5 Steps to Advanced Threat Protection



Similar documents
Evolving Threat Landscape

Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

THE TOP 4 CONTROLS.

Stop the Maelstrom: Using Endpoint Sensor Data in a SIEM to Isolate Threats

SANS Top 20 Critical Controls for Effective Cyber Defense

Looking at the SANS 20 Critical Security Controls

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Persistence Mechanisms as Indicators of Compromise

Top 20 Critical Security Controls

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

The Future Is SECURITY THAT MAKES A DIFFERENCE. Overview of the 20 Critical Controls. Dr. Eric Cole

The Cyber OODA Loop: How Your Attacker Should Help You Design Your Defense. Tony Sager The Center for Internet Security

Securing OS Legacy Systems Alexander Rau

Check Point and Security Best Practices. December 2013 Presented by David Rawle

End to End Security do Endpoint ao Datacenter

Defending Against Data Beaches: Internal Controls for Cybersecurity

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

SANS Institute First Five Quick Wins

Unified Security, ATP and more

Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance

Jumpstarting Your Security Awareness Program

Critical Controls for Cyber Security.

Critical Security Controls

24/7 Visibility into Advanced Malware on Networks and Endpoints

Endpoint Security: Moving Beyond AV

Post-Access Cyber Defense

Ovation Security Center Data Sheet

White Paper: Consensus Audit Guidelines and Symantec RAS

Endpoint protection for physical and virtual desktops

Ovation Security Center Data Sheet

ADVANCED THREATS IN THE ENTERPRISE. Finding an Evil in the Haystack with RSA ECAT. White Paper

Concierge SIEM Reporting Overview

All Information is derived from Mandiant consulting in a non-classified environment.

Cybersecurity Health Check At A Glance

FISMA / NIST REVISION 3 COMPLIANCE

PCI Data Security Standards (DSS)

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Cloud Based Secure Web Gateway

Jort Kollerie SonicWALL

Chapter 9 Firewalls and Intrusion Prevention Systems

The Role of Security Monitoring & SIEM in Risk Management

GFI White Paper PCI-DSS compliance and GFI Software products

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Host-based Protection for ATM's

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

The Protection Mission a constant endeavor

CORE IMPACT AND THE CONSENSUS AUDIT GUIDELINES (CAG)

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

The Cloud App Visibility Blindspot

Security Management. Keeping the IT Security Administrator Busy

RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

Windows Server 2003 End of Support. What does it mean? What are my options?

NERC CIP VERSION 5 COMPLIANCE

How To Secure Your System From Cyber Attacks

The Key to Secure Online Financial Transactions

Windows Operating Systems. Basic Security

Guideline on Auditing and Log Management

Endpoint Security 2.0: The Emerging Role of Application Whitelisting Solutions. Todd Schell

Leveraging SANS and NIST to Evaluate New Security Tools

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

Protecting Your Organisation from Targeted Cyber Intrusion

Best Practices for DanPac Express Cyber Security

Patch Management SoftwareTechnical Specs

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Industrial Security for Process Automation

USM IT Security Council Guide for Security Event Logging. Version 1.1

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

Secure Your Mobile Workplace

Cisco Advanced Malware Protection

Connecticut Justice Information System Security Compliance Assessment Form

Why The Security You Bought Yesterday, Won t Save You Today

Exactly the Same, but Different

Solving the CIO s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense

PROTECTION FOR SERVERS, WORKSTATIONS AND TERMINALS ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia

Networking for Caribbean Development

Endpoint protection for physical and virtual desktops

Enterprise Cybersecurity: Building an Effective Defense

Choosing Between Whitelisting and Blacklisting Endpoint Security Software for Fixed Function Devices

Inspection of Encrypted HTTPS Traffic

How To Protect Your Network From Attack

Larry Wilson Version 1.0 November, University Cyber-security Program Controls Book

Symantec Endpoint Protection Analyzer Report

Alert (TA14-212A) Backoff Point-of-Sale Malware

IBM Endpoint Manager Product Introduction and Overview

The Hillstone and Trend Micro Joint Solution

Nessus and Antivirus. January 31, 2014 (Revision 4)

CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background:

Transcription:

5 Steps to Advanced Threat Protection

Agenda Endpoint Protection Gap Profile of Advanced Threats Consensus Audit Guidelines 5 Steps to Advanced Threat Protection Resources

20 Years of Chasing Malicious Software Tries to keep a list of all bad software Tries to identify bad behavior Lets unrecognized executables run The moles have gotten faster and smarter

Exponential Growth In Malware 7,000,000 6,000,000 an incredible 97% of the 140+ million records were compromised through customized malware 5,000,000 4,000,000 3,000,000 2,000,000 1,000,000 0 2002 2003 2004 2005 2006 2007 2008 2009 2010*

Trying to Keeping Pace 2,895,802 signatures / year 7,933 signatures / day 330 signatures / hour 5 signatures / minute 1 signature / 12 seconds

Endpoint Protection Gap NETWORK IDS/IPS PROTECTION HIPS BEHAVIOR RULES AV SIGNATURES REMOVE ADMIN RIGHTS ADVANCED THREATS PATCHED APPS DELIVERY DISTRIBUTED APPS BASE SYSTEM IMAGE

Socially Engineered Threats Hijack a Facebook Account Send Facebook Message Relationship Leveraged Recipient Click on Message Keylogger Dropped Login Extracted

Profile of an Advanced Threat Trusted Relationships Uses Malware to Persist Disguises as Legitimate Moves Laterally Remote Control Automates Control 18,321 items

Operation Aurora A highly sophisticated malware penetration by Chinese hackers against high profile companies. Consisted of: 0-day browser exploit Flexible payload Custom encrypted C&C traffic

The Initial Exploit Exploits MS10-002.jpg file on a remote server is accessed Drops encrypted a.exe file to C:\%appdata%\

The Backdoor A.exe decrypts to B.exe B.exe drops a DLL into \system32 and changes the name to match existing services File times are modified to evade forensics This DLL is loaded into a svchost.exe process Registry key added: SOFTWARE\Microsoft\Windows NT\ CurrentVersion\SvcHost\ Value: SysIns Data: Ups*** Registry key added: SYSTEM\CurrentControlSet\Services\ RaS***\Parameters\ Value: ServiceDLL Data: <path to backdoor>

What Can It Do? Trojan Backdoor Capabilities: Adjust process privileges & terminate processes Control services Remote file execution Registry manipulation File system manipulation (search, remove, copy) System manipulation (turn system off, reboot, clean events) Call other components, inter process communication

Advanced Threats Target Visibility and Control Registry Registry Protection Config Files File Integrity Monitoring Critical Resources Portable Storage Devices Applications Device Control Application Whitelisting Memory Memory Injection Protection Operating System OS Tamper Protection

Consensus Audit Guidelines (CAG) Nov 2009, Version 2.3 20 Prioritized Controls Derived from Attack Knowledge Prescriptive How attackers exploit the lack of this control How the control is implemented, automated, and measured Procedures and tools for implementing and automating this control Technology and Process Controls

Automatable Critical Controls 1. Inventory of Authorized and Unauthorized Devices 2. Inventory of Authorized and Unauthorized Software 3. Secure Configurations for Hardware and Software on Laptops, Workstations, and Servers 4. Secure Configurations for Network Devices such as Firewalls, Routers, and Switches 5. Boundary Defense 6. Maintenance, Monitoring, and Analysis of Audit Logs 7. Application Software Security 8. Controlled Use of Administrative Privileges 9. Controlled Access Based on Need to Know 10. Continuous Vulnerability Assessment and Remediation 11. Account Monitoring and Control 12. Malware Defenses 13. Limitation and Control of Network Ports, Protocols, and Services 14. Wireless Device Control 15. Data Loss Prevention

CAG Control #2 How can this control be implemented, automated, and its effectiveness measured? Quick Win: Devise a list of authorized software Improve Visibility & Attribution: Deploy software inventory tools throughout the organization The tool should also monitor for unauthorized software installed on each machine. Harden Configurations: Prevent configuration drift and unauthorized changes that Introduce risk. Advanced: Deploy software white-listing technology that allows systems to run only approved applications and prevents execution of all other software on the system.

Step 1: Continuous Monitoring 4,000 Servers 12 Business Units Apps Config Files Portable Storage Devices Registry Memory Operating System 10,000 POS/ATM

Step 2: Assign Reputation to Software Hash POLICY SERVER Hash Metadata Trust Factor Publisher Prevalence Age Categorization Software Reputation Service

NIST NSRL vs. Bit9 GSR The New Standard Attribute NIST NSRL Bit9 GSR Bit9 Difference Number Files Indexed 53,300,000 7,100,000,000 13,321% Number of Unique Files 16,700,000 481,000,000 2,880% Number of Unique Packages 24,000 15,300,000 63,750% Non-English Files 2,700,000 50,000,000 1,852% Updates Quarterly Realtime Coverage Meta-data *Partial Complete Comprehensive Certificates No Yes Software Integrity Categorization Yes Yes Manageability Threat Level **Partial Yes Threat Coverage Vulnerability Info No Yes Risk Assessment

Step 3: Define Trusted Software BLACKLIST POLICIES WHITELIST POLICIES WHITELIST POLICIES WHITELIST POLICIES WHITELIST POLICIES HIPS Behavioral Rules AV Signatures Remove Admin Rights Software Bans??? Trusted Updaters Trusted Directories Trusted Publishers Trusted Users Confirm the Integrity of Existing Software Trusted Updaters Adobe Cisco Symantec Trusted Directories E:\wsus\* S:\sms\distribution L:\library\* Trusted Publishers Adobe Apple Microsoft Trusted Users TMurphy BGates BObama

Step 4: Isolate Unauthorized Software? Risk Baseline of Trusted Software Drift

Step 5: Deny Questionable Software BLACKLIST Default Open Monitor Policy????? Ask User Deny Allow Before Execution User Asked For Permission Block and Ask Policy WHITELIST Default Deny Flexible Lockdown Policy

Advanced Threat Protection In Action POLICY SERVER Execution Allowed Default Deny Flexible Lockdown Policy Trusted Publisher Trusted User Trusted Directory Trusted Updater No Trust Established Botnets??????? Execution Blocked Rootkits Infected USB Drive Spoof AV Targeted Attacks

Case Study: Red Team Exercise Austere Challenge Friendly exercise to test security RED TEAM attempts to penetrate defenses Fishing e-mails have been traditionally successful Detailed in After Action Report (AC08) Implemented Application Whitelisting Identify Who Clicked on Link Blocked Targeted/Custom Malware 100% deterrent of RED TEAM Fishing Attempts

Case Study: Leveraging Software Intelligence Challenge Identify, categorize, neutralize vulnerable and/or malicious software Typical PC has 15,000 executable files Labor intensive and error prone task Solution Software Reputation Service Identify known good software to isolate bad Reduces forensics from weeks to days

Case Study: Device Whitelisting Challenge Malware continually bypasses network/web/email defenses Unauthorized use of Portable Storage Devices Lost devices jeopardizing security Unsanctioned devices introducing malware Solution Whitelist approved portable storage devices by model/type Only allow Kingston Data Traveler Ensures all information is encrypted Log device usage and files copied to/from the device

Resources

Application Whitelisting Review

Recommendations Continuous Monitoring Audit Critical Resources Establish Real-time Forensics Baseline Configurations Define Policies and Trust Share and Communicate End User Risk Blacklist and Whitelist Continue to Run Existing Defenses Whitelist Trusted Sources of Change

Questions/Slides Tom Murphy Chief Strategy Officer Bit9, Inc. Robert Dudley Federal Acct Manager Bit9, Inc. +1 617.393.7441 tmurphy@bit9.com +1 240.449.0219 rdudley@bit9.com