Sei sulla pagina 1di 60

HANDBOOK ON

Information Security
Operations Center

Institute for Development and Research in


Banking Technology
(Established by Reserve Bank of India)
CONTENTS

Foreword 01

Chapter 1 - Security Essentials 02

Chapter 2 - ISOC Planning and Design 12

Chapter 3 - ISOC Integration and Implementation 23

Chapter 4 - Operating ISOC: Governance, People & Processes 32

Annex. 1 42

Annex. 2 43

Annex. 3 49

Glossary 53

© An IDRBT Publication, September 2017. All Rights Reserved.


For restricted circulation in the Indian Banking & Financial Sector.
Foreword

Early Warning System

W E are in the age of anyme anywhere


banking. Technology innovaon has moved
banking to desktops, laptops, tablets and mobiles.
The customer has grabbed banking into her palm.
Yet, she has issues with the new era digital banking
because of the increasing trend in failed or
fraudulent transacons. A few of the recent incidents
in the banking sector have shaken her confidence.
Banks have suffered financial losses on a few
occasions, but their reputaon loss is a ma er of
greater concern. The trust the customers need to
have in banks for parking with their hard earned
funds is crical for banking. Aer all, banking is based
on trust.
It is the responsibility of the banks to put in place all ISOC for banks. During interac on with the
necessary infrastructure and systems to ensure that concerned employees of banks, a need was felt to
digital banking is safe and secure. They have to bring out a Handbook on ISOC to help banks.
ensure confidenality, integrity and availability, the
three key requirements of secured banking. Accordingly, IDRBT with the acve parcipaon of
banks and soluon providers, prepared the current
Banks have been working on security soluons at Handbook on ISOC. It presents in detail the steps to
various levels. In order to put all such soluons be taken during conceiving, designing, building,
together and to build a system that not only maintaining and managing various phases of ISOC. It
integrates the best features of the soluons but also is expected that all security praconers in banks
a super structure that idenfies abnormalies early would benefit from the handbook in every stage of
and alerts stakeholders immediately, banks have ISOC implementaon.
started working on Informaon Security Operaon
Centers (ISOCs). As the general principles and pracces of security are
common among several organisa ons, the
Though there has been considerable work done by handbook may be useful not only to banks but also to
academicians, security soluon providers and banks financial instuons and other organizaons.
in the realm of ISOC, there are sll several issues and
concerns at the stage of implementaon of ISOC. The team that worked on the handbook deserve best
IDRBT has been organizing training programmes on compliments.

Date: September 01, 2017 (Dr. A. S. Ramasastri)


Place: Hyderabad Director, IDRBT

Handbook on Information Security Operations Center 01


Chapter 1
Security Essenals
B USINESS organisaons are highly dependent on
IT infrastructure, network system and
sophiscated soware applicaons. Through these
Center) emerged in order to address these concerns
and the ever-changing security threat landscape.
Informaon Security Operaon Center (ISOC) – “The
components, they are able to carry transacons with
ISOC is responsible for monitoring, detecng, and
uninterrupted flow of data and informaon across
isolang incidents and the management of the
geographical boundaries. Along with the benefits like
organisaon’s security products, network devices,
speed, automaon, ease, etc., these components
end-user devices, and systems. This funcon is
also brought threats and risks to the businesses in the
performed seven days a week, 24 hours per day. The
form of a acks like DDOS (Distributed Denial of
ISOC is the primary locaon of the staff and the
Service), data the, malware, etc.
systems dedicated for this funcon,” defines the
One of the major concerns is the ease and speed with Wikipedia
which businesses are being a acked / brought down,
The recent a acks on financial systems prove that
without even the a acker paying a visit to the
deploying defensive technologies like perimeter
physical facili es of the business. Securing
security and encrypon, etc., are not sufficient and
Informaon and Communicaon Technology (ICT)
one needs to constantly monitor the security.
draws a enon of the top management, regulators
Security is not a product that can be deployed and
and law-enforcement alike.
forgo en, rather it is a process that needs to be
As ICT evolved, securing business through ICT as well, connuous.
evolved over a period of me. When PCs invaded
The picture below shows the security features that
small and big office s alike, without Internet
became part of the overall IT security of a matured
connecon, an-virus was the security measure that
business organisaon. This secon provides an
was built into securing IT. When enterprise networks
insight into how each of the security specific points
were built, the security was enhanced with some
found their place in the organisaon. The Logical
more devices like Firewalls, IDS (Intrusion Detecon
Security framework presents the defence-in-depth,
System) and IPS (Intrusion Prevenon System), etc.
layered approach to security. It is broken down into
When majority of the business transacons are
five main groups:
stored in database and data leakage became a big
concern, another concept DLP (Data Leakage S Opera ons: Operang a security program
Prevenon) was brought in. In this manner, businesses requires the necessary tools to support change
reacvely kept adding security funconalies as and control and track assets based on asset
when the need was felt. classificaon framework. An effecve security
operaons program is underpinned by IT Service
At present, they are surrounded by too many security
Management. ITIL (Informaon Technology
devices to deal with, which are not well-integrated.
Infrastructure Library) is an industry respected
One of the major requirements of any security
framework to structure such a program.
management is incident response. As the devices
were not well-integrated, it became a bo leneck to S Identy and Access Control: People, process
detect threats and quickly respond to an incident. a n d te c h n o l o g y a re t h e p i l l a rs o f a ny
The idea of ISOC (Informaon Security Operaon organisaon and are interdependent on one

02 Handbook on Information Security Operations Center


Security Essentials

another in carrying business acvies. Identy


and Access Control technology can be used to
agencies started mandang data security
iniate, capture, record and manage idenes
pracces.
of user, device, service, system, etc., and their
related access permissions in an automated S Hosts: Security across endpoint devices that
fashion. This ensures that access privileges are include desktops, servers, laptops and mobile
granted according to single interpretaon of devices is an essenal and effecve process to
policy and all individuals and services are protect the underlying crical assets from
properly authencated, authorized and audited. compromise.
S Data: As organisaons increasingly leverage S Network: The underlying network architecture
automaon of business processes through is crical to protect the applicaons, services,
applicaons, more and more confidenal data is users and data from compromise. Fundamental
held within these plaorms. Securing this data controls are required to safeguard these assets
gained priority as regulators and government while being connected to the network.

Logical Security Architecture


Asset Configuration Vulnerability and Event Monitoring
Operations and Mgmt. Patch Mgmt. and Incident Mgmt. ISOC

Identity and Directory Services 2FA PIM SSO


Access Control

Big Data
Data Data Encryption DLP DAM E-Mail Security
Security Analytics

End Point
Hosts Anti Virus Host IDS WAF
Security
MDM/BYOD Anti-APT

Network Firewall IDS/IPS VPN Anti DDOS Honeypot NAC NBAD

Securing IT in an enterprise evolved with a focus on


domains like securing networks, securing hosts,
securing data, deploying identy and access controls
and with operaons across all these domains. 1.1.1 Firewalls: Network security started its
journey with basic firewalls and is now capable of
1.1 Network Security
filtering based on content of the packet instead of
Network security is a basic necessity today. Network just packet headers. Not able to go beyond the layer 4
Security Appliances help in protecng the computer intelligence of TCP/IP stack, firewalls just remained as
systems and other IT infrastructure inside the main entrance security gateways in the enre
network from unwanted intrusions or a acks. enterprise security space.

Handbook on Information Security Operations Center 03


Security Essentials

1.1.2 IDS/IPS: Intrusion detecon and prevenon 1.1.6 Network Access Control (NAC): Non-
systems detect/prevent network a acks by: compliant devices can be denied access to enterprise
network using NAC, isolang these insecure devices
S Filtering the traffic by applying known signatures
from infecng the rest of nodes in the network.
of the malware and malicious a acks
Examples of non-complaint devices include
S Analysing the traffic flow looking for deviaons unauthorized devices, un-patched and not updated
from normal behaviour and block the devices, etc.
connecon, if any anomaly found.
1.1.7 Network Behaviour Anomaly Detec on
Both IDS and IPS soluons detect threat acvity in (NBAD): Preventave security measures are oen
the form of malware, spyware, viruses, worms and defeated, by new polymorphic malware, and zero
other a ack types, as well as threats posed by policy day exploits. Therefore, it is important to be on the
violaons. The IDS/IPS systems lack the visibility into watch for intruders. NBAD analyses the flow of data
applicaon layer of TCP/IP stack and hence may not across all devices to understand the deviaons from
protect from applicaon specific a acks. normal traffic. For example, certain type of traffic,
say Skype from normal users can be acceptable, but
1.1.3 Virtual Private Network (VPN): To protect data
the same type of traffic from servers is very
traversing on shared communicaon links from
suspicious. NBAD is useful in detecng the suspicious
a acks like spoofing and tampering, encrypng the
behaviour and can guide the security experts in
data on wire has become necessary. VPN creates
forming rules to prevent such events to occur in
private confidenal networks on top of shared public
future.
networks like Internet by encrypng the data. VPNs
thus are tamper-proof and provide secure remote 1.2 Host Security
employee log-in and remote branch office
connecon to the enterprise resources. Hosts are the main access points to the crical assets
of the enterprise and hence it is imperave to secure
1.1.4 An -DDoS: Distributed Denial of Service the hosts.
(DDoS) is the fastest growing threat. It aims at
bringing down the crical IT resources, by sending 1.2.1 An-Virus: The most common basic security
malicious traffic and thereby exhausng the crical deployed on every host is an-virus.
resource capacity. DOS a acks can happen at any 1.2.2 Host IDS: As an-virus systems work based on
layer of TCP/IP, right from flooding the routers to signature verificaon and cannot protect hosts from
opening huge number of connecons to target zero-day malware, the servers are protected by
applicaons. The soluons also vary at each layer. another layer of security, which is host based IDS. The
ISPs (Internet Service Providers) offer layer 3 and main goal of host IDS is to keep the integrity of the
layer 4 DDoS protecon services, guaranteeing clean server intact. It keeps monitoring the suspicious
pipes from volumetric DDoS a acks. However, to operaons like configuraon changes, registry
prevent layer 7 DDoS a acks, on-premise DDoS changes, log re-writes, file deletes, etc. and
detecon and prevenon devices need to be put in immediately alerts/blocks as per policy.
place.
1.2.3 Web Applicaon Firewall (WAF): The fastest
1.1.5 Honeypots: These are traps set up inside the growing categories of a acks and data breaches are
network waing for someone to a ack. They work on those that target applicaons. There are countless
simple concept; alert the security administrator the possibilies to exploit code vulnerabilies and
moment a contact is made to them.

04 Handbook on Information Security Operations Center


Security Essentials

applicaon modules. Almost every web-based applicaon has one or more web applicaon vulnerabilies
listed in OWASP top 10 list. OWASP reported that 95% websites are compromised by cross-site scripng a ack.

Application Threats: OWASP Top 10

S. No. Threat Firewall WAF


1 Injection (SQL, OS and LDAP) No Yes
2 Broken Authentication and Session Management No Yes
3 Cross-Site Scripting No Yes
4 Insecure Direct Object References No Yes
5 Security Misconfiguration No Yes
6 Sensitive Data Exposure Yes Yes
7 Missing Function Level Access Control No Yes
8 Cross-site Request Forgery (CSRF) No Yes
9 Using Components with Known Vulnerabilities No Yes
10 Unvalidated Redirects and Forwards No Yes

1.2.4 Endpoint Security: For overall enterprise


security, it is essenal to keep all endpoint devices 1.2.5 Mobile Device Management (MDM): MDM
clean, malware free and up-to-date with all required soware strengthens security through remote
patches. EndPoint Security’s main objecves include: monitoring and control of security configuraons,
S Endpoints are authenc (2FA, AAA) policy enforcement and patch pushes to mobile
devices. Further, these systems can remotely lock
S Endpoints are configured properly (Configuraon
lost, stolen or compromised mobile devices and, if
management)
needed, wipe all stored data.
S Endpointsarecleanandvirusfree(Anvirus/HIPS)
1.2.6 An-APT: Advanced Persistent Threats (APT)
S Endpoints are not vulnerable (vulnerability
are custom-made targeted a acks. They are capable
scanning and management)
of compromising the targeted systems with
S Endpoints are up-to-date with all necessary
advanced coding techniques that circumvent the
patches (Patch Management). tradional signature based virus detecon. The APT
Only authenc and secure endpoints should be detecon plaorms are designed to execute the
allowed to access the enterprise network resources. suspicious files/codes in a sandbox environment,
understand their acvity (registry changes, file
read/write, botnet communica on, etc.) and
accordingly allow or deny the suspicious file to enter
the enterprise network.

Handbook on Information Security Operations Center 05


Security Essentials

1.3 Data Security Monitoring Data at Rest: Content discovery by


scanning of storage and other content repositories at
Data being one of the most crical assets, keeping regular intervals helps idenfy where sensive
the enterprise data safe and secure through various content is located. For example, one can use a DLP
means is important. product to scan the servers and idenfy documents
1.3.1 Cryptographic Techniques with credit card numbers. If that server is not
authorized to keep that kind of data, the file can be
Cryptographic techniques address two major encrypted or removed, or a warning sent to the file
security challenges – confidenality and integrity. PKI owner.
(Public Key Infrastructure) in addion is able to
address authencaon and non-repudiaon. While Monitoring Data in Moon: This involves sniffing of
the cryptographic techniques are good at traffic on the network to idenfy content being sent
safeguarding the data at rest and data in moon, across specific communicaons channels. For
they are weak in protecng the data being in example, DLP can sniff emails, instant messages, and
operaon. A acks like man-in-memory or man-in- web traffic for snippets of sensive source code,
browser target the data, once it was decrypted or just credit cards, etc. Data in moon protecon tools can
before it is about to be encrypted. Moreover, oen block data leakage based on central data
majority of mes encrypon technologies are security policies, depending on the type of traffic.
overlooked by applica on developers and Monitoring Data in Use: This aspect is addressed by
applicaons get deployed without proper usage of endpoint soluons that monitor data as the user
encrypon. interacts with it. For example, they can idenfy the
1.3.2 Data Leakage Prevenon transmission of sensive document to a USB drive
and block it (instead of blocking USB drive), including
According to “Intel Security 2016 Data Protecon things like copy and paste, etc.
Benchmark Study”, over 25% of organisaons do not
monitor access to employee or customer The success of DLP tools are very dependent on
informaon. classificaon of data, idenfying data ownership,
data security policy and data governance.
Employee Sends Web Mail 1.3.3 Database Acvity Monitoring (DAM)
Various emails

Block Supplier
Monitoring database acvity is a crical component
Encrypt
Networks of database security, especially as informaon that is
Enterprise
DLP Network more sensive is consolidated into larger databases.
Agent
DLP Server Block
Social Database Acvity Monitoring involves the capturing
Encrypt Networks and recording of all Structured Query Language (SQL)
Partner acvity in real-me or near real-me. They can
Networks monitor database administrator acvity, across
mulple database plaorms; and can generate alerts
Data Leakage Prevenon (DLP) soluons protect on policy violaons. Database acvity monitoring
sensive data and provide insight into the use of takes place at various levels by different tools.
content within the enterprise. This includes three However, five features disnguish Database Acvity
major aspects: Monitoring tools:

06 Handbook on Information Security Operations Center


Security Essentials

S Monitoring: Monitor and audit all database applicaons and its underlying plaorm with “need
acvity, like administrator acvity and Select to know/access” policy defined by the business layer.
transac ons. Tools can capture all SQL
1.4.1 Directory Services
transacons: DML, DDL, DCL, (and somemes
TCL) acvity. Directory is like a registry where all informaon
about users, groups, computers, servers, printers,
S Secure Storage: Storing monitoring and audit
network shares, and more are stored. Each of these
data securely outside the database.
are considered objects and have a ributes
S Correlaon and Analysis: These tools aggregate associated with them in the directory. Security
and correlate ac vity from mul ple policies can be built on top of this informaon. Based
heterogeneous Database Management Systems on these policies, directory services can carry out
(DBMSs). Tools can work with mulple DBMSs single sign-on to network resources; lock down
(e.g., Oracle, SQL Server & DB2) and normalize desktop configuraons and prevent access to specific
transacons from different DBMSs overcoming operaons such as soware installaon or registry
the differences among many SQL flavours. eding; and set access control privileges on directory
objects. Directory services are one of the first
S Segregaon of Dues: Enforce separaon of
centralised (single point) controllers of all
dues on database administrators. Auding
applicaons, users, databases, files, etc., in an
must include monitoring of DBA acvity, and
enterprise network. However, due to pla orm
soluons should prevent manipulaon or
dependency, today directory services control only
tampering of logs or any such recorded acvity.
few secons of the enterprise IT resources.
S Alert Mechanism: Generate alerts on policy
1.4.2 Two Factor Authencaon (2FA)
violaons. Not only just recording database
acvity, they also provide real-me monitoring 2FA is an extra security layer that authencates the
and rule-based alerng. For example, a rule can user with one more factor over and above the usual
be created to generate an alert whenever a DBA password. Usually the second factor is a dynamic OTP
performs a select query on a parcular column, (One-me Password) communicated with the
say credit card. customers (external users) over a different device
they own and on a different channel, like OTPs sent
1.3.4 E-Mail Security: E-mail is a popular a ack
over mobile for Internet Banking. For internal users,
vector and hence individual and business accounts
biometric is a norm used as second factor to operate
need to be protected. E-mail acts as a launchpad for
sensive crical applicaons.
a acks like spam, phishing and spreading malware,
etc. Secure e-mail gateway that scans all e-mails and 1.4.3 Privileged Identy Module (PIM)
filters the malicious e-mails is now common across all
The IT personnel who maintain servers, network
enterprises.
components, and soware are given elevated
1.4 Identy and Access Control permissions needed to manage and maintain the IT
infrastructure. Called privileged idenes, they are
Various tools should be used to enforce the allowed unrestricted access to view and change data,
applica on or resource usage policy via the alter configuraon se ngs, and run programs.
mechanism of access to the applicaons. Identy Business applicaons and computer services must
and access management soluon with central also store and use privileged creden als to
directory of iden  es are integrated with authencate with databases, middleware, and other

Handbook on Information Security Operations Center 07


Security Essentials

applicaons when requesng sensive informaon 1.5.1 Service Asset Configuraon and Management
and compung resources. (SACM)
Control on these administrave rights with Privilege According to ITIL, SACM is the process responsible for
Identy Management (PIM) tools is required. ensuring that the assets required to deliver services
Through PIM, one can manage and monitor the are properly controlled, and that accurate and
acons of the privileged idenes and enforce reliable informaon about those assets is available
authen ca on policies including mul factor when and where it is needed. This informaon
authencaon and raise alerts in case of policy includes details of how the assets have been
viola ons. PIM soware auto-discovers and configured and the relaonships between assets.
catalogues privileged accounts present on a wide The ITIL standard gives complete details about
range of systems and applica ons and then Service Asset Configuraon and Management.
propagates password changes wherever the account
The ITSM (IT Service Management) tool to deploy ITIL
is referenced in order to prevent account lockouts
best pracces comes in as a central ITSM tool with
and service failures that can otherwise occur when
various modules. The heart of this tool is a CMDB
manual processes deploy obsolete credenals.
(Configuraon Management Database), which holds
1.4.4 Single Sign-on (SSO) the detailed informaon of all the assets, its inter-
linkage, configuraons, etc. This becomes an ideal
SSO allows user to login once with single-ID to access
source of any informaon about IT assets. All the
all applicaons and plaorms. The user is authorised
other modules for ITSM will take the asset
to access, and eliminates further prompts when they
informaon from this central tool to correlate the
switch applicaons during a parcular session.
informaon and provide meaningful intelligence.
Single sign off allows logging out from all the systems
Modules like Service Desk, Change Management,
with single log-out. However, logging off a parcular
Asset Management, Problem Management,
applicaon does not log them out of all applicaons
Knowledge Management, CMDB, Vulnerability
they were accessing.
Management, Fault, Performance Availability and
SSO is always treated as a convenience from user Incident Management should be integrated to take in
angle, however the main advantage of SSO is that data from one module, perform the funcon and
when an employee leaves an organisaon, it is easy pass on to the next module for automated
to disable his/her access to all resources in one go, by escalaons and management. Annexure 1.1 provides
removing his ID and thereby protecng all resources the maturity model for Asset Configuraon and
s/he was given access to. Management.

1.5 Operaons 1.5.2 Vulnerability and Patch Management

Operang a security program requires the necessary It has become very common for vendors of
tools to support change control, and track assets hardware, soware, network devices, security
based on asset classificaon framework. An effecve soluons, etc., to keep releasing patches to close the
security operaons program is underpinned by an IT vulnerabilies. Not patching the systems leave the
Service Management. enterprise in a greater risk. Manual patching takes
too long a me and leaves no audit trail of the whole
exercise. Modern enterprises are automang the
process of vulnerability and patch management
through centralised tools.

08 Handbook on Information Security Operations Center


Security Essentials

VULNERABILITY MANAGEMENT MATURITY MODEL

Level 0 Level 1 Level 2 Level 3 Level 4 Level 5


ASSESSMENT & ANALYSIS & ATTACK BUISINESS-RISK
NON-EXISTENT SCANNING COMPLIANCE PRIORITIZATION MANAGEMENT MANAGEMENT

No Vulnerability Vulnerability Assessment Driven by Regulatory Risk-focused Attacker and threat Threat and risk aligned
Scanning Solution in Place Framework focused with business goals

Manual Vulnerability Ad-hoc Vulnerability Scheduled Vulnerability Scan data prioritized Multiple threat-vectors All threat-vectors
Assessments Scanning Scanning through analytics scanned and prioritized scanned and prioritized
Patching data-driven Patching basd on risk
Haphazard Patching Rudimentary Patching Scan to Patch Lifecycle Continuous patching
by priority to critical assets

No Process Exist Basic Processes Emerging Processes Measurable Processes Efficient, metrics-based Unified business and
processes IT Processes
No Metrics Basic Metrics Little Measurability. Emerging Metrics and Threat-driven metrics Measurement integrated
Busy Metrics Trends and trends to enterprise risk mgmt.

Business Ignorance Awareness & Early Maturity Business Risk & Context

PEAK DATA OVERLOAD EFFECTIVE PRIORITIZATION

Source: https://www.rsaconference.com/blogs/growing-up-a-roadmap-to-vulnerability-management-maturity

1.5.3 Security Incident and Event Management advanced cyber security products/services, expert
(SIEM) human resources and industry best pracces and
processes.ISOCimplementaonand operaonalizaon
SIEM is a tool that collects logs and events from
plays crucial role in achieving the objecve of
various security infrastructure, systems and
providing in-depth centralized visibility into
applicaons and stores it centrally. It also helps in
organizaon's IT infrastructure to monitor, detect,
normalizing the logs/events of different types from
p r e v e n t a n d m i  ga t e s e c u r i t y i n c i d e n t s .
different nodes to a standard pa ern. The collecon
Organisaons need to focus more on rapid detecon
and storing are done in a compressed form to save
and response mechanisms, apart from technologies
the network and storage resources. Once collected,
that prevent intrusions. Quick detecon and
these logs/events are analysed, correlated and
remediaon is possible only by automang the
meaningful intelligence is provided on a central
security operaons. Such automaon frees up
console with various customizable dashboards for
analysts from mundane tasks and allows them to
faster reacon and idenficaon of root cause of the
concentrate on higher priority risks affecng the
incident. More details on SIEM are available in the
most crical assets and data. ISOC automaon
upcoming chapters.
capability is going to be a major disnguishing factor
1.5.4 Security Operaons Center in assessing an ISOC product/technology.
Security Operaons Center is a generic term An advanced implementa on of Informa on
describing a plaorm set up for the purpose of Security Opera ons Center (ISOC) may have
providing detecon and mely reacve services to following addi onal components. Upon
security incidents. implementa on of a basic version of ISOC,
organisaons may build these funconalies in their
ISOC soluon is an integrated deployment of
ISOC.

Handbook on Information Security Operations Center 09


Security Essentials

S User and Enty Behaviour Analycs: A ackers systems, instead of just glancing at logs, flows
tend to compromise legimate user accounts to and packets. The future is the accuracy and
access the target system. However, different speed of detecon for security threats that can
users exhibit different pa ern of acvies. exceed the ability of a ackers to hide in the
Analysis of user behaviour data helps to create a noise.
baseline of normal user and reports suspicious
S Cyber Threat Hunng: Cyber threat hunng,
anomalous behaviour. This fact leads to
according to Wikipedia, is “the process of
differenate a legimate user from an intruder.
proacvely and iteravely searching through
Machine learning based techniques have
networks to detect and isolate advanced threats
successfully demonstrated detecon of this kind
that evade exisng security soluons.” This is in
of compromise. Recently, user behaviour
contrast to tradional threat management
analy cs transformed to user and en ty
measures, such as firewalls, intrusion detecon
behaviour analycs for effecve detecon of
systems (IDS), and SIEM Systems, which typically
various frauds including insider threat.
involve an invesgaon aer there has been a
Signature-less behaviour-based analycs is a
warning of a potenal threat or an incident has
new approach for detecng insider and targeted
occurred.
cyber threats.
Cyber hunng plaorm, which work in real-me
S Digital Forensic Capabili es: Though this
and are network-based are available now. They
capability is menoned as one of the basic
empower the cyber hunter to idenfy zero-day
funcons of ISOC, very few organisaons plan
threats by quickly deploying constant analycs
and implement this. As a future expansion, ISOC
at large scale. They use dynamic – on the wire –
may develop forensic capabilies for idenfying,
analysis. Being on the network allows the
preser ving , recovering , analyzing , and
organisaon to be proacve. They believe that
presenng digital evidences to establish a digital
packets do not lie. The malware author's “tricks”
crime. This capability of ISOC team will lead to a
for obfuscaon, cannot divert or mislead these
quick response to any adverse situaon.
plaorms.
S Big Data Analycs: Storing and querying large
S Decepon Networks: Unlike a honeypot – these
amounts of data collected by ISOC also requires
are just a set of devices set up to appear like a
database technologies capable of handling such
real network to induce an adversary to a ack – a
huge volumes and also which supports future
decepon network is all or part of the actual
scaling up. Relaonal databases to store and
enterprise that is instrumented and protected
query data might not scale well and could pose a
such that the adversary is allowed to engage and
problem for organisa ons as informa on
the engagement is captured forensically but
requirements con nue to grow. Big Data
does no harm. The benefit is that the adversary
plaorms can store and process large amounts
does not know that s/he is being tracked and
of data and would be the way forward for a
manipulated. They use “Decepons Everywhere
futurisc ISOC, which requires contextual
Technology" to neutralize targeted a acks and
retrieval of large amounts of data. This should
advanced persistent threats by creang a
also be compable with the tradional log
decepve layer across the enre network. This
management and SIEM tools.
provides an endless source of false informaon,
The future of ISOC lies in analysing data across all disrupng and detecng advanced a acks with

10 Handbook on Information Security Operations Center


Security Essentials

real-me forensics and without disrupon to


business. Taking a very different approach to
honeypot, this approach makes every endpoint References
part of the decepon. The adversary must try S h p://www.cisco.com/c/en/us/soluons/collateral
everything because he does not know what is /enterprise-networks/enterprise-network-
good and what is not. security/white-paper-c11-736595.pdf

Conclusion S h ps://www.rsaconference.com/writable/presenta
ons/file_upload/sec-w04_final.pdf
This chapter glanced though the exisng important
S h ps://securosis.com/assets/library/reports/DLP-
security soluons that are essenal in the present
Whitepaper.pdf
environment for any enterprise. The soluons
explained here are not exhausve but are indicave S h ps://www2.deloi e.com/content/dam/Deloi e/
only. Enterprises need to place SOP (Standard lu/Documents/technology/lu_dlp-data-lost-
Opera ng P rocedures) for all these security prevenon-soluon_02102014.pdf
soluons. S h ps://securosis.com/assets/library/reports/DAM-
Whitepaper-final.pdf
The following challenges remain despite rolling out
majority of the security soluons: S h p://iasaglobal.org /itabok/capability-
descripons/access-and-identy-management/
S Security data overload – Too many devices, too
S h p://www.oregon.gov/DAS/EISPD/ITIP/docs/Arch
much data
Ch6_AssetMgt_v1_0.doc pp. 3-5 (March 2004)
S Lack of event correlaon across mul-vendor
S Author cited by source: Patricia Adams of Gartner
sevices – IDS, Firewalls, An-Virus, and Hosts (Sep 10, 2003) in arcle: “Management Update: IT
S Excessive false posives Asset Management Stages Form the Stairway to
Success”
S No mely and targeted reporng
S Next-Generaon Security Operaons – Preview
S Minimizing risk against key assets h ps://nigesecurityguy.wordpress.com/2016/09/2
6/next-generaon-security-operaons-preview/
S Incident response mechanism.
S Is logging dead in the future of security threat
detecon? by Alex Taverner, December 2016,
h ps://www.cio-asia.com/print-arcle/105558/
S Next-generaon security monitoring and analycs by
Peter Stephenson,December 14, 2016
h ps://www.scmagazine.com/next-generaon-
security-monitoring-and-analycs/arcle/577705/
S Next-Generaon Security Operaons – Preview by
Nigel Willsonh ps://nigesecurityguy.wordpress.
com/2016/09/26/next-genera on-security-
operaons-preview/
S "Cyber threat hunng: How this vulnerability
detec on strategy gives analysts an edge -
TechRepublic". TechRepublic. 2016-06-07

Handbook on Information Security Operations Center 11


Chapter 2
ISOC Planning and Design
2.1 Why ISOC? S Consolidaon and centralizaon of all security
contextual informaon to correlate and analyze

E NSURING Confiden ality, Integrity and


Availability in today's modern IT-dependent
enterprise is a mammoth task. Banks would require
for proacve alerng and intelligence
S People and resources to manage and operate a

enterprise level visibility in order to comfortably structured process oriented operaons.


provide assurance to business and customers on the These can be done from a central place termed as
security of their informaon and trustworthy CSOC - Cyber Security Operaons Center. Further, the
nd
engagement. There are several opera onal Reserve Bank of India, vide its noficaon dated 2
challenges, which need to be overcome, including: June, 2016, has menoned that “Banks should
S Enterprise level security posture through
proacvely iniate the process of se ng up of and
appropriate reports and dashboards operaonalising an Informaon Security Operaons
Center (ISOC) to monitor and manage cyber risks in
S Adhering to mulple legal and regulatory real-me.”
compliance requirements like RBI Cyber Security
Guidelines, PCI DSS, ISO Security Standards, etc. 2.2 Definion of ISOC
S Priorizaon of incidents which need immediate The ISOC is responsible for monitoring, detecng,
a enon and remediaon alerng, raising and responding to security incidents
S Automang the patch management and the management of the organisaon’s security
S Idenfying and detecng more sophiscated products. A SOC typically funcons on a 24×7 basis in
a acks such as blended threat, APT, etc., which a week.
could bypass the exisng soluons. 2.3 Securing Execuve Support
S Real-me response and remediaon
Securing Execuve Support is imperave for the
S Carrying out forensics analysis to track down the success of a Security Operaons Center. To gain
sequence of events that allowed the execuve support, a proposal may be placed before
compromise. the top management with the following details:
The mely availability of this kind of visibility is of S Need for a ISOC
paramount importance, as it would determine the
S Regulatory and compliance requirements
response strategy and reducon of impact because
of security incidents. In order to have this visibility, S Short and long-term visions of ISOC aligning with
the following are required: organisaon’s Business and IT objecves
S Ro b u st p o l i c y b a c ke d by m a n a ge m e nt S People, Process, Technology and Governance
commitments to define the requirements of required to achieve the objecves of ISOC
security around business processes S Strategy for se ng up the ISOC (In-house or
S Security architecture with capability to provide outsourced)
contextual informaon about devices, users, S Budgetary requirements for ISOC
network, locaon and applicaons S Advantages of se ng up a ISOC.

12 Handbook on Information Security Operations Center


ISOC Planning and Design

2.4 ISOC Framework


ISOC func ons under the larger umbrella of
Informa on Security Framework within an
organisaon, headed by a Chief Informaon Security 2.5 ISOC Funcons
Officer (CISO), directly reporng to the Head of Risk
The major funcons of ISOC may be classified into
Management.
the following areas:
Based on the established Informaon Security
2.5.1 Intelligence Funcon
framework, Security Operaons Center needs to
help in proacvely monitoring and managing cyber This is the core of the ISOC, equipped with the
risks in real-me. intelligent tools required for the processing and
analysis of millions of events per second, and raising
Based on such minimum baseline cyber security and
alerts in real-me. Competent and skilled resources
resilience framework, Security Operaons Center
of ISOC would analyse the threat pa erns, refine and
would help in proacvely monitoring and managing
implement rules for alerts, coordinate with internal
cyber risks in real-me.
and external agencies and provide guidance to the
operaonal staff for faster incident response.

CERT-IN

Dashboard
Privacy Impact Assessment

Handbook on Information Security Operations Center 13


ISOC Planning and Design

2.5.2 Monitoring Funcon Incident Response: Incident Response Management


In order to idenfy anomalies and alerts in real-me, Scanning and Assessment: Vulnerability Assessment,
ISOC collects, monitors and stores large number of Penetraon Tesng.
events per second, from security soluons like PIM, “ Ten Strategies of Word-class Cybersecurity
DAM, URL monitoring tool, phishing and brand abuse Operaons Center” by Zimmerman, C., could be
monitoring tool, etc., logs from end devices, servers, handy to choose addional ISOC capabilies, as per
etc., and other parameters such as telemetric data the size of the organisaon and requirement.
(network flows and packet capture) and SNMP trap.
Relevant alerts or events are idenfied by fine-tuning 2.7 Planning and Designing ISOC
rules within the Security Informaon and Event
Planning
Manager (SIEM).
Creang a plan for various phases of implementaon
2.5.3 Baseline Security Funcon
is crical to the success of a Security Operaons
There could be some baseline security funcons, Center. It is imperave to capture details required for
such as conducng regular Vulnerability Assessment decision-making, including the organisaon's vision
and Penetraon Tesng, hardening servers, carrying and objecves, environment, threat landscape,
out compliance scans against security best pracces, budget, etc. Also required is the management and
conducng Applicaon Security and Code Reviews, other stakeholders' support in se ng up ISOC for
Risk Analysis, etc. In certain cases, the ISOC team may necessary budget, resource sancons, integraon of
also take up such acvies. systems with ISOC, etc. This support needs to be
developed during the planning phase.
2.5.4 Forensic Funcon
2.7.1 Define Business and IT Objecves
As security logs are being monitored and retained for
a specific period as per the legal and regulatory Security management requirements may vary with
requirements, any forensic analysis done would organisaons and hence should align with the
involve ISOC. The skilled analysts in SOC could help in organisaon’sBusinessandITobjecvestoenablethem
the forensics invesgaon, in findings details and to achieve their goals by reducing security risks. COBIT
anomalies, collecng electronic evidences and model shall help in defining and aligning the business
ensuring the required details are provided to the and IT objecves. Strategy for ISOC deployment should
forensic agency. In certain cases, the enre forensic bederivedoutofthesedefinedobjecves.
analysis may also be taken up by the ISOC team. 2.7.2 ISOC Mission Statement
2.6 ISOC Capabilies The ISOC monitors the security posture of networks,
The minimal capabilies an ISOC should have is systems and applicaons operated by IT, with the
objecve of detecng and reacng to Informaon
indicated below:
security incidents that could negavely impact the
Real-Time Analysis: Real-me Monitoring and Triage organisaon’s business operaons.
Threat Intelligence: Cyber Threat Intel Collecon,
2.7.3 ISOC Scope Statement
Distribuon and Analysis, Threat Assessment
ISOC Tool Life-Cycle Support: ISOC Infrastructure The ISOC Scope Statement helps an organisaon to
O&M, Rules Tuning and Maintenance, Custom focus on what tasks the SOC should perform. It may
Signature Creaon cover the following:

14 Handbook on Information Security Operations Center


ISOC Planning and Design

S Monitoring of all systems managed and


operated by IT
S Detecng and responding to security threats
and malicious acvies
adopted for business, etc. Common threats include
S Leading the Computer Security Incidents DDoS, Phishing, Spamming, Malware, Backdoor,
Response team Privilege Escalaon, Advanced Persistent Threat,
S Conducng awareness sessions when required . Man-in-the-Middle a acks, Website Defacing, etc.
Threat landscape keeps evolving at a fast pace.
2.7.4 Gather Informaon Understanding of evolving threats in other
Informaon collected during the planning phase is organisaons and other parts of the world is
instrumental in giving the final shape of ISOC. Based necessary in order to plan, keeping in view the future
on these collected data, the strategy for threat vectors.
implementa on, deployment and even the It would be a good idea to understand the past
expenditure would be derived. Collecng accurate security incidents within an organisaon and ensure
and complete informaon during this stage is that the ISOC meets the requirement to migate
necessary. such incidents. The type of technologies to be
2.7.4.1 IT Environment adopted and services to be subscribed, would
depend on the current and evolving threat
IT environment in an organisaon is a major deciding landscape.
factor, in choosing the ISOC Technologies and
Architecture. Collect details on overall IT 2.7.4.3 Regulatory and Compliance Requirement
Architecture, IT Infrastructure, in-house or The RBI in its noficaon regarding Cyber Security
outsourced opera ons, technologies in use, Framework in Banks, dated June 2, 2016 has
virtualizaon, use of cloud based services, etc. The menoned the need for arrangement of connuous
technologies implemented in ISOC should be surveillance.
compable with the exisng IT established in the
organisaon, as the goal is to monitor and manage Regulatory and compliance requirements of the
security risks with respect to these very systems. country on Informaon Security and Cyber Security
Details on number of each type of assets need to be idenfied, in order to accommodate them
(hardware/soware), data size, log size, bandwidth in the scope of ISOC.
ulizaon, transacon related parameters, number 2.7.5 Measure the Maturity
of users, etc. would be required to size hardware and
soware procurement and would also influence the A good pracce is to carry out Gap Analysis (Security
licensing model adopted. Future IT Plan and strategy Maturity) before and aer deploying ISOC, with
regarding adopon of new technology should also be respect to IT Security Technologies, Processes,
captured during the data collecon phase, in order to Organisa ons, Metrics and Governance. Gap
accommodate them in ISOC planning. analysis process will help in iden fying and
evaluang potenal opportunies to strengthen and
2.7.4.2 Threat Landscape improve overall security posture and to achieve
Threat landscape for every organisaon varies, based higher security maturity level. The logical security
on the type of business, locaon of business, type of architecture as explained in first chapter can help the
technologies employed, standards and procedures organisaon to judge its maturity level.

Handbook on Information Security Operations Center 15


ISOC Planning and Design

2.7.6 Budget for ISOC


Budget allocated by the organisaon for Informaon
Security would decide the strategy and scope of
ISOC. Depending on provision of Capex/Opex
budget, organisaon would need to decide whether
deployment strategy would be in-house or
outsourced ISOC, the technologies to be deployed analysis of security events from a wide variety of
and the licensing methodologies. event and contextual data sources.

The gap analysis done and detailed study conducted S It also supports compliance reporng and
on the cost of various models of implementaon incident invesgaon through analysis of
would assist an organisaon in deciding the budget historical data from these sources. The main
to be allocated (Capex-intensive in-house model or capabilies include event and log collecon and
perpetual licensing model vs. Opex-intensive management, data aggregaon, normalizaon,
outsourced model or consumpon license model vs. correlaon, analysis, reporng, alerng and
hybrid model). dashboard facilies.

Organisaon can also explore newer technologies S Network monitoring tools provide insight into
like virtualizaon and cloud based services wherever the state of the network within an organisaon.
possible, which could bring down the total Oen referred to as Network Analysis and
expenditure requirement. Annex 2.4 provides Visibility (NAV)/NBAD, these tools monitor
template for ISOC Budget. crical network characteriscs for a possible
presence of threat in real me and alert/trigger
2.7.7 Formulate ISOC Strategy the response mechanism.
Selecng the opmal ISOC strategy depends on the S Situaonal awareness is an important component
Business and IT requirements, threat landscape, in ISOC, which aims to achieve a thorough
regulatory requirements and financial constraints. understanding of a ack vectors and the
The ISOC strategy should be arrived at based on roles knowledge of what process/systems/people have
and responsibilies, various stakeholders, the model access to which valuable informaon within an
of operaon (own, outsourced), processes and organisaon. In order to counter the emerging
resources required, priories with respect to threats, self-learning, predicve analysis and risk
opera on. A roadmap may be accordingly based decision systems are also being
developed. implemented as part of situaonal awareness.
2.7.8 Idenfy the ISOC Technologies 2.7.9 Understand the ISOC Tool Architecture
The ISOC is a combinaon of technologies put ISOC Tool comprises of Log Analyser, Network
together with seamless integraon, in order to Analyser, Malware Analysers and Forensic Analysers
achieve a faster incident detecon and response. with incident response mechanism taking input from
S Security informaon and event management all these analysers. For carrying the process of
(SIEM) tools are the core technical components security analysis, auding, and compliance, data
of ISOC. SIEM technology supports threat from various sources like event logs, network
detec on and security incident response packets, network flows, etc., and in different formats
through real-me collecon and historical need to be collected.

16 Handbook on Information Security Operations Center


ISOC Planning and Design

Incident Response

Forensic Data

Vulnerability Assessment &


Penetration testing

Typical SOC Tool Architecture

2.7.9.1 Log Collecon The type of data to be collected and logging


mechanisms/protocols supported by end devices,
The following informaon will assist in acquiring
d e t e r m i n e t h e c o l l e c  o n m e c h a n i s m fo r
relevant data and to perform useful analysis:
deployment. Majority of the systems and devices
S Systems/ elements need to be monitored navely support the ‘Syslog protocol’ for event
S Data format logging. In case of few non-Unix systems, one may
S Level of logging
need to install an agent. The Annex 2.4 provides
recommendaons on logging. They also help decide
S Protocols used to collect data from the various
the logging model to be adopted: centralized,
systems distributed, or semi-centralized.
S Log storage and retenon period
2.7.9.2 Telemetry Data – Network Flows
S System and network overhead caused by data
collecon To monitor network from a security perspecve,
S Capacity management in accordance with the capturing and transferring network packets is not
data collecon always feasible. The storage costs of the data
S Opmize data collecon capability. captured, lack of skillsets required to analyse the
data and hardware costs of these data collecon
tools discourage capturing such data, especially in

Handbook on Information Security Operations Center 17


ISOC Planning and Design

case of mulple locaons connected over a wide- normalized for further analysis. Raw input data is
area network (WAN). Collecon of network flows, processed and meaningful data from raw logs is
which gives contextual informaon about network extracted through the process of parsing. With
connecons, is much more feasible than capturing normaliza on, similar extracted events from
full packets. mulple sources are uniformly stored or consumed
by subsequent processing steps.
The system's overall performance is dependent on
capturing, maintaining, and exporng network flow 2.7.9.5 Security Analysis
informaon. Working through a capacity-planning
Security analysis involves researching collected data
exercise and consulng with network vendor on the
in order to uncover potenal threats. This could vary
impact of enabling the feature is the best pracce.
from performing a basic incident mapping to
Similar to syslog, one can implement a centralized, advanced mathemacal modelling, to discover
distributed, or semi-centralized model for collecng known or unknown threats and to understand threat
network flows. pa erns.
2.7.9.3 Telemetry Data – Packet Capture Security event correlaon is being offered by many
SIEM Soluons as one of their core components. This
There are cases in which one need to go beyond
involves idenfying relaonships between disparate
collecng logs and network flows. Security point
events from various sources and collang and
soluons like Intrusion Detecon System (IDS), Deep
analysing these, to detect and report threats.
Packet Inspecon (DPI) and Forensic Analysis, etc.,
need network traffic containing actual data (payload) The correlaon engine of SIEM has rules, which
to be captured and forwarded. One may consider the require regular updates. The default rules can be
following two techniques to capture network fine-tuned and custom rules created, based on the
packets, in the case of Ethernet: organizaonal environment, business requirements
and the use cases idenfied. Out-of-box rules could
Port Mirroring: Network switches can be configured
include alerng excessive failed login a empts,
to mirror traffic seen on ports or VLANs to other local
malware detec on, unauthorised outbound
or remote ports. The network throughput of the
connecon, DoS a acks, etc.
source and desnaon ports needs to be considered
while doing a port mirroring. 2.7.9.6 Data Enrichment
Network Taps: Connecng network taps (out-of- Adding addional context to the data collected is
band devices) is another approach to monitor and known as data enrichment. Data enrichment helps in
capture packets from point-to-point links. making more informed decisions, thus improving the
Connecng taps to all network lines may not be accuracy of threat-detecon processes and tools.
feasible. Taps can be connected to the most Following are few example of data enrichment:
important locaons in the network, such as Internet S Geo informaon, mapping IP addresses to
Gateways and Data Centers. In larger complex geographical locaons
organizaon, network taps may be implemented for S WHOIS informa on, providing addi onal
packet capture, to reduce the overhead on the contextual informaon on IP addresses
business network. S Reputaon informaon on IP addresses, domain
2.7.9.4 Parsing and Normalizaon names, file hash values, e-mail senders, etc.
S Domain age informaon.
Data that has been collected must be first parsed and

