33
A Framework for Cybersecurity Incident Response Andy Sawyer, CISM, C|CISO Director of Security Locke Lord

InfraGard Framework For Cyber Incident Responsethehumanfirewall.org/wp-content/uploads/2015/08/...All removable media will be encrypted. Company information is confidential. It may

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: InfraGard Framework For Cyber Incident Responsethehumanfirewall.org/wp-content/uploads/2015/08/...All removable media will be encrypted. Company information is confidential. It may

A Framework for CybersecurityIncident Response

Andy Sawyer, CISM, C|CISO

Director of Security

Locke Lord

Page 2: InfraGard Framework For Cyber Incident Responsethehumanfirewall.org/wp-content/uploads/2015/08/...All removable media will be encrypted. Company information is confidential. It may

Let’s Begin With Today’s Top 10

Page 3: InfraGard Framework For Cyber Incident Responsethehumanfirewall.org/wp-content/uploads/2015/08/...All removable media will be encrypted. Company information is confidential. It may

Cybersecurity A Top 10 Threat

Damage to Reputation/Brand

Economic Slowdown/Recovery

Regulatory/Legislative Changes

Increasing Competition

Failure to Attract/Retain Top Talent

Failure to Innovate/Meet Customer Needs

Business Interruption

Third Party Liability

Cyber Risk (computer crime/hacking/virus)

Property Damage

Page 4: InfraGard Framework For Cyber Incident Responsethehumanfirewall.org/wp-content/uploads/2015/08/...All removable media will be encrypted. Company information is confidential. It may

Survey Says

815 Companies across 19 industries found:

52% believe they will be hacked this year

Up from 39% last year

13% had a supplier data breach impact their business

59% expect more security incidents this year than last

Last Year Reported Breaches

81% of large firms

40% of midsize firms knew of a breach

60% of small firms

Page 5: InfraGard Framework For Cyber Incident Responsethehumanfirewall.org/wp-content/uploads/2015/08/...All removable media will be encrypted. Company information is confidential. It may

You Have

Firewalls

IPS

Email Security

Web Security

NIDS

Advanced MalwareDetection and Response

Data Loss Prevention

Endpoint AV/AS/AM

Endpoint Encryption

Encryption at Rest/In Motion

Page 6: InfraGard Framework For Cyber Incident Responsethehumanfirewall.org/wp-content/uploads/2015/08/...All removable media will be encrypted. Company information is confidential. It may

And Yet

You have a breach

When, not if this happens, someone is going to getblamed

Someone, maybe you, will need to provide informationabout your pre-breach preparedness and your breachresponse to:

Customers

Governmental entities

External stakeholders

Insurers

Page 7: InfraGard Framework For Cyber Incident Responsethehumanfirewall.org/wp-content/uploads/2015/08/...All removable media will be encrypted. Company information is confidential. It may

Plan Of Attack

Plan On a successful attack

The best offense is a good defense

Be prepared to defend pre-attack businessdecisions and practices

You will be asked

What policies, procedures, technology and trainingdid you have in place to mitigate the threat of abreach?

Don’t Start From Scratch

Use a Framework

What is standard for your Industry?

Page 8: InfraGard Framework For Cyber Incident Responsethehumanfirewall.org/wp-content/uploads/2015/08/...All removable media will be encrypted. Company information is confidential. It may

NIST Framework Core

Page 9: InfraGard Framework For Cyber Incident Responsethehumanfirewall.org/wp-content/uploads/2015/08/...All removable media will be encrypted. Company information is confidential. It may

First Things First

Let’s Be Reasonable

Don’t Forget to DueSpelling Intentional

Page 10: InfraGard Framework For Cyber Incident Responsethehumanfirewall.org/wp-content/uploads/2015/08/...All removable media will be encrypted. Company information is confidential. It may

Reasonable

You don’t have to be lead the pack in your industry, butdon’t be the laggard

Know Your Enemy, Know Yourself (Sun Tzu Art of War)

Perform a risk assessment

Seek assessments from trusted security partners

Make sure insurance coverage (cyber, liability, professional,malpractice) is more than adequate and that you are incompliance with the policy.

http://www.businessinsurance.com/article/20150515/NEWS06/150519893

Page 11: InfraGard Framework For Cyber Incident Responsethehumanfirewall.org/wp-content/uploads/2015/08/...All removable media will be encrypted. Company information is confidential. It may

Due Diligence

Measure of prudence, responsibility, and effort reasonablyexpected to avoid harm.

Reasonable research was done to gather information to:

Make the best decisions

Evaluate associated risk.

Before you implement protective measures, find out thevulnerabilities and weaknesses you are protecting against.

Sounds Reasonable

Page 12: InfraGard Framework For Cyber Incident Responsethehumanfirewall.org/wp-content/uploads/2015/08/...All removable media will be encrypted. Company information is confidential. It may

Due Care

Acting responsibly and doing the right thing

A standard of performance that can reasonably be expected

A minimum level of protection in accordance with industrybest practices

Reasonable actions were taken to:

Prevent a breach

Mitigate damage in the event of a breach

Practicing due care includes:

Security Policies

Countermeasures (Controls)

Security Awareness Training

Page 13: InfraGard Framework For Cyber Incident Responsethehumanfirewall.org/wp-content/uploads/2015/08/...All removable media will be encrypted. Company information is confidential. It may

Cyber Incident Phases

Before

During

After

Page 14: InfraGard Framework For Cyber Incident Responsethehumanfirewall.org/wp-content/uploads/2015/08/...All removable media will be encrypted. Company information is confidential. It may

Before A Cyber Incident

Identify “Crown Jewels”-mission critical data andassets

Understand laws/regulations requiring compliance.

Perform a risk assessment

Identify threats , vulnerabilities , business impact

Implement supporting policies, controls, and training

Page 15: InfraGard Framework For Cyber Incident Responsethehumanfirewall.org/wp-content/uploads/2015/08/...All removable media will be encrypted. Company information is confidential. It may

Prepare To Respond

Create/maintain an actionable incident response plan.

Have the technology in place to address an incident.

Have procedures in place for lawful network monitoring.

Legal counsel familiar with legal issues of cyber incidents

Align other policies (H/R, personnel) with incident responseplan.

Develop proactive relationships with law enforcement,outside counsel, P/R firms, forensic firms

Page 16: InfraGard Framework For Cyber Incident Responsethehumanfirewall.org/wp-content/uploads/2015/08/...All removable media will be encrypted. Company information is confidential. It may

A Lot Goes Into A Risk Assessment

Facility Access

Workforce Security Training

Incident Response

Backup

Disaster Recovery

Breach Notifications

Third Party Agreements

Access Controls

User Authentication

Digital Media/Asset Disposal

Email

Workstations

Cloud Computing

Mobile Devices

Passwords

Removable Media

Page 17: InfraGard Framework For Cyber Incident Responsethehumanfirewall.org/wp-content/uploads/2015/08/...All removable media will be encrypted. Company information is confidential. It may

Performing A Risk Assessment

Use A Model

http://www.houston.org/policy/security.html

http://www.houston.org/policy/infrastructure.html

http://www.nist.gov/cyberframework/

Your Customer May Provide One

Page 18: InfraGard Framework For Cyber Incident Responsethehumanfirewall.org/wp-content/uploads/2015/08/...All removable media will be encrypted. Company information is confidential. It may

Policies, Controls, Training

Policies

If you are not educating employees about policies,don’t expect policies are followed.

Controls

What safeguards enforce what policies?

Compliance may dictate policy and controls

Training

Your people can learn, improve, get better.

They are your best firewall.

Page 19: InfraGard Framework For Cyber Incident Responsethehumanfirewall.org/wp-content/uploads/2015/08/...All removable media will be encrypted. Company information is confidential. It may

Policies

Statement of management intent, expectations, direction

Must have a written security policy

Should be available to and reviewed with employees, or

Employees don’t know what is/is not allowed

You cannot:

Enforce confidentiality

Protect intellectual property/trade secrets

Page 20: InfraGard Framework For Cyber Incident Responsethehumanfirewall.org/wp-content/uploads/2015/08/...All removable media will be encrypted. Company information is confidential. It may

You Need Policies For

Facility Access

Workforce SecurityTraining

Incident Response

Backup

Disaster Recovery

Breach Notifications

Third Party Agreements

Access Control

User Authentication

Digital Media/AssetDisposal

Email

Workstations

Cloud Computing

Mobile Devices

Passwords

Removable Media

Page 21: InfraGard Framework For Cyber Incident Responsethehumanfirewall.org/wp-content/uploads/2015/08/...All removable media will be encrypted. Company information is confidential. It may

Policy Samples

Data center access is restricted to IT personnel only.

Video surveillance is retained for 30 days.

Software installation is only be performed by help desk.

All removable media will be encrypted.

Company information is confidential. It may not becopied or shared without prior written approval.

Employees have no expectation of email privacy.

Two-factor authentication is required for all remoteaccess.

Page 22: InfraGard Framework For Cyber Incident Responsethehumanfirewall.org/wp-content/uploads/2015/08/...All removable media will be encrypted. Company information is confidential. It may

Controls

Administrative, physical and technical safeguards that

ensure policy compliance

Preventive Detective Corrective Compensatory

Security AwarenessTraining

System Monitoring O/S Upgrade Backup Generator

Firewall IDS Backup DataRestoral

Hot Site

Anti-Virus Email Spam Filter/Quarantine

Web Filtering Server Isolation

Security Guard Motion Detector VulnerabilityMitigation

Locked Door IPS PenaltiesDismissal

Page 23: InfraGard Framework For Cyber Incident Responsethehumanfirewall.org/wp-content/uploads/2015/08/...All removable media will be encrypted. Company information is confidential. It may

Control Frameworks

ISO 27001/27002 – Information Security Standard

11 Sections/114+ Controls

Security Policy

Security Organization

Human Resources Security

Physical Security

Communications/OperationsManagement

Systems Development

Access Control

Incident Management

Business Continuity

Compliance

Page 24: InfraGard Framework For Cyber Incident Responsethehumanfirewall.org/wp-content/uploads/2015/08/...All removable media will be encrypted. Company information is confidential. It may

Response Preparation

Written incident response policy and plan

Cross-departmental incident response team

Key Contacts list

InternalExternalLaw Enforcement

Dry Run The Plan

Make Sure Employees Know

NormalWhen To Report An Incident and to whom

Page 25: InfraGard Framework For Cyber Incident Responsethehumanfirewall.org/wp-content/uploads/2015/08/...All removable media will be encrypted. Company information is confidential. It may

During A Cyber Incident

Implement your incident response plan

Initial assessment of incident scope/nature

Technical Glitch/User Error/Malicious Act

Minimize continuing damage

Collect and preserve data

Notify

Do Not

Use compromised systems

“Hack back” or intrude upon another network

Page 26: InfraGard Framework For Cyber Incident Responsethehumanfirewall.org/wp-content/uploads/2015/08/...All removable media will be encrypted. Company information is confidential. It may

After A Cyber Incident

Recover to normal state as soon as possible withoutimpeding investigation or contaminating evidence

65% of businesses that lose computing capability formore than one week never recover andsubsequently go out of business.

Page 27: InfraGard Framework For Cyber Incident Responsethehumanfirewall.org/wp-content/uploads/2015/08/...All removable media will be encrypted. Company information is confidential. It may

After A Cyber Incident

Continue communicating withInternal/external stakeholdersLaw enforcement/DHSOther possible victims

Continue monitoring for anomalous activity to ensurethe intruder has been expelled and you have regainedcontrol of your network.

Conduct a post-incident review to identify deficiencies inplanning and execution of your incident response plan.

Page 28: InfraGard Framework For Cyber Incident Responsethehumanfirewall.org/wp-content/uploads/2015/08/...All removable media will be encrypted. Company information is confidential. It may

Laws, Directives, Regulations

Horizontal Enactments

Texas HB300, Sarbanes-Oxley (SOX)

Vertical Enactments

Gramm Leach Bliley Act (GLBA)

HIPAA/HITECH

Computer Fraud and Abuse Act of 1986

Primary U.S. federal antihacking statute

Amended in 1988, 1994, 1996,

2001 by Providing Appropriate Tools Required toIntercept and Obstruct Terrorism Act

2008 by Identity Theft Enforcement Act

Page 29: InfraGard Framework For Cyber Incident Responsethehumanfirewall.org/wp-content/uploads/2015/08/...All removable media will be encrypted. Company information is confidential. It may

Initiatives, Standards, Agreements

Private Industry Initiatives

PCI DSS

Industry Standards

SAS 70 Audit/Certification

SSAE 16 Type II

Contractual Agreements

Page 30: InfraGard Framework For Cyber Incident Responsethehumanfirewall.org/wp-content/uploads/2015/08/...All removable media will be encrypted. Company information is confidential. It may

Laws, Directives, Regulations

Which Apply To You?

HIPAA

State Data Breach Notifications

Sarbanes Oxley

Payment Card Industry Data Security Standard

International Privacy/Security Laws

Federal Information Security Management Act

Gramm Leach Bliley Act

HITECH Act

Other

Page 31: InfraGard Framework For Cyber Incident Responsethehumanfirewall.org/wp-content/uploads/2015/08/...All removable media will be encrypted. Company information is confidential. It may

Penalty Levels

Vary based on regulation, intent, negligence

Office of Civil Rights enforces HIPAA/HITECH penaltiesfrom $100 to $1.5 M per violation

Penalties are seen as effective enforcement

Criminal penalties may apply in addition to civil penalties

Page 32: InfraGard Framework For Cyber Incident Responsethehumanfirewall.org/wp-content/uploads/2015/08/...All removable media will be encrypted. Company information is confidential. It may

Questions?

Page 33: InfraGard Framework For Cyber Incident Responsethehumanfirewall.org/wp-content/uploads/2015/08/...All removable media will be encrypted. Company information is confidential. It may

Helpful LinksToday’s Presentation Is Available:

http://thehumanfirewall.org/presentations

https://www.houston.org/cybersecurity/http://www.houston.org/policy/security.htmlhttp://www.securingthehuman.org/http://www.sans.edu/research/security-laboratory/article/security-controlshttp://www.nist.gov/cyberframework/upload/cybersecurity-framework-021214.pdfwww.justice.gov/criminal/cybercrime/docs/04272015reporting-cyber-incidents-final.pdfhttp://www.iso27001security.com/html/27002.html