NERC CIP Requirement
|
LTS Secure SOC BOX Capabilities
|
Benefits of SOC BOX
|
Security Management Controls
|
- Asset Discovery & Management
- Vulnerability Assessment
- Network Intrusion Detection (NIDS)
- Host Intrusion Detection (HIDS)
- File Integrity Monitoring (FIM)
- Event Correlation
- Behavioral Monitoring
- Services Monitoring
- Log Management
|
- Provides continuous capture and real-time monitoring of a broad range of data, including: events, asset data, configuration data, vulnerability data and network traffic.
- HIDS monitors systems with highly sensitive data to ensure data integrity, availability and confidentiality.
- NIDS detects malicious traffic on your on-premises infrastructure.
- File Integrity Monitoring (FIM) alerts on changes to critical files which could signal a compromised system.
- Event correlation links disparate events to alert you of attacks in progress, such as unauthorized access followed by privilege escalation followed by communication with C&C servers.
- SOC BOX identifies the most significant threats targeting your network with timely, relevant threat intelligence that provides every detail you need in the alarm: what’s being attacked, who is the attacker, what is their objective, and how to respond.
|
Information Protection
|
- Asset Discovery & Management
- Vulnerability Assessment
- Network Intrusion Detection (NIDS)
- Host Intrusion Detection (HIDS)
- File Integrity Monitoring (FIM)
- Event Correlation
- Behavioral Monitoring
- Executive Dashboards and Reports
- Log Management
|
- Built-in, automated vulnerability assessment identifies the use of weak and default passwords.
- Built-in Host intrusion detection (HIDS) and File Integrity Monitoring will signal when password files and other critical system files have been modified.
- Group assets quickly based on range of criteria including hardware type (e.g., servers and firewalls), software (mission-critical apps) or data type (e.g., sensitive information).
- Unified event correlation connects critical, yet related events across systems such as a password change followed by exfiltration of data from the same device.
- Built-in network flow analysis monitors on-premises network traffic and protocols to identify anomalous activity and policy violations.
- Event correlation rules provide the situational awareness needed to identify potential data exfiltration.
- Integrated threat intelligence provides every detail you need in the alarm: what’s being attacked, who is the attacker, what is their objective, and how to respond.
- Flexible data search and analytics to create custom views and to report quickly.
|
Risk-Based Assessment of Bulk Electric Systems (BES) Cyber Systems
|
- Asset Discovery & Management
- Vulnerability Assessment
- Network Intrusion Detection (NIDS)
- Host Intrusion Detection (HIDS)
- Event Correlation
- Behavioral Monitoring
- Executive Dashboards and Reports
- Log Management
|
- Automatically discover all assets via built-in asset discovery—highlight high, medium, and low impact BES Cyber Systems assets based on available services, configuration, and traffic generated.
- Identify and enumerate services running on each asset, as well as configuration details and other critical information.
- Validate effectiveness of layered controls and processes through built-in essential security capabilities such as asset discovery, vulnerability assessment, intrusion detection, log management and more.
- Flexible data search and analytics to create custom views and to report quickly.
|
Configuration Change Management and Vulnerability Assessments
|
- Asset Discovery & Management
- Vulnerability Assessment
- Network Intrusion Detection (NIDS)
- Host Intrusion Detection (HIDS)
- File Integrity Monitoring (FIM)
- Event Correlation
- Threat Intelligence
|
- Built-in asset discovery provides dynamic inventory of all devices on the network and software installed.
- Continuous vulnerability monitoring identifies all vulnerabilities targeting critical systems, servers, applications and network devices.
- File Integrity Monitoring alerts on changes to critical files which could signal a threat.
- Built-in service availability monitoring detects critical service interruptions or misconfigurations that could signal a threat.
- Integrated threat intelligence provides every detail you need in the alarm: what’s being attacked, who is the attacker, what is their objective, and how to respond.
- Unified controls for scheduling scans, identifying vulnerabilities and investigating incidents.
|
Incident Reporting and Response Planning
|
- Asset Discovery & Management
- Vulnerability Assessment
- Network Intrusion Detection (NIDS)
- Host Intrusion Detection (HIDS)
- File Integrity Monitoring (FIM)
- Event Correlation
- Threat Intelligence
- Log Management
|
- Built-in asset discovery, vulnerability assessment, intrusion detection, behavioral monitoring — accelerates the incident response process.
- Unified log review and analysis, with triggered alerts for high risk systems.
- Customized, action-oriented alerts which tell you exactly what to do next when responding to incidents.
- Integrated threat intelligence provides every detail you need in the alarm: what’s being attacked, who is the attacker, what is their objective, and how to respond.
|
Electronic Security Perimeters Including Interactive Remote Access
|
- Ability to Integrate Data from any 3rd Party Data Sources
- Vulnerability Assessment
- Network Intrusion Detection (NIDS)
- Host Intrusion Detection (HIDS)
- File Integrity Monitoring (FIM)
- Event Correlation
- Behavioral Monitoring
- Threat Intelligence
- Log Management
|
- Extensive plugin library for integrating security event data from existing systems and applications.
- Continuous vulnerability monitoring will identify any misconfigurations that would expose internal systems to external access.
- Built-in network IDS detect attacks against perimeter devices as well as malicious traffic inside the on-premises perimeter.
- Unified traffic analysis and event correlation monitors traffic and issues alerts on policy violations and incidents including breach of network perimeter security controls.
- Group assets quickly based on range of criteria including hardware type (e.g., servers and Firewalls), software (mission-critical apps) or data type (e.g., sensitive information).
- SOC BOX identifies the most significant threats targeting your environment with timely, relevant threat intelligence that provides every detail you need in the alarm: what’s being attacked, who is the attacker, what is their objective, and how to respond.
|
Physical Security of BES Cyber Systems
|
- Asset Discovery & Management
- Vulnerability Assessment
- Network Intrusion Detection (NIDS)
- Host Intrusion Detection (HIDS)
- File Integrity Monitoring (FIM)
- Event Correlation
- Threat Intelligence
- Log Management
|
- Built-in and automated asset discovery will identify all IP-enabled physical security systems (e.g., card key / proximity card devices, authentication devices, or IP cameras).
- The USM Appliance Logger will record all physical security access events logged by physical security systems for correlation with other logical systems (access to servers in data center).
- Ability to create custom alarms to identify attacks against physical security devices and systems Alerts you whenever a user inserts a device into a USB port on a system you’re monitoring to detect unauthorized activity that can lead to data theft.
|