📜 ⬆️ ⬇️

SOC for beginners. SOC tasks: security control

We continue the cycle of our articles on cyber attack centers for beginners. In the last article, we talked about Security Monitoring, the SIEM tools and the Use Case.

The term Security Operations Center for many is associated exclusively with the monitoring of incidents. For many service providers, this is, in principle, at hand, so few people say that monitoring has a number of serious limitations in terms of protection against cyber attacks.

In this article, we will demonstrate with examples the weak points of monitoring information security incidents, tell you what to do about it, and in the end, as usual, we will give some practical recommendations on how to conduct an infrastructure security audit using our own resources.
')


Vulnerability Security Monitoring


What are the strengths and weaknesses of Security Monitoring? The fact that in the first place he handles security events. These are either events and triggering of information protection rules, or logs and log files: operating system, database, application software.

At the same time, there are a large number of situations in which either the activity is not explicitly recorded in the logs, or the flow of events or the capabilities of the systems do not effectively organize the monitoring process.

Let's look at examples.

1. Operation of system vulnerabilities

Consider a fairly typical situation: there is a substantially secure perimeter, a separate DMZ segment and a rather weakly segmented office network of computers. And so, in this network we have a “new” host. Whether this machine belongs to an insider, or is it an ordinary employee’s laptop infected by social engineering, is not so important. The attacker begins to engage in exploiting the vulnerability of the RCE on the operating systems of servers and workstations that are accessible to him within the segment.

How can I fix this problem? The lack of network segmentation leaves us hopeless of detecting from network security tools, be it IPS or other systems. In the logs of the operating system itself, the exploitation of the RCE vulnerability does not carry any special code, and therefore there is no way to distinguish it from the usual authentication attempt in the OS. One way or another, the logs will launch the svchost.exe system process from the system user.

Our only hope remains IDS-modules of host protection, but, as our practice shows, having a working and regularly updated IDS on all infrastructure hosts is a rarity.

This is how the exploitation of the “painful” EternalBlue SMB Remote Windows Kernel Pool Corruption vulnerability (fixed by security update MS17-010) looks like. Please note that the absence of any of the three sources given in the example will not give us a complete picture and a chance to understand whether there was an attack or not.



As a result, you can hope for a miracle, or you can begin to build the process of managing vulnerabilities and try to localize the problem before it occurs .

There are quite a lot of specialized materials on this issue, so we will not focus on it. Let's designate only a few theses.

“Winning the race” with vulnerabilities and building an infrastructure with up-to-date security updates is a task almost impossible to implement in a large corporate client. The number of vulnerabilities is growing from year to year, most of which are of medium and high severity level (according to the CVSS v2 rating system).


Distribution of the number of vulnerabilities by year in terms of their criticality ( reference to the source ).

When reviewing and compiling a vulnerability elimination map, you must not only adhere to the Pareto principle (i.e., select only the most critical part to eliminate), but also work very carefully with compensating measures — with accessibility of vulnerability due to adjustments of protection tools, analysis of possible vectors of etc.

But this is not the only task left to the monitoring capabilities.

2. Profiling Direct Internet Access

Periodically, in the eyes of the security service, SIEM turns into a powerful tool that is able to handle any events or data streams. In this case, the following problem may arise, for example: within the company there is a certain agreed number of routes allowed for direct access to the Internet bypassing proxy servers. And in order to control the work of network specialists, SIEM is assigned the task: to control all previously uncoordinated opening of direct access by analyzing sessions from the corporate network.

It would seem that the task is simple and logical. But there are several limitations:


As a result, this question is primarily concerned with configuration management and change control. And, despite the theoretical possibility of solving this problem with the help of monitoring, it is many times more efficient to operate with specialized means and already in the SIEM to monitor the operation of the process.

Collectively, these examples lead us to a more global task: SOC needs to understand the company's infrastructure, its vulnerabilities and processes in a “broad sense” in detail and decide how to most effectively monitor this infrastructure and how quickly to find out what is in it something has changed - that is, at each moment in time to objectively assess the actual security of the infrastructure from attack.

Security Control - Tasks and Technologies


In our opinion, the following tasks fall within the scope of security control:



For each of the designated tasks has its own toolkit:


But one of the most important and at the same time most undervalued security resources is its language and communication. From our practice of working in clients, with a built-in human communication with IT and applied people, even during a conversation in a smoking room, you can learn about future or past changes much more than during a long technical analysis of settings (which, nevertheless, does not negate the importance of this process) .

Monitoring and control of security => Monitoring + control of security


One of the important advantages of running parallel monitoring and security monitoring processes in a SOC is the ability to “pereopylny” one process information from another, thereby increasing overall security. Let us take an example of how this works.

Monitoring as a tool for identifying new hosts and assets

If the company does not build an asset inventory process or IT does not share its results, the emergence of a new system with critical functionality or critical data may pass by information security. But the situation changes significantly when there is a monitoring process.

In 99% of cases, a newly appeared host will “show” itself without fail:


If these sources are connected to monitoring, then using a fairly simple report or script, you can identify such “spyware” hosts.

Example: Windows authentication events with filters by known host names. As a rule, the company has criteria for naming hosts that can be caught.



And, already possessing the information that new entities have appeared in the company's network, it is quite possible to sort out their tasks, legitimacy or take them into account in the general threat model.

Conversely, if it is not possible to close any process or technological vulnerability forever, additional signatures and scenarios that control the exploitation of this vulnerability can be developed as a compensating measure.

An example is the process of setting up and servicing technological equipment at a plant (or, for example, a state district power station — in other words, in almost any production). To work with such equipment, as a rule, engineers from the manufacturer are involved, and often these are foreign specialists who need to somehow organize remote access to the site. Quite often, due to the limitations of the existing network architecture and technology segments, remote access is opened directly from the Internet (via RDP, SSH) to terminal servers, from which equipment is already being set up using specialized software. And in another way to organize this access is simply not possible. Yes, it is possible to open access by request and to a strictly defined technological window, limit the addresses from which connections to the terminal server will be allowed, but still there is a risk of interception of the RDP / SSH session, exploitation of OS vulnerabilities from the Internet, penetration into the technological network through AWS commissioning engineer, backdoor infection of this terminal server, etc.

Since there is no possibility to “close” this process vulnerability, as a compensating measure, we can offer enhanced monitoring of terminal server data and activity on them, namely:


These measures, although they will not prevent the fact of hacking or illegitimate actions within the framework of the considered process, but will help in time to identify them and respond.

Security control - where to start

We suggest starting the approach to security control tasks with the following actions:


Even this not very laborious slice of information will allow you to make the first approach to understanding the actual security of your infrastructure. Well, then the road will be mastered by going ... or wait for our next articles :)

Source: https://habr.com/ru/post/341530/


All Articles