siem 101 workshop
play

SIEM 101 Workshop Optimize IT with Security Information and Event - PowerPoint PPT Presentation

SIEM 101 Workshop Optimize IT with Security Information and Event Management Alex Dow Chief Research Officer Mirai Security Inc. Alex.Dow@miraisecurity.com GCIH|SCF|CISSP|OPST https://www.miraisecurity.com Agenda What is SIEM? Why


  1. SIEM 101 Workshop Optimize IT with Security Information and Event Management Alex Dow Chief Research Officer – Mirai Security Inc. Alex.Dow@miraisecurity.com GCIH|SCF|CISSP|OPST https://www.miraisecurity.com

  2. Agenda • What is SIEM? • Why buy SIEM? • Architectures • Components • Use Cases • Townhall Discussion

  3. …A Little Street Cred • 90’s – Computers & The Internet!, The movie ‘ Hackers’ was released, NetBus, BackOrifice • 2001 – School (Boring, but I finally learned TCP/IP) • 2004 – Bell SOC • 2008 – Olympic SOC & HoneyNet • 2010 – Consulting (SIEM, SecOps and ESA) • 2012 – Co-Founded The Mainland Advanced Research Society (BSides Vancouver) • 2017 – Co-Founded The Mirai Security Collective (Insert shameless plug here)

  4. Disclaimer • Generalizations • Trying to be as vendor agnostic as possible but there are nuances with each vendor/technology • Jaded Infosec Warrior • The views expressed within this presentation are those of the presenters and do not necessarily reflect the views of their former/current/future employers, clients, partners, friends and/or family members • Professional Consultation • I am a security advisor, but I am not YOUR security advisor (yet) • This presentation is for educational purposes only and should not replace independent professional consultation

  5. What is SIEM? • First: SIEM, SIM, SEM? Huh? • Logs -> Log management -> SIEM • Logs vs Events? • Primary Features • Centralized, secure and reliable log collection and retention • Fast and easy searching • Event correlation and alerting • Analytics • Dashboarding • Reporting • Ticketing and automation

  6. The Who’s Who of SIEM • Notable (Unmentioned?) Players • Elastic Stack • Sumo Logic • JASK • The emergence of Cloud SIEMs • Death by Acquisition

  7. Drivers for SIEM • Security • Security alert aggregation • Anomaly detection via correlations or visualizations • Investigation and incident response • Situational Awareness • IT Operations • Troubleshooting • Alerting on troubles • Compliance • Log retention • Audits and real-time risk dashboards

  8. SIEM Component Architecture 1 2 3 4 5 1. Event Generation Collector Agents Operating System 2. Event Collection Network Device Security Device Normalized 3. Normalization & Enrichment Authentication Data Anti-X Indexes and Applications 4. Transport Analytics Engine 5. Indexing, Analytics & Correlation Event Collection & Event Management Event Correlation

  9. Log Generation and Collection • Log Sources • What: Firewall, OS, DB, application, antivirus, IDS, cloud, packet capture, Nessus Data* and pretty much anything ASCII! • How: Configuring logging on your sources • Collection • Agent vs centralized agent • Protocols: Syslog, SNMP , HTTPS/API, WMI, SMB/CIFS, FTP , ODBC, etc • Real-time vs batching • To collect or not to collect, that is the question 1 2 3 4 5 • Use case/value • Licen$ing Collector Agents Operating System Network Device • Capacity Security Device Normalized Authentication Data Anti-X Indexes and Applications Analytics Engine Event Collection & Event Management Event Correlation

  10. Normalization, Enrichment & Transport • Parsing and Normalization • Structured vs Unstructured Data • Disparate logs into one common format • Filtering and Aggregation • Remove noise and save on bandwidth/licen$ing • Enrichment • GeoIP , asset/network models, categorization/tagging, DNS lookups, etc • Transportation 1 2 3 4 5 • Caching, encryption, compression, bandwidth management Collector Agents • Forwards to one or many destinations Operating System Network Device Security Device Normalized Authentication Data Anti-X Indexes and Applications Analytics Engine Event Collection & Event Management Event Correlation

  11. Indexing, Analytics and Correlations • Indexing • Event database management • Search management • Data retention and archiving • Analytics and Correlation • Asset and network models • Dashboards and visualizations • Searching • (Real-time) alerting and correlation 1 2 3 4 5 • Reporting Collector Agents Operating System • Ticketing and automation Network Device Security Device Normalized Authentication Data Anti-X Indexes and Applications Analytics Engine Event Collection & Event Management Event Correlation

  12. Component Architecture Data Sources Collection Analytics Consumption Syslog Security Analyst WMI/SMB Normalization & Enrichment Indexing File Asset/Network Models, DNS, GeoIP, Vuln Database, etc Transport ODBC API Caching, encryption, compression, bandwidth management

  13. Traditional SIEM Topography Legend ArcSight Command Centre ArcSight Console and Command Centre (Read Only Web) (Administrative) User Zone ArcSight Communications TCP8443 Event Transport Operations Team Security Analyst TCP 8443 Event Collection Primary DC Secondary DC TCP 445, 1433, 443 UDP 514, 161 ArcMC C&C Virtualized Virtualized Communications TCP 9000-9050 Virtualized Virtualized Virtualized Correlation Engine Security Zone Virtualized Virtualized Virtualized Virtualized Virtualized Virtualized Virtualized Virtualized Virtualized Remote Sites Regular Remote Site Small Remote Site Virtualized

  14. Elastic Stack Topology Data Sources Shipper Master Modes Analytics Shippers and Indexers • Message Bus • Syslog Ingestion Nodes • Master Nodes • Data Nodes • Security Analyst WMI/SMB Coordination Nodes • Message Bus Tribe Nodes • Kibana Nodes • Data Nodes File Collection & Parsing ODBC API

  15. Splunk Topology Forwarders • Indexers • Search Heads • ES Search Heads • Master Cluster Node • Deployment/License Servers • Now Cloudy! •

  16. Cloud Topology Forwarders • Indexers • Search Heads • ES Search Heads • Master Cluster Node • Deployment/License Servers •

  17. Product Decisions Traditional Bleeding Edge • Pros • Pros • Security centric • Designed for scale and performance • Lots of use cases • Likely lower costs • Appliance based • No appliances • Decent documentation • Bleeding edge technologies • Cons • Cons • Appliance based • Not necessarily focused on security • Likely higher costs • Requires much more knowledgeable staff, less support from vendors • Scalability concerns • Bleeding edge technologies • Less innovation

  18. Advancement and Cool Concepts • Load Balancing • Message Bus • ML, AI • HDFS and Data Lake • SOAR

  19. Design Considerations • Retention • Performance • Multitenancy

  20. When implementing a SIEM, goes wrong… • Sales people suck • Lack of vision • Outsourcing 24/7 • Failure to Perform Detailed Planning Before Buying • Failure to Define Scope • Overly Optimistic Scoping • Monitoring Noise • Lack of Sufficient Context • Insufficient Resources

  21. Pragmatic Role Out Recommendations • Day in the life of a SIEM • Roles and Responsibilities • Health Monitoring

  22. Use Cases • Workflow • Choosing data sources • Examples • Change management • Unauthorized access

  23. Operations • Roles and Responsibilities • Health Monitoring and Tuning • Use case development • Atomic, vs correlation, vs advanced correlation • Map to other frameworks

  24. Pitfalls • Parsing • Stability • MIA data sources • Bad forecasting • Bugs • What do SIEMs do terribly, stop trying to make it an updown monitor • Losing data • WUCS

  25. Town Hall • What are your drivers? • Complexity

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend