incidentresponse*using* …...key*takeaway** splunk*enterprise*can*keep*your*name*outof*the*papers*...

41
Copyright © 2013 Splunk Inc. Bert Hayes Solu=ons Engineer [email protected] #splunkconf Incident Response Using Splunk for State and Local Governments

Upload: others

Post on 31-Mar-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

Copyright  ©  2013  Splunk  Inc.  

Bert  Hayes  Solu=ons  Engineer  [email protected]  #splunkconf  

Incident  Response  Using  Splunk  for  State  and  Local  Governments  

Page 2: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

Legal  No=ces  During  the  course  of  this  presenta=on,  we  may  make  forward-­‐looking  statements  regarding  future  events  or  the  expected  performance  of  the  company.  We  cau=on  you  that  such  statements  reflect  our  current  expecta=ons  and  es=mates  based  on  factors  currently  known  to  us  and  that  actual  events  or  results  could  differ  materially.  For  important  factors  that  may  cause  actual  results  to  differ  from  those  contained  in  our  forward-­‐looking  statements,  please  review  our  filings  with  the  SEC.    The  forward-­‐looking  statements  made  in  this  presenta=on  are  being  made  as  of  the  =me  and  date  of  its  live  presenta=on.    If  reviewed  aVer  its  live  presenta=on,  this  presenta=on  may  not  contain  current  or  accurate  informa=on.      We  do  not  assume  any  obliga=on  to  update  any  forward-­‐looking  statements  we  may  make.    In  addi=on,  any  informa=on  about  our  roadmap  outlines  our  general  product  direc=on  and  is  subject  to  change  at  any  =me  without  no=ce.    It  is  for  informa=onal  purposes  only  and  shall  not,  be  incorporated  into  any  contract  or  other  commitment.    Splunk  undertakes  no  obliga=on  either  to  develop  the  features  or  func=onality  described  or  to  include  any  such  feature  or  func=onality  in  a  future  release.  

 

Splunk,  Splunk>,  Splunk  Storm,  Listen  to  Your  Data,  SPL  and  The  Engine  for  Machine  Data  are  trademarks  and  registered  trademarks  of  Splunk  Inc.  in  the  United  States  and  other  countries.  All  other  brand  names,  product  names,  or  trademarks  belong  to  their  respecCve  

owners.    

©2013  Splunk  Inc.  All  rights  reserved.  

2  

Page 3: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

Introduc=on  

Page 4: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

About  Bert  

!   15  years  experience  in  Systems  Administra=on  &  Network  Security  !   10  years  experience  in  IT  security  for  Texas  state  government  

–  Texas  Educa=on  Agency  –  University  of  Texas  at  Aus=n  –  Department  of  Informa=on  Resources  –  Texas  Higher  Educa=on  Coordina=ng  Board  

!   5  years  experience  using  Splunk  for  IT  security  

4  

Page 5: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

Agenda  

!   Incident  Handling  at  State.gov  !   Must-­‐Have  Data  Sources  for  Basic  Incident  Handling  !   Post-­‐Incident  Data  Collec=on  !   Crea=ng  a  Timeline  of  File  System  Meta  Data  !   Did  10e9_SSNs.csv  Leak  Out?  !   Sharing  with  Others    

5  

Page 6: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

Incident  Handling  at  State.gov  

Page 7: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

Incident  Handling  at  State.gov  !   Increased  likelihood  of  storing  sensi=ve  data  !   Typically  limited  resources  !   Legisla=ve  mandates  to  report  security  breaches  !   Internal  agency  to  agency  or  state  to  state  informa=on  sharing  

7  

Page 8: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

“We  discovered,  inves=gated  and  closed  an  open  invita=on  to  aeackers  in  less  than  a  few  hours.  Without  Splunk  Enterprise,  we  would  not  have  known  the  device  was  

compromised  for  weeks,  at  best.”  Kim  Munoz  

IT  Manager  Nevada  DOT  

8  

Page 9: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

“Splunk  has  been  a  tremendous  help  to  the  Informa=on  Security  Office  at  ERS.    We  now  have  the  visibility  to  research  malware  from  the  actual  point  of  entry  and  we  can  actually  see  when  the  user  clicks  on  the  

malicious  link.    It’s  been  a  great  asset  in  incident  response.”  Victoriano  Casas  III,  MPA  CISSP  GSLC  GSEC  

Informa=on  Security  Officer  Employee  Re=rement  System  of  Texas  

9  

Page 10: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

Covering  the  Bases:  Pre-­‐Incident  Data  Collec=on  

Page 11: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

Pre-­‐Incident  Data  Collec=on  

!   Firewall  logs  !   HTTP  proxy  logs  !   DNS  server  logs  !   DHCP  server  logs  !   Network  flow  data  !   Extra  credit  for  IDS/IPS  logs  

Collect  This  Now  and  Always  

11  

Page 12: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

Firewall  Logs  

!   Sudden  increase  in  outbound  DENY  events  !   Sudden  increase  in  inbound  DENY  events  !   Unusual  des=na=on  IPs  !   Unusual  des=na=on  ports  !   Off-­‐Site  DNS?    

