FireEye TAP Form

advertisement
THREAT ANALYTICS PLATFORM (TAP)
TAP Scoping Guide- FCAP
October 2015
FireEye, Inc., 1440 McCarthy Blvd., Milpitas, CA 95035 | +1 408.321.6300 | +1 877.FIREEYE (347.3393) | info@FireEye.com www.FireEye.com
09/2015 3.0
© 2014 MANDIANT. Proprietary and Confidential.
Page 2
1. Table of Contents
2. Executive Summary ............................................................................................................................... 4
3.
Survey .................................................................................................................................................... 5
3.1.
Contact and Shipping Information ................................................................................................... 5
3.2.
FCAP TAP Main Contact/Administrator .......................................................................................... 6
3.3.
Timeline ........................................................................................................................................... 6
4.
FCAP Partner User Accounts ................................................................................................................ 6
5.
Client Network and Physical Infrastructure ............................................................................................ 7
6.
5.1.
Internal IPs ...................................................................................................................................... 7
5.2.
External (Public) IPs ........................................................................................................................ 7
5.3.
OPTIC- Public IPs ........................................................................................................................... 8
Sender:Comm broker/cloud collector .................................................................................................... 8
6.1.
Communications Broker .................................................................................................................. 8
6.1.1.
Comm Broker Requirements .................................................................................................... 9
6.1.2.
Comm Broker Recommendations .......................................................................................... 10
6.2.
Cloud Collector Device .................................................................................................................. 11
6.3.
Sender Worksheet: cloud collector/comm broker ......................................................................... 12
7.
TAP Data Sources ............................................................................................................................... 13
8.
Estimated Events per Second (EPS) & Storage.................................................................................. 13
9.
Special Cases and Considerations ...................................................................................................... 14
10. Ports, Protocols and Services.............................................................................................................. 14
FireEye, Inc., 1440 McCarthy Blvd., Milpitas, CA 95035 | +1 408.321.6300 | +1 877.FIREEYE (347.3393) | info@FireEye.com www.FireEye.com
09/2015 3.0
© 2014 MANDIANT. Proprietary and Confidential.
Page 3
2. EXECUTIVE SUMMARY
The Threat Analytics Platform (TAP) allows clients to utilize the vast intelligence gathered by FireEye
and Mandiant resources and put context around their event data on Advanced Targeted Attackers.
Clients may send all pertinent event data into a Virtual Private Cloud (VPC) that alleviates them of all
the management, configuration and maintenance of the infrastructure needed to store, process and
archive this data. In addition, TAP provides exceptionally fast response time to event queries allowing
for rapid drill-down during the most critical phases of an incident response investigation.
The information gathered in the TAP Scoping Guide is required to establish and configure your TAP
instance, and a complete Guide must be submitted before any instance will be approved for build.
This document can serve as a primary resource for initial conversations about TAP and the TAP startup
process. It is intended to facilitate TAP planning discussions and the initial gathering of information.
This guide is designed as a foundation for the overall deployment planning process. The other
documents that are necessary for a complete installation and deployment are:

TAP Deployment Guide – Documents the procedures for installing your TAP instance.

