Članak Varnostni Forum ožujak 2010. - sudski vještak informatike i telekomunikacija Saša Aksentijević

  • Upload
    axyy

  • View
    218

  • Download
    0

Embed Size (px)

Citation preview

  • 8/9/2019 lanak Varnostni Forum oujak 2010. - sudski vjetak informatike i telekomunikacija Saa Aksentijevi

    1/3

    < VI/MAREC 2010 > 11

    WHAT TO DO IN CASE OF SECURITY BREACH AND

    HOW TO PREVENT THEM?

    tema meseca VAROVANJE KONNIH TOK (ENDPOINT SECURITY)

    SAA AKSENTIJEVI

    There are several typical cases when cor-porate clients ask for services of foren-sic analysis of computer systems and

    analysis of front-end perimeter breaches,the most common ones being litigationsand proceedings towards current or ex-em-ployees. In this article I will try to give someadvice to those responsible for respondingto security breaches and what to do in orderto resolve the situation. It is important tounderline what to do, and even more im-portantly, what NOT TO DO when re-sponsding to security incidents. In mostcases, doing nothing is better than doingjust anything, so I will start with a list of ac-tions not to be done, and that are usually

    prevalent in most organizations that do nothave well established incident response pro-cedures, or when they are entrusted ran-domly, either by hierarchy or by placementof the incident within organization, thusavoiding hot potato in their own lap.

    Saa Aksentijevi spent his entire educational

    and professional life in ICT area. First he

    worked several years as an independent ICT

    consultant, an owner of a start-up company

    and a specialist for mass storagetechnologies.

    During the past seven years he has been

    working in one the worlds biggest

    multinational companies in the oil and gas

    sector which performs off shore and

    onshore turnkey projects. Holds B.Sc title

    in business informatics, Master title in

    ICT Management and ICT Security and

    ISO 27001:2005 Lead Auditor

    certificate. On top of that, he works as

    business strategy consultant

    specialized in safety at work andhuman resource management and

    he is certified ICT forensics court

    expert at Commercial and

    Municipal Courts. Recently, he

    started his ph.d. studies in

    Business economy.

    phone calls. In most cases, the damage isalready done when the information aboutthe security breach or incident has be-come apparent. Even though quick re-sponse is of high importance, it is evenmore important to approach the issuecalmly and in analytical manner avoid-ing an emotional response. If there is a

    reasonable doubt that there has beendamage incurred to the companys re-sources, computer and network systems,companys image and reputation, or thecomputer systems and information havebeen used in a way that is contrary to thebusiness policy and strategy or that thelocal laws have been violated, it is impor-tant to discuss the hard facts in completeconfidentiality with the highest decisionlevels within organization while mini-mizing the number of involved people.The reasoning is simple: security and in-

    formation breaches are often initiated bypeople who are either highly positionedwithin organizations or have directhands-on knowledge of the informationsystem maintenance, therefore wideningthe number of people involved in inci-

    Fig 1: five petals of ICT forensic investigationdonts

    1 Avoid emotional response2 Do not confront suspects and avoid

    evidence contamination

    3 Do not avoid authorities4 Ensure consistent state of hardware5 Do not conduct internal investigation with-

    out professionals

    5

    1

    2

    3

    4

    1. Approach the issue calmly and withoutpanic and avoid any form of written andelectronic communication including

  • 8/9/2019 lanak Varnostni Forum oujak 2010. - sudski vjetak informatike i telekomunikacija Saa Aksentijevi

    2/3

  • 8/9/2019 lanak Varnostni Forum oujak 2010. - sudski vjetak informatike i telekomunikacija Saa Aksentijevi

    3/3

    < VI/MAREC 2010 > 13

    VAROVANJE KONNIH TOK (ENDPOINT SECURITY)

    is to preserve the computer systemsfrom any kind of change. If the compu-ter system is turned off, leave it in suchstate because turning it back on mighterase important evidence. If the compu-ter system is turned on, leave it turnedon but do not use it until it is accessedby the forensic investigator, and ensureconstant power supply. In case of pe-ripheral equipment powered by batter-ies like notebooks, mobile phones, land-line phones or palmtops, they shouldnot be used, but should be connected toexternal power source to ensure that inthe case of deep battery drainage thecontained data does not get erased.

    8. In most cases, it is safe and advisable todisconnect the affected computer orcomputer system from the computerand telephone network by physical re-

    moval of network and telephone cables,in order to preserve the evidence andprevent remote access to computers anddistributed removal of evidence by theperpetrator.

    9. Only after joint decision of decisionmakers in the organization, those re-sponsible for information systems, lawenforcement and forensic investigators,the passwords and logins for system uti-lization should be changed, and e-mailrights and other privileges should be re- voked from those that are suspects in

    the investigation in case of internal em-ployee or internal third-party securitybreaches. This decision could signalthem that they are under investigationso it should be carefully made afterbroad consensus.

    10. All identified evidence should be ade-quately stored under lock and key or ina safe, the list of taken steps should bedetailed with signatures of those re-sponsible for different steps. It is possi-ble to include also external authoritiesin this process to ensure evidence valid-ity and integrity, like public notaries,

    lawyers, forensic investigators, policeofficers and other various trustworthywitnesses.

    11. Finally, the best advice to all corporateorganizations and even mid-sized or-ganizations is to have either umbrellaframe agreements, or at least establishedcontacts with computer forensics ex-perts or consultants, in order to ensureright perimeter breach and incident re-sponse.

    Technical and organizational measuresthat can be undertaken in order to prevent

    or mitigate the risk of perimeter breaches toany part of ISMS can either be proactive orreactive. Forensic response described aboveis a part of the reactive process that not onlyestablishes back endangered services, butalso manages the incurred damage and con-

    sequentially discloses the perpetrator. How-ever, in most cases, the key is in the preven-tion or the proactive behavior. There arefive basic groups of measures that can beimplemented in advance, in order to miti-gate these risks:1. Procedures of purchase and procurement

    of hardware equipment should be alignedwith basic policies of internal and exter-nal perimeter security to ensure bothservice availability and data and systemsconfidentiality and integrity.

    SOCIAL ENGINEERING AWARENESSIS USUALLY IMPORTANT FOR THEORGANIZATION, BECAUSE ALONG

    WITH THE TECHNICAL,ORGANIZATIONAL AND FORENSICRESPONSE, IT SOMETIMES NEEDED

    TO ADDRESS THE ISSUES OF SOCIALENGINEERING WITHIN THE

    ORGANIZATION THAT MIGHT HAVEGRANTED UNAUTHORIZED ACCESSTO THOSE ENTERING THE SECURITY

    PERIMETER.

    2. Hardware and software systems that pre- vent misuse of peripheral, exposedequipment should be in place and alignedwith real business needs. These systemsshould be implemented in order to en-

    sure encryption, rights management oncertain services and document classes,impose service denial or limitation tocertain groups of users, set priorities anduse heuristics to identify possible breach-es and none granted attempts of access.These systems in fact heavily rely on or-ganizational component of ISMS andthey are only as effective as is internallyestablished ISMS. Therefore, investingin intrusion prevention software andhardware without investment in proce-dures and human resources can be some-times expenditure that is not justified by

    obtained results, and that should behigher level of integral security of thesystem or organization as a whole.

    3. As already described, clear policies ofISMS implementation, detailed analysisof procedures and contingency proce-dures, communication channels andhardware resources, disaster recoveryand business continuity and clear SLAwith consultants that are specialists forsecurity incident response are both basicand clear prerequisites for effective man-agement of security breaches in the or-

    ganization. These consultants typicallyoffer services of incident managementon a technical level and they are special-ized to stop any attack or mitigate alreadydone damage.

    4. Social engineering awareness is usually

    important for the organization, becausealong with the technical, organizationaland forensic response, it sometimesneeded to address the issues of social en-gineering within the organization thatmight have granted unauthorized accessto those entering the security perimeter.Sometimes, the organizations want toidentify a single culprit for certain se-curity incident, yet it is clear that multi-ple points-of-failure are often the causeof a security breach. Therefore, the goalof every organization should be in pre- vention and not reactive behavior. Theonly way to mitigate social engineeringrisk is to educate those that are in chargeof technical maintenance of informationsystem components, and also to educatetheir users.

    THE BEST ADVICE TO ALLCORPORATE ORGANIZATIONS AND

    EVEN MID-SIZED ORGANIZATIONS ISTO HAVE EITHER UMBRELLA FRAME

    AGREEMENTS, OR AT LEASTESTABLISHED CONTACTS WITH

    COMPUTER FORENSICS EXPERTS ORCONSULTANTS, IN ORDER TO

    ENSURE RIGHT PERIMETER BREACHAND INCIDENT RESPONSE.

    5. Alignment of incident response withgoals of the organization. Very often therisk of information security or secure pe-rimeter breach is simply accepted, evenwhen it is very high, because the organi-zations silently accept their exposure bytrying to minimize the costs related tocontracts, services, hardware and soft-ware that should be purchased or ob-tained to mitigate the real risk. It is up toevery organization to carefully leveragethe cost of possible data theft, corrup-tion, deletion or security breach againstyearly investments and costs related to

    mitigation measures and possible con-tracts with third parties related to foren-sic and incident response and even pre-vention. Most corporations still have rel-atively modest numbers of in-house au-thorized forensic staff, so they should bevery careful not to fall in the trap of cost-cutting where it is not exactly advisable.Proven fact is that return of investmenton ICT forensics is clearly qualitative andnot quantitative this is something thatstakeholders usually do not value highly.It is even worse when ICT systems are

    not a part of overall business strategy butmerely support functions. In such sce-narios, it is clear that there will be moresecurity breaches and also the forensicand incident response will be difficult,delayed and maybe inadequate.