GP.Facilities Monitoring: Difference between revisions

From OIAr
Jump to navigation Jump to search
(Created page with "{{Maturity|3}} {{Pageheaderbox4GP |name=Facilities Monitoring |sector=Operations |version=0.4 |owner=J.A.H. Schoonderbeek |summary=This Pattern helps Operations and Security p...")
 
No edit summary
 
(3 intermediate revisions by one other user not shown)
Line 7: Line 7:
|summary=This Pattern helps Operations and Security personnel to monitor other facilities for noteworthy events.
|summary=This Pattern helps Operations and Security personnel to monitor other facilities for noteworthy events.
}}
}}
forthcoming
Realizations of this Pattern can be used monitor other facilities for noteworthy events. This kind of facility is often used to help Operations and Security personnel in their functions.
 
The Pattern has functionality to trigger reactive management actions, but it can also trigger events pro-actively if patterns of suspect behaviour or suspect state are supplied to the Rules Engine. Therefore, this Pattern covers many use cases, among others:
* Centralized log services, that allow (automated or manual) inspection of system event logs.
* Central system monitoring services provide status information to their users, be they infrastructure administrators and/or service managers;
* Security Incident and Event Monitoring (SIEM) systems, that can alert when a security incident occurs, and report on the security state of the connected facilities.
* Intrusion Detection Systems (IDS), that monitor network or system activities for suspect or malicious activities or policy violations. To this end, the Filtering function of the Pattern is implemented in each facility that's being guarded, to scan the streaming data in those facilities. It is the job of the Rules Engine to match the normalized data with patterns that are identified as suspect or malicious.
* Intrusion Prevention Systems (IPS), that work like IDS systems, but are also capable of shutting down the data streams and/or other activities in the guarded facilities if a suspicious activity or policy violation is detected. Note that in this case the Filtering function does not only provide the Pattern with the information needed to determine intrusion; it also directly interacts with the guarded facility. If an IPS takes more elaborate actions, then you may have to augment this Pattern with matching Generic Functions.
{{Pattern Realizes
|service=GS.Facilities Monitoring
}}
{{Pattern Graphic
{{Pattern Graphic
|graphic=No graphic yet.png
|graphic=GP.Facilities Monitoring.png
|source=GP.
|source=GP.
|size=400px
|size=650px
|title=Generic Pattern Facilities Monitoring
|kind=Generic
|kind=Generic
}}
}}
Line 18: Line 29:
|function=GF.Rules Engine
|function=GF.Rules Engine
|choice=Must
|choice=Must
|reason=This function represents the intelligence that drives the services provided by the Pattern. Active collection of information, responses caused by incoming information, and ways and means to alert and/or report are all directed by (implicit or explicit) rules.
|reason=This function represents the intelligence that drives the services provided by the Pattern. All data collected by the facility should be normalized, and must be investigated for patterns that signal noteworthy security or operational events. Active collection of information, responses caused by incoming information, and ways and means to alert and/or report are all directed by (implicit or explicit) rules.  
}}
}}
{{Generic Pattern Composition Row
{{Generic Pattern Composition Row
|function=GF.Data Scanning
|function=GF.Data Scanning
|choice=May
|reason=This function is used to collect data from in transit data traffic (network flows and traffic patterns).
}}
{{Generic Pattern Composition Row
|function=GF.Logging
|choice=May
|reason=This function is often included, as it enables Facilities Monitoring to monitor (operational or security) events that have occurred in the monitored systems.
}}
{{Generic Pattern Composition Row
|function=GF.Status Retrieval
|choice=May
|reason=This function enables Facilities Monitoring to monitor parameters that define the status of the monitored systems.
}}
{{Generic Pattern Composition Row
|function=GF.Configuration Retrieval
|choice=May
|reason=This function can be used to monitor the configuration of the monitored systems, so that any change in a system's configuration can be detected.
}}
{{Generic Pattern Composition Row
|function=GF.Configuration Register
|choice=May
|reason=If Facilities Monitoring is to monitor system configurations, it may be necessary to compare the detected configuration with a target configuration, and/or to store the detected configuration for reference purposes; for either of these purposes the Configuration Register function can be of use.
}}
{{Generic Pattern Composition Row
|function=GF.Scheduling
|choice=May
|reason=Scheduling can serve to run monitoring jobs, such as configuration retrieval, on regular or predetermined times
}}
{{Generic Pattern Composition Row
|function=GF.Reporting
|choice=Must
|reason=This function creates and delivers the reports that reflect the operational and security state of the monitored facilities.
}}
{{Generic Pattern Composition Row
|function=GF.Alerting
|choice=May
|reason=This function delivers warning messages and/or signals that are triggered by the processing of all manners of (combinations of) detected facility events.
}}
{{Generic Pattern Composition Row
|function=GF.Controlling
|choice=Must
|choice=Must
|reason=All data collected by the facility should be normalized, and must be investigated for patterns that signal noteworthy security or operational events.
|reason=If implemented, this function can be used by administrators, and possibly by authorized clients, to change the way the Pattern works. Among the changes that can be made via this function are:
* The rules used to normalize monitored data;
* The composition of reports, as well as scheduled creation and delivery of them;
* The addresses and methods used to deliver alerts.
Care must be taken to limit access to this function to authorized systems and users.
}}
}}
{{Table Ending}}
{{Table Ending}}

Latest revision as of 22:11, 17 June 2015


This is a Generic Pattern document GP Facilities Monitoring Version: 0.4 OIAr logo
Document type: Generic Pattern Owner:

J.A.H. Schoonderbeek



Description

This Generic Pattern belongs to "Operations". Realizations of this Pattern can be used monitor other facilities for noteworthy events. This kind of facility is often used to help Operations and Security personnel in their functions.

The Pattern has functionality to trigger reactive management actions, but it can also trigger events pro-actively if patterns of suspect behaviour or suspect state are supplied to the Rules Engine. Therefore, this Pattern covers many use cases, among others:

  • Centralized log services, that allow (automated or manual) inspection of system event logs.
  • Central system monitoring services provide status information to their users, be they infrastructure administrators and/or service managers;
  • Security Incident and Event Monitoring (SIEM) systems, that can alert when a security incident occurs, and report on the security state of the connected facilities.
  • Intrusion Detection Systems (IDS), that monitor network or system activities for suspect or malicious activities or policy violations. To this end, the Filtering function of the Pattern is implemented in each facility that's being guarded, to scan the streaming data in those facilities. It is the job of the Rules Engine to match the normalized data with patterns that are identified as suspect or malicious.
  • Intrusion Prevention Systems (IPS), that work like IDS systems, but are also capable of shutting down the data streams and/or other activities in the guarded facilities if a suspicious activity or policy violation is detected. Note that in this case the Filtering function does not only provide the Pattern with the information needed to determine intrusion; it also directly interacts with the guarded facility. If an IPS takes more elaborate actions, then you may have to augment this Pattern with matching Generic Functions.

Services realized

This Pattern realizes the following service(s):

  • Facilities Monitoring (This service allows its users to monitor IT facilities with the aim of guarding operational continuity or security.)

Functional and Integration view

This is the graphic representation of the functional model of this Generic Pattern:

Generic Pattern Facilities Monitoring
Generic Pattern Facilities Monitoring


Generic Pattern Composition

This pattern is an aggregation of the following (mandatory and optional) functions, expressed in Generic Functions:

Icon Function Inclusion Rationale
GF.Rules Engine icon Rules Engine recommended This function represents the intelligence that drives the services provided by the Pattern. All data collected by the facility should be normalized, and must be investigated for patterns that signal noteworthy security or operational events. Active collection of information, responses caused by incoming information, and ways and means to alert and/or report are all directed by (implicit or explicit) rules.
GF.Data Scanning icon Data Scanning optional This function is used to collect data from in transit data traffic (network flows and traffic patterns).
GF.Logging icon Logging optional This function is often included, as it enables Facilities Monitoring to monitor (operational or security) events that have occurred in the monitored systems.
GF.Status Retrieval icon Status Retrieval optional This function enables Facilities Monitoring to monitor parameters that define the status of the monitored systems.
GF.Configuration Retrieval icon Configuration Retrieval optional This function can be used to monitor the configuration of the monitored systems, so that any change in a system's configuration can be detected.
GF.Configuration Register icon Configuration Register optional If Facilities Monitoring is to monitor system configurations, it may be necessary to compare the detected configuration with a target configuration, and/or to store the detected configuration for reference purposes; for either of these purposes the Configuration Register function can be of use.
GF.Scheduling icon Scheduling optional Scheduling can serve to run monitoring jobs, such as configuration retrieval, on regular or predetermined times
GF.Reporting icon Reporting recommended This function creates and delivers the reports that reflect the operational and security state of the monitored facilities.
GF.Alerting icon Alerting optional This function delivers warning messages and/or signals that are triggered by the processing of all manners of (combinations of) detected facility events.
GF.Controlling icon Controlling recommended If implemented, this function can be used by administrators, and possibly by authorized clients, to change the way the Pattern works. Among the changes that can be made via this function are:
  • The rules used to normalize monitored data;
  • The composition of reports, as well as scheduled creation and delivery of them;
  • The addresses and methods used to deliver alerts.

Care must be taken to limit access to this function to authorized systems and users.

Services connected with this Generic Pattern

This Generic Pattern has the following mandatory and optional relations with adjacent Generic Services.

Service Adjacency Summary Rationale
Data Management recommended This service provides its consumers the ability to manage strictly structured data. A Facilities Monitoring Pattern is likely to require some sort of structured data store to keep records of the data and events it has collected, reports generated et cetera.
Authentication & Authorization optional This service can validate an identity claim, and it can validate the permissions required for an action, as part of an Authentication & Authorization process. Access to the services provided by the Facilities Monitoring Pattern is likely to be limited to authorized personnel; furthermore, the Facilities Monitoring system itself may require permissions to be able to collect data from the facilities that it's monitoring

Applied Patterns based on this Generic Pattern

The following Applied Patterns are based wholly or in part on this Generic Pattern: