Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

3/5/2019
02:30 PM
Connect Directly
Twitter
RSS
E-Mail vvv
50%
50%

Care and Feeding of Your SIEM

Six simple steps to mitigate the grunt work and keep your organization safe.

System information and event management (SIEM) systems and intrusion detection and prevention systems (IDS/IPS) are our frontline defenses in an increasingly hostile world. As effective as they seem, if they're not properly configured and maintained, they can become essentially useless.

Part of the problem is that this work isn't sexy or easy — it's basically digital sanitation. But it's extremely important. Imagine what would happen if your company's garbage suddenly stopped being collected. While SIEM/IDS/IPS maintenance isn't quite as stinky, it's very similar. Networks change. Threat landscapes change. Most IDS rule sets don't change (other than getting bigger). Software or services stop being used. And unfortunately, somebody needs to paw through your SIEMS's entrails to find these things.

There are a few ways to mitigate the grunt work to make the task more manageable for your security engineers.

1. Roll Out Slowly
If you are just rolling out your SIEM/IDS/IPS system, avoid turning on everything at once — this is a major mistake. Turn on subnets or VLANs one by one — tuning as you go. A SIEM throwing out 100 alerts in a day is a sure bet of burning out your security analysts quickly, and pretty much ensures overly liberal whitelists will quickly become commonplace.

2. Good Documentation
Make sure every rule set added is documented (and reviewed by someone) when it is added. And make sure the documentation is complete. The "magic whitelist" is routinely encountered when doing audits. Such an incomplete entry usually happens at 4:59 p.m. on a Friday afternoon filled with false positives. Unfortunately, Monday rolls around and the whitelist isn't updated, and months later a similar alert is triggered. Make sure your documentation is precise and helpful. Don't allow any ambiguity. If something is a false positive, explain why.

3. Fine Tune (Preferably the First Time)
Don't rush through the configuring of your baseline — no matter how long it takes. Tuning out the legitimate false positives while taking the time to thoroughly investigate each alert is important. The more granular you can get your rule sets, the better. If you can pinpoint false positives from specific machines in a subnet, exclude the machines and not the subnet.

Remember that you are doing this not only to find stale or overly liberal policies but to improve performance. Your SIEM/IDS needs to process every single rule it encounters, so the more rules you have, the slower your device will be. Look for ways you can consolidate rules wherever possible — and toss the chaff.

4. Frequent Auditing
Make auditing a regular exercise. Instead of leaving the entire task to be done once a year, make the process a monthly or bimonthly process. Tie changes into a change control process wherever possible. If changes are made on the fly, make sure they are still entered into the change registry as an emergency modification. I can't stress enough how important building and maintaining a robust change control framework is; not only will it help drive security, your entire IT infrastructure will benefit.

Wherever possible, use this audit phase to help build or validate your configuration management database/asset tracking process. When you encounter a system, you should be able to identify what OS/apps/data are on this box, who is the point of contact, and ideally who the data custodian for the box is. This will drive not only security and business continuity processes, and improve efficiencies for the IT group as well.

5. Validate Log Flows
Make sure you routinely validate that traffic from all devices is still inbound. Often, outages of a significant period get silenced — only to not be turned back on when the outage is resolved. I've seen a company go well over a year before realizing there were no alerts triggering in their SIEM from an entire branch location.

6. Check Your Capacity
When establishing or reviewing your SIEM, be sure that your storage capacity is appropriate for your logs. A lot of solutions base their pricing on consumption — a cap on events per second, for example. Sometimes, companies decide to limit what they are logging in an event to keep pricing to a minimum. This can be a crucial mistake. Many — probably most — penetrations of networks initially occur on individual user machines rather than on critical systems. If you are monitoring only critical or major systems to save money, you might very well be missing all the initial warning signals of the initial intrusion. Your first indication might end up being when you see your database being sent across the wire.

Proper capacity doesn't just apply to the size of the SIEM's hard drives. It is critical to ensure that you have adequate staffing for deploying and maintaining a SIEM. Don't underestimate the manpower required when you budget for operations.

A properly configured and maintained SIEM/IDS can help save your bacon. But as you've seen here, they aren't devices you can simply deploy and forget about. They can be a big financial and logistical burden, but if you follow the tips discussed above, they can also be your company's best friend.

Related Content:

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.

Shane MacDougall is Senior Security Engineer at Mosaic451, a managed cybersecurity service provider (MSSP) and consultancy with specific expertise in building, operating, and defending some of the most highly secure networks in North America. View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Why Cybersecurity's Silence Matters to Black Lives
Tiffany Ricks, CEO, HacWare,  7/8/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11081
PUBLISHED: 2020-07-10
osquery before version 4.4.0 enables a priviledge escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables l...
CVE-2020-6114
PUBLISHED: 2020-07-10
An exploitable SQL injection vulnerability exists in the Admin Reports functionality of Glacies IceHRM v26.6.0.OS (Commit bb274de1751ffb9d09482fd2538f9950a94c510a) . A specially crafted HTTP request can cause SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerabi...
CVE-2020-15504
PUBLISHED: 2020-07-10
A SQL injection vulnerability in the user and admin web interfaces of Sophos XG Firewall v18.0 MR1 and older potentially allows an attacker to run arbitrary code remotely. The fix is built into the re-release of XG Firewall v18 MR-1 (named MR-1-Build396) and the v17.5 MR13 release. All other version...
CVE-2020-8190
PUBLISHED: 2020-07-10
Incorrect file permissions in Citrix ADC and Citrix Gateway before versions 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 allows privilege escalation.
CVE-2020-8191
PUBLISHED: 2020-07-10
Improper input validation in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 allows reflected Cross Site Scripting (XSS).