Vous êtes sur la page 1sur 4

Mircea cel Batran Naval Academy Scientific Bulletin, Volume XIX 2016 Issue 2

The journal is indexed in: PROQUEST / DOAJ / Crossref / EBSCOhost / INDEX COPERNICUS / DRJI / OAJI /
JOURNAL INDEX / I2OR / SCIENCE LIBRARY INDEX / Google Scholar / Academic Keys/ ROAD Open Access /
Academic Resources / Scientific Indexing Services / SCIPIO / JIFACTOR

SIEM (SECURITY INFORMATION AND EVENT MANAGEMENT SOLUTIONS)


IMPLEMENTATIONS IN PRIVATE OR PUBLIC CLOUDS
1
Vlad-Mihai COTENESCU
1
Eng. Military Technical Academy, Bucharest, Romania

Abstract: The underlying principle of a SIEM system is that relevant data about an enterprises security is
produced in multiple locations and being able to look at all the data from a single point of view makes it
easier to spot trends and see patterns that are out of the ordinary.
Todays security threats are dynamic in nature and exploits are constantly evolving. Attackers grow more
organized, precise and persistent and have access to various automated tools that can trigger very
sophisticated attacks. As threatsand security events evolve, SIEM vendors and the information
securitycommunity must work together to build relevant and actionable businessanalytics into their systems.
By continuously improving recommendationsand the controls to support those recommendations, SIEM
products canbecome true information security hubs that not only automate audits butalso provide proactive
means to protect the organization. SIEMtechnologies for centralization and consolidation of an
organizationssecurity data will continue to be important investments for organizationswanting to accurately
respond to threats and ultimately improve their riskand compliance postures.
In the field of computer security, security information and event management (SIEM) software products and
services combine security information management (SIM) and security event management (SEM). They
provide real-time analysis of security alerts generated by network hardware and applications.

Introduction:
Security Information and Event Management This plentitude of data needs to be normalized
Solutions have been around since the year 2000 and correlated in order to become meaningful and
and have continuously to keep up with the rapid actionable.
change in public and private technology-based Security Information and Event Management
environments. With the increase in processing (SIEM) and Log Management tools have emerged
resources and the evolution in network speed and to address these needsand continue to generate a
storage capabilities the need to support devices tremendous amount of interest in the market,
evolved in different form factors, many of which IT given the compelling use cases for
doesnt directly control. Organizations add new thetechnologies.
applications on a monthly basis in public or private Hypothesis:
cloud environments and leverage virtualization Historically, SIEM consisted of twodistinct
technologies and SaaS for increased efficiency. In offerings: SEM (security event management),
current days IT and information security which collected, aggregated and acted upon
professionals are expected to provide, with much security events; andSIM (security information
less control, access anywhere while maintaining management), which correlated, normalized and
accountability, confidentiality and integrity of the reported on the collected security event data.
data. These days integrated SIEM platforms provide
If that wasnt enough, bad things are happening near real-time monitoring of network and security
much faster. Not only are our businesses always devices, with the idea ofidentifying the root causes
on, the attackers donttake breaks, ever. New of security incidents and collecting useful data for
exploits are discovered, weaponized, and compliance reporting. Most end usersbelieve the
distributed to the world within hours. So we need technology is at best a hassle and at worst an
tobe constantly vigilant and we dont have much abject failure. SIEM is widely regarded as too
time to figure out whats under attack and how to complex, and tooslow to implement, without
protect ourselves beforethe damage is done. providing enough customer value to justify the
Compound these 24/7 demands with the addition investment.
of new devices implemented to deal with While SIM & SEM products focused on
newthreats. Every device, service, and application aggregation and analysis of security information,
stream zillions of log files, events, and alerts. Log Management platformswere designed within
The real issue is pretty straightforward: of all the a broader context of the collection and
things flashing at us every minute, we dont know management of any and all log files. Log
what is reallyimportant. We have too many data, Managementsolutions dont have the negative
but not enough information. perception of SIEM because they do what they
say they do: aggregate, parse, andindex logs.
397
DOI: 10.21279/1454-864X-16-I2-058
2015. This work is licensed under the Creative Commons Attribution-Noncommercial-Share Alike 4.0 License.
Mircea cel Batran Naval Academy Scientific Bulletin, Volume XIX 2016 Issue 2
The journal is indexed in: PROQUEST / DOAJ / Crossref / EBSCOhost / INDEX COPERNICUS / DRJI / OAJI /
JOURNAL INDEX / I2OR / SCIENCE LIBRARY INDEX / Google Scholar / Academic Keys/ ROAD Open Access /
Academic Resources / Scientific Indexing Services / SCIPIO / JIFACTOR

