Suite 8.0

Secunia Corporate Software Inspector (Secunia CSI) ver.5.0

#ITtrends #ITTRENDS SYMANTEC VISION

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Oracle Database Security Myths

RFI Template for Enterprise MDM Solutions

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

DIR Contract Number DIR-TSO-2621 Appendix C Pricing Index

Windows Server 2003 End of Support. What does it mean? What are my options?

Security Best Practices for Microsoft Azure Applications

Microsoft Private Cloud

Securing Oracle E-Business Suite in the Cloud

Goals. Understanding security testing

Measurable Improvements in E-Business Suite Application Management with OEM 12c

Find the needle in the security haystack

Eoin Thornton Senior Security Architect Zinopy Security Ltd.

How To Manage Your Information Systems At Aerosoft.Com

Concierge SIEM Reporting Overview

Big Data and Security: At the Edge of Prediction

Security Operations Metrics Definitions for Management and Operations Teams

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Kelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management

GoToAssist Integration White Paper

Vulnerability Intelligence & 3 rd party patch management

Enabling Security Operations with RSA envision. August, 2009

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

Virtual Patching: a Compelling Cost Savings Strategy

Solution Requirements and Process Flow

QRadar SIEM and Zscaler Nanolog Streaming Service

ClearSkies SIEM Security-as-a-Service (SecaaS) Infocom Security Athens April 2014

Rashmi Knowles Chief Security Architect EMEA

Splunk: Using Big Data for Cybersecurity

Technology Solutions for NERC CIP Compliance June 25, 2015

5 Steps to Advanced Threat Protection

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Andreas Mertz (Founder/Man. Dir. it-cube SYSTEMS, CISSP) 360 SAP Security

Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues

Oracle E-Business Suite APPS, SYSADMIN, and oracle Securing Generic Privileged Accounts. Stephen Kost Chief Technology Officer Integrigy Corporation

How to Grow and Transform your Security Program into the Cloud

IBM Security QRadar Vulnerability Manager Version User Guide

Installation Guide. Tech Excel January 2009

Security Solution Architecture for VDI

Critical Controls for Cyber Security.

Frequently Asked Questions. Secure Log Manager. Last Update: 6/25/ Barfield Road Atlanta, GA Tel: Fax:

Defending against Cyber Attacks

Advanced Threat Protection Framework: What it is, why it s important and what to do with it

Trust but Verify: Best Practices for Monitoring Privileged Users

PCI DSS. Get Compliant, Stay Compliant Seminar

Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks

Accelerate Patching. the Enterprise. Wolfgang Kandek Qualys, Inc. Session ID: STAR-301 Session Classification: Intermediate

Symantec Protection Center Enterprise 3.0. Release Notes

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

Virtualization Impact on Compliance and Audit

A Practical Approach to Network Vulnerability Assessment AN AUDITOR S PERSPECTIVE BRYAN MILLER, IT DIRECTOR JOHN KEILLOR, CPA, AUDIT PARTNER

Why Cisco for Cloud? IT Service Delivery, Orchestration and Automation

Unprecedented Malware Growth

<Insert Picture Here> How to protect sensitive data, challenges & risks

The Time has come for A Single View of IT. Sridhar Iyengar March 2011

Auditing emerging cyber threats and IT controls

Incident Response Using Splunk for State and Local Governments

Application and Database Security with F5 BIG-IP ASM and IBM InfoSphere Guardium

What s new in AM 9.30 Accelerating business outcomes

Complete Patch Management

Service Orchestration

The Benefits of an Integrated Approach to Security in the Cloud

Transcription:

Copyright 2013 Splunk Inc. Patching, AlerFng, BYOD and More: Managing Security in the Enterprise with Splunk Enterprise Marquis Montgomery, CISSP, SSCP, GSEC Senior Security Architect, CedarCrestone #splunkconf

Meet CedarCrestone, Inc. Industry- focused consulfng, technical, and managed services for the deployment, management, and opfmizafon of applicafons and technology! Founded in 1981; based in Atlanta, Georgia! ERP ConsulFng & Managed Services Provider Specialists in ê Oracle ApplicaFons ConsulFng ê Strategy and AnalyFcs Services ê Hosted & Remote Managed Services ê ImplementaFon & Technical SoluFons with a focus on EBS, PeopleSoX, Business Intelligence, Workday By the numbers ê Host 700 different PeopleSoX environments / mulfple versions ê HosFng over 700 Oracle database instances ê 1500+ servers / network devices ê 53 hosted customers 2

