400 likes | 417 Views
Understand the changing landscape of security operations centers (SOC) and learn how automation, advanced analytics, and threat intelligence can enhance threat detection and response. Explore Cisco's SOC advisory services and accelerate your SOC with Cisco's security technologies.
E N D
Singapore . 16 April 2019 #CiscoConnectSG
From Chasing Alerts to Hunting Threats What makes an Effective SOC is Evolving Peter Baurichter Manager ASEAN Security Services, Cisco
Security challenges go deeper than technology 2 millioncybersecurity positions are projected to go unfilled by 2019* SOCs are understaffed Overwhelmed with alerts from disparate security products Unable to keep pace with current threats. *according to Cybersecurity Ventures, 2017
And time is a critical factor Late detection High impact 1 in 4 Risk of a major breach in the next 24 months Early detection Low impact Time Industry average detection time for a breach Industry average time to contain a breach Average cost of a data breach Source:Ponemon 2018 Cost of a Data Breach Study
SOC – What is Changing? Data analytics Events correlation Threat Centric Investigation & hunting Incident investigation Automation Analyst Tasks + Threat intelligence consumption Consuming constituency data The concepts of datamart and data lakes SIEM DB
SOC – What is Changing? + Data science-centric analytics Threat Centric Deterministic and statistical Analytics SOC data bus Data sharing is SIEM centric Programing the requirements Creating SIEM rules Developing and consuming open APIs Limited integration capabilities Machine learning for everyone, i.e. Machine learning as a service Machine learning is for data scientists
Beyond Basic SOC Service Advanced Threat Intelligence Automation Advanced Reporting: KPIs, KRIs AdvancedSecurity Analytics Enhance Threat Detection and Response Advanced Case Management Threat Hunting and Deception
We believe security systems should empower your people to investigate and respond to threats faster Automation should reduce the burden on the SOC Alerts should be relevant and prescriptive Security products and threat intel should all work together
Expand Reduce Accelerate massive data sets to get to the critical alerts that matter response capabilities visibility across your entire attack surface
You can’t respond to what you can’t see HQ KNOW every host SEE every communication Understand what is NORMAL Be alerted toCHANGE Respond to THREATS quickly Network Users Data Center Admin Cloud Branch Roaming Users
Evaluate, build and maintain a successful SOC with Cisco SOC Advisory Services Strategy Architecture and design based on desired outcomes using preferred operational model Assessments and Testing Planning to ensure effectiveness to guide development
Reference SOC Architecture Short term-data lake Case Mgmt and SLA/KPI Reporting Portal Threat Intelligence (collection, correlation, scoring, enrichment, etc.) Development Governance Service management Top Level Analytics Access to log and alerts Portal Engineering Local agencies NetFlow Analytics Foreign agencies Long term-data lake Dark web Private threat feeds CERT(s) Major institutes Case Mgmt Social networks DPI Packet capture Structured data Unstructured data Context Data Vulnerability info Public threat feeds Threat Researcher SOCAnalyst ThreatHunter Service Consumer Entity B Entity C Entity A Multi-cloud DNS ISE FW IPS
Accelerate your SOC with Cisco Security technologies Cisco Threat Response AMP for Endpoints and Threat Grid Umbrella Investigate Stealthwatch immediately raises the alarm by pinpointing malicious network activities, and helps to understand the scope of the attack brings together intelligence from different sources to present a single view of the what, where, when and how of the threat automatically flags the file as malicious with deep malware analysis, and prevents it from spreading identifies the malicious domain callback, and associated infrastructure in order to prevent future attacks by the entity
Reference SOC Architecture Short term-data lake Top Level Analytics Case Mgmt and SLA/KPI Reporting Portal Access to log and alerts Portal Threat Intelligence (collection, correlation, scoring, enrichment, etc.) Engineering Governance Service management Long term-data lake Dark web NetFlow Analytics Local agencies Development Social networks Private threat feeds CERT(s) Major institutes Case Mgmt Foreign agencies DPI Packet capture Structured data Unstructured data Context Data Vulnerability info Public threat feeds Threat Researcher SOCAnalyst ThreatHunter Service Consumer Entity A Entity C Multi-cloud Entity B DNS ISE FW IPS
Automation of the SOC aims to streamlines a series of time consuming, repetitive, manual tasks into cohesive and automated playbooks.
Automating the SOC Tasks Escalation and Notification Case Management Automation Analysis and Investigation Data Enrichment Adaptive Response Reporting and KPIs
A Customer Test – One Process What was involved? Four dashboards! Copy and paste! Other alerts were getting generated simultaneously! 15min 20min 23min The analyst retrieves threat intel information about a URL (virus total) The analyst opens a case and assigns to L2 An L1 analyst attends the alert The analyst access Microsoft AD to retrieve user information 0 A high alert is generated 34min
What if? • What if we can save 10 minutes per alert? • How many alerts can we optimize? • How many analysts per shift? • How many shifts per day?
Automating “this” Process What was involved? One dashboard No copy and paste Time to triage and analyze is optimized 1min 2min 2min Threat intel information about the URL is retrieved An L1 analyst attends the alert on the case management platform Alert created on case management platform MS AD information about user is retrieved 0 A high alert is generated 15min
CREATE AND EXECUTE PLAYBOOKS TO RUN COURSES OF ACTIONS FOR YOU SECURITY TEAM WITH A SIMPLE CLICK DECISION Execute Playbook automatically or manually. Gain relevant data through orchestration of other tools in your network.
Proactive vs reactiveHunters go out and look for intruders before any alerts are generated
Starts with “a what-if question”, followed by an initial lead/clue, but then hunters take many twists and turns
Hunters do not follow rules, but can have a loose methodology
Respond to an incident Threat Hunting – A Loose Methodology If proven, pivot and expand the scope; follow the hunting process Look for it in the environment Research and optimize Formulate a hypothesis If not proven, optimize and go back Develop new detection content
Focused on Internal Compromises • Nothing superficial! • Identify attacker lateral movement and reconnaissance activity targeting production-critical systems • Embedded (deep) within the applications. Examples: • AD admin accounts (honey) with hashes available on systems in the network • SQL admin accounts (honey) with (honey) tables access • etc. • Deception should be linked with detection, hunting and response. • The practice should be heavily governed! • Possible source of “light” threat intelligence (IOCS and TTPs) • Link that with the broad threat intelligence (ex. decoy documents leaking outside the organization detected through TI or decoy documents calling home!)
About Us The Cisco Security Incident Response Services team is comprised of an international ensemble of seasoned cyber security professionals possessing extensive experience in a variety of disciplines such as computer crime investigations, incident response, malware analysis, threat intelligence and more. Comprised of selectively recruited consultants Ability to reach across the Cisco enterprise International team of experts with diverse backgrounds
Prepare earlier so you can respond faster using Cisco Incident Response Services Retainer Annual Subscription Dedicated Seasoned Consultants • Offer may include: • Emergency Response • Proactive Threat Hunting • IR Readiness Assessments • Table Top Exercises • Access to Included Tools: • AMP for Endpoints • Umbrella • Stealthwatch • Threat Grid Proactive Emergency Emergency Incident Response -contact with your dedicated senior IR pro within 4 hrs -deploy within 24 hrs Proactive Threat Hunting IR Readiness Assessment IR Plans & Playbooks Table Top Exercise
A Winning Combination Deep Telemetry During an incident Seasoned Investigators Law Enforcement Interaction 350+ Full Time Threat Intel Researchers MILLIONS Of Telemetry Agents 4 Global Data Centers 1100+ Threat Traps 100+ Threat Intelligence Partners Deep & Dark Web Research Reverse Engineer Malware Signature Creation
Collaboration On-Demand Cisco Collaboration technology allows for real time and coordination communication across organizations
Singapore . 16 April 2019 #CiscoConnectSG