Top Banner
The Association between Capacity Management, Cybersecurity, and Insider Threat Chris Greco, PMP, PMI-ACP, CISSP, ITIL (Foundation)
41

The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

Apr 30, 2018

Download

Documents

ngothien
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

The Association between Capacity Management, Cybersecurity, and

Insider Threat

Chris Greco, PMP, PMI-ACP, CISSP, ITIL (Foundation)

Page 2: The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

Assumptions • Every computer has at least one

user • Every user accesses the

computer through a series of access controls

• Every access control has at least one method of authentication (two preferred)

• Every one of these authentication methods have an effect on capacity

• Every capacity change incorporates a set of risks

2

Page 3: The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

Background of Speaker

• Over 35 years of project management experience combined with 15 years of IT experience

• Speaker at CMG on a variety of topics • In 2006, presented the topic of capacity and

security • In that presentation, showed that capacity will

grow exponentially in the next 10 years due to security concerns

3

Page 4: The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

Stunning Statistics

• 2010: 60% of respondents to survey stated they would take anything from their prior employer, including information

• 2012: Former NSA contractor takes information from computers (insider threat)

• 2013: Hacking continues, and in some cases, originates within companies (insider threats)

• 2016: Insider Threats presents a very real and present danger to companies and governments

4

Page 5: The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

How Does This Relate to Capacity?

• Let’s do the logic • There are approximately 7 billion people in

the world • If half own and use a computer (3.5 billion)

then they have at least one password • The password may contain upwards of 15

characters • If each character of that password is a byte,

then you have 53 Gigabytes of information

5

Page 6: The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

That’s Not Bad At All

• Nope, not bad, then you start to add it all up • You have a “forgotten password” feature where

you store 3 questions and answers for each user • The questions are standard (but still need to be

stored) and the answers vary • If the answers have an average of 10 characters

(which in my opinion is underestimated) then you have about 105 Gigabytes of information

6

Page 7: The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

But It is Not Over Yet!

• If the entity employs multi-factor authentication, then it becomes even more complicated

• You have to store phone numbers of the users, and issue random numbers for verifications

• To store phone numbers will be to increase your data storage by at least 10 bytes, which would be an additional 35 Gigabytes

7

Page 8: The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

The Sum And The Consequences

• 53 + 105 + 35 = 173 Gigabytes • And that is for only one password for one

application (or one application access) • The reason for this introduction is to say that

there is a rise in the authentication requirement

• As a user, your responsibility is to ensure your passwords are strong

• The infrastructure manager has to do the rest

8

Page 9: The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

The Growth of Authentication

• In the beginning, the password was the only authentication needed for access

• Then multi-factor authentication required more – Something you know – password – Something you have – cellphone (or a “fob”) – Something you are – biometrics

• This has required more capacity to store all this data

9

Page 10: The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

Authentication And The Numbers

• Assumptions – Your company has 1000 employees – Each of these employees have strong passwords

(i.e. 10 characters, different character sets) – Your company has also incorporated biometrics

(“something you are”) which is one fingerprint • The password will be approximately 21

kilobytes, and the fingerprint will be approximately 1 megabyte

10

Page 11: The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

What Is the Problem?

• So far, given the previous slide, everything is not bad at all

• However, there are some other issues you need to consider – The storage of past passwords (don’t want users

using the same password for everything – The storage of USERIDs (at least 7 characters) – The storage of more than one fingerprint (increase

by approximately 1 MB each time)

11

Page 12: The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

Access By Application

• Of course most of us have access to applications or single sign on (SSO), so the storage is not a problem (right?)

• The baseline storage still has to occur, as well as the possibility of placing certain folders under access

• Every folder or document that has access must also have an access control

12

Page 13: The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

Simulated Access Control

• The following diagram shows a simulated access to one document by a set of users

• This is just a simulation, but one can imagine the amount of storage that would be required to keep the passwords or other access current

• You may have an Access Control List (ACL) but that means you have to store at least the following: – Name (or employee number or other ID) – USERID – PASSWORD – Other access controls including versions of the documents

13

Page 14: The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

Access Chart for Single Document

14

Page 15: The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

A Quick Review

• Your storage has to accommodate for the following security protections – Something you know (passwords, passcodes, userid) – Something you have (fobs, cellphone numbers,

random number generator) – Something you are (biometrics including fingerprints,

iris scans, facial recognition) • All of this just to ensure authorized access • This does nothing to prevent insider threat if not

done in combination with other measusres

15

Page 16: The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

Insider Threat

• Insider Threat is nothing new • Disgruntled employees have existed as long as

there are companies • In the past, they sometimes took office supplies,

or other things of value • Now, they could take something of great value –

information! • How do you stop this insidious practice? • You will NEVER stop Insider Threat (in my

opinion) but you can try to prevent and detect it

16

Page 17: The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

Capacity Management and Insider Threat

• Storage of user identifying information – Every user takes up space in the storage formula – The amount of information will vary

• What we need to discuss is how to detect and/or prevent insider threat

• What are the various forms of data you store in order to implement an insider threat detection/prevention?

17

Page 18: The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

Logic Behind Detecting Insider Threat

• Let’s assume again that you have 1000 employees

• Each of these employees has access to 1000 documents in various folders on the servers

• You, as the computer security manager, have a “feeling” that there is information being pilfered from the system

• In order to confirm that feeling with data you have to monitor activity on those servers

18

Page 19: The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

What Should We Consider?

• If we wanted to employ an “insider threat” detection (or outside threat for that matter) we would want to consider the following: – Number of machines (one machine per person) – Number of servers – Number of firewalls (inside and outside DMZ)

• You would also have to consider how many months (or years) you would want to keep the data

19

Page 20: The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

Just One Example

• http://www.buzzcircuit.com/tag/siem-storage-calculator/ is just one site for measuring the amount of storage necessary

• Using this site and inserting the number 10 for all the hardware choices, along with 6 months for storage requirements

• The amount of storage you would need would be approximately 3 Terabytes of raw data and 5 Terabytes of application storage

20

Page 21: The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

Changing the Attributes

• If you increase the number of servers from 10 to 50, you increase the storage requirement by 2 Terabytes

• If you use the average medium sized company of 200 employees, you increase the number of computers to 200 with 10 servers (1 per 20 computers)

• This would mean that you would have to START with several Terabytes of storage just to retain it for 6 months!

21

Page 22: The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

Knowing the Terms

• A term with which you may be familiar is Security Information and Event Management (SIEM) storage.

• This is an application that gathers information and detects outliers for further analysis

• Although it has been in use for years, many companies are spending hundreds of thousands of dollars on obtaining and maintaining these applications

22

Page 23: The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

Sample of Storage Requirements (For Different # of Servers)

0

50

100

150

200

250

300

6 MonthsRetention (1 of

Everything)

1 Year Retention(1 of Everything)

6 MonthsRetention (1+ FW,

R, SW, DB, Etc)

1 Year Retention(1+ FW, R, SW, DB,

Etc)

6 MonthsRetention (10 of

Everything)

1 Year Retention(10 of Everything)

Tera

byte

s 2520151051

23

Page 24: The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

An Example

• Let’s say that In 2012-2013 there was an individual that was in a sensitive position

• Let’s hypothesize the individual was part of the Federal Government and had access to very critical information

• Finally, let’s hypothetically conclude that the individual is now living in a foreign country after stealing sensitive national security information

24

Page 25: The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

Questions to Consider

• What if the individual was slowly gaining access to information that was “derivative” to his duties?

• What if the individual had flash drives and DVDs on his desk?

• What if the individual was asking questions of users on gaining access to other type of information?

• Finally, what if there were people who saw this signs and did nothing?

25

Page 26: The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

Could The Insider Threat Have Been Detected By SIEM?

