Best Practices for Mitigating Advanced Persistent Threats



Similar documents
Best Practices for Mitigating Advanced Persistent Threats

The Cyber Threat Landscape

Market Guide for Network Sandboxing

Realize That Big Security Data Is Not Big Security Nor Big Intelligence

Networking for Caribbean Development

SANS Top 20 Critical Controls for Effective Cyber Defense

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

The Hillstone and Trend Micro Joint Solution

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Solution Path: Threats and Vulnerabilities

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

Unified Security, ATP and more

End-user Security Analytics Strengthens Protection with ArcSight

Security Services. 30 years of experience in IT business

Carbon Black and Palo Alto Networks

SourceFireNext-Generation IPS

HP TippingPoint A New Approach to Malware Defense Featuring Analyst Research

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

NGFWs will be most effective when working in conjunction with other layers of security controls.

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

Spear Phishing Attacks Why They are Successful and How to Stop Them

Guest Speaker. Michael Sutton Chief Information Security Officer Zscaler, Inc.

Chapter 9 Firewalls and Intrusion Prevention Systems

Next-Generation Firewalls: CEO, Miercom

Security Intelligence Services.

McAfee Network Security Platform

Fighting Advanced Threats

How To Sell Security Products To A Network Security Company

VMware Integrated Partner Solutions for Networking and Security

Readiness Assessments: Vital to Secure Mobility

A Modern Framework for Network Security in Government

Guideline on Firewall

QRadar SIEM and Zscaler Nanolog Streaming Service

ENABLING FAST RESPONSES THREAT MONITORING

White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks

QRadar SIEM and FireEye MPS Integration

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Integrating MSS, SEP and NGFW to catch targeted APTs

SECURITY PLATFORM FOR HEALTHCARE PROVIDERS

Content Security: Protect Your Network with Five Must-Haves

Defending Against Cyber Attacks with SessionLevel Network Security

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

Advantages of Managed Security Services

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

Rethinking IT and IT Security Strategies in an Era of Advanced Attacks, Cloud and Consumerization

74% 96 Action Items. Compliance

Fight Malware, Malfeasance, and Malingering with F5

The Cloud App Visibility Blindspot

On and off premises technologies Which is best for you?

ADVANCED THREATS IN THE ENTERPRISE. Finding an Evil in the Haystack with RSA ECAT. White Paper

Symantec Advanced Threat Protection: Network

Content-ID. Content-ID URLS THREATS DATA

Breach Found. Did It Hurt?

Protecting Your Organisation from Targeted Cyber Intrusion

Comprehensive Advanced Threat Defense

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

Payment Card Industry Data Security Standard

RSA Security Anatomy of an Attack Lessons learned

Achieving PCI-Compliance through Cyberoam

RSA Security Analytics

Advanced Persistent Threats

The Cisco ASA 5500 as a Superior Firewall Solution

Guideline on Auditing and Log Management

Modular Network Security. Tyler Carter, McAfee Network Security

Security Information & Event Management (SIEM)

Cisco Advanced Malware Protection for Endpoints

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab:

Next-Generation Firewalls: Critical to SMB Network Security

The Cloud App Visibility Blind Spot

Devising a Server Protection Strategy with Trend Micro

I D C A N A L Y S T C O N N E C T I O N

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop

Managing Web Security in an Increasingly Challenging Threat Landscape

Secure Cloud-Ready Data Centers Juniper Networks

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

IBM Advanced Threat Protection Solution

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

Trustwave blocks Web-borne malware - guaranteed, or your money back

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

Devising a Server Protection Strategy with Trend Micro

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

DDoS ATTACKS: MOTIVES, MECHANISMS AND MITIGATION

WEBSENSE SECURITY SOLUTIONS OVERVIEW

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Stop advanced targeted attacks, identify high risk users and control Insider Threats

IBM QRadar Security Intelligence April 2013

Organizations Should Implement Web Application Security Scanning

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

This research note is restricted to the personal use of

Requirements When Considering a Next- Generation Firewall

1 Introduction Product Description Strengths and Challenges Copyright... 5

Firewall Market Trends

IBM Security IBM Corporation IBM Corporation

Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series

Today s New Breed of -based Cyber Attacks and What it Takes to Defend Against Them

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Transcription:

G00256438 for Mitigating Advanced Persistent Threats Published: 12 September 2013 Analyst(s): Lawrence Pingree, Neil MacDonald, Peter Firstbrook This document provides information security practitioners with strategic and tactical best practices to mitigate advanced targeted malware by leveraging both existing and emerging security technologies. Key Challenges A comprehensive strategy across network, edge, endpoint and data security can poise organizations to hunt new attacks and compromised systems in order to minimize the risk of APTs. Because people tend to be easier to target than systems, adversaries are using social engineering and social networks to target sensitive roles or individuals within an organization that either have knowledge, use of or access to the data targeted. Incident response must be improved to include capabilities such as in-house or third-party forensics and malware analysis and handle additional visibility gained by the latest technologies you deploy in your security control ecosystem. Recommendations Security program managers need to develop a strategy for dealing with advance threats leveraging both tactical best-practice technology configurations and emerging technologies and incident response processes in order to properly address the most common advanced targeted attack scenarios to increase both detection and prevention capabilities. Implement and improve SIEM capabilities to include integrations with DLP, NBA and user access patterns (IAM) to improve contextual awareness within the enterprise. The monitoring and analysis of the output of security controls are as important as the operation of the security controls themselves. Acknowledge that not all threats can be prevented and, therefore, the speed to detect and respond to incidents is also critical; seek to identify currently compromised systems even when no malware has been detected by traditional security controls. Improve incident response processes through staff either augmentation and/or education.

Table of Contents Introduction...2 Analysis...3 Use a Strategic Security Approach to Implement Tactical Best-Practice Controls...3 Best-Practice Strategies... 3 What Must Be Adopted to Reduce the Threat of ATAs?...3 Keep Up to Date With the Threat Landscape...3 Thwart Social Engineering Techniques Through Education... 4 That Apply to All Technical Control Layers...5 Upgrade Your Perimeter and Network-Based Security... 6 IPsec and SSL VPN Remote Access Connections...6 Next-Generation Firewalls...7 Intrusion Prevention Devices...7 Web Application Security...8 Advanced Threat Protection Appliances... 9 Focus Your Infrastructure Protection Strategy Toward Malicious Content... 10 Email Content Security... 10 Web Content Security...11 Uplift Your Endpoint Security Controls and Detection Stance...12 Improve Your Automated Monitoring, Correlation and Analysis... 13 Improve Your Incident Response Capabilities... 14 Recommended Reading...14 Introduction Many security practitioners see the term "advanced persistent threat" (APT) as primarily a marketing term but acknowledge that there are advanced threats that have bypassed their traditional security protection techniques and reside undetected on their systems. This research will enable security practitioners to understand some of the new threats they face and the best-practice steps they must take in order to reduce the risk of compromise against the advanced adversaries taking direct aim at their organizations. Page 2 of 16 Gartner, Inc. G00256438

Analysis Use a Strategic Security Approach to Implement Tactical Best-Practice Controls Best-Practice Strategies Use a comprehensive approach; no one single technology will stop advanced targeted attacks, even products specifically targeted at advanced forms of attack. Review your existing technologies and utilize advanced features in the latest products or services to keep up with changes in the threat landscape. Also read "Five Styles of Advanced Threat Defense" for a framework to compare the styles of ATA-targeted defense technologies. Acknowledge that technology alone won't stop ATAs; your strategy must include the search for compromised systems, improvements in your forensics and incident response capabilities, and rapid response. Review the best practices below, but do so with the mindset of unifying the security processes between each technology so that effective response to threats is possible and the detection and reduction of breach events is the more likely result. C-level executives must recognize the need to staff appropriately to ensure you can operate the latest security technologies your organization deploys to protect itself. If necessary, engage third parties to manage or operate more mature security controls while you focus more on the strategic security processes and technologies. Context-aware security controls (see "The Future of Information Security Is Context Aware and Adaptive") should be a key requirement when evaluating the next generation of security protection platforms (network, endpoint, edge and so on). For example, context-aware security controls may introduce orchestration and graduated response enforcement that can adapt when malfeasance is detected in external integrated controls. Ongoing integration and sharing of security intelligence among your disparate security technologies and other external organizations should be a stated security program goal. What Must Be Adopted to Reduce the Threat of ATAs? Keep Up to Date With the Threat Landscape Review your IT security department's education budget and ensure you have allocated continuing education for security-specific education initiatives for both your security team and your organization for mitigating the latest techniques used to reduce the potential delivery of advanced forms of malware (examples: how to avoid phishing attacks and how to analyze malware). Gartner, Inc. G00256438 Page 3 of 16

Create a role-centric security awareness program focusing on educating employees on the sensitive roles they hold so that these employees better understand how attackers are attempting to gain access to company data and how that data is likely to be used (examples: finance, accounts payables, human resources and business operations). Invest in forensics and malware sandbox analysis capabilities but realize that incident response workloads will increase midsize and small organizations should consider outsourced incident response models to augment staff against resource constraints. For enterprises, the security team should ensure appropriate levels of education on malware analysis and incident response are a critical focus area for at least members associated with these functions. Consider extending your involvement with external information and security-related nonprofit organizations (see Note 1) and vertically aligned industry groups to enhance knowledge and collaboration of your security team and organization with others in aligned industries. Establish relationships with government-sponsored security threat and information-sharing programs 1 to boost collaboration and enhance the response characteristics of your incident response procedure or process (examples: the Financial Services Information Sharing and Analysis Center [FS-ISAC], Red Sky Alliance, the Forum for Incident Response and Security Teams [FIRST], InfraGard and the Computer Emergency Response Team/Computer Security Incident Response Team [CERT/CSIRT]). Assign at least one security team member to regularly review news articles, publications and critical infrastructure protection alerts while comparing and contrasting this information with your current vulnerabilities and known risk profile and hunt for compromised systems as well as prioritize essential remediation efforts. Subscribe to security intelligence services (see "How to Select a Security Threat Intelligence Service") that provide information on a regular basis to keep up with the latest malicious activities and event information as well as how vulnerabilities are being exploited. Thwart Social Engineering Techniques Through Education Review company policy to ensure that it has taken appropriate steps to prevent the inappropriate posting of internal information onto public social media sites. Your policy should extend the applicability of the data classification framework to data posted to external sites and including punitive language such as a termination clause. Ensure that your end-user security awareness programs highlight that disclosure of current or active individual job role information onto the Internet is highly discouraged by the company (keep mindful of freedom of speech issues) and also highlight that this information is often used by attackers to identify employees to attack with targeted malware content and malicious URLs. Augment your awareness campaigns to properly describe how attackers are actively using external data repositories to generally target employees through the use of social engineering Page 4 of 16 Gartner, Inc. G00256438

techniques to gain their trust, and stress the importance of the suspicious mindset for all communications through email and via the Web. Social engineering attacks will often target user credentials. Therefore, it is important that an organization monitor when there are variances in user authentication times; for example, users logging on at odd hours of the day or simultaneously at a different geolocation. That Apply to All Technical Control Layers Ensure you are using the latest offering and engine from your security platform protection provider. Standardize on a short turnaround for testing and deploying signature updates. Most platforms have evolved well beyond purely signature-based approaches for malware detection to include behavioral and anomaly detection capabilities. Evaluate the context-aware security capabilities of your security platform provider. Security platforms must become context-aware identity, application, content, location, geolocation and so on in order to make better information security decisions regarding ATAs (see "The Future of Information Security Is Context Aware and Adaptive"). If your provider doesn't have this or have it on its road map, consider switching vendors. Offer linkage into reputation services (see "Emerging Technology Analysis: Cloud-Based Reputation Services"). Like content, pure blacklisting-based approaches for IP address filtering, URL filtering and email sender filtering no longer work. Next-generation security platforms incorporate cloud-based community context for determining the relative reputation of an entity, typically an IP address or URL. At a minimum, communications with IP addresses and URLs with low reputations should be logged, and some organizations will choose to block these entirely. Enable activation of data loss prevention (DLP) capabilities. Most security policy enforcement points have embedded DLP capabilities to detect when sensitive data is being handled by each layer. Alternatively, these security platforms may integrate with enterprise content-aware DLP offerings for their patterns. Review and implement DLP capabilities of the platform to ensure it is configured to detect and use a workflow to provide approvals of or block the release of sensitive data types such as credit card numbers, intellectual property and personally identifiable information as needed. Provide integration into security information and event management (SIEM). All of the security platforms in this research document create logs of activity and events. Consolidating this vital data into broader SIEM platforms increases the ability to correlate and report events in integrated fashion, enabling more effective incident response prioritization. Gartner, Inc. G00256438 Page 5 of 16