Log Management has helped get logs under Using IaaS or SaaS public clouds introduce a
control, but under-delivered on the opportunity to series of security and non-security concerns. One
derive value from thearchives. Once again: more of the biggest concern is that all the visibility in the
data, less information. Collection, aggregation, systems provisioned in the cloud is lost. In order
and reporting are enough to check thecompliance to mitigate this shortcoming,organizations need to
box, but not enough to impact security operations have the opportunity to either install or leverage
which is what organizations are really looking an existing vendor solution that offers features
for. Endusers want simple solutions that improve like:
security operations, while also checking the Log Aggregation Collection and
compliance box. aggregation of log records from the
In an organizations environment, depending on network, security, servers, databases,
its size, you might have devices ranging from the identity systems, and applications.
tens to maybe thousands that need to be Correlation Attack identification by
managed, monitored and constantly updated. analyzing multiple data sets from multiple
These devices can reside in a private cloud or devices to identify patterns not obvious
might be sitting in a public cloud that permits the when looking at only one data source.
rapid use of resources. To understand how these Alerting Defining rules and thresholds
environments work we would need to define their to display console alerts based on
core attributes: multitenancy (shared resources), customer-defined prioritization of risk
massive scalability, elasticity, pay as you go, and and/or asset value.
self-provisioning of resources. Dashboards An interface which
Multitenancy (shared resources): presents key security indicators to identify
Unlike previous computing models, which problem areas and facilitate
assumed dedicated resources (i.e., investigations.
computingfacilities dedicated to a single user or Forensics The ability to investigate
owner), cloud computing is based on a business incidents by indexing and searching
modelin which resources are shared (i.e., multiple relevant events.
users use the same resource) at the networklevel, Reporting Documentation of control
host level, and application level. sets and other relevant security
Massive scalability operations and compliance activities
Although organizations might have hundreds or There are different types of implementations of
thousands of systems, cloud computingprovides cloud computing technologies. These
the ability to scale to tens of thousands of technologies can be categorized depending on
systems, as well as the ability tomassively scale the limitations introduced when it comes to the
bandwidth and storage space. network and application management
Elasticity responsibilities.
Users can rapidly increase and decrease their In an IaaS model (see figure 1 for an architectural
computing resources as needed, as well diagram example)the vendor provides the entire
asrelease resources for other uses when they are infrastructure fora customer to run his
no longer required. applications. Often, this entails housing dedicated
Pay as you go hardware that ispurchased or leased for that
Users pay for only the resources they actually use specific application. The IaaS model also provides
and for only the time they require them. the infrastructureto run the applications, but the
Self-provisioning of resources cloud computing approach makes it possible to
Users self-provision resources, such as additional offer a pay-perusemodel and to scale the service
systems (processing capability, software,storage) depending on demand. From the IaaS providers
and network resources. perspective,it can build an infrastructure that
Interest in the cloud is growing because cloud handles the peaks and troughs of its customers
solutions provide users with access demandsand adds new capacity as the overall
tosupercomputer-like power at a fraction of the demand increases. Similarly, in a hosted
cost of buying such a solution outright. application model, the IaaS vendor can cover
Moreimportantly, these solutions can be acquired application hosting only, or can extend to other
on demand; the network becomes services (such asapplication support, application
thesupercomputer in the cloud where users can development, and enhancements) and can
buy what they need when they need it. support the mostcomprehensive outsourcing of IT.
Cloudcomputing identifies where scalable IT-
enabled capabilities are delivered as a service
tocustomers using Internet technologies.

398
DOI: 10.21279/1454-864X-16-I2-058
2015. This work is licensed under the Creative Commons Attribution-Noncommercial-Share Alike 4.0 License.
Mircea cel Batran Naval Academy Scientific Bulletin, Volume XIX 2016 Issue 2
The journal is indexed in: PROQUEST / DOAJ / Crossref / EBSCOhost / INDEX COPERNICUS / DRJI / OAJI /
JOURNAL INDEX / I2OR / SCIENCE LIBRARY INDEX / Google Scholar / Academic Keys/ ROAD Open Access /
Academic Resources / Scientific Indexing Services / SCIPIO / JIFACTOR

Fig. 2. SaaS Architecture

In all of these cloud implementations, we might


Fig.1 IaaS architecture have a multitude of applications or systems that
got migrated from the private cloud. For all these
In a SaaS model (see figure 2 for an architectural systems an organization needs to introduce some
diagram example), the customer does not sort of centralized monitoring that can be
purchase software, but rather rents it for use on achieved by standing up a cloud SIEM
asubscription or pay-per-use model (an aggregator. As seen in figure 3 an integration
operational expense, known as OpEx). In some between a public cloud SIEM solution and a
cases,the service is free for limited use. Typically, private cloud SIEM solution is essential. The role
the purchased service is complete from a of the cloud SIEM aggregator is to, as the name
hardware,software, and support perspective. The says, aggregate and normalize all the security and
user accesses the service through any authorized non-security events generated by the cloud
device. applications and servers. Once these event logs
In some cases, preparatory work is required to are being stored they need to be kept, depending
establish company-specific data for the serviceto on the organization need, a period ranging from 3
be fully used and potentially integrated with other to 12 months. The role of the aggregator is also to
applications that are not part of the SaaSplatform. convert the logs into a meaningful format that can
Key benefits of a SaaS model include the be processed by the private cloud solution.
following: All the logs that are being stored in the public
SaaS enables the organization to SIEM need to be forwarded via a one-way
outsource the hosting and management communication to the private cloud SIEM. Once
of applications to a third-party (software the data reaches the main, private SIEM solution
vendor and service provider) as a means then it can be correlated with the events
of reducing the cost of application generated by the on-premise/private cloud
software licensing, servers, and other infrastructure.
infrastructure and personnel required Edge
Router Firewall Firewall

tohost the application internally.


Applications delivery using the SaaS
Trust
TLS over 514/TCP DMZ Switch
Cloud SIEMs Internal
Switch Application
Servers

model typically uses the one-to-many Application Private Cloud


Servers E-mail Servers SIEM Internal
delivery approach, with the Web as the Directory
Servers

infrastructure. An end user can access a SIEM


External
Facing Web
External
Directory Internal Users
Servers
SaaS application via a web browser; Database Servers

some SaaS vendors provide their own SIEM


Database
Internal Web
Servers

interface that is designed tosupport


features that are unique to their Remote Users

applications. Fig. 3 Public/Private Cloud SIEM Architecture


SaaS enables software vendors to control
and limit use, prohibits copying and By having this integration of the environment the
distribution, and facilitates the control of organization will have a lot of benefits that include:
all derivative versions of their software. Easier ways to make sure you are
SaaS centralized control often allows the compliant with industry rules and
vendor or supplier to establish an ongoing regulations
revenue stream with multiple businesses Increased visibility into the public cloud
and users without preloading software in infrastructure
each device in anorganization.
399
DOI: 10.21279/1454-864X-16-I2-058
2015. This work is licensed under the Creative Commons Attribution-Noncommercial-Share Alike 4.0 License.
Mircea cel Batran Naval Academy Scientific Bulletin, Volume XIX 2016 Issue 2
The journal is indexed in: PROQUEST / DOAJ / Crossref / EBSCOhost / INDEX COPERNICUS / DRJI / OAJI /
JOURNAL INDEX / I2OR / SCIENCE LIBRARY INDEX / Google Scholar / Academic Keys/ ROAD Open Access /
Academic Resources / Scientific Indexing Services / SCIPIO / JIFACTOR

Better integration between the public and Better security situational awareness
private cloud Ability to embrace new trends such as
Better Operational Support BYOD and mobile working
Zero-day Threat Detection Prioritize and protect security investments
More control over monitoring and Gain an improved understanding of
correlation of events across an security threats
organization Allow the integration of SIEM with firewall
Provision of forensic and analytical tools and IPS for rapid incident response
to gain a betterunderstanding of attacks Centralize and have better control over
Other Benefits of SIEM include: the enforcement ofIT security policies
Increased employee productivity and
process efficiencies
Less manual resources needed for
reporting

BIBLIOGRAPHY
[1] Mather, Tim; Kumaraswamy, Subra; Latif, Shahed, Cloud Security andPrivacy, Oreilly, 2009. ISBN: 987-
0-596-802769
[2] Gartner Research: Hype cycle for cloud computing, 2011
[3] ecfirst, Security Information EventManagement (SIEM) solutions, 2014

400
DOI: 10.21279/1454-864X-16-I2-058
2015. This work is licensed under the Creative Commons Attribution-Noncommercial-Share Alike 4.0 License.

Vous aimerez peut-être aussi