An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011



Similar documents
An Introduction to RSA envision The Information Log Management Platform for Security and Compliance Success. September, 2009

Eoin Thornton Senior Security Architect Zinopy Security Ltd.

Enabling Security Operations with RSA envision. August, 2009

Security Information and Event Management Introduction to envision: The Information Management Platform for Security and Compliance Operations Success

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

LogInspect 5 Product Features Robust. Dynamic. Unparalleled.

LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled.

CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics

RSA Solution Brief. Platform. The RSA envision. A Single, Integrated 3-in-1 Log Management Solution. RSA Solution Brief

RSA Solution Brief. RSA envision. Platform. Compliance and Security Information Management. RSA Solution Brief

RSA SIEM and DLP Infrastructure and Information Monitoring in One Solution

Ecom Infotech. Page 1 of 6

QRadar SIEM 6.3 Datasheet

Tech Brief. Choosing the Right Log Management Product. By Michael Pastore

Discover & Investigate Advanced Threats. OVERVIEW

Protection & Compliance are you capturing what s going on? Alistair Holmes. Senior Systems Consultant

How To Buy Nitro Security

Running the SANS Top 5 Essential Log Reports with Activeworx Security Center

TRIPWIRE NERC SOLUTION SUITE

Clavister InSight TM. Protecting Values

White Paper: Meeting and Exceeding GSI/GCSx Information Security Monitoring Requirements

Detect & Investigate Threats. OVERVIEW

NitroView Enterprise Security Manager (ESM), Enterprise Log Manager (ELM), & Receivers

Scalability in Log Management

whitepaper Ten Essential Steps for Achieving Continuous Compliance: A Complete Strategy for Compliance

HP and netforensics Security Information Management solutions. Business blueprint

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring

SecureVue Product Brochure

whitepaper The Benefits of Integrating File Integrity Monitoring with SIEM

IT Security & Compliance. On Time. On Budget. On Demand.

End-to-end Solutions to Enable Log Management Best Practices

Redefining SIEM to Real Time Security Intelligence

Current IBAT Endorsed Services

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

Netwrix Auditor. Сomplete visibility into who changed what, when and where and who has access to what across the entire IT infrastructure

Caretower s SIEM Managed Security Services

Peter Dulay, CISSP Senior Architect, Security BU

Enterprise Security Solutions

How To Manage Security On A Networked Computer System

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

How To Manage Log Management

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

The Firewall Audit Checklist Six Best Practices for Simplifying Firewall Compliance and Risk Mitigation

IBM Tivoli Compliance Insight Manager

Compliance Management, made easy

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

NEC Managed Security Services

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

The SIEM Evaluator s Guide

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

AlienVault for Regulatory Compliance

Product white paper. ROI and SIEM. How the RSA envision platform delivers an Industry-leading ROI

Boosting enterprise security with integrated log management

QRadar SIEM and FireEye MPS Integration

Security Information Lifecycle

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

The Comprehensive Guide to PCI Security Standards Compliance

Continuous Network Monitoring

Total Protection for Compliance: Unified IT Policy Auditing

SANS Top 20 Critical Controls for Effective Cyber Defense

Cisco Advanced Services for Network Security

Information Technology Policy

Meeting PCI Data Security Standards with

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

Compliance Guide: PCI DSS

LogRhythm and PCI Compliance

Q1 Labs Corporate Overview

Log Management How to Develop the Right Strategy for Business and Compliance. Log Management

Security Controls What Works. Southside Virginia Community College: Security Awareness

Demonstrating the ROI for SIEM: Tales from the Trenches

Security management solutions White paper. Extend business reach with a robust security infrastructure.

Best Practices in File Integrity Monitoring. Ed Jowett, CISSP ITIL Practitioner Sr. Systems Engineer, Tripwire Inc.

How To Achieve Pca Compliance With Redhat Enterprise Linux

LogRhythm and NERC CIP Compliance

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

White Paper. PCI Guidance: Microsoft Windows Logging

syslog-ng Product Line

Juniper Security Threat Response Manager (STRM) Mikko Kuljukka COMPUTERLINKS Oy

CorreLog Alignment to PCI Security Standards Compliance

DEMONSTRATING THE ROI FOR SIEM

How to Define SIEM Strategy, Management and Success in the Enterprise

Security Operations Metrics Definitions for Management and Operations Teams

<Insert Picture Here> Oracle Database Security Overview

CorreLog: Mature SIEM Solution on Day One Paul Gozaloff, CISSP. Presentation for SC Congress esymposium CorreLog, Inc. Tuesday, August 5, 2014

ARS v2.0. Solution Brief. ARS v2.0. EventTracker Enterprise v7.x. Publication Date: July 22, 2014

Welcome to Modulo Risk Manager Next Generation. Solutions for GRC

Security Information & Event Management (SIEM)

Log management & SIEM: QRadar Security Intelligence Platform

Transcription:

An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011 Brian McLean, CISSP Sr Technology Consultant, RSA

Changing Threats and More Demanding Regulations External attacks Malicious insiders taking financial info Data Center R&D Careless users leaking IP Costly audit requirements Executive Financial DMZ Ever-changing business requirements New Web 2.0 and P2P technologies

IT Staff Feels the Pressure Security team lacks visibility into the IT environment. Overwhelming to process raw log and event volume. Compliance is costly and resource-intensive. Real-time security posture is difficult to understand.

Issues and Needs Security team cannot see into the IT environment. Non-intrusive log collection to access all event sources. Overwhelming to process raw log and event volume. Complete information lifecycle management process. Real-time security posture is difficult to understand. Real-time risk-based prioritization of events. Compliance is timeconsuming. Compliance reports in minutes not weeks.

RSA envision 3-in-1 SIEM Platform Simplifying Compliance Enhancing Security Optimizing IT & Network Operations Compliance reports for regulations and internal policy Real-time security alerting and analysis IT monitoring across the infrastructure Reporting Auditing Forensics Alert / correlation Network baseline Visibility Purpose-built database (IPDB) RSA envision Log Management platform security devices network devices applications / databases servers storage

Simplifying Compliance Robust Alerting & Reporting 1400 reports+ included out of the box Easily customizable Grouped according to standards, e.g. National Laws (SOX, Basel II, JSOX), Industry Regulations (PCI), Best Practices & Standards (ISO 27002, ITIL)

Enhancing Security Support the 3 key aspects of Security Operations Turn real time events, e.g. threats, into actionable data Create a closedloop incident handling gprocess Report on the effectiveness of security management SIEM technology provides real-time event management and historical analysis of security data from a wide set of heterogeneous sources. This technology is used to filter incident information into data that can be acted on for the purposes of incident response and forensic analysis. Mark Nicolette, Gartner

Optimizing IT & Network Operations Identify anomalies, ease troubleshooting EMC Celerra System Shutdown System Failure

Benefits Turns raw log data into actionable information Increases visibility into security, compliance and operational issues Saves time through compliance reporting Streamlines the security incident handling process Lowers operational costs

Why envision? Any Data - Any Scale Collection of any type of log data, real-time correlation, and best-in-breed scalability Lowest TCO SIEM solution Lowest TCO SIEM solution Appliance form factor, agentless architecture Flexible but simple customization Most Complete Security Knowledge Comprehensive combination of event sources, correlation rules and reports Frequent updates to security knowledgebase Broad partner eco-system of strategic technology partners plus front-line security and compliance expertise Proven Solution with a large and active install base Unparalleled installed base of more than 1600 production customers Active online customer Intelligence Community for shared best practices and knowledge All from EMC/RSA Single strategic vendor with strong balance sheet Simplified IT operations, single point of contact, and global customer support Integration with RSA and EMC solutions (e.g. Access Manager, Authentication Manager, Voyence, Celerra, Symmetrix)

Simplifying Compliance

Compliance challenges Historically compliance processes involved dedicated resources performing multiple tasks, manually and repetitively The process for Data collection was long and laborious Valuable Data was often missed or not included Analysis and reporting was expensive and slow, and involved multiple log collection and analysis tools Companies struggle to keep pace with understanding and complying to relevant laws and regulations

A multitude of Laws/ Rules/ Regulations to which an organization must comply PCI DSS HIPAA Internal Policy GLBA HSPD 12 CSB 1386 FISMA Country Privacy Laws COCOM SOX EU CDR UK RIPA Data Security Act FACTA EU Data Privacy FFIEC BASEL II J-SOX IRS 97-22 NERC NISPOM Partner Rules ACSI 33 NIST 800 State Privacy Laws

Automated Analysis for Simplifying the Compliance Lifecycle RSA envision automatically sorts event log data into information categories required for adhering to compliance requirements: Access Control Configuration Control Malicious Code Detection User Monitoring and Management Policy Enforcement Environmental & Transmission Security

Event Taxonomy All 120,000+ distinct messages have been classified Hierarchical structure, 10 top level l categories, 250 total categories Open, Extensible architecture Administrators can add their own messages and categories Reports using these categories will automatically be updated as new devices and dd d Example: User Taxonomy Categories User.Activity User.Activity.Failed Logins User.Activity.File Access User.Activity.Known Bad Commands User.Activity.Login User.Activity.Login.Workstation Unlock User.Activity.Logoff User.Activity.Logoff.Workstation Lock User.Activity.Normal Activity User.Activity.Privileged Use.Denied User.Activity.Privileged Use.Successful User.Management User.Management.Groups.Additions User.Management.Groups.Deletions User.Management.Groups.Modifications User.Management.Groups.Modifications.User Added User.Management.Groups.Modifications.User Removed User.Management.Password.Expriation User.Management.Password.Modification User.Management.Password.Modification.Failed User.Management.Permissions User.Management.Users.Additions User.Management.Users.Deletions User.Management.Users.Disabled User.Management.Users.Modifications

RSA envision and the Compliance Lifecycle : The information gathered by RSA envision can be used dto help an organization understand d If it is compliant with regulations and laws What it needs to do to become compliant To show/ prove that t it is compliant to auditors To provide evidence on compliance that can be used in a court of law

