2014-11-18 07:52 AM
After having discussed a while ago in a few posts how complex scenarios can be accomplished by leveraging the flexibility of Security Analytics and customizing the product (Let's deliver some more value by customizing Security Analytics), I want now to present in a few articles some sample contents that may be used as a starting point to implement ad-hoc use cases within the different modules of the platform.
Let's start with reports and specifically with what can be achieved with the data stored in our concentrators and/or brokers (NWDB).
Very often, in a real production environment, simple reports just showing the top protocols or the risks found in the network are not enough. More and more users ask for complex and comprehensive reports, better if depicting a specific use case from different prospectives.
In such a situation, the signature-less approach of Security Analytics (especially when dealing with the network traffic) is ideal to spot a security issue out of the noise: the more indicators are pointing to the same direction, the more accurate the identification and eventually the response to a specific threat can be.
The sample report attached to this post is going exactly in this direction including many rules (29) which are going over the different phases of the cyber kill chain such as reconnaissance, break-in, lateral movement, data exfiltration and persistency.
For each phase, different rules try to highlight potentially anomalous/malicious scenarios. On top of those, the report includes also a Situational Awareness section (which can be useful to get an initial understanding of what has happened on the network before getting into details) and a Policy Violation section (to catch all the activities that are not part of an attack but related since violations of policies could weaken the security posture of an organization).
The table of contents of the report is the following:
Some of the rules are depending over custom meta keys, lists and correlation rules. Specifically the report has the following dependencies:
The package contains both the report definition, the dependencies and the report sample output (screenshot, PDF and HTML formats).
Credits for organizing the different phases and for articulating around specific rules go to our partner One eSecurity.
Disclaimer: please DO NOT consider what is described and attached to this post as RSA official content. As any other unofficial material, it has to be tested in a controlled environment first and impacts have to be evaluated carefully before being promoted in production. Also note the content I publish is usually intended to prove a concept rather than being fully working in any environments. As such, handle it with care.