SlideShare a Scribd company logo
Understanding	
  Network	
  Insight	
  
Integrations	
  to	
  Automate	
  Containment	
  
and	
  Kick	
  Start	
  Response
Stephen	
  Newman
L E A R N M O R E
Stephen	
  Newman
SVP	
  Products
Core	
  Security	
  &	
  SecureAuth
-­‐-­‐ ABSTRACT	
  -­‐-­‐
Whether it’s the revered single plane of glass view in a SIEM or
building an auto containment workflow for compromised
devices, Network Insight admins can use built-­‐in integrators to
take action quickly or build their own with the API. With SIEM
for instance, what if the view is wrong or incomplete? This can
cause the response teams to spend invaluable time looking and
or chasing the wrong things. It’s critical to understand how to
ingest the NI outputs into your SIEM to keep things flowing
smoothly.
In this session we will cover how to best integrate Network
Insight with your SIEM as well as automate rapid response
actions. Also covered will be use cases for Proxies, Next
Generation Firewall (NGFW), Endpoint Detection & Response
(EDR) solutions.
AGENDA
• Introduction
• Communication	
  Types
• Definitions
• Best	
  Practice	
  Scenarios	
  With	
  SIEM
• Response	
  Actions
Network	
  Insight	
  Interaction
Flexibility	
  &	
  Power
SYSLOG:	
  	
  
Delivers	
  Events	
  In	
  Real-­‐time	
  to	
  SIEMs
READ	
  Only	
  DB:	
  
Alternative	
  mechanism	
  to	
  pull	
  all	
  
evidence	
  &	
  context	
  from	
  NI
API:	
  
REST	
  based	
  API	
  to	
  allow	
  SIEM	
  to	
  
both	
  pull	
  deep	
  forensics	
  from	
  NI	
  as	
  
well	
  as	
  update	
  ‘State’	
  on	
  devices	
  
within	
  NI	
  from	
  SIEM
Network	
  Insight®	
  6.3
API	
  Guide	
  v.1.00
Network	
  Insight’s	
  decision	
  if	
  a	
  
threat	
  is	
  present	
  on	
  a	
  device	
  or	
  
not
• Suspected:	
  ‘Evidence’	
  exists,	
  
but	
  not	
  enough	
  to	
  be	
  sure	
  an	
  
infection	
  is	
  present
• Infected:	
  ‘Evidence’	
  builds	
  a	
  
strong	
  case	
  that	
  an	
  infection	
  is	
  
present
Ve r d i c t
An	
  ability	
  within	
  SIEMs	
  to	
  roll	
  up	
  
‘Evidence’	
  to	
  a	
  specific	
  ‘Event’.
F i l t e r
Individual	
  events	
  delivered	
  from	
  
Network	
  Insight	
  to	
  a	
  SIEM
E v i d e n c e
Hi-­‐level	
  notifications	
  presented	
  
within	
  SIEM
C a s e
Network	
  Insight
Definitions
SIEM
Using	
  a	
  ‘Filter’	
  >	
  SIEM	
  Creates	
  a	
  ‘Case’	
  laptop01
laptop01	
  >	
  ‘Suspected’	
  of	
  ‘ThreatX’	
  >	
  Score	
  10	
  
If	
  SOC	
  clicks	
  on	
  ‘Case’,	
  they	
  see	
  ‘Evidence’	
  
details	
  of	
  the	
  suspicious	
  communication.
Evidence	
  1
laptop01	
  >	
  badguy.com	
  >	
  ThreatX
NI	
  marks	
  laptop01	
  >	
  Suspected	
  >	
  Verdict	
  10
Evidence	
  >	
  SIEM	
  >	
  Connection	
  Profiler
SIEM
Using	
  a	
  ‘Filter’	
  >	
  SIEM	
  modifies	
  ‘Case’
laptop01	
  >	
  ‘Suspected’	
  of	
  ‘ThreatX’	
  >	
  Score	
  20
SOC	
  >	
  ‘Case’	
  >	
  both	
  pieces	
  of	
  ‘Evidence’	
  in	
  
chronological	
  order
Evidence	
  2
laptop01	
  >	
  terribleguy.com	
  >	
  ThreatX
NI	
  marks	
  laptop01	
  >	
  Suspected >	
  Verdict	
  20
Evidence	
  >	
  SIEM	
  >	
  Connection	
  Profiler
SIEM
Using	
  a	
  ‘Filter’	
  >	
  SIEM	
  modifies	
  ‘Case’
Laptop01	
  >	
  ‘Infected’	
  of	
  ‘ThreatX’	
  >	
  score	
  80
SOC	
  Notified	
  >	
  Priority	
  >	
  ThreatX on	
  laptop01
SOC	
  >	
  ‘Case’	
  >	
  all	
  ‘evidence’	
  in	
  chronologically
SOC	
  >	
  hyperlink	
  >	
  NI	
  >	
  forensics.
…	
  Evidence	
  12
Laptop01	
  >	
  10	
  +	
  connections	
  > ThreatX
NI	
  >	
  Identities	
  Automation	
  via	
  ML
NI	
  marks	
  laptop01	
  >	
  Infected	
  >	
  Verdict	
  80
Evidence	
  >	
  SIEM	
  >	
  Connection	
  Profiler
Evidence	
  >	
  SIEM	
  >	
  Automation	
  Profiler
Scenario	
  Timeline
Best	
  Practice:	
  Integrating	
  NI	
  into	
  IR	
  Workflow
SOC	
  Not	
  Chasing	
  Until	
  
