Top Banner
© 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved. October 2015 SEC316 Hardening Your Architecture with Security Incident Response Simulations Armando Leite, AWS Professional Services Jon Miller, AWS Security Technical Program Manager Rob Witoff, Coinbase Director
80

(SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Apr 16, 2017

Download

Technology

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

© 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved.

October 2015

SEC316

Hardening Your Architecture with

Security Incident Response SimulationsArmando Leite, AWS Professional Services

Jon Miller, AWS Security Technical Program Manager

Rob Witoff, Coinbase Director

Page 2: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Here is what you get today…

• SIRS: What is it?

• Demo

• Case study

• How to engage AWS

• Get your game on

Page 3: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

SIRS: What is it?

Inspiration-

“Nothing gives one person so much

advantage over another as to remain

always cool and unruffled under all

circumstances.”

-Thomas Jefferson

Page 4: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Ariana Grande speaks to simulation

“Dancing in high heels is kind of tough. I learn the

dances without the heels, and then we add them.

We just practice, and I get used to it. My feet hurt

really badly at the end of the shows, but it’s fun.

While it’s happening it’s fun. I feel tall.”

Did she get it right?

Quote from https://www.brainyquote.com/quotes/quotes/a/arianagran571274.html

Page 5: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Working backward…what customers want?

1. Validate readiness

2. Generate artifacts for accreditation

3. Be agile – Incremental with laser focus

4. Get faster and improve tools

5. Refine escalation and communication

6. Get confident – Learn from and train staff

7. Get comfort with the rare and the creative

Page 6: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Security Incident Response Simulations

1. Find an issue of importance.

2. Find skilled security geeks.

3. Build a realistic model system.

4. Build and test the scenario elements.

5. Invite other security geeks and real people.

6. Run the simulation live.

7. Get better and repeat.

Page 7: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Key simulation elements

Scenario Build ProcessLive

eventTest

Page 8: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Prevent spoilers

Page 9: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Finish at the end

Page 10: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Demo

Page 11: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

SIRS setup

Scenario:

• Unauthorized modification of content on public facing website.

Core participants:

• Application engineer

• Implementer

• Responder

Key events/injects:

• Inject 1: External-facing website is modified.

• Inject 2: Abuse notification received.

• Inject 3: Unauthorized resources spun up.

Page 12: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Process under test

Establish control

Determine impact

Recover as needed

Investigate root cause

Improve

Page 13: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Let the games begin!

Page 14: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations
Page 15: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Actions taken

Gather information about affected instance:aws ec2 describe-instances –filters “Name=ip-address,Values=xx.xx.xx.xx”

Deploy “block” security group:aws ec2 modify-instance-attribute –instance-id i-25xxxxfe –groups sg-

27xxxx43

Tag instance to mark it as under investigation:aws ec2 create-tags –resources i-xxxxxxxx –tags Key=Environment,

Value=Quarantine:REFERENCE-ID”

Create snapshot of volume for forensic analysis:aws ec2 create-snapshot –volume vol-xxxx –description “IR-ResponderName-

Date-REFERENCE-ID”

Page 16: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Process under test

Establish control

Determine impact

Recover as needed

Investigate root cause

Improve

Page 17: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations
Page 18: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Actions taken

Imaging instance memory:

LiME - https://github.com/504ensicslabs/lime

AWS CodeDeploy:

Page 19: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Postmortem…

Page 20: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Investigation – Check instance access logs1

2

4 11:01 PM 24 JUN 20153

Page 21: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Investigation – Check AWS CloudTrail API logs

?

Page 22: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Investigation – Correlate events

match!

Page 23: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Investigation – Blocked successfully

Page 24: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Wrap up simulation

Handoff correspondence

Capture artifacts, logs,

communications

Page 25: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Event

retrospective

Continue…start...stop.

Page 26: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Game

retrospective

Continue…start...stop.

Page 27: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Case study

Page 28: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

SIRS works in all industries

Enterprise Government Startup

Page 29: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Coinbase

Scenario

• Advanced threat with

escalated privileges

• Rapid and adversarial

• Crypto-ransom

Outcome

Successful

• Rapid response and

recovery

• Data protection

• Root cause investigation

• Risk elimination

Page 30: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations
Page 31: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations
Page 32: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

WHAT I’M ABOUT TO SHOW YOU WAS

A CONTAINED SIMULATION.

NO CUSTOMER DATA, FUNDS OR

SERVICES WERE, OR EVER WILL BE,

AT INCREASED RISK.

Page 33: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations
Page 34: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations
Page 35: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations
Page 36: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations
Page 37: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations
Page 38: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations
Page 39: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations
Page 40: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Observe

Orient

Decide

Act

Page 41: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations
Page 42: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations
Page 43: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations
Page 44: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Observe

Orient

Decide

Act

scanning | servers | ssh

snapshots | aws

Page 45: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Observe

Orient

Decide

Act

scanning | servers | ssh

snapshots | aws | ???

Page 46: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations
Page 47: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Observe

Orient

Decide

Act

Team #1

CloudTrail Pipeline

Page 48: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

CloudTrail Amazon S3 AWS Lambda Amazon Kinesis

→ → → →

Page 49: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

coinbase.com

Page 50: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Observe

Orient

Decide

Act

scanning | servers | ssh

snapshots | aws | ???

Page 51: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Observe

Orient

Decide

Act

scanning | |

|

servers ssh

snapshots aws

Page 52: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

scanning | serversssh

snapshots

aws

Observe

Orient

Decide

Act

Page 53: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

scanning | serversssh

snapshots

aws

Observe

Orient

Decide

Act team #2 team #3

Page 54: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

team #2 team #3

Page 55: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

team #2 team #3

snapshot

stop

d2.8xlarge

mount

grep

Page 56: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

team #2 team #3

Page 57: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

team #2 team #3

Page 58: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

team #2 team #3

Page 59: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

team #2 team #3

Page 60: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

team #2 team #3

Page 61: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

team #2 team #3

Page 62: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

coinbase.com

Page 63: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations
Page 64: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations
Page 65: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations
Page 66: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations
Page 67: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Thanks, Coinbase!

Page 68: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Engage AWS

Page 69: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

When should I engage AWS Support?

Engage AWS Support any time an event might be

occurring that affects your ideal operational state.

Page 70: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

When should I contact AWS Security?

If you are planning SIRS:

• Obtain permission to perform penetration testing/scanning.

• Confirm the SIRS does not violate the AUP.

Page 71: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Engage support

Page 72: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Engaging human support

Cloud support engineer (CSE)

Technical account manager (TAM)

Subject matter experts (SME)

You

Relationship POC

Available with enterprise support

Available with support

Page 73: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Go here…https://aws.amazon.com/contact-us/

Page 74: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Get your game on

Page 75: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Is your architecture built for IR?

• Real-time monitoring

• Logs at the ready

• Tagged for escalation

• Rapid recovery

• Rapid data preservation

• Forensic instances

• Late binding privileges for responders

Page 76: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Key simulation elements

Scenario Build ProcessLive

eventTest

No worries

Page 77: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Pick a scenario to try and get started

1. Web server application layer issue recovery

2. Log dive for artifacts

3. Data preservation

4. Credential rotation

5. Responding to alerts

6. Some sort of insider threat

7. Business owner and external communications

Page 78: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

https://aws.amazon.com/professional-services/

Page 79: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Remember to complete

your evaluations!

Page 80: (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

Thank you!

Josh du Lac, Hart Rossman, Don Bailey, Khaja, Graham, AWS Support, AWS Abuse team, EC2 Security team, and many more who

helped make these events possible