INSIDE A CYBER SECURITY OPERATIONS CENTRE



Similar documents
CYBER SECURITY OPERATIONS CENTRE

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

Service Definition Document

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

SANS Top 20 Critical Controls for Effective Cyber Defense

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Is your SIEM ready.???

Bio-inspired cyber security for your enterprise

BeyondInsight Version 5.6 New and Updated Features

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Security Analytics for Smart Grid

Rashmi Knowles Chief Security Architect EMEA

The Role of Security Monitoring & SIEM in Risk Management

The Cyber Threat Profiler

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Guideline on Auditing and Log Management

Caretower s SIEM Managed Security Services

Advanced SOC Design. Next Generation Security Operations. Shane Harsch Senior Solutions Principal, MBA GCED CISSP RSA

INTRUSION PREVENTION SYSTEMS: FIVE BENEFITS OF SECUREDATA S MANAGED SERVICE APPROACH

CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES

Lot 1 Service Specification MANAGED SECURITY SERVICES

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

How To Manage Security On A Networked Computer System

Threat Intelligence: An Essential Component of Cyber Incident Response. Jeanie M Larson, CISSP-ISSMP, CISM, CRISC

IBM Security Strategy

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Security Information & Event Management (SIEM)

RSA Security Analytics

HP ArcSight User Behavior Analytics

Evolving Threat Landscape

Building a Security Operations Center. Randy Marchany VA Tech IT Security Office and Lab marchany@vt.edu

GOOD PRACTICE GUIDE 13 (GPG13)

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

SecureVue Product Brochure

Using SIEM for Real- Time Threat Detection

O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

CorreLog: Mature SIEM Solution on Day One Paul Gozaloff, CISSP. Presentation for SC Congress esymposium CorreLog, Inc. Tuesday, August 5, 2014

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

Cyber Security Operations: Building or Outsourcing

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

Cyber Security Metrics Dashboards & Analytics

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

Making the difference between read to output, and read to copy GOING BEYOND BASIC FILE AUDITING FOR DATA PROTECTION

AppGuard. Defeats Malware

Securing business data. CNS White Paper. Cloud for Enterprise. Effective Management of Data Security

Top 20 Critical Security Controls

Continuous Network Monitoring

IBM QRadar Security Intelligence April 2013

Continuous Cyber Situational Awareness

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia

NASA Consolidated Active Directory Overview ( August 20, 2012 ) Les Chafin Infrastructure Engineering HPES

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

McAfee Server Security

McAfee Security Architectures for the Public Sector

BT Assure Rethink the Risk

The SIEM Evaluator s Guide

Integrating MSS, SEP and NGFW to catch targeted APTs

A Primer on Cyber Threat Intelligence

End-user Security Analytics Strengthens Protection with ArcSight

Protecting critical infrastructure from Cyber-attack

Practical Threat Intelligence. with Bromium LAVA

Addressing the blind spots in your security strategy. BT, Venafi & Blue Coat

Extreme Networks Security Analytics G2 Vulnerability Manager

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

Evolution Of Cyber Threats & Defense Approaches

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

SIEM is only as good as the data it consumes

Into the cybersecurity breach

Information Technology Policy

Unified Security, ATP and more

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Compliance Guide: ASD ISM OVERVIEW

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Critical Security Controls

Defending Against Cyber Attacks with SessionLevel Network Security

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Addressing Cyber Risk Building robust cyber governance

Internet Safety and Security: Strategies for Building an Internet Safety Wall

ESG Brief. Overview by The Enterprise Strategy Group, Inc. All Rights Reserved.

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

Secure Cloud Computing

Content Security: Protect Your Network with Five Must-Haves

External Supplier Control Requirements

Defending against Cyber Attacks

IT Security Strategy and Priorities. Stefan Lager CTO Services

What s New in Security Analytics Be the Hunter.. Not the Hunted

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Transcription:

INSIDE A CYBER SECURITY OPERATIONS CENTRE Security Monitoring for protecting Business and supporting Cyber Defense Strategy Dr Cyril Onwubiko Intelligence & Security Assurance Research Series Limited Invited Lecture, Post Graduate, Network & Information Security, Kingston University, February 25 2015

CYBER SECURITY OPERATIONS CENTRE Abstract Cyber security operations centre is an essential business control aimed at protecting ICT systems and supporting Cyber Defense Strategy. Its overarching purpose is to ensure that Incidents are identified and managed to resolution swiftly, and to maintain safe & secure business operations and services for the organisation. Further, the difficulty and benefits of operating a CSOC are explained.

WELCOME TO OUR CYBER SECURITY OPERATIONS CENTRE 1

WELCOME TO OUR CYBER SECURITY OPERATIONS CENTRE 2

WELCOME TO OUR CYBER SECURITY OPERATIONS CENTRE 3

CYBER SECURITY OPERATIONS CENTRE What is a Cyber Security Operations Centre? It is a centre that comprises People (Analyst, Operators, Administrators etc.) who monitor ICT systems, infrastructure and applications. They use Processes, Procedures and Technology in order to deter computer misuse and policy violation, prevent and detect cyber attacks, security breaches, and abuse, and respond to cyber incidents. What do they do? They Ensure ICT, infrastructure and business applications of an organisation are identified. Ensure systems, infrastructure and applications are protected. Ensure vulnerabilities that may exist in, and within the IT estates are identified and managed. Identify threats that could compromise or exploit the vulnerabilities to break in. Identify threat actors that could be interested or that may wish to attack the business. Monitor the IT estate for real-time or near real-time cyber attacks, policy violations, security breaches or anomalous and symptomatic events, or deviations. Profile identities that appear suspicious, interesting and risky. Analyse events and alerts in order to determine if they are associated/related to streams of ongoing attack. Analyse historical events logs for patterns and trends (trending) symptomatic of an attack / compromise. Triage and investigate incidents. Coordinate, contain and respond to cyber incidents. Provide report and management information.

CYBER SECURITY OPERATIONS CENTRE Why Cyber Security Operations Centre? Jan 2015: The US Central Command (Centcom Twitter account was hacked by a group who call themselves the CyberCaliphate Dec. 2014: SONY suffered an unprecedented Cyber attacks to its Gaming and Film platforms! 2011: IPR theft of the RSA SecurID system and software believed to be State sponsored. Aug. 2014: Contact information >76 million households and about 7 million small businesses were compromised in a cybersecurity attack

CYBER SECURITY OPERATIONS CENTRE Why Cyber Security Operations Centre? Volume: Some Organisation posses myriad of devices in their IT estate, many of which are no longer managed, unsupported or legacy. Information / Data: All Organisation have various data that need to be protected such as Customer records, Student records, Citizens data, Bank/financial records, IP (Intellectual Property) etc. Growth: There s increasing growth in organisation user base, information and data. Networks are extended and expanded to accommodate collaboration, partnerships etc. Hence, isolated and localised point solutions struggle to protect the enterprise. Point Solution Management: Localised and point solution devices (log sources) need to be monitored, and properly managed, too. Borderless Perimeter: Collaboration, partnerships etc. and new ways of doing business (internet/ecommerce) means the boundary/perimeter is no longer hard but soft. Privileged User Abuse: Trusted users with privileged access can turn rogue, such risk must be monitored, mitigated and managed.

CYBER SECURITY OPERATIONS CENTRE Cyber Security Facts 1. Cyber incidents will always occur. 2. No Organisation is safe. 3. Every system, network, infrastructure or application can be attacked or hacked. 4. Vulnerability exists in every asset/organisation. 5. Risk mitigation is always a proportionality proposition. 6. Cyber landscape is constantly increasing (LAN, MAN, WAN, Internet, Cloud Computing, IoT, IoET etc.). 7. Technology is continuously evolving and complex. 8. Attack surface is growing. 9. Impacts of Cyber attacks can result to significant losses. 10.Attack methods are increasingly complex and well-thought.

