varonis systems. proprietary & confidential our mission is to help enterprises realize value...

28
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL Our mission is to help enterprises realize value from their unstructured data. Insider Threats Malice, Mistakes, and Mountain Lions

Upload: mateo-berner

Post on 15-Dec-2015

217 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL Our mission is to help enterprises realize value from their unstructured data. Insider Threats Malice, Mistakes,

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL

Our mission is to help enterprises realize value from their unstructured data.

Insider ThreatsMalice, Mistakes, and Mountain Lions

Page 2: VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL Our mission is to help enterprises realize value from their unstructured data. Insider Threats Malice, Mistakes,

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL2

Where to get the slides

http://bit.ly/insiderTHREATS

Page 3: VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL Our mission is to help enterprises realize value from their unstructured data. Insider Threats Malice, Mistakes,

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL3

About Varonis

Started operations in 2005

Over 3000 Customers

(as of September, 2014)

Software Solutions for

Human Generated Data

Page 4: VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL Our mission is to help enterprises realize value from their unstructured data. Insider Threats Malice, Mistakes,

The Varonis Origin Story

Page 5: VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL Our mission is to help enterprises realize value from their unstructured data. Insider Threats Malice, Mistakes,

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL5

Agenda

The anatomy of insider breaches

Real world breaches: stats and examples

Our irrational biases about risk

6 tips for mitigating insider threats

Page 6: VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL Our mission is to help enterprises realize value from their unstructured data. Insider Threats Malice, Mistakes,

The Varonis Origin Story

Page 7: VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL Our mission is to help enterprises realize value from their unstructured data. Insider Threats Malice, Mistakes,

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL7

The Script

Get inside (if not there already)

Usually done by phishing or social engineering

Snoop around

Enumerate current access; attempt to elevate

Visa cards anyone?PS C:\Users\eddard> findstr /r "^4[0-9]{12}(?:[0-9]{3})?$"

Exfiltration

Get the data out without sounding alarms

Page 8: VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL Our mission is to help enterprises realize value from their unstructured data. Insider Threats Malice, Mistakes,

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL8

By the Numbers

Page 9: VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL Our mission is to help enterprises realize value from their unstructured data. Insider Threats Malice, Mistakes,

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL9

Privilege Abuse

Page 10: VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL Our mission is to help enterprises realize value from their unstructured data. Insider Threats Malice, Mistakes,

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL10

Our Own Worst Enemy

Page 11: VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL Our mission is to help enterprises realize value from their unstructured data. Insider Threats Malice, Mistakes,

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL11

Snooping Behind the Firewall

Page 12: VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL Our mission is to help enterprises realize value from their unstructured data. Insider Threats Malice, Mistakes,

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL12

Target as a Target

40,000,000 records lost

Lots of fancy tools watching the perimeter

(candy bar syndrome)

“[…] spokeswoman, Molly Snyder, says the

intruders had gained access to the system

by using stolen credentials from a third-

party vendor”

Page 13: VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL Our mission is to help enterprises realize value from their unstructured data. Insider Threats Malice, Mistakes,

Risk and Irrational Biases

Page 14: VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL Our mission is to help enterprises realize value from their unstructured data. Insider Threats Malice, Mistakes,

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL14

Fear and Frequency

Large university

146,000 student records, including SSNs, exposed

Cause? Copy/paste

Page 15: VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL Our mission is to help enterprises realize value from their unstructured data. Insider Threats Malice, Mistakes,

A Story About Trees

Page 16: VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL Our mission is to help enterprises realize value from their unstructured data. Insider Threats Malice, Mistakes,

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL16

Focus on Frequency

Page 17: VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL Our mission is to help enterprises realize value from their unstructured data. Insider Threats Malice, Mistakes,

They’re in—now what?

Page 18: VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL Our mission is to help enterprises realize value from their unstructured data. Insider Threats Malice, Mistakes,

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL18

6 Mitigation Tips

1. Eliminate Global Access

2. Eliminate Excessive Permissions

3. Alert on Privilege Escalations

4. Alert on Behavioral Deviations

5. Setup Honeypots

6. Closely Monitor High-Risk People and Data

Page 19: VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL Our mission is to help enterprises realize value from their unstructured data. Insider Threats Malice, Mistakes,

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL19

Tip #1: Eliminate Global Access

Locate groups like “Everyone” and “Authenticated Users”

and replace them with tighter security groups

How do I avoid cutting off legitimate access?

Page 20: VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL Our mission is to help enterprises realize value from their unstructured data. Insider Threats Malice, Mistakes,

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL20

Tip #2: Eliminate Excessive Permissions

People and software!

Figure out what people have access to but shouldn’t

Amazon-like recommendations

Auto-expire temporary access

Periodically review entitlements

Page 21: VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL Our mission is to help enterprises realize value from their unstructured data. Insider Threats Malice, Mistakes,

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL21

Tip #3: Alert on Privilege Escalations

Do you know when someone gets root access?

Page 22: VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL Our mission is to help enterprises realize value from their unstructured data. Insider Threats Malice, Mistakes,

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL22

Tip #4: Alert on Behavioral Deviations

Behavioral activity spikes (email, files, access denied)

Monitor activity outside of normal business hours

Page 23: VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL Our mission is to help enterprises realize value from their unstructured data. Insider Threats Malice, Mistakes,

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL23

Detecting CryptoLocker

Alert on more than 100 file modify events from a

single user in under a minute

Alert triggers an action to:

Notify IT admins

Grab the username and machine

Check the machine’s registry for key/value that

CryptoLocker creates

Get-Item HKCU:\Software\CryptoLocker\

Files).GetValueNames()

If value exists, disable user automatically:

Disable-ADAccount -Identity $actingObject

Page 24: VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL Our mission is to help enterprises realize value from their unstructured data. Insider Threats Malice, Mistakes,

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL24

Cryptowall’s Profile

Page 25: VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL Our mission is to help enterprises realize value from their unstructured data. Insider Threats Malice, Mistakes,

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL25

Tip #5: Setup Honeypots

Setup a shared folder that is open to everyone

X:\Share\Payroll

X:\Share\Confidential

X:\Share\CEO

See who abuses it

Page 26: VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL Our mission is to help enterprises realize value from their unstructured data. Insider Threats Malice, Mistakes,

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL26

Tip #6: Monitor High Risk People and Data

Alert or auto-quarantine sensitive data when it shows up

in a public place

Watch what root/domain admins are doing

Watch what contractors are doing

Page 27: VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL Our mission is to help enterprises realize value from their unstructured data. Insider Threats Malice, Mistakes,

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL27

Free Threat Assessment

http://hub.varonis.com/evaluation

Page 28: VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL Our mission is to help enterprises realize value from their unstructured data. Insider Threats Malice, Mistakes,

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL

Thank you!