<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>SOC - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/soc-en/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/soc-en/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Fri, 06 Mar 2026 10:23:09 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>SOC - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/soc-en/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Integrating AI into SOC tools: Global overview and current trends in the European market </title>
		<link>https://www.riskinsight-wavestone.com/en/2026/03/integrating-ai-into-soc-tools-state-of-the-art-technology-and-current-trends-in-the-european-market/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2026/03/integrating-ai-into-soc-tools-state-of-the-art-technology-and-current-trends-in-the-european-market/#respond</comments>
		
		<dc:creator><![CDATA[Quentin MASSON]]></dc:creator>
		<pubDate>Wed, 04 Mar 2026 11:15:02 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[ANSSI]]></category>
		<category><![CDATA[detection and incident response tools]]></category>
		<category><![CDATA[SOC]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=29280</guid>

					<description><![CDATA[<p>AI for SOC, Where do we stand today ?    A quiet revolution is underway in European SOCs. Faced with ever-growing volumes of security events and a persistent shortage of skilled experts, a new generation of AI-powered security tools is emerging, designed to identify correlations that human teams can no longer process alone. AI is not replacing analysts but accelerating and enhancing their...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2026/03/integrating-ai-into-soc-tools-state-of-the-art-technology-and-current-trends-in-the-european-market/">Integrating AI into SOC tools: Global overview and current trends in the European market </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 style="text-align: justify;" aria-level="1"><span data-contrast="none">AI for SOC, Where do we stand today ?</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:360,&quot;335559739&quot;:80,&quot;335559740&quot;:278}"> </span></h1>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="auto">A quiet revolution is underway in European SOCs. Faced with ever-growing volumes of security events and a persistent shortage of skilled experts, a new generation of AI-powered security tools is emerging, designed to identify correlations that human teams can no longer process alone. </span><b><span data-contrast="auto">AI is not replacing analysts but</span></b><span data-contrast="auto"> </span><b><span data-contrast="auto">accelerating and enhancing their work</span></b><span data-contrast="auto">. Between ambitions of hyper‑automation, challenges around model transparency, and the growing push for European digital sovereignty, the landscape of detection and incident-response solutions is rapidly evolving. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">To support this ongoing market transformation, the French National Cybersecurity Agency (ANSSI) and <a href="https://cyber.gouv.fr/offre-de-service/ncc-fr/"><strong>the French National Cyber Coordination Center (NCC‑FR),</strong></a> hosted by ANSSI, have launched an ambitious initiative to provide a detail overview of how IA is used for SOC by conducting a thorough stud</span><span data-contrast="auto">y <span style="color: #3366ff;">[1]</span></span><span data-contrast="auto"><span style="color: #3366ff;"> </span>with major European players specializing in SOC‑oriented security solutions.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p><span data-contrast="auto">The study had two main objectives:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<ol>
<li><span data-contrast="auto">Identify European players developing solutions for SOCs that integrate AI-based features </span><span data-contrast="auto"><span style="color: #3366ff;">[2]</span>.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></li>
<li><span data-contrast="auto">Build an overview of the use cases available on the market, including those offered by leading US vendors operating in Europe.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></li>
</ol>
<p><b><span data-contrast="auto">This article summarises the key insights drawn from our study conducted among 48 detection and response solution vendors.</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:300}"> </span></p>
<p style="text-align: center;"><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-29321" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Figure-1-EN.png" alt="" width="363" height="346" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Figure-1-EN.png 363w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Figure-1-EN-200x191.png 200w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Figure-1-EN-41x39.png 41w" sizes="(max-width: 363px) 100vw, 363px" /><em><span class="TextRun Highlight SCXW237010174 BCX8" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW237010174 BCX8">Geographical</span></span><span class="TextRun Highlight SCXW237010174 BCX8" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW237010174 BCX8"> distribution of the vendors interviewed</span></span></em></p>
<p style="text-align: center;"> </p>
<h1 style="text-align: justify;"><span data-contrast="none">A booming European market undergoing consolidation</span><span data-contrast="none"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></h1>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="auto">The study covered 48 vendors. Among them, 34 are European companies (out of an initial pool of 72 European actors identified), while the remaining 14 are major US‑based vendors firmly established in Europe. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p style="text-align: justify;">The market<span data-contrast="auto"> shows clear signs of consolidation, marked by numerous acquisitions, most often involving European companies being acquired by US firms. These acquisitions primarily aim at reinforcing detection and response capabilities, expanding protection coverage, or, more marginally, integrating AI components directly dedicated to detection. </span><b><span data-contrast="auto">Thus,</span></b><strong> v</strong><b><span data-contrast="none">endors are converging towards a unified platform approach capable of addressing the full spectrum of SOC needs.</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p style="text-align: justify;"> <br /><span data-contrast="auto">Some European initiatives, such as the OPEN XDR alliance, aim at providing a collective response to platform‑related challenges without relying on acquisition strategies between vendors.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">Meetings held with vendors revealed several key insights.</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">First, <strong>GenAI, or Generative AI</strong> (AI capable of generating original content from instructions), <strong>is starting to appear within SOC solutions,</strong> primarily through chatbots integrated into analysis interfaces; however, their capabilities remain highly limited and inconsistent. These chatbots almost always rely on external technologies, particularly LLMs provided by a small group of major players such as OpenAI, Google, Meta, Anthropic, or Mistral AI, who largely dominate the market. This reliance on third‑party solutions, which often involves transferring data to the environments of these providers, raises significant concerns regarding the protection of sensitive information handled within SOCs.</span> <br /><span data-contrast="auto">To reduce this dependency, several vendors are now considering adopting open‑source LLMs that can be deployed directly within their own environments, enabling greater control over their data and keeping sensitive flows internally.</span></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><img decoding="async" class="aligncenter size-full wp-image-29317" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Figure-2-EN.png" alt="" width="1138" height="877" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Figure-2-EN.png 1138w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Figure-2-EN-248x191.png 248w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Figure-2-EN-51x39.png 51w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Figure-2-EN-768x592.png 768w" sizes="(max-width: 1138px) 100vw, 1138px" /></p>
<p style="text-align: center;"><em><span class="TextRun Highlight SCXW95659998 BCX8" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW95659998 BCX8">Overview of the LLMs used by the vendors</span></span><span class="EOP SCXW95659998 BCX8" data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:300}"> </span></em></p>
<p> </p>
<p style="text-align: justify;"><span data-contrast="auto">Besides, the use of </span><b><span data-contrast="auto">PredAI, or Predictive AI</span></b><span data-contrast="auto"> (AI capable of predicting or classifying an input based on &#8220;knowledge&#8221; acquired during a training phase), is considerably more mature. Some European vendors have been relying on such approaches for more than </span><strong>15</strong><span data-contrast="auto"> years to support use cases ranging from behavioral detection to alert prioritization, demonstrating genuine maturity and established expertise. Most of these use cases focus on the detection phase, where predictive models are widely used, well mastered, and most relevant.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">In addition, several vendors are beginning to explore agentic approaches, with the ambition of gradually delegating part of the repetitive or time‑consuming tasks, particularly </span><b><span data-contrast="auto">t</span></b><b><span data-contrast="auto">he initial qualification of alerts and some steps of the investigation process.</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Finally, these findings should be interpreted with caution: the vendors included in the study represent only a sample of this fast-evolving market.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}">  </span></p>
<p> </p>
<p style="text-align: justify;"><img decoding="async" class="aligncenter size-full wp-image-29313" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Figure-3-EN-et-FR.png" alt="" width="1141" height="1054" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Figure-3-EN-et-FR.png 1141w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Figure-3-EN-et-FR-207x191.png 207w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Figure-3-EN-et-FR-42x39.png 42w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Figure-3-EN-et-FR-768x709.png 768w" sizes="(max-width: 1141px) 100vw, 1141px" /></p>
<p style="text-align: justify;"> </p>
<p style="text-align: center;"><em><span class="TextRun Highlight SCXW178773307 BCX8" lang="EN-US" xml:lang="EN-US" data-contrast="none"><span class="NormalTextRun SCXW178773307 BCX8" data-ccp-parastyle="caption">Overview of </span><span class="NormalTextRun SCXW178773307 BCX8" data-ccp-parastyle="caption">European</span><span class="NormalTextRun SCXW178773307 BCX8" data-ccp-parastyle="caption"> vendors in Detection &amp; Incident Response solutions</span><span class="NormalTextRun SCXW178773307 BCX8" data-ccp-parastyle="caption"> using AI</span></span><span class="EOP SCXW178773307 BCX8" data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:3,&quot;335551620&quot;:3,&quot;335559739&quot;:200,&quot;335559740&quot;:240}"> </span></em><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:3,&quot;335551620&quot;:3,&quot;335559739&quot;:200,&quot;335559740&quot;:240}"> </span></p>
<h1 style="text-align: justify;"> </h1>
<h1 style="text-align: justify;"><span data-contrast="none">Overview of AI use cases in detection and incident response tools </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></h1>
<p style="text-align: center;"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-29315" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Figure-4-EN-et-FR.png" alt="" width="1729" height="1032" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Figure-4-EN-et-FR.png 1729w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Figure-4-EN-et-FR-320x191.png 320w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Figure-4-EN-et-FR-65x39.png 65w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Figure-4-EN-et-FR-768x458.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Figure-4-EN-et-FR-1536x917.png 1536w" sizes="auto, (max-width: 1729px) 100vw, 1729px" /></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><i><span data-contrast="none">Overview of AI use cases in the SOC operations chain</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:240}"> </span></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="auto">The study identified around </span><b><span data-contrast="auto">50 use cases</span></b><span data-contrast="auto"> that can fall under 2 main categories: </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<ul>
<li><span data-contrast="auto">Use cases based on </span><b><span data-contrast="auto">Predictive AI</span></b><span data-contrast="auto"> models, primarily designed for incident detection;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></li>
<li><span data-contrast="auto">Use cases relying on </span><b><span data-contrast="auto">Generative AI</span></b><span data-contrast="auto">, which focus mainly on investigation and incident response tasks.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">Even though the use cases are diverse and hard to list exhaustively, several major categories can nonetheless be identified. Each of these categories is designed to address similar challenges and support the same objective. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">For incident detection</span></b><span data-contrast="auto">, the following AI use case categories can be identified:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<ul>
<li><span data-contrast="auto">Detection of abnormal behaviour from users or assets;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></li>
<li><span data-contrast="auto">Detection of anomalies in network traffic;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></li>
<li><span data-contrast="auto">Detection of events suggesting a possible attack;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></li>
<li><span data-contrast="auto">detectionof phishing attempts;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></li>
<li><span data-contrast="auto">and detection of malicious files.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">A new category, regrouping usecases fully addressed by Generative AI, is currently emerging and often addressed by chatbot assistant. </span><b><span data-contrast="auto">Vendors are currently concentrating most of their efforts on these analyst‑oriented assistants,</span></b><span data-contrast="auto"> into which they are progressively integrating a wide range of use cases. Their priority is to simplify access to documentation and provide answers to operational questions, as well as extend these capabilities towards more advanced qualification or investigation tasks.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">To achieve this, nearly all vendors follow the same approach by:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<ul>
<li><span data-contrast="auto">leveraging a third-party foundation model;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></li>
<li><span data-contrast="auto">applying prompt engineering to make the best use of the model’s capabilities by guiding it towards specific topics;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></li>
<li><span data-contrast="auto">and using RAG (Retrieval‑Augmented Generation), which customizes and enriches the model’s output by supplying it with an authoritative documentation base to create its responses.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">Last, some </span><i><span data-contrast="auto">agentic</span></i><span data-contrast="auto"> use cases, based on autonomous agents, are beginning to appear even if they still remain limited. They are currently being addressed by the most advanced and mature vendors in the sector, as well as by start-ups seeking to disrupt the market.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Unlike most vendors, who are gradually integrating AI use cases into an existing cybersecurity platform, these newcomers are betting on specialized AI-driven solutions designed to address a specific cybersecurity task. Among these use cases are </span><b><span data-contrast="auto">agents dedicated to threat hunting, advanced malware analysis (including automated reverse engineering), as well as the initial qualification of alerts. </span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p><i><span data-contrast="auto">Agentic </span></i><span data-contrast="auto">use cases, however, remain only marginally deployed to date. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;"><span data-contrast="none">To go deeper&#8230;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></h1>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="auto">ANSSI has published a comprehensive report detailing all the results of the study: </span><a href="https://urldefense.com/v3/__https:/cyber.gouv.fr/enjeux-technologiques/intelligence-artificielle/etude-de-marche-lia-au-service-de-la-detection-et-de-la-reponse-a-incident/__;!!NEMsmePo_HYI!f015UVEtRs-UAwyRJ8LpLL41rxHr0UoUjasSKIaq5Lasas4qs_LFVOLY8uz1QN_hCDWN4e_YNkQ-xRZlO90aSqAki3kuy3A25wqxMFI$"><span data-contrast="none">https://cyber.gouv.fr/enjeux-technologiques/intelligence-artificielle/etude-de-marche-lia-au-service-de-la-detection-et-de-la-reponse-a-incident/</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">This document now serves as a key reference for understanding current trends and the future evolution of AI’s role in detection and incident response. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Ultimately, the study highlights a European cybersecurity market that is undergoing rapid restructuring, driven by the rise of AI but also marked by a strong consolidation dynamic. Within this shifting landscape, AI continues to gain maturity across SOC tooling: from Predictive‑AI‑based detection use cases, to GenAI‑powered analytical assistants, all the way to early but promising agentic approaches. This trajectory confirms that intelligent automation will become a major lever for increasing operational efficiency and strengthening organizations’ ability to defend against tomorrow’s threats.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;">References</h1>
<p style="text-align: justify;"><span style="color: #000000;" data-contrast="auto">[1]</span><span data-contrast="auto"> Study conducted from October 2024 to July 2025 &#8211; <a href="https://urldefense.com/v3/__https:/cyber.gouv.fr/enjeux-technologiques/intelligence-artificielle/etude-de-marche-lia-au-service-de-la-detection-et-de-la-reponse-a-incident/__;!!NEMsmePo_HYI!f015UVEtRs-UAwyRJ8LpLL41rxHr0UoUjasSKIaq5Lasas4qs_LFVOLY8uz1QN_hCDWN4e_YNkQ-xRZlO90aSqAki3kuy3A25wqxMFI$">https://cyber.gouv.fr/enjeux-technologiques/intelligence-artificielle/etude-de-marche-lia-au-service-de-la-detection-et-de-la-reponse-a-incident/</a> </span></p>
<p style="text-align: justify;"><span style="color: #000000;" data-contrast="auto">[2]</span><span data-contrast="auto"><span style="color: #000000;"> Artificial intelligence-based features : <span class="TrackChangeTextInsertion TrackedChange SCXW219852967 BCX8"><span class="TextRun SCXW219852967 BCX8" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW219852967 BCX8" data-ccp-parastyle="footer">Set</span><span class="NormalTextRun SCXW219852967 BCX8" data-ccp-parastyle="footer"> of features using machine learning models (ML, deep learning, LLM) capable of learning from data and producing new analyses, </span><span class="NormalTextRun SCXW219852967 BCX8" data-ccp-parastyle="footer">predictions</span><span class="NormalTextRun SCXW219852967 BCX8" data-ccp-parastyle="footer"> or content</span></span></span><span class="TextRun SCXW219852967 BCX8" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW219852967 BCX8" data-ccp-parastyle="footer">.</span></span></span></span></p>
<p style="text-align: justify;"> </p>


<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2026/03/integrating-ai-into-soc-tools-state-of-the-art-technology-and-current-trends-in-the-european-market/">Integrating AI into SOC tools: Global overview and current trends in the European market </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2026/03/integrating-ai-into-soc-tools-state-of-the-art-technology-and-current-trends-in-the-european-market/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Barb’Hack : What to Remember</title>
		<link>https://www.riskinsight-wavestone.com/en/2025/09/barbhack-what-to-remember/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/09/barbhack-what-to-remember/#respond</comments>
		
		<dc:creator><![CDATA[Gauthier Vidal]]></dc:creator>
		<pubDate>Thu, 18 Sep 2025 08:03:28 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[AsRepCatcher]]></category>
		<category><![CDATA[Barbhack]]></category>
		<category><![CDATA[Barbhack 2025]]></category>
		<category><![CDATA[binaires malveillants]]></category>
		<category><![CDATA[Conference]]></category>
		<category><![CDATA[conférence cybersécurité]]></category>
		<category><![CDATA[cybersecurité]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Cybersecurity conference]]></category>
		<category><![CDATA[Flipper Zero]]></category>
		<category><![CDATA[Incident response]]></category>
		<category><![CDATA[Malicious binaries]]></category>
		<category><![CDATA[National Police]]></category>
		<category><![CDATA[OSINT]]></category>
		<category><![CDATA[Purple Team]]></category>
		<category><![CDATA[r2ai]]></category>
		<category><![CDATA[réponse à incident]]></category>
		<category><![CDATA[Responder]]></category>
		<category><![CDATA[SOC]]></category>
		<category><![CDATA[WebDAV]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=27461</guid>