Upgrade Your Perimeter and Network-Based Security IPsec and SSL VPN Remote Access Connections Review your VPN devices and ensure all users are required to utilize a risk-appropriate authentication method prior to authorization (see Gartner research titled "Good Authentication Choices for Workforce Remote Access"). Review your VPN device policy and ensure that users are only permitted to the internal environment that they specifically need to access and not to the entire organization. Implement internal inspection devices, such as intrusion prevention system (IPS) and network behavior analysis (NBA) technologies between your VPN termination device and your internal network environment so that attacks or behaviors can be discovered or prevented within your remote access network infrastructure. Consider technologies that allow for the termination and security inspection of Secure Sockets Layer (SSL) traffic so that attacks cannot be perpetrated in the encrypted tunnel back to your internal applications or systems obfuscated from your security inspection technologies. Validate that monitoring controls are in place and appropriate levels of logging are performed off-device in centralized log servers and deploy security information management systems so that attacks can be detected or analyzed through additional analysis or correlation of incoming events. Regularly review VPN events identified and ensure these are correlated in your SIEM technology and look for anomalous patterns of activity. Leverage vendor-supplied anomaly detection and alerting capabilities when technically feasible. Where possible, reduce the use of direct network-level VPN access and shift to Web-enabled access or application-level VPNs. For mobile devices, consider implementing a mobile device management technology to ensure for basic consistency of security controls extended out to mobile devices and to ensure compliance with these policies before VPN access is granted. Vendor Samples Authentication technology vendors: RSA, The Security Division of EMC; ActivIdentity; CryptoCard; SafeNet; Symantec; Vasco; Nexus Technologies; PhoneFactor; SMS Passcode; and SecurEnvoy SSL VPN vendors: Juniper Networks, Cisco Systems and Citrix Mobile device management vendors: Sybase, Good Technology, AirWatch and MobileIron, MaaS360, Tango (see "Magic Quadrant for Mobile Device Management Software") Page 6 of 16 Gartner, Inc. G00256438

Next-Generation Firewalls Review and, if necessary, adjust your egress network firewall rules in order to ensure only business-critical services are permitted to both enter and leave the network; this includes the consideration of geographical filtering at the country level (GEO IP filtering). Review and, if necessary, adjust your ingress network firewall rules in order to ensure only critical inbound services are permitted to enter the network; this also includes geographical blocking or filtering at the country level based on business need. Consider the use of application awareness (a form of context awareness) provided in nextgeneration firewall (NGFW) functionality that leverages deep packet inspection techniques to permit valid (authorized) applications and deny everything else. To enable the NGFW functionality, you may need to perform a firewall refresh if you are using legacy firewalls that only provide filtering based on IP protocols, source and destination IP address, and port numbers. Review and (if available) regularly implement new capabilities provided by the latest firewall technologies to incorporate new concepts that emerge such as today's dynamic threat feeds that are provided via hosted or cloud-based services to deliver malicious threat lists for instant blocking at the firewall (don't allow your firewall technology to stagnate). Ensure proper zoning and segmentation is performed in your internal network environment (not just the demilitarized zone [DMZ]) and that proper firewall logging and inspection is performed between high- and low-security segments. Ideally implement an NGFW that converges firewalling IPS capabilities so that separate platforms are not needed. Review and, if available, implement the latest firewall capabilities to perform advanced examination of executables and other content using either emulation and/or virtualization (sandbox) technologies either hosted in a cloud or on a separate appliance to identify targeted polymorphic malware through behavioral analysis. Vendor Samples NGFW vendors: Check Point Software Technologies, Palo Alto Networks, Fortinet and SonicWALL Intrusion Prevention Devices Review and, if necessary, adjust intrusion prevention security enforcement policies to block rather than just detect known attacks and attack signatures and selectively enable more Gartner, Inc. G00256438 Page 7 of 16

