IBM Security QRadar SIEM Foundation (Day1)
IBM Security QRadar SIEM Foundation (Day1)
IBM Security QRadar SIEM Foundation (Day1)
IBM Training
Describe how QRadar collects data to detect suspicious activities
Learn about various QRadar apps, content extensions, and the App
Framework
Analyze offenses by using the QRadar UI and the Analyst Workflow app
IBM Security
Digital transformation is accelerating
enough
insights say “keeping up with alerts” is top concern
IBM Security 5
Traditional security can’t keep pace
Automatically
Real time link multiple
detection malicious
behaviors
“IBM QRadar improves the speed and effectiveness of detecting threats by nearly 95%.”
Forrester
IBM Security 7
Streamlining
threat detection and response
IBM Security 8
Traige threat detection
Detect threats in real-time and link
multiple malicious behaviors to an attack
• Real time
detection
• 1000+ security
use cases
• Reduces alerts
into actionable
offenses
• Links malicious
behaviors
4 pillars of effective SIEM
Complete Prioritized Automated Integrated
Visibility Threat Detection Investigations Response
Endpoints
Network activity
Advanced Threats
Data activity
Insider Threats
Users and identities
Threat intelligence Cloud Risks
Configuration information Incident Response
Vulnerabilities and threats
Compliance
Application activity
Cloud platforms
The four pillars of an effective SIEM
After
Provide information to help automate a
response to the attack
IBM Security
QRadar and Our Environment
IBM Security
QRadar App Store and App Host
ABOVE THE SIEM
Incident Response
User and Entity Behavior
Etc.
SIEM LAYER
IBM QRadar Security Intelligence
Event Correlation and Log Management
IBM Security
IBM Security App Exchange
IBM Security
QRadar Architecture
IBM Security
Describe the deployment architecture
IBM Security
IBM Security QRadar
IBM Security
RESPONSE App Exchange
HUNT THREATS, RESPOND FASTER AND CONTINUOUSLY IMPROVE
Seamless
DETECTION & integration and
INVESTIGATION content to
APPLY M/L, AI AND ADVANCED ANALYTICS TO DETECT, CONNECT, PRIORITIZE AND INVESTIGATE
augment
THREATS platform.
VISIBILITY
COLLECT DATA ACROSS THE ENTIRE ENVIRONMENT
DEPLOYMENT
MODELS
ON PREM AS A SERVICE CLOUD HYBRID
HW, SW, VM SaaS, Managed Service AWS, Azure, Google Cloud On-prem, SaaS, IaaS
1
8
Cloud
Hybrid
IBM Security
QRadar – Deployed on premises
IBM Security IBM Security
X-Force Exchange App Exchange QRadar can be deployed on premises
• Hardware appliances
• Virtual Appliances
geographical areas
IBM Security
Explore the component
overview and resilience
IBM Security
QRadar product shorthand terms
Core QRadar hosts are mostly identified by a 4-digit code that can be decoded as such :
3129
XX 31XX XX29 XX
Software Role/Type Hardware Designation
Software Role/Type Codes: Hardware Codes:
•31 = All-In-1 or Console (Base Offering) • XX05 = Lenovo® x3550 M5 BD, 64GB RAM, 6.2TB storage
•16 = Event Processor • XX29 = Based on x3650 M5 BD, 128GB RAM, 48TB
•17 = Flow Processor storage
•18 = Combined Event/Flow Processor
• XX29-C* = Dell PowerEdge R740xd XL, 128GB RAM,
•19 = Network Insights
•15 = Event Collector 48TB storage
•12 = Qflow Collector (Copper NIC) • XX48 = Lenovo® x3650 M5 BD, 128GB RAM, 12TB
•13 = Qflow Collector (Fiber NIC) storage
•14 = Data Node • XX48-C = Dell PowerEdge R640 XL, 128GB RAM, 12TB
•60 = Vulnerability Manager storage
•70 = Risk Manager • XX01/02* = 1Gbps / 3Gbps (Qflow & QNI Only)
• XX10* = 10Gbps (Qflow & QNI Only)
IBM Security
• XX20 = Network Insights (QNI) High Performance
We can start with an All--in—One
We can use a single appliance to serve as the base for the UI,
3129 Console
which also performs all event and flow collection, processing,
IBM Security
QRadar On Prem - Distributed
This is the most common
deployment configuration
QRadar.
IBM Security
QRadar Licensing Model
IBM Security
QRadar Licensing Metrics
EPS FPM
IBM Security
Role Based Licensing
IBM Security
EPS and FPM Burst Handling
Overflow buffer
10
EVENTS FLOWS
OVERFLOW BUFFER
IBM Security
Examine the component
architecture
High-level architecture
Flow collector (FC)
Event collector (EC)
Event processor (EP)
Console
IBM Security
High-level component architecture and data stores
Flow and event data is stored in the Ariel database on
the event Processors
PostgreSQL • If accumulation is required, accumulated data is
Identities, Assets stored in Ariel accumulation data tables
Offenses • As soon as data is stored, it cannot be changed
Configuration (tamper proof)
• Data can be selectively indexed
• Ariel data storage can be extended by using Data
Data Node Console Service
Nodes
User Interface
Magistrate Offenses, assets, and identity information are stored
Reporting in the master PostgreSQL database on the Console
• Provides one master database with copies on each
Ariel Event/Flow
Flows, events processor(s) processor for backup and automatic restore
Accumulations Apps are hosted either on the Console or a dedicated
App Host
Flow collector
Event collector Secure SSH communication between appliances in a
QRadar Network Insights
distributed environment is supported
Network Packet Events from log
Interface, netflow, jflow, sources
IBM Security sflow, & 3rd party flow
Event Collector Architecture Event Processor
Coalescing filter
• Each event collector gathers events from local and remote Device Support Module(DSM)
sources Parser Threads
Event collector
Log Source
Flow Collector Architecture Flow Processor
• A flow is a record of a conversation between two devices on Flow reporting and routing - Create
a network superflows
IBM Security
Recap the architectural 1. Examine how 2. Follow the events
the events arrive at proceed through
components by dissecting their first collection correlation,
a captured events point, the Event accumulation, and
Collector storage on the
Event Processor
IBM Security
Dissecting the flow of a captured event (Event Collector)
Event Processor
FW events
Overflow filter
(enforce license limit)
Coalescing Filter
Normalized events
Overflow filter
(enforce license limit) New host or
port found?
Accumulations
No
License
Exceeded Ariel DB
Ariel DB Host Profiler
?
Yes
Event Processor
Summary
Elaborating the deployment architecture
Discussion on the component overview and
resilience
Explaining the licensing model
Examine the component architecture
Dissect a captured event
IBM Security
The SOC Analyst challenge
QRadar / SIEM
A large organization
can collect 2 Billion
Events per day
Correlated down to 20 or so
incidents per day that need
manual investigation