A BRAINSTORMING ON SECURITY FIRE DRILLS



Similar documents
DANCERT RFC2350 Description Date: Dissemination Level:

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

Information Security Threat Trends

Anomaly Detection in Backbone Networks: Building A Security Service Upon An Innovative Tool

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

How We're Getting Creamed

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

RSA Security Anatomy of an Attack Lessons learned

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Current counter-measures and responses by CERTs

RMAR Technologies Pvt. Ltd.

Fraud and Abuse Policy

What legal aspects are needed to address specific ICT related issues?

Incident Response Plan for PCI-DSS Compliance

Incident Reporting Guidelines for Constituents (Public)

UK Networks & Security An Overview. Dr Andrew Powell, ENISA Workshops on CERTs in Europe, 29 May 2008

Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

Cyber Security Incident Reporting Scheme

2.1.1 This policy and any future changes requires ratification by CAUDIT.

Tunisia s experience in building an ISAC. Haythem EL MIR Technical Manager NACS Head of the Incident Response Team cert-tcc

PART D NETWORK SERVICES

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Topic 1 Lesson 1: Importance of network security

Information Security Incident Management Guidelines

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

About Botnet, and the influence that Botnet gives to broadband ISP

13 Ways Through A Firewall

Phone Fax

How To Create Situational Awareness

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Practical Steps To Securing Process Control Networks

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

UNCLASSIFIED. General Enquiries. Incidents Incidents

Cisco & Big Data Security

September 20, 2013 Senior IT Examiner Gene Lilienthal

The Cyber Threat Profiler

SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

Cybercrime in Canadian Criminal Law

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

Information Technology Services Information Security Incident Response Plan

Network Instruments white paper

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

DATA PROTECTION LAWS OF THE WORLD. India

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

Where every interaction matters.

The Evolution of Information Security at Wayne State University

13 Ways Through A Firewall What you don t know will hurt you

Specific recommendations

Streamlining Web and Security

Department of Management Services. Request for Information

How To Protect Gante From Attack On A Network With A Network Security System

Security Information Management (SIM)

Defending Against Data Beaches: Internal Controls for Cybersecurity

Detailed Description about course module wise:

BOTNETS. Douwe Leguit, Manager Knowledge Center GOVCERT.NL

How To Protect A Network From Attack From A Hacker (Hbss)

Protecting Your Organisation from Targeted Cyber Intrusion

A Decision Maker s Guide to Securing an IT Infrastructure

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited

IDS and Penetration Testing Lab ISA 674

Denial of Service (DoS) Technical Primer

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Cyber Security Metrics Dashboards & Analytics

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia

SPEAR PHISHING UNDERSTANDING THE THREAT

Incident Categories (Public) Version (Final)

PEER-TO-PEER NETWORK

A Critical Investigation of Botnet

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

RSA Security Analytics

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

How To Protect Decd Information From Harm

TLP WHITE. Denial of service attacks: what you need to know

How a Company s IT Systems Can Be Breached Despite Strict Security Protocols

Information Security

Sample Employee Network and Internet Usage and Monitoring Policy

Integrating MSS, SEP and NGFW to catch targeted APTs

10 Best Practices to Protect Your Network presented by Saalex Information Technology and Citadel Group

Presented by: Mike Morris and Jim Rumph

DDoS Overview and Incident Response Guide. July 2014

How To Classify A Dnet Attack

VERISIGN DDoS PROTECTION SERVICES CUSTOMER HANDBOOK

UBC Incident Response Plan

Transcription:

A BRAINSTORMING ON SECURITY FIRE DRILLS Classification, Feasibility, Usefulness and Implications Maurizio Molina, DANTE Nino Jogun, CARNET on behalf of GÉANT3 project, SA2/T4 TF-CSIRT, Tallin, 25 th Sep. 2009

Where this work originates: SA2/T4 SA2/T4 Multi Domain Security Service in GÉANT3 project Started April 2009 4 Years 6 FTE 14 NRENs + DANTE CERT PEOPLE! T1 T2 T3 T5 T4

Synergies with TF-CSIRT SA2/T4 Focus is security of Multi Domain services in GÉANT3 Monitoring services (perfsonar) Automatic L2 and Wavelength setup (AutoBahn) A lot of in-house coding for the above services SA2/T4 must assist in all phases (design, coding, deployment, operation) For the latter, we have Security Fire Drills (S.F.D.) in our workplan SFD is also in TF-CSIRT and other entities charter We want to share ideas, experiences, procedures and tools for implementing SFD And learn from who already did something!

Just remember our focus: Multi Domain services on GEANT3 That means. Universe of Cyber Security Fire Drills Other group s focus TF-CSIRT focus? ENISA s focus? SA2/T4 focus Other group s focus

Starting point: the S.F.D. matrix Things to consider about S.F.D. -Feasibility -Usefulness -Implications Classification of S.F.D. Type 1 Type 2 Type 3.. Type n Feasibility Usefulness Implications The content!

Classification: S.F.D. Categories Host perimeter S.F.D. Testing the security resilience of applications and servers Testing how service owners, administrators and CERTs discover, handle and (possibly) mitigate security issues Network perimeter S.F.D. Testing how NOCs and CERTs detect and handle incidents involving one or more networks, and possibly mitigate them

Classification: what we did not consider (because out of SA2/T4 scope) We did not consider the two extrema The end user case Password strength social engineering, phishing Copyright infringements, illegal material The network resilience case Simulation of attacks on NW infrastructure with link saturation Who will ever give authorization for that??? However, if some GN3 multi-domain services are compromised, network performances may be affected (AutoBahn, perfsonar)

Classification: Host perimeter S.F.D. Type System (partly System (fully Service (partly Service (fully Description attack a system and successfully compromise it (without sys admin knowing) attack a system exploiting some privileged access, in coordination with system administrator attack a service and successfully compromise it (without service owner knowing) Attack a service in coordination and with additional info given by service owner => Service: distributed application and associated communication protocols

Classification: Network perimeter S.F.D. Type Real traffic injection Monitoring alert injection Network Incident Handling test Description (D)DoS attack on specific service, or ethical worm Make network monitoring system produce fake alerts Craft incident report (cross-organization) (but no real traffic, no fake monitoring tools alerts) We assume all these tests must be partly announced

Things to consider about S.F.D. Feasibility What are the required resources, knowledge and authorizations to carry them out? Usefulness What are the goals? What are the criteria defining a successful test? What are the factors that may cause the test to be unreliable / not significant? Implications Who can be disturbed by the test? What legal issues you and those giving you authorization need to be aware of?

Host perimeter S.F.D. - Feasibility Type 1a) System (partly 1b) System (fully 2a) Service (partly 2b) Service (fully Require An exploitable vulnerability in the system, idea of what to do when access is gained (e.g. manipulate logs, create additional accounts, open backdoors etc.); Authorization; one or more informed persons in escalation chain access to the system, idea of what to do when access is gained (see above), coordination with system admin; Authorization As 1a) but vulnerability is sought in specific application, and service owner sys admin As 1b) but vulnerability is sought in specific application, and service owner sys admin

Network perimeter S.F.D. - Feasibility Type Real traffic injection Monitoring alert injection Network Incident Handling test network bandwidth, traffic generators, fake malware traffic emulator; Require access to monitoring systems (IDS, IPS, NetFlow, log processing ), injection of fake network events in them; mail client; fake evidence generator; Authorization; one or more informed persons in escalation chain

Host perimeter S.F.D. - Usefulness Type Goal Success criteria Failure/test bias risks 1a) System (partly resilience of system to attacks; or (if sys compromised): effectiveness of system monitoring and admin IH capabilities no vulnerability found or exploited; or (if sys compromised): admin detects and fixes/escalates in reasonable time not enough knowledge to find or exploit a vulnerability, but system may still be compromised by others; 1b) System (fully effectiveness of system monitoring and admin IH capabilities admin detects and fixes/escalates in reasonable time admin may not pay attention and lower guards in general 2a) Service (partly as 1a), but service owner also involved as 1a), but service owner also involved as 1a), but service owner also involved 2b) Service (fully as 1b), but service owner also involved as 1b), but service owner also involved as 1b), but service owner also involved

Network perimeter S.F.D. - Usefulness Type Goal Success criteria Failure/test bias risks Real traffic injection effectiveness of network monitoring systems and net admin IH capabilities service resilient to attack; virus/worm not speading; netw. monitoring system detecting; netw. admin fix/escalate quickly Traffic injection below threshold of monitoring system, no action taken; traffic filtered by intermediate networks Monitoring alert injection net admin IH capabilities; ability to cross check internal evidence (difficult!!) Netw. admin fix/escalate quickly Different monitoring systems; impossible to create of fake alerts; possible bias if who opens access to monitoring systems is involved in test Network Incident Handling test net admin IH capabilities; ability to cross check external evidence (easier!!) network admins react in reasonable time but cross check evidence and take no action Low risks of test failure, test is simple and well defined

Host perimeter S.F.D. - Issues Type 1a) System (partly 1b) System (fully 2a) Service (partly 2b) Service (fully Impact (who is disturbed ) system admins, users (if production system), CSIRT (if detected and esalated) system admins, CSIRT (if detected and esalated); user impact can be controlled Legal issues as 1a) + service owner As 1a) as 1b) + service owner As 1b) "unauthorised access to computers" is normally a criminal offence. Need to be very sure you have authority from the right people. Also if you actually compromise a system there may be Data Protection implications (mandatory notification of security breaches in some countries). Depending on the impact of your compromise, there may be liability issues As above. Given the data protection implications, sysadmins may not be the appropriate persons to give AuthZ

Network perimeter S.F.D. - Issues Type Impact (who is disturbed ) Legal issues network test, real traffic possible widespread collateral damage due to e.g. link saturation or filter setup (attack completion); users (if production service), network admins, CSIRT (one or more Networks) DoS attacks are generally crimes. If you use a bot to launch DDoS it s the unauthz use of these computers that is a crime, (even having the consent of the eventual target). Releasing a worm or virus is also a crime: authz is vital, but must be very sure that it'll only spread to machines where you have authority network test, no traffic but fake monitoring system alerts pure network Incident Handling test network admins, CSIRT; users affected if admins set filters network admins, CSIRT; users affected if admins set filters (if do not cross check evidence) Small risk of committing unauthorised access/modification offences here Small risk: potential liability for wasting people's time, lost work etc

Conclusions, Next Steps SA2/T4 next step is reviewing the SFD Matrix, exclude the unfeasible tests, prioritise the others, and then move towards implementation We would value your feedback here Also: did we miss entire ROWs or COLUMNs? What is TF-CSIRT position? I.e.: what is the overlap of TF- CSIRT with SA2/T4 in this area? How can TF-CSIRT benefit from what we do? ENISA s position?

References - Credits Maurizio.molina@dante.net ML: gn3-sa2-t4@geant.net (subscriber only, but I will get and approve non-member posting...) Many thanks to Andrew Cormack!