SlideShare a Scribd company logo
Utilizing the Critical Security Controls to
Secure Healthcare Technology
James Tarala, Enclave Security
Healthcare Security in the News
Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
http://www.healthcareitnews.com/news/infographic-biggest-healthcare-data-breaches-2012
Healthcare Security in the News
Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
FBI Annual Cyber Crime Complaints
Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
More Examples from the News
• PrivacyRights.org (updated weekly)
• Here are some that are reported (most are not)
• Just a small sample (organization/records breached):
– Public Broadcasting Service (69,000)
– RxAmerica and Accendo Insurance (175,000)
– Sega (1.29 Million)
– S. California Medical-Legal Consultants (300,000)
– Citibank (360,000)
– Sony Pictures (1 Million)
– Sony Playstation Network (101.6 Million)
Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
Specific Healthcare Challenges
• Highly mobile & temporary workforce members
• Demands from physicians & other VIPs
• Patient demands for the latest technology
• Vendor applications & data security
• Strategic partnerships & data security
• Confusing / conflicting / vague security standards
• Limited resources for security implementations
Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
The Current State of Affairs
• Clearly the bad guys seem to be winning the
cybersecurity fight
• While there are bright spots, they are few and far
between
• We seem to be getting better at detecting and
responding to the threat
• We need to be better at preventing the attacks from
occurring in the first place
Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
But what do we do?
Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
Information Assurance Frameworks
• There are a number of industry groups also trying to
address the issues
• Numerous frameworks have been established, such
as:
– CoBIT
– IT Assurance Framework (ITAF)
– ISO 27000 Series
– IT Baseline Protection Manual
– Consensus Audit Guidelines / Critical Security Controls
– Many, many others
Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
Industry Security Regulations
• Presently there are a number of government
information security standards available
• But, there are too many to choose from:
– Individual Corporate / Agency Standards
– NIST 800-53 / 800-53 A
– FISMA / DIACAP
– HIPAA / SOX / GLBA
– PCI / NERC / CIP
– 20 Critical Controls / Consensus Audit Guidelines
Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
Council on CyberSecurity
• Official home of the Critical Security Controls
• CEO is Jane Lute, former Deputy Secretary of DHS
• Not for Profit group responsible for managing the
Critical Security Controls (CSCs)
• Director of the CSCs is Tony Sager
• Mission is:
“The Council on CyberSecurity is an independent, global
organization committed to an open and secure Internet.”
Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
Document Contributors (1)
• Blue team members inside the Department of Defense
• Blue team members who provide services for non-DoD
government agencies
• Red & blue teams at the US National Security Agency
• US-CERT and other non-military incident response teams
• DoD Cyber Crime Center (DC3)
• Military investigators who fight cyber crime
• The FBI and other police organizations
• US Department of Energy laboratories
Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
Document Contributors (2)
• US Department of State
• Army Research Laboratory
• US Department of Homeland Security
• DoD and private forensics experts
• Red team members in DoD
• The SANS Institute
• Civilian penetration testers
• Federal CIOs and CISOs
• Plus over 100 other collaborators
Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
Project Guiding Principles
• Defenses should focus on addressing the attack activities
occurring today,
• Enterprise must ensure consistent controls across to
effectively negate attacks
• Defenses should be automated where possible
• Specific technical activities should be undertaken to produce a
more consistent defense
• Root cause problems must be fixed in order to ensure the
prevention or timely detection of attacks
• Metrics should be established that facilitate common ground
for measuring the effectiveness of security measures
Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
Cyber Intrusion Kill Chain
Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
Critical Security Controls vs Intrusion Kill Chain
Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
Critical Security Control
Reconnaissance
Weaponization
Delivery
Exploitation
Installation
Command&Control
ActionsonObjectives
CSC #1: Inventory of Authorized and
Unauthorized Devices
X X X X X X
CSC #2: Inventory of Authorized and
Unauthorized Software
X X X
CSC #3: Secure Configurations for Hardware
and Software on Mobile Devices, Laptops,
Workstations, and Servers
X X X
CSC #4: Continuous Vulnerability
Assessment and Remediation
X X X
Technical Defensive Tools
• Security Content Automation Protocol (SCAP)
compliant vulnerability management solution
• File integrity assessment monitoring and response
system
• Software whitelisting solution
Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
2013 Java Data Breaches
Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
2013 Java Attacks & Intrusion Kill Chain
1. The attacker discovered a weakness in software
commonly utilized by the victim (reconnaissance)
2. The attacker wrote attack code to exploit the
discovered software weakness (weaponization)
3. The attacker posted the attack code on a “watering
hole” website that would be trusted by the victim
(delivery)
4. The victim was lured into visiting the “watering hole”
website hosting the attack code (exploitation)
Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
2013 Java Attacks & Intrusion Kill Chain
5. The victim downloaded and executed the malicious
code (installation)
6. The malicious code compromised the victim’s
computer and connected to the attacker’s command
and control servers to allow the attacker access
(command and control)
7. The attacker performed his or her desired objectives
on the victim’s computers (actions on objectives)
Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
2013 Java Attacks - Defenses
• Critical Control #1: Inventory of Authorized and
Unauthorized Devices
• Critical Control #2: Inventory of Authorized and
Unauthorized Software
• Critical Control #3: Secure Configurations for
Hardware and Software on Mobile
Devices, Laptops, Workstations, and Servers
• Critical Control #4:Continuous Vulnerability
Assessment and Remediation
Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
Business Dashboards
Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
http://www.ncircle.com/index.php?s=solution_reporting
Potential Business Metrics
• How many unauthorized / unknown computers are currently
connected to the organization’s network?
• How many unauthorized software packages are running on the
organization’s computers?
• What percentage of the organization’s computers are running
software whitelisting defenses which blocks unauthorized
software programs from running?
• What is percentage of the organization’s computers that have
been configured (operating system and applications) according
to the organization’s documented standards?
• What is the comprehensive Common Vulnerability Scoring
System (CVSS) vulnerability rating for each of the organization’s
systems?
Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
Actionable Next Steps
1. Business leaders should define their strategy for
how to defend against cyber attacks (document a
charter).
2. Deploy technical tools to implement defensive goals.
3. Gather metrics on a continuous basis to measure
the organization’s progress.
4. Engage business leaders to act based on the metrics
that are gathered.
Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
Further Questions
• James Tarala
– E-mail: james.tarala@enclavesecurity.com
– Twitter: @isaudit
– Website: http://www.auditscripts.com
• Resources for further study:
– SANS SEC 440/566: Implementing & Auditing the
Critical Security Controls
– The Council on CyberSecurity
(http://www.counciloncybersecurity.org/)
Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security

More Related Content

What's hot (20)

PPTX
Effective Cyber Defense Using CIS Critical Security Controls
BSides Delhi
 
PDF
SANS 2013 Critical Security Controls Survey
Edgar Alejandro Villegas
 
PPTX
Top 20 Security Controls for a More Secure Infrastructure
Infosec
 
PPTX
Extending the 20 critical security controls to gap assessments and security m...
John M. Willis
 
PDF
20 Security Controls for the Cloud
NetStandard
 
PDF
Lessons Learned from the NIST CSF
Digital Bond
 
PDF
20 Critical Controls for Effective Cyber Defense (A must read for security pr...
Tahir Abbas
 
PDF
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
Risk Analysis Consultants, s.r.o.
 
PPTX
Using a Network Model to Address SANS Critical Controls 10 and 11
Skybox Security
 
PDF
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
EnterpriseGRC Solutions, Inc.
 
PDF
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
Lisa Niles
 
PDF
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
Cam Fulton
 
PDF
Accelerating OT - A Case Study
Digital Bond
 
PDF
A Case Study of the Capital One Data Breach
Anchises Moraes
 
PPTX
Cyber Security Threat Modeling
Dr. Anish Cheriyan (PhD)
 
PPTX
Managed Security Services from Symantec
Arrow ECS UK
 
PDF
Happiest Minds NIST CSF compliance Brochure
Suresh Kanniappan
 
PDF
DTS Solution - Building a SOC (Security Operations Center)
Shah Sheikh
 
PDF
Cheatsheet for your cloud project
Petteri Heino
 
PPTX
Improve threat detection with hids and alien vault usm
AlienVault
 
Effective Cyber Defense Using CIS Critical Security Controls
BSides Delhi
 
SANS 2013 Critical Security Controls Survey
Edgar Alejandro Villegas
 
Top 20 Security Controls for a More Secure Infrastructure
Infosec
 
Extending the 20 critical security controls to gap assessments and security m...
John M. Willis
 
20 Security Controls for the Cloud
NetStandard
 
Lessons Learned from the NIST CSF
Digital Bond
 
20 Critical Controls for Effective Cyber Defense (A must read for security pr...
Tahir Abbas
 
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
Risk Analysis Consultants, s.r.o.
 
