12
What remains? What are (really) new? June 13, 2013 Shin Adachi, CISSP, CISM, CISA, PMP CoChair, Educa6on Commi8ee, FIRST Forum of Incident Response and Security Teams Lead Security Analyst, NTT I³ NTT Innova7on Ins7tute, Inc. 2 Disclaimer ! The presenta6on itself, and the views and opinions expressed by the presenter therein do NOT reflect those of his any affilia6ons at all. ! NONE of such affilia6ons above thereof assumes any legal liability or responsibility for the presenta6on.

What%remains?%What%are%(really)%new?€¦ · Special Publication 500-293 (Draft) US Government Cloud Computing Technology Roadmap Volume II Release 1.0 (Draft) Useful Information

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: What%remains?%What%are%(really)%new?€¦ · Special Publication 500-293 (Draft) US Government Cloud Computing Technology Roadmap Volume II Release 1.0 (Draft) Useful Information

What%remains?%What%are%(really)%new?June%13,%2013

Shin%Adachi,%CISSP,&CISM,&CISA,&PMPCoChair,%Educa6on%Commi8ee,%FIRST%Forum%of%Incident%Response%and%Security%Teams

Lead%Security%Analyst,%NTT%I³NTT%Innova7on%Ins7tute,%Inc.

2

Disclaimer

! The%presenta6on%itself,%and%the%views%and%opinions%expressed%by%the%presenter%therein%do%NOT%reflect%those%of%his%any%affilia6ons%at%all.

! NONE%of%such%affilia6ons%above%thereof%assumes%any%legal%liability%or%responsibility%for%the%presenta6on.

Page 2: What%remains?%What%are%(really)%new?€¦ · Special Publication 500-293 (Draft) US Government Cloud Computing Technology Roadmap Volume II Release 1.0 (Draft) Useful Information

Who%am%I?! Shin%Adachi,%CISSP,%CISM,%CISA,%PMP

✴ Team%Representa7ve%in%the%Americas%for%NTTDCERT✴ CoChair,%FIRST%Educa7on%CommiHee✴ FIRST%Program%CommiHee,%for%four%consecu6ve%terms%of%five

✴ U.S.%NIST%Cloud%Compu7ng%Program%Working%Groups✴ CloudCERT%Working%Group,%Cloud%Security%Alliance✤ Spoke%at:

! FIRST,%Liberty%Alliance,%Kantara%Ini6a6ve,%ITUWT%SG%13,%APEC%TEL%eSecurity,%and%other%private%mee6ngs%and%conferences.

‣ CISSP:&Cer)fied&Informa)on&Systems&Security&Professional&(ISC)²‣ CISM:&Cer)fied&Informa)on&Security&Manager&(ISACA)

‣ CISA:&Cer)fied&Informa)on&Systems&Auditor&(ISACA)‣ PMP:&Cer)fied&Project&Management&Professional&(PMI)

4

Special Publication 500-293 (Draft)

US Government Cloud Computing Technology Roadmap

Volume II Release 1.0 (Draft)

Useful Information for Cloud Adopters

Lee Badger, Robert Bohn, Shilong Chu, Mike Hogan, Fang Liu, Viktor Kaufmann, Jian Mao, John Messina, Kevin Mills, Annie Sokol, Jin Tong, Fred Whiteside and Dawn Leaf

NIST Cloud Computing Program Information Technology Laboratory

page&80

NIST US Government Cloud Computing Technology Roadmap, Release 1.0 (Draft) November 2011

Page 80

Interagency, Academic, Standards Organizations, and Industry Contributors Shin Adachi, GICTF- Global Inter-Cloud Technology Forum, NTT DATA Agilent, L.L.C. Gabriel Akisanmi, KPMG LLP Leslie Anderson, Raytheon Company Gary Ardito, NetIQ Scott Armstrong, Symantec Corporation Kapil Bakshi, Cisco Systems Inc. Jeffrey S. Bardin, Treadstone 71 Utica College Roger Bass, Traxian, OASIS Bill Becker, SafeNet, Inc. Bhavesh C. Bhagat, Cloud Security Alliance DC, ConfidentGovernance.com, EnCrisp LLC Corey Bidne, USDA Michael Binko, kloudtrack, Software and Information Industry Association Dr. Alan H. Blair, Defense Engineering Inc. Mark Bohannon , Red Hat, Inc. Robert Borochoff, Administrative Office of the US Courts David W. Boyd, Data Tactics Corporation, Lorenz Research Corp. Richard Brackney, Microsoft Nadeem Bukhari, Kinamik Data Integrity Winston Bumpus, DMTF, VMware, Inc. William (Bill) Butler, Capitol College Kevin Call, Booz Allen Hamilton Karen Luigard Caraway, The MITRE Corporation Mark Carlson, SNIA, DMTF, Oracle Corporation Peggy Canale, Avocent Products and Services, Emerson Network Power Saravana R. Chandran, Strategy and Technology Direction Te-An Chang, Compuwright Solutions Gene Cartier, SRA International Eric Charlesworth, Cisco Systems, Inc. Arunava Chatterjee, Deloitte Consulting LLP G. Hussain Chinoy, USDA NRCS Augusto Ciuffoletti, Università di Pisa, Italy John Crandall, Brocade John Crout, United States Coast Guard Auxiliary Cory Dell, Coupa Software Yuri Demchenko, University of Amsterdam Frederic de Vaulx, Prometheus Computing, LLC Michele Drgon, DataProbity Josiah Dykstra, UMBC Carlo Espiritu, Triple Point Security Christopher Ferris, IBM Omar Fink, SAIC L. Bruce Finn, Federal Deposit Insurance Corporation David A. Foley, SNHU former student Harry J. Foxwell, PhD, Oracle Corporation Barry Garman, The Mercator Group Parisa Ghodous, University of Lyon I Richard Gordon, Jr., RICHMAR & Associates Nedim S. Goren , U.S. Census Bureau

Source:%NIST%Special%Publica6on%500W293

Page 3: What%remains?%What%are%(really)%new?€¦ · Special Publication 500-293 (Draft) US Government Cloud Computing Technology Roadmap Volume II Release 1.0 (Draft) Useful Information

5

Source:(h*p://kantaraini2a2ve.org/confluence/display/eGov/eGovernment+Implementa2on+Profile+of+SAML+V2.0+H+Contributors

! <%This%page%is%inten6onally%blank.%>

6

Page 4: What%remains?%What%are%(really)%new?€¦ · Special Publication 500-293 (Draft) US Government Cloud Computing Technology Roadmap Volume II Release 1.0 (Draft) Useful Information

Cuckoo’s%Egg

7

Source:%hHp://www.amazon.com/CuckoosDEggDTrackingDComputerDEspionage/dp/1416507787

Cuckoo’s%Egg

! ....eventually%realized%that%the%unauthorized%user%was%a%hacker%

who%had%acquired%root%access%to%the%LBL%system%by%exploi6ng%a%

vulnerability%in%the%movemail%func6on%of%the%original%GNU%

Emacs.

Source:%Wikipedia:%h8p://en.wikipedia.org/wiki/The_Cuckoo%27s_Egg

Authen6ca6on%breach%here

Authoriza6on%breach%and%Privilege%escala6on%here

Vulnerability%Exploita6on%here

Page 5: What%remains?%What%are%(really)%new?€¦ · Special Publication 500-293 (Draft) US Government Cloud Computing Technology Roadmap Volume II Release 1.0 (Draft) Useful Information

Cuckoo’s%Egg

! Published%in%1989! Story%on%August%1986

998

Source:%Wikipedia:%h8p://en.wikipedia.org/wiki/The_Cuckoo%27s_Egg

!48%%overall

10

Overall Small Large

8%34%

44%48%

9%47%

36%41%

9%19%

62%55%

UnknownBrute force

Use of backdoor or C2Use of stolen creds

Figure 23: Variety of hacking actions

Source:%Figure%23%on%page%34,%Verizon%2013%DATA%BREACH%INVESTIGATION%REPORT%

!55%%Large%Organiza6ons

In%2012

Use%of%Stolen%Creden6als

Page 6: What%remains?%What%are%(really)%new?€¦ · Special Publication 500-293 (Draft) US Government Cloud Computing Technology Roadmap Volume II Release 1.0 (Draft) Useful Information

Compromised%Targets

1111

Source:%Figure%36%on%page%46,%Verizon%2013%DATA%BREACH%INVESTIGATION%REPORT%

Figure 36: Variety of compromised data

Overall Small Large

24%38%

61%

21%48%

65%

29%34%

57%

InternalCredentials

Payment

!38%%overall

!48%%Small%Organiza6ons

Creden6als%right%aier%Payment%Data

How%smart%enough%are%we?

!Linkedin:%6.5%M?!eHarmony:%1.5%M?!Last.fm:!IEEE:%saved%passwords%in%plain%text(!?)

12

Sources:hCp://blog.linkedin.com/2012/06/06/linkedinKmemberKpasswordsKcompromised/hCp://blogs.wsj.com/cio/2012/06/06/linkedinKpasswordKbreachKillustratesKendemicKsecurityKissue/hCp://www.eharmony.com/blog/2012/06/06/updateKonKcompromisedKpasswords/hCp://ar)cles.la)mes.com/2012/jun/06/business/laKfiKtnKeharmonyKhackedKlinkedinK20120606hCp://www.last.fm/passwordsecurityhCp://ieeelog.com/

Page 7: What%remains?%What%are%(really)%new?€¦ · Special Publication 500-293 (Draft) US Government Cloud Computing Technology Roadmap Volume II Release 1.0 (Draft) Useful Information

13

Open%Data

How%about%“Opened%Data”?

14

Page 8: What%remains?%What%are%(really)%new?€¦ · Special Publication 500-293 (Draft) US Government Cloud Computing Technology Roadmap Volume II Release 1.0 (Draft) Useful Information

Example%#1

15

Source:%Wikileaks

Example%#2

16

Source:%Bloomberg%News,%Twi8er

Page 9: What%remains?%What%are%(really)%new?€¦ · Special Publication 500-293 (Draft) US Government Cloud Computing Technology Roadmap Volume II Release 1.0 (Draft) Useful Information

Example%#3

17

! Total&75GB&data&(compressed&to&8.2GB)&stolen&! Ini@al&intrusion:&August&13,&2012! Discovered&by&vic@m:&October&18,&2012! Total&44&systems&compromised

! One&(1)&system&with&backdoor&malware&installed! Three&(3)&systems&had&database&backups&or&files&stolen

! One&(1)&system&sent&data&out&for&the&aRacker! 39&systems&accessed&by&the&aRacker

! 33&UNIQUE&malicious&soXware&and&u@li@es

Example%#3%(con6nued)

18

Source:[1]%hHp://www.youtube.com/watch?v=7OV6TZHZKqg&[2]hHp://www.bankinfosecurity.com/stolenDpasswordDledDtoDsouthDcarolinaDtaxDbreachDaD5309/opD1

! 3.8&Million&SSNs,&none&of&them&encrypted[1]

! In&addi@on,&1.9&Million&dependents’%[1]

! 700,000Z&Business&Tax&filers&informa@on%[1]

! 3.3&Million&Bank&Account&Numbers%[1]

! 5,000&“expired”&Credit&card&numbers%[1]

! US$12&Million&for&iden@ty&protec@on&services&[2]

Page 10: What%remains?%What%are%(really)%new?€¦ · Special Publication 500-293 (Draft) US Government Cloud Computing Technology Roadmap Volume II Release 1.0 (Draft) Useful Information

Relying%on%others

19

Figure 44: Discovery methods

Overall Small Large

<1%1%1%1%1%1%1%3%4%5%7%8%9%

24%34%

341

1%1%1%

1%2%2%4%

6%14%

10%35%

23%

186 1%1%

2%4%4%

1%9%

7%5%

1%7%7%

52%

102Monitoring service (Ext)IT audit (Int)

Incident response (Int)HIDS (Int)

Fraud detection (Int)Log review (Int)

NIDS (Int)Financial audit (Int)

Reported by user (Int)Unknown

Actor disclosure (Ext)Law enforcement (Ext)

Customer (Ext)Fraud detection (Ext)Unrelated party (Ext)

Financial Espionage Other

Source:%Figure%44%on%page%54,%Verizon%2013%DATA%BREACH%INVESTIGATION%REPORT%

20

! <%This%page%is%inten6onally%blank.%>

Page 11: What%remains?%What%are%(really)%new?€¦ · Special Publication 500-293 (Draft) US Government Cloud Computing Technology Roadmap Volume II Release 1.0 (Draft) Useful Information

Lessons%we%can%learn! Authen7ca7on%&%Authoriza7on%as%aHack%targets

๏ Regardless&of&the&aRack&vectors%[old,%new,%or%emerging]

๏ Important&Iden@ty&and&Access&Management&(IAM)&๏ Need&broad&considera@on:

! Enrollment,%Lifecycle,%Creden6al,%Key,%and%Iden6ty%Management%for%authen6ca6on,%Access%control%and%A8ribute%management%for%authoriza6on,%Level%of%iden6ty%or%authen6ca6on%assurance,%monitoring%suspicious%behaviors,%policy%enforcement,%Circuit%breaker,%etc.

!Opened%Data,%No%thank%you!๏ Governments&as&aRrac@ve&aRack&targets

! Governments%have%more%personal%informa6on%than%others! Poor%IAM%helps%government%resources%compromised.

21

! Communica6ng%with%others• Expand&our&capability&to&learn&from&those&trusted

! to&share&something&with&them! to&learn&something&from&them! to&no@fy,&and&to&be&no@fied&appropriately

! Do%what%we%CAN%do%NOW!! before%excuses%or%something%new

22

Lessons%we%can%learn

Page 12: What%remains?%What%are%(really)%new?€¦ · Special Publication 500-293 (Draft) US Government Cloud Computing Technology Roadmap Volume II Release 1.0 (Draft) Useful Information

QUESTIONS?

23

!Catch%me%here%today.

!Catch%me%next%week%at%FIRST%Educa6on%Commi8ee%or%FIRST%Annual%Conference%at%Conrad%Hilton%Bangkok.

and(all(of(you(here!

ขอบคุณมาก%Thank%you%very%much!

24

Karen%ChangChair,%BAWG