10 FOCUS AREAS FOR BREACH PREVENTION

Report 7 Downloads 78 Views
10 FOCUS AREAS FOR BREACH PREVENTION

Keith Turpin Chief Information Security Officer Universal Weather and Aviation

Why It Matters Loss of Personally Identifiable Information (PII) Loss of Intellectual Property

Direct Financial Loss (e.g. Loss resulting in loss of funds) Indirect Financial Loss (e.g. Cost incurred responding to a

Reputation Loss Regulatory Sanctions

breach)

Understanding Mindset IT Staff View: IT systems are designed to meet functional requirements

Attacker's View: What matters is what a system can do, not what it was intended to do

The Hard Truth: "Any action not specifically prohibited, is allowed“

Managing Security Infrastructure

Intrusion Prevention

Security Architecture

Software Web Browsing Security

Patch Management

Vulnerability Management

Access Control

Email Security

Security Training

3rd Party Assessments

Policies and Contracts

Software Security

Endpoint Security Management

Malware Detection System Hardening Fire Walls

Incident Response

Change Management

Which Systems Represent the Greatest Risk? Determine Consistent and Relevant Criteria: • Accessibility: Where can the system be reached from? 

Internal network, public internet, supplier network, vendor network...

• Operation Control: Who manages the system? 

Your organization, a vendor, a vendor to a vendor...

• People: What types of people use the system? 

Employees, Vendors, Customers, Competitors, U.S. Persons, Non-U.S. Persons...

• Critical Operations: Does the system support critical operations? 

Revenue Generation, Enterprise Security, Critical Infrastructure, Identity Management...

• Information Types: Does it manage access to highly sensitive information? 

PII, Intellectual Property, Regulatory Compliance...

• System Characteristics: Are there system attributes that raise the risk? 

Over Privileges Accounts, End-of-Life Software, mixed data sensitivity or system criticality...

Critical Vulnerabilities in IT Systems 1.

Weak Authentication Practices

2.

Failing to Secure the Infrastructure

3.

Insecure Data Storage

4.

Introducing Flaws During Maintenance

5.

Not Testing for Vulnerabilities

6.

Failing to Remediate Known Issues

7.

Insufficiently Monitoring

8.

Creating Insecure Designs

9.

Using Insecure Coding Practices

10. Failing to Train Staff

Weak Authentication Practices: Risk #1 Chipping Away At The Keys To Your Digital Kingdom •

Weak passwords, phishing , cracking tools, large scale breaches, password re-use

Multi-Factor Authentication Can Mitigate Many Data Breaches* Start Implementing Two Factor Authentication: • • • •

End user remote access accounts Infrastructure administrator accounts Local device login Web based applications, even customer facing applications 

Used by: Google, Microsoft, Amazon, Facebook, and many others

*Mandiant M-Trends® 2015 & Verizon 2015 Data Breach Investigation Report

Failing to Secure the Infrastructure: Risk #2 Don't Allow Your Systems To Be Soft On The Inside

Harden Systems In Their Deployment Configuration 1.

Implement Least Privilege

2.

Implement Good Authentication Controls

3.

Securing Web and Application Servers

4.

Lock down Network Shares

5.

Reduce Attack Surface

6.

Implement Local Security Controls

7.

Secure Databases Configurations

8.

Verify Previously Fixed Issues Stay Fixed

Insecure the Data Storage: Risk #3 Keep It Safe, Even If You Lose It

Encrypted Sensitive Data When It Must Be Reusable • •

This includes databases, files shares, cloud storage and hard drives Encryption can mitigate legal liability associated with data loss

When data only needs to be validated against, like passwords, use one way salted hashes Clear text data and authentication credentials can be a significant contributor to breach severity

Introducing Flaws During Maintenance: Risk #4 Don't Break It While You Keep It Running

Changes To The System Are Inevitable • •

Implement configuration management plans for all critical systems Use a formal change management process to provide visibility

Conduct A Security Impact Analysis For All Production Changes • •

Ensure changes do not adversely affect security posture Don’t undo something you already fixed

Include Both System Modifications And New Technology Insertions

Not Testing for Vulnerabilities: Risk #5 Don't Assume Things Are Secure

Security Assessments Are Critical To Understanding Your Current State Assessment Focus Areas: • • • • • • •

Network Security Assessments Server Security Assessments Application Security Assessments Penetration Tests Security Architecture Reviews Security Management Practices Assessments Compromise Assessments

Failing to Remediate Known Issues: Risk #6 Knowing You Have A Problem Is Half The Battle

