Yet another story on information sharing...



Similar documents
OUTCOME OF PROCEEDINGS

ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012

Cyber intelligence exchange in business environment : a battle for trust and data

Cyber Security in EU: ENISA approach

Cyber Security in EU: ENISA approach

Finnish Cyber Security Strategy. Permanent Secretary, LTG Arto Räty Chairman of the Security Committee , Geneva

Microsoft s cybersecurity commitment

How To Write An Article On The European Cyberspace Policy And Security Strategy

The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

MEMORANDUM Date Our reference Page Measures based on the action plan for improved Internet security

How to ensure control and security when moving to SaaS/cloud applications

The National Cyber Security Strategy (NCSS) Success through cooperation

The Importance of a Multistakeholder Approach to Cybersecurity Effectiveness

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Eight Essential Elements for Effective Threat Intelligence Management May 2015

How To Understand And Understand The European Priorities In Information Security

Cyber Security Metrics Dashboards & Analytics

The Role of Threat Intelligence and Layered Security for Intrusion Prevention in the Post-Target Breach Era

Prof. Udo Helmbrecht

The EU approach to Cybersecurity and Cybercrime

CYBER SECURITY TRAINING SAFE AND SECURE

EU Cybersecurity: Ensuring Trust in the European Digital Economy

Cybersecurity: What CFO s Need to Know

DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations

GOVERNMENT OF THE REPUBLIC OF LITHUANIA

A Cyber Security Integrator s perspective and approach

Cyber Security in Europe

CYSPA - EC projects supporting NIS

IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope

CYSPA launch event - Turkey

EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final}

On and off premises technologies Which is best for you?

Romanian National Computer Security Incident Response Team CERT-RO.

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September Co-Chair s Summary Report

US-CERT Year in Review. United States Computer Emergency Readiness Team

Report on CAP Cybersecurity November 5, 2015

NIST Cybersecurity Framework What It Means for Energy Companies

National Cyber Security Strategy

Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015

GRC & Cyber Security Conference - Bringing the Silos Together ISACA Ireland 3 Oct 2014 Fahad Ehsan

European Distribution System Operators for Smart Grids

Docket No. DHS , Notice of Request for Public Comment Regarding Information Sharing and Analysis Organizations

Critical Controls for Cyber Security.

Detecting Unknown Malware: Security Analytics & Memory Forensics. Fahad Ehsan. Cyber Security #RSAC

Memory Forensics & Security Analytics: Detecting Unknown Malware

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

The EU s approach to Cyber Security and Defence

Network Security Deployment Obligation and Expenditure Report

Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security

ANNEX ENLETS. Work programme European Network of Law Enforcement Technology Services /13 EB/hm 2 ANNEX DG D 2C LIMITE EN

Mainstreaming European Military Cyber Defence Training & Exercises

NICE and Framework Overview

How To Write A Cybersecurity Framework

(BDT) BDT/POL/CYB/Circular

April 8, Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

Ed McMurray, CISA, CISSP, CTGA CoNetrix

The Policy Approaches to Strengthen Cyber Security in the Financial Sector (Summary) July 2, 2015 Financial Services Agency

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

Separating Signal from Noise: Taking Threat Intelligence to the Next Level

Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014

Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective

Voluntary Cybersecurity Initiatives in Critical Infrastructure. Nadya Bartol, CISSP, SGEIT, 2014 Utilities Telecom Council

What are you trying to secure against Cyber Attack?

Achieving Global Cyber Security Through Collaboration

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

The Third Rail: New Stakeholders Tackle Security Threats and Solutions

NIS Direktive und Europäische sicherheitsrelevante Projekte Udo Helmbrecht Executive Director, ENISA

Security Operation Centre 5th generation

Cybersecurity Framework: Current Status and Next Steps

Multi-Jurisdictional Study: Cloud Computing Legal Requirements. Julien Debussche Associate January 2015

Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel

ISE Northeast Executive Forum and Awards

National Cybersecurity & Communications Integration Center (NCCIC)

Cyber Security Strategy for Germany

CSM-ACE 2014 Cyber Threat Intelligence Driven Environments

Vendor Risk Management Financial Organizations

Coordinating Attack Response at Internet Scale (CARIS)

A Primer on Cyber Threat Intelligence

DS : Trust eservices. The policy context: eidas Regulation

How To Write A National Cybersecurity Act

Transcription:

Yet another story on information sharing... NATO Malware Information Sharing Platform Panel discussion Threat information sharing: Strategies and threat Scenario s George Mason University Barriers and pathways to improving effectiveness of cybersecurity Information Sharing Among Public and Private Sectors michael.meijerink@ncsc..nl 16-6-2015 13:15

Case study on improving shared situational awareness by focusing on community building Situational Awareness as is Why we saw cause for action The NDN initiative Steps in community building michael.meijerink@ncsc..nl 16-6-2015 13:15

NFI Regulators ISP s AIVD Academia Police Expertise & Advice Monitoring & Response Defense Insight Perspective for Action NCC Enhancing Crisis management ISAC s National partners Vendors Critical Infrastructure

