3

Click here to load reader

Real-time fallacy: how real-time your security really is? by Dr. Anton Chuvakin

Embed Size (px)

Citation preview

Page 1: Real-time fallacy: how real-time your security really is? by Dr. Anton Chuvakin

8/14/2019 Real-time fallacy: how real-time your security really is? by Dr. Anton Chuvakin

http://slidepdf.com/reader/full/real-time-fallacy-how-real-time-your-security-really-is-by-dr-anton-chuvakin 1/3

Real-time fallacy: how real-time your security really is?

Anton Chuvakin, Ph.D., GCIA, GCIH

Written in: 2004

DISCLAIMER :Security is a rapidly changing field of human endeavor. Threats we face literally change every day;

moreover, many security professionals consider the rate of change to be accelerating. On top of 

that, to be able to stay in touch with such ever-changing reality, one has to evolve with the space aswell. Thus, even though I hope that this document will be useful for to my readers, please keep in

mind that is was possibly written years ago. Also, keep in mind that some of the URL might have

gone 404, please Google around.

 While the claims that "modern business works in real-time and so the security should too" areoften heard from various vendors, it appears that few organizations are able to achieve that at the

moment. This paper will look at the real-time requirements of the whole organization's securityposture.

So, how real-time is your security? One might think that most of the security is indeed happens inreal-time or very close to it: network intrusion detection systems pick up attacks off the wire withinmicroseconds, firewalls block connections as they happen and anti-virus technology makes thebest effort to catch the viruses as soon as they arrive from the network and via email (in fact, manyanti-virus vendors call this feature “real-time protection”). Moreover, intrusion preventiontechnologies, with all their limitations, promise to stop attacks before they happen, making securitybetter than real-time, but proactive.

But security is not just a set of “pizza boxes” and software solutions protecting the enterprise. It is

also a whole slew of processes and people involved in them. How real-time are those? For example, such processes commonly include:

• The dreaded security update and patch process, forming a flimsy and creaking wall of protection between attackers and virus writers on one side and corporate assets on theother. Few organizations patch within hours, even if the announced flaw is serious andsome don’t patch for months.

• Software upgrade process, replacing those Windows 98 machines with modern (andhopefully more secure) operating systems doesn’t seem to be very speedy as the systemsshould have been replaced years ago

• Vulnerability remediation and hardening process. Newly built systems are likely at leastsomewhat hardened to comply with the security policy, but ongoing changes to such

systems are likely lagging behind similar to patching and upgrades.• Security alert response process, where incident response team acts on the alerts and

messages generated by various security solutions. Such alerts almost always requiremanual investigation that will take at least minutes and likely more.

 Overall, it appears that there is a big disconnect between the timing aspect of technology securityand process security, which leads to suboptimal security operations and loss of dollars fromscarce security budgets. The weakest (or, rather, the “slowest”) link in the chain here is not thehardware defenses, but their human counterparts.

Page 2: Real-time fallacy: how real-time your security really is? by Dr. Anton Chuvakin

8/14/2019 Real-time fallacy: how real-time your security really is? by Dr. Anton Chuvakin

http://slidepdf.com/reader/full/real-time-fallacy-how-real-time-your-security-really-is-by-dr-anton-chuvakin 2/3

 Few people will agree to buy a network intrusion detection system (NIDS) that will only alert them2 hours after the attack. However, those same people will have their security analysts check theIDS alarms every morning. Thus, if they discover a critical compromise, a millisecond responsetime of the NIDS system will not matter, but the hourly response time of the personnel will. So, if the "morning after" alert investigation results in discovering a critical system compromise, it is still

deemed acceptable. While intrusion prevention automates such response in some simple cases(where reliable detection can drive real-time inline blocking or firewall reconfiguration) for manyother abuses such as acceptable use policy violations automated actions are unlikely. Humans stillneed to make a decision to activate the protection measures.

Similarly, if a virus-infected file arrives and the software can clean it “in real-time”, the problem issolved. However, in case the anti-virus software detects the malicious code, but cannotautomatically clean or quarantine it and issues an alert instead (as it happens in the case of somebackdoors and Trojans), the response falls back on the shoulders of the analysts who are likely behours behind.

In any case, how many analysts watching alert consoles or wearing pagers 24/7 does your 

organization have? The likely answer is 'few or none’; most security budgets are not that “fat”.While government agencies and some managed security providers succeed in making the securityprocesses close to real-time, working under strict SLAs and achieving minute-scale responses tosecurity incidents, for the rest of the world the millisecond response of the technology componentsimply will not matter, if the intended human recipient of the alert is asleep at the steering wheel(or, at home, with the pager set to “off”).

Thus, the above emphasizes the point we are making in this article: to “speed up” your security torespond to the ever increasing number of threats coming at you from inside and outside theevaporating perimeter one needs to look at accelerating and optimizing the processes and not thetools. It is agreed that full automation of a security management will not happen in the foreseeablefuture. In fact, is hasn’t happened in a much more mature and less chaotic network management

space, where problems stem from misbehaving tools and not skilled, determined and malicious“blackhats”, who (even though it pains me to say so) always outnumber and often outperform thedefenders by a significant margin. Automation certainly helps and will continue to expand fromanti-virus to host and network intrusion prevention, but human decision-making and prompt action,assisted by various tools, will never become extinct. For example, correlation technology, availablein SIM solution, facilitates expanding the automated alerts due to the increased reliability of alertscoming out of correlation engines. However, an expert input is still required to create thecorrelation rules as well as to assist with the investigation in more complicated cases.

Optimizing the process involves decreasing the gap between the incident and response byproviding the actionable ”battlefield” intelligence and the defensive “weapons” to security warriorsas well as educating them how to use them effectively. How alerts are prioritized (and escalated if 

needed) using the business relevance information as well as threat and vulnerability data? Howeffective and repeatable is the incident response process? How are the lessons learned from prior incidents lead to the decreased threat in the future? Having a well-defined answers to the abovequestions will contribute more to security posture than decreasing the IDS time lag frommilliseconds to microseconds… That might not win the war, but will certainly help with mostbattles.

ABOUT AUTHOR :

This is an updated author bio, added to the paper at the time of reposting in 2009.

Page 3: Real-time fallacy: how real-time your security really is? by Dr. Anton Chuvakin

8/14/2019 Real-time fallacy: how real-time your security really is? by Dr. Anton Chuvakin

http://slidepdf.com/reader/full/real-time-fallacy-how-real-time-your-security-really-is-by-dr-anton-chuvakin 3/3

Dr. Anton Chuvakin (http://www.chuvakin.org) is a recognized security expert in the field of log

management and PCI DSS compliance. He is an author of books "Security Warrior" and "PCI

Compliance" and a contributor to "Know Your Enemy II", "Information Security ManagementHandbook" and others. Anton has published dozens of papers on log management, correlation,

data analysis, PCI DSS, security management (see list www.info-secure.org) . His blog

http://www.securitywarrior.org is one of the most popular in the industry.In addition, Anton teaches classes and presents at many security conferences across the world; he

recently addressed audiences in United States, UK, Singapore, Spain, Russia and other countries.

He works on emerging security standards and serves on the advisory boards of several securitystart-ups.

Currently, Anton is developing his security consulting practice, focusing on logging and PCI DSS

compliance for security vendors and Fortune 500 organizations. Dr. Anton Chuvakin was formerly

a Director of PCI Compliance Solutions at Qualys. Previously, Anton worked at LogLogic as aChief Logging Evangelist, tasked with educating the world about the importance of logging for 

security, compliance and operations. Before LogLogic, Anton was employed by a security vendor 

in a strategic product management role. Anton earned his Ph.D. degree from Stony Brook 

University.