Security Information and Event Management: Category 7
Security Information and Event Management: Category 7
Category 7 //
Security Information and
Event Management
September 2012
CLOUD SECURITY ALLIANCE SecaaS Implementation Guidance, Category 7: Security Information and Event Management
All rights reserved. You may download, store, display on your computer, view, print, and link to the Cloud
Security Alliance Security as a Service Implementation Guidance at http://www.cloudsecurityalliance.org,
subject to the following: (a) the Guidance may be used solely for your personal, informational, non-commercial
use; (b) the Guidance may not be modified or altered in any way; (c) the Guidance may not be redistributed; and
(d) the trademark, copyright or other notices may not be removed. You may quote portions of the Guidance as
permitted by the Fair Use provisions of the United States Copyright Act, provided that you attribute the portions
to the Cloud Security Alliance Security as a Service Implementation Guidance Version 1.0 (2012).
Contents
Foreword ....................................................................................................................................................................5
Letter from the Co-Chairs...........................................................................................................................................6
Acknowledgments ......................................................................................................................................................7
1.0 Introduction..........................................................................................................................................................8
1.1 Intended Audience ...........................................................................................................................................8
1.2 Scope ................................................................................................................................................................9
2.0 Requirements Addressed .................................................................................................................................. 10
2.1 SIEM Functionality......................................................................................................................................... 10
2.2 Business Drivers............................................................................................................................................. 11
2.2.1 Log Data Management ........................................................................................................................... 11
2.2.2 Risk Management................................................................................................................................... 11
2.2.3 Regulatory and Compliance Requirements............................................................................................ 12
2.3 Incidents and Events...................................................................................................................................... 12
2.4 Performance Requirements .......................................................................................................................... 13
2.5 Service Level Agreements.............................................................................................................................. 13
3.0 Implementation Considerations and Concerns................................................................................................. 15
3.1 Considerations............................................................................................................................................... 15
3.1.1 Implementation Considerations............................................................................................................. 15
3.1.2 Legal Considerations............................................................................................................................... 16
3.1.3 Ethical Considerations ............................................................................................................................ 16
3.1.4 Cloud SIEM versus Hybrid SIEM.............................................................................................................. 16
3.1.5 Information Sharing................................................................................................................................ 18
3.2 Concerns........................................................................................................................................................ 19
4.0 Implementation................................................................................................................................................. 20
4.1 Architecture Overview................................................................................................................................... 20
4.1.1 Architectural Planning ............................................................................................................................ 20
4.1.2 SIEM Inputs............................................................................................................................................. 21
4.1.3 SIEM Outputs.......................................................................................................................................... 22
4.1.4 Operations .............................................................................................................................................. 23
Foreword
Cloud Computing represents one of the most significant shifts in information technology many
of us are likely to see in our lifetimes. We are reaching the point where computing functions as a utility,
promising innovations yet unimagined. The major roadblock to full adoption of Cloud Computing has been
concern regarding the security and privacy of information.
Much work has been done regarding the security of the cloud and data within it, but until now, there have been
no best practices to follow when developing or assessing security services in an elastic cloud model—a model
that scales as client requirements change.
One mission of the Cloud Security Alliance is to provide education on the uses of Cloud Computing to help
secure all other forms of computing. To aid both cloud customers and cloud providers, the CSA SecaaS Working
Group is providing Implementation Guidance for each category of Security as a Service, as delineated in the
CSA’s SecaaS Defined Categories of Service. Security as a Service was added, as Domain 14, to version 3 of the
CSA Guidance.
We encourage you to download and review all of our flagship research at http://www.cloudsecurityalliance.org.
Best regards,
The Defined Categories of Service helped clarify the functionalities expected from each Category. In this series,
we hope to better define best practices in the design, development, assessment and implementation of today’s
offerings.
We want to thank all of the many contributors worldwide who have worked so hard to produce these papers
providing guidance for best practices in Cloud Computing Security. Many have been with the Security as a
Service Working Group since the beginning; many others joined in this effort. Each has spent countless hours
considering, clarifying, writing and/or editing these papers. We hope they help move forward toward those
unimagined innovations.
Sincerely,
Acknowledgments
Co-Chairs
Contributors
Andrea Bilobrk, Cloud & Virtualization Security Strategist, Canada Cloud Network
Moshe Ferber , Machshava Tova
Robert Gutcho, Symantec
Bernd Jäger, Colt
Yale Li, Microsoft
Roshan Sequeira, ISITRoshan Sequiera, ISIT
Peer Reviewers
Andrea Bilobrk, Cloud & Virtualization Security Strategist, Canada Cloud Network
Rizwan Ahmad
Phil Cox, Director of Security and Compliance, RightScale
Moshe Ferber, Machshava Tova
Andrew Hay, Chief Evangelist, CloudPassage, Inc.
Bernd Jäger, Colt
Hament Mahajan, Juniper Networks
Anish Mohammed, Accenture
Karthik Murthy, Advanced Technology Services
Jean Pawluk
Paul Swinton, Symantec
1.0 Introduction
Tremendous professional judgment and experience must be applied in the architecture, engineering, and
implementation of Security Information and Event Management (SIEM), to ensure that it logs the information
necessary to successfully increase visibility and remove ambiguity surrounding security events and risks that an
organization faces. Providing SIEM as a service under Security as a Service (SecaaS), the provider must be able
to accept log, event and flow information from a diverse set of current and legacy customer devices, conduct
information security analysis, correlation, and support incident response activities from a wide variety of
sources. By providing flexible, real-time access to SIEM information, it allows the party consuming the SIEM
service to identify threats acting against their environment, cloud or other. This identification then allows for
the appropriate action and response to be undertaken to protect or mitigate the threat. This simple step of
increasing visibility and removing ambiguity helps the organization understand the current vulnerabilities and
gaps, increase the effectiveness of the controls deployed and improve the security posture of the organization
as a whole.
This document provides guidance on how to evaluate, architect, and deploy cloud-based SIEM services to both
enterprise and cloud-based networks, infrastructure and applications. The guidance addresses the leveraging of
cloud-based SIEM services in support of cloud environments, both public and private, hybrid environments, and
traditional non-cloud environments. While this document addresses SIEM as a cloud service, it does not
preclude a hybrid environment for enterprises that have traditional SIEM deployments where the SIEM cloud
service supplements.
Section 2 is intended as a high level overview of SIEM functions and implementation options. It addresses
several key functionalities for which SIEM can be leveraged, and it touches on less traditional deployments that
can be implemented in specific markets where regulatory or other compliance requires it. The intended
audience includes executive and senior leadership responsible for IT and security operations, compliance
officers, and other decision makers within an enterprise. The material is written for executive-level discussion
and indicates a baseline for best practices in implementation and design of security services in the cloud.
Section 3 details the considerations and concerns that should be part of the decision-making conversation,
whether by an architecture team, auditing team, or within the context of a purchasing decision. The section is
written for those who are implementing, integrating with, or performing a technical evaluation of cloud-based
SIEM. This section also is well suited for auditors to help them understand typical services and capabilities that
may be implemented for cloud-based SIEM deployments.
Section 4 is a technical discussion. The section is divided into two subsections, the first addresses architectural
considerations for network architects and the second addresses security analysts’ considerations.
Section 5 contains links to trusted sources of information regarding SIEM and SecaaS and references used in the
creation of this document.
1.2 Scope
This guidance will cover generic (non-industry specific) implementations only at this time. While some
applications discussed herein may apply only to a few vertical markets, the examples and illustrations likely will
refer to a specific industry. Despite this, the guidance should be regarded as neutral in all aspects, and any
inference to a specific vendor or industry is purely accidental. This guide will not address specific requirements
that individual SecaaS providers may have in order to establish the service.
Applications and devices designed to achieve objectives such as protecting the perimeter, managing access
rights, and securing against challenging end point vulnerabilities are often mutually exclusive in terms of their
effectiveness, and offer no centralized oversight to the critical threats that can pose the greatest risks to a cloud
infrastructure. A SIEM can help gain centralized visibility, leverage the value of existing investments and prepare
for potential threats that could compromise their business-critical information assets. A SIEM establishes an
early warning system to take helpful preventative actions. An effective early warning system detects threats
based on a global perspective and provides in-depth information about them. It also recommends measures
that can be taken to protect the cloud infrastructure. As part of the implementation of a SIEM solution, tuning is
performed to reduce false positive alerts and ensure that the device provides relevant information to each
specific environment.
The information collected by the SIEM is typically aggregated (put into a single stream) and normalized
(translated into a standardized format) by the SIEM to reduce duplicates and to expedite subsequent analysis. It
is then correlated between data sources and analyzed against a set of human defined rules, or vendor supplied
or security analyst programmed correlation algorithms, to provide real-time reporting and alerting on
incidents/events that may require intervention. The subsequent data is typically stored in a manner that
prevents tampering to enable their use as evidence in any investigations or to meet compliance requirements.
The SIEM provides maintenance and authoring of correlation rules and allows system rules to cover a multitude
of conditions. In addition to condition action rules, a SIEM often supports rules that can execute based on
arbitrary conditions as well as anomalous behavior. An example of such a rule is a negative condition rule,
where the absence of an event over a period of time executes a rule, such as a back-up process that misses a
scheduled routine.
