log | event | information management

16

Upload: ayman-saeed

Post on 05-Dec-2014

680 views

Category:

Education


0 download

DESCRIPTION

An introduction to Security Event and Information Management Technology.

TRANSCRIPT

Page 1: Log | Event | Information Management
Page 2: Log | Event | Information Management

Log|Event|Information ManagementAyman SaeedSr.Network Security Engineer, PS DEPRaya IT

Page 3: Log | Event | Information Management

Log Management

• Collection• Retention

Ex. Kiwi Syslog Server

Page 4: Log | Event | Information Management

Information|Event Management

• Collection• Normalization• Retention• Correlation• Alerting• Reporting

Page 5: Log | Event | Information Management

Log Types and Log Sources

• Audit Logs• Transaction Logs• Intrusion Logs• Connection Logs• Performance Records• User Activity Logs

• Firewall• IPS• Router/Switch• Servers• Databases• Business Applications• Antivirus

Page 6: Log | Event | Information Management

Log Chaos : Login|Logon|Log in

Page 7: Log | Event | Information Management

Log Chaos : Accept|Permit|Allow

Page 8: Log | Event | Information Management

Log Chaos: Syslog|WinEV|DB|File

Firewalls/VPN

IntrusionDetectionSystems

VulnerabilityAssessment

NetworkEquipment

Server and Desktop OS Anti-Virus Applications Databases

User Activity Monitoring

Critical file modifications

Policy

Changes

Malicious IP

Traffic

WebTraffic

Page 9: Log | Event | Information Management

Log Chaos, in brief.

• There is no standard format for writing logs

• There is no standard Transport method for moving logs

Page 10: Log | Event | Information Management

.SIEM, the product

• SIEM , Security Information and Event Management• Again:– Collection– Normalization– Retention– Correlation– Alerting – Reporting

Page 11: Log | Event | Information Management

Event Collection

– SIEM vendors create a group of documents for collecting logs from supported products.

Page 12: Log | Event | Information Management

Normalization

– UserID > Username– LoginName > Username– ID > Username– Username > Username

Page 13: Log | Event | Information Management

Retention

Example:• IDS+DMZ+Online = 90 days• Firewall+DMZ+online = 30 days• Servers+internal+online = 90 days• All+DMZ+archive = 3 years• Critical+internal+archive = 5 years• Other+internal+archive = 1 year

Page 14: Log | Event | Information Management

Correlation

25 events based on cross-referencing intrusion alerts against firewall entries and host/asset databases much more efficiently than when he must scan 10,000 mostly normal log entries.

Page 15: Log | Event | Information Management

Alerting

Alerting on incidents can take various forms :• Email• SMS• SNMP Trap

Page 16: Log | Event | Information Management

Reporting

– Compliance Reports (PCI, ISO..)– Security Reports (Critical Attacks,

Failed Logins..)– Audit Reports (Configuration

Changes, VPN Access..)– Operational Reports (Link

Utilization, Top Destination IP..)