signatures when possible. Decide acceptable trade-off between potential false positives and better ATA prevention or detection. Review your IPS and ensure that the technology you are using has the latest botnet prevention technology to prevent botnet command and control network activity. Likewise, see if communications to other types of low-reputation IP addresses can be blocked or allowed and logged for further investigation. Review your IPS's features and ensure it provides host and traffic anomaly detection (for example, using processing netflow data) and has capabilities to prevent or at minimum detect and alert on the anomalous (statistically deviant) traffic exiting through your perimeter devices. Review your current intrusion prevention implementation and, if available, implement blocking capabilities that include reputation-based or real-time block list threat feeds provided by your technology vendor. Review and, if necessary, adjust protocol anomaly detection and prevention capabilities to ensure nonstandard communications are blocked while expected and authorized protocol communications are allowed through known standard ports such as HTTP (TCP port 80), for example, while not permitting an FTP session through the standard HTTP port. Review and ensure all critical and Internet traversal network segments are inspected with IPSs that are configured to block known high- and medium-high-fidelity signatures with low false positives as directed by your technology provider. Make sure that network visibility extends into virtualized environments either by tapping internal virtual switch traffic out for external inspection or by virtualizing IPS capabilities and running directly within the virtualized environment. Terminate encrypted sessions so that session content may be inspected. Ideally implement an NGFW that converges firewalling and IPS capabilities so that separate platforms are not needed. Vendor Samples IPS vendors: McAfee (Intel), Sourcefire, Cisco, IBM, HP TippingPoint, Radware and Check Point Software Technologies Web Application Security Combine both static and dynamic code analysis in order to reduce vulnerabilities in Web applications. Acknowledge that internal procedures and static code analysis are no longer enough to protect against common Web vulnerabilities and that Web application firewalls are an essential ingredient to the defense against advanced targeted Web attacks. Page 8 of 16 Gartner, Inc. G00256438

Prefer solutions that have comprehensive coverage and specific templates for protecting common Web front ends and content management systems used for your enterprise Web applications. Prefer Web application firewalls that have the capability to share intelligence via reputation feeds, offer fraud detection services, and offer the capability to perform browser and endpoint security and spyware infection assessment. Review your Web application firewall configuration and implement vendor-recommended prevention settings. Vendor Samples Application security testing vendors: IBM, HP, Veracode, WhiteHat Security, Cenzic, NT Objectives, Qualys Web application firewall vendors: Imperva, F5, Bee Ware, Barracuda Networks, Citrix, DenyAll, Trustwave, Riverbed Technology Web application firewall SaaS vendors: Incapsula, Akamai, CloudFlare, Qualys Advanced Threat Protection Appliances Evaluate and deploy a network-based advanced threat detection/prevention technology to reduce the potential impact of zero-day malware and other targeted attacks. If already deployed, review your existing advanced threat detection/prevention technology and ensure that you take appropriate steps to employ any prevention capabilities it provides as directed by your technology vendor while considering any negative impacts to your environment's specific needs. Review your advanced threat protection appliance deployment and ensure that all network connections to the Internet are inspected. If network topology prohibits full network visibility, evaluate and prioritize placement of these types of capabilities to inspect public Internet connections and critical systems within the data center. Properly employ your incident response processes around this new technology and execute the process when appropriate indications exist for a potential malware infection or command and control callback is detected. Recognize that mobile devices such as laptops, ultrabooks, tablets and smartphones must be addressed with endpoint security controls and mobile device security technologies since the interception of their off-premises network traffic may not be practical. Gartner, Inc. G00256438 Page 9 of 16

