|
1 | 1 | # Security Analytics Dashboard for MAP |
2 | 2 |
|
3 | | -### Screenshots |
| 3 | +### Dashboards screenshots |
4 | 4 | * Identity Dashboard |
5 | | - |
| 5 | + |
6 | 6 |
|
7 | 7 | * Network Dashboard |
8 | | - |
| 8 | + |
| 9 | + |
| 10 | +* Security Operations |
| 11 | + |
| 12 | + |
| 13 | +### Enable Security Analytics Dashboards |
| 14 | + |
| 15 | + |
| 16 | + |
| 17 | +### Security Analytics Dashboards Onboarding |
| 18 | +* Logging Analytics should be set up in your tenancy |
| 19 | + * [Logging Analytics](https://docs.oracle.com/en-us/iaas/logging-analytics/index.html) |
| 20 | +* Configure Logging Analytics |
| 21 | + * [Configure Your Service](https://docs.oracle.com/en-us/iaas/logging-analytics/doc/configure-your-service.html) |
| 22 | + * [Prerequisite IAM Policies](https://docs.oracle.com/en-us/iaas/logging-analytics/doc/prerequisite-iam-policies.html) |
| 23 | + * [Enable Access to Logging Analytics and Its Resources](https://docs.oracle.com/en-us/iaas/logging-analytics/doc/enable-access-logging-analytics-and-its-resources.html) |
| 24 | +* Security Analytics Dashboards Log Ingestion |
| 25 | + * [Ingest OCI VCN Flow Logs into OCI Logging Analytics](https://blogs.oracle.com/observability/post/how-to-ingest-oci-vcn-flow-logs-into-oci-logging-analytics) |
| 26 | + * [Ingest OCI Audit logs into OCI Logging Analytics](https://redthunder.blog/2021/06/01/getting-insights-with-oci-audit-log-with-logging-analytics-via-service-connector/) |
| 27 | + |
| 28 | +### Enable Threat Intelligence Integration |
| 29 | +Logging Analytics is integrated with Oracle Threat Intelligence to automatically receive the threat feed as the logs are ingested. The feature is available for all the log sources in the regions where both Logging Analytics and Oracle Threat Intelligence services are enabled. The Threat IPs widget makes use of this feature, which is not enabled by default. |
| 30 | +To enable: |
| 31 | +1. In OCI console, Navigate to Observability and Management -> Logging Analytics->Administration |
| 32 | +2. Click on “Sources”. in search box in the top right, search for “vcn”. You should get 2 sources: “OCI VCN Flow Unified Schema Logs” and “OCI VCN Flow Logs” |
| 33 | +3. Edit each source. On the Edit screen, click the “Field Enrichment” tab. Ensure the "Enabled" checkbox is checked for the "Geo location" function |
| 34 | +4. Edit the "Geo location" function by clicking the three dots, and check "Threat Intelligence enrichment" checkbox. |
| 35 | +5. If it is not, check the checkbox and click "Save Changes" |
| 36 | +6. Repeat above 5 steps for "OCI Audit Logs" Log Source. |
| 37 | + |
| 38 | +### Security Analytics Dashboards Deployment |
| 39 | +Download the files to your local workstation. There are 3 files with “.json” extension corresponding to the 3 security dashboards |
| 40 | +1. Identity Security: Identity Security.json |
| 41 | +2. Network Security: Network Security.json |
| 42 | +3. Security Operations: Security Operations.json |
| 43 | + |
| 44 | +Follow these steps to import the JSON files: |
| 45 | +1. Login to tenancy |
| 46 | +2. Navigate to LA Dashboards Console -> Observability & Management -> Logging Analytics -> Dashboards |
| 47 | +3. Click on “Import Dashboards” |
| 48 | +4. Navigate to folder containing dashboards and select the first dashboard JSON file |
| 49 | +5. Select “Specify a compartment for all dashboards” and choose compartment |
| 50 | +6. Select “Specify a compartment for all saved searches” and choose compartment |
| 51 | +7. Click on “Import” |
| 52 | +8. Repeat steps 3-7 for the second JSON file |
| 53 | +9. Navigate to LA Administration -> VCN Flow Log and Audit Log Source -> Field Enrichment tab -> Enable Threat Intelligence enrichment for Public IP or Source IP |
| 54 | + |
| 55 | +It may take some time for the data to start flowing into the dashboard. You will not see any data unless there are activities on the target system(s) that would be picked up by the corresponding widget/query. |
| 56 | + |
| 57 | +### Security Analytics Dashboards Visulization |
| 58 | +You can now use Security Analytics Dashboards to detect security threats and issues in OCI tenany. For example, Threat IPs detected in VCN Flow Logs accessing OCI cloud resources or spikes detected in Network Ingress Traffic from Public IPs need further investigation from the security teams to mitigate security risks across your tenancy. |
| 59 | + |
| 60 | +<p align="center"> |
| 61 | + <img src="images/sad-threat-ips.png" width="400"/> |
| 62 | +</p> |
0 commit comments