75
Alex Hutton Principal, Risk & Intelligence - Verizon Business http://securityblog.verizonbusiness.com http://www.newschoolsecurity.com Society of Information Risk Analysts http://societyinforisk.org/ @alexhutton on the twitter Threat Modeling Allison Miller Group Manager, Account Risk & Security - PayPal LIVE

2010.08 Applied Threat Modeling: Live (Hutton/Miller)

Embed Size (px)

DESCRIPTION

Alex Hutton & Allison Miller review their research and application of threat modeling. This version was presented at SOURCE Barcelona (2010), a previous version was presented at Black Hat.

Citation preview

Page 1: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

Alex HuttonPrincipal, Risk & Intelligence - Verizon Business

http://securityblog.verizonbusiness.comhttp://www.newschoolsecurity.com

Society of Information Risk Analystshttp://societyinforisk.org/

@alexhutton on the twitter

Threat Modeling

Allison MillerGroup Manager, Account Risk & Security - PayPal

LIVE

Page 2: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

what is this presentation about?- new way to look at risk management via

data and threat modeling

Page 3: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

what is a model?

Page 4: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

what is risk management?

Page 5: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

Managing risk means aligning the capabilities of the organization, and the exposure of the organization with the tolerance of the data owners

- Jack Jones

Page 6: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

Managing risk means aligning the capabilities of the organization, and the exposure of the organization with the tolerance of the data owners

control, influence over outcome

threats manifest as loss of assets

how much can you afford to lose?

Page 7: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

Traditional Risk Management

Find issue, call issue bad, fix issue, hope you don’t find it again...

Page 8: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

Traditional Risk Management

emphasis on assessment, compliance...what about security?

Page 9: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

Closing the Gap

Between Assessment and Defense

Page 10: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

Design

Management

Operations

Page 11: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

Design

Page 12: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

Evolution strongly favors strategies that minimize the risk of loss, rather than which maximize the chance of gain.

Len FisherRock, Paper, Scissors: Game Theory in Everyday Life

Page 13: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

system models are different from maps, they include dynamics and boundaries

Page 14: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)
Page 15: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)
Page 16: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)
Page 17: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

Management

Page 18: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

risk management that simply reacts to yesterday's news is not risk management at all

Douglas HubbardThe Failure of Risk Management

Page 19: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

the importance of feedback loop instrumentation

(that‘s where metrics come from)

Page 20: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

Operations

Page 21: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

Prediction is very difficult, especially about the future

Niels Bohr

Page 22: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

Models in operations tend to assist in automating system decisions, or monitoring for quality defects

Page 23: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

This means we need to understand what makes a good decision vs a bad decision

Page 24: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

Patterns that can be defined can be detected

Page 25: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

…and defining patterns means analyzing lots and lots of data

Page 26: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

We don't talk about what we see; we see only what we can talk about

Donella Meadows Thinking in Systems: A Primer

Page 27: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

Friederich Hayek invades our dreams to give us visions of a new approach

Page 28: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

These “risk” statements you’re making, I don’t think you’re doing it right.

- (Chillin’ Friederich Hayek)

Page 29: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

Risk Assessment Current Practice

Dutch Model, Likelihood & Impact statement

very physics/engineering oriented

Page 30: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

from Mark Curphey’s SecurityBullshit

Page 31: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)
Page 32: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)
Page 33: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

ComplexSystems

Page 34: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

Complex AdaptiveSystems

Page 35: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

Complex Adaptive Systems:

You can’t make point probabilities (sorry ALE) you can only work with patterns of information

Page 36: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

How Complex Systems Fail (Being a Short Treatise on the Nature of Failure; How Failure is Evaluated; How Failure is Attributed to Proximate Cause; and the Resulting New Understanding of Patient Safety)

Richard I. Cook, MD Cognitive technologies Laboratory University of Chicago

http://www.ctlab.org/documents/How%20Complex%20Systems%20Fail.pdf

Page 37: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

Because we’re dealing with Complex Adaptive Systems

engineering risk statements = bankrupt

(sorry GRC)

Page 38: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

We need a new approach

Page 39: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

Complex Systems Create a business process

Process is a collection of system interaction (system behavior)

Process has human interaction (human behavior)

Page 40: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

instead of R = T x V x I

Page 41: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

behavioral analytics &data driven management

Page 42: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

evidence based risk management

Page 43: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

Verizon has shared data

Page 44: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

- 2010 ~ 900 cases- (900 million

records)

Page 45: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

Verizon is sharing our framework

Page 46: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

Verizon Enterprise Risk & Incident Sharing (VERIS) Framework

it’s open*!

* kinda

Page 47: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

What is the Verizon Incident Sharing (VERIS) Framework?

- A means to create metrics from the incident narrative

- how Verizon creates measurements for the DBIR

- how *anyone* can create measurements from an incident

- https://verisframework.wiki.zoho.com

Page 48: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

What makes up the VERIS framework?

$ $ $+demographics incident classification (a4)

discovery& mitigation impact classification

1 2 3 4> > >

information about the organization; including their size, location,industry, & securitybudget (implied)

information about the attack (traditional threat model); including (meta) data about agent, action,asset, & security attribute (C/I/A)

information about incident discovery, probable mitigating controls, and rough state of security management.

information about impact categorization (a la’ FAIR & ISO 27005), aggregate estimate of loss (in $), & qualitative description of damage.

Page 49: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

49

The Incident Classification section employs Verizon’s A4 event model

A security incident (or threat scenario) is modeled as a series of events. Every event is comprised of the following 4 A’s:

Agent: Whose actions affected the assetAction: What actions affected the asset Asset: Which assets were affectedAttribute: How the asset was affected

1 2 3 4 5> > > >Incident as a chain of events>

Page 50: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

Cybertrust Security

$ $ $+demographics incident classification (a4) discovery

& mitigation impact classification

1 2 3 4 5> > > >

incident narrative incident metrics

Page 51: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

Cybertrust Security

$ $ $+demographics incident classification (a4) discovery

& mitigation impact classification

1 2 3 4 5> > > >

$ $ $+1 2 3 4 5> > > >

$ $ $+1 2 3 4 5> > > >

$ $ $+1 2 3 4 5> > > >

$ $ $+1 2 3 4 5> > > >

$ $ $+1 2 3 4 5> > > >

case studies data set

a

b

c

d

e

f

Page 52: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

Cybertrust Security

behaviors!

Page 53: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

$ $ $+1 2 3 4 5> > > >

$ $ $+1 2

3

4 5> > > >

$ $ $+1 2 3 4 5> > > >

$ $ $+1 2 3 4 5> > > >

$ $ $+1 2 3 4 5> > > >

$ $ $+1 2 3 4 5> > > >

the potential for pattern matching

a

b

c

d

e

f

demographics incident classification (a4) discovery& mitigation impact classification

3

Page 54: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

Fraud, Incidents, andGood Lord Of The Dance:

creating models for the real management of risk

Page 55: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

Fraud

Page 56: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

in VERIS we see THREE events.

1 2 3> >

phishing

malware infection

credential theft

Page 57: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

in VERIS we see THREE events.

1 2 3> >

phishingmalware infectioncredential exfiltration

in addition we can describe FOUR fraud events

Page 58: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

from the initial narrative, we now have a threat event model with SEVEN objects

1 2 3 4 5> > > > 6 7>>

Page 59: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

from the initial narrative, we now have a threat event model with SEVEN objects

1 2 3 4 5> > > > 6 7>>

1> AGENT: external, organized crime,

eastern europe

ACTION: social, type: phishing, channel: email, target: end-user

ASSET: human, type: end-user

ATTRIBUTE: integrity

Page 60: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

from the initial narrative, we now have a threat event model with SEVEN objects

1 2 3 4 5> > > > 6 7>>

2> AGENT: external, organized crime,

eastern europe

ACTION: malware, type: install additional malware or software

ASSET: end-user device; type: desktop (more meta-data possible)

ATTRIBUTE: integrity

Page 61: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

from the initial narrative, we now have a threat event model with SEVEN objects

1 2 3 4 5> > > > 6 7>>

3> AGENT: external, organized crime,

eastern europe

ACTION: malware, type: harvest system information

ASSET: end-user device, type: desktop (more meta-data possible)

ATTRIBUTE: integrity, confidentiality

Page 62: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

from the initial narrative, we now have a threat event model with SEVEN objects

1 2 3 4 5> > > > 6 7>>

4> AGENT: external, organized crime,

eastern europe

ACTION: impersonation

Page 63: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

from the initial narrative, we now have a threat event model with SEVEN objects

1 2 3 4 5> > > > 6 7>>

5> AGENT: external, organized crime,

eastern europe

ACTION: impersonated transaction

Page 64: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

from the initial narrative, we now have a threat event model with SEVEN objects

1 2 3 4 5> > > > 6 7>>

6> AGENT: external, organized crime,

eastern europe

ACTION: Buy goods or transfer funds

Page 65: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

from the initial narrative, we now have a threat event model with SEVEN objects

1 2 3 4 5> > > > 6 7>>

7> AGENT: external, organized crime,

eastern europe

ACTION: Goods/Funds extraction

Page 66: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

we can study the event model to understand control opportunities

1 2 3 4 5> > > > 6 7>>

end user could have made better choices

Page 67: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

we can study the event model to understand control opportunities

1 2 3 4 5> > > > 6 7>>

Wouldn’t it be nice ifend users had desktopDLP?

Page 68: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

we can study the event model to understand control opportunities

1 2 3 4 5> > > > 6 7>>

Why is Mrs. Francis Neely, 68 years of age from Lexington, KY suddenly purchasing items from European websites to be shipped to Asia???

Page 69: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

$ $ $+1 2 3 4 5> > > >

$ $ $+1 2

3

4 5> > > >

$ $ $+1 2 3 4 5> > > >

$ $ $+1 2 3 4 5> > > >

$ $ $+1 2 3 4 5> > > >

$ $ $+1 2 3 4 5> > > >

the potential for pattern matching and control application

a

b

c

d

e

f

demographics incident classification (a4) discovery& mitigation impact classification

3

Page 70: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

if patterns can be defined, they can be stored for later use.

$ $ $+1 2 3 4 5> > > >

$ $ $+1 2

3

4 5> > > >

$ $ $+1 2 3 4 5> > > >

$ $ $+1 2 3 4 5> > > >

$ $ $+1 2 3 4 5> > > >

$ $ $+1 2 3 4 5> > > >

a

b

c

d

e

f

demograp incident discover impact

3

Page 71: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

if they can be stored for later use, they can be used to Detect, Respond, and Prevent.

$ $ $+1 2 3 4 5> > > >

$ $ $+1 2

3

4 5> > > >

$ $ $+1 2 3 4 5> > > >

$ $ $+1 2 3 4 5> > > >

$ $ $+1 2 3 4 5> > > >

$ $ $+1 2 3 4 5> > > >

a

b

c

d

e

f

demographic incident classification (a4) discovery impact

3

Page 72: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)
Page 73: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

$ $ $+1 2 3 4 5> > > >

$ $ $+1 234 5> > > >

$ $ $+1 2 3 4 5> > > >

$ $ $+1 2 3 4 5> > > >

$ $ $+1 2 3 4 5> > > >

$ $ $+1 2 3 4 5> > > >

a

b

c

d

e

f

demographics incident classification discovery impact

3

Page 74: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

OBLIGATORY QUESTIONS SLIDE

Page 75: 2010.08 Applied Threat Modeling: Live (Hutton/Miller)

MUCHAS GRACIAS