Vendor Samples Advanced threat protection appliance vendors: FireEye, Fidelis Security Systems, Damballa, RSA,Trend Micro, Lastline, Cyphort, AhnLab, Check Point Software Technologies, Palo Alto Networks, Sourcefire, Norman, McAfee Focus Your Infrastructure Protection Strategy Toward Malicious Content Email Content Security To increase detection and prevention rates, Gartner suggests organizations use diversity in the source of antivirus engines that will scan email content; for example, using one antivirus engine at the email gateway and an alternative antivirus engine for your endpoint systems. Ideally, the email gateway would support the use of multiple engines. Review and ensure your mobile device security includes monitoring of all email going to and from mobile devices. Review your email security gateway or software and ensure you have set it to the highest threshold for malware and phishing detection and prevention. Strip or quarantine all executable content from email attachments and ensure that all email content types and attachments are being evaluated for malware. Review and consider secure email gateways that implement specific protection technology for both URL links and attachments with active content that cannot be blocked by policy (that is, PDF and doc file types). For attachment-type attacks, consider content sandboxing (virtual environment emulation in code execution), also called virtual sandbox technology. This technology allows attachments to be tested within a virtualized or emulated simulation environment prior to delivery and subsequent execution on the destination endpoint system of the recipient. For attachment type attacks, also consider solutions that strip or neuter active content in commonly used document types. For URL link attacks, consider solutions that rewrite suspect URLs such that they are proxy at the time of click. Do not assume URL protection is redundant due to secure Web Gateway technology; emails can be read and acted upon when devices are outside the perimeter or with other machines using Outlook Web access. Page 10 of 16 Gartner, Inc. G00256438

Vendor Samples Secure email gateway and service vendors: Cisco, Google, Websense, McAfee (Intel), Proofpoint, Symantec, Trustwave, Trend Micro, Spamina, Barracuda Networks, Proofpoint, AppRiver and Zscaler Web Content Security Deploy a secure Web gateway or equivalent technology to filter and monitor inbound and outbound Internet communications and inspect content and keep it up to date with the latest version as soon as possible. Review your URL filtering configuration and ensure that known proxy sites, hacking sites, phishing URLs and other malicious site categories within your Web filtering product or service are blocked. Implement real-time block lists to block hosts that have already been determined to pose an existing threat and reputation feeds to block hosts that are suspect. Review incumbent secure Web gateway (SWG) vendors' capability to ensure that the most advanced malware detection capability has been licensed. Be aware that it may be necessary to add additional security capability if the incumbent solution is designed primarily for our productivity filtering or network optimization. Review and utilize advanced security capabilities provided by the SWG beyond the capabilities of simple real-time block lists (see "Secure Web Gateway Malware Detection Techniques"). Many solutions do not turn on advanced techniques by default due to performance impact. Ensure that SWG solutions are sized to manage traffic adequately with all advanced detection methods turned on. Review and implement, where possible, content sandboxing (virtual environment/emulation and code execution); virtual sandbox technology allows code to be tested within a virtualized simulated environment that allows malware to be evaluated for common malicious behavior prior to delivery and subsequent execution on the end system. Ensure that mobile devices such as laptops, small office/home office (SOHO) devices, smartphones and tablets are also inspected by your secure Web gateway solution; this may require a cloud-based solution or use of VPN technology. Ensure that SWG solutions are capable of detecting all malicious outbound protocols (that is, not just HTTP) for indicators of infection and provide suitable alerts as well as data to trace and remediate infected hosts. Ensure that the SIRT or endpoint administrators have access to outbound reporting showing potentially infected machines or abnormal traffic patterns. Gartner, Inc. G00256438 Page 11 of 16

Use SWG DLP technology tactically in the absence of enterprise DLP to detect sensitive or secret data traversing the Web gateway. Vendor Samples Secure Web gateway and service vendors: Cisco, Blue Coat Systems, Websense, McAfee (Intel), Zscaler, Symantec, Spamina and Trend Micro Uplift Your Endpoint Security Controls and Detection Stance Remove administrative privileges on desktops to reduce the ability of malware infections to cause low-level system damage (see " for Removing End-User Administrator Rights on Windows"). Where privileged access is needed, use privileged account activity management (PAAM) technologies to properly manage the on-demand escalation of privileges. Implement a vulnerability assessment and remediation process with service-level agreements for the remediation of all endpoints. Review the effectiveness of remediation efforts across IT support teams on a quarterly basis with responsible parties and/or their management teams. Extend your patch management processes to all common desktop elements, especially Internet-facing applications (for example, Adobe, Java, alternative browsers and so on) while prioritizing vulnerabilities that will commonly be used to deliver malware. Review your existing endpoint antivirus products to ensure they are the latest version and uplift, if necessary, to include complete anti-malware protection, potentially unwanted program detection, and other malware detection and prevention capabilities. Add host and server intrusion prevention capabilities to your endpoint systems handling sensitive data types and enable blocking of high-fidelity critical, high and medium attack signatures with low false-positive rates as suggested by your security technology provider. For endpoints that routinely handle sensitive data, fixed function roles and users that have high security access credentials, consider deploying application control technology to limit application execution to known good applications (see "How to Successfully Deploy Application Control"). For lean forward organizations consider deploying application containment to isolate risky applications such as browsers and PDF viewers from the core endpoint system resources where this is the primary avenue of attack (see "Technology Overview for Virtualization and Containment Solutions for Advanced Targeted Attacks"). For lean forward organizations consider deploying endpoint threat detection and response tools to detect indicators of compromise, and accelerate and improve malware remediation and SIRT investigation. Consider systematically resetting desktop and server workloads to high-assurance states as a way to proactively remove ATA footholds (see "Systematic Workload Reprovisioning as a Page 12 of 16 Gartner, Inc. G00256438

Strategy to Counter Advanced Persistent Threats: Considerations" and "Systematic Workload Reprovisioning as a Strategy to Counter Advanced Persistent Threats: Concepts"). Implement network and system behavior analysis capabilities on your endpoint systems to detect potentially irregular or suspicious user and system behaviors. Review and consider implementing application sandboxing or application control/whitelisting technology on endpoint systems (see "How to Successfully Deploy Application Control" and "Technology Overview for Virtualization and Containment Solutions for Advanced Targeted Attacks"). Review and consider implementing endpoint threat detection and response products to validate the security status of your endpoints. Deploy network forensics capabilities in order to ensure your organization can review past network activities and utilize their findings during the triage process or for potential court cases. Sample Vendors File integrity monitoring products: Tripwire, IBM Tivoli, Qualys, McAfee (Intel), LogRhythm, ncircle, Guidance Software, AccessData and NetIQ Sample endpoint threat detection and response vendors: Bit9, HBGary, RSA ECAT, Cyvera, AccessData and Mandiant Network behavior analysis vendors: McAfee, Tenable Network Security, Arbor Networks, Lancope and Radware Application control/whitelisting vendors: Bit9, McAfee, Lumension, Kaspersky, Microsoft, Viewfinity Network forensics vendors: Solera Networks, Cybertap, Niksun, RSA, Endace, Fluke Networks, Netresec, WildPackets, Riverbed, NetAgent Improve Your Automated Monitoring, Correlation and Analysis Ensure you have implemented off-device, centralized logging facilities for all your security controls to prevent potential tampering through data breach. Form a security operations center or designate specific individuals to operate as a security operations center in order to properly monitor and respond as well as perform initial triage status for security events. Implement a SIEM solution to enable centralized log analysis and complex correlation as well as automated anomaly alerting. Gartner, Inc. G00256438 Page 13 of 16

