SlideShare a Scribd company logo
Events Management  or  How to Survive Security Incidents Belnet Security Conference May 2010
Agenda Today's Situation How to implement a solution How to handle security incidents Examples & tools Q & A
About Xavier Mertens Senior Security Consultant @ C-CURE CISSP, CISA Security Blogger BruCON Volunteer More info? Maltego!
Introduction Some scenarios Present  Source: Real-time alerts Action: Immediate investigation Past (during last week or month) Source: Reporting Action: Adapt procedures & infrastructure Investigations (smoke signal) Source: Specific Request Action: Forensics
Today's Issues Technical Networks are complex Based on non-heterogeneous components (firewalls, IDS, proxies, etc) Millions of daily events Lot of consoles/tools Protocols & applications
Today's Issues (next) Economical ” Time is Money” Investigations must be performed in real-time Downtime may have a huge business impact Reduced staff & budgets Happy Shareholders
Today's Issues (next) Legal Compliance requirements PCI-DSS, SOX, HIPAA, etc Initiated by the group or business Local laws Due diligence & due care Security policies must be enforced!
Current Situation Organizations are using good security perimeters based on proven solutions But without a clear view and control of the infrastructure Attacks become more and more sophisticated and frequent Not prepared to deal with security incidents
Requirements To handle security incidents properly organization must rely on: Tools Procedures Upstream Downstream Continuous  (!) Event Management != Big Brother
Visibility More integration, more sources, more chances to detect a problem Integration of external source of information could help the detection of incidents Automatic vulnerability scans Import of vulnerabilities database Awareness
Know your Network Inventory Devices Protocols Users Behavior Bandwidth Usage EPS (Events per Second)
Procedures Boring but required! Back to the Basics: Input    Change management Output    Incident management Process Input Output
Change Management New devices are connected Old devices are decommissioned Users provisioning New applications are deployed Security perimeter? Still valid?
Incident Management Business first! (MTTR) Avoid decisions made urgently Keywords Understand Protect Recover Investigate
Prevention Recurrent process! Security lifecycle Require time Informations Forums Blogs Conferences
A Security Incident? Definitions An event is “ an observable change to the normal behavior of a system, environment, process, workflow or person (components). ” Incident is  “ a series of events that adversely affects the information assets of an organization ” Examples? Read the press! ;-) You will face one!
Security Convergence Physical Security  + Logical Security Example Geolocalization Users authentication + badge control
A Four-Steps Process Collection Normalization Index Storage
Three Actions Real-time alerts Reports ” Forensics” or ”smoke signals”
Architecture Devices Systems Applications Collectors Indexer Store Alerts Reports Search Long Term Storage
Need of a SOC? Yes but ... SOC or SPoC Directly depending on your organization size Starting with a dedicated person is enough Investments (time & money) Roles: Alerts, Reports, Investigate
Communication Mandatory step in the process Do not lie! Be transparant Online reputation Must be properly managed Think about shareholders The press Customers
Examples To follow... Apache Google Splunk To avoid... The ”Belgian Juweler”
Examples & Tools OSSEC OSSIM Apache mod_dlp Ngrep for basic DLP
Thank You! [email_address] http://blog.rootshell.be twitter.com/xme

More Related Content

PPSX
Next-Gen security operation center
PPTX
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
PPTX
CyberSecurity Strategy For Defendable ROI
PPTX
Security operation center
PDF
Rothke secure360 building a security operations center (soc)
PPTX
What is Security Orchestration?
PPTX
AlienVault Partner Update: So Many Security Products to Sell to My Customers…...
PDF
Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...
Next-Gen security operation center
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
CyberSecurity Strategy For Defendable ROI
Security operation center
Rothke secure360 building a security operations center (soc)
What is Security Orchestration?
AlienVault Partner Update: So Many Security Products to Sell to My Customers…...
Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...

What's hot (20)

PPTX
Security Analytics for Data Discovery - Closing the SIEM Gap
PPTX
Optimizing Security Operations: 5 Keys to Success
PPTX
Security Operation Center Fundamental
PDF
Building A Security Operations Center
PDF
Understanding security operation.pptx
PPTX
Reasoning About Enterprise Application Security in a Cloudy World
PDF
Cyber security do your part be the resistance
PPTX
Shadow Data Exposed
PDF
Security Orchestration and Automation with Hexadite+
PPTX
Comprehensive Data Leak Prevention
PDF
Defense In-Depth
PPTX
Top 10 tips for effective SOC/NOC collaboration or integration
PPTX
Web application security measures
PPTX
Rothke rsa 2012 building a security operations center (soc)
PPT
SOC presentation- Building a Security Operations Center
PPTX
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
PPTX
Security Operations Center (SOC) Essentials for the SME
PDF
DTS Solution - Building a SOC (Security Operations Center)
PDF
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
PDF
Symantec Cyber Security Services: Security Simulation
Security Analytics for Data Discovery - Closing the SIEM Gap
Optimizing Security Operations: 5 Keys to Success
Security Operation Center Fundamental
Building A Security Operations Center
Understanding security operation.pptx
Reasoning About Enterprise Application Security in a Cloudy World
Cyber security do your part be the resistance
Shadow Data Exposed
Security Orchestration and Automation with Hexadite+
Comprehensive Data Leak Prevention
Defense In-Depth
Top 10 tips for effective SOC/NOC collaboration or integration
Web application security measures
Rothke rsa 2012 building a security operations center (soc)
SOC presentation- Building a Security Operations Center
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Security Operations Center (SOC) Essentials for the SME
DTS Solution - Building a SOC (Security Operations Center)
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Symantec Cyber Security Services: Security Simulation
Ad

Similar to Belnet events management (20)

PPTX
Lecture 06 - Incident Management and SOC.pptx
PDF
CISSP Prep: Ch 8. Security Operations
PPTX
You Will Be Breached
PPTX
Wasn't expecting that! Now what?
PDF
CNIT 125 Ch 8. Security Operations
PDF
YBB-NW-distribution
ODP
Cissp Week 23
PDF
7. Security Operations
PPTX
Cyber Incident Response - When it happens, will you be ready?
PPTX
Mastering Incident Threat Detection and Response: Strategies and Best Practices
PDF
INCIDENT RESPONSE CONCEPTS
PPT
Incident handling.final
PPTX
Enterprise incident response 2017
PDF
InfoSecurity.be 2011
PPTX
Enterprise security incident management
PDF
INCIDENT RESPONSE NIST IMPLEMENTATION
PPTX
L11 Transition And Key Roles and SAT ROB IRP.pptx
PDF
File000119
PDF
CC 2-1 Incident response.pdf
PPTX
Cause 11 im final
Lecture 06 - Incident Management and SOC.pptx
CISSP Prep: Ch 8. Security Operations
You Will Be Breached
Wasn't expecting that! Now what?
CNIT 125 Ch 8. Security Operations
YBB-NW-distribution
Cissp Week 23
7. Security Operations
Cyber Incident Response - When it happens, will you be ready?
Mastering Incident Threat Detection and Response: Strategies and Best Practices
INCIDENT RESPONSE CONCEPTS
Incident handling.final
Enterprise incident response 2017
InfoSecurity.be 2011
Enterprise security incident management
INCIDENT RESPONSE NIST IMPLEMENTATION
L11 Transition And Key Roles and SAT ROB IRP.pptx
File000119
CC 2-1 Incident response.pdf
Cause 11 im final
Ad

More from Xavier Mertens (20)

PDF
FPC for the Masses (SANSFire Edition)
PDF
FPC for the Masses - CoRIIN 2018
PDF
HTTP For the Good or the Bad - FSEC Edition
PDF
Unity Makes Strength
PDF
HTTP For the Good or the Bad
PDF
Developers are from Mars, Security guys are from Venus
PDF
Building A Poor man’s Fir3Ey3 Mail Scanner
PDF
$HOME Sweet $HOME SANSFIRE Edition
PDF
Automatic MIME Attachments Triage
PDF
$HOME Sweet $HOME Devoxx 2015
PDF
$HOME Sweet $HOME
PDF
Secure Web Coding
PDF
Malware Analysis Using Free Software
PDF
Because we are just humans
PDF
You have a SIEM! And now?
PDF
What are-you-investigate-today? (version 2.0)
PDF
The BruCO"NSA" Network
PDF
What Will You Investigate Today?
PDF
Unity Makes Strength SOURCE Dublin 2013
PPT
Mobile Apps Security
FPC for the Masses (SANSFire Edition)
FPC for the Masses - CoRIIN 2018
HTTP For the Good or the Bad - FSEC Edition
Unity Makes Strength
HTTP For the Good or the Bad
Developers are from Mars, Security guys are from Venus
Building A Poor man’s Fir3Ey3 Mail Scanner
$HOME Sweet $HOME SANSFIRE Edition
Automatic MIME Attachments Triage
$HOME Sweet $HOME Devoxx 2015
$HOME Sweet $HOME
Secure Web Coding
Malware Analysis Using Free Software
Because we are just humans
You have a SIEM! And now?
What are-you-investigate-today? (version 2.0)
The BruCO"NSA" Network
What Will You Investigate Today?
Unity Makes Strength SOURCE Dublin 2013
Mobile Apps Security

Belnet events management

  • 1. Events Management or How to Survive Security Incidents Belnet Security Conference May 2010
  • 2. Agenda Today's Situation How to implement a solution How to handle security incidents Examples & tools Q & A
  • 3. About Xavier Mertens Senior Security Consultant @ C-CURE CISSP, CISA Security Blogger BruCON Volunteer More info? Maltego!
  • 4. Introduction Some scenarios Present Source: Real-time alerts Action: Immediate investigation Past (during last week or month) Source: Reporting Action: Adapt procedures & infrastructure Investigations (smoke signal) Source: Specific Request Action: Forensics
  • 5. Today's Issues Technical Networks are complex Based on non-heterogeneous components (firewalls, IDS, proxies, etc) Millions of daily events Lot of consoles/tools Protocols & applications
  • 6. Today's Issues (next) Economical ” Time is Money” Investigations must be performed in real-time Downtime may have a huge business impact Reduced staff & budgets Happy Shareholders
  • 7. Today's Issues (next) Legal Compliance requirements PCI-DSS, SOX, HIPAA, etc Initiated by the group or business Local laws Due diligence & due care Security policies must be enforced!
  • 8. Current Situation Organizations are using good security perimeters based on proven solutions But without a clear view and control of the infrastructure Attacks become more and more sophisticated and frequent Not prepared to deal with security incidents
  • 9. Requirements To handle security incidents properly organization must rely on: Tools Procedures Upstream Downstream Continuous (!) Event Management != Big Brother
  • 10. Visibility More integration, more sources, more chances to detect a problem Integration of external source of information could help the detection of incidents Automatic vulnerability scans Import of vulnerabilities database Awareness
  • 11. Know your Network Inventory Devices Protocols Users Behavior Bandwidth Usage EPS (Events per Second)
  • 12. Procedures Boring but required! Back to the Basics: Input  Change management Output  Incident management Process Input Output
  • 13. Change Management New devices are connected Old devices are decommissioned Users provisioning New applications are deployed Security perimeter? Still valid?
  • 14. Incident Management Business first! (MTTR) Avoid decisions made urgently Keywords Understand Protect Recover Investigate
  • 15. Prevention Recurrent process! Security lifecycle Require time Informations Forums Blogs Conferences
  • 16. A Security Incident? Definitions An event is “ an observable change to the normal behavior of a system, environment, process, workflow or person (components). ” Incident is “ a series of events that adversely affects the information assets of an organization ” Examples? Read the press! ;-) You will face one!
  • 17. Security Convergence Physical Security + Logical Security Example Geolocalization Users authentication + badge control
  • 18. A Four-Steps Process Collection Normalization Index Storage
  • 19. Three Actions Real-time alerts Reports ” Forensics” or ”smoke signals”
  • 20. Architecture Devices Systems Applications Collectors Indexer Store Alerts Reports Search Long Term Storage
  • 21. Need of a SOC? Yes but ... SOC or SPoC Directly depending on your organization size Starting with a dedicated person is enough Investments (time & money) Roles: Alerts, Reports, Investigate
  • 22. Communication Mandatory step in the process Do not lie! Be transparant Online reputation Must be properly managed Think about shareholders The press Customers
  • 23. Examples To follow... Apache Google Splunk To avoid... The ”Belgian Juweler”
  • 24. Examples & Tools OSSEC OSSIM Apache mod_dlp Ngrep for basic DLP
  • 25. Thank You! [email_address] http://blog.rootshell.be twitter.com/xme

Editor's Notes

  • #2: Time: 35 minutes Q&A: 5 minutes Hello and good morning. Be patient, the lunch is coming just after my presentation…
  • #3: I’ll speak about “events”. Events are normal. All your devices generate tons of events per day. But some of them may containt critical information and lead to “incident”. After an overview of the situation today in most organizations, I’ll review how to implement (basically) an event management solution. Then you’ll be able to handle security incidents. Finally, I’ll give some tips or tools to increase the detection of security incidents on your network. Of course, I’d like to make this talk interactive. Feel free to raise your hand and ask your questions.
  • #4: Well about me? I’m working for C-CURE, a consultancy company focusing on security. (based in Mechelen). Involved in several types of projects Certifications Security blogger BTW, did you know that this year will be the 2 nd edition of BruCON (24-25 sep) Otherwise, maltego me! ;-)
  • #5: Events are your source to investigate security issues. If we check on a timeline, events can be processed at different times: Present: “quicker is better”: generate an alert when a threat is detected on the network. Ex: Access denied for user root on server console Past: “does miss anything” : review the users management procedure once a week or moth Investigations: “looking for smoke signals”
  • #6: - Technical = “bits & bytes” - Complexity comes from the business (company takeover) or the requirements (security, performance, availability) Millions of events = impossible to review manually and even => human processing leads to errors! (We are “only” poor humans) Protocols & applications -> web 2.0
  • #7: “ Business is business”, organization are make to earn money. Problems detected as soon as possible -> less impact
  • #8: Local law: specific data retention requirements Due diligence: ensure that risks are identified and managed Due care: “to keep in working conditions”
  • #12: Inventory: avoid rogue devices!
  • #15: - Understand extent and source of incident – Protect sensitive data contained on systems – Protect systems/networks and their ability to continue operating as intended and recover systems – Collect information to understand what happened Without such happened. information, you may inadvertently take actions that can further damage your systems – Support legal investigations, forensics pp g g ,
  • #22: Investment : like an insurance, could be helpful “one day” SPoC = Security Point of Contact