Winning Logging, Learning,: Moving From To To
Winning Logging, Learning,: Moving From To To
INSIDE
SSS
Surviving Without a
Security Incident and Event
Management Product
Page 2
Page 9
SPONSORED BY
Surviving Without a
Security Incident
April 2016
SSS UBM
to provide security when perimeter and apWithout a security incident and event manageto an organization to be found and prioritized
plication defenses fail. This requires using more ment (SIEM) product capable of collecting, agwith greater accuracy.
than just a basic log management system.
gregating, correlating, analyzing and prioritizing
Unfortunately, when the technique of big
large amounts of data at scale, theres no chance data security analytics was introduced, it arrived
Alert Overload
of discovering whether an organization is being
amidst a lot of hype about its ability to stop atTodays threat actors are agile and will quickly
attacked or has been compromised until its
tacks before they even started. This led some to
adapt their tactics to avoid detection by simple
too late. A SIEM can pull security telemetry tobelieve that it was a simple process of funneling
threshold limits and poorly tuned rules. These
gether in one place so that a much broader set of as much log data as possible into a data reposisimple rules may catch the inept intruder but
data can be correlated and analyzed, bringing sit- tory and waiting for the game-changing insights
can actually hamper security teams by overloaduational awareness to security events. This makes to materialize. But a SIEM is not a plug-and-play
ing them with alarms for indicators that are more anomaly-detection techniques more effective,
technology, and using security analytics requires
nuisance than directed threat. A Ponemon Instienabling the events that pose the greatest harm more than just the power to crunch numbers
tute report, The Cost of Malware Containment,
sponsored by Damballa, January 2015, estimated
Your hardworking, junior database administrator usually gets to work
that the average enterprise could get 17,000
about 8:30 a.m., swiping his ID card to pass through the turnstiles in the
malware alerts a week, creating a situation where
main foyer. By lunchtime, hes normally generated about four reports
covering the previous days sales activities. Today, hes logged onto
many alerts are overlooked or ignored. The Target
the network and has run queries against the database for six reports.
breach is a good example of this problem. Its ArcA threshold alert is triggered and put on the to-do list; surely, hes just
working hard.
Sight SIEM solution actually did find the threat and
produced an alert, but the security team didnt act
Without automatic, real-time correlation of events collected from across
the IT environment, it will be too late by the time anyone realizes that
on it because it was just one of too many.
What About Security Analytics?
Analysis turns log data into threat intelligence.
4
SSS UBM
your administrator hasnt passed through the main foyer today and
therefore the queries against the database are suspicious and potentially
harmful. For a real-life example, we need look no further than Anthems
failure to analyze and cross-reference its database traffic. This allowed the
attackers to remain unnoticed for many months, even though they were
submitting database queries remotely to obtain the personally identifiable
information (PII) records.
Four Reasons
Why Security Analytics
Products Fail
A SIEM and a SOC arent enough.
SSS UBM
April 2016
Reason 1:
Thinking big data solves the problem
Big data is no longer just hype. Industries,
particularly financial services, have greatly
benefited from it, but one shouldnt make
the mistake of assuming more data and more
technology will defeat todays cybercriminals.
Without proper planning, big data analytics
can create a false sense of security and possibly even hinder security operations. Its fine
Reason 2:
May 2016
The longer your enemy stays hidden, the more damage it does.
YEARS
M-Trends 2016, Mandiant, a FireEye Company; 2 Carbanak APT, The Great Bank Robbery report, Kaspersky Lab, February 2015; 3ModPOS Malware Disclosure Report, iSIGHT Partners, November 2015; 4Kaspersky Lab, November 2014; 5Kaspersky Lab, November 2014;
Frequently Asked Questions: OPM Data Breach report, Department of the Navy, December 2015
Reason 3:
Looking the wrong way
Security analytics is about searching through
gigabytes of noise to find the critical 1% of
activities that threaten your organization. An
essential exercise to figure out where to concentrate efforts is threat modeling based on
business drivers. With the ever-changing nature of both cyberwarfare and network infra7
SSS UBM
Reason 4:
Your maturity model doesnt match the threats
Traditional security controls such as firewalls,
AV, secure Web gateways, and IDS/IPS are no
longer sufficient to protect against advanced
May 2016
SSS UBM
If youre not sure of or happy with the answers, your security analytics project is nowhere near close to delivering improved
threat-detection capabilities. Remember, you
have to work harder than your enemies if you
want to beat them.p
SSS UBM
May 2016
10
SSS UBM
A Solid Foundation
For security analytics to truly turn the tables on
your attackers, its important to establish the
right environment for your SOC. There needs to
be a clear mandate and defined scope, metrics
to measure success, and C-level sponsorship.
To improve the accuracy of threat identification
and gain insights into business risks, the net
has to be cast wider and deeper. Information
has to be pulled into a security-oriented SIEM
from every possible data set: mobile, Web, social media, closed-circuit television (CCTV), and
so on. This links security devices and controls
so they have to be defeated as a whole, rather
than serially. Threat intelligence feeds can help,
but the intel needs to be relevant and up-todate; otherwise, it just becomes a distraction.
A SOC team needs a wide range of skills and
personalities, plus the ability to work closely
together under pressure. While well-documented
processes need to be in place to help reduce the
stress of dealing with a live incident, a SOC team
should also be empowered to challenge each
others assumptions target fixation and mirror
SSS UBM