Merriam Webster defines “holy grail” as a “goal that is sought after for its great significance”. Mike Rothman of Securosis has described a twofold response to what the “holy grail” is for a security practitioner, i.e.,
- A single alert specifying exactly what is broken, with relevant details and the ability to learn the extent of the damage
- Make the auditor go away, as quickly and painlessly as possible
How do you achieve the first goal? Here are the steps:
- Collect log information from every asset on the enterprise network,
- Filter it through vendor provided intelligence on its significance
- Filter it through local configuration to determine its significance
- Gather and package related, relevant information – the so-called 5 Ws (Who, What, Where, When and Why)
- Alert the appropriate person in the notification method they prefer (email, dashboard, ticket etc.)
This is a fundamental goal for SIEM systems like EventTracker, and over the ten plus years working on this problem, we’ve got a huge collection of intelligence to draw on to help configure and tune the system to you needs. Even so, there is an undefinable element of luck to have it all work out for you, just when you need it. Murphy’s Law says that luck is not on your side. So now what?
One answer we have found is Anomalous Behavior detection. Learn “normal” behavior during a baseline period and draw the attention of a knowledgeable user to out of ordinary or new items. When you join these two systems, you get coverage for both known-knowns as well as unknown-unknowns.
The second goal involves more discipline and less black magic. If you are familiar with the audit process, then you may know that it’s all about preparation and presentation. The Duke of Wellington famously remarked that the “Battle of Waterloo was won on the playing fields of Eton” another testament to winning through preparation. Here again, to enable diligence, EventTracker Enterprise offers several features including report/alert annotation, summary report on reports, incident acknowledgement and an electronic logbook to record mitigation and incident handling actions.
Of course, all this requires staff with the time and training to use the features. Lack time and resources you say? We’ve got you covered with SIEM Simplified, a co-sourcing option where we do the heavy lifting leaving you to sip from the Cup of Jamshid.
Have neither the time, nor the tools, nor budget? Then the story might unfold like this.