neuSECURE
Transcription
neuSECURE
neuSECURE Security Operations and Threat Management Software for the Enterprise © Copyright 2002 GENESIS COMMUNICATION GENESISCOM-V4.1-E./ UZ / 26.03.2002 1 •The neuSECURe product was designed for the Security Analyst by Security Analysts who understood what was needed to battle with a real-time threat •The neuSECURE product was designed to be a complete self contained system with an Operating System that was already stripped down and harden, a database system with a pre-built schema, a built-in trouble ticketing system and an easy to access browser interface for both the operations and administration functions. •The neuSECURE architecture was designed to handle and correlate large amounts of data in real-time so that a true threat could be established and dealt with in real-time. 1 Finding Security Events in the Noise 20‘000‘000 5000 50 24 hours data • 20 Million Events from different Sources • 5000 Alerts • 50 Tickets • 2 Severe Issues 2 © Copyright 2002 GENESIS COMMUNICATION GENESISCOM-V4.1-E./ UZ / 26.03.2002 2 2 Product Architecture © Copyright 2002 GENESIS COMMUNICATION GENESISCOM-V4.1-E./ UZ / 26.03.2002 3 •The neuSECURE product features a modular architecture. •The EAM’s are standalone devices placed at logical points on the network near the security devices that are reporting events. The EAM handles the collection, normalization, encryption and forwarding of the event logs to the Central Management System. •Sensors typically are sending their information UDP and in the Clear - no security. The EAM encrypts the security event information and assures that it arrives at the CMS. •In the event that the communications between the EAM and the CMS is disrupted, the EAM will buffer the event information until communications is restored. •The CMS is responsible for the Event Correlation, Event Analysis, Threat Validation and the Threat Prioritization •The CMS uses a patent pending multi-variant correlation analysis to evaluate and prioritize the threats. • The CMS is modular in that each of the core components can reside on a single system or can be distributed into multiple hardware platforms in order to handle very large loads of events. •Unlike competing products, all of the access to the neuSECURE software for things such as threat monitoring, counter measures and administration is all done from a web browser based interface. This web browser access can be done over SSL running HTTPS. 3 EAM Architecture © Copyright 2002 GENESIS COMMUNICATION GENESISCOM-V4.1-E./ UZ / 26.03.2002 4 •The EAM takes the raw data from the sensor devices and normalizes it for processing by the CMS. Normalization is the process where all the common information such as Source IP, Source Port, Sensor Name etc. are places in their appropriate fields. •Any extra information such as the translated destination and source IP and Port from a Checkpoint firewall is stored in a special field call “Info”. GuardedNet does not throw any sensor information away. •After the information is normalized it is encrypted using ARC4 and sent to the CMS. •The EAM receives the majority of event information via Syslog or SNMP. •The EAM can also take in event information in the raw form directly from selected sensors such as ISS RealSecure. •The EAM can also take in event information using Checkpoints OPSEC protocol or CISCO’s POP protocol. •GuardedNet currently supports approximately 50 sensor devices which are listed on the GuardedNet web sight.. We can test and add any new devices that you may have that support SNMP or Syslog within approximately 2 weeks. 4 CMS Architecture Email, Paging, Alert API Ticketing System API Network Management API Policy Enforcement API Alerting & Response Module Correlation Management Module Event Ticketing Module Relational Database Historical Reporting Module Event Aggregation Module(s) (EAM)TM © Copyright 2002 GENESIS COMMUNICATION Web-based Console Manager (WCM)TM Central Management System (CMSTM) Architecture GENESISCOM-V4.1-E./ UZ / 26.03.2002 5 •The CMS has a number of built in modules to do Alerting, Trouble Ticketing and Historical Reporting, etc. •In order to interface with third party packages the CMS has also built in APIs for E-mail, Customer Ticketing systems, Network Management and Policy Enforcement systems. •Once the CMS has received the event information and performed a correlation analysis on it, the event information is stored in a MySQL database. •MySQL was found to be 10 times faster that the most popular Data Bases on the market, and the price is affordable. •For those customers who prefer to have their event information stored on their own existing standard commercial data base system, neuSECURE has the data base APIs to interface to. 5 Correlation Management Module © Copyright 2002 GENESIS COMMUNICATION GENESISCOM-V4.1-E./ UZ / 26.03.2002 6 •neuSECURE is an anomaly based correlation instead of a rules based correlation system. •A rules based system is difficult to maintain and easy to evade. •Every IDS system adds 300 or more signatures to their inventory every year. A rules based system would have to account for all of the new signatures and since the signatures come out every week, every week the rules based correlation would have to be updated. •Rules are fixed and if you have a rule that states an alert is to be generated if a “reject event” is found on a firewall from the same host name once every 5 minutes then the hacker who is accessing the system once every 10 minutes is going to be passed by. •An anomaly system is looking for things that are out of the ordinary and can account not only for known intrusion routines but also will be able to detect the new and unknown routines more successfully than a rules based system can. •GuardedNet has produced an 8 page document that explains in detail how the anomaly correlation is done called “”Correlation – Security’s Holy Grail?” which is available to you through the GuardedNet web sight. •Our correlation engine uses a patented process refered to as a “multivariate correlation analysis”. This correlation takes into account many variables such as the frequency of events, the geographical locations of the source of the events, the type of event, etc. all with varying weights to be used in the final determination of the level and secerity of the threat. •The customer is able to influence the outcome of the threat severity by having the capability to change the weight of some of the variables such as the source and destination weights of the network and hosts and the validity and priority of the individual events. This is also used to minimize the number and frequency of the false positives. •During the initial installation GENESISCOM will work with the customer to establish a base line for the anomaly correlation system and tune-out the false-positives. 6 Scalability © Copyright 2002 GENESIS COMMUNICATION GENESISCOM-V4.1-E./ UZ / 26.03.2002 7 •NeuSECURE is modularized for scalability so that it can all be placed on a single piece of hardware or distributed globally on multiple hardware platforms. •The scalability allows a customer to not only grow in size but will also allow the customer to take on new sensors in the future that can produce thousands of events per second such as adding Server and Workstation HIDS software. •The modular systems (correlation engine, reporting system, interface system and database management system) that make up the CMS can be distributed among multiple hardware devices in order to grow as the events per second grow and outstrip the existing hardware capabilities. •NeuSECURE modularity also allows the customer high availability by providing the capability of having redundant EAMs and/or CMSes, in order to have an active/active configuration that allows the slave device to take control if the Master device fails. 7 Web-based Console Manager • Secure, Anytime, Anywhere access to centralized view of security environment. • Internet Explorer 5.5 or greater. • Provides world-wide accessibility to management console. • Security through SSL (HTTPS). © Copyright 2002 GENESIS COMMUNICATION GENESISCOM-V4.1-E./ UZ / 26.03.2002 8 •neuSECURE uses a Web-based console Manager instead of a Windows base manager. •The disadvantage of a windows based manager requires a client software to be added to the laptop or PC. Since the security analyst typically does not sit in front of a screen monitoring the threat activity, it is important to be able to give the security analyst access to neuSECURE from anywhere, with what ever device is available at the time of the incident. This can more readily be done with a browser based access then it can be done with a client initiated windows GUI. •Security for access is available through an SSL connection using HTTPS and can be used in conjunction with all of the other security measures that the customer has such as PKI, VPN and Radius Services, etc. 8 Web-based Console Manager © Copyright 2002 GENESIS COMMUNICATION GENESISCOM-V4.1-E./ UZ / 26.03.2002 9 •neuSECURE uses a Web-based console Manager instead of a Windows base manager. •The disadvantage of a windows based manager requires a client software to be added to the laptop or PC. Since the security analyst typically does not sit in front of a screen monitoring the threat activity, it is important to be able to give the security analyst access to neuSECURE from anywhere, with what ever device is available at the time of the incident. This can more readily be done with a browser based access then it can be done with a client initiated windows GUI. •Security for access is available through an SSL connection using HTTPS and can be used in conjunction with all of the other security measures that the customer has such as PKI, VPN and Radius Services, etc. 9 Host Information © Copyright 2002 GENESIS COMMUNICATION GENESISCOM-V4.1-E./ UZ / 26.03.2002 10 •Clicking an IP address (either as a source or destination of a threat) from within the Dashboard will open the Host Window. •The Host window provides an increasingly granular view of information about the IP threat. •The first field ‘Security Domain Membership” will show whether the IP address belongs to one of the internal domains