SlideShare a Scribd company logo
End-to-End Security Analytics
with the Elastic Stack
Matteo Rebeschini
Solutions Architect - Security Specialist
Elastic{ON} Denver
October 30, 2018
Security is hard
3
Attacks are inevitable
Trends & Challenges
Scalability is
more than a
checkbox
Impact
• Speed suffers at scale
• Restricts ad hoc
exploration
Security Data
Exploding
# 1
Scalability is
more than a
checkbox
New threats
every day
# 2 Impact
• SIEM rules fall short
• Time to detection is crucial
Scalability is
more than a
checkbox
Volume pricing
not viable
# 3 Impact
• Forced to throw away data
• Limits security coverage
The Elastic Edge
Scalability is
more than a
checkbox
Elastic Edge
• Scalable from start
• Distributed by design
• Real time at scale
Security Data
Exploding
# 1
Scalability is
more than a
checkbox
New threats
every day
# 2 Elastic Edge
• Everything is indexed
• Snappy search at scale
• Do more with machine learning
Scalability is
more than a
checkbox
Volume pricing
not viable
# 3 Elastic Edge
• Not volume-based pricing
• Store & search everything
• Limited only by your creativity
Cybersecurity Maturity Model
Phase I
Security Event
Management
Phase II
Automation
Phase III
Proactive Analytics
Security Event Management
Foundation for Effective Security Analysis
Phase I
Security Event
Management
• Collect all parts of the puzzle
• Normalize for aggregation and correlation across sources
• Enrich to extend attributes available for analysis
• Index data for fast search and analytics
Security Event Management
Collect Normalize Enrich Index
Collection from All Data Sources
Domain
Data
Sources
Timing Tools
Network
PCAP,
Bro,
NetFlow
Real time, Packet-based
Packetbeat
Logstash (netflow module)
Application Logs Real-time, Event-based
Filebeat
Logstash
Cloud Logs, API Real-time, Event-based
Beats
Logstash
Host
System
State,
Signature
Alert
Real-time, Asynchronous
Auditbeat
Filebeat (Osquery module)
Winlogbeat
Active Scanning User-driven, Asynchronous Vulnerability Scanners
Normalization
● Defines a common set of fields for
ingesting data into Elasticsearch.
● Helps you correlate data from
different log source types
● Designed to be extensible
● Details and community feedback @
https://github.com/elastic/ecs
Using Elastic Common Schema (ECS)
Normalization and Enrichment
Kibana
Beats
Logstash Elasticsearch
Datastore Web APIs
Ingest Nodes (X)
Using Beats and/or Logstash
FileBeat
Log Files
MetricBeat
Metrics
PacketBeat
Network Data
WinLogBeat
Window Events
Plus, more than 30 community Beats and growing…
HeartBeat
Uptime Monitoring
AuditBeat
Audit Data
Logstash
Inputs
Beats
…
…
JDBC
…
…
TCP
UDP
HTTP
Filters
Extract Fields
Geo Enrich
Lookup Enrich
DNS Lookups
Pattern Matching
ArcSight Codec
…Network / Security Data
Syslog Servers
Infra / App Data
IoT / Sensors
Persistent Disk Based
Queues
Normalization and Enrichment
Beats
Outputs
Elasticsearch
…
…
…
…
…
Kafka
RabbitMQ
RDBMS
Centralized
Configuration Management
Elasticsearch
Using Logstash
Automation
For Faster Detection and Response
Phase II
Automation
Alerting on Threats
The Mechanics of a Watch
Detecting anomalies with threshold-based alerts is
hard!
• Defining “normal” via static thresholds is hard
• Rules don’t evolve with data / infrastructure
• Rules can be bypassed
What’s the right threshold?
Understand
Seasonality
Reduce False
Positives
Avoid Manual
Threshold
Revision
The advantages of anomaly-driven alerting
Identify
Areas of
Focus
Using Machine Learning
Integrating Alerts with Other Systems
Robotic Process Automation
Security Applications
SDN Switches
Messaging Services
Issue Tracking Services
Elasticsearch
Proactive Analytics
Be the Hunter Phase III
Proactive Analytics
Behavior Analytics
Entity Profiling with Machine Learning
When something behaves like itself
Monday
Tuesday
Wednesday
Thursday
When something behaves like its peers
Host Behavior
• Free disk space lower than average
• Unusual log entries
Network Behavior
• Unusual connections between hosts
• Higher than average data transfer
Application Behavior
• Service response time abnormally high
• Dropped connections exceed normal
When Behavior Matters
User Behavior
• Unusual authentication activity
• Unusual file access
What is Threat
Hunting?
Surveillance & Reconnaissance
oriented on the adversary which
is informed by Intelligence.
Threat Modeling
Who is your
adversary?
What is their
motivation?
What is the impact
of a successful attack?
What are they
targeting?
Developing and testing hypothesis
What are you looking
for?
Hypothesis Investigation
New
Patterns
and IOA
IOCs
Inform
and
Enrich
Different data sets Identify the patterns Feed the IOCs back
create new alerts to
improve the speed of the
detection
Operations IntelligenceIntelligence
The Intelligence Feedback Loop
Speed is imperative…
Reduce Cognitive Load
The Elastic Stack Enables Quick Iteration
Speed is King
Eliminate blind
spots by using all
your data
Investigate threats
more quickly and
efficiently
Reduce dwell
time by
identifying
threats earlier
Cybersecurity Maturity Model
Phase I
Security Event
Management
Phase II
Automation
Phase III
Proactive Analytics
www.elastic.co

More Related Content

PDF
Cybersecurity roadmap : Global healthcare security architecture
PPTX
Introduction to Azure monitor
PDF
Elastic SIEM (Endpoint Security)
PPTX
QRadar, ArcSight and Splunk
PPTX
IBM Security QRadar
PPTX
Security Information and Event Managemen
PPTX
SIEM Primer:
PPTX
Beginner's Guide to SIEM
Cybersecurity roadmap : Global healthcare security architecture
Introduction to Azure monitor
Elastic SIEM (Endpoint Security)
QRadar, ArcSight and Splunk
IBM Security QRadar
Security Information and Event Managemen
SIEM Primer:
Beginner's Guide to SIEM

What's hot (20)

PDF
Empower Your Security Practitioners with Elastic SIEM
PDF
Cybersecurity Roadmap Development for Executives
PPTX
Fortinet Corporate Overview Deck.pptx
PDF
Secure by Design - Security Design Principles for the Rest of Us
PPTX
IBM QRadar BB & Rules
PDF
IBM QRadar Security Intelligence Overview
PDF
Enterprise Security Architecture for Cyber Security
PDF
Building A Security Operations Center
PPTX
Technology Overview - Symantec Data Loss Prevention (DLP)
PPTX
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
PPTX
Azure Sentinel
PPSX
Next-Gen security operation center
PDF
What is SIEM? A Brilliant Guide to the Basics
PPTX
SIEM - Activating Defense through Response by Ankur Vats
PPTX
Security Information and Event Management (SIEM)
PDF
IBM Qradar & resilient
PPTX
IBM Q-radar security intelligence roadmap
PPTX
Cyber Threat Hunting Workshop
PPTX
DEVSECOPS.pptx
Empower Your Security Practitioners with Elastic SIEM
Cybersecurity Roadmap Development for Executives
Fortinet Corporate Overview Deck.pptx
Secure by Design - Security Design Principles for the Rest of Us
IBM QRadar BB & Rules
IBM QRadar Security Intelligence Overview
Enterprise Security Architecture for Cyber Security
Building A Security Operations Center
Technology Overview - Symantec Data Loss Prevention (DLP)
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
Azure Sentinel
Next-Gen security operation center
What is SIEM? A Brilliant Guide to the Basics
SIEM - Activating Defense through Response by Ankur Vats
Security Information and Event Management (SIEM)
IBM Qradar & resilient
IBM Q-radar security intelligence roadmap
Cyber Threat Hunting Workshop
DEVSECOPS.pptx
Ad

Similar to End-to-End Security Analytics with the Elastic Stack (20)

