Class 5 ‐ SIEM Introduction - Justin-Boyd/CIT-Class GitHub Wiki
Security Measures
Cybersecurity Threats
- Threat
- Vulnerability
- Risk
- Asset
Technological Asset Types
- Hardware
- Software
- Data
- Communications
- Each of these assets can be an attack vector and must be monitored continuously.
Security Components
- Network Access Control
- Network Behavior Analysis
- Firewall
- Identity Management
- Web Application Firewall
- Virtual Private Network
- Intrusion Detection and Prevention
- Endpoint Detection and Response
- Mail Relay
- Endpoint Protection Security
SOC vs NOC
-
SOC
- Security Operations Centers (SOCs) manage security incidents.
- Help monitor logs from different systems and respond to incidents
- Personnel handle data analysis and technologies.
- Use SIEM and ticket management
-
NOC
- Network Operations Centers (NOCs) manage network operations
- A central location for controlling and monitoring network components
- Personnel handle network management, configuration, and IT.
- Use control systems, quality management, and tracking tools
Introduction to SIEM
SIEM for Security
- Log collection software and log retention
- Security incident alerts based on logs
- Provides data analysis
- Some organizations use SIEM as a third-party service to monitor infrastructure.
Why SIEM is Important
- Helps detect security incidents at an early stage
- Creates reports of suspicious activities
SIM, SEM & SIEM
-
Security Information Management
- Automatic collection of event logs
- Simplification and correlation of data
- Strong log management capabilities
- Security reporting
-
Security Event Management
- Strong event management
- Based on enterprise SQL databases
- Ideal for running security operations
- Data collection in near-real time
-
Security Information and Event Management
- SIM and SEM capabilities combined
- Real-time security alerts analysis
- Software appliances or managed services
- Data aggregation from many sources
SIEM General Components
- Database
- Correlation Engine
- Collectors
- Management Center and Dashboards
- API
SIEM Monitoring Features
- Filters
- Rules
- Active Lists
- Reports
- Trends
SIEM Workflow
- Collection - Gather logs and data-related events.
- Parsing - Inspect the data and sort it into key and value pairs.
- Evaluation - Match against sets of rules to indicate a threat.
- Correlation - Note if suspicious behavior is part of a more elaborate scenario.
- Inspection - Tickets are managed by the SOC.
SIEM Key Objectives
- Near-real-time alerts and correlations
- Conduct investigations and provide evidence.
- Provide risk management and assessment for corporate assets.
Popular SIEMs
- QRadar
- ArcSight
- AlienVault
- Splunk
Snort
- An open-source IDS/IPS system
- Can perform real-time network traffic analysis
- Supported by pfSense
SIEM Installation
Splunk Components
- Search Head is an interface used to search and access data.
- Indexers are the log parsers.
- Small components collect data to be sent to Splunk.
Splunk Installation in Linux
- Splunk can be installed on any OS.
- In a Debian-based OS, Splunk is installed with the package manager.
- The daemon should be started after installation.
Installation in Windows
- The Splunk Windows installation follows steps that are similar to a Linux installation.
- Credentials for the system are provided during the installation process.
- Splunk Forwarder should be installed separately (on Linux, Windows, or Mac).
Splunk PLugins
- Add-on
- Typically a single component that can be reused in different use cases
- Apps
- More comprehensive and may contain user interfaces
- Apps and add-ons extend Splunk functionality.
Log Collection & Types
Log Structure
Log Collector
- Typically located in every environment
- Collectors forward logs received from OSs and applications to the SIEM.
- To send logs from DMZ to LAN, specific ports must be opened.
Application Logs
- DB
- WAF
- IPS
- Firewall
- Logs can also be obtained through external applications.
OS Logs
- UNIX systems usually save logs in the /var/log directory.
- In Windows, logs can be viewed in Event Viewer.
- Mac uses Console.app, which is similar to the Windows Event Viewer.
UNIX Logs
- Every day, a new file is created in sequential order and backs up the previous log.
- Daemons may group the journals in a dedicated folder.
- Some Linux distributions have tools to view the logs graphically.
UNIX Log Sources
- Auth.log
- Apache2
- IPtables
- Syslog
- DPKG
Windows Event Logs
-
Classifies events in several categories
-
Each entry is defined by its type to identify the severity of the event.
-
In the Event Viewer, events are listed with headers and descriptions.
-
Application
-
Security
-
Setup
-
System
-
Forwarded Events
Important Security Events
- Windows events are assigned IDs
- 4624 - Successful user login
- 4625 - Failed user login
- 4672 - Special privileges were assigned to a new logged on user.
- 4700 - Scheduled task was enabled.
- 1116 - Windows Defender malware detection
- 5031 - A firewall service blocked an application from accepting incoming connections.
Event Log Classification
- Information Logs
- Warnings
- Error Logs
- Success Audit
- Failure Audit
Log Gathering
- Syslog can use TCP/UDP when the default port is 514.
- Files: Some applications use files to write logs.
- Database: SIEM logs in to the database and extracts logs according to a predefined query.