SlideShare una empresa de Scribd logo
1 de 27
Making Sense of
Critical Security Data
IBM i Security SIEM Integration
Ian Hartley – Product Management Director
Bill Hammond – Product Marketing Director
Housekeeping
Webinar Audio
• Today’s webinar audio is streamed through your computer
speakers
• If you need technical assistance with the web interface or audio,
please reach out to us using the Q&A box
Questions Welcome
• Submit your questions at any time during the presentation using
the Q&A box
Recording and slides
• This webinar is being recorded. You will receive an email following
the webinar with a link to the recording and slides
2
Today’s Agenda
• Basics of security monitoring
• Key areas to monitor
• Integration with SIEM solutions
• How Precisely solutions can help
3
Basics of
Security Monitoring
Enforcement date: January 1, 2020
• Requires organizations to comply with
CCPA if they collect data on residents
of California and have annual revenues
of $25 million, collect information on
over 50,000 people or have 50% of
annual revenue from selling/sharing
personal information
• Gives individuals the right to sue for
damages should a breach expose their
data and that data wasn’t encrypted or
otherwise made unreadable. Key
requirements include:
• Access control
• Restricted user privileges
• Sensitive data protection
• System activity logging
Regulations Require Monitoring
General Data Protection
Regulation
(GDPR)
Enforcement date: 25 May 2018
• Regulation in European Union law on data
protection and privacy for all individuals
within the European Union (EU) and the
European Economic Area (EEA)
• Applies to all organizations doing business
with EU citizens
• Aims primarily to provide protection and
control over their personal data to citizens
and residents, including
• Access control
• Sensitive data protection
• Restricted user privileges
• System activity logging
• Risk assessments
New York Dept. of Financial Services
Cybersecurity Regulation
(NYS 23 NYCRR 500)
Enforcement date: February 15, 2018
• Requires banks, insurance companies,
and other financial services institutions to
establish and maintain a cybersecurity
program designed to protect consumers
• Ensures the safety and soundness of New
York State's financial services industry.
• Requirements protect the confidentiality,
integrity and availability of information
systems, including
• Risk assessments
• Restricted user privileges
• Automatic logouts
• Antivirus
• Multi-factor authentication
• System activity logging
California Consumer
Protection Act
(CCPA)
5
Why we do log
collection and
monitoring?
Active
Monitoring
Catching the cybercriminals early
Forensics
Fixing the problem after a
security breach
6
Active Monitoring
Stop a Data Breach Before it Happens.
• Over 3,800 breaches in 2019
• 50% increase over last 5 years
• Billions of records every year
• Less than 1% of the breaches were
discovered through log analysis
• 69% of these breaches were detectible via
log evidence
Take Away: If you are monitoring
your logs, you can detect a breach
and stop it before data is lost.
7
Forensics
How did it happen, how do I clean it up?
• What servers are infected?
• How many are infected?
• Where did it start?
• How does the malware actually work?
• How do I clean it up?
Take Away: If you do not have logs you can’t
answer these questions and you are almost
certain to become re-infected with malware
8
Key Areas to
Monitor
Security Monitoring
You can’t monitor what you aren’t watching!
10
A strong IBM i security foundation requires solutions that draw a
perimeter around your system and its data – capturing security
data that you can monitor in log files
IBM i has powerful audit logs
• System Journal – QAUDJRN
• Database (Application) Journals – for Before and After
Images
• Other IBM Journals are available
• QHST Log Files – DSPLOG Command
• System Message Queues – QSYSOPR, QSYSMSG
Turn on auditing, save journal receivers, and take advantage of
everything the operating system can log for you
The State of Logging on
the IBM i
The state of logging on most IBM i’s is not good
• There is a ton of valuable information stored on your IBM i
• The IBM i logs are in proprietary format
• IBM i security logs are often an enclave inside the IT
organization
• No standardized syslog communications facility
• The essence of good security is externalizing the logs
• There is a requirement to remove the risk of tampering
• Compliance regulations recognize the need to watch all users
– including the most powerful users
11
Analyze IBM i Audit Logs
Tools help you extract insight from your logs
12
IBM i log files are comprehensive, unalterable, and
trusted by auditors BUT they are not easy to analyze.
Monitoring and reporting tools are needed to:
• Simplify the process of analyzing complex IBM i journals
• Filter through the massive amount of information in your logs