• Could a SIEM have detected this intruder? – Access to information might have been outliers only if

he did not access them daily – The SIEM will not “observe” the person’s behavior

beyond their computer access and log entries

• People did question the insider threat, but if they are able to “tell a good story” they get a pass

• It takes people to report questionable behavior in order to place confirmation on the monitoring

26

Page 27: The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

Another Example

• Let’s say data showed that an individual was using different Social Security Numbers to open businesses (same name, different numbers)

27

Page 28: The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

Why Are We Using Machines to Monitor Humans?

28

Page 29: The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

Employees As Risks (Pessimistic)

• At the beginning of this presentation, we stated that there might be 60% of employees willing to take something from their employer

• If you have 1000 employees, that would mean (nominally) that you have 600 of those employees that would be willing to steal something from the company

• However, there is an upside to this argument

29

Page 30: The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

Using Employees as Security Monitors (Optimistic)

• If you have 20 employees you have 40 eyes and 40 ears that can help keep your company secure.

• There is nothing more powerful than peer pressure

• As a college instructor, placing the class on alert helped to eliminate cheating, because they knew the expectations, so they would keep everyone on their best behavior

30

Page 31: The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

Some Ways to Deploy the Employees

• Limit Access • Educate employees about security • Create a culture of security

https://hbr.org/2015/09/cybersecuritys-human-factor-lessons-from-the-pentagon)

31

Page 32: The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

Value Added Security

• There is nothing like having the employee take an active role in security

• Rather than trying to avoid or shortcut security, they will use “their” rules more seriously

• Employee generated access rosters will establish the employee as the on in charge of that aspect of security

• It also makes them accountable, which will provide them with a stake in that part of the mission

32

Page 33: The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

Are Employees Reliable?

• Making someone accountable gives them a sense of purpose

• According to studies, purpose is something we all desire and are motivated to achieve (Elie Wiesel Nobel Prize winning book - Night)

• If they see and do nothing, they are not being accountable, and fail to do their purpose

33

Page 34: The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

A Hybrid Approach

• Use a SIEM and make that part of the security infrastructure, but do not rely on it as the sole detection method

• Use an employee education to keep employees aware of the various security concerns

• Have an employee security network that helps their peers maintain security

• Create a culture of security through constant visibility and example; use existing tools creatively (i.e. NIMDA back in early 2000s)

34

Page 35: The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

Does Constant Exposure Help?

• (https://en.wikipedia.org/wiki/Rick_Rescorla)

35

Page 36: The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

What Does This Do To Capacity?

• Employee involvement can save Terabytes of storage

• In current economy, storage has to be protected, so the more the storage, the more the protection

• By keeping the security internal and observable, the capacity can be used for other things besides storing monitoring data (performance monitor!)

• The savings can be passed on to the employee as an incentive

36

Page 37: The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

0

500

1000

1500

2000

2500

3000

5 10 15 20 25 30 35 40 45 50 55 60 65 70

One Last Thing

𝑛(𝑛 − 1)2

37

Page 38: The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

Summary

• Security is something that will never go away • Employers will constantly try to ensure that

employees are security conscious – Through access control – Through education methods

• Applications can monitor the employee and their access and . . .

• The employees can “police” themselves and take charge of their environment

38

Page 39: The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

References Common Sense Guide to Prevention and Detection of Insider Threats (CERT), 2005 Insider Threat White Paper, June 2013 http://www.afcea.org/committees/cyber/documents/AFCEAInsiderThreatWhitepaperJune2013Final.pdf http://informationsecurity.report/Resources/Whitepapers/6ea70c75-4977-4d0e-89eb-e0c844a1f9a4_The%20Insider%20Threat%20From%20Risk%20to%20Detection.pdf (Other references are links that are in the presentation) 39

Page 41: The Association between Capacity Management, Cybersecurity ... · The Association between Capacity Management, Cybersecurity, and Insider Threat ... – Something you know ... •

Save the Date! www.cmgimpact.com