Northwestern University Network Security

Slides:



Advertisements
Similar presentations
Agenda What is Compliance? Risk and Compliance Management
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Chapter 10 Accounting Information Systems and Internal Controls
JEFF WILLIAMS INFORMATION SECURITY OFFICER CALIFORNIA STATE UNIVERSITY, SACRAMENTO Payment Card Industry Data Security Standard (PCI DSS) Compliance.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
I NDULGENC E There is no need for oversight or management direction. All staff members are superstars and act in the best interest of the company.
Security Controls – What Works
The State of Security Management By Jim Reavis January 2003.
Enterprise security How to bring security transparency into your organization ISSA EDUCATIONAL SESSION Nicklaus Schleicher, VP Support & Customer Service.
Security Policy. Topics for Discussion IT Security in the Business – Risk, Audit Support, Compliance Policies, Standards, and Procedures – IT Security’s.
Rethinking Security to Enable Business LJ Johnson Nike’s Global Information Security Officer August 16, 2005.
Security Governance Technology Executive Club
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
Information Technology Audit
Skybox® Security Solutions for Symantec CCS Comprehensive IT Governance Risk and Access Compliance Management Skybox Security's.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Information Security Governance 25 th June 2007 Gordon Micallef Vice President – ISACA MALTA CHAPTER.
Financial Advisory & Litigation Consulting Services Risk Management 2006 September 14-15, 2006 The Metropolitan Club, New York, NY Workshop B: Information.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
SEC835 Database and Web application security Information Security Architecture.
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
Lessons Learned in Smart Grid Cyber Security
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Security Standards and Threat Evaluation. Main Topic of Discussion  Methodologies  Standards  Frameworks  Measuring threats –Threat evaluation –Certification.
Information Technology Security: Fitting Into the Big Picture.
The Infrastructure Optimization Journey Kamel Abu Ayash Microsoft Corporation.
Holistic Approach to Security
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
MA. EXPORT CENTER COMPLIANCE EXPORT EXPO Presented by : Paul Divecchio –DiVecchio & Associates Phone: (617) , Fax: (508)
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
Develop your Legal Practice using “Cloud” applications, but … Make sure your data is safe! Tuesday 17 November 2015 The Law Society, London Allan Carton,
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
Information Security Framework Regulatory Compliance and Reporting Auditing and Validation Metrics Definition and Collection Reporting (management, regulatory,
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
CYBER SECURITY & ITS IMPACT ON FINANCIAL STATEMENTS AUDITS BOB WAGNER TUESDAY, NOVEMBER FLORIDA SCHOOL FINANCE OFFICERS ASSOCIATION CONFERENCE.
IS3220 Information Technology Infrastructure Security
GRC: Aligning Policy, Risk and Compliance
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
OIT Security Operations
Information Security Program
The Cybersecurity Framework
Cybersecurity - What’s Next? June 2017
EITS Planning & Decision Support
Leverage What’s Out There
Information Security: Risk Management or Business Enablement?
I have many checklists: how do I get started with cyber security?
Making Information Security Manageable with GRC
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Security Metrics That Don’t Suck
Compliance in the Cloud
Cyber Security in a Risk Management Framework
KEY INITIATIVE Internal Control and Technical Accounting
Presentation transcript:

Northwestern University Network Security Policy & Security Automation: Metrics and Big Data Presented by Brandon Hoffman

Topics for Discussion What do you want to talk about? IT Security in the Business Policies, Standards, and Procedures Security Reality and Automation Measurement and Metrics in Security

The CISO Agenda Top-Line Growth Manage Risk Align/Optimize Spend Business Managing 3rd Party Risk (Outsourcers) Culture / Awareness Executive / Board Reporting M&A Metrics / Benchmarking Privacy / Security Breach Business Continuity Strategy Brand Protection & Enhancement Alignment with Business Goals / Objectives High Availability Disaster Recovery Regulatory Compliance CISO Technology Enablement Identity Management Linkage to Enterprise Risk Mgmt Mobile Computing Top-Line Growth Compliance / Internal Audit Evolving Threats Manage Risk Vulnerability / Patch Management Staffing Support Align/Optimize Spend Core Functions

Risk IT Security performs a critical role in assessing risk in the organization. Vulnerability Scanning Penetration Testing Industry Trends IT Strategy Familiarity/Participation with Audit and Compliance measures

Audit Support In many cases, IT Security is heavily relied upon to perform in depth testing required by an audit organization. Security is enlisted by audit because: Technical expertise Familiarity with current issues from internal testing Familiarity with Policies, Standards, and Procedures

Compliance Compliance may relate to internal compliance or external compliance. Internal compliance: Policies and Standards Security and Configuration baselines Framework use – ISO, COBIT, ITIL, GAISP, NIST Best Practices

Compliance cont’d External compliance: SOX (Sarbanes Oxley) HIPAA PCI COSO Framework HIPAA PCI Safe Harbor

ISO Leading Practices Source: www.rsa.com

Compliance in Action Source: www.rsa.com

Internal Policy IT Security is regularly tasked with creation and enforcement of IT policies, standards, and procedures. Creation and enforcement of these documents require: Understanding of audit roles and procedures Familiarity with all systems, networks, and applications Compliance considerations

Internal Policy cont’d Definitions: A Policy is a set of directional statements and requirements aiming to protect corporate values, assets and intelligence. Policies serve as the foundation for related standards, procedures and guidelines. A Standard is a set of practices and benchmarks employed to comply with the requirements set forth in policies. A standard should always be a derivation of a policy, as it is the second step in the process of a company’s policy propagation. A Procedure is a set of step-by-step instructions for implementing policy requirements and executing standard practices.

Internal Policy cont’d

Internal Policy cont’d Policy creation and enforcement cycle

Policy Business Case A top 5 global food retailer has a massive IT/IS infrastructure and good governance….but no real policies! Policies are the foundation for enforcing IT compliance and governance. What policies were written for the client…

Policy Business Case cont’d Policies written for IT Security: Acceptable Use Policy Information Classification & Ownership Policy Risk Assessment & Mitigation Policy Access Control Policy Network Configuration and Communication Policy Remote Access Policy Business Continuity Policy Incident Response Policy Third Party Data Sharing Policy System Implementation & Maintenance Secure Application Development Cryptography & Key Management Mobile Computing Physical & Environmental Security

Policy Business Case cont’d Sample Policy

Translation to the Real World Security policy can be written but is it applied??

The reality of IT security 90% of Companies say they have been breached in the last 12 months* Billions of $$$ in IT security spending

Why can’t we stop them? Verizon has studied recent breaches 92% of attacks were not highly difficult 96% of attacks could have been avoided Better yet, they found it just takes “consistent application of simple or intermediate controls” How can that be? Is this really what the verizon DBIR says? Weren’t the majority of records stolen achieved using advanced techniques?

The paradox Let’s review: Bad guys are getting in We’re spending billions Simple controls work What’s going wrong?

Complexity is the enemy Verizon said “consistent” controls In real networks, that’s hard Complexity defeats us Humans don’t handle complexity well We set policy well Human effort just doesn’t scale Too many details Too many interactions Just how complex are real world infrastructures?

Here’s one real corporate network

Zooming in a bit…

Here’s one “doorway” into the network

One small typo created a problem One device with a single letter typo here

Where can you go from here?

Implications of simple typo Technical details: ACL as written: ip access-list extended ACL-S61-534 permit ip any <8 servers> permit ip any <8 more servers> permit ip any host <1 server> permit ip any host <1 more server> ACL as applied: interface serial 6/1.534   description Link To <outsiders>   ip access-group ACL-61-534 in The access group lacks an S! In English: Good security rule, applied badly Hard for a human to spot Expected access: extremely limited Actual access: wide open to a competitor/partner

Casualties of complexity abound Financial Services Before Automation: Brand new data center, emphasis on increased security With Automation: Found error in 1 firewall of 8 that destroyed segmentation Retail Before Automation: Believed they had enterprise-wide scan coverage With Automation: Identified major gap – firewall blocked scanning of DMZ Bank Before Automation: Built segmentation between development and 401(k) zones With Automation: Found addresses added to development had full 401(k) access

The data challenge in security We’ve got data Lots of it Making sense of it is hard Skills shortage Sheer scale Data mountains need data mountaineers

Big Data – hype vs reality

Borrowing other kids’ toys Big Data works for business analytics Why can’t we just use their tools? They look for trends – we care about outliers Response: can’t we just subtract the trend? That gets you the noise

Solution: Security Metrics Security is the absence of something Can’t report how often you were NOT on the cover of WSJ

Don’t Measure Busy-ness Many people start with process counting These measure busyness Not business How do you show gains? Just get busier?

Develop Management Metrics Metrics close the control loop Ops has availability Security needs risk Focus on outcomes How easily could a breach occur? How effective is our spend? Are we making it harder to break in? Availability Operations Risk Security

Resources Required Assets you need to protect Everyone has some examples PII, regulatory assets, IP, etc Some truly “mission critical” Financial, energy, government, military Knowledge of vulnerabilities Bad guys exploit them, so you scan Counter-measures It starts with the firewall

Be PROACTIVE We want to know our defensive posture That involves finding the weak points Attack a model of the network Measure ease of compromise Use standards where possible

What now? Build the Security War Room CORRELATE DATA FEEDS DASHBOARDS MODEL EVERYTHING

HOW? Start with your infrastructure See it Understand it Test it Improve it Automate Don’t just map – run war-games

Four major gears Measure Risk Test Elements Test System Gather & Map

Gather & Map Test Elements Test System Measure Risk You cant manage what you can’t see: Visualize your network Validate configuration stores Test Elements Test elements individually and automate it: Configuration hardening Analyze access granted through elements as islands Test System Test elements interacting: Understand end to end access Analyze vulnerability locations and exposure Build and measure POLICY compliance Measure Risk Automate and report on findings: Measure attack risk holistically (attack vectors) Measure POLICY compliance across all systems Report into metrics that matter (trends, outliers)

Outbound Proof How easily can attackers get in? How big is my attack surface? How much is non-compliant?

Dashboards for Internal Are investments working? Where do we need to improve?

The need for proactive security intelligence Security has to reinvent Big Data “Pile it up and hope” won’t work Humans need machines to help: Continuously assess defenses Correlate data Visualize the the battlefield Show the state of your network security Demonstrate compliance with network security policy Identify gaps and prioritize remediation based on risk  

Metrics Conclusions Defensive posture CAN be measured This drives to better outcomes Measure posture => improved posture It helps the CFO “get it” You can sleep better Demonstrate effectiveness, not busyness

Recap True security is about People, Process, and Technology Application of simple controls (policy) is required for compliance AND success Security is a “Big Data” problem Without automation to reduce complexity, security remains a dream Without effective metrics, security will never get the exposure or support needed from the top down