netforensics - A Security Information Management Solution



Similar documents
How To Secure Your Small To Medium Size Microsoft Based Network: A Generic Case Study

Introduction to Business Continuity Planning

Interested in learning more about security?

Introduction to the Microsoft Windows XP Firewall

Interested in learning more about security? Why Bother About BIOS Security? Copyright SANS Institute Author Retains Full Rights

Security Awareness Training and Privacy

CiscoWorks SIMS(Netforensics)

Red Hat Network: Monitoring Module Overview

mbits Network Operations Centrec

Clavister InSight TM. Protecting Values

Monitoring Windows Workstations Seven Important Events

CA Anti-Virus r8.1. Benefits. Overview. CA Advantage

The SIEM Evaluator s Guide

Network- vs. Host-based Intrusion Detection

Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security

Security Information and Event Management (SIEM)

How To Use Ibm Tivoli Monitoring Software

DIR Contract Number DIR-TSO-2621 Appendix C Pricing Index

Niagara IT Manager s Guide

ENC Enterprise Network Center. Intuitive, Real-time Monitoring and Management of Distributed Devices. Benefits. Access anytime, anywhere

Security Data Analytics Platform

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Frequently Asked Questions. Secure Log Manager. Last Update: 6/25/ Barfield Road Atlanta, GA Tel: Fax:

Cisco CRS-1/IOS-XR Device Management 3.5.2: Based on Cisco Active Network Abstraction Software

Cisco IPS Manager Express

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

INTRUSION DETECTION SYSTEMS and Network Security

Security Information Management (SIM)

NETWORK SECURITY (W/LAB) Course Syllabus

Cisco Active Network Abstraction 4.0

Intrusion Detection Systems (IDS)

ObserveIT User Activity Monitoring

IBM RealSecure Server Sensor System Requirements

Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement

IBM DB2 CommonStore for Lotus Domino, Version 8.3

Total Protection for Enterprise-Advanced

v5.2 Installation Guide for Websense Enterprise v5.2 Embedded on Cisco Content Engine

Security Event Management. February 7, 2007 (Revision 5)

Network Security Monitoring: Looking Beyond the Network

Trend Micro. Advanced Security Built for the Cloud

Information Technology Policy

Symantec AntiVirus Enterprise Edition

IBM Rational Asset Manager

McAfee Web Reporter Turning volumes of data into actionable intelligence

Our Security. History of IDS Cont d In 1983, Dr. Dorothy Denning and SRI International began working on a government project.

Introduction of Intrusion Detection Systems

SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF

Guideline on Auditing and Log Management

SANS Top 20 Critical Controls for Effective Cyber Defense

Managed Security Services for Data

CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader

GFI Product Manual. Deployment Guide

How To Manage Log Management

Taxonomy of Intrusion Detection System

IBM Tivoli Monitoring for Databases

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred

SENTINEL MANAGEMENT & MONITORING

OpManager MSP Edition

IBM Tivoli Composite Application Manager for WebSphere

APPLICATION MANAGEMENT SUITE FOR SIEBEL APPLICATIONS

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

Installation Prerequisites for MetaFrame Presentation Server 3.0

Product white paper. ROI and SIEM. How the RSA envision platform delivers an Industry-leading ROI

How To Manage Security On A Networked Computer System

Symantec Event Collectors Integration Guide for Symantec Security Information Manager 4.7

Customer Service Description Next Generation Network Firewall

Ovation Security Center Data Sheet

How To Manage Sourcefire From A Command Console

Symantec Security Information Manager Version 4.7

Current IBAT Endorsed Services

Heroix Longitude Quick Start Guide V7.1

IBM RealSecure Server Sensor System Requirements

Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems. Christopher Roblee Vincent Berk George Cybenko

GOOD PRACTICE GUIDE 13 (GPG13)

IBM Global Technology Services Preemptive security products and services

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

RETHINK SECURITY FOR UNKNOWN ATTACKS

The Internet Security And Intrusion Detection Market

I/A Series Software EDM Electronic Document Management

The GSM Standard (An overview of its security)

How To Achieve Pca Compliance With Redhat Enterprise Linux

Cisco Adaptive Security Device Manager Version 5.2F for Cisco Firewall Services Module Software Version 3.2

Network Security Platform 7.5

Understanding SCADA System Security Vulnerabilities

Transcription:

Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. netforensics - A Security Information Management Solution netforensics is a security information management (SIM) solution that positions itself as a central point for your security information that is collected by various devices. This scalable solution increases the manageability of multiple security countermeasures, thus increasing your overall security posture. It allows customization of alerts and reports, to better manage the flow of security information within an organization. netforensics eases the burden of auditing policy compliance, by providing a common framework... Copyright SANS Institute Author Retains Full Rights AD

netforensics A Security Information Management Solution Michael B. Godfrey Version 1.2f Introduction netforensics is a security information management (SIM) solution that positions itself as a central point for your security information that is collected by various devices. This scalable solution increases the manageability of multiple security countermeasures, thus increasing your overall security posture. It allows customization of alerts and reports, to better manage the flow of security information within an organization. netforensics eases the burden of auditing policy compliance, by providing a common framework for Key disparate fingerprint alerting = and AF19 reporting FA27 2F94 facilities. 998D FDB5 DE3D F8B5 06E4 A169 4E46 Why you Need a Security Information Management Tool Say you manage a large enterprise and are responsible for security. You have firewalls protecting your perimeter and you have an Intrusion Detection System (IDS) deployed across your network segments. You also use some type of enterprise management platform software to monitor availability. If you think your work is done here, I venture to say you have an incorrect perception of your security posture, or are spending quite a bit more money managing security than you should. What you need is a SIM solution. This is software that pulls these things together and should complement your enterprise management platform. With the proliferation of security products today there is a need for SIMs that can provide a common framework for managing security. Single vendor solutions across an enterprise are a thing of the past. One stop shopping rarely fulfills all the requirements when it comes to meeting information systems needs. Technologies come more and more from niche players; this is especially true in the security arena. Product Overview Single server netforensics deployment operating systems and hardware requirements: Operating Systems Solaris 2.6/7/8 Red Hat Linux 6.1 and 6.2 Windows NT 4.0 Service Pack 6/6a Windows 2000 Service Pack 1 Hardware Platforms Key Intel fingerprint Platform: = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Intel Pentium III 500 MHz 768 MB RAM 12 GB free disk space

Sparc Platform: Ultra Sparc-IIi 333 MHz 768 MB RAM 12 GB free disk space netforensics has three main software components that drive its core functionality: nf Agents/Universal Agent nf Engine Oracle database Key The nf fingerprint Agents collect = AF19 messages FA27 2F94 and 998D alerts from FDB5 their DE3D manageable F8B5 06E4 devices. A169 Out-of-thebox, netforensics has support for most major vendors. However, with their Universal 4E46 Agent, you can easily develop support for additional devices using a standard XML based language. These agents are interfaces to disparate security devices and applications that normalize the data, giving each event/message a netforensics event ID. This allows the nf Engine to do analysis and meaningful correlation, then to alert when necessary. All this data is housed in an Oracle database. The database feeds both the ad hoc reports as well as the scheduled reports that you can setup through the web based front end. Figure 1 1 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

netforensics The Security Information Management Tool netforensics does well in the five areas one should consider when looking at SIMs: Scalability Security Analysis and Forensics Notification Management Reporting Enterprise Management Compatibility Scalability Key fingerprint In large enterprise = AF19 FA27 networks, 2F94 998D things FDB5 can get DE3D very F8B5 complex. 06E4 Some A169 networks 4E46 start small or medium sized, then grow into large complicated ones very quickly. Others take decades in reaching their large size. These can be some of the most difficult networks to implement brand new security measures into. There tends to be different requirements for individual segments of the larger network. Also, there are many different technologies in the installed base to meet those segments disparate needs. One thing almost all the measures have in common is the enormous amounts of data that they generate. netforensics addresses these challenges with their use of Component Architecture. These components can be run on one box, or on separate boxes if you purchase a distributed license. The ability to separate the components and tune the boxes to their respective tasks, allows for significant scalability. As the organization grows so too will the need for additional security devices. netforensics, in a distributed deployment, can handle additional devices by putting more agent boxes in front of the nf Engine server. Using the SyslogFile Agent, netforensics can process over 8,000 events per second. 2 The nf Engine also does aggregation of messages from devices. This results in better data management in the database. In a distributed environment, there is always a need for secure communications between devices. netforensics has the ability to communicate securely, between devices, with some configuration. The communication between nf Agents and the nf Engine is XML over TCP, which uses nfetp (netforensics event Transfer protocol). The communication between the nf Engine and the nf Database is pure JDBC. These communications can be secured using third party JDBC drivers or by enabling IPSEC on the host level and building a secure Tunnel. 3 This is a growth area for netforensics. They will have SSL out-of-the-box in Version 3.0 Key of their fingerprint product, = for AF19 the FA27 Web Server 2F94 998D piece. FDB5 This was DE3D something F8B5 06E4 glaringly A169 missing 4E46 in Version 2.3 of the product. The Web Server allows you to do administration and run reports from a web browser, Netscape or Internet Explorer. While customization of the Web Server, Apache or Internet Information Server, to use SSL was possible, it was more

difficult than necessary. With secure communications in place, netforensics, and any IS System for that matter, can more easily be placed across your network, with reduced risks of sensitive security conversations being compromised. Security Analysis and Forensics Complete Security Picture The main goal is to get as complete and accurate a picture, as possible, of your organization s security posture. This picture is developed from correlating all your countermeasures in a consistent way and marrying that with historical analysis and forensics. Key Correlation fingerprint and = Analysis AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Cross device correlation is only possible after you establish a common framework between the systems. Information from firewalls, Intrusion Detection Systems, VPNs, applications and host-integrity systems is intelligently analyzed. Rule-based correlation techniques provide the logic required to identify various patterns of threats. The netforensics rule-set can be modified by the administrator to suit each client's particular requirements. 4 One cannot stress the importance of apples to apples comparisons of security information. This correlation work done by netforensics, can save you many man-hours of pouring over non-actionable data. However, there is some upfront investment a corporation must make. Organizations need to spend time gaining an understanding of what the scoring mechanisms are that they put in place, lest they get an inaccurate picture from what information is presented to them. Historical Analysis All messages delivered to netforensics are housed in an Oracle database. If you have the disk space, I suggest keeping the information as long as possible for later review. This information is invaluable for forensics. In addition, you can do historical comparisons if you retain a large enough data set. Notification Management To truly increase your security posture, you need to monitor, not only your traffic, but the alerts generated by your various security countermeasures. However, making sense of all the information being gathered can be a Herculean effort. According to Bruce Schneier, The future of digital systems is complexity, and complexity is the worst enemy of Key security. fingerprint 5 We see = AF19 just this FA27 issue 2F94 in the 998D security FDB5 arena DE3D with F8B5 different 06E4 vendor s A169 4E46 solutions, all having their own way of scoring the severity of incidents and the alerting and reporting of these events. So how does one reduce the complexity inherent in managing multiple security systems? The answer lies in the normalization of disparate alerting

facilities, such as ISS RealSecure and Cisco PIX IDS, and implementing a common severity rating system. Once you bring together security alerts under a common umbrella, you can begin to bring sanity to your monitoring and alerting efforts. netforensics has native agent support for the following devices, which allows it to receive and normalize alerts from: Figure 2 6 Intrusion Detection (network-based) Intrusion Detection (host-based) Net Ranger (Cisco) Entercept Cisco IOS IDS RealSecure (ISS) Dragon Sensor Dragon Squire Snort Key Real fingerprint Secure (ISS) = AF19 FA27 2F94 998D FDB5 DE3D Firewalls F8B5 06E4 A169 4E46 PIX (Cisco) Operating Systems Cisco IOS Firewall Solaris (Sun) Firewall-1 (Check Point) Linux (Various) Windows NT (Microsoft) VPNs Windows 2000 (Microsoft) Check Point VPN-1 Cisco VPN 3000 Concentrator Alerting Event Analyzer netforensics' Event Analyzer allows network managers to immediately sift through large volumes of data, focus on high-risk security breaches and track them. It analyzes, reports and correlates all security violations across various network devices and applications. 7 The nf Engine drives this correlation process. It also then delivers notifications based upon criteria that you select. Through the web based administration tool, you can select what severity level messages you want to deliver to either the Real-time Alarm Console, or to the database for ad hoc and scheduled reporting. You have the ability to select only the most critical events for real-time alerting, while still capturing the totality of messages for historical and archival purposes. You can also cull specific message types from going anywhere, if they are just noise on your network. Since one network s security incident is another network s false positive, this ability to tune data collection and subsequently backend alerting, is a stellar feature. Real-time Console netforensics' Alarm Console provides a real-time status of monitored devices with a detailed, scrolling Alarm Viewer accessible from any Java-enabled browser. 8 Key Having fingerprint a single = console AF19 monitoring FA27 2F94 several 998D FDB5 security DE3D products F8B5 helps 06E4 an A169 organization 4E46 in many ways. First, it reduces costs associated with training operators on multiple technologies. Second, you get a more complete security picture from the normalized data being alerted via a common severity scheme. Finally, the operational benefits of

