Splunk

Splunk

security consulting

(simple package)

Simple Security Consulting Package
~Framework-Based Risk Assessment & SIEM Use Case Design~

For SIEM users "Simple Security Consulting Package -Framework-Based Risk Assessment & SIEM Use Case Design-" (hereafter referred to as this service) is a fit & gap analysis with the MITER ATT&CK framework by experts and the risks extracted from it. We provide the design of detection rules (SIEM use cases) to deal with as a package service.
The biggest feature of this service is that it can be provided at a fixed low price (from 9 million yen) by consulting in a short period of about 1 month and packaging it.

In this service, we mainly implement the following four points and provide assessment results and recommendations as output. We will present a detailed assessment report and present information that can be used both for decision-making by management and for considering countermeasures at the operation site.

  1. Reconciliation analysis of MITER ATT&CK framework and customer environment (identification of key risks/gaps)
  2. Identify the necessary detection rules (SIEM use cases) from the framework
  3. Provide specific and detailed detection rule designs/design proposals
  4. Deliver the results of 1. to 3. in a detailed document format (assessment report)
  • Simple Security Consulting Package

Expert support for difficult security framework adaptation

Expert support for difficult security framework adaptation

In recent years, cyberattacks have become more sophisticated, and it is said that it is impossible to completely prevent attackers from intruding or infringing. In such a situation, prompt incident response is required, and security measures based on log analysis (detection/correlation rules/alert management/analysis, etc.) using SIEM are one of the most important measures that corporate security departments should consider. is.

In order to effectively utilize SIEM as the core of security measures, it is essential to effectively design detection rules according to the purpose and advance design for log management and analysis operation linked to it. Effective methods for design include security frameworks such as the security standards published by various organizations, the MITER ATT&CK framework, and CIS Controls®. Utilizing the framework comprehensively and effectively covers the security risks faced by companies and the methods of attackers based on the knowledge of experts and experts. and design can be considered. On the other hand, since it is highly specialized and difficult to understand, general user companies need to acquire security skills and knowledge to fully utilize it, and it will take some time to make effective use of it. .

In this service, experts who are proficient in all security domains, SIEM, and Splunk support the design of security measures centered on SIEM through collation analysis with the MITER ATT&CK framework. This will help customers who wish to improve the level of security measures to implement countermeasures using the framework.

Gap analysis with security framework
~Risk analysis by experts + detection rules to deal with risks~

Our service proceeds as follows. At every step, experts familiar with all elements of security and SIEM respond, making it possible to provide high-quality suggestions and recommendations in a short period of time.

The assessment of this service utilizes the MITER ATT&CK framework to assess the status of security measures in the customer's environment in comparison with the latest risks and attacker techniques. After that, we design "detection rules" that supplement the major risks and major gaps extracted as the assessment results (up to 10 rules). The assessment can be completed in a short period of about two weeks using a templated pre-interview sheet.

Flow of service implementation

  • Flow of service implementation

Image of gap analysis

  • Image of gap analysis

Design optimal detection rules (SIEM use cases)
-Detailed and specific design that can be immediately applied to operation-

Splunk experts will design rules for the 10 extracted detection rules (SIEM use cases). The detection rule design is provided in a format that includes specific and detailed design information such as corresponding framework threats, data sources required for implementation, SIEM internal logic, measurement frequency and metrics. It provides implementation-level specific information so security teams can refer to this information for immediate implementation consideration.

Together with the results of the assessment phase (steps 1 to 3), it is provided in a detailed document format, so it can be used by security personnel to consider designs and for executives to make decisions on security measures.

Customers will be able to reference this information and create SIEM use cases on Splunk. If it is difficult to implement it by yourself, you can use our separate service "Dashboard Creation Pack" and we can implement the use case on your behalf.

  • Design optimal detection rules (SIEM use cases)

特徴① パッケージ化により低価格・短期間を実現

特徴① パッケージ化により低価格・短期間を実現

Regular security domain consulting takes at least 3 months or more and costs tens of millions of yen, so many customers find it difficult to request it. This service realizes short-term and low-cost security consulting through simplification and packaging.

Security and SIEM experts will respond, embodying GAP analysis with the MITER ATT&CK framework and recommended SIEM countermeasures at a high level, while emphasizing ease of use for customers that can be realized in a short period of time and at a low price. .

Feature 2: Assessment using the MITER ATT&CK framework

The MTIRE ATT&CK framework is a systematization of the flow and methods of cyberattacks by MITER, a well-known non-profit organization that implements CVE numbering, and is used by enterprise companies to consider security measures. It is designed to give "specific and exhaustive suggestions" that are useful in practice.

As shown in the figure below, the horizontal axis shows the attacker's tactics, and the vertical axis shows the attacker's techniques (technologies used). It is a framework that can be covered.

Based on the knowledge of experts and experts, it comprehensively and effectively covers the security risks faced by companies and the techniques used by attackers. becomes possible.

  • Feature 2: Assessment using the MITER ATT&CK framework

Feature 3: Consistency from framework adaptation to setting level

One of the features of our consulting services is that we can consistently support everything from the design of security concepts (guidelines/framework, etc.) to the SIEM design/configuration/implementation layers.

General security consulting provided by other companies supports the design of guidelines and monitoring policies. Most of the time it is requested. However, it is difficult for most of our customers to put the high-level concepts into solution specifications and adapt them to actual operations on site, which requires a great deal of time and effort, and is difficult to achieve in a short period of time.

In the security consulting service we provide, we present recommendations in a concrete form, from security frameworks and standards assessments to Splunk SIEM configuration proposals and specification levels. This is made possible by the support of members who are well versed in security, SIEM, and Splunk. In addition, if necessary, it is also possible to substitute for implementation work and maintenance work by using another service.

  • Feature 3: Consistency from framework adaptation to setting level

Flow from application to service provision

  • Flow from application to service provision

Cost, period, etc.

cost From 9 million yen (excluding tax)
period about 10 weeks
type of contract Quasi-delegation contract
Contractor Customer -Macnica (some work is subcontracted to partner companies)
Artifact Provision of assessment report (Word document format)
(1) Analysis result report
(2) Recommended SIEM use cases
③ SIEM use case design

Inquiry/Document request

In charge of Macnica Splunk Co., Ltd.

Mon-Fri 8:45-17:30