Agent architecture and SOC capabilities
Overview
RocketCyber provides a managed SOC (security operation center) service that leverages the our Threat Monitoring Platform to detect malicious and suspicious activity across three critical attack vectors: Endpoint, Network, and Cloud. Our elite team of security analysts hunt, triage and work with your team when actionable threats are discovered. This document provides a high-level overview of the security and architecture RocketCyber uses to gather security telemetry as diagrammed below.
SOC Data Center
The RocketCyber SOC Data Center for North American customers is physically located in the US. All security data/telemetry is sent/received to this location. RocketCyber leverages Salesforce’s Heroku platform which runs on Amazon AWS to host the SOC platform. Customers have web access to the platform which is encrypted between their browser and the platform using industry standard TLS. RocketCyber supports Two-Factor Authentication (2FA) and strongly recommends its usage to protect customer logins.
RocketCyber Agent Communication
In order to gather security telemetry from endpoints back to the RocketCyber SOC Data Center, customers install a RocketCyber agent that runs on Windows Servers, Windows Workstations, Linux and Mac devices:
Communication: All communication is OUTBOUND from the RocketCyber Agent to the SOC Data Center on port 443. The RocketCyber agent does not accept inbound connection which limits the attack surface. Additionally, the RocketCyber Agent does not support Remote Control or the ability to run user generated content on endpoints.
Encryption: All communication from the RocketCyber Agent is encrypted using the TLS v1.2 protocol and only allow the following strong cipher suites:
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256,
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_128_GCM_SHA256,
TLS_RSA_WITH_AES_256_GCM_SHA384
Endpoint Event Log Monitoring
The RocketCyber agent gathers specific OS system and security logs and forwards these to the SOC in order to detect security events, provide data for SOC analysts to triage incidents and store logs for historical auditing purposes. By default, the following OS logs are collected by the RocketCyber agent:
Windows OS:
104-System Security Log was cleared
1102 - Security - Audit Log was cleared
4722 - Security - A user account was enabled
4735 - Security - Local Group Changed
7040 - System - Service was changed from auto start to disabled
7034 - System - Services Terminated Unexpectedly
4702 - Security - A scheduled task was modified
5142 - Security - A network share object was added
5144 - Security - A network share object was deleted
4625 - Security - An account failed to login
7036 - System - A defensive service was stopped
5145 - Security - A network share object was checked by PsExec
4649 - Security - A replay attack was detected
64004- System - Windows File Protection was unable to restore file to its original version
5143 - Security - A network share object was modified
4740 - Security - A user account was locked out
4698 - Security - A new scheduled task was created
7031 - System - Service terminated unexpectedly
4738 - Security - User account password was changed
4724 - Security - An attempt was made to reset an account's password
4720 - Security - Test user account created
1100 - System - Event logging was shut down
MacOS:
Log Privacy - Privatize log content that contains usernames, ip addresses, and other sensitive information.
Watch_Logon - User logins to the system
SSH_connection - Inbound SSH connections to the Mac
Watch_Logout - User logouts from the system
Failed_Auth - User authentication failure
Sudo_Usage - Privilege Escalation using sudo
Linux OS:
Sudo_Usage - Privilege Escalation using sudo
SSH_login - Inbound SSH connections to the Mac
SSH_failed login - inbound SSH logins failed
User_add - a new user account was created
Password_change - a user's password was changed
Group_change - a group was changed
Del_user_group - a user was removed from a group
Failed_Auth - User authentication failure
SSH_login_pkey - successfully public key login via ssh was detected
SSH_login_pkey_failed - a public key login via ssh failed
user_del - a user account was deleted
new_group - a new group was created
add_user_group - a user was added to a group
Breach Detection
The RocketCyber agent utilizes proprietary technology to monitor Windows and Mac devices for indicators that the device has been compromised. Leveraging the MITRE ATT&CK® framework, the agent collects data related to activity on the device and forwards events to the SOC for triage and security analysis. By default, the following techniques are monitored for Windows OS with a subset for MacOS:
Intrusion Monitoring
The RocketCyber agent monitors network ingress and egress network traffic on the monitored device and alerts the SOC for further analysis based on activity. This includes the following:
-
Cyber Terrorist Network Connection detect network connections to various nation states that have been known to engage in cyberterrorist activities and compares IP address communications against real-time threat feeds to discover connections to malicious IPs, C2 servers, botnets and other backdoor services.
-
Suspicious Network Services detect device network traffic which may be indicative of unusual activity, including Chargen, FTP, Telnet, SMTP, Finger, POP3, SOCKS, DOOM, VNC, Bit Torrent, IRC, Tor, Netbus, RDP and SSH/SFTP.
Malicious File Detection
The RocketCyber agent monitors and detects malicious files that are written to disk or executed and also monitors file communications that are indicative of cyrpto mining software. This additional layer of protection services as a backup for detecting malicious files that slip past your primary antivirus and antimalware solution.
Firewall Analyzer
The RocketCyber agent on Windows OS can serve a secondary purpose as a firewall analyzer. When enabled, the agent will provide a syslog interface to collect logs from local firewalls, parse the data in real-time, and forward a subset of security related events to the RocketCyber SOC for triage and storage. Logs not related to security events can, optionally, be configured to be stored locally on the device and/or be forwarded to an additional log storage location. In addition to capturing firewall security log events, RocketCyber can alert on firewall traffic based on geography and perform IP reputation lookups using our threat intelligence feeds to augment the firewall’s built-in capabilities. The following firewalls are supported:
Cisco (Meraki, ASA, Firepower)
Fortinet
Sonicwall
Sophus XG and UTM
WatchGuard
Untangle
Barracuda
Ubiquiti
PfSense
Juniper
Zyxel
Mikrotik
Check Point
Palo Alto
Conclusion
The RocketCyber agent provides a secure, lightweight and easy to deploy capability to capture security telemetry from endpoints for the RocketCyber SOC to triage and log data. The capabilities go beyond log monitoring to incorporate breach detection, network activity and services, suspicious tools and malicious file detection to provide a comprehensive security solution enabling organizations to implement advanced detection and response capabilities to stop threats that have evaded traditional defenses.