ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES



Similar documents
Statement of Qualifications Cybercrime & data breach

Getting real about cyber threats: where are you headed?

January IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director

Defending Against Data Beaches: Internal Controls for Cybersecurity

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Cyber security Building confidence in your digital future

Into the cybersecurity breach

How To Manage Security On A Networked Computer System

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Big Data and Security: At the Edge of Prediction

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

PwC Cybercrime US Center of Excellence

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

Practical Steps To Securing Process Control Networks

Analyzing HTTP/HTTPS Traffic Logs

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Italy. EY s Global Information Security Survey 2013

Logging In: Auditing Cybersecurity in an Unsecure World

The SIEM Evaluator s Guide

CONTINUOUS MONITORING THE MISSING PIECE TO SECURITY OPERATION (SOC) TODAY

FIVE PRACTICAL STEPS

Advanced Threats: The New World Order

Requirements When Considering a Next- Generation Firewall

How to effectively respond to an information security incident

The Value of Vulnerability Management*

The Protection Mission a constant endeavor

Cybersecurity and internal audit. August 15, 2014

Cyber security Building confidence in your digital future

SANS Top 20 Critical Controls for Effective Cyber Defense

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

The Business Case for Security Information Management

Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst

September 20, 2013 Senior IT Examiner Gene Lilienthal

The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

I D C A N A L Y S T C O N N E C T I O N

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Protecting Your Organisation from Targeted Cyber Intrusion

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

CYBER SECURITY, A GROWING CIO PRIORITY

Protecting against cyber threats and security breaches

Cybersecurity The role of Internal Audit

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

Intelligence Driven Security

Cybersecurity: What CFO s Need to Know

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

Rashmi Knowles Chief Security Architect EMEA

Critical Security Controls

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

CyberArk Privileged Threat Analytics. Solution Brief

24/7 Visibility into Advanced Malware on Networks and Endpoints

Cyber and Operational Solutions for a Connected Industrial Era

Defending Against Cyber Attacks with SessionLevel Network Security

TODAY S AGENDA. Trends/Victimology. Incident Response. Remediation. Disclosures

Threat and Vulnerability Management (TVM) Protecting IT assets through a comprehensive program. Chicago IIA/ISACA

Enabling Security Operations with RSA envision. August, 2009

Assessing the strength of your security operating model

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Data Center security trends

How To Create An Insight Analysis For Cyber Security

Stay ahead of insiderthreats with predictive,intelligent security

THE EVOLUTION OF SIEM

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems

Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au

RETHINKING CYBER SECURITY

Cyber Situational Awareness for Enterprise Security

Incident Response. Six Best Practices for Managing Cyber Breaches. Nick Pollard, Senior Director Professional Services EMEA / APAC, Guidance Software

A COMPLETE APPROACH TO SECURITY

Managing cyber risks with insurance

O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y

Developing Secure Software in the Age of Advanced Persistent Threats

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Cyber Security Metrics Dashboards & Analytics

Fostering Incident Response and Digital Forensics Research

Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention

The Role of Security Monitoring & SIEM in Risk Management

Cisco Advanced Malware Protection

WildFire. Preparing for Modern Network Attacks

Using LYNXeon with NetFlow to Complete Your Cyber Security Picture

Managing the Shadow Cloud

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Retail Security: Enabling Retail Business Innovation with Threat-Centric Security.

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS

Speed Up Incident Response with Actionable Forensic Analytics

Information Security. Incident Management Program. What is an Incident Management Program? Why is it needed?

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Transcription:

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate

Agenda The opportunity Assuming a state of compromise Incremental capabilities needed Case studies of actual incidents

The opportunity

Confidence is high 42% of respondents say their organization have a strategy in place and is proactive in executing it exhibiting two distinctive attributes of a leader. 50% 40% Front-runners 43% 42% 30% Strategists 20% 10% 27% 25% Tacticians Firefighters 15% 16% 16% 14% 0% We have an effective strategy in place and are proactive in executing the plan 2011 2012 We are better at "getting the strategy right" than we are at executing the plan We are better at "getting things done" than we are at defining an effective strategy We do not have an effective strategy in place and are typically in a reactive mode Source: The Global State of Information Security Survey Question 28 - "Which category below best characterizes your organization s approach to protecting information security? (Numbers reported may not reconcile exactly with raw data due to rounding.)

Information security behaviors To be effective, security must be integral to the way people think and work, not just another item to be checked off a list. 68% of respondents are either very or somewhat confident they have instilled effective security behaviors into their organizational culture. 29% 39% 68% confident 0% 10% 20% 30% 40% 50% 60% 70% 80% Very confident Somewhat confident Source: The Global State of Information Security Survey Question 35 - How confident are you that your organization has instilled effective information security behaviors into the organizational culture? (Not all factors shown. Totals do not add up to 100%.)

Yet confidence is eroding Confidence is a good thing. More than 70% of respondents are very (32%) or somewhat (39%) confident that their organization s information security activities are effective. Yet they may not realize that assurance has dropped since 2008. 80% 60% 2008 2009 83% 82% 2010 2011 2012 74% 72% 71% 40% 20% 0% Source: The Global State of Information Security Survey Question 41 - How confident are you that your organization s information security activities are effective?

Why is confidence eroding? New adversaries. The cost of attacks is low. Successful attack requires just one vulnerable spot for success. The defenders are required to protecting everything equally, which is not costeffective. Investment in security controls is based on known vulnerabilities or vendor buzz.

Key barriers to effective security Cyber security is still pigeon-holed as an IT issue, creating a communications gap between managers in the business and the security teams. The people engaged in securing cyber space face the challenge of continuing to raise their game faster than the attackers. Traditional organisational structures tend to be too slow and rigid to enable the speed and flexibility of response needed in the cyber world. Cyber opportunities are overseen by a variety of C-level executives with the CIO being the single most common owner. Cyber risks are owned either by the Chief Risk Officer or Chief Information Security Officer. The CEO is still relatively uninvolved in either area. Ref: PwC / ISF June 2011

The need for change The future of cyber security is going to require an evolved philosophy that assumes a never-ending state of compromise.

Resilient Cyber Security Source: PwC US Cyber Security Briefing March 2013

Cyber evolution Traditional security lifecycle State of compromise Correct / Enhance Respond / Remediate Prevent Security management Crisis & incident management Detect Detect / Discover Holistic approach for dealing with increased volume, complexity, and detection difficulty of attacks. Triage / Contain Source: PwC UK Cyber Threat Landscape April 2013

Focusing resources and effort What it is not Additional investment in new technology A silver bullet to prevent breaches A technology-specific solution A point-in-time or set and forget fix What it is A modern viewpoint on budget allocation priorities, with smarter investment decisions driving more effective detection, response and containment of inevitable advanced threats An approach to help organisations detect breaches earlier in their lifecycle, before they impact the business, and a methodology to ensure they are dealt with swiftly and calmly Enterprise crisis readiness and crisis management combined with threat intelligence to understand relevant risks and mitigate associated business impacts A business-as-usual methodology and approach

Invest where it matters The question has always been where we should invest our resources but with a constantly changing landscape of Attackers and Vulnerabilities, reacting is no longer enough. While keeping up to date is important, checking to see if new threats are relevant to you, and where you should invest within your setup is critical. We need to be able to adjust to new understanding of risk on a much shorter time-scale. All this via the perspective of what the business impact of a threat may be.

Assuming a state of compromise

New mind-set: assume compromise Basic breach indicators of an active cyber intrusion can include: Data transmitting outbound over unlikely protocols Large compressed files being transmitted outbound Unusual connections between a user systems using native operating system networking features Log entries on domain controllers capturing the execution of unauthorized programs Unauthorized processes running on key executives PC Unauthorized web pages created on an Internet-facing web server Recognition of advanced cyber intrusions is often through third-party tipsters such as domestic law enforcement, intelligence sources, customers, or business partners.

Identify breach indicators Phase 1 Understand where the valuable data is stored Structured and Unstructured What would an attack target Update your IT asset inventory Illustrative

Identify breach indicators Phase 2 Investigate the environment for network and system breach indicators: Develop system and network baselines Based on your own environment Based on standards for your technology and industry Review both system and network activity Identify and investigate anomalies Activate incident response process as necessary

Identify breach indicators Phase 2 Network Breach Indicators Unusual volume or type of network activity protocols, or protocols not being used properly files being downloaded Traffic associated with known bad hosts Traffic patterns associated with known malicious software Internet Web DMZ Internal Network Firewall Firewall? Web Server Database Server

Identify breach indicators Phase 2 System Breach Indicators Unusual services registry keys files network connections Firewall Web DMZ Web Server Unusual log entries Antivirus logs indicate malware detection Firewall Internal Network??? Database Server Workstation

Identify breach indicators Phase 3 Evaluate susceptibility to future attacks Review findings to identify security vulnerabilities Execute threat-based scenario testing Table top exercises Revise operational processes to detect breach indicators Update your incident response plan based on lessons learned Determine baseline expectations

Incremental capabilities needed

Incremental solutions and capabilities Organization & Governance Information Risk led approach along with effective governance Information asset centric security Clear view of what data exists & what is important. Information governance policy and program Source: PwC UK Cyber Threat Landscape April 2013 Threat Intelligence Capability to understand and adapt security posture to emerging threats Detection / Monitoring Predictive monitoring / analytics bringing together multiple data sources. Security behaviours & culture People behave differently through clear grasp of what matters Preventative controls and IT Hygiene Security in the business ecosystem Third party and supplier security management including data in the cloud Incident response & crisis mgmt Integrated capability to respond to incidents

Organization & Governance Active board involvement Dedicated leadership for Information Security Clearly defined roles and responsibilities Skilled / knowledgeable resources for Incident Management Team On-going monitoring of control effectiveness Appropriate accountability Including all of the relevant stakeholders in security conversations (i.e., steering committee)

Information asset centric security Understand what data may be valuable and how it can be accessed Limit access to what is truly required Enhance monitoring to include data / business logic considerations Tie between identity management, logging, and data loss prevention technologies Segment disparate security zones

Threat intelligence Leverage business knowledge to enhance correlation rules Review intelligence from government agencies, for-profit vendors, and free sources Check with third parties to see if private IP address space is part of a known botnet or other cyber threat Analyze, spam, phishing and public disclosures Tie to law enforcement, industry groups and other sources Monitor social media

Detection / Monitoring Log on all systems not just the important ones Network traffic from Internet access points Collect Log the right data points Maintain logs for a sufficient length of time Correlation Event Rules Anomaly Risk Monitor Think like an attacker Alarm reporting and response Metrics and reporting

Security behaviors & culture Focused training for key roles Training to educate general population People are first line of defense

Security in the business ecosystem On-going monitoring Determine role of third parties Integrate into security program Vendor classification Contractual clauses Review risk

Incident response & crisis management Law enforcement coordination Public relations & media Breach notification Root cause analysis Litigation / regulatory support Forensic investigation Containment / remediation On-going threat monitoring Cyber crisis management Incident response

Case studies of actual incidents

Financial services Client issue: Cyber attack threat. Our client was notified by law enforcement that a cyber attack was imminent and likely to occur within 48 hours. Network intrusion. The client's external-facing systems were in danger of being breached, permitting access to back-end systems on the private network. Data theft and privacy breach. Payment card data and personally identifiable information were stored. Outcome Network forensics. Analysis of historical network utilization data and identified the date of a mass data exfiltration. Data discovery. Determined the storage locations of data that might interest attackers to help focus the investigation and its security enhancement efforts. Breach indicator assessment identified more than 500 indicators of compromise. Live memory forensics. Preserved and analyzed volatile memory on systems it found that had indicators of malicious activity. Computer forensics. Forensically preserved and analyzed relevant systems and discovered previously undetected malware that had been installed nearly three years earlier. Malware analysis. The malware discovered had been permitting remote access to the client's private cyber space.

Financial services Client issue: Global ATM fraud. ATM cards were counterfeited and then used to withdraw millions of dollars across the globe. The track data used to counterfeit the ATM cards came from our client s IT infrastructure. Malware. Unauthorized custom software was installed on internal systems, permitting remote access, querying of databases containing identities and payment card data, and collection of data flowing through the network. Data theft. Payment card data was collected and exfiltrated to external hosts without detection. Outcome Computer forensics. The forensic analysis identified the initial point of intrusion and root cause, which systems had been compromised, malware installed on dozens of systems, and the how/where of undetected data exfiltration. Malware analysis. Twelve unprecedented malware instances, unknown and undetected by anti-virus technology, were discovered and analysed. Network forensics. Collected network traffic, and analyzed collected traffic for indicators of malicious activity. PwC also analyzed historical network utilization data and identified the date of a mass data exfiltration. Data discovery. To support the client s effort to determine the location of all data stores containing identity information, PwC launched its proprietary data discovery methodology which helped the client quantify the number of potentially exposed identities that would require privacy breach notification.

Questions? Leonard Levy leonard.l.levy@sg.pwc.com +65 8571 3682