2011-10 The Path to Compliance

Preview:

DESCRIPTION

2011-10 The Path to Compliance by Mark Brooks, Alert Logic

Citation preview

Alert Logic

The Path to Compliance

September 2011

Agenda

• State of the security market– Organized Cybercrime– Common Attack Methodology

• Compliance defined– The Compliance Two-Step– The Obligatory Response

• A Security First Approach

• Real World Examples

STATE OF THE SECURITY MARKET

Recent Attacks

4

May 4, 2009 Virginia Prescription Monitoring Program, Richmond VirginiaCompromised Records: 531,400Type of Attack: Outside HackerOutcome: Attacker is still at-large. State notified 531,400 people of the breach by letter

November 10, 2010 Holy Cross Hospital, Ft. Lauderdale FloridaCompromised Records: 44,000 (1500 Confirmed)Type of Attack: Internal Employee gained access to server Outcome: Employee was fired and arrested. 5 other suspects have been charged.

February 10, 2011 Texas Children’s Hospital, Houston TexasCompromised Records: 19,264Type of Attack: MalwareOutcome: Attacker is still at-large. All patients were notified by letter

2010 Data Breaches

Who is breaching data?70% External Sources (-9%)

48% Inside Sources (+26%)

11% Business Partners (-23%)

27% Multiple Partners (-12%)

How do breaches occur?48% Involved Privilege Misuse (+26%)

40% Hacking (-24%)

38% Malicious Code (<>)

28% Employed Social Tactics (+16%)

15% Physical Threats (+6%)

What Commonalities Exist85% Attacks were not highly difficult

85% Breaches were the result of opportunistic attacks

96% Were considered avoidable through reasonable controls

*Statistics from 2010 Verizon Business Data Breach Investigation Report5

ORGANIZED CYBERCRIME

The Numbers– Global computer crime market estimated

to be $7B in 20101

– Russia responsible for $2.5B– Growing ~35% per year overall

Interesting Trends– Increase of specialization of participants– On-Demand and Pay-Per-Use services – Developing C2C market

Cybercrime Market

1 Group-IB Report - 2010

Crime Pays

Stolen Assets/Criminal Activity Payout

Credit Card Details $5-10, expected $1-2 post PSN

Bank Credentials $80-$700

Bank Transfers 10% to 40% of amount transferred

Social Security Numbers $30-50

0Day Exploits $5,000 - $100,000

Exploits for published vulnerabilities $5,000 - $50,000

Exploit Packs $200 - $5,000

Malware Pay-Per-Install Up to $1.50 for US victims, $0.15-0.60 for other countries

How it Works – The Business Model

1Purchase Malware Pack

2

4

Infect Users, P2P seeding, XSS

Register With Cybercrime Group

DISTRIBUTOR

CYBERCRIME GROUP

3

VICTIMS

Infected Users Send Data to Group

BLACK MARKET

5Data Sold Wholesale

6 Payment Made

COMMON ATTACK METHODOLOGY

Hacker Profile– Talented individual – Young, bored

Motivation– To prove a point– Curiosity – Credibility

Attack Methods– Worms targeting memory vulns in network services– Attack payload not usually customized

Traditional Attacks

Hacker Profile– Organized Crime (84%)– Dedicated teams who are paid– Teams often work for criminal

organizations as a career

Motivation – Targeted attack for financial gain – Desire anonymity

Attack Methods– Vulnerable web applications– Client side applications – Malware used to keep control

Modern Attack Profile

Delivery/Attack Surface

Infection Method Difficulty Effectiveness

Websites Easy Good

P2P Networks Easy Medium

SPAM Easy Medium

Paid Ads Medium Medium

Phishing Easy Poor

Traditional Network Exploit Difficult Poor

Blackhat SEO Medium Medium

Cross Site Scripting‐ Most sites are vulnerable‐ Easy to find and users trust the websites

SQL Injection‐ Easy to find‐ Very common

Source: Veracode State of Software Security Report, April 2011

COMPLIANCE DEFINED

Security and Compliance Management is Becoming More Difficult Every Day

Increasing number and sophistication in security threats

Increasing complexity in maintaining compliance

Increasing cost to support and maintain (HW, SW, FTEs)

• Improved organization and sophistication of attackers• Prolonged and persistent targeting with compressed timelines to react• Rise of contaminated spam, botnets, and social engineering for malicious breaches

• Continuous updates in requirements and reporting standards• Adoption of new regulatory compliance standards• Manual and laborious processes

• Training on the latest compliance requirements and security threats• Updating, patching, and maintaining software, scripts, and processes• Rollout of new HW/SW to keep up with increased demand

Complicated and Costly Compliance Picture for Healthcare

Implement People, Process, & Technology for Compliance• HIPAA §164.308 Administrative safeguards• HIPAA §164.312 Technical safeguards

Penalties for EMR Non-Compliance Coming into Effect• Penalties and Fees up to $1.5M for neglect• Data Breach Notification to HHS and Local Media for breaches

>500 patients

What about PCI compliance?• PCI applies to every entity that stores, processes,

or transmits cardholder information• Patient billing, pharmacy, etc.

HIPAA & HITECHVulnerability Assessment

164.308 (a)(1)(ii)(A)Risk Analysis – Conduct Vulnerability Assessment

IDS/IPS/Log Management

164.308 (a)(1)(ii)(B)Risk Management – Implement security measures to reduce risk of security breaches

164.308 (a)(1)(ii)(D)Information System Activity Review – Procedures to review system activity

164.308 (a)(5)(ii)(B)Protection from Malicious Software – Procedures to guard against malicious software host/network IPS

164.308 (a)(6)(i)Log-in Monitoring – Procedures and monitoring for log-in attempts on host IDS

164.308 (a)(6)(iii)Response & Reporting – Mitigate and document security incidents

Log Management 164.312 (b)Audit Controls – Procedures and mechanisms for monitoring system activity

Compliance… a costly problem

PCI DSSPenalties: fines, loss of credit card processing, and level 1 merchant requirements

SOX (CobiT)Penalties: fines up to $5M, up to 10 year in prison

Vulnerability Assessment

6.2 Identify newly discovered security vulnerabilities

11.2 Perform network vulnerability scans quarterly by an ASV

DS 5.9 Malicious Software Prevention, Detection, and Correction“put preventive, detection, and corrective measures in place (especially up-to-date security patches and virus control) across the organization to protect information systems and technology from malware (e.g., viruses, worms, spyware, spam)”

Intrusion Detection

5.1.1 Monitor zero day attacks not covered by Anti-Virus

11.4 Maintain IDS/IPS to monitor & alert personnel, keep engines up to date

DS 5.6 Security Incident Definition“clearly define and communicate the characteristics of potential security incidents so that they can be properly classified and treated by the incident and problem management process”

DS 5.10 Network Security“use security techniques and related management procedures (e.g., firewalls, security appliances, network segmentation, intrusion detection) to authorize access and control information flows from and to networks.”

Log Management

10.2 Automated audit trails10.3 Capture audit trails10.5 Secure logs10.6 Review logs at least daily10.7 Maintain logs online for 3 months10.7 Retain audit trail for at least 1 year

DS 5.5 Security Testing, Surveillance, and Monitoring“…a logging and monitoring function will enable the early prevention and/or detection and subsequent timely reporting of unusual and/or abnormal activities that may need to be addressed.”

Compliance… a costly problem

The Ugly Truth

• Compliance is the output of post-mortem– Some organization did not secure their data, and now everyone else

must deploy solutions, software, policies, and guidelines

• Compliance will always be a step behind the latest threat

• Compliance will NEVER mean you are secure

• Compliance mandates will continually be expanded, as hospitals, insurance companies, and other health care resources experience breaches, privacy violations, and security issues

The Compliance Two-Step

• Organizations continue to check the compliance box and then struggle to maintain compliance

• IDS, Log Manamement and Vulnerability Scanning are the most expensive and resource intensive – and also the most difficult for organizations to implement and maintain

• Attacks are not being detected in an acceptable time

• Organizations that achieve compliance are able to protect their patient data

• Companies will continue to fail to achieve compliance due to lack of time, budget, and technical resources

Protective Technical Controls• Firewalls• Routers• Antivirus• System Patching• Complex Passwords• Data Access Controls• Whole Disk Encryption• VPNs

The Obligatory Response

A SECURITY FIRST APPROACH

Analyzing the Facts

• Companies aren‘t detecting attacks in an effective way

– Why? Chasing false alarms, other priorities, etc…

• Companies are not focusing on continuous security– Too many companies check a box and move on

• Companies must review log data– Companies need to be more vigilant in this area

• Most of the 99% of breaches could have been caught

– With effective intrusion detection systems, log management and vulnerability assessment

25

Common Trends

• Strong push towards SaaS and MSSPs to augment their staff

• Some are looking towards cloud-based technologies to reduce technology expenditures

• Moving away from general standards like HIPAA and SOX towards PCI and DISA Standards

• Deploying centralization solutions to tie together their compliance efforts

• Using GRC tools

AV Isn’t Enough– Malware evolves ahead of AV signatures

Education

– At least half of the executables on P2P network infected – Don’t install software from untrusted sources– Safe browsing– Flash drives

Defending Users

Close your Perimeter (egress too!)

Patch your systems

Vulnerability scanning– Automated vuln scans & review them regularly

IDS– Attempted botnet comm, network scans– Propogation over RPC exploits, brute forcing Windows shares

Log Management– Account lockouts due to brute force– Proxy logs

WAF

Infrastructure Defense

REAL WORLD EXAMPLES

Use Case #1: Security Issues and Identity Theft

• Scenario• One of your system administrators returned from a two-week vacation

and was unable to login• He believes his account has been locked out, but he’s not sure why

•Key Questions to Answer:• Why is the account locked out? • Where did the lock out occur?• When did it occur?• How did it occur?