Push command Cyber Situational Awareness Push command CYBER SECURITY OPERATIONS Switch Web Fraud Detection Push/pull Collection Log Collection Syslog events, SNMP, DPI, Flow and Audit Push/pull WAF L7 NIDS Portal HIDS Anti-Virus AV Gateway Analysis Threat Intel Enrich Corre late Fuse Interpret Database HIDS Integrity Anti-Virus VM Anti-Virus Hypervisor OS Privileged User Access Management HDB Response Incident Response & Forensic Investigations Vulnerability Management Trending CMDB Reporting Firewall Mobile Desktop Active Directory 10 Security Operations Centre

Every ICT should be configured to produce event logs. SIEMs are used to collect events logs of most formats. Most SIEMs have the capability to collect logs (push/pull) from a number of Log Sources. However, the deployment must enable this to happen! System Audit policy must be enabled, and audit logs must be consumed. Potential to do The right events must be logged (to providing the right set of accounting data) I have seen a deployment that produces several TB of logs daily but most of the logs are not useful. Switch Firewall LOG COLLECTION NIDS WAF L7 Portal HIDS Anti-Virus Database HIDS Integrity Anti-Virus VM Anti-Virus Hypervisor OS AV Gateway PUAM Mobile Desktop AD Push/pull Syslog (RFC 5424) SNMP (RFC 5343, v1, v2c, v3) Log Collection Possibly Big Data Syslog events, SNMP, DPI, Flow and Audit 11

SECURITY MONITORING

ANALYSIS Data feeds Network Discovery Events and Audit Logs DPI Capture Note: There are no set rule to the type of data collected, but the quality of data, and data types used will determine the accuracy of the analysis. Provided data analytics techniques used are of substantive nature. Vulnerability Scan Flow Big Data User agent Streaming Probe/Sensor User agent CMDB SIEM SIEM Web Fraud Detection Anomaly Detection 13

CYBER INCIDENT RESPONSE Internal Function External Function Containment Cyber Incident Responders Initial Triage Source of attack (Geo-IP), IP address of Attacker, suspected type of attack, target endpoint(s), location of endpoints, categorisation of incident based on type of attack/target Incidents Major Incidents Minor Incidents Control Counter measure Callout Specialist Services Digital Forensic Investigators FIRST* Responders Reporting Timeline Time is of essence / critical Major incident escalation / reporting and mitigation in minutes (approx.) * FIRST Forum of Incident Response and Security Teams 14

PEOPLE ANALYSTS, OPERATORS, ADMINS, ARCHITECTS, ENGINEERS ETC. 1. People are as important as Technology. 2. Analysts & Operators must be well trained and skilled. 3. Processes must exist, and should be followed, and policies must be adhered. 4. Cyber operations require specialist skills, and continuous investments in training, courses, certifications, memberships 5. The best Cyber operations can only be achieved through people. Man in the loop. 6. People are always the weakness link 15

MI Reporting REPORTING MANAGEMENT INFORMATION Report against the useful indicators important to the business, driving by stakeholders (senior Exec, and Analysts, too) S/N 1 Report against SLAs. Sample Important Elements of Cyber Reports 2 Performance of the Cyber operations (RoC *, false negative vs false positive vs real negative vs real positive). 3 Rolling "top 5" Cyber Attacks, Geography of origin of the attack. 4 Summary of Internal violations Privileged User misuse/abuse 5 Summary of current Policy Violations * ROC Receiver operating characteristics 16

REPORTING MANAGEMENT INFORMATION Typical Accounting Data (Sampled) Date and Time Date and Time and Log record reference Malware name, Application(1) stream detected in, Direction and Console Signature-base Version(1) and Console User, Workstation, URL and Reason User, Workstation or Process, URL of file and Reason User, Workstation or Process, URL and Reason User, Workstation and URL Criticality, Message contents and output Console User, Device, Console and Reason for failure Detecting Probe or Agent, Attack type, Source, Target and attack Detail 17

CYBER SECURITY OPERATIONS Strategy CENTRE STRATEGY Incidents 1 2 Analyse Identify Manage Escalate Resolve PMC11 3 Business Audit 4 Technical Audit 5 Event Monitoring 7 Correlation Business Rules on Business Systems Accountable to User by Independent person for Evidential Proof PMC12 System Rules on Any Device for Situational Awareness & Performance PMC10 PMC4 PMC8 Proactive Suspicious Behaviour Policy violation Sensors PMC5 HIDS, NIDS, DDoS Probes etc. PMC3 PMC6 Time Sync Cross Channel PMC1 8 9 Policy & Compliance Controls Assurance & Testing 6 Logs 10 11 Risk Management & Security Accreditation Manage People & Process Accounting process (by device) Collection process (independent) Log Sources PMC2 PMC9 Recordable Events Alerts (Prioritised Events) Rules Privileged Users PMC7 12 Forensic & Legal Readiness Accountable Items 18 App Network System Security Host-based Database SEF Identify Event Time

CYBER SECURITY OPERATIONS Terms of Reference CENTRE OBJECTIVES The 12 Aspects include: Manage People & Process Policy & Compliance Controls Risk Management & Security Accreditation Deterrent Controls Business Audit Technical Audit Log Collection Proactive Controls Event Monitoring Privilege User Monitoring Correlation by Time across Multiple Channels Reactive Controls Analyse & Identify Incidents Manage Incidents to Resolution Forensic & Legal Readiness Retrospective Controls 19

Terms of Reference CONCLUSION 1. CSOC is an essential business control to ensure safe and secure business operations and services, esp. online digital service. 2. Business requirements should drive cyber security strategy, and CSOC capabilities & scope. 3. Continuous improvements, including lesson learned should be encouraged. 4. Cyber incident will happen, and every organisation should have proportionate incident response and management strategy, and incident readiness processes in place. 5. Forensic readiness should be considered important and business requirements should focus on this. 6. People and process are the key, while technology is equally important too. 7. Staff training and development should be considered essential. 20

REFERENCES / SOURCES 1. HMG Government www.gov.uk 2. CESG Polices & Guidance - http://www.cesg.gov.uk/policyguidance/pages/index.aspx 3. The UK Cyber Security Strategy - https://www.gov.uk/government/publications/cyber-security-strategy 4. HMG Security Policy Framework - https://www.gov.uk/government/publications/security-policy-framework 5. HMG Good Practice Guide #13 Protective Monitoring of HMG ICT Systems 6. HMG Good Practice Guide #53 Transaction Monitoring for HMG Online Service Providers - https://www.gov.uk/government/publications/transaction-monitoring-for-hmg-online-service-providers 7. https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/271268/gpg_53_transaction _Monitoring_issue_1-1_April_2013.pdf 8. 10 Steps to Cyber Security - https://www.cesg.gov.uk/news/pages/10-steps-to-cyber-security.aspx 9. Cyber Essentials Scheme - https://www.gov.uk/government/publications/cyber-essentials-scheme-overview 10. NIST 800-Series (SP 800-137) Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organisations - http://csrc.nist.gov/publications/nistpubs/800-137/sp800-137-final.pdf 11. Reducing the Cyber Risk in 10 Critical Areas - https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/395716/10_steps_ten_critical _areas.pdf 12. FIRST Forum of Incident Response and Security Teams - https://www.first.org/about/organization/teams 13. User Agent (HTTP) - http://www.w3.org/protocols/rfc2616/rfc2616-sec14.html 14. Syslog Standard (IETF 5424) - https://tools.ietf.org/html/rfc5424 15. Renaud Bidou Security Operation Center Concepts & Implementation 16. Cyril Onwubiko & Thomas Owens - Situational Awareness in Computer Network Defense: Principles, Methods & Applications

CONTACT Dr Cyril Onwubiko 1, 2 1 Chair Intelligence & Security Assurance E-Security Group, Research Series cyril@research-series.com 2 Steering Committee Chair Cyber Science Joint Conferences 2015 C-MRiC.ORG Invited Lecture, Post Graduate, Network & Information Security, Kingston University, February 25 2015

Conference proceedings will be published by the Conference Publishing Services (CPS) and submitted for bibliographic indexing and listing on the following: IEEE Computer Society Digital Library, IEEE Xplore Digital Library, DBLP Computer Science Scopus CiteSeerX Computer Science Index EI Compendex Academic Search Complete CiteULike Google Scholar & Microsoft Academic Search.

CONFERENCES Joint and Co-located Conferences: Cyber Science 2015, June 8-9, London, UK International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA 2015), June 8-9, 2015, London, UK (www.cmric.org/csa-2015home) International Conference on Social Media, Wearable and Web Analytics (Social Media 2015), June 8-9, 2015, London, UK (www.c-mric.org/sm- 2015home) International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2015), June 8-9, 2015, London, UK (www.cmric.org/cs-2015home) International Conference on Cyber Incident Response, Coordination, Containment & Control (Cyber Incident 2015), June 8-9, 2015, London, UK (www.c-mric.org/ci-2015home)