ADVANCED PERSISTENT THREATS & ZERO DAY ATTACKS



Similar documents
ADVANCED PERSISTENT THREATS & ZERO DAY ATTACKS

Cybersecurity Enhancement Account. FY 2017 President s Budget

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Accenture Cyber Security Transformation. October 2015

Kent State University s Cloud Strategy

Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst

Advanced Persistent Threats

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Nine Steps to Smart Security for Small Businesses

I D C A N A L Y S T C O N N E C T I O N

Proven LANDesk Solutions

Cybersecurity The role of Internal Audit

Addressing Cyber Risk Building robust cyber governance

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Cloud Architect Certification Self-Study Kit Bundle

The ICS Approach to Security-Focused IT Solutions

Network/Cyber Security

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Incident Response. Proactive Incident Management. Sean Curran Director

Payment Card Industry Data Security Standard

Microsoft s cybersecurity commitment

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Symantec Consulting Services

Supplier Vigilance: A Critical Layer of Defense

CyberArk Privileged Threat Analytics. Solution Brief

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

The Leading Provider of Endpoint Security Solutions

National Cyber Security Framework and Protocol. for securing digital information in networked critical infrastructures and communications

Enabling the SmartGrid through Cloud Computing

THE TOP 4 CONTROLS.

National Cyber Security Policy -2013

Cybersecurity: Mission integration to protect your assets

Computing: Public, Private, and Hybrid. You ve heard a lot lately about Cloud Computing even that there are different kinds of Clouds.

Designing & Implementing. Programs. MBA Bank Expo 2012 April 11, 2012

Solving the Security Puzzle

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Network Security Landscape

Cybersecurity: An Innovative Approach to Advanced Persistent Threats

BlackRidge Technology Transport Access Control: Overview

Cyber Security: from threat to opportunity

Simply Sophisticated. Information Security and Compliance

Healthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council

Continuous Network Monitoring

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

carahsoft Florida Department of Management Services CARAHSOFT S RESPONSE TO THE REQUEST FOR INFORMATION

Information Technology Services. Roadmap

journey to a hybrid cloud

Cyber Risks and Insurance Solutions Malaysia, November 2013

McAfee Security Architectures for the Public Sector

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services

Data Center security trends

Analyzing HTTP/HTTPS Traffic Logs

Dealing with Big Data in Cyber Intelligence

IBM QRadar Security Intelligence April 2013

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Agenda. What is cloud? Cloud based services The Good bad and Ugly.. Anatomy of a cloud Guidelines for you

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

Data Management Roadmap

Defending Against Data Beaches: Internal Controls for Cybersecurity

Intelligence Driven Security

Top Five Ways to Protect Your Network. A MainNerve Whitepaper

DoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO

Epson Connect Guide NPD EN

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

KUDELSKI SECURITY DEFENSE.

10 best practice suggestions for common smartphone threats

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems

The Four-Step Guide to Understanding Cyber Risk

A HELPING HAND TO PROTECT YOUR REPUTATION

Cyber security Building confidence in your digital future

The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh. May 20 th, 2013

Security Issues in Cloud Computing

Cybersecurity as a Risk Factor in doing business

Hands on, field experiences with BYOD. BYOD Seminar

Cisco SAFE: A Security Reference Architecture

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

Defending Against Cyber Attacks with SessionLevel Network Security

Service Design & Problem Management:

Cybersecurity: Learn Critical Strategies to Protecting Your Enterprise November 6, :00PM EST

The Evolution of the Enterprise And Enterprise Security

Evolving Threats and Attacks: A Cloud Service Provider s viewpoint. John Howie Senior Director Online Services Security and Compliance

Data Center Security That Accelerates Your Business

ADVANCE YOUR MISSION WITH THE CLOUD DO MORE WITH LESS CLOUD SOLUTIONS CDW NONPROFIT

Klickstart Business Solutions & Services

The Evolving Security Landscape. Andreas M Antonopoulos Senior Vice President & Founding Partner

Breaking down silos of protection: An integrated approach to managing application security

What Cloud computing means in real life

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

Private Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ

The Hillstone and Trend Micro Joint Solution

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015

Transcription:

情 報 ネットワーク 法 学 会 研 究 大 会 基 調 講 演 2010 年 12 月 11 日 VN PRSISTNT THRTS & ZRO Y TTKS Japan Law Workshop ecember 11, 2010 yber Security Strategies, LL 1 VN PRSISTNT THRTSと ゼロデイ 攻 撃 Japan Law Workshop ecember 11, 2010 yber Security Strategies, LL 1 1

情 報 ネットワーク 法 学 会 研 究 大 会 基 調 講 演 2010 年 12 月 11 日 2008-2010 Is The yber Tipping Point STONI GORGI L UTS THUM RIV N SOIL NTWORKING/WIKILKS YR SPIONG/OPRTION UROR KOR STUXNT YR RIMINL.YR TRRORISM yber Security Strategies, LL 2 2008-2010 Is The yber Tipping Point 2008~2010 年 はサイバーの 転 換 点 ( 臨 界 点 ) エストニア グルジア ケーブル 切 断 USメモリ(Thumb-drive)の 禁 止 ソーシャルネットワーキング/ウィキリークス サイバースパイ/UROR 作 戦 韓 国 Stuxnet 攻 撃 サイバー 犯 罪.サイバーテロ * Stuxnet: Windowsのショートカットファイルに 存 在 する 脆 弱 性 を 狙 ったマルウェアで 制 御 システムや 電 力 会 社 を 狙 った 初 のマルウェア yber Security Strategies, LL 2 2

情 報 ネットワーク 法 学 会 研 究 大 会 基 調 講 演 2010 年 12 月 11 日 yber rime Is t The Scale of The rug Trade yber crime it s easier it s lower risk it s as lucrative Malware is the weapon yber Security Strategies, LL 3 yber rime Is t The Scale of The rug Trade サイバー 犯 罪 の 規 模 は 麻 薬 取 引 の 規 模 に 匹 敵 サイバー 犯 罪 より 簡 単 に より 低 いリスクに 儲 かるように なってきています 武 器 はマルウェア yber Security Strategies, LL 3 3

情 報 ネットワーク 法 学 会 研 究 大 会 基 調 講 演 2010 年 12 月 11 日 Wide Range of yber rime Victims March 5, 2010 Westin onaventure L hacked; redit/debit card data lost Jan. 30, 2010 Malware-infected P exposes SIU student SSN s Oct. 1, 2009 Targeted e-mails distributed malware in Payhoice breach Sep. 25, 2009 UN hapel Hill server hacked; 236,000 records breached Jul. 24, 2009 Network Solutions server hacked; 573,000 records lost May 28, 2009 etna server breached; 65,000 records stolen yber Security Strategies, LL 4 Wide Range of yber rime Victims サーバー 犯 罪 被 害 の 拡 大 March 5, 2010 Westin onaventure ホテルLがハックされ クレジットカード/デビッ トカードのデータ 損 失 Jan. 30, 2010 マルウェアに 感 染 したPにより 南 イリノイ 大 学 生 の 社 会 保 障 番 号 の 公 開 Oct. 1, 2009 Payhoiceの 漏 洩 により 標 的 型 メールがマルウェアを 配 布 Sep. 25, 2009 UN hapel Hillのサーバがハックされ 236,000 件 のレコードが 漏 洩 Jul. 24, 2009 Network Solutionsのサーバがハックされ 573,000 件 のレコード が 損 失 May 28, 2009 etnaのサーバの 漏 洩 により 65,000 件 のレコードが 盗 難 yber Security Strategies, LL 4 4

情 報 ネットワーク 法 学 会 研 究 大 会 基 調 講 演 2010 年 12 月 11 日 yber spionage a Rapidly Rising Threat yber espionage it s happening it s intense it s a top priority Sophisticated nterprises are targets Malware is the weapon yber Security Strategies, LL 5 yber spionage a Rapidly Rising Threat サイバースパイで 急 速 に 増 加 する 脅 威 サイバースパイ 実 際 に 発 生 しており 激 化 しており 最 優 先 課 題 になっています 洗 練 された 事 業 (Sophisticated nterprises) が 標 的 武 器 はマルウェア yber Security Strategies, LL 5 5

Rising Tide of yber spionage Jan 14, 2010 Operation urora: dobe Identified s Victim of ttack Jan 12, 2010 Operation urora targets Google IP, Gmail accessed May 13, 2009 US Homeland Security information network hacked pr 21, 2009 ttackers breach $300 Joint Strike Fighter project Mar 28, 2009 GhostNet - Vast Spy System Loots Ps in 103 ountries ec. 02, 2008 Malware targets U.S. military computers gent.btz Nov. 20, 2008 Network Security reaches Plague NS 6 yber Security Strategies, LL Rising Tide of yber spionage サイバースパイの増加傾向 Jan 14, 2010 urora作戦: dobe への攻撃が判明 Jan 12, 2010 urora 作戦は Google を標的 知的財産と Gmail がアクセスさ れた May 13, 2009 米国土安全保障省の情報ネットワークがハックされた pr 21, 2009 攻撃者が3000億ドルのJSF(統合攻撃戦闘機)プロジェクトを漏洩 Mar 28, 2009 GhostNet 大規模なスパイシステムが103カ国のPを略奪 ec. 02, 2008 マルウェアが米軍のコンピュータを標的 gent.btz Nov. 20, 2008 ネットワークセキュリティ侵害がNSに蔓延 6 yber Security Strategies, LL 6

Strategic Security and Risk Management must be adopted in orporate cultures yber Warfare it s targeting everyone leadership must prioritize the board room must care Malware changes landscape omprehensive approach for ritical Infrastructure e.g Power Grid, anks etc. major cyber attack on ritical Infrastructure economically devastating oth state and non-state espionage has created the opportunity 7 yber Security Strategies, LL 戦略的セキュリティとリスクマネジメントを 企業文化として取り込まなければならない サイバー戦争 誰でも標的にされる リーダーシップが必須 経営陣が留意しなければ ならない マルウェアにより状況が 一変 情報インフラストラクチャへの広範な攻撃 例 パワーグリッド 銀行など 重要インフラストラクチャを狙った大規模なサイバー攻撃は 経済的に打撃を与える 国家及び国家以外のスパイが引き起こす可能性がある 7 yber Security Strategies, LL 7

haracterizing dvanced Persistent Threats 8 yber Security Strategies, LL haracterizing dvanced Persistent Threats dvanced Persistent Threatsの特徴 8 yber Security Strategies, LL 8

yber Security Maturity Model* Robust Information & ommunications Technologies for Mission Success NTION STT Resilience Threat VN PRSISTNT THRT Most Organizations ONVNTIONL THRT gility / Speed of ction Reactive & Manual People based following doctrine and doing their best to put out fires Tools-ased Integrated Picture pplying tools and technologies piecemeal to assist people in reacting faster Loosely integrated with focus on interoperability and standards based data exchange for I situational awareness ynamic efense Predictive and agile, the enterprise instantiates policy, illuminates events and helps the operators find, fix, and target for response Resilient nterprise Predictive & mission focused, isolates and contains damage, secure supply chains and protect key critical infrastructures to operate through cyber attack 9 *yber Security Strategies, LL yber Security Maturity Model* サイバーセキュリティ成熟度モデル Robust Information & ommunications Technologies for Mission Success NTION STT 耐性 脅威 VN PRSISTNT THRT 大半の組織 ONVNTIONL THRT 俊敏性 / 行動のスピード 事後対応 / 手作業 People based following doctrine and doing their best to put out fires ツールベース 統合 pplying tools and technologies piecemeal to assist people in reacting faster Loosely integrated with focus on interoperability and standards based data exchange for I situational awareness 動的な防御 Predictive and agile, the enterprise instantiates policy, illuminates events and helps the operators find, fix, and target for response 耐性のある エンタープライズ Predictive & mission focused, isolates and contains damage, secure supply chains and protect key critical infrastructures to operate through cyber attack 9 *yber Security Strategies, LL 9

ynamic efense: Why?? Like any crime, cyber attacks boil down to the loss of one of 3 things: 1. Informati on (onfide ntiality) ritical data, financial data, personal data 2. ontrol (Integrity) Resources are being controlled by someone else 3. ssets (vailability) systems aren t available, don t work, or don t work correctly or reliably. 10 ynamic efense: Why?? 動的な防御 なぜ必要 他の犯罪と同様に サイバー攻撃は以下のいずれかの損失におとしめる 1. 情報 (機密性) 貴重なデ 2. コントロール (完全性) ータ 金融関連データ 個 どこかの誰かにリソースが 人データ コントロールされてしまう 3. 資産 (可用性) システム が利用できない 動作しな い 正しく動作しない 信頼で きる状態で動作しない 10 10

When the Problem Started User Land Public Server Scan & xploit ttack Workstation Internal Server Systems were given Internet ddresses They could be connected to from anywhere in the world ttackers would scan looking for Vulnerable Services Malware 11 3 When the Problem Started 問題の発端 利用者側 公開サーバ ワークステーション スキャン & 特権奪取攻撃 内部サーバ 3 システムにインターネットアドレスが与えら れる システムは世界中のどこからでも接続可能 攻撃者は脆弱なサービスを探索するために スキャンする マルウェア 11 11

yber Security Maturity Model* Robust Information & ommunications Technologies for Mission Success Threat-Policy Resilience Most Organizations gility / Speed of ction Reactive & Manual People based following doctrine and doing their best to put out fires Tools-ased Integrated Picture pplying tools and technologies piecemeal to assist people in reacting faster Loosely integrated with focus on interoperability and standards based data exchange for I situational awareness ynamic efense Predictive and agile, the enterprise instantiates policy, illuminates events and helps the operators find, fix, and target for response Resilient nterprise Predictive & mission focused, isolates and contains damage, secure supply chains and protect key critical infrastructures to operate through cyber attack 12 *yber Security Strategies, LL yber Security Maturity Model* サイバーセキュリティ成熟度モデル Robust Information & ommunications Technologies for Mission Success 脅威 - ポリシー 耐性 大半の組織 俊敏性 / 行動のスピード 事後対応 / 手作業 People based following doctrine and doing their best to put out fires ツールベース 統合 pplying tools and technologies piecemeal to assist people in reacting faster Loosely integrated with focus on interoperability and standards based data exchange for I situational awareness 動的な防御 Predictive and agile, the enterprise instantiates policy, illuminates events and helps the operators find, fix, and target for response 耐性のある エンタープライズ Predictive & mission focused, isolates and contains damage, secure supply chains and protect key critical infrastructures to operate through cyber attack 12 *yber Security Strategies, LL 12

Global yber hallenge Synchronizing Governance, Policy, Standards, Regulation, and Privacy alancing National Security and conomic Security 13 Global yber hallenge グローバルなサイバーでの挑戦 ガバナンスとポリシー スタンダード 規制とプライバシーの同調 国家的セキュリティと 経済的セキュリティのバランス 13 13

yber Security Maturity Model* Robust Information & ommunications Technologies for Mission Success Threat-Technology Resilience Most Organizations gility / Speed of ction Reactive & Manual People based following doctrine and doing their best to put out fires Tools-ased Integrated Picture pplying tools and technologies piecemeal to assist people in reacting faster Loosely integrated with focus on interoperability and standards based data exchange for I situational awareness ynamic efense Predictive and agile, the enterprise instantiates policy, illuminates events and helps the operators find, fix, and target for response Resilient nterprise Predictive & mission focused, isolates and contains damage, secure supply chains and protect key critical infrastructures to operate through cyber attack 14 *yber Security Strategies, LL yber Security Maturity Model* サイバーセキュリティ成熟度モデル Robust Information & ommunications Technologies for Mission Success 耐性 脅威 - 技術 大半の組織 俊敏性 / 行動のスピード 事後対応 / 手作業 People based following doctrine and doing their best to put out fires ツールベース 統合 pplying tools and technologies piecemeal to assist people in reacting faster Loosely integrated with focus on interoperability and standards based data exchange for I situational awareness 動的な防御 Predictive and agile, the enterprise instantiates policy, illuminates events and helps the operators find, fix, and target for response 耐性のある エンタープライズ Predictive & mission focused, isolates and contains damage, secure supply chains and protect key critical infrastructures to operate through cyber attack 14 *yber Security Strategies, LL 14

HSS powered by cloud=ynamic defense Vulnerability ontinuous Monitoring File Reputation Web Reputation mail Reputation Network Reputation Management Framework Layered efense HIPS V Policy uditor Managed Systems HSS Suite 15 onfidential Mcfee Internal Use Only 15 HSS powered by cloud=ynamic defense クラウドによるHSS = 動的な防御 Vulnerability 継続的な モニタリング File Reputation Web Reputation mail Reputation Network Reputation マネジメント フレームワーク 階層化した防御 HIPS V Policy uditor Managed Systems HSS Suite 15 onfidential Mcfee Internal Use Only 15 15

