spicosolutions / thepeoplessiem

Patronus Support Portal
0 stars 0 forks source link

Patronus

alt text

Introduction

About

Patronus provides security teams the ability to easily monitor, detect, and react to security concerns based on a scoring system that highlights notables and filters out the noise. Spend less time searching and more time logically drilling down to determine how events correlate to form a story.

Too often we see customers struggling with these challenges:

The Patronus SIEM provides security teams the ability to easily monitor, detect and react to security concerns based on a scoring system that highlights notables and filters out the noise. Spend less time searching and more time logically drilling down to determine how events correlate to form a story.

A basic scoring system was put in place which applies a certain level of risk to ALL detections. Those detections become compelling as they grow in score and then generate an incident after a prescribed threshold is exceeded.

We believe that many events generate an incident and a timeline vs every incident representing a single event. This greatly reduces the time spent in lifecycle management and chasing false positives.

Quite simply, time is the asset that is most important to a security team.

Key Features

Executive View

Score based incident generation

Incident Management

Threat Hunting Scoreboard

Threat Management

Release Notes

Planning

Requirements

Application Version
ES Content Updates 3.0.4
Splunk Security Essentials 3.1.2
Event Timeline Viz 1.5.0
Lookup Editor 3.4.6
JSON Tools 0.2.0
Missile Map 1.2.3
Splunk Common Information Model 4.19.0
Number Display Viz 1.6.8

Installation

Splunk Enterprise

Splunk Cloud

Upgrades

Setup

Configuration Management

Asset Management

Assets refer to the system in which Patronus is responsible for protecting. The source(s) of asset data may come from many sourcing including Active Directory, Qualys, Tenable, JAMF, etc. These sources are then merged into a single working copy with evaluation of each data element giving priority to data values from the more severe to less.

This form allows for the definition of where to find the asset data that was created and stored in a lookup table. Recommendation would be to create a Saved Search that incrementally creates the lookup table using the fields as defined below. Please make sure that the lookup table has permissions set to Global.

Fields used to create the asset list are defined below.

Field Description
key syst em used multivalue field specifying all values that may be used for identification of an asset. This does nit get created in the user defined lookup
ip ip address
dns domain name of a system as would be defined in dns. This field may also be used for defining fqdn
mac unique mac address of a system
owner user which owns the system
priority low, medium, high, critical
category a logical category for representing the purpose or use of a system

File names MUST be in the format of patronus_asset_SYSTEM.csv

Identity Management

Identities refer to the users in which Patronus is responsible for protecting. The source(s) of identity data may come from many sourcing such as Active Directory or Okta. These sources are then merged into a single working copy with evaluation of each data element giving priority to data values from the more severe to less.

This form allows for the definition of where to find the asset data that was created and stored in a lookup table. Recommendation would be to create a Saved Search that incrementally creates the lookup table using the fields as defined below. Please make sure that the lookup table has permissions set to Global.

Fields used to create the asset list are defined below. Field Description
key system used multivalue field specifying all values that may be used for identification of a user. This does not get created in the user defined lookup
user user name
email email address of the user
first_name first name of the user
last_name last name of the user
phone phone number of the user
manager direct manager of the user
start_date employment start date
end_date employment end date
priority low, medium, high, critical
category a logical category for representing the purpose or use of a system

File names MUST be in the format of patronus_identity_SYSTEM.csv

Threat Feed Downloads

There are three different types of threat feeds supported by Patronus: ip, domain, file Type Description
ip threat feed IP addresses found to be compromised or suspect. Supported fields include: ip
domain threat feed Unsafe or compromised domain names accessed via web or network. Supported fields include: domain
file threat feed Unsafe or compromised files identified by name or hash via endpoint or equivalent data feeds. Supported fields include: file_name, file_hash
When adding a new threat feed it is important to understand the data you are inserting: Field Description
name Logical name representing the threat feed
type ip, domain, file
url URL in which the threat feed can be downloaded
file_name file name to save the downloaded feed as. Use the .csv extension
regex Regular expression to parse the data and to define the fields necessary for the typ of feed. Depending on feed use $1 and $2 to correspond with the headers defined
headers define the headers/values represented in the threat feed

Corporate Subnets

Corporate Subnet configuration refers to the location of IP CIDR ranges in your organization to allow Patronus to better understand threats.

Field Description
label textual representation of the CIDR range
ip/cidr CIDR range
latitude he angular distance of a place north or south of the earth's equator, or of a celestial object north or south of the celestial equator, usually expressed in degrees and minutes
longitude the angular distance of a place east or west of the meridian at Greenwich, England, or west of the standard meridian of a celestial object, usually expressed in degrees and minutes.

Setup Check

Imgur

Validation

Using Patronus

How Scoring Works

Risk Generation (SSRG)

Patronus is built on the concept of using scores to assess the risk in an enviornment. Correlation searches are used to identify issues and assign scores to objects that are considered risky. Each search has a base score and reliability associated with it. Reliability helps reduce the score for searches that are noisy or unreliable. For each hit the search gets, a score based on the base score of the search and its reliability gets added to the risk object that triggered it.

Incident Generation (SSIG)

As scores accumulate and exceed 100 (default) an incident is generated. An incident is a cross-layer view if risk generations against an object. Instead of seeing each individual score generated and then having to review it, they are bubbled up to a sumamrized view and then presented to the analyst as a picture of activitues for a risk object. This allows a story to be told instead of a single page.

Filter Management

A key part to any SIEM is the ability to eliminate noise from generating. Patronus approaches filter management logically where risk generations will still occur on content that is filtered but will not be included in incidents being generated. Filtering is also centralized rather than "hard-filtering" at the rule or correlation search level. The advantage to centralization is the ability to manage all filters in one place. Hard-filtering is still available at the rule level but is only recommended in situations where noise is overwhelming and not relevant from a security standpoint.

Filter management can be accessed in two separate ways:

  1. Risk Scoreboard Imgur As risk are being reviewed on the risk scoreboard, at the Deep Dive level the Filter Management panel (as shown) may be used. This panel leverages the results of the deep dive for adding simple filters based on values. The form requires:
    • Field - specific field that will be evaluated as part of the filter
    • Value - the value to be filtered as specified in the deep dive
    • Filter Until - date specification to keep the filter active until. This is important since filters should almost never be permanant and shold be reviewed from time to time
    • Note - reason for the filter. When the filter is saved the user name of the person creating the filter will be prepended

Upon saving, you will see text stating the filter has been added in green. Point forward the item(s) filtered will not included in scoring to determing incident generation. At the top of the risk scoreboard, you may select "Include Filtered Data" to make the data visible in the scoreboard.

  1. Configuration Management Filtering may be accessed in Configuration Management by going to Configuration->Configuration Management->Search Filters. Imgur As seen above, Search Filters represent all filters that have been created. The difference here is that there is no need to review and deep dive in the Risk Scoreboard. Filters may be added directly via the UI by clicking "Add". Upon clicking the user will be presented with the below screen: Imgur Options are similar to the Filter Management panel in the Risk Scoreboard, however, this UI gives the user the most flexibility to add filters that include wildcards as needed and to specify start and stop dates.
    • Risk Rule - id assigned to each search beginning with SSRG###
    • Field - specific field that will be evaluated as part of the filter
    • Value - the value to be filtered. Wildcards allowed.
    • Start Epoch - epoch timestamp representing the start time for filtering (https://www.epochconverter.com/)
    • End Epoch - epoch timestamp representing the end time for filtering (https://www.epochconverter.com/)
    • Note - reason for the filter. When the filter is saved the user name of the person creating the filter will be prepended
    • Disabled - 0=false, 1=true

Creating Risk Generators

Incident Management

Imgur

Scoreboard

Imgur