SlideShare a Scribd company logo
Copyright	
  ©	
  2014	
  Splunk	
  Inc.
Splunk for	
  Security
Continuous	
  Monitoring	
  and	
  Analytics-­‐Driven	
  
Security	
  for	
  Modern	
  Threats
Simon	
  O’Brien,	
  Security	
  SME,	
  ANZ
SPLUNK FOR SECURITY
Connecting People and Data, with Context and Extended Intelligence
The	
  Ever-­‐Changing	
  Threat	
  Landscape
3
67%
Victims	
  notified	
  by	
  
external	
  entity
100%
Valid	
  credentials
were	
  used
229
Median	
  #	
  of	
  days	
  
before	
  detection
Source:	
  Mandiant	
  M-­‐Trends	
  Report	
  2012/2013/2014
CYBER
CRIMINALS
MALICIOUS
INSIDERS
NATION
STATES
4
New	
  approach	
  to	
  security	
  operation	
  is	
  needed
• Human	
  directed
• Goal-­‐oriented
• Dynamic	
  (adjust	
  to	
  changes)
• Coordinated
• Multiple	
  tools	
  &	
  activities
• New	
  evasion	
  techniques
• Fusion	
  of	
  people,	
  process,	
  &	
  
technology
• Contextual	
  and	
  behavioral
• Rapid	
  learning	
  and	
  response
• Share	
  info	
  &	
  collaborate
• Analyze	
  all	
  data	
  for	
  relevance
• Leverage	
  IOC	
  &	
  Threat	
  Intel
THREAT Attack	
  Approach Security	
  Approach
5
TECHNOLOGY
PEOPLE
PROCESS
New	
  approach	
  to	
  security	
  operation	
  is	
  needed
THREAT Attack	
  Approach
Analytics-­‐driven	
  Security
Security	
  Approach
6
TECHNOLOGY
PEOPLE
PROCESS
• Human	
  directed
• Goal-­‐oriented
• Dynamic	
  (adjust	
  to	
  changes)
• Coordinated
• Multiple	
  tools	
  &	
  activities
• New	
  evasion	
  techniques
• Continuously Protect the	
  
business	
  against:
ê Data	
  Breaches	
  
ê Malware	
  
ê Fraud	
  
ê IP	
  Theft
• Comply with	
  audit	
  requirements
• Provide	
  enterprise	
  Visibility
7
Security	
  &	
  Compliance
Top	
  Splunk	
  Benefits
• 70%	
  to 90%	
  improvement	
  with	
  
detection	
  and	
  research	
  of	
  events
• 70%	
  to 95%	
  reduction	
  in	
  security	
  
incident	
  investigation	
  time
• 10%	
  to 30%	
  reduction	
  in	
  risks	
  
associated	
  with	
  data	
  breaches,	
  
fraud	
  and	
  IP	
  theft
• 70%	
  to 90%	
  reduction	
  in	
  
compliance	
  labor
Top	
  Goals
8
All	
  Data	
  is	
  Security	
  Relevant	
  =	
  Big	
  Data
Servers
Storage
DesktopsEmail Web
Transaction
Records
Network
Flows
DHCP/	
  DNS
Hypervisor
Custom	
  
Apps
Physical
Access
Badges
Threat	
  
Intelligence
Mobile
CMDB
Intrusion	
  
Detection
Firewall
Data	
  Loss	
  
Prevention
Anti-­‐
Malware
Vulnerability
Scans
Traditional
Authentication
9
Solution:	
  Splunk,	
  The	
  Engine	
  For	
  Machine	
  Data
Online	
  
Services
Web	
  
Services
Servers
Security
GPS	
  
Location
Storage
Desktops
Networks
Packaged	
  
Applications
Custom
Applications
Messaging
Telecoms
Online	
  
Shopping	
  
Cart
Web	
  
Clickstreams
Databases
Energy	
  
Meters
Call	
  Detail	
  
Records
Smartphones	
  
and	
  Devices
RFID
Developer
Platform
Report	
  
and	
  
analyze
Custom	
  
dashboards
Monitor	
  
and	
  alert
Ad	
  hoc	
  
search
Real-­‐Time
Machine	
  Data
References – Coded	
   fields,	
  mappings,	
  aliases
Dynamic	
  information	
   – Stored	
   in	
  non-­‐traditional	
   formats
Environmental	
   context	
   – Human	
  maintained	
   files,	
  documents
System/application	
   – Available	
  only	
  using	
  application	
   request
Intelligence/analytics	
   – Indicators,	
   anomaly,	
  research,	
   white/blacklist
10
The	
  Splunk	
  Platform	
  for	
  Security	
  Intelligence	
  
