Making sense out of the Security Operations



Similar documents
SourceFireNext-Generation IPS

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Cisco Remote Management Services for Security

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

Find the needle in the security haystack

How To Manage Sourcefire From A Command Console

IBM QRadar Security Intelligence April 2013

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention

THE EVOLUTION OF SIEM

Detect & Investigate Threats. OVERVIEW

Sicurezza & Big Data: la Security Intelligence aiuta le aziende a difendersi dagli attacchi

Unified Security, ATP and more

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!

Security Analytics for Smart Grid

Cisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cisco Advanced Malware Protection for Endpoints

CAS8489 Delivering Security as a Service (SIEMaaS) November 2014

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

Deploying Next Generation Firewall with ASA and Firepower services

Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective

Cisco Security Intelligence Operations

Cisco Advanced Malware Protection

What is Security Intelligence?

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Requirements When Considering a Next- Generation Firewall

ESG Brief. Overview by The Enterprise Strategy Group, Inc. All Rights Reserved.

Separating Signal from Noise: Taking Threat Intelligence to the Next Level

Advanced SOC Design. Next Generation Security Operations. Shane Harsch Senior Solutions Principal, MBA GCED CISSP RSA

What s New in Security Analytics Be the Hunter.. Not the Hunted

Threat Intelligence Platforms: The New Essential Enterprise Software

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

First Line of Defense

Integrating MSS, SEP and NGFW to catch targeted APTs

100 Hamilton Avenue Palo Alto, California PALANTIR CYBER. An End-to-End Cyber Intelligence Platform

Active Response: Automated Risk Reduction or Manual Action?

STRATEGIC ADVANTAGE: CONSULTING & ISIGHT INTELLIGENCE

Caretower s SIEM Managed Security Services

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

Cisco Advanced Malware Protection for Endpoints

Cyber Security Operations: Building or Outsourcing

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

Using Lancope StealthWatch for Information Security Monitoring

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

Clavister InSight TM. Protecting Values

Q1 Labs Corporate Overview

Bridging the gap between COTS tool alerting and raw data analysis

ORGANIZADOR: APOIANTE PRINCIPAL:

CALNET 3 Category 7 Network Based Management Security. Table of Contents

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

IBM Security IBM Corporation IBM Corporation

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

A New Perspective on Protecting Critical Networks from Attack:

Scaling Big Data Mining Infrastructure: The Smart Protection Network Experience

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Network Security Deployment (NSD)

Cisco Web Security: Protection, Control, and Value

The SIEM Evaluator s Guide

The session is about to commence. Please switch your phone to silent!

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Concierge SIEM Reporting Overview

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Innovative Security for an Accelerating World New Approaches for Chief Security Officers

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

Intelligence Driven Security

WHITE PAPER: THREAT INTELLIGENCE RANKING

Instilling Confidence in Security and Risk Operations with Behavioral Analytics and Contextualization

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

Rashmi Knowles Chief Security Architect EMEA

How To Manage Security On A Networked Computer System

Securing your IT infrastructure with SOC/NOC collaboration

Detecting Anomalous Behavior with the Business Data Lake. Reference Architecture and Enterprise Approaches.

Security Business Intelligence Big Data for Faster Detection/Response

RSA Security Anatomy of an Attack Lessons learned

Solera Networks, A Blue Coat Company SOLERA NETWORKS BIG DATA SECURITY ANALYTICS

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

Discover & Investigate Advanced Threats. OVERVIEW

Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

A MULTIFACETED CYBERSECURITY APPROACH TO SAFEGUARD YOUR OPERATIONS

Intrusion Detection and Intrusion Prevention. Ed Sale VP of Security Pivot Group, LLC

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

IBM Security QRadar SIEM Product Overview

Extending security intelligence with big data solutions

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

How To Create Situational Awareness

Security Administration R77

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals

RSA Security Analytics

The Art of Modern Threat Defense. Paul Davis Director, Advanced Threats Security Solution Architects

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev

Integrating a Big Data Platform into Government:

Transcription:

Gaweł Mikołajczyk gmikolaj@cisco.com Making sense out of the Security Operations Cisco Public 1

CONFidence 2012 https://www.youtube.com/watch?v=ebi1xlmg5xe Cisco Public 2

CONFidence 2016 Network Security Treasures https://www.youtube.com/watch?v=oc4dgpis8b4 Cisco Public 3

CONFidence 2016 Real World Threat Hunting https://www.youtube.com/watch?v=yy-ljpovpgy Cisco Public 4

Four Pillars of Security Operations People Analytics Intelligence Technology Operationalization Advanced expertise Security research Security talent shortage Near real-time analytics Anomaly detection through statistical analysis Zero-day threat focus Deterministic Rules Data Science for behavioral analysis Access to actionable sources of intelligence Cisco intelligence Customer intelligence Open Source intelligence Hadoop for scalability and redundancy Streaming analytics focused on security Event intel and focused enrichment Full packet capture Cisco Public 5

I. People in Security Operations Roles and responsibilities Assume the 24/7 Operations. How many people do we need? Core Operations and Supporting Functions Shift-based coverage model. How to share info an collaborate? Security Analysts (Tiers), Security Investigators Define the skills, roles, responsibilities. IT vs OT. Incident Response / Forensics Folks Incident and Change Security Engineering Automation / Toolset Development Industry/Homegrown Threat Intelligence Expertise, Detection Engines Development, Tuning Data Science, Analytics Expertise Core System / Platform Development and Security R&D Non-technical Functions Engagement / Escalations / Projects Cisco Public 6

II Security Analytics Benefits: + Mature method of analysis + Covers the majority of known threats Deterministic Rules-Based Analytics (DRB) Benefits: Statistical Rules-Based Analytics (SRB) + Provides Anomaly Detection based on both volume and velocity of data clusters + Enables Trend Forecasting Benefits: Data Science- Centric Analytics (DSC) + Captures and stores large data sets in its raw format (Data Lake) + Classifies events and creates behavior profiles of data captured Challenges: Requires tuning Depends on prior knowledge of threat behavior Does not address polymorphic malware Challenges: Produces False Positives Requires significant storage and compute Allows for only a single variable to be analyzed per model Challenges: Models are generally customer specific and use case focused Requires significant storage and compute Cisco Public 7

Practical Use Case: OpenDNS Spike Rank (SPRank) Detects spikes in network traffic using mathematical concepts for wave analysis Often found in sound wave analysis (like Shazam, Pandora) http://blogs.cisco.com/security/how-opendns-predicts-attacks-when-hacker-infrastructure-is-cheap-and-plenty#more-182559 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public 8

III. Making use of Security Intelligence Product Security Incident Response Team (PSIRT) Global Team Managing the Investigation and Reporting of Vulnerability Information for Cisco Products Vulnerability Research Team (VRT) Elite cyber security experts dedicated to identifying new trends, malware and vulnerabilities Computer Security Incident Response Team (CSIRT) Threat Assessment, Incident Detection and Response, and Incident Trending and Analysis Security Operations Centers Cisco Remote Managed Support and Managed Threat Defense Sourcefire Vulnerability Research Research and collection of vulnerabilities on endpoints, mobile devices, virtual systems, web and email Security Community Data Actively work with and contribute discovered threat intelligence Security Research and Operations Experts with Deep Security Knowledge Deliver Threat Mitigation Procedures for Cisco Products Partner Data Exchange intelligence through private partnerships

Security Intelligence How it s done at Cisco Cisco 1001 1101 1110011 0110011 101000 0110 00 1001 1101 1110011 0110011 101000 0110 00 101000 0110 00 0111000 111010011 101 1100001 110 101000 0110 00 0111000 111010011 101 1100001 110 Talos Cisco Collective 1100001110001110 1001 1101 1110011 0110011 101000 0110 00 1100001110001110 1001 1101 1110011 0110011 101000 Security Intelligence 1.6 million global sensors 100 TB of data received per day 150 million+ deployed endpoints 600+ engineers, technicians, and researchers WWW Email Endpoints Web Networks IPS Devices 35% worldwide email traffic 13 billion web requests 24x7x365 operations 40+ languages 180,000+ File Samples per Day FireAMP Community Advanced Microsoft and Industry Disclosures Snort and ClamAV Open Source Communities Honeypots Sourcefire AEGIS Program Private and Public Threat Feeds Dynamic Analysis Cisco Public 10

IV. Technology Telemetry/Intel Data Functions Analytic Functions Passive Tap Event Sensor Cisco Products Ingest Storage Deterministic Analysis Automated Hunts Statistical Analysis Send Notices Passive Tap Internal Events Third Party Products Machine / App Exhaust Search Compress Parse and Normalize Extract Features Connect Events and Entities Machine Learning Sensors at Point-of-Presence Distributed Entity LDAP / Active Directory Cisco ISE Intelligence Cisco TIP / Talos Custom / External Export Import Archive View Analyze Features Identify Anomalous Storage, Ingest, Analytics Centralized DCAP Cisco Public 11

Proposed Security Operations Flow Framework Full packet capture Protocol metadata Third-party applications Machine exhaust (logs) Parse + Format Threat Intelligence Feeds Enrich Alert Applications + Analyst Tools Log Mining and Analytics Network Packet Mining and PCAP Reconstruction Big Data Exploration, Predictive Modelling Unstructured telemetry Other streaming telemetry Enrichment Data Cisco Public 12

V. Security Operations Center Design / Facility CUSTOMER PORTAL 24/7 ACCESS Dedicated Customer Portal Collection, Storage, Analysis VPN SOC INTERNET Secure Connection (HTTPS/SSH/IPSec) VPN DEDICATED CUSTOMER SEGMENT FIREWALL Investigator Portal Administrative Consoles Authentication Services FIREWALL TICKETING Alerting/Ticketing System COMMON SERVICES Threat Intelligence ENTERPRISE PREMISE SOC DATA CENTER Cisco Public 13

Cisco Public 14

Cisco Public 15

Cisco Public 16

Good, now start building a Playbook playbook ˈplāˌbŏk noun A prescriptive collection of repeatable queries (reports) against security event data sources that lead to incident detection and response. Cisco Public 19

Develop a Hot Threats Dashboard http://blogs.cisco.com/security/implementing-a-hot-threat-dashboard Cisco Public 20

A SOC Example of Two-Week Timeframe 269,808 Security Events Threat intel sourced 61,816 Telemetry Ingested by DCAP Telemetry 207,992 generated Intelligence ~19,000 events/day to ~8,000 events/day to ~120 suspicious events/day to ~5 prioritized events/ day 113,713 1710 71 Unique events, prioritization, correlation High fidelity events, triage activities Analyst -> Investigator Post-investigation tickets Actionable by client Analytics People Cisco Public 21

Metrics: How do we know you re working? Period Ending SI Events Device Sourced Events Total Security Events High Fidelity Events Investigated Post Investigation Tickets Created 2/13 93,967 1,408 95,375 2,142 3 2/20 249,592 5,171 254,763 119 2 Cisco Public 22

Reporting Example Summary of Threats Cisco Public 23

Reporting Example Pro-Active Threat Hunting Cisco Public 24

Present Even More Reasons for Your Existence! Top events fired per event source Top malicious domain Total infected hosts Top malware type/family Highest areas of infection (lab, DC, DMZ, etc.) Infections by theatre Infection by role/org (sales, engineering, marketing, etc.) Event rates and collection stats (total volume of alarms, then Alarms by source, index/filesize avg/day) Unique user counts avg/day Total attacks blocked Top infections by event source (event source detection ranking)

SOC = Tell A Story of Continuous Protection Cisco Public 27

If you think technology can solve your security problems, then you don't understand the problems and you don't understand the technology. Bruce Schneier Security Guru Cisco Public 28

Thank you. gmikolaj@cisco.com