• Detect security incidents and raise alerts
• Quickly highlight compliance deviations
• Deliver reports in multiple formats to compliance and security
auditors, partners, customers and your management team
• Relieve your team of the burden of manual analysis
System Log Collection and
Monitoring
Core Principles
• Centralize log collection from ALL servers, devices and PCs
• Real time collection
• Event correlation for pattern recognition
• Real time monitoring and alerting
• Historical archives for forensics
• Query and reporting services
13
Enterprise-Level Visibility
Monitor IBM i security all the other platforms in your enterprise
14
Monitoring and reporting tools can forward IBM i security data to
a Security Information and Event Management (SIEM) solution to:
• Integrate IBM i security data with data from other IT platforms
• Enable advanced analysis of security data using advanced SIEM
technology for correlation, pattern matching, and threat detection
• Support information sharing and collaboration across teams
• Facilitate integration with case management and ticketing systems
Integration with
Security Information
and Event Management
(SIEM) solutions
What is SIEM?
Security Information and Event
Management
• Real-time analysis of security alerts
generated by applications and network
hardware
• Holistic, unified view into infrastructure,
workflow, policy compliance and log
management
• Monitor and manage user and service
privileges as well as external threat data
Log Collection
Log Analysis
Event Correlation
Log Forensics
IT Compliance
Application Log Monitoring
Object Access Auditing
Real-Time Alerting
User Activity Monitoring
Dashboards
Reporting
File Integrity Monitoring
System/Device Log Monitoring
Log Retention
SIEM
16
Enterprise Security Monitoring
• Monitoring and reporting tools can forward IBM i security
data to a Security Information and Event Management (SIEM)
solution to:
• Integrate IBM i security data with data from other IT
platforms
• Enable advanced analysis of security data using correlation,
pattern matching, and threat detection
• Sharing information across teams
• Integrate with case management and ticketing systems
Monitor IBM i security along with your other enterprise platforms
17
What Can Your SIEM Show You?
• Data movement – inbound/outbound FTP
• Dataset access operations
• Determine potential security threats based on unauthorized access
attempts
• Ensure only authorized users are accessing critical datasets
• Privileged/non-privileged user activity monitoring
• Unusual behavior pattern – off hours connections
• High number of invalid logon attempts
• Attack detection – intrusion, scans, floods
• Authentication anomalies – e.g. entered the building at 08:30 but
logged on from another country at 09:00
• Network Traffic Analysis – high data volumes from a device/server
• … and much more
18
What Can I Learn?
Examples that your SIEM solution can help identify
19
• File accesses outside business hours
• Accesses to sensitive database fields
• Changes of more than 10% to a credit limit field
• All accesses from a specific IP address
• Command line activity for powerful users (*ALLOBJ, *SECADM)
• Changes to system values, user profiles, and authorization lists
• Attempts to sign into a specific account
• Actions on a sensitive spool file, such as display or deletion of the
payroll spool file
Security is important – what about examples?
• Authorization Failures
• Login attempts
• Creating or deleting objects
• User profile events –
special authorities
• System Value changes
• Changes to sensitive files
20
Using Message Queue or History Data
• High-light critical events
• Look at trends, for example application errors
• Proactive analysis
• Long running jobs
• Hardware errors
• Application issues
21
Examples of application file monitoring
• Changes made to files
• Matching before/after field
changes
• Anomalies in file field changes
• Powerful search capability to
match and note exceptions.
index=eview72 JournalName="TESTJRN" ObjectName="PAYROLL"
(EntryType=UP OR EntryType=UB)
| rename SALARY AS "Salary"
| transaction EMPNUM maxspan=30s startswith=(EntryType=UB)
endswith=(EntryType=UP)
| eval befsalary=mvindex(Salary, 0)
| eval aftsalary=mvindex(Salary, 1)
| eval pctchange = round((aftsalary/befsalary*100)-100,0)
| where pctchange > $changepct$
22
SIEM Dashboards
23
How Precisely
Can Help
24
Precisely SIEM Integration
Ironstream
• Integrate mainframe and IBM i
security data into leading IT
analytics and operations
platforms for an enterprise-
wide view of your security
Assure Security
• Extract insights from IBM i
journal data send data directly
to your enterprise SIEM solution
allowing IBM i security to be
monitored with all other
enterprise platforms.
HPE ArcSight
Splunk
LogRhythm
MacAfee
AlienVault
SolarWinds
Etc…
25
Q & A
IBM i Security SIEM Integration

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

CNIT 160 Ch 4 Information Security Program Development (Part 3)
CNIT 160 Ch 4 Information Security Program Development (Part 3)CNIT 160 Ch 4 Information Security Program Development (Part 3)
CNIT 160 Ch 4 Information Security Program Development (Part 3)
 
CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)
 
6. Security Assessment and Testing
6. Security Assessment and Testing6. Security Assessment and Testing
6. Security Assessment and Testing
 
Flash Friday: Data Quality & GDPR
Flash Friday: Data Quality & GDPRFlash Friday: Data Quality & GDPR
Flash Friday: Data Quality & GDPR
 
Compliance technical controls and you rva sec 2019
Compliance technical controls and you   rva sec 2019Compliance technical controls and you   rva sec 2019
Compliance technical controls and you rva sec 2019
 
CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)
 
Essential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access SecurityEssential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access Security
 
Security 101: Controlling Access to IBM i Systems and Data
Security 101: Controlling Access to IBM i Systems and DataSecurity 101: Controlling Access to IBM i Systems and Data
Security 101: Controlling Access to IBM i Systems and Data
 
Taking the Pulse of IBM i Security for 2020
Taking the Pulse of IBM i Security for 2020Taking the Pulse of IBM i Security for 2020
Taking the Pulse of IBM i Security for 2020
 
Log maintenance network securiy
Log maintenance  network securiyLog maintenance  network securiy
Log maintenance network securiy
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security Engineering
 
Get Mainframe Visibility to Enhance SIEM Efforts in Splunk
Get Mainframe Visibility to Enhance SIEM Efforts in SplunkGet Mainframe Visibility to Enhance SIEM Efforts in Splunk
Get Mainframe Visibility to Enhance SIEM Efforts in Splunk
 
Introducing Assure Security Risk Assessment
Introducing Assure Security Risk AssessmentIntroducing Assure Security Risk Assessment
Introducing Assure Security Risk Assessment
 
CNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and TestingCNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and Testing
 
Security 101: Controlling Access to IBM i Systems and Data
Security 101: Controlling Access to IBM i Systems and DataSecurity 101: Controlling Access to IBM i Systems and Data
Security 101: Controlling Access to IBM i Systems and Data
 
PCI Compliance White Paper
PCI Compliance White PaperPCI Compliance White Paper
PCI Compliance White Paper
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and Security
 
CISSP - Chapter 3 - Physical security
CISSP - Chapter 3  - Physical securityCISSP - Chapter 3  - Physical security
CISSP - Chapter 3 - Physical security
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
 

Similar a IBM i Security SIEM Integration

SIEM enabled risk management , SOC and GRC v1.0
SIEM enabled risk management , SOC and GRC v1.0SIEM enabled risk management , SOC and GRC v1.0
SIEM enabled risk management , SOC and GRC v1.0
Rasmi Swain
 

Similar a IBM i Security SIEM Integration (20)

Effective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowEffective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to Know
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in Splunk
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
SIEM - Your Complete IT Security Arsenal
SIEM - Your Complete IT Security ArsenalSIEM - Your Complete IT Security Arsenal
SIEM - Your Complete IT Security Arsenal
 
Wc4
Wc4Wc4
Wc4
 
Cyber security series administrative control breaches
Cyber security series   administrative control breaches Cyber security series   administrative control breaches
Cyber security series administrative control breaches
 
SIEM enabled risk management , SOC and GRC v1.0
SIEM enabled risk management , SOC and GRC v1.0SIEM enabled risk management , SOC and GRC v1.0
SIEM enabled risk management , SOC and GRC v1.0
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information security
 
Accelerating Regulatory Compliance for IBM i Systems
Accelerating Regulatory Compliance for IBM i SystemsAccelerating Regulatory Compliance for IBM i Systems
Accelerating Regulatory Compliance for IBM i Systems
 
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
 
Revealing the 2016 State of IBM i Security
Revealing the 2016 State of IBM i SecurityRevealing the 2016 State of IBM i Security
Revealing the 2016 State of IBM i Security
 
IBM i HA and Security: Why They Need to Work Together
IBM i HA and Security: Why They Need to Work TogetherIBM i HA and Security: Why They Need to Work Together
IBM i HA and Security: Why They Need to Work Together
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
 
Decrypting the security mystery with SIEM (Part 1) ​
Decrypting the security mystery with SIEM (Part 1)  ​Decrypting the security mystery with SIEM (Part 1)  ​
Decrypting the security mystery with SIEM (Part 1) ​
 
More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.
 
Tips on SIEM Ops 2015
Tips on SIEM Ops 2015Tips on SIEM Ops 2015
Tips on SIEM Ops 2015
 
The Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM iThe Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM i
 
Cybersecurity Series SEIM Log Analysis
Cybersecurity Series  SEIM Log AnalysisCybersecurity Series  SEIM Log Analysis
Cybersecurity Series SEIM Log Analysis
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 

Más de Precisely

How to Build Data Governance Programs That Last - A Business-First Approach.pdf
How to Build Data Governance Programs That Last - A Business-First Approach.pdfHow to Build Data Governance Programs That Last - A Business-First Approach.pdf
How to Build Data Governance Programs That Last - A Business-First Approach.pdf
Precisely
 
Zukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter MassendatenZukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter Massendaten
Precisely
 
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Precisely
 
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3fTestjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Precisely
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
Precisely
 
Moving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and PreciselyMoving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and Precisely
Precisely
 
Automate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center ExcellenceAutomate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center Excellence
Precisely
 

Más de Precisely (20)

How to Build Data Governance Programs That Last - A Business-First Approach.pdf
How to Build Data Governance Programs That Last - A Business-First Approach.pdfHow to Build Data Governance Programs That Last - A Business-First Approach.pdf
How to Build Data Governance Programs That Last - A Business-First Approach.pdf
 
Zukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter MassendatenZukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter Massendaten
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Crucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdfCrucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10
 
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
 
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
 
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3fTestjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
 
Data Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity TrendsData Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity Trends
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Optimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAPOptimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAP
 
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige InvestitionenSAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
 
Automatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIsAutomatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIs
 
Moving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and PreciselyMoving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and Precisely
 
Automate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center ExcellenceAutomate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center Excellence
 
5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation Management5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation Management
 
Unlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter TomorrowUnlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter Tomorrow
 
Navigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckNavigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar Deck
 
Mainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak PerformanceMainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak Performance
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Último (20)

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 

IBM i Security SIEM Integration

  • 1. Making Sense of Critical Security Data IBM i Security SIEM Integration Ian Hartley – Product Management Director Bill Hammond – Product Marketing Director
  • 2. Housekeeping Webinar Audio • Today’s webinar audio is streamed through your computer speakers • If you need technical assistance with the web interface or audio, please reach out to us using the Q&A box Questions Welcome • Submit your questions at any time during the presentation using the Q&A box Recording and slides • This webinar is being recorded. You will receive an email following the webinar with a link to the recording and slides 2
  • 3. Today’s Agenda • Basics of security monitoring • Key areas to monitor • Integration with SIEM solutions • How Precisely solutions can help 3
  • 5. Enforcement date: January 1, 2020 • Requires organizations to comply with CCPA if they collect data on residents of California and have annual revenues of $25 million, collect information on over 50,000 people or have 50% of annual revenue from selling/sharing personal information • Gives individuals the right to sue for damages should a breach expose their data and that data wasn’t encrypted or otherwise made unreadable. Key requirements include: • Access control • Restricted user privileges • Sensitive data protection • System activity logging Regulations Require Monitoring General Data Protection Regulation (GDPR) Enforcement date: 25 May 2018 • Regulation in European Union law on data protection and privacy for all individuals within the European Union (EU) and the European Economic Area (EEA) • Applies to all organizations doing business with EU citizens • Aims primarily to provide protection and control over their personal data to citizens and residents, including • Access control • Sensitive data protection • Restricted user privileges • System activity logging • Risk assessments New York Dept. of Financial Services Cybersecurity Regulation (NYS 23 NYCRR 500) Enforcement date: February 15, 2018 • Requires banks, insurance companies, and other financial services institutions to establish and maintain a cybersecurity program designed to protect consumers • Ensures the safety and soundness of New York State's financial services industry. • Requirements protect the confidentiality, integrity and availability of information systems, including • Risk assessments • Restricted user privileges • Automatic logouts • Antivirus • Multi-factor authentication • System activity logging California Consumer Protection Act (CCPA) 5
  • 6. Why we do log collection and monitoring? Active Monitoring Catching the cybercriminals early Forensics Fixing the problem after a security breach 6
  • 7. Active Monitoring Stop a Data Breach Before it Happens. • Over 3,800 breaches in 2019 • 50% increase over last 5 years • Billions of records every year • Less than 1% of the breaches were discovered through log analysis • 69% of these breaches were detectible via log evidence Take Away: If you are monitoring your logs, you can detect a breach and stop it before data is lost. 7
  • 8. Forensics How did it happen, how do I clean it up? • What servers are infected? • How many are infected? • Where did it start? • How does the malware actually work? • How do I clean it up? Take Away: If you do not have logs you can’t answer these questions and you are almost certain to become re-infected with malware 8
  • 10. Security Monitoring You can’t monitor what you aren’t watching! 10 A strong IBM i security foundation requires solutions that draw a perimeter around your system and its data – capturing security data that you can monitor in log files IBM i has powerful audit logs • System Journal – QAUDJRN • Database (Application) Journals – for Before and After Images • Other IBM Journals are available • QHST Log Files – DSPLOG Command • System Message Queues – QSYSOPR, QSYSMSG Turn on auditing, save journal receivers, and take advantage of everything the operating system can log for you
  • 11. The State of Logging on the IBM i The state of logging on most IBM i’s is not good • There is a ton of valuable information stored on your IBM i • The IBM i logs are in proprietary format • IBM i security logs are often an enclave inside the IT organization • No standardized syslog communications facility • The essence of good security is externalizing the logs • There is a requirement to remove the risk of tampering • Compliance regulations recognize the need to watch all users – including the most powerful users 11
  • 12. Analyze IBM i Audit Logs Tools help you extract insight from your logs 12 IBM i log files are comprehensive, unalterable, and trusted by auditors BUT they are not easy to analyze. Monitoring and reporting tools are needed to: • Simplify the process of analyzing complex IBM i journals • Filter through the massive amount of information in your logs • Detect security incidents and raise alerts • Quickly highlight compliance deviations • Deliver reports in multiple formats to compliance and security auditors, partners, customers and your management team • Relieve your team of the burden of manual analysis
  • 13. System Log Collection and Monitoring Core Principles • Centralize log collection from ALL servers, devices and PCs • Real time collection • Event correlation for pattern recognition • Real time monitoring and alerting • Historical archives for forensics • Query and reporting services 13
  • 14. Enterprise-Level Visibility Monitor IBM i security all the other platforms in your enterprise 14 Monitoring and reporting tools can forward IBM i security data to a Security Information and Event Management (SIEM) solution to: • Integrate IBM i security data with data from other IT platforms • Enable advanced analysis of security data using advanced SIEM technology for correlation, pattern matching, and threat detection • Support information sharing and collaboration across teams • Facilitate integration with case management and ticketing systems
  • 15. Integration with Security Information and Event Management (SIEM) solutions
  • 16. What is SIEM? Security Information and Event Management • Real-time analysis of security alerts generated by applications and network hardware • Holistic, unified view into infrastructure, workflow, policy compliance and log management • Monitor and manage user and service privileges as well as external threat data Log Collection Log Analysis Event Correlation Log Forensics IT Compliance Application Log Monitoring Object Access Auditing Real-Time Alerting User Activity Monitoring Dashboards Reporting File Integrity Monitoring System/Device Log Monitoring Log Retention SIEM 16
  • 17. Enterprise Security Monitoring • Monitoring and reporting tools can forward IBM i security data to a Security Information and Event Management (SIEM) solution to: • Integrate IBM i security data with data from other IT platforms • Enable advanced analysis of security data using correlation, pattern matching, and threat detection • Sharing information across teams • Integrate with case management and ticketing systems Monitor IBM i security along with your other enterprise platforms 17
  • 18. What Can Your SIEM Show You? • Data movement – inbound/outbound FTP • Dataset access operations • Determine potential security threats based on unauthorized access attempts • Ensure only authorized users are accessing critical datasets • Privileged/non-privileged user activity monitoring • Unusual behavior pattern – off hours connections • High number of invalid logon attempts • Attack detection – intrusion, scans, floods • Authentication anomalies – e.g. entered the building at 08:30 but logged on from another country at 09:00 • Network Traffic Analysis – high data volumes from a device/server • … and much more 18
  • 19. What Can I Learn? Examples that your SIEM solution can help identify 19 • File accesses outside business hours • Accesses to sensitive database fields • Changes of more than 10% to a credit limit field • All accesses from a specific IP address • Command line activity for powerful users (*ALLOBJ, *SECADM) • Changes to system values, user profiles, and authorization lists • Attempts to sign into a specific account • Actions on a sensitive spool file, such as display or deletion of the payroll spool file
  • 20. Security is important – what about examples? • Authorization Failures • Login attempts • Creating or deleting objects • User profile events – special authorities • System Value changes • Changes to sensitive files 20
  • 21. Using Message Queue or History Data • High-light critical events • Look at trends, for example application errors • Proactive analysis • Long running jobs • Hardware errors • Application issues 21
  • 22. Examples of application file monitoring • Changes made to files • Matching before/after field changes • Anomalies in file field changes • Powerful search capability to match and note exceptions. index=eview72 JournalName="TESTJRN" ObjectName="PAYROLL" (EntryType=UP OR EntryType=UB) | rename SALARY AS "Salary" | transaction EMPNUM maxspan=30s startswith=(EntryType=UB) endswith=(EntryType=UP) | eval befsalary=mvindex(Salary, 0) | eval aftsalary=mvindex(Salary, 1) | eval pctchange = round((aftsalary/befsalary*100)-100,0) | where pctchange > $changepct$ 22
  • 25. Precisely SIEM Integration Ironstream • Integrate mainframe and IBM i security data into leading IT analytics and operations platforms for an enterprise- wide view of your security Assure Security • Extract insights from IBM i journal data send data directly to your enterprise SIEM solution allowing IBM i security to be monitored with all other enterprise platforms. HPE ArcSight Splunk LogRhythm MacAfee AlienVault SolarWinds Etc… 25
  • 26. Q & A

Notas del editor

  1. Bill
  2. Bill GDPR – Not only for Europe, It also addresses the export of personal data outside the EU (European Union) and EEA (European Economic Area) areas. 23 NYCRR 500 - Cybersecurity Requirements for Financial Services Companies requires banks, insurance companies, and other financial services institutions regulated by the New York Department of Financial Services.
  3. Patrick
  4. Patrick
  5. Patrick
  6. Bill
  7. Patrick
  8. Bill
  9. Patrick
  10. Bill will transition to Ian for this section Thanks Bill…so let’s now look at SIEM solutions…what they are…integrating data into them…and why you would want to do that.
  11. This is just a general … what is a SIEM solution slide SIEM technology aggregates and provides real-time analysis of security alerts using event data produced by security devices, network infrastructure components, systems, and applications. A primary function of SIEM is to analyze security event data in real-time for internal and external threat detection to prevent potential hacks and data loss. This typically includes user behavior analytics (UBA) – understanding user behavior and how it might impact security. SIEM technologies also collect, store, analyze and report on data needed for regulatory compliance to ensure that audit requirements are met as dictated. SIEM stands for “Security Information and Event Management”…and it’s a software solution that gathers security-related information, events and activities into one place so that the they can be analyzed. Data fed into a SIEM can come from many different software and hardware sources…and wherever possible the information is gathered in real-time. Let’s face it…in the context of security…a lot can happen in a short period of time…so you need to know what is happening…and where…as soon as possible…not 2 minutes after the data or system has been compromised. A SIEM solution gives you the visibility across your infrastructure so you can ensure activities are in line with organizational policies…data regulations…and expected information management actions. And this applies to both internal and external activities…that is activities taking place within your own community of employees…as well as threats coming from outside your organization.
  12. Makes the point that you need to include your IBM i data alongside all the other platforms in order to have a complete and accurate picture of your security situation One of the key aspects of any SIEM solution is to get information from across the entire enterprise. So, this means every source…including IBMi. You need to see information side-by-side with data from other areas of your IT infrastructure and user community…and this means bringing together elements from a diverse set of sources. Once you have this information all in one place…it needs to be examined as a whole…treated as a mass of information that works together to paint the picture of your security posture. SIEM solutions carry out detailed analysis and correlations with this data…looking for anomalies…behavior patterns…outliers…indicators that can point to something you need to be aware of…whether that is something very obvious or something subtle…such as a behavior pattern spread over time. By using a SIEM you are putting things like log data to work. The SIEM will process this information and identify notable items that you and the Security team may need pay attention to. To help with this it is also possible to integrate case management and incident ticketing workflows to ensure those that need to know are aware as soon as possible.
  13. Examples of SIEM data A SIEM can categorize data into many different categories…each with their own security implications. Looking at data…perhaps your most valuable and critical information…you need to be aware of where that information is going. Do you allow FTP? Should it be secured? Is data going to an unusual endpoint? Is someone accessing or attempting to access protected data? And every organization has users with privileged authority…and perhaps their system access should be watched even more closely. They have access to critical system elements and should be trusted, but… And if your system happens to be connected to the outside world…then you may also need to more aware of external attacks…from intrusion detection to port scanning or even things like denial of service. General system authentications and access should be routinely monitored with a SIEM. For example, someone swipes into the building at 8 30…but is then their account connects from another location at 9 am. Could be perfectly normal for your organization but may be highly suspicious activity. And a privileged user connecting at 3 am on a Sunday…may be something that is suspicious. Even the volumes of network traffic across your infrastructure can be an indicator of something unusual and should be investigated. There are many scenarios that a SIEM can capture…either out-of-the-box or that are specific to how your organization operates. What is normal for one…is not necessarily the case for another….but a SIEM needs to be able to cater for these needs.
  14. What I can learn from using a SIEM solution A SIEM can distill data to a point where you have sufficient information to decide whether something is suspicious or perfectly normal. For example…is it OK that someone is accessing data outside regular business hours? It could be…but then again…circumstances will determine what…is or is not…OK. Who…what…where…when…how…are all questions that need to be factored into making a decision about what needs further action. Should that user account be issuing that specific command on your production LPAR? Someone just got some extra account privileges…is this acceptable? Multiple logon attempts for the same user have been observed over the last 6 hours…is this suspicious? Activities around sensitive information…perhaps specific and unique to your organization…need to be monitored. These types of actions, scenarios and activities can be detected…and a SIEM can help determine whether this is normal…or needs immediate attention. But the list of items you should be monitoring…is long…
  15. The next 3 slides are just specific IBM i examples of data that can be sent to SIEM solutions Some of the sources of information needed by a SIEM solution can be pretty unfriendly. Often this is log or machine data that may not be so usable in its native format. But within this data can lie very useful elements of information…such as the items listed here… Authorizations Login attempts Actions around objects and user profiles Or system settings and your sensitive data
  16. And then looking specifically at the IBMi there are specific queues…logs…and journals…that need to be examined for… Certain events Trends Patterns …and even examining how jobs are running…perhaps running at abnormal times or running too long… Even spotting hardware errors and application issues can be indicative of a situation that needs attention.
  17. And your data also needs to be monitored. Who is accessing what, when and why? What changes are being made and are they legitimate? You need something like a SIEM solution combined with powerful search and analysis to be able to get to grips with what is happening with your data and spot those anomalies that can point to an issue. Security comes from a combination of many factors – both internal and external…and many things can influence what you need to pay attention to and look for.
  18. Comment on how we can even populate dashboards in products like Splunk with security data Fortunately…with the right tools…it is easy to get log…machine…and application data from your IBMi into something like Splunk. Here…you can search, analyze and correlate this information in many ways to reveal insights like the ones we have already spoken about. This data can be visualized on standard dashboards or even wired into Splunk’s award-winning Enterprise Security SIEM solution where out-of-the-box correlations and security workflow can help you ensure you have a good surveillance of your infrastructure. With that…I’ll have back to Bill…
  19. Ian will transition back to Bill to cover this section
  20. Precisely has multiple solutions and the one that’s right for you will depend on your requirements, your SIEM solution choice and other factors. Talk to you Precisely account rep to learn more