Splunk Use Case Framework Introduction Session
Splunk Use Case Framework Introduction Session
Disclaimer
During the course of this presentation, we may make forward looking statements
regarding future events or the expected performance of the company. We caution
you that such statements reflect our current expectations and estimates based on
factors currently known to us and that actual events or results could differ
materially. For important factors that may cause actual results to differ from those
contained in our forward-looking statements, please review our filings with the SEC.
The forward-looking statements made in the this presentation are being made as of
the time and date of its live presentation. If reviewed after its live presentation, this
presentation may not contain current or accurate information. We do not assume
any obligation to update any forward looking statements we may make. In addition,
any information about our roadmap outlines our general product direction and is
subject to change at any time without notice. It is for informational purposes only
and shall not, be incorporated into any contract or other commitment. Splunk
undertakes no obligation either to develop the features or functionality described or
to include any such feature or functionality in a future release.
2
Outline
Intro
Motivators / requirements
Framework / approach
Goal setting, prioritizing
Operationalizing
Example use case
How to work with us
Short intro
Splunker 2 years.
Information Security focused day job over 5 years.
Doing security work dont get hacked over a decade,
if we do get hacked they dont get anything important.
Business Motivators
Compliance
Security Visibility
Peer Adoption
Process Effectiveness
Tactical Threat
Secure Configuration Management
Special Requests
Product Adoption
5
Framework / Approach
Problem
Type
Essential
Use
Cases
Maturing
Use
Cases
Data and
Events
Technology
Providers
Enrichmen
t Options
Regulatory
and
Control
Parameter
s
T1 / Triage
Procedure
Scoping
Parameter
s
T2 /
Investigative
Guidelines
Risk
Perspectiv
e
Effectiveness
Monitoring
Implementati
on Viability
Identify pain
Set goals
Establish initial
conditions
6
Artifacts
Response plan/
Operational processe
11
Or maybe these
In the constantly evolving threat landscape
organizations often must set aside strategic plans and
react to specific threats. Tactical threat motivations
support the urgent on boarding of missing critical data
sources.
Problems Types
PRT05-TacticalThreat-InsiderThreat
PRT05-TacticalThreat-Ransomeware
PRT05-TacticalThreat-SpearphishingCampaign
13
Or these
Lets be compliant
SOX
PCI
HIPPA
CORBIT
14
15
Adoption phase
Severity
Fidelity
Load factor
Etc.
Does it work?
Does the approach produce results
October 2015 Documented the first 20 risk mitigation
Focused
October 2016 ...
18
110
Use
Use Cases
Cases
Adoption
Motivation
s
Proactive:
Business
Problems
Business
Risks
Compliance
Expectations
Reactive:
Technology
Driven
Expectations
Defined use
cases
Single
definition of a
use case for
multiple
audiences
Taxonomy
Structured
approach
Defined terms
Consumer
Friendly
85
Technician
Level
Manager Level
Director Level
Executive
Level
Sales Engineer
Level
Account
Manager Level
20
7
19
Extensible
Started with
use cases
for ES
Added use
cases for PCI
Structured
to embrace
ITSI and
ITOA
Adoptable
Code
provided for
ten use
cases
Structured
for Content
Pack
Creation
10
Opposition
Built on the
concepts of
previous
efforts
20
21
22
23
24
27
28
30
31
UCA tool developed by Ryan Faircloth (PS) and Erick Mechler (sales)
32
What Now?
Related breakout sessions and activities
33
THANK YOU