Vulnerability Management with the Splunk App for Enterprise Security



Similar documents
Software Vulnerability Assessment

How To Use A Policy Auditor (Macafee) To Check For Security Issues

Data Center Connector for vsphere 3.0.0

Vulnerability Management

Single Product Review - Bitdefender Security for Virtualized Environments - November 2012

How To Use Qqsguard At The University Of Minneapolis

The SIEM Evaluator s Guide

Creating Basic Custom Monitoring Dashboards Antonio Mangiacotti, Stefania Oliverio & Randy Allen

VULNERABILITY MANAGEMENT

Boost your VDI Confidence with Monitoring and Load Testing

Application for Splunk Enterprise

The Social Accelerator Setup Guide

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide

QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014

Vulnerability management lifecycle: defining vulnerability management

CA Virtual Assurance/ Systems Performance for IM r12 DACHSUG 2011

Scanner Configuration Utility

Information Security Office

VMware vcenter Operations Manager Administration Guide

Virtual Office Remote Installation Guide

How to Quickly Create Custom Applications in SharePoint 2010 or 2013 without Custom Code

ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT

Vulnerability Management ROI Calculator User Guide. v2.0 Monday, September 29, Copyright 2008, Lumension Security

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

PRINT FLEET MANAGER USER MANUAL

White Paper. Managing Risk to Sensitive Data with SecureSphere

Security and Compliance Suite

The Value of Vulnerability Management*

vrealize Operations Manager User Guide

Novell ZENworks Asset Management

IBM Security IBM Corporation IBM Corporation

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

ESISS Security Scanner

EMC ViPR SRM. Alerting Guide. Version

The software shall provide the necessary tools to allow a user to create a Dashboard based on the queries created.

VMware vcenter Log Insight User's Guide

Symantec Control Compliance Suite Standards Manager

VMware vcenter Log Insight User's Guide

QualysGuard WAS. Getting Started Guide Version 4.1. April 24, 2015

Juniper Networks Management Pack Documentation

EMC AVAMAR INTEGRATION WITH EMC DATA DOMAIN SYSTEMS

Information Security and Continuity Management Information Sharing Portal. Category: Risk Management Initiatives

How To Monitor Your Entire It Environment

NMS300 Network Management System

Sisense. Product Highlights.

How To Manage Security On A Networked Computer System

Getting Started Guide: Transaction Download for QuickBooks 2014 Windows

Splunk Dashboard Framework What s New Nicholas Filippi Product Management, Splunk

MetaTrader 4 for Android TM Guide

Attack Intelligence: Why It Matters

<no narration for this slide>

Enterprise Vault 11 Feature Briefing

Patch Management. Module VMware Inc. All rights reserved

Monitoring VMware ESX Virtual Switches

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Seagate NAS OS 4 Reviewers Guide: NAS / NAS Pro / Business Storage Rackmounts

Performance Optimizer Software

QNAP Plug-in for vsphere Client: A User s Guide. Updated December QNAP Systems, Inc. All Rights Reserved. V1.0

How RSA has helped EMC to secure its Virtual Infrastructure

SQL Reporting Services: A Peek at the Power & Potential

White Paper The Dynamic Nature of Virtualization Security

Manage Vulnerabilities (VULN) Capability Data Sheet

Connecting to your Database!... 3

Use of the Common Vulnerabilities and Exposures (CVE) Vulnerability Naming Scheme

Assets, Groups & Networks

Unified Security Management (USM) 5.2 Vulnerability Assessment Guide

Google Drive: Access and organize your files

APPLICATION MANAGEMENT SUITE FOR ORACLE E-BUSINESS SUITE APPLICATIONS

Keeping Splunk in Check: Tools to BeGer Manage Your Investment

How To Test For Security On A Network Without Being Hacked

MicroStrategy Course Catalog

Symantec Asset Management Suite 7.5 powered by Altiris technology

ECS 235A Project - NVD Visualization Using TreeMaps

Copyright 2013 Splunk Inc. Introducing Splunk 6

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

Social Media Monitoring: Engage121

Cloudfinder for Office 365 User Guide. November 2013

Training module 2 Installing VMware View

Copyright EPiServer AB

System Monitoring and Reporting

PrinterOn Mobile Print Application Overview and User Guide

Access Tutorial 8: Combo Box Controls

QRadar SIEM and FireEye MPS Integration

Policy Compliance. Getting Started Guide. January 22, 2016

Knowledge Base Articles

rating of 5 out 5 stars

Capacity planning with Microsoft System Center

Vulnerability Management Isn t Simple (or, How to Make Your VM Program Great)

How to Create Dashboards. Published

AlienVault. Unified Security Management (USM) 5.1 Running the Getting Started Wizard

CDM Vulnerability Management (VUL) Capability

Legal Notes. Regarding Trademarks KYOCERA Document Solutions Inc.

Kaspersky Security Center 10 Getting Started

Transcription:

Copyright 2014 Splunk Inc. Vulnerability Management with the Splunk App for Enterprise Security Randal T. Rioux Principal Security Strategist and Minister of Offense Splunk Inc.

Disclaimer During the course of this presentakon, we may make forward looking statements regarding future events or the expected performance of the company. We caukon you that such statements reflect our current expectakons and eskmates based on factors currently known to us and that actual events or results could differ materially. For important factors that may cause actual results to differ from those contained in our forward- looking statements, please review our filings with the SEC. The forward- looking statements made in the this presentakon are being made as of the Kme and date of its live presentakon. If reviewed aser its live presentakon, this presentakon may not contain current or accurate informakon. We do not assume any obligakon to update any forward looking statements we may make. In addikon, any informakon about our roadmap outlines our general product direckon and is subject to change at any Kme without nokce. It is for informakonal purposes only and shall not, be incorporated into any contract or other commitment. Splunk undertakes no obligakon either to develop the features or funckonality described or to include any such feature or funckonality in a future release. 2

Things We Will Be Discussing Field ExtracKons and Content Customizing Views to Help PrioriKzaKon Available Event AcKons Managing VulnerabiliKes as Notable Events Helpful Searches and Procedures The Vulnerability Data Model 3

Things We Will Not Be Discussing How to get vulnerability data into Splunk There are lots of ways! Depends heavily on vender reporkng methods Details on vendor and scanner products Each has their merit and faults - do your research Examples for this demonstrakon are not endorsements Corporate policies for vulnerability management Everybody has an opinion 4

Overview of Patch and Vulnerability Management

What Is Vulnerability Management? Patch and vulnerability management are one of the most important security programs to implement in an IT infrastructure. However, surprisingly enough it is also either not a roukne process, or it is done in a completely ineffeckve manner. Here, I will completely over simplify the technical process, and leave the policy work to you and your organizakons to develop. 6

Vulnerability Management Process This is where most presentakons on this subject over complicate things with lifecycle graphics and lengthy procedures. If you are interested in that sort of thing, take a look at NIST SP 800-40: CreaKng a Patch and Vulnerability Management Program. Here s a summary: 1. DISCOVER 2. PRIORITIZE AND ASSIGN 3. FIX 7

Important Elements of Vulnerability Reports Common VulnerabiliKes and Exposures (CVE) CVE is a dickonary of publicly known informakon security vulnerabilikes and exposures hdps://cve.mitre.org Common Vulnerability Scoring System (CVSS) The CVSS assessment measures three areas of concern: ê Base Metrics for qualikes intrinsic to a vulnerability ê Temporal Metrics for characteriskcs that evolve over the lifekme of vulnerability ê Environmental Metrics for vulnerabilikes that depend on a parkcular implementakon or environment These metrics are used to generate a numerical score and a text vector that indicates the severity of the vulnerability, and the way in which it was calculated. 8

The Splunking

The Anatomy of a Vulnerability Event Example raw event received from a vulnerability scan: Splunk takes that event, and at search Kme (this is an important disknckon!) assigns each value a key. This allows Enterprise Security to start doing what it does best: make it useful! 10

11

VM - The Splunk App for Enterprise Security Way

Splunk App for Enterprise Security Pre- built searches, alerts, reports, dashboards, threat intel feeds, workflow Dashboards and Reports Incident InvesKgaKons & Management StaKsKcal Outliers 13 Asset and IdenKty Aware

Splunk App for Enterprise Security The Splunk App for Enterprise Security is designed to be generic enough for immediate value, with the power to be customized according to your organizakon s monitoring and workflow needs. Splunk itself is a framework, and ES follows that flexibility by enabling customizakon for all views via the GUI, or for more advanced users, the applicakon code beneath it. 14

Use and CustomizaKon

Use and CustomizaKon ES contains many areas of focus. For vulnerability management, we want to use the views and tools associated with the Security Domains drop down Network, which includes: Security Domain: Network Vulnerability Center Vulnerability OperaKons Vulnerability Search 16

Use and CustomizaKon All security domain views have the opkon to edit what you see The defaults are helpful, but adding, removing and edikng panels specific to the things you care about is vital to enhancing your work flow 17

Panel EdiKng First, let s delete the Top VulnerabiliKes panel. We don t really care about that stuff anyway This frees up some precious real estate for the dashboard 18

Panel EdiKng First, let s delete the Top VulnerabiliKes panel. We don t really care about that stuff anyway, and it frees up some precious real estate for the dashboard Next, click on + Add Panel 19

Panel EdiKng Title the panel Systems w/ CVSS > 7 Use the following Search String: tag=vulnerability cvss_base_score>7 top dest_ip Time Range Scope should be Shared Time Picker (global) This uses the Kme seleckon set for the enkre view in the header/search area Click Save It is now added to the bodom of the page, using the default bar chart display. Drag the panel up to where the deleted one was 20

Panel EdiKng The bar chart is ugly for this one. Click on the bar chart icon, and you have a bunch of choices Click on Pie. I like pie. Now click the Done budon on the top of the page, and admire your work 21

