the most common failure with today's defences

38
The Most Common Failure With Today's Defences Mark Nunnikhoven Vice President, Cloud & Emerging Technologies @marknca Just like you probably can’t see this, I can’t see the backchannel Tweet me now @marknca, I’ll reply after the talk…

Upload: mark-nunnikhoven

Post on 29-Nov-2014

287 views

Category:

Data & Analytics


2 download

DESCRIPTION

This talk looks at the challenges we face as a defender today by examining several recent, prominent breaches and one of their common causes. The first 2/3 of this talk are the same as "Is That Normal?" (http://www.slideshare.net/marknca/is-that-normal-behaviour-modelling-on-the-cheap) but in the last 3rd, instead of diving in the the mechanics of behavioural analysis, this talk looks at what we should be doing with the results. Originally presented at the Gartner Security & Risk Management Summit in London, 08-Sep-2014

TRANSCRIPT

Page 1: The Most Common Failure With Today's Defences

The Most Common Failure With Today's Defences

Mark Nunnikhoven Vice President, Cloud & Emerging Technologies @marknca

Just like you probably can’t see this, I can’t see the backchannel Tweet me now @marknca, I’ll reply after the talk…

Page 2: The Most Common Failure With Today's Defences

Recent attacks The problem What you can do?

Page 3: The Most Common Failure With Today's Defences

Recently…

Page 4: The Most Common Failure With Today's Defences
Page 5: The Most Common Failure With Today's Defences

450 000 000

“Client record” is typically at least [username+password]

Page 6: The Most Common Failure With Today's Defences

27-Nov-2013—15-Dec-2013

First real CEO “resignation” due primarily to information security incident

Page 7: The Most Common Failure With Today's Defences

a/k/a “Target 2” …but worse

Early May-2014—Late Aug-2014

Page 8: The Most Common Failure With Today's Defences

Nominated for “Worst Communications During An Incident”

Late Feb-2014—Mid May-2014

Page 9: The Most Common Failure With Today's Defences

Real reputation risk & impact on ability to conduct business

17-Jun-2013—17-Oct-2014

Page 10: The Most Common Failure With Today's Defences

Should have received more attention More on this one later…

17-Sep-2013—Early Oct-2013

Page 11: The Most Common Failure With Today's Defences

Amazing visualization from Information Is Beautiful “World’s Biggest Data Breaches & Hacks”

Page 12: The Most Common Failure With Today's Defences
Page 13: The Most Common Failure With Today's Defences

Breaches: more frequent, lasting longer, bigger impact on businesses

Page 14: The Most Common Failure With Today's Defences

The Problem

Page 15: The Most Common Failure With Today's Defences

Restrict inbound Restrict outbound Heavily monitor access

Data

Data space: servers, applications, infrastructure, etc.

Page 16: The Most Common Failure With Today's Defences

Restrict inbound Allow outbound Little to no monitoring

User

User space: Where the users are ;-) Endpoints like laptops, desktops, tablets, etc.

Page 17: The Most Common Failure With Today's Defences
Page 18: The Most Common Failure With Today's Defences

Authentication Authorization

Yes, we typically only use 2 controls here

Page 19: The Most Common Failure With Today's Defences

152 million records 40 GB of source code

~44 GB of data exfiltrated

Page 20: The Most Common Failure With Today's Defences

What can you do?

Page 21: The Most Common Failure With Today's Defences

Authentication Authorization

Page 22: The Most Common Failure With Today's Defences

Authentication Authorization

3 is more than 2. That’s an immediate win when reporting up to your boss(es)

Behaviour analysis

Page 23: The Most Common Failure With Today's Defences

What to look at

All traffic leaving user spaceMost organizations have some controls between the user and the world

Need to start to address internal data flow & expand existing controls

Page 24: The Most Common Failure With Today's Defences

What to look for

Malicious patterns

A service or appliance can help here

Page 25: The Most Common Failure With Today's Defences

What to look for

Odd access patterns

Most breaches are access data through authorized channels BUT using odd behavioural patterns

Page 26: The Most Common Failure With Today's Defences

What to do about it

Vary the level of trust in the user* Dynamically vary the level depending on specific criteria and indicators of trust

Page 27: The Most Common Failure With Today's Defences

You may trust me to deliver a talk on security…

Page 28: The Most Common Failure With Today's Defences

But would you trust me to look after your kids?

Page 29: The Most Common Failure With Today's Defences

Trust is a spectrum

Page 30: The Most Common Failure With Today's Defences

Varying trust

A quick example

Page 31: The Most Common Failure With Today's Defences

Normal access

Page 32: The Most Common Failure With Today's Defences

Have a confirmed finding (or high enough confidence)

Page 33: The Most Common Failure With Today's Defences

Not sure what we’ve found

Page 34: The Most Common Failure With Today's Defences

Not sure what we’ve found

Page 35: The Most Common Failure With Today's Defences

Take a deeper look

Page 36: The Most Common Failure With Today's Defences

Not sure what we’ve found? Increase monitoring, block high value access temporarily

Page 37: The Most Common Failure With Today's Defences

Add behavioural analysis Look for odd/malicious patterns Vary the level of trust

Page 38: The Most Common Failure With Today's Defences