After the Attack: RSA's Security Operations Transformed



Similar documents
Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel

After the Attack. The Transformation of EMC Security Operations

RSA Security Anatomy of an Attack Lessons learned

Separating Signal from Noise: Taking Threat Intelligence to the Next Level

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

Advanced Threats: The New World Order

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Eight Essential Elements for Effective Threat Intelligence Management May 2015

Advanced SOC Design. Next Generation Security Operations. Shane Harsch Senior Solutions Principal, MBA GCED CISSP RSA

Threat Intelligence Buyer s Guide

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

RSA Security Analytics

Enabling Security Operations with RSA envision. August, 2009

FROM INBOX TO ACTION AND THREAT INTELLIGENCE:

Advanced Threat Protection with Dell SecureWorks Security Services

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Software that provides secure access to technology, everywhere.

Using SIEM for Real- Time Threat Detection

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

WHITE PAPER: THREAT INTELLIGENCE RANKING

Understanding the Advanced Threat Landscape an MSPs Guide. IT Security: Enabled

Security Analytics for Smart Grid

Sophisticated Indicators for the Modern Threat Landscape: An Introduction to OpenIOC

How To Build Security By Silo

How We're Getting Creamed

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Evolution Of Cyber Threats & Defense Approaches

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

81% of participants believe the government should share more threat intelligence with the private sector.

Comprehensive Advanced Threat Defense

DYNAMIC DNS: DATA EXFILTRATION

Endpoint Threat Detection without the Pain

Can We Become Resilient to Cyber Attacks?

A Case for Managed Security

Security Intelligence Services.

IT Security Strategy and Priorities. Stefan Lager CTO Services

Joining Forces: Bringing Big Data to your Security Team

Teradata and Protegrity High-Value Protection for High-Value Data

The session is about to commence. Please switch your phone to silent!

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Incident Response. Six Best Practices for Managing Cyber Breaches.

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

Integrating MSS, SEP and NGFW to catch targeted APTs

The Custom Defense Against Targeted Attacks. A Trend Micro White Paper

All about Threat Central

Attack Intelligence: Why It Matters

Unified Security Management and Open Threat Exchange

THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE

Symantec Cyber Security Services: DeepSight Intelligence

Combating a new generation of cybercriminal with in-depth security monitoring

IBM QRadar Security Intelligence April 2013

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

How To Manage Security On A Networked Computer System

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev

Unified Security, ATP and more

Active Response: Automated Risk Reduction or Manual Action?

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

Advice from the Trenches: Preparing for the Challenges and Pressures of a Security Incident Investigation

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

August Investigating an Insider Threat. A Sensage TechNote highlighting the essential workflow involved in a potential insider breach

WHITEPAPER. How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY. Mark

Persistence Mechanisms as Indicators of Compromise

Threat Intelligence: An Essential Component of Cyber Incident Response. Jeanie M Larson, CISSP-ISSMP, CISM, CRISC

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

What is Penetration Testing?

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

Extreme Networks Security Analytics G2 Vulnerability Manager

Modular Network Security. Tyler Carter, McAfee Network Security

Symantec Consulting Services

The Next Generation IPS

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series

Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention

STRATEGIC ADVANTAGE: CONSULTING & ISIGHT INTELLIGENCE

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective

RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst

Agenda , Palo Alto Networks. Confidential and Proprietary.

Fighting Advanced Threats

CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics

Cyber intelligence in an online world

Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense

The SIEM Evaluator s Guide

SOLUTION PRIMER. Rafal Los Director, Solutions Research Office of the CISO, Accuvant. James Robinson Director, Information Security, Accuvant

ADVANCED THREATS IN THE ENTERPRISE. Finding an Evil in the Haystack with RSA ECAT. White Paper

24/7 Visibility into Advanced Malware on Networks and Endpoints

Defending Against Data Beaches: Internal Controls for Cybersecurity

Modern Approach to Incident Response: Automated Response Architecture

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Transcription:

