data security solutions @isaca lv chapter meeting 15.05.2013 siem based …

34
Innovations in data security SIEM based GRC Andris Soroka, Raivis Kalniņš, 15.05.2013 Together with

Upload: andris-soroka

Post on 11-Nov-2014

837 views

Category:

Technology


0 download

DESCRIPTION

World's #1 SIEM technology in GRC (Governance, Risk, Compliance). QRadar Risk Manager provides organizations with a pre-exploit solution that allows network security professionals to assess what risks exist during and after an attack, while also answering many "What if?" questions ahead of time, which can greatly improve operational efficiency and reduce network security risks.

TRANSCRIPT

Page 1: Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …

Innovations in data security

SIEM based GRC

Andris Soroka, Raivis Kalniņš,

15.05.2013

Together with

Page 2: Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …

“Data Security Solutions” brief intro

Specialization – IT Security

IT Security consulting (vulnerability assessment tests, security audit, new systems integration, HR training, technical support)

Innovative & selected software / hardware & hybrid solutions from leading technology vendors from over 10 different countries

Page 3: Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …

Prologue..

It doesn’t matter what framework and standard You are working with as an auditor

It doesn’t matter if You are internal or external auditor, CSO, CIO, technical or business person

Automated and real time «Security Intelligence» is what You need as mandatory for GRC –

Risk Assessment & ManagementIT Security Governance & ManagementControl of activities and environmentPerformance measurement and improvementBenefits from better alignment with business (costs saving, efficiency etc.)

Page 4: Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …

AgendaIntroduction

Security Information and Events Management (SIEM)

Use cases of SIEM

SIEM based Risk Management

Q&A

Page 5: Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …

Defenses in 21st Century

Around 1500 IT Security vendors for Endpoint Security

Platforms and point solutionsData Security & Encryption

DLP suites and point solutionsNetwork Security

Gateway solutionsNAC, visibility, NBAAuthentication, authorization etc.Traditional and next generation’s

Identity protectionVirtualization and cloud securityIT Security governanceOperational management & SecurityMobile Security

Page 6: Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …

Today’s reality, intro..

Network and security professionals focus tends to be on preventing bad things from happening on the network

There is aleready significant amount of spending on tools designed to prevent bad things from getting in the network

When things go bad, it is because the network and security practitioner doesn’t know what they don’t know

Page 7: Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …

User and System Activity

Runaway Application

Customer Transaction

Email BCC

Failed Logon

Security Breach

File Up/Download

Credit CardData Access

Information Leak

Privileges Assigned/Changed

50%?

Page 8: Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …

Logs, flows, maze

What logs –Audit logsTransaction logsIntrusion logsConnection logsSystem performance recordsUser activity logsBusiness systems alerts and different other systems messages

From where - Firewalls / Intrusion

prevention Routers / SwitchesIntrusion detectionServers, desktops, mainframesBusiness applicationsDatabasesAntivirus softwareVPN’s

There is no standard format, transportation method for logs, there are more than 800 log file formats used..

Page 9: Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …

Security Intelligence provides actionable and comprehensive insight for managing risks and threats from protection and detection through remediation. It could be even called as Security Mega-System.

Security Intelligence--noun 1. the real-time collection, normalization, and analytics of the

data generated by users, applications and infrastructure that impacts the IT security and risk posture of an enterprise

Page 10: Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …

Move from defense to offense mode!

Page 11: Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …

Plug & Play and Automated Intelligence

Analyze

Act

Monitor

Auto-discovery of log sources, applications and assetsAsset auto-groupingCentralized log mgmt.Automated configuration audits

Auto-tuning Auto-detect threatsThousands of pre-defined rules and role based reportsEasy-to-use event filteringAdvanced security analytics

Asset-based prioritizationAuto-update of threatsAuto-responseDirected remediation

Page 12: Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …

One Console Security

• Turnkey log management• SME to Enterprise• Upgradeable to enterprise SIEM

• Integrated log, threat, risk & compliance mgmt.• Sophisticated event analytics• Asset profiling and flow analytics• Offense management and workflow

• Predictive threat modeling & simulation• Scalable configuration monitoring and audit• Advanced threat visualization and impact analysis

• Network analytics• Behavior and anomaly detection• Fully integrated with SIEM

• Layer 7 application monitoring• Content capture• Physical and virtual environments

SIEM

Log Management

Risk Management

Network Activity & Anomaly Detection

Network and Application

Visibility

One Console Security

Built on a Single Data Architecture

Page 13: Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …

Security intelligence ..

What was the attack?

Who was responsible?

How many targets involved?

Was it successful?

Where do I find them?

Are any of them vulnerable?

How valuable are they to the business?

Where is all the evidence?

Clear & concise delivery of the most relevant information …

Page 14: Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …

Q1 in action - Malware activity

IRC on port 80?QFlow enables detection of a covert channel.

Irrefutable Botnet CommunicationLayer 7 data contains botnet command and control instructions.

Potential Botnet Detected?This is as far as traditional SIEM can go.

Page 15: Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …

Q1 in action - User activity monitoring

Authentication FailuresPerhaps a user who forgot their

password?

Brute Force Password Attack

Numerous failed login attempts against different user accounts.

Host CompromisedAll this followed by a successful login.

Automatically detected, no custom tuning required.

Page 16: Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …

Q1 in action - complex threat detection

Sounds Nasty…But how to we know this?

The evidence is a single click away.

Buffer OverflowExploit attempt seen by

Snort

Network ScanDetected by QFlow

Targeted Host Vulnerable

Detected by Nessus

Total VisibilityConvergence of Network, Event and Vulnerability data.

Page 17: Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …

Q1 in action – data loss prevention

Potential Data Loss?Who? What? Where?

Who?An internal user

What?Oracle data

Where?Gmail

Page 18: Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …

SIEM Based Risk Management

Page 19: Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …

SIEM Based Risk Management

Assessing the risks =Log management +Event management +Network activity monitoring +Configuration +

Most successful attacks are result of poor configurationConfiguration audits are expensive, labor intensive and time consumingConfig files are inconsistent accross the vendors and product / technology typesCompliance is mandatory in many industries

Vulnerability Assessment +VA scanners don’t prioritize based on network contextVulnerability prioritization is historically complex

Page 20: Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …

SIEM Based Risk Management

Page 21: Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …

SIEM Based Risk Management

Page 22: Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …

SIEM Based Risk Management

Page 23: Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …

SIEM Based Risk Management

Page 24: Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …

SIEM Based Risk Management

Page 25: Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …

SIEM Based Risk Management

Page 26: Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …

SIEM Based Risk Management

Page 27: Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …

SIEM Based Risk Management

Page 28: Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …

SIEM Based Risk Management

Page 29: Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …

SIEM Based Risk Management

SIEM is a foundation to security management in 21st Century for provides mostly the post-exploit valueRisk Manager based on SIEM gives detailed assessment of network security risk using broad risk indicators such as:

WHAT HAS HAPPENED? (from network activity data and behaviour analysis)WHAT CAN HAPPEN? (from topology and configuration)WHAT HAS BEEN ATTEPMTED? (from events and contect data)WHAT IS VULNERABLE AND AT RISK? (from scanners)

Page 30: Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …

SIEM Based Risk Management Summary

Prediction & Prevention Reaction & Remediation

IBM Security Intelligence

Simulation of incidentsError & anomaly detectionAttack path visualizationCompliance automationRisk Assessment

Continuous real time auditSingle consoleIntegrated IntelligenceVizualizationHighest level of protection

Page 31: Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …

SIEM Based Risk Management

Page 32: Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …

Security intelligence

Predict Risk

Detect InsiderFraud

ConsolidateData Silos

ExceedRegulation Mandates

Detect ThreatsOthers Miss

Page 33: Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …

IBM Security division’s vision