20
Copyright © 2018 Forcepoint | 1 Charles Keane, CISSP – UEBA Security Specialist, Forcepoint Extending Behavioral Insights into Risk-Adaptive Protection & Enforcement

Keane,-Charles---Extending Behavioral Insights into Risk-Adaptive … · 2018. 6. 8. · Current policies are far too rigid to be effective. Learning why something happened yesterday

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Keane,-Charles---Extending Behavioral Insights into Risk-Adaptive … · 2018. 6. 8. · Current policies are far too rigid to be effective. Learning why something happened yesterday

Copyright © 2018 Forcepoint | 1

Charles Keane, CISSP – UEBA Security Specialist, Forcepoint

Extending Behavioral Insights into Risk-Adaptive Protection & Enforcement

Page 2: Keane,-Charles---Extending Behavioral Insights into Risk-Adaptive … · 2018. 6. 8. · Current policies are far too rigid to be effective. Learning why something happened yesterday

Copyright © 2018 Forcepoint | 2

WHAT IS INSIDER THREAT?

Insider threat is unique within the broader cyber-risk landscape and must be addressed holistically:

Distinctly human element ➔ Behavior often foreshadows intent

Pre-existing familiarity with - and access to - IT systems ➔ Activity can be tracked and analyzed

Differing required responses ➔ Special considerations for enforcement and remediation based on scenario

Three basic categories of damaging actors that are targeted by an Insider Threat program:

MaliciousIntent / Motivation

Psychology indicators

Environment triggers

NegligentSloppiness

Non-compliance

Poor controls

Compromised“Partly” normal

Normal psychology

Specific anomalies

Page 3: Keane,-Charles---Extending Behavioral Insights into Risk-Adaptive … · 2018. 6. 8. · Current policies are far too rigid to be effective. Learning why something happened yesterday

Copyright © 2018 Forcepoint | 3

PEOPLE ARE NOT COMPUTERS PEOPLE WORK IN HUMAN TIME People don’t follow

strict patterns People have

emotions – happy / sad ,etc.

People operate in minutes, hours, days, weeks

Computers operate in milliseconds (and less)

Analysis must think about risk and patterns using a Human Timescale

KEY DIFFERENCES BETWEEN CYBER AND INSIDER

Most malware investigations end with patching, reimaging or upgrades

Human investigations typically end with: policyviolations, employment terminations or legal proceedings/arrests

Page 4: Keane,-Charles---Extending Behavioral Insights into Risk-Adaptive … · 2018. 6. 8. · Current policies are far too rigid to be effective. Learning why something happened yesterday

Copyright © 2018 Forcepoint | 4

Protect the important data wherever it resides

OverwhelmingAdministrators

Frustrating Users

Mistaking

SO WHAT ARE WE TRYING TO SOLVE?

without

for

Page 5: Keane,-Charles---Extending Behavioral Insights into Risk-Adaptive … · 2018. 6. 8. · Current policies are far too rigid to be effective. Learning why something happened yesterday

Copyright © 2018 Forcepoint | 5

TECHNOLOGY ARCHITECTURE

1 SENSE

2CONTEXTUALIZE& UNDERSTAND

4 DYNAMICALLY ENFORCE

3 APPLY INDIVIDUAL RISK SCORE

OPERATIONAL MODEL

▸ Set unified policy▸ Orchestrate▸ Case management▸ Investigate

5

CLOSED LOOP, RISK-ADAPTIVE APPROACH

Page 6: Keane,-Charles---Extending Behavioral Insights into Risk-Adaptive … · 2018. 6. 8. · Current policies are far too rigid to be effective. Learning why something happened yesterday

Copyright © 2018 Forcepoint | 6

CommunicationWhat are they feeling?

With whom are they interacting?Data: Email, chat, voice

SystemHow are they behaving digitally?What sites and systems are they

accessing?Data: SIEM, endpoint, web browsing,

logins, file sharing

HRWhat is their motivation?

Why might they have malicious intent?Data: Performance reviews, Active

Directory

PhysicalHow are they behaving physically?Where are they going and when?

