top of page

Enhanced Security Measures by Vijay in September 2012

  • Writer: Pavan Raja
    Pavan Raja
  • Apr 8, 2025
  • 4 min read

Summary:

This document outlines three key methods for improving security monitoring in an organization using ArcSight Enterprise Security Manager (ESM): 1. **Security Event Understanding**: It highlights the importance of identifying users' roles and authorization levels when they access sensitive files, such as top secret ones. For instance, John Doe, identified as a Senior Architect working in the Government Initiatives department, is authorized to handle top-secret information. This understanding helps in monitoring user activities effectively. 2. **Actor Model Import Connectors**: The document emphasizes the need to import and update user profiles (actors) from various sources like Active Directory and Oracle IDM into ESM. These profiles should be real-time, reflecting changes such as new hires, terminations, or role shifts, ensuring a comprehensive view of user activities in relation to security policies. 3. **Enhancing Security Monitoring with Actors**: By linking identified actors to specific events like accessing top-secret files on particular hosts (e.g., 10.0.26.9), organizations can gain insights into who is interacting with sensitive data, where these interactions occur, and what type of information they are handling. This contextual understanding aids in making informed decisions about access controls and security policies. The document also briefly touches on related topics such as host details (e.g., HQ, 10.0.26.9), vulnerability assessment, and the integration of asset information with security monitoring tools to enhance overall security posture.

Details:

This document discusses three ways to enhance security monitoring in an organization using the ArcSight Enterprise Security Manager (ESM). The agenda includes understanding and utilizing security events, importing connectors for actors, and incorporating context into security events. 1. **Security Event Understanding**: A typical security event involves a user accessing a sensitive file, such as a top secret one. To enhance monitoring, it is crucial to identify who the user is, which department they belong to, and their authorization level. For example, in the case of john.doe, he is identified as a Senior Architect working in the Government Initiatives department and authorized to access top-secret files. 2. **Actor Model Import Connectors**: To improve security monitoring, it's essential to import user profiles (actors) into ESM from various sources like Active Directory, Oracle IDM, and other databases. These profiles should be updated in real time for new hires, terminations, or role changes. This integration allows for a more comprehensive view of user activities and compliance with security policies. 3. **Enhancing Security Monitoring with Actors**: By linking the identified actors to specific events such as accessing top-secret files on particular hosts (like 10.0.26.9), organizations can gain deeper insights into who is interacting with sensitive data, where these interactions are taking place, and what type of information they are handling. This contextual understanding helps in making informed decisions about access controls and security policies. Overall, the document emphasizes the importance of integrating real-time user profiles with event monitoring to improve security posture by providing a detailed view of user activities, their roles, and the assets they interact with. This document discusses the integration of asset information and security monitoring in a system called Enhanced Security Monitoring (ESM). It covers various aspects including host details, vulnerability assessment, security events, and user activities. The scenario provided is an example where a user named john.doe accessed a top-secret file on a specific host. Here's the summarized content: 1. **Host Information**: Assets are imported with details such as host name (HQ), IP address (10.0.26.9), and MAC address. The system automatically assigns location (Headquarters) and network zone, categorizes assets, and updates real-time information on new or changed assets. 2. **Vulnerability Assessment**: The example provided does not mention any specific vulnerabilities associated with the host in question. 3. **Security Events**: A security event is described where john.doe accessed a top-secret file from an IP address (xxx.78.195.166). This information is used to track user activities and potential threats originating from unknown sources. 4. **Security Monitoring Enhancement**: The system enhances monitoring with details about the actor (john.doe), their role (Senior Architect), location (Headquarters), category (Government Initiatives, NASA’s mission to Mars), and confirms there are no vulnerabilities present in the host. 5. **Model Import Connector for RepSM**: This connector imports data from Reputation Digital Vaccine (RepDV) into ESM, which monitors internet reputation for potential threats. Overall, this documentation focuses on managing assets efficiently within a security framework by tracking and updating asset information and monitoring activities that pose potential risks to sensitive data. This document outlines the functionality and features of HP TippingPoint's Security Intelligence Feed, Reputation Security Monitor (RepSM), and its integration with other security tools like Enterprise Security Manager (ESM). The feed provides a real-time update on malicious IP addresses, domains, categorizes them by severity, and calculates threat scores. It also includes details about user actions such as file access incidents described in the 'Security Event' section, where john.doe attempted to access a top secret file from an external source using an IP address xxx.78.195.166. This incident is identified as an abuse and misuse threat type with an 80% score. The document also highlights how security monitoring can be enhanced by incorporating actors, assets, and data from RepSM to provide a more comprehensive view of potential threats and vulnerabilities.

Disclaimer:
The content in this post is for informational and educational purposes only. It may reference technologies, configurations, or products that are outdated or no longer supported. If there are any comments or feedback, kindly leave a message and will be responded.

Recent Posts

See All
Zeus Bot Use Case

Summary: "Zeus Bot Version 5.0" is a document detailing ArcSight's enhancements to its Zeus botnet detection capabilities within the...

 
 
 
Windows Unified Connector

Summary: The document "iServe_Demo_System_Usage_for_HP_ESP_Canada_Solution_Architects_v1.1" outlines specific deployment guidelines for...

 
 
 

Comments


@2021 Copyrights reserved.

bottom of page