Secure Your Operations through NOC/SOC Integration



Similar documents
ArcSight Supports a Wide Range of Security Relevant Products

Symantec Security Information Manager Version 4.7

CiscoWorks SIMS(Netforensics)

RSA envision. Supported Event Sources. Vendor Device Collection Method. Vendor Device Collection Method. Vendor Device Collection Method

Tripwire Log Center PRODUCT BRIEF HIGH PERFORMANCE LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

REQUEST FOR PROPOSAL ACQUISITION & IMPLEMENTATION OF CENTRALIZED LOG MANAGEMENT SYSTEM

Tivoli Security Information and Event Manager V1.0

LogLogic Release Notes for Security Event Viewer and Security Event Manager, v3.5.0

Select the right security information and event management solution to automate security and compliance operations.

Managed Security Services Portfolio

Our Security. History of IDS Cont d In 1983, Dr. Dorothy Denning and SRI International began working on a government project.

Configuration Audit & Control

Modular Network Security. Tyler Carter, McAfee Network Security

The SIEM Evaluator s Guide

TECHNOLOGY INTEGRATION GUIDE

HawkEye AP Log Adapter List Updated January 2014

TECHNOLOGY INTEGRATION GUIDE

QRadar SIEM 6.3 Datasheet

CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader

Organizational Issues of Implementing Intrusion Detection Systems (IDS) Shayne Pitcock, CISSP First Data Corporation

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

Intrusion Detection and Intrusion Prevention. Ed Sale VP of Security Pivot Group, LLC

MANAGED SECURITY SERVICES

Juniper Security Threat Response Manager (STRM) Mikko Kuljukka COMPUTERLINKS Oy

Improve end-to-end management with IBM consolidated operations management solutions.

INTEGRATION GUIDE TECHNOLOGY INTRODUCTION NETWORK DEVICES AND INFRASTRUCTURE

mbits Network Operations Centrec

Detecting a Hacking Attempt

HawkEye AP Log Adapter List Updated January 2016

Managed Security Services for Data

Comparison Paper Argent vs. IBM Tivoli/Netcool

Information & Asset Protection with SIEM and DLP

CIO Update: The Gartner Firewall Magic Quadrant for 2H02

JUNIPER NETWORKS STRM TECHNICAL NOTE

Tivoli Automation for Proactive Integrated Service Management

Campus. Impact. UC Riversidee Security Tools. Security Tools. of systems

The Importance of Information Delivery in IT Operations

SANS Top 20 Critical Controls for Effective Cyber Defense

IBM Internet Security Systems products and services

Plugin Name. X N/A sudo X Antivirus Avast avast X GFI Security gfi X McAfee mcafee X mcafee-epo

Security Information & Event Management (SIEM)

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

MANAGED SERVICES. Remote Monitoring. Contact US: millenniuminc.com

The Evolution of Managed Security Services ISS Virtual-SOC Solution, Security the Way You Need It

HP and netforensics Security Information Management solutions. Business blueprint

How To Protect A Network From Attack From A Hacker (Hbss)

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Eoin Thornton Senior Security Architect Zinopy Security Ltd.

Securing your IT infrastructure with SOC/NOC collaboration

Reference Guide. Skybox View Revision: 11

Best Practices for Building a Security Operations Center

An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011

Information Security. Incident Management Program. What is an Incident Management Program? Why is it needed?

Citadel Security Software Inc.

Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box Phone: Midland, Texas Fax:

SENTINEL MANAGEMENT & MONITORING

Best of Breed of an ITIL based IT Monitoring. The System Management strategy of NetEye

ManageEngine (division of ZOHO Corporation) Infrastructure Management Solution (IMS)

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

Service Offerings. Ensuring IT Resources are available, reliable, scalable & manageable always.

IBM Security Systems Solutions

Service. Strategic Technology Solutions for DNA Technology Solutions and Services That Help You Optimize System Performance, Security and Availability

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

Citadel Security Software Inc.

The Internet Security And Intrusion Detection Market

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Information Technology Policy

An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan

How To Manage Sourcefire From A Command Console

CA Systems Performance for Infrastructure Managers

Release Notes ArcSight SmartConnector

Building a Security Operations Center. Randy Marchany VA Tech IT Security Office and Lab marchany@vt.edu

PCI DSS. Get Compliant, Stay Compliant Seminar

Government of Canada Managed Security Service (GCMSS) Annex A-7: Statement of Work - Security Information and Event Management (SIEM)

Paul Cochran - Account Manager. Chris Czerwinski System Engineer

Find the needle in the security haystack

Log Correlation Engine 4.2 Architecture Guide. October 3, 2013 (Revision 2)

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Who am I? BlackHat RSA

Intrusion Detection Systems (IDS)

TRIPWIRE LOG CENTER HIGH PERFORMANCE LOG AND SECURITY EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

IBM Internet Security Systems

Vistara Lifecycle Management

YOUR NETWORK SECURITY WITH PROACTIVE SECURITY INTELLIGENCE

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

IBM Global Technology Services Preemptive security products and services

CIO Financial Services Visualization Dashboards that Make Managing IT Easier

IBM Service Management solutions White paper. Make ITIL actionable with Tivoli software.

Q1 Labs Corporate Overview

Transcription:

IBM Software Group Secure Your Operations through NOC/SOC Integration David Jenkins Security Consultant davidjen@de.ibm.com IBM Corporation

IBM Business/Service Assurance Offering Only Tivoli s suite offers fault, performance and security management Agenda for this presentation: Security Management Challenges Operational Integration Best Practices Tivoli Security Operations Manager (TSOM) Integration Further Resources 2

The problem we solve. 1,200 Events Per Second 72, 000 Events Per Hour 103, 680, 000 Events Per Day 3

Consider this Typical Security Operation Siloed Management Multiple Consoles Manual Correlation Vendor-specific point solutions Virus Host IDS Network IDS Firewall Antivirus Apps Routers Servers Best of Breed Multi-Vendor, Multiple-Domain Environment 4

Issues Day to day: manual analysis of log data wherever it exists, typically using multiple command and control dashboards Cost of expensive Security Experts Operational: Time to resolution Difficult to create problem owner for resolution Expensive Strategic: Siloed Security Management does not encourage Operational Convergence across Discrete Business Units 5

Breadth of Supported Devices Firewalls: Juniper Networks NetScreen Check Point Firewall-1 Cisco PIX CyberGuard Fortinet FortiGate GNATBox Linux IP Tables Lucent Brick Stonesoft's StoneGate Secure Computing's Sidewinder Symantec's Enterprise Firewall SonicWALL Sun SunScreen Vulnerability Assessment: Nessus Vigilante ISS Internet Scanner QualysGuard Foundstone eeye Retina SPI Dynamics WebInspect Harris STAT Routers/Switches: Cisco Routers Cisco Catalyst Switches Nortel Routers TACACS / TACACS+ Policy Compliance: Vericept Network-based Intrusion Detect/Prevention: Intruvert (NAI) Intrushield Sourcefire Network Sensor Juniper Networks NetScreen IDP AirMagnet ISS RealSecure ISS Proventia ISS BlackICE Sentry Cisco Secure IDS SNORT IDS Enterasys Dragon Intrusion's SecureNetPro NFR NID Symantec ManHunt ForeScout ActiveScout Top Layer Attack Mitigator Labrea TarPit IP Angel AirDefense Lancope StealthWatch Tipping Point UnityOne NDS Host-based Intrusion Detect/Prevention: Cisco CSA (Okena) NFR HID Sana Security Primary Response Snare Symantec Intruder Alert (ITA) Sygate Secure Enterprise Tripwire ISS RealSecure Entercept HIDS (NAI) Web Servers: Apache Microsoft IIS BEA WebLogic Server Logs Operating Systems Logs: Solaris (Sun) AIX (IBM) RedHat Linux SuSE Linux HP/UX Microsoft Windows Event Log Nokia IPSO OpenBSD Tripplight UPS Antivirus: CipherTrust IronMail McAfee Virus Scan Norton AntiVirus (Symantec) McAfee epo Trend Micro InterScan Application Security: Blue Coat Proxy Teros APS VPN: Neoteris IVE (NetScreen) Check Point Cisco IOS Nortel Contivity Management Systems: NS escalates to: Remedy ARS HP OpenView IBM/Tivoli CA Unicenter Micromuse Netcool Management Systems: Source of events into NS: NetScreen Global Pro ISS RealSecure SiteProtector Tripwire Manager Intrusion, Inc. SecureNet Manager McAfee epo Symantec ESM Integrated Investigative Tools: NS GeoLocator Service Hostname and WHOIS Lookup Finger NMAP HTTP Probe OS Fingerprint SNMP Probe SMTP Probe RPC Probe NFS Probe CGI Vulnerability Probe Trace Route UDP/TCP Port Scan QualysGuard 6

Security Information and Event Management (SIEM) 7

Gartner s 2006 SIEM Magic Quadrant Ability to Execute Completeness of Vision 8

IBM Software Group Best Practices in Operational Integration Network Operations Security Operations IBM Corporation

IBM Global CEO Study 2006 35 30 25 20 15 10 5 % One-on-one, one-hour interviews with 765 CEOs (2004: 456 survey respondents, 380 interviews) across 20+ industries European Union Respondents by geography (Percent of respondents) U.S./Canada Japan China Australia/NZ India Hong Kong/Taiwan Latin America ASEAN Europe/Non EU Korea Respondents by annual sales/ turnover (US$) (Percent of respondents) Respondents by number of employees (Number of respondents) 35 30 25 20 15 10 500 400 300 200 100 5 % <$500M $500M- $1B 0 <5000 5000-25,000 $1B- $10B >25,000 >$10B 10

Enterprise pressures and opportunities In IBM s interviews with hundreds of CEOs, they said: they must achieve... and want to innovate their... 2004 revenue growth 2006 products/ services/markets cost reduction asset utilization operations (processes & functions) risk management business model 20% 40% 60% 80% 100% 20% 40% 60% 80% 100% IBM Global CEO Study 2004, multiple answers permitted IBM Global CEO Study 2006, point allocations 11

IT Efficiency and Effectiveness are Waning Decrease in Efficiency as IT Spending Shifts to Operations Labor 100% 80% 70% of 2005 CIO Budget is Labor Source: Tivoli Commissioned IDC Study 1Q05 70% of CIO budget is Labor Hardware Services Labor Software 70% of CIO budget is labor Operations labor will be 73% of CIO labor budgets by 2008 Application development will decline at -10% CGR to 2008 $325B in operations labor by 2008 60% 40% 20% 0% 350000 300000 250000 200000 150000 100000 50000 2001 2002 2003 2004 App Development App Supt/Maint IT Operations Source: Gartner Group, IT Spending & Staffing surveys 0 2005 2006 2007 2008 Application development & support labor has dropped from 48% to 34% of IT Labor spend over previous 4 years. Administration Development Operations 12

IT Silos: Architectural Complexity Exposes Organizational Complexity Security experts and tools Network experts and tools Application experts and tools Database experts and tools Mainframe experts and tools Storage Experts And tools Unix Experts And tools Availability Management Security and Compliance Management. Release Management Change Management Information Mgmt. Labor Cost www Sense Isolate Diagnose Take Evaluate Time Action 13

NOC and SOC Differences Perspective: Used to be.lock Down vs. Availability New focus on Business Impact vs. System Impact has changed all that. Problem-solving Techniques: NOC objective black and white situations up or down. SOC subjective.context.why is it up or down shades of grey. Tools: Requires tools that process, analyze and handle event data differently 14

The Solution: Focus on the end goal The end goal for both IT and security operations is business and service assurance Transcends IT silos ( NOC/SOC/Help Desk) Requires convergence at: - Organizational level (i.e. common first level response) - System level (i.e. integrated ticketing and workflow) - Asset level (i.e. shared sensors and criticality information) Requires responses based on the business impact, not cause Improves problem resolution and time to mitigation 15

Typical Operations model NOC Level 1 Operations SOC Level 1 Workflow Ticketing Level 2 Level 2 Workflow Ticketing Level 3 Level 3 NOC Management SOC Management 16

