SlideShare a Scribd company logo
1 of 45
Got SIEM?
Now what?
Making SIEM work for you
Dr. Anton Chuvakin
Security Warrior Consulting
www.securitywarriorconsulting.com
SANS @ Night, San Francisco 2010
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
Outline
• Brief: What is SIEM/LM?
• “You got it!”
• SIEM Pitfalls and Challenges
• Useful SIEM Practices
– From Deployment Onwards
• SIEM “Worst Practices”
• Secret to SIEM Magic!
• Conclusions
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
About Anton
• Former employee of SIEM and log
management vendors
• Now consulting for SIEM vendors and
SIEM users
• SANS class author (SEC434 Log
Management)
• Author, speaker, blogger, podcaster (on
logs, naturally )
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
SIEM?
Security Information and Event
Management!
(sometimes: SIM or SEM)
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
Got SIEM?
Now what?
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
SIEM and Log Management
• SIEM:
Security Information
and Event Management
• Focus on security use
of logs and other data
LM:
Log Management
Focus on all uses
for logs
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
Why SO many people
think that “SIEM sucks?”
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
SIEM Evolution
• 1997-2002 IDS and Firewall
– Worms, alert overflow, etc
– Sold as “SOC in the box”
• 2003 – 2007 Above + Server + Context
– PCI DSS, SOX, users
– Sold as “SOC in the box”++
• 2008+ Above + Applications + …
– Fraud, activities, cybercrime
– Sold as “SOC in the box”+++++
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
What SIEM MUST Have?
1. Log and Context Data Collection
2. Normalization and categorization
3. Correlation (“SEM”)
4. Notification/alerting (“SEM”)
5. Prioritization (“SEM”)
6. Dashboards and visualization
7. Reporting and report delivery (“SIM”)
8. Security role workflow (IR, SOC, etc)
What SIEM Eats: Logs
<122> Mar 4 09:23:15 localhost sshd[27577]: Accepted password for anton from
::ffff:192.168.138.35 port 2895 ssh2
<13> Fri Mar 17 14:29:38 2006 680 Security SYSTEM User Failure Audit
ENTERPRISE Account Logon
Logon attempt by: MICROSOFT_AUTHENTICATION_PACKAGE_V1_0 Logon
account: ANTON Source Workstation: ENTERPRISE Error Code: 0xC000006
A 4574
<57> Dec 25 00:04:32:%SEC_LOGIN-5-
LOGIN_SUCCESS:Login Success [user:anton]
[Source:10.4.2.11] [localport:23] at 20:55:40 UTC Fri Feb 28
2006
<18> Dec 17 15:45:57 10.14.93.7 ns5xp: NetScreen device_id=ns5xp system-
warning-00515: Admin User anton has logged on via Telnet from
10.14.98.55:39073 (2002-12-17 15:50:53)
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
What SIEM Eats: Context
http://chuvakin.blogspot.com/2010/01/on-log-context.html
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
Just What Is “Correlation”?
• Dictionary: “establishing relationships”
• SIEM: “relate events together for security
benefit”
• Why correlate events?
• Automated cross-device data analysis!
• Simple correlation rule:
• If this, followed by that, take some action
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
Popular #SIEM_FAIL
… in partial answer to “why people think SIEM sucks?”
1. Misplaced expectations (“SOC-in-a-box”)
2. Missing requirements (“SIEM…huh?”)
3. Missed project sizing
4. Political challenges with integration
5. Lack of commitment
6. Vendor deception (*)
7. And only then: product not working 
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
Big 3 for SIEM/LM
Compliance
Security
SIEM
LM
Operations
Compliance
Security
Ops
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
In Reality …
Compliance budget
Security budget
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
SIEM Planning Areas
1.Goals and requirements
2.Functionality / features
3.Scoping of data collection
4.Sizing
5.Architecting
… in THAT order!
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
What is a “Best Practice”?
• A process or practice that
–The leaders in the field
are doing today
–Generally leads to useful
results with cost
effectiveness
P.S. If you still hate it – say
“useful practices”
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
BP1 LM before SIEM!
If you remember one thing from this, let it be:
Deploy Log Management
BEFORE SIEM!
Q: Why do you think MOST 1990s SIEM deployments
FAILED?
A: There was no log management! SEM alone is just not
that useful…
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
Graduating from LM to SIEM
Are you ready? Well, do you have…
1. Response capability
– Prepared to response to alerts
2. Monitoring capability
– Has an operational process to monitor
3. Tuning and customization ability
– Can customize the tools and content
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
SIEM/LM Maturity Curve
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
BP2 Evolving to SIEM
Steps of a journey …
• Establish response process
• Deploy a SIEM
• Think “use cases”
• Start filtering logs from LM to SIEM
– Phases!
• Prepare for the initial increase in workload
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
Example LM->SIEM Filtering
3D: Devices / Network topology / Events
• Devices: NIDS/NIPS, WAF, servers
• Network: DMZ, payment network (PCI
scope), other “key domains”
• Events: authentication, outbound firewall
access
Later: proxies, more firewall data, web
servers
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
“Complianc-y” Approach to SIEM
1. List regulations
2. Identify other “use cases”
3. Review whether SIEM/LM is needed
4. Map features to controls
5. Select and deploy
6. Operationalize regulations
7. Expand use
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
“Quick Wins” for Phased Approach
Phased
approach #1
• Collect problems
• Plan architecture
• Start collecting
• Start reviewing
• Solve problem 1
• Solve problem n
Phased
approach #2
• Focus on 1 problem
• Plan architecture
• Start collecting
• Start reviewing
• Solve problem 1
• Plan again
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
BP3 SIEM First Steps
First step = BABY steps!
• Compliance monitoring
• “Traditional” SIEM uses
– Authentication tracking
– IPS/IDS + firewall correlation
– Web application hacking
• Simple use cases
– based on your risks
What problems do YOU want solved?
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
Example SIEM Use Case
Cross-system authentication tracking
• Scope: all systems with authentication (!)
• Purpose: detect unauthorized access to
systems
• Method: track login failures and successes
• Rule details: multiple login failures followed
by login success
• Response plan: user account investigation,
suspension, communication with suspect user
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
10 minutes or 10 months?
Our log
management
appliance can
be racked,
configured and
collecting logs in
10 minutes
A typical large
customer takes
10 months to
deploy a log
management
architecture
based on our
technology
?
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
Secret to SIEM Magic!
“Operationalizing” SIEM
(e.g. SOC building)
Deployment Service
SIEM Software/Appliance
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
Ultimate SIEM Usage Scenarios
1. Security Operations Center (SOC)
– RT views, analysts 24/7, chase alerts
2. Mini-SOC / “morning after”
– Delayed views, analysts 1/24, review and
drill-down
3. “Automated SOC” / alert + investigate
– Configure and forget, investigate alerts
4. Compliance status reporting
– Review reports/views weekly/monthly
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
What is a “Worst Practice”?
• As opposed to the “best
practice” it is …
–What the losers in the
field are doing today
–A practice that generally
leads to disastrous
results, despite its
popularity
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
WP for SIEM Project scope
• WP1: Postpone scope until after the purchase
– “The vendor says ‘it scales’ so we will just feed
ALL our logs”
– Windows, Linux, i5/OS, OS/390, Cisco –
send’em in!
• WP2: Assume you will be the only user of the
tool
– “Steakholders”? What’s that? 
– Common consequence: two or more
simiilar tools are bought
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
Case Study: “We Use’em All”
At SANS Log Management Summit 200X…
• Vendors X, Y and Z claim “Big Finance” as
a customer
• How can that be?
• Well, different teams purchased different
products …
• About $2.3m wasted on tools
that do the same!
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
WPs for Deployment
• WP3: Expect The Vendor To Write Your Logging
Policy OR Ignore Vendor Recommendations
– “Tell us what we need – tell us what you have”
forever…
• WP4: Unpack the boxes and go!
– “Coordinating with network and system folks is
for cowards!”
– Do you know why LM projects take months
sometimes?
• WP5: Don’t prepare the infrastructure
– “Time synchronization? Pah, who needs it”
• WP6: Deploy Everywhere At Once
– “We need it everywhere!! Now!!”
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
Case Study: Shelfware Forever!
• Financial company gets a SIEM tool after many
months of “evaluations”
• Vendor SEs deploy it
• One year passes by
• A new CSO comes in; looks for what is deployed
• Finds a SIEM tool – which database contains
exactly 53 log records (!)
– It was never connected to a production
network…
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
WPs for Expanding Deployment
• WP7: Don’t Bother With A Product Owner
– “We all use it – we all run it (=nobody does)”
• WP8: Don’t Check For Changed Needs –
Just Buy More of the Same
– “We made the decision – why fuss over it?”
• WP9: If it works for 10, it will be OK for
10,000
– “1,10,100, …, 1 trillion –
they are just numbers”
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
Case Study: Today - Datacenter,
Tomorrow … Oops!
• Log management tool is tested and deployed
at two datacenters – with great success!
• PCI DSS comes in; scope is expanded to
wireless systems and POS branch servers
• The tool is prepared to be deployed in 410 (!)
more locations
• “Do you think it will work?” - “Suuuuure!”, says
the vendor
• Security director resigns …
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
More Quick SIEM Tips
Cost countless sleepless night and boatloads
of pain….
• No SIEM before IR plans/procedures
• No SIEM before basic log management
• Think "quick wins", not "OMG ...that SIEM
boondoggle"
• Tech matters! But practices matter more
• Things will get worse before better.
Invest time before collecting value!
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
SIEM Resourcing Voodoo
“Things get worse before they get better”
• Hardware – initial + growth
• Software license fees (CPU, device, EPS,
user, etc, etc)
• Support and integration projects
• Operations Personnel (analysts, developer)
• SIEM Administrator Personnel (SA, DBA,
application admin)
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
Conclusions
• SIEM will work and has value … but BOTH
initial and ongoing time/focus
commitment is required
• FOCUS on what problems you are trying
to solve with SIEM: requirements!
• Phased approach WITH “quick wins” is
the easiest way to go
• Operationalize!!!
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
And If You Only …
… learn one thing from this….
… then let it be….
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
Requirements! Requirements! Requirements! Requirements! Requirements!
Requirements! Requirements! Requirements! Requirements! Requirements!
Requirements! Requirements! Requirements! Requirements! Requirements!
Requirements! Requirements! Requirements! Requirements! Requirements!
Requirements! Requirements! Requirements! Requirements! Requirements!
Requirements! Requirements! Requirements! Requirements! Requirements!
Requirements! Requirements! Requirements! Requirements! Requirements!
Requirements! Requirements! Requirements! Requirements! Requirements!
Requirements! Requirements! Requirements! Requirements! Requirements!
Requirements! Requirements! Requirements! Requirements! Requirements!
Requirements! Requirements! Requirements! Requirements! Requirements!
Requirements! Requirements! Requirements! Requirements! Requirements!
Requirements! Requirements! Requirements! Requirements! Requirements!
Requirements! Requirements! Requirements! Requirements! Requirements!
Requirements! Requirements! Requirements! Requirements! Requirements!
Requirements! Requirements! Requirements! Requirements! Requirements!
Requirements! Requirements! Requirements! Requirements! Requirements!
Requirements! Requirements! Requirements! Requirements! Requirements!
Requirements! Requirements! Requirements! Requirements! Requirements!
Requirements! Requirements! Requirements! Requirements! Requirements!
Requirements! Requirements! Requirements! Requirements! Requirements!
Requirements! Requirements! Requirements! Requirements! Requirements!
Requirements! Requirements! Requirements! Requirements! Requirements!
Requirements! Requirements! Requirements! Requirements! Requirements!
Requirements
Requirements
Requirements
Requirements
Requirvements
Requirements
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
Questions?
Dr. Anton Chuvakin
Email: anton@chuvakin.org
Site: http://www.chuvakin.org
Blog: http://www.securitywarrior.org
Twitter: @anton_chuvakin
Consulting: http://www.securitywarriorconsulting.com
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
More Resources
• Blog: www.securitywarrior.org
• Podcast: look for “LogChat” on iTunes
• Slides: http://www.slideshare.net/anton_chuvakin
• Papers: www.info-secure.org and
http://www.docstoc.com/profile/anton1chuvakin
• Consulting: http://www.securitywarriorconsulting.com/
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
More on Anton
• Consultant: http://www.securitywarriorconsulting.com
• Book author: “Security Warrior”, “PCI Compliance”,
“Information Security Management Handbook”, “Know
Your Enemy II”, “Hacker’s Challenge 3”, etc
• Conference speaker: SANS, FIRST, GFIRST, ISSA,
CSI, RSA, Interop, many, many others worldwide
• Standard developer: CEE, CVSS, OVAL, etc
• Community role: SANS, Honeynet Project, WASC, CSI,
ISSA, OSSTMM, InfraGard, ISSA, others
• Past roles: Researcher, Security Analyst, Strategist,
Evangelist, Product Manager
Security Warrior Consulting
www.securitywarriorconsulting.com
Dr. Anton Chuvakin
Security Warrior Consulting Services
• Logging and log management strategy, procedures and practices
– Develop logging policies and processes, log review procedures, workflows and
periodic tasks as well as help architect those to solve organization problems
– Plan and implement log management architecture to support your business
cases; develop specific components such as log data collection, filtering,
aggregation, retention, log source configuration as well as reporting, review and
validation
– Customize industry “best practices” related to logging and log review to fit your
environment, help link these practices to business services and regulations
– Help integrate logging tools and processes into IT and business operations
• SIEM and log management content development
– Develop correlation rules, reports and other content to make your SIEM and log
management product more useful to you and more applicable to your risk profile
and compliance needs
– Create and refine policies, procedures and operational practices for logging
and log management to satisfy requirements of PCI DSS, HIPAA, NERC, FISMA
and other regulations
More at www.SecurityWarriorConsulting.com

More Related Content

What's hot

Siem ppt
Siem pptSiem ppt
Siem pptkmehul
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation CenterS.E. CTS CERT-GOV-MD
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)k33a
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)hardik soni
 
McAfee SIEM solution
McAfee SIEM solution McAfee SIEM solution
McAfee SIEM solution hashnees
 
Elastic SIEM (Endpoint Security)
Elastic SIEM (Endpoint Security)Elastic SIEM (Endpoint Security)
Elastic SIEM (Endpoint Security)Kangaroot
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmPriyanka Aash
 
Dragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations CenterDragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations CenterDragos, Inc.
 
Modern vs. Traditional SIEM
Modern vs. Traditional SIEM Modern vs. Traditional SIEM
Modern vs. Traditional SIEM Alert Logic
 
Tabletop Exercise for Managing an Active Shooter Scenario
Tabletop Exercise for Managing an Active Shooter ScenarioTabletop Exercise for Managing an Active Shooter Scenario
Tabletop Exercise for Managing an Active Shooter ScenarioDon Haverty
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewCamilo Fandiño Gómez
 
SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?Jonathan Sinclair
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations centerCMR WORLD TECH
 
Threat Hunting
Threat HuntingThreat Hunting
Threat HuntingSplunk
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)Ahmed Ayman
 
Top Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against ThemTop Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against ThemSBWebinars
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 

What's hot (20)

Siem ppt
Siem pptSiem ppt
Siem ppt
 
SIEM Primer:
SIEM Primer:SIEM Primer:
SIEM Primer:
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
McAfee SIEM solution
McAfee SIEM solution McAfee SIEM solution
McAfee SIEM solution
 
Elastic SIEM (Endpoint Security)
Elastic SIEM (Endpoint Security)Elastic SIEM (Endpoint Security)
Elastic SIEM (Endpoint Security)
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
 
Dragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations CenterDragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations Center
 
SIEM - Your Complete IT Security Arsenal
SIEM - Your Complete IT Security ArsenalSIEM - Your Complete IT Security Arsenal
SIEM - Your Complete IT Security Arsenal
 
Modern vs. Traditional SIEM
Modern vs. Traditional SIEM Modern vs. Traditional SIEM
Modern vs. Traditional SIEM
 
Tabletop Exercise for Managing an Active Shooter Scenario
Tabletop Exercise for Managing an Active Shooter ScenarioTabletop Exercise for Managing an Active Shooter Scenario
Tabletop Exercise for Managing an Active Shooter Scenario
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
SOC and SIEM.pptx
SOC and SIEM.pptxSOC and SIEM.pptx
SOC and SIEM.pptx
 
SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
Top Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against ThemTop Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against Them
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 

Viewers also liked

"You Got That SIEM. Now What Do You Do?"  by Dr. Anton Chuvakin
"You Got That SIEM. Now What Do You Do?"  by Dr. Anton Chuvakin"You Got That SIEM. Now What Do You Do?"  by Dr. Anton Chuvakin
"You Got That SIEM. Now What Do You Do?"  by Dr. Anton ChuvakinAnton Chuvakin
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM AlienVault
 
Why so many SIEM Implmentations Fail
Why so many SIEM Implmentations FailWhy so many SIEM Implmentations Fail
Why so many SIEM Implmentations FailRita Barry
 
Six Steps to SIEM Success
Six Steps to SIEM SuccessSix Steps to SIEM Success
Six Steps to SIEM SuccessAlienVault
 
3 computer network - basic concepts
3   computer network - basic concepts3   computer network - basic concepts
3 computer network - basic conceptsAnkit Garg
 
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinFive Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinAnton Chuvakin
 
Introduction to Neural networks (under graduate course) Lecture 2 of 9
Introduction to Neural networks (under graduate course) Lecture 2 of 9Introduction to Neural networks (under graduate course) Lecture 2 of 9
Introduction to Neural networks (under graduate course) Lecture 2 of 9Randa Elanwar
 
Basic concepts of network analysis
Basic concepts of network analysisBasic concepts of network analysis
Basic concepts of network analysisAnupam Kumar
 
Suprema Time Attendance &amp; Access Control- Grapple Technologies
Suprema Time Attendance &amp; Access Control- Grapple TechnologiesSuprema Time Attendance &amp; Access Control- Grapple Technologies
Suprema Time Attendance &amp; Access Control- Grapple Technologiesnajidkt
 
[233] level 2 network programming using packet ngin rtos
[233] level 2 network programming using packet ngin rtos[233] level 2 network programming using packet ngin rtos
[233] level 2 network programming using packet ngin rtosNAVER D2
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMEAlienVault
 
Basic Network Concepts
Basic Network ConceptsBasic Network Concepts
Basic Network ConceptsAbhishek Singh
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic conceptsrahul kapoliya
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 
Top 10 Essentials for Building a Powerful Security Dashboard
Top 10 Essentials for Building a Powerful Security DashboardTop 10 Essentials for Building a Powerful Security Dashboard
Top 10 Essentials for Building a Powerful Security DashboardTripwire
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & BuildSameer Paradia
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer NetworkingHj Habib
 

Viewers also liked (20)

"You Got That SIEM. Now What Do You Do?"  by Dr. Anton Chuvakin
"You Got That SIEM. Now What Do You Do?"  by Dr. Anton Chuvakin"You Got That SIEM. Now What Do You Do?"  by Dr. Anton Chuvakin
"You Got That SIEM. Now What Do You Do?"  by Dr. Anton Chuvakin
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM
 
Why so many SIEM Implmentations Fail
Why so many SIEM Implmentations FailWhy so many SIEM Implmentations Fail
Why so many SIEM Implmentations Fail
 
PACE-IT: Basic Network Concepts (part 3)
PACE-IT: Basic Network Concepts (part 3)PACE-IT: Basic Network Concepts (part 3)
PACE-IT: Basic Network Concepts (part 3)
 
Six Steps to SIEM Success
Six Steps to SIEM SuccessSix Steps to SIEM Success
Six Steps to SIEM Success
 
3 computer network - basic concepts
3   computer network - basic concepts3   computer network - basic concepts
3 computer network - basic concepts
 
PACE-IT: Basic Network Concepts (part 2)
PACE-IT: Basic Network Concepts (part 2)PACE-IT: Basic Network Concepts (part 2)
PACE-IT: Basic Network Concepts (part 2)
 
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinFive Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
 
Introduction to Neural networks (under graduate course) Lecture 2 of 9
Introduction to Neural networks (under graduate course) Lecture 2 of 9Introduction to Neural networks (under graduate course) Lecture 2 of 9
Introduction to Neural networks (under graduate course) Lecture 2 of 9
 
Basic concepts of network analysis
Basic concepts of network analysisBasic concepts of network analysis
Basic concepts of network analysis
 
PACE-IT: Basic Network Concepts (part 1)
PACE-IT: Basic Network Concepts (part 1)PACE-IT: Basic Network Concepts (part 1)
PACE-IT: Basic Network Concepts (part 1)
 
Suprema Time Attendance &amp; Access Control- Grapple Technologies
Suprema Time Attendance &amp; Access Control- Grapple TechnologiesSuprema Time Attendance &amp; Access Control- Grapple Technologies
Suprema Time Attendance &amp; Access Control- Grapple Technologies
 
[233] level 2 network programming using packet ngin rtos
[233] level 2 network programming using packet ngin rtos[233] level 2 network programming using packet ngin rtos
[233] level 2 network programming using packet ngin rtos
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
 
Basic Network Concepts
Basic Network ConceptsBasic Network Concepts
Basic Network Concepts
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic concepts
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Top 10 Essentials for Building a Powerful Security Dashboard
Top 10 Essentials for Building a Powerful Security DashboardTop 10 Essentials for Building a Powerful Security Dashboard
Top 10 Essentials for Building a Powerful Security Dashboard
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer Networking
 

Similar to Got SIEM? Now what? Getting SIEM Work For You

Anton Chuvakin - So You Got That SIEM, NOW What Do You Do?
Anton Chuvakin - So You Got That SIEM, NOW What Do You Do?Anton Chuvakin - So You Got That SIEM, NOW What Do You Do?
Anton Chuvakin - So You Got That SIEM, NOW What Do You Do?Source Conference
 
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton ChuvakinSo You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton ChuvakinAnton Chuvakin
 
Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...
Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...
Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...IBM Security
 
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton Chuvakin
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton ChuvakinMaking Log Data Useful: SIEM and Log Management Together by Dr. Anton Chuvakin
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton ChuvakinAnton Chuvakin
 
Making Log Data Useful: SIEM and Log Management Together
Making Log Data Useful: SIEM and Log Management TogetherMaking Log Data Useful: SIEM and Log Management Together
Making Log Data Useful: SIEM and Log Management TogetherAnton Chuvakin
 
Leveraging Compliance for Security with SIEM and Log Management
Leveraging Compliance for Security with SIEM and Log ManagementLeveraging Compliance for Security with SIEM and Log Management
Leveraging Compliance for Security with SIEM and Log ManagementTripwire
 
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinFive Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinAnton Chuvakin
 
Enterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
Enterprise Logging and Log Management: Hot Topics by Dr. Anton ChuvakinEnterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
Enterprise Logging and Log Management: Hot Topics by Dr. Anton ChuvakinAnton Chuvakin
 
Troubleshooting The Modern Managed Client - Workplace Nijna Summit 2020
Troubleshooting The Modern Managed Client - Workplace Nijna Summit 2020  Troubleshooting The Modern Managed Client - Workplace Nijna Summit 2020
Troubleshooting The Modern Managed Client - Workplace Nijna Summit 2020 Ronni Pedersen
 
5 Things Your Security Administrator Should Tell You
5 Things Your Security Administrator Should Tell You5 Things Your Security Administrator Should Tell You
5 Things Your Security Administrator Should Tell YouHelpSystems
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Claus Cramon Houmann
 
Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Claus Cramon Houmann
 
Secure Software Development Lifecycle
Secure Software Development LifecycleSecure Software Development Lifecycle
Secure Software Development Lifecycle1&1
 
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...Anton Chuvakin
 
IANS information security forum 2019 summary
IANS information security forum 2019 summaryIANS information security forum 2019 summary
IANS information security forum 2019 summaryKarun Chennuri
 
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...NoNameCon
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementRedZone Technologies
 
2020 FRSecure CISSP Mentor Program - Class 10
2020 FRSecure CISSP Mentor Program - Class 102020 FRSecure CISSP Mentor Program - Class 10
2020 FRSecure CISSP Mentor Program - Class 10FRSecure
 
Open Source Defense for Edge 2017
Open Source Defense for Edge 2017Open Source Defense for Edge 2017
Open Source Defense for Edge 2017Adrian Sanabria
 

Similar to Got SIEM? Now what? Getting SIEM Work For You (20)

Anton Chuvakin - So You Got That SIEM, NOW What Do You Do?
Anton Chuvakin - So You Got That SIEM, NOW What Do You Do?Anton Chuvakin - So You Got That SIEM, NOW What Do You Do?
Anton Chuvakin - So You Got That SIEM, NOW What Do You Do?
 
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton ChuvakinSo You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
 
Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...
Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...
Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...
 
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton Chuvakin
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton ChuvakinMaking Log Data Useful: SIEM and Log Management Together by Dr. Anton Chuvakin
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton Chuvakin
 
Making Log Data Useful: SIEM and Log Management Together
Making Log Data Useful: SIEM and Log Management TogetherMaking Log Data Useful: SIEM and Log Management Together
Making Log Data Useful: SIEM and Log Management Together
 
Leveraging Compliance for Security with SIEM and Log Management
Leveraging Compliance for Security with SIEM and Log ManagementLeveraging Compliance for Security with SIEM and Log Management
Leveraging Compliance for Security with SIEM and Log Management
 
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinFive Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
 
Enterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
Enterprise Logging and Log Management: Hot Topics by Dr. Anton ChuvakinEnterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
Enterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
 
Troubleshooting The Modern Managed Client - Workplace Nijna Summit 2020
Troubleshooting The Modern Managed Client - Workplace Nijna Summit 2020  Troubleshooting The Modern Managed Client - Workplace Nijna Summit 2020
Troubleshooting The Modern Managed Client - Workplace Nijna Summit 2020
 
5 Things Your Security Administrator Should Tell You
5 Things Your Security Administrator Should Tell You5 Things Your Security Administrator Should Tell You
5 Things Your Security Administrator Should Tell You
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015
 
Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015
 
Secure Software Development Lifecycle
Secure Software Development LifecycleSecure Software Development Lifecycle
Secure Software Development Lifecycle
 
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
 
C days2015
C days2015C days2015
C days2015
 
IANS information security forum 2019 summary
IANS information security forum 2019 summaryIANS information security forum 2019 summary
IANS information security forum 2019 summary
 
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat Management
 
2020 FRSecure CISSP Mentor Program - Class 10
2020 FRSecure CISSP Mentor Program - Class 102020 FRSecure CISSP Mentor Program - Class 10
2020 FRSecure CISSP Mentor Program - Class 10
 
Open Source Defense for Edge 2017
Open Source Defense for Edge 2017Open Source Defense for Edge 2017
Open Source Defense for Edge 2017
 

More from Anton Chuvakin

Future of SOC: More Security, Less Operations
Future of SOC: More Security, Less OperationsFuture of SOC: More Security, Less Operations
Future of SOC: More Security, Less OperationsAnton Chuvakin
 
SOC Meets Cloud: What Breaks, What Changes, What to Do?
SOC Meets Cloud: What Breaks, What Changes, What to Do?SOC Meets Cloud: What Breaks, What Changes, What to Do?
SOC Meets Cloud: What Breaks, What Changes, What to Do?Anton Chuvakin
 
Meet the Ghost of SecOps Future by Anton Chuvakin
Meet the Ghost of SecOps Future by Anton ChuvakinMeet the Ghost of SecOps Future by Anton Chuvakin
Meet the Ghost of SecOps Future by Anton ChuvakinAnton Chuvakin
 
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...Anton Chuvakin
 
SOC Lessons from DevOps and SRE by Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton ChuvakinSOC Lessons from DevOps and SRE by Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton ChuvakinAnton Chuvakin
 
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 BoothHey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 BoothAnton Chuvakin
 
20 Years of SIEM - SANS Webinar 2022
20 Years of SIEM - SANS Webinar 202220 Years of SIEM - SANS Webinar 2022
20 Years of SIEM - SANS Webinar 2022Anton Chuvakin
 
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton ChuvakinAnton Chuvakin
 
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2020  Groovy SOC Tunes aka Modern SOC TrendsSOCstock 2020  Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2020 Groovy SOC Tunes aka Modern SOC TrendsAnton Chuvakin
 
SOCstock 2021 The Cloud-native SOC
SOCstock 2021 The Cloud-native SOC SOCstock 2021 The Cloud-native SOC
SOCstock 2021 The Cloud-native SOC Anton Chuvakin
 
Modern SOC Trends 2020
Modern SOC Trends 2020Modern SOC Trends 2020
Modern SOC Trends 2020Anton Chuvakin
 
Anton's 2020 SIEM Best and Worst Practices - in Brief
Anton's 2020 SIEM Best and Worst Practices - in BriefAnton's 2020 SIEM Best and Worst Practices - in Brief
Anton's 2020 SIEM Best and Worst Practices - in BriefAnton Chuvakin
 
Five SIEM Futures (2012)
Five SIEM Futures (2012)Five SIEM Futures (2012)
Five SIEM Futures (2012)Anton Chuvakin
 
RSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics PresentationRSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics PresentationAnton Chuvakin
 
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton ChuvakinPractical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton ChuvakinAnton Chuvakin
 
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton ChuvakinLog management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton ChuvakinAnton Chuvakin
 
On Content-Aware SIEM by Dr. Anton Chuvakin
On Content-Aware SIEM by Dr. Anton ChuvakinOn Content-Aware SIEM by Dr. Anton Chuvakin
On Content-Aware SIEM by Dr. Anton ChuvakinAnton Chuvakin
 
PCI 2.0 What's Next for PCI DSS by Dr. Anton Chuvakin
PCI 2.0 What's Next for PCI DSS  by Dr. Anton ChuvakinPCI 2.0 What's Next for PCI DSS  by Dr. Anton Chuvakin
PCI 2.0 What's Next for PCI DSS by Dr. Anton ChuvakinAnton Chuvakin
 

More from Anton Chuvakin (20)

Future of SOC: More Security, Less Operations
Future of SOC: More Security, Less OperationsFuture of SOC: More Security, Less Operations
Future of SOC: More Security, Less Operations
 
SOC Meets Cloud: What Breaks, What Changes, What to Do?
SOC Meets Cloud: What Breaks, What Changes, What to Do?SOC Meets Cloud: What Breaks, What Changes, What to Do?
SOC Meets Cloud: What Breaks, What Changes, What to Do?
 
Meet the Ghost of SecOps Future by Anton Chuvakin
Meet the Ghost of SecOps Future by Anton ChuvakinMeet the Ghost of SecOps Future by Anton Chuvakin
Meet the Ghost of SecOps Future by Anton Chuvakin
 
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
 
SOC Lessons from DevOps and SRE by Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton ChuvakinSOC Lessons from DevOps and SRE by Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton Chuvakin
 
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 BoothHey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
 
20 Years of SIEM - SANS Webinar 2022
20 Years of SIEM - SANS Webinar 202220 Years of SIEM - SANS Webinar 2022
20 Years of SIEM - SANS Webinar 2022
 
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
 
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2020  Groovy SOC Tunes aka Modern SOC TrendsSOCstock 2020  Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
 
SOCstock 2021 The Cloud-native SOC
SOCstock 2021 The Cloud-native SOC SOCstock 2021 The Cloud-native SOC
SOCstock 2021 The Cloud-native SOC
 
Modern SOC Trends 2020
Modern SOC Trends 2020Modern SOC Trends 2020
Modern SOC Trends 2020
 
Anton's 2020 SIEM Best and Worst Practices - in Brief
Anton's 2020 SIEM Best and Worst Practices - in BriefAnton's 2020 SIEM Best and Worst Practices - in Brief
Anton's 2020 SIEM Best and Worst Practices - in Brief
 
Generic siem how_2017
Generic siem how_2017Generic siem how_2017
Generic siem how_2017
 
Tips on SIEM Ops 2015
Tips on SIEM Ops 2015Tips on SIEM Ops 2015
Tips on SIEM Ops 2015
 
Five SIEM Futures (2012)
Five SIEM Futures (2012)Five SIEM Futures (2012)
Five SIEM Futures (2012)
 
RSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics PresentationRSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics Presentation
 
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton ChuvakinPractical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
 
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton ChuvakinLog management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
 
On Content-Aware SIEM by Dr. Anton Chuvakin
On Content-Aware SIEM by Dr. Anton ChuvakinOn Content-Aware SIEM by Dr. Anton Chuvakin
On Content-Aware SIEM by Dr. Anton Chuvakin
 
PCI 2.0 What's Next for PCI DSS by Dr. Anton Chuvakin
PCI 2.0 What's Next for PCI DSS  by Dr. Anton ChuvakinPCI 2.0 What's Next for PCI DSS  by Dr. Anton Chuvakin
PCI 2.0 What's Next for PCI DSS by Dr. Anton Chuvakin
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 

Got SIEM? Now what? Getting SIEM Work For You

  • 1. Got SIEM? Now what? Making SIEM work for you Dr. Anton Chuvakin Security Warrior Consulting www.securitywarriorconsulting.com SANS @ Night, San Francisco 2010
  • 2. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin Outline • Brief: What is SIEM/LM? • “You got it!” • SIEM Pitfalls and Challenges • Useful SIEM Practices – From Deployment Onwards • SIEM “Worst Practices” • Secret to SIEM Magic! • Conclusions
  • 3. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin About Anton • Former employee of SIEM and log management vendors • Now consulting for SIEM vendors and SIEM users • SANS class author (SEC434 Log Management) • Author, speaker, blogger, podcaster (on logs, naturally )
  • 4. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin SIEM? Security Information and Event Management! (sometimes: SIM or SEM)
  • 6. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin SIEM and Log Management • SIEM: Security Information and Event Management • Focus on security use of logs and other data LM: Log Management Focus on all uses for logs
  • 7. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin Why SO many people think that “SIEM sucks?”
  • 8. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin SIEM Evolution • 1997-2002 IDS and Firewall – Worms, alert overflow, etc – Sold as “SOC in the box” • 2003 – 2007 Above + Server + Context – PCI DSS, SOX, users – Sold as “SOC in the box”++ • 2008+ Above + Applications + … – Fraud, activities, cybercrime – Sold as “SOC in the box”+++++
  • 9. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin What SIEM MUST Have? 1. Log and Context Data Collection 2. Normalization and categorization 3. Correlation (“SEM”) 4. Notification/alerting (“SEM”) 5. Prioritization (“SEM”) 6. Dashboards and visualization 7. Reporting and report delivery (“SIM”) 8. Security role workflow (IR, SOC, etc)
  • 10. What SIEM Eats: Logs <122> Mar 4 09:23:15 localhost sshd[27577]: Accepted password for anton from ::ffff:192.168.138.35 port 2895 ssh2 <13> Fri Mar 17 14:29:38 2006 680 Security SYSTEM User Failure Audit ENTERPRISE Account Logon Logon attempt by: MICROSOFT_AUTHENTICATION_PACKAGE_V1_0 Logon account: ANTON Source Workstation: ENTERPRISE Error Code: 0xC000006 A 4574 <57> Dec 25 00:04:32:%SEC_LOGIN-5- LOGIN_SUCCESS:Login Success [user:anton] [Source:10.4.2.11] [localport:23] at 20:55:40 UTC Fri Feb 28 2006 <18> Dec 17 15:45:57 10.14.93.7 ns5xp: NetScreen device_id=ns5xp system- warning-00515: Admin User anton has logged on via Telnet from 10.14.98.55:39073 (2002-12-17 15:50:53)
  • 11. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin What SIEM Eats: Context http://chuvakin.blogspot.com/2010/01/on-log-context.html
  • 12. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin Just What Is “Correlation”? • Dictionary: “establishing relationships” • SIEM: “relate events together for security benefit” • Why correlate events? • Automated cross-device data analysis! • Simple correlation rule: • If this, followed by that, take some action
  • 13. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin Popular #SIEM_FAIL … in partial answer to “why people think SIEM sucks?” 1. Misplaced expectations (“SOC-in-a-box”) 2. Missing requirements (“SIEM…huh?”) 3. Missed project sizing 4. Political challenges with integration 5. Lack of commitment 6. Vendor deception (*) 7. And only then: product not working 
  • 14. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin Big 3 for SIEM/LM Compliance Security SIEM LM Operations Compliance Security Ops
  • 15. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin In Reality … Compliance budget Security budget
  • 16. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin SIEM Planning Areas 1.Goals and requirements 2.Functionality / features 3.Scoping of data collection 4.Sizing 5.Architecting … in THAT order!
  • 17. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin What is a “Best Practice”? • A process or practice that –The leaders in the field are doing today –Generally leads to useful results with cost effectiveness P.S. If you still hate it – say “useful practices”
  • 18. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin BP1 LM before SIEM! If you remember one thing from this, let it be: Deploy Log Management BEFORE SIEM! Q: Why do you think MOST 1990s SIEM deployments FAILED? A: There was no log management! SEM alone is just not that useful…
  • 19. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin Graduating from LM to SIEM Are you ready? Well, do you have… 1. Response capability – Prepared to response to alerts 2. Monitoring capability – Has an operational process to monitor 3. Tuning and customization ability – Can customize the tools and content
  • 21. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin BP2 Evolving to SIEM Steps of a journey … • Establish response process • Deploy a SIEM • Think “use cases” • Start filtering logs from LM to SIEM – Phases! • Prepare for the initial increase in workload
  • 22. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin Example LM->SIEM Filtering 3D: Devices / Network topology / Events • Devices: NIDS/NIPS, WAF, servers • Network: DMZ, payment network (PCI scope), other “key domains” • Events: authentication, outbound firewall access Later: proxies, more firewall data, web servers
  • 23. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin “Complianc-y” Approach to SIEM 1. List regulations 2. Identify other “use cases” 3. Review whether SIEM/LM is needed 4. Map features to controls 5. Select and deploy 6. Operationalize regulations 7. Expand use
  • 24. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin “Quick Wins” for Phased Approach Phased approach #1 • Collect problems • Plan architecture • Start collecting • Start reviewing • Solve problem 1 • Solve problem n Phased approach #2 • Focus on 1 problem • Plan architecture • Start collecting • Start reviewing • Solve problem 1 • Plan again
  • 25. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin BP3 SIEM First Steps First step = BABY steps! • Compliance monitoring • “Traditional” SIEM uses – Authentication tracking – IPS/IDS + firewall correlation – Web application hacking • Simple use cases – based on your risks What problems do YOU want solved?
  • 26. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin Example SIEM Use Case Cross-system authentication tracking • Scope: all systems with authentication (!) • Purpose: detect unauthorized access to systems • Method: track login failures and successes • Rule details: multiple login failures followed by login success • Response plan: user account investigation, suspension, communication with suspect user
  • 27. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin 10 minutes or 10 months? Our log management appliance can be racked, configured and collecting logs in 10 minutes A typical large customer takes 10 months to deploy a log management architecture based on our technology ?
  • 28. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin Secret to SIEM Magic! “Operationalizing” SIEM (e.g. SOC building) Deployment Service SIEM Software/Appliance
  • 29. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin Ultimate SIEM Usage Scenarios 1. Security Operations Center (SOC) – RT views, analysts 24/7, chase alerts 2. Mini-SOC / “morning after” – Delayed views, analysts 1/24, review and drill-down 3. “Automated SOC” / alert + investigate – Configure and forget, investigate alerts 4. Compliance status reporting – Review reports/views weekly/monthly
  • 30. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin What is a “Worst Practice”? • As opposed to the “best practice” it is … –What the losers in the field are doing today –A practice that generally leads to disastrous results, despite its popularity
  • 31. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin WP for SIEM Project scope • WP1: Postpone scope until after the purchase – “The vendor says ‘it scales’ so we will just feed ALL our logs” – Windows, Linux, i5/OS, OS/390, Cisco – send’em in! • WP2: Assume you will be the only user of the tool – “Steakholders”? What’s that?  – Common consequence: two or more simiilar tools are bought
  • 32. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin Case Study: “We Use’em All” At SANS Log Management Summit 200X… • Vendors X, Y and Z claim “Big Finance” as a customer • How can that be? • Well, different teams purchased different products … • About $2.3m wasted on tools that do the same!
  • 33. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin WPs for Deployment • WP3: Expect The Vendor To Write Your Logging Policy OR Ignore Vendor Recommendations – “Tell us what we need – tell us what you have” forever… • WP4: Unpack the boxes and go! – “Coordinating with network and system folks is for cowards!” – Do you know why LM projects take months sometimes? • WP5: Don’t prepare the infrastructure – “Time synchronization? Pah, who needs it” • WP6: Deploy Everywhere At Once – “We need it everywhere!! Now!!”
  • 34. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin Case Study: Shelfware Forever! • Financial company gets a SIEM tool after many months of “evaluations” • Vendor SEs deploy it • One year passes by • A new CSO comes in; looks for what is deployed • Finds a SIEM tool – which database contains exactly 53 log records (!) – It was never connected to a production network…
  • 35. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin WPs for Expanding Deployment • WP7: Don’t Bother With A Product Owner – “We all use it – we all run it (=nobody does)” • WP8: Don’t Check For Changed Needs – Just Buy More of the Same – “We made the decision – why fuss over it?” • WP9: If it works for 10, it will be OK for 10,000 – “1,10,100, …, 1 trillion – they are just numbers”
  • 36. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin Case Study: Today - Datacenter, Tomorrow … Oops! • Log management tool is tested and deployed at two datacenters – with great success! • PCI DSS comes in; scope is expanded to wireless systems and POS branch servers • The tool is prepared to be deployed in 410 (!) more locations • “Do you think it will work?” - “Suuuuure!”, says the vendor • Security director resigns …
  • 37. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin More Quick SIEM Tips Cost countless sleepless night and boatloads of pain…. • No SIEM before IR plans/procedures • No SIEM before basic log management • Think "quick wins", not "OMG ...that SIEM boondoggle" • Tech matters! But practices matter more • Things will get worse before better. Invest time before collecting value!
  • 38. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin SIEM Resourcing Voodoo “Things get worse before they get better” • Hardware – initial + growth • Software license fees (CPU, device, EPS, user, etc, etc) • Support and integration projects • Operations Personnel (analysts, developer) • SIEM Administrator Personnel (SA, DBA, application admin)
  • 39. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin Conclusions • SIEM will work and has value … but BOTH initial and ongoing time/focus commitment is required • FOCUS on what problems you are trying to solve with SIEM: requirements! • Phased approach WITH “quick wins” is the easiest way to go • Operationalize!!!
  • 40. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin And If You Only … … learn one thing from this…. … then let it be….
  • 41. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements! Requirements Requirements Requirements Requirements Requirvements Requirements
  • 42. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin Questions? Dr. Anton Chuvakin Email: anton@chuvakin.org Site: http://www.chuvakin.org Blog: http://www.securitywarrior.org Twitter: @anton_chuvakin Consulting: http://www.securitywarriorconsulting.com
  • 43. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin More Resources • Blog: www.securitywarrior.org • Podcast: look for “LogChat” on iTunes • Slides: http://www.slideshare.net/anton_chuvakin • Papers: www.info-secure.org and http://www.docstoc.com/profile/anton1chuvakin • Consulting: http://www.securitywarriorconsulting.com/
  • 44. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin More on Anton • Consultant: http://www.securitywarriorconsulting.com • Book author: “Security Warrior”, “PCI Compliance”, “Information Security Management Handbook”, “Know Your Enemy II”, “Hacker’s Challenge 3”, etc • Conference speaker: SANS, FIRST, GFIRST, ISSA, CSI, RSA, Interop, many, many others worldwide • Standard developer: CEE, CVSS, OVAL, etc • Community role: SANS, Honeynet Project, WASC, CSI, ISSA, OSSTMM, InfraGard, ISSA, others • Past roles: Researcher, Security Analyst, Strategist, Evangelist, Product Manager
  • 45. Security Warrior Consulting www.securitywarriorconsulting.com Dr. Anton Chuvakin Security Warrior Consulting Services • Logging and log management strategy, procedures and practices – Develop logging policies and processes, log review procedures, workflows and periodic tasks as well as help architect those to solve organization problems – Plan and implement log management architecture to support your business cases; develop specific components such as log data collection, filtering, aggregation, retention, log source configuration as well as reporting, review and validation – Customize industry “best practices” related to logging and log review to fit your environment, help link these practices to business services and regulations – Help integrate logging tools and processes into IT and business operations • SIEM and log management content development – Develop correlation rules, reports and other content to make your SIEM and log management product more useful to you and more applicable to your risk profile and compliance needs – Create and refine policies, procedures and operational practices for logging and log management to satisfy requirements of PCI DSS, HIPAA, NERC, FISMA and other regulations More at www.SecurityWarriorConsulting.com

