Security Monitoring with Cisco Security MARS
暫譯: 使用 Cisco Security MARS 進行安全監控
Gary Halleen, Greg Kellogg
- 出版商: Cisco Press
- 出版日期: 2007-07-16
- 售價: $2,450
- 貴賓價: 9.5 折 $2,328
- 語言: 英文
- 頁數: 336
- 裝訂: Paperback
- ISBN: 1587052709
- ISBN-13: 9781587052705
-
相關分類:
Cisco、資訊安全
立即出貨 (庫存=1)
買這商品的人也買了...
-
$580$493 -
$450$383 -
$450$383 -
$580$493 -
$720$569 -
$480$408 -
$490$382 -
$480$379 -
$620$490 -
$550$468 -
$620$484 -
$290$226 -
$600$480 -
$880$695 -
$1,225Programming Windows Embedded CE 6.0 Developer Reference, 4/e (Paperback)
-
$740$585 -
$1,180$1,003 -
$680$530 -
$380$323 -
$1,600$1,520 -
$580$493 -
$520$442 -
$480$379 -
$530$199 -
$520$343
相關主題
商品描述
Description
Security Monitoring with Cisco Security MARS
Threat mitigation system deployment
Gary Halleen
Greg Kellogg
Networks and hosts are probed hundreds or thousands of times a day in an attempt to discover vulnerabilities. An even greater number of automated attacks from worms and viruses stress the same devices. The sheer volume of log messages or events generated by these attacks and probes, combined with the complexity of an analyst needing to use multiple monitoring tools, often makes it impossible to adequately investigate what is happening.
Cisco® Security Monitoring, Analysis, and Response System (MARS) is a next-generation Security Threat Mitigation system (STM). Cisco Security MARS receives raw network and security data and performs correlation and investigation of host and network information to provide you with actionable intelligence. This easy-to-use family of threat mitigation appliances enables you to centralize, detect, mitigate, and report on priority threats by leveraging the network and security devices already deployed in a network, even if the devices are from multiple vendors.
Security Monitoring with Cisco Security MARS helps you plan a MARS deployment and learn the installation and administration tasks you can expect to face. Additionally, this book teaches you how to use the advanced features of the product, such as the custom parser, Network Admission Control (NAC), and global controller operations. Through the use of real-world deployment examples, this book leads you through all the steps necessary for proper design and sizing, installation and troubleshooting, forensic analysis of security events, report creation and archiving, and integration of the appliance with Cisco and third-party vulnerability assessment tools.
“In many modern enterprise networks, Security Information Management tools are crucial in helping to manage, analyze, and correlate a mountain of event data. Greg Kellogg and Gary Halleen have distilled an immense amount of extremely valuable knowledge in these pages. By relying on the wisdom of Kellogg and Halleen embedded in this book, you will vastly improve your MARS deployment.”
—Ed Skoudis, Vice President of Security Strategy, Predictive Systems
Gary Halleen is a security consulting systems engineer with Cisco. He has in-depth knowledge of security systems as well as remote-access and routing/switching technology. Gary is a CISSP and ISSAP. His diligence was responsible for the first successful computer crimes conviction in the state of Oregon. Gary is a regular speaker at security events and presents at Cisco Networkers conferences.
Greg Kellogg is the vice president of security solutions for Calence, LLC. He is responsible for managing the company’s overall security strategy. Greg has more than 15 years of networking industry experience, including serving as a senior security business consultant for the Cisco Enterprise Channel organization. Additionally, Greg worked for Protego Networks, Inc. (where MARS was originally developed). There he was responsible for developing channel partner programs and helped solution providers increase their security revenue.
Learn the differences between various log aggregation and correlation systems
- Examine regulatory and industry requirements
- Evaluate various deployment scenarios
- Properly size your deployment
- Protect the Cisco Security MARS appliance from attack
- Generate reports, archive data, and implement disaster recovery plans
- Investigate incidents when Cisco Security MARS detects an attack
- Troubleshoot Cisco Security MARS operation
- Integrate Cisco Security MARS with Cisco Security Manager, NAC, and third-party devices
- Manage groups of MARS controllers with global controller operations
This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.
Category: Cisco Press—Security
Covers: Security Threat Mitigation
Table of Contents
Foreword
Introduction
Part I Introduction to CS-MARS and Security Threat Mitigation
Chapter 1 Introducing CS-MARS
Introduction to Security Information Management
The Role of a SIM in Today’s Network
Common Features for SIM Products
Desirable Features for SIM Products
Challenges in Security Monitoring
Types of Events Messages
Understanding CS-MARS
Security Threat Mitigation System
Topology and Visualization
Robust Reporting and Rules Engine
Alerts and Mitigation
Description of Terminology
CS-MARS User Interface
Dashboard
Network Status
My Reports
Summary
Chapter 2 Regulatory Challenges in Depth
Health Insurance Portability and Accountability Act of 1996 (HIPAA)
Who Is Affected by HIPAA?
What Are the Penalties for Noncompliance?
HIPAA Security Rule
HIPAA Security Rule and Security Monitoring
Gramm-Leach-Bliley Act of 1999 (GLB Act)
Who Is Affected by the GLB Act?
What Are the Penalties for Noncompliance with GLB?
The GLB Act Safeguards Rule
The GLB Safeguards Rule and Security Monitoring
The Sarbanes-Oxley Act of 2002 (SOX)
Who Is Affected by Sarbanes-Oxley?
What Are the Penalties for Noncompliance with Sarbanes-Oxley?
Sarbanes-Oxley Internal Controls
Payment Card Industry Data Security Standard (PCI-DSS)
Who Is Affected by the PCI Data Security Standard?
What Are the Penalties for Noncompliance with PCI-DSS?
The PCI Data Security Standard
Compliance Validation Requirements
Summary
Chapter 3 CS-MARS Deployment Scenarios
Deployment Types
Local and Standalone Controllers
Global Controllers
Sizing a CS-MARS Deployment
Special Considerations for Cisco IPSs
Determining Your Events per Second
Determining Your Storage Requirements
Considerations for Reporting Performance
Considerations for Future Growth and Flood Conditions
Planning for Topology Awareness
CS-MARS Sizing Case Studies
Retail Chain Example
State Government Example
Healthcare Example
Summary
Part II CS-MARS Operations and Forensics
Chapter 4 Securing CS-MARS
Physical Security
Inherent Security of MARS Appliances
Security Management Network
MARS Communications Requirements
Network Security Recommendations
Ingress Firewall Rules
Egress Firewall Rules
Network-Based IDS and IPS Issues
Summary
Chapter 5 Rules, Reports, and Queries
Built-In Reports
Understanding the Reporting Interface
Reporting Methods
The Query Interface
Creating an On-Demand Report
Batch Reports and the Report Wizard
Creating a Rule
About Rules
Creating the Rule
Creating Drop Rules
About Drop Rules
Creating the Drop Rule
Summary
Chapter 6 Incident Investigation and Forensics
Incident Handling and Forensic Techniques
Initial Incident Investigation
Viewing Incident Details
Finishing Your Investigation
False-Positive Tuning
Deciding Where to Tune
Tuning False Positives in MARS
Summary
Chapter 7 Archiving and Disaster Recovery
Understanding CS-MARS Archiving
Planning and Selecting the Archive Server
Configuring the Archiving Server
Configuring CS-MARS for Archiving
Using the Archives
Restoring from Archive
Restoring to a Reporting Appliance
Direct Access of Archived Events
Retrieving Raw Events from Archive
Summary
Part III CS-MARS Advanced Topics
Chapter 8 Integration with Cisco Security Manager
Configuring CS-Manager to Support CS-MARS
Configuring CS-MARS to Integrate with CS-Manager
Using CS-Manager Within CS-MARS
Summary
Chapter 9 Troubleshooting CS-MARS
Be Prepared
Troubleshooting MARS Hardware
Beeping Noises
Degraded RAID Array
Troubleshooting Software and Devices
Unknown Reporting Device IP
Check Point or Other Logs Are Incorrectly Parsed
New Monitored Device Logs Still Not Parsed
How Much Storage Is Being Used, and How Long Will It Last?
E-Mail Notifications Sent to Admin Group Never Arrive
MARS Is Not Receiving Events from Devices
Summary
Chapter 10 Network Admission Control
Types of Cisco NAC
NAC Framework Host Conditions
Understanding NAC Framework Communications
Configuration of CS-MARS for NAC
Framework Reporting
Information Available on CS-MARS
Summary
Chapter 11 CS-MARS Custom Parser
Getting Messages to CS-MARS
Determining What to Parse
Adding the Device or Application Type
Adding Log Templates
First Log Template
Second and Third Log Templates
Fourth and Fifth Log Templates
Additional Messages
Adding Monitored Device or Software
Queries, Reports, and Rules
Queries
Reports
Rules
Custom Parser for Cisco CSC Module
Summary
Chapter 12 CS-MARS Global Controller
Understanding the Global Controller
Zones
Installing the Global Controller
Enabling Communications Between Controllers
Troubleshooting
Using the Global Controller Interface
Logging In to the Controller
Dashboard
Drilling Down into an Incident
Query/Reports
Local Versus Global Rules
Security and Monitor Devices
Custom Parser
Software Upgrades
Global Controller Recovery
Summary
Part IV Appendixes
Appendix A Querying the Archive
Appendix B CS-MARS Command Reference
Appendix C Useful Websites
Index
商品描述(中文翻譯)
**描述**
使用 Cisco Security MARS 進行安全監控
威脅緩解系統部署
Gary Halleen
Greg Kellogg
網路和主機每天被探測數百或數千次,以試圖發現漏洞。來自蠕蟲和病毒的自動攻擊數量更是龐大,對同一設備造成壓力。這些攻擊和探測所產生的日誌消息或事件的龐大數量,加上分析師需要使用多個監控工具的複雜性,常常使得充分調查發生的事情變得不可能。
Cisco® Security Monitoring, Analysis, and Response System (MARS) 是一個下一代安全威脅緩解系統 (STM)。Cisco Security MARS 接收原始的網路和安全數據,並對主機和網路信息進行關聯和調查,以提供可行的情報。這個易於使用的威脅緩解設備系列使您能夠集中管理、檢測、緩解和報告優先威脅,利用已在網路中部署的網路和安全設備,即使這些設備來自多個供應商。
使用 Cisco Security MARS 進行安全監控幫助您規劃 MARS 部署,並了解您可能面臨的安裝和管理任務。此外,本書教您如何使用產品的高級功能,例如自定義解析器、網路接入控制 (NAC) 和全局控制器操作。通過使用實際部署示例,本書引導您完成正確設計和規模、安裝和故障排除、安全事件的取證分析、報告創建和存檔,以及將設備與 Cisco 和第三方漏洞評估工具集成所需的所有步驟。
“在許多現代企業網路中,安全信息管理工具對於幫助管理、分析和關聯大量事件數據至關重要。Greg Kellogg 和 Gary Halleen 在這些頁面中提煉了大量極具價值的知識。依賴於 Kellogg 和 Halleen 在本書中嵌入的智慧,您將大幅改善您的 MARS 部署。”
—Ed Skoudis,預測系統安全策略副總裁
Gary Halleen 是 Cisco 的安全顧問系統工程師。他對安全系統以及遠端訪問和路由/交換技術有深入的了解。Gary 是 CISSP 和 ISSAP。他的努力促成了俄勒岡州首次成功的電腦犯罪定罪。Gary 是安全事件的常規演講者,並在 Cisco Networkers 會議上發表演講。
Greg Kellogg 是 Calence, LLC 的安全解決方案副總裁。他負責管理公司的整體安全策略。Greg 在網路行業擁有超過 15 年的經驗,包括擔任 Cisco 企業渠道組織的高級安全業務顧問。此外,Greg 曾在 Protego Networks, Inc. 工作(MARS 最初在此開發)。在那裡,他負責開發渠道合作夥伴計劃,並幫助解決方案提供商增加其安全收入。
了解各種日誌聚合和關聯系統之間的差異
- 檢查法規和行業要求
- 評估各種部署場景
- 正確規模您的部署
- 保護 Cisco Security MARS 設備免受攻擊
- 生成報告、存檔數據並實施災難恢復計劃
- 當 Cisco Security MARS 檢測到攻擊時調查事件
- 故障排除 Cisco Security MARS 的操作
- 將 Cisco Security MARS 與 Cisco Security Manager、NAC 和第三方設備集成
- 使用全局控制器操作管理 MARS 控制器組
這本安全書是 Cisco Press® 網路技術系列的一部分。Cisco Press 的安全書籍幫助網路專業人員保護關鍵數據和資源,防止和緩解網路攻擊,並建立端到端的自我防禦網路。
類別:Cisco Press—安全
涵蓋:安全威脅緩解
**目錄**
前言
介紹
**第一部分 CS-MARS 和安全威脅緩解介紹**
**第 1 章** 介紹 CS-MARS
安全信息管理介紹
- SIM 在當今網路中的角色
- SIM 產品的常見特徵
- SIM 產品的理想特徵
安全監控中的挑戰
- 事件消息的類型
理解 CS-MARS
- 安全威脅緩解系統
- 拓撲和可視化
- 強大的報告和規則引擎
- 警報和緩解
- 術語描述
CS-MARS 用戶界面
- 儀表板
- 網路狀態
- 我的報告
總結
**第 2 章** 深入探討法規挑戰
1996 年健康保險可攜性和責任法案 (HIPAA)
- 誰受到 HIPAA 的影響?
- 不合規的罰則是什麼?
- HIPAA 安全規則
- HIPAA 安全規則和安全監控
1999 年格拉姆-利奇-布萊利法案 (GLB 法案)
- 誰受到 GLB 法案的影響?
- 不合規的罰則是什麼?
- GLB 法案保護規則
- GLB 保護規則和安全監控
2002 年薩班斯-奧克斯利法案 (SOX)
- 誰受到薩班斯-奧克斯利法案的影響?
- 不合規的罰則是什麼?
- 薩班斯-奧克斯利法案內部控制
支付卡行業數據安全標準 (PCI-DSS)
- 誰受到 PCI 數據安全標準的影響?
- 不合規的罰則是什麼?
- PCI 數據安全標準
- 合規驗證要求
總結
**第 3 章** CS-MARS 部署場景
部署類型
- 本地和獨立控制器
- 全球控制器