accruent insights 2014 2014-04-28 - v8 - final

42
EVADE THE BREACH BY CHANGING THE WAY YOU THINK ABOUT INFORMATION SECURITY MAJOR HAYDEN RACKSPACE @majorhayden FOR ACCRUENT INSIGHTS 2014, AUSTIN, TEXAS PHOTO CREDIT: CURTIS GREGORY PERRY [bit.ly/1k5ajws]

Upload: major-hayden

Post on 06-Nov-2014

246 views

Category:

Technology


7 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Accruent insights 2014   2014-04-28 - v8 - final

EVADE THE BREACHBY CHANGING THE WAY YOU THINK ABOUT INFORMATION SECURITY

MAJOR HAYDEN RACKSPACE @majorhayden

FOR ACCRUENT INSIGHTS 2014, AUSTIN, TEXAS PHOTO CREDIT: CURTIS GREGORY PERRY [bit.ly/1k5ajws]

Page 2: Accruent insights 2014   2014-04-28 - v8 - final

ABOUT MAJOR• Born in Austin

• At Rackspace since 2006

• Focused on Linux engineering, software development and information security

• Two kids and four chinchillas

Page 3: Accruent insights 2014   2014-04-28 - v8 - final

THIS IS A CHINCHILLATHEY ARE AMAZING PETS AND I COULD TALK ABOUT THEM FOR A LONG TIME

Page 4: Accruent insights 2014   2014-04-28 - v8 - final

AGENDA

Presentation 30 minutes

Q&A 30 minutes

Page 5: Accruent insights 2014   2014-04-28 - v8 - final

Let's cover some critical concepts

Page 6: Accruent insights 2014   2014-04-28 - v8 - final

SECURITY ISN'T EASY

Page 7: Accruent insights 2014   2014-04-28 - v8 - final

YOUR BUSINESS DOESN'T EXIST TO BE SECURE

INSPIRED BY KEITH PALMGREN'S "13 ABSOLUTE TRUTHS OF SECURITY"

Page 8: Accruent insights 2014   2014-04-28 - v8 - final

SECURITY HAS NO FINISH LINE

INSPIRED BY KEITH PALMGREN'S "13 ABSOLUTE TRUTHS OF SECURITY"

Page 9: Accruent insights 2014   2014-04-28 - v8 - final

Reports that say...that something hasn't happened are always interesting to me,

because as we know, there are known knowns;

!there are things that we know that we know. We also know there are known unknowns;

!that is to say

we know there are some things we do not know. But there are also unknown unknowns, the ones we don't know we don't know.

—Donald Rumsfeld, United States Secretary of Defense

PUBLIC DOMAIN PHOTO BY THE UNITED STATES ARMY

Page 10: Accruent insights 2014   2014-04-28 - v8 - final

THREE DEFENSIVE LAYERS

PreventativeMake yourself a hard target

DetectiveKnow when danger is on your doorstep

CorrectiveRemove the threat and repair the damage

PR

OC

ES

S IM

PR

OV

EM

EN

T

!F

EE

DB

AC

K L

OO

P

Page 11: Accruent insights 2014   2014-04-28 - v8 - final

We can apply these layers to something

we all know well

Page 12: Accruent insights 2014   2014-04-28 - v8 - final

How do we protect our homes?

PHOTO CREDIT: DPREVITE [bit.ly/1mC8QBi]

Page 13: Accruent insights 2014   2014-04-28 - v8 - final

PHOTO CREDIT: DPREVITE [bit.ly/1mC8QBi]

We lock our doors

We put our lights on timers

We close the blinds

We install security cameras

We join the neighborhood watch

We set our security alarm

We have our alarm monitored

We buy homeowner's insurance

!

We buy firearms**

Page 14: Accruent insights 2014   2014-04-28 - v8 - final

PHOTO CREDIT: DPREVITE [bit.ly/1mC8QBi]

We lock our doors

We put our lights on timers

We close the blinds

We install security cameras

We join the neighborhood watch

We set our security alarm

We have our alarm monitored

We buy homeowner's insurance

!

We buy firearms

PREVENTATIVE

Page 15: Accruent insights 2014   2014-04-28 - v8 - final

PHOTO CREDIT: DPREVITE [bit.ly/1mC8QBi]

We lock our doors

We put our lights on timers

We close the blinds

We install security cameras

We join the neighborhood watch

We set our security alarm

We have our alarm monitored

We buy homeowner's insurance

!

We buy firearms

DETECTIVE

Page 16: Accruent insights 2014   2014-04-28 - v8 - final

PHOTO CREDIT: DPREVITE [bit.ly/1mC8QBi]

We lock our doors

We put our lights on timers

We close the blinds

We install security cameras

We join the neighborhood watch

We set our security alarm

We have our alarm monitored

We buy homeowner's insurance

!

