SlideShare a Scribd company logo
1 of 52
Download to read offline
So You Got That SIEM.

NOW What Do You Do?

       Dr. Anton Chuvakin
        SecurityWarrior LLC
  www.securitywarriorconsulting.com
DIRE WARNING:

  This presentation does
   NOT mention PCI DSS…

                             …oh wait 
www.pcicompliancebook.info       Security Warrior Consulting
                                 Dr. Anton Chuvakin
Outline
•   Brief: What is SIEM?
•   “You got it!”
•   SIEM Pitfalls and Challenges
•   Useful SIEM Practices
    – From Deployment Onwards
• SIEM “Worst Practices”
• Replacing a SIEM and Other Tips
• Conclusions
                                   Security Warrior Consulting
                                   Dr. Anton Chuvakin
About Anton: SIEM Builder and
            User
• Former employee of SIEM and log
  management vendors
• Now consulting for SIEM vendors and
  SIEM users
• SANS Log Management SEC434 class
  author
• Author, speaker, blogger, podcaster (on
  logs, naturally )
                                 Security Warrior Consulting
                                 Dr. Anton Chuvakin
SIEM?




Security Information and Event
          Management!
  (sometimes: SIM or SEM)
                       Security Warrior Consulting
                       Dr. Anton Chuvakin
SIEM and Log Management
SIEM:                LM:
Security Information Log Management
and Event Management

Focus on security use     Focus on all uses
 of logs and other data    for logs



                                  Security Warrior Consulting
                                  Dr. Anton Chuvakin
What SIEM MUST Have?
1.   Log and Context Data Collection
2.   Normalization
3.   Correlation (“SEM”)
4.   Notification/alerting (“SEM”)
5.   Prioritization (“SEM”)
6.   Reporting and report delivery (“SIM”)
7.   Security role workflow (IR, SOC, etc)
                                  Security Warrior Consulting
                                  Dr. Anton Chuvakin
What SIEM Eats: Logs
 <18> Dec 17 15:45:57 10.14.93.7 ns5xp: NetScreen device_id=ns5xp
 system-warning-00515: Admin User anton has logged on via Telnet from
 10.14.98.55:39073 (2002-12-17 15:50:53)


 <57> Dec 25 00:04:32:%SEC_LOGIN-5-
 LOGIN_SUCCESS:Login Success [user:anton]
 [Source:10.4.2.11] [localport:23] at 20:55:40 UTC Fri Feb
 28 2006

  <122> Mar 4 09:23:15 localhost sshd[27577]: Accepted password for
  anton from ::ffff:192.168.138.35 port 2895 ssh2

<13> Fri Mar 17 14:29:38 2006 680 Security SYSTEM User Failure Audit
ENTERPRISE Account Logon
Logon attempt by: MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
 Logon account: ANTON Source Workstation: ENTERPRISE Error
Code: 0xC000006A 4574
What SIEM Eats: Context




                                                           Security Warrior Consulting
                                                           Dr. Anton Chuvakin
http://chuvakin.blogspot.com/2010/01/on-log-context.html
How SIEM Got Here!?
• 1996-2002 IDS and Firewall
  – Worms, alert overflow, etc
  – Sold as “SOC in the box”
• 2003 – 2007 Above + Server + Context
  – PCI DSS, SOX, users
  – Sold as “SOC in the box”++
• 2008+ Above + Applications + …
  – Fraud, insiders, cybercrime
  – Sold as “SOC in the box”+++++   Security Warrior Consulting
                                    Dr. Anton Chuvakin
Thinking Aloud Here…
What do we know about SIEM?
Ties to many technologies, analyzes
 data, requires process around it,
 overhyped

What does it actually mean?
Many people think “SIEM is complex”
                           Security Warrior Consulting
                           Dr. Anton Chuvakin
I will tell you how to do SIEM

        RIGHT!

Useless Consultant Advice Alert!!
                         Security Warrior Consulting
                         Dr. Anton Chuvakin
The Right Way to SIEM
1.    Figure out what problems you want to solve with SIEM
2.    Confirm that SIEM is the best way to solve them
3.    Define and analyze your use cases
4.    Gather stakeholders and analyze their use cases
5.    Research SIEM functionality
6.    Create requirements for your tool, including process requirements
7.    Choose scope for SIEM coverage (with phases)
8.    Assess data volume over all Phase 1 log sources and plan ahead
9.    Perform product research, vendor interviews, references, peer groups
10.   Create a tool shortlist
11.   Pilot top 2-3 products in your environment
12.   Test the products for features, usability and scalability vs requirements
13.   Select a product for deployment and #2 product for backup
14.   Update or create procedures, IR plans, etc
15.   Create SIEM operational procedures
                                                                     Security Warrior Consulting
16.   Deploy the tool (phase 1)                                      Dr. Anton Chuvakin
The Popular Way to SIEM…
1. Buy a SIEM appliance




                          Security Warrior Consulting
                          Dr. Anton Chuvakin
… Backed by Online “Research”




              15      Security Warrior Consulting
                      Dr. Anton Chuvakin
Got Difference?
What people        What people
 NEED to know       WANT to know
 and have before    and have before
 they deploy a      they deploy a
 SIEM?              SIEM?




                           Security Warrior Consulting
                           Dr. Anton Chuvakin
Got SIEM?
Have you inherited it?


Now what?




                         Security Warrior Consulting
                         Dr. Anton Chuvakin
Popular #SIEM_FAIL
… in descending order by frequency:
1.   Misplaced expectations (“SOC-in-a-box”)
2.   Missing requirements (“SIEM…huh?”)
3.   Wrong project sizing
4.   Political challenges with integration
5.   Vendor deception
6.   And only then: product not working 

                                      Security Warrior Consulting
                                      Dr. Anton Chuvakin
What is a “Best Practice”?
• A process or practice that
  –The leaders in the field
    are doing today
  –Generally leads to useful
    results with cost
    effectiveness
P.S. If you still hate it – say
“useful practices”                Security Warrior Consulting
                                  Dr. Anton Chuvakin
BP0 How to Plan Your Project?

1.Goals and requirements (WHY)
2.Functionality / features (HOW)
3.Scope of data collection (WHAT)
4.Sizing (HOW MUCH)
5.Architecting (WHERE)
                         Security Warrior Consulting
                         Dr. Anton Chuvakin
BP1 LM before SIEM!
If you remember one thing from this, let it
   be:
     Deploy Log Management
          BEFORE SIEM!

