SlideShare a Scribd company logo
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
Splunk User Group Edinburgh
© 2017 SPLUNK INC.
Recording In Progress
Provided by: Product Forge
© 2017 SPLUNK INC.
Introduction to Harry McLaren
● Alumnus of Edinburgh Napier
● Senior Security Consultant at ECS
● Leader of the Splunk User Group Edinburgh
© 2017 SPLUNK INC.
Introduction to ECS
Strategic Splunk Partner - UK
– Type: Security / IT Operations / Managed Services
– Awards: Splunk Revolution Award & Splunk Partner of the Year
© 2017 SPLUNK INC.
Agenda
• Housekeeping: Event Overview & House Rules
• Splunk and Orchestration - Robert Williamson
• Cloud (AWS) Security with Splunk - Harry McLaren
• Operation Honey-Splunk - James Rowell - Cancelled
© 2017 SPLUNK INC.
Splunk [Official] User Group
“The overall goal is to create an authentic, ongoing
user group experience for our users, where
they contribute and get involved”
● User Lead Technical Discussions
● Sharing Environment
● Build Trust
● No Sales!
● We Have 140 Members!
© 2017 SPLUNK INC.
Splunk and
Orchestration
Robert Williamson
© 2017 SPLUNK INC.
Introduction – Robert Williamson
▶ Alumnus of Edinburgh Napier
▶ Security Consultant at ECS
▶ Co-leader of the Splunk User Group Edinburgh
© 2017 SPLUNK INC.
▶ “ Security orchestration is the method of connecting security tools and integrating
disparate security systems.”
▶ “It is the connected layer that streamlines security processes and powered
security automation”
What is orchestration?
© 2017 SPLUNK INC.
▶ Question: Are they the same?
▶ Answer: No…
• “The difference between “Automatize” and “Orchestrate” is comparable to the difference
between “tasks” and “Processes”. This difference allows us to get the best of each process and
the advantage of its combination in a joint execution.”
Orchestration v.s. Automation
© 2017 SPLUNK INC.
Orchestration
Adaptation
Develop
ment
Schedule
Monitor
Workflow
Process
Work Flow
The “Engine”
© 2017 SPLUNK INC.
Splunk Adaptive Response
Orchestration the Splunk way
The Adaptive Response Initiative:
Acalvio, AlgoSec, Anomali, Blue Coat + Symantec,
Carbon Black, Cisco, CrowdStrike, CyberArk,
Demisto, DomainTools, ForeScout, Fortinet, Okta,
OpenDNS, Palo Alto Networks, Phantom,
Proofpoint, Qualys, Recorded Future, RedSeal,
Resolve Systems, Splunk, Tanium, ThreatConnect,
and Ziften.
© 2017 SPLUNK INC.
▶ Splunk as the trigger. Where an alert or event of interest has been established
and depending on the alert, a certain path of pre-defined actions will take place,
which is then passed to the orchestration tool.
▶ Splunk being queried. Where Splunk becomes the source of contextual
information to make a decision based on the results gathered from the
orchestration toolset.
Splunk with Orchestration
© 2017 SPLUNK INC.
Orchestration Tools
What is available?
© 2017 SPLUNK INC.
Questions?
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
Thank You
© 2017 SPLUNK INC.
Cloud (AWS)
Security with Splunk
Harry McLaren
© 2017 SPLUNK INC.
▶ Amazon Web Services Products
▶ Shared Security Model
▶ Built-in Controls/Features
▶ Security Framework/Model
▶ Collection & Use Cases
▶ Splunk Infrastructure
▶ Splunk App for AWS
▶ Demo
▶ Other Clouds
▶ Resources
Cloud (AWS) Security with Splunk
Agenda
© 2017 SPLUNK INC.
59+ Products (SaaS, PaaS, IaaS)
© 2017 SPLUNK INC.
Shared Security Model: Infrastructure Services
Such as Amazon EC2, Amazon EBS, and Amazon VPC
© 2017 SPLUNK INC.
▶ Built-in Firewalls
▶ Role-based Access
Control
▶ Multi-factor Authentication
▶ Private Subnets
▶ Encrypt Your Data At Rest
▶ Cloud HSM
▶ Dedicated Connections
▶ Security Logs
▶ More…
Built-in Controls/Features
All Available with AWS
© 2017 SPLUNK INC.
Identify
Protect
Detect
Respond
Recover
Standard Security Approach
NIST Cyber Security Framework: Model
© 2017 SPLUNK INC.
Detection
Processes
Security
Continuous
Monitoring
Anomalies
& Events
Detection
NIST Cyber Security Framework: Detect
© 2017 SPLUNK INC.
Collection & Use Cases
Sourcetypes & Collection Methods
Data Sources Use Cases
Config + Config Rules • Configuration snapshots and historical configuration data.
• Configuration change notifications.
• Descriptions of your AWS EC2 instances.
• Compliance details, compliance summary, and evaluation.
Inspector • Assessment Runs and Findings data from the Inspector service.
CloudTrail • Management and change events.
CloudWatch • Data from the CloudWatch Logs and VPC logs.
• Performance and billing metrics.
S3 • Generic log data, access logs from your S3 buckets.
• CloudFront and ELB access logs.
Kinesis • Data from Kinesis streams.
SQS • Generic data from SQS.
© 2017 SPLUNK INC.
Build it Yourself
Hosted On-Premise or Cloud Based (or Hybrid)
© 2017 SPLUNK INC.
As a Service
Built and Hosted by Splunk (On AWS)
© 2017 SPLUNK INC.
Splunk App for AWS Demo
URL
© 2017 SPLUNK INC.
Dashboards Alerts
Traffic Analysis (VPC, CloudFront, ELB, S3) IAM: Create/Delete Roles
Network ACLs IAM: Create/Delete/Update Access Keys
Security Groups Instances: Reboot/Stop/Terminate Actions
IAM Activity Key Pairs: Create/Delete/Import Key Pairs
Key Pairs Activity Unauthorized Actions
S3 Data Events VPC: Create/Delete VPC
Resource Activity VPC: Create/Delete/Replace Network ACLs
User Activity New Non-Compliant Resource
Security Anomaly Detection
Splunk App for AWS
Contains: Dashboards, Reports, Alerts, Inputs, Scripts
© 2017 SPLUNK INC.
Microsoft Cloud
• Splunk Add-on for Microsoft Cloud Services
Google Cloud
• Splunk Add-on for Google Cloud Platform
Cloud Foundry
• Splunk Add-on for Cloud Foundry
Clouds Everywhere!
What about other peoples Clouds?
© 2017 SPLUNK INC.
▶ Splunk App for AWS (Documentation)
▶ Splunk Add-on for AWS (Documentation)
▶ Splunk with AWS Case Study
▶ AWS Technical Whitepaper
▶ AWS CloudFormation Templates for Splunk Cluster
▶ Deploying Splunk on AWS Whitepaper
▶ AWS CloudTrail with Splunk
▶ Splunk on AWS (Quick Start)
▶ Add-ons for Cloud Foundry, Microsoft Cloud, Google Cloud
Resources
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
Thank You
© 2017 SPLUNK INC.
Get Involved!
● Splunk User Group Edinburgh
– https://usergroups.splunk.com/group/splunk-user-group-edinburgh.html
– https://www.linkedin.com/groups/12013212
● Splunk’s Slack Group
– Register via https://splunk-usergroups.signup.team/
– Channel: #edinburgh
● Present & Share at the User Group?
Connect:
‣ Harry McLaren | harry.mclaren@ecs.co.uk | @cyberharibu
‣ ECS | enquiries@ecs.co.uk | @ECS_Cybersec | ecs.co.uk
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
Thank You

More Related Content

PPTX
Latest Updates to Splunk from .conf 2017 Announcements
PDF
Getting Started with Splunk Observability September 8, 2021
PPTX
AWS on Splunk, Splunk on AWS
PPTX
Getting Started with Splunk Enterprise
PPTX
Splunk Cloud
PPTX
Webinar: Improve Splunk Analytics and Automate Processes with SnapLogic
PPTX
Danfoss - Splunk for Vulnerability Management
PPTX
AWS and Sumo Logic Webinar: Simplify Compliance with Proactive Machine Data A...
Latest Updates to Splunk from .conf 2017 Announcements
Getting Started with Splunk Observability September 8, 2021
AWS on Splunk, Splunk on AWS
Getting Started with Splunk Enterprise
Splunk Cloud
Webinar: Improve Splunk Analytics and Automate Processes with SnapLogic
Danfoss - Splunk for Vulnerability Management
AWS and Sumo Logic Webinar: Simplify Compliance with Proactive Machine Data A...

What's hot (18)

PPTX
Splunk at Airbus
PDF
SplunkLive! Munich 2018: Siemens Security Use Case
PPTX
Splunk FISMA for Continuous Monitoring
PDF
Intermedia Customer Presentation
PPTX
How McGraw Hill Uses Sumo Logic and AWS for Operational and Security Intellig...
PPTX
SplDevOps: Making Splunk Development a Breeze With a Deep Dive on DevOps' Con...
PPTX
.conf21 Recommended Sessions
PPTX
Splunk Discovery: Warsaw 2018 - IT Operations Track
PPTX
Collecting AWS Logs & Introducing Splunk New S3 Compatible Storage (SmartStore)
PPTX
SplunkLive! Utrecht 2019: NN Group
PPTX
Catch these Sessions on-demand at .conf Online
PDF
Splunk Cloud
PDF
Overview of Blue Medora - New Relic Plugin for Nutanix
PDF
Overview of Blue Medora - New Relic Plugin for Cisco UCS
PPTX
Remediate and secure your organization with azure sentinel
PDF
Combining Logs, Metrics, and Traces for Unified Observability
PDF
Techorama Belgium 2019 - Building an Azure Governance model for the Enterprise
PPTX
DEVNET-1123 CSTA - Cisco Security Technical Alliances, New Program for Ecosys...
Splunk at Airbus
SplunkLive! Munich 2018: Siemens Security Use Case
Splunk FISMA for Continuous Monitoring
Intermedia Customer Presentation
How McGraw Hill Uses Sumo Logic and AWS for Operational and Security Intellig...
SplDevOps: Making Splunk Development a Breeze With a Deep Dive on DevOps' Con...
.conf21 Recommended Sessions
Splunk Discovery: Warsaw 2018 - IT Operations Track
Collecting AWS Logs & Introducing Splunk New S3 Compatible Storage (SmartStore)
SplunkLive! Utrecht 2019: NN Group
Catch these Sessions on-demand at .conf Online
Splunk Cloud
Overview of Blue Medora - New Relic Plugin for Nutanix
Overview of Blue Medora - New Relic Plugin for Cisco UCS
Remediate and secure your organization with azure sentinel
Combining Logs, Metrics, and Traces for Unified Observability
Techorama Belgium 2019 - Building an Azure Governance model for the Enterprise
DEVNET-1123 CSTA - Cisco Security Technical Alliances, New Program for Ecosys...
Ad

Similar to Securing the Enterprise/Cloud with Splunk at the Centre (20)

PPTX
SplunkLive! London 2017 - DevOps Powered by Splunk
PDF
Encontro anual para apresentação das novidades da .conf23
PPTX
Clear the Mist from your Clouds with Splunk
PPTX
Splunk .conf18 Updates, Config Add-on, SplDevOps
PPTX
Accelerate incident Response Using Orchestration and Automation
PPTX
Accelerate incident Response Using Orchestration and Automation
PPTX
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
PDF
Evento anual Splunk .conf24 Highlights recap
PPTX
Accelerate Incident Response with Orchestration & Automation
PPTX
Splunk Incident Response, Orchestrierung und Automation
PPTX
Partner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOAR
PDF
Splunk-Presentation
PPTX
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
PPTX
What's New with the Latest Splunk Platform Release
PPTX
Customer Presentation with a Healthcare Company
PPTX
SplunkLive! Customer Presentation – HCA
PPTX
Splunk Cloud and Splunk Enterprise 7.2
PPTX
Splunk Cloud and Splunk Enterprise 7.2
PPTX
Splunk Cloud and Splunk Enterprise 7.2
PPTX
Machine Data 101: Turning Data Into Insight
SplunkLive! London 2017 - DevOps Powered by Splunk
Encontro anual para apresentação das novidades da .conf23
Clear the Mist from your Clouds with Splunk
Splunk .conf18 Updates, Config Add-on, SplDevOps
Accelerate incident Response Using Orchestration and Automation
Accelerate incident Response Using Orchestration and Automation
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
Evento anual Splunk .conf24 Highlights recap
Accelerate Incident Response with Orchestration & Automation
Splunk Incident Response, Orchestrierung und Automation
Partner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOAR
Splunk-Presentation
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
What's New with the Latest Splunk Platform Release
Customer Presentation with a Healthcare Company
SplunkLive! Customer Presentation – HCA
Splunk Cloud and Splunk Enterprise 7.2
Splunk Cloud and Splunk Enterprise 7.2
Splunk Cloud and Splunk Enterprise 7.2
Machine Data 101: Turning Data Into Insight
Ad

More from Harry McLaren (20)

PPTX
Security Operations, MITRE ATT&CK, SOC Roles / Competencies
PPTX
Modern Security Operations & Common Roles/Competencies
PPTX
Becoming a Defender (Blue Teams FTW!)
PPTX
Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...
PPTX
SOC Fundamental Roles & Skills
PPTX
Hunting Hard & Failing Fast (ScotSoft 2019)
PPTX
Splunk Phantom, the Endpoint Data Model & Splunk Security Essentials App!
PPTX
Using Metrics for Fun, Developing with the KV Store + Javascript & News from ...
PPTX
Lessons on Human Vulnerability within InfoSec/Cyber
PPTX
Big Data For Threat Detection & Response
PPTX
OWASP - Analyst, Engineer or Consultant?
PPTX
TSTAS, the Life of a Splunk Trainer and using DevOps in Splunk Development
PPTX
Cyber Scotland Connect: What is Security Engineering?
PPTX
Cyber Scotland Connect: Getting into Cybersecurity (Deck 2)
PPTX
Cyber Scotland Connect: Getting into Cybersecurity (Deck 1)
PPTX
Cyber Scotland Connect: Welcome & Purpose Statement
PPTX
Security Meetup Scotland - August 2017 (Deconstructing SIEM)
PPTX
Deconstructing SIEM
PPTX
Supporting Splunk at Scale, Splunking at Home & Introduction to Enterprise Se...
PPTX
Building Splunk Apps, Development Paths with Splunk & User Behaviour Analytics
Security Operations, MITRE ATT&CK, SOC Roles / Competencies
Modern Security Operations & Common Roles/Competencies
Becoming a Defender (Blue Teams FTW!)
Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...
SOC Fundamental Roles & Skills
Hunting Hard & Failing Fast (ScotSoft 2019)
Splunk Phantom, the Endpoint Data Model & Splunk Security Essentials App!
Using Metrics for Fun, Developing with the KV Store + Javascript & News from ...
Lessons on Human Vulnerability within InfoSec/Cyber
Big Data For Threat Detection & Response
OWASP - Analyst, Engineer or Consultant?
TSTAS, the Life of a Splunk Trainer and using DevOps in Splunk Development
Cyber Scotland Connect: What is Security Engineering?
Cyber Scotland Connect: Getting into Cybersecurity (Deck 2)
Cyber Scotland Connect: Getting into Cybersecurity (Deck 1)
Cyber Scotland Connect: Welcome & Purpose Statement
Security Meetup Scotland - August 2017 (Deconstructing SIEM)
Deconstructing SIEM
Supporting Splunk at Scale, Splunking at Home & Introduction to Enterprise Se...
Building Splunk Apps, Development Paths with Splunk & User Behaviour Analytics

Recently uploaded (20)

PPTX
New ISO 27001_2022 standard and the changes
PPTX
sac 451hinhgsgshssjsjsjheegdggeegegdggddgeg.pptx
DOCX
Factor Analysis Word Document Presentation
PDF
REAL ILLUMINATI AGENT IN KAMPALA UGANDA CALL ON+256765750853/0705037305
PPTX
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
PDF
Introduction to Data Science and Data Analysis
PDF
OneRead_20250728_1808.pdfhdhddhshahwhwwjjaaja
PPTX
QUANTUM_COMPUTING_AND_ITS_POTENTIAL_APPLICATIONS[2].pptx
PPTX
Database Infoormation System (DBIS).pptx
PPTX
Topic 5 Presentation 5 Lesson 5 Corporate Fin
PDF
annual-report-2024-2025 original latest.
PPTX
IBA_Chapter_11_Slides_Final_Accessible.pptx
PPTX
Copy of 16 Timeline & Flowchart Templates – HubSpot.pptx
PPT
ISS -ESG Data flows What is ESG and HowHow
PDF
Optimise Shopper Experiences with a Strong Data Estate.pdf
PDF
Business Analytics and business intelligence.pdf
PDF
Capcut Pro Crack For PC Latest Version {Fully Unlocked 2025}
PDF
How to run a consulting project- client discovery
PDF
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
PPTX
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
New ISO 27001_2022 standard and the changes
sac 451hinhgsgshssjsjsjheegdggeegegdggddgeg.pptx
Factor Analysis Word Document Presentation
REAL ILLUMINATI AGENT IN KAMPALA UGANDA CALL ON+256765750853/0705037305
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
Introduction to Data Science and Data Analysis
OneRead_20250728_1808.pdfhdhddhshahwhwwjjaaja
QUANTUM_COMPUTING_AND_ITS_POTENTIAL_APPLICATIONS[2].pptx
Database Infoormation System (DBIS).pptx
Topic 5 Presentation 5 Lesson 5 Corporate Fin
annual-report-2024-2025 original latest.
IBA_Chapter_11_Slides_Final_Accessible.pptx
Copy of 16 Timeline & Flowchart Templates – HubSpot.pptx
ISS -ESG Data flows What is ESG and HowHow
Optimise Shopper Experiences with a Strong Data Estate.pdf
Business Analytics and business intelligence.pdf
Capcut Pro Crack For PC Latest Version {Fully Unlocked 2025}
How to run a consulting project- client discovery
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb

Securing the Enterprise/Cloud with Splunk at the Centre

  • 1. © 2017 SPLUNK INC.© 2017 SPLUNK INC. Splunk User Group Edinburgh
  • 2. © 2017 SPLUNK INC. Recording In Progress Provided by: Product Forge
  • 3. © 2017 SPLUNK INC. Introduction to Harry McLaren ● Alumnus of Edinburgh Napier ● Senior Security Consultant at ECS ● Leader of the Splunk User Group Edinburgh
  • 4. © 2017 SPLUNK INC. Introduction to ECS Strategic Splunk Partner - UK – Type: Security / IT Operations / Managed Services – Awards: Splunk Revolution Award & Splunk Partner of the Year
  • 5. © 2017 SPLUNK INC. Agenda • Housekeeping: Event Overview & House Rules • Splunk and Orchestration - Robert Williamson • Cloud (AWS) Security with Splunk - Harry McLaren • Operation Honey-Splunk - James Rowell - Cancelled
  • 6. © 2017 SPLUNK INC. Splunk [Official] User Group “The overall goal is to create an authentic, ongoing user group experience for our users, where they contribute and get involved” ● User Lead Technical Discussions ● Sharing Environment ● Build Trust ● No Sales! ● We Have 140 Members!
  • 7. © 2017 SPLUNK INC. Splunk and Orchestration Robert Williamson
  • 8. © 2017 SPLUNK INC. Introduction – Robert Williamson ▶ Alumnus of Edinburgh Napier ▶ Security Consultant at ECS ▶ Co-leader of the Splunk User Group Edinburgh
  • 9. © 2017 SPLUNK INC. ▶ “ Security orchestration is the method of connecting security tools and integrating disparate security systems.” ▶ “It is the connected layer that streamlines security processes and powered security automation” What is orchestration?
  • 10. © 2017 SPLUNK INC. ▶ Question: Are they the same? ▶ Answer: No… • “The difference between “Automatize” and “Orchestrate” is comparable to the difference between “tasks” and “Processes”. This difference allows us to get the best of each process and the advantage of its combination in a joint execution.” Orchestration v.s. Automation
  • 11. © 2017 SPLUNK INC. Orchestration Adaptation Develop ment Schedule Monitor Workflow Process Work Flow The “Engine”
  • 12. © 2017 SPLUNK INC. Splunk Adaptive Response Orchestration the Splunk way The Adaptive Response Initiative: Acalvio, AlgoSec, Anomali, Blue Coat + Symantec, Carbon Black, Cisco, CrowdStrike, CyberArk, Demisto, DomainTools, ForeScout, Fortinet, Okta, OpenDNS, Palo Alto Networks, Phantom, Proofpoint, Qualys, Recorded Future, RedSeal, Resolve Systems, Splunk, Tanium, ThreatConnect, and Ziften.
  • 13. © 2017 SPLUNK INC. ▶ Splunk as the trigger. Where an alert or event of interest has been established and depending on the alert, a certain path of pre-defined actions will take place, which is then passed to the orchestration tool. ▶ Splunk being queried. Where Splunk becomes the source of contextual information to make a decision based on the results gathered from the orchestration toolset. Splunk with Orchestration
  • 14. © 2017 SPLUNK INC. Orchestration Tools What is available?
  • 15. © 2017 SPLUNK INC. Questions?
  • 16. © 2017 SPLUNK INC.© 2017 SPLUNK INC. Thank You
  • 17. © 2017 SPLUNK INC. Cloud (AWS) Security with Splunk Harry McLaren
  • 18. © 2017 SPLUNK INC. ▶ Amazon Web Services Products ▶ Shared Security Model ▶ Built-in Controls/Features ▶ Security Framework/Model ▶ Collection & Use Cases ▶ Splunk Infrastructure ▶ Splunk App for AWS ▶ Demo ▶ Other Clouds ▶ Resources Cloud (AWS) Security with Splunk Agenda
  • 19. © 2017 SPLUNK INC. 59+ Products (SaaS, PaaS, IaaS)
  • 20. © 2017 SPLUNK INC. Shared Security Model: Infrastructure Services Such as Amazon EC2, Amazon EBS, and Amazon VPC
  • 21. © 2017 SPLUNK INC. ▶ Built-in Firewalls ▶ Role-based Access Control ▶ Multi-factor Authentication ▶ Private Subnets ▶ Encrypt Your Data At Rest ▶ Cloud HSM ▶ Dedicated Connections ▶ Security Logs ▶ More… Built-in Controls/Features All Available with AWS
  • 22. © 2017 SPLUNK INC. Identify Protect Detect Respond Recover Standard Security Approach NIST Cyber Security Framework: Model
  • 23. © 2017 SPLUNK INC. Detection Processes Security Continuous Monitoring Anomalies & Events Detection NIST Cyber Security Framework: Detect
  • 24. © 2017 SPLUNK INC. Collection & Use Cases Sourcetypes & Collection Methods Data Sources Use Cases Config + Config Rules • Configuration snapshots and historical configuration data. • Configuration change notifications. • Descriptions of your AWS EC2 instances. • Compliance details, compliance summary, and evaluation. Inspector • Assessment Runs and Findings data from the Inspector service. CloudTrail • Management and change events. CloudWatch • Data from the CloudWatch Logs and VPC logs. • Performance and billing metrics. S3 • Generic log data, access logs from your S3 buckets. • CloudFront and ELB access logs. Kinesis • Data from Kinesis streams. SQS • Generic data from SQS.
  • 25. © 2017 SPLUNK INC. Build it Yourself Hosted On-Premise or Cloud Based (or Hybrid)
  • 26. © 2017 SPLUNK INC. As a Service Built and Hosted by Splunk (On AWS)
  • 27. © 2017 SPLUNK INC. Splunk App for AWS Demo URL
  • 28. © 2017 SPLUNK INC. Dashboards Alerts Traffic Analysis (VPC, CloudFront, ELB, S3) IAM: Create/Delete Roles Network ACLs IAM: Create/Delete/Update Access Keys Security Groups Instances: Reboot/Stop/Terminate Actions IAM Activity Key Pairs: Create/Delete/Import Key Pairs Key Pairs Activity Unauthorized Actions S3 Data Events VPC: Create/Delete VPC Resource Activity VPC: Create/Delete/Replace Network ACLs User Activity New Non-Compliant Resource Security Anomaly Detection Splunk App for AWS Contains: Dashboards, Reports, Alerts, Inputs, Scripts
  • 29. © 2017 SPLUNK INC. Microsoft Cloud • Splunk Add-on for Microsoft Cloud Services Google Cloud • Splunk Add-on for Google Cloud Platform Cloud Foundry • Splunk Add-on for Cloud Foundry Clouds Everywhere! What about other peoples Clouds?
  • 30. © 2017 SPLUNK INC. ▶ Splunk App for AWS (Documentation) ▶ Splunk Add-on for AWS (Documentation) ▶ Splunk with AWS Case Study ▶ AWS Technical Whitepaper ▶ AWS CloudFormation Templates for Splunk Cluster ▶ Deploying Splunk on AWS Whitepaper ▶ AWS CloudTrail with Splunk ▶ Splunk on AWS (Quick Start) ▶ Add-ons for Cloud Foundry, Microsoft Cloud, Google Cloud Resources
  • 31. © 2017 SPLUNK INC.© 2017 SPLUNK INC. Thank You
  • 32. © 2017 SPLUNK INC. Get Involved! ● Splunk User Group Edinburgh – https://usergroups.splunk.com/group/splunk-user-group-edinburgh.html – https://www.linkedin.com/groups/12013212 ● Splunk’s Slack Group – Register via https://splunk-usergroups.signup.team/ – Channel: #edinburgh ● Present & Share at the User Group? Connect: ‣ Harry McLaren | harry.mclaren@ecs.co.uk | @cyberharibu ‣ ECS | enquiries@ecs.co.uk | @ECS_Cybersec | ecs.co.uk
  • 33. © 2017 SPLUNK INC.© 2017 SPLUNK INC. Thank You

Editor's Notes

  • #10: The best security operation centers (SOCs) are built on efficiency and speed-to-response. But if you’ve ever worked in a SOC or on a security team, you know it’s tough to get your security systems, tools and teams to integrate in a way that streamlines detection, response, and remediation. One of the most tedious tasks of all is cobbling together alert details to assess if a security event is a real threat, along with correlating data and coordinating the appropriate response. That’s why security tools need to be connected, security processes need to be efficient and as an industry, we need to start working together. As new technologies arrive on the scene every day (IoT, BOYD and continued virtualization of all the things), security teams need a way to become more agile. This is where security orchestration comes in. Orchestration is not a new term by any means. You’ve probably heard of DevOps orchestration, which seeks to automate infrastructure deployments and document ‘infrastructure as code’. Now it’s time to apply this to security processes.
  • #11: Orchestration is the process of taking a “simple” task and creating a workflow. The basic idea of a workflow is taking the task at hand, breaking it down as much as you can, adding logic along with input(s), then outputting a value that is either an output of the logic, interaction, or possibly a Boolean value. https://www.thinkahead.com/blog/automation-vs-orchestration-what-s-the-difference-and-how-to-pick-the-right-tool/
  • #28: Showcase: Security Overview Topology Timeline Config Rules Security Anomaly Insights