Building a Security Operations Center. Randy Marchany VA Tech IT Security Office and Lab marchany@vt.edu



Similar documents
Physical Meets Cyber (IDS meets GIS) Randy Marchany VA Tech IT Security Office and Lab

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

CYBER SECURITY OPERATIONS CENTRE

INSIDE A CYBER SECURITY OPERATIONS CENTRE

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Intrusion Detection and Incident Response Breakout Session

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Best Practices for Building a Security Operations Center

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

How To Manage Sourcefire From A Command Console

Cyber Security Operations Center (CSOC) for Critical Infrastructure Protection

Cautela Labs Cloud Agile. Secured.

Case Study: Security Implementation for a Non-Profit Hospital

Symantec Security Information Manager Version 4.7

TONAQUINT DATA CENTER, INC. CLOUD SECURITY POLICY & PROCEDURES. Tonaquint Data Center, Inc Cloud Security Policy & Procedures 1

The SIEM Evaluator s Guide

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

Building Energy Security Framework

The Role of Security Monitoring & SIEM in Risk Management

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Evaluating, choosing and implementing a SIEM solution. Dan Han, Virginia Commonwealth University

EC-Council Certified Security Analyst (ECSA)

SANS Top 20 Critical Controls for Effective Cyber Defense

Hackers are here. Where are you?

Cyber Watch. Written by Peter Buxbaum

The Time has come for A Single View of IT. Sridhar Iyengar March 2011

Caretower s SIEM Managed Security Services

Payment Card Industry Data Security Standard

SAP Cybersecurity Solution Brief. Objectives Solution Benefits Quick Facts

Organizational Issues of Implementing Intrusion Detection Systems (IDS) Shayne Pitcock, CISSP First Data Corporation

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

Security Services. A Solution for Providing BPM of Security Services within the Enterprise Environment.

Managed Security Services for Data

WHITE PAPER. Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology

An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan

Benefits. Product Overview. There is nothing more important than our customers. DATASHEET

A Case for Managed Security

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

Enabling Security Operations with RSA envision. August, 2009

New IBM Security Scanning Software Protects Businesses From Hackers

Managed Security Services

Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology

ISE Northeast Executive Forum and Awards

SOC & HIPAA Compliance

Securing ephi with Effective Database Activity Monitoring. HIMSS Webcast 4/26/2011. p. 1

Injazat s Managed Services Portfolio

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Course Title: Penetration Testing: Security Analysis

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

Benefits. Product Overview. There is nothing more important than our customers. DATASHEET

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

HP and netforensics Security Information Management solutions. Business blueprint

Managed Security Monitoring Quick Guide 5/26/ EarthLink. Trademarks are property of their respective owners. All rights reserved.

Intrusion Detection Systems (IDS)

Understanding Vulnerability Management Life Cycle Functions

Threat Management: Incident Handling. Incident Response Plan

Cisco Remote Management Services for Security

Department of Management Services. Request for Information

Avoiding the Top 5 Vulnerability Management Mistakes

Scalability in Log Management

Security Incident Management Essentials Compiled as a service to the community by Internet2, EDUCAUSE, and REN-ISAC

Swordfish

IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector

Security Information & Event Manager (SIEM)

Vulnerability Management Isn t Simple (or, How to Make Your VM Program Great)

How To Buy Nitro Security

White Paper Integrating The CorreLog Security Correlation Server with BMC Software

Critical Security Controls

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Client Security Risk Assessment Questionnaire

Vendor Risk Management Financial Organizations

Average annual cost of security incidents

Information Security Assessment and Testing Services RFQ # Questions and Answers September 8, 2014

QRadar SIEM 6.3 Datasheet

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Nessus Enterprise Cloud User Guide. October 2, 2014 (Revision 9)

Prevent cyber attacks. SEE. what you are missing. Netw rk Infrastructure Security Management

Introduction Jim Rowland, Senior System Architect and Project Manager Daly

Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA Office: Fax:

Vulnerability Management

Student Tech Security Training. ITS Security Office

Sample Vulnerability Management Policy

The Art of Modern Threat Defense. Paul Davis Director, Advanced Threats Security Solution Architects

Automate PCI Compliance Monitoring, Investigation & Reporting

The STAGEnet Security Model

Nessus Cloud User Registration

Alcatel-Lucent Services

Achieving Regulatory Compliance through Security Information Management

SECURITY 2.0 LUNCHEON

Der Weg, wie die Verantwortung getragen werden kann!

Network Security Monitoring

Security. Security consulting and Integration: Definition and Deliverables. Introduction

INCIDENT RESPONSE CHECKLIST

Fear Not What Security Can Do to Your Firm; Instead, Imagine What Your Firm Can Do When Secured!

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

The Business Case for Security Information Management

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention

Transcription:

Building a Security Operations Center Randy Marchany VA Tech IT Security Office and Lab marchany@vt.edu

CyberSecurity Operations Center Security Operations Center (SOC) term is being taken over by physical surveillance companies We re building a Cyber Security Operations Center (CSOC) that doesn t have any physical surveillance capability. It could be a component of a SOC in the future 2

(C)SOC vs. NOC Network Operations Center usually responsible for monitoring and maintaining the overall network infrastructure. Its primary function is to ensure uninterrupted network service. CSOC leverages security related network activity to refine security incidents response. CSOC and NOC should complement each other and work in tandem. 3

Why? We ve been collecting security related data for a number of years and needed a focal point to help us see the big picture Data from Security Reviews Vulnerability scans (push/pull) IPS/IDS data System logs We want to build a security history for a host 4

Why? The CSOC is a logical place to collect, analyze and distribute data collected to support our Defense in Depth Strategy Preventing Network Based Attacks Preventing Host Based Attacks Eliminating Security Vulnerabilities Supporting Authorized Users Providing tools for Minimizing Business Loss 5

Why? We want to measure and report compliance with our IT policies, state/federal laws and regulations FERPA, HIPAA, PCI, ITAR, GLB, SOX VT Policies 7000 Acceptable Use of Computer and Communication Systems 3/28/2002 7010 Policy for Securing Technology Resources and Services 1/22/2007 7025 Safeguarding Nonpublic Customer Information 5/12/2004 7030 Policy on Privacy Statements on Virginia Tech Web Sites 3/27/2002 7035 Privacy Policy for Employees' Electronic Communications 3/14/2005 7040 Personal Credentials for Enterprise Electronic Services 4/01/2008 7100 Administrative Data Management and Access Policy 4/01/2008 7105 Policy for Protecting University Information in Digital Form 7/1/2008 7200 University IT Security Program 6/12/2006 7205 IT Infrastructure, Architecture and Ongoing Operations 6/12/2006 7210 IT Project Management 6/12/2006 7215 IT Accessibility 6/12/2006 1060 Policy on Social Security Numbers 5/25/2007 6

Where? OS Syslog/event logs, IDS logs, IPS logs, PID logs, Firewall logs, Pen Test Logs, PCI, netflow CSOC needs to be able to analyze and display this data quickly Data resides on separate, distributed servers CSOC pulls data from these servers as needed CSOC lives in the IT Security Office & Lab 7

What? Provides real-time view of the VT network s security status Provides info to assess risk, attacks, mitigation Provides metrics Executive Operational Incident 8

What? Event Generators (E boxes) Any form of IDS sensor (firewalls, IPS, IDS, Snort, Active Directory servers, Remedy, vulnerability scanners, TACACS, application software Most are Polling Generators Generate specific event data in response to a specific action Example: IDS or firewall 9

What? Events Databases (D boxes) Provide basic storage, search and correlation tools for events collected and sent to the CSOC Vulnerability databases contain info about security breaches, etc. 10

What? Events Reactions (R boxes) SOC Console Used for internal analysis Real-time monitors (Snort, Base, IPS, Dshield) Incident Handling Remedy trouble ticket system Location tools Statistical analysis End User Portals Multi level reporting for various target audiences Sysadmin, management 11

What? Analysis Engines (A Boxes) Helps ID Analyst determine if an incident has occurred, its spread, its impact, etc. Knowledge Base Engines (K boxes) Store security configs of critical assets, tips/tricks and effective solutions to previous problems Reaction and Report Engines (R boxes) Switches, routers, IPS and associated management tools 12

13

Putting the Pieces Together RDWEB locate any device in our network DSHIELD Collect Firewall logs SNORT Sensors monitoring for patterns VULNSCAN pull vulnerability scanner CHECKNET push vulnerability scanner REMEDY Trouble Ticket system used by Help Desk CENTRAL SYSLOG collects syslogs 14

IDS Infrastructure Campus Systems CheckNet WWW MySQL DB IPS VT Dshield Central Syslog Servers Nessus, Comm Scanners Snort BASE CheckNet Failure DB SNORT Sensors Dshield MySQL DB CIRT Remedy Trouble Ticket System Help Desk User Vuln Scanner MySQL DB 15

16

17

18

19

20

21

22

23

24

25

26

27

Futures There are commercial tools that do all of this They cost lots of $$$ We don t have lots of $$$ Had to grow our own Improves our skill set, proactive and reactive capabilities We can better evaluate commercial products because of our experience 28

Reference Reference paper Security Operation Center Concepts & Implementation by Renaud Bidou We used this as our blueprint 29

Contact Information Randy Marchany VA Tech IT Security Office & Lab 1300 Torgersen Hall VA Tech Blacksburg, VA 24060 540-231-9523 marchany@vt.edu http://security.vt.edu 30