Centralizing and Analyzing Security Events: Deploying Security Information Management Systems Lynn Ray Towson University Copyright Lynn Ray, 2007. This.

Slides:



Advertisements
Similar presentations
Overview of local security issues in Campus Grid environments Bruce Beckles University of Cambridge Computing Service.
Advertisements

Incident Response Managing Security at Microsoft Published: April 2004.
HONEYPOTS Mathew Benwell, Sunee Holland, Grant Pannell.
Making Sense out of the Information Security and Privacy Alphabet Soup in terms of Data Access A pragmatic, collaborative approach to promulgating campus-wide.
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
Presentation by: Peter Thomas Blue Lance, Inc Using SIEM Solutions Effectively to meet Security, Audit, and Compliance Requirements.
The Most Analytical and Comprehensive Defense Network in a Box.
CA: A New Step into Security Management.  eBusiness = business  A cultural shift — security is a part of the business fabric  Security is prevention.
Security Controls – What Works
Information Security Policies and Standards
The State of Security Management By Jim Reavis January 2003.
Enterprise security How to bring security transparency into your organization ISSA EDUCATIONAL SESSION Nicklaus Schleicher, VP Support & Customer Service.
1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
1 IT Security-related Legislation Judy Borreson Caruso CUMREC 2004 May 18, 2004 Copyright Judy Borreson Caruso, This work is the intellectual property.
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
INFORMATION SECURITY UPDATE Al Arboleda Chief Information Security Officer.
© 2003 by Carnegie Mellon University page 1 Information Security Risk Evaluation for Colleges and Universities Carol Woody Senior Technical Staff Software.
INDIANAUNIVERSITYINDIANAUNIVERSITY Automated Network Isolation at Indiana University David A. Greenberg Information Technology Security and Policy Office.
Building a Campus Dshield Randy Marchany IT Security Lab VA Tech Blacksburg, VA 24060
Network security policy: best practices
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
Database Auditing Models Dr. Gabriel. 2 Auditing Overview Audit examines: documentation that reflects (from business or individuals); actions, practices,
Security Guidelines and Management
EDUCAUSE April 25, 2006Enforcing Compliance with Security Policies … Enforcing Compliance of Campus Security Policies Through a Secure Identity Management.
Chapter 7 Database Auditing Models
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
Stanford’s Patch Management Project   Ced Bennett May 17, 2004 Copyright Cedric Bennett This work is the intellectual property of the author. Permission.
Skybox® Security Solutions for Symantec CCS Comprehensive IT Governance Risk and Access Compliance Management Skybox Security's.
IT-security in the Ubiquitous Computing World Chris Kuo, CISSP, CISA Acer eDC (e-Enabling Data Center) Acer Inc. 2007/3/27.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
1 © 2005 Cisco Systems, Inc. All rights reserved. CISCO SECURITY MONITORING, ANALYSIS & RESPONSE SYSTEM.
Auditing for Security Management By Cyril Onwubiko Network Security Analyst at COLT Telecom Invited Guest Lecture delivered at London Metropolitan University,
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
HIPAA COMPLIANCE WITH DELL
The Most Analytical and Comprehensive Defense Network in a Box.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Discussion Panelists: Justin C. Klein Keane Sr. Information Security Specialist University of Pennsylvania Jonathan Hanny Application Security Specialist.
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Computer Forensics in Practice Armed Forces of the Slovak Republic mjr. Ing. Albert VAJÁNYI 1Lt. Ing. Boris ZEMEK (c) May 2005.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
The Real Deal With SIM/SEM The Promise of Security Information / Event Management Scott Sidel Sr. Security Manager Computer Sciences Corp.
© 2006 Property of Lancope. Proprietary and Confidential. Lancope and Emory University: Illuminating (and Securing) the Network Andy Wilson Senior Systems.
Frontline Enterprise Security
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
1 Effective Incident Response Presented by Greg Hedrick, Manager of Security Services Copyright Purdue University This work is the intellectual property.
IT Security Challenges In Higher Education Steve Schuster Cornell University Copyright Steve Schuster This work is the intellectual property of.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Quickly Establishing A Workable IT Security Program EDUCAUSE Mid-Atlantic Regional Conference January 10-12, 2006 Copyright Robert E. Neale This.
IS3220 Information Technology Infrastructure Security
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Some Great Open Source Intrusion Detection Systems (IDSs)
SIEM Rotem Mesika System security engineering
OIT Security Operations
Working at a Small-to-Medium Business or ISP – Chapter 8
Critical Security Controls
Adapting Enterprise Security to a University Environment
Building a Security Operations Center
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Intrusion Prevention Systems
Intrusion Detection system
Presentation transcript:

Centralizing and Analyzing Security Events: Deploying Security Information Management Systems Lynn Ray Towson University Copyright Lynn Ray, This work is the intellectual property rights of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced Materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

Reasons for Centralized Event Management Increase diversity of security devices and protocols Multiple types of security events and threats Manual collection and analysis of events Need quick response to threats – zero day attacks Comply with audits

Threat Statistics (Courtesy of Message Labs) 10 new worms are found each day Average 20 targeted attacks per day Increase use of ransomware Use of blended threats (spam and virus, spyware and Trojans, triple Trojans, etc.) Off-the-shelf virus kits

Security Information Management Defined Collaboration of security solutions and intelligent networking technologies Integrates heterogeneous array of network devices and security products Builds pervasive security utilizing existing security enterprise –Monitors and collects event data –Correlates and analyzes event data across enterprise –Compares against known treats –Identifies threats and alerts –Automatically locates and mitigates threats

Raw Event Data Collection Filtering Data Normalization & Reduction Event Aggregation & Coordination Pattern Discovery Prioritization Event Display & Report Response & Mitigation Raw Data Data Refinement Action How SIM Works

Drivers Behind SIM Adoption Financial discipline –Managing operations effectively –Employee efficiency –Reduce administrative overhead –ROI/business value security Security effectiveness –Operational risk –Finances required to mitigate risk

Incident Response and Laws Incident response –Many attack vectors –Many different information sources –Mitigation priority Federal laws –FERPA – Family Educational Rights and Privacy Act –HIPAA – Health Insurance Portability and Accountability –GLBA – Gramm-Leach-Bliley

Compliance Policy-driven security management program Validation of security controls Risk management approach to information security Due diligence in application of internal controls Effective security incident management process Security event reporting Archiving and document preservation

Consideration Factors High cost ($100K or more) Difficult to implement and deploy Takes months to tune out false positives Requires specialized training to support

Monitoring Functionality Correlates, reduces and categorizes events Validates incidents

Data Correlation Valid Incidents Sessions Rules Verify Isolated Events Correlation Reduction Router Cfg. Firewall Log Switch Cfg. Switch Log Server Log AV Alert App Log VA Scanner Firewall Cfg. Netflow NAT Cfg. IDS Event (Lynn: Description of this graphic?)

Event Analysis

SureVector Analysis TM 1. Host A Port Scans Target X 2. Host A Buffer Overflow Attacks X Where X is behind NAT device and Where X is Vulnerable to attack 3. Target X executes Password Attacks Target Y located downstream from NAT Device SureVector™ Analysis –Visible and accurate attack path –Drill-down, full incident and raw event details –Pinpoint the true sources of anomalous and attack behavior –More complete and accurate story Host A Target X Target Y 6

“Response” Uses leveraged mitigation Use control capabilities within your infrastructure –Layer 2/3 attack path is clearly visible –Mitigation enforcement devices are identified –Exact mitigation command is provided ]

Typical Compliance Report

Towson University SIM Deployment

Results Deployed Cisco MARS SIM Device –Communicates with multiple devices –Collects syslog data from devices –Utilizes intelligent agents to gather and correlate data from devices –Provides automated reporting and resolution of threats –Displays path of threats

How Does SIM Help? Greatly reduces false positives Defines effective mitigation responses Provide quick and easy access to audit compliance reports Ability to visualize attack path ID source of threats Make precise recommendations for removal of threats

Monitors Diverse Environments McAfee ePO Desktops Firewall IDS VPN Routers Switches Unix and Windows Servers MARS Wireless

Intelligent Agents Used free SNARE* agent for Windows servers operating systems –Deployed on all servers –Pushes security events in real time to SIM –Minimum performance effects to server Testing other SNARE agents –Web service (Apache and IIS) –Operating system (Unix, Linux) *System Intrusion Analysis and Reporting Environment

Compliance and Reporting Survived state auditor Provide instant reports to auditors Established automated reports –Track failed access, virus and worm threats, etc. –Reduced level of daily log review

Recommendations Devise implementation strategy –ID devices where security event data will be collected –Consider open source and commercial products –Demo and get opinions from support staff –ID storage requirements for data Integrate with incident handling procedures

Devise a Deployment Plan Setup team composed of server admin, network and security staff Standardize collection of syslog data Use intelligent agents to collect data Monitor all network and computer systems – OS and Web Establish administration of system Determine report that will be useful and implement automated reporting

System Administration Device managed by security personnel Allow automated response to threats for better protection against threats –Allow SIM admin access to all monitored devices –Obtain cooperation from other support personnel (server admin, network, etc.) Tune out false positives Setup automated reporting, record keeping and incident handling

Event Reports Determine reports that will be useful and Implement automated reporting SANS Institute recommends: –Attempts to gain access through existing accounts –Failed file or resource access attempts –Unauthorized changes to users, groups and services –Systems most vulnerable to attack –Suspicious or unauthorized network traffic patterns

Incident Response Determine how will respond to alerts Establish escalation procedures for handling suspected and confirmed intrusions Link steps to incident handling plan Keep track of efforts and decisions

Compliance Verification Provided evidence of compliance to state and local policies Able to rapidly provide reports

Summary In summary, SIM… –Provides centralized network monitoring. –Automatically pulls logs from multiple devices –Eliminates the need for manually intensive analysis –Eliminates the need to respond to threats manually. –Provides reporting capabilities required for daily review by State & University audits and security guidelines.