PMO - Netw Forensic - 130319 v2.2
PMO - Netw Forensic - 130319 v2.2
PMO MEETING
07/2019
13/03/19
1 Project Objective 3
2 Executive Summary 4
6 Progress Report 10
7 Risk Assessment 11
1. To present the Project Stakeholder on Network Forensic & Security Analytics Project status
2. Moving forward recommendation
Network Forensic and Security Analytics solution project implementation is to improved visibility to detect malicious
activities by analyzing network traffic and provide better accuracy for identifying and prioritizing threats and risk.
Enhance the bank’s ability to detect, investigate, and respond to cyber security threats to lessening the impact of
cyber-attacks towards bank’s assets.
The solution will be used to identify and generate an evidence specifically related to network activity to aid in
forensic investigation.
Being able to reconstruct and analyze an incident promptly will help to improve bank’s cyber security defenses to
ensure that similar cyber security incidents don’t happen in the future.
This implementation also to address BNM regulatory requirements & findings as below:
Spanned/Port
1st tier Firewall 1st tier Firewall mirror Traffic
3
1
switch switch 5 4
2
T1 T2
TAP-HC0-G100C0
WAF
SMT-HC0-X16
IPS
6
Rdy
Rdy
H/S
Pwr X1 X3 X5 X7 X9 X1 1 X13 X1 5
Pwr X2 X4 X6 X8 X10 X1 2 X14 X1 6
TAP 1 TAP 2 TAP 3 TAP 4 TAP 5 TAP 6 TAP 7 TAP 8 TAP 9 TAP 10 TAP 11 TAP 12
Darktrace
Traffic Flow
1. Traffic from 1st tier firewall is passed to switch and forwarded to Gigamon (tap module)
2. Gigamon decrypts HTTPS traffic
2nd tier Firewall 2nd tier Firewall 3. A copy of traffic (decrypted) is mirrored and sent to Darktrace for analysis
4. Gigamon forwards traffic out to IPS for scanning and IPS sends back to Gigamon (inline
module)
5. Gigamon forwards traffic out to WAF for scanning and WAF sends back to Gigamon (inline
Traffic module)
Mirrored Traffic 6. Gigamon encrypts HTTPS traffic
7. Traffic is forwarded out from Gigamon to switch and to 2nd tier firewall before been forward out to
destination (tap module)
Network Forensic PMO Slide Page 6
HIGH LEVEL ARHITECTURE DIAGRAM Cont.
OPTION 2 – Gigamon replaces network switch
Spanned/Port
1st tier Firewall mirror Traffic
3
TAP-HC0-G100C0
WAF
SMT-HC0-X16
IPS
6
Rdy
Rdy
H/S
Pwr X1 X3 X5 X7 X9 X1 1 X13 X1 5
Pwr X2 X4 X6 X8 X1 0 X1 2 X14 X1 6
TAP 1 TAP 2 TAP 3 TAP 4 TAP 5 TAP 6 TAP 7 TAP 8 TAP 9 TAP 10 TAP 11 TAP 12
7 Darktrace
WAF
Spanned/Port
mirror Traffic
WAF
3
1 4
2 T1
TAP-HC0-G100C0
SMT-HC0-X16
IPS
5
Rdy Rdy
H/S
Pwr X1 X3 X5 X7 X9 X1 1 X13 X1 5
Pwr X2 X4 X6 X8 X10 X1 2 X14 X1 6
TAP 1 TAP 2 TAP 3 TAP 4 TAP 5 TAP 6 TAP 7 TAP 8 TAP 9 TAP 10 TAP 11 TAP 12
6 Darktrace
switch
Traffic Flow
1. Traffic from 1st tier firewall passed to WAF before forward to Gigamon (TAP
module)
2. Gigamon decrypts HTTPS traffic
switch 3. A copy of traffic (decrypted) is mirrored and sent to Darktrace for analysis
(inline module)
4. Gigamon forwards traffic to IPS for scanning and IPS sends back the traffic to
Gigamon (inline module)
Traffic 5. Gigamon encrypts HTTPS traffic
6. Gigamon forwards scanned traffic out to internal network
Mirrored Traffic
4.
Contract Agreement and SOW Signoff:
5. • IT Security provided feedback on the draft SOW document
3. • Ensign, IT Security, VMO and Legal team working together to finalize the
6.
draft of Contract Agreement
7.
Date Criticality
No Key Risk Identified Raised by Likelihood Mitigation Strategy Status Remark
Raise (H, M, L)
1 Extended timeline for 11 Jul Ensign M Possible Ensign will arrange the data centres site On Bank Islam teams are
Technical Workshop 2019 visit on week of 18th Mar to address the going in the midst of
technical concerns from both Bank Islam evaluating the design
IT Security and Network teams. options. Ensign will
assess the progress and
provide update during
next PMO meeting.