Infection	
  Is	
  Certain
Scenario
Data	
  From	
  NI	
  To	
  SIEM
Example	
  ‘Case’	
  scenarios	
  in	
  SIEM
+	
  laptop01 |	
  ThreatX |	
  Suspected	
  |	
  Verdict	
  Score	
  10 [CONTEXT]	
  [CORRELATION]	
  [FS	
  ASSET]	
  [FS	
  THREAT]
Connection	
  Profiler	
  |	
  badguy.com |	
  Completed	
  Connection	
  |	
  Data	
  In	
  |	
  Data	
  Out	
  |	
  OS	
  Type	
  |	
  Timestamp
+	
  laptop01 |	
  ThreatX |	
  Suspected |	
  Verdict	
  Score	
  20	
  	
  	
  [CONTEXT]	
  [CORRELATION]	
  [FS	
  ASSET]	
  [FS	
  THREAT]
Connection	
  Profiler |	
  badguy.com |	
  Completed	
  Connection	
  |	
  Data	
  In	
  |	
  Data	
  Out	
  |	
  OS	
  Type	
  |	
  Timestamp	
  |	
  Other	
  NI	
  Data
Connection	
  Profiler |	
  terribleguy.com |	
  Completed	
  Connection	
  |	
  Data	
  In	
  |	
  Data	
  Out	
  |	
  OS	
  Type	
  |	
  Timestamp	
  |	
  Other	
  NI	
  Data
+	
  laptop01 |	
  ThreatX |	
  Infected	
  |	
  Verdict	
  Score	
  80 [CONTEXT]	
  [CORRELATION]	
  [FS	
  ASSET]	
  [FS	
  THREAT]
Connection	
  Profiler |	
  badguy.com |	
  Completed	
  Connection	
  |	
  Data	
  In	
  |	
  Data	
  Out	
  |	
  OS	
  Type	
  |	
  Timestamp	
  |	
  Other	
  NI	
  Data
Connection	
  Profiler |	
  terribleguy.com |	
  Completed	
  Connection	
  |	
  |	
  Data	
  In	
  |	
  Data	
  Out	
  |	
  OS	
  Type	
  |	
  Timestamp	
  |	
  Other	
  NI	
  Data
Connection	
  Profiler |	
  badguy.com |	
  Completed	
  Connection	
  |	
  Data	
  In	
  |	
  Data	
  Out	
  |	
  OS	
  Type	
  |	
  Timestamp	
  |	
  Other	
  NI	
  Data
Connection	
  Profiler |	
  terribleguy.com |	
  Completed	
  Connection	
  |	
  Data	
  In	
  |	
  Data	
  Out	
  |	
  OS	
  Type	
  |	
  Timestamp	
  |	
  Other	
  NI	
  Data
Connection	
  Profiler |	
  badguy.com |	
  Completed	
  Connection	
  |	
  Data	
  In	
  |	
  Data	
  Out	
  |	
  OS	
  Type	
  |	
  Timestamp	
  |	
  Other	
  NI	
  Data
Connection	
  Profiler |	
  terribleguy.com |	
  Completed	
  Connection	
  |	
  Data	
  In	
  |	
  Data	
  Out	
  |	
  OS	
  Type	
  |	
  Timestamp	
  |	
  Other	
  NI	
  Data
Connection	
  Profiler |	
  badguy.com |	
  Completed	
  Connection	
  |	
  Data	
  In	
  |	
  Data	
  Out	
  |	
  OS	
  Type	
  |	
  Timestamp	
  |	
  Other	
  NI	
  Data
Connection	
  Profiler |	
  terribleguy.com |	
  Completed	
  Connection	
  |	
  Data	
  In	
  |	
  Data	
  Out	
  |	
  OS	
  Type	
  |	
  Timestamp	
  |	
  Other	
  NI	
  Data
Connection	
  Profiler |	
  badguy.com |	
  Completed	
  Connection	
  |	
  Data	
  In	
  |	
  Data	
  Out	
  |	
  OS	
  Type	
  |	
  Timestamp	
  |	
  Other	
  NI	
  Data
Connection	
  Profiler |	
  terribleguy.com |	
  Completed	
  Connection	
  |	
  Data	
  In	
  |	
  Data	
  Out	
  |	
  OS	
  Type	
  |	
  Timestamp	
  |	
  Other	
  NI	
  Data
Connection	
  Profiler |	
  badguy.com |	
  Completed	
  Connection	
  |	
  Data	
  In	
  |	
  Data	
  Out	
  |	
  OS	
  Type	
  |	
  Timestamp	
  |	
  Other	
  NI	
  Data
Connection	
  Profiler |	
  terribleguy.com |	
  Completed	
  Connection	
  |	
  Data	
  In	
  |	
  Data	
  Out	
  |	
  OS	
  Type	
  |	
  Timestamp	
  |	
  Other	
  NI	
  Data
Automation	
  Profiler	
  |	
  Weakly	
  Automated	
  |	
  Link	
  NI	
  |	
  Data	
  In	
  |	
  Data	
  Out	
  |	
  OS	
  Type	
  |	
  Timestamp	
  |	
  Other	
  NI	
  Data
Legend:	
  
“+”	
  means	
  you	
  can	
  expand	
  the	
  case	
  to	
  get	
  the	
  details	
  of	
  “Evidence”	
  below.	
  
[bracket]	
  means	
  a	
  button	
  that	
  links	
  to	
  either	
  SIEM	
  Filtered	
  Data	
  or	
  NI	
  screens.
Incident	
  Validation
Best	
  Practice:	
  Maximizing	
  Strengths	
  of	
  NI	
  &	
  SIEMs
INCIDENT
SOC	
  Notified	
  >	
  Priority	
  >	
  ThreatX on	
  laptop01
Yes Maybe No
SOC	
  Agrees	
  Device	
  Infected
Proceeds	
  To	
  Response	
  Actions
SOC	
  Unsure	
  Device	
  Infected
Correlate	
  With	
  Events
From	
  Other	
  Solutions
SOC	
  Disagrees	
  Device	
  Infected
SOC	
  Closes	
  Case
NI	
  Updated,	
  But	
  Keeps	
  History
Incident:	
  Yes
Response	
  Action
To	
  Identify	
  The	
  Correct	
  Response	
  Action,	
  SOC	
  Member	
  Needs	
  ‘Context’
SIEM	
  Can	
  Be	
  Setup	
  To	
  Automatically	
  Gather	
  &	
  Present	
  Context	
  When	
  “Infected”	
  Status	
  Achieved
From	
  NI From	
  Other	
  Solutions
Hostname User /	
  Account	
  Details
MAC AV	
  Status	
  /	
  DAT Status
List	
  of	
  IP	
  Addresses List	
  of	
  Vulnerabilities	
  on	
  Device
Geo	
  Location	
  of	
  C&C	
  Traffic User	
  Group
Status	
  of	
  Connections	
  to	
  C&C	
  (Completed,	
  
Proxy	
  Blocked,	
  Blocked,	
  Dropped,	
  Failed)
Device	
  Location
Data	
  in	
  from	
  Threat	
  Actor GRC	
  Policies
Data	
  out	
  from	
  Threat Actor Device	
  type
Threat Actor	
  TTPs Device	
  OS
Device OS Proxy Logs
Device	
  Category
NI	
  Risk	
  Score
Rapid	
  
Response
Incident:	
  Maybe
Response	
  Action
SOC	
  Member	
  Investigates	
  Further	
  >	
  Hyperlink	
  To	
  NI	
  for	
  In-­‐depth	
  Forensics	
  including	
  PCAPs
SIEM	
  Can	
  Be	
  Setup	
  To	
  Automatically	
  Gather	
  &	
  Present	
  Context	
  When	
  “Infected”	
  Status	
  Achieved
From	
  NI From	
  Other	
  Solutions
Hostname User /	
  Account	
  Details
MAC AV	
  Status	
  /	
  DAT Status
List	
  of	
  IP	
  Addresses List	
  of	
  Vulnerabilities	
  on	
  Device
Geo	
  Location	
  of	
  C&C	
  Traffic User	
  Group
Status	
  of	
  Connections	
  to	
  C&C	
  (Completed,	
  
Proxy	
  Blocked,	
  Blocked,	
  Dropped,	
  Failed)
Device	
  Location
Data	
  in	
  from	
  Threat	
  Actor GRC	
  Policies
Data	
  out	
  from	
  Threat Actor Device	
  type
Threat Actor	
  TTPs Device	
  OS
Device OS Proxy Logs
Device	
  Category
NI	
  Risk	
  Score
Rapid	
  
Investigation
Incident:	
  No
Response	
  Action
SOC	
  Member	
  Marks	
  Case	
  Closed
SIEM	
  >	
  NI	
  API	
  >	
  Marks	
  Case	
  Closed	
  In	
  NI
NI	
  Retains	
  History	
  In	
  Event	
  Other	
  Evidence	
  Becomes	
  Available
Rapid	
  
Dismissal
Automated	
  Response
Best	
  Practice:	
  Rules	
  of	
  Engagement
CONFIDENCE
IMPACT	
  /	
  “RISK	
  of	
  DAMAGE”LOW
LOWHIGH
HIGH
NO	
  RESPONSE,	
  
CONTINUE	
  MONITORING
AUTOMATE	
  RESPONSE,	
  
CONTINUE	
  MONITORING
AUTOMATE	
  RESPONSE,	
  
CONTINUE	
  MONITORING
SUSPECTED
INFECTED
OBSERVED
SUSPECTED	
  STATE	
  AUTOMATED	
  ACTIONS
q ENFORCE	
  ADAPTIVE	
  AUTHENTICATION	
  FOR	
  ACCOUNTS
q RESTRICT	
  DEVICE	
  ACCESS	
  TO	
  SENSITIVE	
  DATA
q FORCE	
  AV	
  UPDATE	
  AND	
  SCAN
q INITIATE	
  LIGHT	
  FORENSIC	
  SCAN	
  OF	
  DEVICE
q INCREASE	
  LOGGING
q CREATE	
  WORKFLOW	
  TICKET
INFECTED	
  STATE	
  AUTOMATED	
  ACTIONS
q REMOVE	
  ENTITLEMENTS
q QUARANTINE	
  DEVICE	
  TO	
  SECURITY	
  Z0NE
q INITIATE	
  DEEP	
  FORENSIC	
  SCAN	
  OF	
  DEVICE
q KILL	
  SUSPECTED	
  PROCESSES
q LAUNCH	
  INCIDENT	
  INVESTIGATION
Network	
  Insight	
  Response	
  Integrations
Integration	
  Complete
Integrations	
  in	
  Consideration
Blue	
  Coat	
  Integration
Internal  
Network
1. Network	
  Insight	
  >	
  Discovers	
  infected	
  device,	
  suspected	
  device,	
  or	
  active	
  C+C	
  domains
2. Network	
  Insight	
  >	
  Dynamically	
  publishes	
  CPL	
  file	
  via	
  Management	
  Console	
  URL
3. ProxySG >	
  Automatically	
  checks	
  Damballa	
  CPL	
  file	
  for	
  updated	
  infected,	
  suspected,	
  and	
  	
  C+C	
  domains
4. ProxySG >	
  Enforces	
  policies	
  to	
  take	
  action	
  -­‐ Example:	
  Block	
  internet	
  access	
  for	
  infected	
  device,	
  block	
  attempted	
  
communications	
  with	
  bad	
  C&C	
  domains	
  by	
  infected	
  device,	
  etc.
Proxy  SG
Network  
Insight
Tap  or  Span  
Port
Network  
Insight
Tap  or  Span  
Port
Blue  Coat  Global  
Intelligence
Network
Palo	
  Alto	
  Networks	
  Integration
Internal  
Network
Tap  or  Span  
Port
1. Network	
  Insight	
  >	
  discovers	
  infected	
  device,	
  suspected	
  device,	
  and/or	
  active	
  C&C	
  domains
2. Network	
  Insight	
  >	
  notifies	
  Dynamic	
  Block	
  List	
  of	
  device	
  state	
  and	
  identified	
  C&C	
  communication	
  attempts
3. PAN	
  >	
  implements	
  policies	
  based	
  on	
  device	
  state	
  (suspected	
  or	
  infected)	
  information.	
  	
  (IE:	
  Block	
  infected	
  assets	
  from	
  
communicating	
  to	
  internet	
  and/or	
  high-­‐value	
  assets,	
  enhance	
  logging	
  on	
  suspected	
  assets)
4. PAN	
  >	
  blocks	
  active	
  C&C	
  communication	
  attempts	
  identified	
  by	
  Network	
  Insight
Network  Insight
Carbon	
  Black	
  Integration
Internet
Endpoints
NGFW
Carbon	
   	
  Black
Network	
  Insight
4.  CARBON  BLACK  IDENTIFIES  PROCESS  AND  CORRESPONDING   FILE  ON  INFECTED  HOST  FOR  BREACH  RESPONSE  TEAM
BREACH
RESPONSE
TEAM
VERDICT:	
  INFECTED
3.  NETWORK  INSIGHT  QUESTIONS   CARBON  BLACK  FOR  PROCESS  OF  OBSERVED  NETWORK  COMMUNICATIONS
1.  NETWORK  INSIGHT  IDENTIFIES  MALICIOUS   BEHAVIORS  IN  C&C ACTIVITY
AUTOMATION   |  FLUXING  |  P2P  |  HTTP  REQUESTS
1
2.	
  NETWORK	
  INSIGHT	
  PASSES	
  VERDICT	
  OF	
  INFECTED
2
3
4
THANK	
  YOU

More Related Content

PPTX
Hands-On Security Breakout Session- ES Guided Tour
PDF
MITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, Tripwire
PDF
Introduction to MITRE ATT&CK
DOCX
Security Hands-On - Splunklive! Houston
PDF
SplunkSummit 2015 - Splunking the Endpoint
PDF
ATT&CK BINGO
PDF
Update from the MITRE ATT&CK Team
Hands-On Security Breakout Session- ES Guided Tour
MITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, Tripwire
Introduction to MITRE ATT&CK
Security Hands-On - Splunklive! Houston
SplunkSummit 2015 - Splunking the Endpoint
ATT&CK BINGO
Update from the MITRE ATT&CK Team

What's hot (20)

PDF
firewalls
PDF
Reducing Your Attack Surface
PDF
Bezpečnost není jen antivirus
PPTX
Level Up Your Security Skills in Splunk Enterprise
PDF
Next Dimension and Cisco | Solutions for PIPEDA Compliance
PPT
Info Security - Vulnerability Assessment
PDF
Assignment 1
PDF
Pennington - Defending Against Targeted Ransomware with MITRE ATT&CK
PPTX
DEVNET-1186 Harnessing the Power of the Cloud to Detect Advanced Threats: Cog...
PDF
Reality Check: Security in the Cloud
PDF
Advanced Threat Protection – ultimátní bezpečnostní řešení
PDF
Finding the needle in the hardware haystack - HRES (1)
PDF
Cheatsheet for your cloud project
PDF
The Pivot
PDF
Cas 003-q&a-demo-exam area
PDF
The Critical Security Controls and the StealthWatch System
PPTX
Whats New in OSSIM v2.2?
PDF
Protect Your Enterprise - Check Point SandBlast Mobile
PPTX
Using Splunk for Information Security
firewalls
Reducing Your Attack Surface
Bezpečnost není jen antivirus
Level Up Your Security Skills in Splunk Enterprise
Next Dimension and Cisco | Solutions for PIPEDA Compliance
Info Security - Vulnerability Assessment
Assignment 1
Pennington - Defending Against Targeted Ransomware with MITRE ATT&CK
DEVNET-1186 Harnessing the Power of the Cloud to Detect Advanced Threats: Cog...
Reality Check: Security in the Cloud
Advanced Threat Protection – ultimátní bezpečnostní řešení
Finding the needle in the hardware haystack - HRES (1)
Cheatsheet for your cloud project
The Pivot
Cas 003-q&a-demo-exam area
The Critical Security Controls and the StealthWatch System
Whats New in OSSIM v2.2?
Protect Your Enterprise - Check Point SandBlast Mobile
Using Splunk for Information Security
Ad

Similar to Understanding Network Insight Integrations to Automate Containment and Kick Start Response, Stephen Newman SVP Products, Core Security & SecureAuth (20)

PPTX
Hands-On Security - Disrupting the Kill Chain
PPTX
Hands-On Security Breakout Session- Disrupting the Kill Chain
PPTX
Splunk for Security - Hands-On
PPTX
Hands on Security - Disrupting the Kill Chain Breakout Session
PPTX
Hands-On Security Breakout Session- Disrupting the Kill Chain
PPTX
Hands-On Security Breakout Session- Disrupting the Kill Chain
PPTX
Hands-On Security Breakout Session- Disrupting the Kill Chain
PPTX
Splunk for Security Workshop
PDF
Hands on Security, Disrupting the Kill Chain, SplunkLive! Austin
PDF
Get Real-Time Cyber Threat Protection with Risk Management and SIEM
PDF
SplunkLive! Stockholm 2015 breakout - Analytics based security
PDF
Security Certification: Security Analytics using Sumo Logic - Oct 2018
PPTX
Cybersecurity - Jim Butterworth
PPTX
Pragmatic intelsans intelsummit2014
PPTX
SplunkLive! - Splunk for Security
PPTX
Sumo Logic Cert Jam - Security Analytics
PPTX
Splunk for Security Breakout Session
PDF
Splunk conf2014 - Operationalizing Advanced Threat Defense
PDF
Infosec cert service
PDF
Splunk Webinar Best Practices für Incident Investigation
Hands-On Security - Disrupting the Kill Chain
Hands-On Security Breakout Session- Disrupting the Kill Chain
Splunk for Security - Hands-On
Hands on Security - Disrupting the Kill Chain Breakout Session
Hands-On Security Breakout Session- Disrupting the Kill Chain
Hands-On Security Breakout Session- Disrupting the Kill Chain
Hands-On Security Breakout Session- Disrupting the Kill Chain
Splunk for Security Workshop
Hands on Security, Disrupting the Kill Chain, SplunkLive! Austin
Get Real-Time Cyber Threat Protection with Risk Management and SIEM
SplunkLive! Stockholm 2015 breakout - Analytics based security
Security Certification: Security Analytics using Sumo Logic - Oct 2018
Cybersecurity - Jim Butterworth
Pragmatic intelsans intelsummit2014
SplunkLive! - Splunk for Security
Sumo Logic Cert Jam - Security Analytics
Splunk for Security Breakout Session
Splunk conf2014 - Operationalizing Advanced Threat Defense
Infosec cert service
Splunk Webinar Best Practices für Incident Investigation
Ad

More from Core Security (20)

PDF
How to Solve the Top 3 Struggles with Identity Governance and Administration ...
PPTX
Lazy Penetration Tester Tricks
PDF
Thanks for All the Phish: Introducing Core Impact 18.1
PDF
Identity + Security: Welcome to Your New Career
PDF
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
PDF
No More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
PDF
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
PDF
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
PDF
Threat Dissection - Alberto Soliño Testa Research Director, Core Security
PDF
How to Defeat the Vulnerability Hydra - Andy Nickel Sales Engineer, Core Secu...
PDF
Product Vision - Stephen Newman – SecureAuth+Core Security
PDF
The Good, the Bad, and The Not So Bad: Tracking Threat Operators with Our Thr...
PDF
Introducing Core Role Designer - Michael Marks Product Manager - Identity, Co...
PDF
Core Connector API Demo - Michael Marks Product Manager - Identity, Core Secu...
PDF
Access Assurance Suite Tips & Tricks - Lisa Lombardo Principal Architect Iden...
PDF
The Why - Keith Graham, CTO – SecureAuth+Core Security
PDF
Vulnerability Insight Tips & Tricks - Magno Gomes SE Manager, Core Security
PDF
Network Insight: How To Assess Findings - Tier 1 SOC Triage - Mark Gilbert ,T...
PPTX
10 IT Security Trends to Watch for in 2016
PDF
Trending it security threats in the public sector
How to Solve the Top 3 Struggles with Identity Governance and Administration ...
Lazy Penetration Tester Tricks
Thanks for All the Phish: Introducing Core Impact 18.1
Identity + Security: Welcome to Your New Career
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
No More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Threat Dissection - Alberto Soliño Testa Research Director, Core Security
How to Defeat the Vulnerability Hydra - Andy Nickel Sales Engineer, Core Secu...
Product Vision - Stephen Newman – SecureAuth+Core Security
The Good, the Bad, and The Not So Bad: Tracking Threat Operators with Our Thr...
Introducing Core Role Designer - Michael Marks Product Manager - Identity, Co...
Core Connector API Demo - Michael Marks Product Manager - Identity, Core Secu...
Access Assurance Suite Tips & Tricks - Lisa Lombardo Principal Architect Iden...
The Why - Keith Graham, CTO – SecureAuth+Core Security
Vulnerability Insight Tips & Tricks - Magno Gomes SE Manager, Core Security
Network Insight: How To Assess Findings - Tier 1 SOC Triage - Mark Gilbert ,T...
10 IT Security Trends to Watch for in 2016
Trending it security threats in the public sector

Recently uploaded (20)

PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PPTX
Operating system designcfffgfgggggggvggggggggg
PPTX
ai tools demonstartion for schools and inter college
PDF
medical staffing services at VALiNTRY
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
Understanding Forklifts - TECH EHS Solution
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PPTX
L1 - Introduction to python Backend.pptx
PPTX
Transform Your Business with a Software ERP System
PDF
top salesforce developer skills in 2025.pdf
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
System and Network Administration Chapter 2
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PDF
Design an Analysis of Algorithms II-SECS-1021-03
Navsoft: AI-Powered Business Solutions & Custom Software Development
Operating system designcfffgfgggggggvggggggggg
ai tools demonstartion for schools and inter college
medical staffing services at VALiNTRY
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Understanding Forklifts - TECH EHS Solution
Which alternative to Crystal Reports is best for small or large businesses.pdf
L1 - Introduction to python Backend.pptx
Transform Your Business with a Software ERP System
top salesforce developer skills in 2025.pdf
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Adobe Illustrator 28.6 Crack My Vision of Vector Design
System and Network Administration Chapter 2
VVF-Customer-Presentation2025-Ver1.9.pptx
How to Choose the Right IT Partner for Your Business in Malaysia
2025 Textile ERP Trends: SAP, Odoo & Oracle
Design an Analysis of Algorithms II-SECS-1021-03

Understanding Network Insight Integrations to Automate Containment and Kick Start Response, Stephen Newman SVP Products, Core Security & SecureAuth

  • 1. Understanding  Network  Insight   Integrations  to  Automate  Containment   and  Kick  Start  Response Stephen  Newman
  • 2. L E A R N M O R E Stephen  Newman SVP  Products Core  Security  &  SecureAuth -­‐-­‐ ABSTRACT  -­‐-­‐ Whether it’s the revered single plane of glass view in a SIEM or building an auto containment workflow for compromised devices, Network Insight admins can use built-­‐in integrators to take action quickly or build their own with the API. With SIEM for instance, what if the view is wrong or incomplete? This can cause the response teams to spend invaluable time looking and or chasing the wrong things. It’s critical to understand how to ingest the NI outputs into your SIEM to keep things flowing smoothly. In this session we will cover how to best integrate Network Insight with your SIEM as well as automate rapid response actions. Also covered will be use cases for Proxies, Next Generation Firewall (NGFW), Endpoint Detection & Response (EDR) solutions.
  • 3. AGENDA • Introduction • Communication  Types • Definitions • Best  Practice  Scenarios  With  SIEM • Response  Actions
  • 4. Network  Insight  Interaction Flexibility  &  Power SYSLOG:     Delivers  Events  In  Real-­‐time  to  SIEMs READ  Only  DB:   Alternative  mechanism  to  pull  all   evidence  &  context  from  NI API:   REST  based  API  to  allow  SIEM  to   both  pull  deep  forensics  from  NI  as   well  as  update  ‘State’  on  devices   within  NI  from  SIEM Network  Insight®  6.3 API  Guide  v.1.00
  • 5. Network  Insight’s  decision  if  a   threat  is  present  on  a  device  or   not • Suspected:  ‘Evidence’  exists,   but  not  enough  to  be  sure  an   infection  is  present • Infected:  ‘Evidence’  builds  a   strong  case  that  an  infection  is   present Ve r d i c t An  ability  within  SIEMs  to  roll  up   ‘Evidence’  to  a  specific  ‘Event’. F i l t e r Individual  events  delivered  from   Network  Insight  to  a  SIEM E v i d e n c e Hi-­‐level  notifications  presented   within  SIEM C a s e Network  Insight Definitions
  • 6. SIEM Using  a  ‘Filter’  >  SIEM  Creates  a  ‘Case’  laptop01 laptop01  >  ‘Suspected’  of  ‘ThreatX’  >  Score  10   If  SOC  clicks  on  ‘Case’,  they  see  ‘Evidence’   details  of  the  suspicious  communication. Evidence  1 laptop01  >  badguy.com  >  ThreatX NI  marks  laptop01  >  Suspected  >  Verdict  10 Evidence  >  SIEM  >  Connection  Profiler SIEM Using  a  ‘Filter’  >  SIEM  modifies  ‘Case’ laptop01  >  ‘Suspected’  of  ‘ThreatX’  >  Score  20 SOC  >  ‘Case’  >  both  pieces  of  ‘Evidence’  in   chronological  order Evidence  2 laptop01  >  terribleguy.com  >  ThreatX NI  marks  laptop01  >  Suspected >  Verdict  20 Evidence  >  SIEM  >  Connection  Profiler SIEM Using  a  ‘Filter’  >  SIEM  modifies  ‘Case’ Laptop01  >  ‘Infected’  of  ‘ThreatX’  >  score  80 SOC  Notified  >  Priority  >  ThreatX on  laptop01 SOC  >  ‘Case’  >  all  ‘evidence’  in  chronologically SOC  >  hyperlink  >  NI  >  forensics. …  Evidence  12 Laptop01  >  10  +  connections  > ThreatX NI  >  Identities  Automation  via  ML NI  marks  laptop01  >  Infected  >  Verdict  80 Evidence  >  SIEM  >  Connection  Profiler Evidence  >  SIEM  >  Automation  Profiler Scenario  Timeline Best  Practice:  Integrating  NI  into  IR  Workflow SOC  Not  Chasing  Until   Infection  Is  Certain
  • 7. Scenario Data  From  NI  To  SIEM Example  ‘Case’  scenarios  in  SIEM +  laptop01 |  ThreatX |  Suspected  |  Verdict  Score  10 [CONTEXT]  [CORRELATION]  [FS  ASSET]  [FS  THREAT] Connection  Profiler  |  badguy.com |  Completed  Connection  |  Data  In  |  Data  Out  |  OS  Type  |  Timestamp +  laptop01 |  ThreatX |  Suspected |  Verdict  Score  20      [CONTEXT]  [CORRELATION]  [FS  ASSET]  [FS  THREAT] Connection  Profiler |  badguy.com |  Completed  Connection  |  Data  In  |  Data  Out  |  OS  Type  |  Timestamp  |  Other  NI  Data Connection  Profiler |  terribleguy.com |  Completed  Connection  |  Data  In  |  Data  Out  |  OS  Type  |  Timestamp  |  Other  NI  Data +  laptop01 |  ThreatX |  Infected  |  Verdict  Score  80 [CONTEXT]  [CORRELATION]  [FS  ASSET]  [FS  THREAT] Connection  Profiler |  badguy.com |  Completed  Connection  |  Data  In  |  Data  Out  |  OS  Type  |  Timestamp  |  Other  NI  Data Connection  Profiler |  terribleguy.com |  Completed  Connection  |  |  Data  In  |  Data  Out  |  OS  Type  |  Timestamp  |  Other  NI  Data Connection  Profiler |  badguy.com |  Completed  Connection  |  Data  In  |  Data  Out  |  OS  Type  |  Timestamp  |  Other  NI  Data Connection  Profiler |  terribleguy.com |  Completed  Connection  |  Data  In  |  Data  Out  |  OS  Type  |  Timestamp  |  Other  NI  Data Connection  Profiler |  badguy.com |  Completed  Connection  |  Data  In  |  Data  Out  |  OS  Type  |  Timestamp  |  Other  NI  Data Connection  Profiler |  terribleguy.com |  Completed  Connection  |  Data  In  |  Data  Out  |  OS  Type  |  Timestamp  |  Other  NI  Data Connection  Profiler |  badguy.com |  Completed  Connection  |  Data  In  |  Data  Out  |  OS  Type  |  Timestamp  |  Other  NI  Data Connection  Profiler |  terribleguy.com |  Completed  Connection  |  Data  In  |  Data  Out  |  OS  Type  |  Timestamp  |  Other  NI  Data Connection  Profiler |  badguy.com |  Completed  Connection  |  Data  In  |  Data  Out  |  OS  Type  |  Timestamp  |  Other  NI  Data Connection  Profiler |  terribleguy.com |  Completed  Connection  |  Data  In  |  Data  Out  |  OS  Type  |  Timestamp  |  Other  NI  Data Connection  Profiler |  badguy.com |  Completed  Connection  |  Data  In  |  Data  Out  |  OS  Type  |  Timestamp  |  Other  NI  Data Connection  Profiler |  terribleguy.com |  Completed  Connection  |  Data  In  |  Data  Out  |  OS  Type  |  Timestamp  |  Other  NI  Data Automation  Profiler  |  Weakly  Automated  |  Link  NI  |  Data  In  |  Data  Out  |  OS  Type  |  Timestamp  |  Other  NI  Data Legend:   “+”  means  you  can  expand  the  case  to  get  the  details  of  “Evidence”  below.   [bracket]  means  a  button  that  links  to  either  SIEM  Filtered  Data  or  NI  screens.
