Improving Visibility Into Cyber Threats Using Security Analytics

Transcription

Improving Visibility Into Cyber Threats Using Security Analytics
Improving Visibility Into Cyber Threats
Using Security Analytics
David Yoslov
Security Engineer, DTCC
Agenda

Introduction

Evaluating the Environment

Choosing Network Capture Points Part 1 and Part 2

Malware Analysis Module

Reporting Module

Application Rules and Correlation Rules

Custom Parsers

Custom Feeds

Changing Default Settings Part 1 and Part 2

Lessons Learned

Other Recommendations

Specific Use Cases
© Copyright 2014 EMC Corporation. All rights reserved.
#RSAsummit
2
Introduction
 Disclaimer: All views expressed are my own
and not of DTCC
 Experience with Security Analytics
 Primary Focus of Presentation
 Company Information
#RSAsummit
© Copyright 2014 EMC Corporation. All rights reserved.
3
Evaluating the Environment
 Egress points
 Attack vectors
 Protocols used
 Usage of other security tools
 Processes
#RSAsummit
© Copyright 2014 EMC Corporation. All rights reserved.
4
Choosing Network Capture Points Part 1
 Solicit feedback from teams on what they would like
to see
 Passive tap or inline?
 Type of traffic (Web, Mail, FTP, etc.)
 Decryption of traffic
 Can have multiple concentrator/malware views with
proper architecture
#RSAsummit
© Copyright 2014 EMC Corporation. All rights reserved.
5
Choosing Network Capture Points Part 2
#RSAsummit
© Copyright 2014 EMC Corporation. All rights reserved.
6
Malware Analysis Module
#RSAsummit
© Copyright 2014 EMC Corporation. All rights reserved.
7
Reporting Module
 The more specific meta created, the better (within
reason)
 Reference application rules
#RSAsummit
© Copyright 2014 EMC Corporation. All rights reserved.
8
Application Rules and Correlation Rules
Application Rules
Correlation Rules
#RSAsummit
© Copyright 2014 EMC Corporation. All rights reserved.
9
Custom Parsers
 Why are they useful?
 Customize to your environment
 How to create them
Examples:
 Email response codes
 Root email domain
 HTTP Headers
#RSAsummit
© Copyright 2014 EMC Corporation. All rights reserved.
10
Custom Feeds
 Why are they useful?
 Can be stored on local
webserver or online
 CSV format only
#RSAsummit
© Copyright 2014 EMC Corporation. All rights reserved.
11
Changing Default Settings Part 1
• Capture Autostart
• Turn Off Mail and HTTP Parsers (if using LUA equivalent)
#RSAsummit
© Copyright 2014 EMC Corporation. All rights reserved.
12
Changing Default Settings Part 2
• Turn on SSL within Appliance and Device service
#RSAsummit
© Copyright 2014 EMC Corporation. All rights reserved.
13
Lessons Learned
• Consistency in administration
• A better understanding of the network = clearer visibility into
threats
• Inspecting decoder source will spot traffic abnormalities
• Security Analytics Community/Forum (custom parsers
referenced from this presentation will be shared there)
• Health checks (currently manual process)
#RSAsummit
© Copyright 2014 EMC Corporation. All rights reserved.
14
Other Recommendations
• Data acquisition capability from host-based agent
• Sending audit logs to a SIEM/Log Collector
• Disabling parsers not applicable to your environment
• Internal documentation and processes
• Customizing needs based on organization’s threat profile
and the organization’s environment
• Enabling X-Forwarded-For (if applicable)
#RSAsummit
© Copyright 2014 EMC Corporation. All rights reserved.
15
Specific Use Cases
• Live feeds to detect malicious threats (trojans, botnets, etc.)
• Out-of-date Java or browser versions used in environment
• Alerts/Reports from Custom Feeds
• Some DLP (credit card, passwords, etc.)
• RestAPI Queries
#RSAsummit
© Copyright 2014 EMC Corporation. All rights reserved.
16
THANK YOU