IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Similar documents
The Next Generation Security Operations Center

Getting Ahead of Advanced Threats

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Detect & Investigate Threats. OVERVIEW

Security Analytics for Smart Grid

Discover & Investigate Advanced Threats. OVERVIEW

The Future of the Advanced SOC

Advanced Threats: The New World Order

Security and Privacy

Teradata and Protegrity High-Value Protection for High-Value Data

The session is about to commence. Please switch your phone to silent!

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

RSA Security Analytics

Advanced SOC Design. Next Generation Security Operations. Shane Harsch Senior Solutions Principal, MBA GCED CISSP RSA

CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

After the Attack. The Transformation of EMC Security Operations

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS

Combating a new generation of cybercriminal with in-depth security monitoring

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

RSA Security Anatomy of an Attack Lessons learned

DYNAMIC DNS: DATA EXFILTRATION

REVOLUTIONIZING ADVANCED THREAT PROTECTION

THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.

Using SIEM for Real- Time Threat Detection

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

How To Protect Your Network From Attack From A Network Security Threat

Tech Brief. Choosing the Right Log Management Product. By Michael Pastore

RSA SECURITY MANAGEMENT. An Integrated approach to risk, operations and incident management. Solution Brief

The SIEM Evaluator s Guide

RSA Archer Training. Governance, Risk and Compliance. Managing enterprise-wide governance, risk and compliance through training and education

RSA Security Analytics the complete approach to security monitoring or how to approach advanced threats

IBM SECURITY QRADAR INCIDENT FORENSICS

BIG DATA. Shaun McLagan General Manager, RSA Australia and New Zealand CHANGING THE REALM OF POSSIBILITY IN SECURITY

Cybersecurity Delivering Confidence in the Cyber Domain

Advanced Threat Protection with Dell SecureWorks Security Services

Increase insight. Reduce risk. Feel confident.

Defending Against Cyber Attacks with SessionLevel Network Security

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Cisco Advanced Malware Protection for Endpoints

AccelOps NOC and SOC Analytics in a Single Pane of Glass Date: March 2016 Author: Tony Palmer, Senior ESG Lab Analyst

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Why a Network-based Security Solution is Better than Using Point Solutions Architectures

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined

Payment Card Industry Data Security Standard

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

Breach Found. Did It Hurt?

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance

The IBM Solution Architecture for Energy and Utilities Framework

What s New in Security Analytics Be the Hunter.. Not the Hunted

IBM QRadar Security Intelligence April 2013

integrating cutting-edge security technologies the case for SIEM & PAM

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.

Seven Things To Consider When Evaluating Privileged Account Security Solutions

SIEM and DLP Together: A More Intelligent Information Risk Management Strategy

CyberArk Privileged Threat Analytics. Solution Brief

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Information-driven Security and RSA Security Analytics and RSA ECAT

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

ADVANCED THREATS IN THE ENTERPRISE. Finding an Evil in the Haystack with RSA ECAT. White Paper

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

Preemptive security solutions for healthcare

Strengthen security with intelligent identity and access management

Advanced Persistent Threats

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

How To Buy Nitro Security

Cyber Security Evolved

IBM Security Intelligence Strategy

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

How To Create An Insight Analysis For Cyber Security

SANS Top 20 Critical Controls for Effective Cyber Defense

The RSA Solution for. infrastructure security and compliance. A GRC foundation for VMware. Solution Brief

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

Solutions Brochure. Security that. Security Connected for Financial Services

FIVE PRACTICAL STEPS

Integrating MSS, SEP and NGFW to catch targeted APTs

I D C A N A L Y S T C O N N E C T I O N

Introducing IBM s Advanced Threat Protection Platform

Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Industrial Cyber Security Risk

CA Vulnerability Manager r8.3

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

The webinar will begin shortly

SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF

AMPLIFYING SECURITY INTELLIGENCE

Retail Security: Enabling Retail Business Innovation with Threat-Centric Security.

THE EVOLUTION OF SIEM

Detecting Anomalous Behavior with the Business Data Lake. Reference Architecture and Enterprise Approaches.

CONNECTING ACCESS GOVERNANCE AND PRIVILEGED ACCESS MANAGEMENT

Network Performance + Security Monitoring

Transcription:

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief

SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle a much greater volume and wider scope of data than at present, not to mention provide them with tools to lead them quickly to the most pressing issues. They need threat intelligence about the latest tools, techniques, and procedures in use by the attacker community, and the ability to track and manage the responses initiated as a result of the issues they identify. 99 percent of breaches led to data compromise within days or less, whereas 85 percent of breaches took weeks or more to discover. 2012 Verizon Data Breach Investigations report TRADITIONAL SECURITY ISN T WORKING According to the 2012 Verizon Data Breach Investigations report, 99 percent of breaches led to data compromise within days or less, whereas 85 percent of breaches took weeks or more to discover. This presents a significant challenge to security teams as it grants attackers extended periods of time within a victim s environment. More free time leads to more stolen data and more digital damage. Principally, this is because today s security measures aren t designed to counter today s more advanced threats. Traditional security measures are often: Signature-based: looking for known bad data sequences based upon previous identical attacks Perimeter oriented: concentrating on preventing or detecting threats entering the organization Compliance driven: designed to meet the requirements of auditors, or specific government mandates, rather than addressing the biggest risks to the organization Simultaneously, threats are becoming exponentially more advanced. The threats often seen today are: Agile: they anticipate the means organizations use to protect themselves and use adaptive techniques to evade many common detection and prevention systems Focused: today s threats often have very specific goals, perhaps targeting a narrow class of organization, or even one organization Intelligent: they use a wide range of social engineering techniques and technical exploits to gain a foothold within victim organizations and avoid detection This means that organizations need to start thinking differently about the tools they deploy and the techniques they use to defend themselves. Rapidly Evolving Threats Criminals Petty criminals Unsophisticated Organized crime Organized, sophisticated supply chains (PII, financial services, retail) Nation State Actors PII, government, defense industrial base, IP rich organizations Non-state Actors Terrorists PII, government, critical infrastructure Anti-establishment vigilantes Hacktivists, targets of opportunity page 2

TRADITIONAL SIEM HAS BEEN A GOOD START RSA has long been a provider of industry-leading Security Information and Event Management solutions, and believes that traditional SIEM systems have been valuable in providing: Reporting on device activity providing key insights into who, what, where, and when critical activities are taking place Basic alerting on known sequences through correlation rules, that can draw attention to the most egregious or suspicious uses of computing resources Proof of compliance for internal and external auditors through regular reports, created in an automated fashion rather than being manually generated for every audit or assessment Central view into disparate event sources being collected so that security teams can make decisions more rapidly based upon information collected from a number of sources Security teams need to quickly determine how an attack happened, to reduce the attacker free time the time between the attacker entering the environment and being detected in the infrastructure and put measures in place prevent similar future attacks. However, in today s landscape, new requirements need to be taken into account. Attacks now come not just from vandals or amateurs, but from sophisticated, criminal enterprises and even nation states. These attackers deploy advanced techniques such as covering their tracks in log files and minimizing the number of auditable events. As such, traditional SIEM proves insufficient. This requires organizations to take a more advanced approach to countering these threats. ORGANIZATIONS NEED more effective SECURITY MANAGEMENT SOLUTIONS In this world of advanced threats, security teams need to quickly determine how an attack happened, to reduce the attacker free time the time between the attacker entering the environment and being detected in the infrastructure and to put measures in place prevent similar future attacks. Given this, RSA believes organizations need a more effective platform that addresses more security management problems since: Advanced threats require enterprise-wide visibility into network traffic and log event data: neither network traffic data nor log event data alone provides enough information to detect and investigate these types of threats Security is now a Big Data problem for SOC analysts: SOC analysts now need to delve into a much larger, dynamic, and diverse set of data to identify advanced threats which requires the fusion of internal and external intelligence Compromise is inevitable: a realistic goal is not to resist all attacks, but to react fast to mitigate damage and thus minimize the impact on the business RSA Security Management and Compliance Page 3

To this end, experienced security practitioners are asking RSA to help them: Collect everything that s happening in my infrastructure. Previous approaches to security have depended on using information about known threats to make decisions about which data to collect about what is happening within the environment. With more agile, advanced threats, making those assumptions ahead of time makes it is likely that when the threat arises, the security teams won t have all the information needed to respond properly. This means that in today s environment, security teams want to collect everything about what is going on. Help me to identify key targets and threats. In a large, complex IT infrastructure, it is difficult to keep track of what each system does and the ways in which it might be attacked. Security teams need a way to interface with the business to identify the most critical information, business processes, and supporting assets, to best assess the threats the organization faces. Enable me to investigate and prioritize incidents. Also in a large, complex IT infrastructure, there are often so many issues to deal with that security teams need more guidance around identifying the most pressing issues, and which ones could have the highest impact to the business. This means having more information about the business context of incidents and the criticality of systems and processes they affect. Enable me to manage those incidents. Responding to incidents can be a tricky affair from assessing the damage, to communication, to remediation and cleanup requiring the coordination of resources across a wide range of teams, both within IT and across the business. Security teams need a way to kickoff and coordinate these activities to minimize the adverse impact on the business. FULL NETWORK VISIBILITY IS A MUST The most advanced threats can be extremely difficult to detect. Often, their most visible footprint is on the network as they enter into the IT environment, propagate throughout and exfiltrate data to its intended destination. As such, full network packet capture is necessary to: Identify malware entering the environment and prioritize actions related to it. Modern malware looks very much like any other file traversing a network, but full packet capture allows organizations to isolate and reconstruct executable files, and automate much of the analysis needed to identify tell-tales signs of malicious intent. This then helps malware analysts prioritize which issues they need to respond to first. Track the lateral movement of an attacker once inside the organization. Once an attacker has a foothold within an organization, they often move laterally from endpointto-endpoint gathering the necessary information to launch the next stage in the attack. Since these endpoints are seldom centrally monitored, full network packet capture is needed to gain visibility into this lateral movement within an organization. Prove exactly what happened and what data was exfiltrated. Many advanced threats will not be detected until the attack is in progress, or even after it has been completed. At this point, security teams need to be able to assess the damage by reconstructing the attack and determining what data, if any, has left the organization, and whether it was encrypted or not. RSA S APPROACH PROVIDES AN END-TO-END SECURITY MANAGEMENT APPROACH The RSA approach to security management is based upon four key elements (see figure) A Big Data approach to security management. RSA s distributed data architecture allows customers to collect and analyze security data at an unprecedented scale and rate of change. page 4

A unified approach to security analytics. RSA aims to provide a common set of tools for analyzing security data, to support the major analytic activities, from alerting and reporting to malware analytics. A governance layer that binds security analytics to the business. RSA s unique portfolio helps customers streamline the process of gathering information from the business about critical business processes and systems, and the business requirements for securing them. Threat Intelligence that empowers customers with up-to-date knowledge. RSA distributes current, actionable intelligence about the threat environment to the products, allowing organizations to relate the intelligence specifically to their environments. The RSA approach provides customers with: Comprehensive visibility. RSA s portfolio allows unparalleled visibility into what is happening within the infrastructure. Infrastructure to support collection without limitations: the ability to collect many types of security data, at scale and from many types of data sources Unified visibility into network and log data: single place to view data about advanced threats and user activity from data gathered directly from the network or from key systems Agile analytics. RSA provides tools that make detailed information available to investigators in the simplest way possible. Platform for performing rapid investigations: intuitive tools for investigation presented for rapid analysis, with detailed drill down and incorporation of business context to better inform the decision making process Session replay and signature free analytics: tools to hone in on the most suspicious users and end points connected to your infrastructure and the tell-tale signs of malicious activity. Also provides the ability to recreate and replay exactly what happened Actionable Intelligence. Threat intelligence provided by RSA helps security analysts get the most value from RSA products by incorporating feeds of current threat information. Current threat intelligence correlated with collected data: proprietary intelligence from a community of security experts, built into our tools and leveraged through rules, reports, and watch lists to gain insight into threats from data collected from the enterprise Prioritized actions based upon business context: incorporation of information from the business showing the relationship between the systems involved and the business functions they support Optimized process management. RSA products help security teams streamline the diverse set of activities related to preparedness and response. Technology and services for full security and compliance lifecycle: a workflow system to define and activate response processes, plus tools to track current open issues, trends, and lessons learned. Also provide industry-leading services to help prepare, detect, and respond to incidents Integrated into a security and compliance management system: integration with the RSA portfolio and third-party tools to exchange information with the wide range of tools needed to identify and handle incidents and streaming compliance management page 5

WHY RSA FOR SECURITY MANAGEMENT? RSA is uniquely positioned to help customers meet their objectives in the following ways: RSA provides a unique product portfolio to address the most critical problems of advanced threats With RSA NetWitness network monitoring, RSA has the only platform which provides visibility into a full network session and log data from across the enterprise With RSA NetWitness monitoring, RSA has the only unified platform for realtime forensics which includes automated advanced threat and zero-day malware analysis RSA has a proven, scalable platform providing enterprise-wide situational awareness at seven out the Fortune 10 and 70 percent of U.S. federal agencies RSA integrates actionable, proprietary threat intelligence into our products RSA is a leading provider of threat research which monitors real-life underground attacker activity About RSA RSA, The Security Division of EMC, is the premier provider of security, risk and compliance management solutions for business acceleration. RSA helps the world s leading organizations solve their most complex and sensitive security challenges. These challenges include managing organizational risk, safeguarding mobile access and collaboration, proving compliance, and securing virtual and cloud environments. RSA NetWitness Live research team tracks over five million IPs and domains and hundreds of unique threat feed sources RSA updates and dynamically distributes its threat content library every hour through RSA NetWitness Live RSA addresses the people, process, and technology challenges of security and compliance RSA is a leading provider of services to assist with incident preparedness, plus incident response and cleanup RSA has the only solution to support both IT and business aspects of managing security through its integration with the RSA Archer egrc platform RSA has the unified platform to support compliance management, security threat management, incident management, and business continuity management Combining business-critical controls in identity assurance, encryption & key management, SIEM, data loss prevention, continuous network monitoring, and fraud protection with industry leading egrc capabilities and robust consulting services, RSA brings visibility and trust to millions of user identities, the transactions that they perform and the data that is generated. For more information, please visit www.rsa.com and www.emc.com. www.rsa.com EMC 2, EMC, the EMC logo, RSA, NetWitness, and the RSA logo are registered trademarks or trademarks of EMC Corporation in the United States and other countries. All other products or services mentioned are trademarks of their respective companies. Copyright 2012 EMC Corporation. All rights reserved. Published in the USA. h9093 impsa sb 0412