58
©2012 CliftonLarsonAllen LLP 1 1 1 1 ©2012 CliftonLarsonAllen LLP Security Incident Response Lessons Learned NAFCU Webcast August 15, 2012

Security Incident Response Lessons Learned - …€¢Key logging software installed ... •Perform a risk assessment Risk Assessment Heat map ... Defined incident response plan and

Embed Size (px)

Citation preview

©2012 CliftonLarsonAllen LLP 1 1 1 1

©2

01

2 C

lifto

nL

ars

on

Alle

n L

LP

Security Incident Response

Lessons Learned

NAFCU Webcast

August 15, 2012

©2012 CliftonLarsonAllen LLP 2

Presentation overview

• Emerging & Continuing Trends

– Industry Security Reports

– 12 years of IT audit and incident response

• Examples of IT Related Fraud and

• Strategies and Key Controls

©2012 CliftonLarsonAllen LLP 3

Definition of a Secure System

“A secure system is one we can depend on to

behave as we expect.” Source: “Web Security and Commerce”

by Simson Garfinkel with Gene Spafford

People Rules

`

Tools

• Confidentiality

• Integrity

• Availability

©2012 CliftonLarsonAllen LLP 4

“Three” Security Reports

• Trends: Sans 2009 Top Cyber Security Threats – http://www.sans.org/top-cyber-security-risks/

• Intrusion Analysis: TrustWave – https://www.trustwave.com/global-security-report/

• Intrusion Analysis: Verizon Business Services – 2011 report

– http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2011_en_xg.pdf

– 2012 report

– http://www.verizonbusiness.com/about/events/2012dbir/

©2012 CliftonLarsonAllen LLP 5

SANS – Client Side Vulnerabilities

• Client side vulnerabilities

– Missing operating system patches

– Missing application patches

– Objective is to get the users to “Open the door”

• Vulnerable Web sites

– Password guessing

– Attacks on application interfaces with “input fields”

©2012 CliftonLarsonAllen LLP 6

TrustWave – Intrusion Analysis Report

Top Methods of Entry Included:

©2012 CliftonLarsonAllen LLP 7

TrustWave – Intrusion Analysis Report

• Most of the compromised systems were managed by a third party…

©2012 CliftonLarsonAllen LLP 8

Credit Card Fraud

• We just received call from Visa…

• Lesson learned…

• Unsecured Wireless

• Wireless on same network as POS

• Default open internal systems

– Missing patches

– Excessive services

– Staff passwords

• Vendor defaults

– Vendor passwords

©2012 CliftonLarsonAllen LLP 9

TrustWave – Intrusion Analysis Report

•Incident Response – Investigative Conclusions

•Window of Data Exposure

Once inside, attackers have very little reason to think they will be detected…

The bad guys are inside for 1 ½ YEARS before anyone knows!

©2012 CliftonLarsonAllen LLP 10

Verizon

• Report is analysis of intrusions investigated by Verizon and US Secret Service.

• KEY POINTS: – Time from successful intrusion to

compromise of data was days to weeks.

– Log files contained evidence of the intrusion attempt, success, and removal of data.

– Most successful intrusions were not considered highly difficult.

©2012 CliftonLarsonAllen LLP 11

Hackers, Fraudsters, and Victims

• Opportunistic Attacks

• Targeted Attacks

©2012 CliftonLarsonAllen LLP 12

Verizon 2011

• Anatomy of a data breach - Opportunities

©2012 CliftonLarsonAllen LLP 13

Phishing and ACH

• “Mr. Jessie James, why do you rob banks???”

• Online banking convenience …

• Global economy…

• On-line availability of ACH

• “Corporate account take over”

• Targeting small and medium sized commercial customers

©2012 CliftonLarsonAllen LLP 14

Phishing and ACH – In the News

Google: “ACH fraud suit”

Bank Sues Customer

• $800,000 fraudulent ACH transfer

• Bank retrieves $600,000

• What happens to the other $200,000?

©2012 CliftonLarsonAllen LLP 15

Phishing and ACH – In the News

Customer Sues Bank • $560,000 in fraudulent ACH transfers to bank accounts in Russia,

Estonia, Scotland, Finland, China and the US; withdrawn soon after the deposits were made.

• Alleges that the bank failed to notice unusual activity.

• Until the fraudulent transactions were made customer had

made just two wire transfers ever

• In just a three-hour period, 47 wire transfers requests were made.

