Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

5/12/2009
03:59 PM
Sara Peters
Sara Peters
Commentary
Connect Directly
Twitter
RSS
E-Mail
50%
50%

SIEM Case Study: Israeli e-government ISP

Want a case study on the slings and arrows of outrageous SIEM implementation? Sure you do. (Really. You do. Trust me on this one.) Assaf Keren, information security manager at the Israeli e-government recently briefed me on the challenges and lessons he is learning whilst implementing a SIEM center in the Israeli e-government ISP Project (called "Tehila")--a topic he first told us about during the SIEM Summit at the CSI Annual 2008 conf

Want a case study on the slings and arrows of outrageous SIEM implementation? Sure you do. (Really. You do. Trust me on this one.) Assaf Keren, information security manager at the Israeli e-government recently briefed me on the challenges and lessons he is learning whilst implementing a SIEM center in the Israeli e-government ISP Project (called "Tehila")--a topic he first told us about during the SIEM Summit at the CSI Annual 2008 conference in November.In essence, Keren's advice is that a successful SIEM implementation requires truly comprehensive planning, fastidious attention to detail, superb communication between concerned parties and attentive oversight of vendor activity.

A SIEM-security information and event management, or conversely security incident and event management, or security incident and event manager--is a powerful set of tools that, among other things, collects logs and aggregates and correlates those logs in a way that security managers can actually use. As Keren explains it (in a brief report we'll be publishing soon): "The correlation engine (using correlation rules or filters) takes different logs from different sensors and merges them together into one event. Furthermore, it uses information from the knowledge base and decides if this is an incident or just an event." By "knowledge base" he means the SIEM's information on log sources, the criticality of each system, a list of attacks and their severity-info the SIEM will use to determine how to define and respond to each incident.

Tehila's main tasks are to host government ministries' public-facing Web sites and Web services and to serve as ISP for government ministries (which is where the big challenges come in). The security team had first tried implementing a SIEM on Tehila six years ago, but Keren dubs the project a failure, and he shut it down about a year-and-a-half ago.

"We did it poorly," he confessed. "Poor planning. Poor management."

Part of the trouble, according to Keren, was inadequate coordination between the security team and other concerned parties. This lack of coordination actually caused Keren to leave out one segment when soliciting bids from vendors. Further, once they'd contracted a vendor, they didn't pay enough attention to what precisely the vendors were doing.

Now the Tehila security team is in the midst of a second go with a new operational design. One of the first building blocks is to learn exactly what your organization needs and expects from the SIEM; and Keren recommends you don't outsource this "theory phase." "You could hire a consultant," said Keren, "but they have an agenda. Any contractor or vendor always has their own agenda.

"For the theory phase you don't need to know a lot about SIEM," he added. "You just need some basic knowledge of SIEM. The more important thing is to really understand your organization's needs."

Further, once you've completed the theory phase and actually gotten a vendor working on the implementation, Keren advises you keep a close eye on their work, get your hands a little dirty and make sure the project suits your requirements.

Tehila's requirements border on massive. Keren says that about 60,000 government users use the ISP and approximately 10 million unique users use the ASP, and that Tehila is the target of huge numbers of attacks--thus the security team logs everything.

"We have a lot of logs," Keren said. "About 2-3G per hour." Hence, the need for a rich SIEM to make those logs intelligible and effective.

One place that the SIEM's available offerings falls short, Keren said, is in the task of finding Trojans--there was no distinct control available to specifically identify what's a Trojan and what isn't. So another, quite important, quite innovative segment of Tehila's SIEM project is the creation of a Trojan analysis system, which will apply 15 tests to the SIEM's information in order to sniff out the Trojans amidst so much data.

Keren said that the Israeli e-government's SIEM may not exactly work for an enterprise environment-which is why the all-encompassing theory phase is so important.

"The SIEM is the heart of your security system," he said. "If the SIEM goes wrong, the security is wrong."

In the July issue of the Alert (CSI members only), we'll be publishing Keren's complete run-down of the project, "Searching for the Needle: Insights from Implementing a Security Information and Event Management Center in the Israeli E-Government Project."

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-27941
PUBLISHED: 2021-05-06
Unconstrained Web access to the device's private encryption key in the QR code pairing mode in the eWeLink mobile application (through 4.9.2 on Android and through 4.9.1 on iOS) allows a physically proximate attacker to eavesdrop on Wi-Fi credentials and other sensitive information by monitoring the...
CVE-2021-29203
PUBLISHED: 2021-05-06
A security vulnerability has been identified in the HPE Edgeline Infrastructure Manager, also known as HPE Edgeline Infrastructure Management Software, prior to version 1.22. The vulnerability could be remotely exploited to bypass remote authentication leading to execution of arbitrary commands, gai...
CVE-2021-31737
PUBLISHED: 2021-05-06
emlog v5.3.1 and emlog v6.0.0 have a Remote Code Execution vulnerability due to upload of database backup file in admin/data.php.
CVE-2020-28198
PUBLISHED: 2021-05-06
** UNSUPPORTED WHEN ASSIGNED ** The 'id' parameter of IBM Tivoli Storage Manager Version 5 Release 2 (Command Line Administrative Interface, dsmadmc.exe) is vulnerable to an exploitable stack buffer overflow. Note: the vulnerability can be exploited when it is used in "interactive" mode wh...
CVE-2021-28665
PUBLISHED: 2021-05-06
Stormshield SNS with versions before 3.7.18, 3.11.6 and 4.1.6 has a memory-management defect in the SNMP plugin that can lead to excessive consumption of memory and CPU resources, and possibly a denial of service.