1 / 16

The Modern SIEM: Key Considerations for Selecting the Platform for the Modern Security Operations Center

Explore the important factors to consider when choosing a SIEM platform for your modern Security Operations Center. Learn how to optimize SOC effectiveness, reduce costs, and address staffing shortages.

ackman
Download Presentation

The Modern SIEM: Key Considerations for Selecting the Platform for the Modern Security Operations Center

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Modern SIEMKey considerations in selecting the platform for the Modern Security Operations Center JESSICA COUTO VP WW Channels

  2. SOC (Security Operations “Capability”) • Network Analysts • System Administrators • Software developers • Analysts – Level 1,2 and 3 • Their job is to find the “bad” and “fix it” • Packet inspection • Identified attacks • Incidents • Investigate

  3. SOC The job of a SOC team is to not stop the instance of an attack; but instead helping to define how to stop whole classes of attacks. SOC analysts spend countless mind numbing man hours reading logs trying to find indicators of an attack or chasing down commodity malware instances. BORING! SOC teams need to figure out a way significantly reduce busy work and focus on the larger scale patterns to be effective

  4. Costs for a SOC • SOC level 1 - $78,173* • SOC level 3 – 114,721* • SOC level 2 - $96,477 (avg) • For a 24X7 SOC operation you need 10 minimum; but more in the range of 30 for large enterprises • The Optimal events per analyst hour (EPAH) should be 8-12 How many alerts do you have per day Salary estimated from 21,105 employees, users, and past and present job advertisements on Indeed in the past 36 months. Last updated: February 18, 2019 - https://www.indeed.com/salaries/Soc-Analyst-Salaries

  5. Scenario 1 • 10 Analysts (6 level 1, 2 level 2, 2 level 3) • Total Salary = $891,434 • 8 hour days per person at 10 events per hour = 80 • 6 SOC level 1 Analysts * 80 events = 480 events per day BUT----- You are currently receiving 2000 events per day!

  6. SOC COST Scenario 2 • Original Salary $891,434 • They can only ready 480 events per day • Currently receiving 2000 events per day • Equates to needing 19 more analysts • 19 X $78,173 = $1,485,287 • ADD that to the original investment – TOTAL $2,376,721!!!!

  7. Quick Survey • How many people think that is the right approach? • Who has unlimited staffing budget? • What if you need to ingest more data– do you keep hiring? • How many think this way is the best approach? • Are there any other alternatives?

  8. Current State of The SOC Many threat alerts are not investigated or remediated 34% Alert Are Legitimate PEOPLE Staffing Shortages 51% Legitimate Alerts are Remediated 49% Legitimate Alerts are Not Remediated PROCESS Inefficient Alert Overload 56% Alerts Are Investigated 44% Alerts Are Not Investigated TECHNOLOGY Legacy Platforms Source: Cisco 2018 Security Capabilities Benchmark Study

  9. Maturing Security Operations Functions • Automation & Orchestration • Monitoring • Detection • Analysis • Response • Hunting • Security Logs, Simple Searching, Compliance Reporting • Correlation Rules, Multiple Alerts, Disparate Log Sources • Contextual Information, Baselining/Thresholds, Behavioral Insights • Incident Management, Forensic Investigation, Escalation, Disruption of Attack Chain • Finding Unknown Unknowns, Experimentation, Gap Analysis

  10. ”SIEM” Evolution • Event Management / Alert Monitoring (SEM) • Central Log Management (SIM) • SOAR • Security Analytics • (UEBA, NTA)

  11. Visibility: See Wider, Deeper, and Further Full analysis of all events, across weeks, without sampling Visibility into logs, endpoint, & network traffic, with user and entity attribution Seamless monitoring of cloud and on-premises infrastructure Traditional SIEM UBA EPP / EDR NTA

  12. The Move to Cloud: Pets vs Cattle • Public cloud computing presents an incredible opportunity for businesses with the knowledge and experience to effectively take advantage of the services AND the cost savings. With the right knowledge, a properly architected system can be a MORE secure environment in public cloud than a traditional on-premises infrastructure. • However, security monitoring of the cloud is challenging due to the paradigm shift in building cloud-native applications. Traditional SIEM tools were designed to ingest the core on-premises security solutions: firewalls, IDS/IPS, proxies, etc. These SIEMs don’t understand cloud data, where workloads may come and go within hours. The methodologies that powered the SIEMs to analyze on-premises data streams simply don’t apply to cloud data.

  13. Example Elasticity: The scale down Dynamic Instances 75k/EPS 1k/EPS 50k/EPS Datacenter Datacenter Datacenter S3 S3 S3 “High Load” Scenario “Burst” Scenario Cloud Design Instances in cluster scale up to meet load. Cloud Design For ‘burst’ scenarios instances scale-up to meet any load. Horizontal Scale Scale up EC2 Cluster Cloud Design EC2 Cluster “Low Load” Scenario Instances ‘scale down’ during low load saving costs. EC2 Cluster Elasticity: Scale up

  14. Example: Elastic Workloads “High Load” Scenario Example (continued) Instances in cluster scale up to meet load. 75k/EPS Cloud Design 50k/EPS 1k/EPS Scale up Datacenter Datacenter Datacenter S3 EC2 Cluster S3 S3 “Burst” Scenario Cloud Design For ‘burst’ scenarios instances scale-up to meet any load. Horizontal scale Scale up Cloud Design EC2 Cluster “Low Load” Scenario Instances ‘scale down’ during low load saving costs. EC2 Cluster The scale down Dynamic Instances “First Up, First Down”

  15. JASK ASOC Platform Insights CLOUD-SCALE FOR BIG DATA AND ANALYTICS ASC SAAS SIMPLICITY USER APPLICATIONS DEVICES NETWORK ALERTS FASTER

  16. The future of cybersecurity will depend on AI. Because Humans are the best cyber-defenders we have.

More Related