TAP User Guide
These documents, as well as current versions of the Comm Broker ISO and additional resources, are
located in the Securefile share provided by your FireEye Deployment Engineer. If you do not already
have access to the Securefile share, please contact your FireEye Deployment Engineer.
This document is intended solely for the use of FireEye/Mandiant personnel and the client
referenced in this document exclusively. Replication or distribution to other than those
individuals listed in this document without the written consent of FireEye/Mandiant is prohibited
FireEye, Inc., 1440 McCarthy Blvd., Milpitas, CA 95035 | +1 408.321.6300 | +1 877.FIREEYE (347.3393) | info@FireEye.com www.FireEye.com
09/2015 3.0
© 2014 MANDIANT. Proprietary and Confidential.
Page 4
3. SURVEY
For FireEye/Mandiant teams to exceed your expectations and conduct the engagement as effectively
as possible, we require the following information. If the answer to the question exceeds the space
provided, please attach supporting documentation.
3.1. Contact and Shipping Information
Please identify a point of contact for our support staff to work with on deployment of the technology. In
most organizations this is a person within the IT organization familiar with deployment of enterprise
applications and infrastructure. This person needs to be able to coordinate the following issues:
assignment of network addresses, allocation of physical space and power within a computer room or
other facility, network and host security configuration changes, and deployment of software to target
systems for the engagement.
Name
Company
Office Phone
Mobile Phone
Email
Main Engagement Contact
Shipping Contact
(
(
(
(
)
)
Client Name:
Client Site Address:
Client Shipping Address (if different
from site address):
Department, Division, Agency or
Branch:
Executive Sponsor @ client
-
)
)
-
Street Address
City:
State:
Zipcode:
Street Address
City:
State:
Zipcode:
-
Name:
Title:
Office Phone:
Email:
(
Suite/Dept #:
Suite/Dept #:
)
-
Special Shipping Instructions:
FireEye, Inc., 1440 McCarthy Blvd., Milpitas, CA 95035 | +1 408.321.6300 | +1 877.FIREEYE (347.3393) | info@FireEye.com www.FireEye.com
09/2015 3.0
© 2014 MANDIANT. Proprietary and Confidential.
Page 5
3.2. FCAP TAP Main Contact/Administrator
An FCAP partner contact can be enabled to add/remove client users to the TAP instance, or can be
identified as having the authority to authorize the addition/removal of client users. This user should also
have direct access to the TAP/FIC instance.
Name
Office Phone
Mobile Phone
Email
TAP Administrator(primary)
TAP Administrator(secondary)
(
(
(
(
)
)
-
)
)
-
3.3. Timeline
Requested TAP
environment Build Date
Requested Sender
Deployment Date
TAP User Access Date
4. FCAP PARTNER USER ACCOUNTS
Please enter contact information for any users who will be granted access to the TAP application user
interface for the client’s instance. Access to the TAP environment requires Single Sign-On (SSO)
Authentication. Users will be e-mailed an invitation to the instance and will need to configure two-factor
authentication. Access to the UI is limited via ACL, so please be certain to include any IP ranges
users are permitted to access TAP in section 5.2 of this form.
Full name
Email
FireEye, Inc., 1440 McCarthy Blvd., Milpitas, CA 95035 | +1 408.321.6300 | +1 877.FIREEYE (347.3393) | info@FireEye.com www.FireEye.com
09/2015 3.0
© 2014 MANDIANT. Proprietary and Confidential.
Page 6
5. CLIENT NETWORK AND PHYSICAL
INFRASTRUCTURE
5.1.
Internal IPs
Please list all client internal IP address ranges. This list will be used for intel matching, custom parser
creation, and rule generation.
Internal IP Addresses / Ranges
5.2.
External (Public) IPs
In order to properly communicate with the Virtual Private Cloud (VPC), a client’s external IPs must be
added to the ACL. Please list all public IP addresses for Communications Brokers connection(s) and
TAP User Interface access for ACLs on the VPC.
External IP Addresses / Ranges
FireEye, Inc., 1440 McCarthy Blvd., Milpitas, CA 95035 | +1 408.321.6300 | +1 877.FIREEYE (347.3393) | info@FireEye.com www.FireEye.com
09/2015 3.0
© 2014 MANDIANT. Proprietary and Confidential.
Page 7
5.3. OPTIC- Public IPs
OPTIC is a software-as-a-service offering that provides real-time visibility into malicious communications
on customer networks. OPTIC actively tracks millions of compromised IPs and thousands of command
and control servers, and identifies connection attempts from customer’s networks. OPTIC does not
require installing any software or hardware, and is configured by the FireEye Deployment Engineer as
part of the TAP engagement.
Please list all client Public IP address ranges for use with OPTIC.
Public IP Addresses / Ranges
6. SENDER:COMM BROKER/CLOUD COLLECTOR
6.1.
Communications Broker
FireEye, Inc., 1440 McCarthy Blvd., Milpitas, CA 95035 | +1 408.321.6300 | +1 877.FIREEYE (347.3393) | info@FireEye.com www.FireEye.com
09/2015 3.0
© 2014 MANDIANT. Proprietary and Confidential.
Page 8
TAP Sender capability is provided by the Communications Broker (Comm Broker). Sender is an
application that runs on a physical or virtual server in a client’s environment. It collects logs from within
the physical environment and forwards those logs to the Communications Broker Receiver hosted
within a Virtual Private Cloud (VPC) at Amazon World Services (AWS).
The Comm Broker can be deployed via several methods:

FE provided ISO – CentOS 7 with the Sensor software installed-available for install
in clients VM environment or on physical hardware

Existing client VM that meets the Requirements below
For production environments, it is recommended to place a Comm Broker in each of the client’s data
centers and/or locations where critical data or processes reside. Comm Brokers should be paired to
provide redundancy and ensure proper TAP operation. For more detail on Comm Broker redundancy
and placement, please consult the TAP Deployment Guide. If you have questions please contact your
FireEye PM.
6.1.1. COMM BROKER REQUIREMENTS
The Comm Broker sender application has basic system requirements and works with any Linux
distribution that supports Red Hat Package Manager (RPM) or Debian package format.
The Comm Broker Sender does not require a dedicated machine and can be deployed on existing
Linux virtual image that meets the following requirements:

Supported OS: x64 CentOS or RedHat 6.4 or later, Ubuntu 12.04 LTS, or SUSE

8 CPU cores (modern CPU—Nehalem for example)

8 GB RAM

100 GB disk

Reliable NTP source
The Comm Broker Sender application is not proxy aware. It requires the following:

Listener default is UDP 514, the standard for syslog (can be any port)

Direct access to the IP address of your dedicated TAP Virtual Private Cloud (VPC) on the
specified port (TCP 443 by default).

NTP (must be kept accurate with a reliable source)

DNS
Network traffic between the Comm Broker Sender in your environment and the Comm Broker Receiver
in your TAP Virtual Private Cloud (VPC) is encrypted with Twofish and access keys are public/private
as specified in the TAP architecture.
FireEye, Inc., 1440 McCarthy Blvd., Milpitas, CA 95035 | +1 408.321.6300 | +1 877.FIREEYE (347.3393) | info@FireEye.com www.FireEye.com
09/2015 3.0
© 2014 MANDIANT. Proprietary and Confidential.
Page 9
If the client has a proxy in use, please notify the FireEye Deployment Engineer prior to any attempt at
Comm Broker configuration.
6.1.2. COMM BROKER RECOMMENDATIONS
While not essential to the successful deployment of the Comm Broker, the following are recommended
and should be implemented wherever possible.

Hardening, maintenance, and monitoring of the system on which the Comm Broker Sender is
installed, including key maintenance, should be done in accordance with your corporate
standards.

Whenever possible, access to the Comm Broker via SSH from the FE network should be
provided. This greatly increases our ability to support and troubleshoot the Comm Broker and
assist in the deployment process.
Additional recommendations for Comm Broker deployment are as follows:

Access to approved repositories

Nano Text Editor

Tcpdump

Wget

Lsof

Bwm-ng or similar bandwidth tool
FireEye, Inc., 1440 McCarthy Blvd., Milpitas, CA 95035 | +1 408.321.6300 | +1 877.FIREEYE (347.3393) | info@FireEye.com www.FireEye.com
09/2015 3.0
© 2014 MANDIANT. Proprietary and Confidential.
Page 10
6.2.
Cloud Collector (currently available as .iso)
The Cloud Collector combines the Tap Sender (Communications Broker) with Bro Sensor capabilities, and
quickly and efficiently provides visibility into a client’s environment. The Cloud Collector requires an
available Span port, and placement inside the client’s egress firewall.
Required information for all Cloud Collectors
TAP INSTANCE NAME
PROVIDED BY OPS
TAP VPC IPs
CC MANAGER IPs
PROVIDED BY OPS
CC MANAGER FQDN
DEFAULT USERNAME
DEFAULT PASSWORD
52.11.98.183
52.11.198.226
ccmaster01.map.mandiant.com
ccmaster02.map.mandiant.com
fireeye
f1re3ye
FireEye, Inc., 1440 McCarthy Blvd., Milpitas, CA 95035 | +1 408.321.6300 | +1 877.FIREEYE (347.3393) | info@FireEye.com www.FireEye.com
09/2015 3.0
© 2014 MANDIANT. Proprietary and Confidential.
Page 11
6.3.
Sender Worksheet: cloud collector/comm broker
Please complete the requested fields below for each Comm Broker or Cloud Collector that is to be deployed in the customer environment.
Please review the system requirements and information provided in the sections above. If you need additional guidance, please consult your
TAP Deployment Engineer.
Host
Name
CPU
Cores
Memory
Monitored
bandwidth
Internal IP
External
IP
DNS
Server
Search
Domain
NTP
Server
FireEye, Inc., 1440 McCarthy Blvd., Milpitas, CA 95035 | +1 408.321.6300 | +1 877.FIREEYE (347.3393) | info@FireEye.com www.FireEye.com
09/2015 3.0
© 2014 MANDIANT. Proprietary and Confidential.
Page 12
Gateway
IP
Netmask
7. TAP DATA SOURCES
If an existing SIEM or log aggregator is already in use, please list it below. The success TAP
implementation is highly dependent on the quality of the data sources that are integrated into TAP.
Without sufficient or properly configured data sources, the effectiveness of TAP can be severely limited.
Please review the TAP Data Source integration Guide for recommendations regarding device selection
and configuration.
Product Name
Version
Feed Interface
Total # of
End Devices
Total EPS
Rate
Please Choose One
Please Choose One
Please Choose One
Please Choose One
Please Choose One
Please Choose One
Please Choose One
8. ESTIMATED
STORAGE
EVENTS
PER
SECOND
(EPS)
&
Estimated EPS
EX. 2000 or 2K
To determine estimated EPS requirements, please refer to the current EPS calculator available
at__________________________________________.
FireEye, Inc., 1440 McCarthy Blvd., Milpitas, CA 95035 | +1 408.321.6300 | +1 877.FIREEYE (347.3393) | info@FireEye.com www.FireEye.com
09/2015 3.0
© 2014 MANDIANT. Proprietary and Confidential.
Page 13
9. SPECIAL CASES AND CONSIDERATIONS
Please detail any special considerations for the engagement regarding review of the target systems.
Examples might include time of day restrictions for data collection, bandwidth utilization constraints,
sensitive applications or high-risk areas that may require special treatment (e.g. corporate mail servers,
sensitive data repositories, applications with high uptime requirements, etc):
10. PORTS, PROTOCOLS AND SERVICES
Please refer to the following for required network connectivity between solution components. Listener
can be any port but is UDP 514 by default, the standard for syslog
Network traffic between the Comm Broker Sender in your environment and the Comm Broker Receiver
in your TAP Virtual Private Cloud (VPC) is encrypted with Twofish and access keys are public/private
as specified in the TAP architecture.
Internally the listener can be any port, UDP 514 by default, the standard for syslog. Additional ports
may be required depending on the configuration of the client’s environment and the components being
used to collect and transmit event data.
The Cloud Collector and/or Comm Broker are not proxy aware and require the following:

Direct access to the IP address of your dedicated TAP Virtual Private Cloud (VPC) on the
specified port (TCP 443 by default). Receiver IP will be provided once TAP instance is
approved and provisioned.

Direct access to the IP address to the Cloud Collector management device on TCP 4505, 4506,
and 80. Management Device IP will be provided once TAP instance is approved and
provisioned.
FireEye, Inc., 1440 McCarthy Blvd., Milpitas, CA 95035 | +1 408.321.6300 | +1 877.FIREEYE (347.3393) | info@FireEye.com www.FireEye.com
09/2015 3.0
© 2014 MANDIANT. Proprietary and Confidential.
Page 14
Download