• In addition, after customer became aware of the situation and asked the bank to halt transactions, the bank allegedly failed to do so until 38 more had been initiated.

©2012 CliftonLarsonAllen LLP 16

Phishing and ACH – Two Direct Examples

• Business owner receives multiple emails:

• “Wire Transfer Cancelled”

• Finance staff open message – follow links

• Key logging software installed

• Fraudsters use obtained credentials

• Create 2 payroll ACH files - $500,000

©2012 CliftonLarsonAllen LLP 17

Phishing and ACH – Two Direct Examples

• Finance person receives “2000 spam messages”

• Later in the day, fraudsters make three ACH transfers all within 30 minutes:

– $8,000 to Houston

– Two transfers for $540,000 each to Romania

• In this case, business insists the following controls were not followed:

– Dollar limit/thresholds were exceeded

– Call back verification did not occur

• Lessons learned…

©2012 CliftonLarsonAllen LLP 18

Example Online FI Management System

• Example of attack into FI management software

• “In the cloud” application for bank staff

• Defaults?

• Logging?

• Lessons Learned…

©2012 CliftonLarsonAllen LLP 19

Example: Online Account Set Up

• New functionality: Online Internet Banking set up

• No interaction with CU staff required

• “Online ACH” functionality/features enabled

• Lessons Learned…

©2012 CliftonLarsonAllen LLP 20

Example: Vendor Supplied Processing System

• Vendor supplied application system within organization for check imaging and processing

• VPN connection between FI and vendor

• Data (images) sent to datacenter

• Processing done at vendors data center

• 3 Primary categories of issues

– Nature of the connection to the vendors data center

– Design of the user access controls

– Vendor defaults/configurations

©2012 CliftonLarsonAllen LLP 21

Example: Vendor Supplied Processing System

• Wide open site-to-site VPN connection to the vendors datacenter

– No restrictions or filtering of traffic

– Anonymous FTP

– Missing Microsoft updates (some more than 3 years old)

– “Visibility” through data center to other FIs

©2012 CliftonLarsonAllen LLP 22

Example: Vendor Supplied Processing System

• Employees logged into check imaging workstation

– Local Administrator privileges (default)

– “Domain Admin” privileges (in one case)

• What are the implications…

• Domain users, Local users, and Local administrators…

– In the FI

– At the data center

– Through the data center at other FI’s

©2012 CliftonLarsonAllen LLP 23

Example: Vendor Supplied Processing System

• Vendor Default Configurations

– User Accounts

– Passwords

– Installed Applications

– Patch/Update Management

– Anti-virus software

• Lessons Learned…

©2012 CliftonLarsonAllen LLP 24

Example: New Server/Application System

• Client has well defined, established policies and standards for

– Vendor due diligence

– Vendor supplied systems

– Minimum standards the vendor system must adhere to

– Implementation process

• Then “Marketing” decides they need X

– They buy X

– They don’t follow the “rules”

• Lessons Learned…

©2012 CliftonLarsonAllen LLP 25

Wireless Networks

• Wireless networks can be used in a secure manner

• Need to be managed and tested

• More than just facilities wireless

©2012 CliftonLarsonAllen LLP 26

Wireless Networks

• Wireless networks can be used in a secure manner

• Need to be managed and tested

• More than just facilities wireless

©2012 CliftonLarsonAllen LLP 27

Mobile Computing Basics

• Mobile Devices are here to stay…

• More people have (smart) phones than computers

• Mobile payments are coming (already here?)

©2012 CliftonLarsonAllen LLP 28

Mobile Banking Basics

• Different types of mobile banking

– SMS mobile banking

– Mobile web

– Mobile applications

©2012 CliftonLarsonAllen LLP 29

Mobile Banking Basics

• Mobile banking applications (i.e. “mobile apps”)

– Various mobile app market places

– iTunes/Apple App Store

– Android Market

– Verizon App Store

– BlackBerry App Store

©2012 CliftonLarsonAllen LLP 30

Mobile Banking Basics – In-house System

• Basic/common mobile banking infrastructure

– Mobile banking system at the bank

©2012 CliftonLarsonAllen LLP 31

Mobile Banking Basics – Outsourced Solution

• Basic/common mobile banking infrastructure

– Mobile banking system with third party vendor between customer and bank infrastructure

©2012 CliftonLarsonAllen LLP 32

Vulnerabilities, Risks & Controls

• Vulnerabilities and risks at each component

• Perform a risk assessment Risk Assessment Heat map

– Server Side Risks

– (Vendor Risks)

– Transmission Risks

– Mobile Device Risks

– Mobile App Risks

– End User Risks

©2012 CliftonLarsonAllen LLP 33

Vulnerabilities, Risks & Controls

• Server Side Risks – Essentially the same as traditional Internet banking website risks

◊ Insecure coding practices

◊ Default credentials

◊ Patch/update maintenance

◊ Certificate issues

This is

essentially a web

server for the

mobile devices

to connect to.

