using threat intelligence to - champlain college saint-lambert · using threat intelligence to...

32

Upload: others

Post on 21-May-2020

8 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Using Threat Intelligence to - Champlain College Saint-Lambert · Using Threat Intelligence to Secure IoT Threat Hunting with Open Source Steve Skoronski sskorons@checkpoint.com
Page 2: Using Threat Intelligence to - Champlain College Saint-Lambert · Using Threat Intelligence to Secure IoT Threat Hunting with Open Source Steve Skoronski sskorons@checkpoint.com

Using Threat Intelligence to Secure IoT

Threat Hunting with Open Source

Steve Skoronski [email protected]

Page 3: Using Threat Intelligence to - Champlain College Saint-Lambert · Using Threat Intelligence to Secure IoT Threat Hunting with Open Source Steve Skoronski sskorons@checkpoint.com

Why?

• IoT is expanding rapidly, as is connectivity

• The stakes have never been higher

• The impact has never been so severe

Page 4: Using Threat Intelligence to - Champlain College Saint-Lambert · Using Threat Intelligence to Secure IoT Threat Hunting with Open Source Steve Skoronski sskorons@checkpoint.com

IoT Security Market Overview

Page 5: Using Threat Intelligence to - Champlain College Saint-Lambert · Using Threat Intelligence to Secure IoT Threat Hunting with Open Source Steve Skoronski sskorons@checkpoint.com
Page 6: Using Threat Intelligence to - Champlain College Saint-Lambert · Using Threat Intelligence to Secure IoT Threat Hunting with Open Source Steve Skoronski sskorons@checkpoint.com

8©2018 Check Point Software Technologies Ltd.

Spectre and Meltdown

Page 7: Using Threat Intelligence to - Champlain College Saint-Lambert · Using Threat Intelligence to Secure IoT Threat Hunting with Open Source Steve Skoronski sskorons@checkpoint.com

Proof of Concept

Page 8: Using Threat Intelligence to - Champlain College Saint-Lambert · Using Threat Intelligence to Secure IoT Threat Hunting with Open Source Steve Skoronski sskorons@checkpoint.com

Firmware Emulation - Firmadyne

Page 9: Using Threat Intelligence to - Champlain College Saint-Lambert · Using Threat Intelligence to Secure IoT Threat Hunting with Open Source Steve Skoronski sskorons@checkpoint.com

Cyber Kill Chain from Lockheed Martin

Page 10: Using Threat Intelligence to - Champlain College Saint-Lambert · Using Threat Intelligence to Secure IoT Threat Hunting with Open Source Steve Skoronski sskorons@checkpoint.com

Where to Start?

• Security Professionals and Administrators alike are drowning in data

• This means there is a lack of situational awareness

• It also means a long time to react, amplifying the security event impact on the business, reputation and brand perception

Page 11: Using Threat Intelligence to - Champlain College Saint-Lambert · Using Threat Intelligence to Secure IoT Threat Hunting with Open Source Steve Skoronski sskorons@checkpoint.com

The Setup

Page 12: Using Threat Intelligence to - Champlain College Saint-Lambert · Using Threat Intelligence to Secure IoT Threat Hunting with Open Source Steve Skoronski sskorons@checkpoint.com
Page 13: Using Threat Intelligence to - Champlain College Saint-Lambert · Using Threat Intelligence to Secure IoT Threat Hunting with Open Source Steve Skoronski sskorons@checkpoint.com
Page 14: Using Threat Intelligence to - Champlain College Saint-Lambert · Using Threat Intelligence to Secure IoT Threat Hunting with Open Source Steve Skoronski sskorons@checkpoint.com

Diagram credit to Corelight

Page 15: Using Threat Intelligence to - Champlain College Saint-Lambert · Using Threat Intelligence to Secure IoT Threat Hunting with Open Source Steve Skoronski sskorons@checkpoint.com
Page 16: Using Threat Intelligence to - Champlain College Saint-Lambert · Using Threat Intelligence to Secure IoT Threat Hunting with Open Source Steve Skoronski sskorons@checkpoint.com
Page 17: Using Threat Intelligence to - Champlain College Saint-Lambert · Using Threat Intelligence to Secure IoT Threat Hunting with Open Source Steve Skoronski sskorons@checkpoint.com

IoT Development Kits

Page 18: Using Threat Intelligence to - Champlain College Saint-Lambert · Using Threat Intelligence to Secure IoT Threat Hunting with Open Source Steve Skoronski sskorons@checkpoint.com

Stage 1: Collection - Data Inputs

• The reference infrastructure has many data collection points we can ingest to start getting a wider and deeper view;• Network Firewall – providing information on layer 2-7 data

crossing that network perimeter

• Ubiquiti’s Unifi Software Defined Controller for UAP-AC-Lite Wireless Access Point

• Syslog from simpler network devices / bro for devices that cannot log (IoT)

Page 19: Using Threat Intelligence to - Champlain College Saint-Lambert · Using Threat Intelligence to Secure IoT Threat Hunting with Open Source Steve Skoronski sskorons@checkpoint.com
Page 20: Using Threat Intelligence to - Champlain College Saint-Lambert · Using Threat Intelligence to Secure IoT Threat Hunting with Open Source Steve Skoronski sskorons@checkpoint.com

Stage 2 – Normalization

• Search and Reporting App very helpful to validate correct collection and format• Apps were used in conjunction with data inputs to view

from several perspectives, IE, Splunk Security Essentials

•Validation with proxy indicators – other correlation and reporting tools as a starting point for asking questions of the dataset

Page 21: Using Threat Intelligence to - Champlain College Saint-Lambert · Using Threat Intelligence to Secure IoT Threat Hunting with Open Source Steve Skoronski sskorons@checkpoint.com
Page 22: Using Threat Intelligence to - Champlain College Saint-Lambert · Using Threat Intelligence to Secure IoT Threat Hunting with Open Source Steve Skoronski sskorons@checkpoint.com
Page 23: Using Threat Intelligence to - Champlain College Saint-Lambert · Using Threat Intelligence to Secure IoT Threat Hunting with Open Source Steve Skoronski sskorons@checkpoint.com

Threat Feeds

Page 24: Using Threat Intelligence to - Champlain College Saint-Lambert · Using Threat Intelligence to Secure IoT Threat Hunting with Open Source Steve Skoronski sskorons@checkpoint.com
Page 25: Using Threat Intelligence to - Champlain College Saint-Lambert · Using Threat Intelligence to Secure IoT Threat Hunting with Open Source Steve Skoronski sskorons@checkpoint.com
Page 26: Using Threat Intelligence to - Champlain College Saint-Lambert · Using Threat Intelligence to Secure IoT Threat Hunting with Open Source Steve Skoronski sskorons@checkpoint.com
Page 27: Using Threat Intelligence to - Champlain College Saint-Lambert · Using Threat Intelligence to Secure IoT Threat Hunting with Open Source Steve Skoronski sskorons@checkpoint.com

Transportation

Manufacturing

Smart cities

Smart buildings

Banking

Utilities

Healthcare

Telecom

Automotive

Energy

Smart homes

cloud

AI ADAPTIVE SECURITY CONTROLS

Page 28: Using Threat Intelligence to - Champlain College Saint-Lambert · Using Threat Intelligence to Secure IoT Threat Hunting with Open Source Steve Skoronski sskorons@checkpoint.com
Page 29: Using Threat Intelligence to - Champlain College Saint-Lambert · Using Threat Intelligence to Secure IoT Threat Hunting with Open Source Steve Skoronski sskorons@checkpoint.com

33©2018 Check Point Software Technologies Ltd.

Introducing the Micro Gateway

Centralized Management

Easy Deployment / Zero Touch Provisioning

Integrated FW & VPN in a Micro Gateway

Wired & Wireless Support

Monitoring & Control via Mobile App

Page 30: Using Threat Intelligence to - Champlain College Saint-Lambert · Using Threat Intelligence to Secure IoT Threat Hunting with Open Source Steve Skoronski sskorons@checkpoint.com

34©2018 Check Point Software Technologies Ltd.

Protection Against Known and Unknown Threats

Enforce defined security policies

Accurately detect anomalous behavior

and identify threats in real time

Granular protocol understanding

Discover all IoT devices

Page 31: Using Threat Intelligence to - Champlain College Saint-Lambert · Using Threat Intelligence to Secure IoT Threat Hunting with Open Source Steve Skoronski sskorons@checkpoint.com

35©2018 Check Point Software Technologies Ltd.

Page 32: Using Threat Intelligence to - Champlain College Saint-Lambert · Using Threat Intelligence to Secure IoT Threat Hunting with Open Source Steve Skoronski sskorons@checkpoint.com

Off to the Lab!

I appreciate your time!