Defending against Cyber Attacks



Similar documents
Critical Security Controls

Top 20 Critical Security Controls

Defending Against Data Beaches: Internal Controls for Cybersecurity

IBM QRadar Security Intelligence April 2013

O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y

The webinar will begin shortly

Securing OS Legacy Systems Alexander Rau

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Cyber Security Metrics Dashboards & Analytics

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

The Role of Security Monitoring & SIEM in Risk Management

Guideline on Auditing and Log Management

24/7 Visibility into Advanced Malware on Networks and Endpoints

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Web Security. Discovering, Analyzing and Mitigating Web Security Threats

Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability. 7 Jul 2014

End-user Security Analytics Strengthens Protection with ArcSight

The Cloud App Visibility Blindspot

Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific Developments in Web Application and Cloud Security

REVOLUTIONIZING ADVANCED THREAT PROTECTION

DDoS Threat Report. Chris Beal Chief Security Architect on Twitter

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Content Security: Protect Your Network with Five Must-Haves

Technical Testing. Network Testing DATA SHEET

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Redefining SIEM to Real Time Security Intelligence

I ve been breached! Now what?

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

Performing Advanced Incident Response Interactive Exercise

Breach Findings for Large Merchants. 28 January 2015 Glen Jones Cyber Intelligence and Investigation Lester Chan Payment System Security

Evolution Of Cyber Threats & Defense Approaches

The Role of Threat Intelligence and Layered Security for Intrusion Prevention in the Post-Target Breach Era

Microsoft s cybersecurity commitment

Ecom Infotech. Page 1 of 6

CALNET 3 Category 7 Network Based Management Security. Table of Contents

Perspectives on Cybersecurity in Healthcare June 2015

Security Controls Implementation Plan

A HELPING HAND TO PROTECT YOUR REPUTATION

SIEM is only as good as the data it consumes

AMPLIFYING SECURITY INTELLIGENCE

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

Enabling Security Operations with RSA envision. August, 2009

Advanced Threat Protection with Dell SecureWorks Security Services

How To Manage Security On A Networked Computer System

Extreme Networks Security Analytics G2 Vulnerability Manager

Integrating MSS, SEP and NGFW to catch targeted APTs

Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall

Security Information & Event Management (SIEM)

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

WHITEPAPER. How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware

THE TOP 4 CONTROLS.

Concierge SIEM Reporting Overview

Enterprise Cybersecurity: Building an Effective Defense

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Find the needle in the security haystack

Symantec Endpoint Protection

Combating a new generation of cybercriminal with in-depth security monitoring

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE

Middle Class Economics: Cybersecurity Updated August 7, 2015

Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall

Cisco Advanced Services for Network Security

Vulnerability Management

Reneaué Railton Sr. Informa2on Security Analyst, Duke Medicine Cyber Defense & Response

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CYBER SECURITY, A GROWING CIO PRIORITY

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Advanced Threats: The New World Order

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

SECURITY IN THE INTERNET OF THINGS

Log Management, Compliance and Auditing

Security Business Intelligence Big Data for Faster Detection/Response

SANS Top 20 Critical Controls for Effective Cyber Defense

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

September 20, 2013 Senior IT Examiner Gene Lilienthal

Stay ahead of insiderthreats with predictive,intelligent security

Agenda , Palo Alto Networks. Confidential and Proprietary.

Using SIEM for Real- Time Threat Detection

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

Transcription:

2015 AMC Privacy & Security Conference Defending against Cyber Attacks MICHAEL DOCKERY CHRIS BEAL PAUL HOWELL Security & Privacy Track June 24, 2015

In the News 2015 MCNC General Use v1.0

Healthcare Data Breaches April 2015 25% increase in healthcare data breaches in 2014 2% higher than rate across all industries Majority caused by human error and lost or stolen devices 44% of healthcare breaches due to lost or stolen devices Accidental disclosure due to human error up 11% in 2014 Targeting of patient medical info an increasing issue Breaches resulting from targeted attacks up 82% in 2014 Breaches resulting from insider theft nearly doubled in 2014 https://www4.symantec.com/mktginfo/whitepaper/istr/21347932_ga-internet-security-threat-report-volume-20-2015-social_v2.pdf 2015 MCNC General Use v1.0

Why Are Attackers Interested In Healthcare Targets? Medical data sets tend to be more complete compared to what can be obtained elsewhere Government ID, bank and credit card info, insurance info, physical descriptors, health status Can be used for ID theft, financial fraud, prescription fraud, obtaining passports, visas or other ID Translates to higher value for attackers Credit card numbers may fetch from $0.50 to $1.00 ID and insurance info worth up to $10 or as high as $50 depending on completeness of the record https://www4.symantec.com/mktginfo/whitepaper/istr/21347932_ga-internet-security-threat-report-volume-20-2015-social_v2.pdf 2015 MCNC General Use v1.0

Healthcare Data Breaches April 2015 https://www4.symantec.com/mktginfo/whitepaper/istr/21347932_ga-internet-security-threat-report-volume-20-2015-social_v2.pdf 2015 MCNC General Use v1.0

Why s It Getting Tougher? Threats Have Evolved Attackers Are Smarter & More Efficient Users are More Mobile (BYOD) Data Is More Distributed Everything is Interconnected Short Supply Motivations Are Focused on Near-Term 2015 MCNC General Use v1.0

[ 7] R & E Networks Not Immune

[ 8]

Questions for Panel What do you think is the most significant cyber threat facing healthcare today? Outline a strategy for defending against cyber attacks? Determine what his/her organization can do to improve its security posture against cyber attacks?

[ 10 ] Simple DDoS Attack

[ 11 ] Man in the Middle Attack

DDoS Bandwidth Use Source: Arbor Networks [ 12 ]

Multi-Vector and Adaptive Source: Coreo Network Security [ 13 ]

Defenses Watch what s happening on the network. Know which systems depend on external Internet access. Get an alternative to email. Secure your teleconferences. Send your conference passcode securely, not in the body of your calendar invite. Be ready for total shutdown, if necessary. Ask your ISP about their capabilities. Consider mitigation such as scrubbing services. For very large attacks, consider contacting a DDoS mitigation company. [ 14 ]

Defenses US-CERT Alert TA15-120A Securing End to End Communications Employing multiple network and browser protection methods forces an attacker to develop different tactics, techniques, and procedures to circumvent the new security configuration. Use VPNs and HTTPS Prepare your people for these advanced attacks by educating them on the dynamics, patterns, samples and frequency of attack methods attempted on other organizations. [ 15 ]

SIEM and Endpoint Failures Due to Inability to Detect Malware Mine for Windows Codes Indicative of Malware 1. Implement Malware Cheat Sheet Logging Recommendations Be prepared for incident and have logs available 2. Focus on codes that are indicative of Malware See Michael Gough s tutorials and slide shares Monitor CMD.EXE usage Process Create 4688 File/Registry Auditing 4663 Service Changed 4070 User Login Success 4624 Share Accessed 5140 3. Use analytics where possible to look for indicators of partner compromise. 4. Remove admin and ban email usage/internet access using admin credentials

Analytics You May Already Have Source Proofpoint Malicious Links from Partners

Email Malicious Link Sorted for a Year by Partner, Source Proofpoint

Individual Partner Threat Report: Malicious Links, Source Proofpoint

Panel Questions What is working right now in Cyber Defense and what is broken? What are your go to resources which are giving you an edge? Any magic bullets?

Where To Begin? 2015 MCNC General Use v1.0

The Critical Security Controls A ready-made list of the things you should be thinking about and doing to protect your assets This is your map! What Are They? While not a replacement for a formal Risk Management program or framework, you can consider the controls as a foundational risk assessment A starting point for immediate, high-value action that is demonstrably consistent with formal risk assessment frameworks Not a on-size-fits-all solution. You still need to understand what s important to your business, your specific threat environment, and develop a plan for assessment, implementation, and ongoing management. 2015 MCNC General Use v1.0

5 Critical Tenets 1 Offense Informs Defense Use knowledge of actual attacks that have compromised systems to provide the foundation to continually learn from these events to build effective, practical defenses. Include only those controls that can be shown to stop known realworld attacks. 2 Prioritization Invest first in Controls that will provide the greatest risk reduction and protection against the most dangerous threat actors, and that can be feasibly implemented in your computing environment. 3 Metrics Establish common metrics to provide a shared language for executives, IT specialists, auditors, and security officials to measure the effectiveness of security measures within an organization so that required adjustments can be identified and implemented quickly. 4 Continuous Diagnosis and Mitigation Carry out continuous measurement to test and validate the effectiveness of current security measures, and to help drive the priority of next steps. 5 Automation Automate defenses so that organizations can achieve reliable, scalable, and continuous measurements of their adherence to the Controls and related metrics. 2015 MCNC General Use v1.0 Of an Effective Cyber Defense System

The Critical Security Controls 2015 MCNC General Use v1.0

Example CSC 5 What? Control the installation, spread, and execution of malicious code at multiple points in the enterprise, while optimizing the use of automation to enable rapid updating of defense, data gathering, and corrective action. Why? Malware Defenses Malware is pervasive and used in the majority of modern attacks and data breaches, in order to compromise systems and account credentials 2015 MCNC General Use v1.0

Example CSC 5 2015 MCNC General Use v1.0 Malware Defenses ID # Description Category CSC 5-1 CSC 5-2 Use automated tools such as anti-virus, anti-spyware, host-based firewalls, and host-based IPS to continuously monitor systems for indicators of malware. Use anti-malware software that offers remote, cloud-based centralized management infrastructure to share intelligence and update managed systems. Quick Win Quick Win CSC 5-3 Disable auto-run feature for removable media and network shares. Quick Win CSC 5-4 Automatically scan removable media for malware upon connection to a system. Quick Win CSC 5-5 Scan all email and block messages containing malicious content. Quick Win CSC 5-6 Enable features such as DEP, ASLR, containerization, etc. Quick Win CSC 5-7 Limit use of external devices to only where it is required. Quick Win CSC 5-8 Ensure that automated monitoring tools use behavior-based anomaly detection in addition to signature based detection. Visibility CSC 5-9 Use network-based malware scanning tools to detect and filter network traffic. Visibility CSC 5-10 Implement IR process to collect malware samples found to be running that were not caught by existing malware defenses. Advanced CSC 5-11 Enable DNS query logging to detect lookups for known bad sites. Advanced

First Five Quick Wins 1 Application Whitelisting CSC2 2 Use of Standard, Secure System Configurations CSC 3 3 Patch Application Software Within 48 Hours CSC 4 4 Patch System Software Within 48 Hours CSC4 5 Reduce Number of Users With Administrative Privileges CSC 3, CSC 12 2015 MCNC General Use v1.0

The Top 4 Strategies 1 Application Whitelisting Explicitly define the applications that are allowed to run on a system 2 Patch Applications Keep applications updated 3 Patch the Operating System Keep the OS and core components updated 4 Minimize Administrative Privileges Limit the power that users have on systems and what they are allowed to change 2015 MCNC General Use v1.0 http://www.asd.gov.au/infosec/top-mitigations/top-4-strategies-explained.htm

Resources http://www.cisecurity.org/documents/csc-master- VER5.1-10.7.2014.pdf Spotting the Adversary Windows Event Log Monitoring TSA 13 1004 SG NSA/CSS Information Assurance Service https://www.nsa.gov/ia/_files/app/spotting_the_adversary_with_windows_event_l og_monitoring.pdf Windows Logging Cheat Sheet http://www.slideshare.net/hackerhurricane/windowslogging cheat sheet v11?related=4 Michael Gough s Logging Slides, Slideshare Episode #388 Paul s Security Weekly

Thank You Chris Beal Chief Security Architect MCNC chris.beal@mcnc.org @mcncsecurity on Twitter Paul Howell Internet2 Chief Cyberinfrastructure Security Officer phowell@internet2.edu Michael Dockery Information Security Officer Cincinnati Insurance Companies Mike_Dockery@cinfin.com Disclaimer: The author s affiliation with The Cincinnati Insurance Companies is provided for identification purposes only, and is not intended to convey or imply Cincinnati Insurance s concurrence with, or support for, the positions, opinions, or viewpoints expressed by the author. 2015 AMC Privacy & Security Conference