Bidvert-advert

Stay Update - ICT Security

Enter your email address:

We hate spam as much as you do and we will never sell, barter, or rent your email address to any unauthorized third party.

Most Frequently Used Software


CURL / XPertMailer / AutoBlogger / (Parser - PHP Simple HTML DOM)



mercoledì 25 aprile 2012

Some CISOs consider ripping out or augmenting outdated SIEM systems

Enterprises with older security information event management (SIEM) systems are taking a re-examination at their hardware, based on experts, and sometimes, businesses are mulling over

    SearchSecurity.com members gain immediate and unlimited access to breaking industry news, virus alerts, new hacker threats, highly focused security newsletters, and more -- all without charge. Join me on SearchSecurity.com today!

    Michael S. Mimoso, Editorial Director
< align='right' border='0' style='padding-left:10px;' border=0 > whether to enhance SIEM systems with additional tools, or rip-and-replace systems altogether.
They are at once attempting to justify the ongoing license renewal to get more value out of it for the needs of risk management and situational awareness.

Bill Sieglein, CEO, CISO Executive Network

Gregg Woodcock of communications services provider MetroPCS Wireless Inc., sees log correlation and analysis as a vital part of running an effective and secure business.

In fact, the Dallas-based software engineer sees most value in correlating and analyzing logs, he founded and chairs a Dallas-based user group dedicated to Splunk, a search tool that may soak up many varieties of log data, from customer transactions to network activity, and contact-record data, correlate it, and analyze it to find valuable intelligence. The tool has become so popular, consistent with Woodcock, that most of the members of the Splunk user group are at organizations that experience security information and event management (SIEM) systems in place, but are looking to use Splunk as a Google-type search bar to enhance them.

MetroPCS used Splunk to observe for terms-of-service violators of its free international phone calling plan. Woodcock said users were instantly ready to see where traffic was going and what kind of it was costing the corporate. People violating the terms of service for using the free international calling for business use, were detected quickly from the decision log data and were bring to an end before expenses got uncontrolled, Woodcock said.

“The amazing thing is the velocity at which it could actually do the things it does and the insight it provides to everyone who uses it,” Woodcock said. “It is in essence, Google on your logs; it ingests them in real-time and time stamps them after which it lets you do exactly about anything with it using a UNIX-like set of search commands.”

Splunk added support for security monitoring in 2010. It may well also generate alerts in real time. The undeniable fact that that is getting used by hundreds of folks to reinforce existing SIEM systems is an indication that many early SIEM deployments were either too complicated to configure correctly, or had too many constraints to get valuable intelligence from the system, Woodcock said. “With Splunk, you dump data in and impose ad hoc schemas at the data that will only be useful to you and go from sorting to look and it is a radical change,” he said. “With many other products you will have do development to have an information schema you could use.”

Currently, most SIEM systems are establish for his or her compliance and reporting capabilities, and many remain deployed to fulfill that minimum use case, said Bill Sieglein, CEO on the CISO Executive Network. Sieglein recently completed a sequence of roundtable sessions with Fortune 1000 CISOs on security operations, including log management and SIEM. He said many CISOs are wondering even if to tear and replace their outdated SIEM systems with newer SIEM technology to create an intelligence platform.

“In almost every case, the implementations were longer and dearer than they originally anticipated,” Sieglein said. “They are right this moment looking to justify the continuing license renewal to get more value out of it for the needs of risk management and situational awareness.”

Early SIEM implementations were cumbersome to deploy, and took two to a few years from time to time with three quarters of the price going to professional services for deployment assistance, Sieglein said. Today, more lightweight systems are being considered â€" SIEM platforms from McAfee (NitroSecurity), IBM (Q1 Labs) and LogRhythm, which promise faster implementations and more out-of-the-box automation, Sieglein said.

For organizations that made a considerable investment in SIEM, many are sharing stories about how difficult the adventure have been, Sieglein said. For businesses devoted to reviewing logs, it took a number of staff not to only anticipate events, but in addition to cope the system so it is not overwhelmed by the log data. The system needed to be kept fully patched and someone had to know how to do specialized reporting that will get value out of the system.

“There were complaints that SIEM 1.0 requires loads of babysitting just from a systems perspective,” Sieglein said. “It didn't allow for resources to be devoted to gazing the glass and watching events. Now SIEM 2.0 promises faster implementation, a great deal less system management where resources and time might possibly be devoted to using the analytics and in fact taking action based at the forms of alerts that they're seeing.”

Chris Petersen, co-founder and CTO of LogRhythm agrees that early implementations were sometimes nightmarish to deploy and maintain, and sometimes were left running in a poorly configured state to meet a particular compliance mandate.

