Top Banner
EventLog Analyzer Siddharth Sharathkumar
11

Decrypting the security mystery with SIEM (Part 2)

Apr 05, 2017

Download

Technology

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Decrypting the security mystery with SIEM (Part 2)

EventLog AnalyzerSiddharth Sharathkumar

Page 2: Decrypting the security mystery with SIEM (Part 2)

2

Security and Auditing

One SIEM solution to rule them all.

Page 3: Decrypting the security mystery with SIEM (Part 2)

GUARDING NETWORK PERIMETERAuditing your network devices

Page 4: Decrypting the security mystery with SIEM (Part 2)

Is someone accessing something they shouldn't be allowed to?

Denied connections Traffic allowed

Firewall rule change

But how?

Page 5: Decrypting the security mystery with SIEM (Part 2)

SECURING BUSINESS CRITICAL APPLICATIONS

Page 6: Decrypting the security mystery with SIEM (Part 2)

Comprehensively audit web server errors

Request access to

web server

Request failed Too many errors?

Bad gateway errors?

Do I need to revamp my resources?

Or is someone up to no good?

Repeated requests

Page 7: Decrypting the security mystery with SIEM (Part 2)

CUSTOM LOG PARSER

Page 8: Decrypting the security mystery with SIEM (Part 2)

Threat Intelligence

You sha;; not pass YOU SHALL NOT PASS!!!

Page 9: Decrypting the security mystery with SIEM (Part 2)

Preventive security solutions alone aren't going to be enough9

Page 10: Decrypting the security mystery with SIEM (Part 2)

Backtracking a security attack

Page 11: Decrypting the security mystery with SIEM (Part 2)

THANK YOU Queries?