Security OperaCons with Splunk App for Enterprise Security



Similar documents
Threat Intelligence: STIX and Stones Will Break Your Foes

Workflow ProducCvity in Splunk Enterprise

Stalking Hackers with Core Splunk. Derek Arnold, CISSP Senior Splunk Consultant

SANS Top 20 Critical Controls for Effective Cyber Defense

Critical Controls for Cyber Security.

Honeypots & Honeynets Overview. Adli Wahid Security Specialist, APNIC.net adli@apnic.net

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

Splunk: Using Big Data for Cybersecurity

Find the needle in the security haystack

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Enabling Security Operations with RSA envision. August, 2009

Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute

Concierge SIEM Reporting Overview

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia

State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1

Security Information & Event Management (SIEM)

How To Connect Log Files To A Log File On A Network With A Network Device (Network) On A Computer Or Network (Network Or Network) On Your Network (For A Network)

Application for Splunk Enterprise

Defending Against Data Beaches: Internal Controls for Cybersecurity

Performing Advanced Incident Response Interactive Exercise

Secret Server Splunk Integration Guide

Verve Security Center

ORGANIZADOR: APOIANTE PRINCIPAL:

Vulnerability Management with the Splunk App for Enterprise Security

Information Technology Solutions

Splunk Cloud as a SIEM for Cybersecurity CollaboraFon

Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Information Technology Policy

Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats

Using IPsec VPN to provide communication between offices

CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT

Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security

Copyright 2013 Splunk Inc. Introducing Splunk 6

Fight the Noise with SIEM

End-user Security Analytics Strengthens Protection with ArcSight

Cisco Cloud Security Interoperability with Microsoft Office 365

POLIWALL: AHEAD OF THE FIREWALL

Eight Essential Elements for Effective Threat Intelligence Management May 2015

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace

Splunk Company Overview

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS

Netzwerkvirtualisierung? Aber mit Sicherheit!

POLIWALL: AHEAD OF THE FIREWALL

Mailwall Remote Features Tour Datasheet

Protecting the Infrastructure: Symantec Web Gateway

Extreme Networks: A SOLUTION WHITE PAPER

Software that provides secure access to technology, everywhere.

VISIBLY BETTER RISK AND SECURITY MANAGEMENT

The SIEM Evaluator s Guide

Keeping Splunk in Check: Tools to BeGer Manage Your Investment

INCIDENT RESPONSE CHECKLIST

Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

The Art of Modern Threat Defense. Paul Davis Director, Advanced Threats Security Solution Architects

Transform E- Commerce the Domino s Pizza Way

Hunting for the Undefined Threat: Advanced Analytics & Visualization

#splunkconf. Analyzing & Mitigating Malicious Web Activity using Splunk Enterprise

Firewalls, Tunnels, and Network Intrusion Detection

THE TOP 4 CONTROLS.

How to Leverage Splunk s Security Intelligence PlaKorm for Security OperaNons Environments

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Advanced Threat Protection with Dell SecureWorks Security Services

Defining, building, and making use cases work

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

OPC & Security Agenda

Chapter 1 The Principles of Auditing 1

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

Unified Security, ATP and more

Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Kevin Hayes, CISSP, CISM MULTIPLY SECURITY EFFECTIVENESS WITH SIEM

Defence Cyber Protection Partnership Cyber Risks Profile Requirements

Sophistication of attacks will keep improving, especially APT and zero-day exploits

E-Guide. Sponsored By:

The Protection Mission a constant endeavor

Presentation Title: When Anti-virus Doesn t Cut it: Catching Malware with SIEM

e2e Secure Cloud Connect Service - Service Definition Document

Best Practices for PCI DSS V3.0 Network Security Compliance

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Looking at the SANS 20 Critical Security Controls

EXPERT STRATEGIES FOR LOG COLLECTION, ROOT CAUSE ANALYSIS, AND COMPLIANCE

Caretower s SIEM Managed Security Services

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Compliance Overview: FISMA / NIST SP800 53

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Splunk Enterprise in the Cloud Vision and Roadmap

National Railroad Passenger Corp. (AMTRAK) Session 1 Threats and Constraints. Continuous. - Continuous Monitoring. - Continuous Assessment

U06 IT Infrastructure Policy

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Transcription:

Copyright 2014 Splunk Inc. Security OperaCons with Splunk App for Enterprise Security David Casey, Vice President, IT Security OperaCons Manager Flagstar Bank

Disclaimer During the course of this presentacon, we may make forward- looking statements regarding future events or the expected performance of the company. We caucon you that such statements reflect our current expectacons and escmates based on factors currently known to us and that actual events or results could differ materially. For important factors that may cause actual results to differ from those contained in our forward- looking statements, please review our filings with the SEC. The forward- looking statements made in the this presentacon are being made as of the Cme and date of its live presentacon. If reviewed aser its live presentacon, this presentacon may not contain current or accurate informacon. We do not assume any obligacon to update any forward- looking statements we may make. In addicon, any informacon about our roadmap outlines our general product direccon and is subject to change at any Cme without nocce. It is for informaconal purposes only, and shall not be incorporated into any contract or other commitment. Splunk undertakes no obligacon either to develop the features or funcconality described or to include any such feature or funcconality in a future release. 2

Personal Background! CISSP/CISM/SnortCP/Dr.Evil! Joined Flagstar Bank in early 2013! 15+ Yrs IT Security! 18 Yrs U.S. Army Military Intelligence Experience in the following sectors:! DoD (Lockheed MarCn, NCI, SAIC)! EducaCon! Energy! Finance Specialize in building Security OperaCons programs from the ground up and major security ops overhauls due to compliance failures 3

Company Background Flagstar Bank! Full- service bank (Troy, Michigan)! $9.4 billion in total assets! 100 + Branches in Michigan! 39 Home loan centers in 19 states! NaConwide mortgage lender! One of the nacon's top 10 largest savings banks 4

In the Beginning There was Darkness! 2009-2012 Flagstar expanded business operacons very fast! Infrastructure changes, mind sets, technology could not keep pace! As Flagstar bank grew federal oversight shised! New auditors were assessing security in the same manner as the Chase s and Bank of America s! Flagstar had many, many audit findings! People, processes, and technology had to change! IT Security OperaCons grew significantly in order to meet compliance requirements effeccvely! A SIEM was a criccal component! The One Ring to rule them all! 5

SIEM Technology Decision When looking for a SIEM solu7on for Flagstar leveraged 12+ years of SIEM deployment experience as its guide. Lessons learned: Difficult geong data in (ingescng data) Hard to get clear results from ad- hoc queries Limited plaporm opcons Costly to operate/maintain Inflexible SIEM sales hype. Product vendors only want to sell you their product. No interest in truly helping you protect your organizacon. Splunk Experience ü Easy to get all machine data into the system ü Simple plain language search ü Uses commodity hardware ü IntuiCve, easy to use ü Flexible and easy to customize ü They actually want you to be successful and take great strides to make it so! 6

Splunk Deployment Current Design:! 2 Search heads, 3 indexers, 300+ GB/day! Data sources (current) All servers via forwarders Windows, 4 flavors of UNIX All networking devices (switch, router, wireless, VPN, etc.) Syslog systems Firewall, IPS, DLP, AnC- Virus Web proxy logs DNS, DHCP email Applica7ons Splunk for Windows apps (3) Splunk for UNIX app Various vendor security apps (<10) DBConnect More 7

Splunk Deployment Disaster Recovery (DR) Design:! Overall Splunk ecosystem managed from HQ site! 2 Search heads, 2 indexers! DR site forwards all logs to HQ site! HQ replicates last 72 hours of logs to DR Future State:! All data 100% replicated! Heavy Forwarders Deployed to both HQ and DR sites! SAN improvements >1000 IOPS sustained 8

Security OperaCons Monitoring Challenges Some7mes security technology is simply not enough it takes a human to help it all make sense! The cyber security threat landscape is constantly morphing, ever changing, with threat actors intent on by- passing common security controls that rely on known payerns and deteccon techniques! Humans are primarily a visual- based species! Splunk can provide a visual that speaks a thousand words by taking the complex and making it simple to understand! Take for instance the following case studies 9

Case Study #1 Are We Being Targeted?! Flagstar s IT Security OperaCons Team uses the Splunk Enterprise Security (ES) App to monitor for advance threats, including exploits, malware infeccons, monitoring blacklists, and responding to spikes in threat trends! One common threat gathering technique is finger princng/mapping out a targets public facing systems, its ports and services! Being scanned is very common and generally considered background noise just a part of doing business on the internet! But when the scan is coming from a country that is frequently a hoscle cyber threat, and the scan is performed slowly, non- aggressively, it can osen by- pass security controls that are designed to block more aggressive scans 10

Case Study #1 Are We Being Targeted?! Sample Splunk search:sourcetype="[hidden]" earliest=- 1m inbound geoip src search src_country_code!=us stats count AS count by src_country_name sort - count top limit=5 11

Case Study #1 Are We Being Targeted?! Upon closer inspeccon we were able to isolate the scans as originacng from the City of Nanning, China! We have no legicmate customers in China! Answer? Block the network range 12

Case Study #1 Con$nued There are many hoscle actors all over the world. Some of the top actors are Russia, Ukraine, and China. Take Russia for example. Sure seems like there are a lot of outgoing conneccons to a Russian IP address. Could this be a compromised host? Using Splunk we can watch closely outbound descnacons, by IP locacon, and respond more quickly when we see an increase in potencally risky IP traffic to known hoscle actor countries. 13

Case Study #1 Con$nued! Sample Splunk search (Russia Inbound): sourcetype= [hidden]" src_ip!= [internal networks excluded]" iplocacon src_ip search Country="Russia" where Country="Russia" chart count by src_ip sort - count top limit=5! Sample Splunk search (Russia Outbound): sourcetype= [hidden]" src_ip!=[exclude DNS server IP, web proxies, etc.] " iplocacon dest_ip search Country="Russia" where Country="Russia" stats count by src_ip,dest_ip rename src_ip AS "Client" dest_ip AS "Russia IP Address" count AS "Count" table Client,"Russia IP Address",Count sort - count by Count top limit=5 14

Case Study #2 Firewall Control AyestaCon! Flagstar s IT Security OperaCons Team uses the Splunk Enterprise Security (ES) app to help meet regulatory requirements (for IT Security Dept. only at this Cme)! One example was where federal auditors wanted to see where changes to the perimeter firewall were being monitored against approved firewall changes! If a change occurred outside of the change control process it should be noted and invescgated! Splunk was used to help idencfy all write and execute commands issued on the perimeter firewalls and graphically displayed for easy idencficacon! This solucon was accepted by the federal auditors! YMMV 15

Case Study #2 Firewall Control AyestaCon! Sample Splunk search: evenyype= [hidden]_privileged_accvity" "write" OR "111010" OR "101008" NOT ("Teardown" OR "conneccon" OR "exit" OR "ping" OR [hidden]") Cmechart span=15m count(host) by user sort _Cme 16

Case Study #3 Metrics Across Security Technologies! Flagstar s IT Security OperaCons Team uses the Splunk Enterprise Security (ES) App to track security metrics! Security metrics are commonly requested as *proof* that the $$$ invested in security technology is actually producing results! Rather then running separate reports from each security technology to determine the metrics, using Splunk simplified the process greatly! Remember that a picture tells a thousand words 17

Case Study #3 Metrics Across Security Technologies! Sample Splunk search (IPS): index=[hidden] sourcetype=[hidden] rec_type_simple="ips EVENT" Cmechart span=1mon count 18

Case Study #4 24 x 7 Monitoring! Flagstar s IT Security OperaCons Team uses the Splunk Enterprise Security (ES) app to provide 24x7 monitoring! Instead of spending $$$ on an external Managed Security Services provider that provides aser hours support, Splunk can be used to develop acconable dashboards monitored by the internal Network OperaCons Support Team (which works 24x7)! PotenCal savings can go towards other criccal security budget items NOTE: This case study is currently being developed and tested within Flagstar. It has not yet reached a point where it is ready to replace an external MSS provider 19

Case Study #4 24x7 Monitoring! Sample Splunk search: Available upon request 20

Case Study #5! Flagstar s IT Security OperaCons Team uses the Splunk Enterprise Security (ES) app to detect `Brute Force Login Ayempts and send automated alerts in real- Cme when detected 21

Case Study #6! Flagstar s IT Security OperaCons Team uses the Splunk Enterprise Security (ES) app to detect `Malware InfecCons and send automated alerts in real- Cme when detected 22

Case Study #5 & 6! Sample Splunk search (Brute Force Ayempt Email Alert): EventCode=4625 sourcetype="wineventlog:security" earliest=- 6m latest=now bucket _Cme span=5m stats count by _Cme, Account_Name, src_ip,dest where count > 500! Sample Splunk search (Malware Email Alert): index=[hidden] sourcetype=[hidden] NOT ("Actual accon: Cleaned*" OR "Actual accon: QuaranCned" OR "Actual accon: Deleted") rename "event_cme" as "Detected" actual_accon as "AcCon" dest_nt_host as "Host" dest_ip as "Host IP" user as "User" risk_type as "DetecCon Type" signature as "Malware Name" table "Detected" "Host" "Host IP" "User" "DetecCon Type" "Malware Name" "AcCon" sort by "Detected" 23

The Future of Splunk @ Flagstar! We re planning to bring addiconal data into Splunk over the next 12 months Database logs & custom applicacon server logs Wide range of banking applicacons and regulatory data Endpoint (client) systems Third party hosted logs (various)! Explore the value of the prediccve analysis capability! Bring in Splunk Pro Services periodically to assist in maximizing Splunk's investment and to perform Splunk health checks 24

Ques7ons? Flagstar IT Security Opera7ons (SecOps) Team 25

Learn, share and hack Security office hours: 11:00 AM 2:00 PM @Room 103 Everyday Geek out, share ideas with Enterprise Security developers Red Team / Blue Team - Challenge your skills and learn new tricks Mon- Wed: 3:00 PM 6:00 PM @Splunk Community Lounge Thurs: 11:00 AM 2:00 PM Birds of a feather- Collaborate and brainstorm with security ninjas Thurs: 12:00 PM 1:00 PM @Meal Room 26

THANK YOU