IT Security Teams and Managed Security Services Working Together - - PowerPoint PPT Presentation

it security teams and managed security services working
SMART_READER_LITE
LIVE PREVIEW

IT Security Teams and Managed Security Services Working Together - - PowerPoint PPT Presentation

IT Security Teams and Managed Security Services Working Together 2006 FIRST Conference Who am I? Chris van Breda, CD, CISSP, EnCE Click to add subtitle 2 Theme for the 2006 conference Sharing Intelligence in Global Response working


slide-1
SLIDE 1

2006 FIRST Conference IT Security Teams and Managed Security Services Working Together

slide-2
SLIDE 2

Click to add subtitle 2

Who am I?

Chris van Breda, CD, CISSP, EnCE

slide-3
SLIDE 3

Click to add subtitle 3

Theme for the 2006 conference

“Sharing Intelligence in Global Response” working smarter and sharing knowledge in this environment, finding ways to further

  • ur initiatives on collaborative and

cooperative approaches to find solutions to the problems we face in computer and network security incident response.

slide-4
SLIDE 4

Click to add subtitle 4

Working Smarter

The pressures of business, legislation and budgets force us all to see how we can work smarter. Unfortunately, working smarter for most management is another way of saying do more with less. Security budgets have limitations and most organizations have only increased spending when they are forced to by outside events – this could be legislation, litigation or loss of business due to security breaches.

slide-5
SLIDE 5

Click to add subtitle 5

Sharing knowledge

If you’re only a one person security shop, where do you go to learn? This is an easy question to answer, just look around you. Just about anyone here will talk about security issues at the drop of a hat. If they’re like me, you’ll have trouble making them stop! Sharing knowledge is a passion that must be spread, and that is also part of this presentation

slide-6
SLIDE 6

Click to add subtitle 6

Collaborative and Cooperative Approaches Whether you like it or not, you’re not the only security team out there. Also the odds are that for most of you, outsourcing some or all of your IT security will become a very real possibility. The better prepared you are, the better things will go.

slide-7
SLIDE 7

Click to add subtitle 7

Find Solutions

Now that outsourcing some or all of your security requirements is a very real possibility, you need to find the best approach to dealing with it.

slide-8
SLIDE 8

Click to add subtitle 8

Me

Discussion

You

This is an INTERACTIVE session

slide-9
SLIDE 9

Click to add subtitle 9

Questions/Comments

Anytime

slide-10
SLIDE 10

Click to add subtitle 10

GOAL

To help teams find solutions on how to effectively outsource and work with managed security service providers (MSSP).

slide-11
SLIDE 11

Click to add subtitle 11

Tutorial Overview

Review Taxonomy Review Security Objectives Discuss Security Influences Where most teams are now How and what to outsource and why Requests for Proposals Service Level Agreements How to work with the MSSP Service Reviews How to end an agreement

slide-12
SLIDE 12

Click to add subtitle 12

Back to Basics

Communication

slide-13
SLIDE 13

Click to add subtitle 13

Target Account Data Process Component Network Intranet Computer Action Probe Flood Scan

Authenticate

Spoof Read Bypass Copy Steal Modify Delete

Event

slide-14
SLIDE 14

Click to add subtitle 14

Target Account Data Process Component Network Intranet Computer Action Probe Flood Scan

Authenticate

Spoof Read Bypass Copy Steal Modify Delete

Event

Vulnerability

Design

Configuration Implimenration

Tool Physical Attack Flood Information Exchange

User Command Autonomous Agent

Toolkit

Script or Program

Distributed Tool Data Tap

Unauthorized Result

Increased Access Corruption Disclosure DOS Theft

Attack

slide-15
SLIDE 15

Click to add subtitle 15

Attackers Attacks Objectives

Simplified Computer and Network Incident

slide-16
SLIDE 16

Click to add subtitle 16

Target Account Data Process Component Network Intranet Computer Action Probe Flood Scan

Authenticate

Spoof Read Bypass Copy Steal Modify Delete

Event

Vulnerability

Design

Configuration Implimenration

Tool Physical Attack Flood Information Exchange

User Command Autonomous Agent

Toolkit

Script or Program

Distributed Tool Data Tap

Unauthorized Result

Increased Access Corruption Disclosure DOS Theft

Attack

Attackers Hackers Terrorists Spies Criminals Voyeurs

Corporations

Vandals

Objectives

Damage Financial Political Thrill

Incident

Ref: http://www.cert.org/research/taxonomy_988667.pdf

slide-17
SLIDE 17

Security Objectives

slide-18
SLIDE 18

Click to add subtitle 18

What are your security objectives?

