security operation center
play

Security Operation Center Concepts and Implementation - PDF document

Security Operation Center Concepts and Implementation renaud.bidou@intexxia.com > SOC Modules > Global Architecture > Collection & Storage > Correlation > SOC Modules R Box R Box reaction and reporting + A Box K Box A Box


  1. Security Operation Center Concepts and Implementation renaud.bidou@intexxia.com > SOC Modules > Global Architecture > Collection & Storage > Correlation

  2. > SOC Modules R Box R Box reaction and reporting + A Box K Box A Box K Box incident analysis knowledge base D Box D Box formated messages database C Boxes C Box C Box collection boxes E Boxes E Box E Box E Box E Box E Box event generators : sensors & pollers > SOC Modules > E Boxes - event generation - passive : sensors - active : pollers > Sensors - IDS, filtering eq., syslog, apps, honeypots … - running in hostile environment - lack of standard for host-based sensors > Pollers - third-party tool - status evaluation - may encounter performance problems

  3. > SOC Modules > C & D Boxes - event collection & storage - standard formating > Collection - set of multi-protocol / application agents - lack of standard format - availability and performance concerns > Storage - duplicates merging - performance concerns with huge volume of events > SOC Modules > A & K Boxes - multi-level analysis - intrusion scenarii - system status > Analysis & Correlation - heavy research focus - proof of concept implementation - proprietary technologies > Knowledge Base - vulnerabilities & intrusion scenarii - system security status - security policy

  4. > SOC Modules > R Boxes - reaction & reporting - operators interfaces - end-user interfaces > Interfaces - subjectivity - relies on best-practices and experience return - MANDATORY > Global Architecture Real-time Permanent Risk Evaluation Monitoring Statistical Security Activity Analysis Incident System Status Handling R' Box (SOC Console) R'' Box (Customer Portal) Distributed Architecure Vulnerability Alerts Database Stats Correlation Customer Messages Analysis Status A Box D Box (Local events database) Security Policy (Correlation Engine) Client Configuration Record Windows 2k / XP Linux K Box (Knowledge Base) Apache D syslog I Distributed Architecure IIS S SNMP Oracle P Events SMTP Host based IDS A Firewall-1 T HTTP / XML OS Cisco Pix C Proprietary H Integrity Checking Snort E ......... Network equipment ISS R Network IDS Tripwire Client System Status Firewall alerts Polling Integrity Modelisation ......... Applications ......... C Box (Collection & Formating Modules) Monitored System E Box (Event Generators)

  5. > Global Architecture > Data acquisition - technical inventory - security policy review > Technical reviews - intrusive & non-intrusive data acquisition techniques - need for attack taxonomy and classification - relative vulnerability impact > Organizational reviews - acceptable behavior definition - access rights - permitted operations > Global Architecture > Status Evaluation - vulnerabilities definition - security level evaluation - permanent audit > Vulnerability database - structural vulnerabilities - functional vulnerabilities - topology-based vulnerabilities > Permanent security evaluation - attack trees generation - new evaluation performed when KB updated - history management

  6. > Global Architecture > Events management - generation - collection - formating & storage > Exhaustivity vs. performance - events overload - structural & policy pre-filter - difficulty to manage distributed filters > Collection and storage - protocol agents - source type identification - message formatting > Global Architecture > Analysis & reporting - event correlation - operational reporting - strategic reporting > Alerts - structural and behavior alert generation - criticity handling - statistical analysis > Interfaces - operators consoles - debugging consoles - end-user portal

  7. > Collection & Storage > Data collection - heterogeneous sources - scalable architecture > Protocol agents - server-side agents dedicated to one protocol - multiple forwarding channels support - no shared data = easy clustering / farming > Reliability & security - TCP encapsulation - collection channel encryption > Collection & Storage > Data collection - source sensor identification - « standard » formatting > Dispatcher - pattern-based analysis - forwarding to dedicated application agent - multiple listening and forwarding channels support > Application agents - dedicated to specific (sensor, Xmit protocol) - message formating - may be merged with dispatcher

