30
Cybersecurity Incident Response How to Survive an Incident presentation for Arkansas Hospital Association April 6, 2017 Tom Walsh, CISSP tw-Security Overland Park, KS Copyright © 2017, tw-Security 1

Cybersecurity Incident Response · 2017-04-11 · • Review the incident response phases • Discuss incident response team (IRT), meetings, tools, and documentation • Explain

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Cybersecurity Incident Response · 2017-04-11 · • Review the incident response phases • Discuss incident response team (IRT), meetings, tools, and documentation • Explain

Cybersecurity Incident Response

How to Survive an Incident presentation for

Arkansas Hospital Association April 6, 2017

Tom Walsh, CISSP tw-Security

Overland Park, KS

Copyright © 2017, tw-Security 1

Page 2: Cybersecurity Incident Response · 2017-04-11 · • Review the incident response phases • Discuss incident response team (IRT), meetings, tools, and documentation • Explain

Internet of Things

• The “Internet of Things” (IoT) makes some tasks easier – Mobile device apps – Smart appliances, vehicles

• Remote control and monitoring are widely used in all industries – SCADA (supervisory control and data acquisition) – Biomedical devices

• IoT increases risks for cyber attacks / hacking

Copyright © 2016, tw-Security 2

Page 3: Cybersecurity Incident Response · 2017-04-11 · • Review the incident response phases • Discuss incident response team (IRT), meetings, tools, and documentation • Explain

The Reality of Today’s Cyber World We live in a time where one computer user clicking on one link within an email or while visiting a website can lead to a catastrophic compromise of the organization’s data or infrastructure.

(Reference: Gene Abramov, Depth Security)

Copyright © 2016, tw-Security 3

Page 4: Cybersecurity Incident Response · 2017-04-11 · • Review the incident response phases • Discuss incident response team (IRT), meetings, tools, and documentation • Explain

Incident and Breach Response

An effective incident response program will benefit your organization by: • Reducing recovery time • Protect the organization’s reputation • Improving your legal defensibility • Providing a framework for continuous improvement • Reducing costs

Copyright © 2017, tw-Security 4

Page 5: Cybersecurity Incident Response · 2017-04-11 · • Review the incident response phases • Discuss incident response team (IRT), meetings, tools, and documentation • Explain

Incident and Breach Response

How important is incident and breach response? (Jan 2017) The OCR fined Presence Health, a large health care network in Illinois, $475,000 and issued a corrective action plan (CAP) for being too slow in reporting a breach!

It’s not the event, but your reaction to the event that matters the most!

Copyright © 2017, tw-Security 5

Page 6: Cybersecurity Incident Response · 2017-04-11 · • Review the incident response phases • Discuss incident response team (IRT), meetings, tools, and documentation • Explain

Objectives • Explain terminologies and gaps in communication • Review the incident response phases • Discuss incident response team (IRT), meetings,

tools, and documentation • Explain the value in having an incident flow diagram

supported by well-defined playbooks, particularly for handling evidence procedures

• Share lessons learned – some the hard way • Conduct an audience exercise • Provide an opportunity to ask questions

Copyright © 2017, tw-Security 6

Page 7: Cybersecurity Incident Response · 2017-04-11 · • Review the incident response phases • Discuss incident response team (IRT), meetings, tools, and documentation • Explain

Introduction – Tom Walsh • Certified Information Systems Security

Professional (CISSP) • 14 years – tw-Security (formerly: Tom Walsh Consulting, LLC)

• Co-authored four books on healthcare security – Published by AMA, AHIMA, and HIMSS (two books)

• Former information security manager for large healthcare system in Kansas City metro area

• Started working in information security in 1992 • A little nerdy, but overall, a nice guy

Copyright © 2017, tw-Security 7

Page 8: Cybersecurity Incident Response · 2017-04-11 · • Review the incident response phases • Discuss incident response team (IRT), meetings, tools, and documentation • Explain

Terminology Bridging the gap in communications –

Communication and collaboration is crucial when there is an incident or when a suspected data breach has occurred

Copyright © 2017, tw-Security 8

Page 9: Cybersecurity Incident Response · 2017-04-11 · • Review the incident response phases • Discuss incident response team (IRT), meetings, tools, and documentation • Explain

• Security Incident – Security incident means the attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system. Source: HIPAA Security Rule, §164.304 Definitions

• Information Security Incident – An adverse event

whereby some aspect of computer security could be threatened: loss of data confidentiality, disruption of data or system integrity, or disruption or denial of availability. Source: NIST Special Pub 800-61 Computer Security Incident Handling Guide

Terminology

9 Copyright © 2017, tw-Security

Page 10: Cybersecurity Incident Response · 2017-04-11 · • Review the incident response phases • Discuss incident response team (IRT), meetings, tools, and documentation • Explain

• Breach – An “unauthorized acquisition, access, use or disclosure of PHI which compromises the security or privacy of the PHI, except where an unauthorized person to whom such information is disclosed would not reasonably have been able to retain such information.” Source: The Health Information Technology for Economic and Clinical Health (HITECH) Act

• Breach – An unauthorized act that circumvents or bypasses network (perimeter) security controls Source: Experience in working with IT staff

Terminology

10 Copyright © 2017, tw-Security

Page 11: Cybersecurity Incident Response · 2017-04-11 · • Review the incident response phases • Discuss incident response team (IRT), meetings, tools, and documentation • Explain

Terminology

• Policies – a group of written documents outlining: principles, behavior, standard practices, processes, and management’s expectations

• Policies – control settings that define how an

application or system will behave – Firewall policies, Active Directory (AD) Group Policy

Objective (GPO), etc.)

Copyright © 2017, tw-Security 11

Page 12: Cybersecurity Incident Response · 2017-04-11 · • Review the incident response phases • Discuss incident response team (IRT), meetings, tools, and documentation • Explain

Incident Response Phases Incident response is a skill developed over time

Practice makes perfect

Copyright © 2017, tw-Security 12

Page 13: Cybersecurity Incident Response · 2017-04-11 · • Review the incident response phases • Discuss incident response team (IRT), meetings, tools, and documentation • Explain

Incident Response Phases

1. Detection 2. Analysis 3. Containment 4. Eradication 5. Recovery 6. Post Incident Activities

Copyright © 2017, tw-Security 13

Source: NIST SP 800-61 Rev. 2, Computer Security Incident Handling Guide

Page 14: Cybersecurity Incident Response · 2017-04-11 · • Review the incident response phases • Discuss incident response team (IRT), meetings, tools, and documentation • Explain

Incident Response • Incidents are a “when” not “if” occurrence

Does your staff know what to do? – Conduct a data breach tabletop exercise or drill

• Incident response tools – Incident response flow diagrams are helpful – Playbooks should be created and used to outline

detailed procedures to follow

• Gartner findings: – Technical competence does not imply incident

response competence Copyright © 2017, tw-Security 14

Page 15: Cybersecurity Incident Response · 2017-04-11 · • Review the incident response phases • Discuss incident response team (IRT), meetings, tools, and documentation • Explain

Incident Response Flow Diagram

Copyright © 2017, tw-Security 15

“A picture is worth a thousand words”

Page 16: Cybersecurity Incident Response · 2017-04-11 · • Review the incident response phases • Discuss incident response team (IRT), meetings, tools, and documentation • Explain

Playbooks

Common incident response playbook scenarios – Theft or loss of mobile device/media containing

confidential information – Phishing and ransomware – System compromise - internal – System compromise - cloud – Distributed Denial of Service (DDoS)

Copyright © 2017, tw-Security 16

In 2016 the majority of the breaches (over 500 individuals) reported to HHS were caused by “theft”

Page 17: Cybersecurity Incident Response · 2017-04-11 · • Review the incident response phases • Discuss incident response team (IRT), meetings, tools, and documentation • Explain

Incident Response Team (IRT) The membership of the response team will vary depending on the type of incident and

the expertise and resources needed

Copyright © 2017, tw-Security 17

Page 18: Cybersecurity Incident Response · 2017-04-11 · • Review the incident response phases • Discuss incident response team (IRT), meetings, tools, and documentation • Explain

IRT Membership (core)

The Incident Response Team (IRT) is typically: • Information Security Officer • IT subject matter experts • Director of IT Services or CIO

Copyright © 2017, tw-Security 18

Page 19: Cybersecurity Incident Response · 2017-04-11 · • Review the incident response phases • Discuss incident response team (IRT), meetings, tools, and documentation • Explain

Other IRT Members

Occasionally, the response team may include: • Privacy Officer • Risk Management /Legal (internal) • Human Resources • COO and/or other members of Administration

Outside resources may include: • Specialized legal counsel • Computer forensic services • Law enforcement

Copyright © 2017, tw-Security 19

Page 20: Cybersecurity Incident Response · 2017-04-11 · • Review the incident response phases • Discuss incident response team (IRT), meetings, tools, and documentation • Explain

Specifics of IRT Meetings • Conducting discussions

– Establishing team meeting location • “War Room” with in-person participants • Remote participants

– Communication methods • Phone calls • Conference lines • Email • Instant Messaging

Sometimes, out of band communications are necessary

– Agenda is driven by type of incident and playbook Copyright © 2017, tw-Security 20

Page 21: Cybersecurity Incident Response · 2017-04-11 · • Review the incident response phases • Discuss incident response team (IRT), meetings, tools, and documentation • Explain