Business risk perspective Perimeter Security Mobile Users Internal Malfeasance Defence in Depth Incident Response Plan Tracking Metrics

slide-19
SLIDE 19

Click to add subtitle 19

Risk Management

In most cases risk management looks pretty simple, Oversimplified, Risk = P x L, where P is the probability of an event that will cause a financial loss of L.

slide-20
SLIDE 20

Click to add subtitle 20

Computer Weekly’s Inaugural CIO Index

“More than 30% of small firms are still spending less than 1% of their IT budget

  • n security, while larger firms have

significantly increased their investment in security over the past two years, spending between 4% and 5% of their IT budgets on security.”

slide-21
SLIDE 21

Click to add subtitle 21

“Specifically, the FTC charged that the company failed to do the following:

  • Assess risks to the information it collected and stored - both online

and off-line.

  • Implement reasonable policies and procedures in key areas such as

employee screening and training and the collection, handling and disposal of personal information.

  • Implement simple, low-cost, readily available defences to common

Web site attacks or put in place reasonable measures to prevent hackers from gaining access to the company’s computer network.

  • Employ reasonable measures to detect and respond to incidents of

unauthorized access to the data or to conduct security investigations.

  • Provide reasonable oversight for the handling of personal data by

service providers such as third parties employed to process the information

Will This be YOU?

slide-22
SLIDE 22

Click to add subtitle 22

Will This be YOU?

According to the complaint, a hacker exploited these failures by using a common Web site attack to gain access to the computer network. In addition, a television station found documents containing sensitive consumer information discarded in an unsecured trash bin. "Careless handling of consumers' sensitive financial information is an open invitation to identity thieves," said FTC chairman Deborah Platt Majoras. "Enforcing the laws designed to protect consumers' sensitive financial data is a priority at the FTC. This is the 13th case challenging faulty data security practices, and we will bring more cases if companies continue to fail consumers."

slide-23
SLIDE 23

Click to add subtitle 23

Influences

Legislation Privacy Consumer confidence Type of Business Resources Users Budget

slide-24
SLIDE 24

Click to add subtitle 24

Typical Situation

Understaffed Overworked

slide-25
SLIDE 25

Click to add subtitle 25

Dynamics of Incident Response

By Johannes Wiik Faculty of Engineering and Science Department of Information & Communication Technology Norway

  • Dr. Klaus-Peter Kossakowski

DFN-CERT Services GmbH Germany http://www.first.org/conference/2005/papers/speaker14- paper-1.pdf

slide-26
SLIDE 26

Click to add subtitle 26

Dynamics of Incident Response- Abstract

“ A frequently identified problem is that CSIRTs are

  • ver-worked, under-staffed and under-funded. “

“ Based on theory from process improvement and information from the case study, we identified that short-term pressure from a growing incident work load prevents attempts for developing more response capability long-term, leading the CSIRT into a “capability trap”. Fundamental solutions will typically involve a worse-before-better trade-

  • ff for management. Short term the CSIRT will lower its response

capability while new capability is developed. Long term the CSIRT will get an automated response capability independent from limited human resources. Hence, it can automatically scale to future increases in workload.

slide-27
SLIDE 27

Click to add subtitle 27

Dynamics of Incident Response- Section 3 Common Problems Among CSIRTs Frequently referenced problems in the CSIRT community are over-stretched resources and a need for continuous improvements. Killcrece et

  • al. (2003a p. 128) refer to many such problems,

for example: lack of funding, lack of management support, lack of trained incident handling staff, lack of clearly defined mission and authority, and lack of coordination mechanisms.

slide-28
SLIDE 28

Why and How To Outsource

slide-29
SLIDE 29

Click to add subtitle 29

Typical Security Situation

  • Grown on the back of existing structure
  • Lack of specific expertise
  • Lack of resources/funding
  • Labour legislation – no OT, long hours etc.
  • Check the box attitude
  • Misconceptions – we have IDS/FWs so we

must be secure.

  • Who accepts responsibility?
  • What happens when things go wrong?
slide-30
SLIDE 30

Click to add subtitle 30

Where are you now?

  • Implemented NIDS/HIDS/FWs etc
  • Some logging turned on
  • Might even have SIM/SIEM
  • Someone gets tasked to review logs, events etc.
  • 24/7 monitoring might be required
  • So far you’ve managed to survive
  • Workload is growing/accountability is pushed down
  • Jobs on the line
  • Realization you aren’t closing the gap, or you can’t

continue to fund the growing resource requirement. You need options. Are you reactive instead of proactive?

slide-31
SLIDE 31

Click to add subtitle 31

WHY OUTSOURCE SECURITY?

YOU DON’T You’re outsourcing some operational and functional requirements the same as any other service is outsourced. In most cases, the responsibility for security remains in house. Accountability always remains in house.

slide-32
SLIDE 32

Click to add subtitle 32

COST

How much does a 24/7 monitoring team cost? Secure facilities Trained resources Proper equipment 1.1 to 1.5 million dollars for 1st year.

slide-33
SLIDE 33

Click to add subtitle 33

OUTSOURCING

Identify your needs first; AV Content filtering Spam filtering IDS (HIDS/NIDS) IPS Log monitoring Firewall services (?) Do you want to own or lease(?)

slide-34
SLIDE 34

Click to add subtitle 34

Example - All You Need Retail Stores

20,000 plus users 10-15000 workstations Mixed OS Large geographical area Main business – retail sales Also provides financial services

slide-35
SLIDE 35

Click to add subtitle 35

Current situation

Subject to legislation You don’t enforce AUP AV fairly good Firewalls Help desk Change management Small security staff Friction between Ops and Security

slide-36
SLIDE 36

Click to add subtitle 36

Option review

  • Security review – policy/requirements
  • Cost of an incident (find spreadsheet)
  • Hire more staff (start-up cost of a 24/7 SOC

is over a million dollars)

  • Outsource to a part-time solution for after

hours

  • Decide what you can do well in-house and

what you need help on

  • Define your requirements – spend lots of

time on this one

  • Hire a professional service to identify your

security requirements

slide-37
SLIDE 37

Click to add subtitle 37

Identify your needs

You consider NIDS/HIDS as vital. You need to enforce AUP Spam needs to be controlled You need both desktop and enterprise AV Your most critical assets are your database servers. You want syslog and application monitoring turned on You want to be able to correlate all security device

  • utputs (FW AV IDS SYSlog)

You need better vulnerability monitoring and patch management. You need 24/7 monitoring You need 24/7 response

slide-38
SLIDE 38

Click to add subtitle 38

Other Considerations

Scalability (what happens when your company doubles in size?), Bandwidth requirements (if your security logging is so noisy, are you causing a self inflicted DOS during peak hours?), Ease of use Interoperability – does this work well with other products? vendor support levels Product history – new or tried and tested or tried and tired? Independent Reviews Talk to others in the industry COST

slide-39
SLIDE 39

Click to add subtitle 39

Identify Providers that meet your needs

Location Company size – size isn’t everything. Vendor relationships Existing clients People Alternate locations Data storage What services do they currently offer – avoid the “we can do that”, look for the “we do that” Call and talk to vendors (MSS) that you think meet most

  • f your requirements, identify potential candidates.

Ask vendors to come in for a meeting. Make it informal, and promise nothing. Be up front, open, and honest

slide-40
SLIDE 40

Keys to a Great Working Relationship RFPs SLAs

slide-41
SLIDE 41

Click to add subtitle 41

What is an RFP?

Where you identify your requirements in detail You ask who can meet your requirements, in detail It leads to an SLA and a contract

slide-42
SLIDE 42

Click to add subtitle 42

RFP - An overview of your company

All You Need Retail Stores, is soliciting proposals from firms that are able to render professional and monitoring services in the area of IT Managed Security Services Proposals must address all of the services described in the detailed Scope and Deliverables section. All You Need Retail Stores intends to make a single contract award to the most responsive and responsible firm earning the highest score. This procurement is open to eligible firms that meet the qualification requirements.

slide-43
SLIDE 43

Click to add subtitle 43

RFP – company background

All You Need Retail Stores is a national retail chain with 2000 stores and 10000 employees over varying geographical areas. All You Need Retail Stores provides a wide range of consumer goods through a distributed warehouse system and has supply arrangements with around 1000 vendors, both nationally and international. All You Need Retail Stores also has its own credit services division and offers clients a wide range

  • f financial services.

All of our stores, warehouses are connected by a network consisting of …………….(high level

  • verview)
slide-44
SLIDE 44

Click to add subtitle 44

RFP – Contact Information

All queries concerning this RFP must be directed only to the following: NAME Phone/FAX Email

slide-45
SLIDE 45

Click to add subtitle 45

RFP Schedule

Event Date Time RFP Released 15 June 2006 Questions from interested parties NLT 30 Jun 2006 4 PM Proposal Due Date NLT 30 Jul 2006 2 PM Interviews (three best) 15 Aug 2006 Validation Audit (best only) NLT 30 Aug 2006 LOI Issued 1 Sep 2006 SLA Finalized 30 Sep 2006 2 PM Contract Award Date 1 Oct 2006 Proposed start of services 1 Dec 2006

slide-46
SLIDE 46

Click to add subtitle 46

RFP - Term

The term of the resulting agreement is expected to be 36 months with the possibility of 2 one year extensions and is anticipated to be effective from December 1, 2006 through November 30, 2009. The agreement term may change if All You Need Retail Stores makes an award earlier than expected or if All You Need Retail Stores cannot execute the agreement in a timely manner due to unforeseen delays. The resulting contract will be of no force or effect until it is signed by both parties. The Contractor is hereby advised not to commence performance until all approvals have been obtained. Should performance commence before all approvals are obtained, said services may be considered to have been volunteered if all approvals have not been obtained.

slide-47
SLIDE 47

Click to add subtitle 47

RFP – Bidder questions

How and until when can potential bidders ask questions?

slide-48
SLIDE 48

Click to add subtitle 48

RFP - Decision criteria

(lowest cost, best services etc) Pass a mandatory third party audit before contract awarded Give them the audit details. Failing a third party audit will nullify any LOI and All You Need Retail Stores will be free to contact the next most qualified bidder and continue the contract process with them.

slide-49
SLIDE 49

Click to add subtitle 49

RFP - Deliverables

Functional requirements

What services 24/7/365 monitoring of …. Reports

Non Functional Requirements

Supports the business requirements

Technical Requirements

Failover Clustering Reporting

Support and Maintenance

Expectations

slide-50
SLIDE 50

Click to add subtitle 50

Requirements Review

24 x 7 x 365 monitoring.

  • Identification of events attacks and

incidents

  • reporting of events attacks and

incidents

  • containment recommendations on

attacks and incidents

  • triage performed on attacks and

incidents

slide-51
SLIDE 51

Click to add subtitle 51

RFP Steps- part 1

Overview Background Contact Information Schedule Term Questions Decision Criteria Deliverables

slide-52
SLIDE 52

Click to add subtitle 52

What Information you want

  • Vendor company information
  • Company background/history
  • Quick overview of services and capabilities
  • Management or key personnel bios
  • Contact information
  • Vendor’s proposed solution
  • Basic summary of the solution
  • Solution methodology/process
  • Development plan
  • List of tasks
  • Timeline
  • Details on proposed solution
  • Original ideas – strategy, creative, etc.
  • Features and functionality
  • Options and add-ons
  • Scalability
  • Technical requirements
  • ° Preliminary design compositions (voluntary)

Proposed budget Cost of services

slide-53
SLIDE 53

Click to add subtitle 53

What Information you want - continued

Required 3rd party costs

  • Support and maintenance

List of deliverables Ownership Proposed Project Team Vendor references Show examples of previous work Provide client references List awards/accolades and special certification

slide-54
SLIDE 54

Click to add subtitle 54

Next Steps

Have both legal and procurement departments (if they exist) review the RFP If they are not available, have it reviewed both by somebody on your team and an

