3 options
Ultimate Splunk for Cybersecurity : Practical Strategies for SIEM Using Splunk's Enterprise Security (ES) for Threat Detection, Forensic Investigation, and Cloud Security (English Edition) / Jit Sinha.
- Format:
- Book
- Author/Creator:
- Sinha, Jit, author.
- Language:
- English
- Subjects (All):
- Computer networks--Security measures.
- Computer networks.
- Computer security.
- Computer viruses.
- Cryptography.
- Physical Description:
- 1 online resource (273 pages)
- Edition:
- First edition.
- Place of Publication:
- Delhi : Orange Education Pvt Ltd, [2024]
- Summary:
- The Ultimate Splunk for Cybersecurity is your practical companion to utilizing Splunk for threat detection and security operations. This in-depth guide begins with an introduction to Splunk and its role in cybersecurity, followed by a detailed discussion on configuring inputs and data sources, understanding Splunk architecture, and using Splunk Enterprise Security (ES).It further explores topics such as data ingestion and normalization, understanding SIEM, and threat detection and response. It then delves into advanced analytics for threat detection, integration with other security tools, and automation and orchestration with Splunk. Additionally, it covers cloud security with Splunk, DevOps, and security operations. Moreover, the book provides practical guidance on best practices for Splunk in cybersecurity, compliance, and regulatory requirements. It concludes with a summary of the key concepts covered throughout the book.
- Contents:
- Intro
- Cover Page
- Title Page
- Copyright Page
- Dedication Page
- About the Author
- About the Technical Reviewer
- Acknowledgements
- Preface
- Errata
- Table of Contents
- 1. Introduction to Splunk and Cybersecurity
- Introduction
- Structure
- Overview of Splunk
- Defining Splunk
- Splunk Ecosystem
- Search and Analytics
- Search Capabilities
- Visualizations
- Real-time Alerting
- Advanced Features
- Introducing Cybersecurity
- Importance of cybersecurity in today's digital world
- Types of cyber threats
- Common cybersecurity frameworks and methodologies
- Role of Splunk in Cybersecurity
- Log management and event correlation with Splunk
- Accelerating incident response and investigation
- Use Cases for Splunk in Cybersecurity
- Conclusion
- Points to Remember
- References
- 2. Overview of Splunk Architecture
- Overview of Splunk Architecture
- Understanding the Key Components of Splunk
- Search Processing Language (SPL)
- Advanced SPL commands and examples
- More Advanced SPL Commands and Examples
- Indexing Data and Strategies
- Data Parsing and Event Processing
- Data Storage and Indexes
- Components of an Index
- Configuring Indexing in Splunk
- Index Management and Performance Considerations
- Indexing Strategy
- Scalability and High Availability
- Splunk Deployment Options
- Best Practices for Splunk Deployment
- Search Optimization Techniques
- Security Best Practices in Splunk Deployment
- Splunk Health Check and Maintenance
- 3. Configuring Inputs and Data Sources
- Introduction to configuring inputs and data sources
- Types of data sources
- Configuring data inputs
- Configuring data inputs for log files
- Configuring data inputs for network events.
- Configuring data inputs for APIs
- A Few other types of data configuration
- Understanding and managing data inputs
- Data onboarding
- Custom log file onboarding example
- Identification of data sources and input configuration
- Parsing and transforming data
- Normalizing data
- Validating and testing the onboarding process
- Field extractions
- 4. Data Ingestion and Normalization
- Overview of data ingestion in Splunk
- Data Ingestion Process in Splunk
- Data Parsing and Processing
- Data Normalization
- Defining Data Normalization in the Cybersecurity Context
- A Real-Life Cybersecurity Example
- How Splunk Can Help to Normalize Data
- Data Models and CIM
- Data Models
- Common Information Model
- Example Scenario
- Best practices for Data Ingestion and Normalization
- 5. Understanding SIEM
- Introducing SIEM
- SIEM Features and Functions
- Common Use Cases and Benefits of SIEM
- Integrating Splunk with SIEM
- 6. Splunk Enterprise Security
- Introduction to Splunk Enterprise Security
- Splunk ES and its Role in Cybersecurity
- How ES Works
- Core Components of Splunk ES
- Scenario 1: Protecting Against Data Breach Attempts
- Scenario 2: Combating Advanced Persistent Threats (APTs)
- Scenario 3: Preventing Payment Fraud
- Scenario: Implementing Adaptive Response Framework (ARF) for Automated Threat Mitigation
- Key Benefits of Using Splunk ES in Cybersecurity
- Introduction to Correlation Searches and Notable Events
- Creating a new Correlation Search
- Example: Detecting Data Exfiltration
- Customizing existing correlation searches
- Scheduling and Configuring Alert Actions
- Scheduling Correlation Searches.
- Configuring Alert Actions
- Using Splunk ES to Create Notable Events for Insider Threat Detection
- Security Monitoring and Incident Investigation
- Executive Summary Dashboard
- Introduction to Security Posture Dashboard and Incident Review Dashboard
- Navigating and Customizing the Security Posture Dashboard
- Accessing the Security Posture Dashboard
- Understanding dashboard components
- Hands-On Scenario 1: Addressing Access Control Challenges
- Hands-On Scenario 2: Investigating Network Security Anomalies
- Customizing the Security Posture Dashboard
- Investigating Notable Events with the Incident Review Dashboard
- Navigating to the Incident Review Dashboard
- Understanding Dashboard Components
- Hands-On Scenario: Managing a Ransomware Attack with the Incident Review Dashboard in Splunk ES
- Customizing the Incident Review Dashboard
- Filtering and sorting notable events
- Incident Ownership and Workflow Management
- Investigating Notable Events
- Adaptive Response Actions with Splunk ES
- Integrating MITRE ATT&
- CK and Kill Chain Methodology
- Managing Advanced Persistent Threats (APTs)
- Suppressing Notable Events
- Anomaly Detection and Correlation Searches in Splunk ES
- Introduction to anomaly detection and correlation searches
- The role of anomaly detection in cybersecurity
- Overview of correlation searches in Splunk ES
- Importance of Anomaly Detection in Cybersecurity
- Benefits of anomaly detection
- Challenges of anomaly detection in cybersecurity
- Integrating Anomaly Detection with Other Security Measures
- Combining correlation searches with adaptive response actions
- Utilizing machine learning and artificial intelligence techniques
- Collaborating and sharing information across teams and tools.
- Continuously monitoring and improving detection capabilities
- Investigations in Splunk ES
- Purpose of Investigations
- Starting an Investigation in Splunk ES
- Initiating an investigation
- Adding Artifacts
- Adding Notes, Files, and Links
- Collaborating on an Investigation in Splunk ES
- Assigning and sharing investigations
- Communicating and tracking progress
- Closing and Archiving Investigations in Splunk ES
- Closing an investigation
- Archiving investigations
- Reporting and Sharing Findings from Completed Investigations
- Reviewing the investigation summary
- Sharing the investigation summary
- Printing the investigation summary
- Best Practices for Investigations in Splunk ES
- Evaluating SOC Metrics in the Context of Splunk Enterprise Security
- Future Trends
- Evolving role of Splunk ES in the cybersecurity landscape
- Emerging trends and technologies in cybersecurity and their impact on Splunk ES
- 7. Security Intelligence
- Introduction to Security Intelligence
- Definition and Importance of Security Intelligence
- Role of Security Intelligence in Splunk ES
- Risk Analysis in Security Intelligence for Splunk ES
- The Risk Analysis Dashboard in ES
- Understanding Risk Scoring in Enterprise Security: A Case Study with JIT Inc.
- Effective use of Risk Analysis Dashboard
- Web Intelligence
- Web Intelligence Dashboards
- HTTP Category Analysis Dashboard
- HTTP User Agent Analysis dashboard
- New Domain Analysis Dashboard
- URL Length Analysis Dashboard
- Hands-On Web Intelligence with Splunk ES at JIT Inc.
- User Intelligence
- User Intelligence Dashboards
- Asset and Identity Investigator dashboards
- User Activity Monitoring
- Access Anomalies dashboard
- Hands-On User Intelligence with Splunk ES at JIT Inc.
- Threat Intelligence.
- Threat Intelligence Dashboards
- Threat Artifacts dashboard
- Hands-On Threat Intelligence with Splunk ES at JIT Inc.
- Protocol Intelligence
- Protocol Intelligence dashboards
- Traffic Size Analysis
- SSL Search
- Email Activity
- Email Search
- Hands-On Protocol Intelligence with Splunk ES at JIT Inc.
- Case Studies
- 8. Forensic Investigation in Security Domains
- Forensic Investigation in Security Domains
- Key Security Domains
- Access Domain
- Key Components of ES in the Access Domain
- Access Domain Areas
- Access Center
- Access Tracker
- Access Search
- Account Management
- Default Account Activity
- Hands-On Access Domain Investigation with Splunk ES at JIT Inc.
- Endpoint Domain
- Endpoint Domain Areas
- Malware Center
- Malware Search and Operations Dashboard
- System Center
- Time Center
- The Endpoint Changes
- Update Center and Search
- Hands-On Endpoint Domain Investigation with Splunk ES at JIT Inc.
- Network Domain
- Network Domain Areas
- Network Traffic
- Network Intrusion
- Vulnerability
- Web Traffic
- Network Changes
- The Port and Protocol Tracking
- Hands-On Network Domain Investigation with Splunk ES at JIT Inc.
- Identity Domain
- Identity Domain Areas
- Asset Data
- Identity Data
- User Session
- Hands-On Identity Domain Investigation with Splunk ES at JIT Inc.
- 9. Splunk Integration with Other Security Tools
- Introduction to Splunk and Security Tool Integrations
- The role of Splunk in Security Operations Centers (SOCs)
- The Importance of Integrating Security Tools for Effective Threat Detection and Response
- Best Practices for Integrating Splunk with Security Tools
- Data Normalization and Enrichment.
- Use of Splunk Add-ons and Apps.
- Notes:
- Description based on publisher supplied metadata and other sources.
- Description based on print version record.
- Includes bibliographical references and index.
- ISBN:
- 9788196815028
- 8196815026
- OCLC:
- 1417196848
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.