triage: the art of threat detection and risk assessment · pdf filethreat score / behavioral...

21
Company Confidential Triage: The Art of Threat Detection and Risk Assessment

Upload: vandang

Post on 15-Mar-2018

215 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Triage: The Art of Threat Detection and Risk Assessment · PDF fileThreat Score / Behavioral Indicators ... • Correlate indicators of compromise ... The Art of Threat Detection and

Company Confidential

Triage: The Art of Threat Detection and Risk Assessment

Page 2: Triage: The Art of Threat Detection and Risk Assessment · PDF fileThreat Score / Behavioral Indicators ... • Correlate indicators of compromise ... The Art of Threat Detection and

Seth GoldhammerDirector of Product ManagementLogRhythm

Paul DavisDirector, Advanced Threats Security Solution ArchitectsCisco

Page 3: Triage: The Art of Threat Detection and Risk Assessment · PDF fileThreat Score / Behavioral Indicators ... • Correlate indicators of compromise ... The Art of Threat Detection and

The Modern Cyber Threat Pandemic

MOTIVATED AND WELL-FUNDED THREAT ACTORS

Terrorists Nation States

MaliciousInsiders

HacktivistsOrganizedCrime

CREATIVE AND SOPHISTICATED ATTACKS

Zero-Day Exploits

CustomMalware

Social Engineering

Physical Compromise

Spear-Phishing

EXPANDING ATTACK SURFACE

Endpoint Network Cloud and SaaS

MobileDevices

Users IoT

$5 to $8Cloud Accounts

$50per Healthcare Record

WELL-ESTABLISHED CYBER-CRIME ECONOMY

$0.10 to $20Credit Card Number,E-mail Accounts (per 1000)

Up to $3,500Custom Malware

Up to $1,000 / dayDDoS Attack

DDoS

MODERNTHREAT

LANDSCAPE

Source Symantec, Underground black market: Thriving trade in stolen data, malware, and attack services. November 20, 2015; Medscape, Stolen EHR Charts Sell for $50 Each on Black Market, April 28, 2014

Page 4: Triage: The Art of Threat Detection and Risk Assessment · PDF fileThreat Score / Behavioral Indicators ... • Correlate indicators of compromise ... The Art of Threat Detection and

Signs of a good triage process

Detecting the “Unknown”

Threat AnalysisThreat IdentificationSafe Threat Eradication

Effectively

Coordination and Communication

Page 5: Triage: The Art of Threat Detection and Risk Assessment · PDF fileThreat Score / Behavioral Indicators ... • Correlate indicators of compromise ... The Art of Threat Detection and

Setting the stage

• Operations room• Millions of events• Some good, some bad• Cautious of alarm fatigue• Operations team

• Ready to respond• Monitor for the unexpected

• Having the Right Tools Is Critical:• To detect suspicious events

• To determine risk

• To take action

Random detection and response doesn’t work

Page 6: Triage: The Art of Threat Detection and Risk Assessment · PDF fileThreat Score / Behavioral Indicators ... • Correlate indicators of compromise ... The Art of Threat Detection and

Vigilance requires visibility at every vector

User

Network

Endpoint

Holistic Attack Surface

Endpoint

User

Network

User

Network

User

Endpoint

User

Network

User

User

Network

EndpointUser

Network

Endpoint

Network

Endpoint

User

Network

Endpoint

User

Network

User

User

User

Page 7: Triage: The Art of Threat Detection and Risk Assessment · PDF fileThreat Score / Behavioral Indicators ... • Correlate indicators of compromise ... The Art of Threat Detection and

Networking Devices Security Devices Systems & Applications Industry Specific Devices

FORENSIC DATA

ANALYSIS CONDITIONING

ANALYSIS

Identity Services

Network wide visibility and analytics

Page 8: Triage: The Art of Threat Detection and Risk Assessment · PDF fileThreat Score / Behavioral Indicators ... • Correlate indicators of compromise ... The Art of Threat Detection and

IdentityUser

PosturePrivilege

Device type

External Context

Threat IntelligenceIP ReputationGeoLocation

ApplicationAccess

TransactionsError

Behavior

HostProcessAccess

File ActivityResources

Internal Context

Business ValueAsset Classification

Risk RatingVulnerability

NetworkConnection

DirectionContentVolume

Manual discovery of what’s normal network activity is impractical due to the sheer volume of data across multiple types of dimensions.

An unmanageable volume of false positives based on benign anomalies

Significant blind spots / false negatives

Need an automated technology to learn behavioral attributes across multiple dimensions

Normal

LogRhythm: understanding ‘normal’

Page 9: Triage: The Art of Threat Detection and Risk Assessment · PDF fileThreat Score / Behavioral Indicators ... • Correlate indicators of compromise ... The Art of Threat Detection and

The question

• To escalate or not?

