Shifting from “Incident” to “Continuous” Response

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Advertisements

© 2013 Bradford Networks. All rights reserved. Rapid Threat Response From 7 Days to 7 Seconds.
Security Life Cycle for Advanced Threats
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
Supplied on \web site. on January 10 th, 2008 Customer Security Management Reducing Internet fraud June 1 st, 2008 eSAC Walk Thru © Copyright Prevx Limited.
©2014 Bit9. All Rights Reserved The Evolution of Endpoint Security: Detecting and Responding to Malware Across the Kill Chain Chris Berninger, Sr. Solutions.
The Most Analytical and Comprehensive Defense Network in a Box.
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
Microsoft Ignite /16/2017 4:54 PM
Intrusion Detection Systems and Practices
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
IBM Security Network Protection (XGS)
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM Security Network Protection (XGS) Advanced Threat Protection Integration Framework.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
The Most Analytical and Comprehensive Defense Network in a Box.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
Computer Forensics in Practice Armed Forces of the Slovak Republic mjr. Ing. Albert VAJÁNYI 1Lt. Ing. Boris ZEMEK (c) May 2005.
Ali Alhamdan, PhD National Information Center Ministry of Interior
Network security Product Group 2 McAfee Network Security Platform.
Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.
Marin Frankovic Datacenter TSP
1© Copyright 2014 EMC Corporation. All rights reserved. Applying the Power of Data Analytics to Cyber Security Dr. Robert W. Griffin Chief Security Architect.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
Role Of Network IDS in Network Perimeter Defense.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Why SIEM – Why Security Intelligence??
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Kevin Watson and Ammar Ammar IT Asset Visibility.
Blue Coat Cloud Continuum
Nuts and Bolts of ATA Chris Lloyd 2016 Redmond Summit | Identity Without Boundaries May 24, 2016 Senior Architect
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
HIPS. Host-Based Intrusion Prevention Systems  One of the major benefits to HIPS technology is the ability to identify and stop known and unknown attacks,
Proactive Incident Response
SIEM Rotem Mesika System security engineering
Your Partner for Superior Cybersecurity
IoT Security Part 2, The Malware
OIT Security Operations
CompTIA Security+ Study Guide (SY0-401)
Vice President of Products and Global Marketing, RiskSense, Inc.
Internal Security Threats
Critical Security Controls
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Hybrid Management and Security
Integrated Cyber October 16-17, 2017
Introduction to a Security Intelligence Maturity Model
Faizel Lakhani | President & COO
Intelligence Driven Defense, The Next Generation SOC
Active Cyber Security, OnDemand
Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009
Jon Peppler, Menlo Security Channels
CompTIA Security+ Study Guide (SY0-401)
Implementing and Auditing the Critical Controls
Securing Your Digital Transformation
Healthcare Cloud Security Stack for Microsoft Azure
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Software-Defined Secure Networks in Action
Panda Adaptive Defense Platform and Services
Chapter 4: Protecting the Organization
Healthcare Cloud Security Stack for Microsoft Azure
Coordinated Security Response
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
Healthcare Cloud Security Stack for Microsoft Azure
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Cybriant Partner Partner Program White Label Materials
Presentation transcript:

Shifting from “Incident” to “Continuous” Response By: Bill White CISSP, CISA, CRISC State Farm – Information Security Architecture @riskofinfosec

Internal Reconnaissance Privileged Operations Weaponization Delivery Exploitation Installation Command & Control (C2) Internal Reconnaissance Privileged Operations Internal Pivot Maintain Presence Mission Objectives Incident Response: An organized approach to addressing and managing the aftermath of a security breach or attack (also known as an incident). The goal is to handle the situation in a way that limits damage and reduces recovery time and costs. How? Kill the attacker as early as possible in the Cyber Attack Lifecycle

Internal Reconnaissance Privileged Operations Weaponization Delivery Exploitation Installation Command & Control (C2) Internal Reconnaissance Privileged Operations Internal Pivot Maintain Presence Mission Objectives Incident Response: An organized approach to addressing and managing the aftermath of a security breach or attack (also known as an incident). The goal is to handle the situation in a way that limits damage and reduces recovery time and costs. No, Really, How? Really! Find them and stop them! Take the knowledge you just gained and watch for that to happen again. AGGREGATION of intelligence is the key!

Internal Reconnaissance Privileged Operations Weaponization Delivery Exploitation Installation Command & Control (C2) Internal Reconnaissance Privileged Operations Internal Pivot Maintain Presence Mission Objectives This IP address has been scanning the perimeter A new exploit is identified in the wild A email was delivered with a file attachment Application error on workstation Powershell execution or new executable Anomalous DNS traffic detected

The core of the next-generation security protection process will be continuous, pervasive monitoring and visibility that is constantly analyzed for indications of compromise. “Designing an Adaptive Security Architecture for Protection from Advanced Attacks,” by Neil MacDonald and Peter Firstbrook, 12 February 2014, refreshed 28 January 2016, ID G00259490, https://www.gartner.com/doc/2665515/designing-adaptive-security- architecture-protection

Security Monitoring will encompass as many layers of the IT stack as possible including network activity, endpoints, system interactions, application transactions and user activity. The design and benefit of joining the foundational elements of intelligence, context, and correlation with an adaptive architecture will be explored.

This presentation will provide security related scenarios where centralized security data analytics and adaptive security architecture are used to respond in a dynamic way to enable this next generation security protection.

We will look behind the curtain of "marketecture" to the real and aspirational solutions for a SOC that will likely materialize as vendor products mature over the next few years.

What makes up the next generation of security protection? “Integrated Adaptive Cyber Defense (IACD) Baseline Reference Architecture”, Johns Hopkins Applied Physics Laboratory https://secwww.jhuapl.edu/IACD/Resources/Architecture/IACD%20Baseline%20Reference%20Architecture%20-%20Final%20PR.pdf

The first step occurs when the Sensor/Control Interface receives notification of a Security Event from enterprise sensors. Based on enterprise-defined policies and processes, the Policy Engine will determine that either the security event requires further action or it does not. If further action is required, it will pass the security event information to the Enrichment/ Analytic Framework as an alert. Otherwise, it will simply log the security event. Aggregation Analytics

Enrichment and Analytic Framework receives an alert, it will perform any number of operations (i.e. a particular analytic workflow) to enrich the alert information. Based on the enriched information and enterprise policies and processes, the Analytic Framework will determine whether further action is required or not. If further action is required, it will pass the enriched information as an action alert to the Decision-Making Engine. If no further action is required, it will simply log its activities. Aggregation Decision

Decision-Making Engine will determine what Course of Action (COA) is appropriate For example, a selected COA might block all traffic from a specific internet address or quarantine a specific host system. It is possible that enterprise policies and processes require the notification and involvement of a human decision maker. It is also possible that no enterprise COA exists for a given action alert and the Decision-Making Engine may simply initiate a manual workflow via SOC. Once a COA is selected, the Decision-Making Engine will pass the selected COA(s) to the Response Engine.

The Response/Action Engine translates the COA into a machine translatable execution workflow, which it sends to the Sensor interface. Upon receipt of an execution workflow, the Sensor Interface translates the workflow into device-specific response actions that it sends to the appropriate enterprise sensors and controls.

An Basic Example Policy: Is the laptop in the authorized asset inventory? Is the laptop configured and patched to standards? Analytics: Retrieve asset history from CMDB or ARM Retrieve vulnerability information on this asset from VM Decision: Allow DHCP to complete Move the asset to the remediation network for mitigation Action: Do or do not. There is no try.

Another Basic Example Policy: High Risk User? High Risk Geo? Prior Authentication Risk? New Asset? Analytics: Retrieve credential memberships Retrieve IP history Retrieve authentication history Retrieve asset information Decision: Allow, Step Up Authentication, Send to remediation network

A Mature Example Policy: Approved executable? Normal? Privileged? Analytics: Retrieve asset inventory Retrieve executable history Retrieve user/action history Decision: Run the executable in sandbox Send Executable to malware analytics Enable full packet capture Step up authentication

“Continuous Response” Intelligence Driven Adaptive Security Architecture Time to mature Focus on addressing specific use cases while building the engines Leverage automation and orchestration Fail CLOSED! (throw unknowns back to humans for analysis and decision) Advantages Detect, Respond, Recover at machine speed Free up analysts to address complex incidents Focus on gathering intelligence to feed analytics Stop being reactive! Change from “Incident Response” to “Continuous Response”

QUESTIONS? Shifting from “Incident” to “Continuous” Response By: Bill White CISSP, CISA, CRISC State Farm – Information Security Architecture @riskofinfosec