of the enterprise (where 60 -70% of attacks occur) or whether the IP address is outside of the Enterprise. •The second field “Destination Security Domain” will show what domains in the Enterprise are under attack from this particular IP address. •The third field “Destination Hosts” show which hosts within the enterprise are being threatened. •The fourth field “Event Statistics’ show a summary of the events that lead to this attack. •The fifth field “Vulnerabilities” will show whether the Nessus program had found any vulnerabilities associated with this IP address. •The sixth field “Firewall Rules” will show if any time in the past, temporary firewall rules were activated against this IP address. •The seventh field ‘Notes” is used by the user to add information to this record that can show things like, what actions were takes, what e-mails or formal “decease letters” were sent, or any information that the Security Analyst would like to become a permanent part of this IP address record. •Optional views are Host as a Source or Destination and the Time of events from 0ne to Twelve months. 10 Host Information © Copyright 2002 GENESIS COMMUNICATION GENESISCOM-V4.1-E./ UZ / 26.03.2002 11 •At the top of the window are two pull down menus “Watchlist” and “Action” •The Watchlist provides a visual enhancement of networks (colored boarder) and hosts (solid color) by using color coding. •Watchlists are created by the user and can be used for things such as to show when a terrorist (information provided by the FBi through InfraGuard) is threatening your enterprise. •Watchlists can also be used to track secure zones, critical computers, competitors, etc. •If a Security Analyst feels they have enough information pertaining to this threat then they can use the “Actions” tool menu to respond to the threat. •The Actions options are Open a New Ticket, View the Last 200 Events for this Host, View Detailed Information on the Parent Network, View the Host Definition, Initiate a set of firewall Rules against this Host. •The Actions menu allow a Security Analyst to take countermeasures immediately without ever having to leave the neuSECURE program. 11 Host Information Toolkit © Copyright 2002 GENESIS COMMUNICATION GENESISCOM-V4.1-E./ UZ / 26.03.2002 12 •neuSecure does the initial “whois” query of the attacking Host IP address through ARIN (or other geographically appropriate registries). Because ARIN has limits on how many queries can be made and how often, neuSecure does this in the background for the analyst so that the information is ready when the Security Analyst is ready to do the investigation. •This information can include mailing address for formal letter notification, e-mail address for sending a quick decease message and phone numbers for calling directly. •There also are a dozen scanning tools available to help the Security Analyst gather additional information on the attacking host. •Release 1.6 of neuSECURE will also allow the Security Analyst the capability of adding their own pet scanning programs or scripts. •The scanned information becomes a permanent part of the record and avoids having multiple people perform the same scan. This information is refreshed when the scan is redone. •Some of the scans are highly visible and can be restricted to just those analysts who know how to use the tools properly. 12 Event Search Criteria © Copyright 2002 GENESIS COMMUNICATION GENESISCOM-V4.1-E./ UZ / 26.03.2002 13 •If additional event information is required, one of the options in the Actions pull down menu is “View Events from This Host”. •By clicking on this option you will bring up an event search window that is filled in for the analyst to find the last 200 events over the last 3 months that are associated with this IP address. •If the Analyst wishes they can change the default search by filling in the fields to do a more granular search. This is done by filling in the optional fields such as sensor name, sensor type, threat priority, event type, etc. •By clicking on the “Search” button you will bring up the list of events that are associated with the threatening IP address. •Very complex searches can be done by using “regular expressions” in the search fields. 13 Event Search Results © Copyright 2002 GENESIS COMMUNICATION GENESISCOM-V4.1-E./ UZ / 26.03.2002 14 The following is the list of fields fount in the Event Search Window. It is important to note that all of the data from the original event has been preserved to allow for forensic investigation. •ID – A unique identifier given to every event within the neuSECURE system that is based upon the EAM time. •EAM Time – a NTP synced time that provides chronological ordering of data within the neuSECURE system that also allows for proper forensic analysis. Since there is no guarantee that the sensor’s time has been kept in sync the sensor time is kept, but the EAM also stamps the event when it is received. All neuSECURE components, including the EAM are synchronized using NTP (Network Time Protocol). The delay between the sensor and EAM is typically instantaneous (milliseconds). •Sensor Time – The Sensor