SECURING SECURE SHELL INTERACTIVE AND AUTOMATED ACCESS MANAGEMENT AGAINST INSIDER THREATS
Applying Due Care Via Common Sense Approach
April 2017
SECURING SECURE SHELL INTERACTIVE AND AUTOMATED ACCESS MANAGEMENT - - PowerPoint PPT Presentation
SECURING SECURE SHELL INTERACTIVE AND AUTOMATED ACCESS MANAGEMENT AGAINST INSIDER THREATS Applying Due Care Via Common Sense Approach April 2017 100% 46% Ponemon 2014 SSH Security Vulnerability of 2000 Global do not Organizations Report
Applying Due Care Via Common Sense Approach
April 2017
Ponemon 2014 SSH Security Vulnerability
Report (Ponemon 2014)
critical functions
compromise
Ponemon Institute Survey of 237 Companies
(Ponemon, 2016)
100%
Organizations surveyed SSH Key Compromises
Only 25%
have Secure Shell controls in place
46%
do not change or rotate keys
were carried out by insiders” –
(Rose, 2017)
concerned with insider threats than external threat (Bose, 2016)
Unwitting, careless employees
who provide opportunities to external threats
Malware Employees who bend the rules
to get their jobs done Insiders Careless Employees
National Industry Security Program
Operating Manual (NISPOM) Change 2
Federal Biz Ops
for key terms
Cisco: Appears 413 times
Linux: Appears 190 times UNIX: 137 times SIEM: 16 times Secure Shell: 4 times
Directs cleared contractors to establish and implement insider threat programs (DSS, 2016)
Senior Officials (ITPSO) -- must be identified as Key Management Personnel (KMP)
higher to the level of the Facility (Security) Clearance (FCL)
Presenter: Paul Collier Defense Contractor: 16 years Information Assurance: 10 years PKI, PKE, and Auditing Representing Self (With employer approval) Involvement with Secure Shell Auditing Web and Application Servers Prototyping on cloud instances Starting 2014 – dealing with anonymity
Insider Threat Secure Shell Cloud Services
Secure Shell Protocol
Secure remote login Replaces Telnet, rlogin, rcp
Suite of Utilities
SSH SFTP SCP
RSA Key Exchange
SSH Public Key is kept on server side (authorized_keys file) SSH Private Key is on the client side – referred to as the ID key
Similarities to SSL
Client Server Hello Key exchange, MAC, and encryption
Advantage to an Insider? Anonymity
US Cert: Current or former employee, contractor, or other business
Partner (US Cert, 2014)
Behavior Prediction Theories To Consider (US Cert, 2014)
cost of action
commitment, involvement and belief are weak
perceived behavior control) towards crime key factor in predicting behavior
CITIBANK – Plano, Texas (DOJ, 2016)
Architectural firm – Florida (Fox News, 2008)
First use for critical purposes
Initial SSH RSA-authenticated sessions require few prerequisites Installing live SSL (x509v3) keypairs require many prerequisites
Differences in size
X509v3 asserts ID. SSH Key is ID x509v3 Certificates compared to SSH Keys (BSD) SSH Keys are lightweight (Miller, 2011)
Another problem: Adding x509v3 Capability also adds more DOD
requirements (DOD UCR, 2013)
SSH-only = 12 Requirements SSH Supports x509v3 = 7 additional requirements
Public Encryption Key
Organic Fertilizer company “Grow Smart” (fictitious)
Marketing unique product Venture Capital LOE < 20 Leveraging Cloud Service Provider
Initial scope
Website – host product catalog CRM & ERP Email Services – Marketing, Transactional, Notifications, &
Receiving
Grow Smart
Private Key Public Key
CSP
SSH Key Generation
Public and private key
Default Settings To expedite, Bob:
HOME INTERACTIVE CATELOG GARDENING TIPS SIGN-IN REGISTER
Orders! Profits! Celebration! Bob’s a HIT!
Cloud Service Provider is a Business Partner (IdentityWeek, 2015) Cloud instances are time savers
Readily available cloud services lead to temptation to expedite (Williams, 2012)
Bob’s Method – a Pessimistic approach: “Build it quickly, get it out there, and validate the business before spending the time to engineer it for scaling”
(Mombrea, 2012)
After first launch
Check for existing keys Change keys Clean, scrub, sanitize, and disinfect Save new instance Repeat above steps on new instance Test it - build a honey pot – leave it alone Make corrections as needed
Bottom line – While cloud services do offer a time-saving benefit, use that
time to benefit your security posture
Bob becomes dissatisfied Left out of meetings Feels ostracized
GOOD NEWS, Bob!. We are hiring more IT Professionals
Bob meets foreign actor named Rovion
Rovion makes offer to Bob Bob performs 1st hack
Customers begin complaining about ID theft Grow Smart learns they have been hacked
Grow Smart Investigates
Ø Rovion moves in
The Grow Smart scenario was compiled from 3 back-to-back
hacks against ShapeShift that began in March 2016
Shapeshift is a Startup Crypto Currency Exchange Bob (an alias) was their “server guy” Bob appears to have grown disgruntled and met up with a
Russian Hacker
Bob performed the first hack and ripped off $130K
ShapeShift Response: Right Move, Wrong Time
Matched ssh keys with their owners but only after the 1st hack NISTIR 7966 recommends baselining authorized keys and key fingerprints (prior to deployment
and periodically)
Hastily-built cloud Infrastructure
The “Pessimistic approach” to cloud-building comes from the 2nd and 3rd hack-scenario But it wasn’t Bob; this was CEO crisis response NIST IR 7966 recommends having backup and recovery plan already in place
Ledger Labs performed forensics (Perklin, 2016)
Default logging Deleted logs Inadequate employee and infrastructure security policy
Baseline Authorized Keys (NIST, 2015)
Inventory and Remediate Existing SSH Servers, Keys, and Trust Relationships Confirm that each authorized_key is tied to an authorized user or service If unable to associate, delete ID and remove duplicated keys Remove keys that do not meet key length and algorithm policies
Setup Authorized Key Command Restrictions (NIST, 2015)
Limit keys to implicitly perform only required commands Adhere to NIST SP 800-53: Security and Privacy Controls for Federal Information Systems and Organizations
Restrict Keys to the client IP address
Logging: Log data should be verbose enough to capture:
Key fingerprints Account misuse Creation of new key files Determine unused authorized_keys files
(additionally) “Send log entries to an off-site logging server to ensure that evidentiary data could not be destroyed following any future breaches” (Perklin, 2016)
Executive Management
Understand which systems rely on SSH Level of access granted to users and automated processes Risk and potential impacts of a secure shell-based breach Basic steps needed to implement SSH key-management program
All major Enterprises depend on SSH for critical functions.
However, the majority of those surveyed do not have Secure Shell controls in place
Executive staff needs to understand Secure Shell and the critical
role that it plays in the success or failure of their organization
Secure Shell management needs to be part of an organization’s
Insider Threat mitigation plan
Bernal, Paul (2014), Internet Privacy Rights: Rights to Protect Autonomy, Published by Cambridge University Press, ISBN 978-1-107-04273-5 Bose, Shubhomita (2016), Small Business Trends: Could Your Own Employees Be a Security Threat? Accessed from https://smallbiztrends.com/2016/12/insider- threats.html Damien Miller, 2011, SSH-Keeping Your Communications Secret: What's new in OpenSSH? Accessed from https://www.openbsd.org/papers/OpenSSH-whats-new- 2011-eurobsdcon.pdf DoD UCR (2013), Department of Defense: Unified Capabilities Framework 2013 http://www.disa.mil/network- services/ucco/~/media/Files/DISA/Services/UCCO/UCR2013/04_UCR_2013.pdf DOJ (2016),Department of Justice, U.S. Attorney’s Office, Northern District of Texas, Former Citibank Employee Sentenced to 21 Months in Federal Prison for Causing Intentional Damage to a Protected Computer, Available at: https://www.justice.gov/usao-ndtx/pr/former-citibank-employee-sentenced-21-months-federal- prison-causing-intentional-damage Fox News (2008), Revenge Gone Wrong: Angry Employee Deletes All of Company's Data, Accessed from: http://www.foxnews.com/story/2008/01/24/angry- employee-deletes-all-company-data.html Marinescu, Dan C (2013) Cloud Computing: Theory and Practice, Page 290, published by MK Publications, ISBN 978-0-12404-627-6, Accessed on 03/25/2017 Mombrea, Matthew (2012): When to use cloud platforms vs. dedicated servers: To cloud or not to cloud -- horizontal scaling for web applications, Accessed from http://www.itworld.com/article/2832631/cloud-computing/when-to-use-cloud-platforms-vs--dedicated-servers.html Perklin, Michael (2016), Ledger Labs: Shapeshift Cyberattack Postmortem, Referenced at https://www.patrolx.com/wp-content/uploads/2016/04/309591980- ShapeShift-Postmortem.pdf
Ponemon Institute (2016), Ponemon Institute Research Report: Cost of Cyber Crime Study & the Risk of Business Innovation, Available at: https://ssl.www8.hp.com/ww/en/secure/pdf/4aa6- 8392enw.pdf Ponemon Institute (2014), Ponemon Institute Research Report: Ponemon 2014 SSH Security Vulnerability Report, Information Technology's Dirty Secret and Open Backdoors, Underwritten by Venafi Inc, Available at: file:///C:/Users/Owner/Documents/BAH/Brownbag/Ponemon-2014-SSH.pdf Quora (2017), Blog Post: My AWS account was hacked and I have a $50,000 bill, how can I reduce the amount I need to pay?, Available at: https://www.quora.com/My-AWS-account-was-hacked- and-I-have-a-50-000-bill-how-can-I-reduce-the-amount-I-need-to-pay Robert N. Rose, Forbes Magazine (Opinion): The Future Of Insider Threats. Accessed from https://www.forbes.com/sites/realspin/2016/08/30/the-future-of-insider-threats/#4b9602de7dcb SSH Communication Security (2017), SSH Protocol (Secure Shell), Accessed from: https://www.ssh.com/ssh/protocol/ Udemy (2017), Almost Everything About Secure Shell: Accessed from: https://www.udemy.com/almost-everything-about-secure-shell/ US Cert (2014), National Cybersecurity and Communications Integration Center, Combating the Insider Threat, Accessed from : https://www.us-cert.gov/sites/default/files/publications/Combating%20the%20Insider%20Threat_0.pdf Williams, Mark I. (2012) Making The Move To Cloud Computing, Chapter 3: Identifying Opportunities, an ICAEW Publication, ISBN 978-0-85760-617-4, Accessed from: https://www.icaew.com/- /media/corporate/archive/files/technical/information-technology/technology/making-the-move-to-cloud-computing.ashx?la=en Ylonen, Tatu; Turner, Paul; Scarfone, Karen; Souppaya, Murugiah (2015), NISTIR 7966: Security of Interactive and Automated Access Management Using Secure Shell (SSH). Published by: National Institute of Standards and Technology, Department of Commerce. Available at: http://dx.doi.org/10.6028/NIST.IR.7966