Top Banner
43

improving effectiveness of cybersecurity Information€¦ · [email protected] 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

Jun 18, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information
Page 2: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

[email protected] 16-6-2015 13:15

• NATO Malware Information Sharing Platform

• Panel discussion Threat information sharing: Strategies and threat Scenario’s

• George Mason University Barriers and pathways to improving effectiveness of cybersecurity Information Sharing Among Public and Private Sectors

• …

Yet another story on information sharing...

Page 3: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

[email protected] 16-6-2015 13:15

Case study on improving shared situational awareness by focusing on community building

� Situational Awareness as is

� Why we saw cause for action

� The NDN initiative

� Steps in community building

Page 4: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

Police

AIVD

Defense

NFI

National

partners

ISP’s

NCC

ISAC’s

Vendors

Academia

Insight

Perspective

for Action

Expertise

& Advice

Monitoring

& Response

Enhancing

Crisis management

Regulators

Critical Infrastructure

Page 5: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

Tactical

• News analysis • Tactical analysis

• Monthly monitor

• Guidelines

• Factsheets

• White papers

• Media analysis

• Policy briefings

• One conference

• Trend report

• End of year

Operational

• Advisories • Malware analysis

• End of week

• Ad hoc

• One conference

Daily Yearly

• Daily weather

report

• Observables

and context

NCSC-NL situational awareness

Page 6: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

2012 Dorifel

August 8th• We receive first calls• Requests for advice• Municipality of Weert• Malware sample• Indicators sharing• Actionability

Page 7: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

2012 Dorifel

August 9th• New reported infections• Notice and Takedowns• ‘Release me of a botnet’

August 10th• Total of 30 public and private organizations• Scaled down• Clean up still ongoing

Page 8: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

https://www.shadowserver.org

Page 9: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

2012 Dorifel Evaluation

Shortcomings• No early warning• No access to the networks• No use of standards• No feedback on indicators• No community driven approach• And thus ...no actual shared situational

awareness

Page 10: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

2015: National Detection Network

Page 11: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

1. An IDS for government organisations2. Threat intel data not (yet) widely available3. Targeted at NL, high impact, high likelihood4. Platform for private sectors in critical

infrastructure5. Use of standards and open source6. Based on voluntary sharing with NCSC-NL7. Available to all of our constituency

NDN offers

Page 12: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

http://deerhillexpeditions.com

Page 13: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

Topics dealt with

Program

management

Program

management

Community

Page 14: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

10 Steps in community building

1. Legal and policy assurances

2. Explore the territory

4. Start the collaboration

5. Decision making

6. Business Case 7. Controls

8. Results 9. Information Process

10. Evaluate and adjust

3. Communication

PR

IOR

STA

RT

OB

STA

CLE

LOO

P

Page 15: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

Steps in community building

1. Legal and policy assurances

2. Explore the territory

4. Start the collaboration

5. Decision making

6. Business Case 7. Controls

8. Results 9. Information Process

10. Evaluate and adjust

3. Communication

PR

IOR

STA

RT

OB

STA

CLE

LOO

P

Page 16: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

Step 1. Policy and legal 1. Embed activities in NCSS

2. Create political

commitment

3. Organise broad support

4. Inform employee council

5. New policies will be

developped

6. Check your legal base

www.overheid.nl

Page 17: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

Step 2. Exploring the teritory

• Information• Trust level• Volume• Sharing molde• Benefit• Authority• Exchange base• Size• Lenght• Connectednes• Diversity• ...

Page 18: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

Step 2. Exploring the teritory

volumevolume

lenghtlenght

trust leveltrust level

informationinformation

exchange baseexchange base

connectednessconnectedness

sizesize

authorityauthority

diversitydiversity

benefitbenefit

openopen closedclosed

lowlow mediummedium highhigh

lowlow mediummedium highhigh

not presentnot present informalinformal formalformal

publicpublic privateprivate supervisorysupervisory

voluntaryvoluntary mandatorymandatory

limitedlimited mediummedium largelarge

ad hocad hoc long termlong term

weakweak strongstrong bridgingbridging

lowlow mediummedium highhigh

sharing modelsharing model hub-spokehub-spoke peer-peerpeer-peer hybridhybrid

Page 19: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

NDN - NCSC

Step 3. Communications

Belang-

hebbenden

Overheid

Internationaal

Mede-

overheden

Vitale

Sectoren

NCTV

Water

ISAC

Nucleair

ISAC

Multi-

nationals

ISAC

Haven

ISAC

Energie

ISAC

Fin. ISACTelecom

ISAC

Transport

ISAC

Zorg

ISAC

MSP

ISAC

Insurance

ISAC

Infra

MKB-

Nederland

CVI

TNO

Nox

Consider

Computale

RIJKS

ISAC

VNO/NCW

Privacy

related

Liaisons

EU-Fin.

ISACRijksoverheid

Cyber

Security Raad

Thuiswinkel

.org

doelgroep

omgeving

ICT-officeDeskundigen

McAfee

Hewly-

DaggardUvE

NU.nl

Security.nl

Tweakers

WebWereld

PvIB

Rijks SOC

DGOB|RICCIO

Sb.comm.

IB

National

Police

SSC-ICT

Shadow

server

DHS

EGCENISA

EU DGEuropol

Interpol

Logius

Banken

VNG

DNB

Equens

Betaal-

verenig.

NVB

Koplopers

CSIRT’s

SOC’s

MS

ISP

CIBO

CIP

Water-

schaphs.

IPO-

provincien

KING-

IBD

Taskf.

BID

Uni van

Watersch.

IWWN

ACM

(OPTA)MOD

BuZa

CIBG

Def.

CERT

Event

I&M IVD

NBV

EZ

NFI

OM

Taskf.

Cyber

VWS

EC3

Page 20: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

Steps in community building

1. Legal and policy assurances

2. Explore the territory

4. Start the collaboration

5. Decision making

6. Business Case 7. Controls

8. Results 9. Information Process

10. Evaluate and adjust

3. Communication

PR

IOR

STA

RT

OB

STA

CLE

LOO

P

Page 21: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

EvaluateExecuteScopingNegotiate

Share

and

reflect

Individual interests

and ambitions

Understand

consequences

Master

plan

Results,

products

Exits, new

entries

Pace and

direction

Step 4. Collaboration process

Leren samenwerken tussen organisaties, alianties netwerken ketens partnerships, Kaats, Pheij, 2013

First

insightInvite

Page 22: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

Stages Period Activities

1 Invite May-Nov ’13 - Representative organizations

- Delegates

2 First insight Dec ’13 - Round table sessions

- Introductions

- Proposition: benefits, challenges

3 Share and

reflect

Feb ’14 - Interests made explicit

- Implicit a group was made

4 Negotiate Mar, Jun ’14 - Agenda

- Roles, responsibilities

5 Scoping Jun-Nov ’14 - Process, organization, information,

infrastructure, legal, policy,

communication

6 Execute Dec ’14 - Start pilot: infrastructure, sharing

7 Evaluate Jun-Sep ’15 - Roadmap, growth scenario, sharing

proces

Page 23: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

Structure

• 1 steering group, 2-monthly

• Senior management

• Sounding board

• Round table

Results

• Consensus

• Political support

• Stakeholder collaboration

• Autonomy untouched

• Missing: MSSP, researchers,

interest groups, ...

Topics

• Project and pilots

• Policy, legal and politics

• Finance and resources

• Communication

Stakeholders

• 150 corporate organizations

• 20 public organizations

• 3 founding partners

• ? Managed service providers

Step 5. Decision making

www.rcc.int

Page 24: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

Steps in community building

1. Legal and policy assurances

2. Explore the territory

4. Start the collaboration

5. Decision making

6. Business Case 7. Controls

8. Results 9. Information Process

10. Evaluate and adjust

3. Communication

PR

IOR

STA

RT

OB

STA

CLE

LOO

P

Page 25: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

Step 6. Costs and benefits

Short term Long term

Costs

Benefits

Page 26: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

- Reputation through Corporate Soc Resp - Higher security level

- Compliancy - Efficient processes

- Collaboration - NL digitally (more) safe

Step 6. Costs and benefits

Short term Long term

Costs

Benefits

Page 27: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

- Reputation through Corporate Soc Resp - Higher security level

- Compliancy - Efficient processes

- Collaboration - NL digitally (more) safe

- Labour (legal, policy, techs, ..) - Infrastructure / maturity.

- Tooling (IDS, MISP, SIEM) - IDS appliance

- Service management - Commercial feeds

Step 6. Costs and benefits

Short term Long term

Costs

Benefits

Page 28: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

Privacy controls (public IDS)• Raw data only locally• No IoC’s on personal identifable information• IP addresses hashed and salted• Retention time <30 days• Hits after 30 minute delay• White box solution• No remote management

Step 7. Information controls

www.occupy.com

Page 29: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

Privacy controls in process and organization• Describe the working process• Protocols in place that describe how to handle• Perform a privacy impact assessment• Processes are externaly audited• Keep checking on compliancy with legislation

and policies• Only screened personnel handle data

Step 7. Information controls

Page 30: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

Step 7. Information controls

Sharing controls (private sector)Public access and access from supervising authorities to government information• Describe the working process• Retention times on IoC’s, sightings,...• Policy statement, law amendmentTLP Amber, confidential or secret • MSSP’s, international branches • Research e.g. Blooming filter• Transparency in processing, (NDA’s)

Page 31: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

• Span, location, availability

• Bandwidth, performance

• Skill level

• Contextual information

• (Too) high expectations

• Remote access

• New friends

• MISP Forum

• MISP community driven

• MISP STIX

• MISP groups

• Government syndrom

• Data retention

• New friends

Step 8. Results

various pics via www.google.com

Page 32: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

Step 9. Collect & share

CollectCollect

AnalyseAnalyse

ShareShareEnrichEnrich

ReportReport

Page 33: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

Step 9. Collect & share

CollectCollect

AnalyseAnalyse

ShareShareEnrichEnrich

ReportReport

- Levels of sharing

- IoC’s received

- Follow up

Page 34: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

Step 9. Collect & share

CollectCollect

AnalyseAnalyse

ShareShareEnrichEnrich

ReportReport

- Levels of sharing

- IoC’s received

- Follow up

- Sightings

- Statistics

- Comments

Page 35: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

Step 9. Collect & share

CollectCollect

AnalyseAnalyse

ShareShareEnrichEnrich

ReportReport

- Levels of sharing

- IoC’s received

- Follow up

- Sightings

- Statistics

- Comments

- Anonimization

- Few results

Page 36: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

Step 9. Collect & share

CollectCollect

AnalyseAnalyse

ShareShareEnrichEnrich

ReportReport

- Levels of sharing

- IoC’s received

- Follow up

- Volume

- Contextual information

- Workprocess

- Sightings

- Statistics

- Comments

- Anonimization

- Few results

Page 37: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

Step 9. Collect & share

CollectCollect

AnalyseAnalyse

ShareShareEnrichEnrich

ReportReport - Too strict

- Active

collaboration

- Repository missing

- Levels of sharing

- IoC’s received

- Follow up

- Volume

- Contextual inf.

- Workprocess

- Sightings

- Statistics

- Comments

- Anonimization

- Few results

Page 38: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

Steps in community building

1. Legal and policy assurances

2. Explore the territory

4. Start the collaboration

5. Decision making

6. Business Case 7. Controls

8. Start a pilot 9. Information Process

10. Evaluate and adjust

3. Communication

PR

IOR

STA

RT

OB

STA

CLE

LOO

P

Page 39: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

10. Continuous improvement

M.C. Escher

Page 40: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

To concludePreparations• Results• Involvement

Collaboration• Takes endurance• Very intensive• Trust issues reduced

http://www.tortoiseknowsbest.com/john-bachar-%E2%80%93-a-true-slow-hero/

Page 41: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

To conclude

Obstacles• Controls: transparency sources/ncsc/private• Process: make a good inventory• ROI: first insights, hard to put $/€/¥/£ to it• Results: start small, make it work

Improvement• Other practices, tooling, disciplines, industries

Page 42: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

maps.google.com

Page 43: improving effectiveness of cybersecurity Information€¦ · michael.meijerink@NCSC..nl 16-6-2015 13:15 • NATO Malware Information Sharing Platform • Panel discussion Threat information

This presentation is based on our own experiences as well as others:

• Electrotechnik und informationstechnik, Cyber security information exchange to gain insight into the effects, 2015

• http://link.springer.com/article/10.1007%2Fs00502-015-0289-2

• NCSC, Ahead of the threat, enhancing cyber intelligence communities, 2015

• https://www.ncsc.nl/actueel/nieuwsberichten/ncsc-levert-bijdrage-aan-european-cyber-security-perspectives-2015.html

• Microsoft, a framework for cyber security information sharing and risk reduction, 2015

• http://www.microsoft.com/en-us/download/details.aspx?id=45516

• Nist, Guide to Cyber Threat Information Sharing, 2014

• http://csrc.nist.gov/publications/drafts/800-150/sp800_150_draft.pdf

• EP, Mass surveillance, part 2, 2015

• http://www.europarl.europa.eu/RegData/etudes/STUD/2015/527410/EPRS_STU%282015%29527410_REV1_EN.pdf

• EP, Network and Information Security (NIS) Directive, 2015

• http://ec.europa.eu/digital-agenda/en/news/network-and-information-security-nis-directive

• MISP, main developers Belgian Defence and Nato

• https://github.com/MISP/MISP