30
Presented by Osama Salah Application Whitelisting Complimenting Threat Centric with Trust Centric Security

Application Whitelisting - Complementing Threat centric with Trust centric security

Embed Size (px)

Citation preview

Page 1: Application Whitelisting - Complementing Threat centric with Trust centric security

Presented by Osama Salah

Application WhitelistingComplimenting Threat Centric with Trust Centric

Security

Page 2: Application Whitelisting - Complementing Threat centric with Trust centric security

Application Whitelisting

Is Applicationon whitelist?

Is Applicationon Blacklist?

Deny! Don’t Run!

Run it!

Don’t Run!

Allow! Run it!

Yes

No

Yes

No

ThreatCentric

TrustCentric

Else

Else

Default Allow

Default Deny

Page 3: Application Whitelisting - Complementing Threat centric with Trust centric security

Blacklist Fail

Page 4: Application Whitelisting - Complementing Threat centric with Trust centric security

Decision Rationale Objective Q1. What do we

know more about, the bad or the good?

Q2. Is it easy to mange?

Malware Prevent malware from executing.

The Good White ListBut we do Black List

No (White List)Yes (Black List)

Access Control

Allow access to employees only.

The Good White List Yes

No-Fly List Prevent known bad people from getting on planes.

The Bad Black List Yes

Page 5: Application Whitelisting - Complementing Threat centric with Trust centric security

What is the Problem?

…in the context of this presentation.

Page 6: Application Whitelisting - Complementing Threat centric with Trust centric security

Exponential Malware Growth

Source: AV-TEST, www.av-test.org

Page 7: Application Whitelisting - Complementing Threat centric with Trust centric security

How are we typically trying to solve the

problem?

Page 8: Application Whitelisting - Complementing Threat centric with Trust centric security

Traditional Malware Prevention Stack

Dat

a C

ente

r Fire

wal

l

End

poin

t Pro

tect

ion

Hos

t FW

Ant

iviru

s

HIP

S

Ant

i AP

T

Fire

wal

l

Web

Filt

erA

ntiv

irus

IPS

Fire

wal

l

Web

Filt

erA

ntiv

irus

IPS

Page 9: Application Whitelisting - Complementing Threat centric with Trust centric security

Antivirus Effectiveness

“When none of the antivirus scanners detected a malware sample on the first day, it took an average of two days for at least one antivirus scanner to detect it”

“Over the course of 365 days, no single antivirus scanner had a perfect day - a day in which it caught every new malware sample”

“After a year, there are samples that 10% of the scanners still do not detect”

Source: lastline.com, Antivirus Isn’t Dead, It Just Can’t Keep Up

“On Day 0, only 51% of antivirus scanners detected new malware samples”

“After two weeks, there was a notable bump in detection rates (up to 61%), indicating a common lag time for antivirus vendors”

Page 10: Application Whitelisting - Complementing Threat centric with Trust centric security

How do we get infected today?

• Watering Hole Attacks

• Zero-Day Vulnerabilities http://where ever target typically hangs out

• Google says the best phishing scams have 45% success rate (2014).

• FireEye on Spear Phishing: 70% open rate, 50% of those click on links. (2012)

Page 11: Application Whitelisting - Complementing Threat centric with Trust centric security

APT Protection

Turing Test in Reverse: New Sandbox-Evasion techniques Seek Human Interaction (fireeye.com, June 2014)

“Cybersecurity is a constant arms race. Simulating mouse movement and clicks is not enough to fool the most advanced sandbox-evading malware. Now malware authors are incorporating real-world behaviors into their evasion strategies.”

“Simulating these behaviors—the way actual people scroll documents, click the mouse button, and move the cursor— is a huge challenge for cybersecurity. Anticipating future evasion techniques might be even tougher. Expect malware authors to employ more novel techniques that look for that human touch.”

Microsoft phishing emails target corporate users, deliver malware that evades sandboxes (scmagazine.com 02.2015)

Quarian Targeted-Attack Malware Evades Sandbox Detection (blogs.mcafee.com 09.2014)

One additional prediction: To date, cybercriminals have mainly focused on escaping application sandboxes. However, increasingly popular standalone sandbox systems offered by security software vendors pose a new hurdle for cyberthieves. In response, cybercriminals have begun to explore ways for their malware to escape from those sandbox systems. Today a significant number of malware families identify and evade sandbox-based detection. (McAfee Labs Threat Report Nov. 2014)

Malware Authors Using New Techniques to Evade Automated Threat Analysis Systems (symantec.com 10.2012)

An Independent test of APT attack detection appliances(MRG Effitas and CrySyS Lab, Nov. 2014)

Page 12: Application Whitelisting - Complementing Threat centric with Trust centric security

What are others saying?

Secure Standard Config

Application Whitelisting

Patch Applications

Patch Operating System

Minimize user with Admin priv.

Application Sec. Patching

“..prevents 85% of targeted cyber intrusions..”

“…are the most effective means yet found to stop the wave of targeted intrusions that are doing the greatest damage to many organizations.”

Software Whitelisting

System Sec. Patching

No Admin Priv. Browsing/Emailing

Page 13: Application Whitelisting - Complementing Threat centric with Trust centric security

Source: Gartner Hype Cycle for Infrastructure Protection, 2014

Page 14: Application Whitelisting - Complementing Threat centric with Trust centric security

What is probably the most successful App Whitelisting Implementation?

Page 15: Application Whitelisting - Complementing Threat centric with Trust centric security

Why aren’t more enterprises implementing Whitelisting?• Maturity and Culture

– Change Control, Admin Control on Workstations– Software Asset Management discipline– Balancing between security and operations– Complaints Management

• It’s not easy• Perception that its is not flexible• Perception: Performance overhead, another agent on endpoints,

doesn’t play nice with AV• Decision maker not impacted (Externality)• Bad Marketing

Page 16: Application Whitelisting - Complementing Threat centric with Trust centric security

It’s a Question of Trust…• Trust the Solution

– Vulnerabilities or Evasion possible– Risk Reduction not elimination– Augmenting other controls not replacing

• Trust the Implementer– Skills, capabilities, references

• Trust the Administrator– Control through process and audits

Page 17: Application Whitelisting - Complementing Threat centric with Trust centric security

Possible Enforcement Policies:• Low: Allowed to run, monitor only • Medium: Prompt Users, allow to run locally• High: Block untrusted• Run policies in monitoring mode (what if?)• On Existing or new files• Combine with Local or Global Approvals• Combine with Reputation/Trust Level

It’s not all Black and White

Page 18: Application Whitelisting - Complementing Threat centric with Trust centric security

Lessons Learnt: Application Trust Policy OptionsTo put it in context, below some figures of our particular deployment

1.8 Million Unique FilesCollected over a period of approx. 6 months

1800 End Users 1300 Workstations 220 Servers

Page 19: Application Whitelisting - Complementing Threat centric with Trust centric security

Trusted Publishers

48%Signed Files

Non-SignedFiles

52%

~ 1.8 Million Files~ 8300 Publishers

Page 20: Application Whitelisting - Complementing Threat centric with Trust centric security

Trusted Publishers

“…the Darkhotel attackers are using a variety of digital certificates to sign their malware. Attackers often employ stolen certificates in this way, but the Darkhotel group seems to have taken a different tack, duplicating legitimate certificates that have weak keys.”

