A Human Factor Interface for SIEM



Similar documents
Identity Theft Prevention Program Compliance Model

Incident Response. Six Best Practices for Managing Cyber Breaches.

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

C-TPAT Self-Assessment - Manufacturing & Warehousing

Defining, building, and making use cases work

How To Manage Security On A Networked Computer System

HIGH-RISK USER MONITORING

Client Resources SAFEGUARDING YOUR IDENTITY. Your personal and financial information is precious. Protect it by being savvy about identity theft.

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008

Managed Hosting & Datacentre PCI DSS v2.0 Obligations

THE EVOLUTION OF SIEM

Ecom Infotech. Page 1 of 6

Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions

Performing Advanced Incident Response Interactive Exercise

FFIEC CONSUMER GUIDANCE

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

Logging and Auditing in a Healthcare Environment

The SIEM Evaluator s Guide

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index

Hengtian Information Security White Paper

Taxonomy of Intrusion Detection System

Why Your SIEM Isn t Adding Value And Why It May Not Be The Tool s Fault. Best Practices Whitepaper June 18, 2014

Contents. Intrusion Detection Systems (IDS) Intrusion Detection. Why Intrusion Detection? What is Intrusion Detection?

TIBCO Cyber Security Platform. Atif Chaughtai

University of Pittsburgh Security Assessment Questionnaire (v1.5)

Smart cyber security for smart cities

SITECATALYST SECURITY

AlienVault for Regulatory Compliance

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!

White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management

Information Security: A Perspective for Higher Education

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Securing Remote Vendor Access with Privileged Account Security

Data Management Policies. Sage ERP Online

IT Security Risks & Trends

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

Physical Security to mitigate Social Engineering Risks

SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA

End-user Security Analytics Strengthens Protection with ArcSight

TOP REASONS WHY SIEM CAN T PROTECT YOUR DATA FROM INSIDER THREAT

PCI DSS 3.1 and the Impact on Wi-Fi Security

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard

Solutions and IT services for Oil-Gas & Energy markets

Standard: Information Security Incident Management

HIPAA Security Alert

AlienVault Unified Security Management Solution Complete. Simple. Affordable Life Cycle of a log

State of Vermont. Physical Security for Computer Protection Policy

KEY STEPS FOLLOWING A DATA BREACH

PCI Data Security and Classification Standards Summary

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Presented by: Mike Morris and Jim Rumph

SIEM is only as good as the data it consumes

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Policy for Protecting Customer Data

QRadar SIEM and FireEye MPS Integration

Overcoming PCI Compliance Challenges

State of Vermont. Intrusion Detection and Prevention Policy. Date: Approved by: Tom Pelham Policy Number:

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

SIEM AND THE ART OF LOG MANAGEMENT Trustwave Holdings, Inc.

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

INTRUSION PREVENTION AND EXPERT SYSTEMS

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements

Italy. EY s Global Information Security Survey 2013

Combating a new generation of cybercriminal with in-depth security monitoring

CALNET 3 Category 7 Network Based Management Security. Table of Contents

ISO COMPLIANCE WITH OBSERVEIT

Managed Security Services

SERVICE ORIENTED EVENT ASSESSMENT CLOSING THE GAP OF COMPLIANCE MANAGEMENT

Usher Mobile Identity for Higher Education Institutions. Rebecca Parks Associate Product Manager, MicroStrategy

Advanced Analytics For Real-Time Incident Response A REVIEW OF THREE KNOWN CASES AND THE IMPACT OF INVESTIGATIVE ANALYTICS

Into the cybersecurity breach

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Transcription:

A Human Factor Interface for SIEM SESSION ID: ANF R04A Information Security Communications Consultant Senior Information Security Consultant Trustwave Germany GmbH

Security Information and Event Management SIEM systems are powerful tools to achieve security and compliance by correlating log data from disparate network sources. They automate information analysis tasks required by several industry security standards. Sensor / Log Source 2

Security Information and Event Management But are you really sure that SIEM technology covers all attack vectors targeting your assets? All Photographs in this presentation: Fotolia.com 3

Security Information and Event Management Serious attackers rely on blended threats combining hacking with social engineering and physical access... - whereas - SIEM systems correlate event logs only from IT sources! Non-technical attack vectors remain unnoticed. SIEM systems do not make use of human observations/intelligence. Few exceptions: Laptops, mobile phones or badges reported lost or stolen. 4

Security Information and Event Management Industry information security and data privacy standards and laws require full coverage of all threats to information assets. ISO/IEC 27001 for example covers Human Resources, Records Management, Business Continuity, Physical Security and Risk Management. A.13.1 Reporting information security events and weaknesses Objective: To ensure information security events and weaknesses associated with information systems are communicated in a manner allowing timely corrective action to be taken. A.13.1.1 Reporting information security events Control - Information security events shall be reported through appropriate management channels as quickly as possible. A.13.1.2 Reporting security weaknesses Control - All employees, contractors and third party users of information systems and services shall be required to note and report any observed or suspected security weaknesses in systems or services. 5

The Idea Feed non-technical events into the correlation engines of SIEM systems. Design a human factor interface for SIEM systems to acquire and process security related input provided by human beings. 6

Human Intelligence & SIEM Micro Case Study A seemingly harmless telephone call of an unidentified person asking for a password in order to gain access to a certain system could be a good reason for a SIEM system to take notice, if at the same day a similar call is observed at an overseas office. If, in addition to that, at the same time intrusion detection and firewalls show increasing hacking activities targeting the same asset, an alarm should be raised. 7

A Human Factor Interface for SIEM: The problems to be solved in detail

Undiscovered Blended Threats Non-technical attack vectors include manipulative phone calls and other communicational approaches, identity theft, onsite visits, burglary and dumpster diving. Everyone with access to promising assets can be a target executives, their secretaries, developers, cleaning workers, call center employees, IT specialists, human resources employees. Each single step is kept inconspicuous. If recognized at all, the steps are recorded at different security or business departments. There is no correlation with IT event logs. 9

Insufficient Security Communication Practices IT security, compliance management, physical security and personal security belong to different business and communication cultures. If organizations succeed in building an internal security communication framework involving all different security departments, in most cases this framework relies on scheduled meetings. Timely correlation, interdisciplinary alerting and fast reactions to blended threats have been put into practice manually only at a small number of organizations. 10

The Psychology of Incident Reporting Human beings usually are perfect anomaly detectors, but often they hesitate to report. I feel uneasy about that phone call or that open window but is it really important? Will those IT people / security guys laugh at me? How shall I find the right words? It s just a feeling Perhaps it was my fault and I get punished! Perhaps I blame an innocent person And who after all is the one in charge? 11

How to Build a Human Factor Interface for SIEM

1. Start with a Risk Assessment Human Factor Risk Assessment What kind of human behavior may have what influence on information security? Which employees/managers would you try to manipulate to obtain access to what assets by fraud? How can information assets be accessed unauthorized physically? What information about what assets can be found on the internet? Define a set of communicational and physical attack vectors to be watched. Define critical events and corresponding threshold values. 13

2. Relate Non-Technical Attack Vectors to the Known Technical Ones Think about blended threats. How could technical and non-technical attack vectors be combined to get access to critical assets? What assets may provide access to other, even more critical ones? Would the single steps already be recognized or fly under the existing security radar? As a result, define additional correlation rules. 14

3. Design a Web Interface Provide a list/menu of important assets. Provide a list of well-known attack methodologies. Alternatively allow free form entries (to learn and to cover creative attacks). Provide fields for time, location, role of the reporting person and an individual risk estimation. Program correlation rules into the interface or the SIEM system. Let the interface produce a log. 15

4. Use the Web Interface First step: Choose an asset (e.g. customer database, lab or credit card holder data). Second step: Choose or describe type of suspected attack/weakness observed (e.g. suspicious phone call, suspicious discussion at hotel bar or visitor trying to open server room door). Third step: Indicate own risk estimation. Add notes for forensic use or further improvement (new correlation rules) of the PDCA cycle. Entries result in a log automatically sent to the SIEM system. 16

Who should use the Interface? Security personnel of different departments. For most employees: A specialized security help desk. Security Help desk employees should train their communicational and psychological skills. An all-hands awareness training should explicitly cover human factors. It should also introduce the use of the interface. Individuals who are preferred targets of social engineers may be granted direct access. Should anonymous entries be allowed? 17

The Benefits

A Human Factor Interface for SIEM Make use of human intelligence. Formalized process and well-defined point of contact encourage employees to report security observations. With the interface added, SIEM systems cover all incident and event management requirements of industry security standards and laws. With the interface added, SIEM systems may help to overcome communicational barriers between different security departments. Thank You! johannes@wiele.com, bettina@wesselmann.com 19