Cybersecurity & Networks

IBM Cybersecurity Analyst Professional Certificate

IBM Cybersecurity Analyst Professional Certificate is a specialization course, which is led by industry experts. The specialization focuses on intermediary skills related to cybersecurity

This specialization has 6 courses and a Capstone project.

1. Introduction to Cybersecurity Tools and Cyberattacks

It teaches:

  • History of major cyber attacks throughout the modern history
  • Types of Threat actors (APT, hacktivist etc), and their motives

and much more…

It has following sub-modules…

2. Cybersecurity Roles, Processes and Operating System Security

It has following topics:

  • Frameworks like ISOs, ITIL, COSO etc.
  • Condentiality principle
  • How OS security works and important techniques.

and more…

It has following 4 sub-modules…

3. Cybersecurity Compliance Frameworks and System Administration

It contains following topics:

  • CFAA, NIST, GPDR, etc.
  • UEM systems, and Windows Patching.

and more…

It has 4 modules…

4. Network Security and Database Vulnerabilities

This course has following content:

  • Network transport layers
  • IPv4, IPv6 address types and OSI Model
  • Structured and unstructured database types

and much more…

It has following modules…

5. Penetration Testing, Incident Response and Forensics

It explains topics like:

  • Social Engineering, Passive and active record.
  • Digital forensics needs and methods.
  • History of scripting and scripting langs like JS, Python etc.

and much more..

This course offers 4 modules…

6. Cyber Threat Intelligence

It explains topics like:

  • Give info about different threat intelligence platform like TruStar, IBM X-Force, FireEye etc.
  • Data security and loss prevention

and much more…

It has 4 modules…

7. Cybersecurity Capstone: Breach Response Case Studies

It is a case study about LastPass Data Breach of 2022.

Expand me

UOM Cybersecurity Specialization

Cybersecurity Specialization is an advanced course offered by University of Maryland. It dives deep into the core topics related to software security, cryptography, hardware etc.

Info

My progress in this specialization came to a halt after completing the first course, primarily because the subsequent courses were highly advanced and required background knowledge that I lacked. I will resume my journey once I feel confident in possessing the necessary expertise to tackle those courses.

1. Usable Security

This course is all about principles of Human Computer Interaction, designing secure systems, doing usability studies to evaluate the most efficient security model and much more…

This course contain 6 modules…

CompTIA SY0-701 Security+ Training Course

This training course is offered by Professor Messer over on YouTube.

Tip

You can directly support Professor Messer by buying wonderfully written notes from his website.

This training course is subdivided into 6 sections:

Subsections of Cybersecurity & Networks

IBM Cybersecurity Analyst Professional Certificate

IBM Cybersecurity Analyst Professional Certificate is a specialization course, which is led by industry experts. The specialization focuses on intermediary skills related to cybersecurity

This specialization has 6 courses and a Capstone.

1. Introduction to Cybersecurity Tools and Cyberattacks

It teaches:

  • History of major cyber attacks throughout the modern history
  • Types of Threat actors (APT, hacktivist etc), and their motives

and much more…

It has following sub-modules…

2. Cybersecurity Roles, Processes and Operating System Security

It has following topics:

  • Frameworks like ISOs, ITIL, COSO etc.
  • Condentiality principle
  • How OS security works and important techniques.

and more…

It has following 4 sub-modules…

3. Cybersecurity Compliance Frameworks and System Administration

It contains following topics:

  • CFAA, NIST, GPDR, etc.
  • UEM systems, and Windows Patching.

and more…

It has 4 modules…

4. Network Security and Database Vulnerabilities

This course has following content:

  • Network transport layers
  • IPv4, IPv6 address types and OSI Model
  • Structured and unstructured database types

and much more…

It has following modules…

5. Penetration Testing, Incident Response and Forensics

It explains topics like:

  • Social Engineering, Passive and active record.
  • Digital forensics needs and methods.
  • History of scripting and scripting langs like JS, Python etc.

and much more..

This course offers 4 modules…

6. Cyber Threat Intelligence

It explains topics like:

  • Give info about different threat intelligence platform like TruStar, IBM X-Force, FireEye etc.
  • Data security and loss prevention

and much more…

It has 4 modules…

7. Cybersecurity Capstone: Breach Response Case Studies

It is a case study about LastPass Data Breach of 2022.

Expand me

Subsections of IBM Cybersecurity Analyst

Subsections of Cybersecurity Tools and Cyberattacks

History of Cybersecurity

Introduction to Cybersecurity Tools & Cyberattacks

Today’s Cybersecurity Challenge

Threats > ⇾ Alerts > ⇾ Available Analyst < -⇾ Needed Knowledge > ⇾ Available Time <

By 2022, there will be 1.8 millions unfulfilled cybersecurity jobs.

SOC(Security Operation Center) Analyst Tasks

  • Review security incidents in SIEM (security information and even management)
  • Review the data that comprise the incident (events/flows)
  • Pivot the data multiple ways to find outliers (such as unusual domains, IPs, file access)
  • Expand your search to capture more data around that incident
  • Decide which incident to focus on next
  • Identify the name of the malware
  • Take these newly found IOCs (indicators of compromise) from the internet and search them back in SIEM
  • Find other internal IPs which are potentially infected with the same malware
  • Search Threat Feeds, Search Engine, Virus Total and your favorite tools for these outliers/indicators; Find new malware is at play
  • Start another investigation around each of these IPs
  • Review the payload outlying events for anything interesting (domains, MD5s, etc.)
  • Search more websites for IOC information for that malware from the internet

From Ronald Reagan/War Games to where we are Today

  • He was a Hollywood actor as well as US-president
  • He saw a movie War Games, where a teenager hacker hacked into the Pentagon artificial intelligent computer to play a game of thermonuclear war using a dial-up connection, which was actually played using real missiles due to miss-configuration

Impact of 9/11 on Cybersecurity

  • What happens if 9/11 in tech-space? Like hack and destruction of SCADA system used in dams and industrial automation systems etc.

Nice early operations

Clipper Chip: (NSA operation for tapping landline phones using some kind of chip)

Moonlight Maze: (in the 2000s, process to dump passwords of Unix/Linux servers investigated by NSA/DOD affected many US institutions)

Solar Sunrise: (series of attack on DOD computers on FEB 1998, exploited known vulnerability of operating system, attack two teenagers in California, one of whom was an Israeli)

Buckshot Yankee: (series of compromises in year 2008, everything starts with USB inserted in Middle East military base computer, remained on the network for 14 months, Trojan used was agent.BTZ)

Desert Storm: (early 90s, some radars used to alert military forces about airplanes are tampered by feeding fake information of Saddam’s regime)

Bosnia: (Bosnia war, fake news to military field operations etc.)

Cybersecurity Introduction

  • Every minute, thousands of tweets are sent, and millions of videos are watched.
  • Due to IOT (Internet of Things) and mobile tech, we have a lot to protect.
  • We have multiple vendors now, which become complicated to track for security vulnerabilities.

Things to Consider when starting a Cybersecurity Program

How and where to start?

  • Security Program: Evaluate, create teams, baseline, identify and model threats, use cases, risk, monitoring, and control.
  • Admin Controls: Policies, procedures, standards, user education, incident response, disaster recovery, compliance and physical security.
  • Asset Management: Classifications, implementation steps, asset control, and documents.
  • Tech Controls: Network infrastructure, endpoints, servers, identity management, vulnerability management, monitoring and logging.

Cybersecurity – A Security Architect’s Perspective

What is Security?

A message is considered secure when it meets the following criteria of CIA triad.

Confidentiality ↔ Authentication ↔ Integrity

Computer Security, NIST (National Institute of Standards and Technology) defined.

“The protection afforded to an automated information system in order to attain the applicable objectives to preserving the integrity, availability, and Confidentiality of information system resources. Includes hardware, software, firmware, information/data, and telecommunications.”

Additional Security Challenges

Security not as simple as it seems

  • Easy requirements, tough solution
  • Solutions can be attacked themselves
  • Security Policy Enforcement structure can complicate solutions
  • Protection of enforcement structure can complicate solutions
  • Solution itself can be easy but complicated by protection
  • Protectors have to be right all the time, attackers just once
  • No one likes security until it’s needed, seat belt philosophy.
  • Security Architecture require constant effort
  • Security is viewed as in the way

What is Critical Thinking?

Beyond Technology: Critical Thinking in Cybersecurity

“The adaption of the processes and values of scientific inquiry to the special circumstances of strategic intelligence.”

  • Cybersecurity is a diverse, multi faced field
    • Constantly changing environment
    • Fast-paced
    • Multiple stakeholders
    • Adversary presence
  • Critical thinking forces you to think and act in situations where there are no clear answers nor specific procedures.
  • Part Art, Part Science: This is subjective and impossible to measure.

Critical Thinking: A Model

  • Hundreds of tools updating always with different working models, so critical thinking is more important than ever to approach problems in more pragmatic way.
  • Interpersonal skills for working with other people and sharing information.

Critical Thinking – 5 Key Skills

  • 1) Challenge Assumption

    • question your Assumption

    Explicitly list all Assumptions ↔ Examine each with key Q’s ↔ Categorize based on evidence ↔ refine and remove ↔ Identify additional data needs

  • 2) Consider alternatives

    Brainstorm ↔ The 6 W’s (who/what/when/where/why/how) ↔ Null hypothesis

  • 3) Evaluate data

    • Know your DATA
    • Establish a baseline for what’s normal
    • be on the lookout for inconsistent data
    • proactive
  • 4) Identify key drivers

    • Technology
    • Regulatory
    • Society
    • Supply Chain
    • Employee
    • Threat Actors
  • 5) Understand context

Operational environment you’re working in. Put yourself in other’s shoe, reframe the issue.

  • Key components
  • Factors at play
  • Relationships
  • similarities/differences
  • redefine

A Brief Overview of Types of Threat Actors and their Motives

  • Internal Users
  • Hackers (Paid or not)
  • Hacktivism
  • Governments

Motivation Factors

  • Just to play
  • Political action and movements
  • Gain money
  • Hire me! (To demonstrate what can I do for somebody to hire me or use my services)

Hacking organizations

  • Fancy Bears (US election hack)
  • Syrian Electronic Army
  • Guardians of the peace (Leaked Sony Data about film regarding Kim Jong-un to prevent its release)

Nation States

  • NSA
  • Tailored Access Operations (USA)
  • GCHQ (UK)
  • Unit 61398 (China)
  • Unit 8200 (Israel)

Major different types of cyberattacks

  • Sony Hack Play-station Hack by a Hacktivist group called Lutz (2011).
  • Singapore cyberattack Anonymous attacked multiple websites in Singapore as a protest (2013).
  • Multiple Attacks E-bay, Home-Depot, UBISOFT, LinkedIn, Gobiemos
  • Target Hack More than 100 million of credit cards were leaked (2015).

Malware and attacks

  • SeaDaddy and SeaDuke (CyberBears US Election)
  • BlackEnergy 3.0 (Russian Hackers)
  • Shamoon (Iran Hackers)
  • Duqu and Flame (Olympic Games US and Israel)
  • DarkSeoul (Lazarous and North Korea)
  • WannaCry (Lazarous and North Korea)

An Architect’s perspective on attack classifications

Security Attack Definition

Two main classifications

  • Passive attacks

    • Essentially an eavesdropping styles of attacks
    • Second class is traffic analysis
    • Hard to detect the passive nature of attack as just traffic is monitored not tampered
  • Active Attacks

    • Explicit interception and modification
    • Several classes of these attack exist Examples
    • Masquerade (Intercepting packets as someone else)
    • Replay
    • Modification
    • DDoS

Security Services

“A process or communication service that is provided by a system, to give a specific kind of protection to a system resource.”

  • Security services implement security policies. And are implemented by security mechanisms

X.800 definition: “a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers”

RFC 2828: “a processing or communication service provided by a system to give a specific kind of protection to system resources”

Security Service Purpose

  • Enhance security of data processing systems and information transfers of an organization
  • Intended to counter security attacks
  • Using one or more security mechanisms
  • Often replicates functions normally associated with physical documents
    • which, for example, have signatures, dates; need protection from disclosure, tampering, or destruction, be notarized or witnessed; be recorded or licensed

Security Services, X.800 style

  • Authentication
  • Access control
  • Data confidentiality
  • Data integrity
  • Non-repudiation (protection against denial by one of the parties in a communication)
  • Availability

Security Mechanisms

  • Combination of hardware, software, and processes
  • That implement a specific security policy
    • Protocol suppression, ID and Authentication, for example
  • Mechanisms use security services to enforce security policy
  • Specific security mechanisms:
    • Cryptography, digital signatures, access controls, data integrity, authentication exchange, traffic padding, routing control, notarization
  • Pervasive security mechanisms
    • Trusted functionality, security labels, event detection, security audit trails, security recovery

Network Security Model

Network Security Model Network Security Model

Security Architecture is Context

According to X.800:

  • Security: It is used in the sense of minimizing the vulnerabilities of assets and resources.
  • An asset is anything of value
  • A vulnerability is any weakness that could be exploited to violate a system or the information it contains
  • A threat is a potential violation of security

Security Architecture and Motivation

The motivation for security in open systems - a) Society’s increasing dependence on computers that are accessed by, or linked by, data communications and which require protection against various threats; - b) The appearance in several countries of “data protection” which obliges suppliers to demonstrate system integrity and privacy; - c) The wish of various organizations to use OSI recommendations, enhanced as needed, for existing and future secure systems

Security Architecture – Protection

What is to be protected? - a) Information or data; - b) communication and data processing services; and - c) equipment and facilities

Organizational Threats

The threats to a data communication system include the following

  • a) destruction of information and/or other resources
  • b) corruption or modification of information
  • c) theft, removal, or loss of information and/or other resources
  • d) disclosure of information; and
  • e) interruption of services

Types of Threats

  • Accidental threats do not involve malicious intent
  • Intentional threats require a human with intent to violate security.
  • If an intentional threat results in action, it becomes an attack.
  • Passive threats do not involve any (non-trivial) change to a system.
  • Active threats involve some significant change to a system.

Attacks

“An attack is an action by a human with intent to violate security.”

  • It doesn’t matter if the attack succeeds. It is still considered an attack even if it fails.

Passive Attacks

Two more forms:

  • Disclosure (release of message content) This attacks on the confidentiality of a message.
  • Traffic analysis (or traffic flow analysis) also attacks the confidentiality

Active Attacks

Fours forms:

  • I) Masquerade: impersonification of a known or authorized system or person
  • II)Replay: a copy of a legitimate message is captured by an intruder and re-transmitted
  • III) Modification
  • IV) Denial of Service: The opponent prevents authorized users from accessing a system.

Security Architecture – Attacks models

Passive Attacks

Passive Attack: Traffic Analysis Passive Attack: Traffic Analysis

Active Attacks

Active Attack: Masquerade Active Attack: Masquerade

Active Attack: Modification Active Attack: Modification

Active Attack: DDos Active Attack: DDos

Active Attack: DDos Active Attack: DDos

Malware and an Introduction to Threat Protection

Malware and Ransomware

  • Malware: Short for malicious software, is any software used to disrupt computer or mobile operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising. Before the term malware was coined by Yisrael Radai in 1990. Malicious software was referred to as computer viruses.

Types of Malware

  • Viruses
  • Worms
  • Trojans Horses
  • Spyware
  • Adware
  • RATs
  • Rootkit
  • Ransomware: A type of code which restricts the user’s access to the system resources and files.

Other Attack Vectors

  • Botnets
  • Keyloggers
  • Logic Bombs (triggered when certain condition is met, to cripple the system in different ways)
  • APTs (Advanced Persistent Threats: main goal is to get access and monitor the network to steal information)

Some Known Threat Actors

  • Fancy Bears: Russia
  • Lazarous Groups: North Korea
  • Periscope Group: China

Threat Protection

  • Technical Control
    • Antivirus (AV)
    • IDS (Intrusion Detection System)
    • IPS (Intrusion Protection System)
    • UTM (Unified Threat Management)
    • Software Updates
  • Administrative Control
    • Policies
    • Trainings (social engineering awareness training etc.)
    • Revision and tracking (The steps mentioned should remain up-to-date)

Additional Attack Vectors Today

Internet Security Threats – Mapping

Mapping

  • before attacking; “case the joint" – find out what services are implemented on network
  • Use ping to determine what hosts have addresses on network
  • Post scanning: try to establish TCP connection to each port in sequence (see what happens)
  • NMap Mapper: network exploration and security auditing

Mapping: Countermeasures

  • record traffic entering the network
  • look for suspicious activity (IP addresses, ports being scanned sequentially)
  • use a host scanner and keep a good inventory of hosts on the network
    • Red lights and sirens should go off when an unexpected ‘computer’ appears on the network

Internet Security Threats – Packet Sniffing

Packet Sniffing

  • broadcast media
  • promiscuous NIC reads all packets passing by
  • can read all unencrypted data

Packet Sniffing – Countermeasures

  • All hosts in the organization run software that checks periodically if host interface in promiscuous mode.
  • One host per segment of broadcast media.

Internet Security Threats – IP Spoofing

IP Spoofing

  • can generate ‘raw’ IP packets directly from application, putting any value into IP source address field
  • receiver can’t tell if source is spoofed

IP Spoofing: ingress filtering

  • Routers should not forward out-going packets with invalid source addresses (e.g., data-gram source address not in router’s network)
  • Great, but ingress can not be mandated for all networks

Internet Security Threats – Denial of Service

Denial of service

  • flood of maliciously generated packets ‘swamp’ receiver
  • Distributed DOS: multiple coordinated sources swamp receiver

Denial of service – Countermeasures

  • filter out flooded (e.g., SYN) before reaching host: throw out good with bad
  • trace-back to source of floods (most likely an innocent, compromised machine)

Internet Security Threats – Host insertions

Host insertions

  • generally an insider threat, a computer ‘host’ with malicious intent is inserted in sleeper mode on the network

Host insertions – Countermeasures

  • Maintain an accurate inventory of computer hosts by MAC addresses
  • Use a host scanning capability to match discoverable hosts again known inventory
  • Missing hosts are OK
  • New hosts are not OK (red lights and sirens)

Attacks and Cyber Crime Resources

The Cyber Kill Chain

  • Reconnaissance: Research, identification and selection of targets
  • Weaponizations: Pairing remote access malware with exploit into a deliverable payload (e.g., adobe PDF and Microsoft Office files)
  • Delivery: Transmission of weapon to target (e.g., via email attachments, websites, or USB sticks)
  • Exploitation: Once delivered, the weapon’s code is triggered, exploiting vulnerable application or systems
  • Installation: The weapon installs a backdoor on a target’s system allowing persistent access
  • Command & Control: Outside server communicates with the weapons providing ‘hands on keyboard access’ inside the target’s network.
  • Actions on Objectives: the attacker works to achieve the objective of the intrusion, which can include ex-filtration or destruction of data, or intrusion of another target.

What is Social Engineering?

“The use of humans for cyber purposes”

  • Tool: The Social-Engineer Toolkit (SET)

Phishing

“To send fake emails, URLs or HTML etc.”

  • Tool: Gopish

Vishing

“Social Engineering via Voice and Text.”

Cyber warfare

  • Nation Actors
  • Hacktivist
  • Cyber Criminals

An Overview of Key Security Concepts

CIA Triad

CIA Triad – Confidentiality

“To prevent any disclosure of data without prior authorization by the owner.”

  • We can force Confidentiality with encryption
  • Elements such as authentication, access controls, physical security and permissions are normally used to enforce Confidentiality.

CIA Triad – Integrity

  • Normally implemented to verify and validate if the information that we sent or received has not been modified by an unauthorized person of the system.
  • We can implement technical controls such as algorithms or hashes (MD5, SHA1, etc.)

CIA Triad – Availability

  • The basic principle of this term is to be sure that the information and data is always available when needed.
  • Technical Implementations
    • RAIDs
    • Clusters (Different set of servers working as one)
    • ISP Redundancy
    • Back-Ups

Non-Repudiation – How does it apply to CIA?

“Valid proof of the identity of the data sender or receiver”

  • Technical Implementations:
    • Digital signatures
    • Logs

Access Management

  • Access criteria
    • Groups
    • Time frame and specific dates
    • Physical location
    • Transaction type
  • “Needed to Know” Just access information needed for the role
  • Single Sign-on (SSO)

Incident Response

“Computer security incident management involves the monitoring and detection of security events on a computer or a computer network and the execution of proper resources to those events. Means the information security or the incident management team will regularly check and monitor the security events occurring on a computer or in our network.”

Incident Management

  • Events
  • Incident
  • Response team: Computer Security Incident Response Team (CSIRT)
  • Investigation

Key Concepts – Incident Response

E-Discovery

Data inventory, helps to understand the current tech status, data classification, data management, we could use automated systems. Understand how you control data retention and backup.

Automated Systems

Using SIEM, SOA, UBA, Big data analysis, honeypots/honey-tokens. Artificial Intelligence or other technologies, we could enhance the mechanism to detect and control incidents that could compromise the tech environment.

BCP (Business Continuity Plan) & Disaster Recovery

Understand the company in order to prepare the BCP. A BIA, it’s good to have a clear understanding of the critical business areas. Also indicate if a security incident will trigger the BCP or the Disaster Recovery.

Post Incident

Root-Cause analysis, understand the difference between error, problem and isolated incident. Lessons learned and reports are a key.

Incident Response Process

  • Prepare
  • Respond
  • Follow up

Incident Response Process Incident Response Process

Introduction to Frameworks and Best Practices

Best Practices, baseline, and frameworks

  • Used to improve the controls, methodologies, and governance for the IT departments or the global behavior of the organization.
  • Seeks to improve performance, controls, and metrics.
  • Helps to translate the business needs into technical or operational needs.

Normative and compliance

  • Rules to follow for a specific industry.
  • Enforcement for the government, industry, or clients.
  • Event if the company or the organization do not want to implement those controls, for compliance.

Best practices, frameworks, and others

  • COBIT
  • ITIL
  • ISOs
  • COSO
  • Project manager methodologies
  • Industry best practices
  • Developer recommendations
  • others

IT Governance Process

Security Policies, procedures, and other

  • Strategic and Tactic plans
  • Procedures
  • Policies
  • Governance
  • Others

Security Policies, Procedures and other Security Policies, Procedures and other

Cybersecurity Compliance and Audit Overview

Compliance;

  • SOX
  • HIPAA
  • GLBA
  • PCI/DSS
  • Audit
    • Define audit scope and limitations
    • Look for information, gathering information
    • Do the audit (different methods)
    • Feedback based on the findings
    • Deliver a report
    • Discuss the results

Pentest Process and Mile 2 CPTE Training

Pentest – Ethical Hacking

A method of evaluating computer and network security by simulating an attack on a computer system or network from external and internal threats.

An Overview of Key Security Tools

Introduction to Firewalls

Firewalls

“Isolates the organization’s internal net from the larger Internet, allowing some packets to pass, while blocking the others.”

Firewalls – Why?

  • Prevent denial-of-service attacks;
    • SYN flooding: attacker establishes many bogus TCP connections, no resources left for “real” connections.
  • Prevent illegal modification/access of internal data.
    • e.g., attacker replaces CIA’s homepage with something else.
  • Allow only authorized access to inside network (set of authenticated users/hosts)
  • Two types of Firewalls
    • Application level
    • Packet filtering

Firewalls – Packet Filtering

  • Internal network connected to internet via router firewall
  • router filters packet-by-packet, decision to forward/drop packet based on;
    • source IP address, destination IP address
    • TCP/UDP source and destination port numbers
    • ICMP message type
    • TCP SYNC and ACK bits

Firewalls – Application Gateway

  • Filters packets on application data as well as on IP/TCP/UDP fields.
    • Allow select internal users to telnet outside:
      • Require all telnet users to telnet through gateway.
      • For authorized users, the gateway sets up a telnet connection to the destination host. The gateway relays data between 2 connections.
      • Router filter blocks all telnet connections not originating from gateway.

Limitations of firewalls and gateways

  • IP spoofing: router can’t know if data “really” comes from a claimed source.
  • If multiple app’s need special treatment, each has the own app gateway.
  • Client software must know how to contact gateway.
    • e.g., must set IP address of proxy in Web Browser.
  • Filters often use all or nothing for UDP.
  • Trade-off: Degree of communication with outside world, level of security
  • Many highly protected sites still suffer from attacks.

Firewalls – XML Gateway

  • XML traffic passes through a conventional firewall without inspection;
    • All across normal ‘web’ ports
  • An XML gateway examines the payload of the XML message;
    • Well formed (meaning to specific) payload
    • No executable code
    • Target IP address makes sense
    • Source IP is known

Firewalls – Stateless and Stateful

Stateless Firewalls

  • No concept of “state”.
  • Also called Packet Filter.
  • Filter packets based on layer 3 and layer 4 information (IP and port).
  • Lack of state makes it less secure.

Stateful Firewalls

  • Have state tables that allow the firewall to compare current packets with previous packets.
  • Could be slower than packet filters but far more secure.
  • Application Firewalls can make decisions based on Layer 7 information.

Proxy Firewalls

  • Acts as an intermediary server.
  • Proxies terminate connections and initiate new ones, like a MITM.
  • There are two 3-way handshakes between two devices.

Antivirus/Anti-malware

  • Specialized software that can detect, prevent and even destroy a computer virus or malware.
  • Uses malware definitions.
  • Scans the system and search for matches against the malware definitions.
  • These definitions get constantly updated by vendors.

An Introduction of Cryptography

  • Cryptography is secret writing.
  • Secure communication that may be understood by the intended recipient only.
  • There is data in motion and data at rest. Both need to be secured.
  • Not new, it has been used for thousands of years.
  • Egyptians hieroglyphics, Spartan Scytale, Caesar Cipher, are examples of ancient Cryptography.

Cryptography – Key Concepts

  • Confidentiality
  • Integrity
  • Authentication
  • Non-repudiation
  • Crypto-analysis
  • Cipher
  • Plaintext
  • Ciphertext
  • Encryption
  • Decryption

Cryptographic Strength

  • Relies on math, not secrecy.
  • Ciphers that have stood the test of time are public algorithms.
  • Mono-alphabetic < Poly-alphabetic Ciphers
  • Modern ciphers use Modular math
  • Exclusive OR(XOR) is the “secret sauce” behind modern encryption.

Types of Cipher

  • Stream Cipher: Encrypt or decrypt, a bit per bit.
  • Block Cipher: Encrypt or decrypt in blocks or several sizes, depending on the algorithms.

Types of Cryptography

Three main types;

  • Symmetric Encryption
  • Asymmetric Encryption
  • Hash

Symmetric Encryption

  • Use the same key to encrypt and decrypt.
  • Security depends on keeping the key secret at all times.
  • Strengths include speed and Cryptographic strength per a bit of key.
  • The bigger the key, the stronger the algorithm.
  • Key need to be shared using a secure, out-of-band method.
  • DES, Triples DES, AES are examples of Symmetric Encryption.

Asymmetric Encryption

  • Whitefield Diffie and Martin Hellman, who created the Diffie-Hellman. Pioneers of Asymmetric Encryption.
  • Uses two keys.
  • One key ban be made public, called public key. The other one needs to be kept private, called Private Key.
  • One for encryption and one for decryption.
  • Used in digital certificates.
  • Public Key Infrastructure – PKI
  • It uses “one-way” algorithms to generate the two keys. Like factoring prime numbers and discrete logarithm.
  • Slower than Symmetric Encryption.

Hash Functions

  • A hash function provides encryption using an algorithm and no key.
  • A variable-length plaintext is “hashed” into a fixed-length hash value, often called a “message digest” or simply a “hash”.
  • If the hash of a plaintext changes, the plaintext itself has changed.
  • This provides integrity verification.
  • SHA-1, MD5, older algorithms prone to collisions.
  • SHA-2 is the newer and recommended alternative.

Cryptographic Attacks

  • Brute force
  • Rainbow tables
  • Social Engineering
  • Known Plaintext
  • Known ciphertext

DES: Data Encryption Standard

  • US encryption Standard (NIST, 1993)
  • 56-bit Symmetric key, 64-bit plaintext input
  • How secure is DES?
    • DES Challenge: 56-bit-key-encrypted phrase (“Strong Cryptography makes the world a safer place”) decrypted (brute-force) in 4 months
    • No known “back-doors” decryption approach.
  • Making DES more secure
    • Use three keys sequentially (3-DES) on each datum.
    • Use cipher-block chaining.

AES: Advanced Encryption Standard

  • New (Nov. 2001) symmetric-key NIST standard, replacing DES.
  • Processes data in 128-bit blocks.
  • 128, 192, or 256-bit keys.
  • Brute-force decryption (try each key) taking 1 sec on DES, takes 149 trillion years for AES.

First look at Penetration Testing and Digital Forensics

Penetration Testing – Introduction

  • Also called Pentest, pen testing, ethical hacking.
  • The practice of testing a computer system, network, or application to find security vulnerabilities that an attacker could exploit.

Hackers

  • White Hat
  • Grey Hat
  • Black Hat

Threat Actors

“An entity that is partially or wholly responsible for an incident that affects or potentially affects an organization’s security. Also referred to as malicious actor.”

  • There are different types;
    • Script kiddies
    • Hacktivists
    • Organized Crime
    • Insiders
    • Competitors
    • Nation State
      • Fancy Bear (APT28)
      • Lazarous Group
      • Scarcruft (Group 123)
      • APT29

Pen-test Methodologies

Pentest Methodologies Pentest Methodologies

Vulnerability Tests

Vulnerability Test Vulnerability Test

What is Digital Forensics?

  • Branch of Forensics science.
  • Includes the identification, recovery, investigation, validation, and presentation of facts regarding digital evidence found on the computers or similar digital storage media devices.

Locard’s Exchange Principle

DR. Edmond Locard; “A pioneer in Forensics science who became known as the Sherlock Holmes of France.”

  • The perpetrator of a crime will bring something into the crime scene and leave with something from it, and that both can be used as Forensic evidence.

Chain of Custody

  • Refers to the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of physical or electronic evidence.
  • It is often a process that has been required for evidence to be shown legally in court.

Tools

  • Hardware
    • Faraday cage
    • Forensic laptops and power supplies, tool sets, digital camera, case folder, blank forms, evidence collection and packaging supplies, empty hard drives, hardware write blockers.
  • Software
    • Volatility
    • FTK (Paid)
    • EnCase (Paid)
    • dd
    • Autopsy (The Sleuth Kit)
    • Bulk Extractor, and many more.

Subsections of Cybersecurity Roles, Proces and OS Security

People Processes and Technology

Frameworks and their Purpose

Best practices, baseline, and frameworks

  • Used to improve the controls, methodologies, and governance for the IT departments or the global behavior of the organization.
  • Seeks to improve performance, controls, and metrics.
  • Helps to translate the business needs into technical or operational needs.

Normative and Compliance

  • Rules to follow for a specific industry.
  • Enforcement for the government, industry, or clients.
  • Event if the company or the organization do not want to implement those controls for compliance.

Best practices, frameworks & others

  • Frameworks
    • COBIT (Control Objective for Information and Related Technologies)

      COBIT is a framework created by ISACA for IT management and IT governance. The framework is business focused and defines a set of generic processes for the management of IT, with each process defined together.

    • ITIL (The Information Technology Infrastructure Library)

      ITIL is a set of detailed practices for IT activities such as IT service management (ITSM) and IT asset management (ITAM) that focus on aligning IT services with the needs of business.

    • ISOs (International Organization for Standardization)

    • COSO (Committee of Sponsoring Organization of the Tread way Commission)

      COSO is a joint initiative to combat corporate fraud.

  • Project manager methodologies
  • Industry best practices
  • Developer recommendations
  • Others

Roles in Security

  • CISO (Chief Information Security Officer)

    The CISO is a high-level management position responsible for the entire computer security department and staff.

  • Information Security Architect
  • Information Security Consultant/Specialist
  • Information Security Analyst

    This position conducts Information security assessments for organizations and analyzes the events, alerts, alarms and any Information that could be useful to identify any threat that could compromise the organization.

  • Information Security Auditor

    This position is in charge of testing the effectiveness of computer information systems, including the security of the systems, and reports their findings.

  • Security Software Developer
  • Penetration Tester / Ethical Hacker
  • Vulnerability Assessor etc.

Business Process Management (BPM) and IT Infrastructure Library (ITIL) Basics

Introduction to Process

  • Processes and tools should work in harmony
  • Security Operations Centers (SOC) need to have the current key skills, tools, and processes to be able to detect, investigate and stop threats before they become costly data breaches.
  • As volumes of security alerts and false positives grow, more burden is placed upon Security Analyst and Incident Response Teams.

Business Process Management (BPM) Overview

“A set of defined repeatable steps that take inputs, add value, and produce outputs that satisfy a customer’s requirements.”

BPM Overview BPM Overview

Attributes of a Process

  • Inputs: Information or materials that are required by the process to get started.
  • Outputs: Services, or products that satisfy customer requirements.
  • Bounds/Scope: The process starts when and end when.
  • Tasks/Steps: Actions that are repeatable.
  • Documentation: For audit, compliance, and reference purposes.

Standard Process Roles

Standard Process Roles Standard Process Roles

What makes a Process Successful?

  • Charter
  • Clear Objectives
  • Governance/Ownership
  • Repeatability (reduced variation)
  • Automation
  • Established Performance indicators (metrics)

Process Performance Metrics

“It is critical that we measure our processing, so understand if they are performing to specifications and producing the desired outcome every time; and within financial expectations.”

  • Typical Categories
    • Cycle Time
    • Cost
    • Quality (Defect Rate)
    • Rework

Continual Process Improvement

Continual Process Improvement Continual Process Improvement

Information Technology Infrastructure Library (ITIL) Overview

  • ITIL is a best practice framework that has been drawn from both the public and private sectors internationally.
  • It describes how IT resources should be organized to deliver Business value.
  • It models how to document processes and functions, in the roles of IT Service Management (ITSM).
  • ITIL Life-cycle – Service Phases
    • Service Strategy
    • Service Design
    • Service Transition
    • Service Operations
    • Service Improvements

ITIL Life-cycle – Service Strategy

  • Service Portfolio Management
  • Financial Management
  • Demand Management
  • Business Relationship Management

ITIL Life-cycle – Service Design

  • Service Catalog Management
  • Service Level Management
  • Information Security Management
  • Supplier Management

ITIL Life-cycle – Service Transition

  • Change Management
  • Project Management
  • Release & Deployment Management
  • Service validation & Testing
  • Knowledge Management

ITIL Life-cycle – Service Operations

  • Event Management
  • Incident Management
  • Problem Management

ITIL Life-cycle – Continual Service Improvement (CSI)

  • Review Metrics
  • Identify Opportunities
  • Test & Prioritize
  • Implement Improvements

Key ITIL Processes

Problem Management

  • The process responsible for managing the Life-cycle of all problems.

    ITIL defines a ‘problem’ as ‘an unknown cause of one or more incidents.’

Change Management

  • Manage changes to baseline service assets and configuration items across the ITIL Life-cycle.

Incident Management

  • An incident is an unplanned interruption to an IT Service, a reduction in the quality of an IT Service, and/ or a failure of a configuration item.

    Log → Assign → Track → Categorize → Prioritize → Resolve → Close

Event Management

  • Events are any detectable or discernible occurrence that has significance for the management of IT Infrastructure, or the delivery of an IT service.

Service Level Management

  • This involves the planning coordinating, drafting, monitoring, and reporting on Service Level Agreements (SLAs). It is the ongoing review of service achievements to ensure that the required service quality is maintained and gradually improved.

Information Security Management

  • This deals with having and maintaining an information security policy (ISP) and specific security Policies that address each aspect of strategy, Objectives, and regulations.

Difference between ITSM and ITIL

Information Technology Service Management (ITSM)

“ITSM is a concept that enables an organization to maximize business value from the use of information Technology.”

IT Infrastructure Library (ITIL)

“ITIL is a best practice framework that gives guidance on how ITSM can be delivered.”

Further discussion of confidentiality, integrity, and availability

Who are Alice, Bob, and Trudy?

  • Well known in network security world.

  • Bob, Alice (friends) want to communicate “securely”.

  • Trudy (intruder) may intercept, delete, add messages.

    Friends and enemies: Alice, Bob, Trudy Friends and enemies: Alice, Bob, Trudy

Confidentiality, Integrity, and Availability

  • Main components of network security.

Confidentiality

  • Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.
  • Loss of confidentiality is the unauthorized disclosure of information.

Integrity

  • Guarding against improper information modification or destruction.
  • Including ensuring information non-repudiation and authenticity.
  • Integrity loss is the unauthorized modification or destruction of information.

Availability

  • Timely and reliable access to information.
  • Loss of availability is the disruption of access to an information system.

Authenticity and Accountability

  • Authenticity: property of being genuine and verifiable.
  • Accountability: mapping actions to an identity.

Identification and AAA

  • Security token
  • Password
  • Biometrics

Identification → Authentication → Authorization → Accountability

Authentication methods

  • Something you know
    • Username/Password
  • Something you have
    • Smartcard, token
  • Something you are
    • Fingerprints
    • Retina Scanners
    • Biometric Signals

Control Types

  • Administrative
  • Technical
  • Physical

Each control type can be

  • Corrective
  • Preventive
  • Dissuasive
  • Recovery
  • Detective
  • Compensatory

Access Control Methods

“Only who has the rights to access or utilize the resources can use them.”

Access control models

MAC – Mandatory Access Control

  • Use labels to regulate the access

  • Military use

    DAC – Discretionary Access Control

  • Each object (folder or file) has an owner and the owner defines the rights and privilege

    Role Based Access Control The rights are configured based on the user roles. For instance, sales group, management group, etc.

Other methods

Centralized

  • SSO (Single Sing On)

  • Provide the 3 As

    Decentralized

  • Independent access control methods

  • Local power

  • Normally the military forces use these methods on the battlefields

Best practices for the access control field

These concepts are deeply integrated with the access control methodologies and must be followed by the organization in order of the policies and procedures.

  • Least privilege
    • Information access limit
  • Separation of duties
    • Verify employee activity
  • Rotation of duties
    • Tracking and control

Access Control – Physical and Logical

Physical access control methods

  • Perimetral

  • Building

  • Work areas

  • Servers and network

    Technical uses of Physical security controls

  • ID badges

  • List and logs

  • Door access control systems

  • Tokens

  • Proximity sensors

  • Tramps

  • Physical block

  • Cameras

Logical access control methods

  • ACL (Routers)
  • GPO’S
    • Password policies
    • Device policies
    • Day and time restrictions
  • Accounts
    • Centralized
    • Decentralized
    • Expiration

BYOD, BYOC … BYO Everything…

Popular concepts for moderns times. Each collaborator has the opportunity to bring their own device to the work environment.

Some controls to follow:

  • Strict policy and understanding
  • Use of technical control MDM
  • Training
  • Strong perimetral controls

Monitoring the access control process

  • IDS/IPs
  • HOST IDS and IPS
  • Honeypot
  • Sniffers

Operating System Security Basics

User and Kernel Modes

MS Windows Components

  • User Mode and Kernel Mode
  • Drivers call routines that are exported by various kernel components.
  • Drivers must respond to specific calls from the OS and can respond to other system calls.

User Mode

  • When you start a user-mode application, Windows creates a process for the application.
    • Private virtual address space
    • Private handle table
  • Each application runs in isolation and if an application crashes, the crash is limited to that one application.

Kernel Mode

  • All code that runs in kernel mode shares a single virtual address space.
  • If a kernel-mode driver accidentally writes to the wrong virtual address, data that belongs to the OS or another driver could be compromised.
  • If a kernel-mode driver crashes, the entire OS crashes.

File System

Types of File Systems

NTS (New Technology File System)

  • Introduced in 1993

  • Most common file system for Windows end user systems

  • Most Windows servers use NTFS as well

    FATxx (File Allocation Table)

  • Simple File system used since the 80s

  • Numbers preceding FAT refer to the number of bits used to enumerate a file system block. Ex FAT16, FAT32

  • Now mainly used for removable devices under 32 GB capacity.

    (NOTE: FAT32 actually support upto ≤2TB storage size).

Directory Structure

Typical Windows Directory Structure

Operating System Security Basics Operating System Security Basics

Shortcuts and Commands

Windows Shortcuts

  • Common tasks that can be accessed using the Windows or Ctrl Key and another Key.

  • Time saving and helpful for tasks done regularly.

    Operating System Security Basics Operating System Security Basics

Additional Shortcuts

  • F2: Rename
  • F5: Refresh
  • Win+L: Lock your computer
  • Win+I: Open Settings
  • Win+S: Search Windows
  • Win+PrtScn: Save a screenshot
  • Ctrl+Shift+Esc: Open the Task Manager
  • Win+C: Start talking to Cortana
  • Win+Ctrl+D: Add a new virtual desktop
  • Win+X: Open the hidden Menu

Linux Key Components

Key Components

Linux has two major components:

  1. The Kernel - It is the core of the OS. It interacts directly with the hardware. - It manages system and user input/output. Processes, files, memory, and devices. 1) The Shell - It is used to interact with the kernel. - Users input commands through the shell and the kernel performs the commands.

Linux File Systems

File Systems

  • - represents file in CLI
  • d represents directory in CLI

Operating System Security Basics Operating System Security Basics

Run Levels

Operating System Security Basics Operating System Security Basics

Linux Basic Commands

  • cd: change directory
  • cp: copy files or dirs
  • mv: move file or dirs
  • ls: lists info related to files and dirs
  • df: display file system disk space
  • kill: stop an executing process
  • rm: delete file and dirs
  • rmdir: remove en empty dir
  • cat: to see the file contents, or concatenate multiple files together
  • mkdir: creates new dir
  • ifconfig: view or configure network interfaces
  • locate: quickly searches for the location of files. It uses an internal database that is updated using updatedb command.
  • tail: View the end of a text file, by default the last 10 lines
  • less: Very efficient while viewing huge log files as it doesn’t need to load the full file while opening
  • more: Displays text, one screen at a time
  • nano: a basic text editor
  • chmod: changes privileges for a file or dir

Permissions and Owners

File and directory permission

  • There are three groups that can ‘own’ a file.
    • User
    • group
    • everybody
  • For each group there are also three types of permissions: Read, Write, and Execute.
  • Read: 4(100), Write: 2(010), Execute: 1(001)

Change Permissions

You can use the chmod command to change the permissions of a file or dir:

  • chmod <permissions><filename>
  • chmod 755<filename>
  • chmod u=rw,g=r,o=r<filename>

Change owner

You can change the owner and group owner of a file with the chown command:

  • chown <user>:<group><filename>

macOS Security Overview

macOS Auditing

  • About My mac menu, contains information about
    • OS
    • Displays
    • Storage
    • Support
    • Service
    • Logs, etc.
  • Activity Monitor real-time view of system resource usage and relevant actions
  • Console, contains
    • Crash reports
    • Spin reports
    • Log reports
    • Diagnostic reports
    • Mac Analysis Data
    • System.log

macOS Security Settings

Various Security settings for macOS can be found in System Preferences app.

  • Genral Tab offers GateKeeper settings for installing apps from other AppStore, and few other settings.
  • FileVault Tab contains information about system and file encryption.
  • FireWall Tab for system level software firewall settings with basic and to advanced options.
  • Privacy Tab contains location services and other privacy related info and settings.

macOS Recovery

  • macOS comes with a hidden partition installed called macOS Recovery, it essentially replaces the installation discs that comes with new computers.
    • Access it by restarting your Mac while holding the R key.
  • It offers following tools/options:
    • Restore from the Time Machine Backup
    • Reinstall macOS
    • Get Help Online
    • Disk Utility

Virtualization Basics and Cloud Computing

An Overview of Virtualization

  • Allows you to create multiple simulated environments or dedicated resources from a single, physical hardware system.
  • Hypervisor/Host
  • Virtual Machine/Guest

Hypervisor

  • Separate the physical resources from the virtual environments
  • Hypervisors can sit on top of an OS (end user) or be installed directly onto hardware (enterprise).

Virtual Machine

  • The virtual machine functions as a single data file.
  • The hypervisor relays requests from the VM to the actual hardware, is necessary.
  • VMs doesn’t interact directly with the host machine.
  • Physical hardware is assigned to VMs.

Virtualization to Cloud

Overview of Virtualization Overview of Virtualization

Cloud Deployments

Overview of Virtualization Overview of Virtualization

Cloud Computing Reference Model

Overview of Virtualization Overview of Virtualization

Subsections of Compliance Frameworks and SysAdmin

Compliance and Regulation for Cybersecurity

What Cybersecurity Challenges do Organizations Face?

Event, attacks, and incidents defied

Security Event An event on a system or network detected by a security device or application.

Security attack A security event that has been identified by correlation and analytics tools as malicious activity that attempting to collect, disrupt, deny, degrade, or destroy information system resources or the information itself.

Security Incident An attack or security event that has been reviewed by security analysts and deemed worthy of deeper investigation.

Security – How to stop “bad guys”

Outsider

  • They want to “get-in” – steal data, steal compute time, disrupt legitimate use

  • Security baseline ensures we design secure offerings but setting implementation standards

  • E.g. Logging, encryption, development, practices, etc.

  • Validated through baseline reviews, threat models, penetration testing, etc.

    Inadvertent Actor

  • They are “in” – but are human and make mistakes

  • Automate procedures to reduce error-technical controls

  • Operational/procedural manual process safeguards

  • Review logs/reports to find/fix errors. Test automation regularly for accuracy.

    Malicious Insiders

  • They are “in” – but are deliberately behaving badly

  • Separation of duties – no shared IDs, limit privileged IDs

  • Secure coding, logging, monitoring access/operations

Compliance Basics

Security, Privacy, and Compliance

Security

  • Designed protection from theft or damage, disruption or misdirection
  • Physical controls – for the servers in the data centers
  • Technical controls
    • Features and functions of the service (e.g., encryption)
    • What log data is collected?
  • Operational controls
    • How a server is configured, updated, monitored, and patched?
    • How staff are trained and what activities they perform?

Privacy

  • How information is used, who that information is shared with, or if the information is used to track users?

Compliance

  • Tests that security measures are in place.
  • Which and how many depend on the specific compliance.
  • It Will Often cover additional non-security requirements such as business practices, vendor agreements, organized controls etc.

Compliance: Specific Checklist of Security Controls, Validated

Compliance Frameworks and Industry Standards Compliance Frameworks and Industry Standards

Compliance Basics

Foundational General specifications, (not specific to any industry) important, but generally not legally required. Ex: SOC, ISO.

Industry Specific to an industry, or dealing with a specific type of data. Often legal requirements. Ex: HIPAA, PCI DSS

Any typical compliance process

Compliance Frameworks and Industry Standards Compliance Frameworks and Industry Standards

  • General process for any compliance/audit process
    • Scoping
      • “Controls” are based on the goal/compliance – 50–500.
      • Ensure all components in scope are compliant to technical controls.
      • Ensure all processes are compliant to operation controls.
    • Testing and auditing may be:
      • Internal/Self assessments
      • External Audit
    • Audit recertification schedules can be quarterly, bi-quarterly, annually, etc.

Overview of US Cybersecurity Federal Law

Computer Fraud and Abuse Act (CFAA)

  • Enacted in 1984

US Federal Laws

  • Federal Information Security Management Act of 2002 (FISMA)

  • Federal Information Security Modernization Act of 2014 (FISMA 2014)

    FISMA assigns specific responsibilities to federal agencies, the National Institute of Standards and Technology (NIST) and the Office of Management and Budget (OMB) in order to strengthen information security systems.

National Institute of Standards and Technology (NIST) Overview

Cybersecurity and Privacy NIST’s cybersecurity and privacy activities strengthen the security digital environment. NIST’s sustained outreach efforts support the effective application of standards and best practices, enabling the adoption of practical cybersecurity and privacy.

General Data Protection Regulation (GDPR) Overview

This is simply a standard for EU residence:

  • Compliance
  • Data Protection
  • Personal Data: The GDPR cam into effect on 25 May 2018 and represents the biggest change in data privacy in two decades. The legislation aims to give control back to individuals located in EU over their Personal Data and simplify the regulatory environment for internation businesses.

5 Key GDPR Obligations:

  1. Rights of EU Data subjects
  2. Security of Personal Data
  3. Consent
  4. Accountability of Compliance
  5. Data Protection by Design and by Default

Key terms for understanding

Compliance Frameworks and Industry Standards Compliance Frameworks and Industry Standards

Internation Organization for Standardization (ISO) 2700x

  • The ISO 2700 family of standards help organization keep information assets secure.
  • ISO/IEC 27001 is the best-known standard in the family providing requirements for an information security management systems (ISMS).
    • The standard provides requirements for establishing, implementing, maintaining and continually improving an information security management system.
  • Also becoming more common,
    • ISO 270018 – Privacy
  • Other based on industry/application, e.g.,
    • ISO 270017 – Cloud Security
  • ISO 27001 Certification can provide credibility to a client of an organization.
  • For some industries, certification is a legal or contractual requirement.
  • ISO develops the standards but does not issue certifications.
  • Organizations that meet the requirements may be certified by an accredited certification body following successful completion of an audit.

System and Organization Controls Report (SOC) Overview

SOC Reports

Why SOC reports?

  • Some industry/jurisdictions require SOC2 or local compliance audit.
  • Many organizations who know compliance, know SOC Type 2 consider it a stronger statement of operational effectiveness than ISO 27001 (continuous testing).
  • Many organization’s clients will accept SOC2 in lieu of the right-to-audit.

Compared with ISO 27001

Compliance Frameworks and Industry Standards Compliance Frameworks and Industry Standards

SOC1 vs SOC2 vs SOC3

SOC1

  • Used for situations where the systems are being used for financial reporting.

  • Also referenced as Statement on Standards for Attestation Engagements (SSAE)18 AT-C 320 (formerly SSAE 16 or AT 801).

    SOC2

  • Addresses a service organization’s controls that are relevant to their operations and compliance, more generally than SOC1.

  • Restricted use report contains substantial detail on the system, security practices, testing methodology and results.

  • Also, SSAE 18 standards, sections AT-C 105 and AT-C 205.

    SOC3

  • General use report to provide interested parties with a CPA’s opinion about same controls in SOC2.

Type 1 vs Type 2

Type 1 Report

  • Consider this the starting line.

  • The service auditor expresses an opinion on whether the description of the service organization’s systems is fairly presented and whether the controls included in the description are suitably designed to meet the applicable Trust Service criteria as of a point in time.

    Type 2 Report

  • Proof you’re maintaining the effectiveness over time

  • Typically 6 month, renewed either every 6 months or yearly.

  • The service auditor’s report contains the same opinions expressed in a Type 1 report, but also includes an opinion on the operating effectiveness of the service organization’s controls for a period of time. Includes description of the service auditor’s tests of operation effectiveness and test results.

Selecting the appropriate report type
  • A type 1 is generally only issued if the service organization’s system has not been in operation for a significant period of time, has recently made significant system or control changes. Or if it is the first year of issuing the report.
  • SOC1 and SOC2, each available as Type 1 or Type 2.

Scoping Considerations – SOC 2 Principles

Report scope is defined based on the Trust Service Principles and can be expanded to additional subject.

Compliance Frameworks and Industry Standards Compliance Frameworks and Industry Standards

SOC Reports – Auditor Process Overview

What are auditors looking for:

1) Accuracy → are controls results being assessed for pass/fail. 2) Completeness → do controls implementation cover the entire offering: e.g., no gaps in inventory, personnel, etc. 3) Timeliness → are controls performed on time (or early) with no gaps in coverage. - If a control cannot be performed on time, are there appropriate assessment (risk) approvals BEFORE the control is considered ‘late’. 4) With Resilience notice → are there checks/balances in place such that if a control does fail, would you be able to correct at all? Within a reasonable timeframe? 5) Consistency → Shifting control implementation raises concerns about above, plus increases testing.