After the Attack: RSA's Security Operations Transformed Ben Smith, CISSP RSA Field CTO (East), Security Portfolio Senior Member, ISSA Northern Virginia 1

The Environment ~ 2,000 security devices ~55M security events per hour ~60K employees 350 sites 85 countries Core intellectual property 2

Structure of Pre-Breach CIRC Eyes on Glass Analysis Forensic Coordination Remediation Rule/Report Creation Workflow Development RSA CIRC 2009-2011 L1 L2 L3 3

Technology Pre-Breach SharePoint Incident Tracking Security Operations (RSA Archer) Vulnerability Risk Management Security Controls Firewall IPS Proxy Windows AV Clients/Server s File Servers RSA SIEM Databases Data Discovery (RSA DLP) Log Analysis Reporting Event Forensics NAS/SAN Endpoints Limited Real-Time Response Limited Visibility 4

The Initial Vector in the Attack 1 Two rounds of phishing emails Some clues about the email lead us to believe that this was from some slightly dated research on employees 2 Launch Zero-day attack One user opened email attachment (an Excel spreadsheet) which launches a Flash zero-day X 3 Attacker gains access to other machines Zero-day exploit installs backdoor (Poison Ivy RAT Variant) which enables extraction of memory resident password hashes X X X X 5

From Compromise to Exfiltration 4 Attacker initiates separate network connection using credentials obtained in the earlier phase of the attack 5 Attacker moves laterally through organization, relying heavily on escalation of privileges, to systems containing disparate information that when combined, allow compromise of targeted information ATTACKER 6 Attacker removes data and stages it on a file share within the network External Server 7 Files are encrypted and attacker tries to exfiltrate from several servers before finding a successful exit path from within the organization 6

Additional Attack Details Focused and coherent attacks Times of attacks may be carefully choreographed Attackers move rapidly to the target: they know what they want, and the order in which to get it Months or years of reconnaissance and preparation allow the attacker to move with exacting precision With prior experience, preparation and tools, attackers exploit people and processes more than weaknesses in infrastructure Remote (attacker) hosts may be modified to match internal naming structure Attackers may exhibit very detailed knowledge of the people, processes and infrastructure People continue to be the easiest target in any organization Fresh malware may be used Compiled just hours before the initial attack event Specifically crafted malware yields no known signature to block 7

The Business Impact ~$70 Million Write-Down Cost of remediation, IT, investigation, consulting, lost revenue, lost productivity Six months focused on remediating authenticators All Authentication-related marketing & sales activity stopped for six months Impact to trust Customers: How could you do this to us? Why didn t you contact us first? Lost some customers permanently All despite no risk to customers 8

The Organizational Impact Nobody fired! Changed product/services portfolio Spent more on investigative tools vs. checkboxes Gained authority - now more than just a token seller Recognized for honesty by announcing breach 9

Biggest Impact: CIRC Reorganization 2009-2011 CIRC Today Cyber Threat Intelligence L1 L2 L3 CIRT Advanced Tool & Tactics - Eyes on Glass - Analysis - Forensic - Coordination - Remediation - Rule/Report Creation - Workflow Development Content Analytics - Specific functions - Reduces scope creep - Focused workflow 10

Critical Results The Ability to Measure Event time to Assignment to Escalation to Resolution Average time to closure Scan every image file for.exe content 55M events per hour become 2-3K incidents per month 90 incidents for 94 person hours per day Time to closure is now about 1 day Program can scale! 11

People and Process Define dwell time From point of trigger to eyes on (analyst assigned) Separation of duties Analytics (CIRT Tier 1) Advanced Tools & Tactics Threat intelligence Integrated investigation Visible to analyst 12

Lessons learned/implemented by RSA Post-breach analysis indicated that threat intelligence would have played a major role in detecting this activity earlier on Actions: Built a dedicated Cyber Intelligence group Bought multiple commercial intelligence feeds Joined multiple threat sharing groups Custom developed a threat intelligence portal / database Developed in-house OSINT gathering program But at that time, we found 13

Observed Threat Intel Issues Some threat intel vendors don t understand the difference between Intelligence and Information A bad IP with no context is not actionable! Impact: Resources wasted on searching Why am I searching proxy logs for the IP address of a mail server that was used in a phishing campaign? 14

Observed Threat Intel Issues Lack of widely adopted standard for sharing threat intel or IoCs Many IoCs are still shared in unmapped formats CSV, text files, HTML posts, vendor-specific XML Impact: Resources wasted on logging into various portals, mailing lists, feeds and then normalizing the IoCs Impact: Human errors when transferring data 15

Observed Threat Intel Issues Limited platforms/applications to house threat intel Avalanche, MITRE CRITs, ThreatConnect Sharing, reviewing/approving, retiring Have you ever retired an IoC? How big are your block lists? Impact: IoC lifecycle management difficulty Impact: Increased burden on security controls 16

Observed Threat Intel Issues Quality of product from vendors varies Some do a good job of vetting indicators However, we still see 8.8.8.8 listed as bad Impact: Potential for operational issues Impact: Developed custom tools to vet IoCs 17

Observed Threat Intel Issues Justifying the expense to management Lack of obvious wins Early failures due to poor third-party intelligence Still not finding all the bad stuff A lot of custom development 18

Lessons learned/implemented by RSA Reviewed Threat Intel sources Removed those that fail to provide context Took a hard look at those who don t provide structured IoC delivery, regardless of context Understood each vendor s focus area Do you need Cybercrime Intel or just APT? Migrated from custom Portal to CRITs Still required substantial code changes to support EMC workflow Developed capability to integrate with multiple sharing standards 19

What is next? Efficiency Tracking incident false positive rate based on threat intelligence source Assign confidence values to sources Feedback to source vendor Correlating alerts across multiple data sources to add contextual elements to Incident record When alert from DNS fires, check proxy / firewall logs for contextual data and add to Incident 20

What is next? Harvesting IoCs Malware Intelligence Program Leverages Yara, VirusTotal, Cuckoo, Internal DB Search for new samples of specific Threat Actor tools each night and programmatically extracts IoCs Passive DNS Internally generated and commercial Used to pivot on known IoCs to find more 21

Lessons learned/implemented by RSA Organizational maturity is required! Threat intel isn t the silver bullet Need to manage expectations Expensive Both in $$$ and human capital Requires constant care and feeding New vendor offerings, quality of data Doesn t always produce tangible results No hits today. Intel failure or nothing going on? 22

Lessons learned/implemented by RSA If you are shopping for external threat intelligence, understand: Threat Intel quality varies widely Get some samples before signing the contract Ask your peers Threat Intel requires manual data entry Amount is proportional to the number of sources This is improving, more support for standards [STIX, TAXII] Threat Intel will likely require custom coding Portal/database, workflow integration, federation/sharing [CRITs] 23

Final Thoughts & Recommendations 24

Restoring Trust After a Data Breach Stabilize the patient Know what you have and prioritize by risk and value Harvest system state information from your production systems Compare what you have to what you deployed Remove suspect systems from the environment and return to a trustworthy state Continuously monitor and validate to prevent re-compromise Communicate in a way that builds trust and confidence Dwayne Melançon (2014), Restoring Trust After a Data Breach [RSA Conference APJ 2014] http://www.rsaconference.com/writable/presentations/file_upload/cds-w08-restoring-trust-after-a-data-breach.pdf 25

The Single Most Effective Security Control The most valuable assets to any company are informed, aware, and vigilant employees A well-defined security policy will take the guesswork out of what is appropriate? employee behavior If I could have chosen anything, technology or otherwise, that would have prevented or lessened the attack against RSA it would have been a more aware employee base. James Lugabihl Critical Incident Response Center (CIRC) Manager, EMC Global Security Office 26

Questions? http://bensmith.se/twitter http://bensmith.se/linkedin 27