Perimeter
5/12/2009
04:04 PM
Sara Peters
Sara Peters
Commentary
Connect Directly
Twitter
RSS
E-Mail
50%
50%

SIEM Case Study: Israeli E-Government ISP

Want a case study on the slings and arrows of outrageous SIEM implementation? Sure you do. (Really. You do. Trust me on this one.)

Want a case study on the slings and arrows of outrageous SIEM implementation? Sure you do. (Really. You do. Trust me on this one.)Assaf Keren, information security manager at the Israeli e-government, recently briefed me on the challenges and lessons he is learning while implementing a SIEM center for the Israeli e-government ISP Project (called "Tehila") -- a topic he first mentioned during the CSI Annual 2008 conference's SIEM Summit in November.

In essence, Keren's advice is that a successful security information and event management (SIEM) implementation requires truly comprehensive planning, fastidious attention to detail, superb communication between concerned parties, and attentive oversight of vendor activity.

SIEM (a.k.a. security incident and event management, or security incident and event manager) is a powerful set of tools that, among other things, collects logs, and then aggregates and correlates them in a way that security managers can actually use. As Keren explains it (in a brief report we'll be publishing soon): "The correlation engine (using correlation rules or filters) takes different logs from different sensors and merges them together into one event. Furthermore, it uses information from the knowledge base and decides if this is an incident or just an event."

By "knowledge base" he means the SIEM's information on log sources, the criticality of each system, and a list of attacks and their severity -- info the SIEM will use to determine how to define and respond to each incident.

Tehila's main tasks are to host government ministries' public-facing Websites and Web services and to serve as the ISP for government ministries (which is where the big challenges come in). The security team had first tried implementing a SIEM on Tehila six years ago, but Keren dubs the project a failure, and he shut it down about a year-and-a-half ago.

"We did it poorly," he confessed. "Poor planning. Poor management."

Part of the trouble, according to Keren, was inadequate coordination between the security team and other concerned parties. This lack of coordination actually caused Keren to leave out one segment when soliciting bids from vendors. Further, once they had contracted with vendors, Keren and his team didn't pay enough attention to what, precisely, they were doing.

Now the Tehila security team is in the midst of a second go with a new operational design. One of the first building blocks is to learn exactly what your organization needs and expects from the SIEM; Keren recommends you don't outsource this "theory phase." "You could hire a consultant," said Keren, "but they have an agenda. Any contractor or vendor always has their own agenda."

You don't need to know a lot about SIEM for the theory phase, he told me. "You just need some basic knowledge of SIEM," he said. "The more important thing is to really understand your organization's needs."

Furthermore, once you've completed the theory phase and actually have a vendor working on the implementation, Keren advises you keep a close eye on its work, get your hands a little dirty, and make sure the project suits your requirements.

Tehila's requirements border on massive. Keren said about 60,000 government users use the ISP, approximately 10 million unique users use the ASP, and that Tehila is the target of huge numbers of attacks -- thus the security team logs everything.

"We have a lot of logs," Keren said. "About 2 to 3G per hour." Hence, the need for a rich SIEM to make those logs intelligible and effective.

One place that the SIEM's available offerings falls short, Keren said, is in the task of finding Trojans -- there was no distinct control available to specifically identify what is a Trojan and what isn't. So another quite important, quite innovative segment of Tehila's SIEM project is the creation of a Trojan analysis system, which will apply 15 tests to the SIEM's information in order to sniff out the Trojans amidst so much data.

Keren said that the Israeli e-government's SIEM may not exactly work for an enterprise environment, which is why the all-encompassing theory phase is so important.

"The SIEM is the heart of your security system," he said. "If the SIEM goes wrong, the security is wrong."

In the July issue of Alert (CSI members only), we'll be publishing Keren's complete run-down of the project, called "Searching for the Needle: Insights from Implementing a Security Information and Event Management Center in the Israeli E-Government Project."

Sara Peters is senior editor at Computer Security Institute. Special to Dark Reading. Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7877
Published: 2014-10-30
Unspecified vulnerability in the kernel in HP HP-UX B.11.31 allows local users to cause a denial of service via unknown vectors.

CVE-2014-3051
Published: 2014-10-29
The Internet Service Monitor (ISM) agent in IBM Tivoli Composite Application Manager (ITCAM) for Transactions 7.1 and 7.2 before 7.2.0.3 IF28, 7.3 before 7.3.0.1 IF30, and 7.4 before 7.4.0.0 IF18 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof s...

CVE-2014-3668
Published: 2014-10-29
Buffer overflow in the date_from_ISO8601 function in the mkgmtime implementation in libxmlrpc/xmlrpc.c in the XMLRPC extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) via (1) a crafted first argument t...

CVE-2014-3669
Published: 2014-10-29
Integer overflow in the object_custom function in ext/standard/var_unserializer.c in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an argument to the unserialize function ...

CVE-2014-3670
Published: 2014-10-29
The exif_ifd_make_value function in exif.c in the EXIF extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 operates on floating-point arrays incorrectly, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly exec...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.