Effective Log Management Can Prevent Breaches and Provide Compliance

Breached customer records cost businesses an average of $202 per record in 20091

“86% of victims had evidence of the breach in their logs…”“in most attacks, the victim has several days or more before data was compromised.”2

Suspicious Log Activity

Intrusion or Penetration

Breach orMalicious Activity

IT alerted

Log collection and monitoring detects activity; sends alert

SOC is alerted and security containment steps are executed

Too Late

Breach is Avoided

Without Log Mgmt

WithLog Mgmt

Compliance and Security Simplified:Security Issues and Identity Theft

Investigating Monitoring Alerting

WithoutLog Management

Log in to a domain controller. Examine the AD object for the user to determine the time of lock-out. Review the logs on each domain controller manually.

Log in to a domain controller daily. Create a filter on the username every day, and review the logs. Repeat process for every domain controller.

Wait for the System Admin to call if their account is locked out again.

Issue: Manual & Timely Issue: Expensive Issue: Reactive

Key Compliance and Security Activities

WithLog Management

• Common index with search capabilities. • Automated alerting and notification.• Regular reporting and forensics

Use Case #2: Audit Resolution Challenges

• Scenario• A new policy is initiated to require any new Domain Administrators to

only be added by the Security Department• A few weeks later, a routine audit discovers some new members in the

Domain Admin Group

•Key Questions to Answer:• When were these users added?• Who added them?• Who was added?

Compliance and Security Simplified:Audit Resolution Challenges

Investigating Monitoring Alerting

WithoutLog Management

Log in to a domain controller. Review the logs for group changes. Hope the logs are still on the system and have not rolled over. Repeat for each DC.

Log in to a domain controller daily. Review Domain Admins group and verify no one has been added or removed since the last review.

Wait for the System Admin to call if their account is locked out again.

Issue: Manual & Timely Issue: Expensive Issue: Reactive

Key Compliance and Security Activities

WithLog Management

• Search on the Group Member Added and filter on Domain Admin. • Save View and have the report emailed on a regular basis.• Build an automated alert to notify when users added, removed, changed

Use Case #3: Hacker/Attacker

• Scenario• For several weeks your network has been running slow• Some systems have been performing abnormally and there are new

user accounts that cannot be tied back to a particular user• Suddenly, you receive an odd e-mail from an alleged hacker who claims

to have access to sensitive patient files

•Key Questions to Answer:• Have you been hacked?• If so, when did it begin?• How would you respond?• Should you notify the media?

Compliance and Security Simplified:Business Critical Applications

Investigating Monitoring Alerting

WithoutIntrusion Detection

Log in to the firewall/VPN gateway, look through the logs (if it can store the logs). Look for disconnect messages, and errors. Etc.

Log in to VPN. Search inside of the VPN Disconnect messages. See what time the disconnect occurred and all errors related to the VPN session.

Wait for the Network Engineer to log in and discover it is down.

Issue: Manual & Timely Issue: Expensive Issue: Reactive

Key Compliance and Security Activities

With Intrusion Detection

• Use logs to search for suspicious message, account creation, firewall messages.

• Use IDS to look for attack attempts.• Focus efforts on actionable security incidents

With Complicated Threats, There is a Need for Security Expertise

Lots of point solutions, but difficult to consume all the data

It is nearly impossible to be aware of all forms of attacks and attack-responses, and perform all the other functions expected relating to daily operations

Suspicious Log Activity

Intrusion or Penetration

Breach orMalicious Activity

IT alerted

Log collection and monitoring detects activity; sends alert

Security containment steps are executed

Too Late

Breach is Avoided

Without IDS

With IDS

CONCLUSION

Meeting the Challenges Head On

• Move from manual to automated log management– Keys to success: effective and sustainable log management and review

• Choose a vulnerability assessment solution that aligns with your network

– Keys to success: centralized view and remediation knowledge

• Select an intrusion protection solution that doesn’t require costly implementation, configuration and management

– Keys to success: Implement a solution that adapts to your network security policies and minimizes the work load of your resources

Q&A

Who is Alert Logic?Founded: 2002Customers: 1,200+, spanning 3 continentsStaff: 100+Service Renewal Rate: ~99%Experienced ManagementProfitable w/ Strong Balance Sheet

• Easy to implement and deploy• Flexible and Scalable

• Improve security and threat visibility• Meet compliance requirements• Lower, more predictable costs• Quicker Time-to-Value

Log ManagerThreat Manager

Patented SaaS Products

• 24x7 Security Operations Center• GIAC-certified security analysts

LogReviewActiveWatch

Integrated Services

Delivering measurable customer benefits

Contact

• Mark Brooks

• mbrooks@alertlogic.com

Recommended