|
|
@@ -0,0 +1,579 @@
|
|
|
1
|
+# Security Detection & Threat Intelligence Enhancement Proposal
|
|
|
2
|
+
|
|
|
3
|
+## Security Architecture Overview
|
|
|
4
|
+
|
|
|
5
|
+---
|
|
|
6
|
+
|
|
|
7
|
+## About Simplico Co., Ltd.
|
|
|
8
|
+
|
|
|
9
|
+**Simplico Co., Ltd.** is a technology consulting and system integration company specializing in **custom security, data, and automation solutions** for enterprise and industrial environments.
|
|
|
10
|
+
|
|
|
11
|
+We focus on designing and implementing **practical, production-ready systems** rather than generic or vendor-locked platforms. Our expertise covers security monitoring, SOC/MDR architecture, automation (SOAR), system integration, and long-term operational support.
|
|
|
12
|
+
|
|
|
13
|
+We also have experience in developing mobile applications, e‑commerce platforms, large‑scale web applications, and factory automation systems.
|
|
|
14
|
+
|
|
|
15
|
+More information about our company and services is available at: [https://simplico.net/](https://simplico.net/)
|
|
|
16
|
+
|
|
|
17
|
+## 1. Executive Summary
|
|
|
18
|
+
|
|
|
19
|
+This proposal is prepared for **บริษัท ฟู้ดโปรเจ็ค (สยาม) จำกัด (FoodProject)** and delivers advanced security detection use cases, continuously updated threat‑intelligence IOC detection, and VPN authentication anomaly monitoring using a **modular, open, and extensible security architecture**.
|
|
|
20
|
+
|
|
|
21
|
+The solution avoids monolithic or vendor‑locked SOC platforms and instead uses **best‑of‑breed components**, each responsible for a specific role: detection, automation, investigation, and escalation.
|
|
|
22
|
+
|
|
|
23
|
+**Key Outcomes**
|
|
|
24
|
+
|
|
|
25
|
+* Improved visibility into malicious network activity and credential misuse
|
|
|
26
|
+* Faster detection, investigation, and escalation of high‑risk security events
|
|
|
27
|
+* Reduced operational risk through continuously updated threat intelligence
|
|
|
28
|
+
|
|
|
29
|
+---
|
|
|
30
|
+
|
|
|
31
|
+## 2. Selected Architecture
|
|
|
32
|
+
|
|
|
33
|
+This architecture is designed to directly support the detection, automation, investigation, and escalation use cases described in Section 3 by ensuring each security function is handled by a dedicated, purpose-built component.
|
|
|
34
|
+
|
|
|
35
|
+| Layer | Technology | Purpose |
|
|
|
36
|
+| ----------------- | ---------- | --------------------------------------------------- |
|
|
|
37
|
+| Detection | Wazuh | Log analysis, correlation, alerting |
|
|
|
38
|
+| Automation / SOAR | Shuffle | IOC matching, enrichment, response logic |
|
|
|
39
|
+| Case Management | DFIRTrack | Incident tracking, evidence, investigation timeline |
|
|
|
40
|
+| Escalation | PagerDuty | On‑call alerting & SLA enforcement |
|
|
|
41
|
+
|
|
|
42
|
+**Why This Architecture**
|
|
|
43
|
+
|
|
|
44
|
+* Open and extensible (no vendor lock‑in)
|
|
|
45
|
+* Designed for real SOC / MDR workflows
|
|
|
46
|
+* Clear separation of responsibility
|
|
|
47
|
+* Easy to maintain and scale
|
|
|
48
|
+
|
|
|
49
|
+```mermaid
|
|
|
50
|
+flowchart LR
|
|
|
51
|
+ A["Firewall / DNS / IDS / VPN Logs"] --> B["Wazuh
|
|
|
52
|
+Detection & Correlation"]
|
|
|
53
|
+ B --> C["Shuffle
|
|
|
54
|
+Automation & SOAR"]
|
|
|
55
|
+ C --> D["DFIRTrack
|
|
|
56
|
+Incident Tracking"]
|
|
|
57
|
+ C --> E["PagerDuty
|
|
|
58
|
+On-call Escalation"]
|
|
|
59
|
+
|
|
|
60
|
+ C -->|"IOC Match / Enrichment"| D
|
|
|
61
|
+ C -->|"SEV-1 / SEV-2"| E
|
|
|
62
|
+```
|
|
|
63
|
+
|
|
|
64
|
+---
|
|
|
65
|
+
|
|
|
66
|
+## 3. Scope of Work
|
|
|
67
|
+
|
|
|
68
|
+The scope of work is organized into three primary workstreams: (1) creation and tuning of detection rules tailored to the customer environment, (2) implementation of continuously updated threat‑intelligence IOC detection across network traffic, and (3) monitoring of VPN authentication anomalies based on geographic location. Together, these workstreams ensure comprehensive visibility, timely detection, and actionable response to security threats.
|
|
|
69
|
+
|
|
|
70
|
+### 3.1 Create & Tune New Detection Rules / Use Cases
|
|
|
71
|
+
|
|
|
72
|
+**Activities**
|
|
|
73
|
+
|
|
|
74
|
+* Review firewall, DNS, IDS/IPS, VPN, and Windows log formats
|
|
|
75
|
+* Onboard logs into Wazuh with proper parsing and normalization
|
|
|
76
|
+* Implement the agreed detection use cases (see **Appendix A: Use Case List**)
|
|
|
77
|
+* Tune thresholds, severities, and allowlists
|
|
|
78
|
+* Reduce false positives using real traffic patterns
|
|
|
79
|
+
|
|
|
80
|
+**Output**
|
|
|
81
|
+
|
|
|
82
|
+* Stable, environment-specific detection rules
|
|
|
83
|
+* Severity-aligned alerts suitable for automation and escalation
|
|
|
84
|
+
|
|
|
85
|
+---
|
|
|
86
|
+
|
|
|
87
|
+### 3.2 Threat Intelligence IOC Detection (DNS / Firewall / IDS-IPS)
|
|
|
88
|
+
|
|
|
89
|
+**Covered Use Cases**
|
|
|
90
|
+
|
|
|
91
|
+**DNS Network Traffic**
|
|
|
92
|
+
|
|
|
93
|
+* Communication to malicious domain or IP
|
|
|
94
|
+* Malicious domain / IP IOC detection
|
|
|
95
|
+
|
|
|
96
|
+**IDS / IPS Network Traffic**
|
|
|
97
|
+
|
|
|
98
|
+* Communication to malicious domain or IP
|
|
|
99
|
+* IOC-based detection from IDS / IPS alerts
|
|
|
100
|
+
|
|
|
101
|
+**Technical Implementation**
|
|
|
102
|
+
|
|
|
103
|
+1. IOC feed integration (domain & IP)
|
|
|
104
|
+2. Automated, scheduled IOC updates
|
|
|
105
|
+3. IOC matching and enrichment via automation workflows
|
|
|
106
|
+4. Incident creation and evidence tracking
|
|
|
107
|
+5. Escalation for high-severity matches
|
|
|
108
|
+
|
|
|
109
|
+**Outcome**
|
|
|
110
|
+
|
|
|
111
|
+* Continuously updated IOC detection
|
|
|
112
|
+* Clear evidence trail for audit and investigation
|
|
|
113
|
+
|
|
|
114
|
+---
|
|
|
115
|
+
|
|
|
116
|
+### 3.3 VPN Authentication Success from Outside Thailand
|
|
|
117
|
+
|
|
|
118
|
+**Detection Logic**
|
|
|
119
|
+
|
|
|
120
|
+* Monitor VPN authentication success events
|
|
|
121
|
+* Perform GeoIP lookup on source IP
|
|
|
122
|
+* Detect successful logins originating outside Thailand
|
|
|
123
|
+
|
|
|
124
|
+**Enhancements**
|
|
|
125
|
+
|
|
|
126
|
+* Exception list for approved overseas users
|
|
|
127
|
+* Risk scoring for admin accounts, first-time country access, and off-hours login
|
|
|
128
|
+
|
|
|
129
|
+**Response**
|
|
|
130
|
+
|
|
|
131
|
+* Incident creation and tracking
|
|
|
132
|
+* On-call escalation for high-risk events
|
|
|
133
|
+
|
|
|
134
|
+---
|
|
|
135
|
+
|
|
|
136
|
+### 3.2 Threat Intelligence IOC Detection (DNS / Firewall / IDS‑IPS)
|
|
|
137
|
+
|
|
|
138
|
+**Covered Use Cases**
|
|
|
139
|
+
|
|
|
140
|
+**DN5S Network Traffic**
|
|
|
141
|
+
|
|
|
142
|
+* Communication to malicious domain or IP
|
|
|
143
|
+* Malicious domain / IP IOC detection
|
|
|
144
|
+
|
|
|
145
|
+**IDS / IPS Network Traffic**
|
|
|
146
|
+
|
|
|
147
|
+* Communication to malicious domain or IP
|
|
|
148
|
+* IOC‑based detection from IDS / IPS alerts
|
|
|
149
|
+
|
|
|
150
|
+**Technical Implementation**
|
|
|
151
|
+
|
|
|
152
|
+1. IOC feed integration (domain & IP)
|
|
|
153
|
+2. Automated, scheduled IOC updates
|
|
|
154
|
+3. IOC matching and enrichment via automation workflows
|
|
|
155
|
+4. Incident creation and evidence tracking
