SIEM Correlation Rules For Beginners
SIEM Correlation Rules For Beginners
today we're going to discuss about the Sim use case how to write use
cases what is the best way to create a use cases in the Sim and what is
the Thin Line difference between the correlation and aggregation my
name is bra ner for more information do check my LinkedIn profile if
you're new to the channel do subscribe to my YouTube channel and click
on the Bell icon to make sure you should not miss my future videos on a
similar topic so without
00:00:26 wasting a time let's start with the first part thank you [Music]
see before we going to discuss about how to how to write use cases and
all that first we need to understand how the Sim work what is the need of
sim there's a dedicated video I made on Sim so in the description box of
this video you can check the intro video but but just for your visibility and
all that let me explain again why we need a SIM see what happen is uh
when you're talking about your traditional Network infrastructure suppose
this is the firewall we have
00:04:29 not have a comprehensive uh you can say uh set of use cases
for the system and this made it difficult to identify the security threats
that need to be addressed and second is they don't have a ineffective
correlation rules so by this they can able to correlate the event and
everything okay so that is basically the concern we have so to overcome
that we understood very well that okay we have a uh you know two M
major objectives here so let me explain you that objectives also so you get
a better visibility
00:09:08 a use cases and all that the first step is identify and create a
use cases the second step is called develop the correlation rule so that
you can able to avoid the duplications then we Implement and test that
rule then we based on that we discover the incident which respond to the
incident and based on that we improve the overall program which is done
through the help of continuous monitoring and Improvement so that
something is B basically we going to perform okay so we have a first use
case unauthorized access detection so that is
00:10:07 and all that or or somebody try to modify the system logs and
all that I want to alert so trigger we have a multiple fail login attempts so
sometime what happen user enter wrong password so here what we do is
we set the threshold if user enter two time wrong password it is okay but
if if the locks if the user entering more than three time four time then start
generating a loog so that is basically the anomaly pattern or from the
unknown location they try to access which is not part of the IP so
00:10:34 this is the trigger we have okay so this is the use case we
have created okay and the objective of this use case is to identify alert the
unauthorized access okay so we have another use case which is called
Data exfiltration it mean data should not leave within the organization or
data should not leave outside of the organization okay I'm talking about
inbound to Unbound outbound so objective is detect the potential data X
filtration from a internal to external so data is basically any kind of
network
00:11:01 traffic data we have data transfer logs we have user activity
logs we have so for that we set the triggers triggers can be your unusual
data transfer size so example if someone is trying to send um you know
more than 5 MB data okay it it should s should generate a log so unusual
data transfer size of the destination or especially during off hour so that is
a trigger we have so that is a first step is we create a use case based on
this particular use case we basically the correlation rule we already
discussed correlation mean right
00:11:32 correlation mean aggregate the data connect the match and
Trigger so correlation rule is the second thing which we done based on use
cases so as I said we have a use case one is unauthorized access
detection okay I want to detect theorized access detection for that we set
the rule so rule is if user has more than five failed login attempt within the
5 minutes or access is basically uh access is from The Blacklist IP location
is during a non- business then trigger an alert so that is a condition we set
and
00:12:03 based on this rule if rule match what is action lock the account
okay or send the alert to the securer team so it's a combination instead of
the action can be you know generate the loog okay so it's up to you how
you want to Define is it clear so that's something you can do okay now on
the other side we also have another rule which is called as a uh this one
correlation rule for used to is if data transfer size is more than 5 MB to the
external IP is going it mean if you take example here uh so we have a
system
00:13:11 for correlating you need to aggregate the data first okay so
once we done with that we have a implementation test so first step is data
collection we need to ensure all the relevant logs and data has been feed
into the Sim that is a first step second is basically rule implementation we
implement the develop correlation rule in the Sim system third sometime
we do the test before implementing in the production so we simulate the
scenario to validate if the correlation rules are trigging the desire Alert in
action and if not we can
00:13:42 basically adjust according to the testing to make sure we can
able to reduce the false positive once it trigger then instant response
team will take a call and according to that respond to the incident so first
step is Alert review system team will review the alert examine the
quarantine email for the malicious intent confirm and validate then they
notify they inform the intent recipient about the quarantine email and
provide the education on recognizing of fishing attemps or something else
then we have
00:14:38 where we establish the feedback loop where the insights and
learning from the incidents are used to refine the use cases and then we
need to ensure the security team is adequately trained to respond to the
alert generated by the Sim system so that is the overall process we have
for the use cases that we create in Sim so do let me know how do you find
this video and shall I made more videos on a similar topic and if you're
new to the channel do subscribe to my YouTube channel and click on the
Bell icon to make sure you
00:15:04 should not miss my future videos on a similar topic good day
bye