Q: Why do you think MOST 1990s SIEM
  deployments FAILED?
A: There was no log management!
                                    Security Warrior Consulting
                                    Dr. Anton Chuvakin
SIEM/LM Maturity Curve




                  Security Warrior Consulting
                  Dr. Anton Chuvakin
Graduating from LM to SIEM
Are you ready? Well, do you have…
1. Response capability and process
  – Prepared to response to alerts
2. Monitoring capability
  – Has an operational process to monitor
3. Tuning and customization ability
  – Can customize the tools and content

                                     Security Warrior Consulting
                                     Dr. Anton Chuvakin
BP2 Initial SIEM Use
Steps of a journey …
1. Establish response process
2. Deploy a SIEM
3. Think “use cases”
4. Start filtering logs from LM to SIEM
  – Phases: features and information sources


Prepare for the initial increase in workload
                                   Security Warrior Consulting
                                   Dr. Anton Chuvakin
Example LM->SIEM Filtering
3D: Devices / Network topology / Events
• Devices: NIDS/NIPS, WAF, servers
• Network: DMZ, payment network, other
  “key domains”
• Events: authentication, outbound firewall
  access, IPS

Later: proxies, more firewall data, web
  servers                           Security Warrior Consulting
                                    Dr. Anton Chuvakin
BP3 Expanding SIEM Use
First step, next BABY steps!
1. Compliance monitoring often first
2. “Traditional” SIEM uses
  – Authentication tracking
  – IPS/IDS + firewall correlation
  – Web application hacking
3. Your simple use cases
  – What problems do YOU want solved?

                                     Security Warrior Consulting
                                     Dr. Anton Chuvakin
Example: Use Case
Example: cross-system authentication tracking
• Scope: all systems with authentication
• Purpose: detect unauthorized access to
  systems
• Method: track login failures and successes
• Rule details: multiple login failures followed by
  login success
• Response plan: user account investigation,
  suspension, communication with suspect user
                                      Security Warrior Consulting
                                      Dr. Anton Chuvakin
“Quick Wins” for Phased Approach
Phased                Phased
approach #1           approach #2
• Collect problems    • Focus on 1 problem
• Plan architecture   • Plan architecture
• Start collecting    • Start collecting
• Start reviewing     • Start reviewing
• Solve problem 1     • Solve problem 1
• Solve problem n     • Plan again
                              Security Warrior Consulting
                              Dr. Anton Chuvakin
10 minutes or 10 months?
                         A typical large
Our log                  customer takes
management



                     ?
                         10 months to
appliance can            deploy a log
be racked,               management
configured and           architecture
collecting logs in       based on our
10 minutes               technology




                           Security Warrior Consulting
                           Dr. Anton Chuvakin
What is a “Worst Practice”?
• As opposed to the “best
  practice” it is …
  –What the losers in the
    field are doing today
  –A practice that generally
    leads to disastrous
    results, despite its
    popularity
                               Security Warrior Consulting
                               Dr. Anton Chuvakin
WP for SIEM Planning
• WP1: Skip this step altogether – just buy
  something
   – “John said that we need a correlation engine”
   – “I know this guy who sells log management tools”
• WP2: Postpone scope until after the purchase
   – “The vendor says „it scales‟ so we will just feed ALL
     our logs”
   – Windows, Linux, i5/OS, OS/390, Cisco – send‟em
     in!

                                          Security Warrior Consulting
                                          Dr. Anton Chuvakin
Case Study: “We Use‟em All”
At SANS Log Management Summit …
• Vendors X, Y and Z claim “Big Finance” as
  a customer
• How can that be?
• Well, different teams purchased different
  products …
• About $2.3m wasted on tools
that do the same!
                                 Security Warrior Consulting
                                 Dr. Anton Chuvakin
WPs for Deployment
• WP3: Expect The Vendor To Write Your
  Logging Policy OR Ignore Vendor
  Recommendations
  – “Tell us what we need – tell us what you
    have” forever…
• WP4: Don’t prepare the infrastructure
  – “Time synchronization? Pah, who needs it”

                                 Security Warrior Consulting
                                 Dr. Anton Chuvakin
Misc Useful SIEM Tips



          34      Security Warrior Consulting
                  Dr. Anton Chuvakin
On SIEM Resourcing
NEWSFLASH! SIEM costs money.
But …




Or…


                        Security Warrior Consulting
                        Dr. Anton Chuvakin
“Hard” Costs - Money
• Initial
  – SIEM license, hardware, 3rd party software
  – Deployment and integration services
• Ongoing
  – Support and ongoing services
  – Operations personnel (0.5 - any FTEs)
• Periodic
  – Vendor services
  – Specialty personnel (DBA, sysadmin)
  – Deployment expansion costs
                                    Security Warrior Consulting
                                    Dr. Anton Chuvakin
“Soft” Costs - Time
• Initial
  – Deployment time
  – Log source configuration and integration (BIG!)
  – Initial tuning, content creation
• Ongoing
  – Report and log review
  – Alert response and escalation
• Periodic
  – Tuning and content creation
  – Expansion: same as initial
                                      Security Warrior Consulting
                                      Dr. Anton Chuvakin
Secret to SIEM Magic!
“Operationalizing” SIEM
(e.g. SOC building)




Deployment Service


SIEM Software/Appliance

                          Security Warrior Consulting
                          Dr. Anton Chuvakin
On Replacing a SIEM




         39      Security Warrior Consulting
                 Dr. Anton Chuvakin
How to Do It?
1. Prepare to run both products for some
   time
2. Draft the new vendor to help you migrate
   the data
3. Be prepared to keep the old SIEM or
   keep the data backups
4. BIG! Migrate SIEM content: reports,
   rules, views, alerts, etc
                     40          Security Warrior Consulting
                                 Dr. Anton Chuvakin
Tip: When To AVOID A SIEM
In some cases, the best “SIEM strategy” is
  NOT to buy one:
1. Log retention focus
2. Investigation focus (log search)

If you only plan to look BACKWARDS – no
    need for a SIEM!

                                  Security Warrior Consulting
                                  Dr. Anton Chuvakin
Conclusions
• SIEM will work and has value … but
  BOTH initial and ongoing time/focus
  commitment is required
• FOCUS on what problems you are trying
  to solve with SIEM: requirements!
• Phased approach WITH “quick wins” is
  the easiest way to go
• Operationalize!!!
                              Security Warrior Consulting
                              Dr. Anton Chuvakin
SIEM Reminders
Cost countless sleepless night and boatloads
  of pain….
• No SIEM before IR plans/procedures
• No SIEM before basic log management
• Think "quick wins", not "OMG ...that SIEM
  boondoggle"
• Tech matters! But practices matter more
• Things will get worse before better.
  Invest time before collecting value!
                                  Security Warrior Consulting
                                  Dr. Anton Chuvakin
And If You Only …

… learn one thing from this….



             … then let it be….


                        Security Warrior Consulting
                        Dr. Anton Chuvakin
Requirements! Requirements! Requirements! Requirements! Requirements!
Requirements! Requirements! Requirements! Requirements! Requirements!

                                           Requirements
Requirements! Requirements! Requirements! Requirements! Requirements!
Requirements! Requirements! Requirements! Requirements! Requirements!
    Requirements
Requirements! Requirements! Requirements! Requirements! Requirements!
Requirements! Requirements! Requirements! Requirements! Requirements!
Requirements! Requirements! Requirements! Requirements! Requirements!
Requirements! Requirements! Requirements! Requirements! Requirements!


    Requirements
Requirements! Requirements! Requirements! Requirements! Requirements!
Requirements! Requirements! Requirements! Requirements! Requirements!
Requirements! Requirements! Requirements! Requirements! Requirements!
Requirements! Requirements! Requirements! Requirements! Requirements!
Requirements! Requirements! Requirements! Requirements! Requirements!

                                      Requirements
Requirements! Requirements! Requirements! Requirements! Requirements!
Requirements! Requirements! Requirements! Requirements! Requirements!
Requirements! Requirements! Requirements! Requirements! Requirements!
Requirements! Requirements! Requirements! Requirements! Requirements!
Requirements! Requirements! Requirements! Requirements! Requirements!
      Requirements
Requirements! Requirements! Requirements! Requirements! Requirements!
Requirements! Requirements! Requirements! Requirements! Requirements!
Requirements! Requirements! Requirements! Requirements! Requirements!
                                          Requirvements
Requirements! Requirements! Requirements! Requirements! Requirements!
Requirements! Requirements! Requirements! Requirements! Requirements! Consulting
                                                          Security Warrior
Requirements! Requirements! Requirements! Requirements! Requirements!
                                                          Dr. Anton Chuvakin
Questions?
Dr. Anton Chuvakin

Email: anton@chuvakin.org
Site: http://www.chuvakin.org
Blog: http://www.securitywarrior.org
Twitter: @anton_chuvakin
Consulting: http://www.securitywarriorconsulting.com

                                        Security Warrior Consulting
                                        Dr. Anton Chuvakin
More Resources
•   Blog: www.securitywarrior.org
•   Podcast: look for “LogChat” on iTunes
•   Slides: http://www.slideshare.net/anton_chuvakin
•   Papers: www.info-secure.org and
    http://www.docstoc.com/profile/anton1chuvakin
• Consulting: http://www.securitywarriorconsulting.com/



                                             Security Warrior Consulting
                                             Dr. Anton Chuvakin
More on Anton
• Consultant: http://www.securitywarriorconsulting.com
• Book author: “Security Warrior”, “PCI Compliance”,
  “Information Security Management Handbook”, “Know
  Your Enemy II”, “Hacker‟s Challenge 3”, etc
• Conference speaker: SANS, FIRST, GFIRST, ISSA,
  CSI, RSA, Interop, many, many others worldwide
• Standard developer: CEE, CVSS, OVAL, etc
• Community role: SANS, Honeynet Project, WASC, CSI,
  ISSA, OSSTMM, InfraGard, ISSA, others
• Past roles: Researcher, Security Analyst, Strategist,
  Evangelist, Product Manager
                                          Security Warrior Consulting
                                          Dr. Anton Chuvakin
Security Warrior Consulting
•
                 Services
   Logging and log management / SIEM strategy, procedures and practices
    – Develop logging policies and processes, log review procedures, workflows and
        periodic tasks as well as help architect those to solve organization problems
    – Plan and implement log management architecture to support your business
        cases; develop specific components such as log data collection, filtering,
        aggregation, retention, log source configuration as well as reporting, review and
        validation
    – Customize industry “best practices” related to logging and log review to fit your
        environment, help link these practices to business services and regulations
    – Help integrate logging tools and processes into IT and business operations
• SIEM and log management content development
    – Develop correlation rules, reports and other content to make your SIEM and log
        management product more useful to you and more applicable to your risk profile
        and compliance needs
    – Create and refine policies, procedures and operational practices for logging
        and log management to satisfy requirements of PCI DSS, HIPAA, NERC, FISMA
        and other regulations
Others at www.SecurityWarriorConsulting.com
                                                                   Security Warrior Consulting
                                                                   Dr. Anton Chuvakin
Misc Resource Slides




         50       Security Warrior Consulting
                  Dr. Anton Chuvakin
Best Reports? SANS Top 7
DRAFT “SANS Top
 7 Log Reports”
1.   Authentication
2.   Changes
3.   Network activity
4.   Resource access
5.   Malware activity
6.   Failures
7.   Analytic reports

                        Security Warrior Consulting
                        Dr. Anton Chuvakin
Best Correlation Rules? Nada
• Vendor default rules?
• IDS/IPS + vulnerability
  scan?

Anton fave rules:
1. Authentication
2. Outbound access
3. Safeguard failure
                            Security Warrior Consulting
                            Dr. Anton Chuvakin

More Related Content

What's hot

PCI 2.0 What's Next for PCI DSS by Dr. Anton Chuvakin
PCI 2.0 What's Next for PCI DSS  by Dr. Anton ChuvakinPCI 2.0 What's Next for PCI DSS  by Dr. Anton Chuvakin
PCI 2.0 What's Next for PCI DSS by Dr. Anton ChuvakinAnton Chuvakin
 
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...Anton Chuvakin
 
Leveraging Compliance for Security with SIEM and Log Management
Leveraging Compliance for Security with SIEM and Log ManagementLeveraging Compliance for Security with SIEM and Log Management
Leveraging Compliance for Security with SIEM and Log ManagementTripwire
 
Zero Day Response: Strategies for the Security Innovation in Corporate Defens...
Zero Day Response: Strategies for the Security Innovation in Corporate Defens...Zero Day Response: Strategies for the Security Innovation in Corporate Defens...
Zero Day Response: Strategies for the Security Innovation in Corporate Defens...Anton Chuvakin
 
Anton's 2020 SIEM Best and Worst Practices - in Brief
Anton's 2020 SIEM Best and Worst Practices - in BriefAnton's 2020 SIEM Best and Worst Practices - in Brief
Anton's 2020 SIEM Best and Worst Practices - in BriefAnton Chuvakin
 
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton ChuvakinPractical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton ChuvakinAnton Chuvakin
 
Got SIEM? Now what? Getting SIEM Work For You
Got SIEM? Now what? Getting SIEM Work For YouGot SIEM? Now what? Getting SIEM Work For You
Got SIEM? Now what? Getting SIEM Work For YouAnton Chuvakin
 
Anton's Log Management 'Worst Practices'
Anton's Log Management 'Worst Practices'Anton's Log Management 'Worst Practices'
Anton's Log Management 'Worst Practices'Anton Chuvakin
 
Six Mistakes of Log Management 2008
Six Mistakes of Log Management 2008Six Mistakes of Log Management 2008
Six Mistakes of Log Management 2008Anton Chuvakin
 
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...Adrian Sanabria
 
SIEM: Is It What Is SIEMs? Security Information and Event Management Summit a...
SIEM: Is It What Is SIEMs? Security Information and Event Management Summit a...SIEM: Is It What Is SIEMs? Security Information and Event Management Summit a...
SIEM: Is It What Is SIEMs? Security Information and Event Management Summit a...Anton Chuvakin
 
Real-time fallacy: how real-time your security really is?
Real-time fallacy: how real-time your security really is?Real-time fallacy: how real-time your security really is?
Real-time fallacy: how real-time your security really is?Anton Chuvakin
 
Exercise Your SOC: How to run an effective SOC response simulation (BSidesCha...
Exercise Your SOC: How to run an effective SOC response simulation (BSidesCha...Exercise Your SOC: How to run an effective SOC response simulation (BSidesCha...
Exercise Your SOC: How to run an effective SOC response simulation (BSidesCha...Brian Andrzejewski
 
451 and Cylance - The Roadmap To Better Endpoint Security
451 and Cylance - The Roadmap To Better Endpoint Security451 and Cylance - The Roadmap To Better Endpoint Security
451 and Cylance - The Roadmap To Better Endpoint SecurityAdrian Sanabria
 
Navigating the Data Stream without Boiling the Ocean:: Case Studies in Effec...
Navigating the Data Stream without Boiling the Ocean::  Case Studies in Effec...Navigating the Data Stream without Boiling the Ocean::  Case Studies in Effec...
Navigating the Data Stream without Boiling the Ocean:: Case Studies in Effec...Anton Chuvakin
 
Top 10 SIEM Best Practices, SANS Ask the Expert
Top 10 SIEM Best Practices, SANS Ask the ExpertTop 10 SIEM Best Practices, SANS Ask the Expert
Top 10 SIEM Best Practices, SANS Ask the ExpertAccelOps
 
Anton Chuvakin on Threat and Vulnerability Intelligence
Anton Chuvakin on Threat and Vulnerability IntelligenceAnton Chuvakin on Threat and Vulnerability Intelligence
Anton Chuvakin on Threat and Vulnerability IntelligenceAnton Chuvakin
 
Enterprise incident response 2017
Enterprise incident response   2017Enterprise incident response   2017
Enterprise incident response 2017zapp0
 
Ten Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard OfTen Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard OfAdrian Sanabria
 

What's hot (20)

PCI 2.0 What's Next for PCI DSS by Dr. Anton Chuvakin
PCI 2.0 What's Next for PCI DSS  by Dr. Anton ChuvakinPCI 2.0 What's Next for PCI DSS  by Dr. Anton Chuvakin
PCI 2.0 What's Next for PCI DSS by Dr. Anton Chuvakin
 
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
 
Leveraging Compliance for Security with SIEM and Log Management
Leveraging Compliance for Security with SIEM and Log ManagementLeveraging Compliance for Security with SIEM and Log Management
Leveraging Compliance for Security with SIEM and Log Management
 
Zero Day Response: Strategies for the Security Innovation in Corporate Defens...
Zero Day Response: Strategies for the Security Innovation in Corporate Defens...Zero Day Response: Strategies for the Security Innovation in Corporate Defens...
Zero Day Response: Strategies for the Security Innovation in Corporate Defens...
 
Anton's 2020 SIEM Best and Worst Practices - in Brief
Anton's 2020 SIEM Best and Worst Practices - in BriefAnton's 2020 SIEM Best and Worst Practices - in Brief
Anton's 2020 SIEM Best and Worst Practices - in Brief
 
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton ChuvakinPractical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
 
Got SIEM? Now what? Getting SIEM Work For You
Got SIEM? Now what? Getting SIEM Work For YouGot SIEM? Now what? Getting SIEM Work For You
Got SIEM? Now what? Getting SIEM Work For You
 
Anton's Log Management 'Worst Practices'
Anton's Log Management 'Worst Practices'Anton's Log Management 'Worst Practices'
Anton's Log Management 'Worst Practices'
 
Six Mistakes of Log Management 2008
Six Mistakes of Log Management 2008Six Mistakes of Log Management 2008
Six Mistakes of Log Management 2008
 
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
 
SIEM: Is It What Is SIEMs? Security Information and Event Management Summit a...
SIEM: Is It What Is SIEMs? Security Information and Event Management Summit a...SIEM: Is It What Is SIEMs? Security Information and Event Management Summit a...
SIEM: Is It What Is SIEMs? Security Information and Event Management Summit a...
 
Real-time fallacy: how real-time your security really is?
Real-time fallacy: how real-time your security really is?Real-time fallacy: how real-time your security really is?
Real-time fallacy: how real-time your security really is?
 
Exercise Your SOC: How to run an effective SOC response simulation (BSidesCha...
Exercise Your SOC: How to run an effective SOC response simulation (BSidesCha...Exercise Your SOC: How to run an effective SOC response simulation (BSidesCha...
Exercise Your SOC: How to run an effective SOC response simulation (BSidesCha...
 
451 and Cylance - The Roadmap To Better Endpoint Security
451 and Cylance - The Roadmap To Better Endpoint Security451 and Cylance - The Roadmap To Better Endpoint Security
451 and Cylance - The Roadmap To Better Endpoint Security
 
2016 virus bulletin
2016 virus bulletin2016 virus bulletin
2016 virus bulletin
 
Navigating the Data Stream without Boiling the Ocean:: Case Studies in Effec...
Navigating the Data Stream without Boiling the Ocean::  Case Studies in Effec...Navigating the Data Stream without Boiling the Ocean::  Case Studies in Effec...
Navigating the Data Stream without Boiling the Ocean:: Case Studies in Effec...
 
Top 10 SIEM Best Practices, SANS Ask the Expert
Top 10 SIEM Best Practices, SANS Ask the ExpertTop 10 SIEM Best Practices, SANS Ask the Expert
Top 10 SIEM Best Practices, SANS Ask the Expert
 
Anton Chuvakin on Threat and Vulnerability Intelligence
Anton Chuvakin on Threat and Vulnerability IntelligenceAnton Chuvakin on Threat and Vulnerability Intelligence
Anton Chuvakin on Threat and Vulnerability Intelligence
 
Enterprise incident response 2017
Enterprise incident response   2017Enterprise incident response   2017
Enterprise incident response 2017
 
Ten Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard OfTen Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard Of
 

Similar to Now What Do You Do With Your New SIEM

So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton ChuvakinSo You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton ChuvakinAnton Chuvakin
 
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton Chuvakin
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton ChuvakinMaking Log Data Useful: SIEM and Log Management Together by Dr. Anton Chuvakin
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton ChuvakinAnton Chuvakin
 
Making Log Data Useful: SIEM and Log Management Together
Making Log Data Useful: SIEM and Log Management TogetherMaking Log Data Useful: SIEM and Log Management Together
Making Log Data Useful: SIEM and Log Management TogetherAnton Chuvakin
 
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinFive Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinAnton Chuvakin
 
Enterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
Enterprise Logging and Log Management: Hot Topics by Dr. Anton ChuvakinEnterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
Enterprise Logging and Log Management: Hot Topics by Dr. Anton ChuvakinAnton Chuvakin
 
Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Claus Cramon Houmann
 
Security For Free
Security For FreeSecurity For Free
Security For Freegwarden
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Claus Cramon Houmann
 
Defending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricalityDefending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricalityClaus Cramon Houmann
 
Career In Information security
Career In Information securityCareer In Information security
Career In Information securityAnant Shrivastava
 
2019 FRSecure CISSP Mentor Program: Class Ten
2019 FRSecure CISSP Mentor Program: Class Ten2019 FRSecure CISSP Mentor Program: Class Ten
2019 FRSecure CISSP Mentor Program: Class TenFRSecure
 
Гірка правда про безпеку програмного забезпечення, Володимир Стиран
Гірка правда про безпеку програмного забезпечення, Володимир СтиранГірка правда про безпеку програмного забезпечення, Володимир Стиран
Гірка правда про безпеку програмного забезпечення, Володимир СтиранSigma Software
 
Sigma Open Tech Week: Bitter Truth About Software Security
Sigma Open Tech Week: Bitter Truth About Software SecuritySigma Open Tech Week: Bitter Truth About Software Security
Sigma Open Tech Week: Bitter Truth About Software SecurityVlad Styran
 
5 Things Your Security Administrator Should Tell You
5 Things Your Security Administrator Should Tell You5 Things Your Security Administrator Should Tell You
5 Things Your Security Administrator Should Tell YouHelpSystems
 
Secure Software Development Lifecycle
Secure Software Development LifecycleSecure Software Development Lifecycle
Secure Software Development Lifecycle1&1
 
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...NoNameCon
 
OWASP Open SAMM
OWASP Open SAMMOWASP Open SAMM
OWASP Open SAMMintive
 
PCI 2010: Trends and Technologies
PCI 2010: Trends and TechnologiesPCI 2010: Trends and Technologies
PCI 2010: Trends and TechnologiesAnton Chuvakin
 
Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...
Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...
Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...IBM Security
 

Similar to Now What Do You Do With Your New SIEM (20)

SIEM Primer:
SIEM Primer:SIEM Primer:
SIEM Primer:
 
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton ChuvakinSo You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
 
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton Chuvakin
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton ChuvakinMaking Log Data Useful: SIEM and Log Management Together by Dr. Anton Chuvakin
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton Chuvakin
 
Making Log Data Useful: SIEM and Log Management Together
Making Log Data Useful: SIEM and Log Management TogetherMaking Log Data Useful: SIEM and Log Management Together
Making Log Data Useful: SIEM and Log Management Together
 
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinFive Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
 
Enterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
Enterprise Logging and Log Management: Hot Topics by Dr. Anton ChuvakinEnterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
Enterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
 
Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015
 
Security For Free
Security For FreeSecurity For Free
Security For Free
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015
 
Defending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricalityDefending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricality
 
Career In Information security
Career In Information securityCareer In Information security
Career In Information security
 
2019 FRSecure CISSP Mentor Program: Class Ten
2019 FRSecure CISSP Mentor Program: Class Ten2019 FRSecure CISSP Mentor Program: Class Ten
2019 FRSecure CISSP Mentor Program: Class Ten
 
Гірка правда про безпеку програмного забезпечення, Володимир Стиран
Гірка правда про безпеку програмного забезпечення, Володимир СтиранГірка правда про безпеку програмного забезпечення, Володимир Стиран
Гірка правда про безпеку програмного забезпечення, Володимир Стиран
 
Sigma Open Tech Week: Bitter Truth About Software Security
Sigma Open Tech Week: Bitter Truth About Software SecuritySigma Open Tech Week: Bitter Truth About Software Security
Sigma Open Tech Week: Bitter Truth About Software Security
 
5 Things Your Security Administrator Should Tell You
5 Things Your Security Administrator Should Tell You5 Things Your Security Administrator Should Tell You
5 Things Your Security Administrator Should Tell You
 
Secure Software Development Lifecycle
Secure Software Development LifecycleSecure Software Development Lifecycle
Secure Software Development Lifecycle
 
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
 
OWASP Open SAMM
OWASP Open SAMMOWASP Open SAMM
OWASP Open SAMM
 
PCI 2010: Trends and Technologies
PCI 2010: Trends and TechnologiesPCI 2010: Trends and Technologies
PCI 2010: Trends and Technologies
 
Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...
Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...
Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...
 

More from Source Conference

iBanking - a botnet on Android
iBanking - a botnet on AndroidiBanking - a botnet on Android
iBanking - a botnet on AndroidSource Conference
 
I want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUICI want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUICSource Conference
 
From DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and BobsFrom DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and BobsSource Conference
 
Extracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus DerivativesExtracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus DerivativesSource Conference
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network SecuritySource Conference
 
Wfuzz para Penetration Testers
Wfuzz para Penetration TestersWfuzz para Penetration Testers
Wfuzz para Penetration TestersSource Conference
 
Security Goodness with Ruby on Rails
Security Goodness with Ruby on RailsSecurity Goodness with Ruby on Rails
Security Goodness with Ruby on RailsSource Conference
 
Securty Testing For RESTful Applications
Securty Testing For RESTful ApplicationsSecurty Testing For RESTful Applications
Securty Testing For RESTful ApplicationsSource Conference
 
Men in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the BrowserMen in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the BrowserSource Conference
 
Advanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done ItAdvanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done ItSource Conference
 
Adapting To The Age Of Anonymous
Adapting To The Age Of AnonymousAdapting To The Age Of Anonymous
Adapting To The Age Of AnonymousSource Conference
 
Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?Source Conference
 
Advanced (persistent) binary planting
Advanced (persistent) binary plantingAdvanced (persistent) binary planting
Advanced (persistent) binary plantingSource Conference
 
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudLegal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudSource Conference
 
Who should the security team hire next?
Who should the security team hire next?Who should the security team hire next?
Who should the security team hire next?Source Conference
 
The Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime LawThe Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime LawSource Conference
 
How To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security SpendHow To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security SpendSource Conference
 

More from Source Conference (20)

Million Browser Botnet
Million Browser BotnetMillion Browser Botnet
Million Browser Botnet
 
iBanking - a botnet on Android
iBanking - a botnet on AndroidiBanking - a botnet on Android
iBanking - a botnet on Android
 
I want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUICI want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUIC
 
From DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and BobsFrom DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and Bobs
 
Extracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus DerivativesExtracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus Derivatives
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
Wfuzz para Penetration Testers
Wfuzz para Penetration TestersWfuzz para Penetration Testers
Wfuzz para Penetration Testers
 
Security Goodness with Ruby on Rails
Security Goodness with Ruby on RailsSecurity Goodness with Ruby on Rails
Security Goodness with Ruby on Rails
 
Securty Testing For RESTful Applications
Securty Testing For RESTful ApplicationsSecurty Testing For RESTful Applications
Securty Testing For RESTful Applications
 
Esteganografia
EsteganografiaEsteganografia
Esteganografia
 
Men in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the BrowserMen in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the Browser
 
Advanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done ItAdvanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done It
 
Adapting To The Age Of Anonymous
Adapting To The Age Of AnonymousAdapting To The Age Of Anonymous
Adapting To The Age Of Anonymous
 
Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?
 
Advanced (persistent) binary planting
Advanced (persistent) binary plantingAdvanced (persistent) binary planting
Advanced (persistent) binary planting
 
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudLegal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
 
Who should the security team hire next?
Who should the security team hire next?Who should the security team hire next?
Who should the security team hire next?
 
The Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime LawThe Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime Law
 
JSF Security
JSF SecurityJSF Security
JSF Security
 
How To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security SpendHow To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security Spend
 

Recently uploaded

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Now What Do You Do With Your New SIEM

  • 1. So You Got That SIEM. NOW What Do You Do? Dr. Anton Chuvakin SecurityWarrior LLC www.securitywarriorconsulting.com
  • 2. DIRE WARNING: This presentation does NOT mention PCI DSS… …oh wait  www.pcicompliancebook.info Security Warrior Consulting Dr. Anton Chuvakin
  • 3. Outline • Brief: What is SIEM? • “You got it!” • SIEM Pitfalls and Challenges • Useful SIEM Practices – From Deployment Onwards • SIEM “Worst Practices” • Replacing a SIEM and Other Tips • Conclusions Security Warrior Consulting Dr. Anton Chuvakin
  • 4. About Anton: SIEM Builder and User • Former employee of SIEM and log management vendors • Now consulting for SIEM vendors and SIEM users • SANS Log Management SEC434 class author • Author, speaker, blogger, podcaster (on logs, naturally ) Security Warrior Consulting Dr. Anton Chuvakin
  • 5. SIEM? Security Information and Event Management! (sometimes: SIM or SEM) Security Warrior Consulting Dr. Anton Chuvakin
  • 6. SIEM and Log Management SIEM: LM: Security Information Log Management and Event Management Focus on security use Focus on all uses of logs and other data for logs Security Warrior Consulting Dr. Anton Chuvakin
  • 7. What SIEM MUST Have? 1. Log and Context Data Collection 2. Normalization 3. Correlation (“SEM”) 4. Notification/alerting (“SEM”) 5. Prioritization (“SEM”) 6. Reporting and report delivery (“SIM”) 7. Security role workflow (IR, SOC, etc) Security Warrior Consulting Dr. Anton Chuvakin
  • 8. What SIEM Eats: Logs <18> Dec 17 15:45:57 10.14.93.7 ns5xp: NetScreen device_id=ns5xp system-warning-00515: Admin User anton has logged on via Telnet from 10.14.98.55:39073 (2002-12-17 15:50:53) <57> Dec 25 00:04:32:%SEC_LOGIN-5- LOGIN_SUCCESS:Login Success [user:anton] [Source:10.4.2.11] [localport:23] at 20:55:40 UTC Fri Feb 28 2006 <122> Mar 4 09:23:15 localhost sshd[27577]: Accepted password for anton from ::ffff:192.168.138.35 port 2895 ssh2 <13> Fri Mar 17 14:29:38 2006 680 Security SYSTEM User Failure Audit ENTERPRISE Account Logon Logon attempt by: MICROSOFT_AUTHENTICATION_PACKAGE_V1_0 Logon account: ANTON Source Workstation: ENTERPRISE Error Code: 0xC000006A 4574
  • 9. What SIEM Eats: Context Security Warrior Consulting Dr. Anton Chuvakin http://chuvakin.blogspot.com/2010/01/on-log-context.html
  • 10. How SIEM Got Here!? • 1996-2002 IDS and Firewall – Worms, alert overflow, etc – Sold as “SOC in the box” • 2003 – 2007 Above + Server + Context – PCI DSS, SOX, users – Sold as “SOC in the box”++ • 2008+ Above + Applications + … – Fraud, insiders, cybercrime – Sold as “SOC in the box”+++++ Security Warrior Consulting Dr. Anton Chuvakin
  • 11. Thinking Aloud Here… What do we know about SIEM? Ties to many technologies, analyzes data, requires process around it, overhyped What does it actually mean? Many people think “SIEM is complex” Security Warrior Consulting Dr. Anton Chuvakin
  • 12. I will tell you how to do SIEM RIGHT! Useless Consultant Advice Alert!! Security Warrior Consulting Dr. Anton Chuvakin
  • 13. The Right Way to SIEM 1. Figure out what problems you want to solve with SIEM 2. Confirm that SIEM is the best way to solve them 3. Define and analyze your use cases 4. Gather stakeholders and analyze their use cases 5. Research SIEM functionality 6. Create requirements for your tool, including process requirements 7. Choose scope for SIEM coverage (with phases) 8. Assess data volume over all Phase 1 log sources and plan ahead 9. Perform product research, vendor interviews, references, peer groups 10. Create a tool shortlist 11. Pilot top 2-3 products in your environment 12. Test the products for features, usability and scalability vs requirements 13. Select a product for deployment and #2 product for backup 14. Update or create procedures, IR plans, etc 15. Create SIEM operational procedures Security Warrior Consulting 16. Deploy the tool (phase 1) Dr. Anton Chuvakin
  • 14. The Popular Way to SIEM… 1. Buy a SIEM appliance Security Warrior Consulting Dr. Anton Chuvakin
  • 15. … Backed by Online “Research” 15 Security Warrior Consulting Dr. Anton Chuvakin
  • 16. Got Difference? What people What people NEED to know WANT to know and have before and have before they deploy a they deploy a SIEM? SIEM? Security Warrior Consulting Dr. Anton Chuvakin
  • 17. Got SIEM? Have you inherited it? Now what? Security Warrior Consulting Dr. Anton Chuvakin
  • 18. Popular #SIEM_FAIL … in descending order by frequency: 1. Misplaced expectations (“SOC-in-a-box”) 2. Missing requirements (“SIEM…huh?”) 3. Wrong project sizing 4. Political challenges with integration 5. Vendor deception 6. And only then: product not working  Security Warrior Consulting Dr. Anton Chuvakin
  • 19. What is a “Best Practice”? • A process or practice that –The leaders in the field are doing today –Generally leads to useful results with cost effectiveness P.S. If you still hate it – say “useful practices” Security Warrior Consulting Dr. Anton Chuvakin
  • 20. BP0 How to Plan Your Project? 1.Goals and requirements (WHY) 2.Functionality / features (HOW) 3.Scope of data collection (WHAT) 4.Sizing (HOW MUCH) 5.Architecting (WHERE) Security Warrior Consulting Dr. Anton Chuvakin
  • 21. BP1 LM before SIEM! If you remember one thing from this, let it be: Deploy Log Management BEFORE SIEM! Q: Why do you think MOST 1990s SIEM deployments FAILED? A: There was no log management! Security Warrior Consulting Dr. Anton Chuvakin
  • 22. SIEM/LM Maturity Curve Security Warrior Consulting Dr. Anton Chuvakin
  • 23. Graduating from LM to SIEM Are you ready? Well, do you have… 1. Response capability and process – Prepared to response to alerts 2. Monitoring capability – Has an operational process to monitor 3. Tuning and customization ability – Can customize the tools and content Security Warrior Consulting Dr. Anton Chuvakin
  • 24. BP2 Initial SIEM Use Steps of a journey … 1. Establish response process 2. Deploy a SIEM 3. Think “use cases” 4. Start filtering logs from LM to SIEM – Phases: features and information sources Prepare for the initial increase in workload Security Warrior Consulting Dr. Anton Chuvakin
  • 25. Example LM->SIEM Filtering 3D: Devices / Network topology / Events • Devices: NIDS/NIPS, WAF, servers • Network: DMZ, payment network, other “key domains” • Events: authentication, outbound firewall access, IPS Later: proxies, more firewall data, web servers Security Warrior Consulting Dr. Anton Chuvakin
  • 26. BP3 Expanding SIEM Use First step, next BABY steps! 1. Compliance monitoring often first 2. “Traditional” SIEM uses – Authentication tracking – IPS/IDS + firewall correlation – Web application hacking 3. Your simple use cases – What problems do YOU want solved? Security Warrior Consulting Dr. Anton Chuvakin
  • 27. Example: Use Case Example: cross-system authentication tracking • Scope: all systems with authentication • Purpose: detect unauthorized access to systems • Method: track login failures and successes • Rule details: multiple login failures followed by login success • Response plan: user account investigation, suspension, communication with suspect user Security Warrior Consulting Dr. Anton Chuvakin
  • 28. “Quick Wins” for Phased Approach Phased Phased approach #1 approach #2 • Collect problems • Focus on 1 problem • Plan architecture • Plan architecture • Start collecting • Start collecting • Start reviewing • Start reviewing • Solve problem 1 • Solve problem 1 • Solve problem n • Plan again Security Warrior Consulting Dr. Anton Chuvakin
  • 29. 10 minutes or 10 months? A typical large Our log customer takes management ? 10 months to appliance can deploy a log be racked, management configured and architecture collecting logs in based on our 10 minutes technology Security Warrior Consulting Dr. Anton Chuvakin
  • 30. What is a “Worst Practice”? • As opposed to the “best practice” it is … –What the losers in the field are doing today –A practice that generally leads to disastrous results, despite its popularity Security Warrior Consulting Dr. Anton Chuvakin
  • 31. WP for SIEM Planning • WP1: Skip this step altogether – just buy something – “John said that we need a correlation engine” – “I know this guy who sells log management tools” • WP2: Postpone scope until after the purchase – “The vendor says „it scales‟ so we will just feed ALL our logs” – Windows, Linux, i5/OS, OS/390, Cisco – send‟em in! Security Warrior Consulting Dr. Anton Chuvakin
  • 32. Case Study: “We Use‟em All” At SANS Log Management Summit … • Vendors X, Y and Z claim “Big Finance” as a customer • How can that be? • Well, different teams purchased different products … • About $2.3m wasted on tools that do the same! Security Warrior Consulting Dr. Anton Chuvakin
  • 33. WPs for Deployment • WP3: Expect The Vendor To Write Your Logging Policy OR Ignore Vendor Recommendations – “Tell us what we need – tell us what you have” forever… • WP4: Don’t prepare the infrastructure – “Time synchronization? Pah, who needs it” Security Warrior Consulting Dr. Anton Chuvakin
  • 34. Misc Useful SIEM Tips 34 Security Warrior Consulting Dr. Anton Chuvakin
  • 35. On SIEM Resourcing NEWSFLASH! SIEM costs money. But … Or… Security Warrior Consulting Dr. Anton Chuvakin
  • 36. “Hard” Costs - Money • Initial – SIEM license, hardware, 3rd party software – Deployment and integration services • Ongoing – Support and ongoing services – Operations personnel (0.5 - any FTEs) • Periodic – Vendor services – Specialty personnel (DBA, sysadmin) – Deployment expansion costs Security Warrior Consulting Dr. Anton Chuvakin
  • 37. “Soft” Costs - Time • Initial – Deployment time – Log source configuration and integration (BIG!) – Initial tuning, content creation • Ongoing – Report and log review – Alert response and escalation • Periodic – Tuning and content creation – Expansion: same as initial Security Warrior Consulting Dr. Anton Chuvakin
  • 38. Secret to SIEM Magic! “Operationalizing” SIEM (e.g. SOC building) Deployment Service SIEM Software/Appliance Security Warrior Consulting Dr. Anton Chuvakin
  • 39. On Replacing a SIEM 39 Security Warrior Consulting Dr. Anton Chuvakin
  • 40. How to Do It? 1. Prepare to run both products for some time 2. Draft the new vendor to help you migrate the data 3. Be prepared to keep the old SIEM or keep the data backups 4. BIG! Migrate SIEM content: reports, rules, views, alerts, etc 40 Security Warrior Consulting Dr. Anton Chuvakin
  • 41. Tip: When To AVOID A SIEM In some cases, the best “SIEM strategy” is NOT to buy one: 1. Log retention focus 2. Investigation focus (log search) If you only plan to look BACKWARDS – no need for a SIEM! Security Warrior Consulting Dr. Anton Chuvakin
  • 42. Conclusions • SIEM will work and has value … but BOTH initial and ongoing time/focus commitment is required • FOCUS on what problems you are trying to solve with SIEM: requirements! • Phased approach WITH “quick wins” is the easiest way to go • Operationalize!!! Security Warrior Consulting Dr. Anton Chuvakin
  • 43. SIEM Reminders Cost countless sleepless night and boatloads of pain…. • No SIEM before IR plans/procedures • No SIEM before basic log management • Think "quick wins", not "OMG ...that SIEM boondoggle" • Tech matters! But practices matter more • Things will get worse before better. Invest time before collecting value! Security Warrior Consulting Dr. Anton Chuvakin
  • 44. And If You Only … … learn one thing from this…. … then let it be…. Security Warrior Consulting Dr. Anton Chuvakin
  • 45. Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirvements Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Consulting Security Warrior Requirements! Requirements! Requirements! Requirements! Requirements! Dr. Anton Chuvakin
  • 46. Questions? Dr. Anton Chuvakin Email: anton@chuvakin.org Site: http://www.chuvakin.org Blog: http://www.securitywarrior.org Twitter: @anton_chuvakin Consulting: http://www.securitywarriorconsulting.com Security Warrior Consulting Dr. Anton Chuvakin
  • 47. More Resources • Blog: www.securitywarrior.org • Podcast: look for “LogChat” on iTunes • Slides: http://www.slideshare.net/anton_chuvakin • Papers: www.info-secure.org and http://www.docstoc.com/profile/anton1chuvakin • Consulting: http://www.securitywarriorconsulting.com/ Security Warrior Consulting Dr. Anton Chuvakin
  • 48. More on Anton • Consultant: http://www.securitywarriorconsulting.com • Book author: “Security Warrior”, “PCI Compliance”, “Information Security Management Handbook”, “Know Your Enemy II”, “Hacker‟s Challenge 3”, etc • Conference speaker: SANS, FIRST, GFIRST, ISSA, CSI, RSA, Interop, many, many others worldwide • Standard developer: CEE, CVSS, OVAL, etc • Community role: SANS, Honeynet Project, WASC, CSI, ISSA, OSSTMM, InfraGard, ISSA, others • Past roles: Researcher, Security Analyst, Strategist, Evangelist, Product Manager Security Warrior Consulting Dr. Anton Chuvakin
  • 49. Security Warrior Consulting • Services Logging and log management / SIEM strategy, procedures and practices – Develop logging policies and processes, log review procedures, workflows and periodic tasks as well as help architect those to solve organization problems – Plan and implement log management architecture to support your business cases; develop specific components such as log data collection, filtering, aggregation, retention, log source configuration as well as reporting, review and validation – Customize industry “best practices” related to logging and log review to fit your environment, help link these practices to business services and regulations – Help integrate logging tools and processes into IT and business operations • SIEM and log management content development – Develop correlation rules, reports and other content to make your SIEM and log management product more useful to you and more applicable to your risk profile and compliance needs – Create and refine policies, procedures and operational practices for logging and log management to satisfy requirements of PCI DSS, HIPAA, NERC, FISMA and other regulations Others at www.SecurityWarriorConsulting.com Security Warrior Consulting Dr. Anton Chuvakin
  • 50. Misc Resource Slides 50 Security Warrior Consulting Dr. Anton Chuvakin
  • 51. Best Reports? SANS Top 7 DRAFT “SANS Top 7 Log Reports” 1. Authentication 2. Changes 3. Network activity 4. Resource access 5. Malware activity 6. Failures 7. Analytic reports Security Warrior Consulting Dr. Anton Chuvakin
  • 52. Best Correlation Rules? Nada • Vendor default rules? • IDS/IPS + vulnerability scan? Anton fave rules: 1. Authentication 2. Outbound access 3. Safeguard failure Security Warrior Consulting Dr. Anton Chuvakin