SlideShare a Scribd company logo
1
Sylvain Proulx
Mathew Vandystadt
October, Date, 2018
Security Events Logging at 

2
Sylvain Proulx
18 years in security
Senior Security Manager
Who are we
Mathew V.
5 years in security
Security Specialist
Software Engineer
3
Our Mission
• Ingest all security logs
• Enrich, normalize, analyze, and
contextualize
• Automation
• Build threat model detection
• Visualize security data
4
What’s going on
Our current challenges
5
Volume of logs
keeps
increasing
Challenges
Normalization
of many new
types of logs
No one stop
solution for our
needs
STOP
6
More data
means more
alerts
Challenges
Limited amount
of analysts
Limited detection
mechanism
7
Challenges
Share logs
between
different
branches
Own our security
data
Secure the data
8
An in-depth look at our
solution
Building our Pipelines
9
Building One Piece at a Time
Logging
1 2 3 4
Data engineering Log storage and long
term retention
Visualization and
alerting
End to end solution
10
Where Our Data Comes From
• Bare metal servers
• Virtual machines
• Containers
1 2 3 4
11
Requirements For Our Log Shippers
• Simple way to ship logs
• Something that can buffer logs in case of outage
• Something that’s lightweight, but gives us the possibility to perform light
filtering at the source
• Something uniform throughout our fleet
• Automated deployment capability
1 2 3 4
12
Filebeats and Winlogbeats
• Generic beats configuration per service logged
• Simple installation and configuration
• Minimal impact on systems
• No loss of data in case of network outage
1 2 3 4
13
Adding Beats to Our Architecture Diagram
1 2 3 4
14
Being an ISP
• Large quantity and variety of network devices
• Unique ISP applications
• Logs also come from security devices
• Network devices can be very chatty
1 2 3 4
Different data sources to consider that other businesses don’t
15
What If Beats Can’t Handle Special Cases?
• Most of the devices send logs
only via syslog
• Losing data is not an option
• Need to receive data from
geographically diverse locations
1 2 3 4
16
Rsyslog
• Adding Rsyslog servers close to data sources
• Acts as buffer
• Basic parsing and serialization in JSON of logs with Rsyslog
• Send logs to our security data center in TCP and minimize the risk of data loss
1 2 3 4
17
Adding Rsyslog to Our Architecture Diagram
1 2 3 4
18
Building One Piece at a Time
Logging
1 2 3 4
Data engineering Log storage and long
term retention
Visualization and
alerting
End to end solution
19
Incoming Logs
• All logs are serialized in JSON
• The ability to sustain large spikes of traffic without over provisioning
• Buffer data allowing for higher availability
• Data accessible to multiple consumers
1 2 3 4
Our past experiences and requirements
20
Kafka as Our Message Queue
• Kafka allows us to handle spikes of logs
• Provide data buffering for potential downstream issue
• Provide controls to share data securely across other teams using open
formats
• Kafka supports JSON out of the box
• Rsyslog and Beats can write to Kafka
1 2 3 4
Our past experiences and requirements
21
Adding Kafka to Our Architecture Diagram
1 2 3 4
22
Parsing and Normalizing
• Use resources efficiently by taking advantage of auto-scaling
• Every unique technology requires it’s own set of configuration for
parsing and normalization
• Needs integration of CI/CD for ease of test and deployment
1 2 3 4
Our past experiences and requirements
23
Logstash on Openshift
• We decided to run all our logstash instances on openshift
• Containers consumes less resources than multiple virtual machines
• We get auto scaling through openshift
• We can scale quickly by adding more nodes if needed to our openshift
cluster.
1 2 3 4
Logstash containers
24
Adding Openshift and Logstash to Our
Architecture Diagram
1 2 3 4
25
Logstash on Openshift
• Centralize configurations in Gitlab
• Gitlab allows us to create CI pipelines quickly
• Run Logstash configurations through rspec for testing
• Review and deploy to production on merge requests
• Openshift provides the ability to build CD pipelines
1 2 3 4
Logstash CI/CD
26
Adding CI/CD to Our Architecture Diagram
1 2 3 4
27
Building One Piece at a Time
Logging
1 2 3 4
Data engineering Log storage and long
term retention
Visualization and
alerting
End to end solution
28
Log Storage
• Most the searching is going to be done the same day
• Documents need to be easily searchable for the previous 90 days
• Horizontal scalability
• Highly available and redundant data
1 2 3 4
Our past experiences and requirements
29
Log Storage
• No real surprise, we store our logs in elasticsearch
• Implementing the Hot-Warm architecture provides the best solution to
meet our requirements
• Our process allows for automated deployment of new nodes
• Elasticsearch provides the required HA and redundancy
1 2 3 4
Elasticsearch
30
Adding Elasticsearch to Our Architecture Diagram
1 2 3 4
31
Long-Term Data Retention
• For forensic and legal issues, data needs to be stored for a minimum of
12 months
• Needs to be stored outside of the elasticsearch cluster
• Fast retrieval of data in the existing elastic cluster
• Minimize cost for long-term storage solution
1 2 3 4
Our past experiences and requirements
32
Long-Term Data Retention
• Openstack Swift allows us to store our index snapshots in object
storage
• Reusability of S3 snapshot plugin from elasticsearch
• Acceptable retrieval times
• Use of curator to automate snapshots
1 2 3 4
S3 object storage
33
Adding S3 Storage to Our Architecture Diagram
1 2 3 4
34
Securing Data
• Control over who has access to the data
• Ease of RBAC management
• Add layer of encryption over data transportation
• Use of existing and tested solutions
1 2 3 4
Our past experiences and requirements
35
Adding X-Pack to Our Architecture Diagram
1 2 3 4
36
Building One Piece at a Time
End to end solution
Logging
1 3 42
Data engineering Log storage and long
term retention
Visualization and
alerting
37
Handling and Visualization Our Data
• Easy front-end to query logs
• Reusable query
• Ability to meaningfully visualize data
• Front-end that’s used by a wide range of security specialists
‒ Analysts
‒ Threat hunters
‒ Data scientists
Our past experiences and requirements
1 2 3 4
38
Adding Kibana to Our Architecture Diagram
1 2 3 4
39
Alerting on Security Events
• Need to filter on meaningful security events
• Ease of building and deploying detection rules
• Automate deployment
• Easily track life cycle of rules
Our past experiences and requirements
1 2 3 4
40
Alerting on Security Events
• Simple way of writing queries
• Use of YAML text files solves maintainability issues with version control
tools
• Auto deployment through CI/CD tools tied to version control
Elastalert
1 2 3 4
41
Adding ElastAlert to Our Architecture Diagram
1 2 3 4
42
Smart Detection
• Data must be easily accessible
• Develop custom machine learning models
• Automated deployment of machine learning models
• Flexibility in using different algorithms
Our past experiences and requirements
1 2 3 4
43
1 2 3 4
Smart Detection
In-house machine learning
• Models developed with open source, ML
centric libraries
• Deployment pipeline from data scientists
to production
44
Adding Machine Learning to Our
Architecture Diagram
1 2 3 4
45
Security Event Correlation
• Ability to correlate security events
• Ability to write complex rules
• Simple front end to help our analysts
• Central point for alerting
Our past experiences and requirements
1 2 3 4
46
Security Event Correlation
• Provides one of the best correlation engines for security events
• Allows for aggregation, correlation, trending, and more
• ESM provides a GUI and it’s a well known product throughout Bell
security teams
• Can receive and send data to multiple sources
Arcsight
1 2 3 4
47
Adding Arcsight to Our Architecture Diagram
1 2 3 4
48
Today’s Situation With Elastic
• Elastic allows for horizontal scaling to support constant increase of log
volume
• Elastic allows for simple integration with open security protocols
• Elastic’s X-Pack solution provides a built-in secure data environment
• New architecture using elastic allows us to build more detection
mechanism using different techniques
Where we at
STOP
1 2 3 4

More Related Content

PDF
Siscale Lightning Talk: Automated Root Cause Analysis with Elastic Stack
PDF
American Ancestors Use Case - Scalability & Support Using the Elasticsearch S...
PDF
Log Monitoring and Anomaly Detection at Scale at ORNL
PDF
Elastic at KPN
PDF
How KeyBank Used Elastic to Build an Enterprise Monitoring Solution
PDF
Improving search at Wellcome Collection
PDF
Elastic @ John Deere
PDF
Achieving cyber mission assurance with near real-time impact
Siscale Lightning Talk: Automated Root Cause Analysis with Elastic Stack
American Ancestors Use Case - Scalability & Support Using the Elasticsearch S...
Log Monitoring and Anomaly Detection at Scale at ORNL
Elastic at KPN
How KeyBank Used Elastic to Build an Enterprise Monitoring Solution
Improving search at Wellcome Collection
Elastic @ John Deere
Achieving cyber mission assurance with near real-time impact

What's hot (20)

PDF
Turning Evidence into Insights: How NCIS Leverages Elastic
PDF
Machine Learning for Anomaly Detection, Time Series Modeling, and More
PDF
Empower your security practitioners with the Elastic Stack
PDF
Better Search and Business Analytics at Southern Glazer’s Wine & Spirits
PDF
Capgemini: Observability within the Dutch government
PDF
Elastic on a Hyper-Converged Infrastructure for Operational Log Analytics
PDF
Centralized logging in a changing environment at the UK’s DVLA
PDF
Countering Threats with the Elastic Stack at CERDEC/ARL
PDF
What’s Evolving in the Elastic Stack
PDF
Divide & Conquer - Logging Architecture in Distributed Ecosystems with Elasti...
PDF
Infrastructure monitoring made easy, from ingest to insight
PDF
Building a reliable and cost effect logging system at Box
PDF
The Elastic Evolution of CenturyLink’s Network Management System
PDF
Elastic Cloud Enterprise in Azure with Devon
PDF
Reinventing enterprise defense with the Elastic Stack
PDF
Transformational Search Performance with EnergyIQ
PDF
CSX: Real-time Business Discovery with the Elastic Stack
PPTX
Artik cloud deview 2016
PDF
Monitoring and Securing a Geo-Dispersed Data Center at Hill AFB
PDF
How eStruxture Data Centers is Using ECE to Rapidly Scale Their Business
Turning Evidence into Insights: How NCIS Leverages Elastic
Machine Learning for Anomaly Detection, Time Series Modeling, and More
Empower your security practitioners with the Elastic Stack
Better Search and Business Analytics at Southern Glazer’s Wine & Spirits
Capgemini: Observability within the Dutch government
Elastic on a Hyper-Converged Infrastructure for Operational Log Analytics
Centralized logging in a changing environment at the UK’s DVLA
Countering Threats with the Elastic Stack at CERDEC/ARL
What’s Evolving in the Elastic Stack
Divide & Conquer - Logging Architecture in Distributed Ecosystems with Elasti...
Infrastructure monitoring made easy, from ingest to insight
Building a reliable and cost effect logging system at Box
The Elastic Evolution of CenturyLink’s Network Management System
Elastic Cloud Enterprise in Azure with Devon
Reinventing enterprise defense with the Elastic Stack
Transformational Search Performance with EnergyIQ
CSX: Real-time Business Discovery with the Elastic Stack
Artik cloud deview 2016
Monitoring and Securing a Geo-Dispersed Data Center at Hill AFB
How eStruxture Data Centers is Using ECE to Rapidly Scale Their Business
Ad

Similar to Security Events Logging at Bell with the Elastic Stack (20)

PDF
Monitoring microservices: Docker, Mesos and Kubernetes visibility at scale
PPTX
The Art of Container Monitoring
PPTX
Databricks clusters in autopilot mode
PPTX
Manging Container Deployments at Scale
PPTX
Istio Mesh – Managing Container Deployments at Scale
PDF
RedisConf18 - Remote Monitoring & Controlling Scienific Instruments
PPTX
[DSC Europe 23] Muhammad Arslan - A Journey of Auditlogs from Kafka to Elasti...
PPTX
David Henthorn [Rose-Hulman Institute of Technology] | Illuminating the Dark ...
PDF
Intro to sysdig in 15 minutes
PDF
GPA Software Overview R3
PPTX
detection pptx siem analyst security for understanding
PPTX
GraphTour - Neo4j Database Overview
PPTX
Blackhat USA 2016 - What's the DFIRence for ICS?
PDF
[RightScale Webinar] Architecting Databases in the cloud: How RightScale Doe...
PPTX
Phase2 -ESA capstone project work final year
PDF
Splunk, SIEMs, and Big Data - The Undercroft - November 2019
PPTX
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
PDF
Building a Hybrid Cloud Solution
PDF
Ibm_IoT_Architecture_and_Capabilities
PDF
Closer Look at Cloud Centric Architectures
Monitoring microservices: Docker, Mesos and Kubernetes visibility at scale
The Art of Container Monitoring
Databricks clusters in autopilot mode
Manging Container Deployments at Scale
Istio Mesh – Managing Container Deployments at Scale
RedisConf18 - Remote Monitoring & Controlling Scienific Instruments
[DSC Europe 23] Muhammad Arslan - A Journey of Auditlogs from Kafka to Elasti...
David Henthorn [Rose-Hulman Institute of Technology] | Illuminating the Dark ...
Intro to sysdig in 15 minutes
GPA Software Overview R3
detection pptx siem analyst security for understanding
GraphTour - Neo4j Database Overview
Blackhat USA 2016 - What's the DFIRence for ICS?
[RightScale Webinar] Architecting Databases in the cloud: How RightScale Doe...
Phase2 -ESA capstone project work final year
Splunk, SIEMs, and Big Data - The Undercroft - November 2019
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
Building a Hybrid Cloud Solution
Ibm_IoT_Architecture_and_Capabilities
Closer Look at Cloud Centric Architectures
Ad

More from Elasticsearch (20)

PDF
An introduction to Elasticsearch's advanced relevance ranking toolbox
PDF
From MSP to MSSP using Elastic
PDF
Cómo crear excelentes experiencias de búsqueda en sitios web
PDF
Te damos la bienvenida a una nueva forma de realizar búsquedas
PDF
Tirez pleinement parti d'Elastic grâce à Elastic Cloud
PDF
Comment transformer vos données en informations exploitables
PDF
Plongez au cœur de la recherche dans tous ses états.
PDF
Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]
PDF
An introduction to Elasticsearch's advanced relevance ranking toolbox
PDF
Welcome to a new state of find
PDF
Building great website search experiences
PDF
Keynote: Harnessing the power of Elasticsearch for simplified search
PDF
Cómo transformar los datos en análisis con los que tomar decisiones
PDF
Explore relève les défis Big Data avec Elastic Cloud
PDF
Comment transformer vos données en informations exploitables
PDF
Transforming data into actionable insights
PDF
Opening Keynote: Why Elastic?
PDF
Empowering agencies using Elastic as a Service inside Government
PDF
The opportunities and challenges of data for public good
PDF
Enterprise search and unstructured data with CGI and Elastic
An introduction to Elasticsearch's advanced relevance ranking toolbox
From MSP to MSSP using Elastic
Cómo crear excelentes experiencias de búsqueda en sitios web
Te damos la bienvenida a una nueva forma de realizar búsquedas
Tirez pleinement parti d'Elastic grâce à Elastic Cloud
Comment transformer vos données en informations exploitables
Plongez au cœur de la recherche dans tous ses états.
Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]
An introduction to Elasticsearch's advanced relevance ranking toolbox
Welcome to a new state of find
Building great website search experiences
Keynote: Harnessing the power of Elasticsearch for simplified search
Cómo transformar los datos en análisis con los que tomar decisiones
Explore relève les défis Big Data avec Elastic Cloud
Comment transformer vos données en informations exploitables
Transforming data into actionable insights
Opening Keynote: Why Elastic?
Empowering agencies using Elastic as a Service inside Government
The opportunities and challenges of data for public good
Enterprise search and unstructured data with CGI and Elastic

Recently uploaded (20)

PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
CIFDAQ's Market Wrap: Ethereum Leads, Bitcoin Lags, Institutions Shift
PDF
KodekX | Application Modernization Development
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Enable Enterprise-Ready Security on IBM i Systems.pdf
PDF
madgavkar20181017ppt McKinsey Presentation.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Reimagining Insurance: Connected Data for Confident Decisions.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Belt and Road Supply Chain Finance Blockchain Solution
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Smarter Business Operations Powered by IoT Remote Monitoring
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
PPTX
CroxyProxy Instagram Access id login.pptx
PDF
CIFDAQ's Token Spotlight: SKY - A Forgotten Giant's Comeback?
PDF
Modernizing your data center with Dell and AMD
PDF
Chapter 2 Digital Image Fundamentals.pdf
PPTX
ABU RAUP TUGAS TIK kelas 8 hjhgjhgg.pptx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
CIFDAQ's Market Wrap: Ethereum Leads, Bitcoin Lags, Institutions Shift
KodekX | Application Modernization Development
NewMind AI Monthly Chronicles - July 2025
Enable Enterprise-Ready Security on IBM i Systems.pdf
madgavkar20181017ppt McKinsey Presentation.pdf
Understanding_Digital_Forensics_Presentation.pptx
Reimagining Insurance: Connected Data for Confident Decisions.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Belt and Road Supply Chain Finance Blockchain Solution
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Smarter Business Operations Powered by IoT Remote Monitoring
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
A Day in the Life of Location Data - Turning Where into How.pdf
CroxyProxy Instagram Access id login.pptx
CIFDAQ's Token Spotlight: SKY - A Forgotten Giant's Comeback?
Modernizing your data center with Dell and AMD
Chapter 2 Digital Image Fundamentals.pdf
ABU RAUP TUGAS TIK kelas 8 hjhgjhgg.pptx

Security Events Logging at Bell with the Elastic Stack

  • 1. 1 Sylvain Proulx Mathew Vandystadt October, Date, 2018 Security Events Logging at 

  • 2. 2 Sylvain Proulx 18 years in security Senior Security Manager Who are we Mathew V. 5 years in security Security Specialist Software Engineer
  • 3. 3 Our Mission • Ingest all security logs • Enrich, normalize, analyze, and contextualize • Automation • Build threat model detection • Visualize security data
  • 4. 4 What’s going on Our current challenges
  • 5. 5 Volume of logs keeps increasing Challenges Normalization of many new types of logs No one stop solution for our needs STOP
  • 6. 6 More data means more alerts Challenges Limited amount of analysts Limited detection mechanism
  • 8. 8 An in-depth look at our solution Building our Pipelines
  • 9. 9 Building One Piece at a Time Logging 1 2 3 4 Data engineering Log storage and long term retention Visualization and alerting End to end solution
  • 10. 10 Where Our Data Comes From • Bare metal servers • Virtual machines • Containers 1 2 3 4
  • 11. 11 Requirements For Our Log Shippers • Simple way to ship logs • Something that can buffer logs in case of outage • Something that’s lightweight, but gives us the possibility to perform light filtering at the source • Something uniform throughout our fleet • Automated deployment capability 1 2 3 4
  • 12. 12 Filebeats and Winlogbeats • Generic beats configuration per service logged • Simple installation and configuration • Minimal impact on systems • No loss of data in case of network outage 1 2 3 4
  • 13. 13 Adding Beats to Our Architecture Diagram 1 2 3 4
  • 14. 14 Being an ISP • Large quantity and variety of network devices • Unique ISP applications • Logs also come from security devices • Network devices can be very chatty 1 2 3 4 Different data sources to consider that other businesses don’t
  • 15. 15 What If Beats Can’t Handle Special Cases? • Most of the devices send logs only via syslog • Losing data is not an option • Need to receive data from geographically diverse locations 1 2 3 4
  • 16. 16 Rsyslog • Adding Rsyslog servers close to data sources • Acts as buffer • Basic parsing and serialization in JSON of logs with Rsyslog • Send logs to our security data center in TCP and minimize the risk of data loss 1 2 3 4
  • 17. 17 Adding Rsyslog to Our Architecture Diagram 1 2 3 4
  • 18. 18 Building One Piece at a Time Logging 1 2 3 4 Data engineering Log storage and long term retention Visualization and alerting End to end solution
  • 19. 19 Incoming Logs • All logs are serialized in JSON • The ability to sustain large spikes of traffic without over provisioning • Buffer data allowing for higher availability • Data accessible to multiple consumers 1 2 3 4 Our past experiences and requirements
  • 20. 20 Kafka as Our Message Queue • Kafka allows us to handle spikes of logs • Provide data buffering for potential downstream issue • Provide controls to share data securely across other teams using open formats • Kafka supports JSON out of the box • Rsyslog and Beats can write to Kafka 1 2 3 4 Our past experiences and requirements
  • 21. 21 Adding Kafka to Our Architecture Diagram 1 2 3 4
  • 22. 22 Parsing and Normalizing • Use resources efficiently by taking advantage of auto-scaling • Every unique technology requires it’s own set of configuration for parsing and normalization • Needs integration of CI/CD for ease of test and deployment 1 2 3 4 Our past experiences and requirements
  • 23. 23 Logstash on Openshift • We decided to run all our logstash instances on openshift • Containers consumes less resources than multiple virtual machines • We get auto scaling through openshift • We can scale quickly by adding more nodes if needed to our openshift cluster. 1 2 3 4 Logstash containers
  • 24. 24 Adding Openshift and Logstash to Our Architecture Diagram 1 2 3 4
  • 25. 25 Logstash on Openshift • Centralize configurations in Gitlab • Gitlab allows us to create CI pipelines quickly • Run Logstash configurations through rspec for testing • Review and deploy to production on merge requests • Openshift provides the ability to build CD pipelines 1 2 3 4 Logstash CI/CD
  • 26. 26 Adding CI/CD to Our Architecture Diagram 1 2 3 4
  • 27. 27 Building One Piece at a Time Logging 1 2 3 4 Data engineering Log storage and long term retention Visualization and alerting End to end solution
  • 28. 28 Log Storage • Most the searching is going to be done the same day • Documents need to be easily searchable for the previous 90 days • Horizontal scalability • Highly available and redundant data 1 2 3 4 Our past experiences and requirements
  • 29. 29 Log Storage • No real surprise, we store our logs in elasticsearch • Implementing the Hot-Warm architecture provides the best solution to meet our requirements • Our process allows for automated deployment of new nodes • Elasticsearch provides the required HA and redundancy 1 2 3 4 Elasticsearch
  • 30. 30 Adding Elasticsearch to Our Architecture Diagram 1 2 3 4
  • 31. 31 Long-Term Data Retention • For forensic and legal issues, data needs to be stored for a minimum of 12 months • Needs to be stored outside of the elasticsearch cluster • Fast retrieval of data in the existing elastic cluster • Minimize cost for long-term storage solution 1 2 3 4 Our past experiences and requirements
  • 32. 32 Long-Term Data Retention • Openstack Swift allows us to store our index snapshots in object storage • Reusability of S3 snapshot plugin from elasticsearch • Acceptable retrieval times • Use of curator to automate snapshots 1 2 3 4 S3 object storage
  • 33. 33 Adding S3 Storage to Our Architecture Diagram 1 2 3 4
  • 34. 34 Securing Data • Control over who has access to the data • Ease of RBAC management • Add layer of encryption over data transportation • Use of existing and tested solutions 1 2 3 4 Our past experiences and requirements
  • 35. 35 Adding X-Pack to Our Architecture Diagram 1 2 3 4
  • 36. 36 Building One Piece at a Time End to end solution Logging 1 3 42 Data engineering Log storage and long term retention Visualization and alerting
  • 37. 37 Handling and Visualization Our Data • Easy front-end to query logs • Reusable query • Ability to meaningfully visualize data • Front-end that’s used by a wide range of security specialists ‒ Analysts ‒ Threat hunters ‒ Data scientists Our past experiences and requirements 1 2 3 4
  • 38. 38 Adding Kibana to Our Architecture Diagram 1 2 3 4
  • 39. 39 Alerting on Security Events • Need to filter on meaningful security events • Ease of building and deploying detection rules • Automate deployment • Easily track life cycle of rules Our past experiences and requirements 1 2 3 4
  • 40. 40 Alerting on Security Events • Simple way of writing queries • Use of YAML text files solves maintainability issues with version control tools • Auto deployment through CI/CD tools tied to version control Elastalert 1 2 3 4
  • 41. 41 Adding ElastAlert to Our Architecture Diagram 1 2 3 4
  • 42. 42 Smart Detection • Data must be easily accessible • Develop custom machine learning models • Automated deployment of machine learning models • Flexibility in using different algorithms Our past experiences and requirements 1 2 3 4
  • 43. 43 1 2 3 4 Smart Detection In-house machine learning • Models developed with open source, ML centric libraries • Deployment pipeline from data scientists to production
  • 44. 44 Adding Machine Learning to Our Architecture Diagram 1 2 3 4
  • 45. 45 Security Event Correlation • Ability to correlate security events • Ability to write complex rules • Simple front end to help our analysts • Central point for alerting Our past experiences and requirements 1 2 3 4
  • 46. 46 Security Event Correlation • Provides one of the best correlation engines for security events • Allows for aggregation, correlation, trending, and more • ESM provides a GUI and it’s a well known product throughout Bell security teams • Can receive and send data to multiple sources Arcsight 1 2 3 4
  • 47. 47 Adding Arcsight to Our Architecture Diagram 1 2 3 4
  • 48. 48 Today’s Situation With Elastic • Elastic allows for horizontal scaling to support constant increase of log volume • Elastic allows for simple integration with open security protocols • Elastic’s X-Pack solution provides a built-in secure data environment • New architecture using elastic allows us to build more detection mechanism using different techniques Where we at STOP 1 2 3 4