Folks often ask me about the most important data sources for network defense. That question usually requires some unpacking and winds up as one of these:

1. Most important for detection

2. Most important for analysis

3. Most important for career growth

1/
I wrote a whole chapter about choosing the best data sources for collection in my book Applied Network Security Monitoring. I distinguished between detection and investigative value, but I think I would approach that chapter a bit differently if I were writing it today. 2/
In Applied NSM I introduced something called the Applied Collection Framework. The gist was that you should assess your fears and risks to the network that you're defending and work backwards from that to identify important data sources. 3/
I'd still include that, but position it along with some other things.

First, I would provide a mental model for categorizing evidence sources. I do that now by defining evidence realms. There are six: application, disk, network, memory, threat intel, and friendly intel. 4/
Next, I would define detection vs. investigation value in more detail. There's obviously some overlap here, but they are two distinct functions. Finding anomalies vs. assessing the disposition of anomalies and using known events to discover unknown related events. 5/
For detection, the mechanism often dictates the data sources: packets for Suricata, various logs for Sigma, etc. Your risk profile dictates where you deploy the mechanism and how you configure it (rulesets, verbosity). 6/
Generally, I think this detection related collection is easier to figure out -- detection tools have limited inputs. 7/
For investigations, common attacker and user behaviors usually dictate sources: executions, authentications, downloads, etc. Your risk profile dictates where those actions are most impactful and where you prioritize collection efforts. 8/
Investigation related collection is harder to figure out because of more numerous and diverse inputs to human analysts. It's also just not studied as broadly. 9/
With investigations in mind, folks should start with a baseline of important data sources that are (nearly) universal. These are things that I believe every organization should collect to aid investigations, regardless of risk profile. 10/
For example, everybody needs to be able to examine evidence of process execution. I don't know of any specific risk profile that removes that need. Execution is pretty fundamental to malicious and benign behavior (and analysts often need to prove both dispositions). 11/
How you do that could come from a few different sources... For example, OS logs (Win EID 4688/Sysmon 1), EDR agent, or something else. 12/
When I refer to collection I'm really talking about the analysts capability to access data. That doesn't just mean proactively (like logs sent to a SIEM). It could also mean collection from a live system. You can use the Windows registry, prefetch, etc to prove execution too. 13/
It would be at that point I would suggest considering the Applied Collection Framework to assess risk and apply what you know about that to determining collection engineering priorities. 14/
I didn't have enough data and wasn't quite brave enough to identify a list of must-have investigative data sources when I wrote Applied NSM, but I am now. I maintain that list in my Investigation Theory course. 15/
For the last part of this question, it's about what data sources people should learn if they want to get a security analyst job or level up in the one they have. 16/
The simplest answer is to look at job postings for the types of jobs you want and see what they reference most. If you're already working somewhere, then try to understand what the more senior analysts use the most to answer investigative questions. 17/
If you want to focus on detection engineering, look at the most common detection tools (Suricata, Sigma, Yara) and focus on evidence sources that are inputs to those. 18/
If you want to focus on investigations, I recommend starting with at least one data source from each evidence realm I have listed. Some of those will be easier than others, but you need cross realm expertise. A lot of folks specialize too early. 19/
For example, using this one from every realm strategy you could focus on OS security logs, the disk file system, zeek data, a basic memory image, passive DNS, and listing installed applications. If you can navigate those (even minimally), you'll be in pretty good shape! 20/
Evidence is important because it's where analysts answer investigative questions and connect events to form timelines. And of course, a conclusion without evidence is only just an opinion. 21/21

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Chris Sanders 🍯

Chris Sanders 🍯 Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @chrissanders88

9 Dec
Golden Ticket update! We're just a hair shy of our $20K goal which unlocks a 10K bonus from @TrustedSec.

Help us get there by donating to @RuralTechFund or your local food bank and forwarding us the receipt. You'll be entered to win nearly $20k in free training and prizes.
The list of prizes and all the details on how to enter are here: chrissanders.org/2021/12/golden…
We just hit our $20K goal! That comes with a 10K match from @TrustedSec, who are also providing a free seat in one of their training courses to the golden ticket winner. Thanks @HackingDave and crew!
Read 4 tweets
9 Dec
Big news!

After a long wait, I'm excited to publicly release my doctoral dissertation, "The Analyst Mindset: A Cognitive Skills Assessment of Digital Forensic Analysts".

You can download it here: chrissanders.org/2021/12/disser….
In the accompanying blog post, I also talk a bit about how I came to this research area, why I think it's important, and a little bit of what's next. While my doctorate is a terminal degree, my dissertation is a beginning toward more things to come. 2/
With that in mind, let me walk you through a high level overview of my research and findings here. This will be a long thread and pretty high level since it's nearly a 200 page document. 3/
Read 53 tweets
7 Dec
My friends, the come has come. This holiday season I'm giving away a golden ticket that grants free entry into ALL my training courses and tons of other amazing prizes.

All the details are here: chrissanders.org/2021/12/golden…
If you find my golden ticket, you win:
- A free seat in every @NetworkDefense training course
- A free seat in one course to give to a friend
- A signed copy of all my books
(more...)
- 2 free seats in @DragosInc “Assessing, Hunting, and Monitoring Industrial Control Systems” course (in person or online, for you and a friend)
- A free seat in a @TrustedSec online course
- A super secret and totally awesome prize from me

That's nearly $20,000 in prizes.
Read 20 tweets
16 Nov
The most common action an analyst will take is performing a search. Usually in a tool like Security Onion, Splunk, Kibana, and so on. The second most common action an analyst will take is pivoting. That term gets used a lot, but what exactly does it mean? 1/
In the investigative context, analysts pivot when they perform a search in one evidence source, select a value from that search, and use it to perform another search in a different evidence source. 2/
For example...
1. An analyst searches in flow data to see who communicated with a suspicious IP.
2. They get a result and identify a Src IP.
3. They search in PCAP data for the Src IP / Dst IP pair to examine the communication. 3/
Read 20 tweets
15 Nov
An interesting study on the effects of prediction error on how people update their beliefs on topics.

Overview article: psypost.org/2021/11/psycho…

Research article: scholar.princeton.edu/sites/default/…

Relevance here to combatting misinformation.
The gist of the findings is that folks are more likely to change their mind on a topic when asked to make a prediction about some facts relevant to the topic and subsequently finding out their prediction was false.
Further, the magnitude of the prediction error is notable:

"we found that prediction error size linearly predicts rational belief update
and that making large prediction errors leads to larger belief updates than being
passively exposed to evidence"
Read 19 tweets
12 Nov
As one of my last doctoral coursework presentations, I spent time talking to my colleagues about the ethical dilemmas surrounding offensive security tool release. The outsider input was fascinating. Here's a thread to share some of that... 1/
Now keep in mind, my colleagues here are primarily educators. K-12 and university teachers, administrators, educational researchers, and so on. A few industry-specific education people as well, but none from infosec like me. 2/
My goal was to present the issue, explain why it was an ethical dilemma, and collectively discuss ethical perspectives that could influence decision-making. I withheld any of my opinions to let them form their own but gave lots of examples of OSTs and their use. 3/
Read 27 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(