As we’ve written before, Suricata is a high-performance network threat detection, IDS, IPS and network security monitoring (NSM) engine. It is open source and owned by a community-run nonprofit foundation, the Open Information Security Foundation (OISF). Suricata is developed by OISF, its supporting vendors and a passionate community of volunteers.
From its humble beginnings in 2008 as a signature-based intrusion detection system (IDS), Suricata has now grown into a powerful IDS/IPS/NSM and evolved to include full-featured packet capture, scripting, and network security monitoring capabilities that rivals those of dedicated solutions. In fact, Suricata has in recent years, formed the foundation of many successful commercial products and spawned an incredible ecosystem of independent ruleset/signature and threat intelligence providers.
For all Suricata’s capabilities, building out an enterprise-scale deployment of Suricata with mostly open source tools can be a challenge.
For example, in smaller deployments such as in a single office location, keeping the system up to date with the latest signature rulesets and/or threat intelligence can be performed manually and doesn’t take too long. But in an Enterprise deployment with multiple network segments, branch offices and cloud applications, you will want to automate that process to make sure that all the sensors are running in lock step.
In a series of blog posts, we plan to review five ways to improve the scalability of Suricata in an enterprise deployment. In each case, we try to offer a free or open source choice and in some cases we identify straightforward commercial solutions that can provide a fully-supported alternative.
In this first article, we begin with a critical starting point - Optimizing Suricata Sensor Placement.
Note: for a more complete review of all five improvements, please check out the white paper, Scaling Suricata for Enterprise Deployment. You can download your copy here >>
The foundation for effective network detection and response is based on the proper placement and configuration of the Suricata sensors, effectively your eyes and ears into the network traffic. Improper placement from poor planning or misconfiguration can lead to gaps in network visibility, which can allow attackers to go undetected for prolonged periods of time and to penetrate deeper into your network.
Before we discuss the specifics of placement, it is worth mentioning that Suricata may be deployed in either active (in-line) or passive (monitor only) mode. This paper is focused more on monitoring mode, typically of a SPAN/Mirror port. There are two reasons for deploying in passive monitoring mode: 1) the sensor cannot in any way affect the operations of your network and 2) the passive deployment provides greater visibility and more rich metadata context 3) attackers are much less likely to detect and locate the presence of the monitor and it is therefore less likely to become a target itself.
When considering sensor placement, you must thoroughly understand your network topology as well as which are the critical assets on the network that an attacker may attempt to compromise. You have the strategic advantage of knowing your network topology better than the attackers, so, it is crucial that the security team must work closely with the network and IT architects to identify all the critical monitoring points for your organization. Use this knowledge to your advantage.
While it is not realistic to monitor 100% of the traffic passing among all the systems in your network, it is necessary to look carefully at your options to prioritize your activities and maximize coverage.
Consider the following major areas where you may wish improve your network traffic visibility:
Note: you may either set up the sensors physically near the correct network segment, or you can direct the appropriate traffic to the sensor network ports via a span/mirror port from a central switch location.
When deployed throughout the enterprise network at strategic locations described above, Suricata sensors can provide your security team with excellent visibility and form the foundation of a formative threat detection and response program.
In future blog articles, we will cover the other four suggestions that can help you improve the scalability of Suricata in your enterprise:
If you are interested in exploring this topic further, we recommend the following resources: