The Case for National CSIRTs ENOG 12 | Yerevan | 3-4 Oct 2016

Slides:



Advertisements
Similar presentations
© 2004 APCERT APCERT Activity Update Yurie Ito JPCERT/CC (On behalf of the APCERT Secretariat)
Advertisements

STRENGTHENING COOPERATION ON CYBER SECURITY WITHIN THE ASEAN REGION
1 ASEAN Regional Forum Meeting 28 – 30 April 2010 Bandar Seri Begawan, Brunei CERT-Ins Initiative on International Information Security Dr A S Kamble Director.
Philippine Cybercrime Efforts
Computer Emergency Response Teams
Evolution of CSIRTs: how to engage Critical Infrastructures and cooperate beyond borders Giza, 19th December 2011.
Tanzania Communications Regulatory Authority - TCRA Response to Cyber incidences in Tanzania: Where are we? Presented at Cyber Security Mini Conference.
© 2003 Carnegie Mellon University slide 1 Building CSIRT Capabilities and the State of the Practice Georgia Killcrece CSIRT Development Team CERT ® Training.
DHS, National Cyber Security Division Overview
MINISTRY OF NATIONAL DEFENCE REPUBLIC OF POLAND CLASSIFIED INFORMATION PROTECTION DEPARTMENT COL. PIOTR GRZYBOWSKI, Director, Classified Information Protection.
Security Controls – What Works
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
(Geneva, Switzerland, September 2014)
National CIRT - Montenegro “Regional Development Forum” Bucharest, April 2015 Ministry for Information Society and Telecommunications.
Geneva, Switzerland, September 2014 Overview of Kenya’s Cybersecurity Framework Michael K. Katundu Director, Information Technology Communications.
Session 3 – Information Security Policies
Website Hardening HUIT IT Security | Sep
National Public Health Performance Standards Local Assessment Instrument Essential Service:3 Inform, Educate, and Empower People about Health Issues.
1 ENISA’s contribution to the development of Network and Information Security within the Community By Andrea PIROTTI Executive Director ENISA Cyprus, 28.
CCIRN meeting, Cairns, 3 July 2004 Computer security co-operation in Europe Karel Vietsch Based on materials provided by TERENA TF-CSIRT.
SEC835 Database and Web application security Information Security Architecture.
1 Information Technology Security Services at The University of Michigan Paul Howell Chief Information Technology Security Officer.
Postgraduate Educational Course in radiation protection and the Safety of Radiation sources PGEC Part IV The International System of Radiation Protection.
Protective Measures at NATO Headquarters Ian Davis Head, Information Systems Service NATO Headquarters Brussels, Belgium.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Towards a European network for digital preservation Ideas for a proposal Mariella Guercio, University of Urbino.
Environmental Management System Definitions
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
ITU CoE/ARB 11 th Annual Meeting of the Arab Network for Human Resources 16 – 18 December 2003; Khartoum - Sudan 1 The content is based on New OECD Guidelines.
Connect. Communicate. Collaborate Click to edit Master title style PERT OPERATIONS.
1 CREATING AND MANAGING CERT. 2 Internet Wonderful and Terrible “The wonderful thing about the Internet is that you’re connected to everyone else. The.
Sofia, 09 June Sofia, 09 June 2010 MINISTRY OF TRANSPORT, INFORMATION TECHNOLOGY AND COMMUNICATIONS Executive Agency “Electronic Communication Networks.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Future needs for capacity building and recommendations to the OIE Dr Sarah Kahn Consultant to the OIE
ISACA Ireland Cyber Security Policy 9 February 2016.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Community of Practice K Lead Project Team: الالتزامالتحفيز التفكير المؤسسي المرونةالتميزالشراكةالاستقامة.
Cloud Security Session: Introduction 25 Sep 2014Cloud Security, Kelsey1 David Kelsey (STFC-RAL) EGI-Geant Symposium Amsterdam 25 Sep 2014.
SUNY Maritime Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal controls.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
Building Global CSIRT Capabilities Barbara Laswell, Ph. D
Cybersecurity - What’s Next? June 2017
Disaster and Emergency Planning
Crisis management related research at
WISE 2017 Collaborating Communities
WHAT IS BEHIND GEORGIA’S RAPID CYBERSECURITY DEVELOPMENT
French Port Cybersecurity Initiative
Responding to Intrusions
LCG Security Status and Issues
Ian Bird GDB Meeting CERN 9 September 2003
Information Destruction; 2017 and beyond!
Establishing national (governmental) CERTs in CIS Countries
About the NIS directive
CSIRT collaboration in Europe
Joe, Larry, Josh, Susan, Mary, & Ken
Cyber Security coordination in Europe CERT-EU’s perspective
8 Building Blocks of National Cyber Strategies
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
AAHRPP Accreditation Welcome to the University of Georgia’s presentation for accreditation of the human research protection program (HRPP). This presentation.
AFRICAN UNION- 23RD-27TH July 2018 PRESENTER: Mr. Nawa J.T Samatebele
Enterprise Roles and Structures:
Setting up an ERIC 11 May 2012 Richard Derksen
Importance of Law and Policies in the Environmental Management System
Computer Emergency Response Team
Computer Security Cooperation in Europe
Transformation of the National Statistical System: Experience
CSIRT collaboration in Europe
Anatomy of a Common Cyber Attack
Presentation transcript:

The Case for National CSIRTs ENOG 12 | Yerevan | 3-4 Oct 2016

What is a CERT (CSIRT)? A Computer Security Incident Response Team (CSIRT) is a service organization that is responsible for receiving, reviewing, and responding to computer security incident reports and activity. Their services are usually performed for a defined constituency that could be a parent entity such as a corporation, governmental, or educational organization; a region or country; a research network; or a paid client.” (CERT/CC)

What is a CSIRT? Team within an organisation that prevents, manages and responds to information security incidents Nominated person(s), typically in smaller organisations Specialist team Defined contact point – internally and externally Historically responsive, CSIRTs increasingly focus on: Prevention and Detection Alerting Vulnerability Analysis Development of business continuity plans Coordination with other CSIRTs

Recognised CSIRTs in ENOG region Country CSIRT Type TI Status Armenia CERT-AM National? Accredited Azerbaijan AzScienceCERT R&E   CERT.AZ CERT.GOV.AZ Government Georgia CERT-GE Listed CERT-GOV-GE Kazahkstan KAZRENA-CERT KZ-CERT Moldova CERT-GOV-MD MD-CERT Russia CERT-GIB ccTLD Gov-CERT.RU - RU-CERT WebPlus ISP Commercial Uzbekistan UZ-CERT Kyrgyzstan None? Taijikistan Turkmenistan

Why are CSIRTs important? Security threats are real and ongoing Ignoring threats costs resources Denial-of-Service Data Theft Compromises reputations Prevention is better than cure Small things often prevent disasters End user awareness reduces problems CSIRTs save more than they cost, and offer possibility to offer value-added services

Why the need for National CSIRTs? CSIRTs usually serve particular constituencies (e.g. government, academic, private sector) Many security incidents are cross-constituency and international Need for official national points of contact Need for national focal point within country to coordinate incidents Operational requirements for national constituencies can be different to other constituencies (e.g. 24 x 7 is more likely needed) Key elements of Critical Infrastructure Protection

Why the need for National CSIRTs? Internet has become critical to national economies Share knowledge, resources and tools Compare working practices Develop common best practices and standards Encourage development of CSIRTs and/or organisational points of contact. Improve coordination with law enforcement, security and military agencies Provision of technical advice on cybersecurity to policy makers. EU called on all member states to establish National CSIRTs by 2011.

Different models for National CSIRTs Host organisation National Telecommunications Regulatory Body Government CSIRT Academic CSIRT (often these are the first CSIRTs established in a country) Establishment of National Cybersecurity Centre Voluntary vs Regulated Relies on willingness of constituents to cooperate, or constituents are required to implement measures to counter threats (only in emergency situations?) Cooperation Bi/multi-lateral or Community Compare working practices Develop common best practices and standards Encourage development of CSIRTs and/or organisational points of contact. Improve coordination with law enforcement, security and military agencies Provision of technical advice on cybersecurity to policy makers. EU called on all member states to establish National CSIRTs by 2011.

Examples of National CSIRTs CERT-GOV-MD (Moldova) Operated by State Center for Special Telecommunications, provider of secure communications between government institutions NCSC-NL (Netherlands) Operated by Ministry of Security and Justice NorCERT (Norway) Operated by National Security Authority (NSM), under the Ministry of Defence CERT.be (Belgium) Operated by BELNET, the National Research & Education Network

How to establish a CSIRT? Define basic framework Mission Statement (what to do?) Definition of Constituency (for whom?) Relationship with others (who to cooperate with, and whom to trust?) Establish policies Determine what services to offer Train staff Establish incident handling system Raise awareness of CSIRT in your community Establish contacts with other teams

Types of CSIRT services Reactive Vulnerability handling alerts Incident & artefacts handling Proactive Announcements & information dissemination Security audits Development of security tools Configuration & maintenance Intrusion detection Security Quality Risk analysis Disaster recovery planning Consulting Education Product evaluation

The need to allocate resources to a CSIRT Handling security is a service activity Incidents require timely and effective response Roles and responsibilities are important A formal CSIRT structure is a requirement to join the Security Community and benefit from it There must be somebody handling a security problem, whose priority is to solve the problem, or at least to take effective countermeasures Establishing a minimal Service Level requires a minimal allocation of resources Some incidents cannot be handled “best effort style”

The benefits of allocating resources to a CSIRT Roles are defined, procedures are established People know what to do and how Increase in confidence by the community towards the CSIRT Increase in confidence by the community towards the host organisation Money costing resources (network infrastructure, data, computer services, manpower) are preserved and protected Better reputation means better collaboration

The requirements for an operational CSIRT Provide and keep updated information about itself and its services Trusted Introducer Listing Accomplish a list of operational requirements MUST, SHOULD, MAY lists Having operational tools that can solve/neutralize/mitigate security incidents Belong to the Web-of-Trust of Security Teams Trusted Introducer Accreditation process FIRST membership

MUST… Provide and make available PGP team and members keys Provide and keep up-to-date Web site with contact information Acknowledge incoming incidents and issue Trouble Tickets or Unique Identifiers Inform external teams of unexpected security related discovered information Provide incident closure information to the team who opened it Use encryption to protect sensitive or personal data in incident handling information exchange Keep all incident information confidential and not disclosed beyond the scope of incident handling Sign all e-communications with PGP keys

SHOULD… Document and publish Best Common Practices (BCP) Make available its Communication and Authentication Policy for keys and certificates Acknowledge incoming incident handling requests, and state its own Severity classification Inform the external team about progress in handling incidents Use a Trouble Ticket System (or equivalent) in handling procedures Have PGP keys countersigned by other teams Install and use security tools

MAY… Inform the external team who opened an incident about the internal escalation procedures used Redirect the external team who opened an incident to a more appropriate Security Team Include automated information (IODEF-like) in reports exchanged with other teams Make available X.509 team and members certificates to other teams, including information about the Issuing Certification Authority, in case of Self Signed CA

Trusted Introducer CSIRTs rely on notion of trust – whether contacts are trustworthy Trusted Introducer service was introduced to establish higher level of trust CSIRTs must provide specific information about personnel and services Prospective CSIRTs must have support of at least two other TI- accredited CSIRTs, and others can object to acceptance Accredited CSIRTs are contacted 3 times per year, and must respond to maintain accreditation TI service is operated by TF-CSIRT, the European Forum of Computer Incident Response Teams, but open to all teams

TRANSITS Training TF-CSIRT has produced training material for CSIRTs seeking relevant training TRANSITS-I is 2-day basic course covering organisational, technical operational and legal issues TRANSITS-II is 3-day advanced course covering traffic flow analysis, forensics, communication and incident handling exercises Usually 2 x TRANSITS-I and 1 x TRANSITS-II workshop per year in Europe/Mediterranean/Middle East TRANSITS materials adopted by FIRST who run workshops elsewhere in the world, and other organisations may also use materials under licence for their own training events TRANSITS trainers can be hired for dedicated workshops

Thank You! Kevin Meynell meynell@isoc.org