SlideShare a Scribd company logo
Designing a Security
Intelligence Architecture

Daniel Wiley
Senior Security Consultant

©2013 Check Point Software Technologies Ltd.
You have been told that you have
an infected machine in your network…

You have seconds to make
a difference Now what?
©2013 Check Point Software Technologies Ltd.

2
Threats are always changing

Attackers are using any method available to
infiltrate networks
Attacks are moving up the network stack means
more information is needed to deal with them
Scaling tools and architecture is not simple as
you move up to threat landscape
If you have something worth stealing someone will try

©2013 Check Point Software Technologies Ltd.

3
Need architecture that adapts
• Can’t limit yourself to one function anymore

• Need versatility ability to find the right tool quickly
• Ability to layer capabilities on existing architectures

©2013 Check Point Software Technologies Ltd.

4
What does that really all mean
You need features that can adapt to
changing environments
Ability to react to attacks needs to be in real time
Need to think outside of the box sometimes
The more data the better
Sometimes you have to make the hard decisions

©2013 Check Point Software Technologies Ltd.

5
What does it take?
1

Know your environment

2

You need context

3

Build visibility into your network

4

Don’t forget Layer 7 and 8

©2013 Check Point Software Technologies Ltd.

6
This doesn’t help
Internet

Internal

©2013 Check Point Software Technologies Ltd.

7
Sounds simple but isn’t
Understand the whole Network Topology
Application Architecture is vital to defense
Network Design is vital to get the visibility you need
What do users normally do?
Can you answer the basic questions about core data flows
and business drivers?

Who are your partners

©2013 Check Point Software Technologies Ltd.

8
What does it take?
1

Know your environment

2

You need context to the data

3

Build visibility into your network

4

Don’t forget Layer 7 and 8

©2013 Check Point Software Technologies Ltd.

9
What does this all mean!

Context

• Having an IP address alone does not help
• What does the log really mean to my environment
• It’s hard to see who is actually attacking you
• Layering context is great but what do you with the data

©2013 Check Point Software Technologies Ltd.

10
How do you build context

Automated

Manual

• Geo Location

• Past Experiences

• Identity Awareness

• Application Flows

• Application Intelligence

• Business Goals and Direction

• DLP

• Relationships

• URL Filtering/Logging

• Third party information

• Hit count

• Network Architecture

• Smart Monitor/Smart Log

• Compliance Requirements

• Header Identification

• Change Control

• Machine Identification

• Lessons Learned

©2013 Check Point Software Technologies Ltd.

11
Some examples
What we used to see in a log:
Source: 1.1.1.1 Destination: 2.2.2.2 Service: TCP/80
Action: Allow
What we see now:
Source: 1.1.1.1 Destination 2.2.2.2 Service: TCP/80
User: Bob Barker Machine: PriceIsRight OS: WinXP
Browser: Chrome Server: Apache
URL: www.hackme.org/malware.exe URL Category: Hacking Site
IPS: Binary Download Country: US
Anti-Bot: reallybadstuff.v52
Packet Capture: onaplatter.exe
Action: Block
©2013 Check Point Software Technologies Ltd.

12
What does it take?
1

Know your environment

2

You need context to the data

3

Build visibility into your network

4

Don’t forget Layer 7 and 8

©2013 Check Point Software Technologies Ltd.

13
I can’t see anything
Engineer with logging in mind – The more you log
the more you can see
Ensure you are capturing all key metrics
(SmartMonitor/SNMP) at gateway and network
Learn TCPDUMP/WireShark/fw monitor

Utilize Packet Capture mode within IPS and Anti-Bot
Understand what you are capturing and why
Everything creates a log – Learn them

©2013 Check Point Software Technologies Ltd.

14
Advanced Visibility
When you identify the really nasty stuff you
need to know how to deal with it.

• Threat Emulation
• Malware Reversing
• Locating infected hosts
• Having control over network means blocking hostile code

©2013 Check Point Software Technologies Ltd.

15
What does it take?
1

Know your environment

2

You need context to the data

3

Build visibility into your network

4

Don’t forget Layer 7 and 8

©2013 Check Point Software Technologies Ltd.

16
Layer 7
Without application layer data finding
golden nugget is almost impossible

Email

Data
Exfil

Web

Anti-Bot/DLP
Application Control/URL Filtering
IPS
IP Addresses / Services / Time / Direction
©2013 Check Point Software Technologies Ltd.

17
Layer 7
Once you know the attack vectors you can trace the risk
to your network and maybe the actual attacker

Fraud
Event

Corp
Espionage

Hacking
Event

CEO
©2013 Check Point Software Technologies Ltd.

18
Layer 8 – Man humans are difficult
Without management on board having all the information
in the world won’t help
Incident Response is vital – Plan, Test, Evaluate, Repeat
Do you have a plan for interacting with law enforcement
Who is really attacking you and why
Know your gaps and try and address them

©2013 Check Point Software Technologies Ltd.

19
Core Items Need
As many blades as possible with advanced features
(Packet Capture/URL Logging/SMTP Information)
Large logging infrastructure
A Network Map

A Org Chart
SmartEvent
SmartLog
Enough resources to generate higher level data

©2013 Check Point Software Technologies Ltd.

20
Putting it all together
For any intelligence system try to answer
the following questions:
Who: Financial officer was targeted
What: Installation of malware on PC, attempted to upload Excel
spreadsheet to C&C
Where: PC location within executive zone, C&C located in Brazil
When: Over 5 month period multiple spear fishing emails
Why: After full analysis determined that excel spreadsheet would give
completive advantage to competition
Infrastructure – DLP, Anti-Bot, Anti-Virus, Endpoint, Logging, SmartEvent
©2013 Check Point Software Technologies Ltd.

21
What’s the point of all of this
Time for analysis and full understand of an event
is greatly decreased
Ability to identify who is targeted and what the risk really is
You need to make blocking decisions quickly

Talking about it over 5 days isn’t going to help
If you can react to malware events in minutes or seconds
you are doing as good as the best

©2013 Check Point Software Technologies Ltd.

22
How can you use Check Point - Gateway

• Firewall
- Advanced Logging Options such as URL logging
Log all rules

• Utilize Application Control and URL Filtering
• Identity Awareness
• Anti-Bot/Anti-Virus
- Utilize Packet Capture Ability

• IPS
- Utilize Packet Capture Ability
- Ensure advanced features are enabled on the IPS Blade
- GeoLocation

©2013 Check Point Software Technologies Ltd.

23
How can you use Check Point Management
• SmartLog
- Create predefined searches for specific events – Such as
Logon / Logoff events for Identity logs

• SmartEvent

• Endpoint
- Compliance Checks
- MD5/OS Checks
- AV Events
- Firewall Logs

©2013 Check Point Software Technologies Ltd.

24
Summary

Visibility

Advanced
Blades

Log everything
Network Map
Full Team
Envolvement

Context

Known your
environment
Understand
network
Overlay
business
requirements

Control

Create areas of
control
Management
Onboard
Builds
Intelligence

©2013 Check Point Software Technologies Ltd.

25
Thank You!

Daniel Wiley
Senior Security Consultant

©2013 Check Point Software Technologies Ltd.

More Related Content

PDF
Check point presentation june 2014
PPTX
Checkpoint Firewall Training | Checkpoint Firewall Online Course
PPTX
Multi domain security-management_technical_presentation
PPT
checkpoint
PPTX
Check Point sizing security
PPTX
Check Point Virtual Systems
PPTX
Check Point Threat emulation 2013
PPTX
Check Point: From Branch to Data Center
Check point presentation june 2014
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Multi domain security-management_technical_presentation
checkpoint
Check Point sizing security
Check Point Virtual Systems
Check Point Threat emulation 2013
Check Point: From Branch to Data Center

What's hot (20)

PPTX
Взаимодействие с Check Point Technical Support
PPTX
Detección y mitigación de amenazas con Check Point
PPTX
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
PPT
Auditing Check Point Firewalls
PDF
Defcon 22-tim-mcguffin-one-man-shop
PPTX
Checkpoint Firewall for Dummies
PDF
How to expose shortcuts in competitive poc
PDF
Check Point SandBlast and SandBlast Agent
PDF
Check point response to Cisco NGFW competitive
PDF
VIPER Labs - VOIP Security - SANS Summit
PDF
How to Choose a SandBox - Gartner
PDF
Symantec Endpoint Suite
PPTX
PPTX
Check point sandblast threat-emulation-customer-success-presentation
PPTX
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
PPTX
Mastering checkpoint-1-basic-installation
PPTX
Securing your Windows Network with the Microsoft Security Baselines
PPTX
Network Security - Real and Present Dangers
PDF
Defcon 22-gregory-pickett-abusing-software-defined-networks
Взаимодействие с Check Point Technical Support
Detección y mitigación de amenazas con Check Point
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
Auditing Check Point Firewalls
Defcon 22-tim-mcguffin-one-man-shop
Checkpoint Firewall for Dummies
How to expose shortcuts in competitive poc
Check Point SandBlast and SandBlast Agent
Check point response to Cisco NGFW competitive
VIPER Labs - VOIP Security - SANS Summit
How to Choose a SandBox - Gartner
Symantec Endpoint Suite
Check point sandblast threat-emulation-customer-success-presentation
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Mastering checkpoint-1-basic-installation
Securing your Windows Network with the Microsoft Security Baselines
Network Security - Real and Present Dangers
Defcon 22-gregory-pickett-abusing-software-defined-networks
Ad

Viewers also liked (15)

PPTX
Checkpoint r77
PPTX
Check Point NGFW
PPTX
Instalación Firewall Checkpoint R70
DOCX
Checkpoint 1 (1)
PPTX
Political checkpoint
PDF
Cp r75 firewall_admin_guide
PDF
Postgre sql +python
PPTX
Check Point. Актуальные задачи сетевой безопасности.
PPTX
Fundamentos de Banco de Dados Relacionais
PDF
Presentation cisco iron port e-mail security solution
PDF
Cambridge Checkpoint
PPTX
Malware analysis
PPT
Trends in network security feinstein - informatica64
PDF
Checkpoint ccsa r76
PDF
Maximizing SD-WAN Architecture with Service Chaining - VeloCloud
Checkpoint r77
Check Point NGFW
Instalación Firewall Checkpoint R70
Checkpoint 1 (1)
Political checkpoint
Cp r75 firewall_admin_guide
Postgre sql +python
Check Point. Актуальные задачи сетевой безопасности.
Fundamentos de Banco de Dados Relacionais
Presentation cisco iron port e-mail security solution
Cambridge Checkpoint
Malware analysis
Trends in network security feinstein - informatica64
Checkpoint ccsa r76
Maximizing SD-WAN Architecture with Service Chaining - VeloCloud
Ad

Similar to Check Point designing a security (20)

PPTX
Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...
PDF
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
PPTX
Operationalizing Security Intelligence
PPTX
Check Point Consolidation
PPTX
Intrusion detection system
PDF
FireSIGHT Management Center (FMC) slides
PPT
Anton Chuvakin on Threat and Vulnerability Intelligence
PPTX
Combating Insider Threats – Protecting Your Agency from the Inside Out
PDF
Advanced Threats and Lateral Movement Detection
PDF
Break IT Down by Josh Smith
PPTX
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
PDF
Evolving threat landscape
PPTX
The Evolution of Cybercrime
PPTX
Operational Security Intelligence
PPT
Intrusion detection 2001
PPTX
SplunkLive! - Splunk for Security
PPTX
Ga society of cpa's 2018 coastal chapter
PDF
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...
PPTX
Splunk for Security Breakout Session
PDF
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Operationalizing Security Intelligence
Check Point Consolidation
Intrusion detection system
FireSIGHT Management Center (FMC) slides
Anton Chuvakin on Threat and Vulnerability Intelligence
Combating Insider Threats – Protecting Your Agency from the Inside Out
Advanced Threats and Lateral Movement Detection
Break IT Down by Josh Smith
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
Evolving threat landscape
The Evolution of Cybercrime
Operational Security Intelligence
Intrusion detection 2001
SplunkLive! - Splunk for Security
Ga society of cpa's 2018 coastal chapter
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...
Splunk for Security Breakout Session
Today's Breach Reality, The IR Imperative, And What You Can Do About It

More from Group of company MUK (13)

PDF
Check Point Products RU
PPTX
Check Point: Securing Web 2.0
PPTX
Check Point SMB Proposition
PPTX
Check Point Mobile Security
PPTX
Check Point Ddos protector
PPTX
Check Point: Compliance Blade
PPTX
CheckPoint: Anatomy of an evolving bot
PPTX
Perfect Foundation for 2013 Security Blueprint
PPTX
Check Point: Defining Your Security blueprint
PPTX
Check Point 2013
PDF
Check Point appliances brochure 2012
PDF
Check Point Report 2013 RU
PDF
3D Security Report
Check Point Products RU
Check Point: Securing Web 2.0
Check Point SMB Proposition
Check Point Mobile Security
Check Point Ddos protector
Check Point: Compliance Blade
CheckPoint: Anatomy of an evolving bot
Perfect Foundation for 2013 Security Blueprint
Check Point: Defining Your Security blueprint
Check Point 2013
Check Point appliances brochure 2012
Check Point Report 2013 RU
3D Security Report

Recently uploaded (20)

PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Empathic Computing: Creating Shared Understanding
PDF
MIND Revenue Release Quarter 2 2025 Press Release
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Big Data Technologies - Introduction.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Cloud computing and distributed systems.
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
sap open course for s4hana steps from ECC to s4
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Chapter 3 Spatial Domain Image Processing.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
“AI and Expert System Decision Support & Business Intelligence Systems”
Programs and apps: productivity, graphics, security and other tools
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Review of recent advances in non-invasive hemoglobin estimation
Empathic Computing: Creating Shared Understanding
MIND Revenue Release Quarter 2 2025 Press Release
The AUB Centre for AI in Media Proposal.docx
Big Data Technologies - Introduction.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Cloud computing and distributed systems.
Dropbox Q2 2025 Financial Results & Investor Presentation
Building Integrated photovoltaic BIPV_UPV.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...

