Cargando…

Cyber resilient infrastructure : detect, protect, and mitigate threats against Brocade SAN FOS with IBM QRadar /

Enterprise networks are large and rely on numerous connected endpoints to ensure smooth operational efficiency. However, they also present a challenge from a security perspective. The focus of this Blueprint is to demonstrate an early threat detection against the network fabric that is powered by Br...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Place of publication not identified] : IBM Redbooks, 2022.
Edición:[First edition].
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000007i 4500
001 OR_on1302336539
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 220308s2022 xx a o 000 0 eng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d OCLCO  |d OCLCF  |d OCLCQ  |d OCLCO 
024 8 |a 9780738460260 
029 1 |a AU@  |b 000073556056 
035 |a (OCoLC)1302336539 
037 |a 9780738460260  |b O'Reilly Media 
050 4 |a TK5105.59 
082 0 4 |a 363.32/8028557  |2 23 
049 |a UAMI 
245 0 0 |a Cyber resilient infrastructure :  |b detect, protect, and mitigate threats against Brocade SAN FOS with IBM QRadar /  |c IBM Storage Team. 
250 |a [First edition]. 
264 1 |a [Place of publication not identified] :  |b IBM Redbooks,  |c 2022. 
300 |a 1 online resource (20 pages) :  |b color illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references. 
520 |a Enterprise networks are large and rely on numerous connected endpoints to ensure smooth operational efficiency. However, they also present a challenge from a security perspective. The focus of this Blueprint is to demonstrate an early threat detection against the network fabric that is powered by Brocade that uses IBM℗ʼ QRadar℗ʼ. It also protects the same if a cyberattack or an internal threat by rouge user within the organization occurs. The publication also describes how to configure the syslog that is forwarding on Brocade SAN FOS. Finally, it explains how the forwarded audit events are used for detecting the threat and runs the custom action to mitigate the threat. The focus of this publication is to proactively start a cyber resilience workflow from IBM QRadar to block an IP address when multiple failed logins on Brocade switch are detected. As part of early threat detection, a sample rule that us used by IBM QRadar is shown. A Python script that also is used as a response to block the user's IP address in the switch is provided. Customers are encouraged to create control path or data path use cases, customized IBM QRadar rules, and custom response scripts that are best-suited to their environment. The use cases, QRadar rules, and Python script that are presented here are templates only and cannot be used as-is in an environment. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Information technology  |x Security measures. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Technologie de l'information  |x Sécurité  |x Mesures. 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Information technology  |x Security measures  |2 fast 
710 2 |a IBM Storage Team,  |e issuing body. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780738460260/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP