get the basics right! improving detection capabilities ... · monitors how end users consume the...

39
Get The Basics Right! Improving detection capabilities with SIEM SIEM Summit & Training 2019

Upload: others

Post on 26-May-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Get The Basics Right! Improving detection capabilities ... · monitors how end users consume the IAM recommendations. We utilize an intuitive GUI that prompts key business context

Get The Basics Right!Improving detection capabilities with SIEM SIEM Summit & Training 2019

Page 2: Get The Basics Right! Improving detection capabilities ... · monitors how end users consume the IAM recommendations. We utilize an intuitive GUI that prompts key business context

Get The Basics Right!

Slide 2 of 39

Balaji Nakkella

November 1, 2018

Vancouver, BC

Page 3: Get The Basics Right! Improving detection capabilities ... · monitors how end users consume the IAM recommendations. We utilize an intuitive GUI that prompts key business context

Get The Basics Right!

Slide 3 of 39

Rakesh Kumar Narsingoju

November 1, 2018

Vancouver, BC

Page 4: Get The Basics Right! Improving detection capabilities ... · monitors how end users consume the IAM recommendations. We utilize an intuitive GUI that prompts key business context

Get The Basics Right!

Slide 4 of 39

What/How to choose?

Get The Basics Right!

Page 5: Get The Basics Right! Improving detection capabilities ... · monitors how end users consume the IAM recommendations. We utilize an intuitive GUI that prompts key business context

Get The Basics Right!

Slide 5 of 39

The Magic Quadrant

Get The Basics Right!

Page 6: Get The Basics Right! Improving detection capabilities ... · monitors how end users consume the IAM recommendations. We utilize an intuitive GUI that prompts key business context

Get The Basics Right!

Slide 6 of 39

Buying a SIEM - What we have

Get The Basics Right!

Page 7: Get The Basics Right! Improving detection capabilities ... · monitors how end users consume the IAM recommendations. We utilize an intuitive GUI that prompts key business context

Get The Basics Right!

Slide 7 of 39

Deployed SIEM - Expectation vs Reality

Get The Basics Right!

Page 8: Get The Basics Right! Improving detection capabilities ... · monitors how end users consume the IAM recommendations. We utilize an intuitive GUI that prompts key business context

Get The Basics Right!

Slide 8 of 39

Crown Jewels

Assets

Identities

Log sources

Threat Intel

Rules

Key Elements

Get The Basics Right!

Page 9: Get The Basics Right! Improving detection capabilities ... · monitors how end users consume the IAM recommendations. We utilize an intuitive GUI that prompts key business context

Get The Basics Right!

Slide 9 of 39

Key Challenges

Get The Basics Right!

1. Assets – what to protect

2. Crown Jewels – Protecting a pawn vs Protecting a king

3. Identities – who are your players

4. Data Sources – what to log

5. Rules – what to detect

6. Threat Intel – whom to rely on

Page 10: Get The Basics Right! Improving detection capabilities ... · monitors how end users consume the IAM recommendations. We utilize an intuitive GUI that prompts key business context

Get The Basics Right!

Slide 10 of 39

SIEM Deployment Checklist

A holistic view

Page 11: Get The Basics Right! Improving detection capabilities ... · monitors how end users consume the IAM recommendations. We utilize an intuitive GUI that prompts key business context

Get The Basics Right!

Slide 11 of 39

SIEM Deployment Life Cycle

Improving detection capabilities using SIEM

❖ Neither industry nor vendor specific

❖ Non exhaustive

❖ Detection centric

SIEM

Plan

Deploy

Enhance

Evolve

Page 12: Get The Basics Right! Improving detection capabilities ... · monitors how end users consume the IAM recommendations. We utilize an intuitive GUI that prompts key business context

Get The Basics Right!

Slide 12 of 39

Phase #1: Plan

SIEM Deployment checklist

❑ Start with Governance, Risk Management and Compliance

❑Review existing Security Controls

Business Risks Regulatory Risks

Risks(Business/Regulatory)

Preventive Detective Corrective

Page 13: Get The Basics Right! Improving detection capabilities ... · monitors how end users consume the IAM recommendations. We utilize an intuitive GUI that prompts key business context

Get The Basics Right!

Slide 13 of 39

Phase #1: Plan

SIEM Deployment checklist

❑Use of Cyber Security Framework(s)

❖ Identify and Review existing frameworks

❖ Implement

❖ Control/ Program/ Risk Frameworks

❖ PCI DSS, ISO, CIS, NIST etc. to start with

❑Shortlist use casesRisk Use case name Description Log source

Page 14: Get The Basics Right! Improving detection capabilities ... · monitors how end users consume the IAM recommendations. We utilize an intuitive GUI that prompts key business context

Get The Basics Right!

Slide 14 of 39

Phase #1: Plan

SIEM Deployment checklist

❑Finalize log sources and their logging levels

❑Shortlist Threat Intel feeds

❖ Relevance

❖ Variety (IPs, Hashes, URLs, Domains)

❖ Output format(s)

❑Shortlist and finalize SIEM products based on requirements

❖ In-house skillset

❑Select Ticketing tool, if required

Log source Logging level

Page 15: Get The Basics Right! Improving detection capabilities ... · monitors how end users consume the IAM recommendations. We utilize an intuitive GUI that prompts key business context

Get The Basics Right!

Slide 15 of 39

Phase #2: Deploy

SIEM Deployment checklist

❑SIEM Architecture Design based on organization's network architecture

❑Implementation of approved design

❑Data onboarding

❖ Add context to raw logs

❖ Parse – Verify – Ingest

❑Threat Intel feed integration

❖ Test – Deploy

❑Use case development

❖ Develop – Test – Deploy

❑Ticketing system integration

Page 16: Get The Basics Right! Improving detection capabilities ... · monitors how end users consume the IAM recommendations. We utilize an intuitive GUI that prompts key business context

Get The Basics Right!

Slide 16 of 39

Phase #3: Enhance

SIEM Deployment checklist

❑Use case Tuning - False positive reduction

❖ Scripts

❖ Security expertise and processes

❖ Analytics

❑Additional detection tools

❖ IPS/IDS (Cisco, PA, FortiGate, Fidelis, Juniper, Checkpoint,...)

❖ Endpoint Detection & Response (CrowdStrike, Carbon Black, FireEye,...)

❖ Email protection (Proofpoint, IronPort, Symantec,...)

❖ AV solutions (McAfee, SEP,…)

❖ Vulnerability Scanners (Qualys, Nessus,…)

❖ Web Proxy(Bluecoat, Websense,…)

Page 17: Get The Basics Right! Improving detection capabilities ... · monitors how end users consume the IAM recommendations. We utilize an intuitive GUI that prompts key business context

Get The Basics Right!

Slide 17 of 39

Phase #4: Evolve

SIEM Deployment checklist

Deloitte Omnia – In house AI driven Product development team

IAM Analytics APM

Page 18: Get The Basics Right! Improving detection capabilities ... · monitors how end users consume the IAM recommendations. We utilize an intuitive GUI that prompts key business context

Get The Basics Right!

Slide 18 of 39

Attack Path Modelling

SIEM Deployment checklist

❖ Become more proactive in your strategy and increase the ability to stop attacks even before they occur

❖ Provides current state and scenario-based analysis of threats and control failures on technology assets

❖ Leverages AI to drive recommendations that provide a variety of options for remediation and risk mitigation while showing how each action affects your risk score

Page 19: Get The Basics Right! Improving detection capabilities ... · monitors how end users consume the IAM recommendations. We utilize an intuitive GUI that prompts key business context

Get The Basics Right!

Slide 19 of 39

APM – Key Differentiators

SIEM Deployment checklist

Predict vulnerable entry points and the path of least resistance

Visualize a path an attacker might use to traverse the network

Identify vulnerable technology assets leading to increased risk exposure to an attack

Prioritize a remediation strategy through risk ranking

Automate remediation through integration with orchestration solution

Develop simulated attack path models through scenario analysis

Page 20: Get The Basics Right! Improving detection capabilities ... · monitors how end users consume the IAM recommendations. We utilize an intuitive GUI that prompts key business context

Get The Basics Right!

Slide 20 of 39

IAM Analytics - AI Enabled RBAC

SIEM Deployment checklist

❖ IAM Analytics is an Artificial Intelligence enabled solution that closely monitors how end users consume the IAM recommendations.

❖ We utilize an intuitive GUI that prompts key business context to end users, delivering a phenomenal user experience.

❖ Our state of the art advanced analytics engine is powered with closed loop feedback mechanism to enable Machine Learning as we scale operations and is configurable based on your preferences.

Page 21: Get The Basics Right! Improving detection capabilities ... · monitors how end users consume the IAM recommendations. We utilize an intuitive GUI that prompts key business context

Get The Basics Right!

Slide 21 of 39

Current pain points vs IAM Analytics Benefits

SIEM Deployment checklist

Lack of a sustainable role maintenance processpotentially resulting ininappropriate access

Enhanced logical view of access to help ensure that the right people have the right access

Human analysis of complex data patterns may lead to sub-optimal role definitions

Improved user experience in the organization’s IAM platform, injected with logical and business context

Time-consuming and manual role definition/maintenance processes result in low operational efficiency

Increased operational efficiency, including reduced administrative effort across business and technology lines

Page 22: Get The Basics Right! Improving detection capabilities ... · monitors how end users consume the IAM recommendations. We utilize an intuitive GUI that prompts key business context

Get The Basics Right!

Slide 22 of 39

Scenario #1

Prioritized Asset and Identity Inventory

Page 23: Get The Basics Right! Improving detection capabilities ... · monitors how end users consume the IAM recommendations. We utilize an intuitive GUI that prompts key business context

Get The Basics Right!

Slide 23 of 39

Know “Who” and “What” to protect

Prioritized Asset and Identity Inventory

Page 24: Get The Basics Right! Improving detection capabilities ... · monitors how end users consume the IAM recommendations. We utilize an intuitive GUI that prompts key business context

Get The Basics Right!

Slide 24 of 39

Alert Fatigue

Prioritized Asset and Identity Inventory

Old school technique:

❖Assign severities to use cases

❖One to one mapping of Severity to Priority

❖Minimize SLA breaches

Drawbacks:

❖ SLA breaches/ Higher dwell times

How do we address?

Page 25: Get The Basics Right! Improving detection capabilities ... · monitors how end users consume the IAM recommendations. We utilize an intuitive GUI that prompts key business context

Get The Basics Right!

Slide 25 of 39

First Things First approach

Prioritized Asset and Identity Inventory

Legend: C-Criticality, S-Severity, P-Priority

Page 26: Get The Basics Right! Improving detection capabilities ... · monitors how end users consume the IAM recommendations. We utilize an intuitive GUI that prompts key business context

Get The Basics Right!

Slide 26 of 39

The *hidden treasure!

Prioritized Asset and Identity Inventory

Asset Inventory

Identity Inventory

Hostname IP MAC Owner *Critical(C/H/M/L)

Category OS

Username Email Business Unit

*Role Domain Others

Page 27: Get The Basics Right! Improving detection capabilities ... · monitors how end users consume the IAM recommendations. We utilize an intuitive GUI that prompts key business context

Get The Basics Right!

Slide 27 of 39

Benefits

Prioritized Asset and Identity Inventory

❖ Event enrichment – False Positive reduction

❖ Effectively handle alert fatigue

❖ Prioritized alerts – Reduce dwell time

Page 28: Get The Basics Right! Improving detection capabilities ... · monitors how end users consume the IAM recommendations. We utilize an intuitive GUI that prompts key business context

Get The Basics Right!

Slide 28 of 39

Scenario #2

Health Monitoring

Page 29: Get The Basics Right! Improving detection capabilities ... · monitors how end users consume the IAM recommendations. We utilize an intuitive GUI that prompts key business context

Get The Basics Right!

Slide 29 of 39

Scenario

Health Monitoring

Page 30: Get The Basics Right! Improving detection capabilities ... · monitors how end users consume the IAM recommendations. We utilize an intuitive GUI that prompts key business context

Get The Basics Right!

Slide 30 of 39

Scenario

Health Monitoring

Why?

❖ Reporting vs. Non reporting – Compliance

❖ Avoids potential true positive miss – Security

General approach

❖ Level of detail till log collector(s)

Limitations

❖ Visibility only to Aggregator/Collector level

Page 31: Get The Basics Right! Improving detection capabilities ... · monitors how end users consume the IAM recommendations. We utilize an intuitive GUI that prompts key business context

Get The Basics Right!

Slide 31 of 39

Scenario

Health Monitoring

Page 32: Get The Basics Right! Improving detection capabilities ... · monitors how end users consume the IAM recommendations. We utilize an intuitive GUI that prompts key business context

Get The Basics Right!

Slide 32 of 39

Scenario

Health Monitoring

Page 33: Get The Basics Right! Improving detection capabilities ... · monitors how end users consume the IAM recommendations. We utilize an intuitive GUI that prompts key business context

Get The Basics Right!

Slide 33 of 39

Solution

Health Monitoring

What if we proceed to the host/log source level?

❖ Different sources have different logging frequencies

❖ Use cases at source level impacts SIEM productivity

Solution

❖ Configure alerts for P1 sources

❖ Schedule Daily/Weekly reports for P2/P3 sources

Benefits

❖ Reduced downtime

❖ No Alert fatigue

Page 34: Get The Basics Right! Improving detection capabilities ... · monitors how end users consume the IAM recommendations. We utilize an intuitive GUI that prompts key business context

Get The Basics Right!

Slide 34 of 39

Scenario #3

Identifying blind spots

Page 35: Get The Basics Right! Improving detection capabilities ... · monitors how end users consume the IAM recommendations. We utilize an intuitive GUI that prompts key business context

Get The Basics Right!

Slide 35 of 39

Example

Identifying blind spots

List of use cases

Sources Sending Many DNS Requests

High Volume Email Activity to Non-corporate Domains by User

Multiple Authentication Failures

Suspicious Domain/IP Communication

Unusual Geolocation of Communication Destination

Emails with Look alike Domains

Web Uploads to Non-corporate Sites by Users

Unusual Volume of Network Activity

Detect Use of cmd.exe/ps.exe to Launch Script Interpreters

Detect USB Usage/insertion

Hosts Sending To More Destinations Than Normal

Page 36: Get The Basics Right! Improving detection capabilities ... · monitors how end users consume the IAM recommendations. We utilize an intuitive GUI that prompts key business context

Get The Basics Right!

Slide 36 of 39

Enrich

Identifying blind spots

Use case Threat Category Kill Chain Phase

Sources Sending Many DNS Requests Insider Threat, Advanced Threat Detection

C2,Action on Objectives

High Volume Email Activity to Non-corporate Domains by User

Insider Threat, Advanced Threat Detection

Action on Objectives

Multiple Authentication Failures Insider Threat,Advanced Threat Detection

None

Suspicious Domain/IP Communication Insider Threat, Advanced Threat Detection

None

Unusual Geolocation of Communication Destination

Insider Threat, Advanced Threat Detection

None

Unusual Volume of Network Activity Insider Threat, Advanced Threat Detection

None

Web Uploads to Non-corporate Sites by Users

Insider Threat Action on Objectives

Emails with Look alike Domains Advanced Threat Detection Delivery

Detect Use of cmd.exe/ps.exe to Launch Script Interpreters

Advanced Threat Detection Exploitation

Detect USB Usage/insertion Insider Threat Installation, Delivery

Hosts Sending To More Destinations Than Normal

Advanced Threat Detection Reconnaissance

Page 37: Get The Basics Right! Improving detection capabilities ... · monitors how end users consume the IAM recommendations. We utilize an intuitive GUI that prompts key business context

Get The Basics Right!

Slide 37 of 39

Transform

Identifying blind spots

Kill Chain Phase APT Insider Threat

Reconnaissance Hosts Sending To More Destinations Than Normal

Weaponization

Delivery Emails with Look alike Domains Detect USB Usage/insertion

Exploitation Detect Use of cmd.exe/ps.exe to Launch Script Interpreters

Installation Detect USB Usage/insertion

Command & Control Sources Sending Many DNS Requests Sources Sending Many DNS Requests

Actions on Objectives Sources Sending Many DNS Requests,High Volume Email Activity to Non-corporate Domains by User

Sources Sending Many DNS Requests,High Volume Email Activity to Non-corporate Domains by User,Web Uploads to Non-corporate Sites by Users

None Multiple Authentication Failures,Suspicious Domain/IP Communication,Unusual Geolocation of Communication Destination,Unusual Volume of Network Activity

Multiple Authentication Failures,

Suspicious Domain/IP Communication,

Unusual Geolocation of Communication Destination,

Unusual Volume of Network Activity

Page 38: Get The Basics Right! Improving detection capabilities ... · monitors how end users consume the IAM recommendations. We utilize an intuitive GUI that prompts key business context

Get The Basics Right!

Slide 38 of 39

Model | List – Enrich – Transform

Identifying blind spots

APT Insider Threat Data protection others

Reconnaissance

Weaponization

Delivery

Exploitation

Installation

Command & Control

Actions on Objectives

Page 39: Get The Basics Right! Improving detection capabilities ... · monitors how end users consume the IAM recommendations. We utilize an intuitive GUI that prompts key business context

Get The Basics Right!

Slide 39 of 39

Thank You!Balaji Nakkella - linkedin.com/in/balajinakkella/

Rakesh Kumar Narsingoju - linkedin.com/in/rakesh-narsingoju