LTS Secure SOC BOX: GPG 13 Cyber Security Compliance Management
For organizations with limited budgets, small IT & Security teams & competing priorities, being compliant with Good Practice Guide (GPG) 13’s twelve Protective Monitoring Controls (PMC) can be a challenging task.
In order to succeed, organizations need to centralize, automate & simplify their security controls and data analysis, so as to quickly identify threats targeting their network & prioritize their response.
LTS Secure SOC BOX has been developed specifically for IT & Security teams with limited resources, so that they can proactively monitor their network, thus achieving GPG 12 compliance.
Integrated threat intelligence keeps you up-to-date with emerging threats, alerting you of such attacks on your environment.
LTS Secure SOC BOX integrated approach helps you:-
- Built-in security controls help gain operational insight.
- Identify people accessing your sensitive data.
- Manage analysis, configuration & reporting with one stack.
- Predefined correlation helps detect relevant events across your network.
- Respond to threats quickly & more effectively.
How LTS Secure SOC BOX Covers All Protective Monitoring Controls
PMC Requirement |
Relevant SOC BOX Capabilities |
Examples of How LTS Secure SOC BOX Helps |
1. Accurate timestamp in logs Provide a means to ensure that accounting and auditing logs record accurate timestamps. |
Aware
|
· All of the necessary “Aware” recording requirements are satisfied within the SOC BOX solution. · LTS Secure Logger preserves the integrity of all audit logs collected, and timestamps each audit log, as well as any alerts that are generated related to the audit log. |
|
Deter
|
· All of the necessary “Deter” recording requirements are satisfied within the SOC BOX solution. · Built-in host-based IDS alerts on policy violations such as failed access attempts to files on critical systems. · Built-in file integrity monitoring captures anomalous changes to critical files and file systems such as access rights modifications, software configuration, and changes to storage volumes. · Additionally, SOC BOX alerts when an attached device (e.g. USB drive) connects to a monitored host.
|
|
Detect and Resist
|
· All of the necessary “Detect and Resist” recording requirements are satisfied within the SOC BOX solution. · LTS Secure Logger preserves the integrity of all audit logs collected, which includes a digital signature, hash code and checksum. · Additionally, the original audit log is retained. |
|
Defend
|
· All of the necessary “Defend” recording requirements are satisfied within the SOC BOX solution. · LTS Secure Logger preserves the integrity of all audit logs collected, which includes a digital signature, hash code and checksum. · Additionally, the original audit log is retained. |
2. Recording relating to business traffic crossing a boundary Define a set of Alerts and Reports that will identify authorized vs. non-authorized business traffic across the network boundary. This requires the ability to identify authorized vs. non-authorized traffic, transportation of malicious code is prevented and alerted, and the identification of the manipulation of other business traffic. |
Aware
|
· All of the necessary “Aware” recording requirements are satisfied within the SOC BOX solution. · LTS Secure built-in IDS (network and host-based) will report and alert on detected malware—wherever it is on the network. |
|
Deter
|
· All of the necessary “Deter” recording requirements are satisfied within the SOC BOX solution. · Provided the gateway firewall or filtering proxy is configured properly, SOC BOX will report and alert on blocked activities and failed file imports and exports. |
|
Detect and Resist
|
· All of the necessary “Detect and Resist” recording requirements are satisfied within the SOC BOX solution. · Provided the gateway firewall or filtering proxy is configured properly, SOC BOX will report and alert on blocked activities and failed file imports and exports—through the correlation of the firewall/ proxy logs. · Additionally, any accepted incoming and outgoing file transfers and web activity will also generate alerts and can be investigated. |
|
Defend
|
· All of the necessary “Defend” recording requirements are satisfied within the SOC BOX solution. · Provided the gateway firewall or filtering proxy is configured properly, SOC BOX will report and alert on blocked activities and failed file imports and exports—through correlation of the firewall/proxy logs. · Additionally, any accepted incoming and outgoing file transfers and web activity will also generate alerts and can be investigated. |
3. Recording relating to suspicious activity at a boundary Define a set of alerts and Reports that will identify suspicious network traffic crossing the network boundary. |
Aware
|
· Provided the firewall is configured properly, SOC BOX will report and alert on all deny or dropped packets from the firewall. |
|
Deter
|
· All of the necessary “Deter” recording requirements are satisfied within the SOC BOX solution. · Quickly identify and isolate suspicious network traffic leveraging built-in security controls such as IDS, Netflow analysis, event correlation, and log analysis. · Additionally, dynamic incident response templates provide customized guidance for each alert. |
|
Detect and Resist
|
· All of the necessary “Detect and Resist” recording requirements are satisfied within the SOC BOX solution. · Specifically, enabling sniffing on the LTS Secure Sensor will provide full packet capture for in-depth network flow analysis and granular event correlation. |
|
Defend
|
· All of the necessary requirements for the lower recording profiles are satisfied with the SOC BOX solution. · Specifically, reports and alerts can be easily set up to fire for all automated responses at the network boundary. |
4. Recording of workstation, server or device status Define a set of Alerts and Reports that will identify configuration and status changes on internal workstations, servers and network devices. |
Aware
|
· All of the necessary “Aware” recording requirements are satisfied within the SOC BOX solution. · Quickly identify and isolate malware outbreaks throughout your network leveraging built-in security controls such as host-based IDS, Netflow analysis, event correlation, and log analysis. |
|
Deter
|
· All of the necessary “Deter” recording requirements are satisfied within the SOC BOX solution. · Built-in host-based IDS alerts on policy violations such as failed access attempts to files on critical systems. · Additionally, built-in file integrity monitoring captures anomalous changes to critical files and file systems such as access rights modifications, software configuration, and changes to storage volumes. |
|
Detect and Resist
|
· All of the necessary “Detect and Resist” recording requirements are satisfied within the SOC BOX solution. · Built-in host-based IDS and file integrity monitoring technologies alert on critical changes to system files and folders. · These changes may include configuration changes as well as changes to key processes, critical for service availability monitoring and management. |
|
Defend
|
· All of the necessary “Defend” recording requirements are satisfied within the SOC BOX solution. · Built-in host-based IDS and file integrity monitoring technologies alert on critical changes to system files and folders. |
5. Recording relating to suspicious internal network activity Define a set of Alerts and Reports that will identify suspicious activity across internal network boundaries from either internal or external agents. |
Aware
|
· All of the necessary “Aware” recording requirements are satisfied within the SOC BOX solution. · Provided the firewall is configured properly, SOC BOX will report and alert on all deny or dropped packets from the firewall. |
|
Deter
|
· All of the necessary “Deter” recording requirements are satisfied within the SOC BOX solution. · Provided the firewall is configured properly, SOC BOX will report and alert on all necessary activities for the “Deter” recording profile. · Specifically, SOC BOX will report and alert on error messages, authentication failures, user sessions, and rule base changes on firewalls and network devices. · Additionally, these activities can be correlated against other relevant data to provide a full picture of suspicious network activity. |
|
Detect and Resist
|
· All of the necessary “Detect and Resist” recording requirements are satisfied within the SOC BOX solution. · Provided the firewall is configured properly, SOC BOX will report and alert on all necessary activities for the “Detect and Resist” recording profile. · Specifically, our built-in threat detection and behavioral monitoring technologies are combined with event correlation rules to provide the security intelligence needed to identify suspected internal attacks. |
|
Defend
|
· All of the necessary “Defend” recording requirements are satisfied within the SOC BOX solution. · Specifically, enabling sniffing on the LTS Secure Sensor will provide full packet capture for in-depth network flow analysis and granular event correlation.
|
6. Recording relating to network connections Define a set of Alerts and Reports that will identify temporary connections to the network, such as those made via a VPN or wireless connection. |
Aware
|
· All of the necessary “Aware” recording requirements are satisfied within the SOC BOX solution. · Built-in log management and event correlation enables the collection and analysis of valid and invalid authentication attempts to VPN and other network devices. · Other activities such as DHCP assignments, remote access user sessions, and changes to VPN node registrations are also logged and collected. |
|
Deter
|
· All of the necessary “Deter” recording requirements are satisfied within the SOC BOX solution. · Specifically, failed connection attempts and authentication failures are captured and securely logged via LTS Secure Logger. |
|
Detect and Resist
|
· All of the necessary “Detect and Resist” recording requirements are satisfied within the SOC BOX solution. · Additionally, built-in log management records commands issued on network connection consoles and dynamic incident response templates provide the detailed remediation steps needed for any internal or external attack activity. Finally, status changes to IDS signatures are also logged. |
|
Defend
|
· All of the necessary “Defend” recording requirements are satisfied within the SOC BOX solution. |
7. Recording on session activity by user and workstation Define a set of Alerts and Reports that will identify suspect user activity or allow forensic analysis of user activity within the network. |
Aware
|
· All of the necessary “Aware” recording requirements are satisfied within the SOC BOX solution. · LTS Secure’s built-in log management and event correlation engine collects, correlates and analyses logs from directory servers, Windows and Unix servers, and other devices to capture the full context of user activity. |
|
Deter
|
· All of the necessary “Deter” recording requirements are satisfied within the SOC BOX solution. · Specifically, user account activity such as lockouts, transactions, and escalation of privilege will signal alerts. |
|
Detect and Resist
|
· All of the necessary “Detect and Resist” recording requirements are satisfied within the SOC BOX solution. · Specifically, user account and administration activities such as session activity, changes on critical workstations, local user account and group membership changes as well as network commands will produce alerts and can be displayed in dashboard views and reports. |
|
Defend
|
· All of the necessary “Defend” recording requirements are satisfied within the SOC BOX solution. · Specifically, user transactions and critical commands and executable are logged, and these events are processed and analyzed by LTS Secure’s event correlation engine to produce alerts and user activity reports. |
8. Recording of data backup status Ensure a backup and recovery process is defined and adhered to, such that business can be confident of integrity and availability of the network resources. |
Aware
|
· All of the necessary “Aware” recording requirements are satisfied within the SOC BOX solution. · Notably, as long as backup, test and recovery operations are logged then SOC BOX server can produce alerts when failures occur. |
|
Deter
|
All of the necessary “Deter” recording requirements are satisfied within the SOC BOX solution. |
|
Detect and Resist
|
All of the necessary “Detect and Resist” recording requirements are satisfied within the SOC BOX solution. |
|
Defend
|
· All of the necessary “Defend” recording requirements are satisfied within the SOC BOX solution. · Specifically, as long as backup, test, and recovery operations (including catalog details, etc.) are logged, then SOC BOX server can produce alerts if any failure occurs during these operations. |
9. Alerting critical events Define a set of real-time Alerts and Reports that will identify events classified as “Critical” by the organization.
|
Aware
|
· All of the necessary “Aware” recording requirements are satisfied within the SOC BOX solution. · Built-in asset discovery, vulnerability assessment, threat detection and behavioral monitoring data provide a rich set of environmental information to be analyzed by LTS Secure’s SIEM and event correlation engine. |
|
Deter
|
· All of the necessary “Deter” recording requirements are satisfied within the SOC BOX solution. · LTS Secure supports secondary delivery mechanisms for alerts such as email and will report on changes to the alert rule base. |
|
Detect and Resist
|
· All of the necessary “Detect and Resist” recording requirements are satisfied within the SOC BOX solution. · LTS Secure’s all-in-one console provides flexible dashboards and reporting views to ensure prioritized follow-up to all alerts. |
|
Defend
|
· All of the necessary “Defend” recording requirements are satisfied within the SOC BOX solution. · Specifically, sending alerts to multiple destinations is fully supported by LTS Secure’s SIEM. |
10. Reporting on the status of the audit system Define a set of Alerts and Reports that will allow confidence in the integrity of the auditing system, such that the output of this system can be relied upon in a court of law. |
Aware
|
· All of the necessary “Aware” recording requirements are satisfied within the SOC BOX solution. · SOC BOX will report on status of active log storage, total record count, and other details regarding space available and usage metrics. |
|
Deter
|
· All of the necessary “Deter” recording requirements are satisfied within the SOC BOX solution. · Specifically, LTS Secure’s Logger preserves the integrity of all audit logs collected to prove chain of custody and the SIEM engine provides the full source and origin information for each event log collected and analyzed. · Trending and graphical reports are available through SOC BOX management console. |
|
Detect and Resist
|
· All of the necessary “Detect and Resist” recording requirements are satisfied within the SOC BOX solution. · Specifically, LTS Secure’s Logger preserves the integrity of all audit logs collected, and alerts on any failures that are generated related to the audit log. · Additionally, the SOC BOX solution will also report on log access requests and provides easy online searches for all archived raw log data. |
|
Defend
|
· All of the necessary “Defend” recording requirements are satisfied within the SOC BOX solution. |
11. Production of sanitized and statistical management reports Define a set of Reports that will provide feedback to management on the performance of the Protective Monitoring system effectiveness. |
Aware
|
· All of the necessary “Aware” recording requirements can be satisfied within the SOC BOX solution. · Specifically, the 100+ built-in reports can be easily customized to anonymise specific information. |
|
Deter
|
· All of the necessary “Deter” recording requirements can be satisfied within the SOC BOX solution. · For example, customizing the built-in reports, templates, and dashboards can provide the specific views required for your management team. |
|
Detect and Resist
|
· All of the necessary “Detect and Resist” recording requirements can be satisfied within the SOC BOX solution. · SOC BOX combines built-in security controls such as IDS, log management, Netflow analysis, file integrity monitoring, and vulnerability assessment to provide complete protective monitoring. |
|
Defend
|
While SOC BOX provides all of the built-in essential security controls necessary for protective monitoring, our open API allows for easy integration with additional data sources from other security vendors. |
12. Providing a legal framework for Protective Monitoring activities Define a requirement that will ensure all monitoring is conducted in a legal manner, and that the collected data is, in itself, protected and treated as sensitive data. |
Deter
|
This requirement is more of a procedural one than one that can be satisfied with technology alone. However, SOC BOX can track user activity to verify compliance with network usage terms and conditions. |
|
Detect and Resist
|
This requirement is more of a procedural one than one that can be satisfied with technology alone. However, SOC BOX can track user activity to verify compliance and re-affirmation with network usage terms and conditions. |
|
Defend
|
This requirement is more of a procedural one than one that can be satisfied with technology alone. However, SOC BOX can track user activity to verify compliance and re-affirmation with network usage terms and conditions. |
ABOUT US
LTS Secure offers Security Suite to rationalize, prioritize & automate response to risks in your environment. Comprehensive Cyber Security Solutions with continuous monitoring at all layers of the IT stack: network packets, flows, OS activities, content, user behaviors and application transactions.