48
The Rise of Compliance-Driven Security

The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

The Rise of Compliance-Driven Security

Page 2: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Locations

May 14, 2014 Dentons US LLP 2

Page 3: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Offices

May 14, 2014 3

Key Canada United States Europe Central and Eastern Europe Africa Middle East Asia Pacific

l Offices Ð!Associate offices ¡ Facilities u Associate firms + Special alliance firms

l Calgary l Edmonton l Montréal l Ottawa l Toronto l Vancouver

¡ Atlanta ¡ Boston l Chicago l Dallas l Kansas City l Los Angeles ¡ Miami

¡ New Orleans l New York l Phoenix l San Francisco l Short Hills l Silicon Valley l St. Louis l Washington, DC

l Barcelona l Berlin l Brussels l Frankfurt l Madrid l Paris u Zurich

l Bratislava l Bucharest l Budapest l Istanbul l Prague l Warsaw

u Accra u Algiers u Bissau u Bujumbura l Cairo u Cape Town

u Casablanca

u Dar Es Salaam u Johannesburg u Kampala u Kigali + Lagos

u Luanda u Lusaka

u Maputo

u Nairobi

u Nouakchott

u Port Louis u Praia

u São Tomé u Tripoli

l Abu Dhabi Ð !Amman u Beirut l Doha

l Dubai Ð! Kuwait City l Manama l Muscat Ð !Riyadh

l Beijing l Hong Kong l Shanghai l Singapore

United Kingdom Russia and CIS Central Asia

l London l Milton Keynes

l Kyiv l Moscow l St. Petersburg

l Almaty u Ashgabat

l Baku

l Tashkent

Dentons US LLP

Page 4: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Overview

May 14, 2014

• InfoSec/Privacy Legal Framework • Enforcement Trends • Case Studies 1.  Adventures in HIPAA 2.  Payment Card Incident Scenario 3.  Working with Forensic Investigators

4 Dentons US LLP

Page 5: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Takeaways

May 14, 2014 Dentons US LLP 5

• Compliance Becoming Dominant Risk Driver • Lawyers in the Data Center are Here to Stay

• Compliance is not Security

•  Ideas for Surviving Compliance-Drive Security

Page 6: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Brief History of Security/Privacy Law - Step Back

Month Day Year Dentons US LLP 6

• US Constitution: •  3rd / 4th / 5th / 9th ("penumbra") Amendments - various privacy-

related protections •  1st Amendment - protects freedom of speech, including commercial

speech and corporate speakers

• EU Constitution •  Privacy is an express right •  Free speech does not hold higher standing than privacy •  Heavily Influenced by WWII Experiences

Page 7: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Brief History of Security/Privacy Law - Federal

May 14, 2014 Dentons US LLP 7

•  Federal Legislation •  1970s

•  Privacy Act •  Fair Information

Practices •  FISA •  FERPA •  FCRA •  Bank Secrecy Act

•  1980s •  VPPA •  ECPA •  OECD Guidelines

•  1990s •  TCPA •  DPPA •  HIPAA •  COPPA •  GLBA •  EU DPD

•  2000s •  FACTA •  CAN-SPAM

•  2010s •  SEC / Agencies

•  Early Developments •  Fourth Amendment •  Invention of Telephone/Wire

Communications •  Protections for Snail Mail •  Wiretap Act

Page 8: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Brief History of Security/Privacy Law - Federal

May 14, 2014 Dentons US LLP 8

•  Trends: •  Point solutions

•  Segmented, patchwork

•  No unified definitions or expectations

Page 9: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Enforcement - FTC

May 14, 2014 Dentons US LLP 9

•  FTC - Section 5 Authority •  Unfair/Deceptive Trade Practices

•  Broad Exercise of Authority •  FTC v. Wyndham Worldwide

0

2

4

6

8

10

12

14

16

18

2000* 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013

FTC Security/Privacy Enforcement Actions

*Source: FTC

Page 10: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Enforcement - HIPAA

May 14, 2014 Dentons US LLP 10

•  Recent Omnibus Rule •  Broadened BAA Definition •  Expanded Authority

•  Largely reactive •  Proactive Audit Program

Expanding

*Source: OCR

0

5000

10000

15000

20000

25000

30000

35000

2004 2005 2006 2007 2008 2009 2010 2011 2012 2013

HIPAA Enforcement

Total Resolutions

Corrective Action

Resolved after Intake

No Violation

Page 11: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Brief History of Security/Privacy Law - State/Local

May 14, 2014 Dentons US LLP 11

•  CalOPPA - privacy policy requirements

•  Anti-spyware - CA, others

•  Data Destruction - 27+ States

•  PCI/Card liability - MN

•  Security - MA, CA

•  Employer Social Media

•  Breach Notification •  CA (2003), Now 47+ states •  Similar but not identical

•  Transaction Privacy (ZIP) •  16 States

•  Insurance Departments •  NY DFS inquiries •  CT Insurance Bulletin

State jurisdiction limited to the borders of the state (or at least their residents). Practical application nationwide?

Page 12: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Growth of State/Federal Laws and Regulations

May 14, 2014 Dentons US LLP 12

0

20

40

60

80

100

120

1970s 1980s 1990s 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014

Chart Title

Federal Laws State Laws Cumulative

ChoicePoint Breach

Page 13: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Enforcement - States

May 14, 2014 Dentons US LLP 13

•  Jurisdictional Hook = Breach Notification Laws • Coordinated Multistate Task Force

•  Led by CT and IL •  Very Active

0

100

200

300

400

500

600

700

2005 2006 2007 2008 2009 2010 2011 2012 2013

Reported Data Breaches

*Source: ID Theft Resource Center

Page 14: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Brief History of Security/Privacy Law - Self-Regulatory

May 14, 2014 Dentons US LLP 14

• PCI •  Card Networks •  Merchant Banks •  Card Issuers

• Class Action Litigation •  TCPA •  VPPA •  Song-Beverly/Credit Card Privacy

• Let industries set own rules •  Enforceable by FTC under

Section 5

• Various levels of success •  NIST Cybersecurity Framework •  NTIA Multistakeholder

Processes •  EU-US Safe Harbor Framework •  TRUSTe •  DMA / NAI / IAB •  W3C Do Not Track

Page 15: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Smoke 'Em If You Got 'Em

May 14, 2014 Dentons US LLP 15

•  Basically, anyone with any regulatory authority is using it for cybersecurity/privacy

•  InfoSec a regulated industry?

Page 16: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Risk - Breach Costs

Month Day Year Dentons US LLP Document reference # 16

• 2014 Ponemon Cost of Breach Study •  $201 per breached record •  Average $5 million+ over 2 years

• Card-related Breaches Trend Highest •  PCI framework allows recouping costs

• Sample of high-cost breaches: •  Heartland Payment Systems ~130m records

•  $140mm; $26mm legal fees •  TJX ~45m records

•  $250mm

• Global Payments - ~7m records •  $96m

Page 17: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Risk - Breach Costs Sample Analysis

May 14, 2014 Dentons US LLP 17

Data Compromise Risk Analysis Framework

Summary of Potential Risk Exposure Sources

Potential Sources of Risk: Est Cost Range Potential Cost Accrual Scenarios

Statutory Breach Compromise, No Breach No Compromise Investigation Made

Public

Preliminary Investigation $250,000 $800,000 Y Y Y Y

Breach Notice $381,550 * Y ?

Regulatory Investigations $1,350,000 $3,550,000 Y Y ? Y

Consumer Class Action Litigation $1,925,000 $4,050,000 Y Y Y

Card Issuer/Bank Litigation $850,000 $1,700,000 Y ?

AG or FTC Litigation $450,000 $850,000 Y ? ?

PCI Compliance $9,100,000 * Y Y ? ?

MAXIMUM ESTIMATED EXPOSURE** $14,306,550 $20,431,550

*Costs are variable, based on number of affected individuals or payment cards.

**Total numbers could be lower, for example, if a class action lawsuit was disposed of on motion to dismiss.

Page 18: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Overview of Legal/Reg Framework - Review

May 14, 2014 Dentons US LLP 18

• Compliance Becoming Dominant Risk Driver

• Lawyers in the Data Center are Here to Stay

• Compliance is not Security

Page 19: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Where Are We Headed?

May 14, 2014 Dentons US LLP 19

Compliant, not Secure

More Security Budget to Legal/

Compliance

Regulator Scrutiny

Breach

Compliance Spiral of Doom

Page 20: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Suggestions:

May 14, 2014 Dentons US LLP 20

•  Lawyers are not going away, learn to work with them

•  Communicate, build relationships between key stakeholders •  Ongoing working relationship, not just when emergencies •  Cross-discipline information sharing, e.g. Data Governance Boards •  Wargame, tabletop exercises (including legal/compliance)

•  Acknowledge core competencies, use them appropriately •  Lawyers don't know operational security, regardless of what they tell you

•  Build security-focused security, map to compliance

•  Good places to start: Incident Response, Vendor Management

Page 21: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Case Study

May 14, 2014 Dentons US LLP 21

Adventures in HIPAA

Page 22: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Case Study - Adventures in HIPAA

May 14, 2014 Dentons US LLP 22

• What is a Security Incident? •  HIPAA:

•  Security Incident means the attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system. (45 C.F.R. 164.304)

•  Response and reporting. Identify and respond to suspected or known security incidents; mitigate, to the extent practicable, harmful effects of security incidents that are known to the covered entity or business associate; and document security incidents and their outcomes. (45 C.F.R. 164.308(a)(6)(ii))

•  Report to the covered entity any security incident of which it becomes aware, including breaches of unsecured protected health information… (45 C.F.R. 164.314(a)(2)(i)(C))

Page 23: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Case Study - Adventures in HIPAA

May 14, 2014 Dentons US LLP 23

• So, under the literal reading of the rule you have to: •  Identify and respond to, mitigate, document and report suspected or

known unauthorized access, use, disclosure, modification, destruction, interference, whether attempted or successful.

•  Have you identified, documented and reported your port scans today?

Page 24: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Case Study - Adventures in HIPAA

May 14, 2014 Dentons US LLP 24

• But wait, that's not all! •  Do you have a relationship with CMS?

• CMS definition from typical Computer Matching Agreement (based on NIST): •  "Incident" means the act of violating an explicit or implied

security policy, which includes attempts (either failed or successful) to gain unauthorized access to a system or its data, unwanted disruption or denial of service, the unauthorized use of a system for the processing or storage of data;…

• …shall report suspected or confirmed incidents affecting loss or suspected loss of PII within one hour of discovery…

Page 25: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Case Study - Adventures in HIPAA

May 14, 2014 Dentons US LLP 25

•  HIPAA: •  The acquisition, access, use, or disclosure of [PHI] in a manner not

permitted under [the rules] which compromises the security or privacy of the [PHI]… (45 C.F.R. 164.402)

•  Disclosure outside the rules is presumed a breach unless "low probability … [PHI] has been compromised based on risk assessment…

•  CMS: •  An incident becomes a breach when there is the loss of control,

compromise, unauthorized disclosure, unauthorized acquisition, unauthorized access, or any similar term referring to situations where persons other than authorized users and for an other than unauthorized purpose have access or potential access to personally identifiable information or personal health information, whether physical or electronic.

•  State Breach Notification (MN): • …unauthorized acquisition of computerized data that compromises the

security, confidentiality or integrity of information… (MN Stat 325E.61)

Page 26: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Case Study - Adventures in HIPAA

May 14, 2014 Dentons US LLP 26

•  Is it a Security Incident? 1.  Vulnerability scans 2.  Brute force login attempts 3.  File transfer over public Wi-Fi 4.  Website vulnerable to Heartbleed 5.  Exploitation of web vulnerability, upload of code 6.  Patient spreadsheet exposed on public file server

HIPAA: attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system.

CMS: the act of violating an explicit or implied security policy, which includes attempts (either failed or successful) to gain unauthorized access to a system or its data, unwanted disruption or denial of service, the unauthorized use of a system for the processing or storage of data

Page 27: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Case Study - Adventures in HIPAA

May 14, 2014 Dentons US LLP 27

•  Is it a Breach? 1.  Vulnerability scans 2.  Brute force login attempts 3.  File transfer over public Wi-Fi 4.  Website vulnerable to Heartbleed 5.  Exploitation of web vulnerability, upload of code 6.  Patient spreadsheet exposed on public file server

HIPAA: acquisition, access, use, or disclosure of [PHI] in a manner not permitted under [the rules] which compromises the security or privacy…

CMS: loss of control, compromise, unauthorized disclosure, unauthorized acquisition, unauthorized access, or any similar term referring to situations where persons other than authorized users and for an other than unauthorized purpose have access or potential access to personally identifiable information

MN State Breach: unauthorized acquisition of computerized data that compromises the security, confidentiality or integrity of information

Page 28: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Case Study - Adventures in HIPAA

May 14, 2014 Dentons US LLP 28

• Sample HIPAA BAA Language on Incident Reporting:

•  ACME will report, no less than quarterly, any successful Security Incidents of which ACME becomes aware. Notice is hereby provided, and no further notice will be provided, for Unsuccessful Security Incidents.

•  “Unsuccessful Security Incidents” shall include, but not be limited to, pings and other broadcast attacks on Business Associate’s firewall, port scans, unsuccessful log-on attempts, denials of service and any combination of the above, so long as no such incident results in unauthorized access, use or disclosure of PHI.

•  The parties acknowledge and agree that this section constitutes notice by Business Associate to Covered Entity of the ongoing existence and occurrence of attempted but Unsuccessful Security Incidents for which no additional notice to Covered Entity shall be required.

Page 29: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Case Study - Adventures in HIPAA

May 14, 2014 Dentons US LLP 29

Takeaways

•  Incident and breach questions are very fact specific

• Short reporting timeframes (1 hour for CMS, BAAs typically a few days, MN "as soon as reasonably possible")

• Often not enough information to know for sure • E.g. limited logs

Page 30: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Case Study

May 14, 2014 Dentons US LLP 30

Payment Card Incident Scenario

Page 31: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Case Study - Payment Card Incident Scenario

May 14, 2014 Dentons US LLP 31

• Saturday, May 17: • Call from USSS - may be an issue at ACME. • Still gathering information, cannot share more at this time.

• Saturday, May 17: • Email from Bart Crabs, a well-known security blogger, asking

ACME to confirm whether it had a breach.

• Sunday, May 18: • ACME hires Forensics 'R Us to investigate.

Page 32: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Case Study - Payment Card Incident Scenario

May 14, 2014 Dentons US LLP 32

• Sunday, May 18: • USSS reference vague sources. Information "consistent

with" POS breach. • Cannot identify scope or scale, little data but reliable

sources.

• Monday, May 19: • No update by USSS.

• Tuesday, May 20: • News media reaches out to former ACME employees,

asking about security issues.

Page 33: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Case Study - Payment Card Incident Scenario

May 14, 2014 Dentons US LLP 33

• Wednesday, May 21: • River Bank calls, says Card Network has concerns based

on Common Point of Purchase analysis • 257 cards used at 46 ACME stores were later used in

fraudulent purchases. • Triggered by recently lowered CPP thresholds. • Other recent big breaches started out this way, hence the

early warning.

• No new USSS information. Forensics has not found any indication of a breach.

Page 34: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Case Study - Payment Card Incident Scenario

May 14, 2014 Dentons US LLP 34

• Thursday, May 22: • Bart Crabs publishes story reporting potential breach at

ACME, based on "confidential sources."

• Thursday, May 22: • A bank tells USSS (who tells ACME) they suspected

220,000 fraudulent cards could be linked to ACME over 2-3 years.

• Card Network contacted USSS with a report that two banks had analyses that might indicate data loss at ACME.

Page 35: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Case Study - Payment Card Incident Scenario

May 14, 2014 Dentons US LLP 35

• Friday, May 23: • No new information from USSS. • Forensics has not found indications of a breach.

• Friday, May 23: • Letter from MN state AG requesting information on potential

breach.

• Tuesday, May 27: • Card Network says they had a few CPP hits but "wouldn't

go crazy." No special fraud rules for ACME, no longer investigating.

Page 36: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Case Study - Payment Card Incident Scenario

May 14, 2014 Dentons US LLP 36

• Tuesday, May 27: • Forensics states that they have found no indication of a

card breach "but the investigation is still ongoing."

• Tuesday, June 3: • Forensics investigation substantially complete. • Some malware found but no indication of card exfiltration.

Page 37: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Case Study - Payment Card Incident Scenario

May 14, 2014 Dentons US LLP 37

• Lessons: • Media often gets ahead of the facts • Don't let yourself get ahead of the facts

• Understand exactly what it is you know • Understand what you don't know

• Be ready to act swiftly when you need to • Be patient when you don't need to act

Page 38: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Case Study -

May 14, 2014 Dentons US LLP 38

Working with Forensic Investigators

Page 39: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Case Study - Working with Forensic Investigators

May 14, 2014 Dentons US LLP 39

On February 25, 2014, Lawyer & Lawyer LLP engaged Forensics to conduct a due diligence forensic investigation at ACME to determine whether there had been a data breach and/or data compromise. During the course of this investigation, ACME requested that Forensics perform a separate analysis of an FTP server (‘ftp.acme.com’) located in the DMZ of ACME's Lake Wobegon, MN data center. It should be noted that activities and findings related to this evidence were determined to be unrelated to the previous activities and analysis.

Page 40: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Case Study - Working with Forensic Investigators

May 14, 2014 Dentons US LLP 40

Our objectives for this investigation were as follows: 1)  determine whether unauthorized usage or access by a

dismissed employee occurred on the FTP server ‘ftp.acme.com’; and,

2)  identify any suspicious files related to such usage.

Page 41: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Case Study - Working with Forensic Investigators

May 14, 2014 Dentons US LLP 41

Conclusion:

Based on Forensics's examination of the source evidence, there are indications of unauthorized use of, and possible file exfiltration from, the in-scope FTP server ‘ftp.acme.com’. The evidence suggests that several of the indicators are derived from activities performed by a user account assigned to the dismissed employee (‘eve01'), as well as from a user account this employee had access to (‘root’), and possibly a third user account (‘num02').

Page 42: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Case Study - Working with Forensic Investigators

May 14, 2014 Dentons US LLP 42

Conclusion:

Suspicious activities discovered included commands issued to: 1)  establish SSH and Telnet connections to multiple external

servers/domains, including one which is registered to the terminated employee, one known suspicious domain, and two non-domestic domains;

2)  edit/delete/wipe files; 3)  port scan/sniff; 4)  exfiltrate files; 5)  create FTP user accounts; and 6)  create the unauthorized user account ‘account.name’.

Page 43: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Case Study - Working with Forensic Investigators

May 14, 2014 Dentons US LLP 43

On February 25, 2014, Lawyer & Lawyer LLP engaged Forensics to conduct a due diligence forensic investigation at ACME to determine whether there had been a data breach and/or data compromise. During the course of this investigation, ACME requested that Forensics perform a separate analysis of an FTP server (‘ftp.acme.com’) located in the DMZ of ACME's Lake Wobegon, MN data center. It should be noted that activities and findings related to this evidence were determined to be unrelated to the previous activities and analysis.

Page 44: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Case Study - Working with Forensic Investigators

May 14, 2014 Dentons US LLP 44

Our objectives for this investigation were as follows: 1)  determine whether unauthorized usage or access by a

dismissed employee occurred on the FTP server ‘ftp.acme.com’; and,

2)  identify any suspicious files related to such usage.

Page 45: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Case Study - Working with Forensic Investigators

May 14, 2014 Dentons US LLP 45

Conclusion:

Based on Forensics's examination of the source evidence, there are indications of unauthorized use of, and possible file exfiltration from, the in-scope FTP server ‘ftp.acme.com’. The evidence suggests that several of the indicators are derived from activities performed by a user account assigned to the dismissed employee (‘eve01'), as well as from a user account this employee had access to (‘root’), and possibly a third user account (‘num02').

Page 46: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Case Study - Working with Forensic Investigators

May 14, 2014 Dentons US LLP 46

Conclusion:

Suspicious activities discovered included commands issued to: 1)  establish SSH and Telnet connections to multiple external

servers/domains, including one which is registered to the terminated employee, one known suspicious domain, and two non-domestic domains;

2)  edit/delete/wipe files; 3)  port scan/sniff; 4)  exfiltrate files; 5)  create FTP user accounts; and 6)  create the unauthorized user account ‘account.name’.

Page 47: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Case Study - Working with Forensic Investigators

May 14, 2014 Dentons US LLP 47

• Lessons • Forensics should go through counsel - drafts can be privileged

• Forensic reports should stick to the facts and avoid legal conclusions

• Many FI's are very good at what they do, but keep them focused on what they do

Page 48: The Rise of Compliance-Driven Security - Secure360...The Rise of Compliance-Driven Security . Locations May 14, 2014 Dentons US LLP 2 . Offices ... Adventures in HIPAA 2. Payment Card

Thank you

Andy Blair Dentons US LLP 1221 Ave of the Americas New York, NY 10020 USA

© 2013 Dentons

Dentons is an international legal practice providing client services worldwide through its member firms and affiliates. This publication is not designed to provide legal or other advice and you should not take, or refrain from taking, action based on its content. Please see dentons.com for Legal Notices.

Questions? [email protected]

@andyhblair dentons.com/andy-blair