Compliance Frameworks and Industry Standards Compliance Frameworks and Industry Standards

What does SOC1/SOC2 Test

General Controls:

  • Inventory listing

  • HR Employee Listing

  • Access group listing

  • Access transaction log

    A: Organization and Management

  • Organizational Chart

  • Vendor Assessments

    B: Communications

  • Customer Contracts

  • System Description

  • Policies and Technical Specifications

    C: Risk Management and Design/Implementation of Controls

  • IT Risk Assessment

    D: Monitoring of Controls

  • Compliance Testing

  • Firewall Monitoring

  • Intrusion Detection

  • Vulnerability Management

  • Access Monitoring

    E: Logical and Physical Access Controls

  • Employment Verification

  • Continuous Business Need

    F: System Operations

  • Incident Management

  • Security Incident Management

  • Customer Security Incident Management

  • Customer Security Incident Reporting

    G: Change Management

  • Change Management

  • Communication of Changes

    H: Availability

  • Capacity Management

  • Business Continuity

  • Backup or equivalent

Continuous Monitoring – Between audits

Purpose:

  • Ensure controls are operating as designed.

  • Identify control weaknesses and failure outside an audit setting.

  • Communicate results to appropriate stakeholders.

    Scope:

  • All production devices

    Controls will be tested for operating effectiveness over time, focusing on:

  • Execution against the defined security policies.

  • Execution evidence maintenance/availability

  • Timely deviation from policy documentation.

  • Timely temporary failures of a control or loss of evidence documentation and communication.

Industry Standards

Health Insurance Portability and Accountability Act (HIPAA)

Healthcare organizations use cloud services to achieve more than saving and scalability:

  • Foster virtual collaboration across care environments
  • Leverage full potential of existing patient data
  • Address challenges in analyzing patient needs
  • Provide platforms for care innovation
  • Expand delivery network
  • Reduce response time in the case of emergencies
  • Integrate data silos and optimizes information flow
  • Increase resource utilization
  • Simplify processes, reducing administration cost

What is HIPAA-HITECH

  • The US Federal laws and regulations that define the control of most personal healthcare information (PHI) for companies responsible for managing such data are:
    • Health insurance Portability and Accountability Act (HIPAA)
    • Health Information Technology for Economic Clinical Health Act (HITECH)
  • The HIPAA Privacy Rule establishes standards to protect individuals’ medical records and other personal health information and applies to health plans, health care clearinghouses, and those health care providers who conduct certain health care transactions electronically.
  • The HIPAA Security Rule establishes a set of security standards for protecting certain health information that is held or transferred in electronic form. The Security Rule operationalizes the protections contained in the Privacy Rule by addressing the technical and non-technical safeguards that must be put in place to secure individuals’ “electronic protected health information” (e-PHI)

HIPAA Definitions

U.S. Department of Health and Human Services (HHS) Office of Civil Rights (OCR): Governing entity for HIPAA.

Covered Entity: HHS-OCR define companies that manage healthcare data for their customers as a Covered Entity.

Business Associate: Any vendor company that supports the Covered Entity.

Protected Health Information (PHI): Any information about health status, provision of health care, or payment for health care that is maintained by a Covered Entity (or a Business Associate of a Covered Entity), and can be linked to a specific individual.

HHS-OCR “Wall of Shame”: Breach Portal: Notice to the Secretary of HHS Breach of Unsecured Protected Health Information.

Why is Compliance Essential?

  • U.S. Law states that all individuals have the right to expect that their private health information be kept private and only be used to help assure their health.
  • There are significant enforcement penalties if a Covered Entity / Business Associate is found in violation.
  • HHS-OCR can do unannounced audits on the (CE+BA) or just the BA.

HIPAA is a U.S. Regulation, so be aware…

  • Other countries have similar regulations / laws:
    • Canada – Personal Information Protection and Electronic Documents Act
    • European Union (EU) Data Protection Directive (GDPR)
  • Many US states address patient privacy issues and are stricter than those set forth in HIPAA and therefore supersedes the US regulations.
  • Some international companies will require HIPAA compliance for an either a measure of confidence, or because they intend to do business with US data.

HIPAA Security Rule

The Security Rule requires, covered entities to maintain reasonable and appropriate administrative, technical, and physical safeguards for protecting “electronic protected health information” (e-PHI).

Specifically, covered entities must:

  • Ensure the confidentiality, integrity, and availability of all e-PHI they create, receive, maintain or transmit.
  • Identify and protect against reasonably anticipated threats to the security or integrity of the information.
  • Protect against reasonably anticipated, impermissible uses or disclosures; and
  • ensure compliance by their workforce.
Administrative Safeguards

The Administrative Safeguards provision in the Security Rule require covered entities to perform risk analysis as part of their security management processes.

Administrative Safeguards include:

  • Security Management Process
  • Security Personnel
  • Information Access Management
  • Workforce Training and Management
  • Evaluation
Technical Safeguards

Technical Safeguards include:

  • Access Control
  • Audit Controls
  • Integrity Controls
  • Transmission Security
Physical Safeguards

Physical Safeguards include:

  • Facility Access and Control
  • Workstation and Device Security

Payment Card Industry Data Security Standard (PCI DSS)

The PCI Data Security Standard

  • The PCI DSS was introduced in 2004, by American Express, Discover, MasterCard and Visa in response to security breaches and financial losses within the credit card industry.
  • Since 2006 the standard has been evolved and maintained by the PCI Security Standards Council, a “global organization, (it) maintains, evolves and promotes Payment Card Industry Standards for the safety of cardholder data across the globe.”
  • The PCI Security Standards Council is now comprised of American Express, Discover, JCB International MasterCard and Visa Inc.
  • Applies to all entities that store, process, and/or transmit cardholder data.
  • Covers technical and operational practices for system components included in or connected to environments with cardholder data.
  • PCI DSS 3.2 includes a total of 264 requirements grouped under 12 main requirements.

Goals and Requirements

PCI DSS 3.2 includes a total of 264 requirements grouped under 12 main requirements:

Compliance Frameworks and Industry Standards Compliance Frameworks and Industry Standards

Scope

The Cardholder Data Environment (CDE): People, processes and technology that store, process or transmit cardholder data or sensitive authentication data.

  • Cardholder Data:

    • Primary Account Number (PAN)
    • PAN plus any of the following:
      • Cardholder name

      • expiration date and/or service mode.

        Sensitive Authentication Data:

  • Security-related information (including but not limited to card validation codes/values, full track data (from the magnetic stripe or equivalent on a chip), PINs, and PIN blocks) used to authenticate cardholder and/or authorize payment card transactions.

    Sensitive Areas:

  • Anything that accepts, processes, transmits or stores cardholder data.

  • Anything that houses systems that contain cardholder data.

Determining Scope

People Processes Technologies
Compliance Personnel IT Governance Internal Network Segmentation
Human Resources Audit Logging Cloud Application platform containers
IT Personnel File Integrity Monitoring
Developers Access Management Virtual LAN
System Admins and Architecture Patching
Network Admins Network Device Management
Security Personnel Security Assessments
Anti-Virus

PCI Requirements

Highlight New and Key requirements:

  • Approved Scanning Vendor (ASV) scans (quarterly, external, third party).
  • Use PCI scan policy in Nessus for internal vulnerability scans.
  • File Integrity Monitoring (FIM)
  • Firewall review frequency every 6 months
  • Automated logoff of idle session after 15 minutes
  • Responsibility Matrix

Critical Security Controls

Center for Internet Security (CIS) Critical Security Controls

CIS Critical Security Controls

  • The CIS ControlsTM are a prioritized set of actions that collectively form a defense-in-depth set of best practices that mitigate the most common attacks against systems and networks.
  • The CIS ControlsTM are developed by a community of IT experts who apply their first-hand experience as cyber defenders to create these globally accepted security best practices.
  • The experts who develop the CIS Controls come from a wide range of sectors including retail, manufacturing, healthcare, education, government, defense, and others.

CIS ControlTM 7

Compliance Frameworks and Industry Standards Compliance Frameworks and Industry Standards

CIS ControlTM 7.1 Implementation Groups

Compliance Frameworks and Industry Standards Compliance Frameworks and Industry Standards

Structure of the CIS ControlTM 7.1

The presentation of each Control in this document includes the following elements:

  • A description of the importance of the CIS Control (Why is this control critical?) in blocking or identifying the presence of attacks, and an explanation of how attackers actively exploit the absence of this Control.
  • A table of the specific actions (“Sub-Controls”) that organizations should take to implement the Control.
  • Procedures and Tools that enable implementation and automation.
  • Sample Entity Relationship Diagrams that show components of implementation.

Compliance Summary

Compliance Frameworks and Industry Standards Compliance Frameworks and Industry Standards

Client System Administration Endpoint Protection and Patching

Client System Administration

“The client-server model describes how a server provides resources and services to one or more clients. Examples of servers include web servers, mail servers, and file servers. Each of these servers provide resources to client devices, such as desktop computers, laptops, tablets, and smartphones. Most servers have a one-to-many relationship with clients, meaning a single server can provide resources to multiple clients at one time.”

Client System Administration

  • Cloud and Mobile computing
  • New Devices, new applications and new services.
  • Endpoint devices are the front line of attack.

Common type of Endpoint Attacks

  • Spear Phishing/Whale Hunting – An email imitating a trusted source designed to target a specific person or department.
  • Watering Hole – Malware placed on a site frequently visited by an employee or group of employees.
  • **Ad Network Attacks – Using ad networks to place malware on a machine through ad software.
  • Island Hopping – Supply chain infiltration.

Endpoint Protection

Basics of Endpoint Protection

  • Endpoint protection management is a policy-based approach to network security that requires endpoint devices to comply with specific criteria before they are granted access to network resources.
  • Endpoint security management systems, which can be purchased as software or as a dedicated appliance, discover, manage and control computing devices that request access to the corporate network.
  • Endpoint security systems work on a client/server model in which a centrally managed server or gateway hosts the security program and an accompanying client program is installed on each network devices.

Unified Endpoint Management

A UEM platform is one that converges client-based management techniques with Mobile device management (MDM) application programming interfaces (APIs).

Endpoint Detection and Response

Key mitigation capabilities for endpoints

  • Deployment of devices with network configurations

  • Automatic quarantine/blocking of non-compliant endpoints

  • Ability to patch thousands of endpoints at once

    Endpoint Detection and Response

  • Automatic policy creation for endpoints

  • Zero-day OS updates

  • Continuous monitoring, patching, and enforcement of security policies across endpoints.

Examining an Endpoint Security Solution

Three key factors to consider:

  1. Threat hunting
  2. Detection response
  3. User education

An Example of Endpoint Protection

Unified Endpoint Management

UEM is the first step to enable today’s enterprise ecosystem:

  • Devices and things
  • Apps and content
  • People and identity

What is management without insight?

IT and security needs to understand:

  • What happened
  • What can happen
  • What should be done … in the context of their environment

Take a new approach to UEM

Client System Administration Endpoint Protection and Patching Client System Administration Endpoint Protection and Patching

UEM with AI

Client System Administration Endpoint Protection and Patching Client System Administration Endpoint Protection and Patching

Client System Administration Endpoint Protection and Patching Client System Administration Endpoint Protection and Patching

Traditional Client Management Systems

  • Involves an agent-based approach
  • Great for maintenance and support
  • Standardized rinse and repeat process
  • Applicable for some OS & servers

Mobile Device Management

  • API-based management techniques
  • Security and management of corporate mobile assets
  • Specialized for over-the-air configuration
  • Purpose-built for smartphones and tablets

Modern Unified Endpoint Management

Client System Administration Endpoint Protection and Patching Client System Administration Endpoint Protection and Patching

IT Teams are also converging:

Client System Administration Endpoint Protection and Patching Client System Administration Endpoint Protection and Patching

Overview of Patching

  • All OS require some type of patching.
  • Patching is the fundamental and most important thing an organization can do to prevent malicious attacks.

What is a patch?

A patch is a set of changes to a computer program or its supporting data designed to update, fix, or improve it. This includes fixing security vulnerabilities and other bugs, with such patches usually being called bugfixes, or bug fixes, and improving the functionality, usability or performance.

Windows Patching

  • Windows Updates allow for fixes to known flaws in Microsoft products and OS. The fixes, known as patches, are modification to software and hardware to help improve performance, reliability, and security.
  • Microsoft releases patches in a monthly cycle, commonly referred to as “Patch Tuesday”, the second Tuesday of every month.

Four types of Updates for Windows OSes

  1. Security Updates: Security updates for Windows work to protect against new and ongoing threats. They are classified as Critical, Important, Moderate, Low, or non-rated.
  2. 590344 These are high priority updates. When these are released, they need to updated asap. It is recommended to have these set as automatic.
  3. Software Updates: Software updates are not critical. They often expand features and improve the reliability of the software.
  4. Service Packs: These are roll-ups, or a compilation, of all previous updates to ensure that you are up-to-date on all the patches since the release of the product up to a particular data. If your system is behind on updates, then service packs bring your system up-to-update.

Windows Application Patching

Why patch 3rd party applications in addition to Windows OS?

  • Unpatched software, especially if a widely used app like Adobe Flash or Browser, can be a magnet for malware and viruses.
  • 87% of the vulnerabilities found in the top 50 programs affected third-party programs such as Adobe Flash and Reader, Java, Skype, Various Media Players, and others outside the Microsoft Ecosystem. That means the remaining 13 percent “stem from OSes and Microsoft Programs,” according to Secunia’s Vulnerability Review report.

Patching Process

Client System Administration Endpoint Protection and Patching Client System Administration Endpoint Protection and Patching

Server and User Administration

Introduction to Windows Administration

User and Kernel Modes

MS Windows Components:

  • User Mode
    • Private Virtual address space
    • Private handle table
    • Application isolation
  • Kernel Mode
    • Single Virtual Address, shared by other kernel processes

File Systems

Types of file systems in Windows

  • NTFS (New Technology File system)
  • FATxx (File Allocation Table)
    • FAT16, FAT32

Typical Windows Directory Structure

Server and User Administration Server and User Administration

Role-Based Access Control and Permissions

  • Access Control Lists (ACLs)
  • Principle of the least privileges

Privileged Accounts

  • Privileged accounts like admins of Windows services have direct or indirect access to most or all assets in an IT organization.
  • Admins will configure Windows to manage access control to provide security for multiple roles and uses.

Access Control

Key concepts that make up access control are:

  • Permissions
  • Ownership of objects
  • Inheritance of permissions
  • User rights
  • Object auditing

Local User Accounts

Default local user accounts:

  • Administrator account

  • Guest account

  • HelpAssistant account

  • DefaultAccount

    Default local system accounts:

  • SYSTEM

  • Network Service

  • Local Service

Management of Local Users accounts and Security Considerations

  • Restrict and protect local accounts with administrative rights
  • Enforce local account restrictions for remote access
  • Deny network logon to all local Administrator accounts
  • Create unique passwords for local accounts with administrative rights

What is AD?

Active Directory Domain Services (AD DS) stores information about objects on the network and makes this information easy for administrators and users to find and use.

  • Servers
  • Volumes
  • Printers
  • Network user and computer accounts
  • Security is integrated with AD through authentication and access control to objects in the directory via policy-based administration.

Features of AD DS

  • A set of rules, the schema
  • A global catalog
  • A query and index mechanism
  • A replication service

Active Directory Accounts and Security Considerations

AD Accounts

  • Default local accounts in AD:
    • Administrator account
    • Guest Account
    • HelpAssistant Account
    • KRBTGT account (system account)
  • Settings for default local accounts in AD
  • Manage default local accounts in AD
  • Secure and Manage domain controllers

Restrict and Protect sensitive domain accounts

Separate admin accounts from user accounts

  • Privileged accounts: Allocate admin accounts to perform the following

    • Minimum: Create separate accounts for domain admins, enterprise admins, or the equivalent with appropriate admin.
    • Better: Create separate accounts for admins that have reduced admin rights, such as accounts for workstation admins, account with user rights over designated AD organizational units (OUs)
    • Ideal: Create multiples, separate accounts for an administrator who has a variety of job responsibilities that require different trust levels
  • Standard User account: Grant standard user rights for standard user tasks, such as email, web browsing, and using line-of-business (LOB) applications.

    Create dedicated workstation hosts without Internet and email access

  • Admins need to manage job responsibilities that require sensitive admin rights from a dedicated workstation because they don’t have easy physical access to the servers.

    • Minimum: Build dedicated admin workstations and block Internet Access on those workstations, including web browsing and email.

    • Better: Don’t grant admins membership in the local admin group on the computer in order to restrict the admin from bypassing these protections.

    • Ideal: Restrict workstations from having any network connectivity, except for the domain controllers and servers that the administrator accounts are used to manage.

      Restrict administrator logon access to servers and workstations

  • It is a best practice to restrict admins from using sensitive admin accounts to sign-in to lower-trust servers and workstations.

  • Restrict logon access to lower-trust servers and workstations by using the following guidelines:

    • Minimum: Restrict domain admins from having logon access to servers and workstations. Before starting this procedure, identify all OUs in the domain that contain workstations and servers. Any computers in OUs that are not identified will not restrict admins with sensitive accounts from signing in to them.

    • Better: Restrict domain admins from non-domain controller servers and workstations.

    • Ideal: Restrict server admins from signing in to workstations, in addition to domain admins.

      Disable the account delegation right for administrator accounts

  • Although user accounts are not marked for delegation by default, accounts in an AD domain can be trusted for delegation. This means that a service or a computer that is trusted for delegation can impersonate an account that authenticates to the to access other resources across the network.

  • It is a best practice to configure the user objects for all sensitive accounts in AD by selecting the Account is sensitive and cannot be delegated check box under Account options to prevent accounts from being delegated.

    Server and User Administration Server and User Administration

Overview of Server Management with Windows Admin Center

Active Directory Groups

Security groups are used to collect user accounts, computer accounts, and other groups into manageable units.

  • For AD, there are two types of admin responsibilities:
    • Server Admins
    • Data Admins
  • There are two types of groups in AD:
    • Distribution groups: Used to create email distribution lists.
    • Security groups: Used to assign permissions to shared resources.

Groups scope

Groups are characterized by a scope that identifies the extent to which the group is applied in the domain tree or forest.

The following three group scopes are defined by AD:

  • Universal

  • Global

  • Domain Local

    Default groups, such as the Domain Admins group, are security groups that are created automatically when you create an AD domain. You can use these predefined groups to help control access to shared resources and to delegate specific domain-wide admin roles.

What is Windows Admin Center?

  • Windows Admin Center is a new, locally-deployed, browser-based management tool set that lets you manage your Windows Servers with no cloud dependency.
  • Windows Admin Center gives you full control over all aspects of your server infrastructure and is useful for managing servers on private networks that not connected to the Internet.

Kerberos Authentication and Logs

Kerberos Authentication

Kerberos is an authentication protocol that is used to verify the identity of a user or host.

  • The Kerberos Key Distribution Center (KDC) is integrated with other Windows Server security services and uses the domain’s AD DS database.
  • The key Benefits of using Kerberos include:
    • Delegated authentication
    • Single sign on
    • Interoperability
    • More efficient authentication to servers
    • Mutual authentication

Windows Server Logs

  • Windows Event Log, the most common location for logs on Windows.
  • Windows displays its event logs in the Windows Event Viewer. This application lets you view and navigate the Windows Event Log, search, and filter on particular types of logs, export them for analysis, and more.

Windows Auditing Overview

Audit Policy

  • Establishing audit policy is an important facet of security. Monitoring the creation o modification of objects gives you a way to track potential security problems, helps to ensure user accountability, and provides evidence in the event of a security breach.
  • There are nine different kinds of events you can audit. If you audit any of those kinds of events, Windows records the events in the Security log, which you can find in the Event Viewer.
    • Account logon Events
    • Account Management
    • Directory service Access
    • Logon Events
    • Object access
    • Policy change
    • Privilege use
    • Process tracking
    • System events

Linux Components: Common Shells

Bash:

The GNU Bourne Again Shell (BASH) is based on the earlier Bourne Again shell for UNIX. On Linux, bash is the most common default shell for user accounts.

Sh:

The Bourne Shell upon which bash is based goes by the name sh. It’s not often used on Linux, often a pointer to the bash shell or other shells.

Tcsh:

This shell is based on the earlier C shell (CSH). Fairly popular, but no major Linux distributions make it the default shell. You don’t assign environment variables the same way in TCSH as in bash.

CSH:

The original C shell isn’t used much on Linux, but if a user is familiar with CSH, TCSh makes a good substitute.

Ksh:

The Korn shell (ksh) was designed to take the best features of the Bourne shell and the C shell and extend them. It has a small but dedicated following among Linux users.

ZSH:

The Z shell (zsh) takes shell evolution further than the Korn shell, incorporating features from earlier shells and adding still more.

Linux Internal and External Commands

Internal Commands:

  • Built into the shell program and are shell dependent. Also called built-in commands.
  • Determine if a command is a built-in command by using the type command.

External commands:

  • Commands that the system offers, are totally shell-independent and usually can be found in any Linux distribution
  • They mostly reside in /bin and /usr/bin.

Shell command Tricks:

  • Command completion: Type part of a command or a filename (as an option to the command), and then press TAB key.
  • Use Ctrl+A or Ctrl+E: To move the cursor to the start or end of the line, respectively.

Samba

Samba is an Open Source/Free software suite that provides seamless file and print services. It uses the TCP/IP protocol that is installed on the host server.

When correctly configured, it allows that host to interact with an MS Windows client or server as if it is a Windows file and print server, so it allows for interoperability between Linux/Unix servers and Windows-based clients.

Cryptography and Compliance Pitfalls

Cryptography Terminology

  • Encryption only provides confidentiality, but no integrity.

  • Data can be encrypted

    • At rest
    • In use
    • In transit
  • Common types of encryption algorithms

    • Symmetric Key (AES, DES, IDEA, …)
    • Public key (RSA, Elliptic Curve, DH, …)

    Cryptography and Compliance Pitfalls Cryptography and Compliance Pitfalls

Hash Function

Maps data of arbitrary size to data of a fixed size.

  • Provides integrity, but not confidentiality
  • MD5, SHA-1, SHA-2, SHA-3, and others
  • Original data deliberately hard to reconstruct
  • Used for integrity checking and sensitive data storage (e.g., passwords)

Digital Signature

“A mathematical scheme for verifying the authenticity of digital messages and documents.”

  • Uses hashing and public key encryption
  • ensures authentication, non-repudiation, and integrity.

Common Cryptography Pitfalls

Pitfall: Missing Encryption of Data and Communication

  • Products handle sensitive business and personal data.

  • Data is often the most valuable asset that the business has.

  • When you store or transmit it in clear text, it can be easily leaked or stolen.

  • In this day and age, there is no excuse for not encrypting data that’s stored or transmitted.

  • We have the cryptographic technology that is mature, tested, and is available for all environments and programming languages.

    Encrypt all sensitive data you are handling (and also ensure its integrity).

Pitfall: Missing Encryption of Data and Communication

  • Some products owners that we talk to don’t encrypt stored data because “users don’t have access to the file system.”

  • There are plenty of vulnerabilities out there that may allow exposure of files stored on the file system.

  • The physical machine running the application maybe stolen, the hard disk can be then accessed directly.

    You have to assume that the files containing sensitive information may be exposed and analyzed.

Pitfall: Implementing Your Own Crypto

  • Often developers use Base64 encoding, simple xor encoding, and similar obfuscation schemes.

  • Also, occasionally we see products implement their own cryptographic algorithms. Please don’t do that!

    Schneier’s Law:

    Anyone, from the most clueless amateur to the best cryptographer, can create an algorithm that he himself can’t break. It’s not even hard. What is hard is creating an algorithm that no one else can break, even after years of analysis.

    Rely on proven cryptography, that was scrutinized by thousands of mathematicians and cryptographers.

  • Follow recommendations of NIST.

Pitfall: Relying on Algorithms Being Secret

  • We sometimes hear dev teams tell us that “the attacker will never know our internal algorithms.”
    • Bad news – they can and will be discovered; it’s only a question of motivation.
  • A whole branch of hacking – Reverse Engineering – is devoted to discovering hidden algorithms and data.
  • Even if your application is shipped only in compiled form, it can be “decompiled”.
  • Attackers may analyze trial/free versions of the product, or get copies on the Dark Web.
  • “Security by obscurity” is not a good defense mechanism.
  • The contrary is proven true all the time.
    • All algorithms that keep us safe today are open source and very well-studied: AES, RSA, SHA*, ….

      Always assume that your algorithms will be known to the adversary.

      A great guiding rule is Kerckhoffs’s Principle:

      A cryptosystem should be secure even if everything about the system, except the key, is public knowledge.

Pitfall: Using Hard-coded/Predictable/Weak Keys

  • Not safeguarding your keys renders crypto mechanisms useless.

  • When the passwords and keys are hard-coded in the product or stored in plaintext in the config file, they can easily be discovered by an attacker.

  • An easily guessed key can be found by trying commonly used passwords.

  • When keys are generated randomly, they have to be generated from a cryptographically-secure source of randomness, not the regular RNG.

    Rely on hard to guess, randomly generated keys and passwords that are stored securely.

Pitfall: Ignoring Encryption Export Regulation Rules

  • Encryption is exported controlled.
  • All code that…
    • Contains encryption (closed or open source).
    • Calls encryption algorithms in another library or component.
    • Directs encryption functionality in another product.
  • … must be classified for export before being released.

Data Encryption

Encryption Data at rest

  • The rule of thumb is to encrypt all sensitive data at rest: in files, config files, databases, backups.
  • Symmetric key encryption is most commonly used.
  • Follow NIST Guidelines for selecting an appropriate algorithm – currently it’s AES (with CBC mode) and Triple DES.

Pitfalls and Recommendations

  • Some algorithms are outdated and no longer considered secure – phase them out
    • examples include DES, RC4, and others.
  • Using hard-coded/easily guessed/insufficiently random keys – Select cryptographically-random keys, don’t reuse keys for different installations.
  • Storing keys in clear text in proximity to data they protect (“key under the doormat”)
    • stores keys in secure key stores.
  • Using initialization vectors (IVs) incorrectly.
    • Use a new random IV every time.
  • Preferable to select the biggest key size you can handle (but watch out for export restrictions).

Encryption Data in Use

  • Unfortunately, a rarely-followed practice.
  • Important, nonetheless, memory could be leaked by an attacker.
    • A famous 2014 Heartbleed defect leaked memory of processes that used OpenSSL.
  • The idea is to keep data encrypted up until it must be used.
  • Decrypt data as needed, and then promptly erase it in memory after use.
  • Keep all sensitive data (data, keys, passwords) encrypted except a brief moment of use.
  • Consider Homomorphic encryption if it can be applied to your application.

Encryption Data in Transit

  • In this day and age, there is no excuse for communicating in cleartext.
  • There is an industry consensus about it; Firefox and Chrome now mark HTTP sites as insecure.
  • Attackers can easily snoop on unprotected communication.
  • All communications (not just HTTP) should be encrypted, including: RPCs, database connections, and others.
  • TLS/SSL is the most commonly used protocol.
    • Public key crypto (e.g., RSA, DH) for authentication and key exchange; Symmetric Key crypto to encrypt the data.
    • Server Digital Certificate references certificate authority (CA) and the public key.
  • Sometimes just symmetric key encryption is employed (but requires pre-sharing of keys).

Pitfalls

  • Using self-signed certificates
    • Less problematic for internal communications, but still dangerous.
    • Use properly generated certificates verified by established CA.
  • Accepting arbitrary certificates
    • Attacker can issue their own certificate and snoop on communications (MitM attacks).
    • Don’t accept arbitrary certificates without verification.
  • Not using certificate pinning
    • Attacker may present a properly generated certificate and still snoop on communications.
    • Certificate pinning can help – a presented certificate is checked against a set of expected certificates.
  • Using outdated versions of the protocol or insecure cipher suites
    • Old versions of SSL/TLS are vulnerable. (DROWN, POODLE, BEAST, CRIME, BREACH, and other attacks)
    • TLS v1.1-v1.3 are safe to use (v1.2 is recommended, with v1.3 coming)
    • Review your TLS support; there are tools that can help you:
      • Nessus, Qualys SSL Server Test (external only), sslscan, sslyze.
  • Allowing TLS downgrade to insecure versions, or even to HTTP
    • Lock down the versions of TLS that you support and don’t allow downgrade; disable HTTP support altogether.
  • Not safeguarding private keys
    • Don’t share private keys between different customers, store them in secure key stores.
  • Consider implementing Forward Secrecy
    • Some cipher suites protect past sessions against future compromises of secret keys or passwords.
  • Don’t use compression under TLS
    • CRIME/BREACH attacks showed that using compression with TLS for changing resources may lead to sensitive data exposure.
  • Implement HTTP Strict Transport Security (HSTS)
    • Implement Strict-Transport-Security header on all communications.
  • Stay informed of latest security news
    • A protocol or cipher suite that is secure today may be broken in the future.

Hashing Considerations

Hashing

  • Hashing is used for a variety of purposes:
    • Validating passwords (salted hashes)
    • Verifying data/code integrity (messages authentication codes and keyed hashes)
    • Verifying data/code integrity and authenticity (digital signatures)
  • Use secure hash functions (follow NIST recommendations):
    • SHA-2 (SHA-256, SHA-384, SHA-512, etc.) and SHA-3

Pitfalls: Using Weak or Obsolete Functions

  • There are obsolete and broken functions that we still frequently see in the code – phase them out.
  • Hash functions for which it is practical to generate collisions (two or more different inputs that correspond to the same hash value) are not considered robust.
  • MD5 has been known to be broken for more than 10 years, collisions are fairly easily generated.
  • SHA-1 was recently proven to be unreliable.
  • Using predictable plaintext
    • Not quite a cryptography problem, but when the plaintext is predictable it can be discovered through brute forcing.
  • Using unsalted hashes when validating passwords
    • Even for large issue spaces, rainbow tables can be used to crack hashes.
    • When salt is added to the plaintext, the resulting hash is completely different, and rainbow tables will no longer help.

Additional Considerations

  • Use key stretching functions (e.g., PBKDF2) with numerous iterations.
    • Key stretching functions are deliberately slow (controlled by number of iterations) in order to make brute forcing attacks impractical, both online and offline (aim 750ms to complete the operation).
  • Future-proof your hashes – include an algorithm identifier, so you can seamlessly upgrade in the future if the current algorithm becomes obsolete.

Message Authentication Codes (MACs)

  • MACs confirm that the data block came from the stated sender and hasn’t been changed.

  • Hash-based MACs (HMACs) are based on crypto hash functions (e.g., HMAC-SHA256 or HMAC-SHA3).

  • They generate a hash of the message with the help of the secret key.

  • If the key isn’t known, the attacker can’t alter the message and be able to generate another valid HMAC.

  • HMACs help when data may be maliciously altered while under temporary attacker’s control (e.g., cookies, or transmitted messages).

  • Even encrypted data should be protected by HMACs (to avoid bit-flipping attacks).

    Cryptography and Compliance Pitfalls Cryptography and Compliance Pitfalls

Digital Signatures

  • Digital signatures ensure that messages and documents come from an authentic source and were not maliciously modified in transit.
  • Some recommended uses of digital signatures include verifying integrity of:
    • Data exchanged between nodes in the product.
    • Code transmitted over network for execution at client side (e.g., JavaScript).
    • Service and fix packs installed by customer.
    • Data temporarily saved to customer machine (e.g., backups).
  • Digital signatures must be verified to be useful.

Safeguarding Encryption Keys

  • Encryption is futile if the encryption keys aren’t safeguarded.
  • Don’t store them in your code, in plaintext config files, in databases.
  • Proper way to store keys and certificates is in secure cryptographic storage, e.g, keystores
    • For examples, in Java you can use Java Key Store (JKS).
  • There is a tricky problem of securing key encrypting key (KEK).
    • This is a key that is used to encrypt the keystore. But how do we secure it?

Securing KEK

  • Use hardware secure modules (HSM).
  • Use Virtual HSM (Unbound vHSM).
  • Derive KEK for user-entered password.
    • An example of this can be seen in Symantec Encryption Desktop Software, securing our laptops.
  • Derive KEK from data unique to the machine the product is running on.
    • This could be file system metadata (random file names, file timestamps).
    • An attacker that downloads the database or the keystore will not be able to as easily obtain this information.

Impact of Quantum Computing

  • Quantum computing is computing using quantum-mechanical phenomena. Quantum computing may negatively affect cryptographic algorithms we employ today.
  • We are still 10–15 years away from quantum computing having an effect on cryptography.
  • Risks to existing cryptography:
    • Symmetric encryption (e.g., AES) will be weakened.
      • To maintain current levels of security, double the encryption key size (e.g., got from 128-bit to 256-bit keys).
    • Public key encryption that relies on prime number factorization (e.g., RSA used in SSL/TLS, blockchain, digital signatures) will be broken.
      • Plan on switching to quantum-resistant algorithms – e.g., Lattice-based Cryptography, Homomorphic Encryption.
  • Attacker can capture conversations now and decrypt them when quantum computing becomes available.
  • General Good practice – make your encryption, hash, signing algorithms “replaceable”, so that you could exchange them for something more robust if a weakness is discovered.

Subsections of Network Security and Database Vulnerabilities

Introduction to the TCP/IP Protocol Framework

Stateless Inspection

  • Stateless means that each packet is inspected one at a time with no knowledge of the previous packets.

    TCP IP Framework TCP IP Framework

    TCP IP Framework TCP IP Framework

Stateless Inspection Use Cases

  • To protect routing engine resources.
  • To control traffic going in or your organization.
  • For troubleshooting purposes.
  • To control traffic routing (through the use of routing instances).
  • To perform QoS/CoS (marking the traffic).

Stateful Inspection

  • A stateful inspection means that each packet is inspected with knowledge of all the packets that have been sent or received from the same session.

  • A session consists of all the packets exchanged between parties during an exchange.

    TCP IP Framework TCP IP Framework

What if we have both types of inspection?

TCP IP Framework TCP IP Framework

Firewall Filters – IDS and IPS System

Firewall Filter (ACLs) / Security Policies Demo…

TCP IP Framework TCP IP Framework

IDS

An Intrusion Detection System (IDS) is a network security technology originally built for detecting vulnerability exploits against a target application or computer.

  • By default, the IDS is a listen-only device.
  • The IDS monitor traffic and reports its results to an administrator.
  • Cannot automatically take action to prevent a detected exploit from taking over the system.

Basics of an Intrusion Prevention System (IPS)

An IPS is a network security/threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits.

  • The IPS often sites directly behind the firewall, and it provides a complementary layer of analysis that negatively selects for dangerous content.
  • Unlike the IDS – which is a passive system that scans traffic and reports back on threats – the IPS is placed inline (in the direct communication path between source and destination), actively analyzing and taking automated actions on all traffic flows that enter the network.

How does it detect a threat?

TCP IP Framework TCP IP Framework

The Difference between IDS and IPS Systems

TCP IP Framework TCP IP Framework

Network Address Translation (NAT)

Method of remapping one IP address space into another by modifying network address information in Internet Protocol (IP) datagram packet headers, while they are in transit across a traffic routing device.

  • Gives you an additional layer of security.

  • Allows the IP network of an organization to appear from the outside to use a different IP address space than what it is actually using. Thus, NAT allows an organization with non-globally routable addresses to connect to the Internet by translating those addresses into a globally routable addresses space.

  • It has become a popular and essential tool in conserving global address space allocations in face of IPv4 address exhaustion by sharing one Internet-routable IP address of a NAT gateway for an entire private network.

    TCP IP Framework TCP IP Framework

Types of NAT

  1. Static Address translation (static NAT): Allows one-to-one mapping between local and global addresses.
  2. Dynamic Address Translation (dynamic NAT): Maps unregistered IP addresses to registered IP addresses from a pool of registered IP addresses.
  3. Overloading: Maps multiple unregistered IP addresses to a single registered IP address (many to one) using different ports. This method is also known as Port Address Translation (PAT). By using overloading, thousands of users can be connected to the Internet by using only one real global IP address.

Network Protocols over Ethernet and Local Area Networks

An Introduction to Local Area Networks

Network Addressing

  • Layer 3 or network layer adds an address to the data as it flows down the stack; then layer 2 or the data link layer adds another address to the data.

    TCP IP Framework TCP IP Framework

Introduction to Ethernet Networks

For a LAN to function, we need:

  • Connectivity between devices

  • A set of rules controlling the communication

    The most common set of rules is called Ethernet.

  • To send a packet from one host to another host within the same network, we need to know the MAC address, as well as the IP address of the destination device.

Ethernet and LAN – Ethernet Operations

How do devices know when the data if for them?

TCP IP Framework TCP IP Framework

Destination Layer 2 address: MAC address of the device that will receive the frame.

Source Layer 2 address: MAC address of the device sending the frame.

Types: Indicates the layer 3 protocol that is being transported on the frame such as IPv4, IPv6, Apple Tall, etc.

Data: Contains original data as well as the headers added during the encapsulation process.

Checksum: This contains a Cyclic Redundancy Check to check if there are errors on the data.

MAC Address

A MAC address is a 48-bits address that uniquely identifies a device’s NIC. The first 3 bytes are for the OUI and the last 3 bytes are reserved to identify each NIC.

TCP IP Framework TCP IP Framework

Preamble and delimiter (SFD)

Preamble and delimiter (SFD) are 7 byte fields in an Ethernet frame. Preamble informs the receiving system that a frame is starting and enables synchronization, while SFD (Start Frame Delimiter) signifies that the Destination MAC address field begin with the next byte.

TCP IP Framework TCP IP Framework

What if I need to send data to multiple devices?

TCP IP Framework TCP IP Framework

Ethernet and LAN – Network Devices

Twisted Pair Cabling

TCP IP Framework TCP IP Framework

Repeater

  • Regenerates electrical signals.

  • Connects 2 or more separate physical cables.

  • Physical layer device.

  • Repeater has no mechanism to check for collision.

    TCP IP Framework TCP IP Framework

    TCP IP Framework TCP IP Framework

Bridge

Ethernet bridges have 3 main functions:

  • Forwarding frames

  • Learning MAC addresses

  • Controlling traffic

    TCP IP Framework TCP IP Framework

    TCP IP Framework TCP IP Framework

Difference between a Bridge and a Switch

TCP IP Framework TCP IP Framework

  • VLANs provide a way to separate LANs on the same switch.

  • Devices in one VLAN don’t receive broadcast from devices that are on another VLAN.

    TCP IP Framework TCP IP Framework

Limitations of Switches:

  • Network loops are still a problem.
  • Might not improve performance with multicast and broadcast traffic.
  • Can’t connect geographically dispersed networks.

Basics of Routing and Switching, Network Packets and Structures

Layer 2 and Layer 3 Network Addressing

TCP IP Framework TCP IP Framework

TCP IP Framework TCP IP Framework

Address Resolution Protocol (ARP)

The process of using layer 3 addresses to determine layer 2 addresses is called ARP or Address Resolution Protocol.

Routers and Routing Tables

Routing Action

TCP IP Framework TCP IP Framework

Basics of IP Addressing and the OSI Model

IP Addressing – The Basics of Binary

Basics of IP Addressing and the OSI Model Basics of IP Addressing and the OSI Model

IP Address Structure and Network Classes

IP Protocol

  • IPv4 is a 32 bits address divided into four octets.

  • From 0.0.0.0 to 255.255.255.255

  • IPv4 has 4,294,967,296 possible addresses in its address space.

    Basics of IP Addressing and the OSI Model Basics of IP Addressing and the OSI Model

Classful Addressing

When the Internet’s address structure was originally defined, every unicast IP address had a network portion, to identify the network on which the interface using the IP address was to be found, and a host portion, used to identify the particular host on the network given in the network portion.

  • The partitioning of the address space involved five classes. Each class represented a different trade-off in the number of bits of a 32-bit IPv4 address devoted to the network numbers vs. the number of bits devoted to the host number.

    Basics of IP Addressing and the OSI Model Basics of IP Addressing and the OSI Model

    Basics of IP Addressing and the OSI Model Basics of IP Addressing and the OSI Model

IP Protocol and Traffic Routing

IP Protocol (Internet Protocol)

  • Layer 3 devices use the IP address to identify the destination of the traffic, also devices like stateful firewalls use it to identify where traffic has come from.
  • IP addresses are represented in quad dotted notation, for example, 10.195.121.10.
  • Each of the numbers is a non-negative integer from 0 to 255 and represents one-quarter of the whole IP address.
  • A routable protocol is a protocol whose packets may leave your network, pass through your router, and be delivered to a remote network.

IP Protocol Header

Basics of IP Addressing and the OSI Model Basics of IP Addressing and the OSI Model

IPv4 vs. IPv6 Header

Basics of IP Addressing and the OSI Model Basics of IP Addressing and the OSI Model

Network Mask

  • The subnet mask is an assignment of bits used by a host or router to determine how the network and subnetwork information is partitioned from the host information in a corresponding IP address.
  • It is possible to use a shorthand format for expressing masks that simply gives the number of contiguous 1 bit in the mask (starting from the left). This format is now the most common format and is sometimes called the prefix length.
  • The number of bits occupied by the network portion.
  • Masks are used by routers and hosts to determine where the network/subnetwork portion of an IP address ends and the host part starts.

Broadcast Addresses

In each IPv4 subnet, a special address is reserved to be the subnet broadcast address. The subnet broadcast address is formed by setting the network/subnet portion of an IPv4 address to the appropriate value and all the bits in the Host portion to 1.

Basics of IP Addressing and the OSI Model Basics of IP Addressing and the OSI Model

Introduction to the IPv6 Address Schema

IPv4 vs. IPv6

In IPv6, addresses are 128 bits in length, four times larger than IPv4 addresses.

  • An IPv6 address will no longer use four octets. The IPv6 address is divided into eight hexadecimal values (16 bits each) that are separated by a colon(:) as shown in the following examples: 65b3:b834:54a3:0000:0000:534e:0234:5332 The IPv6 address isn’t case-sensitive, and you don’t need to specify leading zeros in the address. Also, you can use a double colon(::) instead of a group of consecutive zeros when writing out the address.

    0:0:0:0:0:0:0:1

    ::1

IPv4 Addressing Schemas

  1. Unicast: Send information to one system. With the IP protocol, this is accomplished by sending data to the IP address of the intended destination system.
  2. Broadcast: Sends information to all systems on the network. Data that is destined for all systems is sent by using the broadcast address for the network. An example of a broadcast address for a network is 192.168.2.2555. The broadcast address is determined by setting all hosts bits to 1 and then converting the octet to a decimal number.
  3. Multicast: Sends information to a selected group of systems. Typically, this is accomplished by having the systems subscribe to a multicast address. Any data that is sent to the multicast address is then received by all systems subscribed to the address. Most multicast addresses start with 224.×.y.z and are considered class D addresses.

IPv6 Addressing Schemas

  1. Unicast: A unicast address is used for one-on-one communication.
  2. Multicast: A multicast address is used to send data to multiple systems at one time.
  3. Anycast: Refers to a group of systems providing a service.

TCP/IP Layer 4 – Transport Layer Overview

Application and Transport Protocols – UDP and TCP

Basics of IP Addressing and the OSI Model Basics of IP Addressing and the OSI Model

Transport Layer Protocol > UDP

Basics of IP Addressing and the OSI Model Basics of IP Addressing and the OSI Model

UDP Header Fields

Basics of IP Addressing and the OSI Model Basics of IP Addressing and the OSI Model

UDP Use Cases

Basics of IP Addressing and the OSI Model Basics of IP Addressing and the OSI Model

Transport Layer Protocol > TCP

Basics of IP Addressing and the OSI Model Basics of IP Addressing and the OSI Model

Transport Layer Protocol > TCP in Action

Basics of IP Addressing and the OSI Model Basics of IP Addressing and the OSI Model

Basics of IP Addressing and the OSI Model Basics of IP Addressing and the OSI Model

Basics of IP Addressing and the OSI Model Basics of IP Addressing and the OSI Model

UDP vs TCP

Basics of IP Addressing and the OSI Model Basics of IP Addressing and the OSI Model

Application Protocols – HTTP

  • Developed by Tim Berners-Lee.

  • HTTP works on a request response cycle; where the client returns a response.

  • It is made of 3 blocks known as the start-line header and body.

  • Not secure.

    Basics of IP Addressing and the OSI Model Basics of IP Addressing and the OSI Model

Application Protocols – HTTPS

  • Designed to increase privacy on the internet.
  • Make use of SSL certificates.
  • It is secured and encrypted.

TCP/IP Layer 5 – Application Layer Overview

DNS and DHCP

DNS

Domain Name System or DNS translates domains names into IP addresses.

DHCP

Basics of IP Addressing and the OSI Model Basics of IP Addressing and the OSI Model

Syslog Message Logging Protocol

Syslog is standard for message logging. It allows separation of the software that generates messages, the system that stores them, and the software that report and analyze them. Each message is labeled with a facility code, indicating the software type generating the message, and assigned a severity label.

Used for:

  • System management

  • Security auditing

  • General informational analysis, and debugging messages

    Used to convey event notification messages. Provides a message format that allows vendor specific extensions to be provided in a structured way.

Syslog utilizes three layers

Basics of IP Addressing and the OSI Model Basics of IP Addressing and the OSI Model

Functions are performed at each conceptual layer:

  • An “originator” generates syslog content to be carried in a message. (Router, server, switch, network device, etc.)
  • A “collector” gathers syslog content for further analysis. — Syslog Server.
  • A “relay” forwards messages, accepting messages from originators or other relays and sending them to collectors or other relays. — Syslog forwarder.
  • A “transport sender” passes syslog messages to a specific transport protocol. — the most common transport protocol is UDP, defined in RFC5426.
  • A “transport receiver” takes syslog messages from a specific transport protocol.

Syslog messages components

  • The information provided by the originator of a syslog message includes the facility code and the severity level.
  • The syslog software adds information to the information header before passing the entry to the syslog receiver:
    • Originator process ID
    • a timestamp
    • the hostname or IP address of the device.
Facility codes
  • The facility value indicates which machine process created the message. The Syslog protocol was originally written on BSD Unix, so Facilities reflect the names of the UNIX processes and daemons.

  • If you’re receiving messages from a UNIX system, consider using the User Facility as your first choice. Local0 through Local7 aren’t used by UNIX and are traditionally used by networking equipment. Cisco routers, for examples, use Local6 or Local7.

    Basics of IP Addressing and the OSI Model Basics of IP Addressing and the OSI Model

Syslog Severity Levels

Basics of IP Addressing and the OSI Model Basics of IP Addressing and the OSI Model

Flows and Network Analysis

What information is gathered in flows?

Basics of IP Addressing and the OSI Model Basics of IP Addressing and the OSI Model

Port Mirroring and Promiscuous Mode

Port mirroring

  • Sends a copy of network packets traversing on one switch port (or an entire VLAN) to a network monitoring connection on another switch port.
  • Port mirroring on a Cisco Systems switch is generally referred to as Switched Port Analyzer (SPAN) or Remote Switched Port analyzer (RSPAN).
  • Other vendors have different names for it, such as Roving Analysis Port (RAP) on 3COM switches.
  • This data is used to analyze and debug data or diagnose errors on a network.
  • Helps administrators keep a close eye on network performance and alerts them when problems occur.
  • It can be used to mirror either inbound or outbound traffic (or both) on one or various interfaces.

Promiscuous Mode Network Interface Card (NIC)

In computer networking, promiscuous mode (often shortened to “promisc mode” or “promisc. mode”) is a mode for a wired network interface controller (NIC) or wireless network interface controller (WNIC) that causes the controller o pass all traffic it receives to the Central Processing Unit (CPU) rather than passing only frames that the controller is intended to receive.

Firewalls, Intrusion Detection and Intrusion Prevention Systems

Next Generation Firewalls – Overview

What is a NGFW?

  • A NGFW is a part of the third generation of firewall technology. Combines traditional firewall with other network device filtering functionalities.
  • Application firewall using in-line deep packet inspection (DPI)
  • Intrusion prevention system (IPS).
  • Other techniques might also be employed, such as TLS/SSL encrypted traffic inspection, website filtering.

NGFW vs. Traditional Firewall

  • Inspection over the data payload of network packets.
  • NGFW provides the intelligence to distinguish business applications and non-business applications and attacks.

Traditional firewalls don’t have the fine-grained intelligence to distinguish one kind of Web traffic from another, and enforce business policies, so it’s either all or nothing.

NGFW and the OSI Model

  • The firewall itself must be able to monitor traffic from layers 2 through 7 and make a determination as to what type of traffic is being sent and received.

    Basics of IP Addressing and the OSI Model Basics of IP Addressing and the OSI Model

NGFW Packet Flow Example and NGFW Comparisons

Flow of Traffic Between Ingress and Egress Interfaces on a NGFW

Basics of IP Addressing and the OSI Model Basics of IP Addressing and the OSI Model

Flow of Packets Through the Firewall

Basics of IP Addressing and the OSI Model Basics of IP Addressing and the OSI Model

NGFW Comparisons:

  • Many firewalls vendors offer next-generation firewalls, but they argue over whose technique is the best.
  • A NGFW is application-aware. Unlike traditional stateful firewalls, which deal in ports and protocols, NGFW drill into traffic to identify the application transversing the network.
  • With current trends pushing applications into the public cloud or to be outsourced to SaaS provides, a higher level of granularity is needed to ensure that the proper data is coming into the enterprise network.
Examples of NGFW
Cisco Systems

Cisco Systems have announced plans to add new levels of application visibility into its Adaptive Security Appliance (ASA), as part of its new SecureX security architecture.

Palo Alto Networks

Says it was the first vendor to deliver NGFW and the first to replace port-based traffic classification with application awareness. The company’s products are based on a classification engine known as App-ID. App-ID identifies applications using several techniques, including decryption, detection, decoding, signatures, and heuristics.

Juniper Networks

They use a suite of software products, known as AppSecure, to deliver NGFW capabilities to its SRX Services Gateway. The application-aware component, known as AppTrack, provides visibility into the network based on Juniper’s signature database as well as custom application signatures created by enterprise administrators.

NGFW other vendors:
  • McAfee
  • Meraki MX Firewalls
  • Barracuda
  • Sonic Wall
  • Fortinet Fortigate
  • Check Point
  • WatchGuard
Open Source NGFW:
pfSense

It is a free and powerful open source firewall used mainly for FreeBSD servers. It is based on stateful packet filtering. Furthermore, it has a wide range of features that are normally only found in very expensive firewalls.

ClearOS

It is a powerful firewall that provides us the tools we need to run a network, and also gives us the option to scale up as and when required. It is a modular operating system that runs in a virtual environment or on some dedicated hardware in the home, office etc.

VyOS

It is open source and completely free, and based on Debian GNU/Linux. It can run on both physical and virtual platforms. Not only that, but it provides a firewall, VPN functionality and software based network routing. Likewise, it also supports paravirtual drivers and integration packages for virtual platforms. Unlike OpenWRT or pfSense, VyOS provides support for advanced routing features such as dynamic routing protocols and command line interfaces.

IPCop

It is an open source Linux Firewall which is secure, user-friendly, stable and easily configurable. It provides an easily understandable Web Interface to manage the firewall. Likewise, it is most suitable for small businesses and local PCs.

IDS/IPS

Classification of IDS

  • Signature based: Analyzes content of each packet at layer 7 with a set of predefined signatures.
  • Anomaly based: It monitors network traffic and compares it against an established baseline for normal use and classifying it as either normal or anomalous.

Types of IDS

  1. Host based IDS (HIDS): Anti-threat applications such as firewalls, antivirus software and spyware-detection programs are installed on every network computer that has two-way access to the outside.
  2. Network based IDS (NIDS): Anti-threat software is installed only at specific points, such as servers that interface between the outside environment and the network segment to be protected.
NIDS
  • Appliance: IBM RealSecure Server Sensor and Cisco IDS 4200 series
  • Software: Sensor software installed on server and placed in network to monitor network traffic, such as Snort.
IDS Location on Network

Basics of IP Addressing and the OSI Model Basics of IP Addressing and the OSI Model

Hybrid IDS Implementation

  • Combines the features of HIDS and NIDS
  • Gains flexibility and increases security
  • Combining IDS sensors locations: put sensors on network segments and network hosts and can report attacks aimed at particular segments or the entire network.

What is an IPS?

  • Network security/threat prevention technology.

  • Examines network traffic flows to detect and prevent vulnerability exploits.

  • Often sits directly behind the firewall.

    Basics of IP Addressing and the OSI Model Basics of IP Addressing and the OSI Model

How does the attack affect me?

  • Vulnerability exploits usually come in the form of malicious inputs to a target application or service.
  • The attackers use those exploits to interrupt and gain control of an application or machine.
  • Once successful exploit, the attacker can disable the target application (DoS).
  • Also, can potentially access to all the rights and permissions available to the compromised application.

Prevention?

  • The IPS is placed inline (in the direct communication path between source and destination), actively analyzing and taking automated actions on all traffic flows that enter the network. Specifically, these actions include:
    • Sending an alarm to the admin (as would be seen in an IDS)
    • Dropping the malicious packets
    • Blocking traffic from the source address
    • Resetting the connection
Signature-based detection

It is based on a dictionary of uniquely identifiable patterns (or signatures) in the code of each exploit. As an exploit is discovered, its signature is recorded and stored in a continuously growing dictionary of signatures. Signatures detection for IPS breaks down into two types:

  1. Exploit-facing signatures identify individual exploits by triggering on the unique patterns of a particular exploit attempt. The IPS can identify specific exploits by finding a match with an exploit-facing signatures in the traffic.
  2. Vulnerability-facing signatures are broader signatures that target the underlying vulnerability in the system that is being targeted. These signatures allow networks to be protected from variants of an exploit that may not have been directly observed in the wild, but also raise the risk of false positive.
Statistical anomaly detection
  • Takes samples of network traffic at random and compares them to a pre-calculated baseline performance level. When the sample of network traffic activity is outside the parameters of baseline performance, the IPS takes action to handle the situation.
  • IPS was originally built and released as a standalone device in the mid-2000s. This, however, was in the advent of today’s implementations, which are now commonly integrated into Unified Threat Management (UTM) solutions (for small and medium size companies) and NGFWs (at the enterprise level).

High Availability and Clustering

What is HA?

  • In information technology, high availability (HA) refers to a system or component that is continuously operational for a desirably long length of time. Availability can be measured relative to “100% operational” or “never failing”.
  • HA architecture is an approach of defining the components, modules, or implementation of services of a system which ensures optimal operational performance, even at times of high loads.
  • Although there are no fixed rules of implementing HA systems, there are generally a few good practices that one must follow so that you gain most out of the least resources.

Requirements for creating an HA cluster?

  • Hosts in a virtual server cluster must have access to the same shared storage, and they must have identical network configurations.
  • Domain name system (DNS) naming is important too: All hosts must resolve other hosts using DNS names, and if DNS isn’t set correctly, you won’t be able to configure HA settings at all.
  • Same OS level.
  • Connections between the primary and secondary nodes.

How HA works?

To create a highly available system, three characteristics should be present:

Redundancy:

  • Means that there are multiple components that can perform the same task. This eliminates the single point of failure problem by allowing a second server to take over a task if the first one goes down or becomes disabled.

    Monitoring and Failover

  • In a highly available setup, the system needs to be able to monitor itself for failure. This means that there are regular checks to ensure that all components are working properly. Failover is the process by which a secondary component becomes primary when monitoring reveals that a primary component has failed.

    Basics of IP Addressing and the OSI Model Basics of IP Addressing and the OSI Model

NIC Teaming

It is a solution commonly employed to solve the network availability and performance challenges and has the ability to operate multiple NICs as a single interface from the perspective of the system.

NIC teaming provides:

  • Protection against NIC failures
  • Fault tolerance in the event of a network adapter failure.

HA on a Next-Gen FW

Basics of IP Addressing and the OSI Model Basics of IP Addressing and the OSI Model

Introduction to Databases

Data Source Types

  • Distributed Databases
    • Microsoft SQL Server, DB2, Oracle, MySQL, SQLite, Postgres etc.
    • Structured Data
  • Data Warehouses
    • Amazon’s redshift, Netezza, Exadata, Apache Hive etc.
    • Structured Data
  • Big Data
    • Google BigTable, Hadoop, MongoDB etc.
    • Semi-Structured Data
  • File Shares
    • NAS (Network Attached Storage), Network fileshares such as EMC or NetApp; and Cloud Shares such as Amazon S3, Google Drive, Dropbox, Box.com etc.

    • Unstructured-Data

      Introduction to Databases Introduction to Databases

Data Model Types

Structured Data

“Structured data is data that has been organized into a formatted repository, typically a database, so that its elements can be made addressable for more effective processing and analysis.”

Semi-Structured Data

“Semi-structured data is data that has not been organized into a specialized repository, such as a database, but that nevertheless has associated information, such as metadata, that makes it more amenable to processing than raw data.”

  • A Word document with tags and keywords.

Unstructured Data

“Unstructured data is information, in many forms, that doesn’t hew to conventional data models and thus typically isn’t a good fit for a mainstream relational database.”

  • A Word Document, transaction data etc.

Types of Unstructured Data

  • Text (most common type)
  • Images
  • Audio
  • Video

Structured Data

Flat File Databases

Flat-file databases take all the information from all the records and store everything in one table.

  • This works fine when you have some records related to a single topic, such as a person’s name and phone numbers.
  • But if you have hundreds or thousands of records, each with a number of fields, the database quickly becomes difficult to use.

Relational Databases

Relational databases separate a mass of information into numerous tables. All columns in each table should be about one topic, such as “student information”, “class Information”, or “trainer information”.

  • The tables for a relational database are linked to each other through the use of Keys. Each table may have one primary key and any number of foreign keys. A foreign key is simply a primary key from one table that has been placed in another table.

  • The most important rules for designing relational databases are called Normal Forms. When databases are designed properly, huge amounts of information can be kept under control. This lets you query the database (search for information section) and quickly get the answer you need.

    Introduction to Databases Introduction to Databases

Securing Databases

Securing your “Crown Jewels”

Introduction to Databases Introduction to Databases

Leveraging Security Industry Best Practices

Enforce:

  • DOD STIG

  • CIS (Center for Internet Security)

  • CVE (Common Vulnerability and Exposures)

    Secure:

  • Privileges

  • Configuration settings

  • Security patches

  • Password policies

  • OS level file permission

    Established Baseline: User defined queries for custom tests to meet baseline for;

  • Organization

  • Industry

  • Application

  • Ownership and access for your files

    Forensics: Advanced Forensics and Analytics using custom reports

  • Understand your sensitive data risk and exposure

Structured Data and Relational Databases

Perhaps the most common day-to-day use case for a database is using it as the backend of an application, such as your organization HR system, or even your organization’s email system!

Introduction to Databases Introduction to Databases

Anatomy of a Vulnerability Assessment Test Report

Introduction to Databases Introduction to Databases

Securing Data Sources by Type

Introduction to Databases Introduction to Databases

A Data Protection Solution Example, IBM Security Guadium Use Cases

Data Monitoring

Data Activity Monitoring/Auditing/Logging

  • Does your product log all key activity generation, retrieval/usage, etc.?
  • Demo data access activity monitoring and logging of the activity monitoring?
  • Does your product monitor for unique user identities (including highly privileged users such as admins and developers) with access to the data?
  • At the storage level, can it detect/identify access to highly privileged users such as database admins, system admins or developers?
  • Does your product generate real time alerts of policy violations while recording activities?
  • Does your product monitor user data access activity in real time with customizable security alerts and blocking unacceptable user behavior, access patterns or geographic access, etc.? If yes, please describe.
  • Does your product generate alerts?
  • Demo the capability for reporting and metrics using information logged.
  • Does your product create auditable reports of data access and security events with customizable details that can address defined regulations or standard audit process requirements? If yes, please describe.
  • Does your product support the ability to log security events to a centralized security incident and event management (SIEM) system?
  • Demo monitoring of non-Relational Database Management Systems (nRDBMS) systems, such as Cognos, Hadoop, Spark, etc.

Deep Dive Injection Vulnerability

What are injection flaws?

  • Injection Flaws: They allow attackers to relay malicious code through the vulnerable application to another system (OS, Database server, LDAP server, etc.)
  • They are extremely dangerous, and may allow full takeover of the vulnerable system.
  • Injection flaws appear internally and externally as a Top Issue.

OS Command Injection

What is OS Command Injection?

  • Abuse of vulnerable application functionality that causes execution of attacker-specified OS commands.
  • Applies to all OSes – Linux, Windows, macOS.
  • Made possible by lack of sufficient input sanitization, and by unsafe execution of OS commands.

What is the Worst That Could Happen?

  • Attacker can replace file to be deleted – BAD:
    /bin/sh -c "/bin/rm /var/app/logs/../../lib/libc.so.6"
  • Attacker can inject arbitrary malicious OS command – MUCH WORSE:
    /bin/sh -c "/bin/rm /var/app/logs/x;rm -rf /"
  • OS command injection can lead to:
    • Full system takeover
    • Denial of service
    • Stolen sensitive information (passwords, crypto keys, sensitive personal info, business confidential data)
    • Lateral movement on the network, launching pad for attacks on other systems
    • Use of system for botnets or cryptomining
  • This is as bad as it gets, a “GAME OVER” event.

How to Prevent OS Command Injection?

Recommendation #1 – don’t execute OS commands

  • Sometimes OS command execution is introduced as a quick fix, to let the command or group of commands do the heavy lifting.
  • This is dangerous, because insufficient input checks may let a destructive OS command slip in.
  • Resist the temptation to run OS commands and use built-in or 3rd party libraries instead:
    • Instead of rm use java.nio.file.Files.deleteIfExists(file)
    • Instead of cp use java.nio.file.Files.copy(source, destination) … and so on.
  • Use of library functions significantly reduces the attack surface.

Recommendation #2 – Run at the least possible privilege level

  • It is a good idea to run under a user account with the least required rights.
  • The more restricted the privilege level is, the less damage can be done.
  • If an attacker is able to sneak in an OS command (e.g., rm -rf /) he can do much less damage when the application is running as tomcat user vs. running as root user.
  • This helps in case of many vulnerabilities, not just injection.

Recommendation #3 – Don’t run commands through shell interpreters

  • When you run shell interpreters like sh, bash, cmd.exe, powershell.exe it is much easier to inject commands.
  • The following command allows injection of an extra rm:
    /bin/sh -c "/bin/rm /var/app/logs/x;rm -rf /"
  • … but in this case injection will not work, the whole command will fail:
    /bin/rm /var/app/logs/x;rm -rf/
  • Running a single command directly executes just that command.
  • Note that it is still possible to influence the behavior of a single command (e.g., for nmap the part on the right, when injected, could overwrite a vital system file):
    /usr/bin/nmap 1.2.3.4 -oX /lib/libc.so.6
  • Also note that the parameters that you pass to a script may still result in command injection:
    processfile.sh "x;rm -rf /"

Recommendation #4 – Use explicit paths when running executables

  • Applications are found and executed based on system path settings.
  • If a writable folder is referenced in the path before the folder containing the valid executable, an attacker may install a malicious version of the application there.
  • In this case, the following command will cause execution of the malicious application:
    /usr/bin/nmap 123.45.67.89
  • The same considerations apply to shared libraries, explicit references help avoid DLL hijacking.

Recommendation #5 – Use safer functions when running system commands

  • If available, use functionality that helps prevent command injection.
  • For example, the following function call is vulnerable to new parameter injection (one could include more parameters, separated by spaces, in ipAddress):
    Runtime.getRuntime().exec("/user/bin/nmap " + ipAddress) ;
  • … but this call is not vulnerable:
    Runtime.getRuntime().exec(new String[]{"/usr/bin/nmap",ipAddress});

Recommendation #6 – if possible, don’t let user input reach command execution unchanged

  • Modifying user input, or replacing user-specified values with others (e.g., using translation tables) helps protect against injection.
  • For example, instead of allowing a user to specify a file to delete, let them select a unique file ID:
    action=delete&file=457
  • When submitted, translate that ID into a real file name:
    realName= getRealFileName(fileID);
    Runtime.getRuntime().exec(newString[]{"/bin/rm","/var/app/logs/"+realName});

Recommendation #7 – Sanitize user input with strict whitelist (not blacklists!)

  • In products, we often see blacklists used for parameter sanitization; some of them are incorrect.
  • It is hard to build a successful blacklist – hackers are very inventive.
  • Suppose we want to blacklist characters used in a file name for command, rm /var/app/logs/file Deep Dive Injection Vulnerability Deep Dive Injection Vulnerability
  • A more robust and simpler solution is to whitelist file name as [A-Za-z0-9.]+

What is SQL Injection?

  • Abuse of vulnerable application functionality that causes execution of attacker-specified SQL queries.

  • It is possible in any SQL database.

  • Made possible by lack of sufficient input sanitization.

    Example

    Deep Dive Injection Vulnerability Deep Dive Injection Vulnerability

Dangers of SQL Injection

  • Consequences of SQL injection:
    • Bypassing of authentication mechanisms
    • Data exfiltration
    • Execution of OS commands, e.g., in Postgres:
COPY (SELECT 1) TO PROGRAM 'rm -rf /'
  • Vandalism/DoS (e.g., DROP TABLE sales) – injected statements may sometimes be chained
    SELECT * FROM users WHERE user='' ;DROP TABLE sales; --' AND pass=''

Common Types of SQL injection

  • Error based
    • Attacker may tailor his actions based on the database errors the application displays.
  • UNION-based
    • May be used for data exfiltration, for example:
      SELECT name, text FROM log WHERE data='2018-04-01' UNION SELECT user, password FROM users --'
  • Blind Injection
    • The query may not return the data directly, but it can be inferred by executing many queries whose behavior presents one of two outcomes.
    • Can be Boolean-based (one of two possible responses), and Time-based (immediate vs delayed execution).
    • For example, the following expression, when injected, indicates if the first letter of the password is a:
      IF(password LIKE 'a%', sleep(10), 'false')
  • Out of Band
    • Data exfiltration is done through a separate channel (e.g., by sending an HTTP request).

How to Prevent SQL Injection?

Recommendation #1 – Use prepared statements

  • Most SQL injection happens because queries are pieced together as text.
  • Use of prepared statements separates the query structure from query parameters.
  • Instead of this pattern:
    stmt.executeQuery("SELECT * FROM users WHERE user='"+user+"' AND pass='"pass+"'")
  • … use this:
    PreparedStatement ps = conn.preparedStatement("SELECT * FROM users WHERE user = ? AND pass = ?"); ps.setString(1, user);ps.setString(2, pass);
  • SQL injection risk now mitigated.
  • Note that prepared statements must be used properly, we occasionally see bad examples like:
    conn.preparedStatement("SELECT * FROM users WHERE user = ? AND pass = ? ORDER BY "+column);

Recommendation #2 – Sanitize user input

  • Just like for OS command injection, input sanitization is important.
  • Only restrictive whitelists should be used, not blacklists.
  • Where appropriate, don’t allow user input to reach the database, and instead use mapping tables to translate it.

Recommendation #3 – Don’t expose database errors to the user

  • Application errors should not expose internal information to the user.
  • Details belong in an internal log file.
  • Exposed details can be abused for tailoring SQL injection commands.
  • For examples, the following error message exposes both the internal query structure and the database type, helping attackers in their efforts:

    ERROR: If you have an error in your SQL syntax, check the manual that corresponds to your MySQL server version for the right syntax to use near “x” GROUP BY username ORDER BY username ASC’ at line 1.

Recommendation #4 – Limit database user permissions

  • When user queries are executed under a restricted user, less damage is possible if SQL injection happens.
  • Consider using a user with read-only permissions when database updates are not required, or use different users for different operations.

Recommendation #5 – Use stored Procedures

  • Use of stored procedures mitigates the risk by moving SQL queries into the database engine.
  • Fewer SQL queries will be under direct control of the application, reducing likelihood of abuse.

Recommendation #6 – Use ORM libraries

  • Object-relational mapping (ORM) libraries help mitigate SQL injection
    • Examples: Java Persistence API (JPA) implementations like Hibernate.
  • ORM helps reduce or eliminate the need for direct SQL composition.
  • However, if ORM is used improperly SQL injections may still be possible:
    Query hqlQuery = session.createQuery("SELECT * FROM users WHERE user='"+user+"'AND pass='"+pass+"'")

Other Types of Injection

  • Injection flaws exist in many other technologies
  • Apart from the following, there are injection flaws also exist in Templating engines.
  • … and many other technologies
  • Recommendation for avoiding all of them are similar to what is proposed for OS and SQL injection.

NoSQL Injection

  • In MongoDB $where query parameter is interpreted as JavaScript.
  • Suppose we take an expression parameter as input:
    $where: "$expression"
  • In simple case it is harmless:
    $where: "this.userType==3"
  • However, an attacker can perform a DoS attack:
    $where: "d = new Date; do {c = new Date;} while (c - d < 100000;"

XPath Injection

  • Suppose we use XPath expressions to select user on login:
    "//Employee[UserName/text()='" + Request ("Username") + "' AND Password/text() = '" + Request ("Password") + "']"
  • In the benign case, it will select only the user whose name and password match:
    //Employee[UserName/text()='bob' AND Password/text()='secret']
  • In the malicious case, it will select any user:
    //Employee[UserName/text()='' or 1=1 or '1'='1' And Password/text()='']

LDAP Injection

  • LDAP is a common mechanism for managing user identity information. The following expression will find the user with the specified username and password.
    find("(&(cn=" + user +")(password=" + pass +"))")
  • In the regular case, the LDAP expression will work only if the username and password match:
    find("(&(cn=bob)(password=secret))")
  • Malicious users may tweak the username to force expression to find any user:
    find("(&(cn=*)(cn=*))(|cn=*)(password=any)")

Subsections of Pentest, IR and Forensics

Penetration Testing

What is Penetration Testing?

“Penetration testing is security testing in which assessors mimic real-world attacks to identify methods for circumventing the security features of an application, system, or network. It often involves launching real attacks on real systems and data that use tools and techniques commonly used by attackers.”

Operating Systems

Desktop Mobile
Windows iOS
Unix Android
Linux Blackberry OS
macOS Windows Mobile
ChromeOS WebOS
Ubuntu Symbian OS

Approaches

  1. Internal vs. external
  2. Web and mobile application assessments
  3. Social Engineering
  4. Wireless Network, Embedded Device & IoT
  5. ICS (Industry Control Systems) penetration

General Methodology

  • Planning
  • Discovery
  • Attack
  • Report

Penetration Testing Phases

Penetration Testing – Planning

  • Setting Objectives
  • Establishing Boundaries
  • Informing Need-to-know employees

Penetration Testing – Discovery

Vulnerability analysis

Vulnerability scanning can help identify outdated software versions, missing patches, and misconfigurations, and validate compliance with or deviations from an organization’s security policy. This is done by identifying the OSes and major software applications running on the hosts and matching them with information on known vulnerabilities stored in the scanners’ vulnerability databases.

Dorks

A Google Dork query, sometimes just referred to as a dork, is a search string that uses advanced search operators to find information that is not readily available on a website.

What Data Can We Find Using Google Dorks?

  • Admin login pages
  • Username and passwords
  • Vulnerable entities
  • Sensitive documents
  • Govt/military data
  • Email lists
  • Bank Account details and lots more…

Passive vs. Active Record

Passive Active
Monitoring employees Network Mapping
Listening to network traffic Port Scanning
Password cracking

Social Engineering

“Social Engineering is an attempt to trick someone into revealing information (e.g., a password) that can be used to attack systems or networks. It is used to test the human element and user awareness of security, and can reveal weaknesses in user behavior.”

Scanning Tools

  • Network Mapper → NMAP
  • Network Analyzer and Profiler → WIRESHARK
  • Password Crackers → JOHNTHERIPPER
  • Hacking Tools → METASPLOIT

Passive Online

  • Wire sniffing
  • Man in the Middle
  • Replay Attack

Active Online

  • Password Guessing
  • Trojan/spyware/keyloggers
  • Hah injection
  • Phishing

Offline Attacks

  • Pre-computed Hashes
    • Data structures that use a hash function to store, order, and/or access data in an array.
  • Distributed Network Attack (DNA)
    • DNA is a password cracking system sold by AccessData.
    • DNA can perform brute-force cracking of 40-bit RC2/RC4 keys. For longer keys, DNA can attempt password cracking. (It’s computationally infeasible to attempt a brute-force attack on a 128-bit key.)
    • DNA can mine suspect’s hard drive for potential passwords.
  • Rainbow Tables
    • A rainbow table is a pre-computed table for reversing cryptographic hash functions, usually for cracking password hashes.

Tech-less Discovery

  • Social Engineering
  • Shoulder surfing
  • Dumpster Diving

Penetration Testing – Attack

“While vulnerability scanners check only for the possible existence of a vulnerability, the attack phase of a penetration test exploits the vulnerability to confirm its existence.”

Penetration Testing Penetration Testing

Types of Attack Scenarios

  1. White Box Testing: In this type of testing, the penetration tester has full access to the target system and all relevant information, including source code, network diagrams, and system configurations. This type of testing is also known as “full disclosure” testing and is typically performed during the planning phase of penetration testing.
  2. Grey Box Testing: In this type of testing, the penetration tester has partial access to the target system and some knowledge of its internal workings, but not full access or complete knowledge. This type of testing is typically performed during the Discovery phase of penetration testing.
  3. Black Box Testing: In this type of testing, the penetration tester has no prior knowledge or access to the target system and must rely solely on external observations and testing to gather information and identify vulnerabilities. This type of testing is also known as “blind” testing and is typically performed during the Attack phase of penetration testing.

Exploited Vulnerabilities

Penetration Testing Penetration Testing

Penetration Testing – Reporting

Executive Summary

“This section will communicate to the reader the specific goals of the Penetration Test and the high level findings of the testing exercise.”

  • Background
  • Overall Posture
  • Risk Ranking
  • General Findings
  • Recommendations
  • Roadmap

Technical Review

Introduction

  • Personnel involved

  • Contact information

  • Assets involved in testing

  • Objectives of Test

  • Scope of test

  • Strength of test

  • Approach

  • Threat/Grading Structure

    Scope

  • Information gathering

  • Passive intelligence

  • Active intelligence

  • Corporate intelligence

  • Personnel intelligence

    Vulnerability Assessment In this section, a definition of the methods used to identify the vulnerability as well as the evidence/classification of the vulnerability should be present.

    Vulnerability Confirmation This section should review, in detail, all the steps taken to confirm the defined vulnerability as well as the following:

  • Exploitation Timeline

  • Targets selected for Exploitation

  • Exploitation Activities

    Post Exploitation

  • Escalation path

  • Acquisition of Critical Information

  • Value of information Access to core business systems

  • Access to compliance protected data sets

  • Additional information/systems accessed

  • Ability of persistence

  • Ability for exfiltration

  • Countermeasure

  • Effectiveness

    Risk/Exposure This section will cover the business risk in the following subsection:

  • Evaluate incident frequency

  • Estimate loss magnitude per incident

  • Derive Risk

Penetration Testing Tools

  • Kali Linux
  • NMAP (Network Scanner)
  • JohnTheRipper (Password cracking tool)
  • MetaSploit
  • Wireshark (Packet Analyzer)
  • HackTheBox (Testing playground)
  • LameWalkThrough (Testing playground)

Incident Response

What is Incident Response?

“Preventive activities based on the results of risk assessments can lower the number of incidents, but not all incidents can be prevented. An incident response is therefore necessary for rapidly detecting incidents, minimizing loss and destruction, mitigating the weaknesses that were exploited, and restoring IT services.”

Events

“An event can be something as benign and unremarkable as typing on a keyboard or receiving an email.”

In some cases, if there is an Intrusion Detection System(IDS), the alert can be considered an event until validated as a threat.

Incident

“An incident is an event that negatively affects IT systems and impacts on the business. It’s an unplanned interruption or reduction in quality of an IT service.”

An event can lead to an incident, but not the other way around.

Why Incident Response is Important

One of the benefit of having an incident response is that it supports responding to incidents systematically so that the appropriate actions are taken, it helps personnel to minimize loss or theft of information and disruption of services caused by incidents, and to use information gained during incident handling to better prepare for handling future incidents.

IR Team Models

  • Central teams
  • Distributed teams
  • Coordinating teams

Coordinating Teams

Incident don’t occur in a vacuum and can have an impact on multiple parts of a business. Establish relationships with the following teams: Incident Response Incident Response

Common Attack Vectors

Organization should be generally prepared to handle any incident, but should focus on being prepared to handle incident that use common attack vectors:

  1. External/Removable Media
  2. Attrition
  3. Web
  4. Email
  5. Impersonation
  6. Loss or theft of equipment

Baseline Questions

Knowing the answers to these will help your coordination with other teams and the media.

  • Who attacked you? Why?
  • When did it happen? How did it happen?
  • Did this happen because you have poor security processes?
  • How widespread is the incident?
  • What steps are you taking to determine what happened and to prevent future occurrences?
  • What is the impact of the incident?
  • Was any PII exposed?
  • What is the estimated cost of this incident?

Incident Response Phases

Incident Response Incident Response

Incident Response Process

Incident Response Preparation

Incident Response Policy

IR Policy needs to cover the following: IR Team

  • The composition of the incident response team within the organization. Roles
  • The role of each of the team members. Means, Tools, Resources
  • The technological means, tools, and resources that will be used to identify and recover compromised data. Policy Testing
  • The persons responsible for testing the policy. Action Plan
  • How to put the policy into the action?

Resources

Incident Handler Communications and Facilities:

  • Contact information

  • On-call information

  • Incident reporting mechanisms

  • Issue tracking system

  • Smartphones

  • Encryption software

  • War room

  • Secure storage facility

    Incident Analysis Hardware and Software:

  • Digital forensic workstations and/or backup devices

  • Laptops

  • Spare workstations, servers, and networking equipment

  • Blank removable media

  • Portable printer

  • Packet sniffers and protocol analyzers

  • Digital forensic software

  • Removable media

  • Evidence gathering accessories

    Incident Analysis Resources:

  • Port lists

  • Documentation

  • Network diagrams and lists of critical assets

  • Current baselines

  • Cryptographic hashes

The Best Defense

“Keeping the number of incidents reasonably low is very important to protect the business processes of the organization. It security controls are insufficient, higher volumes of incidents may occur, overwhelming the incident response team.”

So the best defense is:

  • Periodic Risk Assessment
  • Hardened Host Security
  • Whitelist based Network Security
  • Malware prevention systems
  • User awareness and training programs

Checklist

  • Are all members aware of the security policies of the organization?
  • Do all members of the Computer Incident Response Team know whom to contact?
  • Do all incident responders have access to journals and access to incident response toolkits to perform the actual incident response process?
  • Have all members participated in incident response drills to practice the incident response process and to improve overall proficiency on a regularly established basis?

Incident Response Detection and Analysis

Precursors and Indicators

Precursors

  • A precursor is a sign that an incident may occur in the future.
    • Web server log entries that show the usage of a vulnerability scanner.

    • An announcement of a new exploit that targets a vulnerability of the organization’s mail server.

    • A threat from a group stating that the group will attack the organization.

      Indicators

  • An indicator is a sing that an incident may have occurred or may be occurring now.
    • Antivirus software alerts when it detects that a host is infected with malware.
    • A system admin sees a filename with unusual characters.
    • A host records an auditing configuration change in its log.
    • An application logs multiple failed login attempts from an unfamiliar remote system.
    • An email admin sees many bounced emails with suspicious content.
    • A network admin notices an unusual deviation from typical network traffic flows.

Monitoring Systems

  • Monitoring systems are crucial for early detection of threats.

  • These systems are not mutually exclusive and still require an IR team to document and analyze the data.

    IDS vs. IPS Both are parts of the network infrastructure. The main difference between them is that IDS is a monitoring system, while IPS is a control system.

    DLP Data Loss Prevention (DLP) is a set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.

    SIEM Security Information and Event Management solutions combine Security Event Management (SEM) – which carries out analysis of event and log data in real-time, with Security Information Management (SIM).

Documentation

Regardless of the monitoring system, highly detailed, thorough documentation is needed for the current and future incidents.

  • The current status of the incident
  • A summary of the incident
  • Indicators related to the incident
  • Other incident related to this incident
  • Actions taken by all incident handlers on this incident.
  • Chain of custody, if applicable
  • Impact assessments related to the incident
  • Contact information for other involved parties
  • A list of evidence gathered during the incident investigation
  • Comments from incident handlers
  • Next steps to be taken (e.g., rebuild the host, upgrade an application)

Functional Impact Categories

Incident Response Incident Response

Information Impact Categories

Incident Response Incident Response

Recoverability Effort Categories

Incident Response Incident Response

Notifications

  • CIO
  • Local and Head of information security
  • Other incident response teams within the organization
  • External incident response teams (if appropriate)
  • System owner
  • Human resources
  • Public affairs
  • Legal department
  • Law enforcement (if appropriate)

Containment, Eradication & Recovery

Containment

“Containment is important before an incident overwhelms resources or increases damage. Containment strategies vary based on the type of incident. For example, the strategy for containing an email-borne malware infection is quite different from that of a network-based DDoS attack.”

An essential part of containment is decision-making. Such decisions are much easier to make if there are predetermined strategies and procedures for containing the incident.

  1. Potential damage to and theft of resources
  2. Need for an evidence preservation
  3. Service availability
  4. Time and resources needed to implement the strategy
  5. Effectiveness of the strategy
  6. Duration of the solution

Forensics in IR

“Evidence should be collected to procedures that meet all applicable laws and regulations that have been developed from previous discussions with legal staff and appropriate law enforcement agencies so that any evidence can be admissible in court.” — NIST 800-61

  1. Capture a backup image of the system as-is
  2. Gather evidence
  3. Follow the Chain of custody protocols

Eradication and Recovery

  1. After an incident has been contained, eradication may be necessary to eliminate components of the incident, such as deleting malware and disabling breached user accounts, as well as identifying and mitigating all vulnerabilities that were exploited.
  2. Recovery may involve such actions as restoring systems from clean backups, rebuilding systems from scratch, replacing compromised files with clean versions, installing patches, changing passwords, and tightening network perimeter security.
  3. A high level of testing and monitoring are often deployed to ensure restored systems are no longer impacted by the incident. This could take weeks or months, depending on how long it takes to bring back compromised systems into production.

Checklist

  • Can the problem be isolated? Are all affected systems isolated from non-affected systems? Have forensic copies of affected systems been created for further analysis?
  • If possible, can the system be reimaged and then hardened with patches and/or other countermeasures to prevent or reduce the risk of attacks? Have all malware and other artifacts left behind by the attackers been removed, and the affected systems hardened against further attacks?
  • What tools are you going to use to test, monitor, and verify that the systems being restored to productions are not compromised by the same methods that cause the original incident?

Post Incident Activities

Holding a “lessons learned” meeting with all involved parties after a major incident, and optionally periodically after lesser incidents as resources permit, can be extremely helpful in improving security measures and the incident handling process itself.

Lessons Learned

  • Exactly what happened, and at what times?
  • How well did staff and management perform in dealing with the incident? Were the documented procedures followed? Were they adequate?
  • What information was needed sooner?
  • Were any steps or actions taken that might have inhibited the recovery?
  • What would the staff and management do differently the next time a similar incident occurs?
  • How could information sharing with other organizations have been improved?
  • What corrective actions can prevent similar incidents in the future?
  • What precursors or indicators should be watched in the future to detect the similar incidents?

Other Activities

  • Utilizing data collected
  • Evidence Retention
  • Documentation

Digital Forensics

Forensics Overview

What are Forensics?

“Digital forensics, also known as computer and network forensics, has many definitions. Generally, it is considered the application of science to the identification, collection, examination, and analysis of data while preserving the integrity of the information and maintaining a strict chain of custody for the data.”

Types of Data

The first step in the forensic process is to identify potential sources of data and acquire data from them. The most obvious and common sources of data are desktop computers, servers, network storage devices, and laptops.

  • CDs/DVDs
  • Internal & External Drives
  • Volatile data
  • Network Activity
  • Application Usage
  • Portable Digital Devices
  • Externally Owned Property
  • Computer at Home Office
  • Alternate Sources of Data
  • Logs
  • Keystroke Monitoring

The Need for Forensics

  • Criminal Investigation
  • Incident Handling
  • Operational Troubleshooting
  • Log Monitoring
  • Data Recovery
  • Data Acquisition
  • Due Diligence/Regulatory Compliance

Objectives of Digital Forensics

  • It helps to recover, analyze, and preserve computer and related materials in such a manner that it helps the investigation agency to present them as evidence in a court of law. It helps to postulate the motive behind the crime and identity of the main culprit.
  • Designing procedures at a suspected crime scene, which helps you to ensure that the digital evidence obtained is not corrupted.
  • Data acquisition and duplication: Recovering deleted files and deleted partitions from digital media to extract the evidence and validate them.
  • Help you to identify the evidence quickly, and also allows you to estimate the potential impact of the malicious activity on the victim.
  • Producing a computer forensic report, which offers a complete report on the investigation process.
  • Preserving the evidence by following the chain of custody.

Forensic Process – NIST

Collection Identify, label, record, and acquire data from the possible sources, while preserving the integrity of the data.

Examination Processing large amounts of collected data to assess and extract of particular interest.

Analysis Analyze the results of the examination, using legally justifiable methods and techniques.

Reporting Reporting the results of the analysis.

The Forensic Process

Data Collection and Examination

Examination

Steps to Collect Data

Develop a plan to acquire the data Create a plan that prioritizes the sources, establishing the order in which the data should be acquired.

Acquire the Data Use forensic tools to collect the volatile data, duplicate non-volatile data sources, and securing the original data sources.

Verify the integrity of the data Forensic tools can create hash values for the original source, so the duplicate can be verified as being complete and untampered with.

Overview of Chain of Custody

A clearly defined chain of custody should be followed to avoid allegations of mishandling or tampering of evidence. This involves keeping a log of every person who had physical custody of the evidence, documenting the actions that they performed on the evidence and at what time, storing the evidence in a secure location when it is not being used, making a copy of the evidence and performing examination and analysis using only the copied evidence, and verifying the integrity of the original and copied evidence.

Examination

Bypassing Controls OSs and applications may have data compression, encryption, or ACLs.

A Sea of Data Hard drives may have hundreds of thousands of files, not all of which are relevant.

Tools There are various tools and techniques that exist to help filter and exclude data from searches to expedite the process.

Analysis & Reporting

Analysis

“The analysis should include identifying people, places, items, and events, and determining how these elements are related so that a conclusion can be reached.”

Putting the pieces together

Coordination between multiple sources of data is crucial in making a complete picture of what happened in the incident. NIST provides the example of an IDS log linking an event to a host. The host audit logs linking the event to a specific user account, and the host IDS log indicating what actions that user performed.

Writing your forensic report

A case summary is meant to form the basis of opinions. While there are a variety of laws that relate to expert reports, the general rules are:

  • If it is not in your report, you cannot testify about it.
  • Your report needs to detail the basis for your conclusions.
  • Detail every test conducted, the methods and tools used, and the results.

Report Composition

  1. Overview/Case Summary
  2. Forensic Acquisition & Examination Preparation
  3. Finding & report (analysis)
  4. Conclusion

SANS Institute Best Practices

  1. Take Screenshots
  2. Bookmark evidence via forensic application of choice
  3. Use built-in logging/reporting options within your forensic tool
  4. Highlight and exporting data items into .csv or .txt files
  5. Use a digital audio recorder vs. handwritten notes when necessary

Forensic Data

Data Files

What’s not there

Deleted files When a file is deleted, it is typically not erased from the media; instead, the information in the directory’s data structure that points to the location of the file is marked as deleted.

Slack Space If a file requires less space than the file allocation unit size, an entire file allocation unit is still reserved for the file.

Free Space Free space is the area on media that is not allocated to any partition, the free space may still contain pieces of data.

MAC data

It’s important to know as much information about relevant files as possible. Recording the modification, access, and creation times of files allows analysts to help establish a timeline of the incident.

  1. Modification Time
  2. Access Time
  3. Creation Time
Logical Backup Imaging
A logical data backup copies the directories and files of a logical volume. It does not capture other data that may be present on the media, such as deleted files or residual data stored in slack space. Generates a bit-for-bit copy of the original media, including free space and slack space. Bit stream images require more storage space and take longer to perform than logical backups.
Can be used on live systems if using a standard backup software If evidence is needed for legal or HR reasons, a full bit stream image should be taken, and all analysis done on the duplicate
May be resource intensive Disk-to-disk vs Disk-to-File
Should not be use on a live system since data is always chaning

Tools for Techniques

Many forensic products allow the analyst to perform a wide range of processes to analyze files and applications, as well as collecting files, reading disk images, and extracting data from files.

  • File Viewers
  • Uncompressing Files
  • GUI for Data Structure
  • Identifying Known Files
  • String Searches & Pattern Matches
  • Metadata

Operating System Data

“OS data exists in both non-volatile and volatile states. Non-volatile data refers to data that persists even after a computer is powered down, such as a filesystem stored on a hard drive. Volatile data refers to data on a live system that is lost after a computer is powered down, such as the current network connections to and from the system.”

Volatile Non-Volatile
Slack Space Configuration Files
Free Space Logs
Network configuration/connections Application files
Running processes Data Files
Open Files Swap Files
Login Sessions Dump Files
Operating System Time Hibernation Files
Temporary Files

Collection & Prioritization of Volatile Data

  1. Network Connections
  2. Login Sessions
  3. Contents of Memory
  4. Running Processes
  5. Open Files
  6. Network Configuration
  7. Operating System Time

Collecting Non-Volatile Data

  1. Consider Power-Down Options
  2. File System Data Collected
  3. Users and Groups
  4. Passwords
  5. Network Shares
  6. Logs

Logs

Other logs can be collected depending on the incident under analysis:

  • In case of a network hack: Collect logs of all the network devices lying in the route of the hacked devices and the perimeter router (ISP router). Firewall rule base may also be required in this case.
  • In case it is unauthorized access: Save the web server logs, application server logs, application logs, router or switch logs, firewall logs, database logs, IDS logs etc.
  • In case of a Trojan/Virus/Worm attack: Save the antivirus logs apart from the event logs (pertaining to the antivirus).

Windows

  • The file systems used by Windows include FAT, exFAT, NTFS, and ReFS.

    Investigators can search out evidence by analyzing the following important locations of the Windows:

  • Recycle Bin

  • Registry

  • Thumbs.db

  • Files

  • Browser History

  • Print Spooling

macOS

  • Mac OS X is the UNIX bases OS that contains a Mach 3 microkernel and a FreeBSD based subsystem. Its user interface is Apple like, whereas the underlying architecture is UNIX like.
  • Mac OS X offers novel techniques to create a forensic duplicate. To do so, the perpetrator’s computer should be placed into a “Target Disk Mode”. Using this mode, the forensic examiner creates a forensic duplicate of the perpetrator’s hard disk with the help of a FireWire cable connection between the two PCs.

Linux

Linux can provide an empirical evidence of if the Linux embedded machine is recovered from a crime scene. In this case, forensic investigators should analyze the following folders and directories.

  • /etc[%SystemRoot%/System32/config]
  • /var/log
  • /home/$USER
  • /etc/passwd

Application Data

OSs, files, and networks are all needed to support applications: OSs to run the applications, networks to send application data between systems, and files to store application data, configuration settings, and the logs. From a forensic perspective, applications bring together files, OSs, and networks. — NIST 800-86

Application Components

  • Config Settings
    • Configuration file
    • Runtime Options
    • Added to Source Code
  • Authentication
    • External Authentication
    • Proprietary Authentication
    • Pass-through authentication
    • Host/User Environment
  • Logs
    • Event
    • Audit
    • Error
    • Installation
    • Debugging
  • Data
    • Can live temporary in memory and/or permanently in files
    • File format may be generic or proprietary
    • Data may be stored in databases
    • Some applications create temp files during session or improper shutdown
  • Supporting Files
    • Documentation
    • Links
    • Graphics
  • App Architecture
    • Local
    • Client/Server
    • Peer-to-Peer

Types of Applications

Certain of application are more likely to be the focus of forensic analysis, including email, Web usage, interactive messaging, file-sharing, document usage, security applications, and data concealment tools.

Digital Forensics Digital Forensics

Email

“From end to end, information regarding a single email message may be recorded in several places – the sender’s system, each email server that handles the message, and the recipient’s system, as well as the antivirus, spam, and content filtering server.” — NIST 800-45

Web Usage

Web Data from Host Web Data from Server
Typically, the richest sources of information regarding web usage are the hosts running the web browsers. Another good source of web usage information is web servers, which typically keep logs of the requests they receive.
Favorite websites Timestamps
History w/timestamps of websites visited IP Addresses
Cached web data files Web browesr version
Cookies Type of request
Resource requested

Collecting the Application Data

Overview

Digital Forensics Digital Forensics

Network Data

“Analysts can use data from network traffic to reconstruct and analyze network-based attacks and inappropriate network usage, as well as to troubleshoot various types of operational problems. The term network traffic refers to computer network communications that are carried over wired or wireless networks between hosts.” — NIST 800-86

TCP/IP

Digital Forensics Digital Forensics

Sources of Network Data

These sources collectively capture important data from all four TCP/IP layers.

Digital Forensics Digital Forensics

Data Value

  • IDS Software
  • SEM Software
  • NFAT Software (Network Forensic Analysis Tool)
  • Firewall, Routers, Proxy Servers, & RAS
  • DHCP Server
  • Packet Sniffers
  • Network Monitoring
  • ISP Records

Attacker Identification

“When analyzing most attacks, identifying the attacker is not an immediate, primary concern: ensuring that the attack is stopped and recovering systems and data are the main interests.” — NIST 800-86

  1. Contact IP Address Owner: Can help identify who is responsible for an IP address, Usually an escalation.
  2. Send Network Traffic: Not recommended for organizations
  3. Application Content: Data packets could contain information about the attacker’s identity.
  4. Seek ISP Assistance: Requires court order and is only done to assist in the most serious of attacks.
  5. History of IP address: Can look for trends of suspicious activity.

Introduction to Scripting

Scripting Overview

History of Scripting

  • IBM’s Job Control Language (JCL) was the first scripting language.
  • Many batch jobs require setup, with specific requirements for main storage, and dedicated devices such as magnetic tapes, private disk volumes, and printers set up with special forms.
  • JCL was developed as a means of ensuring that all required resources are available before a job is scheduled to run.
  • The first interactive shell was developed in the 1960s.
  • Calvin Mooers in his TRAC language is generally credited with inventing command substitution, the ability to embed commands in scripts that when interpreted insert a character string into the script.
  • One innovation in the UNIX shells was the ability to send the output of one program into the input of another, making it possible to do complex tasks in one line of shell code.

Script Usage

  • Scripts have multiple uses, but automation is the name of the game.
  • Image rollovers
  • Validation
  • Backup
  • Testing

Scripting Concepts

  • Scripts
    • Small interpreted programs
    • Script can use functions, procedures, external calls, variables, etc.
  • Variables
  • Arguments/Parameters
    • Parameters are pre-established variables which will be used to perform the related process of our function.
  • If Statement
  • Loops
    • For Loop
    • While Loop
    • Until Loop

Scripting Languages

JavaScript

  • Object-oriented, developed in 1995 by Netscape communications.
  • Server or client side use, most popular use is client side.
  • Supports event-driven functional, and imperative programming styles. It has APIs for working with text, arrays, dates, regular expression, and the DOM, but the language itself doesn’t include any I/O, such as networking, storage, or graphics facilities. It relies upon the host environment in which it is embedded to provide these features.

Bash

  • UNIX shell and command language, written by Brian Fox for the GNU project as a free software replacement for the Bourne shell.
  • Released in 1989.
  • Default login shell for most Linux distros.
  • A command processor typically runs in a text window, but can also read and execute commands from a file.
  • POSIX compliant

Perl

  • Larry Wall began work on Perl in 1987.
  • Version 1.0 released on Dec 18, 1987.
  • Perl2 – 1988
  • Perl3 – 1989
  • Originally, the only documentation for Perl was a single lengthy man page.
  • Perl4 – 1991

PowerShell

  • Task automation and configuration management framework
  • Open-sourced and cross-platformed on 18 August 2016 with the introduction of PowerShell Core. The former is built on .NET Framework, while the latter on .NET Core.

Binary

Binary code represents text, computer processor instructions, or any other data using a two-symbol system. The two-symbol used is often “0” and “1” from the binary number system.

Adding a binary payload to a shell script could, for instance, be used to create a single file shell script that installs your entire software package, which could be composed of hundreds of files.

Hex

Advanced hex editors have scripting systems that let the user create macro like functionality as a sequence of user interface commands for automating common tasks. This can be used for providing scripts that automatically patch files (e.g., game cheating, modding, or product fixes provided by the community) or to write more complex/intelligent templates.

Python Scripting

Benefits of Using Python

  • Open Source
  • Easy to learn and implement
  • Portable
  • High level
  • Can be used for almost anything in cybersecurity
  • Extensive libraries

Python Libraries

Introduction to Scripting Introduction to Scripting

Subsections of Cyber Threat Intelligence

Threat Intelligence and Cybersecurity

Threat Intelligence Overview

“Cyber threat intelligence is information about threats and threat actors that helps mitigate harmful events in cyberspace.”

Cyber threat intelligence provides a number of benefits, including:

  • Empowers organizations to develop a proactive cybersecurity posture and to bolster overall risk management policies.
  • Drives momentum toward a cybersecurity posture that is predictive, not just reactive.
  • Enables improved detection of threats.
  • Informs better decision-making during and following the detection of a cyber intrusion.

Today’s security drivers

  • Breached records

  • Human Error

  • IOT innovation

  • Breach cost amplifiers

  • Skills gap

    Attackers break through conventional safeguards every day.

Threat Intelligence Threat Intelligence

Threat Intelligence Strategy and External Sources

Threat Intelligence Strategy Map:

Threat Intelligence Threat Intelligence

Sharing Threat Intelligence

“In practice, successful Threat Intelligence initiatives generate insights and actions that can help to inform the decisions – both tactical, and strategic – of multiple people and teams, throughout your organization.”

Threat Intelligence Strategy Map: From technical activities to business value:

  1. Level 1 Analyst
  2. Level 2/3 Analyst
  3. Operational Leaders
  4. Strategic Leaders

Intelligence Areas (CrowdStrike model)

Tactical: Focused on performing malware analysis and enrichment, as well as ingesting atomic, static, and behavioral threat indicators into defensive cybersecurity systems.

Stakeholders:

  • SOC Analyst
  • SIEM
  • Firewall
  • Endpoints
  • IDS/IPS

Operation: Focused on understanding adversarial capabilities, infrastructure, and TTPs, and then leveraging that understanding to conduct more targeted and prioritized cybersecurity operations.

Stakeholders:

  • Threat Hunter
  • SOC Analyst
  • Vulnerability Mgmt.
  • IR
  • Insider Threat

Strategic: Focused on understanding high level trends and adversarial motives, and then leveraging that understanding to engage in strategic security and business decision-making.

Stakeholders:

  • CISO
  • CIO
  • CTO
  • Executive Board
  • Strategic Intel

Threat Intelligence Threat Intelligence

Threat Intelligence Platforms

“Threat Intelligence Platforms is an emerging technology discipline that helps organizations aggregate, correlate, and analyze threat data from multiple sources in real time to support defensive actions.”

These are made up of several primary feature areas that allow organizations to implement an intelligence-driven security approach.

  1. Collect
  2. Correlate
  3. Enrichment and Contextualization
  4. Analyze
  5. Integrate
  6. Act

Platforms

Recorded Future

On top of Recorded Future’s already extensive threat intelligence to provide a complete solution. Use fusion to centralize data, to get the most holistic and relevant picture of your threat landscape.

Features include:

  • Centralize and Contextualize all sources of threat data.
  • Collaborate on analysis from a single source of truth.
  • Customize intelligence to increase relevance.

FireEye

Threat Intelligence Subscriptions Choose the level and depth of intelligence, integration and enablement your security program needs.

Subscriptions include:

  • Fusion Intelligence
  • Strategic Intelligence
  • Operation Intelligence
  • Vulnerability Intelligence
  • Cyber Physical Intelligence
  • Cyber Crime Intelligence
  • Cyber Espionage Intelligence

IBM X-Force Exchange

IBM X-Force Exchange is a cloud-based threat intelligence sharing platform enabling users to rapidly research the latest security threats, aggregate actionable intelligence and collaborate with peers. IBM X-Force Exchange is supported by human and machine-generated intelligence leveraging the scale of IBM X-Force.

  • Access and share threat data
  • Integrate with other solutions
  • Boost security operations

TruSTAR

It is an intelligence management platform that helps you operationalize data across tools and teams, helping you prioritize investigations and accelerate incident response.

  • Streamlined Workflow Integrations
  • Secure Access Control
  • Advanced Search
  • Automated Data ingest and Normalization

Threat Intelligence Frameworks

Getting Started with ATT&CK

Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) can be useful for any organization that wants to move toward a threat-informed defense.

Threat Intelligence Threat Intelligence

Level 2:

  1. Understand ATT&CK
  2. Find the behavior
  3. Research the behavior into a tactic
  4. Figure out what technique applies to the behavior
  5. Compare your results to other analyst

Cyber Threat Framework

Threat Intelligence Threat Intelligence

An integrated and intelligent security immune system

Threat Intelligence Threat Intelligence

Best practices: Intelligent detection

  1. Predict and prioritize security weaknesses
  • Gather threat intelligence information
  • Manage vulnerabilities and risks
  • Augment vulnerability scan data with context for optimized prioritization
  • Manage device configuration (firewalls, switches, routers, IPS/IDS)
  1. Detect deviations to identify malicious activity
  • Establish baseline behavior
  • Monitor and investigate anomalies
  • Monitor network flows
  1. React in real time to exploits
  • Correlate logs, events, network flows, identities, assets, vulnerabilities, and configurations, and add context
  • Use automated and cognitive solutions to make data actionable by existing staff

Security Intelligence

“The real-time collection, normalization, and analytics of the data generated by users, applications, and infrastructure that impacts the IT security and risk posture of an enterprise.”

Security Intelligence provides actionable and comprehensive insights for managing risks and threats from protection and detection through remediation.

Ask the right questions – The exploit timeline

Threat Intelligence Threat Intelligence

3 Pillars of Effective Threat Detection

  • See Everything
  • Automate Intelligence
  • Become Proactive

Security Effectiveness Reality

Threat Intelligence Threat Intelligence

Key Takeaways

Threat Intelligence Threat Intelligence

Data Loss Prevention and Mobile Endpoint Protection

What is Data Security and Protection?

Protecting the:

  • Confidentiality

  • Integrity

  • Availability

    Of Data:

  • In transit

  • At rest

    • Databases
    • Unstructured Data (files)
    • On endpoints

What are we protecting against?