Systems Are Frequently Breached Using Fixable Vulnerabilities • •

71% of exploited vulnerabilities had patches available for more than 1 year Commercial software vulnerabilities often result in systemic issues

Vulnerability Management Program Responsibilities • • • •

Vulnerability management and reporting Prioritize vulnerabilities Tracking status and report metrics Corrective action validation

Monitor For Emerging Threats: • • •

Software vendor security bulletins Vulnerability clearing houses (CVE, Security Focus, etc.) New exploit announcements (Exploit DB, Blackhat, RSA, InfrGard)

Insufficiently Monitoring: Risk #7 What You Don't See Can Hurt You

Things You Need To Be Monitoring: • • • • • •

Email and all web traffic (including HTTPS) Malicious activity on end points Network traffic for call outs to command and control systems Rapid system and file changes (could indicate ransomware at work) Security and perimeter system alerts Help desk tickets related to security tools

Things To Consider Monitoring: • • • • • • •

Servers transmitting data to unregistered IPs Servers “initiating” HTTP, HTTPS, FTPS or other outbound connections Unusual activity on shell services like SSH and RPC Unauthorized proxies on end point devices New local admin accounts showing up Users logging into systems they don't normally access Users logging in at odd hours or from an unusual geographic region

Creating Insecure Designs: Risk #8 Bad Designs Can Introduce Complex Vulnerabilities

Threat Model Critical Systems To: • • •

Identify logic errors Identify design errors Determine the most likely points of weakness

There are 7 stages to a threat modeling exercise: 1. 2. 3. 4. 5. 6. 7.

Identify Assets Create an Architecture Overview Decompose the Application Identify the Threats Document the Threats Rate the Threats Remediate, Mitigate or Accept the Associated Risks

Using Poor Coding Practices: Risk #9 Good Developer ≠ Secure Code

Vulnerabilities are usually the result of uninformed efforts to meet functional requirements Set expectations by documenting software security requirements in standards and contracts

Train developers on secure coding practices and common vulnerabilities Create secure, tested, reusable, managed code libraries for common business requirements

Failing to Train Staff: Risk #10 People Are The Third Perimeter

Tools cannot save you... They won't even help much, without people who now how to use them Even great tools won't catch everything, people need learn to recognize when something does not look, feel or act right The help desk needs to know what data to collect for security related calls and have tip sheets for common issues

Help staff understand how to improve security at home, and they will be more secure in the office

QUESTIONS?

SUPPLEMENTAL MATERIAL AKA USEFUL STUFF

Locking Down Your Servers Windows Server Hardening Guide - Example (PDF):

Embedded Document Double click to open

Build Secure Software Secure Coding Guides (PDF) 1. Access Control and Web Session Management Guide 2. Authentication and Password Guide 3. Data and File Handling Guide 4. Error Handling & Logging Guide 5. HTML 5 Security Guide 6. Memory Management and General Practices Guide

Embedded Documents Double click to open

Security Guidance for the Common Person Information Security in Our Personal Lives (PDF):

Embedded Document Double click to open

Keep Staff Informed Sample: Apple QuickTime IT Security Bulletin (PDF):

Embedded Document Double click to open

Software Security Testing Application Assessment Focus Areas and Methods: •

Application Security Assessment Types o

Dynamic Application Security Testing (DAST)  Rapid interface based testing  Good at covering deployed software and supporting frameworks  Only covers web applications

o

Source Code and Binary Security Testing (SCST)/(BAST)  Best coverage of code base  May miss non-compiled or client side code  Cannot detect framework or other application environmental vulnerabilities

o

Manual Application Security Testing and Code Review  Can detect vulnerabilities that tools miss  Takes more time and a higher level of skill



Penetration Test o o o

Simulates the methods, motives and techniques of an actual attacker Includes exploitation of discovered vulnerabilities The goal is to breach of a targeted system

Maintain Existing Threat Models Threat models need to be kept current in order to accurately address system risk. The following changes should trigger a review. Threat Model Update Triggers: 1) 2) 3) 4) 5) 6) 7) 8) 9) 10) 11)

System scope System design External entities interacting with the system Trust boundaries between systems Addition or removal of hosts, processes or data stores Data flows Protocols used for data transport Sensitive data types How authentication occurs between people or processes How authorization is performed New threats are identified which may impact system components

What is a threat in the context of threat modeling? A threat is any potential occurrence, malicious or otherwise, that might damage or compromise the system or the data it manages