Top Banner
PRACTICAL ATTACKS & MITIGATIONS
35

Slide Griffin - Practical Attacks and Mitigations

Apr 07, 2017

Download

Technology

EnergySec
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Slide Griffin - Practical Attacks and Mitigations

PRACTICAL ATTACKS &

MITIGATIONS

Page 2: Slide Griffin - Practical Attacks and Mitigations

ENERGYSEC 2016

About me

2

Page 3: Slide Griffin - Practical Attacks and Mitigations

ENERGYSEC 2016

About me

3

Page 4: Slide Griffin - Practical Attacks and Mitigations

400 Executives and IT pros surveyed:

Do cyber security briefings to the board adequately represent threats?

Are the tools used to present risk accurate?

Are you “literate” in cyber security?

http://www.computerweekly.com/news/4500245499/C-level-execs-need-to-increase-cyber-security-literacy-study-shows

4

ENERGYSEC 2016

Execs IT

68% 80%

C-Level Non C-Level IT

65% 87% 78%

C-Level Non C-Level

100% 84%

Page 5: Slide Griffin - Practical Attacks and Mitigations

ENERGYSEC 2016

Page 6: Slide Griffin - Practical Attacks and Mitigations

ENERGYSEC 2016

• 10.6.1 Review the following at least daily:

• All security events

• Logs of all system components that store, process, or

transmit CHD and/or SAD

• Logs of all critical system components

• Logs of all servers and system components that perform

security functions (for example, firewalls, intrusion-

detection systems/intrusion-prevention systems (IDS/IPS),

authentication servers, e-commerce redirection servers,

etc.).

Page 7: Slide Griffin - Practical Attacks and Mitigations

7

Compliance Scanning

Database Monitoring

Firewall Management

Intrusion Prevention

IT Compliance Program

IT Policy Management

Malware Protection

Minimum Security Baselines

Patch Management

Security Awareness

Red Team

Security Operations Center

Third Party Connections

Third Party Service Provider Process

Third Party Vulnerability Assessment Proxy Servers

ENERGYSEC 2016

Page 8: Slide Griffin - Practical Attacks and Mitigations

8

ENERGYSEC 2015Advanced Detection

Application Security

Compliance Scanning

Data Leakage Protection

Database Monitoring

Defense In Depth

Firewall

Intrusion Detection Prevention System

Malware

Patch Management

PCI/PII/PHI/???

Proxy

Red Team

Security Awareness

SOC & Monitoring

Social Media

Third Party Vulnerability Management

Security Compliance

Data Leakage Protection

Proxy

Phishing

Incident Response

Defense in Depth

PCI/PII/PHI/???

Security Awareness

Compliance Scanning

IT Compliance Program

IT Policy Management

IT Risk Management

Asset Management

Firewall

Intrusion Detection Prevention System

Proxy

Malware

Defense in Depth

Patch Management

Third Party Vulnerability Management

Application Security

Network Security

Firewall

Proxy

SOC & Monitoring

Defense in Depth

PCI/PII/PHI/???

Database Monitoring

IT Compliance Program

Security Policy & Standards

Data Leakage Protection

Firewall

Intrusion Detection Prevention System

SOC & Monitoring

Third Party Connections

Minimum Security Baselines

Database Monitoring

IT Policy Management

Data Security

Data Leakage Protection

Defense in Depth

PCI/PII/PHI/???

Third Party Management

Third Party Vendor (Services, Cloud)

Third Party Connections

Architecture Documentation

Data Leakage Protection

Firewall

Intrusion Detection Prevention System

PCI/PII/PHI/???

Page 9: Slide Griffin - Practical Attacks and Mitigations

ENERGYSEC 2016

Too hard?!?!

Page 10: Slide Griffin - Practical Attacks and Mitigations

ENERGYSEC 2016

Page 11: Slide Griffin - Practical Attacks and Mitigations

11

ENERGYSEC 2016

THIRD PARTY CONNECTIONS

Technology

HIGH

For third party connections requiring site-to-site VPN, the <$client> VPN team uses the IPSEC protocol. The VPN team allows IKE (Internet Key Exchange) Version 1 protocol to setup security association for the IPSEC tunnel within the Third Party VPN Gateway.

Multiple critical vulnerabilities have been found within the IKEv1 protocol. These vulnerabilities may allow for the execution of arbitrary code and/or denial-of-service attacks.

<$CLIENT>should consider enforcing use of IKEv2 protocol for setting up IPSEC based site-to-site VPN tunnel. This may mitigate potential vulnerabilities associated with the IKEv1 protocol.

Page 12: Slide Griffin - Practical Attacks and Mitigations

Advanced Detection

12

PRACTICAL ATTACKS

Page 13: Slide Griffin - Practical Attacks and Mitigations

Advanced Detection

13

PRACTICAL ATTACKS

Page 14: Slide Griffin - Practical Attacks and Mitigations

Advanced Detection

14

PRACTICAL ATTACKS

Page 15: Slide Griffin - Practical Attacks and Mitigations

Data Security

15

PRACTICAL ATTACKS

Page 16: Slide Griffin - Practical Attacks and Mitigations

Architecture Documentation

16

PRACTICAL ATTACKS

Page 17: Slide Griffin - Practical Attacks and Mitigations

Security Policy & Standards

17

PRACTICAL ATTACKS

Page 18: Slide Griffin - Practical Attacks and Mitigations

Third Party Management

18

PRACTICAL ATTACKS

Page 19: Slide Griffin - Practical Attacks and Mitigations

Asset Management

19

PRACTICAL ATTACKS

Page 20: Slide Griffin - Practical Attacks and Mitigations

Asset Management

20

PRACTICAL ATTACKS

Page 21: Slide Griffin - Practical Attacks and Mitigations

Security Compliance

21

PRACTICAL ATTACKS

Page 22: Slide Griffin - Practical Attacks and Mitigations

Security Compliance

22

PRACTICAL ATTACKS

Page 23: Slide Griffin - Practical Attacks and Mitigations

Network Security

23

PRACTICAL ATTACKS

Page 24: Slide Griffin - Practical Attacks and Mitigations

ENERGYSEC 2016

Page 25: Slide Griffin - Practical Attacks and Mitigations

ENERGYSEC 2016

Page 26: Slide Griffin - Practical Attacks and Mitigations

ENERGYSEC 2016

Page 27: Slide Griffin - Practical Attacks and Mitigations

ENERGYSEC 2016

Page 28: Slide Griffin - Practical Attacks and Mitigations

28

Initiative Title

Network Security

Asset Management

Advanced Detection

Security Compliance

Data Security

Third Party Management

Security Policy and Standards

Architecture Documentation

Network Security

Design Perimeter Security Minimum Security Baselines (MSBs)

Design/Implement Enhanced Site-to-Site Access

Establish Enterprise Access Requirements

Establish Enterprise Monitoring & Logging Requirements

Network Access Control (Design/Implement)

Network Segmentation Design/Implement for Sensitive Data/Resources

Red Team Sandbox (Design/Implement)

Refresh Minimum Security Baseline (MSB) Standards

Remote Filtering Capability (Design/Implement)

MITIGATIONS

Security Policy and Standards

Refresh Minimum Security Baseline Standards Initiative

Design Perimeter Security MSBs

Establish Enterprise Monitoring & Logging Requirements

Asset Management

Design/Implement Advanced Configuration Management Capability

Design/Implement Non Standard Patch Management Capability

Patch Management & EOL Program Definition

Vulnerability Management Program

Page 29: Slide Griffin - Practical Attacks and Mitigations

29

MITIGATIONS

Advanced Detection

Automated Vulnerability Scanning

(Design/Implement)

Enhanced Code Analysis Capability

(Design/Implement)

Network Access Control (Design/Implement)

Expand HIPS Capability Deployment

Behavioral Analysis (Design/Implement)

Advanced FW Capability (Design/Implement)

Advanced IPS/IDS Capability (Design/Implement)

Advanced Proxy Capability (Design/Implement)

File Integrity Monitoring (Design/Implement)

Advanced Malware Detection Capability

(Design/Implement)

Advanced SIEM Capability (Design/Implement)

Red Team Sandbox (Design/Implement)

Advance Database Monitoring Capability

(Develop/Implement)

Vulnerability Management Program

(Redesign/Expand)

Secure Development Program (Develop/Implement)

Integrate Threat Analysis Feeds

Establish Enterprise Monitoring & Logging

Requirements

Remote Filtering Capability (Design/Implement)

Security Compliance

CIRT Process & Procedure Refresh

CIRT Table Top Exercise (Simulated)

Design/Implement Compliance Management Capability <$VENDOR>

Enhance IT Risk Management Program

Capability Realignment

Expand Phishing Program (i.e. document, validate)

Architecture Documentation

Sensitive Data Flow Mapping for critical business Processes

Page 30: Slide Griffin - Practical Attacks and Mitigations

30

MITIGATIONS

Data Security

Develop Core DLP processes and implement / automate DLP processes leveraging <$VENDOR>

Deploy endpoint DLP capabilities to the corp environment

Deploy email notification, quarantine and blocking

Rule analysis and enhancement (reduce false positives)

Enhance Data Classification Standard / Develop handling procedures

Network Security

Network Segmentation Design/Implement for Sensitive Data/Resources

Network Segmentation Design/Implement for 3rd Party Contractors

Establish Enterprise Access Requirements

Security Operations Center Roadmap

Third Party Management

Design/Implement Enhanced Site-to-Site Access

Design/Implement Third Party Management Program Capability <$VENDOR>

Establish Enterprise Access Requirements

AD Environment Redesign

Page 31: Slide Griffin - Practical Attacks and Mitigations

31

ENERGYSEC 2016

Page 32: Slide Griffin - Practical Attacks and Mitigations

ENERGYSEC 2016

RISK

Posture

Regulatory Compliance

Audit Results

VA/PT/Redteam

Results

Industry Standards

Risk Assessment

Page 33: Slide Griffin - Practical Attacks and Mitigations

33

Page 34: Slide Griffin - Practical Attacks and Mitigations

34

Page 35: Slide Griffin - Practical Attacks and Mitigations

35