Top Banner
Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC
67

Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

Apr 03, 2018

Download

Documents

dinhthuan
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

Cyber Security Data Warehouse

Jude Pereira

Managing Director

Nanjgel Solutions FZ-LLC

Page 2: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

Our Focus:Solving Wicked Hard Problems

COUNTER-TERRORISM

Quick Reaction Capabilities

CYBER

Mission Grade Cyber Defense

Secure Cloud Computing

Cyber Network Operations -

Operations, Development, Training

GEOSPATIAL

Geospatial DataManagement & Analysis

Geospatial Data Collection

Sensor Development & Integration

May 1, 2013 2

Page 3: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

RSA 2013 Hot Topic: Big [Security] Data

“All organizations are swimming in security data… my investment bank

with 5,000 employees captures 25GB of security-related data every

day. Buried in that we typically find 50 issues to examine more

closely, two of which end up demanding real attention.”

• Ramin Safai, chief information security officer at Jefferies & Co.

“Instead of a snapshot of the Grand Canyon, I want to see it from

30,000 feet.

We're building out our SIEM and collecting all the data we can. We have

a large security operations group that understands it very well. They're

constantly retuning the sources to make it more valuable.“

• Stephen Moloney, manager of enterprise information security at Humana

May 1, 2013 3

Page 4: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems
Page 5: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

Why Monitoring the Enterprise Logs Matters…

• 70% of security incidents involve authorized users – Gartner– Business data is at the heart of regulations

– Business applications are most common method to add/change data

– Need to easily collect and analyze data to complete “application stack”

– Homegrown business and systems management applications vs. commercial products

• Average length of incidents is 9-19 months – FBI and CSI Survey– “Low and slow” can not be seen from 30 days of data

– Trend analysis requires a longer period of data

– Extent and scope of security incidents need to be completely identified to ensure proper remediation

– Archiving is easy, data analysis of archived data is slow, expensive, and inefficient

• e-Mail and Internet access provide data leakage and privacy abuses

Page 6: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

Defining Big Data

In information technology, big data is defined as a collection of data sets so large andcomplex that it becomes difficult to process using on-hand database management tools ortraditional data processing applications. The challenges include capture, processing,storage, search, sharing, analysis, and visualization.

SOURCES: http://www.datasciencecentral.com

The Evolution of Big Data Security Analytics Technology, Enterprise Security Group, March, 2013

May 1, 2013 4

Page 7: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

Is Security Data Collection and Analysisa “Big Data” Problem?

May 1 5

SOURCE: The Evolution of Big Data Security Analytics Technology, Enterprise Security Group, March, 2013

Page 8: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

Where Do Most SIEM Products Fall Short?

May 1, 2013 6

SOURCE: The Evolution of Big Data Security Analytics Technology, Enterprise Security Group, March, 2013

Page 9: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

got security?

Web

Barracuda

CA

Check Point

CiscoFacetime

McAfee

Symantec

TrendMicro

Websense

Avira Check Point

BigFix CiscoBitDefender Enterasys

CA HP

Check Point IBM

eScan Juniper

IBM McAfeeMcAfee Radware

Microsoft Snort

Symantec StillSecure

TrendMicro Stonesoft

DLP

BorderWare

CiscoCredant

IBM

McAfee

Symantec

WebSense

WinMagic

RiskMgmt

McAfee

IBMMicrosoft

nCircle

Symantec

TrendMicro

Barracuda

BorderWareCisco

McAfee

Microsoft

ProofPointSonicWALL

Symantec

TrendMicro

Websense

Crypto

Check Point

Credant

IBMMcAfee

Microsoft

Sophos

Symantec

TrendMicro

winMagic

Wntrust

Appsense McAfeeBit9 Cisco

BMC Palo Alto

Coretrace Juniper

EMC Check Point

IBM StonesoftLAN Desk SonicWALL

Lumension

McAfee

Microsoft

nCircleTrust Port Top Layer

SkyRecon

Sophos

IPS

Endpoint

Email

Opsware

Savant

Symantec

SignaCert

Sophos

Tripwire

WhiteListing

Firewall

May 1, 2013 7

Page 10: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

Industry Norm:Caught in a state of “cyber reaction”

