380 likes | 888 Views
SIEM: The Tangible and Intangible ROI. Trey Ackerman Director Systems Engineering, NA trey@alienvault.com. What is a SIEM?. Standard SIEM Deployment. Events. Alert. SIEM. Detection. Assessment. Discovery. Monitoring. Incident Response. Security Automation. Detection. Assessment.
E N D
SIEM: The Tangible and Intangible ROI Trey Ackerman Director Systems Engineering, NA trey@alienvault.com
Standard SIEM Deployment Events Alert SIEM Detection Assessment Discovery Monitoring Incident Response
Security Automation Detection Assessment Discovery Monitoring Two way flow of information
Security Automation: Dynamic Event Validation Vulnerability discovered • Was Attack Successful? Attack observed Any connections from the target machine to the attacker? Alert
Security Automation: IR Workflow Automation Incident Response workflow automation starts with a click of a menu and provides … Service Monitoring Network Flow Analysis Full Packet Analysis Shellcode Analysis Vulnerability Assessment
Start with a Robust and Powerful SIEM Platform • Analysis, Incident Management & Reporting • Event Normalization • Real-time Analysis & Correlation • Unified Management SIEM • Basic Security Events • Network • Endpoint • Compliance Logging • Forensically secured • Highly scalable (SAN/NAS) • Rich query interface
Extend the Monitoring and Contextual Input • Detection Tools • IDS / IPS • Host IDS • FIM SIEM • Assessment Tools • Threats • Vulnerability • Basic Security Events • Network • Endpoint • Wireless • Discovery Tools • Identity • Assets • Monitoring Tools • Users/Data • Apps/Services
Problem! Detection Tools Assessment Tools Standard SIEM Generating that data requires expensive sophisticated tools Monitoring Tools Discovery Tools Basic Security Events
Solution: Unified Security Management Detection Assessment IDS/IPSWIDS HIDS/ File Integrity Vulnerability Assessment Threat Assessment Signature and anomaly based intrusion protection (Host, Network, Wireless) Vulnerability and threat assessment SIEM AlienVault SIEM Monitoring Discovery User & Data Application & Services Identity Asset Inventory Insight into availability of services, activities of users, and flow of data An inventory of all security relevant assets under management Basic Security Events
Integration reduces time to visibility • Automatically inventories assets • Assesses assets for vulnerabilities • Analyzes behavior to detect intrusions • Monitors systems for disruptions • Correlates for targeted alerts • Full Visibility out of the box • Assets • Network Activity • Vulnerabilities What do I need to RIGHT NOW?
There is No Security Without Visibility “You cannot fight what you cannot see.” • What is happening? • Where is it happening? • What does that mean to my business? • (Am I going to get fired?)
Technology is no longer the impediment … • Licensing cost • Staff to manage the deployment • Time to make the products work together
For example, just PCI Compliance … • 1.1.2 Network map • 1.1.5 Asset Inventory • 10.7 Log management • 11.1 Wireless IDS • 11.2 Vulnerability Assessment • 11.4 Intrusion Detection System (IDS) • 11.5 File Integrity Monitoring • 12.5.2 SIEM The SIEM pulls it all together, but SIEM alone is not enough
And it costs you more than just money … Estimated price based on consulting engagement for 200 node data center
If you already have all of those security controls …. How long to make them SIEM Aware? Estimated price based on consulting engagement for 200 node data center
AlienVault- Creators of Open Source SIM A Little About Us
Our roots … • Focus on building-in open source security tools • Focused on unified management for a small team • Integrated controls & SIEM to reduce time to secure • Priced for protection • MSSP & Consultants • Leverage open-source to provide best value • Limited by time & resources • Founded OSSIM • Started building in best of breed open-source tools • Provided unified management capabilities
AlienVault Unified Security Management Platform Over 30 essential security management tools built-in Assessment USM Asset Discovery Open source in the box with ability to integrate best of breed commercial solutions as needed
Recent Headlines “A pernicious virus that infects the middleware of smart card readers is attacking users of U.S. Department of Defense (DoD) and Windows smart cards…The trojan, first identified by Alienvault Labs, appears targeted at a particular type of application” AlienVault Nabs Seven Senior HP Security Execs
Security Research Additional Resources
Sample Forensics Report Output • Forensic reports should include: • Incident Summary • Investigation Commenced • Investigative Steps • Forensic/Network Analysis • Document Review • Interviews • Summary of Principal Findings • Forensic AnalysisApplicable PoliciesFactual Chronology • Dates of Events • Findings & Conclusions
Analysis and Research Resources • Malware Analysis Resources including: • PDF Analysis Tools • Sandbox Tools for Malware Analysis • Adobe Flash/Shockwave Analysis Tools • Online Scanner and Malware Analysis tools • http://t.co/i1p6zFRc • Nice egress testing tool: "Egress Buster" • https://www.secmaniac.com/blog/2012/02/29/new-tool-release-egress-buster-find-outbound-ports/ • 10 SQL Injection Tools For Database Pwnage • http://t.co/3kFXzLrG