Enterprise Cybersecurity: Building an Effective Defense



Similar documents
Enterprise Cybersecurity: Building an Effective Defense

Defending Against Data Beaches: Internal Controls for Cybersecurity

Software that provides secure access to technology, everywhere.

The Protection Mission a constant endeavor

Evolution Of Cyber Threats & Defense Approaches

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Protecting Your Organisation from Targeted Cyber Intrusion

Next Generation Jump Servers for Industrial Control Systems

Bellevue University Cybersecurity Programs & Courses

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

The Business Case for Security Information Management

RSA Security Anatomy of an Attack Lessons learned

A Case for Managed Security

Targeted Intrusion Remediation: Lessons From The Front Lines. Jim Aldridge

The Role of Security Monitoring & SIEM in Risk Management

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Effective Methods to Detect Current Security Threats

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

SIEM is only as good as the data it consumes

SANS Top 20 Critical Controls for Effective Cyber Defense

Overcoming PCI Compliance Challenges

Cyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology

WHITE PAPER. Attack the Attacker HOW A MANAGED SECURITY SERVICE IMPROVES EFFICIENCY AND SAVES COST

Post-Access Cyber Defense

Defending Against Cyber Attacks with SessionLevel Network Security

2015 VORMETRIC INSIDER THREAT REPORT

CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric

APT Advanced Persistent Threat Time to rethink?

Perspectives on Cybersecurity in Healthcare June 2015

September 20, 2013 Senior IT Examiner Gene Lilienthal

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

How We're Getting Creamed

Critical Security Controls

The STAGEnet Security Model

Critical Controls for Cyber Security.

Top 20 Critical Security Controls

Effective Methods to Detect Current Security Threats

Ovation Security Center Data Sheet

Cybersecurity: What CFO s Need to Know

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Jumpstarting Your Security Awareness Program

All Information is derived from Mandiant consulting in a non-classified environment.

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System

Host/Platform Security. Module 11

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited

Big Data, Big Risk, Big Rewards. Hussein Syed

Looking at the SANS 20 Critical Security Controls

Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples

SAP Cybersecurity Solution Brief. Objectives Solution Benefits Quick Facts

Targeted attacks: Tools and techniques

THE TOP 4 CONTROLS.

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Statement for the Record. Martin Casado, Senior Vice President. Networking and Security Business Unit. VMware, Inc. Before the

SPEAR PHISHING UNDERSTANDING THE THREAT

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Passing PCI Compliance How to Address the Application Security Mandates

Breaking the Cyber Attack Lifecycle

ICANWK406A Install, configure and test network security

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

Building A Secure Microsoft Exchange Continuity Appliance

Advanced Threats: The New World Order

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

External Supplier Control Requirements

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Advanced Threat Protection with Dell SecureWorks Security Services

Information Security and Risk Management

Securing OS Legacy Systems Alexander Rau

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

IT Security Risks & Trends

Additional Security Considerations and Controls for Virtual Private Networks

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

FINRA Publishes its 2015 Report on Cybersecurity Practices

Incident Response. Six Best Practices for Managing Cyber Breaches.

Advanced File Integrity Monitoring for IT Security, Integrity and Compliance: What you need to know

End-user Security Analytics Strengthens Protection with ArcSight

Information Security for the Rest of Us

Data Management Policies. Sage ERP Online

Guideline on Auditing and Log Management

Things To Do After You ve Been Hacked

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

5 Steps to Advanced Threat Protection

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Defence Cyber Protection Partnership Cyber Risks Profile Requirements

Logging In: Auditing Cybersecurity in an Unsecure World

Information Security Services

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Enterprise Security Tactical Plan

Incident Response. Proactive Incident Management. Sean Curran Director

Transcription:

: Building an Effective Defense Chris Williams Scott Donaldson Abdul Aslam 1

About the Presenters Co Authors of Enterprise Cybersecurity: How to Implement a Successful Cyberdefense Program Against Advanced Threats Scott E. Donaldson is a Senior Vice President for Leidos, Inc., a Fortune 500 company that provides scientific, engineering, systems integration, and technical services. He is the Chief Technology Officer (CTO) and IT Director for its Heath and Engineering Sector. Chris K. Williams is an Enterprise Cybersecurity Architect at Leidos, Inc. He has been designing, deploying, and operating cybersecurity solutions for government and commercial clients for over 20 years, and holds a patent for e commerce technology. Abdul Aslam is the Director of Cyber Security Compliance and Risk Management for Leidos, Inc. He has 19 years of experience in devising risk acceptance and compliance frameworks, application security, security operations and information protection. 2