Time column is hidden by default and can be unhidden by right-clicking on the header line. This is the actual time the sensor reported in the security event. •Sensor Name – the neuSECURE name for the sensor, which includes the security domain prefix facilitates immediate identification of the domain the sensor belongs to. •Sensor Type – A neuSECURE label, based on the type of sensor defined when the sensor was configured within the system. This also makes identification of the device quick and easy. •Protocol – Network protocol reported by the sensor for the incident in question. •SrcIP – The source IP address for the event reported by the sensor. This field can be drilled into by right clicking and choosing Search (Event Search Criteria with IP as source) or Query (Host information window). •DstIP – The destination IP address for the event reported by the sensor. This field can be drilled into by right clicking and choosing Search (Event Search Criteria with IP as destination) or Query (Host information window). •SrcPort – The source service port for the event reported by the sensor. •DstPort – The destination service port for the event reported by the sensor. •Priority – neuSECURE defined priority for the event (can be ignored for the demonstration). 14 Event Search Display Filters © Copyright 2002 GENESIS COMMUNICATION GENESISCOM-V4.1-E./ UZ / 26.03.2002 15 •It is possible to filter out events in the real-time and event search windows by activating user predefines filters. •Investigation is much easier by hiding “extra” or unimportant (to the investigation) data events such as an “accept” event from a firewall. •Display filters do not effect the data that is stored in the event database. • Even with filters turned on it is still possible to see the filtered data intermixed with nonfiltered data. The filters can be turned on/off with the Show/Hide drop down menu at the top right of the Event Search window. Filtered events will appear with a light blue background. 15 Event Search Options © Copyright 2002 GENESIS COMMUNICATION GENESISCOM-V4.1-E./ UZ / 26.03.2002 16 •The Event Search Window show an EAM time stamp for each event. Even though each sensor may have it own local time associated with the event (Sensor Time), the EAMs and CMSes are all synced to a single time stamp (uses NTP) in order to allow the Security Analyst to see all of the events in chronological order. •By default, there are several hidden fields: Sensor Time, Translated Source/Destination IP/Port. The later is most applicable to CheckPoint Firewall-1 data, as this device reports Network Address Translation (NAT) data as appropriate. •The selected data can be exported to the neuSECURE trouble ticketing system as a hyperlink. •In release 1.6 event data can also be “exported” to the customers internal ticketing system (Remedy, Clarify, Peregrine). •To make quick work of “abuse” incidents and forward offending traffic events to a third party, multiple events can be selected (Shift or Control click Event ID cells) and Exported (right-click on Event ID cell). One Export destination is the Clipboard. The visible data will be copied to the clipboard. This data can be pasted into any application that works with the Clipboard – like an email program. The email address for the network administrator could have been gleaned from the Host information window (one click from the main window). •The data captured to the Clipboard can be sanitized by hiding or showing only the columns that are desired. •Event data can also be exported in CSV format. Microsoft Excel is one application that will import data from Comma-Separated Value formatted files and allow the user to perform mathematical analysis on the data. 16 Internal Ticketing System © Copyright 2002 GENESIS COMMUNICATION GENESISCOM-V4.1-E./ UZ / 26.03.2002 17 •neuSECURE contains its own ticketing system that allows users to automatically or manually attach relevant events to a single ticket. •The ticketing system allows user to pass related events amongst groups and individuals. This could be easily used to escalate a series of “interesting” events from lower to higher level support personnel, between operating groups (firewall vs. IDS teams), etc. •Event data can be “exported” to an internal ticket (Remedy, Clarify, Peregrine). •The ticketing system supports Status, Priority, Owner, User, and Group assignments. •A non-modifiable notes section is provides that records all notes and changes made to the ticket. •One of the most important parts of the ticket is the Event Link. Once a ticket has been created, this becomes a hyperlink. The hyperlink will open the Event Search window, producing the specific events linked to the ticket. 17 Events – Real-time Viewer © Copyright 2002 GENESIS COMMUNICATION GENESISCOM-V4.1-E./ UZ / 26.03.2002 18 •The Real-time Event Viewer has the same format as the Event Search. •The Watchlists and Display Filters become even more important when tens or hundreds of events are streaming past in a given second. •The real-time viewer is truly real-time – many of the competitors don’t have this capability. •All of the same features apply that were in the Event Search – exporting data to ticket or clipboard, searching, queries, shown and hidden fields. •Java’s Runtime Environment 1.4 is required for the Real-time viewer, geographic map displays, and Alerting window. 18 Security Baseline – Threat Weighting © Copyright 2002 GENESIS COMMUNICATION GENESISCOM-V4.1-E./ UZ / 26.03.2002 19 •The first place to start configuring neuSECURE to optimize the correlation engine is within the Network and Hosts section of the Infrastructure menu. neuSECURE gives the security administrator the ability to weed out false positives with several different settings. The Network and Hosts section provides a means of setting a threat weighting to the source and destination of networks and hosts. •Network: For example, the secure network should “never” be the destination of traffic from outside networks. Therefore, the Destination Threat Weighting could be set higher than normal (values are 0-255%). Since there may be many users within this network accessing destinations outside of the network, the Source Threat Weighting could be set lower than normal (100% - or a value relatively lower than other network threat weightings). This would suppress events that are sourced from this network and escalate events that are destined to this network. •Hosts: Similar to the network example, a host can be configured with Source and Destination Threat Weightings. This could be used to ensure that the financial server is typically the destination (but not source of) traffic, and an employee’s laptop is generally the source of traffic, but not the destination, etc. 19 Security Baseline – Validity and Priority © Copyright 2002 GENESIS COMMUNICATION GENESISCOM-V4.1-E./ UZ / 26.03.2002 20 •The second major area of end-user configuration is formatting the events. •Eliminating security false positives and creating a security baseline within the system is done by setting the Validity and Priority values (0-255%) for the sensor type and event type. •Validity denotes the accuracy of the device reporting the event to how likely the sensor is to be reporting an event that actually occurred (“Do you trust this device reports events that actually occur?”). Priority describes how important a specific event is in relation to other events being received by neuSECURE (“How important is this event to our environment?”). • Since every environment is different, there isn’t a “standard” or “recommended” configuration for this section, however, that is what also makes this such a powerful configuration tool. Default values are 100% for Validity and 50% for Priority •Since not all sensors (Checkpoint, PIX) list the same event name for the same event, the “Event Class” can be used to list a specific name for an event across all vendor products (e.g. “fw.accept” will look for all firewall accept events from any firewall that is reporting, regardless of vendor and version). 20 Business Rules and Actions © Copyright 2002 GENESIS COMMUNICATION GENESISCOM-V4.1-E./ UZ / 26.03.2002 21 •Actions are to be executed based on Business Rules. neuSECURE provides several actions that can be executed when a business rule criteria is met. These include: Alert (a visual/audible alert window to display events), Email, Ticket (internal ticketing system), OPSEC SAM (used for countermeasures with CheckPoint firewalls, although discouraged due to potential DOS), and Shell scripts (executable files on Solaris and Linux systems). •Statefull Business Rules can be written to execute over a specified time any defined action or series of actions when certain criteria are met. These are the same criteria found in the Event Search Criteria, Display Filters, etc. For example, it might be desirable to create a ticket when CodeRed/Nimda events are noticed. •When creating an automatic ticket, multiple events are attached to a single ticket until that ticket is modified (and then a new ticket is created for subsequent events). •Multiple actions can be executed for a given rule and they are executed in the order listed. 21 Advanced Analytics Package • Custom Report Designer • Report Scheduler • Numerous output types © Copyright 2002 GENESIS COMMUNICATION GENESISCOM-V4.1-E./ UZ / 26.03.2002 22 •The neuSECURE system comes with a standard basic package of reports covering summary and detail information by country source IP, country destination IP, events, hosts, network destination, network source, sensor name, sensor type and ticket. These reports contain hyperlinks which allow the Security Analyst to drill down for additional information and investigation. •The custom reporting module (“Advance Analytics Package”) available in version 1.6 will allow the end user to have virtually any report they need and the ability to customize existing reports and create new ones as theirs needs change. •The custom report writer is Quadbase’s Espress and will allow users to easily design and deploy charts and reports without any coding knowledge. •Espress contains a built-in scheduler, ad hoc reporting, generates web-ready content, 30 different chart types, advanced statistical analysis and can be run from any web browser. •Highly Customizable: Nearly every chart element can be modified or customized in some fashion. In fact there are over 240 different customizable chart attributes. Users can manipulate shading, light source, color, axis scale, grid step, and labels. Legends can be customized as well as fonts, text, annotation, control lines, control areas, and background images. Espress also offers customizable pop-up labels, and mouse events. Espress supports internationalization with local-specific, and time zone formatting. Advanced features include time-series zooming, data drill-down, parameterized charts, run-time text substitution, and customizable axis labels. 