Kaspersky Security Operations Center Overview
Kaspersky Security Operations Center Overview
Powered by Kaspersky
22.04.2020
AGENDA 2
5. Q & A
Welcome 3
• Endpoint
• Formal training • Preparation
• Netflow
• On-the-Job • Identification
• Network
Experience • Containment
Monitoring
• Vendor-Specific • Eradication
• Threat Intel
Training • Recovery
• Forensics
• Internal Training • Lessons Learned
• Incident Detection/
Management
Challenges faced by SOCs 6
PLAN
ACT
— Define mission, goals,
— Adjust processes scope and stakeholders
— Tune SOC tools — Create strategy and
roadmap
— Define an action
point for a new — Build a service portfolio
PDCA cycle
Driven by
Global Threat
Intelligence DO
CHECK — Hire people
— Formal assessment — Train
— Red teaming — Deploy tools
— Lessons Learned — Implement processes
PDCA cycle
1-2 years+
SOC Best Practices 8
2 ISO/IEC 27002:2013 "Information technology—Security techniques—Code of practice for information security management"
9 SANS Institute - Creating and Managing an Incident Response Team for a Large Company
10 Public recommendations of leading vendors and integrators on the issues of information security incident management
Step-by-step Cybersecurity Strategy
STEP
90
the maximum possible
number of threats
%
IT Manager
Our Approach 10
• Standard training - participants emerge armed with • Coordinate effectively with your IT Security team
the knowledge, the tools, and he confidence needed • Gain experience through practical exercises
to perform effectively during and in the aftermath of • Know what is essential, and safe, to say
Vulnerability IOC
Priority s Incident Response
management Kaspersky Context
Threat
Intelligence
Statistics,
detects
Vulnerability
Incident
assessment Reporting statistics and
reports
KPIs
Kaspersky
Threat Intelligence
• Improve threat hunting mission • Understand the risk
LONG-TERM
SOC Manager
Tier1 Operators
Tier2 Analysts
Threat intelligence
and research team
Operations and
maintenance team
A critical incident
response
committee
SOC Maturity Assessment - Overview 18
Current Target
Red Teaming & Penetration Test 21
Limitations Strict scope, ethics, timeframe Based on threat model, none by default
SOC Strategy
SOC Framework
SOC Playbooks
SOC MA
Incident Response
Malware Analysis
SOC Kaspersky Managed Protection
Digital Forensics
Consulting Incident Response
Advanced Malware Analysis
Malware Analysis
Advanced Digital Forensics
Digital Forensics
YARA Training
Security Assessment
Kaspersky Incident Communication
Kaspersky Kaspersky Kaspersky Security Awareness
Cybersecurity Training
Services
23
People
Technology Process
OPERATIONS CENTERS
training services services
CLASSIC SOC
CORE
Log collection Monitoring and Case Incident
& correlation alerting management reporting
Kaspersky products
SOC Technologies and services 26
3rd party
products
TI
Vulnerability response
management Kaspersky Endpoint
feeds, intel reports Kaspersky EDR
Security
logs detects
assets
info
Case management
SOAR response
Attack Kaspersky Threat
tactics
& IOCs
Intelligence Reports
response
Incident
Response
aggregated
Reporting & Suspicious Kaspersky Research
info visualization objects
Sandbox
response
Kaspersky
Endpoint Security for Business The GARTNER PEER INSIGHTS CUSTOMERS’ CHOICE badge is a trademark and
service mark of Gartner, Inc., and/or its affiliates, and is used herein with permission. All
rights reserved. Gartner Peer Insights Customers’ Choice constitute the subjective
opinions of individual end-user reviews, ratings, and data applied against a documented
methodology; they neither represent the views of, nor constitute an endorsement by,
Gartner or its affiliates. *All reviews and ratings are current as of February 12, 2019.
AD instances
cloud/on-premises
On-premises servers
WAN/LAN
Mobile devices Specialist
Roaming and
on-premises hosts
Kaspersky
Sandbox
Complementing Kaspersky Improved protection and No additional Integration with 3rd party
Endpoint Security for Business automated response to advanced investments in solutions via RESTful API
with advanced detection threats across all protected staff and in- facilitating maximum
scenarios for new and targeted endpoints including distributed house benefit from the solution
threats without affecting networks with remote offices expertise in complex environments
endpoint performance
Load
balancing
Object reputation request
(synchronous mode) Internet
KESB
Network interface to control malware interactions with the internet
Response
Shared
cache
of verdicts
KESB
Centralized management/
updates, response policy set-
up and health check
Kaspersky
Suspicious object analysis Sandbox Detection data exported in CEF format
KESB
request (asynchronous mode)
Analysis result
High- SIEM
availability Kaspersky
Endpoints cluster Security
Center
Automation processes in SOC support by KATA.KEDR • +100M users
• Verdict analysis
GLOBAL THREAT
• Machine learning
Telemetry INTELLIGENCE
Retrospective data • Retrospective analysis
Data • Event correlation
storage
• Macro incident
• Dynamic analysis
• Evasion prevention SOC
• Imitation of user actions APT
SANDBOX Targeted Attack
• Monitoring interaction with
internet resources
Telemetry
Event • Module loading Verdicts Incidents
response
AGENTS RESPONSE team
Kaspersky Anti Targeted Attack/
Endpoint Detection and Response
Reduction of Compliance
IT-security
risks
Interaction with Automatic data
preventive technologies collection and Threat hunting
and enrichment of centralized storage
SIEM/SOC
Metadata
Response
Incident
North
Europe META
America
Canada (1) Belgium (2) Egypt (3)
France (2) Rwanda (2)
LATAM Germany (5) South Africa (3)
Hungary (1) Kuwait (1)
Brazil (3)
Israel (2) Oman (1)
Colombia (2)
Italy (3) Qatar (2)
Chile (1)
Luxemburg (1) Saudi Arabia (4)
APAC Netherlands (1) Singapore (1)
Poland (1) Turkey (2)
China (5)
Romania (1) UAE (1)
India (1)
Russia (12)
Japan (5)
Spain (2)
Korea (4)
Switzerland (1)
Indonesia (1)
UK (4)
Singapore (1)
Thank you!
Q&A
Contact:
Ngo Khanh: Khanh.Ngo@Kaspersky.com
Nguyen Huan: HuanTrong.Nguyen@Kaspersky.com