Check Point designing a security

  • 1. Designing a Security Intelligence Architecture Daniel Wiley Senior Security Consultant ©2013 Check Point Software Technologies Ltd.
  • 2. You have been told that you have an infected machine in your network… You have seconds to make a difference Now what? ©2013 Check Point Software Technologies Ltd. 2
  • 3. Threats are always changing Attackers are using any method available to infiltrate networks Attacks are moving up the network stack means more information is needed to deal with them Scaling tools and architecture is not simple as you move up to threat landscape If you have something worth stealing someone will try ©2013 Check Point Software Technologies Ltd. 3
  • 4. Need architecture that adapts • Can’t limit yourself to one function anymore • Need versatility ability to find the right tool quickly • Ability to layer capabilities on existing architectures ©2013 Check Point Software Technologies Ltd. 4
  • 5. What does that really all mean You need features that can adapt to changing environments Ability to react to attacks needs to be in real time Need to think outside of the box sometimes The more data the better Sometimes you have to make the hard decisions ©2013 Check Point Software Technologies Ltd. 5
  • 6. What does it take? 1 Know your environment 2 You need context 3 Build visibility into your network 4 Don’t forget Layer 7 and 8 ©2013 Check Point Software Technologies Ltd. 6
  • 7. This doesn’t help Internet Internal ©2013 Check Point Software Technologies Ltd. 7
  • 8. Sounds simple but isn’t Understand the whole Network Topology Application Architecture is vital to defense Network Design is vital to get the visibility you need What do users normally do? Can you answer the basic questions about core data flows and business drivers? Who are your partners ©2013 Check Point Software Technologies Ltd. 8
  • 9. What does it take? 1 Know your environment 2 You need context to the data 3 Build visibility into your network 4 Don’t forget Layer 7 and 8 ©2013 Check Point Software Technologies Ltd. 9
  • 10. What does this all mean! Context • Having an IP address alone does not help • What does the log really mean to my environment • It’s hard to see who is actually attacking you • Layering context is great but what do you with the data ©2013 Check Point Software Technologies Ltd. 10
  • 11. How do you build context Automated Manual • Geo Location • Past Experiences • Identity Awareness • Application Flows • Application Intelligence • Business Goals and Direction • DLP • Relationships • URL Filtering/Logging • Third party information • Hit count • Network Architecture • Smart Monitor/Smart Log • Compliance Requirements • Header Identification • Change Control • Machine Identification • Lessons Learned ©2013 Check Point Software Technologies Ltd. 11
  • 12. Some examples What we used to see in a log: Source: 1.1.1.1 Destination: 2.2.2.2 Service: TCP/80 Action: Allow What we see now: Source: 1.1.1.1 Destination 2.2.2.2 Service: TCP/80 User: Bob Barker Machine: PriceIsRight OS: WinXP Browser: Chrome Server: Apache URL: www.hackme.org/malware.exe URL Category: Hacking Site IPS: Binary Download Country: US Anti-Bot: reallybadstuff.v52 Packet Capture: onaplatter.exe Action: Block ©2013 Check Point Software Technologies Ltd. 12
  • 13. What does it take? 1 Know your environment 2 You need context to the data 3 Build visibility into your network 4 Don’t forget Layer 7 and 8 ©2013 Check Point Software Technologies Ltd. 13
  • 14. I can’t see anything Engineer with logging in mind – The more you log the more you can see Ensure you are capturing all key metrics (SmartMonitor/SNMP) at gateway and network Learn TCPDUMP/WireShark/fw monitor Utilize Packet Capture mode within IPS and Anti-Bot Understand what you are capturing and why Everything creates a log – Learn them ©2013 Check Point Software Technologies Ltd. 14
  • 15. Advanced Visibility When you identify the really nasty stuff you need to know how to deal with it. • Threat Emulation • Malware Reversing • Locating infected hosts • Having control over network means blocking hostile code ©2013 Check Point Software Technologies Ltd. 15
  • 16. What does it take? 1 Know your environment 2 You need context to the data 3 Build visibility into your network 4 Don’t forget Layer 7 and 8 ©2013 Check Point Software Technologies Ltd. 16
  • 17. Layer 7 Without application layer data finding golden nugget is almost impossible Email Data Exfil Web Anti-Bot/DLP Application Control/URL Filtering IPS IP Addresses / Services / Time / Direction ©2013 Check Point Software Technologies Ltd. 17
  • 18. Layer 7 Once you know the attack vectors you can trace the risk to your network and maybe the actual attacker Fraud Event Corp Espionage Hacking Event CEO ©2013 Check Point Software Technologies Ltd. 18
  • 19. Layer 8 – Man humans are difficult Without management on board having all the information in the world won’t help Incident Response is vital – Plan, Test, Evaluate, Repeat Do you have a plan for interacting with law enforcement Who is really attacking you and why Know your gaps and try and address them ©2013 Check Point Software Technologies Ltd. 19
  • 20. Core Items Need As many blades as possible with advanced features (Packet Capture/URL Logging/SMTP Information) Large logging infrastructure A Network Map A Org Chart SmartEvent SmartLog Enough resources to generate higher level data ©2013 Check Point Software Technologies Ltd. 20
  • 21. Putting it all together For any intelligence system try to answer the following questions: Who: Financial officer was targeted What: Installation of malware on PC, attempted to upload Excel spreadsheet to C&C Where: PC location within executive zone, C&C located in Brazil When: Over 5 month period multiple spear fishing emails Why: After full analysis determined that excel spreadsheet would give completive advantage to competition Infrastructure – DLP, Anti-Bot, Anti-Virus, Endpoint, Logging, SmartEvent ©2013 Check Point Software Technologies Ltd. 21
  • 22. What’s the point of all of this Time for analysis and full understand of an event is greatly decreased Ability to identify who is targeted and what the risk really is You need to make blocking decisions quickly Talking about it over 5 days isn’t going to help If you can react to malware events in minutes or seconds you are doing as good as the best ©2013 Check Point Software Technologies Ltd. 22
  • 23. How can you use Check Point - Gateway • Firewall - Advanced Logging Options such as URL logging Log all rules • Utilize Application Control and URL Filtering • Identity Awareness • Anti-Bot/Anti-Virus - Utilize Packet Capture Ability • IPS - Utilize Packet Capture Ability - Ensure advanced features are enabled on the IPS Blade - GeoLocation ©2013 Check Point Software Technologies Ltd. 23
  • 24. How can you use Check Point Management • SmartLog - Create predefined searches for specific events – Such as Logon / Logoff events for Identity logs • SmartEvent • Endpoint - Compliance Checks - MD5/OS Checks - AV Events - Firewall Logs ©2013 Check Point Software Technologies Ltd. 24
  • 25. Summary Visibility Advanced Blades Log everything Network Map Full Team Envolvement Context Known your environment Understand network Overlay business requirements Control Create areas of control Management Onboard Builds Intelligence ©2013 Check Point Software Technologies Ltd. 25
  • 26. Thank You! Daniel Wiley Senior Security Consultant ©2013 Check Point Software Technologies Ltd.