22 System Administration © Copyright 2002 GENESIS COMMUNICATION GENESISCOM-V4.1-E./ UZ / 26.03.2002 23 •The system status report gives you a quick thumbnail of how your system is operating and how much of a load it is experiencing •All major processes can be monitored, stopped, and started through the browser. Additionally, database size, event counts, and names can be determined through this interface. Very little has to be done by the system administrator or DBA, making this product even more appealing to most SOC environments that do not have a DBA onsite. It’s even appealing to environments that currently have DBAs because it’s not an additional burden on them! •Inbound Event Queue – count of the events that are waiting to be processed that have been received by the EAMs. This count should always be near zero unless there is an exceptionally heavy load on the system. •Correlation Engine Status – The first job that the CMS is responsible for is looking at the inbound events and correlating them. The Correlation Engine should always be running. •Outbound Event Queue – This queue holds events after they have been correlated and before they are stored into the database. Like the Inbound Event Queue, this value should be near-zero. •Archiver Status – The Archiver is responsible for storing correlated events into the database. This process should always be running. •Network Lookup Queue – To offload the network lookup processes for netblock information and not delay correlation and archiving of the events, this process performs these lookups in the background. With higher event loads, this queue may typically not be near zero. •Network Lookup Process – The network lookup process is responsible for processing netblock information. This process should always be running. •EAM Manager – The EAM Manager maintains connectivity to each EAM configured within the system. This includes ensuring the transfer of data, EAM connectivity and encryption between modules. Data cannot flow from the EAM(s) to the CMS without this process. This process should always be running. •Event Table Status – This window shows the names of the various data tables loaded into the system, their sizes and last time of access (addition). By default, event data tables are broken on monthly boundaries. 23 User Administration © Copyright 2002 GENESIS COMMUNICATION GENESISCOM-V4.1-E./ UZ / 26.03.2002 24 •Every user that has access to the neuSecure system can be given a highly customizable restricted access •The User Administration section contains three important sections: User Accounts, User Profiles, and User Groups. •Individual User Accounts can be created to give each user individual settings of identification and passwords. The individual account will contain the users contact information as well as what profile and groups are assigned to them. •The user profile allows the administrator to set permissions for nearly all aspects of the neuSECURE product. Object permissions provide View, Add, Change, and Delete permissions for Security Domains, Users, Hosts & Networks, Sensors, Rules & Actions, Event Definitions, Tickets, and Firewall Rules. Action Permissions include Running Reports, Importing Vulnerabilities, and System Administration. Workbench Permissions provide granular permissions for each of the investigative workbench tools. •The user groups allow users to be grouped together, and tied to specific security domains. These groupings are useful for attaching specific users to security domains for threat ranking calculations of security domains as well as groups that can be used within the ticketing system. 24 Workflow © Copyright 2002 GENESIS COMMUNICATION GENESISCOM-V4.1-E./ UZ / 26.03.2002 25 25 Device Support © Copyright 2002 GENESIS COMMUNICATION GENESISCOM-V4.1-E./ UZ / 26.03.2002 26 •There are approximately 50 sensor devices that neuSECURE supports with new devices being added to the list every month. •If the user has a device that is not on our list and it supported through SNMP or Syslog then GuardedNet can add that device for the customer within 2 weeks as part of the ongoing maintenance agreement. 26 More about SIM? • SIM Seminar 1. Oktober (Details in the Seminarkalender or on the Web) • Orbit: Stand Halle 1.1 E39 • GENESISCOM Mailingliste [email protected] © Copyright 2002 GENESIS COMMUNICATION GENESISCOM-V4.1-E./ UZ / 26.03.2002 27 27