Organizational Convergence Converged Operations Network Operations Level 1 Security Operations Level 2 Level 2 Shared Workflow Shared Ticketing Level 3 Level 3 Incident Analysis Joint SLA to Business 17

Converged Systems As an event unfolds it may need to be re-classified from networkrelated to security-related and vice versa This requires system integration as well as integrated procedures There should be a single ticketing and workflow system that allows the teams to collaborate, review, annotate and take action on events Historical views of prior events or problems should also be consolidated a past configuration error could be related to a current security error A common knowledge base will assist Level 1 in making a correct diagnosis Converged reporting can reduce compliance costs and increase operational excellence across the board Include periodic (monthly/quarterly?) results reporting process under the Service Level Agreement 18

Converged Sensors and Asset Inventories Companies build the NOC before they build a SOC Leverage all those deployed sensors! Build on top of existing network monitoring and leverage existing ticketing systems do not build a security island Both NOC and SOC need asset inventories Provide perspective into the importance, location and status of the asset Assets have an associated business criticality and risk regardless of whether they suffer a network problem or a security problem Converged asset inventories provide a business level perspective and ensure the appropriate level of response Respond based on the business impact, not the cause 19

Conclusions and Bottom Lines The driving force for both IT and Security operations is business process availability This driver transcends silos and requires convergence Converged NOC/SOC operations means convergence at: The organizational level common Level 1 response The system level integrated ticketing and workflow The asset level shared history and criticality information Operational models must be flexible enough to adapt to a changing market 20

Points for discussion How big is each NOC / SOC before integration, what is the natural limit for outsourcing? Are there other formal ways to classify the structure of different growing models than a joint SLA to the Business? How do we assess the physical properties as a whole, such as its robustness or damages or vulnerability to malicious attack? How to quantify the interaction between network operations of different character, how do we model network evolution? How much difficulty do you see in this model? Why is convergence important to you? 21

IBM Software Group About Tivoli Security Operations Manager (TSOM) IBM Corporation

The TSOM Solution Risk Reduction Operational Efficiency Intelligent dashboard to manage complex security environments Communicates critical security information throughout the IT organization Real-time, cross-device event correlation to improve incident recognition Integrated asset weighting to assist with prioritization of investigations Integrated incident investigation and automated remediation Audit and Compliance Customizable reporting for audit, trending and compliance 23

Consolidated View via Main Dashboard Dom ain Eve nt Clas s Event Class Freque ncy Frequency Freque ncy 24

Centralized Reporting On Demand or Scheduled 25

New Integration Capabilities b/t Netcool and TSOM 1. Escalate raw or correlated security events to Netcool Omnibus 2. View security metrics via Netcool dashboards 3. Leverage of a Universal Collection Layer 4. TSOM device support for Netcool SSMs 5. TSOM support for Micromuse Portal for integrated solutions 6. Security Knowledgebase (for common first line support) Network Operations Security Operations 26

IBM Software Group Conclusions and Further Resources Network Operations Security Operations IBM Corporation

Tivoli s Business/Service Assurance Offering Only Tivoli s suite offers fault, performance and security management Operational Integration Converge security operations with IT operations to ensure business and service uptime Invest in one vendor who understands your infrastructure holistically 28

The Right Strategy Security as a Option Security is an add-on Challenging integration Not cost effective Cannot focus on core priority Security as part of a System Security is built-in Intelligent collaboration Appropriate security Direct focus on core priority 29

Further Resources Tivoli Webinar: NOC/SOC Integration an Overview Johna Till Johnson, Nemertes Research and Jim Alderson, IBM http://www.micromuse.com/events/webinars/sm_30-nov-2005.html Tivoli Webinar: NOC/SOC integration for Service Providers Andreas Antonopoulos, Nemertes Research and Jim Alderson, IBM http://www.micromuse.com/events/webinars/secure_operations_23mar2006.html Issue Paper: Integrating Event Response Andreas Antonopoulos, Nemertes Research http://www.micromuse.com/downloads/pdf_lit/wps/nemertes_issue_paper_integr ating_event_response.pdf 30

Innovation That Matters IBM Software Group Tivoli software Thank You David Jenkins davidjen@de.ibm.com 31