Incident Response Documentation

• Written procedures ensure consistency • Repeatable process • Cleaner command lead hand-offs • Recall of past events • Better defensible position in litigation

Copyright © 2017, tw-Security 21

Capturing the right information in the right ways for optimal incident management and recall

Page 22: Cybersecurity Incident Response · 2017-04-11 · • Review the incident response phases • Discuss incident response team (IRT), meetings, tools, and documentation • Explain

Taking Notes

• Capture facts – not opinions • Establish standards for making data entries

– Maintain consistency of recording dates and times – Denote mistakes with strikethrough

• Consider your notes being read in court • Transcribe from a digital recording

– Delete recording after it has been transcribed

Copyright © 2017, tw-Security 22

Page 23: Cybersecurity Incident Response · 2017-04-11 · • Review the incident response phases • Discuss incident response team (IRT), meetings, tools, and documentation • Explain

Post Incident Review When PHI is Involved

Start with asking the following questions: • Was the PHI secured? Encrypted (FIPS 140-2)?

• If yes, no breach • If no, presume that PHI has been compromised and

notification is necessary unless risk assessment concludes that there is a low probability of compromise

• Was there an impermissible use or disclosure? • If yes, did the use or disclosure meet one of the three

Privacy Rule exceptions?

Copyright © 2017, tw-Security 23

Page 24: Cybersecurity Incident Response · 2017-04-11 · • Review the incident response phases • Discuss incident response team (IRT), meetings, tools, and documentation • Explain

Ransomware – Breach?

Copyright © 2017, tw-Security 24

Yes No Maybe

If malicious code was able to encrypt your data, perhaps it read or copied your data as well.

Source: HHS FACT SHEET: Ransomware and HIPAA

Page 25: Cybersecurity Incident Response · 2017-04-11 · • Review the incident response phases • Discuss incident response team (IRT), meetings, tools, and documentation • Explain

Challenges with IT Staff

• It staff like to “fix things” and get things back to normal as quickly as possible

• Unfortunately, IT staff may delete valuable forensic evidence needed to make a determination if a breach of PHI has occurred

Copyright © 2017, tw-Security 25

If dealing with ransomware, require your Privacy or Compliance Officer to be involved. Perform a breach risk assessment. You may need to forensically prove that no PHI left the organization.

Page 26: Cybersecurity Incident Response · 2017-04-11 · • Review the incident response phases • Discuss incident response team (IRT), meetings, tools, and documentation • Explain

Lessons Learned

Remind employees… • Only an authorized spokesperson is allowed

to communicate with the news media; do not to speak to reporters

• Do not post what is happening at the hospital to social media

Copyright © 2017, tw-Security 26

Page 27: Cybersecurity Incident Response · 2017-04-11 · • Review the incident response phases • Discuss incident response team (IRT), meetings, tools, and documentation • Explain

Tabletop Exercise – Benefits

• Practice makes perfect • Identify talent, process, and tools that are need • Determine the adequacy of existing training levels • Demonstrate the ability to recover • Provide a mechanism for maintaining and updating

the playbooks • Meet legal and audit requirements • Consider combinding a cybersecurity tabletop with

a disaster recovery tabletop

Copyright © 2017, tw-Security 27

Page 28: Cybersecurity Incident Response · 2017-04-11 · • Review the incident response phases • Discuss incident response team (IRT), meetings, tools, and documentation • Explain

Conclusion

• IT people use different terminologies which may cause gaps in communications during incidents

• Incident response is a systematic approach that should be followed to ensure consistency

• Incident response team membership needs to be identified along with tools and documentation

• An incident response flow diagram supported by well-defined playbooks will ensure consistency

• Tabletop exercises will improve response capability

Copyright © 2017, tw-Security 28

Page 29: Cybersecurity Incident Response · 2017-04-11 · • Review the incident response phases • Discuss incident response team (IRT), meetings, tools, and documentation • Explain

Resources

• NIST Special Publications – SP 800-61 Computer Security Incident Handling Guide

• Verizon Data Breach Report – http://www.verizonenterprise.com/verizon-insights-

lab/dbir/2016/

• Department of Homeland Security (DHS) – https://www.dhs.gov/cyber-incident-response

Copyright © 2017, tw-Security 29

Page 30: Cybersecurity Incident Response · 2017-04-11 · • Review the incident response phases • Discuss incident response team (IRT), meetings, tools, and documentation • Explain

tw-Security, a nationally recognized healthcare IT security consulting firm is dedicated to helping healthcare organizations protect their information resources with hands-on experience in creating and managing information security programs. Copyright © 2017 tw-Security. ALL RIGHTS RESERVED.

Tom Walsh, CISSP

tw-Security Overland Park, KS

www.tw-Security.com [email protected]

913-696-1573