Review anomaly reports and alerts generated by your SIEM system to identify irregular behaviors in the environment. When suspicious anomalies or alerts are received by the security operations center, invoke the incident response process. Sample Vendors Security information and event management vendors: IBM (Q1Labs), HP (ArcSight), McAfee, Splunk, LogRhythm, AlienVault, RSA Improve Your Incident Response Capabilities Define an incident response procedure that defines the roles of appropriate business and IT contacts throughout the organization and other departments needed to respond to security incidents, including human resources, public relations, legal and executive management. Retain either internal or external resources for executing an incident response plan; specifically target resources with digital forensics and malware analysis knowledge. Consider implementing a secure case management or incident response ticketing system separately from IT support systems so that security incidents will remain confidential within the incident response process and proper workflows as well as collaboration can exist between involved parties during execution of the incident response procedure. Leverage endpoint forensics tools and endpoint threat and response technologies or services for incident response favoring capabilities that specialize in cybersecurity incident response, including investigation assessment templates for identifying and analyzing suspicious common infection assessment capabilities such as service startup locations, driver hooks, kernel driver analysis, running process exploration, memory snapshot and other various malware analysis technologies. When possible, consider automating your incident response investigation triage efforts with integration between forensic analysis tools and other security monitoring software to more rapidly respond to potential suspicious security events when they occur. Sample Vendors Incident response forensic analysis vendors: Google GRR, Guidance Software, AccessData, Mandiant Recommended Reading Some documents may not be available as part of your current Gartner subscription. Page 14 of 16 Gartner, Inc. G00256438

"Network Security Monitoring for 'Lean Forward' Security Programs" "Systematic Workload Reprovisioning as a Strategy to Counter Advanced Persistent Threats: Considerations" "Systematic Workload Reprovisioning as a Strategy to Counter Advanced Persistent Threats: Considerations: Concepts" "Strategies for Dealing With Advanced Targeted Threats" "How to Select a Security Threat Intelligence Service" "Emerging Technology Analysis: Cloud-Based Reputation Services" "Magic Quadrant for Mobile Device Management Software" "How to Successfully Deploy Application Control" "Five Styles of Advanced Threat Defense" "Technology Overview for Virtualization and Containment Solutions for Advanced Targeted Attacks" "Defining Next-Generation Network Intrusion Prevention" "Selecting and Deploying Secure Web Gateway Solutions" "Malware, APTs, and the Challenges of Defense" "Prevention Is Futile in 2020: Protect Information Via Pervasive Monitoring and Collective Intelligence" Evidence 1 Worldwide Cert Organizations www.cert.org/csirts/national/contact.html Note 1 External Information and Security-Related Nonprofit Organizations The following are external information and security-related nonprofit organizations: International Information Systems Security Certification Consortium (ISC2) Information Systems Security Association (ISSA) Information Systems Audit and Control Association (ISACA) Gartner, Inc. G00256438 Page 15 of 16

GARTNER HEADQUARTERS Corporate Headquarters 56 Top Gallant Road Stamford, CT 06902-7700 USA +1 203 964 0096 Regional Headquarters AUSTRALIA BRAZIL JAPAN UNITED KINGDOM For a complete list of worldwide locations, visit http://www.gartner.com/technology/about.jsp 2013 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without Gartner s prior written permission. If you are authorized to access this publication, your use of it is subject to the Usage Guidelines for Gartner Services posted on gartner.com. The information contained in this publication has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information and shall have no liability for errors, omissions or inadequacies in such information. This publication consists of the opinions of Gartner s research organization and should not be construed as statements of fact. The opinions expressed herein are subject to change without notice. Although Gartner research may include a discussion of related legal issues, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner is a public company, and its shareholders may include firms and funds that have financial interests in entities covered in Gartner research. Gartner s Board of Directors may include senior managers of these firms or funds. Gartner research is produced independently by its research organization without input or influence from these firms, funds or their managers. For further information on the independence and integrity of Gartner research, see Guiding Principles on Independence and Objectivity. Page 16 of 16 Gartner, Inc. G00256438