Cyber Essentials KAMI VANIEA 2



Similar documents
Cyber Essentials Scheme

Compliance series Guide to meeting requirements of the UK Government Cyber Essentials Scheme

Payment Card Industry Self-Assessment Questionnaire

Cyber Essentials Questionnaire

G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy

PCI DSS Requirements - Security Controls and Processes

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

Did you know your security solution can help with PCI compliance too?

Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

Endpoint & Server Protection. Brent Biernat First Vice President Network Services May 13, 2014

Credit Card Acceptance Policy. Vice Chancellor of Business Affairs. History: Effective July 1, 2011 Updated February 2013

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

Critical Security Controls

Critical Controls for Cyber Security.

OSU INSTITUTE OF TECHNOLOGY POLICY & PROCEDURES

THE TOP 4 CONTROLS.

Information Security and Risk Management

Section 12 MUST BE COMPLETED BY: 4/22

Looking at the SANS 20 Critical Security Controls

4 Ways an Information Security Analyst Improves Business Productivity

Best Practices for DanPac Express Cyber Security

Mobile security and your EMR. Presented by: Shawn Tester & Allen Cornwall

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

GFI White Paper PCI-DSS compliance and GFI Software products

AASTMT Acceptable Use Policy

Best Practices for DeltaV Cyber- Security

Top 20 Critical Security Controls

How To Protect Your Data From Being Stolen

SANS Top 20 Critical Controls for Effective Cyber Defense

Smarter Security for Smarter Local Government. Craig Sargent, Solutions Specialist

Locking down a Hitachi ID Suite server

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Security Management. Keeping the IT Security Administrator Busy

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

SECURITY FOR ENTERPRISE TELEWORK AND REMOTE ACCESS SOLUTIONS

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Network/Cyber Security

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

10 Smart Ideas for. Keeping Data Safe. From Hackers

Sound Business Practices for Businesses to Mitigate Corporate Account Takeover

Zone Labs Integrity Smarter Enterprise Security

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Global Partner Management Notice

Additional Security Considerations and Controls for Virtual Private Networks

BM482E Introduction to Computer Security

Industrial Security for Process Automation

Defending Against Data Beaches: Internal Controls for Cybersecurity

The Cloud App Visibility Blindspot

BEST PROTECTION FOR DESKTOPS AND LAPTOPS. Client Security

September 20, 2013 Senior IT Examiner Gene Lilienthal

University System of Maryland University of Maryland, College Park Division of Information Technology

VPN Lesson 2: VPN Implementation. Summary

Network and Security Controls

National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement Exit Conference...

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Name: Position held: Company Name: Is your organisation ISO27001 accredited:

1B1 SECURITY RESPONSIBILITY

Jumpstarting Your Security Awareness Program

Check Point and Security Best Practices. December 2013 Presented by David Rawle

74% 96 Action Items. Compliance

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

The Protection Mission a constant endeavor

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

Information Technology Branch Access Control Technical Standard

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Agenda , Palo Alto Networks. Confidential and Proprietary.

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

2012 Data Breach Investigations Report

Decrease your HMI/SCADA risk

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Symposium (FBOS) PCI Compliance. Connecting Great Ideas and Great People. Agenda

Network Security Policy

Computer and Network Security Policy

PCI Requirements Coverage Summary Table

How To Protect Your Network From Attack From Outside From Inside And Outside

SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR.

Internet threats: steps to security for your small business

2012 Endpoint Security Best Practices Survey

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

The Impact of Wireless LAN Technology on Compliance to the PCI Data Security Standard

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

ABB s approach concerning IS Security for Automation Systems

Implementing SANS Top 20 Critical Security Controls with ConsoleWorks

TIME TO LIVE ON THE NETWORK

Payment Card Industry (PCI) Data Security Standard

CORE IMPACT AND THE CONSENSUS AUDIT GUIDELINES (CAG)

How SafenSoft TPSecure can help. Compliance

White Paper. BD Assurity Linc Software Security. Overview

Strategies to Mitigate Targeted Cyber Intrusions Mitigation Details

Avaya TM G700 Media Gateway Security. White Paper

Avaya G700 Media Gateway Security - Issue 1.0

ASDI Full Audit Guideline Federal Aviation Administration

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System

Top five strategies for combating modern threats Is anti-virus dead?

Transcription:

Cyber Essentials DR. KAMI VANIEA KAMI VANIEA 2

First, the news Office of Personnel Management http://www.usatoday.com/story/news/politics/2015/06/23/op m-hack-senate-archuleta-hearing/29153773/ KAMI VANIEA 3

KAMI VANIEA 4

10 large steps are too complex for small companies. KAMI VANIEA 5

KAMI VANIEA 6

Cyber Security Essentials KAMI VANIEA 7

Cyber Security Essentials KAMI VANIEA 8

Cyber Essentials Certification Self-assessment External vulnerability scan by an approved tester Internal vulnerability scan by an approved tester KAMI VANIEA 9

Cyber Essentials provides a good summary of what basic level protection should be done. KAMI VANIEA 10

Cyber Essentials Controls KAMI VANIEA 11

Sample Network Mobile Devices Wireless Access Point Desktop PCs and laptops Card Readers Personal Devices Boundary Firewall Email, web and application servers Databases Router Home PC Home Router Internet 3 rd party server KAMI VANIEA 12

Mobile Devices Wireless Access Point Desktop PCs and laptops Card Readers More Secure Sample Network Personal Devices Boundary Firewalls DMZ Email, web and application servers Databases Router Home PC Home Router Internet 3 rd party server KAMI VANIEA 13

Sample Network Mobile Devices Wireless Access Point Desktop PCs and laptops Card Readers Personal Devices Boundary Firewall Email, web and application servers Databases Router Home PC Home Router Internet 3 rd party server KAMI VANIEA 14

A system which is unspecified can never be wrong, it can only be surprising. KAMI VANIEA 15

Step 1: Decide what you are going to protect and what is out of scope. KAMI VANIEA 16

Scope boundary Sample Network Mobile Devices Wireless Access Point Desktop PCs and laptops Card Readers Personal Devices Boundary Firewall Email, web and application servers Databases Router Home PC Home Router Internet 3 rd party server KAMI VANIEA 17

Cyber Security Essentials KAMI VANIEA 18

Secure Configuration Objectives: Computers and network devices should be configured to reduce the level of inherent vulnerabilities and provide only the services required to fulfil their role. Default settings are not necessarily secure. Predefined passwords can be widely known. KAMI VANIEA 19

Secure Configuration 1. Unnecessary user accounts should be removed or disabled. 2. Any default password for a user account should be changed to an alternative, strong password. 3. Unnecessary software should be removed or disabled. 4. The auto-run feature should be disabled. 5. A personal firewall (or equivalent) should be enabled on desktop PCs and laptops, and configured to disable (block) unapproved connections by default. KAMI VANIEA 20

Scope boundary Sample Network Mobile Devices Wireless Access Point Desktop PCs and laptops Card Readers Personal Devices Boundary Firewall Email, web and application servers Databases Router Home PC Home Router Internet 3 rd party server KAMI VANIEA 21

Configuration is a real problem Misc Errors Crimeware Insider Misue Physical Theft/Loss Web App Attacks Denial of Service Cyber-espionage POS Intrusions Payment Card Services 0.00% 5.00% 10.00% 15.00% 20.00% 25.00% 30.00% 35.00% Verizon 2015 Data Breach Investigations Report KAMI VANIEA 22

Cyber Security Essentials KAMI VANIEA 24

Boundary firewalls and internet gateways Objectives: Information, applications and computers within the organization's internal networks should be protected against unauthorized access and disclosure from the internet, using boundary firewalls, internet gateways or equivalent network devices. Boundary devices are the first line of defense. Firewall rules can be used to stop basic attacks before they even reach the internal network. KAMI VANIEA 25

Sample Network Mobile Devices Wireless Access Point Desktop PCs and laptops Card Readers Personal Devices Boundary Firewall Email, web and application servers Databases Boundary devices Router Home PC Home Router Internet 3 rd party server KAMI VANIEA 26

Boundary firewalls and internet gateways 1. Change default administrator passwords for all network devices and firewalls. 2. Each rule that allows network traffic to pass through the firewall should be subject to approval by an authorized individual and documented. 3. Unapproved services, or services that are typically vulnerable to attack, should be disabled (blocked) by the boundary firewall by default. 4. Firewall rules that are no longer required should be removed or disabled in a timely manner. 5. The administrative interface used to manage boundary firewall configuration should not be accessible from the internet. KAMI VANIEA 27

Windows 8 Firewall rules KAMI VANIEA 28

Cyber Security Essentials KAMI VANIEA 29

Access control and administrative privilege management Objectives: accounts, particularly those with special access privileges should be assigned only to authorized individuals, managed effectively and provide the minimum level of access to applications, computers and networks. Principle of least privilege only give users access they need. Admin accounts have the most access, if one gets compromised it can lead to large scale loss of information. KAMI VANIEA 30

Access control and administrative privilege management 1. All user account creation should be subject to a provisioning and approval process. 2. Special access privileges should be restricted to a limited number of authorized individuals. 3. Details about special access privileges should be documented, kept in a secure location and reviewed on a regular basis. 4. Admin accounts should only be used to perform legitimate admin activities, and should not be granted access to email or the internet. 5. Admin accounts should be configured to require a password change on a regular basis. 6. Each user should authenticate using a unique username and strong password before being granted access to applications, computers and network devices. 7. accounts and special access privileges should be removed or disabled when no longer required or after a pre-defined period of inactivity. KAMI VANIEA 31

Low security devices Critical device Security device Sample Network Mobile Devices Wireless Access Point Desktop PCs and laptops Card Readers Personal Devices Boundary Firewall Email, web and application servers Databases Router Home PC Home Router Internet 3 rd party server KAMI VANIEA 32

Cyber Security Essentials KAMI VANIEA 33

Malware protection Objectives: Computers exposed to the internet should be protected against malware infection through the use of malware protection software. Todays Firewalls are very good, most malicious software must be invited in by a user opening an email, browsing a compromised website, or connecting compromised media. Protection software continuously monitors the computer for known malicious programs. KAMI VANIEA 34

Malware protection Install anti-malware software on all computers that are connected to or capable of connecting to the internet. Update anti-malware software on all computers. Configure anti-malware software to scan files automatically upon access and scan web pages when being accessed. Regularly scan all files. Anti-malware software should prevent connections to malicious websites on the internet. KAMI VANIEA 35

Sample Network Mobile Devices Wireless Access Point Desktop PCs and laptops Card Readers Personal Devices Boundary devices Boundary Firewall Email, web and application servers Databases Router Home PC Home Router Internet 3 rd party server KAMI VANIEA 36

Sample Network Mobile Devices Wireless Access Point Desktop PCs and laptops Card Readers Personal Devices Boundary devices Boundary Firewall Email, web and application servers Databases Router Home PC Internet 3 rd party server KAMI VANIEA 37

Cyber Security Essentials KAMI VANIEA 38

Patch management Objectives: Software running on computers and network devices should be kept up-to-date and have the latest security patches installed. Vulnerabilities in software are patched through updates. If you don t install the update, the vulnerability is not patched. However, patching can cause compatibility problems. So you should always test the patches. KAMI VANIEA 39

Patch management 1. Software running on computers and network devices on the internet should be licensed and supported to ensure security patches for known vulnerabilities are made available. 2. Updates to software running on computers and network devices should be installed in a timely manner. 3. Out-of-date software should be removed. 4. All security patches for software should be installed in a timely manner. KAMI VANIEA 40

A. Nappa, R. Johnson, L. Bilge, J. Caballero, and T. Dumitraș, The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching, in IEEE Symposium on Security and Privacy, San Jose, CA, 2015. Vulnerability survival Vulnerability half life

Vulnerability survival The % of computers patched X days after disclosure. A. Nappa, R. Johnson, L. Bilge, J. Caballero, and T. Dumitraș, The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching, in IEEE Symposium on Security and Privacy, San Jose, CA, 2015.

Heartbleed 600,000 vulnerable serves initially 300,000 vulnerable one month later 300,000 vulnerable two months later 200,000 vulnerable one year later Errata Security Blog http://blog.erratasec.com/2014/06/300k-vulnerable-to-heartbleed-two.html KAMI VANIEA 43

Scope boundary Sample Network Mobile Devices Wireless Access Point Desktop PCs and laptops Card Readers Personal Devices Boundary Firewall Email, web and application servers Databases Router Home PC Home Router Internet 3 rd party server KAMI VANIEA 45

Questions KAMI VANIEA 46