Security Operations Basics
Security Operations Basics
Security Operations
2
Basics of Security Operations
• Security Operations team is responsible for performing defensive activities for the organization
• Employee equipped with different expertise work together on protecting the organization infrastructure
• SOC procedural workflow :
• Collect Logs from each and every system devices, networks etc.
1
• Analyse the logs to remove false positives and detect anomaly 2
• Regularly scan the organization assets to detect mis-configurations / vulnerability
3 • Act on possible ways to remediate the identified threat 4
• Document the findings and prepare sustainable incident response plan for possible
IT Threats
ASSETS
• Three main functions of SOC
• Technology
• For SOC Team members, technology is their weapon, they use it to collect
different type of logs (login events, activities etc).
• Security Monitoring :
Log
Collection
Log
Development
Analysis
of detection
(events,
rules
incidents)
• Threat Hunting:
Collected Logs
(events, incidents)
• Threat Intelligence
Threat Intel
Data1 Data2
Information
Data Source
Data Source 1
2 Data Source
Data source 2
1
Data Source Data Source
3 3
• Continuous OSINT Gathering
•Selling •Social
breached Media
information
Internal
Credentials
documents
On-Premise
Certificates
Locations
• Team comprises of people uses least amount of resources to get good visibility into active and emerging
threats.
Jr. Security Analyst [Tier-1] Triaging security incidents Triage alerts acc. to urgency and
relevancy. Manages & configures
security monitoring tools
Security Analyst [Tier-2] Incident Responder Reviews triaged alerts, identify
scope of the alert. Perform
remediation and recovery efforts
Senior Security Analyst [Tier-3] Threat Hunter Conducts pentesting on production
env. Optimizes SOC tools based on
threat hunting
SOC Manager Chief of SOC Hiring, training & assessing staff.
Measures SOC performance &
communicates with CISOs
• Processes
• Process ensures timely synchronization and execution of various activities performed by the
SOC.
1.
4. Assessment Event
and Auditing Classification &
Triage
SOC PROCESS
2.
3. Remediation
& Recovery Prioritize &
Analysis
• Security Information and Event Management (SIEM) WorkFlow
Firewall File Server DNS Server Web Network Devices Cloud Providers
Applications
• Feed data from organization resources and they provide deep level insights of the assets
day to day operations
• SIEM Detection Rule
• Device integration with SIEM Tools
Reference : https://nxlog.co/agent-based-versus-agent-less
• Exercises :
• Linux
• Mac
• Tools like OSQuery (cross-platform), Sysmon (Windows) etc can be used to collect
and transmit logs for analysing performance of hosts devices.
• Host Firewall - Windows
• Defender host firewall present in Win Vista, 7, 8, 10, 11 & server edition.
• The rules states which network traffic can go in and out from the device
• The firewall works on 3 different network types : Private, Public & Domain
• Inbound Rules : Network traffic coming from the external device. Ex : Someone tries to
connect to FTP Server on host machine.
• Outbound rules : Network traffic originating from the host device. Ex : Host machine tries to
connect to a web server.
• Connection Rules : Used to filter the network traffic going in and out the host device.
Traffic Flow Diagram
Internet
Host Device
Inbound Traffic
DEMO : Block Google Chrome
from accessing the internet
Outbound
Setting
Exercise 1 : Isolate Machine from Internet
Inbound
Setting
Exercise 2 : Block ICMP packets originating from Internet
towards your hosts machine
• Host Firewall – iptables
• Forward : Helpful during routing scenarios, utilizes traffic forwarding utilities to sent data
to destined address.
• Check the current configuration of iptables.
INPUT
Setting
Exercise 2 : Block ICMP packets originating from Internet
towards your hosts machine
• Anti-Virus
• In General Terms, it is a computer program used to prevent, detect and remove malicious s/w.
• They continuously scan incoming files (coming to system from everywhere) and if any anomaly is
detected, it is quarantined / removed.
• The Landscape of security has moved a lot from focusing only a single device to end-point devices
like Cell-phone, Enterprise laptop, Tablet, Servers, Computers etc.
• End Point Security protects network, using a combination of FireWall, AntiVirus, Anti-Malware etc.
• They are explicitly designed for enterprise clients to protect all their endpoints devices like servers,
computers, mobile etc.
• Endpoint Detection & Response (EDR)
• Understanding Naming Context, it is clear that EDR is a solution that
continuously monitors, stores endpoint-devices behaviour to detect and
block suspicious / malicious activities and also provides remediation
facilities all at one place (single dashboard).
33
Microsoft Defender for Endpoint
• Centralized platform to manage all the organization endpoint devices in a single dashboard
• Works on agent based methodology, it needs to be installed on endpoints which collects the data &
send the telemetry to dashboard
Microsoft Defender for Endpoint sign-up procedure
Score as per MS
recommendations
DEMO : MS Defender for Endpoint
Demonstration
37
Exercise 1
Exercise 2
• Collecting logs from network devices becomes difficult as they have a ton of data
regularly processing in the production
• Snort
• It has 3 modes:
• Packet Sniffer (like tcpdump)
• Packet Logger
• Full-blown IPS
• Download the software from here: https://www.snort.org/downloads
• The software can also be downloaded using the apt from already added
repository
• Snort performs real-time monitoring of packets using rules that are present in the
configuration file.
Snort Rule Header
/etc/snort/snort.conf
/etc/snort/rules/local.rules
alert icmp any any -> 192.168.1.8 any (msg:”ICMP Test”; sid: 1000001; rev:1;)
• Starting snort and capturing traffic as per configured rules
https://www.youtube.com/watch?v=8lOTUqfkAhQ
Exercise 2
• VPN tunnels
• Network segmentation
• Web Filtering
• Secure Firewall Portal Access
• Easy integration with other Fortinet products
INTERNET
FORTIGATE
FIREWALL
De-militarized
Militarized
Zone Zone
Network Access via VPN
Segmentation tunnel
Exercise 1
Exercise 2
• Tools like Splunk matches collected events against rules & analytics engines to
detect & analyse advanced threats
• Navigate and choose the “Monitor” option, it will monitor the local splunk platform instance
• Choose the auth.log file that collects login attempts locally
1 2
3 4
5
DEMO : Install Splunk in Linux Instance
DEMO : Log forwarding to Splunk
Security OAR
• Data like system network connection, running processes etc is stored in tables
• We can extract the system data using SQL queries from the tables
• Extracted information can then be feed to SIEM servers etc for further processing
System information
stored in tables format
• Install OSQuery (Linux)
Link : https://osquery.io/downloads/
Exercise : Install OSQUERY in Linux Instance
• Run and check all the available tables:
• Check the structure of each table
• Query from a table and limit the results
• Selecting 2 columns from a table
• With Filtering
Exercise : Explore the Tables & Replicate
the above exercises
Final Examination Instructions
• Once the self-paced materials are thoroughly completed, please reach
out at [email protected] to schedule the examination
• The exam project would be of 20 Days, starting from the day when the
Support team shares the details with you as per your schedule
• Candidates can submit the PDF report via email within the mentioned
Duration (20 Days)