insider threat
play

Insider Threat Engineering Secure Software Last Revised: November - PowerPoint PPT Presentation

Insider Threat Engineering Secure Software Last Revised: November 11, 2020 SWEN-331: Engineering Secure Software Benjamin S Meyers 1 Lottery Story At a lottery agency, a manager was able to turn losing tickets into winners He would buy


  1. Insider Threat Engineering Secure Software Last Revised: November 11, 2020 SWEN-331: Engineering Secure Software Benjamin S Meyers 1

  2. Lottery Story At a lottery agency, a manager was able to turn losing tickets ● into winners He would buy the ticket, then modify the database ○ Stole $63,000 over the course of a year and a half ○ SWEN-331: Engineering Secure Software Benjamin S Meyers 2

  3. Lottery Story At a lottery agency, a manager was able to turn losing tickets ● into winners He would buy the ticket, then modify the database ○ Stole $63,000 over the course of a year and a half ○ Lottery agencies have lots of internal auditing ● Asked the manager to investigate his own fraud ○ He dragged the investigation on ○ SWEN-331: Engineering Secure Software Benjamin S Meyers 3

  4. Lottery Story Manager went on vacation (with the money he stole) ● Agency assigned someone else to pick up the investigation ○ Discovered that the manager was covering up his fraud ○ Agency calls and fires the manager while he’s on vacation ○ SWEN-331: Engineering Secure Software Benjamin S Meyers 4

  5. Lottery Story Manager went on vacation (with the money he stole) ● Agency assigned someone else to pick up the investigation ○ Discovered that the manager was covering up his fraud ○ Agency calls and fires the manager while he’s on vacation ○ Agency disabled his physical access, but forgot to inform his ● employees of the incident Manager asked employees to delete logs/backups ○ Most of the evidence against him was lost ○ BUT! One of the employees messed up deleting the backup ○ SWEN-331: Engineering Secure Software Benjamin S Meyers 5

  6. Insider Threat: A Threat We Cannot Ignore Documented incidents are prevalent ● Carnegie Mellon’s SEI has studied over 700 cyber-crimes ○ originating from Insider Threat since 2000 Many more occurring ● In 2007, the Secret Service et al. conducted a survey of law ○ enforcement officials and security executives 31% of electronic crimes involved an insider ■ 49% of respondents experienced insider threat in the past ■ year Wikileaks, anyone? ● SWEN-331: Engineering Secure Software Benjamin S Meyers 6

  7. What is Insider Threat? When a malicious actor intentionally exceeds or misuses an ● authorized level of access Not elevation of privilege, but an abuse of existing privileges ○ Actors ● Current employees ○ Former employees (especially “recently former”) ○ Contractors ○ Affects the security of the organization ● Data ○ Intellectual property ○ Daily business operations (availability) ○ SWEN-331: Engineering Secure Software Benjamin S Meyers 7

  8. Double Threat to SE Insider Threat affects SE in two ways ● Insider users for the system that we release (e.g. hospital admins) ○ Insider developers to our own software development company ○ (e.g. disgruntled developers) Liability considerations ● Will our software facilitate insider threat? ○ Bring this up in your requirements elicitation meeting ○ Audit mechanisms ■ Deployment mechanisms ■ For everything else: hire some lawyers for a sneaky EULA ○ SWEN-331: Engineering Secure Software Benjamin S Meyers 8

  9. Types of Insiders Pure insider ● An employee with rights/access/privileges ○ e.g. systems administrator, developer, co-ops ○ Insider associate/affiliate ● Someone with limited authorized access ○ e.g. developer, but on a different project ○ e.g. guards, maintenance workers ○ Outside affiliate ● Non-trusted outsiders ○ e.g. outsourced contractors ○ e.g. spouses/friends of employee that steal their credentials ○ SWEN-331: Engineering Secure Software Benjamin S Meyers 9

  10. Classes of Threats IT Sabotage ● Intent of harming specific individuals, the organization, or the ○ organization’s assets Personal Financial Gain ● Intent of stealing/modifying confidential/proprietary information ○ from the organization for financial gain e.g. “Office Space” ○ Business Advantage ● Intent of stealing/modifying confidential/proprietary information ○ from the organization for business advantages e.g. industrial espionage, violating NDAs ○ Miscellaneous ● SWEN-331: Engineering Secure Software Benjamin S Meyers 10 10

