Security Chasm! Dr. Anton Chuvakin



Similar documents
Dr. Anton Security Warrior Consulting

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

How To Manage Log Management

Information & Asset Protection with SIEM and DLP

Italy. EY s Global Information Security Survey 2013

IT Security Strategy and Priorities. Stefan Lager CTO Services

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Checklist for Breach Readiness. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) For Daily Compliance & Security Tips, Follow

Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions

Security Information Lifecycle

Defending Against Data Beaches: Internal Controls for Cybersecurity

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

Enterprise Security Solutions

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security

Company Overview. Enterprise Cloud Solutions

Evolution of Penetration Testing

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

Observe PCI DSS: How to Audit Application Activity When Logs Don t Help

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

MANAGED SECURITY SERVICES (MSS)

Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard

Developing Cyber Threat Intelligence or not failing in battle.

Secret Server Splunk Integration Guide

whitepaper The Benefits of Integrating File Integrity Monitoring with SIEM

Clavister InSight TM. Protecting Values

Cybersecurity: What CFO s Need to Know

ANITIAN INTELLIGENT INFORMATION SECURITY INTELLIGENT INFORMATION SECURITY

Boosting enterprise security with integrated log management

APIs The Next Hacker Target Or a Business and Security Opportunity?

ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security?

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

Achieving Compliance with the PCI Data Security Standard

PCI Compliance. Top 10 Questions & Answers

O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y

Information Security Services. Achieving PCI compliance with Dell SecureWorks security services

MANAGED SECURITY SERVICES (MSS)

Six Mistakes of Log Management

10 Best Practices to Protect Your Network presented by Saalex Information Technology and Citadel Group

Payment Card Industry Data Security Standard

The Future of the Advanced SOC

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

Modern Approach to Incident Response: Automated Response Architecture

Franchise Data Compromise Trends and Cardholder. December, 2010

Lot 1 Service Specification MANAGED SECURITY SERVICES

Comodo HackerGuardian. PCI Security Compliance The Facts. What PCI security means for your business

SecurityMetrics. PCI Starter Kit

Security Breaches and Vulnerability Experiences Overview of PCI DSS Initiative and CISP Payment Application Best Practices Questions and Comments

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS

Intelligence Driven Security

Software that provides secure access to technology, everywhere.

Cloud and Data Center Security

PCI DSS Top 10 Reports March 2011

How To Protect Your Cloud From Attack

The Role of Security Monitoring & SIEM in Risk Management

CloudCheck Compliance Certification Program

PCI Compliance Top 10 Questions and Answers

RETHINKING CYBER SECURITY Changing the Business Conversation

How To Protect Yourself From A Hacker Attack

Real-Time Security for Active Directory

High End Information Security Services

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

A Wake-Up Call? Fight Back Against Cybercrime. Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014

PCI DSS Reporting WHITEPAPER

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

Evaluating, choosing and implementing a SIEM solution. Dan Han, Virginia Commonwealth University

RSA Security Analytics

Scalability in Log Management

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

Overcoming PCI Compliance Challenges

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

SecurityMetrics Introduction to PCI Compliance

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

whitepaper Ten Essential Steps for Achieving Continuous Compliance: A Complete Strategy for Compliance

PCI Compliance for Cloud Applications

University of Pittsburgh Security Assessment Questionnaire (v1.5)

Organizational Structure What Works

08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview

Feature. Log Management: A Pragmatic Approach to PCI DSS

Two Approaches to PCI-DSS Compliance

Defending against modern cyber threats

How To Buy Nitro Security

Exporting IBM i Data to Syslog

QRadar SIEM 6.3 Datasheet

Using SIEM for Real- Time Threat Detection

Current IBAT Endorsed Services

Transcription:

Security Chasm! Hack in The Box Amsterdam, The Netherlands July 2010

Why Are We Here? Risk of DEATH vs Risk of $60 fine?

WTH is security? How we got here? Outline Security and/or/=/vs Compliance? Security vs security? Does what we do for security actually improve security? Where it is all going? What can YOU do today?

For ADD Folks: Main Theme 1. There are two security realities: one conceptual and fuzzy + another painfully real. And a chasm between them! 2. This is not good for security and for businesses! 3. What can we do about it?

Brief History First. 1950-1985 Stick Age: Security = door lock 1985-1990 Stone Age: Security = anti-virus 1990-2000 Bronze Age: Security = firewall 2000-2005 Iron Age: Security = IDS/IPS 2005-2010 Modern Age: Security = appsec 2010+ Cloud Age: Security = But this is technology only?

OK, How About This View? 1950-1985 Stick Age: Local risks 1985-1990 Stone Age: Computer risks 1990-2000 Bronze Age: Network risks 2000-2010 Iron Age: Regulatory risks 2005-2010 Modern Age: Cybercrime risks 2010+ Cloud Age: All-of-the-above risks? Gross oversimplifcation, of course

So, what are we doing? Aka What is Security? Protecting the data Defending the network Guarding the IT environment Reducing risk (what risk?) Yes, but really We ensure that organization runs and wins!

