Evaluating, choosing and implementing a SIEM solution
Dan Han, Virginia Commonwealth University
Evaluating, choosing and implementing a SIEM solution Dan Han , - - PowerPoint PPT Presentation
Evaluating, choosing and implementing a SIEM solution Dan Han , Virginia Commonwealth University A little about me Worked in IT for about 15 years Worked in Application Development, Desktop Support, Server Management, Infrastructure
Dan Han, Virginia Commonwealth University
Management, Infrastructure Management and Security
some minimal background in Financial institutions.
back and relax
needed to manage security
IT environment
systems
understand the threat landscape
NetFlow and log data and present it in a meaningful manner
Servers, Security Appliances (IDS / IPS, etc), AD, and NetFlow.
that meet certain severity.
incident and forensics analysis.
alert to nitty-gritty details
/ security device logs.
correlated offenses per week
exceed well over 10,000 events per second
with MSSP
and system administration
monitor? Determine the scope of surveillance
for the appropriate capacity
Minute cost for NetFlow, and EPS cost for log events, etc.
“Actionable incident”
categorization, incident type, and other risk factors
incidents
such as help desk and network operation centers
from the SIEM.
collect logs from any of your log sources
architecture
devices to SIEM and any other collection devices
g18
Slide 33 g18
> > etc... LOGS ARE NOT ENOUGH
> > If your SIEM can't correlate flow data with log data, you still don't have the full picture. > > > Some SIEM vendors will claim to support flow data. But not all of them can correlate it with event data. Be careful here.
> > This may be the only way you have to know where the attacker went after an initial compromise. > > It may also be the only way to show that data didn't leave the building.
gnpadmin, 9/24/2012
you collect, compare your data with industry statistics, determine patterns that are hidden within the data
threat landscape
tune and manage a small to medium SIEM implementation
the SIEM
and handling procedures for SIEM events
and incidents
SIEM appliance
with great responsibility, and due diligence must be paired with due care