shadow it detection with ibm qradar siem - united …€¦ · shadow it detection with ibm qradar...

10

Click here to load reader

Upload: vuongkien

Post on 01-Sep-2018

223 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Shadow IT Detection with IBM QRadar SIEM - United …€¦ · Shadow IT Detection with IBM QRadar SIEM Introduction ... Despite the high visibility of recent data breaches, most employees

ShadowITDetectionwithIBMQRadarSIEMIntroductionShadowITreferstotheinformationtechnologysolutionsusedinsideanorganizationwithouttheexplicitapprovaloftheorganization.Inrecentyears,theadventofcloudcomputinghasmadeiteasierforemployeestocircumventITdepartmentanduseavarietyofcloudapplicationswithouttheknowledgeorapprovaloftheorganization.Despitethehighvisibilityofrecentdatabreaches,mostemployeesstillchoosetousecloudservicestobeabletodotheirjobmoreefficiently.InastudyconductedbyIBMSecurity,itwasfoundthat1inevery3Fortune1000employeesregularlysavesandsharescompanydatatothird-partycloud-basedplatformsthatarenotexplicitlyapprovedbytheirorganization[1].Thisfigureisexpectedtoincreaseastheworkplacedemographicstartstochangeandmillennialswhoaregreaterusersofcloudapplications[2]makeupmoreandmoreoftheworkforce.AccordingtoGartner,mostorganizationsgrosslyunderestimatethenumberofshadowITapplicationsalreadyinuseandadatabreachresultingfromthesecanresultinverylargefinancialliabilitiesduetoamixofcoststhatincludenotificationpenalties,auditingprocesses,lossofcustomerrevenue,branddamage,securityremediationandinvestment,andcyberinsurance[3].Howeversimplyblockingaccesstoallthird-partycloudservicesisnottherightsolution.Organizationsneedtostrikeabalancebetweenthesecurityrisksandcostsavingsandefficiencybenefitsofusingtheseservices.ThefirststeptotacklingtheshadowITproblemistoidentifywhatapplicationsarebeingused,bywhomandforwhatpurpose.Thisdiscoveryperiodwillhelptheorganizationtodeterminethehighriskapplicationsthatneedtobeeliminatedandallowtheadoptionofsaferalternativesandcreatesafeusagepolicies.Inthisarticle,wefocusonshadowcloudapplicationsandillustratehowyoucanutilizeIBMQRadarSIEMwithIBMX-ForceIntelligencefeedtogainvisibilityintounapprovedcloudapplicationusagewithinyourorganization.IBMSecurityX-ForceIntelligencefeedTheIBMSecurityX-ForceIntelligenceFeeddeliversinsightintoentitiesontheInternetthatisbasedonknowledgeofmorethan15billionwebpages.ThefeedaddsdynamicInternetthreatdatatotheanalyticalcapabilitiesoftheQRadarSecurityIntelligencePlatform,enrichingQRadar'sthreatanalysiscapabilitieswithup-to-the-minutedata.ShadowCloudApplicationDiscoveryInthisarticle,weextracttheURLinformationfromtherawlogsgeneratedbyenterprisewebgatewaysand/ornextgenerationfirewalldevicesandhaveQRadarprocessitwiththehelpofIBMSecurityX-ForceIntelligenceFeedtoidentifycloudapplicationsthatareinusewithouttheapprovaloftheenterprise.

Page 2: Shadow IT Detection with IBM QRadar SIEM - United …€¦ · Shadow IT Detection with IBM QRadar SIEM Introduction ... Despite the high visibility of recent data breaches, most employees

Figure1.GeneratingareportofunapprovedcloudapplicationusagewithQRadarAsoutlinedinfigure1above,theprocessinvolves:Setup

• AddQRadarcustompropertiestoextracttherelevantinformationfromrawlogs:QRadarcustompropertiesprovideawaytoextractextrafieldsfromlogsthatarenotparsedbydefaultviaQRadarDSMs.WewillneedtoextractURLfieldstobeabletoidentifyshadowcloudapplicationsinuse.

• Definethelistofapprovedcloudapplications:QRadarreferencesetsprovideawaytostoreextrainformationinQRadartablesthatarenotpartofthelogsfedintotheQRadarbutcanbereferencedbytheAQLqueriesforloganalysis.WewillcreateareferencesettostorethelistofapprovedcloudapplicationssotheycanbeexcludedfromtheshadowITanalysisresults.

Analysis• CreatetheAQLqueriestodiscovertheshadowcloudapplicationsinuse:

WewillprovideseveralAQLqueriesthatcanbeusedtodetecttheshadowcloudapplicationsinusewiththeaidofIBMSecurityX-ForceIntelligencefeed.Thesequeriesaremeantasexamplesthatyoucanuseasastartingpointtodefineyourownanalysisqueries.X-ForceintelligencefeedisenabledonQRadarifyouhaveavalidX-Forcefeedlicense.Note:YouwillneedatleastQRadarversion7.2.7tobeabletoutilizetheX-ForceAQLfunctionsusedinthisarticle.

QRadar

UnapprovedApplications

InUse

X-ForceIntelligenceFeed

DSM

CustomProperty

RawLogs

AQLQuery

ReferenceSet

ApprovedApplication

List

Page 3: Shadow IT Detection with IBM QRadar SIEM - United …€¦ · Shadow IT Detection with IBM QRadar SIEM Introduction ... Despite the high visibility of recent data breaches, most employees

Setup:AddcustompropertiestoextractURLfromrawlogsFirststepistoextracttheURLinformationfromtherawlogsusingtheCustomEventPropertyfeatureofQRadar.Customeventpropertiesareregularexpressionsusedtoextractfieldsfromrawlogsthatarenotparsedoutbydefault.Inthisarticle,weareusingBluecoatlogsinbcreportermain_v1formatasexamplebutthesameconceptsapplytoanywebapplicationgatewayornextgenerationfirewalllogsthatcontaininformationontheURLsbeingaccessedbytheenterpriseusers.Bluecoatbcreportermain_v1formatisshownbelow(Thefieldsweareinterestedinareshowninbold):date time time-taken c-ip cs-username cs-auth-group x-exception-id sc-filter-result cs-categories cs(Referer) sc-status s-action cs-method rs(Content-Type) cs-uri-scheme cs-host cs-uri-port cs-uri-path cs-uri-query cs-uri-extension cs(User-Agent) s-ip sc-bytes cs-bytes x-virus-id Note:Bluecoatsupportsmanydifferentloggingformats,includinguserconfiguredcustomformats.Ifyouareusingadifferentlogformatthanwhat’sdescribedhere,youwillneedtoadjustyourcustompropertyregularexpressionsaccordingly.Thecs-hostfieldcontainsthehostnameoftheURLaccessedbytheuser.Thecs-uri-pathcontainstheURLpathaccessedbytheuser.Tobeabletoidentifytheapplicationcorrectly,wewillneedtoextractbothofthesefields.Forexample,thecs-hostfieldcanbewww.google.comandcs-pathfieldcanbe/photos.TobeabletoidentifytheapplicationasGooglePhotos,weneedtoextractbothfields.Toextractthecs-hostfield,wecreatedaQRadarcustomeventpropertynamed‘UrlHost’(Figure2)andusedthefollowingregularexpressiontoextractitfromtherawlog:(?:(?:http|https|tcp|ftp|ssl)\s+)(.*?)(?=\s+)

Page 4: Shadow IT Detection with IBM QRadar SIEM - United …€¦ · Shadow IT Detection with IBM QRadar SIEM Introduction ... Despite the high visibility of recent data breaches, most employees

Figure2.Creatingcustomeventproperty‘UrlHost’Toextractthecs-uri-pathfield,wecreatedanotherQRadarcustomeventpropertynamed‘UrlPath’(Figure3)andusedthefollowingregularexpressiontoextractitfromtherawlog:(?:(?:http|https|tcp|ftp|ssl)\s+.*?\s+\d+\s+)(.*?)(?=\s+) Wedon’tneedtoaddacustomeventpropertyforcs-usernamefieldasQRadarextractsthisfieldbydefaultandassignstothe‘username’property.

Page 5: Shadow IT Detection with IBM QRadar SIEM - United …€¦ · Shadow IT Detection with IBM QRadar SIEM Introduction ... Despite the high visibility of recent data breaches, most employees

Figure3.Creatingcustomeventproperty‘UrlPath’Analysis:ObtainingthelistofapplicationsusedNowthatwehavethecustomeventpropertiescreated,wearereadytoruntheAQLquerytogeneratethelistofapplicationsused:select CONCAT(UrlHost + ‘/’ + UrlPath) as FullUrl, XFORCE_WAC_APPLICATION(FullUrl) as ApplicationName from events group by ApplicationName last 7 days Inthisquery,wearefirstconcatenatingUrlHostandUrlPathtoconstructtheFullUrlandtheninvokingtheXFORCE_WAC_APPLICATION()AQLfunctiontogettheapplicationnamefortheFullUrl.TheXFORCE_WAC_APPLICATION()functionusestheX-ForceIntelligenceFeedtoidentifytheapplicationfromtheprovidedURL.Thequeryresultscontainallapplicationsusedwithinthelast7days.WhenweexecutedthisqueryviaQRadararielRESTAPI,wegotthefollowingJSONdata:{ "events": [ {

Page 6: Shadow IT Detection with IBM QRadar SIEM - United …€¦ · Shadow IT Detection with IBM QRadar SIEM Introduction ... Despite the high visibility of recent data breaches, most employees

"FullUrl": "www.box.com/files/apps/service/windows/support/service/service/windows/a.html", "ApplicationName": "Box" }, { "FullUrl": "www.successfactors.com/b/private.do", "ApplicationName": "SuccessFactors" }, { "FullUrl": "www.webex.com/b/b/service/c/apps/files.mp4", "ApplicationName": "WebEx Cisco" }, { "FullUrl": "github.com/b/a/service.do", "ApplicationName": "GitHub" }, { "FullUrl": "www.servicenow.com/a/support/c/b/a/support/purchase.html", "ApplicationName": "ServiceNow" }, { "FullUrl": "www.workday.com/files/private/a/html/windows/support/html/windows/c/private.html", "ApplicationName": "Workday" }, { "FullUrl": "www.dropbox.com/files/c/a/apps/windows/private.txt", "ApplicationName": "Dropbox" }, { "FullUrl": "www.linkedin.com/files/downloads/service.html", "ApplicationName": "LinkedIn" }, { "FullUrl": "www.echosign.adobe.com/support.mp4", "ApplicationName": "Adobe Document Cloud" }, { "FullUrl": " mozy.co.uk/product/online-backup", "ApplicationName": "mozy" }, ... ] }Weneedtofurtherrefinethisquerytoonlyreturntheapplicationsthatarenotapproved.Setup:DefiningthelistofapprovedapplicationsThenextstepistoletQRadarknowthelistofapprovedapplicationssoitcanexcludethosefromthelist.Forthis,wecreatedaQRadarReferenceSetnamed‘ApprovedApps’usingtheReferenceSetManagementoptionintheQRadaradmintab.Theapprovedappentriesshouldnotexpiresowecheckedthe‘LivesForever’option.(Figure4).

Page 7: Shadow IT Detection with IBM QRadar SIEM - United …€¦ · Shadow IT Detection with IBM QRadar SIEM Introduction ... Despite the high visibility of recent data breaches, most employees

Figure4.CreatingtheApprovedAppsReferenceSetYoucanpopulatetheApprovedAppsReferenceSetbymanuallyenteringthenamesoftheapprovedapplicationsorimportingatextfilethatcontainsthelistofyourapprovedapplications.Thetextfileshouldcontainasingleapplicationnameperline.Inthisexample,weimportedthefollowingtextfileintoourApprovedAppsreferenceset:SuccessFactorsWorkdayLinkedInBox

Figure5.ContentsoftheApprovedAppsreferencesetNote:IfyouhaveasubscriptionforIBMX-ForceExchange,youcanobtainthelistofallrecognizedapplicationnamesbyusingtheX-ForceExchangeRESTAPI‘GET/app/’(SeetheAPIdocumentationformoreinformation)

Page 8: Shadow IT Detection with IBM QRadar SIEM - United …€¦ · Shadow IT Detection with IBM QRadar SIEM Introduction ... Despite the high visibility of recent data breaches, most employees

Analysis:ObtainingthelistofunapprovedapplicationsusedNowthatweconfiguredQRadarwiththelistofallapprovedapplications,wecanrefineourquerytoonlyreturntheunapprovedapplications:select CONCAT(UrlHost + ‘/’ + UrlPath) as FullUrl, XFORCE_WAC_APPLICATION(FullUrl) as ApplicationName from events where REFERENCESETCONTAINS(‘ApprovedApps’, ApplicationName) = ‘false’ group by ApplicationName last 7 days Sinceweareonlyinterestedinunapprovedcloudapplicationsused,wecanfurtherrefinethequerytoonlyreturntheremoteapplicationsaccessedbylocalusersbyincludingonlytheeventsthatareinlocal-to-remote(L2R)direction:select CONCAT(UrlHost + ‘/’ + UrlPath) as FullUrl, XFORCE_WAC_APPLICATION(FullUrl) as ApplicationName, XFORCE_URL_CATEGORY(FullUrl) as Category from events where REFERENCESETCONTAINS(‘ApprovedApps’, ApplicationName) = ‘false’ and eventdirection = ‘L2R’ group by ApplicationName last 7 days WhenweexecutedthisqueryviaQRadararielRESTAPI,wegotthefollowingJSONdata:{ "events": [ { "FullUrl": "www.webex.com/b/b/service/c/apps/files.mp4", "ApplicationName": "WebEx Cisco" }, { "FullUrl": "github.com/b/a/service.do", "ApplicationName": "GitHub" }, { "FullUrl": "www.servicenow.com/a/support/c/b/a/support/purchase.html", "ApplicationName": "ServiceNow" }, { "FullUrl": "www.dropbox.com/files/c/a/apps/windows/private.txt", "ApplicationName": "Dropbox" }, { "FullUrl": "www.echosign.adobe.com/support.mp4", "ApplicationName": "Adobe Document Cloud" }, { "FullUrl": " mozy.co.uk/product/online-backup", "ApplicationName": "mozy" }, ... ] }Analysis:Obtainingthelistofunapprovedapplicationsusedbyeachuser

Page 9: Shadow IT Detection with IBM QRadar SIEM - United …€¦ · Shadow IT Detection with IBM QRadar SIEM Introduction ... Despite the high visibility of recent data breaches, most employees

Toobtainalistofuserswhoareaccessingtheunapprovedcloudapplications,wecanrunthefollowingquery:select username, CONCAT(UrlHost + ‘/’ + UrlPath) as FullUrl, XFORCE_WAC_APPLICATION(FullUrl) as ApplicationName, XFORCE_URL_CATEGORY(FullUrl) as Category from events where REFERENCESETCONTAINS(‘ApprovedApps’, ApplicationName) = ‘false’ and eventdirection = ‘L2R’ group by username,ApplicationName last 7 days WhenweexecutedthisqueryviaQRadararielRESTAPI,wegotthefollowingJSONdatathatshowsthelistofusersandtheunapprovedcloudapplicationstheyhaveaccessed:{ "events": [ { "FullUrl": "www.webex.com/b/b/service/c/apps/files.mp4", "ApplicationName": "WebEx Cisco", "username": "[email protected]", }, { "FullUrl": "www.webex.com/upload/files", "ApplicationName": "WebEx Cisco", "username": "[email protected]", }, { "FullUrl": "www.dropbox.com/files/c/a/apps/windows/private.txt", "ApplicationName": "Dropbox", "username": "[email protected]", }, { "FullUrl": "www.dropbox.com/downloads", "ApplicationName": "Dropbox", "username": "[email protected]", }, { "FullUrl": "www.dropbox.com/folders/customerdata", "ApplicationName": "Dropbox", "username": "[email protected]", }, ... ] }Analysis:ObtainingthelistofunapprovedcloudapplicationsbycategoryByusingtheXFORCE_URL_CATEGORY()AQLfunction,wecangetcategoryinformationfortheapplicationsandusethisinformationtogainmoreinsightintothetypeofshadowcloudusagewithintheenterprise.XFORCE_URL_CATEGORY()functionutilizesX-ForceIntelligenceFeedtoidentifyURLcategory.Togainvisibilityintounapprovedcloudstorageusage,wecanrunthefollowingquery:

Page 10: Shadow IT Detection with IBM QRadar SIEM - United …€¦ · Shadow IT Detection with IBM QRadar SIEM Introduction ... Despite the high visibility of recent data breaches, most employees

select CONCAT(UrlHost + ‘/’ + UrlPath) as FullUrl, XFORCE_WAC_APPLICATION(FullUrl) as ApplicationName, XFORCE_URL_CATEGORY(FullUrl) as Category from events where REFERENCESETCONTAINS(‘ApprovedApps’, ApplicationName) = ‘false’ and eventdirection = ‘L2R’ and Category = ‘Web Storage’ group by ApplicationName,Category last 7 days WhenweexecutedthisqueryviaQRadararielRESTAPI,wegotthefollowingJSONdatathatshowsthelistofunapprovedcloudstorageapplicationsinuse:{ "events": [ { "FullUrl": "www.dropbox.com/files/c/a/apps/windows/private.txt", "ApplicationName": "Dropbox", "Category": "Web Storage" }, { "FullUrl": " mozy.co.uk/product/online-backup", "ApplicationName": "mozy", "Category": "Web Storage" } ] }

WecanalsousethisfunctiontoidentifyriskyapplicationusagebyfilteringourresultsonhighriskcategoriessuchasMalware,PhishingandBotNet:select CONCAT(UrlHost + ‘/’ + UrlPath) as FullUrl, XFORCE_WAC_APPLICATION(FullUrl) as ApplicationName, XFORCE_URL_CATEGORY(FullUrl) as Category from events where REFERENCESETCONTAINS(‘ApprovedApps’, ApplicationName) = ‘false’ and eventdirection = ‘L2R’ and ( Category = ‘Malware’ or Category = ‘BotNet Command and Control Server’ or Category = ‘Phishing URLs’ by ApplicationName,Category last 7 days Note:SeetheX-ForceExchangeFAQforthelistofcategorynamesthatcanbereturnedbyXFORCE_URL_CATEGORYAQLfunction.References[1]https://securityintelligence.com/to-the-cloud-whether-its-allowed-or-not/[2]http://www.gallup.com/poll/183074/millennials-trusting-safety-personal-information.aspx%C2%A02[3]http://www.gartner.com/smarterwithgartner/dont-let-shadow-it-put-your-business-at-risk/