“Stovepiped” security productsthat don’t correlate information

or share policies

Too many alerts, many of whichrequire manual investigation

No enterprise-wide reportingor analysis

No automated remediationor continuous improvement

Shortage of experts who have timeto bridge the gaps in these systems

May 1, 2013 9

Page 11: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

New Verizon Data Breach Stats:Threats Evolve Over Time

Seconds Minutes Hours Days Weeks Months Year

Compromise

11% 13% 60% 13% 2% 1%

Exfiltration

15% 18% 36% 3% 10% 18%

Discovery

0% 1% 9% 11% 12% 62% 4%

Containment

2% 2% 18% 41% 14% 22%

SOURCE: Verizon Business, 2013 Data Breach Investigations ReportMay 1, 2013 10

Page 12: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems
Page 13: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

What We Do Better Than Anyone Else…

Detect suspicious events buried in big [security] data

The Other Guys

001000101100100101100110001101001110000110001110111000111011101000100100111101100010001011001001011001100011010011111101110001100111011001111010110111101111100001100011101110001110111011011001

01101000110111100010010011110110

00100010110010010110011000110100

10011010100011

KEYW Advanced SIEM

11100001100011101110001110111010001001001111011000100010110010010110011000110100111111011100011001110110011110SUSPICIOUS110

00111011100011101110110110010110100011011110EVENTS000

101100100101100110001101001110000110001110111000111011101000100100111101100010001011001001011001100011010011111101110001100111011001

111010110111101111100001100011101

110001110111011011001011010001101111000100100111101100010001011001

001011001100011010011100001100011

May 1, 2013 12

Page 14: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

Vendors Trying to Transform SIEMfor Big Data Collection

ArcSight (HP)

• Big player but they still don’t have a big data play

RSA enVision (EMC)

• Often being replaced by competing SIEMs; lost the internal battle withNetWitness

Q1Labs (IBM)

• Strong player reshaping IBM security but big data requires an IBMdatabase project

Nitro (McAfee/Intel)

• Originally mid-market focused…doesn’t scale to address big data

All can be complemented by Sensage Security Intelligence Foundry!

May 1, 2013 13

Page 15: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

Other Players Capturing “Big Data” Attention

Splunk

• Good for ad-hoc search, particularly when your customer knows thequestion they want to ask

• Not ideal when a customer wants a solution to handle the combination ofmassive data volume with complex analysis over long time horizons

Hadoop

• Good when a customer has the resources to create, develop and maintainan advanced data warehouse solution spanning structured andunstructured data

• Not ideal when the customer wants to capture specific security event dataas primary use case, and does not have large staff

• Not ideal when the customer expects to process lots of standing and ad-hoc queries

May 1, 2013 14

Page 16: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

ACCESS ANALYTICS

ACTIVITY ANALYTICS

LINK ANALYSIS

INCIDENT RESPONSE

IDENTITY ANALYTICS

Security Intelligence

Platform

HRMAPPS

HOSTSDBS

NETWORK

SIEMDLP

DAMVMIAM

IDENTITIESACCOUNTSACTIVITIESACCESSALERTS

SECURITY INTELLIGENCEPOLICY CHECK

&RISK SCORING

Risky UsersRisky Accounts

Risky AccessRisky Activity

Solution OverviewExisting IT Infrastructure

Page 17: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

A Simplified Approach to a Complex Problem

Old Way - One enterprise DW

piecemeil, customer integrated

New Way – Solution specific DW,

pre-integrated solutions

Analytics

(BI)

CollectionSource ACustomer CodeSales DateProduct IDAmount

Source BCustomerTime of SaleProduct CategoryPID

Resulting Data

Fully on-line storage

– API level integration – On-line, “active archiving” – Support for other NAS/SAN

Solution components

Storage &

Archive

Data

Warehouse101101

101100010

1101

Analytics

Data Warehouse

Collection

Page 18: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems
Page 19: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems
Page 20: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems
Page 21: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems
Page 22: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems
Page 23: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems
Page 24: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems
Page 25: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems
Page 26: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems
Page 27: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems
Page 28: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

A New Offering:Cyber Awareness Assessment

Cyber Awareness Assessment Process

SecurityObjectives Policies

EnforcementAnalyticsConfigurations

Responses / Metrics /Countermeasures Dashboards

May 1, 2013 25

Page 29: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

• What they needed– Massive log and ATM warehouse– Exception reporting, alerts, data

mining– Easy and cheap

• Displaced eSecurity• Solution

– Detailed trending reports and alerting

– Customized queries for emerging threats

– Log analysis fed into behavior analysis system

• Next – McAfee ePO integration

“We know that other banks use Oracle data warehouses to store ATM and PIN transactions for fraud research. The SenSage solution provides the storage and searching capabilities that meet our customer requirements at a cost that is an order of magnitude less than Oracle”

Preston Wood, CSO, Zions Bancorp

Case Study: Internet Fraud & Security Investigations

Page 30: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

• Problem:– Fraud Detection, Law enforcement support, and internal security

• Requirements: – 2B Call Detail Records per day– 180 Log sources– 2 year retention period– Heterogeneous data types and protocols

• Why SenSage:– Lower OPEX, CAPEX – Enterprise scale & Flexibility– 100% online data

• Scale:– Over 1 Petabyte under mgmt.– Multiple applications on a common platform

Case Study: CDR and Log Data Warehousing

Page 31: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

A Real World Problem

Page 32: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

QTel Use Case

• Requirement to identify specific individuals accessing a defined list of “Interesting” websites (1500 initial list)on specific dates

• Identify individuals involved in Cybercrimes through Emails, Social Networking Sites ,Web etc.

• Identifying usage of VPN connections towards other blacklisted countries .

• Identifying individuals accessing govt. controlled Websites .

Mandate from Ministry of Interior

• Solution: SenSage 3-Node system providing correlated queries with look-ups to databases of Subscriber information

Page 33: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

Data Sources & Volumes

• Bluecoat ProxySG

• RADIUS – Session/Authentication Logs

– DSLUsers , WiFi , PrePaid

• 50 – 60 Gb / Day

• Challenge

– Identifying IP records found accessing notified websites with actual user identifying information.

Page 34: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

Web CategoriesAnonymizers Government/Military Provocative%20AttireArt/Culture/Heritage Health Religion%20and%20IdeologyBusiness Humor Search%20EnginesChat Instant%20Messaging Sexual%20MaterialsComputing/Internet Internet%20Radio/TV Shareware/FreewareConsumer%20Information Job%20Search Shopping/MerchandizingCriminal%20Skills Malicious%20Sites Spam%20Email%20URLsDating/Social Mobile%20Phone Sports

Education/Reference

Non-Profit%20Organizations/Advocacy%20Groups Spyware

Entertainment/Recreation/Hobbies Nudity Stock%20TradingExtreme P2P/File%20Sharing Streaming%20Media

FinancePersonal%20Network%20Storage

Technical/Business%20Forums

Forum/Bulletin%20Boards Personal%20Pages Web%20AdsGames Pornography Web%20MailGeneral%20News Portal%20Sites

Page 35: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

Real World Case Study:MTN Requirements - 2009

• More than 30 million subscribers.

• 1.5 billion CDR/ 900 GB log data per day.

• Challenges:

– Load all CDR/log data in a near real time process.

– Retrieve details in less than a minute.

– Thousands of daily requests from law enforcement agencies, require complex predefined and ad-hoc queries for investigation.

– Around 600 TB of source data: Store and archive data in compressed format to save huge storage cost.