changing alerts and reporting from a single technology, eases administration. This should not be overlooked as a value point. This provides, operational teams, the incentive to remain vigilant through change management and ever changing security requirements. Without this flexibility, an organization might otherwise choose to avoid the, sometimes significant, overhead of tuning and refining their alerting and reporting strategies. Useful Reporting Reports need to provide useful information. Just having pretty reports does not meet the goal of increased security tracking. netforensics reports leave a little to be desired, from the visually pleasing standpoint. However, they make up for it in their usefulness to Key security fingerprint engineers. = AF19 The FA27 ad hoc 2F94 reports 998D allow FDB5 you DE3D to query F8B5 the 06E4 data in A169 many 4E46 different ways. This allows you to not only find the information that is important to your organization, but also lets you have the data presented to you in a way that makes the bigger picture more evident, in regards to anomalous traffic. You can find the breakdown of report categories and their intended audience here. 9 As mentioned before, the less-than-pretty presentation of information makes these reports less likely a candidate for upper management. They have put a lot of effort into delivering the important detail to you in their reports. This is a great thing for the operations people, the ones really looking at the reports anyway. The web interface does a great job of letting you run ad hoc queries and scheduling regularly run reports, which are really the same canned queries minus the ones that require input. All reports give you information back in three ways: 1) Columnar output 2) Bar Graph 3) Pie Chart. The columnar data is where you will spend the Lion s Share of your time. The Bar Graphs and Pie Charts tend to leave you wanting. The information is rarely presented in a useful way in these two outputs. The data lends itself to be better represented in a histogram like MRTG 10 output. netforensics is aware of the need for improved graphing and aesthetics in their reports. Jim Stemme, Eastern Regional Manager for netforensics, has stated, this as a major goal in future releases. 11 One thing that can be done in netforensics to help increase both the usefulness and the aesthetics of reporting is customizing what information you want to report on. The significant amount of information collected by default, all shows on the reports, regardless of its usefulness. This pollution of the database also detracts from the beauty of the reports. The nf Engine gives you the ability to block any messages you want from entering the database, and subsequently appearing on the reports. There is no need to visit the individual reporting devices to implement this policy change, one centralized change to the nf Engine has the immediate effect across the board. Key Enterprise fingerprint Management = AF19 FA27 Compatibility 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Large enterprise environments have a different set of requirements when it comes to security technologies. They need more than just a robust incident alerting technology.

They need something that will achieve their business goals as well as meet their technical needs of identifying malicious behavior. If an enterprise cannot manage their security technologies and processes effectively, it does not matter what other technologies you put in place to identify threats. Today s networks have grown immeasurably more complex and difficult to manage. Computer Associate s TNG Unicenter 12, or IBM s Tivoli 13 products are necessary, to effectively monitor and manage all the devices that live on a large enterprise network. Security, like network management, needs an enterprise class framework to bring together the multitude of security countermeasures that larger networks may employ. Ideally, security is on par with availability in your network architecture. However, as is many times the case, security rides shotgun to availability, so there is a need to have your Key security fingerprint management = AF19 software FA27 2F94 complement 998D FDB5 your enterprise DE3D F8B5 management 06E4 A169 software. 4E46 Netforensics fills this niche very well. netforensics can generate SNMP Traps, which is a standard function these days. This allows for seamless integration into various other systems, by using this common transport scheme. When an event happens, netforensics can complement an organization s architecture by letting the infrastructure people know something is going on right away. These organizations are typically the first to implement 24x7 coverage. This way previous investments in availability can be leveraged and future costs for training can be minimized. After hours operators can watch and manage consoles from enterprise availability products and yet still be aware of security events. Conclusions Increasing your security posture today requires the ability to handle and analyze larger amounts of data than ever before. Complex networks need SIMs to monitor and manage output from disparate security countermeasures. netforensics is a SIM solution that can make this job more achievable. By providing a common framework for alerting and reporting, netforensics helps organizations better monitor and manage their security information. Armed with this data, organizations will be more able to track adherence to the security policy, and subsequently take the necessary steps to see that it is enforced. References 1 A Distributed Architecture Delivering Scalability and Performance. netforensics Online Documentation. URL: http://www.netforensics.com/architecture.html (29 November, 2001).. 2 Question #10. Online Technical FAQ. URL: Key http://www.netforensics.com/techfaqs.html fingerprint = AF19 FA27 2F94 998D FDB5 (29 November, DE3D F8B5 2001). 06E4 A169 4E46 3 Question #5. Online Technical FAQ. URL: http://www.netforensics.com/techfaqs.html (29 November, 2001).

4 Universal Correlation. Product Analysis. URL: http://www.netforensics.com/analysis.html (5 December, 2001). 5 Schneier, Bruce. Software Complexity and Security. Crypto-Gram Newsletter. March 15, 2000. URL: http://www.counterpane.com/crypto-gram-0003.html - SoftwareComplexityandSecurity (4 December, 2001). 6 Question #8. Product FAQ. URL: http://www.netforensics.com/pfaqs.html (17 January, 2002). Key 7 Event fingerprint Analyzer. = AF19 Software FA27 Solutions 2F94 998D to FDB5 Secure DE3D the Enterprise. F8B5 06E4 URL: A169 4E46 http://www.netforensics.com/products.html - three (18 January, 2002). 8 Real-Time Alarm Console. Software Solutions to Secure the Enterprise. URL: http://www.netforensics.com/products.html - three (18 January, 2002). 9 Product Reporting. URL: http://www.netforensics.com/reporting.html (18 January, 2002). 10 MRTG Index Page. What is the Multi Router Traffic Grapher? URL: http://www.stat.ee.ethz.ch/mrtg/ (18 January, 2002). 11 Stemme, Jim. Personal Interview. (4 January, 2002.) 12 Configuration Management and Operations. URL: http://www.tivoli.com/products/solutions/operations/news.html (28 December, 2002). 13 Unicenter Network and Systems Management 3.0. Enterprise Management. URL: http://www3.ca.com/solutions/product.asp?id=2869 (28 December, 2002). Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

Last Updated: June 22nd, 2016 Upcoming SANS Training Click Here for a full list of all Upcoming SANS Events by Location SANS Salt Lake City 2016 Salt Lake City, UTUS Jun 27, 2016 - Jul 02, 2016 Live Event SANS Cyber Defence Canberra 2016 Canberra, AU Jun 27, 2016 - Jul 09, 2016 Live Event MGT433 at SANS London Summer 2016 London, GB Jul 07, 2016 - Jul 08, 2016 Live Event SANS London Summer 2016 London, GB Jul 09, 2016 - Jul 18, 2016 Live Event SANS Rocky Mountain 2016 Denver, COUS Jul 11, 2016 - Jul 16, 2016 Live Event SANS Delhi 2016 Delhi, IN Jul 18, 2016 - Jul 30, 2016 Live Event SANS San Antonio 2016 San Antonio, TXUS Jul 18, 2016 - Jul 23, 2016 Live Event SANS Minneapolis 2016 Minneapolis, MNUS Jul 18, 2016 - Jul 23, 2016 Live Event SANS San Jose 2016 San Jose, CAUS Jul 25, 2016 - Jul 30, 2016 Live Event Industrial Control Systems Security Training Houston, TXUS Jul 25, 2016 - Jul 30, 2016 Live Event SANS Vienna Vienna, AT Aug 01, 2016 - Aug 06, 2016 Live Event SANS Boston 2016 Boston, MAUS Aug 01, 2016 - Aug 06, 2016 Live Event Security Awareness Summit & Training San Francisco, CAUS Aug 01, 2016 - Aug 10, 2016 Live Event DEV531: Defending Mobile Apps San Francisco, CAUS Aug 08, 2016 - Aug 09, 2016 Live Event SANS Portland 2016 Portland, ORUS Aug 08, 2016 - Aug 13, 2016 Live Event SANS Dallas 2016 Dallas, TXUS Aug 08, 2016 - Aug 13, 2016 Live Event DEV534: Secure DevOps San Francisco, CAUS Aug 10, 2016 - Aug 11, 2016 Live Event Data Breach Summit Chicago, ILUS Aug 18, 2016 - Aug 18, 2016 Live Event SANS Alaska 2016 Anchorage, AKUS Aug 22, 2016 - Aug 27, 2016 Live Event SANS Bangalore 2016 Bangalore, IN Aug 22, 2016 - Sep 03, 2016 Live Event SANS Chicago 2016 Chicago, ILUS Aug 22, 2016 - Aug 27, 2016 Live Event SANS Virginia Beach 2016 Virginia Beach, VAUS Aug 22, 2016 - Sep 02, 2016 Live Event SANS Brussels Autumn 2016 Brussels, BE Sep 05, 2016 - Sep 10, 2016 Live Event SANS Adelaide 2016 Adelaide, AU Sep 05, 2016 - Sep 10, 2016 Live Event SANS Northern Virginia - Crystal City 2016 Crystal City, VAUS Sep 06, 2016 - Sep 11, 2016 Live Event SANS Network Security 2016 Las Vegas, NVUS Sep 10, 2016 - Sep 19, 2016 Live Event SANS London Autumn London, GB Sep 19, 2016 - Sep 24, 2016 Live Event SANS ICS London 2016 London, GB Sep 19, 2016 - Sep 25, 2016 Live Event Digital Forensics & Incident Response Summit OnlineTXUS Jun 23, 2016 - Jun 30, 2016 Live Event SANS OnDemand Books & MP3s OnlyUS Anytime Self Paced