SlideShare une entreprise Scribd logo
1  sur  16
Télécharger pour lire hors ligne
SANS “ASK THE EXPERT”

Putting the Top 10 SIEM
Best Practices To Work
                                  x
Process, Metrics and Technologies
    Also visit: WWW.ACCELOPS.NET/SIEMtop10.php

                             Sponsors:
                           AccelOps, Inc.
                         CSO Breakfast Club




 © 2010 AccelOps, Inc.                        September 2, 2010
Roundtable Participants
  Bill Sieglein
     President, CSO Breakfast Club

  Dr. Anton Chuvakin
     Author/Blog @ Security Warrior

  Tim Mather CISSP, CISM
     I4, former Chief Security Strategist at RSA,
        former CSO Symantec

  Randolph Barr, CISSP
     CSO Qualys, former CSO at WebEx Comm.

  Jamie Sanbower, CISSP
     Cyber Security Director @ Force3

  Scott Gordon CISSP
     Vice President, AccelOps

 (c) 2010 AccelOps- Putting the Top 10 SIEM Best Practices To Work   09.02.10   2
Ask the Experts:
  What is a SIEM? (rhetorical)
  A solution that aggregates,
      normalizes, filters, correlates
      and manages security and other
      operational event / log data to
      monitor, alert, report, analyze
      and manage security and
      compliance-relevant information.

  Send us your questions…
         CHAT to moderators
         Tweet Top10SIEMbpract
         Email siemtop10@accelops.net

(c) 2010 AccelOps- Putting the Top 10 SIEM Best Practices To Work   09.02.10   3
Ask the Experts:



  Monitoring and Reporting
      Requirements

  Establish key monitoring and
      reporting requirements prior to
      deployment, including objective,
      targets, compliance controls,
      implementation and workflow.




(c) 2010 AccelOps- Putting the Top 10 SIEM Best Practices To Work   09.02.10   4
Ask the Experts:



  Infrastructure audit activations
  Determine the scope of
      implementation, infrastructure
      audit targets, necessary
      credentials and verbosity,
      activation phases and activation.




(c) 2010 AccelOps- Putting the Top 10 SIEM Best Practices To Work   09.02.10   5
Ask the Experts:



  Audit data requirements
  Identify and assure adherence to
      audit data requirements
      including accessibility, integrity,
      retention, evidentiary requisites,
      disposal and storage
      considerations.




(c) 2010 AccelOps- Putting the Top 10 SIEM Best Practices To Work   09.02.10   6
Ask the Experts:



  Access Controls
  Monitor, respond to and report
      on key status, violations and
      anomalous access to critical
      resources.




(c) 2010 AccelOps- Putting the Top 10 SIEM Best Practices To Work   09.02.10   7
Ask the Experts:



  Perimeter Defenses
  Monitor, respond to and report
      on key status, configuration
      changes, violations/attacks and
      anomalous activity associated
      with perimeter defenses.




(c) 2010 AccelOps- Putting the Top 10 SIEM Best Practices To Work   09.02.10   8
Ask the Experts:



  Network and host defenses
  Monitor, respond to and report
      on key status, configuration
      changes, violations/attacks and
      anomalous activity associated
      with internal network and host
      defenses.




(c) 2010 AccelOps- Putting the Top 10 SIEM Best Practices To Work   09.02.10   9
Ask the Experts:



   Network and system resource
       integrity

   Monitor, respond to and report
       on key status, configuration
       changes, patches,
       vulnerabilities, threats and
       anomalous activity affecting
       network and system resources.




(c) 2010 AccelOps- Putting the Top 10 SIEM Best Practices To Work   09.02.10   10
Ask the Experts:



  Malware Control
  Monitor, respond to and report
      on key status, threats, issues,
      violations and activity
      supporting malware controls.




(c) 2010 AccelOps- Putting the Top 10 SIEM Best Practices To Work   09.02.10   11
Ask the Experts:



   Access management and
       acceptable use

   Monitor, respond to and report
       on key status, configuration
       changes, violations and
       anomalous activity affecting
       access management, user
       management and acceptable use
       of resources



(c) 2010 AccelOps- Putting the Top 10 SIEM Best Practices To Work   09.02.10   12
Ask the Experts:



  Application defenses
  Monitor, respond to and report
      on key status, configuration
      changes, violations and
      anomalous activity with regard
      to web, database and other
      application defenses.