PDF
Network security monitoring elastic webinar - 16 june 2021
PPTX
c0c0n Elastic Security Workshop - 7.7 [Elastic SIEM].pptx
PDF
Elastic Security Brochure
PDF
Security Analytics using ELK stack
PPTX
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
PPTX
How Elastic Security Meets SOC Needs
PDF
Elastic Security : Protéger son entreprise avec la Suite Elastic
PDF
Analyse de sécurité de bout en bout avec la Suite Elastic
PDF
Empower your security practitioners with the Elastic Stack
PPTX
Elasticsearch features and ecosystem
PDF
Security threat analysis points for enterprise with oss
PDF
Reinventing enterprise defense with the Elastic Stack
PDF
Finding the needle in the haystack: how Nestle is leveraging big data to defe...
PDF
Visualization in the Age of Big Data
PDF
Reinventing enterprise defense with the Elastic Stack
PDF
Oscar Cabanillas - Elastic - OSL19
PDF
Automatize a detecção de ameaças e evite falsos positivos
PDF
Free and open cloud security posture monitoring
PDF
Automate threat detections and avoid false positives
PDF
Threat Hunting with Elastic at SpectorOps: Welcome to HELK
Network security monitoring elastic webinar - 16 june 2021
c0c0n Elastic Security Workshop - 7.7 [Elastic SIEM].pptx
Elastic Security Brochure
Security Analytics using ELK stack
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
How Elastic Security Meets SOC Needs
Elastic Security : Protéger son entreprise avec la Suite Elastic
Analyse de sécurité de bout en bout avec la Suite Elastic
Empower your security practitioners with the Elastic Stack
Elasticsearch features and ecosystem
Security threat analysis points for enterprise with oss
Reinventing enterprise defense with the Elastic Stack
Finding the needle in the haystack: how Nestle is leveraging big data to defe...
Visualization in the Age of Big Data
Reinventing enterprise defense with the Elastic Stack
Oscar Cabanillas - Elastic - OSL19
Automatize a detecção de ameaças e evite falsos positivos
Free and open cloud security posture monitoring
Automate threat detections and avoid false positives
Threat Hunting with Elastic at SpectorOps: Welcome to HELK
Ad

More from Elasticsearch (20)

PDF
An introduction to Elasticsearch's advanced relevance ranking toolbox
PDF
From MSP to MSSP using Elastic
PDF
Cómo crear excelentes experiencias de búsqueda en sitios web
PDF
Te damos la bienvenida a una nueva forma de realizar búsquedas
PDF
Tirez pleinement parti d'Elastic grâce à Elastic Cloud
PDF
Comment transformer vos données en informations exploitables
PDF
Plongez au cœur de la recherche dans tous ses états.
PDF
Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]
PDF
An introduction to Elasticsearch's advanced relevance ranking toolbox
PDF
Welcome to a new state of find
PDF
Building great website search experiences
PDF
Keynote: Harnessing the power of Elasticsearch for simplified search
PDF
Cómo transformar los datos en análisis con los que tomar decisiones
PDF
Explore relève les défis Big Data avec Elastic Cloud
PDF
Comment transformer vos données en informations exploitables
PDF
Transforming data into actionable insights
PDF
Opening Keynote: Why Elastic?
PDF
Empowering agencies using Elastic as a Service inside Government
PDF
The opportunities and challenges of data for public good
PDF
Enterprise search and unstructured data with CGI and Elastic
An introduction to Elasticsearch's advanced relevance ranking toolbox
From MSP to MSSP using Elastic
Cómo crear excelentes experiencias de búsqueda en sitios web
Te damos la bienvenida a una nueva forma de realizar búsquedas
Tirez pleinement parti d'Elastic grâce à Elastic Cloud
Comment transformer vos données en informations exploitables
Plongez au cœur de la recherche dans tous ses états.
Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]
An introduction to Elasticsearch's advanced relevance ranking toolbox
Welcome to a new state of find
Building great website search experiences
Keynote: Harnessing the power of Elasticsearch for simplified search
Cómo transformar los datos en análisis con los que tomar decisiones
Explore relève les défis Big Data avec Elastic Cloud
Comment transformer vos données en informations exploitables
Transforming data into actionable insights
Opening Keynote: Why Elastic?
Empowering agencies using Elastic as a Service inside Government
The opportunities and challenges of data for public good
Enterprise search and unstructured data with CGI and Elastic

Recently uploaded (20)

PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Modernizing your data center with Dell and AMD
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
KodekX | Application Modernization Development
PPTX
MYSQL Presentation for SQL database connectivity
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Understanding_Digital_Forensics_Presentation.pptx
cuic standard and advanced reporting.pdf
Network Security Unit 5.pdf for BCA BBA.
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Encapsulation_ Review paper, used for researhc scholars
Mobile App Security Testing_ A Comprehensive Guide.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Modernizing your data center with Dell and AMD
Reach Out and Touch Someone: Haptics and Empathic Computing
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Empathic Computing: Creating Shared Understanding
Diabetes mellitus diagnosis method based random forest with bat algorithm
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Building Integrated photovoltaic BIPV_UPV.pdf
KodekX | Application Modernization Development
MYSQL Presentation for SQL database connectivity

End-to-End Security Analytics with the Elastic Stack