Uploaded by JHTOMAS7

QRadar Architecture - Deep Dive

advertisement
How QRadar SIEM Collects
Security Data
Luis Latas
WW Technical Sales Enablement
QRadar Data Flow - Overall
From an Appliance Perspective
Event Collector Capabilities
Event Collector
(ecs-ec-ingress)
Event Collector
(ecs-ec)
From an Appliance Perspective
Event/Flow Processor Capabilities
Event Collector
(ecs-ec-ingress)
+
Event Collector
(ecs-ec)
Event Processor
(ecs-ep)
From an Appliance Perspective
AIO/Console Capabilities
Event Collector
(ecs-ec-ingress)
+
Event Collector
(ecs-ec)
Event Processor
(ecs-ep)
Magistrate
High-level component architecture and data stores
Flow and event data is stored in the Ariel
database on the event processors
Identities
Assets
Offenses
Configuration
– If accumulation is required, accumulated data is stored
in Ariel accumulation data tables
– As soon as data is stored, it cannot be changed (tamper
proof)
Console services
User interface
Magistrate
Reporting
Flows
Events
Accumulations
– Data can be selectively indexed
Offenses, assets, and identity information are
stored in the master PostgreSQL database on the
Console
Event processor
Flow collector
Event collector
Network packet
interface, sFlow,
and 3rd party
Events
from log
sources
– Provides one master database with copies on each
processor for backup and automatic restore
Secure SSH communication between appliances in
a distributed environment is supported
6
QRadar Data Flow - Overall
IBM Security / © 2020 IBM Corporation
7
Collecting and Normalizing raw events
An event is a record from a device that describes an action on a network or host.
QRadar SIEM normalizes the varied information found in raw events.
– Normalizing means to map information to common field names, for example:
• SRC_IP, Source, IP, and others are normalized to Source IP.
• user_name, username, login, and others are normalized to Username.
– Normalized events are mapped to high-level and low-level categories to facilitate further
processing.
– After raw events are normalized, it is easy to search, report, and cross-correlate these
normalized events.
Event data pipeline
Event data is sent to or pulled by QRadar
Event
Data
Event Collector Ingress – Responsible for
collecting data at all times (zero event loss)
Data is collected and buffered during patch and
deploys and processed once the operation is
complete
Protocols – Reads or pulls raw data from network
devices (e.g: Windows Servers, Firewalls, etc)
Throttle Filter - Licensing - On a second-bysecond basis, slows down the incoming rate so
it does not exceed the license on the appliance.
Protocols
Event
Collector –
Ingress (ecsec-ingress)
Throttle
Filter
Licensing
Event
Collector
(ecs-ec)
Events are sent to ecs-ec-parse to be parsed
IBM Security / © 2020 IBM Corporation
9
Event data pipeline
Event
Collector –
Ingress (ecsec-ingress)
Event data is received from the ecs-ec-ingress
Parsing – DSMs / LSX / CEP – take the raw data
and normalize it into a common structure.
Coalescing - “Event Compression”. Find nearly
identical events and delete one and increase the
event count on the record. Key is: source IP, dest
IP, dest port, QID, username
Forwarding - Applies routing rules for the system,
such as sending event data to offsite targets,
external Syslog systems, JSON systems, and other
SIEMs.
Log Only/Data Store supports the storage of an
unlimited number of logs without counting against
the EPS License
Events are then sent to the Event Processor
component and pass through the Custom Rules
Engine (CRE).
IBM Security / © 2020 IBM Corporation
Parsing
(DSM, LSX,
CEP)
Event
Collector
(ecs-ec)
Coalescing
Forwarding
Log
Only/Data
Sore
Event
Processor
10
Events not counted against the EPS licenses
-
The list of log source types that do not incur EPS hits are as follows:
- System Notification
- Custom Rule Engine (CRE)
- SIM Audit
- Anomaly Detection Engine
- Asset Profiler
- Search Results from scheduled searches
- Health Metrics
- Sense DSM
- Risk Manager questions, Simulations and internal logging
-
Log Only/Data Store
-
Supports the storage of an unlimited number of logs without counting against the EPS QRadar
SIEM license
-
Enables an organization to build custom apps and reports based on this stored data to gain
deeper insights into IT environments.
Event Coalescing
-
Event Coalescing is a method of reducing the data going through the pipeline.
-
As data arrives in the pipeline QRadar will attempt to group like events together into a
single event.
-
Coalescing occurs after licensing and parsing
-
Coalescing is indexed by Log Source, QID, Source IP, Destination IP, Destination Port
and Username.
-
If more than 4 events arrive within a 10 second window with these properties being
identical any additional events beyond the 4th will be collapsed together.
-
Coalesced events can be identified by looking at the Event Count column in the log
viewer, if the Event Count is >1 the event has been coalesced.
-
Coalescing can be turned on or off per log source or by changing the default setting in
the system setting page.
QRadar Data Flow - Overall
© Copyright IBM Corporation 2017
13
Flow collection and processing
A flow is a communication session between two hosts
QFlow Collectors read packets from the wire or receive flows from other devices
QFlow Collectors convert all gathered network data to flow records similar normalized
events; they include such details as:
– when, who, how much, protocols, and options.
Flow pipeline
The QFlow component collects and creates flow information from
internal and external flow sources
Flows
Event Collector – Responsible for parsing and normalizing incoming
flows
Qflow
Asymmetric recombination - Responsible for combining two sides of
each flow when data is provided asymmetrically
Deduplication - Flow deduplication is a process that
removes duplicate flows when multiple Flow
Collectors provide data to Flow Processors appliances.
Flow Governor - Monitors the number of incoming flows
to the system to manage input queues and licensing.
Custom flow properties – extracts any properties defined
in the Custom Flow Properties
Forwarding - Applies routing rules for the system, such as
sending flow data to offsite targets, external Syslog
systems, JSON systems, and other SIEMs.
Flows are then sent to the Event Processor component
and pass through the Custom Rules Engine (CRE). They
are tested and correlated against the rules that are
configured
Asymmetric
Recombination
De-Duplication
Event
Collector
Flow Governor
(Licensing)
CFP Parsing
Flow
Forwarding
Event Processor
QRadar Data Flow - Overall
IBM Security / © 2020 IBM Corporation
16
Event & Flow Correlation and Processing
After Events and Flows are normalized they are then
sent to the Event Processor for processing
Event
Collector
Licensing is applied again on ingress to the EP
The CRE or Custom Rules Engine Applies the
correlation rules that were created in the UI.
Flow data is then sent to the Ariel Database for
storage.
Host Profiling – Also called passive profiling or
passive scanning. Watches flows on the network in
order to make educated guesses about which
IPs/assets exist and what ports are open.
Streaming – Responsible for the “real time
(streaming)” view in User Interface
If an event matches a rule, the Magistrate component
generates the response that is configure in the custom
rule
Licensing
CRE
Event
Processor
Ariel
Storage and
Indexing
Host Profiling
Real Time
streaming
Magistrate
Asset Profiler
QRadar Data Flow - Overall
IBM Security / © 2020 IBM Corporation
18
Magistrate
• The Magistrate creates and stores offenses in the PostgreSQL database; these
offenses are then brought to the analyst’s attention in the interface
• The Magistrate instructs the Ariel Proxy Server to gather information about all
events and flows that triggered the creation of an offense
• The Vulnerability Information Server (VIS) creates new assets or adds open
ports to existing assets based on information from the EPs
• The Anomaly Detection Engine (ADE) searches the Accumulator databases for
anomalies, which are then used for offense evaluation
Ariel Components
Ariel Proxy Server
Event
Processor
Ariel Query Server
Ariel
Ariel
Historical
Correlation
Offline Forwarder
Accumulator
Report Runner
Ariel Components
Ariel Components
Console
Ariel Proxy
Server
Ariel
Ariel query
Server
Ariel query
Server
Managed Host
Ariel
Managed Host
Ariel
Asset and Vulnerability Flow
ecs-ec
(event collector
Identity Data
Asset Profiler
Passive
Profiling
Scanners/QVM/3rd
Party
vis
(Vulnerability
integration service)
ecs-ep
Event Processor
POSTGRES
Gathering asset information
Active scanners
QRadar Vulnerability Manager scanner,
Nessus, Nmap, Qualys, and others
Provide:
• List of hosts with risks and potential
vulnerabilities
• IP and MAC addresses
• Open ports
• Services and versions
• Operating system
Pros
• Detailed host information
• Policy and compliance information
Cons
•
•
•
•
Out of date quickly
Full network scans can take weeks
Active scanners cannot scan past firewalls
User can hide from active scans
Passive detection
Flows from QFlow, or other flow
sources in accounting technologies
such as IPFIX/NetFlow, sFlow, and
others
Provide:
• IP addresses in use
• Open ports in use
Pros
• Real-time asset profile updates
• Firewalls have no impact
• End system cannot hide
• Policy and compliance information
Cons
• Not as detailed as active scans
• Does not detect installed but
unused services or ports
The Remainder
Hostcontext
“Owns” the host it is responsible for starting and stopping
processes and for overall system health and backups.
Reporting Executor
A stopwatch responsible for keeping track of reports and
when they should run and then instantiating the report
runner
Report Runner
The process that actually generates the reports, querying
postgres, Ariel, etc.
Tomcat
Process that drives our web UI and serves up web pages.
Historical Correlation
Processor
Process that is responsible for historical correlation. Runs a
specified search, runs the results through CRE rules (based
on QRadar time or device time) and generates offenses
QRadar Data Flow - Overall
Thank you
Follow us on:
ibm.com/security
securityintelligence.com
ibm.com/security/community
xforce.ibmcloud.com
@ibmsecurity
youtube.com/ibmsecurity
© Copyright IBM Corporation 2020. All rights reserved. The information contained in these materials is provided for
informational purposes only, and is provided AS IS without warranty, of any kind, express or implied. Any statement of
direction represents IBM’s current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM,
the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in
the United States, other countries or both. Other company, product, or service names may be trademarks or service marks
of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention,
detection and response to improper access from within and outside your enterprise. Improper access can result in
information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems,
including for use in attacks on others. No IT system or product should be considered completely secure and no single
product, service or security measure can be completely effective in preventing improper use or access. IBM systems,
products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve
additional operational procedures, and may require other systems, products or services to be most effective. IBM does not
warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious
or illegal conduct of any party.
Download