the integration point of cyber security...anatomy of a cyber attack a majority of cyber attacks...

28
The Integration Point Of Cyber Security Ron Hardy, Tarun Sondhi MSS Product Management

Upload: others

Post on 07-Jun-2020

11 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The Integration Point Of Cyber Security...Anatomy Of a Cyber Attack A majority of cyber attacks follow this path Integration Point Of Cyber Security 5 2 INCURSION 3 DISCOVERY 4 CAPTURE

The Integration Point Of Cyber Security

Ron Hardy, Tarun Sondhi MSS Product Management

Page 2: The Integration Point Of Cyber Security...Anatomy Of a Cyber Attack A majority of cyber attacks follow this path Integration Point Of Cyber Security 5 2 INCURSION 3 DISCOVERY 4 CAPTURE

SYMANTEC VISION 2014

The Cyber Threat Landscape of 2013

Integration Point Of Cyber Security 2

Cyberespionage, Privacy, and Malicious Insider

Mobile & Social Ransomware

Data Breaches Internet of Things

Page 3: The Integration Point Of Cyber Security...Anatomy Of a Cyber Attack A majority of cyber attacks follow this path Integration Point Of Cyber Security 5 2 INCURSION 3 DISCOVERY 4 CAPTURE

SYMANTEC VISION 2014

Zero-Day Vulnerabilities

3

13 15

9 12

14

8

14

23

0

5

10

15

20

25

30

2006 2007 2008 2009 2010 2011 2012 2013

Zero-Day Vulnerabilities, Annual Total, 2006 - 2013 Source: Symantec

23 zero-day vulnerabilities discovered in 2013 Increase from 14 in 2012

More zero-day vulnerabilities discovered in 2013 than in any year since we started tracking

More zero-days in 2013 than in past two years combined

Integration Point Of Cyber Security

Page 4: The Integration Point Of Cyber Security...Anatomy Of a Cyber Attack A majority of cyber attacks follow this path Integration Point Of Cyber Security 5 2 INCURSION 3 DISCOVERY 4 CAPTURE

SYMANTEC VISION 2014

Malicious Websites

With so many vulnerable websites, cybercriminals don’t need to set up own websites to host malware

4

New Unique Malicious Web Domains

56,158

74,001

74,001

-24% 2013

2012

2011

Integration Point Of Cyber Security

Page 5: The Integration Point Of Cyber Security...Anatomy Of a Cyber Attack A majority of cyber attacks follow this path Integration Point Of Cyber Security 5 2 INCURSION 3 DISCOVERY 4 CAPTURE

SYMANTEC VISION 2014

Anatomy Of a Cyber Attack A majority of cyber attacks follow this path

Integration Point Of Cyber Security 5

2 INCURSION

3 DISCOVERY

4 CAPTURE

5 EXFILTRATION

1 RECONNAISANCE

Page 6: The Integration Point Of Cyber Security...Anatomy Of a Cyber Attack A majority of cyber attacks follow this path Integration Point Of Cyber Security 5 2 INCURSION 3 DISCOVERY 4 CAPTURE

SYMANTEC VISION 2014

• The attacker identifies multiple vulnerable employees in the target organization and researches each victim using publicly available sources.

Reconnaissance

1

Target Users Domain Controller

Mail Sensitive Apps

DNS LDAP Directory

Database Web Server

Attacker

Integration Point Of Cyber Security 6

Page 7: The Integration Point Of Cyber Security...Anatomy Of a Cyber Attack A majority of cyber attacks follow this path Integration Point Of Cyber Security 5 2 INCURSION 3 DISCOVERY 4 CAPTURE

SYMANTEC VISION 2014

• Using this intelligence, the attacker may spam the target users or leverage a phishing attack to compromise the target users.

Reconnaissance

1

Target Users Domain Controller

Mail Sensitive Apps

DNS LDAP Directory

Database Web Server

Attacker Malware Server

Integration Point Of Cyber Security 7

Page 8: The Integration Point Of Cyber Security...Anatomy Of a Cyber Attack A majority of cyber attacks follow this path Integration Point Of Cyber Security 5 2 INCURSION 3 DISCOVERY 4 CAPTURE

SYMANTEC VISION 2014

• The attacker may use a Watering Hole attack by compromising a public website the target users are known to frequent as the source of malware.

