26
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Three easy ways to enhance security monitoring Vijay Gupta, Sr. Software Designer #HPProtect

Three easy ways to enhance security monitoring · Attend these sessions • TB3295, Network modeling: A real world example • TB3262, Catching malicious insiders through behavioral

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Three easy ways to enhance security monitoring · Attend these sessions • TB3295, Network modeling: A real world example • TB3262, Catching malicious insiders through behavioral

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Three easy ways to enhance security monitoring Vijay Gupta, Sr. Software Designer #HPProtect

Page 2: Three easy ways to enhance security monitoring · Attend these sessions • TB3295, Network modeling: A real world example • TB3262, Catching malicious insiders through behavioral

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Agenda Security issues Security monitoring HP Solutions

Page 3: Three easy ways to enhance security monitoring · Attend these sessions • TB3295, Network modeling: A real world example • TB3262, Catching malicious insiders through behavioral

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 3

Security issues

User Roles and privileges

Resources

Sensitive information

Page 4: Three easy ways to enhance security monitoring · Attend these sessions • TB3295, Network modeling: A real world example • TB3262, Catching malicious insiders through behavioral

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 4

Security monitoring

HP ArcSight ESM

HP ArcSight

Connector

HP ArcSight

Connector

Page 5: Three easy ways to enhance security monitoring · Attend these sessions • TB3295, Network modeling: A real world example • TB3262, Catching malicious insiders through behavioral

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 5

Security events in ESM

Security monitoring

Page 6: Three easy ways to enhance security monitoring · Attend these sessions • TB3295, Network modeling: A real world example • TB3262, Catching malicious insiders through behavioral

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 6

Security event

A typical security event: User john.doe accessed a (top secret) file

• Who is john.doe? • Which department does he work in? • What is he authorized to do?

Page 7: Three easy ways to enhance security monitoring · Attend these sessions • TB3295, Network modeling: A real world example • TB3262, Catching malicious insiders through behavioral

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 7

Actor Model Import Connectors

Import user profiles (Actors) into ESM • Profiles along with accounts and roles • Various sources like Active Directory, Oracle

IDM, and many other databases • Real time updates for new, removed, or

changed profiles

Page 8: Three easy ways to enhance security monitoring · Attend these sessions • TB3295, Network modeling: A real world example • TB3262, Catching malicious insiders through behavioral

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 8

Actor Model Import Connectors

Import user profiles (Actors) into ESM

Page 9: Three easy ways to enhance security monitoring · Attend these sessions • TB3295, Network modeling: A real world example • TB3262, Catching malicious insiders through behavioral

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 9

Security event

A typical security event with Actors: User john.doe accessed a (top secret) file • Who is john.doe? • Which department does he work in? • What is he authorized to do?

Senior Architect Government Initiatives

Access top secret files

Page 10: Three easy ways to enhance security monitoring · Attend these sessions • TB3295, Network modeling: A real world example • TB3262, Catching malicious insiders through behavioral

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 10

Security issues

User Roles and privileges

Resources

Sensitive information

Page 11: Three easy ways to enhance security monitoring · Attend these sessions • TB3295, Network modeling: A real world example • TB3262, Catching malicious insiders through behavioral

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 11

Security issues

User Roles and privileges

Resources

Sensitive information

Page 12: Three easy ways to enhance security monitoring · Attend these sessions • TB3295, Network modeling: A real world example • TB3262, Catching malicious insiders through behavioral

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 12

Security event

A typical security event: User john.doe accessed a (top secret) file located at 10.0.26.9 • Where is this host located? • What kind of data is present on this host? • Are there any system/application vulnerabilities?

Page 13: Three easy ways to enhance security monitoring · Attend these sessions • TB3295, Network modeling: A real world example • TB3262, Catching malicious insiders through behavioral

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 13

Asset Model Import Connectors

Import asset information into ESM • Information like host name, IP address, MAC

address • Assign location, network zone, categories,

vulnerabilities • Real time updates for new, removed and

changed asset information

Page 14: Three easy ways to enhance security monitoring · Attend these sessions • TB3295, Network modeling: A real world example • TB3262, Catching malicious insiders through behavioral

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 14

Security event

A typical security event with Assets: User john.doe accessed a (top secret) file located at 10.0.26.9

• Where is this host located? • What kind of data is present on this host? • Are there any system/application vulnerabilities?

Headquarters NASA’s mission to Mars

None

Page 15: Three easy ways to enhance security monitoring · Attend these sessions • TB3295, Network modeling: A real world example • TB3262, Catching malicious insiders through behavioral

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 15

Security issues

User Roles and privileges

Resources

Sensitive information

Page 16: Three easy ways to enhance security monitoring · Attend these sessions • TB3295, Network modeling: A real world example • TB3262, Catching malicious insiders through behavioral

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 16

Security issues

User Roles and privileges

Resources

Sensitive information

Page 17: Three easy ways to enhance security monitoring · Attend these sessions • TB3295, Network modeling: A real world example • TB3262, Catching malicious insiders through behavioral

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 17

Security event

A typical security event: User john.doe accessed a (top secret) file located at 10.0.26.9 from xxx.78.195.166 • Where does it come from? • Do we know anything about it? • Is there any threat?

Page 18: Three easy ways to enhance security monitoring · Attend these sessions • TB3295, Network modeling: A real world example • TB3262, Catching malicious insiders through behavioral

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 18

RepSM = Reputation Security Monitor

Model Import Connector for RepSM

Import RepDV data into ESM

Page 19: Three easy ways to enhance security monitoring · Attend these sessions • TB3295, Network modeling: A real world example • TB3262, Catching malicious insiders through behavioral

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 19

Reputation Digital Vaccine

Internet reputation data feed from HP TippingPoint

• Provides security intelligence feed • Categorizes IP addresses and domains • Calculates severity

Or RepDV

Page 20: Three easy ways to enhance security monitoring · Attend these sessions • TB3295, Network modeling: A real world example • TB3262, Catching malicious insiders through behavioral

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 20

Model Import Connector for RepSM

Import RepDV data into ESM • Malicious IP addresses, domains • Threat type, threat score • Real time updates

RepSM = Reputation Security Monitor

Page 21: Three easy ways to enhance security monitoring · Attend these sessions • TB3295, Network modeling: A real world example • TB3262, Catching malicious insiders through behavioral

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 21

Security Event

A typical security event with RepSM: User john.doe accessed a (top secret) file located at 10.0.26.9 from xxx.78.195.166 • Where does it come from? • Do we know anything about it? • Is there a threat?

External Threat type ‘Abuse and Misuse’

Threat score 80%

Page 22: Three easy ways to enhance security monitoring · Attend these sessions • TB3295, Network modeling: A real world example • TB3262, Catching malicious insiders through behavioral

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 22

Security issues

User Roles and privileges

Resources

Sensitive information

User

Page 23: Three easy ways to enhance security monitoring · Attend these sessions • TB3295, Network modeling: A real world example • TB3262, Catching malicious insiders through behavioral

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 23

For more information

Attend these sessions • TB3295, Network modeling:

A real world example

• TB3262, Catching malicious insiders through behavioral analytics

Visit these demos • HP ArcSight ESM Demo

Station

• HP ArcSight Threat Central Demo Station

After the event • Contact your sales rep

• Visit the https://protect724.hp.com/community/events/protect-conference

Your feedback is important to us. Please take a few minutes to complete the session survey.

Page 24: Three easy ways to enhance security monitoring · Attend these sessions • TB3295, Network modeling: A real world example • TB3262, Catching malicious insiders through behavioral

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 24

Please fill out a survey. Hand it to the door monitor on your way out.

Thank you for providing your feedback, which helps us enhance content for future events.

Session TT3070 Speaker Vijay Gupta

Please give me your feedback

Page 25: Three easy ways to enhance security monitoring · Attend these sessions • TB3295, Network modeling: A real world example • TB3262, Catching malicious insiders through behavioral

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Thank you

Page 26: Three easy ways to enhance security monitoring · Attend these sessions • TB3295, Network modeling: A real world example • TB3262, Catching malicious insiders through behavioral