Leveraging Splunk in A Chaotic Data World
Leveraging Splunk in A Chaotic Data World
Leveraging Splunk In
a Chaotic Data World
Efi Kaufman
Head of Big Data & Analytics, Cyber Security Center |
DELL Technologies @ Ministry of Energy - Israel
Chris Duffey
Global Energy Solutions Strategist | Splunk
Forward- During the course of this presentation, we may make forward‐looking statements regarding
future events or plans of the company. We caution you that such statements reflect our
Looking current expectations and estimates based on factors currently known to us and that actual
events or results may differ materially. The forward-looking statements made in the this
Statements presentation are being made as of the time and date of its live presentation. If reviewed after
its live presentation, it may not contain current or accurate information. We do not assume
any obligation to update any forward‐looking statements made herein.
In addition, any information about our roadmap outlines our general product direction and is
subject to change at any time without notice. It is for informational purposes only, and shall
not be incorporated into any contract or other commitment. Splunk undertakes no obligation
either to develop the features or functionalities described or to include any such feature or
functionality in a future release.
Splunk, Splunk>, Data-to-Everything, D2E and Turn Data Into Doing are trademarks and registered trademarks of Splunk Inc. in the United States
and other countries. All other brand names, product names or trademarks belong to their respective owners. © 2020 Splunk Inc. All rights reserved
© 2020 SPLUNK INC.
Efi Kaufman
Head of Big Data & Analytics | DELL Technologies @ Ministry of Energy - Israel
© 2020 SPLUNK INC.
You’ll walk away from this presentation with some idea and guidance about :
• How to handle in Splunk logs coming from other SIEMs
• How to “reverse engineer” the Splunk Add-on for Microsoft Windows
to make it work with “un-supported” logs.
Relayed
Windows Events
Events
Other
Follow the cat for additional resources and SIEMs Alerts
tips regarding the content of this presentation
© 2020 SPLUNK INC.
This is where you Identify the Identify the type of Look for TA on Build or Adjust Validate that the
start ! format/s : syslog, data sources : Splunkbase and TAs from data is mapped to
json, xml, CEF, Windows, linux, test to see if they Splunkbase or the CIM fields
A flood of data LEEF networking, are working with inhouse
from mixed security products the corresponding developed
sources and Use the fields that data sources
formats splunk was able to
identify to cut
through the
stream and the
field punct
(https://docs.splunk.com
/Splexicon:Punct)
© 2020 SPLUNK INC.
Technology Add-ons
A type of app that runs on the Splunk platform and provides specific
capabilities to other apps, such as getting data in, mapping data, or
providing saved searches and macros. An add-on is not typically run
as a standalone app. Instead, an add-on is a reusable component
that supports other apps across a number of different use cases.
• A collection of knowledge objects (eventtypes, tags, fields aliases, field extraction. Lookups)
that act on the data base on host, source or sourcetype.
Design tip: Think if you want to have separate TA-s per data source,
site, facility or any other grouping so that the TA changes will apply
correctly to the data sources.
• Use Splunk Universal Forwarders (UF) with Splunk Add-on for Windows
OR
LoadWinEventsToSplunk.md
© 2020 SPLUNK INC.
other_SIEMs_examples.md
© 2020 SPLUNK INC.
• With regards to Windows event logs, most of the Design tip: You can do some
nice thing with calculated fields.
value will be achieved by extracting the following
fields:
see : calculated_fields_tips.md
src dest
src_ip dest_ip
src_nt_host dest_nt_host
src_nt_domain dest_nt_domain
src_user dest_user
© 2020 SPLUNK INC.
• Identify the event code field Design tip: The documentation for the
– Identify the fields
Splunk Add-on for Windows on
Qradar : EventID/category/EventIDCode docs.splunk.com contains a very useful
Archsight: ExternalID list of the lookups used in this TA
McAfeeESM: Extract signature_id from McAfee ESM : “\|43\-2630(?<signature_id>\d{4})0\|
– Create the appropriate knowledge object so you will get :
Windows event ID number in the field signature_id and aliased to EventCode
Windows event ID description in the field signature
© 2020 SPLUNK INC.
2019-11-07 18:12:16 Daemon.Notice 127.0.0.1 Nov 7 18:12:15 DESKTOP-P193F0B Security-Auditing: 4672: AUDIT_SUCCESS Special privileges assigned
to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3E7 Privileges:
SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege
SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
SeDelegateSessionUserImpersonatePrivilege
• These section are often repeated in various events codes Account Name: DESKTOP-LLHJ389$
Account Domain: WORKGROUP
Logon ID: 0x3E7
WinEvents/wineventssections.docx
© 2020 SPLUNK INC.
Industry Perspective
© 2020 SPLUNK INC.
Chris Duffey
Energy Solutions Strategists | Splunk
© 2020 SPLUNK INC.
Industry Perspective
What is happening?
Energy Manufacturing
Concerns: Regulation, Concerns: IT and OT
Active Nation State Attacks, disconnect, attacks are
Safety, Environmental increasing
Perimeter
Questions to ask
• What changes are being made to my devices?
• Who is accessing my environment externally?
Perimeter • What applications are communicating across my environment?
Systems/Applications
Questions to ask
• What are my users and vendors doing in my system?
• What applications and services are installed on my machines?
Applications
Operating Systems:
How can Splunk answer these questions?
Windows XP, 7, 10, Server
• Track users/vendors, permissions, and access to systems
2003, 2008, 2012, 2016, Linux • Understand what is installed on my machines against a baseline
(legacy) and modern • Identify gaps in protection and what machines are getting updated
Applications:
SCADA, Antivirus, SQL databases,
Reporting Services
© 2020 SPLUNK INC.
OT Security
Add-on for
Splunk OT Asset
Inventory Ingestion
Vulnerability Monitoring:
Mitre ICS ATT&CK
Focus areas:
• Capture, monitor and report on data
from OT Assets
• Monitor traffic between OT and IT
• Identify vulnerabilities on OT assets
• Monitor, audit and investigate
regulatory compliance issues
Asset Framework and Compliance add-on for
Asset Center Extensions NERC CIP
© 2020 SPLUNK INC.
Thank you
SESSION SURVEY