19
1 © 2005 Cisco Systems, Inc. All rights reserved. CISCO SECURITY MONITORING, ANALYSIS & RESPONSE SYSTEM

1 © 2005 Cisco Systems, Inc. All rights reserved. CISCO SECURITY MONITORING, ANALYSIS & RESPONSE SYSTEM

Embed Size (px)

Citation preview

Page 1: 1 © 2005 Cisco Systems, Inc. All rights reserved. CISCO SECURITY MONITORING, ANALYSIS & RESPONSE SYSTEM

1© 2005 Cisco Systems, Inc. All rights reserved.

CISCO SECURITY MONITORING, ANALYSIS & RESPONSE SYSTEM

Page 2: 1 © 2005 Cisco Systems, Inc. All rights reserved. CISCO SECURITY MONITORING, ANALYSIS & RESPONSE SYSTEM

222© 2005 Cisco Systems, Inc. All rights reserved.

Mandates:

• Increase customer retention and acquisition

• Build systems around customer/partner access while preserving customer privacy

• Avoid downtime

Disruptions:

• Direct revenue lossesAverage $2,000,000 / incident

Median .067% of revenue / incident

• Recovery costsAverage = $74,000 per incident

Mean = $6,000 per incident

• Frequency and durationOne incident per year

Downtime: 22 hours

$0

$5

$10

$15

$20

1 2 3 4 5 6 7 8 9 10

Inte

rnet

bus

ines

s di

sru

ptio

n lo

ss r

ate

s (m

illio

ns)

Number of incidents

Median revenue lossesAverage recovery costs

* Aberdeen Group, Automating Information Access Benchmark Research Report, September 2004

Mandates and Disruptions

Page 3: 1 © 2005 Cisco Systems, Inc. All rights reserved. CISCO SECURITY MONITORING, ANALYSIS & RESPONSE SYSTEM

333© 2005 Cisco Systems, Inc. All rights reserved.

• Constant Threat of Attacks and Zero-Day Threats

• Companies experience 30+ attacks / week

• Virus and worms attacks increasing at 11% annually

• Slammer infected 75,000 hosts in 11 minutes

• Network Computing estimates the cost per single incident of unknown buffer overflow attack to be $98,306

• Variants, scripts, and automated tools essentially yield a persistent attack on open exposures

Persistent Attacks and Zero Day Threats

Page 4: 1 © 2005 Cisco Systems, Inc. All rights reserved. CISCO SECURITY MONITORING, ANALYSIS & RESPONSE SYSTEM

444© 2005 Cisco Systems, Inc. All rights reserved.

82%: prevention and avoidance9%: recovery

and restoration

9%: containment

Intrusion prevention forNetworks and/or hosts

Security event correlationand management

Firewalls at networkGateways and/or PCs

Threat assessmentand management tools

0%

10%

20%

30%

40%

50%

60%

Recover Contain Prevent Uncertain

* Aberdeen Group, Automating Information Access Benchmark Research Report, September 2004

Solutions to Overcome Disruptions

Page 5: 1 © 2005 Cisco Systems, Inc. All rights reserved. CISCO SECURITY MONITORING, ANALYSIS & RESPONSE SYSTEM

555© 2005 Cisco Systems, Inc. All rights reserved.

Network & Security

EventNoise

Inefficient Attack

Identification & Response

Compliance& Audit

Mandates

Never enoughSecurity

Staff

“after patching, putting out fires, investigation

and remediation… produce the audit report”

alarms, disconnected events, false positives,

network anomalies

Sarbox, HIPAA, GLBA, FISMA, Basel II…

due care and process

un-prioritized blended attacks, day zero

attacks, worms… and network issues

CostlyBusinessDilemma

Mitigate Attacks

Security Challenge = Business Problem

Page 6: 1 © 2005 Cisco Systems, Inc. All rights reserved. CISCO SECURITY MONITORING, ANALYSIS & RESPONSE SYSTEM

666© 2005 Cisco Systems, Inc. All rights reserved.

• Defense-in-depth

• Firewalls

• Proxies

• VPN

• Anti-virus

• Network IDS/IPS

• Host IDS/IPS

• Vulnerability Assessment

• Patch Management

• Policy Compliance

• Router

• Switch

• Integrated Management

Components of a Self-Defending Network

Page 7: 1 © 2005 Cisco Systems, Inc. All rights reserved. CISCO SECURITY MONITORING, ANALYSIS & RESPONSE SYSTEM

777© 2005 Cisco Systems, Inc. All rights reserved.

Reactive Steps:1. Escalated Alert2. Investigate3. Coordinate4. Mitigate

Network Operations

Security Operations

Firewall

IDS/IPS

VPN Vulnerability

Scanners

Authentication

Servers

Router/Switch

Anti-virus

10K Win,

100’s UNIXCollect Network DiagramRead and Analyze

TONS of Data…Repeat

Always Too Late

Security Operations Response

Page 8: 1 © 2005 Cisco Systems, Inc. All rights reserved. CISCO SECURITY MONITORING, ANALYSIS & RESPONSE SYSTEM

888© 2005 Cisco Systems, Inc. All rights reserved.

• CS-MARS transforms raw network and security data into actionable intelligence used to subvert real security incidents, as well as maintain corporate compliance

• Network-intelligent correlation

• Incident validation

• Attack visualization

• Automated investigation

• Leveraged mitigation

• Compliance management

• High performance

• Low TCO

Introducing Cisco Security Monitoring, Analysis & Response System (CS-MARS)

Page 9: 1 © 2005 Cisco Systems, Inc. All rights reserved. CISCO SECURITY MONITORING, ANALYSIS & RESPONSE SYSTEM

999© 2005 Cisco Systems, Inc. All rights reserved.

Centrally aggregate logs… limited event reduction and correlation

No network intelligence…isolated device events

Basic alerts, workflow, and reports… lacks details for timely response

Integrated network intelligence for superior event aggregation, reduction, and correlation

Visually depicts topology, valid incidents; attack path details with layer 2 / 3 leveraged mitigation

Events are dynamically NAT resolved, correlated, grouped, and validated

CS-MARS Enterprise Threat Mitigation

Costly to buy, deploy, maintain Lowest TCO; immediate results, easy to use and cost-effective deployment

Alternative SIM Approaches

Poor performance; achieved with costly platforms and / or clustering

Full correlation in excess of 10,000 EPS and 300,000 flows / sec

CS-MARS Value Proposition

Page 10: 1 © 2005 Cisco Systems, Inc. All rights reserved. CISCO SECURITY MONITORING, ANALYSIS & RESPONSE SYSTEM

101010© 2005 Cisco Systems, Inc. All rights reserved.

• Gain Network Intelligence

Topology, traffic flow,

device configuration,

and enforcement devices

• ContextCorrelation™

Correlates, reduces and categorizes events

Validates incidents

Valid Incidents

Sessions

Rules

Verify

Isolated EventsC

orrelation Red

uctio

n

Router Cfg.

Firewall Log

Switch Cfg.Switch Log

Server LogAV AlertApp Log

VA Scanner

Firewall Cfg.

NetflowNAT Cfg.

IDS Event

...

CS-MARS: “Know the Battlefield”

Page 11: 1 © 2005 Cisco Systems, Inc. All rights reserved. CISCO SECURITY MONITORING, ANALYSIS & RESPONSE SYSTEM

111111© 2005 Cisco Systems, Inc. All rights reserved.

CS-MARS: “Command and Control”

Page 12: 1 © 2005 Cisco Systems, Inc. All rights reserved. CISCO SECURITY MONITORING, ANALYSIS & RESPONSE SYSTEM

121212© 2005 Cisco Systems, Inc. All rights reserved.

CS-MARS: “Connect the Dots”

• SureVector™ Analysis

Visible and accurate attack path

Drill-down, full incident and raw event details

Pinpoint the true sources of anomalous and attack behavior

More complete and accurate story

1. Host A Port Scans Target X

2. Host A Buffer Overflow Attacks X

Where X is behind NAT device andWhere X is Vulnerable to attack

3. Target X executes PasswordAttacks Target Y located

downstream from NAT Device

Page 13: 1 © 2005 Cisco Systems, Inc. All rights reserved. CISCO SECURITY MONITORING, ANALYSIS & RESPONSE SYSTEM

131313© 2005 Cisco Systems, Inc. All rights reserved.

CS-MARS “Leveraged Mitigation”

• Use control capabilities within your infrastructure

Layer 2/3 attack path is clearly visible

Mitigation enforcement devices are identified

Exact mitigation command is provided

Firewall

Router

Switch

]

Page 14: 1 © 2005 Cisco Systems, Inc. All rights reserved. CISCO SECURITY MONITORING, ANALYSIS & RESPONSE SYSTEM

141414© 2005 Cisco Systems, Inc. All rights reserved.

CS-MARS: Compliance Reports

Popular reports with customization and distribution optionsQueries saved as rules or reports – intuitive framework (no SQL)

Page 15: 1 © 2005 Cisco Systems, Inc. All rights reserved. CISCO SECURITY MONITORING, ANALYSIS & RESPONSE SYSTEM

151515© 2005 Cisco Systems, Inc. All rights reserved.

CS-MARS: Correlation and Reduction

Descriptive rule framework and incident details

Significant consolidation

Page 16: 1 © 2005 Cisco Systems, Inc. All rights reserved. CISCO SECURITY MONITORING, ANALYSIS & RESPONSE SYSTEM

161616© 2005 Cisco Systems, Inc. All rights reserved.

The CS-MARS Advantage

• Superior Functionality, Lowest TCO

• Immediate results

Quick install, out-of-box use, web-based HTML console

Agentless capture, embedded Oracle®, no dba necessary

Supports popular network and security device

• Optimized performance and scalability

Rapid in-line processing

~over 10,000 EPS with all features active

High capacity RAID storage, continuous NFS archive

Global controller supports distributed CS-MARS management

Page 17: 1 © 2005 Cisco Systems, Inc. All rights reserved. CISCO SECURITY MONITORING, ANALYSIS & RESPONSE SYSTEM

171717© 2005 Cisco Systems, Inc. All rights reserved.

CS-MARS Lineup

• Appliance convenience

Complete integrated system; no additional hardware, platform, database, or agent software to purchase, install, and maintain

No need to determine nodes, admins, agents or other licensing

Hardened OS, roles-based admin. and secure communications

Model CS-MARS 20 CS-MARS 50 CS-MARS 100e CS-MARS 100 CS-MARS 200CS-MARS

GC

Events / Sec. 500 1,000 3,000 5,000 10,000 na

Flow / Sec. 10,000 25,000 75,000 150,000 300,000 na

RAID Storage 120GB+ 240GB 750GB 750GB 1TB 1TB

+not RAID

Page 18: 1 © 2005 Cisco Systems, Inc. All rights reserved. CISCO SECURITY MONITORING, ANALYSIS & RESPONSE SYSTEM

181818© 2005 Cisco Systems, Inc. All rights reserved.

Enterprise Threat Mitigation

• Empowers operators to maintain network availability

• Leverages network and security infrastructure

• Reduces noise and false alarms for better response

• Streamlines investigation, compliance and management

• Identifies significant, sophisticated, rapid threats

• Delivers return on security investment

CS-MARSEffective. Efficient. Integrated.

Page 19: 1 © 2005 Cisco Systems, Inc. All rights reserved. CISCO SECURITY MONITORING, ANALYSIS & RESPONSE SYSTEM

191919© 2005 Cisco Systems, Inc. All rights reserved.