Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013



Similar documents
Defending Against Data Beaches: Internal Controls for Cybersecurity

Data Center security trends

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

Practical Steps To Securing Process Control Networks

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

The Four-Step Guide to Understanding Cyber Risk

Fighting Advanced Threats

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

Cyber Security Metrics Dashboards & Analytics

Into the cybersecurity breach

The Hillstone and Trend Micro Joint Solution

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Agenda , Palo Alto Networks. Confidential and Proprietary.

Defending Against Cyber Attacks with SessionLevel Network Security

IBM Security Strategy

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Marble & MobileIron Mobile App Risk Mitigation

Covert Operations: Kill Chain Actions using Security Analytics

Looking at the SANS 20 Critical Security Controls

Seven Things To Consider When Evaluating Privileged Account Security Solutions

A Case for Managed Security

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

DoD Strategy for Defending Networks, Systems, and Data

Breaking the Cyber Attack Lifecycle

Cybersecurity The role of Internal Audit

Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

Secure Your Mobile Workplace

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited

Recommended Practice Case Study: Cross-Site Scripting. February 2007

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management

CyberSecurity Solutions. Delivering

Evolving Threat Landscape

KEY STEPS FOLLOWING A DATA BREACH

Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

CDM Hardware Asset Management (HWAM) Capability

Incident Response. Six Best Practices for Managing Cyber Breaches.

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Protecting against cyber threats and security breaches

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

Information Technology Risk Management

Protecting Organizations from Cyber Attack

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION

Enterprise Cybersecurity: Building an Effective Defense

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

How-To Guide: Cyber Security. Content Provided by

Protecting Your Organisation from Targeted Cyber Intrusion

Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

Threat Intelligence: The More You Know the Less Damage They Can Do. Charles Kolodgy Research VP, Security Products

Cybersecurity Awareness. Part 1

8/27/2015. Brad Schuette IT Manager City of Punta Gorda (941) Don t Wait Another Day

Cloud Computing Technologies Achieving Greater Trustworthiness and Resilience

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

White Paper. Advantage FireEye. Debunking the Myth of Sandbox Security

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Unknown threats in Sweden. Study publication August 27, 2014

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015

Comprehensive Advanced Threat Defense

Security Controls Implementation Plan

How To Protect Your Online Banking From Fraud

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Cybersecurity and internal audit. August 15, 2014

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY

CYBER SECURITY INFORMATION SHARING & COLLABORATION

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Developing Secure Software in the Age of Advanced Persistent Threats

Continuous Network Monitoring

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Retail Security: Enabling Retail Business Innovation with Threat-Centric Security.

CYBERSPACE SECURITY CONTINUUM

Cyber Essentials Scheme

Stay ahead of insiderthreats with predictive,intelligent security

Hacking the Industrial SCADA Network II The Latest Threats to Automated Production and Process Management Networks

BlackRidge Technology Transport Access Control: Overview

NASCIO 2015 State IT Recognition Awards

After the Attack. The Transformation of EMC Security Operations

Enterprise Cybersecurity: Building an Effective Defense

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective

DeltaV System Cyber-Security

The Next Generation Security Operations Center

Critical Controls for Cyber Security.

Microsoft s cybersecurity commitment

Transcription:

Security Architecture: From Start to Sustainment Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013

Security Architecture Topics Introduction Reverse Engineering the Threat Operational Approach System Approach Enterprise Approach Developing an Enterprise Architecture Approach 2

Interdependence of the Cyber-Enabled World 3

Global Supply Chain Vulnerabilities Complex Threat Contamination Counterfeit Countermeasures Surveillance Inspection Testing 4 source: US-China Economic Security Review Commission, 2012, prepared by Northrup Grumman

Phishing Attacks Result of a Phishing at a National Laboratory 530 Email Recipients 50 Clicks 2 Downloads 1 Infection 19 Days Offline 5

Advanced Persistent Threat - Operation Shady Rat 2006-2011 National Secrets Source Code Email Archives Negotiations, Plans Oil & Gas Document Stores Legal Contracts SCADA configurations Design Documents Intellectual Property 6

Example of Advanced Persistent Threat Phase 1 Identify targets, create emails with attachments that appear routine Word Documents, PowerPoint Presentations, Excel Spreadsheets. Loaded with exploit code installing Trojan Phase 2 Trojan contacts an external URL. Commands may be hidden in images. Phase 3 Trojan takes control of the compromised computer. Phase 4 Attacker escalates privileges moves, exfiltrates data, etc.. Defense Trend Micro Recon Preparation Infiltration Beachhead Propagation & Exploitation Command & Concealment Exfiltration & Obfuscation In Depth 7

Challenges Ahead Now!

The Increasing Threat Complex and Continuously Evolving Threats and Hackers Need a defined Security Plan requirements implementation monitoring tailored to your environment Collaboration & Information Sharing Offense must inform the Defense Public, Private sector collaboration is essential Growing Demand for Automated Continuous Threat Monitoring Vast array of tools to help detect and mitigate Advanced Persistent Threats Cannot relax legacy security activities firewalls, passwords Advanced threats seek easiest vulnerability/avenue of attack Continuous Monitoring (of the Security Process) Need to design security in (um, what s that called again?) 9

The Cloud, Big Data, and Mobile Basic Tenet of Security: Decrease the Attack Surface The Cloud and Big Data Georgia Tech study: most obvious exploit that could lead to creation of malicious compute clouds is simple credit-card fraud. Most cybercriminals have access to thousands, if not millions, of stolen credit card numbers. Using stolen accounts to buy cloud computing resources can be a quick way for attackers to create dangerous clusters of virtual systems. Mobile Computing Gartner predicts: employee owned devices will be compromised by malware at twice the rate of enterprise owned Consider: smartphone, unproven applications and free downloads you re carrying a listening device in your pocket In 2012 mobile became the most pervasive means of accessing the Internet In US <1% of mobile devices infected by malware in some other countries 40% (Georgia Tech) Mobile users 3x more likely to visit a phishing site than other users 10

A Managed Service Response (Operational) 11

More than ABCs of Security Architecture Access, Authentication, Accounting (passwords, PIV cards, HSPD-12) Network Security at the Boundaries of the Enterprise (firewall, IPS, monitoring) or the operating system (HIPS/FW) System Security Compliance or Hardening (NIST SP800, DoD 8500, HBSS) 12

System Approach Focus on vulnerabilities System weaknesses Commonality of operating systems Interdependence Growing Too Rapidly In 2010 IBM identified > 8,000 new 27% increase over 2009 Exploits were also up 21 percent 13

Vulnerabilities exploited - Examples 14 Oct 2012 - Red October discovered by Kapersky Worldwide, underway since 2007 Exploited vulnerabilities in Word and Excel programs Europe, Asia North American targets - embassies, research firms, military, energy, nuclear and others. Full extent of damage is unknown Dec 2012 two US power plants sophisticated malware attacks Attack vector: unprotected USB drives Poor security controls Dec 2012 Council on Foreign Relations and an industry company Zero day vulnerability in Internet Explorer to compromise computers of those who visited the websites

Can You Reverse Engineer Risk? 15

Working Backwards from Risk CAESARS Reference Architecture 16 Continuous Asset Evaluation Situational Awareness Risk Scoring Continuous Assessment Inventory (HW/OS/Apps) Vulnerabilities (CVEs, IAVAs) Threats Traffic, Logs, Flow Data (now) Where Do I Spend My Time Today? Situational Awareness Continuous Asset Evaluation = RISK SCORE Risk Scoring

The Converged Enterprise Environment 17

All Aspect Security 18

Security View of Enterprise Architecture 19

Security Architecture Network Architecture supporting security Security /Protections Infrastructure (Protocols/Networks) Security / IA Tools, Capabilities, and Algorithms Security Support Infrastructure (Encryption, Identity Management, Authentication, AD, DNS[Sec], IPALM, Keys) Security Operations, Network Operations, Event and Incident Management, Correlation & Analysis Vulnerabilities, Exploits, and System Sustainment Intrusion Management, Capability Framework Management, Architecture Management Governance, Risk, and Compliance (Policy, C&A, CM) Response, Resilience, and Recovery Personnel Management (training, process orientation, performance measurement) [Enterprise Architecture], Tech Refresh, Planning, and Procurement

Enterprise Approach Cyber Warfare versus Cyber Defense CND, CNA, CNE, Information Assurance, Information Operations Threats, Vulnerabilities, and Systemic Approach Operating in a War Zone versus Building a Static Solution Changes to the environment, process, elements, even personnel create potential vulnerabilities (need to manage change, manage systems, and manage maturity) Not changing with the threat landscape creates weakness without warning (need to manage awareness and metrics, not just vulnerabilities) 21

Enterprise Approach Enterprise Approach means it s a business/mission continuity issue: mission performance in the face of cyber warfare Enterprise Architecture may be the most comprehensive way to develop an Enterprise Approach to Security 22

EA Approach to Security Architecture How do you plug Security into your EA process? How do you extract Security from an EA Framework? How do you translate EA Solutions into Operations 23

EA Framework Touch Points 24

Operationalizing Architecture and Vice Versa 25

Q&A (My Questions, Your Answers) Better, Consistent Implementation of Security Practices Within the EA Framework Extensions to Framework? Intentions of Framework? Ingesting Data and Interfacing with Network & Security Operations, Systems Engineering, Policy & Governance Reverse Engineering Risk 26