Intrusion Event

Report 16 Downloads 48 Views
A Deep Dive into the Firepower Manager William Young, Security Solutions Architect [email protected] @WilliamDYoung BRKSEC-2058

Just some Security Guy •

William Young



Security Solutions Architect, Cisco



26 Years in Security



13 Years working with “Sourcefire” / “Firepower”



Focus areas: •

• • •

Security Operations Policy & Compliance Threat Forensics and Investigation Hacker: Or just some guy that breaks stuff

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

4

Cisco Firepower Sessions: Building Blocks BRKSEC-2056

BRKSEC-2050

BRKSEC-2058

Threat Centric Network Security

ASA Firepower NGFW typical deployment scenarios

A Deep Dive into using the Firepower

Tuesday 11:15

Tuesday 14:15

Tuesday 16:45

BRKSEC-3032

BRKSEC-3035

BRKSEC-3455

NGFW Clustering Deep Dive

Firepower Platform Deep Dive

Dissecting Firepower NGFW (FTD+FPS)

Wednesday 9:00

Thursday 9:00

Friday 9:00

BRKSEC-2058

Manager

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

5

Agenda •

Introduction



Understanding Events in the Firepower Management Center



Workflows



Custom Tables



Walking through a Breach



Leveraging the Dashboard



Security Automation (Orchestration) •

Recommended Rules



Correlation Rules



Automating Remediation (Remediation API)





Reporting Matters

Close

Do you really know Firepower Manager? •

More than just: •

A policy configuration tool for NGFW / NGIPS • A quick way to see the context / composition of your network • A tool to “check-on” your intrusion events

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

7

Creating a deeper value than ”just threat protection” Firepower Management Center (FMC) manages threat detection. It also: •

Puts threat into context within YOUR unique network.



Provides actionable security, network, and business data



Can allow “Security” to come out of the “Dog House” by supporting multiple business outcomes



Create automation in your ”threat hunting”



Bend itself to your organization’s workflow or automate that workflow.

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

8

Key Takeaways At the end of the session, will start to: •

understand how automatic correlation REALLY works. •

Impact Flags & Indications of Compromise (IOCs).



know which security events need to be investigated first, and why.



begin using correlation policies and system APIs to automate your security workflow



understand the full breadth of reporting capabilities to support BOTH security and business interests for your enterprise. Introduction

Understanding Events

Walking the Breach

Security Automation

Reporting

Close

➥ Recommended Rules ➥ Workflows ➥ Custom Tables ➥ Correlation Rules ➥ Remediation API BRKSEC-2058

➥ The Dashboard

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

9

Understanding Events in the Firepower Management Center Introduction

Understanding Events

Walking the Breach

Security Automation

Reporting

➥ Recommended Rules ➥ Workflows ➥ Custom Tables ➥ Correlation Rules ➥ Remediation API

➥ The Dashboard

Close

Event Source Matters

Understanding Data

Misunderstood Data

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

11

Visual Guide to Firepower Event Sources Security Intelligence

Security Intelligence

Traffic Normalization

Connection Events

DNS Sinkhole

SSL Decrypt

Discovery Events

URL

Application Detection

Intrusion Events

Network Discovery

User Activity

Identity

File Events

Servers

File Detection

AMP

Malware Events

IPS Engine (Snort®)

AMP 4 Endpoints

File Info

Supplemental Data • Geo IP Data

Applications

File Trajectory

• CVE / Vuln Data • IP Reputation Data • URL Data

Application Details

Host Profiles

Indications of Compromise

Host Attributes

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

12

Indications of Compromise Leverages correlation of multiple event types, such as: • Impact 1 & 2 events • CNC connection events (IPS) • Compromise events (IPS)

• Security Intelligence Events • AMP for Endpoint Events • AMP for Network • Includes some file events • Built in Cisco correlation rules Goal: 1. FIX THIS NOW 2. What needs to be fixed 3. How to fix BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

13

What makes an Intrusion Event •

(state established)

Structure and Content Testing

Snort® rules use variables to determine “directionality” • $EXTERNAL_NET -> $HOME_NET (inbound) • $HOME_NET -> $EXTERNAL_NET (outbound) • TCP based events from the Snort® Engine are based on ESTABLISHED sessions • Reduces false positives ★ IPS events are generated when sessions ARE THROUGH the perimeter

What makes a Host Profile • • • •

TCP request responds map to Server Port UDP request sent map to Server Port

Passive data collection (network packet analysis) “State” table based on Discovery Events Server Services: TCP based respond to connections UDP based initiate UDP packets Applications (generally TCP) detected during session initiation from host.

Understanding directionality is key to Impact Flags BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

14

The Host Profile: End Point Context Applications

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

15

Understanding Impact Flags Intrusion Events Source / Destination IP

Impact Flag Action

Host Profile [Outside Profile Range] [Host not yet profiled]

Protocol (TCP/UDP) Source / Destination Port

Previously unseen host within monitored network

3

Good information event may not have connected

Relevant port not open or protocol not in use

2

Worth investigation. Host exposed.

Relevant port or protocol in use but no vuln mapped

1

Act immediately. Host vulnerable or compromised.

Host vulnerable to attack or showing an IOC.

CVE

Client / Server Apps Operating System

IOC: Predefined Impact

4

Good information host is currently not known

Client Side Ports

Services

Snort ID

Event occurred outside profiled networks

Protocols Server Side Ports

Service

0

General info†† Event outside profiled networks

IP Address User IDs

Potential Vulnerabilities

††

BRKSEC-2058

Why

If you have a fully profiled network this may be a critical event!

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

16

Unique Events: Correlation & White List Events FMC Events

Discovery Events

Correlation Rules

Host Profile Changes

Correlation Events

White List Events

Correlation Events: Internal events based on boolean conditions within and across multiple event databases within the FMC. [Tip: Correlation Rules can monitor changes in flow!]

White List Events: Internal events based on changes to individual or grouped host Profiles First step in creating automated response!

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

17

Walking through a breach Introduction

Understanding Events

Walking the Breach

Security Automation

Reporting

➥ Recommended Rules ➥ Workflows ➥ Custom Tables ➥ Correlation Rules ➥ Remediation API

➥ The Dashboard

Close

Stages of Incident Handling SANS Institute

Preparation

Identification

Containment

Eradication

BRKSEC-2058

Recovery

Lessons Learned

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

19

Stages of Incident Handling SANS Institute

Preparation

Containment

Eradication

Recovery

Lessons Learned

• Decide on which events to focus on first Identification

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

20

Stages of Incident Handling SANS Institute

Preparation

Containment

Eradication

Recovery

Lessons Learned

• Decide on which events to focus on first • Drill into a specific event Identification

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

21

Stages of Incident Handling SANS Institute

Preparation

Containment

Identification

Eradication

Recovery

Lessons Learned

• Decide on which events to focus on first • Drill into a specific event • Validate the breach • Leverage documentation • Leverage additional forensics

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

22

Stages of Incident Handling SANS Institute

Preparation

Containment

Identification

Eradication

Recovery

Lessons Learned

• Decide on which events to focus on first • Drill into a specific event • Validate the breach • Leverage documentation • Leverage additional forensics • Explore your remediation options

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

23

Stages of Incident Handling SANS Institute

Preparation

Containment

Identification

Eradication

Recovery

Lessons Learned

• Decide on which events to focus on first • Drill into a specific event • Validate the breach • Leverage documentation • Leverage additional forensics • Explore your remediation options • Remediate

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

24

Stages of Incident Handling SANS Institute

Preparation

Containment

Identification

Eradication

Recovery

Lessons Learned

• Decide on which events to focus on first • Drill into a specific event • Validate the breach • Leverage documentation • Leverage additional forensics • Explore your remediation options • Remediate • Automate as many decisions or actions as possible. BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

25

Order of Investigation†

Goal: Getting to Remediation

Remediation – Incident Response – Data Collection You’ve been Owned! Indication of Compromise

Under Attack Impact 0

Impact 1

Research & Tuning Impact 3 (then 2) Impact 4

“Critical Assets” Not Blocked

Internal Source External Source Dropped

Correlation Rules †may

vary based on corporate priority BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

26

POP QUIZ: Where do I start my Investigation?

From the FMC Context Explorer

From the FMC Dashboard BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

27

This is what most of our networks look like.

Some ways to choose • • • • • • •

Look for Malware Executed (Endpoint AMP) Dropper Infection (Endpoint AMP) Threat detected in file transfer CNC Connected Events Shell Code Executed Impact 1 (these were probably blocked) Impact 2 (these were probably blocked) THEME: Start with what is compromised first.

From the FMC Context Explorer

Let’s see what these 63 events are all about.

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

28

Drilling into the IOC

Busy event. Looks like we’re getting more.

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

29

Digging into the IOC

Seems active across 6 hosts. Let’s drill into one. BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

30

Looks like Kim Ralls has a lot going on her Windows host.

✔ ✔ ✔ ✔ Events from multiple sources: • IPS Engine • File Protection • AMP for Networks

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

32

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

33

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

34

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

35

• • • • • BRKSEC-2058

.147 Tried to send the file 5 times .147 was sent the file once IPS blocked it! (yeah) What does Impact 4 mean? Should we investigate more?

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

36

Did you forget about these? Let’s see if that file moved around without the IPS seeing it.



✔ ✔ ✔

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Yep. That file is malware

We see it in the malware summary, too.

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

38

BRKSEC-2058



A lot more than the 6 file transfers and hosts the IPS engine stopped.



Good thing they have AMP for Endpoints, too.



Bet they wished they enabled quarantining.



Problem scoped. Time to remediate.



Maybe a good time to look at file analysis / Threatgrid to learn what other artifacts are left behind.

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

39

Take Away Be sure to look at every angle around an event. Try to tell the whole story and find every part of the issue.

BRKSEC-2058



A lot more than the 6 file transfers and hosts the IPS engine stopped.



Good thing they have AMP for Endpoints, too.



Bet they wished they enabled quarantining.



Problem scoped. Time to remediate.



Maybe a good time to look at file analysis / Threatgrid to learn what other artifacts are left behind.

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

40

Looking at an Impact 3 Attempt

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

41

Looking at an Impact 3 Attempt

• Source IP: all internal,

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

42

Looking at an Impact 3 Attempt

• Source IP: all internal, • Destination IP: all external

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

43

Looking at an Impact 3 Attempt

• Source IP: all internal, • Destination IP: all external • Impact 3: no Host Profiles for external hosts

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

44

Looking at an Impact 3 Attempt

• • • •

Source IP: all internal, Destination IP: all external Impact 3: no Host Profiles for external hosts Sourced from my Network = I’m the attacker? = Indication of Compromise

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

45

Looking at an Impact 3 Attempt

• • • • •

Source IP: all internal, Destination IP: all external Impact 3: no Host Profiles for external hosts Sourced from my Network = I’m the attacker? = Indication of Compromise TCP detection: means established connection

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

46

Looking at an Impact 3 Attempt

• • • • •

Source IP: all internal, Destination IP: all external Impact 3: no Host Profiles for external hosts Sourced from my Network = I’m the attacker? = Indication of Compromise TCP detection: means established connection • These hosts definitely “launched” an attack.

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

47

Looking at an Impact 3 Attempt

• • • • •

Source IP: all internal, Destination IP: all external Impact 3: no Host Profiles for external hosts Sourced from my Network = I’m the attacker? = Indication of Compromise TCP detection: means established connection • These hosts definitely “launched” an attack. • Next Step: Focus on the Source Host. Probably compromised. BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

48

Looking at an Impact 3 Attempt

• • • • •

Source IP: all internal, Destination IP: all external Impact 3: no Host Profiles for external hosts Sourced from my Network = I’m the attacker? = Indication of Compromise TCP detection: means established connection • These hosts definitely “launched” an attack. • Next Step: Focus on the Source Host. Probably compromised. BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

49

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Assessment: This has has to be stopped!

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Breached? Follow an Order of Operations Multiple Event Vectors

Mission/Op Critical

IPS, Malware, Connection, File, Trajectory, DNS,

Context

Correlation IOCs, Impact Flags

Check all the related data.

Event Directionality

Protocol: TCP / UDP?

Leverage Rule Documentation

“See the big story” : Packet not always necessary Build a complete timeline – tell a story. BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

52

Automating Security Work Introduction

Understanding Events

Walking the Breach

Security Automation

Reporting

➥ Recommended Rules ➥ Workflows ➥ Custom Tables ➥ Correlation Rules ➥ Remediation API

➥ The Dashboard

Close

Recommended Rules Introduction

Understanding Events

Walking the Breach

Security Automation

Reporting

➥ Recommended Rules ➥ Workflows ➥ Custom Tables ➥ Correlation Rules ➥ Remediation API

➥ The Dashboard

Close

False Negatives ensure your NOT protected Too many exploits succeed because: • Systems aren’t patched • Detections aren’t enabled Attackers succeed with “old” exploits Verizon Data Breach Report(s) Cisco Annual Security Report(s)

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

55

False Negatives ensure your NOT protected Too many exploits succeed because: • Systems aren’t patched • Detections aren’t enabled Attackers succeed with “old” exploits Verizon Data Breach Report(s) Cisco Annual Security Report(s)

Cause

Resolution

Event Overload!

Impact Analysis

Tuning Failures

Understanding Detection Tools

Detections Disabled

Knowing What Needs Protection

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

56

False Negatives ensure your NOT protected Too many exploits succeed because: • Systems aren’t patched • Detections aren’t enabled Attackers succeed with “old” exploits Verizon Data Breach Report(s) Cisco Annual Security Report(s)

Cause

Resolution

Event Overload!

Impact Analysis

Tuning Failures

Understanding Detection Tools

Detections Disabled

Knowing What Needs Protection

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

57

False Negatives ensure your NOT protected Too many exploits succeed because: • Systems aren’t patched • Detections aren’t enabled Attackers succeed with “old” exploits Verizon Data Breach Report(s) Cisco Annual Security Report(s)

Cause

Resolution

Event Overload!

Impact Analysis

Tuning Failures

Understanding Detection Tools

Detections Disabled

Knowing What Needs Protection

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

58

Firepower Recommendations Knows what I Do Not

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

59

Recommended Rules – How it works Snort Rules SID: 24671, 32361 Integer Overflow in Windows

SVID

Possible Vuln CVE:2012-1528

99675

Remotely exploitable vulnerability

Remote exploit

SID: 33306 BLACKLIST: Connection to a malware sinkhole.

Detection of behavior that comes from a compromised host or one that is about to be compromised.

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

60

Recommended Rules – the details alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"BROWSER-IE ActiveX installer broker object sandbox escape attempt"; flow:to_server,established; flowbits:isset,file.exe; file_data; content:"|55 8B EC 6A FF 68 A8 31 01 10 64 A1 00 00 00 00 50 83 EC 0C A1 20 B0 01 10 33 C5 89 45 F0 56 50|"; fast_pattern:only; metadata:policy balanced-ips drop, policy security-ips drop, service smtp; Not reference:cve,2014-4123; reference:url,technet.microsoft.com/enus/security/bulletin/ms14-056; classtype:attempted-user; sid:32265; rev:1; )

Rule that will map to Recommended Rules

all rules have a CVE!

alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"BLACKLIST Connection to malware sinkhole"; flow:to_client,established; dsize:22; content:"Sinkholed by abuse.ch|0A|"; fast_pattern:only; metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop, service http; reference:url,en.wikipedia.org/wiki/Sinkhole_Server; classtype:trojan-activity; sid:33306; rev:1; )

Rules disabling by default

Some rules will turned off by Recommended Rules

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

61

Recommended Rules alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"BROWSER-IE ActiveX installer broker object sandbox escape attempt"; flow:to_server,established; flowbits:isset,file.exe; file_data; content:"|55 8B EC 6A FF 68 A8 31 01 10 64 A1 00 00 00 00 50 83 EC 0C A1 20 B0 01 10 33 C5 89 45 F0 56 50|"; fast_pattern:only; metadata:policy balanced-ips drop, policy security-ips drop, service smtp; reference:cve,2014-4123; reference:url,technet.microsoft.com/enus/security/bulletin/ms14-056; classtype:attempted-user; sid:32265; rev:1; )

Rule that will map to Recommended Rules alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"BLACKLIST Connection to malware sinkhole"; flow:to_client,established; dsize:22; content:"Sinkholed by abuse.ch|0A|"; fast_pattern:only; metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop, service http; reference:url,en.wikipedia.org/wiki/Sinkhole_Server; classtype:trojan-activity; sid:33306; rev:1; )

Some rules will ALWAYS be turned off by Recommended Rules

You may want to uncheck this. BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

62

Correlation Rules Introduction

Understanding Events

Walking the Breach

Security Automation

Reporting

➥ Recommended Rules ➥ Workflows ➥ Custom Tables ➥ Correlation Rules ➥ Remediation API

➥ The Dashboard

Close

Correlation Rules / Correlation Policy 100,000 events

5,000 events 500 events

Correlation Rules allow for BOOLEAN decisions on one or more sets of data within the Firepower console. Rules can then lead to Actions such as: Email, Syslog, SNMP events or remediation actions.

100 events

Correlation Policy

20 events

10 events

Correlation Rule

Correlation Event

Correlation Rule

Action

Email Syslog SNMP Remediation Module

3 Events © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Correlation Rules / Correlation Policy Value:

• Automate Security Decisions • Track Business Outcome • Trigger Automated Response to specific conditions

100,000 events

5,000 events 500 events

Correlation Rules allow for BOOLEAN decisions on one or more sets of data within the Firepower console. Rules can then lead to Actions such as: Email, Syslog, SNMP events or remediation actions.

100 events

Correlation Policy

20 events

10 events

Correlation Rule

Correlation Event

Correlation Rule

Action

Email Syslog SNMP Remediation Module

3 Events © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Correlation Rules go into Correlation Policies

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Building a Correlation Rule

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

67

Sample Correlation Rule Correlation Rule to: • Ensure only HTTPS traffic is used on port 443

• Ensure traffic is initiated by a Host within a defined Location (host Attribute) is POS • Ensure the HTTPS traffic from the POS host is received on hosts in the PCI network. • Any traffic outside this profile will generate an event.

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Correlation Rule example: Production Network Change

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

example: Production Network Change is exfiltrating traffic

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Some Correlations Rules To Drive Action If “an Intrusion Event occurs”. . . O Impact Flag is 3 - Yellow R Impact Flag is 4 - Blue

If “a Malware Event occurs” “by retrospective network-based malware detection” Sending IP is in 192.168.0.0/16

O Sending IP is in 10.0.0.0/8 R

Source IP is in 192.168.0.0/16

A N D

O Source IP is in 10.0.0.0/8 R

Source IP is in 172.16.0.0/12 Destination IP is not in 192.168.0.0/16

O Destination IP is not in 10.0.0.0/8 R

Destination IP is not in 172.16.0.0/12

You have a compromised host “attacking” systems off your network.

O R

Sending IP is in 172.16.0.0/12 Receiving IP is in 192.168.0.0/16

O Receiving IP is in 10.0.0.0/8 R

Receiving IP is in 172.16.0.0/12

A recently seen file has been retrospectively determined to be malware! Go Stop it NOW!

