Building a Cyber Security Program



Similar documents
Application for Splunk Enterprise

Keeping Splunk in Check: Tools to BeGer Manage Your Investment

COUNTERSNIPE

Gain Insight into Your Cloud Usage with the Splunk App for AWS

Big Data Analytics. Using Splunk. Peter Zadrozny. Raghu Kodali. Apress"

Open Source Security Tool Overview

Deploying the Splunk App for Microso> Exchange

Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

ACL Compliance Director FAQ

Security OperaCons with Splunk App for Enterprise Security

Critical Security Controls

Building a large scale CDN with Apache Trafficserver. Jan van Doorn jan_vandoorn@cable.comcast.com

Goliath Performance Monitor Prerequisites v11.6

NetFlow Analytics for Splunk

CAMPUS EXPERIENCES USING NET+ TRUST, IDENTITY, AND SECURITY SERVICES

FireEye App for Splunk Enterprise

Splunk: Using Big Data for Cybersecurity

Junos Pulse Supported Platforms Guide

60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li

disect Systems Logging Snort alerts to Syslog and Splunk PRAVEEN DARSHANAM

simplify monitoring Environment Prerequisites for Installation Simplify Monitoring 11.4 (v11.4) Document Date: January

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

Install Guide for JunosV Wireless LAN Controller

Using Monitoring, Logging, and Alerting to Improve ICS Security ICSJWG 2015 Fall Meeting October 27, 2015

Splunk Enterprise in the Cloud Vision and Roadmap

Junos Pulse Supported Platforms

Copyright 2015 Splunk Inc. Go Big or Go Home. Sean Delaney Specialist SE Mustafa Ahamed Director, Product Management

Leveraging Open Source / Freeware Solutions

CONSUMERIZATION OF IT BYOD and Cloud-based File Storage

DEPLOYMENT GUIDE. Websense Enterprise Websense Web Security Suite TM. v6.3.1

Suricata IDS. What is it and how to enable it

Installing and Configuring Websense Content Gateway

Enterprise Deployment

EMC Security for Microsoft Exchange Solution: Data Loss Prevention and Secure Access Management

Patch and Vulnerability Management Program

Best PracBces: Deploying Splunk on Physical, Virtual, and Cloud Infrastructure

IT Business Management System Requirements Guide

ACE Management Server Deployment Guide VMware ACE 2.0

Fujitsu Managed Hosting Delivers your Cloud Infrastructure as a Service environment with confidence

TIBCO LogLogic. HIPAA Compliance Suite Quick Start Guide. Software Release: December Two-Second Advantage

Splunk implementa-on. Our experiences throughout the 3 year journey

IT Infrastructure Management

BITDEFENDER SECURITY FOR AMAZON WEB SERVICES

Rebasoft Auditor Quick Start Guide

Quick Setup Guide. 2 System requirements and licensing Kerio Technologies s.r.o. All rights reserved.

McAfee Network Security Platform 8.2

PCISS-1. Job Description: Key Responsibilities: I. Perform troubleshooting& support:

BM482E Introduction to Computer Security

Deployment Guide. Websense Web Security Websense Web Filter. v7.1

OWASP Logging Project - Roadmap

Sygate Secure Enterprise and Alcatel

Oracle Desktop Virtualization

Infrastructure solution Options for

Splunk Cloud as a SIEM for Cybersecurity CollaboraFon

Metalogix Replicator. Quick Start Guide. Publication Date: May 14, 2015

WhatWorks in Detecting and Blocking Advanced Threats:

Datasheet FUJITSU Software Systemwalker Software Configuration Manager V15

McAfee Firewall for Linux 8.0.0

IN DETAIL. Smart & Dedicated Servers

Enterprise Network Deployment, 10,000 25,000 Users

Cloud Computing. Adam Barker

Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)

Deploying in a Distributed Environment

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

Unified monitoring of your IT services PVSR

System Requirements. SuccessMaker 5

Cisco Network Switches Juniper Firewall Clusters

SUSE Cloud Installation: Best Practices Using an Existing SMT and KVM Environment

SAP Crystal Reports & SAP HANA: Integration & Roadmap Kenneth Li SAP SESSION CODE: 0401

vrealize Business System Requirements Guide

SUSE Cloud 2.0. Pete Chadwick. Douglas Jarvis. Senior Product Manager Product Marketing Manager

IBM Endpoint Manager Product Introduction and Overview

Enabling the Business of IT Through Splunk Dashboarding

Pulse Secure Desktop Client

Belgacom Group Carrier & Wholesale Solutions. ICT to drive Your Business. Hosting Solutions. Datacenter Services

Password Reset PRO INSTALLATION GUIDE

Stream Deployments in the Real World: Enhance Opera?onal Intelligence Across Applica?on Delivery, IT Ops, Security, and More

SCOPE: Role Descriptions/Job Profiles

IntroducJon to Splunk Cloud & Case Study: MindTouch. Praveen Rangnath Splunk César López- Natarén MindTouch Aaron Fulkerson MindTouch

CompTIA Security+ In this course, you will implement, monitor, and troubleshoot infrastructure, application, information, and operational security.

Host/Platform Security. Module 11

The SIEM Evaluator s Guide

Database SQL Server SERVER. Framework. Templates. Data. Exchange OS

Statement of Work Security Information & Event Management (SIEM) December 20, 2012 Request for Proposal No

Webinar Information. Title: Websense Remote Filtering Audio information: Dial-in numbers:

Technology Highlights Of. (Medusa)

Security Best Practice

TCS Managed Security Services

TECHNICAL WHITE PAPER. Accelerate UNIX-to-Linux Migration Programs with BMC Atrium Discovery and Dependency Mapping

Using Red Hat Network Satellite Server to Manage Dell PowerEdge Servers

Transcription:

Copyright 2015 Splunk Inc. Building a Cyber Security Program With Splunk App for Enterprise Security Jeff Campbell CISSP+ISSAP, Splunk CerBfied Architect Cyber Security Splunk Architect Penn State Hershey Medical Center

Disclaimer During the course of this presentabon, we may make forward looking statements regarding future events or the expected performance of the company. We caubon you that such statements reflect our current expectabons and esbmates based on factors currently known to us and that actual events or results could differ materially. For important factors that may cause actual results to differ from those contained in our forward- looking statements, please review our filings with the SEC. The forward- looking statements made in the this presentabon are being made as of the Bme and date of its live presentabon. If reviewed auer its live presentabon, this presentabon may not contain current or accurate informabon. We do not assume any obligabon to update any forward looking statements we may make. In addibon, any informabon about our roadmap outlines our general product direcbon and is subject to change at any Bme without nobce. It is for informabonal purposes only and shall not, be incorporated into any contract or other commitment. Splunk undertakes no obligabon either to develop the features or funcbonality described or to include any such feature or funcbonality in a future release. 2

Jeff Campbell 3

Focus shiu towards Cyber More people w/specializabon New tech More data! 4

5

6

Dedicated Search Head 16 CPU cores Indexers 1 per 100 GB indexed 16 GB RAM review the online documentabon @ docs.splunk.com DocumentaBon > Splunk App for Enterprise Security > InstallaBon and ConfiguraBon Manual > Splunk Enterprise deployment planning 7

8

9

IdenBty Data AcBve Directory Exchange IdenBty Management Asset Data Asset & Inventory Management ConfiguraBon Management Data Center Management System 10

_Bme host source sourcetype user_priority user_category user_bunit user vendor_product src_bunit Common response_bme Network Sessions InformaBon dest_ip Model dest_bunit dest_category dest_dns signature dest_mac dest_nt_host dest_priority src_category src_dns src_ip tag src_mac src_nt_host src_priority durabon acbon 11

Alerts tag=alert ApplicaBon State (tag=listening tag=port) OR (tag=process tag=report) OR (tag=service tag=report) Interprocess Messaging Email tag=email tag=messaging JVM tag=jvm VulnerabiliBes tag=vulnerability tag=report CerBficates tag=cerbficate Common Change Analysis tag=change Network Sessions tag=network tag=session InformaBon Intrusion DetecBon Network Model Traffic tag=network tag=communicate Ticket Management tag=bckebng 12 Performance tag=performance tag=ids tag=aoack Database tag=database Network ResoluBon (DNS) Inventory tag=inventory Web tag=web tag=network tag=resolubon tag=dns Malware tag=malware tag=aoack Updates tag=update tag=status AuthenBcaBon tag=authenbcabon NOT (acbon=success user=*$)

tag=network tag=communicate - - - 3000 lines later - - - 13

14

15 use the datamodelinfo command for at- a- glance view of accelerabon status

16

17

$SPLUNK_HOME/etc/log.cfg ##log.cfg category.savedsplunker = DEBUG,scheduler 18

splunk> (index=* OR index=_*) (tag=network tag=communicate) 19

20

add more indexers for beoer performance splunk> (index=* OR index=_*) (tag=network tag=communicate) 21

Splunk packages CIM- compliant technology add- ons with Enterprise Security Splunk_TA_bro Splunk_TA_cisco- asa Splunk_TA_cisco- esa Splunk_TA_cisco- wsa Splunk_TA_flowfix Splunk_TA_mcafee Splunk_TA_nessus Splunk_TA_nix Splunk_TA_norse Splunk_TA_sophos Splunk_TA_windows TA- airdefense TA- alcatel TA- bluecoat TA- cef TA- fireeye TA- forbnet TA- Up TA- juniper TA- ncircle TA- nmap TA- oracle TA- ossec TA- paloalto TA- rsa TA- sav TA- sep TA- snort TA- sos TA- Bppingpoint TA- trendmicro TA- websense 2: enable relevant TAs one- by- one to ensure CIM- compliant extracbons 22

23

$SPLUNK_HOME/etc/apps/Splunk_SA_CIM/local/datamodels.conf ##datamodels.conf [Authentication] acceleration = true acceleration.manual_rebuilds = true CIM datamodels in Splunk for Enterprise Security do not automabcally rebuild #configure to limit backfill during initial build # - only effective when rebuild initiated acceleration.backfill_time = - 7d 24 limit backfill range for faster producbon readiness

25

26 scale out for beoer performance

*nix Splunk Add- on for Unix and Linux $SPLUNK_HOME/etc/apps/Splunk_TA_nix/local/evenoypess.conf ##eventtypes.conf data models search across all indexes consider modifying evenoypes (tags) with addibonal constraints [iptables_firewall_accept] #search = = (NOT sourcetype=stash) signature=firewall action=pass OR action=permit #tags search = = os index=os unix host (NOT firewall sourcetype=stash) communicate signature=firewall success action=pass OR action=permit #tags = os unix host firewall communicate success line wrapping for readability only >300% increase in data model accelerabon performance auer adding index constraints in select TAs 27

28

29

30

31

32

33

34

35

run -me: 12:31 run -me: 0:21 run -me: 0:16 Dear Splunk, please stop using datamodel to search in your drilldowns Love, your users run -me: 0:07 36

37

Prepare infrastructure may need more hardware than you think Think through your authoritabve user and asset inventories Be selecbve in your TAs and apps on the ES search head Consider adding constraints to the TA evenoypes Take advantage of the accelerabon you worked so hard for Where possible, use tstats with summariesonly=t 38

QuesBons? 39

THANK YOU