Deploying Security Analytics Tips & Tricks to Achieve Ludicrous Speed Guy Bruneau, GSE

Similar documents
SIEM Product Comparison

<Partner Name> RSA NETWITNESS Security Operations Implementation Guide. Swimlane 2.x. <Partner Product>

<Partner Name> <Partner Product> RSA NETWITNESS Logs Implementation Guide. Exabeam User Behavior Analytics 3.0

THE RSA SUITE NETWITNESS REINVENT YOUR SIEM. Presented by: Walter Abeson

<Partner Name> RSA NETWITNESS Logs Implementation Guide. Claroty Platform 2.1. <Partner Product>

NetWitness NextGen and Palo Alto Networks Integration Guide. NetWitness Corporation

<Partner Name> <Partner Product> RSA NETWITNESS Security Operations Implementation Guide. Gurucul Risk Analytics

<Partner Name> RSA NETWITNESS Intel Feeds Implementation Guide. Kaspersky Threat Feed Service. <Partner Product>

<Partner Name> RSA NETWITNESS Intel Feeds Implementation Guide. Anomali STAXX 3.0. <Partner Product>

<Partner Name> <Partner Product> RSA NETWITNESS Logs Implementation Guide. Skyhigh Networks Skyhigh 3.3.3

CNIT 121: Computer Forensics. 9 Network Evidence

Network Intrusion Analysis (Hands on)

The Future of Threat Prevention

RSA Ready Implementation Guide for

IBM QRadar Integration

<Partner Name> <Partner Product> RSA NETWITNESS Logs Implementation Guide. Preempt Security Preempt Behavioral Firewall 2.2

TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE. Ralf Kaltenbach, Regional Director RSA Germany

<Partner Name> RSA NETWITNESS Logs Implementation Guide. BluVector Cortex 3.1. <Partner Product>

Computer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition. Chapter 2 Investigating Network Traffic

NetWitness Overview. Copyright 2011 EMC Corporation. All rights reserved.

Göran Pestana. Incident handler and developer

Key Technologies for Security Operations. Copyright 2014 EMC Corporation. All rights reserved.

Top 10 use cases of HP ArcSight Logger

RSA INCIDENT RESPONSE SERVICES

Compare Security Analytics Solutions

<Partner Name> <Partner Product> NETWITNESS Logs Implementation Guide. Imperva Counter Breach 11.5

RSA INCIDENT RESPONSE SERVICES

Self-driving Datacenter: Analytics

Seceon s Open Threat Management software

RSA NetWitness Logs. Juniper Networks NetScreen-Security Manager Last Modified: Thursday, May 25, Event Source Log Configuration Guide

As for the requirement of having a USB 3.0 port, you will come to know the reason in the next section.

Cisco Tetration Analytics

RSA NetWitness Platform

Pass4sure q. Cisco Securing Cisco Networks with Sourcefire IPS

<Partner Name> RSA NETWITNESS Security Operations Implementation Guide. Secdo Platform. <Partner Product>

RSA NetWitness Platform

Cb Response Interoperability

Cisco Tetration Analytics

HP Enterprise Security October 9, 2013

RSA NetWitness Platform

Network Security Monitoring (NSM) Using

RSA Ready Implementation Guide for

RSA NetWitness Logs. IBM WebSphere DataPower. Event Source Log Configuration Guide. Last Modified: Friday, January 5, 2018

UDP Encapsulation in Linux netdev0.1 Conference February 16, Tom Herbert

Virtualization Practices:

Certified Snort Professional VS-1148

Avoiding Information Overload: Automated Data Processing with n6

RSA NetWitness Logs. Symantec DLP Last Modified: Thursday, April 12, Event Source Log Configuration Guide

Forensic Network Analysis in the Time of APTs

RSA NetWitness Platform

<Partner Name> <Partner Product> RSA NETWITNESS Logs Implementation Guide. PAS Global, LLC ICS 5.5

Security Information Managers: State of the Art. Joel M Snyder Senior Partner Opus One

Developing Microsoft Azure Solutions (70-532) Syllabus

VARONIS DATALERT APP FOR IBM QRADAR

XGS & QRadar Integration

Enriching and Automating Fraud Response with HP ArcSight ESM

Sharing is Caring: Improving Detection with Sigma

RSA NetWitness Suite Respond in Minutes, Not Months

Features. HDX WAN optimization. QoS

Configuring Antivirus Devices

Symantec Ransomware Protection

RSA Ready Implementation Guide for

Sharedien. Everything you need to know. Simply find it. sharedien.com. sharedien.com

ArcSight Activate Framework

Hardware-Accelerated Flexible Flow Measurement

RSA NetWitness Platform

Hands-On Hacking Techniques 101

Using the SDACK Architecture to Build a Big Data Product. Yu-hsin Yeh (Evans Ye) Apache Big Data NA 2016 Vancouver

Digital Forensics Practicum CAINE 8.0. Review and User s Guide

McAfee Network Security Platform 9.1

HP Instant Support Enterprise Edition (ISEE) Security overview

Security. Risk Management. Compliance.

Aruba Networks Mobility Controller

Developing Microsoft Azure Solutions (70-532) Syllabus

Network Security Monitoring with Flow Data

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski

IBM Security QRadar Deployment Intelligence app IBM

Novetta Cyber Analytics

RSA NetWitness Logs. Trend Micro OfficeScan and Control Manager. Event Source Log Configuration Guide. Last Modified: Thursday, November 30, 2017

Common Event Format Configuration Guide. NIKSUN NetDetector-NetVCR Date: Wednesday, May 30, 2012

Emerging Threat Intelligence using IDS/IPS. Chris Arman Kiloyan

RSA NetWitness Platform

So What is WireShark?

RSA NetWitness Logs. Citrix Access Gateway Last Modified: Thursday, May 11, Event Source Log Configuration Guide

Lab 4: Network Packet Capture and Analysis using Wireshark

CIS Controls Measures and Metrics for Version 7

CIS Controls Measures and Metrics for Version 7

Rethinking Security: The Need For A Security Delivery Platform

IBM Security QRadar SIEM Version Getting Started Guide

RSA NetWitness Logs. F5 Big-IP Application Security Manager. Event Source Log Configuration Guide. Last Modified: Friday, May 12, 2017

RSA NetWitness Logs. Cisco Adaptive Security Appliance Last Modified: Wednesday, November 8, Event Source Log Configuration Guide

SIEM Tool Plugin Installation and Administration

Access Control Rules: Realms and Users

Advanced Computer Networking. CYBR 230 Jeff Shafer University of the Pacific. Project 2

RSA NetWitness Logs. DenyAll Web Application Firewall. Event Source Log Configuration Guide. Last Modified: Thursday, November 2, 2017

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

Noam Ikar R&DVP. Complex Event Processing and Situational Awareness in the Digital Age

Virtualization Practices: Providing a Complete Virtual Solution in a Box

Inline Normalization with Snort 2.9.0

McAfee Network Security Platform

Transcription:

Deploying Security Analytics Tips & Tricks to Achieve Ludicrous Speed Guy Bruneau, GSE 1

About Me Senior Security Consultant @IPSS Inc. Incident Handler @Incident Storm Center gbruneau@isc.sans.edu Experience: NetWitness 8.x to SA 10.3x Deployment: Medium to large networks Twitter: @GuyBruneau 2

Overview Why use Security Analytics? Network Forensics Objectives And Tips First Things First Pre-deployment Decisions Tuning SA Backing Up SA Automation With nwconsole And Malware Analysis Remote Logging 3

Network Forensics Objectives in SA The Goal Is To Provide Information For Response What, When, Where, How, And Possibly Who/Why Forensics Is All About Meta Creating, Querying, And Reporting Keep Only Forensically Sound Meta For Analysis Query Response Slows Down A Lot 4

Network Forensics Tips In SA First, Appliances Time Must Be Accurate Identify What Meta Can Be Stitched Together To Answer Basic To Complex Questions Example: alias.host = adobe.flash-player-v12.com && directory = /update && filename = exe.exe 5

First Things First Retention - How Long Do You Want (Need) Data? Packet And Meta Retention May Be Different Capture Speed And Length Under 1 GB Default Interface Is Good > 1 GB+ Must Use A 10 GB Card Test The Decoder Interface Capture Length root@decoder:~# tcpdump -ni eth1 'len >=1514' Retention + Speed Determine Number Of Decoders And Concentrators 6

Network Forensics Deployment Models Basic Setup 1 Broker 1 Concentrator 1 Decoder 1+ DAC Optional Malware Analysis Visualize Complex Setup 1 Broker 1 or More Concentrators 2+ Decoders Multiple DAC 1 Malware Analysis Visualize (optional) 7

Tuning SA - Offloading TCP Offloading And Network Capture Effects Can Be Significant Offload Processing Of The Entire TCP/IP Stack To The NIC Used Primarily With High-speed Network Interfaces (Gigabit & 10 Gigabit Ethernet Controller) ethtool -k eth(1-5) To Check Card Status Recommended 1 GB Card Configuration /etc/init.d/rc.local /usr/sbin/ethtool -K eth1 gso off /usr/sbin/ethtool -K eth1 gro off 8

Tuning SA - Network Model Tuning The Network Model Is Worth The Effort Identify IP Ranges And Names Categorize & Prioritize Business Assets and Networks Create Metadata Feeds Identify Which Networks Should Never Exchange Data Track Anomalies Generate Automated Reports Or Notifications <key description="network Name" format="text" level="indexkeys" name="netname"/> 9

Tuning SA - Index Meta Not All Meta Is Indexed! streams = 1 Detect Portscan Activity tcp.flags Detect Inbound Backscatter Activity select ip.src where tcp.flags = 18 && streams =1 tcp.srcport and udp.srcport select ip.src where tcp.srcport = 0 tcp.srcport = 6000 && streams = 1 ASN = 872 Portscan By ASN Top 10 Target Ports select asn.src where streams = 1 then lookup_and_add ('tcp.dstport','asn.src',10) <key description="tcp Source Port" level="indexnone" name="tcp.srcport" /> 10

Tuning SA - Improve Decoder Performance Filter Packets (Proto 47, 50, 51) At The Decoder Unless You Have The Private Key; Keep Metadata And Truncate SSL Payload Turn Off Meta And Delete Non-used Parsers Use Custom Snort Rules When Needed Increase Decoder Kernel Cache Memory to 1GB /etc/sysctl.conf vm.min_free_kbytes = 1048576 11

Tuning SA - Parsers Affecting Performance Some Parsers Are Known To Affect Capture DNS, GeoIP, And Mail Evaluate These To Determine If You Have 100% Collection Mar 10 16:47:12 TDC-Decoder nw[2806]: [Parse] [warning] Parser ethernet_oui loaded without callbacks Mar 10 16:47:12 TDC-Decoder nw[2806]: [Parse] [warning] Parser spectrum_lua loaded without callbacks Mar 10 16:47:12 TDC-Decoder nw[2806]: [Parse] [warning] Parser TLD_lua loaded without callbacks 12

Backing Up SA Not Perfect But Worth Doing Copy These Configuration Folders/Files /etc/netwitness /etc/ntp.conf /etc/hosts /home/rsasoc -> Reports /var/lib/netwitness/uax -> Server Configuration 13

Automation With NwConsole Copy Binary From Decoder To A Workstation And Script Advanced Use Cases Automated File Carving Inbound Attachment Extraction Carve Session ID As pcap sdk open nw://admin:netwitness@192.168.25.50:50005 sdk output /home/executables sdk content session=now-u where="filetype=windows_executable" render=files includefiletypes=.exe maxdirsize=1000000 14

Automation With Malware Analysis Adjust Decoder And Malware Analysis Settings Tune In Decoder App Rules Process Just The Data You Want Analyzed Create A Feed With HP, Win Updates, etc To Remove Unwanted Files Move Files To This Directory /var/lib/rsamalware/spectrum/infectedzipwatch/pendingupload Create Hash Lists For Good & Bad In CSV Format /var/lib/rsamalware/spectrum/haswatch 15

Remote Logging Syslog RSA SA devices To A SIEM Of Your Choice Log Queries Executed By Users Monitor Device Status Including Collection Broker Reporting Engine - CEF Format To ArcSight CEF:0 NetWitness SA 10.3.2 ${name} ${name} 5 rt={#time:mmm dd yyyy HH:mm:ss} externalid={#sessionid} proto={#ip.proto} devicedirection=0 src={#ip.src} spt={#udp.srcport} shost={#alias.host} dst={#ip.dst} dpt={#udp.dstport} dvchost={#did} cat=/security 16

Summary Tune, Tune, Tune, Never Stop Tuning Forensics Is All About Meta Keep Only Forensically Sound Meta For Analysis Retention - How Long Do You Want (Need) Data? Categorize & Prioritize Business Assets and Networks Automate Tasks With NwConsole 17

THANK YOU