SlideShare a Scribd company logo
An Incident Response
Playbook: From
Monitoring to
Operations
Dave Shackleford, Voodoo Security and SANS
Joe Schreiber, AlienVault
© 2014 The SANS™ Institute - www.sans.org
Introduction
• The range and sophistication of
today’s attacks are growing
rapidly
• More and more organizations are
dedicating resources to detection
and response tools and processes
– Less effort and money is spent on
purely “preventive” measures
• We’ll explore a number of
different types of incidents, as
well as indicators and
monitoring/response process
considerations
© 2014 The SANS™ Institute - www.sans.org
2
Use What for What?
• Right Tool -> Right Job
• Right Job -> Right Skills
• Right Skills -> Right Response
• Right Response -> [right]
Incident
© 2014 The SANS™ Institute - www.sans.org
3
How do I know which response?
© 2014 The SANS™ Institute - www.sans.org
4
Make Plans.
• Be prepared for an incident
– Create several plans based on
incident type
– Have a contact methodology
– Escalation Paths
• So you have a plan?
– What’s your backup?
– Be Flexible
• Time is against you
• Outside Help
– Pre-arrange services or consultants
© 2014 The SANS™ Institute - www.sans.org
5
What if I’m missing something?
• Use the Internet
– IOCs
– Threat Reputation
– Malware Analyzers
– Virus Scanners
• Community Efforts
– Open source tools
– Message Boards
© 2014 The SANS™ Institute - www.sans.org
6
Attack Types and Responses
• Sensitive Data
• Malware
• Insider
• Web Application
© 2014 The SANS™ Institute - www.sans.org
7
Sensitive Data Exposure/Exfiltration
• Data loss and exposure is one of
the top concerns and incident
types facing organizations today
• In the 2014 Verizon DBIR, 1367
data loss incidents were
investigated
• Most security
teams have
been focused
on data loss in
some way
since 2005-6.
© 2014 The SANS™ Institute - www.sans.org
8
Indicators of sensitive data
exposure
• A number of leading indicators
can lead to detection of exposure
or exfiltration
• Human-based:
– Fraud alerts or identity theft
– Notification from 3rd parties
– Extortion attempts
• Data indicators:
– DLP alerts
– Proxy logs
– Firewall/IDS/IPS events
© 2014 The SANS™ Institute - www.sans.org
9
Operations for Data Exposure
Incidents
• Specific operational steps to be
considered for IR with data
exposure:
– First, unless directed by law
enforcement, stop the leak! (if
known how/where)
– Determine who and what is
affected then coordinate with
HR/legal/PR
– Leverage DLP or other monitoring
tools to pattern match data types
stored and in transit
© 2014 The SANS™ Institute - www.sans.org
10
Advanced Malware Incidents
• Not all malware incidents are
advanced
– Standard antivirus and host-based
tools still catch many variants
• Some malware is much more
stealthy and sophisticated,
however
– Malware sandboxes, behavioral
monitoring, and forensics
techniques and tools may be
needed
© 2014 The SANS™ Institute - www.sans.org
11
Indicators of Advanced Malware
• Advanced malware may be
detected with a number of
indicators:
– Unusual processes or services on
hosts
– Known malicious registry keys and
entries
– File names or attributes
– Network traffic signatures and
patterns (ports, protocols, etc.)
– Sandbox detonation events
© 2014 The SANS™ Institute - www.sans.org
12
Operations for Advanced Malware
Incidents
• Response processes for advanced
malware incidents should include:
– Quarantine capabilities (host and
network)
– Volatile forensic data capture
– Rapid development of IOC
“fingerprints” to propagate to
additional systems
– Data leak response steps
– Reverse engineering
© 2014 The SANS™ Institute - www.sans.org
13
Insider Incidents
• Insider incidents can be some of
the most challenging to detect
and respond to
• Insider threats can lead to other
types of incidents (data loss,
destruction/availability, etc.)
• Always coordinate with
HR and legal teams for
insider threat response
• Many insider attacks are
not that advanced…just
hard to detect
© 2014 The SANS™ Institute - www.sans.org
14
Indicators of Insider Incidents
• Insider indicators may be more
challenging to detect:
– Disgruntled behavior
– Unusual pattern of file/data access
– Changes in working hours or behavior
– Disregard for policies and procedures
– Account logon failures and unusual
patterns
– Traffic from personal/work systems
– Unusual system command use or
attempts at privilege escalation
© 2014 The SANS™ Institute - www.sans.org
15
Operations for Insider Incidents
• Response processes for insider
incidents should include:
– Inclusion of law enforcement (maybe) and
HR/legal (definitely)
– Rapid root cause analysis
• Was it accidental? A system hijack? Or
deliberate?
– Account monitoring
– Privilege revocation (maybe)
– Equipment seizure when possible
– Forensic analysis
– Risk analysis
© 2014 The SANS™ Institute - www.sans.org
16
Web Application Incidents
• Web app attacks are more
common than ever
• These attacks can lead to
defacement and reputation
impact, as well as data exposure
• Application security often lags
network and infrastructure
controls
• Many open source components, or
products like CMS platforms, are
notoriously vulnerable
© 2014 The SANS™ Institute - www.sans.org
17
Indicators of Web
Application Incidents
• Web application attacks and
breaches may exhibit the following
indicators:
– Unusual behavior or crashes in
applications
– Web and app server logs of repeated
access attempts
– Web and app server logs of SQL
syntax and/or scripting characters
– IDS/IPS events for known app attacks
– High local resource utilization on Web
and app servers
– Web app firewall events for behavioral
or signature-based attacks
© 2014 The SANS™ Institute - www.sans.org
18
Operations for Web
Application Incidents
• Response processes for Web App
incidents may include:
– Coordination with server
operations/admin teams and
possibly development teams
– Web app firewall or application
filtering commands/rules
– Load balancer and proxy redirection
and traffic control
– Correlation between presentation
and persistent tier traffic and
account data
© 2014 The SANS™ Institute - www.sans.org
19
Conclusion
• There are a lot of ways to detect
and respond to incidents today
• Many types of incidents have
common tools and processes
– Most have their own specific
differences, however
• Security monitoring and response
teams can always enhance their
capabilities with new events,
correlation, and IOCs from inside
and outside their networks
© 2014 The SANS™ Institute - www.sans.org
20
Powered by
AV Labs Threat
Intelligence
AlienVault
USMTM
ASSET DISCOVERY
• Active Network Scanning
• Passive Network Scanning
• Asset Inventory
• Host-based Software
Inventory
VULNERABILITY ASSESSMENT
• Continuous
Vulnerability Monitoring
• Authenticated /
Unauthenticated Active
Scanning
BEHAVIORAL MONITORING
• Log Collection
• Netflow Analysis
• Service Availability
Monitoring
THREAT DETECTION
• Network IDS
• Host IDS
• Wireless IDS
• File Integrity Monitoring
A Unified Approach
SECURITY INTELLIGENCE
• SIEM Event Correlation
• Incident Response
Coordinated Analysis, Actionable Guidance
• 200-350,000 IPs validated daily
• 8,000 collection points
• 140 countries
Collaborative Threat Intelligence:
AlienVault Open Threat ExchangeTM
(OTX)
Join OTX: www.alienvault.com/open-threat-exchange
Questions?
Q@SANS.ORG
Thank You!
© 2014 The SANS™ Institute - www.sans.org
23
Three Ways to Test Drive
AlienVault USM
Download a Free 30-Day Trial
http://www.alienvault.com/free-trial
Try our Interactive Demo
http://www.alienvault.com/live-demo-site
Join us for a LIVE Demo!
http://www.alienvault.com/marketing/ali
envault-usm-live-demo

More Related Content

PPTX
Security Operation Center - Design & Build
PDF
Overview of Data Loss Prevention (DLP) Technology
PPSX
Next-Gen security operation center
PPTX
Intro to Security in SDLC
PDF
Incident Response Swimlanes
PPTX
Threat modeling web application: a case study
PDF
Rothke secure360 building a security operations center (soc)
PDF
Understanding Cyber Attack - Cyber Kill Chain.pdf
Security Operation Center - Design & Build
Overview of Data Loss Prevention (DLP) Technology
Next-Gen security operation center
Intro to Security in SDLC
Incident Response Swimlanes
Threat modeling web application: a case study
Rothke secure360 building a security operations center (soc)
Understanding Cyber Attack - Cyber Kill Chain.pdf

What's hot (20)

PPTX
Splunk Overview
PDF
Building Security Operation Center
PDF
Data Loss Prevention: Challenges, Impacts & Effective Strategies
PPTX
Threat Hunting - Moving from the ad hoc to the formal
PDF
Building an effective Information Security Roadmap
PPTX
Cyber Defense Matrix: Reloaded
PPTX
NIST CyberSecurity Framework: An Overview
PDF
Building a Next-Generation Security Operations Center (SOC)
PDF
Security architecture - Perform a gap analysis
PPTX
Effective Security Operation Center - present by Reza Adineh
PDF
NIST Cybersecurity Framework 101
PPTX
Putting MITRE ATT&CK into Action with What You Have, Where You Are
PDF
DTS Solution - Building a SOC (Security Operations Center)
PPTX
Introduction to FAIR - Factor Analysis of Information Risk
PPTX
Privileged Access Management (PAM)
PDF
Security operations center-SOC Presentation-مرکز عملیات امنیت
PPT
Data loss prevention (dlp)
PDF
State of the ATT&CK
PDF
Cybersecurity roadmap : Global healthcare security architecture
PDF
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Splunk Overview
Building Security Operation Center
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Threat Hunting - Moving from the ad hoc to the formal
Building an effective Information Security Roadmap
Cyber Defense Matrix: Reloaded
NIST CyberSecurity Framework: An Overview
Building a Next-Generation Security Operations Center (SOC)
Security architecture - Perform a gap analysis
Effective Security Operation Center - present by Reza Adineh
NIST Cybersecurity Framework 101
Putting MITRE ATT&CK into Action with What You Have, Where You Are
DTS Solution - Building a SOC (Security Operations Center)
Introduction to FAIR - Factor Analysis of Information Risk
Privileged Access Management (PAM)
Security operations center-SOC Presentation-مرکز عملیات امنیت
Data loss prevention (dlp)
State of the ATT&CK
Cybersecurity roadmap : Global healthcare security architecture
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Ad

Viewers also liked (17)

PPTX
Incident Response Triage
PPTX
The Six Stages of Incident Response
PPTX
Cyber incident response or how to avoid long hours of testimony
PDF
Irm 6-website-defacement
PDF
Mandatory data breach notification for Australia
PPTX
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
PPS
Keeping Client Data Safe (Final)
PDF
The Incident Response Playbook for Android and iOS
DOCX
SEC440: Incident Response Plan
PDF
Monitoramento com ELK - Elasticsearch - Logstash - Kibana
PPTX
Data breach presentation
PDF
Neptune : Re-thinking Incident Response Automation
PDF
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
PDF
Craft Your Cyber Incident Response Plan (Before It's Too Late)
PDF
Incident Response: How To Prepare
PDF
M-Trends® 2013: Attack the Security Gap
PPTX
Cisco OpenSOC
Incident Response Triage
The Six Stages of Incident Response
Cyber incident response or how to avoid long hours of testimony
Irm 6-website-defacement
Mandatory data breach notification for Australia
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Keeping Client Data Safe (Final)
The Incident Response Playbook for Android and iOS
SEC440: Incident Response Plan
Monitoramento com ELK - Elasticsearch - Logstash - Kibana
Data breach presentation
Neptune : Re-thinking Incident Response Automation
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Incident Response: How To Prepare
M-Trends® 2013: Attack the Security Gap
Cisco OpenSOC
Ad

Similar to SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Operations (20)

PPTX
SIEM-plifying security monitoring: A different approach to security visibility
PPTX
The Evolution of IDS: Why Context is Key
PPT
Best Practices for Leveraging Security Threat Intelligence
PPTX
Save Your Network – Protecting Healthcare Data from Deadly Breaches
PDF
Information Security 08- Intrusion Detection and Response (1).pdf
PPTX
Insider threats webinar 01.28.15
PPTX
Cybersecurity Fundamentals by Shaw E. Tuma
PDF
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
PPTX
Cybersecurity Fundamentals for Legal Professionals (and every other business)
PPTX
Security and Automation: Can they work together? Can we survive if they don't?
PPTX
Virtual Gov Day - Security Breakout - Deloitte
PDF
Threat Modeling for System Builders and System Breakers - Dan Cornell of Deni...
PDF
Cybersecurity: How to Protect Your Firm from a Cyber Attack
PPT
002.itsecurity bcp v1
PDF
Why Your Organization Must Have a Cyber Risk Management Program and How to De...
PPTX
Cybersecurity Fundamentals for Legal Professionals
PPTX
Enterprise under attack dealing with security threats and compliance
PDF
The Legal Case for Cybersecurity
PPTX
Cyber Risk in e-Discovery: What You Need to Know
PDF
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
SIEM-plifying security monitoring: A different approach to security visibility
The Evolution of IDS: Why Context is Key
Best Practices for Leveraging Security Threat Intelligence
Save Your Network – Protecting Healthcare Data from Deadly Breaches
Information Security 08- Intrusion Detection and Response (1).pdf
Insider threats webinar 01.28.15
Cybersecurity Fundamentals by Shaw E. Tuma
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
Cybersecurity Fundamentals for Legal Professionals (and every other business)
Security and Automation: Can they work together? Can we survive if they don't?
Virtual Gov Day - Security Breakout - Deloitte
Threat Modeling for System Builders and System Breakers - Dan Cornell of Deni...
Cybersecurity: How to Protect Your Firm from a Cyber Attack
002.itsecurity bcp v1
Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Cybersecurity Fundamentals for Legal Professionals
Enterprise under attack dealing with security threats and compliance
The Legal Case for Cybersecurity
Cyber Risk in e-Discovery: What You Need to Know
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)

More from AlienVault (20)

PPTX
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
PDF
Malware Invaders - Is Your OS at Risk?
PPTX
How to Solve Your Top IT Security Reporting Challenges with AlienVault
PPTX
Simplify PCI DSS Compliance with AlienVault USM
PDF
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
PDF
Insider Threat Detection Recommendations
PPTX
Alienvault threat alerts in spiceworks
PDF
Open Source IDS Tools: A Beginner's Guide
PPTX
Malware detection how to spot infections early with alien vault usm
PDF
Security operations center 5 security controls
PDF
PCI DSS Implementation: A Five Step Guide
PPTX
Improve threat detection with hids and alien vault usm
PDF
The State of Incident Response - INFOGRAPHIC
PPTX
Incident response live demo slides final
PPTX
Improve Situational Awareness for Federal Government with AlienVault USM
PPTX
Improve Security Visibility with AlienVault USM Correlation Directives
PPTX
How Malware Works
PPTX
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
PPTX
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
PPTX
AWS Security Best Practices for Effective Threat Detection & Response
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Malware Invaders - Is Your OS at Risk?
How to Solve Your Top IT Security Reporting Challenges with AlienVault
Simplify PCI DSS Compliance with AlienVault USM
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
Insider Threat Detection Recommendations
Alienvault threat alerts in spiceworks
Open Source IDS Tools: A Beginner's Guide
Malware detection how to spot infections early with alien vault usm
Security operations center 5 security controls
PCI DSS Implementation: A Five Step Guide
Improve threat detection with hids and alien vault usm
The State of Incident Response - INFOGRAPHIC
Incident response live demo slides final
Improve Situational Awareness for Federal Government with AlienVault USM
Improve Security Visibility with AlienVault USM Correlation Directives
How Malware Works
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
AWS Security Best Practices for Effective Threat Detection & Response

Recently uploaded (20)

PPTX
Chapter 5: Probability Theory and Statistics
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
TLE Review Electricity (Electricity).pptx
PDF
August Patch Tuesday
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Getting Started with Data Integration: FME Form 101
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Approach and Philosophy of On baking technology
PPTX
A Presentation on Touch Screen Technology
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Chapter 5: Probability Theory and Statistics
Zenith AI: Advanced Artificial Intelligence
Web App vs Mobile App What Should You Build First.pdf
A comparative analysis of optical character recognition models for extracting...
Unlocking AI with Model Context Protocol (MCP)
Encapsulation_ Review paper, used for researhc scholars
TLE Review Electricity (Electricity).pptx
August Patch Tuesday
Digital-Transformation-Roadmap-for-Companies.pptx
MIND Revenue Release Quarter 2 2025 Press Release
cloud_computing_Infrastucture_as_cloud_p
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Getting Started with Data Integration: FME Form 101
A comparative study of natural language inference in Swahili using monolingua...
Approach and Philosophy of On baking technology
A Presentation on Touch Screen Technology
Hindi spoken digit analysis for native and non-native speakers
1 - Historical Antecedents, Social Consideration.pdf
NewMind AI Weekly Chronicles - August'25-Week II
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...

SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Operations

  • 1. An Incident Response Playbook: From Monitoring to Operations Dave Shackleford, Voodoo Security and SANS Joe Schreiber, AlienVault © 2014 The SANS™ Institute - www.sans.org
  • 2. Introduction • The range and sophistication of today’s attacks are growing rapidly • More and more organizations are dedicating resources to detection and response tools and processes – Less effort and money is spent on purely “preventive” measures • We’ll explore a number of different types of incidents, as well as indicators and monitoring/response process considerations © 2014 The SANS™ Institute - www.sans.org 2
  • 3. Use What for What? • Right Tool -> Right Job • Right Job -> Right Skills • Right Skills -> Right Response • Right Response -> [right] Incident © 2014 The SANS™ Institute - www.sans.org 3
  • 4. How do I know which response? © 2014 The SANS™ Institute - www.sans.org 4
  • 5. Make Plans. • Be prepared for an incident – Create several plans based on incident type – Have a contact methodology – Escalation Paths • So you have a plan? – What’s your backup? – Be Flexible • Time is against you • Outside Help – Pre-arrange services or consultants © 2014 The SANS™ Institute - www.sans.org 5
  • 6. What if I’m missing something? • Use the Internet – IOCs – Threat Reputation – Malware Analyzers – Virus Scanners • Community Efforts – Open source tools – Message Boards © 2014 The SANS™ Institute - www.sans.org 6
  • 7. Attack Types and Responses • Sensitive Data • Malware • Insider • Web Application © 2014 The SANS™ Institute - www.sans.org 7
  • 8. Sensitive Data Exposure/Exfiltration • Data loss and exposure is one of the top concerns and incident types facing organizations today • In the 2014 Verizon DBIR, 1367 data loss incidents were investigated • Most security teams have been focused on data loss in some way since 2005-6. © 2014 The SANS™ Institute - www.sans.org 8
  • 9. Indicators of sensitive data exposure • A number of leading indicators can lead to detection of exposure or exfiltration • Human-based: – Fraud alerts or identity theft – Notification from 3rd parties – Extortion attempts • Data indicators: – DLP alerts – Proxy logs – Firewall/IDS/IPS events © 2014 The SANS™ Institute - www.sans.org 9
  • 10. Operations for Data Exposure Incidents • Specific operational steps to be considered for IR with data exposure: – First, unless directed by law enforcement, stop the leak! (if known how/where) – Determine who and what is affected then coordinate with HR/legal/PR – Leverage DLP or other monitoring tools to pattern match data types stored and in transit © 2014 The SANS™ Institute - www.sans.org 10
  • 11. Advanced Malware Incidents • Not all malware incidents are advanced – Standard antivirus and host-based tools still catch many variants • Some malware is much more stealthy and sophisticated, however – Malware sandboxes, behavioral monitoring, and forensics techniques and tools may be needed © 2014 The SANS™ Institute - www.sans.org 11
  • 12. Indicators of Advanced Malware • Advanced malware may be detected with a number of indicators: – Unusual processes or services on hosts – Known malicious registry keys and entries – File names or attributes – Network traffic signatures and patterns (ports, protocols, etc.) – Sandbox detonation events © 2014 The SANS™ Institute - www.sans.org 12
  • 13. Operations for Advanced Malware Incidents • Response processes for advanced malware incidents should include: – Quarantine capabilities (host and network) – Volatile forensic data capture – Rapid development of IOC “fingerprints” to propagate to additional systems – Data leak response steps – Reverse engineering © 2014 The SANS™ Institute - www.sans.org 13
  • 14. Insider Incidents • Insider incidents can be some of the most challenging to detect and respond to • Insider threats can lead to other types of incidents (data loss, destruction/availability, etc.) • Always coordinate with HR and legal teams for insider threat response • Many insider attacks are not that advanced…just hard to detect © 2014 The SANS™ Institute - www.sans.org 14
  • 15. Indicators of Insider Incidents • Insider indicators may be more challenging to detect: – Disgruntled behavior – Unusual pattern of file/data access – Changes in working hours or behavior – Disregard for policies and procedures – Account logon failures and unusual patterns – Traffic from personal/work systems – Unusual system command use or attempts at privilege escalation © 2014 The SANS™ Institute - www.sans.org 15
  • 16. Operations for Insider Incidents • Response processes for insider incidents should include: – Inclusion of law enforcement (maybe) and HR/legal (definitely) – Rapid root cause analysis • Was it accidental? A system hijack? Or deliberate? – Account monitoring – Privilege revocation (maybe) – Equipment seizure when possible – Forensic analysis – Risk analysis © 2014 The SANS™ Institute - www.sans.org 16
  • 17. Web Application Incidents • Web app attacks are more common than ever • These attacks can lead to defacement and reputation impact, as well as data exposure • Application security often lags network and infrastructure controls • Many open source components, or products like CMS platforms, are notoriously vulnerable © 2014 The SANS™ Institute - www.sans.org 17
  • 18. Indicators of Web Application Incidents • Web application attacks and breaches may exhibit the following indicators: – Unusual behavior or crashes in applications – Web and app server logs of repeated access attempts – Web and app server logs of SQL syntax and/or scripting characters – IDS/IPS events for known app attacks – High local resource utilization on Web and app servers – Web app firewall events for behavioral or signature-based attacks © 2014 The SANS™ Institute - www.sans.org 18
  • 19. Operations for Web Application Incidents • Response processes for Web App incidents may include: – Coordination with server operations/admin teams and possibly development teams – Web app firewall or application filtering commands/rules – Load balancer and proxy redirection and traffic control – Correlation between presentation and persistent tier traffic and account data © 2014 The SANS™ Institute - www.sans.org 19
  • 20. Conclusion • There are a lot of ways to detect and respond to incidents today • Many types of incidents have common tools and processes – Most have their own specific differences, however • Security monitoring and response teams can always enhance their capabilities with new events, correlation, and IOCs from inside and outside their networks © 2014 The SANS™ Institute - www.sans.org 20
  • 21. Powered by AV Labs Threat Intelligence AlienVault USMTM ASSET DISCOVERY • Active Network Scanning • Passive Network Scanning • Asset Inventory • Host-based Software Inventory VULNERABILITY ASSESSMENT • Continuous Vulnerability Monitoring • Authenticated / Unauthenticated Active Scanning BEHAVIORAL MONITORING • Log Collection • Netflow Analysis • Service Availability Monitoring THREAT DETECTION • Network IDS • Host IDS • Wireless IDS • File Integrity Monitoring A Unified Approach SECURITY INTELLIGENCE • SIEM Event Correlation • Incident Response
  • 22. Coordinated Analysis, Actionable Guidance • 200-350,000 IPs validated daily • 8,000 collection points • 140 countries Collaborative Threat Intelligence: AlienVault Open Threat ExchangeTM (OTX) Join OTX: www.alienvault.com/open-threat-exchange
  • 23. Questions? Q@SANS.ORG Thank You! © 2014 The SANS™ Institute - www.sans.org 23 Three Ways to Test Drive AlienVault USM Download a Free 30-Day Trial http://www.alienvault.com/free-trial Try our Interactive Demo http://www.alienvault.com/live-demo-site Join us for a LIVE Demo! http://www.alienvault.com/marketing/ali envault-usm-live-demo