You can see this same mentality in the InfoSec space. While breaches and infections occur for any number of reasons how many security tools are bought to address symptoms of the problem and not actually address basic things like secure coding, segregation/separation of data/duties, any/any rules on firewalls, etc, etc to get in front of issues. Of course the other challenge is buying tools that are then not staffed. That isn't usually the fault of the rank and file but for goodness sakes when you go to buy something at least do a bake off or make the vendor allow you to kick the tires a bit. We rush off to buy the latest and greatest with a one and done mentality and look back after a year and say “Damn tool didn't work.” Strangely that is a linear cause and effect model that often repeats itself.
So how do you make a change? Well in my LM/SIEM mind you can start of small but at least start monitoring SOMETHING on a regular basis. It almost doesn't even matter what it is or how often you do it. Ok not really but if you were to look at a daily, weekly, or monthly report where items are grouped, counted, and sorted in descending order you could at least address the top 1, 5, or 10 items and start cleaning things up or filtering them out of the report if they are 'false positives.' What sort of things? Depends on what is hot, needed, where your shop is maturity wise etc but some things that come to mind are
- Failed logins grouped by username but also list counts by systems where they happened
- Failed logins where the list is just privileged/system/task accounts – more operations oriented but hey it is a start and can make a difference when team X can't understand why something isn't working...
- Outbound drops (big one)
- Inbound destinations with firewall accepts for ports other than 80 and 443
- Top sources/destinations with internal to internal drops – the report will show different things depending on if you use source or destination.
- Top internal to internal source for 445 – high numbers will likely be legit and you can quickly weed them out or worms
- Top internal to external sources over port 25 – like above, your top sources will quickly be IDed as legit email servers or popped machines
The list above isn't an end all, be all but for those struggling or needing to get started...it is a start. The point is to get you familiar with your network, start to identify and whitelist some legit systems, establish somewhat of a baseline, and then start to address issues. While funny we have to move away from:
- Install LM and/or SIEM
- ????
- Profit
No comments:
Post a Comment