0% found this document useful (0 votes)
120 views25 pages

Evidence-Based Security: The New Top Five Controls: Todd Inskeep

The document summarizes evidence from multiple cybersecurity reports to identify the top five controls organizations should focus on to reduce business risk from cyber attacks. It finds that phishing/spearphishing, lack of multi-factor authentication, failure to patch vulnerabilities, misconfigured systems, and exposing too many internet facing systems are often initial points of compromise. The recommended top five controls are technical email security, user security awareness training, multi-factor authentication, prompt patching of vulnerabilities, and reducing external attack surfaces.

Uploaded by

ivans2009
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
120 views25 pages

Evidence-Based Security: The New Top Five Controls: Todd Inskeep

The document summarizes evidence from multiple cybersecurity reports to identify the top five controls organizations should focus on to reduce business risk from cyber attacks. It finds that phishing/spearphishing, lack of multi-factor authentication, failure to patch vulnerabilities, misconfigured systems, and exposing too many internet facing systems are often initial points of compromise. The recommended top five controls are technical email security, user security awareness training, multi-factor authentication, prompt patching of vulnerabilities, and reducing external attack surfaces.

Uploaded by

ivans2009
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

#RSAC

SESSION ID: TECH-T10

EVIDENCE-BASED SECURITY:
THE NEW TOP FIVE CONTROLS

Todd Inskeep
Principal
Booz Allen Hamilton
@Todd_Inskeep
Where do you start protecting an enterprise?
#RSAC

2
Today’s CIS top 20 controls
#RSAC

• Published and
maintains list of controls
• Often used as a starting point

➢ Because they reduce risk &


some are really hard to do

From: https://www.cisecurity.org/controls/
3
Are these top 5 really the best?
#RSAC

• In today’s threat environment,


What should controls do?

o Check the “we have security” box?


o Meet compliance requirements?
o Reduce Business Risk?
o Or something else?

4
#RSAC

IT Governance – list of 742 incidents from Jan 17- Mar 18 (Lewis Morgan – Monthly Notes at IT Governance
https://www.itgovernance.co.uk/blog/author/lmorgan/) & speaker analysis & review

Online Trust Alliance - Cyber Incident Trends Report:


https://otalliance.org/system/files/files/initiative/documents/ota_cyber_incident_trends_report_jan2018.pdf
Verizon Data Breach Investigation Report (Apr 2017) (http://www.verizonenterprise.com/verizon-insights-lab/dbir/2017/)

IBM X-Force Threat Intelligence Index March 2018 (https://www.ibm.com/security/data-breach/threat-intelligence)

Crowdstrike Global Threat Report (Feb 26, 2018) (https://go.crowdstrike.com/CrowdStrike-Threat-Report.html)

Symantec 2018 Internet Security Threat Report (March 22, 2018) (https://www.symantec.com/content/dam/symantec/docs/reports/istr-23-
executive-summary-en.pdf)

Harvard Business Review - https://hbr.org/2017/12/which-of-your-employees-are-most-likely-to-expose-your-company-to-a-cyberattack (Dec,


2017)

2017 Healthcare Breaches - 2017 Breach Report: 477 Breaches, 5.6M Patient Records Affected https://www.healthcare-informatics.com/news-
item/cybersecurity/2017-breach-report-477-breaches-56m-patient-records-affected

Aetna fined for 12,000 lost records - https://healthitsecurity.com/news/17m-settlement-agreement-reached-in-aetna-data-breach-case

10 Largest Health care organizations by membership - http://www.beckersasc.com/asc-coding-billing-and-collections/the-10-largest-


health-insurance-companies-by-membership.html
RSA Phishlabs reporting: https://info.phishlabs.com/blog/rsa-2018-preview-phishing-trends-intelligence-report

Image used with credit to


5 https://www.flickr.com/photos/generated/3408879691
Analyzed multiple data sources
#RSAC

IT Governance List 742


incidents from Jan
2017-Mar 20181
Online Threat Alliance
identified 159,700
total cyber incidents in
20172
“93% of breaches
could have been
prevented”2
➢ 2FA would have
stopped or reduced
the impact of every
one
1 Lewis Morgan – Monthly Notes at IT Governance https://www.itgovernance.co.uk/blog/author/lmorgan/
2Online Trust Alliance: https://otalliance.org/system/files/files/initiative/documents/ota_cyber_incident_trends_report_jan2018.pdf
6
Considered the major attacks of 2017
#RSAC

Attack Methodologies
SWIFT Attacks (2016) Spearphishing, Credential misuse
HBO Spearphishing, Credential misuse
Leaked Government Tools Unknown – could be spearphishing, credential misuse, disgruntled insider

AWS Misconfigurations Scan for vulnerabilities, Credential misuse


WannaCry Privilege escalation, credential misuse
NotPetya S/W Supply chain exploit, Privilege escalation, credential misuse
Equifax Scan for vulnerabilities, Credential misuse
Ransomware Spear/phishing
Bad Rabbit Spear/phishing, privilege escalation, credential misuse,

7
Examined our experience
#RSAC

Financial Services Transportation


- 17 of the Top 25 US FIs - Multiple automakers/ OEMs
Banking Exchanges - Multiple US-based Airlines
Hedge Funds Insurance Automotive Technology
Aviation Logistics

Health & Life Sciences Energy


- 4 of the Top 15 Bio- - Fortune 50 Super-Major Oil &
Pharma's + Ultra-rare Gas companies
Biotech Medical Devices Utilities Oil & Gas
Pharmaceutical Nuclear

8
How do breaches and attacks start?
#RSAC

 Evidence: Phishing & Spearphishing


• Spear phishing is the number one infection vector employed by 71 percent of organized
groups in 2017 (Symantec ISTR)
• Phishing & Spearphishing are significant attack vectors across attack groups and methods
(Crowdstrike GTR)
• 66% of malware from email attachments (Verizon DBIR)
 Solution: Technical Email Controls
• Active Spam & Phishing controls
• Sandboxing, prefetch
• DMARC, SPF, DKIM
• Track ‘Clicks’
• Mark ‘external’ email

9
Wait, how do breaches start?
#RSAC

 Evidence: Clicking on Links or Opening Attachments


• 90% of incidents due to human error (OTA)
• More than 1/3 of inadvertent activity involved attackers tricking users with links and
attachments (IBM X-Force)
• Click rates of 7-14% are typical and vary by industry; much higher rates are surprisingly
common (Verizon DBIR)
 Solution: Train Users To Spot Spear/Phishing
• Mark ‘external’ email
• Enable easy user reporting
• Phish yourself
• Manage incentives and penalties

10
How do attackers get in and move laterally?
#RSAC

 Evidence: Privileged access - stolen or weak passwords


• 81% of incidents involved weak or stolen passwords or both;
“only a single-digit percentage of breaches…involved exploiting a vulnerability” (Verizon
DBIR)
• Stolen credentials were the most commonly seen lateral movement technique (Symantec)
• More than 1/3 of inadvertent activity involved attackers tricking users with links and
attachments (IBM X-Force)
• Multi-factor authentication would have stopped or reduced the impact of virtually every
attack in 2017 (& 2016, 2015, 2014....)
 Solution: Implement multifactor authentication & manage privileged access
• Virtually any kind of two-factor solution is better than none
• Especially for privileged users and administrators
• Manage privileges, privilege groups, stored & cached credentials, and privilege groups
11
How do attackers “break systems’
#RSAC

 Evidence: Exploiting known vulnerabilities


• Time to Patch a known vulnerability is 6 weeks or more (Verizon DBIR)
• Misconfigured servers and networked backup incidents exposed more than 2 billion records
in 2017 (IBM X-Force)
• Zero day attacks used by only 27 percent of the 140 targeted attack groups tracked by
Symantec
• Privilege escalation through known vulnerabilities is commonly used by attackers
(Crowdstrike)
 Solution: Patch Quickly & Configure Properly
• Scans for vulnerabilities and configuration issues regularly
• Patch & fix identified vulnerabilities promptly
• Especially on Internet facing systems

12
Where do attackers start?
#RSAC

 Evidence: Exploiting known vulnerabilities


• Overall targeted attack activity is up by 10 percent in 2017 (Symantec)
• Trade secrets, followed by personal information are the top data targets (Verizon DBIR)
• Top targeted industries are: financial services, info & comms technology, manufacturing,
retail, and professional services (IBM X-Force)
• eCrime groups and nation states target specific victims (Crowdstrike)
• Every adversary threat model starts with reconnaissance
 Solution: Verify what’s facing the world & lock it down
• Use red teams to simulate adversary activity attacks
• Learn from offer external scans and risk scores
• Assess business and technology connections (aka dependencies)
• Especially on Internet facing systems
• Limit Internet Points of Presence; establish strong gateways/DMZs
13
The new Top Five
#RSAC

1. Implement multifactor authentication (MFA) & privileged access


management
2. Email technical controls
3. Train users to spot Spearphishing
4. Manage vulnerabilities well
5. Verify what’s facing the world & lock it down

14
Are there really only two kinds of companies?
#RSAC

Largest Health Insurance # of Subscribers #of Data Records Lost to


Providers Cyber Incidents (2012-2017)
1. United Healthcare 70 million 0
2. Anthem 39.4 million members 78 million1
3. Aetna 23 million members 12,000
4. Health Care Services Corp. 15 million members 0
5. Cigna 14.7 million members 0
6. Humana, 14.23 million members 3,831
7. Centene Corp. 11 million members 0
8. Kaiser Permanente 10.7 million members 8020
9. Highmark 5.3 million members 0
10. WellCare Health Plans 3.68 million members 24,809
Totals: ~207 million members ~78 million
1 The # of records lost at many companies exceeds the number of subscribers because the records of multiple family members may be associated with a single subscriber; in some cases, both current and past customer information was
lost.
Note: Companies that did not report a cybersecurity incident may have reported loss due to physical theft, employee negligence, or other factors.

15
How do these and other companies succeed?
#RSAC

• Nation-states and Criminals are looking for their


information
• Breach notification laws require reporting
• Under Executive Order 13636, the government
notifies companies when they are the target of an
incident.

➢ Focus on preparation based on reality

16
Some bonus ideas
#RSAC

• Practice and plan for major incidents


• Establish network & endpoint visibility for early
detection
• Breakout time <2 hours
• Dwell time ~86 days
GOVERNANCE
• Review software supply chains & update processes
• Exercise realistic cyber incident plans
• Find comprehensive threat intelligence services and
automate integration
• Support a culture of innovation around all aspects of
the NIST Cybersecurity Framework
https://www.nist.gov/cyberframework

17
When you get back to the office
#RSAC

• Review privileged account usage throughout the organization and investigate/implement MFA
• Begin Planning the implementation of MFA – even periodically for some applications that address APIs with
privilege
• Lock down email, DMARC/SPF/DKIM, Sandboxing, URL blocking attachment screening, marking email
“External”
• Think about anything that gives your users an edge –
• Expand phishing training – hit everyone with it on an irregular, but frequent basis increase awareness
• Then phish yourselves – use outlook/email tool buttons to increase reporting
• Update vulnerability management processes planning
• Focus on using inventory and architecture to drive patching the right things
• Review pentesting and red teaming plans – use external tools to look at yourselves from outside – like
the bad guys do
• Lock down anything that’s externally facing – especially cloud services from AWS & Axure to Google Docs,
Salesforce and ServiceNow.

18
#RSAC

APPENDIX

19
References – partial list
#RSAC

IT Governance – list of 742 incidents from Jan 17- Mar 18 (Lewis Morgan – Monthly Notes at IT Governance
https://www.itgovernance.co.uk/blog/author/lmorgan/)

Online Trust Alliance - Cyber Incident Trends Report:


https://otalliance.org/system/files/files/initiative/documents/ota_cyber_incident_trends_report_jan2018.pdf

Verizon Data Breach Investigation Report (Apr 2017) (http://www.verizonenterprise.com/verizon-insights-lab/dbir/2017/)

IBM X-Force Threat Intelligence Index March 2018 (https://www.ibm.com/security/data-breach/threat-intelligence)

Crowdstrike Global Threat Report (Feb 26, 2018) (https://go.crowdstrike.com/CrowdStrike-Threat-Report.html)

Symantec 2018 Internet Security Threat Report (March 22, 2018) (https://www.symantec.com/content/dam/symantec/docs/reports/istr-23-executive-
summary-en.pdf)

Harvard Business Review - https://hbr.org/2017/12/which-of-your-employees-are-most-likely-to-expose-your-company-to-a-cyberattack (Dec, 2017)

2017 Healthcare Breaches - 2017 Breach Report: 477 Breaches, 5.6M Patient Records Affected https://www.healthcare-informatics.com/news-
item/cybersecurity/2017-breach-report-477-breaches-56m-patient-records-affected

Aetna fined for 12,000 lost records - https://healthitsecurity.com/news/17m-settlement-agreement-reached-in-aetna-data-breach-case

10 Largest Health care organizations by membership - http://www.beckersasc.com/asc-coding-billing-and-collections/the-10-largest-health-insurance-


companies-by-membership.html

RSA Phishlabs reporting: https://info.phishlabs.com/blog/rsa-2018-preview-phishing-trends-intelligence-report

20
Highlights - Symantec
#RSAC

Symantec 2018 Internet Security Threat Report (March 22, 2018)


(https://www.symantec.com/content/dam/symantec/docs/reports/istr-23-
executive-summary-en.pdf)
targeted attack activity is up by 10 percent in 2017, motivated primarily (90 percent) by
intelligence gathering.
Spear phishing is the number one infection vector employed by 71 percent of organized
groups in 2017. The use of zero days continues to fall out of favor. In fact, only 27 percent of
the 140 targeted attack groups tracked by Symantec
1 in 13 Web requests lead to malware Up 3% from 2016
~140 groups of attackers, criminal, nation-state and intelligence gathering
stolen credentials were the most commonly seen lateral movement technique employed.
Attackers often use hacking software tools to obtain credentials from a compromised
computer and then use them to attempt to log into other computers on the network.
There was at least one large software update supply chain attack reported every month in
2017.

21
Highlights - Crowdstrike
#RSAC

Crowdstrike Global Threat Report (Feb 26, 2018)


(https://go.crowdstrike.com/CrowdStrike-Threat-Report.html)
Trickle-down of military grade cyberweapons to mass criminal use &
concommitent use of criminal attacks like ransomware in nation-state attacks
Breakout time of <2 hours to move laterally
Average Dwell time – 86 days
Slow Down Attackers
— limiting user account permissions
— application whitelisting
— segregating users and networks,
— And aggressively applying available patches.

22
Highlights – IBM X-Force
#RSAC

IBM X-Force Threat Intelligence Index March 2018


(https://www.ibm.com/security/data-breach/threat-intelligence)
Ransomware attacks cost more than $8B (US) globally in 2017
Misconfigured cloud servers and networked backup incidents unintentionally
exposed more than 2 billion records
More than one-third of inadvertent activity experienced by X-Force-monitored
clients involved attackers attempting to trick users into clicking on a link or
opening an attachment.

23
Highlights - Verizon
#RSAC

Verizon Data Breach Investigation Report (Apr 2017)


(http://www.verizonenterprise.com/verizon-insights-lab/dbir/2017/)
81% of breaches used stolen/weak passwords
66% of malware from email attachments
Breach timelines continue to paint a rather dismal picture—with time-to-
compromise being only seconds, time-to-exfiltration taking days, and times to
discovery and containment staying firmly in the months camp. Not surprisingly,
fraud detection was the most prominent discovery method, accounting for
85% of all breaches...
Phishing was again the top variety, found in over 90% of both incidents and
breaches.

24
Highlights - RSA
#RSAC

RSA Phishlabs Early Report (https://info.phishlabs.com/blog/rsa-2018-


preview-phishing-trends-intelligence-report)
Targeting shifted to Enterprise users
Webmail now #1 target vs FS before
Number of Office 365 Attacks
Shift to enterprises
Phishing on SMS & Social Media growing

25

You might also like