Evidence-Based Security: The New Top Five Controls: Todd Inskeep
Evidence-Based Security: The New Top Five Controls: Todd Inskeep
EVIDENCE-BASED SECURITY:
THE NEW TOP FIVE CONTROLS
Todd Inskeep
Principal
Booz Allen Hamilton
@Todd_Inskeep
Where do you start protecting an enterprise?
#RSAC
2
Today’s CIS top 20 controls
#RSAC
• Published and
maintains list of controls
• Often used as a starting point
From: https://www.cisecurity.org/controls/
3
Are these top 5 really the best?
#RSAC
4
#RSAC
IT Governance – list of 742 incidents from Jan 17- Mar 18 (Lewis Morgan – Monthly Notes at IT Governance
https://www.itgovernance.co.uk/blog/author/lmorgan/) & speaker analysis & review
Symantec 2018 Internet Security Threat Report (March 22, 2018) (https://www.symantec.com/content/dam/symantec/docs/reports/istr-23-
executive-summary-en.pdf)
2017 Healthcare Breaches - 2017 Breach Report: 477 Breaches, 5.6M Patient Records Affected https://www.healthcare-informatics.com/news-
item/cybersecurity/2017-breach-report-477-breaches-56m-patient-records-affected
Attack Methodologies
SWIFT Attacks (2016) Spearphishing, Credential misuse
HBO Spearphishing, Credential misuse
Leaked Government Tools Unknown – could be spearphishing, credential misuse, disgruntled insider
7
Examined our experience
#RSAC
8
How do breaches and attacks start?
#RSAC
9
Wait, how do breaches start?
#RSAC
10
How do attackers get in and move laterally?
#RSAC
12
Where do attackers start?
#RSAC
14
Are there really only two kinds of companies?
#RSAC
15
How do these and other companies succeed?
#RSAC
16
Some bonus ideas
#RSAC
17
When you get back to the office
#RSAC
• Review privileged account usage throughout the organization and investigate/implement MFA
• Begin Planning the implementation of MFA – even periodically for some applications that address APIs with
privilege
• Lock down email, DMARC/SPF/DKIM, Sandboxing, URL blocking attachment screening, marking email
“External”
• Think about anything that gives your users an edge –
• Expand phishing training – hit everyone with it on an irregular, but frequent basis increase awareness
• Then phish yourselves – use outlook/email tool buttons to increase reporting
• Update vulnerability management processes planning
• Focus on using inventory and architecture to drive patching the right things
• Review pentesting and red teaming plans – use external tools to look at yourselves from outside – like
the bad guys do
• Lock down anything that’s externally facing – especially cloud services from AWS & Axure to Google Docs,
Salesforce and ServiceNow.
18
#RSAC
APPENDIX
19
References – partial list
#RSAC
IT Governance – list of 742 incidents from Jan 17- Mar 18 (Lewis Morgan – Monthly Notes at IT Governance
https://www.itgovernance.co.uk/blog/author/lmorgan/)
Symantec 2018 Internet Security Threat Report (March 22, 2018) (https://www.symantec.com/content/dam/symantec/docs/reports/istr-23-executive-
summary-en.pdf)
2017 Healthcare Breaches - 2017 Breach Report: 477 Breaches, 5.6M Patient Records Affected https://www.healthcare-informatics.com/news-
item/cybersecurity/2017-breach-report-477-breaches-56m-patient-records-affected
20
Highlights - Symantec
#RSAC
21
Highlights - Crowdstrike
#RSAC
22
Highlights – IBM X-Force
#RSAC
23
Highlights - Verizon
#RSAC
24
Highlights - RSA
#RSAC
25