Download presentation
Presentation is loading. Please wait.
Published byElmer Montgomery Modified over 9 years ago
1
1 Managing A Global Corporate Protection Infrastructure Jeannette Jarvis Association of Anti Virus Asia Researchers November 26, 2004
2
2 Agenda Setting the scene Objective Threats Challenges Protection Strategy Products Processes Critical reference links
3
3 Company Objectives Virus/worm/intrusion free environment Immediate alerting notification Security incidents Suspicious activity Well-defined processes Normal operations Events Enterprise compliance Security tools & update process
4
4 Malware Threats Denial of service Execution of arbitrary code Remote execution Viewing sensitive company information Manipulating data Propagating data Keylogging exploits Phishing Schemes Spyware / Adware Spoofing
5
Software Vulnerabilities As reported by SEI CERT/CC: www.cert.org/stats/cert_stats.html
7
7 Progression of Malware Transports Viruses on floppy disks Virus by e-mail Viruses in Macros Melissa Loveletter Worms Concept Laroux Wazzu Brain Friday the 13 th Michelangelo Nimda Code Red SQL Slammer Sasser > 2004 1987 1995 1999 2001
8
Software Vulnerability Lifecycle
9
9 Challenges Security versus Functionality Usability Scalability Manageability Vulnerabilities to exploit time is short
10
10 Company Challenges Limited resources Outdated/mis-configured machines Rogue servers Acquisitions – conforming to your existing security policies and processes Home users – lack of configuration control Mobile employees – low bandwidth for security updates
11
11 Risk Versus Cost Critical Infrastructure Budget Constraints
12
12 Protection Management Components Products Multi-tiered approach Address all entry and exit points Processes Consistent enterprise solutions Continuous process improvement Policy Consistent compliance across enterprise Published security policy People Education / Awareness / Communication Engagement
13
13 Products – Defense in Depth Port blocking Firewall – desktop and network Intrusion detection/prevention tools Web Proxy filtering Content Filtering – perimeter and internal Anti-virus – multi-vendor approach Spyware / Adware Pop-up blocker Event correlation tool
14
14 Policy & Process Tools Push tools – patches and configuration updates Compliance tools – conform to company policies or disbarred from entry Centralized management tools One site for enterprise visibility of activity and product disposition Centrally manage product updates and signature detections & policy creation Metrics and reporting Encryption Policy Enterprise Backup Solution
15
15 Visibility Event correlation tool Gather events of interest throughout the enterprise from ALL security tools Into a well-structured database to enable efficient complex incident detection and response Provide effective query for investigators Reports based on trend analysis Effective metrics to target detection strategy
16
16 Consistent Enterprise Processes Have established plans for prevention, detection and reaction Know who does what, when Backup personal identified Normal operations Monitoring for malware activity Who initiates mitigation for new threats Communication Process When is information communicated How? By whom?
17
17 Process during an event Security event Defined processes for how your company reacts to a security incident / outbreak Notification Those involved with the event General employee population Action Who is empowered to take action Locking down machines Isolating network Product Updates
18
18 Vulnerability Monitoring Security monitoring and response Team Monitors new vulnerabilities Triage Security Alerts Accesses impact on infrastructure Report status Critically Recommendation Links to updates Ensure that responsible party is providing solution in appropriate timeframe Prioritizes the threats Continuous audits of enterprise
19
19 Education Yearly security awareness training is required Interactive web based training is mandated Annual security video required to be reviewed by all Internal web site for virus information Company wide information Company web site when threat/issue warrants complete visibility Email to all employees when their involvement is critical to containment of a threat
20
20 Post Mortem Tool to communicate lessons learned and improve your infrastructure Immediately following closure of incident All key organizations have representation Attendance is mandatory Establish root cause Address perceptions and reality Continuous Process Improvement
21
21 Home Users Hardware Firewall Preferred Software Firewall at minimum Policy Compliance Disable ability to login to corporate network unless up-to-date Patches Anti-virus signature files Personal firewall installed
22
22 IT Department Responsibility Empowerment to make immediate high impact decisions Vulnerability assessments “What if” scenarios Isolated network / Isolated lab environment Fail-over architecture
23
23 Event Disaster Plan Critical contact phone lists available off-line Processes to get needed security products updates when normal resources are unavailable Teleconferences for management and technical staff to get needed information during crises Business continuity plans established Communication process when normal channels are eliminated
24
24 Virus Industry Presence Associations AVAR – Association of Anti-virus Asia Researchers http://www.aavar.org http://www.aavar.org AVIEN – Anti-virus Information Exchange Network http://www.avien.org/ http://www.avien.org/ AVIEWS – Anti-virus Information Early Warning System http://www.aviews.org EICAR – European Institute for Computer Antivirus Research http://www.eicar.org/ http://www.eicar.org/ The Wildlist Organization – International forum on the wild viruses http://www.wildlist.org/ http://www.wildlist.org/
25
25 Critical Information Links CERT – Computer Emergency Response Team http://www.cert.org/ http://www.cert.org/ Internet Storm Center http://isc.sans.org//index.php http://isc.sans.org//index.php Virus Bulletin http://www.virusbulletin.com/ AntiPhishing Working Group http://www.antiphishing.org/
26
26 Closing Managing your environment requires Due diligence Defensive tools Monitoring & Awareness Notification and response On-going user education Consistent enterprise processes
27
27 ??? Questions ???
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.