0% found this document useful (0 votes)
329 views

QRadar Multiple Address Domain and Shared Infrastructure (v3)

Uploaded by

secua369
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
329 views

QRadar Multiple Address Domain and Shared Infrastructure (v3)

Uploaded by

secua369
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

IBM Security Systems

QRadar Multi-Tenanted and MSSP


Solution Overview

Feb, 2015

©12015 IBM Corporation


IBM Confidential © 2012 IBM Corporation
IBM Security Systems

Disclaimer
IBM’s statements regarding its plans, directions, and intent are subject to change or
withdrawal without notice at IBM ’s sole discretion.

Information regarding potential future products is intended to outline our general


product direction and it should not be relied on in making a purchasing decision.

The information mentioned regarding potential future products is not a commitment,


promise, or legal obligation to deliver any material, code or functionality. Information
about potential future products may not be incorporated into any contract. The
development, release, and timing of any future features or functionality described for
our products remains at our sole discretion.

Performance is based on measurements and projections using standard IBM


benchmarks in a controlled environment. The actual throughput or performance that
any user will experience will vary depending upon many factors, including
considerations such as the amount of multiprogramming in the user's job stream, the
I/O configuration, the storage configuration, and the workload processed.
Therefore, no assurance can be given that an individual user will achieve results
similar to those stated here.

2 © 2015 IBM Corporation


IBM Security Systems

Overview

 Many organizations have overlapping IP address spaces and multiple Qrada


systems deployed based on business requirements and in country compliance
requirements
 MSSPs and Organizations with shared infrastructure
– Characterised by multiple companies/departments accessing a single service
– Requirements to restrict access other companies/departments event data
– Infrastructure requires both multi-tenanted and single tenanted solutions

3
IBM Confidential © 2015 IBM Corporation
IBM Security Systems

Multi-Tenant, MSSP and Multi Region Solutions (2014-2015)


Flexible options based on customer size and requirements

• Master console
• Single monitoring and management console for multiple consoles
• Multi-tenant capability
• Overlapping IP support, Address Domains, Security

 Single offense view


 System health
Master
Console  Content management

Regional
NOC / SOC Team

Network A Network B Network C Network D Network E

4 © 2015 IBM Corporation


IBM Security Systems

Master Console – Single view and management of 100’s of QRadar


Systems

7.2.5
• Centralized health view
and system monitoring

7.2.5 +
• Centralized offense view
and management
• Content Management
• Log Source Management
• Rules
• Reports
• Saved Searches
• Dashboards
• User Accounts
• Federated Search
• Seat Management

5 © 2015 IBM Corporation


IBM Security Systems

An Example Multi-tenanted QRadar Deployment

Console
Local
Collectors

Processors + Processors +
Data Nodes Data Nodes
Customer/Unit/Region A
VPN

VPN
Y Local
Collectors

Collectors
z

Shared
Services Customer/Unit/Region B
6
IBM Confidential © 2015 IBM Corporation
IBM Security Systems

Example deployment overview

 A single managed SIEM service monitoring 3 networks


– 2 Customer networks
– 1 Shared service networks
• Services Y and Z are shared between the two customers
• Service X is only for customer B
– Customers are accessing shared services via a VPN connection
– The address space between the networks is not unique (i.e. the same IP addresses exist
in more than one network)
 Managed SIEM service is
– Providing compliance/usage/security reports and alerts to customers
– Portal access

7
IBM Confidential © 2015 IBM Corporation
IBM Security Systems

Phase One - QRadar 7.2.3 – August 2014

• Domain definition and tagging for events


• Search and filtering

©82015 IBM Corporation


IBM Confidential © 2012 IBM Corporation
IBM Security Systems

QRadar Domains - Simple and Flexible


 Domain definition based on a wide variety of parameters:
• Custom Property Value (RegEx)
• Log Source/Log Source Group
– Event Collector
 Centralized UI provides single point of configuration for all Domain information
 Quick visualization of all configured Domains.

