Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

https://github.com/siemucsm/siemucsm

SIEM USE Case Selection Methodology
https://github.com/siemucsm/siemucsm

Last synced: 14 days ago
JSON representation

SIEM USE Case Selection Methodology

Lists

README

        

# Methodology to select SIEM Use Cases

## What is the innovation of the master thesis?
The uniqueness of this research is to highlight the possibility to have a streamlined SIEM Use Case selection process for any company. Existing standard, frameworks and methodologies were used but linked in a unique way to optimise usage within the enterprise environment. The argument consists of the fact that individual domains such as cybersecurity frameworks, stand-ards, threat databases exist, but no overarching answer to provide a solution to the SIEM Use Case selection issue.
The thesis follows a four phased approach:
**The first step** aims at the identification of the focus areas of the SIEM Use Case selection pro-cess. In combining both, the academic and vendor recommendations, we were able to produce a decision galaxy for SIEM Use Cases. The identified focus areas were: Threats, detection capa-bilities, organisation, risk management, regulations, SMEs and threats.
The decision galaxy is a qualitative measure for the SIEM Use Case selection process, and the focus areas cover a vast expanse on influencing parameters.

![Decision Galaxy](https://github.com/siemucsm/siemucsm/blob/master/Decision%20Galaxy.png)
Figure 1: Use Case Selection Galaxy

The argument was to find quantitative replacements for the focus areas able to formulate a methodology on how SIEM Use Cases can be selected. The results thereof are direct relation-ships between the focus areas and standards and frameworks. With this approach, we can se-lect Use Cases based on frameworks and standards.

![Simplified Decision Galaxy](https://github.com/siemucsm/siemucsm/blob/master/Simplified%20Decision%20Galaxy.png)
Figure 2: Simplified Use Case Selection Galaxy

The organisation can be covered by the NIST CSF Tiers and the CIS CSC Implementation Groups. The standards handle the regulations. The detection capability can be found in the Mitre Att&ck Framework. Risk Management can be handled with the NIST CSF. Subject Matter Ex-perts can be matched with the huge threat and detection information of the Att&ck Framework. Finally, the threats themselves are also covered extensively in the Att&ck Framework.
**The second step** focuses on the identification of a threats & detection database. The research shows that the Mitre Att&ck Framework has proven to be the most effective dataset available. Achieved by studying the most prolific and advanced cybersecurity attacks. It was possible to create a database not only with the names of the groups and software used, but also techniques on how to detect these attacks by supplying a rule recommendation and the required log sources for the log events to be recorded in. By selecting specific log sources, an organisation can lever-age the various detection capabilities the log source allows to implement.
The goal of **the third step** is to identify an existing cybersecurity standard or framework, which can be mapped to threats and detection capabilities. The result indicates that several organisa-tions produces datasets to allow for such a relationship model. The thesis selected the CIS, NIST and AuditScripts associations.
**The fourth step** is to analyse how organisations can select suitable detection methods for im-plementation considering cybersecurity threats and requirements defined in standards and frameworks. A selection of SIEM Use Cases becomes possible if a mapping between the Att&ck data and the CIS controls Framework exists. The mapping of Att&ck and CIS is done by match-ing the content of each source logically by terminology. For the remainder with ambiguity or with no direct linkage to sensor technology, the whole framework description and the attack data set had to be compared against each other. The author notes that an even better mapping is achieved between single techniques and the CIS controls Framework.
And **finally**, the combination of all the previously discussed steps into a combined approach to select SIEM Use Cases.

![SIEM Use Case Selection](https://github.com/siemucsm/siemucsm/blob/master/SIEM%20Selection.png)
Figure 3: SIEM Use Case Selection Methodology
By combining the Mitre Att&ck Framework with the CIS Sub-controls, we can map individual standards to the detection techniques.

## What was the motivation for the thesis?
The cybersecurity industry and individuals leading the research on defensive mechanisms in safeguarding the world's data have developed increasingly advanced tools over the past 20 years. One of the main advancements in this field is the development of Security Information and Event Management (SIEM) solutions assisting in detecting adversaries by processing a vast amount of data. The technology offers detection capabilities built on top of available log sources. The SIEM was meant to be the one solution to tie together many different cybersecurity products to visualise the security health of an organisation, to detect attacks and to coordinate response activities.
However, the reality is that a tool does not solve an inherent problem. Most organisations have struggled with the implementation of such tools as SIEM (Perniola & Gray, 2019). The author itself has had 43 discussions with prospects and customers in 2018 alone on the topic of SIEM Use Case selection. Next, to the operational difficulties, there is no globally accepted guidance as to which detection principals should have a focus. If one does not know what to monitor to defend its significant information data assets, then a tool does not take away that decision pro-cess.
In response to this problem, this study proposes to investigate a possible methodology in assist-ing organisations and cybersecurity professionals in selecting SIEM Use Cases based on the catalogued techniques in the Mitre Att&ck Framework. This methodology should consider the respective technical and organisational environment, internal and external requirements, as well as best practices and the available security know-how of the company or organisation.
The aim is to develop a methodology in assisting organisations and cybersecurity professionals in selecting SIEM Use Cases based on a combined approach of utilising the log sources as doc-umented in the Mitre Att&ck Framework and the combination of various cybersecurity standards or frameworks.
**The primary objective of this research is to mitigate the impact of cyber-attacks by providing a method to best match the current attack methodologies with detection capa-bilities.**

## What are the findings and main conclusions?
The research has shown that it is possible to have a unified approach in using SIEM Use Case focus areas necessary for their selection and combine them with the relevant cy-bersecurity standards and frameworks. The result is a flexible methodology allowing for various parameters to be configured to receive a list of applicable SIEM Use Cases.
With moving the detection capability of an organisation back into the focus, we can break down the goals based on the data gathered.
None of the existing parameters was subdued or marginalised with this approach, and it still can be added if required (e.g. Adding SME input or specific organisational requirements). At the cen-tre is still a robust cybersecurity program driving the organisational needs, but it will be supported with qualified data from a relevant threat source able to assist in formulating a roadmap of rolling out detection capabilities. It answers the questions of what is needed to be able to detect the threats against the organisation.
**This research provides the structure to create a tool (e.g. Excel Dashboard) for a guided SIEM Use Case selection process.**

### Flexibility of model
The model is highly flexible. Not only does the method provide a workable solution on how to select SIEM Use Cases according to existing focus areas but it also is possible to that the map-ping files are interchangeable. This results in, that anyone can create a valid mapping file.
The bi-directional links are providing filters and selectors. The meaning of filters in this context is to provide drill-down capabilities. Selectors, on the other hand, can be used to build up a mean-ingful SIEM Use Case selection.
As previously mentioned, the method can easily be extended depending on the specific require-ments. The extensions can be done on the primary mapping between Att&ck and CIS, on the mapping standards and the detection capability.

## Who is the target group of the thesis?
The target group for this research are security professionals supporting, and companies of all sizes investing in a security detection program. This methodology allows for a structured selec-tion process and raises the maturity of the cyber defence program. Data produced can also as-sist in improving overall return of investment (ROI) of such programs.
In combination of a NIST CSF driven SOC-CMM (SOC Capability Maturity Model) assessment, any company can start implementing a cyber security roadmap. The strength in combining the Security Operations Centre maturity with a comprehensible SIEM Use Case selection methodol-ogy provides any CISO or security professional a planning tool for their cyber defence strategy.