©2012 CliftonLarsonAllen LLP 34

Vulnerabilities, Risks & Controls

• Vendor Risks – Same risks as banks – now outside of your direct control.

◊ Insecure coding practices

◊ Default credentials

◊ Patch/update maintenance

◊ Certificate issues

This is essentially a web

server for the mobile

devices to connect to.

Also need

controls on the

dedicated link…

©2012 CliftonLarsonAllen LLP 35

Vulnerabilities, Risks & Controls

• Transmission Risks

– Most mobile devices have always on Internet connection

◊ Cellular (cell phone service provider)

◊ Wifi (802.11 – home, corporate, “public”)

– Need encryption

– Common end user practices

©2012 CliftonLarsonAllen LLP 36

Vulnerabilities, Risks & Controls

• Mobile Device Risks

– Multiple hardware platforms & multiple operating systems

– Features, features, features

©2012 CliftonLarsonAllen LLP 37

Vulnerabilities, Risks & Controls

• Mobile App Risks

– Secure coding issues

– Installation of App

– Use and protection of credentials

– Storage of data

– Transmission of data

– Malicious Apps

©2012 CliftonLarsonAllen LLP 38

Vulnerabilities, Risks & Controls

• End User Risks

– Lose the device

– Don’t use passwords, or use “easy to guess passwords”

– Store passwords on the device

– Jail break the device

– Don’t use security software

– Use/don’t recognize insecure wireless networks

– Let their kids “use” the device

©2012 CliftonLarsonAllen LLP 39

Vendor Due Diligence and Management

• All of the above – applies to your vendor(s)

– Mobile banking application provider

– Mobile banking hosting provider

• Contracts with SLA’s

• SSAE16 reviews

• Independent code review and testing

©2012 CliftonLarsonAllen LLP 40

Ten Things Every Organization Should Have

1. Strong Policies – Define what is expected

• Foundation for all that follows…

©2012 CliftonLarsonAllen LLP 41

Ten Things Every Organization Should Have

2. Defined user access roles and permissions

• Principal of minimum access and least privilege

• Most users should NOT have system administrator rights

• Don’t forget your vendors

©2012 CliftonLarsonAllen LLP 42

Ten Things Every Organization Should Have

3. Hardened internal systems (end points)

• Hardening checklists

• Turn off unneeded services (minimize attack surface)

• Turn off Telnet

• Turn off FTP

• Turn off SMTP…

• Change (vendor) default password

©2012 CliftonLarsonAllen LLP 43

Ten Things Every Organization Should Have

4. Encryption strategy (variety of state laws…)

• Email

• Laptops, desktops, email enabled cell phones

• Thumb drives/Mobile media

• Data at rest?

©2012 CliftonLarsonAllen LLP 44

Ten Things Every Organization Should Have

5. Vulnerability management process

• Operating system patches

• Application patches

• SMS and Shavlik (now owned by VMWare)

• Testing to validate effectiveness – find and address the

exceptions

©2012 CliftonLarsonAllen LLP 45

Ten Things Every Organization Should Have

6. Well defined perimeter security layers:

• Network segments

• Email gateway/filter, firewall, and “Proxy” integration for traffic in AND out

• Intrusion Detection/Prevention for network traffic, Internet facing hosts, AND workstations (end points)

©2012 CliftonLarsonAllen LLP 46

Ten Things Every Organization Should Have

7. Centralized audit logging, analysis, and automated alerting capabilities (SIEM)

• Routing infrastructure

• Network authentication

• Servers

• Applications

• Archiving vs. Reviewing

©2012 CliftonLarsonAllen LLP 47

Ten Things Every Organization Should Have

8. Defined incident response plan and procedures

• Be prepared

• Documentation and procedures

• Including data leakage prevention and monitoring

• Incident Response testing, just like DR testing

• Forensic preparedness

©2012 CliftonLarsonAllen LLP 48

Ten Things Every Organization Should Have

9. Validation that it all works the way you expect (remember the definition?)

• (IT) Audits

• Vulnerability Assessments

• Penetration Testing

• A combination of internal and external resources

• Pre-implementation and post-implementation

©2012 CliftonLarsonAllen LLP 49

Ten Things Every Organization Should Have

10. Vendor Management

• The previous 9 topics should all be applied to your vendors/business partners

• Require vendor systems be at least as secure as your own…

• For managed services, require vendors to agree to operate up to your standards

• Vulnerability management

• Secure communication protocols

• Incident response capabilities

• Right to audit

• Understand your contracts and SLAs

©2012 CliftonLarsonAllen LLP 50

Questions?

©2012 CliftonLarsonAllen LLP 51 51 51 51

©2

01

2 C

lifto

nL

ars

on

Alle

n L

LP

Thank you!

Randy Romes, CISSP, CRISC, MCP, PCI-QSA

Principal

Information Security Services

[email protected]

888.529.264

Slides are available here:

http://www.larsonallen.com/Information_Security/

Presentations link/button on lower left.

©2012 CliftonLarsonAllen LLP 52

Solutions – From SANS Report

20 Critical Controls:

• http://csis.org/files/publication/Twenty_Critical_Controls_for_Effective_Cyber_Defense_CAG.pdf

Additional Critical Controls (not directly

supported by automated

measurement and validation):

16. Secure Network Engineering

17. Penetration Tests and Red Team

Exercises

18. Incident Response Capability

19. Data Recovery Capability

20. Security Skills Assessment and

Appropriate Training to Fill Gaps

1. Inventory of Authorized and Unauthorized Devices

2. Inventory of Authorized and Unauthorized Software

3. Secure Configurations for Hardware and Software on

Laptops, Workstations, and Servers

4. Secure Configurations for Network Devices such as Firewalls,

Routers, and Switches

5. Boundary Defense

6. Maintenance, Monitoring, and Analysis of Security Audit Logs

7. Application Software Security

8. Controlled Use of Administrative Privileges

9. Controlled Access Based on Need to Know

10. Continuous Vulnerability Assessment and Remediation

11. Account Monitoring and Control

12. Malware Defenses

13. Limitation and Control of Network Ports, Protocols, and

Services

14. Wireless Device Control

15. Data Loss Prevention

©2012 CliftonLarsonAllen LLP 53

Common Compliance Requirements

• Compliance Matrix Resources:

• http://net.educause.edu/ir/library/pdf/CSD5876.pdf

• http://www.infosec.co.uk/ExhibitorLibrary/277/Cross_Compliance_wp_20.pdf

©2012 CliftonLarsonAllen LLP 54

Resources – Hardening Checklists

Hardening checklists from vendors

• CIS offers vendor-neutral hardening resources

http://www.cisecurity.org/

• Microsoft Security Checklists http://www.microsoft.com/technet/archive/security/chklist/default.mspx?mfr=true

http://technet.microsoft.com/en-us/library/dd366061.aspx

Most of these will be from the “BIG” software and hardware providers

©2012 CliftonLarsonAllen LLP 55

Resources – In the News

• Privacy Rights <dot> org http://www.privacyrights.org/ar/ChronDataBreaches.htm

• Resource for State Laws https://www.privacyrights.org/data-breach-FAQ#10

©2012 CliftonLarsonAllen LLP 57

References

• Michigan Company sues bank http://www.computerworld.com/s/article/9156558/Michigan_firm_sues

_bank_over_theft_of_560_000_?taxonomyId=17

http://www.krebsonsecurity.com/2010/02/comerica-phish-foiled-2-factor-protection/#more-973

• Bank sues Texas company http://www.bankinfosecurity.com/articles.php?art_id=2132

©2012 CliftonLarsonAllen LLP 58

References to Specific State Laws

Are there state-specific breach listings?

Some states have state laws that require breaches to be reported to a centralized

data base. These states include Maine, Maryland, New York, New Hampshire,

North Carolina, Vermont and Virginia (Virginia’s notification law only applies to

electronic breaches affecting more than 1,000 residents).

However, a number of other states have some level of notification that has been

made publicly available, primarily through Freedom of Information

requests. These states include California, Colorado, Florida, Illinois,

Massachusetts, Michigan, Nebraska, Hawaii and Wisconsin.

State laws:

http://www.privacyrights.org/data-breach#10

For details, see the Open Security Foundation Datalossdb website:

http://datalossdb.org/primary_sources

http://www.privacyrights.org/ar/ChronDataBreaches.htm