9 © 2015 IBM Corporation


IBM Security Systems

Shared QRadar Infrastructure – Custom Property Values


 Domains defined based on custom property values (regex)
 Enables segmentation of shared infrastructure such as IDS/IDP systems
 Based on QRadar Reference Data Collections and can be easily
manipulated through QRadar RESTful APIs

Event
Collector

Event
Collector/Processor
Console
Client A

LS

IDS

14/01/2013 10:39 user= chris action=edit sourceip=10.0.2.31 destip=10.0.1.10


14/01/2013 10:41 user=john action=delete sourceip=10.0.2.32 destip=10.0.1.10
14/01/2013 11:41 user=chris action=edit sourceip=10.0.2.32 destip=10.0.1.10
Event
Collector

Client B

10 © 2015 IBM Corporation


IBM Security Systems

Shared QRadar Infrastructure – Log Source Separation


 Domains defined at the log source or log source group level
 Enables the use of shared QRadar infrastructure for multi-domain collection

Event
Collector

Event
Collector/Processor
Console
Client A

LS
LS

Event
Collector

Client B

11 © 2015 IBM Corporation


IBM Security Systems

Dedicate Event Collection


 Domains contain dedicated Event Collectors
 Future Proof – Easily grow collection needs without complex reconfiguration
 Dedicated work load – Ideal MSS service offering format

Event
Collector

Client A

Event
Processor
Console

Event
Collector

Client B

12 © 2015 IBM Corporation


IBM Security Systems

Domain Data Available in QRadar

13 © 2015 IBM Corporation


IBM Security Systems

Phase Two - QRadar 7.2.4 – November 2014

• Domain definition for flows


• Network hierarchy
• Correlation engine

©14
2015 IBM Corporation
IBM Confidential © 2012 IBM Corporation
IBM Security Systems

Domain Definition: By Flow Collector or Source

15 © 2015 IBM Corporation


IBM Security Systems

Network hierarchy – Address domain support.

 Network hierarchy nodes are


assigned a domain
 Overlapping IP addresses can be
defined in different hierarchy
nodes with different domains
 IP addresses in Events and
Flows automatically associated
with the correct network
hierarchy

16
IBM Confidential © 2015 IBM Corporation
IBM Security Systems

Domain support in rules

 Correlation engine
 Automatically
recognizes domains
 E.g. won’t correlate
the same IP
addresses from
different domains

17 © 2015 IBM Corporation


IBM Security Systems

Phase Three - QRadar 7.2.5 – May 2015

• Security profile
• Asset Profiling
• Offenses
• Vulnerability management

©18
2015 IBM Corporation
IBM Confidential © 2012 IBM Corporation
IBM Security Systems

Security Profile Domain Support

 Security Profile can be


restricted to one or more
domains
 Security profile will
restrict access to flows,
events, assets, and
offenses based on
domain

19 © 2015 IBM Corporation


IBM Security Systems

Offense Domain Support

 Domain information carried all the way through to offenses

20 © 2015 IBM Corporation


IBM Security Systems

Asset model Domain Support

 Each asset is assigned a domain


 Assets can have overlapping IP Addresses

21 © 2015 IBM Corporation


IBM Security Systems

Vulnerability Manager

 Scanners are mapped to a domain


 Each scan result associated with a
single domain
 Scan results map to assets in
correct domain in the asset model

22 © 2015 IBM Corporation


IBM Security Systems

Summary

 First phase has been delivered in 7.2.3


 No major re-architecting of QRadar
 Builds on existing QRadar functionality
– Security Profile
• Currently supports log source, and Network, Domain
being added
– Asset Model
• Since 7.2 Each asset uniquely identified with its on
unique ID (not IP)

23
IBM Confidential © 2015 IBM Corporation
IBM Security Systems

ibm.com/security

© Copyright IBM Corporation 2012. All rights reserved. The information contained in these materials is provided for informational purposes only, and is
provided AS IS w ithout w arranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherw ise related to,
these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any w arranties or representations from IBM or its
suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM so ftw are. References in these materials
to IBM products, programs, or services do not imply that they w ill be available in all countries in w hich IBM operates. Product release dates and/or capabilities
referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a
commitment to future product or feature availability in any w ay. IBM, the IBM logo, and other IBM products and services are trademarks of the International
Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of
others.

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper
access from w ithin and outside your enterprise. Improper access can result in information being altered, destroyed or misappr opriated or can result in damage to
or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure
can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensiv e security approach, w hich w ill
24 necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT ©WARRANT2015 IBM Corporation
THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.

You might also like