Agenda 1. How you were taught to do cyber defense in the past 2. What modern attackers do to defeat your defenses: the illusion of defense in depth 3. Why the defense methods you were taught in the past don t work against today s attackers 4. Why the frameworks you re supposed to implement may not be helpful 5. What you can do that *does* work 6. What you can expect in the future 3

1. Legacy Cyberdefense In the 1990s: Cyberdefense involved hardening Internet connected computers against attack. In the 2000s: Cyberdefense involved building network perimeters to protect enterprise networks from the Internet. In the 2010s: Cyberdefense is struggling to find a new paradigm for protection. 4

2. The Illusion of Defense in Depth Complexity does not correlate with effectiveness: You think your security is pretty good You deploy sophisticated cybersecurity technologies Yet you still get pwned Perhaps your defense in depth is not as deep as you think. 5

Defense in Depth: Servers Defense in Depth for servers the myth: Attacker Firewall Proxy IDS VPN Anti virus Server Data Defense in Depth reality with valid admin credentials: Attacker Firewall Proxy IDS VPN Anti virus Server Data IDS = intrusion detection system VPN = virtual private network 6

Defense in Depth: Endpoints Defense in Depth for endpoints the myth: Attacker Firewall Proxy IDS VPN Anti virus Workstation Data Defense in Depth reality with phishing: Attacker Outbound HTTPS Connection Breached Endpoint Firewall Proxy IDS VPN Anti virus Workstation Data IDS = intrusion detection system VPN = virtual private network 7

3. Why Cyberdefenses Don t Work In a complex environment: Flaws are inevitable Systems malfunction People make mistakes Therefore: Attackers can always gain a foothold, eventually Defenders don t detect the attackers on the inside Attackers eventually succeed Show me artifacts that indicate your defenses catch and stop the attacks that are occurring. 8

Inevitable Failure: Endpoints The reality is that endpoints are always compromised: Home PCs 1 / 10 Enterprise PCs 1 / 100 Enterprise Servers 1 / 1,000 One cause is the Inevitability of the Click : Source: Verizon 2013 Data Breach Investigations Report You can reduce these numbers but you CANNOT eliminate them. Therefore, are you detecting them when they occur? 9

Anatomy of a Targeted Attack Targeted attacks methodically work through victim defenses Initial Incursion Establish Foothold Command & Control Escalate Privileges Move Laterally Complete the Mission Attacker Server Vulnerability Application Vulnerability Buy Access Malicious Web Site Malicious Email Endpoint Vulnerability Compromised Server Compromised Endpoint Compromised Mobile Device Compromised User Account Web Site WebShell Outbound Web Connection Protocol Tunneling Internet Facing User Account Password Keylogger Harvest Credentials Pass the Hash / Ticket Exploit Vulnerabilities Hijack Sessions Maintain Persistence Network Mapping Share Enumeration Remote Desktop Remote Shell Remote Admin Tools CONFIDENTIALITY: Exfiltrate Data INTEGRITY: Modify Data AVAILABILITY: Destroy Data The sequence gives defenders opportunities to succeed 10

The Vulnerability of Systems Administration Systems Administration channels are the Achilles Heel : In the datacenter, technologies are stacked and interdependent Usually, administrator credentials are just passwords on the network Attackers can go lower in the stack and bypass upper security layers Don t need to exploit a vulnerability if you can steal the administrator credentials Technology Stack End-User Application Database Network & Net Security Operating System Drivers, Storage Virtualization (if present) Firmware / BIOS Hardware Administration Stack User Credentials Application Admin Database Admin Network Admin Operating System Admin Storage Area Network Admin Virtualization Admin Integrated Lights Out & Keyboard Video Mouse Admin Physical Access Sysadmin Passwords Hardware Security Module / Crypto Crypto Access 11

Broken Windows Windows is the most popular enterprise network operating system: Numerous protocol vulnerabilities Pass the Hash, Pass the Ticket Gold and Silver tickets Cached credentials Local administrator accounts Frequent patches to exploits Zero Day attacks Prevention alone may not be adequate 12

4. The Challenge With Frameworks Major frameworks focus primarily on prevention: ISO 27001 NIST SP800 53 SANS / CSC 20 PCI NIST New Framework of 2013: Organized around the incident life cycle Unclear how to use it in a cybersecurity program Adoption is not widespread Most frameworks would rather try to prevent attacks. Few consider how (in)effective that prevention actually is. Show me artifacts that indicate your prevention is working. 13

Framework Example: ISO 27001 Consider the Incident Life Cycle: Deter Avoid Prevent Detect React Recover Percentage 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% ISO 27001/2: 114 Total Controls Deter Avoid Prevent Detect React Recover Controls 41% 64% 73% 23% 19% 17% Data from www.iso27001security.com Most ISO 27001 controls focus on deterrence, avoidance, and prevention Few controls focus on detection, reaction, or recovery. 14

5. A Pragmatic Approach Rather than strive for perfection, strive for good enough: Focus on real world attacks that are most likely to occur Repel attacks when they occur, then improve defenses Design defenses to impede the attack: Disrupt Detect Delay Defeat Many Initial Attacks Disrupt Detect Detect Delay Fewer Penetrations Delay Defeat 15

Pragmatic Security: Audit First Threat Analysis Audit Controls Forensic Controls Detective Controls Preventive Controls Don t try to protect everything Design Security Around the Threats: How do you search for the threat? What logs do you need to detect the threat? Can you alert when the threat occurs? Can you block the threat so it does not succeed? 16

Pragmatic Security: Cyber Castles We can learn from history by looking at medieval towns: Most of the productivity is in the undefended fields and village The town is lightly defended, but the castle is heavily defended To take the town, you have to control the castle Tower = Authentication Systems Castle = Security Systems Town = Business Servers Fields = Regular Users 17

Pragmatic Security: True Defense in Depth Layer enterprise security to protect the security infrastructure best: Each layer gives defenders an opportunity to detect and repel attack Each layer s defense can be somewhat porous perfection not required Defenses get stronger as attackers penetrate further inside Goal is to give defenders 2 or more opportunities to catch the attack Users: lightly protected Servers and Infrastructure: better-protected Security Systems: well-protected Authentication Systems: very well-protected 18

Pragmatic Security: Top Ten 1. Emphasis on detection rather than protection 2. Less reliance on endpoint security 3. Network segmentation to provide defense in depth 4. Two factor authentication for system administrators 5. Application whitelisting for critical systems and assets 6. Log aggregation and security information and event management (SIEM) 7. 24x7 security monitoring to detect incidents 8. Forensics tools to track down attacks when they occur 9. Incident rapid response to repel attacks in real time 10. Security incident metrics tracking activities and threats 19

A Successful Cybersecurity Program Characteristics More than just technologies Coordinate all of the following: Cybersecurity Policy Programmatics IT life cycle Assessment Combine to guide, build and operate a successful program Challenges Policy frameworks seldom align well with organization or assessment. Programmatic frameworks focus on business considerations, not cybersecurity IT life cycle frameworks do not support cybersecurity management or reporting Assessment frameworks do not tend to align with people organization or technology deployment 20

Elements of a Successful Program Requirements for a Successful Enterprise Cybersecurity Framework: Tie together architecture, policy, programmatics, IT life cycle, and assessments into a single framework Enables delegation of cybersecurity responsibilities into functional areas It needs to tie together architecture, policy, programmatics, IT life cycle, and assessments using a single framework for delegation and coordination Functional areas align well with real world skills of cybersecurity professionals, and support budgets and technologies Functional areas enable easy delegation and reporting of status at an abstraction layer suitable for executive consumption Functional Areas support the business decision making process for strategy and prioritization 21

Axioms for Cyberdefense Cybersecurity needs to be planned around the idea of achieving only partial security, rather than being resourced to do everything perfectly all the time. Major cybersecurity frameworks lay out what the ideal practice should be, but have little, if any, guidance on how to deploy a partial solution that is the best value for the cost when the funding is not adequate to achieve the ideal. Cybersecurity professionals must learn how to work with the business to find a balance between defenses that are only partially successfully, but effective in the eyes of the business. 22

Conclusion With a legacy cyber defense, the defender has to do everything perfectly to protect the enterprise. With a next generation cyber defense, the attacker has to do everything perfectly to attack it. Which would you rather have? 23

6. Looking to the Future Cyberattacks and defenses can be characterized as generations. We are now in the transition from Generation 2 to Generation 3. There are more generations coming after this 24