📜 ⬆️ ⬇️

JSOC: the experience of the young Russian MSSP

As part of the corporate blog, I would like to launch a series of articles about our young (but, nevertheless, very bright) initiative in the field of information security - the JSOC (Jet Security Operation Center) - a commercial center for monitoring and responding to incidents. In the articles I will try to do less self-promotion and pay more attention to practice: our experience and the principles of building a service. Nevertheless, this is my first "habro-experience", and therefore do not judge strictly.

SOC - prerequisites


I don’t really want to tell why a large Russian company is needed at all (there are too many different articles and studies on this subject written). But statistics is another matter, and it is a sin not to remember about it. For example:

If we add to this another 3-4 news headlines on the relevant topic, then the idea that security needs to be monitored and information security incidents to identify and analyze is absolutely logical and understandable.

What do security experts advise on this issue? Of course, make the SIEM solution the core of an existing or under construction SOC. This will solve several problems at once:

Some common methodology


There are several levels of SOC-SOMM maturity (Security Operations Maturity Model):
SOMM levels

Fig. 1 - SOMM Levels

Unfortunately, most companies, having taken the first step on the way to their own incident monitoring center, stop there. According to HP estimates, 24% SOC in the world do not reach level 1, and only 30% SOC correspond to the base (2) level. Statistics of the distribution of SOMM levels depending on the business area of ​​companies, collected in 13 countries of the world (including Canada, USA, China, UK, Germany, South Africa, etc.) is as follows:
Distribution of SOMM Levels by Business Area

Fig. 2 - Distribution of SOMM levels by business area
')

SOC in-house: issues


At the same time, almost all large Russian companies passed through the implementation of large-scale SIEM solutions. Did they manage to build effective SOC `s? Unfortunately, most often not: today we know the experience of only four successful SOC launches in Russia.

And, as a rule, when starting to build your own SOC, everyone faces three facets of one problem.

First, with a quantitative shortage of personnel for a variety of reasons: from personnel shortage and the lack of specialized universities to the difficulty of acquiring the required competencies. De facto, within the framework of the it-security unit, today there are 4–5 people who carry out the entire cycle of work to ensure the security of a company (from administering protective equipment to regular risk analysis and developing a strategy for the development of the subject matter in the company). Naturally, with such a load, it is almost impossible to devote the proper time to SOC tasks.

The second point is related to the impossibility of building an effective monitoring process with internal SLAs. In addition to the need to allocate personnel, the launch of SOC usually entails the creation in the it-security unit of a full-time shift shift, working on an extended working day or around the clock. And this is from 2 to 5 new staff units. At the same time, the allocation of personnel is directly related to the need for continuous monitoring of personnel turnover (extremely rarely IB specialists are ready to work in the night shift), building processes and internal quality control of the work performed.

Well, the third point is not to mention the need not only to handle emerging incidents, but also to constantly “tune” and adjust the system to changing infrastructure or emerging security threats. And this, regardless of the chosen instrument, is a very time-consuming task for the analyst, requiring you to keep your finger on the pulse. And the presence of a person engaged in clean analytics and SOC development is a great luxury (even for a large company).

Estimating the need for creating SOC on the market together with the described nuances led us first to the idea and then to actually build our own commercial SOC.

Platform Selection


Naturally, starting SOC, we first of all faced the question: “What kind of SIEM solution should be made the core of our system”? Responding to it, we have formed a list of requirements for the system being created. In particular, it should:

We stopped our choice on the flagship product in the SIEM - HP ArcSight class (and, despite various difficulties in the life of the system, we never regretted our choice). Technologically, JSOC is no longer just HP ArcSight. SIEM `s core gradually acquired various useful features: traffic monitoring, ips \ ids, vulnerability assessment, etc. At the same time, we have accumulated a large number of scripts, add-ons and our own developments, integrated with our own Security Intelligence solution (JiVS), which is:

As a result, we have formed such protection profiles / lines for identifying incidents with customer companies, such as:

Infrastructure


JSOC Service Infrastructure

Fig. 3 - JSOC service infrastructure

After the selection of the main technological platform, it was necessary to solve the problems of creating the infrastructure and determine the location of the location. The experience of our Western colleagues shows that the target accessibility of the architecture should be at least 99.5% (and with maximum cataclysm resistance). At the same time, the question of geography remained fundamental: collocation is possible only within the borders of the Russian Federation, which excluded for us the possibility of using popular western providers. Natural questions of providing information security infrastructure at all levels of access were superimposed here, and we, by and large, have no choice left: we turned to the team of our ITC. As part of a large colocation for our JSOC, we specifically identified a fragment where we were able to deploy our architecture, while at the same time tightening up the security profiles that already exist within the ETSC. The IT infrastructure is deployed in the Tier 3 data center of our company, and its availability rates are 99.8%. As a result, we were able to reach the target indicators of the availability of our service and received substantial freedom of action in the work and adaptation of the system for ourselves.

Team


At the initial launch of the service, the JSOC team consisted of 3 people: two monitoring engineers closing the time interval from 8 to 22 hours, and one analyst / administrator who was involved in the development of the rules. The SLA for the service, indicated to the clients, was also quite mild: the reaction time to the detected incident was up to 30 minutes, the time for analysis, preparation of analytical information and informing the client was up to 2 hours. But, after the first months of work, we made some very significant conclusions:
  1. The monitoring shift must necessarily work in the 24 * 7 mode. Despite the significantly smaller number of incidents in the evening and at night, the most important and critical events (the launch of DDoS attacks, the final phases of slow attacks on penetration through the outer perimeter, malicious actions of counterparties, etc.) occur all the same at night and by the time of the start of the morning shift already lose their relevance.
  2. The time to resolve a critical incident should not exceed 30 minutes. Otherwise, the chances of preventing it or minimizing damage significantly catastrophically fall.
  3. To ensure the required time for analysis, a full-fledged toolkit for its investigation should be prepared for each incident: active channels with filtered target events for analysis, trends showing statistical changes in suspicious activities and targeted analytical reports to quickly analyze activities and make operational decisions.
  4. The administration team for the protection of our customers should be separated from the monitoring and incident detection team. Otherwise, the risk of the influence of the human factor in the chain “made changes to the configuration — recorded the incident in fact — indicated a false response” could have a significant effect on the quality of our service.

In practice, all these conclusions resulted in the creation within the framework of the Information Security Company Jet Infosystems a separate structural unit focused on a three-tier model for ensuring each of the tasks: both monitoring and resolving incidents, and administering protection. Now the division has more than 30 people, has a formed structure (see. Fig. 4) and includes:

JSOC organizational structure

Fig. 4 - JSOC Organizational Structure

This organizational structure allowed us to reach the following SLA targets:
Jet Security Operation Center ParametersBaseAdvancedPremium
Service time8 * 524 * 724 * 7
Incident Detection Time (min)Critical Incidents15-3010-205-10
Other incidentsup to 60up to 60up to 45
The time of basic diagnosis and informing the customer (min)Critical Incidents45thirty20
Other incidentsup to 120up to 120up to 90
The time of issue of recommendations on counteractionCritical Incidentsup to 2 hup to 1.5 hup to 45 min
Other incidentsup to 8 hup to 6 hup to 4 h

At the moment, we serve already 12 clients and solve the tasks facing us to ensure their information security. These are the results of the first one and a half years of JSOC.



I hope this material did not seem to you too marketing. In future articles we plan to cover topics such as:



To be continued ...;) dryukov

Source: https://habr.com/ru/post/233885/


All Articles