Developing Cyber Threat Intelligence or not failing in battle.



Similar documents
Data Driven Assessment of Cyber Risk:

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

6. Exercise: Writing Security Advisories

WHITE PAPER: THREAT INTELLIGENCE RANKING

Intelligence Driven Security

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Find the needle in the security haystack

Managing Threat Intelligence in a World of Information Overload

Secunia Vulnerability Intelligence Manager

Cyber Security Metrics Dashboards & Analytics

Separating Signal from Noise: Taking Threat Intelligence to the Next Level

Response to Questions CML Managed Information Security

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

Concierge SIEM Reporting Overview

The SIEM Evaluator s Guide

Incident Response from a Global Enterprise Perspective Public Siemens AG All rights reserved

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

Cyber intelligence in an online world

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

SANS Top 20 Critical Controls for Effective Cyber Defense

Unified Security Management and Open Threat Exchange

Gaining and Maintaining Support for a SOC. Jim Goddard Executive Director, Kaiser Permanente

QRadar SIEM 6.3 Datasheet

The Cyber Threat Profiler

Cybersecurity Awareness. Part 2

Italy. EY s Global Information Security Survey 2013

Virtual Patching: a Proven Cost Savings Strategy

Cybersecurity Risk Management in the Telecom Sector. MUSTAPHA HUNEYD Corporate Information Security

81% of participants believe the government should share more threat intelligence with the private sector.

Dealing with Big Data in Cyber Intelligence

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Cyber Security Operations Center (CSOC) for Critical Infrastructure Protection

Network Security Monitoring: Looking Beyond the Network

THE BEST WAY TO CATCH A THIEF. Patrick Bedwell, Vice President, Product Marketing

Modern Approach to Incident Response: Automated Response Architecture

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

Critical Security Controls

Caretower s SIEM Managed Security Services

Security Chasm! Dr. Anton Chuvakin

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Performing Advanced Incident Response Interactive Exercise

Actionable information for security incident response

Threat Intelligence for Dummies. Karen Scarfone Scarfone Cybersecurity

Best Practices to Improve Breach Readiness

AtlSecCon 2012, 01 March Intru-Shun.ca Inc.

Software that provides secure access to technology, everywhere.

SIEM AND THE ART OF LOG MANAGEMENT Trustwave Holdings, Inc.

Evaluating, choosing and implementing a SIEM solution. Dan Han, Virginia Commonwealth University

Ty Miller. Director, Threat Intelligence Pty Ltd

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Deep Security Vulnerability Protection Summary

Using SIEM for Real- Time Threat Detection

How To Create Situational Awareness

Discover Security That s Highly Intelligent.

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Threat Intelligence: An Essential Component of Cyber Incident Response. Jeanie M Larson, CISSP-ISSMP, CISM, CRISC

Detecting Unknown Malware: Security Analytics & Memory Forensics. Fahad Ehsan. Cyber Security #RSAC

Payment Card Industry Data Security Standard

Threat Intelligence & Analytics Cyber Threat Intelligence and how to best understand the adversary s operations

Symantec Cyber Security Services: DeepSight Intelligence

Breach Found. Did It Hurt?

Next Generation IPS and Reputation Services

ORGANIZADOR: APOIANTE PRINCIPAL:

(BDT) BDT/POL/CYB/Circular

Security Information & Event Management (SIEM)

Joshua Beeman University Information Security Officer October 17, 2011

DIR Contract Number DIR-TSO-2621 Appendix C Pricing Index

Everything You Always Wanted to Know About Log Management But Were Afraid to Ask. August 21, 2013

Active Response: Automated Risk Reduction or Manual Action?

Integrating MSS, SEP and NGFW to catch targeted APTs

Critical Controls for Cyber Security.

Practical Steps To Securing Process Control Networks

The Importance of Cybersecurity Monitoring for Utilities

GOOD PRACTICE GUIDE 13 (GPG13)

Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

Applying Internal Traffic Models to Improve Identification of High Fidelity Cyber Security Events

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

Cyber Watch. Written by Peter Buxbaum

Can We Become Resilient to Cyber Attacks?

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention

Situational Awareness A Discussion

Juniper Security Threat Response Manager (STRM) Mikko Kuljukka COMPUTERLINKS Oy

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

NTT R&D s anti-malware technologies

REPORT State of Vulnerability Risk Management

Advanced SOC Design. Next Generation Security Operations. Shane Harsch Senior Solutions Principal, MBA GCED CISSP RSA

The Business Justification for Cyber Threat Intelligence. How advanced intelligence improves security, operational efficiency and strategic planning

Windows Server 2003 End of Support. What does it mean? What are my options?

DYNAMIC DNS: DATA EXFILTRATION

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS

Building a Security Operations Center (SOC)

Threat Intelligence UPDATE: Cymru EIS Report. cymru.com

FROM INBOX TO ACTION AND THREAT INTELLIGENCE:

Transcription:

Developing Cyber Threat Intelligence or not failing in battle. AtlSecCon 2012, 02 March 2012 Adrien de Beaupré SANS ISC Handler Intru-Shun.ca Inc. Natasha Hellberg Bell Canada

About me 32+, 22+, 12+ years Contributor to OSSTMM 3 Contributor to Hacking Exposed, Linux 3 rd Ed Contributor to SANS Incident Handling Guide Co-developer of Incident Management Capability Maturity Framework (Bell Canada) SANS Instructor 401, 504, 542, 560 Threat Intel and IR with CCIRC 01/03/2012 2

Introduction What is CTI Where can I get some? Proposed architecture Conclusion

CTI "The ability to collect, share, and analyze data in order to tailor responses to a threat..." Paul E. Kurtz Cyber Security Expert and Presidential Advisor Situational awareness for organizations is comprised of relevant information on new threats, new vulnerabilities, trends, and targeted attacks from external sources. This must be combined with detailed knowledge and data from internal activities.

Requirements Useful! Timely Moving at Internet speed Accurate Trusted sources, validated data Tailored Relevant to your organization Correlated Multiple sources of data Analyzed Intelligent human analysis Mitigation How to respond, recommendations Metrics Quantitative, measurable, trends Severity Rating system Interactive Consulting and research

Intel Incidents Indicators Vulnerabilities Malware Exploits Tools Trends in technology Trends in threats Threat agents, human intel Known bad domains and netblocks Anything else new

Capability Maturation 1. No Threat Monitoring 2. Web Surfing as needed (ad hoc) 3. RSS Feed Correlation 4. Commercial Feed 5. Industry Participation 6. Threat Analysis Community Participation 7. Threat Analysis Leadership (internal capability) Source: Incident Management Capability Maturity Framework

How to This proposed threat environment monitoring capability uses a variety of processes, tools, information sources, etc to gather external and internal information regarding known threats and vulnerabilities pertinent to the organization in order to develop targeted cyber threat intelligence. Includes collection of security incident alerts and warnings from external organizations, as well as internal indicators (logs, traffic analysis, etc)

Sources of Information TYPE INTERNAL EXTERNAL Free Logs IDS DNS Honeypot Dark net Netflow Open SANS ISC CERT Feeds AV Vendors MSRC SRI Closed/ Private FIRST MSRA / GIAIS ISC SIE Commercial MSSP Secunia Symantec idefense Dell Secureworks

InternalSources People, process, technology. Trouble ticket/incident database. IDS/IPS, System logs, Application logs, Firewall logs, Router logs, Anti-malware logs, DNS (passive), Sniffers, SIEM, Log collectors, anything that can provide network traffic or logs. Anything that can provide metrics and trend them over time. Anything that can provide an indicator of an incident.

OSI Open source intelligence gathering On yourself On your industry On your competitors On your enemy Know yourself, know your enemy, pick your battlefield, arrive at the field of battle well informed and before the opponent. (Paraphrasing Sun Tzu and Musashi)

External Free Sources Threat Researchers SANS Internet Storm Center: http://isc.sans.edu/ SRI Malware Threat Center: http://mtc.sri.com/ ShadowServer: http://www.shadowserver.org/wiki/ Malware domains: http://www.malwaredomains.com/ Team Cymru: http://www.team-cymru.org/ and many many many more

External Free Sources C*RTS CERT: http://www.cert.org/blogs/vuls/ US-CERT: http://www.us-cert.gov/ Aus-CERT: http://www.auscert.org.au/render.html?cid=7066 AU GovCERT: http://www.ag.gov.au/www/agd/agd.nsf/page/govcert CCIRC: http://www.publicsafety.gc.ca/prg/em/ccirc/indexeng.aspx NZ: http://www.ccip.govt.nz UK: http://www.cpni.gov.uk and others

External Free Sources Twitter! AV Vendor Blogs Avert Labs: http://www.avertlabs.com/research/blog/ TrendLabs: http://blog.trendmicro.com/ Kaspersky Lab Weblog: http://www.viruslist.com/en/rss/weblog F-Secure Weblog: http://www.f-secure.com/weblog and many more

External Free Sources Other: BugTraq: http://seclists.org/rss/bugtraq.rss ISS: http://blogs.iss.net MSRC: http://blogs.technet.com/msrc/rss.xml Microsoft Malware Protection Center: http://blogs.technet.com/mmpc/ Microsoft Research & Defence: http://blogs.technet.com/srd/default.aspx and many many more

External Commercial Sources Secunia: http://secunia.com/vulnerability_information/ VeriSign idefense: http://labs.idefense.com/ Symantec DeepSight: https://tms.symantec.com/default.aspx isight Partners IntelliSIGHT: http://www.isightpartners.com/intellisight.html Dell Secureworks: http://www.secureworks.com/ Others

ExternalPrivate Sources FIRST Microsoft Security Response Alliance ISC Security Information Exchange Many 'un-named closed lists Others

Issues & Challenges Quality of Threat Feeds (Free& Commercial) Technical Accuracy of Threat Feeds Timeliness of Threat Feeds (Early Warnings) Time Intensiveness Data Sensitivity Internal Information Sharing Liabilities with external information sharing Proving Organizational Value

Correlation of Sources The primary issue with threat environment monitoring is that few specific toolsets exist which allow for the correlation of threat feeds from multiple sources. Some SIEM tools, along with some Business Intelligence tools, can be used to create a work around, but each requires a certain amount of manual analysis for validation & verification.

Internal Architecture Preliminary Low Cost Capability Public RSS Feeds RSS Aggregator Private Commercial Collection Server Email2RSS RSS Feed Generator User Internal RSS to PDF Tool User PRIMARY SOURCES COLLECTION & CORRELATION DISTRIBUTION

Internal Architecture Advanced Capability Public CORRELATION &ANALYSIS Private Internal COLLECTION TOOLS Dirty Clean REPORTING TOOL SECURED COLLABORATION TOOL User User Correlated PRIMARY SOURCES

Conclusion Enterprises and organizations can build their own CTI capability. Requires internal, external, public, and private sources. Some of which may be specific to their industry or agency mandate. Trained analysts, good workflow, with good inputs and some technology gets good output.

Questions?

Thanks! Adrien de Beaupré SANS ISC Handler Intri-Shun.ca Inc. adrien@intru-shun.ca & Natasha Hellberg Bell Canada natasha.hellberg@bell.ca