Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Summary

Summary SPLUNK : The Essential Guide to Security USING SPLUNK

Rating
-
Sold
-
Pages
41
Uploaded on
08-01-2024
Written in
2023/2024

Table of Contents Introduction .................................................................................5 Splunk in the Security Operations Center (SOC)...................................................6 Understanding the Fundamentals ..............................................8 Splunk’s Analytics-Driven Security Journey............................................................8 Splunk’s Security Suite.......................................................................................................10 The Security Use Cases ..................................................................................................... 12 Embarking on Your Analytics-Driven Security Journey.................................. 15 Stage 1: Collection...........................................................................16 Stage 2: Normalization.....................................................................20 Stage 3: Expansion...........................................................................22 Stage 4: Enrichment.........................................................................24 Stage 5: Automation and Orchestration............................................26 Stage 6: Advanced Detection..........................................................28 Solve Common Security Challenges With the Splunk Security Operations Suite.........................................................30 Incident Investigation and Forensics.........................................................................32 • Detect Lateral Movement With WMI.......................................................................32 • Identify Multiple Unauthorized Access Attempts..........................................35 Security Monitoring...............................................................................................................38 • Detect Public S3 Buckets in AWS.............................................................................38 • Find Multiple Infections on Host................................................................................42 Advanced Threat Detection.............................................................................................44 • Detect Connection to New Domain.........................................................................44 • Find Emails With Lookalike Domains......................................................................48 SOC Automation......................................................................................................................52 • Automate Malware Investigations...........................................................................52 • Automate Phishing Investigations and Responses.......................................54 Incident Response.................................................................................................................56 • Detect New Data Exfil DLP Alerts for User.........................................................56 • Identify Basic Dynamic DNS Detection................................................................59 Compliance.................................................................................................................................62 • Detect New Data Exfil DLP Alerts for User.........................................................62 • Find User Logged Into In-Scope System They Should Not Have..........65 Fraud Analytics and Detection.......................................................................................68 • Detect Compromised User Accounts....................................................................68 • Find Anomalous Healthcare Transactions..........................................................71 Insider Threat Detection....................................................................................................73 • Detect Large Web Upload..............................................................................................73 • Detect Successful Login of Account for Former Employee....................76 Introduction What’s your plan for cybersecurity? Are you simply “planning for the worst, but hoping for the best?” With digital technology touching every part of our lives and new threats popping up daily, it’s imperative that your organization is precise, informed and prepared when it comes to defending your assets and hunting your adversaries. High-profile breaches, global ransomware attacks and the scourge of cryptomining are good enough reasons why your organization needs to collect, leverage and understand the right data. You’ll also need to implement the right processes and procedures, often alongside new technologies, methods and requirements–all with an ever-increasing velocity and variety of machine data. So how can you best defend your organization and hunt down new adversaries? Ultimately, by taking a holistic approach to your defense system across the enterprise. This is why Splunk believes every organization needs a security nerve center, implemented by following a six-stage security journey that we will describe for you.

Show more Read less
Institution
Course

Content preview

The
Essential Guide
to Security
How to Get Started Using Splunk
for Security to Solve Your
Everyday Challenges

, Table of Contents
Introduction .................................................................................5
Splunk in the Security Operations Center (SOC)...................................................6



What’s Your
Understanding the Fundamentals ..............................................8
Splunk’s Analytics-Driven Security Journey............................................................8
Splunk’s Security Suite....................................................................................................... 10


Plan for The Security Use Cases ..................................................................................................... 12
Embarking on Your Analytics-Driven Security Journey.................................. 15




Cybersecurity?
Stage 1: Collection........................................................................... 16
11010110
1101100110

Stage 2: Normalization.....................................................................20
0101011011
1001011010
1101101011
11010110




Stage 3: Expansion...........................................................................22

Are you simply “planning Stage 4: Enrichment.........................................................................24

for the worst, but hoping Stage 5: Automation and Orchestration............................................ 26

for the best?” Stage 6: Advanced Detection..........................................................28


Solve Common Security Challenges With the Splunk
Security Operations Suite.........................................................30
Incident Investigation and Forensics......................................................................... 32
• Detect Lateral Movement With WMI.......................................................................32
• Identify Multiple Unauthorized Access Attempts..........................................35
Security Monitoring...............................................................................................................38
• Detect Public S3 Buckets in AWS.............................................................................38
• Find Multiple Infections on Host................................................................................42
Advanced Threat Detection.............................................................................................44
• Detect Connection to New Domain.........................................................................44
• Find Emails With Lookalike Domains......................................................................48
SOC Automation...................................................................................................................... 52
• Automate Malware Investigations...........................................................................52
• Automate Phishing Investigations and Responses.......................................54
Incident Response.................................................................................................................56
• Detect New Data Exfil DLP Alerts for User.........................................................56
• Identify Basic Dynamic DNS Detection................................................................59
Compliance................................................................................................................................. 62
• Detect New Data Exfil DLP Alerts for User.........................................................62
• Find User Logged Into In-Scope System They Should Not Have..........65
Fraud Analytics and Detection.......................................................................................68
• Detect Compromised User Accounts....................................................................68
• Find Anomalous Healthcare Transactions..........................................................71
Insider Threat Detection.................................................................................................... 73
• Detect Large Web Upload..............................................................................................73
• Detect Successful Login of Account for Former Employee.................... 76

,So how can you Introduction
best defend your What’s your plan for cybersecurity? Are you simply “planning
for the worst, but hoping for the best?” With digital technology
touching every part of our lives and new threats popping up daily, it’s

organization and imperative that your organization is precise, informed and prepared
when it comes to defending your assets and hunting your adversaries.



hunt down new High-profile breaches, global ransomware attacks and the scourge of
cryptomining are good enough reasons why your organization needs



adversaries?
to collect, leverage and understand the right data. You’ll also need to
implement the right processes and procedures, often alongside new
technologies, methods and requirements–all with an ever-increasing
velocity and variety of machine data.
Ultimately, by taking a holistic So how can you best defend your organization and hunt down new
approach to your defense adversaries? Ultimately, by taking a holistic approach to your defense

system across the enterprise. system across the enterprise. This is why Splunk believes every
organization needs a security nerve center, implemented by following
a six-stage security journey that we will describe for you.

Let’s break down what that means.

, Splunk in the Security Operations Sound good?
Center (SOC) Great. So how do I make all of this happen in the real world, you ask?
Data-driven businesses take advantage of the investigate, monitor,
analyze and act (IMAA) model to advance their security by optimizing To get you started, we put together this short guide to introduce you
their people, processes and technology. It includes using all the data to the top security use cases organizations face and to show you how
from the security technology stack, which can help you investigate, Splunk’s analytics-driven platform can help you solve your security
detect and take rapid, coordinated action against threats in a manual, challenges. This guide is divided into three sections:
semi-automated or fully-automated fashion. When security teams
1. Understanding the Fundamentals. Here you will find an
invest in their security infrastructure, their security ecosystem
introduction to the security journey and a quick primer on
and skills become stronger, making it possible to expand security
security use cases with each use case mapped to relevant
practices into new areas and proactively deal with threats.
Splunk solutions.
The Splunk Data-to-Everything Platform and Splunk’s security
2. Embarking on Your Analytics-Driven Security Journey. Here
portfolio brings together multiple cybersecurity areas, as well as
we explain the six stages of the data-driven security journey–and
others outside of security, to foster collaboration and implement
what you should be able to do, and how well, at each stage.
best practices for interacting with your data. Security teams can use
Splunk solutions to drive statistical, visual, behavioral and exploratory 3. Solving Common Security Challenges With Splunk. Here
analytics that inform decisions and actions. From there, the platform we walk through examples of how to solve common security
allows for a modern workflow, from collecting data all the way to challenges associated with:
Splunk Adaptive Response
invoking actions to address cyberthreats and challenges.
• Incident investigation and forensics
• Security monitoring
Network • Advanced threat detection
• SOC automation
Web Proxy Threat
Firewall Intelligence • Incident response, compliance
• Fraud and analytics detection
• Insider threat

WAF & App
Security
Orchestration
Ready to create a kick-ass security practice?
We thought so.

Internet Network Endpoints
Security


Identity and
Access



Figure 1: Splunk Enterprise Security includes a common framework for interacting with data and invoking
actions. The Adaptive Operations Framework enables security teams to quickly and confidently apply
changes to the environment. Splunk Enterprise Security can automate the response as well, enabling the
security infrastructure to adapt to the attacker using a range of actions appropriate to each domain.

Written for

Course

Document information

Uploaded on
January 8, 2024
Number of pages
41
Written in
2023/2024
Type
SUMMARY

Subjects

$11.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
THEEXCELLENCELIBRARY Harvard University
Follow You need to be logged in order to follow users or courses
Sold
18
Member since
2 year
Number of followers
6
Documents
2641
Last sold
3 months ago
THE EXCELLENCE LIBRARY

The Excellence Library Where Academic Success Begins. Welcome to The Excellence Library — your trusted marketplace for past and upcoming exam papers with verified answers, spanning all academic fields. Whether you're a med student, a future lawyer, a high schooler prepping for finals, or a researcher looking for model dissertations — we've got you covered. What We Offer Accurate & Complete Exam Papers From Medicine, Nursing, Law (Bar Exams), High School subjects, and more. Model Dissertations & Novels Top-tier academic references and full-text materials to guide your writing and study. Affordable & Fair Pricing Quality resources at a price that respects students' budgets. Why Choose Us? Thoroughly Reviewed Answers – Every paper includes clear, correct solutions. Massive Library – Thousands of documents, constantly updated. Academic Excellence, Delivered – We help you prepare smarter, not harder. Fast Delivery – Get what you need, when you need it. Our Goal To empower students and professionals by offering reliable, affordable academic materials — helping you succeed one paper at a time.

Read more Read less
2.5

2 reviews

5
0
4
0
3
1
2
1
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions