The Wayback Machine - https://web.archive.org/web/20120606025145/http://cloudcomputing.sys-con.com:80/node/2288307

Welcome!

Cloud Expo Authors: Liz McMillan, Elizabeth White, Maureen O'Gara, James Carlini, Bob Gourley

Related Topics: Cloud Expo, SOA & WOA, Virtualization, Web 2.0

Cloud Expo: Blog Post

If a Tree Falls in Your Network, Does Anybody Hear?

Listening through white noise: separating log data from actionable events

I recently came across an article regarding the difficulty of separating log data from actionable events. The issue at hand is a network is pinged potentially millions of times a day. Most of it innocuous-the legitimate log on and off of employees, genuine transactions of data, etc… But what gets lost amidst all this “white noise,” are the red flags that indicate breaches or worse malicious activities.

It can be overwhelming. In fact, the article Struggling to Make Sense of Log Data, points out a study by the SANS Institute that the biggest critical concern for security is the ability to discern usable and actionable data from log files.


How Important is Collecting Logs?

I asked a top notch engineer developing in the cloud and he wryly quipped if a tree falls in the forest, does it make a sound? He added, just because you set intrusion detections software system to find malware and the like, you still require the human intelligence to review/interpret the logs and create the baseline of normalcy. So I said, that is the problem…there’s just so much to review. To which he reminded me about the concept of situational awareness. He posits the idea that a singular event might be seen as generally low-level and harmless, but when it is put into context and correlated against various rules and diverse enterprise silos, a very different picture emerges. For instance, your network logs an access attempt from Bangladesh. Is this normal? Do you have customers, suppliers and employees who originate there? If so, is it happening during regular business hours? Is it following “normal” traffic patterns? If so, are they using dormant passwords or bypassing any protocols? If so, is the accessible data through this breach?

The study author Jerry Shenk said, "Even when we look at the 22 percent of respondents who are using SIEM (security information and event management systems) for collecting logs and processing them, nearly the same percentage say it is difficult to prevent incidents and detect advanced threats."

But the most disconcerting statistic is (according to the study): "With or without tools, many organizations don't spend much time analyzing logs. 35% of respondents said their organizations allot no time to less than one day a week on log analysis. The smaller the organization, the less likely they would spend on log data analysis. Many companies recognize that SIEM is part of the answer, however 58% of the companies in the survey noted they are "not anywhere close to that level of automation."

This alone is a perfect situation to incorporate security-as-a-service to help manage monitoring. Instead of once per week (if at all), monitoring occurs 7/24/365. Instead of catching just the most obvious threats, the automations combined with the sourced human analysis significantly shrink the vulnerability gap. Instead of looking at a singular network, it links, correlates, analyzes all the aspects of the enterprise. And cloud-based security does it at a fraction of the on-premise cost. The cloud allows organizations to expand their resources and therefore solidify its coverage.

Attacks, intrusions and abnormalities are issues aren’t solved by ostriches. Putting heads in the sand isn’t the answer. Neither is throwing your hands up saying so what can I do about it? And if you are one of those people who, at the top of this blog, consider the cloud too risky of a proposition, how much riskier is the status quo? To be effective, you need to have all the facts in order to formulate a stronger prevention plan. I can’t stress enough how important it is to understand regular traffic patterns in order to recognize when something requires greater attention or action. And to do that you need to review logs. However, with so many other priorities sometimes it is a considerable challenge to be proactive.

Trees will continue to fall in the forest. However, if you look down from the cloud, you are better attuned to hear it, and if necessary, act

More Stories By Kevin Nikkhoo

With more than 32 years of experience in information technology, and an extensive and successful entrepreneurial background, Kevin Nikkhoo is the CEO of the dynamic security-as-a-service startup Cloud Access. CloudAccess is at the forefront of the latest evolution of IT asset protection--the cloud.

Kevin holds a Bachelor of Science in Computer Engineering from McGill University, Master of Computer Engineering at California State University, Los Angeles, and an MBA from the University of Southern California with emphasis in entrepreneurial studies.

Cloud Expo Breaking News
You are interested in cloud computing, but where do you start? How are vendors and companies defining cloud computing? Do you know the differences between public, private, community and hybrid clouds? What do you need to know to figure out which applications make sense in the cloud? And is any of this real today? In his session at the 10th International Cloud Expo, Bill Zack, Cloud Architect with Slalom Consulting, explores a set of five patterns, based on real-world customer engagements, you ...
OutSystems, provider of the industry-leading Agile Platform application development tool, announced on Tuesday the participation of two company executives at the Cloud Expo New York. OutSystems’ vice president and general manager, North America, Jeff Newlin, will join a CEO Power Panel to discuss “Cloud and Big Data Strategy Viewed Through the Lens of Business Value.” Additionally, OutSystems’ senior technology evangelist, Rodrigo Sousa Coutinho, will lead the session “Game Changers: How the Clo...
With BigDataExpo 2012 New York (www.BigDataExpo.net), co-located with 10th Cloud Expo, now less than a away, what better time to remind you in greater detail of the distinguished individuals in our incredible Speaker Faculty for the technical and strategy sessions at the conference...? We have technical and strategy sessions for you every day from June 11 through June 14 dealing with every nook and cranny of Cloud Computing and Big Data, but what of those who are presenting? Who are they, wh...
“I think there is opportunity for this market to go far beyond analytics,” observed Margaret Dawson, Symform’s Vice President of Marketing, in this exclusive Q&A; with Cloud Expo Conference Chair Jeremy Geelan. “Again,” Dawson continued, “this goes back to how we can integrate these solutions with other related products/solutions to get a broader picture of what is happening across our business. I think an interesting intersection is Big Data and distributed compute processing.” Cloud Computing ...
TwinStrata, Inc., the leading innovator of cloud-based data storage, backup and disaster recovery solutions, on Tuesday announced that company CEO Nicos Vekiarides is a featured speaker at Cloud Expo. Specifically, he'll discuss how Cloud SANs are rapidly becoming the new approach to building and enhancing storage area networks. In addition, the company will be exhibiting its CloudArray Storage Gateway at the Expo in Booth No. 339 of the Javits Center in New York, June 11-14. "Despite numerous...
One of the most widely asked questions about Big Data today is, “How do we get valuable analytics from Big Data?” Or, how do we get the prize? As data continues to grow exponentially, so does the variety of data (structured and unstructured) coming from humans, machines and applications. In order to pull valuable information from it all, proper data gathering is critical, and the output of that data needs to be timely and accurate, with a flexible method of delivery. Unfortunately, it’s not easy...
The Cloud Security Alliance, NIST SP 800-53 and other security frameworks recommend or require encrypting sensitive data in motion in shared cloud environments while delegating control of the encryption keys to the tenant. While many IaaS providers offer secure VPN connections to the cloud, the VPN tunnel often terminates at the “front door” of the cloud infrastructure, leaving data unprotected within the cloud network. This approach also leaves virtual servers in the cloud vulnerable to attacks...
Compuware Corporation, the technology performance company, on Tuesday announced that Michael Kopp, a Technology Strategist for Compuware's application performance management (APM) business, will present a session titled: "How to Do Application Performance Monitoring in the Clouds: Lessons Learned" at Cloud Expo 2012 New York in New York City. Organizations face the challenge of monitoring and managing performance in clouds every other day. Not only is APM different in a cloud, but all clouds ar...
Cloud computing has gained momentum and is increasingly being embraced by enterprises of all sizes. But the cloud itself is often its own worst enemy as performance, reliability, and the lack of enterprise-level capabilities have led to obstacles in growth and adoption of this still promising infrastructure methodology. This is only exacerbated by an increasingly mobile and global world, one that is plagued with security concerns. In his Lunchtime Focus Keynote at the 10th International Cloud ...
We all know that cloud computing can save time, money, and apparently all but does your laundry for you, but what are its real-use applications? In her session at the 10th International Cloud Expo, Victoria Kouyoumjian, Senior Business and Technology Strategist at Esri, will showcase multiple use cases of geospatial solutions that leverage the cloud computing deployment models to provide better government transparency, stakeholder engagement, and save lives … (really). Based on professional ex...