Slide 1

Slide 1 text

A “beat” of security Monica Sarbu and Tudor Golubenco

Slide 2

Slide 2 text

About us Monica Sarbu Software engineer and Beats team lead Tudor Golubenco Software engineer and Beats tech lead

Slide 3

Slide 3 text

No content

Slide 4

Slide 4 text

Beats are lightweight shippers that collect and ship all kinds of operational data to Elasticsearch

Slide 5

Slide 5 text

The Beats 5 30+ other community Beats shipping

Slide 6

Slide 6 text

Elastic Stack Kibana Elasticsearch Beats Logstash

Slide 7

Slide 7 text

Logging and Monitoring

Slide 8

Slide 8 text

Security

Slide 9

Slide 9 text

http://www.campussafetymagazine.com/article/friday_humor_6_major_security_fails

Slide 10

Slide 10 text

• NSA breaks in your network • Zero-day vulnerabilities • Heartbleed, Cloudbleed, Shellshock, etc. • Out of date software with known vulnerabilities • Weak passwords. Default passwords • Commit by mistake your AWS credentials in GitHub Security breaches 10

Slide 11

Slide 11 text

• You never find out • You find out from the press • You find out from the attackers who request a ransom • You find out from the AWS bill • You find out yourself, but after the harm was done • You find out yourself, but you are not sure what the harm was • You find out yourself, no harm was done, and you can prove it How do you find out? 11

Slide 12

Slide 12 text

Logging and Monitoring (for security)

Slide 13

Slide 13 text

Data Sources

Slide 14

Slide 14 text

auth logs • SSH logins (password or publickey, IP, GeoIP) • failed sudo attempts • useradd / groupadd

Slide 15

Slide 15 text

Windows logons • logon failure events from the Security event log

Slide 16

Slide 16 text

auditd • watch file accesses • new network connections • new processes

Slide 17

Slide 17 text

Running processes • find suspicious commands

Slide 18

Slide 18 text

Network connections • outbound connections initiated by a process • processes in listening mode

Slide 19

Slide 19 text

Demo