Certificate Authority Hacks

Stolen Certificates Code Signing System Hack

DigiNotar Files Bankruptcy in Wake of Devastating Hack (09.2011)

Independent Iranian Hacker Claims Responsibility for Comodo Hack (03.2011)

VeriSign Hit by Hackers in 2010 (02.2012)

Hackers Breached Adobe Server in Order to Sign Their Malware (09.2012)Bit9 Hackerd into, the Criminals Seize Code-signing

Certificate (02.2013)

Sony attackers also stole certificates to sign malware (02.2013)

Zeus malware found with valid digital signature (04.2014)

Certificates RevocationHP accidentally signed malware, will revoke certificate (10.2014)

Microsoft Revokes Certificates Used by Flame Malware (06.2012)

Adobe to revoke code signing certificate (09.2012)

Weak Certificate Hack

Page 21: Application Whitelisting - Complementing Threat centric with Trust centric security

Trusted PublishersSome Issues• Publisher dropping non-signed files.• Publisher replacing previously signed files with non-signed files.

Application Whitelisting Features• Typically you can put trusted publishers manually on a whitelist or

automate it by using reputational approval of the publisher.• You also ban publishers.• Publisher Check on new file detection• Periodic Certificate re-check• Exclude Weak Certificates

Page 22: Application Whitelisting - Complementing Threat centric with Trust centric security

Trusted Directories• Files located in a specific directory and executed

from it are allowed to deploy.• Can be used to further lockdown updater policies by

limiting where the files need to be coming from like: C:\WSUS\WsusContent\

• Easy option if you can control what goes into the Trusted Directory

• Don’t use with removable drives

Page 23: Application Whitelisting - Complementing Threat centric with Trust centric security

Trusted User or Group• Selected users can be granted permissions to

deploy software.• Can be granted in urgent/exceptional cases.

Page 24: Application Whitelisting - Complementing Threat centric with Trust centric security

Trusted Software Delivery System• Software Distribution Systems like Microsoft SCCM, PDQ

Deploy…• Software that updates itself like Adobe Reader, Chrome, AV

software etc.• Patch Management Solutions (WSUS, …)• Solutions come with a list of preconfigured Updaters• Add updater rules manually, basically by selecting the

process that will do the updating.

Page 25: Application Whitelisting - Complementing Threat centric with Trust centric security

Threat Levels

• Clean• Potential Risk• Malicious• Unknown

Clean26%

Unknown74%

Trust Levels

-1 0 1 2 3 4 5 6 7 8 9 100

200000

400000

600000

800000

1000000

1200000

1400000

Page 26: Application Whitelisting - Complementing Threat centric with Trust centric security

File Type Distribution (1.8M files)

76%

8%

7%

4%

5%

exe

msi

jar

dll

vb,regmui,syscom,bat

Page 27: Application Whitelisting - Complementing Threat centric with Trust centric security

Implementation Considerations• Application whitelisting is augmenting existing

controls, it is not replacing them.• Determine Scope of Deployment

– Workstations, Laptops, Servers..

• Determine the stakeholders and understand how they will be impacted. Engage them early.– End Users, Client Support, Systems Eng., Developers, Anyone

who currently has admin rights…

• Strategy: Stop the bleeding, cleanup later

Page 28: Application Whitelisting - Complementing Threat centric with Trust centric security

Implementation Considerations• Develop Application Whitelisting Policy & Procedure (align with

software asset management lifecycle)– Obtaining, testing, approving, deploying, maintaining

• Why and how are new applications entering the company?• New Deployments, Trial Software, Updates, Patching, Web

Download, Email, USB…• What is the approval process? How can you automate it?• Be ready to respond quickly (emergency), especially early on in

the project.

Page 29: Application Whitelisting - Complementing Threat centric with Trust centric security

Benefits Summary• Reduce number of malware incidents• Zero-Day Protection• Improve security of end-of-life or hard to patch endpoints• Detect insider threats or bad behavior• Improved forensic capabilities (Data, Drift Reports, Snapshots)• Better Change management will require better planning and can

lead to less downtime• Permit usage of USB devices (if the risk is introducing malware not

data leakage)

Page 30: Application Whitelisting - Complementing Threat centric with Trust centric security

THANK YOU FOR YOUR TIME