Você está na página 1de 19

MAY 2016

I N F O R M A T I O N

SECURITY EDITORS DESK:


THE PERIMETER
GOES POOF

IN SIDER EDITION

BELLWETHER
TECHNOLOGIES
TO THE GUARDING
THE VANISHING
RESCUE? NETWORK
PERIMETER
If network perimeters
vanish, how will IT
security pros protect
the enterprise? Consider
these new, and
emerging, approaches
and achieve a mature
security posture.
HUNT DOWN APTs
WITH BIG DATA
ANALYTICS
E D IT O R S D E S K

HOME
The Perimeter Goes Poof
EDITORS DESK
The traditional network perimeter has all but vanished, but that doesnt
GET YOUR mean enterprise security must follow suit. BY BRENDA L. HORRIGAN, PH.D
ENTERPRISE

H
MATURE AND SECURE
WITH BELLWETHER
TECH

GUARDING THE
VANISHING NETWORK
PERIMETER

HUNT DOWN APTs


WITH BIG DATA
ANALYTICS OW DO YOU defend something thats Ringold put a laser focus on one more tool to employ
disappeared? Thats the sort of ho- against threats to enterprise security: Big data analytics.
cus pocus IT security professionals Because all the data in the universe is worthless unless it
are dealing with these days. The net- gets mined efficiently.
work perimeter, at least in the tradi- Though the network perimeter that security pros have
tional sense, has vanished. And yet the need to secure it trained years to protect has, essentially, vanished, the
continues. means still exist (and are waiting to be adopted) to secure
This Insider Edition offers some technological tricks enterprise systems. Read up and learn how its still pos-
that could make all the difference when it comes to keep- sible to battle the threats the bad guys launch. Security for
ing security threats at bay. In our cover story, Nemertes your enterprise systems wont magically appear. But with
Research CEO Johna Till Johnson explains eight bell- the aid of our four experts and information on the latest
wether technologies and whom theyre suited for. security tools and techniques, you can still deliver the sort
Then David Strom delves even deeper into the secu- of security the 21st century requires. n
rity implications of the perimeter-less network of the 21st
century. Dont miss his four pointers on how to keep en- BRENDA L. HORRIGAN is the managing editor for the TechTarget
terprise systems secure. Finally, Adam Rice and James Security Media Group.

2 BELLWETHER TECHNOLOGIES TO THE RESCUE? n MAY 2016


COVER STORY: BELLWETHER TECHNOLOGIES

HOME
GET YOUR
ENTERPRISE
EDITORS DESK

GET YOUR

MATURE AND
ENTERPRISE
MATURE AND SECURE
WITH BELLWETHER

SECURE WITH
TECH
THE GAME PLAN is set: Your company will undergo a digi-
GUARDING THE tal transformation. The next-generation architecture has

BELLWETHER
VANISHING NETWORK
PERIMETER been redesigned to focus on supporting cloud-native,
mobile-enabled applications. And lean, agile, and busi-

TECH
HUNT DOWN APTs ness-aligned are the new buzzwords. But what does all
WITH BIG DATA
ANALYTICS this mean for security? The traditional notion of a se-
curity perimetera contained environment that can be

To keep your security perimeter


protectedis dissolving. How can security professionals
move forward to protect this next-generation enterprise,
safe in this era of increasingly even as its becoming more nimble, more open and more
sophisticated attacked requires distributed?

staying current on WHAT SECURITY PERIMETER?


the latest security Leading-edge security organizations have been grappling
technologies with the networks vanishing security perimeter, and re-

available.
lated issues, for the past several years, and theyre seiz-
ing on a set of next-generation security technologies that
are rapidly becoming the cornerstones for the new digital
enterprise. These are sometimes termed bellwether tech-
By Johna Johnson nologies because the deployment state of these technolo-
gies serves as a good measure of how mature a companys

3 BELLWETHER TECHNOLOGIES TO THE RESCUE? n MAY 2016


COVER STORY: BELLWETHER TECHNOLOGIES

thinking is when it comes to security. employees are waiting for ITs sign off before putting sen-
HOME
In a recent benchmark study, Nemertes Research sitive data in the cloud. CASBs can return control to IT
EDITORS DESK quantified the maturity of a group of select security or- without standing in the way of employee initiatives; these
ganizations. Then they subdivided the group into more products come from vendors like Bitglass, Blue Coat, Mi-
GET YOUR mature and less mature, and looked for differences in tech- crosoft and Skyhigh Networks. Companies with mature
ENTERPRISE
MATURE AND SECURE nology deployment. security organizations are three times as likely to be using
WITH BELLWETHER
TECH
Nemertes found that more mature organizations were CASBs as organizations overall.
significantly more likely than the group overall to de-
GUARDING THE ploy these bellwether technologies. These technologies n Endpoint security is software that protects endpoints
VANISHING NETWORK
PERIMETER typically deliver a strategic advantage to companies that from malware using a variety of mechanisms (such as mi-
deploy them, either by delivering unprecedented capa- crosegmentation and containerization). This technology
HUNT DOWN APTs bilities (i.e., enabling the security teams to do something goes far beyond the list-based or algorithmic protection
WITH BIG DATA
ANALYTICS that previously couldnt be done) or by automating previ- the traditional antimalware software offers; it provides
ously manual capabilities (i.e., dramatically reducing the execution-level virtual firewalls around endpoint appli-
effort, time, and operational cost required to detect and cations to ensure they cant behave maliciously. Endpoint
mitigate a threat). security thus represents an architectural and technical
step function increase over existing technology, and it
BELLWETHER TECH FOR 21ST CENTURY SECURITY aligns well with next-gen architectures that are typically
For security pros concerned about the increasingly hard- based on the concept of virtualization. Companies like
to-find network security perimeter, heres a look at eight Bromium, CrowdStrike and Invincea make this software,
key bellwether technologieswhat they are and how they and more mature companies are two-and-a-half times
work: more likely to be using it than organizations overall.

n Cloud Access Security Brokers (CASBs) are on-prem- n User Behavioral Analytics (UBA) is software that inte-
ises or cloud-based software tools that automatically grates multiple sources of data (logs, SIEM and analytics
detect cloud usage by employees, assess business and platforms such as Splunk) to capture and display anom-
technical risk, and enforce security policies. Companies alous behavior of users, devices and systems. UBA tools
are moving increasingly to cloud services, and not all provide proactive protection against attacks. There are a

4 BELLWETHER TECHNOLOGIES TO THE RESCUE? n MAY 2016


COVER STORY: BELLWETHER TECHNOLOGIES

host of vendors with products, including Bay Dynamics, n Managed and professional services include third-
HOME
Gurucul, Exabeam, Splunk/Caspida; more mature compa- party services that review logs, manage security equip-
EDITORS DESK nies are three times more likely to be using UBA. ment (e.g., firewalls) or conduct assessments and test-
ing (e.g., penetration testing). Companies that provide
GET YOUR n Automated application security testing tools include these services run the gamut from Ernst & Young, which
ENTERPRISE
MATURE AND SECURE static application security testing (SAST), dynamic ap- is famous for its pen testing, to carriers like Verizon and
WITH BELLWETHER
TECH
plication security testing (DAST), interactive application AT&T. And specialized firms too numerous to list here.
security testing (IAST), and runtime application security
GUARDING THE testing (RAST). Theyre key to implementing next-gener-
VANISHING NETWORK
PERIMETER ation development methodologies like Agile and DevOps. Bellwether technologies deliver
HUNT DOWN APTs
Providers include Contrast, HP/Fortify and Veracode. strategic advantages, either
Sophisticated security organizations are almost twice as
WITH BIG DATA
ANALYTICS likely to be using these tools.
by delivering unprecedented
capabilities or by automating
n Risk management software automated the process of previously manual ones.
translating information security vulnerabilities into busi-
ness risk. These products come from vendors like Archer,
IBM, MetricStream and RiskVision. Mature security or- Strictly speaking, these arent technologiesnor are
ganizations are 30% more likely to be using them than or- they necessarily bellwether, as mature organizations are
ganizations overall. as likely to use them as organizations overall. But theyre
important to consider because they are increasingly use-
n Threat, compliance and risk (TCR) networks (also ful in offloading routine or repetitive work from security
known as threat intelligence networks) are subscription- professionals. However, more mature companies were,
based services that provide users with real-time insight unsurprisingly, more likely to take advantage of more so-
into the emergence of threats. They come from vendors phisticated services.
like Anomali, Cyveillance, Dell SecureWorks and Syman-
tec. More mature companies are 60% more likely to be nAutomation encompasses the use of tools and tech-
using them than companies overall. nologies (both third-party and homegrown) to automate

5 BELLWETHER TECHNOLOGIES TO THE RESCUE? n MAY 2016


COVER STORY: BELLWETHER TECHNOLOGIES

security processes. Once again, this isnt strictly speaking concept of endpoint security less relevant.
HOME
a technology, and its not possible to list vendors, since But at a bare minimum, security professionals con-
EDITORS DESK every security tool inclu des some form of automation. cerned with the networks security perimeter should be
But in practice, mature security organizations are more aware of these bellwether technologies and the advan-
GET YOUR than four times as likely as organizations overall to be in tages they can provideand a have a go-forward plan for
ENTERPRISE
MATURE AND SECURE the process of fully automating key business processes, as evaluating them and deploying them if and when the time
WITH BELLWETHER
TECH
opposed to having a limited-to-nonexistent emphasis on is right. n
automation.
GUARDING THE
VANISHING NETWORK
PERIMETER THE TAKEAWAY JOHNA TILL JOHNSON is CEO and senior founding partner of
This isnt a comprehensive list of technologies that secu- Nemertes Research, where she sets research direction and works
HUNT DOWN APTs rity organizations deploythere are many others that are with strategic clients. She served as CTO at Greenwich Technology
WITH BIG DATA
ANALYTICS equally critical. Nor is every technology right for every Partners, an infrastructure consulting and engineering firm;
headed the Global Networking Strategies Service business unit
organization. Nor is it the case that every company must of META Group; and oversaw the lab-testing program at Data
deploy these technologies or risk stagnating at a lower Communications magazine. She holds a bachelor of science in
maturity level. Some companies, for instance, may have electrical engineering and computer science (BSEE/CS) from Johns
few to no employees outside the firewall, making the Hopkins University.

6 BELLWETHER TECHNOLOGIES TO THE RESCUE? n MAY 2016


BEYOND THE PERIMETER

HOME
WAYS TO GUARD
A VANISHING
EDITORS DESK

GET YOUR

NETWORK
ENTERPRISE
MATURE AND SECURE
WITH BELLWETHER

PERIMETER
TECH
WITH DISTRIBUTED WORKFORCES and mobile technologies,
GUARDING THE thenetwork perimeter has evolved beyond the physical
VANISHING NETWORK
PERIMETER limits of most corporate campuses. The days when the pe-
The latest approach to rimeter was an actual boundary are a fond memory. Back
network-protection looks
HUNT DOWN APTs then, firewalls did a decent job of protecting the network
WITH BIG DATA
from outside threats, and intrusion prevention tools pro-
beyond the perimeter
ANALYTICS
tected against insiders. But, over time, the bad guys have
gotten better:Spear phishinghas made it easier to infil-
trate malware, and poor password controls have made it
easier to exfiltrate data. This means that the insiders are
getting harder to detect, and IT assets are getting more
distributed and harder to defend.
Complicating matters, todays data centers are no lon-
ger on premises. As cloud and mobile technologies be-
come the norm, the notion of a network edge no longer
makes much sense. New network security models are re-
quired to define what thenetwork perimeteris and how it
can be defended.
CIOsand enterprise security managers are using dif-
By David Strom ferent strategies to defend these new perimeters, as cor-
porate data and applications travel on extended networks

7 BELLWETHER TECHNOLOGIES TO THE RESCUE? n MAY 2016


BEYOND THE PERIMETER

that are often fragmented. The borders between trusted information will get internal access but no Internet con-
HOME
internal infrastructure and external networks still exist, nection, Maro says. This allows for a lot more fine-
EDITORS DESK but the protection strategies and security policies around grained control than simple virtual LANs(VLANs). We
network applications, access control, identity and ac- also monitor ourDHCPleases and notify our help desk
GET YOUR cess management, and data security require new security whenever a new device shows up on that list.
ENTERPRISE
MATURE AND SECURE models. Another method is to incorporate real-time network
WITH BELLWETHER
TECH
Here we look at four network edge-protection strate- traffic analysis. A number of vendors, including McAfee,
gies in use today: protecting the applications layer, using Norse Corp., FireEye Inc., Cisco, Palo Alto Networks Inc.
GUARDING THE encryption certificates, integratingsingle sign-ontech- and Network Box Corp. use this analysis as part of their
VANISHING NETWORK
PERIMETER nologies and building Web front-ends to legacy apps. firewall and other protective devices.

HUNT DOWN APTs 1. Provide application-layer protection. Whilenext-gen- 2. Make proper use of encryption and digital certificates.
WITH BIG DATA
ANALYTICS eration firewallshave been around for some time, whats A second strategy is to deploy encryption and digital cer-
new is how important their application awareness has be- tificates widely as a means to hide traffic, strengthen ac-
come in defending the network edge. By focusing on the cess controls and prevent man-in-the-middle attacks.
applications layer, enterprises can better keep track of po- Some enterprises have come up with rather clever and in-
tential security abuses because IT and security teams can expensive homegrown solutions, while others are making
quickly see who is using sensitive or restricted apps. use of sophisticated network access control products such
One way to do this is to develop your own custom net- as Mobile IAM from Extreme Networks Inc. that com-
work access software that works with firewalls and intru- bine certificates with Radius directory servers to identify
sion detection systems. This is what Tony Maro did as network endpoints.
the CIO for medical records management firm EvriChart We use certificates for all of our access control be-
Inc., in White Sulphur Springs, W.Va. cause simple passwords are useless, says Bob Matsuoka,
We have some custom firewall rules that only al- the CTO of New York-based CityMaps.com. The com-
low access to particular networks, based on the originat- pany found it needed more protection than a username
ing device. So, an unregistered PC will get an IP address and password combination to its Web servers, and pro-
on a guest network with only outside Internet access and viding certificates meant they could encrypt the traffic
nothing else. Or, conversely, a PC with personal health (Continued on page 10)

8 BELLWETHER TECHNOLOGIES TO THE RESCUE? n MAY 2016


BEYOND THE PERIMETER

HOME

EDITORS DESK
Fingerprinting the Endpoints
Extreme Networks dashboard display presents information
GET YOUR collected from each endpoint.
ENTERPRISE
MATURE AND SECURE
WITH BELLWETHER
TECH

GUARDING THE
VANISHING NETWORK
PERIMETER

HUNT DOWN APTs


WITH BIG DATA
ANALYTICS

SOURCE: EXTREME NETWORKS INC.

9 BELLWETHER TECHNOLOGIES TO THE RESCUE? n MAY 2016


BEYOND THE PERIMETER

(Continued from page 8) connections. One initiative that seems to be gaining is


HOME
across the Internet as well as strengthen their authenti- the use of a cloud-based SSO tool to automate and protect
EDITORS DESK cation dialogs. While this approach increases the com- user identities. Numerous enterprises are deploying these
plexity of Web application security for his developers and tools to create complex, and in some cases unknown,
GET YOUR other end users, it also has been very solid. passwords for their users.
ENTERPRISE
MATURE AND SECURE Over the past three years we havent any problems,
WITH BELLWETHER
TECH
Matsuoka says. One of the tradeoffs is his company is still
operating in startup mode. You can have too much secu- Better tools are being developed
GUARDING THE
VANISHING NETWORK
rity when you are part of a startup, because you risk being
to secure individual transactions
late to market or impeding your code development.
PERIMETER
Several vendors of classic two-factor tokens such as within an application without
HUNT DOWN APTs Vasco Data Security Inc. and Authentify are also entering being intrusive to customers.
WITH BIG DATA
ANALYTICS this market by developing better certificate management
tools that can secure individual transactions within an ap-
plication. This could be useful for financial institutions SSO isnt something new: We have had these prod-
that want to offer better protection and yet not something ucts for more than a decade. What is new is that several
that is intrusive to their customers. Instead, these tools products combine both cloud-based software as a service
make use of native security inside the phone to sign par- logins with local desktop Windows logins, and add im-
ticular encrypted data and create digital signatures of the provedtwo-factor authenticationand smoother federated
transaction, all done transparently to the customer. To identity integration.
some extent, this is adding authentication to the actual Also helping is a wider adoption of the open stan-
application itself, which gets back to an application-layer dardSecurity Assertion Markup Language, which allows
protection strategy. for automated sign-ons via exchanging XML information
between websites. As a result, SSO is finding its way into
3. Use the cloud with single sign-on (SSO) tools. As the a number of different arenas to help boost security, in-
number of passwords and various cloud-based applica- cluding BYOD, network access control and mobile device
tions proliferates, enterprises need better security than management tools.
just re-using the same tired passphrases on all of their Post Foods LLC in St. Louis, MO, is an adherent to

10 BELLWETHER TECHNOLOGIES TO THE RESCUE? n MAY 2016


BEYOND THE PERIMETER

SSO. The cereal maker uses Oktas security identity man-


HOME
agement and SSO service. Most of their corporate appli-
EDITORS DESK cations are connected through the Okta sign-in portal. Web Wraps for Legacy Apps
Users are automatically provisioned on the service (they You can move the security into the app itself,
GET YOUR dont have to even know their individual passwords), so making endpoint security irrelevant
ENTERPRISE for bring your own devices.
MATURE AND SECURE they are logged in effortlessly, yet still securely.
WITH BELLWETHER
TECH
Brian Hofmeister, vice president of architecture and
operations for parent company, Post Holdings, in St.

Front End
GUARDING THE Louis, says that the consumer goods company was able UI Layer
VANISHING NETWORK
PERIMETER to offer the same collection of enterprise applications,
Browser
across its entire corporation of diverse offerings quicker
HUNT DOWN APTs through the use of SSO and federated identities, and still
WITH BIG DATA HTTP/HTTPS
ANALYTICS keep the network secure.

4. Consider making legacy applications Web-based.

Back End
UI Layer
A few years ago the American Red Cross was one of the
more conservative IT shops around. Most of its applica-
Business Logic
tions ran on its own mainframes or were installed on spe-
cially provisioned PCs that were under the thumb of the Server
central IT organization based in Washington, D.C.
But then people started to bring their own devices SOURCE: NICHOLAS C. ZAKAS

along to staff the Red Cross disaster response teams. The


IT department started out trying to manage users mo-
bile devicesand standardize on them. But within two or own devices, and these devices would always be of more
three months, the IT staff found the mobile vendors came recent vintage, anyway. In the end, they realized that they
out with newer versions, making their recommendations had to change the way they delivered their applications to
obsolete. Like many IT shops, the Red Cross found that make them accessible from the Internet and migrate their
the emergency response teams would rather use their applications to become more browser-based. The Red

11 BELLWETHER TECHNOLOGIES TO THE RESCUE? n MAY 2016


BEYOND THE PERIMETER

Cross still has its mainframe apps, just a different way toward being more mobile-centric, and we need to be
HOME
to get to them. And their end users are happier because much quicker and much more adaptable.
EDITORS DESK they dont have to tote around ancient laptops and smart- Certainly, breaking traditional boundaries with these
phones, too. four strategies isnt the only way you can set up a more
GET YOUR By building a Web front-end to their mission-critical secure network edge. But by tying network security more
ENTERPRISE
MATURE AND SECURE apps, the Red Cross was able to move security to inside closely to applications, certificates and transactions, you
WITH BELLWETHER
TECH
the application itself and not depend on the physical de- have a better chance at stopping the bad guys. n
vice that was running the application.
GUARDING THE Connections are made over SSL encryption so that
VANISHING NETWORK
PERIMETER data transferred from device to their mainframes is pro- DAVID STROM, is one of the leading experts on network and
tected. And their IT staff no longer has to worry about Internet technologies and has written and spoken extensively on
HUNT DOWN APTs obsolete smartphones and can focus on building and we- topics such as VoIP, cloud computing, Internet applications, wireless
WITH BIG DATA and Web services for more than 25 years. He was the founding
ANALYTICS bifying other applications. editor in chief of Network Computing magazine and has run
You have to be able to adapt to the changing mo- various print and online publications including TomsHardware.
bile environment, says John Crary, CIO for the Ameri- com and DigitalLanding.com. His work can be found via his website
can Red Cross. It is moving rapidly. Businesses are going (strominator.com)and on Twitter: @dstrom.

12 BELLWETHER TECHNOLOGIES TO THE RESCUE? n MAY 2016


BIG DATA ANALYTICS

HOME
HUNT DOWN
APTs WITH BIG
EDITORS DESK

GET YOUR

DATA ANALYTICS
ENTERPRISE
MATURE AND SECURE
WITH BELLWETHER
TECH
ORGANIZATIONS THAT START to address information security
GUARDING THE To follow the thread of security in a meaningful way will come to a point in their matu-
events, through volumes of
VANISHING NETWORK
PERIMETER rity when they have a lot of machine data. The challenge

HUNT DOWN APTs log data, incident response teams many CISOs face is how to leverage that data quickly
and correlate events dynamically across the enterprise to
WITH BIG DATA
ANALYTICS need the help that big data track down advanced persistent threats (APTs). The Sony
analytics can provide. Pictures Entertainment hacking incident in 2014 under-
scored the importance of security monitoring and rapid
incident response to clamp down on damages before di-
saster strikes.
IT security managers cannot protect what they can-
not see, and to see associations or patterns that can help
detect APTs enterprises must have comprehensive log-
ging in place across multiple layers within a network. The
greater the visibility, the larger the machine data, and
the harder it is for cybersecurity incident response teams
to follow the thread and correlate security events with
threat intelligence in a meaningful way. The answers to
many security questions about fraudulent activity, user
By Adam Rice and David Ringold behavior, communications, security risk and capacity
consumption lie within these large data sets.

13 BELLWETHER TECHNOLOGIES TO THE RESCUE? n MAY 2016


BIG DATA ANALYTICS

Why so much logging? Most advanced adversaries COMPREHENSIVE LOGGING


HOME
gain access to a victims network via malware, drive- All of this logging can result in close to a million pings a
EDITORS DESK by links or Web shells. Once the initial attack phones day about potential security events at larger enterprises
homemalware will initiate outbound connection to and terabytes of logging data a month. While comprehen-
GET YOUR C2 hoststo get around inbound firewall rulesroot- sive logging is needed, several factors have to be consid-
ENTERPRISE
MATURE AND SECURE kits are delivered, and they quickly gain access to a user ered when you increase logging across the enterprise.
WITH BELLWETHER
TECH
account and drive around the network as a fully cre- Infrastructure that is already heavily utilized might expe-
dentialed user. It is difficult to lock down a Microsoft rience performance issues with additional logging. The
GUARDING THE network in any meaningful way without destroying its network team should be involved in the design of the log-
VANISHING NETWORK
PERIMETER functionality. A successful strategy to defeat this type of ging infrastructure to make sure the aggregation of en-
attack includes the following: terprise-wide logging does not affect performance when
HUNT DOWN APTs all log sources are pointed at a few destinations. Its im-
WITH BIG DATA
ANALYTICS Detect the malware or drive-by links before users click portant to involve key stakeholders in the design and to
on them. To do this a cybersecurity incident response balance the need for logging with the function of the ap-
team has to be able to compare user behavior against plications. To see across an enterprise, verbose logging
threat intelligence. This requires full packet logging of should be enabled throughout as follows:
all ingress and egress traffic on an enterprises edge.
Layer 2 switching and choke points on enterprise
Detectmalware or rootkit delivery to the endpoint. distribution switches.
To do this the cybersecurity team needsverbose logging NetFlow enabled and logged where possible.
on antimalware and endpoint protection systems. Critical services to send access and systems logs.
AD to log user behaviors.
The cybersecurity team needs to be able to analyze All Internet-exposed devices to log access and
user behaviors and access across the entire enterprise. system events.
Security information and event management(SIEM) tools Endpoint protection systems to log alerts.
canalert you to unusual activity, such as account usage All firewall devices to log inbound access (accepts)
during off hours. This is only possible with comprehensive and outbound (accepts and denied).
logging of Active Directory (AD) and host access events. Other security devices to log alerts and access.

14 BELLWETHER TECHNOLOGIES TO THE RESCUE? n MAY 2016


BIG DATA ANALYTICS

Most security programs begin with logs from the de- actions and input within the applications, so you can un-
HOME
vices at the edge of the network, because those are usually derstand if they are being used as a bridge to your net-
EDITORS DESK easier to obtain. Firewall, network intrusion detection work. This logging should include not only internally
system and other network-based security products have developed Web applications and services but also vendor-
GET YOUR robust and mature logging capabilities that most com- provided appliances and applications that reside on those
ENTERPRISE
MATURE AND SECURE panies are already using. The level at which the logging systems. The logging needs to enable you to see what is
WITH BELLWETHER
TECH
is configured is paramount for visibility into the various behind all network communications to and from your
APT traffic as it is leaving or entering your environment. environment.
GUARDING THE This means that if there is an active intrusion, traffic Any security device or system software within your
VANISHING NETWORK
PERIMETER coming and going from the network edge has to be cor- network should also create logs. These security systems
related with the suspicious traffic to see the entire com- usually include, but are not limited to, antivirus or other
HUNT DOWN APTs munications channelmalicious actors infiltrating the host intrusion detection software. You can review the
WITH BIG DATA
ANALYTICS network, driving a compromised account, and then mov- host logs on the systems to gain an understanding of the
ing laterally across the enterprise. Its critical to be able to network accounts and computer systems that are used
see both successful and denied traffic at the network edge within the scope of the threat. Host firewall logs can be
to get a profile of what is normal for your business. critical to understanding how the threats are moving
around within the network after an initial compromise.
NETWORK CONNECTIVITY AND COMMUNICATIONS Similar to the host-based firewall logs, NetFlow can
At the network edge, be sure that your logging doesnt help monitor the traffic within your network and iden-
have additional blind spots to traffic that can be used to tify areas that require further investigation. NetFlow can
bypass your security controls. Encrypted traffic, such as alert your team to data-transfer activity that is happening
SSL/HTTPS, and services that are traditionally used for within your network that might not be authorized or sen-
communication and data transfer, such as IRC and FTP/ sitive information that is being prepared for transmission
SFTP/SSH, should also be logged with detail. outside of your network.
Logging of services available to the public Internet is
also of great interest, as these systems are the gateways CENTRALIZED SYSTEM
to and from your infrastructure. Any Web server should Network authentication logs from AD and otherLDAP-
log not only the connections into the server, but also the based services used for central authentication of users

15 BELLWETHER TECHNOLOGIES TO THE RESCUE? n MAY 2016


BIG DATA ANALYTICS

and network systems enable you to trace access within time is essential in stopping the unauthorized exfiltration
HOME
your environment and begin to frame up which systems of data from a network. From the point of discovery to
EDITORS DESK are involved with the threat. Many of the applications when an active defense is put in place and the adversary
and systems in this list will have the capability to send is stopped is a critical time.
GET YOUR logs off to a centralized system, either through syslog or To besuccessful in seeing, stopping and investigat-
ENTERPRISE
MATURE AND SECURE another facility. Having a central log collection and analy- ing a cyberevent, an enterprise must have the ability to
WITH BELLWETHER
TECH
sis system is crucial because trying to look in all of these quickly query very large sets of machine data. The notion
systems, with multiple sources and locations, for the log of having a commercial off-the-shelf tool that has all the
GUARDING THE information is tedious work. This log information will be answers programmed into its graphical user interface is
VANISHING NETWORK
PERIMETER written to system logs on the hosts, which systems ad- a fallacy. There is no fixed solution. Queries against large
ministrators will want to constrain so the data doesnt sets of machine data must be dynamic, and results must
HUNT DOWN APTs consume usable system disk space. Security logs kept on be presented quickly. For security analysts to be success-
WITH BIG DATA
ANALYTICS systems will usually contain data for a few days at most, ful, they have to be able to manage big data.
and in many situations only a few hours. This is not suffi- As the number of log sources grows, so does the vol-
cient time to allow for analysis and review. ume of the log data being collected. This growth never
Most intrusions are not detected for months after follows a linear path. Each system generates more and
the initial compromise (which may have been the case more data; and with each system, another system comes
withSony). If log data is not collected and retained dur- into the scope. If all systems and devices are sending logs
ing those months, the ability to identify the system of to a centralized system, which is the ultimate goal, the
source or persistence is impossible, and the threat may volume of data quickly becomes unmanageable.
remain within your network for a very long time. With systems now producing more log data than ever
before, and diverse data sources required to search out
BIG DATA PROBLEM and locate a threat within the network, a new way to
When the cybersecurity incident response team investi- perform data analysis and identify correlated events is
gates an incident they must be able to follow the thread needed. The commercial SIEM companies are trying hard
of events through logged data, and that path is interwo- to play catch up and positioning their products to support
ven through the Microsoft domain, security devices, edge the large volumes of data produced and collected.
devices, switches and routers. During a security event, (Continued on page 18)

16 BELLWETHER TECHNOLOGIES TO THE RESCUE? n MAY 2016


BIG DATA ANALYTICS

HOME

EDITORS DESK
The Security Lifecycle
Tracking APTs across an enterprise, from robust logging
GET YOUR and actionable intelligence to security analytics.
ENTERPRISE
MATURE AND SECURE
WITH BELLWETHER
TECH
Data Analytics
Tool(s)
GUARDING THE Splunk
Netwitness
VANISHING NETWORK ArcSight

!
PERIMETER

HUNT DOWN APTs


WITH BIG DATA Alerts
ANALYTICS
Large sets of Machine data

3rd Party Malware


Comprehensive IOCs analysis
Logging of:
Network devices Security Analytics
Spear
Security devices Intel from Phishing SIEM
Servers LE Analysis Big Data Tools
Mail Actionable Intelligence Frameworks
Alerts and Blocks

Devices on the edge Intelligence Endpoint agents


Directory server Open Data
Source Malware sandbox
SEIM tool analysis
Forensics
IDS
Network DVR Analyst
Commercial Internal
Intel Investigation

SOURCE: ADAM RICE; DESIGN: CHRIS SEERO

17 BELLWETHER TECHNOLOGIES TO THE RESCUE? n MAY 2016


BIG DATA ANALYTICS

(Continued from page 16) logging across the enterprise: People, tools and processes
HOME
ANALYTICS TOOLS have to be established to use the data in a meaningful
EDITORS DESK Big data analytics must provide the ability to correlate way.
logging events based on time and user behavior across Without a means of leveraging this big data quickly
GET YOUR the entire spectrum of devices and technologies in an en- and dynamically, its usefulness disappears. Planning, pro-
ENTERPRISE
MATURE AND SECURE terprise. Traditional SIEM tools are not good at this task cess and skilled staff are all keys to using the large sets of
WITH BELLWETHER
TECH
because they organize data into databases, which be- machine data to win the battle against the APT. Before
come too big and clunky to query across. Typically, the simply turning up logging across the enterprise, CISOs
GUARDING THE flat files of machine data are best for fast queries. Several have to make sure that the budget is in place to acquire
VANISHING NETWORK
PERIMETER network tools designed for this purpose work very well. the big data analytics tools necessary to correlate events
Splunk Enterprise and IBM QRadar Security Intelligence across the data, and that they have the staff with the ex-
HUNT DOWN APTs Platform are examples ofbig data analytics tools, but or- pertise to use those tools. One without the other is not a
WITH BIG DATA
ANALYTICS ganizations need to build an integrated tool set that is de- workable solution. n
signed to complement the security analysts needs. With
these tools and processes come unique skills. The evolv-
ADAM RICE is the CISO at Alliant Techsystems (ATK). An infosec
ing job of the modern security analyst is exactly what the professional with 17 years of experience, he has served as CSO of
big data problem needs. a global telecommunications company; general manager and vice
With the right tools, a cybersecurity incident response president of a managed security services business; and director in
team can follow the thread from a known event, like a several network consulting companies. He is a retired U.S. Army
malware alert, to behaviors of credentialed user accounts noncommissioned officer and a regular contributor to several
that are compromised, to machines from which the ac- information security publications.
counts are coming, to active IP sessions on the edge of
the network. Without logging, none of this would be JAMES RINGOLD is a senior enterprise security architect at ATK,

possible. who has worked in the aerospace and defense, electronic discovery
and investigations and retail industries, performing technical
As CISOs build an active defense against the APT, the evaluations and building information security programs in various
need to increase logging across the enterprise becomes stages. As a security operations manager and incident responder for
a critical part of seeing and correlating events to track 17 years, he focused on countermeasures and controls to detect and
down the bad guys. It is not enough to simply turn on mitigate cyberintrusions.

18 BELLWETHER TECHNOLOGIES TO THE RESCUE? n MAY 2016


TechTarget Security Media Group

EDITORIAL DIRECTOR Robert Richardson EDITORIAL BOARD


HOME
Phil Agcaoili, Cox Communications
EXECUTIVE MANAGING EDITOR Kara Gattine
Seth Bromberger, Energy Sector Consortium
EDITORS DESK
Mike Chapple, Notre Dame
MANAGING EDITOR Brenda L. Horrigan
GET YOUR Brian Engle, Health and Human Services Commission, Texas
ENTERPRISE
MATURE AND SECURE
FEATURES EDITOR Kathleen Richards Mike Hamilton, City of Seattle
WITH BELLWETHER Chris Ipsen, State of Nevada
TECH DIRECTOR OF ONLINE DESIGN Linda Koury
Nick Lewis, Saint Louis University
GUARDING THE COLUMNISTSJohna Till Johnson, Adam Rice, James Ringold, Rich Mogull, Securosis
VANISHING NETWORK David Strom
PERIMETER
Tony Spinelli, Equifax
Matthew Todd, Financial Engines
HUNT DOWN APTs CONTRIBUTING EDITORSKevin Beaver, Michele Chubirka, Michael MacDonnell Ulsch, PwC U.S.
WITH BIG DATA Cobb, Scott Crawford, Peter Giannoulis, Francoise Gilbert, Jo-
ANALYTICS
seph Granneman, Ernest N. Hayden, David Jacobs, Nick Lewis, VICE PRESIDENT/GROUP PUBLISHER Doug Olender
Kevin McDonald, Sandra Kay Miller, Ed Moyle, Lisa Phifer, Ben dolender@techtarget.com.
Rothke, Mike Rothman, Karen Scarfone, Joel Snyder, Steven
Weil, Ravila Helen White, Lenny Zeltser Stay connected! Follow @SearchCloudSecurity today.

2016 TechTarget Inc. No part of this publication may be transmitted or reproduced in any form or byany means without written
TechTarget permission from the publisher. TechTarget reprints are available through The YGS Group.
275 Grove Street,
About TechTarget: TechTarget publishes media for information technology professionals. More than 100 focused websites enable
Newton, MA 02466 quick access to a deep store of news, advice and analysis about the technologies, products and processes crucial to your job. Our
www.techtarget.com live and virtual events give you direct access to independent expert commentary and advice. At IT Knowledge Exchange, our social
community, you can get advice and share solutions with peers and experts.

COVER IMAGE AND PAGE 3: TRIFONENKO/ISTOCK

19 BELLWETHER TECHNOLOGIES TO THE RESCUE? n MAY 2016

Você também pode gostar