Traditional “on-premises” SIEM implementations often take considerably more effort and time to implement
successfully than businesses envision. SIEM projects, especially in SMBs or larger enterprises with limited IT
expertise, often fail to evolve past the planning phase or are only partially successful. This is often because the
required tuning and validation of SIEM events requires a specialized skill set and monitoring during the
implementation stages. The promise of SIEM provided from a cloud-based service can provide a scalable, fully
managed SIEM service that the customer can leverage and integrate with public cloud, private cloud, and on-
premise systems and infrastructure. It is important to note, however, that many of the same requirements still
exist, and the business needs to ensure that adequate resources are devoted to the initial set-up and
subsequent monitoring and maintenance of rules.
SIEM in the cloud enables the customer to test the service and gradually deploy and integrate it with their
systems, while paying only for the services they are using, rather than having to purchase a full SIEM solution up
front. Some clients may opt to leverage cloud-based SIEM services to monitor their systems in the public cloud
space while using their on premises SIEM implementation for their private cloud and traditional systems
implementations. In both cases, customers can opt to have the SIEM either simply hosted, with the customer
providing the monitoring of the log information, or fully managed, where the cloud SIEM provider performs the
monitoring and alerting services to the customer.
includes not just traditional threats presented by “hackers” on the web, but can include Advanced Persistent
Threats (APT), insider threats, and malware threats to the network. It also can be used to detect other forms of
questionable behavior such as insider trading, monitoring identity and access activities, unauthorized personnel
looking at health records in hospitals, fraud detection, privilege escalation, and more.
Newer SIEM logic capabilities include the ability to identify the threats and vulnerabilities in cloud
infrastructures, and provide remediation steps to address those threats in close to real time. This helps the
enterprise mitigate the added threats and vulnerabilities that come with migration of systems into the cloud
infrastructure.
Provisions for delegated and/or joint control must be described in detail in the SLA. This is particularly
important if the provider is tasked with monitoring and acting upon incidents which will then be worked
by analysts of both parties.
Requirements for availability, handling, storage, and disposal of proprietary and personally identifiable
information must be specifically stated, including geographical location of log and security data if
required for compliance.
Any requirements for encryption of data at rest and/or in motion must be delineated in detail including
who holds and/or controls the key materials.
Detailed requirements for incident response, business continuity and disaster recovery procedures and
operations must be spelled out.
Third-party audit arrangements must be made explicit. This is particularly important if law enforcement
agencies require access to the data collected by the provider. If the data resides in a different continent,
you may bear all the costs of the agency to travel to the location and collect it.
Notification procedures if the SecaaS SIEM provider is served with a legal dictate to provide access to
data that may include your data.
The requirement to ensure that the data collected by the SecaaS SIEM provider be collected and stored
in a forensically sound manner that meets the legal requirements of your particular country and
regulatory rules.
Availability requirements, to include the communications channels between the SecaaS SEIM provider
and you including notification window times for each alert severity.
Privacy and security of the data
If and how access to the data is arranged in the event it is needed for forensic purposes. Most providers
will grant you access to your own data only but not to affiliated data that may reveal additional
information that could be useful in an investigation.
The ability to audit the SecaaS SIEM vendor and their facilities. This may be particularly important if
your enterprise needs a SSAE 16 or SAS 70 audit, a PCI audit or other audit in order to demonstrate your
ability to comply with a rule or regulatory requirement.
Performance Guarantees and warranties should a SecaaS SIEM provider acts negligently or even
maliciously.
Ultimately, an organization’s contracts and/or legal office will be responsible for critically examining and
approving terms of any SLAs for the protection of the enterprise. It is incumbent upon the senior leadership to
ensure that all potential issues are raised, addressed and understood up front. The signee must thoroughly
understand the downsides of and worst cases in cloud-based SecaaS SIEM to help ensure that appropriate
provisions are included in the SLA. Ideally, the providers should include indemnity clauses, such that if they
make mistakes that are costly to their customers, the SecaaS SIEM provider will have to provide monetary
compensation to cover the harm done. Most providers will not want to do this but it is in the best interests of
the enterprise to ensure that all possible protections are in place and that there are compensation clauses for
mistakes and loss of service that results in costs to the enterprise. Any “hold harmless” clauses in a SecaaS SIEM
contract or SLA should automatically be eliminated.
Other implementation items to consider include reviewing the offering and making sure it fulfills all the business
requirements. Most SecaaS SIEM providers will limit their offering in several ways so an evaluation period may
be an important step. When evaluating SIEM as a service offering, customer should check the following:
Monitored devices – Most providers market their offer based on number of monitored devices. There
could be a difference between how their SIEM product counts device. Try to list all the devices that
should be included. Some SecaaS SIEM vendors will count a log server as a single device whereas others
will base their count on how many devices report in to the log server.
Supported device vs. unsupported – Some SecaaS SIEM providers will charge extra for unsupported
devices or devices that have unique log formats. Insist on viewing support matrix and understand how it
will affect the cost. If you are working with a virtualized environment, ensure that the SIEM can see
within each individual virtual machine and track changes within the hypervisor.
Number of reports / rules / EPS (event per second) – Some SecaaS SIEM provider will charge extra on
additional reports / events. Make sure that you are covered.
Standard vs. custom rules – Some SecaaS SIEM vendors will charge a per-rule fee for each rule invoked.
They may also charge extra for custom rules or rules that the enterprise create ad hoc to examine a
problem. This can become very expensive if the device is not tuned to your environment properly.
Number of dashboards or/and users – The number of dashboards and services made available for self
service and customer internal use of SIEM should be clearly defined. There is sometimes a “Per Seat”
charge for the dashboards and often the internal use of the SIEM is discouraged by charging extra for
that service.
Log retention, log access and log storage – Make sure the offering helps you address your regulatory
requirements; particularly where logs are stored and how access is controlled. Also, make sure that
once the logs are deleted in accordance with your retention specifications. If the retention policies
require active and then long-term retention, make sure that the vendor provides an option to transfer
the logs to the enterprise in a standard (non-proprietary) format for internal long term retention.
A secondary legal concern is that when data is collected, it may then create legal or political ramifications to
having the data and failing to take action on it. Realizing that not every bit of data can be thoroughly analyzed,
an enterprise must be ready to respond to questions as to why they had the data but did not act upon it. In
some situations in some places, not having the data may be more desirable than having the data and then failing
to act upon it.
It is always best to seek counsel to address any legal concerns that may arise.
Another option is to enlist the services of a SecaaS SIEM provider to monitor the enterprise external or cloud
assets while using a traditional SIEM to monitor the traditional and private cloud infrastructures (see figure 2).
These can then be linked by forwarding the SIEM traffic from the SecaaS SIEM to the “Master” SIEM in the
enterprise network for overall analysis and monitoring. The advantage of doing so it that the enterprise
minimizes its exposure of information to the SecaaS SIEM provider, and if the enterprise connectivity to the
internet is broken, they still have the enterprise SIEM to collect, analyze and respond to an incident while the
SecaaS SIEM continues to monitor the enterprise cloud assets.
The architecture selected should be based upon the business needs and the network architecture that the SIEM
architecture has to support.
Organizations usually have the ability to obfuscate what information is written to disk without dramatically
impacting the SecaaS SIEM provider’s ability to manage alerting from a global perspective. Similarly, some
technologies may allow users to selectively send information to their SecaaS SIEM after removing sensitive
details from the log files.
3.2 Concerns
The major concern of a cloud-based, SecaaS SIEM infrastructure is that when the infrastructure is under attack, a
poorly architected solution means that the analysts and senior management lose the security provided by the
SIEM infrastructure. An enterprise under a distributed DOS attack will most likely lose connectivity, response,
and remediation data from the SIEM if the SIEM systems share the enterprise network data flows. The response
to the incident is only as good as the security information it is based upon. Therefore, alternate routes for the
security systems should be considered.
Deperimeterization of security controls, including the SecaaS SIEM, is what is creating the most confusion in
security today. With the integration of public cloud-based services, private cloud services, traditional networks,
and the mobile workforce, a well layered and segmented approach needs to be created in order to support a
SIEM system. When the enterprise network is under attack or failing, the SIEM system infrastructure needs to
be solid so that the incident response teams can rely on the data to protect and remediate.
Disaster Recovery and Business Continuity (DR/BC) is another area of concern for network and security teams.
Often, the data within the SIEM system holds the clues to what happened and what problem that needs to be
addressed before the enterprise can be returned to normal. Furthermore, consideration needs to be given to
when the data feeds for the SIEM system fail and what happens to the data at that time. Most regulatory driven
systems require that a back-up system exist to gather the information so that when the security systems come
back on line, a proper forensic examination can occur with backup log feeds.
Time standards and delays must be addressed in the architecture. Most SIEM systems require a standard time
source and will timestamp all data as it arrives. If the SIEM system includes both a SecaaS SIEM and a traditional
SIEM, these timestamps must be synchronized to the same time standard to ensure that the two logs (a local
and a SecaaS SIEM vendor log) can be combined in a sound forensic manner for analysis. This is not an
impossible task since time delays between correlation at the vendor site and the return alert receipts along with
timestamps in the network logs can provide the information necessary to accomplish this.
Security of log data in transit and the security of log data at rest also need to be a major concern for the
architects. Encrypted data is useless if the keys are somehow corrupted or lost. The security of logs at the
vendor should not be protected by the same keys as those within the enterprise, and all the transactions
between the vendor and the enterprise needs to be accomplished using keys that are regularly.
4.0 Implementation
The integration of a SIEM, regardless of whether it is a purely SecaaS solution or a hybrid solution, needs to be
integrated into both the network architecture and the operational architecture. Implementation into the
physical architecture without integration into operational and policy architectures can render the SIEM
implementation of no use to the organization. The architectural and operational implementation considerations
are addressed in this section but no attempt is made to address policy issues, as they are highly regionalized and
vary widely depending on the industry they serve.
NOTE: For the purpose of the architectural and technical discussions, the SIEM will be referred to
generically as the SIEM or the SIEM system in lieu of attempting to define it as a cloud-based SIEM,
traditional SIEM or hybrid SIEM.
In some SIEM solutions, Log Management is a built-in or add-on component designed to work in conjunction
with an existing log management solution or to replace it. For some log management solutions, SIEM is the add-
on that can be acquired. SIEM takes input from network, host, database, application logs and other security
tools such as Vulnerability Management systems, firewalls, anti-malware systems, Data Loss Prevention systems
(DLP), honey-pot and honey-net systems, and Intrusion Detection/Protection Systems (IDS/IPS). It may also
gather data from network devices, servers such as Domain Name Servers (DNS), WEB servers, Active Directory
(AD) servers, database servers, and other key computing resources so that anomalies in network devices
(switches, routers, Wireless Access Points [WAPs], etc.) and system performances can be detected. Less
traditional sources of data can include Identity and Access Management (IAM) Systems, facility HVAC systems,
occupancy sensors or the lighting systems they control, Closed Circuit Television (CCTV) systems, fire control
systems, power management systems, and any other system that can provide pertinent data that helps define a
security event in the enterprise. A SIEM system can take almost any input that can be digitized and, through a
well written rule-set, will create an output.
Other deliverables include system compliance reporting to monitor real-time compliance with pertinent rules
and regulations. These could be standardized reports created regularly or could include ad hoc reports in
response to specific regulatory or leadership queries. Network and system performance data is often a security
domain (availability) that many architects ignore. Since all the network and Server systems feed their logs into
the SIEM, it stands to reason that the network and server management functions may be interested in the
infrastructure reports it is capable of generating in order to ensure the continued availability of the enterprise
network. For the network architecture and security architecture teams, the historical performance data
available from the SIEM logs provide important insight into where future problem areas may arise and allow
them to act proactively to ensure continued availability and integrity. The HR department may also leverage the
SIEM system to requested reports on employee activities and potential malfeasance. Active investigations can
be further assisted and automated using the SIEM to track an employee’s activities on the net in real-time.
When implementing SIEM as SecaaS SIEM only (as opposed to a hybrid system), it is likely for the provider to
install a log aggregator and collector within the local network of the customer. The log aggregator abilities
should match customer requirements and should be suitably positioned within the network to ensure protection
from internal and external attacks. Here is a list of common requirement by customers to review with your
SecaaS SIEM offering:
The log aggregator should support all protocols used for logging within the enterprise.
The log aggregator should have the ability to store logs for a specified amount of time if provider server
is unavailable or somehow disconnected.
Logs sent from aggregator to SecaaS SIEM provider should be encrypted, either by VPN, encrypting the
logs at source, or using trunk encryption devices. Note that SSL VPNs typically add a 30% overhead to
the data stream, which must be considered when capacity planning.
Some log aggregator can mask or filter out log items that contain confidential information. Internal
compression of logs before sending SIEM provider can help handle risks such as network latency.
4.1.4 Operations
The SIEM system architecture should also reflect the security operation edicts set forth by the enterprise. This
reflects how the alerts generated are monitored and who is monitoring them. If the alerts are monitored
locally, the infrastructure would be different that if monitored at the vendor. The subsequent response pattern
should also be addressed to include how communications will occur between the monitoring center and the IT
staff. If the monitoring is accomplished by the SIEM vendor, then a DOS attack would preclude the IT staff
receiving any email or SMS messaging alerting them. Conversely, if all alarms are monitored locally, a breach
and subsequent DOS attack in the cloud could take hours to receive eliminating the ability of the network and
security personnel to respond.
The response to alerts will dictate further security and architectural considerations depending on how incident
response is directed. If the SecaaS vendor is accountable for the response to an alert, considerations must be
given to how the vendor gains access to respond to the alert and how the enterprise IT staff and management is
kept appraised of their actions.
1. Comprehensive Enterprise Coverage – All production layers (networks, hosts, applications, databases,
identities) and environments (on-premise and cloud) must be considered as suspects of advanced
attacks and covered by SIEM system, even if they appear to be "healthy."
2. Information Interaction and Correlation – The SIEM system must have security data input sources from
events and logs of all network devices, hosts, databases, applications and identity directories in order to
create a full threat knowledge base for the enterprise. It is vital to intelligently correlate information to
derive meaningful information from a flood of data. Any systems not connected to the SIEM system is
therefore a non-player and its information cannot be used to detect and generate alerts, and any
attacks on them are virtually undetectable.
3. Technology Interaction and Correlation – The SIEM system must be integrated with other security
technologies, such as IDS/IPS, Firewall, DLP, IAM, Vulnerability Management, firewalls, and Anti-
Malware systems. Those technologies are correlation sources in order to lower false positive rates,
increase accuracy and breadth of security detection.
4. Business Interaction and Correlation – The SIEM system must be aware of business context. Advanced
attacks are usually targeted with a great deal of business information. When interaction and correlation
is extended with business information, ISRM will be capable of thinking as the enemy, predict an
attacker’s priorities, reduce the noise, and derive more meaningful intelligence.
5. Cross-Boundary Intelligence for Better Decision Making – Security activities and the intelligence that
results from SIEM output must not be in isolation. Organizational boundaries must be crossed by the
SIEM system to achieve enterprise security intelligence and support decisions for protection, response,
and recovery.
6. Visualized Output for Dynamic and Real-time Defense – The output of SIEM system must be visualized
to help drive preventive and corrective controls, to stop advanced attacks or block data exfiltration
attempts. Only easily consumable output can drastically reduce response time, minimize damage, and
all quick response to investigate and determine root cause of security issues and breaches.
Each of these factors should be analyzed to ensure that they support the needs of any proposed rules. Logging
configurations should be documented with documentation as to what each data feed is needed for. Finally,
these data feeds should not be considered final in any way. As the needs of the business change, as
vulnerabilities and operations change, the rules will require different data feeds to accomplish the business
objectives of the SIEM system.
help secure the enterprise. It will most likely bury the security staff in false positive alerts and may more
significantly allow situations that should have alerted go unnoticed (false negative). The simplest way to prevent
chaos and to start building the rule sets that supports the business drivers is to build individual scenarios to
describe violations that should be detected and responded to and the business, legal or regulatory justification.
The scenarios should include the situation and subsequent response, and are best when they contain active
verbs. The following are a set of simple scenarios:
Ed is a Security Analyst on the Security Investigation team. He used a different SIEM system from the one used
by IT and other organizations. Fortunately, all SIEM systems use a common information sharing format. Ed
configured his SIEM as the hub to get aggregated information from all SIEM systems, both on-premise and in the
cloud. He was able to correlate data companywide, share information with other IT organizations, and view the
security posture of the entire enterprise from a single pane of glass.
Georgia is a Security Analyst on the IT Operations Response team. Prior to the SIEM deployment, she spent
most of her time collecting vulnerability information and triaging an event. Only a small percentage of her time
was spent dealing with real incidents and working with the forensic team. After the SIEM deployment, her
vulnerability information workload was taken over by SIEM in an automated vulnerability information feed. She
could also quickly assess events during the triage time. The best part was that most events were correlated and
classified as noise by SIEM automatically. When a real attack incident happened, Georgia was able to quickly
contain the compromised system and work with other teams to help with the recovery phase.
Matt was an Anti-Malware architect in Security Operations team. Recently he felt that endpoint anti-malware
was not able to cover 100% of his needs. Some modern malware didn’t have signatures or patterns that the
anti-malware could detect or recognize. The enterprise malware reporting was provided by the anti-malware
server which is unable to correlate malware events with other security events. Correlation rules were
configured to link malware data with vulnerability data and asset data. The rule used vulnerability data to
qualify systems that had a chance for infection. The asset data helped link infected systems to it owners,
business roles and other asset parameters.
Finally, alert rules were set up and for infected systems, alerts were sent to owners and the operations team if
the malware failed to be cleaned. Other alerts were also trigged for repeated failed signature updates or
internal systems attempting to connect to systems/websites on the malware blacklist.
Kim was a security analyst on the Security Investigation team. One day, her manager called her into an
emergency meeting with people from the Security, Legal, and HR teams. She learned an anti-company article
was published in the Wall Street Journal. An anonymous author criticized her company for outsourcing jobs
abroad that hurt employment in the United States. A lot of detailed facts, such as contracts with India and
Chinese outsourcing companies, were shown as examples. This article trigged several demonstrations and press
attacks against the company. The team concluded that the author was an insider and asked Kim to help.
Kim then created and ran a custom SIEM user action report and specified a few disparate system logs including
the enterprise resource planning (ERP) system, contract management system, and the web servers’ logs used by
outsourcing projects. Based on user access activities, the report generated a list of suspicious users. After
further investigation of related activities, one of users was identified as the top suspect because they tried to
access related systems and servers more than others in this period of time. Additionally, they downloaded
related contract files that matched the content in the Wall Street Journal article.
Based on information from SIEM, the insider got caught, unable to deny their activities, and was finally
terminated based company policy.
Sam was a new hire in the Security operations team. One day, he configured the newly deployed SIEM to collect
login success/failure events from all servers in both on-premise and cloud environments. In the next few days,
he averaged a daily baseline of failed logins in SIEM. Based on his analysis, he configured two additional rules on
the SIEM.
A correlation rule: the daily logon failure is ##% more than the baseline.
An alerting rule: x number of login failures on any server in y number of minutes followed by
successful login within z number of minutes to the same server
Finally, he tuned the numbers through testing, so SIEM would generate a reliable login anomaly report from the
correlation rule and trigger alerts from the alerting rule without producing “false positives.”
After the rules were established, Sam’s team was able to see the server login anomaly trends in the dashboard,
add this data into the security health index for the CIOs scorecard, and receive alerts when a particular server is
under a brute force password attack.
Wendy was a Security Engineer who has spent a lot of time performing line of business web application security
code reviews, static code scans, and pen tests. However, she still could not guarantee web applications were
100% security bug free. She knew that most external attackers were exploiting website vulnerabilities and this
had led to a vast majority of security breaches.
Wendy was happy that the SIEM team worked with her and her internal customers to configure SIEM to detect
attacks against Web Servers and Web Applications. They decide to feed Windows event logs, Web server logs
and Web application logs into the SIEM.
Finally, she was able to use a rich set of reporting from the dashboard to monitor the websites:
Purpose: What is the purpose behind the rule? What business need or vulnerability does it address?
Author: Who do we contact if there is a problem?
Action: Action(s) and/or Output(s) required from the system when the rule is triggered.
Actor: Relative to a *(PERSON/TEAM)* who do we notify when the rule is triggered? If a significant
corporate decision needs to be made as a response to the alert, the actor should be empowered to
make the decision by the senior leadership.
Event: Specific scenario(s) to be evaluated. What action should we take when the rule is triggered?
What do we go looking for and where?
Context: Relevant environmental conditions. How does our knowledge of this environment affect how
we can refine the analysis and output? Some examples of context that should be considered are:
o Organizational Structure
o Business Units
o Application and/or Data Categorizations
o Network Segmentation, System Configurations
o Users
o “Hot Lists”
o Vulnerability Data
o Data/System/User Criticality
o other environment specific information
Timing: Within, before, at, during, after. Receiving the exact time from your devices can be tricky when
working with a SecaaS SIEM because the provider can monitor many devices from different time zone.
Tests are required on each device to make sure the right offset is applied and that the time stamps are
clearly understood.
Logic: Boolean Logic Statements (T/F) using AND, OR, IF, THEN, NOT as conditions.
Response: These are the active statements that indicate what the response should be by all actors.
“The system shall,” “Security staff must page/notify Compliance.” We have to” *(DO SOMETHING)*.
Without this information, performing an analysis or attempting to understand an alert can become a difficult
and time consuming task. The documentation enables security analysts to quickly look-up pertinent information
to the alert and determines what actions to take. It also enables much quicker response times for newer
personnel assigned to the Network Operations Center (NOC), Network Operations Security Center (NOSC), or
Security Operations Center (SOC). It also ensures that any requirements to notify compliance officers, take
actions, or gather data for breach solution systems is completed immediately. This is particularly important for
healthcare, financial and banking industries where breach notification requirements are legally required to be
prompt.
SIEM tools also require a lot of tuning. Rules have to be built with great care and attention to details in order to
work as intended. Well written rule sets will minimize false negatives and false positives enabling the security
staff to focus on meaningful alerts. The continued tuning of the rules by the security staff will ensure that
progress is made in these areas and that rules are updated to reflect changes in business practices, network
behaviors, and systems. By carefully documenting the logic and assumptions in each of the rules, when
corrections need to be made it can usually be pinpointed to a specific assumption or data point that needs to be
corrected. Rules must be carefully tailored and tuned to address the specific event that they are attempting to
detect.
Different SIEM systems leverage different rule constructions as appropriate to address specific applications and
events. These range from the simplest rules such as audit rules, to the most intricate rules, the inference-based
rules. As always, complexity is the enemy of security so rules should be developed using the simplest algorithms
possible that will accomplish the task. Every rule could be written as an inference-based rule but it would
consume excessive resources and be more likely to fail when needed most.
For some SecaaS SIEM vendors, all rules are predefined and an enterprise can choose to turn on or off any given
rule based on their business drivers. While this may be effective for some situations, it does not allow for the
tailoring or development of rule sets to address typical network behaviors and therefore may be of limited value
to many enterprises. Some vendors provide standard rule sets and then can create customized rules for
individual customers to support specific business requirements, for a fee. The advantage is that an enterprise
could simply express to the vendor how they want the rule to work without having to have their own analysts
know how to create or modify correlation rules. Then there are vendors who not only provide standard rules
and rule writing for a fee, but also enable the enterprise analysts to tailor specific rules or author new rules to
address specific business needs or vulnerabilities within the enterprise. While this is the most desirable for mid
and large enterprises due to the flexibility it provides, it is often the more expensive option.
Event A = Alert B
It simply reports that an event has occurred. Due to its simplicity, very little processing overhead is spent on
these so these tend to be the most desirable of the rules but because of its simplicity, it has a very limited use.
These patterns are often used to detect specific malware or attack patterns in the enterprise and react when a
pattern is matched. The logic is typically very simple and can generally be expressed in simple Boolean terms.
compares it to the statistical similarities of the evidence presented, and estimates the probability that an event
has or is occurring. Like with the Heuristic-based rules, if the probability exceeds a statistical level set by the
organization, it triggers the alert.
This is particularly useful when attempting to detect criminal behavior (insider trading, IP theft, etc.), breaches,
both internal and external, and other nefarious behavior. It is often used for behavioral anomaly detection.
Certain behaviors on a network are extremely consistent over time and if the behavioral patterns of users and
systems are recorded by the system, when the behaviors change more than a specified deviation set by the
analysts, an alert is triggered. While some behavioral patterns can be detected by heuristics, the more efficient
rules rely on Bayesian inference to predict whether a deviation in the pattern is potentially nefarious or not. It is
the most effective tool against zero-day attacks.
Active directory Changes made to Change made to financial department OU LOW MAIL
GPO
Check Point Failed login to CP Over 3 times in one hour HIGH SMS
console
Firewall + VPN Port scan and Detected port scan followed by MEDIUM MAIL
device auth attempt authentication attempt from same IP in
one hour
Active directory No check-in for A laptop computer has not checked in to LOW REPORT ONLY
30 days the network for 30 or more days
Active directory No check-in for A Web server has not checked in to the HIGH SMS
30 days network for 15 or more minutes
This is only a short list of possible alerts and responses. A full list should be developed, maintained, and updated
regularly by the security staff.
QA should include simulating all rules agreed between customer and provider to make sure they are triggered
correctly, tests including disconnecting the line to the provider to make sure logs are not lost, and the testing of
response scenarios on a quarterly or semi-annual basis.
Finally, if a rule fails to function, the first place to look is to ensure that the system generating the log data
needed for correlation must be supplying it. The number one reason for support calls for SIEM rules are
remedied by turning on the log data at the source so the SIEM facility can see it.
Kurtz, G., McClure, S., and Scambray, J. (2012). Hacking Exposed 7: Network Security Secrets & Solutions. 7th ed.
New York; McGraw-Hill.
Laundrup, J. (2008, July). Detecting Insider Trading using Automated Correlation. Adelphi MD; University of
Maryland.
Laundrup, J. (2009, June). Data Security Breaches: An Unstoppable Epidemic? CISO Lecture Series. The State of
California Office of Information Security. Sacramento CA.
Laundrup, J. (2011). Implementing SIEM in the Enterprise: A Plan for Success. San Carlos, CA; Emagined Security
Inc.
Laundrup, J. and Schultz, E. (2011, March 28-29). Cloud Computing Security and Auditing. Seattle WA; ISACA-
Puget Sound.
Net Forensics (2008). 10 Mistakes to Avoid in Evaluating Security Information Management Solutions. Edison,
NJ; Net Forensics Inc.
Pack, D. (2011, April 12). Using Correlation Rules To Perform Decentralized Threat Detection. The DiaLog
powered by LogRhythm. Retrieved from http://blog.logrhythm.com/security/using-correlation-rules-to-
perform-decentralized-threat-detection/
Schultz, E. (2010). Cloud Computing Security: A Look into the Future. San Carlos, CA; Emagined Security Inc.
Schultz, E., (2009, June 17). The In’s and Out’s of SIEM Technology. IX National Computer and Information
Security Conference. Bogota Colombia.
Book review, but provides some SIEM details and links to a potentially useful SIEM book for those who want to
read further: https://365.rsaconference.com/blogs/securityreading/2011/02/24/security-information-and-
event-management-siem-implementation