disclaimer
play

Disclaimer ! The%presenta6on%itself,%and%the%views% - PDF document

What%remains?%What%are%(really)%new? June%13,%2013 Shin%Adachi,% CISSP,&CISM,&CISA,&PMP Lead%Security%Analyst,%NTT%I CoChair,%Educa6on%Commi8ee,%FIRST NTT%Innova7on%Ins7tute,%Inc. %Forum%of%Incident%Response%and%Security%Teams


  1. What%remains?%What%are%(really)%new? June%13,%2013 Shin%Adachi,% CISSP,&CISM,&CISA,&PMP Lead%Security%Analyst,%NTT%I³ CoChair,%Educa6on%Commi8ee,%FIRST NTT%Innova7on%Ins7tute,%Inc. %Forum%of%Incident%Response%and%Security%Teams Disclaimer ! The%presenta6on%itself,%and%the%views% and%opinions%expressed%by%the%presenter% therein%do%NOT%reflect%those%of%his%any% affilia6ons%at%all. ! NONE%of%such%affilia6ons%above%thereof% assumes%any%legal%liability%or% responsibility%for%the%presenta6on. 2

  2. Who%am%I? ! Shin%Adachi, %CISSP,%CISM,%CISA,%PMP ✴ Team%Representa7ve%in%the%Americas%for%NTTDCERT ✴ CoChair,%FIRST%Educa7on%CommiHee ✴ FIRST%Program%CommiHee,% for%four%consecu6ve%terms%of%five ✴ U.S.%NIST%Cloud%Compu7ng%Program%Working%Groups ✴ CloudCERT%Working%Group,%Cloud%Security%Alliance ✤ Spoke%at: ! FIRST,%Liberty%Alliance,%Kantara%Ini6a6ve,%ITUWT%SG%13,%APEC% TEL%eSecurity,%and%other%private%mee6ngs%and%conferences. ‣ CISA:&Cer)fied&Informa)on&Systems&Auditor&(ISACA) ‣ CISSP:&Cer)fied&Informa)on&Systems&Security&Professional&(ISC)² ‣ CISM:&Cer)fied&Informa)on&Security&Manager&(ISACA) ‣ PMP:&Cer)fied&Project&Management&Professional&(PMI) (Draft) Special Publication 500-293 page&80 NIST US Government Cloud Computing Tec US Government Cloud Computing Technology Roadmap Interagency, Academic, Standards Organi Volume II Release 1.0 (Draft ) Shin Adachi, GICTF- Global Inter-Cloud Techno Gabriel Akisanmi, KPMG LLP Useful Information for Cloud Adopters Lee Badger, Robert Bohn, Shilong Chu, Mike Hogan, Fang Liu, Viktor Kaufmann, Jian Mao, John Messina, Kevin Mills, Annie Sokol, Jin Tong, Fred Whiteside and Dawn Leaf Source:%NIST%Special%Publica6on%500W293 NIST Cloud Computing Program Information Technology Laboratory 4

  3. Source:( h*p://kantaraini2a2ve.org/confluence/display/eGov/eGovernment+Implementa2on+Profile+of+SAML+V2.0+H+Contributors 5 <%This%page%is%inten6onally%blank.%> ! 6

  4. Cuckoo’s%Egg Source:% hHp://www.amazon.com/CuckoosDEggDTrackingDComputerDEspionage/dp/1416507787 7 Cuckoo’s%Egg Authen6ca6on% breach%here ! ....eventually%realized%that%the%unauthorized%user%was%a%hacker% who%had%acquired%root%access%to%the%LBL%system%by%exploi6ng%a% vulnerability%in%the%movemail%func6on%of%the%original%GNU% Authoriza6on%breach%and% Vulnerability% Emacs. Privilege%escala6on%here Exploita6on%here Source:%Wikipedia:% h8p://en.wikipedia.org/wiki/The_Cuckoo%27s_Egg

  5. Cuckoo’s%Egg ! Published%in % 1989 ! Story%on % August% 1986 Source:%Wikipedia:% h8p://en.wikipedia.org/wiki/The_Cuckoo%27s_Egg 9 9 8 In%2012 ! 48% % ! 55% % overall Large%Organiza6ons Use%of%Stolen%Creden6als Figure 23: Variety of hacking actions Overall Small Large Use of stolen creds 48% 41% 55% 44% Use of backdoor or C2 36% 62% 34% 19% Brute force 47% Unknown 8% 9% 9% Source:%Figure%23%on%page%34,%Verizon%2013%DATA%BREACH%INVESTIGATION%REPORT% 10

  6. Compromised%Targets ! 38% % ! 48% % overall Small%Organiza6ons Creden6als%right%aier% Payment%Data Figure 36: Variety of compromised data Overall Small Large 61% 65% 57% Payment Credentials 38% 48% 34% Internal 24% 21% 29% Source:%Figure%36%on%page%46,%Verizon%2013%DATA%BREACH%INVESTIGATION%REPORT% 11 11 How%smart%enough%are%we? ! Linkedin:%6.5%M? ! eHarmony:%1.5%M? ! Last.fm: ! IEEE:% saved%passwords%in%plain%text(!?) Sources: hCp://blog.linkedin.com/2012/06/06/linkedinKmemberKpasswordsKcompromised/ hCp://blogs.wsj.com/cio/2012/06/06/linkedinKpasswordKbreachKillustratesKendemicKsecurityKissue/ hCp://www.eharmony.com/blog/2012/06/06/updateKonKcompromisedKpasswords/ hCp://ar)cles.la)mes.com/2012/jun/06/business/laKfiKtnKeharmonyKhackedKlinkedinK20120606 hCp://www.last.fm/passwordsecurity hCp://ieeelog.com/ 12

  7. Open%Data 13 How%about % “Open ed %Data”? 14

  8. Example%#1 Source:%Wikileaks 15 Example%#2 Source:%Bloomberg%News,%Twi8er 16

  9. Example%#3 ! Total&75GB&data&(compressed&to&8.2GB)&stolen& ! Ini@al&intrusion:&August&13,&2012 ! Discovered&by&vic@m:&October&18,&2012 ! Total&44&systems&compromised ! One&(1)&system&with&backdoor&malware&installed ! Three&(3)&systems&had&database&backups&or&files& stolen ! One&(1)&system&sent&data&out&for&the&aRacker ! 39&systems&accessed&by&the&aRacker ! 33&UNIQUE&malicious&soXware&and&u@li@es 17 Example%#3% (con6nued) ! 3.8&Million&SSNs,&none&of&them&encrypted [1] ! In&addi@on,&1.9&Million&dependents’ %[1] ! 700,000Z&Business&Tax&filers&informa@on %[1] ! 3.3&Million&Bank&Account&Numbers %[1] ! 5,000&“expired”&Credit&card&numbers %[1] ! US$12&Million&for&iden@ty&protec@on&services& [2] Source: [1]%hHp://www.youtube.com/watch?v=7OV6TZHZKqg& [2] hHp://www.bankinfosecurity.com/stolenDpasswordDledDtoDsouthDcarolinaDtaxDbreachDaD5309/opD1 18

  10. Relying%on%others Figure 44: Discovery methods Overall Small Large Unrelated party (Ext) 34% 23% 52% Fraud detection (Ext) 24% 35% 7% 9% 10% 7% Customer (Ext) Law enforcement (Ext) 8% 14% 1% Actor disclosure (Ext) 7% 6% 5% Unknown 5% 4% 7% 4% 2% 9% Reported by user (Int) Financial audit (Int) 3% 2% 1% NIDS (Int) 1% 1% 4% Log review (Int) 1% 4% 1% 1% 2% Fraud detection (Int) HIDS (Int) 1% 1% Incident response (Int) 1% 1% IT audit (Int) 1% 1% <1% 1% Monitoring service (Ext) 341 186 102 Financial Espionage Other Source:%Figure%44%on%page%54,%Verizon%2013%DATA%BREACH%INVESTIGATION%REPORT% 19 <%This%page%is%inten6onally%blank.%> ! 20

  11. Lessons%we%can%learn ! Authen7ca7on%&%Authoriza7on%as%aHack%targets ๏ Regardless&of&the&aRack&vectors %[old,%new,%or%emerging] ๏ Important &Iden@ty&and&Access&Management&(IAM)& ๏ Need&broad&considera@on: ! Enrollment,%Lifecycle,%Creden6al,%Key,%and%Iden6ty%Management%for% authen6ca6on,%Access%control%and%A8ribute%management%for%authoriza6on,%Level% of%iden6ty%or%authen6ca6on%assurance,%monitoring%suspicious%behaviors,%policy% enforcement,%Circuit%breaker,%etc. ! Open ed %Data,%No%thank%you! ๏ Governments&as&aRrac@ve&aRack&targets ! Governments%have%more%personal%informa6on%than%others ! Poor%IAM%helps%government%resources%compromised. 21 Lessons%we%can%learn ! Communica6ng%with%others • Expand&our&capability&to&learn&from&those&trusted ! to&share&something&with&them ! to&learn&something&from&them ! to&no@fy,&and&to&be&no@fied&appropriately ! Do%what%we%CAN%do%NOW! ! before%excuses%or%something%new 22

  12. QUESTIONS? ! Catch%me%here%today. ! Catch%me%next%week%at%FIRST% Educa6on%Commi8ee%or%FIRST% Annual%Conference%at%Conrad% Hilton%Bangkok. 23 ขอบคุณมาก % Thank%you%very%much! Karen%Chang Chair,%BAWG and(all(of(you(here! 24

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend