Beyond the Fortress Network

Slides:



Advertisements
Similar presentations
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Advertisements

FND2851. Mobile First | Cloud First Sixty-one percent of workers mix personal and work tasks on their devices* >Seventy-five percent of network intrusions.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Microsoft 365 Security and Compliance: Training and Resources
The time to address enterprise mobility is now
Deployment Planning Services
3 Do you monitor for unauthorized intrusion activity?
Deployment Planning Services
Do you know who your employees are sharing their credentials with
Common Methods Used to Commit Computer Crimes
Identity & Access Management for a cloud-first, mobile-first world
Deployment Planning Services
Accelerate GDPR compliance with Microsoft 365
Hybrid Management and Security
Microsoft Operations Management Suite Insight and Analytics
Journey to Microsoft Secure Cloud
Azure Information Protection Strategy and Roadmap
6/10/2018 5:07 PM THR2218 Deploying Windows Defender AV and more with Intune and Configuration Manager Amitai Senior Program Manager,
Deployment Planning Services
SaaS Application Deep Dive
Microsoft /20/2018 9:26 AM BRK1037 Win the IT security battle: automate password changes, privileged access & Minimize Cyber Losses Christopher.
6/25/ :13 PM BRK1076 Make Windows devices more secure by taking them out of your existing infrastructure Chris Rhodes & Andrew Bettany MCTs & MVPs.
Microsoft Virtual Academy
Protect sensitive information with Office 365 DLP
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
The Information Protection Problem
Threat Management Gateway
9/5/2018 8:22 PM The Microsoft information protection strategy across EMS, Office 365, and Windows © 2014 Microsoft Corporation. All rights reserved.
The utility belt for managing security and compliance in Office 365
9/14/2018 2:22 AM THR2026 Set up secure and efficient collaboration for your organization with Office 365 Joe Davies Senior Content Developer Brenda Carter.
Office 365 with confidence: security features for Office 365
Forensics Week 11.
Microsoft Intune MAM without Device Enrollment
Security for your digital transformation
Prevent Costly Data Leaks from Microsoft Office 365
Cybersecurity Awareness
BRK3277 Making the best of the cloud: How Exchange Online is different from Exchange on-premises Tony
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Protect your OneDrive and SharePoint files on mobile devices
Securely run and grow your business with Microsoft 365 Business
Which is right for your business, Office 365 or Microsoft 365?
11/15/2018 3:42 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Access and Information Protection Product Overview October 2013
Which is right for your business, Office 365 or Microsoft 365?
David J. Carter, CISO Commonwealth Office of Technology
12/5/2018 2:50 AM How to secure your front door with real-time risk assessments of your logons Jan Ketil Skanke COO and Principal Cloud Architect CloudWay.
Microsoft Virtual Academy
Everything Windows User Group Meeting, Aug 2016
Secure once, run anywhere Simplify your security with Sophos
Implementing Client Security on Windows 2000 and Windows XP Level 150
Microsoft Ignite /18/2019 7:21 AM
Security Hardening through Awareness August 2018
IN THE PAST, THE FIREWALL WAS THE SECURITY PERIMETER devicesdata users apps On-premises.
Protecting your data with Azure AD
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
4/9/2019 5:05 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS.
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Anyshare solution.
Information Protection
Microsoft Data Insights Summit
Microsoft 365 Business Technical Fundamentals Series
6. Application Software Security
Microsoft Data Insights Summit
Nuts and bolts of Microsoft 365 Business Level 200
Information Protection
Cybersecurity Simplified: Phishing
Cybersecurity Simplified: Ransomware
Presentation transcript:

Beyond the Fortress Network   David C. Broussard Principal Consultant @dbroussa Blogs.catapultsystems.com/dbroussard

Who am I? Principal Consultant and O365 Evangelist Been in IT since 1990, SharePoint since 2003, and Catapult since 2007

The Fortress Network Deny Access to data Build defense in depth to prevent malicious access Control access through highly secured gateways Once inside, free to move about the fortress and manipulate data with substantially less security Hard to get into for normal users Focused on access to data as opposed to securing the data itself Deny malicious users from accessing data except from inside of our secure network The cloud is seen as insecure primarily because we (IT) no longer can restrict access to the information Or can we? However, even the Fortress Network didn’t work completely What about email? Didn’t we lose control of that document once we hit send?

Security in the old mindset More layers is better (Firewalls, Network Segments, VPNS, etc.) Defense in Depth Inside the network the Trusted Professional concept is used Security is more important than user ability to accomplish their jobs Build high walls around our data Firewalls Network segments VPNs NTFS permissions Build deep defense in depth DMZs Detonation Chambers Pre-scan incoming requests (honey traps, URL scans) Malware protection Malicious link detection Spam and virus software on desktops and servers Interior security was much less strenuous Virus scans Malware But assumption was if you had access you could do anything This Photo by Unknown Author is licensed under CC BY-NC

What are we concerned about again? Prevent data from leaving our organization Prevent our systems from being compromised so that our team can work What about our employees getting their jobs done? What about not making their jobs harder?

We’re concerned about these: 9/17/2018 4:38 AM We’re concerned about these: People are busy, getting their job done is top-of-mind There is one person in every organization who will click on anything © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Did it work? ~70-80% of data breaches happened from inside of the network How does this happen, we built a Fortress for our data? Two types of breaches Malicious external actor Malicious internal actor

Bad EXTERNAL actor Requirements Result Have something of value that someone else wants Bad actor outside of your org Ability to get to your data Ability to appear to be someone who can get to your data Ability to trick employee into giving them access to your data Result Plethora of data breaches…not because of bad network security, but because employee gave up identity or access

Story Time Hollywood celebrities photo hack Result Something of value (private photos) Bad actor (duh) Data stored in Cloud (Azure & AWS) – Cloud security blocks bad actor access Ability to pretend to be employee (Apple iCloud doesn’t stop allowing password guesses after repeated attempts) Result Lots of celebrities have leaked photos Apple fixes iCloud vulnerability

Story Time 2 Sony Data Breach Result Something of value (Movies, Internal commo, etc.) External bad actor (duh) Data Stored in hybrid environment (Fortress blocks) Ability to access data (strong authentication prevents) Ability to trick employee into allowing access (Malware/Phishing attack) Result Bad actors exfiltrate hundreds of TB of data without anyone knowing Eventually blackmail Sony about The Interview Exposes internal conduct of Sony that they would have preferred to keep internal (salaries, comments about talent, etc)

Malicious INTERNAL Actor Requirements Have something of value that someone else wants Bad actor inside of your org Ability to get to your data (they need to do their job) Ability to get data outside of org (also known as Internet access, thumb drives, email, and physical access to the network) Result Data walks out of organization, usually without your knowledge Sometimes audits will show where it came from, but the damage is done

Story Time 3 The upset employee Result Something of value (list of executive pay over time, company announces reduction in employee pay but not for executives) Bad actor (oh yeah) Ability to get to data (at least one employee with access to the spreadsheet had access) Ability to exfiltrate (email to local newspaper) Result Company looks bad to employees and community

Story Time 4 The enterprising Account Exec Result Something of value (list of customers, contracts, terms, dates) Bad actor (duh) Has access to CRM/ERP and call pull all data and export to Excel Emails workbook to self Leaves to work for competitor Result Loss of market share Loss of customer confidence

Core questions about security Do we know who is accessing our data? Can we grant access in real time…based on risk? Can we protect our data even when its NOT in our network? What tools do we have to find and react to a breach? Do our users love their security experience?

Identity & access management Threat protection Information protection 9/17/2018 4:38 AM Identity & access management Threat protection Information protection Security management Protect users’ identities & control access to valuable resources based on user risk level Protect against advanced threats and recover quickly when attacked Ensure documents and emails are seen only by authorized people Gain visibility and control over security tools Azure Information Protection Office 365 Data Loss Prevention Windows Information Protection Microsoft Cloud App Security Office 365 Advanced Security Mgmt. Microsoft Intune Advanced Threat Analytics Windows Defender Advanced Threat Protection Office 365 Advanced Threat Protection Office 365 Threat Intelligence Azure Active Directory Conditional Access Windows Hello Windows Credential Guard Azure Security Center Office 365 Security Center Windows Defender Security Center © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Password/Hash Dumping EXPLOITATION DELIVERY COMMAND AND CONTROL Password/Hash Dumping 3 Threat Actor gather credentials on compromised machine Employee A opens infected email on workstation 2 A Malware 4 Threat Actors move laterally within network using compromised credentials Compromised Credential Threat Actor targets employees via phishing campaign 1 Phishing 5 Threat Actors use compromised devices/accounts to exfiltrate PII 48 Hours 200+ Days PII Leak/Exfiltrate Data Credentials harvested after Employee attempts login to bogus site 2 Infected phone disables Antivirus; and compromised credentials used to access Email service 3 Control Evasion Employee B opens infected email using mobile device 2 B Malware 3 Compromised credentials used to access service ACTIONS ON OBJECTIVE

Mobile Device Management Intune Basic version is part of O365 Extended version is part of EM-S Allows admins to register devices, remote wipe, set policies, control leakage Works on iOS, Android, Windows, MacOS (in preview)

Risk Based Access Use Azure AD (Premium) to control access to your resources Use Multi-Factor Authentication to ensure that user is who they say they are EM-S allows for Risk assessments of logins and automatic MFA or Denial based on risk, location, application

Data Loss Prevention and Encryption DLP and Azure Information Protection both offer tools to secure your information Use “sensitive information types” to identify documents and emails that should not leave the organization or that should be encrypted AIP can be used to revoke rights to an email or document even after it has left the organization

Threat Detection and Prevention EM-S provides a suite of tools to detect and prevent threats Advanced Threat Protection - Stop malicious links and attachments before users click on them Azure AD Identity Protection – Monitor users accounts that may be for sale on the Deep/Dark Web and elevate their risk Cloud App Security – Provide risk analysis and discovery of who is using what 3rd Party Apps in your organization Advanced Threat Analytics – Tools to monitor threats to your organization in real time using Microsoft’s entire cloud infrastructure as a data source

Tools that you didn’t know you had Audit Logs Alerts Compliance Search Supervisory Search Dashboards Secure Score

Learn More http://get.catapultsystems.com/0365-business-registration http://get.catapultsystems.com/0365-bootcamp-registration-it-track/ @CloudWhisperers