NCSC-NL situational awareness Tactical Operational News analysis Tactical analysis Daily weather Monthly monitor report Guidelines Factsheets White papers Media analysis Policy briefings Advisories Malware analysis End of week Ad hoc Observables and context Daily One conference Trend report End of year One conference Yearly

2012 Dorifel August 8th We receive first calls Requests for advice Municipality of Weert Malware sample Indicators sharing Actionability

2012 Dorifel August 9th New reported infections Notice and Takedowns Release me of a botnet August 10th Total of 30 public and private organizations Scaled down Clean up still ongoing

https://www.shadowserver.org

2012 Dorifel Evaluation Shortcomings No early warning No access to the networks No use of standards No feedback on indicators No community driven approach And thus...no actual shared situational awareness

2015: National Detection Network

NDN offers 1. An IDS for government organisations 2. Threat intel data not (yet) widely available 3. Targeted at NL, high impact, high likelihood 4. Platform for private sectors in critical infrastructure 5. Use of standards and open source 6. Based on voluntary sharing with NCSC-NL 7. Available to all of our constituency

http://deerhillexpeditions.com

Topics dealt with Community Program management

10 Steps in community building PRIOR START OBSTACLE LOOP 10. Evaluate and adjust 8. Results 9. Information Process 6. Business Case 7. Controls 5. Decision making 4. Start the collaboration 3. Communication 2. Explore the territory 1. Legal and policy assurances

Steps in community building PRIOR START OBSTACLE LOOP 10. Evaluate and adjust 8. Results 9. Information Process 6. Business Case 7. Controls 5. Decision making 4. Start the collaboration 3. Communication 2. Explore the territory 1. Legal and policy assurances

Step 1. Policy and legal www.overheid.nl 1. Embed activities in NCSS 2. Create political commitment 3. Organise broad support 4. Inform employee council 5. New policies will be developped 6. Check your legal base

Step 2. Exploring the teritory Information Trust level Volume Sharing molde Benefit Authority Exchange base Size Lenght Connectednes Diversity...

Step 2. Exploring the teritory information trust level open not present closed informal formal volume low medium high sharing model benefit authority exchange base hub-spoke low public voluntary peer-peer medium private mandatory hybrid high supervisory size lenght connectedness diversity limited ad hoc weak low medium long term strong medium large bridging high

NDN - NCSC Step 3. Communications Belanghebbenden Overheid Internationaal Medeoverheden Vitale Sectoren NCTV Water ISAC Nucleair ISAC Multinationals ISAC Haven ISAC Energie ISAC Fin. ISAC Telecom ISAC Transport ISAC Zorg ISAC MSP ISAC Insurance ISAC Infra MKB- Nederland CVI TNO Nox Consider Computale RIJKS ISAC VNO/NCW Privacy related Liaisons EU-Fin. ISAC Rijksoverheid Cyber Security Raad Thuiswinkel.org doelgroep omgeving ICT-office Deskundigen McAfee Hewly- Daggard UvE NU.nl Security.nl Tweakers WebWereld PvIB Rijks SOC DGOB R ICCIO Sb.comm. IB National Police SSC-ICT Shadow server DHS EGC ENISA EU DG Europol Interpol Logius Banken VNG DNB Equens Betaalverenig. NVB Koplopers CSIRT s SOC s MS ISP CIBO CIP Waterschaphs. IPOprovincien KING- IBD Taskf. BID Uni van Watersch. IWWN ACM (OPTA) MOD BuZa CIBG Def. CERT Event I&M IVD NBV EZ NFI OM Taskf. Cyber VWS EC3

Steps in community building PRIOR START OBSTACLE LOOP 10. Evaluate and adjust 8. Results 9. Information Process 6. Business Case 7. Controls 5. Decision making 4. Start the collaboration 3. Communication 2. Explore the territory 1. Legal and policy assurances

Step 4. Collaboration process Invite First insight Share and reflect Negotiate Scoping Execute Evaluate Individual interests and ambitions Understand consequences Pace and direction Master plan Results, products Exits, new entries Leren samenwerken tussen organisaties, alianties netwerken ketens partnerships, Kaats, Pheij, 2013

Stages Period Activities 1 Invite May-Nov 13 - Representative organizations - Delegates 2 First insight Dec 13 - Round table sessions - Introductions - Proposition: benefits, challenges 3 Share and reflect Feb 14 - Interests made explicit - Implicit a group was made 4 Negotiate Mar, Jun 14 - Agenda - Roles, responsibilities 5 Scoping Jun-Nov 14 - Process, organization, information, infrastructure, legal, policy, communication 6 Execute Dec 14 - Start pilot: infrastructure, sharing 7 Evaluate Jun-Sep 15 - Roadmap, growth scenario, sharing proces