Editor's Notes

  1. Got SIEM? Now what? Making SIEM work for you!Anton Chuvakin, Ph.D- Tuesday, November 9 - 7:00pm - 8:00pmSecurity Information and Event Management (SIEM) as well as log management tools have become more common across large organizations in recent years. SIEM and log management have also been a topic of hot debates. In fact, you organization might have purchased these tools already. However, many who acquired SIEM tools have realized that they are not ready to use many of the advanced correlation features, despite promises that &quot;they are easy to use.&quot; So, what should you do to achieve success with SIEM? What logs should you collect? Correlate? Review? How do you use log management as a step before SIEM? What process absolutely must be built before SIEM purchase becomes successful. Attend this session to learn from the experience of those who did not have the benefit of learning from other&apos;s mistakes. Also, learn a few tips on how to &quot;operationalize&quot; that SIEM purchase you&apos;ve made.============Only so much advice without knowing your environment/needs$10k consulting project CAN save $500k SIEM budget …Assumed in-sourced SIEM, no cloud, MSSP, co-sourcing, outsourcing, etc
  2. Does everybody need a SIEM?Do you need a SIEM?Are you ready for SIEM?Do you want a SIEM?
  3. CISO thinks that SIEM opportunity cost is too big; spend $100k on SIEM vs spend $100k to solve a dozen problems
  4. No problem is truly solved!!
  5. What is correlation? Different definitions given by different people.Dictionary: “establishing relationships”Why correlate events?Cross-device data analysisWhat else one might want to correlate?Events and …
  6. Buy correlation blog posts http://chuvakin.blogspot.com/search/label/SIEM(*) rarely just a vendor: “there is a sucker born every minute”
  7. Another way to decide is to look at what problem you’re trying to solve with the tool. Over the years, the following areas where SIEM and log management tools can deliver value have emerged: Security, detective, and investigative: sometimes also called threat management, this focuses on detecting and responding to attacks, malware infection, data theft and other security issues. It is very useful to see this as two separate factors: monitoring and detection of security issues vs investigation and forensic analysis of security incidents.Compliance, regulatory (global) and policy (local): this focuses on satisfying the requirement of various laws, mandates and frameworks. Most of the mandates have the intention of helping you improve security, so there is a lot of overlap between this and the previous item.Operational, system and network troubleshooting and administration: specific mostly to log management, this use case has to do with investigating system problems as well as monitoring the availability of systems and applications.
  8. Deploy – use - operationalize – get comfortable with!
  9. Organizations that graduate too soon will waste time and effort, and won&apos;t any increased efficiency in their security operation. However, waiting too long also means that the organization will never develop the necessary capabilities to secure themselves. In brief, the criteria are:Response capability: the organization must be ready to respond to alerts soon after they are produced.Monitoring capability: the organization must have or start to build security monitoring capability such as a Security Operation Center (SOC) or at least a team dedicated to ongoing periodic monitoring.Tuning and customization ability: the organization must accept the responsibility for tuning and customizing the deployed SIEM tool. Out-of-the-box SIEM deployments rarely succeed, or manage to reach their full potential. Just like college…  Graduation tips:Satisfy the graduation criteriaUse a LM vendors that has a good SIEMDeploy LM and use it operationallyPeriodic log reviews = first step to monitoringLook for integrated capability
  10. First, compile a list of regulations that you have to comply with, focus in particular attention to areas where a SIEM or log management tool can be useful. In many cases, the list will contain only one regulation – but the one you absolutely must handle. Next, if possible, review other possible goals that SIEM can help you achieve. Deciding whether SIEM satisfies a critical business need – such as by as an enabling technology for your SOC– is an essential step.  Third, at this point you must decide whether you are prepared to work to make SIEM solve your problem – whether compliance or other. Despite help from the vendor and possibly consultants, there are areas where you have to work to make SIEM work. Now, acquire and implement the SIEM solution. This is where you work jointly with the vendor in order to build your initial implementation for regulatory compliance, such as PCI DSS.Now, start actually using SIEM for both “letter and spirit “ of the regulation. This is the most important step in the approach – one of the biggest mistakes organizations make in this area is thinking that simply owning a SIEM tool makes them compliant. In reality, building daily operational procedures and processes to go with your SIEM is the only way to do that. Sadly, few people remember that PCI DSS prescribes a large set of periodic tasks, from annual to daily (log review being the most well-known example of a daily practice) and not just “having logs.” Finally, expand the use case to beyond compliance. Only at this step you can plan for expanding deployment and solving other problems. The tips for that are provided in the next section. One way to quickly grow your security capability is on the incident response side. This is due to the fact that the easiest and most common security use for log management and SIEM tools - beyond compliance - is related to incident response and forensics.
  11. Consulting Servicesfocused on security product strategy, SIEM / log management as well as PCI DSS and other regulatory compliance (details [PDF] )Technology Vendor ServicesThis section of the services is intended for security vendors and security services providers. The focus is on security and compliance strategy for product planning, development and marketing as well as on content development. Product management and strategyReview security product compliance strategy, PCI DSS strategy and optimize them for the marketPerform market assessment and analysis, competitive analysis, product strategy (build/buy/partner); prepare Market Requirements Documents (MRDs)Help develop and refine security product marketing and positioning messages, focused on compliance and new threatsAugment internal Product Management staff for strategic security and compliance projects, use case analysis, product definition, Product Requirement Documents (PRD) developmentWork with product management team to help define and prioritize product features based on market feedback and compliance requirements.Research and content developmentLead content development for whitepapers, &quot;thought leadership&quot;; documents, research papers and other messaging documents, related to security and regulatory compliance (example whitepaper, recent book on PCI DSS)Review security and compliance marketing materials, site contents and other public- or partner-facing materialsCreate correlation rules, reports as well as policies and procedures and other operational content to make SIEM and log management products more useful to your customersMap regulatory compliance controls such as PCI DSS (key focus!), HIPAA, NERC, FISMA, NIST, ISO, ITIL to security product features and document the use of the product in support of the mandatesDevelop compliance content such as reports, correlation rules, queries and other relevant compliance content for security product.Events and webinarsPrepare and conduct thought leadership webinars, seminars and other events on PCI DSS, log management, SIEM and other security topics (example webinar).TrainingPrepare and conduct customized training on log management, log review processes, logging &quot;best practices,&quot; PCI DSS for customers and partners (example training class).Develop advanced training on effective operation and tuning of SIEM and log management tools to complement basic training.End-user Organization / Enterprise ServicesThis section of services menu applies to end-user organizations. The main theme is related to planning and implementing logging, log management and SIEM / SIM / SEM for security and compliance. Log management and Security Information and Event Management (SIEM) product selection - how to pick the right SIEM and logging product?Develop log management or SIEM product selection criteria (related writing)Identify key use cases aligning log management and SIEM tools with business, compliance and security requirementsPrepare RFP documents for SIEM, SEM, SIM or log managementAssist with analyzing RFP responses from SIEM and log management vendorsEvaluate and test log management and SIEM products together with internal IT security teamAdvise on final product selectionLogging and log management policyLogging and log management policy - how to develop the right logging policy? What to log?Develop logging policies and processes for servers and applications , log review procedures, workflows and periodic tasks as well as help architect those to solve organization problemsInterpret regulations and create specific and actionable logging system settings , processes and log review procedures (example: what to log for PCI DSS?)Plan and implement log management architecture to support your business cases; develop specific components such as log data collection, filtering, aggregation, retention, log source configuration as well as reporting, review and validationCustomize industry &quot;best practices&quot; related to logging and log review to fit your environment, help link these practices to business services and regulations (example)Help integrate logging tools and processes into IT and business operationsSIEM and log management product operation optimization - how to get more value out of the tools available?Clarify security, compliance and operational requirementsTune and customize SIEM and log management tools based on requirementsContent developmentDevelop correlation rules, reports and other content to make your SIEM and log management product more useful to you and more applicable to your risk profile and compliance needsCreate and refine policies, procedures and operational practices for logging and log management to satisfy requirements of PCI DSS, HIPAA, NERC, FISMA and other regulationsTraining - how to get your engineers to use the tools best?Provide the customized training on the tools and practices of log management for compliance, IT operations, or security needs (example training conducted)Develop training on effective operation and tuning of SIEM and log management tools to complement basic vendor training.Incident response artifact analysisAnalyze logs and other evidence collected during security incident response