BOOTSTRAPPING YOUR INFORMATION SECURITY PROGRAM. Brian Smith-Sweeney bsmithsweeney@nyu.edu @bsmithsweeney



Similar documents
Methods for Sharing Dynamic IP Address Space Information with Others

Security Incident Management Essentials Compiled as a service to the community by Internet2, EDUCAUSE, and REN-ISAC

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Chapter 3 LAN Configuration

Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík

We Recommend: Click here to increase PC Speed! URL Decode Lookup. Express. DNS Records (Advanced Tool) URL Encode Trace.

Chapter 9 Monitoring System Performance

Presentation Title: When Anti-virus Doesn t Cut it: Catching Malware with SIEM

How To Configure Virtual Host with Load Balancing and Health Checking

CEH Version8 Course Outline

This article describes a detailed configuration example that demonstrates how to configure Cyberoam to provide the access of internal resources.

Kevin Hayes, CISSP, CISM MULTIPLY SECURITY EFFECTIVENESS WITH SIEM

NAC Guest. Lab Exercises

System Admin Module User Guide. Schmooze Com Inc.

Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost.

CompTIA Network+ (Exam N10-005)

Web Hosting Getting Started Guide

Security Information & Event Management (SIEM)

Agency Pre Migration Tasks

AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

Setting Up Scan to SMB on TaskALFA series MFP s.

Network Configuration Settings

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Funkwerk UTM Release Notes (english)

F-Secure Messaging Security Gateway. Deployment Guide

Chapter 12 Supporting Network Address Translation (NAT)

escan SBS 2008 Installation Guide

Appendix D: Configuring Firewalls and Network Address Translation

Migration guide. Business

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Migration Quick Reference Guide for Administrators

GregSowell.com. Mikrotik Security

Network Defense Tools

H.I.P.A.A. Compliance Made Easy Products and Services

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Software that provides secure access to technology, everywhere.

DEPLOYMENT GUIDE. This document gives a brief overview of deployment preparation, installation and configuration of a Vectra X-series platform.

All You Wanted to Know About WiFi Rogue Access Points

Key Features of Dynamic Address Objects

Description: Objective: Attending students will learn:

CALNET 3 Category 7 Network Based Management Security. Table of Contents

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Designing a Windows Server 2008 Network Infrastructure

How to Make Your IDS Useful. Joel M Snyder Senior Partner Opus One jms@opus1.com

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

CMPT 471 Networking II

MCSE SYLLABUS. Exam : Managing and Maintaining a Microsoft Windows Server 2003:

MCSA Objectives. Exam : TS:Exchange Server 2007, Configuring

Security Analytics for Smart Grid

Installing Novell Client Software (Windows 95/98)

Module 1: Overview of Network Infrastructure Design This module describes the key components of network infrastructure design.

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

FIREWALL INTELLIGENCE. 1 Copyright 2014 Juniper Networks, Inc.

Millbeck Communications. Secure Remote Access Service. Internet VPN Access to N3. VPN Client Set Up Guide Version 6.0

Chapter 9 Firewalls and Intrusion Prevention Systems

Section 12 MUST BE COMPLETED BY: 4/22

1 PC to WX64 direction connection with crossover cable or hub/switch

Fireware Essentials Exam Study Guide

Lab Configuring Access Policies and DMZ Settings

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

How the Internet Works

CompTIA Exam N CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

Chapter 15: Advanced Networks

Source-Connect Network Configuration Last updated May 2009

Network Security Policy

Firewalls. Chapter 3

Bypassing Network Access Control Systems

FortKnox Personal Firewall

1. Hardware Installation

INTRODUCTION TO FIREWALL SECURITY

Firewall Audit Techniques. K.S.Narayanan HCL Technologies Limited

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Firewall VPN Router. Quick Installation Guide M73-APO09-380

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

Installation Guide For Choic Enterprise Edition

Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013

Response to Questions CML Managed Information Security

STARTER KIT. Infoblox DNS Firewall for FireEye

Chapter 15. Firewalls, IDS and IPS

Focus on Security. Keeping the bad guys out

IDS or IPS? Pocket E-Guide

WildFire Reporting. WildFire Administrator s Guide 55. Copyright Palo Alto Networks

Smart Telephone System

Quick Installation Guide For Mac users

MICROSOFT CERTIFIED SYSTEMS ENGINEER Windows 2003 Track

Networking for Caribbean Development

Important Information

Use Domain Name System and IP Version 6

Integrating Juniper Netscreen (ScreenOS)

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

Multi-Homing Dual WAN Firewall Router

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

Chapter 2 Connecting the FVX538 to the Internet

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Transcription:

BOOTSTRAPPING YOUR INFORMATION SECURITY PROGRAM Brian Smith-Sweeney bsmithsweeney@nyu.edu @bsmithsweeney

GOALS OF BOOTSTRAPPING Gain visibility Build capability Form relationships Get quick wins Establish trust

Visibility Relationships Data Discovery Intrusion Detection Capability Visibility Capability Visibility Relationships Project Review Incident Response Capability Relationships

INTRUSION DETECTION

ESTABLISH CONTACT Requirements: Access to DNS records Access to WHOIS records (ARIN) Someone to read those emails! Mailbox Area Mandatory abuse@<domain> Abuse reports Mandatory postmaster@<domain> SMTP issues Optional noc@<domain>.edu Networking issues Optional security@<domain>.edu Security issues Optional hostmaster@<domain>.edu DNS issues Optional webmaster@<domain>.edu Web issues INTRUSION DETECTION

ESTABLISH CONTACT Network Whois record Queried whois.arin.net with "n 128.122.0.0"... NetRange: 128.122.0.0-128.122.255.255 CIDR: 128.122.0.0/16 OriginAS: NetName: NYU-NET NetHandle: NET-128-122-0-0-1 Parent: NET-128-0-0-0-0 NetType: Direct Assignment OrgName: New York University OrgId: NYU Address: 726 Broadway, 8th Floor - ITS OrgAbuseHandle: TSSI-ARIN OrgAbuseName: Technology Security Services - ITS OrgAbusePhone: +1-212-998-3333 OrgAbuseEmail: abuse@nyu.edu OrgAbuseRef: http://whois.arin.net/rest/poc/tssi-arin INTRUSION DETECTION

Source: http://security.arizona.edu/report-incident http://www.nyu.edu/its/security/contact/ INTRUSION DETECTION

http://www.shadowserver.org/wiki/pmwiki.php/involve/getreportsonyournetwork https://postmaster.live.com/snds/ http://www.team-cymru.org/services/tcconsole/ INTRUSION DETECTION

NETWORK MONITORING Requirements: Internet Router Servers Choke point (span, etc.) Server Intermediate sys admin Time to tune Time to process (just kidding!) Sensor Desktops Rule-based IDS Console/SIEM Flow monitor Intelligence Feeds INTRUSION DETECTION

NETWORK MONITORING::ALT Requirements: Internet Router Servers Choke point (span, etc.) Server Basic sys admin (less) tuning (less) processing Desktops Bonus: DNS logs! INTRUSION DETECTION

Quickly builds: capability and visibility INTRUSION DETECTION

INCIDENT RESPONSE

TRACKING DOWN HOSTS Greetings, The following host(s) has been identified as being infected with Pushdo/Cutwail. The host(s) might also be sending spam, as well sending traffic to random webservers [1]. description address timestamp in UTC d-prt +-------------+-----------------+----------------------+-------+ Pushdo 216.165.xxx.yyy 2014-06-02T19:21:19Z 25 +-------------+-----------------+----------------------+-------+ key: s-prt = source port; prtcl = protocol; dest-addr = destination address; d-prt = destination port INCIDENT RESPONSE

TRACKING DOWN HOSTS 1) NAT -> internal ip NAT/PAT logs Proxy logs 3) MAC -> Location CAM tables Useful naming scheme Cable tracing?!? 2)Internal ip -> MAC DHCP Server Logs ARP logs Static ip allocation INCIDENT RESPONSE

Wireless. Bleh. INCIDENT RESPONSE

Log. Everything. INCIDENT RESPONSE

STARTING LOGS Requirements: Log server Lots of disk! Basic sys admin Minimally log Central authentication NAT/PAT/Proxy DHCP Consider adding DNS queries Active Directory Webmail SMTP VPN All firewall logs Major systems AV INCIDENT RESPONSE

Nuke From Orbit (NFO) It s the only way to be sure. INCIDENT RESPONSE

WORKFLOW Every ticketing system sucks. Here at Best Practical, we're really proud of the fact that RT sucks less than everything else out there and helps many thousands of organizations around the world get their work done with less pain and suffering. http://www.bestpractical.com INCIDENT RESPONSE

WORKFLOW Requirements: Server Email aliases Basic sys admin A little Perl INCIDENT RESPONSE

Quickly builds: capability and relationships INTRUSION DETECTION

PROJECT REVIEW

Security tasked to project Write memos Security meets with project team Secure? No Project Manager Stops project? No Fight! Yes Yes Liar Call it a win PROJECT REVIEW

We should not accept risk. INTRUSION DETECTION

PROJECT REVIEW

SECURITY REVIEW IN 4 HOURS 1. Vendor asserts compliance requirements (5m) 2. Vendor fills out questionnaire (5m) 3. Review questionnaire (1 hours) 4. Research vendor (1 hour) 5. Discuss questionnaire with vendor and project team (1 hour) 6. Summarize findings (1 hour) PROJECT REVIEW

SECURITY REVIEW IN 2 HOURS 1. Vendor asserts compliance requirements (5m) 2. Vendor fills out questionnaire (5m) 3. Review questionnaire (2 hours) 4. Research vendor (1 hour) 5. Discuss questionnaire with vendor and project team (1 hour) 6. Summarize findings (1 hour) PROJECT REVIEW

Quickly builds: capability, visibility and relationships PROJECT REVIEW

DATA DISCOVERY

ANSWER ME THESE QUESTIONS THREE 1. What kind of data do you deal with regularly? 2. Where does it live and go? 3. What s your biggest data security concern? PROJECT REVIEW

WATCH OUT FOR Authoritative financials Credit Card Numbers Social Security Numbers Patient data Intellectual property Human/civil rights work Interesting to state actors Compliance risk Threat risk PROJECT REVIEW

Quickly builds: visibility and relationships DATA DISCOVERY

CONCLUSION

Visibility Relationships Data Discovery Intrusion Detection Capability Visibility Capability Visibility Relationships Project Review Incident Response Capability Relationships CONCLUSION

CODA: PERSUASION AND CHANGE Harnessing the Science of Persuasion 6 Principles of Persuasion 12 Angry Men CONCLUSION

OK, NOW WHAT? Security Incident Management Essentials http://www.ren-isac.net/docs/security_incident_management_essentials_v4.pdf Introduction to Security Onion https://code.google.com/p/security-onion/wiki/introductiontosecurityonion RTIR Incident Handline Workflow (JANET) http://www.bestpractical.com/static/rtir/janet-workflow.pdf NYU Data and Computer Security Policy http://www.nyu.edu/its/policies/sec_compdata.html Educause/I2 Information Security Guide https://wiki.internet2.edu/confluence/display/2014infosecurityguide CONCLUSION