  11. Classes of Threats Carnegie Mellon’s SEI: Common Sense ● Guide to Prevention and Detection of Insider Threats Studies and categorizes reports of ○ insider threat incidents Suggests best practices for ○ prevention and detection of insider threats 3rd Edition: 2009 -- 190 incidents ○ 4th Edition: 2012 -- 371 incidents ○ 5th Edition: 2016 -- 734 incidents ○ Source: https://resources.sei.cmu.edu/ SWEN-331: Engineering Secure Software Benjamin S Meyers 11 11

  12. Some Considerations Majority of the insider attacks required significant planning ● ahead of time Majority of the insider attacks took place physically on the ● premises Majority of malicious actors involved in insider attacks faced ● criminal charges And in most cases, the insiders were aware that they would face ○ charges SWEN-331: Engineering Secure Software Benjamin S Meyers 12 12

  13. Prevention vs. Detection Prevention is extraordinarily hard ● Work environment ○ Good management ○ Predicting human nature ○ Deterrents are only somewhat effective ○ Detection is much more feasible ● Usually by someone using common sense ○ Audits of access logs ○ In most cases, live network detection was not involved ○ Drawback: reactive ○ SWEN-331: Engineering Secure Software Benjamin S Meyers 13 13

  14. Mobile Changed Everything Today, we carry computers with us everywhere we go ● Easier to take assets with us (e.g. emails) ○ Easier to access assets remotely ○ Easier to provide access to others ○ “Bring Your Own Device” is becoming the norm ● Modern reactions ● Monitor everything (privacy concerns) ○ Disallow mobile devices entirely (employees don’t like that) ○ Separate networks (tough to manage) ○ SWEN-331: Engineering Secure Software Benjamin S Meyers 14 14

  15. Developer Insiders “Security through obscurity alone” is really not an option ● Developer Insiders would know what servers to go to ○ Developer Insiders know the attack surface ○ Access to production servers should be limited ● Non-release changes to production need to be documented ○ Forces you to document your deployment process anyway ○ On introducing backdoors ● Very rarely introduced in the development phase ○ Most often in the maintenance phase ○ Very rare in open source ● SWEN-331: Engineering Secure Software Benjamin S Meyers 15 15

  16. General Suggestions Be aware of the threat ● Keep up with the latest stories ○ Apply those situations to yours ○ Use the “buddy system” ● Nobody should be left physically alone with important resources ○ Logging and auditing ● Everything is logged ○ Audits should actually happen periodically, both as a deterrent ○ and for repudiation Archives and offsite backups ● Mitigate tampering and destruction of backups ○ SWEN-331: Engineering Secure Software Benjamin S Meyers 16 16

  17. General Suggestions Job termination policies ● Have one ○ Be prepared to disable accounts/physical access quickly ○ Rotate duties ● Better detection of anomalies ○ Better knowledge transfer anyway ○ Holistic approach → defense in depth ● People, data, technology, procedures, policies ○ Don’t be an insider threat! ● It’s unethical (and ruins your reputation) ○ They almost always get caught ○ SWEN-331: Engineering Secure Software Benjamin S Meyers 17 17

  18. Some Resources Carnegie Mellon’s SEI CERT Insider Threat Group ● Definitive resource ○ CERT Home ○ Insider Threat Blog ○ Certificate Programs ○ Mitigations ○ The Insider Threat: Combating the Enemy Within ● by Clive Blackwell ISBN 9781849280112 ○ Available via RIT Library electronically for free ○ SWEN-331: Engineering Secure Software Benjamin S Meyers 18 18

  19. We Need More Stories Activity ● 4 groups each assigned a sector ○ Banking & Finance Sector ■ Government Sector ■ Internet Technology & Telecommunications Sector ■ Critical Infrastructure ■ Make a 5 minute presentation ○ Tell us stories of insider threat ■ Tell us interesting statistics ■ Tell us some lessons learned ■ SWEN-331: Engineering Secure Software Benjamin S Meyers 19 19

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend