48
The Information Security Process The Information Security Process The Information Security Process Emiliano Kargieman [email protected]

The Information Security Process Emiliano Kargieman [email protected]

Embed Size (px)

Citation preview

Page 1: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

The Information Security Process

The Information Security Process

Emiliano Kargieman

[email protected]

Page 2: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

Agenda

• The briefest introduction to IS

• Cybercrime indicators, threats and trends

• Defense Strategy: How to react?

• The technology

Page 3: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

Information Security

• The Context: The information Age

• The Fundamentals– Privacy– Authenticity and Integrity– Disponibility– Non-Repudiation

• The Purpose– Dissuasion– Prevention– Auditing

Intro

IT

Transport/Logistics.Production

Sales

Admin.

IT

Production

Log./ Trans.

Sales.

Admin.

Page 4: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

Current Scenario: “if it ain’t broken, don’t fix it”.

• Complexity and flexibility of information systems increases, security decreases.

• Legacy systems are not maintained or audited• Low level of awareness in decision makers• Lack of security focus from Software/HW vendors and

Integrators.• Lack of a global framework to analyze and understand security• Lack of Security “Best Practices”

And Then…

• Unforseen vulnerabilities• High risk, high level of exposure• High administrative efforts• Risk is managed reactively, it’s all damage control.

Intro

Page 5: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

Cybercrime: Indicators and Trends

Page 6: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

Indicators

• Indicators of cybercrime are historically hard to find.• Incidents are not usually reported

– Most common reasons for not reporting a security incidentaccording to a survey by the FBI/CSI

Cybercrime

9075

5464

0

20

40

60

80

100

Neg

ativ

eP

ub

licit

y

It c

ou

ldb

e u

sefu

l fo

r co

mp

etit

ors

I did

n’t

kn

ow

It c

ou

ld b

e

civi

l act

ion

app

eare

d

bet

ter

1996

1997

1998

1999

2000

2001

Rep

ort

ed

Page 7: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

Indicators

• To be reported, attacks need to be detected first!– A 1996 Survey of the Defense Information Systems Agency,

showed the following results on a systematic attack against government targets:

– This is still true: Most attacks go undetected!

Cybercrime

Attacks38.000

Success.24,700(65%)

Detected988 (4%)

Reported267 (0,7%)

NOT DETECTED23.712(96%)

Page 8: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

Sources of information

• 2001 CSI/FBI Computer Crime and Security Surveywww.gocsi.com

• Information Security Magazine 2001 Industry Surveywww.infosecuritymag.com

• GAO/AIMD-96-84 (DISA)www.gao.gov, www.disa.mil

• Honeynet projectwww.project.honeynet.org

• Bugtraq mailing listwww.securityfocus.com

• ARISwww.securityfocus.com

• CERTwww.cert.org

• SANS Incidentswww.incidents.org

• Dshield projectwww.dshield.org

Cybercrime

Page 9: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

CSI/FBI Survey 2001Recent Indicators

• 2001 CSI/FBI Computer Crime and Security Survey

• Performed by– Computer Security Institute– San Francisco FBI’s Computer Intrusion

Squad

• Results for the years 1996 – 2001 are analized

Page 10: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

• 538 surveyed

• USA

• Public and Privatesectors

• 27% 10000+ employes

• 39% $1 000 000 000+ revenues

Others36%

Financ.17%

Hi Tech22%

Govern.15%

Manuf.10%

Recent Indicators

CSI/FBI Survey 2001 (cont.)

Page 11: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

Recent Indicators

CSI/FBI Survey 2001 (cont.)

Unauthorized system use in the last 12 months (%)

64

25

11

0

20

40

60

80

Yes No NA

1996

1997

1998

1999

2000

2001

Page 12: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

Recent Indicators

CSI/FBI Survey 2001 (cont.)

Quantifiable loss in the last 12 months

100137 124

266

369

0

100

200

300

400

1997 1998 1999 2000 2001

Mill

ion

s• 2001: 78% admited loss, but only 37%

could quantify it!

Page 13: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

Recent Indicators

CSI/FBI Survey 2001 (cont.)

Quantifiable loss by type of attack Type of attack Loss

Unauthorized access (from inside) $6 064 000

Financial fraud $92 935 500

Telecommunication fraud $904 100

Theft of proprietary information $151 230 100

Virus $45 288 150

Laptop theft $8 849 000

Network abuse (from inside) $35 001 650

Denial of Service $4 283 600

Sabotage $5 183 100

System intrusion $19 066 601

TOTAL $368.805.801

Page 14: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

Recent Indicators

CSI/FBI Survey 2001 (cont.)

What actions where taken after the intrusion?

94

40 36 30

020406080

100120

Th

eV

uln

era

bil

ity

wa

s p

atc

he

d

Th

e i

ntr

us

ion

wa

sn

’t r

ep

ort

ed

Th

e c

om

pa

ny

too

k l

eg

al

ad

vis

e/a

cti

on

s

1996

1997

1998

1999

2000

2001T

he

in

tru

sio

nw

as

re

po

rte

d

Page 15: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

Attack technology evolves

• Attack frameworks– Easy to use malicious code– Reduces knowledge needed to attack– Allows for coordinated multiparty attacks

• Attack automation– Distributed DOS / Very complex worms /

Directed Virus– Faster target acquisition– Large scale attacks with low resources– Brute-force attack paths

Page 16: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

The Honeynet projectRecent Indicators

• “Know your enemy...”

• Decoy network of 8 computers running• Linux• Solaris• Windows

• No efforts to atract attackers

• Monitored from april 2000 to february 2001

Page 17: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

The Honeynet projectSome Results

• The estimated lifetime for a Linux RedHat default install is less than 72 hours.

• Some systems were compromised less than 15 minutes after being pluged to the network.

• The estimated lifetime for a default install of windows 98 is less than 24 hours.

• During february 2001, 206 complete port-scans were registered.

Recent Indicators

Page 18: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

Defense Strategy: How to react?

Page 19: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

The perception of risk

• There is no real security.

• Security is only the perception of risk.

• Security management is risk management.

• To increase security, risk needs to be:

– Modeled

– Quantified

– Minimized over time

Defense Strategy

Page 20: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

Information Flow

• Starting from a model of the flow of information in an organization, where players communicate, process and store information.

ModelingRisk

Page 21: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

Entry points

• Each of these actions and interactions possesses its own risk.

ModelingRisk

Ri

Ri

Ri

RiRi

Ri

Ri

Ri

Ri

Ri

Page 22: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

Risk quantificationModelingRisk

Risk = Threats x Vulnerabilities x ImpactCountermeasures

Attacker profile,Resources available

Software flaws,Biased Policies,Bad Protocols,

Etc.

Loss,Atractiveness

Practices andtechnologies

Ri

Page 23: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

Threats

• Quantified by attacker profile, knowledge, financial resources, human resources, reach, interests:

– Amateur

– Hacker

– Hacker group

– Unsatisfied employee

– Competition

– Organized Crime

– Intelligence Agency

– Terrorist organizations

ModelingRisk

Page 24: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

Threats evolve

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

1985 1988 1992 1996 2000 2005 2010

Terrorist groups

Intelligence agencies

Organized Crime

Competing companies

Groups of individuals

Individuals

Example of projected evolution of threat share by attacker profile

ModelingRisk

Page 25: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

Vulnerabilities

• Design flaws

– Critical Information systems

– Networks

– Security Architecture

• Implementation flaws

– Operating system vulnerabilities

– Application vulnerabilities

– Hardware vulnerabilities

• Misuse or misconfiguration

• Policy weaknesses

• Unclear responsibilities

ModelingRisk

Page 26: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

Impact

• Attack consequences, quantified by Economic loss, Negative publicity, etc.

– Loss of proprietary information

– Corruption of critical information

– Financial Fraud

– Interruption of critical processes

– Sabotage

– Telecommunication fraud

ModelingRisk

Page 27: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

Countermeasures

• Security tools, software and mechanisms

– Network devices

– Crypto

– Access control

– Etc.

• Procedures

• Emergency response

• Auditing capabilities

• Visibility

• Training

• (We’ll go into more detail later)

ModelingRisk

Page 28: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

A risky gameModelingRisk

Risk = Ri

I.F.

⌠⌡T << mT

Page 29: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

There are no recipes

• The Information infrastructure and the information flow are unique to each organization.

• Threats, vulnerabilities, impact, they all depend on the process we are trying to protect.

• All these variables and factors evolve over time, so does risk.

• Security emerges from the unique qualities of an information system.

• There are no silver bullets.

Page 30: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

Nor Bottom-up ...

• Start securing platforms, buying and installing appliances and security software.

• It only gets you lost in the day to day operation.

• No sense of direction.

• No real understanding of risks.

• Security policies are what you can manage, not what you want or need.

• It does not contemplate the “holistic” properties of security.

Strategy

DO

THINK

Page 31: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

... nor Top-down

• Define policy, requirements, select tools, plan roll-out, implement.

• Hard to show short term results.

• Usually over-promises and under-delivers.

• When the implementation is finished, the context changed.

• It does not contemplate the dynamic properties of security.

Strategy

DO

THINK

Page 32: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

Its a process!

• Policies, user modeling, security architecture are allowed to evolve.

• The tools we use help shape the vision we have of the security infospace.

• Small iterations let us set milestones easier to control.

• Easier to define and adapt to a fixed budget.

• Can show short term and medium term results.

Strategy

DOTHINK

Page 33: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

DOTHINK

One iterationStrategy

Policy Definition

RiskModeling

SecurityArchitecture

Visibility andControl

Page 34: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

Risk Modeling

• Model the information flow on the organization

• Assess risk for the processes involved:

– Assess threats, vulnerabilities, impact.

– Assess the efficacy of present countermeasures

• Model attack scenarios

• Quantify risk

• Identify short, medium and long term actions.

Page 35: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

Policy Definition

• Organizational analysis

• Definition of roles

• Assignment or tasks and responsibilities

• Formalization of security procedures

• Definition of security parameters and norms for the use of information systems

• Analysis of functional roles

• Profile scopes and definitions

• Contingency plans

• Strategies for development and roll-out of information systems

• Criteria for the evaluation of IT projects.

Page 36: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

Security Architecture

• Policy enforcement

– Building blocks

• Physical Security

• Identification, Authentication and Authorization

• Base software security

• Application security

• Network security

• Integrity / Data protection

– Operations

• Operational procedures

• Training

– Contingency operations

• Automatization

Page 37: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

Visibility and Control

• The Security Infospace concept

• Real Time or Near Real Time

– Augment, Cross-reference, Enhance

– Visualize

– Normal behavior, attack conditions

– Alarms

– Trigger procedures

• Off-Line

– In-depth auditing

– DWH, Trends

– Forensics

Page 38: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

IterationsStrategy

DO

THINK

AssessmentPlanningCompromise

Critical Processes

Building infrastructure

Segregation Profiles

Increase granularity

Page 39: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

The Technology

Page 40: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

A small, functional taxonomy of tools

• Analysis and formalization– Tools that help in the processes of risk modeling and policy

definition.

• Enforcement– Tools that are used to enforce security policies

• Auditing and Control– Tools used to gain knowledge of our particular “security

infospace” and that help in the process of detecting and responding to security breaches.

Page 41: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

Analysis and Formalization

• Tools– Network discovery tools– Vulnerability scanners– Intrusive attack tools– Organizational modeling tools– Risk Modeling tools

• Services– Security Intelligence– Penetration Testing– Policy definition– Contingency planning– Etc.

Page 42: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

Enforcement

• Tools– Identification, Authentication and Authorization

• PKI, Biometrics, Tokens, SSON, Platform dependant (OS specific)

– Base software security• Network services wrappers, Filesystem restrictions,

Consistency checks, Security upgrades and patches, etc.

– Application security• Certification/authorization APIs, Versioning control,

Application dependants.– Network security

• Firewalls, VPNs, Content filtering– Integrity / Data protection

• Antivirus, Backups, Consistency checkers.

Page 43: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

Auditing and Control

• Tools– Network based Intrusion detection systems– Host based intrusion detection systems– Audit trails and log acquisition tools– Log centralization tools– Visualization tools– Analysis tools– Alarm and Reporting systems– Forensics tools– Security Operation Centers

• Services– Managed Security Services

Page 44: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

Core Security Technologies

Page 45: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

The company

Dedicated fully to Information Security (IS)– Focused on providing business enabling IS

technology

Founded in 1996

Formed by world-class security experts

Headquartered in New York

Head count: 70 (February 2002)

Over 20 IS software vendors currently using CORE’s technology

Over 30 technical papers and security advisories published

4 patents filed and / or pending

Page 46: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

Our solutions

Page 47: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

• Banco Privado de Inversiones

• BankBoston

• Ernst & Young LLP

• FEMSA (Coca Cola)

• Foundstone Inc.

• Greenlight.com

• IEEE

• KPMG

• MBA - Merchants Bank de Argentina

Some of our clients

• Metrored• Microsoft Inc.• Network Associates Inc.• Organización Veraz• PriceWaterhouseCoopers• Proofspace Inc.• Real Networks Inc.• SecurityFocus.com • Secure Networks Inc. • Siemens • UOL International• Vyou.com

Page 48: The Information Security Process Emiliano Kargieman ek@corest.com

The

Info

rmat

ion

Sec

urity

Pro

cess

Rua do Rócio 288 | 7º andar | Conj. 73 e 74Vila OlímpiaSão Paulo/SPCEP 04552-000Tel: (55 11) 3054-2534 / 35 [email protected]

Florida 141 | 2º cuerpo | 7º piso(C1005AAC) Buenos Aires Tel/Fax: (54 11) 4878-CORE (2673) [email protected]

Paragon Towers233 Needham Street | Suite 300Newton, MA 02464-1502Tel: (617) 454-1190Fax: (617) 454-1025 [email protected]

USA

Argentina

Brasil

Thank you!

Contact me for a copy of the [email protected]