|
|
|
156
|
+5. Escalation for high‑severity matches
|
|
|
157
|
+
|
|
|
158
|
+**Outcome**
|
|
|
159
|
+
|
|
|
160
|
+* Continuously updated IOC detection
|
|
|
161
|
+* Clear evidence trail for audit and investigation
|
|
|
162
|
+
|
|
|
163
|
+---
|
|
|
164
|
+
|
|
|
165
|
+### 3.3 VPN Authentication Success from Outside Thailand
|
|
|
166
|
+
|
|
|
167
|
+**Detection Logic**
|
|
|
168
|
+
|
|
|
169
|
+* Monitor VPN authentication success events
|
|
|
170
|
+* Perform GeoIP lookup on source IP
|
|
|
171
|
+* Detect successful logins originating outside Thailand
|
|
|
172
|
+
|
|
|
173
|
+**Enhancements**
|
|
|
174
|
+
|
|
|
175
|
+* Exception list for approved overseas users
|
|
|
176
|
+* Risk scoring for admin accounts, first‑time country access, and off‑hours login
|
|
|
177
|
+
|
|
|
178
|
+**Response**
|
|
|
179
|
+
|
|
|
180
|
+* Incident creation and tracking
|
|
|
181
|
+* On‑call escalation for high‑risk events
|
|
|
182
|
+
|
|
|
183
|
+---
|
|
|
184
|
+
|
|
|
185
|
+## 4. End‑to‑End Workflow
|
|
|
186
|
+
|
|
|
187
|
+1. Firewall / DNS / IDS / VPN logs are collected
|
|
|
188
|
+2. Detection rules evaluate events
|
|
|
189
|
+3. Automation workflows enrich and classify alerts
|
|
|
190
|
+4. Incidents are tracked with evidence and timeline
|
|
|
191
|
+5. High‑severity events trigger on‑call escalation
|
|
|
192
|
+
|
|
|
193
|
+---
|
|
|
194
|
+
|
|
|
195
|
+## 4.1 Integration Deliverables
|
|
|
196
|
+
|
|
|
197
|
+The implementation includes full integration with the automation and case management layers to ensure alerts are actionable and traceable:
|
|
|
198
|
+
|
|
|
199
|
+* Integration with **Shuffle** for automated enrichment, IOC matching, and response workflows
|
|
|
200
|
+* Integration with **DFIRTrack** for incident creation, evidence collection, and investigation timeline management
|
|
|
201
|
+
|
|
|
202
|
+## 5. Deliverables
|
|
|
203
|
+
|
|
|
204
|
+* Custom detection rules and tuning
|
|
|
205
|
+* IOC detection workflows (DNS and IDS / IPS)
|
|
|
206
|
+* Automated IOC update pipeline
|
|
|
207
|
+* VPN geo‑anomaly detection
|
|
|
208
|
+* Incident templates and investigation workflow
|
|
|
209
|
+* Escalation logic
|
|
|
210
|
+* Documentation and handover
|
|
|
211
|
+
|
|
|
212
|
+---
|
|
|
213
|
+
|
|
|
214
|
+## 6. Timeline
|
|
|
215
|
+
|
|
|
216
|
+The timeline below includes all activities required for full integration across detection, automation, case management, and escalation layers, including Shuffle and DFIRTrack.
|
|
|
217
|
+
|
|
|
218
|
+| Phase | Duration |
|
|
|
219
|
+| ---------------------------------------------------------------------- | ---------- |
|
|
|
220
|
+| Log onboarding & review | 1 week |
|
|
|
221
|
+| Rule creation & tuning | 1–2 weeks |
|
|
|
222
|
+| IOC pipeline & detection | 1–2 weeks |
|
|
|
223
|
+| VPN geo-anomaly use case | 3–5 days |
|
|
|
224
|
+| **Integration & end-to-end testing (Shuffle / DFIRTrack / PagerDuty)** | **1 week** |
|
|
|
225
|
+
|
|
|
226
|
+**Total estimated duration:** 5–6 weeks
|
|
|
227
|
+
|
|
|
228
|
+---
|
|
|
229
|
+
|
|
|
230
|
+## 7. Pricing
|
|
|
231
|
+
|
|
|
232
|
+**Payment Terms**
|
|
|
233
|
+
|
|
|
234
|
+* **50%** of the total project value is payable upon project commencement.
|
|
|
235
|
+* The remaining **50%** is payable upon project completion and acceptance, as defined in this proposal.
|
|
|
236
|
+
|
|
|
237
|
+Project completion and acceptance are defined by the successful implementation of the agreed detection use cases, verified end-to-end workflows, and delivery of documentation as outlined in the Scope of Work and Deliverables sections.
|
|
|
238
|
+
|
|
|
239
|
+Project completion and acceptance are defined by the successful implementation of the agreed detection use cases, verified end-to-end workflows, and delivery of documentation as outlined in the Scope of Work and Deliverables sections.
|
|
|
240
|
+
|
|
|
241
|
+
|
|
|
242
|
+### One‑Time Implementation
|
|
|
243
|
+
|
|
|
244
|
+| Item | Cost (THB) |
|
|
|
245
|
+| -------------------------------- | ---------- |
|
|
|
246
|
+| Security use‑case implementation | 320,000 |
|
|
|
247
|
+
|
|
|
248
|
+**Note:** The above price **includes full integration** with the automation, case management, and escalation layers (Shuffle, DFIRTrack, and PagerDuty), including workflow configuration, API integration, and end‑to‑end testing.
|
|
|
249
|
+
|
|
|
250
|
+**VAT Disclaimer:** All prices stated in this proposal are **exclusive of 7% Value Added Tax (VAT)**, which will be charged separately in accordance with Thai tax regulations.
|
|
|
251
|
+|
|
|
|
252
|
+
|
|
|
253
|
+---
|
|
|
254
|
+
|
|
|
255
|
+### Short Free Tuning Period
|
|
|
256
|
+
|
|
|
257
|
+As part of this engagement, a **short free tuning period** is included after initial deployment to ensure detection rules and thresholds are well aligned with the production environment.
|
|
|
258
|
+
|
|
|
259
|
+* Duration: **30 calendar days** after go-live
|
|
|
260
|
+* Delivery mode: **Online / remote support only**
|
|
|
261
|
+* Scope: fine-tuning of existing rules, threshold adjustments, and false-positive reduction
|
|
|
262
|
+* Excludes: new use-case development, new log sources, on-site support, or major logic changes
|
|
|
263
|
+
|
|
|
264
|
+This tuning period helps stabilize the system and maximize detection quality without additional cost.
|
|
|
265
|
+
|
|
|
266
|
+---
|
|
|
267
|
+
|
|
|
268
|
+### Complimentary Security Consultation
|
|
|
269
|
+
|
|
|
270
|
+In addition to the implementation, a **complimentary security consultation** is included to support knowledge transfer and strategic alignment.
|
|
|
271
|
+
|
|
|
272
|
+* Duration: **30 calendar days** (remote only)
|
|
|
273
|
+* Scope: architecture review, use-case clarification, and operational guidance
|
|
|
274
|
+* Purpose: help internal teams better understand the system and plan future improvements
|
|
|
275
|
+
|
|
|
276
|
+This consultation is advisory in nature and does not include additional implementation or configuration work.
|
|
|
277
|
+
|
|
|
278
|
+---
|
|
|
279
|
+
|
|
|
280
|
+---
|
|
|
281
|
+
|
|
|
282
|
+### Optional Ongoing Support
|
|
|
283
|
+
|
|
|
284
|
+| Service | Cost (THB / month) |
|
|
|
285
|
+| -------------------------------------- | ------------------ |
|
|
|
286
|
+| IOC feed maintenance & updates | 20,000 – 40,000 |
|
|
|
287
|
+| Rule tuning & false‑positive reduction | Included |
|
|
|
288
|
+
|
|
|
289
|
+---
|
|
|
290
|
+
|
|
|
291
|
+## 8. Assumptions, Exclusions & Out-of-Scope
|
|
|
292
|
+
|
|
|
293
|
+**Assumptions**
|
|
|
294
|
+
|
|
|
295
|
+* Log sources are accessible and stable
|
|
|
296
|
+* Required access is provided during implementation
|
|
|
297
|
+* Log formats do not change significantly during the project timeline
|
|
|
298
|
+
|
|
|
299
|
+**Exclusions**
|
|
|
300
|
+
|
|
|
301
|
+* 24/7 SOC monitoring
|
|
|
302
|
+* Incident response execution or forensic investigation
|
|
|
303
|
+* Advanced UEBA or machine-learning analytics
|
|
|
304
|
+
|
|
|
305
|
+**Out-of-Scope (Unless Quoted Separately)**
|
|
|
306
|
+
|
|
|
307
|
+The following items are not included in this proposal and will require a separate quotation if requested:
|
|
|
308
|
+
|
|
|
309
|
+* Major changes to log formats, vendors, or network architecture after project kickoff
|
|
|
310
|
+* Onboarding of additional log sources beyond firewall, DNS, IDS/IPS, and VPN
|
|
|
311
|
+* Development of custom dashboards beyond standard operational views
|
|
|
312
|
+* Unlimited rule changes or ongoing rule development beyond the initial tuning period
|
|
|
313
|
+* Integration with additional third-party systems not listed in this proposal
|
|
|
314
|
+* Emergency or after-hours support outside agreed working hours
|
|
|
315
|
+* Compliance certification, audit execution, or regulatory reporting
|
|
|
316
|
+
|
|
|
317
|
+---
|
|
|
318
|
+
|
|
|
319
|
+## 9. Value to Customer
|
|
|
320
|
+
|
|
|
321
|
+* Practical, actionable security detection
|
|
|
322
|
+* Continuously updated threat intelligence
|
|
|
323
|
+* Reduced alert noise
|
|
|
324
|
+* Clear investigation and audit trail
|
|
|
325
|
+* Scalable foundation for future MDR services
|
|
|
326
|
+
|
|
|
327
|
+---
|
|
|
328
|
+
|
|
|
329
|
+## 10. Closing
|
|
|
330
|
+
|
|
|
331
|
+This implementation provides enterprise-grade detection and response capability using open, well-architected components—without vendor lock-in or unnecessary complexity.
|
|
|
332
|
+
|
|
|
333
|
+---
|
|
|
334
|
+
|
|
|
335
|
+# Appendix A: Use Case List (Initial Implementation Scope)
|
|
|
336
|
+
|
|
|
337
|
+The following use cases will be implemented and tuned as part of the initial project scope. Final severity and thresholds will be confirmed during log review and tuning.
|
|
|
338
|
+
|
|
|
339
|
+## A1. DNS / Firewall (IOC)
|
|
|
340
|
+
|
|
|
341
|
+| Category | Source | Use Case | Target Severity |
|
|
|
342
|
+| -------- | ----------------- | ----------------------------------------------------- | --------------- |
|
|
|
343
|
+| DNS | Firewall/DNS logs | DNS Network Traffic – Communicate to Malicious Domain | Medium |
|
|
|
344
|
+| DNS | Firewall/DNS logs | DNS Network Traffic – Malicious Domain IOCs Detection | Medium |
|
|
|
345
|
+
|
|
|
346
|
+## A2. FortiGate IPS/IDS & Firewall
|
|
|
347
|
+
|
|
|
348
|
+| Category | Source | Use Case | Target Severity |
|
|
|
349
|
+| -------- | --------- | -------------------------------------------------------- | --------------- |
|
|
|
350
|
+| IPS | FortiGate | IPS&IDS Network Traffic – Allowed RDP from Public IPs | High |
|
|
|
351
|
+| IPS | FortiGate | IPS&IDS Firewall Account – Admin Password Change | High |
|
|
|
352
|
+| IPS | FortiGate | IPS&IDS Firewall Account – Create/Add Admin Account | High |
|
|
|
353
|
+| IPS | FortiGate | IPS&IDS Firewall Configure – Disabled Email Notification | High |
|
|
|
354
|
+| IPS | FortiGate | IPS&IDS Firewall Configure – Download Configure FW | Low |
|
|
|
355
|
+| IPS | FortiGate | IPS&IDS IDS Alert – Multiple Critical/High | Medium |
|
|
|
356
|
+| IPS | FortiGate | IPS&IDS Network Traffic – Port Scanning | Low |
|
|
|
357
|
+| IPS | FortiGate | IPS&IDS Network Traffic – IOC Detection | Medium |
|
|
|
358
|
+| IPS | FortiGate | IPS&IDS Network Traffic – Port Scanning from Private IP | Medium |
|
|
|
359
|
+| IPS | FortiGate | IPS&IDS Network Traffic – Communicate to Malicious IP | Medium |
|
|
|
360
|
+
|
|
|
361
|
+## A3. FortiGate VPN
|
|
|
362
|
+
|
|
|
363
|
+| Category | Source | Use Case | Target Severity |
|
|
|
364
|
+| -------- | --------- | ---------------------------------------------------------------- | --------------- |
|
|
|
365
|
+| VPN | FortiGate | VPN – Authentication Success from Guest Account | High |
|
|
|
366
|
+| VPN | FortiGate | VPN – Authentication Success from Multiple Country | High |
|
|
|
367
|
+| VPN | FortiGate | VPN – Authentication Brute Force Success | High |
|
|
|
368
|
+| VPN | FortiGate | VPN – Authentication Multiple Fail (Many Accounts from 1 Source) | Low |
|
|
|
369
|
+| VPN | FortiGate | VPN – Authentication Success from Outside Thailand | High |
|
|
|
370
|
+
|
|
|
371
|
+## A4. Windows / Active Directory
|
|
|
372
|
+
|
|
|
373
|
+| Category | Source | Use Case | Target Severity |
|
|
|
374
|
+| -------- | ------------------------ | --------------------------------------------------------------------- | --------------- |
|
|
|
375
|
+| Windows | Windows Security Logs | Windows Authentication – Multiple Fail from Privileged Account | Medium |
|
|
|
376
|
+| Windows | Windows Security Logs | Windows Authentication – Multiple Fail from Service Account | Medium |
|
|
|
377
|
+| Windows | Windows AD Logs | Windows AD – Enumeration with Malicious Tools | Medium |
|
|
|
378
|
+| Windows | Windows Security Logs | Windows Authentication – Fail from Public IPs | Medium |
|
|
|
379
|
+| Windows | Windows Security Logs | Windows File Share – Enumeration to Single Destination | Medium |
|
|
|
380
|
+| Windows | Windows Security Logs | Windows Authentication – Success from Public IPs | High |
|
|
|
381
|
+| Windows | Windows Security Logs | Windows Authentication – Privileged Account Impersonation | High |
|
|
|
382
|
+| Windows | Windows Security Logs | Windows Authentication – Successful Pass the Hash RDP | High |
|
|
|
383
|
+| Windows | Windows Security Logs | Windows Authentication – Success from Guest Account | High |
|
|
|
384
|
+| Windows | Windows Security Logs | Windows Authentication – Interactive Logon Success by Service Account | High |
|
|
|
385
|
+| Windows | Windows Security Logs | Windows Account – Added to Privileged Custom Group | High |
|
|
|
386
|
+| Windows | Windows Security Logs | Windows Account – Added to Privileged Group | High |
|
|
|
387
|
+| Windows | Windows Domain Configure | Windows Domain Configure – DSRM Password Reset | High |
|
|
|
388
|
+| Windows | Windows Security Logs | Windows Authentication – Multiple Fail (1 Account from Many Sources) | Low |
|
|
|
389
|
+| Windows | Windows Security Logs | Windows Authentication – Multiple Fail (Many Accounts from 1 Source) | Low |
|
|
|
390
|
+| Windows | Windows Security Logs | Windows Authentication – Multiple Fail from Guest Account | Low |
|
|
|
391
|
+| Windows | Windows Security Logs | Windows Authentication – Multiple Fail (1 Account from 1 Source) | Low |
|
|
|
392
|
+| Windows | Windows Security Logs | Windows Authentication – Multiple Interactive Logon Denied | Low |
|
|
|
393
|
+| Windows | Windows Security Logs | Windows Authentication – Password Spray | Low |
|
|
|
394
|
+| Windows | Windows Security Logs | Windows Authentication – Attempt from Disabled Account | Low |
|
|
|
395
|
+| Windows | Windows Security Logs | Windows Domain Account – Created | Low |
|
|
|
396
|
+| Windows | Windows Security Logs | Windows Local Account – Re-Enabled | Low |
|
|
|
397
|
+| Windows | Windows Security Logs | Windows Local Account – Created | Low |
|
|
|
398
|
+| Windows | Windows Security Logs | Windows Domain Account – Re-Enabled | Low |
|
|
|
399
|
+
|
|
|
400
|
+---
|
|
|
401
|
+
|
|
|
402
|
+# Appendix B: Additional Use Cases (Optional / Add-On Scope)
|
|
|
403
|
+
|
|
|
404
|
+The following use cases require additional log sources or integrations and are **not included in the initial implementation scope**. They can be implemented as an optional add-on or Phase 2 enhancement.
|
|
|
405
|
+
|
|
|
406
|
+## B1. VMware vCenter / ESXi
|
|
|
407
|
+
|
|
|
408
|
+| Category | Source | Use Case | Target Severity |
|
|
|
409
|
+| -------- | -------------- | ----------------------------------------------------- | --------------- |
|
|
|
410
|
+| VMware | vCenter / ESXi | vCenter GUI – Login Failed 5 Times and Success 1 Time | High |
|
|
|
411
|
+| VMware | vCenter / ESXi | ESXi – Enable SSH on Hosts | Medium |
|
|
|
412
|
+| VMware | vCenter / ESXi | ESXi – SSH Failed 5 Times and Success 1 Time | High |
|
|
|
413
|
+
|
|
|
414
|
+## B2. Log Monitoring
|
|
|
415
|
+
|
|
|
416
|
+| Category | Source | Use Case | Target Severity |
|
|
|
417
|
+| -------- | ---------- | --------------------------------- | --------------- |
|
|
|
418
|
+| SIEM | LogMonitor | Log Monitor – Logs Loss Detection | Low |
|
|
|
419
|
+
|
|
|
420
|
+## B3. Windows Sysmon
|
|
|
421
|
+
|
|
|
422
|
+| Category | Source | Use Case | Target Severity |
|
|
|
423
|
+| -------- | ------- | -------------------------------------- | --------------- |
|
|
|
424
|
+| Sysmon | Windows | Sysmon – LSASS Dumping | High |
|
|
|
425
|
+| Sysmon | Windows | Sysmon – SQL Injection | High |
|
|
|
426
|
+| Sysmon | Windows | Sysmon – Webshell | High |
|
|
|
427
|
+| Sysmon | Windows | Sysmon – Uninstall | High |
|
|
|
428
|
+| Sysmon | Windows | Sysmon – LSASS Dumping by Task Manager | High |
|
|
|
429
|
+| Sysmon | Windows | Sysmon – CertUtil Download | Medium |
|
|
|
430
|
+
|
|
|
431
|
+**Notes**
|
|
|
432
|
+
|
|
|
433
|
+* IOC-based detections require an IOC feed and update schedule. IOC matching and enrichment will be implemented via the automation layer.
|
|
|
434
|
+* Geo-based VPN detections require GeoIP enrichment and an exception list for approved overseas users.
|
|
|
435
|
+
|
|
|
436
|
+---
|
|
|
437
|
+
|
|
|
438
|
+# Appendix C: Future Enhancement Use Cases (Post-Implementation)
|
|
|
439
|
+
|
|
|
440
|
+The following use cases are **not included in the current project scope**. They are provided to illustrate additional high-value security capabilities that can be implemented in future phases after the initial deployment is stabilized.
|
|
|
441
|
+
|
|
|
442
|
+## C1. Impossible Travel Detection (VPN / AD / Cloud)
|
|
|
443
|
+
|
|
|
444
|
+**Description**
|
|
|
445
|
+
|
|
|
446
|
+Impossible Travel detects potential credential compromise by identifying authentication events where the same user account logs in from geographically distant locations within a time window that is physically impossible for normal human travel.
|
|
|
447
|
+
|
|
|
448
|
+**How It Works**
|
|
|
449
|
+
|
|
|
450
|
+* Correlate authentication events for the same user across VPN, Active Directory, and cloud services
|
|
|
451
|
+* Enrich source IP addresses with GeoIP location data
|
|
|
452
|
+* Calculate distance and time between consecutive login events
|
|
|
453
|
+* Trigger an alert when the required travel speed exceeds realistic human limits
|
|
|
454
|
+
|
|
|
455
|
+**Typical Scenarios**
|
|
|
456
|
+
|
|
|
457
|
+* VPN login from Thailand followed shortly by a VPN or cloud login from another country
|
|
|
458
|
+* Active Directory login from an internal office network followed by an external or overseas login
|
|
|
459
|
+* Cloud or SaaS login from two distant regions within a short time window
|
|
|
460
|
+
|
|
|
461
|
+**Risk & Value**
|
|
|
462
|
+
|
|
|
463
|
+* Strong indicator of stolen or shared credentials
|
|
|
464
|
+* High signal with low false-positive rate when properly tuned
|
|
|
465
|
+* Effective for detecting attacks that bypass malware-based controls
|
|
|
466
|
+
|
|
|
467
|
+**Response Examples**
|
|
|
468
|
+
|
|
|
469
|
+* Create an incident record for investigation
|
|
|
470
|
+* Enrich with user role, account type, and asset criticality
|
|
|
471
|
+* Optional actions such as password reset, MFA enforcement, or account lockout
|
|
|
472
|
+
|
|
|
473
|
+**Implementation Notes
