1
Maintaining a proactive monitoring of a technical and functional infrastructure is a continuing challenge for executives and professionals in information security. Developing the ability to anticipate events and demanding IT insecurity scenarios are permanent tests that question the more elaborate models for the protection of information. In this context, having the security-alert information generated in different parts of our infrastructure and knowing firsthand the security events that occur with the constant interaction of different systems and their participants are urgent needs for proper information security management today. For this reason, David Miller, Allan Sharper, Chris Blask and Stephen VanDyke presented in this book a strategic and tactical review of deployment systems for monitoring, control and security event correlation, with the aim of generating incident-response capacity and proactive alerts and providing information security managers with a more active posture against the challenges of the complex attacks and failures of the IT available. Security Information and Event Management Implementation presents analysis of major monitoring solutions, such as event correlation OSSIM, Cisco MARS, ArcSight and Q1 Labs QRadar. For each solution, the book details its technical characteristics and key elements for implementation, with special emphasis on specific considerations to configuration. Similarly, there is a section in which the authors present elements to develop business intelligence using security information and event management (SIEM) solutions to understand and analyze the changes and evolution of infrastructure and information systems, integrating information from different sources and developing compliance and an effective security posture. The book can be useful for specialists in information security as well as for information systems auditors, as it allows readers to develop and review policy frameworks to ensure reliable operation with known levels of traceability and control. IT managers and information security executives facing national and international regulatory and compliance requirements, as well as those who are required to ensure a proactive position to anticipate potential security incidents, can find in this publication SIEM practices with concrete tools to protect enterprise information in an open and interconnected way. EDITOR’S NOTE Security Information and Event Management Implementation is available from the ISACA Bookstore. For information, see the ISACA Bookstore Supplement in this Journal, visit www.isaca.org/bookstore, e-mail [email protected] or telephone +1.847.660.5650. ISACA has issued Security Information and Event Management: Business Benefits and Security, Governance and Assurance Perspective, a white paper available at www.isaca.org/whitepapers. By David Miller, Allan Sharper, Stephen VanDyke and Chris Blask Reviewed by Jeimy J. Cano M., Ph.D., CFC, CFE, CMAS, distinguished professor in the law department of the Universidad de los Andes, Colombia. He has been a practitioner and researcher in information and computer security and in computer forensics for more than 15 years in different industries. Cano is a member of ISACA’s Publications Subcommittee. Security Information and Event Management Implementation 1 ISACA JOURNAL VOLUME 4, 2011 Developing the ability to anticipate events and demanding IT insecurity scenarios are permanent tests that question the more elaborate models for the protection of information. Do you have something to say about this article? Visit the Journal pages of the ISACA web site (www.isaca.org/journal), find the article, and choose the Comments tab to share your thoughts.

Security Information and Event Management … · Security Information and Event ... OSSIM, Cisco MARS, ArcSight and Q1 Labs QRadar. For each solution, the ... can find in this publication

Embed Size (px)

Citation preview

Page 1: Security Information and Event Management … · Security Information and Event ... OSSIM, Cisco MARS, ArcSight and Q1 Labs QRadar. For each solution, the ... can find in this publication

Maintaining a proactive monitoring of a technical and functional infrastructure is a continuing challenge for executives and professionals in information security. Developing the ability to anticipate events and demanding IT insecurity scenarios are permanent tests that question the

more elaborate models for the protection of information. In this context, having the security-alert information generated in different parts of our infrastructure and knowing firsthand the security events

that occur with the constant interaction of different systems and their participants are urgent needs for proper information security management today.

For this reason, David Miller, Allan Sharper, Chris Blask and Stephen VanDyke presented in this book a strategic and tactical review of deployment systems for monitoring, control and security event correlation, with the aim of generating incident-response capacity and proactive alerts and providing information security managers with a more active posture against the challenges of the complex attacks and failures of the IT available.

Security Information and Event Management Implementation presents analysis of major monitoring solutions, such as event correlation OSSIM, Cisco MARS, ArcSight and Q1 Labs QRadar. For each solution, the book details

its technical characteristics and key elements for implementation, with special emphasis on specific considerations to configuration.

Similarly, there is a section in which the authors present elements to develop business intelligence using security information and event management (SIEM) solutions to understand and analyze the changes and evolution of infrastructure and information systems, integrating information from different sources and developing compliance and an effective security posture.

The book can be useful for specialists in information security as well as for information systems auditors, as it allows readers to develop and review policy frameworks to ensure reliable operation with known levels of traceability and control.

IT managers and information security executives facing national and international regulatory and compliance requirements, as well as those who are required to ensure a proactive position to anticipate potential security incidents, can find in this publication SIEM practices with concrete tools to protect enterprise information in an open and interconnected way.

Editor’s NotESecurity Information and Event Management Implementation is available from the ISACA Bookstore. For information, see the ISACA Bookstore Supplement in this Journal, visit www.isaca.org/bookstore, e-mail [email protected] or telephone +1.847.660.5650. ISACA has issued Security Information and Event Management: Business Benefits and Security, Governance and Assurance Perspective, a white paper available at www.isaca.org/whitepapers.

By david Miller, Allan

sharper, stephen Vandyke

and Chris Blask

reviewed by Jeimy J. Cano

M., Ph.d., CFC, CFE, CMAs,

distinguished professor in

the law department of the

Universidad de los Andes,

Colombia. He has been a

practitioner and researcher

in information and computer

security and in computer

forensics for more than 15

years in different industries.

Cano is a member of ISACA’s

Publications Subcommittee.

Security Information and Event Management Implementation

1ISACA JOURNAL VOLUME 4, 2011

“Developing the ability to anticipate events and demanding IT insecurity scenarios are permanent tests that question the more elaborate models for the protection of information.

do you have something to say about this article?

Visit the Journal pages of the ISACA web site (www.isaca.org/journal), find the article, and choose the Comments tab to share your thoughts.