implementing an intelligent soc - rsa conference · pdf fileimplementing an intelligent soc...

18
Session ID: Session Classification: Paul Stamp RSA Implementing an Intelligent SOC SPO-208 Security Architecture

Upload: doandat

Post on 06-Feb-2018

228 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Implementing an Intelligent SOC - RSA Conference · PDF fileImplementing an Intelligent SOC SPO-208 ... •High Value Target (HVT) ... Alert for RDP tunneled over non

Session ID:

Session Classification:

Paul Stamp

RSA

Implementing an Intelligent SOC

SPO-208

Security Architecture

Page 2: Implementing an Intelligent SOC - RSA Conference · PDF fileImplementing an Intelligent SOC SPO-208 ... •High Value Target (HVT) ... Alert for RDP tunneled over non

Objectives of a Security Operations Center

Ensure security controls are:

Up and running

Functioning correctly

Configured according to business need

Make sure threats and incidents are:

Detected quickly

Responded to swiftly and efficiently

Remediated before they impact the business

Page 3: Implementing an Intelligent SOC - RSA Conference · PDF fileImplementing an Intelligent SOC SPO-208 ... •High Value Target (HVT) ... Alert for RDP tunneled over non

SOC vs CIRC

Many companies differentiate between a Security Operations Center and a Computer Incident Response Center

3

SOC CIRC

Tasks •Tool Administration •Vulnerability Scanning •Tier 1 Event Support •Break-Fix

•Incident Investigation •Threat Intelligence •Malware Analytics •Response Coordination

Skill set required •Intermediate security knowledge •Good tool & process knowledge •Generic company knowledge

•Deep threat knowledge •Advanced technical capability •Investigative experience •Deep company knowledge

Role of a service provider •Can successfully be outsourced to an MSSP

Tough to outsource as a standalone function

Page 4: Implementing an Intelligent SOC - RSA Conference · PDF fileImplementing an Intelligent SOC SPO-208 ... •High Value Target (HVT) ... Alert for RDP tunneled over non

CIRC

Advanced Tools, Tactics & Analysis

Critical Incident Response Team

Cyber Threat Intelligence

• Reverse Malware

Engineering

• Host & Network

Forensic

• Cause & Origin

Determination

• Email operations

Content Analytics Team

• Integration

• Content Development

• Open/All Source Actor

Attribution

• Attack Sensing &

Warning

• Social Media

• High Value Target

(HVT)

Reconnaissance Weaponization Delivery Exploitation Installation C2 Actions

Kill Chain Detection Response

• Eyes-on-Glass

• End User Intake

• Event Triage

• Incident Containment

• 24x7 Coverage

• Reporting

• Alert and Rule Creation

CIRC Program Example

Page 5: Implementing an Intelligent SOC - RSA Conference · PDF fileImplementing an Intelligent SOC SPO-208 ... •High Value Target (HVT) ... Alert for RDP tunneled over non

Attack Begins

System Intrusion

Attacker Surveillance

Cover-up Complete

Access Probe

Leap Frog Attacks

Complete

Target Analysis

TIME

Attack Set-up

Discovery/ Persistence

Maintain foothold

Cover-up

Starts

Anatomy of an attack

Source: NERC HILF Report, June 2010 (http://www.nerc.com/files/HILF.pdf)

Page 6: Implementing an Intelligent SOC - RSA Conference · PDF fileImplementing an Intelligent SOC SPO-208 ... •High Value Target (HVT) ... Alert for RDP tunneled over non

TIME

Attack Forecast

Physical Security

Containment &

Eradication

System Reactio

n Damage Identification

Recovery

Defender Discovery

Monitoring & Controls

Impact Analysi

s

Response

Threat Analysis

Attack

Identified

Incident Reporting

Anatomy of a response

Source: NERC HILF Report, June 2010 (http://www.nerc.com/files/HILF.pdf)

Page 7: Implementing an Intelligent SOC - RSA Conference · PDF fileImplementing an Intelligent SOC SPO-208 ... •High Value Target (HVT) ... Alert for RDP tunneled over non

Attack Begins

System Intrusion

Attacker Surveillance

Cover-up Complete

Access Probe

Leap Frog Attacks

Complete

Target Analysis

TIME

Attack Set-up

Discovery/ Persistence

Maintain foothold

Cover-up

Starts

Attack Forecast

Physical Security

Containment &

Eradication

System Reactio

n Damage Identification

Recovery

Defender Discovery

Monitoring & Controls

Impact Analysi

s

Response Threat

Analysis

Attack

Identified

Incident Reporting

Reducing Attacker Free Time

ATTACKER FREE

TIME TIME

Source: NERC HILF Report, June 2010 (http://www.nerc.com/files/HILF.pdf)

Page 8: Implementing an Intelligent SOC - RSA Conference · PDF fileImplementing an Intelligent SOC SPO-208 ... •High Value Target (HVT) ... Alert for RDP tunneled over non

Rethinking Security Operations Toolset

Advanced Challenges Advanced Requirements for the SOC

Multiple Investigative tools

and products in “silos of

information”

Single data view with a unambiguous and

extensible database design, and deep correlation

capabilities.

Persistent internal/external

threats

Situational awareness through breadth, depth and

scalability across network content, logs and threat

intelligence feeds.

Slow response due to legacy

requirements

Security analytics that are accurate + real-time +

exhaustive.

Poor use of human assets

for intelligence

Fast, intuitive investigations augmented with

community and threat intelligence feeds.

Volume of Data is Huge and

getting Bigger

Collect, retain, and manage TBs of data over ANY

required time frame as required by the enterprise

Page 9: Implementing an Intelligent SOC - RSA Conference · PDF fileImplementing an Intelligent SOC SPO-208 ... •High Value Target (HVT) ... Alert for RDP tunneled over non

Companies require…

Comprehensive Visibility

“Analyze everything that’s happening in my infrastructure”

Agile Analytics

“Enable me to efficiently analyze and investigate potential threats”

Actionable Intelligence

“Help me identify targets, threats & incidents”

Optimized Incident Management

“Enable me to manage these incidents”

Page 10: Implementing an Intelligent SOC - RSA Conference · PDF fileImplementing an Intelligent SOC SPO-208 ... •High Value Target (HVT) ... Alert for RDP tunneled over non

Suspect Attack Scenario

Spike in Suspect Network Traffic

Authorized User Logged in to AD

Different user logged into VPN from same IP

Data ex-filtration

2

3

● ● ● ● ● ● ● ●

PASSWORD 4

1 ● ● ● ● ● ● ● ●

PASSWORD

Page 11: Implementing an Intelligent SOC - RSA Conference · PDF fileImplementing an Intelligent SOC SPO-208 ... •High Value Target (HVT) ... Alert for RDP tunneled over non

How do we detect and investigate?

Attack Step SIEM Only Logs and Network Packet Capture

Alert for RDP tunneled over non-standard port

No Yes

Recreate activity of suspect IP address across environment

No Yes

Show user activity across AD and VPN

Yes Yes

Alert for different credentials used for AD and VPN

Yes Yes

Reconstruct exfiltrated data

No Yes

Page 12: Implementing an Intelligent SOC - RSA Conference · PDF fileImplementing an Intelligent SOC SPO-208 ... •High Value Target (HVT) ... Alert for RDP tunneled over non

RSA Security Management Architecture

Page 13: Implementing an Intelligent SOC - RSA Conference · PDF fileImplementing an Intelligent SOC SPO-208 ... •High Value Target (HVT) ... Alert for RDP tunneled over non

Deployment methodology

13

Page 14: Implementing an Intelligent SOC - RSA Conference · PDF fileImplementing an Intelligent SOC SPO-208 ... •High Value Target (HVT) ... Alert for RDP tunneled over non

Real Example – NA Financial Insitution

14

Page 15: Implementing an Intelligent SOC - RSA Conference · PDF fileImplementing an Intelligent SOC SPO-208 ... •High Value Target (HVT) ... Alert for RDP tunneled over non

The Situation…

Attack initially detected via a call to the help desk Bug in malware caused browser to fail

Initial attack infected approximately 20 users Investigations / responses took too long

Additional machines were affected after initial attack

Limited historical context providing visibility to these type of attacks or 0 day attack Security team were confident in initial containment

Days later additional machines were involved.

The tools used were ineffective in providing the answers

Page 16: Implementing an Intelligent SOC - RSA Conference · PDF fileImplementing an Intelligent SOC SPO-208 ... •High Value Target (HVT) ... Alert for RDP tunneled over non

Attack Investigation Downloaded through DLL disguised as HTML, TMP

Malware made changes to registry settings

Communicates with C2C server for further instruction

2

3

4

1

Propagated through null user sessions

Page 17: Implementing an Intelligent SOC - RSA Conference · PDF fileImplementing an Intelligent SOC SPO-208 ... •High Value Target (HVT) ... Alert for RDP tunneled over non

With RSA Security Analytics

Page 18: Implementing an Intelligent SOC - RSA Conference · PDF fileImplementing an Intelligent SOC SPO-208 ... •High Value Target (HVT) ... Alert for RDP tunneled over non

Taking this knowledge home

When you get back to the office:

Evaluate the last 3 major security incidents you’ve had

Map out the people and data you used to detect and investigate

Evaluate which tasks took the longest

Create a map of all the data and skills you didn’t have – but wish you had

Create a plan for SOC improvement:

Define the resources you’d need to speed up resolution

Evaluate your current people, process and technologies’ ability to handle incident data

Identify the low hanging fruit – the tedious non value-added tasks

Start with those tasks and create a roadmap to close gaps

18