SPLUNK	
  ENTERPRISE	
  (CORE)
Copyright	
  ©	
  2014	
  Splunk	
  Inc.
200+	
  APPS SPLUNK FOR	
  SECURITY SPLUNK-­‐BUILT	
  APPS
…
Stream	
  data
Cisco	
  
Security	
  
Suite
Windows/	
  
AD/	
  Exchange
Palo	
  Alto	
  
Networks
FireEye
Bit9
DShield
DNS
OSSEC
Connecting	
  the	
  “data-­‐dots”	
  via	
  multiple/dynamic	
  relationships
Persist,	
  Repeat
Threat	
  intelligence
Auth -­‐ User	
  Roles
Host	
  
Activity/Security
Network	
  
Activity/Security
Attacker,	
  know	
  relay/C2	
  sites,	
  infected	
  sites,	
  file	
  
hashes,	
  IOC, attack/campaign	
  intent	
  and	
  attribution
Where	
  they	
  went,	
  who	
  talked	
  to	
  whom,	
  attack	
  
transmitted,	
  abnormal	
  traffic,	
  malware	
  download
What	
  process	
  is	
  running	
  (malicious,	
   abnormal,	
  etc.)	
  
Process	
  owner,	
  registry	
  mods,	
  attack/malware	
  
artifacts,	
  patching	
  level,	
  attack	
  susceptibility
Access	
  level,	
  privileged	
  users,	
  likelihood	
   of	
  infection,	
  
where	
  they	
  might	
  be	
  in	
  kill	
  chain	
  
Delivery,	
  exploit	
  
installation
Gain	
  trusted	
  
access
ExfiltrationData	
  GatheringUpgrade	
  (escalate)
Lateral	
  movement
Persist,	
  Repeat
11
Security	
  Intelligence	
  Use	
  Cases
SECURITY	
  &	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  
COMPLIANCE	
  
REPORTING
REAL-­‐TIME	
  
MONITORING	
  OF	
  
KNOWN	
  THREATS
DETECTING	
  
UNKNOWN	
  
THREATS
INCIDENT	
  
INVESTIGATIONS	
  
&	
  FORENSICS
FRAUD	
  
DETECTION
INSIDER	
  
THREAT
Complement,	
  replace	
  and	
  go	
  beyond	
  traditional	
  SIEMs
12
Splunk Enterprise	
  Security
Risk-­‐Based	
  
Analytics
Visualize	
  
and	
  Discover	
  
Relationships
Enrich	
  Security	
  
Analysis	
  with	
  
Threat	
  Intelligence
13
The	
  artist	
  formerly	
  known	
  as	
  the	
  ‘app	
  for’
Splunk	
  Enterprise	
  Security	
  – 5	
  Releases	
  in	
  21	
  Months
14
Q3 2014 Q4 2014 Q2 2015
ES	
  3.1
•Risk	
  Framework
•Guided	
  Search
•Unified	
  Search	
  
Editor
•Threatlist
Scoring
•Threatlist Audit
ES	
  4.0
• Breach	
  Analysis
• Integration	
  with	
  
Splunk	
  UBA
• Splunk	
  Security	
  
Framework
ES	
  3.0
ES	
  3.2
•Protocol	
  
Intelligence	
  
(Stream capture)
•Semantic	
  Search	
  
(Dynamic	
  
Thresholding)
ES	
  3.3
•Threat	
  Intel	
  
framework
•User	
  Activity	
  
Monitoring
•Content	
  Sharing
•Data	
  Ingestion
Q4 2015
DEMO!
PLAY	
  DEMO
16
17
https://www.splunk.com/getsplunk/es_sandbox
18
Copyright	
  ©	
  2014	
  Splunk	
  Inc.
Splunk User	
  Behavior	
  Analytics	
  
for	
  threat	
  detection	
  
BIG	
  DATA	
  
DRIVEN
SECURITY
ANALYTICS
MACHINE
LEARNING
A	
  NEW	
  PARADIGM
DATA-­‐SCIENCE	
  DRIVEN	
  BEHAVIORAL	
  ANALYTICS
What	
  does	
  Splunk UBA	
  do?
21
SIEM
Firewall, AD,
DLP
AWS, VM
Cloud, Mobile
End point, Host,
App, DB logs
Netflow, PCAP
Threat Feeds
Next-Gen Data Science-driven
Threat Detection
Application for
SOC Analysts
Kill Chain Detection
Ranked Threat Review
Actions & Resolution
99.99%	
  event	
  
reduction
Security Analytics
SPLUNK UBA
MACHINE	
  
LEARNING
BEHAVIOR	
  
ANALYTICS
ANOMALY	
  
DETECTION
THREAT	
  
DETECTION
SECURITY	
  
ANALYTICS
22
THREAT	
  DETECTION
KEY	
  WORKFLOWS	
  – SOC	
  ANALYST
SOC	
  ANALYST
§ Quickly	
  spot	
  threats	
  within	
  your	
  
network
§ Leverage	
  Threat	
  Detection	
  workflow	
  
to	
  investigate	
  insider	
  threats	
  and	
  
cyber	
  attacks	
  	
  
§ Act	
  on	
  forensic	
  details	
  – deactivate	
  
accounts,	
  unplug	
  network	
  devices,	
  etc.
SECURITY	
  ANALYTICS
KILL-­‐CHAIN
HUNTER
KEY	
  WORKFLOWS	
  -­‐ HUNTER
§ Investigate	
  suspicious	
  users,	
  devices,	
  
and	
  applications
§ Dig	
  deeper	
  into	
  identified	
  anomalies	
  
and	
  threat	
  indicators
§ Look	
  for	
  policy	
  violations
Threat	
  Example
25
John	
  logs	
  in	
  via VPN	
  from	
  1.0.63.14	
  at	
  3pm	
  
John	
  elevates	
  his	
  privileges	
  for	
  the	
  PCI	
  network
John	
  performs	
  a	
  remote	
  desktop	
  on	
  a	
  system	
  
as	
  Administrator	
  on	
  the	
  PCI	
  network	
  zone
John	
  (Admin) performs	
  an	
  ssh as	
  root	
  to	
  a	
  new	
  
machine	
  in	
  the	
  BizDev department	
  
John	
  (Adminàroot) accesses	
  the	
  folder	
  with	
  all	
  
the	
  excel	
  and	
  negotiations	
  documents	
  on	
  the	
  
BizDev file	
  shares
John	
  (Adminàroot) copies	
  all	
  the	
  negotiation	
  
docs	
  to	
  another	
  share	
  on	
  the	
  corpzone
John (Adminàroot) uses	
  a	
  set	
  of	
  Twitter	
  handles	
  
to	
  chop	
  and	
  copy	
  the	
  data	
  outside	
  the	
  
enterprise
Time
Unusual	
   Geo	
  for	
  John	
  (China)
Unusual	
   Activity	
  Time
Unusual	
   Zone	
  (CorpàPCI) traversal	
  for	
  John	
  
(lateral	
  movement)
Unusual	
   Machine	
  Access	
  
(lateral	
   movement;	
   individual	
  +	
  peer	
   group)
Unusual	
   File	
  Access	
  
(individual	
  +	
  peer	
   group)
Excessive	
   Data	
  Transmission
(individual	
  +	
  peer	
   group)
Unusual	
   Zone	
  combo	
   (PCIàcorp) for	
  John	
  
Multiple	
  Outgoing	
  Connections
Unusual	
   VPN	
  session	
   duration	
  (11h)
John
3:00 PM
3:05 PM
3:15 PM
3:40 PM
6 PM
11:35 PM
Unusual	
   Activity	
  Sequence	
  
(AD/DC	
   Privilege	
   Escalation)
3:10 PM
User Activities Risk/Threat Detection Areas
Splunk for Security
Splunk for Security
DEMO!
Thank	
  you!
29 sob@splunk.com

More Related Content

PPTX
Operational Security Intelligence
PDF
RSA: Security Analytics Architecture for APT
PPTX
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
PDF
Bulding Soc In Changing Threat Landscapefinal
PPTX
Incident Response: Validation, Containment & Forensics
PDF
The Golden Rules - Detecting more with RSA Security Analytics
DOCX
Zero-Day Vulnerability and Heuristic Analysis
PPTX
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
Operational Security Intelligence
RSA: Security Analytics Architecture for APT
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
Bulding Soc In Changing Threat Landscapefinal
Incident Response: Validation, Containment & Forensics
The Golden Rules - Detecting more with RSA Security Analytics
Zero-Day Vulnerability and Heuristic Analysis
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response

What's hot (19)

PPTX
Security operation center (SOC)
PPTX
Understanding advanced persistent threats (APT)
PPTX
Threat Hunting 101: Intro to Threat Detection and Incident Response
PDF
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
PPTX
Advanced persistent threat (apt)
PDF
DTS Solution - Building a SOC (Security Operations Center)
PDF
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
DOC
Honeypot Essentials
PDF
The Critical Security Controls and the StealthWatch System
PDF
Introduction to the advanced persistent threat and hactivism
PPTX
Using Big Data for Cybersecurity
PPTX
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
PDF
Science of Security: Cyber Ecosystem Attack Analysis Methodology
PPTX
Cyber Incident Response Triage - CPX 360 Presentation
PPTX
Malware detection how to spot infections early with alien vault usm
PPTX
Advanced Persistent Threats (APTs) - Information Security Management
PDF
The Rise of the Purple Team
PDF
Journey to the Center of Security Operations
PDF
Meet Me in the Middle: Threat Indications and Warning in Principle and Practice
Security operation center (SOC)
Understanding advanced persistent threats (APT)
Threat Hunting 101: Intro to Threat Detection and Incident Response
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Advanced persistent threat (apt)
DTS Solution - Building a SOC (Security Operations Center)
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Honeypot Essentials
The Critical Security Controls and the StealthWatch System
Introduction to the advanced persistent threat and hactivism
Using Big Data for Cybersecurity
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
Science of Security: Cyber Ecosystem Attack Analysis Methodology
Cyber Incident Response Triage - CPX 360 Presentation
Malware detection how to spot infections early with alien vault usm
Advanced Persistent Threats (APTs) - Information Security Management
The Rise of the Purple Team
Journey to the Center of Security Operations
Meet Me in the Middle: Threat Indications and Warning in Principle and Practice
Ad

Similar to Splunk for Security (20)

PPTX
Splunk for Security Breakout Session
PPTX
SplunkLive! - Splunk for Security
PDF
SplunkLive! Stockholm 2015 breakout - Analytics based security
PPTX
Splunk Discovery Day Düsseldorf 2016 - Splunk für Security
PPTX
Virtual Gov Day - Security Breakout - Deloitte
PDF
Splunk for security
PDF
SplunkLive! Amsterdam 2015 - Analytics based security breakout
PDF
Enterprise Security featuring UBA
PDF
SplunkSummit 2015 - Splunk User Behavioral Analytics
PPTX
Building an Analytics - Enabled SOC Breakout Session
PPTX
Splunk for Enterprise Security featuring User Behavior Analytics
PPTX
Learn how to use an Analytics-Driven SIEM for your Security Operations
PPTX
Splunk live nyc_2017_sec_buildinganalyticsdrivensoc
PPTX
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
PPTX
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...
PPTX
Splunk for Enterprise Security featuring User Behavior Analytics
PPTX
Enterprise Security and User Behavior Analytics
PDF
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
PPTX
Splunk Discovery Day Dubai 2017 - Security Keynote
PPTX
Splunk EMEA Webinar: Scoping infections and disrupting breaches
Splunk for Security Breakout Session
SplunkLive! - Splunk for Security
SplunkLive! Stockholm 2015 breakout - Analytics based security
Splunk Discovery Day Düsseldorf 2016 - Splunk für Security
Virtual Gov Day - Security Breakout - Deloitte
Splunk for security
SplunkLive! Amsterdam 2015 - Analytics based security breakout
Enterprise Security featuring UBA
SplunkSummit 2015 - Splunk User Behavioral Analytics
Building an Analytics - Enabled SOC Breakout Session
Splunk for Enterprise Security featuring User Behavior Analytics
Learn how to use an Analytics-Driven SIEM for your Security Operations
Splunk live nyc_2017_sec_buildinganalyticsdrivensoc
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...
Splunk for Enterprise Security featuring User Behavior Analytics
Enterprise Security and User Behavior Analytics
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk EMEA Webinar: Scoping infections and disrupting breaches
Ad

More from Gabrielle Knowles (20)

PDF
SplunkLive Sydney Enterprise Security & User Behavior Analytics
PDF
SplunkLive Sydney Scaling and best practice for Splunk on premise and in the ...
PDF
SplunkLive Sydney Machine Learning & Analytics
PDF
SplunkLive Melbourne Machine Learning & Analytics
PDF
SplunkLive Melbourne Splunk for Developers
PDF
SplunkLive Melbourne Scaling and best practice for Splunk on premise and in t...
PDF
SplunkLive Melbourne Enterprise Security & User Behavior Analytics
PDF
SplunkLive Perth Enterprise Security & User Behavior Analytics
PDF
SplunkLive Perth Machine Learning & Analytics
PDF
SplunkLive Brisbane Splunk for Operational Security Intelligence
PDF
SplunkLive Brisbane Splunking the Endpoint
PDF
SplunkLive Brisbane Getting Started with IT Service Intelligence
PDF
SplunkLive Brisbane Splunk for Developers
PDF
SplunkLive Canberra Enterprise Security & User Behavior Analytics
PDF
SplunkLive Canberra Machine Learning & Analytics
PDF
SplunkLive Canberra Getting Started with IT Service Intelligence
PDF
Getting Started with Splunk
PDF
Customer Presentation - Student Job Search
PDF
Delivering New Visibility and Analytics for IT Operations
PDF
New Features, Pivot and Search Dojo
SplunkLive Sydney Enterprise Security & User Behavior Analytics
SplunkLive Sydney Scaling and best practice for Splunk on premise and in the ...
SplunkLive Sydney Machine Learning & Analytics
SplunkLive Melbourne Machine Learning & Analytics
SplunkLive Melbourne Splunk for Developers
SplunkLive Melbourne Scaling and best practice for Splunk on premise and in t...
SplunkLive Melbourne Enterprise Security & User Behavior Analytics
SplunkLive Perth Enterprise Security & User Behavior Analytics
SplunkLive Perth Machine Learning & Analytics
SplunkLive Brisbane Splunk for Operational Security Intelligence
SplunkLive Brisbane Splunking the Endpoint
SplunkLive Brisbane Getting Started with IT Service Intelligence
SplunkLive Brisbane Splunk for Developers
SplunkLive Canberra Enterprise Security & User Behavior Analytics
SplunkLive Canberra Machine Learning & Analytics
SplunkLive Canberra Getting Started with IT Service Intelligence
Getting Started with Splunk
Customer Presentation - Student Job Search
Delivering New Visibility and Analytics for IT Operations
New Features, Pivot and Search Dojo

Recently uploaded (20)

PPTX
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
PPTX
IBA_Chapter_11_Slides_Final_Accessible.pptx
PDF
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
PPT
Chapter 2 METAL FORMINGhhhhhhhjjjjmmmmmmmmm
PPTX
CEE 2 REPORT G7.pptxbdbshjdgsgjgsjfiuhsd
PPTX
Moving the Public Sector (Government) to a Digital Adoption
PPTX
climate analysis of Dhaka ,Banglades.pptx
PPTX
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
PDF
Fluorescence-microscope_Botany_detailed content
PPTX
Computer network topology notes for revision
PDF
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
PDF
Lecture1 pattern recognition............
PDF
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING-PDF-FILE.pdf
PDF
“Getting Started with Data Analytics Using R – Concepts, Tools & Case Studies”
PPTX
Business Acumen Training GuidePresentation.pptx
PDF
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
PPTX
Acceptance and paychological effects of mandatory extra coach I classes.pptx
PDF
Mega Projects Data Mega Projects Data
PPTX
Introduction to Knowledge Engineering Part 1
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
IBA_Chapter_11_Slides_Final_Accessible.pptx
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
Chapter 2 METAL FORMINGhhhhhhhjjjjmmmmmmmmm
CEE 2 REPORT G7.pptxbdbshjdgsgjgsjfiuhsd
Moving the Public Sector (Government) to a Digital Adoption
climate analysis of Dhaka ,Banglades.pptx
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
Fluorescence-microscope_Botany_detailed content
Computer network topology notes for revision
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
Lecture1 pattern recognition............
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING-PDF-FILE.pdf
“Getting Started with Data Analytics Using R – Concepts, Tools & Case Studies”
Business Acumen Training GuidePresentation.pptx
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
Acceptance and paychological effects of mandatory extra coach I classes.pptx
Mega Projects Data Mega Projects Data
Introduction to Knowledge Engineering Part 1

Splunk for Security

  • 1. Copyright  ©  2014  Splunk  Inc. Splunk for  Security Continuous  Monitoring  and  Analytics-­‐Driven   Security  for  Modern  Threats Simon  O’Brien,  Security  SME,  ANZ
  • 2. SPLUNK FOR SECURITY Connecting People and Data, with Context and Extended Intelligence
  • 3. The  Ever-­‐Changing  Threat  Landscape 3 67% Victims  notified  by   external  entity 100% Valid  credentials were  used 229 Median  #  of  days   before  detection Source:  Mandiant  M-­‐Trends  Report  2012/2013/2014
  • 5. New  approach  to  security  operation  is  needed • Human  directed • Goal-­‐oriented • Dynamic  (adjust  to  changes) • Coordinated • Multiple  tools  &  activities • New  evasion  techniques • Fusion  of  people,  process,  &   technology • Contextual  and  behavioral • Rapid  learning  and  response • Share  info  &  collaborate • Analyze  all  data  for  relevance • Leverage  IOC  &  Threat  Intel THREAT Attack  Approach Security  Approach 5 TECHNOLOGY PEOPLE PROCESS
  • 6. New  approach  to  security  operation  is  needed THREAT Attack  Approach Analytics-­‐driven  Security Security  Approach 6 TECHNOLOGY PEOPLE PROCESS • Human  directed • Goal-­‐oriented • Dynamic  (adjust  to  changes) • Coordinated • Multiple  tools  &  activities • New  evasion  techniques
  • 7. • Continuously Protect the   business  against: ê Data  Breaches   ê Malware   ê Fraud   ê IP  Theft • Comply with  audit  requirements • Provide  enterprise  Visibility 7 Security  &  Compliance Top  Splunk  Benefits • 70%  to 90%  improvement  with   detection  and  research  of  events • 70%  to 95%  reduction  in  security   incident  investigation  time • 10%  to 30%  reduction  in  risks   associated  with  data  breaches,   fraud  and  IP  theft • 70%  to 90%  reduction  in   compliance  labor Top  Goals
  • 8. 8 All  Data  is  Security  Relevant  =  Big  Data Servers Storage DesktopsEmail Web Transaction Records Network Flows DHCP/  DNS Hypervisor Custom   Apps Physical Access Badges Threat   Intelligence Mobile CMDB Intrusion   Detection Firewall Data  Loss   Prevention Anti-­‐ Malware Vulnerability Scans Traditional Authentication
  • 9. 9 Solution:  Splunk,  The  Engine  For  Machine  Data Online   Services Web   Services Servers Security GPS   Location Storage Desktops Networks Packaged   Applications Custom Applications Messaging Telecoms Online   Shopping   Cart Web   Clickstreams Databases Energy   Meters Call  Detail   Records Smartphones   and  Devices RFID Developer Platform Report   and   analyze Custom   dashboards Monitor   and  alert Ad  hoc   search Real-­‐Time Machine  Data References – Coded   fields,  mappings,  aliases Dynamic  information   – Stored   in  non-­‐traditional   formats Environmental   context   – Human  maintained   files,  documents System/application   – Available  only  using  application   request Intelligence/analytics   – Indicators,   anomaly,  research,   white/blacklist
  • 10. 10 The  Splunk  Platform  for  Security  Intelligence   SPLUNK  ENTERPRISE  (CORE) Copyright  ©  2014  Splunk  Inc. 200+  APPS SPLUNK FOR  SECURITY SPLUNK-­‐BUILT  APPS … Stream  data Cisco   Security   Suite Windows/   AD/  Exchange Palo  Alto   Networks FireEye Bit9 DShield DNS OSSEC
  • 11. Connecting  the  “data-­‐dots”  via  multiple/dynamic  relationships Persist,  Repeat Threat  intelligence Auth -­‐ User  Roles Host   Activity/Security Network   Activity/Security Attacker,  know  relay/C2  sites,  infected  sites,  file   hashes,  IOC, attack/campaign  intent  and  attribution Where  they  went,  who  talked  to  whom,  attack   transmitted,  abnormal  traffic,  malware  download What  process  is  running  (malicious,   abnormal,  etc.)   Process  owner,  registry  mods,  attack/malware   artifacts,  patching  level,  attack  susceptibility Access  level,  privileged  users,  likelihood   of  infection,   where  they  might  be  in  kill  chain   Delivery,  exploit   installation Gain  trusted   access ExfiltrationData  GatheringUpgrade  (escalate) Lateral  movement Persist,  Repeat 11
