Information Security Today Home

New Books

Business Continuity Planning: A Project Management Approach by Ralph L. Kliem and Gregg D. Richie; ISBN 9781482251784
Securing Systems: Applied Security Architecture and Threat Models by Brook S. E. Schoenfield; ISBN 9781482233971
Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare by Thomas A. Johnson; ISBN 9781482239225
Touchless Fingerprint Biometrics by Ruggero Donida Labati, Vincenzo Piuri, and Fabio Scotti; ISBN 9781498707619
The Frugal CISO: Using Innovation and Smart Approaches to Maximize Your Security Posture by Kerry Ann Anderson; ISBN 9781482220070
Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity by J.J. Stapleton; ISBN 9781466592148

The Difference between SIEM and UBA

By Cindy Ng, Technical Analyst, Varonis

The latest 2015 Verizon Data Breach Investigations Report indicates that insider threats continue to be a top security concern. As employees go rogue, one effective insider threat prevention technology that has been instrumental for IT security is User Behavior Analytics (UBA).

If you currently use a security identity event management (SIEM) tool to monitor user activity for threat management, and regulatory compliance, awesome! You have a head start. SIEM is an excellent starting point for security analytics, as it monitors system events captured in firewalls, OS logs, syslog, network traffic logs, and more.

If you have SIEM, you might wonder why you need UBA. At first glance UBA and SIEM appear to be very similar, however, upon closer inspection, they do different things.

By focusing less on system events, and more on specific user activities, UBA builds a profile of an employee based on their usage patterns, and sends out an alert if it sees abnormal user behavior. Typically UBA alerts can be sent via e-email, SMS, or even be piped into your SIEM.

Let's go through the difference between SIEM and UBA to understand when to implement them.

What Is SIEM?
SIEM combines all security events from SIM (security information management) and SEM (security event management) functions into one central database, yielding important security analysis, reports, and alerts in one centralized place.

How Does SIEM Work?
SIEM systems store, analyze, and correlate a multitude of security information, authentication events, anti-virus events, audit events, intrusion events, etc. Any anomalous event captured in a rule alerts a security officer/analyst to take swift action. Plus, SIEM tools can also help compliance managers meet strict regulatory requirements.

Do They Collect Data Themselves?
SIEM systems aggregate logs, most commonly through reading event viewer data, receiving standard feeds from SNMP traps, or Syslog, or sometimes with the help of agents. These feeds come from user devices, network switches, servers, firewalls, anti-virus software, intrusion detection/prevention systems, and many more. Once all of the data is centralized, it runs reports, "listens" for anomalous events, and sends alerts.

SIEM Rules and Alerts
For the SIEM tool to identify anomalous events, and send alerts, it's important that an administrator create a profile of the system under normal event conditions. SIEM alerts can be pre-configured with canned rules, or you can custom create your own rules that reflect your security policies.

After events are sent to the system, they pass through a series of rules, which will generate alerts. Alerts indicate that a series of events has happened and needs attention. Keep in mind, with potentially thousands of devices, and different sources to monitor, each generating a couple thousand records or more a day, there will be plenty of information to sift through. So, use SIEM rules to reduce the number of events down to a small number of actionable alerts that signal actual vulnerabilities, threats, or risk.

Profile of a SIEM Buyer
Bottom line: Security officers and analysts who want a high-level overview of all their devices, platforms, network, and their events generated will want to take a closer look at SIEM tools.

Quick! Tell me what UBA is so I can figure out how it's different from SIEM.
UBA solutions are defined by their ability to audit, and analyze an individual's file and application access, then connect these disparate points to flag that individual as engaged in suspicious behavior.

How Does UBA Work?
Not all UBA software is the same. The market is composed of business intelligence, database, security, and fraud detection, as well as vendors that specialize in insider threats. (To learn more about the differences, you can read this post from Varonis' technical specialist, Andy Green, What is UBA?)

Regardless, UBA helps mitigate the risks of both insider threats, and external attackers by using the same principle. First, a normal baseline is defined based on user behaviour--file access, logins, network activity, etc.--over an extended period. Second, UBA can quickly identify user deviations from that norm, and generate an alert. In the case of attackers entering the system, UBA can tell whether an employee’s credentials are being used by outsiders. For legitimate employees, UBA can also spot changes in activity that signal insider data theft, or IT sabotage.

Do They Collect Data Themselves?
UBA processes a wide variety of sources usually without volume, variety, and velocity constraints. With files, emails, and other IT resources being accessed and created every second of every day, good UBA software has the ability--often with the assistance of agents, and collectors--to process this enormous load and report anomalies in, or near, real-time.

UBA Rules and Alerts
UBA software supports canned rules that allow an IT admin to configure a template to, say, spot accesses to a sensitive file during non-business hours. But UBA really excels at handling the unknown. In the background, the UBA engine can baseline each user's normal activity, and then spot variances in whatever form they reveal themselves. For example, it can automatically spot thousands of "file delete" actions in a short time windows, unusual directory visits, or launches of rarely used apps, all perhaps indicating that a user is behaving uncharacteristically.

Profile of an UBA Buyer
Bottom line: UBA software can effectively alert security officers when the baseline activity within an environment exhibits anomalies, signaling a potential attack.

If I have SIEM, would I need UBA? Excellent question! Here are two recommendations:

1. Determine if you want SIEM to analyze security event data produced by security devices, network infrastructures, systems, and applications. Or UBA to gain deep insight into what users on a system are doing--their activities and file access patterns.

2. Use cases also really help security officers identify, clarify and prioritize requirements for deciding on which solutions to use. Plus, it's a good way to really "get" the differences between these complementary technologies.

If you have any projects related to compliance, and need to track access activity, here are some relevant SIEM use cases:

Concerned with insider threats, and protecting organization digital assets? Below are relevant UBA use cases:

  • Insider threat enterprise security
  • Protecting organizations with high-value IP, or sensitive data that needs protection– such as financial, government, telecom, education, hospitals, retail, etc.

3. If you've already deployed SIEM, evaluate its user monitoring, profiling, and anomaly detection capabilities to determine whether they can be adapted to satisfy your use cases before turning to UBA technology.

In short, both SIEM and UBA have important use cases to help an organisation meet their business and security needs. Because insider attacks are real, and costly, don't overlook UBA as it is an excellent complement to SIEM.


 
Subscribe to
Information Security Today







Bookmark and Share


© Copyright 2015 Auerbach Publications