Upgrade to Pro — share decks privately, control downloads, hide ads and more …

A New Way of Thinking About Security

Thad Steele
February 21, 2018

A New Way of Thinking About Security

Kevin Keeney presented to an exclusive group of security experts in Minneapolis on how open source augments traditional security models, new ways of thinking about security, and new methods of finding, fixing, and finishing the bad actors from your network.

Thad Steele

February 21, 2018
Tweet

Other Decks in Technology

Transcript

  1. Agents can’t bend spoons… I've seen an agent punch through

    a concrete wall. Men have emptied entire clips at them and hit nothing but air. Yet their strength and their speed are still based in a world that is built on rules. Because of that, they will never be as strong or as fast as you can be. - Morpheus, The Matrix, 1999
  2. What’s a knight to do? • Intelligence & Operations •

    Hunting • Insider Threat • Automation & Orchestration
  3. KNOW THY SELF • Seems / Gaps / Blind spots

    • Culture • What is your most critical data? • Where are your most important systems? • Priority Defended Assets List (PDAL)
  4. Why do we need to conduct Hunt Operations? “Be the

    Hunter, not the Hunted.” -The Honorable James Mattis
  5. When • Start now! • Do it safely • Trained

    operators • Function as a team • Be willing to allow yourself, your people, and your leadership to fail.
  6. 20

  7. Endpoint Logs WEF Server Group Policy Windows Remote Management Wecutil

    OR Windows Event Viewer Winlog eats or NXLog Nate “Neutron” https://nathanguagenti.blogspot.com/
  8. Computers are useful… • Why have a human do what

    a computer can? • Speed • Accuracy • Elimination of errors
  9. Single install Extensions for the Elastic Stack Subscription pricing X-Pack

    Security Alerting Monitoring Reporting Graph Machine Learning
  10. 40 X-Pack Security • Username and password • Role-based access

    control • Field & document level security • Integrate with authentication systems Protect Data Access • SSL/TLS encryption Encrypt Data • Audit logging Provide Accountability
  11. 41

  12. 42 X-Pack Alerting Detect Changes in Your Data Get notified

    your way • Email, Slack, PagerDuty, HipChat or JIRA • Custom integration via webhooks • If you can query it, you can alert on it • Store & track alert history
  13. 43

  14. 44 X-Pack Machine Learning • Automate anomaly detection • Accelerate

    root cause analysis • Go beyond SIEM rules • Reduce false positives Unsupervised Machine Learning
  15. 45

  16. 46

  17. 47

  18. 48 X-Pack Graph • Uses relevance capabilities of Elasticsearch •

    Leverage API and UI-drive tool Find Connections in Your Data
  19. 49

  20. Enhance your security coverage with Elastic Scalable – Log everything

    and miss fewer attacks Real time – Interactive investigation and threat hunting at scale Analytics – Go beyond SIEM rules and improve threat detection Flexible – Fly and tune your sensors, enrich your data as needed.
  21. ES-Hadoop Security Analytics Architecture Web Proxies EDR / EPP IDS

    /IPS / NMS Kafka Redis Messaging Queue Logstash Workers (2+) LDAP Authentication AD Notification SSO X-Pack Kibana X-Pack Instances (2+) Custom UI Elasticsearch Clients Elasticsearch X-Pack Master (3) Ingest (X) Data – Hot (X) Data – Warm (X) Machine Learning (2+) Coordinating (X) Alerting (X) HEARTBEAT Beats FILEBEAT METRICBEAT PACKETBEAT WINGLOGBEAT AUDITBEAT SCANS DNS FILE SIEM Vulnerability Data & Threat Intelligence IP