security information & event management (siem) · infopercept siem implementation and soc...

26
Infopercept SIEM Implementation and SOC Approach Page 1 Security Information & Event Management (SIEM) Technical Approach

Upload: others

Post on 25-Jun-2020

8 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Security Information & Event Management (SIEM) · Infopercept SIEM Implementation and SOC Approach Page 7 Vision for Security Operation Center To provide business responsiveness,

Infopercept SIEM Implementation and SOC Approach

Page 1

Security Information

& Event Management

(SIEM)

Technical Approach

Page 2: Security Information & Event Management (SIEM) · Infopercept SIEM Implementation and SOC Approach Page 7 Vision for Security Operation Center To provide business responsiveness,

Infopercept SIEM Implementation and SOC Approach

Page 2

CONTENTS

Section Page No.

1. Introduction 3

2. Infopercept Vision on Security Operation Center 6

3. Need for SIEM Deployment 8

4. How Infopercept Builds SOC 11

5. Infopercept Delivery Model 14

6. Features and Value Proposition 16

7. High Level Implementation Approach 26

Page 3: Security Information & Event Management (SIEM) · Infopercept SIEM Implementation and SOC Approach Page 7 Vision for Security Operation Center To provide business responsiveness,

Infopercept SIEM Implementation and SOC Approach

Page 3

1. INTRODUCTION

Page 4: Security Information & Event Management (SIEM) · Infopercept SIEM Implementation and SOC Approach Page 7 Vision for Security Operation Center To provide business responsiveness,

Infopercept SIEM Implementation and SOC Approach

Page 4

It is a Unsafe Cyber world..

Global in minutes due to Cyberspace

Human systems can no longer react

FACT!!!! 99.9% secure = 100% Vulnerable!

Page 5: Security Information & Event Management (SIEM) · Infopercept SIEM Implementation and SOC Approach Page 7 Vision for Security Operation Center To provide business responsiveness,

Infopercept SIEM Implementation and SOC Approach

Page 5

5

2006

2010

2016

Physical IT Service

VirtualizedIT Service

Hybrid/Clou

d Service

Complexity

Change

volume,

velocityManaged but not owned

Complexit

yChange volume,

velocity

IT Apps and Services are evolving

Page 6: Security Information & Event Management (SIEM) · Infopercept SIEM Implementation and SOC Approach Page 7 Vision for Security Operation Center To provide business responsiveness,

Infopercept SIEM Implementation and SOC Approach

Page 6

2. Infopercept Vision for Security Operation Center

Page 7: Security Information & Event Management (SIEM) · Infopercept SIEM Implementation and SOC Approach Page 7 Vision for Security Operation Center To provide business responsiveness,

Infopercept SIEM Implementation and SOC Approach

Page 7

Vision for

Security

Operation

Center

To provide business responsiveness, quality and costadvantages to customers’ IT Security operations to Globalcustomers, through proven best practices and managementsolution globally accepted….

Page 8: Security Information & Event Management (SIEM) · Infopercept SIEM Implementation and SOC Approach Page 7 Vision for Security Operation Center To provide business responsiveness,

Infopercept SIEM Implementation and SOC Approach

Page 8

3. Need for SIEM Deployment

Page 9: Security Information & Event Management (SIEM) · Infopercept SIEM Implementation and SOC Approach Page 7 Vision for Security Operation Center To provide business responsiveness,

Infopercept SIEM Implementation and SOC Approach

Page 9

Why SIEM?

• Ability to Systematically Store and retrieve the logs for Compliance requirements.

• Drive collaboration between Operations Teams (NOC, SOC, Systems etc.) by providingMeaningful and Actionable information.

• Catch malicious activities delivered by exploit through Zero-Day-Attack.

• Cyber Forensic Investigations.

Page 10: Security Information & Event Management (SIEM) · Infopercept SIEM Implementation and SOC Approach Page 7 Vision for Security Operation Center To provide business responsiveness,

Infopercept SIEM Implementation and SOC Approach

Page 10

1 2 3 4

Consult

Integrate

Develop

Support• Health check Assessment

• SIEM Design and Consulting

• SIEM Solution Selection and Proof of Concept

• Data Source configuration and collection Architecture

• SIEM Implementation• SIEM Upgrade• Solution Integration

• Use-Case Development

• Content Development

• Connector Development

• Use-Case Development

• Content Development

• Connector Development

Page 11: Security Information & Event Management (SIEM) · Infopercept SIEM Implementation and SOC Approach Page 7 Vision for Security Operation Center To provide business responsiveness,

Infopercept SIEM Implementation and SOC Approach

Page 11

4. How Infopercept Builds SOC?

Page 12: Security Information & Event Management (SIEM) · Infopercept SIEM Implementation and SOC Approach Page 7 Vision for Security Operation Center To provide business responsiveness,

Infopercept SIEM Implementation and SOC Approach

Page 12

How we

build SOC?

Infopercept builds a Security Operation Center which is a

scalable and configurable suite of services to help you

monitor all your IT elements more efficiently and cost-

effectively...

Page 13: Security Information & Event Management (SIEM) · Infopercept SIEM Implementation and SOC Approach Page 7 Vision for Security Operation Center To provide business responsiveness,

Infopercept SIEM Implementation and SOC Approach

Page 13

13

Hardware & Network• Server• Storage• Desktops• Network• Printer

Software & Application• Operating Systems• Database• Applications• Email• Patch Management• Migration Services• Deployment

Value Added Services• Managed Security• Help Desk• Asset Management• Risk Assessment• Business Continuity• L1, L2, L3 Support

Elements of IT Environment

Page 14: Security Information & Event Management (SIEM) · Infopercept SIEM Implementation and SOC Approach Page 7 Vision for Security Operation Center To provide business responsiveness,

Infopercept SIEM Implementation and SOC Approach

Page 14

5. Infopercept Delivery Model

Page 15: Security Information & Event Management (SIEM) · Infopercept SIEM Implementation and SOC Approach Page 7 Vision for Security Operation Center To provide business responsiveness,

Infopercept SIEM Implementation and SOC Approach

Page 15

DMZ

Branch

INTERNET

Mot

aDat

a Se

rve

r

IPS Sensors

IPS Sensors

IPS Sensors

IPS Sensors

INFOPERCEPT Monitoring TEAM

Firewall

LAN Users

Servers

Log Collection & Analysis on Splunk

IPS Sensors Monitoring Traffic

Infopercept Remote TEAM will monitor the Splunk

Server

IPS Sensors Forward all

sensitive Logs to Splunk.

Infopercept

SOC Services

Cu

sto

me

r IT

Lan

dsc

ape

Splu

nk

Serv

er

Page 16: Security Information & Event Management (SIEM) · Infopercept SIEM Implementation and SOC Approach Page 7 Vision for Security Operation Center To provide business responsiveness,

Infopercept SIEM Implementation and SOC Approach

Page 16

6. SIEM Features and Value Proposition

Page 17: Security Information & Event Management (SIEM) · Infopercept SIEM Implementation and SOC Approach Page 7 Vision for Security Operation Center To provide business responsiveness,

Infopercept SIEM Implementation and SOC Approach

Page 17

17

Anomaly Detection• DoS• Recon • Malware• Suspicious activity• User Access & Authentication• Exploit• Network• Application• Logins & Locations• Administrative Accounts• Infected Hosts detected on

subnets

Suspicious Activity• Traffic to known vulnerable host• Logs deletion from Source• Source Stopped Logging• Various Protocol Traffic from

unauthorized host

Unauthorized Activity• User Access to confidential Data• Subnet Access to Confidential Data• Users on Network• Devices on Network• Server connection to Internet

Features of SIEM

Implementation

Page 18: Security Information & Event Management (SIEM) · Infopercept SIEM Implementation and SOC Approach Page 7 Vision for Security Operation Center To provide business responsiveness,

Infopercept SIEM Implementation and SOC Approach

Page 18

Infopercept Monitoring

› L1 Security Analyst

› L2 Security Analyst

› SOC Tech Leads

› SOC Managers

› Manage Security Solutions

Threat Connect

› Processes, analyze your data, and proactively hunt threats in one central place

› Aggregate and normalize threat data from any source

› View how often indicators are observed, how relevant they are

Splunk› Collect and Index All Log Files Monitoring

› Forwards Data From Remote Systems

› Search and Investigate Across All Logs

› Real-Time Search

0203

01

SOC Model

SOC

Page 19: Security Information & Event Management (SIEM) · Infopercept SIEM Implementation and SOC Approach Page 7 Vision for Security Operation Center To provide business responsiveness,

Infopercept SIEM Implementation and SOC Approach

Page 19

Threat Monitoring

& Intelligence

SIEM

Behavioral Monitoring

Vulnerability Assessment

❖ IDS/IPS

❖ Monitoring – Apps, DB, Antivirus, Firewall/VPN, DLPs, Antispam, Web proxy etc.

❖ File Integrity monitoring

❖ Centralized Log collection – applications/devices

❖ Event correlation

❖ Incident response

❖ Netflow Analysis (6.5)

❖ Service Availability monitoring

❖ Continuous monitoring

❖ Active scanning

Need for an IT Security

Protect Enterprise

Data

Page 20: Security Information & Event Management (SIEM) · Infopercept SIEM Implementation and SOC Approach Page 7 Vision for Security Operation Center To provide business responsiveness,

Infopercept SIEM Implementation and SOC Approach

Page 20

SIEM Systems require comparatively big investments. Organizations Management usually asks to seek value out of the tool from Information security team. The SIEM Use Cases are scenarios to detect a range of threat and deliver visibility you need to deal with it.

