Preface | p. xi |
Getting Started | p. 1 |
A Rapidly Changing Threat Landscape | p. 3 |
Failure of Antivirus Software | p. 4 |
Why Monitor? | p. 5 |
The Miscreant Economy and Organized Crime | p. 6 |
Insider Threats | p. 6 |
Challenges to Monitoring | p. 7 |
Vendor Promises | p. 7 |
Operational Realities | p. 7 |
Volume | p. 8 |
Privacy Concerns | p. 8 |
Outsourcing Your Security Monitoring | p. 8 |
Monitoring to Minimize Risk | p. 9 |
Policy-Based Monitoring | p. 9 |
Why Should This Work for You? | p. 9 |
Open Source Versus Commercial Products | p. 9 |
Introducing Blanco Wireless | p. 10 |
Implement Policies for Monitoring | p. 11 |
Blacklist Monitoring | p. 12 |
Anomaly Monitoring | p. 16 |
Policy Monitoring | p. 16 |
Monitoring Against Defined Policies | p. 17 |
Management Enforcement | p. 18 |
Types of Policies | p. 18 |
Regulatory Compliance Policies | p. 19 |
Employee Policies | p. 24 |
Policies for Blanco Wireless | p. 28 |
Policies | p. 29 |
Implementing Monitoring Based on Policies | p. 30 |
Conclusion | p. 31 |
Know Your Network | p. 33 |
Network Taxonomy | p. 33 |
Network Type Classification | p. 34 |
IP Address Management Data | p. 37 |
Network Telemetry | p. 40 |
NetFlow | p. 40 |
SNMP | p. 55 |
Routing and Network Topologies | p. 56 |
The Blanco Wireless Network | p. 57 |
IP Address Assignment | p. 57 |
NetFlow Collection | p. 57 |
Routing Information | p. 58 |
Conclusion | p. 58 |
Select Targets for Monitoring | p. 61 |
Methods for Selecting Targets | p. 62 |
Business Impact Analysis | p. 63 |
Revenue Impact Analysis | p. 64 |
Expense Impact Analysis | p. 64 |
Legal Requirements | p. 65 |
Sensitivity Profile | p. 67 |
Risk Profile | p. 69 |
Visibility Profile | p. 74 |
Practical Considerations for Selecting Targets | p. 75 |
Recommended Monitoring Targets | p. 77 |
Choosing Components Within Monitoring Targets | p. 78 |
Example: ERP System | p. 78 |
Gathering Component Details for Event Feeds | p. 79 |
Blanco Wireless: Selecting Targets for Monitoring | p. 81 |
Components to Monitor | p. 82 |
Conclusion | p. 83 |
Choose Event Sources | p. 85 |
Event Source Purpose | p. 85 |
Event Collection Methods | p. 87 |
Event Collection Impact | p. 89 |
Choosing Event Sources for Blanco Wireless | p. 99 |
Conclusion | p. 100 |
Feed and Tune | p. 101 |
Network Intrusion Detection Systems | p. 101 |
Packet Analysis and Alerting | p. 102 |
Network Intrusion Prevention Systems | p. 102 |
Intrusion Detection or Intrusion Prevention? | p. 103 |
NIDS Deployment Framework | p. 108 |
Analyze | p. 108 |
Design | p. 110 |
Deploy | p. 114 |
Tune and Manage | p. 116 |
System Logging | p. 121 |
Key Syslog Events | p. 124 |
Syslog Templates | p. 126 |
Key Windows Log Events | p. 127 |
Application Logging | p. 132 |
Database Logging | p. 133 |
Collecting Syslog | p. 136 |
NetFlow | p. 139 |
OSU flow-tools NetFlow Capture Filtering | p. 141 |
OSU flow-tools flow-fanout | p. 142 |
Blanco's Security Alert Sources | p. 143 |
NIDS | p. 143 |
Syslog | p. 145 |
Apache Logs | p. 145 |
Database Logs | p. 146 |
Antivirus and HIDS Logs | p. 146 |
Network Device Logs | p. 146 |
NetFlow | p. 146 |
Conclusion | p. 146 |
Maintain Dependable Event Sources | p. 147 |
Maintain Device Configurations | p. 149 |
Create Service Level Agreements | p. 149 |
Back It Up with Policy | p. 150 |
SLA Sections | p. 151 |
Automated Configuration Management | p. 152 |
Monitor the Monitors | p. 153 |
Monitor System Health | p. 154 |
Monitor the NIDS | p. 155 |
Monitor Network Flow Collection | p. 157 |
Monitor Event Log Collectors | p. 161 |
Monitor Databases | p. 164 |
Monitor Oracle | p. 164 |
Monitor MySQL Servers | p. 166 |
Automated System Monitoring | p. 167 |
Traditional Network Monitoring and Management Systems | p. 167 |
How to Monitor the Monitors | p. 169 |
Monitoring with Nagios | p. 170 |
System Monitoring for Blanco Wireless | p. 172 |
Monitor NetFlow Collection | p. 172 |
Monitor Collector Health | p. 172 |
Monitor Collection Processes | p. 174 |
Monitor Flows from Gateway Routers | p. 174 |
Monitor Event Log Collection | p. 175 |
Monitor NIDS | p. 176 |
Monitor Oracle Logging | p. 179 |
Monitor Antivirus/HIDS Logging | p. 179 |
Conclusion | p. 179 |
Conclusion: Keeping it Real | p. 181 |
What Can Go Wrong | p. 182 |
Create Policy | p. 182 |
Know Your Network | p. 184 |
Choose Targets for Security Monitoring | p. 185 |
Choose Event Sources | p. 186 |
Feed and Tune | p. 186 |
Maintain Dependable Event Sources | p. 188 |
Case Studies | p. 189 |
KPN-CERT | p. 189 |
Northrop Grumman | p. 192 |
Real Stories of the CSIRT | p. 194 |
Stolen Intellectual Property | p. 194 |
Targeted Attack Against Employees | p. 195 |
Bare Minimum Requirements | p. 196 |
Policy | p. 196 |
Know the Network | p. 197 |
Select Targets for Effective Monitoring | p. 198 |
Choose Event Sources | p. 198 |
Feed and Tune | p. 199 |
Maintain Dependable Event Sources | p. 200 |
Conclusion | p. 201 |
Detailed OSU flow-tools Collector Setup | p. 203 |
SLA Template | p. 207 |
Calculating Availability | p. 211 |
Index | p. 215 |
Table of Contents provided by Ingram. All Rights Reserved. |