Data: Badge data, traveling

BUILDING A HOLISTIC VIEW OF THE USER

Page 7: Keane,-Charles---Extending Behavioral Insights into Risk-Adaptive … · 2018. 6. 8. · Current policies are far too rigid to be effective. Learning why something happened yesterday

Copyright © 2018 Forcepoint | 7

INSIDER INSIGHTS BASED ON

Enrich events with observed features of interest, scored for rarity and normalized by individual or peer group

Score non-activity based indicators about an entity to influence scoring

SCENARIOS“Connect the dots” across event/entity models

for a composite measure of risk

ENTITY ATTRIBUTE AND FEATURE COLLECTION(gathered from HR, Active Directory, CMDB)

Entity AttributeEntity Features

EVENT INGEST AND ENRICHMENT(Streaming or Batch Ingest via API)

Who They AreWhat They Do

EVENT ANALYTICS - “What They Do” ENTITY ANALYTICS - “Who They Are”

EVENTS OF INTEREST

PEOPLE OF INTEREST

USER BEHAVIOR ANALYTIC APPROACH

Page 8: Keane,-Charles---Extending Behavioral Insights into Risk-Adaptive … · 2018. 6. 8. · Current policies are far too rigid to be effective. Learning why something happened yesterday

Copyright © 2018 Forcepoint | 8

DATA SOURCES ANALYTIC ENGINE INFORMED NARRATIVE� �

HOW A TYPICAL ANALYTICS PLATFORM WORKS

Page 9: Keane,-Charles---Extending Behavioral Insights into Risk-Adaptive … · 2018. 6. 8. · Current policies are far too rigid to be effective. Learning why something happened yesterday

Copyright © 2018 Forcepoint | 9

ANALYTICS ALONE IS NOT ENOUGH

An effective solution should cut through the noise of alerts, highlight early warning signals to prevent the loss of important data.

Current policies are far too rigid to be effective.

Learning why something happened yesterday does not

stop the problem.

Balancing workforce privacy and IP protection is critical.

TRADITIONAL UEBA

ForensicAnalysis

TRADITIONALINSIDER THREAT

Constant Monitoring

TRADITIONALDLP

Block it orAllow it

Page 10: Keane,-Charles---Extending Behavioral Insights into Risk-Adaptive … · 2018. 6. 8. · Current policies are far too rigid to be effective. Learning why something happened yesterday

Copyright © 2018 Forcepoint | 10

A POWERFUL WAY TO LEVERAGE ANALYTICS

DATA SOURCES ANALYTIC ENGINE AND INSIGHTS POLICY ENFORCEMENT� �

3rd Party Data Sources

Decision Making

Channels

(DLP, CASB, NGFW, WEB)

Decision Making

Channels

(DLP, CASB, NGFW, WEB)

Non-Security Log Data

gTraditional Security

Log Data

Page 11: Keane,-Charles---Extending Behavioral Insights into Risk-Adaptive … · 2018. 6. 8. · Current policies are far too rigid to be effective. Learning why something happened yesterday

Copyright © 2018 Forcepoint | 11

RISK-ADAPTIVE PROTECTION

Risk-adaptive protection dynamically applies monitoring and enforcement controls to protect data based on calculated behavioral risk level of users and the value of data accessed.

This allows security organizations to better understand risky behavior and automate policies, dramatically reducing the quantity of alerts requiring investigation.

1) Risk levels are driven up and down by human behavior

2) Each user has a unique and dynamic risk level which changes based upon behavior

3) Risk levels drive different outcomes

4) The security adapts to the risk levels as behaviors change

HOW RISK-ADAPTIVE PROTECTION WORKS:

Page 12: Keane,-Charles---Extending Behavioral Insights into Risk-Adaptive … · 2018. 6. 8. · Current policies are far too rigid to be effective. Learning why something happened yesterday

Copyright © 2018 Forcepoint | 12

THE ROLE OF ANALYTICS IN THE CLOSED LOOP SYSTEM

Page 13: Keane,-Charles---Extending Behavioral Insights into Risk-Adaptive … · 2018. 6. 8. · Current policies are far too rigid to be effective. Learning why something happened yesterday

Copyright © 2018 Forcepoint | 13

SETTING UP THE DEMO: WHAT’S THE SCENARIO

User: Philip ZamudioSystem AdministratorGlobal IT Team

Current Risk Score: 31Risk Score is based on monitoring user activities through numerous channels:▸ Endpoint▸ 3rd Party Applications▸ Web & Email▸ Network

Current Risk Level: 1 (of 5)Actions of enforcement, notification, monitoring or enforcement driven by risk level

For this demonstration we’re using DLP policy

Page 14: Keane,-Charles---Extending Behavioral Insights into Risk-Adaptive … · 2018. 6. 8. · Current policies are far too rigid to be effective. Learning why something happened yesterday

Copyright © 2018 Forcepoint | 14

FOUR STEPS TO ROLLING OUT RISK-ADAPTIVE PROTECTION

4. Launch Risk-Adaptive

Protection

1. Establish Privacy Policy

3. EstablishEnforcement

Baselines

2. Establish Risk Policy

Page 15: Keane,-Charles---Extending Behavioral Insights into Risk-Adaptive … · 2018. 6. 8. · Current policies are far too rigid to be effective. Learning why something happened yesterday

Copyright © 2018 Forcepoint | 15

ESTABLISH THE PRIVACY POLICY

Respect the privacy of employees.

Conform with privacy laws in relevant nations.

Privacy and Security are not mutually exclusive. Involve Legal and HR.

Focus on transparent communications with employees.

Establish clear Workforce Defense Policy & Procedure.

Page 16: Keane,-Charles---Extending Behavioral Insights into Risk-Adaptive … · 2018. 6. 8. · Current policies are far too rigid to be effective. Learning why something happened yesterday

Copyright © 2018 Forcepoint | 16

SAMPLE PSEUDONYMIZATION WORKFLOW

Document• Details of the

event• Date & time• Attack Vector• System/Data

> Risk/Criticality

Event Severity• High• Medium• Low

Analyst escalates event to SOC Lead

SOC Lead and Director opens investigation and escalates to incident. Incident severity re-assessed.

Steering Committee (IT, HR, Legal) must approve Investigator’s access to FIT Video/Keyboard Data

EVENT EVENT

Investigation Closed

Investigation Closed

Investigator Assigned

Security Analyst Assigned

No

No

No

Yes

YesYes

• Reasonable Suspicion of Criminal Activity and/or

• Cyber Threat to Forcepoint Information Systems

Access toFIT Video/ Keyboard

Data

Cyber Defence

Workforce Event

User Unmasked (FIT)

Page 17: Keane,-Charles---Extending Behavioral Insights into Risk-Adaptive … · 2018. 6. 8. · Current policies are far too rigid to be effective. Learning why something happened yesterday

Copyright © 2018 Forcepoint | 17

ESTABLISH RISK POLICY

For policies governing compliance use-cases or highly sensitive information, “Block All” was the action plan for all risk levels

For policies where additional context can help inform decisions, additional granularity can get added

Page 18: Keane,-Charles---Extending Behavioral Insights into Risk-Adaptive … · 2018. 6. 8. · Current policies are far too rigid to be effective. Learning why something happened yesterday

Copyright © 2018 Forcepoint | 18

ESTABLISH RISK POLICY MULTI-CHANNEL ENFORCEMENT

Multiple Action Plans

Protect data in motion and at rest

Cloud and on-premise protection

Page 19: Keane,-Charles---Extending Behavioral Insights into Risk-Adaptive … · 2018. 6. 8. · Current policies are far too rigid to be effective. Learning why something happened yesterday

Copyright © 2018 Forcepoint | 19

Identify users to pilot

Enable Audit-only rules to fine-tune policies

Learn behavior baselines for 30-45 days

Calibrate risk policies and enforcement procedure

ESTABLISH ENFORCEMENT BASELINE

Page 20: Keane,-Charles---Extending Behavioral Insights into Risk-Adaptive … · 2018. 6. 8. · Current policies are far too rigid to be effective. Learning why something happened yesterday

Copyright © 2018 Forcepoint | 20

IN CLOSING

Focus on user behavior and data interactions

Analytics is critical to solve this challenge, but it’s only part of the solution

Automating leads to speedy resolution of high risk events

Risk-Adaptive Protection will deliver better cybersecurity