Using a Network Model to Address SANS Critical Controls 10 and 11
Skybox Security
 
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
EnterpriseGRC Solutions, Inc.
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
Lisa Niles
 
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
Cam Fulton
 
Accelerating OT - A Case Study
Digital Bond
 
A Case Study of the Capital One Data Breach
Anchises Moraes
 
Cyber Security Threat Modeling
Dr. Anish Cheriyan (PhD)
 
Managed Security Services from Symantec
Arrow ECS UK
 
Happiest Minds NIST CSF compliance Brochure
Suresh Kanniappan
 
DTS Solution - Building a SOC (Security Operations Center)
Shah Sheikh
 
Cheatsheet for your cloud project
Petteri Heino
 
Improve threat detection with hids and alien vault usm
AlienVault
 

Similar to Utilizing the Critical Security Controls to Secure Healthcare Technology (20)

PPTX
How to Use the NIST CSF to Recover from a Healthcare Breach
Symantec
 
PPTX
2016-Symposium-Cybersecurity-Slides.pptx
naomisowunmi
 
PDF
(Ebook) CIS Critical Security Controls by Center for Internet Security
hqusshov3993
 
PPTX
Cybersecurity: Challenges, Initiatives, and Best Practices
John Gilligan
 
PPTX
Leveraging Federal Procurement to Improve Cyber Security
John Gilligan
 
PPTX
Solving the CIO’s Cybersecurity Dilemma
John Gilligan
 
PPT
Healthcare and Cyber Security 2015 :Is India Ready?
Apollo Hospitals Group and ATNF
 
PPTX
Healing healthcare security
Barry Caplin
 
PDF
8 Mandatory Security Control Categories for Successful Submissions
ICS
 
PDF
Whitepaper next generation_patient_safety_bertine_mc_kenna.01
Ronan Martin
 
PDF
DHHS ASPR Cybersecurity Threat Information Resources
David Sweigert
 
PDF
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #1
Lisa Niles
 
PDF
CIS20 CSCs+mapping to NIST+ISO.pdf
LBagger1
 
PPTX
Critical Controls Of Cyber Defense
Rishu Mehra
 
PPTX
Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02
technext1
 
PDF
C I S C r i t i c a l C o n t r o l s
ssuserd4ef17
 
PPT
Healthcare cyber powerpoint
safecities
 
PPTX
SCADA Security Webinar
AVEVA
 
PDF
Cybersecurity Challenges in the Healthcare Industry.pdf
MobibizIndia1
 
PDF
2014-12-16 defense news - shutdown the hackers
Shawn Wells
 
How to Use the NIST CSF to Recover from a Healthcare Breach
Symantec
 
2016-Symposium-Cybersecurity-Slides.pptx
naomisowunmi
 
(Ebook) CIS Critical Security Controls by Center for Internet Security
hqusshov3993
 
Cybersecurity: Challenges, Initiatives, and Best Practices
John Gilligan
 
Leveraging Federal Procurement to Improve Cyber Security
John Gilligan
 
Solving the CIO’s Cybersecurity Dilemma
John Gilligan
 
Healthcare and Cyber Security 2015 :Is India Ready?
Apollo Hospitals Group and ATNF
 
Healing healthcare security
Barry Caplin
 
8 Mandatory Security Control Categories for Successful Submissions
ICS
 
Whitepaper next generation_patient_safety_bertine_mc_kenna.01
Ronan Martin
 
DHHS ASPR Cybersecurity Threat Information Resources
David Sweigert
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #1
Lisa Niles
 
CIS20 CSCs+mapping to NIST+ISO.pdf
LBagger1
 
Critical Controls Of Cyber Defense
Rishu Mehra
 
Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02
technext1
 
C I S C r i t i c a l C o n t r o l s
ssuserd4ef17
 
Healthcare cyber powerpoint
safecities
 
SCADA Security Webinar
AVEVA
 
Cybersecurity Challenges in the Healthcare Industry.pdf
MobibizIndia1
 
2014-12-16 defense news - shutdown the hackers
Shawn Wells
 
Ad

More from EnclaveSecurity (10)

PPTX
Automating Post Exploitation with PowerShell
EnclaveSecurity
 
PPTX
Enterprise PowerShell for Remote Security Assessments
EnclaveSecurity
 
PPTX
An Introduction to PowerShell for Security Assessments
EnclaveSecurity
 
PPTX
An Introduction to PowerShell for Security Assessments
EnclaveSecurity
 
PPTX
Information Assurance Metrics: Practical Steps to Measurement
EnclaveSecurity
 
PPTX
Governance fail security fail
EnclaveSecurity
 
PPTX
The intersection of cool mobility and corporate protection
EnclaveSecurity
 
PPTX
Its time to rethink everything a governance risk compliance primer
EnclaveSecurity
 
