WHAT’S YOUR PLAN FOR CYBERSECURITY?
ARE YOU SIMPLY “PLANNING FOR THE WORST, BUT HOPING FOR THE BEST?”
With digital technology touching every part of our lives and new threats popping up daily, it is imperative that your organization is precise, informed, and prepared when it comes to defending your assets and hunting your adversaries.
Recent high-profile breaches, global ransomware attacks and the scourge of cryptomining are good enough reasons why your organization needs to collect the right data. You also need to implement the right processes and procedures early on, often alongside new technologies, and with an ever-increasing velocity and variability of machine data.
So how can you best defend your organization and hunt down new adversaries? Ultimately, by taking a holistic approach to your defense system across the enterprise. This is why Splunk believes every organization needs a security nerve center, implemented by following a six-stage Security Journey that we will describe for you.
Let’s break down what that means.
Organizations optimize their people, process and technology around security with a nerve center. The Splunk platform acts as this nerve center by bringing multiple cybersecurity areas, and others outside of security, together to foster collaboration and implement best practices for interacting with your data. From there, the platform allows for modern workflow, all the way to invoking actions to address cyberthreats and challenges.
Security teams can use Splunk software to drive statistical, visual, behavioral and exploratory analytics that inform and execute insights, decisions and actions.
Splunk Enterprise Security includes a common framework for interacting with data and invoking actions. The Adaptive Response framework enables security teams to quickly and confidently apply changes to the environment. Splunk Enterprise Security can automate the response as well, enabling the security infrastructure to adapt to the attacker using a range of actions appropriate to each domain.
THE NERVE CENTER MODEL
includes using all the data from the security technology stack, which can help you investigate, detect, understand and take rapid, coordinated action against threats in a manual, semiautomated or automated fashion. Establishing a nerve center allows organizations to advance their security and focus on the real challenges within. When teams invest in their security infrastructure, their security ecosystem and skills become stronger, making it possible to expand into new areas, proactively deal with threats and stay ahead of the curve.
Great. So how do I make all of this happen in the real world, you ask?
First, you must understand your environment and find a place to begin. Ask yourself: what are you trying to protect? How will you protect it? What data do you need and how will you respond to the threats?
WANT US TO SHOW YOU HOW TO GET STARTED? SURE.
We’ve put together this short book to introduce you to the top security use cases organizations face. We’ve also outlined and mapped them into a six-stage security “data journey” that will help you create a kick-ass security practice. Take a look:
Next, you will find the specific security use cases we’ve mapped to the journey. Go ahead. Choose your own adventure, or security challenge. The purpose of this book is to teach you how Splunk’s analytics-driven platform can help solve your security challenges and advance your security journey, including:
In this book, we will focus on solving common challenges around security monitoring, advanced threat detection, compliance, fraud and insider threat.
We will walk you through examples of how to solve common security challenges associated with some of these use cases. Each one detailing:
- Security Impact
- Security Data Journey Stage
- Data Sources Required
- SPL Difficulty
- Splunk Solution Required
- How to Implement
- Known False Positives
- How to Respond
The Security Use Cases Defined
First, a quick primer on the use cases so we are all on the same page.
Security monitoring enables you to analyze a continuous stream of near real-time snapshots of the state of risk to your security data, the network, endpoints, as well as cloud devices, systems and applications. The Splunk platform enables security teams to detect and prioritize threats found in the stream of data from these sources.
Advanced Threat Detection
An advanced persistent threat (APT) is a set of stealthy and continuous computer-hacking processes, often orchestrated by a person or persons targeting a specific entity. APTs usually target either private organizations and states for business or political motives.
Splunk Enterprise enables organizations to search and correlate their data to track advanced threats. Splunk Enterprise Security (ES) and Splunk User Behavior Analytics (UBA) elevate existing capabilities to apply a kill chain methodology through statistical
analysis, anomaly detection, and machine learning techniques to detect unknown and advanced threats.
In nearly all environments, there are regulatory requirements in one form or another – especially when dealing with the likes of GDPR, HIPAA, PCI, SOC, and even common guidelines that aren’t considered true compliance, like the 20 CIS Critical Security Controls. There are many ways of solving compliance challenges with Splunk. One example is the use of the Splunk platform to create correlation rules and reports that identify threats to
sensitive data or key employees, as well as to automatically demonstrate compliance.
It’s important to understand that machine data is at the heart of detecting fraudulent activities in the digital age. Splunk can onboard new data so that fraud teams are better able to detect and investigate anomalies. As a result, companies reduce financial loss, protect their reputation and maintain efficiency.
Insider threats come from current or former employees, contractors or partners who have access to the corporate network and intentionally or accidentally exfiltrate, misuse or destroy sensitive data. They often have legitimate access to networks and permission to download sensitive material, easily evading traditional security products. The Splunk platform gives security teams the ability to detect and prioritize threats posed by insiders
and compromised insiders that would have otherwise gone undiscovered.
Incident Investigation and Forensics
Security incidents can occur without warning and can often go undetected long enough to pose a serious threat to an organization. Investigations can be challenging and time consuming. Usually by the time security teams are aware of an issue, there’s a good chance the damage has been done. Splunk provides security teams with a “single source of truth” for all time stamped machine data in a computing environment. This helps them drive better, faster security investigations, reducing the chance of a threat going undetected for extended periods.
Organizations often work in silos in order to manage the response to malicious activities, incidents and breaches. And threats to the business can occur without detection, never becoming incidents.
And of course, the threat landscape is dynamic and constantly evolving, making it difficult for security practitioners of all levels to keep up with the latest types of threats.
To help your incident responders handle the latest security threats, Splunk employs a security research team that provides customers of Splunk Enterprise Security with regular product content updates. This content allows customers to quickly assess their environments for threat indicators and behaviors so that overall response time is shortened.
New threats are continuously emerging and evolving, making it a challenge for security teams to stay ahead of the game. Organizations can also lack the skills, experience and collaboration tools needed to quickly investigate and remediate threats.
Security operations teams adopt Splunk software for detection, incident response solutions, threat intelligence, orchestration and automation to scale investigations, accelerate response and remediate advanced threats. The Splunk platform helps organizations operationalize analytics-driven security practices in their SOC to speed up investigations and automate responses.