Deliberate attack:

  • Hackers

  • Denial of Service

    Inadvertent attacks:

  • Operator error

  • Natural disaster

  • Component failure

Data Security Top Challenges

  • Explosive data growth
  • New privacy regulations (GDPR, Brazil’s LGPD etc.)
  • Operational complexity
  • Cybersecurity skills shortage

Data Security Common Pitfalls

Five epic fails in Data Security:

  • Failure to move beyond compliance
  • Failure to recognize the need for centralized data security
  • Failure to define who owns the responsibility for the data itself
  • Failure to address known vulnerabilities
  • Failure to prioritize and leverage data activity monitoring

Industry Specific Data Security Challenges

Healthcare

  • Process and store combination of personal health information and payment card data.
  • Subject to strict data privacy regulations such as HIPAA.
  • May also be subject to financial standards and regulations.
  • Highest cost per breach record.
  • Data security critical for both business and regulatory compliance.

Transportation

  • Critical part of national infrastructure
  • Combines financially sensitive information and personal identification
  • Relies on distributed IT infrastructure and third party vendors

Financial industries and insurance

  • Most targeted industry: 19% of cyberattacks in 2018
  • Strong financial motivation for both external and internal attacks
  • Numerous industry-specific regulations require complex compliance measures

Retail

  • Among the most highly targeted groups for data breaches
  • Large number of access points in retail data lifecycle
  • Customers and associates access and share sensitive data in physical outlets, online, mobile applications

Capabilities of Data Protection

The Top 12 critical data protection capabilities:

  1. Data Discovery
  • Where sensitive data resides
  • Cross-silo, centralized efforts
  1. Data Classification
  • Parse discovered data sources to determine the kind of data
  1. Vulnerability Assessment
  • Determine areas of weakness
  • Iterative process
  1. Data Risk analysis
  • Identify data sources with the greatest risk exposure or audit failure and help prioritize where to focus first
  • Build on classification and vulnerability assessment
  1. Data and file activity monitoring
  • Capture and record real-time data access activity
  • Centralized policies
  • Resource intensive
  1. Real-time Alerting
  2. Blocking Masking, and Quarantining
  • Obscure data and/or blocking further action by risky users when activities deviate from regular baseline or pre-defined policies
  • Provide only level of access to data necessary
  1. Active Analytics
  • Capture insight into key threats such as, SQL injections, malicious stored procedures, DoS, Data leakage, Account takeover, data tampering, schema tampering etc
  • Develop recommendations for actions to reduce risk
  1. Encryption
  2. Tokenization
  • A special type of format-preserving encryption that substitutes sensitive data with a token, which can be mapped to the original value
  1. Key Management
  • Securely distribute keys across complex encryption landscape
  • Centralize key management
  • Enable organized, secure key management that keeps data private and compliant
  1. Automated Compliance Report
  • Pre-built capabilities mapped to specific regulations such as GDPR, HIPAA, PCI-DSS, CCPA and so on
  • Includes:
    • Audit workflows to streamline approval processes
    • Out-of-the-box reports
    • Pre-built classification patterns for regulated data
    • Tamper-proof audit repository

Data Loss Prevention and Mobile Endpoint Protection Data Loss Prevention and Mobile Endpoint Protection

Data Protection – Industry Example

Guardium support the data protection journey

Data Loss Prevention and Mobile Endpoint Protection Data Loss Prevention and Mobile Endpoint Protection

Guardium – Data Security and Privacy

  • Protect all data against unauthorized access
  • Enable organizations to comply with government regulations and industry standards

Data Loss Prevention and Mobile Endpoint Protection Data Loss Prevention and Mobile Endpoint Protection

Data Loss Prevention and Mobile Endpoint Protection Data Loss Prevention and Mobile Endpoint Protection

Mobile Endpoint Protection

iOS

  • Developed by Apple

  • Launched in 2007

  • ~13% of devices (based on usage)

  • ~60% of tablets worldwide run iOS/iPadOS

  • MDM capabilities available since iOS 6

    Android

  • Android Inc. was a small team working on an alternative to Symbian and Windows Mobile OS.

  • Purchased by Google in 2005 – the Linux kernel became the base of the Android OS. Now developed primarily by Google and a consortium known as Open Handset Alliance.

  • First public release in 2008

  • ~86% of smartphones and ~39% of tablets run some form of Android.

  • MDM capabilities since Android 2.2.

How do mobile endpoints differ from traditional endpoints?

  • Users don’t interface directly with the OS.
  • A series of applications act as a broker between the user and the OS.
  • OS stability can be easily monitored, and any anomalies reported that present risk.
  • Antivirus software can “see” the apps that are installed on a device, and reach certain signatures, but can not peek inside at their contents.

Primary Threats To Mobile Endpoints

System based:

  • Jailbreaking and Rooting exploit vulnerabilities to provide root access to the system.

  • Systems that were previously read-only can be altered in malicious ways.

  • One primary function is to gain access to apps that are not approved or booting.

  • Vulnerabilities and exploits in the core code can open devices to remote attacks that provide root access.

    App based threats:

  • Phishing scams – via SMS or email

  • Malicious code

  • Apps may request access to hardware features irrelevant to their functionality

  • Web content in mobile browsers, especially those that prompt for app installations, can be the root cause of many attacks

    External:

  • Network based attacks

  • Tethering devices to external media can be exploited for vulnerabilities

  • Social engineering to unauthorized access to the device

Protection mobile assets

  • MDM: Control the content allowed on the devices, restrict access to potentially dangerous features.
  • App security: Report on the health and reliability of applications, oftentimes before they even make it on the devices.
  • User Training

Day-to-day operations

While it may seem like a lot to monitor hundreds, thousands, or hundreds of thousands of devices daily, much of the information can be digested by automated systems and action taken without much admin interactions.

Data Loss Prevention and Mobile Endpoint Protection Data Loss Prevention and Mobile Endpoint Protection

Scanning

Vulnerability Assessment Tools

“Vulnerability scanning identifies hosts and host attributes (e.g., OSs, applications, open ports), but it also attempts to identify vulnerabilities rather than relying on human interpretation of the scanning results. Vulnerability scanning can help identify outdated software versions, missing patches, and misconfigurations, and validate compliance with or deviation from an organization’s security policy.” — NIST SP 800-115

What is a Vulnerability Scanner?

Capabilities:

  • Keeping an up-to-date database of vulnerabilities.
  • Detection of genuine vulnerabilities without an excessive number of false positives.
  • Ability to conduct multiple scans at the same time.
  • Ability to perform trend analyses and create clear reports of the results.
  • Provide recommendations for effective countermeasures to eliminate discovered vulnerabilities.

Components of Vulnerability Scanners

There are 4 main components of most scanners:

  1. Engine Scanner
  • Performs security checks according to its installed plug-ins, identifying system information, and vulnerabilities.
  1. Report Module
  • Provides scan result reporting such as technical reports for system administrators, summary reports for security managers, and high-level graph and trend reports for corporate executives’ leadership.
  1. Database
  • Stores vulnerability information, scan results, and other data used by the scanner.
  1. User interface
  • Allows the admin to operate the scanner. It may be either a GUI, or just a CLI.

Host & Network

Internal Threats:

  • It can be through Malware or virus that is downloaded onto a network through internet or USB.

  • It can be a disgruntled employee who has the internal network access.

  • It can be through the outside attacker who has gained access to the internal network.

  • The internal scan is done by running the vulnerability scanner on the critical components of the network from a machine which is a part of the network. This important component may include core router, switches, workstations, web server, database, etc.

    External Threats:

  • The external scan is critical as it is required to detect the vulnerabilities to those internet facing assets through which an attacker can gain internal access.

Common Vulnerability Scoring Systems (CVSS)

The CVSS is a way of assigning severity rankings to computer system vulnerabilities, ranging from zero (least severe) to 10 (most severe).

  • It provides a standardized vulnerability score across the industry, helping critical information flow more effectively between sections within an organization and between organizations.
  • The formula for determining the score is public and freely distributed, providing transparency.
  • It helps prioritize risk — CVSS rankings provide both a general score and more specific metrics.

Scanning Scanning

Score Breakdown:

The CVSS score has three values for ranking a vulnerability:

  1. A base score, which gives an idea of how easy it is to exploit targeting that vulnerability could inflict.
  2. A temporal score, which ranks how aware people are of the vulnerability, what remedial steps are being taken, and whether threat actors are targeting it.
  3. An environmental score, which provides a more customized metric specific to an organization or work environment.

Scanning Scanning

STIGS – Security Technical Implementation Guides

  • The Defense Information Systems Agency (DISA) is the entity responsible for maintaining the security posture of the DoD IT infrastructure.
  • Default configurations for many applications are inadequate in terms of security, and therefore DISA felt that developing a security standard for these applications would allow various DoD agencies to utilize the same standard – or STIG – across all application instances that exist.
  • STIGs exist for a variety of software packages including OSs, DBAs, OSS, Network devices, Wireless devices, Virtual software, and, as the list continues to grow, now even include Mobile Operating Systems.

Center for Internet Security (CIS)

Benchmarks:

  • CIS benchmarks are the only consensus-based, best-practice security configuration guides both developed and accepted by government, business, industry, and academia.

  • The initial benchmark development process defines the scope of the benchmark and begins the discussion, creation, and testing process of working drafts. Using the CIS WorkBench community website, discussion threads are established to continue dialogue until a consensus has been reached on proposed recommendations and the working drafts. Once consensus has been reached in the CIS Benchmark community, the final benchmark is published and released online.

    Controls: The CIS ControlsTM are a prioritized set of actions that collectively form a defense-in-depth set of best practices that mitigate the most common attacks against systems and networks. The CIS Controls are developed by a community of IT experts who apply their first-hand experience as cyber defenders to create these globally accepted security best practices.

    The five critical tenets of an effective cyber defense systems as reflected in the CIS Controls are:

    1. Offense informs defense
    2. Prioritization
    3. Measurements and metrics
    4. Continuous diagnostics and mitigation
    5. Automation

Implementation Groups

Scanning Scanning

20 CIS Controls

Scanning Scanning

Port Scanning

“Network port and service identification involves using a port scanner to identify network ports and services operating on active hosts–such as FTP and HTTP–and the application that is running each identified service, such as Microsoft Internet Information Server (IIS) or Apache for the HTTP service. All basic scanners can identify active hosts and open ports, but some scanners are also able to provide additional information on the scanned hosts.” —NIST SP 800-115

Ports

  • Managed by IANA.

Responses

  • A port scanner is a simple computer program that checks all of those doors – which we will start calling ports – and responds with one of three possible responses:
    1. Open — Accepted
    2. Close — Not Listening
    3. Filtered — Dropped, Blocked

Types of Scans

Port scanning is a method of determining which ports on a network are open and could be receiving or sending data. It is also a process for sending packets to specific ports on a host and analyzing responses to identify vulnerabilities.

  1. Ping:
  • Simplest port scan sending ICMP echo request to see who is responding
  1. TCP/Half Open:
  • A popular, deceptive scan also known as SYN scan. It notes the connection and leaves the target hanging.
  1. TCP Connect:
  • Takes a step further than half open by completing the TCP connection. This makes it slower and noisier than half open.
  1. UDP:
  • When you run a UDP port scan, you send either an empty packet or a packet that has a different payload per port, and will only get a response if the port is closed. It’s faster than TCP, but doesn’t contain as much data.
  1. Stealth:
  • These TCP scans are quieter than the other options and can get past firewalls. They will still get picked by the most recent IDS.

Tools – NMAP

NMAP (Network Mapper) is an open source tool for network exploration and security auditing.

  • Design to rapidly scan large networks, though work fine against single hosts.
  • Uses raw IP packets.
  • Used to know, service type, OS type and version, type of packet filter/firewall in use, and many other things.
  • Also, useful for network inventory, managing service upgrade schedules, and monitoring host or service uptime.
  • ZenMap is a GUI version of NMAP.

Network Protocol Analyzers

“A protocol analyzer (also known as a sniffer, packet analyzer, network analyzer, or traffic analyzer) can capture data in transit for the purpose of analysis and review. Sniffers allow an attacker to inject themselves in a conversation between a digital source and destination in hopes of capturing useful data.”

Sniffers

Sniffers operate at the data link layer of the OSI model, which means they don’t have to play by the same rules as the applications and services that reside further up the stack. Sniffers can capture everything on the wire and record it for later review. They allow user’s to see all the data contained in the packet.

  • Wireshark

Scanning Scanning

WireShark

Wireshark intercepts traffics and converts that binary traffic into human-readable format. This makes it easy to identify what traffic is crossing your network, how much of it, how frequently, how much latency there is between certain hops, and so on.

  • Network Admins use it to troubleshoot network problems.
  • Network Security Engineers use it to examine security issues.
  • QA engineers use it to verify network applications.
  • Developers use it to debug protocol implementations.
  • People use it to learn network protocol internals.
WireShark Features
  • Deep inspection of hundred of protocols, with more being added all the time
  • Live capture and offline analysis
  • Standard three pane packet browser
  • Cross-platform
  • GUI or TTY-mode – TShark utility
  • Powerful display filters
  • Rich VoIP analysis
  • Read/write to different formats
  • Capture compressed file with gzip
  • Live data from any source
  • Decryption support for many protocols
  • Coloring rules
  • Output can be exported to different formats

Packet Capture (PCAP)

PCAP is a valuable resource for file analysis and to monitor network traffic.

  • Monitoring bandwidth usage

  • Identify rogue DHCP servers

  • Detecting Malware

  • DNS resolution

  • Incident Response

    Wireshark is the most popular traffic analyzer in the world. Wireshark uses .pcap files to record packet data that has been pulled from a network scan. Packet data is recorded in files with the .pcap file extension and can be used to find performance issues and cyberattacks on the network.

Scanning Scanning

Security Architecture considerations

Characteristics of a Security Architecture

The foundation of robust security is a clearly communicated structure with a systematic analysis of the threats and controls.

  • Build with a clearly communicated structure

  • Use systematic analysis of threats and controls

    As IT systems increase in complexity, they require a standard set of techniques, tools, and communications.

    Architectural thinking is about creating and communicating good structure and behavior with the intent of avoiding chaos.

    Architecture need to be:

  • Described before it can be created

  • With different level of elaboration for communication

  • Include a solution for implementation and operations

  • That is affordable

  • And is secure

Architecture: “The architecture of a system describes its overall static structure and dynamic behavior. It models the system’s elements (which for IT systems are software, hardware and its human users), the externally manifested properties of those elements, and the static and dynamic relationships among them.”

ISO/IEC 422010:20071 defines Architecture as “the fundamental organization of a system, embodied in its components, their relationships to each other and the environment, and the principles governing its design and evolution.”

High-level Architectural Models

Enterprise and Solution Architecture break down the problem, providing different levels of abstraction.

Scanning Scanning

High-level architectures are described through Architectural Building Blocks (ABBs) and Solution Building Blocks (SBBs).

Scanning Scanning

Here are some example Security ABBs and SBBs providing different levels of abstraction aimed at a different audience.

Scanning Scanning

Here is a high level example of an Enterprise Security Architecture for hybrid multicloud showing security domains.

Scanning Scanning

The Enterprise Security Architecture domains could be decomposed to show security capabilities… without a context.

Scanning Scanning

Adding context gives us a next level Enterprise Architecture for hybrid multi-cloud, but without specific implementation.

Scanning Scanning

Solution Architecture

Additional levels of abstraction are used to describe architectures down to the physical operational aspects.

Scanning Scanning

Start with a solution architecture with an Architecture Overview giving an overview of the system being developed.

Scanning Scanning

Continue by clearly defining the external context describing the boundary, actors and use that process data.

Scanning Scanning

Examine the system internally looking at the functional components and examine the threats to the data flows.

Scanning Scanning

Finally, look at where the function is hosted, the security zones and the specific protection required to protect data.

Scanning Scanning

As the architecture is elaborated, define what is required and how it will be delivered?

Scanning Scanning

Security Patterns

The use of security architecture patterns accelerate the creation of a solution architecture.

A security Architecture pattern is

  • a reusable solution to a commonly occurring problem
  • it is a description or template for how to solve a problem that can be used in many different situations
  • is not a finished design as it needs conext
  • it can be represented in many different formats
  • Vendor specific or agnostic
  • Available at all levels of abstraction

Scanning Scanning

There are many security architecture patterns available to provide a good starting point to accelerate development.

Application Security Techniques and Risks

Application Security Overview

Scanning Scanning

Software Development Lifecycle

Scanning Scanning

Penetration Testing Tools

Scanning Scanning

Source Code Analysis Tools

Scanning Scanning

Application Security Threats and Attacks

Third Party Software

  • Standards

  • Patching

  • Testing

    Supplier Risk Assessment

  • Identify how any risks would impact your organization’s business. It could be a financial, operational or strategic risk.

  • Next step would be to determine the likelihood the risk would interrupt the business

  • And finally there is a need to identify how the risk would impact the business.

Web Application Firewall (WAF)

Scanning Scanning

Application Threats/Attacks

Input Validation:

  • Buffer overflow

  • Cross-site scripting

  • SQL injection

  • Canonicalization

    Authentication:

  • Network eavesdropping

  • Brute force attack

  • Dictionary attacks

  • Cookie replay

  • Credential theft

    Authorization:

  • Elevation of privilege

  • Disclosure of confidential data

  • Data tampering

  • Luring Attacks

    Configuration Management:

  • Unauthorized access to admin interface

  • Unauthorized access to configuration stores

  • Retrieval of clear text configuration data

  • Lack of individual accountability; over-privileged process and service accounts

    Exception Management:

  • Information disclosure

  • DoS

    Auditing and logging:

  • User denies performing an operation

  • Attacker exploits an application without trace

  • Attacker covers his tracks

Application Security Standards and Regulations

Threat Modeling

“Threat modeling is a process by which potential threats, such as structural vulnerabilities or the absence of appropriate safeguards, can be identified, enumerated, and mitigations can be prioritized.”

Conceptually, a threat modeling practice flows from a methodology.

  1. STRIDE methodology: STRIDE is a methodology developed by Microsoft for threat modeling. It provides a mnemonic for security threats in six categories: Spoofing, Tampering, Repudiation, Information disclosure, Denial of service and Elevation of privilege.
  • Microsoft developed it
  1. P.A.S.T.A: P.A.S.T.A. stands for Process for Attack Simulation and Threat Analysis. It is an attacker-focused methodology that uses a seven-step process to identify and analyze potential threats.
  • Seven-step process
  1. VAST: VAST is an acronym for Visual, Agile, and Simple Threat modeling. The methodology provides actionable outputs for the unique needs of various stakeholders like application architects and developers.
  2. Trike: Trike threat modeling is an open-source threat modeling methodology focused on satisfying the security auditing process from a cyber risk management perspective. It provides a risk-based approach with unique implementation and risk modeling process.

Standards vs Regulations

Standards Regulations
Cert Secure Coding
Common Weakness Enumeration (CWE) Gramm-Leach-Bliley Act
DISA-STIG HIPAA
ISO 27034/24772 Sarbanes-Oxley Act (SOX)
PCI-DSS
NIST 800-53

DevSecOps Overview

Why this matter?

Scanning Scanning

  • Emerging DevOps teams lead to conflicting objectives.

  • DevSecOps is an integrated, automated, continuous security; always.

    Integrating Security with DevOps to create DevSecOps.

Scanning Scanning

What does DevSecOps look like?

Scanning Scanning

  • Define your operating and governance model early.
  • A successful program starts with the people & culture.
    • Training and Awareness
    • Explain and embrace new ways of working
    • Equip teams & individuals with the right level of ownership & tools
  • Continuous improvement and feedback.

Develop Securely: Plan A security-first approach

Use tools and techniques to ensure security is integral to the design, development, and operation of all systems.

Enable empowerment and ownership by the Accreditor/Risk owner participating in Plan & Design activities.

Security Coach role to drive security integration.

Scanning Scanning

Scanning Scanning

Develop Security: Code & Build Security & Development combined

Apply the model to Everything-as-Code:

  • Containers
  • Apps
  • Platforms
  • Machines
  • Shift security to the left and embrace security-as-code.
  • Security Engineer to drive technical integration and uplift team security knowledge.

Scanning Scanning

Develop Securely: Code & Build

Detect issues and fix them, earlier in the lifecycle

Scanning Scanning

Develop Securely: Test

Security and development Combined

Scanning Scanning

Validate apps are secure before release & development.

Scanning Scanning

DevSecOps Deployment

Secure Operations: Release, Deploy & Decom

  • Orchestrate everything and include security.
  • Manage secure creation and destruction of your workloads.
  • Automate sign-off to certified levels of data destruction.

Controlled creation & destruction

Scanning Scanning

Create securely, destroy securely, every time.

Scanning Scanning

Secure Operations: Operate & Monitor

  • If you don’t detect it, you can’t fix it.

  • Integrated operational security helps ensure the security health of the system is as good as it can be with the latest information.

  • Playbooks-as-code run automatically, as issues are detected they are remediated and reported on.

    Security & Operations combined

Scanning Scanning

It’s not a question of if you get hacked, but when.

Scanning Scanning

So, why DevSecOps?

Scanning Scanning

Deep Dive into Cross-Site Scripting

Application Security Defects – Writing Secure Code

What, Should I worry?

Scanning Scanning

Issues Types

  • Majority of security products have Web UIs: LMIs, Administrative Interfaces, Dashboards.
  • Web vulnerabilities most commonly reported by 3rd parties as well as internal pen-testers, with XSS far in the lead.
  • Crypto vulnerabilities come next.
  • Appliances highly susceptible to command execution vulnerabilities.

Writing Secure Software is Not Easy

  • Developers face many challenges:

Scanning Scanning

  • Yet with good security education, and solid design and implementation practices, we can make sure our products are secure.

Mitigating Product Security Risk

  • Prevent new bugs
    • SANS 25 most dangerous programming errors.
  • Think like a hacker.
  • Build defenses in your software.
    • Input Validation
    • Output Sanitization
    • Strong encryption
    • Strong Authentication & Authorization
  • Choose secure frameworks rather than simply rely on developer security skills.
  • Don’t think that if your product is isolated from the Internet, it isn’t at risk.
  • Don’t think that if a file or database is local, it doesn’t need to be protected. The majority of breaches are launched from INSIDE.
  • Address existing bugs.
    • Redesign for not only looks, but for security and functionality.
    • Implement smart architectural changes that fix security flaws at the top.
    • Don’t spot-fix issues, think of how the vulnerability can be fixed across the board and prevented in the future.
    • Security bugs are special. (Need to be fixed asap)
      • Deliver security patches with faster release vehicles.

Cross scripting – Common Attacks

Cross-Site Scripting (XSS)

  • Allows attackers to inject client-side scripts into the Web Page
  • Can come from anywhere:
    • HTTP parameters
    • HTTP headers and cookies
    • Data in JSON and XML files
    • Database
    • Files uploaded by users
  • Most common security issues found in many security products.

Dangers of XSS

  • Harvest credentials
  • Take over user sessions
  • CSFR
  • Steal cookies, local store data
  • Elevate privileges
  • Redirect users to malicious sites

Cross-site Scripting – Effective Defenses

  • Preventing XSS with HTML Encoding
    • Enforcing the charset (UTF-8)
  • Preventing XSS with JS Escaping
    • Escaping single quotes will prevent injection
    • Preventing XSS by using safe DOM elements
    • Use Eval and Dynamic Code Generation with Care
  • Input Validation
    • Whitelisting – recommended
    • Blacklisting – not recommended
    • Client Side input validation – not recommended
    • Use proven Validation and Encoding Functionality

SIEM Platforms

SIEM Concepts, Benefits, Optimization, & Capabilities

“At its core, System Information Event Management (SIEM) is a data aggregator, search and reporting system. SIEM gathers immense amounts of data from your entire networked environment, consolidates and makes that data human accessible. With the data categorized and laid out at your fingertips, you can research data security breaches with as much detail as needed.”

Key Terms:

  • Log collection
  • Normalization
  • Correlation
  • Aggregation
  • Reporting

SIEM

  1. A SIEM system collects logs and other security-related documentation for analysis.
  2. The core function to manage network security by monitoring flows and events.
  3. It consolidates log events and network flow data from thousands of devices, endpoints, and applications distributed throughout a network. It then uses an advanced Sense Analytics engine to normalize and correlate this data and identifies security offenses requiring investigation.
  4. A SIEM system can be rules-based or employ a statistical correlation between event log entries.
  5. Capture log event and network flow data in near real time and apply advanced analytics to reveal security offenses.
  6. It can be available on premises and in a cloud environment.

Events & Flows

Events Flows
Typically is a log of a specific action such as a user login, or a FW permit, occurs at a specific time and the event is logged at that time A flow is a record of network activity between two hosts that can last for seconds to days depending on the activity within the session.
For example, a web request might download multiple files such as images, ads, video, and last for 5 to 10 seconds, or a user who watches a NetFlix movie might be in a network session that lasts up to a few hours.

Data Collection

  • It is the process of collecting flows and logs from different sources into a common repository.

  • It can be performed by sending data directly into the SIEM or an external device can collect log data from the source and move it into the SIEM system on demand or scheduled.

    To consider:

  • Capture

  • Memory

  • Storage capacity

  • License

  • Number of sources

Normalization

  • The normalization process involves turning raw data into a format that has fields such as IP address that SIEM can use.
  • Normalization involves parsing raw event data and preparing the data to display readable information.
  • Normalization allows for predictable and consistent storage for all records, and indexes these records for fast searching and sorting.

License Throttling

  • Monitors the number of incoming events to the system to manage input queues and EPS licensing.

Coalescing

  • Events are parsed and then coalesced based on common attributes across events. In QRadar, Event coalescing starts after three events have been found with matching properties within a 10-second period.
  • Event data received by QRadar is processed into normalized fields, along with the original payload. When coalescing is enabled, the following five properties are evaluated.
    • QID
    • Source IP
    • Destination IP
    • Destination port
    • Username

SIEM Platforms SIEM Platforms

SIEM Deployment

SIEM Deployment Considerations

  • Compliance

  • Cost-benefit

  • Cybersecurity

    QRadar Deployment Examples

SIEM Platforms SIEM Platforms

Events

Event Collector:

  • The event collector collects events from local and remote log sources, and normalize raw log source events to format them for use by QRadar. The Event Collector bundles or coalesces identical events to conserve system usage and send the data to the Event Processor.

  • The Event Collector can use bandwidth limiters and schedules to send events to the Event Processor to overcome WAN limitations such as intermittent connectivity.

    Event Processor:

  • The Event Processor processes events that are collected from one or more Event Collector components.

  • Processes events by using the Custom Rules Engine (CRE).

Flows

Flow Collector:

  • The flow collector generates flow data from raw packets that are collected from monitor ports such as SPANS, TAPS, and monitor sessions, or from external flow sources such as netflow, sflow, jflow.

  • This data is then converted to QRadar flow format and sent down the pipeline for processing.

    Flow Processor:

  • Flow deduplication: is a process that removes duplicate flows when multiple Flow Collectors provide data to Flow Processors appliances.

  • Asymmetric recombination: Responsible for combining two sides of each flow when data is provided asymmetrically. This process can recognize flows from each side and combine them in to one record. However, sometimes only one side of the flow exists.

  • License throttling: Monitors the number of incoming flows to the system to manage input queues and licensing.

  • Forwarding: Applies routing rules for the system, such as sending flow data to offsite targets, external Syslog systems, JSON systems, other SIEMs.

Reasons to add event or flow collectors to an All-in-One deployment

  • Your data collection requirements exceed the collection capability of your processor.
  • You must collect events and flows at a different location than where your processor is installed.
  • You are monitoring packet-based flow sources.
  • As your deployment grows, the workload exceeds the processing capacity of the All-in-One appliance.
  • Your security operations center employs more analytics who do more concurrent searches.
  • The types of monitored data, and the retention period for that data, increases, which increases processing and storage requirements.
  • As your security analyst team grows, you require better search performance.

Security Operations Center (SOC)

Triad of Security Operations: People, Process and Technology.

SIEM Platforms SIEM Platforms

SOC Data Collection

SIEM Platforms SIEM Platforms

SIEM Solutions – Vendors

“The security information and event management (SIEM) market is defined by customers’ need to analyze security event data in real-time, which supports the early detection of attacks and breaches. SIEM systems collect, store, investigate, support mitigation and report on security data for incident response, forensics and regulatory compliance. The vendors included in this Magic Quadrant have products designed for this purpose, which they actively market and sell to the security buying center.”

Deployments

Small: Gartner defines a small deployment as one with around 300 log sources and 1500 EPS.

Medium: A midsize deployment is considered to have up to 1000 log sources and 7000 EPS.

Large: A large deployment generally covers more than 1000 log sources with approximately 15000 EPS.

Important Concepts

SIEM Platforms SIEM Platforms

SIEM Platforms SIEM Platforms

IBM QRadar

SIEM Platforms SIEM Platforms

IBM QRadar Components

SIEM Platforms SIEM Platforms

ArcSight ESM

SIEM Platforms SIEM Platforms

Splunk

SIEM Platforms SIEM Platforms

Friendly Representation

SIEM Platforms SIEM Platforms

LogRythm’s Security Intelligence Platform

SIEM Platforms SIEM Platforms

User Behavior Analytics

Security Ecosystem

  • Detecting insider threats requires a 360 degree view of both logs and flows.

SIEM Platforms SIEM Platforms

Advantages of an integrated UBA Solution

  • Complete visibility across end point, network and cloud infrastructure with both log and flow data.

  • Avoids reloading and curating data faster time to insights, lowers opex, frees valuable resources.

  • Out-of-the-box analytics models that leverage and extend the security operations platform.

  • Single Security operation processes with integration of workflow system and other security solutions.

  • Easily extend to third-party analytic models, including existing insider threats use cases already implemented.

  • Leverage UBA insights in other integrated security analytics solutions.

  • Get more from your QRadar ecosystem.

    IBM QRadar UBA

    160+ rules and ML driven use cases addressing 3 major insider threat vectors:

    1. Compromised or Stolen Credentials
    2. Careless or Malicious Insiders
    3. Malware takeover of user accounts

    Detecting Compromised Credentials

  • 70% of phishing attacks are to steal credentials.

  • 81% of breaches are with stolen credentials.

  • $4M average cost of a data breach.

SIEM Platforms SIEM Platforms

Malicious behavior comes in many forms

SIEM Platforms SIEM Platforms

Maturing into User Behavioral Analytics

SIEM Platforms SIEM Platforms

QRadar UBA delivers value to the SOC

SIEM Platforms SIEM Platforms

AI and SIEM

Your goals as a security operations team are fundamental to your business.

SIEM Platforms SIEM Platforms

Pressures today make it difficult to achieve your business goals.

SIEM Platforms SIEM Platforms

Challenge #1: Unaddressed threats

SIEM Platforms SIEM Platforms

Challenge #2: Insights Overload

SIEM Platforms SIEM Platforms

Challenge #3: Dwell times are getting worse

Lack of consistent, high-quality and context-rich investigations lead to a breakdown of existing processes and high probability of missing crucial insights – exposing your organization to risk.

Challenge #4: Lack of cybersecurity talent and job fatigue

  • Overworked
  • Understaffed
  • Overwhelmed

Investigating an Incident without AI:

SIEM Platforms SIEM Platforms

Unlock a new partnership between analysts and their technology:

SIEM Platforms SIEM Platforms

AI and SIEM – An industry Example

QRadar Advisor with Watson: Built with AI for the front-line Security Analyst.

QRadar Advisor empowers security analysts to drive consistent investigations and make quicker and more decisive incident escalations, resulting in reduced dwell times, and increased analyst efficiency.

Benefits of adopting QRadar Advisor:

SIEM Platforms SIEM Platforms

How it works – An app that takes QRadar to the next level:

SIEM Platforms SIEM Platforms

How it works – Building the knowledge (internal and external)

SIEM Platforms SIEM Platforms

How it works – Aligning incidents to the ATT&CK chain:

SIEM Platforms SIEM Platforms

How it works – Cross-investigation analytics

SIEM Platforms SIEM Platforms

How it works – Using analyst feedback to drive better decisions

SIEM Platforms SIEM Platforms

How it works – QRadar Assistant

SIEM Platforms SIEM Platforms

Threat Hunting Overview

Fight and Mitigate Upcoming Future Attacks with Cyber Threat Hunting

  • Cybercrime will/has transform/ed the role of Citizens, Business, Government, law enforcement ad the nature of our 21st Century way of life.

  • We depend more than ever on cyberspace.

  • A massive interference with global trade, travel, communications, and access to databases caused by a worldwide internet crash would create an unprecedented challenge.

    The Challenges:

Threat Hunting Threat Hunting

The Rise of Advanced Threats

  • Highly resourced bad guys

  • High sophisticated

  • Can evade detection from rule and policy based defenses

  • Dwell in the network

  • Can cause the most damage

    The threat surface includes:

  • Targeted ‘act of war’ & terrorism

  • Indirect criminal activities designed for mass disruption

  • Targeted data theft

  • Espionage

  • Hacktivists

    Countermeasures challenges include:

  • Outdated security platforms

  • Increasing levels of cybercrime

  • Limited marketplace skills

  • Increased Citizen expectations

  • Continuous and ever-increasing attack sophistication

  • Lack of real-time correlated Cyber intelligence

SOC Challenges

Threat Hunting Threat Hunting

Threat Hunting Threat Hunting

SOC Cyber Threat Hunting

  • Intelligence-led Cognitive SOC Proactive Cyber Threat Hunting

Threat Hunting Threat Hunting

Threat Hunting Threat Hunting

What is Cyber Threat Hunting

The act of proactively and aggressively identifying, intercepting, tracking, investigating, and eliminating cyber adversaries as early as possible in the Cyber Kill Chain.

The earlier you locate and track your adversaries Tactics, Techniques, and Procedures (TTPs) the less impact these adversaries will have on your business.

Multidimensional Trade craft: What is the primary objective of cyber threat hunting?

Threat Hunting Threat Hunting

Know Your Enemy: Cyber Kill Chain

Threat Hunting Threat Hunting

The art and Science of threat hunting.

Threat Hunting Threat Hunting

Advance Your SOC:

Threat Hunting Threat Hunting

Cyber Threat Hunting – An Industry Example

Cyber threat hunting team center:

Threat Hunting Threat Hunting

Build a Cyber Threat Hunting Team:

Threat Hunting Threat Hunting

Six Key Use Cases and Examples of Enterprise Intelligence:

Threat Hunting Threat Hunting

i2 Threat Hunting Use Cases:

Threat Hunting Threat Hunting

Detect, Disrupt and Defeat Advanced Threats

Threat Hunting Threat Hunting

Know Your Enemy with i2 cyber threat analysis:

Threat Hunting Threat Hunting

Intelligence Concepts are a Spectrum of Value:

Threat Hunting Threat Hunting

i2 Cyber Users:

Threat Hunting Threat Hunting

Cybersecurity Capstone: Breach Response Case Studies

Disclaimer: Expand me…

Dear Stranger;

I would like to thank you for taking an interest in my project, which I have shared on GitHub as a part of my specialization course. While I am happy to share my work with others, I would like to emphasize that this project is the result of my own hard work and effort, and I would like it to be used solely for the purpose of reference and inspiration.

Therefore, I strongly advise against any unethical use of my project, such as submitting it as your own work or copying parts of it to gain easy grades. Plagiarism is a serious offense that can result in severe consequences, including academic penalties and legal action.

I would like to remind you that the purpose of sharing my project is to showcase my skills and knowledge in a specific subject area. I encourage you to use it as a reference to understand the concepts and techniques used, but not to copy it verbatim or use it in any unethical manner.

In conclusion, I ask you to respect my work and use it ethically. Please do not plagiarize or copy my project, but rather use it as a source of inspiration to create your own unique and original work.

Thank you for your understanding and cooperation.

Best regards,

AbuTurab

Case Study:

Stolen Credentials/3rd Party Software/2FA Fatigue

LastPass Data Breach 2022

Download the Presentation

UOM Cybersecurity Specialization

Cybersecurity Specialization is an advanced course offered by University of Maryland. It dives deep into the core topics related to software security, cryptography, hardware etc.

Info

My progress in this specialization came to a halt after completing the first course, primarily because the subsequent courses were highly advanced and required background knowledge that I lacked. I will resume my journey once I feel confident in possessing the necessary expertise to tackle those courses.

1. Usable Security

This course is all about principles of Human Computer Interaction, designing secure systems, doing usability studies to evaluate the most efficient security model and much more…

This course contain 6 modules…

Subsections of Cybersecurity Specialization

Usable Security

This course contain 6 modules…

  1. Fundamentals of Human-Computer Interaction: users, usability, tasks, and cognitive models
  2. Design: design methodology, prototyping, cybersecurity case study
  3. Evaluation: usability studies, A/B testing, quantitative and qualitative evaluation, cybersecurity case study
  4. Strategies for Secure Interaction Design: authority, guidelines for interface design
  5. Usable Authentication: authentication mechanisms, biometrics, two-factor authentication
  6. Usable Privacy: privacy settings, personal data sharing, data inference

Subsections of Usable Security

Fundamentals of Human-Computer Interaction: users, usability, tasks, and cognitive models

What is Human Computer Interaction?

“HCI is a study of how humans interact with the computers.”

  • It is important to keep in mind how humans interact with the machines.
  • Cybersecurity experts, designers etc. should always consider HCI element as the major proponent for design and security infrastructure.
  • HCI involves knowing the users, tasks, context of the tasks.
  • Evaluation of how easy/difficult it is to use the system.

Usability

“It is a measure of how easy it is to use a system for a user.”

Measuring Usability

  • Speed
    • How quickly can the task be accomplished.
  • Efficiency
    • How many mistakes are made in accomplishing the task.
  • Learnability
    • How easy is it to learn to use the system.
  • Memorability
    • Once learned, how easy is it to remember how to use the system.
  • User Preference
    • What do users like?

How do we measure Usability?

  • Speed – timing
  • Efficiency – counting error
  • Learnability, Memorability and User Preference don’t have straight forward measurement tools.

Tasks and Task analysis

“Tasks are goals that users have when interacting with the system.”

Common errors in task creation

  • Leading or too descriptive

    Click on the username box at the upper right of the screen and enter your username, then click on the password box underneath and enter your password. Click submit…

  • Specific questions?

    What is the third headline on CNN.com?

  • Directing users towards things you want to tell them, not what they want to know.

    What are the names of the members of the website security team?

Chunking Information

“Breaking a long list of pieces of information into smaller groups.” “Aggregating several pieces of information into coherent groups to make them easier to remember.”

  • When designing systems, the most important thing to consider is human memory, as it is very volatile.
  • Working memory’s limitations should be kept in mind.
  • For design technology products, we should not expect user to remember more than 3 things at a time in his/her working memory.

Mental Models

Number of factors affecting mental models;

  • Affordance
    • Mapping

      Mapping a Stove Design Mapping a Stove Design

    • Visibility

      Visibility: A search Engine Visibility: A search Engine

    • Feedback

      The user sees some visual change when they click a button.

    • Constraints

      A user should not be allowed to perform a task until certain conditions are met.

    • Conventions

      There are some conventions in place, for cross culture usability.

Design: design methodology, prototyping, cybersecurity case study

Intro to Design

  • Have the insight of the users who are they.
  • To include children or not.
  • Testing your design with users.
  • Involving the users from the very start of your design.
  • What other people are doing in your niche, and you should probably design something similar for familiarity reasons of mental models
  • Define your goal, is it an innovative idea, or something already existing but adding a value over it.
  • Don’t wait until your product is finished, take input from the users from the very first stage of design.

Design Methodologies

Design Process

The Golden rule is;

  • Know Your User.
  • Where do ideas come from?
  • Many processes;
    • Iterative design

      Iterative Design Process Iterative Design Process

  • System centered design

    • What can be built easily on this platform?
    • What can I create from the available tools?
    • What do I as a programmer find interesting to work on?
  • User centered design

    • Design is based upon a user’s
      • Abilities and real needs
      • Context
      • Work
      • Tasks
  • Participatory design

    • Problem
      • intuitions wrong
      • interviews etc. not precise
      • designer cannot know the user sufficiently well to answer all issues that come up during the design
    • Solution
      • designers should have access to a pool of representative users. That is, END users, not their managers or union reps!
  • Designer centered design

“It’s not the consumers’ job to know what they want.”

— Steve Jobs

Case Study: SSL Warnings – example user

  • User knows something bad is happening, but not what.
    • User has good general strategies (worry more about sites with sensitive info)
    • Error message relies on a lot of information users don’t understand

Evaluation: usability studies, A/B testing, quantitative and qualitative evaluation, cybersecurity case study

Quantitative Evaluation

Cognitive Walkthrough

Requirements;

  • Description or prototype of interface
  • Task Description
  • List of actions to complete task
  • Use background

What you look for; (A mobile Gesture prototype)

  • Will users know to perform the action?
  • Will users see the control
  • Will users know the control does what they want?
  • Will users understand the feedback?

Heuristic Analysis

  • Follow ‘rules of thumb’ or suggestions about good design.
  • Can be done by experts/designers, fast and easy.
  • May miss problems users would catch.

Nielsen’s Heuristics

  • Simple and natural dialog
  • Speak the users’ language
  • Minimize user memory load
  • Consistency
  • Feedback
  • Clearly marked exits
  • Shortcuts
  • Prevent errors
  • Good error messages
  • Providing help and documentation

Personas

  • A fictitious user representing a class of users
  • Reference point for design and analysis
  • Has a goal or goals they want to accomplish (in general or in the system)

Running Controlled Experiments

  • State a lucid, testable hypothesis.
  • Identify independent and dependent variables
  • Design the experimental protocol
  • Choose the user population
  • Run some pilot participants
  • Fix the experimental protocol
  • Run the experiment
  • Perform statistical analysis
  • Draw conclusion
  • Communicate results

Analysis

  • Statistical comparison (e.g., t-test)
  • Report results

Usability Studies

Testing Usability of Security

  • Security is rarely the task users set out to accomplish.
  • Good Security is a seamless part of the task.

Usability Study Process

  • Define tasks (and their importance)
  • Develop Questionnaires

Selecting Tasks

  • What are the most important things a user would do with this interface?
  • Present it as a task not a question
  • Be specific
  • Don’t give instructions
  • Don’t be vague or provide tiny insignificant tasks
  • Choose representative tasks that reflect the most important things a user would do with the interface

Security Tasks

  • Security is almost never a task

Pre-Test Questionnaires

  • Learn any relevant background about the subject’s
  • Age, gender, education level, experience with the web, experience with this type of website, experience with this site in particular.
  • Perhaps more specific questions based on the site, e.g., color blindness, if the user has children, etc.

Post-Test Questionnaires

  • Have users provide feedback on the interface.

Evaluation

  • Users are given a list of tasks and asked to perform each task.
  • Interaction with the user is governed by different protocols.

Observation Methods

  • Silent Observer
  • Think Aloud
  • Constructive Interaction

Interview

  • Ask users to give you feedback
  • Easier for the user than writing it down
  • They will tell you, things, you never thought to ask

Reporting

  • After the evaluation, report your results
  • Summarize the experiences of users
  • Emphasize your insights with specific examples or quotes
  • Offer suggestions for improvement for tasks that were difficult to perform

A/B Testing

  • Doesn’t include any Cognitive or psychological understanding or model of user behavior.
  • You give two options, A or B, and measure how they perform.

How to Run A/B Test

  • Start with a small percentage of visitors trying the experimental conditions.
  • Automatically stop testing if any condition has very bad performance.
  • Let people consistently see the same variation so, they don’t get confused.

Strategies for Secure Interaction Design: authority, guidelines for interface design

Strategies for Secure Interaction Design: authority, guidelines for interface design

  • It’s the user who is making security decision, so, keep user in mind when designing security systems.

Authority Guidelines

  • Match the easiest way to do a task with the least granting of authority.
    • What are typical user tasks?
    • What is the easiest way for the user to accomplish each task?
    • What authority is granted to software and other people when the user takes the easiest route to completing the task?
    • How can the safest ways of accomplishing the task be made easier and vice versa?
  • Grant authority to others in accordance with user actions indicating consent.
    • When does the system give access to the user’s resources?
    • What user action grants that access?
    • Does the user understand that the action grants access?
  • Offer the user ways to reduce other’s authority to access the user’s resources.
    • What kind of access does the user grant to software and other users?
    • Which types of access can be revoked?
    • How can the interface help the user find and revoke access?

Authorization and Communication Guidelines

  • Users should know what authority other’s have.
    • What kind of authority can software and other users hold?
    • What kind of authority impact user decisions with security consequences?
    • How can the interface provide timely access to information about these authorities?
  • User should know what authority they themselves have.
    • What kind of authority does the user hold?
    • How does the user know they have that authority?
    • What might the user decide based on their expectation of authority?
  • Make sure the user trust the software acting on their behalf.
    • What agents manipulate authority on the user’s behalf?
    • How can users be sure they are communicating with the intended agent?
    • How might the agent be impersonated?
    • How might the user’s communication with the agent be corrupted/intercepted?

Interface Guidelines for Usable Security

  • Enable the user to express safe security policies that fit the user’s task.
    • What are some examples of security policies that users might want enforced for typical tasks?
    • How can the user express these policies?
    • How can the expression of policy be brought closer to the task?
  • Draw distinction among objects and actions along boundaries relevant to the task.
    • At what level of details does the interface allow objects and actions to be separately manipulated?
    • What distinction between affected objects and unaffected objects does the user care about?
  • Present objects and actions using distinguishable, truthful appearances.
    • How does the user identify and distinguish different objects and actions?
    • In what ways can the means of identification be controlled by other parties?
    • What aspects of an object’s appearances are under system control?
    • How can those aspects be chosen to best prevent deception?

Usable Authentication: authentication mechanisms, biometrics, two-factor authentication

Password Authentication

Password Attacks

  • Human
  • Brute force
  • Common word
  • Dictionary word

Two-Factor Authentication

  • Password & one time unique code
    • Generated by
      • Device
      • Email
      • Text
      • App

Security of TFA

  • More secure
  • Stops most hacking attacks
  • Users perceive it as more secure

Usability of TFA

  • Research says:
    • Speed: Slower
    • User Preference;
      • Felt less usable
      • Less convenient
      • Harder to use

Biometric Authentication

  • Fingerprints, voice and facial scan etc.

Usability of Biometrics

  • Voice Recognition
    • Speed: medium
    • Efficiency: medium
    • Learnability: easy
    • Memorability: easy
  • Facial Recognition
    • Speed: medium
    • Efficiency: medium
    • Learnability: easy
    • Memorability: easy
  • Fingerprint Recognition
    • Speed: fast
    • Efficiency: good
    • Learnability: easy
    • Memorability: easy

Analyzing Security

  • Who can access the device?
  • How easily can they replicate the biometrics input?

Gesture-based Authentication

  • Keypad Gestures
  • Free Gestures
  • Draw your Signatures
  • Multi-touch

Benefits

  • Gestures users enjoy tend to be more secure
  • Users prefer gestures to passwords
  • Faster than passwords, less error-prone

Usable Privacy: privacy settings, personal data sharing, data inference

Usable Privacy Basics

  • Privacy is a kind of security;
    • Users want to protect their information.
    • Should have the right to understand what happens with their data.
    • Should have as much control as possible over how it is used.
  • Privacy Policies;
    • Tell a user everything they need to know about how their data is collected, used, and shared.
    • Can be analyzed for usability.
  • Privacy Controls
    • Should data be collected or not?
    • Who has permission to see it?
  • Going forward
    • Privacy and security are part of the same issue.
    • Analyzing usability is done the same way with privacy.
    • Keep the user in mind first.

Privacy Policies and User Understanding

For user to control their privacy, they must understand privacy policies. Do they?

  • What we know:
    • Most people don’t read privacy policies.
    • When people do read them, they don’t necessarily understand them.
  • How to learn?
    • Read privacy policies.
    • Discover through other sources.
  • Implications
    • Privacy policies are boring and hard to read
  • Poor usability
    • They are really important.
    • Are there more usable ways to convey the information in a privacy policy?
  • User understand what data is being collected and shared, and they consent to how it is used.
  • Six components
    • Disclosure
    • Comprehension
    • Voluntariness
    • Competence
    • Agreement
    • Minimal distraction

5 Pitfalls of Privacy

  • Understanding
    • Obscuring potential information flow.
    • Obscuring actual information flow.
  • Action
    • Emphasizing configuration over action.
  • Privacy management should be part of natural workflow
    • Lacking coarse-grained control.
  • Have an obvious, top-level control to turn sharing on and off
    • Inhibiting established practice.
  • What users expect from other experiences?
    • Let them have it here too.
  • Mental models, conventions

Information Flow

  • Types of information
  • Kinds of observers
  • Media through which info is conveyed
  • Length of retention
  • Potential for unintended disclosure
  • Collection of metadata

CompTIA SY0-701 Security+ Training Course

This training course is offered by Professor Messer over on YouTube.

Tip

You can directly support Professor Messer by buying wonderfully written notes from his website.

The course index is as follows:

0.1 – Introduction

How to Pass Your SY0-701 Security+ Exam

Section 1: General Security Concepts

1.1: Security Controls

1.2: Security Concepts

1.3: Change Management

1.4: Cryptographic Solutions

Section 2: Threats, Vulnerabilities, and Mitigations

2.1: Threat Actors

2.2: Threat Vectors and Attack Surfaces

2.3: Types of Vulnerabilities

2.4: Indicators of Malicious Activity

2.5: Mitigation Techniques

Section 3: Security Architecture

3.1: Architecture Models

3.2: Applying Security Principles

3.3: Protecting Data

3.4: Resiliency and Recovery

Section 4: Security Operations

4.1: Security Techniques

4.2: Asset Management

4.3: Vulnerability Management

4.4: Security Monitoring

4.5: Enterprise Security

4.7: Automation and Orchestration

4.8: Incident Response

4.9: Security Data Sources

Section 5: Security Program Management and Oversight

5.1: Security Governance

5.2: Risk Management

5.3: Third-party Risk

5.4: Security Compliance

5.5: Audits and Assessments

5.6: Security Awareness

Subsections of CompTIA SY0-701 Security+

How to Pass Your SY0-701 Security+ Exam

The CompTIA Security+ Advantages

CompTIA stands for Computing Technology Industry Association.

  • The most popular
  • builds a solid foundation
  • Many organizations require some type of certifications
  • Knowledge and satisfaction
  • Recognition in over 100 countries
  • Available in different languages

About this Training Course

  • SY0-701
  • Released in Nov. 7, 2023
  • Smaller video duration
  • Quick and easy
  • Follows the CompTIA exam objectives
  • 90 minutes, max of 90 questions
  • Passing score: 750 on a scale of 100-900

Exam Questions

  • Multiple Choice
    • Very straightforward
    • Single, multiple answers
  • Performance based
    • Complete a task
    • Matching, sorting, drag-and-drop etc.

Security Controls

  • Security risks are out there
    • Many categories and types to consider
  • Assets are also varied
    • Data, physically property, computer systems
  • Prevent security events, minimize the impact, and limit the damage
    • Security controls

Control Categories

  • Technical Controls
    • Controls implemented using systems
    • OSes controls
    • Firewalls, anti-viruses
  • Managerial Controls
    • Admin controls associated with security design and implementation
    • Security policies, SOPs
  • Operational Controls
    • Controls implemented by people instead of systems
    • Security guards, awareness programs
  • Physical Controls
    • Limit physical access
    • Guard shack
    • Fences, locks
    • Badge readers

Preventive Control Types

  • Preventive
    • Block access to a resource
    • You shall not pass
  • Prevent access
    • Firewall rules
    • Follow security policy
    • Guard shack checks all identification
    • Enable door locks

Deterrent Control Types

  • Deterrent
    • Discourage an intrusion attempt
    • Doesn’t directly prevent access
  • Make an attacker think twice
    • Application splash screens
    • Threat of demotion
    • Front reception desk
    • Posted warning signs

Detective Control Types

  • Detective
    • Identify and log an intrusion attempt
    • May not prevent access
  • Find the issue
    • Collect and review system logs
    • Review login reports
    • Regularly patrol the property
    • Enable motion detectors

Corrective Control Types

  • Corrective
    • Apply a control after an event has been detected
    • Reverse the impact of an event
    • Continue operating with minimal downtime
  • Correct the problem
    • Restoring from backups can mitigate a ransomware infection
    • Create policies for reporting security issues
    • Contact law enforcement to manage criminal activity
    • Use a fire extinguisher

Compensating Control Types

  • Compensating
    • Control using other means
    • Existing controls aren’t sufficient
    • May be temporary
  • Prevent the exploitation of a weakness
    • Firewall blocks a specific application instead of patching the app
    • Implement a separation of duties
    • Require simultaneous guard duties
    • Generator used after power outage

Directive Control Types

  • Direct a subject towards security compliance

  • A relatively weak security control

  • Do this, please!!!

    • Store all sensitive files in a protected folder
    • Create compliance policies and procedures
    • Train users on proper security policy
    • Post a sign for “Authorized Personnel Only”

Managing Security Controls

  • These are not inclusive lists
    • There are many categories of control
    • Some organizations will combine types
  • There are multiple security controls for each category and type
    • Some security controls may exist in multiple types or categories
    • New security controls are created as systems and processes evolve
    • Your organization may use very different controls

Security Concepts

The CIA Triad

  • Combination of principles
    • The fundamentals of security
    • Sometimes referenced as the AIC Triad
  1. Confidentiality
    • Prevent disclosure of information to unauthorized individuals or systems
  2. Integrity
    • Messages can’t be modified without detection
  3. Availability
    • Systems and networks must be up and running

1. Confidentiality

  • Certain information should only be known to certain people
    • Prevent unauthorized information disclosure
  • Encryption
    • Encode messages so only certain people can read it
  • Access Controls
    • Selectively restrict access to a resource
  • Two-factor Authentication
    • Additional confirmation before information is disclosed

2. Integrity

  • Data is stored and transferred as intended
    • Any modification to the data would be identified.
  • Hashing
    • Map data of an arbitrary length to data of a fixed length
  • Digital Signatures
    • Mathematical scheme to verify the integrity of data
  • Certificates
    • Combine with a digital signature to verify an individual
  • Non-repudiation
    • Provides proof of integrity, can be asserted to be genuine!

3. Availability

  • Information is accessible to authorized users
    • Always at your fingertips
  • Redundancy
    • Build services that will always be available
  • Fault Tolerance
    • System will continue to run, even when a failure occurs
  • Patching
    • Stability
    • Close security holes

Non-repudiation

  • You can’t deny what you have said
    • There is no taking it back
  • Signs a contract
    • Your signature adds non-repudiation
    • You really did sign the contract
    • Others can see your signature
  • Adds a different perspective for cryptography
    • Proof of integrity
    • Proof of origin, with high assurance of authenticity

Proof of integrity

  • Verify data doesn’t change
    • The data remains accurate and consistent
  • In cryptography, we use a hash
    • Represents data as a short string of text
    • A message digest, a fingerprint
  • If the data changes, the hash changes
    • If the person changes, you get a different fingerprint
  • Does not necessarily associate data with an individual
    • Only tells you if the data has changed

Proof of Origin

  • Prove the message was not changed
    • Integrity
  • Prove the source of the message
    • Authentication
  • Make sure the signature isn’t fake
    • Non-repudiation
  • Sign with the private key
    • The message doesn’t need to be encrypted
    • Nobody else can sign this (obviously)
  • Verify with the public key
    • Any change to the message will invalidate the signature

Verifying a Digital Signature

Authentication, Authorization, and Accounting (AAA) Framework

  • Identification
    • This is who you claim to be
    • Usually your username
  • Authentication
    • Prove you are who you say you are
    • Password and other authentication factors
  • Authorization
    • Based on your identification and authentication, what access do you have?
  • Accounting
    • Resources used: Login time, data sent and received, logout time

Authenticating People

Authenticating Systems

  • You have to manage many devices
    • Often devices that you will never physically see
  • A system can’t type a password
    • And you may not want to store one
  • How can you truly authenticate a device
    • Put a digitally signed certificate on the device
  • Other business processes rely on the certificate
    • Acess to the VPN from authorized devices
    • Management software can validate the end device

Certificate Authentication

  • An organization has a trusted Certificate Authority (CA)
    • Most organizations maintain their own CAs
  • The organization creates a certificate for a device
    • And digitally signs the certificate with the organization’s CA
  • The certificate can now be included on a device as an authentication factor
    • The CA’s digital signature is used to validate the certificate

Certificate-based Authentication

Authorization Models

  • The user or device has now authenticated
    • To what do they now have access?
    • Time to apply an authorization model
  • Users and services ⇾ data and applications
    • Associating individual users to access rights doesn’t scale
  • Put an authorization model in the middle
    • Define by Roles, Organizations, Attributes, etc.

No Authorization Model

  • A simple relationship
    • User ⇾ Resource
  • Some issues with this method
    • Difficult to understand why an authorization may exist
    • Doesn’t scale

Using an Authorization Model

  • Add an abstraction
    • Reduce complexity
    • Create a clear relationship between the user and the resource
  • Administration is streamlined
    • Easy to understand the authorizations
    • Support any number of users or resources

Gap Analysis

  • Where you are compared with where you want to be
    • The “gap” between the two
  • This may require extensive research
    • There is a lot to consider
  • This can take weeks or months
    • An extensive study with numerous participants
    • Get ready for emails, data gathering, and technical research

Choosing the Framework

  • Get the baseline of employees
    • Formal experience
    • Current training
    • Knowledge of security policies and procedures
  • Examine the current processes
    • Research existing IT systems
    • Evaluate existing security policies

Compare and Contrast

  • The comparison
    • Evaluate existing systems
  • Identify weakness
    • Along with the most effective processes
  • A detailed analysis
    • Examine broad security categories
    • Break those into smaller segments

The Analysis and Report

  • The final comparison
    • Detailed baseline objectives
    • A clear view of the current state
  • Need a path to get from the current security to the goal
    • This will almost certainly include time, money, and lots of change control
  • Time to create the gap analysis report
    • A formal description of the current state
    • Recommendations for meeting the baseline

Gap Analysis Overview

Zero Trust

  • Many networks are relatively open on the inside
    • Once you’re through the firewall, there are few security controls
  • Zero trust is a holistic approach to network security
    • Covers every device, every process, every person
  • Everything must be verified
    • Nothing is inherently trusted
    • Multi-factor authentication, encryption, system permissions, additional firewalls, monitoring, and analytics etc.

Planes of Operation

  • Split the network into functional planes
    • Applies to physical, virtual, and cloud components
  • Data Plane
    • Process the frames, packets, and network data
    • Processing, forwarding, trunking, encrypting, NAT
  • Control Plane
    • Manages the actions of the data plane
    • Define policies and rules
    • Determine how packets should be forwarded
    • Routing tables, session tables, NAT tables

Extend the Physical Architecture

  • Separate into functional tasks
    • Incorporate into hardware or software

Controlling Trust

  • Adaptive Identity
    • Consider the source and the requested resources
    • Multiple risk indicators — relationship to the organization, physical location, type of connection, IP address, etc.
    • Make the authentication stricter, if needed
  • Threat Scope Reduction
    • Decrease the number of possible entry points
  • Policy-driven access control
    • Combine the adaptive identity with a predefined set of rules

Security Zone

  • Security is more than a one-to-one relationship
    • Broad categorization provide a security-based foundation
  • Where are you coming from and where are you going
    • Trusted, untrusted
    • Internal network, external network
    • VPN 1, VPN 5, VPN 11
    • Marketing, IT, Accounting, HR
  • Using the zones may be enough by itself to deny access
    • For example, Untrusted to Trusted zone traffic
  • Some zones are implicitly trusted
    • For example, Trusted to Internal zone traffic

Policy Enforcement Point

  • Subjects and systems
    • End users, applications, non-human entities
  • Policy enforcement point (PEP)
    • The gatekeeper
  • Allow, monitor, and terminate connections
    • Can consist of multiple components working together

Applying Trust in the Planes

  • Policy Decision Point
    • There’s a process for making an authentication decision
  • Policy Engine
    • Evaluates each access decision based on policy and other information sources
    • Grant, deny, or revoke
  • Policy Administration
    • Communicates with the Policy Enforcement Point
    • Generates access tokens or credentials
    • Tells PEP to allow or disallow access

Zero Trust Across Planes

Physical Security

Barricades/ Bollards

  • Prevent access
    • There are limits to the prevention
  • Channel people through a specific access point
    • And keep out other things
    • Allow people, prevent cars and trucks
  • Identify safety concerns
    • And prevent injuries
  • Can be used to an extreme
    • Concrete barriers/bollards
    • Moats (Water ditch around the facility)

Access Control Vestibules

  • All doors normally unlocked
    • Opening one door causes others to lock
  • All doors normally locked
    • Unlocking one door prevents others from being unlocked
  • One door open/others locked
    • When one is open, the other cannot be unlocked
  • One at a time, controlled groups
    • Managed control through an area

Fencing

  • Build a perimeter
    • Usually very obvious
    • May not be what you’re looking for
  • Transparent or opaque
    • See through fence (or not)
  • Robust
    • Difficult to cut the fence
  • Prevent Climbing
    • Razor wire
    • Build it high

Video Surveillance

  • CCTV (Closed circuit television)
    • Can replace physical guards
  • Camera features are important
    • Motion recognition can alarm and alert when something moves
    • Object detection can identify a license plate or person’s face
  • Often many cameras
    • Networked together and recorded over time

Guards and Access Badges

  • Security Guard
    • Physical protection at the reception area of a facility
    • Validate identification of existing employees
  • Two-person integrity/control
    • Minimize exposure to an attack
    • No single person has access to a physical asset
  • Access badge
    • Picture, name, other details
    • Must be worn at all times
    • Electronically logged

Lighting

  • More light means more security
    • Attackers avoid the light
    • Easier to see when lit
    • Non IR cameras can see better
  • Specialized design
    • Consider overall light levels
    • Lighting angles may be important
  • Avoid shadows and glare

Sensors

  • Infrared
    • Detects infrared radiation in both light and dark
    • Common in motion detectors
  • Pressure
    • Detects a change in force
    • Floor and window sensors
  • Microwave
    • Detects movement across large areas
  • Ultrasonic
    • Send ultrasonic signals, receive reflected sound waves
    • Detect motion, collision detection etc.

Deception and Disruption

Honeypots

  • Attract the bad guys
    • And trap them there
  • The “attacker” is probably a machine
    • Makes for interesting recon
  • Honeypots
    • Create a virtual world to explore
  • Many options
    • Most are open source and available to download
  • Constant battle to discern the real from the fake

Honeynets

  • A real network includes more than a single device
    • Servers, workstations, routers, switches, firewalls
  • Honeynets
    • Build a larger deception network with one or more honeypots
  • More than one source of information

Honeyfiles

  • Attract the attackers with more honey
    • Create files with fake information
    • Something bright and shiny
  • Honeyfiles
    • Bait for the honeynet (passwords.txt)
    • Add many honeyfiles to files shares
  • An alert is sent if the file is accessed
    • A virtual bear trap

Honeytokens

  • Track the malicious actors
    • Add some traceable data to the honeynet
    • If the data is stolen, you will know where it came from
  • API Credentials
    • Doesn’t actually provide access
    • Notifications are sent when used
  • Fake email addresses
    • Add it to a contact list
    • Monitor the internet to see who posts it
  • Many other honeytoken examples
    • Database records, browser cookies, web page pixels

Change Management

Change Management

  • How to make a change
    • Upgrade software, patch an application, change firewall configuration, modify switch ports
  • One of the most common risks in the enterprise
    • Occurs very frequently
  • Often overlooked or ignored
    • Did you feel that bit?
  • Have clear policies
    • Frequency, duration, installation process, rollback procedures
  • Sometimes extremely difficult to implement
    • It’s hard to change corporate culture

Change Approval Process

  • A formal process for managing change
    • Avoid downtime, confusion, and mistakes
  • A typical approval process
    • Complete the request forms
    • Determine the purpose of the change
    • Identify the scope of the change
    • Schedule a date and time of the change
    • Determine affected systems and the impact
    • Analyze the risk associated with the change
    • Get approval from the change control board
    • Get end-user acceptance after the change is complete

Ownership

  • An individual or entity needs to make a change
    • They own the process
    • They don’t (usually) perform the actual change
  • The owner manages the process
    • Process updates are provided to the owner
    • Ensures the process is followed, and acceptable
  • Address label printers needs to be upgraded
    • Shipping and Receiving department owns the process
    • IT handles the actual change

Stakeholders

  • Who is impacted by this change?
    • They’ll want to have input on the change management process
  • This may not be as obvious as you might think
    • A single change can include one individual or the entire company
  • Upgrade software used for shipping labels
    • Shipping/receiving
    • Accounting reports
    • Product delivery timeframes
    • Revenue recognition — CEO visibility

Impact Analysis

  • Determine a risk value
    • high, medium, low etc.
  • The risks can be minor or far-reaching
    • The “fix” doesn’t actually fix anything
    • The fix breaks something else
    • OS failures
    • Data corruption
  • What’s the risk with NOT making the change?
    • Security vulnerability
    • Application unavailability
    • Unexpected downtime to other services

Test Results

  • Sandbox testing environment
    • No connection to the real world or production system
    • A technological safe place
  • Use before making a change to production
    • Try the upgrade, apply the patch
    • Test and confirm before deployment
  • Confirm the back out plan
    • Move everything back to the original
    • A sandbox cannot consider every possibility

Backout Plan

  • The change will work perfectly and nothing will ever go bad
    • Of course it will
  • You should always have a way to revert your changes
    • Prepare for the worst, hope for the best
  • This isn’t as easy as it sounds
    • Some changes are difficult to revert
  • Always have backups
    • Always have good backups

Maintenance Windows

  • When is the change happening
    • This might be the most difficult part of the process
  • During the workday may not be the best option
    • Potential downtime would affect a large part of production
  • Overnights are often a better choice
    • Challenging for 24-hour production schedules
  • The time of year may be a consideration
    • Retail networks are frozen during the holiday season

Standard Operating Procedures

  • Change management is critical
    • Affects everyone in the organization
  • The process must be well documented
    • Should be available on the Internet
    • Along with all standard processes and procedures
  • Changes to the process are reflected in the standards
    • A living document

Technical Change Management

  • Put the change management process into action
    • Execute the plan
  • There is no such thing as a simple upgrade
    • Can have many moving parts
    • Separate events may be required
  • Change management is often concerned with “what” need to change
    • The technical team is concerned with “how” to change it

Allow List/Deny List

Any application can be dangerous

  • Vulnerabilities, Trojan horses, malware

Security policy can control app execution

  • Allow list, deny/block list

Allow list

  • Nothing runs unless it’s approved
  • Very restrictive

Deny list

  • Nothing on the “bad list” can be executed
  • Anti-virus, anti-malware

Restricted Activities

The scope of a change is important

  • Defines exactly which components are covered

A change approval isn’t permission to make any change

  • The change control approval is very specific

The scope may need to be expanded during the change window

  • It’s impossible to prepare for all possible outcomes

The change management process determines the next steps

  • There are processes in place to make the change successful

Downtime

Services will eventually be unavailable

  • The change process can be disruptive
  • Usually scheduled during non-production hours

If possible, prevent any downtime

  • Switch to secondary system, upgrade the primary, then switch back

Minimize any downtime events

  • The process should be as automated as possible
  • Switch back to secondary if issues appear
  • Should be part of the backout plan

Send emails and calendar updates

Restarts

It’s common to require a restart

  • Implement the new configuration
  • Reboot the OS, power cycle the switch, bounce the service
  • Can the system recover from a power outage?

Services

  • Stop and restart the service or daemon
  • May take seconds or minutes

Applications

  • Close the application completely
  • Launch a new application instance

Legacy Applications

Some applications were here before you arrived

  • They will here when you leave

Often no longer supported by the developer

  • You’re now the support team

Fear of Unknown

  • Face your fears and document the system
  • It may not be as bad as you think

May be quirky

  • Create specific processes and procedures

Become the expert

Dependencies

To complete A, you must complete B

  • A service will not start without other active services
  • An application requires a specific library version

Modifying one component may require changing or restarting other components

  • This can be challenging to manage

Dependencies may occur across systems

  • Upgrade the firewall code first
  • Then upgrade the firewall management software

Documentation

It can be challenging to keep up with changes

  • Documentation can become outdated very quickly
  • Require with the change management process

Updating diagrams

  • Modifications to network configurations
  • Address updates

Updating policies/procedures

  • Adding new systems may require new procedures

Version Control

Track changes to a file or configuration data over time

  • Easily revert to a previous setting

Many opportunities to manage versions

  • Router configurations
  • Windows OS patches
  • Application registry entries

Not always straightforward

  • Some devices and OSes provide version control features
  • May require additional management software

Cryptographic Solutions

Public Key Infrastructure (PKI)

Policies, procedures, hardware, software, people

  • Digital certificates: create, distribute, manage, store, revoke

This is a big, big, endeavor

  • Lots of planning

Also refers to the binding of public keys to people or devices

  • The certificate authority (CA)
  • It’s all about trust

Symmetric Encryption

A single, shared key

  • Encrypt with the key
  • Decrypt with the same key
  • If it gets out, you’ll need another key

Secret key algorithm

  • A shared secret

Doesn’t scale very well

  • Can be challenging to distribute

Very fast to use

  • Less overhead than asymmetric encryption
  • Often combined with asymmetric encryption

Asymmetric Encryption

Public key cryptography

  • Two (or more) mathematically related keys

Private Key

  • Keep this private

Public Key

  • Anyone can see this key
  • Give it away

The private key is the only key that can decrypt data encrypted with public key

  • You cannot derive the private key from the public key

The Key Pair

Asymmetric encryption

  • Public Key Cryptography

Key generation

  • Build both the public and private key at the same time
  • Lots of randomization
  • Large prime numbers
  • Lots and lots of math

Everyone can have the public key

  • Only Alice has the private key

Asymmetric Encryption

Key Escrow

Someone else holds your decryption keys

  • Your private keys are in the hands of a 3rd Party
  • This may be within your own organization

This can be a legitimate business arrangement

  • A business might need access to employee information
  • Government agencies may need to decrypt partner data

Controversial?

  • Of course
  • But may still be required

Encrypting Data

Encrypting Stored Data

Protect data on storage devices

  • SSD, hard drive, USB drive, cloud storage, etc.
  • This is data at rest

Full-disk and partition/volume encryption

  • BitLocker, FileVault, etc.

File encryption

  • EFS (Encrypting File System), third-party utilities

Database Encryption

Protecting stored data

  • And the transmission of that data

Transparent encryption

  • Encrypt all database information with a symmetric key

Record-level encryption

  • Encrypt individual columns
  • Use separate symmetric keys for each column

Example Database:

You can encrypt the entire database

But this adds the extra overhead for database search and lookup. We have to decrypt the data every time we need to pull something from it.

One way to avoid, the overhead is to encrypt only the sensitive portion of the data, leaving rest as unencrypted.

Transport Encryption

Protect data traversing the network

  • You are probably doing this now

Encrypting in the application

  • Browsers can communicate using HTTPS

VPN (virtual private network)

  • Encrypts all data transmitted over the network, regardless of the application
  • Client-based VPN using SSL/TLS
  • Site-to-site VPN using IPsec

Encryption Algorithms

There are many, many ways to encrypt data

  • The proper “formula” must be used during encryption and decryption

Both sides decide on the algorithm before encrypting the data

  • The details are often hidden from the end user

There are advantages and disadvantages between algorithms

  • Security level, speed, complexity of implementation, etc.

Encryption Algorithm Comparison

Cryptographic Keys

There’s very little that is not known about the cryptographic process

  • The algorithm is usually a known entity
  • The only thing you don’t know is the key

The key determines the output

  • Encrypted data
  • Hash value
  • Digital signature

Keep your key private

  • It’s the only thing protecting your data

Key Lengths

Larger keys tend to be more secure

  • Prevent brute-force attacks
  • Attackers can try every possible key combination

Symmetric encryption

  • 128-bit or larger symmetric keys are common
  • These numbers get larger and larger as time goes on

Asymmetric encryption

  • Complex calculations of prime numbers
  • Larger keys than symmetric encryption
  • Common to see key lengths of 3072 bits or larger

Key Stretching

A weak key is a weak key

  • By itself, it’s not very secure

Make a weak key stronger by performing multiple processes

  • Hash a password. Hash the hash of the password. And continue…
  • Key stretching, key strengthening

Brute force attacks would require reversing each of those hashes

  • The attacker has to spend much more time, even though the key is small

Key Exchange

A logistical challenge

  • How do you share an encryption key across an insecure medium without physically transferring the key?

Out-of-band key exchange

  • Don’t send the symmetric key over the network
  • Telephone, courier, in-person, etc.

In-band key exchange

  • It’s on the network
  • Protect the key with additional encryption
  • Use asymmetric encryption to deliver a symmetric key

Real-time Encryption/Decryption

There is a need for fast security

  • Without compromising the security part

Share a symmetric session key using asymmetric encryption

  • Client encrypts a random (symmetric) key with a server’s public key
  • The server decrypts this shared key and uses it to encrypt data
  • This is the session key

Implement session keys carefully

  • Need to be changed often (ephemeral keys)
  • Need to be unpredictable

Symmetric Key from Asymmetric Keys

Use public and private key cryptography to create a symmetric key

  • Math is powerful

Encryption Technologies

Trusted Platform Module (TPM)

A specification for cryptographic functions

  • Cryptography hardware on a device

Cryptographic processor

  • Random number generator, key generators

Persistent Memory

  • Unique keys burned in during manufacturing

Versatile memory

  • Storage keys, hardware configuration information
  • Securely store BitLocker keys

Password protected

  • No dictionary attacks

Hardware Security Module (HSM)

Used in large environments

  • Clusters, redundant power
  • Securely store thousands of cryptographic keys

High-end cryptographic hardware

  • Plug-in card or separate hardware device

Key backup

  • Secure storage in hardware

Cryptographic accelerators

  • Offload that CPU overhead from other devices

Key Management System

Services are everywhere

  • On-premises, cloud-based
  • Many keys for many services

Manage all keys from a centralized manager

  • Often provided as third-party software
  • Separate the encryption keys from the data

All key management from one console

  • Create keys for a specific service or cloud provider (SSL/TLS, SSH, etc.)
  • Associate keys with specific users
  • Rotate keys on regular intervals
  • Log key use and important events

Keeping Data Private

Our data is located in many places

  • Mobile phones, cloud, laptops, etc.
  • The most private data is often physically closest to us

Attackers are always finding new techniques

  • It’s a race to stay one step ahead

Our data is changing constantly

  • How do we keep this data protected?

Secure Enclave

A protected area of our secrets

  • Often implemented as a hardware processor
  • Isolated from the main processor
  • Many technologies and names

Provides extensive security features

  • Has its own boot ROM
  • Monitors the system boot process
  • True random number generator
  • Real-time memory encryption
  • Performs AES encryption in hardware
  • And more…

Obfuscation

The process of making something unclear

  • It’s now much more difficult to understand

But it’s not impossible to understand

  • If you know how to read it

Hid information in plain sight

  • Store payment information without storing a credit card number

Hide information inside an image

  • Steganography

Steganography

Greek for “concealed writing”

  • Security through obscurity

Message is invisible

  • But it’s really there

The covertext

  • The container document or file

Common Steganography Techniques

Network based

  • Embed messages in TCP packets

Use an image

  • Embed the message in the image itself

Invisible watermarks

  • Yellow dots on printers

Other Steganography Types

Audio steganography

  • Modify the digital audio file
  • Interlace a secret message within the audio
  • Similar techniques to image steganography

Video steganography

  • A sequence of images
  • Use image steganography on a larger scale
  • Manage the signal-to-noise ratio
  • Potentially transfer much more information

Tokenization

Replace sensitive data with a non-sensitive placeholder

  • SSN 266-12-1112 is no 691-618539

Common with credit card processing

  • Use a temporary token during payment
  • An attacker capturing the card numbers can’t use them later

This isn’t encryption or hashing

  • The original data and token aren’t mathematically related

Data Masking

Data Obfuscation

  • Hide some original data

Protects PII

  • And other sensitive data

May only be hidden from view

  • The data may still be intact in storage
  • Control the view based on permissions

Many techniques

  • Substituting, shuffling, encrypting, masking out, etc.

Hashing and Digital Signatures

Hashes

Represent data as a short string of text

  • A message digest, a fingerprint

One-way trip

  • Impossible to recover the original message from the digest
  • Use to store passwords/confidentiality

Verify a downloaded document is the same as the original

  • Integrity

Can be a digital signature

  • Authentication, non-repudiation, and integrity

Collision

Hash functions

  • Take an input of any size
  • Create a fixed size string
  • Message digest, checksum

The hash should be unique

  • Different inputs should never create the same hash
  • If they do, it’s a collision

MD5 has a collision problem

  • Found in 1996
  • Don’t use MD5 for anything important

Practical Hashing

Verify a downloaded file

  • Hashes may be provided on the download site
  • Compare the downloaded files hash with the posted hash value

Password Storage

  • Instead of storing the password, store a salted hash
  • Compare hashes during the authentication process
  • Nobody ever knows your actual password

Adding Some Salt

Salt

  • Random data added to a password when hashing

Every user gets their own random salt

  • The salt is commonly stored with the password

Rainbow tables won’t work with salted hashes

  • Additional random value added to the original password

This slows down the brute force process

  • It doesn’t completely stop the reverse engineering

Salting the Hash

Each user gets a different random hash

  • The same password creates a different hash

Digital Signature

Prove the message was not changed

  • Integrity

Prove the source of the message

  • Authentication

Make sure the signature isn’t fake

  • Non-repudiation

Sign with the private key

  • The message doesn’t need to be encrypted
  • Nobody else can sign this (obviously)

Verify with the public key

  • Any change in the message will invalidate the signature

Creating a Digital Signature

Blockchain Technology

A distributed ledger

  • Keep track of transaction

Everyone on the blockchain network maintains the ledger

  • Records and replicates to anyone and everyone

Many practical applications

  • Payment processing
  • Digital identification
  • Supply chain monitoring
  • Digital Voting

The Blockchain Process

Certificates

Digital Certificates

A public key certificate

  • Binds a public key with a digital signature
  • And other details about the keyholder

A digital signature adds trust

  • PKI uses Certificate Authorities for additional trust
  • Web of Trust adds other users for additional trust

Certificate creation can be built into the OS

  • Part of Windows Domain services
  • Many 3rd-party options

What’s in a digital Certificate?

X.509

  • Standard format

Certificate Details

  • Serial number
  • Version
  • Signature algorithm
  • Issuer
  • Name of the cert holder
  • Public key
  • And more…

Root of Trust

Everything associated with IT security requires trust

  • A foundational characteristic

How to build trust from something unknown?

  • Someone/something trustworthy provides their approval

Refer to the root of trust

  • An inherently trusted component
  • Hardware, software, firmware, or other component
  • Hardware security module (HSM), Secure Enclave, Certificate Authority, etc.

Certificate Authorities

You connect to a random website

  • Do you trust it?

Need a good way to trust an unknown entity

  • Use a trusted third-party
  • An authority

Certificate Authorization (CA) has digitally signed the website certificate

  • You trust the CA, therefore you trust the website
  • Real-time verification

Third-party Certificate Authorities

Built-in to your browser

  • Any browser

Purchase your website certificate

  • It will be trusted by everyone’s browser

CA is responsible for vetting the request

  • They will confirm the certificate owner
  • Additional verification information may be required by the CA

Certificate Signing Requests

Create a key pair, then send the public key to the CA to be signed

  • A certificate signing request (CSR)

The CA validates the request

  • Confirms DNS emails and website ownership

CA digitally signs the cert

  • Returns to the applicant

Private Certificate Authorities

You are your own CA

  • Build it in-house
  • Your devices must trust the internal CA

Needed for medium-to-large organization

  • Many web servers and privacy requirements

Implement as part of your overall computing strategy

  • Windows Certificate Services, OpenCA

Self-signed Certificates

Internal certificates don’t need to be signed by a public CA

  • Your company is the only one going to use it
  • No need to purchase trust for devices that already trust you

Build your own CA

  • Issue your own certificates signed by your own CA

Install the CA certificate/trusted chain on all devices

  • They will now trust any certificate signed by your internal CA
  • Works exactly like a certificate you purchased

Wildcard Certificates

Subject Alternative Name (SAN)

  • Extension to an X.509 certificate
  • Lists additional identification information
  • Allows a certificate to support many domains

Wildcard domain

  • Certificates are based on the name of the server
  • A wildcard domain will apply to all server names in the domain

Key Revocation

Certificate Revocation List (CRL)

  • Maintained by the CA
  • Can contain many revocations in a large file

Many reasons

  • Changes all the time

April 2014 — CVE-2014-0160

  • Heartbleed
  • OpenSSL flaw put the private key of affected web servers at risk
  • OpenSSL was patched, every web server certificate was replaced
  • Older certificates were moved to the CRL

OCSP Stapling

Online Certificate Status Protocol

  • Provides scalability for OCSP checks

The CA is responsible for responding to all client OCSP requests

  • This may not scale well

Instead, have the certificate holder verify their own status

  • Status information is stored on the certificate holder’s server

OCSP status is “stapled” into the SSL/TLS handshake

  • Digitally signed by the CA

Getting Revocation Details to the Browser

OCSP (Online Certificate Status Protocol)

  • The browser can check certificate revocation

Message usually sent to an OCSP responder via HTTP

  • Easy to support over Internet links
  • More efficient than downloading a CRL

Not all browsers/apps support OCSP

  • Early Internet Explorer versions didn’t support OCSP
  • Some support OCSP, but don’t bother checking

Threat Actors

The entity responsible for an event that has an impact on the safety of another entity

  • Also called a malicious actor

Threat actor attributes

  • Describes characteristics of the attacker

Useful to categorize the motivation

  • Why is this attack happening?
  • Is this directed or random?

Attributes of Threat Actors

Internal/external

  • The attacker is insider the house
  • They are outside and trying to get in

Resources/funding

  • No money
  • Extensive funding

Level of sophistication/capability

  • Blindly runs scripts or automated vulnerability scans
  • Can write their own attack malware and scripts

Motivations of Threat Actors

What makes them tick?

  • There is a purpose to this attack

Motivation include

  • Data exfiltration
  • Espionage
  • Service disruption
  • Blackmail
  • Financial gain
  • Philosophical/political beliefs
  • Ethical
  • Revenge
  • Disruption/chaos
  • War

Nation States

External entity

  • Government and national security

Many possible motivations

  • Data exfiltration, philosophical, revenge, disruption, war

Constant attacks, massive resources

  • Commonly an Advanced Persistent Threat (APT)

Highest sophistication

  • Military control, utilities, financial control
  • United States and Israel destroyed 1000 nuclear centrifuges with the Stuxnet worm

Unskilled Attackers

Run pre-made scripts without any knowledge of what’s really happening

  • Anyone can do this

Motivated by the hunt

  • Disruption, data exfiltration, sometimes philosophical

Can be internal or external

  • But usually external

Not very sophisticated

  • Limited resources, if any

No formal funding

  • Looking for low-hanging fruit

Hacktivist

A hacker with a purpose

  • Motivated by philosophy, revenge, disruption, etc.

Often an external entity

  • Could potentially infiltrate to also be an insider threat

Can be remarkably sophisticated

  • Very specific hacks
  • DoS, website defacing, private documents release

Funding may be limited

  • Some organizations have fundraising options

Insider Threat

More than just passwords on sticky notes

  • Motivated by revenge, financial gain

Extensive resources

  • Using the organization’s resources against themselves

An internal entity

  • Eating away from the inside

Medium level of sophistication

  • The insider has institutional knowledge
  • Attacks can be directed at vulnerable systems
  • The insider knows what to hit

Organized Crime

Professional criminals

  • Motivated by money
  • Almost always an external entity

Very sophisticated

  • Best hacking money can buy

Crime that’s organized

  • One person hacks, one person manages the exploits, another person sells the data, another handles’ customer support

Lots of capital to fund hacking efforts

Shadow IT

Going rogue

  • Working around the internal IT organization
  • Builds their own infrastructure

Information Technology can put up roadblocks

  • Shadow IT is unencumbered
  • Use the cloud
  • Might also be able to innovate

Limited resources

  • Company budget

Medium sophistication

  • May not have IT training or knowledge

Common Threat Vectors

A method used by the attacker

  • Gain access or infect to the target
  • Also called “Attack Vectors”

A lot of work goes into finding vulnerabilities in these vectors

  • Some are more vulnerable than others

IT security professional spend their career watching these vectors

  • Protect existing vectors
  • Find new vectors

Message-based Vectors

One the biggest (and most successful) threat vectors

  • Everyone has at least one of these messaging systems

Email

  • Malicious links in an email
  • Link to malicious site

SMS (Short Message Service

  • Attacks in a text message

Phishing Attacks

  • People want to click links
  • Links in an email, links send via text or IM

Deliver the malware to the user

  • Attach it to the email
  • Scan all attachments, never launch untrusted links

Social engineering attacks

  • Invoice scams
  • Cryptocurrency scams

Image-based Vectors

Easy to identify a text-based threat

  • It’s more difficult to identify the threat in an image

Some image formats can be a threat

  • The SVG (Scalable Vector Graphic) format
  • Image is described in XML (Extensible Markup Language)

Significant security concerns

  • HTML injection
  • JavaScript attack code

Browsers must provide input validation

  • Avoid running malicious code

File-based Vectors

More than just executables

  • Malicious code can hide in many places

Adobe PDF

  • A file format containing other objects

ZIP/RAR files (or any compression type)

  • Contains many files

Microsoft Office

  • Documents with macros
  • Add-in files

Voice Call Vectors

Vishing

  • Phishing over the phone

Spam over IP

  • Large-scale phone calls

War dialing

  • It still happens

Call tampering

  • Disrupting voice calls

Removable Device Vectors

Get around the firewalls

  • The USB interface

Malicious software on USB flash drives

  • Infect air gapped networks
  • Industrial systems, high-security services

USB devices can act as keyboards

  • Hacker on a chip

Data exfiltration

  • Terabytes of data walk out the door
  • Zero bandwidth used

Vulnerable Software Vectors

Client-based

  • Infected executable
  • Known (or unknown) vulnerabilities
  • May require constant updates

Agentless

  • No installed executable
  • Compromised software on the server would affect all users
  • Client runs a new instance each time

Unsupported Systems Vectors

Patching is an important prevention tool

  • Ongoing security fixes

Unsupported systems aren’t patched

  • There may not even be an option

Outdated OSes

  • Eventually, even the manufacturer won’t help

A single system could be an entry

  • Keep your inventory and records current

Unsecure Network Vectors

The network connect everything

  • Ease of access for the attackers
  • View all (non-encrypted) data

Wireless

  • Outdated security protocols (WEP, WPA, WPA2)
  • Open or rogue wireless networks

Wired

  • Unsecure interfaces — No 802.1X

Bluetooth

  • Reconnaissance
  • Implementation vulnerabilities

Open Service Ports

Most network-based services connect over a TCP or UDP port

  • An “open” port

Every open port is an opportunity for the attacker

  • Application vulnerability or misconfiguration

Every application has their own open port

  • More services expand the attack surface

Firewall rules

  • Must allow traffic to an open port

Default Credentials

Most devices have default usernames and passwords

  • Change yours!

The right credentials provide full control

  • Administrator access

Very easy to find the defaults for your access point or router

Supply Chain Vectors

Tamper with the underlying infrastructure

  • Or manufacturing process

Managed service providers (MSPs)

  • Access many customer networks from one location

Gain access to a network using a vendor

  • 2013 Target credit card breach

Suppliers

  • Counterfeit networking equipment
  • Install backdoors, substandard performance and availability
  • 2020 — Fake Cisco Catalyst Switches

Phishing

Social engineering with a touch of spoofing

  • Often delivered by email, text, etc.
  • Very remarkable when well done

Don’t be fooled

  • Check the URL

Usually there’s something not quite right

  • Spelling, fonts graphics

Business Email Compromise

We trust email sources

  • The attackers take advantage of this trust

Spoofed email addresses

Financial fraud

  • Send emails with updated bank information
  • Modify wire transfer details

The recipient clicks the links

  • The attachments have malware

Tricks and Misdirection

How are they so successful?

  • Digital slight of hands
  • It fools the best of us

Typo squatting

Pretexting

  • Lying to get information
  • Attacker is a character in a situation they create
  • Hi, we are calling from Visa regarding an automated payment to your utility service

Phishing with different bait

Vishing (voice phishing) is done over the phone or voicemail

  • Call ID spoofing is common
  • Fake security checks or bank updates

Smishing (SMS phishing) is done by text message

  • Spoofing is a problem here as well
  • Forwards links or asks for personal information

Variations on a theme

  • The fake check scam, phone verification code scam, Boss/CEO scam, advance-fee scam
  • Some great summaries on https://reddit.com/r/Scams

Impersonation

A Pretext…

Before the attack, the trap is set

  • There is an actor and a story “Hello sir, my name is Wendy, and I’m from Microsoft Windows. This is an urgent check-up call for your computer as we have found several problems with it.”

Voice mail: “This is an enforcement action executed by the US Treasury, intending your serious attention.”

“Congratulations on your excellent payment history! You now qualify for 0% interest rates on all of your credit card accounts.”

Attackers pretend to be someone they are not

  • Halloween for the fraudsters

User some of those details from reconnaissance

  • You can trust me, I’m with your help desk

Attack the victim as someone higher in rank

  • Office of the Vice President for Scamming

Throw tons of technical details around

  • Catastrophic feedback due to the depolarization of the differential magnetometer

Be a buddy

  • How about those Cubs

Eliciting Information

Extracting information from the victim

  • The victim doesn’t even realize this is happening
  • Hacking the human

Often seen with vishing

  • Can be easier to get this information over the phone

These are well-documented psychological techniques

  • They cannot just ask, “So, what’s your password?”

Identify Fraud

Your identity can be used by others

  • Keep your personal information safe!

Credit card fraud

  • Open an account in your name, or use your credit card information

Bank Fraud

  • Attacker gains access to your account or opens a new account

Loan fraud

  • Your information is used for a loan or lease

Government benefits fraud

  • Attacker obtains benefits on your behalf

Protect against impersonation

Never volunteer information

  • My password is 12345

Don’t disclose personal details

  • The bad guys are tricky

Always verify before revealing info

  • Call back, verify through 3rd parties

Verification should be encouraged

  • Especially if your organization owns valuable information

Watering Hole Attack

Watering hole is a computer attack strategy in which an attacker guesses or observes which websites an organization’s users frequent, and then uses one or more of the websites to distribute malware.

What if your network was really secure?

  • You didn’t even plug in that USB key from the parking lot

The attackers can’t get in

  • Not responding to phishing emails
  • Not opening any email attachments

Have the mountain come to you

  • Go where the mountain hangs out
  • the watering hole
  • This requires a bit of research

Executing the Watering Hole Attack

Determine which websites the victim group uses

  • Educated guess — Local coffee or sandwich shop
  • Industry-related sites

Infect one of these third-party sites

  • Site vulnerability
  • Email attachments

Infect all visitors

  • But you are just looking for specific victims
  • Now you’re in!

Because that’s where the money is

January 2017

Polish Financial Supervision Authority, National Banking and Stock Commission of Mexico, State-owned bank in Uruguay

  • The watering hole was sufficiently poisoned

Visiting the site would download malicious JavaScript files

  • But only to IP addresses matching banks and other financial institutions

Did the attack work?

  • We still don’t know

Watching the Watering Hole

Defense-in-depth

  • Layered defense
  • It’s never one thing

Firewall and IPS

  • Stop the network traffic before things get bad

Antivirus/Anti-malware signature updates

  • The Polish Financial Supervision Authority attack code was recognized and stopped by generic signatures in Symantec’s antivirus software

Other Social Engineering Attacks

Misinformation/disinformation

Disseminate factually incorrect information

  • Create confusion and division

Influence campaigns

  • Sway public opinion on political and social issues

Nation-state actors

  • Divide, distract, and persuade

Advertising is an option

  • Buy a voice for your opinion

Enabled through Social media

  • Creating, sharing, liking, amplifying

The misinformation Process

Brand Impersonation

Pretend to be a well-known brand

  • Coca-cola, McDonald’s, Apple, etc.

Create tens of thousands of impersonated sites

  • Get into the Google index, click an ad, get a WhatsApp message

Visitors are presented with a pop-up

  • You won! Special offer! Download the video!

Malware infection is almost guaranteed

  • Display ads, site tracking, data exfiltration

Types of Vulnerabilities

Finding Malware

Malware runs in memory

  • Memory forensics can find the malicious code

Memory contains running processes

  • DLLs (Dynamic Link Libraries)
  • Threads
  • Buffers
  • Memory management functions
  • And much more

Malware is hidden somewhere

  • Malware runs in its own process
  • Malware injects itself into a legitimate process

Memory Injection

Add code into the memory of an existing process

  • Hide malware inside the process

Get access to the data in that process

  • And the same rights and permissions
  • Perform a privilege escalation

DLL Injection

Dynamic-Link Library

  • A Windows library containing code and data
  • Many applications can use this library

Attackers inject a path to a malicious DLL

  • Runs as part of the target process

One of the most popular memory injection methods

  • Relatively easy to implement

Buffer Overflows

Overwriting a buffer of memory

  • Spills over into other memory areas

Developers need to perform bounds checking

  • The attackers spend a lot of time looking for openings

Not a simple exploit

  • Takes time to avoid crashing things
  • Takes time to make it do what you want

A really useful buffer overflow is repeatable

  • Which means that a system can be compromised

Race Conditions

Race Condition

A programming conundrum

  • Sometimes, things happen at the same time
  • This can be bad if you’ve not planned for it

Time-of-check to time-of-use attack (TOCTOU)

  • Check the system
  • When do you use the results of your last check?
  • Something might happen between the check and the use

Race Condition Example

Race Conditions can cause big problems

January 2004 — Mars rover “Spirit”

  • Reboot when a problem is identified
  • Problem is with the file system, so reboot because of the file system problem
  • Reboot loop was the result

Pwn2Own Vancouver 2023 — Tesla Model 3

  • TOCTOU attack against the Tesla infotainment using Bluetooth
  • Elevated privileges to root
  • Earned $100,000 US prize, and they keep the Tesla

Malicious Updates

Software Updates

Always keep your operating system and applications updated

  • Updates often include bug fixes and security patches

This process has its own security concerns

  • Note every update is equally secure

Follow best practices

  • Always have a known-good backup
  • Install from trusted sources
  • Did I mention the backup?

Downloading and updating

Install updates from a downloaded file

  • Always consider your actions
  • Every installation could potentially be malicious

Confirm the source

  • A random pop-up during web browsing may not be legitimate

Visit the developer’s site directly

  • Don’t trust a random update button or random downloaded file

Many OSes will only allow signed apps

  • Don’t disable your security controls

Automatic Updates

The app updates itself

  • Often includes security checks/digital signatures

Relatively trustworthy

  • Comes directly from the developer

SolarWinds Orion supply chain attack

  • Reported in December 2025
  • Attackers gained access to the SolarWinds development system
  • Added their own malicious code to the updates
  • Gained access to hundreds of government agencies and companies

Operating System Vulnerabilities

Operating Systems

A foundational computing platform

  • Everyone has an OS
  • This makes the OS a very big target

Remarkably complex

  • Millions of lines of code
  • More code means more opportunities for a security issues

The vulnerabilities are already in there

  • We’ve just not found them yet

A month OS updates

A normal month of Windows updates

  • Patch Tuesday — 2nd Tuesday of each month
  • Other companies have similar schedules

May 9, 2023 — Nearly 50 security patches

  • 8 Elevation of Privilege Vulnerabilities
  • 4 Security Feature Bypass Vulnerabilities
  • 12 Remote Code Execution Vulnerabilities
  • 8 Information Disclosure Vulnerabilities
  • 5 Denial of Service Vulnerabilities
  • 1 Spoofing Vulnerability

Checkout Microsoft Security Center for latest patches and updates: https://msrc.microsoft.com/

Best Practices for OS Vulnerabilities

Always update

  • Monthly or on-demand updates
  • It’s a race between you and the attackers

May require testing before deployment

  • A patch might break something else

May require a reboot

  • Save all data

Have a fallback plan

  • Where’s that backup?

SQL Injection

Code Injection

Code Injection

  • Adding your own information into a data stream

Enabled because of bad programming

  • The application should properly handle input and output

So many data types

  • HTML, SQL, XML, LDAP

SQL Injection

SQL — Structured Query Language

  • The most common relational database management system language

SQL injection (SQLi)

  • Put your own SQL requests into an existing application
  • Your application shouldn’t allow this

Can often be executed in a web browser

  • Inject in a form or field

Building a SQL Injection

An example of website code:

"SELECT * FROM users WHERE name = '" + userName + "'";

How this looks to the SQL database

"SELECT * FROM users WHERE name = 'Professor'";

Add more information to the query (SQLi):

"SELECT * FROM users WHERE name = 'Professor' OR '1' = '1'";

This could be very bad

  • View all database information, delete database information, add users, denial of service, etc.

SQL Injection Demonstration

Source: https://owasp.org/www-project-webgoat/

Cross-site Scripting

XSS

XSS

  • Cascading Style Sheets (CSS) are something else entirely

Originally called cross-site because of browser security flaws

  • Information from one site could be shared with another

One of the most common web app vulnerabilities

  • Takes advantage of the trust a user has for a site
  • Complex and varied

XSS commonly uses JavaScript

  • Do you allow scripts? Me too.

Non-persistent (reflected) XSS Attack

Website allows scripts to run in user input

  • Search box is a common source

Attacker emails a link that takes advantage of this vulnerability

  • Runs a script that sends credentials/session IDs/Cookies to the attacker

Script embedded in the URL executes in the victim’s browser

  • As if it came from the server

Attacker uses credentials/session IDs/cookies to steal victim’s information without their knowledge

  • Very sneaky

Persistent (stored) XSS Attack

Attacker posts a message to a social media

  • Includes the malicious payload

It’s now “persistent”

  • Everyone gets the payload

No specific target

  • All viewers to the page

For social networking, this can spread quickly

  • Everyone who views the message can have it posted to their page
  • Where someone else can view it and propagate it further

Hacking a Subaru

June 2017, Aaron Guzman

  • Security Researcher

When authenticating with Subaru, users get a token

  • This token never expires (bad!)

A valid token allowed any service request

  • Even adding your email address to someone else’s account
  • Now you have full access to someone else’s car

Web front-end included an XSS vulnerability

  • A user clicks a malicious link, and you have their token

Protecting Against XSS

Be careful when clicking untrusted links

  • Never blindly click in your email inbox, Never.

Consider disabling JavaScript

  • Or control with an extension
  • This offers limited protection

Keep your browser and applications updated

  • Avoid the nasty browser vulnerabilities

Validate input

  • Don’t allow users to add their own scripts to an input field

Hardware Vulnerabilities

We are surrounded by hardware devices

  • Many don’t have an accessible OS

These devices are potential security issues

  • A perfect entry point for an attack

Everything is connecting to the network

  • Light bulbs, garage doors, refrigerators, door locks
  • IoT is everywhere

The security landscape has grown

  • Time to change your approach

Firmware

The software inside the hardware

  • The OS of the hardware device

Vendors are the only ones who can fix their hardware

  • Assuming they know about the problem
  • And care about fixing it

Trane Comfortlink II thermostats

  • Control the temperature from your phone
  • Trane notified of three vulnerabilities in April 2014
  • Two patched in April 2015, one in January 2016

End-of-life

End of life (EOL)

  • Manufacturer stops selling a product
  • May continue supporting the product
  • Important for security patches and updates

End of service life (EOSL)

  • Manufacturer stops selling a product
  • Support is no longer available for the product
  • No ongoing security patches or updates
  • May have a premium-cost support option

Technology EOSL is a significant concern

  • Security patches are part of normal operation

Legacy Platforms

Some devices remain installed for a long time

  • Perhaps too long

Legacy devices

  • Older OSes, applications, middleware

May be running end-of-life software

  • The risk need to be compared to the return

May require additional security protections

  • Additional firewall rules
  • IPS signatures for older OSes

Virtualization Vulnerabilities

Virtualization Security

Quite different from non-virtual machines

  • Can appear anywhere

Quantity of resources vary between VMs

  • CPU, memory, storage

Many similarities to physical machines

  • Complexity adds opportunity for the attackers

Virtualization vulnerabilities

  • Local privilege escalations
  • Command injection
  • Information disclosure

VM escape protection

The virtual machine self-contained

  • There’s no way out
  • Or is there?

Virtual machine escape

  • Break out of the VM and interact with the host OS or hardware

Once you escape the VM, you have great control

  • Control the host and control other guests VMs

This would be a huge exploit

  • Full control of the virtual world

Escaping the VM

March 2017 — Pwn2Own competition

  • Hacking contest
  • You pwn it, you own it — along with some cash

JavaScript engine bug in Microsoft Edge

  • Code execution in the Edge sandbox

Windows 10 kernel bug

  • Compromise the guest OS

Hardware simulation bug in VMware

  • Escape to the host

Patches were released soon afterward

Resource Reuse

The hypervisor manages the relationship between physical and virtual resources

  • Available RAM, storage space, CPU availability, etc.

These resources can be reused between VMs

  • Hypervisor host with 4 GB of RAM
  • Supports three VMs with 2 GB of RAM each
  • RAM is allocated and shared between VMs

Data can inadvertently be shared between VMs

  • Time to update the memory management features
  • Security patches can mitigate the risk

Cloud Specific Vulnerabilities

Security in the Cloud

Cloud adoption has been nearly universal

  • It’s difficult to find a company NOT using the cloud

We have put sensitive data in the cloud

  • The attackers would like this data

We are not putting in the right protections

  • 76% of organizations aren’t using MFA for management of console users

Simple best-practices aren’t being used

  • 63% of code in production is unpatched
  • Vulnerabilities rated high or critical (Common Vulnerability Scoring System - CVSS >= 7.0)

Attack the service

Denial of Service (DoS)

  • A fundamental attack type

Authentication bypass

  • Take advantage of weak or faulty authentication

Directory transversal

  • Faulty contiguration put data at risk

Remote code execution

  • Take advantage of unpatched systems

Attack the application

Web application attacks have increased

  • Log4j and Spring Cloud Function
  • Easy to exploit, rewards are extensive

Cross-site scripting

  • Take advantage of poor input validation

Out of bound write

  • Write to unauthorized memory areas
  • Data corruption, crashing, or code execution

SQL injection

  • Get direct access to a database

Supply Chain Vulnerabilities

Supply Chain Risk

The chain contains many moving parts

  • Raw materials, suppliers, manufacturers, distributors, customers, consumers

Attackers can infect any step along the way

  • Infect different parts of the chain without suspicion
  • People trust their suppliers

One exploit can infect the entire chain

  • There’s a lot at stake

Service Providers

You can control your own security posture

  • You can’t always control a service provider

Service providers often have access to internal services

  • An opportunity for the attacker

Many types of providers

  • Network, utility, office cleaning, payroll/accounting, cloud services, system administration, etc.

Consider ongoing security audits of all providers

  • Should be included with the contract

Target Service Provider Attack

Target Corp. breach — November 2013

  • 40 million credit cards stolen

Heating and AC firm in Pennsylvania war infected

  • Malware delivered in an email
  • VPN credentials for HVAC techs were stolen

HVAC vendor was the supplier

  • Attackers used a wide-open Target network to infect every cash register at 1800 stores

Hardware Providers

Can you trust your new server/router/switch/firewall/software?

  • Supply chain cybersecurity

Use a small supplier base

  • Tighter control of vendors

Strict controls over policies and procedures

  • Ensure proper security is in place

Security should be part of the overall design

  • There’s a limit to trust

Cisco or not Cisco?

All network traffic flows

  • A perfect visibility and pivot point

July 2022 — DHS arrests reseller CEO

  • Sold more than $1 billion of counterfeit Cisco products
  • Created over 30 different companies
  • Had been selling these since 2013

Knock-offs made in China

  • Sold as authentic Cisco products
  • Until they started breaking and catching on fire

Software providers

Trust is a foundation of security

  • Every software installation questions our trust

Initial installation

  • Digital signature should be confirmed during installation

Updates and patches

  • Some software updates are automatic
  • How secure are the updates?

Open source is not immune

  • Compromising the source code itself

SolarWinds Supply Chain Attack

SolarWinds Orion

  • Used by 18000 customers
  • Including Fortune 500 and US Federal Government

Software updates compromised in March and June 2020

  • Upgrades to existing installations
  • Not detected until December 2020

Additional breaches took advantage of the exploit

  • Microsoft, Cisco, Intel, Deloitte
  • Pentagon, Homeland Security, State Department, Department of Energy, National Nuclear Security Administration, Treasury

Misconfiguration Vulnerabilities

Open Permissions

Very easy to leave a door open

  • The hackers will always find it

Increasingly common with cloud storage

  • Statistical chance of finding an open permission

June 2017–14 million Verizon records exposed

  • Third-party left an Amazon S3 data repository open
  • Researcher found the data before anyone else

Many, Many other examples

  • Secure your permissions!

Unsecured Admin Accounts

The Linux root account

  • The Windows Administrator or superuser account

Can be misconfiguration

  • Intentionally configuring an easy-to-hack password
  • 123456, ninja, football

Disable direct login to the root account

  • Use the su or sudo option

Protect accounts with root or administrator access

  • There should not be a lot of these

Insecure Protocols

Some protocols aren’t encrypted

  • All traffic sent in the clear
  • Telnet, FTP, SMTP, IMAP

Verify with a packet capture

  • View everything sent over the network

Use the encrypted versions

  • SSH, SFTP, IMAPS

Default Settings

Every application and network device has a default login

  • Not all of these are ever changed

Mirai Botnet

  • Take advantage of default configurations
  • Takes over Internet of Things (IoT) devices
  • 60+ default configurations
  • Camera, routers, doorbells, garage door openers, etc.

Mirai released as open-source software

  • There’s a lot more where that came from

Open Ports and Services

Services will open ports

  • It’s important to manage access

Often managed with a firewall

  • Manage traffic flows
  • Allow or deny based on port number or application

Firewall rulesets can be complex

  • It’s easy to make mistake

Always test and audit

  • Double and triple check

Mobile Device Vulnerabilities

Mobile Device Security

Challenging to secure

  • Often need additional security policies and systems

Relatively small

  • Can be almost invisible

Almost always in motion

  • You never know where it might be

Packed with sensitive data

  • Personal and organizational

Constantly connected to the Internet

  • Nothing bad happens on the Internet

Jailbreaking/Rooting

Mobile devices are purpose built systems

  • You don’t have access to the OS

Gaining access

  • Android — Rooting
  • Apple iOS — Jailbreaking

Install custom firmware

  • Replaces the existing OS

Uncontrolled access

  • Circumvent security features
  • The MDM (Mobile Device Management) becomes relatively useless

Sideloading

Malicious apps can be a significant security concern

  • One Trojan horse can create a data breach

Manage installation sources

  • The global or local app store

Sideloading circumvents security

  • Apps can be installed manually without using an app store
  • Again, your MDM becomes relatively useless

Zero-day Vulnerabilities

Vulnerabilities

Many applications have vulnerabilities

  • We have just not found them yet

Someone is working hard to find the next big vulnerability

  • The good guys share these with developers

Attackers keep these yet-to-be-discovered holes to themselves

  • They want to use these vulnerabilities for personal gain

Zero-day Attacks

Attackers search for unknown vulnerabilities

  • They create exploits against these vulnerabilities

The vendor has no idea the vulnerability exists

  • They don’t have a fix for an unknown problem

Zero-day attacks

  • An attack without a patch or method of mitigation
  • A race to exploit the vulnerability or create a patch
  • Difficult to defend against the unknown

Common Vulnerabilities and Exposure (CVE)

Zero-day Attacks in the wild

April 2023 — Chrome zero-day

  • Memory corruption, sandbox escape

May 2023 — Microsoft zero-day patch

  • Secure boot zero-day vulnerability
  • Attackers can run UEFI-level self-signed code

May 2023 — Apple iOS and iPadOS zero-days

  • Three zero-day attacks
  • Sandbox escape, disclosure of sensitive information, arbitrary code execution
  • Active exploitation

An Overview of Malware

Malware

Malicious Software

  • These can be very bad

Gather information

  • Keystrokes

Show you advertising

  • Big money

Viruses and worms

  • Encrypt your data
  • Ruin your day

Malware Types and Methods

  • Viruses
  • Worms
  • Ransomware
  • Trojan Horse
  • Rootkit
  • Keylogger
  • Spyware
  • Bloatware
  • Logic bomb

How You Get Malware

These all work together

  • A worm takes advantage of a vulnerability
  • Installs malware that includes a remote access backdoor
  • Additional malware may be installed later

Your computer must run a program

  • Email link — Don’t click links
  • Web page pop-up
  • Drive-by download
  • Worm

Your computer is vulnerable

  • OS — Keep your OS updated
  • Applications — Check with the publisher

Your Data is Valuable

Personal Database

  • Family pictures and videos
  • Important documents

Organization data

  • Planning documents
  • Employee personally identifiable information (PII)
  • Financial records
  • Company private data

How much is it worth?

  • There’s a number

Ransomware

A particularly nasty malware

  • Your data is unavailable until you provide cash

Malware encrypts your data files

  • Pictures, documents, music, movies, etc.
  • Your OS remains available

You must pay the attackers to obtain the decryption key

  • Untraceable payment system
  • An unfortunate use of public-key cryptography

Protecting against Ransomware

Always have a backup

  • An offline backup, ideally

Keep your OS up to date

  • Patch those vulnerabilities

Keep your applications up-to-date

  • Security patches

Keep your anti-virus/anti-malware signatures up-to-date

  • New attacks every hour

Keep everything up-to-date

Viruses and Worms

Virus

Malware that can reproduce itself

  • It needs you to execute a program

Reproduces through file systems or the network

  • Just running a program can spread a virus

May or may not cause problems

  • Some viruses are invisible, some are annoying

Anti-virus is very common

  • Thousands of new viruses every week
  • Is your signature file updated?

Virus Types

Program viruses

  • It’s part of the application

Boot sector viruses

  • Who need an OS?

Script viruses

  • OS and browser-based

Macro viruses

  • Common in Microsoft Office

Fileless Virus

A stealth attack

  • Does a good job of avoiding anti-virus detection

Operates in memory

  • But never installed in a file or application

Worms

Malware that self-replicates

  • Doesn’t need you to do anything
  • Uses the network as a transmission medium
  • Self-propagates and spreads quickly

Worms are pretty bad things

  • Can take over many systems very quickly

Firewalls and IDS/IPS can mitigate many worms infestations

  • Doesn’t help much once the worm gets inside

Wannacry Worm

Spyware and Bloatware

Spyware

Malware that spies on you

  • Advertising, identity theft, affiliate fraud

Can trick you into installing

  • Peer to peer, fake security software

Browser monitoring

  • Capture surfing habits

Keyloggers

  • Capture every keystroke
  • Send your keystrokes back to the attacker

Protecting Against Spyware

Maintain your anti-virus/anti-malware

  • Always have the latest signatures

Always know what you’re installing

  • And watch your options during the installation

Where’s your backup?

  • You might need it someday
  • Cleaning adware isn’t easy

Run some scans

  • Malwarebytes

Bloatware

A new computer or phone

  • Includes the OS and important apps

Also includes applications you didn’t expect

  • And often don’t need

Apps are installed by the manufacturer

  • You didn’t get a choice

Uses valuable storage space

  • May also add to overall resource usage
  • The system may be slower than expected
  • Could open your system to exploits

Removing Bloatware

Identify and remove

  • This may be easier said than done

Use the built-in uninstaller

  • Works for most applications

Some apps have their own uninstaller

  • That’s how bad they are

Third-party uninstallers and cleaners

  • Probably not the first option
  • Always have a backup

Other Malware Types

Keyloggers

Your keystrokes contain valuable information

  • Website login URLs, passwords, email messages

Save all of your input

  • Send it to the bad guys

Circumvent encryption protections

  • Your keystrokes are in the clear

Other data logging

  • Clipboard logging, screen logging, instant messaging, search engine queries

Keylogger in action

Logic Bomb

Waits for a predefined event

  • Often left by someone with grudge

Time bomb

  • Time or date

User event

  • Logic bomb

Difficult to identify

  • Difficult to recover if it goes off

Real-world Logic Bomb

March 19, 2013, South Korea

  • Email wit malicious attachment sent to South Korean organizations
  • Posed as a bank email
  • Trojan installs a malware

March 20, 2013, 2 PM local time

  • Malware time-based logic bomb activates
  • Storage and master boot record (MBR) deleted, system reboots
Boot device not found.
Please install an Operating System on your hard disk.

Preventing a Logic Bomb

Difficult to recognize

  • Each is unique
  • No predefined signatures

Process and procedures

  • Formal change control

Electronic monitoring

  • Alerts on changes
  • Host-based intrusion detection, Tripwire, etc.

Constant auditing

  • An administrator can circumvent existing systems

Rootkits

Originally a Unix technique

  • The root in rootkit

Modifies core system files

  • Part of the kernel

Can be invisible to the OS

  • Won’t see it in the Task Manager

Also, invisible to traditional anti-virus utilities

  • If you cannot see it, you cannot stop it

Finding and Removing Rootkits

Look for the unusual

  • Anti-malware scans

Use a remover specific the rootkit

  • Usually built after the rootkit is discovered

Secure boot with UEFI

  • Security in the BIOS

Physical Attacks

Physical Attacks

Old school security

  • No keyboard, no mouse, no command line

Many ways to circumvent digital security

  • A physical approach must be considered

If you have physical access to a server, you have full control

  • An OS can’t stop an in-person attack

Door locks keep out the honest people

  • There’s always a way in

Brute Force

The physical version

  • No password required

Push through the obstruction

  • Brawn beats brains

Check your physical security

  • Check the windows
  • Try the doors

Attackers will try everything

  • You should be prepared for anything

RFID Cloning

RFID is everywhere

  • Access badges
  • Key fobs

Duplicators are on Amazon

  • Less than $50

The duplication process takes seconds

  • Read one card
  • Copy to another

This is why we have MFA

  • Use another factor with the card

Environmental Attacks

Attack everything supporting the technology

  • The operating environment

Power monitoring

  • An obvious attack

HVAC (Heating, Ventilation, and Air conditioning) and humidity controls

  • Large data centers must be properly cooled

Fire suppression

  • Watch for smoke or fire

Denial of Service

Denial of Service

Force a service to fail

  • Overload the service

Take advantage of a design failure or vulnerability

  • Keep your system patched!

Cause a system to be unavailable

  • Competitive advantage

Create a smokescreen for some other exploit

  • Precursor to a DNS spoofing attack

Doesn’t have to be complicated

  • Turn off the power

A “Friendly” DoS

Unintentional DoSing

  • It’s not always an né’er-do-well

Network DoS

  • Layer 2 loop without STP

Bandwidth DoS

  • Downloading multi-gigabyte Linux distribution over a DSL line

The water line breaks

  • Get a good shop vacuum

Distributed Denial of Service (DDoS)

Launch an army of computers to bring down a service

  • Use all the bandwidth or resources — traffic spike

This is why the attackers have botnets

  • Thousands or millions of computers at your command
  • At its peak, Zeus botnet infected over 3.6 million PCs
  • Coordinated attack

Asymmetric threat

  • The attacker may have fewer resources than the victim

DDoS Reflection and Amplification

Turn your small attack into a big attack

  • Often reflected off another device or service

An increasingly common network DDoS technique

  • Turn Internet services against the victim

Uses protocols with little (if any) authentication or checks

  • NTP, DNS, ICMP
  • A common example of protocol abuse

DNS Attacks

DNS Poisoning

Modify the DNS server

  • Requires some crafty hacking

Modify the client host file

  • The host file takes precedent over DNS queries

Send a fake response to a valid DNS request

  • Requires a redirection of the original request or the resulting response
  • Real-time redirection
  • This is an on-path attack

DNS Spoofing/Poisoning in Action

Domain Hijacking

Get access to the domain registration, and you have control where the traffic flows

  • You don’t need to touch the actual servers
  • Determines the DNS names and DNS IP addresses

Many ways to get into the account

  • Brute-force
  • Social engineer the password
  • Gain access to the email address that manages the account
  • The usual things

Saturday, October 22, 2016, 1 PM

  • Domain name registrations of 36 domains were changes
  • Brazilian bank
  • Desktop domains, mobile domains, and more

Under hacker control for 6 hours

  • The attackers became the bank

5 million customers, $27 billion in assets

  • Results of the hack have not been publicly released

URL Hijacking

Make money from your mistakes

  • There’s a lot of advertising on the Internet

Sell the badly spelled domain to the actual owner

  • Sell a mistake

Redirect to a competitor

  • Not as common, legal issues

Phishing site

  • Looks like the real site, please log in

Infect with a drive-by download

  • You’ve got malware!

Types of URL Hijacking

Typosquatting/brandjacking

  • Take advantage of poor spelling

Outright misspelling

  • professormesser.com vs. professormessor.com

A typing error

  • professormeser.com

A different phrase

  • professormessers.com

Different top-level domain

  • professormesser.org

Wireless Attacks

It started as a normal day

Surfing along on your wireless network

  • And then you’re not

And then it happens again

  • and again

You may not be able to stop it

  • There’s (almost) nothing you can do
  • Time to get a long patch cable

Wireless deauthentication

  • A significant wireless denial of service (DoS) attack

802.11 management frames

802.11 wireless includes a number of management features

  • Frames that make everything work
  • You never see them

Important for the operation of 802.11 wireless

  • How to find access points, manage QoS, associate/disassociate with an access point, etc.

Original wireless standards didn’t add protection for management frames

  • Sent in the clear, no authentication or validation

Protecting against deauth attacks

IEEE has already addressed the problem

  • Updates included with 802.11ac

Some important management frames are encrypted

  • Disassociate, deauthenticate, channel switch announcement, etc.

Not everything is encrypted

  • Beacons, probes, authentication, association

Radio Frequency (RF) Jamming

Denial of service

  • Prevent wireless communication

Transmit interfering wireless signals

  • Decrease the signal-to-noise ratio at the receiving device
  • The receiving device can’t hear the good signal

Sometimes it’s not intentional

  • Interference, not jamming
  • Microwave oven, fluorescent lights

Jamming is intentional

  • Someone wants your network to not work

Wireless Jamming

Many types

  • Constant, random bits/Constant, legitimate frames
  • Data sent at random times — random data and legitimate frames
  • Reactive jamming — only when someone else tries to communicate

Needs to be somewhere close

  • Difficult to be effective from a distance

Time to go fox hunting

  • You’ll need the right equipment to hunt down the jam
  • Directional antenna, attenuator

On-path Attacks

On-path Network Attack

How can an attacker watch without you knowing?

  • Formerly known as man-in-the-middle

Redirects your traffic

  • Then passes it on to the destination
  • You never know your traffic was redirected

ARP poisoning

  • On-path attack on the local IP subnet
  • ARP has no security

ARP Poisoning (Spoofing)

On-path Browser Attack

What if the middleman was on the same computer as the victim?

  • Malware/Trojan does all the proxy work
  • Formerly known as man-in-the-browser

Huge advantages for the attackers

  • Relatively easy to proxy encrypted traffic
  • Everything looks normal to the victim

The malware in your browser waits for you to log in to your bank

  • And cleans you out

Replay Attacks

Replay Attacks

Useful information is transmitted over the network

  • A crafty hacker will take advantage of this

Need access to the raw network data

  • Network tap, ARP poisoning
  • Malware on the victim computer

The gathered information may help the attacker

  • Replay the data to appear as someone else

This is not an on-path attack

  • The actual replay doesn’t require the original workstation

Pass the Hash

Avoid this type of replay attack with a salt or encryption

  • Use a session ID with the password hash to create a unique authentication hash each time

Cookies

  • Information stored on your computer by the browser

Used for tracking, personalization, session management

  • Not executable, not generally a security risk
    • Unless someone gets access to them

Could be considered be a privacy risk

  • Lots of personal data in there

Session IDs are often stored in the cookie

  • Maintains sessions across multiple browser sessions

Session Hijacking (Sidejacking)

Header Manipulation

Information gathering

  • Wireshark, Kismet

Exploits

  • Cross-site scripting

Modify header

  • Tamper, Firesheep, Scapy

Modify cookie

  • Cookies Manager+ (Firefox add-on)

Prevent Session Hijacking

Encrypt end-to-end

  • They can’t capture your session ID if they can’t see it
  • Additional load on the web server (HTTPS)
  • Firefox extension: HTTPS Everywhere, Force TLS
  • Many sites are now HTTPS-only

Encrypt end-to-somewhere

  • At least avoid capture over a local wireless network
  • Still in-the-clear for part of the journey
  • Personal VPN
Info

Firefox and Chromium based browser now by-default support strict HTTPS configuration policy, you don’t need a 3rd-party extension

Malicious Code

Exploiting a Vulnerability

An attacker can use many techniques

  • Social engineering
  • Default credentials
  • Misconfiguration

These don’t require technical skills

  • The door is already unlocked

There are still ways to get into a well-secured system

  • Exploit with malicious code
  • Knock the pins out of a door hinge

Malicious Code

The attackers use any opportunity

  • The types of malicious code are varied

Many forms

  • Executables, scripts, macro viruses, worms, Trojan horses, etc.

Protection comes from different sources

  • Anti-malware
  • Firewall
  • Continuous updates and patches
  • Secure computing habits

Malicious Code Examples

WannaCry ransomware

  • Executable exploited a vulnerability in Windows SMBv1
  • Arbitrary code execution

British Airways cross-site scripting

  • 22 lines of malicious JavaScript code placed on checkout pages
  • Information stolen from 380,000 victims

Estonian Central Health Database

  • SQL injection
  • Breached all healthcare information for an entire country

Application Attacks

Application Attacks

Injection Attacks

Code injection

  • Adding your own information into a data stream

Enabled because of bad programming

  • The application should properly handle input and output

So many injectable data types

  • HTML, SQL, XML, LDAP, etc.

Buffer Overflows

Overwriting a buffer of memory

  • Spills over into other memory area

Developers need to perform bounds checking

  • The attackers spend a lot of time looking for openings

Not a simple exploit

  • Takes time to avoid crashing things
  • Take time to make it do what you want

A really useful buffer overflow is repeatable

  • Which means that a system can be compromised

Replay attack

Useful information is transmitted over the network

  • A crafty hacker will take advantage of this

Need to access to the raw network data

  • Network tap, ARP poisoning.
  • Malware on the victim

The gathered information may help the attacker

  • Replay the data to appear as someone else

This is not an on-path attack

  • The actual replay doesn’t require the original workstation

Privilege Escalation

Gain higher-level access to a system

  • Exploit a vulnerability
  • Might be a bug or design flaw

Higher-level access means more capabilities

  • This commonly is the highest level access
  • This is obviously a concern

These are high-priority vulnerability patches

  • You want to get these holes closed very quickly

Horizontal privilege escalation

  • User A can access user B resources

Mitigating Privilege Escalation

Patch quickly

  • Fix the vulnerability

Updates anti-virus/anti-malware software

  • Block known vulnerabilities

Data Execution Prevention

  • Only data in executable areas can run

Address space layout randomization

  • Prevent a buffer overrun at a known memory address

Elevation of Privilege Vulnerability

CVE-2023-293366

  • Win32k Elevation of privilege vulnerability

Win32k Kernel Driver

  • Server 2008, 2008 R2, 2012, 2012 R2, 2016
  • Windows 10

Attacker would gain SYSTEM privileges

  • The highest level access

Cross-site Request

Cross-site requests are common and legitimate

  • You visit professormesser.com
  • Your browser loads text from the professormesser.com server
  • It loads a video from YouTube
  • And pictures from Instagram

HTML on professormesser.com directs requests from your browser

  • This is normal and expected
  • Most of these are unauthenticated requests

The Client and the Server

Website pages consist of client-side code and server-side code

  • Many moving parts

Client-side

  • Renders the page on the screen
  • HTML, JavaScript

Server-side

  • Performs requests from the client
  • HTML, PHP
  • Transfer money from one account to another
  • Post a video on YouTube

Cross-site Request Forgery

One-click attack, session riding

  • XSRF, CSRF (sea surf)

Takes advantage of the trust that a web application has for the user

  • The website trusts your browser
  • Requests are made without your consent or your knowledge
  • Attacker posts a Facebook status on your account

Significant web application development oversight

  • The application should have anti-forgery techniques added
  • Usually a cryptographic token to prevent a forgery

Directory Transversal

Directory transversal/path transversal

  • Read files from a web server that are outside the website’s file directory
  • Users shouldn’t be able to browse the Windows Folder

Web server software vulnerability

  • Won’t stop users from browsing past the web server root

Web application code vulnerability

  • Take advantage of badly written code

Cryptographic Attacks

Cryptographic Attacks

You’ve encrypted data and sent it to another person

  • Is it really secure?
  • How do you know?

The attacker doesn’t have the combination (the key)

  • So they break the safe (the cryptography)

Finding ways to undo the security

  • There are many potential cryptographic shortcomings
  • The problem is often the implementation

Birthday Attack

In a classroom of 23 students, what is the chance of two students sharing a birthday?

  • About 50%
  • For a class of 30, the chance is about 70%

In the digital word, this is a hash collision

  • A hash collision is the same hash value for two different plaintexts
  • Find a collision through brute force

The attacker will generate multiple versions of plaintext to match the hashes

  • Protect yourself with a large hash output size

Collisions

Hash digests are supposed to be unique

  • Different input data should not create the same hash

MD5 hash

  • Message Digest Algorithm 5
  • First published in April 1996

December 2008: Researchers created CA certificate that appeared legitimate when MD5 is checked

  • Built other certificates that appeared to be legit and issued by RapidSSL

Downgrade Attack

Instead of using perfectly good encryption, use something that’s not so great

  • Force the systems to downgrade their security

SSL stripping

  • Combines an on-path attack with a downgrade attack
  • Difficult to implement, but big returns for the attacker
  • Attacker must sit in the middle of the conversation
  • Victims browser page isn’t encrypted
  • Strips the S away from HTTPS

Plaintext/Unencrypted Passwords

Some applications store passwords “in the clear”

  • No encryption. You can read the stored password
  • This is rare, thankfully.

Do not store passwords as plaintexts

  • Anyone with access to the password file or database has every credential

What to do if your application saves passwords as plaintext

  • Get a better application

Hashing a password

Hashes represent data as a fixed-length string of text

  • A message digest, or “fingerprint”

Will not have a collision (hopefully)

  • Different inputs will not have the same hash

One-way trip

  • Impossible to recover the original message from the digest
  • A common way to store passwords

A Hash Example

SHA-256 hash

  • Used in many applications

The Password File

Different across OSes and applications

  • Different hash algorithms

Spraying Attack

Try to log in with an incorrect password

  • Eventually you’ll be locked out

There are some common passwords

Attack an account with the top three (or more) passwords

  • If they don’t work, move to the next account
  • No lockouts, no alarms, no alerts

Brute-force

Try every possible password combination until the hash is matched

This might take some time

  • A strong hashing algorithm slows things down

Brute-force attacks — Online

  • Keep trying the login process
  • Very slow
  • Most accounts will lock out after a number of failed attempts

Brute-force the hash — Offline

  • Obtain the list of users and hashes
  • Calculate a password hash, compare it to a stored hash
  • Large computational resource requirement

Indicators of Compromise

Indicators of Compromise (IOC)

An event that indicates an intrusion

  • Confidence is high
  • He’s calling from inside the house

Indicators

  • Unusual amount of network activity
  • Change to file hash values
  • Irregular international traffic
  • Changes to DNS data
  • Uncommon login patterns
  • Spikes of read requests to certain files

Account Lockout

Credentials are not working

  • It wasn’t you this time

Exceeded login attempts

  • Account is automatically locked

Account was administratively disabled

  • This would be a larger concern

This may be part of a larger plan

  • Attacker locks account
  • Calls support line to reset the password

Concurrent Session Usage

It’s challenging to be two places at one time

  • Laws of Physics

Multiple account logins from multiple locations

  • Interactive access from a single user
  • You don’t have a clone

This can be difficult to track down

  • Multiple devices and desktops
  • Automated processes

Blocked Content

An attacker wants to stay as long as possible

  • Your system has been unlocked
  • Keep the doors and windows open

There’s probably a security patch available

  • Time to play keep-away

Blocked content

  • Auto-update connections
  • Links to security patches
  • Third-party anti-malware sites
  • Removal tools

Impossible Travel

Authentication logs can be telling

  • Logon and logoff

Login from Omaha, Nebraska, United States

  • The company headquarters

Three minutes later, a login from Melbourne, Victoria, Australia

  • Alarm bells should be ringing

This should be easy to identify

  • Log analysis and automation

Resource Consumption

Every attacker’s action has an equal and opposite reaction

  • Watch carefully for significant changes

File transfers use bandwidth

  • An unusual spike at 3 AM

Firewall logs show the outgoing transfer

  • IP addresses, timeframes

Often the first real notification of an issue

  • The attacker may have been here for months

Resource Inaccessibility

The server is down

  • Not responding

Network disruption

  • A cover for the actual exploit

Server outage

  • Result of an exploit gone wrong

Encrypted data

  • A potential ransomware attack begins

Brute force attack

  • Locks account access

Out-of-Cycle Logging

Out-of-Cycle

  • Occurs at an unexpected time

OS patch logs

  • Occurring outside the normal patch day
  • Keep that exploited system safe from other attackers!

Firewall log activity

  • Timestamps of every traffic flow
  • Protocols and applications used

Missing logs

Log information is evidence

  • Attackers will try to cover their tracks by removing logs

Information is everywhere

  • Authentication logs
  • File access logs
  • Firewall logs
  • Proxy logs
  • Server logs

The logs may be incriminating

  • Missing logs are certainly suspicious
  • Logs should be secured and monitored

Published/Documented

The entire attack and data exfiltration may go unnoticed

  • It happens quite often

Company data may be published online

  • The attackers post a portion or all data
  • This may be in conjunction with ransomware

Raw data may be released without context

  • Researchers will try to find the source

Segmentation and Acess Control

Segmenting the Network

Physical, logical, or virtual segmentation

  • Devices, VLANs, virtual networks

Performance

  • High-bandwidth applications

Security

  • Users should not talk directly to database servers
  • The only applications in the core are SQL and SSH

Compliance

  • Mandated segmentation (PCI compliance)
  • Makes change control much easier

Access Control Lists (ACLs)

Allow or disallow traffic

  • Groupings of categories
  • Source IP, Destination IP, port number, time of day, application, etc.

Restrict access to network devices

  • Limit by IP address, or other identifier
  • Prevent regular user/non-admin access

Be careful when configuring these

  • You can accidentally lock yourself out

List the permissions

  • Bob can read files
  • Fred can access the network
  • James can access network 192.168.1.0/24 using TCP ports 80, 443, 8088

Many OSes use ACLs to provide access to files

  • A trustee and the access rights allowed

Application Allow List/Deny List

Any application can be dangerous

  • Vulnerabilities, Trojan Horses, malware

Security policy can control app execution

  • Allow list, deny/block list

Allow list

  • Nothing runs unless it’s approved
  • Very restrictive

Deny list

  • Nothing on the “bad list” can be executed
  • Anti-virus, anti-malware

Examples of Allow and Deny Lists

Decisions are made in the OS

  • Often built-in to the OS management

Application hash

  • Only allows applications with this unique identifier

Certificate

  • Allow digitally signed apps from certain publishers

Path

  • Only run applications in these folders

Network Zone

  • The apps can only run from this network zone

Mitigation Techniques

Mitigation Techniques

Patching

Incredibly important

  • System stability, security fixes

Monthly updates

  • Incremental (and important)

Third-party updates

  • Application developers, device drivers

Auto-update

  • Not always the best option

Emergency out-of-band updates

Encryption

Prevent access to application data files

  • File system encryption

File level encryption

  • Windows EFS

Full disk encryption (FDE)

  • Encrypt everything on the drive
  • BitLocker, FileVault, etc.

Application data encryption

  • Managed by the app
  • Stored data is protected

Monitoring

Aggregate information from devices

  • Built-in sensors, separate devices
  • Integrated into servers, switches, routers, firewalls, etc.

Sensors

  • Intrusion prevention systems, firewall logs, authentication logs, web server access logs, database transaction logs, email logs

Collectors

  • Proprietary consoles (IPS, Firewall), SIEM consoles, syslog servers
  • Many SIEMs include a correlation engine to compare diverse sensor data

Least Privilege

Rights and permissions should be set to the base minimum

  • You only get exactly what’s needed to complete your objective

All user accounts must be limited

  • Applications should run with minimal privileges

Don’t allow users to run with administrative privileges

  • Limit the scope of malicious behavior

Configuring Enforcement

Perform a posture assessment

  • Each time a device connects

Extensive check

  • OS patch version
  • EDR (Endpoint Detection and Response) version
  • Status of firewall and EDR
  • Certificate status

Systems out of compliance are quarantined

  • Private VLAN with limited access
  • Recheck after making corrections

Decommissioning

Should be a formal policy

  • Don’t throw your data into the trash
  • Someone will find this later

Mostly associated with storage devices

  • Hard drive
  • SSD
  • USB drives

Many options for physical devices

  • Recycle the device for use in another system
  • Destroy the device

Hardening Techniques

System Hardening

Many and varied

  • Windows, Linux, iOS, Android, etc.

Updates

  • OS updates/service packs, security patches

User accounts

  • Minimum password lengths and complexity
  • Account Limitations

Network access and security

  • Limit network access

Monitor and secure

  • Anti-virus, anti-malware

Encryption

Prevent access to application data files

  • File system encryption
  • Windows Encrypting Files System (EFS)

Full disk encryption (FDE)

  • Encrypt everything on the drive
  • Windows BitLocker, macOS FileVault, etc.

Encrypt all network communication

  • Virtual Private Network (VPN)
  • Application encryption

The Endpoint

The user’s access

  • Applications and data

Stop the attackers

  • Inbound attacks
  • Outbound attacks

Many platforms

  • Mobile, Desktop

Protection is multi-faceted

  • Defense in depth

Endpoint Detection and Response (EDR)

A different method of threat detection

  • Scale to meet the increasing number of threats

Detect a threat

  • Signatures aren’t the only detection tool
  • Behavior analysis, machine learning, process monitoring
  • Lightweight agent on the endpoint

Investigate the threat

  • Root cause analysis

Respond to the threat

  • Isolate the system, quarantine the threat, rollback to a previous config
  • API driven, no user or technician intervention required

Host-based Firewall

Software based firewall

  • Personal firewall, runs on every endpoint

Allow or disallow incoming or outgoing application traffic

  • Control by application process
  • View all data

Identify and block unknown processes

  • Stop malware before it can start

Finding Intrusions

Host based Intrusion Prevention System (IPS)

  • Recognize and block known attacks
  • Secure OS and application configs, validate incoming service requests
  • Often built into endpoint protection software

HIPS identification

  • Signature, heuristics, behavioral
  • Buffer overflows, registry updates, writing files to the Windows folder
  • Access to non-encrypted data

Open Ports and Services

Every open port is a possible entry point

  • Close everything except required ports

Control access with a firewall

  • NGFW would be ideal

Unused or unknown services

  • Installed with the OS or from other applications

Applications with broad port ranges

  • Open port 0 through 65,535

Use nmap or similar port scanner to verify

  • Ongoing monitoring is important

Default Password Changes

Every network device has a management interface

  • Critical systems, other device

Many applications also have management or maintenance interfaces

  • These can contain sensitive data

Change default settings

  • Passwords

Add additional security

  • Require additional logon
  • Add 3rd-party authentication

Removal of Unnecessary Software

All software contains bugs

  • Some of those bugs are security vulnerabilities

Every application seems to have a completely different patching process

  • Can be challenging to manage ongoing updates

Remove all unused software

  • Reduce your risk
  • An easy fix

Architecture Models

Warning

The soaring Cloud Computing costs, unexpected high bills, and multitude of hidden charges, make Cloud a lot less viable option than on-prem options. Depending on the organization’s needs and size, On-premise Cloud Computing will be a cheaper alternative.

The Cloud Tipping Point | Lawrence Systems

Leaving the Cloud | The Rework Podcast

Why you’re addicted to cloud computing | Fireship

Cloud Responsibility Matrix

IaaS, PaaS, SaaS, etc.

  • Who is responsible for security?

Security should be well documented

  • Most cloud providers provide a matrix of responsibilities
  • Everyone knows up front

These responsibilities can vary

  • Different cloud providers
  • Contractual agreements

Hybrid Considerations

Hybrid cloud

  • More than one public or private cloud
  • This adds additional complexity

Network protection mismatches

  • Authentication across platforms
  • Firewall configurations
  • Server settings

Different security monitoring

  • Logs are diverse and cloud-specific

Data leakage

  • Data is shared across public Internet

Third-Party Vendors in the Cloud

You, the cloud provider, and the third parties

  • Infrastructure technologies
  • Cloud-based appliances

Ongoing vendor risk assessments

  • Part of an overall vendor risk management policy

Include third-party impact for incident response

  • Everyone is part of the process

Constant monitoring

  • Watch for changes and unusual activity

Infrastructure as Code

Describe an infrastructure

  • Define servers, network, and applications as code

Modify the infrastructure and create versions

  • The same way you version application code

Use the description (code) to build other application instances

  • Build it the same way every time based on the code

An important concept for cloud computing

  • Build a perfect version every time

Serverless Architecture

Function as a Service (FaaS)

  • Applications are separated into individual, autonomous functions
  • Remove the OS from the equation

Developer still creates the server-side logic

  • Runs in a stateless compute container

May be event triggered and ephemeral

  • May only run for one event

Managed by a third-party

  • All OS security concerns are at the third party

Microservices and APIs

Monolithic applications

  • One big application that does everything

Application contains all decision-making process

  • User interface
  • Business logic
  • Data input and output

Code challenges

  • Large codebase
  • Change control challenges

APIs

  • Application Programming Interface

API is the “glue” for the microservices

  • Work together to act as the application

Scalable

  • Scale just the microservices you need

Resilient

  • Outages are contained

Security and compliance

  • Containment is built-in

Network Infrastructure Concepts

Physical Isolation

Devices are physically separate

  • Air gap between Switch A and Switch B

Must be connected to provide communication

  • Direct connect, or another switch or router

Web servers in one rack

  • Database servers on another

Customer A on one switch, customer B on another

  • No opportunity for mixing data

Physical Segmentation

Separate devices

  • Multiple units, separate infrastructure

Logical Segmentation with VLANs

Virtual Local Area Networks (VLANs)

  • Separated logically instead of physically
  • Cannot communicate between VLANs without a Layer 3 device/router

SDN (Software Defined Networking)

Networking devices have different functional planes of operation

  • Data, control, and management planes

Split the functions into separate logical units

  • Extend the functionality and management of a single device
  • Perfectly built for the cloud

Infrastructure layer/Data plane

  • Process the network frames and packets
  • Forwarding, trunking, encrypting, NAT

Control layer/Control plane

  • Manages the actions of the data plane
  • Routing tables, session tables, NAT tables
  • Dynamic routing protocol updates

Application layer/Management plane

  • Configure and manage the device
  • SSH, browser, API

Extend the Physical Architecture

SDN Data Flows

SDN Security

Other Infrastructure Concepts

Attacks can happen anywhere

Two categories for IT security

  • The on-premises data is more secure!
  • The cloud-based data is more secure!

Cloud-based security is centralized and costs less

  • No dedicated hardware, no data center to secure
  • A third party handles everything

On-premises puts the security burden on the client

  • Data center security and infrastructure costs

Attackers want your data

  • They don’t care where it is

On-premises Security

Customize your security posture

  • Full control when everything is in-house

On-site IT team can manage security better

  • The local team can ensure everything is secure
  • A local team can be expensive and difficult to staff

Local team maintains uptime and availability

  • System checks can occur at any time
  • No phone call for support

Security changes can take time

  • New equipment, configurations, additional costs

Centralized vs. Decentralized

Most organizations are physically decentralized

  • Many locations, cloud providers, OSes, etc.

Difficult to manage and protect so many diverse systems

  • Centralize the security management

A centralized approach

  • Correlated alerts
  • Consolidated log file analysis
  • Comprehensive system status and maintenance/patching

It’s not perfect

  • Single point of failure, potential performance issues

Virtualization

Virtualization

  • Run different OSes on the same hardware

Each application instance has its own OS

  • Adds overhead and complexity
  • Virtualization is relatively expensive

Application Containerization

Container

  • Contains everything you need to run an application
  • Code and dependencies
  • A standardized unit of software

An isolated process in a sandbox

  • Self-contained
  • Apps can’t interact with each other

Container image

  • A standard for portability
  • Lightweight, uses the host kernel
  • Secure separation between applications

Virtualized vs. Containerized

IoT (Internet of Things)

Sensors

  • Heating and cooling, lighting

Smart devices

  • Home automation, video doorbells

Wearable technology

  • Watches, health monitors

Facility automation

  • Temperature, air quality, lighting

Weak defaults

  • IOT manufacturers are not security professionals

SCADA/ICS

Supervisory Control and Data Acquisition System

  • Large-scale, multi-site Industrial Control Systems (ICS)

PC manages equipment

  • Power generation, refining, manufacturing equipment
  • Facilities, industrial, energy, logistics

Distributed control systems

  • Real-time information
  • System control

Requires extensive segmentation

  • No access from the outside

RTOS (Real-Time Operating System)

An OS with a deterministic processing schedule

  • No time to wait for other processes
  • Industrial equipment, automobiles
  • Military environments

Extremely sensitive to security issues

  • Non-trivial systems
  • Need to always be available
  • Difficult to know what type of security is in place

Embedded Systems

Hardware and software designed for a specific function

  • Or to create as part of a larger system

Is built with only this task in mind

  • Can be optimized for size and/or cost

Common examples

  • Traffic light controllers
  • Digital watches
  • Medical imaging systems

High Availability

Redundancy doesn’t mean always available

  • May need to be powered on manually

HA (High availability)

  • Always on, always available

Many include many components working together

  • Active/active can provide scalability advantages

Higher availability almost always means higher costs

  • There’s always another contingency you could add
  • Upgraded power, high-quality server components, etc.

Infrastructure Consideration

Availability

System uptime

  • Access data, complete transactions
  • A foundation of IT security

A balancing act with security

  • Available, but only to the right people

WE spend a lot of time and money on availability

  • Monitoring, redundant systems

An important metric

  • We are often evaluated on total available time

Resilience

Eventually, something will happen

  • Can you maintain availability?
  • Can you recover? How quickly?

Based on many variables

  • The root cause
  • Replacement hardware installations
  • Software patch availability
  • Redundant systems

Commonly referenced as MTTR

  • Mean Time to Repair

Cost

How much money is required?

  • Everything ultimately comes down to cost

Initial installation

  • Very different across platforms

Ongoing maintenance

  • Annual ongoing cost

Replacement or repair costs

  • You might need more than one

Tax implications

  • Operating or capital expense

Responsiveness

Request information

  • Get a response
  • How quickly did that happen?

Especially important for interactive applications

  • Humans are sensitive to delays

Speed is an important metric

  • All parts of the application contribute
  • There’s always the weakest link

Scalability

How quickly and easily can we increase or decrease capacity?

  • This might happen many times a day
  • Elasticity

There’s always a resource challenge

  • What’s preventing scalability?

Needs to include security monitoring

  • Increases and decreases as the system scales

Ease of Deployment

An application has many moving parts

  • Web server, database, caching server, firewall, etc.

This might be an involved process

  • Hardware resources, cloud budgets, change control

This might be very simple

  • Orchestration/automation

Important to consider during the product engineering phase

  • One missed detail can cause deployment issues

Risk Transference

Many methods to minimize risk

  • Transfer the risk to a third party

Cybersecurity insurance

  • Attacks and downtime can be covered
  • Popular with the rise in ransomware

Recover internal losses

  • Outages and business downtime

Protect against legal issues from customers

  • Limit the costs associated with legal proceedings

Ease of Recover

Something will eventually go wrong

  • Time is money
  • How easily can you recover?

Malware infection

  • Reload OS from original media — 1 hour
  • Reload from corporate image — 10 minutes

Another important design criteria

  • This may be critical to the final product

Patch Availability

Software isn’t usually static

  • Bug fixes, security updates, etc.

This is often the first task after installation

  • Make sure you’re running the latest version

Most companies have regular updates

  • Microsoft’s monthly patch schedule

Some companies rarely patch

  • This might be a significant concern

Inability to Patch

What if patching wasn’t an option?

  • This often happens than you might think

Embedded systems

  • HVAC controls
  • Time clocks

Not designed for end-user updates

  • This is a bit short-sighted
  • Especially these days

May need additional security controls

  • A firewall for your time clock

Power

A foundational element

  • This can require extensive engineering

Overall power requirements

  • Data center vs. office building

Primary power

  • One or more providers

Backup services

  • UPS (Uninterruptible Power Supply)
  • Generators

Compute

An application’s heavy lifting

  • More than just a single Compute

The compute engine

  • More options available in the cloud

May be limited to a single processor

  • Easier to develop

Use multiple CPUs across multiple clouds

  • Addtional complexity
  • Enhanced scalability

Applying Security Principles

Secure Infrastructures

Device Placement

Every network is different

  • There are often similarities

Firewalls

  • Separate trusted from untrusted
  • Provide additional security checks

Other services may require their own security technologies

  • Honeypots, jump server, load balancers, sensors

Security Zone

Zone-based security technologies

  • More flexible (and secure) than IP address ranges

Each area of the network is associated with a zone

  • Trusted, untrusted
  • Internal, external
  • Inside, Internet, Servers, Databases, Screened

This simplifies security policies

  • Trusted to Untrusted
  • Untrusted to Screened
  • Untrusted to Trusted

Attack Surface

How many ways into your home?

  • Doors, windows, basements

Everything can be a vulnerability

  • Application code
  • Open ports
  • Automated process
  • Human error

Minimize the surface

  • Audit the code
  • Block ports on the firewall
  • Monitor network traffic in real-time

Connectivity

Everything contributes to security

  • Including the network connection

Secure network cabling

  • Protect the physical drops

Application-level encryption

  • The hard work has already been done

Network-level encryption

  • IPsec tunnels, VPN connections

Intrusion Prevention

Intrusion Prevention System (IPS)

Intrusion Prevention System

  • Watch network traffic

Intrusions

  • Exploits against OSes, applications, etc.
  • Buffer overflows, cross-site scripting, other vulnerabilities

Detection vs. Prevention

  • Intrusion Detection System (IDS) — Alarm or alert
  • Prevention — Stop it before it gets into the network

Failure Modes

We hope for 100% uptime

  • This obviously isn’t realistic
  • Eventually, something will break

Fail-open

  • When a system fails, data continues to flow

Fail-closed

  • When a system fails, data does not flow

Device Connections

Active monitoring

  • System is connected inline
  • Data can be blocked in real-time as it passes by
  • Intrusion prevention is commonly active

Passive monitoring

  • A copy of the network traffic is examined using a tap or port monitor
  • Data cannot be blocked in real-time
  • Intrusion detection is commonly passive

Active Monitoring

Malicious traffic is immediately identified

  • Dropped at the IPS
  • Doesn’t proceed through the network

Passive Monitoring

Examine a copy of the traffic

  • Port mirror (SPAN), network tap

No way to block (prevent) traffic

  • Common with Intrusion Detection Systems

Network Appliances

Jump Server

Access secure network zones

  • Provides an access mechanism to a protected network

Highly-secured device

  • Hardened and monitored

SSH/Tunnel/VPN to the jump server

  • RDP, SSH, or jump from there

A significant security concern

  • Compromise of the jump server is a significant breach

Proxies

  • Sits between the users and the external network
  • Receives the user requests and sends the request on their behalf (the proxy)
  • Useful for caching information, access control, URL filtering, content scanning
  • Applications may need to know how to use the proxy (explicit)
  • Some proxies are invisible (transparent)
    • Users don’t need to configure anything for the proxy to work on their end

Application Proxies

One of the simplest “proxies” is NAT

  • A network level proxy

Most proxies in use are application proxies

  • The proxy understands the way the application works

A proxy may only know one application

  • HTTP

Many proxies are multipurpose proxies

  • HTTP, HTTPS, FTP, etc.

Forward Proxy

An “internal proxy”

  • Commonly used to protect and control user access to the Internet

Reverse Proxy

Inbound traffic from the Internet to your internal service

Open Proxy

A third party, uncontrolled proxy

  • Can be a significant security concern
  • Often used to circumvent existing security controls

Balancing the Load

Distribute the load

  • Multiple servers
  • Invisible to the end-user

Large-scale implementations

  • Web server farms, database farms

Fault tolerance

  • Server outages have no effect
  • Very fast convergence

Active/active Load Balancing

Configurable load

  • Manage across servers

TCP offload

  • Protocol overhead

SSL offload

  • Encryption/Decryption

Caching

  • Fast response

Prioritization

  • QoS

Content Switching

  • Application-centric balancing

Active/Passive Load Balancing

Some servers are active

  • Others are on standby

If an active server fails, the passive server takes its place

Sensors and Collectors

Aggregate information from network devices

  • Built-in sensors, separate devices
  • Integrated into switches, routers, servers, firewalls, etc.

Sensors

  • Intrusion prevention systems, firewall logs, authentication logs, web server access logs, database transaction logs, email logs

Collectors

  • Proprietary consoles (IPS, firewall), SIEM consoles, syslog serves
  • Many SIEMs include a correlation engine to compare diverse sensor data

Port Security

We have created many authentication methods through the years

  • A network administrator has many choices

Use a username and password

  • Other factors can be included

Commonly used on wireless networks

  • Also works on wired networks

EAP

Extensible Authentication Protocol (EAP)

  • An authentication framework

Many ways to authenticate based on RFC standards

  • Manufacturers can build their own EAP methods

EAP integrates with 802.1X

  • Prevents access to the network until the authentication succeeds

IEEE 802.1X

IEEE 802.1X

  • Port-based Network Access Control (NAC)
  • You don’t get access to the network until you authenticate

EAP integrates with 802.1X

  • Extensible Authentication Protocol
  • 802.1X prevents access to the network until the authentication succeeds

Used in conjunction with an authentication database

  • RADIUS, LDAP, TACACS+, Kerberos, etc.

IEEE 802.1X and EAP

  • Supplicant — The client
  • Authenticator — The device that provides access
  • Authentication server — Validates the client credentials

Firewall Types

The Universal Security Control

Standard issue

  • Home, office, and in your OS

Control the flow of network traffic

  • Everything passes through the firewall

Corporate control of outbound and inbound data

  • Sensitive materials

Control of inappropriate content

  • Not safe for work, parental controls

Protection against evil

  • Anti-virus, anti-malware

Network-based Firewalls

Filter traffic by port number or application

  • OSI layer 4 vs. OSI layer 7
  • Traditional vs. NGFW firewalls

Encrypt traffic

  • VPN between sites

Most firewalls can be a layer 3 devices (routers)

  • Often sits on the ingresses/egress of the network
  • Network Address Translation (NAT) functionality
  • Authenticate dynamic routing communication

UTM/ All-in-one Security Appliance

  • Unified Threat Management (UTM)/Web Security gateway
  • URL filter/Content inspection
  • Malware inspection
  • Spam filter
  • CSU (Channel Service Unit)/DSU (Data Service Unit)
  • Router, Switch
  • Firewall
  • IDS/IPS
  • Bandwidth shaper
  • VPN endpoint

[! Warning] Using all features at once, will slow down the network. So enable those only you need.

Next-generation Firewall (NGFW)

The OSI Application Layer

  • All data in every packet

Can be called different names

  • Application layer gateway
  • Stateful multilayer inspection
  • Deep packet inspection

Requires some advanced decodes

  • Every packet must be analyzed and categorized before a security decision is determined

Network-based Firewalls

  • Control traffic flows based on the application
    • Microsoft SQL server, Twitter/X, YouTube

Intrusion Prevention Systems

  • Identify the application
  • Apply application-specific vulnerability signatures to the traffic

Content filtering

  • URL filters
  • Control website traffic by category

Web Application Firewall (WAF)

Not like a “normal” firewall

  • Applies rules to HTTP/HTTPS conversations

Allow or deny based on expected input

  • Unexpected input is a common method of exploiting an application

SQL injection

  • Add your own commands to an application’s SQL query

A major focus of Payment Card Industry Data Security Standard (PCI DSS)

Secure Communication

VPN

Virtual Private Networks

  • Encrypted (private) data transversing a public network

Concentrator

  • Encryption/decryption access device
  • Often integrated into a firewall

Many deployment options

  • Specialized cryptographic hardware
  • Software-based options available

Used with client software

  • Sometimes built into the OS

Encrypted Tunnel

Keep data private across the public internet

  • Encryption is the key

Encrypt your data

  • Add new headers and trailers

Decrypt on the other side

  • Original data is delivered

SSL/TLS VPN (Secure Sockets Layer VPN)

Uses common SSL/TLS protocol (TCP/443)

  • (Almost) No firewall issues

No big VPN clients

  • Usually remote access communication

Authenticate users

  • No requirement for digital certificates or shared passwords (like IPSec)

Can be run from a browser or from a (usually light) VPN client

  • Across many OSes

On-demand access from a remote device

  • Software connects to a VPN concentrator

Some software can be configured as always-on

Site-to-site IPsec VPN

Always-on

  • Or almost always

Firewalls often act as VPN concentrators

  • Probably already have firewalls in place

SD-WAN

Software Defined Networking in a Wide Area Network

  • A WAN built for the cloud

The data center used to be in one place

  • The cloud has changed everything

Cloud-based applications communicate directly to the cloud

  • No need to hop through a central point

Old Datacenters Design:

Cloud First Design:

SW-WAN:

Secure Access Service Edge (SASE)

Update secure access for cloud services

  • Securely connect from different locations

Secure Access Service Edge (SASE)

  • A “next generation” VPN

Security technologies are in the cloud

  • Located close to existing cloud services

SASE clients on all device

  • Streamlined and automatic

Selection of Effective Controls

Many security options

  • Selecting the right choice can be challenging

VPN

  • SSL/TLS VPN for user access
  • IPsec tunnels for site-to-site access

SD-WAN

  • Manage the network connectivity to the cloud
  • Does not adequately address security concerns

SASE

  • A complete network and security solution
  • Requires planning and implementation

Protecting Data

Data Types and Classification

Data Types

Regulated

  • Managed by a third-party
  • Government laws and statutes

Trade secret

  • An organization’s secret formulas
  • Often unique to an organization

Intellectual property

  • May be publicly visible
  • Copyright and trademark restrictions

Legal information

  • Court records and documents, judge and attorney information, etc.
  • PII and other sensitive details
  • Usually stored in many systems

Financial information

  • Internal company financial details
  • Customer finances
  • Payment records
  • Credit card data, bank records, etc.

Human-readable

  • Humans can understand the data
  • Very clear and obvious

Non-human readable

  • Not easily understood by humans
  • Encoded data
  • Barcodes
  • Images

Some formats are a hybrid

  • CSV, XML, JSON, etc.

Classifying Sensitive Data

Not all data has the same level of categorization

  • License tag numbers vs. health records

Different levels require different security and handling

  • Additional permissions
  • A different process to view
  • Restricted network access

Data Classifications

Proprietary

  • Data that is the property of an organization
  • May also include trade secrets
  • Often data unique to an organization

PII — Personally Identifiable Information

  • Data that can be used to identify an individual
  • Name, data of birth, mother’s maiden name, biometric information

PHI — Protected Health Information

  • Health information associated with an individual
  • Health status, health care records, payments for health care, and much more

Sensitive

  • Intellectual property, PII, PHI

Confidential

  • Very sensitive, must be approved to view

Public/Unclassified

  • No restrictions on viewing the data

Private/Classified/Restricted

  • Restricted access, may require an NDA

Critical

  • Data should always be available

States of Data

Data at rest

The data is on a storage device

  • Hard drive, SSD, flash drive, etc.

Encrypt the data

  • Whole disk encryption
  • Database encryption
  • File or folder-level encryption

Apply permissions

  • Access control lists
  • Only authorized users can access the data

Data in transit

Data transmitted over the network

  • Also called data in-motion

Not much protection as it travels

  • Many switches, routers, devices

Network-based protection

  • Firewall, IPS

Provide transport encryption

  • TLS (Transport Layer Security)
  • IPsec (Internet Protocol Security)

Data in use

Data is actively processing in memory

  • System RAM, CPU registers and cache

The Data is almost always decrypted

  • Otherwise, you couldn’t do anything with it

The attackers can pick the decrypted information out of RAM

  • A very attractive option

Target Corp. breach — November 2013

  • 110 million credit cards
  • Data in-transit encryption and data at-rest encryption
  • Attackers picked the credit card numbers out of the point-of-sale RAM

Data Sovereignty

Data sovereignty

  • Data that resides in a country is subject to the laws of that country
  • Legal monitoring, court orders, etc.

Laws may prohibit where data is stored

  • GDPR (General Data Protection Regulation)
  • Data collected on EU citizens must be stored in the EU
  • A complex mesh of technology and legalities

Where is your data stored?

  • Your compliance laws may prohibit moving data out of the country

Geolocation

Location details

  • Tracks within a localized area

Many ways to determine location

  • 802.11, mobile providers, GPS

Can be used to manage data access

  • Prevent access from other countries

Limit administrative tasks unless secure area is used

  • Permit enhanced access when inside the building

Protecting Data

Geographic Restrictions

Network location

  • Identify based on IP subnet
  • Can be difficult with mobile devices

Geolocation — determine a user’s location

  • GPS — mobile devices, very accurate
  • 802.11 wireless, less accurate
  • IP address, not very accurate

Geo-fencing

  • Automatically allow or restrict access when the user is in a particular location
  • Don’t allow this app to run unless you’re near the office

A primary job task

  • An organization is out of business without data

Data is everywhere

  • ON a storage drive, on the network, in a CPU

Protecting the data

  • Encryption, security policies

Data permissions

  • Not everyone has the same access

Encryption

Encode information into unreadable data

  • Original information is plaintext, encrypted form is ciphertext

This is a two-way street

  • Convert between one and the other
  • IF you have the proper key

Confusion

  • The encrypted data is drastically different from the plaintext

Hashing

Represent data as a short string of text

  • A message digest, a fingerprint

One-way trip

  • Impossible to recover the original message from the digest
  • Used to store passwords/confidentiality

Verify a downloaded document is the same as the original

  • Integrity

Can be a digital signature

  • Authentication, non-repudiation, and integrity

Will not have a collision (hopefully)

  • Different messages will not have the same hash

Obfuscation

Obfuscate

  • Make something normally understandable very difficult to understand

Take perfectly readable code and turn it into nonsense

  • The developer keeps the readable code and gives you the chicken scratch
  • Both sets of code perform exactly the same way

Helps prevent the search for security holes

  • Makes it more difficult to figure out what’s happening
  • But not impossible

Masking

A type of obfuscation

  • Hide some original data

Protects PII

  • And other sensitive data

May only be hidden from view

  • The data may still be intact in storage
  • Control the view based on permissions

Many techniques

  • Substituting, shuffling, encrypting, masking out, etc.

Tokenization

Replace sensitive data with a non-sensitive placeholder

  • SSN 266-12-1112 is now 691-618539

Common with credit card processing

  • Use a temporary token during payment
  • An attacker capturing the card numbers can’t use them later

This isn’t encryption or hashing

  • The original data and token aren’t mathematically related
  • No encryption overhead

Segmentation

Many organizations use a single data source

  • One large database

One breach puts all the data at risk

  • You’re making it easy for the attacker

Separate the data

  • Store it in different locations

Sensitive data should have stronger security

  • The most sensitive data should be the most secure

Permission Restrictions

Control access to an account

  • It’s more than jut username and password
  • Determine what policies are best for an organization

The authentication process

  • Password policies
  • Authentication factor policies
  • Other considerations

Permissions after login

  • Another line of defense
  • Prevent unauthorized access

Resiliency and Recovery

Resiliency

High Availability

Redundancy doesn’t mean always available

  • May need to be powered on manually

HA (high availability)

  • always on, always available

May include many components working together

  • Active can provide scalability advantages

Higher availability almost always means higher costs

  • There’s always another contingency you could add
  • Upgraded power, high-quality server components, etc.

Server Clustering

Combine two or more servers

  • Appears and operates as a single large server
  • Users only see one device

Easily increase capacity and availability

  • Add more servers to the cluster

Usually configured in the OS

  • All devices in the cluster commonly use the same OS

Load Balancing

Load is distributed across multiple servers

  • The servers are often unaware of each other

Distribute the load across multiple devices

  • Can be different OSes

The load balancer adds or removes devices

  • Add a server to increase capacity
  • Remove any servers not responding

Site resiliency

Recovery site is prepped

  • Data is synchronized

A disaster is called

  • Business processes failover to the alternate processing site

Problem is addressed

  • This can take hours, weeks, or longer

Revert back to the primary location

  • The process must be documented for both directions

Hot Site

An exact replica

  • Duplicate everything

Stocked with hardware

  • Constantly updated
  • You buy two of everything

Applications and software are constantly updated

  • Automated replication

Flip a switch and everything moves

  • This may be quite a few switches

Cold Site

No hardware

  • Empty building

No data

  • Bring it with you

No people

  • Bus in your team

Warm Site

Somewhere between cold and hot

  • Just enough to get going

Big room with rack space

  • You bring the hardware

Geographic Dispersion

These sites should be physically different from the organization’s primary location

  • Many disruptions can affect a large area
  • Hurricane, tornado, floods, etc.

Can be a logistical challenge

  • Transporting equipment
  • Getting employee’s on-site
  • Getting back to the main office

Platform Diversity

Every OS contains potential security issues

  • You can’t avoid them

Many security vulnerabilities are specific to a single OS

  • Windows vulnerabilities don’t commonly affect Linux or macOS
  • And vice versa

Use many platforms

  • Different applications, clients, and OSes
  • Spread the risk around

Multi-Cloud Systems

There are many cloud providers

  • Amazon Web Services, Microsoft Azure, Google Cloud, etc.

Plan for cloud outages

  • These can sometimes happen

Data is both geographically dispersed and cloud service dispersed

  • A breach with one provider would not affect the others
  • Plan for every contingency

Continuity of Operations Planning (COOP)

Not everything goes according to plan

  • Disaster can cause a disruption to the norm

We rely on our computer systems

  • Technology is pervasive

There need to be an alternative

  • Manual transactions
  • Paper receipts
  • Phone calls for transactions approvals

These must be documented and tested before a problem occurs

Capacity Planning

Match supply to the demand

  • This isn’t always an obvious equation

Too much demand

  • Application slowdowns and outages

Too much supply

  • You’re paying too much

Requires a balanced approach

  • Add the right amount of people
  • Apply appropriate technology
  • Build the best infrastructure

People

Some services require human intervention

  • Call center support lines
  • Technology services

Too few employees

  • Recruit new staff
  • It may be time-consuming to add more staff

Too many employees

  • Redeploy to other parts of the organization
  • Downsize

Technology

Pick a technology that can scale

  • Not all services can easily grow and shrink

Web services

  • Distribute the load across multiple web services

Database services

  • Cluster multiple SQL servers
  • Split the database to increase capacity

Cloud services

  • Services on demand
  • Seemingly unlimited resources (if you pay the money)

Infrastructures

The underlying framework

  • Application servers, network services, etc.
  • CPU, network, storage

Physical devices

  • Purchase, configure, and install

Cloud-based devices

  • Easier to deploy
  • Useful for unexpected capacity changes

Recovery Testing

Test yourselves before an actual event

  • Scheduled updates sessions (annual, semi-annual, etc.)

Use well-defined rules of engagement

  • Don’t touch the production systems

Very specific scenario

  • Limited time to run the event

Evaluate response

  • Document and discuss

Tabletop Exercises

Performing a full-scale disaster drill can be costly

  • And time-consuming

Many of the logistics can be determined through analysis

  • You don’t physically have to go through a disaster or drill

Get key players together for a tabletop exercise

  • Talk through a simulated disaster

Fail Over

A failure is often inevitable

  • It’s “when”, not “if”

We may be able to keep running

  • Plan for the worst

Create a redundant infrastructure

  • Multiple routers, firewalls, switches, etc.

If one stops working, fail over to the operational unit

  • Many infrastructure devices and services can do this automatically

Simulation

Test with a simulated event

  • Phishing attack, password requests, data breaches

Going phishing

  • Create a phishing email attack
  • Send to your actual user community
  • See who bites

Test internal security

  • Did the phishing get past the filter

Test the users

  • Who clicked?
  • Additional training may be required

Parallel Processing

Split a process through multiple (parallel) CPUs

  • A single computer with multiple CPU cores or multiple physical CPUs
  • Multiple computers

Improved performance

  • Split complex transactions across multiple processors

Improved recover

  • Quickly identify a faulty system
  • Take the faulty device out of the list of available processors
  • Continue operating with the remaining processors

Backups

Incredibly important

  • Recover important and valuable data
  • Plan for disaster

Many implementations

  • Total amount of data
  • Type of backup
  • Backup media
  • Storage location
  • Backup and recovery software
  • Day of the week

Onsite vs. Offsite Backups

Onsite backups

  • No Internet link required
  • Data is immediately available
  • Generally less expensive than offsite

Offsite backups

  • Transfer data over Internet or WAN link
  • Data is available after a disaster
  • Restoration can be performed from anywhere

Organizations often use both

  • More copies of the data
  • More options when restoring

Frequency

How often to back up

  • Every week, day, hour?

This may be different between systems

  • Some systems may not change much each day

May have multiple backups sets

  • Daily, weekly, and monthly

This requires significant planning

  • Multiple backup sets across different days
  • Lots of media to manage

Encryption

A history of data is on backup media

  • Some of this media may be offsite

This makes it very easy for an attacker

  • All the data is in one place

Protect backup data using encryption

  • Everything on the backup media is unreadable
  • The recovery key is required to restore the data

Especially useful for cloud backups and storage

  • Prevent anyone from eavesdropping

Snapshots

Became popular on virtual machines

  • Very useful in cloud environments

Take a snapshot

  • An instant backup of an entire system
  • Save the current configuration and data

Take another snapshot after 24 hours

  • Contains only the changes between snapshots

Take a snapshot every day

  • Revert to any snapshot
  • Very fast recovery

Recovery Testing

It’s not enough to perform the backup

  • You have to be able to restore

Disaster recovery testing

  • Simulate a disaster situation
  • Restore from backup

Confirm the restoration

  • Test the restored application and data

Perform periodic audits

  • Always have a good backup
  • Weekly, monthly, quarterly checks

Replication

An ongoing, almost real-time backup

  • Keep data synchronized in multiple locations

Data is available

  • There’s always a copy somewhere

Data can be stored locally to all users

  • Replicate data to all remote sites

Data is recoverable

  • Disasters can happen at any time

Journaling

Power goes out while writing data to storage

  • The stored data is probably corrupted

Recovery could be complicated

  • Remove corrupted files, restore from backup

Before writing to storage, make a journal entry

  • After the journal is written, write the data to storage

After the data is written to storage, update the journal

  • Clear the entry and get ready for the next

Power Resiliency

Power is the foundation of our technology

  • It’s important to properly engineer and plan for outages

We usually don’t make our own power

  • Power is likely provided by third-parties
  • We can’t control power availability

There are ways to mitigate power issues

  • Short power outages
  • Long-term power issues

UPS

Uninterruptible Power Supply

  • Short-term backup power
  • Blackouts, brownouts, surges

UPS types

  • Offline/Standby UPS
  • Line-interactive UPS
  • On-line/Double-conversion UPS

Features

  • Auto shutdown, battery capacity, outlets, phone line suppression

Generators

Long-term power backup

  • Fuel storage required

Power an entire building

  • Some power outlets may be marked as generator-powered

It may take a few minutes to get the generator up to speed

  • Use a battery UPS while the generator is starting

Security Techniques

Secure Baselines

The security of an application environment should be well-defined

  • All application instances must follow this baseline
  • Firewall settings, patch levels, OS file versions
  • May require constant updates

Integrity measurements check for the secure baseline

  • These should be performed often
  • Check against well-documented baselines
  • Failure requires an immediate correction

Establish Baselines

Create a series of baselines

  • Foundational security policies

Security baselines are often available from the manufacturer

  • Application developer
  • OS manufacturer
  • Appliance manufacturer

Many OSes have extensive options

  • There are over 3000 group policy settings in Windows 10
  • Only some of those are associated with security
Tip

Microsoft Security Baselines Guide

Deploy Baselines

We now have established detailed security baselines

  • How do we put those baselines into action?

Deploy the baselines

  • Usually managed through a centrally administered console

May require multiple deployment mechanisms

  • Active Directory group policy, MDM, etc.

Automation is the key

  • Deploy to hundreds or thousands of devices

Maintain Baselines

Many of these are best practices

  • They rarely change

Other baselines may require ongoing updates

  • A new vulnerability is discovered
  • An updated application has been deployed
  • A new OS is installed

Test and measure to avoid conflicts

  • Some baselines may contradict others
  • Enterprise environments are complex

Hardening Targets

No system is secure with the default configurations

  • You need some guidelines to keep everything safe

Hardening guides are specific to the software or platform

  • Get feedback from the manufacturer or Internet interest group
  • They will have the best details

Other general-purpose guides are available online

Mobile Devices

Always-connected mobile technologies

  • Phones, tablets, etc.
  • Hardening checklists are available from manufacturers

Updates are critical

  • Bug fixes and security patches
  • Prevent any known vulnerabilities

Segmentation can protect data

  • Company and user data are separated

Control with an MDD

  • Mobile Device Manager

Workstations

User desktops and laptops

  • Windows, macOS, Linux, etc.

Constant monitoring and updates

  • OSes, applications, firmware, etc.

Automate the monthly patches

  • There’s likely an existing process

Connect to a policy management system

  • Active Directory group policy

Remove unnecessary software

  • Limit the threats

Network Infrastructure Devices

Switches, routers, etc.

  • You never see them, but they’re always there

Purpose-built devices

  • Embedded OS, limited OS access

Configure authentication

  • Don’t use the defaults

Check with the manufacturer

  • Security updates
  • Not usually updated frequently
  • Updates are usually important

Cloud Infrastructure

Secure the cloud management workstation

  • The keys to the kingdom

Least privilege

  • All services, network settings, application rights and permissions

Configure Endpoint Detection and Response (EDR)

  • All devices accessing the cloud should be secure

Always have backups

  • Cloud to Cloud (C2C)

Servers

Many and varied

  • Windows, Linux, etc.

Updates

  • OS updates/service packs, security patches

User accounts

  • Minimum password lengths and complexity
  • Account limitations

Network access and security

  • Limit network access

Monitor and secure

  • Anti-virus, anti-malware

SCADA/ICS

Supervisory Control and Data Acquisition System

  • Large-scale, multi-site Industrial Control Systems (ICS)

PC manages equipment

  • Power generation, refining, manufacturing equipment
  • Facilities, industrial, energy, logistics

Distributed control systems

  • Real-time information
  • System control

Requires extensive segmentation

  • No access from the outside

Embedded Systems

Hardware and software designed for a specific function

  • Or to operate as part of a larger system

Can be difficult to upgrade

  • Watches and televisions are relatively easy
  • Other devices may not be easily modified

Correct vulnerabilities

  • Security patches remove potential threats

Segment and firewall

  • Prevent access from unauthorized users

RTOS (Real-Time Operating System)

An OS with a deterministic processing schedule

  • No time to wait for other processes
  • Industrial equipment, automobiles, military environments

Isolate the system

  • Prevent access from other areas

Run with the minimum services

  • Prevent the potential for exploit

Use secure communication

  • Protect with a host-based firewall

IoT Devices

Heating and cooling, lighting, home automation, wearable technology, etc.

Weak defaults

  • IoT manufacturers are not security professionals
  • Change those passwords

Deploy updates quickly

  • Can be a significant security concern

Segmentation

  • Put IoT devices on their own VLAN

Securing Wireless and Mobile

Site Surveys

Determine existing wireless landscape

  • Sample the existing wireless spectrum

Identify existing access points

  • You may not control all of them

Work around existing frequencies

  • Layout and plan for interference

Plan for ongoing site surveys

  • Things will certainly change

Heat maps

  • Identify wireless signal strengths

Wireless Survey Tools

  • Signal coverage
  • Potential interference
  • Built-in tools
  • 3rd-party tools
  • Spectrum analyzer

Mobile Device Management (MDM)

Manage company-owned and user-owned mobile devices

  • BYOD — Bring Your Own Device

Centralized management of the mobile devices

  • Specialized functionality

Set policies on apps, data, camera, etc.

  • Control the remote device
  • The entire device or a “portion”

Manage access control

  • Force screen locks and PINs on these single user devices

BYOD

Bring Your Own Device OR Bring Your Own Technology

Employee owns the device

  • Need to meet the company’s requirements

Difficult to secure

  • It’s both a home device and a work device
  • How is data protected?
  • What happens to the data when a device is sold or traded in?

COPE

Corporate owned, personally enabled

  • Company buys the device
  • Used as both a corporate device and a personal device

Organization keeps full control of the device

  • Similar to company-owned laptops and desktops

Information is protected using corporate policies

  • Information can be deleted at any time

CYOD — Choose Your Own Device

  • Similar to COPE, but with the user’s choice of device

Cellular Networks

Mobile devices

  • “Cell” phones
  • 4G, 5G

Separate land into “cells”

  • Antenna coverages a cell with certain frequencies

Security concerns

  • Traffic monitoring
  • Location tracking
  • Worldwide access to a mobile device

Wi-Fi

Local network access

  • Local security problems

Same security concerns as other Wi-Fi devices

Data capture

  • Encrypt your data!

On-path attack

  • Modify and/or monitor data

Denial of service

  • Frequency interference

Bluetooth

High speed communication over short distances

  • PAN (Personal Area Network)

Connects our mobile devices

  • Smartphones, tethering, headsets and headphones, smartwatches, etc.

Do not connect to unknown Bluetooth devices

  • There’s a formal pairing process to prevent unauthorized connections

Wireless Security Settings

Securing a Wireless Network

An organization’s wireless network can contain confidential information

  • Not everyone is allowed access

Authenticate the users before granting access

  • Who gets access to the wireless network?
  • Username, password, multifactor authentication

Ensure that all communication is confidential

  • Encrypt the wireless data

Verify the integrity of all communication

  • The received data should be identical to the original sent data
  • A message integrity check (MIC)

The WPA2 PSK Problem

WPA2 has a PSK brute-force problem

  • Listen to the four-way handshake
    • Some methods can derive the PSK hash without the handshake
  • Compute the hash

With the hash, attackers can brute force the pre-shared key (PSK)

This has become easier as technology improves

  • A weak PSK is easier to brute-force
  • GPU processing speeds
  • Cloud-based password cracking

Once you have the PSK, you have everyone’s wireless key

  • There’s no forward secrecy

WPA3 and GCMP

Wi-Fi Protected Access 3 (WPA3)

  • Introduced in 2018

GCMP block cipher mode

  • Galois/Counter Mode Protocol
  • A stronger encryption than WPA2

GCMP security services

  • Data confidentiality with AES
  • Message Integrity Check (MIC) with Galois Message Authentication (GMAC)

SAE

WPA3 changes the PSK authentication process

  • Includes mutual authentication
  • Creates a shared session key without sending that key across the network
  • No more four-way handshakes, no hashes, no brute force attacks

Simultaneous Authentication of Equals (SAE)

  • A Diffie-Hellman derived key exchange with an authentication component
  • Everyone uses a different session key, even with the same PSK
  • An IEEE standard — the dragonfly handshake

Wireless Authentication Methods

Gain access to a wireless network

  • Mobile users
  • Temporary users

Credentials

  • Shared password/pre-shared key (PSK)
  • Centralized authentication (802.1X)

Configuration

  • Part of the wireless network connection
  • Prompted during the connection process

Wireless Security Modes

Configure the authentication on your wireless access point/wireless router

Open System

  • No authentication password is required

WPA3-Personal/WPA3-PSK

  • WPA2 or WPA3 with a pre-shared key
  • Everyone uses the same 256-bit key

WPA3-Enterprise/WPA3-802.1X

  • Authenticates users individually with an authentication server (i.e, RADIUS)

AAA Framework

Identification

  • This is who you claim to be
  • Usually your username

Authentication

  • Prove you are who you say you are
  • Password and other authentication factors

Authorization

  • Based on your identification and authentication, what access do you have?

Accounting

  • Resources use: Login time, data sent and received, logout time

RADIUS (Remote Authentication Dial-in User Service)

One of the more common AAA protocols

  • Supported on a wide variety of platforms and devices

Centralize authentication for users

  • Routers, switches, firewalls
  • Server authentication
  • Remote VPN access
  • 802.1X network access

RADIUS services available on almost any server operating system

IEEE 802.1X

IEEE 802.1X

  • Port-based Network Access Control (NAC)
  • You don’t get access to the network until you authenticate

Used in conjunction with an access database

  • RADIUS, LDAP, TACACS+

EAP

Extensible Authentication Protocol (EAP)

  • An authentication framework

Many ways to authenticate based on RFC standards

  • Manufacturers can build their own EAP methods

EAP integrates with 802.1X

  • Prevents access to the network until the authentication succeeds

IEEE 802.1X and EAP

Supplicant — the client Authenticator — The device that provides access Authentication server — Validates the client credentials

Application Security

Secure Coding Concepts

A balance between time and quality

  • Programming with security in mind is often secondary

Testing, testing, testing

  • The Quality Assurance (QA) process

Vulnerabilities will eventually be found

  • And exploited

Input Validation

What is the expected input?

  • Validate actual vs. expected

Document all input methods

  • Forms, fields, type

Check and correct all input (normalization)

  • A zip code should be only X characters long with a letter in the X column
  • Fix any data with improper input

The fuzzers will find what you missed

  • Don’t give them an opening

Cookies

Cookies

  • Information stored on your computer by the browser

Used for tracking, personalization, session management

  • Not executable, not generally a security risk
    • Unless someone gets access to them

Secure cookies have a Secure attribute set

  • Browser will only send it over HTTPS

Sensitive information should not be saved in a cookie

  • This isn’t designed to be secure storage

Static Code Analyzers

Static Application Security Testing (SAST)

  • Help to identify security flaws

Many security vulnerabilities found easily

  • Buffer overflows, database injections, etc.

Not everything can be identified through analysis

  • Authentication security, insecure cryptography, etc.
  • Don’t rely on automation for everything

Still have to verify each finding

  • False positives are an issue

Code Signing

An application is deployed

  • Users run application executables or scripts

So many security questions

  • Has the application been modified in any way?
  • Can you confirm that the application was written by a specific developer?

The application code can be digitally signed by the developer

  • Asymmetric encryption
  • A trusted CA signs the developer’s public key
  • Developer signs the code with their private key
  • For internal apps, use your own CA

Sandboxing

Applications cannot access unrelated resources

  • They play in their own sandbox

Commonly used during development

  • Can be useful production technique

Used in many deployments

  • Virtual machines
  • Mobile devices
  • Browser iframes (Inline Frames)
  • Windows User Account Control (UAC)

Application Security Monitoring

Real-time information

  • Application usage, access demographics

View blocked attacks

  • SQL injection attempts, patched vulnerabilities

Audit the logs

  • Find the information gathering and hidden attacks

Anomaly detection

  • Unusual file transfer
  • Increase in client access

Asset Management

Asset Management

Acquisition/Procurement Process

The purchasing process

  • Multi-step process for requesting and obtaining goods and services

Start with a request from the user

  • Usually includes budgeting information and formal approvals

Negotiate with suppliers

  • Terms and conditions

Assignment/Accounting

A central asset tracking system

  • Used by different parts of the system

Ownership

  • Associate a person with an asset
  • Useful for tracking a system

Classification

  • Type of asset
  • Hardware (capital expenditure)
  • Software (Operating expenditure)

Monitoring/Asset Tracking

Inventory every asset

  • Laptops, desktops, servers, routers, switches, cables, fiber modules, tablets, etc.

Associate a support ticket with a device make and model

  • Can be more detailed than a user’s description

Enumeration

  • List all parts of an asset
  • CPU, memory, storage drive, keyboard, mouse

Add an asset tag

  • Barcode, RFID, visible tracking number, organization name

Media Sanitization

System disposal or decommissioning

  • Completely remove data
  • No usable information remains

Different use cases

  • Clean a hard drive for future use
  • Permanently delete a single file

A one-way trip

  • Once it’s gone, it’s really gone
  • No recovery with forensics tools

Reuse the storage media

  • Ensure nothing is left behind

Physical Destruction

Shredder/pulverizer

  • Heavy machinery
  • Complete destruction

Drill/Hammer

  • Quick and easy
  • Platters, all the way through

Electromagnetic (degaussing)

  • Remove the magnetic field
  • Destroys hard drive data and renders the hard drive unusable

Incineration

  • Fire hot

Certificate of Destruction

Destroy is often done by a 3rd-party

  • How many drills and degaussers do you have?

Need confirmation that your data is destroyed

  • Service should include a certificate

A paper trail of broken data

  • You know exactly what happening

Data Retention

Backup your data

  • How much and where?
  • Copies, versions of copies, lifecycle of data, purging old data

Regulatory compliance

  • A certain amount of data backup may be required
  • Emails, corporate financial data

Operational needs

  • Accidental deletion
  • Disaster recovery

Differentiate by type and application

  • Recover the data you need when you need it

Vulnerability Management

Vulnerability Scanning

Usually minimally invasive

  • Unlike a penetration test

Port scan

  • Poke around and see what’s open

Identify system

  • And security devices

Test from the outside and inside

  • Don’t dismiss insider threats

Gather as much information as possible

  • We’ll separate wheat from chaff later

Static Code Analyzer

Static Application Security Testing (SAST)

  • Help to identify security flaws

Many security vulnerabilities found easily

  • Buffer overflows, database injections, etc.

Not everything can be identified through analysis

  • Authentication security, insecure cryptography, etc.
  • Don’t rely on automation for everything

Still have to verify each finding

  • False positives are an issue

Dynamic Analysis (fuzzing)

Send random input to an application

  • Fault-injecting, robustness testing, syntax testing, negative testing

Looking for something out of the ordinary

  • Application crash, server error, exception

1988 class project at the University of Wisconsin

  • “Operating System Utility Program Reliability”
  • Professor Barton Miller
  • The Fuzz Generator

Fuzzing Engines and Frameworks

Many fuzzing options

  • Platform specific, language specific, etc.

Very time and processor resource heavy

  • Many, many iterations to try
  • Many fuzzing engines use high-probability tests

Carnegie Mellon Computer Emergency Response Team (CERT)

Package Monitoring

Some applications are distributed in a package

  • Especially open source
  • Supply chain integrity

Confirm the package is legitimate

  • Trusted source
  • No added malware
  • No embedded vulnerabilities

Confirm a safe package before deployment

  • Verify the contents

Threat Intelligence

Research the threats

  • And the threat actors

Data is everywhere

  • Hacker group profiles, tools used by the attackers, and much more

Make decisions based on this intelligence

  • Invest in the best prevention

Used by researchers, security operations teams, and others

Open-source Intelligence (OSINT)

Open-source

  • Publicly available sources
  • A good place to start

Internet

  • Discussion groups, social media

Government data

  • Mostly public hearings, reports, websites, etc.

Commercial data

  • Maps, financial reports, databases

Proprietary/Third-party Intelligence

Someone else has already compiled the threat information

  • You can buy it

Threat intelligence services

  • Threat analysis
  • Correlation across different data sources

Constant threat monitoring

  • Identify new threats
  • Create automated prevention workflows

Information-sharing Organization

Public threat intelligence

  • Often classified information

Private threat intelligence

  • Private companies have extensive resources

Need to share critical security details

  • Real-time, high-quality cyber threat information sharing

Cyber Threat Alliance (CTA)

  • Members upload specifically formatted threat intelligence
  • CTA scores each submission and validates across other submissions
  • Other members can extract the validated data

Dark Web Intelligence

Dark website

  • Overlay networks that use the Internet
  • Requires specific software and configurations to access

Hacking groups and services

  • Activities
  • Tools and techniques
  • Credit card sales
  • Accounts and passwords

Monitor forums for activity

  • Company names, executive names

Penetration Testing

Pentest

  • Simulate an attack

Similar to vulnerability scanning

  • Except we actually try to exploit the vulnerabilities

Often a compliance mandate

  • Regular penetration testing by a 3rd-party

National Institute of Standards and Technology

Rules of Engagement

An important document

  • Defines purpose and scope
  • Makes everyone aware of the test parameters

Type of testing and schedule

  • On-site physical breach, internal test, external test
  • Normal working hours, after 6 PM only, etc.

The rules

  • IP address ranges
  • Emergency contacts
  • How to handle sensitive information
  • In-scope and out-of-scope devices or appliances

Exploiting Vulnerabilities

Try to break into the system

  • Be careful; this can cause a denial of service or loss of data
  • Buffer overflows can cause instability
  • Gain privilege escalation

You may need to try many vulnerability types

  • Password brute-force
  • Social engineering
  • Database injections
  • Buffer overflows

You will only be sure you’re vulnerable if you can bypass security

  • If you can get through, the attackers can get through

The Process

Initial exploitation

  • Get into the network

Lateral movement

  • Move from system to system
  • The inside of the network is relatively unprotected

Persistence

  • Once you are there, you need to make sure there is a way back in
  • Set up a backdoor, build user accounts, change or verify default passwords

The pivot

  • Gain access to systems that would normally not be accessible
  • Use a vulnerable system as a proxy or relay

Responsible Disclosure Program

It takes tie to fix a vulnerability

  • Software changes, testing, deployment, etc.

Bug bounty programs

  • A reward for discovering vulnerabilities
  • Earn money for hacking a system
  • Document the vulnerability to earn cash

A controlled information release

  • Researcher reports the vulnerability
  • Manufacturer creates a fix
  • The vulnerability is announced publicly

Analyzing Vulnerabilities

Dealing with False Information

False positives

  • A vulnerability is identified that doesn’t really exist

This is different from a low-severity vulnerability

  • It’s real, but it may not be your highest priority

False negatives

  • A vulnerability exists, but you didn’t detect it

Update to the latest signatures

  • If you don’t know about it, you can’t see it

Work with the vulnerability detection manufacturer

  • They may need to update their signatures for your environment

Prioritizing Vulnerabilities

Not every vulnerability shares the same priority

  • Some may not be significant
  • Others may be critical

This may be difficult to determine

  • The research has probably already been done

Refer to public disclosures and vulnerability databases

  • The industry is well versed
  • Online discussion groups, public disclosure mailing lists

CVSS

National Vulnerability Database

Common Vulnerability Scoring System (CVSS)

  • Quantitative scoring of a vulnerability — 0 to 10
  • The scoring standards change over time
  • Different scoring for CVSS 2.0 vs. CVSS 3.x

Industry collaboration

  • Enhanced feed sharing and automation

CVE

The vulnerabilities can be cross-referenced online

  • Almost all scanners give you a place to go

National Vulnerability Database

Common Vulnerabilities and Exposure (CVE)

Microsoft Security Bulletins

Some vulnerabilities cannot be definitively identified

  • You will have to check manually to see if a system is vulnerable
  • The scanner gives you a heads-up

Vulnerability Classification

The scanner looks for everything

  • Well, not everything — The signatures are the key

Application scans

  • Desktop, mobile apps

Web application scans

  • Software on a web server

Network scans

  • Misconfigured firewalls, open ports, vulnerable devices

Exposure Factor

Loss of value or business activity if the vulnerability is exploited

  • Usually expressed as a percentage

A small DDoS may limit access to a service

  • 50% exposure factor A buffer overflow may completely disable a service
  • 100% exposure factor

A consideration when prioritizing

  • Worst possible outcome probably gets priority

Environmental Variables

What type of environment is associated with this vulnerability?

  • Internal server, public cloud, test lab

Prioritization and patching frequency

  • A device in an isolated test lab
  • A database server in the public cloud
  • Which environment gets priority?

Every environment is different

  • Number and type of users (internal, external)
  • Revenue generating application
  • Potential for exploit

Industry/Organizational Impact

Some exploits have signal-to-noise consequences

  • The type of organization is an important consideration

Tallahassee Memorial Healthcare — February 2023

  • Ransomware — closed for two weeks
  • Diverted emergency cases, surgeries cancelled

Power utilities — Salt Lake City, Utah and LA County, California — March 2019

  • DDoS attacks from an unpatched known vulnerability

Risk Tolerance

The amount of risk acceptable to an organization

  • It’s important to remove all risk

The timing of security patches

  • Patching immediately doesn’t allow for proper testing

Testing takes time

  • While you’re testing, you’re also vulnerable

There’s a middle ground

  • May change based on the severity

Vulnerability Remediation

Patching

The most common mitigation technique

  • We know the vulnerability exists
  • We have a patch file to install

Scheduled vulnerability/patch notices

  • Monthly, quarterly

Unscheduled patches

  • Zero-day, often urgent

This is an ongoing process

  • The patches keep coming
  • An easy way to prevent most exploits

Insurance

Cybersecurity insurance coverage

  • Lost revenue
  • Data recovery costs
  • Money lost to phishing
  • Privacy lawsuit costs

Doesn’t cover everything

  • Intentional acts, funds transfers, etc.

Ransomware has increased popularity of cybersecurity liability insurance

  • Applies to every organization

Segmentation

Limit the scope of an exploit

  • Separate devices into their own networks/VLANs

A breach would have limited scope

  • It’s not as bad as it could be

Can’t patch?

  • Disconnect from the world
  • Air gaps may be required

Use internal NGFWS

  • Block unwanted/unnecessary traffic between VLANs
  • Identify malicious traffic on the inside

Physical Segmentation

Separate devices

  • Multiple units, separate infrastructure

Logical Segmentation with VLANs

Virtual Local Area Network (VLANs)

  • Separated logically instead of physically
  • Cannot communicate between VLANs without a layer 3 device/router

Compensating Controls

Optimal security methods may not be available

  • Can’t deploy a patch right now
  • No internal firewalls

Compensate in other ways

  • Disable the problematic service
  • Revoke access to the application
  • Limit external access
  • Modify internal security controls and software firewalls

Provide coverage until a patch is deployed

  • Or similar optimal security response

Exceptions and Exemptions

Removing the vulnerability is optimal

  • But not everything can be patched

A balancing act

  • Provide the service, but also protect the data and systems

Not all vulnerabilities share the same severity

  • May require local login, physical access, or other criteria

An exception may be an option

  • Usually a formal process to approve

Validation of Remediation

The vulnerability is now patched

  • Does the patch really stop the exploit?
  • Did you patch all vulnerable systems?

Rescanning

  • Perform an extensive vulnerability scan

Audit

  • Check remediated systems to ensure the patch was successfully deployed

Verification

  • Manually confirm the security of the system

Reporting

Ongoing checks are required

  • New vulnerabilities are continuously discovered

Difficult (or impossible) to manage without automation

  • Manual checks would be time-consuming

Continuous reporting

  • Number of identified vulnerabilities
  • Systems patched vs. unpatched
  • New threat notifications
  • Errors, exception, and exemptions

Security Monitoring

Security Monitoring

The attackers never sleep

  • 24/7/365

Monitor all entry points

  • Logins, publicly available services, data storage locations, remote access

React to security events

  • Account access, firewall rule base, additional scanning

Status dashboards

  • Get the status of all systems at a glance

Monitoring Computing Resources

Systems

  • Authentication — logins from strange places
  • Server monitoring — Service activity, backups, software versions

Applications

  • Availability — Uptime and response times
  • Data transfers — Increases or decreases in rates

Infrastructure

  • Remote access systems — Employees, vendors, guests
  • Firewall and IPS reports — Increase or type of attack

Log Aggregation

SIEM or SEM (Security Information and Event Manager)

  • Consolidate different logs to a central database
  • Servers, firewalls, VPN concentrators, SANs, cloud services

Centralized reporting

  • All information in one place

Correlation between diverse systems

  • View authentication and access
  • Track application access
  • Measure and report on data transfers

Scanning

A constantly changing threat landscape

  • New vulnerabilities discovered daily
  • Many business applications and services
  • Systems and people are always moving

Actively check systems and devices

  • OS types and versions
  • Device driver options
  • Installed applications
  • Potential anomalies

Gather the raw details

  • A valuable database of information

Reporting

Analyze the collected data

  • Create “actionable” reports

Status information

  • Number of devices up to date/in compliance
  • Devices running older OSes

Determine best next steps

  • A new vulnerability is announced
  • How many systems are vulnerable?

Ad hoc information summaries

  • Prepare for the unknown

Archiving

It takes an average of about 9 months for a company to identify and contain a breach

  • IBM security report, 2022

Access to data is critical

  • Archive over an extended period

May have a mandate

  • State for federal law
  • Or organizational requirements

Alerting

Real-time notification of security events

  • Increase in authentication errors
  • Large file transfers

Actionable data

  • Keep the right people informed
  • Enable quick response and status information

Notification methods

  • SMS/text
  • Email
  • Security console/SOC

Alert Response and Remediation

Quarantine

  • A foundational security response
  • Prevent a potential security issue from spreading

Alert tuning

  • A balancing act
  • Prevent false positives and false negatives

An alert should be accurate

  • This is an ongoing process
  • The tuning gets better as time goes on

Security Tools

Security Content Automation Protocol (SCAP)

Many security tools on the market

  • NGFWs, IPS, vulnerability scanners, etc.
  • They all have their own way of evaluating a threat

Managed by National Institute of Standards and Technology (NIST)

Allows tools to identify and act on the same criteria

  • Validate the security configuration
  • Confirm patch installs
  • Scan for a security breach

Using SCAP

SCAP content can be shared between tools

  • Focused on configuration compliance
  • Easily detect applications with known vulnerabilities

Especially useful in large environments

  • Many OSes and applications

This specification standard enables automation

  • Even between different tools

Automation types

  • Ongoing monitoring
  • Notification and alerting
  • Remediation of noncompliant systems

Benchmarks

Apply security best-practices to everything

  • OSes, cloud providers, mobile devices, etc.
  • The bare minimum for security settings

Example: Mobile device

  • Disable screenshots, disable screen recordings, prevent voice calls when locked, force encryption backups, disable additional VPN profiles, configure a “lost phone” message, etc.

Popular benchmarks — Center for Internet Security (CIS)

Agents/Agentless

Check to see if the device is in compliance

  • Install a software agent onto the device
  • Run an on-demand agentless check

Agents can usually provide more details

  • Always monitoring for real-time notifications
  • Must be maintained and updated

Agentless runs without a formal install

  • Performs the check, then disappears
  • Does not require ongoing updates to an agent
  • Will not inform or alert if not running

SIEM

Security Information and Event Management

  • Logging of security events and information

Log collection of security alerts

  • Real-time information

Log aggregation and long-term storage

  • Usually includes advanced reporting features

Data correlation

  • Link diverse data types

Forensic analysis

  • Gather details after an event

Anti-virus and Anti-malware

Anti-virus is the popular term

  • Refers specifically to a type of malware
  • Trojans, worms, macro viruses

Malware refers to the broad malicious software category

  • Anti-malware stops spyware, ransomware, fileless malware

The terms are effectively the same these days

  • The names are more of a marketing tool
  • Anti-virus software is also anti-malware software now
  • Make sure your system is using a comprehensive solution

Data Loss Prevention (DLP)

Where’s your data?

  • Social Security Numbers, Credit Card Numbers, Medical Records

Stop the data before the attacker gets it

  • Data “leakage”

So many sources, so many destinations

  • Often requires multiple solutions
  • Endpoint clients
  • Cloud-based systems
    • Email, cloud storage, collaboration tools

SNMP

Simple Network Management Protocol

  • A database of data (MIB) — Management Information Base
  • The database contains OIDS — Object identifiers
  • Poll devices over udp/161

Request statistics from a device

  • Server, firewall, workstation, switch, router, etc.

Graphing with SNMP

SNMP traps

Most SNMP operations expect a poll

  • Devices then respond to the SNMP request
  • This requires constant polling

SNMP traps can be configured on the monitored device

  • Communicates over udp/162

Set a threshold for alerts

  • If the number of CRC errors increases by 5, send a trap
  • Monitoring station can be reacted immediately

NetFlow

Gather traffic statistics from all the traffic flows

  • Shared communication between devices

NetFlow

  • Standard collection method
  • Many products and options

Probe and collector

  • Probe watches network communication
  • Summary records are sent to the collector

Usually a separate reporting app

  • Closely tied to the collector

Vulnerability Scanner

Usually minimally invasive

  • Unlike a penetration test

Port scan

  • Poke around and see what’s open

Identify systems

  • And security devices

Test from the outside and inside

  • Don’t dismiss insider threats

Gather as much information as possible

  • We’ll separate wheat from chaff later

Enterprise Security

Firewalls

Network-based Firewalls

Filter traffic by port number of application

  • Traditional vs. NGFW

Encrypt traffic

  • VPN between sites

Most firewalls can be layered 3 devices (router)

  • Often sits on the ingress/egress of the network
  • Network Address Translation (NAT)
  • Dynamic routing

Next-generation Firewalls (NGFW)

The OSI Application Layer

  • Layer 7 firewall

Can be called different names

  • Application layer gateway
  • Stateful multilayer inspection
  • Deep packet inspection

Requires some advanced decodes

  • Every packet must be analyzed, categorized, and a security decision determined

Ports and Protocols

Make a forwarding decisions based on protocols (TCP or UDP) and port number

  • Traditional port-based firewalls
  • Add to an NGFW for additional security policy options

Based on destination protocol and port

  • Web server: tcp/80, tcp/443
  • SSH server: tcp/22
  • Microsoft RDP: tcp/3389
  • DNS query: udp/53
  • NTP:udp/123

Firewall Security Policies:

Firewall Rules

A logical path

  • Usually top-to-bottom

Can be very general or very specific

  • Specific rules are usually at the top

Implicit deny

  • Most firewalls include deny at the bottom
    • Even if you didn’t put one

Access control lists (ACLS)

  • Allow or disallow traffic
  • Groupings of categories — Source IP, Destination IP, port number, time of day, application, etc.

Web Server Firewall Ruleset

Screened subnet

An additional layer of security between you and the Internet

  • Public access to public resources
  • Private data remains inaccessible

IPS Rules

Intrusion Prevention System

  • Usually integrated into an NGFW

Different ways to find malicious traffic

  • Look at traffic as it passes by

Signature-based

  • Look for a perfect match

Anomaly-based

  • Build a baseline of what’s “normal”
  • Unusual traffic patterns are flagged

You determine what happens when unwanted traffic appears

  • Block, allow, send an alert, etc.

Thousands of rules

  • Or more

Rules can be customized by group

  • Or as individual rules

This can take time to find the right balance

  • Security/alert “noise”/false positives

Web Filtering

Content filtering

Control traffic based on data within the content

  • URL filtering, website category filtering

Corporate control of outbound and inbound data

  • Sensitive materials

Control of inappropriate content

  • Not safe for work
  • Parental controls

Protection against evil

  • Anti-virus, anti-malware

URL Scanning

Allow or restrict on Uniform Resource Locator (URL)

  • Also called a Uniform Resource Identifier (URI)
  • Allow list/Block list

Managed by category

  • Auction, hacking, malware, travel, recreation, etc.

Can have limited control

  • URLs aren’t the only way to surf

Often integrated into an NGFW

  • Filters traffic based on category or specific URL

Agent Based

Install client software on the user’s device

  • Usually managed from a central console

Users can be located anywhere

  • The local agent makes the filtering decisions
  • Always-on, always filtering

Updates must be distributed to all agents

  • Cloud-based updates
  • Update status shown at the console

Proxies

  • Sits between the users and the external network
  • Receive the user requests and sends the request on their behalf (the proxy)
  • Useful for caching information, access control, URL filtering, content scanning
  • Applications may need to know how to use the proxy (explicit)
  • Some proxies are invisible (transparent)

Forward Proxy

A centralized “internal proxy”

  • Commonly used to protect and control user access to the Internet

Block Rules

Based on specific URL

  • *.professormesser.com:Allow

Category of site content

  • Usually divided into over 50 different topics
  • Adult, Educational, Gambling, Government, Home and Garden, Legal, Malware, News, etc.

Different dispositions

  • Educational: Allow
  • Home and Garden: Allow and Alert
  • Gambling: Block

Reputation

Filters URLs based on perceived risk

  • A good reputation is allowed
  • A bad reputation is blocked
  • Risk: Trustworthy, Low risk, Medium risk, Suspicious, High risk

Automated reputation

  • Sites are scanned and assigned a reputation

Manual reputation

  • Managers can administratively assign a rep

Add these dispositions to the URL filter

  • High risk: Block, Trustworthy: Allow

DNS filtering

Before connecting to a website, get the IP address

  • Perform a DNS lookup

DNS is updated with real-time threat intelligence

  • Both commercial and public lists

Harmful sites are not connection

  • No IP address, no connection

This works for any DNS lookup

  • Not just web filtering

Operating System Security

Active Directory

A database of everything on the network

  • Computers, user accounts, file shares, printers, groups, and more
  • Primarily Windows-based

Manage authentication

  • Users login using their AD credentials

Centralized access control

  • Determine which users can access resources

Commonly used by the help desk

  • Reset passwords, add and remove accounts

Group Policy

Manage the computers or users with Group Policies

  • Local and Domain policies
  • Group Policy Management Editor

A central console

  • Login scripts
  • Network configurations (QoS)
  • Security parameters

Comprehensive control

  • Hundreds of configuration options

Security-Enhanced Linux (SELinux)

Security patches for Linux Kernel

  • Adds mandatory access control (MAC) to Linux
  • Linux traditionally uses discretionary Access Control (DAC)

Limits application access

  • The Least privilege
  • A potential breach will have limited scope

Open-source

  • Already included as an option with many Linux distributions

Secure Protocols

Unencrypted Network Data

Network traffic is important data

  • Everything must be protected

Some protocols aren’t encrypted

  • All traffic sent in the clear
  • Telnet, FTP, SMTP, IMAP

Verify with a packet capture

  • View everything sent over the network

Protocol Selection

Use a secure application protocol

  • Built-in encryption

A secure protocol may not be available

  • This may be a deal-breaker

Port Selection

Secure and insecure application connections may be available

  • It’s common to run secure and insecure on different ports

HTTP and HTTPS

  • In-the-clear and encryption web browsing
  • HTTP: Port 80
  • HTTPS: Port 443

The port number does not guarantee security

  • Confirm the security features are enabled
  • Packet captures may be necessary

Transport method

Don’t rely on the application

  • Encrypt everything over the current network transport

802.11 Wireless

  • Open access point: No transport-level encryption
  • WPA3: All user data is encrypted

Virtual Private Network (VPN)

  • Create an encrypted tunnel
  • All traffic is encrypted and protected
  • Often requires third-party services and software

VPN Tunnel:

Email Security

Email Security Challenges

The protocols used to transfer emails include relatively few security checks

  • It’s very easy to spoof an email

Spoofing happens all the time

  • Check your spam folder

The email looks as if it originated from james@professormesser.com

  • But did it? How can you tell?

A reputable sender will configure email validation

  • Publicly available on the sender’s DNS server

Mail Gateway

The gatekeeper

  • Evaluates the source of inbound email messages
  • Blocks it at the gateway before it reaches the user
  • On-site or cloud-based

Sender Policy Framework (SPF)

SPF protocol

  • Sender configures a list of all servers authorized to send emails for a domain

List of authorized mail servers are added to a DNS TXT record

  • Receiving mail servers perform a check to see if incoming mail really did come from an authorized host

Domain Keys Identified Mail (DKIM)

A mail server digitally signs all outgoing mail

  • The public key is in the DKIM TXT record

The signature is validated by the receiving mail servers

  • Not usually seen by the end user

DMARC

Domain-based Message Authentication, Reporting, and Conformance (DMARC)

  • An extension of SPF and DKIM

The domain owner decides what receiving email servers should do with emails not validating using SPF and DKIM

  • That policy is written into a DNS TXT record
  • Accept all, send to spam, or reject the email

Compliance reports are sent to the email administrator

  • The domain owner can see how emails are received

Monitoring Data

FIM (File Integrity Monitoring)

Some files change all the time

  • Some files should NEVER change

Monitor important OS and application files

  • Identify when changes occur

Windows — SFC (System File Checker)

Linux — Tripwire

Many host-based IPS options

Data Loss Prevention (DLP)

Where’s your data?

  • Social Security Numbers, credit card numbers, medical records

Stop the data before the attackers get it

  • Data “leakage”

So many sources, so many destinations

  • Often requires multiple solutions in different places

Data Loss Prevention (DLP) Systems

On your computer

  • Data in use
  • Endpoint DLP

On your network

  • Data in motion

On your server

  • Data at rest

USB Blocking

DLP on a workstation

  • Allow or deny certain tasks

November 2008 — U.S. Department of Defense

  • Worm virus “agent.btz” replicates using USB storage
  • Bans removable flash media and storage devices

All devices had to be updated

  • Local DLP agent handled USB blocking

Ban was lifted in February 2010

  • Replaced with strict guidelines

Cloud-based DLP

Located between users and the Internet

  • Watch every byte of network traffic
  • No hardware, no software

Block custom defined data strings

  • Unique data for your organization

Manage access to URLs

  • Prevent file transfers to cloud storage

Block viruses and malware

  • Anything traversing the network

DLP and Email

Email continue to be the most critical risk vector

  • Inbound threats, outbound data loss

Check every email inbound and outbound

  • Internal system or cloud-based

Inbound

  • Block keywords, identify impostors, quarantine email messages

Outbound

  • Fake wire transfers, W-2 transmissions, employee information

Emailing a spreadsheet template

November 2016

Boeing employee emails spouse a spreadsheet to use as a template

Contained the personal information of 36000 Boeing employees

  • In hidden columns
  • Social security numbers, data of birth, etc.

Boeing sells its own DLP software

  • But only uses it for classified work

Endpoint Security

The endpoint

The user’s access

  • Applications and data

Stop the attackers

  • Inbound attacks
  • Outbound attacks

Many platforms

  • Mobile, desktop

Protection is multi-faceted

  • Defense in depth

Edge vs. Access Control

Control at the edge

  • Your Internet link
  • Managed primarily through firewall rules
  • Firewall rules rarely change

Access control

  • Control from wherever you are
    • Inside or outside
  • Access can be based on many rules
    • By user, group, location, application, etc.
  • Access can be easily revoked or changed
    • Change your security posture at any time

Posture Assessment

You can’t trust everyone’s computer

  • BYOD (Bring Your Own Device)
  • Malware infections/missing anti-malware
  • Unauthorized applications

Before connecting to the network, perform a health check

  • Is it a trusted device?
  • Is it running anti-virus? Which one? Is it updated?
  • Are corporate applications installed?
  • Is it a mobile device? Is the disk encrypted?
  • The type of device doesn’t matter — Windows, Mac, Linux, iOS, Android

Health Checks/Posture Assessment

Persistent agents

  • Permanently installed onto a system
  • Periodic updates may be required

Dissolvable agents

  • No installation is required
  • Runs during the posture assessment
  • Terminates when no longer required

Agentless NAC

  • Integrated with AD
  • Checks are made during login and logoff
  • Can’t be scheduled

Failing your Assessment

What happens when a posture assessment fails?

  • Too dangerous to allow access

Quarantine network, notify administrators

  • Just enough network access to fix the issues

Once resolved, try again

  • May require additional fixes

Endpoint Detection and Response (EDR)

A different method of threat protection

  • Scale to meet the increasing number of threats

Detect a threat

  • Signatures aren’t the only detection tool
  • Behavioral analysis, machine learning, process monitoring
  • Lightweight agent on the endpoint

Investigate the threat

  • Root cause analysis

Respond to the threat

  • Isolate the system, quarantine the threat, rollback to a previous config
  • API driven, no user or technician intervention required

Extended Detection and Response (XDR)

An evolution of EDR

  • Improve missed detections, false positives, and long investigation times
  • Attacks involve more than just the endpoint

Add network-based detection

  • Investigate and respond to network anomalies

Correlate endpoint, network, and cloud data

  • Improve detection rates
  • Simplify security event investigation

User Behavior Analytics

XDR commonly includes user behavior analytics

  • Extend the scope of anomaly detection

Watch users, hosts, network traffic, data repositories, etc.

  • Create a baseline or normal activity
  • Requires data analysis over an extended period

Watch for anything unusual

  • Use a set of rules, pattern matching, statistical analysis

Real-time detection of unusual activity

  • Catch the threat early

Identity and Access Management

Identity and Access Management (IAM)

Identity lifecycle management

  • Every entity (human and non-human) gets a digital identity

Access control

  • An entit only get access to what they need

Authentication and authorization

  • Entities must prove they are who they claim to be

Identity governance

  • Track an entity’s resource access
  • It may be a regulatory requirement

Provisioning/De-provisioning User Accounts

The user account creation process

  • And the account removal process

Provisioning and de-provisioning occurs for certain events

  • Hiring, transfers, promotions, job separation

Account details

  • Name, attributes, group permissions, other permissions

An important part of the IAM process

  • An initial checkpoint to limit access
  • Nobody gets Administrator access

Permission Assignments

Each entity gets limited permissions

  • Just enough to do their job
  • Group assignments are common

Storage and files can be private to that user

  • Even if another person is using the same computer

No privilege access to the OS

  • Specifically not allowed on a user account

Identity Proofing

I could be anyone

  • The IAM process should confirm who I am

Resolution

  • Who the system thinks you are

Validation

  • Gathering information from the user (password, security questions, etc.)

Verification/Attestation

  • Passport, in-person meeting, etc.
  • Automated verification is also an option

Gaining Access:

Single sign-on (SSO)

Provide credentials one time

  • Get access to all available or assigned resources
  • No additional authentication required

Usually limited by time

  • A single authentication can work for 24 hours
  • Authenticate again after the timer expires

The underlying authentication infrastructure must support SSO

  • Not always an option

LDAP (Lightweight Directory Access Protocol)

Protocol for reading and writing directories over an IP network

  • An organized set of records, like a phone directory

X.500 specification was written by the International Telecommunications Union (ITU)

  • They know directories!

DAP ran on the OSI protocol stack

  • LDAP is lightweight

LDAP is the protocol used to query and update an X.500 directory

  • Used in Windows Active Directory, Apple OpenDirectory, Novell eDirectory, etc.

X.500 Distinguished Names

attribute = value pairs

Most specific attribute is listed first

  • This may be similar to the way you already think

CN=WIDGETWEB, OU=Marketing, O=Widget, L=London, ST=London, C=GB, DC=com

X.500 Directory Information Tree

Hierarchical structure

  • Builds a tree

Container objects

  • Country, organization, organizational units

Leaf objects

  • Users, computers, printers, files

Security Assertion Markup Language (SAML)

Open Standard for authentication and authorization

  • You can authenticate through a third party to gain access
  • One standard does it all, sort of

Not originally designed for mobile apps

  • This has been SAML’s largest roadblock

The SAML Authentication Flow:

OAuth

Authorization framework

  • Determines what resources a user will be able to access

Created by Twitter, Google, and many others

  • Significant industry support

Not an authentication protocol

  • OpenID Connect handles the single sing-on authentication
  • OAuth provides authorization between applications

Federation

Provide network access to others

  • Not just employees — Partners, suppliers, customers, etc.
  • Provides SSO and more

Third-parties can establish a federated network

  • Authenticate and authorize between the two organizations
  • Login with your Facebook credentials

The third party must establish a trust relationship

  • And the degree of the trust

Interoperability

Many ways to communicate with an authentication server

  • More than a simple login process

Often determined by what is at hand

  • VPN concentrator can talk to an LDAP server
  • We have an LDAP server

A new app uses OAuth

  • Need to allow authentication API access

The interoperability is dependent on the environment

  • This is often part of a much larger IAM strategy

Access Controls

Authorization

  • The process of ensuring only authorized rights are exercised
  • Policy enforcement
  • The process of determining rights
  • Policy definition

User receive rights based on Access Control models

  • Different business needs or mission requirements

Least Privilege

Rights and permissions should be set to the bare minimum

  • You only get exactly what’s needed to complete your objective

All user accounts must be limited

  • Applications should run with minimal privileges

Don’t allow users to run with administrative privileges

  • Limits the scope of malicious behavior

Mandatory Access Control (MAC)

The OS limits the operation on an object

  • Based on security clearance levels

Every object gets a label

  • Confidential, secret, top secret, etc.

Labeling of objects uses predefined rules

  • The administrator decides who gets access to what security level
  • Users cannot change these settings

Discretionary Access Control (DAC)

Used in most OSes

  • A familiar access control model

You create a spreadsheet

  • As the owner, you control who has access
  • You can modify access at any time

Very flexible access control

  • And very weak security

Role-based Access Control (RBAC)

You have a role in your organization

  • Manager, director, team lead, project manager

Administrators provide access based on the role of the user

  • Rights are gained implicitly instead of explicitly

On Windows, use Groups to provide role-based access control

  • You are in shipping and receiving, so you can use the shipping software
  • You are the manager, so you can review shipping logs

Generic term for following rules

  • Conditions other than who you are

Access is determined through system-enforced rules

  • System administrators, not users

The rule is associated with the object

  • System checks the ACLs for that object

Rules examples

  • Lab network access is only available between 9 AM and 5 PM
  • Only Chrome browsers may complete this web form

Attribute-based Access Control (ABAC)

Users can have complex relationships to application and data

  • Access may be based on many criteria

ABAC can consider many parameters

  • A “next-generation” authorization model
  • Aware of context

Combine and evaluate multiple parameters

  • Resource information, IP address, time of day, desired action, relationship to the data, etc.

Time-of-day Restrictions

Almost all security devices include a time-of-day option

  • Restrict access during certain times or days of the week
  • Usually not the only access control

Can be difficult to implement

  • Especially in a 24-hour environment

Time-of-day restrictions

  • Training room network is inaccessible between midnight and 6 AM
  • Conference room access is limited after 8 PM
  • R&D databases are only after between 8 AM and 6 PM

Multifactor Authentication

Prove who you are

  • Use different methods
  • A memorized password
  • A mobile app
  • Your GPS location

Factors

  • Something you know
  • Something you have
  • Something you are
  • Somewhere you are

There are other factors as well

Something You Know

Password

  • Secret word/phrase, string of characters
  • Very common authentication factor

PIN

  • Personal Identification Number
  • Not typically contained anywhere on a smart card or ATM card

Pattern

  • Complete a series of patterns
  • Only you know the right format

Something You Have

Smart card

  • Integrates with devices
  • May require a PIN

USB security key

  • Certificate is on the USB devices

Hardware or software tokens

  • Generates pseudo-random authentication codes

Your phone

  • SMS a code to your phone

Something You are

Biometric authentication

  • Fingerprints, iris scan, voiceprint

Usually stores a mathematical representation of your biometric

  • Your actual fingerprint isn’t usually saved

Difficult to change

  • You can change your password
  • You can’t change your fingerprint

Used in very specific situations

  • Not foolproof

Somewhere You are

Provide a factor based on your location

  • The transaction only completes if you are in a particular geography

IP address

  • Not perfect, but can help provide more info
  • Works with IPv4, not so much with IPv6

Mobile device location services

  • Geolocation to a very specific area
  • Must be in a location that can receive GPS information or near an identified mobile or 802.11 network
  • Still not a perfect identifier of location

Password Security

Password Complexity and Length

Make your password strong

  • Resist guessing or brute-force attack

Increase password entropy

  • No single words, no obvious passwords
  • Mix upper and lower case letters, numbers, and special characters

Stronger passwords are commonly at least 8 characters

  • These requirements change as processing speed gets faster
  • Consider a phrase or set of words

Password Age and Expiration

Password age

  • How long since a password was modified

Password expiration

  • Password works for a certain amount of time
  • 30 days, 60 days, 90 days, etc.
  • After the expiration date, the password doesn’t work
  • System remembers password history, requires unique passwords

Critical systems might change more frequently

  • Every 15 days or every week

Password Managers

Important to use different passwords for each account

  • Remembering all of them would be impractical

Store all of your passwords in a single database

  • Encrypted, protected
  • Can include multifactor tokens

Built-in, many OSes

  • And some browsers

Enterprise password managers

  • Centralized management and recovery options

Passwordless Authentication

Many breaches are due to poor password control

  • Weak passwords, insecure implementation

Authenticate without a password

  • This solves many password management issues

You may already be passwordless

  • Facial recognition, security key, etc.

Passwordless may not be the primary authentication method

  • Used with a password or additional factors

Just-in-time permissions

In many organizations, the IT team is assigned administrator/root elevated account rights

  • This would be a great account to attack

Grant admin access for a limited time

  • No permanent administrator rights
  • The principles of least privilege

A breached user account never has elevated rights

  • Narrow the scope of a breach

Request access from a central clearinghouse

  • Grants to denies based on predefined security policies

Password vaulting

  • Primary credentials are stored in password vault
  • The vault controls who get access to credentials

Accounts are temporary

  • Just-in-time process creates a time-limited account
  • Administrator receives ephemeral credentials
  • Primary passwords are never released
  • Credentials are used for one session then deleted

Automation and Orchestration

Scripting and Automation

Automate and orchestrate

  • You don’t have to be there
  • Solve problems in your sleep
  • Monitor and resolve problems before they happen

The need for speed

  • The script is as fast as the computer
  • No typing or delays
  • No human error

Automate mundane tasks

  • You can do something more creative

Automation Benefits

Save time

  • No typing required
  • Run multiple times, over and over

Enforce baselines

  • Missing an important security patch
  • Automatically install when identified

Standard infrastructure configurations

  • Use a script to build a default router config
  • Add firewall rules to a new security appliance
  • IP configurations, security rules, standard configuration options

Secure scaling

  • Orchestrate cloud resources
  • Quickly scale up and down
  • Automation ensures proper security also scales

Employee retention

  • Automate the boring stuff
  • Ease the workload
  • Minimize the mundane tasks
  • Employees work is rewarding instead of repetitive

Reaction time

  • The computer is much faster than you
  • An event can be addressed immediately
  • A script doesn’t need a wake-up call

Workforce multiplier

  • Scripting works 24/7
  • Allows the smart people to do smarter work somewhere else

Cases for automation

User and resource provisioning

  • On-boarding and off-boarding
  • Assign access to specific resources

Guard rails

  • A set of automated validations
  • Limit behaviors and responses
  • Constantly check to ensure proper implementation
  • Reduce errors

Security groups

  • Assign (or remove) group access
  • Constant audits without human intervention

Ticket creation

  • Automatically identify issues
  • Script email submissions into a ticket

Escalation

  • Correct issues before involving a human
  • If issue isn’t resolved, contact the on-call tech

Controlling services and access

  • Automatically enable and disable services
  • No set and forget

Continuous integration and testing

  • Constant development and code updates
  • Securely test and deploy

Integrations and application programming interfaces (APIs)

  • Interact with third-party devices and services
  • Cloud services, firewalls, OSes
  • Talk their language

Scripting considerations

Complexity

  • Many moving parts
  • All the parts have to reliably work together

Cost

  • It takes money to create the script
  • It takes money to implement the automation

Single point of failure

  • What happens if the script stops working?
  • This could be a significant deal-breaker

Technical debt

  • Patching problems may push the issue down the road
  • It’s going to be more expensive to fix later

Ongoing supportability

  • The script works great today
  • The script may not work great tomorrow
  • Plan for changes and updates

Incident Response

Incident Response

Security incidents

User clicks an email attachment and executes malware

  • Malware then communicates with external servers

DDoS

  • Botnet attack

Confidential information is stolen

  • Thief wants money, or it goes public

User installs peer-to-peer software and allows external access to internal servers

NIST SP800-61

National Institute of Standards and Technology

  • NIST Special Publication 800-61 Revision 2
  • Computer Security Incident Handling Guide

The incident response lifecycle:

  • Preparation
  • Detection and Analysis
  • Containment, Eradication, and Recovery
  • Post-incident Activity

Preparing for an Incident

Communication methods

  • Phones and contact information

Incident handling hardware and software

  • Laptops, removable media, forensic software, digital cameras, etc.

Incident analysis resources

  • Documentation, network diagrams, baselines, critical file hash values

Incident mitigation software

  • Clean OS and application images

Policies needed for incident handling

  • Everyone knows what to do

The Challenge of Detection

Many detection sources

  • Different levels of detail, different levels of perception

A large amount of “volume”

  • Attacks are incoming all the time
  • How do you identify the legitimate threats?

Incidents are almost always complex

  • Extensive knowledge needed

Analysis

An incident might occur in the future

  • This is your heads-up

Web server log

  • Vulnerability scanner in use

Exploit announcement

  • Monthly Microsoft patch release, Adobe PDF software update

Direct threats

  • A hacking group doesn’t like you

An attack is underway

  • Or an exploit is successful

Buffer overflow attempt

  • Identified by an intrusion detection/prevention system

Anti-virus software identifies malware

  • Deletes from OS and notifies administrator

Host-based monitor detects a configuration change

  • Constantly monitors system files

Network traffic flows detect deviate from the norm

  • Requires constant monitoring

Isolation and Containment

Generally a bad idea to let things run their course

  • an incident can spread quickly
  • It’s your fault at that point

Sandboxes

  • An isolated OS
  • Run malware and analyze the results
  • Clean out the sandbox when done

Isolation can be sometimes be problematic

  • Malware or infections can monitor connectivity
  • When connectivity is lost, everything could be deleted/encrypted/damaged

Recovery after an Incident

Get things back to normal

  • Remove the bad, keep the good

Eradicate the bug

  • Remove malware
  • Disable breached user accounts
  • fix vulnerabilities

Recover the system

  • Restore from backups
  • Rebuild from scratch
  • Replace compromised files
  • Tighten down the perimeter

Lessons Learned

Learn and improve

  • No system is perfect

Post-incident meeting

  • Invite everyone affected by the incident

Don’t wait too long

  • Memories fade over time
  • Some recommendations can be applied to the next event

Answer the Tough Questions

What happened, exactly?

  • Timestamps of the event

How did your incident plans work?

  • Did the process operate successfully?

What would you do differently next time?

  • Retrospective views provide context

Which indicators would you watch next time?

  • Different precursors may give you better alerts

Training for an Incident

There is limited on-the-job training when a security event occurs

  • Be ready when an incident is identified

Train the team prior to an incident

  • Initial response
  • Investigation plans
  • Incident reporting
  • And more

This can be an expensive endeavor

  • Especially with larger response teams

Incident Planning

Exercising

Test yourselves before an actual event

  • Scheduled update sessions (annual, semi-annual, etc.)

Use well-defined rules of engagement

  • Do not touch the production systems

Very specific scenario

  • Limited time to run the event

Evaluate response

  • Document and discuss

Tabletop Exercises

Performing a full-scale disaster drill can be costly

  • And time-consuming

Many of the logistics can be determined through analysis

  • You don’t physically have to go through a disaster or drill

Get key players together for a tabletop exercise

  • Talk through a simulated disaster

Simulation

Test with a simulated event

  • Phishing attack, password requests, data breaches

Going phishing

  • Create a phishing email attack
  • Send to your actual user community
  • See who bites

Test internal security

  • Did the phishing get past the filter?

Test the users

  • Who clicked?
  • Additional training may be required

Root Cause Analysis

Determine the ultimate cause of an incident

  • Find the root cause by asking “why”

Create a set of conclusions regarding the incident

  • Backed up by the facts

Don’t get tunnel vision

  • There can be more than a single root cause

Mistakes happen

  • The response to the mistake is the difference

Threat Hunting

The constant game of cat and mouse

  • Find the attacker before they find you

Strategies are constantly changing

  • Firewalls get stronger, so phishing gets better

Intelligence data is reactive

  • You can’t see the attack until it happens

Speed up the reaction time

  • Use technology to fight

Digital Forensics

Collect and protect information relating to an intrusion

  • Many data sources and protection mechanisms

RFC 3227 — Guidelines for Evidence Collection and Archiving

  • A good set of best practices

Standard digital forensic process

  • Acquisition, analysis, and reporting

Must be detail oriented

  • Take extensive notes

A legal technique to preserve relevant information

  • Prepare for impending litigation
  • Initiated by legal counsel

Hold notification

  • Custodians are instructed to preserve data

Separate repository for electronically stored information (ESI)

  • Many data sources and types
  • Unique workflow and retention requirements

Ongoing preservation

  • Once notified, there’s an ongoing obligation to preserve data

Chain of Custody

Control evidence

  • Maintain integrity

Everyone who contacts the evidence

  • Use hashes and digital signatures
  • Avoid tampering

Label and catalog everything

  • Digitally tag all items for ongoing documentation
  • Seal and store

Acquisition

Obtain the data

  • Disk, RAM, firmware, OS files, etc.

Some data may not be on a single system

  • Servers, network data, firewall logs

For virtual systems, get a snapshot

  • Contains all files and information about a VM

Look for any left-behind digital items

  • Artifacts
  • Log information, recycle bins, browser bookmarks, saved logins, etc.

Reporting

Document the findings

  • For internal use, legal proceedings, etc.

Summary information

  • Overview of the security event

Detailed explanation of data acquisition

  • Step-by-step method of the process

The findings

  • An analysis of the data

Conclusion

  • Professional results, given the analysis

Preservation

Handling evidence

  • Isolate and protect the data
  • Analyze the data later without any alterations

Manage the collection process

  • Work from copies
  • Manage the data collection from mobile devices

Live collection has become an important skill

  • Data may be encrypted or difficult to collect after powering down

Follow best practices to ensure admissibility of data in court

  • What happens now affects the future

E-discovery

Electronic discovery

  • Collect, prepare, review, interpret, and produce electronic documents

E-discovery gathers data required by the legal process

  • Does not generally involve analysis
  • There’s no consideration of intent

Works together with digital forensics

  • The e-discovery process obtains a storage drive
  • Data on the drive is smaller than expected
  • Forensics experts determine that data was deleted and attempt to recover the data

Security Data Sources

Log Data

Security Log Files

Detailed security-related information

  • Blocked and allowed traffic flows
  • Exploit attempts
  • Blocked URL categories
  • DNS sinkhole traffic

Critical security information

  • Documentation of every traffic flow
  • Summary of attack info
  • Correlate with other logs

Firewall logs

Traffic flows through the firewall

  • Source/destination IP, port numbers, dispositions

Next Generation Firewalls (NGFW)

  • Logs the application used, URL filtering categories, anomalies and suspicious data

Application Logs

Specific to the application

  • Information varies widely

Windows

  • Event Viewer/Application Log

Linux/macOS

  • /var/log

Parse the log details on the SIEM

  • Filter out unneeded info

Endpoint Logs

Attackers often gain access to endpoints

  • Phones, laptops, tablets, desktops, servers, etc.

There’s a lot of data on the endpoint

  • Logon events, policy changes, system events, processes, account management, directory services, etc.

Everything rolls up to the SIEM

  • Security Information and Event Manager

Use with correlation of security events

  • Combine IPS events with endpoint status

OS-specific Security Logs

OS security events

  • Monitoring apps
  • Brute-force, files changes
  • Authentication details

Find problems before they happen

  • Brute force attacks
  • Disabled services

May require filtering

  • Don’t forward everything

IPS/IDS Logs

IPS/IDS

  • Usually integrated into an NGFW

Logs contain information about predefined vulnerabilities

  • Known OS vulnerabilities, generic security events

Common data points

  • Timestamps
  • Type or class of attack
  • Source and destination IP
  • Source and destination port

Network Logs

Switches, routers, access points, VPN concentrators

  • And other infrastructure devices

Network changes

  • Routing updates
  • Authentication issues
  • Network security issues

Metadata

Metadata

  • Data that describes other data sources

Email

  • Header details, sending servers, destination address

Mobile

  • Type of phone, GPS location

Web

  • OS, browser type, IP address

Files

  • Name, address, phone number, title

Vulnerability Scan

Lack of security controls

  • No firewall
  • No anti-virus
  • No anti-malware

Misconfigurations

  • Open shares
  • Guest access

Real vulnerabilities

  • Especially newer ones
  • Occasionally the old ones

Automated Reports

Most SIEMs include a report generator

  • Automate common security reports

May be easy or complex to create

  • The SIEM may have its own report generator
  • Third-party report generators may be able to access the database

Requires human intervention

  • Someone has to read the reports

These can be involved to create

  • Huge data storage and extensive processing time

Dashboards

Real-time status information

  • Get summaries on a single screen

Add or remove information

  • Most SIEMs and reporting systems allow for customization

Shows the most important data

  • Not designed for long-term analysis

Packet Captures

Solve complex application issues

  • Get into the details

Gathers packets on the network

  • Or in the air
  • Sometimes built into the device

View detailed traffic information

  • Identify unknown traffic
  • Verify packet filtering and security controls
  • View a plain-language description of the application data

Security Governance

Security Policies

Security Policies Guidelines

What rules are you following to provide CIA?

  • Confidentiality, Integrity, and Availability

High level strategies

  • Data storage requirements, security events procedures

Detailed security goals

  • Appropriate Wi-Fi usage, requirements for remote access

Security policies answer the “what” and “why”

  • Technical security controls answer the “how”

Information Security Policies

The big list of all security-related policies

  • A centralized resource for processes

Compliance requirements

  • Can be critical to an organization

Detailed security procedures

  • What happens when…?

A list of roles and responsibilities

  • You got this

This is just words and letters

  • An organization must enforce the policy

Acceptable Use Policies (AUP)

What is acceptable use of company assets?

  • Detailed documentation
  • May be documented in the Rules of Behavior

Covers many topics

  • Internet use, telephones, computers, mobile devices, etc.

Used by an organization to limit legal liability

  • If someone is dismissed, these are the well-documented reasons why

Business Continuity

Not everything goes according to plan

  • Disasters can cause a disruption to the norm

We rely on our computer systems

  • Technology is pervasive

There needs to be an alternative

  • Manual transactions
  • Paper receipts
  • Phone calls for transaction approvals

These must be documented and tested before a problem occurs

Disaster Recovery Plan

If a disaster happens, IT should be ready

  • Part of business continuity planning
  • Keep the organization up and running

Disasters are many and varied

  • Natural disasters
  • Technology or system failures
  • Human-created disasters

A comprehensive plan

  • Recovery location
  • Data recovery method
  • Application restoration
  • IT team and employee availability

Security Incidents

User clicks an email attachment and executes malware

  • Malware then communicates with external servers

DDoS

  • Botnet attack

Confidential information is stolen

  • Thief wants money, or it goes public

Incident Response Roles

Incident response team

  • Specialized group, trained and tested

IT security management

  • Corporate support

Compliance officers

  • Intricate knowledge of compliance rules

Technical staff

  • Your team in the trenches

User community

  • They see everything

NIST SP800-61

National Institute of Standards and Technology

  • NIST Special Publication 800-61 Revision 2
  • Computer Security Incident Handling Guide

The incident response lifecycle

  • Preparation
  • Detection and Analysis
  • Containment, Eradication, and Recovery
  • Post-incident Activity

Software Development Lifecycle (SDLC)

Systems development life cycle

  • Or application development life cycle

Many ways to get from idea to app

  • And many moving parts
  • Customer requirements
  • Keep the process on schedule
  • Stay in budget

There is no “best way”

  • But it helps to have a framework
  • There are many options

Change Management

How to make a change

  • Upgrade software, change firewall configuration, modify switch ports

One of the most common risks in the enterprise

  • Occurs very frequently

Often overlooked or ignored

  • Did you feel that bite?

Have clear policies

  • Frequency, duration, installation process, fallback procedures

Sometimes extremely difficult to implement

  • It’s hard to change organizational culture

Security Standards

A formal definition for using security technologies and processes

  • Complete documentation reproduces security risk
  • Everyone understands the expectations

These may be written in-house

  • Your requirements may be unique

Many standards are already available

  • ISO (International Organization for Standardization)
  • NIST (National Institute of Standards and Technology)

Password

What makes a good password?

  • Every organization has their own requirements
  • Create a formal password complexity policy

Define acceptable authentication methods

  • No local accounts, only LDAP to the AD database, etc.

Create policies for secure password resets

  • Avoid unauthorized resets and access

Other password policies

  • Password change frequency, secure password storage requirements, password manager options, etc.

Access Control

How does an organization control access to data?

  • Determine which information, at what time
  • And number which circumstances

Define which access control types can be used

  • No discretionary, mandatory only, etc.

Determine how a user gets access

  • Require privilege documentation

Document how access may be removed

  • Security issues, expiration, contract renewals, etc.

Physical Security

Rules and policies regarding physical security controls

  • Doors, building access, property security

Granting physical access

  • Different for employees vs. visitors

Define specific physical security systems

  • Electronic door locks, ongoing monitoring, motion detection, etc.

Additional security concerns

  • Mandatory escorts, off-boarding, etc.

Encryption

Define specific standards for encrypting and securing data

  • All things cryptographic
  • Can include implementation standards

Password storage

  • Methods and techniques

Data encryption minimums

  • Algorithms for data in use, data in transit, data at rest
  • Will probably be different for each data state

Security Procedures

Change Management

A formal process for managing change

  • Avoid downtime, confusion, and mistakes

Nothing changes without the process

  • Determine the scope of the change
  • Analyze the risk associated with the change
  • Create a plan
  • Get end-user approval
  • Present the proposal to the change control board
  • Have a backout plan if the change doesn’t work
  • Document the changes

On-boarding

Bring a new person into the organization

  • New hires or transfers

IT agreements need to be signed

  • May be part of the employee handbook or a separate AUP

Create accounts

  • Associate the user with proper groups and departments

Provide required IT hardware

  • Laptops, tablets, etc.
  • Preconfigured and ready to go

Off-boarding

All good things…

  • But you know this day would come

This process should be pre-planned

  • You don’t want to decide how to do things at this point

What happens to the hardware?

What happens to the data?

Account information is usually deactivated

  • But not always deleted

Playbooks

Conditional steps to follow; a broad process

  • Investigate a data breach, recover from ransomware

Step-by-step set of processes and procedures

  • A manual checklist
  • Can be used to create automated activities

Often integrated with a SOAR platform

  • Security Orchestration, Automation, and Response
  • Integrate third-party tools and data sources
  • Make security teams more effective

Monitoring and Revision

IT security is constantly changing

  • Processes and procedures also must change

Update to security posture

  • Tighter change control, additional playbooks

Change to individual procedure

  • Update the playbooks, include additional checks

New security concerns

  • Protect against emerging threats

Governance Structures

Boards

  • A panel of specialists
  • Sets the tasks or requirements for the committees

Committees

  • Subject-matter experts
  • Considers the input from a board
  • Determines next steps for a topic at hand
  • Presents the results to the board

Government entities

  • A different kind of machine
  • Legal concerns, administrative requirements, political issues
  • Often open to public

Centralized/decentralized

  • The source of the processes and procedures
  • Centralized governance is located in one location with a group of decision makers
  • Decentralized governance spreads the decision-making process around to other individuals or locations

Security Considerations

Regulatory

Regulations are often mandated

  • Security processes are usually a foundational consideration
  • Logging, data storage, data protection, and retention

Sarbanes-Oxley Act (SOX)

  • The Public Company Accounting Reform and Investor Protection Act of 2002

The Health Insurance Portability and Accountability Act (HIPAA)

  • Extensive healthcare standards for storage, use, and transmission of health care information

The security team is often tasked with legal responsibilities

  • Reporting illegal activities
  • Holding data required for legal proceedings

Security breach notifications

  • A legal requirement in many jurisdictions

Cloud computing can make this challenging

  • Data moves between jurisdictions without human intervention
  • The security team must follow legal guidelines

Industry

The industry may require specific security considerations

  • Every market is a bit different

Electrical power and public utilities

  • Isolated and protected system controls

Medical

  • Highly secure data storage and access logs
  • Data encryption and protection

Geographical Security

Local/regional

  • City and state government records
  • Uptime and availability of end-user services

National

  • Federal governments and national defense
  • Multi-state organizations
  • State secrets remain secret

Global

  • Large multinational companies
  • Global financial markets
  • Legal concerns will vary widely

Data Roles and Responsibilities

Data Responsibilities

High-level data relationships

  • Organizational responsibilities, not always technical

Data owner

  • Accountable for specific data, often a senior officer
  • VP of Sales owns the customer relationship data
  • Treasurer owns the financial information

Date Roles

Data controller

  • Manages the purposes and means by which personal data is processed

Data processor

  • Processes data on behalf of the data controller
  • Often a third-party or different group

Payroll controller and processor

  • Payroll department (data controller) defines payroll amounts and timeframes
  • Payroll company (data processor) processes payroll and stores employee information

Data custodian/steward

  • Responsible for data accuracy, privacy, and security

Works directly with the data

  • Associates sensitivity labels to the data
  • Ensures compliance with any applicable laws and standards
  • Manages the access rights to the data
  • Implements security controls

Risk Management

Risk Management

Risk Identification

The only certainty is uncertainty

  • Risk management helps to understand potential risks
  • Identify weaknesses before they become an issue

An important part of any organization

  • Growth brings risk
  • It’s useful to get ahead of any potential problems

Risk management

  • Manage potential risk
  • Qualify internal and external threats
  • Risk analysis helps plan for contingencies

Performing a risk Assessment

Not all risk requires constant evaluation

  • Or it might be required to always assess the amount of risk

One-time

  • The assessment may be part of a one-time project
  • Company acquisition, new equipment installation, unique new security threats, etc.

Continuous assessments

  • May be part of an existing process
  • Change control requires a risk assessment as part of the change

Ad HOC Assessment

An organization may not have a formal risk assessment process

  • Perform an assessment when the situation requires

CEO is back from a conference

  • Wants to know if the organization is protected from a new attack type

A committee is created, and the risk assessment proceeds

  • Once the assessment is complete, the committee is disbanded
  • There may not be a need to investigate this specific risk again

Recurring Assessment

Recurring assessments

  • The evaluation occurs on standard intervals

An internal assessment

  • Performed every three months at the beginning of the quarter

A mandated risk assessment

  • Required by certain organizations
  • Some legal requirements will mandate an assessment
  • PCI DSS requires annual risk assessments

Risk Analysis

Qualitative Risk Assessment

Identify significant risk factors

  • Ask opinions about the significance
  • Display visually with traffic light grid or similar method

ARO (Annualized Rate of Occurrence)

  • How likely is that a hurricane will hit? In Montana? In Florida?

Asset value (AV)

  • The value of asset to the organization
  • Includes the cost of the asset, the effect of company sales, potential regulatory fines, etc.

Exposure factor (EF)

  • The percentage of the value lost due to an incident
  • Losing a quarter of the value is .25
  • Losing the entire asset is 1.0

SLE (Single Loss Expectancy)

  • What is the monetary loss if a single event occurs?
  • Asset value (AV) x Exposure factor (EF)
  • Laptop stolen = $1000 (AV) x 1.0 (EF) = $1000 (SLE)

ALE (Annualized Loss Expectancy)

  • Annualized Rate of Occurrence (ARO) x SLE
  • Seven laptops stolen a year (ARO) x $1000 (SLE) = $7000

The business impact can be more than monetary

  • Quantitative vs. qualitative

Impact

Life

  • The most important consideration

Property

  • The risk to buildings and assets

Safety

  • Some environments are too dangerous to work

Finance

  • The resulting financial cost

Likelihood and Probability

Risk likelihood

  • A qualitative measurement of risk
  • Rare, possible, almost certain, etc.

Risk probability

  • A quantitative measurement of risk
  • A statistical measurement
  • Can be used based on historical performance

Often considered similar in scope

  • Can be used interchangeably in casual conversation

Risk Appetite and Tolerance

Risk appetite

  • A broad description of risk-taking deemed acceptable
  • The amount of accepted risk before taking any action to reduce that risk

Risk appetite posture

  • Qualitative description for readiness to take risk
  • Conservative, neutral, and expansionary

Risk tolerance

  • An acceptable variance (usually larger) from the risk appetite

Risk appetite example:

  • A highway’s speed limit
  • Government authorities have set the speed limit
  • The limit is an acceptable balance between safety and convenience

Risk tolerance example:

  • Drivers will be ticketed when the speed limit is violated
  • Ticketing usually occurs well above the posted limit
  • This tolerance can change with road conditions, weather, traffic, etc.

Risk Register

Every project has a plan, but also has risk

  • Identify and document the risk associated with each step
  • Apply possible solutions to the identified risks
  • Monitor the results

Key risk indicators

  • Identify risks that could impact the organization

Risk owners

  • Each indicator is assigned someone to manage the risk

Risk threshold

  • The cost of mitigation is at least equal to the value gained by mitigation

Risk Management Strategies

Accept with exemption

  • A security policy or regulation cannot be followed
  • May be based on available security controls, size of the organization, total assets, etc.
  • Exemption may need approval

Accept with exception

  • Internal security policies are not applied
  • Monthly security updates must be applied within 3 calendar days
  • The monthly updates cause a critical software package to crash
  • An exception is made to the update timeframe

Avoid

  • Stop participating in a high-risk activity
  • This effectively removes the risk

Mitigate

  • Decrease the risk level
  • Invest in security systems

Risk Reporting

A formal document

  • Identifies risk
  • Detailed information for each risk

Usually created for senior management

  • Make decisions regarding resources, budgeting, additional security tasks

Commonly includes critical and emerging risks

  • The most important consideration

Business Impact Analysis

Recovery

Recovery time objective (RTO)

  • Get up and running quickly
  • Get back to a particular service level
  • You’re not up and running until the database and web server are operational
  • How long did that take?

Recovery point objective (RPO)

  • How much data loss is acceptable?
  • Bring the system back online; how far back does data go?
  • The database is up, but only provides the last twelve months of data

Meantime to repair (MTTR)

  • Average time required to fix an issue
  • This includes time spent diagnosing the problem
  • An important metric for determining the cost and time associated with unplanned outages

Mean time between failures (MTBF)

  • The time between outages
  • Can be used as a prediction or calculated based on historical performance
  • Total Uptime/Number of Breakdowns
  • Statistically plan for possible outages

Third Party Risk

Third-party Risk Assessment

Every organization works with vendors

  • Payroll, customer relationship management, email marketing, travel, raw materials

Important company data is often shared

  • May be required for cloud-based services

Perform a risk assessment

  • Categorize risk by vendor and manage the risk

Use contracts for clear understanding

  • Make sure everyone understands the expectations
  • Use the contract to enforce a secure environment

Penetration Testing

Pentest

  • Simulate an attack

Similar to vulnerability scanning

  • Except we actually try to exploit the vulnerabilities

Often a compliance mandate

  • May include a legal requirement

Regular penetration testing by a 3rd-party

  • Very specialized
  • Third-party experts are well-versed

Rules of Engagement

An important document

  • Defines purpose and scope
  • Makes everyone aware of the test parameters

Type of testing and schedule

  • On-site physical breach, internal test, external test
  • Normal working hours, after 6 PM only, etc.

The rules

  • IP address ranges
  • Emergency contacts
  • How to handle sensitive information
  • In-scope and out-of-scope devices or applications

Right-to-audit Clauses

Common to work business partners

  • Data sharing
  • Outsourcing

Third-party providers

  • Can hold all the data
  • Manage internet access
  • Are they secure?

Right-to-audit should be in the contract

  • A legal agreement to have the option to perform a security audit at any time
  • Everyone agrees to the terms and conditions
  • Ability to verify security before a breach occurs

Evidence of Internal Audit

Evaluate the effectiveness of security controls

  • Have a third party perform an audit

May be required for compliance

  • It’s a good idea, even without industry standards

Check for security controls and processes

  • Access management, off boarding, password security, VPN controls, etc.
  • There’s always an opportunity for improvement

Perform at a reasonable frequency

  • A single audit isn’t very helpful in the long-term

Supply Chain Analysis

The system involved when creating a product

  • Involves organizations, people, activities, and resources

Supply chain analysis

  • Get a product or service from supplier to customer
  • Evaluate coordination between groups
  • identify areas of improvement
  • Assess the IT systems supporting the operation
  • Document the business process changes

Software update installs malware: March-June 2020

  • Announced December 2020 by SolarWinds
  • Malware deployed with a valid SolarWinds digital signature
  • At least 18,000 of 300,000 customers potentially impacted

Independent Assessments

Bring in a smart person or team to evaluate security and provide recommendations

  • An outside firm

Specialists in their field

  • They do this all day, every day

They’ve seen it all

  • And can provide options you may not have considered

Vendor Selection Process

Due diligence

  • Check a company out before doing business
  • Investigate and verify information
  • Financial status, pending or past legal issues, etc.
  • Background checks, personnel interviews

Conflict of interest

  • A personal interest could compromise judgment
  • A potential partner also does business with your largest competitor
  • A third-party employs the brother of the CFO
  • A third-party offers gifts if a contract is signed

Vendor Monitoring

Ongoing management of the vendor relationship

  • This doesn’t end when the contract is signed

Reviews should occur on a regular basis

  • Financial health check, IT security reviews, news articles, social media posts

Different vendors may be checked for different indicators

  • Quantitative and qualitative analysis

Assign a person to be in charge of the vendor relationship

  • They will manage the monitoring process

Questionnaires

An important part of due diligence and ongoing vendor monitoring

  • Get answers directly from the vendor

Security-related questions

  • What is the vendor’s due diligence process?
  • What plans are in place for disaster recovery?
  • What secure storage method is used for company data?
  • And more

Results are used to update a vendor risk analysis

  • Updated during the life of the vendor relationship

Agreement Types

Common Agreements

Service Level Agreement (SLA)

  • Minimum terms for services provided
  • Uptime, response time agreement, etc.
  • Commonly used between customers and service providers

Contract with an Internet provider

  • SLA is no more than four hours of unscheduled downtime
  • Technician will be dispatched
  • May require customer to keep spare equipment on-site

Memorandum of Understanding (MOU)

  • Both sides agree in general to the contents of the memorandum
  • Usually states common goals, but not much more
  • May include statements of confidentiality
  • Informal letter of intent; not a signed contract

Memorandum of Agreement (MOA)

  • The next step above a MOU
  • Both sides conditionally agree to the objectives
  • Can also be a legal document, even without legal language
  • Unlike a contract, may not contain legally enforceable promises

Master Service Agreement (MSA)

  • Legal contract and agreement of terms
  • A broad framework to cover later transactions
  • Many detailed negotiations happen here
  • Future projects will be based on this agreement

Work order (WO)/Statement of Work (SOW)

  • Specific list of items to be completed
  • Used in conjunction with an MSA
  • Details the scope of the job, location, deliverables schedule, acceptance criteria, and more
  • Was the job done properly? Let’s refer to the SOW.

Business Partners Agreement (BPA)

  • Going into business together
  • Owner stake
  • Financial contract

Decision-making

  • Who makes the business decisions?
  • The BPA lists specific individuals and scope

Prepare for contingencies

  • Financial issues
  • Disaster recovery

Non-disclosure Agreement (NDA)

Confidentiality agreement between parties

  • Information in the agreement should not be disclosed

Protects confidential information

  • Trade secrets
  • Business activities
  • Anything else listed in the NDA

Unilateral or bilateral (or multilateral)

  • One-way NDA or mutual NDA

Formal contract

  • Signatures are usually required

Security Compliance

Compliance

Compliance

  • Meeting the standards of laws, policies, and regulations

A healthy catalog of rules

  • Across many aspects of business and life
  • Many are industry-specific or situational

Penalties

  • Fines, loss of employment, incarceration

Scope

  • Domestic and international requirements

Compliance Reporting

Internal

  • Monitor and report on organizational compliance efforts
  • Large organizations have a Central Compliance Officer (CCO)
  • Also used to provide details to customers or potential investors

External

  • Documentation required by external or industry regulators
  • May require annual or ongoing reporting
  • Missing or invalid reporting could result in fines and/or sanctions

Regulatory Compliance

Sarbanes-Oxley Act (SOX)

  • The Public Company Accounting Reform and Investor Protection Act of 20002

The Health Insurance Portability and Accountability Act (HIPAA)

  • Extensive healthcare standards for storage, use, and transmission of health care information

The Gramm-Leach-Bliley Act of 1999 (GLBA)

  • Disclosure of privacy information from financial institutions

HIPAA Non-Compliance Fines and Sanctions

↵ Fine of up to $50,000, or up to 1 year in prison, or both; (Class 6 Felony)

↵ Under false pretenses; a fine of up to $100,000, up to 5 years in prison, or both; (Class 5 Felony)

↵ Intent to sell, transfer, or use individually identifiable health information for commercial advantage, personal gain, or malicious harm, a fine up to $250,000, or up to 10 years in prison, or both; (Class 4 Felony)

↵ Civil fines; maximum is $100 for each violation, with the total amount not to exceed $25,000 for all violations of an identical requirement or prohibition during a calendar year; (Class 3 Felony)

Reputational Damage

Getting hacked isn’t a great look

  • Organizations are often required to disclose
  • Stock prices drop, at least for the short term

October 2016 — Uber Breach

  • 25.6 million Names, email addresses, mobile phone numbers

Didn’t publicly announce it until November 2017

  • Allegedly paid the hackers $100,000 and had them sign an NDA
  • 2018 — Uber paid $148 million in fines

Hackers pleaded guilty in October 2019

  • May 2023 — Uber’s former Chief Security Officer sentenced
  • Three years probation and a $50,000 fine

Other Consequences

Loss of license

  • Significant economic sanction
  • Organization cannot sell products
  • Other cannot purchase from a sanctioned company
  • May be expensive to re-license

Contractual impacts

  • Some business deals may require a minimum compliance level
  • Without compliance, the contract may be in breach
  • May be resolved with or without a court of law

Compliance Monitoring

Compliance monitoring

  • Ensure compliance in day-to-day operations

Due diligence/care

  • A duty to act honestly and in good faith
  • Investigate and verify
  • Due care tends to refer to internal activities
  • Due diligence is often associated with third-party activities

Attestation and acknowledgement

  • Someone must “sign off” on formal compliance documentation
  • Ultimately responsible if the documentation is incorrect

Internal and external

  • Monitor compliance with internal tools
  • Provide access or information to third-party participants
  • May require ongoing monitoring of third-party operations

Automation

  • A must-have for large organizations
  • Can be quite different across vertical markets
  • Many third-party monitoring systems
  • Collect data from people and systems
  • Compile the data and report

Privacy

A constantly evolving set of guidelines

  • We are all concerned about privacy

Local/regional

  • State and local governments set privacy limits
  • Legal information, vehicle registration details, medical licensing

National

  • Privacy laws for everyone in a country
  • HIPAA, online privacy for children under 13, act.

Global

  • Many countries are working together for privacy

GDPR — General Data Protection Regulation

European Union Regulation

  • Data protection and privacy for individuals in the EU
  • Name, address, photo, email address, bank details, posts on social networking websites, medical information, a computer’s IP address, etc.

Controls export of personal data

  • Users can decide where their data goes
  • Can request removal of data from search engines

Gives “data subjects” control of their personal data

  • A right to be forgotten

Data Subject

Any information relating to an identified or identifiable person

  • An individual with personal data

This includes everyone

  • Name, ID number, address information, genetic makeup, physical characteristics, location, etc.
  • You are the data subject

Laws and regulations

  • Privacy is ideally defined from the perspective of the data subject

Data Responsibilities

High-level data relationships

  • Organizational responsibilities, not always technical

Data owner

  • Accountable for specific data, often a senior officer
  • VP of Sales owns the customer relationship data
  • Treasurer owns the financial information

Data Roles

Data controller

  • Manages the purposes and means by which personal data is processed

Data processor

  • Processes data on behalf of the data controller
  • Often a third-party or different group

Payroll controller and processor

  • Payroll department (data controller) defines payroll amounts and timeframes
  • Payroll company (data processor) processes payroll and stores employee information

Data Inventory and Retention

What data does your organization store?

  • You should document your data inventory

Data inventory

  • A listing of all managed data
  • Owner, update frequency, format of the data

Internal use

  • Project collaboration, IT security, data quality checks

External use

  • Select data to share publicly
  • Follow existing laws and regulations

Audits and Assessments

Audits and Assessments

Not just for taxes

  • There are good reasons to audit your technology

Cybersecurity audit

  • Examines the IT infrastructure, software, devices, etc.
  • Checks for effectiveness of policies and procedures
  • Find vulnerabilities before the attackers
  • Can be performed internally or by a third party

Attestation

  • Provides an opinion of truth or accuracy of a company’s security positioning
  • An auditor will attest to a company’s cybersecurity posture

Internal Audits

Audits aren’t just for third-parties

  • You should also have internal audits

Compliance

  • Is your organization complying with regulatory or industry requirements?

Audit committee

  • Oversees risk management activities
  • All audits start and stop with the committee

Self-assessments

  • Have the organization perform their own checks
  • Consolidate the self-assessments into ongoing reports

External Audits

Regulatory requirements

  • An independent third-party may be required to perform the audit
  • Audit type and frequency are often based on the regulation

Examinations

  • Audits will often require hands-on research
  • View records, compile reports, gather additional details

Assessment

  • Audit will assess current activities
  • May also provide recommendation for future improvements

Penetration Tests

Physical Penetration Testing

OS security can be circumvented by physical means

  • Modify the boot process
  • Boot from other media
  • Modify or replace OS files

Physical security is key

  • Prevent access by unauthorized individuals

Assess and test physical security

  • Can you enter a building without a key?
  • What access is available inside?
  • Doors, windows, elevators, physical security processes

Pentesting Perspectives

Offensive

  • The red team
  • Attack the systems and look for vulnerabilities to exploit

Defensive

  • The blue team
  • Identify attacks in real-time
  • Prevent any unauthorized access

Integrated

  • Create an ongoing process
  • Identify and patch exploitable systems and services
  • Test again

Working Knowledge

How much do you know about the test?

  • Many approaches

Known environment

  • Full disclosure

Partially known environment

  • A mix of known and unknown
  • Focus on certain systems or applications

Unknown environment

  • The pentester knows nothing about the systems under attack
  • “Blind” test

Reconnaissance

Need information before the attack

  • Can’t rush blindly into battle

Gathering a digital footprint

  • Learn everything you can

Understand the security posture

  • Firewalls, security configuration

Minimize the attack area

  • Focus on key systems

Create a network map

  • Identify routers, networks, remote sites

Passive Reconnaissance

↻ Learn as much as you can from open sources

  • There’s a lot of information out there
  • Remarkably difficult to protect or identify

↻ Social media

↻ Corporate website

↻ Online forums, Reddit

↻ Social Engineering

↻ Dumpster diving

↻ Business organizations

Active Reconnaissance

↻ Trying the doors

  • Maybe one is unlocked
  • Don’t open it yet
  • Relatively easy to be seen

↻ Visible on network traffic and logs

↻ Ping scans, port scans

↻ DNS scans, OS fingerprinting

↻ Service scans, version scans

Security Awareness

Security Awareness

Phishing Campaigns

How many employees would click a link in a phishing email

  • There’s way to find out

Many companies will perform their own phishing campaign

  • Send a phishing email to your employees

An automated process

  • Centralized reporting for incorrect clicks
  • Users can receive immediate feedback and security training
  • Some organizations will schedule in-person training

Recognize a phishing attempt

  • Spelling and grammatical errors
  • Domain name and email inconsistencies
  • Unusual attachments
  • Request for personal information
Tip

With the rise of Large language models, phishing campaigns has become more sophisticated and personalized.

Respond to reported suspicious messages

  • Email filtering can get the worst offenders
  • Never click a link in an email
  • Never run an attachment from an email
  • All organizations should have a process for reporting phishing

Anomalous Behavior Recognition

Risky behavior

  • Modifying hosts file
  • Replacing a core OS file
  • Uploading sensitive files

Unexpected behavior

  • Logon from another country
  • Increase in data transfers

Unintentional behavior

  • Typing the wrong domain name
  • Misplacing USB drives
  • Misconfiguring security settings

Reporting and Monitoring

Track and analyze security awareness metrics

  • Automated
  • Phishing click rates
  • Password manager adoption, MFA use, password sharing

Initial

  • First occurrence is an opportunity for user training
  • Work towards avoiding the issue in the future

Recurring

  • The value of long-term monitoring
  • Identify high-frequency security issues
  • Help users with multiple occurrences

Development

Create a Security Awareness team

  • Determine roles for training, monitoring, policy creation, etc.

Establish a minimum awareness level

  • Information delivery (emails, posters, notices, training)
  • Depth of training based on job function

Integrate compliance mandates

  • PCI DSS, HIPAA, GDPR, etc.

Define metrics

  • Assess the performance of security awareness programs
  • Make updates in lower-performance areas

Execution

Create the training materials

  • Provided to users in different forms

Document success measurements

  • How will we know the awareness is working?

Identify the stakeholders

  • Provide ongoing metrics and performance data

Deploy the training material

  • Classroom training, posters, weekly emails, etc.

Track user training efforts

  • Ongoing monitoring, usually with an automated reporting system

User Training

Security Awareness Training

Before providing access, train your users

  • Detailed security requirements

Specialized training

  • Each user role has unique security responsibilities

Also applies to third-parties

  • Contractors, partners, suppliers

Detailed documentation and records

  • Problems later can be severe for everyone

User Guidance and Training

Policy/handbooks

  • Document all security requirements
  • Provide access online in policy guidelines
  • Reference the policies in the employee handbook

Situational awareness

  • Users should always be looking for threats
  • Software attacks: Email links, attachments, unusual URLs, text messages, etc.
  • Physical Attacks: USB drives in a FedEx envelope, unlocked building doors, etc.
  • Be ready for anything

Insider threat

  • Difficult to guard against
  • Add multiple approvals for critical processes
  • Monitor files and systems as much as possible

Password management

  • Many standards to choose from
  • Guide users with standard requirements (length, complexity, etc.)
  • This is often controlled using technology (Group Policy)

Removable media and cables

  • Unknown USB drives can contain malware
  • Unknown cables can be malicious

Social engineering

  • Extensive and ongoing training
  • The attackers are very good
  • The users are your front line defense

Operational security

  • View security from the attacker’s perspective
  • Users need to identify sensitive data
  • Keep the sensitive data private

Hybrid/remote work environments

  • Working at home brings unusual security risks
  • No access to family and friends
  • Additional endpoint security
  • Security policies for VPN access