24/7 Customer support

Security Change Monitor

This toolset is part of our overall Tribe Security Intelligence Service.

Overview

The Security Change Monitor, is a security system deployed by Tribe and powered by our TechOps Team.

The Tribe Technical Delivery team will deploy collectors to site(s) and connect to the various cloud services described to gather and monitor data.

Ongoing, Tribe will capture and respond to alerts created by the Security Change Monitor, the alerts will pass through the Tribe security response process and be actioned by the Tribe Security Team.

The following are the key aspects of what is implemented as part of the Security Change Monitor, and the settings required for Tribe to gather security and documentation information in a customer environment.

Deployed Intelligence Collection and Actions

Microsoft Office 365 – Cloud Collector

Pull data on licencing, users, groups, mail routing, and actionable summary information like security policies and used licence counts.

Implementation:

  • Create a New App Registration within Office 365
  • Generate a Key for Security Change Monitor
  • For security purposes, the key generated will NOT be documented
  • Configure Read Only API permissions for the following:
    • Access Review
    • Audit Log
    • Contacts
    • Directory
    • Administration
    • Group
    • Identity Risk Event
    • Identity Risk User
    • Mailbox Settings
    • Member
    • Program Control
    • Reports
    • Security Events
    • Sites
    • Users
    • Grant API permissions for all users
    • Add Application ID / Directory ID / Key into Security Change Monitor


Post Implementation:

  • Data will be pulled daily into Security Change Monitor via the Cloud Agent
  • Security Change Monitor syncs with ITGlue and ITGlue entries will be updated


Internet Domains – Cloud Collector

Track expirations, changes, and renewals with deep and details web domain, DNS, A, C, MX record details, SSL assessments, and more.

Implementation:

  • Each domain will be added to Security Change Monitor


Post Implementation:

  • Daily DNS lookups will be performed on the domain by the Cloud Agent
  • Data will be pulled daily into Security Change Monitor via the Cloud Agent
  • ASI syncs with ITGlue and ITGlue entries will be updated


TLS / SSL – Cloud Collector

Perform a deep inspection of the TLS/SSL certificate, with details on protocols, vulnerabilities, expiration data, and more.

Implementation:

  • Each certificate will be added to Security Change Monitor


Post Implementation:

  • Daily Certificate lookups will be performed on the domain by the Cloud Agent
  • Data will be pulled daily into Security Change Monitor via the Cloud Agent
  • Security Change Monitor syncs with ITGlue and ITGlue entries will be updated


Active Directory – AD based Collector

Discover and document users, groups, roles, devices, security policies, and more.

Implementation:

  • A Domain Administrator account will be created and used as a service account for the Agent
  • For security purposes, the credentials for this account will NOT be documented
  • An Agent will be installed on Domain Controller
  • The Agent will be linked to Security Change Monitor using APIs


Post Implementation:

  • Daily Active Directory scans will be run by the Agent on Domain Controller
  • Data will be sent to Security Change Monitor by the Agent
  • Security Change Monitor syncs with ITGlue and ITGlue entries will be updated


SQL Server – SQL Collector

Capture details on SQL databases, users, roles, groups, jobs, maintenance plans, backups, and more.

Implementation:

  • A SQL Login account will be created on each SQL Server
  • The SQL Account will be named RoarAgentSQL and it will be a sysadmin
  • The Account will be listed as a db_owner on each database on the server
  • For security purposes, the account credentials will NOT be documented
  • Monitoring will be done by the Agent on Domain Controller


Post Implementation:

  • The SQL Server will be polled daily at 05:00
  • Data will be sent to SIS by the Agent on Domain Controller
  • ASI syncs with ITGlue and ITGlue entries will be updated


Azure– Cloud Collector (Only applies if customer has any active subscriptions within Azure)

Document virtual machines, Azure AD users and groups, network, security groups, and more.

Implementation:

  • For security purposes, a separate App Registration will be created for the Azure Monitoring rather than utilizing the Office 365 Application
  • Create a New App Registration within Office 365
  • Generate a Key for Security Change Monitor
  • Read Only API permissions will be setup for the following:
    • Group
    • User
  • IAM Permissions will be granted to the Application for each Azure Subscription
  • Azure Inspector will be added to Security Change Monitor


Post Implementation:

  • Data will be pulled daily into Security Change Monitor via the Cloud Agent
  • Security Change Monitor syncs with ITGlue and ITGlue entries will be updated


Identity Monitoring – AD based Collector

Identify and monitor accounts that have been reported in known data breaches

Implementation:

  • An account list will be exported from Office 365 and imported via CSV into Security Change Monitor


Post Implementation:

  • Weekly Lookups will be performed via API to see if any email addresses are listed in known breaches on https://haveibeenpwned.com
  • Security Change Monitor syncs with ITGlue and ITGlue entries will be updated


Fortigate – AD based Collector

Inspect FortiGate devices to document interfaces, firewall and NAT rules, and more.

Implementation:

  • Create a profile on each firewall which allows Read Only access
  • Create an API Account on each firewall being monitored and provide it with the Read Only profile
  • Logons will be limited to Domain Controller


Post Implementation:

  • Firewalls will be polled daily at 05:00 by the Agent on Domain Controller
  • Data will be pushed to Security Change Monitor
  • Security Change Monitor syncs with ITGlue and ITGlue entries will be updated


Windows – Server based Collector

Inspect a Windows Server to view disk information, file shares, installed software and services, patch levels, and more.

Implementation:

  • Enable-PSRemoting will be run on servers to allow remote commands


Post Implementation:

  • Monitoring will be done by the Agent and account on Domain Controller
  • Data will be pushed to Security Change Monitor
  • Security Change Monitor syncs with ITGlue and ITGlue entries will be updated


UniFi – AD based Collector

Inspect a single or multi-tenant UniFi controller, to document details like attached devices, network details including DHCP scopes, and more.

Implementation:

  • Create a Read Only account on the Controller
  • For security purposes, credentials will NOT be documented
  • Inspector will be configured in Security Change Monitor


Post Implementation:

  • Controller will be polled daily by the Agent on Domain Controller
  • Data will be pushed to Security Change Monitor
  • Security Change Monitor syncs with ITGlue and ITGlue entries will be updated


StorageCraft SPX – AD based Collector

Capture data on backup jobs, image chains, volumes protected, and more.

Implementation:

  • Remote Access within ShadowProtect on each server
  • Remote Access will be configured on TCP 55815
  • Inspectors in Security Change Monitor will be configured for each server being monitored


Post Implementation:

  • ShadowProtect will be polled daily at 06:00 by the Agent on Domain Controller
  • Data will be pushed to Security Change Monitor
  • ASI syncs with ITGlue and ITGlue entries will be updated


Network Discovery – AD based Collector

Scan your network to identify network IPs and hosts.

Implementation:

  • The Server Subnet will be added to Security Change Monitor
  • Common ports will be checked on all detected hosts, this includes:
    • 21
    • 22
    • 80
    • 443
  • Reverse DNS Lookups will be enabled
  • SNMP Checks will also be performed on all detected hosts


Post Implementation:

  • The Network Discovery task will run daily from Domain Controller
  • Data will be pushed to Security Change Monitor
  • Security Change Monitor syncs with ITGlue and ITGlue entries will be updated


ESXi – AD based Collector

Pull back information about VMs, hosts, datastores, and more.

Implementation:

  • SSH will be enabled on each host if it is not already enabled
  • An Administrative account will be created on each host
  • For security purposes, the credentials for these accounts will NOT be documented


Post Implementation:

  • Servers will be polled daily by Domain Controller
  • Data will be pushed to Security Change Monitor
  • Security Change Monitor syncs with ITGlue and ITGlue entries will be updated