4.4: Explain security alerting and monitoring concepts and tools

Key Concepts in Security Controls

  • Types of Security Controls: Various controls can protect networks, hosts, and data, all generating log data and alerts.

  • Cybersecurity Challenges: Collecting and reviewing output from security controls is a primary challenge in cybersecurity for professionals.

  • Monitoring and Alerting Systems: Security professionals need to explain how to configure systems for effective monitoring and alerting of these data sources.

Security Information and Event Management (SIEM)

  • Definition: Software that assists in managing security data inputs and provides reporting and alerting.

  • Core Function: To collect and correlate data from various sources such as network sensors and appliance/host/application logs.

  • Data Sources: Includes logs from:

    • Windows and Linux-based hosts

    • Switches

    • Routers

    • Firewalls

    • Intrusion Detection Systems (IDS)

    • Packet sniffers

    • Vulnerability scanners

    • Malware scanners

    • Data Loss Prevention (DLP) systems.

  • Dashboard Features: Configurable dashboards provide a high-level overview of network security metrics.

Data Collection Methods in SIEM

Agent-Based Collection
  • Definition: Involves installing an agent service on each host that filters, aggregates, and normalizes log data before sending it to the SIEM.

  • Resource Usage: Agents can use between 50–500 MB of RAM depending on the activity.

Listener/Collector Collection
  • Definition: Hosts are configured to push changes to the SIEM server without needing an installed agent.

  • Common Use: Typically used for collecting logs from switches and routers, often utilizing Syslog protocol for log forwarding.

Sensor Collection
  • Definition: Involves capturing packet data and traffic flow using sniffer devices which can record network data directly.

  • Methods: Uses mirror port functionalities or taps on network media.

Log Aggregation

  • Definition: The normalization of data from various sources to ensure consistency and searchability within the SIEM.

  • Importance of Parsers: Each data source requires a specific parser to identify relevant attributes correlated with standard fields in the analysis.

  • Time Normalization: Ensures all logs reflect a consistent chronological timeline.

Correlation of Security Events

  • Definition: The process of interpreting relationships between data points to identify significant security incidents.

  • Correlation Rules: Statements that match certain conditions using logical expressions (AND, OR) and operators (e.g., ==, <, >).

    • Example: A single login failure should not generate alerts, but multiple failures for the same account in one hour should trigger investigation.

Alerting and Monitoring Activities

  • Functionality of SIEM: Facilitates alerting, reporting, and archiving after data collection and aggregation.

  • Single Pane of Glass: Refers to the consolidated view provided by the SIEM for managing security activities.

  • Threat Intelligence Feed: Integrates known threat actor indicators with the network's collected data for enhanced alerting capabilities.

Alert Response and Remediation

  • Incident Response Process: Includes analysis, containment, eradication, and recovery related to alerts.

  • Validation: Analysts determine whether an alert is a true positive or a false positive.

  • Quarantine: Involves isolating indicators of compromise (e.g., network addresses, hosts, files).

  • Automation Advantages: SIEM systems can automate validation and remediation processes via integrations with other security products.

Reporting Functionality

  • Purpose: Provides managerial insight into the security system's status.

  • Types of Reports:

    • Executive Reports: High-level summaries for decision-makers.

    • Manager Reports: Detailed operational data for cybersecurity leaders.

    • Compliance Reports: Information as required by regulatory agencies.

  • Typical Reporting Metrics:

    • Authentication data, privileged user account anomalies, incident statistics, and trend analyses.

Archiving and Data Retention

  • Retention Policy: Ensures historical data is maintained for defined periods for forensic evidence or compliance needs.

  • Log Rotation Scheme: Manages data to prevent performance degradation of SIEM by archiving outdated information.

Alert Tuning and Management

  • Need for Alert Tuning: Helps reduce false positives that waste analysts' time and can lead to alert fatigue.

  • Consequences of Alert Fatigue: Analysts may overlook serious incidents due to being overwhelmed by low-priority alerts.

  • False and True Negatives: Importance in assessing alert system performance; true negatives reflect accurately permitted events, while false negatives represent missed alerts about real threats.

Strategies for Reducing False Positives
  • Machine Learning (ML): Analyzes data sets produced by SIEM to adjust alert rules dynamically.

  • Rule Refinement: Adjust parameters based on feedback from analysts.

  • Dedicated Group Handling: Redirect high-volume alerts to specialized teams to mitigate spamming analysts' dashboards.

  • Continuous Monitoring: Oversight of alert volume and analyst feedback to adjust sensitivity.

Infrastructure Monitoring

  • Network Monitor vs. SIEM: Network monitors collect data about the health of network infrastructure but do not analyze traffic patterns in the same context as SIEM.

  • Usage of SNMP: Simple Network Management Protocol (SNMP) is used to monitor network appliances and detect issues.

NetFlow Monitoring
  • Definition: Cisco-developed method for reporting network flow to structured databases, now IETF standard as IPFIX.

  • Flow Collector: Records metadata about traffic instead of each frame.

  • 5-Tuple Definition: Key information defining a traffic flow: Source address, destination address, protocol, source port, destination port.

    • 7-Tuple: Adds input interface and IP type of service information.

System Monitoring

  • Functionality: Similar reporting for computer hosts as network monitors do for infrastructure.

  • Log Importance: Logs are crucial for diagnosing issues and providing security audit trails.

Antivirus and Endpoint Protection
  • Modern Solutions: Emphasis on endpoint protection platforms (EPPs) over traditional antivirus (A-V) solutions, incorporating AI and behavior analytics for threat detection.

Vulnerability Management and Compliance Scanning

  • Function of Vulnerability Scanners: Assess configurations and settings against established benchmarks to identify vulnerabilities or misconfigurations.

  • SCAP Overview: Security Content Automation Protocol (SCAP) facilitates automated compliance scanning and vulnerability assessment.

    • OVAL and XCCDF: XML schemas involved in determining system security status and best pratic configurations.