SIEM was initially designed to unravel the big amounts of knowledge generated by intrusion defense systems by trimming the IDS data all the way down to something that was more manageable and actionable, Petersen said. SIEM vendors made it more complicated by adding a fuller spectrum of log data from the network layer, the device layer and the applying and database layers. The focal point now could be to better manage the info sources and automate the analysis. “The goal today is to detect a broader class of events from insider threats, sophisticated intrusions and deeply embedded breaches by making that forensic layer immediately accessible,” Petersen said.

SIEM vendors have learned that it isn't feasible to expect companies to do manual log analysis, he said.

“Nobody has the easiest solution; these are complex problems,” Petersen said. “What we do have today is additional information to observe than we've ever had before. If we will analyze it correctly and creatively via different techniques… we put the intelligence into the system to indicate customers to places to move investigate and feature an intensive experience to quickly arrive at a conclusion and plan of action.”

To get something out of a device you should invest time, money and effort into people.

Bill Bradd, assistant division chief for the Office of Technical Security of Information Security, the U.S. Census Bureau

The late Eugene Schultz, a noted network security expert, warned in 2009 that SIEM vendors needed to address the complexity of installing SIEM. Schultz, a strong believer in the merits of SIEM technology, said “the availability of good technology is by no means any guarantee that people will buy it.” Most SIEM products require months of tuning after the initial installation, he wrote in a blog entry on why the SIEM market isn't doing better. “One well-selling SIEM tool can require the installation and maintenance of four separate machines on the network and has so many functions that many levels of menu traversal are required to get to some of the most basic functions. Troubleshooting SIEM tools is generally no picnic, either,” he wrote.

Organizations considering a broad SIEM deployment need to have the ability to conduct a robust test and evaluation process of SIEM products, said Bill Bradd, assistant division chief for the Office of Technical Security of Information Security at the U.S. Census Bureau. It's an investment in technology, but also people knowledgeable in maintaining and monitoring the system, Bradd said.

The U.S. Census Bureau has been building out the capabilities of its Sensage SIEM system from collecting about 150 systems about five years ago when the scope was primarily regulatory compliance to more than 2,800 network devices and servers today as part of a broader information security strategy. That meant acquiring new hardware to handle the massive amounts of log data, working with system owners to feed the data into the SIEM system, and a development team to create scripts to take in and parse the various system logs, Bradd said. The SIEM system can audit system log data from Unix and Linux servers, Windows event logs, network firewalls and routers and switches.

“The volume of data is always a concern,” Bradd said adding that tuning is always an issue, but that the Census Bureau was able to get it under control. “If you know you've got an application that is going to generate a certain kind of alert, it's not a difficult process to tune that out.”

Bradd said the Census Bureau also plans to send alerts to system owners so a network engineer in charge of maintaining routers and switches can investigate an alert and report back within 72 hours whether it is an event that can be remediated internally or if it is a serious security problem that requires reporting and a full investigation. The built-out system has been used to find misconfiguration issues and detect malware infected machines and trace the malicious code back to the site the user visited, Bradd said. From server perspective, the Census Bureau is monitoring individual user activity to determine if an attacker is conducting a brute-force password attack on an employee account or if an employee has simply forgotten their password.

“To get something out of a tool you have to invest time, money and energy into people,” Bradd said.

There are signs that vendors have addressed some of the problems with earlier releases. The experience has been fairly smooth for one Canadian firm that deployed a newer LogRhythm system in February 2011. The firm, Cara Operations Ltd., which operates 650 restaurants, mostly corporate and franchise locations, deployed the SIEM system to monitor its payment systems for PCI DSS compliance. “We know it's capable of doing more than PCI compliance, but ultimately PCI was behind the decision to move forward with it,” said Rik Steven, project manager information technology at Cara.

The company uses a managed security services provider (MSSP) to monitor the system and handle alerts. While the MSSP monitors the system 24 hours a day, an IT professional within Cara is acting as a threat analyst to monitor the system internally. Restaurants span across five time zones, so the use of the MSSP was much needed, Steven said.

A team rolled out the system in about two months, deploying software agents at the company's various locations. At first there was too much information and Steven said the company had to do some tuning over several months to “dial-back” and focus only at the compliance. “It's easy to get overwhelmed with the fact that it tells you so much information,” Steven said.

The plan is to expand the system overtime to generate more reports and use newer features that can proactively address problems it identifies, Steven said.

“It's been a big investment to get this in so we want to make sure we get our money's worth out of it,” Steven said. “There's a great deal of information it can tell us and we've only scratched the surface on the reporting which could pop out of it regardless of just the elemental canned reports.”


Dig Deeper
  • Those who read this also read...


Nessun commento:

Posta un commento

Comments links could be nofollow free