64
Jonathan Knohl – CEO Shaliza Fayyaz – CFO Hashnee Subbusundaram – COO Juan Pardo – CIO Fahad Mohammad - CPO

McAfee SIEM solution

Embed Size (px)

Citation preview

Page 1: McAfee SIEM solution

Jonathan Knohl – CEOShaliza Fayyaz – CFOHashnee Subbusundaram – COOJuan Pardo – CIO Fahad Mohammad - CPO

Page 2: McAfee SIEM solution
Page 3: McAfee SIEM solution
Page 4: McAfee SIEM solution
Page 5: McAfee SIEM solution
Page 6: McAfee SIEM solution
Page 7: McAfee SIEM solution
Page 8: McAfee SIEM solution
Page 9: McAfee SIEM solution
Page 10: McAfee SIEM solution
Page 11: McAfee SIEM solution
Page 12: McAfee SIEM solution
Page 13: McAfee SIEM solution
Page 14: McAfee SIEM solution
Page 15: McAfee SIEM solution
Page 16: McAfee SIEM solution
Page 17: McAfee SIEM solution
Page 18: McAfee SIEM solution
Page 19: McAfee SIEM solution
Page 20: McAfee SIEM solution
Page 21: McAfee SIEM solution
Page 22: McAfee SIEM solution
Page 23: McAfee SIEM solution
Page 24: McAfee SIEM solution
Page 25: McAfee SIEM solution
Page 26: McAfee SIEM solution
Page 27: McAfee SIEM solution
Page 28: McAfee SIEM solution
Page 29: McAfee SIEM solution
Page 30: McAfee SIEM solution
Page 31: McAfee SIEM solution
Page 32: McAfee SIEM solution
Page 33: McAfee SIEM solution
Page 34: McAfee SIEM solution
Page 35: McAfee SIEM solution
Page 36: McAfee SIEM solution
Page 37: McAfee SIEM solution
Page 38: McAfee SIEM solution
Page 39: McAfee SIEM solution
Page 40: McAfee SIEM solution

Integration• SIEM can be integrated with various platforms/software to insure that

those specific platforms are well secure from outside threats. • Platform/Software specific - each has its own set of SIEM Integration

Capabilities and its own SIEM Integration page• Transfer all information to the SIEM Integration Server • Select Data Transport Protocol - UDP or TCP (both transport layer protocol)

o User Data Protocol - Faster! o Transmission Control Protocol

• Has various correlation techniques used to integrate with a specific platforms/softwares

Page 41: McAfee SIEM solution
Page 42: McAfee SIEM solution

Escalation• Throughout time SIEM has escalated to be adaptable with various

devices/technologieso Applications, Operating Systems, Firewalls, Healthcare Auditing, Proxies

• Once a threat is detected, the device/software escalates its security levels to stay on top of potential new threats• McAfee releases periodic updates for SIEM

o Code updates are made available as a single compressed TAR file (Simple 7 Step Process)

• SIEM Add-Ons Include…oMcAfee Advanced Correlation Engine oMcAfee Application Data MonitoroMcAfee Enterprise Log ManageroMcAfee Global Threat Intelligence for Enterprise Security Manager

Page 43: McAfee SIEM solution

Use Cases

Page 44: McAfee SIEM solution

Scenario

Page 45: McAfee SIEM solution
Page 46: McAfee SIEM solution
Page 47: McAfee SIEM solution
Page 48: McAfee SIEM solution
Page 49: McAfee SIEM solution
Page 50: McAfee SIEM solution
Page 51: McAfee SIEM solution
Page 52: McAfee SIEM solution
Page 53: McAfee SIEM solution
Page 54: McAfee SIEM solution
Page 55: McAfee SIEM solution
Page 56: McAfee SIEM solution

What SIEM delivers?

Page 57: McAfee SIEM solution
Page 58: McAfee SIEM solution
Page 59: McAfee SIEM solution
Page 60: McAfee SIEM solution
Page 61: McAfee SIEM solution

Informational Interview

1. Which are the benefits of SIEM?

To extract context from common security events. Using categorization and normalization, we can understand better what is a normal behavior and what should be investigated. I have sent you a few scenarios around that. For example, a normal environment would have 1000 lines of firewall logs, but which of those are related to a known malicious IP? Which users, through which protocol interacted with this IP? Was it a critical machine? Can it be infected by malware? Etc.

2. How is the Investment related with the solution/acquirement?

I wouldn’t know anything related to the price of it and that would also depend on the use case and sizing. For example, we have massive deployments where you have more than 30 appliances and environments that would use only a single combo box appliance.

3. How to deal with the storage when it comes to volume of data logs, correlation, etc?

This is also related to sizing and use case. Some organizations might have different requirements for log retention because of some specific compliance regulation.

4. Which will be the Best strategy followed to store that huge amount of data?

The best strategy is to have a powerful database that is capable of retrieving the data easily and serve the administrators. Also, to establish a structure for long term storage, that is the raw log. When we talk about SIEM, correlation, aggregation, we are talking about events that have been parsed and treated. The raw log is the raw log only, and should be primary for compliance. The company implementing that technology must have a clear use case in mind, that will directly impact on how much storage and which appliances they will need.

5. Is it easy how SIEM integrates with other technologies? any restrictions? is it secure?

We have a list of supported devices. For those unsupported, it is relatively easy to integrate building a custom parser. We just need a log sample and a method of retrieval.

6. What is the current analytical technique that is used?

I couldn’t answer that.

Page 62: McAfee SIEM solution

7. What are some challenges associated with this tool?

The challenges are the business related rules and configurations. Once it is implemented, the administrators must be capable of extracting all the information available and make sense of it.

8. Is SIEM Cloud friendly? how it deals with data correlation and processing in this environment?

We support deployment of a component of the solution at the cloud (Amazon), that is the Receiver.

9. What are some additional functions that you think can make this tool even more effective? or which fields are being worked, so they can be included?

Data sources are key to achieve a specific use case. The more information available, the more you can extract context from it and investigate further the environments.

10. Was there a specific company or event that inspired the creation of SIEM?

I wouldn’t know.

11. What people (skills, roles, etc) should be involved in running and using a SIEM? Does it require training of personnel before deployment?

Security administrators, SOC operators, compliance reviewers, etc. It is recommend that the administrators take the McAfee offered training for the solution.

12. What is needed to make a SIEM implementation successful?

We recommend that the customer work with a Professional Services Consultant during the implementation and that they have a clear notion on what is the use case they are looking for. From there, as the deployment matures, they might grow to other levels and implement further business rules.

Page 63: McAfee SIEM solution

References• "Advanced Threat Defense for SIEM." Solution Briefs (n.d.): n. pag. Web. 25 Sept. 2016. <

http://www.mcafee.com/us/resources/solution-briefs/sb-atd-for-siem.pdf>• "Security Information and Event Management." (n.d.): n. pag. Unique McAfee Data Management

Techniques. McAfee, Inc. Web. 25 Sept. 2016.http://bluekarmasecurity.net/wp-content/uploads/2014/01/McAfee-WhitePaper-SIEM.pdf

• “Data Sheet." (n.d.): n. pag. SIEM Solutions from McAfee. McAfee, Inc. Web. 25 Sept. 2016. http://www.mcafee.com/us/resources/data-sheets/ds-siem-solutions-from-mcafee.pdf

• "Data Exfiltration Study: Actors, Tactics, and Detection." (n.d.): n. pag. Grand Theft Data. McAfee, Inc. Web. 25 Sept. 2016. <http://www.mcafee.com/us/resources/reports/rp-data-exfiltration.pdf>

• "Verizon’s 2016 Data Breach Investigations Report." Verizon, n.d. Web. 25 Sept. 2016.<http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/>

• http://www.isaca.org/Knowledge-Center/Research/Documents/SIEM-Business-Benefits-and-Security-Governance-and-Assurance-Perspectives_whp_Eng_1210.pdf?regnum=

• Eduardo de Sá XavierProfessional Services Consultant – LAR Brazil

([email protected])

Page 64: McAfee SIEM solution