170 likes | 189 Views
Learn essential measures, including access rule reviews, active defense, prevention, detection, and recovery strategies to bolster your cybersecurity defenses against threats. Secure your systems effectively!
E N D
Cyber Security Best Practices Eric Weston Senior Auditor Cyber Security WECC Reliability and Security Workshop San Diego CA – October 23-24, 2018 Western Electricity Coordinating Council
“One of the main cyber-risks is to think they don’t exist. The other is to try to treat all potential risks. Fix the basics, protect first what matters for your business and be ready to react properly to pertinent threats.” Stephane Nappo: GCISO Société Générale Cyber Risks Western Electricity Coordinating Council
Prevent What You Can Detect What You Can’t Prevent Be Prepared to Recover Agenda Western Electricity Coordinating Council
What are your risks and challenges • What is important with different systems • Confidentiality • Integrity • Availability Putting Things in Perspective Western Electricity Coordinating Council
Jess Smith, Nathan Kipp, Dennis Gammel, Tim Watkins: EEA Conference June 2016
Tightening down perimeter protections • Perform regular reviews of firewall configurations • Remove/Disable outdated and unneeded rules and objects • Be cautions with “maintenance” rules • Review rules which generate few if any hits • Ensure all rules have detailed descriptions • Rules should be as specific as possible • Commit to continual improvements • Review access rules holistically Preventative Measures Western Electricity Coordinating Council
Reviewing Access Rules Holistically access-list esp_in extended permit tcp ems dmzwks2 eqssh access-list esp_in extended permit ip host1 host2 range 0 512 access-list esp_in extended permit tcp ems subwks1 eq 2000 access-list esp_in extended permit ip host1 host2 range 513 25000 access-list esp_in extended permit udp 10.0.1.1 172.36.5.1 eq 2355 access-list esp_in extended permit ip host1 host2 range 25001 65535 access-list esp_in extended permit ip 10.0.1.1 172.36.5.1 eqdns access-list esp_in extended permit ip host1 host2 eqany Preventative Measures Western Electricity Coordinating Council
Utilize the tools you have • Host based firewalls/iptables • System hardening • Windows Security Templates • Vendor Specific Recommendations • Don’t reinvent the wheel • Other methods, tools, etc. Preventative Measures Western Electricity Coordinating Council
Active Defense • Passive Defense • Firewalls • Traditional Anti-Virus Systems • Other measures • Active Defense2 • Threat and Environment Manipulation • Threat Intelligence Consumption • Network Security Monitoring • Incident Response 2https://digital-forensics.sans.org/media/Poster_DFIR_Threat-Intel_2017.pdf Prevention/Detection Western Electricity Coordinating Council
Leveraging your environment The glass is half full Operational technology (OT) environments change infrequently Users and systems should only be performing specific tasks on OT networks Traffic should be relatively predictable Detecting Abnormalities Western Electricity Coordinating Council
Establishing normal • Identifying Assets and Communications Paths • Physical Inspection • Router/Firewall configurations • Network Traffic Analysis • Identifying and Validating Network Traffic • Network Traffic Analysis • Firewall/Router Logs Detecting Abnormalities Western Electricity Coordinating Council
Becoming more situationally aware Are monitoring systems tailored to your environment? Detecting Abnormalities Western Electricity Coordinating Council
Be Prepared for the When Western Electricity Coordinating Council
2018 Atlanta SamSam Ransomware Attack One third of the cities 424 software programs affected Potential Cost of $9.5 Million Some data will never be recovered https://www.reuters.com/article/us-usa-cyber-atlanta-budget/atlanta-officials-reveal-worsening-effects-of-cyber-attack-idUSKCN1J231M?feedType=RSS&feedName=technologyNews Recovery Western Electricity Coordinating Council
Regularly back up data and verify the integrity of those backups Secure backups Ensure backups are not connected to the computers and networks they are backing up https://www.ic3.gov/media/2016/160915.aspx Recovery Western Electricity Coordinating Council
Practice, Practice, Practice During an event is not the first time a recovery processes should be performed Be creative during recovery exercises Ensure everyone knows their part and has the needed tools and knowledge Continually learn and improve processes Recovery Western Electricity Coordinating Council
Cybersecurity is a shared responsibility, and it boils down to this: In Cybersecurity, the more systems we secure, the more secure we all are. Jeh Johnson: Secretary of Homeland Security Western Electricity Coordinating Council