(c) 2010 AccelOps- Putting the Top 10 SIEM Best Practices To Work   09.02.10   13
Webcast Sponsor:
  Challenges                                          Integrated Data Center Monitoring

 Complex Threats
 and Environment


Monitoring, Search
& Reporting Scope


Implementation and
  Scale Difficulty
                                            Single pane of glass – Intelligence at your fingertips
Timely & Extensive                          End-to-end visibility – service, performance, availability, security,
  Device Support                             change and compliance management
                                            SOC/NOC convergence – extensive operational visibility
    IT Service                              Efficiency – proactive monitoring, expedited root-cause analysis,
Awareness & Priority                         flexible search/reporting
                                            Value – easy to use, implement and scale with rich feature set
Budget for Isolated                         Virtual Appliance or SaaS – out of the box use and readily scale
  Security Tools


             (c) 2010 AccelOps- Putting the Top 10 SIEM Best Practices To Work   09.02.10   14
Ask the Experts:

  In Conclusion
    Map your requirements; output, audience, functional
    Scope implementation; size, deployment, activation
    Determine operating norms; what will you do with the
     information, incident workflow, escalation…
    One size does not fit all; dovetail your infosec policy with
     best practices that works best for your organization


  For more detailed and on-going contribution to SIEM
  best practices visit: www.accelops.net.SIEMtop10.php



       (c) 2010 AccelOps- Putting the Top 10 SIEM Best Practices To Work   09.02.10   15
Ask the Experts:

  For a more extensive, on-going set of Top 10 SIEM Best
  Practices visit: WWW.ACCELOPS.NET/SIEMtop10.php

  Released under a Creative Commons 3.0 Attribution
  license: http://creativecommons.org/licenses/by/3.0/
  Thanks to content contribution from:
    Scott Gordon CISSP                                         Randolph Barr, CISSP
    Dr. Anton Chuvakin                                         Jamie Sanbower, CISSP
    Tim Mather CISSP, CISM                                     Bill Sieglein CISSP

                                   SANS.org in reference to…
                                         Top Cyber Security Risks
                                         20 Critical Security Controls

                                      April Russo (number graphics)


        (c) 2010 AccelOps- Putting the Top 10 SIEM Best Practices To Work   09.02.10   16

Contenu connexe

Tendances

Dragos and CyberWire: ICS Ransomware
Dragos and CyberWire: ICS Ransomware Dragos and CyberWire: ICS Ransomware
Dragos and CyberWire: ICS Ransomware Dragos, Inc.
 
Industrial Threats Landscape, H2'2017
Industrial Threats Landscape, H2'2017Industrial Threats Landscape, H2'2017
Industrial Threats Landscape, H2'2017Kaspersky
 
OSHA Certificate from Grainger
OSHA Certificate from GraingerOSHA Certificate from Grainger
OSHA Certificate from GraingerThomas Foss
 
Past and future of integrity based attacks in ics environments
Past and future of integrity based attacks in ics environmentsPast and future of integrity based attacks in ics environments
Past and future of integrity based attacks in ics environmentsJoe Slowik
 
Safety instrumented functions (sif) safety integrity level (sil) evaluation t...
Safety instrumented functions (sif) safety integrity level (sil) evaluation t...Safety instrumented functions (sif) safety integrity level (sil) evaluation t...
Safety instrumented functions (sif) safety integrity level (sil) evaluation t...John Kingsley
 
Purple Teaming ICS Networks
Purple Teaming ICS NetworksPurple Teaming ICS Networks
Purple Teaming ICS NetworksDragos, Inc.
 
Role of Information Security Manager
Role of Information Security ManagerRole of Information Security Manager
Role of Information Security ManagerCentextech
 

Tendances (7)

Dragos and CyberWire: ICS Ransomware
Dragos and CyberWire: ICS Ransomware Dragos and CyberWire: ICS Ransomware
Dragos and CyberWire: ICS Ransomware
 
Industrial Threats Landscape, H2'2017
Industrial Threats Landscape, H2'2017Industrial Threats Landscape, H2'2017
Industrial Threats Landscape, H2'2017
 
OSHA Certificate from Grainger
OSHA Certificate from GraingerOSHA Certificate from Grainger
OSHA Certificate from Grainger
 
Past and future of integrity based attacks in ics environments
Past and future of integrity based attacks in ics environmentsPast and future of integrity based attacks in ics environments
Past and future of integrity based attacks in ics environments
 
Safety instrumented functions (sif) safety integrity level (sil) evaluation t...
Safety instrumented functions (sif) safety integrity level (sil) evaluation t...Safety instrumented functions (sif) safety integrity level (sil) evaluation t...
Safety instrumented functions (sif) safety integrity level (sil) evaluation t...
 
Purple Teaming ICS Networks
Purple Teaming ICS NetworksPurple Teaming ICS Networks
Purple Teaming ICS Networks
 
Role of Information Security Manager
Role of Information Security ManagerRole of Information Security Manager
Role of Information Security Manager
 

Similaire à Accel Ops Csobc Sans Webcast 090210.Ppt

.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security SessionSplunk
 
AccelOps & SOC-NOC Convergence
AccelOps & SOC-NOC ConvergenceAccelOps & SOC-NOC Convergence
AccelOps & SOC-NOC ConvergenceStephen Tsuchiyama
 
Cloud risk and business continuity v21
Cloud risk and business continuity v21Cloud risk and business continuity v21
Cloud risk and business continuity v21Jorge Sebastiao
 
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...John Gilligan
 
Cyber Resilience Summit Briefing March 15, 2016
Cyber Resilience Summit Briefing March 15, 2016Cyber Resilience Summit Briefing March 15, 2016
Cyber Resilience Summit Briefing March 15, 2016John Weiler
 
Cyber Resilience Summit Briefing
Cyber Resilience Summit Briefing Cyber Resilience Summit Briefing
Cyber Resilience Summit Briefing John Weiler
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareMike Rizzo
 
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadkówPLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadkówPROIDEA
 
Understanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loopUnderstanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loopDavid Sweigert
 
The Next Generation Security
The Next Generation SecurityThe Next Generation Security
The Next Generation SecurityCybera Inc.
 
Cisco Connect 2018 Thailand - Cisco aci delivering intent for data center net...
Cisco Connect 2018 Thailand - Cisco aci delivering intent for data center net...Cisco Connect 2018 Thailand - Cisco aci delivering intent for data center net...
Cisco Connect 2018 Thailand - Cisco aci delivering intent for data center net...NetworkCollaborators
 
WIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMSWIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMScscpconf
 
7-Software_Development_Security.pptx
7-Software_Development_Security.pptx7-Software_Development_Security.pptx
7-Software_Development_Security.pptxVijayalakshmiSudarsa
 
Cyber Resiliency 20120420
Cyber Resiliency 20120420Cyber Resiliency 20120420
Cyber Resiliency 20120420Steve Goeringer
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
 
Case Study: Datalink—Manage IT monitoring the MSP way
Case Study: Datalink—Manage IT monitoring the MSP wayCase Study: Datalink—Manage IT monitoring the MSP way
Case Study: Datalink—Manage IT monitoring the MSP wayCA Technologies
 
Seize the Cloud - Proven Tactics From a Successful Service Provider
Seize the Cloud - Proven Tactics From a Successful Service ProviderSeize the Cloud - Proven Tactics From a Successful Service Provider
Seize the Cloud - Proven Tactics From a Successful Service ProviderCA Nimsoft
 
Infrastructure Testing: The Ultimate “Shift Left”
Infrastructure Testing: The Ultimate “Shift Left”Infrastructure Testing: The Ultimate “Shift Left”
Infrastructure Testing: The Ultimate “Shift Left”TechWell
 

Similaire à Accel Ops Csobc Sans Webcast 090210.Ppt (20)

.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session
 
AccelOps & SOC-NOC Convergence
AccelOps & SOC-NOC ConvergenceAccelOps & SOC-NOC Convergence
AccelOps & SOC-NOC Convergence
 
CIE_overview
CIE_overviewCIE_overview
CIE_overview
 
Cloud risk and business continuity v21
Cloud risk and business continuity v21Cloud risk and business continuity v21
Cloud risk and business continuity v21
 
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
 
Cyber Resilience Summit Briefing March 15, 2016
Cyber Resilience Summit Briefing March 15, 2016Cyber Resilience Summit Briefing March 15, 2016
Cyber Resilience Summit Briefing March 15, 2016
 
Cyber Resilience Summit Briefing
Cyber Resilience Summit Briefing Cyber Resilience Summit Briefing
Cyber Resilience Summit Briefing
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadkówPLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
 
Understanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loopUnderstanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loop
 
The Next Generation Security
The Next Generation SecurityThe Next Generation Security
The Next Generation Security
 
Cisco Connect 2018 Thailand - Cisco aci delivering intent for data center net...
Cisco Connect 2018 Thailand - Cisco aci delivering intent for data center net...Cisco Connect 2018 Thailand - Cisco aci delivering intent for data center net...
Cisco Connect 2018 Thailand - Cisco aci delivering intent for data center net...
 
WIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMSWIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMS
 
7-Software_Development_Security.pptx
7-Software_Development_Security.pptx7-Software_Development_Security.pptx
7-Software_Development_Security.pptx
 
Cyber Resiliency 20120420
Cyber Resiliency 20120420Cyber Resiliency 20120420
Cyber Resiliency 20120420
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
Case Study: Datalink—Manage IT monitoring the MSP way
Case Study: Datalink—Manage IT monitoring the MSP wayCase Study: Datalink—Manage IT monitoring the MSP way
Case Study: Datalink—Manage IT monitoring the MSP way
 
Seize the Cloud - Proven Tactics From a Successful Service Provider
Seize the Cloud - Proven Tactics From a Successful Service ProviderSeize the Cloud - Proven Tactics From a Successful Service Provider
Seize the Cloud - Proven Tactics From a Successful Service Provider
 
Infrastructure Testing: The Ultimate “Shift Left”
Infrastructure Testing: The Ultimate “Shift Left”Infrastructure Testing: The Ultimate “Shift Left”
Infrastructure Testing: The Ultimate “Shift Left”
 

Accel Ops Csobc Sans Webcast 090210.Ppt

  • 1. SANS “ASK THE EXPERT” Putting the Top 10 SIEM Best Practices To Work x Process, Metrics and Technologies Also visit: WWW.ACCELOPS.NET/SIEMtop10.php Sponsors: AccelOps, Inc. CSO Breakfast Club © 2010 AccelOps, Inc. September 2, 2010
  • 2. Roundtable Participants   Bill Sieglein   President, CSO Breakfast Club   Dr. Anton Chuvakin   Author/Blog @ Security Warrior   Tim Mather CISSP, CISM   I4, former Chief Security Strategist at RSA, former CSO Symantec   Randolph Barr, CISSP   CSO Qualys, former CSO at WebEx Comm.   Jamie Sanbower, CISSP   Cyber Security Director @ Force3   Scott Gordon CISSP   Vice President, AccelOps (c) 2010 AccelOps- Putting the Top 10 SIEM Best Practices To Work 09.02.10 2
  • 3. Ask the Experts:   What is a SIEM? (rhetorical)   A solution that aggregates, normalizes, filters, correlates and manages security and other operational event / log data to monitor, alert, report, analyze and manage security and compliance-relevant information.   Send us your questions…   CHAT to moderators   Tweet Top10SIEMbpract   Email siemtop10@accelops.net (c) 2010 AccelOps- Putting the Top 10 SIEM Best Practices To Work 09.02.10 3
  • 4. Ask the Experts:   Monitoring and Reporting Requirements   Establish key monitoring and reporting requirements prior to deployment, including objective, targets, compliance controls, implementation and workflow. (c) 2010 AccelOps- Putting the Top 10 SIEM Best Practices To Work 09.02.10 4
  • 5. Ask the Experts:   Infrastructure audit activations   Determine the scope of implementation, infrastructure audit targets, necessary credentials and verbosity, activation phases and activation. (c) 2010 AccelOps- Putting the Top 10 SIEM Best Practices To Work 09.02.10 5
  • 6. Ask the Experts:   Audit data requirements   Identify and assure adherence to audit data requirements including accessibility, integrity, retention, evidentiary requisites, disposal and storage considerations. (c) 2010 AccelOps- Putting the Top 10 SIEM Best Practices To Work 09.02.10 6
  • 7. Ask the Experts:   Access Controls   Monitor, respond to and report on key status, violations and anomalous access to critical resources. (c) 2010 AccelOps- Putting the Top 10 SIEM Best Practices To Work 09.02.10 7
  • 8. Ask the Experts:   Perimeter Defenses   Monitor, respond to and report on key status, configuration changes, violations/attacks and anomalous activity associated with perimeter defenses. (c) 2010 AccelOps- Putting the Top 10 SIEM Best Practices To Work 09.02.10 8
  • 9. Ask the Experts:   Network and host defenses   Monitor, respond to and report on key status, configuration changes, violations/attacks and anomalous activity associated with internal network and host defenses. (c) 2010 AccelOps- Putting the Top 10 SIEM Best Practices To Work 09.02.10 9
  • 10. Ask the Experts:   Network and system resource integrity   Monitor, respond to and report on key status, configuration changes, patches, vulnerabilities, threats and anomalous activity affecting network and system resources. (c) 2010 AccelOps- Putting the Top 10 SIEM Best Practices To Work 09.02.10 10
  • 11. Ask the Experts:   Malware Control   Monitor, respond to and report on key status, threats, issues, violations and activity supporting malware controls. (c) 2010 AccelOps- Putting the Top 10 SIEM Best Practices To Work 09.02.10 11
  • 12. Ask the Experts:   Access management and acceptable use   Monitor, respond to and report on key status, configuration changes, violations and anomalous activity affecting access management, user management and acceptable use of resources (c) 2010 AccelOps- Putting the Top 10 SIEM Best Practices To Work 09.02.10 12
  • 13. Ask the Experts:   Application defenses   Monitor, respond to and report on key status, configuration changes, violations and anomalous activity with regard to web, database and other application defenses. (c) 2010 AccelOps- Putting the Top 10 SIEM Best Practices To Work 09.02.10 13
  • 14. Webcast Sponsor: Challenges Integrated Data Center Monitoring Complex Threats and Environment Monitoring, Search & Reporting Scope Implementation and Scale Difficulty   Single pane of glass – Intelligence at your fingertips Timely & Extensive   End-to-end visibility – service, performance, availability, security, Device Support change and compliance management   SOC/NOC convergence – extensive operational visibility IT Service   Efficiency – proactive monitoring, expedited root-cause analysis, Awareness & Priority flexible search/reporting   Value – easy to use, implement and scale with rich feature set Budget for Isolated   Virtual Appliance or SaaS – out of the box use and readily scale Security Tools (c) 2010 AccelOps- Putting the Top 10 SIEM Best Practices To Work 09.02.10 14
  • 15. Ask the Experts:   In Conclusion   Map your requirements; output, audience, functional   Scope implementation; size, deployment, activation   Determine operating norms; what will you do with the information, incident workflow, escalation…   One size does not fit all; dovetail your infosec policy with best practices that works best for your organization   For more detailed and on-going contribution to SIEM best practices visit: www.accelops.net.SIEMtop10.php (c) 2010 AccelOps- Putting the Top 10 SIEM Best Practices To Work 09.02.10 15
  • 16. Ask the Experts:   For a more extensive, on-going set of Top 10 SIEM Best Practices visit: WWW.ACCELOPS.NET/SIEMtop10.php   Released under a Creative Commons 3.0 Attribution license: http://creativecommons.org/licenses/by/3.0/   Thanks to content contribution from:   Scott Gordon CISSP   Randolph Barr, CISSP   Dr. Anton Chuvakin   Jamie Sanbower, CISSP   Tim Mather CISSP, CISM   Bill Sieglein CISSP   SANS.org in reference to…   Top Cyber Security Risks   20 Critical Security Controls   April Russo (number graphics) (c) 2010 AccelOps- Putting the Top 10 SIEM Best Practices To Work 09.02.10 16