PPTX
Cyber war or business as usual
EnclaveSecurity
 
PPT
Benefits of web application firewalls
EnclaveSecurity
 
Automating Post Exploitation with PowerShell
EnclaveSecurity
 
Enterprise PowerShell for Remote Security Assessments
EnclaveSecurity
 
An Introduction to PowerShell for Security Assessments
EnclaveSecurity
 
An Introduction to PowerShell for Security Assessments
EnclaveSecurity
 
Information Assurance Metrics: Practical Steps to Measurement
EnclaveSecurity
 
Governance fail security fail
EnclaveSecurity
 
The intersection of cool mobility and corporate protection
EnclaveSecurity
 
Its time to rethink everything a governance risk compliance primer
EnclaveSecurity
 
Cyber war or business as usual
EnclaveSecurity
 
Benefits of web application firewalls
EnclaveSecurity
 
Ad

Recently uploaded (20)

PPTX
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
PDF
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
PDF
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
PPTX
Top iOS App Development Company in the USA for Innovative Apps
SynapseIndia
 
PDF
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
PDF
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
PPTX
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
PDF
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
PDF
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
PDF
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
PDF
Windsurf Meetup Ottawa 2025-07-12 - Planning Mode at Reliza.pdf
Pavel Shukhman
 
PDF
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
PPT
Interview paper part 3, It is based on Interview Prep
SoumyadeepGhosh39
 
PPTX
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
PDF
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
PDF
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
PDF
Python basic programing language for automation
DanialHabibi2
 
PDF
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
PDF
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
Top iOS App Development Company in the USA for Innovative Apps
SynapseIndia
 
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
Windsurf Meetup Ottawa 2025-07-12 - Planning Mode at Reliza.pdf
Pavel Shukhman
 
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
Interview paper part 3, It is based on Interview Prep
SoumyadeepGhosh39
 
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
Python basic programing language for automation
DanialHabibi2
 
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 

Utilizing the Critical Security Controls to Secure Healthcare Technology

  • 1. Utilizing the Critical Security Controls to Secure Healthcare Technology James Tarala, Enclave Security
  • 2. Healthcare Security in the News Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security http://www.healthcareitnews.com/news/infographic-biggest-healthcare-data-breaches-2012
  • 3. Healthcare Security in the News Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
  • 4. FBI Annual Cyber Crime Complaints Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
  • 5. More Examples from the News • PrivacyRights.org (updated weekly) • Here are some that are reported (most are not) • Just a small sample (organization/records breached): – Public Broadcasting Service (69,000) – RxAmerica and Accendo Insurance (175,000) – Sega (1.29 Million) – S. California Medical-Legal Consultants (300,000) – Citibank (360,000) – Sony Pictures (1 Million) – Sony Playstation Network (101.6 Million) Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
  • 6. Specific Healthcare Challenges • Highly mobile & temporary workforce members • Demands from physicians & other VIPs • Patient demands for the latest technology • Vendor applications & data security • Strategic partnerships & data security • Confusing / conflicting / vague security standards • Limited resources for security implementations Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
  • 7. The Current State of Affairs • Clearly the bad guys seem to be winning the cybersecurity fight • While there are bright spots, they are few and far between • We seem to be getting better at detecting and responding to the threat • We need to be better at preventing the attacks from occurring in the first place Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
  • 8. But what do we do? Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
  • 9. Information Assurance Frameworks • There are a number of industry groups also trying to address the issues • Numerous frameworks have been established, such as: – CoBIT – IT Assurance Framework (ITAF) – ISO 27000 Series – IT Baseline Protection Manual – Consensus Audit Guidelines / Critical Security Controls – Many, many others Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
  • 10. Industry Security Regulations • Presently there are a number of government information security standards available • But, there are too many to choose from: – Individual Corporate / Agency Standards – NIST 800-53 / 800-53 A – FISMA / DIACAP – HIPAA / SOX / GLBA – PCI / NERC / CIP – 20 Critical Controls / Consensus Audit Guidelines Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
  • 11. Council on CyberSecurity • Official home of the Critical Security Controls • CEO is Jane Lute, former Deputy Secretary of DHS • Not for Profit group responsible for managing the Critical Security Controls (CSCs) • Director of the CSCs is Tony Sager • Mission is: “The Council on CyberSecurity is an independent, global organization committed to an open and secure Internet.” Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
  • 12. Document Contributors (1) • Blue team members inside the Department of Defense • Blue team members who provide services for non-DoD government agencies • Red & blue teams at the US National Security Agency • US-CERT and other non-military incident response teams • DoD Cyber Crime Center (DC3) • Military investigators who fight cyber crime • The FBI and other police organizations • US Department of Energy laboratories Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
  • 13. Document Contributors (2) • US Department of State • Army Research Laboratory • US Department of Homeland Security • DoD and private forensics experts • Red team members in DoD • The SANS Institute • Civilian penetration testers • Federal CIOs and CISOs • Plus over 100 other collaborators Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
  • 14. Project Guiding Principles • Defenses should focus on addressing the attack activities occurring today, • Enterprise must ensure consistent controls across to effectively negate attacks • Defenses should be automated where possible • Specific technical activities should be undertaken to produce a more consistent defense • Root cause problems must be fixed in order to ensure the prevention or timely detection of attacks • Metrics should be established that facilitate common ground for measuring the effectiveness of security measures Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
  • 15. Cyber Intrusion Kill Chain Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
  • 16. Critical Security Controls vs Intrusion Kill Chain Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security Critical Security Control Reconnaissance Weaponization Delivery Exploitation Installation Command&Control ActionsonObjectives CSC #1: Inventory of Authorized and Unauthorized Devices X X X X X X CSC #2: Inventory of Authorized and Unauthorized Software X X X CSC #3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers X X X CSC #4: Continuous Vulnerability Assessment and Remediation X X X
  • 17. Technical Defensive Tools • Security Content Automation Protocol (SCAP) compliant vulnerability management solution • File integrity assessment monitoring and response system • Software whitelisting solution Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
  • 18. 2013 Java Data Breaches Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
  • 19. 2013 Java Attacks & Intrusion Kill Chain 1. The attacker discovered a weakness in software commonly utilized by the victim (reconnaissance) 2. The attacker wrote attack code to exploit the discovered software weakness (weaponization) 3. The attacker posted the attack code on a “watering hole” website that would be trusted by the victim (delivery) 4. The victim was lured into visiting the “watering hole” website hosting the attack code (exploitation) Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
  • 20. 2013 Java Attacks & Intrusion Kill Chain 5. The victim downloaded and executed the malicious code (installation) 6. The malicious code compromised the victim’s computer and connected to the attacker’s command and control servers to allow the attacker access (command and control) 7. The attacker performed his or her desired objectives on the victim’s computers (actions on objectives) Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
  • 21. 2013 Java Attacks - Defenses • Critical Control #1: Inventory of Authorized and Unauthorized Devices • Critical Control #2: Inventory of Authorized and Unauthorized Software • Critical Control #3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers • Critical Control #4:Continuous Vulnerability Assessment and Remediation Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
  • 22. Business Dashboards Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security http://www.ncircle.com/index.php?s=solution_reporting
  • 23. Potential Business Metrics • How many unauthorized / unknown computers are currently connected to the organization’s network? • How many unauthorized software packages are running on the organization’s computers? • What percentage of the organization’s computers are running software whitelisting defenses which blocks unauthorized software programs from running? • What is percentage of the organization’s computers that have been configured (operating system and applications) according to the organization’s documented standards? • What is the comprehensive Common Vulnerability Scoring System (CVSS) vulnerability rating for each of the organization’s systems? Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
  • 24. Actionable Next Steps 1. Business leaders should define their strategy for how to defend against cyber attacks (document a charter). 2. Deploy technical tools to implement defensive goals. 3. Gather metrics on a continuous basis to measure the organization’s progress. 4. Engage business leaders to act based on the metrics that are gathered. Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security
  • 25. Further Questions • James Tarala – E-mail: [email protected] – Twitter: @isaudit – Website: http://www.auditscripts.com • Resources for further study: – SANS SEC 440/566: Implementing & Auditing the Critical Security Controls – The Council on CyberSecurity (http://www.counciloncybersecurity.org/) Utilizing the Critical Security Controls to Secure Healthcare Technology © 2013 Enclave Security

Editor's Notes

  • #2: Utilizing the Critical Security Controls to Secure Healthcare Technology The development of the Critical Security Controls is transforming the way companies measure and monitor the success of their security programs while drastically reducing the cost of security. Fifteen of the twenty controls can be automated, some at limited cost to the organization, and the data is readily available to be presented in conference rooms and board rooms. Upon implementing, hospitals will have the ability to measure compliance, track progress, and know when they’ve reached certain goals. They were developed and agreed upon by a consortium including NSA, US Cert, DoD JTF-GNO, the Department of Energy Nuclear Laboratories, Department of State, DoD Cyber Crime Center as well as the top commercial forensics experts and pen testers serving the banking and critical infrastructure communities. Since the US State Department implemented these controls they have demonstrated “more than 80% reduction in ‘measured’ security risk through the rigorous automation and measurement of the Top 20 Controls.” (from the SANS website - http://www.sans.org/critical-security-controls/)