Docshare - Tips - Splunk and The Sans Top 20 Critical Security Controls PDF
Docshare - Tips - Splunk and The Sans Top 20 Critical Security Controls PDF
Docshare - Tips - Splunk and The Sans Top 20 Critical Security Controls PDF
All rights reserved. Splunk, Splunk>, Listen to Your Data, The Engine for Machine
Data, Hunk, Splunk Cloud, Splunk Storm and SPL are trademarks and registered
trademarks of Splunk Inc. in the United States and other countries. All other brand
names, product names, or trademarks belong to their respective owners.
The SANS Top 20 controls guidelines are licensed under a Creative Commons
Attribution-NoDerivs 3.0 Unported License. For details: http://www.sans.org/
critical-security-controls/.
While every precaution has been taken in the preparation of this book, the
publisher and author assume no responsibility for errors or omissions or for
damages resulting from the use of the information contained herein.
Disclaimer
This book is intended as a text and reference book for reading purposes only.
The actual use of Splunk’s software products must be in accordance with their
corresponding software license agreements and not with anything written in
this book. The documentation provided for Splunk’s software products, and not
this book, is the definitive source for information on how to use these products.
Although great care has been taken to ensure the accuracy and timeliness of the
information in this book, Splunk does not give any warranty or guarantee of the
accuracy or timeliness of the information and Splunk does not assume any liability
in connection with any use or result from the use of the information in this book.
The reader should check at docs.splunk.com for definitive descriptions of Splunk’s
features and functionality.
2
Table of Contents
Abstr act 4
Introduction 5
Why are the Top 20 CSC Important? 6
How Splunk Software Maps to the Top 20 CSC: Four Approaches 6
How Customers Use Splunk for Security 7
The Big Picture 7
The Top 20 C SC 8
Control 1: Inventory of Authorized and Unauthorized Devices 9
Control 2: Inventory of Authorized and Unauthorized Software 10
Control 3: Secure Configurations for Hardware and Software on Laptops,
Workstations and Servers 11
Control 4: Continuous Vulnerability Assessment and Remediation 12
Control 5: Malware Defense 13
Control 6: Application Software Security 14
Control 7: Wireless Device Control 15
Control 8: Data Recovery Capability 16
Control 9: Security Skills Assessment 17
Control 10: Secure Configurations for Firewalls, Routers and Switches 18
Control 11: Limitation and Control of Network Ports, Protocols and Switches 19
Control 12: Controlled Use of Admin Privileges 20
Control 13: Boundary Defense 21
Control 14: Maintenance, Monitoring and Analysis of Audit Logs 22
Control 15: Controlled Access Based on the Need to Know 23
Control 16: Account Monitoring and Control 24
Control 17: Data Loss Prevention 25
Control 18: Incident Response and Management 26
Control 19: Secure Network Engineering 27
Control 20: Pen Testing and Red Team Exercises 28
Conclusion 29
3
Abstract
Splunk provides a single, integrated, security intelligence platform that allows
today’s security professionals to ensure that their organizations are meeting
Critical Security Controls requirements. The software can verify incoming data,
execute the requirements needed, or support human activities associated with
a control. Security professionals find Splunk software uniquely suited to support
these controls in a number of ways, including: universal data ingestion with no
specific vendor preference; a real-time schema-less architecture; unparalleled
scaling capabilities for big data; and an agile and flexible reporting interface.
4
Introduction
Splunk Software and the Top 20 Critical Security Controls
5
Introduction Splunk and the Top 20 Critical Security Controls
These controls function across security processes, products, How Splunk Software Maps to the Top 20 CSC:
architectures and services, and have been proven in real-world Four Approaches
scenarios. According to surveys conducted by the U.S. State
Splunk software maps to each control in the Top 20 CSC (see
Department, organizations that fully implement, automate and
Figure 2). There are four major ways in which the Splunk
measure themselves against the Top 20 CSC can reduce risk by
platform supports the controls:
up to 94%.
• Verification: As Splunk software ingests data, it can
For more information on the history of the Top 20 CSC, please
generate reports and dashboards that show compliance or
see: http://www.sans.org/critical-security-controls/history.
non-compliance with controls. Incidents of non-compliance
The Top 20 CSC are ranked in order of overall importance and can generate alerts to SOC personnel.
application to a corporate security strategy. For example, the • Execution: In the case of an attack or non-compliance,
first two controls, surrounding known inventory, are at the top Splunk software can carry out recommended actions to
of the list and are foundational in nature, ranking “very high” meet controls.
for attack mitigation. Conversely, the final item on the list,
surrounding pen testing and “red team” exercises, ranks “low” • Verification & Execution: Data from third-party sources
for attack mitigation. More information and deep analysis on can be correlated with data ingested in Splunk software to
each control can be found here: http://www.sans.org/critical- meet the control.
security-controls/guidelines. • Support: The Splunk platform provides flexible features
that help security professionals with controls that are
Why are the Top 20 CSC Important? largely policy and process based.
There are several reasons that organizations embrace the Top 20 VERY HIGH HIGH/MED
CSC as they develop security strategies: 1 Hardware Inv 5 Malware Defense
• Implementation of the controls can reduce the risk of 2 Software Inv 10 Sec Net Config
currently-known high priority attacks as well as attacks Index Data
18 Incident Response
Verification Execution Verification & Execution Support
6
Introduction Splunk and the Top 20 Critical Security Controls
7
The Top 20 CSC
How Splunk Software Supports the Top 20 CSC
8
The Top 20 CSC Splunk and the Top 20 Critical Security Controls
9
The Top 20 CSC Splunk and the Top 20 Critical Security Controls
10
The Top 20 CSC Splunk and the Top 20 Critical Security Controls
11
The Top 20 CSC Splunk and the Top 20 Critical Security Controls
Figure 13. Splunk App for Enterprise Security: Threat List Activity.
12
The Top 20 CSC Splunk and the Top 20 Critical Security Controls
13
The Top 20 CSC Splunk and the Top 20 Critical Security Controls
14
The Top 20 CSC Splunk and the Top 20 Critical Security Controls
15
The Top 20 CSC Splunk and the Top 20 Critical Security Controls
16
The Top 20 CSC Splunk and the Top 20 Critical Security Controls
17
The Top 20 CSC Splunk and the Top 20 Critical Security Controls
19
The Top 20 CSC Splunk and the Top 20 Critical Security Controls
20
The Top 20 CSC Splunk and the Top 20 Critical Security Controls
21
The Top 20 CSC Splunk and the Top 20 Critical Security Controls
22
The Top 20 CSC Splunk and the Top 20 Critical Security Controls
23
The Top 20 CSC Splunk and the Top 20 Critical Security Controls
Role of Splunk Software: Verification • ES contains the Access Tracker dashboard, which helps
Account monitoring and control is generally accomplished with monitor and correlate user activities across multiple user
identity management solutions and the proper use of built-in names often prevalent in organizations without a single-
authentication mechanisms. sign-on (SSO) solution.
24
The Top 20 CSC Splunk and the Top 20 Critical Security Controls
26
The Top 20 CSC Splunk and the Top 20 Critical Security Controls
27
The Top 20 CSC Splunk and the Top 20 Critical Security Controls
28
Conclusion
Throughout this document, we have shown how Splunk software can assist your
organization with executing requirements confirming or supporting activities
surrounding each of the Top 20 Critical Security Controls. The Splunk platform
is a flexible and versatile solution and plays an integral role in protecting your
organization from known, advanced and emerging cyber threats.
29
250 Brannan St., San Francisco, CA 94107 info@splunk.com | sales@splunk.com 866-438-7758 | 415-848-8400 www.apps.splunk.com
www.splunk.com
© 2014 Splunk Inc. All rights reserved. Splunk, Splunk>, Listen to Your Data, The Engine for Machine Data, Hunk, Splunk Cloud, Splunk Storm and SPL are trademarks and
registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners.. Item # EB-Splunk-Top20Security-106