TYPES OF ENRICHMENT
Most people default to threat intelligence when enriching security log data. But there’s actually a wide variety of third-party information that can augment log data to make it useful, depending on an analyst’s objectives. They tend to fall into two categories: standard sources and advanced options.
Standard Sources
Standard sources are third-party data sources typically used to help address common security issues or investigations.
Threat Intelligence
The go-to enrichment source for security logs, threat intelligence helps match up suspect activity with known threat indicators so analysts can determine if a threat is benign or malicious. This source can be useful in typical security scenarios such as cross-referencing an IP address or domain with a list of known threats.
Hash Values
A shorthand value (or “fingerprint”) used to indicate a much larger chunk of data, hash values known to be malicious or associated with malware can be used to identify and root out suspicious files. They can, for instance, help automate blacklisting of known malware files or whitelisting of benign files.
IP Geolocation
GeoIP allows analysts to identify the geographical location of an IP address. This identification helps them differentiate between legitimate and malicious activity by assigning the IP address geographical context down to country, city, or even latitude/longitude. So, if several IP addresses involved in suspect activity share the same location, an analyst can determine if the activity is a malicious attack or legitimate traffic.
WHOIS Data
Enriching security logs with WHOIS data allows analysts to identify the person or organization a domain or IP address is registered to. This enrichment source can be useful if an organization is being attacked by a specific domain and needs to contact the owner of the domain, for example.
LDAP/Active Directory
Using LDAP or AD data can help differentiate a legitimate internal user or account from a suspicious one. This type of enrichment can help an analyst in multiple ways, from providing contextual contact information when reporting an incident to determining the risk level of the user (e.g., administrative responsibilities, access to high risk data, or access to high risk compliance zones).
DNS Lookup and Reverse DNS Lookup
The ability to map an IP address to a domain (or vice versa) gives additional context to a domain or IP address trying to access a system/network. If an analyst notices a system is demonstrating suspicious DNS activity, he or she can use DNS or reverse DNS lookup for additional context to help identify whether the system has actually been compromised.
Departmental Information
Lists of personnel in the organization by title, department, supervisor, group membership, etc., can help analysts map activity back to real people and teams. This type of enrichment can help report and curb policy violations, such as an employee using a personal account instead of a service account, and support security automation, such as automatically notifying a particular group if there are a large number of lockouts for an account associated with that group.
ADVANCED OPTIONS
Advanced enrichment options are more esoteric intelligence sources that are useful for specific security scenarios.They fall into three categories: compliance, tracking, and risk calculation.
Compliance
Compliance data can be used to flag people and/or assets based on differentiated levels of access.
PCI
PCI DSS (Payment Card Industry Data Security Standard) is a set of security regulations that companies must follow if they process, store, or transmit credit card information. Enriching security logs with PCI data allows you to add zone data (such as “trusted” and “untrusted” zones) to clarify relationships between people and/or assets, identifying whether untrusted entities are trying to access trusted objects. For example, this type of enrichment could help prohibit an untrusted device from attempting to access a trusted device without authentication.
HIPAA
HIPAA (Health Insurance Portability and Accountability Act) regulates data privacy and security for medical information. Like PCI data, HIPAA enrichment provides zone detail to help analysts identify the relationships between objects and/or people. This enrichment source could help prohibit non-HIPAA secured environments from touching secured environments except through approved authenticating proxy or applications.
Sarbanes-Oxley
This set of regulations helps safeguard against fraudulent accounting practices, accounting errors, and inaccurate corporate financial disclosures to protect investors and shareholders. Enriching security logs with this data makes it possible to track access to relevant data or to devices that carry relevant data. During audit compliance, for instance, access and audit logs can be tracked to relevant devices or accounts and provided in a scheduled report to the auditor to prove compliance instead of relying on users to track the logs.
GDPR
GDPR (General Data Protection Regulation) is a set of EU regulations regarding the processing of personal data to increase protection and privacy. Adding GDPR data as context to security logs helps analysts differentiate the types of data specific users can see and what format they’ll see based on their access. This enrichment source can be used to tag data with its GDPR access level and filter user views based on their access level to ensure no one is viewing off-limits information.
Tracking
Tracking is the ability to see when people (and devices attached to them) are physically on the move.
User to DHCP Mapping
You can use this data to answer two security questions: (1) are people/devices where they should be, and/or (2) are they in two places at once? This enrichment source can be used to manage physical security concerns, such as developing heat maps of physical spaces (such as conference and common rooms) to understand usage, or to identify physical security vulnerabilities, such as a tendency of employees to congregate near a certain door, increasing the risk of tailgating.
Mac to User Mapping via NAC
This data is useful to help diagnose device-related issues. For instance, let’s say a user gets locked out of his account. The analyst can identify the root cause as a saved password on their iPhone based on the fact that a Mac address recently failed several authentication attempts.
Workstation History to User Mapping
Mapping workstation history to user mapping ties user behavior to device/network impact. This data gives analysts the ability to make judgment decisions on how to apply and/or automate security rules. One example is the ability to identify users who may be at greater risk of being targeted by (and uniquely vulnerable to) phishing attacks, then creating more stringent phishing rules and alerting for those users or groups.
Antivirus History to Workstation Mapping
Historical antivirus usage for a particular workstation helps identify workstations where antivirus software has been at work. Among other uses, this data can help pinpoint and investigate objects that keep getting reinfected with a virus, requiring intervention by an antivirus solution.
Risk Calculation
Risk calculation helps identify users and groups particularly vulnerable to attacks.
User’s Signing Authority
User’s signing authority is data that categorizes users’ access to company resources or their ability to make decisions in the organization. The benefit of this type of enrichment is to help defend against phishing or other security threats on behalf of vulnerable and/or targeted personnel that the company is too large to be able to directly identify. So, large organizations that may be unaware of which employees are most likely to be targeted by attacks can elevate security alerts for people based on their signing authority.
Group Membership
Group membership is data that categorizes internal teams and groups to fend off phishing or other threats on behalf of personnel the company knows is more vulnerable and/or targeted. For instance, an oil and gas company could identify their legal group as the biggest target for information theft attempts due to their ability to negotiate leases. Consequently, security can be elevated for that group.
CONCLUSION
When it comes to security data enrichment, it’s helpful to think beyond threat intelligence. Tapping other enrichment sources makes it possible to add layers of valuable context, answer more sophisticated security questions, enable more effective automation, and ultimately, increase efficiency to improve security outcomes. Whether you start with a question you want to answer, a problem you want to troubleshoot, or blind spot you want to identify, embracing a broader definition of third-party enrichment changes the trajectory of your security initiatives.