yber Security Maturity Model* Robust Information & ommunications Technologies for Mission Success Threat-Technology Resilience loud Securty, greateer use of hardware, virtulaization, situational awareness Most Organizations gility / Speed of ction Reactive & Manual People based following doctrine and doing their best to put out fires Tools-ased Integrated Picture pplying tools and technologies piecemeal to assist people in reacting faster Loosely integrated with focus on interoperability and standards based data exchange for I situational awareness ynamic efense Predictive and agile, the enterprise instantiates policy, illuminates events and helps the operators find, fix, and target for response Resilient nterprise Predictive & mission focused, isolates and contains damage, secure supply chains and protect key critical infrastructures to operate through cyber attack 16 *yber Security Strategies, LL yber Security Maturity Model* サイバーセキュリティ成熟度モデル Robust Information & ommunications Technologies for Mission Success 耐性 脅威 - 技術 クラウドセキュリティ ハードウェアと仮想化 の積極的な利用 situational awareness 大半の組織 俊敏性 / 行動のスピード 事後対応 / 手作業 People based following doctrine and doing their best to put out fires ツールベース 統合 pplying tools and technologies piecemeal to assist people in reacting faster Loosely integrated with focus on interoperability and standards based data exchange for I situational awareness 動的な防御 Predictive and agile, the enterprise instantiates policy, illuminates events and helps the operators find, fix, and target for response 耐性のある エンタープライズ Predictive & mission focused, isolates and contains damage, secure supply chains and protect key critical infrastructures to operate through cyber attack 16 *yber Security Strategies, LL 16

loud omputing = Resiliency enefits Priorities On emand Service road Network ccess Resource Pooling Rapid lasticity Measured Service 1.Strong registration process 2.Robust authentication and access control 3.Strict supply chain risk management & inside threat checks 4.efense in depth (especially Monitoring) 5.ncryption of data at rest/transit 6.Understand usage and plan to operate thru cyber events risk management 17 loud omputing = Resiliency クラウドコンピューティング = 耐性 利点 Priorities 優先度付け オンデマンド サービス 広域ネットワークアクセス リソースのプール 迅速で柔軟 対策済みのサービス 1.強固な登録プロセス 2.強固な主体確認とアクセス制御 3.厳格なサプライチェイン リスクマネジメ ント & 内在する脅威の確認 4.efense in depth (特にモニタリング) 5.保存と移行時のデータ暗号化 6.利用状況の理解とサイバーイベントを 通じた運用計画 risk management 17 17

Testing the Hypothesis of the loud o s R and Storefront Gateway to a more secure computing center Storefront allows users to download large business applications and services form the site, similar to pple s ppstore 18 クラウドについての仮説と検証 国防総省の R と Storefront R: よりセキュアなコンピューテ ィングセンターへのゲートウ ェイ Storefront: 利用者が多数のビジネスア プリケーションサイト用のサ ービスをダウンロードできる pple の ppstore のよう なもの 18 18

www.disa.mil/race www.disa.mil/race 19

Roadmap from Legacy to loud omputing Rigid State Technology Obsolete IT Infrastructure ependence on Proprietary Technology Inefficient Use of IT apacity Outmoded / Non-secure Remote ccess Reactive Request and Reply Focused Unstable operation Low wareness of Incidents atch Processing Orientation Fragmented Help esk/support Structure Streamlined Utility State loud ompute State Technology Technology Massive IT Modernization ISO 9001 Standards Service Focused ynamic Load alance for Web pps -uthentication Nationwide IT Help esk -Mail Modernization IPv6 ompliance ITIL Standards ontinuous Technology Refreshment Proactive Sense and Response Focused Integrated pproach to Remote ccess Integrated IT Nationwide Ubiquitous network access. Location independent resource pooling. Predictive Scaling of IT Zero ependence on Proprietary Technology dge omputing lways On IT Resilience Increased utilization efficiencies Secure 2 onnectivity onvenient Web-ased, nduser ccess nterprise Identity Management nterprise ontent Management On-demand self-service. Rapid elasticity. Measured Service Reduced apex and Opx usiness usiness Many Silos / Limited Integration Inconsistent Standards onflicting Procedures Inability to Leverage Products Limited ommon View of nterprise Information Work Force No Measurement of Satisfaction No ccess to Trouble Tickets Large lerical Interface Stovepipe Processes Outcome High TO Misaligned ost / Performance Limited OOP capability uild Once, Service Many limination of uplicate ata ntry to isparate Systems nterprise Services Initiated Records Management Workflow usiness Partner Integration usiness Work Force Increased Knowledge Retention High Mobility Work Force Measurable Support Service levels ccess to Trouble Ticket status Increased Wireless evice Usage Upgraded esktops / Tools Self Service Web-nabled Tele-Worker Integrated ccess to ollaboration Tools Outcome Increased ompliance Improved ccess to Financial Information Improved IV doption of HSP-12 ssured OOP Predictable IT Spend High-onfidence OOP Measurable Performance Rapid isaster Relief Mobilization Outcome Simplified nd-to-nd usiness Process Faster Time from Policy to Implementation Increased Stakeholder Productivity Through Self-Service Simplified ccess Maximized Resource Utilization Organization-wide SO Standards nhanced ata Integrity entralized ata Management Roadmap from Legacy to loud omputing レガシーからクラウドコンピューティングへの道のり Rigid State Technology Obsolete IT Infrastructure ependence on Proprietary Technology Inefficient Use of IT apacity Outmoded / Non-secure Remote ccess Reactive Request and Reply Focused Unstable operation Low wareness of Incidents atch Processing Orientation Fragmented Help esk/support Structure Streamlined Utility State loud ompute State Technology Massive IT Modernization ISO 9001 Standards Service Focused ynamic Load alance for Web pps -uthentication Nationwide IT Help esk -Mail Modernization IPv6 ompliance Technology ITIL Standards ontinuous Technology Refreshment Proactive Sense and Response Focused Integrated pproach to Remote ccess Integrated IT Nationwide Ubiquitous network access. Location independent resource pooling. Predictive Scaling of IT Zero ependence on Proprietary Technology dge omputing lways On IT Resilience Increased utilization efficiencies Secure 2 onnectivity onvenient Web-ased, nduser ccess nterprise Identity Management nterprise ontent Management On-demand self-service. Rapid elasticity. Measured Service Reduced apex and Opx usiness usiness Many Silos / Limited Integration Inconsistent Standards onflicting Procedures Inability to Leverage Products Limited ommon View of nterprise Information Work Force No Measurement of Satisfaction No ccess to Trouble Tickets Large lerical Interface Stovepipe Processes Outcome High TO Misaligned ost / Performance Limited OOP capability uild Once, Service Many limination of uplicate ata ntry to isparate Systems nterprise Services Initiated Records Management Workflow usiness Partner Integration Work Force Increased Knowledge Retention High Mobility Work Force Measurable Support Service levels ccess to Trouble Ticket status Increased Wireless evice Usage Upgraded esktops / Tools Self Service Web-nabled Tele-Worker Integrated ccess to ollaboration Tools Outcome Predictable IT Spend High-onfidence OOP Measurable Performance Rapid isaster Relief Mobilization usiness Increased ompliance Improved ccess to Financial Information Improved IV doption of HSP-12 ssured OOP Outcome Simplified nd-to-nd usiness Process Faster Time from Policy to Implementation Increased Stakeholder Productivity Through Self-Service Simplified ccess Maximized Resource Utilization Organization-wide SO Standards nhanced ata Integrity entralized ata Management 20

The volution of R loud omputing at IS (R 2.0) loud Services loud Management OLLORTION TST MNGMNT PORTL LOU ORHSTRTION & OUNTING USINSS SRVI MGMT VRSION ONTROL SRVIS IT SRVI MGMT loud Infrastructure SURITY MGMT TS IT OPRTIONS Multiple s Multiple Operating System Platforms PLTFORMS PROVISIONING Multiple PROSSING KUP/RHIV Multiple Storage STORG ONFIGURTION MGMT IS:efence Information Systems gency 米国 防衛情報システム局 R の進化 ISにおけるクラウドコンピューティング (R 2.0) クラウドサービス クラウドマネージメント OLLORTION TST MNGMNT PORTL LOU ORHSTRTION & OUNTING USINSS SRVI MGMT VRSION ONTROL SRVIS クラウドインフラストラクチャ IT SRVI MGMT SURITY MGMT IT OPRTIONS TS PLTFORMS Multiple s Multiple Operating System Platforms PROSSING Multiple STORG Multiple Storage PROVISIONING KUP/RHIV ONFIGURTION MGMT 21

Secure loud omputing Model loud omputing Vision loud Services loud Management SL & SYSTM RPORTING PROXY/GTWYS OLLORTION TST MNGMNT W SRVR &PORTL SVS IRTORY SRVIS ROSS OMIN SRVIS TST T SS UGTING & FINNIL TOOLS PP PLOYMNT SRVIS NTWORK SIMULTION LIV T STRMS USINSS SRVI MGMT SURITY VLUTION SVS VRSION ONTROL SRVIS RLS N FILK SRVIS USR ONTROLL KUP/RHIV IT SRVI MGMT PORTL LOU ORHSTRTION & OUNTING loud Infrastructure SURITY MGMT MILWR TS Multiple IT OPRTIONS Multiple s Multiple Operating System PLTFORMS PROVISIONING Multiple PROSSING KUP/RHIV Multiple Storage STORG Multiple Network NTWORK ONFIGURTION MGMT セキュア クラウドコンピューティング モデル クラウドコンピューティングのビジョン クラウドサービス クラウドマネージメント SL & SYSTM RPORTING PROXY/GTWYS OLLORTION TST MNGMNT W SRVR &PORTL SVS IRTORY SRVIS ROSS OMIN SRVIS TST T SS UGTING & FINNIL TOOLS PP PLOYMNT SRVIS NTWORK SIMULTION LIV T STRMS USINSS SRVI MGMT VRSION ONTROL SRVIS RLS N FILK SRVIS USR ONTROLL KUP/RHIV IT SRVI MGMT SURITY VLUTION SVS クラウドインフラストラクチャ MILWR PORTL LOU ORHSTRTION & OUNTING SURITY MGMT Multiple IT OPRTIONS TS PLTFORMS Multiple s Multiple Operating System PROSSING Multiple STORG Multiple Storage NTWORK Multiple Network PROVISIONING KUP/RHIV ONFIGURTION MGMT 22

Other US xamples U.S. General Services dministration (GS) Federal loud omputing Initiative reate a more agile Federal enterprise where services can be reused and provisioned on demand to meet business needs. Increase efficiencies by optimizing common services and solutions Reduce the cost of IT infrastructure by utilizing commercially available technology that is based on virtualization of servers, databases and applications to allow for capital cost savings その他の米国事例 U.S. General Services dministration (GS) 連邦クラウドコンピューティング イニシアティブ reate a more agile Federal enterprise where services can be reused and provisioned on demand to meet business needs. Increase efficiencies by optimizing common services and solutions Reduce the cost of IT infrastructure by utilizing commercially available technology that is based on virtualization of servers, databases and applications to allow for capital cost savings 23

Other US xamples U.S. General Services dministration (GS) Federal loud omputing Initiative https://www.apps.gov/cloud/advantage/main/start_page.do その他の米国事例 U.S. General Services dministration (GS) 連邦クラウドコンピューティング イニシアティブ https://www.apps.gov/cloud/advantage/main/start_page.do 24

nterprise cloud strategy nable cloud providers Help customers secure, source, and govern cloud services Provide cloud services nterprise cloud strategy エンタープライズ クラウド戦略 クラウド提供者に寄与する クラウド利用者を安全にする クラウドサービスを統治する クラウドサービスを提供する 25

yber Security Maturity Model* Robust Information & ommunications Technologies for Mission Success LK LTS Human apital Resilience ROWN LTS Most Organizations GRN LTS gility / Speed of ction Reactive & Manual People based following doctrine and doing their best to put out fires Tools-ased Integrated Picture pplying tools and technologies piecemeal to assist people in reacting faster Loosely integrated with focus on interoperability and standards based data exchange for I situational awareness ynamic efense Predictive and agile, the enterprise instantiates policy, illuminates events and helps the operators find, fix, and target for response Resilient nterprise Predictive & mission focused, isolates and contains damage, secure supply chains and protect key critical infrastructures to operate through cyber attack 19 *yber Security Strategies, LL yber Security Maturity Model* サイバーセキュリティ成熟度モデル Robust Information & ommunications Technologies for Mission Success LK LTS 耐性 人口 ROWN LTS 大半の組織 GRN LTS 俊敏性 / 行動のスピード 事後対応 / 手作業 People based following doctrine and doing their best to put out fires ツールベース 統合 pplying tools and technologies piecemeal to assist people in reacting faster Loosely integrated with focus on interoperability and standards based data exchange for I situational awareness 動的な防御 Predictive and agile, the enterprise instantiates policy, illuminates events and helps the operators find, fix, and target for response 耐性のある エンタープライズ Predictive & mission focused, isolates and contains damage, secure supply chains and protect key critical infrastructures to operate through cyber attack 19 *yber Security Strategies, LL 26

yber Security Maturity Model* Strong Governance Mission Success GOVRNN Resilience Most Organizations gility / Speed of ction Reactive & Manual Tools-ased d Hoc with loose structure and little oversight No formal structure Integrated Picture entral oordination IO/TO Risk Mgmt ulture Policy/Standards Frameworks ynamic efense ommand Structure International ooperation Policy nforcement Resilient nterprise National Structure Mission ssurance ulture Physical/Logical onvergence Supply hain Risk Management 20 *yber Security Strategies, LL yber Security Maturity Model* サイバーセキュリティ成熟度モデル Strong Governance Mission Success ガバナンス 耐性 大半の組織 事後対応 / 手作業 No formal structure ツールベース d Hoc with loose structure and little oversight 統合 entral oordination IO/TO Risk Mgmt ulture Policy/Standards Frameworks 動的な防御 ommand Structure International ooperation Policy nforcement 耐性のある エンタープライズ National Structure Mission ssurance ulture Physical/Logical onvergence Supply hain Risk Management 20 *yber Security Strategies, LL 27

yber Governance 21 yber Governance サイバーガバナンス 21 28

uilding ynamic efense Reduce the ttack surface/gile defense Strong Identity protection/attribution for people, applications and devices Mission-based architectures: automated mgmt of vulnerabilities/threats-trust Zones! nterprise Security Protection (encryption) and Management Persistent ttack, Sensing, Warning and Response from the perimeter to the edge Inbound & Outbound threat protection eploy host based security xpand protection for mobile devices 22 yber Security Strategies, LL uilding ynamic efense 動的な防御の構築 攻撃対象領域の削減 俊敏な防御 強力なアイデンティティ保護 人とアプリケー ション デバイスの属性 ミッションベースド アーキテクチャ 脆弱性 脅威の自動管理 トラスト ゾーン エンタープライズセキュリティ保護 暗号化 と 管理 境界までだけでなく末端にまで対応する継続 的な攻撃の検知 警告 応答機能 インバウンド及びアウトバウンドの脅威保護 ホストベースセキュリティの導入 モバイルデバイスへの保護の拡張 22 yber Security Strategies, LL 29

ommon Sense pproach to Mitigating Insider Threats/Wikileaks Technology Full suite of I/N tools ata Leakage Protection Port controls / evice Usage Real-time Monitoring Strong Identity ssurance Physical and lectronic ccess ontrols People/Process Periodic Security wareness Training Shift in ulture Understand Network 23 5 内在脅威を軽減する常套手法/Wikileaks 技術 I/N: Information ssurance/omputer Network efense (US o) I/N ツールの総揃え データ流出保護 ポート制御 / デバイス利用 リアルタイム モニタリング 強固なアイデンティティ保証 物理的及び電子的アクセス制御 人 / プロセス 定期的なセキュリティ啓発教育 文化醸成へ ネットワークの理解 5 23 30

Towards Resilient nterprise usiness continuity during an attack Map & prioritize crown jewels Share information with key partners Flexible encryption and key mgmtontent ased Security! loud Security! Secure supply chains/software security Systems assurance up and down the ISO Stack-move to hardware! Link continuity efforts to operate through cyber attack 24 yber Security Strategies, LL Towards Resilient nterprise 耐性のあるエンタープライズに向けて 攻撃を受けている間もビジネス継続を維持 重要な資産の特定と優先順位付け 重要なビジネスパートナーとの情報共有 柔軟性の高い暗号化と鍵管理 コンテントベースド セキュリティ クラウド セキュリティ セキュアなサプライチェーン ソフトウェアセキュリティ システムの保証を向上し ISOの7階層 のより低いレベル ハードウェアに移行 サイバー攻撃中の運用をビジネス継続に 連携 24 yber Security Strategies, LL 31

Strategic Security is only way to address advanced persistent threat wareness/ommitment-from board room down Implement a pro-active prevention program to address both outside attacks and insider threat dopt yber Security Maturity Model* to achieve a dynamic defense capability with real-time interoperable detection and response aking resilience into the enterprise to operate through cyber attack or disruption Summary 25 yber Security Strategies, LL* Strategic Security is only way to address advanced persistent threat 戦略的セキュリティなくしては dvanced persistent threat を解決できない 経営陣からのトップダウンによる啓発とコミット プロアクティブな防止プログラムを実践し 外部か らの攻撃と内在する脅威の両方に対処する サイバーセキュリティ成熟度モデルを取り入れ 相互運用できるリアルタイムの検出 対応機能を 利用して 動的な防御 を実現する エンタープライズの耐性を強化し サイバー攻撃 や妨害活動の進行中も運用を継続する 25 yber Security Strategies, LL* 32

Further Information Robert F. Lentz 410-914-7195 (phone) robert.lentz@cybersecuritystrategies.com 26 yber Security Strategies, LL 33