Presentation is loading. Please wait.

Presentation is loading. Please wait.

The Assumed Breach Model

Similar presentations


Presentation on theme: "The Assumed Breach Model"— Presentation transcript:

1

2 The Assumed Breach Model
A Practical Approach

3 Manager – Security Architecture
Heavily focused on Cloud/AWS Experience includes moving from End User Support, to Sys Admin, to Consulting, to Information Security to Security Architecture

4 Agenda Current Landscape Strategy Next Steps

5 Current Security Landscape
Checking Boxes We play whack-a-mole with security controls and tools

6 Shiny New Toys…Tools This is a firewall without a strategy

7 Primarily Reactive We just collect logs to collect logs

8 What is assumed breach? Simply put: A security strategy that assumes any given endpoint is breached to some extent and controls risk as such.

9 Strategy Access Control Choke Points Trust Zones Detection Capabilities

10 Principles Empower Business Keep It Simple

11 Access Control What is being protected? How do we protect it if we assume it is already breached?

12 Access Control: What is being protected?
Internal Restricted Public Payroll Policies and Procedures PII, PCI, PHI SOX, GLBA Marketing Public Website Access Control: What is being protected?

13 Access Control: Tiered Access
Lateral Movement Administrative Access WannaCry

14 Choke Points Trusted sources Areas of known activity Minimize surface areas for non-standard things (i.e. front gate and not the walls) Not a new concept

15 Choke Points

16 More than network segmentation
We can have segmentation and still have a flat network Must empower businesses Too many hoops to jump through, at best users will be mad, worst case, they will find a way around Trust Zones

17 Medical Devices/ATMs/ICS
Trust Zones Medical Devices/ATMs/ICS User Networks VDI EMR/Mainframe/ICS Servers

18 Detection Strategy Identify the needles before building the haystack Minimize attack surfaces Focus on ‘all hands on deck’ alerts Review alerts vs reports

19 Detection Strategy Don’t try to think like an attacker Stop trying to prevent the latest and greatest 0 day – just assume it is already there

20 Next Steps Access Control Minimize perimeter Control changes
Tiered accounts for administration

21 Next Steps Choke Points Bring the battle to you
Know what normal looks like Tiered Accounts Reduce the noise

22 Next Steps Trust Zones Segment your network
Know what is supposed to talk to each other This should be transparent to users Keep it simple, but not flat

23 Next Steps Detection Capabilities Use guides (see references)
Know what normal is, be able to detect what isn’t Reduce the noise

24 References Don’t Think like an attacker Strategy: Detection:
Mitre ATT&CK – Known IOCs - Threat Hunter Playbook Strategy: - James Tubberville - Andrew Alaniz – 10 Immutable Laws of Assumed Breach - Joe Vest – Using IOCs to control threats - Microsoft - 10 Immutable Laws of Security Detection: - Jessica Payne – Tracking Lateral Movement - Andrew Alaniz – Assumed Breach Model - Resources for capturing Windows Events References


Download ppt "The Assumed Breach Model"

Similar presentations


Ads by Google