Modern Approach to Incident Response: Automated Response Architecture



Similar documents
Security Analytics for Smart Grid

Concierge SIEM Reporting Overview

Gaining and Maintaining Support for a SOC. Jim Goddard Executive Director, Kaiser Permanente

Practical Steps To Securing Process Control Networks

Threat Intelligence: An Essential Component of Cyber Incident Response. Jeanie M Larson, CISSP-ISSMP, CISM, CRISC

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

Cyber Security Metrics Dashboards & Analytics

Threat Intelligence: The More You Know the Less Damage They Can Do. Charles Kolodgy Research VP, Security Products

Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

Defending Against Data Beaches: Internal Controls for Cybersecurity

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

Software that provides secure access to technology, everywhere.

Caretower s SIEM Managed Security Services

Advanced Threats: The New World Order

O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y

GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate

Targeted Intrusion Remediation: Lessons From The Front Lines. Jim Aldridge

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

FROM INBOX TO ACTION AND THREAT INTELLIGENCE:

RSA Security Analytics

RSA Security Anatomy of an Attack Lessons learned

Under the Hood of the IBM Threat Protection System

Integrating MSS, SEP and NGFW to catch targeted APTs

Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined

Information Security Incident Management Guidelines

Incident Response. Six Best Practices for Managing Cyber Breaches.

CONTINUOUS MONITORING THE MISSING PIECE TO SECURITY OPERATION (SOC) TODAY

File Integrity Monitoring: A Critical Piece in the Security Puzzle. Challenges and Solutions

How To Protect A Network From Attack From A Hacker (Hbss)

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Persistence Mechanisms as Indicators of Compromise

Security Management. Keeping the IT Security Administrator Busy

Performing Advanced Incident Response Interactive Exercise

REVOLUTIONIZING ADVANCED THREAT PROTECTION

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

Getting Ahead of Advanced Threats

The Cyber Threat Profiler

Breaking the Cyber Attack Lifecycle

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

High End Information Security Services

End-user Security Analytics Strengthens Protection with ArcSight

IBM Security Strategy

Sophisticated Indicators for the Modern Threat Landscape: An Introduction to OpenIOC

Bridging the gap between COTS tool alerting and raw data analysis

Intelligence Driven Security

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

Reneaué Railton Sr. Informa2on Security Analyst, Duke Medicine Cyber Defense & Response

Breach Found. Did It Hurt?

Speed Up Incident Response with Actionable Forensic Analytics

The SIEM Evaluator s Guide

How To Create Situational Awareness

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

How To Manage Security On A Networked Computer System

IBM Security Intelligence Strategy

APPLICATION PROGRAMMING INTERFACE

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

ESG Brief. Overview by The Enterprise Strategy Group, Inc. All Rights Reserved.

Extreme Networks Security Analytics G2 Vulnerability Manager

Ty Miller. Director, Threat Intelligence Pty Ltd

Network Security Monitoring: Looking Beyond the Network

Cisco Advanced Malware Protection

AppGuard. Defeats Malware

QRadar SIEM and FireEye MPS Integration

WHITE PAPER: THREAT INTELLIGENCE RANKING

The Role of Security Monitoring & SIEM in Risk Management

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Evolution Of Cyber Threats & Defense Approaches

Threat Intelligence for Dummies. Karen Scarfone Scarfone Cybersecurity

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Into the cybersecurity breach

Ovation Security Center Data Sheet

Marble & MobileIron Mobile App Risk Mitigation

Metric Matters. Dain Perkins, CISSP

A Primer on Cyber Threat Intelligence

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

Separating Signal from Noise: Taking Threat Intelligence to the Next Level

Vulnerability Management

Advanced SOC Design. Next Generation Security Operations. Shane Harsch Senior Solutions Principal, MBA GCED CISSP RSA

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

CALNET 3 Category 7 Network Based Management Security. Table of Contents

Comprehensive Advanced Threat Defense

Hunting for Indicators of Compromise

The Future of the Advanced SOC

The Incident Response Playbook for Android and ios

How To Buy Nitro Security

Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals

Global Partner Management Notice

THE BEST WAY TO CATCH A THIEF. Patrick Bedwell, Vice President, Product Marketing

Transcription:

SESSION ID: ANF-T10 Modern Approach to Incident Response: Automated Response Architecture James Carder Director, Security Informatics Mayo Clinic @carderjames Jessica Hebenstreit Senior Manager, Security Informatics Mayo Clinic @secitup #RSAC

Monitor Detect Respond to Threats 2

A variety of threats exist Both internal and external to any organization. Those threats and their major characteristics are reflected in the table below: #RSAC Virus, Worms, and Spam Insiders Hacktivists Terrorists Organized Crime State Sponsored OBJECTIVE Financial Gain Revenge, Financial Gain Defamation, Notoriety Fundraising, Communications, Propaganda Financial Gain Economic Advantage EXAMPLE Scareware, Spam, Zombies Data Destruction, Theft DDoS, Wikileaks Al-Qaeda Sites, ISIS Credit, Debit Card, ACH, PHI, PCI Theft Trade Secrets, Contracts, Legal Strategies 3

Collect logs & relevant system, network and application data. TARC Threat Analysis & Response Center Enterprise monitoring, altering and triage of potential security events Analyze behaviors and patterns within the data. Respond & investigate anomalies in behavior or patterns. Tactically eradicate threats 4

Advanced analysis and response to large scale intrusions In depth incident investigation and reporting In depth forensic analysis of systems and devices Reverse engineer malicious code used 5

Threat classification, attribution, indicators, warnings, and reports Intelligence on attackers that have interest in Clinic; Attribution of attackers; Attacker techniques, technologies, and processes; Informs internal teams of relevant threats; Industry knowledge of breaches and exploits; Reporting. 6

Goals: Reduce response time from days to minutes Increase knowledge of internal and external threats Build automatic smart responses for common threats Objectives: Integration of Core Technologies Establish enterprise visibility Real time threat intelligence 7

Preparation Post incident activities Detection, Analysis Containment, Eradication, Remediation 8

Big Visibility Visibility and Control for Endpoint user Network 9

Inventory of tools - IT Infrastructure - Information Security Infrastructure Evaluation of Current Processes - IR (malware, forensic handling, communication) - IT (remediation, cleanup, communication) Metrics - What takes up most of our analyst time? - How long does it take to detect, respond, remediate? 10

What causes 80% of our daily analyst work load? - Old fashioned 80/20 rule - What would your analyst love to not have to do anymore? What can we do to prevent initial compromise? - Incident lifecycle / kill chain What are our biggest threats and targets? - Who targets healthcare? - What or who do they target? 11

Inadvertent remediation of valid data/files/processes - Can be tough when staff have admin rights - Aided by scoring system (e.g. if validated evil by 3 different sources based on attributes) Automation can reduce long term staff learning - They may not learn why or how, only what - Become automation and tool dependent We might miss something - catch a symptom (small scale), not the cause (large scale) - Single event vs. chain of events 12

USE CASES 13

4 8 Hours Attack: Inbound Phishing Email Threat: Financial Crime Email disguised as Help Desk Detect: User Reported Investigate: Triage and Analysis Clean: Wipe code from system and email from mailboxes Email received by 200 people before first report Contains malicious attachment, installs code Search SIEM and other tools Analyze attachment and code Identify victims Contact IT Messaging, respond Contact IT Support, respond Contact Help Desk, respond 14

4 8 Minutes Attack: Inbound Phishing Email Threat: Financial Crime Email disguised as Help Desk Detect: Technology Investigate: Triage and Analysis Clean: Wipe code from system and email from mailboxes Email received by 20 people, technology detected Contains malicious attachment, installs code Search SIEM and other tools Analyze attachment and code Identify victims Remove code from system Remove email from mailboxes 15

Several to Hours to Weeks or More Attack: Watering hole Detect: Technology Researcher unknowingly visits compromised website Ad on compromised site installs malware on researcher s endpoint Web based malware detection appliance detects malware and sends alert to SIEM Investigate: Triage and Analysis Response: Clean malware and Initiate Blocks Analyst manually gathers evidence and log files and analyzes data Manually initiate image of memory and/or disk Manually submit malware to sandbox and Malware analysts Manually create tickets to other supporting teams to clean system or reimage Manually create ticket to NOC to block C2 16