Leaders vs Losers

and what if they still don t? Then some regulatory body would come and beat them up. and they d continue to stay 0wned, of course

Drilldown into Compliancy

Where Compliance Fears to Tread YOUR DATA: Key Organization Data, IP, Secrets, Trade Secrets Usually not regulated Loss causes pain to you! You are responsible for protection Cannot be killed CUSTODIAL DATA: SSN, PAN, ID, Addresses, Health records Usually regulated: PCI Loss causes pain to others! You are responsible for protection Can be killed

Observations Protects OWN data, protects CUSTODIAN data <LEADER> Protects OWN data, fails to protect CUSTODIAN data <RISK TAKER> Fails to protect OWN data, protects CUSTODIAN data <IDIOT> Fails to protect OWN data, fails to protect CUSTODIAN data <LOSER>

Compliance Is Risk of DEATH vs Risk of $60 fine? DOT study on seatbelts: Compliance = (Awareness + Enforcement) / Security Benefit

Chasm Emerges! PCI DSS is TOO EASY! PCI is a joke. It is not security! Playing scope games? PCI makes you buy stuff you don t need PCI is not risk management! PCI DSS is TOO HARD! What? 224 questions!!? Firewall, IDS what s all that? You mean we now have to pay for AV updates? What is that risk thing?

Compliance Mystery Solved!! Compliance is the floor of security And a motivator to DO IT! However, many prefer to treat it as a ceiling Result: breaches, 0wnage, mayhem!

Compliance vs Security Compliance (PCI) Operates with knowns or unknown knowns Can have a full TODO list Can be counted EASY (=EASIER) Security (risk) Operates mostly with unknown unknowns Can NEVER have a full TODO list Can only be guesstimated HARD

How To Profit From Compliance? Everything you do for compliance, MUST have security benefit for your organization! Examples: log management, IDS/IPS, IdM, application security, etc

Back to Chasm Compliance is NOT the reason for a chasm, but it made it MORE VISIBLE!

SIDE 1: Consultant Comes In Talks to senior management Scopes a risk assessment project Start talking to stakeholders Reading policies never touches metal Comes up with RISKS! Are we secure now? Security can be as dumb as compliance

SIDE 2: Intrusion Tolerance aka Running an Owned Business. Why it is [seen as] OK? Non-critical assets affected Non-critical C-I-A dimension affected Assets operate while affected Other priorities override

Moreover: Assumed 0wnage! Desktops: banks now assume that online banking client PC is owned If I see a PC now, I assume it is 0wned! Web applications: not even luck based strategy, but lazy attacker strategy Static HTML is OK, of course If we cede desktop and web, where DO we fight? What is the new line of battle?

Chasm?

Chasm!! SIDE 1 o Aligning strategy o Writing policies o Talking risk and doing assessments o Compliance vs security o Inputs o Try for proactive and fail SIDE 2 o Gathering metrics o Responding to issues o Figuring out risks and implementing controls o Keep the business running o Output -> inputs o Focus on responsive

Related Security Mini-Chasms Proactive vs reactive Risk vs diligence Policy vs technology Inputs vs outputs security Micro and macro security

What Does Future Hold? More regulation to compel the laggards More threats to challenge the leaders Less chance to do intrusion tolerance And - of course! more clouds Longer term: slow trend toward chasm closure However.

Security 2020? Added dimension to spice things up... In 2020, security FAIL might mean you DIE!

Conclusions: How To Bridge The Chasm? Is intrusion tolerance the only way? Titanic DID have compartments Use compliance to drive security not whine about it NEVER conceptualize without doing! (*) Chasm exists but you can start closing it at your organization by always connecting mission with metal

Action Item! NOW LET S ALL GO PRACTICE INCIDENT RESPONSE!!!

Questions? Email: anton@chuvakin.org Site: http://www.chuvakin.org Blog: http://www.securitywarrior.org Twitter: @anton_chuvakin Consulting: http://

More on Anton Now: independent consultant Book author: Security Warrior, PCI Compliance, Information Security Management Handbook, Know Your Enemy II, Hacker s Challenge 3, etc Conference speaker: SANS, FIRST, GFIRST, ISSA, CSI, Interop, many, many others worldwide Standard developer: CEE, CVSS, OVAL, etc Community role: SANS, Honeynet Project, WASC, CSI, ISSA, OSSTMM, InfraGard, ISSA, others Past roles: Researcher, Security Analyst, Strategist, Evangelist, Product Manager

Services Logging and log management strategy, procedures and practices Develop logging policies and processes, log review procedures, workflows and periodic tasks as well as help architect those to solve organization problems Plan and implement log management architecture to support your business cases; develop specific components such as log data collection, filtering, aggregation, retention, log source configuration as well as reporting, review and validation Customize industry best practices related to logging and log review to fit your environment, help link these practices to business services and regulations Help integrate logging tools and processes into IT and business operations SIEM and log management content development Develop correlation rules, reports and other content to make your SIEM and log management product more useful to you and more applicable to your risk profile and compliance needs Create and refine policies, procedures and operational practices for logging and log management to satisfy requirements of PCI DSS, HIPAA, NERC, FISMA and other regulations More at www.securitywarriorconsulting.com

Want a PCI DSS Book? PCI Compliance by Anton Chuvakin and Branden Williams Useful reference for merchants, vendors and everybody else Released December 2009!