• RULE: Trust but verify

• WHY: You’re only as good as your last incident

Page 10: Triage: The Art of Threat Detection and Risk Assessment · PDF fileThreat Score / Behavioral Indicators ... • Correlate indicators of compromise ... The Art of Threat Detection and

Showing how AMP Threat Grid enables “Trust but Verify”

Page 11: Triage: The Art of Threat Detection and Risk Assessment · PDF fileThreat Score / Behavioral Indicators ... • Correlate indicators of compromise ... The Art of Threat Detection and

AMP Threat Grid platform allows you to correlates the sample result with millions of other samples and billions of artifacts

Actionable threat content and intelligence is generated that can be utilized and integrated into a variety of existing systems or used independently.

1100001110001110 1001 1101 1110011 0110011 101000 0110 00

101000 0110 00 0111000 111010011 101 1100001 110

1001 1101 1110011 0110011 101000 0110 00

Analyst or system (API) submits suspicious sample to Threat Grid

File Submissions

An automated engine observes, deconstructs, and analyzes using multiple techniques

Actionable threat content and intelligence is generated that can be

packaged and integrated in to a variety of existing systems or used

independently.

AMP Threat Grid platform correlates the sample result

with millions of other samples and billions of

artifacts

101000 0110 00 0111000 111010011 101 1100001 110

101000 0110 00 0111000 111010011 101 1100001 110

1001 1101 1110011 0110011 101000 0110 00

Threat Score / Behavioral IndicatorsBig Data Correlation Threat Feeds

Sample and Artifact Intelligence Database

Actionable Intelligence

Proprietary techniques for static and dynamic analysis

“Outside looking in” approach

700+ Behavioral Indicators

AMP Threat Grid

Feeds Malware Analysis and Threat Intelligence

Page 12: Triage: The Art of Threat Detection and Risk Assessment · PDF fileThreat Score / Behavioral Indicators ... • Correlate indicators of compromise ... The Art of Threat Detection and

Single Click to Enable Cisco AMP Threat Grid Integration

Threat data immediately leveraged in machine-based analytics and automatic evidence corroboration

LogRhythm threat intelligence service

Page 13: Triage: The Art of Threat Detection and Risk Assessment · PDF fileThreat Score / Behavioral Indicators ... • Correlate indicators of compromise ... The Art of Threat Detection and

• On-the-fly Lookups provide key details at the time of need• Integrated case management preserves all evidence to expedite analysis

Reduce time to detect, qualify emerging threats

Page 14: Triage: The Art of Threat Detection and Risk Assessment · PDF fileThreat Score / Behavioral Indicators ... • Correlate indicators of compromise ... The Art of Threat Detection and

• On-the-fly Lookups provide key details at the time of need• Integrated case management preserves all evidence to expedite analysis

Reduce time to detect, qualify emerging threats

Page 15: Triage: The Art of Threat Detection and Risk Assessment · PDF fileThreat Score / Behavioral Indicators ... • Correlate indicators of compromise ... The Art of Threat Detection and

The triage confirmation

Page 16: Triage: The Art of Threat Detection and Risk Assessment · PDF fileThreat Score / Behavioral Indicators ... • Correlate indicators of compromise ... The Art of Threat Detection and

The triage confirmation

Page 17: Triage: The Art of Threat Detection and Risk Assessment · PDF fileThreat Score / Behavioral Indicators ... • Correlate indicators of compromise ... The Art of Threat Detection and

Quickly capture scope of incident

Page 18: Triage: The Art of Threat Detection and Risk Assessment · PDF fileThreat Score / Behavioral Indicators ... • Correlate indicators of compromise ... The Art of Threat Detection and

Enabling fast effective triage

The marriage of visibility and context

• More confidence• Faster decisions• Effective response

Delivering

Page 19: Triage: The Art of Threat Detection and Risk Assessment · PDF fileThreat Score / Behavioral Indicators ... • Correlate indicators of compromise ... The Art of Threat Detection and

LogRhythm and Cisco AMP Threat Grid

• Correlate indicators of compromise (IOCs) to detect and respond to:

• Dangerous IPs accessing internal infrastructure• Users visiting risky URLs• Phishing attempts• Malware propagation• Other high impact activities

• Corroborate activity and expose behavioral anomalies:• Raises prioritization of corroborated activities

exhibiting compromise or infestation• Reduces false positives and delivers even higher

qualified alarms

Page 20: Triage: The Art of Threat Detection and Risk Assessment · PDF fileThreat Score / Behavioral Indicators ... • Correlate indicators of compromise ... The Art of Threat Detection and

A complete solution: Integrated for ease of use and efficient workflow

• AMP Threat Grid – Greater Context and Understanding of a Threat

• LogRhythm - Internal Context, Security Analytics, Detection, Response

Page 21: Triage: The Art of Threat Detection and Risk Assessment · PDF fileThreat Score / Behavioral Indicators ... • Correlate indicators of compromise ... The Art of Threat Detection and

Seth GoldhammerDirector of Product ManagementLogRhythm

Paul DavisDirector, Advanced Threats Security Solution ArchitectsCisco

Questions?