Minutes to few hours Attack: Watering hole Detect: Technology Investigate: Triage and Analysis Response: Clean malware and Initiate Blocks 17 Researcher unknowingly visits compromised website Ad on compromised site installs malware on researcher s endpoint Web based malware detection appliance detects malware and sends alert to SIEM Analyst has data readily available in alarm to analyze Automated response engages Enterprise DFIR system to create image of memory and/or disk for analysis Automated response engages affected endpoint; grabs a copy of the malware and submits to sandbox Sandbox runs automated analysis C2 automatically blocked due to proactive threat monitoring Malware analyst confirms high fidelity threat, approves pre-configured auto response Smart SIEM engages end point to remediate system via deletion/cleaning of malware

Weeks or more Attack: Anomalous Behavior Detect: User Reported Investigate: Triage and Analysis Respond: Manually Create Tickets for Supporting Teams Employee accesses directories outside of normal behavior pattern Accesses information related to sensitive research Goes undetected until reported to security team, if ever Analyst manually gathers evidence and log files and analyzes data User s access likely remains intact while data analyzed Contact IT NOC, respond Contact Investigative Legal Department, respond Contact Various IT Teams, respond 18

minutes Attack: Anomalous Behavior Detect: Technology Employee accesses directories outside of normal behavior pattern Accesses information related to sensitive research System has already learned normal baseline for user Creates alarm for analyst automatically Investigate: Triage and Analysis Analyst has data readily available in alarm to analyze Respond: Automatically clean and mitigate 19 Automated response engages Domain Controller to disable user account Automated response engages Access Switch to disable network port Tickets to other supporting teams automatically opened

Weeks or more Attack: Unknown Command and Control Detect: Luck Investigate: Triage and Analysis Respond: Manually Create Tickets for Supporting Teams Perimeter monitoring technology/service alerts, if we re lucky (rarely for new stuff) Goes undetected until reported to security team, if ever Analyst manually gathers evidence and log files and analyzes data User s access likely remains intact while data analyzed Contact IT NOC, respond Contact Investigative Legal Department, respond Contact Various IT Teams, respond 20

Weeks or more Attack: Unknown Command and Control Detect: Script Report Investigate: Triage and Analysis Respond: Clean malware and Initiate Blocks Newly registered domains (domain tools, etc.) Domain Generation Algorithms (DGAs) Analyze output of DNS log parsing script and send to SIEM Analyst looks for supporting indicators Queries domain history Smart SIEM engages end point to grab copy of malware Malware analyst confirms high fidelity threat, approves pre-configured auto response Smart SIEM engages end point to remediate system via deletion/cleaning of malware 21

Indicators of compromise (IOC) are automatically searched in enterprise Changes to threat environment immediately detected Instantaneously provides context around incident Easily correlating similar methods being used over long periods of time 22

Finished Intelligence Reporting Indicators of Compromise (IOC) Analysis Documents Blogs RSS Feeds Comma Separated Value Files Text Files STIX OpenIOC Raw Data Types Malware Samples Packet Capture Files Mail Samples 23

Threat Intelligence Architecture External Services #RSAC Sources of Intelligence Services API CRITs Mongo Database Cuckoo Sandbox Analyst Web Interface Authenticated API SIEM 24

Measuring Success Mean time from: Detection to response Response to remediation Remediation to reporting 25

Needs of the patient come first. Integration of people and technology Industry leader of monitoring, detection, and response 26

Apply What You Have Learned Today #RSAC Next week you should: Map your technologies to the incident response life cycle Create use cases based on law of dual advantage (eliminate pain while finding evil) In the first three months following this presentation you should: Inventory identities, networks, systems, and applications (get the baseline, understand normal) No really.understand normal Pressure your vendors (API integrations) Within six months you should: Enterprise implementation of your use cases (detection, respond, remediation) 27

Questions #RSAC

Thank You! #RSAC