300 likes | 524 Views
Advanced Persistent Threats (APT)s. Srini Uppugonduri ISACA Baton Rouge, Nov 16 th 2011. Agenda. What are APTs? Why talk about them? Should we be concerned? What can we do? Conclusion. What are APTs ?. Advanced Persistent Threats. A dvanced – Attacker adapts to defenders’ efforts
E N D
Advanced Persistent Threats (APT)s Srini Uppugonduri ISACA Baton Rouge, Nov 16th 2011.
Agenda • What are APTs? • Why talk about them? • Should we be concerned? • What can we do? • Conclusion
Advanced Persistent Threats • Advanced • – Attacker adapts to defenders’ efforts • – Can develop or buy Zero-Day exploits • – Higher level of sophistication • Persistent • – Attacks are objective and specific • – Will continue until goal is reached • – Intent to maintain long term connectivity • Threats • – Entity/s behind the attack • – Not the malware/exploit/attack alone
APT Defined • Key contributors to popularity of APTs • Nation States • Organized crime groups • Hactivist Groups
– Gain awareness • – Constantly in the News • – Understand the Risk to your Organization • – Organizational Impact • – Prioritize Information Security investments • – Communicate Risk more effectively
APT in the news • RSA Google Johnson & Johnson • DuPont General Electric Walt Disney • Sony Adobe Systems Intel Corp • Baker Hughes Exxon British Petroleum • Marathon Chevron King & Spalding • CareFirst BCBS QinetiQ Alliant Techsystems • Northrup Grumman Lockheed Martin Citi Cards • Oak Ridge Labs IMF Yahoo • And many, many more …..
– Not applicable to Military / Defense alone • –Organized Crime & ‘Hactivist’ groups • – Looking for Intellectual Property – M&A, Trade Secrets, Engineering Designs, Application Code, Business Plans, etc. • – Can Bypass Anti Virus & Anti Malware software • – Low and slow attacks • – Can easily move across the network
Additionally.. • – Focus on Social Engineering and Spear phishing • – Trend is to exploit End Users & thereby End Points • – Ineffective IT processes • – Vulnerability Management • – Threat Management • – Incident Management • – Inherent weaknesses in IT • – Blessing and a Curse
Impact .. • Low profile attack • Extremely stealthy • Very low to zero downtime to systems • Many organizations operate for years, without knowing they are breached!
Understand the threat • Mandiant –Presentations • HBGary –APT • OWASP – Ross (NIST) • SANs InfoSec Reading Room – detailed analysis of APT • Others..
Assume you are breached • Prepare for the inevitable • Start planning • Define your “Win” • Delay the ‘Threat’ from reaching its goal • Minimize the loss • Improvise as you go along • Are your approaches outdated?
Awareness & Education • Executive Management • IT • All employees • Useful Resource: www.Phishme.com • Invest in Training SoC analysts
SIEM • Audit logging • Event correlation • Real-time Analysis • Categorize your assets • Business Criticality • Business Impact • Data Classification • Ownership • Type – Structured and Unstructured
Refine processes • Incident Management • Disaster Recovery • Table top exercises • Monitoring, identification & response Defense in Depth & Breadth Third Party connections Asset inventory
Dual Protection Strategies • Boundary Protection Primary Consideration: Penetration Resistance Adversary Location: Outside the Defensive Perimeter Objective: Repelling the Attack • Agile Defense Primary Consideration: Information System Resilience Adversary Location: Inside the Defensive Perimeter Objective: Operating while under Attack OWASP - ROSS
Agile Defense • Boundary protection is a necessary but not sufficient condition for Agile Defense • Examples of Agile Defense measures: • Compartmentalization and segregation of critical assets • Targeted allocation of security controls • Virtualization and obfuscation techniques • Encryption of data at rest • Routine reconstitution to known secure state OWASP - ROSS
CONCLUSION • Be flexible and adaptable to changing threats! • Don’t ignore Information Security principles! • Mature your Threat and Vulnerability Mgmtprocess! • Conduct frequent incident response exercises! • Invest in people & training! • Delay the adversary!