Security dashbaord use cases

From Federal Burro of Information
Revision as of 19:08, 4 April 2018 by David (talk | contribs) (Created page with "<pre> Alerts Firewall Multiple ports scanned from single external source Multiple ports scanned from single internal source Multiple ports scanned on a single host...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigationJump to search

Alerts
Firewall
Multiple ports scanned from single external source
Multiple ports scanned from single internal source
Multiple ports scanned on a single host            come from PAN
High Volume of Firewall Traffic towards critical service ports
High Volume of Firewall Traffic towards mail server ports
High Volume of Firewall Traffic towards common target ports
High Volume of Firewall Traffic towards web-facing ports    Splunk
Statistically high volume of traffic per user
Abnormal Increase of FW Accepts
Abnormal Increase of FW Denies
Attempted Contact with Malicious IP - Inbound
Attempted Contact with Malicious IP - Outbound        based on the in-house list

IDS
Alerts from High Severity Attacker (3 in 5 min)
Alerts to High Severity Target (3 in 5 min)
Same Attacker - 6+ Different Events in 1min from external
Same Attacker - 8+ Different Events in 1min
Same high priority event same attacker (75 over 10 min)
Same high priority event same target (75 over 10 min)
High Number of IDS Alerts for Backdoor                    from PAN IPS high severity event as one case

Failed Login Use Cases - Windows AD/Syslog (Palo Alto, *nix)
Many failed logins to a single account from multiple sources (4 over 5 min)
Many Failed Logins From a Source to Multiple Assets (12 within 10 min)
Many failed logins from an internal source, to unique target user names that do not exist (20 in 10 minutes)
Many failed logins on a Domain Controller to unique target user names (25 in 2 minutes)
Many failed logins on a single host to unique target user names (25 in 30 minutes)
Many failed logins to a single host (250 in 2 minutes)
Successful Logins Involving User Names With Multiple Failures
Log disabled windows account login attempt (10 over 1 hour)
VPN denied many login attempts to a single account
VPN Many Users from Single Source
VPN logins from unlikely sources
VPN logins from unlikely sources following recent login
Concurrent logins from multiple regions
sudo multiple incorrect password attempts

Windows
Audit log cleared
Unable to log events to security log?
Multiple failed attempts to open file without permissions
New account created and deleted in short period

Linux
Audit log cleared

Brocade/Cisco Switches
Traffic on known-disabled ports
Unexpected traffic on specific ports (i.e. common area ports)

Web/Content Filtering
WildFire - Known Malicious Content Downloaded

Sophos Mail Encryption
Failed logins

Symantec
Malware detected
Malware detected and not quarantined

ServiceNow/JIRA/Confluence
Failed logins

Ruckus WiFi Controller
Rogue AP detected
Attempt to logon with revoked certificate

Incapsula
Alert on blocking rules

CVA
New high/critical vulnerability detected

Dashboards
RSA Secure ID
Login/Token Failure/etc.

Palo Alto
Usage Patterns by Category
Geographic location of traffic sources/destinations

IDS
Top IDS event sources
Top IDS event targets
IDS events geographic location

Symantec
Failed signature updates?             Should be an alert

DNS
Query types trend
Statistically abnormal DNS query length
Statistically abnormal DNS entropy
 
CVA
Asset Discovery
Most common vulnerabilities
Vulnerability persistence

Reports
Windows
User added/removed/locked/unlocked/disabled to security group
Security enabled group created
Account added per admin
Account added to admin group


Door Access Logs
Entry into restricted areas
After hours access
Door open on 24 and not closed on 25

CVA
High/critical vulnerability persisting > 1 week (or something)

CIS
Server compliance report