Educause Security Discussion mailing list archives
Re: Open source SIEM
From: "Nevin, Dave" <Dave.Nevin () OREGONSTATE EDU>
Date: Wed, 12 Feb 2020 19:15:26 +0000
Just my humble opinion, but I think the use of SIEMs—or at least log aggregation and correlation—is prevalent amongst higher education institutions; the price of commercial tools are turning people toward open source solutions. To that end, we’ve used Splunk, and are looking toward the Elastic Stack. As far as the SOC discussion, I’d highly suggest taking a look at the SOC Case Study: https://library.educause.edu/resources/2019/6/security-operations-center-soc-case-study Dave Dave Nevin | Director Oregon Research & Teaching Security Operations Center Oregon State University | A008 Kerr Admin Bldg Corvallis, OR 97331 | Phone: 541-713-3549 From: The EDUCAUSE Security Community Group Listserv <SECURITY () LISTSERV EDUCAUSE EDU> on behalf of "Powell, Andy" <ap16 () WILLIAMS EDU> Reply-To: The EDUCAUSE Security Community Group Listserv <SECURITY () LISTSERV EDUCAUSE EDU> Date: Wednesday, February 12, 2020 at 9:44 AM To: "SECURITY () LISTSERV EDUCAUSE EDU" <SECURITY () LISTSERV EDUCAUSE EDU> Subject: Re: [SECURITY] Open source SIEM Hi all, I've been following along with great interest on this topic, having come from corp environments where I've deployed, tuned, used (and enjoyed!) a variety of commercial SIEMs (QRadar, NetWitness, Exabeam DL/AA). Dave, I'm somewhat surprised by your suggestion...MSSPs are an increasingly attractive target<https://krebsonsecurity.com/2019/12/ransomware-at-it-services-provider-synoptek/> for attackers, as the bad guys know they represent the most bang for their bitcoin. Unless you are speaking about Higher Ed MSSPs only (are there such things?), why would you want to throw your investigative abilities into the same pool as those corporate targets that a MSSP also serves? I think this introduces more risk, setting aside the conversation of prompt alerting, secure log transport, ad-hoc investigations (you don't want to pay for), etc. The idea that logging and monitoring is sacrosanct (but still over UDP? Hmm..) means it is too important to ship off to an MSSP, imho. Back to the topic at hand, we're looking at ELK stack, and thanks to this thread I'm researching MozDef too. Secure Onion is known to me and is currently my fall back plan. This will all play out over the next 12 months, ideally. However, Dave infers a brilliant point...define your business requirements...write them down, and as you evaluate any solution, you'll have that to refer back to, ensuring it's not the tool you choose but the capability it provides. Best of luck! On Wed, Feb 12, 2020 at 12:17 PM David Eilken <david.eilken () domail maricopa edu<mailto:david.eilken () domail maricopa edu>> wrote: I'll chime in on open-source tools for detection. I've been involved with the deployment/ use of the Elastic stack. Obviously many IS practitioners across industries use it, and Elastic has begun to tailor to IS specifically with endpoint agents, etc. You could build an entire career around it. The OpenSOC (https://opensoc.io/#portfolio) has a good list of tools they use with the Elasticsearch at the center. I'm somewhat surprised to see so many that have built or are considering building your own SIEM solution or even purchasing a SIEM/ Logging tool. May I ask what is your brief business case versus using an MSSP to do it all for you? -Is it just cost? If I had to guess, most in education don't have a SIEM or SOC in-house, but maybe that is changing? Thanks for expanding on this conversation, Dave [Maricopa Community College District Office logo] DAVID EILKEN MA, MBA, CISSP-ISSMP MARICOPA COMMUNITY COLLEGES Information Security Officer | ITS 2411 West 14th Street, Tempe, AZ 85281 david.eilken () domail maricopa edu<mailto:david.eilken () domail maricopa edu> security.maricopa.edu<http://security.maricopa.edu> O: 480-784-0637 LinkedIn <https://www.linkedin.com/in/eilken> | Twitter <https://twitter.com/daveeilken> On Tue, Feb 11, 2020 at 2:12 PM Kimmitt, Jonathan <jonathan-kimmitt () utulsa edu<mailto:jonathan-kimmitt () utulsa edu>> wrote: We are in the middle of this process as well…. The one piece I would add to what the others have said, is that to make a SIEM effective, you have to be able to manage and search your logs well…. Our old Bro & Elk Stack ran about 8 billion events a week, and was generally useless. I don’t want to make that mistake in time/resources to deploy with no value on the other side….. So, we have spent the time in collecting and filtering “out the noise” on the log side for the last year or so with a Syslog/event log aggregator…. Once we are getting the logs we want, AND can do basic manual analysis to answer the questions we have, AND understand how much traffic we truly have, we will look into what SIEM solution best fits…. Additionally, there are a lot of SIEM tools built into other tools (offic365, MS ATP, Palo, etc)… so we want to be able to utilize those to the best of our ability, and send the data from them to our eventual SIEM solution….. I also sent one of my Sec Analysts to the SANS 555 – SIEM with Tactical Analysis course, to build good fundamentals for the next step of our SEIM process….. They used Elastic heavily in the class….. SANS is expensive, the time doing the aggregation was painful…. But I really want the SEIM deployment to be successful and provide good output and alerting… My general rule is a SIEM doesn’t solve any problems alone, it allows you to scale up your successful manual processes effectively. The hard part is having successful manual processes… ☺ -Jonathan From: The EDUCAUSE Security Community Group Listserv <SECURITY () LISTSERV EDUCAUSE EDU<mailto:SECURITY () LISTSERV EDUCAUSE EDU>> On Behalf Of Zepu Chen Sent: Tuesday, February 11, 2020 12:50 PM To: SECURITY () LISTSERV EDUCAUSE EDU<mailto:SECURITY () LISTSERV EDUCAUSE EDU> Subject: [SECURITY] Open source SIEM Good Afternoon, We are researching the possibility to implement an open-source SIEM solution at our University. The project we are currently reviewing is MozDef from Mozilla. Does anyone currently have MozDef or other open-source SIEM implemented in your environment? How are the implementation and operations experience so far? We are interested in seeing what other schools are doing. We would greatly appreciate it if you would be kind enough to share any pitfalls, constraints and roadblocks as well as implementation recommendations. Thanks, [Denison University]<https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdenison.edu%2F&data=02%7C01%7Cjonathan-kimmitt%40UTULSA.EDU%7Cf7a9f275c25643d7820408d7af232dd9%7Cd4ff013c62b74167924f5bd93e8202d3%7C0%7C1%7C637170437941526649&sdata=pwS2tk9CtK17KaKhAAUI4Hlj7Ix68XsqXxu6euOyFCE%3D&reserved=0> Zepu Chen Systems & Security Administrator Information Technology Services Office: 740-587-5307<tel:1-740-587-5307> zepu.chen () denison edu<mailto:zepu.chen () denison edu> ********** Replies to EDUCAUSE Community Group emails are sent to the entire community list. If you want to reply only to the person who sent the message, copy and paste their email address and forward the email reply. Additional participation and subscription information can be found at https://www.educause.edu/community<https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.educause.edu%2Fcommunity&data=02%7C01%7Cjonathan-kimmitt%40UTULSA.EDU%7Cf7a9f275c25643d7820408d7af232dd9%7Cd4ff013c62b74167924f5bd93e8202d3%7C0%7C1%7C637170437941536643&sdata=92a60P%2Fm400g9bD99W3oH6ZFdosRfyWFoKKGzC5tkQk%3D&reserved=0> ********** Replies to EDUCAUSE Community Group emails are sent to the entire community list. If you want to reply only to the person who sent the message, copy and paste their email address and forward the email reply. Additional participation and subscription information can be found at https://www.educause.edu/community ********** Replies to EDUCAUSE Community Group emails are sent to the entire community list. If you want to reply only to the person who sent the message, copy and paste their email address and forward the email reply. Additional participation and subscription information can be found at https://www.educause.edu/community -- Andrew F. Powell Jr., CISSP, CCSP (he/him/his) Information Security Director Williams College 22 Lab Campus Drive, Williamstown, MA, 01267 O - (413) 597 - 4340 C - (978) 502 - 0086 ********** Replies to EDUCAUSE Community Group emails are sent to the entire community list. If you want to reply only to the person who sent the message, copy and paste their email address and forward the email reply. Additional participation and subscription information can be found at https://www.educause.edu/community ********** Replies to EDUCAUSE Community Group emails are sent to the entire community list. If you want to reply only to the person who sent the message, copy and paste their email address and forward the email reply. Additional participation and subscription information can be found at https://www.educause.edu/community
Current thread:
- Open source SIEM Zepu Chen (Feb 11)
- Re: Open source SIEM Cleary, Kevin (Feb 11)
- Re: Open source SIEM Rogers, Zach (Feb 11)
- Re: Open source SIEM Max McGrath (Feb 11)
- Re: Open source SIEM Kevin Wilcox (Feb 11)
- Re: Open source SIEM Kimmitt, Jonathan (Feb 11)
- Re: Open source SIEM David Eilken (Feb 12)
- Re: Open source SIEM Powell, Andy (Feb 12)
- Re: Open source SIEM Nevin, Dave (Feb 12)
- Re: Open source SIEM David Eilken (Feb 12)