Cisco ISE and Splunk Integration Use Cases At-A-Glance

advertisement
At-A-Glance
Cisco ISE and Splunk
Integration
Identity and Device Awareness for Splunk Analytics
Cisco ISE + Splunk Delivers
Identity/Device Aware Security & Threat Response
Identity/Device Context from ISE
Cisco ISE
pxGrid
Context
Sharing
Use Cases
• Prioritize important events: Use Cisco
ISE contextual information to answer
common questions needed to expedite
the Splunk classification of, and
response to, a security event.
• Scrutinize mobile and device network
activity: Splunk uses Cisco ISE devicetype information to create security
analytic policies specific to mobile
devices for a comprehensive view of
their security and performance status.
• Scrutinize important users: Cisco ISE
user information helps enable Splunk
to create security policies for specific
users or groups, such as populations
with access to highly sensitive data or
less trusted populations (for example,
guests).
• Visualize and analyze Cisco ISE
telemetry and event data: Use Splunk
to analyze and create alerts based
on Cisco ISE event data, such as
authentication attempts and network
access trends.
• Turn event analysis into action:
Use Splunk to determine the threat
associated with event data, then use
Cisco ISE to take a network mitigation
action (for example, quarantining or
disconnecting a user).
Splunk
Threat Response via ISE
Overview
Today’s diverse networks require effective security event visibility and
the integration of accurate contextual data such as user identity, user
privilege levels, endpoint device type, and endpoint security posture.
The Cisco® Identity Services Engine (ISE) provides contextual data while
Splunk provides the event visibility. It’s a powerful combination that
provides administrators with a meaningful, easily understandable picture
of security and other events on the network.
Splunk is a machine data platform that allows you to search, report,
alert, and visualize any data that it ingests. Cisco ISE brings an added
dimension to analyzing all this data. It attaches key contextual data (for
example, username, location, network policy status) to events and data
analyzed by Splunk. Meanwhile, Splunk brings an added dimension
to Cisco ISE event monitoring: It helps enable user-driven analysis of
that data to create customizable dashboards and reports. Furthermore,
Splunk administrators may also use Cisco ISE as a conduit for taking
mitigation actions on users or devices within the Cisco network
infrastructure in response to an event in Splunk.
Integrating Cisco ISE and Splunk data and analysis provides IT
operations with the context they need to quickly assess the significance
of network and security events. They can answer critical questions (for
example, Who is this event associated with? What level of access does
the user have?) all within the Splunk system. For Cisco ISE, Splunk
analysis of Cisco ISE data enables administrators to answer other key
questions (for example, How many users have been accessing the
network over the past six months? Are there noticeable trends?)
© 2014 Cisco and/or its affiliates. All rights reserved.
nce
At-A-Glance
Use Cases
How the Solution Works
• Create customizable monitoring and
reporting dashboards for Cisco ISE
data: Employ Splunk analytics and
display functions to monitor any Cisco
ISE user, device, location, group,
authorization or authentication data
and correlate with data from other
Splunk sources.
• Mine your historical data: Analyze
network access, users, and device
trends from any perspective to
conduct network capacity planning,
simplify compliance reporting, or
perform security forensics.
Cisco ISE delivers contextual data to Splunk by means of the free
Splunk for Cisco ISE Add-On, which can be found by searching on
“Cisco ISE” at http://apps.splunk.com/. Key Cisco ISE contextual data
collected by Splunk includes the following:
• User: user name, IP address, authentication status, location
• User class: authorization group, guest, quarantine status
• Device: manufacturer, model, OS, OS version, MAC address, IP
address, network connection method (wired or wireless), location
• Posture: posture compliance status, antivirus installed, antivirus
version, OS patch level, mobile device posture compliance status
(through mobile device management [MDM] ecosystem partners)
The use cases outlined in this document are accomplished through the
following:
• Cisco ISE provides its user identity and device information to Splunk
through the Splunk for Cisco ISE Add-On.
• This contextual data is used to create new security analysis classes
for high-risk user populations or devices. A common application is
to create analytic policies specific to mobile devices or users with
access to highly sensitive information.
• Cisco ISE contextual data is also appended to other platform data
in the Splunk system to provide the additional context of the user,
device, and access level. The correlation of all this data helps analysts
better understand the significance of an event.
• Cisco ISE contextual data can serve as an additional source of
security insight. Splunk platforms can trend Cisco ISE data to discover
abnormal, important, or suspicious activity.
• Cisco ISE can serve as a conduit for taking mitigation actions within
the Cisco network infrastructure. Threat event results from Splunk
can be distilled into mitigation action by using Cisco ISE to undertake
quarantine or access-block actions on users and devices.
• All functions can be logged, reported, and alerted upon within Splunk
to provide a unified network-wide view of important events and
historical data for reporting.
Next Steps
For More Information
• Cisco ISE-specific Collateral by Splunk at Cisco Marketplace:
https://marketplace.cisco.com/catalog/products/4178
• Cisco ISE+SIEM/Threat-Defense Integration Video: http://www.cisco.
com/en/US/prod/collateral/vpndevc/ps5712/ps11640/protect.html
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco and the Cisco logo are trademarks or registered trademarks of
Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/
go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner
does not imply a partnership relationship between Cisco and any other company. (1110R)
C45-732928-00 10/14
Download