  • 12. Security  Intelligence  Use  Cases SECURITY  &                     COMPLIANCE   REPORTING REAL-­‐TIME   MONITORING  OF   KNOWN  THREATS DETECTING   UNKNOWN   THREATS INCIDENT   INVESTIGATIONS   &  FORENSICS FRAUD   DETECTION INSIDER   THREAT Complement,  replace  and  go  beyond  traditional  SIEMs 12
  • 13. Splunk Enterprise  Security Risk-­‐Based   Analytics Visualize   and  Discover   Relationships Enrich  Security   Analysis  with   Threat  Intelligence 13 The  artist  formerly  known  as  the  ‘app  for’
  • 14. Splunk  Enterprise  Security  – 5  Releases  in  21  Months 14 Q3 2014 Q4 2014 Q2 2015 ES  3.1 •Risk  Framework •Guided  Search •Unified  Search   Editor •Threatlist Scoring •Threatlist Audit ES  4.0 • Breach  Analysis • Integration  with   Splunk  UBA • Splunk  Security   Framework ES  3.0 ES  3.2 •Protocol   Intelligence   (Stream capture) •Semantic  Search   (Dynamic   Thresholding) ES  3.3 •Threat  Intel   framework •User  Activity   Monitoring •Content  Sharing •Data  Ingestion Q4 2015
  • 15. DEMO!
  • 18. 18
  • 19. Copyright  ©  2014  Splunk  Inc. Splunk User  Behavior  Analytics   for  threat  detection  
  • 20. BIG  DATA   DRIVEN SECURITY ANALYTICS MACHINE LEARNING A  NEW  PARADIGM DATA-­‐SCIENCE  DRIVEN  BEHAVIORAL  ANALYTICS
  • 21. What  does  Splunk UBA  do? 21 SIEM Firewall, AD, DLP AWS, VM Cloud, Mobile End point, Host, App, DB logs Netflow, PCAP Threat Feeds Next-Gen Data Science-driven Threat Detection Application for SOC Analysts Kill Chain Detection Ranked Threat Review Actions & Resolution 99.99%  event   reduction Security Analytics
  • 22. SPLUNK UBA MACHINE   LEARNING BEHAVIOR   ANALYTICS ANOMALY   DETECTION THREAT   DETECTION SECURITY   ANALYTICS 22
  • 23. THREAT  DETECTION KEY  WORKFLOWS  – SOC  ANALYST SOC  ANALYST § Quickly  spot  threats  within  your   network § Leverage  Threat  Detection  workflow   to  investigate  insider  threats  and   cyber  attacks     § Act  on  forensic  details  – deactivate   accounts,  unplug  network  devices,  etc.
  • 24. SECURITY  ANALYTICS KILL-­‐CHAIN HUNTER KEY  WORKFLOWS  -­‐ HUNTER § Investigate  suspicious  users,  devices,   and  applications § Dig  deeper  into  identified  anomalies   and  threat  indicators § Look  for  policy  violations
  • 25. Threat  Example 25 John  logs  in  via VPN  from  1.0.63.14  at  3pm   John  elevates  his  privileges  for  the  PCI  network John  performs  a  remote  desktop  on  a  system   as  Administrator  on  the  PCI  network  zone John  (Admin) performs  an  ssh as  root  to  a  new   machine  in  the  BizDev department   John  (Adminàroot) accesses  the  folder  with  all   the  excel  and  negotiations  documents  on  the   BizDev file  shares John  (Adminàroot) copies  all  the  negotiation   docs  to  another  share  on  the  corpzone John (Adminàroot) uses  a  set  of  Twitter  handles   to  chop  and  copy  the  data  outside  the   enterprise Time Unusual   Geo  for  John  (China) Unusual   Activity  Time Unusual   Zone  (CorpàPCI) traversal  for  John   (lateral  movement) Unusual   Machine  Access   (lateral   movement;   individual  +  peer   group) Unusual   File  Access   (individual  +  peer   group) Excessive   Data  Transmission (individual  +  peer   group) Unusual   Zone  combo   (PCIàcorp) for  John   Multiple  Outgoing  Connections Unusual   VPN  session   duration  (11h) John 3:00 PM 3:05 PM 3:15 PM 3:40 PM 6 PM 11:35 PM Unusual   Activity  Sequence   (AD/DC   Privilege   Escalation) 3:10 PM User Activities Risk/Threat Detection Areas
  • 28. DEMO!