We buy firearms

CORRECTIVE

Page 17: Accruent insights 2014   2014-04-28 - v8 - final

You now know two other concepts

Page 18: Accruent insights 2014   2014-04-28 - v8 - final

DEFENSE IN DEPTHASSUME THE WORST AND BUILD LAYERS OF DEFENSE

PHOTO CREDIT: SZEKE [bit.ly/1mxjkzl]

Page 19: Accruent insights 2014   2014-04-28 - v8 - final

RISK MANAGEMENTINVEST YOUR TIME SPENT ON SECURITY WISELY

PHOTO CREDIT: LORENZOCLICK [bit.ly/1f40rns]

Page 20: Accruent insights 2014   2014-04-28 - v8 - final

Do your third party vendors invest in

security as much as you do?

Page 21: Accruent insights 2014   2014-04-28 - v8 - final

How will you know for sure?

Page 22: Accruent insights 2014   2014-04-28 - v8 - final

IT'S NOT EASY

PHOTO CREDIT: KEVIN DOOLEY [bit.ly/1ri0hej]

Page 23: Accruent insights 2014   2014-04-28 - v8 - final

Let's review the facts

Page 24: Accruent insights 2014   2014-04-28 - v8 - final

"Target gave network access to a third-party

vendor, a small Pennsylvania HVAC

company, which did not appear to follow broadly accepted

information security practices. The vendor’s weak security allowed

the attackers to gain a foothold

in Target’s network."

Page 25: Accruent insights 2014   2014-04-28 - v8 - final

"Target appears to have

failed to respond to multiple automated

warnings from the company’s

anti-intrusion software that the

attackers were installing malware

on Target’s system."

Page 26: Accruent insights 2014   2014-04-28 - v8 - final

"Attackers who infiltrated Target’s

network with a vendor credential

appear to have successfully moved from

less sensitive areas of Target’s network to

areas storing consumer data, suggesting that

Target failed to properly isolate its most sensitive

network assets."

Page 27: Accruent insights 2014   2014-04-28 - v8 - final

"Target appears to have

failed to respond to multiple warnings from the company’s

anti-intrusion software regarding the

escape routes the attackers planned

to use to exfiltrate data

from Target’s network."

Page 28: Accruent insights 2014   2014-04-28 - v8 - final

What can we learn from the Target breach?

Page 29: Accruent insights 2014   2014-04-28 - v8 - final

Target's situation isn't unique

to Target

Page 30: Accruent insights 2014   2014-04-28 - v8 - final

It's your responsibility to insulate yourself from third parties

Page 31: Accruent insights 2014   2014-04-28 - v8 - final

Continually test your security layers so

you can trust them in an emergency

Page 32: Accruent insights 2014   2014-04-28 - v8 - final

What about the vendors that

don't show up on your books?

PHOTO CREDIT: CLASPINGWALNUT [BIT.LY/1K5J5DT]

Page 33: Accruent insights 2014   2014-04-28 - v8 - final

HOW ABOUT THE OPENSSL SOFTWARE

FOUNDATION?

Page 34: Accruent insights 2014   2014-04-28 - v8 - final

HEARTBLEED: A QUICK SUMMARY

• Small coding error allows attackers to steal chunks of memory from remote servers

• Attackers repeatedly send requests to get different data from the server

• Announcement of the vulnerability was handled extremely poorly

• Much of the internet is still still vulnerable almost a month after the announcements

Page 35: Accruent insights 2014   2014-04-28 - v8 - final

HEARTBLEED: LESSONS LEARNED

Layer your defenses

Segregate server duties

Make emergency plans

Page 36: Accruent insights 2014   2014-04-28 - v8 - final

Rackspace has joined many other

companies in support of the Core Infrastructure Initiative

that provides funding for open source projects that

need assistance

Page 37: Accruent insights 2014   2014-04-28 - v8 - final

LET'S WRAP IT UP

PHOTO CREDIT: TANAKAWHO [bit.ly/1mxiEd3]

Page 38: Accruent insights 2014   2014-04-28 - v8 - final

Three takeaways:

(Or, if you fell asleep during the last half hour,

here's what I was talking about)

Page 39: Accruent insights 2014   2014-04-28 - v8 - final

1. Layer your defenses

Page 40: Accruent insights 2014   2014-04-28 - v8 - final

2. The security of your business is your business

Page 41: Accruent insights 2014   2014-04-28 - v8 - final

3. Better security requires changes in people, process,

and technology

Page 42: Accruent insights 2014   2014-04-28 - v8 - final

THANK YOU! !

PHOTO CREDIT: STUCK IN CUSTOMS [bit.ly/1k5nqha]

Blog: major.io Twitter: @majorhayden Email: [email protected]