Enhancing Security Operations

Agenda Detecting High-Risk Incidents Streamlining the Incident Handling Process M i th V l f Measuring the Value of Security Operations

Real Time Incident Detection Finding Incidents in a Mountain of Data Billions of raw events Thousands of security-relevant events Correlated alerts Incidents!!! Dozens of high priority events

Real Time Incident Detection Comprehensive Log Data RSA envision collects all log data from almost any third party device Asset Context RSA envision allows import of data about IT assets from asset management systems What Do I Need to Detect? Suspicious User Activity High Risk Vulnerabilities and Threats Suspicious Network Activity Description Unusual authentication or access control issues, like multiple failed logons, or unauthorized system accesses Detect new high risk vulnerabilities on critical assets, or likely attacks on vulnerable hosts Unusual deviations in network behavior, or network activity that violates policy

Real Time Incident Detection Correlation rules, filters and watchlists thlit RSA envision provides ability to define correlation rules, watchlists of dynamic information Timely threat information RSA envision provides regular updates of vulnerabilities, IDS signatures, event knowledge and correlation rules CRL-00011 Comprehensive correlation rules delivered out-of-the-box Several Failed Logins Followed By A Successful Login / Possible Successful Brute Force Attack Detected Detailed library of background information

Use Case: Vulnerable Server Attacked Attacker Attack IDS VA Scanner Configuration Management Database Knows it s being attacked Knows it s vulnerable Knows it s critical RSA envision Analyst Knows a critical, vulnerable server is being attacked Alert

Agenda Detecting High-Risk Incidents Streamlining the Incident Handling Process M i th V l f Measuring the Value of Security Operations

Monitoring and Management Key Metrics & Dashboards Network Activity by Category IDS Top Threats Incident rate Most Vulnerable Assets by Severity

Summary Benefits Reduced risk Highest priority issues identified Most vulnerable assets highlighted Increased analyst productivity Streamlined incident management process Improved management visibility ibilit Focus staff on highest risk areas Fully auditable process for compliance reporting

Optimizing IT and Network Operations

How SIEM helps IT & Network Managers The analysis of event logs from the network helps IT and Network Operations managers: Optimize network performance by identifying issues and faulty equipment Assist IT managers with Helpdesk Operations by: helping reveal what is going on in the network. providing global views of all network activity alerting them to network problems automatically providing them with customised Dashboards of essential information Gain visibility into specific behavioral aspects of individuals or groups of users Let s look at these in more detail 27

Identifying Issues & Optimizing Network Performance Performance management Log events contain information on utilization and error conditions Example: Disk space running low, high bandwidth utilization Fault management Use alerts to Highlight potential network problems when deviations from standard baseline activity occur Integration with IT operations systems (e.g. EMC SMARTS) helps enable detection and response to faults Example: Read/Write failures, power spikes, fan failure Generate Alerts if observed activity stops on any important asset (device or application may be down) 28

Assisting Helpdesk Operations RSA envision provides helpdesk operations with a clearer view of what events are taking place in the network: That affect users That affect hardware/ software That affects business systems Example use cases include: Creating automated reports that provide activity reports on chosen assets Generating reports on activity relating to specific IP addresses Using Event Explorer to analyze historical data relating to incidents cde Alerting on detection of virus activity within network 29

Assisting Helpdesk Operations to investigate user problems 30 The IT/ Network manager can run a variety of reports, each focusing on a specific question that t may need to be investigated Example Use Case: IT Operations in multi-national organization spent 3 days trying to establish why an executive could not log onto the network User had logged off, changed his password, could not log back on Several IT staff looked at this problem for 3 days Eventually they ran a report on RSA envision looking at all logs for user globally over past 6 months Within 15 minutes, established that manager had travelled to Singapore, had logged onto the network but had NOT logged off IT support logged user off network in Singapore and user could now log back onto the network with new password!

Building more complex alerts: Correlated Alerts Correlated Alerts enable IT & Operations staff to build more complex, customized alerts that t fire only upon a sequence of activity occurring. Enables IT & Operations staff to Focus only on important issues Rationalize resources Be creative in alerting X Y If x and y then fire alert. Generate An ALERT! 31

Summary: How SIEM helps IT & Network Managers Can be used to Optimize network performance by identifying i issues and faulty equipment Troubleshooting network problems Assist IT managers with Helpdesk Operations by: helping reveal what is going on in the network. providing global views of all network activity alerting them to network problems automatically providing them with customized Dashboards of essential information providing a tool for detailed forensic work Gives IT & Network Operations visibility into specific behavioural aspects of individuals or groups of users 32

RSA envision Stand-alone Appliances to Distributed Solutions 300,000 30000 EPS LS Series 10000 7500 5000 ES Series 2500 1000 500 # DEVICES 100 200 400 750 1250 1500 2048 30,000

RSA envision Deployment Scales from a single appliance. Baseline Correlated Report Realtime Interactive Integrated Incident Alerts Forensics Analysis Query Mgmt. Event Explorer Analyze Manage Collect Collect Collect UDS Windows Server Netscreen Firewall Cisco IPS Juniper IDP Microsoft ISS Trend Micro Antivirus Device Device RSA envision Supported Devices Legacy