18 Handbook on Information Security Operations Center


ISOC Planning and Design

2.7.9.7 Storage Technology 2.7.9.10 Tickeng and Case Management


During the planning phase, it is necessary to choose Any security incident or potenal incidents reported
the right Storage Technology as well as do the sizing by tools or by people need to be tracked unl closure,
for storage, such that retrieval of data is faster and to ensure that the incident is properly managed. For
without impacng the performance of the system. proper incident management, a ckeng system
could be used, which would help in creang,
Network behavior data with or without packet is
assigning and tracking an incident. This acvity
normally kept on online storage for very short
should be supported with the right tools, authority,
duraon, whereas event related data can be stored for
and integraon with incident response and case
longer periods like six months or more. Storage sizing
management processes.
a n d t y p e s h o u l d m e et l e ga l , co m p l i a n c e ,
organizaonal and performance related requirements SIEM, vulnerability management, and other ISOC
with some buffer as well as scaling up opons. The kind tools should either support built-in incident
of online and archival storage (SAN, NAS or Device management modules or should have the facility to
A ached Storage) may be OEM/ISOC soluon specific. integrate with organisaon’s exisng IT ckeng
system, for central management and reporng of
2.7.9.8 Threat Intelligence
incident ckets.
Threat intelligence or cyber threat intelligence (CTI)
2.7.10 Collaboraon
is organised, analysed and refined informaon about
potenal or current a acks that threaten an The ISOC should have a strong collaborave system
organisa on. The primary purpose of threat with IT and Business, which allows the ISOC team to
intelligence is helping organisaons understand the centrally store, manage, and access documents,
risks of the most common and severe external including system manuals, documented processes,
threats, such as zero-day threats, advanced incident response procedures, and so on.
persistent threats (APTs) and exploits. There are
2.7.11 ISOC Sizing
various service providers providing real-me global
threat intelligence using feeds, e-mails, reports, etc. The sizing for ISOC should be planned based on the
Annex. 2.3 provides informaon about informaon various parameters menoned in the log collecon
exchange on threat intelligence. secon. The ISOC sizing would depend on the
number of servers, applicaons, Events per Seconds
2.7.9.9 Compliance
(EPS) and Flows per Second (FPS) generated by the
For any successful security operaon, it is necessary systems, type of system, etc. A sample sizing data
to have the compliance of systems monitored against sheet and a template has been provided at Annex 2.5
the security best pracces, regulatory requirements for reference.
(RBI and various relevant Government Agencies), a
2.7.12 Understand Deployment Models
global security standard like PCI DSS or maybe even a
configuraon template. Regular monitoring can help Once the data collecon steps like – deciding the data
have a visibility into the changes in the system and sources, calculang EPS, etc., have been completed–
exisng configuraon problems that could lead to a one has to decide, how the ISOC would be deployed.
security breach. Automang the system compliance The major component of ISOC is SIEM. SIEM in turn
process and then linking it to risk management and consists of three major components called Event
incident response pracces are key steps in any Collector, Event Processor and Event Correlaon
successful security operaon. Analyser. (Terminology could vary between various

Handbook on Information Security Operations Center 19


ISOC Planning and Design

products). Collectors collect events from Syslog UDP, virus signature update, fixing vulnerabili es,
Syslog TCP, JDBC, Log File protocol, etc. Event monitoring availability, etc., which needs to be
Processors filter the events based on parsers and handled by the IT Operaons. Other monitoring tasks
some rule sets. Event Analysers perform analysis on such as detecng a DoS a ack, remote code
the events filtered by event processors and provide a execuon a acks, SQL injecon, unauthorised login
dash board to the ISOC users. ISOC deployment a empt, etc., should be handled by ISOC.
models basically vary on how these three elements
It is important to idenfy the core responsibilies of
are best placed.
the SOC and the IT operaons center. Based on the
2.7.12.1 Centralised idenfied responsibilies for each, come to an
agreement on how responsibilies are to be divided
In a centralised model, all the three components are
between the two.
placed at a central locaon. This deployment model
is very simple and suits very small organisaons, 2.7.15 Understand the level and depth of
wherein the number of systems and events are very automaon
low. For larger organisaon, this model would not be
The ISOC’s job is to monitor and help respecve team
suitable, as shipping the event data to central
to remediate the threats across en re IT
loca on without filtering may exhaust the
infrastructure as quickly as possible. To achieve this,
bandwidth on WAN links.
it is necessary to integrate and automate funcons
2.7.12.2 Distributed Processor and Central Analyser and processes of ISOC. More the automaon, faster
would be the detecon and migaon capabilies,
In this model, the collectors and processors could be
with minimal human resources. However,
distributed. Each processor filters the events
automang monitoring and remediang could be a
collected by a group of collectors and then hands
costly process. Idenfy the core tasks and processes
them to analyser. This model suits larger
which needs to be automated.
organisaon, wherein only the processed data is
handed over to the central analyser, reducing the 2.7.16 ISOC Operang Models
bandwidth requirement over the WAN, considerably.
Most organisaons face the dilemma of whether to
2.7.13 Understand the ISOC Licensing Models outsource the ISOC or have it built in-house.
Organizaons have varied business models, risk
ISOC components are basically licensed depending
profiles, technology implemented and compliance
on the number of EPS generated, number of data
and regulatory requirements to sasfy, with which
collectors and data processors deployed. During the
ISOC must align. Based on these factors, the ISOC
data collecon phase, the EPS esmaon exercise
deployment methodology may be arrived at. The
needs to be done, which would help in deciding
common ISOC Operang Models are:
actual deployment model that in turn decides the
licensing model. The specific products purchased 2.7.16.1 In-house Capve ISOC
should support scalability and also upgradaon,
Capve or In-house ISOC is generally deployed by
based on the changing environment.
organisaons who want to avoid outsourcing of ISOC,
2.7.14 Understand Processes due to various reasons like risks of crical security
data loss, misuse of security logs and analysis, policy
Idenfy the core responsibilies and processes in an
and regulatory requirements, etc. The organisaon
ISOC. There would be various day-to-day security
can leverage on its own dedicated resources who
tasks like patch management, server hardening, an-

20 Handbook on Information Security Operations Center


ISOC Planning and Design

understand the environment and enable efficient experience of staff. Stringent contracts, NDA and SLA
correlaons among different working groups. This need to be in place with the service providers to
also allows for customizaon as per organizaon's address the risks involved.
needs. The challenges include, high Capex
2.7.16.3 Hybrid ISOC
investment, requirement of in-house skilled
resources on long term, me to realize ROI and me This model is a hybrid of in-house and outsourced
and effort to setup infrastructure. methods, wherein the organisaon can leverage the
best of both the worlds. The security logs may be
One method to implement in-house Capve ISOC is
maintained in-house and the analycs, specialized
Build, Operate and Transfer Model (BOT).
services and threat intelligence may be provided by
Organisaons adopt this model with a vision to fully
the service providers. This provides organisaons
own and operate the ISOC at a later period, however
flexibility to develop experse in specific areas,
wanng to leverage the experse of a service
flexible deputaon of organisaon's resources,
provider in se ng up and in a aining a faster
ulize experse and infrastructure of the service
maturity level, thus migang risks in the start-up
provider for advanced analycs, scale up in mes of
stage. BOT, as a hybrid model, combines elements of
n e e d a n d a l s o m e et st r i n ge nt re g u l ato r y
the capve centre and outsourcing.
requirements regarding security logs. Risks include
During the Build-phase, the service provider sets up loss/misuse of security data, which would need to be
the infrastructure and provides resources required addressed by choosing trusted partners and having
for the acvity. In the Operate-phase, the provider in place NDA, contracts and SLA with the service
manages the ISOC providing security services and provider.
also personnel required for the same. During the
While choosing the model, organisaons have to
Transfer-phase, the provider iniates acvies like
keep in mind the regulatory recommendaons also.
trainings, knowledge transfers, etc. to the in-house
team. 2.7.17 Manpower Requirements
2.7.16.2 Outsourced or MSSP Model The ISOC requires workforce can be divided into five
categories:
Organisaons going for managed security operaons
can leverage on the service provider's already Leadership Roles: The responsibility of the official
exisng infrastructure and skilled resource pool. would be to lead the ISOC team to achieve the
Immediate benefits of ISOC implementaon is visible mission of the ISOC.
to the management. In addion, service providers,
Analyst Roles: Responsibilies include security event
due to their various engagements with other
monitoring, incident report invesgaon, incident
organisaons, can bring in the knowledge base,
handling, threat intelligence, vulnerability
learnings, and best pracces with respect to security
intelligence and reporng.
incident and event handling and threat intelligence.
The ability to scale up would be faster when Engineering Roles: Engineers with specific in-depth
compared to capve ISOC. Risks include loss / misuse knowledge about tools and technology on top of
of crical security data, sharing organisaon's which ISOC is built, is required for expanding the ISOC
vulnerability details with third party, misuse of data funcons and to handle and resolve any ISOC specific
aer end of contract, etc. It is necessary to choose issues.
trusted partners based on their reputa on,
Operaons Roles: While ISOC engineers focus on
reference customers, level of security and

Handbook on Information Security Operations Center 21


ISOC Planning and Design

expanding scope of coverage in terms of both ISOC


funcons and the devices to be monitored, operators
basically concentrate on the upkeep of the current
ISOC setup.
Other Support Roles: Other support roles like BCP
and DRP support, compliance and audit support,
incident and problem managers, process/procedure
developers, training specialists, communicaon
specialists, vendor and contract management
support may be made part of ISOC, depending on the
IT and Security Structure within an organisaon.
Based on the data collected during the data
collecon phase, regarding scope of ISOC, number of References
servers, type of incidents, number of applicaons,
type of systems, etc., a resource sizing acvity for S Zimmerman, C., Ten Strategies of Word-class
ISOC may be carried out. Cybersecurity Operaons Center, Mitre corporaon,
2014.
Conclusion
S A Design Model for a Security Operaons Centre
This chapter highlighted all the measures, (SOC) h ps://www.deitauditor.nl/informa e
technologies, people, processes, etc. to be employed beveiliging/a-design-model-for-a-security-
for planning and designing of ISOC before going in for operaons-centre-soc/
actual implementaon.
S A Successful SOC Builds on the Basics,
h p://www.ey.com/Publicaon/vwLUAssets/EY-
security-operaons-centers-helping-you-get-
ahead-of-cybercrime/$FILE/EY-security-
operaons-centers-helping-you-get-ahead-of-
cybercrime.pdf
S SOC 2.0 Protecng Your Informaon Assets From
Next Generaon of Threats, h p://www.dts-
solu on.com/wp-content/uploads/2014/
04/Security-Operaons-Center-v2.pdf
S Overview of Security Opera ons Center
Technologies, h p://www.ciscopress.com/
arcles/ arcle.asp?p=2455014
S Rishikesh Kamat, Security Operaons Center To
B u i l d O r O u t s o u r c e ? , h  p : / / w w w.
netmagicsoluons.com/data/arcle/Security
O p e ra o n s C e nte r - I n h o u s e v s 1 7 - 0 1 -
241485253065.pdf

22 Handbook on Information Security Operations Center


Chapter 3
ISOC Integraon and Implementaon

E VENT generators, event collectors, message


database, analysis engines and reac on
management soware are the five disnct modules
S Network and host IDS/IPS monitoring and
logging
S Network and host DLP monitoring and logging
of any typical ISOC. Built as autonomous parts,
S Centralized logging plaorms (syslog, etc.)
usually integrang all these modules keeping the
integrity, security and availability of their data, is a S Email and spam gateway and filtering
major task. S Web gateway and filtering
The data gathered from log and event sources prior S Threat monitoring and intelligence
to and during the incident, helps ISOC analysts to use S Firewall monitoring and management
it as an invesgave tool, look for suspicious
S Applica on whitelis ng or file integrity
acvies that make up the present incident, and to
manage the response to an incident or breach. monitoring
S Vulnerability assessment and monitoring.
The incorporaon of Threat intelligence, Asset,
Identy and other context informaon aids the ISOC 3.2 High Level Execuon Plan
analyst's invesgave process. Oen, an alert is
associated with network or host-based acvity and, Equipped with the details of IT environment, chalk
inially, may contain only the suspicious endpoint's out a high-level plan on how to integrate the crical
IP address. Incorpora ng asset and iden ty assets with ISOC. The plan may include the following
informaon provides a huge advantage in me and steps.
effort to priorize the security incident - higher-value S Deciding core funcons and core capabilies
business assets should be priorized over lower-
S Phase-wise integraon based on funcons
value assets.
S Phase-wise integraon based on cricality of
3.1 Understand the Environment assets
The ISOC team must have the appropriate tools, S Phase-wise integraon based on geographical
processes, documents, diagrams and knowledge to coverage .
plan, deploy, operaonalize and manage ISOC in 3.2.1 Deciding Core Funcons and Capabilies
close coordinaon with each IT infrastructure and
applicaon team. It is important to have copies of the ISOC is made up of five core funcons viz. Log
key network and applicaon architecture diagrams. analysis, Vulnerability Analysis, Network Behaviour
As a part of the ISOC’s service funcons, the security Analysis, Malware Analysis and Forensic Analysis.
architecture will be defined and the ISOC team will Keeping these five funcons at the core, the other
have access to different components and tools within layers like cket management, incident response,
that architecture. These may include, but are not risk management, governance, etc., are built around.
limited to: List down the prerequisites for implemenng each of
S SIEM monitoring and correlaon these funcons. Asset Discovery is an important
prerequisite for a majority of the ISOC funcons,
S Anvirus monitoring and logging
without which it would be difficult to idenfy and

Handbook on Information Security Operations Center 23


ISOC Integration and Implementation

a ribute the logs from each asset. Start with basic 3.2.4 P h a s e - w i s e I n t e g r a  o n B a s e d o n
ISOC funcons like log analysis and vulnerability Geographical Coverage
analysis. One needs to choose the capabilies that
Organisaons’ crical assets may be spread across a
can be built based on the funcons chosen.
wide geographical area. Apart from DC and DR,
3.2.2. Phase-wise Integra on Based on Core certain business offices may also be cri cal.
Funcons Integrate the assets of DC, DR, Central Offices,
Regional offices, branches, etc., in a phase-wise
It is sug gested to go in for a phase-wise
approach.
implementaon as indicated below along with cket
m a n a ge m e nt , i n c i d e nt re s p o n s e a n d r i s k 3.3 ISOC Deployment
management:
SIEM Deployment Phases
S Phase 1
w Log Analysis – SIEM
Pilot and
Deploy and
Discovery Controlled
Mature
Mature
Deployment

w Vulnerability Analysis
S Phase 2
3.3.1 Discovery Phase – Laying the Groundwork
w DAM – Database Acvity Monitoring
S Review the organisaonal security posture and
w NBAD – Network Behaviour Anomaly the inial business case for a SIEM. Then
Detecon priorize the goals of the SIEM implementaon
S Phase 3 from the most crical to the oponal -taking into
w Malware Analysis – Advanced Persistent account the tasks that must be performed in
Threat Protecon order to support the effort

S Phase 4 S Review in detail the organizaonal security


policy and separate those policies from a priority
w Forensic Analysis.
standpoint. Determine what is crical, what's
3.2.3 Phase-wise Integraon Based on Cricality necessary for mandatory compliance and what
of Assets policies are best pracces to ensure a secure
environment
Integrang all assets with ISOC is a huge and me-
consuming process. A plan needs to be in place to S Idenfy current controls that are auding those
include all assets over a period of me. Inially, go policies to determine compliance level
with crical assets (Crown Jewels) that cover 90% of
S Idenfy a smaller representave subset of the
the business.
current policy and devices, where SIEM can be
S Crical Security Point Soluons like Firewall, IPS, applied and enough data can be gathered.
DAM, PIM, An-DDOS, etc located in DC/DR
3.3.2 Pilot Phase – Beginning the Implementaon
S Crical applicaon servers / equipments located
in DC/DR The primary goal of this phase is to determine which
specific SIEM project goals can be implemented in
S Crical network equipments.
order to establish inial ROI while creang a baseline
operaonal model:

24 Handbook on Information Security Operations Center


ISOC Integration and Implementation

S The lessons learned from the discovery phase 3.5 Time-Stamp


are used to implement a larger subset of
technology Logs must be me-stamped to trace back the events
and correlate findings. The best pracce to ensure
S The assump ons developed during the that all systems are in the same me schedule is to
discovery phase are tested in real-me use a me-stamp server (NTP).
S The list of devices should be expanded to 3.6 Event Genera on, Collec on and
incorporate a wider set of technologies and
numbers
Storage

S The informaon developed from this phase is Once the targeted systems are idenfied and
used to determine the final steps of controlled inventoried, the next step is to collect the events
deployment and maturity phase. through logs. The Event Generaon should be set-up
to generate as much raw informaon as possible.
3.3.3 Controlled Deployment Phase – Capacity This informaon can be sent in “real-me” to
Building collectors and/or can be stored locally for future
The primary goal of this phase is to develop a collecon.
deployment workflow that enables the organisaon Idenfy and place the log collectors in appropriate
to build capacity as full deployment approaches. This locaons like DMZ, internal network, crical server
phase also serves as the inial producon test run segments, etc. The deployment and number of
and the compleon of operaonal processes and sensors/collectors for perimeter and internal
procedures necessary to manage a full deployment. components will be dependent upon the network
3.3.4 Maturity Phase – Connuing to Evolve architecture and the types of cyber security soluons
deployed by the organizaon. The sensors/collectors
Significant work must be performed in order to will in turn forward the logs gathered to central
mature the organisaon’s security posture and processor/correlaon engine for further processing
implement the finer points of deployment. This and storage. The Log Analysis and Correlaon engine
phase never has an end since SIEM must connually will then apply the use cases to the data it receives to
evolve. provide the required alerng and reporng acons
by the SIEM.
3.4 Asset Inventory
3.6.1 Integraon of Log Sources
There should be a centralised asset inventory of the
enre IT infrastructure and applicaons consisng of The integra on of log sources with the
targeted systems/devices/applicaons/networks. Collector/Sensor of the SIEM data may be carried out
The next step will be integraon of log sources with on the basis of the filtering and logging level as per
the ISOC for situaonal awareness and in-depth suggesons given in Annex 2.
visibility of the organisaonal IT setup. Classificaon S Inial Implementaon: It is a good pracce to
of the assets on the basis of cricality is must and will start with UAT or Test systems, observe the
be linked to the severity of incidents, its response performance and then start with less crical log
and migaon measures. Indicave asset collecon sources. The process of integraon of log
template is in Annex. 3- A. sources is mostly non-disrupve except for few
systems where agent has to be installed for
detailed log capture.

Handbook on Information Security Operations Center 25


ISOC Integration and Implementation

S Connectors/Parsers: Most of the standard SIEM S Correlaon – A stand-alone operaon used to


solu on will provide out-of-box detect an intrusion a empt by creang the
connectors/parsers to integrate the IT contexts from captured data and matching them
infrastructure with SIEM. As a part of RFP or with specific intrusion characteriscs.
inial planning, the organizaon needs to get
S Structural Analysis – This is a kind of advanced
compliance matrix from System Integrator/OEM
pa ern matching process, used to determine
implemenng the project. The compliance
whether events of a certain context lead to a
matrix will indicate compability of their SIEM
known intrusion path.
soluon vis-à-vis different flavors and versions of
IT infrastructure (OS, DB, Middleware, Network S Intrusion Path Analysis – This provides
and Security components, NOC soluon tools, informaon about the exposure of the target
T i c k e  n g , L D A P, e t c . ) a n d d i ff e r e n t system to the intrusion a empt detected.
applica ons/solu ons deployed in the
S Behaviour Analysis – By taking informaon from
organizaon. In few cases, there may be
the security policy and asset database this step
re q u i re m e nt fo r c u sto m i za o n a n d /o r
determines whether the intrusion a empt is
development of connectors and same has to be
allowed or not. The idea here is to generate
factored in the scope of work in RFP. It will be an
alerts by taking care of the security policy
on-going ac vity as more and more
defined, as well as cricality of the target
systems/devices/applicaons are added.
systems.
S Integra on and Scaling: The indica ve
integraon of systems/devices is provided in 3.8 Developing Use Cases
menoned in Annex 3-B. Clear cut scope of Use Cases, the heart of any ISOC, is used to
work, customiza on/development of determine if any event is an incident or not. To ensure
connectors/parsers, scope of scaling up the that the ISOC as cyber security system for
SIEM soluon, need for new connector/parser, monitoring, detecon, prevenon and migaon is
etc. has to be beforehand finalised. effecve, a series of use cases must be defined. A use
3.6.2 Collecon and Storage case may include the involvement of a Rule, Alarm,
Mail alert or even a Dashboard. Use cases may be
The main operaons performed by collectors are the developed to meet the organisaon’s security policy
recepon of raw logs/events through different requirements and detect policy violaons.
protocols and from varied source types and
idenficaon and parsing. Once a message is parsed, A good way to start developing the use cases can be
it is stored for a long term compliance purpose and as menoned below:
for real-me alerng and reporng. Performances 3.8.1 A ack based Use Case Model
and availability requirements naturally influence the
design of a scalable architecture. Look at cyber security incidents that the organisaon
has experienced over the past few years. Idenfy
3.7 Data Analysis anatomy of a ack and model threat indicators for
monitoring in SIEM to generate alert and help team
ISOC gives structural and behavior-led alerts. The
to take migaon steps. Examples of a ack based
main operaons performed that generate
use cases are SMTP from unauthorized host, failure
alerts/incidents using well-defined use cases are the
of an-virus to clean malware, excess inbound or
following:
outbound flow, etc.

26 Handbook on Information Security Operations Center


ISOC Integration and Implementation

3.8.2 Business based Use Case Model


Understand business process and linkage to IT
Security and monitor logs for compliance violaon.
cases include password cracking of OS, DDoS on Web
Use cases should be built to detect non-compliance
servers, malicious probe on Firewall, etc.
of legal and regulatory requirements, taking cues
from recent audit findings. Examples include use 3.8.4 Lifecycle Phases of ISOC Use Cases
cases for PCI DSS compliance, etc.
Even though out-of-box use cases will be available,
3.8.3 Asset based Use Case Model organizaon need to study and develop Use Cases to
meet its cyber security requirements, which are
Look at the organisaonal IT infrastructure set-up.
highly contextual. Organisaons can apply the
Idenfy OS, Applicaon, DNS, Web Server etc., and
Lifecycle Framework for development of use cases as
based on their threat exposures, the organisaon
depicted below:
can monitor logs and correlate events to generate
required security alert. Examples of asset-based use A few examples of a ack scenario is in Annex. 3-D
and an example of a Use Case is in Annex.3-E.

(Source : Sameer Paradia, Security Consultant)

Handbook on Information Security Operations Center 27


ISOC Integration and Implementation

3.9 Reporng
ISOC should be capable of generang customised
reports at regular intervals for the purposes of
meeng compliance requirements, informing Top
management, Audit requirements, and incident
management. In general, the ISOC, may provide
reports on the following: 3.10 Developing Dashboards
S Security Event and Trend Stascs Enterprise dashboards are the first points of contact
S Firewall Traffic and Ulizaon Stascs in the area of Security Informaon Management. It
S Vulnerability Management provides a bird’s eye-view to the top management on
S Audit Compliancy the security posture. Reporng of incidents and
S Workload Priorizaon threats are commonly projected via the dashboard
S Suspicious Host Detecon format. Dashboards act as frontends to ISOC tools by
S IP Intelligence (Security Analycs) providing collaboraon, workflow, publishing,
reporng and tracking capabilies. The dashboard
S Compliance.
has to be customized to meet the requirements of set
of stakeholders like Execuves, CISOs, Operaon
team, etc. Below is an example dashboard:

28 Handbook on Information Security Operations Center


ISOC Integration and Implementation

The dashboard tab of the ISOC portal brings up the


KPI dashboard. The Analyst can enter a range of
dates, to see an overview of security metrics like IDS
status, number of incidents, ISVM noces, top virus
intercepts, spams messages stopped, number of
vulnerabilies tracked, number of security event
noficaons and ISVM compliance. The graphically
presented dashboard KPI should have drill-down
capability.
The incorporaon of a security blog allows the
administrator to keep users advised of system news, S An Administrave Interface for Managing Users
help materials and other community-oriented and Roles
material:
S User role based with applicaon role based
S A common feature list of a ISOC portal include: access
Security Event Noficaon Publishing & Tracking
S Ability to add data feed and generate dashboard
S Comprehensive Incident Handling and Response graphs
Capabilies with Workflow
S Ability to add third party soware for integraon
S Vulnerability Assessment Scan Scheduling and to the portal such as Vulnerability Scanners and
Tracking Tickeng Systems.
S Vulnerability Management Publishing of A sample list of dashboards is in Annex. 3-C.
Technical Alerts, Advisories, and Bullens
3.10.1 Security Metrics Dashboard
S Vulnerability Management Compliance Tracking
S Dashboard View of Overall Security Posture of Organisaons need to communicate the operaonal
the organisaon with drill-down capability results of ISOC to the top management. Today,
communicaon is lacking in updang the decision-
S Comprehensive Reporng Capabilies
making execuves of the organisaons. Therefore,
S Facilitates Compliance with PCI DSS and other the organisaon is unable to provide the necessary
Regulatory Reporng oversight to the security programme, which comes
S Security Device Tracking under the responsibility of the Security Operaons
Center, and runs the risk of not providing informaon
S Several Security Related RSS Feeds and Links to
to the organisaon’s regulatory bodies.
Security Vendors
S Source of informaon about the Organizaon’s The security metrics dashboard can give a glimpse on
Security Policies and Direcves the state of security to the top management. In terms
of the metrics, this enterprise dashboard includes
S Discussion Forum for Security Related
Privacy (reported incidents, resolved incidents),
Discussions
Threat Management (Forensic Invesgaons –
S Blog for Immediate ISOC Related Informaon to acve, new, closed, Intelligence – cyber threat
be posted incidents, Intrusion Detecon – security ckets),
S Engineering Change Control for System Change Assessments (third party site assessments),
Requests Awareness & Educaon, and Issues Tracking (audits).

Handbook on Information Security Operations Center 29


ISOC Integration and Implementation

Security Metrics
2005 Metrics Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec YTD*
Privacy
Reported 10 26 15 31 19 19 16 21 12 24 21 23 237
Incidents
Resolved 12 22 9 20 22 16 21 20 21 14 7 10 194
Incidents
Threat Management
Forensic 48 63 62 56 68 58 65 48 46 37 31 32 32
Investigations
Active
Forensic 26 26 26 25 17 22 18 20 9 17 20 22 248
Investigations
New
Forensic 11 27 32 13 27 15 35 22 18 23 19 27 269
Investigations
Closed
Intelligence – 281 85 172 83 79 53 45 183 44 34 40 82 1181
Cyber Threat
Incidents
Intrusion 2316 361 503 243 388 429 701 158 131 116 144 54 5544
Detection
Security
Tickets
Assessments
Third Party 1 3 7 11 3 2 0 0 8 1 36
Site
Assessments
Completed
Awareness & Education
Percent 64.47% 78.25% 80.58% 80.58%
Complete of
the Tutorial
2005-2006
Issues Tracking
Audit – Past 11 19 11 10 7 5 5 6 4 4
Due Issues
Audit – 9 10 17 5 10 12 3 10 14 1 2 9 102
Closed Issues
Risk Acceptances
Risk 18 18 22 23 21 22 23 23
Acceptances
– Active
Risk 7 7 3 3 2 4 4 4
Acceptances
– Expired
Risk 7 8 10 11 15 15 15 15
Acceptances
– Closed

30 Handbook on Information Security Operations Center


ISOC Integration and Implementation

3.11 Tesng the ISOC Deployment


There are different ways to test the ISOC deployment:
S Inject simulated test data into the ISOC database
and see whether the incident response and
ckeng mechanism along with dashboards are
working fine
S Engage third-party pen-testers and check
whether all the events are generated, data is
collected by collectors and shipped to the central
processor for analysis and alert is raised.
Develop a ack cases and detecon rules as given
below, for few cases and test whether the ISOC is
responding as expected.
Brute force a ack to an administrave interface:
This a ack a empts to connect either to an exposed
SSH server or to an exposed web administraon
page, through mulple connecons with varying
credenals. Using tools like Hydra, one can simply
launch mulple connecons to the server using
different credenals every me unl it succeeds to
idenfy a valid account with its password. The rule of
detecon consists of a check of the number of
connecon a empts from a specific IP address over a
period of three minutes. Use of TOR as a proxy for the
brute force a ack, resulng in a wide range of source
addresses makes this rule praccally useless. In order
to be able to detect a successful a ack, the SIEM
needs a list of allowed IP address ranges that are
entled to access the associated administraon
interface. Successful connecon from another IP
address should generate an event “Remote Admin
Access from Unknown Address”.

Conclusion
This chapter covered in detail the implementaon
and integra on phases of ISOC, use case
developments and dashboards.

Handbook on Information Security Operations Center 31


Chapter 4
Operang ISOC: Governance, People and Processes

T HE ISOC must align with and be integrated into


the business process of an organisaon with a
strong Informaon Security principle that drives
following areas:
S Top Management/Board must be updated on
protecon of valuable assets. The SOC operaons
the latest changes in the threat landscape
must be integrated into the Risk Management,
Business Connuity, Compliance and Governance S Appropriate and insigh ul dashboards must be
processes. With Incident Response and Escalaon published
procedures well-defined, Change Management, S There has to be a well-defined policy and
Alert and Noficaon policies need to be clearly procedure governing the security operaons,
communicated to business units from me to me. which should be periodically reviewed
S There must an appropriate reporng structure/
4.1. ISOC Governance Model
escalaon matrix, to be followed for crical
Organisaons need to develop a governance incidents
framework for escalang security issues and S Key metrics must be defined to measure the
evaluang their impact on the business. The efficiency of the overall ISOC team.
governance framework shall clearly define the place
of ISOC in the organisaonal chart and describe the Lastly, all the stakeholders must be involved and a
scope of ISOC authority, through policies and proper responsibility matrix must be defined so that
standards. The key aspects of governance include the everyone is aware of individual roles.

CMD Business
Board
ED Compliance

Legal

Information Security Committee Human Resources

Internal Audit
Head - Integrated Risk Management (HIRM)
IT

Physical Security
Chief Information Security Officer (CISO)
Communications

Information Security Business Continuity Security Operations


Information Security
Awareness Management Centre & Incident
Risk Management
Management Planning & Monitoring Management
(ISRM)
(ISAM) (BCPM) (SOCIM)

Security Monitoring Incident Responce


and Forensics

Threat Intelligence and


Data Loss Prevention
Vulnerability Management

A SAMPLE GOVERNANCE MODEL SECURITY OPERATIONS

32 Handbook on Information Security Operations Center


Operating ISOC: Governance, People and Processes

4.2 SOC Authority An organisaon can apply ISOC's formal authories


up to a point, beyond which the ISOC must turn to
The SOC Authority describes the amount of influence rather than mandate. For aggressive
discreon the SOC has in direcng acons that affect countermeasures or response such as disabling a key
an organisaon’s assets, with or without permission corporate server, high-level agreement and
from, or in co-ordinaon with other groups. The understanding is needed.
three levels of authority, an ISOC can exert are:
Therefore, organisaons need to establish clear-cut
S No Authority: An ISOC can suggest to the IT asset policies describing, when an ISOC can exercise full
owners, the acons they should take. However, authority, shared authority and no authority.
the ISOC has no formal means to exert pressure.
It is enrely up to the respecve owners to heed 4.3 People, Processes and Technology
or ignore the ISOC’s recommendaons.
Security is becoming more and more established in
S S h a r e d A u t h o r i t y : A n I S O C c a n m a ke the corporate structure and it is no longer acceptable
recommendaons to execuves (e.g., CIOs, CISOs, for it to be a secondary funcon of an IT department.
CEOs, system owners) who have various authories Most of the organisaons are invesng in the
to enact change. These recommendaons are development of an ISOC to enhance their security
weighed against input from other stakeholders posture and provide rapid response to events
before a decision is made, giving the ISOC a right to throughout the network. Building an ISOC is a
vote,butnotthefinalsay. m o n u m e nta l ta s k . T h e re a re t h re e m a j o r
components that every organisaon must include –
S Full Authority: An ISOC can direct IT asset
People, Process and Technology. These three exist in
owners to take certain acons, without seeking
all elements of security and one should consider
or waing for the approval or support from any
them as equally crical components. The following
higher-level execuve.
picture depicts the interacon of people, process
and technology within ISOC.

Handbook on Information Security Operations Center 33


Operating ISOC: Governance, People and Processes

4.3.1 People 4.3.1.4 ISOC Manager


ISOC requires talented resources with deep technical S Provides an overall direcon for the ISOC
knowledge, broad range of capabilies and diverse S Manages resources to include personnel,
experience. budget, shischeduling
4.3.1.1 Tier 1 Alert Analyst S Manages technology strategy to meet SLAs
S Monitors the events queue S Communicates with management
S Triages the security alerts S Organizaonal point of contact for business
S Monitors the health of the security sensors and crical incidents
endpoints S Works with the ulmate goal of detecng,
S Collects data and is context necessary. invesgang and migang incidents that
impacts business.
4.3.1.2 Tier 2 Incident Responder
ISOC personnel must have the necessary training to
S Performs deep dive by collang data from deal with the constantly evolving and oen quite
various sources challenging job of a security analyst, incident
S Determines if a crical system or data has been inves gator, subject ma er expert and ISOC
impacted Manager.
S Advisory support In addion to the ISOC analysts, the ISOC Manager
S Provides support for new analyc methods for plays a pivotal role. The ISOC Manager is responsible
detecng threats. for priorising work and organising resources with
the ulmate goal of detecng, invesgang and
Security Operations Center: Organization Chart
SME/
migang incidents effecvely that could impact the
Hunter
Tier 1
Alert
Analyst
(Threat Level)
business. The ISOC Manager should develop an
incident workflow model and implement Standard
Frontlines

Operang Procedures for the incident handling that


SME/
Hunter
helps the analysts guide through triage (order of
(Malware RE)

Tier 1
SOC Manager
treang security events) and response procedures.
Alert Tier 2 SME/
Analyst Incident Hunter
Responder (Network)
4.3.2 Processes
Frontlines

ISOC processes and procedures can act as a buffer


SME/
Hunter
(Endpoint) between the people and technology. Mature
processes, procedures, and improving them
constantly guarantee the success of ISOC. Capability
4.3.1.3 Tier 3 SME (Subject Ma er Expert) or Hunter
Maturity Model® Integraon (CMMI) is a process
S In-depth knowledge on network, endpoints, improvement approach that provides organisaons
threat intelligence, forensics with the essenal elements of effecve processes.
S Acts as an incident ‘Hunter’, rather than waing Because ISOCs typically have a large number of
for escalated incidents processes and procedures, CMMI offers an
architecture to help organise, maintain, and improve
S Involves in developing, tuning and implemenng
the processes and procedures. The ISOC processes
threat detecon analycs.
are divided into four main categories:

34 Handbook on Information Security Operations Center


Business Processes: Document all the administrave
and management components that are required
operate an ISOC efficiently. Technology Processes: Maintain all the informaon
relang to system administraon, configuraon
Operaonal Processes: Document the mechanics of
management and conceptual design.
the daily operaons, like shi schedules and turn-
over procedures. The various processes that are necessary for an
effecve ISOC are depicted in following diagram:
Analy cal Processes: Encompass all acvies
designed to detect and be er understand malicious 4.3.3 Technology: ISOC Monitoring and Reporng
events.
An enterprise wide data collecon, aggregaon,

SOURCE: HP

detecon, analyc and management soluon is the


core technology of a successful ISOC. An effecve incidents. The ISOC technology is leveraged to carry
monitoring system incorporates data gathered from the following ISOC operaons on 24 × 7 basis.
the connuous monitoring of the log sources
4.3.3.1 Service Funcons
(network devices, servers, PCs, laptops, mobile
devices). Derive and document a list of service funcons from the
objecveoftheISOCdeployment.Thesemayinclude:
With the benefit of all the logs aggregated on the
security monitoring system, ISOC analysts can S Status monitoring and Incident detecon (Note:
leverage the monitoring system as an invesgave List is indicave, not exhausve)
tool from being just a detecve tool; thereby w SIEM
reviewing the suspicious acvies and to manage the w AV
response to an incident or a breach. w IPS/IDS
The ISOC is responsible for monitoring, detecng, w DLP
analysing, invesgang, isolang and responding to S Inial diagnoscs and incident isolaon
Operating ISOC: Governance, People and Processes

S Problem correcon w Perform me based checks to verify any loss


S Work with OEMs of connecvity to managed agents.
S Escalaon to next er level S If a security monitoring system (typically a SIEM)
S Closure of incidents in coordinaon with er component is not funconing as expected or has
levels a potenal issue:

S Persistent Threat Invesgaon. w Tier 1 analysts shall create a cket on the


ckeng system
The service funcons will guide the ISOC personnel
w Perform preliminary invesgaon of the
on the daily processes and procedures. Segregaon
documented issue
of dues must exist between one er to the other.
For example, Status monitoring and Incident w Escalate to Tier 2/Tier 3 SIEM System
detecon may be the service funcon of Tier 1 and administrators as appropriate
working with OEMs may be the service funcon of w SIEM administrators shall further carry out
Tier 2 or Tier 3 staff. the root cause analysis and track the incident
to closure
4.3.3.2 SIEM Health Check
w Display the device health and outage cket in
The SIEM health status monitoring is designed to the SIEM console and ckeng system.
assist in increasing availability and upme of SIEM.
S In the event where a SIEM system component
SIEM upme monitoring consists of the following
acvies: becomes unreachable and that hampers log
accounng on the SIEM console:
S Install monitoring soware on eligible devices to
w Nofy the authorised contacts
monitor system health, system performance and
report metrics to the authorized/concerned w Invesgate the root cause related to the
pares. For large organisaons, this can be taken configuraon and funconality of the system
care by the Technology Team or NOC (Network component
Operaons Centre) team w Display device health and outage ckets in
the SIEM console and ckeng system
S Analyse and respond to key metrics such as:
w Provide troubleshoong and root cause
w Hard disk capacity analysis.
w CPU and memory ulizaon
4.3.3.3 Event Monitoring and Invesgaon
w Process availability
w Respond to alerts generated by the
SIEM Analysts shall perform event monitoring and
monitoring soware. analysis of security events and correlate events
generated by the SIEM soluon. They are responsible
S Where monitoring soware installaon is not for analysing security events, determine if the events
possible on certain devices, the following are considered an incident, then classify, priorize
acvies can be performed: and escalate as appropriate. Listed below are few of
w Monitor the administrave interfaces of the the acvies of SIEM Analysts:
devices S Monitor SIEM events that result from real-me
w Monitor the event stream generated by the analysis and correlaon of log data from sources
devices idenfied

36 Handbook on Information Security Operations Center


Operating ISOC: Governance, People and Processes

S Perform invesgaon and analysis of the events


S Assist in removing false posives and classify
them as known events
S Create a cket for effecve tracking and closure S Date of the alert triggered
S Idenfy correlated events and classify them as S Time of the alert triggered
security incidents upon invesgaon that S Time zone of the customer locaon
include service levels, priorisaon based on S Log source
SLAs, remediaon and recommendaons
S Severity
S Analyse and respond to key health and S Classificaon
availability monitoring metrics:
S Alarm ID
w Correlaon engine processing rate
S Policy
w Log manager processing rate
S Source Host Name/Source IP address/Source
w Backup of databases Port
w Database ulizaon percentage. S D e s n a  o n H o st N a m e / D e s n a  o n I P
S Examine SIEM configuraon and its funconality address/Desnaon Port
for any potenal issues that may result in S User Account
malfuncon of a parcular component of SIEM S Event Count (Number of logs)
or in enrety and escalate the ma er. S Threat Descripon
Analysts must perform 24x7 security monitoring. Any S Impacted Host/Applicaon
qualified security event shall be reported to the S Remediaon/Recommended Acon.
concerned authories based on the SLAs defined and
agreed. Subsequent to the invesgaon of the alert 4.3.3.4 Alert Classificaon
and anomaly detecon, the ISOC must provide a The ISOC must follow a standard for severity level
noficaon, typically containing the following based on the classificaon of the alerts. The list of the
informaon: idenfied classificaons and associated severity with
some example events can be found below. The ISOC
Analysts must use this standard for tagging the
severity while reporng legimate alerts.

Classification Description Severity


Logs reporting on a successful system or a network
Compromise High
compromise.

Logs reporting on an activity indicating system or network


Attack attack. Attack is known to have originated from a "Bad Guy" High
source.
Logs reporting on activity indicating denial of service where it
Denial of Service High
is assumed to have succeeded to have failed.

Handbook on Information Security Operations Center 37


Operating ISOC: Governance, People and Processes

Classification Description Severity


Logs reporting on activity indicative of malware installation,
propagation or use which is specifically targeting the
Malware High
organisation and can be aligned with any Indicators of
Compromise.
Logs reporting on an activity that is only suspicious but not
Suspicious Medium
known to be a legitimate attack.
Logs reporting on an activity indicative of or directly indicating
Reconnaissance Medium
system or network reconnaissance.
Misuse Logs reporting on an activity indicating network or system Medium
(Policy/Complian misuse.
ce violation)
Activity Logs reporting on general system or network activity. Medium

Risk Logs reporting on potential vulnerability weaknesses. Medium

Authentication Logs reporting on unusual authentication attempts and Medium


account modifications.
Access Logs reporting on general system access activity. Medium
Application Logs reporting on application specific activity. Medium
Failed Attack Logs reporting on attack activity that was not successful, Low
possibly due to preventive measures.
Failed Denial of Logs reporting on denial of service activity that was not Low
Service successful, possibly due to preventative measures.
Failed Malware Logs reporting on malware activity that was not successful, Low
possibly due to preventative measures.
Failed Suspicious Logs reporting on suspicious activity that was not successful, Low
possibly due to preventative measures.
Failed Activity Logs reporting on general system or network activity that was Low
not successful, possibly due to preventative measures.
Other Security Logs reporting on security activity not otherwise classifiable. Low

4.3.3.5 Reporng Process


another detailing the acvity within the ISOC is
As a primary funcon, ISOC needs to generate usually generated every week. These reports can be
regular reports to cater to different people or groups delivered to the management and other members
within the organisaon. A report on incidents and from the escalaon matrix.

38 Handbook on Information Security Operations Center


Operating ISOC: Governance, People and Processes

The ISOC manager must carry out regular review of The Incident Management allows technicians need
all incident records for their resoluon within the to understand:
parameters of the defined severity levels. Proper
S Scope: The number of systems affected
review of incident records that exceeded standard
resoluon mes needs to be validated to check S Impact: The degree to which each system is
whether they were handled appropriately. Based on affected in terms of confidenality, integrity and
the reviews and audits, the ISOC processes and availability
procedures should be updated. S Business Cricality: The importance of the
The service levels must be reviewed once in a month incident based on the business value of the
at least. An example of the response me and impacted systems relave to other systems
resoluon me SLA can be defined as below. All the S Priority: The urgency of the required response
numbers are indicave and should be aligned with relave to other incidents.
individual organisaon security policy/incident The SANS Instute has arculated a thorough
response plan. framework for incident handling that lends
consistency to an oen muddled process. Between
Severity Response Time Resolution Time SLA
idenficaon and closure, according to SANS, the
High 20 mins 24 hours 98% following types of acvies should occur:
Medium 60 mins 48 hours 98% S Containment: Liming the scope and magnitude
High 180 mins 96 hours 98% of the incident
S Eradica on: Eliminang the source of the
Response me is the me within which a security problem or avenue of entry
event upon detected, is invesgated and reported to
S Recovery: Returning affected systems to their
the concerned domains along with recommendaon
to the incident occurred. Resoluon me is the me fully operaonal state
within which the recommendaon is applied and S Follow-up: Documenng the root cause and
helped towards incident closure. impact of the incident; and implemenng
measures to avoid recurrences.
When the SLA of High Severity incidents are set at
98%, the ISOC is bound to respond to those events 4.3.3.6.1 Case Management
within 20 mins and resolve the incidents within three
An analyst performs mulple searches to understand
hours 98% of the mes.
the nature, intent and scope of a suspicious acvity
4.3.3.6 Incident Management Process as part of the invesgaon process. Unless these
searches and the resultant data are organised
As per Symantec, “an incident is a set of one or more
properly, it becomes difficult to interpret and may
security events or condions that requires acon and
lead to an incorrect conclusion resulng an incident
closure in order to maintain an acceptable risk
to slip.
profile. In the haystack of events, organisaons must
find the "needles" that are the security incidents. Cases need to be created within ISOC plaorm, which
Events are isolated and disconnected, but incidents can act as a central repository of evidence ed to
add the context that enables security administrators ongoing invesgaons. They can include any exisng
to gain understanding and take acon”. forensic data within ISOC, as well as external
evidence such as screen captures from third-party

Handbook on Information Security Operations Center 39


Operating ISOC: Governance, People and Processes

products. Case Management ensures that threats


are proacvely idenfied, priorised and rapidly procedures, leverage change management
invesgated within the Security Intelligence Plaorm parameters and provide full documentaon of each
for streamlined incidence response. change, change rollback and auding capabilies.
4.3.3.6.2 Incident Response Flow One needs to decide what needs to be responded to
Responding and managing an insider incident can be automacally and what requires an analyst’s
the most difficult phase. The ISOC should alert intervenon. When addressing insider threat
analysts via pager, e-mail, SMS, etc. and escalate scenarios that may have limited response windows, a
those alerts. It can stop the progression of the growing number of organizaons are now taking
threat/damage in real-me with or without human advantage of automac remediaon. This is a
intervenon. fundamental shiin how organisaons have typically
addressed remediaon in the past, but a required
Remediaon too can take place with or without change because the risks are now so great that there
human intervenon in the form of quaranning or is oen li le to no me for a human response.
blocking an IP address, disabling a MAC address port
on a layer-2 switch and terminang a user’s account. The following picture clearly illustrates the incident
This limits their ability to login to the network or even response process. In case of a security incident, the
physically access the building if the organisaon has SIEM automacally opens a cket in ckeng system
combined their physical and logical security or cket opened by the Tier 1 monitoring people; Tier
soluons. The remediaon capabilies need to 2 personnel carry out invesgaon and assign
follow industry best pracces, organisaonal resoluon tasks to the remediaon people.