|
|
|
474
|
+
|
|
|
475
|
+* Known VPN exit IPs and office locations are allowlisted to reduce false positives
|
|
|
476
|
+* Service and automation accounts are excluded by default
|
|
|
477
|
+* Time windows and thresholds are tuned based on operational patterns
|
|
|
478
|
+
|
|
|
479
|
+---
|
|
|
480
|
+
|
|
|
481
|
+## C2. Advanced Credential Abuse & Privilege Misuse
|
|
|
482
|
+
|
|
|
483
|
+**Example Use Cases**
|
|
|
484
|
+
|
|
|
485
|
+* Privileged account usage outside business hours
|
|
|
486
|
+* Dormant accounts becoming active unexpectedly
|
|
|
487
|
+* Service accounts used for interactive logon
|
|
|
488
|
+* Rapid privilege escalation followed by sensitive access
|
|
|
489
|
+
|
|
|
490
|
+**Value**
|
|
|
491
|
+
|
|
|
492
|
+* Detects early-stage attacker activity
|
|
|
493
|
+* High audit and compliance relevance
|
|
|
494
|
+* Low operational noise when tuned correctly
|
|
|
495
|
+
|
|
|
496
|
+---
|
|
|
497
|
+
|
|
|
498
|
+## C3. Lateral Movement & Internal Reconnaissance
|
|
|
499
|
+
|
|
|
500
|
+**Example Use Cases**
|
|
|
501
|
+
|
|
|
502
|
+* Multiple authentication successes across different hosts in a short time
|
|
|
503
|
+* SMB or RDP access patterns indicating lateral movement
|
|
|
504
|
+* Admin account accessing many servers rapidly
|
|
|
505
|
+* Internal scanning or enumeration behavior
|
|
|
506
|
+
|
|
|
507
|
+**Value**
|
|
|
508
|
+
|
|
|
509
|
+* Identifies attacker movement after initial compromise
|
|
|
510
|
+* Difficult to detect without correlation
|
|
|
511
|
+* Strong indicator of real intrusion activity
|
|
|
512
|
+
|
|
|
513
|
+---
|
|
|
514
|
+
|
|
|
515
|
+## C4. Ransomware Early Warning Indicators
|
|
|
516
|
+
|
|
|
517
|
+**Example Use Cases**
|
|
|
518
|
+
|
|
|
519
|
+* Mass file rename or encryption behavior
|
|
|
520
|
+* Shadow copy deletion
|
|
|
521
|
+* Backup or recovery service stopped unexpectedly
|
|
|
522
|
+* High-risk process execution prior to file access
|
|
|
523
|
+
|
|
|
524
|
+**Value**
|
|
|
525
|
+
|
|
|
526
|
+* Detects ransomware before full impact
|
|
|
527
|
+* High business risk reduction
|
|
|
528
|
+* Strong executive-level interest
|
|
|
529
|
+
|
|
|
530
|
+---
|
|
|
531
|
+
|
|
|
532
|
+## C5. Endpoint & Server Behavior Anomalies
|
|
|
533
|
+
|
|
|
534
|
+**Example Use Cases**
|
|
|
535
|
+
|
|
|
536
|
+* Unusual process execution on critical servers
|
|
|
537
|
+* Command-line anomaly detection
|
|
|
538
|
+* Creation of scheduled tasks or persistence mechanisms
|
|
|
539
|
+* Unexpected software installation
|
|
|
540
|
+
|
|
|
541
|
+**Value**
|
|
|
542
|
+
|
|
|
543
|
+* Complements EDR detections
|
|
|
544
|
+* Detects living-off-the-land techniques
|
|
|
545
|
+* Useful for threat hunting and incident investigation
|
|
|
546
|
+
|
|
|
547
|
+---
|
|
|
548
|
+
|
|
|
549
|
+## C6. Cloud & SaaS Security Monitoring (If Applicable)
|
|
|
550
|
+
|
|
|
551
|
+**Example Use Cases**
|
|
|
552
|
+
|
|
|
553
|
+* Cloud administrator role changes
|
|
|
554
|
+* API key misuse or abnormal API usage
|
|
|
555
|
+* Suspicious SaaS login behavior
|
|
|
556
|
+* Large or unusual data download activity
|
|
|
557
|
+
|
|
|
558
|
+**Value**
|
|
|
559
|
+
|
|
|
560
|
+* Extends visibility beyond on-prem systems
|
|
|
561
|
+* Important for hybrid and cloud environments
|
|
|
562
|
+* Often required by security audits
|
|
|
563
|
+
|
|
|
564
|
+---
|
|
|
565
|
+
|
|
|
566
|
+## C7. SOC & Operational Maturity Monitoring
|
|
|
567
|
+
|
|
|
568
|
+**Example Use Cases**
|
|
|
569
|
+
|
|
|
570
|
+* Alert fatigue and recurring alert patterns
|
|
|
571
|
+* Incidents exceeding SLA targets
|
|
|
572
|
+* Detection coverage gaps
|
|
|
573
|
+* Log ingestion health and drift detection
|
|
|
574
|
+
|
|
|
575
|
+**Value**
|
|
|
576
|
+
|
|
|
577
|
+* Improves SOC efficiency and effectiveness
|
|
|
578
|
+* Provides management-level insight
|
|
|
579
|
+* Supports continuous security improvement
|