FALSE ALARM? Incident Management Case Study. Carlos Villalba carlos@tvrms.com

Similar documents
Client Security Risk Assessment Questionnaire

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

Network/Cyber Security

Cybersecurity: Protecting Your Business. March 11, 2015

INCIDENT RESPONSE CHECKLIST

One-Man Shop. How to build a functional security program with limited resources DEF CON 22

Cloud Security:Threats & Mitgations

Policy Title: HIPAA Security Awareness and Training

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Into the cybersecurity breach

Overcoming PCI Compliance Challenges

How To Manage Security On A Networked Computer System

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

information security and its Describe what drives the need for information security.

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

2012 Risk Assessment Workshop

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

SANS Top 20 Critical Controls for Effective Cyber Defense

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Nerds and Geeks Re-United: Towards a Practical Approach to Health Privacy Breaches. Gerard M. Stegmaier gstegmaier@wsgr.

KEY STEPS FOLLOWING A DATA BREACH

Remote Deposit Quick Start Guide

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Central Agency for Information Technology

EC-Council Ethical Hacking and Countermeasures

University of Illinois at Chicago Health Sciences Colleges Information Technology Group Security Policies Summary

The Education Fellowship Finance Centralisation IT Security Strategy

Incident Response. Six Best Practices for Managing Cyber Breaches.

Keyfort Cloud Services (KCS)

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Cybersecurity Best Practices

Security Policy for External Customers

Everything You Always Wanted to Know About Log Management But Were Afraid to Ask. August 21, 2013

Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

Information Security Policy

CERT/CSIRT Operation Operation. ADLI WAHID

Jibran Ilyas DIRECTOR

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015

Credit Card (PCI) Security Incident Response Plan

Microsoft s cybersecurity commitment

DATA BREACH BREAK DOWN LESSONS LEARNED FROM TARGET

Standard: Information Security Incident Management

All Information is derived from Mandiant consulting in a non-classified environment.

Information Security for the Rest of Us

Did you know your security solution can help with PCI compliance too?

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

FormFire Application and IT Security. White Paper

INFORMATION SECURITY TRAINING CATALOG (2015)

Environment. Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information.

DDoS Overview and Incident Response Guide. July 2014

Tenzing Security Services and Best Practices

Defensible Strategy To. Cyber Incident Response

PCI Compliance for Cloud Applications

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

What Data? I m A Trucking Company!

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

USM IT Security Council Guide for Security Event Logging. Version 1.1

Working with the FBI

Concierge SIEM Reporting Overview

An overview of IT Security Forensics

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

Project Title slide Project: PCI. Are You At Risk?

Session 334 Incident Management. Jeff Roth, CISA, CGEIT, CISSP

Zurich Security And Privacy Protection Policy Application

Protecting Sensitive Data Reducing Risk with Oracle Database Security

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

How to effectively respond to an information security incident

Understand Troubleshooting Methodology

Healthcare in the Crosshairs for Data Breaches. April 22, Deborah Hiser (512)

O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y

OCR s Anatomy: HIPAA Breaches, Investigations, and Enforcement

Information Security Basic Concepts

Network Security & Privacy Landscape

Summary of Technical Information Security for Information Systems and Services Managed by NUIT (Newcastle University IT Service)

Cyber Risks and Insurance Solutions Malaysia, November 2013

Network Security Forensics

Scalability in Log Management

Are You Ready for PCI 3.1?

Transcription:

FALSE ALARM? Incident Management Case Study Carlos Villalba carlos@tvrms.com

Initial Discovery The panic sets in: You think your company has been breached! So, what do you do?

First steps First things first. STOP, THINK, ANALYZE, THINK AGAIN, PROCEED and assemble your Response Team (PR, HR, C level, IT, Legal, Subject Matter Experts) You don't know what you don't know Let's fix that one first and then adopt the following motto: Do it right instead of quick! Start documenting EVERYTHING.

Agenda Breach response recipe (lessons learned in the field) Step 1: Confirm the breach Step 2: Contain the breach Step 3: Understand and investigate the breach Step 4: Report the breach (IC3) Step 5: Determine the cause Step 6: Communicate the breach? Step 7: Remediation Step 8: Proactive Security Protection

Step 1: Confirm the breach Signs of a breach: Site defacement Email attachments where sender is CEO or equivalent Abnormal activity on privileged user accounts Failed log-in attempts retailers beware Malware infection (The likely hood of key loggers and memory scrapper is high) Abnormal network traffic including ICMP, HTTP, and HTTPs. (e.g. Network connections to EU when your business is local) Your webcam light flickers on briefly Strange large files appear on the network. Sudden spikes in outbound DNS traffic. Your confidential data landed in PasteBin, ipaste.eu You have been informed by an authoritative source

Step 1: Confirm the breach Places to check, thing to do: Start you chain of custody. Not just the forms, document everything. Proceed with caution and treat the event as a breach until confirmed otherwise. (e.g. Pull the plug, memory image, disk image) Log files Your ISP? Extortion attempt.

Step 1: Confirm the breach Tools Old friends: grep, sed, awk, top, sysinternals, dumpit Open source tools: Filemon, Snort, Wireshark, volatility IDS, Netflow, and external threat data (Don t forget the flow) Useful findings: Flooded logs, files appearing and disappearing, intermittent processes.

Step 2: Contain the breach Collect the current state of the systems. As much as you can (e.g. Memory dump and disk image). Update your chain of custody documentation. Confirm your response team. Time to notify? Check legal and contract requirements. With information from previous phase (when applicable): Isolate breached system, some options: Connect system to its own network (isolated from the rest) Unplug the net. Add ACLs that reduce propagation via TCP/UDP Apply critical fix that closes the vulnerability In the event of virus (most of the times cleaning is not an option)

Step 2: Contain the breach Tools: Pull the plug (either network / power) IPS ACLs Firewalls Account removal

Step 3: Understand and investigate the breach Any recent terminations? Unable to identify the source and target of the breach? Unsure if breach has been contained? Crime? (If yes, local law enforcement) Legal or contractual obligation? If the answer is Yes or I don t know to any, then you need help. Professional security forensic services expertise Contact legal services with InfoSec expertise Update the Chain of Custody

Step 3: Understand and investigate the breach Tools: Autopsy The Sleuth Kit Kali dd combined with Live View Dumpit Volatility Framework Encase FTK Microsoft Coffee (Law enforcement)

Step 4: Report the breach (IC3) Consult legal, have them review SLAs and contracts. State requirements change, have them check that. Is your organization a covered entity or business associate in the health care market? The omnibus rule applies to you. Contact local police Contact local FBI office File IC3 report Contact your ISP Prepare for media (Leakages of breach by law enforcement have been known to happen)

Step 4: Report the breach (IC3) Resources: http://www.ic3.gov/default.aspx http://www.fbi.gov/phoenix/

Step 5: Determine the cause Identify entry and exit points What was taken? Any correlation point from previous phases?

Step 5: Determine the cause Tools SME s opinion Ntop (netflow analysis) Memory dump analysis Follow the money

Step 6: Communicate the breach? When appropriate and cleared by legal counsel. Business requirements Financial Requirements (FTC, PCI, etc.) Legal requirements (HIPAA, FTC, etc.) State requirements The Arizona breach disclosure law requires disclosure of data breaches without unreasonable delay. Arizona residents may be notified of breaches by phone. The law provides for civil and criminal penalties, but Arizona residents do not have the right of private legal action. Ariz. Rev. Stat. 44-7501 (http://www.azleg.state.az.us/formatdocument.asp?indoc=/ars/44/ 07501.htm&Title=44)

Step 7: Remediation Reset Your Passwords Update and Scan Take Back Your Accounts Check for Backdoors Follow the Money Perform a Security Audit on All Your Affected Accounts De-Authorize All Those Apps Monitor financials (keep an eye on the money)

Step 7: Remediation Tools: Logs IDS ISP assistance Forensic analysis

Step 8: Proactive Security Protection There is a proven ROI in the following: Monitoring Security events log correlation Business Impact Analysis Disaster Recovery Plan Business Continuity Plan Endpoint security Managed Security Services Incident response plans (tested of course)

Step 8: Proactive Security Protection Resources: Your own or managed security operations center. Eyes in the sky when your eyelids are tired or closed. Early warnings and detection. Let s stop using templates. Your policies and your procedures are only as good as you enforce them and if they apply to your own unique and realistic situation. Scanning, patching, passwords and perimeter security are very good but only a mere technical layer. Have a plan and test it!

Questions/Suggestions/Tips General advise Don t have a fight with your hair stylist when you are about to get a haircut. Public relations is often overlooked Insurance Monitoring 24/7 pays off Alerting 24/7 more than pays off