Understand Business

Objective

Document Problem

Statement

Define Use Cases

Generate Requirement Statements

Prioritize Objective

Identify Data Sources

Create ContentBuild Real Time

Event based Data Monitors

Rules for Advance Co-

relation

Build Variables and Event

Stream Analysis

Use Case Deployment

Page 21: Security Information & Event Management (SIEM) · Infopercept SIEM Implementation and SOC Approach Page 7 Vision for Security Operation Center To provide business responsiveness,

Infopercept SIEM Implementation and SOC Approach

Page 21

Details

Impact

Description

Recommendation

DetailsThe solution has detected traffic from <source IP / hostname> to <destination IPs> over <ports> . Information gathered would indicate the asset is infected with malware. Traffic activity is being reported by Suricata

ImpactMalware is performing a remote call back, possibly leaking data or expanding its presence in the network

Description<Detailed observations of the pattern and activity>.

RecommendationFind the source IP asset. Contain the device. If no signs of malware are found, determine the cause for the detected event and remediate. If signs of malware are found, perform the required antivirus updates and/or forensics on the machine. Remediate or clean the system prior to connecting it back on the network.

USE Case – 1 (Malware Detection)

Page 22: Security Information & Event Management (SIEM) · Infopercept SIEM Implementation and SOC Approach Page 7 Vision for Security Operation Center To provide business responsiveness,

Infopercept SIEM Implementation and SOC Approach

Page 22

Details

Impact

Description

Recommendation

DetailsThe solution has detected failed login attempt from a source to multiple destinations over multiple ports. Information gathered would indicate the asset is infected with malware or an insider is conducting malicious activities. Activities are being reported by the Intrusion Prevention System (Suricata).

ImpactA malware or an insider is trying to gain access to resources by using brute force attack.

Description<Detailed observations of the pattern and activity>.

RecommendationFind the source IP asset. Contain the device. If no signs of malware are found, determine the cause for the detected event and remediate. If signs of malware are found, perform the required antivirus updates and/or forensics on the machine. Remediate or clean the system prior to connecting it back on the network.

USE Case – 2 (Brute Force Attack Detection)

Page 23: Security Information & Event Management (SIEM) · Infopercept SIEM Implementation and SOC Approach Page 7 Vision for Security Operation Center To provide business responsiveness,

Infopercept SIEM Implementation and SOC Approach

Page 23

Details

Impact

Description

Recommendation

DetailsUser is added to a privileged access group at non working hours.

ImpactAn insider has added a new user to privileged access group to access resources which are not intended for them.

Description<Detailed observations of the pattern and activity>.

RecommendationCheck with Identity Management team to verify the authenticity of user addition to privileged access group. If its unauthorized take the remediation actions.

USE Case – 3 (Privilege Escalation)

Page 24: Security Information & Event Management (SIEM) · Infopercept SIEM Implementation and SOC Approach Page 7 Vision for Security Operation Center To provide business responsiveness,

Infopercept SIEM Implementation and SOC Approach

Page 24

Details

Impact

Description

Recommendation

DetailsIntrusion Prevention System (Suricata) has detected probes from a source on various destination which hosts business critical applications.

ImpactIt might be possible that a intentional intruder is trying to perform a network scan on random hosts for recon.

Description<Detailed observations of the pattern and activity>.

RecommendationReport to network management team to verify the incident and take remediation action

USE Case – 4 (Network Scan Detection)

Page 25: Security Information & Event Management (SIEM) · Infopercept SIEM Implementation and SOC Approach Page 7 Vision for Security Operation Center To provide business responsiveness,

Infopercept SIEM Implementation and SOC Approach

Page 25

TEAM @ Infopercept Best of Breed – Best of Exposure

Operating System

•Windows

•Solaris

•HP-UX

•AIX

•Linux

Database

•MS SQL

•MySQL

•Oracle

•Sybase

•MariaDB

Messaging

•MS Exchange

•Lotus Domino

•Zimbra

Web / App. Servers

•IIS

•Tomcat

•Apache

•WebLogic

•WebSphere

Service Tools

Network Certification

•CCNA

•CCNP

•CCIE

System Certification

•RHCE

•SCSA

•SCNA

•MCSE

•MCSD

Database Certification

•OCP

•OCA

•MCDBA

Security Certification

•CISSP

•CISA

•BS7799 Auditors

Process Certification

•ITIL

•SIX Sigma

Page 26: Security Information & Event Management (SIEM) · Infopercept SIEM Implementation and SOC Approach Page 7 Vision for Security Operation Center To provide business responsiveness,

Infopercept SIEM Implementation and SOC Approach

Page 26

Thank You!

www.Infopercept.comInfopercept Consulting Pvt Ltd

1209, Titanium City Center,Anand Nagar Road, Satellite Road,

Ahmedabad – 380 015 [email protected]