
By Kevin Nikkhoo | Article Rating: |
|
June 5, 2012 10:00 AM EDT | Reads: |
755 |

I recently came across an article regarding the difficulty of separating log data from actionable events. The issue at hand is a network is pinged potentially millions of times a day. Most of it innocuous-the legitimate log on and off of employees, genuine transactions of data, etc… But what gets lost amidst all this “white noise,” are the red flags that indicate breaches or worse malicious activities.
It can be overwhelming. In fact, the article Struggling to Make Sense of Log Data, points out a study by the SANS Institute that the biggest critical concern for security is the ability to discern usable and actionable data from log files.
I asked a top notch engineer developing in the cloud and he wryly quipped if a tree falls in the forest, does it make a sound? He added, just because you set intrusion detections software system to find malware and the like, you still require the human intelligence to review/interpret the logs and create the baseline of normalcy. So I said, that is the problem…there’s just so much to review. To which he reminded me about the concept of situational awareness. He posits the idea that a singular event might be seen as generally low-level and harmless, but when it is put into context and correlated against various rules and diverse enterprise silos, a very different picture emerges. For instance, your network logs an access attempt from Bangladesh. Is this normal? Do you have customers, suppliers and employees who originate there? If so, is it happening during regular business hours? Is it following “normal” traffic patterns? If so, are they using dormant passwords or bypassing any protocols? If so, is the accessible data through this breach?
The study author Jerry Shenk said, "Even when we look at the 22 percent of respondents who are using SIEM (security information and event management systems) for collecting logs and processing them, nearly the same percentage say it is difficult to prevent incidents and detect advanced threats."
But the most disconcerting statistic is (according to the study): "With or without tools, many organizations don't spend much time analyzing logs. 35% of respondents said their organizations allot no time to less than one day a week on log analysis. The smaller the organization, the less likely they would spend on log data analysis. Many companies recognize that SIEM is part of the answer, however 58% of the companies in the survey noted they are "not anywhere close to that level of automation."
This alone is a perfect situation to incorporate security-as-a-service to help manage monitoring. Instead of once per week (if at all), monitoring occurs 7/24/365. Instead of catching just the most obvious threats, the automations combined with the sourced human analysis significantly shrink the vulnerability gap. Instead of looking at a singular network, it links, correlates, analyzes all the aspects of the enterprise. And cloud-based security does it at a fraction of the on-premise cost. The cloud allows organizations to expand their resources and therefore solidify its coverage.
Attacks, intrusions and abnormalities are issues aren’t solved by ostriches. Putting heads in the sand isn’t the answer. Neither is throwing your hands up saying so what can I do about it? And if you are one of those people who, at the top of this blog, consider the cloud too risky of a proposition, how much riskier is the status quo? To be effective, you need to have all the facts in order to formulate a stronger prevention plan. I can’t stress enough how important it is to understand regular traffic patterns in order to recognize when something requires greater attention or action. And to do that you need to review logs. However, with so many other priorities sometimes it is a considerable challenge to be proactive.
Trees will continue to fall in the forest. However, if you look down from the cloud, you are better attuned to hear it, and if necessary, act
Published June 5, 2012 Reads 755
Copyright © 2012 SYS-CON Media, Inc. — All Rights Reserved.
Syndicated stories and blog feeds, all rights reserved by the author.
More Stories By Kevin Nikkhoo
With more than 32 years of experience in information technology, and an extensive and successful entrepreneurial background, Kevin Nikkhoo is the CEO of the dynamic security-as-a-service startup Cloud Access. CloudAccess is at the forefront of the latest evolution of IT asset protection--the cloud.
Kevin holds a Bachelor of Science in Computer Engineering from McGill University, Master of Computer Engineering at California State University, Los Angeles, and an MBA from the University of Southern California with emphasis in entrepreneurial studies.
![]() Jun. 5, 2012 03:47 PM EDT Reads: 574 |
By Liz McMillan ![]() Jun. 5, 2012 01:12 PM EDT Reads: 619 |
By Jeremy Geelan ![]() Jun. 5, 2012 12:15 PM EDT Reads: 3,733 |
By Liz McMillan ![]() Jun. 5, 2012 11:56 AM EDT Reads: 705 |
By Liz McMillan ![]() Jun. 5, 2012 10:18 AM EDT Reads: 817 |
By Elizabeth White ![]() Jun. 5, 2012 10:15 AM EDT Reads: 1,048 |
By Pat Romanski ![]() Jun. 5, 2012 09:45 AM EDT Reads: 827 |
By Elizabeth White ![]() Jun. 5, 2012 09:38 AM EDT Reads: 616 |
By Elizabeth White ![]() Jun. 5, 2012 09:00 AM EDT Reads: 1,144 |
By Liz McMillan ![]() Jun. 5, 2012 08:00 AM EDT Reads: 2,553 |
- Cloud Expo New York: Why PostgreSQL is the Database for the Cloud
- Cloud Expo New York Speaker Profile: Dave Asprey – Trend Micro
- Cloud Expo New York Speaker Profile: Jill T. Singer – NRO
- Cloud Expo New York Speaker Profile: Greg O'Connor – AppZero
- Cloud Expo New York Speaker Profile: Dave Linthicum – Blue Mountain Labs
- Cloud Expo New York Speaker Profile: Mårten Mickos – Eucalyptus Systems
- iPad3 vs Windows 8 - and the Winner Is...Cloud
- Cloud Expo New York Speaker Profile: George Gerchow – VMware
- Cloud Expo New York Speaker Profile: Bernard Golden – HyperStratus
- Cloud Expo New York Speaker Profile: James Weir – UShareSoft
- Gartner Hype Cycle 2011 - Emerging Technologies
- Cloud Expo New York: The Java EE 7 Platform - Developing for the Cloud
- Cloud Expo New York: Why PostgreSQL is the Database for the Cloud
- Cloud Expo New York Speaker Profile: Dave Asprey – Trend Micro
- Cloud Expo New York Speaker Profile: Jill T. Singer – NRO
- The Business Value of Cloud Computing
- Cloud Expo New York Speaker Profile: Greg O'Connor – AppZero
- Cloud Expo New York Speaker Profile: Dave Linthicum – Blue Mountain Labs
- Cloud Expo New York Speaker Profile: Mårten Mickos – Eucalyptus Systems
- Cisco Unveils Visual Collaboration Solutions in the Post-PC Era, Extending the Reach of TelePresence With New Mobile-to-Immersive Offerings
- iPad3 vs Windows 8 - and the Winner Is...Cloud
- Cloud Expo New York Speaker Profile: George Gerchow – VMware
- Cloud Expo New York Speaker Profile: Bernard Golden – HyperStratus
- Cloud Expo New York Speaker Profile: James Weir – UShareSoft
- What is Cloud Computing?
- The Top 150 Players in Cloud Computing
- Six Benefits of Cloud Computing
- Virtualization Conference Keynote Webcast Live on SYS-CON.TV
- What's the Difference Between Cloud Computing and SaaS?
- Twenty-One Experts Define Cloud Computing
- GDS International: Global Warming Scam?
- The Top 250 Players in the Cloud Computing Ecosystem
- The Future of Cloud Computing
- A Brief History of Cloud Computing: Is the Cloud There Yet?
- Cloud Expo Europe 2009 in Prague: Themes & Topics
- SOA 2 Point Oh No!