Bulding Soc In Changing Threat Landscapefinal

35
building a Security Opera2ons Center and KPI for a SOC Mahmoud Yassin Lead Security Architect [email protected]

description

my presentation at E-Crime abu dhabi conference about Security operation center Building and measure performance

Transcript of Bulding Soc In Changing Threat Landscapefinal

Page 1: Bulding Soc In Changing Threat Landscapefinal

building  a  Security  Opera2ons  Center  and  KPI  for  a  SOC  

Mahmoud Yassin Lead Security Architect [email protected]

Page 2: Bulding Soc In Changing Threat Landscapefinal

Overview

Companies like yours ?

Insights into building a SOC team in a changing threat landscape?

Measuring the effectiveness of SOC using key performance indicators

Using 24*7 monitoring to minimize overall risk across an organization

Conclusions

2

Page 3: Bulding Soc In Changing Threat Landscapefinal

Companies like yours ?

3

Page 4: Bulding Soc In Changing Threat Landscapefinal

Threat changed landscape §  Who is targeting you?

§  What are they after?

§  Have they succeeded?

§  How long have they been succeeding?

§  What have I lost so far?

§  What can I do to counter their methods?

§  Are there legal actions I can take?

4

Page 5: Bulding Soc In Changing Threat Landscapefinal

Today’s Threat Landscape

External Attacks Trojans, viruses, worms, phishing .. Not protected by firewalls. Requires IPS

Undetected Attacks Vulnerabilities and compromised machines may lay dormant for months, awaiting an attacker to exploit them. Requires vulnerability awareness and end-point intelligence.

Information Leakage Point-point VPNs + desktop and mobile internet connections provide ample opportunity. Requires compliance monitoring and enforcement

Porous Perimeter Every machine a peering point Laptops carry infection past firewalls. Requires IDS

Intrusion Prevention

Vulnerability Assessment

Network Behavior Analysis (NBA)

Network Access Control (NAC)

Network Intelligence User Intelligence

Physical / Data Center Security

Page 6: Bulding Soc In Changing Threat Landscapefinal

Visibility of Advanced Persistence Threats

6

Source from : [email protected] April 2010

-- Invisible --

Page 7: Bulding Soc In Changing Threat Landscapefinal

What to Monitor 7

Page 8: Bulding Soc In Changing Threat Landscapefinal

Security by Service’s layers

Physical

Data Link

Network

Transport

Session

Presentation

Application

Wiring closets, cable plant, building access control, power, HVAC

Page 9: Bulding Soc In Changing Threat Landscapefinal

Security by Service’s layers

Physical

Data Link

Network

Transport

Session

Presentation

Application

NIDS, HIDS , Perimeter Devices

Virus Scanning

Page 10: Bulding Soc In Changing Threat Landscapefinal

Security by Service’s layers

Physical

Data Link

Network

Transport

Session

Presentation

Application

Firewall, Routers, Access Control Lists (ACLs), IP schemes, E-Mail Attachment Scanning

Page 11: Bulding Soc In Changing Threat Landscapefinal

Security by Service’s layers

Physical

Data Link

Network

Transport

Session

Presentation

Application OS Hardening, Security Health Checking, Vulnerability Scanning, Pen-Testing,

Page 12: Bulding Soc In Changing Threat Landscapefinal

Security by Service’s layers

Physical

Data Link

Network

Transport

Session

Presentation

Application User Account Management on Systems, Role/Rule Bases Access Control, Application Security, Virus Updates, Virus Signatures

Page 13: Bulding Soc In Changing Threat Landscapefinal

The Enterprise Today - Mountains of data, many stakeholders 13

Router logs

IDS/IDP logs

VPN logs

Firewall logs

Windows logs

Wireless access logs

Windows domain logins

Oracle Financial Logs

San File Access Logs

VLAN Access & Control logs

DHCP logs Mainframe

logs

Client & file server logs

Linux, Unix, Windows OS logs

Database Logs

Switch logs

Web server activity logs

Content management logs

Web cache & proxy logs

VA Scan logs

Configuration Control Lockdown enforcement

Access Control Enforcement Privileged User Management

Malicious Code Detection Spyware detection

Real-Time Monitoring Troubleshooting

Unauthorized Service Detection

IP Leakage

False Positive Reduction

User Monitoring SLA Monitoring

Sources from RSA

Page 14: Bulding Soc In Changing Threat Landscapefinal

Top Technical Issues

§  Increase Speed of Aggregation and Correlation §  Maximize Device and System Coverage §  Improve Ability to Respond Quickly §  Deliver 24 x 7 Coverage

§  Support for Federated and Distributed Environments §  Provide Forensic Capabilities §  Ensure Intelligent Integration between SOCs and NOCs §  Time for Remediation

Page 15: Bulding Soc In Changing Threat Landscapefinal

SOC Framework

Operational Models (SOC and ODC)

Industry Standards and Best Practices

(ITIL, BS7799/ISO17799, SANS, CERT)

Service Delivery (Onsite, Near Shore and

Offshore)

Service Delivery Windows

(24x7, 8x5, 12x7 )

Web Portal (Operational Reporting,

Advisories)

Knowledgebase (Incident & Problem Mgmt., Testing, Product evaluation)

Security Center of Excellence

(Test bed, Technology Innovation, Knowledge Mgmt.,

Trainings )

Tools (Helpdesk, Monitoring, Mgmt.,

Configuration, Automation/Workflow)

Command Center

Security Advisory

Reporting

Device Operations

(Change, Vendor Mgmt., Installation, Configuration)

Security Change

Incident Management

Infra. Mgmt. Stream Security Mgmt. Stream

Device Supervision (Performance, Incident,

Monitoring)

Security Monitoring People Resource

(cross skilling, rotation, training, ramp-up and scale

down)

Program Management (Customer interface,

Escalation mgmt., Strategic assistance, Operational

supervision, quality control)

Page 16: Bulding Soc In Changing Threat Landscapefinal

SOC or Operational SOC…

Compliance Operations Security Operations Access Control

Configuration Control Malicious Software

Policy Enforcements User Monitoring & Management

Environmental & Transmission Security

Access Control Enforcement SLA Compliance Monitoring False Positive Reduction Real-time Monitoring Unauthorized Network Service Detection More…

All the Data Log Management

Any enterprise IP device – Universal Device Support (UDS) No filtering, normalizing, or data reduction Security events & operational information

No agents required

Server Engineering Business Ops. Compliance Audit Application & Database Network Ops. Risk Mgmt. Security Ops. Desktop Ops.

Report Alert/Correlation

Incident Mgmt. Log Mgmt.

Asset Ident. Forensics

Baseline

…For Compliance & Security Operations

Page 17: Bulding Soc In Changing Threat Landscapefinal

The 3 (main) functions of a SOC

§  The reason for a SOC: Business Continuity, Risk Mitigation, Cost Efficiency §  What does the SOC do?

1.  Real-time monitoring / management §  Aggregate logs §  Aggregate more than logs §  Coordinate response and remediation §  “Google Earth” view from a security perspective

2.  Reporting / Custom views §  Security Professionals §  Executives §  Auditors §  Consistent

3.  After-Action Analysis §  Forensics §  Investigation §  Automate Remediation

§  Virtues of a SOC: cost efficiency, measurable improvements in availability, lower risk, relevance to the business, transparency, passing audits, consistency, reproduce-ability

§  Vices of a SOC: expensive, little meaning to the business, opacity to the business, no impact on risk, failing audits, inconsistency

Page 18: Bulding Soc In Changing Threat Landscapefinal

Prioritization and Remediation

§  Deal with what’s most relevant to the business first! −  Gather asset data −  Gather business priorities −  Understand the business context of an incident

§  Break-down the IT silos −  Automate the Action after incident discovery −  Coordinate responses −  Inform all who need to know of an incident −  Work with existing ticketing / workflow systems

§  Threat * Weakness * Business Value = Risk §  Deal with BUSINESS RISK

Page 19: Bulding Soc In Changing Threat Landscapefinal

SOC and business Expectation

Technology Based Services Monitoring & Management :

• Firewalls •  IDS/IPS • VPN Concentrators • Antivirus • Content-Filtering

Business Oriented IT Risk Management

•  IT Risk Dashboard • Sustaining Enterprise Security

Control • Meeting Industry Process

Compliance Driven

• Security Control Assessment • Enforcing enterprise security

policies • Log Management •  Incident Management • Audits

Historical Today's Scenario

Page 20: Bulding Soc In Changing Threat Landscapefinal

SOC Architecture

Corporate WAN

SERVER FARM

Storage

Data-Center 1

SERVER FARM

Risk Monitoring

Portal

•  Performance Monitoring •  Security Monitoring •  Availability Monitoring •  Scheduled Reporting

•  Threat Analysis •  Risk Assessment •  Manage Performance •  Manage Availability •  Trend analysis and Reporting •  Compliance Management

Support

Data-Center n

SERVER FARM

Storage SERVER FARM

To Other Business Units

SOC Centralized Management

L1 L2 L3

Process Framework - ITIL , Best Practise - ISO 27001, SANS, FDDI

-  Risk Mitigation Plan -  Control Verification -  Compliance impact

analysis -  Manage new requirements

Page 21: Bulding Soc In Changing Threat Landscapefinal

PROACTIVE SOC APPROACH

Logs

Event Correlation

Reports & Statistics

Forensics

Knowledgebase

Security Analytics

Customer service Technical support

Incident Mgmt Problem Mgmt

Release Mgmt Change Mgmt

Configuration Mgmt Automation & Integration

Security Operations & Management

Infrastructure Assessment Service

Vulnerability Assessment & Penetration Testing

Vulnerability Management

Customized Advisories Forensic investigation tools

Proactive Intelligence

Standards – BSI 15000, ITIL, ISO, ISO27001 etc.

Page 22: Bulding Soc In Changing Threat Landscapefinal

SOC Operational Model (people)

-  Security Event Monitoring

-  Incident Detection & 1st level analysis

-  Routine maintenance & operational tasks

-  Operational reporting

L1: Security Operators

L3: Security Incident

Managers

L2: Security Analysts

Vendor Management -  Technical Support -  Incident Escalation -  Product Support -  Trainings

Knowledgebase/Security Portal

Threat Alert & Advisory

SOC Management Team -  Resource management, skill

development -  Operational process

Improvement -  Program Escalation

Management -  Customer Management

SOC Service Delivery Structure

-  Administration of SOC security -  Implementation projects -  Compliance Mgmt. -  Incident Mgmt. -  Enhancement projects

SOC Security -  Management of SOC tool

configuration -  Enhancement to SOC tools -  Architecture design of SOC -  Transformation Projects for

SOC

SOC Engineering

-  Performance Mgmt. -  Problem Mgmt. -  Change & Release Mgmt. -  Configuration Mgmt. -  Service Level Mgmt. -  Availability & Continuity Mgmt.

-  Incident Analysis & Validation -  Vulnerability Assessment &

Remediation support -  Device mgmt. tasks -  Trend monitoring & analysis -  Vulnerability Impact Analysis -  Escalation Management -  Compliance reporting

-  Incident Handling & Closure

-  Service Mgmt. Reporting -  Compliance impact

analysis -  Manage new requirements

SOC Operations Managers

-  SOC Incident Management

COEs -  Threat A&A -  Innovation -  Benchmarks -  Reuse Component/solutions

Page 23: Bulding Soc In Changing Threat Landscapefinal

SOC Operational model (process)

Information & Action

Network Industry Sources

Firewalls SD

HEWLETTPACKARD

Syslogs SNMP

IDS

NORMALIZE

FILTERING

CORRELATION

INTELLIGENCE

ENGINEERS

Tool Foot Print

Manager

Raw log data

Alerts & normalize log data

SOC

Agent

Dashboard view via portal

Real Time Security Analysis

Response & Management

Real Time Alert Management

Normalised Alerts

Consolidated Logs

Remote management from -SOC

Asset Criticality

Asset Vulnerability

Page 24: Bulding Soc In Changing Threat Landscapefinal

Collect Collect Collect

SOC Operational Model (technology)

Baseline Report Forensics

Manage

Device Device Trend Micro Antivirus

Microsoft ISS

Juniper IDP

Cisco IPS

Netscreen Firewall

Windows Server

Correlated Alerts

Realtime Analysis

Legacy Supported Devices

Integrated Incident Mgmt.

Analyze

Event Explorer

UDS

Remediate

Page 25: Bulding Soc In Changing Threat Landscapefinal

SOC KEY DIFFERENTIATION AREAS

Page 26: Bulding Soc In Changing Threat Landscapefinal

§  Configuration Management Database (CMDB) features: §  Connectors sync data with external systems §  Create, update, and view CIs §  Create relationships among CIs, WIs, IT staff,

and Active Directory® Domain Services (AD DS) users

§  Automatically track CI change history §  Service definition and mapping

Integrated CMDB

Integrated | Efficient | Business Aligned

Work Items

Config Items

CMDB Data

Relationships

Page 27: Bulding Soc In Changing Threat Landscapefinal

§  Process workflows −  Escalations −  Notifications −  Remediation

§  Customizable templates §  Knowledge & History §  Automatic incident creation

−  Desired Configuration Monitor (DCM) errors

−  Operations Manager alerts −  Inbound Email −  Portal

Incident Management Keep users and data center services up and running, and restore service quickly

Page 28: Bulding Soc In Changing Threat Landscapefinal

•  Problem creation from similar incidents or Attacks

•  Link Incidents and Change requests

to problem •  Auto resolution of Incidents linked to

the Problem

Case Management Enables organizations to identify and track problems

Page 29: Bulding Soc In Changing Threat Landscapefinal

§  Typical Change Models −  Standard, Major, Emergency… −  Review and Manual activities

§  Customizable Templates §  Workflows and Notifications §  Analyst Portal

−  Approvals via Web

§  Relate Change Requests to Incidents, Problems and Configuration Items

Change Management Minimize errors and reduce risk

Page 30: Bulding Soc In Changing Threat Landscapefinal

Vulnerability Management Process

1. DISCOVERY (Mapping)

2. ASSET PRIORITISATION (and allocation)

3. ASSESSMENT (Scanning)

4. REPORTING (Technical and Executive)

5. REMEDIATION (Treating Risks)

6. VERIFICATION (Rescanning)

Page 31: Bulding Soc In Changing Threat Landscapefinal

Investigations and Forensics

§  Being able to investigate and manipulate data

§  Visualization §  Post-event correlation §  Managing by case / incident §  Chain of custody §  Integrity of data §  Remediation Automation

Page 32: Bulding Soc In Changing Threat Landscapefinal

SOC Objectives A Framework for Security Operations

Perimeter N

etwork

Operations

eCom

merce

Operations

Internal Systems

& A

pplications

Access Control Enforcement " Privileged user monitoring " Corporate policy conformance

Real-time Monitoring " Troubleshoot network & security

events

" “What is happening?”

False Positive Reduction " Confirm IDS alerts " Enable critical alert escalation

Correlated Threat Detection "Watch remote network areas " Consolidate distributed IDS alerts

Watchlist Enforcement " External threat exposure " Internal investigations

Unauthorized Network Service Detection

" Shutdown rogue services " Intellectual property leakage

SLA Compliance Monitoring " Proof of delivery "Monitor against baselines

= Most critical = Highly desired = Desired

Security Objective

Security Environment

SIEM Capabilities

ü Log Management

ü Asset Identification

ü Baseline

ü Report & Audit

ü Alert

ü Forensic Analysis

ü Incident Management ü Automate learned Incidents Automate Remediation

Page 33: Bulding Soc In Changing Threat Landscapefinal

SOC Recommendation for APT(cont.,)

33

§  SOC Process automation §  have VIM service feeding your SOC and follow-up with different

parties .

§  Scan for zero days

§  Insure security of your security products (patches zero days focus on perimeter devices ).

§  Forensic is not an luxury service SOC should have the tools and ability to analyze. (payloads – sandbox…..)

Page 34: Bulding Soc In Changing Threat Landscapefinal

SOC Recommendation for APT (cont,…)

34

§  Correlate across layers (perimeter with end point output of IDS & IPS)

§  Monitor privileges on suspected or alerted workstation.

§  Enforce Privilege change if there is an infection. §  Manage Exceptions §  Contact Authorities (Cert , ISP’s , Law Enforcement)

Page 35: Bulding Soc In Changing Threat Landscapefinal

Q&A

15/05/2012 35

[email protected]

[email protected]

THANK YOU