  • 8. Incident  Validation Best  Practice:  Maximizing  Strengths  of  NI  &  SIEMs INCIDENT SOC  Notified  >  Priority  >  ThreatX on  laptop01 Yes Maybe No SOC  Agrees  Device  Infected Proceeds  To  Response  Actions SOC  Unsure  Device  Infected Correlate  With  Events From  Other  Solutions SOC  Disagrees  Device  Infected SOC  Closes  Case NI  Updated,  But  Keeps  History
  • 9. Incident:  Yes Response  Action To  Identify  The  Correct  Response  Action,  SOC  Member  Needs  ‘Context’ SIEM  Can  Be  Setup  To  Automatically  Gather  &  Present  Context  When  “Infected”  Status  Achieved From  NI From  Other  Solutions Hostname User /  Account  Details MAC AV  Status  /  DAT Status List  of  IP  Addresses List  of  Vulnerabilities  on  Device Geo  Location  of  C&C  Traffic User  Group Status  of  Connections  to  C&C  (Completed,   Proxy  Blocked,  Blocked,  Dropped,  Failed) Device  Location Data  in  from  Threat  Actor GRC  Policies Data  out  from  Threat Actor Device  type Threat Actor  TTPs Device  OS Device OS Proxy Logs Device  Category NI  Risk  Score Rapid   Response
  • 10. Incident:  Maybe Response  Action SOC  Member  Investigates  Further  >  Hyperlink  To  NI  for  In-­‐depth  Forensics  including  PCAPs SIEM  Can  Be  Setup  To  Automatically  Gather  &  Present  Context  When  “Infected”  Status  Achieved From  NI From  Other  Solutions Hostname User /  Account  Details MAC AV  Status  /  DAT Status List  of  IP  Addresses List  of  Vulnerabilities  on  Device Geo  Location  of  C&C  Traffic User  Group Status  of  Connections  to  C&C  (Completed,   Proxy  Blocked,  Blocked,  Dropped,  Failed) Device  Location Data  in  from  Threat  Actor GRC  Policies Data  out  from  Threat Actor Device  type Threat Actor  TTPs Device  OS Device OS Proxy Logs Device  Category NI  Risk  Score Rapid   Investigation
  • 11. Incident:  No Response  Action SOC  Member  Marks  Case  Closed SIEM  >  NI  API  >  Marks  Case  Closed  In  NI NI  Retains  History  In  Event  Other  Evidence  Becomes  Available Rapid   Dismissal
  • 12. Automated  Response Best  Practice:  Rules  of  Engagement CONFIDENCE IMPACT  /  “RISK  of  DAMAGE”LOW LOWHIGH HIGH NO  RESPONSE,   CONTINUE  MONITORING AUTOMATE  RESPONSE,   CONTINUE  MONITORING AUTOMATE  RESPONSE,   CONTINUE  MONITORING SUSPECTED INFECTED OBSERVED SUSPECTED  STATE  AUTOMATED  ACTIONS q ENFORCE  ADAPTIVE  AUTHENTICATION  FOR  ACCOUNTS q RESTRICT  DEVICE  ACCESS  TO  SENSITIVE  DATA q FORCE  AV  UPDATE  AND  SCAN q INITIATE  LIGHT  FORENSIC  SCAN  OF  DEVICE q INCREASE  LOGGING q CREATE  WORKFLOW  TICKET INFECTED  STATE  AUTOMATED  ACTIONS q REMOVE  ENTITLEMENTS q QUARANTINE  DEVICE  TO  SECURITY  Z0NE q INITIATE  DEEP  FORENSIC  SCAN  OF  DEVICE q KILL  SUSPECTED  PROCESSES q LAUNCH  INCIDENT  INVESTIGATION
  • 13. Network  Insight  Response  Integrations Integration  Complete Integrations  in  Consideration
  • 14. Blue  Coat  Integration Internal   Network 1. Network  Insight  >  Discovers  infected  device,  suspected  device,  or  active  C+C  domains 2. Network  Insight  >  Dynamically  publishes  CPL  file  via  Management  Console  URL 3. ProxySG >  Automatically  checks  Damballa  CPL  file  for  updated  infected,  suspected,  and    C+C  domains 4. ProxySG >  Enforces  policies  to  take  action  -­‐ Example:  Block  internet  access  for  infected  device,  block  attempted   communications  with  bad  C&C  domains  by  infected  device,  etc. Proxy  SG Network   Insight Tap  or  Span   Port Network   Insight Tap  or  Span   Port Blue  Coat  Global   Intelligence Network
  • 15. Palo  Alto  Networks  Integration Internal   Network Tap  or  Span   Port 1. Network  Insight  >  discovers  infected  device,  suspected  device,  and/or  active  C&C  domains 2. Network  Insight  >  notifies  Dynamic  Block  List  of  device  state  and  identified  C&C  communication  attempts 3. PAN  >  implements  policies  based  on  device  state  (suspected  or  infected)  information.    (IE:  Block  infected  assets  from   communicating  to  internet  and/or  high-­‐value  assets,  enhance  logging  on  suspected  assets) 4. PAN  >  blocks  active  C&C  communication  attempts  identified  by  Network  Insight Network  Insight
  • 16. Carbon  Black  Integration Internet Endpoints NGFW Carbon    Black Network  Insight 4.  CARBON  BLACK  IDENTIFIES  PROCESS  AND  CORRESPONDING   FILE  ON  INFECTED  HOST  FOR  BREACH  RESPONSE  TEAM BREACH RESPONSE TEAM VERDICT:  INFECTED 3.  NETWORK  INSIGHT  QUESTIONS   CARBON  BLACK  FOR  PROCESS  OF  OBSERVED  NETWORK  COMMUNICATIONS 1.  NETWORK  INSIGHT  IDENTIFIES  MALICIOUS   BEHAVIORS  IN  C&C ACTIVITY AUTOMATION   |  FLUXING  |  P2P  |  HTTP  REQUESTS 1 2.  NETWORK  INSIGHT  PASSES  VERDICT  OF  INFECTED 2 3 4