Determined Human Adversaries: Mitigations

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
Advertisements

© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
4/14/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
{ Best Practice Why reinvent the wheel?.   Domain controllers   Member servers   Client computers   User accounts   Group accounts   OUs 
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
Incident Response Updated 03/20/2015
Website Hardening HUIT IT Security | Sep
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Storage Security and Management: Security Framework
Tim Vander Kooi Systems
E-Security: 10 Steps to Protect Your School’s Network NEN – the education network.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Troubleshooting Windows Vista Security Chapter 4.
Module 7: Fundamentals of Administering Windows Server 2008.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
Lecture 19 Page 1 CS 236 Online 16. Account Monitoring and Control Why it’s important: –Inactive accounts are often attacker’s path into your system –Nobody’s.
ITS – Identity Services ONEForest Security Jake DeSantis Keith Brautigam
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Core 3: Communication Systems. Network software includes the Network Operating Software (NOS) and also network based applications such as those running.
If a bad guy can alter the operating system on your computer, it's not your computer anymore A bad guy could have altered the operating system on EVERY.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
Module 7: Designing Security for Accounts and Services.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Chapter Objectives In this chapter, you will learn:
Office 365 is cloud-based productivity, hosted by Microsoft.
Tactic 1: Adopt Least Privilege
Cybersecurity - What’s Next? June 2017
Secure Modern Enterprise
Working at a Small-to-Medium Business or ISP – Chapter 8
Critical Security Controls
Maintaining Windows Server 2008 File Services
5/31/2018 3:40 PM BRK3113 How Microsoft IT builds Privileged Access Workstation using Windows 10 and Windows Server 2016 Jian (Jane) Yan Sr. Program Manager.
CompTIA Server+ Certification (Exam SK0-004)
2016 Citrix presentation.
Lesson Objectives Aims You should be able to:
Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts.
I have many checklists: how do I get started with cyber security?
Determined Human Adversaries: Mitigations
Capitalize on modern technology
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Local Administrator Rights
Lesson 16-Windows NT Security Issues
After the Cyber Attack A Framework for Compromise Recovery
Administering Your Network
12 STEPS TO A GDPR AWARE NETWORK
Contact Center Security Strategies
Information Security Awareness
Bethesda Cybersecurity Club
IS4680 Security Auditing for Compliance
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
16. Account Monitoring and Control
Designing IIS Security (IIS – Internet Information Service)
Test 3 review FTP & Cybersecurity
G061 - Network Security.
Pass-the-Hash.
6. Application Software Security
Cloud Computing for Wireless Networks
Presentation transcript:

Determined Human Adversaries: Mitigations Neil Carpenter Principal Security Escalation Engineer Global Incident Response & Recovery Jim Payne Principal Security Relationship Manager Microsoft CSS Security

Preference Information is based on extensive experience by the CSS Security & Global Incident Response & Recovery teams working with customers who experienced a directed attack In no way is this information to imply or insinuate that there is direct knowledge of what will occur, if anything.

Ideological Movements Attackers & Attacks Economic Espionage Military Espionage Cyber Crime Ideological Movements Organized Crime Nation States

Cyber Security Attacks

Commonly Reported Distributed Denial of Service attack Web Defacement Determined Human Adversary / Directed Attack

Denial of Service Mitigate the impact (usually with hardware for example, and usually in conjunction with your Internet provider) Use a CDN to scale out Move key properties to a more resilient platform example - the cloud scenario Customers should be ready with a strategy for handling a DDoS before it happens; otherwise, it’s a lot of downtime and a lot of panic.

Web Defacement Develop secure code. SDL, SDL, SDL. Likely the website is already deployed, it’s quite likely that SDL was not utilized to develop secure code.  Make sure that everything is up to date – not just the OS, but any deployed frameworks & applications.  Compromises via 3rd party frameworks, such as ColdFusion, have been common lately. Ensure that you are gathering the right data in case something does happen.           IIS logs – We see far too many customers who turn off IIS logging or disable key fields to save disk space.  Disks are cheap, security compromises are not.  If you’re using a reverse proxy, pass the real source IP addr to the IIS server and/or maintain easily accessible proxy logs with all the needed info. Have a plan if something happens Gather data before deleting/restoring content. Preferably, plan to involve Microsoft CSS Sec as soon as possible

Mitigations For Directed Attacks

Overview of a Directed Attack Attackers exploit a weakness to compromise a host (the initial attack vector), then: Install malware for persistence and automate their tasks Elevate their privileges Mine for useful credentials Exfiltrate or delete data

Initial Attack Vector Mitigation: Patching critical vulnerabilities is key.  This needs to be done for all products – Microsoft infrastructure such as System Center Configuration Manager & WSUS can apply updates to Microsoft products but they do not cover 3rd party products, unless that 3rd Party has published a manifest. User Education – Cannot place enough emphasis

Install Malware Mitigation: Monitor your anti-virus/anti-malware solution carefully. Ensure it is running on all machines in the environment Signatures are kept up-to-date Use an application whitelisting approach such as AppLocker to help prevent the introduction of unwanted software.

Elevate Privileges Mitigation: Users should not run as local admin on workstations.  Domain admins should never logon to workstations or member servers in the domain. Use a group policy to remove the Logon Locally rights for domain administrators from all machines except for domain controllers. Use hardened workstation to perform necessary administrative tasks

Mine for Useful Credentials Mitigation: Use unique passwords for the local administrator account on every host in your enterprise. Better yet, disable this account entirely and monitor for attempted usage of it. Limit service account privilege and monitor usage of these accounts. Never run a service account as domain administrator or other privileged accounts. Service accounts should have least privilege (no logon locally or logon via network, for example). Where possible, use LocalService and NetworkService accounts instead of LocalSystem

Copy or delete data Mitigation: Define business critical data and apply extra protections to that data in transit and in storage. Implement a data classification scheme and introduce a policy so that all high business impact data is stored centrally and .. Encrypt it at rest using rights management services Segregate access to the data from domain administrators Use IPsec to prevent network capture across the network Back it up frequently; test restores; keep an offsite backup

Defender’s Dilemma Patching Limited Users Domain Admins Logon To DCs Only Application Control Monitor & Respond To Anti-Malware Protect Local Admin Limit Service Privilege Protect Data

Questions? Defender’s Dilemma The defender must protect against everything. The attacker only has to succeed with one. Neil Carpenter Principal Security Escalation Engineer neilcar@Microsoft.com Jim Payne Principal Security Relationship Manager jpayne@Microsoft.com