  • utside source

Put it out for bid, be realistic and give at least 6-8 weeks for response, maybe more if the RFP is very long

slide-55
SLIDE 55

Click to add subtitle 55

Review Responses

Form your evaluation team before the cut-

  • ff date

Score the proposals against your criteria Reject the ones that failed the mandatory requirements Narrow the field (3 is a good number) Interview the bidders Make a decision

slide-56
SLIDE 56

Click to add subtitle 56

Final Bidder review

Don’t sign a contract yet Do the audit – if they fail, go to the next bidder Sign a Letter of Intent based on an acceptable SLA Don’t be pressured into signing a contract yet, there’s still a lot of work ahead.

slide-57
SLIDE 57

Click to add subtitle 57

Service Level Agreements

Based on the bidders response plan, work

  • ut a detailed SLA

Why?

slide-58
SLIDE 58

Click to add subtitle 58

SLA Steps

Define your terms and how you will monitor them. Spell out how the agreement will be monitored Cover best- and worst-case situations Make the penalties fit Demand continuous improvement. Designate an SLA Manager Ensure understanding of the SLA by both parties Review any draft SLAs internally Does a legal review sound like a good idea?

slide-59
SLIDE 59

Click to add subtitle 59

Final Thought on SLAs

Provider Attitude “If we have a breach on our network, we don’t have to tell you. Its our network!”

slide-60
SLIDE 60

Click to add subtitle 60

Final Steps – or not?

Sign your contract Manage the SLA

slide-61
SLIDE 61

Click to add subtitle 61

What outsourcing does for you

Reduce costs? Pooled experience Unlimited resources (if money is no object) Compliance issues Containment Recommendations Separation of Duty

slide-62
SLIDE 62

Click to add subtitle 62

What your outsourcing does NOT do for you

Absolve responsibility Incident Response Fix all your security problems Is not an “authoritative” partner Vulnerability Management No Guarantees

slide-63
SLIDE 63

Click to add subtitle 63

Your responsibilities

Why would MSS be a fit in your organization? The right solution for your needs PDAR Communication Information Sharing Job Security Network Knowledge – Critical asset identification Definitions (security events) Feedback Contract/SLA oversight

slide-64
SLIDE 64

Click to add subtitle 64

Incident Response together

Communication Planning PDAR – together Issue Resolution Process evolution

slide-65
SLIDE 65

Click to add subtitle 65

Working with your MSSP-Communication

Get to know their team members, have a face

to face meeting

For the first month, have daily or weekly

conference calls

Invite their team members to come over and

see your team first hand

Talk to the provider client service manager at

least monthly

slide-66
SLIDE 66

Click to add subtitle 66

Working with your MSSP-Planning Plan incident scenarios Talk through an incident using actual data Keep contact information up-to-date, both yours and theirs, confirm it at least monthly Plan tests, both with and without notice but don’t overdo it Handle problems and issues at the lowest level possible

slide-67
SLIDE 67

Click to add subtitle 67

Working with your MSSP-PDAR Work together

Prevent Detect Analyze React

If your provider doesn’t drive you crazy in the first month or two, they aren’t doing their job

Why?

slide-68
SLIDE 68

Click to add subtitle 68

Working with your MSSP-Issues Resolve at the lowest level possible, but don’t hesitate to escalate

Remember, you’re paying for the service

Keep it professional

Don’t scream and shout Keep to the facts

If you can’t resolve it, involve senior management (both sides)

slide-69
SLIDE 69

Click to add subtitle 69

Working with your MSSP-Evolution Times and technology change You may be able streamline your own processes See if your provider has recommendations Keep track of what you could have done better or major issues you have

slide-70
SLIDE 70

Click to add subtitle 70

When Things Go Wrong- Termination

In the contract and SLA address

If the provider goes out of business, how will

your data be protected/returned

If you’re not happy, what will it cost you? If at the end of the contract term, you do not

want to renew

Provide for monthly extensions Provide for turn-over/transition to new provider

slide-71
SLIDE 71

Click to add subtitle 71

Review

Communicate on the same level Identify your needs in advance Write a detailed RFP Choose the right provider Write a clear SLA Manage the service Communicate

slide-72
SLIDE 72

Click to add subtitle 72

Questions or Comments Contact Information

Cyberklix Inc. Chris van Breda, CD, CISSP, EnCE 220 Laurier West, Suite 560 Ottawa ON K1P 5Z9 (613) 230-5693 chrisv@cyberklix.com