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

71

Some Correlations Rules To Drive Action Make it even more actionable based on the file TYPE

If “a Malware Event occurs” “by retrospective network-based malware detection” Sending IP is in 192.168.0.0/16

O Sending IP is in 10.0.0.0/8 R O R

Sending IP is in 172.16.0.0/12 Receiving IP is in 192.168.0.0/16

O Receiving IP is in 10.0.0.0/8 R

Receiving IP is in 172.16.0.0/12

A recently seen file has been retrospectively determined to be malware! Go Stop it NOW! Just add another Boolean Condition

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

72

Remediation API Introduction

Understanding Events

Walking the Breach

Security Automation

Reporting

➥ Recommended Rules ➥ Workflows ➥ Custom Tables ➥ Correlation Rules ➥ Remediation API

➥ The Dashboard

Close

Grand Vision for Integration & Firepower Management

Firepower

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

74

Automating Response – Remediation API Intrusion Events Discovery Events User Activity Host Inputs Connection Events Traffic Profiles Malware Event

Correlation Policies Boolean Conditions

Correlation Rules

Correlation Rules

Actions (API, Email, SNMP)

Correlation Events

Sample Remediation Modules • Cisco ISE (pxGrid Mitigation) • Guidance Encase • Set Host Attributes • Security Intelligence Blacklisting • Nmap Scan • SSH / Expect Scripts • F5 iRules • Solera DeepSee • Netscaler • PacketFence • Bradford BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

75

ISE + Firepower = Rapid Threat Containment WWW

4. Endpoint Assigned Quarantine + CoA-Reauth Sent

Controller

NGFW

3. pxGrid EPS Action: Quarantine + Re-Auth

1. Security Events / IOCs Reported

FMC

i-Net

MnT

2. Correlation Rules Trigger Remediation Action

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Configure Rapid Threat Containment

Open the System:Integration page Enter ISE Server details ise-1.mynet.com ise-2.mynet.com

Be sure to configure your certs for the integration

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

77

Configure Rapid Threat Containment

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Configure Rapid Threat Containment

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Configure Rapid Threat Containment

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Configure Rapid Threat Containment

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Configure Rapid Threat Containment

Notice your ISE mitigation actions!

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Configure Rapid Threat Containment

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Configure Rapid Threat Containment

Be sure to assign the action to a Correlation Rule within a Correlation Policy

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

84

Other ”Tools" in the Firepower Toolkit Event Analysis Toolset White Listing

Correlation tool to monitor for host profile changes

Traffic Profiling

Monitor behavioral changes in traffic conditions

Programmatic Interfaces Estreamer API

Transmit all event data to an external repository (SEIM, event log, edge)

Host Input API

Insert data into Host Profiles from external data sources

Remediation API

Programmatically initiate actions on external systems.

JDBC Connector

Directly query FMC database (reporting, SEIM queries, etc)

REST API

REST interface for FMC query, configuration, and NEW! BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

85

Reporting Matters Introduction

Understanding Events

Walking the Breach

Security Automation

Reporting

➥ Recommended Rules ➥ Workflows ➥ Custom Tables ➥ Correlation Rules ➥ Remediation API

➥ The Dashboard

Close

Default Reports 

Not just what’s in the templates



Dashboard widgets are “mini”-reports



Over 120 preset reports within a widget



Create custom Widgets for more



Think of the Dashboard as your unlimited report designer.



Tools: 

 

Searches Custom Workflows Custom Tables = Data goldmine

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

87

Event Viewing

Tables Workflows Filters Custom Tables

• Listing of events with a data set (IPS, Connection, Malware, etc.)

• Customized organization of specific column headers • Allows Analysts to go straight to meaningful data • • • •

Search for specific or generalized matches within event tables Each table can have it’s own filters Hundreds of filters pre-installed Customizable

• Join of two or more individual event tables • Aggregate useful data for faster decision making and reporting • Has it’s own Workflows and Filters

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

88

Workflows Introduction

Understanding Events

Walking the Breach

Security Automation

Reporting

➥ Recommended Rules ➥ Workflows ➥ Custom Tables ➥ Correlation Rules ➥ Remediation API

➥ The Dashboard

Close

A Default Event View

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

90

A Default View

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

91

Changing the view helps focus analysis

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

92

Create a Custom Workflow

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Create a Custom Workflow

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

How it turned out

Build on your order of investigation

Actionable Data: Hosts .52, .56, and .111 need to be investigated!

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Custom Tables Introduction

Understanding Events

Walking the Breach

Security Automation

Reporting

➥ Recommended Rules ➥ Workflows ➥ Custom Tables ➥ Correlation Rules ➥ Remediation API

➥ The Dashboard

Close

Building Custom Tables 

Intrusion Events

Have all the data you need immediately in one view.

BRKSEC-2058

Host Data

Custom View

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

97

Custom Table: Intrusion Event with Host Data

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

98

Custom Table: Intrusion Event with Host Data

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

99

Custom Table: Intrusion Event with Host Data Custom tables can even have their own workflows

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

100

Custom Table: Intrusion Event with Host Data

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

101

Custom Table: Intrusion Event with Host Data

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

102

Custom Table: Includes Custom Filters

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

103

Custom Table: Includes Custom Filters

Tables, Custom Tables, and Filters can also be leveraged on the Dashboard. Just choose the 1 column that is most meaningful.

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

104

Uses for Tables (standard & custom) and Workflows •

Having more relevant data on hand when doing event analysis and forensics



Reducing the “number” of clicks to drill into meaningful data



Customize prioritization based on local business and security drivers



Speed new threat discovery / hunting



Combined with Filters allow you to segment information into meaningful chunks, such as: • • •

Device functionality Network Zone Operating System

• • •

• • •

Users / Groups Country Threat Type

Activity / Behavior Trends? What changed? What’s new?

Valuable in customizing your dashboard, building reports, documenting compliance. Let the business need feed your creativity. BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

105

Examples of possible data to report Security

Operations

Compliance

• • • •



• • • • •

Specific Threats experienced Automated Remediations OS’s most compromised App Threat Root Cause

• • •

New systems on the network New services or applications in use Changes in network behavior OS data

PCI, NERC CIP, HIPPA… OS Usage User/Group Access behavior App segmentation Hosts in violation of corporate policy

Expanding your reporting to drive business efficiency creates a stronger security practice.

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

106

Interesting Data for Filtering Potential ”new” Threat List Int. Source IP

List Ext. Source IP

List Int. Source IP

List Int. Source IP

Threat Destinations

Top File Sources

Executable Exfil

Odd URLs

Internal IPs that send files to External Address (esp. exe, jar, pdf, doc, archive, etc.)

Internal IPs connecting to URL Categories “of concern”

Top Sec Int. Events with external Dest. IP

Top External Source IPs for files

List Int. Source IP

List Int. Source IP

DNS

Bad SSL

Internal IPs generating DNS Sinkhole Events

Internal IPs using invalid SSL Certs to external IP

List Int. Source IP Retrospective

Internal IP addresses Associated with Retrospective Malware

List Int. Source IP Correlation Events Internal IPs sourcing Correlation Events

Processes Introducing Malware (prebuilt in FMC, requires AMP 4 Endpoints)

Invalid App Usage Internal IPs using Apps on nonstandard protocols

* Create Correlation Rules * Leverage Open AppID © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

107

Leveraging the Dashboard Introduction

Understanding Events

Walking the Breach

Security Automation

Reporting

➥ Recommended Rules ➥ Workflows ➥ Custom Tables ➥ Correlation Rules ➥ Remediation API

➥ The Dashboard

Close

Customize The Dashboard 

There are a number of default dashboards



All of them have customizable widgets



Create / Customize your own for better visibility and report designs

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

109

Customize The Dashboard

This is your most powerful widget

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

110

Dashboards That Meet Your Needs

Threat Focused

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Dashboards That Meet Your Needs

Network Focused

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

112

Build Reports Straight from the Dashboard

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

113

Or Import Dashboards With the Report Builder

Import Sections from Dashboards, Summaries, and Workflows

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

114

Closing Introduction

Understanding Events

Walking the Breach

Security Automation

Reporting

➥ Recommended Rules ➥ Workflows ➥ Custom Tables ➥ Correlation Rules ➥ Remediation API

➥ The Dashboard

Close

Key Takeaways By now you hopefully: •

Have a better understanding of how automated event analysis happens •

Impact Flags & Indications of Compromise (IOCs).



Have a better strategy for examining a security breach.



Be able to leverage correlation policies and system APIs to create meaningful security automation.



Understand the full breadth of reporting capabilities to support BOTH security and business interests for your enterprise. Introduction

Understanding Events

Walking the Breach

Security Automation

Reporting

Close

➥ Recommended Rules ➥ Workflows ➥ Custom Tables ➥ Correlation Rules ➥ Remediation API BRKSEC-2058

➥ The Dashboard

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

116

Complete Your Online Session Evaluation •

Please complete your Online Session Evaluations after each session



Complete 4 Session Evaluations & the Overall Conference Evaluation (available from Thursday) to receive your Cisco Live T-shirt



All surveys can be completed via the Cisco Live Mobile App or the Communication Stations

Please leave comments!

Don’t forget: Cisco Live sessions will be available for viewing on-demand after the event at CiscoLive.com/Online

(and your email if you want a response) BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

117

Continue Your Education •

Demos in the Cisco campus



Walk-in Self-Paced Labs



Lunch & Learn



Meet the Engineer 1:1 meetings



Related sessions

Presentation ID

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

118

Call to Action •

Firepower Management Center can be the center of your security operations.



Look at FMC as security automation framework.



FMC’s real value is in how it can merge security operations and business outcome.



Look for cross product integration to strengthen FMC’s value.



Be creative in creating solutions. Look beyond “IPS” or “Threat Protection” opportunities.



The more you understand about your organization’s security practices and business outcome needs, the more you’ll find you can deliver with Firepower Management Center.



Check out Firepower more at the World of Solutions! What can you make it do?!

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

119

Thank You

And remember to fill out your surveys!

Reference Slides

(Reference)

Event Source to Event Type Engine

Policy

Event Type

L3 - IP

IP Reputation Pre-Processor

Security Intelligence (Access Control Policy)

Security Intelligence Events

L2 – L7

Intrusion Prevention (Snort®)

Intrusion Policy

Intrusion Events

L2 – L7

Network Discovery

Network Discovery Policy

Discovery Events, User Activity, Connection Events, Host Profiles, Servers, Applications, Vulnerabilities

L3

DNS Sinkhole Processor

DNS Policy

Connection Events

File

File Detection Processor

File Policy

File Events

L3-L7

SSL

SSL Policy

Connection Events

L4-L7

Application Detection (AppID)

Network Discovery Policy / Access Control Policy

Application Detail Events

L4-L7

URL Filter

Access Control Policy

Connection Events

Files

Advanced Malware Protection (AMP) (Sandbox, Cloud Lookup)

File Policy

Malware Events, File Trajectory

BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

123

(Reference)

Event Sources to Events Source / Event Table Security Intelligence

Security Intelligence

Connection

Intrusion

Detection

File

Malware

User

✔ ✔

Normalization Pre-Processors SSL Decryption



App Detection



App Control



Network Detection



✔ ✔ ✔

Non-Auth User Act.

✔ ✔

User Activity from AD



URL Filter



File Detection AMP Engine



AMP Endpoint Cloud

✔ ✔

Sort® (IPS) “Reference Data” Geo IP Db

























URL Rep Db User Db (from AD)







BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

124

(Reference)

Correlating Event Data Flow and connection conditions over time or volume.

Data from User Table (name, group info, etc)

Data from Host Profiles

When a… Intrusion Event Discovery Event

Connection Event Host Input Event User Activity Occurs

✔ ✔ ✔ ✔ ✔

✔ ✔ ✔ ✔

✔ ✔ ✔ ✔ ✔

Traffic Profile Changes Malware Event BRKSEC-2058

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

125

(reference)

Custom Table Matrix Applicatio n Details

Applications

Application Details





Applications



Connection Events





Connection Events





Connection Summary



Correlation Events



Discovery Events



Connection Summary



Correlation Events



Discovery Events

Host Attributes

Hosts

Indications of Compromise













































✔ ✔

Intrusion Events

Sec. Int. Events

Servers

White List Events









Host Attributes



























Hosts



























Indications of Compromise





























Intrusion Events









Sec. Int. Events









Servers









White List Events













BRKSEC-2058



✔ ✔







© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public



126