TS Total Sight. Event collection, incident analysis and threat response automation tool

Good afternoon, in previous articles we got to know the work of ELK Stack. And now we will discuss the possibilities that can be realized by an information security specialist in using these systems. What logs can and should be made in elasticsearch. Let’s consider what statistics can be obtained by setting up dashboards and whether there is a profit in this. How it is possible to implement automation of information security processes using the ELK stack. We compose the architecture of the system. In sum, the implementation of all the functionality is a very big and difficult task, so the solution was singled out in a separate name – TS Total Sight.

Currently, solutions consolidating and analyzing information security incidents in one logical place are gaining popularity. As a result, a specialist receives statistics and a front line of actions to improve the security status of an organization. We set this task for ourselves in using the ELK stack, as a result we allocated the main functionality in 4 sections:

  1. Statistics and visualization;
  2. IS incident detection;
  3. Prioritization of incidents;
  4. Automation of information security processes.

Next, we consider in more detail separately.

Security Incident Detection

The main task in using elasticsearch in our case is to collect only information security incidents. It is possible to collect information security incidents from any means of protection if they support at least some modes of log forwarding, the standard is syslog or scp saving to a file.
You can give standard examples of security features and not only where to configure log forwarding:

  1. Any means of NGFW (Check Point, Fortinet);
  2. Any vulnerability scanners (PT Scanner, OpenVas);
  3. Web Application Firewall (PT AF);
  4. Netflow analyzers (Flowmon, Cisco StealthWatch);
  5. AD server.

After setting up log forwarding and configuration files in Logstash, you can correlate and compare with incidents coming from various security tools. To do this, it’s convenient to use indexes in which we will store all incidents related to a specific device. In other words, one index is all incidents to one device. There are 2 ways to implement such a distribution.

First option This is to configure the Logstash config. To do this, it is necessary to duplicate the log for certain fields into a separate unit with another type. And then later use this type. In the example, the logs are cloned using the CheckS IPS firewall blade.

filter {
    if [product] == "SmartDefense" {
        clone {
	    clones => ["CloneSmartDefense"]
	    add_field => {"system" => "checkpoint"}
	}
    }
}

In order to save such events in a separate index, depending on the log fields, for example, such as Destination IP attack signatures. You can use a similar construction:

output {
    if [type] == "CloneSmartDefense"{
    {
         elasticsearch {
    	 hosts => [",:9200"]
    	 index => "smartdefense-%{dst}"
    	 user => "admin"
    	 password => "password"
  	 }
    }
}

And in this way, you can save all incidents to the index, for example, by IP address, or by the domain name of the machine. In this case, save to the index “Smartdefense -% {dst}”, by the IP address of the signature.

However, different products will have different log fields, which will lead to chaos and unnecessary memory consumption. And here it will be necessary either carefully in the Logstash config settings to replace the fields with preconceived ones that will be the same for all types of incidents, which is also a difficult task.

Second implementation option – this is writing a script or process that will access the elastic database in real time, pull out the necessary incidents, and save it to a new index, this is a difficult task, but it allows you to work with logs as you please, and correlate directly with incidents from others security features. This option allows you to configure the work with logs as useful as possible for your case with maximum flexibility, but here there is a problem in finding such a specialist who can implement this.

And of course, the most important question and what can be detected and detected in general?
There may be several options, and depending on what security features are used in your infrastructure, a couple of examples:

  1. The most obvious and from my point of view the most interesting option for those who have an NGFW solution and a vulnerability scanner. This is a comparison of IPS logs and vulnerability scan results. If an IPS attack was detected (not blocked), and this vulnerability was not closed on the destination machine based on the scan results, it is necessary to blow all the pipes, since there is a high probability that the vulnerability was exploited.
  2. Many attempts to login from one machine to different places can symbolize malicious activity.
  3. User downloads virus files due to visiting a huge number of potentially dangerous sites.

Statistics and visualization

The most obvious and understandable reason for which ELK Stack is needed is the storage and visualization of logs, in previous articles it was shown how to log files from various devices using Logstash. After the logs go to Elasticsearch, you can set up dashboards, which were also mentioned in previous articles, with the necessary information and statistics for you through visualization.
Examples:

  1. Threat Prevention events dashboard with the most critical events. Here you can reflect which IPS signatures were detected, where they come from geographically.

  2. Dashboard on the use of the most critical applications for which information can merge.

  3. Scan results from any security scanner.

  4. Logs with Active Directory by user.

  5. VPN connection dashboard.

In this case, if you configure dashboards to update every few seconds, you can get a fairly convenient system for monitoring events in real time, which can then be used to quickly respond to IS incidents if you put dashboards on a separate screen.

Incident prioritization

In conditions of large infrastructure, the number of incidents can be off the charts, and specialists will not be able to manage all incidents on time. In this case, it is first of all necessary to single out those incidents that pose a great threat. Therefore, the system must prioritize incidents according to their danger in relation to your infrastructure. It is advisable to set up an alert in the mail or telegram of event data. Prioritization can be implemented using regular Kibana tools by setting visualization. But with a notification it’s harder, by default this functionality is not included in the base version of Elasticsearch, only in a paid one. Therefore, either buy a paid version, or, again, write the process yourself which will notify specialists in real time in the mail or telegram.

Automation of information security processes

And one of the most interesting parts is the automation of actions on information security incidents. Previously, we implemented this functionality for Splunk, a little more detail, you can read in this article. The basic idea is that the IPS policy is never tested or optimized, although in some cases it is an essential part of information security processes. For example, a year after the implementation of NGFW and the absence of actions to optimize IPS, you will accumulate a large number of signatures with the Detect action, which will not be blocked, which greatly reduces the state of information security in the organization. The following are some examples of what can be automated:

  1. Migrating an IPS signature from Detect to Prevent. If Prevent does not work for critical signatures, then this is not the order, and there is a serious breach in the security system. We change the action in politics to such signatures. You can implement this functionality if the NGFW device has the REST API functionality. This is only possible with programming skills, you need to pull the necessary information from Elastcisearch and execute API requests to the NGFW management server.
  2. If multiple signatures are detected or blocked from one IP address in network traffic, then it makes sense to block this IP address in the Firewall policy for a while. The implementation also consists of using the REST API.
  3. Run a host scan with a vulnerability scanner if this host has a large number of signatures via IPS or other security tools, if it is OpenVas, then you can write a script that will connect via ssh to the security scanner and start scanning.

TS Total Sight

In total, the implementation of all the functionality is a very big and difficult task. Without programming skills, you can configure the minimum functionality, which may be enough for use in the product. But if you are interested in all the functionality, you can pay attention to TS Total Sight. You can find more details on our website. As a result, the whole scheme of work and architecture will look like this:

Conclusion

We examined what can be implemented using ELK Stack. In subsequent articles, we will separately consider in more detail the functionality of TS Total Sight!

So stay tuned (Telegram, Facebook, VK, TS Solution Blog), Yandex Zen.

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *