19
7/23/2019 Effective Case Modeling Security Information Event Management 33319 http://slidepdf.com/reader/full/effective-case-modeling-security-information-event-management-33319 1/19 Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Effective Use Case Modeling for Security Information & Event Management In most compliance frameworks and best practices guides there are references to appropriately auditing events within an information technology infrastructure. This places a great deal of importance on appropriately managing event data. However, in recent SANS Advisory Board and SecurityFocus discussions, it is clear that log management is often times an elusive ideal which is near impossible for most companies to implement for a myriad of reasons. Chief among them is the fact that not many organizations truly understan... Copyright SANS Institute Author Retains Full Rights       A       D

Effective Case Modeling Security Information Event Management 33319

Embed Size (px)

Citation preview

Page 1: Effective Case Modeling Security Information Event Management 33319

7/23/2019 Effective Case Modeling Security Information Event Management 33319

http://slidepdf.com/reader/full/effective-case-modeling-security-information-event-management-33319 1/19

Interested in learningmore about security?

SANS Institute

InfoSec Reading RoomThis paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission.

Effective Use Case Modeling for SecurityInformation & Event ManagementIn most compliance frameworks and best practices guides there are references to appropriately auditing eventswithin an information technology infrastructure. This places a great deal of importance on appropriatelymanaging event data. However, in recent SANS Advisory Board and SecurityFocus discussions, it is clear that

log management is often times an elusive ideal which is near impossible for most companies to implement for amyriad of reasons. Chief among them is the fact that not many organizations truly understan...

Copyright SANS Institute

Author Retains Full Rights

      A      D

Page 2: Effective Case Modeling Security Information Event Management 33319

7/23/2019 Effective Case Modeling Security Information Event Management 33319

http://slidepdf.com/reader/full/effective-case-modeling-security-information-event-management-33319 2/19

 

Effective Use Case Modeling for SecurityInformation & Event Management

GIAC (GCIH) Gold Certification

!"#$%&' )*+,-. /&0-1 2&,3,..-456*,.78%6

!9:,;%&'

!88-<#-9' =-<#-6>-& ?@1 ?AAB

!>;#&*8#

 In most compliance frameworks and best practices guides there are references toappropriately auditing events within an information technology infrastructure. This

 places a great deal of importance on appropriately managing event data. However, inrecent SANS Advisory Board and SecurityFocus discussions, it is clear that log

management is often times an elusive ideal which is near impossible for most companies

to implement for a myriad of reasons. Chief among them is the fact that not manyorganizations truly understand the methods with which to dissect and utilize logging sources. This paper defines a standard methodology which can be used to develop use

cases that can be used to help organizations quantify the scope and need for logmanagement technologies.

Page 3: Effective Case Modeling Security Information Event Management 33319

7/23/2019 Effective Case Modeling Security Information Event Management 33319

http://slidepdf.com/reader/full/effective-case-modeling-security-information-event-management-33319 3/19

Effective Use Case Modeling for Security Information & Event Management ?

!"#$%& C*6- -6*,. *99&-;;

1. Introduction

With today’s technology there exist many methods to subvert an information system

which could compromise the confidentiality, integrity, or availability of the resource.

Due to the abstract nature of modern computing, the only way to be reliably alerted of

a system compromise is by reviewing the system’s actions at both the host and

network layers and then correlating those two layers to develop a thorough view into

the system’s actions. In most instances, the computer user often has no indication of

the existence of the malicious software and therefore cannot be relied upon to

determine if their system is indeed compromised.

To some greater or lesser extent, every system or application has the ability to log its

actions. However, the volume of log data generated by systems and the applications

running on them is so large that it is impractical for administrators to be able to

review every data entry in the log and thus makes the alerting process less than 100%

effective. As an example, a single IIS log from a Microsoft Exchange Server running

Outlook Web Access for a midsize company with approximately six hundred

employees, with its reporting verbosity set to the default verbosity setting as delivered

from Microsoft, over a week period generated a daily average of 126MB/day in size

comprising of 607,185 lines of data. Without the ability to process this log file in an

automated fashion it would take an administrator over 7 days to review the log file if

they could review a single line of data every second. This is not very practical nor

does it support the ability to review the logs in near real time which is required if

actionable intelligence is to be pulled from the log data.

The process of gathering and maintaining network, system, and application log data is

commonly referred to using several different definitions. It is sometimes defined as

Security Information and Event Management (SIEM), Security Event Management

(SEM), Security Information Management (SIM), systems monitoring, and network

monitoring (D-,E*&,1 F$":*E,+1 ?AAGH F%+#%;1 F&%I-..1 )-J%9-221 )"+E-.1 F%.-1

Page 4: Effective Case Modeling Security Information Event Management 33319

7/23/2019 Effective Case Modeling Security Information Event Management 33319

http://slidepdf.com/reader/full/effective-case-modeling-security-information-event-management-33319 4/19

Effective Use Case Modeling for Security Information & Event Management K

!"#$%& C*6- -6*,. *99&-;;

?AALM. For the purposes of this paper and to reduce confusion between the practice of

Information Security Management (ISM) and its sub-domain of Security Information

Management (SIM), all references to the practice of gathering, maintaining, and using

log data will be referred to as Security Information and Event Management (SIEM) in

this paper.

2. Understanding the Log Management Process

To fully understand SIEM’s shortcomings, it is critical to be familiar with the process

of log generation, log gathering, and the resulting correlation of log data. The timeline

 below shows a generic application interaction and the associated log gathering actions

which occur after the user’s request has been processed.

!"#$%& (

As shown above, there are typically six different actions which comprise the end user

request to administrator response process when discussing SIEM.

@7  N;-& &-O"-;#

?7  =0;#-6 &-;<%+;-

Page 5: Effective Case Modeling Security Information Event Management 33319

7/23/2019 Effective Case Modeling Security Information Event Management 33319

http://slidepdf.com/reader/full/effective-case-modeling-security-information-event-management-33319 5/19

Effective Use Case Modeling for Security Information & Event Management G

!"#$%& C*6- -6*,. *99&-;;

K7  P&,#- ;0;#-6 .%5

G7  P&,#- .%5 2,.-Q-+#&0 #% =RST ;0;#-6

U7  F%&&-.*#- *+9 *+*.03- =RST 9*#* *+9 5-+-&*#- *.-&#

V7  =0;#-6 *96,+,;#&*#%&W;M &-;<%+9 #% *.-&#;

An important concept to be aware of is that SIEM data is always reactive in nature as

the event which is being recorded has already occurred. In security parlance this is

termed as being a detective control . Depending on the criticality of the event, the

times for X, Y, and Z, must be minimized to meet the business requirements for

response time.

3. Common Barriers of Successful SIEM

Implementations

X$-&- *&- 6*+0 &-*;%+; I$0 =RST ;%."#,%+; *&- +%# #$- *..Y,+Y%+- 6*5,8 >"..-#

#% *+ %&5*+,3*#,%+Z; .*8E %2 ;-8"&,#0 ,+#-..,5-+8-7

First and foremost, for SIEM to be truly useful, only actionable data must be sent

onward to system and application administrators or security staff. To make SIEM

alerts actionable it must address the “Five W’s”, a basic investigative technique of

determining when the event occurred, who was involved, what happened, where did it

take place, and why did it happen. The “Five W’s” can be mapped directly to

common variables in a security investigation.

•  When – Time/Date stamp of the event(s) happening

•  Who – Identifier of the requestor; typically an IP address and/or a username

•  What – Description of the event (such as a GET or POST to a web server)

•  Where – System or application that generated the event and where the request

originated from

•  Why – The purpose of the action and typically is what is being investigated

Page 6: Effective Case Modeling Security Information Event Management 33319

7/23/2019 Effective Case Modeling Security Information Event Management 33319

http://slidepdf.com/reader/full/effective-case-modeling-security-information-event-management-33319 6/19

Effective Use Case Modeling for Security Information & Event Management U

!"#$%& C*6- -6*,. *99&-;;

Despite the benefit of SIEM data, many SIEM system vendors do not quantify the

 benefit of the use cases they support and therefore do not fully answer the “Five W’s”

of an investigation. As an example, a popular SIEM platform comes delivered with

over 1500 reports out of the box. However, the majority of those predefined use cases

are missing fields in their reports, particularly around login events. While their reports

may identify when an event occurred, such as a logon failed event (addressing

”what”), and which username performed an action (addressing “who”), they do not

appropriately identify from which IP address the username attempted to login from

and therefore does not adequately answer the “where” question thus making the

report not entirely actionable. It may be a case of an employee accessing a server

from the corporate office who mistyped their password or it could be a malicious 3rd

 

 party attempting to access that host from another host on the server’s subnet but with

the limited data points you cannot determine if that is the case. The only thing that

you can determine is that a login event failed for a particular username a certain

number of times but doesn’t enable someone to answer the question of “why” the

event occurred which during a security incident response scenario is the most

important question to answer.

Another common issue with SIEM software is performance. While many SIEM

vendors tout tens of thousands of events per second as the capacity of the system,

often times that number is misleading. In many cases, each correlation rule subtracts

from the overall performance of the system exponentially based on the number of

data points being correlated in much the same way that a firewall slows down based

on the number of firewall rules in place and the number of filters attached to those

 particular rules. A firewall with one rule set to filter for a single service is much faster

than a firewall set to filter thousands of rules where multiple nested groups exist in

each rule for source IP addresses, destination IP addresses, and service. This

condition leads to an underestimation of the time needed for correlation as the data set

grows and how often those correlations are scheduled. In most SIEM instances

correlation is a scheduled task and is not performed as every new event is collected

 by the SIEM system – if it were the system would conceivably have thousands of

Page 7: Effective Case Modeling Security Information Event Management 33319

7/23/2019 Effective Case Modeling Security Information Event Management 33319

http://slidepdf.com/reader/full/effective-case-modeling-security-information-event-management-33319 7/19

Effective Use Case Modeling for Security Information & Event Management V

!"#$%& C*6- -6*,. *99&-;;

correlations occurring at any single time. As an example, let’s assume a bank is

interested in monitoring ATM transactions so that security guards can physically

apprehend ATM users who are attempting to use stolen card numbers at its banks.

The bank has decided to maintain the logging software in a centralized location so

that all of its branches can be controlled from one system. Each ATM is configured to

send a syslog entry to the central SIEM system with the time/date stamp, the ATM

card number, and a location identifier. Under this design, the time for the SIEM

system to gather the log data would be X=0 since the system sends the data in near

real time (assuming proper network connectivity to the central location, properly

configured ATM’s, etc) and can be safely eliminated from calculation. Due to the

design of the system, it is conceivable that a correlation would be running for every

ATM the bank uses. If the bank had thousands of ATM’s, we would be burdening the

system with thousands of correlation searches. Due to the correlation load on the

SIEM, it takes 300 seconds to search the cardholder database and trigger an alert to

the location of the ATM when a match is found thus making our correlation and alert

time Y=300s. The security guard takes 60 seconds to walk outside and confront the

ATM user to make Z=60s. The final formula, presented in Figure 1, would then look

like this:

Time = N + (0) + (300s) + (60s)

Time = N + (360s)

Despite the elaborate system, bank executives wonder why fraudulent ATM use is

still occurring. By using the timeline formula from Figure 1, it is apparent that the

300 second correlation time needed by the SIEM system is too great and the ATM

user has already completed their transaction and left that bank location well before

security is notified.

To further complicate matters, legal regulations and security frameworks require the

storage of system log data from one to six years (DFR =-8"&,#0 =#*+9*&9; F%"+8,.1

?AAB; Federal Register Part II Department of Health and Human Services, 2003).

Page 8: Effective Case Modeling Security Information Event Management 33319

7/23/2019 Effective Case Modeling Security Information Event Management 33319

http://slidepdf.com/reader/full/effective-case-modeling-security-information-event-management-33319 8/19

Effective Use Case Modeling for Security Information & Event Management L

!"#$%& C*6- -6*,. *99&-;;

However, there is very little guidance on exactly what needs to be maintained and

how to quantify which log sources truly provide actionable security improvements.

These two factors lead organizations towards a path of investing in compliance

initiatives without receiving the benefits of investing in security initiatives

(Rohmeyer, 2009).

Another misconception is that event data from a SIEM will be useful “out of the

 box”. In fact, it cannot be further from the truth. As an example, on a Linux system

there are many different logging levels (Welsh, Dalheimer, Kaufman, 1999). Without

 properly tuning systems to send the relevant data to the SIEM software it will not be

 possible to gather and report on the data. A common euphemism is “garbage in,

garbage out” when dealing with collecting event data. It is critical that an

organization catalog the levels of logging needed to meet their SIEM goals.

Along the same lines as validating the types of data being sent to the SIEM solution,

an organization must understand what business use cases those data sources are

supporting. As previously discussed, sending too much data to a SIEM system will

 burden it with correlating and processing data unnecessarily, thus leading to poor

 performance which will ultimately affect the usefulness of the SIEM. In conjunction

to increasing the difficulty of achieving the goals of the SIEM, ultimately the amount

of labor spent configuring the logging sources unnecessarily is wasted labor and will

negatively affect the return on investment of the SIEM solution.

4. Method for Developing Use Cases

P$-+ 9,;8";;,+5 =RST ,# ,; ,6<%&#*+# #% "+9-&;#*+9 #$- 9,22-&-+8- >-#I--+ *

>";,+-;; ";- 8*;- *+9 * ;0;#-6 ";- 8*;-7 ! >";,+-;; ";- 8*;- ,; * 5-+-&*.

>";,+-;; &-O",&-6-+#1 ;"8$ *; [,9-+#,20 2*,.-9 .%5,+ -:-+#;\1 I$,8$ ,; >-,+5

*99&-;;-9 >0 #$- =RST ;%."#,%+ WS:*+;1 ?AAGM7 ! ;0;#-6 ";- 8*;- ,; * ;<-8,2,8

#-8$+%.%50 8%6<%+-+# ,+ #$- =RST ;0;#-6 ,#;-.21 ;"8$ *; [*.-&# %+ * 2*,.-9

P,+9%I; .%5,+ -:-+#\1 *+9 ;<-8,2,-; -]<.,8,#.0 I$*# 9*#* #$- ;0;#-6 ,;

Page 9: Effective Case Modeling Security Information Event Management 33319

7/23/2019 Effective Case Modeling Security Information Event Management 33319

http://slidepdf.com/reader/full/effective-case-modeling-security-information-event-management-33319 9/19

Effective Use Case Modeling for Security Information & Event Management ^

!"#$%& C*6- -6*,. *99&-;;

6*+,<".*#,+5 WS:*+;1 ?AAGM7 R+ 6*+0 =RST :-+9%& >&%8$"&-; #$-0 9% +%#

9,;#,+5",;$ >-#I--+ * >";,+-;; ";- 8*;- *+9 #$- 6%&- 9-#*,.-9 ;0;#-6 ";-; 8*;-;

2%& #$-,& =RST7 P$-+ ,9-+#,20,+5 +--9; 2%& * =RST *+9 ,+ #$- 2"#"&- -:*."*#,%+1

<"&8$*;,+51 *+9 ,6<.-6-+#*#,%+ <$*;-;1 ,# ,; ,6<%&#*+# #% E--< #$- ";- 8*;-

9-2,+,#,%+; #% #$- 6%;# -]<.,8,# 2%&6 <%;;,>.- *+9 9-:-.%< ;0;#-6 ";- 8*;-;7

!; *+ -]*6<.-1 *;;"6- #$-&- ,; * ";- 8*;- &-2-&&-9 #% *; [,9-+#,20 2*,.-9 .%5,+

-:-+#;\ >0 * :-+9%&7 X$- :-+9%& 8.*,6; #% <&%:,9- * &-#"&+ %+ ,+:-;#6-+# 2&%6

-.,6,+*#,+5 &,;E #% #$- %&5*+,3*#,%+ >0 *.-&#,+5 %+ &-<-*#-9 2*,.-9 .%5,+ -:-+#;7

X$,; >0 ,#;-.2 ,; +%# -*;,.0 O"*+#,2,*>.- *+9 #$-&-2%&- 9%-; +%# 6*E- * 5%%9

6-#&,8 2%& &-#"&+ %+ ,+:-;#6-+# 8*.8".*#,%+ *+9 ,; <%%&.0 *9:-&#,;-9 *; ;"8$

W_*8O",#$1 ?AALM7

F%+:-&;-.01 >0 +*&&%I,+5 #$- ;8%<- %2 #$- *6>,5"%"; ";- 8*;- [,9-+#,20 2*,.-9

.%5,+ -:-+#;\ #% * 9,&-8# ;0;#-6 &-.*#,%+;$,< ,# ,; <%;;,>.- #% 9-6%+;#&*#- ;%6-

2%&6 %2 &-#"&+ %+ ,+:-;#6-+# *+9 &,;E 6,#,5*#,%+7 ! #&".0 ";-2". 6-#&,8 8*+ >-

-22,8,-+#.0 *+9 &-<-*#-9.0 6-*;"&-9 I,#$ * $,5$ 9-5&-- %2 *88"&*80 W_*8O",#$1

?AALM7 !; *+ -]*6<.-1 ,2 * 8%6<*+0 $*9 #I% $"+9&-9 P,+9%I; ;-&:-&; *+9

;0;#-6 -:-+# .%5 6%+,#%&,+5 I*; 9-<.%0-9 %+ %+- $"+9&-9 %2 ,#; P,+9%I;

$%;#;1 ,# I%".9 >- <%;;,>.- #% O"*+#,20 #$*# UA` %2 #$- 8%6<*+0Z; ;-&:-&; I-&-

>-,+5 *8#,:-.0 6%+,#%&-9 2%& 2*,.-9 .%5,+ -:-+#;7 P$,.- #$- &,;E %2 * >&"#- 2%&8-

*##*8E ,; ;#,.. <&-;-+#1 #$- 6-#&,8 #$*# #$- 8%6<*+0 ,; 6%+,#%&,+5 UA` %2 ,#;

-+:,&%+6-+# 2%& ;"8$ *+ *##*8E 8*+ >- ";-9 #% *88"&*#-.0 ,9-+#,20 #$-

%&5*+,3*#,%+; 8%:-&*5- %2 ,#; 6%+,#%&,+5 8%+#&%.7 a-#Z; *;;"6- ,+ #$- 2%..%I,+5

;,] 6%+#$; #$- 8%6<*+0 9-<.%0; 6%+,#%&,+5 #% ,#; &-6*,+,+5 ;-&:-&; ;% ,# +%I

$*; @AA` 6%+,#%&,+5 8%:-&*5- 2%& 2*,.-9 .%5,+ -:-+#;7 X$- ,+8&-*;- ,+ #$-8%:-&*5- 6-#&,8 2&%6 UA` #% @AA` 8*+ >- ;$%I+ #% -]-8"#,:- .-:-.

6*+*5-6-+# #% 9-6%+;#&*#- #$*# #$- ;-8"&,#0 #-*6 ,; ,6<&%:,+5 #$- <&%8-;;-;

I,#$,+ #$- %&5*+,3*#,%+ *+9 #$-&->0 &-9"8,+5 &,;E1 *.#$%"5$ #$- -]*8# &-#"&+ %+

,+:-;#6-+# WJbRM ,; ;#,.. *+ *>;#&*8# O"*+#,#07

Page 10: Effective Case Modeling Security Information Event Management 33319

7/23/2019 Effective Case Modeling Security Information Event Management 33319

http://slidepdf.com/reader/full/effective-case-modeling-security-information-event-management-33319 10/19

Effective Use Case Modeling for Security Information & Event Management B

!"#$%& C*6- -6*,. *99&-;;

N;- 8*;- ;-.-8#,%+ 2%& *+ -:-+# .%55,+5 ;%."#,%+ 9-<-+9; -+#,&-.0 %+ #$- >";,+-;;

5%*. 2%& #$- #%%.7 P$,.- #$-&- *&- 6*+0 >";,+-;; 5%*.; 2%& I$,8$ -:-+# .%5

*+*.0;,; ,; ";-2". #$,; <*<-& 2%8";-; %+ ";,+5 *+ -:-+# .%55,+5 #%%. 2%& ;-8"&,#0

<"&<%;-;7

!; <*&# %2 %>#*,+,+5 #$- F-&#,2,-9 R+2%&6*#,%+ =0;#-6; =-8"&,#0 D&%2-;;,%+*.

WFR==DM 8-&#,2,8*#,%+1 ;-8"&,#0 <&%2-;;,%+*.; *&- #&*,+-9 #% <&%#-8# ,+2%&6*#,%+

2&%6 #$&-- 6*,+ #$&-*# 8*#-5%&,-;H F%+2,9-+#,*.,#01 R+#-5&,#01 *+9 !:*,.*>,.,#0

Wc&*551 ?AA?M7 X$-;- *&- 8%66%+.0 &-2-&&-9 #% *; #$- FR! #&,*9 %2 ,+2%&6*#,%+

;-8"&,#0 Wc&*551 ?AA?M7

R+ #-&6; %2 ,+2%&6*#,%+ ;-8"&,#0 ,+8,9-+# &-;<%+;-1 ;-8"&,#0 <&%2-;;,%+*.; ;$%".9

-]<-8# #% >- 8*..-9 "<%+ #% ,+:-;#,5*#- ,+8,9-+#; 2&%6 *+0 %2 #$- #$&-- FR! #&,*9

8*#-5%&,-;7 !; ;"8$1 #$- 9-:-.%<6-+# %2 ";-; 8*;-; #% #&*8E *8#,:,#,-; %+

,+2%&6*#,%+ &-;%"&8-; ;$%".9 >- 9%+- ,+ * 6*++-& #$*# *,9; ,+ ,+:-;#,5*#,+5

#$%;- #0<-; %2 ,+8,9-+#;7

X% -+*>.- #$- 9-:-.%<6-+# %2 ";-; 8*;-; * #$%&%"5$ *+9 9-#*,.-9 *+*.0;,; %2 #$-

9*#* *:*,.*>.- #% *+ %&5*+,3*#,%+ 6";# >- 9%+- <&,%& #% ;-.-8#,%+ %2 * =RST

;%."#,%+7

4.1 Dissecting Use Cases

X$- <&%<%;-9 *<<&%*8$ #% =RST 9-;,5+ ,; #$- X%<Y)%I+ c%##%6YN< T,99.-Y

b"# *<<&%*8$ *>>&-:,*#-9 *; X)cNTb W<&%+%"+8-9 !"##$%&'()M7 X$&%"5$

#$,; 9-;,5+ 6-#$%9 * >";,+-;; <&%>.-6 ,; 9-2,+-9 ,+#% $%I ,# 8*+ >-

*88%6<.,;$-9 >0 ;#*&#,+5 *# #$- #%<1 #$- >%##%61 #$-+ I%&E,+5 2&%6 #$-;$%&#-;# <*#$ 2%"+9 ,+ #$- 6,99.- #% #$- %"#-&6%;# -95-;7

X% 9-6%+;#&*#- ";,+5 #$- X)cNTb <&%8-;; 2%& =RST 9-;,5+1 .-#Z; *;;"6- *+

%&5*+,3*#,%+ $%;#; * <%<".*& S+#-&<&,;- J-;%"&8- D.*++,+5 WSJDM *<<.,8*#,%+

2%& ,#; 8";#%6-&;1 *+9 *; ;"8$ $*; * 8%+;,9-&*>.0 .*&5- *+9 9,:-&;-

Page 11: Effective Case Modeling Security Information Event Management 33319

7/23/2019 Effective Case Modeling Security Information Event Management 33319

http://slidepdf.com/reader/full/effective-case-modeling-security-information-event-management-33319 11/19

Effective Use Case Modeling for Security Information & Event Management @

 

!"#$%& C*6- -6*,. *99&-;;

#-8$+%.%50 >*;- 2%& I$,8$ ,# ,; &-;<%+;,>.-7 X% >- 8%6<.,*+# I,#$ dRD!! *+9

DFR #$- %&5*+,3*#,%+ $*; 9-#-&6,+-9 ,# +--9; #% 9-<.%0 * ;0;#-6 #% &-:,-I

*+9 8%&&-.*#- ,#; ;0;#-6 .%5;7 X$- %&5*+,3*#,%+ $*; +% -],;#,+5 .%55,+5

<&%8-;;-; ,+ <.*8- 8"&&-+#.07

4.1.1 Top Down

R+ #$- X%< )%I+ :,-I %2 #$- =RST ;%."#,%+1 #$- 5%*. ,; #% "+9-&;#*+9 $%I

9*#* I,.. 2.%I ,+#% #$- ;0;#-6 ,#;-.27 R2 #$- =RST 9-;,5+ ,; *<<&%*8$-9 >0

:,-I,+5 ,# *; * #&-- 5&*<$1 #$- =RST ;%."#,%+ I%".9 >- #$- &%%# +%9-7 /&%6

#$-&-1 * :-&0 $,5$ .-:-. :,-I 8*+ >- >&%E-+ ,+#% 6".#,<.- 8*#-5%&,-; >0

5&%"<,+5 .,E- ;0;#-6; >*;-9 %+ $%I 9*#* I,.. 2.%I ,+#% ,#7 R+ #$- -]*6<.- %2

#$- SJD $%;#,+5 8%6<*+01 #$&-- 9,22-&-+# 8*#-5%&,-; 8*+ >- ";-9H P,+9%I;1

N+,]1 *+9 C-#I%&E7 D,8#%&,*..01 #$- %&5*+,3*#,%+ 8*+ &-<&-;-+# #$-,& 2--9;

,+#% #$- =RST 8.%"91 I$,8$ &-6*,+; *>;#&*8# ;,+8- #$- 9-;,5+ ,; :-+9%&

,+9-<-+9-+# *# #$,; ;#*5-1 *; ;$%I+ ,+ /,5"&- ?7

!"#$%& )

Page 12: Effective Case Modeling Security Information Event Management 33319

7/23/2019 Effective Case Modeling Security Information Event Management 33319

http://slidepdf.com/reader/full/effective-case-modeling-security-information-event-management-33319 12/19

Effective Use Case Modeling for Security Information & Event Management @

 

!"#$%& C*6- -6*,. *99&-;;

!; /,5"&- ? ;$%I;1 ;,6,.*& ;0;#-6; $*:- >--+ 5&%"<-9 #%5-#$-& ,+#% *

6*+*5-*>.- +"6>-& %2 8*#-5%&,-;7 /&%6 $-&-1 ,# ,; <%;;,>.- #% &-9"8- -*8$

9,:,;,%+ 2"&#$-& ,+#% ,#; "+,O"- ;0;#-6; "+#,. #$- #&-- 5&*<$ $*; >--+ 2,..-9

%"# I,#$ #$- 8%&&-8# +"6>-& %2 .-*:-; I$-&- -*8$ .-*2 ,; #$- 9,22-&-+# #0<- %2

.%5; #$*# -],;# %+ #$*# ;0;#-67 C%#-' c-I*&- %2 #$- +*#"&*. #-+9-+80 #% 5&%"<

;,6,.*& ;0;#-6; ,+ #$- 2,&;# 2-I .-:-.; %2 #$- #&--7 S:-+ #$%"5$ ;%6- ;0;#-6;

6*0 >- :-&0 ;,6,.*&1 ;"8$ *; * P,+9%I; ?AAA =-&:-& *+9 P,+9%I; ?AAK

=-&:-&1 ,# ,; 8&,#,8*. #% ;-<*&*#- #$-6 ,+#% 9,22-&-+# 8*#-5%&,-; *# #$,; ;#*5-7 !;

*+ -]*6<.-1 P,+9%I; ?AAA 9%-; +%# ;"<<%&# PTR 8*..; 2%& -:-+# .%5

8%..-8#,%+ I$,.- * P,+9%I; ?AAK ;0;#-6 9%-;7 e&%"<,+5 #$-;- ;0;#-6; 8*+

8*";- 9-;,5+ *+9 8%..-8#,%+ ,;;"-; .*#-& 9"&,+5 * =RST 9-<.%06-+# *; #$-,&

8%..-8#,%+ 6-#$%9; I,.. #$-+ >- ,+8%6<*#,>.-7 a,E-I,;-1 #$- P,+9%I; *+9

N+,] >*;-9 ;0;#-6; I-&- ;-<*&*#-9 ;,+8- *+ *5-+# ,; #0<,8*..0 9-;,5+-9 #%

&"+ %+ -,#$-& P,+9%I; %& NCRf1 >"# +%# >%#$7

b+8- * <,8#%&,*. 6%9-. ,; 6*9- %2 $%I 9*#* I,.. 2.%I ,+#% #$- =RST ;%."#,%+

#&*+;<%&# 6-#$%9; 6";# >- *;;,5+-9 #% -*8$ %2 #$-67 R+ #$,; 8*;-1 .%5 2,.-;

&-;,9- %+ #$- P,+9%I; *+9 NCRf ;0;#-6; I$,8$ 6";# >- &-*9 *+9 ;-+# #% #$-

=RST ;%."#,%+7 X0<,8*..01 PTR 8*..; I,.. >- ";-9 %+ #$- P,+9%I; ;-&:-&; *+9

* 8%6>,+*#,%+ %2 *5-+# %& ;0;.%5 2--9 I,.. >- ";-9 2%& #$- NCRf ;-&:-&;7 /%&

#$- C-#I%&E 9-:,8-; #$- ;#*+9*&9 ;0;.%5 %"#<"# I,.. >- ";-97

b+8- #$- #&*+;<%&# 6-#$%9 $*; >--+ 9-#-&6,+-91 *; I-.. *; #$- *;;%8,*#-9

+-#I%&E <%&# &-O",&-6-+#;1 ,# ,; ,6<%&#*+# #% &-:,-I #$- +-#I%&E #%<%.%50 ,+

<.*8- I$-&- #$- ;-&:-&; &-;,9-7 R2 #$-&- *&- 2,&-I*..; *+9Q%& )TgZ; >-#I--+

#$- =RST ;%."#,%+ *+9 #$- ;-&:-&;1 I$,8$ ,; ";"*..0 #$- 8*;-1 %2#-+#,6-;8%..-8#,%+ 6-#$%9; I,.. +--9 #% >- :*.,9*#-97 !; *+ -]*6<.-1 #$- >*;,8 PTR

,6<.-6-+#*#,%+ 2%"+9 ,+ P,+9%I; ?AAK *+9 P,+9%I; ?AA^ =-&:-&; "#,.,3-;

* &*+9%6 $,5$ <%&# W5&-*#-& #$*+ @A?G XFDM 2%& ,#; 8%66"+,8*#,%+ WC-.;%+1

@BB^M7 X$,; ,+ -22-8# &-O",&-; #$*# ,+#-&+*. 2,&-I*..; *..%I 8-&#*,+ &*+5-; %2

$,5$ <%&#; 2&%6 #$- =RST ;%."#,%+ #% %#$-& ;-&:-&; %+ #$- +-#I%&E *+9

Page 13: Effective Case Modeling Security Information Event Management 33319

7/23/2019 Effective Case Modeling Security Information Event Management 33319

http://slidepdf.com/reader/full/effective-case-modeling-security-information-event-management-33319 13/19

Effective Use Case Modeling for Security Information & Event Management @

 

!"#$%& C*6- -6*,. *99&-;;

8&-*#-; * ;-8"&,#0 <*&*9%] *; 2,&-I*.. &".-; 6";# >- %<-+-91 *+9 #$-&-2%&-

#$- ;-8"&,#0 <%;#"&- &-.*]-91 #% 5*#$-& #$- 9*#*7 F%+:-&;-.01 #$,; 8*+ >-

;%.:-9 >0 &"++,+5 * :-+9%& ;<-8,2,8 PTR ;-&:,8- %& "#,.,3,+5 *+ *5-+# #% <";$

#$- .%5; #% #$- =RST ;%."#,%+7

4.1.2 Bottom Up

X$- c%##%6 N< *+*.0;,; ;#*&#; *# #$- >%##%6 %2 #$- <,8#%&,*. 5&*<$ ,9-+#,2,-9

,+ /,5"&- ? *+9 I%&E; ,#; I*0 "<7 !; ;$%I+ ,+ /,5"&- ?1 #$- .%I-;# .-*:-; %+

#$- 5&*<$ *&- #$- ;<-8,2,8 .%5 #0<-; 2%"+9 ,+ #$- -+:,&%+6-+#7 /%& -]*6<.-1

#$- %&5*+,3*#,%+ E+%I; #$*# ,#; P,+9%I; ?AAK ;-&:-&; $*:- * 8%6>,+*#,%+ %2

=0;#-61 !<<.,8*#,%+1 =-8"&,#01 RR=1 *+9 S]8$*+5- .%5; <&-;-+# %+ #$-67 C%#

-:-&0 ;-&:-& I,.. $*:- *.. %2 #$%;- .%5;1 >"# I$-+ .%%E,+5 *# *+0 ;-&:-&

&"++,+5 P,+9%I; ?AAK1 #$- %&5*+,3*#,%+ 8*+ 8$-8E #% :*.,9*#- #$*# -*8$ %2

#$%;- .%5; ,; >-,+5 .%%E-9 2%&7 T%&- ;<-8,2,8*..01 ,# ,; <%;;,>.- #% 9% *+

*+*.0;,; %+ -]*8#.0 I$*# 9*#* <%,+#; *&- ,+ #$%;- .%5 #0<-;7

S*8$ <,-8- %2 ,+2%&6*#,%+ ,+ * .%5 2,.-1 ;"8$ *; *+ RD !99&-;;1 ,; #-&6-9 * #*!*

 ,)-.! 7 S:-&0 .%5 2,.- ,; 6*9- "< %2 %+- %& 6%&- 9*#* <%,+#;7 X$-;- 9*#* <%,+#;

<&%:,9- #$- >*8E>%+- 2%& -:-+# 8%&&-.*#,%+7 /%& -]*6<.-1 ,+ #$- P,+9%I;

?AAK RR= .%5;1 #$- RD !99&-;; %2 #$- 8%++-8#,+5 ";-& ,; &-8%&9-9 ,+ %+- %2 #$-

2,-.9;7 =,6,.*&.01 ,+ #$- !<*8$- .%5; 2%"+9 %+ #$- =%.*&,; @A ;-&:-&;1 *+ RD

!99&-;; 2,-.9 ,; *.;% <&-;-+#7 P$-+ #I% 9*#* <%,+#; 8%+#*,+ #$- ;*6- #0<- %2

9*#*1 #$,; ,; #-&6-9 *; * /)00-1-).7 F%..,;,%+; *&- #$- >*;,; %2 8%&&-.*#,%+ ,+ #$*#

I$-+ *+ -:-+# 6*#8$-; ,+ #$- RR= .%5;1 ,# 6*0 *.;% >- 9-#-8#-9 ,+ #$- !<*8$-

.%5;7 F%+:-&;-.01 * ";-&+*6- *+9 *+ RD !99&-;; I%".9 +%# >- * 8%..,;,%+ *;

#$-0 *&- 9,22-&-+# 9*#* <%,+#; &-5*&9.-;; %2 #$- .%5 ;%"&8-7

)"&,+5 #$- c%##%6 N< *+*.0;,;1 #$- %&5*+,3*#,%+ ,6<.-6-+#,+5 #$- =RST

6";# 8*#*.%5 #$- 9,22-&-+# 8$*&*8#-&,;#,8; %2 ,#; .%5 2,.-;7 =-:-&*. ";-2".

8$*&*8#-&,;#,8; *&- .,;#-9 ,+ #$- #*>.- >-.%I7

Page 14: Effective Case Modeling Security Information Event Management 33319

7/23/2019 Effective Case Modeling Security Information Event Management 33319

http://slidepdf.com/reader/full/effective-case-modeling-security-information-event-management-33319 14/19

Effective Use Case Modeling for Security Information & Event Management @

 

!"#$%& C*6- -6*,. *99&-;;

a%5 2,.- +*6-

a%5 2,.- 9-;8&,<#,%+

a%5 2,.- .%8*#,%+

a%5 :-&>%;,#0 .-:-.

a%5 ;,3- *:-&*5-

a%5 #0<-

)*#* <%,+#;

!<<.,8*#,%+ +*6-

!<<.,8*#,%+ :-&;,%+

b<-&*#,+5 =0;#-6

J%#*#,%+ 2&-O"-+80 J-*.Y#,6-1 $%"&.01 9*,.01 -#8

a%5 ;#*+9*&9 9-2,+-9 a,+E #% #$- %<-&*#,+5 <&%8-9"&-

b+8- *.. #$- 9,22-&-+# #0<-; %2 .%5 2,.-; *&- 8*#-5%&,3-91 ,# ,; +-8-;;*&0 #%

9-#-&6,+- I$*# 9*#* <%,+#; *&- ,+ #$-67 /%& #$,; ;#-<1 :-+9%& 9%8"6-+#*#,%+

8*+ >- ";-9 #% 9-#-&6,+- -]*8#.0 $%I #$- .%5 2,.-; *&- 8%6<&,;-9 *+9 I&,##-+7

X$- ;<-8,2,8 9*#* <%,+#; 2%"+9 ,+ -*8$ .%5 I,.. ;-&:- *; #$- >*;,; 2%& ";- 8*;-

*+*.0;,; ,+ #$- T,99.-Yb"# ;-8#,%+ %2 #$,; <*<-&7

P$-+ 8*#-5%&,3,+5 #$- .%5 ;#&"8#"&-; #$- .%5 :-&>%;,#0 .-:-. ,; <*&#,8".*&.0

,6<%&#*+#7 !; 9,;8";;-9 <&-:,%";.01 6*+0 *<<.,8*#,%+; .%5 8-&#*,+ .-:-.; %2

9-#*,. >*;-9 %+ #$-,& :-&>%;,#0 ;-##,+5;7 d*:,+5 #%% 6"8$ %& #%% .,##.- 9-#*,. ,+

#$- *<<.,8*#,%+ .%5 2,.- 8*+ >- *; 9-#&,6-+#*. #% &"++,+5 * =RST -22-8#,:-.0 *;

$*:,+5 +% .%5 *# *..7 R# ,; ,6<%&#*+# #% <-&2%&6 *+ *+*.0;,; *# #$- 6%;# :-&>%;-

;-##,+5 2%& #$- *<<.,8*#,%+ #$-+ 5&*9"*..0 >*8E 9%I+ #$- ;-##,+5 "+#,. %+.0 #$-

&-O",&-9 9*#* <%,+#; *&- <&-;-+#7 R+ 6%;# 8*;-;1 ;%6- h"+E 9*#* <%,+#; I,..

;#,.. >- <&-;-+# >"# >0 -.,6,+*#,+5 6*+0 %2 #$-6 <&,%& #% 8%..-8#,%+1 #$- =RST

;%."#,%+1 &-5*&9.-;; %2 :-+9%&1 I,.. &"+ 6"8$ 6%&- -22,8,-+#.0 *+9 #$-

&-;%"&8-; &-O",&-9 #% &"+ ,# I,.. >- 6"8$ ;6*..-&7

Page 15: Effective Case Modeling Security Information Event Management 33319

7/23/2019 Effective Case Modeling Security Information Event Management 33319

http://slidepdf.com/reader/full/effective-case-modeling-security-information-event-management-33319 15/19

Effective Use Case Modeling for Security Information & Event Management @

 

!"#$%& C*6- -6*,. *99&-;;

)"&,+5 =RST :-+9%& ;-.-8#,%+1 ,# ,; :-&0 ,6<%&#*+# #% *+*.03- $%I #$- =RST

;%."#,%+ I,.. &-*9 ,+ #$- <*&#,8".*& .%5 #0<-;7 C%# *.. .%5 <*&;-&; *&- 8&-*#-9

-O"*. *+9 ,+ 6*+0 ,+;#*+8-; 8$*+5-; #% #$- .%5 2%&6*#; %88"& I$-+ +-I

:-&;,%+; %2 *<<.,8*#,%+; *&- &-.-*;-97 X$,; I,.. &-;".# ,+ #$- =RST ;%."#,%+;

<*&;,+5 <*##-&+; #% +% .%+5-& 6*#8$ #$- 9*#* >-,+5 &-#&,-:-9 *+9 ,+ -22-8# #$-

=RST ;%."#,%+Z; 8%&&-.*#,%+ *>,.,#0 $*; >--+ 6*&5,+*.,3-9 %& *# .-*;# &-9"8-97

/%& #$,; &-*;%+ ,# ,; 8&,#,8*. #$*# *+ =RST ;%."#,%+ 6*,+#*,+ * :,-I ,+#% #$-

"+<*&;-9 *+9 %&,5,+*..0 &-#&,-:-9 .%5 2,.-7 =RST <*&;,+5 8*++%# *.I*0; >-

&-.,-9 "<%+ #% *9-O"*#-.0 +%&6*.,3- *+9 *+*.03- .%5 9*#* 2%& #$,; &-*;%+1

$%I-:-&1 #$- "+Y+%&6*.,3-9 *+9 "+6%9,2,-9 #-]# ;#&,+5; >-,+5 8*<#"&-9 8*+

>- ;-*&8$-9 *+9 *+*.03-9 ,2 #$- =RST %<-&*#%&; "+9-&;#*+9 I$,8$ 9*#*

<%,+#; *&- <&-;-+# ,+ #$%;- .%5;7

4.1.3 Middle Out

R+ #$- T,99.- b"# <%&#,%+ %2 #$- 9-;,5+ <&%8-;;1 #$- 5%*. ,; #% #*E- #$- 9*#*

<%,+#; 9-#-&6,+-9 ,+ #$- c%##%6 N< <$*;- *+9 6*#8$ #$-6 #% ";- 8*;-;

*8&%;; #$- 9,22-&-+# ;0;#-6; 2%"+9 ,+ #$- -+#-&<&,;-7 c0 .%%E,+5 *# #$-

8%6<.-#- .,;# %2 9*#* <%,+#;1 ,# ,; :-&0 -*;0 #% 8%+;#&"8# ";- 8*;-; 2&%6 #$-

9*#* #% ;"<<%&# *+ %>h-8#,:-7 /%& -]*6<.-1 .-#Z; *;;"6- #$- SJD $%;#,+5

8%6<*+0 I*+#; #% #&*8E 2*,.-9 .%5,+ *##-6<#;7 c0 &-2-&-+8,+5 #$- 9*#* 2&%6

#$- c%##%6 N< <%&#,%+ %2 #$- 9-;,5+1 *.. %2 #$- .%8*#,%+; %2 ";-&+*6- *+9 RD

!99&-;; 8*+ >- 9-#-&6,+-9 &-5*&9.-;; %2 #$- ;0;#-6 %& .%5 #0<-7 /&%6 #$-&-1

,# ,; * &-.*#,:-.0 ;,6<.- -]-&8,;- #% I&,#- * 8%&&-.*#,%+ &".- ,+ #$- =RST

;%."#,%+ 2%& *.. #$- ,9-+#,2,-9 9*#* ;%"&8-;7

)"&,+5 ";- 8*;- *+*.0;,;1 ,# ,; %2 :*."- #% #&*8E *.. %2 #$- ";-; 8*;-; 9-:-.%<-9*88%&9,+5 #% #$- 2%..%I,+5 2,-.9;7

N;- 8*;- +*6-

N;- 8*;- 9-;8&,<#,%+

Page 16: Effective Case Modeling Security Information Event Management 33319

7/23/2019 Effective Case Modeling Security Information Event Management 33319

http://slidepdf.com/reader/full/effective-case-modeling-security-information-event-management-33319 16/19

Effective Use Case Modeling for Security Information & Event Management @

 

!"#$%& C*6- -6*,. *99&-;;

)*#* <%,+#; &-O",&-9

R6<%&#*+8-

J-O",&-9 ;<--9

!.-&# T-#$%9

!.-&# %"#<"# 2%&6*#

X$-&- *&- 6*+0 6-#$%9; >0 I$,8$ #% *+*.03- *+9 9-:-.%< ";- 8*;-;7 X$-

6%;# -22-8#,:- 6-#$%9; I,.. :*&0 2&%6 %&5*+,3*#,%+ #% %&5*+,3*#,%+ >"# *

;#*&#,+5 <%,+# 2%& *.. %&5*+,3*#,%+; ,; #$- ;*6- i *;E,+5 #$- O"-;#,%+ I$*# ,;

,6<%&#*+# #% 6*,+#*,+ * <&%2,#*>.- >";,+-;; 6%9-. *+9 #% &-9"8- &,;E #% #$*#

6%9-.j

R+ *.. ,+;#*+8-; ";- 8*;-; I,.. 2*.. ,+#% %+- %2 #$- #$&-- FR! X&,*9 8*#-5%&,-; i

F%+2,9-+#,*.,#01 R+#-5&,#01 %& !:*,.*>,.,#07 R+ #$- 8*;- %2 #$- SJD $%;#,+5

8%6<*+0 ";-9 *; *+ -]*6<.- *>%:-1 *.. #$&-- %2 #$- 8*#-5%&,-; *&- ,6<%&#*+#

*; *.. %2 #$-6 &-2.-8# * ;,5+,2,8*+# >";,+-;; &,;E I$-#$-& ,# >- * 9*#* >&-*8$1

-6<.%0--; 6%9,20,+5 9*#* I,#$%"# *"#$%&,3*#,%+1 %& ;0;#-6 %"#*5-; I$,8$

I%".9 *22-8# * 8";#%6-&Z; ;-&:,8- .-:-. *5&--6-+# *+9 #$"; -]<%;- #$-

>";,+-;; #% "++--9-9 2,+*+8,*. .%;;-;7

X% 9-:-.%< #$- <&%<-& ";- 8*;-; * ;#&%+5 <*&#+-&;$,< I,#$ #$- ,+9,:,9"*.

>";,+-;; "+,#; 6";# >- 2%&5-97 R# ,; ,6<%&#*+# #% .-# #$- >";,+-;; "+,#; $*:-

;%6- ;#*E- ,+ #$- =RST <&%h-8# *; ,# ,; #$-,& ,+2%&6*#,%+ I$,8$ ,; >-,+5

<&%#-8#-97 c";,+-;; "+,# >"0Y,+ #% #$- =RST ;%."#,%+ I,.. *.;% $-.< I,#$

*8O",&,+5 #$- +--9-9 8*<,#*. -]<-+9,#"&- 9%..*& *6%"+#; #% 6*E- *+

,6<.-6-+#*#,%+ ;"88-;;2".7 N+9-&2"+9,+5 * =RST 9-<.%06-+# ,; *.6%;# *;

9-#&,6-+#*. *; +%# $*:,+5 #$- 8%&&-8# .%5 *+*.0;,; <-&2%&6-97

Page 17: Effective Case Modeling Security Information Event Management 33319

7/23/2019 Effective Case Modeling Security Information Event Management 33319

http://slidepdf.com/reader/full/effective-case-modeling-security-information-event-management-33319 17/19

Effective Use Case Modeling for Security Information & Event Management @

 

!"#$%& C*6- -6*,. *99&-;;

5. Conclusion

X$- ,6<.-6-+#*#,%+ %2 =RST ;%."#,%+; #% 8%..-8#1 ;#%&-1 *+9 6*E- -22,8,-+# ";- %2

-:-+# .%5 9*#* #% 6--# ;-8"&,#0 *+9 8%6<.,*+8- 5%*.; ,; * 8&,#,8*. %>h-8#,:- 2%& *.6%;#

-:-&0 ;-8"&,#0 #-*61 -;<-8,*..0 #$%;- I,#$ &-5".*#,%+; I$,8$ ;#,<".*#- .%5 &-:,-I *;

* &-O",&-9 8%6<%+-+# %2 #$-,& ;-8"&,#0 <&%5&*67 )-;<,#- #$- 6*+0 8$*..-+5-; %2

,6<.-6-+#,+5 * =RST ;%."#,%+1 *+ %&5*+,3*#,%+ 8*+ >- ;"88-;;2". ,2 #$- %&5*+,3*#,%+

"+9-&;#*+9; $%I #$- =RST ;%."#,%+ I,.. 8%66"+,8*#- *+9 5*#$-& 9*#*1 I$*# 9*#* ,;

*:*,.*>.- ,+ #$- .%5; ,# E--<;1 *+9 * 9-#*,.-9 "+9-&;#*+9,+5 %2 I$*# ";- 8*;-; >-;#

6*E- "< #$- &-*;%+ 2%& #$- ;">;#*+#,*. ,+:-;#6-+# ,+ *+ =RST ;%."#,%+7

X$- X%<Y)%I+ c%##%6YN< T,99.-Yb"# WX)cNTbM <&%8-;; %2 =RST 9-;,5+ <&%:,9-;#$- +-8-;;*&0 ,+2%&6*#,%+ #% *+0 %&5*+,3*#,%+ ,6<.-6-+#,+5 *+0 =RST ;%."#,%+7 R+

6*+0 ,+;#*+8-;1 %&5*+,3*#,%+; 5% #$&%"5$ 6".#,<.- =RST 9-<.%06-+#; #% *&&,:- *#

#$- ;*6- .-:-. %2 "+9-&;#*+9,+5 *; #$- X)cNTb <&%8-;; <&%:,9-; >"# I,#$

;,5+,2,8*+#.0 6%&- -22%&#1 6%&- 2,+*+8,*. ,+:-;#6-+#1 *+9 6%&- &-;%"&8- "#,.,3*#,%+7

!; 6-+#,%+-9 <&-:,%";.01 [5*&>*5- ,+1 5*&>*5- %"#\ ,; %2#-+ ";-9 #% 9-;8&,>- =RST

8%&&-.*#,%+7 !; ,# ,; I,#$ 8%&&-.*#,%+1 <%%& *+*.0;,; *+9 <%%& <.*++,+5 I,.. %+.0 &-;".#

,+ <%%& =RST 8%:-&*5- *+9 <-&2%&6*+8-1 ,7-71 [5*&>*5- ,+1 5*&>*5- %"#\7

References

Jaquith, Andrew. (2007). Security Metrics. Upper Saddle River, NJ: Addison-Wesley

Professional.

Peikari, Cyrus & Chuvakin, Anton. (2004). Security Warrior . Sebastopol, CA: O’Rielly

and Associates.

Welsh, Matt, Dalheimer, Matthias Kalle, & Kaufman, Lar. (1999). Running Linux, Third

 Edition. Sebastopol, CA: O’Rielly and Associates.

Page 18: Effective Case Modeling Security Information Event Management 33319

7/23/2019 Effective Case Modeling Security Information Event Management 33319

http://slidepdf.com/reader/full/effective-case-modeling-security-information-event-management-33319 18/19

Effective Use Case Modeling for Security Information & Event Management @

 

!"#$%& C*6- -6*,. *99&-;;

Contos, Brian T., Crowell, William P., DeRodeff, Colby, Dunkel, Dan, & Cole, Eric.

(2007). Physical and Logical Security Convergence. Burlington, MA: Syngress

Publishing, Inc.

Strunk, William Jr. & White, E. B. The Elements of Style. New York, NY: Longman

Bragg, Roberta. (2002). Cissp - certified information systems security professional . Que

Publishing.

Federal Register Part II Department of Health and Human Services, Office

of the Secretary 45 CFR Parts 160, 162, and 164. Health Insurance

 Reform: Security Standards; Final Rule. (2003, February). Retrieved from 

http://aspe.hhs.gov/admnsimp/FINAL/FR03-8334.pdf  

PCI Security Standards Council. (2009, July). Payment Card Industry Data Security

Standard Version 1.2.1, Retrieved from

https://www.pcisecuritystandards.org/security_standards/download.html?id=pci_d

ss_v1-2.doc 

Evans, G. (2004, July). Getting from use cases to code, part 1: use-case analysis.

Retrieved from http://www.ibm.com/developerworks/rational/library/5383.html 

Rohmeyer, P. (2009, November). Standards compliance does not equal sound

information security risk management . Retrieved from

http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci137355

8_mem1,00.html 

 Nelson, M. (1998, June). Using Distributed COM with Firewalls. Retrieved from

http://msdn.microsoft.com/en-us/library/ms809327.aspx 

Page 19: Effective Case Modeling Security Information Event Management 33319

7/23/2019 Effective Case Modeling Security Information Event Management 33319

http://slidepdf.com/reader/full/effective-case-modeling-security-information-event-management-33319 19/19

Last Updated: October 5th, 2015

Upcoming SANS TrainingClick Here for a full list of all Upcoming SANS Events by Location

SANS Tysons Corner 2015 Tysons Corner, VAUS Oct 12, 2015 - Oct 17, 2015 Live Event

SANS Gulf Region 2015 Dubai, AE Oct 17, 2015 - Oct 29, 2015 Live Event

SANS Tokyo Autumn 2015 Tokyo, JP Oct 19, 2015 - Oct 31, 2015 Live Event

SANS Cyber Defense San Diego 2015 San Diego, CAUS Oct 19, 2015 - Oct 24, 2015 Live Event

SANS South Florida 2015 Fort Lauderdale, FLUS Nov 09, 2015 - Nov 14, 2015 Live Event

SANS Sydney 2015 Sydney, AU Nov 09, 2015 - Nov 21, 2015 Live Event

SANS London 2015 London, GB Nov 14, 2015 - Nov 23, 2015 Live Event

Pen Test Hackfest Summit & Training Alexandria, VAUS Nov 16, 2015 - Nov 23, 2015 Live Event

SANS Hyderabad 2015 Hyderabad, IN Nov 24, 2015 - Dec 04, 2015 Live Event

SANS San Francisco 2015 San Francisco, CAUS Nov 30, 2015 - Dec 05, 2015 Live Event

SANS Cape Town 2015 Cape Town, ZA Nov 30, 2015 - Dec 05, 2015 Live Event

Security Leadership Summit & Training Dallas, TXUS Dec 03, 2015 - Dec 10, 2015 Live Event

SANS Cyber Defense Initiative 2015 Washington, DCUS Dec 12, 2015 - Dec 19, 2015 Live Event

SOS: SANS October Singapore 2015 OnlineSG Oct 12, 2015 - Oct 24, 2015 Live Event

SANS OnDemand Books & MP3s OnlyUS Anytime Self Paced