organizing for resilient operational response

10
Click to edit Master text styles Second level Third level Fourth level Fifth level Global Security Strategy and Diplomacy Trustworthy Computing Organizing for Resilient Organizing for Resilient Operational Response Operational Response Jerry Cochran, CISSP, CISM Director [email protected]

Upload: others

Post on 10-Apr-2022

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Organizing for Resilient Operational Response

Click to edit Master text styles– Second level

Third level– Fourth level

Fifth level

Global Security Strategy and DiplomacyTrustworthy Computing

Organizing for Resilient Organizing for Resilient Operational ResponseOperational Response

Jerry Cochran, CISSP, [email protected]

Page 2: Organizing for Resilient Operational Response

Click to edit Master text styles– Second level

Third level– Fourth level

Fifth level

Global Security Strategy and DiplomacyTrustworthy Computing

Security Ecosystem TrendsSecurity Ecosystem TrendsHorizontal Integration Horizontal Integration

Page 3: Organizing for Resilient Operational Response

Click to edit Master text styles– Second level

Third level– Fourth level

Fifth level

Global Security Strategy and DiplomacyTrustworthy Computing

SoftwareVendor

BotnetHerder

ReverseEngineer

PayloadCoder

POCCoder

MalwareCoder

IDS/AVExpert

BugMiner

ExploitWriter

ActorsUnderstand decision making processEngage all segmentsFollow the “herds”

TechnologyIdentify attack & research trendsExtinguish classes of issues

EconomicsPromote legitimate business modelsChange the Equation:

Increase the cost of malicious activitiesReduce malicious actor ROI

Security Response InteractionsSecurity Response Interactions

Page 4: Organizing for Resilient Operational Response

Click to edit Master text styles– Second level

Third level– Fourth level

Fifth level

Global Security Strategy and DiplomacyTrustworthy Computing

Diverse Response EcosystemDiverse Response Ecosystem

Microsoft Microsoft Security Security

ResponseResponse

Law Law EnforcementEnforcement

Security Security ResearchersResearchers

Security Security VendorsVendors

CERTsCERTs

Microsoft Microsoft Product Product GroupsGroups

Microsoft Microsoft FieldField

Press & Press & AnalystsAnalysts

Microsoft Microsoft PartnersPartners

Microsoft Microsoft CustomersCustomers

Government Government AgenciesAgencies

Page 5: Organizing for Resilient Operational Response

Click to edit Master text styles– Second level

Third level– Fourth level

Fifth level

Global Security Strategy and DiplomacyTrustworthy Computing

Responding to a Security Incident Responding to a Security Incident Microsoft Software Security Incident Response PlanMicrosoft Software Security Incident Response Plan

WatchWatch

Observe Observe environment to environment to detect any potential detect any potential issuesissues

Leverage existing Leverage existing relationships with:relationships with:

PartnersPartnersSecurity Security

researchers researchers and findersand finders

Monitor customer Monitor customer requests and press requests and press inquiriesinquiries

AlertAlertand and

MobilizeMobilize

Convene and Convene and evaluate severityevaluate severity

Mobilize security Mobilize security response teams and response teams and support groups into support groups into two main groups:two main groups:

Emergency Emergency Engineering TeamEngineering Team

Emergency Emergency Communications Communications TeamTeam

Start monitoring Start monitoring WW press interest WW press interest and customer support and customer support lines for this issuelines for this issue

AssessAssessandand

StabilizeStabilize

Assess the Assess the situation and the situation and the technical technical information information availableavailable

Start workingStart workingon solutionon solution

Communicate Communicate initial guidance and initial guidance and workarounds to workarounds to customers, partners customers, partners and pressand press

Notify and inform Notify and inform Microsoft sales and Microsoft sales and support fieldsupport field

ResolveResolve

Provide information Provide information and tools to restore and tools to restore normal operationsnormal operations

Appropriate solution Appropriate solution is provided to is provided to customers, such as a customers, such as a security update, tool security update, tool or fixor fix

Conduct internal Conduct internal process reviews process reviews and gather and gather lessons learnedlessons learned

Page 6: Organizing for Resilient Operational Response

Click to edit Master text styles– Second level

Third level– Fourth level

Fifth level

Global Security Strategy and DiplomacyTrustworthy Computing

Microsoft Response Program Microsoft Response Program AreasAreas

Community‐based defense – Microsoft Active Protection Program 

Rapid response communications – SCPCert

Defensive security knowledge – Exploitability Index

Isolate malicious software – MS Vulnerability Research

Support of worldwide law enforcement and legislatures

Page 7: Organizing for Resilient Operational Response

Click to edit Master text styles– Second level

Third level– Fourth level

Fifth level

Global Security Strategy and DiplomacyTrustworthy Computing

Coordinating MultiCoordinating Multi--vendor vendor response response

International Consortium for Advancement of Security International Consortium for Advancement of Security on the Internet (ICASI)on the Internet (ICASI)

Drive excellence and innovation in security response practices; and Enable ICASI collaboration to proactively analyze, mitigate, and resolve multi-vendor, global security challenges

Five Industry Members: Cisco, IBM, Intel, Juniper, MicrosoftOperational Response Coordination

Unified Security Incident Response Plan

www.icasi.org

Page 8: Organizing for Resilient Operational Response

Click to edit Master text styles– Second level

Third level– Fourth level

Fifth level

Global Security Strategy and DiplomacyTrustworthy Computing

A Security and Resiliency A Security and Resiliency ContinuumContinuum

Page 9: Organizing for Resilient Operational Response

Click to edit Master text styles– Second level

Third level– Fourth level

Fifth level

Global Security Strategy and DiplomacyTrustworthy Computing

Resilient Operational FrameworkResilient Operational Framework

Page 10: Organizing for Resilient Operational Response

Click to edit Master text styles– Second level

Third level– Fourth level

Fifth level

Global Security Strategy and DiplomacyTrustworthy Computing