Cargando…

Building a minimum viable Security Operations Centre for the modern grid environment

The modern security landscape affecting grid and cloud sites is constantly evolving, with threats being seen from a range of avenues, including social engineering as well as more direct approaches. It is vital to build up operational security capabilities across the Worldwide LHC Computing Grid (WLC...

Descripción completa

Detalles Bibliográficos
Autores principales: Crooks, David, Vâlsan, Liviu
Lenguaje:eng
Publicado: SISSA 2019
Materias:
Acceso en línea:https://dx.doi.org/10.22323/1.351.0010
http://cds.cern.ch/record/2708680
_version_ 1780965074515525632
author Crooks, David
Vâlsan, Liviu
author_facet Crooks, David
Vâlsan, Liviu
author_sort Crooks, David
collection CERN
description The modern security landscape affecting grid and cloud sites is constantly evolving, with threats being seen from a range of avenues, including social engineering as well as more direct approaches. It is vital to build up operational security capabilities across the Worldwide LHC Computing Grid (WLCG) in order to improve the defence of the community as a whole. As reported at ISGC 2017 and 2018, the WLCG Security Operations Centres (SOC) Working Group (WG) has been working with sites across the WLCG to develop a model for a Security Operations Centre reference design. We present the current status of a minimum viable SOC design applicable to a range of different WLCG sites, centred around a few key components.The design uses the Zeek Network Intrusion Detection System for monitoring what is happening at the network level in strategic locations: for example at border between the local cluster and external networks, the border between different local network domains or at core infrastructure nodes. The MISP Open Source Threat Intelligence Platform is used to share information regarding relevant security events and the associated Indicators of Compromise (IoCs). By feeding IoCs from MISP into Zeek we have a platform that allows the community to share threat intelligence that is immediately actionable across the entire grid.The logs produced by Zeek are processed using the Elasticsearch, Logstash, Kibana (Elastic) stack for real time indexing and visualisation. This provides sites with a powerful tool for incident response and network forensics. The alerts raised by Zeek are further aggregated, correlated and enriched by an advanced notification processing engine. This ensures that most false positives are automatically whitelisted while at the same time reducing the total number of raised alerts that need to be managed by the computer security team of each site. By enriching these alerts and adding context of what happened around the moment the malicious activity was detected, the time needed to handle these alerts is greatly reduced.We present possible deployment strategies for all these components in a grid context as well as the integration between them. We also report on the current status of work on integrating other sources of data, in particular using netflow / sflow, into this model.Lastly we discuss how making use of these SOC capabilities distributed across the participating sites can lead to increasing the operational security across the entire grid.
id oai-inspirehep.net-1766687
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2019
publisher SISSA
record_format invenio
spelling oai-inspirehep.net-17666872022-08-10T12:24:47Zdoi:10.22323/1.351.0010http://cds.cern.ch/record/2708680engCrooks, DavidVâlsan, LiviuBuilding a minimum viable Security Operations Centre for the modern grid environmentComputing and ComputersThe modern security landscape affecting grid and cloud sites is constantly evolving, with threats being seen from a range of avenues, including social engineering as well as more direct approaches. It is vital to build up operational security capabilities across the Worldwide LHC Computing Grid (WLCG) in order to improve the defence of the community as a whole. As reported at ISGC 2017 and 2018, the WLCG Security Operations Centres (SOC) Working Group (WG) has been working with sites across the WLCG to develop a model for a Security Operations Centre reference design. We present the current status of a minimum viable SOC design applicable to a range of different WLCG sites, centred around a few key components.The design uses the Zeek Network Intrusion Detection System for monitoring what is happening at the network level in strategic locations: for example at border between the local cluster and external networks, the border between different local network domains or at core infrastructure nodes. The MISP Open Source Threat Intelligence Platform is used to share information regarding relevant security events and the associated Indicators of Compromise (IoCs). By feeding IoCs from MISP into Zeek we have a platform that allows the community to share threat intelligence that is immediately actionable across the entire grid.The logs produced by Zeek are processed using the Elasticsearch, Logstash, Kibana (Elastic) stack for real time indexing and visualisation. This provides sites with a powerful tool for incident response and network forensics. The alerts raised by Zeek are further aggregated, correlated and enriched by an advanced notification processing engine. This ensures that most false positives are automatically whitelisted while at the same time reducing the total number of raised alerts that need to be managed by the computer security team of each site. By enriching these alerts and adding context of what happened around the moment the malicious activity was detected, the time needed to handle these alerts is greatly reduced.We present possible deployment strategies for all these components in a grid context as well as the integration between them. We also report on the current status of work on integrating other sources of data, in particular using netflow / sflow, into this model.Lastly we discuss how making use of these SOC capabilities distributed across the participating sites can lead to increasing the operational security across the entire grid.SISSAoai:inspirehep.net:17666872019
spellingShingle Computing and Computers
Crooks, David
Vâlsan, Liviu
Building a minimum viable Security Operations Centre for the modern grid environment
title Building a minimum viable Security Operations Centre for the modern grid environment
title_full Building a minimum viable Security Operations Centre for the modern grid environment
title_fullStr Building a minimum viable Security Operations Centre for the modern grid environment
title_full_unstemmed Building a minimum viable Security Operations Centre for the modern grid environment
title_short Building a minimum viable Security Operations Centre for the modern grid environment
title_sort building a minimum viable security operations centre for the modern grid environment
topic Computing and Computers
url https://dx.doi.org/10.22323/1.351.0010
http://cds.cern.ch/record/2708680
work_keys_str_mv AT crooksdavid buildingaminimumviablesecurityoperationscentreforthemoderngridenvironment
AT valsanliviu buildingaminimumviablesecurityoperationscentreforthemoderngridenvironment