27
A Call to Arms: Using a Working Model of the Attack Surface to Improve Incident Response Gidi Cohen | CEO & Founder | Skybox Security

A Call to Arms: Using a Working Model of the Attack Surface to Improve Incident Response

Embed Size (px)

Citation preview

Page 1: A Call to Arms: Using a Working Model of the Attack Surface to Improve Incident Response

A Call to Arms: Using a Working Model of the Attack Surface to Improve Incident Response

Gidi Cohen | CEO & Founder | Skybox Security

Page 2: A Call to Arms: Using a Working Model of the Attack Surface to Improve Incident Response

Sources: Spending-IDC & Gartner; Costs – Center for Strategic and Interational Studies; Chart - 2015 Verizon Data Breach Investigations Report

The Defender Deficit

£260B annual cost of cyber crime £45B annual

spend on solutions

NO CHANGE in “defender gap”

In 10 years!

80% of AttackersCompromise Network in Days

25% of DefendersDiscover Attacks in Days

Page 3: A Call to Arms: Using a Working Model of the Attack Surface to Improve Incident Response

Peacetime

From Peacetime to Wartime Mindset

Process Focused

Advanced Planning

Compliance Driven

Battlefield View

Attack Detection

Jump Teams

Wartime

Page 4: A Call to Arms: Using a Working Model of the Attack Surface to Improve Incident Response

What’s your Incident Response Time?

Sources: ISACA.org for Incident Response process, Ponemon 2014 Cost of Cyber Crime Study for IR times

+45 days to resolve

170 days to detect

Incident Response Process

Page 5: A Call to Arms: Using a Working Model of the Attack Surface to Improve Incident Response

Insert graph

What Takes So Long?

Potential ExfiltrationSuspicious outbound data Shut down unnecessary ports

• Does this event match a possible attack vector?

• What assets are exposed through that access path?

• Which security controls can we leverage?

• Will a firewall change disrupt necessary services?

Page 6: A Call to Arms: Using a Working Model of the Attack Surface to Improve Incident Response

Ongoing Visibility of the Battlefield

Security ControlsFirewalls

IPSVPNs

Page 7: A Call to Arms: Using a Working Model of the Attack Surface to Improve Incident Response

Ongoing Visibility of the Battlefield

Security ControlsFirewalls

IPSVPNs

Network TopologyRouters

Load BalancersSwitches

Page 8: A Call to Arms: Using a Working Model of the Attack Surface to Improve Incident Response

Ongoing Visibility of the Battlefield

Security ControlsFirewalls

IPSVPNs

Network TopologyRouters

Load BalancersSwitches

AssetsServers

WorkstationsNetworks

Page 9: A Call to Arms: Using a Working Model of the Attack Surface to Improve Incident Response

Ongoing Visibility of the Battlefield

Security ControlsFirewalls

IPSVPNs

Network TopologyRouters

Load BalancersSwitches

AssetsServers

WorkstationsNetworks

VulnerabilitiesLocationCriticality

Page 10: A Call to Arms: Using a Working Model of the Attack Surface to Improve Incident Response

Ongoing Visibility of the Battlefield

Network TopologyRouters

Load BalancersSwitches

AssetsServers

WorkstationsNetworks

VulnerabilitiesLocationCriticality

Threat ActorsHackersInsidersWorms

Security ControlsFirewalls

IPSVPNs

Page 11: A Call to Arms: Using a Working Model of the Attack Surface to Improve Incident Response

Ongoing Visibility of the Battlefield

Security ControlsFirewalls

IPSVPNs

Network TopologyRouters

Load BalancersSwitches

AssetsServers

WorkstationsNetworks

VulnerabilitiesLocationCriticality

Threat ActorsHackersInsidersWorms

The attack surface is the sum of all reachable and

exploitable attack vectors against an organization.

Page 12: A Call to Arms: Using a Working Model of the Attack Surface to Improve Incident Response

Apply Understanding of the Attack Surface

With Knowledge of the Attack Surface

Improve planning

Reduce mean time to detect

Speed containment actions

Verify resolution

Page 13: A Call to Arms: Using a Working Model of the Attack Surface to Improve Incident Response

Preparation: Reduce Attack Vectors

• Target concentrations of vulnerabilities

• Address zoning violations

• Fix risky firewall rules

Page 14: A Call to Arms: Using a Working Model of the Attack Surface to Improve Incident Response

Preparation: Optimise SIEM Monitoring

SIEMCreate a SIEM watch list

• Watch specific servers with known vulnerabilities

• Monitor access paths to high-value assets

• Look for services usedin recent threats

Page 15: A Call to Arms: Using a Working Model of the Attack Surface to Improve Incident Response

High volume to review

False positives

Detection: Confirm Real Attacks Fast

Attack Detection

SIEM Level 1SOC Analysts

Level 2 IR Team

BEFORE

Page 16: A Call to Arms: Using a Working Model of the Attack Surface to Improve Incident Response

High volume to review

False positives

Detection: Confirm Real Attacks Fast

Attack Detection

SIEM Level 1SOC Analysts

Level 2 IR TeamBEFOREAFTER

Get attack contextAssets at riskPrioritisation

Page 17: A Call to Arms: Using a Working Model of the Attack Surface to Improve Incident Response

Analysis: Triage Based on Impact to Assets

Page 18: A Call to Arms: Using a Working Model of the Attack Surface to Improve Incident Response

Analysis: Triage Based on Impact to Assets

Page 19: A Call to Arms: Using a Working Model of the Attack Surface to Improve Incident Response

Analysis: Triage Based on Impact to Assets

Flag high-risk vector

Alert: anomalous

behavior

Low risk

Alert: unexpected

router change

Multiple ways to compromise

finance server

Page 20: A Call to Arms: Using a Working Model of the Attack Surface to Improve Incident Response

Contain: Fast Zero-Day Response

Source: ISACA.org

Attack Surface Model

New Vulnerability Identified!

CVE-2015-01234

• Which systems have the vulnerability?

• Are they part of an attack vector?

• Triage responseThreat

Vulnerability

Asset

Page 21: A Call to Arms: Using a Working Model of the Attack Surface to Improve Incident Response

Contain: Understand Scope, Exfiltration Paths

Exfiltration Path

Page 22: A Call to Arms: Using a Working Model of the Attack Surface to Improve Incident Response

Contain: Understand Scope, Exfiltration Paths

Exfiltration Path

Page 23: A Call to Arms: Using a Working Model of the Attack Surface to Improve Incident Response

Contain: Understand Scope, Exfiltration Paths

Recommended Actions• Generate firewall

change requests to block exfil route

• Switch advanced malware to block mode

• Enable IPS signature

Exfiltration Path

Page 24: A Call to Arms: Using a Working Model of the Attack Surface to Improve Incident Response

Post-Incident Activity

Attack Surface Model

Long term architectural changesNetwork segmentation

Use of advanced controlsVerify risk elimination

Page 25: A Call to Arms: Using a Working Model of the Attack Surface to Improve Incident Response

Summary: Using Attack Surface for IR

Incident Response Process

Incorporate broad set of data sources

for full attack surface view

Arm the IR teamTools to correlate, query,

and monitor attack surfaceSpeed detection and

analysis

Use contextual info on likely next stepsContain attacks and

limit damage

Page 26: A Call to Arms: Using a Working Model of the Attack Surface to Improve Incident Response

Visit Skybox Security at Infosec

• Powerful platform for visibility of the attack surface• Vulnerability and threat management• Firewall management• Network visibility and compliance

Risk Analytics for Cyber Security

Page 27: A Call to Arms: Using a Working Model of the Attack Surface to Improve Incident Response

Thank you