Step 5. Decision making Stakeholders 150 corporate organizations 20 public organizations 3 founding partners? Managed service providers Structure 1 steering group, 2-monthly Senior management Sounding board Round table Topics Project and pilots Policy, legal and politics Finance and resources Communication Results Consensus Political support Stakeholder collaboration Autonomy untouched Missing: MSSP, researchers, interest groups,... www.rcc.int

Steps in community building PRIOR START OBSTACLE LOOP 10. Evaluate and adjust 8. Results 9. Information Process 6. Business Case 7. Controls 5. Decision making 4. Start the collaboration 3. Communication 2. Explore the territory 1. Legal and policy assurances

Step 6. Costs and benefits Benefits Short term Long term Costs

Step 6. Costs and benefits Benefits - Reputation through Corporate Soc Resp - Higher security level - Compliancy - Efficient processes - Collaboration - NL digitally (more) safe Short term Long term Costs

Step 6. Costs and benefits Benefits - Reputation through Corporate Soc Resp - Higher security level - Compliancy - Efficient processes - Collaboration - NL digitally (more) safe Short term Long term - Labour (legal, policy, techs,..) - Infrastructure / maturity. - Tooling (IDS, MISP, SIEM) - IDS appliance - Service management - Commercial feeds Costs

Step 7. Information controls Privacy controls (public IDS) Raw data only locally No IoC s on personal identifable information IP addresses hashed and salted Retention time <30 days Hits after 30 minute delay White box solution No remote management www.occupy.com

Step 7. Information controls Privacy controls in process and organization Describe the working process Protocols in place that describe how to handle Perform a privacy impact assessment Processes are externaly audited Keep checking on compliancy with legislation and policies Only screened personnel handle data

Step 7. Information controls Sharing controls (private sector) Public access and access from supervising authorities to government information Describe the working process Retention times on IoC s, sightings,... Policy statement, law amendment TLP Amber, confidential or secret MSSP s, international branches Research e.g. Blooming filter Transparency in processing, (NDA s)

Step 8. Results Span, location, availability Bandwidth, performance Skill level Contextual information (Too) high expectations Remote access New friends MISP Forum MISP community driven MISP STIX MISP groups Government syndrom Data retention New friends various pics via www.google.com

Step 9. Collect & share Collect Report Analyse Enrich Share

Step 9. Collect & share Collect Report Analyse Enrich Share - Levels of sharing - IoC s received -Follow up

Step 9. Collect & share Collect Report Analyse -Sightings - Statistics -Comments Enrich Share - Levels of sharing - IoC s received -Follow up

Step 9. Collect & share Collect - Anonimization - Few results Report Analyse -Sightings - Statistics -Comments Enrich Share - Levels of sharing - IoC s received -Follow up

Step 9. Collect & share Collect -Volume - Contextual information - Workprocess - Anonimization - Few results Report Analyse -Sightings - Statistics -Comments Enrich Share - Levels of sharing - IoC s received -Follow up

Step 9. Collect & share Collect -Volume - Contextual inf. - Workprocess - Anonimization - Few results Report Analyse - Too strict -Active collaboration - Repository missing -Sightings - Statistics -Comments Enrich Share - Levels of sharing - IoC s received -Follow up

Steps in community building PRIOR START OBSTACLE LOOP 10. Evaluate and adjust 8. Start a pilot 9. Information Process 6. Business Case 7. Controls 5. Decision making 4. Start the collaboration 3. Communication 2. Explore the territory 1. Legal and policy assurances

10. Continuous improvement M.C. Escher

To conclude Preparations Results Involvement Collaboration Takes endurance Very intensive Trust issues reduced http://www.tortoiseknowsbest.com/john-bachar-%e2%80%93-a-true-slow-hero/

To conclude Obstacles Controls: transparency sources/ncsc/private Process: make a good inventory ROI: first insights, hard to put $/ / / to it Results: start small, make it work Improvement Other practices, tooling, disciplines, industries

maps.google.com

This presentation is based on our own experiences as well as others: Electrotechnik und informationstechnik, Cyber security information exchange to gain insight into the effects, 2015 http://link.springer.com/article/10.1007%2fs00502-015-0289-2 NCSC, Ahead of the threat, enhancing cyber intelligence communities, 2015 https://www.ncsc.nl/actueel/nieuwsberichten/ncsc-levert-bijdrage-aan-european-cybersecurity-perspectives-2015.html Microsoft, a framework for cyber security information sharing and risk reduction, 2015 http://www.microsoft.com/en-us/download/details.aspx?id=45516 Nist, Guide to Cyber Threat Information Sharing, 2014 http://csrc.nist.gov/publications/drafts/800-150/sp800_150_draft.pdf EP, Mass surveillance, part 2, 2015 http://www.europarl.europa.eu/regdata/etudes/stud/2015/527410/eprs_stu%2820 15%29527410_REV1_EN.pdf EP, Network and Information Security (NIS) Directive, 2015 http://ec.europa.eu/digital-agenda/en/news/network-and-information-security-nisdirective MISP, main developers Belgian Defence and Nato https://github.com/misp/misp