Congure

40 Handbook on Information Security Operations Center


Operating ISOC: Governance, People and Processes

4.3.3.7 Vulnerability Assessment and Penetraon


Tesng
Another important component of the ISOC funcons
is Vulnerability Assessment and Penetraon Tesng.
For large organisaons, the same can be a part of a
different team as per individual organisaon security
policy. The organisaon’s security policies must
define the frequency at which the VAPT is performed
at the minimum.
A standard approach is as follows:
S Define scope (devices that need to be scanned
and their IP addresses)
S Set-up a virtual lab
S Install tools such as Nessus, NMAP
S Scan the IP addresses of the devices in scope
S Ensure to limit the number of concurrent
connecons so as to avoid a network crash
S Review the vulnerabilies detected
References
S Generate the report to publish the network
assessment findings S Addressing Insider Threats with ArcSight ESM,
S Each vulnerability will have a risk ra ng h p://viewer.media.bitpipe.com/1120682139_
depending on the its severity 877/1297107228_284/Addressing_Insider_Thr
eats_With_ESM.pdf
S Ensure to have all vulnerabilies closed per the
melines. S The SANS Instute, “Computer Security Incident
Handling Step by Step,” Version 1.5, May 1998
Conclusion
S Managing Security Incidents in the Enterprise
This chapter detailed how to operate ISOC with the h p://www.symantec.com/avcenter/reference
help of a governance model, skilled proficient people /incident.manager.pdf
and processes laid down by organisaonal policies.
S Intelligent Security Operaons: A How-to Guide
HP Enterprise Business White Paper, h ps://
www.hpe.com/h20195/V2/getpdf.aspx/4AA6-
6440ENW.pdf
S Case Management, h ps://logrhythm.com/
products/features/case-management/
S Building a Successful Security Operaons
Centre, HP Enterprise Security Business
Whitepaper.

Handbook on Information Security Operations Center 41


Annexes

Annex 1
ITIL Maturity Model
The Process Maturity Model for IT Asset Management proposed by Patricia Adams of Gartner (2003) is
perhaps the most popularly cited model across ITAM literature. It has five levels of maturity: chaoc, reacve,
proacve, service-oriented, and value creaon.
Step Attributes Goals
1. Chaoc Ÿ No processes, dedicated people or tools Ÿ “Just want to know what we own, where it
Uncontrolled Ÿ No assigned accountability or accounng for changes is, and who is using it”
environment Ÿ Unpredictable services, support and costs Ÿ One-me acvity rather than systemac
30% of enterprises Ÿ Purchasing is ad hoc process.
Ÿ Unused hardware and soware are not controlled
Ÿ Success depends on quality of people, not processes
Ÿ Sub-opmizaon of efforts occurs.
2. Reacve Ÿ Focus is on asset counng Ÿ Perform annual physical inventory and
Limited Ÿ Employs physical inventory and some auto discovery periodic spot audits
accountability recorded on spreadsheets or in a database Ÿ Report on asset counts, but cannot produce
45% of enterprises Ÿ Accountability lies with IS organizaon but there is solid detail data to idenfy and resolve
ineffecve change accounng problems.
Ÿ Hardware and soware viewed separately, not as
single complex asset.

3. Proacve Ÿ There is an IT Asset Program and manager with Ÿ “Clearly defined processes with accountability
Life cycle focus dedicated staff that reports to IS and finance that detail the praccal applicaon of
20% of enterprises organizaons. people, processes and tools that support
Ÿ ITAM with auto discovery tools is integrated with the ITAM Program”
service desk Ÿ Effecve change and configuraon
Ÿ Use of cross-funconal teams for major asset management processes
management projects Ÿ ITAM projects use repeatable processes that
Ÿ Life cycle management process goes from requision, are well defined, adhered to, reviewed, and
to deployment, to rerement re-engineered when necessary.
Ÿ Inventory system linked to financial and contractual Ÿ ITAM operaons manual with asset taxonomy
data. produced and maintained.
4. Service Ÿ Metrics are available to measure program value Ÿ Create SLAs for asset management and use
Oriented Ÿ Services are delivered according to SLA-based plans them as a basis for planning
Service level Ÿ TCO processes in place Ÿ Conduct periodic reviews of service
management Ÿ Automated requision is integrated with purchasing delivery quality
5% of enterprises and ERP systems Ÿ Instute an enterprise technology refresh
Ÿ Just in me inventory pracces used. plan for replacement and rerement of
equipment.

5. Value Creaon Ÿ There is a cost recovery process Ÿ Connuous process improvement with
Cost recovery Ÿ Repository, auto discovery and asset-usage tools all in improving metrics
< 1% of enterprises place Ÿ ITAM data used for problem prevenon
Ÿ Seamless integraon with strategic systems like HR, Ÿ ITAM is a core business process and
accounng, ERP, purchasing, network and systems business enabler
management, IT service desk, problem and change Ÿ Measurement of efficiency (employee
management tools, and business connuity process producvity) and effecveness (customer
Ÿ Decision support and analyc tools available for sasfacon) of business processes across all
mining asset informaon. IT assets in the enterprise.

42 Handbook on Information Security Operations Center


Annexes

Annex 2
2.1 Logging Levels
Log Collecon S Log events that are of business, technical, or
In general, Syslog is the mechanism used for logging compliance value
events. Microso Windows plaorms need an agent S Configure clients and servers for NTP
to forward events in syslog format. The minimum
S Time stamp log messages and include the me
parameters that need to be configured are:
zone in each message
S Logging Desnaons: The collector, relay IP S Configure the client with the minimum log
addresses, or hostnames. To how many collectors. Use Syslog relays to replicate and
des na ons the syslog messages from forward the same message to mul ple
originator need to be forwarded, is dependent desnaons. The desnaons could be like
on the implementaon. monitoring plaorms such as security, problem
S Protocol and Port: By default UDP and port 514 management, and system and network health
are used. The opon of changing to some other monitoring
port and protocol is implementaon specific. S Baseline and monitor the CPU, memory, and
S Logging Severity Level: It can be a value ranging network usage overhead introduced by the
from 0 to 7, as shown in the adjacent table: Syslog service
Logging Severity Levels S Have a limited local logging facility, in file or
memory, so that logs are not completely lost if
Level Severity Levels the Syslog collector is unavailable, such as in the
case of network failure
0 Emergency: System is unusable
S On a regular basis, test that logging is
1 Alert: Acon must be taken immediately
funconing properly
2 Crical: Crical condions S Protect Syslog implementaon by providing
3 Error: Error condions confidenality, integrity and authencity
S The log rotaon and retenon policies be set
4 Warning: Warning condions
properly
5 Noce: Normal but significant condion
S Protect files where logs are stored:
6 Informaonal: Informaonal messages w Restrict access to the system by assigning
7 Debug: Debug-level messages proper files access permissions and enabling
file encrypon.
Logging Recommendaons w Grant read access to log files only to
Enabling logging is associated with cost on authorised users and processes
performance and funconality. Implement Time w Grant write access to log files only to the
synchronizaon for meline events. Enable local Syslog service or any such collecon service
logging to act as a backup repository when the w Apply standard system hardening
centralised logging soluon fails. Before enabling procedures to operang systems that host
logging, consider the following: the logging server.

Handbook on Information Security Operations Center 43


Annexes

Logging Infrastructure 2.2 Best Prac ces for Calcula ng EPS


While designing a logging infrastructure, pay special Rates
a enon to the type of data being received, Speed of hardware, NICs (network interface cards),
expected storage, security requirements, and so on. operang systems, logging configuraons, network
Here are some factors that may influence the design bandwidth, load balancing and many other factors
of logging infrastructure: must also go into benchmark requirements. One may
S Higher severity levels generate more logging have two idencal server environments with two
messages. For example, configuring a firewall for very different EPS requirements due to any or all of
severity level 6 (informaon) results in logging these and other variables. With consideraon of
mulple events per permi ed connecon: these variables, EPS can be established for normal
connecon establishment, terminaon, and and peak usage mes. The equaons included here,
possibly network address translaon. therefore, determine Peak Events (PE) per second
and to establish normal usage swap the PEx by NEx
S Allocate sufficient system resources to the syslog
(Normal Events per second) in the equaons.
client and server based on the number of logging
messages being generated and collected. One List all of the devices in the environment are expected to
may need mulple logging servers to handle a report to the SIEM. Be sure to consider any planned
large amount of logging data. changes, such as adding new equipment, consolidang
S The per-device and aggregate events per second devices,orremovingendoflifeequipment.
(EPS) rates. This depends on the device type, First, determine the PE (or NE) for each device with
available resources, logging level, security these steps:
condions, and its place in the network.
S Carefully select only the security events
S The average size (in bytes) of logging messages.
intended to be collected by the SIEM. Make sure
S Network bandwidth available between the those are the only events included in the sample
logging client and the logging server. being used for the formula
S Consider the load introduced by protecng S Select reasonable meframes of known acvity:
syslog messages using secure network protocols Normal and Peak (under a ack, if possible). This
such as TLS and DTLS. may be any period from minutes to days. A longer
S Consider the scalability requirements of the period of me, such as a minimum of 90 days, will
logging infrastructure as part of capacity give a more accurate average, especially for
planning. “normal” acvity. Total the number of Normal or
Peak events during the chosen period. (It will also
S Collect logging messages using an out-of-band
be helpful to consider compung a “low” acvity
physical or logical network.
set of numbers, because fewer events may be
Having a separate management plane by way of interesng as well.)
virtual LAN (VLAN) or a Mulprotocol Label Switching S Determine the number of seconds within the
(MPLS) Virtual Private Network (VPN) is a good meframe selected
network and system management pracce. One has
S Divide the number of events by the number of
no other opon but to forward logging messages in-
band if a system does not support having a separate seconds to determine PE or NE for the selected
physical or logical management interface. device.

44 Handbook on Information Security Operations Center


Annexes

Formula 1: S Add at least 10% to the grand total for headroom


and another 10% for growth. The resulng
Number of Security Events / Time Period in Seconds
formula becomes:
= EPS
Step 1: (PE1 +PE2 +PE3 ...+ (PE4 x D4 ) + (PE5 x D5
The resulng EPS is the PE or NE depending upon
)... ) = SUM1 [baseline PE]
whether it began with peak acvity or normal
acvity. Once completed this computaon for every Step 2: SUM1 + (SUM1 x 10%) = SUM2 [adds 10%
device, insert the resulng numbers in the formula headroom]
below to determine Normal EPS and Peak EPS totals Step 3: SUM2 + (SUM2 x 10%) = Total PE
for a benchmark requirement. benchmark requirement [adds 10% growth
Formula 2: potenal].

S From the producon environment determine the The Peak EPS is arrived at once these computaons
peak number of security events (PEx) created by are complete. Consult SMEs and the system
each device that requires logging using Formula 1. engineers provided by the vendor in order to
(for idencal devices with idencal hardware, establish a realisc Peak EPS that the SIEM system
configuraons, load, traffic, etc., use this formula must be able to handle.
to avoid having to determine PE for every device): Use this list along with peers’ experience and other
[PEx (# of idencal devices)] references as resources to set benchmarks for the
S Arrive at a grand total by summing up all PE infrastructure. Sample templates are provided
numbers for the environment below.

Total Average
Qty Type Description Avg EPS
Peak EPS Peak EPS
Included Included Included
Employees/Endpoints
750 Desktops & Laptops at 5 locations at domain at domain at domain
(Windows XP)
severs servers servers
7 Cisco Catalyst Switches One at each loaction, one in DMZ 5.09 51.88 26.35
and one in the Trusted network
7 Cisco Gateway/Routers One at each location 0.6 380.5 154.2
5 Windows 2003 Domain One at each location 40 404.38 121.75
Servers
3 Windows 2003 In high availability duster at Data 1.38 460.14 230.07
Application Severs Center

3 MS SQL Database High availability cluster at Data 1.83 654.9 327.45


Servers Running on Center
Windows 2003 Server
6 Microsoft Exchange One at each location with two 3.24 1121.5 448.6
Servers (duster) at the Data Center
3 MS IIS Web Servers on High availability cluster at Data 1.17 2235.1 1117.55
Windows 2003 Center

Handbook on Information Security Operations Center 45


Annexes

Total Average
Qty Type Description Avg EPS
Peak EPS Peak EPS
2 Windows DNS Servers At Data Center - failover 0.72 110.8 110.8

2 Linux Legacy Application At Data Center 0.12 43.6 21.8


Servers
1 Linux MySQL Database One in trusted network for legacy 0.12 21.8 21.8
Server application
7 NitroGuard IPS One at each location, one in DMZ 40.53 5627.82 1607.95
and one in the trusted network
1 Netscreen Firewall Netscreen facing th Internet 0.58 2414 2414

3 Cisco Pix Firewalls Between the Data Center and the 39 1734 1178
other four sites, in front of trusted
network between trusted and the
DMZ
1 Cisco VPN Concentrator Located at Data Center facing the 0.83 69.45 69.45
Internet
1 Squid Proxy Located at Data Center 14.58 269.03 269.03
Totals 149.79 15598.9 8118.8

Avg.
Feature Benchmark Settings Explanation Avg. Peak
Peak
Relevant and Critical logs are
System Logs Collected Collected. Should be able to
handle peak threshold.
Network Devices Source destination, calls
§ Fire Walls connections, access, traffic
§ VPNs/SSL and other security-related log
§ IAM.Switches data can be collected and
§ Routers normalized at specified rate..
§ Web Process

EndPoints Collection from endpoint


§ Servers security-related data at
§ O/S’s specified EPS.
§ Security
§ Mac
§ MCs

Commercial Apps Security- related data from


§ HR/Workflow commercial applications is
§ Business Critical collected as needed.
§ Contain P1 Data

46 Handbook on Information Security Operations Center


Annexes

Avg.
Feature Benchmark Settings Explanation Avg. Peak
Peak
Custom Apps Security-related data from
§ Legacy apps custom/legacy applications
§ Mainframe and systems are collected as
§ Midrange needed.

Databases Access logs and other


§ Third Party DB security-related data from
§ Monitoring tools databases collected.
§ Database Session logs

Backup Systems Backup Systems log data is


collected.

Virtual System Logs Virtual Machines(VMs) and


(applies to any of the VM managers are held to the
Above systems that are same performance and
virtualized) monitoring standards as
physical devices.