– Fraud detection– Forensics and investigations– Anti-terror information requests– Regulatory compliance

Page 36: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

SenSage Achievements in MTN - Overview

• 26 SLS nodes + 3 Collector + 3 Analyzer deployed

• Load 1.5 billion CDR/EDRs on a daily basis

• Load all MTNI CDR/EDRs (more than 100 different formats)

• Real-time loading all CDRs (with less than 20 minutes delay)

• Handle huge amount of queries without impacting the performance (15,000 call detail queries per hour)

• Response time between 2 to 5 seconds for call detail queries

• Integrate with 3rd party applications like EDW, Concierge, CRM, Billing, LIPS, and LEA

• Load all MTNI security logs and application logs

Page 37: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

Storage Saved in MTN

• More than 721 billion records loaded in SenSage.

• All data are easily accessible for retrieving by running simple queries.

• 546 TB source data is only occupied 65 TB storage in SenSage. Saved more than 480 TB storage.

Total Number of Loaded Records

721,164,035,690

Total Source Size 546 TB

Total Storage used in SenSage

65 TB

Storage Saved by using SenSage

480 TB

Page 38: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

Principals of CDR / IPDR Data Retention

• Collect– All Records must be collected in a timely & secure manner

– Records should not be modified

• Retain– Data must be held in a secure & tamperproof environment

– Minimal operational overheads to maintain availability of data

– Data must be available as and when needed with minimum delay

• Analyse– Records must be queried in both pre defined reports and in a ad-hoc manner

– Queries should return “Without Undue Delay”

– Reports should be made availble in many formats

– Authentication should be used to safeguard data access

• Dispose– Once retention has expired records should be deleted in an irretrievable

manner

– Legal Hold should be available on records under investigation

Page 39: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

• SenSage collect native audit records produced by database audit utilities included in the database management system – Entire SQL statement from

any source • All user information

– Without the use of agents, probes, sniffers, etc.

– SenSage collection of records is configurable

• Out-of-the-box reports for access to sensitive data by any user

• Alerting capabilities • Ad hoc queries are simple to

build. Fast to execute.• Correlate database access to

other activities

Collection of Database Logs for Analysis

Database logs are stored in a secure location to support segregation of duties

Provides alerts, threshold reports access reports and forensics

Native Database Audit Records

Page 40: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

360-Degree View Dashboard

McAfee Reports

Out-of-Box Compliance Reports

Page 41: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

© 2008 SenSage Inc. Confidential

Access to Sensitive Data

• “Which privileged and other users have accessed our sensitive tables

and what exactly did they look at?”

Are these valid end users or DBAs?

Page 42: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

© 2008 SenSage Inc. Confidential

Unusual Data Access

• “Why has this employee accessed an executive’s HR records so many times over a week?”

11 accesses in a week!

Page 43: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

© 2008 SenSage Inc. Confidential

Failed Login Attempts • “Is someone trying to brute-force attack the

database?”

Dozens of failed logins within seconds!

Page 44: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

© 2008 SenSage Inc. Confidential

Changes to User Authorizations

• “Who has been granted access and was it

authorized??

“Grant all” usually not allowed

Page 45: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

© 2008 SenSage Inc. Confidential

Failed Logins by User Over Time

• “What is the ordinary trend and what is an anomaly?”

This looks suspicious

Page 46: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

© 2008 SenSage Inc. Confidential

Forensics Analysis

Page 47: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

© 2008 SenSage Inc. Confidential

Forensics Analysis

Page 48: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

© 2008 SenSage Inc. Confidential

Policy Monitoring

Page 49: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

© 2008 SenSage Inc. Confidential

Policy Monitoring

Page 50: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

SAP Solution

Page 51: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

SAP audit logs alone not enough to prove compliance

• Data spans many systems– Networks– eMail– Operating systems– Databases– Security devices (IPS/IDS)– Custom Sources– ERP systems

• 3600 correlation of user activity is imperative

• Full SAP auditing requires tapping into business logic

• Complexity requires precise forensics & investigations capability

Security Devices

(IPS, IDS)

SensitiveData

Network

Devices

Operating

Systems

Business

Apps (SAP)

Custom

Sources

Infrastructure

(email, internet)

Databases

Mfg Equip

Sensors

Physical

Access

Controls

Page 52: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

SAP auditing and security are difficult and expensive

• Massive data volume

– Data must be maintained for 7+ years in some cases

– Maintaining logs in in SAP system impacts application performance

• Passing an audit with SAP system can easily cost $500K1

– Highly manual and labor intensive process

– Performance impact requires additional hardware and DB licenses

• SAP complexity and breadth impairs proper auditing

– Despite the effort, SAP audits frequently fail due to inherent complexity

– Difficult to provide 3600 view of activity – SAP alone is not enough

– Legally admissible data not always captured or available

– Auditors and courts require tamper resistant unmodified audit trails

Page 53: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

SenSage SAP Solution component topology

Collector

Collector

Other IT systems

Online storage (SAN, NAS, CAS)

Collector

Main system

SAP DB

Compliance professionals

Security professionals

3rd party analytics

Remote

Page 54: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

Track relevant SAP security eventsSAP sources of security events

SenSage monitors key SAP modules and activity

Security Audit Log

Business Object Change Data (Change Doc)

User Access (SAP user community)

Financial Accounting and Controlling (FI/CO)

Material Management (MM)

Sales and Distribution (SD)

Underlying Database System

Events

• User logon/logoff

• User password and auth. changes

• File downloads

• RPC function calls

• Report starts and failures

• Transaction starts and failures

Document Changes

• Changes to master tables

• Time of change

• User causing the change

• Application causing the change

• Search by user or transaction code

• Old and new values

Database access

• Oracle, Sybase, MSSQL, DB2, etc.

Sec

urity

info

Bus

ines

s in

fo

Page 55: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

Get alerted on failures

Page 56: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

Summary reports to filter similar events for user N23

Page 57: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

See all user activity for user N23

Page 58: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

Track all suspicious SAP activity for user N23

Page 59: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

Change Document -

Track activity for users changing master tables.

Next step could be to track DB activity of users executing these transactions

Page 60: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

Change Document- Track line items for specific user and for specific transaction

Page 61: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

Easy to create ad-hoc reports for investigations

Page 62: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

Quickly investigate calls

between specific numbers

Choose from self-audit,

summary or investigation

reports

Flexible Investigation Interface

Page 63: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

SenSage Event Data Warehouse Solutions

Step #1 – Security

#2 – Simplify compliance

#3 – Reduce costs & risk

#4 – Improve bottom line

Page 64: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

Columnar Efficient storage of event data and fast search capabilities

Compression 40:1 compression achieved from columnar organization

Persistent data without

transaction overhead

Optimized for write-once-read-many data. Improved loading performance by

avoiding the overhead of transaction management.

Flexible Data Model Does not require any prior user defined data model or mandate any sort of

normalization of the data, which yields performance improvements.

Intellischema Handle a wide variety of data sources and write standardized libraries of analytics

while still maintaining the fidelity of the original event data . Add new log sources by

dropping new tables into the system and they are automatically picked up by the

existing libraries of analytics.

Sparse Query Optimization Ultra fast results for random, sparse queries against petabytes of data. Use of

advanced bloom filtering techniques and space-efficient probabilistic data structure

without use of indices that is used to dramatically improve query performance.

Dynamic Expansion of Storage

(or Nodes)

Provides for a simple methodology for scaling up by adding processing

power/storage capacities of an existing system with little to no down time

100% online integration with

SAN/NAS & near line storage

Reduces operating costs to store and access data. Improves speed and flexibility

of investigations.

SenSage Data Warehouse Technical differentiators

Page 65: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

Summary

Proven experience in delivering value to our customers

Known for outstanding customer care

Purpose built, event data warehouse

Proven, pre-integrated analytic solutions

Lowest cost – rapid time to value

Deep technology partnerships to further reduce costs and complexity

Page 66: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

Nanjgel….. Success Stories .

Page 67: Cyber Security Data Warehouse - Nanjgel Solutions · Cyber Security Data Warehouse Jude Pereira Managing Director Nanjgel Solutions FZ-LLC. Our Focus: Solving Wicked Hard Problems

Questions ????