Meet Marquis! Senior Security Architect and Interim Manager, Managed Services Security! 8 years coding experience! Primary responsibilifes include Engineering enterprise technical security controls Chief Splunker AutomaFon / Web App Development (Ruby on Rails) Incident Response Lead 3

Agenda! Life before Splunk! BYOD and the Patching Problem! IntegraFng Splunk Enterprise with the CMDB! Firewall and IDP IP Address IdenFficaFon! Key Takeaways! Q&A 4

Life Before Splunk

Life Before Splunk! Previously had a tradi0onal SIEM many bugs, lost a lot of logs other issues were: Gejng the right data out (retrieval) was painful Example: SIEM provided canned reports ê Data points, but no context Last hour 50 failed logins, Yes, but?? ê Canned reports don t answer the quesfons: So what? Is this bad or good? Who s doing this? Why is this happening? How does this compare to X months ago?! No way to collect PeopleSoA log data while suppor0ng mul0ple versions! Significant product bugs and QA issues 6

Life Before Splunk Splunk Enterprise solved all of these issues for us, and brought along some compelling new ways to work with our data 7

BYOD and the Patching Problem

BYOD and the Patching Problem! CedarCrestone has always been a Bring Your Own Device environment (20+ years, and counfng)! CedarCrestone is entrusted with sensifve informafon in many business applicafons and databases owned by its clients! One major tenant of good informafon security is proper OS and applicafon patching (SANS Top 20 Controls)! How do we ensure employee- owned machines are properly patched, even when they are at home or on a client site? 9

BYOD and the Patching Problem! A brief explanafon of Secunia PSI (www.secunia.com)! A brief explanafon of Secunia CSI (www.secunia.com)! Custom Development (Ruby and Rails)! Splunk DB Connect 10

BYOD and the Patching Problem! We had to get creafve with Secunia PSI, some custom development, and Splunk Enterprise to solve this problem 11

BYOD and the Patching Problem Metric Risk What we look for % Employees Patched Unpatched Machines Secunia Score % Employees Encrypted Data Loss OS Sejngs % Employees With AV Malicious Code Installed Programs % Employees Without DLP Data Loss Installed Programs! Reported to business units and execufves monthly 12

Let s Explore some Data DEMO 13

IntegraFng Splunk with the CMDB

IntegraFng Splunk With the CMDB! Most Enterprises have a CMDB or an asset management database to help organize IT assets like servers, applicafons and network devices! The CedarCrestone security team referenced this type of informafon regularly when invesfgafng events in Splunk! Wouldn t it be nice if Splunk Enterprise showed us all the relevant info from asset management and CMDB automa&cally? 15

How to IntegraFng With the CMDB! Use Splunk DB Connect to explore your CMDB/Asset Database and develop SQL that returns the info you care about! Create a saved search that runs on an interval, and pipe the results of your DB Connect search to the outputlookup command to generate a constantly updated lookup table! Create an automafc lookup that runs your lookup table against the data you are exploring, and enjoy details from the CMDB as fields in your search if they exist 16

Let s Explore some Data DEMO 17

Firewall and IDP IP Address IdenFficaFon

Firewall and IDP IP Address IdenFficaFon! Problem: When exploring firewall and IDP data in Splunk, you have to deal with idenffying a mountain of IP addresses on your own! SoluFon: Use Splunk DB Connect and lookup tables to generate your own up to date list of IP addresses and descripfons! Enjoy having your Splunk events automafcally tagged with fields from your asset database as you invesfgate, correlate, and explore your data 19

Let s Explore some Data DEMO 20

Key Takeaways

Key Takeaways! Splunk Enterprise ships with many useful and interesfng ways to explore, correlate, analyze and report on your data! Take advantage of some of the useful search knowledge tools like DB Connect and lookup tables to enhance the convenience of exploring data in Splunk! Think outside of the box and get creafve Splunk Enterprise has the power and flexibility to allow you to do what you need to 22

What s Next! ValidaFon of PC encrypfon sejngs (custom agent reporfng to Splunk)! Merging asset, patching, and vulnerability management systems for trend analysis and outliers! Tracking user acceptance of our custom Security Portal 23

Copyright 2013 Splunk Inc. Thank You! Marquis Montgomery, CISSP, SSCP, GSEC Senior Security Architect, CedarCrestone marquis.montgomery@cedarcrestone.com @trademarq