2.3 Threat Informaon Sharing to exchange cyberthreat informaon represented by


the previously discussed schemas.
A number of standards of schemas are being
developed for disseminang threat intelligence 2.4 ISOC Budget
informaon, including the following:
People Cost
S Structured Threat Informa on eXpression
The following table shows a sample cost for ISOC
(STIX): An express language designed for sharing
personnel. The annual salary and benefits may vary
of cybera ack informaon. STIX details can
from state to state (or countries). The number of
contain data such as the IP address of command-
people are esmated for running a 24×7 ISOC with
and-control servers (CnC), malware hashes, and
three analysts in first shi and two analysts in second
so on. Learn more at h p://sx.mitre.org/
and third shis.
S Open Indicators Of Compromise (OpenIOC):
Annual Personnel Cost Esmates Template
Open framework for sharing threat intelligence
in a machine-digesble format. Learn more at Unit Total
h p://www.openioc.org/ Job Quanty Annual Annual
Cost Cost
S Cyber Observable eXpression (CybOX): A free
Tier 1 Analysts
standardized schema for specificaon, capture,
characterizaon, and communicaon of events Tier 2 Analysts
of stateful properes that are observable in the Tier 3 Analysts/
operaonal domain. Learn more at h ps:// Threat Hunters
cybox.mitre.org/
Forensic Specialist
Transport mechanisms, such as Trusted Automated Malware Engineer
eXchange of Indicator Informaon (TAXII), are used
(Esmate for a 24x7 ISOC will depend upon number of shis and actual
number of analysts required for an organisaon)

Handbook on Information Security Operations Center 47


Annexes

Other Annual Recurring Costs


Unit Total
Job Quanty Annual Annual Example of other recurring costs are given in the
Cost Cost table below. First two rows are le empty. A simple
ISOC Manager rule is to take 20% of capital expenses as annual
depreciaon and maintenance cost. Accounts
Total Annual Cost
personnel may have to be consulted for a be er
(Esmate for a 24x7 ISOC will depend upon number of shis and actual esmate.
number of analysts required for an organisaon)

Capital Cost for Technology Annual Recurring Cost Esmates

The following table shows es mated cost of


technology. This may vary depending upon size of Descripon Quanty Unit Cost Total Cost
organisaon but this template tried to cover major
expenses. As an example, the cost of SIEM may be Depreciaon of office
much smaller or quite large depending upon equipments
geographical locaons, amount of data collected,
Soware/Hardware
applicaons, and so on. This is to give a starng point. Maintenance
Capital Cost Template Staff Training , Skills
update

Descripon Quanty Unit Cost Total Cost Incident Response


Exercises

Threat Intelligence
SIEM Soluon
Feeds
NBAD
Vulnerability Scanning
PIM (Network)

DAM Vulnerability Scanning


(Applicaons)
Server Hardware
Total Annual Cost
Laptops (The list is only indicave. Other similar costs to be added as per the setup)

Forensic Soware
References
Secure Cabinets/Locks
S Benchmarking Security Informaon Event
Log Storage and
backup
Management (SIEM) by J. Michael Butler
h  p s : / / w w w. s a n s . o r g / r e a d i n g - r o o m /
Office, Furniture, etc. whitepapers/analyst/benchmarking-security-
Miscellaneous informaon-event-management-siem-34755
Professional S Building a Successful Security Operaons Center
Consulng/design/ Part 3: SOC Budget Calculator by Rafeeq Rehman
setup
h p://rafeeqrehman.com/2017/02/05/soc_bu
Total Annual Cost dget_calculator/
(The list is indicave. Other S/W and H/W costs to be added as per requirement)

48 Handbook on Information Security Operations Center


Annexes

Annex 3
3 - A : Log Collecon Format
Applicaon (AV,
Operang Log
ADS/LDAP, DHCP, IP No. of
S. No. System/ Version Hostname Collecon Owner Locaon Remarks
Mail, Custom Address devices
IOS Method
applicaons, etc.)

3 - B: Indicave List of Assets


S. No. Asset Quanty Vendor/Brand and Version

1 Unix Servers (Linux, AIX, HP-UX, etc.)

2 Windows General Purpose Servers

3 Windows Acve Directory Servers

4 Windows IIS and Exchange Servers

5 Proxy Servers

6 DNS and DHCP Servers

7 AS 400/iSeries

8 Mainframe/LPARs

9 Routers and Switches

10 Firewalls – Internal

11 Firewalls – External

12 VPN devices

13 Network IDS/IPS

14 Host IDS/IPS

15 Database Acvity Monitoring Systems

16 Anvirus Servers

17 Endpoint DLP

18 Network DLP

19 Database Servers

20 Applicaons

21 Tickeng Systems (for example BMC Remedy)

Handbook on Information Security Operations Center 49


Annexes

S. No. Asset Quanty Vendor/Brand and Version

22 Custom Applicaons/Addional Log Sources (insert rows below and


describe)

23 <insert rows here>

24 <insert rows here>


25 Total Event/Log Sources

26 Do you want to capture ne lows? If so, please answer a and b below.
27 a. How many total end user workstaons/laptops are on the network?
28 b. How many total servers are on the network?

29 Total Flow Sources

3 - C: Indicave list of Dashboards

Capture
Dashboard Chart Display Time Time
Dashboard Name Value to Graph
Type Type Top Series Range
Data
Default - IDS/IPS-All:Top Alarm Pie
Event Count (Sum) 10 Yes 24 hours
Signatures (Event Count) Chart
Top Systems A acked (IDS/IDP/IPS) Event Count (Sum) Table 10 yes 24 hours
(Event Count)
Threat & Most Recent Offenses Default Default Default No 1 minute
Security
Monitoring Most Severe Offenses Default Default Default No 1 minute

Top Category Types Default Default Default No 1 minute

Top Sources Default Default Default No 1 minute

Top Local Desnaon Default Default Default No 1 minute

Firewall Deny by DST IP (Event Count) Event Count (Sum) Bar 5 Yes 24 hours
Chart
Firewall Deny by DST Port (Event Count) Event Count (Sum) Table 5 Yes 24 hours
Network Top Talkers (Total Bytes) Total Bytes (Sum) Bar 5 Yes 24 hours
Overview Chart
Top Log Sources (Event Count) Event Count (Sum) Table 5 Yes 24 hours
Firewall Deny by Source IP (Event Event Count (Sum) Bar 5 Yes 24 hours
Count) Chart

50 Handbook on Information Security Operations Center


Annexes

Capture
Dashboard Chart Display Time Time
Dashboard Name Value to Graph
Type Type Top Series Range
Data
Outbound Traffic by Country/Region Total Bytes (Sum) Bar 10 Yes 24 hours
(Total Bytes) Chart
Applicaon Top Applicaons Outbound to the Total Bytes (Sum) Bar 10 Yes 24 hours
Overview Internet (Total Bytes) Chart
Total Applicaons (Total Bytes) Total Bytes (Sum) Bar 10 Yes 24 hours
Chart
Security News Default Default 5 No 1 minute
Security Advisories Default Default 5 No 1 minute
Vulnerability
Managemen Internet Threat Informaon Center Default Default Default No 1 minute
t and
Scans In Progress Default Default 5 No 1 minute
Intelligence
New Vulnerabilies in the last 7 Vulnerability Count Bar 10 No 1 minute
days / Network Chart

3 - D: Sample A ack Scenarios everyone (from any host, not restricted to its
own network) to send e-mails to any desnaon
Brute force a ack to an administrave interface in order to contribute to spam campaign
(SSH, applicaon interface)
S Applicaon level a ack to web server (SQL
This scenario is straight forward. Mulple connecon injecon): Exploitaon of an applicaon level
a empts either to an exposed SSH server or to an vulnerability on a web page allowing the a acker
exposed web administraon page. The a ack to dump the database.
scenario includes two variants, one – resulng in a
successful connecon aer some requests and Virus/Trojan Infecon in the Internal Network
another with no success. Malware infecon through e-mail a achment,
Vulnerability Exploitaon of Crical Server spreading itself throughout the internal network.
S Authencaon bypass of an SQL server: A empt Covert Channels of Communicaon
to bypass the authencaon procedure of an SQL This kind of a ack involves the use of a side channel
server by exploing known vulnerabilies in order to circumvent monitoring and bypass
S Abuse of misconfigured DNS server (open control. As an example, an a ack including a DNS
relay): Exploitaon of a DNS server which server abuse from an internal user in order to
permits openly (from any host, not restricted to establish a DNS tunnel and circumvent data traffic
its own network) recursive queries in order to policies regarding data ex-filtraon was used.
conduct a reflected a ack Detecon of Advanced Persistent Threat
S Abuse of misconfigured SMTP ser ver: Advanced persistent threat (APT) includes a variety of
Exploitaon of an SMTP server which permits a acks and techniques sharing a common factor, the

Handbook on Information Security Operations Center 51


Annexes

advanced level of sophiscaon and complexity of the


a ack in order to avoid detecon and treatment. As an Use Case Objecve: Aimed at generang an alert the
example of such a ack, we used the infecon and moment it is noced that a crical server is accessed
compromise of the crical infrastructure (Web Server) without going through PIM.
without idenficaon of the entry point/procedure (in
Use Case Logical Flow: When an administrave
our case, phising e-mail leading to trapped web page
access to a crical system happened, check whether
distribung malware).
that access was granted from PIM. If not, generate an
3 - E: Use Case Development alert.
Use Case Development Correlaon Rules and Data Analysis: Capture the
Look at cybersecurity incidents that the organisaon current set of crical systems through the asset
has experienced over the past few years. Look for management feed. Correlate administrave access
common occurring scenarios in those incidents. success events on all cri cal systems with
administrave access success on PIM. Where an
Look at the recent audit findings. See if the findings
administrave access on crical systems is successful
can be addressed by being able to detect and
without a matching event on PIM; (or) where IP
respond to parcular threats to parcular assets
address of host logging into crical system is not PIM,
more effecvely.
generate a high priority alert to the main channel.
Look at the SIEM selected by the organisaon. See
Data Collecon Points:
whether there are any use-cases that can be
relavely deployed using easy to integrate event and S CMDB – Configuraon Management Database
data sources with the off-the-shelf correlaon rules for asset cricality
within SIEM. S Event log and Syslog associated with all crical
Here is an example of a simple use case. (Source: systems
CISCO SOC Book) S Event logs and Syslog associated with PIM.
Background Damage Potenal: High, due to risk associated with
As a result of recent audit, all administrave access to inappropriate administrave access.
cri cal systems has been given through PIM Implementaon and Ongoing Operaonal Effort:
(Privileged Identy Module) servers. Admins need to Simple, no addi onal advanced parser or
log in to PIM, before proceeding for accessing any customizaon required.
crical server. The advantage of this kind of system is Views and Visualisaons: Alerted as high priority
that all admin acvies can get recorded. However, with in main channel and compliance channel.
organisaon suspected that some direct admin access Relevant alerts to be reported via ad hoc and regular
connued to happen avoiding the PIM. Management compliance reporng.
requested a use case that could be used to flag
potenal policy violaons for further invesgaon. Compliance Mapping: Administrave Access Policy
Document the Use Case Standard Responses and Escalaons: Alerts need to
be invesgated by analysts, see whether the alert is
Use Case ID: Crical Systems – Admin Access 1 false posive, if false posive, report it as false and
Scope: Crical Systems close. Otherwise, if this appears to be inappropriate
Use Case Category and subcategory: Policy behaviour by an authorised admin, alert admin's
Violaons – Inappropriate administrave Access. direct supervisor or manager.

52 Handbook on Information Security Operations Center


Glossary

Glossary
1 AIX An Unix Flavour Operang System sold by IBM
2 APT Advanced Persistent Threats
3 BCP Business Connuity Planning
4 BOT Build Operate and Transfer Model
5 CISO Chief Informaon Security Officer
6 CMDB Configuraon Management Database
7 CMMI Capability Maturity Model® Integraon
8 CnC Command-and-Control
9 CSOC Cyber Security Operaons Center
10 CTI Cyber Threat Intelligence
11 CybOX Cyber Observable Expression
12 DAM Database Acvity Monitoring
13 DB Database
14 DBA Database Administrator
15 DBMS Database Management Systems
16 DC Data Center
17 DCL Data Control Language
18 DDL Data Definion Language
19 DDOS Distributed Denial of Service
20 DHCP Dynamic Host Configuraon Protocol
21 DLP Data Leakage Prevenon
22 DML Data Manipulaon Language
23 DMZ Demilitarized Zone
24 DNS Domain Name System
25 DOS Denial of Service
26 DPI Deep Packet Inspecon
27 DR Disaster Recovery

Handbook on Information Security Operations Center 53


Glossary

28 DRP Disaster Recovery Plan


29 DSS Data Security Standard
30 DST Desnaon
31 DTLS Datagram Transport Layer Security
32 EPS Events per Seconds
33 ERP Enterprise Resource Planning
34 FPS Flows per Second
35 HP-UX An Unix Flavour Operang System sold by HP
36 ICT Informaon and Communicaon Technology
37 IDAM Identy Access Management
38 IDS Intrusion Detecon System
39 IP Internet Protocol
40 IPS Intrusion Prevenon System
41 ISOC Informaon Security Operaons Center
42 ISO Internaonal Organisaon for Standardisaon
43 ISP Internet Service Providers
44 ISVM Informaon Security Vulnerability Management
45 ITAM Informaon Technology Asset Management
46 ITIL Informaon Technology Infrastructure Library
47 ITSM IT Service Management
48 JDBC Java Database Connector
49 KPI Key Performance Indicator
50 LDAP Lightweight Directory Access Protocol
51 MDM Mobile Device Management
52 MPLS Mulprotocol Label Switching
53 NAC Network Access Control
54 NAS Network A ached Storage
55 NAV Network Analysis and Visibility

54 Handbook on Information Security Operations Center


Glossary

56 NBAD Network Behaviour Anomaly Detecon


57 NDA Non-Disclosure Agreements
58 NEx Normal Events per Second
59 NICs Network Interface Cards
60 NMAP Network Map
61 NOC Network Operaons Center
62 NTP Network Time Protocol
63 OEM Original Equipment Manufacturer
64 OpenIOC Open Indicators of Compromise
65 OS Operang System
66 OTP One-Time Password
67 OWASP Open Web Applicaon Security Project
68 PCI Payment Card Industry
69 PE Peak Events
70 PIA Privacy Impact Assessment
71 PIM Privilege Identy Management
72 PKI Public Key Infrastructure
73 RFP Request For Proposal
74 ROI Return On Investment
75 SACM Service Asset Configuraon and Management
76 SAN Storage Area Network
77 SDN Soware Defined Network
78 SEN Security Event Noficaons
79 SIEM Security Incident and Event Management
80 SLA Service Level Agreement
81 SMTP Simple Mail Transfer Protocol
82 SNMP Simple Network Management Protocol

Handbook on Information Security Operations Center 55


Glossary

83 SOP Standard Operang Procedures


84 SQL Structured Query Language
85 SSO Single Sign-on
86 STIX Structured Threat Informaon Expression
87 TAXII Trusted Automated Exchange of Indicator Informaon
88 TCL Transacon Control Language
89 TCO Total Cost of Ownership
90 TCP Transmission Control Protocol
91 TLS Transport Layer Security
92 TOR The Onion Router (used for Accessing Internet anonymously)
93 UAT User Acceptance Test
94 UDP User Datagram Protocol
95 VAPT Vulnerability Assessment Penetraon Tesng
96 VPM Vulnerability and Patch Management
97 VPN Virtual Private Network
98 WAF Web Applicaon Firewall
99 WAN Wide-Area Network

56 Handbook on Information Security Operations Center


CONTRIBUTORS
Mentor
DR. A.S. RAMASASTRI, Director, IDRBT

Members

Shri Y. V. Ramana Murthy, CISO, State Bank of India

Shri Sachin Y Shende, General Manager ,RBI

Mrs. B. Aparna, Manager (Systems), State Bank of India

Shri. Nabojyoti Sarkar, Manager, ICICI Bank

Shri Murtaza Bhatia, Practice Head (Data Centre & Security), Dimension Data

Shri B. Kuldeep, Manager, Deloitte

Shri P. Parthasarathi, Chief Technology Officer, IDRBT

Shri. G. Raghuraj, General Manager, IDRBT

Dr. V. Radha, Assistant Professor, IDRBT

Dr. Rajarshi Pal, Assistant Professor, IDRBT

Shri. V. S. Mahesh, Assistant General Manager, IDRBT


Institute for Development and Research in Banking Technology
Established by Reserve Bank of India

Castle Hills, Road No., Masab Tank, Hyderabad - .


EPABX: +    , Fax: +    
Web: www.idrbt.ac.in, e-mail: publisher
idrbt.ac.in

Potrebbero piacerti anche