Early Threat Detection and Safeguarding Data with IBM QRadar and IBM Copy Services Manager on IBM DS8000

Blueprint

Published 04 March 2022, updated 21 April 2022

cover image

ISBN-10: 0738460400
ISBN-13: 9780738460406
(44 pages)

More options

Rate and comment

Abstract

The focus of this blueprint is to highlight early threat detection by IBM® QRadar® and to proactively start a cyber resilience workflow in response to a cyberattack or malicious user actions.

The workflow uses IBM Copy Services Manager (CSM) as orchestration software to start IBM DS8000® Safeguarded Copy functions. The Safeguarded Copy creates an immutable copy of the data in an air-gapped form on the same DS8000 system for isolation and eventual quick recovery.

This document also explains the steps that are involved to enable and forward IBM DS8000 audit logs to IBM QRadar.

It also discusses how to use create various rules to determine a threat, and configure and start a suitable response to the detected threat in IBM QRadar.

Finally, this document explains how to register a storage system and create a Scheduled Task by using CSM.

Table of contents

Executive summary
Scope
Introduction
Prerequisites
Solution overview
Lab setup
Summary
Appendix A

Follow IBM Redbooks

Follow IBM Redbooks