After the Attack. The Transformation of EMC Security Operations



Similar documents
Advanced SOC Design. Next Generation Security Operations. Shane Harsch Senior Solutions Principal, MBA GCED CISSP RSA

After the Attack: RSA's Security Operations Transformed

The session is about to commence. Please switch your phone to silent!

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

Advanced Threats: The New World Order

The Future of the Advanced SOC

Security Analytics for Smart Grid

RSA Security Anatomy of an Attack Lessons learned

The Next Generation Security Operations Center

Getting Ahead of Advanced Threats

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Security and Privacy

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

Data Analytics for a Secure Smart Grid

Using Network Forensics to Visualize Advanced Persistent Threats

SECURITY MEETS BIG DATA. Achieve Effectiveness And Efficiency. Copyright 2012 EMC Corporation. All rights reserved.

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015

Advanced Persistent Threats

Covert Operations: Kill Chain Actions using Security Analytics

Into the cybersecurity breach

Comprehensive Advanced Threat Defense

Threat Intelligence: The More You Know the Less Damage They Can Do. Charles Kolodgy Research VP, Security Products

Targeted Intrusion Remediation: Lessons From The Front Lines. Jim Aldridge

Defending Against Data Beaches: Internal Controls for Cybersecurity

Combating a new generation of cybercriminal with in-depth security monitoring

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

RSA Security Analytics the complete approach to security monitoring or how to approach advanced threats

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

DYNAMIC DNS: DATA EXFILTRATION

Advanced Threat Protection with Dell SecureWorks Security Services

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Spear Phishing Attacks Why They are Successful and How to Stop Them

Rashmi Knowles Chief Security Architect EMEA

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

RSA Security Analytics

Best Practices to Improve Breach Readiness

Practical Steps To Securing Process Control Networks

A New Perspective on Protecting Critical Networks from Attack:

CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics

Software that provides secure access to technology, everywhere.

Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention

Intelligence Driven Security

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

Digital Evidence and Threat Intelligence

Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security

Incident Response. Six Best Practices for Managing Cyber Breaches.

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Enterprise Cybersecurity: Building an Effective Defense

Protecting Your Organisation from Targeted Cyber Intrusion

Perspectives on Cybersecurity in Healthcare June 2015

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

Developing Secure Software in the Age of Advanced Persistent Threats

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

BIG DATA. Shaun McLagan General Manager, RSA Australia and New Zealand CHANGING THE REALM OF POSSIBILITY IN SECURITY

Fighting Advanced Threats

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia

Data Center security trends

CYBER ATTACKS CASHING IN ON RETAILERS: A WEBINAR ON CYBERSECURITY

Joining Forces: Bringing Big Data to your Security Team

Defending Against Cyber Attacks with SessionLevel Network Security

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

Detect & Investigate Threats. OVERVIEW

SIEM is only as good as the data it consumes

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

Hunting for Indicators of Compromise

A Case for Managed Security

idata Improving Defences Against Targeted Attack

Unified Security, ATP and more

Enterprise Cybersecurity: Building an Effective Defense

Endpoint Threat Detection without the Pain

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

WHITEPAPER. How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013

Using SIEM for Real- Time Threat Detection

Seven Things To Consider When Evaluating Privileged Account Security Solutions

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

2010 Data Breach Investigations Report

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

IT Security Strategy and Priorities. Stefan Lager CTO Services

Things To Do After You ve Been Hacked

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Breaking the Cyber Attack Lifecycle

An New Approach to Security. Chris Ellis McAfee Senior System Engineer

2012 Data Breach Investigations Report

Incident Response 101: You ve been hacked, now what?

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

Incident Response. Proactive Incident Management. Sean Curran Director

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

Transcription:

After the Attack The Transformation of EMC Security Operations Thomas Wood Senior Systems Engineer, GSNA CISSP RSA, The Security Division of EMC Thomas.WoodJr@rsa.com 1

Agenda Review 2011 Attack on RSA Threat Landscape Key functions of a Security Operations Center The Tyranny of The News Cycle Organizational Impact RSA ACD & ASOC 2

The Environment ~ 2,000 security devices ~55M security events per hour ~60K employees 350 sites 85 countries Core Intellectual Property 3

EMC SWAT 2005 Special Weapons And Tactics Basic security tools Firewalls Anti-virus Authentication Handful of skilled practitioners Knows how the tech works Understands the different parts of the business / IT 4

Structure of Pre-Breach CIRC Eyes on Glass Analysis Forensic Coordination Remediation Rule/Report Creation Workflow Development RSA CIRC 2009-2011 L1 L2 L3 5

Technology Pre-Breach Incident Tracking Vulnerability Risk Management Firewall IPS Proxy AV SharePoint Security Operations (RSA Archer) Security Controls Windows Clients/Servers File Servers RSA SIEM Databases Data Discovery (RSA DLP) Log Analysis Reporting Event Forensics NAS/SAN Endpoints Limited Real-Time Response Limited Visibility 6

The Attack Companies can t stand against the armies of nation states. Why do we believe we can stand against their cyber army? Sam Curry, RSA 7

The Initial Vector in the RSA Attack 1 2 Phishing emails Some clues about the email lead us to believe that this was from some slightly dated research on employees 2 Launch Zero day One user opened email attachment (an Excel spreadsheet) which launches a flash zero day 3 Attacker gains access to other machines Zero day exploit installs backdoor (Poison Ivy Rat Variant) which enables extraction of memory resident password hashes X X X X X 8

From Compromise to Exfiltration 4 Attacker initiates separate network using credentials obtained from steps 1 3 5 Attacker moves laterally through organization, heavily using escalation of privileges, to systems containing disparate information that when combined allowed compromise of RSA SecurID related information ATTACKER 6 Attacker removes data and stages it on a file share within the network 7 Files are encrypted and attacker tries to ex filtrate to several servers before finding a successful destination. External Server 9

Additional RSA Attack Details Focused and coherent attack Times of attack were choreographed Attacker moved rapidly to the target: knew what to get and the order to get them Implication: Significant reconnaissance and preparation Leveraged Prior Experience Exploited people and processes more than weaknesses in infrastructure Remote (attacker) hosts were modified to match internal naming structure Very detailed knowledge of the people, process, & infrastructure Implication: People continue to be the easiest target Fresh malware was used Compiled 6 hours before the event Implication: Malware was specifically customized; no known signature to block General list of Command and Control Domains for RSA attack were published in a longer list in the US-CERT EWIN 11-077-01A. The important ones include: *.mincesur.com, *.hopto.org, *.cz88.net 10

The Business Impact $70 Million Write-Down Cost of remediation, IT, investigation, consulting, lost revenue, lost productivity Six months focused on remediating authenticators All Authentication-related marketing & sales activity stopped for 6 months Impact to trust Customers: how could you do this to us? Why didn t you contact us first (10-15K customers) Lost some customers permanently All despite no risk to customers 11

Present Reality The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him. - Sun Tzu, The Art of War 12

Traditional Security Is Not Working 99% of breaches led to compromise within days or less with 85% leading to data exfiltration in the same time 85% of breaches took weeks or more to discover Source: Verizon 2012 Data Breach Investigations Report 13

Advanced Threats Are Different 1 TARGETED SPECIFIC OBJECTIVE 2STEALTHY 3 INTERACTIVE LOW AND SLOW HUMAN INVOLVEMENT System Intrusion Attack Begins Cover-Up Discovery Leap Frog Attacks Cover-Up Complete TIME Dwell Time Response Time Attack Identified Response 1 Decrease Dwell Time 2 Speed Response Time 14

What s Old Is New Again The consequence of it is, {215} that the United States are to a certain extent in the situation of a country precluded from foreign Commerce. They can indeed, without difficulty obtain from abroad the manufactured supplies, of which they are in want; but they experience numerous and very injurious impediments to the emission and vent of their own commodities. Nor is this the case in reference to a single foreign nation only. The regulations of several countries, with which we have the most extensive intercourse, throw serious obstructions in the way of the principal staples of the United States. Alexander Hamilton REPORT ON MANUFACTURES DECEMBER 5, 1791 15

Online Trust Alliance Guide to Data Protection and Breach Readiness (2013) 2,644 Breaches 267 Million Records $5.5M cost per Breach $194 cost per Record 99% records lost due to external hacking 97% of data breach incidents were avoidable 16

Verizon Breach Report (2013) Highlights Victims 37% financial 24% retail & restaurants 20% manufacturing Perpetrators 92% outsiders 19% state-affiliated actors Mode 76% exploit weak/stolen credentials 75% financially motivated Discovery 69% by external parties 66% took months or more to discover 17

Verizon Report Recommendations Eliminate unnecessary data Collect, analyze, share Incident data Threat intelligence Focus on better and faster detection Evaluate threat landscape 18

The Adversary NATION STATE ACTORS Nation states Government, defense contractors, IP rich organizations, waterholes CRIMINALS Petty criminals Unsophisticated, but noisy Organized crime Organized, sophisticated supply chains (PII, PCI, financial services, retail) NON-STATE ACTORS Insiders Various reasons, including collaboration with the enemy Cyber-terrorists / Hacktivists Political targets of opportunity, mass disruption, mercenary 19

Understanding the threat Attack Lifecycle Recon Weaponization Delivery Exploitation Installation C2 Act on Objectives 7-Phase Model for how an adversary engages a victim Any disruption in the chain will impact their actions Human intervention is often required for success and failure All seven steps can be detected, prevented, or minimized Note/ Attribution: Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains ; Hutchins, Cloppert, Amin, Lockheed Martin CIRT; Proceedings of the 6th International Conference on Information Warfare, 2011 20

Objective: Affect the Attack Lifecycle Attack Lifecycle Reconnaissance Detect Deny Disrupt Degrade Deceive Weaponize Delivery Exploitation Installation C2 Action 21

Security Is Becoming A Big Data Problem More determined adversary means more data needed to identify attacks More complex IT environment means even simple attacks can hide in plain sight Security professionals are struggling to keep up 1 40% of all survey respondents are overwhelmed with the security data they already collect 35% have insufficient time or expertise to analyze what they collect 1 EMA, The Rise of Data-Driven Security, Crawford, Aug 2012 Sample Size = 200 22

Today s Security Requirements Big Data Infrastructure Need a fast and scalable infrastructure to conduct short term and long term analysis High Powered Analytics Give me the speed and smarts to discover and investigate potential threats in near real time Comprehensive Visibility See everything happening in my environment and normalize it Integrated Intelligence Help me understand what to look for and what others have discovered 23

Desired State Protect organizational mission Evolve with the threat environment Operational efficiencies & best practices Process Technolog y People 24

What SOC/CIRCs Need: BROAD VISIBILITY & DETECTION Fusing together massive amounts of telemetry data & threat intelligence to detect even the most advanced attacks CONTEXT Knowing which IT assets are important and the location of sensitive data drives investigative efficiency and prioritization FAST INVESTIGATIONS Complete investigations in minutes versus hours REMEDIATION & OPERATIONS MANAGEMENT Workflow driven incident response and SOC/CIRC operations management 25

People & Process Technology requires talent and discipline 26