{"id":728,"date":"2020-06-14T12:11:41","date_gmt":"2020-06-14T12:11:41","guid":{"rendered":"https:\/\/blog.samarthya.me\/wps\/?p=728"},"modified":"2020-06-16T11:07:08","modified_gmt":"2020-06-16T11:07:08","slug":"a-different-take-siem","status":"publish","type":"post","link":"https:\/\/blog.samarthya.me\/wps\/2020\/06\/14\/a-different-take-siem\/","title":{"rendered":"A different take: SIEM"},"content":{"rendered":"<p>Security space is an ever evolving. It never stays stagnant; everyday you see a new exploit, a new hack. As an individual, you may have Antivirus installed on your system, Firewall &#8211; UP, ports blocked yet you are not free from threat<\/p>\n\n\n<p>If you have&#8230;.<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Digital footprint: Use any of the social apps e.g. Facebook, Twitter etc.<\/li><li>Use an email: Gmail, yahoo, live etc.<\/li><li>Enter passwords (even though super secure)<\/li><li>Shop online,<\/li><li>Heck even if you have a smart phone<\/li><\/ol>\n\n\n\n<p>you are at risk, everyday.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>Even if you do not have or use any of the 5 above, you still have your identity, right? SSN, or UID? <\/p><\/blockquote>\n\n\n\n<p>Your Biometrics fingerprints, eyeprints, stored in a DB govt or otherwise.<\/p>\n\n\n\n<p>Just think about it; if this is for an <strong>individual<\/strong> what about an <strong>organization<\/strong>? <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Organizations &amp; SIEM<\/h2>\n\n\n\n<p><strong>W<\/strong>ith the ever evolving space of security the organization are also upping their game. You have dedicated analysts (individually or part of <strong><a href=\"https:\/\/digitalguardian.com\/blog\/what-security-operations-center-soc\">SoC<\/a><\/strong> or NoC) analyzing information using variety of tools, one such tool is Splunk (very prevalent), Elastic etc.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Perspective<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">What is threat?<\/h3>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>A declaration of an intention or determination to inflict punishment, injury, etc., in retaliation for, or conditionally upon, some action or course; menace:<\/p><\/blockquote>\n\n\n\n<p><a href=\"https:\/\/www.dictionary.com\/browse\/threat?s=t\">Threat<\/a> is always contextual, specifically in the space of security e.g.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" width=\"182\" height=\"211\" src=\"https:\/\/blog.samarthya.me\/wps\/wp-content\/uploads\/2020\/06\/JohnDoe.png\" alt=\"\" class=\"wp-image-733\"\/><\/figure><div class=\"wp-block-media-text__content\">\n<pre class=\"wp-block-preformatted\">[<strong>Error: 401<\/strong>] <strong>Unauthorized<\/strong> A single authentication failure where say John Doe, operating from Australia tried to access his account in his organization and misspelled his password resulting an error.<\/pre>\n<\/div><\/div>\n\n\n\n<p class=\"has-text-align-center\"><strong><span class=\"has-inline-color has-vivid-red-color\">Is this threat?<\/span><\/strong><\/p>\n\n\n\n<p>It might be a a genuine mistake or lets add some spices to the situation<\/p>\n\n\n\n<p>The request came in at a time lets say 5:30 in the evening (AEST) but came in from an IP that is from North Korea<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong><span class=\"has-inline-color has-vivid-red-color\">Rings a bell?<\/span><\/strong><\/p>\n\n\n\n<p>So now we are thinking<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Volume Metrics<\/strong><\/h3>\n\n\n\n<p>Too many unauthorized errors coming might be an anomaly, but may or may not be threat. <\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>E.g. A configured password was just changed and the dev guy forgot to change one location and hence it may be false positive.<\/p><\/blockquote>\n\n\n\n<h3 class=\"wp-block-heading\">Behavior Metrics<\/h3>\n\n\n\n<p>Behavior is a pattern that is observed over a time for an entity. This entity can be a user or a resource.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>John regularly logs in from Sydney around 8:00 to 8:30 AM and logs out by 6:00 to 6:30 PM sometimes he logs in on weekends, but not regularly.<\/p><\/blockquote>\n\n\n\n<h4 class=\"wp-block-heading\">Param : One<\/h4>\n\n\n\n<p><strong>Today<\/strong>, John logs in at 7:00 PM on <strong>Friday<\/strong> and from Japan &#8211; <strong>Suspicious<\/strong>?<\/p>\n\n\n\n<p>This is the deviations from historical pattern, which defines John Doe, as a regular user logging in at 8:00 AM logging out 6:00 PM everyday<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Param : Two<\/h4>\n\n\n\n<p>The last login location was Australia, and within 15 minutes John logs in from Japan? <strong>Suspicious again<\/strong>?<\/p>\n\n\n\n<p>This is what is called anomaly from the regular behavior and may or may not be a threat, considering John may be on a regular visit to Japan, but what is suspicious is he was logged in from Australia 15 minutes ago so physically it is impossible to make a quantum leap in 15 minutes from one geographic location to another.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>So this definitely looks like a genuine threat.<\/p><\/blockquote>\n\n\n\n<h3 class=\"wp-block-heading\">Spatial: Metric<\/h3>\n\n\n\n<p>Spatial is the location element of an entity, which impacts a <strong>V<\/strong>olume or <strong>B<\/strong>ehavior metric in a way. It is not just an attribute of an entity it can enrich the information in a decisive way.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">SIEM: Security Information &amp; Event Management<\/h3>\n\n\n\n<p>SIEM is a process, approach or tools to monitor, analyze, evaluate and identify threats in an organization. <\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>It collects security data from appliances like servers, firewalls, domain controllers, and more. It stores &amp; normalizes data to discover trends, threats, and enable organizations to plug the gaps.<\/p><\/blockquote>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img fetchpriority=\"high\" decoding=\"async\" width=\"268\" height=\"362\" src=\"https:\/\/blog.samarthya.me\/wps\/wp-content\/uploads\/2020\/06\/logs-data.png\" alt=\"\" class=\"wp-image-738\" srcset=\"https:\/\/blog.samarthya.me\/wps\/wp-content\/uploads\/2020\/06\/logs-data.png 268w, https:\/\/blog.samarthya.me\/wps\/wp-content\/uploads\/2020\/06\/logs-data-222x300.png 222w\" sizes=\"(max-width: 268px) 100vw, 268px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<pre class=\"wp-block-verse\">The heart of all analysis is the data which is refined, correlated, enriched if required and normalized.<\/pre>\n<\/div><\/div>\n\n\n\n<ul class=\"wp-block-list\"><li>Identify high-risk threats with near real-time correlation and behavioral anomaly detection.<\/li><li>Detect vulnerabilities, manage risks and identify high-priority incidents among billions of data points.<\/li><li>Gain full visibility into network, application and user activity.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Tools<\/h3>\n\n\n\n<p>I have used mostly Splunk and Elastic, but the solutions are plenty depending on your pocket and size of the organization<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Helpful links<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>https:\/\/digitalguardian.com\/blog\/what-security-operations-center-soc<\/li><li><a href=\"https:\/\/www.dictionary.com\/browse\/threat?s=t\">https:\/\/www.dictionary.com\/browse\/threat?s=t<\/a><\/li><li>https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/HTTP\/Status\/401<\/li><\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security space is an ever evolving. It never stays stagnant; everyday you see a new exploit, a new hack. As an individual, you may have Antivirus installed on your system, Firewall &#8211; UP, ports blocked yet you are not free from threat If you have&#8230;. Digital footprint: Use any of the social apps e.g. Facebook, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":729,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"image","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[34],"tags":[16,33],"class_list":["post-728","post","type-post","status-publish","format-image","has-post-thumbnail","hentry","category-technical","tag-security","tag-siem","post_format-post-format-image"],"_links":{"self":[{"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/posts\/728","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/comments?post=728"}],"version-history":[{"count":0,"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/posts\/728\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/media\/729"}],"wp:attachment":[{"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/media?parent=728"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/categories?post=728"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/tags?post=728"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}