Working With and AlerKng On Events

Managing Scanned Discoveries Most everything you see by default is drill- downable. That is a word, I assure you The panel on the right has a liskng of hosts we should probably pay adenkon to Let s click on the red part of the bar for the VSPHERE host to see what is going on there 23

Managing Scanned Discoveries CreaKng Alerts from VulnerabiliKes IdenKfy a crikcal vulnerability Drill down by host Create a notable event Verify the alert in Incident Review 24

Managing Scanned Discoveries This Windows system (named VSPHERE ) is running a VMware vcenter server, and it hasn t been tended to in quite a while. Let s click on the first item listed. 25

Managing Scanned Discoveries Click to Expand 26

Managing Scanned Discoveries Now we have access to the Event AcKons contextual menu. This has a default list of ackons we can take on the current event. To manage the vulnerability, and start the process of assignment and mikgakon, we will select Create notable event Note that this is the manual process. To automate this kind of ackvity, correlakon rules can be leveraged. We ll review that later in this presentakon 27

Managing Scanned Discoveries This is where we begin to define properkes to help us track the progress of this event. 28

Managing Scanned Discoveries Here we have done the following to create this event: Helpful Ktle Specify domain (ES treats vulnerability data by default as part of the Network domain. Yes, you can change this!) Select urgency Assign an owner Provide current status Add descripkon of what you are doing. This is Kme stamped and records the name of the editor 29

Managing Scanned Discoveries Once saved, we are immediately redirected to the Incident Review part of ES. Let s expand this event by clicking the > symbol on the les of it. 30

Managing Scanned Discoveries Here, we have even more opkons. Checking the edit box, and then clicking Edit all selected for this event allows us to perform more ackons. For example, once I receive verificakon that SQL Server was indeed upgraded, I can close out the case as shown on the next slide. 31

Managing Scanned Discoveries Once saved, the event is now closed. It is important to note that ES is not currently designed to replace a dedicated issue tracking system. Splunk does interface with many popular applicakons, however. Most of these solukons allow REST/API communicakons as well simplifying the integrakon process. 32

AutomaKng the Process CorrelaKon Searches (rules) are awesome When a search correlates with parameters for Kme and throdling, a Notable Event can be automakcally created Be aware that a poorly wriden one can rain havoc on your system and human resources test, monitor and constantly evaluate your creakons! 33

CreaKng a CorrelaKon Search If you are not watching this presentakon at.conf2014, these slides will be your guide If you are at this talk, I will now switch to a live demonstrakon 34

CreaKng a CorrelaKon Search From within the ES App, click on the Configure drop- down: Select General - > Custom Searches Click the green New budon: When the pop- up for search types appears, select CorrelaKon Search 35

CreaKng a CorrelaKon Search For this example, we want to create a Notable Event from a CorrelaKon Search that looks specifically for the following: ü Vulnerability has a CVSS score of greater than 6 ü Host is our public Web server (192.168.3.5) ü Check every hour for this occurence When an event matching these parameters is detected, perform the following: ü Create a Notable Event ü Send email to responsible party For more informakon: hdp://docs.splunk.com/documentakon/es/latest/user/createcorrelakonsearches 36

CreaKng a CorrelaKon Search Complete the form page like so (fields not used are omided here) and save it. Also, the ackon to send an email upon a posikve match is a good idea. System administrators love getng automated emails. Known fact. Search Name: High CVSS Vulnerability on Public Server Applica@on Context: SA- NetworkProtecKon (the ES Security Domain for Vulnerabilies) Search: tag=vulnerability cvss_base_score>6 dest_ip="192.168.3.5 > NOTE: There is a guided mode to create the search, and it helps a lot! Cron Schedule: 0 * * * * > NOTE: Cron format is slightly crypkc. The style is: minute hour day month day- of- week So, 0 * * * * is every hour. The "0" means at the top of the hour. The asterisk in the hour field means every single hour. In other words, every hour, on the hour. Notable Event: Check the box (new fields appear) Title: CVSS $cvss_base_score$ Vulnerability on $dest_ip$ Descrip@on: A vulnerability scan of the public Web server $dest_ip$ reported a CVSS $cvss_base_score$ vulnerability: $signature $ Security Domain: Network Severity: high Default Owner: Whoever the responsible person is Default Status: New 37

The Vulnerability Data Model

Data Model Overview A data model in Splunk is a hierarchically structured, search- Kme mapping of semankc knowledge about one or more datasets that encode the domain knowledge necessary to generate specialized searches of those datasets. Splunk Enterprise uses these specialized searches to generate reports for Pivot users. They enable users of Pivot to realize compelling reports and dashboards without having to write the searches that generate them. Data models are typically designed by Splunk Enterprise knowledge managers who understand the format and semankcs of their data and the manner in which their Pivot users expect to work with that data. Data models are constructed in the Data Model Editor. They are composed of hierarchies of data model objects. They can use data model accelerakon to improve the speed of the searches that drive the generakon of Pivot tables and charts. 39

The Vulnerability Data Model 40

The Vulnerability Data Model 41

42

Copyright 2014 Splunk Inc. THANK YOU beaker@splunk.com