SlideShare a Scribd company logo
From SIEM to
Security Analytics
The Path Forward
Seth Geftic, Product Marketing Manager
Steve Garrett, Product Manager

© Copyright 2012 EMC Corporation. All rights reserved.

1
Agenda
 The Shift From SIEM
 What is RSA Security Analytics
 Beyond SIEM: Intelligence Driven Security

 Intelligence Driven Security In Action

© Copyright 2012 EMC Corporation. All rights reserved.

2
The Shift Away From SIEM

© Copyright 2012 EMC Corporation. All rights reserved.

3
The purpose of SIEM has evolved
 The original purchase driver behind SIEMs were
– Satisfying compliance requirements more easily
▪ Collecting and retaining logs with less operational overhead
▪ Creating compliance reports more easily

– Troubleshooting operational problems
▪ Determining root cause of failures

 Making IDS work better was often a driver too
– The security team was deluged with IDS alerts
– Many of the IDS rules were crude and fired too often

© Copyright 2012 EMC Corporation. All rights reserved.

4
Why hasn’t SIEM lived up to
expectations?
 Things have become more complex

– IT environments have expanded
– Hackers have become more sophisticated
– IDS has become less and less relevant

 SIEMs response has been to add more log sources

– More diversity of sources (Security Device, OS, Application
etc)
– Greater volume of sources as the number of critical
systems has expanded

 But this has not solved the problem

– SIEM has not been able to scale to the volume required
– Its impractical to create correlation rules to detect every
complex threat
– Many threats no longer even have a footprint in the logs

© Copyright 2012 EMC Corporation. All rights reserved.

5
The result for organizations?
 Honeymoon period for customers post
implementation
– Compliance reports run more smoothly
– Security teams get at least *some* visibility into
activity

 Disillusionment follows for many pretty soon
after
– As team matures they start to try extract more
value from the data
– At this point, performance and correlation
limitations come to the fore
© Copyright 2012 EMC Corporation. All rights reserved.

6
Today’s tools need to adapt
 Today’s tools need to be able to detect and
investigate
– Lateral movement of threats as they gain foothold
– Covert characteristics of attack tools, techniques &
procedures
– Exfiltration or sabotage of critical data

 Today’s tools need to be able to scale
– To collect and store the volume and diversity of data
required
– To provide analytic tools to support security work
streams
– Time to respond is critical in a breach situations – and
SIEM often falls short
© Copyright 2012 EMC Corporation. All rights reserved.

7
Security Analytics & The Security
Maturity Voyage
Visibility
and
Understanding

Network
Monitoring &
Investigation

Traditional
SIEM
Compliance

Advanced
Analysis

Incident
Detection
SECURITY
ANALYTICS
Security Team
Sophistication
& Skillset

© Copyright 2012 EMC Corporation. All rights reserved.

8
Use Case Needs Grow
 Compliance + Tier 1 Security (often met with traditional
SIEM)
– Compliance requirements
– Incident detection
– Limited investigations
 Moving Beyond SIEM
– Increased visibility
– Deep forensics and investigations
– Supplement traditional SIEM
 Advanced Security Operations
– Find more sophisticated attacks
– Increased “hunting” ability
– Conduct complex data analysis for next gen SOC

© Copyright 2012 EMC Corporation. All rights reserved.

9
Today’s Security Requirements
Big Data
Infrastructure
“Need a fast and
scalable infrastructure to
conduct real time and
long term analysis”

Comprehensive
Visibility
“See everything
happening in my
environment and
normalize it”

High Powered
Analytics

Integrated
Intelligence

“Give me the speed and
smarts to detect,
investigate and prioritize
potential threats”

“Help me understand
what to look for and
what others have
discovered”

© Copyright 2012 EMC Corporation. All rights reserved.

10
What is RSA Security Analytics

© Copyright 2012 EMC Corporation. All rights reserved.

11
RSA Security Analytics
Unified platform for incident detection, investigations, compliance
reporting and advanced security analysis

SIEM
Log Parsing
Compliance Reports
Incident Alerts

© Copyright 2012 EMC Corporation. All rights reserved.

RSA Security
Analytics

Network Security
Monitoring

Full Packet Capture
Big Data Infrastructure
Capture Time Data
Comprehensive Visibility
Enrichment
High Powered Analysis
Deep Dive Investigations
Intelligence Driven Context

12
Big data security analytics:
RSA Security Analytics architecture
LIVE

Distributed
Data
Collection

Capture
Time Data
Enrichment
PARSING &
METADATA TAGGING

PACKETS

LIVE
LIVE
Reporting
& Alerting

PACKET
METADATA
LOGS

Investigation
& Forensics

Compliance
Malware
Analysis

Intelligence
Feeds
LOG
METADATA

RSA LIVE
INTELLIGENCE

Incident
Response

Endpoint
Visibility
& Analysis

Additional
Business &
IT Context

Threat Intelligence | Rules | Parsers | Alerts | Feeds | Apps | Directory Services | Reports & Custom Actions

© Copyright 2012 EMC Corporation. All rights reserved.

13
RSA Security Analytics “SIEM-like”
deployment
LIVE

Distributed
Data
Collection

Capture
Time Data
Enrichment

PARSING &
METADATA TAGGING

LOGS
LOGS

LOG
METADATA

LIVE
LIVE
Reporting
& Alerting
Investigation
& Forensics

Compliance
Malware
Analysis

Intelligence
Feeds

RSA LIVE
INTELLIGENCE

Incident
Response

Endpoint
Visibility
& Analysis

Additional
Business &
IT Context

Threat Intelligence | Rules | Parsers | Alerts | Feeds | Apps | Directory Services | Reports & Custom Actions

© Copyright 2012 EMC Corporation. All rights reserved.

14
RSA Security Analytics with a traditional
SIEM
LIVE

LIVE

Distributed
Data
Collection

LIVE

PARSING &
Capture
METADATA TAGGING

Time Data
Enrichment

Alerting
PACKETS

PACKET
METADATA

3rd Party
SIEM
Collection
LOGS

© Copyright 2012 EMC Corporation. All rights reserved.

Investigation
& Forensics

Malware
Analysis
Intel
Feeds

Alerts
Alert Triage

Investigations

Compliance
& Reporting

15
What Makes SA Different?
 Single platform for log & network security
monitoring
 Capture time data enrichment
 Superior event stream & on-request analysis
 Incorporates business and IT data, incident
response & endpoint visibility

 Operationalizes threat intelligence
 Security platform where compliance is an
outcome, not the other way around

© Copyright 2012 EMC Corporation. All rights reserved.

16
Beyond SIEM – Intelligence Driven Security

© Copyright 2012 EMC Corporation. All rights reserved.

17
What is Intelligence Driven Security?
 The process of using all the security-related
information available, both internally and
externally, to detect hidden threats and even
predict future ones.
 It is knowledge that enables an organization to
make informed risk decisions and take action.

© Copyright 2012 EMC Corporation. All rights reserved.

18
Meet the Adversary: Mr. X
Persona

Mission in Life

Tactics

Primary Data
Source(s)

Cyber Criminal,
Government
sponsored or
non-state actor

Exfiltrate any and all data available by
creating threat surface specialized for
a given target.

Malicious
Code, Social
Media,
Phishing,
Spear
Phishing

Must Have: Facebook,
LinkedIn, Malware

Mr. X

Note: Average price of a zeroday exploit generated by the
criminal underground is $25.

Mr. X has been busy:
 Combination of Waterhole Attacks with Zero Day Exploits (non-profits and think tanks)
–
–
–
–

Targeting users who visit very specific websites
Latest IE 0-day attack focused on a specific non-profit site
Downloaded and executed shellcode directly from memory, never hit disk
Dropped non-persistent (Aurora) 9002 RAT

 Multiple attack groups on the same victim, steady evolution of adversary backdoors
 NO slowdown in attack operations, very specific targeting of intelligence based on attacker
taskings (Lawsuits, Key Personnel, C-Suite, M/A activity)
 Email Exfiltration – MAPI tool, Theft of Lotus Notes Email
 Continued heavy use of Windows Service DLLs, some signed

© Copyright 2012 EMC Corporation. All rights reserved.

19
Mr. X – How Does he do it?

Ability to Detect

Your Network
A: Web App
Vulnerability

B: Drop Webshells or
Trojan Backdoor
D: Pass The Hash

C: Command
and Control

IDS

SIEM

SA

A
B
C
D

E: Seize Domain
Admin Credentials

E
F
G

H: Transmit
Stolen Data

F: Gain Access to
Trade Secrets
G: Upload
Stolen Data to
Staging Server

© Copyright 2012 EMC Corporation. All rights reserved.

H

Yes
Possible

Yes – Full Visibility
with Logs and
Packets with
Threat Intelligence

No

20
Intelligence Driven Security with
Security Analytics
A: Web App
Vulnerability

B: Drop Webshells or
Trojan Backdoor

 RSA Live Threat Intelligence May Have Identified Risk of the
Transfer as a Starting Point for Investigation

© Copyright 2012 EMC Corporation. All rights reserved.

21
Intelligence Driven Security with
Security Analytics
C: Command
and Control

Traversing Your Infrastructure
D: Pass The Hash
E: Seize Domain Admin Credentials
F: Gain Access to Trade Secrets
G: Upload Stolen Data to Staging Server

 Mr. X use a variety of techniques to communicate while traversing your
infrastructure which Security Analytics can detect and parse

– Named Pipes commonly abused (pipehello is NOT from Microsoft)
– Abuse of the Windows Task Scheduler over SMB connections via NET USE, allowing
command shell capabilities with SYSTEM privelidges

 Security Analytics combines Log Data with Packet Data for Deep Visibility

© Copyright 2012 EMC Corporation. All rights reserved.

22
Intelligence Driven Security with
Security Analytics
H: Transmit
Stolen Data

Your Network
G: Upload Stolen Data to Staging Server

 RSA Live Threat Intelligence May Have Identified Risk of the Transfer based on
Remote Host or Outbound Protocol Anomalies ( such as self-signed certs)
–
–

Security Analytics will flag these sessions as suspicious and identify where the data travelled
Event reconstruction may be possible

© Copyright 2012 EMC Corporation. All rights reserved.

23
Anyone see this Movie?

© Copyright 2011 EMC Corporation. All rights reserved.

24
Event Stream Analysis:
Intelligence Driven Security in Action

© Copyright 2011 EMC Corporation. All rights reserved.

25
Intelligence Driven Security with Security
Analytics – Event Stream Analysis
Log Decoder

Concentrator
18k EPS

• Full Visibility
LIVE

Log Decoder

Concentrator

ESA
24k EPS

– Log Data and Packet
Data normalized into
Meta Data
– Additional Context may
be added into ESA from
other business systems

LIVE

Packet Decoder

Concentrator
2 GB/s
Additional
Context

LIVE

© Copyright 2011 EMC Corporation. All rights reserved.

26
Intelligence Driven Security with Security
Analytics – Event Stream Analysis

STATIC
CONTEXT

DYNAMIC
CONTEXT

DYNAMIC
CONTEXT

• Leverage the power of ESA’s Correlation Engine to Create Dynamic Risk
Categorization using Context Windows

Suspicious Internal IP
Suspicious Internal IP
10.221.32.12
161.169.207.15
..
..
Suspicious Host Alias
Ssl-irc.scumware.org
Mirror.wikileaks.info
Updatekernal.com
…

Critical Asset List
10.100.32.10
10.100.32.104

© Copyright 2011 EMC Corporation. All rights reserved.

• Suspicious Internal Hosts IP List based on Packet Analysis and RSA
Live Threat Intel
•

As an example, any host running a named pipe such as “pipehello”

•

Entries age out after preconfigured time (8 hours for instance)

• Suspicious Host Alias List based on Packet Analysis and
RSA Live Threat Intel
• Entries age out after preconfigured time (12 hours
for instance)

• Critical Asset List may come from Feed File or CSV file
which provides Business Context
• Entries can be configured to be static and not
age out

27
Intelligence Driven Security with Security
Analytics – Event Stream Analysis
• When one of the Suspicious Hosts attempts to login on one of the Critical Assets, you
may deem this as an elevation of Risk, and choose to add the IP address of the Host
to a new list

DYNAMIC
CONTEXT

• Elevated Risk Internal IP List based on Log Data from
Domain Controller
Suspicious Internal IP
Elevated Risk Internal IP
10.221.32.12
161.169.207.15
..
..

If A->B->C AND the Host IP
address is included in the
Elevated Risk Context Window,
then tell me about it!”

© Copyright 2011 EMC Corporation. All rights reserved.

• ESA determines that a host in the Suspicious Host IP list
attempted to login to a host in the Critical Asset List
• ESA places this IP address into the Elevated Risk Internal IP
list, which can be configured to age out after a
preconfigured time

• Context Window can be referenced with the Incoming
Event Streams and used to make a more intelligent
decision to fire an Alert

28
RSA Security Analytics
• Cornerstone in the Security Operations
journey

• Flexible platform that grows with your needs
– Compliance  incident detection investigation
and forensics  advanced analysis
– From logs  packets or packets  logs

• Security platform where compliance is a
byproduct, not the other way around

© Copyright 2011 EMC Corporation. All rights reserved.

29
RSA Advanced Cyber Defense Services
A portfolio of services to help you achieve security operations excellence
• Strategy & Roadmap
Current strategy review and
recommendations for desired
future state
• Incident Response
Rapid breach response service
and SLA-based retainer
• NextGen Security Operations
SOC/CIRC evolution and security
program transformations; moving
from reactive to proactive

www.rsa.im/ACDpractice
© Copyright 2013 EMC Corporation. All rights reserved.

30
RSA Advanced Cyber Defense Training
A comprehensive learning path for security analysts
• Focus on proven
methodologies for
operating and
managing a
CIRC/SOC
• Hands-on labs
designed around
real-world use cases
and teamwork in a
CIRC/SOC
• Delivered by highly
experienced RSA
Security Practitioners

www.emc.com/rsa-training
© Copyright 2013 EMC Corporation. All rights reserved.

31
From SIEM to SA: The Path Forward
Reimagining Security Analysis:
Removing Hay vs. Digging For Needles
All Network
Traffic & Logs

Terabytes of data
100% of total

Downloads
of executables

Thousands of data points
5% of total

Type does
not match
extension

Hundreds of data points
0.2% of total

!
© Copyright 2011 EMC Corporation. All rights reserved.

Create alerts to/from
critical assets
A few dozen alerts

33
Integrated Intelligence
Know What To Look For
RSA LIVE INTELLIGENCE SYSTEM

Threat Intelligence – Rules – Parsers – Alerts – Feeds – Apps – Directory Services – Reports and Custom Actions

1

2
Gathers advanced
threat intelligence
and content

3
Aggregates &
consolidates data

Automatically
distributes
correlation rules,
blacklists, parsers,
views, feeds

OPERATIONALIZE INTELLIGENCE:
Take advantage of what others have already found and apply
against your current and historical data

© Copyright 2011 EMC Corporation. All rights reserved.

34
SA vs. SIEM
Attack Step

Traditional
SIEM

RSA Security
Analytics

Alert for access over non-standard port

No

Yes

Recreate activity of suspect IP address across
environment

No

Yes

Show user activity across AD and VPN

Yes

Yes

Alert for different credentials used for AD and
VP

Yes

Yes

Reconstruct exfiltrated data

No

Yes

© Copyright 2011 EMC Corporation. All rights reserved.

35

More Related Content

PDF
SIEM evolution
PPTX
Security Information Event Management - nullhyd
PDF
Top Cybersecurity Threats and How SIEM Protects Against Them
PPTX
7 Reasons your existing SIEM is not enough
PDF
2012-12-12 Seminar McAfee ESM
PDF
IBM QRadar Security Intelligence Overview
PPTX
Security Analytics for Data Discovery - Closing the SIEM Gap
PPTX
Identity intelligence: Threat-aware Identity and Access Management
SIEM evolution
Security Information Event Management - nullhyd
Top Cybersecurity Threats and How SIEM Protects Against Them
7 Reasons your existing SIEM is not enough
2012-12-12 Seminar McAfee ESM
IBM QRadar Security Intelligence Overview
Security Analytics for Data Discovery - Closing the SIEM Gap
Identity intelligence: Threat-aware Identity and Access Management

What's hot (20)

PDF
How to Choose the Right Security Information and Event Management (SIEM) Solu...
PDF
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
PPTX
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
PPTX
SIEM Primer:
PDF
IBM QRadar Security Intelligence Overview
PDF
SIEM vs Log Management - Data Security Solutions 2011
PDF
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
PDF
Qradar ibm partner_enablement_220212_final
PDF
Whitepaper IBM Qradar Security Intelligence
PPT
MISTI Infosec 2010- SIEM Implementation
PDF
IBM Security Intelligence
PPTX
IBM Security QRadar
PDF
IBM Qradar-Advisor
PDF
IBM Security QFlow & Vflow
PPTX
Beginner's Guide to SIEM
PDF
Security operations center 5 security controls
PDF
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
PDF
Siem Overview 2009
How to Choose the Right Security Information and Event Management (SIEM) Solu...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
SIEM Primer:
IBM QRadar Security Intelligence Overview
SIEM vs Log Management - Data Security Solutions 2011
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Qradar ibm partner_enablement_220212_final
Whitepaper IBM Qradar Security Intelligence
MISTI Infosec 2010- SIEM Implementation
IBM Security Intelligence
IBM Security QRadar
IBM Qradar-Advisor
IBM Security QFlow & Vflow
Beginner's Guide to SIEM
Security operations center 5 security controls
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Siem Overview 2009
Ad

Viewers also liked (20)

PDF
RSA: Security Analytics Architecture for APT
PDF
Next generation security analytics
PDF
Threat detection-report-backoff-pos
 
DOCX
Case Study of RSA Data Breach
PDF
RSA Anatomy of an Attack
PDF
A systematic approach to pci compliance using rsa archer
PDF
What's New Logrhythm 5.1 Data Sheet
PDF
LogRhythm Web Rhythm Data Sheet
PDF
LogRhythm Advanced Agent Data Sheet
PDF
Securityanalytics
PDF
LogRhythm Training Syllabus Data Sheet
DOCX
Archer Resource On-Demand - Kelley Boutoille
PPTX
Demo how to detect ransomware with alien vault usm_gg
PDF
8 Reasons to Choose Logrhythm
PDF
Big Data analytics
PPTX
Detecting and Blocking Suspicious Internal Network Traffic
PPTX
Introducing Oracle Audit Vault and Database Firewall
PDF
Next-Generation SIEM: Delivered from the Cloud
PDF
Activated Charcoal - Making Sense of Endpoint Data
PDF
Sony - A Crisis Management Case Study
RSA: Security Analytics Architecture for APT
Next generation security analytics
Threat detection-report-backoff-pos
 
Case Study of RSA Data Breach
RSA Anatomy of an Attack
A systematic approach to pci compliance using rsa archer
What's New Logrhythm 5.1 Data Sheet
LogRhythm Web Rhythm Data Sheet
LogRhythm Advanced Agent Data Sheet
Securityanalytics
LogRhythm Training Syllabus Data Sheet
Archer Resource On-Demand - Kelley Boutoille
Demo how to detect ransomware with alien vault usm_gg
8 Reasons to Choose Logrhythm
Big Data analytics
Detecting and Blocking Suspicious Internal Network Traffic
Introducing Oracle Audit Vault and Database Firewall
Next-Generation SIEM: Delivered from the Cloud
Activated Charcoal - Making Sense of Endpoint Data
Sony - A Crisis Management Case Study
Ad

Similar to From SIEM to SA: The Path Forward (20)

PPTX
SplunkLive! - Splunk for Security
PPTX
Splunk for Security Breakout Session
PPTX
Splunk for Enterprise Security featuring User Behavior Analytics
PDF
Accelerating Enhanced Threat Identification and Incident Investigation
PPTX
Splunk Discovery Day Düsseldorf 2016 - Splunk für Security
PPTX
Operationalizing Security Intelligence
PPTX
Enterprise Security and User Behavior Analytics
PPT
Avoiding data breach using security intelligence and big data to stay out of ...
PPTX
Is SIEM really Dead ? OR Can it evolve into a Platform ?
PDF
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
PDF
Changing the Security Monitoring Status Quo
 
PPTX
Be the Hunter
PPTX
Security Analytics and Big Data: What You Need to Know
PDF
Pivotal Data Lake Architecture & its role in security analytics
 
PPTX
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
PPTX
Operational Security Intelligence
PPTX
Splunk for Security-Hands On
PDF
SIEM evaluator guide for soc analyst
PPTX
SIEM - Your Complete IT Security Arsenal
PPTX
RuSIEM overview (english version)
SplunkLive! - Splunk for Security
Splunk for Security Breakout Session
Splunk for Enterprise Security featuring User Behavior Analytics
Accelerating Enhanced Threat Identification and Incident Investigation
Splunk Discovery Day Düsseldorf 2016 - Splunk für Security
Operationalizing Security Intelligence
Enterprise Security and User Behavior Analytics
Avoiding data breach using security intelligence and big data to stay out of ...
Is SIEM really Dead ? OR Can it evolve into a Platform ?
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
Changing the Security Monitoring Status Quo
 
Be the Hunter
Security Analytics and Big Data: What You Need to Know
Pivotal Data Lake Architecture & its role in security analytics
 
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
Operational Security Intelligence
Splunk for Security-Hands On
SIEM evaluator guide for soc analyst
SIEM - Your Complete IT Security Arsenal
RuSIEM overview (english version)

More from EMC (20)

PPTX
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
PDF
Cloud Foundry Summit Berlin Keynote
 
PPTX
EMC GLOBAL DATA PROTECTION INDEX
 
PDF
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
PDF
Citrix ready-webinar-xtremio
 
PDF
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
PPTX
EMC with Mirantis Openstack
 
PPTX
Modern infrastructure for business data lake
 
PDF
Force Cyber Criminals to Shop Elsewhere
 
PDF
Pivotal : Moments in Container History
 
PDF
Data Lake Protection - A Technical Review
 
PDF
Mobile E-commerce: Friend or Foe
 
PDF
Virtualization Myths Infographic
 
PDF
Intelligence-Driven GRC for Security
 
PDF
The Trust Paradox: Access Management and Trust in an Insecure Age
 
PDF
EMC Technology Day - SRM University 2015
 
PDF
EMC Academic Summit 2015
 
PDF
Data Science and Big Data Analytics Book from EMC Education Services
 
PDF
Using EMC Symmetrix Storage in VMware vSphere Environments
 
PDF
Using EMC VNX storage with VMware vSphereTechBook
 
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
 

Recently uploaded (20)

PDF
Mushroom cultivation and it's methods.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Hybrid model detection and classification of lung cancer
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
Tartificialntelligence_presentation.pptx
PPTX
1. Introduction to Computer Programming.pptx
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PPTX
A Presentation on Artificial Intelligence
Mushroom cultivation and it's methods.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Programs and apps: productivity, graphics, security and other tools
Encapsulation_ Review paper, used for researhc scholars
Hybrid model detection and classification of lung cancer
MIND Revenue Release Quarter 2 2025 Press Release
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
A comparative analysis of optical character recognition models for extracting...
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Tartificialntelligence_presentation.pptx
1. Introduction to Computer Programming.pptx
1 - Historical Antecedents, Social Consideration.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Web App vs Mobile App What Should You Build First.pdf
A novel scalable deep ensemble learning framework for big data classification...
Accuracy of neural networks in brain wave diagnosis of schizophrenia
A Presentation on Artificial Intelligence

From SIEM to SA: The Path Forward

  • 1. From SIEM to Security Analytics The Path Forward Seth Geftic, Product Marketing Manager Steve Garrett, Product Manager © Copyright 2012 EMC Corporation. All rights reserved. 1
  • 2. Agenda  The Shift From SIEM  What is RSA Security Analytics  Beyond SIEM: Intelligence Driven Security  Intelligence Driven Security In Action © Copyright 2012 EMC Corporation. All rights reserved. 2
  • 3. The Shift Away From SIEM © Copyright 2012 EMC Corporation. All rights reserved. 3
  • 4. The purpose of SIEM has evolved  The original purchase driver behind SIEMs were – Satisfying compliance requirements more easily ▪ Collecting and retaining logs with less operational overhead ▪ Creating compliance reports more easily – Troubleshooting operational problems ▪ Determining root cause of failures  Making IDS work better was often a driver too – The security team was deluged with IDS alerts – Many of the IDS rules were crude and fired too often © Copyright 2012 EMC Corporation. All rights reserved. 4
  • 5. Why hasn’t SIEM lived up to expectations?  Things have become more complex – IT environments have expanded – Hackers have become more sophisticated – IDS has become less and less relevant  SIEMs response has been to add more log sources – More diversity of sources (Security Device, OS, Application etc) – Greater volume of sources as the number of critical systems has expanded  But this has not solved the problem – SIEM has not been able to scale to the volume required – Its impractical to create correlation rules to detect every complex threat – Many threats no longer even have a footprint in the logs © Copyright 2012 EMC Corporation. All rights reserved. 5
  • 6. The result for organizations?  Honeymoon period for customers post implementation – Compliance reports run more smoothly – Security teams get at least *some* visibility into activity  Disillusionment follows for many pretty soon after – As team matures they start to try extract more value from the data – At this point, performance and correlation limitations come to the fore © Copyright 2012 EMC Corporation. All rights reserved. 6
  • 7. Today’s tools need to adapt  Today’s tools need to be able to detect and investigate – Lateral movement of threats as they gain foothold – Covert characteristics of attack tools, techniques & procedures – Exfiltration or sabotage of critical data  Today’s tools need to be able to scale – To collect and store the volume and diversity of data required – To provide analytic tools to support security work streams – Time to respond is critical in a breach situations – and SIEM often falls short © Copyright 2012 EMC Corporation. All rights reserved. 7
  • 8. Security Analytics & The Security Maturity Voyage Visibility and Understanding Network Monitoring & Investigation Traditional SIEM Compliance Advanced Analysis Incident Detection SECURITY ANALYTICS Security Team Sophistication & Skillset © Copyright 2012 EMC Corporation. All rights reserved. 8
  • 9. Use Case Needs Grow  Compliance + Tier 1 Security (often met with traditional SIEM) – Compliance requirements – Incident detection – Limited investigations  Moving Beyond SIEM – Increased visibility – Deep forensics and investigations – Supplement traditional SIEM  Advanced Security Operations – Find more sophisticated attacks – Increased “hunting” ability – Conduct complex data analysis for next gen SOC © Copyright 2012 EMC Corporation. All rights reserved. 9
  • 10. Today’s Security Requirements Big Data Infrastructure “Need a fast and scalable infrastructure to conduct real time and long term analysis” Comprehensive Visibility “See everything happening in my environment and normalize it” High Powered Analytics Integrated Intelligence “Give me the speed and smarts to detect, investigate and prioritize potential threats” “Help me understand what to look for and what others have discovered” © Copyright 2012 EMC Corporation. All rights reserved. 10
  • 11. What is RSA Security Analytics © Copyright 2012 EMC Corporation. All rights reserved. 11
  • 12. RSA Security Analytics Unified platform for incident detection, investigations, compliance reporting and advanced security analysis SIEM Log Parsing Compliance Reports Incident Alerts © Copyright 2012 EMC Corporation. All rights reserved. RSA Security Analytics Network Security Monitoring Full Packet Capture Big Data Infrastructure Capture Time Data Comprehensive Visibility Enrichment High Powered Analysis Deep Dive Investigations Intelligence Driven Context 12
  • 13. Big data security analytics: RSA Security Analytics architecture LIVE Distributed Data Collection Capture Time Data Enrichment PARSING & METADATA TAGGING PACKETS LIVE LIVE Reporting & Alerting PACKET METADATA LOGS Investigation & Forensics Compliance Malware Analysis Intelligence Feeds LOG METADATA RSA LIVE INTELLIGENCE Incident Response Endpoint Visibility & Analysis Additional Business & IT Context Threat Intelligence | Rules | Parsers | Alerts | Feeds | Apps | Directory Services | Reports & Custom Actions © Copyright 2012 EMC Corporation. All rights reserved. 13
  • 14. RSA Security Analytics “SIEM-like” deployment LIVE Distributed Data Collection Capture Time Data Enrichment PARSING & METADATA TAGGING LOGS LOGS LOG METADATA LIVE LIVE Reporting & Alerting Investigation & Forensics Compliance Malware Analysis Intelligence Feeds RSA LIVE INTELLIGENCE Incident Response Endpoint Visibility & Analysis Additional Business & IT Context Threat Intelligence | Rules | Parsers | Alerts | Feeds | Apps | Directory Services | Reports & Custom Actions © Copyright 2012 EMC Corporation. All rights reserved. 14
  • 15. RSA Security Analytics with a traditional SIEM LIVE LIVE Distributed Data Collection LIVE PARSING & Capture METADATA TAGGING Time Data Enrichment Alerting PACKETS PACKET METADATA 3rd Party SIEM Collection LOGS © Copyright 2012 EMC Corporation. All rights reserved. Investigation & Forensics Malware Analysis Intel Feeds Alerts Alert Triage Investigations Compliance & Reporting 15
  • 16. What Makes SA Different?  Single platform for log & network security monitoring  Capture time data enrichment  Superior event stream & on-request analysis  Incorporates business and IT data, incident response & endpoint visibility  Operationalizes threat intelligence  Security platform where compliance is an outcome, not the other way around © Copyright 2012 EMC Corporation. All rights reserved. 16
  • 17. Beyond SIEM – Intelligence Driven Security © Copyright 2012 EMC Corporation. All rights reserved. 17
  • 18. What is Intelligence Driven Security?  The process of using all the security-related information available, both internally and externally, to detect hidden threats and even predict future ones.  It is knowledge that enables an organization to make informed risk decisions and take action. © Copyright 2012 EMC Corporation. All rights reserved. 18
  • 19. Meet the Adversary: Mr. X Persona Mission in Life Tactics Primary Data Source(s) Cyber Criminal, Government sponsored or non-state actor Exfiltrate any and all data available by creating threat surface specialized for a given target. Malicious Code, Social Media, Phishing, Spear Phishing Must Have: Facebook, LinkedIn, Malware Mr. X Note: Average price of a zeroday exploit generated by the criminal underground is $25. Mr. X has been busy:  Combination of Waterhole Attacks with Zero Day Exploits (non-profits and think tanks) – – – – Targeting users who visit very specific websites Latest IE 0-day attack focused on a specific non-profit site Downloaded and executed shellcode directly from memory, never hit disk Dropped non-persistent (Aurora) 9002 RAT  Multiple attack groups on the same victim, steady evolution of adversary backdoors  NO slowdown in attack operations, very specific targeting of intelligence based on attacker taskings (Lawsuits, Key Personnel, C-Suite, M/A activity)  Email Exfiltration – MAPI tool, Theft of Lotus Notes Email  Continued heavy use of Windows Service DLLs, some signed © Copyright 2012 EMC Corporation. All rights reserved. 19
  • 20. Mr. X – How Does he do it? Ability to Detect Your Network A: Web App Vulnerability B: Drop Webshells or Trojan Backdoor D: Pass The Hash C: Command and Control IDS SIEM SA A B C D E: Seize Domain Admin Credentials E F G H: Transmit Stolen Data F: Gain Access to Trade Secrets G: Upload Stolen Data to Staging Server © Copyright 2012 EMC Corporation. All rights reserved. H Yes Possible Yes – Full Visibility with Logs and Packets with Threat Intelligence No 20
  • 21. Intelligence Driven Security with Security Analytics A: Web App Vulnerability B: Drop Webshells or Trojan Backdoor  RSA Live Threat Intelligence May Have Identified Risk of the Transfer as a Starting Point for Investigation © Copyright 2012 EMC Corporation. All rights reserved. 21
  • 22. Intelligence Driven Security with Security Analytics C: Command and Control Traversing Your Infrastructure D: Pass The Hash E: Seize Domain Admin Credentials F: Gain Access to Trade Secrets G: Upload Stolen Data to Staging Server  Mr. X use a variety of techniques to communicate while traversing your infrastructure which Security Analytics can detect and parse – Named Pipes commonly abused (pipehello is NOT from Microsoft) – Abuse of the Windows Task Scheduler over SMB connections via NET USE, allowing command shell capabilities with SYSTEM privelidges  Security Analytics combines Log Data with Packet Data for Deep Visibility © Copyright 2012 EMC Corporation. All rights reserved. 22
  • 23. Intelligence Driven Security with Security Analytics H: Transmit Stolen Data Your Network G: Upload Stolen Data to Staging Server  RSA Live Threat Intelligence May Have Identified Risk of the Transfer based on Remote Host or Outbound Protocol Anomalies ( such as self-signed certs) – – Security Analytics will flag these sessions as suspicious and identify where the data travelled Event reconstruction may be possible © Copyright 2012 EMC Corporation. All rights reserved. 23
  • 24. Anyone see this Movie? © Copyright 2011 EMC Corporation. All rights reserved. 24
  • 25. Event Stream Analysis: Intelligence Driven Security in Action © Copyright 2011 EMC Corporation. All rights reserved. 25
  • 26. Intelligence Driven Security with Security Analytics – Event Stream Analysis Log Decoder Concentrator 18k EPS • Full Visibility LIVE Log Decoder Concentrator ESA 24k EPS – Log Data and Packet Data normalized into Meta Data – Additional Context may be added into ESA from other business systems LIVE Packet Decoder Concentrator 2 GB/s Additional Context LIVE © Copyright 2011 EMC Corporation. All rights reserved. 26
  • 27. Intelligence Driven Security with Security Analytics – Event Stream Analysis STATIC CONTEXT DYNAMIC CONTEXT DYNAMIC CONTEXT • Leverage the power of ESA’s Correlation Engine to Create Dynamic Risk Categorization using Context Windows Suspicious Internal IP Suspicious Internal IP 10.221.32.12 161.169.207.15 .. .. Suspicious Host Alias Ssl-irc.scumware.org Mirror.wikileaks.info Updatekernal.com … Critical Asset List 10.100.32.10 10.100.32.104 © Copyright 2011 EMC Corporation. All rights reserved. • Suspicious Internal Hosts IP List based on Packet Analysis and RSA Live Threat Intel • As an example, any host running a named pipe such as “pipehello” • Entries age out after preconfigured time (8 hours for instance) • Suspicious Host Alias List based on Packet Analysis and RSA Live Threat Intel • Entries age out after preconfigured time (12 hours for instance) • Critical Asset List may come from Feed File or CSV file which provides Business Context • Entries can be configured to be static and not age out 27
  • 28. Intelligence Driven Security with Security Analytics – Event Stream Analysis • When one of the Suspicious Hosts attempts to login on one of the Critical Assets, you may deem this as an elevation of Risk, and choose to add the IP address of the Host to a new list DYNAMIC CONTEXT • Elevated Risk Internal IP List based on Log Data from Domain Controller Suspicious Internal IP Elevated Risk Internal IP 10.221.32.12 161.169.207.15 .. .. If A->B->C AND the Host IP address is included in the Elevated Risk Context Window, then tell me about it!” © Copyright 2011 EMC Corporation. All rights reserved. • ESA determines that a host in the Suspicious Host IP list attempted to login to a host in the Critical Asset List • ESA places this IP address into the Elevated Risk Internal IP list, which can be configured to age out after a preconfigured time • Context Window can be referenced with the Incoming Event Streams and used to make a more intelligent decision to fire an Alert 28
  • 29. RSA Security Analytics • Cornerstone in the Security Operations journey • Flexible platform that grows with your needs – Compliance  incident detection investigation and forensics  advanced analysis – From logs  packets or packets  logs • Security platform where compliance is a byproduct, not the other way around © Copyright 2011 EMC Corporation. All rights reserved. 29
  • 30. RSA Advanced Cyber Defense Services A portfolio of services to help you achieve security operations excellence • Strategy & Roadmap Current strategy review and recommendations for desired future state • Incident Response Rapid breach response service and SLA-based retainer • NextGen Security Operations SOC/CIRC evolution and security program transformations; moving from reactive to proactive www.rsa.im/ACDpractice © Copyright 2013 EMC Corporation. All rights reserved. 30
  • 31. RSA Advanced Cyber Defense Training A comprehensive learning path for security analysts • Focus on proven methodologies for operating and managing a CIRC/SOC • Hands-on labs designed around real-world use cases and teamwork in a CIRC/SOC • Delivered by highly experienced RSA Security Practitioners www.emc.com/rsa-training © Copyright 2013 EMC Corporation. All rights reserved. 31
  • 33. Reimagining Security Analysis: Removing Hay vs. Digging For Needles All Network Traffic & Logs Terabytes of data 100% of total Downloads of executables Thousands of data points 5% of total Type does not match extension Hundreds of data points 0.2% of total ! © Copyright 2011 EMC Corporation. All rights reserved. Create alerts to/from critical assets A few dozen alerts 33
  • 34. Integrated Intelligence Know What To Look For RSA LIVE INTELLIGENCE SYSTEM Threat Intelligence – Rules – Parsers – Alerts – Feeds – Apps – Directory Services – Reports and Custom Actions 1 2 Gathers advanced threat intelligence and content 3 Aggregates & consolidates data Automatically distributes correlation rules, blacklists, parsers, views, feeds OPERATIONALIZE INTELLIGENCE: Take advantage of what others have already found and apply against your current and historical data © Copyright 2011 EMC Corporation. All rights reserved. 34
  • 35. SA vs. SIEM Attack Step Traditional SIEM RSA Security Analytics Alert for access over non-standard port No Yes Recreate activity of suspect IP address across environment No Yes Show user activity across AD and VPN Yes Yes Alert for different credentials used for AD and VP Yes Yes Reconstruct exfiltrated data No Yes © Copyright 2011 EMC Corporation. All rights reserved. 35