Cybersecurity Automation For Dummies
Cybersecurity Automation For Dummies
Cybersecurity Automation For Dummies
by Robert Nagy,
Todd Christensen, and
Geoff Horne
foreword by Cricket Liu
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Cybersecurity Automation For Dummies®, Infoblox Special Edition
Published by
John Wiley & Sons, Inc.
111 River St.
Hoboken, NJ 07030-5774
www.wiley.com
Copyright © 2019 by John Wiley & Sons, Inc., Hoboken, New Jersey
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any
means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections
107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the Publisher. Requests to
the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River
Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.
Trademarks: Wiley, For Dummies, the Dummies Man logo, The Dummies Way, Dummies.com, Making Everything
Easier, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its
affiliates in the United States and other countries, and may not be used without written permission. Infoblox and the
Infoblox logo are trademarks or registered trademarks of Infoblox, Inc. All other trademarks are the property of their
respective owners. John Wiley & Sons, Inc., is not associated with any product or vendor mentioned in this book.
In Chapter 1, the Gartner quote attribution is Gartner, Use a Capability Matrix for a More Effective Threat
Intelligence Program, Ruggero Contu, et al, 14 February 2019
In Chapter 5, the Gartner graphic attribution is Gartner, Make Sure Your Organization is Mature Enough for SOAR, Pete
Shoard and Ryan Benson, 27 March 2019
LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER AND THE AUTHOR MAKE NO REPRESENTATIONS
OR WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF THE CONTENTS OF THIS WORK AND
SPECIFICALLY DISCLAIM ALL WARRANTIES, INCLUDING WITHOUT LIMITATION WARRANTIES OF FITNESS FOR A
PARTICULAR PURPOSE. NO WARRANTY MAY BE CREATED OR EXTENDED BY SALES OR PROMOTIONAL MATERIALS. THE
ADVICE AND STRATEGIES CONTAINED HEREIN MAY NOT BE SUITABLE FOR EVERY SITUATION. THIS WORK IS SOLD
WITH THE UNDERSTANDING THAT THE PUBLISHER IS NOT ENGAGED IN RENDERING LEGAL, ACCOUNTING, OR
OTHER PROFESSIONAL SERVICES. IF PROFESSIONAL ASSISTANCE IS REQUIRED, THE SERVICES OF A COMPETENT
PROFESSIONAL PERSON SHOULD BE SOUGHT. NEITHER THE PUBLISHER NOR THE AUTHOR SHALL BE LIABLE FOR
DAMAGES ARISING HEREFROM. THE FACT THAT AN ORGANIZATION OR WEBSITE IS REFERRED TO IN THIS WORK AS
A CITATION AND/OR A POTENTIAL SOURCE OF FURTHER INFORMATION DOES NOT MEAN THAT THE AUTHOR OR THE
PUBLISHER ENDORSES THE INFORMATION THE ORGANIZATION OR WEBSITE MAY PROVIDE OR RECOMMENDATIONS
IT MAY MAKE. FURTHER, READERS SHOULD BE AWARE THAT INTERNET WEBSITES LISTED IN THIS WORK MAY HAVE
CHANGED OR DISAPPEARED BETWEEN WHEN THIS WORK WAS WRITTEN AND WHEN IT IS READ.
For general information on our other products and services, or how to create a custom For Dummies book for your
business or organization, please contact our Business Development Department in the U.S. at 877-409-4177,
contact [email protected], or visit www.wiley.com/go/custompub. For information about licensing the For
Dummies brand for products or services, contact BrandedRights&[email protected].
10 9 8 7 6 5 4 3 2 1
Publisher’s Acknowledgments
Some of the people who helped bring this book to market include the following:
Development Editor: Amanda Cross Editorial Manager: Rev Mengle
Project Editor: Jennifer Bingham Business Development Representative:
Ashley Coffey
Acquisitions Editor:
Karen Hattan Production Editor: Tamilmani Varadharaj
Proofreader: Debbye Butler
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Foreword
N
“ o man is an island,” wrote John Donne. Yes, I thought it
might have been Shakespeare, but I looked it up and
apparently it was John Donne. Whoever he was.
That lesson, now over 400 years old, applies equally to IT solu-
tions as well as people — which was remarkably prescient of
Donne, when you think about it. However critical those of us in
the DNS, DHCP, and IPAM (DDI) business think our technologies
are, they’re of limited use all by themselves. To wring the most
benefit from your DDI infrastructure, it needs to be integrated
with other components of your IT infrastructure: Security com-
ponents, such as your firewall and your SIEM solution. Your secu-
rity orchestration, automation, and response (SOAR) system. Your
authentication service.
This book will provide you with tips on how to integrate your DDI
solution with the rest of your security ecosystem, including fire-
walls, SIEMs, and SOARs — using standard protocols such as STIX
and TAXII, as well as Infoblox’s own RESTful API. The end result
should be a more responsive, more robust security infrastructure
and better use of your DDI solution, and who wouldn’t want that?
Foreword iii
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Introduction
C
ompanies today know that Internet security is a top prior-
ity. Protecting your customers’ data, corporate knowledge,
and intellectual property are absolute prerequisites to doing
any kind of online business.
That’s why we wrote this book: We want you to know about the
cybersecurity automation tools that make it possible for just a
small team of security experts to successfully deflect the hordes
of attackers trying to break through your defenses.
Like all titles in the For Dummies series, this book features easy-
access organization. At the beginning of each chapter, you can
find a summary of the topics covered, which makes it easy to flip
through and find just the information you’re looking for.
Foolish Assumptions
Cybersecurity isn’t exactly a general-interest kind of topic; you
probably don’t chat about it with just any person who happens
to be sharing the elevator. Therefore, we assume that readers of
Introduction 1
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
this book have a vested interest in keeping the online aspects of a
company functioning and secure. However, we tried to write this
book so that all people who pick up a copy can learn something
new and interesting that deepens their understanding of Internet
security automation.
You can’t write a book like this without making a few assump-
tions, though. For this book, we assume that you’re an experi-
enced user of the Internet. We define most of our terms, but we
do assume you understand the basics of networking like server,
client, and API.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» The history of network or cybersecurity
automation
Chapter 1
Cybersecurity
Automation: What’s
the Hype?
B
efore diving into the tools and methodologies of network
security automation, it’s probably a good idea to explain
what is meant by network or cybersecurity automation and
tell you how the technology got to where it is today. The chal-
lenges and the tools to meet those challenges keep changing
faster and faster, so making sure you understand that is a great
way to start.
Cybersecurity Automation
The term cybersecurity automation here means the process of auto-
mating configuration, alerting, and other tasks performed by
security administrators and the products they manage. This auto-
mation is frequently also called orchestration. This term offers a
good metaphor of what the core advantage is: If you think of the
products in your security architecture as instruments, then the
security administrator is the conductor of the orchestra. Or should
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
be at least. Security administrators can easily get too caught up in
tuning instruments and flipping pages for the players instead of
standing at the front, conducting.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
As these multiple teams developed, specialized products took
over as king. The number of products, plus the network ven-
dors’ incentive to get companies to do things in proprietary ways,
meant that silos of information were created. These silos were not
just in the products themselves, but also often in the knowledge
of the team members responsible for the network and its security.
As the complexity of networks grew and security became a bigger
part of running a network, the silos increased.
Orchestrators
The growth of specialist teams continued with the creation of
devops models and the demand for more automation, which was
invisible to the end developer, continued. Orchestration tools such
as Ansible, Chef, and Puppet began to appear. Ansible, in particular,
gained a lot of traction after being purchased by Red Hat in 2015.
These tools automated tasks mainly related to end hosts and serv-
ers, but with a bit of work also could make changes to network
and security devices on your networks. Ironically, this required
some basic Unix understanding from the good old days; in many
ways, things had come full circle.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Implementing automation tools could reap great long-term ben-
efits, but many organizations remain reluctant to move back to
this type of scripting style solution.
Pace of change
Today, multiple security specialists have their own teams and the
trend is to add differentiated cloud and cloud security teams. It
can seem to be a never-ending expansion and specialization cycle.
It just isn’t realistic to think any one person, or one team, can
possibly keep up with this growth and be an expert on all of it.
It is also unrealistic to rely on human communication and pro-
cessing to identify and mitigate security issues as they arise in
enterprise networks. In particular, the amount of effort required
to constantly monitor centralized logs exceeds human capacity
and is not the most valuable use of your engineering resources. As
such, automation can play an integral role in identifying impor-
tant events proactively.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
typically have built-in mechanisms to alert other protocols or
products that might leverage that data. The vendors whose prod-
ucts power the protocol servers haven’t historically taken the ini-
tiative to add this level of functionality and instead, just deliver
the protocol as defined.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
BYOD
Allowing users to BYOD (bring your own device) means that
network administrators now have more devices to worry about.
Whether mobile phones, IP phones, watches, tablets, laptops,
or servers, an ever-growing list of client devices need access to
network resources. This creates the need for more network and
security products because these unique device types must func-
tion with the network and must function securely.
IoT
While not a huge factor in enterprise networks (yet), IoT (Inter-
net of Things) is becoming more and more of an issue as things
administrators never thought of as network devices join the party.
Cameras, refrigerators, automobiles, light bulbs, clocks, and
everything you can imagine are demanding network connectiv-
ity. These devices usually don’t have a human behind them in the
traditional sense and, as such, create a new paradigm. How these
independent devices function on a secured network is an evolving
challenge. To make matters worse, many IoT devices are created
by companies who are new to the information technology arena,
and many early versions are full of bugs and vulnerabilities, and
are short on security features but long on bandwidth connectiv-
ity demands. Some jokingly say the Internet of Things should be
renamed to the insecure distributed internet of things (IDIoT).
Cloud services
All this talk about clients ignores maybe the single-largest
change of the last few years: the movement of network services
to cloud environments. Cloud networks add a new silo. Because of
this, network administrators have had to add people specializing
in cloud technology and cloud security, which often resulted in
creating whole new teams. Most companies settled on a hybrid
solution with a mix of cloud, on-premises, and third-party
solutions. To the network and security administrators, this means
even more tools, products, and people to manage these varying
environments. It also creates security and logging challenges as
each environment can behave very differently.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
The Current State of Cybersecurity
Automation
It’s safe to say that today’s enterprise networks are as complex
as ever. The job of a modern-day security administrator involves
ensuring smooth access for mission-critical servers, laptops,
smartphones, and BYOD devices in the most secure way possible.
However, complexity means you must have eyes, ears, and fingers
everywhere, all at the same time. Looking for a threat, a breach,
or anomalous activity amidst all the other network chatter is
worse than finding a needle in a haystack: It’s finding a needle in
an ever-growing number of haystacks that are constantly grow-
ing themselves.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
The study also showed that 63 percent of respondents report
that their organizations have a shortage of IT staff dedicated to
cybersecurity. More than half, 59 percent, say their companies
are at moderate or extreme risk of cybersecurity attacks due to
this shortage.
Threat intelligence
According to Gartner, “Threat intelligence is defined as evidence-
based knowledge — including context, mechanisms, indicators,
implications and action-oriented advice — about an existing or
emerging hazard to IT or information assets. It can be used to
inform decisions regarding the subject’s response to that menace
or hazard.”
Gartner’s definition gets to the idea that the gathering and curat-
ing of threats must be at the core of network administration and
security. It’s not enough to just act on an attack after the fact;
security professionals must be in a constant state of data gather-
ing and learning about the threats as they evolve in the wild. This
is a far cry from just blocking ports and looking for hits. Network
administrators now must be actively engaged in what is going on
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
in the world of the bad actors. More and more, the industry can
gather this data from various sources and leverage in the corpo-
rate policies. For this to happen in real time and with data sets
far larger than humans can process, network administrators must
engage computing power to help sort through the noise.