  8. > Collection & Storage > Sample architectures E Box E Box E Box Events Encryption Unsecure Network E Box E Box E Box Decryption Events HA & LB protocol protocol protocol agent agent agent socket socket socket protocol protocol protocol agent agent agent HA & LB mqueue mqueue mqueue dispatcher dispatcher dispatcher sockets sockets mqueue mqueue mqueue HA & LB application application application agent agent agent application application application agent agent agent > Collection & Storage > Host Entry - unique host identification > Identification Host Table Host Token - by IP @Host_IP_Table @Host_FQDN_Table - by FQDN - unique host token Host IP Table Host IP Table > Needed to support ID ID IP Address FQDN - multihoming - NAT & Virtual IP - virtual servers

  9. > Collection & Storage > Messages format - basic message formatting - correlation ready Field Attributes Description id Unique Unique message ID sensor_id Not Null Unique Sensor ID msg_type Not Null Type of message (ipchains, snort-1.8.x-alert etc.) epoch_time Not Null Date in epoch format of event generation source Intrusion Source Host Token target Intrusion Target Host Token proto Protocol number src_port Intrusion source port number tgt_port Intrusion target port number info Additional info int_type_id Not Null Intrusion type ID (Filter, Access etc.) int_id Intrusion ID message Not Null Original message > Collection & Storage > 3 rd Party info - additional information > Sensor & Sensor Type tables - sensor identification > Message Type table - human readable message type description > Intrusion & Intrusion Type tables - intrusion identification - matches between different references

  10. > Correlation > Overview Alert Stats Date / Time / Source Behavior Match Security Policy Analysis - duplicate identification - sequence pattern matching System - time pattern matching Exposure System Status Functional - system exposure & criticity Analysis Intrusion Path - security policy matching Message Structural Analysis Vulnerability Analysis Database www.cust1.com hack1.com hack1.com www.cust1.com hack2.com mail.cust1.com mail.cust1.com hack2.com Contexts hack1.com www.cust1.com hack3.com www.cust2.com www.cust2.com hack3.com hack3.com mail.cust1.com hack2.com www.cust2.com Dispatch Formated messages > Correlation > Contexts - event grouping - correlation preparation > Definition - container of formatted data matching common criteria - multiple level of contexts may be created > Main context tree - source (target) token - target (source) token - target proto.port - intrusion type ID - intrusion ID

  11. > Correlation > Contexts - functional architecture Array of source contexts Source Host Token Target Target Target Target Target Target Target Target Target Target Target Target Host Token Host Token Host Token Host Token Host Token Host Token Host Token Host Token Host Token Host Token Host Token Host Token Target Target Target Target Target Target Target Target Target proto.port proto.port proto.port proto.port proto.port proto.port proto.port proto.port proto.port Int. Type Int. Type Int. Type Int. Type Int. Type Int. Type Int. Type Int. Type Int. Type Int. Type Int. Type Int. Type ID ID ID ID ID ID ID ID ID ID ID ID Int. Type Int. Type Int. Type Int. Type Int. Type Int. Type Int. Type Int. Type Int. Type Int. Type Intrusion Intrusion Intrusion Intrusion Intrusion ID ID ID ID ID ID ID ID ID ID ID ID ID ID ID > Correlation > Contexts - functional architecture %AttackSources source attack hashtable address Hosts Table $AttackSources{$source} > Time target detail hashtable address start_time First reception time stop_time Last reception time ${$AttackSources{$source}}{$target} Intrusion Type Table - epoch format proto.tgt_port (protocol, target port) id start_time First reception time - start_ & stop_ defined stop_time Last reception time 0 Unknown array address 100 Filtered array address at each level 530 Integrity array address > Intrusion type ID ${{$AttackSources{$source}}{$target}}[$int_type] attack_info_id attack info hashtable address start_time First reception time - arbitrary definition stop_time Last reception time ${{{$AttackSources{$source}}{$target}}[$int_type]}[attack_info_id] Intrusion Type Table - linked to definition ID intrusion_id Intrusion id duplicate Duplicate info start_time First reception time stop_time Last reception time

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend