Metric Matters. Dain Perkins, CISSP Dain.Perkins@gmail.com

Similar documents
How To Manage Security On A Networked Computer System

Concierge SIEM Reporting Overview

Bridging the gap between COTS tool alerting and raw data analysis

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

The Cloud App Visibility Blindspot

IBM QRadar Security Intelligence April 2013

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

Unified Security Management and Open Threat Exchange

Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats

Obtaining Enterprise Cybersituational

SANS Top 20 Critical Controls for Effective Cyber Defense

Vulnerability Management

The SIEM Evaluator s Guide

Using SIEM for Real- Time Threat Detection

IBM Advanced Threat Protection Solution

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

Doris Yang Vectra Networks, Inc. June 16, 2015 The World Ahead

Enabling Security Operations with RSA envision. August, 2009

Critical Security Controls

Cisco Advanced Malware Protection for Endpoints

THE TOP 4 CONTROLS.

Where every interaction matters.

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

QRadar SIEM and FireEye MPS Integration

Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

End-user Security Analytics Strengthens Protection with ArcSight

RSA Security Analytics

Breach Found. Did It Hurt?

Hunting for the Undefined Threat: Advanced Analytics & Visualization

Cisco & Big Data Security

AI Engine Rules June 2014

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Unified Security, ATP and more

Defining, building, and making use cases work

Cisco Cyber Threat Defense - Visibility and Network Prevention

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

How To Connect Log Files To A Log File On A Network With A Network Device (Network) On A Computer Or Network (Network Or Network) On Your Network (For A Network)

Payment Card Industry Data Security Standard

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Modern Approach to Incident Response: Automated Response Architecture

Module 1: Overview. Module 2: AlienVault USM Solution Deployment. Module 3: AlienVault USM Basic Configuration

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

TRIPWIRE NERC SOLUTION SUITE

Software that provides secure access to technology, everywhere.

Attachment A. Identification of Risks/Cybersecurity Governance

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

24/7 Visibility into Advanced Malware on Networks and Endpoints

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

AppGuard. Defeats Malware

TOP REASONS WHY SIEM CAN T PROTECT YOUR DATA FROM INSIDER THREAT

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

IT Security Incident Management Policies and Practices

Effective Methods to Detect Current Security Threats

Comprehensive Advanced Threat Defense

Q1 Labs Corporate Overview

Remote Services. Managing Open Systems with Remote Services

Network Security Monitoring: Looking Beyond the Network

ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Fighting Advanced Persistent Threats (APT) with Open Source Tools

High End Information Security Services

Outline Intrusion Detection CS 239 Security for Networks and System Software June 3, 2002

Discover Security That s Highly Intelligent.

STEALTHWATCH MANAGEMENT CONSOLE

Cyber Watch. Written by Peter Buxbaum

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

Cybersecurity: What CFO s Need to Know

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

Defending Against Data Beaches: Internal Controls for Cybersecurity

HUNTING ATTACKERS WITH NETWORK AUDIT TRAILS

Top 20 Critical Security Controls

DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

How To Create Situational Awareness

APPLICATION PROGRAMMING INTERFACE

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Why a Network-based Security Solution is Better than Using Point Solutions Architectures

Cyber Security Metrics Dashboards & Analytics

White Paper. PCI Guidance: Microsoft Windows Logging

QRadar SIEM and Zscaler Nanolog Streaming Service

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Securing SharePoint 101. Rob Rachwald Imperva

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

Protecting the Infrastructure: Symantec Web Gateway

What is Security Intelligence?

Transcription:

Metric Matters Dain Perkins, CISSP Dain.Perkins@gmail.com

My Perspective Information security metrics do not show us how we need to improve our defenses

Image: http://abcnews.go.com/sports/2014-fifa-world-cup-us-goalie-tim-howard/story?id=24400295 3

4

You keep using that word Measure: The size, amount, or degree of something Metric: meta-data derived from analyzing measurements of a given variable over time, or against a specific baseline or target Correlation: the appearance of statistical dependence between measured events, without a causal relationship Causation: the direct effect of one measured event on another (cause and effect relationship) Threat: a malicious attempt to compromise the confidentiality, integrity, availability, authenticity, utility, or possession of a given information asset* Risk: the probability of loss due to a given threat 2000 sessions/min 50x the average sessions/min Summers in NYC: More Murders More Ice Cream Hotter Temps More Electricity Malware, Targeted Attack, DOS, Fraud Data Breach * With thanks to Donn Parker who defined the Parkerian Hexad in his book Fighting Computer Crime. New York, NY: John Wiley & Sons. ISBN 0-471-16378-3.

We ve got to ask ourselves a question 1) CIS Security Benchmarks Number of applications Mean time to complete changes IS Budget as % of IT Budget 3) 5 Strategic Security Metrics Comparative spend Mean time to compliance % of emergency changes 2) GIAC / SANS Unauthorized devices Total count, avg hours online/device Infrastructure configurations # of insecure configs, mean time to repair User admin accounts Total, %, mean time to remediate Incident Response Mean time to detect, remediate Are we measuring the right stuff? http://benchmarks.cisecurity.org/downloads/metrics/ http://www.darkreading.com/analytics/security-monitoring/five-strategic-security-metrics-to-watch/d/d-id/1137170? http://searchsecurity.techtarget.com/tip/security-that-works-three-must-have-enterprise-security-fundamentals

Identify the threats Identify causally significant metrics Marginal threat levels immediate feedback Threat volumes and types long term Leverage immediate feedback to address current threat levels Use long term metrics to refine and improve security posture Select tools that can best help your team

One more generic note What does Breach Detection address? Residual Risk Its time to start considering these sorts of technologies, and the intel they can provide as part of the whole equation.

Top Level Classifications Recon: find a vulnerability Initial Exploit: take advantage of recon Compromise: privilege escalation, spread, etc. C&C: check in with HQ Actions: steal, corrupt, interrupt, etc. Compliance: policy/procedure violations Hygiene: misconfigured apps, etc. Advanced, targeted, its all the same stuff. The difference comes in the type of recon specific, or how to hit the most targets.

Threat Identification Tools

Network Behavior Analysis Volume, Direction, Frequency, and Scale + Ubiquitous, easy to scale + Encryption not an issue + Typically allows asset classification / valuation + Statistical analysis baselines and identifies abnormal behavior from various measures + Adds significant troubleshooting, performance analysis capabilities (budget / resource sharing) - May miss smaller attacks or compromises - No packet level analysis - Requires some care and feeding

Network Behavior Anomaly Identification - > Actions Scales well (netflow is everywhere) Built-in metrics with anomaly detections Build groups to prioritize assets Build alerts to monitor compliance Integrate with authentication, network gear to immediately identify affected users and devices What Sorts of Metrics? Session count Volume by port, app, device Drill down by group, port, application, or device Malware propagation Typical connection peers Riverbed Cascade

Behavior Clues Identify credible threats via Volumetric Analysis Netflow and Packet Analysis Add application specific data points Visually significant anomalies with drill down capabilities allow for quick investigation DNS CnC traffic from malware outbreak? External? -> Block outbound DNS Internal? -> Check Server ICMP DOS, DDOS?Botnet? External? -> Block ICMP Internal? -> Investigate SMTP Identify hosts & targets External? -> Block SMTP Internal? -> Check policies and reqs Data Breach Should that critical asset be communicating with remote countries? Why did Alice s salesforce connection volume increase by 400%? HTTP Session Count Increase by 200%? Adware, Click Fraud? User Ed? Content filtering? Bad headers? Stealth C&C? Lancope StealthWatch

Network Breach Detection + Typically combine IDS type functions with advanced malware id C&C / DGA analysis, obfuscated comm. channels, etc. + Able to correlate multiple attacks to a single host over time + Able to track small threats as well as more obvious ones - Can combine with other tools for SSL analysis - May require larger investments in architecture for full coverage - Performance reqs. may limit deployment options - Direct remediation available

Breach Analysis Aggregate Measures Risk Based Prioritization Damballa Failsafe

Threat Categorization Alerts by threat type leads to immediate possibilities for focusing remediation AlienVault USM

Suspicious Details Damballa Failsafe

Asset View Alerts by Asset Category Built In Metrics Damballa Failsafe

Intelligent Alert Management Filter and quickly address multiple alerts to minimize information overload Damballa Failsafe

Threat Analysis Alert correlation and detailed threat assessment AlienVault USM

Major Challenges Focus on the unknown No CVE, focus is on behavior Requires understanding of malware communications channels Scope and Breadth of analysis Aggregation of metrics, reporting 500 breaches are just as difficult to manage as 500 SIEM events Still immature market & too much FUD

Challenge Accepted Breach Detection -Sans Top 20! Use behavioral analysis as top incident risk identification As a front end tool, then leverage with SIEM, etc. Or pipe detections into existing SIEMs Review data Fine detail for individual, credible threats 10km view for general insight into your network Combine with other tools for more context Threat feeds, reputations lists, etc. Firewall / IDS / Sandbox / Server logs

Open Formats "The ideal scenario is that everyone and every vendor uses the same format for indicators of compromise," he says. "You can use it to share threat data, so all of us can benefit. Jaime Blasco Director, AlienVault http://www.darkreading.com/analytics/security-monitoring/red-october-response-shows-importance-of-threat-indicators/d/d-id/1139034?

Ways to help the transition Integrate Breach Detection Apply new technologies to mitigate risks before it s a tool for residual risk Reporting 500 discrete Credible Threats can be much more painful to deal with than 10,000 identified CVEs Integration of external intel The more the merrier Asset Valuation Prioritize alerts based on value of involved assets Open Integration IOCs, Observables, Veris, etc.

Malware Types by Remediation Veris threat sources Adware, click fraud, browser attacks, etc. Recon, brute force, SQLi Command & Control Spam, DGA, DOS Policy Violation Remediation Ideas Better user education, additional content controls Tighten admin controls Leverage threat intel Tighten Outbound controls Address violation, training http://veriscommunity.net

Asset Classification A realistic asset classification system is a must (at least 3 priorities) Preferably custom groupings to allow Risk based prioritization as well as group based reporting for remediation focus Even better ability to tie into existing asset value frameworks Lancope StealthWatch

Aggregate Metrics How bad are things today? AlienVault USM

Conclusion We re losing everyday because we tend to focus on the attacks that we stop looking at the known issues. We need to start learning from the new, existing, and evolving threats that are already in our networks and leverage that data to improve across the field of information security Thanks for your time!