The Role of Digital Forensics within a Corporate Organization



Similar documents
Information Technology Audit & Forensic Techniques. CMA Amit Kumar

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Security Controls What Works. Southside Virginia Community College: Security Awareness

Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic

e-discovery Forensics Incident Response

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

Case Study: Hiring a licensed Security Provider

Managing Cloud Computing Risk

EC-Council Ethical Hacking and Countermeasures

Session 334 Incident Management. Jeff Roth, CISA, CGEIT, CISSP

Information Security Incident Management Guidelines

information security and its Describe what drives the need for information security.

IBX Business Network Platform Information Security Controls Document Classification [Public]

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Developing Computer Forensics Solutions for Terabyte Investigations

MSc Computer Security and Forensics. Examinations for / Semester 1

Projectplace: A Secure Project Collaboration Solution

Payment Card Industry Data Security Standard

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Spyders Managed Security Services

Data Security Incident Response Plan. [Insert Organization Name]

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

CYBER FORENSICS. KRISHNA SASTRY PENDYALA Cyber Forensic Division Central Forensic Science Laboratory Hyderabad.

Incident Response and Computer Forensics

BDO CONSULTING FORENSIC TECHNOLOGY SERVICES

InfoSec Academy Forensics Track

Data Management & Protection: Common Definitions

Cisco Advanced Services for Network Security

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner

Data Breach Strikes - Nerds & Geeks Unite: Effective Cooperation Between Privacy and Technical Experts Presented by: Paul H. Luehr, Managing Dir.

The Incident Response Playbook for Android and ios

How To Manage Security On A Networked Computer System

ITM 642: Digital Forensics Sanjay Goel School of Business University at Albany, State University of New York

ELECTRONIC INFORMATION SECURITY A.R.

Information Security Policy

INCIDENT RESPONSE CHECKLIST

Information Technology Policy

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

Modalities for Forensic Review of Computer Related Frauds

EnCase Enterprise For Corporations

An overview of IT Security Forensics

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

HOW SECURE IS YOUR PAYMENT CARD DATA?

How To Implement Data Loss Prevention

How To Get A Computer Hacking Program

Fostering Incident Response and Digital Forensics Research

Digital Forensics Tutorials Acquiring an Image with FTK Imager

Who s Doing the Hacking?

Certified Digital Forensics Examiner

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

Information Security Basic Concepts

Internet Banking Internal Control Questionnaire

2012 Data Breach Investigations Report

Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

1 Purpose Scope Roles and Responsibilities Physical & Environmental Security Access Control to the Network...

Are your multi-function printers a security risk? Here are five key strategies for safeguarding your data

(Instructor-led; 3 Days)

Policy for Protecting Customer Data

Security from a customer s perspective. Halogen s approach to security

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7

Client Security Risk Assessment Questionnaire

Digital Forensics, ediscovery and Electronic Evidence

Security Breaches and Vulnerability Experiences Overview of PCI DSS Initiative and CISP Payment Application Best Practices Questions and Comments

2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012

Attachment A. Identification of Risks/Cybersecurity Governance

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

How to build and run a Security Operations Center

Where is computer forensics used?

Professional Services Overview

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

ISO COMPLIANCE WITH OBSERVEIT

LSE PCI-DSS Cardholder Data Environments Information Security Policy

Jort Kollerie SonicWALL

Sierra College ADMINISTRATIVE PROCEDURE No. AP 3721

Helmi Rais CERT-TCC Team Manager National Agency for Computer Security, Tunisia

Nerds and Geeks Re-United: Towards a Practical Approach to Health Privacy Breaches. Gerard M. Stegmaier gstegmaier@wsgr.

A Cyber Security Integrator s perspective and approach

Information security controls. Briefing for clients on Experian information security controls

<Insert Picture Here> Oracle Database Security Overview

ISO IEC ( ) TRANSLATED INTO PLAIN ENGLISH

Name: Position held: Company Name: Is your organisation ISO27001 accredited:

Certified Information Systems Auditor (CISA)

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Transcription:

May 2006, IBSA Conference, Vienna The Role of Digital Forensics within a Corporate Organization Bruce J. Nikkel IT Investigation & Forensics Risk Control, UBS AG

Presentation Summary An overview of digital forensics The need for corporate forensics functionality Challenges in creating a forensics capability Questions, discussion, recommended resources 2

An Overview of Digital Forensics What is digital forensics? What is digital evidence? Who is using it? 3

What is Digital Forensics? The collection, preservation, analysis, and presentation of digital evidence Admissible in a court of law Usable for internal disciplinary hearings Supporting data for internal incident reports Assisting/furthering other investigations 4

Digital Evidence is Data Which: Helps reconstruct past events or activity (timelines) Shows possession/handling of digital data Show use/abuse of IT infrastructure & services Shows evidence of policy violation or illegal activity 5

The Main Areas of Digital Forensics Computer forensics (hard disk, removable media acquisition and analysis) Network forensics (network intrusions, abuse,.etc) Software forensics (examining malicious code, malware, etc.) Live system forensics (compromised hosts, system abuse, etc) 6

Organizations Using Digital Forensics Technology Law enforcement Military, government agencies Law firms (legal discovery) Data recovery firms Corporate organizations (relatively new) 7

Potential Sources of Digital Evidence Hard disks, tapes, external/removable media Network infrastructure logs (Firewall, IDS, proxy, etc.) Application, audit log files Email Other server content (Windows shares, web servers, databases, etc.) Captured network traffic 8

Difficulties of Digital Evidence Easy to destroy starting a PC updates hundreds of timestamps and modifies many files attaching a hard disk or USB stick will modify file system timestamps volatile memory is lost when a machine is powered off Hard to get network traffic only exists on the wire for milliseconds intrusions and attacks may be cleverly devised anti-forensic activity may prevent collection 9

Digital Forensics within a Corporate Organization What is driving the need for a digital forensics role within organizations? Driven by internal demand Driven by external factors Leveraging tools & skills 10

Driver: Legal and Regulatory Requirements Country/region specific laws different countries have different laws and regulations may require some form of forensic capability or readiness example: Sarbanes Oxley Act Requires a Process for dealing with incidents requiring forensic analysis or investigation (SOX 012-s13) Regulated Industries finance, Healthcare, Insurance, telecom, etc. may have industry specific requirements example: Swiss ISP log retention 11

Driver: Industry Best Practice ISO 17799 (2003) international standard for Information security recommends procedures for collecting evidence and analyzing incidents Information Assurance Advisory Council (IAAC) guidelines for ensuring corporate forensic readiness Published, peer reviewed papers Digital Investigation Journal, The International Journal of Digital Forensics & Incident Response (Elsevier) International Journal of Digital Evidence (IJDE) 12

Driver: Internal Demand Legal departments assisting corporate legal teams with discovery ensuring compliance with local laws and regulations Corporate policies and standards compliance company policies/standards may benefit from a forensic capability audit requirements/recommendations 13

Driver: Internal Demand (cont.) HR firing/termination employee misconduct, disciplinary action exceptional/extreme cases (death, suicide, kidnapping, etc.) Other corporate investigative bodies many investigative roles may exist (fraud, crime, incident handling, disaster/emergency response,.etc) need for assistance, central forensics competence center risk management, risk control, crime risk control 14

Driver: Internal Demand (cont.) Intellectual Property (IP) intellectual property abuse/infringement brand/image reputation risk (investigating fraudulent websites, phishing attacks, etc.) IT intrusion analysis investigating IT policy violation IT infrastructure abuse/misuse logic bomb, virus/malware analysis, etc. special services leveraging forensic team's tools and skills 15

Driver: Internal Demand (cont.) "Non-forensic forensics": Using forensic tools and skills for legitimate, but non-forensic purposes verifying corporate disk wiping procedures verifying disk/network encryption implementation data recovery (crashed hard disks, old/obsolete media, etc. ) legitimate password recovery requests assist with obscure troubleshooting IT architecture and design (provide forensic readiness input/feedback) 16

Challenges in Creating a Forensics Capability What are some of the challenges in setting up a corporate forensics functionality? Basic needs/requirements of a digital forensics team Some key factors in implementing a digital forensics role in an organization 17

Organizational Challenges Team placement within the organization: IT? IT security risk management? IT security risk control? legal/compliance departments? part of CERT, CSIRT, SIRT, SOC? centralized? regional? in-house or out-sourced? Internal competition/diversity very large organizations may have multiple investigation and/or forensic teams varying degrees of responsibility/involvement (sometimes a lead role, sometimes an assisting role, sometimes a consulting role) 18

Forensic Readiness Investigative access policy ensure authorized investigators are able to collect data protect sensitive data controlled/logged access (prevent abuse, reduce risk) IT data retention policy legal/regulatory requirements IT incident response requirements forensic & investigative recovery requirements Establishing Forensics resources a trained forensics team a properly equipped forensics lab outsourcing partners, external experts 19

Support and Awareness Management support convincing management that a forensic team is needed/valuable to the organization emphasis on readiness ("Fire Department" perspective) makes things easier/cheaper for a number of internal groups preventing a single high-cost court case alone could justify the expense of such a team Awareness in various areas of an organization inclusion in work-flows and processes having a point of escalation, additional support knowing a forensics competence center exists 20

Establishing Formal Contact Channels To facilitate: enabling others to efficiently contact the forensics team enabling the forensics team to efficiently contact others Internal contact to various IT areas for data collection and expertise contact channel to the forensic team via shared mailbox, hotline, other departments, etc. External peers in other organizations or in the digital forensics community local/federal law enforcement contact channel to the forensic team via abuse@company.com, hotlines, website contact forms 21

Forensic Team Skills and Tools Staff training and skills maintenance knowledge of proper methods and procedures allowing time to learn/understand new technologies certified examiners (CISSP, Encase EnCE, etc.) Setting up a forensics lab & tools forensics hardware (write blockers) forensics software (commercial, Linux & opensource, custom in-house tools) systems for performing acquisition, analysis, and testing old media drives and technologies 22

Recommended Resources Web resources www.e-evidence.info, a directory of digital forensics documentation and papers www.forensicswiki.org, a Wikipedia style forensics website www.forensicfocus.com, an online forensics community Peer reviewed practitioner/research journals Elsevier's Digital Investigation Journal, The International Journal of Digital Forensics & Incident Response International Journal of Digital Evidence (IJDE) Software Commercial software: Encase, FTK, etc. Opensource software: Linux, Sleuthkit, etc. 23

Questions or Comments? Questions or comments? Contact me at bruce.nikkel@ubs.com Slides available at www.digitalforensics.ch 24