You  Keep  on  Knockin’  

12  

Page 13: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

HTTP  Traffic  

!   Malicious  code  used  to  use  Internet  Relay  Chat  (IRC)  for  Command  and  Control  (C&C)  traffic  

!   Modern  malware  increasingly  using  HTTP  for  C&C  traffic  –  GET  hep://www.evil.br/zombie_checkin.php?alive=1  

!   Data  exfiltra=on  over  HTTP  –  POST  hep://www.evil.br/zombie_data.php  

 

All  Your  Webs  Are  Belong  to  Us  

13  

Page 14: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

14  

Page 15: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

DNS  Sever  Logs  

!   If  C&C  is  not  over  HTTP,  web  proxy  will  not  log  or  block  ! irc.evil.br  ! ssl.evil.br  !   DNS  itself  as  a  C&C  channel  

Places  Named  AVer  Numbers  

15  

Page 16: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

DHCP  Sever  Logs  

!   IP  addresses  are  transient  –  Track  an  incident  by  MAC  address  !   Track  host’s  presence  on  the  LAN  –  Disable  switch  ports  !   OVen  username  is  presented  and  requested  as  hostname  !   Make  sure  you’re  tracking  the  correct  IP  based  reports  over  =me  

192.168.1.100  -­‐>  CA:FE:DE:AD:BE:EF  

16  

Page 17: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

NetFlow  

! Will  record  Command  &  Control  meta  data,  regardless  of  protocol  !   Will  record  bytes  of  data  transferred  !   Use  to  determine  how  much  data  was  transferred  when,  to  whom  !   Correlate  against  other  data  sources  to  determine  incident  severity  

When  I  Get  My  Flow,  I’m  Dr.  On  The  Go  

17  

Page 18: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

Post  Incident  Data  Collec=on  

Page 19: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

Data  You’ll  Want  AVer  an  Incident  

 !   Packet  capture  !   RAM  dump  !   Hard  drive  image  !   Server  logs    

Diving  Deeper  

19  

Page 20: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

Time  Lining  File  System  Meta  Data  

Page 21: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

Crea=ng  a  Timeline  of  File  System  Meta  Data  

log2%meline  

hep://kleinco.com.au/thoughts-­‐events/item/forensic-­‐=meline-­‐splunking  

21  

Page 22: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

The  Tools  The  Sleuth  Kit  •  Open  source  digital  forensic  tools  •  hep://www.sleuthkit.org/  •  Wrieen  by  Brian  Carrier  •  hep://www.digital-­‐evidence.org/fsfa/  •  Command  line  tools  •  hep://wiki.sleuthkit.org/index.php?

=tle=TSK_Tool_Overview  

Timescanner  •  Front  end  for  log2=meline  •  Wrieen  by  Kris=nn  Gudjonsson  

Screenshot  here  

22  

Page 23: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

Crea=ng  the  Super  Timeline  

23  

Page 24: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

props.conf  

24  

Page 25: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

transforms.conf  

25  

Page 26: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

26  

Page 27: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

Did  10e9_SSNs.csv  Leak  Out?  

Page 28: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

Sensi=ve  Data  is  in  Known  Loca=on  !   Searching  for  post-­‐incident  file  access  is  now  trivial  

28  

Page 29: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

Sensi=ve  Data  is  in  Unknown  Loca=on  !   Locate  it!  !   Use  SENF!    The  Sensi=ve  Number  Finder  ! heps://senf.security.utexas.edu  !   It’s  free!    

29  

Page 30: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

30  

Page 31: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

How  Severe  is  the  Incident?  

!   Was  sensi=ve  data  accessed?  !   Correlate  file  access  =mes  with  network  flow,  other  logs  !   Evidence  that  aeack  has  spread?  !   Correlate  server  logs  with  network  flow  !   No  sensi=ve  data  access?    No  spread  of  aeack?    BORING  REPORT!  

 

31  

Page 32: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

Sharing  with  Others  

Page 33: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

Sharing  with  Others  

!   Many  state  and  local  governments  have  Informa=on  Sharing  and  Analysis  Centers  (ISAC)  

!   Inter-­‐agency  informa=on  sharing  is  common  !   Collect  key  elements  of  forensic  inves=ga=on  into  new  index  

–  Use  the  “collect”  command  

!   Export  key  elements  of  forensic  inves=ga=on  as  raw  data  

33  

Page 34: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

34  

Page 35: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

35  

Page 36: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

Summary    Splunk  Enterprise  is  the  Best  Tool  You  Already  Have  for  Incident  Handling  •  Begin  with  established  logging  and  

indexing  data  from  network  devices  and  network  services  

•  Add  system  forensic  =meline  and  op=onally  packet  capture  analysis  post-­‐incident  

•  Resul=ng  data  set  can  show  if  and  when  sensi=ve  data  was  accessed  correlated  with  network  ac=vity  to  determine  if  data  was  likely  to  leak  

Screenshot  here  

36  

Page 37: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

Key  Takeaway    Splunk  Enterprise  Can  Keep  Your  Name  Out  of  the  Papers  

Incident  handling:  state  &  local  gov  

•  Higher  likelihood  of  sensi=ve  personal  informa=on  

•  Need  to  determine  how  incident    is  reported  

•  Public  en==es  leaking  sensi=ve  data  makes  BIG  HEADLINES  

•  More  informa=on  sharing  within  and  between  agencies  

Incident  handling  anywhere  

•  Need  to  log  and  monitor  network  devices  and  network  services  

•  Need  to  determine  root  cause    of  incident  

•  Need  to  determine  extent    of  incident  

37  

Page 38: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

Demo  

38  

Page 39: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

Q  &  A  

39  

Page 40: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

Next  Steps  

Download  the  .conf2013  Mobile  App  If  not  iPhone,  iPad  or  Android,  use  the  Web  App    

Take  the  survey  &  WIN  A  PASS  FOR  .CONF2014…  Or  one  of  these  bags!    Check  other  “Security”  sessions  All  PPTs  are  on  the  Mobile  App  Recordings  will  be  available  aVer  .conf2013  

1  

2  

3  

40  

Page 41: IncidentResponse*Using* …...Key*Takeaway** Splunk*Enterprise*Can*Keep*Your*Name*Outof*the*Papers* Incidenthandling:*state*&*local* gov* • Higher*likelihood*of*sensi=ve* personal*informaon

THANK  YOU