Defining, building, and making use cases work Paul Brettle – Presales Manager, Americas Pacific Region © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. What is a use case? • • • • • • • • 2 Compliance – FISMA, PCI, SOX, etc… Network security – firewalls, IDS, routers & switches Malware Systems – application and operating system User monitoring – identity, privileged user, shared accounts SOC metrics – management metrics, analyst team, infrastructure performance Fraud – banking, atms Others? © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Defining a Use Case Problem 1 statement 6 5 3 Evaluate Define and refine the objective Identify Identify deliverables data source Define thresholds 4 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 2 3 Example use case – audit log cleared How do I know when the audit Problem log is cleared on my systems? statement How do I want to be made aware? • Notification to CIRT • Dashboard tracking • Compliance • Report to Auditors of Audit Log Cleared Evaluate Define and refine the objective Identify Identify deliverables data source Data I need to be notified when audit logs are cleared for my critical assets Operating System IDS/IPS (Host) Firewalls Define thresholds What are my thresholds? (Always, Frequency based, 4 something else?) © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Building a use case • Capture the data / requirements consistently • Utilise a standard process • • • What works for you is great Consider Use Case forms https://protect724.arcsight.com/docs/DOC-1523 (Cindy Jones) • Targeted, simple, manageable • Steer clear of monolithic packages 5 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Simple tactics to make your life easy • KISS principle still stands • Normal mechanisms stand, but control is the key part • • • • • • • 6 Keep named user control around role based access Limit options for access rights – operators DON’T need write to rules! Group by general use / log source type / purpose – your choice! Use the numbering structures / schemes Remember the use case process and captured data Build out on deliverables Build out on threat / risk © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. ArcSight use cases • Under used previously – been present since ESM 4.5 • Much more content and documentation around for ESM 6.0c and Express 4.0 • Look at focused content built around specific data sets • • Usually focused around several active lists – imported or used as standard Linked resources for filters, active channels etc – common naming, structure etc • Wizard tool to drive content configuration 7 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Configuring a use case 8 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Steps to build use cases 1. 2. 3. 4. 5. 6. 9 Problem statement Define objectives Identify data sources Define thresholds Identify the deliverables Evaluate & refine as needed 1|2|3|4|5|6 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Example use case • Problem statement: • Identify unauthorized privileged user access to critical servers • Define the objective: Ensure we have the ability to identify when unauthorized access is: • • • • • • 10 Attempted Succeeds Occurs without authorization Identify unusual behavior Allow easy identification of other activities © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Example use case Identify the data sources: Servers Network devices Other? • • • But also need to identify supporting data sources: • • • • • 11 Who is an privileged user? Can we identify them easily? How can we identify if they are allowed / authorized or not? Change control system? Change window? Supporting network log data? © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Example use case • Data source -> list • Log data -> event • Alert -> rule • Consider supporting information • • • 12 Critical servers – asset list Privileged users – external list Default privileged user – external list © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Example use case Define the thresholds • • How to trigger rules? What content to build out? Where does the information go? • • • 13 Individuals? Team to process? Tracking list? © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Example use case Identify deliverables • • • • • • • • • • 14 Content to show what we want Dashboards Reports Alerts How to use the data? Dashboards Investigation Ease of use? External data – compliance Audit information © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Example use case Evaluate and refine • • • • • 15 How to improve? Where to refine and get better? What content can be extended? • Focus on key data / log sources – better privileged user information • Integrate automated data feeds – export / import Improve data, quality and content Add further capabilities on different log sources / systems © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Review of use case approach Building Meaningful Use Cases Formalized approach to understand what is required Define, develop, build and use focused content Process helps define what is needed: • • • • • • Problem Statement Define Objectives Identify Data Sources Define Thresholds Identify the Deliverables Evaluate & Refine as Needed Assists in so many other areas 16 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Summary Advanced Malware Server Threat Admin Monitor Monitor Media Intelligence User Perimeter Monitoring Monitoring App Third Party Insider Network Anomaly Detection Threat Monitoring Monitor Baseline Monitoring 17 Social © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Feed Please give me your feedback Session TB3057 Speaker Paul Brettle Please fill out a survey. Hand it to the door monitor on your way out. Thank you for providing your feedback, which helps us enhance content for future events. 18 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Thank you © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.