Secure Modern Enterprise

Slides:



Advertisements
Similar presentations
The System Center Family Microsoft. Mobile Device Manager 2008.
Advertisements

4/14/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
ASSUME BREACH PREVENT BREACH + Research & Preparation First Host Compromised Hours Domain Admin Compromised Data Exfiltration (Attacker.
Dell Connected Security Solutions Simplify & unify.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Russell Rice Senior Director, Product Management Skyport Systems
Connect with life Ravi Sankar Technology Evangelist | Microsoft Corporation Ravisankar.spaces.live.com/blog.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
The time to address enterprise mobility is now
Deployment Planning Services
Hybrid Management and Security
Deployment Planning Services
Enterprise Security in Practice
5/31/2018 3:40 PM BRK3113 How Microsoft IT builds Privileged Access Workstation using Windows 10 and Windows Server 2016 Jian (Jane) Yan Sr. Program Manager.
Identity & Access Management for a cloud-first, mobile-first world
Deployment Planning Services
Windows Server 2016 Secure IaaS Microsoft Build /1/2018 4:00 AM
Hybrid Management and Security
Microsoft Operations Management Suite Insight and Analytics
Journey to Microsoft Secure Cloud
Microsoft Ignite /2/2018 6:37 AM BRK2293
THR2099 What to do BEFORE all hell breaks loose: Building a modern cybersecurity strategy.
Microsoft Azure: The only consistent Hybrid Cloud
6/10/2018 5:07 PM THR2218 Deploying Windows Defender AV and more with Intune and Configuration Manager Amitai Senior Program Manager,
Deployment Planning Services
Securing Privileged Access from Active Attacks
SaaS Application Deep Dive
Active Cyber Security, OnDemand
Protect sensitive information with Office 365 DLP
Cybersecurity Reference Architecture
The Information Protection Problem
Threat Management Gateway
Information Protection
Configuration Management with Azure Automation DSC
Rights Management Services (RMS)
Security for your digital transformation
9/19/2018 2:49 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Prevent Costly Data Leaks from Microsoft Office 365
SharePoint Online Management and Control
Determined Human Adversaries: Mitigations
SAM Financial Services Cybersecurity Assessment
Cybersecurity Strategy
Microsoft Azure P wer Lunch
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Protecting Against Credential Theft: Today and Tomorrow
Microsoft Virtual Academy
Identity Infrastructure Fundamentals and Key Capabilities
12/5/2018 2:50 AM How to secure your front door with real-time risk assessments of your logons Jan Ketil Skanke COO and Principal Cloud Architect CloudWay.
Microsoft Virtual Academy
Microsoft Virtual Academy
Microsoft Virtual Academy
Building an Integrated Security System Microsoft Forefront code name “Stirling” Ravi Sankar Technology Evangelist | Microsoft
What’s new in the Fall Creators Update for Windows Defender ATP
How to Mitigate the Consequences What are the Countermeasures?
Microsoft Virtual Academy
Protecting your data with Azure AD
System Center Marketing
Determined Human Adversaries: Mitigations
Microsoft Virtual Academy
Day 2, Session 2 Connecting System Center to the Public Cloud
Monitor VMware with SC2012 SP1 Operation Manager & Veeam Microsoft Tools for VMware Integration & Migration Symon Perriman Michael Stafford Senior.
Microsoft Virtual Academy
Microsoft Data Insights Summit
Pass-the-Hash.
7/28/ :33 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or.
Microsoft Virtual Academy
Azure AD Simon May Technical Evangelist.
Microsoft Data Insights Summit
Critical Hygiene for Preventing Major Breaches
Microsoft Virtual Academy
Presentation transcript:

Secure Modern Enterprise 9/10/2018 3:22 PM Secure Modern Enterprise Chris Jackson Sr. Architect, Cybersecurity Critical security assurances | Cloud-powered Threat Detection | Major Incident Management © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

“There are two kinds of big companies, those who’ve been hacked, and those who don’t know they’ve been hacked.” -James Comey, FBI Director Median number of days attackers are present on a victims network before detection 200+ Days after detection to full recovery 80 Impact of lost productivity and growth $3Trillion Average cost of a data breach (15% YoY increase) $3.5Million MICROSOFT CONFIDENTIAL FOR NDA DISCUSSION ONLY MICROSOFT CONFIDENTIAL © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION

46% 99.9% 23% 50% How do breaches occur? of compromised systems had no malware on them 99.9% of exploited Vulnerabilities were used more than a year after the CVE was published Malware and vulnerabilities are not the only thing to worry about 23% of recipients opened phishing messages (11% clicked on attachments) 50% of those who open and click attachments do so within the first hour Fast and effective phishing attacks give you little time to react MICROSOFT CONFIDENTIAL FOR NDA DISCUSSION ONLY Source: Verizon 2015 Data Breach Investigation Report MICROSOFT CONFIDENTIAL © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION

Attacks happen fast and are Hard to stop 9/10/2018 Attacks happen fast and are Hard to stop If an attacker sends an email to 100 people in your company… …23 people will open it… …11 people will open the attachment… …and six will do it in the first hour. Source: Verizon 2015 Data Breach Investigations Report © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION

87% 58% $240 Data Leakage Data Leakage 9/10/2018 Data Leakage Data Leakage …of senior managers admit to regularly uploading work files to a personal email or cloud account1 87% Have accidentally sent sensitive information to the wrong person1 58% Average per record cost of a data breach across all industries2 $240 PER RECORD 1Stroz Friedberg, “On The Pulse: Information Security In American Business,” 2013 2HIPPA Secure Now, “A look at the cost of healthcare data breaches,” Art Gross, March 30, 2012 © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION

Can’t Stop Every Attack, But Can Rapidly Raise Attacker Cost RUIN ATTACKER’S ECONOMIC MODEL BREAK THE KNOWN ATTACK PLAYBOOK RAPID RESPONSE AND RECOVERY ELIMINATE OTHER ATTACK VECTORS Change the Defender’s Dilemma to an Attacker’s Dilemma

SECURE MODERN ENTERPRISE A secure modern enterprise is resilient to threats Aligned to business objectives and current threat environment SECURE MODERN ENTERPRISE Identity Embraces identity as primary security perimeter and protects identity systems, admins, and credentials as top priorities Apps and Data Aligns security investments with business priorities including identifying and securing communications, data, and applications Identity Apps and Data Infrastructure Devices Infrastructure  Operates on modern platform and uses cloud intelligence to detect and remediate both vulnerabilities and attacks Devices Accesses assets from trusted devices with hardware security assurances, great user experience, and advanced threat detection Secure Platform (secure by design)

Identity Pillar Phase 2: Identity Major Identity Challenges 9/10/2018 3:22 PM Identity Pillar Phase 2: Identity Embraces identity as primary security perimeter and protects identity systems, admins, and credentials as top priorities Major Identity Challenges Identity system security is critical to all security assurances Attackers are actively targeting privileged access and identity systems Identity systems are challenging to protect Identity attacks like credential theft are difficult to detect and investigate Individual accounts have large attack surface across devices and systems Elevated protection for privileged access & identity systems Strongest protections for identity admins based on top attacks and leading edge hardware rooted protections Advanced detection for identity and credential theft attacks Expert analysts to help detect and respond to identity attacks Industrial Grade Protections for all users Hardware protection for credentials on devices Leading edge biometrics authentication combining ease of use and high security Integration of real time cloud intelligence into identity risk management © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Phase 1 Critical Mitigations: Typical Attack Chain Compromises privileged access Tier 0 Domain & Enterprise Admins 24-48 Hours Directory Database(s) Beachhead (Phishing Attack, etc.) Domain Controllers Lateral Movement Steal Credentials Compromise more hosts & credentials Tier 1 Server Admins Privilege Escalation Get Domain Admin credentials Execute Attacker Mission Steal data, destroy systems, etc. Persist Presence Tier 2 Workstation & Device Admins

These practices are still important Microsoft Ignite 2015 9/10/2018 3:22 PM These practices are still important Part of a complete long term security strategy Domain Controller Security Updates Target full deployment within 7 days Remove Users from Local Administrators Manage exceptions down to near-zero Ensure only admin of one workstation Baseline Security Policies Apply standard configurations Anti-Malware Detect and clean known threats Log Auditing and Analysis Centralize logs to enable investigations and analysis Software Inventory and Deployment Ensure visibility and control of endpoints to enable security operations © 2015 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Protecting Active Directory and Admin privileges Microsoft Ignite 2015 9/10/2018 3:22 PM Protecting Active Directory and Admin privileges 2-4 weeks 1-3 months 6+ months First response to the most frequently used attack techniques 3. Unique Local Admin Passwords for Workstations http://Aka.ms/LAPS 4. Unique Local Admin Passwords for Servers http://Aka.ms/LAPS Active Directory Azure Active Directory 1. Separate Admin account for admin tasks 2. Privileged Access Workstations (PAWs) Phase 1 - Active Directory admins http://Aka.ms/CyberPAW © 2015 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Physical PAW, Productivity VM Jump Server is optional

Protecting Active Directory and Admin privileges Microsoft Ignite 2015 9/10/2018 3:22 PM Protecting Active Directory and Admin privileges 2-4 weeks 1-3 months 6+ months Build visibility and control of administrator activity, increase protection against typical follow-up attacks 6. Attack Detection http://aka.ms/ata 2. Time-bound privileges (no permanent admins) http://aka.ms/PAM http://aka.ms/AzurePIM 3. Multi-factor for elevation Active Directory Azure Active Directory 9872521 1. Privileged Access Workstations (PAWs) Phases 2 and 3 –All Admins and additional hardening (Credential Guard, RDP Restricted Admin, etc.) http://aka.ms/CyberPAW 4. Just Enough Admin (JEA) for DC Maintenance http://aka.ms/JEA 5. Lower attack surface of Domain and DCs http://aka.ms/HardenAD © 2015 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Privilege Vaulting PAM Server Admin Group (or Custom Action) Admin 9:00 1. Request Access (10:00) 2. Auto-Approve (10:00) 10:00 11:00 Managed Servers Domain Admin Schema Admin Top Secret Project 12:00 3. Access Resource (10:01) 1:00 Admin Group (or Custom Action) Admin Account 4. Access Resource (3:15) 2:00 Customizable Workflows Notifications Approval Actions 3:00

Protecting Active Directory and Admin privileges Microsoft Ignite 2015 9/10/2018 3:22 PM Protecting Active Directory and Admin privileges 2-4 weeks 1-3 months 6+ months 5. Shielded VMs for virtual DCs (Server 2016 Hyper-V Fabric) http://aka.ms/shieldedvms Move to proactive security posture 1. Modernize Roles and Delegation Model (Consulting) https://www.microsoft.com/security Active Directory Azure Active Directory 2. Smartcard or Passport Authentication for all admins http://aka.ms/Passport 3. Admin Forest for Active Directory administrators http://aka.ms/ESAE 4. Code Integrity Policy for DCs (Server 2016) © 2015 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Privileged Access Tier-0 Tier-1 Tier-2 Control Data and Services IPsec Data and Services Tier-1 Access Tier-2

ESAE / Red Forest Production Domain Secure Vault IPsec Greenfield Domain Admins (Gold Cards) Domain Controllers Admin Workstations SCOM Gateway Monitoring (SCOM) Certificate Authority WSUS Red Forest Domain Controllers Secure Vault Break-glass Account Red Forest Admins

Apps and Data Pillar Phase 2: Apps and Data 9/10/2018 3:22 PM Apps and Data Pillar Phase 2: Apps and Data Aligns security investments to business priorities and applies both security fundamentals and modern protections Major App and Data Challenges Business critical data is challenging to track and protect against determined adversaries Data and App security dependent on identity, device, and infrastructure security Limited IT visibility and protection for data leaving corporate networks (in both sanctioned and unsanctioned cloud applications) Challenging to classify all data and apps High architectural debt from legacy applications Challenging regulatory mandates Update Strategy and Policy Discover corporate data in sanctioned and unsanctioned cloud apps Identify and Assess High Value Applications and Data Enforce policy on data stored on corporate and personal devices Protect against device loss and device compromise Update Strategy and Policy Develop strategy for protecting cloud and on-premises assets prioritized using business alignment and current threat intelligence Create written policy and configure technical enforcement mechanisms © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Infrastructure Pillar 9/10/2018 3:22 PM Infrastructure Pillar Phase 2: Infrastructure Operates on modern platform and uses cloud intelligence to detect and remediate both vulnerabilities and attacks Infrastructure Challenges Business critical data is challenging to track and protect against determined adversaries Data and App security dependent on identity, device, and infrastructure security Limited IT visibility and protection for data leaving corporate networks (in both sanctioned and unsanctioned cloud applications) Challenging to classify all data and apps High architectural debt from legacy applications Challenging regulatory mandates Security Integrate Cloud Infrastructure and Capabilities Updating your policies, skills, and controls for cloud infrastructure Rapidly see and correct security hygiene issues Integrate Advanced Infrastructure Defenses Expert Threat Detection Analysts monitoring your systems, alerting you, answering questions, and reporting on risk and vulnerability. Critical attack defenses and monitoring for infrastructure and admins Hardware-level boot integrity for on premises infrastructure Advanced isolation for critical assets hosted on virtual machines © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Devices Pillar Phase 2: Devices Device Challenges 9/10/2018 3:22 PM Devices Pillar Phase 2: Devices Accesses assets from trusted devices with hardware security assurances, great user experience, and advanced threat detection Device Challenges Devices are frequently targeted and challenging to defend Devices are frequently first stage of major attacks Data and app security relies on device integrity Advanced attackers requires advanced detection, response, and containment Post Breach attack detection and remediation Cloud based detection of known threat actors and real time threat intelligence Behavioral based indicators of attacks for new or unknown threat actors Expert threat detection analysts monitoring your systems, alerting you, answering questions, and reporting on risk and vulnerability. Advanced Device Protection Deploy hardware rooted code integrity for devices and data on them Configure hardware protection for credentials and application apps Advanced biometrics to simplify strong user authentication Visibility into configuration across multiple device platforms © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Securing Devices Roadmap Make more users standard users Modernize OS and software Robust response to compromise Whitelist software Harden OS image / policies Blacklist user writable areas Harden software Securing Devices Roadmap

9/10/2018 Security @ Microsoft What we deliver to customers Protecting Microsoft assets, IP, and customer data Protect/Detect/Respond Go to Market Engineering Systems Code Quality (SDL) Service Quality (OSA) Certifications Privacy Policy Supplier Management/ Supply Chain Partnerships Cloud Service Offerings On Premise Product Consulting Services Physical Security Network Security Identity Management Vulnerability Analysis Logging/Monitoring Anti-Virus, Host, and Application Security Incident Response Threat Intelligence and Compliance Governance, Risk Guidance Ensuring trusted platforms Security @ Microsoft Protect Make enterprise, products, services hard to attack successfully Detect Collect, analyze and disseminate information Respond When attacks succeed, remove the attacker and restore normal business operations © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.