Data Driven Security Framework to Success



Similar documents
Network Security Monitoring: Looking Beyond the Network

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

ORGANIZADOR: APOIANTE PRINCIPAL:

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

Things To Do After You ve Been Hacked

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

DESCRIPTIVE STATISTICS AND EXPLORATORY DATA ANALYSIS

Advanced Threats: The New World Order

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

Module 1: Overview. Module 2: AlienVault USM Solution Deployment. Module 3: AlienVault USM Basic Configuration

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Solera Networks, A Blue Coat Company SOLERA NETWORKS BIG DATA SECURITY ANALYTICS

White Paper. Intelligence Driven. Security Monitoring. v nexusguard.com

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia

Cognitive and Organizational Challenges of Big Data in Cyber Defense

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Metric Matters. Dain Perkins, CISSP

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Instilling Confidence in Security and Risk Operations with Behavioral Analytics and Contextualization

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst

THE EVOLUTION OF SIEM

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Missing the Obvious: Network Security Monitoring for ICS

Detect, Contain and Control Cyberthreats

Security Information Management (SIM)

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

The SIEM Evaluator s Guide

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

SANS Top 20 Critical Controls for Effective Cyber Defense

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

Enabling Security Operations with RSA envision. August, 2009

Be Prepared. For Anything. Cyber Security - Confronting Current & Future Threats The role of skilled professionals in maintaining cyber resilience

Big Data and Security: At the Edge of Prediction

The Cyber Threat Profiler

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Simple Predictive Analytics Curtis Seare

SIEM is only as good as the data it consumes

Effective Methods to Detect Current Security Threats

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!

Network Security Monitoring

AppGuard. Defeats Malware

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

Cisco Security Intelligence Operations

O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y

Intrusion Detection Systems

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

CyberArk Privileged Threat Analytics. Solution Brief

Can We Become Resilient to Cyber Attacks?

A Primer on Cyber Threat Intelligence

Cyber Security Operations Center (CSOC) for Critical Infrastructure Protection

End to End Security do Endpoint ao Datacenter

White Paper: Leveraging Web Intelligence to Enhance Cyber Security

Competitive Analytics

Presented by Evan Sylvester, CISSP

How To Manage Security On A Networked Computer System

Intelligence Driven Security

Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions

Security Analytics The Beginning of the End(Point)

Taxonomy of Intrusion Detection System

UNCLASSIFIED. General Enquiries. Incidents Incidents

Why The Security You Bought Yesterday, Won t Save You Today

Securing your IT infrastructure with SOC/NOC collaboration

Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research

Ernie Hayden CISSP CEH Executive Consultant

All Information is derived from Mandiant consulting in a non-classified environment.

Concierge SIEM Reporting Overview

Cisco IPS Tuning Overview

Integrating MSS, SEP and NGFW to catch targeted APTs

Advanced Threat Protection with Dell SecureWorks Security Services

Visualizing Threats: Improved Cyber Security Through Network Visualization

The webinar will begin shortly

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

Best Practices to Improve Breach Readiness

Bio-inspired cyber security for your enterprise

SECURITY CONSIDERATIONS FOR LAW FIRMS

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide

Enterprise Security Governance. Robert Coles Chief Information Security Officer and Global Head of Digital Risk & Security

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Cybersecurity Awareness for Executives

Caretower s SIEM Managed Security Services

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

IBM QRadar Security Intelligence April 2013

FIREMON SECURITY MANAGER

Effective Methods to Detect Current Security Threats

Transcription:

Data Driven Security Framework to Success Presented by Leonard Jacobs, MBA, CISSP, CSSA Founder, President and CEO of Netsecuris Inc. 1

Topics The Explosion of Security Data Threat-centric Security vs. Vulnerabilitycentric Security Network Security Monitoring (NSM) Cycle Security Data Processing Concepts Security Data Visualization Threat-centric Security Data Framework 2

Opening Riddle Win a Tee Shirt What goes fast? What is spelled the same in both directions? 3

The Explosion of Security Data How many of you can name all the sources of security data you have in your company? Can you name at least some sources? 4

The Explosion of Security Data Does your organization use any of the following cyber security measures? Firewall IDS/IPS Security Incident and Event Management Anti-malware/Anti-Bot Internet Content Filtering 5

The Explosion of Security Data Do you know how many records of security data your organization collects every day? Every week? Every month? Every year? 6

The Explosion of Data Threat alerts grew 14 percent year over year; new alerts (not updated alerts) are on the rise. Watering hole attacks are targeting specific industry-related websites to deliver malware. (Cisco 2014 Annual Security Report) 7

The Explosion of Data Kaspersky Lab products detected and neutralized a total of 6,167,233,068 threats during 2014 A total of 1,910,520 attempts to launch banking malware on user computers were neutralized in 2014. (Kaspersky Security Bulletin 2014 Overall Statistics for 2014) 8

The Explosion of Security Data Is your organization reviewing security data 24x7x365? Does your organization have alarms set for security events? Does your organization believe what the machine is telling it? 9

Threat-centric Security vs. Vulnerability-centric Security Vulnerability-centric security focuses on the how. Threat-centric security focuses on the who and why. 10

Threat-centric Security vs. Vulnerability-centric Security Vulnerability Centric Relies on prevention Focus on detection Assumes universal view of all threats Analyzes every attack in a vacuum Threat Centric Prevention eventually fails Focus on collection Knows that threats use different tools, tactics, and procedures Combines intelligence from every attack 11

Threat-centric Security vs. Vulnerability-centric Security Vulnerability Centric Heavy reliance on signature-based detection Minimal ability to detect unknown threats Linear process Threat Centric Utilizes all-source data Stronger ability to detect adversarial activities beyond known signatures Cyclical process 12

Network Security Monitoring Cycle NSM is based on the collection, detection, and analysis of network security data. 13

Network Security Monitoring Cycle NSM is a cyclical process. 14

Network Security Monitoring Cycle Collection Focuses on: Generation of security data. Organization of the security data. Storage of the security data. 15

Network Security Monitoring Cycle Collection Tasks: Defining where the largest amount of risk exists in the organization. Identifying threats to organizational goals. Identifying relevant data sources. Refining collection portions of data sources Configuring data collection mechanisms Building storage for security data retention 16

Network Security Monitoring Cycle Detection Based upon: Observed events. Data that is not expected. Focuses on: Examination of collected data. Generation of alerts. 17

Network Security Monitoring Cycle Analysis Focuses on: Human investigation of alerts. Human interpretation of alerts. 18

Network Security Monitoring Cycle Analysis Tasks can include: Packet Analysis Network Forensics Host Forensics Malware Analysis Open Source Intelligence 19

Security Data Processing Concepts Good Data vs. Bad Data Good Data is data that can be organized in a meaningful way and can be efficiently analyzed. 20

Security Data Processing Concepts Examples of Bad Data 21

Security Data Processing Concepts Example of Good Data 22

Security Data Processing Concepts What does Good security messages look like? Descriptive Relatable Complete 23

Security Data Processing Concepts Descriptive Messages Not Descriptive Mar 29 11:22:45.221 myhost sshd[213]: Failed login attempt More Descriptive Mar 29 11:22:45.221 myhost (192.168.2.2) sshd[213]: Failed login attempt from host 192.168.3.1 as admin, incorrect password 24

Security Data Processing Concepts Relatable Messages Not Relatable Mar 29 11:22:45.221 myhost (192.168.2.2) myspamapp[213]: Message <21394.283845@spam.com> title Herbal Remedies and Tiny Cars from spammer@spam.com rejected due to unsolicited commercial content More Descriptive Mar 29 11:22:45.221 myhost (192.168.2.2) myspamapp[213]: Message <21394.283845@spam.com> title Herbal Remedies and Tiny Cars from spammer@spam.com at SMTP host 192.168.3.1:2034 rejected due to unsolicited commercial content 25

Security Data Processing Concepts Complete Messages Incomplete Mar 29 11:22:45.221 myhost (192.168.2.2) myspamapp[213]: Received Message <21394.283845@spam.com> title Herbal Remedies and Tiny Cars from spammer@spam.com at SMTP host 192.168.3.1:2034 Mar 29 11:22:45.321 myhost (192.168.2.2) myspamapp[213]: Message <21394.283845@spam.com> passed reputation filter Mar 29 11:22:45.421 myhost (192.168.2.2) myspamapp[213]: Message <21394.283845@spam.com> FAILED Bayesian filter Mar 29 11:22:45.521 myhost (192.168.2.2) myspamapp[213]: Message <21394.283845@spam.com> Dropped Complete Mar 29 11:22:45.521 myhost (192.168.2.2) myspamapp[213]: Received Message <21394.283845@spam.com> title Herbal Remedies and Tiny Cars from spammer@spam.com at SMTP host 192.168.3.1:2034 reputation=pass Bayesian=FAIL decision=drop 26

Security Data Visualization Advantages Communicates complexity quickly. Enables recognition of latent patterns. Enables quality control on the data. Can serve as a muse. 27

Security Data Visualization Exploratory Data Analysis (EDA) The process of examining a dataset without pre-conceived assumptions about the data and its behavior. EDA is a constant process. 28

Security Data Visualization EDA Example A simple, classic (Anscombe) example of the central role that graphics play in terms of providing insight into a data set starts with the following data set: Data X Y 10.00 8.04 8.00 6.95 13.00 7.58 9.00 8.81 11.00 8.33 14.00 9.96 6.00 7.24 4.00 4.26 12.00 10.84 7.00 4.82 5.00 5.68 29

Security Data Visualization EDA Example If the goal of the analysis is to compute summary statistics plus determine the best linear fit for Y as a function of X, the results might be given as: N = 11 Mean of X = 9.0 Mean of Y = 7.5 Intercept = 3 Slope = 0.5 Residual standard deviation = 1.237 Correlation = 0.816 30

Security Data Visualization EDA Example In contrast, the following simple scatter plot of the data suggests the following: 31

Security Data Visualization EDA Example The data set "behaves like" a linear curve with some scatter; there is no justification for a more complicated model (e.g., quadratic); there are no outliers; the vertical spread of the data appears to be of equal height irrespective of the X-value; this indicates that the data are equally-precise throughout and so a "regular" (that is, equi-weighted) fit is appropriate. 32

Security Data Visualization The EDA approach of deliberately postponing the model selection until further along in the analysis has many rewards, not the least of which is the ultimate convergence to a much-improved model and the formulation of valid and supportable scientific and engineering conclusions. 33

Threat-centric Security Data Framework Applied Collection Framework (ACF)* 1. Define and Identify Threats 2. Quantify Risk 3. Identify Data Feeds 4. Narrow Focus *Reference: Applied Network Security Monitoring, Chris Sanders and Jason Smith, 2014 34

Threat-centric Security Data Framework 1. Define and Identify Threats Always start with this question: What is the worst case scenario as it relates to the survivability of the organization? Gain buy-in from upper management in terms of the answer. Develop a set of questions that can be used to determine which assets within the network are most critical to protecting sensitive data. 35

Threat-centric Security Data Framework 2. Quantify Risk You could use: Risk (R) = Impact (I) x Probability (P) Impact is a scale of 1 to 5 with 1 meaning the threat has little impact and 5 meaning the threat has large impact. Probability is a scale of 1 to 5 with 1 meaning low probability and 5 meaning high probability of occurring. Risk is a scale of 1 to 25 with 0-9: Low Risk 10-16: Medium Risk 17-25: High Risk 36

Threat-centric Security Data Framework 3. Identify Data Feeds that might provide NSM detection and analysis value. Start with the technical threat with the highest risk weight. 37

Threat-centric Security Data Framework 4. Narrow Focus The most technically in-depth step. Review every data source to gauge its value. 38

Threat-centric Security Data Framework 4. Narrow Focus You might want to answer the following example questions to help in narrowing focus: What can you filter out of PCAP traffic from a specific network segment? Which system event logs are the most important? Do you need to retain both firewall permits and denies? Which portions of the web application do you really need web logs for? Begin to define the amount and duration of each data type you would desire to retain. 39

Consider these tips 40 Cyber security program balance is paramount. Accept the fact that, to some extent, your networks and computer systems will be breached repeatedly. Work hard to make breaches hard to do. Attack containment is the mantra. Ensure that your cyber security program provides sufficient detection and response capability for when the inevitable occurs.

Contact Information Leonard Jacobs, MBA, CISSP, CSSA Email: ljacobs@netsecuris.com Office: (952)641-1421 ext. 20 Thank you 41