					<description><![CDATA[<p>Wavestone was present during the 2025 edition of Barb&#8217;hack, a French cybersecurity conference happening yearly in Toulon. You will find below bits and pieces from what we deemed were the most interesting conferences.   Keeping Responder Relevant: The Hidden Potential...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/09/barbhack-what-to-remember/">Barb’Hack : What to Remember</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Wavestone was present during the 2025 edition of Barb&#8217;hack, a French cybersecurity conference happening yearly in Toulon. You will find below bits and pieces from what we deemed were the most interesting conferences.</p>
<p> </p>
<h2>Keeping Responder Relevant: The Hidden Potential of Name Resolution Poisoning</h2>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="2"><em>Speaker: Quentin Roland</em></p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="4">Quentin Roland’s talk revisited a set of techniques that are often dismissed as “old-school”: poisoning local name resolution protocols like LLMNR, NBNS, or mDNS. While these attacks are usually thought of as a way to quietly capture SMB authentications, the presentation showed that Windows’ built-in behaviors can turn them into a much more serious threat. In particular, the WebDAV fallback and Kerberos relaying can be combined to turn routine network noise into a pathway for domain compromise.</p>
<div style="text-align: justify;">
<h3> </h3>
<h3>The WebDAV Fallback Trick</h3>
</div>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="8">In a typical Windows environment, SMB authentication is everywhere. Poisoning SMB requests with tools like <strong>Responder</strong> can capture credentials, but most of the time these are machine accounts or authentications that can’t be relayed because SMB enforces strict integrity checks. As a result, many captured authentications are effectively useless for attackers.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="10">The talk highlighted an often-overlooked behavior: Windows will sometimes retry failed SMB connections over HTTP using the WebDAV protocol. This happens through the WebClient service, which is installed by default on most machines. The trick lies in how Windows interprets different error codes. By default, when an SMB login fails, the server responds with a “<strong>STATUS_ACCESS_DENIED</strong>” status. Windows stops at that point. But if the server responds with a “<strong>STATUS_LOGON_FAILURE</strong>” instead, the operating system interprets this as a problem with the protocol rather than with the credentials. It retries the connection using WebDAV, effectively transforming an SMB authentication into an HTTP authentication.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="12">This fallback opens a surprising avenue for attackers. HTTP authentications <strong>do not enforce signing by default</strong>, which means they can be relayed to services like LDAP without being blocked by the protections that make SMB less useful. A poisoned SMB request that would otherwise be wasted suddenly becomes a live, relayed authentication that can be used to enumerate Active Directory, spray passwords, or even create new machine accounts.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="14">The main limitation is that the <strong>WebClient service must be running</strong>. While it is installed by default, it isn’t always active unless the user or a process has accessed a WebDAV share. Still, where it is enabled, this fallback represents a subtle but powerful way to pivot within a network.</p>
<div style="text-align: justify;"> </div>
<div style="text-align: justify;"> </div>
<div>
<h3 id="combining-webdav-fallback-with-kerberos-relaying" class="code-line" dir="auto" style="text-align: justify;" data-line="16">Combining WebDAV Fallback with Kerberos Relaying</h3>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="18">The second part of the talk explored how this fallback can be extended to Kerberos, which is particularly relevant in environments where NTLM has been disabled. Kerberos relaying is usually tricky because tickets are bound to specific services. However, by controlling hostname resolution through LLMNR or NBNS, an attacker can trick a client into requesting a Kerberos ticket for any service of their choosing.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="20">With LLMNR poisoning, the attacker is in control of the hostname resolution. By answering with a chosen service name — for example, pointing to an ADCS (Active Directory Certificate Services) instance — the victim generates a Kerberos ticket for that service and sends it straight to the attacker. Using <code>krbrelayx</code>, the attacker can then relay that ticket to ADCS and <strong>request a certificate</strong>. Once a valid certificate is obtained, it can be used to request a TGT, opening the door to full domain compromise.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="22">Now comes the clever part: chaining both ideas together. By combining the WebDAV fallback (responder <code>-E</code> flag) with the Kerberos relaying trick (responder <code>-N</code> flag), SMB traffic can be turned into HTTP WebDAV retries that carry Kerberos tickets. Those tickets can then be relayed directly to ADCS. The attack chain is surprisingly short:</p>
<ol class="code-line" dir="auto" style="text-align: justify;" data-line="24">
<li class="code-line" dir="auto" data-line="24">Victim tries to connect to a nonexistent SMB share.</li>
<li class="code-line" dir="auto" data-line="25">Responder poisons the request, forcing a WebDAV retry.</li>
<li class="code-line" dir="auto" data-line="26">The retry is done over HTTP with Kerberos authentication, using the attacker’s chosen service name.</li>
<li class="code-line" dir="auto" data-line="27">The Kerberos ticket is relayed to ADCS with <code>krbrelayx</code>.</li>
<li class="code-line" dir="auto" data-line="28">ADCS issues a certificate, which the attacker uses to get a TGT.</li>
</ol>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="30">The demo showed exactly this: what started as a harmless SMB lookup ended with a valid certificate and the ability to impersonate domain users.</p>
<p dir="auto" style="text-align: justify;" data-line="30"> </p>
<h3 id="takeaways" class="code-line" dir="auto" style="text-align: justify;" data-line="32">Takeaways</h3>
<ul class="code-line" dir="auto" style="text-align: justify;" data-line="34">
<li class="code-line" dir="auto" data-line="34">
<p class="code-line" dir="auto" data-line="34"><strong>Fallbacks matter</strong>: Windows’ WebClient can silently turn SMB into HTTP, bypassing protections meant to stop relaying.</p>
</li>
<li class="code-line" dir="auto" data-line="36">
<p class="code-line" dir="auto" data-line="36"><strong>LLMNR still bites</strong>: Even when NTLM is off, Kerberos tickets can be coerced and relayed if LLMNR is active.</p>
</li>
<li class="code-line" dir="auto" data-line="36">
<p class="code-line" dir="auto" data-line="36"><strong>Defense</strong>: disable the WebClient service, block or disable LLMNR/NBNS, and tighten ADCS protections. Otherwise, attackers can chain these primitives into devastating relays.</p>
</li>
</ul>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="40">In conclusion, the presentation demonstrated how Windows’ built-in fallback behaviors and overlooked protocol details can transform seemingly harmless network traffic into a serious threat. SMB authentications that would otherwise be discarded can be converted into relayable HTTP requests, and Kerberos tickets can be redirected to sensitive services to obtain valid certificates. For defenders, the takeaways are straightforward: disabling LLMNR and NBNS, stopping the WebClient service unless necessary, and hardening ADCS certificate issuance policies are key measures. Left unchecked, what appears to be ordinary background traffic on the network can become a pathway to full domain compromise.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="42"><em>Links to the articles:</em></p>
<ul class="code-line" dir="auto" style="text-align: justify;" data-line="44">
<li class="code-line" dir="auto" data-line="44"><span style="color: #000080;"><a style="color: #000080;" href="https://www.synacktiv.com/publications/taking-the-relaying-capabilities-of-multicast-poisoning-to-the-next-level-tricking#4-implications-regarding-ntlm-relaying" data-href="https://www.synacktiv.com/publications/taking-the-relaying-capabilities-of-multicast-poisoning-to-the-next-level-tricking#4-implications-regarding-ntlm-relaying">Taking the relaying capabilities of multicast poisoning to the next</a></span></li>
</ul>
</div>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Hacking a Metro Ticket</h2>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="50"><em>Speaker : Raphael Attias (rapatt)</em></p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="52">This talk was a dive into something both fun and a bit worrying: how easy it can be to hack metro tickets with a Flipper Zero.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="54">For those not familiar, the Flipper Zero is a pocket-sized multi-tool that can interact with various radio protocols, RFID, NFC, and more. While it can’t read every NFC type, it works with a lot of common ones — including the MiFare Ultralight cards used in many metro systems, festivals, and even hospitals.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="56">The speaker started by walking through the evolution of metro tickets: first punched paper, then magnetic stripes, and now RFID/NFC. In his city, the tickets use MiFare Ultralight, which comes with between 48 and 144 bytes of memory and a 7-byte UID. Pretty small and simple compared to more modern cards.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="58">The key detail: when a ticket is validated at a metro gate, the system simply updates one byte on page 3 of the card to mark it as “used.” That means if you can read and write to that sector, you can basically reset the ticket back to “unused” and ride again. The speaker spent nine months analyzing his card, dumping the data before and after validation, and mapping which bytes controlled what. Eventually, he managed to modify the data in a way that gave him unlimited rides.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="60">It didn’t stop there. He was even able to clone the ticket onto his Flipper Zero, use it directly at metro gates, show it to inspectors, and even recharge it at official machines. All because the system trusted the data stored on the card rather than handling everything server-side.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="62">Of course, the attack has its limits. It depends heavily on the ticketing system — not all cities use MiFare Ultralight, and more advanced implementations would catch this. Also, handling things like transfers and expiration dates requires modifying additional fields, which complicates the hack. Still, in this particular case, the weak design made unlimited metro travel possible.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="64">The fix seems straightforward: keep only the UID on the card and move all ticket logic to the backend. That way, even if someone rolls back or clones their card, the server-side system knows whether it’s valid or not. As of now, though, the city in question hasn’t corrected the issue — meaning free rides are technically still on the table.</p>
<p dir="auto" style="text-align: justify;" data-line="64"> </p>
<div style="text-align: justify;">
<h2>AsRepCatcher &#8211; Make everyone in your VLAN AsRepRoastable</h2>
</div>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="53"><em>Speaker: Yassine OUKESSOU</em></p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="55">A new tool called <strong>AsRepCatcher</strong> has been developed by the SOC Team Leader of the <strong>ITrust</strong> team. As the author is required to perform regular internal audits, he is faced with the following problem: <strong>How can a valid domain account be compromised without credentials</strong>?</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="59">Although there are many techniques for gaining initial access, <strong>environments are becoming increasingly secure and remedies are being more and more applied</strong>:</p>
<ul class="code-line" dir="auto" style="text-align: justify;" data-line="61">
<li class="code-line" dir="auto" data-line="61">EternalBlue / PrintNightmare / ZeroLogon: <strong>patched machines</strong></li>
<li class="code-line" dir="auto" data-line="62">LLMNR / NBT-NS / mDNS Poisoning: <strong>protocols disabled</strong></li>
<li class="code-line" dir="auto" data-line="63">AsRep Roasting: <strong>pre-authentication enabled by default on all accounts</strong></li>
<li class="code-line" dir="auto" data-line="64">Kerberoasting: <strong>SPNs placed only on service accounts and use of gMSA</strong></li>
<li class="code-line" dir="auto" data-line="65">Network shares: <strong>reading disabled with anonymous or guest accounts</strong></li>
<li class="code-line" dir="auto" data-line="66">Brute force weak passwords: <strong>strong password policy</strong></li>
<li class="code-line" dir="auto" data-line="67">Relays: <strong>signed protocols</strong></li>
<li class="code-line" dir="auto" data-line="68">Phishing: <strong>users made aware</strong></li>
</ul>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="70">Although the list is not exhaustive, it represents the majority of tests performed by an internal auditor.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="72">However, what the author noticed is that <strong>network access is always provided to the auditor</strong>, usually in the area reserved for standard users: <strong>the user VLAN</strong>. In this VLAN, if a user captures the traffic, he will see packets related to authentication, in particular with <strong>NTLM or Kerberos protocols</strong>.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="76">It turns out that with the Kerberos protocol, <strong>a derivative of the user&#8217;s password is used (called a hash) to create the KRB_AS_REP request (in the session key).</strong></p>
<p dir="auto" data-line="76"> </p>
<p dir="auto" data-line="76"><img loading="lazy" decoding="async" class="wp-image-27488 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Kerberos-authentication-229x191.png" alt="Kerberos authentication explicative scheme" width="664" height="554" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Kerberos-authentication-229x191.png 229w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Kerberos-authentication-47x39.png 47w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Kerberos-authentication.png 707w" sizes="auto, (max-width: 664px) 100vw, 664px" /></p>
<p dir="auto" data-line="76"> </p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="80">Thus, <strong>an attacker who can retrieve this request could then attempt to crack the user&#8217;s password</strong>. This is exactly what the AsRepCatcher tool attempts to do (hence the name).</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="82">To retrieve the KRB_AS_REP request, the tool uses a well-known technique called <strong>ARP Spoofing</strong>:</p>
<p dir="auto" data-line="82"> </p>
<p dir="auto" data-line="82"><img loading="lazy" decoding="async" class="wp-image-27484 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/ARP-Spoofing-Attack-416x191.png" alt="" width="741" height="340" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/ARP-Spoofing-Attack-416x191.png 416w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/ARP-Spoofing-Attack-71x33.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/ARP-Spoofing-Attack-768x353.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/ARP-Spoofing-Attack.png 925w" sizes="auto, (max-width: 741px) 100vw, 741px" /></p>
<p dir="auto" data-line="82"> </p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="86">An article by <strong>Veracode</strong> explains what ARP spoofing is and how to protect yourself from it: <a href="https://www.veracode.com/security/arp-spoofing/" data-href="https://www.veracode.com/security/arp-spoofing/"><span style="color: #000080;">https://www.veracode.com/security/arp-spoofing/</span></a></p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="88">AsRepCatcher modifies the ARP table of legitimate VLAN users, who will now send KRB_AS_REQ requests to the attacker, who can modify them on the fly <strong>by changing the source IP to his own</strong> and also modifying <strong>the encryption algorithms used to create the hash</strong>.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="90">This information is important because it allows the attacker to retrieve hashes encrypted with a weak algorithm (in this case <strong>RC4</strong>, provided the KDC authorizes its use), which will greatly facilitate password cracking (a few seconds with RC4 versus several days with AES).</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="92"><strong>The tool also has features to be more quiet on the network</strong>, such as the option (<strong>—disable-spoofing</strong>) to reset the ARP tables of users whose hash has already been captured.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="94">To protect against the tool, it is therefore recommended to implement remedies against ARP Spoofing and not to allow the RC4 encryption algorithm on the domain.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="96"><em>Tool link: <a href="https://github.com/Yaxxine7/ASRepCatcher" data-href="https://github.com/Yaxxine7/ASRepCatcher"><span style="color: #000080;">https://github.com/Yaxxine7/ASRepCatcher</span></a></em></p>
<p dir="auto" style="text-align: justify;" data-line="96"> </p>
<div style="text-align: justify;">
<h2>How does the national police force use OSINT to track down wanted persons?</h2>
</div>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="144"><em>Speaker: Nidhal BEN ALOUI</em></p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="146">Every year, <strong>580,000 people are registered in the Wanted Persons File</strong> (in french: <strong>Fichier des Personnes Recherchés</strong>). Each person has a file containing information about their identity (surname, first name, age, etc.), a photograph, the reason for the search, and the action to be taken if the individual is found.</p>
<p dir="auto" data-line="146"> </p>
<p dir="auto" data-line="146"><img loading="lazy" decoding="async" class=" wp-image-27486 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Fichier-des-personnes-recherchees-logo-202x191.png" alt="Fichier des personnes recherchées logo" width="304" height="287" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Fichier-des-personnes-recherchees-logo-202x191.png 202w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Fichier-des-personnes-recherchees-logo-41x39.png 41w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Fichier-des-personnes-recherchees-logo.png 357w" sizes="auto, (max-width: 304px) 100vw, 304px" /></p>
<p dir="auto" data-line="146"> </p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="150">In order to classify the files more easily, <strong>categories</strong> have been created, including:</p>
<ul class="code-line" dir="auto" style="text-align: justify;" data-line="152">
<li class="code-line" dir="auto" data-line="152"><strong>AL</strong>: mentally ill;</li>
<li class="code-line" dir="auto" data-line="153"><strong>IT</strong>: banned from the territory;</li>
<li class="code-line" dir="auto" data-line="154"><strong>M</strong>: runaway minors;</li>
<li class="code-line" dir="auto" data-line="155"><strong>PJ</strong>: judicial police searches;</li>
<li class="code-line" dir="auto" data-line="156"><strong>R</strong>: opposition to residence in France;</li>
<li class="code-line" dir="auto" data-line="157"><strong>S</strong>: state security;</li>
<li class="code-line" dir="auto" data-line="158"><strong>T</strong>: debtor to the Treasury;</li>
<li class="code-line" dir="auto" data-line="159"><strong>V</strong>: escapees;</li>
<li class="code-line" dir="auto" data-line="160"><strong>X</strong>: missing persons</li>
<li class="code-line" dir="auto" data-line="161">etc.</li>
</ul>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="163">The French gendarmerie police force is often called upon to search for people on this list as part of investigations. In order to find these individuals, the gendarmerie will then use <strong>a combination of open source intelligence (OSINT) and closed source intelligence</strong>.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="167">For the OSINT part, the use of <strong>social networks, tools, and public websites</strong> is widely favored. A particular attention is paid to the results of public tools, which are never considered certain by the police force. With regard to closed sources, the gendarmerie has <strong>internal tools, databases, and shared national registers</strong> that they can consult during the investigations.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="171">It is also possible for <strong>judicial police officers (OPJ)</strong> to <strong>request access to private information stored by companies</strong> via “derogatory requests”. Or even <strong>to communicate online with potential suspects</strong> via a “pseudonymous investigation.”</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="175">However, <strong>laws very precisely regulate the actions authorized</strong> by the gendarmerie, typically:</p>
<ul class="code-line" dir="auto" style="text-align: justify;" data-line="177">
<li class="code-line" dir="auto" data-line="177">Derogatory requests are permitted in the context of <strong>criminal investigations</strong>.</li>
<li class="code-line" dir="auto" data-line="178">Investigations conducted under pseudonyms require a <strong>certification from the Cyber Defense Command</strong> (ComCyber)</li>
<li class="code-line" dir="auto" data-line="179">Each pseudonym and avatar used in the context of an investigation under a pseudonym is <strong>unique and recorded in a list</strong> accessible to all judicial police officers in order to avoid investigating each other</li>
<li class="code-line" dir="auto" data-line="180"><strong>It is not permitted to incite someone to commit a crime</strong> (for example, asking a potential suspect to purchase illegal goods)</li>
</ul>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="182">During the conference, two real-life stories were shared to illustrate these concepts.</p>
<p dir="auto" style="text-align: justify;" data-line="182"> </p>
<h2 id="5---purple-team-methodology-and-tooling" class="code-line" dir="auto" style="text-align: justify;" data-line="0">Purple Team: Methodology and tooling</h2>
<p style="text-align: justify;"><em>Speaker: Mael Auzias</em></p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="2">This talk, given by Naval Group, tackled the problem of creating a methodology and tooling in order to perform Purple Teams and include them in a larger audit plan to monitor the evolution of the security level and compare different audited scopes.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="4">Indeed, as a part of the missions an internal audit team have, it is important to have defined audit frameworks in order to properly conduct assignments and compare their different results.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="6">To do so, a member of the Red Team worked with the Blue Team of Naval Group to define a specific framework of testing and results reporting, that will ultimately be used to evaluate the detections and responses of each audited party.</p>
<p dir="auto" style="text-align: justify;" data-line="6"> </p>
<h3 id="purple-team-presentation" class="code-line" dir="auto" style="text-align: justify;" data-line="7">Purple Team presentation</h3>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="8">A Purple Team is an exercise during which Red Team and Blue Team work hand in hand, by freely sharing both malicious actions that are executed and detections made. The ultimate goal being to improve both detection capacities and responses made.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="10">To properly prepare a Purple Team, it is thus important to define:</p>
<ul class="code-line" dir="auto" style="text-align: justify;" data-line="11">
<li class="code-line" dir="auto" data-line="11">What kind of attacker profile is to be simulated?</li>
<li class="code-line" dir="auto" data-line="12">What TTPs to focus on during the exercise?</li>
<li class="code-line" dir="auto" data-line="13">What are the targets of the assignment?</li>
<li class="code-line" dir="auto" data-line="14">What are the expected detections and responses?</li>
</ul>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="16">Once those points are taken care of, the Purple Team assignment can start.</p>
<p dir="auto" style="text-align: justify;" data-line="16"> </p>
<h3 id="methodology-and-tooling-dedicated-to-the-internal-purple-team-exercises" class="code-line" dir="auto" style="text-align: justify;" data-line="18">Methodology and tooling dedicated to the internal Purple Team exercises</h3>
<h4 id="perform-tests" class="code-line" dir="auto" style="text-align: justify;" data-line="19">Perform tests</h4>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="20">First, the methodology put in place by Naval Group leverages <a href="https://vectr.io/" data-href="https://vectr.io/"><span style="color: #000080;">VECTR</span></a>, a tool destined to automatize testing and measure detection effectiveness by offering a space to both Red and Blue Teams to collaborate. In this case, it is only used as a wrapper to automatically launch specific attacks and collect responses results.</p>
<p dir="auto" data-line="20"> </p>
<h4 id="grading-system" class="code-line" dir="auto" style="text-align: justify;" data-line="21">Grading system</h4>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="22">Once the attacks are performed and the detection are determined, the actions are classified in the following table:</p>
<p dir="auto" data-line="22"> </p>
<figure id="attachment_27482" aria-describedby="caption-attachment-27482" style="width: 753px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class=" wp-image-27482" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Rating_table-437x144.png" alt="Expected/Observed detection rating" width="753" height="248" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Rating_table-437x144.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Rating_table-71x23.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Rating_table-768x253.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Rating_table.png 1255w" sizes="auto, (max-width: 753px) 100vw, 753px" /><figcaption id="caption-attachment-27482" class="wp-caption-text"><em>Expected/Observed detection rating</em></figcaption></figure>
<p dir="auto" style="text-align: justify;" data-line="22"> </p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="26">Indeed, four cases can be differentiated:</p>
<ul class="code-line" dir="auto" style="text-align: justify;" data-line="27">
<li class="code-line" dir="auto" data-line="27">If an observed detection matches the expected one, the tested malicious action gets the higher rating (here, 7)</li>
<li class="code-line" dir="auto" data-line="28">If an observed detection is &#8220;lower&#8221; than the expected one, it gets a poor rating (between 1 to 3 here)</li>
<li class="code-line" dir="auto" data-line="29">If an observed detection is slightly higher (for example a the initiation of an incident investigation instead of a simple event), it gets a rather high rating (between 5 and 6 here)</li>
<li class="code-line" dir="auto" data-line="30">Finally, if an observed reaction is disproportionate regarding its expected one, it gets a low rating: triggering a global cyber crisis for an action that should not raise an alert can be incapacitating for an information system.</li>
</ul>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="32"><em>PS: here, the different categories do not exactly match the ones that were presented during the event.</em></p>
<p dir="auto" style="text-align: justify;" data-line="32"> </p>
<h4 id="final-grade" class="code-line" dir="auto" style="text-align: justify;" data-line="33">Final grade</h4>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="34">Finally, once every attack categories are tested, a specific math formula computes the final grading of the audited scope in the following graph:</p>
<p dir="auto" style="text-align: center;" data-line="34"> </p>
<figure id="attachment_27480" aria-describedby="caption-attachment-27480" style="width: 449px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class=" wp-image-27480" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Rating_graph-253x191.png" alt="Final grading graph" width="449" height="339" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Rating_graph-253x191.png 253w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Rating_graph-52x39.png 52w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Rating_graph.png 351w" sizes="auto, (max-width: 449px) 100vw, 449px" /><figcaption id="caption-attachment-27480" class="wp-caption-text"><em>Final grading graph</em></figcaption></figure>
<p dir="auto" style="text-align: justify;" data-line="34"> </p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="38">This final grading will allow to deduce the performance of the Blue Team, but also monitor the evolution of this of metric over time.</p>
<p dir="auto" style="text-align: justify;" data-line="38"> </p>
<h3 id="conclusion" class="code-line" dir="auto" style="text-align: justify;" data-line="40">Conclusion</h3>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="41">Thus, by defining a clean audit frame to perform Purple Team, it ensures Naval Group to properly assess the performance of the detections made in the different scopes of the company, compare them and monitor the evolutions over time.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="43">This will assurely be proven efficient the more Purple Team exercise are conducted.</p>
<p dir="auto" style="text-align: justify;" data-line="43"> </p>
<div style="text-align: justify;">
<h2>How malicious actors fool researchers with unpopular software</h2>
<div>
<p class="code-line" dir="auto" data-line="228"><em>Speaker: Georgy Kucherin</em></p>
<p class="code-line" dir="auto" data-line="230">The speaker, a vulnerability researcher at Kaspersky, presents a case study encountered during a real-life mission.</p>
<p class="code-line" dir="auto" data-line="232">As a network analyst working for a client, the researcher was struck by a result collected in the <strong>SIEM</strong>.</p>
<p class="code-line" dir="auto" data-line="234">The domain <a href="http://eventuallogic.com/" data-href="http://eventuallogic.com/"><span style="color: #000080;">eventuallogic.com</span></a> is retrieved and analyzed on the well-known Virus Total platform with a score of <strong>1/97</strong> (meaning that one antivirus program recognizes the domain as suspicious or dangerous, compared to 96 that recognize it as safe).</p>
<p class="code-line" dir="auto" data-line="236">Given the result, many would not have looked any further, but Georgy continued his investigation out of curiosity.</p>
<p class="code-line" dir="auto" data-line="238">Upon visiting the website, <strong>the company appears to offer software for compressing files</strong>. Georgy <strong>downloaded it to a VM and tested it</strong>. The tool works well despite recurring ads.</p>
<p class="code-line" dir="auto" data-line="240">At this point, many researchers would classify the software as <strong>PUA (= Potentially Unwanted Application)</strong>, meaning that the software is not desired on a professional workstation (mainly because of the ads), but is not considered dangerous. However, <strong>only the IT department can decide to ban this type of software</strong>; it is not up to analysts at the <strong>SOC (Security Operation Center)</strong> to decide, unless there is evidence of malicious activity linked to this software.</p>
<p class="code-line" dir="auto" data-line="242">Georgy decides to take some time and analyze this software in more depth, starting with an <strong>online sandbox</strong>: <span style="color: #000080;"><a style="color: #000080;" href="http://joesandbox.com/" data-href="http://joesandbox.com/">joesandbox.com</a>.</span></p>
<p class="code-line" dir="auto" data-line="244">The sandbox then runs the software in a controlled environment and analyzes it. This time, the result is <strong>56/100</strong>, indicating that the software failed certain tests.</p>
<p class="code-line" dir="auto" data-line="246">A file named <strong>decrypt.exe</strong> is found in the computer&#8217;s memory when the software is running. This file is retrieved by Georgy and analyzed on Virus Total, with a score of <strong>5/97</strong>. Still not very high, but in the relationships tab, another domain is present: <span style="color: #000080;"><a style="color: #000080;" href="http://decryptables.com/" data-href="http://decryptables.com/">decryptables.com</a>.</span></p>
<p class="code-line" dir="auto" data-line="248">By repeating this method several times, Georgy traced the file back to another domain offering compression software: Let&#8217;s Compress.</p>
<p class="code-line" dir="auto" data-line="250">The software was analyzed again on joesandbox, and this time Georgy found that the compression software executed <strong>a Python file compiled with pyinstaller</strong>.</p>
<p class="code-line" dir="auto" data-line="252">Georgy performed the following actions:</p>
<ul class="code-line" dir="auto" data-line="254">
<li class="code-line" dir="auto" data-line="254">Extract the content with <strong>pyinstxtractor</strong></li>
<li class="code-line" dir="auto" data-line="255">Convert the main.pyc file into <strong>readable Python script</strong></li>
<li class="code-line" dir="auto" data-line="256"><strong>Deobfuscate</strong> the resulting .py script</li>
<li class="code-line" dir="auto" data-line="257"><strong>Decrypt a .json file</strong> created by the script</li>
<li class="code-line" dir="auto" data-line="258">Find a call to a <strong>Command &amp; Control (C2)</strong> infrastructure in this json file</li>
</ul>
<p class="code-line" dir="auto" data-line="260">After all these investigations, here is proof that <strong>the file is malicious</strong>.</p>
<p class="code-line" dir="auto" data-line="262"><strong>The reverse path</strong> was taken in order to verify the link between the malicious file and the detected base domain.</p>
<p class="code-line" dir="auto" data-line="264">The point of all this is to prove that <strong>malicious actors put in place numerous layers to mislead researchers</strong>, and that even a low score from a widely accepted tool such as Virus Total is not enough to judge the trustworthiness of a binary or domain.</p>
</div>
</div>
<p dir="auto" style="text-align: justify;" data-line="264"> </p>
<div style="text-align: justify;">
<h2>Decompiling malicious binaries for Linux with r2ai</h2>
<div>
<p class="code-line" dir="auto" data-line="1"><em>Speaker: Axelle Apvrille</em></p>
<p class="code-line" dir="auto" data-line="3">During these days where AI meets cybersecurity more than ever, it was impossible not to have a talk about it. In this talk, Axelle presented <strong>r2ai</strong>, a new plugin for radare2, the well-known reverse engineering framework. The idea is simple yet powerful: combine radare2’s disassembly capabilities with a Large Language Model (LLM) to <strong>translate raw assembly into more intelligible source code</strong>.</p>
<p class="code-line" dir="auto" data-line="5">The talk illustrated the tool’s potential with the analysis of <strong>two real-world malware samples</strong>, showcasing both its strengths and limitations.</p>
<p dir="auto" data-line="5"> </p>
<h3 id="case-study-1-a-tiny-but-crafty-shellcode" class="code-line" dir="auto" data-line="6">Case Study 1: A Tiny but Crafty Shellcode</h3>
<p class="code-line" dir="auto" data-line="8">The first sample was a lightweight <strong>4 KB ELF shellcode</strong>, packed with tricks to frustrate static analysis. Looking for strings inside the data section provided nothing of interest, and even <strong>Ghidra</strong> provided little beyond a cryptic <code>swi</code> instruction.</p>
<p class="code-line" dir="auto" data-line="10">With r2ai, however, the story was different, the disassembly became far more readable. The model pointed out <strong>socket creation</strong> and a suspicious <strong>connect-back routine</strong>. But here came an important caveat: LLMs may &#8220;hallucinate&#8221;. For instance, the model initially suggested a connection to <code>127.0.0.1:4444</code>, which turned out to be incorrect after deeper inspection of the actual assembly.</p>
<p class="code-line" dir="auto" data-line="12">Still, the plugin correctly highlighted another key behavior: a call to <code>mprotect</code> modifying stack memory permissions to <strong>RWX</strong>: a typical indicator of a stager preparing to fetch and execute a payload from a C2 server.</p>
<p class="code-line" dir="auto" data-line="14">In this first case, r2ai showed how it could accelerate the discovery of high-level logic, while human analysts remained essential to validate and correct its interpretation.</p>
<p dir="auto" data-line="14"> </p>
<h3 id="case-study-2-trigona-ransomware-on-linux" class="code-line" dir="auto" data-line="17">Case Study 2: Trigona Ransomware on Linux</h3>
<p class="code-line" dir="auto" data-line="19">The second sample was <strong>Trigona</strong>, a ransomware family usually seen in Windows environments, but with an unexpected <strong>Linux variant</strong> dating back to May 2023. Interestingly, the code was written in <strong>Delphi</strong>—a surprising choice that puzzled many in the audience.</p>
<p class="code-line" dir="auto" data-line="21">Although Trigona was thought to be inactive, <strong>samples were still circulating as of April 2025</strong>, making the analysis particularly relevant.</p>
<p class="code-line" dir="auto" data-line="23">Here, r2ai required extra tuning (increasing the maximum tokens of the model&#8217;s context) to compensate with the binary’s size, but it revealed crucial behaviors:</p>
<ul class="code-line" dir="auto" data-line="24">
<li class="code-line" dir="auto" data-line="24">Shutting down <strong>virtual machines</strong> to maximize disruption,</li>
<li class="code-line" dir="auto" data-line="25">Locating and encrypting documents,</li>
<li class="code-line" dir="auto" data-line="26">Implementing data <strong>exfiltration</strong> before encryption.</li>
</ul>
<p class="code-line" dir="auto" data-line="28">The researchers emphasized how quickly they could map the <strong>entire kill chain</strong>, compared with traditional workflows in IDA Pro or Ghidra.</p>
<p dir="auto" data-line="28"> </p>
<h3 id="limits-and-takeaways" class="code-line" dir="auto" data-line="30">Limits and Takeaways</h3>
<p class="code-line" dir="auto" data-line="31">The presentation ended with a discussion of r2ai’s limitations:</p>
<ul class="code-line" dir="auto" data-line="32">
<li class="code-line" dir="auto" data-line="32"><strong>Token constraints</strong>: long analyses may crash or become expensive,</li>
<li class="code-line" dir="auto" data-line="33"><strong>Accuracy</strong>: while LLMs can explain syscalls and control flow, they sometimes &#8220;invent&#8221; values or logic that analysts must double-check,</li>
<li class="code-line" dir="auto" data-line="34"><strong>Complementary use</strong>: r2ai doesn’t replace standard tools but rather enhances them, accelerating hypothesis-building.</li>
</ul>
<p class="code-line" dir="auto" data-line="36">Still, the experiment showed that coupling an AI model with a disassembler opens new perspectives: <strong>interactive reverse engineering with natural language queries</strong>.</p>
</div>
</div>
<p dir="auto" style="text-align: justify;" data-line="43"> </p>
<div style="text-align: justify;">
<div>
<div>
<h2>Scanning a network without an IP address, a good idea ?</h2>
<p><em>Speakers: Julien M. &amp; Francis H.</em></p>
<p class="code-line" dir="auto" data-line="49">This presentation, given by Naval Group, introduced a way of scanning a network without displaying its IP address by combining the way of functioning of two basic protocols. Two employees were on stage, one form the Red Team and one from the Blue Team.</p>
<p dir="auto" data-line="49"> </p>
<h3 id="the-protocol-basics" class="code-line" dir="auto" data-line="50">The protocol basics</h3>
<p class="code-line" dir="auto" data-line="51">To understand the following presentation, it is important to go over two famous protocols: ARP (Address Resolution Protocol) and TCP (Transmission Control Protocol).</p>
<h4 id="arp" class="code-line" dir="auto" data-line="52">ARP</h4>
<p class="code-line" dir="auto" data-line="53">ARP is a protocol dedicated to the discovery of assets present in a network, by associating a MAC address and an IP address.</p>
<p class="code-line" dir="auto" data-line="55">To perform this discovery step, broadcast requests are sent to ask for the MAC address corresponding to a specific destination IP address if the latter is not known by the network equipment (for example, a router).</p>
<p dir="auto" data-line="55"> </p>
<h4 id="tcp" class="code-line" dir="auto" data-line="56">TCP</h4>
<p class="code-line" dir="auto" data-line="57">TCP is a communication protocol ensuring reliable, ordered, error-checked data deliver. it relies on SYN requests sent by a source to a destination. Different answers can be expected depending on the accessibility of the destination port:</p>
<ul class="code-line" dir="auto" data-line="58">
<li class="code-line" dir="auto" data-line="58">If the port is filtered, no answer is sent back as the SYN packet does not reach the destination</li>
<li class="code-line" dir="auto" data-line="59">If the port is closed, a RST packet is sent back to the source</li>
<li class="code-line" dir="auto" data-line="60">If the port is opened, a SYN+ACK packet is sent back.</li>
</ul>
<p class="code-line" dir="auto" data-line="62">Another case can be differnciated: if the port is opened but the source disapears of the network (for example after a network shortage), the SYN+ACK packet is sent several times (for example, 5 for some equipment) by the destination in order to continue the TCP exchange.</p>
<p dir="auto" data-line="62"> </p>
<h3 id="gathering-arp-and-tcp-and-maths" class="code-line" dir="auto" data-line="64">Gathering ARP and TCP (and maths)</h3>
<p class="code-line" dir="auto" data-line="65">Thus, a new methodology of scanning emerges of the combination of the way of functionning of ARP and TCP.</p>
<p class="code-line" dir="auto" data-line="67">The goal is to craft a specific SYN packet, by forging the source address to chose an IP address that is not currently in use in the network, and send it to the victim on the chosen port. Following the response of the destination, and since the source IP adress is unknown by the router, the latter will send ARP broadcast requests to find the source. Furthermore, the number of ARP requests will depend on the state of the port:</p>
<ul class="code-line" dir="auto" data-line="68">
<li class="code-line" dir="auto" data-line="68">If the port is filtered, there will be no response sent by the destination, and thus no ARP broadcast request</li>
<li class="code-line" dir="auto" data-line="69">If the port is closed, there will be one RST packet sent by the destination to the unknown source, and thus one ARP broadcast request</li>
<li class="code-line" dir="auto" data-line="70">If the port is opened, there will be several SYN+ACK packets as there won&#8217;t be ACK packets sent back by the unknown source, thus several ARP broadcast requests</li>
</ul>
<p class="code-line" dir="auto" data-line="72">The attacker will just have to monitor the number of ARP broadcast requests related to the impersonated unknown IP address to deduce the state for the scanned port.</p>
<p class="code-line" dir="auto" data-line="74">However, some limitations exist: for example, the fact that the number of SYN+ACK packets vary may induce a number of false positive, and makes it more difficult to develop reliable tools.</p>
<p dir="auto" data-line="74"> </p>
<h3 id="what-does-the-soc-have-to-say" class="code-line" dir="auto" data-line="76">What does the SOC have to say?</h3>
<p class="code-line" dir="auto" data-line="77">Following the presentation of this methodology, the member of the Blue Team explained the point of view of the SOC regarding this scanning technique.</p>
<p class="code-line" dir="auto" data-line="79">First, it is important to say that while this scanning technique is quite difficult to detect in real life scenarios, it is only one way out of many to scan a network, which thus represents a tiny fraction of scanning scenario (regarding a MITRE ATT&amp;CK matrix) a SOC has to cover.</p>
<p class="code-line" dir="auto" data-line="81">Additionally, this scanning scenario only happens when the network has first been breached, and is not the end of the killchain as well. The Blue Team has several other defense mechanisms to stop attacks either upstream or downstream of this malicious action.</p>
<p dir="auto" data-line="81"> </p>
<h3 id="conclusion-1" class="code-line" dir="auto" data-line="83">Conclusion</h3>
<p class="code-line" dir="auto" data-line="84">Thus, even if this scanning method is quite ingenious, the Blue Teams may not be forced to take it into account and spend time resolving the issue. This conclusion may be even generalized to other future findings: a Blue Team must chose its battle, regarding the severity of the attack techniques and the manpower at disposal.</p>
</div>
</div>
</div>
<p dir="auto" style="text-align: justify;" data-line="84"> </p>
<div style="text-align: justify;">
<h2>A Tale of Two Reports: The Trivial Things We&#8217;re Told vs. The Vital Things We&#8217;re Not</h2>
<div>
<div>
<div>
<p class="code-line" dir="auto" data-line="69"><em>Speaker: Koreth</em></p>
<p class="code-line" dir="auto" data-line="71">This talk was all about a problem everyone in security knows too well: we’re buried under alerts, notifications, and reports — but the truly important ones are often the first to be missed.</p>
<p class="code-line" dir="auto" data-line="73">Silent Ghost kicked things off with some well-known examples. Take the Target breach: 70 million credit cards leaked, and the warning was there, but it looked too much like spam, so nobody acted. Same story in Rouen (2019), where a phishing email dropped malware that spread laterally across the network. The initial alert was flagged, but ignored. Colonial Pipeline in 2021? Again, a notification existed — but nobody paid attention.</p>
<p class="code-line" dir="auto" data-line="75">And this isn’t a new issue. Back in 2016, the NSA lost sensitive data because an employee simply used a USB stick to exfiltrate it. SolarWinds in 2019 showed how dangerous a compromised CICD pipeline could be, yet very few people noticed the early signs. More recently, Kiabi (2024) faced a €100 million fraud from an internal accountant — red flags were there, but lost in the noise.</p>
<p class="code-line" dir="auto" data-line="77">The structural issue is clear: only 0.13% of pull requests are labeled “security,” while closer to 15% actually involve security. That gap means real vulnerabilities are hidden in plain sight. Silent Ghost pointed out one CVE that took more than 100 undocumented fixes before it was officially recognized.</p>
<p class="code-line" dir="auto" data-line="79">Bug bounty programs suffer the same fate. Running private programs at YesWeHack, he sees inboxes flooded with overblown or poorly written reports: emails describing “CVSS 10” vulnerabilities that turn out to be nothing more than a misconfigured header or an exposed Google Maps API key. The sheer volume of this noise risks burying the handful of truly critical findings.</p>
<p class="code-line" dir="auto" data-line="81">The takeaway was clear: as an industry, we need to cut the noise. Fewer useless notifications, better triage, and clearer reporting standards would help ensure the important alerts get through. Otherwise, the next major breach alert will end up ignored just like the last.</p>
</div>
<div> </div>
</div>
</div>
</div>
<div style="text-align: justify;"> </div>
<div style="text-align: justify;">
<div>
<h2>OASIS &#8211; Ollama Automated Security Intelligence Scanner</h2>
<p class="code-line" dir="auto" data-line="40"><em>Speaker: psyray (Raynald Coupé)</em></p>
<p class="code-line" dir="auto" data-line="42">Another presentation around the usage of AI in the cybersecurity was held about <strong>OASIS</strong>, an open-source framework designed to analyze source code with the help of AI models, with an accent on <strong>confidentiality</strong>.</p>
<p class="code-line" dir="auto" data-line="44">Its creator developed the tool out of necessity: traditional SaaS-based AI solutions raise concerns when working on sensitive client code, making <strong>local deployment a must</strong>.</p>
<p class="code-line" dir="auto" data-line="46">As its name implies, OASIS relies on <strong>Ollama</strong>, a lightweight system that allows developers to run large language models on their own infrastructure. The result is a practical solution for secure, scalable, and customizable code audits.</p>
<p dir="auto" data-line="46"> </p>
<h3 id="architecture-and-workflow" class="code-line" dir="auto" data-line="48">Architecture and Workflow</h3>
<p class="code-line" dir="auto" data-line="49">At a technical level, OASIS relies on a <strong>semantic embedding system</strong>: source code is transformed into vectors, enabling contextual analysis beyond simple pattern matching. This foundation allows the AI to spot vulnerabilities in a way that resembles human reasoning. The tool offers multiple modes of operation</p>
<ul class="code-line" dir="auto" data-line="51">
<li class="code-line" dir="auto" data-line="51"><strong>Audit Mode</strong>: A quick scan to flag high-risk areas in large codebases. By tuning thresholds, analysts can minimize false positives while still obtaining a strong first-pass overview,</li>
<li class="code-line" dir="auto" data-line="52"><strong>Standard Scan</strong> (two-phase):
<ol class="code-line" dir="auto" data-line="53">
<li class="code-line" dir="auto" data-line="53">A <strong>lightweight model</strong> highlights potentially suspicious code,</li>
<li class="code-line" dir="auto" data-line="54">A <strong>more powerful model</strong> performs deep analysis of the flagged sections. This is ideal for large projects with consistent risk profiles.</li>
</ol>
</li>
<li class="code-line" dir="auto" data-line="55"><strong>Adaptive Scan</strong> (multi-level):
<ol class="code-line" dir="auto" data-line="56">
<li class="code-line" dir="auto" data-line="56">A <strong>static scan</strong> with patterns and regex (fast and without AI),</li>
<li class="code-line" dir="auto" data-line="57">A <strong>lightweight model</strong> scans for surface issues,</li>
<li class="code-line" dir="auto" data-line="58">A <strong>contextual analysis</strong> with risk scoring,</li>
<li class="code-line" dir="auto" data-line="59">An <strong>in-depth review</strong> using a heavyweight model,</li>
<li class="code-line" dir="auto" data-line="60">This tiered approach ensures flexibility: from a quick audit to a comprehensive deep dive.</li>
</ol>
</li>
</ul>
<p> </p>
<h3 id="detection-capabilities" class="code-line" dir="auto" data-line="62">Detection Capabilities</h3>
<p class="code-line" dir="auto" data-line="63">OASIS is designed to catch a wide range of issues, including</p>
<ul class="code-line" dir="auto" data-line="64">
<li class="code-line" dir="auto" data-line="64"><strong>Web vulnerabilities</strong>: XSS, XXE, CSRF,</li>
<li class="code-line" dir="auto" data-line="65"><strong>Authentication flaws</strong>,</li>
<li class="code-line" dir="auto" data-line="66"><strong>Sensitive data exposure</strong>,</li>
<li class="code-line" dir="auto" data-line="67"><strong>Configuration errors</strong> such as path traversal or weak cryptographic suites.</li>
</ul>
<p class="code-line" dir="auto" data-line="69">The framework supports <strong>multiple programming languages</strong> and can even generate <strong>Burp Suite requests</strong> to validate findings.</p>
<p dir="auto" data-line="69"> </p>
<h3 id="reporting-and-outputs" class="code-line" dir="auto" data-line="71">Reporting and Outputs</h3>
<p class="code-line" dir="auto" data-line="72">Beyond detection, OASIS generates structured reports in <strong>PDF, Markdown, or HTML</strong>, documenting:</p>
<ul class="code-line" dir="auto" data-line="73">
<li class="code-line" dir="auto" data-line="73">The complete <strong>attack chain</strong> for each vulnerability (entry point, exploitation path, potential impact),</li>
<li class="code-line" dir="auto" data-line="74"><strong>Remediation recommendations</strong>, helping developers fix issues quickly.</li>
</ul>
<p class="code-line" dir="auto" data-line="76">This makes the reports usable both for technical teams and for managers needing a higher-level view of project risk.</p>
</div>
</div>
<p dir="auto" style="text-align: justify;" data-line="76"> </p>
<h2 dir="auto" style="text-align: justify;" data-line="76">Post-Incident Lessons from an Industrial Cyber Breach</h2>
<p style="text-align: justify;"><em>Speakers: Hack’im et Antxine</em></p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="90">This talk was given by two speakers regarding a post-incident feedback.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="92">Indeed, one of their client contacted them after plugging in an USB flash drive on a standard workstation where an EDR triggered an alert. It was suspicious in that case because this flash drive did not raise alerts before, and was only used to update a standalone server separated form the rest of the network.</p>
<p dir="auto" style="text-align: justify;" data-line="92"> </p>
<h3 id="beginning-of-the-investigation" class="code-line" dir="auto" style="text-align: justify;" data-line="94">Beginning of the investigation</h3>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="95">Thus, the focus was made on the server, likely to be infected by a malicious program which propagated to the flash drive.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="97">Using classic tools to retrieve the 900GB of the server and analyze the filesystem and evtx files, they discovered a hidden suspicious program in the <code>%APPDATA%</code> folder called <code>aL4N.exe</code>. Indeed, an unkown executable such as this one should not be in this folder, raising the interest of the investigators.</p>
<p dir="auto" style="text-align: justify;" data-line="97"> </p>
<h3 id="al4nexe" class="code-line" dir="auto" style="text-align: justify;" data-line="99">aL4N.exe</h3>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="100">Using VirusTotal to evaluate the dangerousness of the executable, it showed a detection index of 52/94, being concerning and then driving the investigators to continue their assessment in this direction.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="102">Following this lead, they discovered that this malwere has been present on the server from the mastering of the latter, back in 2016, and was brought up by a flash drive.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="104">Traces of earlier in-house investigations were found, with a file mentionning the presence of <code>aL4N.exe</code> found by employees.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="107">Written in AutoIT, this malware establishes a communication tunnel to a C2 (Command &amp; Control) server. However, in the case of this malware, when configured, the malicious actor set the remote server address to <code>localhost</code>, denoting a lack of knowledge from the initiator of the attack.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="109">The replication system of this malware is however less classic. As soon as an external storage of more of 1GB is attached to an infected target, <code>aL4N.exe</code> will create a <code>My Pictures</code> folder and hide it, copy itself in it and create a shortcut for <code>My Pictures</code> that will execute <code>aL4N.exe</code> upon clicking.</p>
<p dir="auto" style="text-align: justify;" data-line="109"> </p>
<h3 id="conclusion-2" class="code-line" dir="auto" style="text-align: justify;" data-line="111">Conclusion</h3>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="112">The main takeout of this talk is to install detection mechanisms on every components of an IS, even if they are separated for the main network. It is also possible to put in place efficient detection and cleaning stations for flash drives to sanitize removable storage devices, even if the ones of this company did not detecte <code>aL4N.exe</code>.</p>






<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/09/barbhack-what-to-remember/">Barb’Hack : What to Remember</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/09/barbhack-what-to-remember/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Adapting your detection strategy to the multi-cloud without getting lost in the cloud</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/10/adapting-your-detection-strategy-to-the-multi-cloud-without-getting-lost-in-the-cloud/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2021/10/adapting-your-detection-strategy-to-the-multi-cloud-without-getting-lost-in-the-cloud/#respond</comments>
		
		<dc:creator><![CDATA[Thomas Vo-Dinh]]></dc:creator>
		<pubDate>Mon, 18 Oct 2021 12:54:00 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[SOC]]></category>
		<category><![CDATA[Transformation]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=17051</guid>

					<description><![CDATA[<p>  If 10 years ago, building your SOC meant asking yourself which scenarios to monitor, which log sources to collect and which SIEM to choose, recent developments in the IS have brought new challenges: how to set up monitoring in...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/10/adapting-your-detection-strategy-to-the-multi-cloud-without-getting-lost-in-the-cloud/">Adapting your detection strategy to the multi-cloud without getting lost in the cloud</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p> </p>
<p>If 10 years ago, building your SOC meant asking yourself which scenarios to monitor, which log sources to collect and which SIEM to choose, recent developments in the IS have brought new challenges: how to set up monitoring in a partially on-premise and/or multi-cloud environment? Indeed, in 2021, having an IS hosted by several IaaS providers is closer to being the rule than the exception; and while AWS remains the most popular player, Azure and GCP offerings are of increasing interest to IT teams.</p>
<p>How to build a detection strategy? Where to position the SIEM? How to centralize logs and alerts? In fact, do we need logs or alerts? And how to take advantage of the managed solutions offered by cloud providers?</p>
<p>In this article, we will discuss best practices: using a bottom-up detection strategy, optimizing via the choice of the most relevant cloud native services, simplifying the collection architecture; always based on feedback from building multi-cloud monitoring strategies.</p>
<h2><strong>(Re)thinking your detection strategy for the multicloud</strong></h2>
<p>The first question the SOC team should ask itself is the detection strategy. In other words, what scenarios will be monitored?</p>
<p>A good cyber reflex is to use a &#8220;top-down&#8221; approach: start with a risk analysis to identify the alerts to prioritize, formalize them and then translate them technically into the SIEM. In practice, three factors demonstrate that this approach is insufficient:</p>
<ul>
<li>Few teams have risk analyses that are sufficiently exhaustive, up to date and pragmatic to allow the breakdown of threat scenarios into monitorable scenarios, especially for complex scopes such as the public cloud;</li>
<li>There is no guarantee that the scenarios obtained by this method can actually be put under supervision, whether the limitations are related to the solutions deployed or to the need for SOC teams to have business knowledge.</li>
<li>This approach defines some attack paths according to the criticality of the assets but does not cover all the attack paths that an attacker could take.</li>
</ul>
<p>Therefore, an efficient multi-cloud detection strategy will be obtained by completing the risk-based approach with a &#8220;bottom-up&#8221; approach: starting from the logging capabilities of the solutions available to identify the alerts that the SIEM will have to raise, and finally prioritize based on their interest in terms of risk coverage. Starting with the existing solutions guarantees the pragmatism and efficiency of the approach.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-17067 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/EN-image-1-multicloud.png" alt="" width="1162" height="732" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/EN-image-1-multicloud.png 1162w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/EN-image-1-multicloud-303x191.png 303w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/EN-image-1-multicloud-62x39.png 62w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/EN-image-1-multicloud-768x484.png 768w" sizes="auto, (max-width: 1162px) 100vw, 1162px" /></p>
<p>At Wavestone, we are increasingly solicited by clients who want to be supported in this new approach. The scope concerns the main solutions used in multicloud: Microsoft 365 (SaaS) and the managed solutions of the IaaS offers of the 3 main market players: Amazon Web Services, Microsoft Azure and Google Cloud Platform.</p>
<h2><strong>Set up the supervision of the Microsoft 365 infrastructure</strong></h2>
<p>On paper, the SOC team has all the keys in hand to monitor its cloud infrastructure:</p>
<p>&#8211; Raw logs for Office 365 services (Teams, SharePoint Online, Exchange Online, etc.)</p>
<p>&#8211; Raw logs, security reports, alerts and Identity Secure Score for Azure AD</p>
<p>&#8211; Raw logs, alerts, Microsoft Secure Score and Azure recommendations for security tools like ATP, AAD Identity Protection, Intune, AIP, etc.</p>
<p>In practice, navigating between the logs and all the tools available (and their consoles) can quickly become a headache. And if we regularly hear that there are too many logs or administration interfaces to master, in the field the difficulties are accentuated:</p>
<p>&#8211; By the poor customization capabilities of the native tools offered,</p>
<p>&#8211; By the lack of scenarios available with the purchased license,</p>
<p>&#8211; By the 90-day retention period for logs,</p>
<p>&#8211; By the general lack of Office 365 or AzureAD skills in the SOC teams.</p>
<p>To avoid getting lost, we recommend simplifying the playing field as much as possible. The best practices consist in thinking about alerts, not logs collection, and then centralizing their management in the SIEM using connectors like those of Security Graph API. As an example, it is possible to arrive at a model like the one given below:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-17074 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/EN-image-2-multicloud.png" alt="" width="1202" height="803" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/EN-image-2-multicloud.png 1202w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/EN-image-2-multicloud-286x191.png 286w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/EN-image-2-multicloud-58x39.png 58w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/EN-image-2-multicloud-768x513.png 768w" sizes="auto, (max-width: 1202px) 100vw, 1202px" /></p>
<p>Once the architecture has been identified, configure a log retention period adapted to your needs (within Azure or outside) and start adapting the SOC processes to the specificities of M365 according to the choices made in the previous step.</p>
<h2><strong>Set up the supervision of other clouds in IaaS</strong></h2>
<p>To draw the architecture of collection on these clouds, it is necessary to distinguish the different types of logs made available by the CSPs.</p>
<h3><strong>System logs</strong></h3>
<p>The case of system logs generated by VMs and network flows can be dealt with first; it is possible to collect them in the same way as on-premise, with syslog agents, for example. CSP infrastructures provide building blocks such as Log Analytics in Azure to facilitate reporting.</p>
<h3><strong>Infrastructure administration logs</strong></h3>
<p>It is also possible to supervise the administration of &#8220;sensitive&#8221; infrastructure components (VPN, FW, vulnerability scanners, etc.) in the same way as on-premise solutions. Indeed, most of these solutions have their IaaS counterpart in the cloud providers: they can be obtained via the Marketplace and have a web administration console or interface directly with the CSP&#8217;s management console (this is the case for the Qualys scanner appliance, for example).</p>
<h3><strong>API call logs</strong></h3>
<p>Finally, API calls made by processes/accounts on the cloud infrastructure and by administration operations generate logs that are easily retrievable via the following managed services:</p>
<p>&#8211; CloudTrail at AWS</p>
<p>&#8211; Activity Log &amp; Monitor at Azure</p>
<p>&#8211; Audit Logging at GCP</p>
<p>To avoid getting lost, let&#8217;s learn the lesson: &#8220;Use and abuse cloud-native services”. After all, who better than the provider to offer services that are adapted and integrated into the environment? In practice, we see that implementing log management and cloud alerts in an on-premise SIEM is expensive (even if we try to limit storage costs in the monitoring solution) and time-consuming.</p>
<p>The use of the cloud implies a shift to the cloud philosophy: let&#8217;s adopt its codes and tame its services and tools. This is an opportunity to strengthen the synergies between the cloud teams and the SOC!</p>
<p>In summary, an example of monitoring architecture on AWS is proposed below. It shows several ways to perform monitoring, using native services for logs and alerts (NB: all flows to S3 and other services have not been shown for readability reasons).</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-17085 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/EN-image-3-multicloud.png" alt="" width="1233" height="732" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/EN-image-3-multicloud.png 1233w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/EN-image-3-multicloud-322x191.png 322w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/EN-image-3-multicloud-66x39.png 66w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/EN-image-3-multicloud-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/EN-image-3-multicloud-768x456.png 768w" sizes="auto, (max-width: 1233px) 100vw, 1233px" /></p>
<h2><strong>Define the architecture for centralizing multi-cloud alerts</strong></h2>
<p>This is one of the questions we are asked the most: what SIEM architecture should be considered in the multi-cloud? While each context is different, because each IT infrastructure has its own legacy and history, the presence of so many resources and tools should lead an SOC team to consider adopting a central cloud SIEM (such as Azure Sentinel, Splunk SaaS, etc.; AWS and Google&#8217;s Chronicle do not offer an equivalent solution to date).</p>
<p>To help SOC teams choose the right scenario, our recommendations are as follows:</p>
<p>&#8211; Prefer the scenario with a single central SIEM</p>
<p>&#8211; Limit the number of cloud monitoring consoles as much as possible</p>
<p>&#8211; Maximize the number of alerts that have already been analyzed by the native services studied above</p>
<p>&#8211; Take advantage of possible synergies between products from the same supplier: Azure Sentinel for monitoring Microsoft 365 infrastructure, for example</p>
<p>&#8211; Take advantage of the numerous connectors made available by cloud SIEM providers</p>
<p>&#8211; Study the impact of each scenario on the organization of the SOC (team size, technological skills, etc.) and the associated costs (necessary developments, volume and ingestion costs, etc.)</p>
<p>An example of an architecture that includes all the recommendations of this article is proposed below, it uses Azure Sentinel as a central cloud SIEM.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-17087 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/EN-image-4-multicloud.png" alt="" width="1244" height="635" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/EN-image-4-multicloud.png 1244w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/EN-image-4-multicloud-374x191.png 374w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/EN-image-4-multicloud-71x36.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/EN-image-4-multicloud-768x392.png 768w" sizes="auto, (max-width: 1244px) 100vw, 1244px" /></p>
<h2><strong>Summary: Key principles to keep your head above the clouds</strong></h2>
<p>In summary, the SOC team wanting to adapt its detection strategy to the multicloud should:</p>
<p>&#8211; Complement its classic top-down approach with the bottom-up approach, which is particularly well-suited to the complex context of the multicloud,</p>
<p>&#8211; Use native services provided by vendors whenever possible to take full advantage of the cloud,</p>
<p>&#8211; Simplify the collection architecture and centralize as much as possible the alerts pre-analyzed by the cloud native services,</p>
<p>Once the head is out of the cloud, the strategy formalized and the collection architecture deployed, the SOC is back in its place as the IS control tower: the proliferation of services in the cloud no longer scares it!</p>
<p>The next steps may be to look at automation possibilities, with the implementation of a SOAR, for example. We will be sure to discuss this topic in a future article.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/10/adapting-your-detection-strategy-to-the-multi-cloud-without-getting-lost-in-the-cloud/">Adapting your detection strategy to the multi-cloud without getting lost in the cloud</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2021/10/adapting-your-detection-strategy-to-the-multi-cloud-without-getting-lost-in-the-cloud/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Machine learning for its cybersecurity: how to find your way in the jungle of products</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/09/machine-learning-for-its-cybersecurity-how-to-find-your-way-in-the-jungle-of-products/</link>
		
		<dc:creator><![CDATA[Carole Meyziat]]></dc:creator>
		<pubDate>Fri, 25 Sep 2020 13:00:07 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data analysis]]></category>
		<category><![CDATA[Machine learning]]></category>
		<category><![CDATA[POC]]></category>
		<category><![CDATA[SOC]]></category>
		<category><![CDATA[solution]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14241</guid>

					<description><![CDATA[<p>Machine Learning is an emerging topic in recent years, particularly in the context of cyber security monitoring. However, as mentioned in the article &#8220;Boost your Cybersecurity thanks to Machine Learning&#8221; (Part 1 &#38; Part 2), the development of such solutions...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/09/machine-learning-for-its-cybersecurity-how-to-find-your-way-in-the-jungle-of-products/">Machine learning for its cybersecurity: how to find your way in the jungle of products</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Machine Learning is an emerging topic in recent years, particularly in the context of cyber security monitoring. However, as mentioned in the article &#8220;<strong>Boost your Cybersecurity thanks to <em>Machine Learning</em></strong>&#8221; (<a href="https://www.riskinsight-wavestone.com/en/2020/07/boost-your-cybersecurity-thanks-to-machine-learning-1-2/">Part 1</a> &amp; <a href="https://www.riskinsight-wavestone.com/en/2020/07/boost-your-cybersecurity-thanks-to-machine-learning-2-2/">Part 2</a>), the development of such solutions requires strong human and financial investments.</p>
<p>Indeed, not all companies have the necessary means (or the will) to develop this type of technology internally, and thus turn themselves to market solutions facing a major problem: how to succeed in quickly choosing and integrating an effective solution in my context?</p>
<h2><strong>Why use <em>Machine Learning</em> in Cybersecurity?</strong></h2>
<p>The static nature of current detection solutions (antiviruses using signature bases, alert thresholds in a SIEM&#8230;) no longer allows to face more and more numerous and varied attacks. In addition, security teams are overloaded by the volume of data to be analyzed.</p>
<p>As explained in the article <strong>« Which tools do you need for your SOC? »</strong> (<a href="https://www.riskinsight-wavestone.com/en/2019/04/new-tools-soc-23/">Part 2</a> &amp; <a href="https://www.riskinsight-wavestone.com/en/2019/04/new-tools-soc-33/">Part 3</a>), <em>Machine Learning</em> provides an answer to these problems encountered by the SOC by using behavioral analysis methods to detect advanced attacks and prioritize the alerts to be analyzed.</p>
<p>&nbsp;</p>
<figure id="post-14244 media-14244" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-14244" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/image-3.png" alt="" width="928" height="511" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/image-3.png 928w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/image-3-347x191.png 347w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/image-3-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/image-3-768x423.png 768w" sizes="auto, (max-width: 928px) 100vw, 928px" /></figure>
<p>&nbsp;</p>
<p style="text-align: center;"><em>Principle of anomalies detection in a SOC</em></p>
<p>While these types of solutions provide real added value, they do not completely eliminate the need for current detection methods and are rather used to complement existing tools.</p>
<p>Moreover, their level of complexity (deployment, alerts processing) requires a sufficient level of maturity in terms of detection and reaction (organization, tools, resources, data centralization) before it is relevant to launch a project based on <em>Machine Learning</em>. This will facilitate the scoping phase and speed up deployment.</p>
<h2><strong>In advance of phase: defining the specifications</strong></h2>
<h3>Which use case do I wish to address?</h3>
<p>During our various interventions with our clients, we have supported the integration of numerous solutions and we can highlight four main types of use cases on which companies invest:</p>
<ul>
<li><strong>Fight against fraud</strong>: tools for detecting deviation(s) in user&#8217;s behavior(s)</li>
<li><strong>Email monitoring</strong>: prevention tools against phishing or information leakage (DLP)</li>
<li><strong>Network threat detection</strong>: «<em>Next-Gen </em>» probes</li>
<li><strong>Endpoint threat identification</strong>: « <em>Next-Gen » </em>anti-viruses</li>
</ul>
<p>The choice of a solution (and therefore of a use case) should not be defined unilaterally by the ISS branch, but should be discussed with various stakeholders (ISS, CIO, businesses, etc.). This exchange will enable the target to be specified and the technical and organizational prerequisites to be validated (accessibility of logs, resources to be mobilized, size of teams, etc.) in order to best prepare for its integration and use.</p>
<h3>What kind of solution to choose?</h3>
<p>Depending on the tools already in place and according to the need, several solutions are possible:</p>
<ul>
<li><strong>Choosing to implement a turnkey solution</strong> allowing to treat very precise use cases that are not specific to business issues (EDR, behavioral biometrics&#8230;). This choice generally suits an immediate need rather than a long-term strategy.</li>
<li><strong>Activate a <em>Machine Learning</em> module on a tool</strong> already in place (SIEM, log sink&#8230;) in order to extend its detection perimeter. This choice allows to quickly test use cases and to free oneself from the phases of integration of a new equipment within the IS.</li>
</ul>
<p>Finally, it is essential to remember that there is no miracle solution and that each type of solution responds to specific needs.</p>
<h2><strong>In front of the editor : challenging the essential points</strong></h2>
<h3>Testing the solution and think about scalability</h3>
<p>Once all these prerequisites are defined, it is usual to realize with the editor a Proof of Concept (PoC). However, in the specific case of <em>a Machine Learning</em> solution, the PoC will answer several specific questions:</p>
<ul>
<li><strong>Do my currently collected data allow me to have quickly satisfactory results? </strong><em>Machine Learning</em> solutions require the analysis of a very large amount of data potentially enriched by repositories that can be cross-referenced from several sources. It is therefore necessary to make sure in advance with the editor that the data currently collected already allows to obtain first results.</li>
<li><strong>How long will the learning phase last in my context?</strong> Some <em>Machine Learning</em> solutions produce results only after several months or even years because the learning phases can be extremely long due to the specific context of each company. The possibility to use a log history for tests would allow you to free yourself from a significant learning period.</li>
</ul>
<p>Specific questions will also have to be addressed in order to anticipate the longer term:</p>
<ul>
<li><strong>Will it be possible to enrich the analyses with other types of data?</strong> <em>Machine Learning</em> solutions allow you to perform analyses on many types of data that may have heterogeneous formats, so it is necessary to be able to ensure that the analyses can be enriched with new types of data collected.</li>
<li><strong>Will it be possible to implement new detection algorithms?</strong> The possibility of being able to customize these solutions by adding new types of algorithms (and potentially independently) is not negligible.</li>
<li><strong>How can I be sure that my publisher is always at the cutting edge of technology?</strong> Given the exponential evolution of techniques on this subject, it is important to ensure that the publisher continues to be at the forefront of technology in order to offer new means of defense against attacks that are becoming increasingly complex.</li>
</ul>
<h3>Preparing to protect the data life cycle</h3>
<p>Detection methods based on behavioral analysis require the collection and processing of sensitive/personal data. Thus, especially in the case where the solution is hosted by the editor, issues related to the use of the data will have to be addressed as soon as possible. On the one hand, contractual security requirements will of course need to be reinforced, and on the other hand it may be useful to use upstream solutions that enable more secure processing of the data lifecycle.</p>
<p>For example, startups like <a href="https://sarus.tech/">SARUS</a> are working on <strong>masking personal data</strong>, allowing data scientists to perform <em>Machine Learning</em> without accessing source data. Startups like <a href="https://hazy.com/">HAZY</a> are working on <strong>generating synthetic data</strong> that keeps the statistical value of the useful data, but loses its sensitive nature. This type of solution also allows to artificially enlarge the sample provided, and to obtain an almost unlimited amount of data, which can be very useful in the context of a PoC where currently available data is limited.</p>
<h2><strong>Once the relevance of the solution is validated, the adventure is just beginning!</strong></h2>
<p>Through our various experiences, we have been able to forge a conviction: <strong>the market is mature enough to provide interesting results</strong>, especially on the four use cases mentioned above. The implementation of such tools will be effective if the solutions are connected to a rich ecosystem and meet a specific need. Indeed, <strong>the implementation of one solution can be a success or a failure in two different contexts</strong>. The result will depend on the clarity of the need, the scope targeted, the expertise available (Cybersecurity and <em>Data Science</em>), and the availability of the data (quality and quantity).</p>
<p>While choosing a <em>Machine Learning</em> solution is not easy, the best way to get an idea quickly is to realize a PoC that can be quick and involving little engagement: we have seen with some of our customers that solutions were already showing <strong>interesting results after only two weeks of PoC</strong>.</p>
<p>Keeping in mind that the PoC is only the beginning of the adventure. It will result in the launch of an exciting <strong>project lasting several months</strong> (analysis of new types of alerts, discovery of new techniques &#8230;), bringing a <strong>real added value in security</strong> (detection of new events &#8230;), boosting a <strong>new breath</strong> within the operational security teams (prioritization of efforts, possibility of optimizing redundant tasks &#8230;).</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/09/machine-learning-for-its-cybersecurity-how-to-find-your-way-in-the-jungle-of-products/">Machine learning for its cybersecurity: how to find your way in the jungle of products</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>MACHINE LEARNING POUR SA CYBERSECURITE : COMMENT SE RETROUVER DANS LA JUNGLE DES PRODUITS</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/09/machine-learning-pour-sa-cybersecurite-comment-se-retrouver-dans-la-jungle-des-produits/</link>
		
		<dc:creator><![CDATA[Carole Meyziat]]></dc:creator>
		<pubDate>Mon, 21 Sep 2020 08:00:53 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[analyse de données]]></category>
		<category><![CDATA[Machine learning]]></category>
		<category><![CDATA[POC]]></category>
		<category><![CDATA[SOC]]></category>
		<category><![CDATA[solution]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14178</guid>

					<description><![CDATA[<p>Le Machine Learning est un sujet émergeant de ces dernières années et notamment dans le cadre de la surveillance cybersécurité. Cependant, comme évoqué dans l’article « Booster sa cybersécurité grâce à du Machine Learning » (Partie 1 &#38; Partie 2), le développement...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/09/machine-learning-pour-sa-cybersecurite-comment-se-retrouver-dans-la-jungle-des-produits/">MACHINE LEARNING POUR SA CYBERSECURITE : COMMENT SE RETROUVER DANS LA JUNGLE DES PRODUITS</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Le <em>Machine Learning</em> est un sujet émergeant de ces dernières années et notamment dans le cadre de la surveillance cybersécurité. Cependant, comme évoqué dans l’article <strong>« Booster sa cybersécurité grâce à du <em>Machine Learning »</em></strong> (<a href="https://www.riskinsight-wavestone.com/en/2020/07/boost-your-cybersecurity-thanks-to-machine-learning-1-2/">Partie 1</a> &amp; <a href="https://www.riskinsight-wavestone.com/en/2020/07/boost-your-cybersecurity-thanks-to-machine-learning-2-2/">Partie 2</a>), le développement de telles solutions nécessite de forts investissements humains et financiers.</p>
<p>En effet, toutes les entreprises n’ont pas les moyens nécessaires (ou la volonté) de développer en interne ce type de technologie et se tournent alors vers des solutions du marché en se confrontant à une problématique majeure : comment réussir à choisir et intégrer rapidement une solution efficace dans mon contexte ?</p>
<p>&nbsp;</p>
<h2>Pourquoi utiliser du <em>Machine Learning</em> en cybersécurité ?</h2>
<p>Le caractère statique des solutions de détection actuelles (antivirus utilisant des bases de signatures, alertes seuils d’alerte dans un SIEM…) ne permet plus de faire face à des attaques de plus en plus nombreuses et variées. En outre, les équipes de sécurité sont surchargées par le volume de données à analyser.</p>
<p>Comme expliqué dans l’article <strong>« La saga de l’été sur les nouveaux outils du SOC »</strong> (<a href="https://www.riskinsight-wavestone.com/en/2019/04/new-tools-soc-23/">Partie 2</a> &amp; <a href="https://www.riskinsight-wavestone.com/en/2019/04/new-tools-soc-33/">Partie 3</a>), le <em>Machine Learning</em> permet de répondre à ces problématiques que rencontre le SOC en utilisant des méthodes d’analyse comportementale pour détecter des attaques avancées et prioriser les alertes à analyser.</p>
<figure id="post-14182 media-14182" class="align-center"><img loading="lazy" decoding="async" class="aligncenter wp-image-14182 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/Image.png" alt="" width="778" height="459" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/Image.png 778w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/Image-324x191.png 324w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/Image-66x39.png 66w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/Image-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/Image-768x453.png 768w" sizes="auto, (max-width: 778px) 100vw, 778px" /></figure>
<p style="text-align: center;"><em>Principe de détection d&#8217;anomalies dans un SOC</em></p>
<p>&nbsp;</p>
<p>Si ces types de solutions apportent une réelle plus-value, elles ne permettent pas de totalement s’affranchir des moyens de détection actuels et sont plutôt utilisées pour compléter les outils en place.</p>
<p>Par ailleurs, leur niveau de complexité (déploiement, traitement des alertes) requiert en prérequis d’avoir déjà atteint un niveau de maturité suffisant en termes de détection et réaction (organisation, outillage, ressources, centralisation de la donnée) avant qu’il soit pertinent de se lancer dans un projet basé sur du <em>Machine Learning</em>. La phase de cadrage n’en sera que facilitée et le déploiement accéléré.</p>
<p>&nbsp;</p>
<h2>En avance de phase : définir le cahier des charges</h2>
<h3>Quel est le cas d’usage que je souhaite adresser ?</h3>
<p>Lors de nos différentes interventions chez nos clients, nous avons accompagné l’intégration de nombreuses solutions et nous pouvons faire ressortir quatre grands types de cas d’usages sur lesquels les entreprises investissent :</p>
<ul>
<li><strong>La lutte contre la fraude</strong>: outils de détection de déviation(s) dans le(s) comportement(s) d’un utilisateur</li>
<li><strong>La surveillance des emails</strong>: outils de prévention contre le phishing ou la fuite d’informations (DLP)</li>
<li><strong>La détection de menaces sur le réseau</strong>: sondes «<em> Next-Gen </em>»</li>
<li><strong>L’identification des menaces sur les </strong><strong><em>endpoints</em></strong>: anti-virus « <em>Next-Gen »</em></li>
</ul>
<p>Le choix d’une solution (et donc d’un cas d’usage) ne devra pas être défini de manière unilatérale par la filière SSI mais devra être réfléchi avec les différents acteurs concernés (SSI, DSI, métiers…). Cet échange permettra de préciser la cible ainsi que de valider les prérequis techniques et organisationnels (accessibilité des logs, ressources à mobiliser, taille des équipes…) pour préparer au mieux son intégration et son exploitation.</p>
<h3>Quel type de solution choisir ?</h3>
<p>Selon les outils déjà en place et en fonction du besoin, plusieurs solutions sont envisageables :</p>
<ul>
<li><strong>Choisir d’implémenter une </strong><strong>solution clé en main</strong> permettant de traiter des cas d’usages très précis et non spécifiques à des problématiques métiers (EDR, biométrie comportementale…). Ce choix convient généralement à un besoin immédiat plutôt qu’à une stratégie à long terme.</li>
<li><strong>Activer un module de <em>Machine Learning</em> sur un outil déjà en place</strong> (SIEM, puits de logs…) dans le but de pouvoir étendre son périmètre de détection. Ce choix permet notamment de pouvoir tester rapidement des cas d’usages et de s’affranchir des phases d’intégration d’un nouvel équipement au sein du son SI.</li>
</ul>
<p>Enfin, il est essentiel de se rappeler qu’il n’existe pas de solution miracle et que chaque type de solution répond à des besoins précis.</p>
<p>&nbsp;</p>
<h2>Devant l’éditeur : challenger les points essentiels</h2>
<h3>Tester la solution et réfléchir à son évolutivité</h3>
<p>Une fois que tous ces prérequis sont définis, il est d’usage de réaliser avec l’éditeur un <em>Proof of Concept</em> (PoC). Cependant, dans le cas spécifique d’une solution de <em>Machine Learning</em>, le PoC permettra de répondre à plusieurs interrogations spécifiques :</p>
<ul>
<li><strong>Mes données actuellement collectées permettent-elles d’avoir des résultats rapidement satisfaisants ? </strong>Les solutions de <em>Machine Learning</em> requièrent l’analyse d’un très grand nombre de données potentiellement enrichies par des référentiels permettant de croiser plusieurs sources. Il est donc nécessaire de s’assurer en avance de phase avec l’éditeur que les données actuellement collectées permettent déjà d’obtenir des premiers résultats.</li>
<li><strong>Combien de temps la phase d’apprentissage durera-t-elle dans mon contexte ?</strong> Certaines solutions de <em>Machine Learning</em> produisent des résultats qu’à partir de plusieurs mois voire années car les phases d’apprentissages peuvent-être extrêmement longues du fait du contexte particulier à chaque entreprise. La possibilité d’utiliser un historique de logs pour les tests permettrait de s’affranchir d’une période d’apprentissage conséquente.</li>
</ul>
<p>Des questions spécifiques seront également à traiter afin d’anticiper le plus long terme :</p>
<ul>
<li><strong>Sera-t-il possible d’enrichir les analyses avec d’autres types de données ?</strong> Les solutions de <em>Machine Learning</em> permettent de pouvoir effectuer des analyses sur de nombreux types de données pouvant avoir des formats hétérogènes, il est donc nécessaire de pouvoir s’assurer que les analyses pourront être enrichies avec de nouveaux types de données collectées.</li>
<li><strong>Sera-t-il possible de mettre en place de nouveaux algorithmes de détection ?</strong> La possibilité de pouvoir personnaliser ces solutions en y ajoutant de nouveaux types d’algorithmes (et potentiellement de manière indépendante) est non négligeable.</li>
<li><strong>Comment suis-je assuré que mon éditeur soit toujours à la pointe de la technologie ?</strong> Au vu de l’évolution exponentielle des techniques sur ce sujet, il est important de s’assurer que l’éditeur poursuive sa course à l’avancée technologique afin de proposer de nouveaux moyens de défense contre des attaques qui ne cessent de se complexifier.</li>
</ul>
<h3>Se préparer à protéger le cycle de vie de la donnée</h3>
<p>Les méthodes de détection basées sur de l’analyse comportementale nécessitent la collecte et le traitement de données sensibles/personnelles. Ainsi, particulièrement dans le cas où la solution est hébergée chez l’éditeur, les problématiques liées à l’usage des données devront être adressées au plus tôt. D’une part les exigences contractuelles de sécurité devront bien sûr être renforcées, et d’autre part il pourra être utile de faire appel en amont à des solutions permettant un traitement plus sécurisé du cycle de vie de la donnée.</p>
<p>Par exemple, des startups comme <a href="https://sarus.tech/">SARUS</a> travaillent sur <strong>le masquage des données personnelles</strong>, permettant aux <em>data scientists </em>d’effectuer du <em>Machine Learning</em> sans accéder aux données sources. Des startups comme <a href="https://hazy.com/">HAZY</a> travaillent elles sur la <strong>génération de données synthétiques</strong> gardant la valeur statistique des données utiles, mais perdant leur caractère sensible. Ce type de solution permet également d’agrandir artificiellement l’échantillon fourni, et d’obtenir une quantité quasiment illimitée de données, ce qui peut être très utile dans le cadre d’un PoC où les données actuellement disponibles sont en quantité limitées.</p>
<p>&nbsp;</p>
<h2>Une fois que la pertinence de la solution est validée, la partie ne fait que commencer !</h2>
<p>Au travers de nos différentes expériences, nous avons pu nous forger une conviction : <strong>le marché est assez mature pour fournir des résultats intéressants</strong>, notamment sur les quatre cas d’usages mentionnés ci-dessus. La mise en place de tels outils saura être efficace si les solutions sont connectées à un écosystème riche et qu’elles répondent à un besoin spécifique. En effet, <strong>la mise en place d’une même solution peut être une franche réussite ou un échec dans deux contextes différents</strong>. Le résultat dépendra notamment de la clarté du besoin, du périmètre visé, de l’expertise présente (Cybersécurité et <em>Data Science</em>), et encore de la disponibilité de la donnée (qualité et quantité).</p>
<p>Si le choix d’une solution de <em>Machine Learning</em> n’est pas simple, le meilleur moyen de se faire rapidement une idée est de réaliser un PoC pouvant être rapide et peu engageant : nous avons pu constater chez certains de nos clients que des solutions remontaient déjà des <strong>résultats intéressants après uniquement deux semaines de PoC</strong>.</p>
<p>Tout en gardant en tête que le PoC n’est que le début de l’aventure. Il résultera sur le lancement d’un <strong>projet de plusieurs mois </strong>passionnant (analyse de nouveaux types d’alertes, découvertes de nouvelles techniques…), apportant une <strong>réelle plus-value sécurité </strong>(détection de nouveaux évènements…), impulsant un <strong>nouveau souffle</strong> au sein des équipes opérationnelles de sécurité (priorisation des efforts, possibilité d’optimisation des tâches rébarbatives…).</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/09/machine-learning-pour-sa-cybersecurite-comment-se-retrouver-dans-la-jungle-des-produits/">MACHINE LEARNING POUR SA CYBERSECURITE : COMMENT SE RETROUVER DANS LA JUNGLE DES PRODUITS</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The SOC died of boredom, fatigue and poor positioning? Find out how to resuscitate it!</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/09/the-soc-died-of-boredom-fatigue-and-poor-positioning-find-out-how-to-resuscitate-it/</link>
		
		<dc:creator><![CDATA[Benoît Marion]]></dc:creator>
		<pubDate>Tue, 01 Sep 2020 12:00:08 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[continuous improvement]]></category>
		<category><![CDATA[governance]]></category>
		<category><![CDATA[objectives]]></category>
		<category><![CDATA[quality]]></category>
		<category><![CDATA[reporting]]></category>
		<category><![CDATA[SOC]]></category>
		<category><![CDATA[Strategy]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14133</guid>

					<description><![CDATA[<p>At a time when the internalized IS is no more than a distant memory giving way to a multiplication of external services hosting data, the SOC&#8217;s mission remains the same: to detect cybersecurity incidents in order to react as quickly...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/09/the-soc-died-of-boredom-fatigue-and-poor-positioning-find-out-how-to-resuscitate-it/">The SOC died of boredom, fatigue and poor positioning? Find out how to resuscitate it!</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>At a time when the internalized IS is no more than a distant memory giving way to a multiplication of external services hosting data, the SOC&#8217;s mission remains the same: to detect cybersecurity incidents in order to react as quickly as possible. But how do you detect in an information system where boundaries are no longer defined? Mission Impossible? Maybe not.</p>
<p>&nbsp;</p>
<figure id="post-14134 media-14134" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-14134 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/Image-0-1.png" alt="" width="823" height="463" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/Image-0-1.png 823w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/Image-0-1-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/Image-0-1-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/Image-0-1-768x432.png 768w" sizes="auto, (max-width: 823px) 100vw, 823px" /></figure>
<p>&nbsp;</p>
<p>Fifteen years ago, when we first started working on SOC implementations for our clients, defining a roadmap was simple: set up a tool, then collect and analyze the logs of security equipment and critical/exposed assets.</p>
<p>However, new challenges linked to the IS decentralization, the evolution of an ever-evolving threat and the crisis we are going through (teleworking, reduction in cybersecurity budgets&#8230;) must make us realize that the SOC must reinvent itself.</p>
<p>&nbsp;</p>
<h2>Involve (really) everyone!</h2>
<p>By rewriting the story from the beginning, the SOC is managed by the cybersecurity population, which has therefore set up monitoring mechanisms on cybersecurity equipment with cybersecurity use-cases. The result is mixed, it works quite well, and the figures from our <a href="https://www.wavestone.com/en/insight/cyber-attack-france/">CERT benchmark</a> are there to prove it: 167 days on average to detect an incident!</p>
<p>The first detection strategies were obviously defined, challenged and validated by the cybersecurity industry. Their objective was to increasingly extend the surveillance perimeter by collecting more and more logs (firewalls, WAF, …) and setting up new surveillance equipment (SIEM, probes, …).</p>
<p>This first observation was inevitably found in the majority of our SOC audit conclusions: <strong>objectives are poorly defined and not aligned with the expectations of SOC clients (CISOs, CIOs, business functions), leading to a loss of trust and credibility.</strong></p>
<p>Striking examples can explain this feeling: lack of SLAs, poorly defined perimeter, too raw reporting that is too raw, non-contextualized and containing erroneous information.</p>
<p>If you do not want to redefine your SOC strategy once again in a one-sided way, organizing a seminar is the right exercise to establish a new starting point. All the stakeholders must be present (cybersecurity teams, CIOs, SOC clients, &#8230;) and the goal is to address the main issues:</p>
<ul>
<li><strong>Redefining objectives:</strong> concentrating surveillance on much smaller perimeters that are both technically and humanly feasible</li>
<li><strong>Clarifying governance:</strong> redefining the positioning and role of the SOC in the organization</li>
<li><strong>Redesigning reporting:</strong> sharing customer misunderstandings in order to provide the right level of information.</li>
</ul>
<p>We have seen that this step, which is essential to the renewal of the SOC, enables an entire ecosystem to be federated around a common target.</p>
<p>&nbsp;</p>
<h2>Give priority to quality over quantity!</h2>
<p>Paradoxically, although the attack area of the IS has significantly increased, the priority is indeed to restrict the surveillance scope to focus on what is really valued.</p>
<p>Firstly, once the functional perimeter of surveillance has been redefined and validated by all, the SOC mission is to technically translate these new objectives into detection scenarios in the tools. There is no need to reinvent the wheel, because new frameworks such as <a href="https://attack.mitre.org/">MITRE ATT&amp;CK</a> now allow the different types of attacks to be clearly identified and materialized (techniques used, examples/references and suggestions for detection). The objective is obviously not to be able to cover all the techniques that can be used (330 in total) but to prioritize the efforts on what will allow the objectives to be achieved.</p>
<p>In addition, an HR observation was also raised in most of our audits: <strong>teams lack motivation, experience and autonomy to bring added value to operations.</strong></p>
<p>This leads to a high turnover because some tasks are considered uninteresting. The objective is to concentrate human effort on what really brings added value. We have assisted many customers in the implementation of SOAR (Security Orchestration, Automation and Response) tools to automate repetitive tasks of the teams in charge of analysis and reaction. These tools are extremely effective in automating the processing of common, very annoying attacks (ransomware, phishing&#8230;) which account for a large proportion of alerts.</p>
<p>&nbsp;</p>
<figure id="post-14136 media-14136" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-14136 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/Image-1-3.png" alt="" width="1158" height="653" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/Image-1-3.png 1158w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/Image-1-3-339x191.png 339w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/Image-1-3-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/Image-1-3-768x433.png 768w" sizes="auto, (max-width: 1158px) 100vw, 1158px" /></figure>
<p>&nbsp;</p>
<p>Once these measures are in place, the teams can then be mobilized on activities with higher added value such as the implementation of automation tasks or Threat Hunting activities.</p>
<p>&nbsp;</p>
<h2>And now, improve and challenge each other continuously!</h2>
<p>Once all the foundations are in place to breathe new life into your SOC, how do you stay up to date?</p>
<p>The answer to this question would have been complex 5 years ago, but many recognized standards now allow us to assess the maturity of the SOC in a continuous improvement process. SOC CMM is the perfect example, as this framework enables self-assessment based on a set of precise questions addressing all the issues in terms of tools and organization. This methodology has enabled us to support customers on many before/after comparisons.</p>
<p>Red Team or Purple Team operations are also excellent ways to challenge the systems put in place in relation to the defined objectives. These exercises highlight concrete examples of vulnerabilities as well as precise recommendations to remedy them. In addition, the MITRE ATT&amp;CK Framework can be used to consolidate the tests carried out by type of attack, as well as their results.</p>
<p>&nbsp;</p>
<figure id="post-14130 media-14130" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-14130 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/Image-2-1.png" alt="" width="1148" height="649" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/Image-2-1.png 1148w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/Image-2-1-338x191.png 338w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/Image-2-1-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/Image-2-1-768x434.png 768w" sizes="auto, (max-width: 1148px) 100vw, 1148px" /></figure>
<p>&nbsp;</p>
<p>These various initiatives do not provide an exhaustive overview of the problems that SOC are currently facing, but they do highlight our main findings: <strong>an isolated SOC, poorly configured tools and demobilized teams.</strong></p>
<p>The exercise of redefining a SOC strategy is a great opportunity to re-mobilize an entire ecosystem under the same banner. This initiative helps to give new meaning to both operational teams and all the stakeholders in the SOC activity. So… let’s do it!</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/09/the-soc-died-of-boredom-fatigue-and-poor-positioning-find-out-how-to-resuscitate-it/">The SOC died of boredom, fatigue and poor positioning? Find out how to resuscitate it!</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Logging of Office 365: a Case Study with Administrators</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/04/logging-of-office-365-a-case-study-with-administrators/</link>
		
		<dc:creator><![CDATA[GEneviEveLardon]]></dc:creator>
		<pubDate>Tue, 28 Apr 2020 09:27:54 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Office 365]]></category>
		<category><![CDATA[security architecture]]></category>
		<category><![CDATA[security surveillance]]></category>
		<category><![CDATA[SOC]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=12982</guid>

					<description><![CDATA[<p>Migrations to Microsoft&#8217;s Digital Workplace platform, Office 365, are well advanced, if not already completed. It is now time to improve processes, but  above all, to secure them. Several topics must be addressed when securing Office 365  including the need...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/04/logging-of-office-365-a-case-study-with-administrators/">Logging of Office 365: a Case Study with Administrators</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">Migrations to Microsoft&#8217;s Digital Workplace platform, Office 365, are well advanced, if not already completed. It is now time to improve processes, but  above all, to secure them.</p>
<p style="text-align: justify;">Several topics must be addressed when securing Office 365  including the need to be able to track actions to detect illicit behaviour or trace the cause of an incident.</p>
<p style="text-align: justify;">In France, however, many companies have difficulty consolidating logs and defining supervision use cases. Mastering logging must be at the heart of this approach.</p>
<p>&nbsp;</p>
<h2>Supervision of administrative actions is a necessity</h2>
<p>For this logging decryption, let&#8217;s take the case of the platform administrators.</p>
<p>As with other SaaS solutions (Google Cloud Platform, Salesforce, etc.), <strong>the breach of data integrity or confidentiality following an error or malicious action by a company administrator is one of the major risks identified by our customers.</strong></p>
<p style="text-align: justify;">By definition, <strong>Office 365 administrators have high privileges</strong>:</p>
<ul style="text-align: justify;">
<li>Configuration of the various services &#8211; or workloads &#8211; and APIs;</li>
<li>Managing permissions on OneDrive and user mailboxes;</li>
<li>Management of the life cycle of collaboration spaces.</li>
</ul>
<p style="text-align: justify;">It is easy to imagine <strong>the disastrous consequences that could result from the malicious or uncontrolled use of these privileges</strong>. Indeed, settings such as SharePoint Online external sharing, API permissions or email configuration could become significant data leakage vectors.</p>
<p style="text-align: justify;"><strong>On-premise IT best-practices</strong> (lifecycle, least privilege principle, rights segmentation, strong authentication, just-in-time access, etc.) <strong>must also be applied in the Cloud</strong>. The Cloud must be mastered and controlled.</p>
<p style="text-align: justify;">However, the implementation of good practices, although necessary, is not enough. Indeed, they do not guarantee that  administrators won&#8217;t carry out actions that compromise the level of security. One can therefore naturally <strong>wonder how it would be possible to audit the actions carried out and raise alerts if necessary</strong>.</p>
<p style="text-align: justify;">What are the means provided by Microsoft? How can we prevent a malicious person from covering his tracks (which would make an attack more difficult to detect and reconstruct)?</p>
<p style="text-align: justify;">To illustrate the different possibilities, we will follow the four examples below:</p>
<p>&nbsp;</p>
<figure id="post-12987 media-12987" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-12987 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image1-1.png" alt="" width="1757" height="469" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image1-1.png 1757w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image1-1-437x117.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image1-1-71x19.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image1-1-768x205.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image1-1-1536x410.png 1536w" sizes="auto, (max-width: 1757px) 100vw, 1757px" /></figure>
<p style="text-align: center;">Figure 1 &#8211; Examples of configuration changes that may affect safety</p>
<p>&nbsp;</p>
<h2>What logs are available?</h2>
<p>For historical and technical reasons, Office 365 inherently has several log sources: <strong>Unified Audit Logs</strong>, <strong>Exchange Logs</strong> and <strong>Azure Logs</strong>. These sources are complementary and must be analysed together in order to have an exhaustive view of the administrative actions performed.</p>
<h3>Unified Audit Logs: unified logging of the different services</h3>
<p style="text-align: justify;">The most commonly cited and used source of logs is the “<a href="https://docs.microsoft.com/fr-fr/microsoft-365/compliance/search-the-audit-log-in-security-and-compliance">Unified Audit Logs</a>”. These logs <strong>centralise the traces of users and administrators for all the platform&#8217;s services</strong>: SharePoint Online, Azure AD, Exchange Online, Teams, Power Platforms<strong>. Microsoft is progressively integrating the different sources and continues to add new logs</strong>.</p>
<p style="text-align: justify;"><em>To come back to our concrete examples, the interesting logs are:</em></p>
<ul style="text-align: justify;">
<li><em>SharePoint Online External Sharing Policy Change: SharingPolicyChanged</em></li>
<li><em>Assigning rights to a One Drive: SiteCollectionAdminAdded</em></li>
<li><em>Assigning rights to a mailbox: AddMailboxPermission</em></li>
<li><em>Changing an Administration Role: AddMembertoRole</em></li>
</ul>
<p style="text-align: justify;">These logs are accessible and exportable via the Compliance and Security Centers, the Office 365 Management and PowerShell APIs (via the <a href="https://docs.microsoft.com/fr-fr/powershell/module/exchange/policy-and-compliance-audit/search-unifiedauditlog?view=exchange-ps">Search-UnifiedAuditLog</a> cmdlet). Note that <strong>logging must be enabled</strong> via the Compliance Center or PowerShell to be able to log and search.</p>
<p style="text-align: justify;">It is possible to directly <strong>configure alerts related to the occurrence of certain logs</strong> in the Security and Compliance Centers.</p>
<h3>Exchange Logs: logging of the messaging infrastructure</h3>
<p>The second interesting source of logs is the &#8220;<a href="https://docs.microsoft.com/fr-fr/microsoft-365/compliance/enable-mailbox-auditing">Exchange Logs</a>&#8220;. These logs <strong>provide information about usage and administrative actions performed on the Exchange Online service as well as on personal or shared mailboxes</strong>. Two types of logs can be distinguished:</p>
<ul>
<li><strong>Administrator Audit Logs</strong>: Service or mailbox administration logs (e.g. changing a user&#8217;s permissions, changing the retention time of a mailbox log etc.).</li>
<li><strong>Mailbox Audit Logs</strong>: Logs of use of a mailbox by the main user, a delegated user or a service administrator (e.g.: accessing the mailbox, sending an email in place of the main user, moving an item into a folder, permanent deletion, etc.).</li>
</ul>
<p><em>To come back to our concrete examples, the logs that will interest us here are: </em></p>
<ul>
<li><em>Assigning rights to a mailbox: AddMailboxPermission</em></li>
<li><em>Access to a folder or a mailbox: FolderBind (not enabled by default): </em></li>
<li><em>Access to a mail: MailItemAccessed (only for users with an E5 license)</em></li>
</ul>
<p><strong>To go further with Administrator Audit Logs</strong></p>
<p style="text-align: justify;">Administrator Audit Logs are generated for any Exchange administration action that can be linked to a PowerShell cmdlet other than Get, Search or Test. These logs are linked to the Unified Logs and can be used in the Exchange Administration Center, Security and Compliance Centers, Office 365 Management and PowerShell APIs.</p>
<p><strong>To go further with Mailbox Audit Logs </strong></p>
<p>Mailbox Audit Logs are the only category of logs to be configurable (perimeter and granularity). These logs allow tracing of the actions performed by an owner, a delegate (user with permissions) and an admin (access via eDiscovery tools).</p>
<p>Since January 2019, the logging of Mailbox Audit Logs is enabled by default for all Office 365 tenants. To date, if logging is enabled by default, all mailboxes are audited (even if the &#8220;-AuditDisabled&#8221; parameter is set to &#8220;True&#8221;). The only way not to log the actions of a mailbox is to implement a by-pass rule with &#8220;Set-MailboxAuditBypassAssociation&#8221;.</p>
<p>However, it should be noted that some actions are not audited by default, such as the access of a delegate or an admin to a user&#8217;s mailbox. It is therefore essential to analyse the logs to be activated, during the initial configuration of the service.</p>
<p>Depending on the license level and configuration, these logs can be linked to the Unified Logs and be used in the Exchange Administration Center, the Office 365 Management and PowerShell APIs or the Security and Compliance Centers.</p>
<h3>Azure Logs and Reports: Azure Active Directory Logging</h3>
<p style="text-align: justify;">The last, but not least important source of logs are the “<a href="https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/plan-monitoring-and-reporting">Azure AD logs</a>”. These logs <strong>provide complete traces of the Office 365 identity brick and the associated administration actions</strong>. Several categories of logs and reports are available:</p>
<ul style="text-align: justify;">
<li><strong>Azure Audit Logs</strong>: Logs for the administration of the identification brick or modification of items (e.g. assigning the &#8220;SharePoint Administrator&#8221; role, creating a security user or group, authorising an API, configuring guest users, etc.).</li>
<li><strong>Azure Sign-in Logs</strong>: Logs for connecting to an Office 365 service (or to applications / APIs based on Azure AD) with information regarding the connection chain (e.g. protocol, IP address, terminal, etc.).</li>
<li><strong>Risky Sign-in</strong>: Connection reports with indicators related to suspicious connections.</li>
</ul>
<p style="text-align: justify;">These logs and reports are accessible and exportable via the Azure portal, the Graph or Azure Management and PowerShell APIs. Some of the logs directly related to Office 365 are also found in the Unified Audit Logs.</p>
<p><em>To come back to our concrete examples, the interesting logs are:</em></p>
<ul>
<li><em>Modification of an administration role: AddMembertoRole</em></li>
</ul>
<figure id="post-12990 media-12990" class="align-none"><img loading="lazy" decoding="async" class="wp-image-13098 size-full aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image2-2.png" alt="" width="1563" height="727" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image2-2.png 1563w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image2-2-411x191.png 411w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image2-2-71x33.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image2-2-768x357.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image2-2-1536x714.png 1536w" sizes="auto, (max-width: 1563px) 100vw, 1563px" /></figure>
<p style="text-align: center;"><em>Figure 2 &#8211; Summary of Office 365 Logs Features</em></p>
<p>&nbsp;</p>
<p style="text-align: justify;">In summary, the Unified Audit Logs provide a consolidated view of the different services of Office 365, but some information may be missing. It will be necessary to ensure that the required logs are present, and then to investigate further into the logs and reports of Exchange or Azure.</p>
<p>&nbsp;</p>
<h1>What is the retention period for the various Office 365 logs?</h1>
<p style="text-align: justify;">Once the proper logs have been identified, the challenge of retention arises. How can you be sure that the logs are well preserved without being altered, for as long as is required by the company&#8217;s security policy and various regulations, such as the anti-terrorist law or the GDPR?</p>
<p style="text-align: justify;">By construction, and contrary to Exchange and SharePoint on-premise solutions, <strong>all the logs mentioned above are unalterable</strong> &#8211; that is to say, they cannot be modified or deleted by the company administrators. Furthermore, <strong>the default retention periods defined by default cannot be modified</strong> (i.e. 90 days for Office 365 and 7 logs or 30 days for Azure logs with standard licenses). <strong>With one exception, an Exchange administrator has the ability to delete the logs </strong>from mailboxes by changing the associated retention time.</p>
<p style="text-align: justify;"><em>If we go back to our examples, we could imagine a malicious administrator giving himself rights to access a mailbox, then look at the mails and erase the access logs by setting a zero-retention time. In this case, only the privilege elevation made in the Administrator Audit Logs would be retained.</em></p>
<p style="text-align: justify;"><strong>In order to comply with security or regulatory requirements</strong>, it may also be necessary to ensure that the logs of the various departments<strong> are</strong> <strong>kept for more than 7, 30 or 90 days.</strong></p>
<p><em> </em></p>
<h1>3 steps to implement relevant logging within Office 365</h1>
<ol>
<li style="text-align: justify;"><strong>Definition and activation of the necessary logs</strong>: Unified Audit Logs may not be sufficient (monitoring of the Office 365 and Azure AD APIs, logging of administrator access to mailboxes, etc.);</li>
<li style="text-align: justify;"><strong>Configuration of an automatic export of the identified logs</strong> to an external storage or an independent SIEM (via PowerShell or the API Management);</li>
<li style="text-align: justify;"><strong>Monitoring the status of the tenant</strong>: implementing a dashboard of the tenant&#8217;s settings configuring alerts related to a change in log configuration (via the Security or Compliance Center, the Office 365 Management or PowerShell APIs), such as disabling Unified logs or a change in the retention of mailbox logs.</li>
</ol>
<figure id="post-12992 media-12992" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-12992 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image3-1.png" alt="" width="1648" height="291" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image3-1.png 1648w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image3-1-437x77.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image3-1-71x13.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image3-1-768x136.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image3-1-1536x271.png 1536w" sizes="auto, (max-width: 1648px) 100vw, 1648px" /></figure>
<p style="text-align: center;">Figure 3 &#8211; Good Practices for Office 365 Logging</p>
<p style="text-align: justify;">After carrying out these three actions, the company will have the necessary information to audit the tenant&#8217;s use and administration actions. However, this does not yet address the larger need for supervision of administrators. It may be useful to set up alerts (via the Security or Compliance Center or specialised third-party tools).</p>
<ol style="text-align: justify;">
<li><strong>(To go further) Implementation of basic supervision</strong>: definition of general security detection scenarios, identification of the logs concerned, activation of the associated alert in the Security or Compliance Centers;</li>
<li><strong>(To go even further) Setting up advanced supervision</strong>: identification of scenarios related to a business context, implementation, definition of the associated governance, continuous improvement.</li>
</ol>
<p style="text-align: justify;">What tools should be used to analyze the logs? Which detection scenarios should be prioritised? What governance should be put in place to define, implement and monitor alerts? These are all questions that need to be addressed in the implementation of the collaboration platform supervision.</p>
<p style="text-align: justify;">It will also be necessary to take into account the regular changes made by Microsoft on these services, as well as on the structure of logs and APIs, especially since the preview and general availability functionalities coexist.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/04/logging-of-office-365-a-case-study-with-administrators/">Logging of Office 365: a Case Study with Administrators</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity issues around Smart City (2/2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/04/cybersecurity-issues-around-smart-city-2-2/</link>
		
		<dc:creator><![CDATA[Hervé Guillou-Hely]]></dc:creator>
		<pubDate>Wed, 15 Apr 2020 09:00:51 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[architecture]]></category>
		<category><![CDATA[change]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[risks]]></category>
		<category><![CDATA[smart city]]></category>
		<category><![CDATA[SOC]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=12966</guid>

					<description><![CDATA[<p>In a previous article, we saw that the Smart City was inducing a paradigm shift which, combined with the general public&#8217;s high expectations on the security of its data, required adapting the approach to such a project. Indeed, as the...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/04/cybersecurity-issues-around-smart-city-2-2/">Cybersecurity issues around Smart City (2/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>In a previous </em><a href="https://www.riskinsight-wavestone.com/en/2020/03/cybersecurity-issues-around-smart-city-1-2/"><em>article</em></a><em>, we saw that the Smart City was inducing a paradigm shift which, combined with the general public&#8217;s high expectations on the security of its data, required adapting the approach to such a project. Indeed, as the Smart City develops, urban activity becomes more and more dependent on its services, increasing not only its security needs, but also the interest of cyber attackers. Based on these observations, the challenge will therefore be to identify a new approach to take account of Cyber ​​Security risks and, if not completely eliminate them, to reduce them. This is the purpose of this second article.</em></p>
<p>&nbsp;</p>
<h2>Building a Smart City project with Cybersecurity</h2>
<p>It is essential to integrate cyber security aspects from the start of a Smart City project. Indeed, carrying it out later in the project may prove to be more complex and expensive, with the risk of not dealing with it / not being able to deal with all the risks.</p>
<p>This requires <strong>rethinking the organization of the project regarding data and security governance</strong>: security principles must be defined at the global project level and considered by each of the sub-projects composing the Smart City, depending on their constraints. This is particularly true as Smart Cities involve many actors with different core businesses, means and cybersecurity maturity. A global and shared vision is essential to ensure that each element processes the data with the appropriate level of security.</p>
<p>It is then necessary <strong>to define the main principles of architecture and interoperability</strong>, according to the constraints inherent to the Smart City, related to Edge Computing and the deployment of objects in a hostile environment. System resilience must be at the heart of safety requirements, as the fall or compromise of one element should not cause the entire system to fall.</p>
<p>To this end, common <strong>standards</strong> must be adopted, based on specific frameworks such as ETSI or OneM2M. These increase the chances of maintaining scalable interoperable systems. More generally, the NIST or the ISO 27002 standard are proven Cybersecurity frameworks on which it would be interesting to rely.</p>
<p>The development mode must be <a href="https://www.riskinsight-wavestone.com/en/2019/07/cybersecurity-in-an-agile-world/">agile</a>, integrating a long-term vision to anticipate new use cases, and with short milestones in order to quickly deliver the first services. <strong>Cybersecurity must be included in the development process</strong>, by defining Evil User Stories, enabling risks to be identified and considered each time services or the information system evolves, and by appointing cybersecurity experts in a support and validation role.</p>
<p>&nbsp;</p>
<figure id="post-12967 media-12967" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-12967 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image1.png" alt="" width="1740" height="571" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image1.png 1740w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image1-437x143.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image1-71x23.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image1-768x252.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image1-1536x504.png 1536w" sizes="auto, (max-width: 1740px) 100vw, 1740px" /></figure>
<p>&nbsp;</p>
<p>Defining and maintaining a satisfactory level of security will, more than ever, require the rigorous integration of security in all phases of the project, which may lead to greater but necessary human and technological investments.</p>
<p>&nbsp;</p>
<h2>Protecting critical and regulated data</h2>
<p>Given the propensity of the Smart City to collect and process large amounts of data, their protection will primarily involve <strong>identifying critical data and assets.</strong></p>
<p>&nbsp;</p>
<figure id="post-12969 media-12969" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-12969 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image2.png" alt="" width="1340" height="661" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image2.png 1340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image2-387x191.png 387w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image2-71x35.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image2-768x379.png 768w" sizes="auto, (max-width: 1340px) 100vw, 1340px" /></figure>
<p>&nbsp;</p>
<p>Most of the services offered by the Smart City are aimed at citizens. Therefore, personal and potentially sensitive data will be collected. Furthermore, a loss of availability or integrity of certain services could have serious repercussions since some components of the IS have a direct hold on the physical world. <strong>Smart Cities are not exempt from regulations</strong>, in particular the General Data Protection Regulations (GDPR), but also, depending on usage, from the General Security Regulations (GSR), the Military Programming Law (MPL) or the Network and Information Security (NIS) directive, whose data protection requirements will have to be integrated into the programs.</p>
<p>Levels of data sensitivity classification must therefore be formalized in order to enable the prioritization of actions and the setting up of an appropriate framework for the processing of critical data such as encryption and anonymization.</p>
<p>The problem of access to data should also be raised. There are many actors in the Smart City and it will be necessary to segment the &#8220;vision&#8221; they may have of the IS. This will involve a preliminary phase of defining the authorization profiles, necessary to respect the principle of least privilege, combined with a regular review of their assignments to ensure that they are still legitimate.</p>
<p>&nbsp;</p>
<h2>Operating in trusted environments</h2>
<figure id="post-12971 media-12971" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-12971 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image-4.png" alt="" width="1612" height="203" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image-4.png 1612w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image-4-437x55.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image-4-71x9.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image-4-768x97.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image-4-1536x193.png 1536w" sizes="auto, (max-width: 1612px) 100vw, 1612px" /></figure>
<p>&nbsp;</p>
<p>The Smart City project will necessarily rely on <strong>different technical and organizational foundations</strong>. If these bases are to the Information System what foundations are to a house, it is easy to understand that it will be difficult to build anything if this base is fragile.</p>
<p>As always, these technical bases must be covered by fundamental security measures: implementation of trust bubbles, hardening of systems, patch management, securing of privileged accounts and their use, etc.</p>
<p>Furthermore, an information system with a large attack area such as the Smart City will necessarily have to break with the traditional security model known as &#8220;castle security&#8221;, by relying more on aspects of partitioning and access control of the data itself. The conformity of assets within the information system will have to be continuously evaluated using common configuration and hardening frameworks. Exposed systems and applications must be subject to controls and audits, particularly during the development phase, but also during the operational phase.</p>
<p>In addition, business continuity and disaster recovery will have to be at the heart of the security strategy. Plans will have to be formalized, but also tested, including both technical considerations such as the resilience of different systems, with the ability to restore systems independently of each other, and organizational considerations through crisis management exercises.</p>
<p>Finally, as Smart City involves many players, all stakeholders should ensure the implementation of significant means in the protection of the information systems involved and comply with the requirements of the project&#8217;s security policy. To do this, they will have to be contractually committed, at the very least by including security requirements in contracts, but also by formalizing and implementing security assurance plans, particularly for the most critical service providers. Regular controls may be commissioned to ensure that the security level is maintained over time and to address future risk scenarios.</p>
<p>&nbsp;</p>
<h2>Detecting, reacting and sharing</h2>
<p>The Smart City cannot do without <strong>a service to detect and deal with security incidents.</strong></p>
<p>It will be necessary to collect traces of activity on the systems and look for weak signals. In view of the large number of events to be processed, it will be essential to define the risks to be guarded against and to rely on correlation solutions to facilitate these searches. The use of automation tools will allow a first sorting of false positives, facilitating the work of analysts in the qualification of security alerts.</p>
<p>The detection and response service can be built using the PDIS and PRIS standards. Qualified external suppliers may be used for these two services as required.</p>
<p>The use of <strong>Cyber Threat Intelligence services</strong> will bring a significant efficiency gain in the creation and enrichment of SOC detection rules. Indeed, it will be possible to adopt a proactive detection posture by monitoring attacks that have targeted Smart Cities and the operating modes used. This will also have the advantage of improving the efficiency of the response service by saving precious investigation time.</p>
<p>Finally, the process of handling significant and major security incidents cannot be carried out without the formalization of a <strong>crisis management unit</strong>, composed of actors with well-defined roles and trained for this exercise. Particular attention will be paid to the external communication system, since the &#8220;severity&#8221; of a crisis depends as much on the event that caused it as on how it is perceived by the outside world.</p>
<p>&nbsp;</p>
<figure id="post-12973 media-12973" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-12973" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image3.png" alt="" width="1647" height="873" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image3.png 1647w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image3-360x191.png 360w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image3-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image3-768x407.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image3-1536x814.png 1536w" sizes="auto, (max-width: 1647px) 100vw, 1647px" /></figure>
<p>&nbsp;</p>
<p>In conclusion, and as we have seen through these two articles, the Smart City is a self-evident development in an era where demographic, ecological and economic issues are all intertwined. Its promises are seductive, but the implementation framework may give rise to some fears.</p>
<p>As with any digital transformation, ensuring a level of security in line with the challenges of the project will necessarily involve identifying the vulnerabilities and security risks it generates.</p>
<p><strong>In the era of cyber-warfare and cyber-threats</strong>, the Smart City should be considered as a Digital Service Provider, within the meaning of the NIS directive, and be protected by security measures adapted to this status.</p>
<p>The provision of secure services, respectful of their users&#8217; data, is a sine qua non condition for the success of a Smart City project, the benefits of which will only be matched by the magnitude of the impact of a successful cyberattack.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/04/cybersecurity-issues-around-smart-city-2-2/">Cybersecurity issues around Smart City (2/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Detect cyber incidents with machine learning: our model in 5 key steps!</title>
		<link>https://www.riskinsight-wavestone.com/en/2019/12/detect-incidents-machine-learning/</link>
		
		<dc:creator><![CDATA[Hugo.MORET@wavestone.fr]]></dc:creator>
		<pubDate>Tue, 24 Dec 2019 14:19:30 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[détection]]></category>
		<category><![CDATA[Machine learning]]></category>
		<category><![CDATA[SOC]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=12488</guid>

					<description><![CDATA[<p>As the role of Artificial Intelligence grows in companies, from predictive maintenance to price optimization, new so-called ‘intelligent’ tools are being developed for cybersecurity. How do these tools exploit recent developments in Machine Learning? What steps should be taken to...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/12/detect-incidents-machine-learning/">Detect cyber incidents with machine learning: our model in 5 key steps!</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>As the role of <strong>Artificial Intelligence</strong> grows in companies, from predictive maintenance to price optimization, new so-called <strong>‘intelligent’</strong> tools are being developed for cybersecurity. How do these tools exploit recent developments in Machine Learning? What steps should be taken to develop an intelligent and above all relevant detection solution in this context?</em></p>
<h2>From static detection methods to behavioral analysis</h2>
<p>As attacks evolve more and more rapidly and in an increasingly sophisticated way, the SOC (Security Operations Center) is forced to review its approach and existing tools as static detection mechanisms become obsolete:</p>
<ul>
<li>The historical approach uses the <strong>recognition of known behaviors and footprints</strong> (e.g. malware signatures). This method, called <strong>misuse-based</strong>, provides explicit alerts that are easy to analyse for operational staff, but only attacks that have already occurred and been detected can be recognized.</li>
<li>The new approach aims to <strong>analyse actions that deviate from the behavior normally observed</strong>, without having to explicitly and exhaustively define a malicious act (e.g. the behavior of an individual who deviates from that of his colleagues). This <strong>anomaly-based</strong> approach makes it possible to detect attacks that are not directly run through the tools but require high volumes of data.</li>
</ul>
<p>The anomaly-based approach exploits the correlation capabilities of <strong>unsupervised learning</strong> algorithms that highlight links between unlabeled data (i.e. not categorized as normal or abnormal).</p>
<h2>Recipe: detection of anomalies on a machine learning bed</h2>
<p>To know if Machine Learning is appropriate for its context, the best solution is to create a PoC (Proof of Concept). How do you implement it? What are the key points to look out for? Here are the key steps in our development.</p>
<h3>Starter, main or dessert: define the use case</h3>
<p>Doing Machine Learning is good, knowing why is better. Defining a <strong>use case</strong> is like answering the question ‘<em>What do you want to observe?</em>’ and determining the means available to respond.</p>
<p>In our context, a use case is a threat scenario involving one or more groups of accounts (malicious administrators, exfiltration of sensitive data, etc…). To evaluate them, several criteria must be taken into consideration:</p>
<ul>
<li><strong>Utility:</strong> what would be the impact if the scenario were to happen?</li>
<li><strong>Data availability:</strong> what are the available sources of useful data?</li>
<li><strong>Data complexity:</strong> is the available data structured (numbers, tables) or unstructured (images, text)?</li>
</ul>
<p>We have chosen to work on the compromising of <strong>service accounts:</strong> some may have important rights, and their automated actions generate relatively structured data. In the context of a PoC, a limited scope, and homogeneous and easily accessible data sources are essential to obtain concrete and exploitable results, before considering more ambitious use cases.</p>
<h3>Ingredient weighing: determine the data model</h3>
<p>In order to make the best use of the data, it is necessary to define <strong>a behavior to be modeled based on available information</strong>. This is where business expertise comes in: can an <strong>isolated action</strong> be a sign of compromise or should a <strong>series of actions</strong> be considered for detecting malicious behavior?</p>
<p>First, we defined a model based on the analysis of unit and family logs (e.g. connections, access to resources, etc.) to evaluate the overall functioning. However, a <strong>model that is too simple</strong> will ignore weak signals hidden in action <strong>correlations</strong>, while a <strong>representation that is too complex</strong> will add processing time and be more sensitive to modelling biases.</p>
<h3>Selection of tools: choose the algorithm</h3>
<p>Several types of algorithms can be used to detect anomalies:</p>
<ul>
<li>Some try <strong>to isolate</strong> each point: if a point is easy to isolate, it is far from the others and therefore more abnormal.</li>
<li><strong>Clustering</strong> algorithms creates groups of points that look alike and from this it calculates the center of gravity of each one to create the average behavior: if a point is too far from the center, it is considered abnormal.</li>
<li>Less common, <a href="https://towardsdatascience.com/credit-card-fraud-detection-using-autoencoders-in-h2o-399cbb7ae4f1?gi=bb5833d3b9ba"><strong>auto-encoders</strong></a> are artificial neural networks that learn to recreate normal behavior with fewer parameters: behavior reproduction errors can be considered as an anomaly score.</li>
</ul>
<p>Other approaches still exist, including the most exotic <a href="https://www.hindawi.com/journals/tswj/2014/156790/abs/">artificial immune systems</a> that mimic biological mechanisms to create an evolving detection tool. However, it should not be forgotten that <strong>a simple and well optimized tool is often more effective than an overly complex tool.</strong></p>
<p>The <strong>k-means</strong> clustering algorithm was selected in our case: used in the detection of bank fraud, it simplifies re-training which allows the tool to remain adaptable despite changes in behavior.</p>
<p>All these algorithms can also be <strong>enhanced, depending on the chosen behavior model</strong>, to consider a series of actions. Thus, <a href="https://en.wikipedia.org/wiki/Convolutional_neural_network">convolutional</a> or <a href="https://en.wikipedia.org/wiki/Recurrent_neural_network">recurrent neural networks</a> can be added upstream to take into account <strong>time series</strong>.</p>
<h3>Preparation of ingredients: transforming data</h3>
<p>Once the algorithm has been selected, the raw data must be processed to make it usable. This process is carried out in several steps:</p>
<ul>
<li><strong>Cleaning:</strong> correction of parsing errors, removal of unnecessary information and addition of missing information.</li>
<li><strong>Enrichment:</strong> adding data from other sources and reprocessing fields to highlight information (e. g. indicate if a date is a public holiday&#8230;).</li>
<li><strong>Transformation:</strong> creation of binary columns for qualitative data (e.g. account name, event type, etc.) that cannot be directly transformed into numbers (one column for each unique value, indicating whether the value is present or not).</li>
<li><strong>Normalization:</strong> reprocessing the values so that they are all between 0 and 1 (to prevent one field from taking over from another).</li>
</ul>
<p>Due to the variety of possible events and the complexity of the logs, we have chosen to automate this process: for each field, the algorithm detects the type of data and selects the appropriate transformation from a predefined library. The operator can then interact with the tool to modify the choice before continuing the process.</p>
<h3>Seasoning: test and optimize the tool</h3>
<p>Once the model has been defined, the algorithm chosen and the data transformed, the tool developed should be able to raise alerts on anomalies. Do these alerts make sense or are they false positives?</p>
<p>In order to evaluate the performance of the tool, we performed two types of tests:</p>
<ul>
<li><strong>Intrusion simulation</strong> by performing malicious actions to check if they are detected as abnormal (this approach can also be handled by directly adding &#8220;false&#8221; logs to data sets).</li>
<li><strong>Analysis of anomalies</strong> by checking whether the alerts raised actually correspond to malicious behavior.</li>
</ul>
<p>Many parameters can be adjusted in the algorithms to refine detection. <strong>Performance optimization</strong> is achieved through an iterative process; changing parameters and observing the effect on a <strong>set of validation data</strong>. Manually time-consuming, it can be improved by the <a href="https://en.wikipedia.org/wiki/Hyperparameter_optimization">AutoML</a> approach which seeks to automate certain steps by using optimization algorithms.</p>
<p>However, parameter optimization is not enough: the results of our PoC have shown that the quality of detection based on behavioral analysis depends largely on the relevance of the behaviors defined before the algorithm is developed.</p>
<h2><strong>ML or not ML: that may not be the question</strong></h2>
<p>Despite its undeniable advantages, Machine Learning <strong>is a tool to be used in a rational way:</strong> frameworks are becoming increasingly accessible and easy to use, but the <strong>definition of the use-case</strong> and the <strong>behavior model</strong> are still crucial steps that exist. These choices, where business expertise is essential, will irreversibly influence the choice of data, the selection of the detection algorithm and the tests to be performed.</p>
<p>The question is no longer ‘<em>Where can I put Machine Learning in my SOC?</em> ‘, but rather <em>‘Of all the approaches available, <strong>which is the most effective</strong> to address my problem?’.</em></p>
<p>To find out, there&#8217;s only one solution: light the fires!</p>
<h2><strong>To go further&#8230;</strong></h2>
<p>… here are the tools used during our PoC:</p>
<ul>
<li><strong>IDE</strong>
<ul>
<li><strong>Pycharm:</strong> clear and practical development environment with efficient library management</li>
</ul>
</li>
<li><strong>Language</strong>
<ul>
<li><strong>Python:</strong> a language widely used in the field of Data Science with many powerful libraries</li>
</ul>
</li>
<li><strong>Libraries</strong>
<ul>
<li><strong>Scikit-learn:</strong> complete Machine Learning library (supervised, unsupervised&#8230;)</li>
<li><strong>Pandas:</strong> complex processing of data tables</li>
<li><strong>Numpy:</strong> handling of matrices and vectors</li>
<li><strong>Matplotlib, Seaborn:</strong> display of graphics for visualization</li>
</ul>
</li>
</ul>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/12/detect-incidents-machine-learning/">Detect cyber incidents with machine learning: our model in 5 key steps!</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>SOAR, UEBA, CASB, EDR and others: which tools do you need for you SOC? (2/3)</title>
		<link>https://www.riskinsight-wavestone.com/en/2019/04/new-tools-soc-23/</link>
		
		<dc:creator><![CDATA[Amaury Coulomban]]></dc:creator>
		<pubDate>Thu, 18 Apr 2019 09:56:28 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[Deceptive security]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[Machine learning]]></category>
		<category><![CDATA[SOC]]></category>
		<category><![CDATA[supervision]]></category>
		<category><![CDATA[tool]]></category>
		<category><![CDATA[UEBA]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=11835</guid>

					<description><![CDATA[<p>After the first article, which covered &#8220;Extending the scope of detection to new perimeters&#8221; (available here), this second installment is the next in our summer series about the SOC&#8230; &#160; Enhancing detection with new approaches Think identity to detect suspect...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/04/new-tools-soc-23/">SOAR, UEBA, CASB, EDR and others: which tools do you need for you SOC? (2/3)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>After the first article, which covered &#8220;Extending the scope of detection to new perimeters&#8221; (available <a href="https://www.riskinsight-wavestone.com/en/2019/04/new-tools-soc-13/">here</a>), this second installment is the next in our summer series about the SOC&#8230; </em></p>
<p>&nbsp;</p>
<h2>Enhancing detection with new approaches</h2>
<h3>Think identity to detect suspect behaviors: UEBA</h3>
<p>User and Entity Behavioral Analysis (UEBA—previously known as UBA) technologies are among the latest tools being used to enhance SOC’s detection arsenals. As their name suggests, they take a specific approach—leaving aside the technical considerations of current solutions (SIEM, etc.), and, instead, analyzing the <strong>behavior of users and entities</strong> (including terminals, applications, networks, servers, connected objects, etc.).</p>
<p>The principle is simple, but its implementation much less so. To be effective, UEBA approaches require a diversity of sources, and a <strong>variety of data formats</strong>. Traditional sources, such as SIEM and log manager(s), are employed and, in addition, certain resources (such as ADs, proxies, BDDs, etc.) are often used directly.</p>
<p>But, to perfect their detection capabilities, UEBA solutions also draw on new sources: <strong>information on users</strong> (HR applications, badge management, etc.), exchanges between employees (chats, video exchanges, emails, etc.), or any other relevant sources (business applications that need to be monitored, etc.).</p>
<p>Taking all this information together, UEBA solutions analyze the behavior of users (and entities) to identify potential threats. They can use static rules, in the form of <strong>signatures to be detected</strong> (which are often already implemented in SIEM solutions): simultaneous connections from two different locations, or unusual times of use, etc.</p>
<p>But the real strength of UEBA lies in the use of Machine Learning algorithms to detect <strong>changes in the behavior</strong> of users or services: suspicious business-function operations, access to critical, previously unused applications during holidays, unusual data transfers, etc.</p>
<p>Although UEBA was initially conceived to counter fraud, its role has gradually broadened to cover some areas that typically pose problems for SIEM: data theft, compromise or loan of application accounts, terminal or server infection, privilege abuse, etc.</p>
<p>Thus, today, UEBA is positioning itself as complementary to SIEM, adding to the latter’s &#8220;technical&#8221; approach by providing &#8220;user&#8221; visibility, and bringing an additional layer of intelligence to the analysis.</p>
<p>The market’s view is that, in the coming years, UEBA solutions will probably cease to exist in their present form. Instead, they’ll be integrated into existing solutions (SIEM, EDR, etc.), changing their form from products to functionalities.</p>
<p><strong><u>Examples of UEBA publishers:</u></strong></p>
<p><img loading="lazy" decoding="async" class="size-medium wp-image-11837 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/04/image1-1-437x159.png" alt="" width="437" height="159" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/04/image1-1-437x159.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/04/image1-1-768x280.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/04/image1-1-71x26.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/04/image1-1.png 1339w" sizes="auto, (max-width: 437px) 100vw, 437px" /></p>
<p>&nbsp;</p>
<h3>Trapping attackers: deceptive security</h3>
<p>Deceptive Security can be considered as a move to <strong>a higher form of the Honey Pot approach</strong>. Here, <strong>decoys</strong>, in the form of data, agents, or dedicated environments, are distributed widely throughout all, or part of, the IS.</p>
<p>Depending on the needs and solutions, Deceptive Security tools can serve two purposes. By <strong>diverting the attention of attackers away from real resources</strong> and leading them down false trails, they can act as a means of <strong>protection</strong>.</p>
<p>But above all, monitoring these decoys can <strong>detect</strong> threats that are spreading within the IS. In fact, the decoys have no other use than to <strong>lure potential attackers or to provide false information</strong>; any communication with them is then, by definition, suspect.</p>
<p>This type of solution isn&#8217;t a replacement for existing measures but addresses very specific use cases where conventional detection approaches are ineffective: APTs, which are specially designed to circumvent them, and, more broadly, horizontal movements within the IS.</p>
<p>For more detail on Deceptive Security solutions, read our dedicated article <a href="https://www.riskinsight-wavestone.com/en/2017/11/deceptive-security-comment-arroser-larroseur/">here</a>.</p>
<p><strong><u>Examples of Deceptive Security publishers:</u></strong></p>
<p><img loading="lazy" decoding="async" class="size-medium wp-image-11839 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/04/Image2-2-437x185.png" alt="" width="437" height="185" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/04/Image2-2-437x185.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/04/Image2-2-768x326.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/04/Image2-2-71x30.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/04/Image2-2.png 1308w" sizes="auto, (max-width: 437px) 100vw, 437px" /></p>
<p>&nbsp;</p>
<h3>Detecting weak signals on the network: machine learning sensors</h3>
<p>Traditional detection sensors (IDPSs), based on traffic analysis and comparisons with known attack signatures, are not particularly effective when it comes to <strong>detecting subtle attacks</strong> (APTs, etc.) <strong>or unknown</strong> <strong>threats</strong> (0-day, etc.). To overcome this problem, new-generation IDPSs integrate Machine Learning capabilities (sometimes presented as Artificial Intelligence) into their detection arsenals.</p>
<p>Depending on the solution, two types of use for Machine Learning can be distinguished. On the one hand, the use of these algorithms in <strong>supervised mode</strong> to learn to <strong>recognize the behavior of certain attacks</strong>, or phases of attack (during the active phases): command and control, scans, lateral movements, data leakage, etc.</p>
<p>On the other, once the sensor has been deployed, adjustment of the detection thresholds to the client context is also based on Machine Learning algorithms (something already used by many traditional IDPS solutions).</p>
<p>This mode of operation enables rapid deployment (solutions that can be used out-of-the-box with shorter learning phases), and a better ability to detect previously characterized attacks. Conversely, the detection of attacks that have not been subject to learning, or are completely unknown, remains difficult.</p>
<p>In contrast to this approach, some solutions rely on <strong>unsupervised learning</strong> to detect attacks. Here, during deployment, sensors are positioned on the network to observe the traffic and learn how to recognize what constitutes legitimate traffic.</p>
<p>Once the learning phase is over, the sensors can <strong>detect anomalies</strong> and raise alerts when suspicious behavior occurs. This approach enables the detection of unknown attacks, but generally requires a longer learning phase if it is to be effective and achieve an acceptable false alert rate.</p>
<p>In both cases, the &#8220;Machine Learning<em>&#8220;</em> sensors make it possible to enhance an SOC’s arsenal (which, today, is mostly aimed at detecting known attacks) through detection capabilities that can <strong>discern complex, unknown attacks</strong>, or those designed to circumvent conventional security approaches.</p>
<p>Initial feedback from the field shows that these technologies can indeed detect threats that bypass conventional security measures. False positives, however, are very common (the learning curve varies widely, depending on solutions and contexts), and it remains difficult to judge how comprehensively threats are being detected.</p>
<p>&#8220;Machine Learning&#8221; sensors therefore have a definite future among SOC tools, even if they need to further mature to reach their full potential.</p>
<p><strong><u>Examples of Machine Learning sensor publishers:</u></strong></p>
<figure id="post-11841 media-11841" class="align-none"><img loading="lazy" decoding="async" class="size-medium wp-image-11841 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/04/image3-2-437x76.png" alt="" width="437" height="76" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/04/image3-2-437x76.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/04/image3-2-768x134.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/04/image3-2-71x12.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/04/image3-2.png 1377w" sizes="auto, (max-width: 437px) 100vw, 437px" /></figure>
<p>&nbsp;</p>
<p><em>You can find our third, and final, article in this series <a href="https://www.riskinsight-wavestone.com/en/2019/04/new-tools-soc-33/">here</a>.</em></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/04/new-tools-soc-23/">SOAR, UEBA, CASB, EDR and others: which tools do you need for you SOC? (2/3)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>SOAR, UEBA, CASB, EDR and others: which tools do you need for you SOC? (1/3)</title>
		<link>https://www.riskinsight-wavestone.com/en/2019/04/new-tools-soc-13/</link>
		
		<dc:creator><![CDATA[Amaury Coulomban]]></dc:creator>
		<pubDate>Thu, 18 Apr 2019 09:00:30 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[AD]]></category>
		<category><![CDATA[CASB]]></category>
		<category><![CDATA[détection]]></category>
		<category><![CDATA[EDR]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[SOC]]></category>
		<category><![CDATA[supervision]]></category>
		<category><![CDATA[tool]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=11826</guid>

					<description><![CDATA[<p>SOC teams are finding it more and more difficult to detect increasingly complex attacks that take place over ever larger perimeters. At the same time, they are bearing the full brunt of the explosion in the number of alerts to...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/04/new-tools-soc-13/">SOAR, UEBA, CASB, EDR and others: which tools do you need for you SOC? (1/3)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>SOC teams are finding it more and more difficult to detect increasingly complex attacks that take place over ever larger perimeters. At the same time, they are bearing the full brunt of the explosion in the number of alerts to process (especially due to the myriad of technologies in use and the false positives they generate), the strengthening of the regulatory framework, and the need for more granular and rapid detection&#8230;</em></p>
<p><em>Against a backdrop of an acute shortage of cybersecurity skills, these issues cannot be addressed solely by increasing the size of SOC teams. The use of <strong>new tools</strong>, based on <strong>four strategic areas</strong>, is essential in enabling SOCs to stay ahead of threats.</em></p>
<p>&nbsp;</p>
<figure id="post-11844 media-11844" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-11844 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/04/image-0-1.png" alt="" width="1464" height="318" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/04/image-0-1.png 1464w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/04/image-0-1-437x95.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/04/image-0-1-768x167.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/04/image-0-1-71x15.png 71w" sizes="auto, (max-width: 1464px) 100vw, 1464px" /></figure>
<p>&nbsp;</p>
<p><em>Here, <strong>extending the scope of detection</strong> enables the protection of new areas of the IS that are not sufficiently secure (such as the cloud) and of resources that are increasingly being chosen as targets (through ransomware attacks on terminals, targeted attacks using ADs, etc.).</em></p>
<p><em>At the same time, <strong>new approaches need to be adopted</strong> to detect targeted attacks (0-day, &#8220;low signal&#8221;, etc.), whose increasing sophistication is undermining existing security measures.</em></p>
<p><em>In addition to these new detection tools, <strong>an</strong> <strong>advanced knowledge of threats</strong> <strong>and attackers</strong> can improve existing detection capabilities, help prioritize incidents to be dealt with, and increase the effectiveness of the response.</em></p>
<p><em>But SOC teams are already struggling to process the events generated by existing tools. As a result, it’s essential to <strong>standardize and automate</strong> interactions between teams and systems, and, wherever possible, <strong>the sequence of analysis and response</strong>.</em></p>
<p><strong><em>Follow our series on the topic and learn how to tool up in these four strategic areas!</em></strong></p>
<p>&nbsp;</p>
<h2>Extending the scope of detection to new perimeters</h2>
<h3>A unique solution to secure all clouds: CASB</h3>
<p>Cloud Access Security Brokers (CASBs) address an area of the IS that is poorly served by traditional security measures: <strong>the cloud</strong>. The very nature of the cloud means that protection in this area requires a different approach to that used for a conventional IS; <strong>there is little or no control of resources</strong> (infrastructure, OSs, or applications—depending on the type of offering), <strong>assets are located outside the IS</strong>, etc.</p>
<p>CASBs aim to <strong>centralize </strong>and <strong>ensure that security policies are applied</strong>. Some <strong>cloud providers offer their own</strong> CASB security services (for example, Microsoft’s <em>Cloud App Security</em>); but, depending on the needs, it may be preferable to use <strong>third-party solutions</strong>, even though there is a cost to adding in another player. While CASBs aim to ensure security levels in the cloud, relying on the cloud service providers to perform this monitoring role can be counterproductive: it’s preferable to make use of a &#8220;trusted third party&#8221;.</p>
<p>In all cases, CASBs offer a diversity of solutions that can include a very large number of services—their degree of maturity depending on the solution&#8217;s publisher, the cloud provider, and the type of hosting (IaaS, PaaS, SaaS, etc.).</p>
<p>On the one hand, CASB solutions make it possible to deal with <strong>specific cloud issues</strong>, by <strong>addressing the lack of visibility in these environments</strong> (through shadow IT detection, usage statistics, etc.) and ensuring that they are <strong>compliant</strong> (verification of configurations, etc.).</p>
<p>On the other hand, they play a part in the application of traditional security measures in this cloud. In particular, <strong>data security</strong> issues (such as DLP and encryption measures, which are of special concern to regulators) and <strong>threat detection</strong> (centralization of cloud logs for transmission to SIEM, detection of abnormal behavior using UEBA (see our dedicated article on this), etc.) are parts of a CASB traditional capabilities. In addition, some stakes associated with <strong>IAM</strong> can also be addressed by these solutions (SSO, access contextualization, etc.).</p>
<p>There are two main modes of deployment when putting these features in place, each with its advantages and disadvantages. <strong>Proxy-type</strong> <strong>solutions</strong> are placed between users and the cloud service.</p>
<p>In contrast, when using <strong>API-type solutions</strong>, which are sometimes called “out-of-band”, the cloud service’s consumers communicate directly with it. Each time it’s accessed, the service queries the CASB’s APIs to evaluate the risks and authorize (or prohibit) the consumption of the service. However, to operate, API solutions rely on the interfaces offered by the cloud provider, which may limit the options.</p>
<p>At present, CASBs are relatively new and immature solutions, and their deployment is limited. However, given the increasingly broad adoption of cloud services (already well advanced), CASBs undoubtedly have a bright future. They’ll enable SOC teams to extend their surveillance to this area, which will soon represent a large proportion of any IS.</p>
<p><strong><u>Examples of CASB publishers:</u></strong></p>
<p><img loading="lazy" decoding="async" class="size-medium wp-image-11827 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/04/image1-437x119.png" alt="" width="437" height="119" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/04/image1.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/04/image1-71x19.png 71w" sizes="auto, (max-width: 437px) 100vw, 437px" /></p>
<p>&nbsp;</p>
<h3>The new Swiss army knife for securing terminals: endpoint detection and response (EDR)</h3>
<p>Endpoint Detection and Response (EDR) solutions are set to enhance SOC’s detection and response capabilities <strong>for terminals</strong> (PCs, servers, etc.).</p>
<p>As the name implies, EDRs play a part in <strong>detecting</strong> attacks. In fact, they are plugging the gaps in anti-virus solutions (and other HIPSs) which make use of specific attack signatures and are therefore unsuited to detecting certain attack types—in particular advanced attacks (APTs). EDRs are based on other detection methods, with publishers generally offering a combination of techniques commonly used elsewhere.</p>
<p>Among these techniques, a large number of solutions <strong>detect the exploitation of known vulnerabilities</strong> or <strong>attack patterns</strong> (the opening of suspicious ports to dubious addresses, etc.), the <strong>analysis of files</strong> using a sandbox (local emulation, submission in the cloud, etc.), and <strong>behavioral approaches</strong> based on Machine Learning (in particular UEBA solutions—see the dedicated chapter on this). Depending on the SOC’s needs, the alerts produced can be integrated as SIEM sources, or made available directly from the solution management console.</p>
<p>In addition to their advanced detection capabilities, EDR solutions also result in a considerable <strong>increase in visibility on devices</strong>: lists of processes and services launched, lists of files in certain system directories, as well as other information that <strong>facilitates investigation</strong> in cases where an alert is raised. Some solutions go beyond mere recovery of the state of the terminal at the time of the request, enabling its history to be recovered too: generation of logs, recovery of deleted files, etc.</p>
<p>But EDRs’ features don’t end at the detection and analysis phase. In fact, these solutions enable <strong>remote remediation</strong> actions to be performed, and the complexity of these depends on the publisher: deleting or quarantining files, ending processes, quarantining the terminal from the network, modifying registry keys, etc.</p>
<p>EDRs, thus, are comprehensive solutions that come into play at every stage of the process: from detection, through analysis, to response. However, they are <strong>not intended to replace anti-virus solutions</strong>: it’s always more effective to block known attacks, even though publishers are increasingly offering solutions that combine these two types of functionality.</p>
<p><em>For more details on EDR solutions, read our dedicated article <a href="https://www.riskinsight-wavestone.com/en/2018/03/edr-nouveau-challenger-dans-la-protection-des-endpoints/">here</a>.</em></p>
<p>&nbsp;</p>
<p><strong><u>Examples of EDR publishers:</u></strong></p>
<p><img loading="lazy" decoding="async" class="size-medium wp-image-11829 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/04/Image2-1-333x191.png" alt="" width="333" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/04/Image2-1.png 333w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/04/Image2-1-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/04/Image2-1-68x39.png 68w" sizes="auto, (max-width: 333px) 100vw, 333px" /></p>
<p>&nbsp;</p>
<h3>Protecting the keys to the kingdom: Active Directory supervision</h3>
<p>Directories are among an <strong>IS’s</strong> <strong>most critical</strong> components. They provide the authentication and authorization functionality for almost all IS resources—both technical and business function—including the most critical ones. It’s therefore not surprising that compromising the AD is one of the most frequent attack methods used, since it opens numerous doors to an attacker.</p>
<p>Despite this criticality, and the fact that AD architectures are well known and have evolved little in recent years, <strong>their security has scope to improve</strong>. This is due, in particular, to their specific mode of operation (OUs, domains, trees, forests, users, etc.), which renders traditional protection and surveillance methods ineffective; a significant concern given that any vulnerability can represent a major risk for the rest of the IS.</p>
<p>AD surveillance solutions aim to overcome this problem by supervising (in real time, or during an audit) the specificities of directories (configuration, status of accounts, etc.) and <strong>detecting vulnerabilities </strong>that could result in them being compromised. To do this, AD supervision solutions have a highly detailed knowledge of how ADs function, and, in particular, the associated security issues.</p>
<p>When the solution detects a vulnerability, <strong>it raises an alert</strong> (via the SIEM, or directly) and can provide <strong>remediation advice</strong> to facilitate the work of the teams responsible for rectifying the problem.</p>
<p>AD supervision tools also enable the SOC to <strong>detect any changes in configuration</strong> (legitimate, accidental, or malicious) and continuously assure security levels for these critical components. In doing so, they make the task of numerous attackers decidedly more complex.</p>
<p>In addition to directly strengthening the AD’s security levels, such solutions can also be used to ensure <strong>compliance with standards or regulatory requirements</strong> (for example PCI DSS, etc.).</p>
<p>These solutions are not widely applied today, and their use is generally limited to one-off audits. However, given the considerable security improvements associated with the provision of detection and remediation advice, and their ease of use, such solutions have strong potential and are likely to find their place among the tools used by SOCs.</p>
<p><strong><u>Examples of AD supervision publishers:</u></strong></p>
<p><img loading="lazy" decoding="async" class="size-medium wp-image-11831 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/04/image3-1-437x111.png" alt="" width="437" height="111" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/04/image3-1.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/04/image3-1-71x18.png 71w" sizes="auto, (max-width: 437px) 100vw, 437px" /></p>
<p><em>You can find our second article in the series <a href="https://www.riskinsight-wavestone.com/en/2019/04/new-tools-soc-23/">here</a>.</em></p>
<p>&nbsp;</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/04/new-tools-soc-13/">SOAR, UEBA, CASB, EDR and others: which tools do you need for you SOC? (1/3)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The SOC &#8211; a department undergoing a full regulatory overhaul</title>
		<link>https://www.riskinsight-wavestone.com/en/2018/01/soc-regulatory-overhaul/</link>
		
		<dc:creator><![CDATA[Benoît Marion]]></dc:creator>
		<pubDate>Thu, 18 Jan 2018 10:32:57 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Military Programming Act]]></category>
		<category><![CDATA[overhaul]]></category>
		<category><![CDATA[personal data]]></category>
		<category><![CDATA[règlementation]]></category>
		<category><![CDATA[regulation]]></category>
		<category><![CDATA[security surveillance]]></category>
		<category><![CDATA[SOC]]></category>
		<category><![CDATA[standardization]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=10304/</guid>

					<description><![CDATA[<p>Faced with increasingly insistent and advanced threats, Security Operations Centers (SOCs) must be able to detect security incidents as quickly as possible in order to be able to react ever more effectively. However, they are also facing increasingly stringent measures...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/01/soc-regulatory-overhaul/">The SOC &#8211; a department undergoing a full regulatory overhaul</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Faced with increasingly insistent and advanced threats, Security Operations Centers (SOCs) must be able to detect security incidents as quickly as possible in order to be able to react ever more effectively.</p>
<p>However, they are also facing increasingly stringent measures under new regulations such as the General Data Protection Regulation (GDPR), which covers all personal data, or the various new regulations on the protection of critical national infrastructures. <a href="https://www.ssi.gouv.fr/en/cybersecurity-in-france/ciip-in-france">France is in the vanguard of this activity with its Military Programming Act</a> which applies to the organizations classed as “most critical” in terms of the country’s functioning.</p>
<p>But how can you put in place increasingly sophisticated detection systems, while, at the same time, complying with an ever-stricter regulatory framework?</p>
<p>&nbsp;</p>
<h2><strong>SOC</strong><strong>s ARE BEING STANDARDIZED AT THE EUROPEAN LEVEL—AND GLOBALLY</strong></h2>
<p>In the mid-2000s, the implementation of the first SOCs consisted, for the most part, of deploying log collectors based on geographical hubs and the setting up of a central alert management system. However, recent regulatory changes may require modifications to architecture. In France, in particular, within the context of the Military Programming Act, the requirement to set up a &#8220;system of log correlation and analysis&#8221; (i.e. a SOC equipped by a SIEM system) has been accompanied by a strict regulatory framework, which is set out in its <a href="https://www.ssi.gouv.fr/uploads/2014/12/pdis_referentiel_v1.0_en.pdf#referentiel-pdis">PDIS (Security Incident Detection Service Providers) Requirements Reference Document</a>.</p>
<p>In terms of standardization, this addresses three points in particular:</p>
<ul>
<li>First, the <strong>framework for surveillance</strong>: there is now an obligation to detect certain types of common attacks and implement controls, following recommendations made through audits carried out by qualified bodies, in accordance with the <a href="https://www.ssi.gouv.fr/en/cybersecurity-in-france/ciip-in-france/faq">PASSI (Cybersecurity Audit Service Providers) Reference Document</a>. Companies must also put in place a permanent surveillance unit to notify ANSSI (the French national agency for information system security) in the event of an IS being critically compromised.</li>
<li>The second area addresses <strong>the securing of the SOC&#8217;s assets</strong>: new security measures described in the PDIS Requirements Reference Document demand, in particular, more robust measures for SOC operators and administrators (two-factor authentication, limitations on internet access, etc.). These security measures will be verified by ANSSI through audits, or retrospectively, following the compromise of an IS being notified to it.</li>
</ul>
<p><strong>Finally—the architecture—where there&#8217;s a requirement for greater complexity</strong>: partitioning into trust zones and an enlargement to the perimeter of the monitored network are introduced (going beyond the traditional scope of equipment under security surveillance: business servers and handheld devices must also now be monitored). Information related to security incidents (events, analysis reports, and their associated notifications) must also now be retained for as long as the service is provided.</p>
<p>&nbsp;</p>
<h2><strong>STRONG SECURITY AND CAREFUL HANDLING OF PERSONAL DATA: INCOMPATIBLE GOALS?</strong></h2>
<p>To carry out retrospective analyses and, in particular, to determine the origin of cyber-attacks, a good deal of personal and critical data must be collected, stored, and exploited. However, this data is covered by the GDPR, which tends to limit its collection and use.</p>
<p>Google&#8217;s recent fine by the AGPD (Spain&#8217;s personal data protection authority) highlights the types of issue that a SOC may encounter regarding the processing of personal data:</p>
<ul>
<li>Google’s obligations in the <strong>processing of personal data</strong> and the user&#8217;s<strong> right to be forgotten</strong> were the prime causes of Google’s penalty. In fact, the GDPR intends to offer European citizens the option to access, modify, or delete their data wherever it is stored (including in the cloud). This means that, in practice, companies must know exactly what data is being collected by their SOC, so that they can inform their customers, employees, etc. accordingly—and offer them the option of having it removed at any time. Having said that, the GDPR seems to indicate that preservation of some data is acceptable, where this is necessary for the protection of companies. The details of exactly how this provision will operate are expected to be worked out over the next few years.</li>
<li>An <strong>obligation of transparency</strong> with respect to the exploitation of data is the second issue that the AGPD’s action raises. Yet, for PDISs, the obligation to monitor a wide range of equipment gives rise to the collection of a large and varied amount of data. The content of logs will therefore have to be addressed to ensure that only the data needed for security-monitoring activity is collected.</li>
<li>Finally, the GDPR imposes a requirement to <strong>justify the preservation of the data</strong>. Yet, PDIS requirements are for data to be kept for at least six months, in order to have the ability to carry out long-term or retrospective analysis; this creates regulatory uncertainty: how far can a company go in ensuring the protection of its IS?</li>
</ul>
<p>Looking beyond the example of Spain, it’s instructive to compare the different legislative approaches to the notification of incidents. Those dedicated to the protection of personal data target rapid notification in order to limit the impacts on people&#8217;s lives; while legislation concerning the protection of critical infrastructure requires limited and highly confidential notifications in order to allow sufficient time for incidents to be correctly managed, without revealing to an attacker the fact that they have been discovered. In the end, the GDPR took into account this type of scenario, but that’s not to say that other texts won’t result in contradictory obligations.</p>
<p>&nbsp;</p>
<h2><strong>A STRICT—BUT BENEFICIAL—REGULATORY FRAMEWORK</strong></h2>
<p>The tightening of the regulatory framework for SOCs, whether direct (via PDIS requirements) or indirect (through the GDPR), will result in a transformation of the IS ecosystem. New types of profiles could thus be integrated into teams, such as the Data Privacy Officer (DPO), which the SOC could consider as a key player in maintaining its long-term compliance.</p>
<p>In addition, these regulations will raise maturity levels among the players who have to comply with them, as well as among those who draw inspiration from them. Already, there are numerous moves toward compliance involving SOC architecture, as well as its processes and governance.</p>
<p>In complying with the regulations, tools also count—and that means looking at innovations such as data-based surveillance (with Data Leakage Prevention [DLP] tools), which can help ensure compliance with respect to the protection of sensitive data.</p>
<p>&nbsp;</p>
<h2><strong>TOWARD MORE REALISTIC REGULATIONS&#8230;</strong></h2>
<p>The value of the requirements for many organizations, both as standards and objectives to be met, cannot be disputed.</p>
<p>While the bar may seem high, and regulatory inconsistencies remain, one thing is for sure: the next round of regulatory updates will provide a solid framework for the design and improvement of SOC.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/01/soc-regulatory-overhaul/">The SOC &#8211; a department undergoing a full regulatory overhaul</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Deceptive Security : comment arroser l’arroseur ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2017/11/deceptive-security-comment-arroser-larroseur/</link>
		
		<dc:creator><![CDATA[Amaury Coulomban]]></dc:creator>
		<pubDate>Wed, 22 Nov 2017 16:23:31 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[Cyberattaque]]></category>
		<category><![CDATA[Cybercriminalité]]></category>
		<category><![CDATA[Deceptive security]]></category>
		<category><![CDATA[détection]]></category>
		<category><![CDATA[honeypot]]></category>
		<category><![CDATA[Security Operations Center]]></category>
		<category><![CDATA[SOC]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=10190/</guid>

					<description><![CDATA[<p>Les menaces cyber sont de plus en plus sophistiquées et les attaquants de plus en plus créatifs pour contourner les dispositifs de sécurité des défenseurs. Les mesures classiques de prévention quant à elles s’efforcent en permanence de s’adapter aux nouveaux...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/11/deceptive-security-comment-arroser-larroseur/">Deceptive Security : comment arroser l’arroseur ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Les menaces cyber sont de plus en plus sophistiquées et les attaquants de plus en plus créatifs pour contourner les dispositifs de sécurité des défenseurs. Les mesures classiques de prévention quant à elles s’efforcent en permanence de s’adapter aux nouveaux modes d’attaque. Les outils de Deceptive Security sont apparus du fait de cette compétition entre moyens d’attaque et moyens de défense, comme une méthode alternative et complémentaire de lutte contre les menaces.</em></p>
<p>&nbsp;</p>
<h2>Aux origines : les Honeypots</h2>
<p>Le principe de Deceptive Security est basé sur l&#8217;utilisation de <strong><em>Security Decoys</em></strong> (ou « leurres » en français), inspirés des <strong><em>Honeypots</em></strong> (pots de miel). Le principe est simple : des leurres sont répartis aux points stratégiques du SI et toute activité y est tracée. Ces leurres n&#8217;ayant d&#8217;autres utilités que d&#8217;appâter de potentiels attaquants, toute communication avec l&#8217;un d&#8217;entre eux est nécessairement suspecte. Leur analyse permet donc de détecter et d&#8217;étudier de potentielles menaces.</p>
<p>Aujourd’hui, les Honeypots demeurent <strong>peu répandus</strong>, les principaux cas d’usage restant cantonnés à des cas de <strong>recherche</strong> ou de <strong>récupération d’informations</strong> (notamment de <em>Threat Intel</em>). Ainsi, des « pots de miel » sont exposés publiquement afin d’observer le trafic reçu sur Internet, et d’en extraire des informations : observation de nouvelles menaces (ransomware, chevaux de Troie…), identification d’IP suspectes ou compromises (SPAM, botnet…) … On peut cependant noter le <strong>regain d’intérêt</strong> pour les honeypots suite à l’attaque <strong>WannaCry</strong>, pendant laquelle nombre d’entre eux ont été utilisés pour récupérer et analyser le ransomware.</p>
<p>Dans les SI des entreprises, leur utilisation est encore plus marginale, et &#8211; en plus des cas cités précédemment &#8211; majoritairement limitée à des besoins bien spécifiques de <strong>gestion de crise</strong> ou de <strong>réponse à incident</strong>. Dans ces cas, les Honeypots sont utilisés pour contenir la menace dans un périmètre défini (afin de protéger les ressources critiques), étudier son comportement et en déduire son objectif.</p>
<p>Ainsi, aujourd’hui, les Honeypots sont principalement utilisés dans des buts <strong>d’observation et de compréhension de la menace</strong>.</p>
<p>Les difficultés que les Honeypots rencontrent pour se démocratiser reposent principalement sur deux limites : ceux-ci sont généralement <strong>trop facilement détectés par les attaquants</strong>, et le <strong>passage à l&#8217;échelle</strong> d&#8217;un SI relève de l&#8217;impossible, notamment par manque d’industrialisation des solutions.</p>
<p>&nbsp;</p>
<h2>Suivre le rythme : wider, faster, stealthier</h2>
<p>Le principe de Deceptive Security vise justement à adresser ces deux problématiques, et repose sur la capacité à déployer des leurres de manière <strong>industrielle</strong> et sur des <strong>périmètres étendus</strong>. Le déploiement de ces honeypots peut être réalisé de deux façons : par le déploiement d&#8217;<strong>environnements leurres dédiés</strong>, ou par l&#8217;ajout de leurres (<strong>agents</strong>…) installés sur des <strong>environnements existants</strong> (serveurs de production, de transfert de fichier…). La stratégie de certaines solutions de Deceptive Security repose sur le déploiement de leurres à une échelle telle que ceux-ci créent un «<strong> second SI </strong>» dans le SI (ou une partie de celui-ci), similaire à une toile d’araignée dans laquelle l’attaquant vient s’emmêler.</p>
<figure id="post-10191 media-10191" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-10191 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/11/image-1.png" alt="" width="1507" height="1054" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/11/image-1.png 1507w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/11/image-1-273x191.png 273w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/11/image-1-768x537.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/11/image-1-56x39.png 56w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/11/image-1-245x170.png 245w" sizes="auto, (max-width: 1507px) 100vw, 1507px" /></figure>
<p>&nbsp;</p>
<p>Même si cette industrialisation représente un progrès majeur en soi, ce qui justifie la création d&#8217;une nouvelle catégorie d&#8217;outils (plutôt que de parler de simple évolution), c&#8217;est surtout la capacité à <strong>mieux dissimuler</strong> les leurres. Terminés les serveurs vulnérables avec des mots de passe par défaut : le piège est évident, l&#8217;attaquant n&#8217;y croit plus. Aujourd&#8217;hui, les solutions de Deceptive Security les plus avancées <strong>racontent une histoire à l&#8217;attaquant</strong> afin de le guider peu à peu vers leurs pièges.</p>
<p>&nbsp;</p>
<h2>La recette : remonter les miettes jusqu’au pot de miel</h2>
<p>Pour cela, des informations (généralement appelées &#8220;miettes&#8221;) sont disséminées sur les environnements existants : serveurs de productions, AD… Bien entendu, l’industrialisation du déploiement de ces miettes est lui aussi un des enjeux principaux mis en avant par les solutions les plus avancées. <strong>Une miette représente un brin d&#8217;information</strong> : la mention d&#8217;un serveur hébergeant un middleware obsolète, des identifiants de connexion à un serveur, l&#8217;existence d&#8217;un compte possédant des droits d&#8217;administration…</p>
<p>Selon les solutions, ces miettes peuvent poursuivre deux buts distincts. Elles peuvent être utilisées comme un mécanisme de<strong> protection</strong>, en guidant les attaquants vers de fausses pistes, ralentissant leur progression et les encourageant à jeter l’éponge et à changer de cible.</p>
<p>Mais surtout, elles peuvent aussi permettre la <strong>détection</strong> des attaquants. Dans ce cas, <strong>chacune des miettes représente un indice</strong>, que les attaquants peuvent récolter en explorant les différentes ressources du réseau. Une fois récoltés, interprétés et corrélés, ces indices <strong>guident petit à petit les attaquants vers des leurres</strong>. Et c’est ici qu’est le réel enjeu, et la rupture par rapport au positionnement classique, de la Deceptive Security : <strong>comment créer des scénarios plausibles -et variés- pour piéger les attaquants ? </strong></p>
<p>Ainsi, là où les Honeypots se contentent de <strong>circonscrire l’attaquant</strong> dans un périmètre défini afin de <strong>comprendre le fonctionnement</strong> et l’<strong>objectif de l’attaque</strong>, les Security Decoys visent à être déployés sur un <strong>maximum de ressources</strong>, afin d’augmenter les chances de détection, et doivent donc savoir rester discrets.</p>
<p><strong>Une fois le contact avec le leurre établi, l&#8217;attaquant est repéré</strong>. Son comportement peut être alors étudié ou son accès bloqué. Dans les cas les plus poussés, de fausses informations peuvent aussi être mises à disposition pour exfiltration, permettant de faire croire à l’attaquant que sa tentative est réussie, ou de le déstabiliser lui ou son employeur : faux secrets de fabrication ou projets de brevets, fausses stratégies de rachat…</p>
<figure id="post-10193 media-10193" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-10193 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/11/image-2.png" alt="" width="1827" height="1161" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/11/image-2.png 1827w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/11/image-2-301x191.png 301w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/11/image-2-768x488.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/11/image-2-61x39.png 61w" sizes="auto, (max-width: 1827px) 100vw, 1827px" /></figure>
<p>&nbsp;</p>
<h2>Une nouvelle approche aux nombreux avantages</h2>
<p>Au vu de son fonctionnement, la Deceptive Security présente certains avantages par rapport aux solutions existantes.</p>
<ul>
<li><strong>La transparence pour les utilisateurs et les applications </strong>: la mise en place de leurres n’ajoute aucune contrainte aux équipes IT et utilisateurs finaux : pas d&#8217;ouverture de flux, de blocage de communication ou de fichiers légitimes… ;</li>
<li><strong>Un faible taux de fausses alertes</strong>: un leurre n&#8217;étant pas supposé être utilisé de manière légitime, tout contact a de forte chance d’être lié à une menace ;</li>
<li><strong>L’absence de connaissance des attaques pour être efficace </strong>: la protection apportée par la Deceptive Security n’est pas basée sur une connaissance préalable de la menace à détecter ou bloquer (pas de signatures…). Elle est donc à même de détecter certaines menaces inconnues (0-days sur des dispositifs de sécurité ou des middlewares…) et ne nécessite pas de mise à jour continue pour être efficace. Cependant, pour <strong>détecter de cas spécifiques </strong>&#8211; sur un type d’attaque ou une ressource ciblée par exemple -, une <strong>bonne connaissance des vecteurs d’attaques</strong> reste une nécessité pour la <strong>création de miettes </strong><strong>convaincantes et pertinentes</strong> pour le scénario souhaité ;</li>
<li><strong>L&#8217;absence de phase d&#8217;apprentissage </strong>: la détection ou le blocage d’une menace ne repose pas non plus sur l’apprentissage du réseau (seuils, patterns…), même si une connaissance de celui-ci reste nécessaire. L’outil est donc opérationnel dès son déploiement, et n’est pas vulnérable pendant cette phase de définition de la « normalité » du réseau. Ainsi, la Deceptive Security évite les principaux inconvénients des approches par signature et par apprentissage ;</li>
<li><strong>L&#8217;absence de besoin de corrélation avec d&#8217;autres ressources</strong>: même si la corrélation avec d’autres ressources reste un plus, une simple connexion sur un leurre suffit à lever une alerte nécessitant d’étudier le cas plus en détail ;</li>
<li><strong>La possibilité de couvrir des périmètres généralement difficiles à protéger</strong>: des leurres peuvent être déployés sur de nombreux périmètres (IoT, legacy…) avec une complexité limitée, et donc apporter une nouvelle protection à ces ressources souvent non-couvertes par les dispositifs classiques.</li>
</ul>
<p>&nbsp;</p>
<h2><strong>Des cas d’usage bien spécifiques</strong></h2>
<p>Si la Deceptive Security permet de détecter certaines attaques classiques (malwares, scans…), le réel intérêt de ce type de solution n’est pas là, ces menaces pouvant être adressées plus efficacement par les dispositifs existants (antivirus…).</p>
<p>Le meilleur cas d’usage de la Deceptive Security est la détection des tentatives d&#8217;explorations fines et d&#8217;installation au sein du réseau, permettant ainsi -quand le niveau de sophistication des miettes est suffisamment important- de détecter certaines APT. Plus généralement, ce type de solution permet de détecter les mouvements latéraux au sein du réseau, et ce même avec un niveau limité de personnalisation des miettes.</p>
<p>Ce type de dispositif n’est donc pas destiné à remplacer les mesures existantes, mais peut agir comme complément, dans le but de détecter ces types de menaces échappant communément aux dispositifs classiques.</p>
<p>&nbsp;</p>
<h2>Et pour la suite ?</h2>
<p>Concernant l&#8217;évolution de ces solutions, certains travaux cherchent à appliquer ce principe (déguiser les leurres en environnements de production) … mais dans l’autre sens ! En faisant passer les environnements de production pour des leurres, cette démarche à contrepied permettrait d’éviter à ces ressources d’être ciblées par les attaquants !</p>
<p>&nbsp;</p>
<h2>Les éditeurs</h2>
<p><em>Une liste -non exhaustive- d’éditeurs de solution de Deceptive Security est renseignée à titre indicatif ci-dessous.</em></p>
<figure id="post-10195 media-10195" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-10195 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/11/Image-3.png" alt="" width="889" height="377" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/11/Image-3.png 889w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/11/Image-3-437x185.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/11/Image-3-768x326.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/11/Image-3-71x30.png 71w" sizes="auto, (max-width: 889px) 100vw, 889px" /></figure>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/11/deceptive-security-comment-arroser-larroseur/">Deceptive Security : comment arroser l’arroseur ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersécurité : l’heure du bilan pour les SOC</title>
		<link>https://www.riskinsight-wavestone.com/en/2016/08/cybersecurite-lheure-bilan-soc/</link>
		
		<dc:creator><![CDATA[Hugo.MORET@wavestone.fr]]></dc:creator>
		<pubDate>Tue, 23 Aug 2016 09:53:40 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[CASB]]></category>
		<category><![CDATA[LPM]]></category>
		<category><![CDATA[OIV]]></category>
		<category><![CDATA[PDIS]]></category>
		<category><![CDATA[Security Operations Center]]></category>
		<category><![CDATA[SIEM]]></category>
		<category><![CDATA[SOC]]></category>
		<guid isPermaLink="false">https://www.solucominsight.fr/?p=9163</guid>

					<description><![CDATA[<p>De la création des premières équipes au début des années 2000 à la multiplication des initiatives pour répondre aux premières attaques ciblées dix ans plus tard, les équipes de sécurité opérationnelle ou SOC (Security Operational Center) doivent relever des challenges...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2016/08/cybersecurite-lheure-bilan-soc/">Cybersécurité : l’heure du bilan pour les SOC</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>De la création des premières équipes au début des années 2000 à la multiplication des initiatives pour <strong>répondre aux premières attaques ciblées</strong> dix ans plus tard, les équipes de sécurité opérationnelle ou SOC (<em>Security Operational Center</em>) doivent <strong>relever des challenges</strong> de plus en plus importants : <strong>détecter</strong> toujours plus efficacement et rapidement pour pouvoir <strong>réagir</strong> de manière appropriée.</p>
<p>À quelles <strong>difficultés</strong> font face ces équipes au quotidien ? Comment <strong>rester efficace</strong> alors que les attaques des cybercriminels deviennent <strong>extrêmement élaborées</strong> ?</p>
<h2>Le SIEM : un pilier du SOC… à condition d’être bien implémenté !</h2>
<p>L’apparition d’outils comme le <strong>SIEM</strong> (<em>Security Information and Event Management</em>), il y a environ 10 ans, a permis aux équipes de sécurité opérationnelle d’<strong>industrialiser</strong> la surveillance en <strong>simplifiant</strong> l’analyse de multiples sources d’événements de sécurité (console antivirus, proxy, <em>Web Application Firewall</em>…). Cet outil a également rendu possible la corrélation de nombreux événements provenant d’équipements ou d’applications hétérogènes pour <strong>détecter des scenarii de menace avancés</strong>.</p>
<p>Cependant, la mise en place d’un SIEM doit être le résultat d’un projet ayant un <strong>investissement proportionnel à la complexité</strong> du système d’information surveillé. En effet, la pertinence d’un SIEM repose à la fois sur :</p>
<ul>
<li>La présence de <strong>contrôles contextualisés</strong> au système d’information (notamment au travers de l’exploitation de la sensibilité des <em>assets</em> surveillés).</li>
<li>L’étude et l’implémentation de<strong> scénarii de menaces</strong> avancés et adaptés aux enjeux du métier de l’entreprise.</li>
</ul>
<p>Concernant le périmètre de surveillance, les premiers équipements habituellement intégrés sont les<strong> équipements de sécurité</strong> car ils sont nativement configurés pour laisser des traces exploitables pour les équipes opérationnelles. Il est néanmoins souvent constaté que leur intégration se limite à une<strong> simple retranscription</strong> des contrôles déjà existants ; ce qui ne permet pas de tirer parti de la corrélation d’évènements proposé par un SIEM.</p>
<p>En revanche, l’intégration d’applications métiers est plus délicate en raison notamment des besoins différents entre les équipes métiers et sécurité : la principale préoccupation pour le métier se résume généralement à l’indisponibilité de son application (ou de certaines de ses fonctionnalités), alors que la sécurité adresse un <strong>éventail de risques plus complet</strong>, que ce soit de l’<strong>indisponibilité</strong>, de la <strong>compromission</strong> de l’<strong>intégrité</strong> de données ou encore de la <strong>fuite</strong> d’informations confidentielles.</p>
<p>Il s’avère donc primordial de <strong>sensibiliser les métiers</strong> aux enjeux sécurité dans leur ensemble pour pouvoir déterminer des scenarii de menace réalistes et propres à chaque périmètre. De plus, ces applications n’ont traditionnellement pas de fonctionnalités avancées en termes de sécurité. Par conséquent, il est difficile de disposer d’un système de surveillance efficace (configuration d’envoi de logs complexe, fichiers de logs très peu verbeux…).</p>
<p>De manière générale, l’implémentation trop simpliste de contrôles dans un SIEM rend l’activité du SOC inefficace. Les équipes de surveillance se voient alors<strong> noyées de « faux positifs »</strong> et les évènements de sécurité sont traités unitairement au lieu d’être <strong>analysés dans leur ensemble</strong> afin de détecter de réels scenarii de menace (par exemple : une authentification non autorisée sur un serveur puis la désactivation de son antivirus devra être traité comme un seul incident à investiguer).</p>
<h2>Des équipes pas assez intégrées dans l’organisation de la sécurité</h2>
<p>Outre les problématiques liées à une mauvaise implémentation du SIEM évoquées ci-dessus, on constate également des problématiques d’ordre <strong>organisationnel</strong>.</p>
<p>En effet, le SIEM est souvent perçu comme une « <strong>boîte noire </strong>» par les analystes de niveau 1 et 2 au sein des équipes du SOC. Cela est généralement dû à la <strong>méconnaissance</strong> des problématiques réelles de production (identification des <em>assets</em> critiques, des interactions entre les différents systèmes…). Les incidents détectés par le SIEM se retrouvent alors tous traités au même niveau <strong>sans aucune priorisation </strong>et identification en amont des éléments les plus sensibles.</p>
<p>Pour maintenir un niveau de compétence suffisant au sein des équipes de sécurité opérationnelle, de la <strong>veille technologique</strong> doit être réalisée par les investigateurs niveau 3 pour ensuite être communiquée aux analystes niveau 1 et 2. Des sujets tels que la<strong> présentation de nouveaux IOC</strong> (<em>Indicator Of Compromise</em>) venant compléter des règles de détection permettront aux équipes de gagner en efficacité dans leur manière d’appréhender les incidents. Ces types d’initiatives contribueront à l’<strong>amélioration continue</strong> du service en évitant sa dégradation dans le temps.</p>
<p>De plus, les équipes doivent <strong>participer en continu aux nombreuses initiatives</strong> sécurités initiées par la DSI tels que des projets de sécurisation des infrastructures ou applications. Par ailleurs, des <strong>exercices de gestion de crises</strong> doivent être organisés afin d’éprouver les différents processus et outils mis en place et de permettre aux interlocuteurs métiers et sécurité de pouvoir échanger sur leurs rôles respectifs en cas de crise.</p>
<p>Dans un contexte où la cybercriminalité ne cesse de se réinventer (comme le démontre l’<a href="http://www.securityinsider-solucom.fr/2016/06/retour-sur-laffaire-swift-synthese-des.html">attaque sur les systèmes <em>Swift</em></a> récente), les équipes opérationnelles sont de plus en plus sollicitées pour intégrer de nouveaux périmètres. Cette <strong>pression constante</strong> exercée notamment par les décideurs accentue les phénomènes de <strong>mauvaise implémentation des contrôles</strong> et de méconnaissance des scénarii de menace réels. Une bonne surveillance nécessite plus qu’un simple envoi de logs dans un SIEM ; les équipes projet doivent s’efforcer de respecter et faire respecter le processus complet d’intégration de nouveaux périmètres : identification des scénarii d’attaques, mise en place des mécanismes de collecte, création des règles de détection, tests et mise en production. L’oubli d’une de ces étapes risque de rendre la collecte des logs du périmètre inutile.</p>
<h2>Quel avenir pour les SOC ?</h2>
<p>De nombreux facteurs vont venir bouleverser l’écosystème des prestataires de la sécurité opérationnelle.</p>
<p>En effet, <strong>la LPM</strong> (Loi de Programmation Militaire) va exiger de tous les OIV (Opérateur d&#8217;Importance Vitale) de choisir des <strong>prestataires certifiés PDIS</strong> (Prestataires de Détection des Incidents de Sécurité), pour ceux qui font appel à de telles prestations externes. De nombreux prérequis seront nécessaires afin de pouvoir être certifié, tels que le <strong>cloisonnement des données des clients</strong> ou la <strong>mise en place de zones d’administrations</strong> (enclaves), uniquement accessible par le prestataire, par lesquelles les logs seront récupérés pour ensuite être transmis au SIEM. Ces facteurs vont entraîner de nombreux changements au sein des organisations et infrastructures mises en place actuellement.</p>
<p>Par ailleurs, la part grandissante du <em>cloud</em> dans les systèmes d’information des entreprises amène une nouvelle complexité : celle de la c<strong>ollecte des logs auprès des fournisseurs</strong><em>.</em> De nouveaux acteurs sont donc apparus dans le marché de la sécurité : <strong>les CASB</strong> (<em>Cloud Access Security Brokers</em>). Leur promesse : répondre aux problématiques de sécurité pour le <em>cloud</em>. Ces entités se situent entre les utilisateurs et les divers services <em>cloud</em> et proposent de nouvelles briques de sécurité telles que l’utilisation d’API pour détecter directement des scenarii de menaces (création de fichiers de journalisation des accès aux applications, implémentation de ces données dans un SIEM…).</p>
<h2>L’objectif de demain : gagner en maturité</h2>
<p>La sécurité opérationnelle a encore <strong>de nombreux défis à relever</strong>. La plupart des entités assurent actuellement l’<strong>hygiène minimum du système d’information</strong> et la maturité des équipes leur permet de se prémunir des menaces diffuses (virus, spam…). Cependant, le dispositif actuel<strong> doit se renouveler</strong> afin de répondre aux nouveaux enjeux liés à la cybersécurité pour pouvoir lutter contre les <strong>menaces opportunistes</strong> (hacker isolé) et <strong>ciblées</strong> (cyber-mafia, gouvernement), plus complexes à détecter.</p>
<p>Dans ce contexte et face aux obligations légales, les SOC ont (et auront) un <strong>rôle très important à jouer</strong> nécessitant une <strong>expertise technique approfondie</strong> ainsi qu’une <strong>intégration avec la sécurité dans les projets.</strong></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2016/08/cybersecurite-lheure-bilan-soc/">Cybersécurité : l’heure du bilan pour les SOC</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Surveillance sécurité : passer du puits de logs au SIEM (security information and event management)</title>
		<link>https://www.riskinsight-wavestone.com/en/2013/11/surveillance-securite-passer-du-puits-de-logs-au-siem-security-information-and-event-management/</link>
		
		<dc:creator><![CDATA[Chadi Hantouche]]></dc:creator>
		<pubDate>Wed, 27 Nov 2013 15:58:17 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[logs]]></category>
		<category><![CDATA[Security Operations Center]]></category>
		<category><![CDATA[SIEM]]></category>
		<category><![CDATA[SOC]]></category>
		<category><![CDATA[supervision]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=4690</guid>

					<description><![CDATA[<p>A l’heure où l’on prend plus que jamais au sérieux les scénarios d’attaques ciblées ou de fuite d’information, les entreprises se heurtent souvent à un manque de visibilité sur ce qu’il se passe au sein même de leur système d’information....</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2013/11/surveillance-securite-passer-du-puits-de-logs-au-siem-security-information-and-event-management/">Surveillance sécurité : passer du puits de logs au SIEM (security information and event management)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>A l’heure où l’on prend plus que jamais au sérieux les scénarios d’attaques ciblées ou de fuite d’information, les entreprises se heurtent souvent à un manque de visibilité sur ce qu’il se passe au sein même de leur système d’information.</em></p>
<p><em>Beaucoup ont donc entamé au cours des 18 derniers mois un projet visant à exploiter les logs (ou journaux d’évènements) afin d’anticiper, détecter et diagnostiquer des actes malveillants.</em></p>
<p><em>L’objectif est ambitieux : on parle d’abord de log management, puis de corrélation des logs à l’aide d’un SIEM (security information and event management) . Quelle réalité derrière ces principes ? Comment les mettre en place ?</em></p>
<h2>Étape 1 : centraliser les journaux</h2>
<p>Une grande majorité de machines (équipements réseau, serveurs, postes de travail), bases de données ou applications d’un SI peuvent aujourd’hui générer des logs. Ces fichiers contiennent, pour chaque machine, la liste de tous évènements qui se sont déroulés : réussite ou échec d’une connexion utilisateur, redémarrage, saturation de la mémoire&#8230;</p>
<p>Pour les exploiter, il est possible de se connecter unitairement à chacun des équipements afin d’y observer l’historique. Cette tâche fastidieuse, encore souvent observée sur le terrain, est irréaliste sur des systèmes d’information complexes. Elle est par ailleurs inefficace pour prévenir un incident ou détecter les impacts en temps réel.</p>
<p>La construction d’un « puits de log » est une première brique de réponse : il s’agit de collecter, à l’aide d’un outil automatisé du marché, l’ensemble des journaux d’équipements dans un espace de stockage unique. L’un des critères de sélection de cet outil est justement sa capacité à reconnaître différents formats de logs (syslog, traps SNMP, formats propriétaires…).</p>
<p>Le volume d’information centralisée peut vite exploser : il est important d’éviter la collecte de données inutiles. Par ailleurs, le système peut également être gourmand en puissance de calcul en fonction des périmètres de recherches effectuées.</p>
<p>On parle de <em>log management</em> à partir du moment où les données contenues dans ce puits sont traitées et exploitées, par exemple pour retrouver un élément dangereux (virus, problème de sécurité…), ou un comportement malveillant (fuite d’information, suppression de données…). Il est nécessaire de cadrer en amont les finalités du projet,  qui peuvent être multiples :</p>
<ul>
<li>Vérifier que les règles du SI sont appliquées</li>
<li>Détecter les attaques ou les utilisations frauduleuses du SI</li>
<li>Permettre les analyses post-incidents (<em>forensics</em>)</li>
<li>Répondre aux contraintes légales ou de conformité avec la capacité de fournir des éléments de preuve</li>
</ul>
<p>Pour démarrer, une bonne pratique consiste à s’orienter principalement vers des logs de sécurité et réseau. Certaines applications métiers sensibles pourront ensuite être ajoutées.</p>
<p>Une fois l’espace de stockage cadré, l’archivage amène son lot de contraintes :</p>
<ul>
<li>D’un point de vue légal et réglementaire, il faut s’assurer de la licéité des traitements en fonction des informations archivées et de leurs durées de rétention. Une déclaration à la CNIL est à prévoir dans de nombreux cas.  En fonction de leur origine (e-mail, proxy, applications), les périodes de rétention ne sont pas soumises aux mêmes règles. À titre d’exemple, on considère aujourd’hui qu’une durée raisonnable pour l’historique des accès des utilisateurs à internet est de 12 mois.</li>
<li>En fonction des traitements et du cadre juridique existant dans l’entreprise (par exemple charte incluant la surveillance…), les collaborateurs doivent potentiellement être informés des mesures mises en place. Dans ce cadre la mobilisation des ressources humaines et des instances représentatives du personnel sont à prévoir.</li>
<li>La gestion des identités et des accès au puits de logs  est, enfin, un sujet crucial. Le volume et la sensibilité des informations qui y sont stockées nécessite d’identifier précisément les personnes habilitées à en faire usage, et de limiter strictement leurs droits au périmètre qui leur incombe. Toute modification des traces doit être interdite (même aux administrateurs),  afin que celles-ci puissent avoir une valeur probante le cas échéant.</li>
</ul>
<h2><span style="font-size: large;">Étape 2 : faciliter l’analyse, du SIEM au Big Data</span></h2>
<p>Si des recherches manuelles sont toujours possibles dans un puits de logs, elles ne répondent qu’à un besoin précis et ponctuel.</p>
<p>Pour obtenir une analyse en temps réel avec des remontées d’alertes automatiques, il est nécessaire de passer à l’étape supérieure : le SIEM. Il s’agit à la fois d’une extension et d’une industrialisation de la première étape, souvent offerte par le même outil du marché.</p>
<p>Il s’agit ici de rechercher, à travers les traces, des liens entre des évènements unitaires ayant lieu sur différents éléments du SI, afin d’anticiper, bloquer (en temps réel) ou comprendre une action malveillante.  On parle alors de <em>corrélation de logs</em>.</p>
<p>Pour cela, il est important de définir les types de comportement anormaux à identifier. C’est la principale difficulté : un niveau de sensibilité trop élevé génèrera beaucoup d’alertes sans intérêt, tandis qu’un niveau trop faible ne permettra pas de lever les alertes pertinentes. Cette étape comporte donc une phase d’ajustement et apprentissage qui peut durer plusieurs mois.</p>
<p>Aujourd’hui le marché des SIEM se renouvelle : les solutions sont de plus en plus performantes, utilisent de nouvelles techniques de détection d’attaque, et exploitent de plus en plus la puissance de calcul du Cloud pour la corrélation d’évènements.</p>
<p>Le marché voit également arriver<a title="Outillage sécurité : la ruée vers le Big Data est en cours" href="http://www.solucominsight.fr/2013/02/outillage-securite-la-ruee-vers-le-big-data-est-en-cours/"> des outils utilisant les principes du Big Data</a>. Plutôt que de rechercher des scénarios connus, l’idée est alors de détecter des anomalies statistiques dans la masse d’information. Cette approche séduisante doit encore être mise à l’épreuve du terrain.</p>
<h2> <span style="font-size: large;">Ne pas négliger les aspects organisationnels</span></h2>
<p>Enfin, il est nécessaire de s’assurer que les alertes seront traitées par les équipes compétentes. Les procédures et l’organisation associées doivent donc embarquer les équipes sécurité (SOC/CERT), réseau et système et le RSSI. Des réflexions autour de l’externalisation ou de l’internalisation de ces fonctions de surveillance et des liens avec les entités en charge de la gestion des incidents de sécurité sont également essentielles.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2013/11/surveillance-securite-passer-du-puits-de-logs-au-siem-security-information-and-event-management/">Surveillance sécurité : passer du puits de logs au SIEM (security information and event management)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Le paradoxe des projets de Data Leak Prevention (DLP) : une problématique clé, des solutions matures… mais une mise en œuvre qui fait encore peur</title>
		<link>https://www.riskinsight-wavestone.com/en/2013/03/le-paradoxe-des-projets-de-data-leak-prevention-dlp-une-problematique-cle-des-solutions-matures-mais-une-mise-en-oeuvre-qui-fait-encore-peur/</link>
		
		<dc:creator><![CDATA[Ali Fawaz]]></dc:creator>
		<pubDate>Thu, 28 Mar 2013 13:14:18 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Métiers - Stratégie & projets IT]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[DLP]]></category>
		<category><![CDATA[données]]></category>
		<category><![CDATA[fuite de données]]></category>
		<category><![CDATA[gestion des identités]]></category>
		<category><![CDATA[SOC]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=3598</guid>

					<description><![CDATA[<p>L’évolution des menaces et de la réglementation pousse les entreprises à être de plus en plus attentives à leurs données et à orienter les protections sur ce périmètre. Les solutions de prévention contre la fuite d’information, ou DLP, apportent des...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2013/03/le-paradoxe-des-projets-de-data-leak-prevention-dlp-une-problematique-cle-des-solutions-matures-mais-une-mise-en-oeuvre-qui-fait-encore-peur/">Le paradoxe des projets de Data Leak Prevention (DLP) : une problématique clé, des solutions matures… mais une mise en œuvre qui fait encore peur</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>L’évolution des menaces et de la réglementation pousse les entreprises à être de plus en plus attentives à leurs données et à orienter les protections sur ce périmètre. Les solutions de prévention contre la fuite d’information, ou DLP, apportent des éléments de réponses à leur problématique. Pour autant, si le besoin semble réel et les solutions matures, les retours d’expérience restent limités par rapport à ce que l’on pourrait attendre.</em></p>
<h2>Un apport des DLP complémentaire à la lutte contre l’intrusion et au contrôle d’accès</h2>
<p>Une fuite d’information peut provenir de trois sources différentes. L’attaquant externe est souvent celui qui vient à l’esprit en premier. Cependant, l’expérience montre que ce sont les utilisateurs internes, autorisés ou non, qui font fuir le plus d’information.</p>
<p>Suivant la position de celui qui fait fuir l’information, trois grandes étapes peuvent être enchaînées : intrusion, accès à l’information, diffusion de l’information – dont la nécessité dépend des accès initiaux de l’acteur à l’origine de la fuite d’information. À chacune de ces étapes, des solutions de sécurité permettant de réduire le risque existent.</p>
<p><a href="http://www.solucominsight.fr/2013/03/le-paradoxe-des-projets-de-data-leak-prevention-dlp-une-problematique-cle-des-solutions-matures-mais-une-mise-en-oeuvre-qui-fait-encore-peur/role-dlp/" rel="attachment wp-att-3604"><img loading="lazy" decoding="async" class="alignnone  wp-image-3604" title="rôle DLP" src="http://www.solucominsight.fr/wp-content/uploads/2013/03/rôle-DLP-.jpg" alt="" width="631" height="308" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2013/03/rôle-DLP-.jpg 902w, https://www.riskinsight-wavestone.com/wp-content/uploads/2013/03/rôle-DLP--392x191.jpg 392w, https://www.riskinsight-wavestone.com/wp-content/uploads/2013/03/rôle-DLP--71x35.jpg 71w" sizes="auto, (max-width: 631px) 100vw, 631px" /></a></p>
<p>Il convient d’agir à toutes les étapes d’une fuite d’information en s’appuyant sur des mesures allant de la sécurité physique aux solutions de <em>Digital Right Management</em> (DRM), en passant par le chiffrement de flux, le cloisonnement, ou encore la gestion des accès et des habilitations…</p>
<p>Si de telles mesures sont déjà mises en œuvre,<strong> les outils de DLP permettent alors essentiellement de se prémunir contre des erreurs ou malveillances d’utilisateurs ayant un accès légitime à l’information</strong>. En ce sens, ils permettent d’apporter<strong> une protection au plus proche de la donnée</strong>.</p>
<h2>Des solutions fonctionnellement matures</h2>
<p>Les mécanismes de contrôle des DLP sont mis en œuvre à travers des <strong>règles ou politiques centralisées</strong> permettant d’analyser les traitements faits sur la donnée quelle que soit sa nature ou son support.</p>
<p><a href="http://www.solucominsight.fr/2013/03/le-paradoxe-des-projets-de-data-leak-prevention-dlp-une-problematique-cle-des-solutions-matures-mais-une-mise-en-oeuvre-qui-fait-encore-peur/fonctionnement-dlp/" rel="attachment wp-att-3605"><img loading="lazy" decoding="async" class="alignnone  wp-image-3605" title="Fonctionnement DLP" src="http://www.solucominsight.fr/wp-content/uploads/2013/03/Fonctionnement-DLP.jpg" alt="" width="572" height="368" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2013/03/Fonctionnement-DLP.jpg 954w, https://www.riskinsight-wavestone.com/wp-content/uploads/2013/03/Fonctionnement-DLP-297x191.jpg 297w, https://www.riskinsight-wavestone.com/wp-content/uploads/2013/03/Fonctionnement-DLP-61x39.jpg 61w" sizes="auto, (max-width: 572px) 100vw, 572px" /></a></p>
<p>Grâce à des <strong>agents déployés sur le réseau et/ou sur les postes de travail</strong>, le DLP va pouvoir empêcher la copie d’un fichier sur un périphérique externe, l’envoi d’un document sensible par email, l’impression d’un document ou encore la publication d’une information confidentielle sur les réseaux sociaux.</p>
<p>Après analyse et filtrage des données par la solution DLP, différentes mesures de prévention peuvent être prises, avec un impact plus ou moins élevé pour l’utilisateur : alertes, demande de justification, blocage…</p>
<p>Enfin, il convient de noter que les acteurs du marché mettent de plus en plus l’accent sur le contexte d’utilisation de la donnée. Certains éditeurs proposent ainsi des fonctionnalités de gouvernance au sein de leur solution de DLP permettant par exemple de <strong>savoir exactement où se trouvent les données sensibles et qui y a accès</strong>.</p>
<p><strong>Le marché des DLP est donc de plus en plus mature</strong> : la couverture fonctionnelle proposée est élevée et évolutive, la gestion de l’impact sur les collaborateurs de plus en plus souple. <strong>Néanmoins, les retours d’expérience restent limités par rapport à ce que l’on pourrait attendre</strong>.</p>
<p>La raison de ce paradoxe vient du fait que <strong>les métiers sont trop souvent insuffisamment impliqués dans les projets de DLP, alors même que ces projets n’ont que peu de chance d’aboutir sans eux, en particulier vu le volet RH nécessairement associé</strong>.</p>
<h2>Adopter une approche par les résultats pour mobiliser les métiers</h2>
<p><strong>Il est illusoire de vouloir protéger toutes ses données dans tous les cas d’usage imaginables</strong>. Une approche purement technique visant un périmètre exhaustif n’a que peu de chance de convaincre, particulièrement dans la conjoncture économique actuelle.</p>
<p><strong>Une approche par les résultats</strong> mêlant ciblage précis, démarche outillée, accompagnement et visibilité est donc à favoriser dès la sélection de la solution. Une fois les objectifs atteints sur un périmètre prioritaire, on peut envisager de l’élargir.</p>
<p>La première étape, primordiale, est donc <strong>la définition du périmètre prioritaire de données à protéger et des cas d’usage fonctionnels à traiter</strong>. Identifier les<strong> dix données les plus critiques, s’appuyer sur des situations fonctionnelles avérées</strong>, commencer par un nombre limités de supports pour réduire les aléas techniques sont autant de facteurs clés de succès.</p>
<p>La <strong>définition des processus de surveillance</strong> (politiques d’interaction avec les utilisateurs, processus en cas d’alerte…) ne doit également pas être négligée. Sur ce volet, et dès le début du projet, il est important de mobiliser les fonctions RH de l’entreprise pour valider le mode de mise en œuvre de la démarche DLP (alerte, blocage, journalisation…), construire les processus de gouvernance associés et au final envisager un passage devant les instances représentatives du personnel.</p>
<p>Lorsque le <strong>cadrage global du périmètre fonctionnel</strong> est effectivement achevé, la phase de sélection de la solution peut être entamée. Une démarche outillée impliquant la <strong>réalisation d’une maquette est indispensable</strong> pour s’assurer de l’adéquation de la solution aux cas d’usages fonctionnels identifiés et <strong>évaluer les résultats envisageables</strong>.</p>
<p>En cas de résultats satisfaisants, un déploiement progressif est à envisager avec un leitmotiv : la sensibilisation des utilisateurs.</p>
<p>Enfin, en mode récurrent, <strong>l’intégration à un SOC</strong> (Security Operation Center) peut permettre de bénéficier de la maturité de la gestion opérationnelle de la sécurité pour optimiser la surveillance d’une part et l’accompagnement et la visibilité fournis aux métiers d’autre part.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2013/03/le-paradoxe-des-projets-de-data-leak-prevention-dlp-une-problematique-cle-des-solutions-matures-mais-une-mise-en-oeuvre-qui-fait-encore-peur/">Le paradoxe des projets de Data Leak Prevention (DLP) : une problématique clé, des solutions matures… mais une mise en œuvre qui fait encore peur</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