The following example shows how creating a single task that exe-
cutes three commonly grouped configuration tasks against mul-
tiple systems reduces workload and allows time to focus on more
important security tasks like gathering and processing threat
intelligence.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
When a new host joins, you would execute a script that:
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Discussing the different approaches to
setting up your security automation
Chapter 2
Automation
Technologies: Tools
and Languages
T
he approaches to and technologies for cybersecurity automa-
tion are as varied as the companies that implement them.
The skills and capacity of your team, the sophistication of
your business systems, the sensitivity of your data, and other fac-
tors all contribute to your decision about how to set up your secu-
rity automation. In this chapter, we talk about the most common
approaches people take and the pros and cons of each one.
Automation Modalities
As the administrator, you can easily leverage API access to con-
trol a wide variety of network and security devices (see Chapter 1
for more information). You can use common scripting languages
such as Perl, Python, Bash, JavaScript, and others to automate
web calls to configure or read from your network security prod-
ucts. Since you control the implementation, you can make this as
simple or as complex as you want.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Client-device
With this model, you use an external client to configure a security
product that runs at certain times. You might set up the external
client to run the security product when a product alerts you that
a trigger event has occurred, or you might set it up to run based
on time of day.
The following example shows a Bash script that, every two hours,
grabs the current “bad actors” list from product A and feeds it to
product B (the security product) for scanning.
#!/bin/bash
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
The previous script is just a very simplified example to demon-
strate the steps you might use as it would be dependent on the
REST API implementations of the products.
Device-device
If you rank the approaches by their sophistication, the next level
of automation is the model where one product can update another
product directly. In this model, each vendor decides what events
trigger API calls to other vendors or products.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Also, when the authentication server sees the user logging in
to the office network, activate enforcement to encrypt
USB-connected drives on the user’s laptop
Source: Infoblox
FIGURE 2-1: The automation you can accomplish with the device-device
approach depends on the capabilities of the tools that you choose.
»» The only events that can trigger updates are the events the
device sees.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» You become dependent on the vendor for new features and
product support.
»» You probably can’t customize the notifications that come out
of the system.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Figure 2-2 shows automating the same event described in
Figure 2-1, this time using an automation system (Ansible)
housed on a dedicated automation server. The automation server
communicates with the webcam and the authentication server to
make desired configuration changes to the light bulb, firewall,
and USB encryption policy. The added advantage to this approach
is that the automation system can have additional logical checks
built in, such as requiring both conditions (webcam detects user
AND successful authentication) to be met before making any con-
figuration changes. This level of sophistication wasn’t possible
with the previous automation approaches.
Source: Infoblox
The benefits of using automation tools come from how much you
can customize them:
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Maintenance of the Control System can be time-consuming.
»» If you want any changes made to the managed systems you
have to make them yourself.
»» Complex solutions can take a lot of up-front effort.
There are several vendors in this space, and each tool has its own
strengths and features. They can leverage various types of AI and
machine learning and range from incredibly robust to very sim-
ple. The overall intent is that these orchestration tools can collate,
organize, and summarize events based on higher level rules (such
as business operations) and combine them into a single event or
action item.
»» Ease of use
»» Security vendor support
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Interoperability support, and resources
»» Available product education
While there are many possible formats (and vendors can even
create their own), the following three formats are the most com-
monly used today:
»» JSON
»» YAML
»» XML
It is important to note that there are converters between these
three languages available both online and as modules for most
scripting and programming languages. Therefore, if you like one
language more than another, translating between them is easy.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
In the following example, you can see information on a host rep-
resented in JSON Format.
[
{
"ip_address": "10.45.45.45",
"is_conflict": false,
"lease_state": "ACTIVE",
"mac_address": "00:09:de:ad:be:ef",
"names": "noyb",
"network": "10.45.45.0/24",
"usage": [
"DHCP",
"DNS"
]
}
]
---
root:
element:
ip_address: 10.45.45.45
is_conflict: false
lease_state: ACTIVE
mac_address: 00:09:de:ad:be:ef
names: noyb
network: 10.45.45.0/24
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
usage:
element:
- DHCP
- DNS
Here you see the final example with the same structure conveyed
in XML.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Unpacking the components of DDI
Chapter 3
The Role of DDI in
Security Automation
D
DI is shorthand for the integration of DNS, DHCP, and
IPAM (IP Address Management) into a unified solution.
These technologies comprise the foundation of core
network services that enable all communications over an IP-based
network.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
INTRUSION DETECTION SYSTEM
(IDS) AND INTRUSION
PREVENTION SYSTEM (IPS)
An IDS is typically a perimeter defense that monitors the network for
signs of bad behavior. This can be based on characteristics of either
the traffic itself or of the contents of the traffic. With an IDS when
issues are detected that information is shared with other tools such
as SIEM to take action.
An IPS, on the other hand, will take action such as restricting or block-
ing access of the bad actor to prevent the detected behavior.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
A client-centric approach lets you leverage core services such as
DNS and DHCP as early warning signs of issues. If you can exam-
ine what is happening on the control plane of these devices, you
can get indicators of behavior before a flow is created. Often the
simplest core protocols provide the first indications that there is
something you need to look at, but these sadly often go unnoticed
by security teams, who have only so many resources and are stuck
guarding the outer gates. Often the team identifies these patterns
only after a breach has played out.
Core services can give the first signs of trouble and help stop
issues before they start. Protocols like DHCP and DNS capture
critical events and trigger tasks that you probably batch and run
in groups during off-peak hours. If you instead use automation,
you could trigger those tasks when they’re most needed, at the
first contact by a new client or the first sign that a client isn’t
behaving normally.
For these reasons, DDI is your best front line to security, identify-
ing clients as they connect and taking multiple security actions
through automation. By using these tools, you can proactively
inform the other security tools and trigger multiple security
actions to scan or quarantine the host and open a ticket for fur-
ther investigation.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Before a host can really do damage to others, it must first obtain
an IP address, and it usually gets that address from a DHCP server.
DHCP is automation in and of itself that simplifies the previously
laborious process of having to manually assign and configure IP
addresses for every client that joined your network. However,
DHCP doesn’t have good mechanisms to authenticate or author-
ize the client. It just gives an address to any device on the network
that asks for one. DHCP can make decisions on who gets an IP
address, but imagine if DHCP could alert other security tools to
the presence of a new client on the network.
What could your other tools do to protect the security of your net-
work and resources from this new client? The answer is “a lot!”
Just a few possibilities include:
Using DHCP this way is a chance to tell your other security prod-
ucts, “Hey, we have a newcomer, check them out or maybe keep
a special eye on them.” DHCP makes such a good starting place
for cybersecurity automation and is an ideal first line of defense.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
of additional traffic, legitimate or otherwise, that is also now on
the network that most configurations aren’t really applying any
security layers to. Operating systems do all kinds stuff in the
background that we aren’t aware of, and lots of them send traffic
into the Internet. All of this is done quietly, before even lighting
up the display for human users to know the device is ready for
interaction. Whatever the configuration, it is safe to assume that
the client made some DNS queries.
Security layers are now also able to examine traffic that may move
inside your internal network without transiting any firewalls. The
DNS query may show a device trying to access a payroll server or
other sensitive equipment inside the enterprise. The key here is
to identify the intent of the traffic before any data is sent to the
wrong locations.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IPAM Ties It All Together
IP address management (IPAM) doesn’t sound exciting, or even
relevant to security, at least until you get to know it. Both DHCP
and DNS servers can notify other tools and products of the pres-
ence of a new client and the client’s behavior, respectively.
They’re capable of sending a message like: “Hey, here is a new
MAC address that came online, 00:00:C0:FF:EE” or “IP address
10.1.2.3 tried to look up the known malicious domain name get.
malware.example.net.” With IPAM, they can send additional
information like: “MAC address 00:00:C0:FF:EE has connected to
the network; it is seen on edge switch X port Eth0/12; department
is HR; asset tag #ABC0001; it is leased to user JKUO; assigned to
building POST; campus UHM; device category is Field-Laptop.”
What’s important here is not really the address, but the metadata
attached to it.
IPAM empowers other protocols and tools, like DNS and DHCP,
by bringing metadata into the mix. Metadata is any additional
information you want to track, and it can be specific to your orga-
nization. Metadata, like model number, owner’s name, building,
city, or department, can all be tracked. Other tools can make use
of this information, either directly by matching rules on the met-
adata fields, or indirectly by displaying the metadata as part of an
investigation process. When the client receives its DHCP address,
it can inform the firewall that this MAC address belongs to some-
one in the HR department, thus custom firewall rules can be
implemented.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Firewall returns that client has been added to the
list for new phones and this is added to the
"Firewall Category" attribute in IPAM
B: Alert the Host Scanner device that a new client
has joined the network and that it should be
scanned immediately.
Scanner returns values to be added to IPAM;
timestamp for when it initiated the
scan
timestamp for when it completed the
latest scan
results of the latest scan
Source: Infoblox
FIGURE 3-1: Sharing information among IPAM, firewalls, and other tools
enhances the data set that all the systems use.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» How your cybersecurity automation
systems create their own ecosystem
Chapter 4
Example Automation
with Ecosystem
I
n the context of biology, an ecosystem is a community of inter-
acting organisms and their physical environment. In the con-
text of cybersecurity automation, ecosystem also refers to
interconnection, but in this case, it’s the interconnection of
systems.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
shortens the response time for common repetitive tasks by reduc-
ing or even eliminating the need for human involvement.
Source: Infoblox
FIGURE 4-1: Multiple systems, tightly integrated, truly automate your network
security.
Scenario
In order to take a proactive approach to security, ACME has imple-
mented a new policy: Going forward, the vulnerability manage-
ment system must assess all new clients on its network.
»» DHCP
»» Remote VPN
»» Public and private cloud
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Clients can enter onto and be removed from the network before
a scheduled vulnerability scan of the entire network can be com-
pleted. The addition of new subnets into a network can require
manual entry into the vulnerability management system. Such
manual steps leave room for error.
Solution
A more efficient approach than trying to scan the entire network
on a recurring schedule is to use the IPAM data and events to trig-
ger a system of automated actions.
»» The capability to see when host devices enter and leave the
network
»» DHCP visibility, including operating system fingerprinting data
»» Network discovery, including direct interaction with switches,
access points, and firewalls
»» Interaction with cloud orchestration, including public, private,
and hybrid
»» Knowledge of newly configured DNS records and DHCP
reservations
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
How it works
Adding the DNS record for a new host in Infoblox automates the
addition of the new host into the vulnerability management sys-
tem and triggers a vulnerability scan on the new host. Once the
scan is complete, Infoblox receives the confirmation of the scan
and adds to the IPAM data for the host record.
• DHCP lease
• Network discovery
• Cloud discovery
• Cloud orchestration
• API
2. The addition of the new host event triggers a notification. A
notification sends information to an endpoint (in this case, the
vulnerability management system) in the format of a
template, which contains code to interact with the vulnerabil-
ity management administrative interface.
3. These components being utilized result in the outbound API
call to the vulnerability management system.
4. The outbound API call provides instructions to add the new
host into the vulnerability management system and to run a
scan of the new host.
5. The vulnerability management system scans the new host.
6. Once the scan is complete, the vulnerability management
system shares this information back to Infoblox. As you can
see in Figure 4-2, Infoblox tracks the last scanned date as an
extensible attribute, which you can view, report on, and use
to trigger future scans.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Source: Infoblox
FIGURE 4-2: You can see the entry for the new host directly in the Infoblox
interface.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» The evolution of the SOAR approach
Chapter 5
Infoblox and SOAR
I
n this chapter, we go with another acronym: SOAR! Not sore like
my back, not soar like an eagle, but rather, SOAR the acronym
meaning security orchestration, automation, and response.
While there is work required to set it up, as with other systems,
the idea behind SOAR is to save work by automating aspects of
security operations.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
corresponding security platforms for research, prioritization, and
remediation of the issues gives us security orchestration, auto-
mation, and response (SOAR). See Figure 5-1 for a depiction of
SOAR from Gartner.
Source: Gartner
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Network device the host is connected to
»» Switch-port details
»» VLAN
»» Connection speeds
»» Operating system information
From a forensic standpoint, this data can help you reconstruct
who had what address and when. This IPAM data provides con-
textual enrichment for SOAR research and operations.
Infoblox has visibility into when hosts come onto the network,
as well as when a host was last seen on a network. As the DNS
service provider, it can observe the critical DNS traffic patterns
of clients on the network, including potential misconfiguration
or DNS security-related events. This allows Infoblox to be a great
trigger for alerting and resulting remediation as well as an in-
depth source of history data for forensics.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Example of SOAR in Action
Figure 5-2 shows an example of how SOAR can power your
cybersecurity automation. It’s broken in to nine steps to draw
your attention to the most important aspects.
Source: Infoblox
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
5. SOAR utilizes a “playbook” for malicious emails, which is
outlined in Figure 5-3. The playbook contains the steps that
SOAR follows to respond to malicious emails.
Source: Infoblox
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
9. The security team contacts John Smith to bring his laptop in
for analysis. John Smith says that he received the link to the
game on his personal email account over the weekend and
had enjoyed the game, but didn’t intentionally send any
emails to other employees in the company about the game.
Without a SOAR approach, this story could have taken a lot lon-
ger to play out and might have had a much less happy ending.
Many environments today might just have sent an alert to a large
distribution list stating, “User John Smith sent an email with a
malicious link.” There might be confusion on who owns respon-
sibility for this.
For example, the email team may investigate and find that email
had been automatically deleted, so that was the end of concern
for them. However, simply deleting the email contents doesn’t
remove the malicious malware from Smith’s laptop.
Would the endpoint team have paid attention to this alert at all?
How long would it take to even be looked at; how much employee
time would the investigation take; and how much sensitive data
could the malware/spyware extract in that amount of time?
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 6
Ten Best Practices
for Cybersecurity
Automation
N
ow that we’ve talked through the basics and you’re ready
to put your ideas in to action, we want to introduce some
best practices. Keep these ten things in mind as you pre-
pare to implement your security automation.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Unify policy enforcement: Improve your overall security
posture by making aggregated, accurate threat intelligence
data available in real time to devices across your entire
security stack.
»» Automate threat investigation: Look for state-of-the-art
threat-investigation technologies that can automatically
search threat data from dozens of sources, empowering
you to investigate faster and increase analyst effectiveness.
»» Improve ROI: Get more value from your existing invest-
ments and make your security stack more effective and
efficient by leveraging integrated DNS security.
»» Start with what you have: Secure your existing network
and your digital transformations, such as the cloud, IoT,
and SD-WAN, by leveraging the foundational security
infrastructure you already have — DNS.
»» Combine intelligence analysis: Detect and block known
threats as well as zero-day attacks by combining highly
accurate threat intelligence with analytics based on machine
learning.
»» Deploy hybrid security: Use a hybrid architecture that
extends protection wherever you’re deployed, provides
resiliency, and tightly integrates with your on-premises
ecosystem.
»» Lighten the load: Reduce the burden on your stretched
perimeter defenses and give them back processing power
by using the DNS control point as your first line for defense
to block a wide range of known threats.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
WILEY END USER LICENSE AGREEMENT
Go to www.wiley.com/go/eula to access Wiley’s ebook EULA.