Reconnaissance

1

Target Users Domain Controller

Mail

Attacker

Sensitive Apps

DNS LDAP Directory

Database Web Server

Public Webserver

Malware Server

Integration Point Of Cyber Security 8

Page 9: The Integration Point Of Cyber Security...Anatomy Of a Cyber Attack A majority of cyber attacks follow this path Integration Point Of Cyber Security 5 2 INCURSION 3 DISCOVERY 4 CAPTURE

SYMANTEC VISION 2014

• The attacker will then attempt to trick the target users into accessing malicious content via email or website.

Incursion

2

Target Users Domain Controller

Mail

Attacker

Sensitive Apps

DNS LDAP Directory

Database Web Server

Public Webserver

Malware Server

9 Integration Point Of Cyber Security

Page 10: The Integration Point Of Cyber Security...Anatomy Of a Cyber Attack A majority of cyber attacks follow this path Integration Point Of Cyber Security 5 2 INCURSION 3 DISCOVERY 4 CAPTURE

SYMANTEC VISION 2014

• The users download the attachments and/or follow the malicious links and become infected by remotely-controlled back-door trojans.

Incursion

2

Target Users Domain Controller

Mail

Attacker

Sensitive Apps

DNS LDAP Directory

Database Web Server

Public Webserver

Malware Server

Integration Point Of Cyber Security 10

Page 11: The Integration Point Of Cyber Security...Anatomy Of a Cyber Attack A majority of cyber attacks follow this path Integration Point Of Cyber Security 5 2 INCURSION 3 DISCOVERY 4 CAPTURE

SYMANTEC VISION 2014

• The attacker sets up a Command-and-Control server

• The backdoor malware contacts the attacker via Command-and-Control channels.

Discovery

3

Target Users Domain Controller

Mail

Attacker

Sensitive Apps

DNS LDAP Directory

Database Web Server

C&C Server Malware Server

Integration Point Of Cyber Security 12

Page 12: The Integration Point Of Cyber Security...Anatomy Of a Cyber Attack A majority of cyber attacks follow this path Integration Point Of Cyber Security 5 2 INCURSION 3 DISCOVERY 4 CAPTURE

SYMANTEC VISION 2014

Database LDAP Directory

Web Server

• The backdoor malware follows the attacker’s instructions to begin stealing logins and passwords as users log into key enterprise servers.

Discovery

3

Target Users Domain Controller

Mail

Attacker

Sensitive Apps

DNS

C&C Server Malware Server

Integration Point Of Cyber Security 13

Page 13: The Integration Point Of Cyber Security...Anatomy Of a Cyber Attack A majority of cyber attacks follow this path Integration Point Of Cyber Security 5 2 INCURSION 3 DISCOVERY 4 CAPTURE

SYMANTEC VISION 2014

• Armed with the proper credentials, the attacker maps the network, expands to other systems and identifies high-valued data assets.

Discovery

3

Target Users Domain Controller

Mail

Attacker

Sensitive Apps

DNS LDAP Directory

Database Web Server

C&C Server Malware Server

Integration Point Of Cyber Security 14

Page 14: The Integration Point Of Cyber Security...Anatomy Of a Cyber Attack A majority of cyber attacks follow this path Integration Point Of Cyber Security 5 2 INCURSION 3 DISCOVERY 4 CAPTURE

SYMANTEC VISION 2014

• The attacker sets up an external Drop server

• Then the attacker copies the desired data to a temporary, on-premise staging server.

Capture

4

Target Users Domain Controller

Mail

Attacker

Sensitive Apps

DNS LDAP Directory

Database Web Server

C&C Server Malware Server Drop Server

Integration Point Of Cyber Security 15

Page 15: The Integration Point Of Cyber Security...Anatomy Of a Cyber Attack A majority of cyber attacks follow this path Integration Point Of Cyber Security 5 2 INCURSION 3 DISCOVERY 4 CAPTURE

SYMANTEC VISION 2014

• The attacker will use a tool to encrypt the credentials and sensitive data

• Then exfiltration the encrypted file to their external drop server.

Exfiltration

5

Target Users Domain Controller

Mail

Attacker

Sensitive Apps

DNS LDAP Directory

Database Web Server

16 16

C&C Server Malware Server Drop Server

Integration Point Of Cyber Security 16

Page 16: The Integration Point Of Cyber Security...Anatomy Of a Cyber Attack A majority of cyber attacks follow this path Integration Point Of Cyber Security 5 2 INCURSION 3 DISCOVERY 4 CAPTURE

SYMANTEC VISION 2014

Cybersecurity Challenges

17

• Firewalls

• IPS/IDS

• Servers

• SIEMs

Collect From All Sources

AGGREGATE

Detect Inidicators of Compromise

DETECT

Understand, contain & remediate

RESPOND

Security Devices

• NGFW

• End points

• Cloud

• Applications

Human/Machine Interactions

• Internal(telemetry)

• External

• Industry vertical

• Vulnerability

Intelligence Sources

Integration Point Of Cyber Security

Page 17: The Integration Point Of Cyber Security...Anatomy Of a Cyber Attack A majority of cyber attacks follow this path Integration Point Of Cyber Security 5 2 INCURSION 3 DISCOVERY 4 CAPTURE

SYMANTEC VISION 2014

Integration Point Of Cyber Security

Integration Point Of Cyber Security 18

Page 18: The Integration Point Of Cyber Security...Anatomy Of a Cyber Attack A majority of cyber attacks follow this path Integration Point Of Cyber Security 5 2 INCURSION 3 DISCOVERY 4 CAPTURE

SYMANTEC VISION 2014

What is Integration? A Google definition…

19 Integration Point Of Cyber Security

2. Mathematics the finding of an integral or integrals. "integration of an ordinary differential equation”

3. Psychology the coordination of processes in the system, including diverse sensory information and motor impulses. 4. Psychoanalysis the process by which a well-balanced psyche becomes whole as the developing ego organizes the id, and the state that results or that treatment seeks to create or restore by countering the fragmenting effect of defense mechanisms.

Page 19: The Integration Point Of Cyber Security...Anatomy Of a Cyber Attack A majority of cyber attacks follow this path Integration Point Of Cyber Security 5 2 INCURSION 3 DISCOVERY 4 CAPTURE

SYMANTEC VISION 2014

Integration Point Requirements

Integration Point Of Cyber Security 20

Page 20: The Integration Point Of Cyber Security...Anatomy Of a Cyber Attack A majority of cyber attacks follow this path Integration Point Of Cyber Security 5 2 INCURSION 3 DISCOVERY 4 CAPTURE

SYMANTEC VISION 2014

Integration Point Requirements

Integration Point Of Cyber Security 21

• Integration Point Technical Characteristics…

1. Data collection from endpoint, network, cloud and app

2. Putting data into context

3. Gaining a global view of security intelligence

4. Flexible analysis to process the multi-TBs of data

Page 21: The Integration Point Of Cyber Security...Anatomy Of a Cyber Attack A majority of cyber attacks follow this path Integration Point Of Cyber Security 5 2 INCURSION 3 DISCOVERY 4 CAPTURE

SYMANTEC VISION 2014

Integration Point Tool Options for the Job

Integration Point Of Cyber Security 22

Perform all the activities within the Security Monitoring Centre from within the customer environment

Insourcing

Outsource certain activities to a third party whilst retaining critical components within the customer control

Hybrid

Engage a third party to perform SOC activities on behalf of the customer

Outsourcing

Known Threat ID

Log Management

Collectors

Canned Reports

Raw Log Storage

Log Search

Incident Research

Anomoly ID

Workflow tools/API

Incident Analysis Tool

Customer operated/managed threat ID

Custom Rules

Custom Reports

Custom Collectors

Local Storage/Compute/Power/Maintenace

3rd party intelligence feeds (some)

Software Maintenance Required (ad hoc)

SIEM/Log Management Managed Services

Always-on - 24x7 monitoring and management

Active Threat ID/Rules team

Threat Analyst Reviewed Incidents

Web-based UI

Global Intelligence Network

Escalation Process

Global SOCs

Cloud-based Storage/Compute/Power/Maintenance

Page 22: The Integration Point Of Cyber Security...Anatomy Of a Cyber Attack A majority of cyber attacks follow this path Integration Point Of Cyber Security 5 2 INCURSION 3 DISCOVERY 4 CAPTURE

SYMANTEC VISION 2014

Outsource

Cost Low CAPEX

Predictive OPEX

Control Lack of Environment Knowledge

SLA Based Services Difficult to Terminate / Change

Time to Value Handover, Service Definition

and SLA Measurement

Skill Set 3rd Party Responsibility

Hybrid

Cost Moderate CAPEX Predictive OPEX

Control Local and 3rd Party Expertise

Partial SLA Service Flexible Future Change

Time to Value Blended Approach

Skill Set Staff Augmentation

Integration Point Business Characteristics Comparisons

Integration Point Of Cyber Security 23

Insource

Cost High CAPEX

Variable OPEX

Control Team Knows Environment Potentially Most Efficient

Complex to Manage

Time to Value People Recruitment, Tools

Procurement & Configuration

Skill Set Hard to Acquire, Retain, Train

Page 23: The Integration Point Of Cyber Security...Anatomy Of a Cyber Attack A majority of cyber attacks follow this path Integration Point Of Cyber Security 5 2 INCURSION 3 DISCOVERY 4 CAPTURE

SYMANTEC VISION 2014

How did Australia’s largest Media Company select a Integration Point for CyberSecurity?

Cost

Control

Time

Skill set

Situational Awareness

Contextual awareness

Global Intelligence

Analysis

Presentation Identifier Goes Here 24

Page 24: The Integration Point Of Cyber Security...Anatomy Of a Cyber Attack A majority of cyber attacks follow this path Integration Point Of Cyber Security 5 2 INCURSION 3 DISCOVERY 4 CAPTURE

SYMANTEC VISION 2014

How did Australia’s largest Media Company select a Integration Point for CyberSecurity?

Kevin Shaw – CISO Foxtel

Foxtel, Melbourne, Australia

25

Page 25: The Integration Point Of Cyber Security...Anatomy Of a Cyber Attack A majority of cyber attacks follow this path Integration Point Of Cyber Security 5 2 INCURSION 3 DISCOVERY 4 CAPTURE

SYMANTEC VISION 2014

The Integration Point for Cyber Security

26

Collect From All Sources

AGGREGATE

Detect Inidicators of Compromise

DETECT

Understand, contain & remediate

RESPOND

Situational & Contextual awareness; Global Intelligence; Threat

Analysis

Toolset Options

Cost Effectiveness

Control Needs

Skill set

Integration Point Criteria

Integration Point Of Cyber Security

Page 26: The Integration Point Of Cyber Security...Anatomy Of a Cyber Attack A majority of cyber attacks follow this path Integration Point Of Cyber Security 5 2 INCURSION 3 DISCOVERY 4 CAPTURE

SYMANTEC VISION 2014

Information Security Service Integration Is the Key

Symantec Confidential - NDA Audiences Only

Security Intelligence

Managed Security Services (MSS)

Advanced Threat Protection

Incident Response Security Simulation

Log Collection & Archiving

Log Analysis & Passive Discovery

27 27

360o Contextual View

Threat & Vuln Management

Intelligence Correlations

Controlled Malware Testing

Incident Response & Remediation

Real-time Monitoring

Applied Intelligence Analysis & Reporting

Symantec & 3rd Party Solutions

Cyber Intelligence

Asset Discovery

Policy/Controls & Benchmarking

Compliance & Audit Reports

Advanced Threat Protection Engine

Forensic Analysis & Visualization

Network & Host Forensics

Intelligence Fusion Cells

Global Data Collection

Big Data Analytics

Page 27: The Integration Point Of Cyber Security...Anatomy Of a Cyber Attack A majority of cyber attacks follow this path Integration Point Of Cyber Security 5 2 INCURSION 3 DISCOVERY 4 CAPTURE

SYMANTEC VISION 2014

Three things you should do when you leave this room..

Use the criteria to determine gaps in your cyberstrategy

…understand your security posture

Presentation Identifier Goes Here 28

1

2

3

Consider your options to fill the gaps

…Cybercriminals are exploiting these gaps

If you need help, contact Symantec Sales Rep and ask for a Information Security Services deep dive.

Page 28: The Integration Point Of Cyber Security...Anatomy Of a Cyber Attack A majority of cyber attacks follow this path Integration Point Of Cyber Security 5 2 INCURSION 3 DISCOVERY 4 CAPTURE

Thank you!

29

YOUR FEEDBACK IS VALUABLE TO US!

Please take a few minutes to fill out the short session survey available on the mobile app—the survey will be available shortly after the session ends. Watch for and complete the more extensive post-event survey that will arrive via email a few days after the conference.

To download the app, go to https://vision2014.quickmobile.com or search for Vision 2014 in the iTunes or Android stores.